x509.c 415 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389339033913392339333943395339633973398339934003401340234033404340534063407340834093410341134123413341434153416341734183419342034213422342334243425342634273428342934303431343234333434343534363437343834393440344134423443344434453446344734483449345034513452345334543455345634573458345934603461346234633464346534663467346834693470347134723473347434753476347734783479348034813482348334843485348634873488348934903491349234933494349534963497349834993500350135023503350435053506350735083509351035113512351335143515351635173518351935203521352235233524352535263527352835293530353135323533353435353536353735383539354035413542354335443545354635473548354935503551355235533554355535563557355835593560356135623563356435653566356735683569357035713572357335743575357635773578357935803581358235833584358535863587358835893590359135923593359435953596359735983599360036013602360336043605360636073608360936103611361236133614361536163617361836193620362136223623362436253626362736283629363036313632363336343635363636373638363936403641364236433644364536463647364836493650365136523653365436553656365736583659366036613662366336643665366636673668366936703671367236733674367536763677367836793680368136823683368436853686368736883689369036913692369336943695369636973698369937003701370237033704370537063707370837093710371137123713371437153716371737183719372037213722372337243725372637273728372937303731373237333734373537363737373837393740374137423743374437453746374737483749375037513752375337543755375637573758375937603761376237633764376537663767376837693770377137723773377437753776377737783779378037813782378337843785378637873788378937903791379237933794379537963797379837993800380138023803380438053806380738083809381038113812381338143815381638173818381938203821382238233824382538263827382838293830383138323833383438353836383738383839384038413842384338443845384638473848384938503851385238533854385538563857385838593860386138623863386438653866386738683869387038713872387338743875387638773878387938803881388238833884388538863887388838893890389138923893389438953896389738983899390039013902390339043905390639073908390939103911391239133914391539163917391839193920392139223923392439253926392739283929393039313932393339343935393639373938393939403941394239433944394539463947394839493950395139523953395439553956395739583959396039613962396339643965396639673968396939703971397239733974397539763977397839793980398139823983398439853986398739883989399039913992399339943995399639973998399940004001400240034004400540064007400840094010401140124013401440154016401740184019402040214022402340244025402640274028402940304031403240334034403540364037403840394040404140424043404440454046404740484049405040514052405340544055405640574058405940604061406240634064406540664067406840694070407140724073407440754076407740784079408040814082408340844085408640874088408940904091409240934094409540964097409840994100410141024103410441054106410741084109411041114112411341144115411641174118411941204121412241234124412541264127412841294130413141324133413441354136413741384139414041414142414341444145414641474148414941504151415241534154415541564157415841594160416141624163416441654166416741684169417041714172417341744175417641774178417941804181418241834184418541864187418841894190419141924193419441954196419741984199420042014202420342044205420642074208420942104211421242134214421542164217421842194220422142224223422442254226422742284229423042314232423342344235423642374238423942404241424242434244424542464247424842494250425142524253425442554256425742584259426042614262426342644265426642674268426942704271427242734274427542764277427842794280428142824283428442854286428742884289429042914292429342944295429642974298429943004301430243034304430543064307430843094310431143124313431443154316431743184319432043214322432343244325432643274328432943304331433243334334433543364337433843394340434143424343434443454346434743484349435043514352435343544355435643574358435943604361436243634364436543664367436843694370437143724373437443754376437743784379438043814382438343844385438643874388438943904391439243934394439543964397439843994400440144024403440444054406440744084409441044114412441344144415441644174418441944204421442244234424442544264427442844294430443144324433443444354436443744384439444044414442444344444445444644474448444944504451445244534454445544564457445844594460446144624463446444654466446744684469447044714472447344744475447644774478447944804481448244834484448544864487448844894490449144924493449444954496449744984499450045014502450345044505450645074508450945104511451245134514451545164517451845194520452145224523452445254526452745284529453045314532453345344535453645374538453945404541454245434544454545464547454845494550455145524553455445554556455745584559456045614562456345644565456645674568456945704571457245734574457545764577457845794580458145824583458445854586458745884589459045914592459345944595459645974598459946004601460246034604460546064607460846094610461146124613461446154616461746184619462046214622462346244625462646274628462946304631463246334634463546364637463846394640464146424643464446454646464746484649465046514652465346544655465646574658465946604661466246634664466546664667466846694670467146724673467446754676467746784679468046814682468346844685468646874688468946904691469246934694469546964697469846994700470147024703470447054706470747084709471047114712471347144715471647174718471947204721472247234724472547264727472847294730473147324733473447354736473747384739474047414742474347444745474647474748474947504751475247534754475547564757475847594760476147624763476447654766476747684769477047714772477347744775477647774778477947804781478247834784478547864787478847894790479147924793479447954796479747984799480048014802480348044805480648074808480948104811481248134814481548164817481848194820482148224823482448254826482748284829483048314832483348344835483648374838483948404841484248434844484548464847484848494850485148524853485448554856485748584859486048614862486348644865486648674868486948704871487248734874487548764877487848794880488148824883488448854886488748884889489048914892489348944895489648974898489949004901490249034904490549064907490849094910491149124913491449154916491749184919492049214922492349244925492649274928492949304931493249334934493549364937493849394940494149424943494449454946494749484949495049514952495349544955495649574958495949604961496249634964496549664967496849694970497149724973497449754976497749784979498049814982498349844985498649874988498949904991499249934994499549964997499849995000500150025003500450055006500750085009501050115012501350145015501650175018501950205021502250235024502550265027502850295030503150325033503450355036503750385039504050415042504350445045504650475048504950505051505250535054505550565057505850595060506150625063506450655066506750685069507050715072507350745075507650775078507950805081508250835084508550865087508850895090509150925093509450955096509750985099510051015102510351045105510651