x509.c 384 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384438543864387438843894390439143924393439443954396439743984399440044014402440344044405440644074408440944104411441244134414441544164417441844194420442144224423442444254426442744284429443044314432443344344435443644374438443944404441444244434444444544464447444844494450445144524453445444554456445744584459446044614462446344644465446644674468446944704471447244734474447544764477447844794480448144824483448444854486448744884489449044914492449344944495449644974498449945004501450245034504450545064507450845094510451145124513451445154516451745184519452045214522452345244525452645274528452945304531453245334534453545364537453845394540454145424543454445454546454745484549455045514552455345544555455645574558455945604561456245634564456545664567456845694570457145724573457445754576457745784579458045814582458345844585458645874588458945904591459245934594459545964597459845994600460146024603460446054606460746084609461046114612461346144615461646174618461946204621462246234624462546264627462846294630463146324633463446354636463746384639464046414642464346444645464646474648464946504651465246534654465546564657465846594660466146624663466446654666466746684669467046714672467346744675467646774678467946804681468246834684468546864687468846894690469146924693469446954696469746984699470047014702470347044705470647074708470947104711471247134714471547164717471847194720472147224723472447254726472747284729473047314732473347344735473647374738473947404741474247434744474547464747474847494750475147524753475447554756475747584759476047614762476347644765476647674768476947704771477247734774477547764777477847794780478147824783478447854786478747884789479047914792479347944795479647974798479948004801480248034804480548064807480848094810481148124813481448154816481748184819482048214822482348244825482648274828482948304831483248334834483548364837483848394840484148424843484448454846484748484849485048514852485348544855485648574858485948604861486248634864486548664867486848694870487148724873487448754876487748784879488048814882488348844885488648874888488948904891489248934894489548964897489848994900490149024903490449054906490749084909491049114912491349144915491649174918491949204921492249234924492549264927492849294930493149324933493449354936493749384939494049414942494349444945494649474948494949504951495249534954495549564957495849594960496149624963496449654966496749684969497049714972497349744975497649774978497949804981498249834984498549864987498849894990499149924993499449954996499749984999500050015002500350045005500650075008500950105011501250135014501550165017501850195020502150225023502450255026502750285029503050315032503350345035503650375038503950405041504250435044504550465047504850495050505150525053505450555056505750585059506050615062506350645065506650675068506950705071507250735074507550765077507850795080508150825083508450855086508750885089509050915092509350945095509650975098509951005101510251035104510551065107510851095110511151125113511451155116511751185119512051215122512351245125512651275128512951305131513251335134513551365137513851395140514151425143514451455146514751485149515051515152515351545155515651575158515951605161516251635164516551665167516851695170517151725173517451755176517751785179518051815182518351845185518651875188518951905191519251935194519551965197519851995200520152025203520452055206520752085209521052115212521352145215521652175218521952205221522252235224522552265227522852295230523152325233523452355236523752385239524052415242524352445245524652475248524952505251525252535254525552565257525852595260526152625263526452655266526752685269527052715272527352745275527652775278527952805281528252835284528552865287528852895290529152925293529452955296529752985299530053015302530353045305530653075308530953105311531253135314531553165317531853195320532153225323532453255326532753285329533053315332533353345335533653375338533953405341534253435344534553465347534853495350535153525353535453555356535753585359536053615362536353645365536653675368536953705371537253735374537553765377537853795380538153825383538453855386538753885389539053915392539353945395539653975398539954005401540254035404540554065407540854095410541154125413541454155416541754185419542054215422542354245425542654275428542954305431543254335434543554365437543854395440544154425443544454455446544754485449545054515452545354545455545654575458545954605461546254635464546554665467546854695470547154725473547454755476547754785479548054815482548354845485548654875488548954905491549254935494549554965497549854995500550155025503550455055506550755085509551055115512551355145515551655175518551955205521552255235524552555265527552855295530553155325533553455355536553755385539554055415542554355445545554655475548554955505551555255535554555555565557555855595560556155625563556455655566556755685569557055715572557355745575557655775578557955805581558255835584558555865587558855895590559155925593559455955596559755985599560056015602560356045605560656075608560956105611561256135614561556165617561856195620562156225623562456255626562756285629563056315632563356345635563656375638563956405641564256435644564556465647564856495650565156525653565456555656565756585659566056615662566356645665566656675668566956705671567256735674567556765677567856795680568156825683568456855686568756885689569056915692569356945695569656975698569957005701570257035704570557065707570857095710571157125713571457155716571757185719572057215722572357245725572657275728572957305731573257335734573557365737573857395740574157425743574457455746574757485749575057515752575357545755575657575758575957605761576257635764576557665767576857695770577157725773577457755776577757785779578057815782578357845785578657875788578957905791579257935794579557965797579857995800580158025803580458055806580758085809581058115812581358145815581658175818581958205821582258235824582558265827582858295830583158325833583458355836583758385839584058415842584358445845584658475848584958505851585258535854585558565857585858595860586158625863586458655866586758685869587058715872587358745875587658775878587958805881588258835884588558865887588858895890589158925893589458955896589758985899590059015902590359045905590659075908590959105911591259135914591559165917591859195920592159225923592459255926592759285929593059315932593359345935593659375938593959405941594259435944594559465947594859495950595159525953595459555956595759585959596059615962596359645965596659675968596959705971597259735974597559765977597859795980598159825983598459855986598759885989599059915992599359945995599659975998599960006001600260036004600560066007600860096010601160126013601460156016601760186019602060216022602360246025602660276028602960306031603260336034603560366037603860396040604160426043604460456046604760486049605060516052605360546055605660576058605960606061606260636064606560666067606860696070607160726073607460756076607760786079608060816082608360846085608660876088608960906091609260936094609560966097609860996100610161026103610461056106610761086109611061116112611361146115611661176118611961206121612261236124612561266127612861296130613161326133613461356136613761386139614061416142614361446145614661476148614961506151615261536154615561566157615861596160616161626163616461656166616761686169617061716172617361746175617661776178617961806181618261836184618561866187618861896190619161926193619461956196619761986199620062016202620362046205620662076208620962106211621262136214621562166217621862196220622162226223622462256226622762286229623062316232623362346235623662376238623962406241624262436244624562466247624862496250625162526253625462556256625762586259626062616262626362646265626662676268626962706271627262736274627562766277627862796280628162826283628462856286628762886289629062916292629362946295629662976298629963006301630263036304630563066307630863096310631163126313631463156316631763186319632063216322632363246325632663276328632963306331633263336334633563366337633863396340634163426343634463456346634763486349635063516352635363546355635663576358635963606361636263636364636563666367636863696370637163726373637463756376637763786379638063816382638363846385638663876388638963906391639263936394639563966397639863996400640164026403640464056406640764086409641064116412641364146415641664176418641964206421642264236424642564266427642864296430643164326433643464356436643764386439644064416442644364446445644664476448644964506451645264536454645564566457645864596460646164626463646464656466646764686469647064716472647364746475647664776478647964806481648264836484648564866487648864896490649164926493649464956496649764986499650065016502650365046505650665076508650965106511651265136514651565166517651865196520652165226523652465256526652765286529653065316532653365346535653665376538653965406541654265436544654565466547654865496550655165526553655465556556655765586559656065616562656365646565656665676568656965706571657265736574657565766577657865796580658165826583658465856586658765886589659065916592659365946595659665976598659966006601660266036604660566066607660866096610661166126613661466156616661766186619662066216622662366246625662666276628662966306631663266336634663566366637663866396640664166426643664466456646664766486649665066516652665366546655665666576658665966606661666266636664666566666667666866696670667166726673667466756676667766786679668066816682668366846685668666876688668966906691669266936694669566966697669866996700670167026703670467056706670767086709671067116712671367146715671667176718671967206721672267236724672567266727672867296730673167326733673467356736673767386739674067416742674367446745674667476748674967506751675267536754675567566757675867596760676167626763676467656766676767686769677067716772677367746775677667776778677967806781678267836784678567866787678867896790679167926793679467956796679767986799680068016802680368046805680668076808680968106811681268136814681568166817681868196820682168226823682468256826682768286829683068316832683368346835683668376838683968406841684268436844684568466847684868496850685168526853685468556856685768586859686068616862686368646865686668676868686968706871687268736874687568766877687868796880688168826883688468856886688768886889689068916892689368946895689668976898689969006901690269036904690569066907690869096910691169126913691469156916691769186919692069216922692369246925692669276928692969306931693269336934693569366937693869396940694169426943694469456946694769486949695069516952695369546955695669576958695969606961696269636964696569666967696869696970697169726973697469756976697769786979698069816982698369846985698669876988698969906991699269936994699569966997699869997000700170027003700470057006700770087009701070117012701370147015701670177018701970207021702270237024702570267027702870297030703170327033703470357036703770387039704070417042704370447045704670477048704970507051705270537054705570567057705870597060706170627063706470657066706770687069707070717072707370747075707670777078707970807081708270837084708570867087708870897090709170927093709470957096709770987099710071017102710371047105710671077108710971107111711271137114711571167117711871197120712171227123712471257126712771287129713071317132713371347135713671377138713971407141714271437144714571467147714871497150715171527153715471557156715771587159716071617162716371647165716671677168716971707171717271737174717571767177717871797180718171827183718471857186718771887189719071917192719371947195719671977198719972007201720272037204720572067207720872097210721172127213721472157216721772187219722072217222722372247225722672277228722972307231723272337234723572367237723872397240724172427243724472457246724772487249725072517252725372547255725672577258725972607261726272637264726572667267726872697270727172727273727472757276727772787279728072817282728372847285728672877288728972907291729272937294729572967297729872997300730173027303730473057306730773087309731073117312731373147315731673177318731973207321732273237324732573267327732873297330733173327333733473357336733773387339734073417342734373447345734673477348734973507351735273537354735573567357735873597360736173627363736473657366736773687369737073717372737373747375737673777378737973807381738273837384738573867387738873897390739173927393739473957396739773987399740074017402740374047405740674077408740974107411741274137414741574167417741874197420742174227423742474257426742774287429743074317432743374347435743674377438743974407441744274437444744574467447744874497450745174527453745474557456745774587459746074617462746374647465746674677468746974707471747274737474747574767477747874797480748174827483748474857486748774887489749074917492749374947495749674977498749975007501750275037504750575067507750875097510751175127513751475157516751775187519752075217522752375247525752675277528752975307531753275337534753575367537753875397540754175427543754475457546754775487549755075517552755375547555755675577558755975607561756275637564756575667567756875697570757175727573757475757576757775787579758075817582758375847585758675877588758975907591759275937594759575967597759875997600760176027603760476057606760776087609761076117612761376147615761676177618761976207621762276237624762576267627762876297630763176327633763476357636763776387639764076417642764376447645764676477648764976507651765276537654765576567657765876597660766176627663766476657666766776687669767076717672767376747675767676777678767976807681768276837684768576867687768876897690769176927693769476957696769776987699770077017702770377047705770677077708770977107711771277137714771577167717771877197720772177227723772477257726772777287729773077317732773377347735773677377738773977407741774277437744774577467747774877497750775177527753775477557756775777587759776077617762776377647765776677677768776977707771777277737774777577767777777877797780778177827783778477857786778777887789779077917792779377947795779677977798779978007801780278037804780578067807780878097810781178127813781478157816781778187819782078217822782378247825782678277828782978307831783278337834783578367837783878397840784178427843784478457846784778487849785078517852785378547855785678577858785978607861786278637864786578667867786878697870787178727873787478757876787778787879788078817882788378847885788678877888788978907891789278937894789578967897789878997900790179027903790479057906790779087909791079117912791379147915791679177918791979207921792279237924792579267927792879297930793179327933793479357936793779387939794079417942794379447945794679477948794979507951795279537954795579567957795879597960796179627963796479657966796779687969797079717972797379747975797679777978797979807981798279837984798579867987798879897990799179927993799479957996799779987999800080018002800380048005800680078008800980108011801280138014801580168017801880198020802180228023802480258026802780288029803080318032803380348035803680378038803980408041804280438044804580468047804880498050805180528053805480558056805780588059806080618062806380648065806680678068806980708071807280738074807580768077807880798080808180828083808480858086808780888089809080918092809380948095809680978098809981008101810281038104810581068107810881098110811181128113811481158116811781188119812081218122812381248125812681278128812981308131813281338134813581368137813881398140814181428143814481458146814781488149815081518152815381548155815681578158815981608161816281638164816581668167816881698170817181728173817481758176817781788179818081818182818381848185818681878188818981908191819281938194819581968197819881998200820182028203820482058206820782088209821082118212821382148215821682178218821982208221822282238224822582268227822882298230823182328233823482358236823782388239824082418242824382448245824682478248824982508251825282538254825582568257825882598260826182628263826482658266826782688269827082718272827382748275827682778278827982808281828282838284828582868287828882898290829182928293829482958296829782988299830083018302830383048305830683078308830983108311831283138314831583168317831883198320832183228323832483258326832783288329833083318332833383348335833683378338833983408341834283438344834583468347834883498350835183528353835483558356835783588359836083618362836383648365836683678368836983708371837283738374837583768377837883798380838183828383838483858386838783888389839083918392839383948395839683978398839984008401840284038404840584068407840884098410841184128413841484158416841784188419842084218422842384248425842684278428842984308431843284338434843584368437843884398440844184428443844484458446844784488449845084518452845384548455845684578458845984608461846284638464846584668467846884698470847184728473847484758476847784788479848084818482848384848485848684878488848984908491849284938494849584968497849884998500850185028503850485058506850785088509851085118512851385148515851685178518851985208521852285238524852585268527852885298530853185328533853485358536853785388539854085418542854385448545854685478548854985508551855285538554855585568557855885598560856185628563856485658566856785688569857085718572857385748575857685778578857985808581858285838584858585868587858885898590859185928593859485958596859785988599860086018602860386048605860686078608860986108611861286138614861586168617861886198620862186228623862486258626862786288629863086318632863386348635863686378638863986408641864286438644864586468647864886498650865186528653865486558656865786588659866086618662866386648665866686678668866986708671867286738674867586768677867886798680868186828683868486858686868786888689869086918692869386948695869686978698869987008701870287038704870587068707870887098710871187128713871487158716871787188719872087218722872387248725872687278728872987308731873287338734873587368737873887398740874187428743874487458746874787488749875087518752875387548755875687578758875987608761876287638764876587668767876887698770877187728773877487758776877787788779878087818782878387848785878687878788878987908791879287938794879587968797879887998800880188028803880488058806880788088809881088118812881388148815881688178818881988208821882288238824882588268827882888298830883188328833883488358836883788388839884088418842884388448845884688478848884988508851885288538854885588568857885888598860886188628863886488658866886788688869887088718872887388748875887688778878887988808881888288838884888588868887888888898890889188928893889488958896889788988899890089018902890389048905890689078908890989108911891289138914891589168917891889198920892189228923892489258926892789288929893089318932893389348935893689378938893989408941894289438944894589468947894889498950895189528953895489558956895789588959896089618962896389648965896689678968896989708971897289738974897589768977897889798980898189828983898489858986898789888989899089918992899389948995899689978998899990009001900290039004900590069007900890099010901190129013901490159016901790189019902090219022902390249025902690279028902990309031903290339034903590369037903890399040904190429043904490459046904790489049905090519052905390549055905690579058905990609061906290639064906590669067906890699070907190729073907490759076907790789079908090819082908390849085908690879088908990909091909290939094909590969097909890999100910191029103910491059106910791089109911091119112911391149115911691179118911991209121912291239124912591269127912891299130913191329133913491359136913791389139914091419142914391449145914691479148914991509151915291539154915591569157915891599160916191629163916491659166916791689169917091719172917391749175917691779178917991809181918291839184918591869187918891899190919191929193919491959196919791989199920092019202920392049205920692079208920992109211921292139214921592169217921892199220922192229223922492259226922792289229923092319232923392349235923692379238923992409241924292439244924592469247924892499250925192529253925492559256925792589259926092619262926392649265926692679268926992709271927292739274927592769277927892799280928192829283928492859286928792889289929092919292929392949295929692979298929993009301930293039304930593069307930893099310931193129313931493159316931793189319932093219322932393249325932693279328932993309331933293339334933593369337933893399340934193429343934493459346934793489349935093519352935393549355935693579358935993609361936293639364936593669367936893699370937193729373937493759376937793789379938093819382938393849385938693879388938993909391939293939394939593969397939893999400940194029403940494059406940794089409941094119412941394149415941694179418941994209421942294239424942594269427942894299430943194329433943494359436943794389439944094419442944394449445944694479448944994509451945294539454945594569457945894599460946194629463946494659466946794689469947094719472947394749475947694779478947994809481948294839484948594869487948894899490949194929493949494959496949794989499950095019502950395049505950695079508950995109511951295139514951595169517951895199520952195229523952495259526952795289529953095319532953395349535953695379538953995409541954295439544954595469547954895499550955195529553955495559556955795589559956095619562956395649565956695679568956995709571957295739574957595769577957895799580958195829583958495859586958795889589959095919592959395949595959695979598959996009601960296039604960596069607960896099610961196129613961496159616961796189619962096219622962396249625962696279628962996309631963296339634963596369637963896399640964196429643964496459646964796489649965096519652965396549655965696579658965996609661966296639664966596669667966896699670967196729673967496759676967796789679968096819682968396849685968696879688968996909691969296939694969596969697969896999700970197029703970497059706970797089709971097119712971397149715971697179718971997209721972297239724972597269727972897299730973197329733973497359736973797389739974097419742974397449745974697479748974997509751975297539754975597569757975897599760976197629763976497659766976797689769977097719772977397749775977697779778977997809781978297839784978597869787978897899790979197929793979497959796979797989799980098019802980398049805980698079808980998109811981298139814981598169817981898199820982198229823982498259826982798289829983098319832983398349835983698379838983998409841984298439844984598469847984898499850985198529853985498559856985798589859986098619862986398649865986698679868986998709871987298739874987598769877987898799880988198829883988498859886988798889889989098919892989398949895989698979898989999009901990299039904990599069907990899099910991199129913991499159916991799189919992099219922992399249925992699279928992999309931993299339934993599369937993899399940994199429943994499459946994799489949995099519952995399549955995699579958995999609961996299639964996599669967996899699970997199729973997499759976997799789979998099819982998399849985998699879988998999909991999299939994999599969997999899991000010001100021000310004100051000610007100081000910010100111001210013100141001510016100171001810019100201002110022100231002410025100261002710028100291003010031100321003310034100351003610037100381003910040100411004210043100441004510046100471004810049100501005110052100531005410055100561005710058100591006010061100621006310064100651006610067100681006910070100711007210073100741007510076100771007810079100801008110082100831008410085100861008710088100891009010091100921009310094100951009610097100981009910100101011010210103101041010510106101071010810109101101011110112101131011410115101161011710118101191012010121101221012310124101251012610127101281012910130101311013210133101341013510136101371013810139101401014110142101431014410145101461014710148101491015010151101521015310154101551015610157101581015910160101611016210163101641016510166101671016810169101701017110172101731017410175101761017710178101791018010181101821018310184101851018610187101881018910190101911019210193101941019510196101971019810199102001020110202102031020410205102061020710208102091021010211102121021310214102151021610217102181021910220102211022210223102241022510226102271022810229102301023110232102331023410235102361023710238102391024010241102421024310244102451024610247102481024910250102511025210253102541025510256102571025810259102601026110262102631026410265102661026710268102691027010271102721027310274102751027610277102781027910280102811028210283102841028510286102871028810289102901029110292102931029410295102961029710298102991030010301103021030310304103051030610307103081030910310103111031210313103141031510316103171031810319103201032110322103231032410325103261032710328103291033010331103321033310334103351033610337103381033910340103411034210343103441034510346103471034810349103501035110352103531035410355103561035710358103591036010361103621036310364103651036610367103681036910370103711037210373103741037510376103771037810379103801038110382103831038410385103861038710388103891039010391103921039310394103951039610397103981039910400104011040210403104041040510406104071040810409104101041110412104131041410415104161041710418104191042010421104221042310424104251042610427104281042910430104311043210433104341043510436104371043810439104401044110442104431044410445104461044710448104491045010451104521045310454104551045610457104581045910460104611046210463104641046510466104671046810469104701047110472104731047410475104761047710478104791048010481104821048310484104851048610487104881048910490104911049210493104941049510496104971049810499105001050110502105031050410505105061050710508105091051010511105121051310514105151051610517105181051910520105211052210523105241052510526105271052810529105301053110532105331053410535105361053710538105391054010541105421054310544105451054610547105481054910550105511055210553105541055510556105571055810559105601056110562105631056410565105661056710568105691057010571105721057310574105751057610577105781057910580105811058210583105841058510586105871058810589105901059110592105931059410595105961059710598105991060010601106021060310604106051060610607106081060910610106111061210613106141061510616106171061810619106201062110622106231062410625106261062710628106291063010631106321063310634106351063610637106381063910640106411064210643106441064510646106471064810649106501065110652106531065410655106561065710658106591066010661106621066310664106651066610667106681066910670106711067210673106741067510676106771067810679106801068110682106831068410685106861068710688106891069010691106921069310694106951069610697106981069910700107011070210703107041070510706107071070810709107101071110712107131071410715107161071710718107191072010721107221072310724107251072610727107281072910730107311073210733107341073510736107371073810739107401074110742107431074410745107461074710748107491075010751107521075310754107551075610757107581075910760107611076210763107641076510766107671076810769107701077110772107731077410775107761077710778107791078010781107821078310784107851078610787107881078910790107911079210793107941079510796107971079810799108001080110802108031080410805108061080710808108091081010811108121081310814108151081610817108181081910820108211082210823108241082510826108271082810829108301083110832108331083410835108361083710838108391084010841108421084310844108451084610847108481084910850108511085210853108541085510856108571085810859108601086110862108631086410865108661086710868108691087010871108721087310874108751087610877108781087910880108811088210883108841088510886108871088810889108901089110892108931089410895108961089710898108991090010901109021090310904109051090610907109081090910910109111091210913109141091510916109171091810919109201092110922109231092410925109261092710928109291093010931109321093310934109351093610937109381093910940109411094210943109441094510946109471094810949109501095110952109531095410955109561095710958109591096010961109621096310964109651096610967109681096910970109711097210973109741097510976109771097810979109801098110982109831098410985109861098710988109891099010991109921099310994109951099610997109981099911000110011100211003110041100511006110071100811009110101101111012110131101411015110161101711018110191102011021110221102311024110251102611027110281102911030110311103211033110341103511036110371103811039110401104111042110431104411045110461104711048110491105011051110521105311054110551105611057110581105911060110611106211063110641106511066110671106811069110701107111072110731107411075110761107711078110791108011081110821108311084110851108611087110881108911090110911109211093110941109511096110971109811099111001110111102111031110411105111061110711108111091111011111111121111311114111151111611117111181111911120111211112211123111241112511126111271112811129111301113111132111331113411135111361113711138111391114011141111421114311144111451114611147111481114911150111511115211153111541115511156111571115811159111601116111162111631116411165111661116711168111691117011171111721117311174111751117611177111781117911180111811118211183111841118511186111871118811189111901119111192111931119411195111961119711198111991120011201112021120311204112051120611207112081120911210112111121211213112141121511216112171121811219112201122111222112231122411225112261122711228112291123011231112321123311234112351123611237112381123911240112411124211243112441124511246112471124811249112501125111252112531125411255112561125711258112591126011261112621126311264112651126611267112681126911270112711127211273112741127511276112771127811279112801128111282112831128411285112861128711288112891129011291112921129311294112951129611297112981129911300113011130211303113041130511306113071130811309113101131111312113131131411315113161131711318113191132011321113221132311324113251132611327113281132911330113311133211333113341133511336113371133811339113401134111342113431134411345113461134711348113491135011351113521135311354113551135611357113581135911360113611136211363113641136511366113671136811369113701137111372113731137411375113761137711378113791138011381113821138311384113851138611387113881138911390113911139211393113941139511396113971139811399114001140111402114031140411405114061140711408114091141011411114121141311414114151141611417114181141911420114211142211423114241142511426114271142811429114301143111432114331143411435114361143711438114391144011441114421144311444114451144611447114481144911450114511145211453114541145511456114571145811459114601146111462114631146411465114661146711468114691147011471114721147311474114751147611477114781147911480114811148211483114841148511486114871148811489114901149111492114931149411495114961149711498114991150011501115021150311504115051150611507115081150911510115111151211513115141151511516115171151811519115201152111522115231152411525115261152711528115291153011531115321153311534115351153611537115381153911540115411154211543115441154511546115471154811549115501155111552115531155411555115561155711558115591156011561115621156311564115651156611567115681156911570115711157211573115741157511576115771157811579115801158111582115831158411585115861158711588115891159011591115921159311594115951159611597115981159911600116011160211603116041160511606116071160811609116101161111612116131161411615116161161711618116191162011621116221162311624116251162611627116281162911630116311163211633116341163511636116371163811639116401164111642116431164411645116461164711648116491165011651116521165311654116551165611657116581165911660116611166211663116641166511666116671166811669116701167111672116731167411675116761167711678116791168011681116821168311684116851168611687116881168911690116911169211693116941169511696116971169811699117001170111702117031170411705117061170711708117091171011711117121171311714117151171611717117181171911720117211172211723117241172511726117271172811729117301173111732117331173411735117361173711738117391174011741117421174311744117451174611747117481174911750117511175211753117541175511756117571175811759117601176111762117631176411765117661176711768117691177011771117721177311774117751177611777117781177911780117811178211783117841178511786117871178811789117901179111792117931179411795117961179711798117991180011801118021180311804118051180611807118081180911810118111181211813118141181511816118171181811819118201182111822118231182411825118261182711828118291183011831118321183311834118351183611837118381183911840118411184211843118441184511846118471184811849118501185111852118531185411855118561185711858118591186011861118621186311864118651186611867118681186911870118711187211873118741187511876118771187811879118801188111882118831188411885118861188711888118891189011891118921189311894118951189611897118981189911900119011190211903119041190511906119071190811909119101191111912119131191411915119161191711918119191192011921119221192311924119251192611927119281192911930119311193211933119341193511936119371193811939119401194111942119431194411945119461194711948119491195011951119521195311954119551195611957119581195911960119611196211963119641196511966119671196811969119701197111972119731197411975119761197711978119791198011981119821198311984119851198611987119881198911990119911199211993119941199511996119971199811999120001200112002120031200412005120061200712008120091201012011120121201312014120151201612017120181201912020120211202212023120241202512026120271202812029120301203112032120331203412035120361203712038120391204012041120421204312044120451204612047120481204912050120511205212053120541205512056120571205812059120601206112062120631206412065120661206712068120691207012071120721207312074120751207612077120781207912080120811208212083120841208512086120871208812089120901209112092120931209412095120961209712098120991210012101121021210312104121051210612107121081210912110121111211212113121141211512116121171211812119121201212112122121231212412125121261212712128121291213012131121321213312134121351213612137121381213912140121411214212143121441214512146121471214812149121501215112152121531215412155121561215712158121591216012161121621216312164121651216612167121681216912170121711217212173121741217512176121771217812179121801218112182121831218412185121861218712188121891219012191121921219312194121951219612197121981219912200122011220212203122041220512206122071220812209122101221112212122131221412215122161221712218122191222012221122221222312224122251222612227122281222912230122311223212233122341223512236122371223812239122401224112242122431224412245122461224712248122491225012251122521225312254122551225612257122581225912260122611226212263122641226512266122671226812269122701227112272122731227412275122761227712278122791228012281122821228312284122851228612287122881228912290122911229212293122941229512296122971229812299123001230112302123031230412305123061230712308123091231012311123121231312314123151231612317123181231912320123211232212323123241232512326123271232812329123301233112332123331233412335123361233712338123391234012341123421234312344123451234612347123481234912350123511235212353123541235512356123571235812359123601236112362123631236412365123661236712368123691237012371123721237312374123751237612377123781237912380123811238212383123841238512386123871238812389123901239112392123931239412395123961239712398123991240012401124021240312404124051240612407124081240912410124111241212413124141241512416124171241812419124201242112422124231242412425124261242712428124291243012431124321243312434124351243612437124381243912440124411244212443124441244512446124471244812449124501245112452124531245412455124561245712458124591246012461124621246312464124651246612467124681246912470124711247212473124741247512476124771247812479124801248112482124831248412485124861248712488124891249012491124921249312494124951249612497124981249912500125011250212503125041250512506125071250812509125101251112512125131251412515125161251712518125191252012521125221252312524125251252612527125281252912530125311253212533125341253512536125371253812539125401254112542125431254412545125461254712548125491255012551125521255312554125551255612557125581255912560125611256212563125641256512566125671256812569125701257112572125731257412575125761257712578125791258012581125821258312584125851258612587125881258912590125911259212593125941259512596125971259812599126001260112602126031260412605126061260712608126091261012611126121261312614126151261612617126181261912620126211262212623126241262512626126271262812629126301263112632126331263412635126361263712638126391264012641126421264312644126451264612647126481264912650126511265212653126541265512656126571265812659126601266112662126631266412665126661266712668126691267012671126721267312674126751267612677126781267912680126811268212683126841268512686126871268812689126901269112692126931269412695126961269712698126991270012701127021270312704127051270612707127081270912710127111271212713127141271512716127171271812719127201272112722127231272412725127261272712728127291273012731127321273312734127351273612737127381273912740127411274212743127441274512746127471274812749127501275112752127531275412755127561275712758127591276012761127621276312764127651276612767127681276912770127711277212773127741277512776127771277812779127801278112782127831278412785127861278712788127891279012791127921279312794127951279612797127981279912800128011280212803128041280512806128071280812809128101281112812128131281412815128161281712818128191282012821128221282312824128251282612827128281282912830128311283212833128341283512836128371283812839128401284112842128431284412845128461284712848128491285012851128521285312854128551285612857128581285912860128611286212863128641286512866128671286812869128701287112872128731287412875128761287712878128791288012881128821288312884128851288612887128881288912890128911289212893128941289512896128971289812899129001290112902129031290412905129061290712908129091291012911129121291312914129151291612917129181291912920129211292212923129241292512926129271292812929129301293112932129331293412935129361293712938129391294012941129421294312944129451294612947129481294912950129511295212953129541295512956129571295812959129601296112962129631296412965129661296712968129691297012971129721297312974129751297612977129781297912980129811298212983129841298512986129871298812989
  1. /* x509.c
  2. *
  3. * Copyright (C) 2006-2022 wolfSSL Inc.
  4. *
  5. * This file is part of wolfSSL.
  6. *
  7. * wolfSSL is free software; you can redistribute it and/or modify
  8. * it under the terms of the GNU General Public License as published by
  9. * the Free Software Foundation; either version 2 of the License, or
  10. * (at your option) any later version.
  11. *
  12. * wolfSSL is distributed in the hope that it will be useful,
  13. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  15. * GNU General Public License for more details.
  16. *
  17. * You should have received a copy of the GNU General Public License
  18. * along with this program; if not, write to the Free Software
  19. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
  20. */
  21. #ifdef HAVE_CONFIG_H
  22. #include <config.h>
  23. #endif
  24. #include <wolfssl/wolfcrypt/settings.h>
  25. #if !defined(WOLFSSL_X509_INCLUDED)
  26. #ifndef WOLFSSL_IGNORE_FILE_WARN
  27. #warning x509.c does not need to be compiled separately from ssl.c
  28. #endif
  29. #else
  30. #ifndef WOLFCRYPT_ONLY
  31. #ifndef NO_CERTS
  32. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  33. #include <wolfssl/openssl/x509v3.h>
  34. #endif
  35. #if defined(OPENSSL_ALL)
  36. unsigned int wolfSSL_X509_get_extension_flags(WOLFSSL_X509* x509)
  37. {
  38. unsigned int flags = 0;
  39. WOLFSSL_ENTER("wolfSSL_X509_get_extension_flags");
  40. if (x509 != NULL) {
  41. if (x509->keyUsageSet) {
  42. flags |= EXFLAG_KUSAGE;
  43. }
  44. if (x509->extKeyUsageSrc != NULL) {
  45. flags |= EXFLAG_XKUSAGE;
  46. }
  47. }
  48. WOLFSSL_LEAVE("wolfSSL_X509_get_extension_flags", flags);
  49. return flags;
  50. }
  51. unsigned int wolfSSL_X509_get_key_usage(WOLFSSL_X509* x509)
  52. {
  53. unsigned int ret = 0;
  54. WOLFSSL_ENTER("wolfSSL_X509_get_key_usage");
  55. if (x509 == NULL) {
  56. WOLFSSL_MSG("x509 is NULL");
  57. }
  58. else {
  59. if (x509->keyUsageSet) {
  60. ret = wolfSSL_X509_get_keyUsage(x509);
  61. }
  62. else {
  63. ret = (unsigned int)-1;
  64. }
  65. }
  66. WOLFSSL_LEAVE("wolfSSL_X509_get_key_usage", ret);
  67. return ret;
  68. }
  69. unsigned int wolfSSL_X509_get_extended_key_usage(WOLFSSL_X509* x509)
  70. {
  71. int ret = 0;
  72. WOLFSSL_ENTER("wolfSSL_X509_get_extended_key_usage");
  73. if (x509 != NULL) {
  74. if (x509->extKeyUsage & EXTKEYUSE_OCSP_SIGN)
  75. ret |= XKU_OCSP_SIGN;
  76. if (x509->extKeyUsage & EXTKEYUSE_TIMESTAMP)
  77. ret |= XKU_TIMESTAMP;
  78. if (x509->extKeyUsage & EXTKEYUSE_EMAILPROT)
  79. ret |= XKU_SMIME;
  80. if (x509->extKeyUsage & EXTKEYUSE_CODESIGN)
  81. ret |= XKU_CODE_SIGN;
  82. if (x509->extKeyUsage & EXTKEYUSE_CLIENT_AUTH)
  83. ret |= XKU_SSL_CLIENT;
  84. if (x509->extKeyUsage & EXTKEYUSE_SERVER_AUTH)
  85. ret |= XKU_SSL_SERVER;
  86. if (x509->extKeyUsage & EXTKEYUSE_ANY)
  87. ret |= XKU_ANYEKU;
  88. }
  89. WOLFSSL_LEAVE("wolfSSL_X509_get_extended_key_usage", ret);
  90. return (unsigned int)ret;
  91. }
  92. /* Returns the number of X509V3 extensions in X509 object, or 0 on failure */
  93. int wolfSSL_X509_get_ext_count(const WOLFSSL_X509* passedCert)
  94. {
  95. int extCount = 0;
  96. int length = 0;
  97. int outSz = 0;
  98. const byte* rawCert;
  99. int sz = 0;
  100. word32 idx = 0;
  101. DecodedCert cert;
  102. const byte* input;
  103. WOLFSSL_ENTER("wolfSSL_X509_get_ext_count()");
  104. if (passedCert == NULL) {
  105. WOLFSSL_MSG("\tNot passed a certificate");
  106. return WOLFSSL_FAILURE;
  107. }
  108. rawCert = wolfSSL_X509_get_der((WOLFSSL_X509*)passedCert, &outSz);
  109. if (rawCert == NULL) {
  110. WOLFSSL_MSG("\tpassedCert has no internal DerBuffer set.");
  111. return WOLFSSL_FAILURE;
  112. }
  113. InitDecodedCert(&cert, rawCert, (word32)outSz, 0);
  114. if (ParseCert(&cert,
  115. #ifdef WOLFSSL_CERT_REQ
  116. passedCert->isCSR ? CERTREQ_TYPE :
  117. #endif
  118. CA_TYPE,
  119. NO_VERIFY, NULL) < 0) {
  120. WOLFSSL_MSG("\tCertificate parsing failed");
  121. FreeDecodedCert(&cert);
  122. return WOLFSSL_FAILURE;
  123. }
  124. input = cert.extensions;
  125. sz = cert.extensionsSz;
  126. if (input == NULL || sz == 0) {
  127. WOLFSSL_MSG("\tsz or input NULL error");
  128. FreeDecodedCert(&cert);
  129. return WOLFSSL_FAILURE;
  130. }
  131. #ifdef WOLFSSL_CERT_REQ
  132. if (!passedCert->isCSR)
  133. #endif
  134. {
  135. if (input[idx++] != ASN_EXTENSIONS) {
  136. WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
  137. FreeDecodedCert(&cert);
  138. return WOLFSSL_FAILURE;
  139. }
  140. if (GetLength(input, &idx, &length, sz) < 0) {
  141. WOLFSSL_MSG("\tfail: invalid length");
  142. FreeDecodedCert(&cert);
  143. return WOLFSSL_FAILURE;
  144. }
  145. }
  146. if (GetSequence(input, &idx, &length, sz) < 0) {
  147. WOLFSSL_MSG("\tfail: should be a SEQUENCE (1)");
  148. FreeDecodedCert(&cert);
  149. return WOLFSSL_FAILURE;
  150. }
  151. while (idx < (word32)sz) {
  152. if (GetSequence(input, &idx, &length, sz) < 0) {
  153. WOLFSSL_MSG("\tfail: should be a SEQUENCE");
  154. FreeDecodedCert(&cert);
  155. return WOLFSSL_FAILURE;
  156. }
  157. idx += length;
  158. extCount++;
  159. }
  160. FreeDecodedCert(&cert);
  161. return extCount;
  162. }
  163. /* Creates and returns pointer to a new X509_EXTENSION object in memory */
  164. WOLFSSL_X509_EXTENSION* wolfSSL_X509_EXTENSION_new(void)
  165. {
  166. WOLFSSL_X509_EXTENSION* newExt;
  167. WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_new");
  168. newExt = (WOLFSSL_X509_EXTENSION*)XMALLOC(sizeof(WOLFSSL_X509_EXTENSION),
  169. NULL, DYNAMIC_TYPE_X509_EXT);
  170. if (newExt == NULL)
  171. return NULL;
  172. XMEMSET(newExt, 0, sizeof(WOLFSSL_X509_EXTENSION));
  173. return newExt;
  174. }
  175. void wolfSSL_X509_EXTENSION_free(WOLFSSL_X509_EXTENSION* x)
  176. {
  177. WOLFSSL_ASN1_STRING asn1;
  178. WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_free");
  179. if (x == NULL)
  180. return;
  181. if (x->obj != NULL)
  182. wolfSSL_ASN1_OBJECT_free(x->obj);
  183. asn1 = x->value;
  184. if (asn1.length > 0 && asn1.data != NULL && asn1.isDynamic)
  185. XFREE(asn1.data, NULL, DYNAMIC_TYPE_OPENSSL);
  186. wolfSSL_sk_pop_free(x->ext_sk, NULL);
  187. XFREE(x, NULL, DYNAMIC_TYPE_X509_EXT);
  188. }
  189. WOLFSSL_X509_EXTENSION* wolfSSL_X509_EXTENSION_dup(WOLFSSL_X509_EXTENSION* src)
  190. {
  191. WOLFSSL_X509_EXTENSION* ret = NULL;
  192. int err = 0;
  193. WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_dup");
  194. if (src == NULL) {
  195. err = 1;
  196. }
  197. if (err == 0) {
  198. ret = wolfSSL_X509_EXTENSION_new();
  199. if (ret == NULL) {
  200. err = 1;
  201. }
  202. }
  203. if (err == 0 && src->obj != NULL) {
  204. ret->obj = wolfSSL_ASN1_OBJECT_dup(src->obj);
  205. if (ret->obj == NULL) {
  206. err = 1;
  207. }
  208. }
  209. if (err == 0) {
  210. ret->crit = src->crit;
  211. if (wolfSSL_ASN1_STRING_copy(&ret->value, &src->value) !=
  212. WOLFSSL_SUCCESS) {
  213. err = 1;
  214. }
  215. }
  216. if (err == 1 && ret != NULL) {
  217. wolfSSL_X509_EXTENSION_free(ret);
  218. ret = NULL;
  219. }
  220. return ret;
  221. }
  222. /* Creates and returns a new WOLFSSL_X509_EXTENSION stack. */
  223. WOLFSSL_STACK* wolfSSL_sk_new_x509_ext(void)
  224. {
  225. WOLFSSL_STACK* sk;
  226. WOLFSSL_ENTER("wolfSSL_sk_new_x509_ext");
  227. sk = wolfSSL_sk_new_null();
  228. if (sk) {
  229. sk->type = STACK_TYPE_X509_EXT;
  230. }
  231. return sk;
  232. }
  233. /* return 1 on success 0 on fail */
  234. int wolfSSL_sk_X509_EXTENSION_push(WOLFSSL_STACK* sk,WOLFSSL_X509_EXTENSION* ext)
  235. {
  236. WOLFSSL_STACK* node;
  237. WOLFSSL_ENTER("wolfSSL_sk_X509_EXTENSION_push");
  238. if (sk == NULL || ext == NULL) {
  239. return WOLFSSL_FAILURE;
  240. }
  241. /* no previous values in stack */
  242. if (sk->data.ext == NULL) {
  243. sk->data.ext = ext;
  244. sk->num += 1;
  245. return WOLFSSL_SUCCESS;
  246. }
  247. /* stack already has value(s) create a new node and add more */
  248. node = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK), NULL,
  249. DYNAMIC_TYPE_X509);
  250. if (node == NULL) {
  251. WOLFSSL_MSG("Memory error");
  252. return WOLFSSL_FAILURE;
  253. }
  254. XMEMSET(node, 0, sizeof(WOLFSSL_STACK));
  255. /* push new obj onto head of stack */
  256. node->data.ext = sk->data.ext;
  257. node->next = sk->next;
  258. node->type = sk->type;
  259. sk->next = node;
  260. sk->data.ext = ext;
  261. sk->num += 1;
  262. return WOLFSSL_SUCCESS;
  263. }
  264. /* Free the structure for X509_EXTENSION stack
  265. *
  266. * sk stack to free nodes in
  267. */
  268. void wolfSSL_sk_X509_EXTENSION_free(WOLFSSL_STACK* sk)
  269. {
  270. WOLFSSL_STACK* node;
  271. WOLFSSL_ENTER("wolfSSL_sk_X509_EXTENSION_free");
  272. if (sk == NULL) {
  273. return;
  274. }
  275. /* parse through stack freeing each node */
  276. node = sk->next;
  277. while ((node != NULL) && (sk->num > 1)) {
  278. WOLFSSL_STACK* tmp = node;
  279. node = node->next;
  280. wolfSSL_X509_EXTENSION_free(tmp->data.ext);
  281. XFREE(tmp, NULL, DYNAMIC_TYPE_X509);
  282. sk->num -= 1;
  283. }
  284. /* free head of stack */
  285. if (sk->num == 1) {
  286. wolfSSL_X509_EXTENSION_free(sk->data.ext);
  287. }
  288. XFREE(sk, NULL, DYNAMIC_TYPE_X509);
  289. }
  290. static WOLFSSL_STACK* generateExtStack(const WOLFSSL_X509 *x)
  291. {
  292. int numOfExt, i;
  293. WOLFSSL_X509 *x509 = (WOLFSSL_X509*)x;
  294. WOLFSSL_STACK* ret;
  295. WOLFSSL_STACK* tmp;
  296. if (!x509) {
  297. WOLFSSL_MSG("Bad parameter");
  298. return NULL;
  299. }
  300. /* Save x509->ext_sk */
  301. tmp = x509->ext_sk;
  302. x509->ext_sk = NULL;
  303. numOfExt = wolfSSL_X509_get_ext_count(x509);
  304. for (i = 0; i < numOfExt; i++) {
  305. /* Build the extension stack */
  306. (void)wolfSSL_X509_set_ext(x509, i);
  307. }
  308. /* Restore */
  309. ret = x509->ext_sk;
  310. x509->ext_sk = tmp;
  311. return ret;
  312. }
  313. /**
  314. * @param x Certificate to extract extensions from
  315. * @return STACK_OF(X509_EXTENSION)*
  316. */
  317. const WOLFSSL_STACK *wolfSSL_X509_get0_extensions(const WOLFSSL_X509 *x)
  318. {
  319. int numOfExt;
  320. WOLFSSL_X509 *x509 = (WOLFSSL_X509*)x;
  321. WOLFSSL_ENTER("wolfSSL_X509_get0_extensions");
  322. if (!x509) {
  323. WOLFSSL_MSG("Bad parameter");
  324. return NULL;
  325. }
  326. numOfExt = wolfSSL_X509_get_ext_count(x509);
  327. if (numOfExt != wolfSSL_sk_num(x509->ext_sk_full)) {
  328. wolfSSL_sk_pop_free(x509->ext_sk_full, NULL);
  329. x509->ext_sk_full = generateExtStack(x);
  330. }
  331. return x509->ext_sk_full;
  332. }
  333. /**
  334. * Caller is responsible for freeing the returned stack.
  335. */
  336. const WOLFSSL_STACK *wolfSSL_X509_REQ_get_extensions(const WOLFSSL_X509 *x)
  337. {
  338. return generateExtStack(x);
  339. }
  340. /* Gets the X509_EXTENSION* ext based on it's location in WOLFSSL_X509* x509.
  341. *
  342. * x509 : The X509 structure to look for the extension.
  343. * loc : Location of the extension. If the extension is found at the given
  344. * location, a new X509_EXTENSION structure is populated with extension-specific
  345. * data based on the extension type.
  346. * Returns NULL on error or pointer to X509_EXTENSION structure containing the
  347. * extension. The returned X509_EXTENSION should not be free'd by caller.
  348. * The returned X509_EXTENSION is pushed onto a stack inside the x509 argument.
  349. * This is later free'd when x509 is free'd.
  350. *
  351. * NOTE: for unknown extension NIDs, a X509_EXTENSION is populated with the
  352. * extension oid as the ASN1_OBJECT (QT compatibility)
  353. */
  354. WOLFSSL_X509_EXTENSION* wolfSSL_X509_get_ext(const WOLFSSL_X509* x509, int loc)
  355. {
  356. WOLFSSL_X509_EXTENSION* ext = NULL;
  357. WOLFSSL_ENTER("wolfSSL_X509_get_ext");
  358. if (x509 == NULL)
  359. return NULL;
  360. ext = wolfSSL_X509_set_ext((WOLFSSL_X509*) x509, loc);
  361. return ext;
  362. }
  363. int wolfSSL_X509_get_ext_by_OBJ(const WOLFSSL_X509 *x,
  364. const WOLFSSL_ASN1_OBJECT *obj, int lastpos)
  365. {
  366. const WOLF_STACK_OF(WOLFSSL_X509_EXTENSION) *sk;
  367. if (!x || !obj) {
  368. WOLFSSL_MSG("Bad parameter");
  369. return -1;
  370. }
  371. sk = wolfSSL_X509_get0_extensions(x);
  372. if (!sk) {
  373. WOLFSSL_MSG("No extensions");
  374. return -1;
  375. }
  376. lastpos++;
  377. if (lastpos < 0)
  378. lastpos = 0;
  379. for (; lastpos < wolfSSL_sk_num(sk); lastpos++)
  380. if (wolfSSL_OBJ_cmp((WOLFSSL_ASN1_OBJECT*)wolfSSL_sk_value(sk,
  381. lastpos), obj) == 0)
  382. return lastpos;
  383. return -1;
  384. }
  385. /* Pushes a new X509_EXTENSION* ext onto the stack inside WOLFSSL_X509* x509.
  386. * This is currently a helper function for wolfSSL_X509_get_ext
  387. * Caller does not free the returned WOLFSSL_X509_EXTENSION*
  388. */
  389. WOLFSSL_X509_EXTENSION* wolfSSL_X509_set_ext(WOLFSSL_X509* x509, int loc)
  390. {
  391. int extCount = 0, length = 0, outSz = 0, sz = 0, ret = 0;
  392. int objSz = 0, isSet = 0;
  393. const byte* rawCert;
  394. const byte* input;
  395. byte* oidBuf;
  396. word32 oid, idx = 0, tmpIdx = 0, nid;
  397. WOLFSSL_X509_EXTENSION* ext = NULL;
  398. WOLFSSL_ASN1_INTEGER* a;
  399. WOLFSSL_STACK* sk;
  400. #ifdef WOLFSSL_SMALL_STACK
  401. DecodedCert* cert = NULL;
  402. #else
  403. DecodedCert cert[1];
  404. #endif
  405. WOLFSSL_ENTER("wolfSSL_X509_set_ext");
  406. if(x509 == NULL){
  407. WOLFSSL_MSG("\tNot passed a certificate");
  408. return NULL;
  409. }
  410. if(loc <0 || (loc > wolfSSL_X509_get_ext_count(x509))){
  411. WOLFSSL_MSG("\tBad location argument");
  412. return NULL;
  413. }
  414. ext = wolfSSL_X509_EXTENSION_new();
  415. if (ext == NULL) {
  416. WOLFSSL_MSG("\tX509_EXTENSION_new() failed");
  417. return NULL;
  418. }
  419. rawCert = wolfSSL_X509_get_der((WOLFSSL_X509*)x509, &outSz);
  420. if (rawCert == NULL) {
  421. WOLFSSL_MSG("\tX509_get_der() failed");
  422. wolfSSL_X509_EXTENSION_free(ext);
  423. return NULL;
  424. }
  425. #ifdef WOLFSSL_SMALL_STACK
  426. cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL, DYNAMIC_TYPE_DCERT);
  427. if (cert == NULL) {
  428. WOLFSSL_MSG("Failed to allocate memory for DecodedCert");
  429. wolfSSL_X509_EXTENSION_free(ext);
  430. return NULL;
  431. }
  432. #endif
  433. InitDecodedCert(cert, rawCert, (word32)outSz, 0);
  434. if (ParseCert(cert,
  435. #ifdef WOLFSSL_CERT_REQ
  436. x509->isCSR ? CERTREQ_TYPE :
  437. #endif
  438. CA_TYPE,
  439. NO_VERIFY, NULL) < 0) {
  440. WOLFSSL_MSG("\tCertificate parsing failed");
  441. wolfSSL_X509_EXTENSION_free(ext);
  442. FreeDecodedCert(cert);
  443. #ifdef WOLFSSL_SMALL_STACK
  444. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  445. #endif
  446. return NULL;
  447. }
  448. input = cert->extensions;
  449. sz = cert->extensionsSz;
  450. if (input == NULL || sz == 0) {
  451. WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
  452. wolfSSL_X509_EXTENSION_free(ext);
  453. FreeDecodedCert(cert);
  454. #ifdef WOLFSSL_SMALL_STACK
  455. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  456. #endif
  457. return NULL;
  458. }
  459. #ifdef WOLFSSL_CERT_REQ
  460. if (!x509->isCSR)
  461. #endif
  462. {
  463. if (input[idx++] != ASN_EXTENSIONS) {
  464. WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
  465. wolfSSL_X509_EXTENSION_free(ext);
  466. FreeDecodedCert(cert);
  467. #ifdef WOLFSSL_SMALL_STACK
  468. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  469. #endif
  470. return NULL;
  471. }
  472. if (GetLength(input, &idx, &length, sz) < 0) {
  473. WOLFSSL_MSG("\tfail: invalid length");
  474. wolfSSL_X509_EXTENSION_free(ext);
  475. FreeDecodedCert(cert);
  476. #ifdef WOLFSSL_SMALL_STACK
  477. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  478. #endif
  479. return NULL;
  480. }
  481. }
  482. if (GetSequence(input, &idx, &length, sz) < 0) {
  483. WOLFSSL_MSG("\tfail: should be a SEQUENCE (1)");
  484. wolfSSL_X509_EXTENSION_free(ext);
  485. FreeDecodedCert(cert);
  486. #ifdef WOLFSSL_SMALL_STACK
  487. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  488. #endif
  489. return NULL;
  490. }
  491. while (idx < (word32)sz) {
  492. oid = 0;
  493. if (GetSequence(input, &idx, &length, sz) < 0) {
  494. WOLFSSL_MSG("\tfail: should be a SEQUENCE");
  495. wolfSSL_X509_EXTENSION_free(ext);
  496. FreeDecodedCert(cert);
  497. #ifdef WOLFSSL_SMALL_STACK
  498. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  499. #endif
  500. return NULL;
  501. }
  502. tmpIdx = idx;
  503. ret = GetObjectId(input, &idx, &oid, oidCertExtType, sz);
  504. if (ret < 0) {
  505. WOLFSSL_MSG("\tfail: OBJECT ID");
  506. wolfSSL_X509_EXTENSION_free(ext);
  507. FreeDecodedCert(cert);
  508. #ifdef WOLFSSL_SMALL_STACK
  509. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  510. #endif
  511. return NULL;
  512. }
  513. idx = tmpIdx;
  514. nid = (word32)oid2nid(oid, oidCertExtType);
  515. /* Continue while loop until extCount == loc or idx > sz */
  516. if (extCount != loc) {
  517. idx += length;
  518. extCount++;
  519. continue;
  520. }
  521. /* extCount == loc. Now get the extension. */
  522. /* Check if extension has been set */
  523. isSet = wolfSSL_X509_ext_isSet_by_NID((WOLFSSL_X509*)x509, nid);
  524. ext->obj = wolfSSL_OBJ_nid2obj(nid);
  525. if (ext->obj == NULL) {
  526. WOLFSSL_MSG("\tfail: Invalid OBJECT");
  527. wolfSSL_X509_EXTENSION_free(ext);
  528. FreeDecodedCert(cert);
  529. #ifdef WOLFSSL_SMALL_STACK
  530. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  531. #endif
  532. return NULL;
  533. }
  534. ext->obj->nid = nid;
  535. switch (oid) {
  536. case BASIC_CA_OID:
  537. if (!isSet)
  538. break;
  539. /* Set pathlength */
  540. a = wolfSSL_ASN1_INTEGER_new();
  541. if (a == NULL) {
  542. wolfSSL_X509_EXTENSION_free(ext);
  543. FreeDecodedCert(cert);
  544. #ifdef WOLFSSL_SMALL_STACK
  545. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  546. #endif
  547. return NULL;
  548. }
  549. a->length = x509->pathLength;
  550. /* Save ASN1_INTEGER in x509 extension */
  551. ext->obj->pathlen = a;
  552. ext->obj->ca = x509->isCa;
  553. ext->crit = x509->basicConstCrit;
  554. break;
  555. case AUTH_INFO_OID:
  556. if (!isSet)
  557. break;
  558. /* Create a stack to hold both the caIssuer and ocsp objects
  559. in X509_EXTENSION structure */
  560. sk = wolfSSL_sk_new_asn1_obj();
  561. if (sk == NULL) {
  562. WOLFSSL_MSG("Failed to malloc stack");
  563. wolfSSL_X509_EXTENSION_free(ext);
  564. FreeDecodedCert(cert);
  565. #ifdef WOLFSSL_SMALL_STACK
  566. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  567. #endif
  568. return NULL;
  569. }
  570. /* Add CaIssuers object to stack */
  571. if (x509->authInfoCaIssuer != NULL &&
  572. x509->authInfoCaIssuerSz > 0)
  573. {
  574. WOLFSSL_ASN1_OBJECT* obj;
  575. obj = wolfSSL_ASN1_OBJECT_new();
  576. if (obj == NULL) {
  577. WOLFSSL_MSG("Error creating ASN1 object");
  578. wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
  579. wolfSSL_X509_EXTENSION_free(ext);
  580. FreeDecodedCert(cert);
  581. #ifdef WOLFSSL_SMALL_STACK
  582. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  583. #endif
  584. return NULL;
  585. }
  586. obj->obj = (byte*)x509->authInfoCaIssuer;
  587. obj->objSz = x509->authInfoCaIssuerSz;
  588. obj->grp = oidCertAuthInfoType;
  589. obj->nid = NID_ad_ca_issuers;
  590. ret = wolfSSL_sk_ASN1_OBJECT_push(sk, obj);
  591. if (ret != WOLFSSL_SUCCESS) {
  592. WOLFSSL_MSG("Error pushing ASN1 object onto stack");
  593. wolfSSL_ASN1_OBJECT_free(obj);
  594. wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
  595. wolfSSL_X509_EXTENSION_free(ext);
  596. FreeDecodedCert(cert);
  597. #ifdef WOLFSSL_SMALL_STACK
  598. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  599. #endif
  600. return NULL;
  601. }
  602. }
  603. /* Add OCSP object to stack */
  604. if (x509->authInfo != NULL &&
  605. x509->authInfoSz > 0)
  606. {
  607. WOLFSSL_ASN1_OBJECT* obj;
  608. obj = wolfSSL_ASN1_OBJECT_new();
  609. if (obj == NULL) {
  610. WOLFSSL_MSG("Error creating ASN1 object");
  611. wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
  612. wolfSSL_X509_EXTENSION_free(ext);
  613. FreeDecodedCert(cert);
  614. #ifdef WOLFSSL_SMALL_STACK
  615. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  616. #endif
  617. return NULL;
  618. }
  619. obj->obj = x509->authInfo;
  620. obj->objSz = x509->authInfoSz;
  621. obj->grp = oidCertAuthInfoType;
  622. obj->nid = NID_ad_OCSP;
  623. ret = wolfSSL_sk_ASN1_OBJECT_push(sk, obj);
  624. if (ret != WOLFSSL_SUCCESS) {
  625. WOLFSSL_MSG("Error pushing ASN1 object onto stack");
  626. wolfSSL_ASN1_OBJECT_free(obj);
  627. wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
  628. wolfSSL_X509_EXTENSION_free(ext);
  629. FreeDecodedCert(cert);
  630. #ifdef WOLFSSL_SMALL_STACK
  631. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  632. #endif
  633. return NULL;
  634. }
  635. }
  636. ext->ext_sk = sk;
  637. ext->crit = x509->authInfoCrit;
  638. break;
  639. case AUTH_KEY_OID:
  640. if (!isSet)
  641. break;
  642. ret = wolfSSL_ASN1_STRING_set(&ext->value, x509->authKeyId,
  643. x509->authKeyIdSz);
  644. if (ret != WOLFSSL_SUCCESS) {
  645. WOLFSSL_MSG("ASN1_STRING_set() failed");
  646. wolfSSL_X509_EXTENSION_free(ext);
  647. FreeDecodedCert(cert);
  648. #ifdef WOLFSSL_SMALL_STACK
  649. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  650. #endif
  651. return NULL;
  652. }
  653. ext->crit = x509->authKeyIdCrit;
  654. break;
  655. case SUBJ_KEY_OID:
  656. if (!isSet)
  657. break;
  658. ret = wolfSSL_ASN1_STRING_set(&ext->value, x509->subjKeyId,
  659. x509->subjKeyIdSz);
  660. if (ret != WOLFSSL_SUCCESS) {
  661. WOLFSSL_MSG("ASN1_STRING_set() failed");
  662. wolfSSL_X509_EXTENSION_free(ext);
  663. FreeDecodedCert(cert);
  664. #ifdef WOLFSSL_SMALL_STACK
  665. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  666. #endif
  667. return NULL;
  668. }
  669. ext->crit = x509->subjKeyIdCrit;
  670. break;
  671. case CERT_POLICY_OID:
  672. if (!isSet)
  673. break;
  674. ext->crit = x509->certPolicyCrit;
  675. break;
  676. case KEY_USAGE_OID:
  677. if (!isSet)
  678. break;
  679. ret = wolfSSL_ASN1_STRING_set(&ext->value,
  680. (byte*)&(x509->keyUsage), sizeof(word16));
  681. if (ret != WOLFSSL_SUCCESS) {
  682. WOLFSSL_MSG("ASN1_STRING_set() failed");
  683. wolfSSL_X509_EXTENSION_free(ext);
  684. FreeDecodedCert(cert);
  685. #ifdef WOLFSSL_SMALL_STACK
  686. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  687. #endif
  688. return NULL;
  689. }
  690. ext->crit = x509->keyUsageCrit;
  691. break;
  692. case EXT_KEY_USAGE_OID:
  693. if (!isSet)
  694. break;
  695. ret = wolfSSL_ASN1_STRING_set(&ext->value, x509->extKeyUsageSrc,
  696. x509->extKeyUsageSz);
  697. if (ret != WOLFSSL_SUCCESS) {
  698. WOLFSSL_MSG("ASN1_STRING_set() failed");
  699. wolfSSL_X509_EXTENSION_free(ext);
  700. FreeDecodedCert(cert);
  701. #ifdef WOLFSSL_SMALL_STACK
  702. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  703. #endif
  704. return NULL;
  705. }
  706. ext->crit = x509->keyUsageCrit;
  707. break;
  708. case CRL_DIST_OID:
  709. if (!isSet)
  710. break;
  711. ext->crit = x509->CRLdistCrit;
  712. break;
  713. case ALT_NAMES_OID:
  714. {
  715. WOLFSSL_GENERAL_NAME* gn = NULL;
  716. DNS_entry* dns = NULL;
  717. if (!isSet)
  718. break;
  719. #ifdef OPENSSL_ALL
  720. ret = wolfSSL_ASN1_STRING_set(&ext->value, x509->subjAltNameSrc,
  721. x509->subjAltNameSz);
  722. if (ret != WOLFSSL_SUCCESS) {
  723. WOLFSSL_MSG("ASN1_STRING_set() failed");
  724. wolfSSL_X509_EXTENSION_free(ext);
  725. FreeDecodedCert(cert);
  726. #ifdef WOLFSSL_SMALL_STACK
  727. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  728. #endif
  729. return NULL;
  730. }
  731. #endif
  732. sk = (WOLFSSL_GENERAL_NAMES*)XMALLOC(
  733. sizeof(WOLFSSL_GENERAL_NAMES), NULL,
  734. DYNAMIC_TYPE_ASN1);
  735. if (sk == NULL) {
  736. wolfSSL_X509_EXTENSION_free(ext);
  737. FreeDecodedCert(cert);
  738. #ifdef WOLFSSL_SMALL_STACK
  739. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  740. #endif
  741. return NULL;
  742. }
  743. XMEMSET(sk, 0, sizeof(WOLFSSL_GENERAL_NAMES));
  744. sk->type = STACK_TYPE_GEN_NAME;
  745. if (x509->subjAltNameSet && x509->altNames != NULL) {
  746. /* alt names are DNS_entry structs */
  747. dns = x509->altNames;
  748. /* Currently only support GEN_DNS type */
  749. while (dns != NULL) {
  750. gn = wolfSSL_GENERAL_NAME_new();
  751. if (gn == NULL) {
  752. WOLFSSL_MSG("Error creating GENERAL_NAME");
  753. wolfSSL_X509_EXTENSION_free(ext);
  754. FreeDecodedCert(cert);
  755. wolfSSL_sk_pop_free(sk, NULL);
  756. #ifdef WOLFSSL_SMALL_STACK
  757. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  758. #endif
  759. return NULL;
  760. }
  761. gn->type = dns->type;
  762. gn->d.ia5->length = dns->len;
  763. if (wolfSSL_ASN1_STRING_set(gn->d.ia5, dns->name,
  764. gn->d.ia5->length) != WOLFSSL_SUCCESS) {
  765. WOLFSSL_MSG("ASN1_STRING_set failed");
  766. wolfSSL_X509_EXTENSION_free(ext);
  767. FreeDecodedCert(cert);
  768. wolfSSL_GENERAL_NAME_free(gn);
  769. wolfSSL_sk_pop_free(sk, NULL);
  770. #ifdef WOLFSSL_SMALL_STACK
  771. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  772. #endif
  773. return NULL;
  774. }
  775. dns = dns->next;
  776. /* last dns in list add at end of function */
  777. if (dns != NULL) {
  778. if (wolfSSL_sk_GENERAL_NAME_push(sk, gn) !=
  779. WOLFSSL_SUCCESS) {
  780. WOLFSSL_MSG("Error pushing onto stack");
  781. wolfSSL_X509_EXTENSION_free(ext);
  782. FreeDecodedCert(cert);
  783. wolfSSL_GENERAL_NAME_free(gn);
  784. wolfSSL_sk_pop_free(sk, NULL);
  785. #ifdef WOLFSSL_SMALL_STACK
  786. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  787. #endif
  788. return NULL;
  789. }
  790. }
  791. }
  792. if (wolfSSL_sk_GENERAL_NAME_push(sk,gn) !=
  793. WOLFSSL_SUCCESS) {
  794. WOLFSSL_MSG("Error pushing onto stack");
  795. wolfSSL_X509_EXTENSION_free(ext);
  796. FreeDecodedCert(cert);
  797. wolfSSL_GENERAL_NAME_free(gn);
  798. wolfSSL_sk_pop_free(sk, NULL);
  799. #ifdef WOLFSSL_SMALL_STACK
  800. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  801. #endif
  802. return NULL;
  803. }
  804. }
  805. ext->ext_sk = sk;
  806. ext->crit = x509->subjAltNameCrit;
  807. break;
  808. }
  809. default:
  810. WOLFSSL_MSG("Unknown extension type found, parsing OID");
  811. /* If the extension type is not recognized/supported,
  812. set the ASN1_OBJECT in the extension with the
  813. parsed oid for access in later function calls */
  814. /* Get OID from input */
  815. if (GetASNObjectId(input, &idx, &length, sz) != 0) {
  816. WOLFSSL_MSG("Failed to Get ASN Object Id");
  817. wolfSSL_X509_EXTENSION_free(ext);
  818. FreeDecodedCert(cert);
  819. #ifdef WOLFSSL_SMALL_STACK
  820. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  821. #endif
  822. return NULL;
  823. }
  824. oidBuf = (byte*)XMALLOC(length+1+MAX_LENGTH_SZ, NULL,
  825. DYNAMIC_TYPE_TMP_BUFFER);
  826. if (oidBuf == NULL) {
  827. WOLFSSL_MSG("Failed to malloc tmp buffer");
  828. wolfSSL_X509_EXTENSION_free(ext);
  829. FreeDecodedCert(cert);
  830. #ifdef WOLFSSL_SMALL_STACK
  831. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  832. #endif
  833. return NULL;
  834. }
  835. oidBuf[0] = ASN_OBJECT_ID;
  836. objSz++;
  837. objSz += SetLength(length, oidBuf + 1);
  838. objSz += length;
  839. /* Set object size and reallocate space in object buffer */
  840. ext->obj->objSz = objSz;
  841. if(((ext->obj->dynamic & WOLFSSL_ASN1_DYNAMIC_DATA) != 0) ||
  842. (ext->obj->obj == NULL)) {
  843. ext->obj->obj =(byte*)XREALLOC((byte*)ext->obj->obj,
  844. ext->obj->objSz,
  845. NULL,DYNAMIC_TYPE_ASN1);
  846. if (ext->obj->obj == NULL) {
  847. wolfSSL_ASN1_OBJECT_free(ext->obj);
  848. wolfSSL_X509_EXTENSION_free(ext);
  849. FreeDecodedCert(cert);
  850. XFREE(oidBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  851. #ifdef WOLFSSL_SMALL_STACK
  852. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  853. #endif
  854. return NULL;
  855. }
  856. ext->obj->dynamic |= WOLFSSL_ASN1_DYNAMIC_DATA;
  857. } else {
  858. ext->obj->dynamic &= ~WOLFSSL_ASN1_DYNAMIC_DATA;
  859. }
  860. /* Get OID from input and copy to ASN1_OBJECT buffer */
  861. XMEMCPY(oidBuf+2, input+idx, length);
  862. XMEMCPY((byte*)ext->obj->obj, oidBuf, ext->obj->objSz);
  863. XFREE(oidBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  864. oidBuf = NULL;
  865. ext->obj->grp = oidCertExtType;
  866. ext->crit = 0;
  867. /* Get extension data and copy as ASN1_STRING */
  868. tmpIdx = idx + length;
  869. if ((tmpIdx >= (word32)sz) || (input[tmpIdx++] != ASN_OCTET_STRING)) {
  870. WOLFSSL_MSG("Error decoding unknown extension data");
  871. wolfSSL_ASN1_OBJECT_free(ext->obj);
  872. wolfSSL_X509_EXTENSION_free(ext);
  873. FreeDecodedCert(cert);
  874. #ifdef WOLFSSL_SMALL_STACK
  875. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  876. #endif
  877. return NULL;
  878. }
  879. if (GetLength(input, &tmpIdx, &length, sz) <= 0) {
  880. WOLFSSL_MSG("Error: Invalid Input Length.");
  881. wolfSSL_ASN1_OBJECT_free(ext->obj);
  882. wolfSSL_X509_EXTENSION_free(ext);
  883. FreeDecodedCert(cert);
  884. #ifdef WOLFSSL_SMALL_STACK
  885. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  886. #endif
  887. return NULL;
  888. }
  889. ext->value.data = (char*)XMALLOC(length, NULL, DYNAMIC_TYPE_ASN1);
  890. ext->value.isDynamic = 1;
  891. if (ext->value.data == NULL) {
  892. WOLFSSL_MSG("Failed to malloc ASN1_STRING data");
  893. wolfSSL_X509_EXTENSION_free(ext);
  894. FreeDecodedCert(cert);
  895. #ifdef WOLFSSL_SMALL_STACK
  896. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  897. #endif
  898. return NULL;
  899. }
  900. XMEMCPY(ext->value.data,input+tmpIdx,length);
  901. ext->value.length = length;
  902. } /* switch(oid) */
  903. break; /* Got the Extension. Now exit while loop. */
  904. } /* while(idx < sz) */
  905. /* Store the new extension in a stack inside x509
  906. * The extensions on the stack are free'd internally when FreeX509 is called
  907. */
  908. if (x509->ext_sk == NULL)
  909. x509->ext_sk = wolfSSL_sk_new_x509_ext();
  910. if (x509->ext_sk != NULL)
  911. wolfSSL_sk_X509_EXTENSION_push(x509->ext_sk, ext);
  912. FreeDecodedCert(cert);
  913. #ifdef WOLFSSL_SMALL_STACK
  914. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  915. #endif
  916. return ext;
  917. }
  918. /**
  919. * @param str String to copy
  920. * @param buf Output buffer. If this contains a pointer then it is free'd
  921. * with the DYNAMIC_TYPE_X509_EXT hint.