075108510951105111511251135114511551165117511851195120512151225123512451255126512751285129513051315132513351345135513651375138513951405141514251435144514551465147514851495150515151525153515451555156515751585159516051615162516351645165516651675168516951705171517251735174517551765177517851795180518151825183518451855186518751885189519051915192519351945195519651975198519952005201520252035204520552065207520852095210521152125213521452155216521752185219522052215222522352245225522652275228522952305231523252335234523552365237523852395240524152425243524452455246524752485249525052515252525352545255525652575258525952605261526252635264526552665267526852695270527152725273527452755276527752785279528052815282528352845285528652875288528952905291529252935294529552965297529852995300530153025303530453055306530753085309531053115312531353145315531653175318531953205321532253235324532553265327532853295330533153325333533453355336533753385339534053415342534353445345534653475348534953505351535253535354535553565357535853595360536153625363536453655366536753685369537053715372537353745375537653775378537953805381538253835384538553865387538853895390539153925393539453955396539753985399540054015402540354045405540654075408540954105411541254135414541554165417541854195420542154225423542454255426542754285429543054315432543354345435543654375438543954405441544254435444544554465447544854495450545154525453545454555456545754585459546054615462546354645465546654675468546954705471547254735474547554765477547854795480548154825483548454855486548754885489549054915492549354945495549654975498549955005501550255035504550555065507550855095510551155125513551455155516551755185519552055215522552355245525552655275528552955305531553255335534553555365537553855395540554155425543554455455546554755485549555055515552555355545555555655575558555955605561556255635564556555665567556855695570557155725573557455755576557755785579558055815582558355845585558655875588558955905591559255935594559555965597559855995600560156025603560456055606560756085609561056115612561356145615561656175618561956205621562256235624562556265627562856295630563156325633563456355636563756385639564056415642564356445645564656475648564956505651565256535654565556565657565856595660566156625663566456655666566756685669567056715672567356745675567656775678567956805681568256835684568556865687568856895690569156925693569456955696569756985699570057015702570357045705570657075708570957105711571257135714571557165717571857195720572157225723572457255726572757285729573057315732573357345735573657375738573957405741574257435744574557465747574857495750575157525753575457555756575757585759576057615762576357645765576657675768576957705771577257735774577557765777577857795780578157825783578457855786578757885789579057915792579357945795579657975798579958005801580258035804580558065807580858095810581158125813581458155816581758185819582058215822582358245825582658275828582958305831583258335834583558365837583858395840584158425843584458455846584758485849585058515852585358545855585658575858585958605861586258635864586558665867586858695870587158725873587458755876587758785879588058815882588358845885588658875888588958905891589258935894589558965897589858995900590159025903590459055906590759085909591059115912591359145915591659175918591959205921592259235924592559265927592859295930593159325933593459355936593759385939594059415942594359445945594659475948594959505951595259535954595559565957595859595960596159625963596459655966596759685969597059715972597359745975597659775978597959805981598259835984598559865987598859895990599159925993599459955996599759985999600060016002600360046005600660076008600960106011601260136014601560166017601860196020602160226023602460256026602760286029603060316032603360346035603660376038603960406041604260436044604560466047604860496050605160526053605460556056605760586059606060616062606360646065606660676068606960706071607260736074607560766077607860796080608160826083608460856086608760886089609060916092609360946095609660976098609961006101610261036104610561066107610861096110611161126113611461156116611761186119612061216122612361246125612661276128612961306131613261336134613561366137613861396140614161426143614461456146614761486149615061516152615361546155615661576158615961606161616261636164616561666167616861696170617161726173617461756176617761786179618061816182618361846185618661876188618961906191619261936194619561966197619861996200620162026203620462056206620762086209621062116212621362146215621662176218621962206221622262236224622562266227622862296230623162326233623462356236623762386239624062416242624362446245624662476248624962506251625262536254625562566257625862596260626162626263626462656266626762686269627062716272627362746275627662776278627962806281628262836284628562866287628862896290629162926293629462956296629762986299630063016302630363046305630663076308630963106311631263136314631563166317631863196320632163226323632463256326632763286329633063316332633363346335633663376338633963406341634263436344634563466347634863496350635163526353635463556356635763586359636063616362636363646365636663676368636963706371637263736374637563766377637863796380638163826383638463856386638763886389639063916392639363946395639663976398639964006401640264036404640564066407640864096410641164126413641464156416641764186419642064216422642364246425642664276428642964306431643264336434643564366437643864396440644164426443644464456446644764486449645064516452645364546455645664576458645964606461646264636464646564666467646864696470647164726473647464756476647764786479648064816482648364846485648664876488648964906491649264936494649564966497649864996500650165026503650465056506650765086509651065116512651365146515651665176518651965206521652265236524652565266527652865296530653165326533653465356536653765386539654065416542654365446545654665476548654965506551655265536554655565566557655865596560656165626563656465656566656765686569657065716572657365746575657665776578657965806581658265836584658565866587658865896590659165926593659465956596659765986599660066016602660366046605660666076608660966106611661266136614661566166617661866196620662166226623662466256626662766286629663066316632663366346635663666376638663966406641664266436644664566466647664866496650665166526653665466556656665766586659666066616662666366646665666666676668666966706671667266736674667566766677667866796680668166826683668466856686668766886689669066916692669366946695669666976698669967006701670267036704670567066707670867096710671167126713671467156716671767186719672067216722672367246725672667276728672967306731673267336734673567366737673867396740674167426743674467456746674767486749675067516752675367546755675667576758675967606761676267636764676567666767676867696770677167726773677467756776677767786779678067816782678367846785678667876788678967906791679267936794679567966797679867996800680168026803680468056806680768086809681068116812681368146815681668176818681968206821682268236824682568266827682868296830683168326833683468356836683768386839684068416842684368446845684668476848684968506851685268536854685568566857685868596860686168626863686468656866686768686869687068716872687368746875687668776878687968806881688268836884688568866887688868896890689168926893689468956896689768986899690069016902690369046905690669076908690969106911691269136914691569166917691869196920692169226923692469256926692769286929693069316932693369346935693669376938693969406941694269436944694569466947694869496950695169526953695469556956695769586959696069616962696369646965696669676968696969706971697269736974697569766977697869796980698169826983698469856986698769886989699069916992699369946995699669976998699970007001700270037004700570067007700870097010701170127013701470157016701770187019702070217022702370247025702670277028702970307031703270337034703570367037703870397040704170427043704470457046704770487049705070517052705370547055705670577058705970607061706270637064706570667067706870697070707170727073707470757076707770787079708070817082708370847085708670877088708970907091709270937094709570967097709870997100710171027103710471057106710771087109711071117112711371147115711671177118711971207121712271237124712571267127712871297130713171327133713471357136713771387139714071417142714371447145714671477148714971507151715271537154715571567157715871597160716171627163716471657166716771687169717071717172717371747175717671777178717971807181718271837184718571867187718871897190719171927193719471957196719771987199720072017202720372047205720672077208720972107211721272137214721572167217721872197220722172227223722472257226722772287229723072317232723372347235723672377238723972407241724272437244724572467247724872497250725172527253725472557256725772587259726072617262726372647265726672677268726972707271727272737274727572767277727872797280728172827283728472857286728772887289729072917292729372947295729672977298729973007301730273037304730573067307730873097310731173127313731473157316731773187319732073217322732373247325732673277328732973307331733273337334733573367337733873397340734173427343734473457346734773487349735073517352735373547355735673577358735973607361736273637364736573667367736873697370737173727373737473757376737773787379738073817382738373847385738673877388738973907391739273937394739573967397739873997400740174027403740474057406740774087409741074117412741374147415741674177418741974207421742274237424742574267427742874297430743174327433743474357436743774387439744074417442744374447445744674477448744974507451745274537454745574567457745874597460746174627463746474657466746774687469747074717472747374747475747674777478747974807481748274837484748574867487748874897490749174927493749474957496749774987499750075017502750375047505750675077508750975107511751275137514751575167517751875197520752175227523752475257526752775287529753075317532753375347535753675377538753975407541754275437544754575467547754875497550755175527553755475557556755775587559756075617562756375647565756675677568756975707571757275737574757575767577757875797580758175827583758475857586758775887589759075917592759375947595759675977598759976007601760276037604760576067607760876097610761176127613761476157616761776187619762076217622762376247625762676277628762976307631763276337634763576367637763876397640764176427643764476457646764776487649765076517652765376547655765676577658765976607661766276637664766576667667766876697670767176727673767476757676767776787679768076817682768376847685768676877688768976907691769276937694769576967697769876997700770177027703770477057706770777087709771077117712771377147715771677177718771977207721772277237724772577267727772877297730773177327733773477357736773777387739774077417742774377447745774677477748774977507751775277537754775577567757775877597760776177627763776477657766776777687769777077717772777377747775777677777778777977807781778277837784778577867787778877897790779177927793779477957796779777987799780078017802780378047805780678077808780978107811781278137814781578167817781878197820782178227823782478257826782778287829783078317832783378347835783678377838783978407841784278437844784578467847784878497850785178527853785478557856785778587859786078617862786378647865786678677868786978707871787278737874787578767877787878797880788178827883788478857886788778887889789078917892789378947895789678977898789979007901790279037904790579067907790879097910791179127913791479157916791779187919792079217922792379247925792679277928792979307931793279337934793579367937793879397940794179427943794479457946794779487949795079517952795379547955795679577958795979607961796279637964796579667967796879697970797179727973797479757976797779787979798079817982798379847985798679877988798979907991799279937994799579967997799879998000800180028003800480058006800780088009801080118012801380148015801680178018801980208021802280238024802580268027802880298030803180328033803480358036803780388039804080418042804380448045804680478048804980508051805280538054805580568057805880598060806180628063806480658066806780688069807080718072807380748075807680778078807980808081808280838084808580868087808880898090809180928093809480958096809780988099810081018102810381048105810681078108810981108111811281138114811581168117811881198120812181228123812481258126812781288129813081318132813381348135813681378138813981408141814281438144814581468147814881498150815181528153815481558156815781588159816081618162816381648165816681678168816981708171817281738174817581768177817881798180818181828183818481858186818781888189819081918192819381948195819681978198819982008201820282038204820582068207820882098210821182128213821482158216821782188219822082218222822382248225822682278228822982308231823282338234823582368237823882398240824182428243824482458246824782488249825082518252825382548255825682578258825982608261826282638264826582668267826882698270827182728273827482758276827782788279828082818282828382848285828682878288828982908291829282938294829582968297829882998300830183028303830483058306830783088309831083118312831383148315831683178318831983208321832283238324832583268327832883298330833183328333833483358336833783388339834083418342834383448345834683478348834983508351835283538354835583568357835883598360836183628363836483658366836783688369837083718372837383748375837683778378837983808381838283838384838583868387838883898390839183928393839483958396839783988399840084018402840384048405840684078408840984108411841284138414841584168417841884198420842184228423842484258426842784288429843084318432843384348435843684378438843984408441844284438444844584468447844884498450845184528453845484558456845784588459846084618462846384648465846684678468846984708471847284738474847584768477847884798480848184828483848484858486848784888489849084918492849384948495849684978498849985008501850285038504850585068507850885098510851185128513851485158516851785188519852085218522852385248525852685278528852985308531853285338534853585368537853885398540854185428543854485458546854785488549855085518552855385548555855685578558855985608561856285638564856585668567856885698570857185728573857485758