  922. * @param len Output length
  923. * @return WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on error
  924. */
  925. static int asn1_string_copy_to_buffer(WOLFSSL_ASN1_STRING* str, byte** buf,
  926. word32* len, void* heap) {
  927. if (!str || !buf || !len) {
  928. return WOLFSSL_FAILURE;
  929. }
  930. if (str->data && str->length > 0) {
  931. if (*buf)
  932. XFREE(*buf, heap, DYNAMIC_TYPE_X509_EXT);
  933. *len = 0;
  934. *buf = (byte*)XMALLOC(str->length, heap,
  935. DYNAMIC_TYPE_X509_EXT);
  936. if (!*buf) {
  937. WOLFSSL_MSG("malloc error");
  938. return WOLFSSL_FAILURE;
  939. }
  940. *len = str->length;
  941. XMEMCPY(*buf, str->data, str->length);
  942. }
  943. (void)heap;
  944. return WOLFSSL_SUCCESS;
  945. }
  946. int wolfSSL_X509_add_ext(WOLFSSL_X509 *x509, WOLFSSL_X509_EXTENSION *ext, int loc)
  947. {
  948. int nid;
  949. WOLFSSL_ENTER("wolfSSL_X509_add_ext");
  950. if (!x509 || !ext || loc >= 0) {
  951. WOLFSSL_MSG("Bad parameter");
  952. return WOLFSSL_FAILURE;
  953. }
  954. nid = (ext->obj != NULL) ? ext->obj->type : ext->value.nid;
  955. switch (nid) {
  956. case NID_authority_key_identifier:
  957. if (x509->authKeyIdSrc != NULL) {
  958. /* If authKeyId points into authKeyIdSrc then free it and
  959. * revert to old functionality */
  960. XFREE(x509->authKeyIdSrc, x509->heap, DYNAMIC_TYPE_X509_EXT);
  961. x509->authKeyIdSrc = NULL;
  962. x509->authKeyId = NULL;
  963. }
  964. if (asn1_string_copy_to_buffer(&ext->value, &x509->authKeyId,
  965. &x509->authKeyIdSz, x509->heap) != WOLFSSL_SUCCESS) {
  966. WOLFSSL_MSG("asn1_string_copy_to_buffer error");
  967. return WOLFSSL_FAILURE;
  968. }
  969. x509->authKeyIdCrit = (byte)ext->crit;
  970. break;
  971. case NID_subject_key_identifier:
  972. if (asn1_string_copy_to_buffer(&ext->value, &x509->subjKeyId,
  973. &x509->subjKeyIdSz, x509->heap) != WOLFSSL_SUCCESS) {
  974. WOLFSSL_MSG("asn1_string_copy_to_buffer error");
  975. return WOLFSSL_FAILURE;
  976. }
  977. x509->subjKeyIdCrit = (byte)ext->crit;
  978. break;
  979. case NID_subject_alt_name:
  980. {
  981. WOLFSSL_GENERAL_NAMES* gns = ext->ext_sk;
  982. while (gns) {
  983. WOLFSSL_GENERAL_NAME* gn = gns->data.gn;
  984. if (!gn || !gn->d.ia5 ||
  985. wolfSSL_X509_add_altname_ex(x509, gn->d.ia5->data,
  986. gn->d.ia5->length, gn->type) != WOLFSSL_SUCCESS) {
  987. WOLFSSL_MSG("Subject alternative name missing extension");
  988. return WOLFSSL_FAILURE;
  989. }
  990. gns = gns->next;
  991. }
  992. x509->subjAltNameSet = 1;
  993. x509->subjAltNameCrit = (byte)ext->crit;
  994. break;
  995. }
  996. case NID_key_usage:
  997. if (ext && ext->value.data &&
  998. ext->value.length == sizeof(word16)) {
  999. x509->keyUsage = *(word16*)ext->value.data;
  1000. x509->keyUsageCrit = (byte)ext->crit;
  1001. x509->keyUsageSet = 1;
  1002. }
  1003. break;
  1004. case NID_basic_constraints:
  1005. if (ext->obj) {
  1006. x509->isCa = (byte)ext->obj->ca;
  1007. x509->basicConstCrit = (byte)ext->crit;
  1008. if (ext->obj->pathlen)
  1009. x509->pathLength = ext->obj->pathlen->length;
  1010. x509->basicConstSet = 1;
  1011. }
  1012. break;
  1013. default:
  1014. WOLFSSL_MSG("Unsupported extension to add");
  1015. return WOLFSSL_FAILURE;
  1016. }
  1017. return WOLFSSL_SUCCESS;
  1018. }
  1019. #ifndef NO_BIO
  1020. /* Return 0 on success and 1 on failure. Copies ext data to bio, using indent
  1021. * to pad the output. flag is ignored. */
  1022. int wolfSSL_X509V3_EXT_print(WOLFSSL_BIO *out, WOLFSSL_X509_EXTENSION *ext,
  1023. unsigned long flag, int indent)
  1024. {
  1025. ASN1_OBJECT* obj;
  1026. ASN1_STRING* str;
  1027. int nid;
  1028. const int sz = CTC_NAME_SIZE*2;
  1029. int rc = WOLFSSL_FAILURE;
  1030. char tmp[CTC_NAME_SIZE*2 + 1] = {0};
  1031. WOLFSSL_ENTER("wolfSSL_X509V3_EXT_print");
  1032. if ((out == NULL) || (ext == NULL)) {
  1033. WOLFSSL_MSG("NULL parameter error");
  1034. return rc;
  1035. }
  1036. obj = wolfSSL_X509_EXTENSION_get_object(ext);
  1037. if (obj == NULL) {
  1038. WOLFSSL_MSG("Error getting ASN1_OBJECT from X509_EXTENSION");
  1039. return rc;
  1040. }
  1041. str = wolfSSL_X509_EXTENSION_get_data(ext);
  1042. if (str == NULL) {
  1043. WOLFSSL_MSG("Error getting ASN1_STRING from X509_EXTENSION");
  1044. return rc;
  1045. }
  1046. /* Print extension based on the type */
  1047. nid = wolfSSL_OBJ_obj2nid(obj);
  1048. switch (nid) {
  1049. case BASIC_CA_OID:
  1050. {
  1051. char isCa[] = "TRUE";
  1052. char notCa[] = "FALSE";
  1053. if (XSNPRINTF(tmp, sz, "%*sCA:%s", indent, "",
  1054. obj->ca ? isCa : notCa)
  1055. >= sz)
  1056. return rc;
  1057. break;
  1058. }
  1059. case ALT_NAMES_OID:
  1060. {
  1061. WOLFSSL_STACK* sk;
  1062. char* val;
  1063. int len;
  1064. tmp[0] = '\0'; /* Make sure tmp is null-terminated */
  1065. sk = ext->ext_sk;
  1066. while (sk != NULL) {
  1067. if (sk->type == STACK_TYPE_GEN_NAME && sk->data.gn) {
  1068. /* str is GENERAL_NAME for subject alternative name ext */
  1069. str = sk->data.gn->d.ia5;
  1070. len = str->length + 2; /* + 2 for NULL char and "," */
  1071. if (len > sz) {
  1072. WOLFSSL_MSG("len greater than buffer size");
  1073. return rc;
  1074. }
  1075. val = (char*)XMALLOC(len + indent, NULL,
  1076. DYNAMIC_TYPE_TMP_BUFFER);
  1077. if (val == NULL) {
  1078. WOLFSSL_MSG("Memory error");
  1079. return rc;
  1080. }
  1081. if (sk->next) {
  1082. if (XSNPRINTF(val, len, "%*s%s,",
  1083. indent, "", str->strData)
  1084. >= len)
  1085. return rc;
  1086. } else {
  1087. if (XSNPRINTF(val, len, "%*s%s",
  1088. indent, "", str->strData)
  1089. >= len)
  1090. return rc;
  1091. }
  1092. XSTRNCAT(tmp, val, len);
  1093. XFREE(val, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  1094. }
  1095. sk = sk->next;
  1096. }
  1097. break;
  1098. }
  1099. case AUTH_KEY_OID:
  1100. case SUBJ_KEY_OID:
  1101. {
  1102. char* asn1str;
  1103. asn1str = wolfSSL_i2s_ASN1_STRING(NULL, str);
  1104. if (XSNPRINTF(tmp, sz, "%*s%s", indent, "", asn1str)
  1105. >= sz)
  1106. return rc;
  1107. XFREE(asn1str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  1108. break;
  1109. }
  1110. case AUTH_INFO_OID:
  1111. case CERT_POLICY_OID:
  1112. case CRL_DIST_OID:
  1113. case KEY_USAGE_OID:
  1114. WOLFSSL_MSG("X509V3_EXT_print not yet implemented for ext type");
  1115. break;
  1116. default:
  1117. if (XSNPRINTF(tmp, sz, "%*s%s", indent, "", str->strData)
  1118. >= sz)
  1119. return rc;
  1120. }
  1121. if (wolfSSL_BIO_write(out, tmp, (int)XSTRLEN(tmp)) == (int)XSTRLEN(tmp)) {
  1122. rc = WOLFSSL_SUCCESS;
  1123. }
  1124. (void) flag;
  1125. return rc;
  1126. }
  1127. #endif /* !NO_BIO */
  1128. #ifndef NO_WOLFSSL_STUB
  1129. int wolfSSL_X509V3_EXT_add_nconf(WOLFSSL_CONF *conf, WOLFSSL_X509V3_CTX *ctx,
  1130. const char *section, WOLFSSL_X509 *cert)
  1131. {
  1132. WOLFSSL_ENTER("wolfSSL_X509V3_EXT_add_nconf");
  1133. WOLFSSL_STUB("wolfSSL_X509V3_EXT_add_nconf");
  1134. (void)conf;
  1135. (void)ctx;
  1136. (void)section;
  1137. (void)cert;
  1138. return WOLFSSL_SUCCESS;
  1139. }
  1140. #endif
  1141. /* Returns crit flag in X509_EXTENSION object */
  1142. int wolfSSL_X509_EXTENSION_get_critical(const WOLFSSL_X509_EXTENSION* ex)
  1143. {
  1144. WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_get_critical");
  1145. if (ex == NULL)
  1146. return BAD_FUNC_ARG;
  1147. return ex->crit;
  1148. }
  1149. /* Sets if the extension is critical
  1150. * returns WOLFSSL_SUCCESS on success
  1151. */
  1152. int wolfSSL_X509_EXTENSION_set_critical(WOLFSSL_X509_EXTENSION* ex, int crit)
  1153. {
  1154. WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_set_critical");
  1155. if (ex == NULL)
  1156. return WOLFSSL_FAILURE;
  1157. ex->crit = crit;
  1158. return WOLFSSL_SUCCESS;
  1159. }
  1160. /* Creates v3_ext_method for a given X509v3 extension
  1161. *
  1162. * ex : The X509_EXTENSION used to create v3_ext_method. If the extension is
  1163. * not NULL, get the NID of the extension object and populate the
  1164. * extension type-specific X509V3_EXT_* function(s) in v3_ext_method.
  1165. *
  1166. * Returns NULL on error or pointer to the v3_ext_method populated with extension
  1167. * type-specific X509V3_EXT_* function(s).
  1168. *
  1169. * NOTE: NID_subject_key_identifier is currently the only extension implementing
  1170. * the X509V3_EXT_* functions, as it is the only type called directly by QT. The
  1171. * other extension types return a pointer to a v3_ext_method struct that contains
  1172. * only the NID.
  1173. */
  1174. #if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L
  1175. const WOLFSSL_v3_ext_method* wolfSSL_X509V3_EXT_get(WOLFSSL_X509_EXTENSION* ex)
  1176. #else
  1177. WOLFSSL_v3_ext_method* wolfSSL_X509V3_EXT_get(WOLFSSL_X509_EXTENSION* ex)
  1178. #endif
  1179. {
  1180. int nid;
  1181. WOLFSSL_v3_ext_method method;
  1182. WOLFSSL_ENTER("wolfSSL_X509V3_EXT_get");
  1183. if ((ex == NULL) || (ex->obj == NULL)) {
  1184. WOLFSSL_MSG("Passed an invalid X509_EXTENSION*");
  1185. return NULL;
  1186. }
  1187. /* Initialize method to 0 */
  1188. XMEMSET(&method, 0, sizeof(struct WOLFSSL_v3_ext_method));
  1189. nid = ex->obj->nid;
  1190. if (nid <= 0) {
  1191. WOLFSSL_MSG("Failed to get nid from passed extension object");
  1192. return NULL;
  1193. }
  1194. XMEMSET(&method, 0, sizeof(WOLFSSL_v3_ext_method));
  1195. switch (nid) {
  1196. case NID_basic_constraints:
  1197. break;
  1198. case NID_subject_key_identifier:
  1199. method.i2s = (X509V3_EXT_I2S)wolfSSL_i2s_ASN1_STRING;
  1200. break;
  1201. case NID_subject_alt_name:
  1202. WOLFSSL_MSG("i2v function not yet implemented for Subject Alternative Name");
  1203. break;
  1204. case NID_key_usage:
  1205. WOLFSSL_MSG("i2v function not yet implemented for Key Usage");
  1206. break;
  1207. case NID_authority_key_identifier:
  1208. WOLFSSL_MSG("i2v function not yet implemented for Auth Key Id");
  1209. break;
  1210. case NID_info_access:
  1211. WOLFSSL_MSG("i2v function not yet implemented for Info Access");
  1212. break;
  1213. case NID_ext_key_usage:
  1214. WOLFSSL_MSG("i2v function not yet implemented for Ext Key Usage");
  1215. break;
  1216. case NID_certificate_policies:
  1217. WOLFSSL_MSG("r2i function not yet implemented for Cert Policies");
  1218. break;
  1219. case NID_crl_distribution_points:
  1220. WOLFSSL_MSG("r2i function not yet implemented for CRL Dist Points");
  1221. break;
  1222. default:
  1223. /* If extension type is unknown, return NULL -- QT makes call to
  1224. X509_EXTENSION_get_data() if there is no v3_ext_method */
  1225. WOLFSSL_MSG("X509V3_EXT_get(): Unknown extension type found");
  1226. return NULL;
  1227. }
  1228. method.ext_nid = nid;
  1229. ex->ext_method = method;
  1230. #if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L
  1231. return (const WOLFSSL_v3_ext_method*)&ex->ext_method;
  1232. #else
  1233. return (WOLFSSL_v3_ext_method*)&ex->ext_method;
  1234. #endif
  1235. }
  1236. /* Parses and returns an x509v3 extension internal structure.
  1237. *
  1238. * ext : The X509_EXTENSION for parsing internal structure. If extension is
  1239. * not NULL, get the NID of the extension object and create a new
  1240. * extension-specific internal structure based on the extension type.
  1241. *
  1242. * Returns NULL on error or if NID is not found, otherwise returns a pointer to
  1243. * the extension type-specific X509_EXTENSION internal structure.
  1244. * Return is expected to be free'd by caller.
  1245. */
  1246. void* wolfSSL_X509V3_EXT_d2i(WOLFSSL_X509_EXTENSION* ext)
  1247. {
  1248. const WOLFSSL_v3_ext_method* method;
  1249. int ret;
  1250. WOLFSSL_ASN1_OBJECT* object;
  1251. WOLFSSL_BASIC_CONSTRAINTS* bc;
  1252. WOLFSSL_AUTHORITY_KEYID* akey;
  1253. WOLFSSL_ASN1_STRING* asn1String, *newString;
  1254. WOLFSSL_AUTHORITY_INFO_ACCESS* aia;
  1255. WOLFSSL_STACK* sk;
  1256. WOLFSSL_ENTER("wolfSSL_X509V3_EXT_d2i");
  1257. if(ext == NULL) {
  1258. WOLFSSL_MSG("Bad function Argument");
  1259. return NULL;
  1260. }
  1261. /* extract extension info */
  1262. method = wolfSSL_X509V3_EXT_get(ext);
  1263. if (method == NULL) {
  1264. WOLFSSL_MSG("wolfSSL_X509V3_EXT_get error");
  1265. return NULL;
  1266. }
  1267. object = wolfSSL_X509_EXTENSION_get_object(ext);
  1268. if (object == NULL) {
  1269. WOLFSSL_MSG("X509_EXTENSION_get_object failed");
  1270. return NULL;
  1271. }
  1272. /* Return pointer to proper internal structure based on NID */
  1273. switch (object->type) {
  1274. /* basicConstraints */
  1275. case (NID_basic_constraints):
  1276. WOLFSSL_MSG("basicConstraints");
  1277. /* Allocate new BASIC_CONSTRAINTS structure */
  1278. bc = wolfSSL_BASIC_CONSTRAINTS_new();
  1279. if (bc == NULL) {
  1280. WOLFSSL_MSG("Failed to malloc basic constraints");
  1281. return NULL;
  1282. }
  1283. /* Copy pathlen and CA into BASIC_CONSTRAINTS from object */
  1284. bc->ca = object->ca;
  1285. if (object->pathlen->length > 0) {
  1286. bc->pathlen = wolfSSL_ASN1_INTEGER_dup(object->pathlen);
  1287. if (bc->pathlen == NULL) {
  1288. WOLFSSL_MSG("Failed to duplicate ASN1_INTEGER");
  1289. wolfSSL_BASIC_CONSTRAINTS_free(bc);
  1290. return NULL;
  1291. }
  1292. }
  1293. else
  1294. bc->pathlen = NULL;
  1295. return bc;
  1296. /* subjectKeyIdentifier */
  1297. case (NID_subject_key_identifier):
  1298. WOLFSSL_MSG("subjectKeyIdentifier");
  1299. asn1String = wolfSSL_X509_EXTENSION_get_data(ext);
  1300. if (asn1String == NULL) {
  1301. WOLFSSL_MSG("X509_EXTENSION_get_data() failed");
  1302. return NULL;
  1303. }
  1304. newString = wolfSSL_ASN1_STRING_new();
  1305. if (newString == NULL) {
  1306. WOLFSSL_MSG("Failed to malloc ASN1_STRING");
  1307. return NULL;
  1308. }
  1309. ret = wolfSSL_ASN1_STRING_set(newString, asn1String->data,
  1310. asn1String->length);
  1311. if (ret != WOLFSSL_SUCCESS) {
  1312. WOLFSSL_MSG("ASN1_STRING_set() failed");
  1313. wolfSSL_ASN1_STRING_free(newString);
  1314. return NULL;
  1315. };
  1316. newString->type = asn1String->type;
  1317. return newString;
  1318. /* authorityKeyIdentifier */
  1319. case (NID_authority_key_identifier):
  1320. WOLFSSL_MSG("AuthorityKeyIdentifier");
  1321. akey = (WOLFSSL_AUTHORITY_KEYID*)
  1322. XMALLOC(sizeof(WOLFSSL_AUTHORITY_KEYID), NULL,
  1323. DYNAMIC_TYPE_X509_EXT);
  1324. if (akey == NULL) {
  1325. WOLFSSL_MSG("Failed to malloc authority key id");
  1326. return NULL;
  1327. }
  1328. XMEMSET(akey, 0, sizeof(WOLFSSL_AUTHORITY_KEYID));
  1329. akey->keyid = wolfSSL_ASN1_STRING_new();
  1330. if (akey->keyid == NULL) {
  1331. WOLFSSL_MSG("ASN1_STRING_new() failed");
  1332. wolfSSL_AUTHORITY_KEYID_free(akey);
  1333. return NULL;
  1334. }
  1335. asn1String = wolfSSL_X509_EXTENSION_get_data(ext);
  1336. if (asn1String == NULL) {
  1337. WOLFSSL_MSG("X509_EXTENSION_get_data() failed");
  1338. wolfSSL_AUTHORITY_KEYID_free(akey);
  1339. return NULL;
  1340. }
  1341. ret = wolfSSL_ASN1_STRING_set(akey->keyid, asn1String->data,
  1342. asn1String->length);
  1343. if (ret != WOLFSSL_SUCCESS) {
  1344. WOLFSSL_MSG("ASN1_STRING_set() failed");
  1345. wolfSSL_AUTHORITY_KEYID_free(akey);
  1346. return NULL;
  1347. };
  1348. akey->keyid->type = asn1String->type;
  1349. /* For now, set issuer and serial to NULL. This may need to be
  1350. updated for future use */
  1351. akey->issuer = NULL;
  1352. akey->serial = NULL;
  1353. return akey;
  1354. /* keyUsage */
  1355. case (NID_key_usage):
  1356. WOLFSSL_MSG("keyUsage");
  1357. /* This may need to be updated for future use. The i2v method for
  1358. keyUsage is not currently set. For now, return the ASN1_STRING
  1359. representation of KeyUsage bit string */
  1360. asn1String = wolfSSL_X509_EXTENSION_get_data(ext);
  1361. if (asn1String == NULL) {
  1362. WOLFSSL_MSG("X509_EXTENSION_get_data() failed");
  1363. return NULL;
  1364. }
  1365. newString = wolfSSL_ASN1_STRING_new();
  1366. if (newString == NULL) {
  1367. WOLFSSL_MSG("Failed to malloc ASN1_STRING");
  1368. return NULL;
  1369. }
  1370. ret = wolfSSL_ASN1_STRING_set(newString, asn1String->data,
  1371. asn1String->length);
  1372. if (ret != WOLFSSL_SUCCESS) {
  1373. WOLFSSL_MSG("ASN1_STRING_set() failed");
  1374. wolfSSL_ASN1_STRING_free(newString);
  1375. return NULL;
  1376. };
  1377. newString->type = asn1String->type;
  1378. return newString;
  1379. /* extKeyUsage */
  1380. case (NID_ext_key_usage):
  1381. WOLFSSL_MSG("extKeyUsage not supported yet");
  1382. return NULL;
  1383. /* certificatePolicies */
  1384. case (NID_certificate_policies):
  1385. WOLFSSL_MSG("certificatePolicies not supported yet");
  1386. return NULL;
  1387. /* cRLDistributionPoints */
  1388. case (NID_crl_distribution_points):
  1389. WOLFSSL_MSG("cRLDistributionPoints not supported yet");
  1390. return NULL;
  1391. case NID_subject_alt_name:
  1392. if (ext->ext_sk == NULL) {
  1393. WOLFSSL_MSG("Subject alt name stack NULL");
  1394. return NULL;
  1395. }
  1396. sk = wolfSSL_sk_dup(ext->ext_sk);
  1397. if (sk == NULL) {
  1398. WOLFSSL_MSG("Failed to duplicate subject alt names stack.");
  1399. return NULL;
  1400. }
  1401. return sk;
  1402. /* authorityInfoAccess */
  1403. case (NID_info_access):
  1404. WOLFSSL_MSG("AuthorityInfoAccess");
  1405. sk = ext->ext_sk;
  1406. if (sk == NULL) {
  1407. WOLFSSL_MSG("ACCESS_DESCRIPTION stack NULL");
  1408. return NULL;
  1409. }
  1410. /* AUTHORITY_INFO_ACCESS is a stack of ACCESS_DESCRIPTION entries */
  1411. aia = wolfSSL_sk_new_null();
  1412. if (aia == NULL) {
  1413. WOLFSSL_MSG("Failed to malloc AUTHORITY_INFO_ACCESS");
  1414. return NULL;
  1415. }
  1416. aia->type = STACK_TYPE_ACCESS_DESCRIPTION;
  1417. while (sk) {
  1418. WOLFSSL_ACCESS_DESCRIPTION* ad;
  1419. WOLFSSL_ASN1_OBJECT* aiaEntry;
  1420. if (sk->type != STACK_TYPE_OBJ) {
  1421. sk = sk->next;
  1422. continue;
  1423. }
  1424. aiaEntry = sk->data.obj;
  1425. /* ACCESS_DESCRIPTION has two members, method and location.
  1426. Method: ASN1_OBJECT as either AIA_OCSP_OID or AIA_CA_ISSUER_OID
  1427. Location: GENERAL_NAME structure containing the URI. */
  1428. ad = (WOLFSSL_ACCESS_DESCRIPTION*)
  1429. XMALLOC(sizeof(WOLFSSL_ACCESS_DESCRIPTION), NULL,
  1430. DYNAMIC_TYPE_X509_EXT);
  1431. if (ad == NULL) {
  1432. WOLFSSL_MSG("Failed to malloc ACCESS_DESCRIPTION");
  1433. XFREE(aia, NULL, DYNAMIC_TYPE_X509_EXT);
  1434. return NULL;
  1435. }
  1436. XMEMSET(ad, 0, sizeof(WOLFSSL_ACCESS_DESCRIPTION));
  1437. /* Create new ASN1_OBJECT from oid */
  1438. ad->method = wolfSSL_OBJ_nid2obj(aiaEntry->nid);
  1439. if (ad->method == NULL) {
  1440. WOLFSSL_MSG("OBJ_nid2obj() failed");
  1441. XFREE(aia, NULL, DYNAMIC_TYPE_X509_EXT);
  1442. XFREE(ad, NULL, DYNAMIC_TYPE_X509_EXT);
  1443. return NULL;
  1444. }
  1445. /* Allocate memory for GENERAL NAME */
  1446. ad->location = wolfSSL_GENERAL_NAME_new();
  1447. if (ad->location == NULL) {
  1448. WOLFSSL_MSG("Failed to malloc GENERAL_NAME");
  1449. wolfSSL_ASN1_OBJECT_free(ad->method);
  1450. XFREE(aia, NULL, DYNAMIC_TYPE_X509_EXT);
  1451. XFREE(ad, NULL, DYNAMIC_TYPE_X509_EXT);
  1452. return NULL;
  1453. }
  1454. ret = wolfSSL_GENERAL_NAME_set_type(ad->location, GEN_URI);
  1455. if (ret != WOLFSSL_SUCCESS) {
  1456. wolfSSL_ASN1_OBJECT_free(ad->method);
  1457. XFREE(aia, NULL, DYNAMIC_TYPE_X509_EXT);
  1458. wolfSSL_GENERAL_NAME_free(ad->location);
  1459. XFREE(ad, NULL, DYNAMIC_TYPE_X509_EXT);
  1460. return NULL;
  1461. }
  1462. /* Set the URI in GENERAL_NAME */
  1463. ret = wolfSSL_ASN1_STRING_set(
  1464. ad->location->d.uniformResourceIdentifier,
  1465. aiaEntry->obj, aiaEntry->objSz);
  1466. if (ret != WOLFSSL_SUCCESS) {
  1467. WOLFSSL_MSG("ASN1_STRING_set() failed");
  1468. wolfSSL_ASN1_OBJECT_free(ad->method);
  1469. XFREE(aia, NULL, DYNAMIC_TYPE_X509_EXT);
  1470. wolfSSL_GENERAL_NAME_free(ad->location);
  1471. XFREE(ad, NULL, DYNAMIC_TYPE_X509_EXT);
  1472. return NULL;
  1473. }
  1474. /* Push to AUTHORITY_INFO_ACCESS stack */
  1475. ret = wolfSSL_sk_ACCESS_DESCRIPTION_push(aia, ad);
  1476. if (ret != WOLFSSL_SUCCESS) {
  1477. WOLFSSL_MSG("Error pushing ASN1 AD onto stack");
  1478. wolfSSL_sk_ACCESS_DESCRIPTION_pop_free(aia, NULL);
  1479. wolfSSL_ASN1_OBJECT_free(ad->method);
  1480. wolfSSL_GENERAL_NAME_free(ad->location);
  1481. XFREE(aia, NULL, DYNAMIC_TYPE_X509_EXT);
  1482. XFREE(ad, NULL, DYNAMIC_TYPE_X509_EXT);
  1483. return NULL;
  1484. }
  1485. sk = sk->next;
  1486. }
  1487. return aia;
  1488. default:
  1489. WOLFSSL_MSG("Extension NID not in table, returning NULL");
  1490. break;
  1491. }
  1492. return NULL;
  1493. }
  1494. /* Looks for the extension matching the passed in nid
  1495. *
  1496. * x509 : certificate to get parse through for extension.
  1497. * nid : Extension OID to be found.
  1498. * lastPos : Start search from extension after lastPos.
  1499. * Set to -1 to search from index 0.
  1500. * return >= 0 If successful the extension index is returned.
  1501. * return -1 If extension is not found or error is encountered.
  1502. */
  1503. int wolfSSL_X509_get_ext_by_NID(const WOLFSSL_X509* x509, int nid, int lastPos)
  1504. {
  1505. int extCount = 0, length = 0, outSz = 0, sz = 0, ret = 0;
  1506. int isSet = 0, found = 0, loc;
  1507. const byte* rawCert;
  1508. const byte* input;
  1509. word32 oid, idx = 0, tmpIdx = 0, foundNID;
  1510. DecodedCert cert;
  1511. WOLFSSL_ENTER("wolfSSL_X509_get_ext_by_NID");
  1512. if(x509 == NULL){
  1513. WOLFSSL_MSG("\tNot passed a certificate");
  1514. return WOLFSSL_FATAL_ERROR;
  1515. }
  1516. if(lastPos < -1 || (lastPos > (wolfSSL_X509_get_ext_count(x509) - 1))){
  1517. WOLFSSL_MSG("\tBad location argument");
  1518. return WOLFSSL_FATAL_ERROR;
  1519. }
  1520. loc = lastPos + 1;
  1521. rawCert = wolfSSL_X509_get_der((WOLFSSL_X509*)x509, &outSz);
  1522. if (rawCert == NULL) {
  1523. WOLFSSL_MSG("\tX509_get_der() failed");
  1524. return WOLFSSL_FATAL_ERROR;
  1525. }
  1526. InitDecodedCert( &cert, rawCert, (word32)outSz, 0);
  1527. if (ParseCert(&cert,
  1528. #ifdef WOLFSSL_CERT_REQ
  1529. x509->isCSR ? CERTREQ_TYPE :
  1530. #endif
  1531. CA_TYPE,
  1532. NO_VERIFY, NULL) < 0) {
  1533. WOLFSSL_MSG("\tCertificate parsing failed");
  1534. FreeDecodedCert(&cert);
  1535. return WOLFSSL_FATAL_ERROR;
  1536. }
  1537. input = cert.extensions;
  1538. sz = cert.extensionsSz;
  1539. if (input == NULL || sz == 0) {
  1540. WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
  1541. FreeDecodedCert(&cert);
  1542. return WOLFSSL_FATAL_ERROR;
  1543. }
  1544. #ifdef WOLFSSL_CERT_REQ
  1545. if (!x509->isCSR)
  1546. #endif
  1547. {
  1548. if (input[idx++] != ASN_EXTENSIONS) {
  1549. WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
  1550. FreeDecodedCert(&cert);
  1551. return WOLFSSL_FATAL_ERROR;
  1552. }
  1553. if (GetLength(input, &idx, &length, sz) < 0) {
  1554. WOLFSSL_MSG("\tfail: invalid length");
  1555. FreeDecodedCert(&cert);
  1556. return WOLFSSL_FATAL_ERROR;
  1557. }
  1558. }
  1559. if (GetSequence(input, &idx, &length, sz) < 0) {
  1560. WOLFSSL_MSG("\tfail: should be a SEQUENCE (1)");
  1561. FreeDecodedCert(&cert);
  1562. return WOLFSSL_FATAL_ERROR;
  1563. }
  1564. while (idx < (word32)sz) {
  1565. oid = 0;
  1566. if (GetSequence(input, &idx, &length, sz) < 0) {
  1567. WOLFSSL_MSG("\tfail: should be a SEQUENCE");
  1568. FreeDecodedCert(&cert);
  1569. return WOLFSSL_FATAL_ERROR;
  1570. }
  1571. tmpIdx = idx;
  1572. ret = GetObjectId(input, &idx, &oid, oidCertExtType, sz);
  1573. if (ret < 0) {
  1574. WOLFSSL_MSG("\tfail: OBJECT ID");
  1575. FreeDecodedCert(&cert);
  1576. return WOLFSSL_FATAL_ERROR;
  1577. }
  1578. idx = tmpIdx;
  1579. foundNID = (word32)oid2nid(oid, oidCertExtType);
  1580. if (extCount >= loc) {
  1581. /* extCount >= loc. Now check if extension has been set */
  1582. isSet = wolfSSL_X509_ext_isSet_by_NID((WOLFSSL_X509*)x509, foundNID);
  1583. if (isSet && ((word32)nid == foundNID)) {
  1584. found = 1;
  1585. break;
  1586. }
  1587. }
  1588. idx += length;
  1589. extCount++;
  1590. } /* while(idx < sz) */
  1591. FreeDecodedCert(&cert);
  1592. return found ? extCount : WOLFSSL_FATAL_ERROR;
  1593. }
  1594. #endif /* OPENSSL_ALL */
  1595. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  1596. /* Looks for the extension matching the passed in nid
  1597. *
  1598. * c : if not null then is set to status value -2 if multiple occurrences
  1599. * of the extension are found, -1 if not found, 0 if found and not
  1600. * critical, and 1 if found and critical.
  1601. * nid : Extension OID to be found.
  1602. * idx : if NULL return first extension found match, otherwise start search at
  1603. * idx location and set idx to the location of extension returned.
  1604. * returns NULL or a pointer to an WOLFSSL_ASN1_BIT_STRING (for KEY_USAGE_OID)
  1605. * or WOLFSSL_STACK (for other)
  1606. * holding extension structure
  1607. *
  1608. * NOTE code for decoding extensions is in asn.c DecodeCertExtensions --
  1609. * use already decoded extension in this function to avoid decoding twice.
  1610. * Currently we do not make use of idx since getting pre decoded extensions.
  1611. */
  1612. void* wolfSSL_X509_get_ext_d2i(const WOLFSSL_X509* x509, int nid, int* c,
  1613. int* idx)
  1614. {
  1615. void* ret = NULL;
  1616. WOLFSSL_STACK* sk = NULL;
  1617. WOLFSSL_ASN1_OBJECT* obj = NULL;
  1618. WOLFSSL_GENERAL_NAME* gn = NULL;
  1619. #ifdef OPENSSL_EXTRA
  1620. WOLFSSL_DIST_POINT* dp = NULL;
  1621. #endif
  1622. WOLFSSL_BASIC_CONSTRAINTS* bc = NULL;
  1623. WOLFSSL_ENTER("wolfSSL_X509_get_ext_d2i");
  1624. if (x509 == NULL) {
  1625. return NULL;
  1626. }
  1627. if (c != NULL) {
  1628. *c = -1; /* default to not found */
  1629. }
  1630. switch (nid) {
  1631. case BASIC_CA_OID:
  1632. if (x509->basicConstSet) {
  1633. WOLFSSL_ASN1_INTEGER* a;
  1634. bc = wolfSSL_BASIC_CONSTRAINTS_new();
  1635. if (!bc) {
  1636. WOLFSSL_MSG("wolfSSL_BASIC_CONSTRAINTS_new error");
  1637. return NULL;
  1638. }
  1639. a = wolfSSL_ASN1_INTEGER_new();
  1640. if (!a) {
  1641. WOLFSSL_MSG("wolfSSL_ASN1_INTEGER_new error");
  1642. wolfSSL_BASIC_CONSTRAINTS_free(bc);
  1643. return NULL;
  1644. }
  1645. a->length = x509->pathLength;
  1646. #if defined(OPENSSL_ALL) || defined(WOLFSSL_QT) || \
  1647. defined(WOLFSSL_APACHE_HTTPD)
  1648. bc->ca = x509->isCa;
  1649. #endif
  1650. bc->pathlen = a;
  1651. if (c != NULL) {
  1652. *c = x509->basicConstCrit;
  1653. }
  1654. }
  1655. else {
  1656. WOLFSSL_MSG("No Basic Constraint set");
  1657. }
  1658. return bc;
  1659. case ALT_NAMES_OID:
  1660. {
  1661. DNS_entry* dns = NULL;
  1662. if (x509->subjAltNameSet && x509->altNames != NULL) {
  1663. /* Malloc GENERAL_NAME stack */
  1664. sk = wolfSSL_sk_new_null();
  1665. if (sk == NULL)
  1666. return NULL;
  1667. sk->type = STACK_TYPE_GEN_NAME;
  1668. /* alt names are DNS_entry structs */
  1669. if (c != NULL) {
  1670. if (x509->altNames->next != NULL) {
  1671. *c = -2; /* more then one found */
  1672. }
  1673. else {
  1674. *c = x509->subjAltNameCrit;
  1675. }
  1676. }
  1677. dns = x509->altNames;
  1678. /* Currently only support GEN_DNS type */
  1679. while (dns != NULL) {
  1680. gn = wolfSSL_GENERAL_NAME_new();
  1681. if (gn == NULL) {
  1682. WOLFSSL_MSG("Error creating GENERAL_NAME");
  1683. goto err;
  1684. }
  1685. gn->type = dns->type;
  1686. switch (gn->type) {
  1687. case ASN_DIR_TYPE:
  1688. {
  1689. int localIdx = 0;
  1690. unsigned char* n = (unsigned char*)XMALLOC(
  1691. dns->len + MAX_SEQ_SZ, x509->heap,
  1692. DYNAMIC_TYPE_TMP_BUFFER);
  1693. if (n == NULL) {
  1694. goto err;
  1695. }
  1696. localIdx += SetSequence(dns->len, n);
  1697. XMEMCPY(n + localIdx, dns->name, dns->len);
  1698. gn->d.dirn = wolfSSL_d2i_X509_NAME(NULL, &n,
  1699. dns->len + localIdx);
  1700. XFREE(n, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
  1701. if (gn->d.dirn == NULL) {
  1702. WOLFSSL_MSG("Convert altDirName to X509 "
  1703. "NAME failed");
  1704. goto err;
  1705. }
  1706. }
  1707. break;
  1708. default:
  1709. if (wolfSSL_ASN1_STRING_set(gn->d.ia5, dns->name,
  1710. dns->len) != WOLFSSL_SUCCESS) {
  1711. WOLFSSL_MSG("ASN1_STRING_set failed");
  1712. goto err;
  1713. }
  1714. }
  1715. dns = dns->next;
  1716. if (wolfSSL_sk_GENERAL_NAME_push(sk, gn) !=
  1717. WOLFSSL_SUCCESS) {
  1718. WOLFSSL_MSG("Error pushing ASN1 object onto stack");
  1719. goto err;
  1720. }
  1721. /* null so that it doesn't get pushed again after switch */
  1722. gn = NULL;
  1723. }
  1724. }
  1725. else {
  1726. WOLFSSL_MSG("No Alt Names set");
  1727. }
  1728. break;
  1729. }
  1730. case CRL_DIST_OID:
  1731. #if defined(OPENSSL_EXTRA)
  1732. if (x509->CRLdistSet && x509->CRLInfo != NULL) {
  1733. if (c != NULL) {
  1734. *c = x509->CRLdistCrit;
  1735. }
  1736. sk = wolfSSL_sk_new_null();
  1737. if (sk == NULL) {
  1738. return NULL;
  1739. }
  1740. sk->type = STACK_TYPE_DIST_POINT;
  1741. gn = wolfSSL_GENERAL_NAME_new();
  1742. if (gn == NULL) {
  1743. WOLFSSL_MSG("Error creating GENERAL_NAME");
  1744. goto err;
  1745. }
  1746. if (wolfSSL_GENERAL_NAME_set_type(gn, GEN_URI) !=
  1747. WOLFSSL_SUCCESS) {
  1748. WOLFSSL_MSG("Error setting GENERAL_NAME type");
  1749. goto err;
  1750. }
  1751. if (wolfSSL_ASN1_STRING_set(gn->d.uniformResourceIdentifier,
  1752. x509->CRLInfo, x509->CRLInfoSz) != WOLFSSL_SUCCESS) {
  1753. WOLFSSL_MSG("ASN1_STRING_set failed");
  1754. goto err;
  1755. }
  1756. /* wolfSSL only decodes one dist point */
  1757. dp = wolfSSL_DIST_POINT_new();
  1758. if (dp == NULL) {
  1759. WOLFSSL_MSG("Error creating DIST_POINT");
  1760. goto err;
  1761. }
  1762. /* push GENERAL_NAME onto fullname stack */
  1763. if (wolfSSL_sk_GENERAL_NAME_push(dp->distpoint->name.fullname,
  1764. gn) != WOLFSSL_SUCCESS) {
  1765. WOLFSSL_MSG("wolfSSL_sk_GENERAL_NAME_push error");
  1766. goto err;
  1767. }
  1768. /* push DIST_POINT onto stack */
  1769. if (wolfSSL_sk_DIST_POINT_push(sk, dp) != WOLFSSL_SUCCESS) {
  1770. WOLFSSL_MSG("Error pushing DIST_POINT onto stack");
  1771. goto err;
  1772. }
  1773. gn = NULL;
  1774. dp = NULL;
  1775. }
  1776. else {
  1777. WOLFSSL_MSG("No CRL dist set");
  1778. }
  1779. #endif /* OPENSSL_EXTRA */
  1780. break;
  1781. case AUTH_INFO_OID:
  1782. if (x509->authInfoSet && x509->authInfo != NULL) {
  1783. if (c != NULL) {
  1784. *c = x509->authInfoCrit;
  1785. }
  1786. obj = wolfSSL_ASN1_OBJECT_new();
  1787. if (obj == NULL) {
  1788. WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
  1789. return NULL;
  1790. }
  1791. obj->type = AUTH_INFO_OID;
  1792. obj->grp = oidCertExtType;
  1793. obj->obj = x509->authInfo;
  1794. obj->objSz = x509->authInfoSz;
  1795. }
  1796. else {
  1797. WOLFSSL_MSG("No Auth Info set");
  1798. }
  1799. break;
  1800. case AUTH_KEY_OID:
  1801. if (x509->authKeyIdSet) {
  1802. WOLFSSL_AUTHORITY_KEYID* akey = wolfSSL_AUTHORITY_KEYID_new();
  1803. if (!akey) {
  1804. WOLFSSL_MSG("Issue creating WOLFSSL_AUTHORITY_KEYID struct");
  1805. return NULL;
  1806. }
  1807. if (c != NULL) {
  1808. *c = x509->authKeyIdCrit;
  1809. }
  1810. obj = wolfSSL_ASN1_OBJECT_new();
  1811. if (obj == NULL) {
  1812. WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
  1813. wolfSSL_AUTHORITY_KEYID_free(akey);
  1814. return NULL;
  1815. }
  1816. obj->type = AUTH_KEY_OID;
  1817. obj->grp = oidCertExtType;
  1818. obj->obj = x509->authKeyId;
  1819. obj->objSz = x509->authKeyIdSz;
  1820. akey->issuer = obj;
  1821. return akey;
  1822. }
  1823. else {
  1824. WOLFSSL_MSG("No Auth Key set");
  1825. }
  1826. break;
  1827. case SUBJ_KEY_OID:
  1828. if (x509->subjKeyIdSet) {
  1829. if (c != NULL) {
  1830. *c = x509->subjKeyIdCrit;
  1831. }
  1832. obj = wolfSSL_ASN1_OBJECT_new();
  1833. if (obj == NULL) {
  1834. WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
  1835. return NULL;
  1836. }
  1837. obj->type = SUBJ_KEY_OID;
  1838. obj->grp = oidCertExtType;
  1839. obj->obj = x509->subjKeyId;
  1840. obj->objSz = x509->subjKeyIdSz;
  1841. }
  1842. else {
  1843. WOLFSSL_MSG("No Subject Key set");
  1844. }
  1845. break;
  1846. case CERT_POLICY_OID:
  1847. {
  1848. #ifdef WOLFSSL_CERT_EXT
  1849. int i;
  1850. if (x509->certPoliciesNb > 0) {
  1851. if (c != NULL) {
  1852. if (x509->certPoliciesNb > 1) {
  1853. *c = -2;
  1854. }
  1855. else {
  1856. *c = 0;
  1857. }
  1858. }
  1859. sk = wolfSSL_sk_new_asn1_obj();
  1860. if (sk == NULL) {
  1861. return NULL;
  1862. }
  1863. for (i = 0; i < x509->certPoliciesNb - 1; i++) {
  1864. obj = wolfSSL_ASN1_OBJECT_new();
  1865. if (obj == NULL) {
  1866. WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
  1867. wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
  1868. return NULL;
  1869. }
  1870. obj->type = CERT_POLICY_OID;
  1871. obj->grp = oidCertExtType;
  1872. obj->obj = (byte*)(x509->certPolicies[i]);
  1873. obj->objSz = MAX_CERTPOL_SZ;
  1874. if (wolfSSL_sk_ASN1_OBJECT_push(sk, obj)
  1875. != WOLFSSL_SUCCESS) {
  1876. WOLFSSL_MSG("Error pushing ASN1 object onto stack");
  1877. wolfSSL_ASN1_OBJECT_free(obj);
  1878. wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
  1879. sk = NULL;
  1880. }
  1881. }
  1882. obj = wolfSSL_ASN1_OBJECT_new();
  1883. if (obj == NULL) {
  1884. WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
  1885. wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
  1886. return NULL;
  1887. }
  1888. obj->type = CERT_POLICY_OID;
  1889. obj->grp = oidCertExtType;
  1890. obj->obj = (byte*)(x509->certPolicies[i]);
  1891. obj->objSz = MAX_CERTPOL_SZ;
  1892. }
  1893. else {
  1894. WOLFSSL_MSG("No Cert Policy set");
  1895. }
  1896. #elif defined(WOLFSSL_SEP)
  1897. if (x509->certPolicySet) {
  1898. if (c != NULL) {
  1899. *c = x509->certPolicyCrit;
  1900. }
  1901. obj = wolfSSL_ASN1_OBJECT_new();
  1902. if (obj == NULL) {
  1903. WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
  1904. return NULL;
  1905. }
  1906. obj->type = CERT_POLICY_OID;
  1907. obj->grp = oidCertExtType;
  1908. }
  1909. else {
  1910. WOLFSSL_MSG("No Cert Policy set");
  1911. }
  1912. #else
  1913. WOLFSSL_MSG("wolfSSL not built with WOLFSSL_SEP or WOLFSSL_CERT_EXT");
  1914. #endif
  1915. break;
  1916. }
  1917. case KEY_USAGE_OID:
  1918. {
  1919. WOLFSSL_ASN1_STRING* asn1str = NULL;
  1920. if (x509->keyUsageSet) {
  1921. if (c != NULL) {
  1922. *c = x509->keyUsageCrit;
  1923. }
  1924. asn1str = wolfSSL_ASN1_STRING_new();
  1925. if (asn1str == NULL) {
  1926. WOLFSSL_MSG("Failed to malloc ASN1_STRING");
  1927. return NULL;
  1928. }
  1929. if (wolfSSL_ASN1_STRING_set(asn1str, &x509->keyUsage,
  1930. sizeof(word16)) != WOLFSSL_SUCCESS) {
  1931. WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
  1932. wolfSSL_ASN1_STRING_free(asn1str);
  1933. return NULL;
  1934. }
  1935. asn1str->type = KEY_USAGE_OID;
  1936. }
  1937. else {
  1938. WOLFSSL_MSG("No Key Usage set");
  1939. }
  1940. /* don't add stack of and return bit string directly */
  1941. return asn1str;
  1942. }
  1943. case INHIBIT_ANY_OID:
  1944. WOLFSSL_MSG("INHIBIT ANY extension not supported");
  1945. break;
  1946. case EXT_KEY_USAGE_OID:
  1947. if (x509->extKeyUsageSrc != NULL) {
  1948. if (c != NULL) {
  1949. if (x509->extKeyUsageCount > 1) {
  1950. *c = -2;
  1951. }
  1952. else {
  1953. *c = x509->extKeyUsageCrit;
  1954. }
  1955. }
  1956. obj = wolfSSL_ASN1_OBJECT_new();
  1957. if (obj == NULL) {
  1958. WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
  1959. return NULL;
  1960. }
  1961. obj->type = EXT_KEY_USAGE_OID;
  1962. obj->grp = oidCertExtType;
  1963. obj->obj = x509->extKeyUsageSrc;
  1964. obj->objSz = x509->extKeyUsageSz;
  1965. }
  1966. else {
  1967. WOLFSSL_MSG("No Extended Key Usage set");
  1968. }
  1969. break;
  1970. case NAME_CONS_OID:
  1971. WOLFSSL_MSG("Name Constraint OID extension not supported");
  1972. break;
  1973. case PRIV_KEY_USAGE_PERIOD_OID:
  1974. WOLFSSL_MSG("Private Key Usage Period extension not supported");
  1975. break;
  1976. case SUBJ_INFO_ACC_OID:
  1977. WOLFSSL_MSG("Subject Info Access extension not supported");
  1978. break;
  1979. case POLICY_MAP_OID:
  1980. WOLFSSL_MSG("Policy Map extension not supported");
  1981. break;
  1982. case POLICY_CONST_OID:
  1983. WOLFSSL_MSG("Policy Constraint extension not supported");
  1984. break;
  1985. case ISSUE_ALT_NAMES_OID:
  1986. WOLFSSL_MSG("Issue Alt Names extension not supported");
  1987. break;
  1988. case TLS_FEATURE_OID:
  1989. WOLFSSL_MSG("TLS Feature extension not supported");
  1990. break;
  1991. default:
  1992. WOLFSSL_MSG("Unsupported/Unknown extension OID");
  1993. }
  1994. /* make sure stack of is allocated */
  1995. if ((obj || gn) && sk == NULL) {
  1996. sk = wolfSSL_sk_new_asn1_obj();
  1997. if (sk == NULL) {
  1998. goto err;
  1999. }
  2000. }
  2001. if (obj) {
  2002. if (wolfSSL_sk_ASN1_OBJECT_push(sk, obj) != WOLFSSL_SUCCESS) {
  2003. WOLFSSL_MSG("Error pushing ASN1_OBJECT object onto "
  2004. "stack.");
  2005. goto err;
  2006. }
  2007. }
  2008. ret = sk;
  2009. (void)idx;
  2010. return ret;
  2011. err:
  2012. if (obj) {
  2013. wolfSSL_ASN1_OBJECT_free(obj);
  2014. }
  2015. if (gn) {
  2016. wolfSSL_GENERAL_NAME_free(gn);
  2017. }
  2018. #ifdef OPENSSL_EXTRA
  2019. if (dp) {
  2020. wolfSSL_DIST_POINT_free(dp);
  2021. }
  2022. #endif
  2023. if (sk) {
  2024. wolfSSL_sk_free(sk);
  2025. }
  2026. return NULL;
  2027. }
  2028. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  2029. #ifdef OPENSSL_EXTRA
  2030. int wolfSSL_X509_add_altname_ex(WOLFSSL_X509* x509, const char* name,
  2031. word32 nameSz, int type)
  2032. {
  2033. DNS_entry* newAltName = NULL;
  2034. char* nameCopy = NULL;
  2035. if (x509 == NULL)
  2036. return WOLFSSL_FAILURE;
  2037. if ((name == NULL) || (nameSz == 0))
  2038. return WOLFSSL_SUCCESS;
  2039. newAltName = AltNameNew(x509->heap);
  2040. if (newAltName == NULL)
  2041. return WOLFSSL_FAILURE;
  2042. nameCopy = (char*)XMALLOC(nameSz + 1, x509->heap, DYNAMIC_TYPE_ALTNAME);
  2043. if (nameCopy == NULL) {
  2044. XFREE(newAltName, x509->heap, DYNAMIC_TYPE_ALTNAME);
  2045. return WOLFSSL_FAILURE;
  2046. }
  2047. XMEMCPY(nameCopy, name, nameSz);
  2048. nameCopy[nameSz] = '\0';
  2049. newAltName->next = x509->altNames;
  2050. newAltName->type = type;
  2051. newAltName->len = nameSz;
  2052. newAltName->name = nameCopy;
  2053. x509->altNames = newAltName;
  2054. return WOLFSSL_SUCCESS;
  2055. }
  2056. int wolfSSL_X509_add_altname(WOLFSSL_X509* x509, const char* name, int type)
  2057. {
  2058. word32 nameSz;
  2059. if (name == NULL)
  2060. return WOLFSSL_SUCCESS;
  2061. nameSz = (word32)XSTRLEN(name);
  2062. if (nameSz == 0)
  2063. return WOLFSSL_SUCCESS;
  2064. if (type == ASN_IP_TYPE) {
  2065. WOLFSSL_MSG("Type not supported, use wolfSSL_X509_add_altname_ex");
  2066. return WOLFSSL_FAILURE;
  2067. }
  2068. return wolfSSL_X509_add_altname_ex(x509, name, nameSz, type);
  2069. }
  2070. #ifndef NO_WOLFSSL_STUB
  2071. WOLFSSL_X509_EXTENSION *wolfSSL_X509_delete_ext(WOLFSSL_X509 *x509, int loc)
  2072. {
  2073. WOLFSSL_STUB("wolfSSL_X509_delete_ext");
  2074. (void)x509;
  2075. (void)loc;
  2076. return NULL;
  2077. }
  2078. /* currently LHASH is not implemented (and not needed for Apache port) */
  2079. WOLFSSL_X509_EXTENSION* wolfSSL_X509V3_EXT_conf_nid(
  2080. WOLF_LHASH_OF(CONF_VALUE)* conf, WOLFSSL_X509V3_CTX* ctx, int nid,
  2081. char* value)
  2082. {
  2083. WOLFSSL_STUB("wolfSSL_X509V3_EXT_conf_nid");
  2084. if (conf != NULL) {
  2085. WOLFSSL_MSG("Handling LHASH not implemented yet");
  2086. return NULL;
  2087. }
  2088. (void)conf;
  2089. (void)ctx;
  2090. (void)nid;
  2091. (void)value;
  2092. return NULL;
  2093. }
  2094. void wolfSSL_X509V3_set_ctx_nodb(WOLFSSL_X509V3_CTX* ctx)
  2095. {
  2096. WOLFSSL_STUB("wolfSSL_X509V3_set_ctx_nodb");
  2097. (void)ctx;
  2098. }
  2099. #endif /* !NO_WOLFSSL_STUB */
  2100. #ifdef OPENSSL_ALL
  2101. static WOLFSSL_X509_EXTENSION* createExtFromStr(int nid, const char *value)
  2102. {
  2103. WOLFSSL_X509_EXTENSION* ext;
  2104. if (value == NULL)
  2105. return NULL;
  2106. ext = wolfSSL_X509_EXTENSION_new();
  2107. if (ext == NULL) {
  2108. WOLFSSL_MSG("memory error");
  2109. return NULL;
  2110. }
  2111. ext->value.nid = nid;
  2112. switch (nid) {
  2113. case NID_subject_key_identifier:
  2114. case NID_authority_key_identifier:
  2115. if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
  2116. != WOLFSSL_SUCCESS) {
  2117. WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
  2118. goto err_cleanup;
  2119. }
  2120. ext->value.type = CTC_UTF8;
  2121. break;
  2122. case NID_subject_alt_name:
  2123. {
  2124. WOLFSSL_GENERAL_NAMES* gns;
  2125. WOLFSSL_GENERAL_NAME* gn;
  2126. if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
  2127. != WOLFSSL_SUCCESS) {
  2128. WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
  2129. goto err_cleanup;
  2130. }
  2131. ext->value.type = ASN_DNS_TYPE;
  2132. /* add stack of general names */
  2133. gns = wolfSSL_sk_new_null();
  2134. if (gns == NULL) {
  2135. WOLFSSL_MSG("wolfSSL_sk_new_null error");
  2136. goto err_cleanup;
  2137. }
  2138. ext->ext_sk = gns; /* wolfSSL_X509_EXTENSION_free will handle
  2139. * free'ing gns */
  2140. gns->type = STACK_TYPE_GEN_NAME;
  2141. gn = wolfSSL_GENERAL_NAME_new();
  2142. if (gn == NULL) {
  2143. WOLFSSL_MSG("wolfSSL_GENERAL_NAME_new error");
  2144. goto err_cleanup;
  2145. }
  2146. if (wolfSSL_sk_GENERAL_NAME_push(gns, gn) != WOLFSSL_SUCCESS) {
  2147. WOLFSSL_MSG("wolfSSL_sk_GENERAL_NAME_push error");
  2148. wolfSSL_GENERAL_NAME_free(gn);
  2149. goto err_cleanup;
  2150. }
  2151. if (wolfSSL_ASN1_STRING_set(gn->d.ia5, value, -1)
  2152. != WOLFSSL_SUCCESS) {
  2153. WOLFSSL_MSG("wolfSSL_ASN1_STRING_set failed");
  2154. goto err_cleanup;
  2155. }
  2156. gn->type = ASN_DNS_TYPE;
  2157. break;
  2158. }
  2159. case NID_key_usage:
  2160. if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
  2161. != WOLFSSL_SUCCESS) {
  2162. WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
  2163. goto err_cleanup;
  2164. }
  2165. ext->value.type = KEY_USAGE_OID;
  2166. break;
  2167. default:
  2168. WOLFSSL_MSG("invalid or unsupported NID");
  2169. goto err_cleanup;
  2170. }
  2171. return ext;
  2172. err_cleanup:
  2173. wolfSSL_X509_EXTENSION_free(ext);
  2174. return NULL;
  2175. }
  2176. /**
  2177. * Create a WOLFSSL_X509_EXTENSION from the input arguments.
  2178. * @param conf Not used
  2179. * @param ctx Not used
  2180. * @param nid Interprets the value parameter as the x509 extension that
  2181. * corresponds to this NID.
  2182. * @param value A NULL terminated string that is taken as the value of the
  2183. * newly created extension object.
  2184. * @return WOLFSSL_X509_EXTENSION* on success or NULL on failure.
  2185. */
  2186. WOLFSSL_X509_EXTENSION* wolfSSL_X509V3_EXT_nconf_nid(WOLFSSL_CONF* conf,
  2187. WOLFSSL_X509V3_CTX *ctx, int nid, const char *value)
  2188. {
  2189. WOLFSSL_ENTER("wolfSSL_X509V3_EXT_nconf_nid");
  2190. if (value == NULL) {
  2191. WOLFSSL_MSG("value NULL parameter");
  2192. return NULL;
  2193. }
  2194. if (conf != NULL || ctx != NULL) {
  2195. WOLFSSL_MSG("wolfSSL_X509V3_EXT_nconf_nid does not handle either "
  2196. "conf or ctx parameters");
  2197. }
  2198. return createExtFromStr(nid, value);
  2199. }
  2200. /**
  2201. * Create a WOLFSSL_X509_EXTENSION from the input arguments.
  2202. * @param conf Not used
  2203. * @param ctx Not used
  2204. * @param sName The textual representation of the NID that the value parameter
  2205. * should be interpreted as.
  2206. * @param value A NULL terminated string that is taken as the value of the
  2207. * newly created extension object.
  2208. * @return WOLFSSL_X509_EXTENSION* on success or NULL on failure.
  2209. */
  2210. WOLFSSL_X509_EXTENSION* wolfSSL_X509V3_EXT_nconf(WOLFSSL_CONF *conf,
  2211. WOLFSSL_X509V3_CTX *ctx, const char *sName, const char *value)
  2212. {
  2213. const WOLFSSL_ObjectInfo* info = wolfssl_object_info;
  2214. size_t i;
  2215. WOLFSSL_ENTER("wolfSSL_X509V3_EXT_nconf");
  2216. if (value == NULL) {
  2217. WOLFSSL_MSG("value NULL parameter");
  2218. return NULL;
  2219. }
  2220. if (conf != NULL || ctx != NULL) {
  2221. WOLFSSL_MSG("wolfSSL_X509V3_EXT_nconf does not handle either "
  2222. "conf or ctx parameters");
  2223. }
  2224. for (i = 0; i < wolfssl_object_info_sz; i++, info++) {
  2225. if (XSTRCMP(info->sName, sName) == 0)
  2226. return createExtFromStr(info->nid, value);
  2227. }
  2228. WOLFSSL_MSG("value didn't match any known NID");
  2229. return NULL;
  2230. }
  2231. static void wolfSSL_X509V3_EXT_METHOD_populate(WOLFSSL_v3_ext_method *method,
  2232. int nid)
  2233. {
  2234. if (!method)
  2235. return;
  2236. WOLFSSL_ENTER("wolfSSL_X509V3_EXT_METHOD_populate");
  2237. switch (nid) {
  2238. case NID_subject_key_identifier:
  2239. method->i2s = (X509V3_EXT_I2S)wolfSSL_i2s_ASN1_STRING;
  2240. FALL_THROUGH;
  2241. case NID_authority_key_identifier:
  2242. case NID_key_usage:
  2243. case NID_certificate_policies:
  2244. case NID_policy_mappings:
  2245. case NID_subject_alt_name:
  2246. case NID_issuer_alt_name:
  2247. case NID_basic_constraints:
  2248. case NID_name_constraints:
  2249. case NID_policy_constraints:
  2250. case NID_ext_key_usage:
  2251. case NID_crl_distribution_points:
  2252. case NID_inhibit_any_policy:
  2253. case NID_info_access:
  2254. WOLFSSL_MSG("Nothing to populate for current NID");
  2255. break;
  2256. default:
  2257. WOLFSSL_MSG("Unknown or unsupported NID");
  2258. break;
  2259. }
  2260. return;
  2261. }
  2262. /**
  2263. * @param nid One of the NID_* constants defined in asn.h
  2264. * @param crit
  2265. * @param data This data is copied to the returned extension.