576857785788579858085818582858385848585858685878588858985908591859285938594859585968597859885998600860186028603860486058606860786088609861086118612861386148615861686178618861986208621862286238624862586268627862886298630863186328633863486358636863786388639864086418642864386448645864686478648864986508651865286538654865586568657865886598660866186628663866486658666866786688669867086718672867386748675867686778678867986808681868286838684868586868687868886898690869186928693869486958696869786988699870087018702870387048705870687078708870987108711871287138714871587168717871887198720872187228723872487258726872787288729873087318732873387348735873687378738873987408741874287438744874587468747874887498750875187528753875487558756875787588759876087618762876387648765876687678768876987708771877287738774877587768777877887798780878187828783878487858786878787888789879087918792879387948795879687978798879988008801880288038804880588068807880888098810881188128813881488158816881788188819882088218822882388248825882688278828882988308831883288338834883588368837883888398840884188428843884488458846884788488849885088518852885388548855885688578858885988608861886288638864886588668867886888698870887188728873887488758876887788788879888088818882888388848885888688878888888988908891889288938894889588968897889888998900890189028903890489058906890789088909891089118912891389148915891689178918891989208921892289238924892589268927892889298930893189328933893489358936893789388939894089418942894389448945894689478948894989508951895289538954895589568957895889598960896189628963896489658966896789688969897089718972897389748975897689778978897989808981898289838984898589868987898889898990899189928993899489958996899789988999900090019002900390049005900690079008900990109011901290139014901590169017901890199020902190229023902490259026902790289029903090319032903390349035903690379038903990409041904290439044904590469047904890499050905190529053905490559056905790589059906090619062906390649065906690679068906990709071907290739074907590769077907890799080908190829083908490859086908790889089909090919092909390949095909690979098909991009101910291039104910591069107910891099110911191129113911491159116911791189119912091219122912391249125912691279128912991309131913291339134913591369137913891399140914191429143914491459146914791489149915091519152915391549155915691579158915991609161916291639164916591669167916891699170917191729173917491759176917791789179918091819182918391849185918691879188918991909191919291939194919591969197919891999200920192029203920492059206920792089209921092119212921392149215921692179218921992209221922292239224922592269227922892299230923192329233923492359236923792389239924092419242924392449245924692479248924992509251925292539254925592569257925892599260926192629263926492659266926792689269927092719272927392749275927692779278927992809281928292839284928592869287928892899290929192929293929492959296929792989299930093019302930393049305930693079308930993109311931293139314931593169317931893199320932193229323932493259326932793289329933093319332933393349335933693379338933993409341934293439344934593469347934893499350935193529353935493559356935793589359936093619362936393649365936693679368936993709371937293739374937593769377937893799380938193829383938493859386938793889389939093919392939393949395939693979398939994009401940294039404940594069407940894099410941194129413941494159416941794189419942094219422942394249425942694279428942994309431943294339434943594369437943894399440944194429443944494459446944794489449945094519452945394549455945694579458945994609461946294639464946594669467946894699470947194729473947494759476947794789479948094819482948394849485948694879488948994909491949294939494949594969497949894999500950195029503950495059506950795089509951095119512951395149515951695179518951995209521952295239524952595269527952895299530953195329533953495359536953795389539954095419542954395449545954695479548954995509551955295539554955595569557955895599560956195629563956495659566956795689569957095719572957395749575957695779578957995809581958295839584958595869587958895899590959195929593959495959596959795989599960096019602960396049605960696079608960996109611961296139614961596169617961896199620962196229623962496259626962796289629963096319632963396349635963696379638963996409641964296439644964596469647964896499650965196529653965496559656965796589659966096619662966396649665966696679668966996709671967296739674967596769677967896799680968196829683968496859686968796889689969096919692969396949695969696979698969997009701970297039704970597069707970897099710971197129713971497159716971797189719972097219722972397249725972697279728972997309731973297339734973597369737973897399740974197429743974497459746974797489749975097519752975397549755975697579758975997609761976297639764976597669767976897699770977197729773977497759776977797789779978097819782978397849785978697879788978997909791979297939794979597969797979897999800980198029803980498059806980798089809981098119812981398149815981698179818981998209821982298239824982598269827982898299830983198329833983498359836983798389839984098419842984398449845984698479848984998509851985298539854985598569857985898599860986198629863986498659866986798689869987098719872987398749875987698779878987998809881988298839884988598869887988898899890989198929893989498959896989798989899990099019902990399049905990699079908990999109911991299139914991599169917991899199920992199229923992499259926992799289929993099319932993399349935993699379938993999409941994299439944994599469947994899499950995199529953995499559956995799589959996099619962996399649965996699679968996999709971997299739974997599769977997899799980998199829983998499859986998799889989999099919992999399949995999699979998999910000100011000210003100041000510006100071000810009100101001110012100131001410015100161001710018100191002010021100221002310024100251002610027100281002910030100311003210033100341003510036100371003810039100401004110042100431004410045100461004710048100491005010051100521005310054100551005610057100581005910060100611006210063100641006510066100671006810069100701007110072100731007410075100761007710078100791008010081100821008310084100851008610087100881008910090100911009210093100941009510096100971009810099101001010110102101031010410105101061010710108101091011010111101121011310114101151011610117101181011910120101211012210123101241012510126101271012810129101301013110132101331013410135101361013710138101391014010141101421014310144101451014610147101481014910150101511015210153101541015510156101571015810159101601016110162101631016410165101661016710168101691017010171101721017310174101751017610177101781017910180101811018210183101841018510186101871018810189101901019110192101931019410195101961019710198101991020010201102021020310204102051020610207102081020910210102111021210213102141021510216102171021810219102201022110222102231022410225102261022710228102291023010231102321023310234102351023610237102381023910240102411024210243102441024510246102471024