  2266. * @return
  2267. */
  2268. WOLFSSL_X509_EXTENSION *wolfSSL_X509V3_EXT_i2d(int nid, int crit,
  2269. void *data)
  2270. {
  2271. WOLFSSL_X509_EXTENSION *ext = NULL;
  2272. WOLFSSL_ASN1_STRING* asn1str = NULL;
  2273. WOLFSSL_ENTER("wolfSSL_X509V3_EXT_i2d");
  2274. if (!data) {
  2275. return NULL;
  2276. }
  2277. if (!(ext = wolfSSL_X509_EXTENSION_new())) {
  2278. return NULL;
  2279. }
  2280. wolfSSL_X509V3_EXT_METHOD_populate(&ext->ext_method, nid);
  2281. switch (nid) {
  2282. case NID_subject_key_identifier:
  2283. /* WOLFSSL_ASN1_STRING */
  2284. case NID_key_usage:
  2285. /* WOLFSSL_ASN1_STRING */
  2286. {
  2287. asn1str = (WOLFSSL_ASN1_STRING*)data;
  2288. ext->value = *asn1str;
  2289. if (asn1str->isDynamic) {
  2290. ext->value.data = (char*)XMALLOC(asn1str->length, NULL,
  2291. DYNAMIC_TYPE_OPENSSL);
  2292. if (!ext->value.data) {
  2293. WOLFSSL_MSG("malloc failed");
  2294. /* Zero so that no existing memory is freed */
  2295. XMEMSET(&ext->value, 0, sizeof(WOLFSSL_ASN1_STRING));
  2296. goto err_cleanup;
  2297. }
  2298. XMEMCPY(ext->value.data, asn1str->data, asn1str->length);
  2299. }
  2300. else {
  2301. ext->value.data = ext->value.strData;
  2302. }
  2303. if (!(ext->obj = wolfSSL_OBJ_nid2obj(nid))) {
  2304. WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
  2305. goto err_cleanup;
  2306. }
  2307. break;
  2308. }
  2309. case NID_subject_alt_name:
  2310. /* typedef STACK_OF(GENERAL_NAME) GENERAL_NAMES */
  2311. case NID_issuer_alt_name:
  2312. /* typedef STACK_OF(GENERAL_NAME) GENERAL_NAMES */
  2313. case NID_ext_key_usage:
  2314. /* typedef STACK_OF(ASN1_OBJECT) EXTENDED_KEY_USAGE */
  2315. case NID_info_access:
  2316. /* typedef STACK_OF(ACCESS_DESCRIPTION) AUTHORITY_INFO_ACCESS */
  2317. {
  2318. WOLFSSL_STACK* sk = (WOLFSSL_STACK*)data;
  2319. if (ext->ext_sk) {
  2320. wolfSSL_sk_pop_free(ext->ext_sk, NULL);
  2321. }
  2322. if (!(ext->ext_sk = wolfSSL_sk_dup(sk))) {
  2323. WOLFSSL_MSG("wolfSSL_sk_dup failed");
  2324. goto err_cleanup;
  2325. }
  2326. break;
  2327. }
  2328. case NID_basic_constraints:
  2329. {
  2330. /* WOLFSSL_BASIC_CONSTRAINTS */
  2331. WOLFSSL_BASIC_CONSTRAINTS* bc = (WOLFSSL_BASIC_CONSTRAINTS*)data;
  2332. if (!(ext->obj = wolfSSL_ASN1_OBJECT_new())) {
  2333. WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
  2334. goto err_cleanup;
  2335. }
  2336. ext->obj->ca = bc->ca;
  2337. if (bc->pathlen) {
  2338. ext->obj->pathlen = wolfSSL_ASN1_INTEGER_dup(bc->pathlen);
  2339. if (!ext->obj->pathlen) {
  2340. WOLFSSL_MSG("wolfSSL_ASN1_INTEGER_dup failed");
  2341. goto err_cleanup;
  2342. }
  2343. }
  2344. break;
  2345. }
  2346. case NID_authority_key_identifier:
  2347. {
  2348. /* AUTHORITY_KEYID */
  2349. WOLFSSL_AUTHORITY_KEYID* akey = (WOLFSSL_AUTHORITY_KEYID*)data;
  2350. if (akey->keyid) {
  2351. if (wolfSSL_ASN1_STRING_set(&ext->value, akey->keyid->data,
  2352. akey->keyid->length) != WOLFSSL_SUCCESS) {
  2353. WOLFSSL_MSG("wolfSSL_ASN1_STRING_set failed");
  2354. goto err_cleanup;
  2355. }
  2356. ext->value.type = akey->keyid->type;
  2357. if (!(ext->obj = wolfSSL_OBJ_nid2obj(nid))) {
  2358. WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
  2359. goto err_cleanup;
  2360. }
  2361. }
  2362. else if (akey->issuer) {
  2363. ext->obj = wolfSSL_ASN1_OBJECT_dup(akey->issuer);
  2364. if (!ext->obj) {
  2365. WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_dup failed");
  2366. goto err_cleanup;
  2367. }
  2368. }
  2369. else {
  2370. WOLFSSL_MSG("NID_authority_key_identifier empty data");
  2371. goto err_cleanup;
  2372. }
  2373. break;
  2374. }
  2375. case NID_inhibit_any_policy:
  2376. /* ASN1_INTEGER */
  2377. case NID_certificate_policies:
  2378. /* STACK_OF(POLICYINFO) */
  2379. case NID_policy_mappings:
  2380. /* STACK_OF(POLICY_MAPPING) */
  2381. case NID_name_constraints:
  2382. /* NAME_CONSTRAINTS */
  2383. case NID_policy_constraints:
  2384. /* POLICY_CONSTRAINTS */
  2385. case NID_crl_distribution_points:
  2386. /* typedef STACK_OF(DIST_POINT) CRL_DIST_POINTS */
  2387. default:
  2388. WOLFSSL_MSG("Unknown or unsupported NID");
  2389. break;
  2390. }
  2391. ext->crit = crit;
  2392. return ext;
  2393. err_cleanup:
  2394. if (ext) {
  2395. wolfSSL_X509_EXTENSION_free(ext);
  2396. }
  2397. if (asn1str) {
  2398. wolfSSL_ASN1_STRING_free(asn1str);
  2399. }
  2400. return NULL;
  2401. }
  2402. /* Returns pointer to ASN1_OBJECT from an X509_EXTENSION object */
  2403. WOLFSSL_ASN1_OBJECT* wolfSSL_X509_EXTENSION_get_object \
  2404. (WOLFSSL_X509_EXTENSION* ext)
  2405. {
  2406. WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_get_object");
  2407. if(ext == NULL)
  2408. return NULL;
  2409. return ext->obj;
  2410. }
  2411. /**
  2412. * duplicates the 'obj' input and sets it into the 'ext' structure
  2413. * returns WOLFSSL_SUCCESS on success
  2414. */
  2415. int wolfSSL_X509_EXTENSION_set_object(WOLFSSL_X509_EXTENSION* ext,
  2416. const WOLFSSL_ASN1_OBJECT* obj)
  2417. {
  2418. WOLFSSL_ASN1_OBJECT *current;
  2419. WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_set_object");
  2420. if (ext == NULL)
  2421. return WOLFSSL_FAILURE;
  2422. current = wolfSSL_X509_EXTENSION_get_object(ext);
  2423. if (current != NULL) {
  2424. wolfSSL_ASN1_OBJECT_free(current);
  2425. }
  2426. ext->obj = wolfSSL_ASN1_OBJECT_dup((WOLFSSL_ASN1_OBJECT*)obj);
  2427. return WOLFSSL_SUCCESS;
  2428. }
  2429. #endif /* OPENSSL_ALL */
  2430. /* Returns pointer to ASN1_STRING in X509_EXTENSION object */
  2431. WOLFSSL_ASN1_STRING* wolfSSL_X509_EXTENSION_get_data(WOLFSSL_X509_EXTENSION* ext)
  2432. {
  2433. WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_get_data");
  2434. if (ext == NULL)
  2435. return NULL;
  2436. return &ext->value;
  2437. }
  2438. /**
  2439. * Creates a duplicate of input 'data' and sets it into 'ext' structure
  2440. * returns WOLFSSL_SUCCESS on success
  2441. */
  2442. int wolfSSL_X509_EXTENSION_set_data(WOLFSSL_X509_EXTENSION* ext,
  2443. WOLFSSL_ASN1_STRING* data)
  2444. {
  2445. WOLFSSL_ASN1_STRING* current;
  2446. if (ext == NULL || data == NULL)
  2447. return WOLFSSL_FAILURE;
  2448. current = wolfSSL_X509_EXTENSION_get_data(ext);
  2449. if (current->length > 0 && current->data != NULL && current->isDynamic) {
  2450. XFREE(current->data, NULL, DYNAMIC_TYPE_OPENSSL);
  2451. }
  2452. return wolfSSL_ASN1_STRING_copy(&ext->value, data);
  2453. }
  2454. #if !defined(NO_PWDBASED)
  2455. int wolfSSL_X509_digest(const WOLFSSL_X509* x509, const WOLFSSL_EVP_MD* digest,
  2456. unsigned char* buf, unsigned int* len)
  2457. {
  2458. int ret;
  2459. WOLFSSL_ENTER("wolfSSL_X509_digest");
  2460. if (x509 == NULL || digest == NULL) {
  2461. WOLFSSL_MSG("Null argument found");
  2462. return WOLFSSL_FAILURE;
  2463. }
  2464. if (x509->derCert == NULL) {
  2465. WOLFSSL_MSG("No DER certificate stored in X509");
  2466. return WOLFSSL_FAILURE;
  2467. }
  2468. ret = wolfSSL_EVP_Digest(x509->derCert->buffer, x509->derCert->length, buf,
  2469. len, digest, NULL);
  2470. WOLFSSL_LEAVE("wolfSSL_X509_digest", ret);
  2471. return ret;
  2472. }
  2473. int wolfSSL_X509_pubkey_digest(const WOLFSSL_X509 *x509,
  2474. const WOLFSSL_EVP_MD *digest, unsigned char* buf, unsigned int* len)
  2475. {
  2476. int ret;
  2477. WOLFSSL_ENTER("wolfSSL_X509_pubkey_digest");
  2478. if (x509 == NULL || digest == NULL) {
  2479. WOLFSSL_MSG("Null argument found");
  2480. return WOLFSSL_FAILURE;
  2481. }
  2482. if (x509->pubKey.buffer == NULL || x509->pubKey.length == 0) {
  2483. WOLFSSL_MSG("No DER public key stored in X509");
  2484. return WOLFSSL_FAILURE;
  2485. }
  2486. ret = wolfSSL_EVP_Digest(x509->pubKey.buffer, x509->pubKey.length, buf,
  2487. len, digest, NULL);
  2488. WOLFSSL_LEAVE("wolfSSL_X509_pubkey_digest", ret);
  2489. return ret;
  2490. }
  2491. #endif
  2492. #endif /* OPENSSL_EXTRA */
  2493. #ifdef OPENSSL_EXTRA
  2494. #ifndef NO_WOLFSSL_STUB
  2495. const char* wolfSSL_X509_get_default_cert_file_env(void)
  2496. {
  2497. WOLFSSL_STUB("X509_get_default_cert_file_env");
  2498. return NULL;
  2499. }
  2500. const char* wolfSSL_X509_get_default_cert_file(void)
  2501. {
  2502. WOLFSSL_STUB("X509_get_default_cert_file");
  2503. return NULL;
  2504. }
  2505. const char* wolfSSL_X509_get_default_cert_dir_env(void)
  2506. {
  2507. WOLFSSL_STUB("X509_get_default_cert_dir_env");
  2508. return NULL;
  2509. }
  2510. const char* wolfSSL_X509_get_default_cert_dir(void)
  2511. {
  2512. WOLFSSL_STUB("X509_get_default_cert_dir");
  2513. return NULL;
  2514. }
  2515. #endif
  2516. #endif /* OPENSSL_EXTRA */
  2517. #if defined(KEEP_PEER_CERT) || defined(SESSION_CERTS) || \
  2518. defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  2519. /* user externally called free X509, if dynamic go ahead with free, otherwise
  2520. * don't */
  2521. static void ExternalFreeX509(WOLFSSL_X509* x509)
  2522. {
  2523. #if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
  2524. int doFree = 0;
  2525. #endif
  2526. WOLFSSL_ENTER("ExternalFreeX509");
  2527. if (x509) {
  2528. #ifdef HAVE_EX_DATA_CLEANUP_HOOKS
  2529. wolfSSL_CRYPTO_cleanup_ex_data(&x509->ex_data);
  2530. #endif
  2531. if (x509->dynamicMemory) {
  2532. #if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
  2533. #ifndef SINGLE_THREADED
  2534. if (wc_LockMutex(&x509->refMutex) != 0) {
  2535. WOLFSSL_MSG("Couldn't lock x509 mutex");
  2536. }
  2537. #endif
  2538. /* only free if all references to it are done */
  2539. x509->refCount--;
  2540. if (x509->refCount == 0)
  2541. doFree = 1;
  2542. #ifndef SINGLE_THREADED
  2543. wc_UnLockMutex(&x509->refMutex);
  2544. #endif
  2545. #endif /* OPENSSL_EXTRA_X509_SMALL || OPENSSL_EXTRA */
  2546. #if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
  2547. if (doFree)
  2548. #endif /* OPENSSL_EXTRA_X509_SMALL || OPENSSL_EXTRA */
  2549. {
  2550. FreeX509(x509);
  2551. XFREE(x509, x509->heap, DYNAMIC_TYPE_X509);
  2552. }
  2553. } else {
  2554. WOLFSSL_MSG("free called on non dynamic object, not freeing");
  2555. }
  2556. }
  2557. }
  2558. /* Frees an external WOLFSSL_X509 structure */
  2559. WOLFSSL_ABI
  2560. void wolfSSL_X509_free(WOLFSSL_X509* x509)
  2561. {
  2562. WOLFSSL_ENTER("wolfSSL_FreeX509");
  2563. ExternalFreeX509(x509);
  2564. }
  2565. /* copy name into in buffer, at most sz bytes, if buffer is null will
  2566. malloc buffer, call responsible for freeing */
  2567. WOLFSSL_ABI
  2568. char* wolfSSL_X509_NAME_oneline(WOLFSSL_X509_NAME* name, char* in, int sz)
  2569. {
  2570. int copySz;
  2571. if (name == NULL) {
  2572. WOLFSSL_MSG("WOLFSSL_X509_NAME pointer was NULL");
  2573. return NULL;
  2574. }
  2575. copySz = min(sz, name->sz);
  2576. WOLFSSL_ENTER("wolfSSL_X509_NAME_oneline");
  2577. if (!name->sz) return in;
  2578. if (!in) {
  2579. #ifdef WOLFSSL_STATIC_MEMORY
  2580. WOLFSSL_MSG("Using static memory -- please pass in a buffer");
  2581. return NULL;
  2582. #else
  2583. in = (char*)XMALLOC(name->sz, NULL, DYNAMIC_TYPE_OPENSSL);
  2584. if (!in ) return in;
  2585. copySz = name->sz;
  2586. #endif
  2587. }
  2588. if (copySz <= 0)
  2589. return in;
  2590. XMEMCPY(in, name->name, copySz - 1);
  2591. in[copySz - 1] = 0;
  2592. return in;
  2593. }
  2594. #ifdef OPENSSL_EXTRA
  2595. unsigned long wolfSSL_X509_NAME_hash(WOLFSSL_X509_NAME* name)
  2596. {
  2597. #ifndef NO_SHA
  2598. byte digest[WC_SHA_DIGEST_SIZE];
  2599. unsigned long ret = 0;
  2600. unsigned char* canon_name = NULL;
  2601. int size = 0;
  2602. WOLFSSL_ENTER("wolfSSL_X509_NAME_hash");
  2603. if (name == NULL) {
  2604. WOLFSSL_MSG("WOLFSSL_X509_NAME pointer was NULL");
  2605. return 0;
  2606. }
  2607. if (name->sz == 0) {
  2608. WOLFSSL_MSG("nothing to hash in WOLFSSL_X509_NAME");
  2609. return 0;
  2610. }
  2611. size = wolfSSL_i2d_X509_NAME_canon(name, &canon_name);
  2612. if (size <= 0){
  2613. WOLFSSL_MSG("wolfSSL_i2d_X509_NAME_canon error");
  2614. return 0;
  2615. }
  2616. if (wc_ShaHash((byte*)canon_name, size, digest) != 0) {
  2617. WOLFSSL_MSG("wc_ShaHash error");
  2618. return 0;
  2619. }
  2620. XFREE(canon_name, NULL, DYNAMIC_TYPE_OPENSSL);
  2621. ret = (unsigned long) digest[0];
  2622. ret |= ((unsigned long) digest[1]) << 8;
  2623. ret |= ((unsigned long) digest[2]) << 16;
  2624. ret |= ((unsigned long) digest[3]) << 24;
  2625. return ret;
  2626. #else
  2627. (void)name;
  2628. WOLFSSL_MSG("wolfSSL_X509_NAME_hash sha support not compiled in");
  2629. return 0;
  2630. #endif
  2631. }
  2632. #endif /* OPENSSL_EXTRA */
  2633. #if defined(OPENSSL_EXTRA) && defined(XSNPRINTF)
  2634. /* Copies X509 subject name into a buffer, with comma-separated name entries
  2635. * (matching OpenSSL v1.0.0 format)
  2636. * Example Output for Issuer:
  2637. *
  2638. * C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting,
  2639. * CN=www.wolfssl.com, emailAddress=info@wolfssl.com
  2640. */
  2641. char* wolfSSL_X509_get_name_oneline(WOLFSSL_X509_NAME* name, char* in, int sz)
  2642. {
  2643. WOLFSSL_X509_NAME_ENTRY* entry;
  2644. int nameSz, strSz, count, i;
  2645. int totalSz = 0;
  2646. char *str;
  2647. char tmpBuf[256];
  2648. char buf[80];
  2649. const char* sn;
  2650. WOLFSSL_ENTER("wolfSSL_X509_get_name_oneline");
  2651. if (name == NULL) {
  2652. WOLFSSL_MSG("wolfSSL_X509_get_subject_name failed");
  2653. return NULL;
  2654. }
  2655. #ifdef WOLFSSL_STATIC_MEMORY
  2656. if (!in) {
  2657. WOLFSSL_MSG("Using static memory -- please pass in a buffer");
  2658. return NULL;
  2659. }
  2660. #endif
  2661. tmpBuf[0] = '\0'; /* Make sure tmpBuf is NULL terminated */
  2662. /* Loop through X509 name entries and copy new format to buffer */
  2663. count = wolfSSL_X509_NAME_entry_count(name);
  2664. for (i = 0; i < count; i++) {
  2665. /* Get name entry and size */
  2666. entry = wolfSSL_X509_NAME_get_entry(name, i);
  2667. if (entry == NULL) {
  2668. WOLFSSL_MSG("wolfSSL_X509_NAME_get_entry failed");
  2669. return NULL;
  2670. }
  2671. nameSz = wolfSSL_X509_NAME_get_text_by_NID(name, entry->nid, buf,
  2672. sizeof(buf));
  2673. if (nameSz < 0) {
  2674. WOLFSSL_MSG("wolfSSL_X509_NAME_get_text_by_NID failed");
  2675. return NULL;
  2676. }
  2677. /* Get short name */
  2678. sn = wolfSSL_OBJ_nid2sn(entry->nid);
  2679. if (sn == NULL) {
  2680. WOLFSSL_MSG("OBJ_nid2sn failed");
  2681. return NULL;
  2682. }
  2683. /* Copy sn and name text to buffer
  2684. * Add extra strSz for '=', ',', ' ' and '\0' characters in XSNPRINTF.
  2685. */
  2686. if (i != count - 1) {
  2687. strSz = (int)XSTRLEN(sn) + nameSz + 4;
  2688. totalSz+= strSz;
  2689. str = (char*)XMALLOC(strSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  2690. if (str == NULL) {
  2691. WOLFSSL_MSG("Memory error");
  2692. return NULL;
  2693. }
  2694. if (XSNPRINTF(str, strSz, "%s=%s, ", sn, buf) >= strSz) {
  2695. WOLFSSL_MSG("buffer overrun");
  2696. return NULL;
  2697. }
  2698. }
  2699. else {
  2700. /* Copy last name entry
  2701. * Add extra strSz for '=' and '\0' characters in XSNPRINTF.
  2702. */
  2703. strSz = (int)XSTRLEN(sn) + nameSz + 2;
  2704. totalSz+= strSz;
  2705. str = (char*)XMALLOC(strSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  2706. if (str == NULL) {
  2707. WOLFSSL_MSG("Memory error");
  2708. return NULL;
  2709. }
  2710. if (XSNPRINTF(str, strSz, "%s=%s", sn, buf) >= strSz) {
  2711. WOLFSSL_MSG("buffer overrun");
  2712. return NULL;
  2713. }
  2714. }
  2715. /* Copy string to tmpBuf */
  2716. XSTRNCAT(tmpBuf, str, strSz);
  2717. XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  2718. }
  2719. /* Allocate space based on total string size if no buffer was provided */
  2720. if (!in) {
  2721. in = (char*)XMALLOC(totalSz+1, NULL, DYNAMIC_TYPE_OPENSSL);
  2722. if (in == NULL) {
  2723. WOLFSSL_MSG("Memory error");
  2724. return in;
  2725. }
  2726. }
  2727. else {
  2728. if (totalSz > sz) {
  2729. WOLFSSL_MSG("Memory error");
  2730. return NULL;
  2731. }
  2732. }
  2733. XMEMCPY(in, tmpBuf, totalSz);
  2734. in[totalSz] = '\0';
  2735. return in;
  2736. }
  2737. #endif
  2738. /* Wraps wolfSSL_X509_d2i
  2739. *
  2740. * returns a WOLFSSL_X509 structure pointer on success and NULL on fail
  2741. */
  2742. WOLFSSL_X509* wolfSSL_d2i_X509(WOLFSSL_X509** x509, const unsigned char** in,
  2743. int len)
  2744. {
  2745. WOLFSSL_X509* newX509 = NULL;
  2746. WOLFSSL_ENTER("wolfSSL_d2i_X509");
  2747. if (in == NULL) {
  2748. WOLFSSL_MSG("NULL input for wolfSSL_d2i_X509");
  2749. return NULL;
  2750. }
  2751. newX509 = wolfSSL_X509_d2i(x509, *in, len);
  2752. if (newX509 != NULL) {
  2753. *in += newX509->derCert->length;
  2754. }
  2755. return newX509;
  2756. }
  2757. static WOLFSSL_X509* d2i_X509orX509REQ(WOLFSSL_X509** x509,
  2758. const byte* in, int len, int req)
  2759. {
  2760. WOLFSSL_X509 *newX509 = NULL;
  2761. int type = req ? CERTREQ_TYPE : CERT_TYPE;
  2762. WOLFSSL_ENTER("wolfSSL_X509_d2i");
  2763. if (in != NULL && len != 0
  2764. #ifndef WOLFSSL_CERT_REQ
  2765. && req == 0
  2766. #else
  2767. && (req == 0 || req == 1)
  2768. #endif
  2769. ) {
  2770. #ifdef WOLFSSL_SMALL_STACK
  2771. DecodedCert* cert;
  2772. #else
  2773. DecodedCert cert[1];
  2774. #endif
  2775. #ifdef WOLFSSL_SMALL_STACK
  2776. cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL,
  2777. DYNAMIC_TYPE_DCERT);
  2778. if (cert == NULL)
  2779. return NULL;
  2780. #endif
  2781. InitDecodedCert(cert, (byte*)in, len, NULL);
  2782. #ifdef WOLFSSL_CERT_REQ
  2783. cert->isCSR = (byte)req;
  2784. #endif
  2785. if (ParseCertRelative(cert, type, 0, NULL) == 0) {
  2786. newX509 = wolfSSL_X509_new();
  2787. if (newX509 != NULL) {
  2788. if (CopyDecodedToX509(newX509, cert) != 0) {
  2789. wolfSSL_X509_free(newX509);
  2790. newX509 = NULL;
  2791. }
  2792. }
  2793. }
  2794. FreeDecodedCert(cert);
  2795. #ifdef WOLFSSL_SMALL_STACK
  2796. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  2797. #endif
  2798. }
  2799. if (x509 != NULL)
  2800. *x509 = newX509;
  2801. return newX509;
  2802. }
  2803. int wolfSSL_X509_get_isCA(WOLFSSL_X509* x509)
  2804. {
  2805. int isCA = 0;
  2806. WOLFSSL_ENTER("wolfSSL_X509_get_isCA");
  2807. if (x509 != NULL)
  2808. isCA = x509->isCa;
  2809. WOLFSSL_LEAVE("wolfSSL_X509_get_isCA", isCA);
  2810. return isCA;
  2811. }
  2812. WOLFSSL_X509* wolfSSL_X509_d2i(WOLFSSL_X509** x509, const byte* in, int len)
  2813. {
  2814. return d2i_X509orX509REQ(x509, in, len, 0);
  2815. }
  2816. #ifdef WOLFSSL_CERT_REQ
  2817. WOLFSSL_X509* wolfSSL_X509_REQ_d2i(WOLFSSL_X509** x509,
  2818. const unsigned char* in, int len)
  2819. {
  2820. return d2i_X509orX509REQ(x509, in, len, 1);
  2821. }
  2822. #endif
  2823. #endif /* KEEP_PEER_CERT || SESSION_CERTS || OPENSSL_EXTRA ||
  2824. OPENSSL_EXTRA_X509_SMALL */
  2825. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  2826. /* returns the number of entries in the WOLFSSL_X509_NAME */
  2827. int wolfSSL_X509_NAME_entry_count(WOLFSSL_X509_NAME* name)
  2828. {
  2829. int count = 0;
  2830. WOLFSSL_ENTER("wolfSSL_X509_NAME_entry_count");
  2831. if (name != NULL)
  2832. count = name->entrySz;
  2833. WOLFSSL_LEAVE("wolfSSL_X509_NAME_entry_count", count);
  2834. return count;
  2835. }
  2836. #endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
  2837. #if defined(OPENSSL_EXTRA) || \
  2838. defined(KEEP_OUR_CERT) || defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
  2839. /* return the next, if any, altname from the peer cert */
  2840. WOLFSSL_ABI
  2841. char* wolfSSL_X509_get_next_altname(WOLFSSL_X509* cert)
  2842. {
  2843. char* ret = NULL;
  2844. WOLFSSL_ENTER("wolfSSL_X509_get_next_altname");
  2845. /* don't have any to work with */
  2846. if (cert == NULL || cert->altNames == NULL)
  2847. return NULL;
  2848. /* already went through them */
  2849. if (cert->altNamesNext == NULL)
  2850. return NULL;
  2851. ret = cert->altNamesNext->name;
  2852. #if defined(OPENSSL_ALL) || defined(WOLFSSL_IP_ALT_NAME)
  2853. /* return the IP address as a string */
  2854. if (cert->altNamesNext->type == ASN_IP_TYPE) {
  2855. ret = cert->altNamesNext->ipString;
  2856. }
  2857. #endif
  2858. cert->altNamesNext = cert->altNamesNext->next;
  2859. return ret;
  2860. }
  2861. int wolfSSL_X509_get_signature(WOLFSSL_X509* x509,
  2862. unsigned char* buf, int* bufSz)
  2863. {
  2864. WOLFSSL_ENTER("wolfSSL_X509_get_signature");
  2865. if (x509 == NULL || bufSz == NULL || (*bufSz < (int)x509->sig.length &&
  2866. buf != NULL))
  2867. return WOLFSSL_FATAL_ERROR;
  2868. if (buf != NULL)
  2869. XMEMCPY(buf, x509->sig.buffer, x509->sig.length);
  2870. *bufSz = x509->sig.length;
  2871. return WOLFSSL_SUCCESS;
  2872. }
  2873. /* Getter function that copies over the DER public key buffer to "buf" and
  2874. * sets the size in bufSz. If "buf" is NULL then just bufSz is set to needed
  2875. * buffer size. "bufSz" passed in should initially be set by the user to be
  2876. * the size of "buf". This gets checked to make sure the buffer is large
  2877. * enough to hold the public key.
  2878. *
  2879. * Note: this is the X.509 form of key with "header" info.
  2880. * return WOLFSSL_SUCCESS on success
  2881. */
  2882. int wolfSSL_X509_get_pubkey_buffer(WOLFSSL_X509* x509,
  2883. unsigned char* buf, int* bufSz)
  2884. {
  2885. #ifdef WOLFSSL_SMALL_STACK
  2886. DecodedCert* cert;
  2887. #else
  2888. DecodedCert cert[1];
  2889. #endif
  2890. word32 idx;
  2891. const byte* der;
  2892. int length = 0;
  2893. int ret = 0, derSz = 0;
  2894. int badDate = 0;
  2895. const byte* pubKeyX509 = NULL;
  2896. int pubKeyX509Sz = 0;
  2897. WOLFSSL_ENTER("wolfSSL_X509_get_pubkey_buffer");
  2898. if (x509 == NULL || bufSz == NULL) {
  2899. WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", BAD_FUNC_ARG);
  2900. return WOLFSSL_FATAL_ERROR;
  2901. }
  2902. #ifdef WOLFSSL_SMALL_STACK
  2903. cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert),
  2904. x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
  2905. if (cert == NULL) {
  2906. WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", MEMORY_E);
  2907. return WOLFSSL_FATAL_ERROR;
  2908. }
  2909. #endif
  2910. der = wolfSSL_X509_get_der(x509, &derSz);
  2911. if (der != NULL) {
  2912. InitDecodedCert(cert, der, derSz, NULL);
  2913. ret = wc_GetPubX509(cert, 0, &badDate);
  2914. if (ret >= 0) {
  2915. idx = cert->srcIdx;
  2916. pubKeyX509 = cert->source + cert->srcIdx;
  2917. ret = GetSequence(cert->source, &cert->srcIdx, &length,
  2918. cert->maxIdx);
  2919. pubKeyX509Sz = length + (cert->srcIdx - idx);
  2920. }
  2921. FreeDecodedCert(cert);
  2922. }
  2923. #ifdef WOLFSSL_SMALL_STACK
  2924. XFREE(cert, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
  2925. #endif
  2926. if (ret < 0) {
  2927. WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", ret);
  2928. return WOLFSSL_FATAL_ERROR;
  2929. }
  2930. if (buf != NULL && pubKeyX509 != NULL) {
  2931. if (pubKeyX509Sz > *bufSz) {
  2932. WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", BUFFER_E);
  2933. return WOLFSSL_FATAL_ERROR;
  2934. }
  2935. XMEMCPY(buf, pubKeyX509, pubKeyX509Sz);
  2936. }
  2937. *bufSz = pubKeyX509Sz;
  2938. return WOLFSSL_SUCCESS;
  2939. }
  2940. /* Getter function for the public key OID value
  2941. * return public key OID stored in WOLFSSL_X509 structure */
  2942. int wolfSSL_X509_get_pubkey_type(WOLFSSL_X509* x509)
  2943. {
  2944. if (x509 == NULL)
  2945. return WOLFSSL_FAILURE;
  2946. return x509->pubKeyOID;
  2947. }
  2948. #endif /* OPENSSL_EXTRA || KEEP_OUR_CERT || KEEP_PEER_CERT || SESSION_CERTS */
  2949. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
  2950. defined(KEEP_OUR_CERT) || defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
  2951. /* write X509 serial number in unsigned binary to buffer
  2952. buffer needs to be at least EXTERNAL_SERIAL_SIZE (32) for all cases
  2953. return WOLFSSL_SUCCESS on success */
  2954. int wolfSSL_X509_get_serial_number(WOLFSSL_X509* x509,
  2955. byte* in, int* inOutSz)
  2956. {
  2957. WOLFSSL_ENTER("wolfSSL_X509_get_serial_number");
  2958. if (x509 == NULL || inOutSz == NULL) {
  2959. WOLFSSL_MSG("Null argument passed in");
  2960. return BAD_FUNC_ARG;
  2961. }
  2962. if (in != NULL) {
  2963. if (*inOutSz < x509->serialSz) {
  2964. WOLFSSL_MSG("Serial buffer too small");
  2965. return BUFFER_E;
  2966. }
  2967. XMEMCPY(in, x509->serial, x509->serialSz);
  2968. }
  2969. *inOutSz = x509->serialSz;
  2970. return WOLFSSL_SUCCESS;
  2971. }
  2972. /* not an openssl compatibility function - getting for derCert */
  2973. const byte* wolfSSL_X509_get_der(WOLFSSL_X509* x509, int* outSz)
  2974. {
  2975. WOLFSSL_ENTER("wolfSSL_X509_get_der");
  2976. if (x509 == NULL || x509->derCert == NULL || outSz == NULL)
  2977. return NULL;
  2978. *outSz = (int)x509->derCert->length;
  2979. return x509->derCert->buffer;
  2980. }
  2981. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL || KEEP_OUR_CERT || KEEP_PEER_CERT || SESSION_CERTS */
  2982. #if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA) || \
  2983. defined(OPENSSL_ALL) || defined(KEEP_OUR_CERT) || \
  2984. defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
  2985. /* used by JSSE (not a standard compatibility function) */
  2986. WOLFSSL_ABI
  2987. const byte* wolfSSL_X509_notBefore(WOLFSSL_X509* x509)
  2988. {
  2989. WOLFSSL_ENTER("wolfSSL_X509_notBefore");
  2990. if (x509 == NULL)
  2991. return NULL;
  2992. XMEMSET(x509->notBeforeData, 0, sizeof(x509->notBeforeData));
  2993. x509->notBeforeData[0] = (byte)x509->notBefore.type;
  2994. x509->notBeforeData[1] = (byte)x509->notBefore.length;
  2995. XMEMCPY(&x509->notBeforeData[2], x509->notBefore.data, x509->notBefore.length);
  2996. return x509->notBeforeData;
  2997. }
  2998. /* used by JSSE (not a standard compatibility function) */
  2999. WOLFSSL_ABI
  3000. const byte* wolfSSL_X509_notAfter(WOLFSSL_X509* x509)
  3001. {
  3002. WOLFSSL_ENTER("wolfSSL_X509_notAfter");
  3003. if (x509 == NULL)
  3004. return NULL;
  3005. XMEMSET(x509->notAfterData, 0, sizeof(x509->notAfterData));
  3006. x509->notAfterData[0] = (byte)x509->notAfter.type;
  3007. x509->notAfterData[1] = (byte)x509->notAfter.length;
  3008. XMEMCPY(&x509->notAfterData[2], x509->notAfter.data, x509->notAfter.length);
  3009. return x509->notAfterData;
  3010. }
  3011. int wolfSSL_X509_version(WOLFSSL_X509* x509)
  3012. {
  3013. WOLFSSL_ENTER("wolfSSL_X509_version");
  3014. if (x509 == NULL)
  3015. return 0;
  3016. return x509->version;
  3017. }
  3018. #endif
  3019. #ifdef OPENSSL_EXTRA
  3020. /* get the buffer to be signed (tbs) from the WOLFSSL_X509 certificate
  3021. *
  3022. * outSz : gets set to the size of the buffer
  3023. * returns a pointer to the internal buffer at the location of TBS on
  3024. * on success and NULL on failure.
  3025. */
  3026. const unsigned char* wolfSSL_X509_get_tbs(WOLFSSL_X509* x509, int* outSz)
  3027. {
  3028. int sz = 0, len;
  3029. unsigned int idx = 0, tmpIdx;
  3030. const unsigned char* der = NULL;
  3031. const unsigned char* tbs = NULL;
  3032. if (x509 == NULL || outSz == NULL) {
  3033. return NULL;
  3034. }
  3035. der = wolfSSL_X509_get_der(x509, &sz);
  3036. if (der == NULL) {
  3037. return NULL;
  3038. }
  3039. if (GetSequence(der, &idx, &len, sz) < 0) {
  3040. return NULL;
  3041. }
  3042. tbs = der + idx;
  3043. tmpIdx = idx;
  3044. if (GetSequence(der, &idx, &len, sz) < 0) {
  3045. return NULL;
  3046. }
  3047. *outSz = len + (idx - tmpIdx);
  3048. return tbs;
  3049. }
  3050. #ifdef WOLFSSL_SEP
  3051. /* copy oid into in buffer, at most *inOutSz bytes, if buffer is null will
  3052. malloc buffer, call responsible for freeing. Actual size returned in
  3053. *inOutSz. Requires inOutSz be non-null */
  3054. byte* wolfSSL_X509_get_device_type(WOLFSSL_X509* x509, byte* in, int *inOutSz)
  3055. {
  3056. int copySz;
  3057. WOLFSSL_ENTER("wolfSSL_X509_get_dev_type");
  3058. if (inOutSz == NULL) return NULL;
  3059. if (!x509->deviceTypeSz) return in;
  3060. copySz = min(*inOutSz, x509->deviceTypeSz);
  3061. if (!in) {
  3062. #ifdef WOLFSSL_STATIC_MEMORY
  3063. WOLFSSL_MSG("Using static memory -- please pass in a buffer");
  3064. return NULL;
  3065. #else
  3066. in = (byte*)XMALLOC(x509->deviceTypeSz, 0, DYNAMIC_TYPE_OPENSSL);
  3067. if (!in) return in;
  3068. copySz = x509->deviceTypeSz;
  3069. #endif
  3070. }
  3071. XMEMCPY(in, x509->deviceType, copySz);
  3072. *inOutSz = copySz;
  3073. return in;
  3074. }
  3075. byte* wolfSSL_X509_get_hw_type(WOLFSSL_X509* x509, byte* in, int* inOutSz)
  3076. {
  3077. int copySz;
  3078. WOLFSSL_ENTER("wolfSSL_X509_get_hw_type");
  3079. if (inOutSz == NULL) return NULL;
  3080. if (!x509->hwTypeSz) return in;
  3081. copySz = min(*inOutSz, x509->hwTypeSz);
  3082. if (!in) {
  3083. #ifdef WOLFSSL_STATIC_MEMORY
  3084. WOLFSSL_MSG("Using static memory -- please pass in a buffer");
  3085. return NULL;
  3086. #else
  3087. in = (byte*)XMALLOC(x509->hwTypeSz, 0, DYNAMIC_TYPE_OPENSSL);
  3088. if (!in) return in;
  3089. copySz = x509->hwTypeSz;
  3090. #endif
  3091. }
  3092. XMEMCPY(in, x509->hwType, copySz);
  3093. *inOutSz = copySz;
  3094. return in;
  3095. }
  3096. byte* wolfSSL_X509_get_hw_serial_number(WOLFSSL_X509* x509,byte* in,
  3097. int* inOutSz)
  3098. {
  3099. int copySz;
  3100. WOLFSSL_ENTER("wolfSSL_X509_get_hw_serial_number");
  3101. if (inOutSz == NULL) return NULL;
  3102. if (!x509->hwTypeSz) return in;
  3103. copySz = min(*inOutSz, x509->hwSerialNumSz);
  3104. if (!in) {
  3105. #ifdef WOLFSSL_STATIC_MEMORY
  3106. WOLFSSL_MSG("Using static memory -- please pass in a buffer");
  3107. return NULL;
  3108. #else
  3109. in = (byte*)XMALLOC(x509->hwSerialNumSz, 0, DYNAMIC_TYPE_OPENSSL);
  3110. if (!in) return in;
  3111. copySz = x509->hwSerialNumSz;
  3112. #endif
  3113. }
  3114. XMEMCPY(in, x509->hwSerialNum, copySz);
  3115. *inOutSz = copySz;
  3116. return in;
  3117. }
  3118. #endif /* WOLFSSL_SEP */
  3119. #endif /* OPENSSL_EXTRA */
  3120. /* require OPENSSL_EXTRA since wolfSSL_X509_free is wrapped by OPENSSL_EXTRA */
  3121. #if defined(OPENSSL_EXTRA)
  3122. WOLFSSL_ASN1_TIME* wolfSSL_X509_get_notBefore(const WOLFSSL_X509* x509)
  3123. {
  3124. WOLFSSL_ENTER("wolfSSL_X509_get_notBefore");
  3125. if (x509 == NULL)
  3126. return NULL;
  3127. return (WOLFSSL_ASN1_TIME*)&x509->notBefore;
  3128. }
  3129. WOLFSSL_ASN1_TIME* wolfSSL_X509_get_notAfter(const WOLFSSL_X509* x509)
  3130. {
  3131. WOLFSSL_ENTER("wolfSSL_X509_get_notAfter");
  3132. if (x509 == NULL)
  3133. return NULL;
  3134. return (WOLFSSL_ASN1_TIME*)&x509->notAfter;
  3135. }
  3136. /* return 1 on success 0 on fail */
  3137. int wolfSSL_sk_X509_push(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk, WOLFSSL_X509* x509)
  3138. {
  3139. WOLFSSL_ENTER("wolfSSL_sk_X509_push");
  3140. if (sk == NULL || x509 == NULL) {
  3141. return WOLFSSL_FAILURE;
  3142. }
  3143. return wolfSSL_sk_push(sk, x509);
  3144. }
  3145. WOLFSSL_X509* wolfSSL_sk_X509_pop(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk) {
  3146. WOLFSSL_STACK* node;
  3147. WOLFSSL_X509* x509;
  3148. if (sk == NULL) {
  3149. return NULL;
  3150. }
  3151. node = sk->next;
  3152. x509 = sk->data.x509;
  3153. if (node != NULL) { /* update sk and remove node from stack */
  3154. sk->data.x509 = node->data.x509;
  3155. sk->next = node->next;
  3156. XFREE(node, NULL, DYNAMIC_TYPE_X509);
  3157. }
  3158. else { /* last x509 in stack */
  3159. sk->data.x509 = NULL;
  3160. }
  3161. if (sk->num > 0) {
  3162. sk->num -= 1;
  3163. }
  3164. return x509;
  3165. }
  3166. /* Getter function for WOLFSSL_X509 pointer
  3167. *
  3168. * sk is the stack to retrieve pointer from
  3169. * i is the index value in stack
  3170. *
  3171. * returns a pointer to a WOLFSSL_X509 structure on success and NULL on
  3172. * fail
  3173. */
  3174. WOLFSSL_X509* wolfSSL_sk_X509_value(STACK_OF(WOLFSSL_X509)* sk, int i)
  3175. {
  3176. WOLFSSL_ENTER("wolfSSL_sk_X509_value");
  3177. for (; sk != NULL && i > 0; i--)
  3178. sk = sk->next;
  3179. if (i != 0 || sk == NULL)
  3180. return NULL;
  3181. return sk->data.x509;
  3182. }
  3183. WOLFSSL_X509* wolfSSL_sk_X509_shift(WOLF_STACK_OF(WOLFSSL_X509)* sk)
  3184. {
  3185. return wolfSSL_sk_X509_pop(sk);
  3186. }
  3187. #endif /* OPENSSL_EXTRA */
  3188. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  3189. /* Free's all nodes in X509 stack. This is different then wolfSSL_sk_X509_free
  3190. * in that it free's the underlying objects pushed to the stack.
  3191. *
  3192. * sk stack to free nodes in
  3193. * f X509 free function
  3194. */
  3195. void wolfSSL_sk_X509_pop_free(STACK_OF(WOLFSSL_X509)* sk,
  3196. void (*f) (WOLFSSL_X509*))
  3197. {
  3198. WOLFSSL_ENTER("wolfSSL_sk_X509_pop_free");
  3199. wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
  3200. }
  3201. /* free just the stack structure */
  3202. void wolfSSL_sk_X509_free(WOLF_STACK_OF(WOLFSSL_X509)* sk)
  3203. {
  3204. wolfSSL_sk_free(sk);
  3205. }
  3206. #ifdef HAVE_CRL
  3207. WOLFSSL_STACK* wolfSSL_sk_X509_CRL_new(void)
  3208. {
  3209. WOLFSSL_STACK* s = wolfSSL_sk_new_node(NULL);
  3210. if (s != NULL)
  3211. s->type = STACK_TYPE_X509_CRL;
  3212. return s;
  3213. }
  3214. void wolfSSL_sk_X509_CRL_pop_free(WOLF_STACK_OF(WOLFSSL_X509_CRL)* sk,
  3215. void (*f) (WOLFSSL_X509_CRL*))
  3216. {
  3217. WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_pop_free");
  3218. wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
  3219. }
  3220. void wolfSSL_sk_X509_CRL_free(WOLF_STACK_OF(WOLFSSL_X509_CRL)* sk)
  3221. {
  3222. wolfSSL_sk_X509_CRL_pop_free(sk, NULL);
  3223. }
  3224. /* return 1 on success 0 on fail */
  3225. int wolfSSL_sk_X509_CRL_push(WOLF_STACK_OF(WOLFSSL_X509_CRL)* sk, WOLFSSL_X509_CRL* crl)
  3226. {
  3227. WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_push");
  3228. if (sk == NULL || crl == NULL) {
  3229. return WOLFSSL_FAILURE;
  3230. }
  3231. return wolfSSL_sk_push(sk, crl);
  3232. }
  3233. WOLFSSL_X509_CRL* wolfSSL_sk_X509_CRL_value(WOLF_STACK_OF(WOLFSSL_X509)* sk,
  3234. int i)
  3235. {
  3236. WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_value");
  3237. if (sk)
  3238. return (WOLFSSL_X509_CRL*)wolfSSL_sk_value(sk, i);
  3239. return NULL;
  3240. }
  3241. int wolfSSL_sk_X509_CRL_num(WOLF_STACK_OF(WOLFSSL_X509)* sk)
  3242. {
  3243. WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_num");
  3244. if (sk)
  3245. return wolfSSL_sk_num(sk);
  3246. return 0;
  3247. }
  3248. #endif /* HAVE_CRL */
  3249. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  3250. #if defined(OPENSSL_ALL) || defined(WOLFSSL_QT)
  3251. /* return 1 on success 0 on fail */
  3252. int wolfSSL_sk_ACCESS_DESCRIPTION_push(WOLF_STACK_OF(ACCESS_DESCRIPTION)* sk,
  3253. WOLFSSL_ACCESS_DESCRIPTION* a)
  3254. {
  3255. WOLFSSL_ENTER("wolfSSL_sk_ACCESS_DESCRIPTION_push");
  3256. return wolfSSL_sk_push(sk, a);
  3257. }
  3258. /* Frees all nodes in ACCESS_DESCRIPTION stack
  3259. *
  3260. * sk stack of nodes to free
  3261. * f free function to use
  3262. */
  3263. void wolfSSL_sk_ACCESS_DESCRIPTION_pop_free(WOLFSSL_STACK* sk,
  3264. void (*f) (WOLFSSL_ACCESS_DESCRIPTION*))
  3265. {
  3266. WOLFSSL_ENTER("wolfSSL_sk_ACCESS_DESCRIPTION_pop_free");
  3267. wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
  3268. }
  3269. void wolfSSL_sk_ACCESS_DESCRIPTION_free(WOLFSSL_STACK* sk)
  3270. {
  3271. wolfSSL_sk_free(sk);
  3272. }
  3273. /* AUTHORITY_INFO_ACCESS object is a stack of ACCESS_DESCRIPTION objects,
  3274. * to free the stack the WOLFSSL_ACCESS_DESCRIPTION stack free function is
  3275. * used */
  3276. void wolfSSL_AUTHORITY_INFO_ACCESS_free(
  3277. WOLF_STACK_OF(WOLFSSL_ACCESS_DESCRIPTION)* sk)
  3278. {
  3279. WOLFSSL_ENTER("wolfSSL_AUTHORITY_INFO_ACCESS_free");
  3280. wolfSSL_sk_ACCESS_DESCRIPTION_free(sk);
  3281. }
  3282. void wolfSSL_AUTHORITY_INFO_ACCESS_pop_free(
  3283. WOLF_STACK_OF(WOLFSSL_ACCESS_DESCRIPTION)* sk,
  3284. void (*f) (WOLFSSL_ACCESS_DESCRIPTION*))
  3285. {
  3286. WOLFSSL_ENTER("wolfSSL_AUTHORITY_INFO_ACCESS_free");
  3287. wolfSSL_sk_ACCESS_DESCRIPTION_pop_free(sk, f);
  3288. }
  3289. void wolfSSL_ACCESS_DESCRIPTION_free(WOLFSSL_ACCESS_DESCRIPTION* a)
  3290. {
  3291. WOLFSSL_ENTER("wolfSSL_ACCESS_DESCRIPTION_free");
  3292. if (a == NULL)
  3293. return;
  3294. if (a->method)
  3295. wolfSSL_ASN1_OBJECT_free(a->method);
  3296. if (a->location)
  3297. wolfSSL_GENERAL_NAME_free(a->location);
  3298. XFREE(a, NULL, DYNAMIC_TYPE_X509_EXT);
  3299. /* a = NULL, don't try to a or double free it */
  3300. }
  3301. #endif /* OPENSSL_ALL || WOLFSSL_QT */
  3302. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  3303. /* Creates and returns new GENERAL_NAME structure */
  3304. WOLFSSL_GENERAL_NAME* wolfSSL_GENERAL_NAME_new(void)
  3305. {
  3306. WOLFSSL_GENERAL_NAME* gn;
  3307. WOLFSSL_ENTER("GENERAL_NAME_new");
  3308. gn = (WOLFSSL_GENERAL_NAME*)XMALLOC(sizeof(WOLFSSL_GENERAL_NAME), NULL,
  3309. DYNAMIC_TYPE_ASN1);
  3310. if (gn == NULL) {
  3311. return NULL;
  3312. }
  3313. XMEMSET(gn, 0, sizeof(WOLFSSL_GENERAL_NAME));
  3314. gn->d.ia5 = wolfSSL_ASN1_STRING_new();
  3315. if (gn->d.ia5 == NULL) {
  3316. WOLFSSL_MSG("Issue creating ASN1_STRING struct");
  3317. wolfSSL_GENERAL_NAME_free(gn);
  3318. return NULL;
  3319. }
  3320. return gn;
  3321. }
  3322. WOLFSSL_GENERAL_NAME* wolfSSL_GENERAL_NAME_dup(WOLFSSL_GENERAL_NAME* gn)
  3323. {
  3324. WOLFSSL_GENERAL_NAME* dupl = NULL;
  3325. WOLFSSL_ENTER("wolfSSL_GENERAL_NAME_dup");
  3326. if (!gn) {
  3327. WOLFSSL_MSG("Bad parameter");
  3328. return NULL;
  3329. }
  3330. if (!(dupl = wolfSSL_GENERAL_NAME_new())) {
  3331. WOLFSSL_MSG("wolfSSL_GENERAL_NAME_new error");
  3332. return NULL;
  3333. }
  3334. switch (gn->type) {
  3335. /* WOLFSSL_ASN1_STRING types */
  3336. case GEN_DNS:
  3337. if (!(dupl->d.dNSName = wolfSSL_ASN1_STRING_dup(gn->d.dNSName))) {
  3338. WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
  3339. goto error;
  3340. }
  3341. break;
  3342. case GEN_IPADD:
  3343. if (!(dupl->d.iPAddress = wolfSSL_ASN1_STRING_dup(gn->d.iPAddress))) {
  3344. WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
  3345. goto error;
  3346. }
  3347. break;
  3348. case GEN_EMAIL:
  3349. if (!(dupl->d.rfc822Name = wolfSSL_ASN1_STRING_dup(gn->d.rfc822Name))) {
  3350. WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
  3351. goto error;
  3352. }
  3353. break;
  3354. case GEN_URI:
  3355. if (!(dupl->d.uniformResourceIdentifier =
  3356. wolfSSL_ASN1_STRING_dup(gn->d.uniformResourceIdentifier))) {
  3357. WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
  3358. goto error;
  3359. }
  3360. break;
  3361. case GEN_OTHERNAME:
  3362. case GEN_X400:
  3363. case GEN_DIRNAME:
  3364. case GEN_EDIPARTY:
  3365. case GEN_RID:
  3366. default:
  3367. WOLFSSL_MSG("Unrecognized or unsupported GENERAL_NAME type");
  3368. goto error;
  3369. }
  3370. dupl->type = gn->type;
  3371. return dupl;
  3372. error:
  3373. if (dupl) {
  3374. wolfSSL_GENERAL_NAME_free(dupl);
  3375. }
  3376. return NULL;
  3377. }
  3378. /* return 1 on success 0 on fail */
  3379. int wolfSSL_sk_GENERAL_NAME_push(WOLFSSL_GENERAL_NAMES* sk,
  3380. WOLFSSL_GENERAL_NAME* gn)
  3381. {
  3382. WOLFSSL_STACK* node;
  3383. WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_push");
  3384. if (sk == NULL || gn == NULL) {
  3385. return WOLFSSL_FAILURE;
  3386. }
  3387. /* no previous values in stack */
  3388. if (sk->data.gn == NULL) {
  3389. sk->data.gn = gn;
  3390. sk->num += 1;
  3391. return WOLFSSL_SUCCESS;
  3392. }
  3393. /* stack already has value(s) create a new node and add more */
  3394. node = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK), NULL,
  3395. DYNAMIC_TYPE_ASN1);
  3396. if (node == NULL) {
  3397. WOLFSSL_MSG("Memory error");
  3398. return WOLFSSL_FAILURE;
  3399. }
  3400. XMEMSET(node, 0, sizeof(WOLFSSL_STACK));
  3401. /* push new obj onto head of stack */
  3402. node->type = STACK_TYPE_GEN_NAME;
  3403. node->data.gn = sk->data.gn;
  3404. node->next = sk->next;
  3405. sk->next = node;
  3406. sk->data.gn = gn;
  3407. sk->num += 1;
  3408. return WOLFSSL_SUCCESS;
  3409. }
  3410. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  3411. #ifdef OPENSSL_EXTRA
  3412. /* Returns the general name at index i from the stack
  3413. *
  3414. * sk stack to get general name from
  3415. * idx index to get
  3416. *
  3417. * return a pointer to the internal node of the stack
  3418. */
  3419. WOLFSSL_GENERAL_NAME* wolfSSL_sk_GENERAL_NAME_value(WOLFSSL_STACK* sk, int idx)
  3420. {
  3421. WOLFSSL_STACK* ret;
  3422. if (sk == NULL) {
  3423. return NULL;
  3424. }
  3425. ret = wolfSSL_sk_get_node(sk, idx);
  3426. if (ret != NULL) {
  3427. return ret->data.gn;
  3428. }
  3429. return NULL;
  3430. }
  3431. /* Gets the number of nodes in the stack
  3432. *
  3433. * sk stack to get the number of nodes from
  3434. *
  3435. * returns the number of nodes, -1 if no nodes
  3436. */
  3437. int wolfSSL_sk_GENERAL_NAME_num(WOLFSSL_STACK* sk)
  3438. {
  3439. WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_num");
  3440. if (sk == NULL) {
  3441. return -1;
  3442. }
  3443. return (int)sk->num;
  3444. }
  3445. #endif /* OPENSSL_EXTRA */
  3446. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  3447. /* Frees all nodes in a GENERAL NAME stack
  3448. *
  3449. * sk stack of nodes to free
  3450. * f free function to use, not called with wolfSSL
  3451. */
  3452. void wolfSSL_sk_GENERAL_NAME_pop_free(WOLFSSL_STACK* sk,
  3453. void (*f) (WOLFSSL_GENERAL_NAME*))
  3454. {
  3455. WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_pop_free");
  3456. wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
  3457. }
  3458. void wolfSSL_sk_GENERAL_NAME_free(WOLFSSL_STACK* sk)
  3459. {
  3460. WOLFSSL_ENTER("sk_GENERAL_NAME_free");
  3461. wolfSSL_sk_X509_pop_free(sk, NULL);
  3462. }
  3463. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  3464. #ifdef OPENSSL_EXTRA
  3465. static void wolfSSL_DIST_POINT_NAME_free(WOLFSSL_DIST_POINT_NAME* dpn)
  3466. {
  3467. if (dpn != NULL) {
  3468. if (dpn->name.fullname != NULL) {
  3469. wolfSSL_sk_X509_pop_free(dpn->name.fullname, NULL);
  3470. }
  3471. XFREE(dpn, NULL, DYNAMIC_TYPE_OPENSSL);
  3472. }
  3473. }
  3474. /* returns new pointer on success and NULL on fail */
  3475. static WOLFSSL_DIST_POINT_NAME* wolfSSL_DIST_POINT_NAME_new(void)
  3476. {
  3477. WOLFSSL_DIST_POINT_NAME* dpn = NULL;
  3478. WOLFSSL_GENERAL_NAMES* gns = NULL;
  3479. dpn = (WOLFSSL_DIST_POINT_NAME*)XMALLOC(sizeof(WOLFSSL_DIST_POINT_NAME),
  3480. NULL, DYNAMIC_TYPE_OPENSSL);
  3481. if (dpn == NULL) {
  3482. return NULL;
  3483. }
  3484. XMEMSET(dpn, 0, sizeof(WOLFSSL_DIST_POINT_NAME));
  3485. gns = wolfSSL_sk_new_null();
  3486. if (gns == NULL) {
  3487. WOLFSSL_MSG("wolfSSL_sk_new_null error");
  3488. XFREE(dpn, NULL, DYNAMIC_TYPE_OPENSSL);
  3489. return NULL;
  3490. }
  3491. gns->type = STACK_TYPE_GEN_NAME;
  3492. dpn->name.fullname = gns;
  3493. dpn->type = CRL_DIST_OID;
  3494. return dpn;
  3495. }
  3496. /* Creates and returns new DIST_POINT structure */
  3497. WOLFSSL_DIST_POINT* wolfSSL_DIST_POINT_new(void)
  3498. {
  3499. WOLFSSL_DIST_POINT* dp = NULL;
  3500. WOLFSSL_DIST_POINT_NAME* dpn = NULL;
  3501. WOLFSSL_ENTER("DIST_POINT_new");
  3502. dp = (WOLFSSL_DIST_POINT*)XMALLOC(sizeof(WOLFSSL_DIST_POINT), NULL,
  3503. DYNAMIC_TYPE_OPENSSL);
  3504. if (dp == NULL) {
  3505. return NULL;
  3506. }
  3507. XMEMSET(dp, 0, sizeof(WOLFSSL_DIST_POINT));
  3508. dpn = wolfSSL_DIST_POINT_NAME_new();
  3509. if (dpn == NULL) {
  3510. XFREE(dp, NULL, DYNAMIC_TYPE_OPENSSL);
  3511. return NULL;
  3512. }
  3513. dp->distpoint = dpn;
  3514. return dp;
  3515. }
  3516. /* Frees DIST_POINT objects.
  3517. */
  3518. void wolfSSL_DIST_POINT_free(WOLFSSL_DIST_POINT* dp)
  3519. {
  3520. WOLFSSL_ENTER("wolfSSL_DIST_POINT_free");
  3521. if (dp != NULL) {
  3522. wolfSSL_DIST_POINT_NAME_free(dp->distpoint);
  3523. XFREE(dp, NULL, DYNAMIC_TYPE_OPENSSL);
  3524. }
  3525. }
  3526. void wolfSSL_DIST_POINTS_free(WOLFSSL_DIST_POINTS *dps)
  3527. {
  3528. WOLFSSL_ENTER("wolfSSL_DIST_POINTS_free");
  3529. if (dps == NULL) {
  3530. return;
  3531. }
  3532. wolfSSL_sk_free(dps);
  3533. }
  3534. /* return 1 on success 0 on fail */
  3535. int wolfSSL_sk_DIST_POINT_push(WOLFSSL_DIST_POINTS* sk, WOLFSSL_DIST_POINT* dp)
  3536. {
  3537. WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_push");
  3538. if (sk == NULL || dp == NULL) {
  3539. return WOLFSSL_FAILURE;
  3540. }
  3541. return wolfSSL_sk_push(sk, dp);
  3542. }
  3543. /* Returns the CRL dist point at index i from the stack
  3544. *
  3545. * sk stack to get general name from
  3546. * idx index to get
  3547. *
  3548. * return a pointer to the internal node of the stack
  3549. */
  3550. WOLFSSL_DIST_POINT* wolfSSL_sk_DIST_POINT_value(WOLFSSL_STACK* sk, int idx)
  3551. {
  3552. if (sk == NULL) {
  3553. return NULL;
  3554. }
  3555. return (WOLFSSL_DIST_POINT*)wolfSSL_sk_value(sk, idx);
  3556. }
  3557. /* Gets the number of nodes in the stack
  3558. *
  3559. * sk stack to get the number of nodes from
  3560. *
  3561. * returns the number of nodes, -1 if no nodes
  3562. */
  3563. int wolfSSL_sk_DIST_POINT_num(WOLFSSL_STACK* sk)
  3564. {
  3565. WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_num");
  3566. if (sk == NULL) {
  3567. return -1;
  3568. }
  3569. return wolfSSL_sk_num(sk);
  3570. }
  3571. /* Frees all nodes in a DIST_POINT stack
  3572. *
  3573. * sk stack of nodes to free
  3574. * f free function to use
  3575. */
  3576. void wolfSSL_sk_DIST_POINT_pop_free(WOLFSSL_STACK* sk,
  3577. void (*f) (WOLFSSL_DIST_POINT*))
  3578. {
  3579. WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_pop_free");
  3580. wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
  3581. }
  3582. void wolfSSL_sk_DIST_POINT_free(WOLFSSL_STACK* sk)
  3583. {
  3584. WOLFSSL_ENTER("sk_DIST_POINT_free");
  3585. wolfSSL_sk_free(sk);
  3586. }
  3587. /* returns the number of nodes in stack on success and WOLFSSL_FATAL_ERROR
  3588. * on fail */
  3589. int wolfSSL_sk_ACCESS_DESCRIPTION_num(WOLFSSL_STACK* sk)
  3590. {
  3591. if (sk == NULL) {
  3592. return WOLFSSL_FATAL_ERROR;
  3593. }
  3594. return (int)sk->num;
  3595. }
  3596. /* returns NULL on fail and pointer to internal data on success */
  3597. WOLFSSL_ACCESS_DESCRIPTION* wolfSSL_sk_ACCESS_DESCRIPTION_value(
  3598. WOLFSSL_STACK* sk, int idx)
  3599. {
  3600. WOLFSSL_STACK* ret;
  3601. if (sk == NULL) {
  3602. return NULL;
  3603. }
  3604. ret = wolfSSL_sk_get_node(sk, idx);
  3605. if (ret != NULL) {
  3606. return ret->data.access;
  3607. }
  3608. return NULL;
  3609. }
  3610. #endif /* OPENSSL_EXTRA */
  3611. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  3612. /* free's the internal type for the general name */
  3613. static void wolfSSL_GENERAL_NAME_type_free(WOLFSSL_GENERAL_NAME* name)
  3614. {
  3615. if (name != NULL) {
  3616. if (name->d.dNSName != NULL) {
  3617. wolfSSL_ASN1_STRING_free(name->d.dNSName);
  3618. name->d.dNSName = NULL;
  3619. }
  3620. if (name->d.dirn != NULL) {
  3621. wolfSSL_X509_NAME_free(name->d.dirn);
  3622. name->d.dirn = NULL;
  3623. }
  3624. if (name->d.uniformResourceIdentifier != NULL) {
  3625. wolfSSL_ASN1_STRING_free(name->d.uniformResourceIdentifier);
  3626. name->d.uniformResourceIdentifier = NULL;
  3627. }
  3628. if (name->d.iPAddress != NULL) {
  3629. wolfSSL_ASN1_STRING_free(name->d.iPAddress);
  3630. name->d.iPAddress = NULL;
  3631. }
  3632. if (name->d.registeredID != NULL) {
  3633. wolfSSL_ASN1_OBJECT_free(name->d.registeredID);
  3634. name->d.registeredID = NULL;
  3635. }
  3636. if (name->d.ia5 != NULL) {
  3637. wolfSSL_ASN1_STRING_free(name->d.ia5);
  3638. name->d.ia5 = NULL;
  3639. }
  3640. }
  3641. }
  3642. /* sets the general name type and free's the existing one
  3643. * can fail with a memory error if malloc fails or bad arg error
  3644. * otherwise return WOLFSSL_SUCCESS */
  3645. int wolfSSL_GENERAL_NAME_set_type(WOLFSSL_GENERAL_NAME* name, int typ)
  3646. {
  3647. int ret = WOLFSSL_SUCCESS;
  3648. if (name != NULL) {
  3649. wolfSSL_GENERAL_NAME_type_free(name);
  3650. name->type = typ;
  3651. switch (typ) {
  3652. case GEN_URI:
  3653. name->d.uniformResourceIdentifier = wolfSSL_ASN1_STRING_new();
  3654. if (name->d.uniformResourceIdentifier == NULL)
  3655. ret = MEMORY_E;
  3656. break;
  3657. default:
  3658. name->d.ia5 = wolfSSL_ASN1_STRING_new();
  3659. if (name->d.ia5 == NULL)
  3660. ret = MEMORY_E;
  3661. }
  3662. }
  3663. else {
  3664. ret = BAD_FUNC_ARG;
  3665. }
  3666. return ret;
  3667. }
  3668. /* Frees GENERAL_NAME objects.
  3669. */
  3670. void wolfSSL_GENERAL_NAME_free(WOLFSSL_GENERAL_NAME* name)
  3671. {
  3672. WOLFSSL_ENTER("wolfSSL_GENERAL_NAME_Free");
  3673. if (name != NULL) {
  3674. wolfSSL_GENERAL_NAME_type_free(name);
  3675. XFREE(name, NULL, DYNAMIC_TYPE_OPENSSL);
  3676. }
  3677. }
  3678. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL*/
  3679. #ifdef OPENSSL_EXTRA
  3680. void wolfSSL_GENERAL_NAMES_free(WOLFSSL_GENERAL_NAMES *gens)
  3681. {
  3682. WOLFSSL_ENTER("wolfSSL_GENERAL_NAMES_free");
  3683. if (gens == NULL) {
  3684. return;
  3685. }
  3686. wolfSSL_sk_free(gens);
  3687. }
  3688. #if defined(OPENSSL_ALL) && !defined(NO_BIO)
  3689. /* Outputs name string of the given WOLFSSL_GENERAL_NAME_OBJECT to WOLFSSL_BIO.
  3690. * Can handle following GENERAL_NAME_OBJECT types:
  3691. * - GEN_OTHERNAME #
  3692. * - GEN_EMAIL
  3693. * - GEN_DNS
  3694. * - GEN_X400 #
  3695. * - GEN_DIRNAME
  3696. * - GEN_EDIPARTY #
  3697. * - GEN_URI
  3698. * - GEN_RID
  3699. * The each name string to be output has "typename:namestring" format.
  3700. * For instance, email name string will be output as "email:info@wolfssl.com".
  3701. * However,some types above marked with "#" will be output with
  3702. * "typename:<unsupported>".
  3703. *
  3704. * Parameters:
  3705. * - out: WOLFSSL_BIO object which is the output destination
  3706. * - gen: WOLFSSL_GENERAL_NAME object to be output its name
  3707. *
  3708. * Returns WOLFSSL_SUCCESS on success, WOLFSSL_FAILURE on failure.