810249102501025110252102531025410255102561025710258102591026010261102621026310264102651026610267102681026910270102711027210273102741027510276102771027810279102801028110282102831028410285102861028710288102891029010291102921029310294102951029610297102981029910300103011030210303103041030510306103071030810309103101031110312103131031410315103161031710318103191032010321103221032310324103251032610327103281032910330103311033210333103341033510336103371033810339103401034110342103431034410345103461034710348103491035010351103521035310354103551035610357103581035910360103611036210363103641036510366103671036810369103701037110372103731037410375103761037710378103791038010381103821038310384103851038610387103881038910390103911039210393103941039510396103971039810399104001040110402104031040410405104061040710408104091041010411104121041310414104151041610417104181041910420104211042210423104241042510426104271042810429104301043110432104331043410435104361043710438104391044010441104421044310444104451044610447104481044910450104511045210453104541045510456104571045810459104601046110462104631046410465104661046710468104691047010471104721047310474104751047610477104781047910480104811048210483104841048510486104871048810489104901049110492104931049410495104961049710498104991050010501105021050310504105051050610507105081050910510105111051210513105141051510516105171051810519105201052110522105231052410525105261052710528105291053010531105321053310534105351053610537105381053910540105411054210543105441054510546105471054810549105501055110552105531055410555105561055710558105591056010561105621056310564105651056610567105681056910570105711057210573105741057510576105771057810579105801058110582105831058410585105861058710588105891059010591105921059310594105951059610597105981059910600106011060210603106041060510606106071060810609106101061110612106131061410615106161061710618106191062010621106221062310624106251062610627106281062910630106311063210633106341063510636106371063810639106401064110642106431064410645106461064710648106491065010651106521065310654106551065610657106581065910660106611066210663106641066510666106671066810669106701067110672106731067410675106761067710678106791068010681106821068310684106851068610687106881068910690106911069210693106941069510696106971069810699107001070110702107031070410705107061070710708107091071010711107121071310714107151071610717107181071910720107211072210723107241072510726107271072810729107301073110732107331073410735107361073710738107391074010741107421074310744107451074610747107481074910750107511075210753107541075510756107571075810759107601076110762107631076410765107661076710768107691077010771107721077310774107751077610777107781077910780107811078210783107841078510786107871078810789107901079110792107931079410795107961079710798107991080010801108021080310804108051080610807108081080910810108111081210813108141081510816108171081810819108201082110822108231082410825108261082710828108291083010831108321083310834108351083610837108381083910840108411084210843108441084510846108471084810849108501085110852108531085410855108561085710858108591086010861108621086310864108651086610867108681086910870108711087210873108741087510876108771087810879108801088110882108831088410885108861088710888108891089010891108921089310894108951089610897108981089910900109011090210903109041090510906109071090810909109101091110912109131091410915109161091710918109191092010921109221092310924109251092610927109281092910930109311093210933109341093510936109371093810939109401094110942109431094410945109461094710948109491095010951109521095310954109551095610957109581095910960109611096210963109641096510966109671096810969109701097110972109731097410975109761097710978109791098010981109821098310984109851098610987109881098910990109911099210993109941099510996109971099810999110001100111002110031100411005110061100711008110091101011011110121101311014110151101611017110181101911020110211102211023110241102511026110271102811029110301103111032110331103411035110361103711038110391104011041110421104311044110451104611047110481104911050110511105211053110541105511056110571105811059110601106111062110631106411065110661106711068110691107011071110721107311074110751107611077110781107911080110811108211083110841108511086110871108811089110901109111092110931109411095110961109711098110991110011101111021110311104111051110611107111081110911110111111111211113111141111511116111171111811119111201112111122111231112411125111261112711128111291113011131111321113311134111351113611137111381113911140111411114211143111441114511146111471114811149111501115111152111531115411155111561115711158111591116011161111621116311164111651116611167111681116911170111711117211173111741117511176111771117811179111801118111182111831118411185111861118711188111891119011191111921119311194111951119611197111981119911200112011120211203112041120511206112071120811209112101121111212112131121411215112161121711218112191122011221112221122311224112251122611227112281122911230112311123211233112341123511236112371123811239112401124111242112431124411245112461124711248112491125011251112521125311254112551125611257112581125911260112611126211263112641126511266112671126811269112701127111272112731127411275112761127711278112791128011281112821128311284112851128611287112881128911290112911129211293112941129511296112971129811299113001130111302113031130411305113061130711308113091131011311113121131311314113151131611317113181131911320113211132211323113241132511326113271132811329113301133111332113331133411335113361133711338113391134011341113421134311344113451134611347113481134911350113511135211353113541135511356113571135811359113601136111362113631136411365113661136711368113691137011371113721137311374113751137611377113781137911380113811138211383113841138511386113871138811389113901139111392113931139411395113961139711398113991140011401114021140311404114051140611407114081140911410114111141211413114141141511416114171141811419114201142111422114231142411425114261142711428114291143011431114321143311434114351143611437114381143911440114411144211443114441144511446114471144811449114501145111452114531145411455114561145711458114591146011461114621146311464114651146611467114681146911470114711147211473114741147511476114771147811479114801148111482114831148411485114861148711488114891149011491114921149311494114951149611497114981149911500115011150211503115041150511506115071150811509115101151111512115131151411515115161151711518115191152011521115221152311524115251152611527115281152911530115311153211533115341153511536115371153811539115401154111542115431154411545115461154711548115491155011551115521155311554115551155611557115581155911560115611156211563115641156511566115671156811569115701157111572115731157411575115761157711578115791158011581115821158311584115851158611587115881158911590115911159211593115941159511596115971159811599116001160111602116031160411605116061160711608116091161011611116121161311614116151161611617116181161911620116211162211623116241162511626116271162811629116301163111632116331163411635