  3709. */
  3710. int wolfSSL_GENERAL_NAME_print(WOLFSSL_BIO* out, WOLFSSL_GENERAL_NAME* gen)
  3711. {
  3712. int ret, i;
  3713. unsigned int wd;
  3714. unsigned char* p;
  3715. (void)wd;
  3716. (void)p;
  3717. (void)i;
  3718. WOLFSSL_ENTER("wolfSSL_GENERAL_NAME_print");
  3719. if (out == NULL || gen == NULL)
  3720. return WOLFSSL_FAILURE;
  3721. ret = WOLFSSL_FAILURE;
  3722. switch (gen->type)
  3723. {
  3724. case GEN_OTHERNAME:
  3725. ret = wolfSSL_BIO_printf(out, "othername:<unsupported>");
  3726. ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  3727. break;
  3728. case GEN_EMAIL:
  3729. ret = wolfSSL_BIO_printf(out, "email:");
  3730. ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  3731. if (ret == WOLFSSL_SUCCESS)
  3732. {
  3733. ret = wolfSSL_ASN1_STRING_print(out, gen->d.rfc822Name);
  3734. }
  3735. break;
  3736. case GEN_DNS:
  3737. ret = wolfSSL_BIO_printf(out, "DNS:");
  3738. ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  3739. if (ret == WOLFSSL_SUCCESS) {
  3740. ret = wolfSSL_BIO_printf(out, "%s", gen->d.dNSName->strData);
  3741. ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  3742. }
  3743. break;
  3744. case GEN_X400:
  3745. ret = wolfSSL_BIO_printf(out, "X400Name:<unsupported>");
  3746. ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  3747. break;
  3748. case GEN_DIRNAME:
  3749. ret = wolfSSL_BIO_printf(out, "DirName:");
  3750. if (ret == WOLFSSL_SUCCESS) {
  3751. ret = wolfSSL_X509_NAME_print_ex(out, gen->d.directoryName, 0,
  3752. XN_FLAG_ONELINE);
  3753. }
  3754. break;
  3755. case GEN_EDIPARTY:
  3756. ret = wolfSSL_BIO_printf(out, "EdiPartyName:<unsupported>");
  3757. ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  3758. break;
  3759. case GEN_URI:
  3760. ret = wolfSSL_BIO_printf(out, "URI:");
  3761. ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  3762. if (ret == WOLFSSL_SUCCESS) {
  3763. ret = wolfSSL_ASN1_STRING_print(out,
  3764. gen->d.uniformResourceIdentifier);
  3765. }
  3766. break;
  3767. case GEN_IPADD:
  3768. ret = wolfSSL_BIO_printf(out, "IP Address");
  3769. ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  3770. if (ret == WOLFSSL_SUCCESS) {
  3771. if (!gen->d.iPAddress->length) {
  3772. ret = WOLFSSL_FAILURE;
  3773. break;
  3774. }
  3775. p = (unsigned char*)gen->d.iPAddress->strData;
  3776. if (gen->d.iPAddress->length == 4) {
  3777. ret = wolfSSL_BIO_printf(out, ":%d.%d.%d.%d",
  3778. p[0],p[1],p[2],p[3]);
  3779. }
  3780. else if (gen->d.iPAddress->length == 16) {
  3781. for (i = 0; i < 16 && ret == WOLFSSL_SUCCESS;) {
  3782. wd = p[i] << 8 | p[i+1];
  3783. i += 2;
  3784. ret = wolfSSL_BIO_printf(out, ":%X", wd);
  3785. ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  3786. }
  3787. }
  3788. else {
  3789. ret = wolfSSL_BIO_printf(out, "<unsupported>");
  3790. }
  3791. ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  3792. }
  3793. break;
  3794. case GEN_RID:
  3795. ret = wolfSSL_BIO_printf(out, "Registered ID:");
  3796. if (ret == WOLFSSL_SUCCESS) {
  3797. ret = wolfSSL_i2a_ASN1_OBJECT(out, gen->d.registeredID);
  3798. }
  3799. break;
  3800. default:
  3801. /* unsupported type */
  3802. break;
  3803. }
  3804. if (ret == WOLFSSL_FAILURE)
  3805. return WOLFSSL_FAILURE;
  3806. else
  3807. return WOLFSSL_SUCCESS;
  3808. }
  3809. #endif /* OPENSSL_ALL */
  3810. #if defined(OPENSSL_ALL)
  3811. WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* wolfSSL_sk_X509_EXTENSION_new_null(void)
  3812. {
  3813. WOLFSSL_STACK* sk = wolfSSL_sk_new_node(NULL);
  3814. if (sk) {
  3815. sk->type = STACK_TYPE_X509_EXT;
  3816. }
  3817. return (WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)*)sk;;
  3818. }
  3819. /* returns the number of nodes on the stack */
  3820. int wolfSSL_sk_X509_EXTENSION_num(WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk)
  3821. {
  3822. if (sk != NULL) {
  3823. return (int)sk->num;
  3824. }
  3825. return WOLFSSL_FATAL_ERROR;
  3826. }
  3827. /* returns null on failure and pointer to internal value on success */
  3828. WOLFSSL_X509_EXTENSION* wolfSSL_sk_X509_EXTENSION_value(
  3829. WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk, int idx)
  3830. {
  3831. WOLFSSL_STACK* ret;
  3832. if (sk == NULL) {
  3833. return NULL;
  3834. }
  3835. ret = wolfSSL_sk_get_node(sk, idx);
  3836. if (ret != NULL) {
  3837. return ret->data.ext;
  3838. }
  3839. return NULL;
  3840. }
  3841. /* frees all of the nodes and the values in stack */
  3842. void wolfSSL_sk_X509_EXTENSION_pop_free(
  3843. WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk,
  3844. void (*f) (WOLFSSL_X509_EXTENSION*))
  3845. {
  3846. wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
  3847. }
  3848. #endif /* OPENSSL_ALL */
  3849. #endif /* OPENSSL_EXTRA */
  3850. #if defined(OPENSSL_EXTRA) && !defined(NO_FILESYSTEM) && !defined(NO_STDIO_FILESYSTEM)
  3851. WOLFSSL_X509* wolfSSL_X509_d2i_fp(WOLFSSL_X509** x509, XFILE file)
  3852. {
  3853. WOLFSSL_X509* newX509 = NULL;
  3854. WOLFSSL_ENTER("wolfSSL_X509_d2i_fp");
  3855. if (file != XBADFILE) {
  3856. byte* fileBuffer = NULL;
  3857. long sz = 0;
  3858. if (XFSEEK(file, 0, XSEEK_END) != 0)
  3859. return NULL;
  3860. sz = XFTELL(file);
  3861. XREWIND(file);
  3862. if (sz > MAX_WOLFSSL_FILE_SIZE || sz < 0) {
  3863. WOLFSSL_MSG("X509_d2i file size error");
  3864. return NULL;
  3865. }
  3866. fileBuffer = (byte*)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE);
  3867. if (fileBuffer != NULL) {
  3868. int ret = (int)XFREAD(fileBuffer, 1, sz, file);
  3869. if (ret == sz) {
  3870. newX509 = wolfSSL_X509_d2i(NULL, fileBuffer, (int)sz);
  3871. }
  3872. XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
  3873. }
  3874. }
  3875. if (x509 != NULL)
  3876. *x509 = newX509;
  3877. return newX509;
  3878. }
  3879. #endif /* OPENSSL_EXTRA && !NO_FILESYSTEM && !NO_STDIO_FILESYSTEM */
  3880. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
  3881. defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
  3882. #ifndef NO_FILESYSTEM
  3883. WOLFSSL_ABI
  3884. WOLFSSL_X509* wolfSSL_X509_load_certificate_file(const char* fname, int format)
  3885. {
  3886. #ifdef WOLFSSL_SMALL_STACK
  3887. byte staticBuffer[1]; /* force heap usage */
  3888. #else
  3889. byte staticBuffer[FILE_BUFFER_SIZE];
  3890. #endif
  3891. byte* fileBuffer = staticBuffer;
  3892. int dynamic = 0;
  3893. int ret;
  3894. long sz = 0;
  3895. XFILE file;
  3896. WOLFSSL_X509* x509 = NULL;
  3897. /* Check the inputs */
  3898. if ((fname == NULL) ||
  3899. (format != WOLFSSL_FILETYPE_ASN1 && format != WOLFSSL_FILETYPE_PEM))
  3900. return NULL;
  3901. file = XFOPEN(fname, "rb");
  3902. if (file == XBADFILE)
  3903. return NULL;
  3904. if (XFSEEK(file, 0, XSEEK_END) != 0){
  3905. XFCLOSE(file);
  3906. return NULL;
  3907. }
  3908. sz = XFTELL(file);
  3909. XREWIND(file);
  3910. if (sz > MAX_WOLFSSL_FILE_SIZE || sz < 0) {
  3911. WOLFSSL_MSG("X509_load_certificate_file size error");
  3912. XFCLOSE(file);
  3913. return NULL;
  3914. }
  3915. if (sz > (long)sizeof(staticBuffer)) {
  3916. fileBuffer = (byte*)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE);
  3917. if (fileBuffer == NULL) {
  3918. XFCLOSE(file);
  3919. return NULL;
  3920. }
  3921. dynamic = 1;
  3922. }
  3923. ret = (int)XFREAD(fileBuffer, 1, sz, file);
  3924. if (ret != sz) {
  3925. XFCLOSE(file);
  3926. if (dynamic)
  3927. XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
  3928. return NULL;
  3929. }
  3930. XFCLOSE(file);
  3931. x509 = wolfSSL_X509_load_certificate_buffer(fileBuffer, (int)sz, format);
  3932. if (dynamic)
  3933. XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
  3934. return x509;
  3935. }
  3936. #endif /* !NO_FILESYSTEM */
  3937. static WOLFSSL_X509* loadX509orX509REQFromBuffer(
  3938. const unsigned char* buf, int sz, int format, int type)
  3939. {
  3940. int ret;
  3941. WOLFSSL_X509* x509 = NULL;
  3942. DerBuffer* der = NULL;
  3943. WOLFSSL_ENTER("wolfSSL_X509_load_certificate_ex");
  3944. if (format == WOLFSSL_FILETYPE_PEM) {
  3945. #ifdef WOLFSSL_PEM_TO_DER
  3946. if (PemToDer(buf, sz, type, &der, NULL, NULL, NULL) != 0) {
  3947. FreeDer(&der);
  3948. }
  3949. #else
  3950. ret = NOT_COMPILED_IN;
  3951. #endif
  3952. }
  3953. else {
  3954. ret = AllocDer(&der, (word32)sz, type, NULL);
  3955. if (ret == 0) {
  3956. XMEMCPY(der->buffer, buf, sz);
  3957. }
  3958. }
  3959. /* At this point we want `der` to have the certificate in DER format */
  3960. /* ready to be decoded. */
  3961. if (der != NULL && der->buffer != NULL) {
  3962. #ifdef WOLFSSL_SMALL_STACK
  3963. DecodedCert* cert;
  3964. #else
  3965. DecodedCert cert[1];
  3966. #endif
  3967. #ifdef WOLFSSL_SMALL_STACK
  3968. cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL,
  3969. DYNAMIC_TYPE_DCERT);
  3970. if (cert != NULL)
  3971. #endif
  3972. {
  3973. InitDecodedCert(cert, der->buffer, der->length, NULL);
  3974. if (ParseCertRelative(cert, type, 0, NULL) == 0) {
  3975. x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), NULL,
  3976. DYNAMIC_TYPE_X509);
  3977. if (x509 != NULL) {
  3978. InitX509(x509, 1, NULL);
  3979. if (CopyDecodedToX509(x509, cert) != 0) {
  3980. wolfSSL_X509_free(x509);
  3981. x509 = NULL;
  3982. }
  3983. }
  3984. }
  3985. FreeDecodedCert(cert);
  3986. #ifdef WOLFSSL_SMALL_STACK
  3987. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  3988. #endif
  3989. }
  3990. FreeDer(&der);
  3991. }
  3992. return x509;
  3993. }
  3994. WOLFSSL_X509* wolfSSL_X509_load_certificate_buffer(
  3995. const unsigned char* buf, int sz, int format)
  3996. {
  3997. return loadX509orX509REQFromBuffer(buf, sz,
  3998. format, CERT_TYPE);
  3999. }
  4000. #ifdef WOLFSSL_CERT_REQ
  4001. WOLFSSL_X509* wolfSSL_X509_REQ_load_certificate_buffer(
  4002. const unsigned char* buf, int sz, int format)
  4003. {
  4004. return loadX509orX509REQFromBuffer(buf, sz,
  4005. format, CERTREQ_TYPE);
  4006. }
  4007. #endif
  4008. #endif /* KEEP_PEER_CERT || SESSION_CERTS */
  4009. #if defined(OPENSSL_EXTRA_X509_SMALL) || defined(KEEP_PEER_CERT) || \
  4010. defined(SESSION_CERTS)
  4011. /* Smaller subset of X509 compatibility functions. Avoid increasing the size of
  4012. * this subset and its memory usage */
  4013. /* returns a pointer to a new WOLFSSL_X509 structure on success and NULL on
  4014. * fail
  4015. */
  4016. WOLFSSL_X509* wolfSSL_X509_new(void)
  4017. {
  4018. WOLFSSL_X509* x509;
  4019. x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), NULL,
  4020. DYNAMIC_TYPE_X509);
  4021. if (x509 != NULL) {
  4022. InitX509(x509, 1, NULL);
  4023. }
  4024. return x509;
  4025. }
  4026. WOLFSSL_ABI
  4027. WOLFSSL_X509_NAME* wolfSSL_X509_get_subject_name(WOLFSSL_X509* cert)
  4028. {
  4029. WOLFSSL_ENTER("wolfSSL_X509_get_subject_name");
  4030. if (cert)
  4031. return &cert->subject;
  4032. return NULL;
  4033. }
  4034. #if defined(OPENSSL_EXTRA) && (!defined(NO_SHA) || !defined(NO_SHA256))
  4035. /******************************************************************************
  4036. * wolfSSL_X509_subject_name_hash - compute the hash digest of the raw subject name
  4037. * This function prefers SHA-1 (if available) for compatibility
  4038. *
  4039. * RETURNS:
  4040. * The beginning of the hash digest. Otherwise, returns zero.
  4041. * Note:
  4042. * Returns a different hash value from OpenSSL's X509_subject_name_hash() API
  4043. * depending on the subject name.
  4044. */
  4045. unsigned long wolfSSL_X509_subject_name_hash(const WOLFSSL_X509* x509)
  4046. {
  4047. unsigned long ret = 0;
  4048. int retHash = NOT_COMPILED_IN;
  4049. WOLFSSL_X509_NAME *subjectName = NULL;
  4050. byte digest[WC_MAX_DIGEST_SIZE];
  4051. if (x509 == NULL) {
  4052. return ret;
  4053. }
  4054. subjectName = wolfSSL_X509_get_subject_name((WOLFSSL_X509*)x509);
  4055. if (subjectName != NULL) {
  4056. #ifndef NO_SHA
  4057. retHash = wc_ShaHash((const byte*)subjectName->name,
  4058. (word32)subjectName->sz, digest);
  4059. #elif !defined(NO_SHA256)
  4060. retHash = wc_Sha256Hash((const byte*)subjectName->name,
  4061. (word32)subjectName->sz, digest);
  4062. #endif
  4063. if (retHash == 0) {
  4064. ret = (unsigned long)MakeWordFromHash(digest);
  4065. }
  4066. }
  4067. return ret;
  4068. }
  4069. unsigned long wolfSSL_X509_issuer_name_hash(const WOLFSSL_X509* x509)
  4070. {
  4071. unsigned long ret = 0;
  4072. int retHash = NOT_COMPILED_IN;
  4073. WOLFSSL_X509_NAME *issuerName = NULL;
  4074. byte digest[WC_MAX_DIGEST_SIZE];
  4075. if (x509 == NULL) {
  4076. return ret;
  4077. }
  4078. issuerName = wolfSSL_X509_get_issuer_name((WOLFSSL_X509*)x509);
  4079. if (issuerName != NULL) {
  4080. #ifndef NO_SHA
  4081. retHash = wc_ShaHash((const byte*)issuerName->name,
  4082. (word32)issuerName->sz, digest);
  4083. #elif !defined(NO_SHA256)
  4084. retHash = wc_Sha256Hash((const byte*)issuerName->name,
  4085. (word32)issuerName->sz, digest);
  4086. #endif
  4087. if (retHash == 0) {
  4088. ret = (unsigned long)MakeWordFromHash(digest);
  4089. }
  4090. }
  4091. return ret;
  4092. }
  4093. #endif /* OPENSSL_EXTRA && (!NO_SHA || !NO_SHA256) */
  4094. WOLFSSL_ABI
  4095. WOLFSSL_X509_NAME* wolfSSL_X509_get_issuer_name(WOLFSSL_X509* cert)
  4096. {
  4097. WOLFSSL_ENTER("X509_get_issuer_name");
  4098. if (cert)
  4099. return &cert->issuer;
  4100. return NULL;
  4101. }
  4102. int wolfSSL_X509_get_signature_type(WOLFSSL_X509* x509)
  4103. {
  4104. int type = 0;
  4105. WOLFSSL_ENTER("wolfSSL_X509_get_signature_type");
  4106. if (x509 != NULL)
  4107. type = x509->sigOID;
  4108. return type;
  4109. }
  4110. #if defined(OPENSSL_EXTRA_X509_SMALL)
  4111. int wolfSSL_X509_NAME_get_sz(WOLFSSL_X509_NAME* name)
  4112. {
  4113. WOLFSSL_ENTER("wolfSSL_X509_NAME_get_sz");
  4114. if (!name)
  4115. return -1;
  4116. return name->sz;
  4117. }
  4118. /* Searches for the first ENTRY of type NID
  4119. * idx is the location to start searching from, the value at when the entry was
  4120. * found is stored into idx
  4121. * returns a pointer to the entry on success and null on fail */
  4122. static WOLFSSL_X509_NAME_ENTRY* GetEntryByNID(WOLFSSL_X509_NAME* name, int nid,
  4123. int* idx)
  4124. {
  4125. int i;
  4126. WOLFSSL_X509_NAME_ENTRY* ret = NULL;
  4127. /* and index of less than 0 is assumed to be starting from 0 */
  4128. if (*idx < 0) {
  4129. *idx = 0;
  4130. }
  4131. for (i = *idx; i < MAX_NAME_ENTRIES; i++) {
  4132. if (name->entry[i].nid == nid) {
  4133. ret = &name->entry[i];
  4134. *idx = i;
  4135. break;
  4136. }
  4137. }
  4138. return ret;
  4139. }
  4140. /* Used to get a string from the WOLFSSL_X509_NAME structure that
  4141. * corresponds with the NID value passed in. This finds the first entry with
  4142. * matching NID value, if searching for the case where there is multiple
  4143. * entries with the same NID value than other functions should be used
  4144. * (i.e. wolfSSL_X509_NAME_get_index_by_NID, wolfSSL_X509_NAME_get_entry)
  4145. *
  4146. * name structure to get string from
  4147. * nid NID value to search for
  4148. * buf [out] buffer to hold results. If NULL then the buffer size minus the
  4149. * null char is returned.
  4150. * len size of "buf" passed in
  4151. *
  4152. * returns the length of string found, not including the NULL terminator.
  4153. * It's possible the function could return a negative value in the
  4154. * case that len is less than or equal to 0. A negative value is
  4155. * considered an error case.
  4156. */
  4157. int wolfSSL_X509_NAME_get_text_by_NID(WOLFSSL_X509_NAME* name,
  4158. int nid, char* buf, int len)
  4159. {
  4160. WOLFSSL_X509_NAME_ENTRY* e;
  4161. unsigned char *text = NULL;
  4162. int textSz = 0;
  4163. int idx = 0;
  4164. WOLFSSL_ENTER("wolfSSL_X509_NAME_get_text_by_NID");
  4165. if (name == NULL) {
  4166. WOLFSSL_MSG("NULL argument passed in");
  4167. return WOLFSSL_FATAL_ERROR;
  4168. }
  4169. e = GetEntryByNID(name, nid, &idx);
  4170. if (e == NULL) {
  4171. WOLFSSL_MSG("Entry type not found");
  4172. return WOLFSSL_FATAL_ERROR;
  4173. }
  4174. text = wolfSSL_ASN1_STRING_data(e->value);
  4175. textSz = wolfSSL_ASN1_STRING_length(e->value);
  4176. if (text == NULL) {
  4177. WOLFSSL_MSG("Unable to get entry text");
  4178. return WOLFSSL_FATAL_ERROR;
  4179. }
  4180. /* if buf is NULL return size of buffer needed (minus null char) */
  4181. if (buf == NULL) {
  4182. WOLFSSL_MSG("Buffer is NULL, returning buffer size only");
  4183. return textSz;
  4184. }
  4185. /* buf is not NULL from above */
  4186. if (text != NULL) {
  4187. textSz = min(textSz + 1, len); /* + 1 to account for null char */
  4188. if (textSz > 0) {
  4189. XMEMCPY(buf, text, textSz - 1);
  4190. buf[textSz - 1] = '\0';
  4191. }
  4192. }
  4193. WOLFSSL_LEAVE("wolfSSL_X509_NAME_get_text_by_NID", textSz);
  4194. return (textSz - 1); /* do not include null character in size */
  4195. }
  4196. /* Creates a new WOLFSSL_EVP_PKEY structure that has the public key from x509
  4197. *
  4198. * returns a pointer to the created WOLFSSL_EVP_PKEY on success and NULL on fail
  4199. */
  4200. WOLFSSL_EVP_PKEY* wolfSSL_X509_get_pubkey(WOLFSSL_X509* x509)
  4201. {
  4202. WOLFSSL_EVP_PKEY* key = NULL;
  4203. WOLFSSL_ENTER("X509_get_pubkey");
  4204. if (x509 != NULL) {
  4205. key = wolfSSL_EVP_PKEY_new_ex(x509->heap);
  4206. if (key != NULL) {
  4207. if (x509->pubKeyOID == RSAk) {
  4208. key->type = EVP_PKEY_RSA;
  4209. }
  4210. else if (x509->pubKeyOID == DSAk) {
  4211. key->type = EVP_PKEY_DSA;
  4212. }
  4213. else {
  4214. key->type = EVP_PKEY_EC;
  4215. }
  4216. key->save_type = 0;
  4217. key->pkey.ptr = (char*)XMALLOC(
  4218. x509->pubKey.length, x509->heap,
  4219. DYNAMIC_TYPE_PUBLIC_KEY);
  4220. if (key->pkey.ptr == NULL) {
  4221. wolfSSL_EVP_PKEY_free(key);
  4222. return NULL;
  4223. }
  4224. XMEMCPY(key->pkey.ptr, x509->pubKey.buffer, x509->pubKey.length);
  4225. key->pkey_sz = x509->pubKey.length;
  4226. #ifdef HAVE_ECC
  4227. key->pkey_curve = (int)x509->pkCurveOID;
  4228. #endif /* HAVE_ECC */
  4229. /* decode RSA key */
  4230. #ifndef NO_RSA
  4231. if (key->type == EVP_PKEY_RSA) {
  4232. key->ownRsa = 1;
  4233. key->rsa = wolfSSL_RSA_new();
  4234. if (key->rsa == NULL) {
  4235. wolfSSL_EVP_PKEY_free(key);
  4236. return NULL;
  4237. }
  4238. if (wolfSSL_RSA_LoadDer_ex(key->rsa,
  4239. (const unsigned char*)key->pkey.ptr, key->pkey_sz,
  4240. WOLFSSL_RSA_LOAD_PUBLIC) != WOLFSSL_SUCCESS) {
  4241. wolfSSL_EVP_PKEY_free(key);
  4242. return NULL;
  4243. }
  4244. }
  4245. #endif /* NO_RSA */
  4246. /* decode ECC key */
  4247. #if defined(HAVE_ECC) && defined(OPENSSL_EXTRA)
  4248. if (key->type == EVP_PKEY_EC) {
  4249. word32 idx = 0;
  4250. key->ownEcc = 1;
  4251. key->ecc = wolfSSL_EC_KEY_new();
  4252. if (key->ecc == NULL || key->ecc->internal == NULL) {
  4253. wolfSSL_EVP_PKEY_free(key);
  4254. return NULL;
  4255. }
  4256. /* not using wolfSSL_EC_KEY_LoadDer because public key in x509
  4257. * is in the format of x963 (no sequence at start of buffer) */
  4258. if (wc_EccPublicKeyDecode((const unsigned char*)key->pkey.ptr,
  4259. &idx, (ecc_key*)key->ecc->internal, key->pkey_sz) < 0) {
  4260. WOLFSSL_MSG("wc_EccPublicKeyDecode failed");
  4261. wolfSSL_EVP_PKEY_free(key);
  4262. return NULL;
  4263. }
  4264. if (SetECKeyExternal(key->ecc) != WOLFSSL_SUCCESS) {
  4265. WOLFSSL_MSG("SetECKeyExternal failed");
  4266. wolfSSL_EVP_PKEY_free(key);
  4267. return NULL;
  4268. }
  4269. key->ecc->inSet = 1;
  4270. }
  4271. #endif /* HAVE_ECC && OPENSSL_EXTRA */
  4272. #ifndef NO_DSA
  4273. if (key->type == EVP_PKEY_DSA) {
  4274. key->ownDsa = 1;
  4275. key->dsa = wolfSSL_DSA_new();
  4276. if (key->dsa == NULL) {
  4277. wolfSSL_EVP_PKEY_free(key);
  4278. return NULL;
  4279. }
  4280. if (wolfSSL_DSA_LoadDer_ex(key->dsa,
  4281. (const unsigned char*)key->pkey.ptr, key->pkey_sz, \
  4282. WOLFSSL_DSA_LOAD_PUBLIC) != WOLFSSL_SUCCESS) {
  4283. wolfSSL_DSA_free(key->dsa);
  4284. key->dsa = NULL;
  4285. wolfSSL_EVP_PKEY_free(key);
  4286. return NULL;
  4287. }
  4288. }
  4289. #endif /* NO_DSA */
  4290. }
  4291. }
  4292. return key;
  4293. }
  4294. #endif /* OPENSSL_EXTRA_X509_SMALL */
  4295. /* End of smaller subset of X509 compatibility functions. Avoid increasing the
  4296. * size of this subset and its memory usage */
  4297. #endif /* OPENSSL_EXTRA_X509_SMALL || KEEP_PEER_CERT || SESSION_CERTS */
  4298. #if defined(OPENSSL_ALL)
  4299. /* Takes two WOLFSSL_X509* certificates and performs a Sha hash of each, if the
  4300. * hash values are the same, then it will do an XMEMCMP to confirm they are
  4301. * identical. Returns a 0 when certificates match, returns a negative number
  4302. * when certificates are not a match.
  4303. */
  4304. int wolfSSL_X509_cmp(const WOLFSSL_X509 *a, const WOLFSSL_X509 *b)
  4305. {
  4306. const byte* derA;
  4307. const byte* derB;
  4308. int outSzA = 0;
  4309. int outSzB = 0;
  4310. if (a == NULL || b == NULL){
  4311. return BAD_FUNC_ARG;
  4312. }
  4313. derA = wolfSSL_X509_get_der((WOLFSSL_X509*)a, &outSzA);
  4314. if (derA == NULL){
  4315. WOLFSSL_MSG("wolfSSL_X509_get_der - certificate A has failed");
  4316. return WOLFSSL_FATAL_ERROR;
  4317. }
  4318. derB = wolfSSL_X509_get_der((WOLFSSL_X509*)b, &outSzB);
  4319. if (derB == NULL){
  4320. WOLFSSL_MSG("wolfSSL_X509_get_der - certificate B has failed");
  4321. return WOLFSSL_FATAL_ERROR;
  4322. }
  4323. if (outSzA != outSzB || XMEMCMP(derA, derB, outSzA) != 0) {
  4324. WOLFSSL_LEAVE("wolfSSL_X509_cmp", WOLFSSL_FATAL_ERROR);
  4325. return WOLFSSL_FATAL_ERROR;
  4326. }
  4327. WOLFSSL_LEAVE("wolfSSL_X509_cmp", 0);
  4328. return 0;
  4329. }
  4330. #endif /* OPENSSL_ALL */
  4331. #if defined(OPENSSL_EXTRA)
  4332. int wolfSSL_X509_ext_isSet_by_NID(WOLFSSL_X509* x509, int nid)
  4333. {
  4334. int isSet = 0;
  4335. WOLFSSL_ENTER("wolfSSL_X509_ext_isSet_by_NID");
  4336. if (x509 != NULL) {
  4337. switch (nid) {
  4338. case NID_basic_constraints: isSet = x509->basicConstSet; break;
  4339. case NID_subject_alt_name: isSet = x509->subjAltNameSet; break;
  4340. case NID_authority_key_identifier: isSet = x509->authKeyIdSet; break;
  4341. case NID_subject_key_identifier: isSet = x509->subjKeyIdSet; break;
  4342. case NID_key_usage: isSet = x509->keyUsageSet; break;
  4343. case NID_crl_distribution_points: isSet = x509->CRLdistSet; break;
  4344. case NID_ext_key_usage: isSet = ((x509->extKeyUsageSrc) ? 1 : 0);
  4345. break;
  4346. case NID_info_access: isSet = x509->authInfoSet; break;
  4347. #if defined(WOLFSSL_SEP) || defined(WOLFSSL_QT)
  4348. case NID_certificate_policies: isSet = x509->certPolicySet; break;
  4349. #endif /* WOLFSSL_SEP || WOLFSSL_QT */
  4350. default:
  4351. WOLFSSL_MSG("NID not in table");
  4352. }
  4353. }
  4354. WOLFSSL_LEAVE("wolfSSL_X509_ext_isSet_by_NID", isSet);
  4355. return isSet;
  4356. }
  4357. int wolfSSL_X509_ext_get_critical_by_NID(WOLFSSL_X509* x509, int nid)
  4358. {
  4359. int crit = 0;
  4360. WOLFSSL_ENTER("wolfSSL_X509_ext_get_critical_by_NID");
  4361. if (x509 != NULL) {
  4362. switch (nid) {
  4363. case NID_basic_constraints: crit = x509->basicConstCrit; break;
  4364. case NID_subject_alt_name: crit = x509->subjAltNameCrit; break;
  4365. case NID_authority_key_identifier: crit = x509->authKeyIdCrit; break;
  4366. case NID_subject_key_identifier: crit = x509->subjKeyIdCrit; break;
  4367. case NID_key_usage: crit = x509->keyUsageCrit; break;
  4368. case NID_crl_distribution_points: crit= x509->CRLdistCrit; break;
  4369. case NID_ext_key_usage: crit= x509->extKeyUsageCrit; break;
  4370. #if defined(WOLFSSL_SEP) || defined(WOLFSSL_QT)
  4371. case NID_certificate_policies: crit = x509->certPolicyCrit; break;
  4372. #endif /* WOLFSSL_SEP || WOLFSSL_QT */
  4373. }
  4374. }
  4375. WOLFSSL_LEAVE("wolfSSL_X509_ext_get_critical_by_NID", crit);
  4376. return crit;
  4377. }
  4378. int wolfSSL_X509_get_isSet_pathLength(WOLFSSL_X509* x509)
  4379. {
  4380. int isSet = 0;
  4381. WOLFSSL_ENTER("wolfSSL_X509_get_isSet_pathLength");
  4382. if (x509 != NULL)
  4383. isSet = x509->basicConstPlSet;
  4384. WOLFSSL_LEAVE("wolfSSL_X509_get_isSet_pathLength", isSet);
  4385. return isSet;
  4386. }
  4387. word32 wolfSSL_X509_get_pathLength(WOLFSSL_X509* x509)
  4388. {
  4389. word32 pathLength = 0;
  4390. WOLFSSL_ENTER("wolfSSL_X509_get_pathLength");
  4391. if (x509 != NULL)
  4392. pathLength = x509->pathLength;
  4393. WOLFSSL_LEAVE("wolfSSL_X509_get_pathLength", pathLength);
  4394. return pathLength;
  4395. }
  4396. unsigned int wolfSSL_X509_get_keyUsage(WOLFSSL_X509* x509)
  4397. {
  4398. word16 usage = 0;
  4399. WOLFSSL_ENTER("wolfSSL_X509_get_keyUsage");
  4400. if (x509 != NULL)
  4401. usage = x509->keyUsage;
  4402. WOLFSSL_LEAVE("wolfSSL_X509_get_keyUsage", usage);
  4403. return usage;
  4404. }
  4405. byte* wolfSSL_X509_get_authorityKeyID(WOLFSSL_X509* x509,
  4406. byte* dst, int* dstLen)
  4407. {
  4408. byte *id = NULL;
  4409. int copySz = 0;
  4410. WOLFSSL_ENTER("wolfSSL_X509_get_authorityKeyID");
  4411. if (x509 != NULL) {
  4412. if (x509->authKeyIdSet) {
  4413. copySz = min(dstLen != NULL ? *dstLen : 0,
  4414. (int)x509->authKeyIdSz);
  4415. id = x509->authKeyId;
  4416. }
  4417. if (dst != NULL && dstLen != NULL && id != NULL && copySz > 0) {
  4418. XMEMCPY(dst, id, copySz);
  4419. id = dst;
  4420. *dstLen = copySz;
  4421. }
  4422. }
  4423. WOLFSSL_LEAVE("wolfSSL_X509_get_authorityKeyID", copySz);
  4424. return id;
  4425. }
  4426. byte* wolfSSL_X509_get_subjectKeyID(WOLFSSL_X509* x509,
  4427. byte* dst, int* dstLen)
  4428. {
  4429. byte *id = NULL;
  4430. int copySz = 0;
  4431. WOLFSSL_ENTER("wolfSSL_X509_get_subjectKeyID");
  4432. if (x509 != NULL) {
  4433. if (x509->subjKeyIdSet) {
  4434. copySz = min(dstLen != NULL ? *dstLen : 0,
  4435. (int)x509->subjKeyIdSz);
  4436. id = x509->subjKeyId;
  4437. }
  4438. if (dst != NULL && dstLen != NULL && id != NULL && copySz > 0) {
  4439. XMEMCPY(dst, id, copySz);
  4440. id = dst;
  4441. *dstLen = copySz;
  4442. }
  4443. }
  4444. WOLFSSL_LEAVE("wolfSSL_X509_get_subjectKeyID", copySz);
  4445. return id;
  4446. }
  4447. #endif /* OPENSSL_EXTRA */
  4448. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
  4449. defined(OPENSSL_EXTRA_X509_SMALL)
  4450. /* Looks up the index of the first entry encountered with matching NID
  4451. * The search starts from index 'pos'
  4452. * returns a negative value on failure and positive index value on success*/
  4453. int wolfSSL_X509_NAME_get_index_by_NID(WOLFSSL_X509_NAME* name,
  4454. int nid, int pos)
  4455. {
  4456. int value = nid, i;
  4457. WOLFSSL_ENTER("wolfSSL_X509_NAME_get_index_by_NID");
  4458. if (name == NULL) {
  4459. return BAD_FUNC_ARG;
  4460. }
  4461. i = pos + 1; /* start search after index passed in */
  4462. if (i < 0) {
  4463. i = 0;
  4464. }
  4465. for (;i < name->entrySz && i < MAX_NAME_ENTRIES; i++) {
  4466. if (name->entry[i].nid == value) {
  4467. return i;
  4468. }
  4469. }
  4470. return WOLFSSL_FATAL_ERROR;
  4471. }
  4472. WOLFSSL_ASN1_STRING* wolfSSL_X509_NAME_ENTRY_get_data(
  4473. WOLFSSL_X509_NAME_ENTRY* in)
  4474. {
  4475. WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_get_data");
  4476. if (in == NULL)
  4477. return NULL;
  4478. return in->value;
  4479. }
  4480. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  4481. #ifdef OPENSSL_EXTRA
  4482. #ifndef NO_BIO
  4483. static int X509PrintSubjAltName(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
  4484. {
  4485. int ret = WOLFSSL_SUCCESS;
  4486. int nameCount = 0;
  4487. DNS_entry* entry;
  4488. if (bio == NULL || x509 == NULL) {
  4489. ret = WOLFSSL_FAILURE;
  4490. }
  4491. if (ret == WOLFSSL_SUCCESS && x509->subjAltNameSet
  4492. && x509->altNames != NULL) {
  4493. if (wolfSSL_BIO_write(bio,
  4494. " X509v3 Subject Alternative Name: ", 45) <= 0) {
  4495. ret = WOLFSSL_FAILURE;
  4496. }
  4497. if (ret == WOLFSSL_SUCCESS && x509->subjAltNameCrit &&
  4498. wolfSSL_BIO_write(bio, "critical", (int)XSTRLEN("critical")) <= 0) {
  4499. ret = WOLFSSL_FAILURE;
  4500. }
  4501. if (ret == WOLFSSL_SUCCESS &&
  4502. wolfSSL_BIO_write(bio, "\n ", 17) <= 0) {
  4503. ret = WOLFSSL_FAILURE;
  4504. }
  4505. if (ret == WOLFSSL_SUCCESS) {
  4506. entry = x509->altNames;
  4507. while (entry != NULL) {
  4508. ++nameCount;
  4509. if (nameCount > 1) {
  4510. if (wolfSSL_BIO_write(bio, ", ", 2) <= 0) {
  4511. ret = WOLFSSL_FAILURE;
  4512. break;
  4513. }
  4514. }
  4515. if (entry->type == ASN_DNS_TYPE) {
  4516. if (entry->name == NULL) {
  4517. WOLFSSL_MSG("NULL DNS alt name.");
  4518. ret = WOLFSSL_FAILURE;
  4519. break;
  4520. }
  4521. if (wolfSSL_BIO_write(bio, "DNS:", 4) <= 0) {
  4522. ret = WOLFSSL_FAILURE;
  4523. break;
  4524. }
  4525. if (wolfSSL_BIO_write(bio, entry->name,
  4526. (int)XSTRLEN(entry->name))
  4527. <= 0) {
  4528. ret = WOLFSSL_FAILURE;
  4529. break;
  4530. }
  4531. }
  4532. #if defined(OPENSSL_ALL) || defined(WOLFSSL_IP_ALT_NAME)
  4533. else if (entry->type == ASN_IP_TYPE) {
  4534. if (entry->ipString == NULL) {
  4535. WOLFSSL_MSG("NULL IP address alt name.");
  4536. ret = WOLFSSL_FAILURE;
  4537. break;
  4538. }
  4539. if (wolfSSL_BIO_write(bio, "IP Address:", 11) <= 0) {
  4540. ret = WOLFSSL_FAILURE;
  4541. break;
  4542. }
  4543. if (wolfSSL_BIO_write(bio, entry->ipString,
  4544. (int)XSTRLEN(entry->ipString)) <= 0) {
  4545. ret = WOLFSSL_FAILURE;
  4546. break;
  4547. }
  4548. }
  4549. #endif /* OPENSSL_ALL || WOLFSSL_IP_ALT_NAME */
  4550. else {
  4551. WOLFSSL_MSG("Bad alt name type.");
  4552. ret = WOLFSSL_FAILURE;
  4553. break;
  4554. }
  4555. entry = entry->next;
  4556. }
  4557. }
  4558. if (ret == WOLFSSL_SUCCESS && wolfSSL_BIO_write(bio, "\n", 1) <= 0) {
  4559. ret = WOLFSSL_FAILURE;
  4560. }
  4561. }
  4562. return ret;
  4563. }
  4564. #ifdef XSNPRINTF
  4565. static int X509PrintKeyUsage(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
  4566. {
  4567. int ret = WOLFSSL_SUCCESS;
  4568. word32 i = 0;
  4569. int usageCount = 0;
  4570. const int usages[] = {
  4571. KEYUSE_DIGITAL_SIG,
  4572. KEYUSE_CONTENT_COMMIT,
  4573. KEYUSE_KEY_ENCIPHER,
  4574. KEYUSE_DATA_ENCIPHER,
  4575. KEYUSE_KEY_AGREE,
  4576. KEYUSE_KEY_CERT_SIGN,
  4577. KEYUSE_CRL_SIGN,
  4578. KEYUSE_ENCIPHER_ONLY,
  4579. KEYUSE_DECIPHER_ONLY
  4580. };
  4581. const char* usageStrs[] = {
  4582. "Digital Signature",
  4583. "Non Repudiation",
  4584. "Key Encipherment",
  4585. "Data Encipherment",
  4586. "Key Agreement",
  4587. "Certificate Sign",
  4588. "CRL Sign",
  4589. "Encipher Only",
  4590. "Decipher Only"
  4591. };
  4592. if (bio == NULL || x509 == NULL) {
  4593. ret = WOLFSSL_FAILURE;
  4594. }
  4595. if (ret == WOLFSSL_SUCCESS && x509->keyUsageSet
  4596. && x509->keyUsage != 0) {
  4597. if (wolfSSL_BIO_write(bio, " X509v3 Key Usage: ", 30) <= 0) {
  4598. ret = WOLFSSL_FAILURE;
  4599. }
  4600. if (ret == WOLFSSL_SUCCESS && x509->keyUsageCrit &&
  4601. wolfSSL_BIO_write(bio, "critical", 8) <= 0) {
  4602. ret = WOLFSSL_FAILURE;
  4603. }
  4604. if (ret == WOLFSSL_SUCCESS &&
  4605. wolfSSL_BIO_write(bio, "\n ", 17) <= 0) {
  4606. ret = WOLFSSL_FAILURE;
  4607. }
  4608. for (; ret == WOLFSSL_SUCCESS && i < sizeof(usages) / sizeof(usages[i]);
  4609. i++) {
  4610. if (x509->keyUsage & usages[i]) {
  4611. ++usageCount;
  4612. if (usageCount > 1 && wolfSSL_BIO_write(bio, ", ", 2) <= 0) {
  4613. ret = WOLFSSL_FAILURE;
  4614. break;
  4615. }
  4616. if (wolfSSL_BIO_write(bio, usageStrs[i],
  4617. (int)XSTRLEN(usageStrs[i])) <= 0) {
  4618. ret = WOLFSSL_FAILURE;
  4619. break;
  4620. }
  4621. }
  4622. }
  4623. if (ret == WOLFSSL_SUCCESS && wolfSSL_BIO_write(bio, "\n", 1) <= 0) {
  4624. ret = WOLFSSL_FAILURE;
  4625. }
  4626. }
  4627. return ret;
  4628. }
  4629. static int X509PrintExtendedKeyUsage(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
  4630. {
  4631. int ret = WOLFSSL_SUCCESS;
  4632. word32 i = 0;
  4633. int usageCount = 0;
  4634. const int usages[] = {
  4635. EXTKEYUSE_OCSP_SIGN,
  4636. EXTKEYUSE_TIMESTAMP,
  4637. EXTKEYUSE_EMAILPROT,
  4638. EXTKEYUSE_CODESIGN,
  4639. EXTKEYUSE_CLIENT_AUTH,
  4640. EXTKEYUSE_SERVER_AUTH
  4641. };
  4642. const char* usageStrs[] = {
  4643. "OCSP Signing",
  4644. "Time Stamping",
  4645. "E-mail Protection",
  4646. "Code Signing",
  4647. "TLS Web Client Authentication",
  4648. "TLS Web Server Authentication"
  4649. };
  4650. if (bio == NULL || x509 == NULL) {
  4651. ret = WOLFSSL_FAILURE;
  4652. }
  4653. if (ret == WOLFSSL_SUCCESS && x509->extKeyUsageCount > 0
  4654. && x509->extKeyUsage != 0) {
  4655. if (wolfSSL_BIO_write(bio,
  4656. " X509v3 Extended Key Usage: ", 39) <= 0) {
  4657. ret = WOLFSSL_FAILURE;
  4658. }
  4659. if (ret == WOLFSSL_SUCCESS && x509->extKeyUsageCrit &&
  4660. wolfSSL_BIO_write(bio, "critical", 8) <= 0) {
  4661. ret = WOLFSSL_FAILURE;
  4662. }
  4663. if (ret == WOLFSSL_SUCCESS &&
  4664. wolfSSL_BIO_write(bio, "\n ", 17) <= 0) {
  4665. ret = WOLFSSL_FAILURE;
  4666. }
  4667. for (; ret == WOLFSSL_SUCCESS && i < sizeof(usages) / sizeof(usages[i]);
  4668. i++) {
  4669. if (x509->extKeyUsage & usages[i]) {
  4670. ++usageCount;
  4671. if (usageCount > 1 && wolfSSL_BIO_write(bio, ", ", 2) <= 0) {
  4672. ret = WOLFSSL_FAILURE;
  4673. break;
  4674. }
  4675. if (wolfSSL_BIO_write(bio, usageStrs[i],
  4676. (int)XSTRLEN(usageStrs[i])) <= 0) {
  4677. ret = WOLFSSL_FAILURE;
  4678. break;
  4679. }
  4680. }
  4681. }
  4682. if (ret == WOLFSSL_SUCCESS && wolfSSL_BIO_write(bio, "\n", 1) <= 0) {
  4683. ret = WOLFSSL_FAILURE;
  4684. }
  4685. }
  4686. return ret;
  4687. }
  4688. /* Writes the human readable form of x509 to bio.
  4689. *
  4690. * bio WOLFSSL_BIO to write to.
  4691. * x509 Certificate to write.
  4692. *
  4693. * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on failure
  4694. */
  4695. int wolfSSL_X509_print_ex(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
  4696. unsigned long nmflags, unsigned long cflag)
  4697. {
  4698. WOLFSSL_ENTER("wolfSSL_X509_print_ex");
  4699. /* flags currently not supported */
  4700. (void)nmflags;
  4701. (void)cflag;
  4702. if (bio == NULL || x509 == NULL) {
  4703. return WOLFSSL_FAILURE;
  4704. }
  4705. if (wolfSSL_BIO_write(bio, "Certificate:\n",
  4706. (int)XSTRLEN("Certificate:\n")) <= 0) {
  4707. return WOLFSSL_FAILURE;
  4708. }
  4709. if (wolfSSL_BIO_write(bio, " Data:\n",
  4710. (int)XSTRLEN(" Data:\n")) <= 0) {
  4711. return WOLFSSL_FAILURE;
  4712. }
  4713. /* print version of cert */
  4714. {
  4715. int version;
  4716. char tmp[20];
  4717. if ((version = wolfSSL_X509_version(x509)) < 0) {
  4718. WOLFSSL_MSG("Error getting X509 version");
  4719. return WOLFSSL_FAILURE;
  4720. }
  4721. if (wolfSSL_BIO_write(bio, " Version:",
  4722. (int)XSTRLEN(" Version:")) <= 0) {
  4723. return WOLFSSL_FAILURE;
  4724. }
  4725. if (XSNPRINTF(tmp, sizeof(tmp), " %d (0x%x)\n",
  4726. version, (byte)version-1)
  4727. >= (int)sizeof(tmp))
  4728. {
  4729. WOLFSSL_MSG("buffer overrun");
  4730. return WOLFSSL_FAILURE;
  4731. }
  4732. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  4733. return WOLFSSL_FAILURE;
  4734. }
  4735. }
  4736. /* print serial number out */
  4737. {
  4738. unsigned char serial[32];
  4739. int sz = sizeof(serial);
  4740. XMEMSET(serial, 0, sz);
  4741. if (wolfSSL_X509_get_serial_number(x509, serial, &sz)
  4742. != WOLFSSL_SUCCESS) {
  4743. WOLFSSL_MSG("Error getting x509 serial number");
  4744. return WOLFSSL_FAILURE;
  4745. }
  4746. if (wolfSSL_BIO_write(bio, " Serial Number:",
  4747. (int)XSTRLEN(" Serial Number:")) <= 0) {
  4748. return WOLFSSL_FAILURE;
  4749. }
  4750. /* if serial can fit into byte than print on the same line */
  4751. if (sz <= (int)sizeof(byte)) {
  4752. char tmp[17];
  4753. if (XSNPRINTF(tmp, sizeof(tmp), " %d (0x%x)\n", serial[0],serial[0])
  4754. >= (int)sizeof(tmp))
  4755. {
  4756. WOLFSSL_MSG("buffer overrun");
  4757. return WOLFSSL_FAILURE;
  4758. }
  4759. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  4760. return WOLFSSL_FAILURE;
  4761. }
  4762. }
  4763. else {
  4764. int i;
  4765. char tmp[100];
  4766. int tmpSz = 100;
  4767. char val[5];
  4768. int valSz = 5;
  4769. /* serial is larger than int size so print off hex values */
  4770. if (wolfSSL_BIO_write(bio, "\n ",
  4771. (int)XSTRLEN("\n ")) <= 0) {
  4772. return WOLFSSL_FAILURE;
  4773. }
  4774. tmp[0] = '\0';
  4775. for (i = 0; i < sz - 1 && (3 * i) < tmpSz - valSz; i++) {
  4776. if (XSNPRINTF(val, sizeof(val), "%02x:", serial[i])
  4777. >= (int)sizeof(val))
  4778. {
  4779. WOLFSSL_MSG("buffer overrun");
  4780. return WOLFSSL_FAILURE;
  4781. }
  4782. val[3] = '\0'; /* make sure is null terminated */
  4783. XSTRNCAT(tmp, val, valSz);
  4784. }
  4785. if (XSNPRINTF(val, sizeof(val), "%02x\n", serial[i])
  4786. >= (int)sizeof(val))
  4787. {
  4788. WOLFSSL_MSG("buffer overrun");
  4789. return WOLFSSL_FAILURE;
  4790. }
  4791. val[3] = '\0'; /* make sure is null terminated */
  4792. XSTRNCAT(tmp, val, valSz);
  4793. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  4794. return WOLFSSL_FAILURE;
  4795. }
  4796. }
  4797. }
  4798. /* print signature algo */
  4799. {
  4800. int oid;
  4801. const char* sig;
  4802. if ((oid = wolfSSL_X509_get_signature_type(x509)) <= 0) {
  4803. WOLFSSL_MSG("Error getting x509 signature type");
  4804. return WOLFSSL_FAILURE;
  4805. }
  4806. if (wolfSSL_BIO_write(bio, " Signature Algorithm: ",
  4807. (int)XSTRLEN(" Signature Algorithm: ")) <= 0) {
  4808. return WOLFSSL_FAILURE;
  4809. }
  4810. sig = GetSigName(oid);
  4811. if (wolfSSL_BIO_write(bio, sig, (int)XSTRLEN(sig)) <= 0) {
  4812. return WOLFSSL_FAILURE;
  4813. }
  4814. if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
  4815. return WOLFSSL_FAILURE;
  4816. }
  4817. }
  4818. /* print issuer */
  4819. {
  4820. char* issuer;
  4821. #ifdef WOLFSSL_SMALL_STACK
  4822. char* buff = NULL;
  4823. int issSz = 0;
  4824. #else
  4825. char buff[256];
  4826. int issSz = 256;
  4827. #endif
  4828. issuer = wolfSSL_X509_get_name_oneline(
  4829. wolfSSL_X509_get_issuer_name(x509), buff, issSz);
  4830. if (wolfSSL_BIO_write(bio, " Issuer: ",
  4831. (int)XSTRLEN(" Issuer: ")) <= 0) {
  4832. #ifdef WOLFSSL_SMALL_STACK
  4833. XFREE(issuer, NULL, DYNAMIC_TYPE_OPENSSL);
  4834. #endif
  4835. return WOLFSSL_FAILURE;
  4836. }
  4837. if (issuer != NULL) {
  4838. if (wolfSSL_BIO_write(bio, issuer, (int)XSTRLEN(issuer)) <= 0) {
  4839. #ifdef WOLFSSL_SMALL_STACK
  4840. XFREE(issuer, NULL, DYNAMIC_TYPE_OPENSSL);
  4841. #endif
  4842. return WOLFSSL_FAILURE;
  4843. }
  4844. }
  4845. #ifdef WOLFSSL_SMALL_STACK
  4846. XFREE(issuer, NULL, DYNAMIC_TYPE_OPENSSL);
  4847. #endif
  4848. if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
  4849. return WOLFSSL_FAILURE;
  4850. }
  4851. }
  4852. #ifndef NO_ASN_TIME
  4853. /* print validity */
  4854. {
  4855. char tmp[80];
  4856. if (wolfSSL_BIO_write(bio, " Validity\n",
  4857. (int)XSTRLEN(" Validity\n")) <= 0) {
  4858. return WOLFSSL_FAILURE;
  4859. }
  4860. if (wolfSSL_BIO_write(bio, " Not Before: ",
  4861. (int)XSTRLEN(" Not Before: ")) <= 0) {
  4862. return WOLFSSL_FAILURE;
  4863. }
  4864. if (x509->notBefore.length > 0) {
  4865. if (GetTimeString(x509->notBefore.data, ASN_UTC_TIME,
  4866. tmp, sizeof(tmp)) != WOLFSSL_SUCCESS) {
  4867. if (GetTimeString(x509->notBefore.data, ASN_GENERALIZED_TIME,
  4868. tmp, sizeof(tmp)) != WOLFSSL_SUCCESS) {
  4869. WOLFSSL_MSG("Error getting not before date");
  4870. return WOLFSSL_FAILURE;
  4871. }
  4872. }
  4873. }
  4874. else {
  4875. XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
  4876. }
  4877. tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
  4878. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  4879. return WOLFSSL_FAILURE;
  4880. }
  4881. if (wolfSSL_BIO_write(bio, "\n Not After : ",
  4882. (int)XSTRLEN("\n Not After : ")) <= 0) {
  4883. return WOLFSSL_FAILURE;
  4884. }
  4885. if (x509->notAfter.length > 0) {
  4886. if (GetTimeString(x509->notAfter.data, ASN_UTC_TIME,
  4887. tmp, sizeof(tmp)) != WOLFSSL_SUCCESS) {
  4888. if (GetTimeString(x509->notAfter.data, ASN_GENERALIZED_TIME,
  4889. tmp, sizeof(tmp)) != WOLFSSL_SUCCESS) {
  4890. WOLFSSL_MSG("Error getting not after date");
  4891. return WOLFSSL_FAILURE;
  4892. }
  4893. }
  4894. }
  4895. else {
  4896. XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
  4897. }
  4898. tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
  4899. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  4900. return WOLFSSL_FAILURE;
  4901. }
  4902. }
  4903. #endif
  4904. /* print subject */
  4905. {
  4906. char* subject;
  4907. #ifdef WOLFSSL_SMALL_STACK
  4908. char* buff = NULL;
  4909. int subSz = 0;
  4910. #else
  4911. char buff[256];
  4912. int subSz = 256;
  4913. #endif
  4914. subject = wolfSSL_X509_get_name_oneline(
  4915. wolfSSL_X509_get_subject_name(x509), buff, subSz);
  4916. if (wolfSSL_BIO_write(bio, "\n Subject: ",
  4917. (int)XSTRLEN("\n Subject: ")) <= 0) {
  4918. #ifdef WOLFSSL_SMALL_STACK
  4919. XFREE(subject, NULL, DYNAMIC_TYPE_OPENSSL);
  4920. #endif
  4921. return WOLFSSL_FAILURE;
  4922. }
  4923. if (subject != NULL) {
  4924. if (wolfSSL_BIO_write(bio, subject, (int)XSTRLEN(subject)) <= 0) {
  4925. #ifdef WOLFSSL_SMALL_STACK
  4926. XFREE(subject, NULL, DYNAMIC_TYPE_OPENSSL);
  4927. #endif
  4928. return WOLFSSL_FAILURE;
  4929. }
  4930. }
  4931. #ifdef WOLFSSL_SMALL_STACK
  4932. XFREE(subject, NULL, DYNAMIC_TYPE_OPENSSL);
  4933. #endif
  4934. }
  4935. /* get and print public key */
  4936. if (wolfSSL_BIO_write(bio, "\n Subject Public Key Info:\n",
  4937. (int)XSTRLEN("\n Subject Public Key Info:\n")) <= 0) {
  4938. return WOLFSSL_FAILURE;
  4939. }
  4940. {
  4941. #if (!defined(NO_RSA) && !defined(HAVE_USER_RSA)) || defined(HAVE_ECC)
  4942. char tmp[100];
  4943. #endif
  4944. switch (x509->pubKeyOID) {
  4945. #ifndef NO_RSA
  4946. case RSAk:
  4947. if (wolfSSL_BIO_write(bio,
  4948. " Public Key Algorithm: rsaEncryption\n",
  4949. (int)XSTRLEN(" Public Key Algorithm: rsaEncryption\n")) <= 0) {
  4950. return WOLFSSL_FAILURE;
  4951. }
  4952. #ifdef HAVE_USER_RSA
  4953. if (wolfSSL_BIO_write(bio,
  4954. " Build without user RSA to print key\n",
  4955. (int)XSTRLEN(" Build without user RSA to print key\n"))
  4956. <= 0) {
  4957. return WOLFSSL_FAILURE;
  4958. }
  4959. #else
  4960. {
  4961. word32 idx = 0;
  4962. int sz;
  4963. byte lbit = 0;
  4964. int rawLen;
  4965. unsigned char* rawKey;
  4966. #ifdef WOLFSSL_SMALL_STACK
  4967. RsaKey *rsa = (RsaKey*)XMALLOC(sizeof(RsaKey), NULL,
  4968. DYNAMIC_TYPE_RSA);
  4969. if (rsa == NULL) {
  4970. WOLFSSL_MSG("RsaKey malloc failure");
  4971. return WOLFSSL_FAILURE;
  4972. }
  4973. #else
  4974. RsaKey rsa[1];
  4975. #endif
  4976. if (wc_InitRsaKey(rsa, NULL) != 0) {
  4977. WOLFSSL_MSG("wc_InitRsaKey failure");
  4978. return WOLFSSL_FAILURE;
  4979. }
  4980. if (wc_RsaPublicKeyDecode(x509->pubKey.buffer,
  4981. &idx, rsa, x509->pubKey.length) != 0) {
  4982. WOLFSSL_MSG("Error decoding RSA key");
  4983. wc_FreeRsaKey(rsa);
  4984. #ifdef WOLFSSL_SMALL_STACK
  4985. XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
  4986. #endif
  4987. return WOLFSSL_FAILURE;
  4988. }
  4989. if ((sz = wc_RsaEncryptSize(rsa)) < 0) {
  4990. WOLFSSL_MSG("Error getting RSA key size");
  4991. wc_FreeRsaKey(rsa);
  4992. #ifdef WOLFSSL_SMALL_STACK
  4993. XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
  4994. #endif
  4995. return WOLFSSL_FAILURE;
  4996. }
  4997. if (XSNPRINTF(tmp, sizeof(tmp), "%s%s: (%d bit)\n%s\n",
  4998. " ", "Public-Key", 8 * sz,
  4999. " Modulus:")
  5000. >= (int)sizeof(tmp))
  5001. {
  5002. WOLFSSL_MSG("buffer overrun");
  5003. return WOLFSSL_FAILURE;
  5004. }
  5005. tmp[sizeof(tmp) - 1] = '\0';
  5006. if (wolfSSL_BIO_write(bio, tmp,
  5007. (int)XSTRLEN(tmp)) <= 0) {
  5008. wc_FreeRsaKey(rsa);
  5009. #ifdef WOLFSSL_SMALL_STACK
  5010. XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
  5011. #endif
  5012. return WOLFSSL_FAILURE;
  5013. }
  5014. /* print out modulus */
  5015. if (XSNPRINTF(tmp, sizeof(tmp), " ")
  5016. >= (int)sizeof(tmp))
  5017. {
  5018. WOLFSSL_MSG("buffer overrun");
  5019. return WOLFSSL_FAILURE;
  5020. }
  5021. tmp[sizeof(tmp) - 1] = '\0';
  5022. if (mp_leading_bit(&rsa->n)) {
  5023. lbit = 1;
  5024. XSTRNCAT(tmp, "00", 3);
  5025. }
  5026. rawLen = mp_unsigned_bin_size(&rsa->n);
  5027. rawKey = (unsigned char*)XMALLOC(rawLen, NULL,
  5028. DYNAMIC_TYPE_TMP_BUFFER);
  5029. if (rawKey == NULL) {
  5030. WOLFSSL_MSG("Memory error");
  5031. wc_FreeRsaKey(rsa);
  5032. #ifdef WOLFSSL_SMALL_STACK
  5033. XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
  5034. #endif
  5035. return WOLFSSL_FAILURE;
  5036. }
  5037. mp_to_unsigned_bin(&rsa->n, rawKey);
  5038. for (idx = 0; idx < (word32)rawLen; idx++) {
  5039. char val[5];
  5040. int valSz = (int)sizeof(val);
  5041. if ((idx == 0) && !lbit) {
  5042. if (XSNPRINTF(val, valSz, "%02x", rawKey[idx])
  5043. >= valSz)
  5044. {
  5045. WOLFSSL_MSG("buffer overrun");
  5046. return WOLFSSL_FAILURE;
  5047. }
  5048. }
  5049. else if ((idx != 0) && (((idx + lbit) % 15) == 0)) {
  5050. tmp[sizeof(tmp) - 1] = '\0';
  5051. if (wolfSSL_BIO_write(bio, tmp,
  5052. (int)XSTRLEN(tmp)) <= 0) {
  5053. XFREE(rawKey, NULL,
  5054. DYNAMIC_TYPE_TMP_BUFFER);
  5055. wc_FreeRsaKey(rsa);
  5056. #ifdef WOLFSSL_SMALL_STACK
  5057. XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
  5058. #endif
  5059. return WOLFSSL_FAILURE;
  5060. }
  5061. if (XSNPRINTF(tmp, sizeof(tmp),
  5062. ":\n ")
  5063. >= (int)sizeof(tmp))
  5064. {
  5065. WOLFSSL_MSG("buffer overrun");
  5066. return WOLFSSL_FAILURE;
  5067. }
  5068. if (XSNPRINTF(val, valSz, "%02x", rawKey[idx])
  5069. >= valSz)
  5070. {
  5071. WOLFSSL_MSG("buffer overrun");
  5072. return WOLFSSL_FAILURE;
  5073. }
  5074. }
  5075. else {
  5076. if (XSNPRINTF(val, valSz, ":%02x", rawKey[idx])
  5077. >= valSz)
  5078. {
  5079. WOLFSSL_MSG("buffer overrun");
  5080. return WOLFSSL_FAILURE;
  5081. }
  5082. }
  5083. XSTRNCAT(tmp, val, valSz);
  5084. }
  5085. XFREE(rawKey, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  5086. /* print out remaining modulus values */
  5087. if ((idx > 0) && (((idx - 1 + lbit) % 15) != 0)) {
  5088. tmp[sizeof(tmp) - 1] = '\0';
  5089. if (wolfSSL_BIO_write(bio, tmp,
  5090. (int)XSTRLEN(tmp)) <= 0) {
  5091. wc_FreeRsaKey(rsa);
  5092. #ifdef WOLFSSL_SMALL_STACK
  5093. XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
  5094. #endif
  5095. return WOLFSSL_FAILURE;
  5096. }
  5097. }
  5098. /* print out exponent values */
  5099. rawLen = mp_unsigned_bin_size(&rsa->e);
  5100. if (rawLen < 0) {
  5101. WOLFSSL_MSG("Error getting exponent size");
  5102. wc_FreeRsaKey(rsa);
  5103. #ifdef WOLFSSL_SMALL_STACK
  5104. XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
  5105. #endif
  5106. return WOLFSSL_FAILURE;
  5107. }
  5108. if ((word32)rawLen < sizeof(word32)) {
  5109. rawLen = sizeof(word32);
  5110. }
  5111. rawKey = (unsigned char*)XMALLOC(rawLen, NULL,
  5112. DYNAMIC_TYPE_TMP_BUFFER);
  5113. if (rawKey == NULL) {
  5114. WOLFSSL_MSG("Memory error");
  5115. wc_FreeRsaKey(rsa);
  5116. #ifdef WOLFSSL_SMALL_STACK
  5117. XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
  5118. #endif
  5119. return WOLFSSL_FAILURE;
  5120. }
  5121. XMEMSET(rawKey, 0, rawLen);
  5122. mp_to_unsigned_bin(&rsa->e, rawKey);
  5123. if ((word32)rawLen <= sizeof(word32)) {
  5124. idx = *(word32*)rawKey;
  5125. #ifdef BIG_ENDIAN_ORDER
  5126. idx = ByteReverseWord32(idx);
  5127. #endif
  5128. }
  5129. if (XSNPRINTF(tmp, sizeof(tmp),
  5130. "\n Exponent: %u (0x%x)\n",idx, idx)
  5131. >= (int)sizeof(tmp))
  5132. {
  5133. WOLFSSL_MSG("buffer overrun");
  5134. return WOLFSSL_FAILURE;
  5135. }
  5136. if (wolfSSL_BIO_write(bio, tmp,
  5137. (int)XSTRLEN(tmp)) <= 0) {
  5138. XFREE(rawKey, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  5139. wc_FreeRsaKey(rsa);
  5140. #ifdef WOLFSSL_SMALL_STACK
  5141. XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
  5142. #endif
  5143. return WOLFSSL_FAILURE;
  5144. }
  5145. XFREE(rawKey, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  5146. wc_FreeRsaKey(rsa);
  5147. #ifdef WOLFSSL_SMALL_STACK
  5148. XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
  5149. #endif
  5150. }
  5151. #endif /* HAVE_USER_RSA */
  5152. break;
  5153. #endif /* NO_RSA */
  5154. #ifdef HAVE_ECC
  5155. case ECDSAk:
  5156. {
  5157. word32 i;
  5158. #ifdef WOLFSSL_SMALL_STACK
  5159. ecc_key *ecc = (ecc_key*)XMALLOC(sizeof(ecc_key), NULL,
  5160. DYNAMIC_TYPE_ECC);
  5161. if (ecc == NULL)
  5162. return WOLFSSL_FAILURE;
  5163. #else
  5164. ecc_key ecc[1];
  5165. #endif
  5166. if (wolfSSL_BIO_write(bio,
  5167. " Public Key Algorithm: EC\n",
  5168. (int)XSTRLEN(" Public Key Algorithm: EC\n")) <= 0) {
  5169. #ifdef WOLFSSL_SMALL_STACK
  5170. XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
  5171. #endif
  5172. return WOLFSSL_FAILURE;
  5173. }
  5174. if (wc_ecc_init_ex(ecc, x509->heap, INVALID_DEVID)
  5175. != 0) {
  5176. #ifdef WOLFSSL_SMALL_STACK
  5177. XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
  5178. #endif
  5179. return WOLFSSL_FAILURE;
  5180. }
  5181. i = 0;
  5182. if (wc_EccPublicKeyDecode(x509->pubKey.buffer, &i,
  5183. ecc, x509->pubKey.length) != 0) {
  5184. wc_ecc_free(ecc);
  5185. #ifdef WOLFSSL_SMALL_STACK
  5186. XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
  5187. #endif
  5188. return WOLFSSL_FAILURE;
  5189. }
  5190. if (XSNPRINTF(tmp, sizeof(tmp), "%s%s: (%d bit)\n%s\n",
  5191. " ", "Public-Key",
  5192. 8 * wc_ecc_size(ecc),
  5193. " pub:")
  5194. >= (int)sizeof(tmp))
  5195. {
  5196. WOLFSSL_MSG("buffer overrun");
  5197. return WOLFSSL_FAILURE;
  5198. }
  5199. tmp[sizeof(tmp) - 1] = '\0';
  5200. if (wolfSSL_BIO_write(bio, tmp,
  5201. (int)XSTRLEN(tmp)) <= 0) {
  5202. wc_ecc_free(ecc);
  5203. #ifdef WOLFSSL_SMALL_STACK
  5204. XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
  5205. #endif
  5206. return WOLFSSL_FAILURE;
  5207. }
  5208. if (XSNPRINTF(tmp, sizeof(tmp)," ")
  5209. >= (int)sizeof(tmp))
  5210. {
  5211. WOLFSSL_MSG("buffer overrun");
  5212. return WOLFSSL_FAILURE;
  5213. }
  5214. {
  5215. word32 derSz;
  5216. byte* der;
  5217. derSz = wc_ecc_size(ecc) * WOLFSSL_BIT_SIZE;
  5218. der = (byte*)XMALLOC(derSz, x509->heap,
  5219. DYNAMIC_TYPE_TMP_BUFFER);
  5220. if (der == NULL) {
  5221. wc_ecc_free(ecc);
  5222. #ifdef WOLFSSL_SMALL_STACK
  5223. XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
  5224. #endif
  5225. return WOLFSSL_FAILURE;
  5226. }
  5227. PRIVATE_KEY_UNLOCK();
  5228. if (wc_ecc_export_x963(ecc, der, &derSz) != 0) {
  5229. PRIVATE_KEY_LOCK();
  5230. wc_ecc_free(ecc);
  5231. #ifdef WOLFSSL_SMALL_STACK
  5232. XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
  5233. #endif
  5234. XFREE(der, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
  5235. return WOLFSSL_FAILURE;
  5236. }
  5237. PRIVATE_KEY_LOCK();
  5238. for (i = 0; i < derSz; i++) {
  5239. char val[5];
  5240. int valSz = 5;
  5241. if (i == 0) {
  5242. if (XSNPRINTF(val, valSz, "%02x", der[i])
  5243. >= valSz)
  5244. {
  5245. WOLFSSL_MSG("buffer overrun");
  5246. return WOLFSSL_FAILURE;
  5247. }
  5248. }
  5249. else if ((i % 15) == 0) {
  5250. tmp[sizeof(tmp) - 1] = '\0';
  5251. if (wolfSSL_BIO_write(bio, tmp,
  5252. (int)XSTRLEN(tmp)) <= 0) {
  5253. wc_ecc_free(ecc);
  5254. #ifdef WOLFSSL_SMALL_STACK
  5255. XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
  5256. #endif
  5257. XFREE(der, x509->heap,
  5258. DYNAMIC_TYPE_TMP_BUFFER);
  5259. return WOLFSSL_FAILURE;
  5260. }
  5261. if (XSNPRINTF(tmp, sizeof(tmp),
  5262. ":\n ")
  5263. >= (int)sizeof(tmp))
  5264. {
  5265. WOLFSSL_MSG("buffer overrun");
  5266. return WOLFSSL_FAILURE;
  5267. }
  5268. if (XSNPRINTF(val, valSz, "%02x", der[i])
  5269. >= valSz)
  5270. {
  5271. WOLFSSL_MSG("buffer overrun");
  5272. return WOLFSSL_FAILURE;
  5273. }
  5274. }
  5275. else {
  5276. if (XSNPRINTF(val, valSz, ":%02x", der[i])
  5277. >= valSz)
  5278. {
  5279. WOLFSSL_MSG("buffer overrun");
  5280. return WOLFSSL_FAILURE;
  5281. }
  5282. }
  5283. XSTRNCAT(tmp, val, valSz);
  5284. }
  5285. /* print out remaining modulus values */
  5286. if ((i > 0) && (((i - 1) % 15) != 0)) {
  5287. tmp[sizeof(tmp) - 1] = '\0';
  5288. if (wolfSSL_BIO_write(bio, tmp,
  5289. (int)XSTRLEN(tmp)) <= 0) {
  5290. wc_ecc_free(ecc);
  5291. #ifdef WOLFSSL_SMALL_STACK
  5292. XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
  5293. #endif
  5294. XFREE(der, x509->heap,
  5295. DYNAMIC_TYPE_TMP_BUFFER);
  5296. return WOLFSSL_FAILURE;
  5297. }
  5298. }
  5299. XFREE(der, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
  5300. }
  5301. if (XSNPRINTF(tmp, sizeof(tmp), "\n%s%s: %s\n",
  5302. " ", "ASN1 OID",
  5303. ecc->dp->name)
  5304. >= (int)sizeof(tmp))
  5305. {
  5306. WOLFSSL_MSG("buffer overrun");
  5307. return WOLFSSL_FAILURE;
  5308. }
  5309. if (wolfSSL_BIO_write(bio, tmp,
  5310. (int)XSTRLEN(tmp)) <= 0) {
  5311. wc_ecc_free(ecc);
  5312. #ifdef WOLFSSL_SMALL_STACK
  5313. XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
  5314. #endif
  5315. return WOLFSSL_FAILURE;
  5316. }
  5317. #ifdef WOLFSSL_SMALL_STACK
  5318. XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
  5319. #endif
  5320. wc_ecc_free(ecc);
  5321. }
  5322. break;
  5323. #endif /* HAVE_ECC */
  5324. default:
  5325. WOLFSSL_MSG("Unknown key type");
  5326. return WOLFSSL_FAILURE;
  5327. }
  5328. }
  5329. /* print out extensions */
  5330. if (wolfSSL_BIO_write(bio, " X509v3 extensions:\n",
  5331. (int)XSTRLEN(" X509v3 extensions:\n")) <= 0) {
  5332. return WOLFSSL_FAILURE;
  5333. }
  5334. /* print subject key id */
  5335. if (x509->subjKeyIdSet && x509->subjKeyId != NULL &&
  5336. x509->subjKeyIdSz > 0) {
  5337. char tmp[100];
  5338. word32 i;
  5339. char val[5];
  5340. int valSz = 5;
  5341. if (XSNPRINTF(tmp, sizeof(tmp),
  5342. " X509v3 Subject Key Identifier: ")
  5343. >= (int)sizeof(tmp))
  5344. {
  5345. WOLFSSL_MSG("buffer overrun");
  5346. return WOLFSSL_FAILURE;
  5347. }
  5348. if (x509->subjKeyIdCrit) {
  5349. XSTRNCAT(tmp, "critical", sizeof(tmp) - XSTRLEN(tmp) - 1);
  5350. }
  5351. XSTRNCAT(tmp, "\n", sizeof(tmp) - XSTRLEN(tmp) - 1);
  5352. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  5353. return WOLFSSL_FAILURE;
  5354. }
  5355. XMEMSET(tmp, 0, sizeof(tmp));
  5356. if (XSNPRINTF(tmp, sizeof(tmp), " ")
  5357. >= (int)sizeof(tmp))
  5358. {
  5359. WOLFSSL_MSG("buffer overrun");
  5360. return WOLFSSL_FAILURE;
  5361. }
  5362. for (i = 0; i < sizeof(tmp) && i < (x509->subjKeyIdSz - 1); i++) {
  5363. if (XSNPRINTF(val, valSz, "%02X:", x509->subjKeyId[i])
  5364. >= valSz)
  5365. {
  5366. WOLFSSL_MSG("buffer overrun");
  5367. return WOLFSSL_FAILURE;
  5368. }
  5369. XSTRNCAT(tmp, val, valSz);
  5370. }
  5371. if (XSNPRINTF(val, valSz, "%02X\n", x509->subjKeyId[i])
  5372. >= valSz)
  5373. {
  5374. WOLFSSL_MSG("buffer overrun");
  5375. return WOLFSSL_FAILURE;
  5376. }
  5377. XSTRNCAT(tmp, val, valSz);
  5378. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  5379. return WOLFSSL_FAILURE;
  5380. }
  5381. }
  5382. /* printf out authority key id */
  5383. if (x509->authKeyIdSet && x509->authKeyId != NULL &&
  5384. x509->authKeyIdSz > 0) {
  5385. char tmp[100];
  5386. word32 i;
  5387. char val[5];
  5388. int valSz = 5;
  5389. int len = 0;
  5390. if (XSNPRINTF(tmp, sizeof(tmp),
  5391. " X509v3 Authority Key Identifier: ")
  5392. >= (int)sizeof(tmp))
  5393. {
  5394. WOLFSSL_MSG("buffer overrun");
  5395. return WOLFSSL_FAILURE;
  5396. }
  5397. if (x509->authKeyIdCrit) {
  5398. XSTRNCAT(tmp, "critical", sizeof(tmp) - XSTRLEN(tmp) - 1);
  5399. }
  5400. XSTRNCAT(tmp, "\n", sizeof(tmp) - XSTRLEN(tmp) - 1);
  5401. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  5402. return WOLFSSL_FAILURE;
  5403. }
  5404. XMEMSET(tmp, 0, sizeof(tmp));
  5405. if (XSNPRINTF(tmp, sizeof(tmp), " keyid")
  5406. >= (int)sizeof(tmp))
  5407. {
  5408. WOLFSSL_MSG("buffer overrun");
  5409. return WOLFSSL_FAILURE;
  5410. }
  5411. for (i = 0; i < x509->authKeyIdSz; i++) {
  5412. /* check if buffer is almost full */
  5413. if (XSTRLEN(tmp) >= sizeof(tmp) - valSz) {
  5414. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  5415. return WOLFSSL_FAILURE;
  5416. }
  5417. tmp[0] = '\0';
  5418. }
  5419. if (XSNPRINTF(val, valSz, ":%02X", x509->authKeyId[i])
  5420. >= valSz)
  5421. {
  5422. WOLFSSL_MSG("buffer overrun");
  5423. return WOLFSSL_FAILURE;
  5424. }
  5425. XSTRNCAT(tmp, val, valSz);
  5426. }
  5427. len = (int)XSTRLEN("\n");
  5428. XSTRNCAT(tmp, "\n", len + 1);
  5429. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  5430. return WOLFSSL_FAILURE;
  5431. }
  5432. }
  5433. /* print basic constraint */
  5434. if (x509->basicConstSet) {
  5435. char tmp[100];
  5436. if (XSNPRINTF(tmp, sizeof(tmp),
  5437. "\n X509v3 Basic Constraints: ")
  5438. >= (int)sizeof(tmp))
  5439. {
  5440. WOLFSSL_MSG("buffer overrun");
  5441. return WOLFSSL_FAILURE;
  5442. }
  5443. if (x509->basicConstCrit) {
  5444. XSTRNCAT(tmp, "critical", sizeof(tmp) - XSTRLEN(tmp) - 1);
  5445. }
  5446. XSTRNCAT(tmp, "\n", sizeof(tmp) - XSTRLEN(tmp) - 1);
  5447. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  5448. return WOLFSSL_FAILURE;
  5449. }
  5450. XMEMSET(tmp, 0, sizeof(tmp));
  5451. if (XSNPRINTF(tmp, sizeof(tmp),
  5452. " CA:%s\n",
  5453. (x509->isCa)? "TRUE": "FALSE")
  5454. >= (int)sizeof(tmp))
  5455. {
  5456. WOLFSSL_MSG("buffer overrun");
  5457. return WOLFSSL_FAILURE;
  5458. }
  5459. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  5460. return WOLFSSL_FAILURE;
  5461. }
  5462. }
  5463. X509PrintSubjAltName(bio, x509);
  5464. X509PrintKeyUsage(bio, x509);
  5465. X509PrintExtendedKeyUsage(bio, x509);
  5466. /* print out signature */
  5467. if (x509->sig.length > 0) {
  5468. unsigned char* sig;
  5469. int sigSz;
  5470. int i;
  5471. char tmp[100];
  5472. int sigOid = wolfSSL_X509_get_signature_type(x509);
  5473. if (wolfSSL_BIO_write(bio,
  5474. " Signature Algorithm: ",
  5475. (int)XSTRLEN(" Signature Algorithm: ")) <= 0) {
  5476. return WOLFSSL_FAILURE;
  5477. }
  5478. if (XSNPRINTF(tmp, sizeof(tmp),"%s\n", GetSigName(sigOid))
  5479. >= (int)sizeof(tmp))
  5480. {
  5481. WOLFSSL_MSG("buffer overrun");
  5482. return WOLFSSL_FAILURE;
  5483. }
  5484. tmp[sizeof(tmp) - 1] = '\0';
  5485. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  5486. return WOLFSSL_FAILURE;
  5487. }
  5488. sigSz = (int)x509->sig.length;
  5489. sig = (unsigned char*)XMALLOC(sigSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  5490. if (sig == NULL) {
  5491. return WOLFSSL_FAILURE;
  5492. }
  5493. if (wolfSSL_X509_get_signature(x509, sig, &sigSz) <= 0) {
  5494. XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  5495. return WOLFSSL_FAILURE;
  5496. }
  5497. if (XSNPRINTF(tmp, sizeof(tmp)," ")
  5498. >= (int)sizeof(tmp))
  5499. {
  5500. WOLFSSL_MSG("buffer overrun");
  5501. return WOLFSSL_FAILURE;
  5502. }
  5503. tmp[sizeof(tmp) - 1] = '\0';
  5504. for (i = 0; i < sigSz; i++) {
  5505. char val[5];
  5506. int valSz = 5;
  5507. if (i == 0) {
  5508. if (XSNPRINTF(val, valSz, "%02x", sig[i])
  5509. >= valSz - 1)
  5510. {
  5511. WOLFSSL_MSG("buffer overrun");
  5512. return WOLFSSL_FAILURE;
  5513. }
  5514. }
  5515. else if (((i % 18) == 0)) {
  5516. tmp[sizeof(tmp) - 1] = '\0';
  5517. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp))
  5518. <= 0) {
  5519. XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  5520. return WOLFSSL_FAILURE;
  5521. }
  5522. if (XSNPRINTF(tmp, sizeof(tmp),
  5523. ":\n ")
  5524. >= (int)sizeof(tmp))
  5525. {
  5526. WOLFSSL_MSG("buffer overrun");
  5527. return WOLFSSL_FAILURE;
  5528. }
  5529. if (XSNPRINTF(val, valSz, "%02x", sig[i])
  5530. >= valSz)
  5531. {
  5532. WOLFSSL_MSG("buffer overrun");
  5533. return WOLFSSL_FAILURE;
  5534. }
  5535. }
  5536. else {
  5537. if (XSNPRINTF(val, valSz, ":%02x", sig[i])
  5538. >= valSz)
  5539. {
  5540. WOLFSSL_MSG("buffer overrun");
  5541. return WOLFSSL_FAILURE;
  5542. }
  5543. }
  5544. XSTRNCAT(tmp, val, valSz);
  5545. }
  5546. XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  5547. /* print out remaining sig values */
  5548. if ((i > 0) && (((i - 1) % 18) != 0)) {
  5549. tmp[sizeof(tmp) - 1] = '\0';
  5550. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp))
  5551. <= 0) {
  5552. return WOLFSSL_FAILURE;
  5553. }
  5554. }
  5555. }
  5556. /* done with print out */
  5557. if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
  5558. return WOLFSSL_FAILURE;
  5559. }
  5560. return WOLFSSL_SUCCESS;
  5561. }
  5562. int wolfSSL_X509_print(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
  5563. {
  5564. return wolfSSL_X509_print_ex(bio, x509, 0, 0);
  5565. }
  5566. #ifndef NO_FILESYSTEM
  5567. int wolfSSL_X509_print_fp(XFILE fp, WOLFSSL_X509 *x509)
  5568. {
  5569. WOLFSSL_BIO* bio;
  5570. int ret;
  5571. WOLFSSL_ENTER("wolfSSL_X509_print_fp");
  5572. if (!fp || !x509) {
  5573. WOLFSSL_MSG("Bad parameter");
  5574. return WOLFSSL_FAILURE;
  5575. }
  5576. if (!(bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file()))) {
  5577. WOLFSSL_MSG("wolfSSL_BIO_new wolfSSL_BIO_s_file error");
  5578. return WOLFSSL_FAILURE;
  5579. }
  5580. if (wolfSSL_BIO_set_fp(bio, fp, BIO_NOCLOSE) != WOLFSSL_SUCCESS) {
  5581. WOLFSSL_MSG("wolfSSL_BIO_set_fp error");
  5582. wolfSSL_BIO_free(bio);
  5583. return WOLFSSL_FAILURE;
  5584. }
  5585. ret = wolfSSL_X509_print(bio, x509);
  5586. wolfSSL_BIO_free(bio);
  5587. return ret;
  5588. }
  5589. #endif /* NO_FILESYSTEM */
  5590. #endif /* XSNPRINTF */
  5591. int wolfSSL_X509_signature_print(WOLFSSL_BIO *bp,
  5592. const WOLFSSL_X509_ALGOR *sigalg, const WOLFSSL_ASN1_STRING *sig)
  5593. {
  5594. int length = 0;
  5595. word32 idx = 0;
  5596. int i;
  5597. (void)sig;
  5598. WOLFSSL_ENTER("wolfSSL_X509_signature_print");
  5599. if (!bp || !sigalg) {
  5600. WOLFSSL_MSG("Bad parameter");
  5601. return WOLFSSL_FAILURE;
  5602. }
  5603. if ((sigalg->algorithm->obj == NULL) ||
  5604. (sigalg->algorithm->obj[idx] != ASN_OBJECT_ID)) {
  5605. WOLFSSL_MSG("Bad ASN1 Object");
  5606. return WOLFSSL_FAILURE;
  5607. }
  5608. idx++; /* skip object id */
  5609. if (GetLength((const byte*)sigalg->algorithm->obj, &idx, &length,
  5610. sigalg->algorithm->objSz) < 0 || length < 0) {
  5611. return WOLFSSL_FAILURE;
  5612. }
  5613. if (wolfSSL_BIO_puts(bp, " Raw Signature Algorithm:") <= 0) {
  5614. WOLFSSL_MSG("wolfSSL_BIO_puts error");
  5615. return WOLFSSL_FAILURE;
  5616. }
  5617. for (i = 0; i < length; ++i) {
  5618. char hex_digits[4];
  5619. #ifdef XSNPRINTF
  5620. if (XSNPRINTF(hex_digits, sizeof(hex_digits), "%c%02X", i>0 ? ':' : ' ',
  5621. (unsigned int)sigalg->algorithm->obj[idx+i])
  5622. >= (int)sizeof(hex_digits))
  5623. {
  5624. WOLFSSL_MSG("buffer overrun");
  5625. return WOLFSSL_FAILURE;
  5626. }
  5627. #else
  5628. XSPRINTF(hex_digits, "%c%02X", i>0 ? ':' : ' ',
  5629. (unsigned int)sigalg->algorithm->obj[idx+i]);
  5630. #endif
  5631. if (wolfSSL_BIO_puts(bp, hex_digits) <= 0)
  5632. return WOLFSSL_FAILURE;
  5633. }
  5634. if (wolfSSL_BIO_puts(bp, "\n") <= 0)
  5635. return WOLFSSL_FAILURE;
  5636. return WOLFSSL_SUCCESS;
  5637. }
  5638. #endif /* !NO_BIO */
  5639. #ifndef NO_WOLFSSL_STUB
  5640. void wolfSSL_X509_get0_signature(const WOLFSSL_ASN1_BIT_STRING **psig,
  5641. const WOLFSSL_X509_ALGOR **palg, const WOLFSSL_X509 *x509)
  5642. {
  5643. (void)psig;
  5644. (void)palg;
  5645. (void)x509;
  5646. WOLFSSL_STUB("wolfSSL_X509_get0_signature");
  5647. }
  5648. #endif
  5649. #endif /* OPENSSL_EXTRA */
  5650. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  5651. const char* wolfSSL_X509_verify_cert_error_string(long err)
  5652. {
  5653. return wolfSSL_ERR_reason_error_string(err);
  5654. }
  5655. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  5656. #ifdef OPENSSL_EXTRA
  5657. #ifndef NO_WOLFSSL_STUB
  5658. int wolfSSL_X509_LOOKUP_add_dir(WOLFSSL_X509_LOOKUP* lookup, const char* dir,
  5659. long len)
  5660. {
  5661. (void)lookup;
  5662. (void)dir;
  5663. (void)len;
  5664. WOLFSSL_STUB("X509_LOOKUP_add_dir");
  5665. return 0;
  5666. }
  5667. #endif
  5668. int wolfSSL_X509_LOOKUP_load_file(WOLFSSL_X509_LOOKUP* lookup,
  5669. const char* file, long type)
  5670. {
  5671. #if !defined(NO_FILESYSTEM) && \
  5672. (defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM))
  5673. int ret = WOLFSSL_FAILURE;
  5674. XFILE fp;
  5675. long sz;
  5676. byte* pem = NULL;
  5677. byte* curr = NULL;
  5678. byte* prev = NULL;
  5679. WOLFSSL_X509* x509;
  5680. const char* header = NULL;
  5681. const char* footer = NULL;
  5682. if (type != X509_FILETYPE_PEM)
  5683. return WS_RETURN_CODE(BAD_FUNC_ARG, (int)WOLFSSL_FAILURE);
  5684. fp = XFOPEN(file, "rb");
  5685. if (fp == XBADFILE)
  5686. return WS_RETURN_CODE(BAD_FUNC_ARG, (int)WOLFSSL_FAILURE);
  5687. if(XFSEEK(fp, 0, XSEEK_END) != 0) {
  5688. XFCLOSE(fp);
  5689. return WS_RETURN_CODE(WOLFSSL_BAD_FILE,WOLFSSL_FAILURE);
  5690. }
  5691. sz = XFTELL(fp);
  5692. XREWIND(fp);
  5693. if (sz > MAX_WOLFSSL_FILE_SIZE || sz <= 0) {
  5694. WOLFSSL_MSG("X509_LOOKUP_load_file size error");
  5695. goto end;
  5696. }
  5697. pem = (byte*)XMALLOC(sz, 0, DYNAMIC_TYPE_PEM);
  5698. if (pem == NULL) {
  5699. ret = MEMORY_ERROR;
  5700. goto end;
  5701. }
  5702. /* Read in file which may be CRLs or certificates. */
  5703. if (XFREAD(pem, (size_t)sz, 1, fp) != 1)
  5704. goto end;
  5705. prev = curr = pem;
  5706. do {
  5707. /* get PEM header and footer based on type */
  5708. if (wc_PemGetHeaderFooter(CRL_TYPE, &header, &footer) == 0 &&
  5709. XSTRNSTR((char*)curr, header, (unsigned int)sz) != NULL) {
  5710. #ifdef HAVE_CRL
  5711. WOLFSSL_CERT_MANAGER* cm = lookup->store->cm;
  5712. if (cm->crl == NULL) {
  5713. if (wolfSSL_CertManagerEnableCRL(cm, 0) != WOLFSSL_SUCCESS) {
  5714. WOLFSSL_MSG("Enable CRL failed");
  5715. goto end;
  5716. }
  5717. }
  5718. ret = BufferLoadCRL(cm->crl, curr, sz, WOLFSSL_FILETYPE_PEM,
  5719. NO_VERIFY);
  5720. if (ret != WOLFSSL_SUCCESS)
  5721. goto end;
  5722. #endif
  5723. curr = (byte*)XSTRNSTR((char*)curr, footer, (unsigned int)sz);
  5724. }
  5725. else if (wc_PemGetHeaderFooter(CERT_TYPE, &header, &footer) == 0 &&
  5726. XSTRNSTR((char*)curr, header, (unsigned int)sz) != NULL) {
  5727. x509 = wolfSSL_X509_load_certificate_buffer(curr, (int)sz,
  5728. WOLFSSL_FILETYPE_PEM);
  5729. if (x509 == NULL)
  5730. goto end;
  5731. ret = wolfSSL_X509_STORE_add_cert(lookup->store, x509);
  5732. wolfSSL_X509_free(x509);
  5733. if (ret != WOLFSSL_SUCCESS)
  5734. goto end;
  5735. curr = (byte*)XSTRNSTR((char*)curr, footer, (unsigned int)sz);
  5736. }
  5737. else
  5738. goto end;
  5739. if (curr == NULL)
  5740. goto end;
  5741. curr++;
  5742. sz -= (long)(curr - prev);
  5743. prev = curr;
  5744. }
  5745. while (ret == WOLFSSL_SUCCESS);
  5746. end:
  5747. if (pem != NULL)
  5748. XFREE(pem, 0, DYNAMIC_TYPE_PEM);
  5749. XFCLOSE(fp);
  5750. return WS_RETURN_CODE(ret, (int)WOLFSSL_FAILURE);
  5751. #else
  5752. (void)lookup;
  5753. (void)file;
  5754. (void)type;
  5755. return WS_RETURN_CODE(WOLFSSL_FAILURE,WOLFSSL_FAILURE);
  5756. #endif
  5757. }
  5758. WOLFSSL_X509_LOOKUP_METHOD* wolfSSL_X509_LOOKUP_hash_dir(void)
  5759. {
  5760. /* Method implementation in functions. */
  5761. static WOLFSSL_X509_LOOKUP_METHOD meth = { 1 };
  5762. return &meth;
  5763. }
  5764. WOLFSSL_X509_LOOKUP_METHOD* wolfSSL_X509_LOOKUP_file(void)
  5765. {
  5766. /* Method implementation in functions. */
  5767. static WOLFSSL_X509_LOOKUP_METHOD meth = { 0 };
  5768. return &meth;
  5769. }
  5770. /* set directory path to load certificate or CRL which have the hash.N form */
  5771. /* for late use */
  5772. /* @param ctx a pointer to WOLFSSL_BY_DIR structure */
  5773. /* @param argc directory path */
  5774. /* @param argl file type, either WOLFSSL_FILETYPE_PEM or */
  5775. /* WOLFSSL_FILETYPE_ASN1 */
  5776. /* @return WOLFSSL_SUCCESS on successful, othewise negative or zero */
  5777. static int x509AddCertDir(WOLFSSL_BY_DIR *ctx, const char *argc, long argl)
  5778. {
  5779. #if defined(OPENSSL_ALL) && !defined(NO_FILESYSTEM) && !defined(NO_WOLFSSL_DIR)
  5780. WOLFSSL_BY_DIR_entry *entry;
  5781. size_t pathLen;
  5782. int i, num;
  5783. const char* c;
  5784. #ifdef WOLFSSL_SMALL_STACK
  5785. char *buf;
  5786. #else
  5787. char buf[MAX_FILENAME_SZ];
  5788. #endif
  5789. WOLFSSL_ENTER("x509AddCertDir");
  5790. pathLen = 0;
  5791. c = argc;
  5792. /* sanity check, zero length */
  5793. if (ctx == NULL || c == NULL || *c == '\0')
  5794. return WOLFSSL_FAILURE;
  5795. #ifdef WOLFSSL_SMALL_STACK
  5796. buf = (char*)XMALLOC(MAX_FILENAME_SZ, NULL, DYNAMIC_TYPE_OPENSSL);
  5797. if (buf == NULL) {
  5798. WOLFSSL_LEAVE("x509AddCertDir", MEMORY_E);
  5799. return MEMORY_E;
  5800. }
  5801. #endif
  5802. XMEMSET(buf, 0, MAX_FILENAME_SZ);
  5803. do {
  5804. if (*c == SEPARATOR_CHAR || *c == '\0') {
  5805. num = wolfSSL_sk_BY_DIR_entry_num(ctx->dir_entry);
  5806. for (i=0; i<num; i++) {
  5807. entry = wolfSSL_sk_BY_DIR_entry_value(ctx->dir_entry, i);
  5808. if (XSTRLEN(entry->dir_name) == pathLen &&
  5809. XSTRNCMP(entry->dir_name, buf, pathLen) == 0) {
  5810. WOLFSSL_MSG("dir entry found");
  5811. break;
  5812. }
  5813. }
  5814. if (num == -1 || i == num) {
  5815. WOLFSSL_MSG("no entry found");
  5816. if (ctx->dir_entry == NULL) {
  5817. ctx->dir_entry = wolfSSL_sk_BY_DIR_entry_new_null();
  5818. if (ctx->dir_entry == NULL) {
  5819. WOLFSSL_MSG("failed to allocate dir_entry");
  5820. #ifdef WOLFSSL_SMALL_STACK
  5821. XFREE(buf, 0, DYNAMIC_TYPE_OPENSSL);
  5822. #endif
  5823. return 0;
  5824. }
  5825. }
  5826. entry = wolfSSL_BY_DIR_entry_new();
  5827. if (entry == NULL) {
  5828. WOLFSSL_MSG("failed to allocate dir entry");
  5829. #ifdef WOLFSSL_SMALL_STACK
  5830. XFREE(buf, 0, DYNAMIC_TYPE_OPENSSL);
  5831. #endif
  5832. return 0;
  5833. }
  5834. entry->dir_type = (int)argl;
  5835. entry->dir_name = (char*)XMALLOC(pathLen + 1/* \0 termination*/
  5836. , NULL, DYNAMIC_TYPE_OPENSSL);
  5837. entry->hashes = wolfSSL_sk_BY_DIR_HASH_new_null();
  5838. if (entry->dir_name == NULL || entry->hashes == NULL) {
  5839. WOLFSSL_MSG("failed to allocate dir name");
  5840. wolfSSL_BY_DIR_entry_free(entry);
  5841. #ifdef WOLFSSL_SMALL_STACK
  5842. XFREE(buf, 0, DYNAMIC_TYPE_OPENSSL);
  5843. #endif
  5844. return 0;
  5845. }
  5846. XSTRNCPY(entry->dir_name, buf, pathLen);
  5847. entry->dir_name[pathLen] = '\0';
  5848. if (wolfSSL_sk_BY_DIR_entry_push(ctx->dir_entry, entry)
  5849. != WOLFSSL_SUCCESS) {
  5850. wolfSSL_BY_DIR_entry_free(entry);
  5851. #ifdef WOLFSSL_SMALL_STACK
  5852. XFREE(buf, 0, DYNAMIC_TYPE_OPENSSL);
  5853. #endif
  5854. return 0;
  5855. }
  5856. }
  5857. /* skip separator */
  5858. if (*c == SEPARATOR_CHAR) c++;
  5859. pathLen = 0;
  5860. XMEMSET(buf, 0, MAX_FILENAME_SZ);
  5861. }
  5862. buf[pathLen++] = *c;
  5863. } while(*c++ != '\0');
  5864. #ifdef WOLFSSL_SMALL_STACK
  5865. XFREE(buf, 0, DYNAMIC_TYPE_OPENSSL);
  5866. #endif
  5867. return WOLFSSL_SUCCESS;
  5868. #else
  5869. (void)ctx;
  5870. (void)argc;
  5871. (void)argl;
  5872. return WOLFSSL_NOT_IMPLEMENTED;
  5873. #endif
  5874. }
  5875. /* set additional data to X509_LOOKUP */
  5876. /* @param ctx a pointer to X509_LOOKUP structure */
  5877. /* @param cmd control command : */
  5878. /* X509_L_FILE_LOAD, X509_L_ADD_DIR X509_L_ADD_STORE or */
  5879. /* X509_L_LOAD_STORE */
  5880. /* @param argc arguments for the control command */
  5881. /* @param argl arguments for the control command */
  5882. /* @param **ret return value of the control command */
  5883. /* @return WOLFSSL_SUCCESS on successful, othewise WOLFSSL_FAILURE */
  5884. /* note: WOLFSSL_X509_L_ADD_STORE and WOLFSSL_X509_L_LOAD_STORE have not*/
  5885. /* yet implemented. It retutns WOLFSSL_NOT_IMPLEMENTED */
  5886. /* when those control commands are passed. */
  5887. int wolfSSL_X509_LOOKUP_ctrl(WOLFSSL_X509_LOOKUP *ctx, int cmd,
  5888. const char *argc, long argl, char **ret)
  5889. {
  5890. int lret = WOLFSSL_FAILURE;
  5891. WOLFSSL_ENTER("wolfSSL_X509_LOOKUP_ctrl");
  5892. #if !defined(NO_FILESYSTEM)
  5893. if (ctx != NULL) {
  5894. switch (cmd) {
  5895. case WOLFSSL_X509_L_FILE_LOAD:
  5896. /* expects to return a number of processed cert or crl file */
  5897. lret = wolfSSL_X509_load_cert_crl_file(ctx, argc, (int)argl) > 0 ?
  5898. WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  5899. break;
  5900. case WOLFSSL_X509_L_ADD_DIR:
  5901. /* store directory loaction to use it later */
  5902. #if !defined(NO_WOLFSSL_DIR)
  5903. lret = x509AddCertDir(ctx->dirs, argc, argl);
  5904. #else
  5905. (void)x509AddCertDir;
  5906. lret = WOLFSSL_NOT_IMPLEMENTED;
  5907. #endif
  5908. break;
  5909. case WOLFSSL_X509_L_ADD_STORE:
  5910. case WOLFSSL_X509_L_LOAD_STORE:
  5911. return WOLFSSL_NOT_IMPLEMENTED;
  5912. default:
  5913. break;
  5914. }
  5915. }
  5916. (void)ret;
  5917. #else
  5918. (void)ctx;
  5919. (void)argc;
  5920. (void)argl;
  5921. (void)ret;
  5922. (void)cmd;
  5923. (void)x509AddCertDir;
  5924. lret = WOLFSSL_NOT_IMPLEMENTED;
  5925. #endif
  5926. return lret;
  5927. }
  5928. #if defined(WOLFSSL_CERT_GEN)
  5929. static int wolfssl_x509_make_der(WOLFSSL_X509* x509, int req,
  5930. unsigned char* der, int* derSz, int includeSig);
  5931. #endif
  5932. #ifdef WOLFSSL_CERT_GEN
  5933. #ifndef NO_BIO
  5934. /* Converts the X509 to DER format and outputs it into bio.
  5935. *
  5936. * bio is the structure to hold output DER
  5937. * x509 certificate to create DER from
  5938. * req if set then a CSR is generated
  5939. *
  5940. * returns WOLFSSL_SUCCESS on success
  5941. */
  5942. static int loadX509orX509REQFromBio(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int req)
  5943. {
  5944. int ret = WOLFSSL_FAILURE;
  5945. /* Get large buffer to hold cert der */
  5946. int derSz = X509_BUFFER_SZ;
  5947. #ifdef WOLFSSL_SMALL_STACK
  5948. byte* der;
  5949. #else
  5950. byte der[X509_BUFFER_SZ];
  5951. #endif
  5952. WOLFSSL_ENTER("wolfSSL_i2d_X509_bio");
  5953. if (bio == NULL || x509 == NULL) {
  5954. return WOLFSSL_FAILURE;
  5955. }
  5956. #ifdef WOLFSSL_SMALL_STACK
  5957. der = (byte*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  5958. if (!der) {
  5959. WOLFSSL_MSG("malloc failed");
  5960. return WOLFSSL_FAILURE;
  5961. }
  5962. #endif
  5963. if (wolfssl_x509_make_der(x509, req, der, &derSz, 1) != WOLFSSL_SUCCESS) {
  5964. goto cleanup;
  5965. }
  5966. if (wolfSSL_BIO_write(bio, der, derSz) != derSz) {
  5967. goto cleanup;
  5968. }
  5969. ret = WOLFSSL_SUCCESS;
  5970. cleanup:
  5971. #ifdef WOLFSSL_SMALL_STACK
  5972. XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  5973. #endif
  5974. return ret;
  5975. }
  5976. /* Converts the X509 to DER format and outputs it into bio.
  5977. *
  5978. * bio is the structure to hold output DER
  5979. * x509 certificate to create DER from
  5980. *
  5981. * returns WOLFSSL_SUCCESS on success
  5982. */
  5983. int wolfSSL_i2d_X509_bio(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
  5984. {
  5985. return loadX509orX509REQFromBio(bio, x509, 0);
  5986. }
  5987. #ifdef WOLFSSL_CERT_REQ
  5988. int wolfSSL_i2d_X509_REQ_bio(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
  5989. {
  5990. return loadX509orX509REQFromBio(bio, x509, 1);
  5991. }
  5992. #endif /* WOLFSSL_CERT_REQ */
  5993. #endif /* !NO_BIO */
  5994. #endif /* WOLFSSL_CERT_GEN */
  5995. /* Converts an internal structure to a DER buffer
  5996. *
  5997. * x509 structure to get DER buffer from
  5998. * out buffer to hold result. If NULL then *out is NULL then a new buffer is
  5999. * created.
  6000. *
  6001. * returns the size of the DER result on success
  6002. */
  6003. int wolfSSL_i2d_X509(WOLFSSL_X509* x509, unsigned char** out)
  6004. {
  6005. const unsigned char* der;
  6006. int derSz = 0;
  6007. WOLFSSL_ENTER("wolfSSL_i2d_X509");
  6008. if (x509 == NULL) {
  6009. WOLFSSL_LEAVE("wolfSSL_i2d_X509", BAD_FUNC_ARG);
  6010. return BAD_FUNC_ARG;
  6011. }
  6012. der = wolfSSL_X509_get_der(x509, &derSz);
  6013. if (der == NULL) {
  6014. WOLFSSL_LEAVE("wolfSSL_i2d_X509", MEMORY_E);
  6015. return MEMORY_E;
  6016. }
  6017. if (out != NULL && *out == NULL) {
  6018. *out = (unsigned char*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_OPENSSL);
  6019. if (*out == NULL) {
  6020. WOLFSSL_LEAVE("wolfSSL_i2d_X509", MEMORY_E);
  6021. return MEMORY_E;
  6022. }
  6023. }
  6024. if (out != NULL)
  6025. XMEMCPY(*out, der, derSz);
  6026. WOLFSSL_LEAVE("wolfSSL_i2d_X509", derSz);
  6027. return derSz;
  6028. }
  6029. #ifndef NO_BIO
  6030. /**
  6031. * Converts the DER from bio and creates a WOLFSSL_X509 structure from it.
  6032. * @param bio is the structure holding DER
  6033. * @param x509 certificate to create from DER. Can be NULL
  6034. * @param req 1 for a CSR and 0 for a x509 cert
  6035. * @return pointer to WOLFSSL_X509 structure on success and NULL on fail
  6036. */
  6037. static WOLFSSL_X509* d2i_X509orX509REQ_bio(WOLFSSL_BIO* bio,
  6038. WOLFSSL_X509** x509, int req)
  6039. {
  6040. WOLFSSL_X509* localX509 = NULL;
  6041. byte* mem = NULL;
  6042. int size;
  6043. WOLFSSL_ENTER("wolfSSL_d2i_X509_bio");
  6044. if (bio == NULL) {
  6045. WOLFSSL_MSG("Bad Function Argument bio is NULL");
  6046. return NULL;
  6047. }
  6048. size = wolfSSL_BIO_get_len(bio);
  6049. if (size <= 0) {
  6050. WOLFSSL_MSG("wolfSSL_BIO_get_len error. Possibly no pending data.");
  6051. #if defined(OPENSSL_ALL) && defined(WOLFSSL_PYTHON)
  6052. /* EOF ASN1 file */
  6053. WOLFSSL_ERROR(ASN1_R_HEADER_TOO_LONG);
  6054. #endif
  6055. return NULL;
  6056. }
  6057. if (!(mem = (byte*)XMALLOC(size, NULL, DYNAMIC_TYPE_OPENSSL))) {
  6058. WOLFSSL_MSG("malloc error");
  6059. return NULL;
  6060. }
  6061. if ((size = wolfSSL_BIO_read(bio, mem, size)) == 0) {
  6062. WOLFSSL_MSG("wolfSSL_BIO_read error");
  6063. XFREE(mem, NULL, DYNAMIC_TYPE_OPENSSL);
  6064. return NULL;
  6065. }
  6066. if (req) {
  6067. #ifdef WOLFSSL_CERT_REQ
  6068. localX509 = wolfSSL_X509_REQ_d2i(NULL, mem, size);
  6069. #else
  6070. WOLFSSL_MSG("CSR not compiled in");
  6071. #endif
  6072. }
  6073. else {
  6074. localX509 = wolfSSL_X509_d2i(NULL, mem, size);
  6075. }
  6076. if (localX509 == NULL) {
  6077. WOLFSSL_MSG("wolfSSL_X509_d2i error");
  6078. XFREE(mem, NULL, DYNAMIC_TYPE_OPENSSL);
  6079. return NULL;
  6080. }
  6081. if (x509 != NULL) {
  6082. *x509 = localX509;
  6083. }
  6084. XFREE(mem, NULL, DYNAMIC_TYPE_OPENSSL);
  6085. return localX509;
  6086. }
  6087. WOLFSSL_X509* wolfSSL_d2i_X509_bio(WOLFSSL_BIO* bio, WOLFSSL_X509** x509)
  6088. {
  6089. return d2i_X509orX509REQ_bio(bio, x509, 0);
  6090. }
  6091. #ifdef WOLFSSL_CERT_REQ
  6092. WOLFSSL_X509* wolfSSL_d2i_X509_REQ_bio(WOLFSSL_BIO* bio, WOLFSSL_X509** x509)
  6093. {
  6094. return d2i_X509orX509REQ_bio(bio, x509, 1);
  6095. }
  6096. #endif
  6097. #endif /* !NO_BIO */
  6098. #endif /* OPENSSL_EXTRA */
  6099. #ifdef OPENSSL_EXTRA
  6100. /* Use the public key to verify the signature. Note: this only verifies
  6101. * the certificate signature.
  6102. * returns WOLFSSL_SUCCESS on successful signature verification */
  6103. static int verifyX509orX509REQ(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey, int req)
  6104. {
  6105. int ret;
  6106. const byte* der;
  6107. int derSz = 0;
  6108. int type;
  6109. (void)req;
  6110. if (x509 == NULL || pkey == NULL) {
  6111. return WOLFSSL_FATAL_ERROR;
  6112. }
  6113. der = wolfSSL_X509_get_der(x509, &derSz);
  6114. if (der == NULL) {
  6115. WOLFSSL_MSG("Error getting WOLFSSL_X509 DER");
  6116. return WOLFSSL_FATAL_ERROR;
  6117. }
  6118. switch (pkey->type) {
  6119. case EVP_PKEY_RSA:
  6120. type = RSAk;
  6121. break;
  6122. case EVP_PKEY_EC:
  6123. type = ECDSAk;
  6124. break;
  6125. case EVP_PKEY_DSA:
  6126. type = DSAk;
  6127. break;
  6128. default:
  6129. WOLFSSL_MSG("Unknown pkey key type");
  6130. return WOLFSSL_FATAL_ERROR;
  6131. }
  6132. #ifdef WOLFSSL_CERT_REQ
  6133. if (req)
  6134. ret = CheckCSRSignaturePubKey(der, derSz, x509->heap,
  6135. (unsigned char*)pkey->pkey.ptr, pkey->pkey_sz, type);
  6136. else
  6137. #endif
  6138. ret = CheckCertSignaturePubKey(der, derSz, x509->heap,
  6139. (unsigned char*)pkey->pkey.ptr, pkey->pkey_sz, type);
  6140. if (ret == 0) {
  6141. return WOLFSSL_SUCCESS;
  6142. }
  6143. return WOLFSSL_FAILURE;
  6144. }
  6145. int wolfSSL_X509_verify(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey)
  6146. {
  6147. return verifyX509orX509REQ(x509, pkey, 0);
  6148. }
  6149. #ifdef WOLFSSL_CERT_REQ
  6150. int wolfSSL_X509_REQ_verify(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey)
  6151. {
  6152. return verifyX509orX509REQ(x509, pkey, 1);
  6153. }
  6154. #endif /* WOLFSSL_CERT_REQ */
  6155. #if !defined(NO_FILESYSTEM)
  6156. static void *wolfSSL_d2i_X509_fp_ex(XFILE file, void **x509, int type)
  6157. {
  6158. void *newx509 = NULL;
  6159. byte *fileBuffer = NULL;
  6160. long sz = 0;
  6161. /* init variable */
  6162. if (x509)
  6163. *x509 = NULL;
  6164. /* argument check */
  6165. if (file == XBADFILE) {
  6166. return NULL;
  6167. }
  6168. /* determine file size */
  6169. if (XFSEEK(file, 0, XSEEK_END) != 0) {
  6170. return NULL;
  6171. }
  6172. sz = XFTELL(file);
  6173. XREWIND(file);
  6174. if (sz > MAX_WOLFSSL_FILE_SIZE || sz <= 0) {
  6175. WOLFSSL_MSG("d2i_X509_fp_ex file size error");
  6176. return NULL;
  6177. }
  6178. fileBuffer = (byte *)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE);
  6179. if (fileBuffer != NULL) {
  6180. if ((long)XFREAD(fileBuffer, 1, sz, file) != sz) {
  6181. WOLFSSL_MSG("File read failed");
  6182. goto err_exit;
  6183. }
  6184. if (type == CERT_TYPE) {
  6185. newx509 = (void *)wolfSSL_X509_d2i(NULL, fileBuffer, (int)sz);
  6186. }
  6187. #ifdef HAVE_CRL
  6188. else if (type == CRL_TYPE) {
  6189. newx509 = (void *)wolfSSL_d2i_X509_CRL(NULL, fileBuffer, (int)sz);
  6190. }
  6191. #endif
  6192. #if !defined(NO_ASN) && !defined(NO_PWDBASED) && defined(HAVE_PKCS12)
  6193. else if (type == PKCS12_TYPE) {
  6194. if ((newx509 = wc_PKCS12_new()) == NULL) {
  6195. goto err_exit;
  6196. }
  6197. if (wc_d2i_PKCS12(fileBuffer, (int)sz, (WC_PKCS12*)newx509) < 0) {
  6198. goto err_exit;
  6199. }
  6200. }
  6201. #endif
  6202. else {
  6203. goto err_exit;
  6204. }
  6205. if (newx509 == NULL) {
  6206. WOLFSSL_MSG("X509 failed");
  6207. goto err_exit;
  6208. }
  6209. }
  6210. if (x509)
  6211. *x509 = newx509;
  6212. goto _exit;
  6213. err_exit:
  6214. #if !defined(NO_ASN) && !defined(NO_PWDBASED) && defined(HAVE_PKCS12)
  6215. if ((newx509 != NULL) && (type == PKCS12_TYPE)) {
  6216. wc_PKCS12_free((WC_PKCS12*)newx509);
  6217. newx509 = NULL;
  6218. }
  6219. #endif
  6220. _exit:
  6221. if (fileBuffer != NULL)
  6222. XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
  6223. return newx509;
  6224. }
  6225. WOLFSSL_X509 *wolfSSL_d2i_X509_fp(XFILE fp, WOLFSSL_X509 **x509)
  6226. {
  6227. WOLFSSL_ENTER("wolfSSL_d2i_X509_fp");
  6228. return (WOLFSSL_X509 *)wolfSSL_d2i_X509_fp_ex(fp, (void **)x509, CERT_TYPE);
  6229. }
  6230. /* load certificate or CRL file, and add it to the STORE */
  6231. /* @param ctx a pointer to X509_LOOKUP structure */
  6232. /* @param file file name to load */
  6233. /* @param type WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1 */
  6234. /* @return a number of loading CRL or certificate, otherwise zero */
  6235. WOLFSSL_API int wolfSSL_X509_load_cert_crl_file(WOLFSSL_X509_LOOKUP *ctx,
  6236. const char *file, int type)
  6237. {
  6238. WOLFSSL_X509 *x509 = NULL;
  6239. int cnt = 0;
  6240. WOLFSSL_ENTER("wolfSSL_X509_load_cert_crl_file");
  6241. /* stanity check */
  6242. if (ctx == NULL || file == NULL) {
  6243. WOLFSSL_MSG("bad arguments");
  6244. return 0;
  6245. }
  6246. if (type != WOLFSSL_FILETYPE_PEM) {
  6247. x509 = wolfSSL_X509_load_certificate_file(file, type);
  6248. if (x509 != NULL) {
  6249. if (wolfSSL_X509_STORE_add_cert(ctx->store, x509)
  6250. == WOLFSSL_SUCCESS) {
  6251. cnt++;
  6252. } else {
  6253. WOLFSSL_MSG("wolfSSL_X509_STORE_add_cert error");
  6254. }
  6255. wolfSSL_X509_free(x509);
  6256. x509 = NULL;
  6257. } else {
  6258. WOLFSSL_MSG("wolfSSL_X509_load_certificate_file error");
  6259. }
  6260. } else {
  6261. #if defined(OPENSSL_ALL)
  6262. #if !defined(NO_BIO)
  6263. STACK_OF(WOLFSSL_X509_INFO) *info;
  6264. WOLFSSL_X509_INFO *info_tmp;
  6265. int i;
  6266. int num = 0;
  6267. WOLFSSL_BIO *bio = wolfSSL_BIO_new_file(file, "rb");
  6268. if(!bio) {
  6269. WOLFSSL_MSG("wolfSSL_BIO_new error");
  6270. return cnt;
  6271. }
  6272. info = wolfSSL_PEM_X509_INFO_read_bio(bio, NULL, NULL, NULL);
  6273. wolfSSL_BIO_free(bio);
  6274. if (!info) {
  6275. WOLFSSL_MSG("wolfSSL_PEM_X509_INFO_read_bio error");
  6276. return cnt;
  6277. }
  6278. num = wolfSSL_sk_X509_INFO_num(info);
  6279. for (i=0; i < num; i++) {
  6280. info_tmp = wolfSSL_sk_X509_INFO_value(info, i);
  6281. if (info_tmp->x509) {
  6282. if(wolfSSL_X509_STORE_add_cert(ctx->store, info_tmp->x509) ==
  6283. WOLFSSL_SUCCESS) {
  6284. cnt ++;
  6285. } else {
  6286. WOLFSSL_MSG("wolfSSL_X509_STORE_add_cert failed");
  6287. }
  6288. }
  6289. #ifdef HAVE_CRL
  6290. if (info_tmp->crl) {
  6291. if(wolfSSL_X509_STORE_add_crl(ctx->store, info_tmp->crl) ==
  6292. WOLFSSL_SUCCESS) {
  6293. cnt ++;
  6294. } else {
  6295. WOLFSSL_MSG("wolfSSL_X509_STORE_add_crl failed");
  6296. }
  6297. }
  6298. #endif
  6299. }
  6300. wolfSSL_sk_X509_INFO_pop_free(info, wolfSSL_X509_INFO_free);
  6301. #else
  6302. /* Only supports one certificate or CRL in the file. */
  6303. WOLFSSL_X509_CRL* crl = NULL;
  6304. XFILE fp = XFOPEN(file, "rb");
  6305. if (fp == XBADFILE) {
  6306. WOLFSSL_MSG("XFOPEN error");
  6307. return cnt;
  6308. }
  6309. x509 = wolfSSL_PEM_read_X509(fp, NULL, NULL, NULL);
  6310. if (x509 != NULL) {
  6311. if (wolfSSL_X509_STORE_add_cert(ctx->store, x509) ==
  6312. WOLFSSL_SUCCESS) {
  6313. cnt++;
  6314. }
  6315. else {
  6316. WOLFSSL_MSG("wolfSSL_X509_STORE_add_cert failed");
  6317. }
  6318. }
  6319. else {
  6320. XREWIND(fp);
  6321. crl = wolfSSL_PEM_read_X509_CRL(fp, NULL, NULL, NULL);
  6322. if (crl != NULL) {
  6323. if (wolfSSL_X509_STORE_add_crl(ctx->store, crl) ==
  6324. WOLFSSL_SUCCESS) {
  6325. cnt++;
  6326. }
  6327. else {
  6328. WOLFSSL_MSG("wolfSSL_X509_STORE_add_crl failed");
  6329. }
  6330. }
  6331. else {
  6332. WOLFSSL_MSG("Certificate and CRL not recognized");
  6333. return cnt;
  6334. }
  6335. }
  6336. wolfSSL_X509_free(x509);
  6337. wolfSSL_X509_CRL_free(crl);
  6338. #endif
  6339. #else
  6340. (void)cnt;
  6341. #endif /* OPENSSL_ALL && !NO_BIO */
  6342. }
  6343. WOLFSSL_LEAVE("wolfSSL_X509_load_ceretificate_crl_file", cnt);
  6344. return cnt;
  6345. }
  6346. #endif /* !NO_FILESYSTEM */
  6347. #ifdef HAVE_CRL
  6348. #ifndef NO_BIO
  6349. WOLFSSL_API WOLFSSL_X509_CRL *wolfSSL_d2i_X509_CRL_bio(WOLFSSL_BIO *bp,
  6350. WOLFSSL_X509_CRL **x)
  6351. {
  6352. int derSz;
  6353. byte* der = NULL;
  6354. WOLFSSL_X509_CRL* crl = NULL;
  6355. if (bp == NULL)
  6356. return NULL;
  6357. if ((derSz = wolfSSL_BIO_get_len(bp)) > 0) {
  6358. der = (byte*)XMALLOC(derSz, 0, DYNAMIC_TYPE_DER);
  6359. if (der != NULL) {
  6360. if (wolfSSL_BIO_read(bp, der, derSz) == derSz) {
  6361. crl = wolfSSL_d2i_X509_CRL(x, der, derSz);
  6362. }
  6363. }
  6364. }
  6365. if (der != NULL) {
  6366. XFREE(der, 0, DYNAMIC_TYPE_DER);
  6367. }
  6368. return crl;
  6369. }
  6370. #endif
  6371. #ifndef NO_FILESYSTEM
  6372. WOLFSSL_X509_CRL *wolfSSL_d2i_X509_CRL_fp(XFILE fp, WOLFSSL_X509_CRL **crl)
  6373. {
  6374. WOLFSSL_ENTER("wolfSSL_d2i_X509_CRL_fp");
  6375. return (WOLFSSL_X509_CRL *)wolfSSL_d2i_X509_fp_ex(fp, (void **)crl, CRL_TYPE);
  6376. }
  6377. /* Read CRL file, and add it to store and corresponding cert manager */
  6378. /* @param ctx a pointer of X509_LOOKUP back to the X509_STORE */
  6379. /* @param file a file to read */
  6380. /* @param type WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1 */
  6381. /* @return WOLFSSL_SUCCESS(1) on successful, othewise WOLFSSL_FAILURE(0)*/
  6382. WOLFSSL_API int wolfSSL_X509_load_crl_file(WOLFSSL_X509_LOOKUP *ctx,
  6383. const char *file, int type)
  6384. {
  6385. #ifndef NO_BIO
  6386. int ret = WOLFSSL_FAILURE;
  6387. int count = 0;
  6388. WOLFSSL_BIO *bio = NULL;
  6389. WOLFSSL_X509_CRL *crl = NULL;
  6390. WOLFSSL_ENTER("wolfSSL_X509_load_crl_file");
  6391. if (ctx == NULL || file == NULL)
  6392. return ret;
  6393. if ((bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file())) == NULL)
  6394. return ret;
  6395. if (wolfSSL_BIO_read_filename(bio, file) <= 0) {
  6396. wolfSSL_BIO_free(bio);
  6397. return ret;
  6398. }
  6399. if (wolfSSL_BIO_read_filename(bio, file) <= 0) {
  6400. wolfSSL_BIO_free(bio);
  6401. return ret;
  6402. }
  6403. if (type == WOLFSSL_FILETYPE_PEM) {
  6404. do {
  6405. crl = wolfSSL_PEM_read_bio_X509_CRL(bio, NULL, NULL, NULL);
  6406. if (crl == NULL) {
  6407. if (count <= 0) {
  6408. WOLFSSL_MSG("Load crl failed");
  6409. }
  6410. break;
  6411. }
  6412. ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
  6413. if (ret == WOLFSSL_FAILURE) {
  6414. WOLFSSL_MSG("Adding crl failed");
  6415. break;
  6416. }
  6417. count++;
  6418. wolfSSL_X509_CRL_free(crl);
  6419. crl = NULL;
  6420. } while(crl == NULL);
  6421. ret = count;
  6422. } else if (type == WOLFSSL_FILETYPE_ASN1) {
  6423. crl = wolfSSL_d2i_X509_CRL_bio(bio, NULL);
  6424. if (crl == NULL) {
  6425. WOLFSSL_MSG("Load crl failed");
  6426. } else {
  6427. ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
  6428. if (ret == WOLFSSL_FAILURE) {
  6429. WOLFSSL_MSG("Adding crl failed");
  6430. } else {
  6431. ret = 1;/* handled a file */
  6432. }
  6433. }
  6434. } else {
  6435. WOLFSSL_MSG("Invalid file type");
  6436. }
  6437. wolfSSL_X509_CRL_free(crl);
  6438. wolfSSL_BIO_free(bio);
  6439. WOLFSSL_LEAVE("wolfSSL_X509_load_crl_file", ret);
  6440. return ret;
  6441. #else
  6442. int ret = WOLFSSL_FAILURE;
  6443. int count = 0;
  6444. XFILE fp;
  6445. WOLFSSL_X509_CRL *crl = NULL;
  6446. WOLFSSL_ENTER("wolfSSL_X509_load_crl_file");
  6447. if (ctx == NULL || file == NULL)
  6448. return ret;
  6449. if ((fp = XFOPEN(file, "rb")) == XBADFILE)
  6450. return ret;
  6451. if (type == WOLFSSL_FILETYPE_PEM) {
  6452. do {
  6453. crl = wolfSSL_PEM_read_X509_CRL(fp, NULL, NULL, NULL);
  6454. if (crl == NULL) {
  6455. if (count <= 0) {
  6456. WOLFSSL_MSG("Load crl failed");
  6457. }
  6458. break;
  6459. }
  6460. ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
  6461. if (ret == WOLFSSL_FAILURE) {
  6462. WOLFSSL_MSG("Adding crl failed");
  6463. break;
  6464. }
  6465. count++;
  6466. wolfSSL_X509_CRL_free(crl);
  6467. crl = NULL;
  6468. }
  6469. while(crl == NULL);
  6470. ret = count;
  6471. }
  6472. else if (type == WOLFSSL_FILETYPE_ASN1) {
  6473. crl = wolfSSL_d2i_X509_CRL_fp(fp, NULL);
  6474. if (crl == NULL) {
  6475. WOLFSSL_MSG("Load crl failed");
  6476. }
  6477. else {
  6478. ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
  6479. if (ret == WOLFSSL_FAILURE) {
  6480. WOLFSSL_MSG("Adding crl failed");
  6481. }
  6482. else {
  6483. ret = 1;/* handled a file */
  6484. }
  6485. }
  6486. }
  6487. else {
  6488. WOLFSSL_MSG("Invalid file type");
  6489. }
  6490. wolfSSL_X509_CRL_free(crl);
  6491. XFCLOSE(fp);
  6492. WOLFSSL_LEAVE("wolfSSL_X509_load_crl_file", ret);
  6493. return ret;
  6494. #endif /* !NO_BIO */
  6495. }
  6496. #endif /* !NO_FILESYSTEM */
  6497. WOLFSSL_X509_CRL* wolfSSL_d2i_X509_CRL(WOLFSSL_X509_CRL** crl,
  6498. const unsigned char* in, int len)
  6499. {
  6500. WOLFSSL_X509_CRL *newcrl = NULL;
  6501. int ret = WOLFSSL_SUCCESS;
  6502. WOLFSSL_ENTER("wolfSSL_d2i_X509_CRL");
  6503. if (in == NULL) {
  6504. WOLFSSL_MSG("Bad argument value");
  6505. } else {
  6506. newcrl =(WOLFSSL_X509_CRL*)XMALLOC(sizeof(WOLFSSL_X509_CRL), NULL,
  6507. DYNAMIC_TYPE_CRL);
  6508. if (newcrl == NULL){
  6509. WOLFSSL_MSG("New CRL allocation failed");
  6510. } else {
  6511. ret = InitCRL(newcrl, NULL);
  6512. if (ret < 0) {
  6513. WOLFSSL_MSG("Init tmp CRL failed");
  6514. } else {
  6515. ret = BufferLoadCRL(newcrl, in, len, WOLFSSL_FILETYPE_ASN1,
  6516. NO_VERIFY);
  6517. if (ret != WOLFSSL_SUCCESS) {
  6518. WOLFSSL_MSG("Buffer Load CRL failed");
  6519. } else {
  6520. if (crl) {
  6521. *crl = newcrl;
  6522. }
  6523. }
  6524. }
  6525. }
  6526. }
  6527. if((ret != WOLFSSL_SUCCESS) && (newcrl != NULL)) {
  6528. wolfSSL_X509_CRL_free(newcrl);
  6529. newcrl = NULL;
  6530. }
  6531. return newcrl;
  6532. }
  6533. #endif /* HAVE_CRL */
  6534. #endif /* OPENSSL_EXTRA */
  6535. #if defined(HAVE_CRL) && (defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL))
  6536. void wolfSSL_X509_CRL_free(WOLFSSL_X509_CRL *crl)
  6537. {
  6538. WOLFSSL_ENTER("wolfSSL_X509_CRL_free");
  6539. if (crl)
  6540. FreeCRL(crl, 1);
  6541. }
  6542. #endif /* HAVE_CRL && (OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL) */
  6543. #ifdef OPENSSL_EXTRA
  6544. #ifndef NO_WOLFSSL_STUB
  6545. WOLFSSL_ASN1_TIME* wolfSSL_X509_CRL_get_lastUpdate(WOLFSSL_X509_CRL* crl)
  6546. {
  6547. (void)crl;
  6548. WOLFSSL_STUB("X509_CRL_get_lastUpdate");
  6549. return 0;
  6550. }
  6551. #endif
  6552. #ifndef NO_WOLFSSL_STUB
  6553. WOLFSSL_ASN1_TIME* wolfSSL_X509_CRL_get_nextUpdate(WOLFSSL_X509_CRL* crl)
  6554. {
  6555. (void)crl;
  6556. WOLFSSL_STUB("X509_CRL_get_nextUpdate");
  6557. return 0;
  6558. }
  6559. #endif
  6560. #ifndef NO_WOLFSSL_STUB
  6561. int wolfSSL_X509_CRL_verify(WOLFSSL_X509_CRL* crl, WOLFSSL_EVP_PKEY* key)
  6562. {
  6563. (void)crl;
  6564. (void)key;
  6565. WOLFSSL_STUB("X509_CRL_verify");
  6566. return 0;
  6567. }
  6568. #endif
  6569. #endif /* OPENSSL_EXTRA */
  6570. #ifdef OPENSSL_EXTRA
  6571. WOLFSSL_X509_VERIFY_PARAM* wolfSSL_X509_VERIFY_PARAM_new(void)
  6572. {
  6573. WOLFSSL_X509_VERIFY_PARAM *param = NULL;
  6574. param = (WOLFSSL_X509_VERIFY_PARAM*)XMALLOC(
  6575. sizeof(WOLFSSL_X509_VERIFY_PARAM), NULL, DYNAMIC_TYPE_OPENSSL);
  6576. if (param != NULL)
  6577. XMEMSET(param, 0, sizeof(WOLFSSL_X509_VERIFY_PARAM ));
  6578. return(param);
  6579. }
  6580. void wolfSSL_X509_VERIFY_PARAM_free(WOLFSSL_X509_VERIFY_PARAM *param)
  6581. {
  6582. if (param != NULL)
  6583. XFREE(param, NULL, DYNAMIC_TYPE_OPENSSL);
  6584. }
  6585. /* Sets flags by OR'ing with existing value. */
  6586. int wolfSSL_X509_VERIFY_PARAM_set_flags(WOLFSSL_X509_VERIFY_PARAM *param,
  6587. unsigned long flags)
  6588. {
  6589. int ret = WOLFSSL_FAILURE;
  6590. if (param != NULL) {
  6591. param->flags |= flags;
  6592. ret = WOLFSSL_SUCCESS;
  6593. }
  6594. return ret;
  6595. }
  6596. int wolfSSL_X509_VERIFY_PARAM_get_flags(WOLFSSL_X509_VERIFY_PARAM *param)
  6597. {
  6598. int ret = 0;
  6599. if (param != NULL) {
  6600. ret = (int)param->flags;
  6601. }
  6602. return ret;
  6603. }
  6604. int wolfSSL_X509_VERIFY_PARAM_clear_flags(WOLFSSL_X509_VERIFY_PARAM *param,
  6605. unsigned long flags)
  6606. {
  6607. int ret = WOLFSSL_FAILURE;
  6608. if (param != NULL) {
  6609. param->flags &= ~flags;
  6610. ret = WOLFSSL_SUCCESS;
  6611. }
  6612. return ret;
  6613. }
  6614. /* inherits properties of param "to" to param "from"
  6615. *
  6616. * WOLFSSL_VPARAM_DEFAULT any values in "src" is copied
  6617. * if "src" value is new for "to".
  6618. * WOLFSSL_VPARAM_OVERWRITE all values of "form" are copied to "to"
  6619. * WOLFSSL_VPARAM_RESET_FLAGS the flag values are copied, not Ored
  6620. * WOLFSSL_VPARAM_LOCKED don't copy any values
  6621. * WOLFSSL_VPARAM_ONCE the current inherit_flags is zerroed
  6622. */
  6623. static int wolfSSL_X509_VERIFY_PARAM_inherit(WOLFSSL_X509_VERIFY_PARAM *to,
  6624. const WOLFSSL_X509_VERIFY_PARAM *from)
  6625. {
  6626. int ret = WOLFSSL_FAILURE;
  6627. int isOverWrite = 0;
  6628. int isDefault = 0;
  6629. unsigned int flags;
  6630. /* sanity check */
  6631. if (!to || !from) {
  6632. /* be compatible to openssl return value */
  6633. return WOLFSSL_SUCCESS;
  6634. }
  6635. flags = to->inherit_flags | from->inherit_flags;
  6636. if (flags & WOLFSSL_VPARAM_LOCKED) {
  6637. return WOLFSSL_SUCCESS;
  6638. }
  6639. if (flags & WOLFSSL_VPARAM_ONCE) {
  6640. to->inherit_flags = 0;
  6641. }
  6642. isOverWrite = (flags & WOLFSSL_VPARAM_OVERWRITE);
  6643. isDefault = (flags & WOLFSSL_VPARAM_DEFAULT);
  6644. /* copy check_time if check time is not set */
  6645. if ((to->flags & WOLFSSL_USE_CHECK_TIME) == 0 || isOverWrite) {
  6646. to->check_time = from->check_time;
  6647. to->flags &= ~WOLFSSL_USE_CHECK_TIME;
  6648. }
  6649. /* host name */
  6650. if (isOverWrite ||
  6651. (from->hostName[0] != 0 && (to->hostName[0] == 0 || isDefault))) {
  6652. if (!(ret = wolfSSL_X509_VERIFY_PARAM_set1_host(to, from->hostName,
  6653. (int)XSTRLEN(from->hostName))))
  6654. return ret;
  6655. to->hostFlags = from->hostFlags;
  6656. }
  6657. /* ip ascii */
  6658. if (isOverWrite ||
  6659. (from->ipasc[0] != 0 && (to->ipasc[0] == 0 || isDefault))) {
  6660. if (!(ret = wolfSSL_X509_VERIFY_PARAM_set1_ip_asc(to, from->ipasc)))
  6661. return ret;
  6662. }
  6663. if (flags & WOLFSSL_VPARAM_RESET_FLAGS)
  6664. to->flags = 0;
  6665. to->flags |= from->flags;
  6666. return ret;
  6667. }
  6668. /******************************************************************************
  6669. * wolfSSL_X509_VERIFY_PARAM_set1_host - sets the DNS hostname to name
  6670. * hostnames is cleared if name is NULL or empty.
  6671. *
  6672. * RETURNS:
  6673. *
  6674. */
  6675. int wolfSSL_X509_VERIFY_PARAM_set1_host(WOLFSSL_X509_VERIFY_PARAM* pParam,
  6676. const char* name,
  6677. unsigned int nameSz)
  6678. {
  6679. WOLFSSL_ENTER("wolfSSL_X509_VERIFY_PARAM_set1_host");
  6680. if (pParam == NULL)
  6681. return WOLFSSL_FAILURE;
  6682. if (name == NULL)
  6683. return WOLFSSL_SUCCESS;
  6684. /* If name is NULL-terminated, namelen can be set to zero. */
  6685. if (nameSz == 0) {
  6686. nameSz = (unsigned int)XSTRLEN(name);
  6687. }
  6688. if (nameSz > 0 && name[nameSz - 1] == '\0')
  6689. nameSz--;
  6690. if (nameSz > WOLFSSL_HOST_NAME_MAX-1) {
  6691. WOLFSSL_MSG("Truncating name");
  6692. nameSz = WOLFSSL_HOST_NAME_MAX-1;
  6693. }
  6694. if (nameSz > 0) {
  6695. XMEMCPY(pParam->hostName, name, nameSz);
  6696. XMEMSET(pParam->hostName + nameSz, 0,
  6697. WOLFSSL_HOST_NAME_MAX - nameSz);
  6698. }
  6699. pParam->hostName[nameSz] = '\0';
  6700. return WOLFSSL_SUCCESS;
  6701. }
  6702. /* Set VERIFY PARAM from "from" pointer to "to" pointer */
  6703. int wolfSSL_X509_VERIFY_PARAM_set1(WOLFSSL_X509_VERIFY_PARAM *to,
  6704. const WOLFSSL_X509_VERIFY_PARAM *from)
  6705. {
  6706. int ret = WOLFSSL_FAILURE;
  6707. unsigned int _inherit_flags;
  6708. if (!to) {
  6709. return ret;
  6710. }
  6711. /* keeps the inherit flags for save */
  6712. _inherit_flags = to->inherit_flags;
  6713. /* Ored DEFAULT inherit flag proerty to copy "from" contents to "to"
  6714. * contents
  6715. */
  6716. to->inherit_flags |= WOLFSSL_VPARAM_DEFAULT;
  6717. ret = wolfSSL_X509_VERIFY_PARAM_inherit(to, from);
  6718. /* restore inherit flag */
  6719. to->inherit_flags = _inherit_flags;
  6720. return ret;
  6721. }
  6722. /* Set the host flag in the X509_VERIFY_PARAM structure */
  6723. void wolfSSL_X509_VERIFY_PARAM_set_hostflags(WOLFSSL_X509_VERIFY_PARAM* param,
  6724. unsigned int flags)
  6725. {
  6726. if (param != NULL) {
  6727. param->hostFlags = flags;
  6728. }
  6729. }
  6730. /* Sets the expected IP address to ipasc.
  6731. *
  6732. * param is a pointer to the X509_VERIFY_PARAM structure
  6733. * ipasc is a NULL-terminated string with N.N.N.N for IPv4 and
  6734. * HH:HH ... HH:HH for IPv6. There is no validation performed on the
  6735. * parameter, and it must be an exact match with the IP in the cert.
  6736. *
  6737. * return 1 for success and 0 for failure*/
  6738. int wolfSSL_X509_VERIFY_PARAM_set1_ip_asc(WOLFSSL_X509_VERIFY_PARAM *param,
  6739. const char *ipasc)
  6740. {
  6741. int ret = WOLFSSL_FAILURE;
  6742. if (param != NULL) {
  6743. if (ipasc == NULL) {
  6744. param->ipasc[0] = '\0';
  6745. }
  6746. else {
  6747. XSTRLCPY(param->ipasc, ipasc, WOLFSSL_MAX_IPSTR);
  6748. param->ipasc[WOLFSSL_MAX_IPSTR-1] = '\0';
  6749. }
  6750. ret = WOLFSSL_SUCCESS;
  6751. }
  6752. return ret;
  6753. }
  6754. /* Sets the expected IP address to ip(asc)
  6755. * by re-constructing IP address in ascii
  6756. * @param param is a pointer to the X509_VERIFY_PARAM structure
  6757. * @param ip in binary format of ip address
  6758. * @param iplen size of ip, 4 for ipv4, 16 for ipv6
  6759. * @return 1 for success and 0 for failure
  6760. */
  6761. int wolfSSL_X509_VERIFY_PARAM_set1_ip(WOLFSSL_X509_VERIFY_PARAM* param,
  6762. const unsigned char* ip, size_t iplen)
  6763. {
  6764. int ret = WOLFSSL_FAILURE;
  6765. #ifndef NO_FILESYSTEM
  6766. char* buf = NULL;
  6767. char* p = NULL;
  6768. word32 val = 0;
  6769. int i;
  6770. const size_t max_ipv6_len = 40;
  6771. byte write_zero = 0;
  6772. #endif
  6773. /* sanity check */
  6774. if (param == NULL || (iplen != 0 && iplen != 4 && iplen != 16)) {
  6775. WOLFSSL_MSG("bad function arg");
  6776. return ret;
  6777. }
  6778. #ifndef NO_FILESYSTEM
  6779. if (iplen == 4) {
  6780. /* ipv4 www.xxx.yyy.zzz max 15 length + Null termination */
  6781. buf = (char*)XMALLOC(16, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  6782. if (!buf) {
  6783. WOLFSSL_MSG("failed malloc");
  6784. return ret;
  6785. }
  6786. XSPRINTF(buf, "%d.%d.%d.%d", ip[0], ip[1], ip[2], ip[3]);
  6787. buf[15] = '\0';
  6788. }
  6789. else if (iplen == 16) {
  6790. /* ipv6 normal address scheme
  6791. * y1:y2:y3:y4:y5:y6:y7:y8, len(yx):4, len(y1-y8):32. len(":"):7
  6792. * Max len is 32 + 7 + 1(Termination) = 40 bytes
  6793. *
  6794. * ipv6 dual address
  6795. * Or y1:y2:y3:y4:y:y6:x.x.x.x yx is 4, y1-y6 is 24, ":" is 6
  6796. * x.x.x.x is 15.
  6797. * Max len is 24 + 6 + 15 + 1(Termination) = 46 bytes
  6798. *
  6799. * Expect data in ip[16]
  6800. * e.g (aaaa):(bbbb):(cccc):....(hhhh)
  6801. * (aaaa) = (ip[0<<8)|ip[1]
  6802. * ......
  6803. * (hhhh) = (ip[14]<<8)|(ip[15])
  6804. *
  6805. * e.g ::(gggg):(hhhh)
  6806. * ip[0]-[11] = 0
  6807. * (gggg) = (ip[12]<<8) |(ip[13])
  6808. * (hhhh) = (ip[14]<<8) |(ip[15])
  6809. *
  6810. * Because it is not able to know which ivp6 scheme uses from data to
  6811. * reconstruct IP address, this function assumes
  6812. * ivp6 normal address scheme, not dual adress scheme,
  6813. * to re-construct IP address in ascii.