116361163711638116391164011641116421164311644116451164611647116481164911650116511165211653116541165511656116571165811659116601166111662116631166411665116661166711668116691167011671116721167311674116751167611677116781167911680116811168211683116841168511686116871168811689116901169111692116931169411695116961169711698116991170011701117021170311704117051170611707117081170911710117111171211713117141171511716117171171811719117201172111722117231172411725117261172711728117291173011731117321173311734117351173611737117381173911740117411174211743117441174511746117471174811749117501175111752117531175411755117561175711758117591176011761117621176311764117651176611767117681176911770117711177211773117741177511776117771177811779117801178111782117831178411785117861178711788117891179011791117921179311794117951179611797117981179911800118011180211803118041180511806118071180811809118101181111812118131181411815118161181711818118191182011821118221182311824118251182611827118281182911830118311183211833118341183511836118371183811839118401184111842118431184411845118461184711848118491185011851118521185311854118551185611857118581185911860118611186211863118641186511866118671186811869118701187111872118731187411875118761187711878118791188011881118821188311884118851188611887118881188911890118911189211893118941189511896118971189811899119001190111902119031190411905119061190711908119091191011911119121191311914119151191611917119181191911920119211192211923119241192511926119271192811929119301193111932119331193411935119361193711938119391194011941119421194311944119451194611947119481194911950119511195211953119541195511956119571195811959119601196111962119631196411965119661196711968119691197011971119721197311974119751197611977119781197911980119811198211983119841198511986119871198811989119901199111992119931199411995119961199711998119991200012001120021200312004120051200612007120081200912010120111201212013120141201512016120171201812019120201202112022120231202412025120261202712028120291203012031120321203312034120351203612037120381203912040120411204212043120441204512046120471204812049120501205112052120531205412055120561205712058120591206012061120621206312064120651206612067120681206912070120711207212073120741207512076120771207812079120801208112082120831208412085120861208712088120891209012091120921209312094120951209612097120981209912100121011210212103121041210512106121071210812109121101211112112121131211412115121161211712118121191212012121121221212312124121251212612127121281212912130121311213212133121341213512136121371213812139121401214112142121431214412145121461214712148121491215012151121521215312154121551215612157121581215912160121611216212163121641216512166121671216812169121701217112172121731217412175121761217712178121791218012181121821218312184121851218612187121881218912190121911219212193121941219512196121971219812199122001220112202122031220412205122061220712208122091221012211122121221312214122151221612217122181221912220122211222212223122241222512226122271222812229122301223112232122331223412235122361223712238122391224012241122421224312244122451224612247122481224912250122511225212253122541225512256122571225812259122601226112262122631226412265122661226712268122691227012271122721227312274122751227612277122781227912280122811228212283122841228512286122871228812289122901229112292122931229412295122961229712298122991230012301123021230312304123051230612307123081230912310123111231212313123141231512316123171231812319123201232112322123231232412325123261232712328123291233012331123321233312334123351233612337123381233912340123411234212343123441234512346123471234812349123501235112352123531235412355123561235712358123591236012361123621236312364123651236612367123681236912370123711237212373123741237512376123771237812379123801238112382123831238412385123861238712388123891239012391123921239312394123951239612397123981239912400124011240212403124041240512406124071240812409124101241112412124131241412415124161241712418124191242012421124221242312424124251242612427124281242912430124311243212433124341243512436124371243812439124401244112442124431244412445124461244712448124491245012451124521245312454124551245612457124581245912460124611246212463124641246512466124671246812469124701247112472124731247412475124761247712478124791248012481124821248312484124851248612487124881248912490124911249212493124941249512496124971249812499125001250112502125031250412505125061250712508125091251012511125121251312514125151251612517125181251912520125211252212523125241252512526125271252812529125301253112532125331253412535125361253712538125391254012541125421254312544125451254612547125481254912550125511255212553125541255512556125571255812559125601256112562125631256412565125661256712568125691257012571125721257312574125751257612577125781257912580125811258212583125841258512586125871258812589125901259112592125931259412595125961259712598125991260012601126021260312604126051260612607126081260912610126111261212613126141261512616126171261812619126201262112622126231262412625126261262712628126291263012631126321263312634126351263612637126381263912640126411264212643126441264512646126471264812649126501265112652126531265412655126561265712658126591266012661126621266312664126651266612667126681266912670126711267212673126741267512676126771267812679126801268112682126831268412685126861268712688126891269012691126921269312694126951269612697126981269912700127011270212703127041270512706127071270812709127101271112712127131271412715127161271712718127191272012721127221272312724127251272612727127281272912730127311273212733127341273512736127371273812739127401274112742127431274412745127461274712748127491275012751127521275312754127551275612757127581275912760127611276212763127641276512766127671276812769127701277112772127731277412775127761277712778127791278012781127821278312784127851278612787127881278912790127911279212793127941279512796127971279812799128001280112802128031280412805128061280712808128091281012811128121281312814128151281612817128181281912820128211282212823128241282512826128271282812829128301283112832128331283412835128361283712838128391284012841128421284312844128451284612847128481284912850128511285212853128541285512856128571285812859128601286112862128631286412865128661286712868128691287012871128721287312874128751287612877128781287912880128811288212883128841288512886128871288812889128901289112892128931289412895128961289712898128991290012901129021290312904129051290612907129081290912910129111291212913129141291512916129171291812919129201292112922129231292412925129261292712928129291293012931129321293312934129351293612937129381293912940129411294212943129441294512946129471294812949129501295112952129531295412955129561295712958129591296012961129621296312964129651296612967129681296912970129711297212973129741297512976129771297812979129801298112982129831298412985129861298712988129891299012991129921299312994129951299612997129981299913000130011300213003130041300513006130071300813009130101301113012130131301413015130161301713018130191302013021130221