  6814. */
  6815. buf = (char*)XMALLOC(max_ipv6_len, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  6816. if (!buf) {
  6817. WOLFSSL_MSG("failed malloc");
  6818. return ret;
  6819. }
  6820. p = buf;
  6821. for (i = 0; i < 16; i += 2) {
  6822. val = (((word32)(ip[i]<<8)) | (ip[i+1])) & 0xFFFF;
  6823. if (val == 0){
  6824. if (!write_zero) {
  6825. *p = ':';
  6826. }
  6827. p++;
  6828. *p = '\0';
  6829. write_zero = 1;
  6830. }
  6831. else {
  6832. if (i != 0)
  6833. *p++ = ':';
  6834. XSPRINTF(p, "%x", val);
  6835. }
  6836. /* sanity check */
  6837. if (XSTRLEN(buf) > max_ipv6_len) {
  6838. WOLFSSL_MSG("The target ip adress exceeds buffer length(40)");
  6839. XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  6840. buf = NULL;
  6841. break;
  6842. }
  6843. /* move the pointer to the last */
  6844. /* XSTRLEN includes NULL because of XSPRINTF use */
  6845. p = buf + (XSTRLEN(buf));
  6846. }
  6847. /* termination */
  6848. if(i == 16 && buf) {
  6849. p--;
  6850. if ((*p) == ':') {
  6851. /* when the last character is :, the followig segments are zero
  6852. * Therefore, adding : and null termination
  6853. */
  6854. p++;
  6855. *p++ = ':';
  6856. *p = '\0';
  6857. }
  6858. }
  6859. }
  6860. else {
  6861. WOLFSSL_MSG("iplen is zero, do nothing");
  6862. return WOLFSSL_SUCCESS;
  6863. }
  6864. if (buf) {
  6865. /* set address to ip asc */
  6866. ret = wolfSSL_X509_VERIFY_PARAM_set1_ip_asc(param, buf);
  6867. XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  6868. }
  6869. #else
  6870. (void)param;
  6871. (void)ip;
  6872. (void)iplen;
  6873. #endif
  6874. return ret;
  6875. }
  6876. #ifndef NO_WOLFSSL_STUB
  6877. void wolfSSL_X509_OBJECT_free_contents(WOLFSSL_X509_OBJECT* obj)
  6878. {
  6879. (void)obj;
  6880. WOLFSSL_STUB("X509_OBJECT_free_contents");
  6881. }
  6882. #endif
  6883. #ifndef NO_ASN_TIME
  6884. int wolfSSL_X509_cmp_current_time(const WOLFSSL_ASN1_TIME* asnTime)
  6885. {
  6886. return wolfSSL_X509_cmp_time(asnTime, NULL);
  6887. }
  6888. /* return -1 if asnTime is earlier than or equal to cmpTime, and 1 otherwise
  6889. * return 0 on error
  6890. */
  6891. int wolfSSL_X509_cmp_time(const WOLFSSL_ASN1_TIME* asnTime, time_t* cmpTime)
  6892. {
  6893. int ret = WOLFSSL_FAILURE;
  6894. time_t tmpTime, *pTime = &tmpTime;
  6895. struct tm ts, *tmpTs, *ct;
  6896. #if defined(NEED_TMP_TIME)
  6897. /* for use with gmtime_r */
  6898. struct tm tmpTimeStorage;
  6899. tmpTs = &tmpTimeStorage;
  6900. #else
  6901. tmpTs = NULL;
  6902. #endif
  6903. (void)tmpTs;
  6904. if (asnTime == NULL) {
  6905. return WOLFSSL_FAILURE;
  6906. }
  6907. if (cmpTime == NULL) {
  6908. /* Use current time */
  6909. *pTime = wc_Time(0);
  6910. }
  6911. else {
  6912. pTime = cmpTime;
  6913. }
  6914. if (wolfSSL_ASN1_TIME_to_tm((WOLFSSL_ASN1_TIME*)asnTime, &ts) !=
  6915. WOLFSSL_SUCCESS) {
  6916. WOLFSSL_MSG("Failed to convert WOLFSSL_ASN1_TIME to struct tm.");
  6917. return WOLFSSL_FAILURE;
  6918. }
  6919. /* Convert to time struct*/
  6920. ct = XGMTIME(pTime, tmpTs);
  6921. if (ct == NULL)
  6922. return GETTIME_ERROR;
  6923. /* DateGreaterThan returns 1 for >; 0 for <= */
  6924. ret = DateGreaterThan(&ts, ct) ? 1 : -1;
  6925. return ret;
  6926. }
  6927. #endif /* !NO_ASN_TIME */
  6928. #if (defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)) && \
  6929. !defined(NO_ASN_TIME) && !defined(USER_TIME) && !defined(TIME_OVERRIDES)
  6930. WOLFSSL_ASN1_TIME *wolfSSL_X509_time_adj_ex(WOLFSSL_ASN1_TIME *asnTime,
  6931. int offset_day, long offset_sec, time_t *in_tm)
  6932. {
  6933. /* get current time if in_tm is null */
  6934. time_t t = in_tm ? *in_tm : wc_Time(0);
  6935. return wolfSSL_ASN1_TIME_adj(asnTime, t, offset_day, offset_sec);
  6936. }
  6937. WOLFSSL_ASN1_TIME *wolfSSL_X509_time_adj(WOLFSSL_ASN1_TIME *asnTime,
  6938. long offset_sec, time_t *in_tm)
  6939. {
  6940. return wolfSSL_X509_time_adj_ex(asnTime, 0, offset_sec, in_tm);
  6941. }
  6942. WOLFSSL_ASN1_TIME* wolfSSL_X509_gmtime_adj(WOLFSSL_ASN1_TIME *s, long adj)
  6943. {
  6944. return wolfSSL_X509_time_adj(s, adj, NULL);
  6945. }
  6946. #endif
  6947. #ifndef NO_WOLFSSL_STUB
  6948. int wolfSSL_sk_X509_REVOKED_num(WOLFSSL_X509_REVOKED* revoked)
  6949. {
  6950. (void)revoked;
  6951. WOLFSSL_STUB("sk_X509_REVOKED_num");
  6952. return 0;
  6953. }
  6954. #endif
  6955. #ifndef NO_WOLFSSL_STUB
  6956. WOLFSSL_X509_REVOKED* wolfSSL_X509_CRL_get_REVOKED(WOLFSSL_X509_CRL* crl)
  6957. {
  6958. (void)crl;
  6959. WOLFSSL_STUB("X509_CRL_get_REVOKED");
  6960. return 0;
  6961. }
  6962. #endif
  6963. #ifndef NO_WOLFSSL_STUB
  6964. WOLFSSL_X509_REVOKED* wolfSSL_sk_X509_REVOKED_value(
  6965. WOLFSSL_X509_REVOKED* revoked, int value)
  6966. {
  6967. (void)revoked;
  6968. (void)value;
  6969. WOLFSSL_STUB("sk_X509_REVOKED_value");
  6970. return 0;
  6971. }
  6972. #endif
  6973. #endif /* OPENSSL_EXTRA */
  6974. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  6975. WOLFSSL_ASN1_INTEGER* wolfSSL_X509_get_serialNumber(WOLFSSL_X509* x509)
  6976. {
  6977. WOLFSSL_ASN1_INTEGER* a;
  6978. int i = 0;
  6979. WOLFSSL_ENTER("wolfSSL_X509_get_serialNumber");
  6980. if (x509 == NULL) {
  6981. WOLFSSL_MSG("NULL function argument");
  6982. return NULL;
  6983. }
  6984. if (x509->serialNumber != NULL)
  6985. return x509->serialNumber;
  6986. a = wolfSSL_ASN1_INTEGER_new();
  6987. if (a == NULL)
  6988. return NULL;
  6989. /* Make sure there is space for the data, ASN.1 type and length. */
  6990. if (x509->serialSz > (WOLFSSL_ASN1_INTEGER_MAX - 2)) {
  6991. /* dynamically create data buffer, +2 for type and length */
  6992. a->data = (unsigned char*)XMALLOC(x509->serialSz + 2, NULL,
  6993. DYNAMIC_TYPE_OPENSSL);
  6994. if (a->data == NULL) {
  6995. wolfSSL_ASN1_INTEGER_free(a);
  6996. return NULL;
  6997. }
  6998. a->dataMax = x509->serialSz + 2;
  6999. a->isDynamic = 1;
  7000. } else {
  7001. /* Use array instead of dynamic memory */
  7002. a->data = a->intData;
  7003. a->dataMax = WOLFSSL_ASN1_INTEGER_MAX;
  7004. }
  7005. #if defined(WOLFSSL_QT) || defined(WOLFSSL_HAPROXY)
  7006. XMEMCPY(&a->data[i], x509->serial, x509->serialSz);
  7007. a->length = x509->serialSz;
  7008. #else
  7009. a->data[i++] = ASN_INTEGER;
  7010. i += SetLength(x509->serialSz, a->data + i);
  7011. XMEMCPY(&a->data[i], x509->serial, x509->serialSz);
  7012. a->length = x509->serialSz + 2;
  7013. #endif
  7014. x509->serialNumber = a;
  7015. return a;
  7016. }
  7017. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  7018. #ifdef OPENSSL_EXTRA
  7019. #if defined(OPENSSL_ALL) || defined(WOLFSSL_APACHE_HTTPD) \
  7020. || defined(WOLFSSL_HAPROXY) || defined(WOLFSSL_WPAS)
  7021. WOLFSSL_X509_ALGOR* wolfSSL_X509_ALGOR_new(void)
  7022. {
  7023. WOLFSSL_X509_ALGOR* ret;
  7024. ret = (WOLFSSL_X509_ALGOR*)XMALLOC(sizeof(WOLFSSL_X509_ALGOR), NULL,
  7025. DYNAMIC_TYPE_OPENSSL);
  7026. if (ret) {
  7027. XMEMSET(ret, 0, sizeof(WOLFSSL_X509_ALGOR));
  7028. }
  7029. return ret;
  7030. }
  7031. void wolfSSL_X509_ALGOR_free(WOLFSSL_X509_ALGOR *alg)
  7032. {
  7033. if (alg) {
  7034. wolfSSL_ASN1_OBJECT_free(alg->algorithm);
  7035. wolfSSL_ASN1_TYPE_free(alg->parameter);
  7036. XFREE(alg, NULL, DYNAMIC_TYPE_OPENSSL);
  7037. }
  7038. }
  7039. /* Returns X509_ALGOR struct with signature algorithm */
  7040. const WOLFSSL_X509_ALGOR* wolfSSL_X509_get0_tbs_sigalg(const WOLFSSL_X509 *x509)
  7041. {
  7042. WOLFSSL_ENTER("X509_get0_tbs_sigalg");
  7043. if (x509 == NULL) {
  7044. WOLFSSL_MSG("x509 struct NULL error");
  7045. return NULL;
  7046. }
  7047. return &x509->algor;
  7048. }
  7049. /* Sets paobj pointer to X509_ALGOR signature algorithm */
  7050. void wolfSSL_X509_ALGOR_get0(const WOLFSSL_ASN1_OBJECT **paobj, int *pptype,
  7051. const void **ppval, const WOLFSSL_X509_ALGOR *algor)
  7052. {
  7053. WOLFSSL_ENTER("X509_ALGOR_get0");
  7054. if (!algor) {
  7055. WOLFSSL_MSG("algor object is NULL");
  7056. return;
  7057. }
  7058. if (paobj)
  7059. *paobj = algor->algorithm;
  7060. if (ppval && algor->parameter)
  7061. *ppval = algor->parameter->value.ptr;
  7062. if (pptype) {
  7063. if (algor->parameter) {
  7064. *pptype = algor->parameter->type;
  7065. }
  7066. else {
  7067. /* Default to V_ASN1_OBJECT */
  7068. *pptype = V_ASN1_OBJECT;
  7069. }
  7070. }
  7071. }
  7072. /**
  7073. * Populate algor members.
  7074. *
  7075. * @param algor The object to be set
  7076. * @param aobj The value to be set in algor->algorithm
  7077. * @param ptype The type of algor->parameter
  7078. * @param pval The value of algor->parameter
  7079. * @return WOLFSSL_SUCCESS on success
  7080. * WOLFSSL_FAILURE on missing parameters or bad malloc
  7081. */
  7082. int wolfSSL_X509_ALGOR_set0(WOLFSSL_X509_ALGOR *algor, WOLFSSL_ASN1_OBJECT *aobj,
  7083. int ptype, void *pval)
  7084. {
  7085. if (!algor) {
  7086. return WOLFSSL_FAILURE;
  7087. }
  7088. if (aobj) {
  7089. algor->algorithm = aobj;
  7090. }
  7091. if (!algor->parameter) {
  7092. algor->parameter = wolfSSL_ASN1_TYPE_new();
  7093. if (!algor->parameter) {
  7094. return WOLFSSL_FAILURE;
  7095. }
  7096. }
  7097. wolfSSL_ASN1_TYPE_set(algor->parameter, ptype, pval);
  7098. return WOLFSSL_SUCCESS;
  7099. }
  7100. /**
  7101. * Allocate a new WOLFSSL_X509_PUBKEY object.
  7102. *
  7103. * @return New zero'ed WOLFSSL_X509_PUBKEY object
  7104. */
  7105. WOLFSSL_X509_PUBKEY *wolfSSL_X509_PUBKEY_new(void)
  7106. {
  7107. WOLFSSL_X509_PUBKEY *ret;
  7108. ret = (WOLFSSL_X509_PUBKEY*)XMALLOC(sizeof(WOLFSSL_X509_PUBKEY), NULL,
  7109. DYNAMIC_TYPE_OPENSSL);
  7110. if (!ret) {
  7111. return NULL;
  7112. }
  7113. XMEMSET(ret, 0, sizeof(WOLFSSL_X509_PUBKEY));
  7114. ret->algor = wolfSSL_X509_ALGOR_new();
  7115. if (!ret->algor) {
  7116. wolfSSL_X509_PUBKEY_free(ret);
  7117. return NULL;
  7118. }
  7119. return ret;
  7120. }
  7121. /**
  7122. * Free WOLFSSL_X509_PUBKEY and all its members.
  7123. *
  7124. * @param at Object to free
  7125. */
  7126. void wolfSSL_X509_PUBKEY_free(WOLFSSL_X509_PUBKEY *x)
  7127. {
  7128. if (x) {
  7129. if (x->algor) {
  7130. wolfSSL_X509_ALGOR_free(x->algor);
  7131. }
  7132. if (x->pkey) {
  7133. wolfSSL_EVP_PKEY_free(x->pkey);
  7134. }
  7135. XFREE(x, NULL, DYNAMIC_TYPE_OPENSSL);
  7136. }
  7137. }
  7138. /* Returns X509_PUBKEY structure containing X509_ALGOR and EVP_PKEY */
  7139. WOLFSSL_X509_PUBKEY* wolfSSL_X509_get_X509_PUBKEY(const WOLFSSL_X509* x509)
  7140. {
  7141. WOLFSSL_ENTER("X509_get_X509_PUBKEY");
  7142. if (x509 == NULL) {
  7143. WOLFSSL_MSG("x509 struct NULL error");
  7144. return NULL;
  7145. }
  7146. return (WOLFSSL_X509_PUBKEY*)&x509->key;
  7147. }
  7148. /* Sets ppkalg pointer to X509_PUBKEY algorithm. Returns WOLFSSL_SUCCESS on
  7149. success or WOLFSSL_FAILURE on error. */
  7150. int wolfSSL_X509_PUBKEY_get0_param(WOLFSSL_ASN1_OBJECT **ppkalg,
  7151. const unsigned char **pk, int *ppklen, WOLFSSL_X509_ALGOR **pa,
  7152. WOLFSSL_X509_PUBKEY *pub)
  7153. {
  7154. WOLFSSL_ENTER("X509_PUBKEY_get0_param");
  7155. if (!pub || !pub->pubKeyOID) {
  7156. WOLFSSL_MSG("X509_PUBKEY struct not populated");
  7157. return WOLFSSL_FAILURE;
  7158. }
  7159. if (!pub->algor) {
  7160. if (!(pub->algor = wolfSSL_X509_ALGOR_new())) {
  7161. return WOLFSSL_FAILURE;
  7162. }
  7163. pub->algor->algorithm = wolfSSL_OBJ_nid2obj(pub->pubKeyOID);
  7164. if (pub->algor->algorithm == NULL) {
  7165. WOLFSSL_MSG("Failed to create object from NID");
  7166. return WOLFSSL_FAILURE;
  7167. }
  7168. }
  7169. if (pa)
  7170. *pa = pub->algor;
  7171. if (ppkalg)
  7172. *ppkalg = pub->algor->algorithm;
  7173. if (pk)
  7174. *pk = (unsigned char*)pub->pkey->pkey.ptr;
  7175. if (ppklen)
  7176. *ppklen = pub->pkey->pkey_sz;
  7177. return WOLFSSL_SUCCESS;
  7178. }
  7179. /* Returns a pointer to the pkey when passed a key */
  7180. WOLFSSL_EVP_PKEY* wolfSSL_X509_PUBKEY_get(WOLFSSL_X509_PUBKEY* key)
  7181. {
  7182. WOLFSSL_ENTER("wolfSSL_X509_PUBKEY_get");
  7183. if (key == NULL || key->pkey == NULL) {
  7184. WOLFSSL_LEAVE("wolfSSL_X509_PUBKEY_get", BAD_FUNC_ARG);
  7185. return NULL;
  7186. }
  7187. if (wolfSSL_EVP_PKEY_up_ref(key->pkey) != WOLFSSL_SUCCESS) {
  7188. WOLFSSL_LEAVE("wolfSSL_X509_PUBKEY_get", BAD_MUTEX_E);
  7189. return NULL;
  7190. }
  7191. WOLFSSL_LEAVE("wolfSSL_X509_PUBKEY_get", WOLFSSL_SUCCESS);
  7192. return key->pkey;
  7193. }
  7194. int wolfSSL_X509_PUBKEY_set(WOLFSSL_X509_PUBKEY **x, WOLFSSL_EVP_PKEY *key)
  7195. {
  7196. WOLFSSL_X509_PUBKEY *pk = NULL;
  7197. int ptype;
  7198. void *pval;
  7199. #ifndef NO_DSA
  7200. WOLFSSL_ASN1_STRING *str;
  7201. #endif
  7202. #ifdef HAVE_ECC
  7203. int nid;
  7204. const WOLFSSL_EC_GROUP *group;
  7205. #endif
  7206. WOLFSSL_ENTER("wolfSSL_X509_PUBKEY_set");
  7207. if (!x || !key) {
  7208. return WOLFSSL_FAILURE;
  7209. }
  7210. if (!(pk = wolfSSL_X509_PUBKEY_new())) {
  7211. return WOLFSSL_FAILURE;
  7212. }
  7213. switch (key->type) {
  7214. #ifndef NO_RSA
  7215. case EVP_PKEY_RSA:
  7216. pval = NULL;
  7217. ptype = V_ASN1_NULL;
  7218. pk->pubKeyOID = RSAk;
  7219. break;
  7220. #endif
  7221. #ifndef NO_DSA
  7222. case EVP_PKEY_DSA:
  7223. if (!key->dsa->p || !key->dsa->q || !key->dsa->g)
  7224. goto error;
  7225. str = wolfSSL_ASN1_STRING_new();
  7226. if (str == NULL)
  7227. goto error;
  7228. str->length = wolfSSL_i2d_DSAparams(key->dsa, (unsigned char **)&str->data);
  7229. if (str->length <= 0)
  7230. goto error;
  7231. str->isDynamic = 1;
  7232. pval = str;
  7233. ptype = V_ASN1_SEQUENCE;
  7234. pk->pubKeyOID = DSAk;
  7235. break;
  7236. #endif
  7237. #ifdef HAVE_ECC
  7238. case EVP_PKEY_EC:
  7239. group = wolfSSL_EC_KEY_get0_group(key->ecc);
  7240. if (!group)
  7241. goto error;
  7242. nid = wolfSSL_EC_GROUP_get_curve_name(group);
  7243. if (nid == WOLFSSL_FAILURE) {
  7244. /* TODO: Add support for no nid case */
  7245. WOLFSSL_MSG("nid not found");
  7246. goto error;
  7247. }
  7248. pval = wolfSSL_OBJ_nid2obj(nid);
  7249. if (!pval)
  7250. goto error;
  7251. ptype = V_ASN1_OBJECT;
  7252. pk->pubKeyOID = ECDSAk;
  7253. break;
  7254. #endif
  7255. default:
  7256. WOLFSSL_MSG("Unknown key type");
  7257. goto error;
  7258. }
  7259. if (!wolfSSL_X509_ALGOR_set0(pk->algor, wolfSSL_OBJ_nid2obj(key->type), ptype, pval)) {
  7260. WOLFSSL_MSG("Failed to create algorithm object");
  7261. if (ptype == V_ASN1_OBJECT)
  7262. ASN1_OBJECT_free((WOLFSSL_ASN1_OBJECT *)pval);
  7263. else
  7264. ASN1_STRING_free((WOLFSSL_ASN1_STRING *)pval);
  7265. goto error;
  7266. }
  7267. if (!wolfSSL_EVP_PKEY_up_ref(key)) {
  7268. WOLFSSL_MSG("Failed to up key reference");
  7269. goto error;
  7270. }
  7271. pk->pkey = key;
  7272. wolfSSL_X509_PUBKEY_free(*x);
  7273. *x = pk;
  7274. return WOLFSSL_SUCCESS;
  7275. error:
  7276. if (pk) {
  7277. wolfSSL_X509_PUBKEY_free(pk);
  7278. }
  7279. return WOLFSSL_FAILURE;
  7280. }
  7281. #endif /* OPENSSL_ALL || WOLFSSL_APACHE_HTTPD || WOLFSSL_HAPROXY || WOLFSSL_WPAS */
  7282. #endif /* OPENSSL_EXTRA */
  7283. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  7284. WOLFSSL_BASIC_CONSTRAINTS* wolfSSL_BASIC_CONSTRAINTS_new(void)
  7285. {
  7286. WOLFSSL_BASIC_CONSTRAINTS* bc;
  7287. bc = (WOLFSSL_BASIC_CONSTRAINTS*)
  7288. XMALLOC(sizeof(WOLFSSL_BASIC_CONSTRAINTS), NULL,
  7289. DYNAMIC_TYPE_X509_EXT);
  7290. if (bc == NULL) {
  7291. WOLFSSL_MSG("Failed to malloc basic constraints");
  7292. return NULL;
  7293. }
  7294. XMEMSET(bc, 0, sizeof(WOLFSSL_BASIC_CONSTRAINTS));
  7295. return bc;
  7296. }
  7297. /* frees the wolfSSL_BASIC_CONSTRAINTS object */
  7298. void wolfSSL_BASIC_CONSTRAINTS_free(WOLFSSL_BASIC_CONSTRAINTS *bc)
  7299. {
  7300. WOLFSSL_ENTER("wolfSSL_BASIC_CONSTRAINTS_free");
  7301. if (bc == NULL) {
  7302. WOLFSSL_MSG("Argument is NULL");
  7303. return;
  7304. }
  7305. if (bc->pathlen) {
  7306. wolfSSL_ASN1_INTEGER_free(bc->pathlen);
  7307. }
  7308. XFREE(bc, NULL, DYNAMIC_TYPE_OPENSSL);
  7309. }
  7310. WOLFSSL_AUTHORITY_KEYID* wolfSSL_AUTHORITY_KEYID_new(void)
  7311. {
  7312. WOLFSSL_AUTHORITY_KEYID* akey = (WOLFSSL_AUTHORITY_KEYID*)XMALLOC(
  7313. sizeof(WOLFSSL_AUTHORITY_KEYID), NULL, DYNAMIC_TYPE_OPENSSL);
  7314. if (!akey) {
  7315. WOLFSSL_MSG("Issue creating WOLFSSL_AUTHORITY_KEYID struct");
  7316. return NULL;
  7317. }
  7318. XMEMSET(akey, 0, sizeof(WOLFSSL_AUTHORITY_KEYID));
  7319. return akey;
  7320. }
  7321. /* frees the wolfSSL_AUTHORITY_KEYID object */
  7322. void wolfSSL_AUTHORITY_KEYID_free(WOLFSSL_AUTHORITY_KEYID *id)
  7323. {
  7324. WOLFSSL_ENTER("wolfSSL_AUTHORITY_KEYID_free");
  7325. if(id == NULL) {
  7326. WOLFSSL_MSG("Argument is NULL");
  7327. return;
  7328. }
  7329. if (id->keyid) {
  7330. wolfSSL_ASN1_STRING_free(id->keyid);
  7331. }
  7332. if (id->issuer) {
  7333. wolfSSL_ASN1_OBJECT_free(id->issuer);
  7334. }
  7335. if (id->serial) {
  7336. wolfSSL_ASN1_INTEGER_free(id->serial);
  7337. }
  7338. XFREE(id, NULL, DYNAMIC_TYPE_OPENSSL);
  7339. }
  7340. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  7341. #ifdef KEEP_PEER_CERT
  7342. char* wolfSSL_X509_get_subjectCN(WOLFSSL_X509* x509)
  7343. {
  7344. if (x509 == NULL)
  7345. return NULL;
  7346. return x509->subjectCN;
  7347. }
  7348. #endif /* KEEP_PEER_CERT */
  7349. #if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
  7350. /* increments ref count of WOLFSSL_X509. Return 1 on success, 0 on error */
  7351. int wolfSSL_X509_up_ref(WOLFSSL_X509* x509)
  7352. {
  7353. if (x509) {
  7354. #ifndef SINGLE_THREADED
  7355. if (wc_LockMutex(&x509->refMutex) != 0) {
  7356. WOLFSSL_MSG("Failed to lock x509 mutex");
  7357. return WOLFSSL_FAILURE;
  7358. }
  7359. #endif
  7360. x509->refCount++;
  7361. #ifndef SINGLE_THREADED
  7362. wc_UnLockMutex(&x509->refMutex);
  7363. #endif
  7364. return WOLFSSL_SUCCESS;
  7365. }
  7366. return WOLFSSL_FAILURE;
  7367. }
  7368. #endif /* OPENSSL_EXTRA_X509_SMALL || OPENSSL_EXTRA */
  7369. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  7370. WOLF_STACK_OF(WOLFSSL_X509)* wolfSSL_X509_chain_up_ref(
  7371. WOLF_STACK_OF(WOLFSSL_X509)* chain)
  7372. {
  7373. /* wolfSSL_sk_dup takes care of doing a deep copy */
  7374. return wolfSSL_sk_dup(chain);
  7375. }
  7376. #endif
  7377. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  7378. void wolfSSL_X509_NAME_free(WOLFSSL_X509_NAME *name)
  7379. {
  7380. WOLFSSL_ENTER("wolfSSL_X509_NAME_free");
  7381. FreeX509Name(name);
  7382. XFREE(name, NULL, DYNAMIC_TYPE_X509);
  7383. }
  7384. /* Malloc's a new WOLFSSL_X509_NAME structure
  7385. *
  7386. * returns NULL on failure, otherwise returns a new structure.
  7387. */
  7388. WOLFSSL_X509_NAME* wolfSSL_X509_NAME_new(void)
  7389. {
  7390. WOLFSSL_X509_NAME* name;
  7391. WOLFSSL_ENTER("wolfSSL_X509_NAME_new");
  7392. name = (WOLFSSL_X509_NAME*)XMALLOC(sizeof(WOLFSSL_X509_NAME), NULL,
  7393. DYNAMIC_TYPE_X509);
  7394. if (name != NULL) {
  7395. InitX509Name(name, 1, NULL);
  7396. }
  7397. return name;
  7398. }
  7399. /* Creates a duplicate of a WOLFSSL_X509_NAME structure.
  7400. Returns a new WOLFSSL_X509_NAME structure or NULL on failure */
  7401. WOLFSSL_X509_NAME* wolfSSL_X509_NAME_dup(WOLFSSL_X509_NAME *name)
  7402. {
  7403. WOLFSSL_X509_NAME* copy = NULL;
  7404. WOLFSSL_ENTER("wolfSSL_X509_NAME_dup");
  7405. if (name == NULL) {
  7406. WOLFSSL_MSG("NULL parameter");
  7407. return NULL;
  7408. }
  7409. if (!(copy = wolfSSL_X509_NAME_new())) {
  7410. return NULL;
  7411. }
  7412. /* copy contents */
  7413. InitX509Name(copy, 1, name->heap);
  7414. if (wolfSSL_X509_NAME_copy(name, copy) != WOLFSSL_SUCCESS) {
  7415. wolfSSL_X509_NAME_free(copy);
  7416. return NULL;
  7417. }
  7418. return copy;
  7419. }
  7420. #ifdef WOLFSSL_CERT_GEN
  7421. #if defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_EXT) || defined(OPENSSL_EXTRA)
  7422. /* Helper function to copy cert name from a WOLFSSL_X509_NAME structure to
  7423. * a Cert structure.
  7424. *
  7425. * returns length of DER on success and a negative error value on failure
  7426. */
  7427. static int CopyX509NameToCert(WOLFSSL_X509_NAME* n, byte* out)
  7428. {
  7429. unsigned char* der = NULL;
  7430. int length = BAD_FUNC_ARG, ret;
  7431. word32 idx = 0;
  7432. ret = wolfSSL_i2d_X509_NAME(n, &der);
  7433. if (ret > (int)sizeof(CertName) || ret < 0) {
  7434. WOLFSSL_MSG("Name conversion error");
  7435. ret = MEMORY_E;
  7436. }
  7437. if (ret > 0) {
  7438. /* strip off sequence, this gets added on certificate creation */
  7439. ret = GetSequence(der, &idx, &length, ret);
  7440. }
  7441. if (ret > 0) {
  7442. XMEMCPY(out, der + idx, length);
  7443. }
  7444. if (der != NULL)
  7445. XFREE(der, NULL, DYNAMIC_TYPE_OPENSSL);
  7446. return length;
  7447. }
  7448. #endif
  7449. #ifdef WOLFSSL_CERT_REQ
  7450. static int ReqCertFromX509(Cert* cert, WOLFSSL_X509* req)
  7451. {
  7452. int ret;
  7453. if (wc_InitCert(cert) != 0)
  7454. return WOLFSSL_FAILURE;
  7455. ret = CopyX509NameToCert(&req->subject, cert->sbjRaw);
  7456. if (ret < 0) {
  7457. WOLFSSL_MSG("REQ subject conversion error");
  7458. ret = MEMORY_E;
  7459. }
  7460. else {
  7461. ret = WOLFSSL_SUCCESS;
  7462. }
  7463. if (ret == WOLFSSL_SUCCESS) {
  7464. cert->version = req->version;
  7465. cert->isCA = req->isCa;
  7466. cert->basicConstSet = req->basicConstSet;
  7467. #ifdef WOLFSSL_CERT_EXT
  7468. if (req->subjKeyIdSz != 0) {
  7469. XMEMCPY(cert->skid, req->subjKeyId, req->subjKeyIdSz);
  7470. cert->skidSz = req->subjKeyIdSz;
  7471. }
  7472. if (req->keyUsageSet)
  7473. cert->keyUsage = req->keyUsage;
  7474. /* Extended Key Usage not supported. */
  7475. #endif
  7476. XMEMCPY(cert->challengePw, req->challengePw, CTC_NAME_SIZE);
  7477. cert->challengePwPrintableString = req->challengePw[0] != 0;
  7478. #ifdef WOLFSSL_ALT_NAMES
  7479. cert->altNamesSz = FlattenAltNames(cert->altNames,
  7480. sizeof(cert->altNames), req->altNames);
  7481. #endif /* WOLFSSL_ALT_NAMES */
  7482. }
  7483. return ret;
  7484. }
  7485. #endif /* WOLFSSL_CERT_REQ */
  7486. /* converts WOLFSSL_AN1_TIME to Cert form, returns positive size on
  7487. * success */
  7488. static int CertDateFromX509(byte* out, int outSz, WOLFSSL_ASN1_TIME* t)
  7489. {
  7490. int sz, i;
  7491. if (t->length + 1 >= outSz) {
  7492. return BUFFER_E;
  7493. }
  7494. out[0] = (byte) t->type;
  7495. sz = SetLength(t->length, out + 1) + 1; /* gen tag */
  7496. for (i = 0; i < t->length; i++) {
  7497. out[sz + i] = t->data[i];
  7498. }
  7499. return t->length + sz;
  7500. }
  7501. /* convert a WOLFSSL_X509 to a Cert structure for writing out */
  7502. static int CertFromX509(Cert* cert, WOLFSSL_X509* x509)
  7503. {
  7504. int ret;
  7505. #ifdef WOLFSSL_CERT_EXT
  7506. int i;
  7507. #endif
  7508. WOLFSSL_ENTER("wolfSSL_X509_to_Cert()");
  7509. if (x509 == NULL || cert == NULL) {
  7510. return BAD_FUNC_ARG;
  7511. }
  7512. wc_InitCert(cert);
  7513. cert->version = (int)wolfSSL_X509_get_version(x509);
  7514. if (x509->notBefore.length > 0) {
  7515. cert->beforeDateSz = CertDateFromX509(cert->beforeDate,
  7516. CTC_DATE_SIZE, &x509->notBefore);
  7517. if (cert->beforeDateSz <= 0){
  7518. WOLFSSL_MSG("Not before date error");
  7519. return WOLFSSL_FAILURE;
  7520. }
  7521. }
  7522. else {
  7523. cert->beforeDateSz = 0;
  7524. }
  7525. if (x509->notAfter.length > 0) {
  7526. cert->afterDateSz = CertDateFromX509(cert->afterDate,
  7527. CTC_DATE_SIZE, &x509->notAfter);
  7528. if (cert->afterDateSz <= 0){
  7529. WOLFSSL_MSG("Not after date error");
  7530. return WOLFSSL_FAILURE;
  7531. }
  7532. }
  7533. else {
  7534. cert->afterDateSz = 0;
  7535. }
  7536. #ifdef WOLFSSL_ALT_NAMES
  7537. cert->altNamesSz = FlattenAltNames(cert->altNames,
  7538. sizeof(cert->altNames), x509->altNames);
  7539. #endif /* WOLFSSL_ALT_NAMES */
  7540. cert->sigType = wolfSSL_X509_get_signature_type(x509);
  7541. cert->keyType = x509->pubKeyOID;
  7542. cert->isCA = wolfSSL_X509_get_isCA(x509);
  7543. cert->basicConstSet = x509->basicConstSet;
  7544. #ifdef WOLFSSL_CERT_EXT
  7545. if (x509->subjKeyIdSz <= CTC_MAX_SKID_SIZE) {
  7546. if (x509->subjKeyId) {
  7547. XMEMCPY(cert->skid, x509->subjKeyId, x509->subjKeyIdSz);
  7548. }
  7549. cert->skidSz = (int)x509->subjKeyIdSz;
  7550. }
  7551. else {
  7552. WOLFSSL_MSG("Subject Key ID too large");
  7553. return WOLFSSL_FAILURE;
  7554. }
  7555. if (x509->authKeyIdSz < sizeof(cert->akid)) {
  7556. #ifdef WOLFSSL_AKID_NAME
  7557. cert->rawAkid = 0;
  7558. if (x509->authKeyIdSrc) {
  7559. XMEMCPY(cert->akid, x509->authKeyIdSrc, x509->authKeyIdSrcSz);
  7560. cert->akidSz = (int)x509->authKeyIdSrcSz;
  7561. cert->rawAkid = 1;
  7562. }
  7563. else
  7564. #endif
  7565. if (x509->authKeyId) {
  7566. XMEMCPY(cert->akid, x509->authKeyId, x509->authKeyIdSz);
  7567. cert->akidSz = (int)x509->authKeyIdSz;
  7568. }
  7569. }
  7570. else {
  7571. WOLFSSL_MSG("Auth Key ID too large");
  7572. return WOLFSSL_FAILURE;
  7573. }
  7574. for (i = 0; i < x509->certPoliciesNb; i++) {
  7575. /* copy the smaller of MAX macros, by default they are currently equal*/
  7576. if ((int)CTC_MAX_CERTPOL_SZ <= (int)MAX_CERTPOL_SZ) {
  7577. XMEMCPY(cert->certPolicies[i], x509->certPolicies[i],
  7578. CTC_MAX_CERTPOL_SZ);
  7579. }
  7580. else {
  7581. XMEMCPY(cert->certPolicies[i], x509->certPolicies[i],
  7582. MAX_CERTPOL_SZ);
  7583. }
  7584. }
  7585. cert->certPoliciesNb = (word16)x509->certPoliciesNb;
  7586. cert->keyUsage = x509->keyUsage;
  7587. cert->extKeyUsage = x509->extKeyUsage;
  7588. cert->nsCertType = x509->nsCertType;
  7589. if (x509->rawCRLInfo != NULL) {
  7590. if (x509->rawCRLInfoSz > CTC_MAX_CRLINFO_SZ) {
  7591. WOLFSSL_MSG("CRL Info too large");
  7592. return WOLFSSL_FAILURE;
  7593. }
  7594. XMEMCPY(cert->crlInfo, x509->rawCRLInfo, x509->rawCRLInfoSz);
  7595. cert->crlInfoSz = x509->rawCRLInfoSz;
  7596. }
  7597. #endif /* WOLFSSL_CERT_EXT */
  7598. #ifdef WOLFSSL_CERT_REQ
  7599. /* copy over challenge password for REQ certs */
  7600. XMEMCPY(cert->challengePw, x509->challengePw, CTC_NAME_SIZE);
  7601. #endif
  7602. /* Only makes sense to do this for OPENSSL_EXTRA because without
  7603. * this define the function will error out below */
  7604. #ifdef OPENSSL_EXTRA
  7605. if (x509->serialSz == 0 && x509->serialNumber != NULL &&
  7606. /* Check if the buffer contains more than just the
  7607. * ASN tag and length */
  7608. x509->serialNumber->length > 2) {
  7609. if (wolfSSL_X509_set_serialNumber(x509, x509->serialNumber)
  7610. != WOLFSSL_SUCCESS) {
  7611. WOLFSSL_MSG("Failed to set serial number");
  7612. return WOLFSSL_FAILURE;
  7613. }
  7614. }
  7615. #endif
  7616. /* set serial number */
  7617. if (x509->serialSz > 0) {
  7618. #if defined(OPENSSL_EXTRA)
  7619. byte serial[EXTERNAL_SERIAL_SIZE];
  7620. int serialSz = EXTERNAL_SERIAL_SIZE;
  7621. ret = wolfSSL_X509_get_serial_number(x509, serial, &serialSz);
  7622. if (ret != WOLFSSL_SUCCESS) {
  7623. WOLFSSL_MSG("Serial size error");
  7624. return WOLFSSL_FAILURE;
  7625. }
  7626. if (serialSz > EXTERNAL_SERIAL_SIZE ||
  7627. serialSz > CTC_SERIAL_SIZE) {
  7628. WOLFSSL_MSG("Serial size too large error");
  7629. return WOLFSSL_FAILURE;
  7630. }
  7631. XMEMCPY(cert->serial, serial, serialSz);
  7632. cert->serialSz = serialSz;
  7633. #else
  7634. WOLFSSL_MSG("Getting X509 serial number not supported");
  7635. return WOLFSSL_FAILURE;
  7636. #endif
  7637. }
  7638. /* copy over Name structures */
  7639. if (x509->issuerSet)
  7640. cert->selfSigned = 0;
  7641. #if defined(WOLFSSL_CERT_EXT) || defined(OPENSSL_EXTRA)
  7642. ret = CopyX509NameToCert(&x509->subject, cert->sbjRaw);
  7643. if (ret < 0) {
  7644. WOLFSSL_MSG("Subject conversion error");
  7645. return MEMORY_E;
  7646. }
  7647. if (cert->selfSigned) {
  7648. XMEMCPY(cert->issRaw, cert->sbjRaw, sizeof(CertName));
  7649. }
  7650. else {
  7651. ret = CopyX509NameToCert(&x509->issuer, cert->issRaw);
  7652. if (ret < 0) {
  7653. WOLFSSL_MSG("Issuer conversion error");
  7654. return MEMORY_E;
  7655. }
  7656. }
  7657. #endif
  7658. cert->heap = x509->heap;
  7659. (void)ret;
  7660. return WOLFSSL_SUCCESS;
  7661. }
  7662. /* returns the sig type to use on success i.e CTC_SHAwRSA and WOLFSSL_FALURE
  7663. * on fail case */
  7664. static int wolfSSL_sigTypeFromPKEY(WOLFSSL_EVP_MD* md,
  7665. WOLFSSL_EVP_PKEY* pkey)
  7666. {
  7667. #if !defined(NO_PWDBASED) && defined(OPENSSL_EXTRA)
  7668. int hashType;
  7669. int sigType = WOLFSSL_FAILURE;
  7670. /* Convert key type and hash algorithm to a signature algorithm */
  7671. if (wolfSSL_EVP_get_hashinfo(md, &hashType, NULL) == WOLFSSL_FAILURE) {
  7672. return WOLFSSL_FAILURE;
  7673. }
  7674. if (pkey->type == EVP_PKEY_RSA) {
  7675. switch (hashType) {
  7676. case WC_HASH_TYPE_SHA:
  7677. sigType = CTC_SHAwRSA;
  7678. break;
  7679. case WC_HASH_TYPE_SHA224:
  7680. sigType = CTC_SHA224wRSA;
  7681. break;
  7682. case WC_HASH_TYPE_SHA256:
  7683. sigType = CTC_SHA256wRSA;
  7684. break;
  7685. case WC_HASH_TYPE_SHA384:
  7686. sigType = CTC_SHA384wRSA;
  7687. break;
  7688. case WC_HASH_TYPE_SHA512:
  7689. sigType = CTC_SHA512wRSA;
  7690. break;
  7691. #ifdef WOLFSSL_SHA3
  7692. case WC_HASH_TYPE_SHA3_224:
  7693. sigType = CTC_SHA3_224wRSA;
  7694. break;
  7695. case WC_HASH_TYPE_SHA3_256:
  7696. sigType = CTC_SHA3_256wRSA;
  7697. break;
  7698. case WC_HASH_TYPE_SHA3_384:
  7699. sigType = CTC_SHA3_384wRSA;
  7700. break;
  7701. case WC_HASH_TYPE_SHA3_512:
  7702. sigType = CTC_SHA3_512wRSA;
  7703. break;
  7704. #endif
  7705. default:
  7706. return WOLFSSL_FAILURE;
  7707. }
  7708. }
  7709. else if (pkey->type == EVP_PKEY_EC) {
  7710. switch (hashType) {
  7711. case WC_HASH_TYPE_SHA:
  7712. sigType = CTC_SHAwECDSA;
  7713. break;
  7714. case WC_HASH_TYPE_SHA224:
  7715. sigType = CTC_SHA224wECDSA;
  7716. break;
  7717. case WC_HASH_TYPE_SHA256:
  7718. sigType = CTC_SHA256wECDSA;
  7719. break;
  7720. case WC_HASH_TYPE_SHA384:
  7721. sigType = CTC_SHA384wECDSA;
  7722. break;
  7723. case WC_HASH_TYPE_SHA512:
  7724. sigType = CTC_SHA512wECDSA;
  7725. break;
  7726. #ifdef WOLFSSL_SHA3
  7727. case WC_HASH_TYPE_SHA3_224:
  7728. sigType = CTC_SHA3_224wECDSA;
  7729. break;
  7730. case WC_HASH_TYPE_SHA3_256:
  7731. sigType = CTC_SHA3_256wECDSA;
  7732. break;
  7733. case WC_HASH_TYPE_SHA3_384:
  7734. sigType = CTC_SHA3_384wECDSA;
  7735. break;
  7736. case WC_HASH_TYPE_SHA3_512:
  7737. sigType = CTC_SHA3_512wECDSA;
  7738. break;
  7739. #endif
  7740. default:
  7741. return WOLFSSL_FAILURE;
  7742. }
  7743. }
  7744. else
  7745. return WOLFSSL_FAILURE;
  7746. return sigType;
  7747. #else
  7748. (void)md;
  7749. (void)pkey;
  7750. WOLFSSL_MSG("Cannot get hashinfo when NO_PWDBASED is defined");
  7751. return WOLFSSL_FAILURE;
  7752. #endif /* !NO_PWDBASED && OPENSSL_EXTRA */
  7753. }
  7754. /* generates DER buffer from WOLFSSL_X509
  7755. * If req == 1 then creates a request DER buffer
  7756. *
  7757. * updates derSz with certificate body size on success
  7758. * return WOLFSSL_SUCCESS on success
  7759. */
  7760. static int wolfssl_x509_make_der(WOLFSSL_X509* x509, int req,
  7761. unsigned char* der, int* derSz, int includeSig)
  7762. {
  7763. int ret = WOLFSSL_FAILURE;
  7764. int totalLen;
  7765. Cert* cert = NULL;
  7766. void* key = NULL;
  7767. int type = -1;
  7768. #ifndef NO_RSA
  7769. RsaKey* rsa = NULL;
  7770. #endif
  7771. #ifdef HAVE_ECC
  7772. ecc_key* ecc = NULL;
  7773. #endif
  7774. #ifndef NO_DSA
  7775. DsaKey* dsa = NULL;
  7776. #endif
  7777. WC_RNG rng;
  7778. word32 idx = 0;
  7779. if (x509 == NULL || der == NULL || derSz == NULL)
  7780. return BAD_FUNC_ARG;
  7781. #ifndef WOLFSSL_CERT_REQ
  7782. if (req) {
  7783. WOLFSSL_MSG("WOLFSSL_CERT_REQ needed for certificate request");
  7784. return WOLFSSL_FAILURE;
  7785. }
  7786. #endif
  7787. /* allocate Cert struct on heap since it is large */
  7788. cert = (Cert*)XMALLOC(sizeof(Cert), NULL, DYNAMIC_TYPE_CERT);
  7789. if (cert == NULL) {
  7790. WOLFSSL_MSG("Failed to allocate memory for Cert struct");
  7791. return WOLFSSL_FAILURE;
  7792. }
  7793. XMEMSET(cert, 0, sizeof(Cert));
  7794. #ifdef WOLFSSL_CERT_REQ
  7795. if (req) {
  7796. if (ReqCertFromX509(cert, x509) != WOLFSSL_SUCCESS) {
  7797. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  7798. return WOLFSSL_FAILURE;
  7799. }
  7800. }
  7801. else
  7802. #endif
  7803. {
  7804. /* Create a Cert that has the certificate fields. */
  7805. if (CertFromX509(cert, x509) != WOLFSSL_SUCCESS) {
  7806. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  7807. return WOLFSSL_FAILURE;
  7808. }
  7809. }
  7810. /* Create a public key object from requests public key. */
  7811. #ifndef NO_RSA
  7812. if (x509->pubKeyOID == RSAk) {
  7813. rsa = (RsaKey*)XMALLOC(sizeof(RsaKey), NULL, DYNAMIC_TYPE_RSA);
  7814. if (rsa == NULL) {
  7815. WOLFSSL_MSG("Failed to allocate memory for RsaKey");
  7816. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  7817. return WOLFSSL_FAILURE;
  7818. }
  7819. type = RSA_TYPE;
  7820. ret = wc_InitRsaKey(rsa, x509->heap);
  7821. if (ret != 0) {
  7822. XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
  7823. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  7824. return ret;
  7825. }
  7826. ret = wc_RsaPublicKeyDecode(x509->pubKey.buffer, &idx, rsa,
  7827. x509->pubKey.length);
  7828. if (ret != 0) {
  7829. wc_FreeRsaKey(rsa);
  7830. XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
  7831. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  7832. return ret;
  7833. }
  7834. key = (void*)rsa;
  7835. }
  7836. #endif
  7837. #ifdef HAVE_ECC
  7838. if (x509->pubKeyOID == ECDSAk) {
  7839. ecc = (ecc_key*)XMALLOC(sizeof(ecc_key), NULL, DYNAMIC_TYPE_ECC);
  7840. if (ecc == NULL) {
  7841. WOLFSSL_MSG("Failed to allocate memory for ecc_key");
  7842. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  7843. return WOLFSSL_FAILURE;
  7844. }
  7845. type = ECC_TYPE;
  7846. ret = wc_ecc_init(ecc);
  7847. if (ret != 0) {
  7848. XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
  7849. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  7850. return ret;
  7851. }
  7852. ret = wc_EccPublicKeyDecode(x509->pubKey.buffer, &idx, ecc,
  7853. x509->pubKey.length);
  7854. if (ret != 0) {
  7855. wc_ecc_free(ecc);
  7856. XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
  7857. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  7858. return ret;
  7859. }
  7860. key = (void*)ecc;
  7861. }
  7862. #endif
  7863. #ifndef NO_DSA
  7864. if (x509->pubKeyOID == DSAk) {
  7865. dsa = (DsaKey*)XMALLOC(sizeof(DsaKey), NULL, DYNAMIC_TYPE_DSA);
  7866. if (dsa == NULL) {
  7867. WOLFSSL_MSG("Failed to allocate memory for DsaKey");
  7868. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  7869. return WOLFSSL_FAILURE;
  7870. }
  7871. type = DSA_TYPE;
  7872. ret = wc_InitDsaKey(dsa);
  7873. if (ret != 0) {
  7874. XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
  7875. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  7876. return ret;
  7877. }
  7878. ret = wc_DsaPublicKeyDecode(x509->pubKey.buffer, &idx, dsa,
  7879. x509->pubKey.length);
  7880. if (ret != 0) {
  7881. wc_FreeDsaKey(dsa);
  7882. XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
  7883. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  7884. return ret;
  7885. }
  7886. key = (void*)dsa;
  7887. }
  7888. #endif
  7889. if (key == NULL) {
  7890. WOLFSSL_MSG("No public key found for certificate");
  7891. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  7892. return WOLFSSL_FAILURE;
  7893. }
  7894. /* Make the body of the certificate request. */
  7895. #ifdef WOLFSSL_CERT_REQ
  7896. if (req) {
  7897. ret = wc_MakeCertReq_ex(cert, der, *derSz, type, key);
  7898. }
  7899. else
  7900. #endif
  7901. {
  7902. ret = wc_InitRng(&rng);
  7903. if (ret != 0) {
  7904. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  7905. return WOLFSSL_FAILURE;
  7906. }
  7907. ret = wc_MakeCert_ex(cert, der, *derSz, type, key, &rng);
  7908. wc_FreeRng(&rng);
  7909. }
  7910. if (ret <= 0) {
  7911. ret = WOLFSSL_FAILURE;
  7912. goto cleanup;
  7913. }
  7914. if ((x509->serialSz == 0) &&
  7915. (cert->serialSz <= EXTERNAL_SERIAL_SIZE) &&
  7916. (cert->serialSz > 0)) {
  7917. #if defined(OPENSSL_EXTRA)
  7918. WOLFSSL_ASN1_INTEGER *i = wolfSSL_ASN1_INTEGER_new();
  7919. if (i == NULL) {
  7920. WOLFSSL_MSG("wolfSSL_ASN1_INTEGER_new error");
  7921. ret = WOLFSSL_FAILURE;
  7922. goto cleanup;
  7923. }
  7924. else {
  7925. i->length = cert->serialSz + 2;
  7926. i->data[0] = ASN_INTEGER;
  7927. i->data[1] = (unsigned char)cert->serialSz;
  7928. XMEMCPY(i->data + 2, cert->serial, cert->serialSz);
  7929. if (wolfSSL_X509_set_serialNumber(x509, i) != WOLFSSL_SUCCESS) {
  7930. WOLFSSL_MSG("Issue setting generated serial number");
  7931. wolfSSL_ASN1_INTEGER_free(i);
  7932. ret = WOLFSSL_FAILURE;
  7933. goto cleanup;
  7934. }
  7935. wolfSSL_ASN1_INTEGER_free(i);
  7936. }
  7937. #else
  7938. WOLFSSL_MSG("ASN1_INTEGER API not in build");
  7939. ret = WOLFSSL_FAILURE;
  7940. goto cleanup;
  7941. #endif /* OPENSSL_EXTRA */
  7942. }
  7943. if (includeSig) {
  7944. if (!x509->sig.buffer) {
  7945. WOLFSSL_MSG("No signature buffer");
  7946. ret = WOLFSSL_FAILURE;
  7947. goto cleanup;
  7948. }
  7949. totalLen = AddSignature(NULL, ret, NULL, x509->sig.length,
  7950. x509->sigOID);
  7951. if (totalLen > *derSz) {
  7952. WOLFSSL_MSG("Output der buffer too short");
  7953. ret = WOLFSSL_FAILURE;
  7954. goto cleanup;
  7955. }
  7956. ret = AddSignature(der, ret, x509->sig.buffer,
  7957. x509->sig.length, x509->sigOID);
  7958. }
  7959. *derSz = ret;
  7960. ret = WOLFSSL_SUCCESS;
  7961. cleanup:
  7962. /* Dispose of the public key object. */
  7963. #ifndef NO_RSA
  7964. if (x509->pubKeyOID == RSAk) {
  7965. wc_FreeRsaKey(rsa);
  7966. XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
  7967. }
  7968. #endif
  7969. #ifdef HAVE_ECC
  7970. if (x509->pubKeyOID == ECDSAk) {
  7971. wc_ecc_free(ecc);
  7972. XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
  7973. }
  7974. #endif
  7975. #ifndef NO_DSA
  7976. if (x509->pubKeyOID == DSAk) {
  7977. wc_FreeDsaKey(dsa);
  7978. XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
  7979. }
  7980. #endif
  7981. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  7982. return ret;
  7983. }
  7984. /* signs a der buffer for the WOLFSSL_X509 structure using the PKEY and MD
  7985. * hash passed in
  7986. *
  7987. * WARNING: this free's and replaces the existing DER buffer in the
  7988. * WOLFSSL_X509 with the newly signed buffer.
  7989. * returns size of signed buffer on success and negative values on fail
  7990. */
  7991. static int wolfSSL_X509_resign_cert(WOLFSSL_X509* x509, int req,
  7992. unsigned char* der, int derSz, int certBodySz, WOLFSSL_EVP_MD* md,
  7993. WOLFSSL_EVP_PKEY* pkey)
  7994. {
  7995. int ret;
  7996. void* key = NULL;
  7997. int type = -1;
  7998. int sigType;
  7999. WC_RNG rng;
  8000. (void)req;
  8001. WOLFSSL_ENTER("wolfSSL_X509_resign_cert");
  8002. sigType = wolfSSL_sigTypeFromPKEY(md, pkey);
  8003. if (sigType == WOLFSSL_FAILURE) {
  8004. WOLFSSL_MSG("Error getting signature type from pkey");
  8005. return WOLFSSL_FATAL_ERROR;
  8006. }
  8007. /* Get the private key object and type from pkey. */
  8008. #ifndef NO_RSA
  8009. if (pkey->type == EVP_PKEY_RSA) {
  8010. type = RSA_TYPE;
  8011. key = pkey->rsa->internal;
  8012. }
  8013. #endif
  8014. #ifdef HAVE_ECC
  8015. if (pkey->type == EVP_PKEY_EC) {
  8016. type = ECC_TYPE;
  8017. key = pkey->ecc->internal;
  8018. }
  8019. #endif
  8020. /* Sign the certificate (request) body. */
  8021. ret = wc_InitRng(&rng);
  8022. if (ret != 0)
  8023. return ret;
  8024. ret = wc_SignCert_ex(certBodySz, sigType, der, derSz, type, key, &rng);
  8025. wc_FreeRng(&rng);
  8026. if (ret < 0) {
  8027. WOLFSSL_LEAVE("wolfSSL_X509_resign_cert", ret);
  8028. return ret;
  8029. }
  8030. derSz = ret;
  8031. /* Extract signature from buffer */
  8032. {
  8033. word32 idx = 0;
  8034. int len = 0;
  8035. /* Read top level sequence */
  8036. if (GetSequence(der, &idx, &len, derSz) < 0) {
  8037. WOLFSSL_MSG("GetSequence error");
  8038. return WOLFSSL_FATAL_ERROR;
  8039. }
  8040. /* Move idx to signature */
  8041. idx += certBodySz;
  8042. /* Read signature algo sequence */
  8043. if (GetSequence(der, &idx, &len, derSz) < 0) {
  8044. WOLFSSL_MSG("GetSequence error");
  8045. return WOLFSSL_FATAL_ERROR;
  8046. }
  8047. idx += len;
  8048. /* Read signature bit string */
  8049. if (CheckBitString(der, &idx, &len, derSz, 0, NULL) != 0) {
  8050. WOLFSSL_MSG("CheckBitString error");
  8051. return WOLFSSL_FATAL_ERROR;
  8052. }
  8053. /* Sanity check */
  8054. if (idx + len != (word32)derSz) {
  8055. WOLFSSL_MSG("unexpected asn1 structure");
  8056. return WOLFSSL_FATAL_ERROR;
  8057. }
  8058. x509->sig.length = 0;
  8059. if (x509->sig.buffer)
  8060. XFREE(x509->sig.buffer, x509->heap, DYNAMIC_TYPE_SIGNATURE);
  8061. x509->sig.buffer = (byte*)XMALLOC(len, x509->heap,
  8062. DYNAMIC_TYPE_SIGNATURE);
  8063. if (!x509->sig.buffer) {
  8064. WOLFSSL_MSG("malloc error");
  8065. return WOLFSSL_FATAL_ERROR;
  8066. }
  8067. XMEMCPY(x509->sig.buffer, der + idx, len);
  8068. x509->sig.length = len;
  8069. }
  8070. /* Put in the new certificate encoding into the x509 object. */
  8071. FreeDer(&x509->derCert);
  8072. type = CERT_TYPE;
  8073. #ifdef WOLFSSL_CERT_REQ
  8074. if (req) {
  8075. type = CERTREQ_TYPE;
  8076. }
  8077. #endif
  8078. if (AllocDer(&x509->derCert, derSz, type, NULL) != 0)
  8079. return WOLFSSL_FATAL_ERROR;
  8080. XMEMCPY(x509->derCert->buffer, der, derSz);
  8081. x509->derCert->length = derSz;
  8082. return ret;
  8083. }
  8084. #ifndef WC_MAX_X509_GEN
  8085. /* able to override max size until dynamic buffer created */
  8086. #define WC_MAX_X509_GEN 4096
  8087. #endif
  8088. /* returns the size of signature on success */
  8089. int wolfSSL_X509_sign(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey,
  8090. const WOLFSSL_EVP_MD* md)
  8091. {
  8092. int ret;
  8093. /* @TODO dynamic set based on expected cert size */
  8094. byte *der = (byte *)XMALLOC(WC_MAX_X509_GEN, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  8095. int derSz = WC_MAX_X509_GEN;
  8096. WOLFSSL_ENTER("wolfSSL_X509_sign");
  8097. if (x509 == NULL || pkey == NULL || md == NULL) {
  8098. ret = WOLFSSL_FAILURE;
  8099. goto out;
  8100. }
  8101. x509->sigOID = wolfSSL_sigTypeFromPKEY((WOLFSSL_EVP_MD*)md, pkey);
  8102. if ((ret = wolfssl_x509_make_der(x509, 0, der, &derSz, 0)) !=
  8103. WOLFSSL_SUCCESS) {
  8104. WOLFSSL_MSG("Unable to make DER for X509");
  8105. WOLFSSL_LEAVE("wolfSSL_X509_sign", ret);
  8106. (void)ret;
  8107. ret = WOLFSSL_FAILURE;
  8108. goto out;
  8109. }
  8110. ret = wolfSSL_X509_resign_cert(x509, 0, der, WC_MAX_X509_GEN, derSz,
  8111. (WOLFSSL_EVP_MD*)md, pkey);
  8112. if (ret <= 0) {
  8113. WOLFSSL_LEAVE("wolfSSL_X509_sign", ret);
  8114. ret = WOLFSSL_FAILURE;
  8115. goto out;
  8116. }
  8117. out:
  8118. if (der)
  8119. XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  8120. return ret;
  8121. }
  8122. #if defined(OPENSSL_EXTRA)
  8123. int wolfSSL_X509_sign_ctx(WOLFSSL_X509 *x509, WOLFSSL_EVP_MD_CTX *ctx)
  8124. {
  8125. WOLFSSL_ENTER("wolfSSL_X509_sign_ctx");
  8126. if (!x509 || !ctx || !ctx->pctx || !ctx->pctx->pkey) {
  8127. WOLFSSL_MSG("Bad parameter");
  8128. return WOLFSSL_FAILURE;
  8129. }
  8130. return wolfSSL_X509_sign(x509, ctx->pctx->pkey, wolfSSL_EVP_MD_CTX_md(ctx));
  8131. }
  8132. #endif /* OPENSSL_EXTRA */
  8133. #endif /* WOLFSSL_CERT_GEN */
  8134. #if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
  8135. defined(OPENSSL_EXTRA_X509_SMALL) || defined(WOLFSSL_WPAS_SMALL)
  8136. /* Converts from NID_* value to wolfSSL value if needed.
  8137. *
  8138. * @param [in] nid Numeric Id of a domain name component.
  8139. * @return Domain name tag values - wolfSSL internal values.
  8140. * @return -1 when nid isn't known.
  8141. */
  8142. static int ConvertNIDToWolfSSL(int nid)
  8143. {
  8144. switch (nid) {
  8145. case NID_commonName : return ASN_COMMON_NAME;
  8146. case NID_surname : return ASN_SUR_NAME;
  8147. case NID_countryName: return ASN_COUNTRY_NAME;
  8148. case NID_localityName: return ASN_LOCALITY_NAME;
  8149. case NID_stateOrProvinceName: return ASN_STATE_NAME;
  8150. case NID_streetAddress: return ASN_STREET_ADDR;
  8151. case NID_organizationName: return ASN_ORG_NAME;
  8152. case NID_organizationalUnitName: return ASN_ORGUNIT_NAME;
  8153. case NID_emailAddress: return ASN_EMAIL_NAME;
  8154. case NID_serialNumber: return ASN_SERIAL_NUMBER;
  8155. case NID_userId: return ASN_USER_ID;
  8156. case NID_businessCategory: return ASN_BUS_CAT;
  8157. case NID_domainComponent: return ASN_DOMAIN_COMPONENT;
  8158. case NID_postalCode: return ASN_POSTAL_CODE;
  8159. default:
  8160. WOLFSSL_MSG("Attribute NID not found");
  8161. return -1;
  8162. }
  8163. }
  8164. #endif /* OPENSSL_ALL || OPENSSL_EXTRA ||
  8165. OPENSSL_EXTRA_X509_SMALL || WOLFSSL_WPAS_SMALL*/
  8166. #if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  8167. /* This is to convert the x509 name structure into canonical DER format */
  8168. /* , which has the following rules: */
  8169. /* convert to UTF8 */
  8170. /* convert to lower case */
  8171. /* multi-spaces collapsed */
  8172. /* leading SEQUENCE header is skipped */
  8173. /* @param name a pointer to X509_NAME that is to be converted */
  8174. /* @param out a pointer to converted data */
  8175. /* @return a number of converted bytes, otherwise <=0 error code */
  8176. int wolfSSL_i2d_X509_NAME_canon(WOLFSSL_X509_NAME* name, unsigned char** out)
  8177. {
  8178. int totalBytes = 0, i, idx;
  8179. byte *output, *local = NULL;
  8180. #ifdef WOLFSSL_SMALL_STACK
  8181. EncodedName* names = NULL;
  8182. #else
  8183. EncodedName names[MAX_NAME_ENTRIES];
  8184. #endif
  8185. if (name == NULL)
  8186. return BAD_FUNC_ARG;
  8187. #ifdef WOLFSSL_SMALL_STACK
  8188. names = (EncodedName*)XMALLOC(sizeof(EncodedName) * MAX_NAME_ENTRIES, NULL,
  8189. DYNAMIC_TYPE_TMP_BUFFER);
  8190. if (names == NULL)
  8191. return MEMORY_E;
  8192. #endif
  8193. XMEMSET(names, 0, sizeof(EncodedName) * MAX_NAME_ENTRIES);
  8194. for (i = 0; i < MAX_NAME_ENTRIES; i++) {
  8195. WOLFSSL_X509_NAME_ENTRY* entry;
  8196. int ret;
  8197. entry = wolfSSL_X509_NAME_get_entry(name, i);
  8198. if (entry != NULL && entry->set >= 1) {
  8199. const char* nameStr;
  8200. WOLFSSL_ASN1_STRING* data;
  8201. WOLFSSL_ASN1_STRING* cano_data;
  8202. cano_data = wolfSSL_ASN1_STRING_new();
  8203. if (cano_data == NULL) {
  8204. #ifdef WOLFSSL_SMALL_STACK
  8205. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  8206. #endif
  8207. return MEMORY_E;
  8208. }
  8209. data = wolfSSL_X509_NAME_ENTRY_get_data(entry);
  8210. if (data == NULL) {
  8211. #ifdef WOLFSSL_SMALL_STACK
  8212. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  8213. #endif
  8214. wolfSSL_ASN1_STRING_free(cano_data);
  8215. WOLFSSL_MSG("Error getting entry data");
  8216. return WOLFSSL_FATAL_ERROR;
  8217. }
  8218. if (wolfSSL_ASN1_STRING_canon(cano_data, data) != WOLFSSL_SUCCESS) {
  8219. return WOLFSSL_FAILURE;
  8220. }
  8221. nameStr = (const char*)wolfSSL_ASN1_STRING_data(cano_data);
  8222. ret = wc_EncodeNameCanonical(&names[i], nameStr, CTC_UTF8,
  8223. (byte)ConvertNIDToWolfSSL(entry->nid));
  8224. if (ret < 0) {
  8225. #ifdef WOLFSSL_SMALL_STACK
  8226. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  8227. #endif
  8228. wolfSSL_ASN1_STRING_free(cano_data);
  8229. WOLFSSL_MSG("EncodeName failed");
  8230. return WOLFSSL_FATAL_ERROR;
  8231. }
  8232. totalBytes += ret;
  8233. wolfSSL_OPENSSL_free(cano_data->data);
  8234. wolfSSL_ASN1_STRING_free(cano_data);
  8235. }
  8236. }
  8237. if (out == NULL) {
  8238. /* If out is NULL, caller just wants length. */
  8239. #ifdef WOLFSSL_SMALL_STACK
  8240. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  8241. #endif
  8242. return totalBytes;
  8243. }
  8244. /* skip header */
  8245. /* check if using buffer passed in */
  8246. if (*out == NULL) {
  8247. *out = local = (unsigned char*)XMALLOC(totalBytes, NULL,
  8248. DYNAMIC_TYPE_OPENSSL);
  8249. if (*out == NULL) {
  8250. return MEMORY_E;
  8251. }
  8252. }
  8253. output = *out;
  8254. idx = 0;
  8255. for (i = 0; i < MAX_NAME_ENTRIES; i++) {
  8256. if (names[i].used) {
  8257. XMEMCPY(output + idx, names[i].encoded, names[i].totalLen);
  8258. idx += names[i].totalLen;
  8259. }
  8260. }
  8261. #ifdef WOLFSSL_SMALL_STACK
  8262. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  8263. #endif
  8264. /* used existing buffer passed in, so increment pointer */
  8265. if (local == NULL) {
  8266. *out += totalBytes;
  8267. }
  8268. return totalBytes;
  8269. }
  8270. #endif /* OPENSSL_ALL || OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
  8271. #ifdef WOLFSSL_CERT_GEN
  8272. /* Guarded by either
  8273. * A) WOLFSSL_WPAS_SMALL is on or
  8274. * B) (OPENSSL_EXTRA or OPENSSL_EXTRA_X509_SMALL) + WOLFSSL_CERT_GEN +
  8275. * (WOLFSSL_CERT_REQ or WOLFSSL_CERT_EXT or OPENSSL_EXTRA) has been
  8276. * defined
  8277. */
  8278. #if defined(WOLFSSL_WPAS_SMALL) || \
  8279. (defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)) && \
  8280. defined(WOLFSSL_CERT_GEN) && \
  8281. (defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_EXT) || \
  8282. defined(OPENSSL_EXTRA))
  8283. /* Converts the x509 name structure into DER format.
  8284. *
  8285. * out pointer to either a pre setup buffer or a pointer to null for
  8286. * creating a dynamic buffer. In the case that a pre-existing buffer is
  8287. * used out will be incremented the size of the DER buffer on success. If
  8288. * out is NULL, the function returns the necessary output buffer length.