302313024130251302613027130281302913030130311303213033130341303513036130371303813039130401304113042130431304413045130461304713048130491305013051130521305313054130551305613057130581305913060130611306213063130641306513066130671306813069130701307113072130731307413075130761307713078130791308013081130821308313084130851308613087130881308913090130911309213093130941309513096130971309813099131001310113102131031310413105131061310713108131091311013111131121311313114131151311613117131181311913120131211312213123131241312513126131271312813129131301313113132131331313413135131361313713138131391314013141131421314313144131451314613147131481314913150131511315213153131541315513156131571315813159131601316113162131631316413165131661316713168131691317013171131721317313174131751317613177131781317913180131811318213183131841318513186131871318813189131901319113192131931319413195131961319713198131991320013201132021320313204132051320613207132081320913210132111321213213132141321513216132171321813219132201322113222132231322413225132261322713228132291323013231132321323313234132351323613237132381323913240132411324213243132441324513246132471324813249132501325113252132531325413255132561325713258132591326013261132621326313264132651326613267132681326913270132711327213273132741327513276132771327813279132801328113282132831328413285132861328713288132891329013291132921329313294132951329613297132981329913300133011330213303133041330513306133071330813309133101331113312133131331413315133161331713318133191332013321133221332313324133251332613327133281332913330133311333213333133341333513336133371333813339133401334113342133431334413345133461334713348133491335013351133521335313354133551335613357133581335913360133611336213363133641336513366133671336813369133701337113372133731337413375133761337713378133791338013381133821338313384133851338613387133881338913390133911339213393133941339513396133971339813399134001340113402134031340413405134061340713408134091341013411134121341313414134151341613417134181341913420134211342213423134241342513426134271342813429134301343113432134331343413435134361343713438134391344013441134421344313444134451344613447134481344913450134511345213453134541345513456134571345813459134601346113462134631346413465134661346713468134691347013471134721347313474134751347613477134781347913480134811348213483134841348513486134871348813489134901349113492134931349413495134961349713498134991350013501135021350313504135051350613507135081350913510135111351213513135141351513516135171351813519135201352113522135231352413525135261352713528135291353013531135321353313534135351353613537135381353913540135411354213543135441354513546135471354813549135501355113552135531355413555135561355713558135591356013561135621356313564135651356613567135681356913570135711357213573135741357513576135771357813579135801358113582135831358413585135861358713588135891359013591135921359313594135951359613597135981359913600136011360213603136041360513606136071360813609136101361113612136131361413615136161361713618136191362013621136221362313624136251362613627136281362913630136311363213633136341363513636136371363813639136401364113642136431364413645136461364713648136491365013651136521365313654136551365613657136581365913660136611366213663136641366513666136671366813669136701367113672136731367413675136761367713678136791368013681136821368313684136851368613687136881368913690136911369213693136941369513696136971369813699137001370113702137031370413705137061370713708137091371013711137121371313714137151371613717137181371913720137211372213723137241372513726137271372813729137301373113732137331373413735137361373713738137391374013741137421374313744137451374613747137481374913750137511375213753137541375513756137571375813759137601376113762137631376413765137661376713768137691377013771137721377313774137751377613777137781377913780137811378213783137841378513786137871378813789137901379113792137931379413795137961379713798137991380013801138021380313804138051380613807138081380913810138111381213813138141381513816138171381813819138201382113822138231382413825138261382713828138291383013831138321383313834138351383613837138381383913840138411384213843138441384513846138471384813849138501385113852138531385413855138561385713858138591386013861138621386313864138651386613867138681386913870138711387213873138741387513876138771387813879138801388113882138831388413885138861388713888138891389013891138921389313894138951389613897138981389913900139011390213903139041390513906139071390813909139101391113912139131391413915139161391713918139191392013921139221392313924139251392613927139281392913930139311393213933139341393513936139371393813939139401394113942139431394413945139461394713948139491395013951139521395313954139551395613957139581395913960139611396213963139641396513966139671396813969139701397113972139731397413975139761397713978139791398013981139821398313984139851398613987139881398913990139911399213993139941399513996139971399813999140001400114002140031400414005140061400714008140091401014011140121401314014140151401614017140181401914020140211402214023140241402514026140271402814029140301403114032140331403414035140361403714038140391404014041140421404314044140451404614047140481404914050140511405214053140541405514056140571405814059140601406114062140631406414065140661406714068140691407014071140721407314074140751407614077140781407914080140811408214083140841408514086140871408814089140901409114092140931409414095140961409714098140991410014101141021410314104141051410614107141081410914110141111411214113141141411514116141171411814119141201412114122141231412414125141261412714128141291413014131141321413314134141351413614137141381413914140141411414214143141441414514146141471414814149141501415114152141531415414155141561415714158141591416014161141621416314164141651416614167141681416914170141711417214173141741417514176141771417814179141801418114182141831418414185141861418714188141891419014191141921419314194141951419614197141981419914200142011420214203142041420514206142071420814209142101421114212142131421414215142161421714218142191422014221142221422314224142251422614227142281422914230142311423214233142341423514236142371423814239142401424114242142431424414245142461424714248142491425014251142521425314254142551425614257142581425914260142611426214263142641426514266142671426814269142701427114272142731427414275142761427714278142791428014281142821428314284142851428614287142881428914290142911429214293142941429514296
  1. /* x509.c
  2. *
  3. * Copyright (C) 2006-2023 wolfSSL Inc.
  4. *
  5. * This file is part of wolfSSL.
  6. *
  7. * wolfSSL is free software; you can redistribute it and/or modify
  8. * it under the terms of the GNU General Public License as published by
  9. * the Free Software Foundation; either version 2 of the License, or
  10. * (at your option) any later version.
  11. *
  12. * wolfSSL is distributed in the hope that it will be useful,
  13. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  15. * GNU General Public License for more details.