  8289. *
  8290. * returns the size of the buffer on success, or negative value with failure
  8291. */
  8292. int wolfSSL_i2d_X509_NAME(WOLFSSL_X509_NAME* name, unsigned char** out)
  8293. {
  8294. int totalBytes = 0, i, idx;
  8295. byte temp[MAX_SEQ_SZ];
  8296. byte *output, *local = NULL;
  8297. #ifdef WOLFSSL_SMALL_STACK
  8298. EncodedName* names = NULL;
  8299. #else
  8300. EncodedName names[MAX_NAME_ENTRIES];
  8301. #endif
  8302. if (name == NULL)
  8303. return BAD_FUNC_ARG;
  8304. #ifdef WOLFSSL_SMALL_STACK
  8305. names = (EncodedName*)XMALLOC(sizeof(EncodedName) * MAX_NAME_ENTRIES, NULL,
  8306. DYNAMIC_TYPE_TMP_BUFFER);
  8307. if (names == NULL)
  8308. return MEMORY_E;
  8309. #endif
  8310. XMEMSET(names, 0, sizeof(EncodedName) * MAX_NAME_ENTRIES);
  8311. for (i = 0; i < MAX_NAME_ENTRIES; i++) {
  8312. WOLFSSL_X509_NAME_ENTRY* entry;
  8313. int ret;
  8314. entry = wolfSSL_X509_NAME_get_entry(name, i);
  8315. if (entry != NULL && entry->set >= 1) {
  8316. const char* nameStr;
  8317. int type;
  8318. WOLFSSL_ASN1_STRING* data;
  8319. data = wolfSSL_X509_NAME_ENTRY_get_data(entry);
  8320. if (data == NULL) {
  8321. #ifdef WOLFSSL_SMALL_STACK
  8322. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  8323. #endif
  8324. WOLFSSL_MSG("Error getting entry data");
  8325. return WOLFSSL_FATAL_ERROR;
  8326. }
  8327. nameStr = (const char*)wolfSSL_ASN1_STRING_data(data);
  8328. type = wolfSSL_ASN1_STRING_type(data);
  8329. switch (type) {
  8330. case MBSTRING_UTF8:
  8331. type = CTC_UTF8;
  8332. break;
  8333. case V_ASN1_PRINTABLESTRING:
  8334. type = CTC_PRINTABLE;
  8335. break;
  8336. default:
  8337. WOLFSSL_MSG("Unknown encoding type conversion UTF8 by default");
  8338. type = CTC_UTF8;
  8339. }
  8340. ret = wc_EncodeName(&names[i], nameStr, (char)type,
  8341. (byte)ConvertNIDToWolfSSL(entry->nid));
  8342. if (ret < 0) {
  8343. #ifdef WOLFSSL_SMALL_STACK
  8344. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  8345. #endif
  8346. WOLFSSL_MSG("EncodeName failed");
  8347. return WOLFSSL_FATAL_ERROR;
  8348. }
  8349. totalBytes += ret;
  8350. }
  8351. }
  8352. /* header */
  8353. idx = SetSequence(totalBytes, temp);
  8354. if (totalBytes + idx > ASN_NAME_MAX) {
  8355. #ifdef WOLFSSL_SMALL_STACK
  8356. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  8357. #endif
  8358. WOLFSSL_MSG("Total Bytes is greater than ASN_NAME_MAX");
  8359. return BUFFER_E;
  8360. }
  8361. if (out == NULL) {
  8362. /* If out is NULL, caller just wants length. */
  8363. totalBytes += idx;
  8364. #ifdef WOLFSSL_SMALL_STACK
  8365. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  8366. #endif
  8367. return totalBytes;
  8368. }
  8369. /* check if using buffer passed in */
  8370. if (*out == NULL) {
  8371. *out = local = (unsigned char*)XMALLOC(totalBytes + idx, name->heap,
  8372. DYNAMIC_TYPE_OPENSSL);
  8373. if (*out == NULL) {
  8374. return MEMORY_E;
  8375. }
  8376. }
  8377. output = *out;
  8378. idx = SetSequence(totalBytes, output);
  8379. totalBytes += idx;
  8380. for (i = 0; i < MAX_NAME_ENTRIES; i++) {
  8381. if (names[i].used) {
  8382. XMEMCPY(output + idx, names[i].encoded, names[i].totalLen);
  8383. idx += names[i].totalLen;
  8384. }
  8385. }
  8386. #ifdef WOLFSSL_SMALL_STACK
  8387. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  8388. #endif
  8389. /* used existing buffer passed in, so increment pointer */
  8390. if (local == NULL) {
  8391. *out += totalBytes;
  8392. }
  8393. return totalBytes;
  8394. }
  8395. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  8396. #endif /* WOLFSSL_CERT_GEN */
  8397. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL) || \
  8398. defined (WOLFSSL_WPAS_SMALL)
  8399. WOLFSSL_X509_NAME *wolfSSL_d2i_X509_NAME(WOLFSSL_X509_NAME **name,
  8400. unsigned char **in, long length)
  8401. {
  8402. WOLFSSL_X509_NAME* tmp = NULL;
  8403. #ifdef WOLFSSL_SMALL_STACK
  8404. DecodedCert* cert = NULL;
  8405. #else
  8406. DecodedCert cert[1];
  8407. #endif
  8408. WOLFSSL_ENTER("wolfSSL_d2i_X509_NAME");
  8409. if (!in || !*in || length <= 0) {
  8410. WOLFSSL_MSG("Bad argument");
  8411. return NULL;
  8412. }
  8413. #ifdef WOLFSSL_SMALL_STACK
  8414. cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL,
  8415. DYNAMIC_TYPE_DCERT);
  8416. if (cert == NULL) {
  8417. return NULL;
  8418. }
  8419. #endif
  8420. /* Set the X509_NAME buffer as the input data for cert.
  8421. * in is NOT a full certificate. Just the name. */
  8422. InitDecodedCert(cert, *in, (word32)length, NULL);
  8423. /* Parse the X509 subject name */
  8424. if (GetName(cert, SUBJECT, (int)length) != 0) {
  8425. WOLFSSL_MSG("WOLFSSL_X509_NAME parse error");
  8426. goto cleanup;
  8427. }
  8428. if (!(tmp = wolfSSL_X509_NAME_new())) {
  8429. WOLFSSL_MSG("wolfSSL_X509_NAME_new error");
  8430. goto cleanup;
  8431. }
  8432. if (wolfSSL_X509_NAME_copy((WOLFSSL_X509_NAME*)cert->subjectName,
  8433. tmp) != WOLFSSL_SUCCESS) {
  8434. wolfSSL_X509_NAME_free(tmp);
  8435. tmp = NULL;
  8436. goto cleanup;
  8437. }
  8438. if (name)
  8439. *name = tmp;
  8440. cleanup:
  8441. FreeDecodedCert(cert);
  8442. #ifdef WOLFSSL_SMALL_STACK
  8443. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  8444. #endif
  8445. return tmp;
  8446. }
  8447. #endif /* OPENSSL_EXTRA || OPENSSL_ALL || WOLFSSL_WPAS_SMALL */
  8448. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL)
  8449. /* Compares the two X509 names. If the size of x is larger then y then a
  8450. * positive value is returned if x is smaller a negative value is returned.
  8451. * In the case that the sizes are equal a the value of strcmp between the
  8452. * two names is returned.
  8453. *
  8454. * x First name for comparison
  8455. * y Second name to compare with x
  8456. */
  8457. int wolfSSL_X509_NAME_cmp(const WOLFSSL_X509_NAME* x,
  8458. const WOLFSSL_X509_NAME* y)
  8459. {
  8460. const char* _x;
  8461. const char* _y;
  8462. WOLFSSL_ENTER("wolfSSL_X509_NAME_cmp");
  8463. if (x == NULL || y == NULL) {
  8464. WOLFSSL_MSG("Bad argument passed in");
  8465. return -2;
  8466. }
  8467. if (x == y) {
  8468. return 0; /* match */
  8469. }
  8470. if (x->sz != y->sz) {
  8471. return x->sz - y->sz;
  8472. }
  8473. /*
  8474. * If the name member is not set or is immediately null terminated then
  8475. * compare the staticName member
  8476. */
  8477. _x = (x->name && *x->name) ? x->name : x->staticName;
  8478. _y = (y->name && *y->name) ? y->name : y->staticName;
  8479. return XSTRNCMP(_x, _y, x->sz); /* y sz is the same */
  8480. }
  8481. #ifndef NO_BIO
  8482. static WOLFSSL_X509 *loadX509orX509REQFromPemBio(WOLFSSL_BIO *bp,
  8483. WOLFSSL_X509 **x, wc_pem_password_cb *cb, void *u, int type)
  8484. {
  8485. WOLFSSL_X509* x509 = NULL;
  8486. #if defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM)
  8487. unsigned char* pem = NULL;
  8488. int pemSz;
  8489. long i = 0, l, footerSz;
  8490. const char* footer = NULL;
  8491. WOLFSSL_ENTER("loadX509orX509REQFromPemBio");
  8492. if (bp == NULL || (type != CERT_TYPE && type != CERTREQ_TYPE)) {
  8493. WOLFSSL_LEAVE("wolfSSL_PEM_read_bio_X509", BAD_FUNC_ARG);
  8494. return NULL;
  8495. }
  8496. if ((l = wolfSSL_BIO_get_len(bp)) <= 0) {
  8497. #if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX)
  8498. /* No certificate in buffer */
  8499. WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
  8500. #endif
  8501. return NULL;
  8502. }
  8503. pemSz = (int)l;
  8504. pem = (unsigned char*)XMALLOC(pemSz, 0, DYNAMIC_TYPE_PEM);
  8505. if (pem == NULL)
  8506. return NULL;
  8507. XMEMSET(pem, 0, pemSz);
  8508. i = 0;
  8509. if (wc_PemGetHeaderFooter(type, NULL, &footer) != 0) {
  8510. XFREE(pem, 0, DYNAMIC_TYPE_PEM);
  8511. return NULL;
  8512. }
  8513. footerSz = (long)XSTRLEN(footer);
  8514. /* TODO: Inefficient
  8515. * reading in one byte at a time until see the footer
  8516. */
  8517. while ((l = wolfSSL_BIO_read(bp, (char *)&pem[i], 1)) == 1) {
  8518. i++;
  8519. if (i > footerSz && XMEMCMP((char *)&pem[i-footerSz], footer,
  8520. footerSz) == 0) {
  8521. if (wolfSSL_BIO_read(bp, (char *)&pem[i], 1) == 1) {
  8522. /* attempt to read newline following footer */
  8523. i++;
  8524. if (pem[i-1] == '\r') {
  8525. /* found \r , Windows line ending is \r\n so try to read one
  8526. * more byte for \n, ignoring return value */
  8527. (void)wolfSSL_BIO_read(bp, (char *)&pem[i++], 1);
  8528. }
  8529. }
  8530. break;
  8531. }
  8532. }
  8533. #if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX)
  8534. if (l == 0)
  8535. WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
  8536. #else
  8537. (void)l;
  8538. #endif
  8539. if (i > pemSz) {
  8540. WOLFSSL_MSG("Error parsing PEM");
  8541. }
  8542. else {
  8543. pemSz = (int)i;
  8544. #ifdef WOLFSSL_CERT_REQ
  8545. if (type == CERTREQ_TYPE)
  8546. x509 = wolfSSL_X509_REQ_load_certificate_buffer(pem, pemSz,
  8547. WOLFSSL_FILETYPE_PEM);
  8548. else
  8549. #endif
  8550. x509 = wolfSSL_X509_load_certificate_buffer(pem, pemSz,
  8551. WOLFSSL_FILETYPE_PEM);
  8552. }
  8553. if (x != NULL) {
  8554. *x = x509;
  8555. }
  8556. XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
  8557. #endif /* WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM */
  8558. (void)bp;
  8559. (void)x;
  8560. (void)cb;
  8561. (void)u;
  8562. return x509;
  8563. }
  8564. WOLFSSL_X509 *wolfSSL_PEM_read_bio_X509(WOLFSSL_BIO *bp, WOLFSSL_X509 **x,
  8565. wc_pem_password_cb *cb, void *u)
  8566. {
  8567. return loadX509orX509REQFromPemBio(bp, x, cb, u, CERT_TYPE);
  8568. }
  8569. #ifdef WOLFSSL_CERT_REQ
  8570. WOLFSSL_X509 *wolfSSL_PEM_read_bio_X509_REQ(WOLFSSL_BIO *bp, WOLFSSL_X509 **x,
  8571. wc_pem_password_cb *cb, void *u)
  8572. {
  8573. return loadX509orX509REQFromPemBio(bp, x, cb, u, CERTREQ_TYPE);
  8574. }
  8575. #ifndef NO_FILESYSTEM
  8576. WOLFSSL_X509* wolfSSL_PEM_read_X509_REQ(XFILE fp, WOLFSSL_X509** x,
  8577. wc_pem_password_cb* cb, void* u)
  8578. {
  8579. int err = 0;
  8580. WOLFSSL_X509* ret = NULL;
  8581. WOLFSSL_BIO* bio = NULL;
  8582. WOLFSSL_ENTER("wolfSSL_PEM_read_X509_REQ");
  8583. if (fp == XBADFILE) {
  8584. WOLFSSL_MSG("Invalid file.");
  8585. err = 1;
  8586. }
  8587. if (err == 0) {
  8588. bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file());
  8589. if (bio == NULL) {
  8590. WOLFSSL_MSG("Failed to create new BIO with input file.");
  8591. err = 1;
  8592. }
  8593. }
  8594. if (err == 0 && wolfSSL_BIO_set_fp(bio, fp, BIO_CLOSE)
  8595. != WOLFSSL_SUCCESS) {
  8596. WOLFSSL_MSG("Failed to set BIO file pointer.");
  8597. err = 1;
  8598. }
  8599. if (err == 0) {
  8600. ret = wolfSSL_PEM_read_bio_X509_REQ(bio, x, cb, u);
  8601. }
  8602. if (bio != NULL) {
  8603. wolfSSL_BIO_free(bio);
  8604. }
  8605. return ret;
  8606. }
  8607. #endif /* !NO_FILESYSTEM */
  8608. #endif /* WOLFSSL_CERT_REQ */
  8609. WOLFSSL_X509_CRL *wolfSSL_PEM_read_bio_X509_CRL(WOLFSSL_BIO *bp,
  8610. WOLFSSL_X509_CRL **x, wc_pem_password_cb *cb, void *u)
  8611. {
  8612. #if defined(WOLFSSL_PEM_TO_DER) && defined(HAVE_CRL)
  8613. unsigned char* pem = NULL;
  8614. int pemSz;
  8615. int derSz;
  8616. DerBuffer* der = NULL;
  8617. WOLFSSL_X509_CRL* crl = NULL;
  8618. if ((pemSz = wolfSSL_BIO_get_len(bp)) <= 0) {
  8619. goto err;
  8620. }
  8621. pem = (unsigned char*)XMALLOC(pemSz, 0, DYNAMIC_TYPE_PEM);
  8622. if (pem == NULL) {
  8623. goto err;
  8624. }
  8625. if (wolfSSL_BIO_read(bp, pem, pemSz) != pemSz) {
  8626. goto err;
  8627. }
  8628. if((PemToDer(pem, pemSz, CRL_TYPE, &der, NULL, NULL, NULL)) < 0) {
  8629. goto err;
  8630. }
  8631. derSz = der->length;
  8632. if((crl = wolfSSL_d2i_X509_CRL(x, der->buffer, derSz)) == NULL) {
  8633. goto err;
  8634. }
  8635. err:
  8636. if(pem != NULL) {
  8637. XFREE(pem, 0, DYNAMIC_TYPE_PEM);
  8638. }
  8639. if(der != NULL) {
  8640. FreeDer(&der);
  8641. }
  8642. (void)cb;
  8643. (void)u;
  8644. return crl;
  8645. #else
  8646. (void)bp;
  8647. (void)x;
  8648. (void)cb;
  8649. (void)u;
  8650. return NULL;
  8651. #endif
  8652. }
  8653. #endif /* !NO_BIO */
  8654. #if !defined(NO_FILESYSTEM)
  8655. static void* wolfSSL_PEM_read_X509_ex(XFILE fp, void **x,
  8656. wc_pem_password_cb *cb, void *u, int type)
  8657. {
  8658. unsigned char* pem = NULL;
  8659. int pemSz;
  8660. long i = 0, l;
  8661. void *newx509;
  8662. int derSz;
  8663. DerBuffer* der = NULL;
  8664. WOLFSSL_ENTER("wolfSSL_PEM_read_X509");
  8665. if (fp == XBADFILE) {
  8666. WOLFSSL_LEAVE("wolfSSL_PEM_read_X509", BAD_FUNC_ARG);
  8667. return NULL;
  8668. }
  8669. /* Read cert from file */
  8670. i = XFTELL(fp);
  8671. if (i < 0) {
  8672. WOLFSSL_LEAVE("wolfSSL_PEM_read_X509", BAD_FUNC_ARG);
  8673. return NULL;
  8674. }
  8675. if (XFSEEK(fp, 0, XSEEK_END) != 0)
  8676. return NULL;
  8677. l = XFTELL(fp);
  8678. if (l < 0)
  8679. return NULL;
  8680. if (XFSEEK(fp, i, SEEK_SET) != 0)
  8681. return NULL;
  8682. pemSz = (int)(l - i);
  8683. /* check calculated length */
  8684. if (pemSz > MAX_WOLFSSL_FILE_SIZE || pemSz < 0) {
  8685. WOLFSSL_MSG("PEM_read_X509_ex file size error");
  8686. return NULL;
  8687. }
  8688. /* allocate pem buffer */
  8689. pem = (unsigned char*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_PEM);
  8690. if (pem == NULL)
  8691. return NULL;
  8692. if ((int)XFREAD((char *)pem, 1, pemSz, fp) != pemSz)
  8693. goto err_exit;
  8694. switch (type) {
  8695. case CERT_TYPE:
  8696. newx509 = (void *)wolfSSL_X509_load_certificate_buffer(pem,
  8697. pemSz, WOLFSSL_FILETYPE_PEM);
  8698. break;
  8699. #ifdef HAVE_CRL
  8700. case CRL_TYPE:
  8701. if ((PemToDer(pem, pemSz, CRL_TYPE, &der, NULL, NULL, NULL)) < 0)
  8702. goto err_exit;
  8703. derSz = der->length;
  8704. newx509 = (void*)wolfSSL_d2i_X509_CRL((WOLFSSL_X509_CRL **)x,
  8705. (const unsigned char *)der->buffer, derSz);
  8706. if (newx509 == NULL)
  8707. goto err_exit;
  8708. FreeDer(&der);
  8709. break;
  8710. #endif
  8711. default:
  8712. goto err_exit;
  8713. }
  8714. if (x != NULL) {
  8715. *x = newx509;
  8716. }
  8717. XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
  8718. return newx509;
  8719. err_exit:
  8720. if (pem != NULL)
  8721. XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
  8722. if (der != NULL)
  8723. FreeDer(&der);
  8724. /* unused */
  8725. (void)cb;
  8726. (void)u;
  8727. (void)derSz;
  8728. return NULL;
  8729. }
  8730. WOLFSSL_API WOLFSSL_X509* wolfSSL_PEM_read_X509(XFILE fp, WOLFSSL_X509 **x,
  8731. wc_pem_password_cb *cb,
  8732. void *u)
  8733. {
  8734. return (WOLFSSL_X509* )wolfSSL_PEM_read_X509_ex(fp, (void **)x, cb, u, CERT_TYPE);
  8735. }
  8736. #if defined(HAVE_CRL)
  8737. WOLFSSL_API WOLFSSL_X509_CRL* wolfSSL_PEM_read_X509_CRL(XFILE fp, WOLFSSL_X509_CRL **crl,
  8738. wc_pem_password_cb *cb, void *u)
  8739. {
  8740. return (WOLFSSL_X509_CRL* )wolfSSL_PEM_read_X509_ex(fp, (void **)crl, cb, u, CRL_TYPE);
  8741. }
  8742. #endif
  8743. #ifdef WOLFSSL_CERT_GEN
  8744. #ifndef NO_BIO
  8745. int wolfSSL_PEM_write_X509(XFILE fp, WOLFSSL_X509* x)
  8746. {
  8747. int ret;
  8748. WOLFSSL_BIO* bio;
  8749. if (x == NULL)
  8750. return 0;
  8751. bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file());
  8752. if (bio == NULL)
  8753. return 0;
  8754. if (wolfSSL_BIO_set_fp(bio, fp, BIO_NOCLOSE) != WOLFSSL_SUCCESS) {
  8755. wolfSSL_BIO_free(bio);
  8756. bio = NULL;
  8757. }
  8758. ret = wolfSSL_PEM_write_bio_X509(bio, x);
  8759. if (bio != NULL)
  8760. wolfSSL_BIO_free(bio);
  8761. return ret;
  8762. }
  8763. #endif /* !NO_BIO */
  8764. #endif /* WOLFSSL_CERT_GEN */
  8765. #endif /* !NO_FILESYSTEM */
  8766. #endif /* OPENSSL_EXTRA || OPENSSL_ALL */
  8767. #ifdef OPENSSL_ALL
  8768. #ifndef NO_BIO
  8769. /* create and return a new WOLFSSL_X509_PKEY structure or NULL on failure */
  8770. static WOLFSSL_X509_PKEY* wolfSSL_X509_PKEY_new(void* heap)
  8771. {
  8772. WOLFSSL_X509_PKEY* ret;
  8773. ret = (WOLFSSL_X509_PKEY*)XMALLOC(sizeof(WOLFSSL_X509_PKEY), heap,
  8774. DYNAMIC_TYPE_KEY);
  8775. if (ret != NULL) {
  8776. XMEMSET(ret, 0, sizeof(WOLFSSL_X509_PKEY));
  8777. ret->heap = heap;
  8778. }
  8779. return ret;
  8780. }
  8781. #endif /* !NO_BIO */
  8782. /* free up all memory used by "xPkey" passed in */
  8783. static void wolfSSL_X509_PKEY_free(WOLFSSL_X509_PKEY* xPkey)
  8784. {
  8785. if (xPkey != NULL) {
  8786. wolfSSL_EVP_PKEY_free(xPkey->dec_pkey);
  8787. XFREE(xPkey, xPkey->heap, DYNAMIC_TYPE_KEY);
  8788. }
  8789. }
  8790. #ifndef NO_BIO
  8791. #define PEM_COMPARE_HEADER(start, end, header) \
  8792. ((end) - (start) == XSTR_SIZEOF(header) && XMEMCMP(start, header, \
  8793. XSTR_SIZEOF(header)) == 0)
  8794. /**
  8795. * This read one structure from bio and returns the read structure
  8796. * in the appropriate output parameter (x509, crl, x_pkey). The
  8797. * output parameters must be set to NULL.
  8798. * @param bio Input for reading structures
  8799. * @param cb Password callback
  8800. * @param x509 Output
  8801. * @param crl Output
  8802. * @param x_pkey Output
  8803. * @return WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE otherwise
  8804. */
  8805. static int wolfSSL_PEM_X509_X509_CRL_X509_PKEY_read_bio(
  8806. WOLFSSL_BIO* bio, wc_pem_password_cb* cb, WOLFSSL_X509** x509,
  8807. WOLFSSL_X509_CRL** crl, WOLFSSL_X509_PKEY** x_pkey)
  8808. {
  8809. #if defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM)
  8810. char* pem = NULL;
  8811. long i = pem_struct_min_sz, l;
  8812. const char* header = NULL;
  8813. const char* headerEnd = NULL;
  8814. const char* footer = NULL;
  8815. const char* footerEnd = NULL;
  8816. #ifdef HAVE_CRL
  8817. DerBuffer* der = NULL;
  8818. #endif
  8819. WOLFSSL_BIO* pemBio = NULL;
  8820. if (!bio || !x509 || *x509 || !crl || *crl || !x_pkey || *x_pkey) {
  8821. WOLFSSL_MSG("Bad input parameter or output parameters "
  8822. "not set to a NULL value.");
  8823. return WOLFSSL_FAILURE;
  8824. }
  8825. if ((l = wolfSSL_BIO_get_len(bio)) <= 0) {
  8826. /* No certificate in buffer */
  8827. WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
  8828. return WOLFSSL_FAILURE;
  8829. }
  8830. pem = (char*)XMALLOC(l, 0, DYNAMIC_TYPE_PEM);
  8831. if (pem == NULL)
  8832. return WOLFSSL_FAILURE;
  8833. if (wolfSSL_BIO_read(bio, &pem[0], pem_struct_min_sz) !=
  8834. pem_struct_min_sz) {
  8835. WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
  8836. goto err;
  8837. }
  8838. /* Read the header and footer */
  8839. while (i < l && wolfSSL_BIO_read(bio, &pem[i], 1) == 1) {
  8840. i++;
  8841. if (!header) {
  8842. header = XSTRNSTR(pem, "-----BEGIN ", (unsigned int)i);
  8843. }
  8844. else if (!headerEnd) {
  8845. headerEnd = XSTRNSTR(header + XSTR_SIZEOF("-----BEGIN "),
  8846. "-----",
  8847. (unsigned int)
  8848. (i - (header + XSTR_SIZEOF("-----BEGIN ") - pem)));
  8849. if (headerEnd) {
  8850. headerEnd += XSTR_SIZEOF("-----");
  8851. /* Read in the newline */
  8852. if (wolfSSL_BIO_read(bio, &pem[i], 1) != 1) {
  8853. WOLFSSL_MSG("wolfSSL_BIO_read error");
  8854. goto err;
  8855. }
  8856. i++;
  8857. if (*headerEnd != '\n' && *headerEnd != '\r') {
  8858. WOLFSSL_MSG("Missing newline after header");
  8859. goto err;
  8860. }
  8861. }
  8862. }
  8863. else if (!footer) {
  8864. footer = XSTRNSTR(headerEnd, "-----END ",
  8865. (unsigned int)(i - (headerEnd - pem)));
  8866. }
  8867. else if (!footerEnd) {
  8868. footerEnd = XSTRNSTR(footer + XSTR_SIZEOF("-----"),
  8869. "-----", (unsigned int)(i -
  8870. (footer + XSTR_SIZEOF("-----") - pem)));
  8871. if (footerEnd) {
  8872. footerEnd += XSTR_SIZEOF("-----");
  8873. /* Now check that footer matches header */
  8874. if ((headerEnd - (header + XSTR_SIZEOF("-----BEGIN "))) ==
  8875. (footerEnd - (footer + XSTR_SIZEOF("-----END "))) &&
  8876. XMEMCMP(header + XSTR_SIZEOF("-----BEGIN "),
  8877. footer + XSTR_SIZEOF("-----END "),
  8878. headerEnd - (header + XSTR_SIZEOF("-----BEGIN ")))
  8879. != 0) {
  8880. WOLFSSL_MSG("Header and footer don't match");
  8881. goto err;
  8882. }
  8883. /* header and footer match */
  8884. break;
  8885. }
  8886. }
  8887. }
  8888. if (!footerEnd) {
  8889. /* Only check footerEnd since it is set last */
  8890. WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
  8891. goto err;
  8892. }
  8893. else {
  8894. if (PEM_COMPARE_HEADER(header, headerEnd,
  8895. "-----BEGIN CERTIFICATE-----")) {
  8896. /* We have a certificate */
  8897. WOLFSSL_MSG("Parsing x509 cert");
  8898. *x509 = wolfSSL_X509_load_certificate_buffer(
  8899. (const unsigned char*) header,
  8900. (int)(footerEnd - header), WOLFSSL_FILETYPE_PEM);
  8901. if (!*x509) {
  8902. WOLFSSL_MSG("wolfSSL_X509_load_certificate_buffer error");
  8903. goto err;
  8904. }
  8905. }
  8906. #ifdef HAVE_CRL
  8907. else if (PEM_COMPARE_HEADER(header, headerEnd,
  8908. "-----BEGIN X509 CRL-----")) {
  8909. /* We have a crl */
  8910. WOLFSSL_MSG("Parsing crl");
  8911. if((PemToDer((const unsigned char*) header, footerEnd - header,
  8912. CRL_TYPE, &der, NULL, NULL, NULL)) < 0) {
  8913. WOLFSSL_MSG("PemToDer error");
  8914. goto err;
  8915. }
  8916. *crl = wolfSSL_d2i_X509_CRL(NULL, der->buffer, der->length);
  8917. if (!*crl) {
  8918. WOLFSSL_MSG("wolfSSL_d2i_X509_CRL error");
  8919. goto err;
  8920. }
  8921. }
  8922. #endif
  8923. else {
  8924. WOLFSSL_MSG("Parsing x509 key");
  8925. if (!(*x_pkey = wolfSSL_X509_PKEY_new(NULL))) {
  8926. WOLFSSL_MSG("wolfSSL_X509_PKEY_new error");
  8927. goto err;
  8928. }
  8929. if (!(pemBio = wolfSSL_BIO_new(wolfSSL_BIO_s_mem()))) {
  8930. WOLFSSL_MSG("wolfSSL_BIO_new error");
  8931. goto err;
  8932. }
  8933. if (wolfSSL_BIO_write(pemBio, header,
  8934. (int)(footerEnd - header)) != footerEnd - header) {
  8935. WOLFSSL_MSG("wolfSSL_BIO_new error");
  8936. goto err;
  8937. }
  8938. if (wolfSSL_PEM_read_bio_PrivateKey(pemBio,
  8939. &(*x_pkey)->dec_pkey, cb, NULL) == NULL) {
  8940. WOLFSSL_MSG("wolfSSL_PEM_read_bio_PrivateKey error");
  8941. goto err;
  8942. }
  8943. wolfSSL_BIO_free(pemBio);
  8944. }
  8945. }
  8946. XFREE(pem, 0, DYNAMIC_TYPE_PEM);
  8947. #ifdef HAVE_CRL
  8948. if (der)
  8949. FreeDer(&der);
  8950. #endif
  8951. return WOLFSSL_SUCCESS;
  8952. err:
  8953. if (pem)
  8954. XFREE(pem, 0, DYNAMIC_TYPE_PEM);
  8955. #ifdef HAVE_CRL
  8956. if (der)
  8957. FreeDer(&der);
  8958. #endif
  8959. if (*x_pkey) {
  8960. wolfSSL_X509_PKEY_free(*x_pkey);
  8961. *x_pkey = NULL;
  8962. }
  8963. if (pemBio)
  8964. wolfSSL_BIO_free(pemBio);
  8965. return WOLFSSL_FAILURE;
  8966. #else /* ! (WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM) */
  8967. return WOLFSSL_FAILURE;
  8968. #endif /* WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM */
  8969. }
  8970. #ifndef NO_FILESYSTEM
  8971. WOLF_STACK_OF(WOLFSSL_X509_INFO)* wolfSSL_PEM_X509_INFO_read(
  8972. XFILE fp, WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
  8973. pem_password_cb* cb, void* u)
  8974. {
  8975. WOLFSSL_BIO* fileBio = wolfSSL_BIO_new_fp(fp, BIO_NOCLOSE);
  8976. WOLF_STACK_OF(WOLFSSL_X509_INFO)* ret = NULL;
  8977. WOLFSSL_ENTER("wolfSSL_PEM_X509_INFO_read");
  8978. if (fileBio != NULL) {
  8979. ret = wolfSSL_PEM_X509_INFO_read_bio(fileBio, sk, cb, u);
  8980. wolfSSL_BIO_free(fileBio);
  8981. }
  8982. return ret;
  8983. }
  8984. #endif /* !NO_FILESYSTEM */
  8985. /*
  8986. * bio WOLFSSL_BIO to read certificates from
  8987. * sk possible stack to push more X509_INFO structs to. Can be NULL
  8988. * cb callback password for encrypted PEM certificates
  8989. * u user input such as password
  8990. *
  8991. * returns stack on success and NULL or default stack passed in on fail
  8992. */
  8993. WOLF_STACK_OF(WOLFSSL_X509_INFO)* wolfSSL_PEM_X509_INFO_read_bio(
  8994. WOLFSSL_BIO* bio, WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
  8995. wc_pem_password_cb* cb, void* u)
  8996. {
  8997. WOLF_STACK_OF(WOLFSSL_X509_INFO)* localSk = NULL;
  8998. int ret = WOLFSSL_SUCCESS;
  8999. WOLFSSL_X509_INFO* current = NULL;
  9000. WOLFSSL_X509* x509 = NULL;
  9001. WOLFSSL_X509_CRL* crl = NULL;
  9002. WOLFSSL_X509_PKEY* x_pkey = NULL;
  9003. (void)u;
  9004. WOLFSSL_ENTER("wolfSSL_PEM_X509_INFO_read_bio");
  9005. /* attempt to use passed in stack or create a new one */
  9006. if (sk != NULL) {
  9007. localSk = sk;
  9008. }
  9009. else {
  9010. localSk = wolfSSL_sk_X509_INFO_new_null();
  9011. }
  9012. if (localSk == NULL) {
  9013. WOLFSSL_LEAVE("wolfSSL_PEM_X509_INFO_read_bio",
  9014. MEMORY_E);
  9015. return NULL;
  9016. }
  9017. /* parse through BIO and push new info's found onto stack */
  9018. while (1) {
  9019. x509 = NULL;
  9020. crl = NULL;
  9021. x_pkey = NULL;
  9022. if (wolfSSL_PEM_X509_X509_CRL_X509_PKEY_read_bio(bio, cb,
  9023. &x509, &crl, &x_pkey) == WOLFSSL_SUCCESS) {
  9024. if (current == NULL ||
  9025. (x509 && current->x509) ||
  9026. (crl && current->crl) ||
  9027. (x_pkey && current->x_pkey)) {
  9028. /* Need to create new current since existing one already
  9029. * has the member filled or this is the first successful
  9030. * read. */
  9031. current = wolfSSL_X509_INFO_new();
  9032. if (current == NULL) {
  9033. ret = MEMORY_E;
  9034. break;
  9035. }
  9036. if (wolfSSL_sk_X509_INFO_push(localSk, current) !=
  9037. WOLFSSL_SUCCESS) {
  9038. wolfSSL_X509_INFO_free(current);
  9039. current = NULL;
  9040. ret = WOLFSSL_FAILURE;
  9041. break;
  9042. }
  9043. }
  9044. if (x509) {
  9045. current->x509 = x509;
  9046. }
  9047. else if (crl) {
  9048. current->crl = crl;
  9049. }
  9050. else if (x_pkey) {
  9051. current->x_pkey = x_pkey;
  9052. }
  9053. else {
  9054. WOLFSSL_MSG("No output parameters set");
  9055. ret = WOLFSSL_FAILURE;
  9056. break;
  9057. }
  9058. }
  9059. else {
  9060. #ifdef WOLFSSL_HAVE_ERROR_QUEUE
  9061. unsigned long err;
  9062. CLEAR_ASN_NO_PEM_HEADER_ERROR(err);
  9063. if (ERR_GET_LIB(err) != ERR_LIB_PEM ||
  9064. ERR_GET_REASON(err) != PEM_R_NO_START_LINE) {
  9065. ret = WOLFSSL_FAILURE;
  9066. }
  9067. #else
  9068. if (wolfSSL_sk_X509_INFO_num(localSk) > 0) {
  9069. WOLFSSL_MSG("At least one X509_INFO object on stack."
  9070. "Assuming error means EOF or no more PEM"
  9071. "headers found.");
  9072. }
  9073. else {
  9074. ret = WOLFSSL_FAILURE;
  9075. }
  9076. #endif
  9077. break;
  9078. }
  9079. }
  9080. if (ret != WOLFSSL_SUCCESS ||
  9081. wolfSSL_sk_X509_INFO_num(localSk) == 0) {
  9082. /* current should always be pushed onto the localsk stack at this
  9083. * point. The only case when it isn't is when
  9084. * wolfSSL_sk_X509_INFO_push fails but in that case the current
  9085. * free is handled inside the loop. */
  9086. if (localSk != sk) {
  9087. wolfSSL_sk_pop_free(localSk, NULL);
  9088. }
  9089. wolfSSL_X509_free(x509);
  9090. #ifdef HAVE_CRL
  9091. wolfSSL_X509_CRL_free(crl);
  9092. #endif
  9093. wolfSSL_X509_PKEY_free(x_pkey);
  9094. localSk = NULL;
  9095. }
  9096. WOLFSSL_LEAVE("wolfSSL_PEM_X509_INFO_read_bio", ret);
  9097. return localSk;
  9098. }
  9099. #endif /* !NO_BIO */
  9100. #endif /* OPENSSL_ALL */
  9101. void wolfSSL_X509_NAME_ENTRY_free(WOLFSSL_X509_NAME_ENTRY* ne)
  9102. {
  9103. WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_free");
  9104. if (ne != NULL) {
  9105. wolfSSL_ASN1_OBJECT_free(ne->object);
  9106. if (ne->value != NULL) {
  9107. wolfSSL_ASN1_STRING_free(ne->value);
  9108. }
  9109. XFREE(ne, NULL, DYNAMIC_TYPE_NAME_ENTRY);
  9110. }
  9111. }
  9112. WOLFSSL_X509_NAME_ENTRY* wolfSSL_X509_NAME_ENTRY_new(void)
  9113. {
  9114. WOLFSSL_X509_NAME_ENTRY* ne;
  9115. ne = (WOLFSSL_X509_NAME_ENTRY*)XMALLOC(sizeof(WOLFSSL_X509_NAME_ENTRY),
  9116. NULL, DYNAMIC_TYPE_NAME_ENTRY);
  9117. if (ne != NULL) {
  9118. XMEMSET(ne, 0, sizeof(WOLFSSL_X509_NAME_ENTRY));
  9119. }
  9120. return ne;
  9121. }
  9122. /* Create a new WOLFSSL_X509_NAME_ENTRY structure based on the text passed
  9123. * in. Returns NULL on failure */
  9124. WOLFSSL_X509_NAME_ENTRY* wolfSSL_X509_NAME_ENTRY_create_by_txt(
  9125. WOLFSSL_X509_NAME_ENTRY **neIn, const char *txt, int type,
  9126. const unsigned char *data, int dataSz)
  9127. {
  9128. int nid = -1;
  9129. WOLFSSL_X509_NAME_ENTRY* ne = NULL;
  9130. WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_create_by_txt()");
  9131. if (txt == NULL) {
  9132. return NULL;
  9133. }
  9134. if (neIn != NULL) {
  9135. ne = *neIn;
  9136. }
  9137. nid = wolfSSL_OBJ_txt2nid(txt);
  9138. if (nid == NID_undef) {
  9139. WOLFSSL_MSG("Unable to find text");
  9140. ne = NULL;
  9141. }
  9142. else {
  9143. if (ne == NULL) {
  9144. ne = wolfSSL_X509_NAME_ENTRY_new();
  9145. if (ne == NULL) {
  9146. return NULL;
  9147. }
  9148. }
  9149. ne->nid = nid;
  9150. ne->object = wolfSSL_OBJ_nid2obj_ex(nid, ne->object);
  9151. ne->value = wolfSSL_ASN1_STRING_type_new(type);
  9152. if (ne->value != NULL) {
  9153. if (wolfSSL_ASN1_STRING_set(ne->value, (const void*)data,
  9154. dataSz) == WOLFSSL_SUCCESS) {
  9155. ne->set = 1;
  9156. }
  9157. }
  9158. }
  9159. return ne;
  9160. }
  9161. /* Creates a new entry given the NID, type, and data
  9162. * "dataSz" is number of bytes in data, if set to -1 then XSTRLEN is used
  9163. * "out" can be used to store the new entry data in an existing structure
  9164. * if NULL then a new WOLFSSL_X509_NAME_ENTRY structure is created
  9165. * returns a pointer to WOLFSSL_X509_NAME_ENTRY on success and NULL on fail
  9166. */
  9167. WOLFSSL_X509_NAME_ENTRY* wolfSSL_X509_NAME_ENTRY_create_by_NID(
  9168. WOLFSSL_X509_NAME_ENTRY** out, int nid, int type,
  9169. const unsigned char* data, int dataSz)
  9170. {
  9171. WOLFSSL_X509_NAME_ENTRY* ne;
  9172. #ifdef WOLFSSL_DEBUG_OPENSSL
  9173. WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_create_by_NID()");
  9174. #endif
  9175. if (!data) {
  9176. WOLFSSL_MSG("Bad parameter");
  9177. return NULL;
  9178. }
  9179. if (out == NULL || *out == NULL) {
  9180. ne = wolfSSL_X509_NAME_ENTRY_new();
  9181. if (ne == NULL) {
  9182. return NULL;
  9183. }
  9184. if (out != NULL) {
  9185. *out = ne;
  9186. }
  9187. }
  9188. else {
  9189. ne = *out;
  9190. }
  9191. ne->nid = nid;
  9192. ne->object = wolfSSL_OBJ_nid2obj_ex(nid, ne->object);
  9193. ne->value = wolfSSL_ASN1_STRING_type_new(type);
  9194. if (ne->value != NULL) {
  9195. if (wolfSSL_ASN1_STRING_set(ne->value, (const void*)data, dataSz)
  9196. == WOLFSSL_SUCCESS) {
  9197. ne->set = 1;
  9198. }
  9199. }
  9200. return ne;
  9201. }
  9202. /* add all entry of type "nid" to the buffer "fullName" and advance "idx"
  9203. * since number of entries is small, a brute force search is used here
  9204. * returns the number of entries added
  9205. */
  9206. static int AddAllEntry(WOLFSSL_X509_NAME* name, char* fullName,
  9207. int fullNameSz, int* idx)
  9208. {
  9209. int i;
  9210. int ret = 0;
  9211. for (i = 0; i < MAX_NAME_ENTRIES; i++) {
  9212. if (name->entry[i].set) {
  9213. WOLFSSL_X509_NAME_ENTRY* e;
  9214. WOLFSSL_ASN1_OBJECT* obj;
  9215. int sz;
  9216. unsigned char* data;
  9217. e = &name->entry[i];
  9218. obj = wolfSSL_X509_NAME_ENTRY_get_object(e);
  9219. if (obj == NULL) {
  9220. return BAD_FUNC_ARG;
  9221. }
  9222. XMEMCPY(fullName + *idx, "/", 1); *idx = *idx + 1;
  9223. sz = (int)XSTRLEN(obj->sName);
  9224. XMEMCPY(fullName + *idx, obj->sName, sz);
  9225. *idx += sz;
  9226. XMEMCPY(fullName + *idx, "=", 1); *idx = *idx + 1;
  9227. data = wolfSSL_ASN1_STRING_data(e->value);
  9228. if (data != NULL) {
  9229. sz = (int)XSTRLEN((const char*)data);
  9230. XMEMCPY(fullName + *idx, data, sz);
  9231. *idx += sz;
  9232. }
  9233. ret++;
  9234. }
  9235. }
  9236. (void)fullNameSz;
  9237. return ret;
  9238. }
  9239. /* Converts a list of entries in WOLFSSL_X509_NAME struct into a string
  9240. * returns 0 on success */
  9241. static int RebuildFullName(WOLFSSL_X509_NAME* name)
  9242. {
  9243. int totalLen = 0, i, idx, entryCount = 0;
  9244. char* fullName;
  9245. if (name == NULL)
  9246. return BAD_FUNC_ARG;
  9247. for (i = 0; i < MAX_NAME_ENTRIES; i++) {
  9248. if (name->entry[i].set) {
  9249. WOLFSSL_X509_NAME_ENTRY* e;
  9250. WOLFSSL_ASN1_OBJECT* obj;
  9251. e = &name->entry[i];
  9252. obj = wolfSSL_X509_NAME_ENTRY_get_object(e);
  9253. if (obj == NULL)
  9254. return BAD_FUNC_ARG;
  9255. totalLen += (int)XSTRLEN(obj->sName) + 2;/*+2 for '/' and '=' */
  9256. totalLen += wolfSSL_ASN1_STRING_length(e->value);
  9257. }
  9258. }
  9259. fullName = (char*)XMALLOC(totalLen + 1, name->heap, DYNAMIC_TYPE_X509);
  9260. if (fullName == NULL)
  9261. return MEMORY_E;
  9262. idx = 0;
  9263. entryCount = AddAllEntry(name, fullName, totalLen, &idx);
  9264. if (entryCount < 0) {
  9265. XFREE(fullName, name->heap, DYNAMIC_TYPE_X509);
  9266. return entryCount;
  9267. }
  9268. if (name->dynamicName) {
  9269. XFREE(name->name, name->heap, DYNAMIC_TYPE_X509);
  9270. }
  9271. fullName[idx] = '\0';
  9272. name->name = fullName;
  9273. name->dynamicName = 1;
  9274. name->sz = idx + 1; /* size includes null terminator */
  9275. name->entrySz = entryCount;
  9276. return 0;
  9277. }
  9278. /* Copies entry into name. With it being copied freeing entry becomes the
  9279. * callers responsibility.
  9280. * returns 1 for success and 0 for error */
  9281. int wolfSSL_X509_NAME_add_entry(WOLFSSL_X509_NAME* name,
  9282. WOLFSSL_X509_NAME_ENTRY* entry, int idx, int set)
  9283. {
  9284. WOLFSSL_X509_NAME_ENTRY* current = NULL;
  9285. int ret, i;
  9286. #ifdef WOLFSSL_DEBUG_OPENSSL
  9287. WOLFSSL_ENTER("wolfSSL_X509_NAME_add_entry()");
  9288. #endif
  9289. if (name == NULL || entry == NULL || entry->value == NULL) {
  9290. WOLFSSL_MSG("NULL argument passed in");
  9291. return WOLFSSL_FAILURE;
  9292. }
  9293. if (idx >= 0) {
  9294. /* place in specific index */
  9295. if (idx >= MAX_NAME_ENTRIES) {
  9296. WOLFSSL_MSG("Error index to insert entry is larger than array");
  9297. return WOLFSSL_FAILURE;
  9298. }
  9299. i = idx;
  9300. }
  9301. else {
  9302. /* iterate through and find first open spot */
  9303. for (i = 0; i < MAX_NAME_ENTRIES; i++) {
  9304. if (name->entry[i].set != 1) { /* not set so overwritten */
  9305. WOLFSSL_MSG("Found place for name entry");
  9306. break;
  9307. }
  9308. }
  9309. if (i == MAX_NAME_ENTRIES) {
  9310. WOLFSSL_MSG("No spot found for name entry");
  9311. return WOLFSSL_FAILURE;
  9312. }
  9313. }
  9314. current = &name->entry[i];
  9315. if (current->set == 0)
  9316. name->entrySz++;
  9317. if (wolfSSL_X509_NAME_ENTRY_create_by_NID(&current,
  9318. entry->nid,
  9319. wolfSSL_ASN1_STRING_type(entry->value),
  9320. wolfSSL_ASN1_STRING_data(entry->value),
  9321. wolfSSL_ASN1_STRING_length(entry->value)) != NULL)
  9322. {
  9323. ret = WOLFSSL_SUCCESS;
  9324. #ifdef OPENSSL_ALL
  9325. if (name->entries == NULL) {
  9326. name->entries = wolfSSL_sk_X509_NAME_new(NULL);
  9327. }
  9328. if (wolfSSL_sk_X509_NAME_ENTRY_push(name->entries, current
  9329. ) != WOLFSSL_SUCCESS) {
  9330. ret = WOLFSSL_FAILURE;
  9331. }
  9332. #endif
  9333. }
  9334. else {
  9335. ret = WOLFSSL_FAILURE;
  9336. }
  9337. if (ret != WOLFSSL_SUCCESS) {
  9338. WOLFSSL_MSG("Error adding the name entry");
  9339. if (current->set == 0)
  9340. name->entrySz--;
  9341. return WOLFSSL_FAILURE;
  9342. }
  9343. if (RebuildFullName(name) != 0)
  9344. return WOLFSSL_FAILURE;
  9345. (void)set;
  9346. return WOLFSSL_SUCCESS;
  9347. }
  9348. int wolfSSL_X509_NAME_add_entry_by_txt(WOLFSSL_X509_NAME *name,
  9349. const char *field, int type,
  9350. const unsigned char *bytes, int len,
  9351. int loc, int set)
  9352. {
  9353. int ret = WOLFSSL_FAILURE;
  9354. int nid;
  9355. WOLFSSL_X509_NAME_ENTRY* entry;
  9356. (void)type;
  9357. WOLFSSL_ENTER("wolfSSL_X509_NAME_add_entry_by_txt");
  9358. if (name == NULL || field == NULL)
  9359. return WOLFSSL_FAILURE;
  9360. if ((nid = wolfSSL_OBJ_txt2nid(field)) == NID_undef) {
  9361. WOLFSSL_MSG("Unable convert text to NID");
  9362. return WOLFSSL_FAILURE;
  9363. }
  9364. entry = wolfSSL_X509_NAME_ENTRY_create_by_NID(NULL,
  9365. nid, type, (unsigned char*)bytes, len);
  9366. if (entry == NULL)
  9367. return WOLFSSL_FAILURE;
  9368. ret = wolfSSL_X509_NAME_add_entry(name, entry, loc, set);
  9369. wolfSSL_X509_NAME_ENTRY_free(entry);
  9370. return ret;
  9371. }
  9372. int wolfSSL_X509_NAME_add_entry_by_NID(WOLFSSL_X509_NAME *name, int nid,
  9373. int type, const unsigned char *bytes,
  9374. int len, int loc, int set)
  9375. {
  9376. int ret;
  9377. WOLFSSL_X509_NAME_ENTRY* entry;
  9378. WOLFSSL_ENTER("wolfSSL_X509_NAME_add_entry_by_NID");
  9379. entry = wolfSSL_X509_NAME_ENTRY_create_by_NID(NULL, nid, type, bytes,
  9380. len);
  9381. if (entry == NULL)
  9382. return WOLFSSL_FAILURE;
  9383. ret = wolfSSL_X509_NAME_add_entry(name, entry, loc, set);
  9384. wolfSSL_X509_NAME_ENTRY_free(entry);
  9385. return ret;
  9386. }
  9387. WOLFSSL_X509_NAME_ENTRY *wolfSSL_X509_NAME_delete_entry(
  9388. WOLFSSL_X509_NAME *name, int loc)
  9389. {
  9390. WOLFSSL_X509_NAME_ENTRY* ret;
  9391. WOLFSSL_ENTER("wolfSSL_X509_NAME_delete_entry");
  9392. if (!name) {
  9393. WOLFSSL_MSG("Bad parameter");
  9394. return NULL;
  9395. }
  9396. ret = wolfSSL_X509_NAME_get_entry(name, loc);
  9397. if (!ret) {
  9398. WOLFSSL_MSG("loc entry not found");
  9399. return NULL;
  9400. }
  9401. name->entry[loc].set = 0;
  9402. return ret;
  9403. }
  9404. #endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
  9405. #if defined(OPENSSL_EXTRA) && !defined(NO_ASN)
  9406. int wolfSSL_X509_NAME_get_index_by_OBJ(WOLFSSL_X509_NAME *name,
  9407. const WOLFSSL_ASN1_OBJECT *obj,
  9408. int idx) {
  9409. if (!name || idx >= MAX_NAME_ENTRIES ||
  9410. !obj || !obj->obj) {
  9411. return -1;
  9412. }
  9413. if (idx < 0) {
  9414. idx = -1;
  9415. }
  9416. for (idx++; idx < MAX_NAME_ENTRIES; idx++) {
  9417. /* Find index of desired name */
  9418. if (name->entry[idx].set) {
  9419. if (XSTRLEN(obj->sName) == XSTRLEN(name->entry[idx].object->sName) &&
  9420. XSTRNCMP((const char*) obj->sName,
  9421. name->entry[idx].object->sName, obj->objSz - 1) == 0) {
  9422. return idx;
  9423. }
  9424. }
  9425. }
  9426. return -1;
  9427. }
  9428. #endif
  9429. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
  9430. defined(OPENSSL_EXTRA_X509_SMALL)
  9431. /* returns a pointer to the internal entry at location 'loc' on success,
  9432. * a null pointer is returned in fail cases */
  9433. WOLFSSL_X509_NAME_ENTRY *wolfSSL_X509_NAME_get_entry(
  9434. WOLFSSL_X509_NAME *name, int loc)
  9435. {
  9436. #ifdef WOLFSSL_DEBUG_OPENSSL
  9437. WOLFSSL_ENTER("wolfSSL_X509_NAME_get_entry");
  9438. #endif
  9439. if (name == NULL) {
  9440. return NULL;
  9441. }
  9442. if (loc < 0 || loc >= MAX_NAME_ENTRIES) {
  9443. WOLFSSL_MSG("Bad argument");
  9444. return NULL;
  9445. }
  9446. if (name->entry[loc].set) {
  9447. #ifdef WOLFSSL_PYTHON
  9448. /* "set" is not only flag use, but also stack index position use in
  9449. * OpenSSL. Python makes tuple based on this number. Therefore,
  9450. * updating "set" by position + 1. "plus 1" means to avoid "not set"
  9451. * zero.
  9452. */
  9453. name->entry[loc].set = loc + 1;
  9454. #endif
  9455. return &name->entry[loc];
  9456. }
  9457. else {
  9458. return NULL;
  9459. }
  9460. }
  9461. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  9462. #ifdef OPENSSL_EXTRA
  9463. int wolfSSL_X509_check_private_key(WOLFSSL_X509 *x509, WOLFSSL_EVP_PKEY *key)
  9464. {
  9465. WOLFSSL_ENTER("wolfSSL_X509_check_private_key");
  9466. if (!x509 || !key) {
  9467. WOLFSSL_MSG("Bad parameter");
  9468. return WOLFSSL_FAILURE;
  9469. }
  9470. #ifndef NO_CHECK_PRIVATE_KEY
  9471. return wc_CheckPrivateKey((byte*)key->pkey.ptr, key->pkey_sz,
  9472. x509->pubKey.buffer, x509->pubKey.length,
  9473. (enum Key_Sum)x509->pubKeyOID) == 1 ?
  9474. WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  9475. #else
  9476. /* not compiled in */
  9477. return WOLFSSL_SUCCESS;
  9478. #endif
  9479. }
  9480. #endif /* OPENSSL_EXTRA */
  9481. #if defined(HAVE_LIGHTY) || defined(HAVE_STUNNEL) \
  9482. || defined(WOLFSSL_MYSQL_COMPATIBLE) || defined(OPENSSL_EXTRA)
  9483. #ifndef NO_BIO
  9484. #ifdef WOLFSSL_CERT_GEN
  9485. #ifdef WOLFSSL_CERT_REQ
  9486. /* writes the x509 from x to the WOLFSSL_BIO bp
  9487. *
  9488. * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on fail
  9489. */
  9490. int wolfSSL_PEM_write_bio_X509_REQ(WOLFSSL_BIO *bp, WOLFSSL_X509 *x)
  9491. {
  9492. byte* pem;
  9493. int pemSz = 0;
  9494. const unsigned char* der;
  9495. int derSz;
  9496. int ret;
  9497. WOLFSSL_ENTER("wolfSSL_PEM_write_bio_X509_REQ()");
  9498. if (x == NULL || bp == NULL) {
  9499. return WOLFSSL_FAILURE;
  9500. }
  9501. der = wolfSSL_X509_get_der(x, &derSz);
  9502. if (der == NULL) {
  9503. return WOLFSSL_FAILURE;
  9504. }
  9505. /* get PEM size */
  9506. pemSz = wc_DerToPemEx(der, derSz, NULL, 0, NULL, CERTREQ_TYPE);
  9507. if (pemSz < 0) {
  9508. return WOLFSSL_FAILURE;
  9509. }
  9510. /* create PEM buffer and convert from DER */
  9511. pem = (byte*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9512. if (pem == NULL) {
  9513. return WOLFSSL_FAILURE;
  9514. }
  9515. if (wc_DerToPemEx(der, derSz, pem, pemSz, NULL, CERTREQ_TYPE) < 0) {
  9516. XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9517. return WOLFSSL_FAILURE;
  9518. }
  9519. /* write the PEM to BIO */
  9520. ret = wolfSSL_BIO_write(bp, pem, pemSz);
  9521. XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9522. if (ret <= 0) return WOLFSSL_FAILURE;
  9523. return WOLFSSL_SUCCESS;
  9524. }
  9525. #endif /* WOLFSSL_CERT_REQ */
  9526. /* writes the x509 from x to the WOLFSSL_BIO bp
  9527. *
  9528. * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on fail
  9529. */
  9530. int wolfSSL_PEM_write_bio_X509_AUX(WOLFSSL_BIO *bp, WOLFSSL_X509 *x)
  9531. {
  9532. byte* pem;
  9533. int pemSz = 0;
  9534. const unsigned char* der;
  9535. int derSz;
  9536. int ret;
  9537. WOLFSSL_ENTER("wolfSSL_PEM_write_bio_X509_AUX()");
  9538. if (bp == NULL || x == NULL) {
  9539. WOLFSSL_MSG("NULL argument passed in");
  9540. return WOLFSSL_FAILURE;
  9541. }
  9542. der = wolfSSL_X509_get_der(x, &derSz);
  9543. if (der == NULL) {
  9544. return WOLFSSL_FAILURE;
  9545. }
  9546. /* get PEM size */
  9547. pemSz = wc_DerToPemEx(der, derSz, NULL, 0, NULL, CERT_TYPE);
  9548. if (pemSz < 0) {
  9549. return WOLFSSL_FAILURE;
  9550. }
  9551. /* create PEM buffer and convert from DER */
  9552. pem = (byte*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9553. if (pem == NULL) {
  9554. return WOLFSSL_FAILURE;
  9555. }
  9556. if (wc_DerToPemEx(der, derSz, pem, pemSz, NULL, CERT_TYPE) < 0) {
  9557. XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9558. return WOLFSSL_FAILURE;
  9559. }
  9560. /* write the PEM to BIO */
  9561. ret = wolfSSL_BIO_write(bp, pem, pemSz);
  9562. XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9563. if (ret <= 0) return WOLFSSL_FAILURE;
  9564. return WOLFSSL_SUCCESS;
  9565. }
  9566. int wolfSSL_PEM_write_bio_X509(WOLFSSL_BIO *bio, WOLFSSL_X509 *cert)
  9567. {
  9568. byte* pem = NULL;
  9569. int pemSz = 0;
  9570. /* Get large buffer to hold cert der */
  9571. int derSz = X509_BUFFER_SZ;
  9572. #ifdef WOLFSSL_SMALL_STACK
  9573. byte* der;
  9574. #else
  9575. byte der[X509_BUFFER_SZ];
  9576. #endif
  9577. int ret;
  9578. WOLFSSL_ENTER("wolfSSL_PEM_write_bio_X509()");
  9579. if (bio == NULL || cert == NULL) {
  9580. WOLFSSL_MSG("NULL argument passed in");
  9581. return WOLFSSL_FAILURE;
  9582. }
  9583. #ifdef WOLFSSL_SMALL_STACK
  9584. der = (byte*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9585. if (!der) {
  9586. WOLFSSL_MSG("malloc failed");
  9587. return WOLFSSL_FAILURE;
  9588. }
  9589. #endif
  9590. if (wolfssl_x509_make_der(cert, 0, der, &derSz, 1) != WOLFSSL_SUCCESS) {
  9591. goto error;
  9592. }
  9593. /* get PEM size */
  9594. pemSz = wc_DerToPemEx(der, derSz, NULL, 0, NULL, CERT_TYPE);
  9595. if (pemSz < 0) {
  9596. goto error;
  9597. }
  9598. /* create PEM buffer and convert from DER */
  9599. pem = (byte*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9600. if (pem == NULL) {
  9601. goto error;
  9602. }
  9603. if (wc_DerToPemEx(der, derSz, pem, pemSz, NULL, CERT_TYPE) < 0) {
  9604. goto error;
  9605. }
  9606. /* write the PEM to BIO */
  9607. ret = wolfSSL_BIO_write(bio, pem, pemSz);
  9608. XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9609. #ifdef WOLFSSL_SMALL_STACK
  9610. XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9611. #endif
  9612. if (ret <= 0) return WOLFSSL_FAILURE;
  9613. return WOLFSSL_SUCCESS;
  9614. error:
  9615. #ifdef WOLFSSL_SMALL_STACK
  9616. XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9617. #endif
  9618. if (pem)
  9619. XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9620. return WOLFSSL_FAILURE;
  9621. }
  9622. #endif /* WOLFSSL_CERT_GEN */
  9623. #endif /* !NO_BIO */
  9624. #endif /* HAVE_LIGHTY || HAVE_STUNNEL || WOLFSSL_MYSQL_COMPATIBLE */
  9625. #if defined(OPENSSL_EXTRA) || defined(HAVE_STUNNEL) || defined(WOLFSSL_NGINX) || \
  9626. defined(HAVE_LIGHTY) || defined(WOLFSSL_HAPROXY) || \
  9627. defined(WOLFSSL_OPENSSH) || defined(HAVE_SBLIM_SFCB)
  9628. WOLF_STACK_OF(WOLFSSL_X509_NAME)* wolfSSL_sk_X509_NAME_new(wolf_sk_compare_cb cb)
  9629. {
  9630. WOLFSSL_STACK* sk;
  9631. (void)cb;
  9632. WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_new");
  9633. sk = wolfSSL_sk_new_node(NULL);
  9634. if (sk != NULL) {
  9635. sk->type = STACK_TYPE_X509_NAME;
  9636. #ifdef OPENSSL_ALL
  9637. sk->comp = cb;
  9638. #endif
  9639. }
  9640. return sk;
  9641. }
  9642. int wolfSSL_sk_X509_NAME_num(const WOLF_STACK_OF(WOLFSSL_X509_NAME) *sk)
  9643. {
  9644. WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_num");
  9645. if (sk == NULL)
  9646. return BAD_FUNC_ARG;
  9647. return (int)sk->num;
  9648. }
  9649. /* Getter function for WOLFSSL_X509_NAME pointer
  9650. *
  9651. * sk is the stack to retrieve pointer from
  9652. * i is the index value in stack
  9653. *
  9654. * returns a pointer to a WOLFSSL_X509_NAME structure on success and NULL on
  9655. * fail
  9656. */
  9657. WOLFSSL_X509_NAME* wolfSSL_sk_X509_NAME_value(const STACK_OF(WOLFSSL_X509_NAME)* sk,
  9658. int i)
  9659. {
  9660. WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_value");
  9661. return (WOLFSSL_X509_NAME*)wolfSSL_sk_value(sk, i);
  9662. }
  9663. WOLFSSL_X509_NAME* wolfSSL_sk_X509_NAME_pop(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
  9664. {
  9665. WOLFSSL_STACK* node;
  9666. WOLFSSL_X509_NAME* name;
  9667. if (sk == NULL) {
  9668. return NULL;
  9669. }
  9670. node = sk->next;
  9671. name = sk->data.name;
  9672. if (node != NULL) { /* update sk and remove node from stack */
  9673. sk->data.name = node->data.name;
  9674. sk->next = node->next;
  9675. XFREE(node, NULL, DYNAMIC_TYPE_OPENSSL);
  9676. }
  9677. else { /* last x509 in stack */
  9678. sk->data.name = NULL;
  9679. }
  9680. if (sk->num > 0) {
  9681. sk->num -= 1;
  9682. }
  9683. return name;
  9684. }
  9685. void wolfSSL_sk_X509_NAME_pop_free(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
  9686. void (*f) (WOLFSSL_X509_NAME*))
  9687. {
  9688. WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_pop_free");
  9689. wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
  9690. }
  9691. /* Free only the sk structure, NOT X509_NAME members */
  9692. void wolfSSL_sk_X509_NAME_free(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
  9693. {
  9694. WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_free");
  9695. wolfSSL_sk_free(sk);
  9696. }
  9697. int wolfSSL_sk_X509_NAME_push(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
  9698. WOLFSSL_X509_NAME* name)
  9699. {
  9700. WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_push");
  9701. return wolfSSL_sk_push(sk, name);
  9702. }
  9703. /* return index of found, or negative to indicate not found */
  9704. int wolfSSL_sk_X509_NAME_find(const WOLF_STACK_OF(WOLFSSL_X509_NAME) *sk,
  9705. WOLFSSL_X509_NAME *name)
  9706. {
  9707. int i;
  9708. WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_find");
  9709. if (sk == NULL)
  9710. return BAD_FUNC_ARG;
  9711. for (i = 0; sk; i++, sk = sk->next) {
  9712. if (wolfSSL_X509_NAME_cmp(sk->data.name, name) == 0) {
  9713. return i;
  9714. }
  9715. }
  9716. return -1;
  9717. }
  9718. /* Name Entry */
  9719. WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* wolfSSL_sk_X509_NAME_ENTRY_new(
  9720. wolf_sk_compare_cb cb)
  9721. {
  9722. WOLFSSL_STACK* sk = wolfSSL_sk_new_node(NULL);
  9723. if (sk != NULL) {
  9724. sk->type = STACK_TYPE_X509_NAME_ENTRY;
  9725. #ifdef OPENSSL_ALL
  9726. sk->comp = cb;
  9727. #else
  9728. (void)cb;
  9729. #endif
  9730. }
  9731. return sk;
  9732. }
  9733. int wolfSSL_sk_X509_NAME_ENTRY_push(WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk,
  9734. WOLFSSL_X509_NAME_ENTRY* name_entry)
  9735. {
  9736. return wolfSSL_sk_push(sk, name_entry);
  9737. }
  9738. WOLFSSL_X509_NAME_ENTRY* wolfSSL_sk_X509_NAME_ENTRY_value(
  9739. const WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk, int i)
  9740. {
  9741. return (WOLFSSL_X509_NAME_ENTRY*)wolfSSL_sk_value(sk, i);
  9742. }
  9743. int wolfSSL_sk_X509_NAME_ENTRY_num(const WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk)
  9744. {
  9745. if (sk == NULL)
  9746. return BAD_FUNC_ARG;
  9747. return (int)sk->num;
  9748. }
  9749. void wolfSSL_sk_X509_NAME_ENTRY_free(WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk)
  9750. {
  9751. wolfSSL_sk_free(sk);
  9752. }
  9753. #endif /* OPENSSL_EXTRA || HAVE_STUNNEL || WOLFSSL_NGINX ||
  9754. HAVE_LIGHTY || WOLFSSL_HAPROXY ||
  9755. WOLFSSL_OPENSSH || HAVE_SBLIM_SFCB */
  9756. #if defined(OPENSSL_ALL) || (defined(OPENSSL_EXTRA) && \
  9757. (defined(HAVE_STUNNEL) || defined(WOLFSSL_NGINX) || \
  9758. defined(HAVE_LIGHTY) || defined(WOLFSSL_HAPROXY) || \
  9759. defined(WOLFSSL_OPENSSH) || defined(HAVE_SBLIM_SFCB)))
  9760. #if defined(OPENSSL_ALL)
  9761. WOLFSSL_X509_INFO* wolfSSL_X509_INFO_new(void)
  9762. {
  9763. WOLFSSL_X509_INFO* info;
  9764. info = (WOLFSSL_X509_INFO*)XMALLOC(sizeof(WOLFSSL_X509_INFO), NULL,
  9765. DYNAMIC_TYPE_X509);
  9766. if (info) {
  9767. XMEMSET(info, 0, sizeof(*info));
  9768. }
  9769. return info;
  9770. }
  9771. void wolfSSL_X509_INFO_free(WOLFSSL_X509_INFO* info)
  9772. {
  9773. if (info == NULL)
  9774. return;
  9775. if (info->x509) {
  9776. wolfSSL_X509_free(info->x509);
  9777. info->x509 = NULL;
  9778. }
  9779. #ifdef HAVE_CRL
  9780. if (info->crl) {
  9781. wolfSSL_X509_CRL_free(info->crl);
  9782. info->crl = NULL;
  9783. }
  9784. #endif
  9785. wolfSSL_X509_PKEY_free(info->x_pkey);
  9786. info->x_pkey = NULL;
  9787. XFREE(info, NULL, DYNAMIC_TYPE_X509);
  9788. }
  9789. #endif
  9790. WOLFSSL_STACK* wolfSSL_sk_X509_INFO_new_null(void)
  9791. {
  9792. WOLFSSL_STACK* sk = wolfSSL_sk_new_node(NULL);
  9793. if (sk) {
  9794. sk->type = STACK_TYPE_X509_INFO;
  9795. }
  9796. return sk;
  9797. }
  9798. int wolfSSL_sk_X509_INFO_num(const WOLF_STACK_OF(WOLFSSL_X509_INFO) *sk)
  9799. {
  9800. WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_num");
  9801. return wolfSSL_sk_num(sk);
  9802. }
  9803. WOLFSSL_X509_INFO* wolfSSL_sk_X509_INFO_value(
  9804. const WOLF_STACK_OF(WOLFSSL_X509_INFO) *sk, int i)
  9805. {
  9806. WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_value");
  9807. return (WOLFSSL_X509_INFO *)wolfSSL_sk_value(sk, i);
  9808. }
  9809. WOLFSSL_X509_INFO* wolfSSL_sk_X509_INFO_pop(
  9810. WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk)
  9811. {
  9812. WOLFSSL_STACK* node;
  9813. WOLFSSL_X509_INFO* info;
  9814. if (sk == NULL) {
  9815. return NULL;
  9816. }
  9817. node = sk->next;
  9818. info = sk->data.info;
  9819. if (node != NULL) { /* update sk and remove node from stack */
  9820. sk->data.info = node->data.info;
  9821. sk->next = node->next;
  9822. wolfSSL_sk_free_node(node);
  9823. }
  9824. else { /* last x509 in stack */
  9825. sk->data.info = NULL;
  9826. }
  9827. if (sk->num > 0) {
  9828. sk->num -= 1;
  9829. }
  9830. return info;
  9831. }
  9832. #if defined(OPENSSL_ALL)
  9833. void wolfSSL_sk_X509_INFO_pop_free(WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
  9834. void (*f) (WOLFSSL_X509_INFO*))
  9835. {
  9836. WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_pop_free");
  9837. wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
  9838. }
  9839. void wolfSSL_sk_X509_INFO_free(WOLF_STACK_OF(WOLFSSL_X509_INFO) *sk)
  9840. {
  9841. WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_free");
  9842. wolfSSL_sk_free(sk);
  9843. }
  9844. /* Adds the WOLFSSL_X509_INFO to the stack "sk". "sk" takes control of "in" and
  9845. * tries to free it when the stack is free'd.
  9846. *
  9847. * return 1 on success 0 on fail
  9848. */
  9849. int wolfSSL_sk_X509_INFO_push(WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
  9850. WOLFSSL_X509_INFO* in)
  9851. {
  9852. return wolfSSL_sk_push(sk, in);
  9853. }
  9854. /* Creates a duplicate of WOLF_STACK_OF(WOLFSSL_X509_NAME).
  9855. * Returns a new WOLF_STACK_OF(WOLFSSL_X509_NAME) or NULL on failure */
  9856. WOLF_STACK_OF(WOLFSSL_X509_NAME) *wolfSSL_dup_CA_list(
  9857. WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
  9858. {
  9859. int i;
  9860. const int num = wolfSSL_sk_X509_NAME_num(sk);
  9861. WOLF_STACK_OF(WOLFSSL_X509_NAME) *copy;
  9862. WOLFSSL_X509_NAME *name;
  9863. WOLFSSL_ENTER("wolfSSL_dup_CA_list");
  9864. copy = wolfSSL_sk_X509_NAME_new(sk->comp);
  9865. if (copy == NULL) {
  9866. WOLFSSL_MSG("Memory error");
  9867. return NULL;
  9868. }
  9869. for (i = 0; i < num; i++) {
  9870. name = wolfSSL_X509_NAME_dup(wolfSSL_sk_X509_NAME_value(sk, i));
  9871. if (name == NULL || 0 != wolfSSL_sk_X509_NAME_push(copy, name)) {
  9872. WOLFSSL_MSG("Memory error");
  9873. wolfSSL_sk_X509_NAME_pop_free(copy, wolfSSL_X509_NAME_free);
  9874. return NULL;
  9875. }
  9876. }
  9877. return copy;
  9878. }
  9879. void* wolfSSL_sk_X509_OBJECT_value(WOLF_STACK_OF(WOLFSSL_X509_OBJECT)* sk, int i)
  9880. {
  9881. WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_value");
  9882. for (; sk != NULL && i > 0; i--)
  9883. sk = sk->next;
  9884. if (i != 0 || sk == NULL)
  9885. return NULL;
  9886. return sk->data.x509_obj;
  9887. }
  9888. int wolfSSL_sk_X509_OBJECT_num(const WOLF_STACK_OF(WOLFSSL_X509_OBJECT) *s)
  9889. {
  9890. WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_num");
  9891. if (s) {
  9892. return (int)s->num;
  9893. } else {
  9894. return 0;
  9895. }
  9896. }
  9897. int wolfSSL_sk_X509_NAME_set_cmp_func(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
  9898. wolf_sk_compare_cb cb)
  9899. {
  9900. WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_set_cmp_func");
  9901. if (sk == NULL)
  9902. return BAD_FUNC_ARG;
  9903. sk->comp = cb;
  9904. return 0;
  9905. }
  9906. #endif /* OPENSSL_ALL */
  9907. #ifndef NO_BIO
  9908. /* Helper function for X509_NAME_print_ex. Sets *buf to string for domain
  9909. name attribute based on NID. Returns size of buf */
  9910. static int get_dn_attr_by_nid(int n, const char** buf)
  9911. {
  9912. int len = 0;
  9913. const char *str;
  9914. switch(n)
  9915. {
  9916. case NID_commonName :
  9917. str = "CN";
  9918. len = 2;
  9919. break;
  9920. case NID_countryName:
  9921. str = "C";
  9922. len = 1;
  9923. break;
  9924. case NID_localityName:
  9925. str = "L";
  9926. len = 1;
  9927. break;
  9928. case NID_stateOrProvinceName:
  9929. str = "ST";
  9930. len = 2;
  9931. break;
  9932. case NID_organizationName:
  9933. str = "O";
  9934. len = 1;
  9935. break;
  9936. case NID_organizationalUnitName:
  9937. str = "OU";
  9938. len = 2;
  9939. break;
  9940. case NID_emailAddress:
  9941. str = "emailAddress";
  9942. len = 12;
  9943. break;
  9944. default:
  9945. WOLFSSL_MSG("Attribute type not found");
  9946. str = NULL;
  9947. }
  9948. if (buf != NULL)
  9949. *buf = str;
  9950. return len;
  9951. }
  9952. /**
  9953. * Escape input string for RFC2253 requirements. The following characters
  9954. * are escaped with a backslash (\):
  9955. *
  9956. * 1. A space or '#' at the beginning of the string
  9957. * 2. A space at the end of the string
  9958. * 3. One of: ",", "+", """, "\", "<", ">", ";"
  9959. *
  9960. * in - input string to escape
  9961. * inSz - length of in, not including the null terminator
  9962. * out - buffer for output string to be written, will be null terminated
  9963. * outSz - size of out
  9964. *
  9965. * Returns size of output string (not counting NULL terminator) on success,
  9966. * negative on error.
  9967. */
  9968. static int wolfSSL_EscapeString_RFC2253(char* in, word32 inSz,
  9969. char* out, word32 outSz)
  9970. {
  9971. word32 inIdx = 0;
  9972. word32 outIdx = 0;
  9973. char c = 0;
  9974. if (in == NULL || out == NULL || inSz == 0 || outSz == 0) {
  9975. return BAD_FUNC_ARG;
  9976. }
  9977. for (inIdx = 0; inIdx < inSz; inIdx++) {
  9978. c = in[inIdx];
  9979. if (((inIdx == 0) && (c == ' ' || c == '#')) ||
  9980. ((inIdx == (inSz-1)) && (c == ' ')) ||
  9981. c == ',' || c == '+' || c == '"' || c == '\\' ||
  9982. c == '<' || c == '>' || c == ';') {
  9983. if (outIdx > (outSz - 1)) {
  9984. return BUFFER_E;
  9985. }
  9986. out[outIdx] = '\\';
  9987. outIdx++;
  9988. }
  9989. if (outIdx > (outSz - 1)) {
  9990. return BUFFER_E;
  9991. }
  9992. out[outIdx] = c;
  9993. outIdx++;
  9994. }
  9995. /* null terminate out */
  9996. if (outIdx > (outSz -1)) {
  9997. return BUFFER_E;
  9998. }
  9999. out[outIdx] = '\0';
  10000. return outIdx;
  10001. }
  10002. /*
  10003. * Print human readable version of X509_NAME to provided BIO.
  10004. *
  10005. * bio - output BIO to place name string. Does not include null terminator.
  10006. * name - input name to convert to string
  10007. * indent - number of indent spaces to prepend to name string
  10008. * flags - flags to control function behavior. Not all flags are currently
  10009. * supported/implemented. Currently supported are:
  10010. * XN_FLAG_RFC2253 - only the backslash escape requirements from
  10011. * RFC22523 currently implemented.
  10012. * XN_FLAG_DN_REV - print name reversed. Automatically done by
  10013. * XN_FLAG_RFC2253.
  10014. *
  10015. * Returns WOLFSSL_SUCCESS (1) on success, WOLFSSL_FAILURE (0) on failure.
  10016. */
  10017. int wolfSSL_X509_NAME_print_ex(WOLFSSL_BIO* bio, WOLFSSL_X509_NAME* name,
  10018. int indent, unsigned long flags)
  10019. {
  10020. int i, count = 0, len = 0, tmpSz = 0, nameStrSz = 0, escapeSz = 0;
  10021. char* tmp = NULL;
  10022. char* nameStr = NULL;
  10023. const char *buf = NULL;
  10024. WOLFSSL_X509_NAME_ENTRY* ne;
  10025. WOLFSSL_ASN1_STRING* str;
  10026. char escaped[ASN_NAME_MAX];
  10027. WOLFSSL_ENTER("wolfSSL_X509_NAME_print_ex");
  10028. if ((name == NULL) || (name->sz == 0) || (bio == NULL))
  10029. return WOLFSSL_FAILURE;
  10030. for (i = 0; i < indent; i++) {
  10031. if (wolfSSL_BIO_write(bio, " ", 1) != 1)
  10032. return WOLFSSL_FAILURE;
  10033. }
  10034. count = wolfSSL_X509_NAME_entry_count(name);
  10035. for (i = 0; i < count; i++) {
  10036. /* reverse name order for RFC2253 and DN_REV */
  10037. if ((flags & XN_FLAG_RFC2253) || (flags & XN_FLAG_DN_REV)) {
  10038. ne = wolfSSL_X509_NAME_get_entry(name, count - i - 1);
  10039. } else {
  10040. ne = wolfSSL_X509_NAME_get_entry(name, i);
  10041. }
  10042. if (ne == NULL)
  10043. return WOLFSSL_FAILURE;
  10044. str = wolfSSL_X509_NAME_ENTRY_get_data(ne);
  10045. if (str == NULL)
  10046. return WOLFSSL_FAILURE;
  10047. if (flags & XN_FLAG_RFC2253) {
  10048. /* escape string for RFC 2253, ret sz not counting null term */
  10049. escapeSz = wolfSSL_EscapeString_RFC2253(str->data,
  10050. str->length, escaped, sizeof(escaped));
  10051. if (escapeSz < 0)
  10052. return WOLFSSL_FAILURE;
  10053. nameStr = escaped;
  10054. nameStrSz = escapeSz;
  10055. }
  10056. else {
  10057. nameStr = str->data;
  10058. nameStrSz = str->length;
  10059. }
  10060. /* len is without null terminator */
  10061. len = get_dn_attr_by_nid(ne->nid, &buf);
  10062. if (len == 0 || buf == NULL)
  10063. return WOLFSSL_FAILURE;
  10064. tmpSz = nameStrSz + len + 3; /* + 3 for '=', comma, and '\0' */
  10065. tmp = (char*)XMALLOC(tmpSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  10066. if (tmp == NULL) {
  10067. return WOLFSSL_FAILURE;
  10068. }
  10069. if (i < count - 1) {
  10070. if (XSNPRINTF(tmp, tmpSz, "%s=%s,", buf, nameStr)
  10071. >= tmpSz)
  10072. {
  10073. WOLFSSL_MSG("buffer overrun");
  10074. return WOLFSSL_FAILURE;
  10075. }
  10076. tmpSz = len + nameStrSz + 2; /* 2 for '=', comma */
  10077. }
  10078. else {
  10079. if (XSNPRINTF(tmp, tmpSz, "%s=%s", buf, nameStr)
  10080. >= tmpSz)
  10081. {
  10082. WOLFSSL_MSG("buffer overrun");
  10083. return WOLFSSL_FAILURE;
  10084. }
  10085. tmpSz = len + nameStrSz + 1; /* 1 for '=' */
  10086. if (bio->type != WOLFSSL_BIO_FILE)
  10087. ++tmpSz; /* include the terminating null when not writing to a
  10088. * file.
  10089. */
  10090. }
  10091. if (wolfSSL_BIO_write(bio, tmp, tmpSz) != tmpSz) {
  10092. XFREE(tmp, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  10093. return WOLFSSL_FAILURE;
  10094. }
  10095. XFREE(tmp, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  10096. }
  10097. return WOLFSSL_SUCCESS;
  10098. }
  10099. #ifndef NO_FILESYSTEM
  10100. int wolfSSL_X509_NAME_print_ex_fp(XFILE file, WOLFSSL_X509_NAME* name,
  10101. int indent, unsigned long flags)
  10102. {
  10103. WOLFSSL_BIO* bio;
  10104. int ret;
  10105. WOLFSSL_ENTER("wolfSSL_X509_NAME_print_ex_fp");
  10106. if (!(bio = wolfSSL_BIO_new_fp(file, BIO_NOCLOSE))) {
  10107. WOLFSSL_MSG("wolfSSL_BIO_new_fp error");
  10108. return WOLFSSL_FAILURE;
  10109. }
  10110. ret = wolfSSL_X509_NAME_print_ex(bio, name, indent, flags);
  10111. wolfSSL_BIO_free(bio);
  10112. return ret;
  10113. }
  10114. #endif /* NO_FILESYSTEM */
  10115. #endif /* !NO_BIO */
  10116. #ifndef NO_WOLFSSL_STUB
  10117. WOLFSSL_ASN1_BIT_STRING* wolfSSL_X509_get0_pubkey_bitstr(const WOLFSSL_X509* x)
  10118. {
  10119. (void)x;
  10120. WOLFSSL_ENTER("wolfSSL_X509_get0_pubkey_bitstr");
  10121. WOLFSSL_STUB("X509_get0_pubkey_bitstr");
  10122. return NULL;
  10123. }
  10124. #endif
  10125. #ifdef OPENSSL_ALL
  10126. WOLFSSL_X509_LOOKUP_TYPE wolfSSL_X509_OBJECT_get_type(
  10127. const WOLFSSL_X509_OBJECT* obj)
  10128. {
  10129. if (obj == NULL)
  10130. return WOLFSSL_X509_LU_NONE;
  10131. return obj->type;
  10132. }
  10133. WOLFSSL_X509_OBJECT* wolfSSL_X509_OBJECT_new(void)
  10134. {
  10135. WOLFSSL_X509_OBJECT* ret = (WOLFSSL_X509_OBJECT*)
  10136. XMALLOC(sizeof(WOLFSSL_X509_OBJECT), NULL, DYNAMIC_TYPE_OPENSSL);
  10137. if (ret != NULL)
  10138. XMEMSET(ret, 0, sizeof(WOLFSSL_X509_OBJECT));
  10139. return ret;
  10140. }
  10141. void wolfSSL_X509_OBJECT_free(WOLFSSL_X509_OBJECT *obj)
  10142. {
  10143. WOLFSSL_ENTER("wolfSSL_X509_OBJECT_free");
  10144. if (obj != NULL) {
  10145. if (obj->type == WOLFSSL_X509_LU_X509) {
  10146. wolfSSL_X509_free(obj->data.x509);
  10147. }
  10148. else {
  10149. /* We don't free as this will point to
  10150. * store->cm->crl which we don't own */
  10151. WOLFSSL_MSG("Not free'ing CRL in WOLFSSL_X509_OBJECT");
  10152. }
  10153. XFREE(obj, NULL, DYNAMIC_TYPE_OPENSSL);
  10154. }
  10155. }
  10156. #endif /* OPENSSL_ALL */
  10157. #ifndef NO_WOLFSSL_STUB
  10158. WOLFSSL_X509_OBJECT* wolfSSL_sk_X509_OBJECT_delete(
  10159. WOLF_STACK_OF(WOLFSSL_X509_OBJECT)* sk, int i)
  10160. {
  10161. WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_delete");
  10162. WOLFSSL_STUB("wolfSSL_sk_X509_OBJECT_delete");
  10163. (void)sk;
  10164. (void)i;
  10165. return NULL;
  10166. }
  10167. #endif
  10168. WOLFSSL_X509 *wolfSSL_X509_OBJECT_get0_X509(const WOLFSSL_X509_OBJECT *obj)
  10169. {
  10170. if (obj != NULL && obj->type == WOLFSSL_X509_LU_X509)
  10171. return obj->data.x509;
  10172. return NULL;
  10173. }
  10174. WOLFSSL_X509_CRL *wolfSSL_X509_OBJECT_get0_X509_CRL(WOLFSSL_X509_OBJECT *obj)
  10175. {
  10176. if (obj != NULL && obj->type == WOLFSSL_X509_LU_CRL)
  10177. return obj->data.crl;
  10178. return NULL;
  10179. }
  10180. #endif /* OPENSSL_ALL || (OPENSSL_EXTRA && (HAVE_STUNNEL || WOLFSSL_NGINX ||
  10181. * HAVE_LIGHTY || WOLFSSL_HAPROXY || WOLFSSL_OPENSSH ||
  10182. * HAVE_SBLIM_SFCB)) */
  10183. #if defined(OPENSSL_EXTRA)
  10184. int wolfSSL_sk_X509_num(const WOLF_STACK_OF(WOLFSSL_X509) *s)
  10185. {
  10186. WOLFSSL_ENTER("wolfSSL_sk_X509_num");
  10187. if (s == NULL)
  10188. return -1;
  10189. return (int)s->num;
  10190. }
  10191. #endif /* OPENSSL_EXTRA */
  10192. #if defined(HAVE_EX_DATA) && (defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) \
  10193. || defined(WOLFSSL_HAPROXY) || defined(OPENSSL_EXTRA) \
  10194. || defined(HAVE_LIGHTY))
  10195. int wolfSSL_X509_get_ex_new_index(int idx, void *arg, void *a, void *b, void *c)
  10196. {
  10197. WOLFSSL_ENTER("wolfSSL_X509_get_ex_new_index");
  10198. (void)idx;
  10199. (void)arg;
  10200. (void)a;
  10201. (void)b;
  10202. (void)c;
  10203. return wolfssl_get_ex_new_index(CRYPTO_EX_INDEX_X509);
  10204. }
  10205. #endif
  10206. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL) || \
  10207. defined(WOLFSSL_WPAS_SMALL)
  10208. void *wolfSSL_X509_get_ex_data(X509 *x509, int idx)
  10209. {
  10210. WOLFSSL_ENTER("wolfSSL_X509_get_ex_data");
  10211. #ifdef HAVE_EX_DATA
  10212. if (x509 != NULL) {
  10213. return wolfSSL_CRYPTO_get_ex_data(&x509->ex_data, idx);
  10214. }
  10215. #else
  10216. (void)x509;
  10217. (void)idx;
  10218. #endif
  10219. return NULL;
  10220. }
  10221. int wolfSSL_X509_set_ex_data(X509 *x509, int idx, void *data)
  10222. {
  10223. WOLFSSL_ENTER("wolfSSL_X509_set_ex_data");
  10224. #ifdef HAVE_EX_DATA
  10225. if (x509 != NULL)
  10226. {
  10227. return wolfSSL_CRYPTO_set_ex_data(&x509->ex_data, idx, data);
  10228. }
  10229. #else
  10230. (void)x509;
  10231. (void)idx;
  10232. (void)data;
  10233. #endif
  10234. return WOLFSSL_FAILURE;
  10235. }
  10236. #ifdef HAVE_EX_DATA_CLEANUP_HOOKS
  10237. int wolfSSL_X509_set_ex_data_with_cleanup(
  10238. X509 *x509,
  10239. int idx,
  10240. void *data,
  10241. wolfSSL_ex_data_cleanup_routine_t cleanup_routine)
  10242. {
  10243. WOLFSSL_ENTER("wolfSSL_X509_set_ex_data_with_cleanup");
  10244. if (x509 != NULL)
  10245. {
  10246. return wolfSSL_CRYPTO_set_ex_data_with_cleanup(&x509->ex_data, idx,
  10247. data, cleanup_routine);
  10248. }
  10249. return WOLFSSL_FAILURE;
  10250. }
  10251. #endif /* HAVE_EX_DATA_CLEANUP_HOOKS */
  10252. #endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL || WOLFSSL_WPAS_SMALL */
  10253. #ifndef NO_ASN
  10254. int wolfSSL_X509_check_host(WOLFSSL_X509 *x, const char *chk, size_t chklen,
  10255. unsigned int flags, char **peername)
  10256. {
  10257. int ret;
  10258. DecodedCert dCert;
  10259. WOLFSSL_ENTER("wolfSSL_X509_check_host");
  10260. /* flags and peername not needed for Nginx. */
  10261. (void)flags;
  10262. (void)peername;
  10263. if ((x == NULL) || (chk == NULL)) {
  10264. WOLFSSL_MSG("Invalid parameter");
  10265. return WOLFSSL_FAILURE;
  10266. }
  10267. if (flags == WOLFSSL_NO_WILDCARDS) {
  10268. WOLFSSL_MSG("X509_CHECK_FLAG_NO_WILDCARDS not yet implemented");
  10269. return WOLFSSL_FAILURE;
  10270. }
  10271. if (flags == WOLFSSL_NO_PARTIAL_WILDCARDS) {
  10272. WOLFSSL_MSG("X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS not yet implemented");
  10273. return WOLFSSL_FAILURE;
  10274. }
  10275. InitDecodedCert(&dCert, x->derCert->buffer, x->derCert->length, NULL);
  10276. ret = ParseCertRelative(&dCert, CERT_TYPE, 0, NULL);
  10277. if (ret != 0) {
  10278. FreeDecodedCert(&dCert);
  10279. return WOLFSSL_FAILURE;
  10280. }
  10281. ret = CheckHostName(&dCert, (char *)chk, chklen);
  10282. FreeDecodedCert(&dCert);
  10283. if (ret != 0)
  10284. return WOLFSSL_FAILURE;
  10285. return WOLFSSL_SUCCESS;
  10286. }
  10287. int wolfSSL_X509_check_ip_asc(WOLFSSL_X509 *x, const char *ipasc,
  10288. unsigned int flags)
  10289. {
  10290. int ret = WOLFSSL_FAILURE;
  10291. DecodedCert dCert;
  10292. WOLFSSL_ENTER("wolfSSL_X509_check_ip_asc");
  10293. /* flags not yet implemented */
  10294. (void)flags;
  10295. if ((x == NULL) || (x->derCert == NULL) || (ipasc == NULL)) {
  10296. WOLFSSL_MSG("Invalid parameter");
  10297. }
  10298. else {
  10299. ret = WOLFSSL_SUCCESS;
  10300. }
  10301. if (ret == WOLFSSL_SUCCESS) {
  10302. InitDecodedCert(&dCert, x->derCert->buffer, x->derCert->length, NULL);
  10303. ret = ParseCertRelative(&dCert, CERT_TYPE, 0, NULL);
  10304. if (ret != 0) {
  10305. ret = WOLFSSL_FAILURE;
  10306. }
  10307. else {
  10308. ret = CheckIPAddr(&dCert, ipasc);
  10309. if (ret != 0) {
  10310. ret = WOLFSSL_FAILURE;
  10311. }
  10312. else {
  10313. ret = WOLFSSL_SUCCESS;
  10314. }
  10315. }
  10316. FreeDecodedCert(&dCert);
  10317. }
  10318. return ret;
  10319. }
  10320. #endif
  10321. #if defined(OPENSSL_EXTRA) && defined(WOLFSSL_CERT_GEN)
  10322. int wolfSSL_X509_check_email(WOLFSSL_X509 *x, const char *chk, size_t chkLen,
  10323. unsigned int flags)
  10324. {
  10325. WOLFSSL_X509_NAME *subjName;
  10326. int emailLen;
  10327. char *emailBuf;
  10328. (void)flags;
  10329. WOLFSSL_ENTER("wolfSSL_X509_check_email");
  10330. if ((x == NULL) || (chk == NULL)) {
  10331. WOLFSSL_MSG("Invalid parameter");
  10332. return WOLFSSL_FAILURE;
  10333. }
  10334. subjName = wolfSSL_X509_get_subject_name(x);
  10335. if (subjName == NULL)
  10336. return WOLFSSL_FAILURE;
  10337. /* Call with NULL buffer to get required length. */
  10338. emailLen = wolfSSL_X509_NAME_get_text_by_NID(subjName, NID_emailAddress,
  10339. NULL, 0);
  10340. if (emailLen < 0)
  10341. return WOLFSSL_FAILURE;
  10342. ++emailLen; /* Add 1 for the NUL. */
  10343. emailBuf = (char*)XMALLOC(emailLen, x->heap, DYNAMIC_TYPE_OPENSSL);
  10344. if (emailBuf == NULL)
  10345. return WOLFSSL_FAILURE;
  10346. emailLen = wolfSSL_X509_NAME_get_text_by_NID(subjName, NID_emailAddress,
  10347. emailBuf, emailLen);
  10348. if (emailLen < 0) {
  10349. XFREE(emailBuf, x->heap, DYNAMIC_TYPE_OPENSSL);
  10350. return WOLFSSL_FAILURE;
  10351. }
  10352. if (chkLen == 0)
  10353. chkLen = XSTRLEN(chk);
  10354. if (chkLen != (size_t)emailLen
  10355. || XSTRNCMP(chk, emailBuf, chkLen)) {
  10356. XFREE(emailBuf, x->heap, DYNAMIC_TYPE_OPENSSL);
  10357. return WOLFSSL_FAILURE;
  10358. }
  10359. XFREE(emailBuf, x->heap, DYNAMIC_TYPE_OPENSSL);
  10360. return WOLFSSL_SUCCESS;
  10361. }
  10362. #endif /* OPENSSL_EXTRA && WOLFSSL_CERT_GEN */
  10363. #if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) || defined(WOLFSSL_HAPROXY) \
  10364. || defined(OPENSSL_EXTRA) || defined(HAVE_LIGHTY)
  10365. int wolfSSL_X509_NAME_digest(const WOLFSSL_X509_NAME *name,
  10366. const WOLFSSL_EVP_MD *type, unsigned char *md, unsigned int *len)
  10367. {
  10368. WOLFSSL_ENTER("wolfSSL_X509_NAME_digest");
  10369. if (name == NULL || type == NULL)
  10370. return WOLFSSL_FAILURE;
  10371. #if !defined(NO_FILESYSTEM) && !defined(NO_PWDBASED)
  10372. return wolfSSL_EVP_Digest((unsigned char*)name->name,
  10373. name->sz, md, len, type, NULL);
  10374. #else
  10375. (void)md;
  10376. (void)len;
  10377. return NOT_COMPILED_IN;
  10378. #endif
  10379. }
  10380. #endif /* OPENSSL_ALL || WOLFSSL_NGINX || WOLFSSL_HAPROXY ||
  10381. OPENSSL_EXTRA || HAVE_LIGHTY */
  10382. #if defined(WOLFSSL_NGINX) || defined(WOLFSSL_HAPROXY) || \
  10383. defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL)
  10384. /**
  10385. * Find the issuing cert of the input cert. On a self-signed cert this
  10386. * function will return an error.
  10387. * @param issuer The issuer x509 struct is returned here
  10388. * @param cm The cert manager that is queried for the issuer
  10389. * @param x This cert's issuer will be queried in cm
  10390. * @return WOLFSSL_SUCCESS on success
  10391. * WOLFSSL_FAILURE on error
  10392. */
  10393. static int x509GetIssuerFromCM(WOLFSSL_X509 **issuer, WOLFSSL_CERT_MANAGER* cm,
  10394. WOLFSSL_X509 *x)
  10395. {
  10396. Signer* ca = NULL;
  10397. #ifdef WOLFSSL_SMALL_STACK
  10398. DecodedCert* cert = NULL;
  10399. #else
  10400. DecodedCert cert[1];
  10401. #endif
  10402. if (cm == NULL || x == NULL || x->derCert == NULL) {
  10403. WOLFSSL_MSG("No cert DER buffer or NULL cm. Defining "
  10404. "WOLFSSL_SIGNER_DER_CERT could solve the issue");
  10405. return WOLFSSL_FAILURE;
  10406. }
  10407. #ifdef WOLFSSL_SMALL_STACK
  10408. cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL, DYNAMIC_TYPE_DCERT);
  10409. if (cert == NULL)
  10410. return WOLFSSL_FAILURE;
  10411. #endif
  10412. /* Use existing CA retrieval APIs that use DecodedCert. */
  10413. InitDecodedCert(cert, x->derCert->buffer, x->derCert->length, NULL);
  10414. if (ParseCertRelative(cert, CERT_TYPE, 0, NULL) == 0
  10415. && !cert->selfSigned) {
  10416. #ifndef NO_SKID
  10417. if (cert->extAuthKeyIdSet)
  10418. ca = GetCA(cm, cert->extAuthKeyId);
  10419. if (ca == NULL)
  10420. ca = GetCAByName(cm, cert->issuerHash);
  10421. #else /* NO_SKID */
  10422. ca = GetCA(cm, cert->issuerHash);
  10423. #endif /* NO SKID */
  10424. }
  10425. FreeDecodedCert(cert);
  10426. #ifdef WOLFSSL_SMALL_STACK
  10427. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  10428. #endif
  10429. if (ca == NULL)
  10430. return WOLFSSL_FAILURE;
  10431. #ifdef WOLFSSL_SIGNER_DER_CERT
  10432. /* populate issuer with Signer DER */
  10433. if (wolfSSL_X509_d2i(issuer, ca->derCert->buffer,
  10434. ca->derCert->length) == NULL)
  10435. return WOLFSSL_FAILURE;
  10436. #else
  10437. /* Create an empty certificate as CA doesn't have a certificate. */
  10438. *issuer = (WOLFSSL_X509 *)XMALLOC(sizeof(WOLFSSL_X509), 0,
  10439. DYNAMIC_TYPE_OPENSSL);
  10440. if (*issuer == NULL)
  10441. return WOLFSSL_FAILURE;
  10442. InitX509((*issuer), 1, NULL);
  10443. #endif
  10444. return WOLFSSL_SUCCESS;
  10445. }
  10446. void wolfSSL_X509_email_free(WOLF_STACK_OF(WOLFSSL_STRING) *sk)
  10447. {
  10448. WOLFSSL_STACK *curr;
  10449. while (sk != NULL) {
  10450. curr = sk;
  10451. sk = sk->next;
  10452. XFREE(curr, NULL, DYNAMIC_TYPE_OPENSSL);
  10453. }
  10454. }
  10455. WOLF_STACK_OF(WOLFSSL_STRING) *wolfSSL_X509_get1_ocsp(WOLFSSL_X509 *x)
  10456. {
  10457. WOLFSSL_STACK* list = NULL;
  10458. char* url;
  10459. if (x == NULL || x->authInfoSz == 0)
  10460. return NULL;
  10461. list = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK) + x->authInfoSz + 1,
  10462. NULL, DYNAMIC_TYPE_OPENSSL);
  10463. if (list == NULL)
  10464. return NULL;
  10465. url = (char*)list;
  10466. url += sizeof(WOLFSSL_STACK);
  10467. XMEMCPY(url, x->authInfo, x->authInfoSz);
  10468. url[x->authInfoSz] = '\0';
  10469. list->data.string = url;
  10470. list->next = NULL;
  10471. return list;
  10472. }
  10473. int wolfSSL_X509_check_issued(WOLFSSL_X509 *issuer, WOLFSSL_X509 *subject)
  10474. {
  10475. WOLFSSL_X509_NAME *issuerName = wolfSSL_X509_get_issuer_name(subject);
  10476. WOLFSSL_X509_NAME *subjectName = wolfSSL_X509_get_subject_name(issuer);
  10477. if (issuerName == NULL || subjectName == NULL)
  10478. return X509_V_ERR_SUBJECT_ISSUER_MISMATCH;
  10479. /* Literal matching of encoded names and key ids. */
  10480. if (issuerName->sz != subjectName->sz ||
  10481. XMEMCMP(issuerName->name, subjectName->name, subjectName->sz) != 0) {
  10482. return X509_V_ERR_SUBJECT_ISSUER_MISMATCH;
  10483. }
  10484. if (subject->authKeyId != NULL && issuer->subjKeyId != NULL) {
  10485. if (subject->authKeyIdSz != issuer->subjKeyIdSz ||
  10486. XMEMCMP(subject->authKeyId, issuer->subjKeyId,
  10487. issuer->subjKeyIdSz) != 0) {
  10488. return X509_V_ERR_SUBJECT_ISSUER_MISMATCH;
  10489. }
  10490. }
  10491. return X509_V_OK;
  10492. }
  10493. #endif /* WOLFSSL_NGINX || WOLFSSL_HAPROXY || OPENSSL_EXTRA || OPENSSL_ALL */
  10494. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
  10495. defined(KEEP_PEER_CERT)
  10496. WOLFSSL_X509* wolfSSL_X509_dup(WOLFSSL_X509 *x)
  10497. {
  10498. WOLFSSL_ENTER("wolfSSL_X509_dup");
  10499. if (x == NULL) {
  10500. WOLFSSL_MSG("Error: NULL input");
  10501. return NULL;
  10502. }
  10503. if (x->derCert == NULL) {
  10504. WOLFSSL_MSG("Error: NULL derCert parameter");
  10505. return NULL;
  10506. }
  10507. return wolfSSL_X509_d2i(NULL, x->derCert->buffer, x->derCert->length);
  10508. }
  10509. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  10510. #if defined(OPENSSL_EXTRA)
  10511. int wolfSSL_X509_check_ca(WOLFSSL_X509 *x509)
  10512. {
  10513. WOLFSSL_ENTER("X509_check_ca");
  10514. if (x509 == NULL)
  10515. return WOLFSSL_FAILURE;
  10516. if (x509->isCa)
  10517. return 1;
  10518. if (x509->extKeyUsageCrit)
  10519. return 4;
  10520. return 0;
  10521. }
  10522. #endif /* OPENSSL_EXTRA */
  10523. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  10524. long wolfSSL_X509_get_version(const WOLFSSL_X509 *x509)
  10525. {
  10526. int version = 0;
  10527. WOLFSSL_ENTER("wolfSSL_X509_get_version");
  10528. if (x509 == NULL){
  10529. WOLFSSL_MSG("invalid parameter");
  10530. return 0L;
  10531. }
  10532. version = x509->version;
  10533. if (version != 0)
  10534. return (long)version - 1L;
  10535. return 0L;
  10536. }
  10537. #endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
  10538. #if defined(OPENSSL_EXTRA)
  10539. int wolfSSL_X509_get_signature_nid(const WOLFSSL_X509 *x)
  10540. {
  10541. if (x == NULL)
  10542. return 0;
  10543. return oid2nid(x->sigOID, oidSigType);
  10544. }
  10545. #endif /* OPENSSL_EXTRA */
  10546. #if defined(OPENSSL_EXTRA)
  10547. WOLFSSL_STACK* wolfSSL_sk_X509_new(void)
  10548. {
  10549. WOLFSSL_STACK* s = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK), NULL,
  10550. DYNAMIC_TYPE_OPENSSL);
  10551. if (s != NULL) {
  10552. XMEMSET(s, 0, sizeof(*s));
  10553. s->type = STACK_TYPE_X509;
  10554. }
  10555. return s;
  10556. }
  10557. #endif
  10558. #ifdef OPENSSL_ALL
  10559. WOLFSSL_STACK* wolfSSL_sk_X509_OBJECT_new(void)
  10560. {
  10561. WOLFSSL_STACK* s = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK), NULL,
  10562. DYNAMIC_TYPE_OPENSSL);
  10563. WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_new");
  10564. if (s != NULL) {
  10565. XMEMSET(s, 0, sizeof(*s));
  10566. s->type = STACK_TYPE_X509_OBJ;
  10567. }
  10568. return s;
  10569. }
  10570. void wolfSSL_sk_X509_OBJECT_free(WOLFSSL_STACK* s)
  10571. {
  10572. WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_free");
  10573. wolfSSL_sk_free(s);
  10574. }
  10575. void wolfSSL_sk_X509_OBJECT_pop_free(WOLFSSL_STACK* s,
  10576. void (*f) (WOLFSSL_X509_OBJECT*))
  10577. {
  10578. WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_pop_free");
  10579. wolfSSL_sk_pop_free(s, (wolfSSL_sk_freefunc)f);
  10580. }
  10581. int wolfSSL_sk_X509_OBJECT_push(WOLFSSL_STACK* sk, WOLFSSL_X509_OBJECT* obj)
  10582. {
  10583. WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_push");
  10584. if (sk == NULL || obj == NULL) {
  10585. return WOLFSSL_FAILURE;
  10586. }
  10587. return wolfSSL_sk_push(sk, obj);
  10588. }
  10589. #endif /* OPENSSL_ALL */
  10590. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  10591. /* unlike wolfSSL_X509_NAME_dup this does not malloc a duplicate, only deep
  10592. * copy. "to" is expected to be a fresh blank name, if not pointers could be
  10593. * lost */
  10594. int wolfSSL_X509_NAME_copy(WOLFSSL_X509_NAME* from, WOLFSSL_X509_NAME* to)
  10595. {
  10596. int i;
  10597. WOLFSSL_X509_NAME_ENTRY* ne;
  10598. WOLFSSL_ENTER("wolfSSL_X509_NAME_copy");
  10599. if (from == NULL || to == NULL) {
  10600. WOLFSSL_MSG("NULL parameter");
  10601. return BAD_FUNC_ARG;
  10602. }
  10603. #if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) || defined(HAVE_LIGHTY)
  10604. if (from->rawLen > 0) {
  10605. if (from->rawLen > ASN_NAME_MAX) {
  10606. WOLFSSL_MSG("Bad raw size");
  10607. return BAD_FUNC_ARG;
  10608. }
  10609. XMEMCPY(to->raw, from->raw, from->rawLen);
  10610. to->rawLen = from->rawLen;
  10611. }
  10612. #endif
  10613. if (from->dynamicName) {
  10614. to->name = (char*)XMALLOC(from->sz, to->heap, DYNAMIC_TYPE_SUBJECT_CN);
  10615. if (to->name == NULL)
  10616. return WOLFSSL_FAILURE;
  10617. to->dynamicName = 1;
  10618. }
  10619. XMEMCPY(to->name, from->name, from->sz);
  10620. to->sz = from->sz;
  10621. for (i = 0; i < MAX_NAME_ENTRIES; i++) {
  10622. ne = wolfSSL_X509_NAME_get_entry(from, i);
  10623. if (ne != NULL)
  10624. wolfSSL_X509_NAME_add_entry(to, ne, i, 1);
  10625. }
  10626. to->entrySz = from->entrySz;
  10627. return WOLFSSL_SUCCESS;
  10628. }
  10629. /* copies over information from "name" to the "cert" subject name
  10630. * returns WOLFSSL_SUCCESS on success */
  10631. int wolfSSL_X509_set_subject_name(WOLFSSL_X509 *cert, WOLFSSL_X509_NAME *name)
  10632. {
  10633. WOLFSSL_ENTER("X509_set_subject_name");
  10634. if (cert == NULL || name == NULL)
  10635. return WOLFSSL_FAILURE;
  10636. FreeX509Name(&cert->subject);
  10637. InitX509Name(&cert->subject, 0, cert->heap);
  10638. if (wolfSSL_X509_NAME_copy(name, &cert->subject) != WOLFSSL_SUCCESS) {
  10639. FreeX509Name(&cert->subject);
  10640. return WOLFSSL_FAILURE;
  10641. }
  10642. cert->subject.x509 = cert;
  10643. return WOLFSSL_SUCCESS;
  10644. }
  10645. /* copies over information from "name" to the "cert" issuer name
  10646. * returns WOLFSSL_SUCCESS on success */
  10647. int wolfSSL_X509_set_issuer_name(WOLFSSL_X509 *cert, WOLFSSL_X509_NAME *name)
  10648. {
  10649. WOLFSSL_ENTER("X509_set_issuer_name");
  10650. if (cert == NULL || name == NULL)
  10651. return WOLFSSL_FAILURE;
  10652. FreeX509Name(&cert->issuer);
  10653. InitX509Name(&cert->issuer, 0, cert->heap);
  10654. if (wolfSSL_X509_NAME_copy(name, &cert->issuer) != WOLFSSL_SUCCESS) {
  10655. FreeX509Name(&cert->issuer);
  10656. return WOLFSSL_FAILURE;
  10657. }
  10658. cert->issuer.x509 = cert;
  10659. cert->issuerSet = 1;
  10660. return WOLFSSL_SUCCESS;
  10661. }
  10662. int wolfSSL_X509_set_notAfter(WOLFSSL_X509* x509, const WOLFSSL_ASN1_TIME* t)
  10663. {
  10664. if (x509 == NULL || t == NULL) {
  10665. return WOLFSSL_FAILURE;
  10666. }
  10667. x509->notAfter.type = t->type;
  10668. x509->notAfter.length = t->length;
  10669. XMEMCPY(x509->notAfter.data, t->data, CTC_DATE_SIZE);
  10670. return WOLFSSL_SUCCESS;
  10671. }
  10672. int wolfSSL_X509_set_notBefore(WOLFSSL_X509* x509, const WOLFSSL_ASN1_TIME* t)
  10673. {
  10674. if (x509 == NULL || t == NULL) {
  10675. return WOLFSSL_FAILURE;
  10676. }
  10677. x509->notBefore.type = t->type;
  10678. x509->notBefore.length = t->length;
  10679. XMEMCPY(x509->notBefore.data, t->data, CTC_DATE_SIZE);
  10680. return WOLFSSL_SUCCESS;
  10681. }
  10682. int wolfSSL_X509_set_serialNumber(WOLFSSL_X509* x509, WOLFSSL_ASN1_INTEGER* s)
  10683. {
  10684. WOLFSSL_ENTER("wolfSSL_X509_set_serialNumber");
  10685. if (!x509 || !s || s->length >= EXTERNAL_SERIAL_SIZE)
  10686. return WOLFSSL_FAILURE;
  10687. /* WOLFSSL_ASN1_INTEGER has type | size | data
  10688. * Sanity check that the data is actually in ASN format */
  10689. if (s->length < 3 && s->data[0] != ASN_INTEGER &&
  10690. s->data[1] != s->length - 2) {
  10691. return WOLFSSL_FAILURE;
  10692. }
  10693. XMEMCPY(x509->serial, s->data + 2, s->length - 2);
  10694. x509->serialSz = s->length - 2;
  10695. x509->serial[s->length] = 0;
  10696. return WOLFSSL_SUCCESS;
  10697. }
  10698. int wolfSSL_X509_set_pubkey(WOLFSSL_X509 *cert, WOLFSSL_EVP_PKEY *pkey)
  10699. {
  10700. byte* p = NULL;
  10701. int derSz = 0;
  10702. WOLFSSL_ENTER("wolfSSL_X509_set_pubkey");
  10703. if (cert == NULL || pkey == NULL)
  10704. return WOLFSSL_FAILURE;
  10705. /* Regenerate since pkey->pkey.ptr may contain private key */
  10706. switch (pkey->type) {
  10707. #if (defined(WOLFSSL_KEY_GEN) || defined(OPENSSL_EXTRA)) && !defined(NO_RSA)
  10708. case EVP_PKEY_RSA:
  10709. {
  10710. RsaKey* rsa;
  10711. if (pkey->rsa == NULL || pkey->rsa->internal == NULL)
  10712. return WOLFSSL_FAILURE;
  10713. rsa = (RsaKey*)pkey->rsa->internal;
  10714. derSz = wc_RsaPublicKeyDerSize(rsa, 1);
  10715. if (derSz <= 0)
  10716. return WOLFSSL_FAILURE;
  10717. p = (byte*)XMALLOC(derSz, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
  10718. if (p == NULL)
  10719. return WOLFSSL_FAILURE;
  10720. if ((derSz = wc_RsaKeyToPublicDer(rsa, p, derSz)) <= 0) {
  10721. XFREE(p, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
  10722. return WOLFSSL_FAILURE;
  10723. }
  10724. cert->pubKeyOID = RSAk;
  10725. }
  10726. break;
  10727. #endif /* (WOLFSSL_KEY_GEN || OPENSSL_EXTRA) && !NO_RSA */
  10728. #if !defined(HAVE_SELFTEST) && (defined(WOLFSSL_KEY_GEN) || \
  10729. defined(WOLFSSL_CERT_GEN)) && !defined(NO_DSA)
  10730. case EVP_PKEY_DSA:
  10731. {
  10732. DsaKey* dsa;
  10733. if (pkey->dsa == NULL || pkey->dsa->internal == NULL)
  10734. return WOLFSSL_FAILURE;
  10735. dsa = (DsaKey*)pkey->dsa->internal;
  10736. /* size of pub, priv, p, q, g + ASN.1 additional information */
  10737. derSz = 5 * mp_unsigned_bin_size(&dsa->g) + MAX_ALGO_SZ;
  10738. p = (byte*)XMALLOC(derSz, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
  10739. if (p == NULL)
  10740. return WOLFSSL_FAILURE;
  10741. if ((derSz = wc_DsaKeyToPublicDer(dsa, p, derSz)) <= 0) {
  10742. XFREE(p, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
  10743. return WOLFSSL_FAILURE;
  10744. }
  10745. cert->pubKeyOID = RSAk;
  10746. }
  10747. break;
  10748. #endif /* !HAVE_SELFTEST && (WOLFSSL_KEY_GEN || WOLFSSL_CERT_GEN) && !NO_DSA */
  10749. #ifdef HAVE_ECC
  10750. case EVP_PKEY_EC:
  10751. {
  10752. ecc_key* ecc;
  10753. if (pkey->ecc == NULL || pkey->ecc->internal == NULL)
  10754. return WOLFSSL_FAILURE;
  10755. ecc = (ecc_key*)pkey->ecc->internal;
  10756. derSz = wc_EccPublicKeyDerSize(ecc, 1);
  10757. if (derSz <= 0)
  10758. return WOLFSSL_FAILURE;
  10759. p = (byte*)XMALLOC(derSz, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
  10760. if (p == NULL)
  10761. return WOLFSSL_FAILURE;
  10762. if ((derSz = wc_EccPublicKeyToDer(ecc, p, derSz, 1)) <= 0) {
  10763. XFREE(p, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
  10764. return WOLFSSL_FAILURE;
  10765. }
  10766. cert->pubKeyOID = ECDSAk;
  10767. }
  10768. break;
  10769. #endif
  10770. default:
  10771. return WOLFSSL_FAILURE;
  10772. }
  10773. cert->pubKey.buffer = p;
  10774. cert->pubKey.length = derSz;
  10775. return WOLFSSL_SUCCESS;
  10776. }
  10777. int wolfSSL_X509_set_version(WOLFSSL_X509* x509, long v)
  10778. {
  10779. WOLFSSL_ENTER("wolfSSL_X509_set_version");
  10780. if ((x509 == NULL) || (v < 0) || (v >= INT_MAX)) {
  10781. return WOLFSSL_FAILURE;
  10782. }
  10783. x509->version = (int) v + 1;
  10784. return WOLFSSL_SUCCESS;
  10785. }
  10786. #endif /* (OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL) && WOLFSSL_CERT_GEN */
  10787. #if defined(OPENSSL_ALL) && \
  10788. defined(WOLFSSL_CERT_GEN) && defined(WOLFSSL_CERT_REQ)
  10789. void wolfSSL_X509V3_set_ctx(WOLFSSL_X509V3_CTX* ctx, WOLFSSL_X509* issuer,
  10790. WOLFSSL_X509* subject, WOLFSSL_X509* req, WOLFSSL_X509_CRL* crl,
  10791. int flag)
  10792. {
  10793. int ret = WOLFSSL_SUCCESS;
  10794. WOLFSSL_ENTER("wolfSSL_X509V3_set_ctx");
  10795. if (!ctx)
  10796. return;
  10797. /* not checking ctx->x509 for null first since app won't have initalized
  10798. * this X509V3_CTX before this function call */
  10799. ctx->x509 = wolfSSL_X509_new();
  10800. if (!ctx->x509)
  10801. return;
  10802. /* Set parameters in ctx as long as ret == WOLFSSL_SUCCESS */
  10803. if (issuer)
  10804. ret = wolfSSL_X509_set_issuer_name(ctx->x509,&issuer->issuer);
  10805. if (subject && ret == WOLFSSL_SUCCESS)
  10806. ret = wolfSSL_X509_set_subject_name(ctx->x509,&subject->subject);
  10807. if (req && ret == WOLFSSL_SUCCESS) {
  10808. WOLFSSL_MSG("req not implemented.");
  10809. }
  10810. if (crl && ret == WOLFSSL_SUCCESS) {
  10811. WOLFSSL_MSG("crl not implemented.");
  10812. }
  10813. if (flag && ret == WOLFSSL_SUCCESS) {
  10814. WOLFSSL_MSG("flag not implemented.");
  10815. }
  10816. if (!ret) {
  10817. WOLFSSL_MSG("Error setting WOLFSSL_X509V3_CTX parameters.");
  10818. }
  10819. }
  10820. #ifndef NO_BIO
  10821. int wolfSSL_i2d_X509_REQ(WOLFSSL_X509* req, unsigned char** out)
  10822. {
  10823. int derSz = 0;
  10824. int ret = WOLFSSL_FAILURE;
  10825. WOLFSSL_BIO* bio = NULL;
  10826. WOLFSSL_ENTER("wolfSSL_i2d_X509_REQ");
  10827. if (req == NULL || out == NULL) {
  10828. return BAD_FUNC_ARG;
  10829. }
  10830. if (!(bio = wolfSSL_BIO_new(wolfSSL_BIO_s_mem()))) {
  10831. return WOLFSSL_FAILURE;
  10832. }
  10833. if (wolfSSL_i2d_X509_REQ_bio(bio, req) != WOLFSSL_SUCCESS) {
  10834. WOLFSSL_MSG("wolfSSL_i2d_X509_REQ_bio error");
  10835. goto cleanup;
  10836. }
  10837. derSz = wolfSSL_BIO_get_len(bio);
  10838. if (*out == NULL) {
  10839. *out = (unsigned char*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_OPENSSL);
  10840. if (!*out) {
  10841. WOLFSSL_MSG("malloc error");
  10842. ret = MEMORY_E;
  10843. goto cleanup;
  10844. }
  10845. }
  10846. if (wolfSSL_BIO_read(bio, *out, derSz) != derSz) {
  10847. WOLFSSL_MSG("wolfSSL_BIO_read error");
  10848. goto cleanup;
  10849. }
  10850. ret = derSz;
  10851. cleanup:
  10852. wolfSSL_BIO_free(bio);
  10853. return ret;
  10854. }
  10855. #endif /* !NO_BIO */
  10856. WOLFSSL_X509* wolfSSL_X509_REQ_new(void)
  10857. {
  10858. return wolfSSL_X509_new();
  10859. }
  10860. void wolfSSL_X509_REQ_free(WOLFSSL_X509* req)
  10861. {
  10862. wolfSSL_X509_free(req);
  10863. }
  10864. int wolfSSL_X509_REQ_sign(WOLFSSL_X509 *req, WOLFSSL_EVP_PKEY *pkey,
  10865. const WOLFSSL_EVP_MD *md)
  10866. {
  10867. int ret;
  10868. #ifdef WOLFSSL_SMALL_STACK
  10869. byte* der = NULL;
  10870. #else
  10871. byte der[2048];
  10872. #endif
  10873. int derSz = 2048;
  10874. if (req == NULL || pkey == NULL || md == NULL) {
  10875. WOLFSSL_LEAVE("wolfSSL_X509_REQ_sign", BAD_FUNC_ARG);
  10876. return WOLFSSL_FAILURE;
  10877. }
  10878. #ifdef WOLFSSL_SMALL_STACK
  10879. der = (byte*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  10880. if (der == NULL) {
  10881. return WOLFSSL_FAILURE;
  10882. }
  10883. #endif
  10884. /* Create a Cert that has the certificate request fields. */
  10885. req->sigOID = wolfSSL_sigTypeFromPKEY((WOLFSSL_EVP_MD*)md, pkey);
  10886. ret = wolfssl_x509_make_der(req, 1, der, &derSz, 0);
  10887. if (ret != WOLFSSL_SUCCESS) {
  10888. #ifdef WOLFSSL_SMALL_STACK
  10889. XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  10890. #endif
  10891. WOLFSSL_MSG("Unable to make DER for X509");
  10892. WOLFSSL_LEAVE("wolfSSL_X509_REQ_sign", ret);
  10893. return WOLFSSL_FAILURE;
  10894. }
  10895. if (wolfSSL_X509_resign_cert(req, 1, der, 2048, derSz,
  10896. (WOLFSSL_EVP_MD*)md, pkey) <= 0) {
  10897. #ifdef WOLFSSL_SMALL_STACK
  10898. XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  10899. #endif
  10900. return WOLFSSL_FAILURE;
  10901. }
  10902. #ifdef WOLFSSL_SMALL_STACK
  10903. XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  10904. #endif
  10905. return WOLFSSL_SUCCESS;
  10906. }
  10907. int wolfSSL_X509_REQ_sign_ctx(WOLFSSL_X509 *req,
  10908. WOLFSSL_EVP_MD_CTX* md_ctx)
  10909. {
  10910. if (md_ctx && md_ctx->pctx)
  10911. return wolfSSL_X509_REQ_sign(req, md_ctx->pctx->pkey,
  10912. wolfSSL_EVP_MD_CTX_md(md_ctx));
  10913. else
  10914. return WOLFSSL_FAILURE;
  10915. }
  10916. static int regenX509REQDerBuffer(WOLFSSL_X509* x509)
  10917. {
  10918. int derSz = X509_BUFFER_SZ;
  10919. int ret = WOLFSSL_FAILURE;
  10920. #ifdef WOLFSSL_SMALL_STACK
  10921. byte* der;
  10922. der = (byte*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  10923. if (!der) {
  10924. WOLFSSL_MSG("malloc failed");
  10925. return WOLFSSL_FAILURE;
  10926. }
  10927. #else
  10928. byte der[X509_BUFFER_SZ];
  10929. #endif
  10930. if (wolfssl_x509_make_der(x509, 1, der, &derSz, 0) == WOLFSSL_SUCCESS) {
  10931. FreeDer(&x509->derCert);
  10932. if (AllocDer(&x509->derCert, derSz, CERT_TYPE, x509->heap) == 0) {
  10933. XMEMCPY(x509->derCert->buffer, der, derSz);
  10934. ret = WOLFSSL_SUCCESS;
  10935. }
  10936. else {
  10937. WOLFSSL_MSG("Failed to allocate DER buffer for X509");
  10938. }
  10939. }
  10940. else {
  10941. WOLFSSL_MSG("Unable to make DER for X509 REQ");
  10942. }
  10943. #ifdef WOLFSSL_SMALL_STACK
  10944. XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  10945. #endif
  10946. return ret;
  10947. }
  10948. int wolfSSL_X509_REQ_add_extensions(WOLFSSL_X509* req,
  10949. WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* ext_sk)
  10950. {
  10951. if (!req || !ext_sk) {
  10952. WOLFSSL_MSG("Bad parameter");
  10953. return WOLFSSL_FAILURE;
  10954. }
  10955. while (ext_sk) {
  10956. WOLFSSL_X509_EXTENSION* ext = ext_sk->data.ext;
  10957. if (wolfSSL_X509_add_ext(req, ext, -1) != WOLFSSL_SUCCESS) {
  10958. WOLFSSL_MSG("wolfSSL_X509_add_ext error");
  10959. return WOLFSSL_FAILURE;
  10960. }
  10961. ext_sk = ext_sk->next;
  10962. }
  10963. return regenX509REQDerBuffer(req);
  10964. }
  10965. int wolfSSL_X509_REQ_add1_attr_by_txt(WOLFSSL_X509 *req,
  10966. const char *attrname, int type,
  10967. const unsigned char *bytes, int len)
  10968. {
  10969. WOLFSSL_ENTER("wolfSSL_X509_REQ_add1_attr_by_txt");
  10970. #ifdef HAVE_LIBEST
  10971. if (!req || !attrname || !bytes || type != MBSTRING_ASC) {
  10972. WOLFSSL_MSG("Bad parameter");
  10973. return WOLFSSL_FAILURE;
  10974. }
  10975. if (len < 0) {
  10976. len = (int)XSTRLEN((char*)bytes);
  10977. }
  10978. /* For now just pretend that we support this for libest testing */
  10979. if (len == XSTR_SIZEOF("1.3.6.1.1.1.1.22") &&
  10980. XMEMCMP("1.3.6.1.1.1.1.22", bytes, len) == 0) {
  10981. /* MAC Address */
  10982. }
  10983. else if (len == XSTR_SIZEOF("1.2.840.10045.2.1") &&
  10984. XMEMCMP("1.2.840.10045.2.1", bytes, len) == 0) {
  10985. /* ecPublicKey */
  10986. }
  10987. else if (len == XSTR_SIZEOF("1.2.840.10045.4.3.3") &&
  10988. XMEMCMP("1.2.840.10045.4.3.3", bytes, len) == 0) {
  10989. /* ecdsa-with-SHA384 */
  10990. }
  10991. else {
  10992. return WOLFSSL_FAILURE;
  10993. }
  10994. /* return error if not built for libest */
  10995. return WOLFSSL_SUCCESS;
  10996. #else
  10997. (void)req;
  10998. (void)attrname;
  10999. (void)type;
  11000. (void)bytes;
  11001. (void)len;
  11002. return WOLFSSL_FAILURE;
  11003. #endif
  11004. }
  11005. static int wolfSSL_X509_ATTRIBUTE_set(WOLFSSL_X509_ATTRIBUTE* attr,
  11006. const char* data, int dataSz, int type, int nid)
  11007. {
  11008. if (attr) {
  11009. attr->value->value.asn1_string = wolfSSL_ASN1_STRING_new();
  11010. if (wolfSSL_ASN1_STRING_set(attr->value->value.asn1_string,
  11011. data, dataSz) != WOLFSSL_SUCCESS) {
  11012. wolfSSL_ASN1_STRING_free(attr->value->value.asn1_string);
  11013. WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
  11014. return WOLFSSL_FAILURE;
  11015. }
  11016. attr->value->type = type;
  11017. attr->object->nid = nid;
  11018. }
  11019. else {
  11020. WOLFSSL_MSG("wolfSSL_X509_ATTRIBUTE_new error");
  11021. return WOLFSSL_FAILURE;
  11022. }
  11023. return WOLFSSL_SUCCESS;
  11024. }
  11025. int wolfSSL_X509_REQ_add1_attr_by_NID(WOLFSSL_X509 *req,
  11026. int nid, int type,
  11027. const unsigned char *bytes,
  11028. int len)
  11029. {
  11030. int ret;
  11031. WOLFSSL_X509_ATTRIBUTE* attr;
  11032. WOLFSSL_ENTER("wolfSSL_X509_REQ_add1_attr_by_NID");
  11033. if (!req || !bytes || type != MBSTRING_ASC) {
  11034. WOLFSSL_MSG("Bad parameter");
  11035. return WOLFSSL_FAILURE;
  11036. }
  11037. switch (nid) {
  11038. case NID_pkcs9_challengePassword:
  11039. if (len < 0)
  11040. len = (int)XSTRLEN((char*)bytes);
  11041. if (len < CTC_NAME_SIZE) {
  11042. XMEMCPY(req->challengePw, bytes, len);
  11043. req->challengePw[len] = '\0';
  11044. }
  11045. else {
  11046. WOLFSSL_MSG("Challenge password too long");
  11047. return WOLFSSL_FAILURE;
  11048. }
  11049. break;
  11050. case NID_serialNumber:
  11051. if (len < 0)
  11052. len = (int)XSTRLEN((char*)bytes);
  11053. if (len + 1 > EXTERNAL_SERIAL_SIZE) {
  11054. WOLFSSL_MSG("SerialNumber too long");
  11055. return WOLFSSL_FAILURE;
  11056. }
  11057. XMEMCPY(req->serial, bytes, len);
  11058. req->serialSz = len;
  11059. break;
  11060. case NID_pkcs9_unstructuredName:
  11061. case NID_pkcs9_contentType:
  11062. case NID_surname:
  11063. case NID_initials:
  11064. case NID_givenName:
  11065. case NID_dnQualifier:
  11066. break;
  11067. default:
  11068. WOLFSSL_MSG("Unsupported attribute");
  11069. return WOLFSSL_FAILURE;
  11070. }
  11071. attr = wolfSSL_X509_ATTRIBUTE_new();
  11072. ret = wolfSSL_X509_ATTRIBUTE_set(attr, (const char*)bytes, len,
  11073. V_ASN1_PRINTABLESTRING, nid);
  11074. if (ret != WOLFSSL_SUCCESS) {
  11075. wolfSSL_X509_ATTRIBUTE_free(attr);
  11076. }
  11077. else {
  11078. if (req->reqAttributes == NULL) {
  11079. req->reqAttributes = wolfSSL_sk_new_node(req->heap);
  11080. req->reqAttributes->type = STACK_TYPE_X509_REQ_ATTR;
  11081. }
  11082. ret = wolfSSL_sk_push(req->reqAttributes, attr);
  11083. }
  11084. return ret;
  11085. }
  11086. WOLFSSL_X509 *wolfSSL_X509_to_X509_REQ(WOLFSSL_X509 *x,
  11087. WOLFSSL_EVP_PKEY *pkey, const WOLFSSL_EVP_MD *md)
  11088. {
  11089. WOLFSSL_ENTER("wolfSSL_X509_to_X509_REQ");
  11090. (void)pkey;
  11091. (void)md;
  11092. return wolfSSL_X509_dup(x);
  11093. }
  11094. int wolfSSL_X509_REQ_set_subject_name(WOLFSSL_X509 *req,
  11095. WOLFSSL_X509_NAME *name)
  11096. {
  11097. return wolfSSL_X509_set_subject_name(req, name);
  11098. }
  11099. int wolfSSL_X509_REQ_set_pubkey(WOLFSSL_X509 *req, WOLFSSL_EVP_PKEY *pkey)
  11100. {
  11101. return wolfSSL_X509_set_pubkey(req, pkey);
  11102. }
  11103. #endif /* OPENSSL_ALL && WOLFSSL_CERT_GEN && WOLFSSL_CERT_REQ */
  11104. #if defined(OPENSSL_ALL) && \
  11105. (defined(WOLFSSL_CERT_GEN) || defined(WOLFSSL_CERT_REQ))
  11106. WOLFSSL_ASN1_TYPE *wolfSSL_X509_ATTRIBUTE_get0_type(
  11107. WOLFSSL_X509_ATTRIBUTE *attr, int idx)
  11108. {
  11109. WOLFSSL_ENTER("wolfSSL_X509_ATTRIBUTE_get0_type");
  11110. if (!attr || idx != 0) {
  11111. WOLFSSL_MSG("Bad parameter");
  11112. return NULL;
  11113. }
  11114. return attr->value;
  11115. }
  11116. /**
  11117. * @param req X509_REQ containing attribute
  11118. * @return the number of attributes
  11119. */
  11120. int wolfSSL_X509_REQ_get_attr_count(const WOLFSSL_X509 *req)
  11121. {
  11122. if (req == NULL || req->reqAttributes == NULL)
  11123. return 0;
  11124. return wolfSSL_sk_num(req->reqAttributes);
  11125. }
  11126. /**
  11127. * @param req X509_REQ containing attribute
  11128. * @param loc NID of the attribute to return
  11129. */
  11130. WOLFSSL_X509_ATTRIBUTE *wolfSSL_X509_REQ_get_attr(
  11131. const WOLFSSL_X509 *req, int loc)
  11132. {
  11133. WOLFSSL_ENTER("wolfSSL_X509_REQ_get_attr");
  11134. if (!req || req->reqAttributes == NULL) {
  11135. WOLFSSL_MSG("Bad parameter");
  11136. return NULL;
  11137. }
  11138. return (WOLFSSL_X509_ATTRIBUTE*)wolfSSL_sk_value(req->reqAttributes, loc);
  11139. }
  11140. /* Return NID as the attr index */
  11141. int wolfSSL_X509_REQ_get_attr_by_NID(const WOLFSSL_X509 *req,
  11142. int nid, int lastpos)
  11143. {
  11144. WOLFSSL_STACK* sk;
  11145. int idx;
  11146. WOLFSSL_ENTER("wolfSSL_X509_REQ_get_attr_by_NID");
  11147. if (!req) {
  11148. WOLFSSL_MSG("Bad parameter");
  11149. return WOLFSSL_FATAL_ERROR;
  11150. }
  11151. /* search through stack for first matching nid */
  11152. idx = lastpos + 1;
  11153. do {
  11154. sk = wolfSSL_sk_get_node(req->reqAttributes, idx);
  11155. if (sk != NULL) {
  11156. WOLFSSL_X509_ATTRIBUTE* attr;
  11157. attr = (WOLFSSL_X509_ATTRIBUTE*)sk->data.generic;
  11158. if (nid == attr->object->nid) {
  11159. /* found a match */
  11160. break;
  11161. }
  11162. }
  11163. idx++;
  11164. } while (sk != NULL);
  11165. /* no matches found */
  11166. if (sk == NULL) {
  11167. idx = WOLFSSL_FATAL_ERROR;
  11168. }
  11169. return idx;
  11170. }
  11171. WOLFSSL_X509_ATTRIBUTE* wolfSSL_X509_ATTRIBUTE_new(void)
  11172. {
  11173. WOLFSSL_X509_ATTRIBUTE* ret;
  11174. WOLFSSL_ENTER("wolfSSL_X509_ATTRIBUTE_new");
  11175. ret = (WOLFSSL_X509_ATTRIBUTE*)XMALLOC(sizeof(WOLFSSL_X509_ATTRIBUTE),
  11176. NULL, DYNAMIC_TYPE_OPENSSL);
  11177. if (!ret) {
  11178. WOLFSSL_MSG("malloc error");
  11179. return NULL;
  11180. }
  11181. XMEMSET(ret, 0, sizeof(WOLFSSL_X509_ATTRIBUTE));
  11182. ret->object = wolfSSL_ASN1_OBJECT_new();
  11183. ret->value = wolfSSL_ASN1_TYPE_new();
  11184. /* Don't allocate ret->set since WOLFSSL_ASN1_TYPE
  11185. * is not supported as a stack type */
  11186. if (!ret->object || !ret->value) {
  11187. WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new or wolfSSL_ASN1_TYPE_new error");
  11188. wolfSSL_X509_ATTRIBUTE_free(ret);
  11189. return NULL;
  11190. }
  11191. return ret;
  11192. }
  11193. void wolfSSL_X509_ATTRIBUTE_free(WOLFSSL_X509_ATTRIBUTE* attr)
  11194. {
  11195. WOLFSSL_ENTER("wolfSSL_X509_ATTRIBUTE_free");
  11196. if (attr) {
  11197. if (attr->object) {
  11198. wolfSSL_ASN1_OBJECT_free(attr->object);
  11199. }
  11200. if (attr->value) {
  11201. wolfSSL_ASN1_TYPE_free(attr->value);
  11202. }
  11203. if (attr->set) {
  11204. wolfSSL_sk_pop_free(attr->set, NULL);
  11205. }
  11206. XFREE(attr, NULL, DYNAMIC_TYPE_OPENSSL);
  11207. }
  11208. }
  11209. #endif
  11210. #endif /* !NO_CERT */
  11211. #endif /* !WOLFCRYPT_ONLY */
  11212. #endif /* WOLFSSL_X509_INCLUDED */