  16. *
  17. * You should have received a copy of the GNU General Public License
  18. * along with this program; if not, write to the Free Software
  19. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
  20. */
  21. #ifdef HAVE_CONFIG_H
  22. #include <config.h>
  23. #endif
  24. #include <wolfssl/wolfcrypt/settings.h>
  25. #if !defined(WOLFSSL_X509_INCLUDED)
  26. #ifndef WOLFSSL_IGNORE_FILE_WARN
  27. #warning x509.c does not need to be compiled separately from ssl.c
  28. #endif
  29. #else
  30. #ifndef WOLFCRYPT_ONLY
  31. #ifndef NO_CERTS
  32. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  33. #include <wolfssl/openssl/x509v3.h>
  34. #endif
  35. #if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)
  36. unsigned int wolfSSL_X509_get_extension_flags(WOLFSSL_X509* x509)
  37. {
  38. unsigned int flags = 0;
  39. WOLFSSL_ENTER("wolfSSL_X509_get_extension_flags");
  40. if (x509 != NULL) {
  41. if (x509->keyUsageSet) {
  42. flags |= EXFLAG_KUSAGE;
  43. }
  44. if (x509->extKeyUsageSrc != NULL) {
  45. flags |= EXFLAG_XKUSAGE;
  46. }
  47. }
  48. WOLFSSL_LEAVE("wolfSSL_X509_get_extension_flags", flags);
  49. return flags;
  50. }
  51. unsigned int wolfSSL_X509_get_key_usage(WOLFSSL_X509* x509)
  52. {
  53. unsigned int ret = 0;
  54. WOLFSSL_ENTER("wolfSSL_X509_get_key_usage");
  55. if (x509 == NULL) {
  56. WOLFSSL_MSG("x509 is NULL");
  57. }
  58. else {
  59. if (x509->keyUsageSet) {
  60. ret = wolfSSL_X509_get_keyUsage(x509);
  61. }
  62. else {
  63. ret = (unsigned int)-1;
  64. }
  65. }
  66. WOLFSSL_LEAVE("wolfSSL_X509_get_key_usage", ret);
  67. return ret;
  68. }
  69. unsigned int wolfSSL_X509_get_extended_key_usage(WOLFSSL_X509* x509)
  70. {
  71. int ret = 0;
  72. WOLFSSL_ENTER("wolfSSL_X509_get_extended_key_usage");
  73. if (x509 != NULL) {
  74. if (x509->extKeyUsage & EXTKEYUSE_OCSP_SIGN)
  75. ret |= XKU_OCSP_SIGN;
  76. if (x509->extKeyUsage & EXTKEYUSE_TIMESTAMP)
  77. ret |= XKU_TIMESTAMP;
  78. if (x509->extKeyUsage & EXTKEYUSE_EMAILPROT)
  79. ret |= XKU_SMIME;
  80. if (x509->extKeyUsage & EXTKEYUSE_CODESIGN)
  81. ret |= XKU_CODE_SIGN;
  82. if (x509->extKeyUsage & EXTKEYUSE_CLIENT_AUTH)
  83. ret |= XKU_SSL_CLIENT;
  84. if (x509->extKeyUsage & EXTKEYUSE_SERVER_AUTH)
  85. ret |= XKU_SSL_SERVER;
  86. if (x509->extKeyUsage & EXTKEYUSE_ANY)
  87. ret |= XKU_ANYEKU;
  88. }
  89. WOLFSSL_LEAVE("wolfSSL_X509_get_extended_key_usage", ret);
  90. return (unsigned int)ret;
  91. }
  92. /* Returns the number of X509V3 extensions in X509 object, or 0 on failure */
  93. int wolfSSL_X509_get_ext_count(const WOLFSSL_X509* passedCert)
  94. {
  95. int extCount = 0;
  96. int length = 0;
  97. int outSz = 0;
  98. const byte* rawCert;
  99. int sz = 0;
  100. word32 idx = 0;
  101. const byte* input;
  102. #ifdef WOLFSSL_SMALL_STACK
  103. DecodedCert *cert;
  104. #else
  105. DecodedCert cert[1];
  106. #endif
  107. WOLFSSL_ENTER("wolfSSL_X509_get_ext_count");
  108. if (passedCert == NULL) {
  109. WOLFSSL_MSG("\tNot passed a certificate");
  110. return WOLFSSL_FAILURE;
  111. }
  112. rawCert = wolfSSL_X509_get_der((WOLFSSL_X509*)passedCert, &outSz);
  113. if (rawCert == NULL) {
  114. WOLFSSL_MSG("\tpassedCert has no internal DerBuffer set.");
  115. return WOLFSSL_FAILURE;
  116. }
  117. #ifdef WOLFSSL_SMALL_STACK
  118. cert = (DecodedCert *)XMALLOC(sizeof(*cert), NULL, DYNAMIC_TYPE_DCERT);
  119. if (cert == NULL) {
  120. WOLFSSL_MSG("out of memory");
  121. return WOLFSSL_FAILURE;
  122. }
  123. #endif
  124. InitDecodedCert(cert, rawCert, (word32)outSz, 0);
  125. if (ParseCert(cert,
  126. #ifdef WOLFSSL_CERT_REQ
  127. passedCert->isCSR ? CERTREQ_TYPE :
  128. #endif
  129. CA_TYPE,
  130. NO_VERIFY, NULL) < 0) {
  131. WOLFSSL_MSG("\tCertificate parsing failed");
  132. goto out;
  133. }
  134. input = cert->extensions;
  135. sz = cert->extensionsSz;
  136. if (input == NULL || sz == 0) {
  137. WOLFSSL_MSG("\tsz or input NULL error");
  138. goto out;
  139. }
  140. #ifdef WOLFSSL_CERT_REQ
  141. if (!passedCert->isCSR)
  142. #endif
  143. {
  144. if (input[idx++] != ASN_EXTENSIONS) {
  145. WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
  146. goto out;
  147. }
  148. if (GetLength(input, &idx, &length, sz) < 0) {
  149. WOLFSSL_MSG("\tfail: invalid length");
  150. goto out;
  151. }
  152. }
  153. if (GetSequence(input, &idx, &length, sz) < 0) {
  154. WOLFSSL_MSG("\tfail: should be a SEQUENCE (1)");
  155. goto out;
  156. }
  157. while (idx < (word32)sz) {
  158. if (GetSequence(input, &idx, &length, sz) < 0) {
  159. WOLFSSL_MSG("\tfail: should be a SEQUENCE");
  160. FreeDecodedCert(cert);
  161. return WOLFSSL_FAILURE;
  162. }
  163. idx += length;
  164. extCount++;
  165. }
  166. out:
  167. FreeDecodedCert(cert);
  168. #ifdef WOLFSSL_SMALL_STACK
  169. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  170. #endif
  171. return extCount;
  172. }
  173. /* Creates and returns pointer to a new X509_EXTENSION object in memory */
  174. WOLFSSL_X509_EXTENSION* wolfSSL_X509_EXTENSION_new(void)
  175. {
  176. WOLFSSL_X509_EXTENSION* newExt;
  177. WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_new");
  178. newExt = (WOLFSSL_X509_EXTENSION*)XMALLOC(sizeof(WOLFSSL_X509_EXTENSION),
  179. NULL, DYNAMIC_TYPE_X509_EXT);
  180. if (newExt == NULL)
  181. return NULL;
  182. XMEMSET(newExt, 0, sizeof(WOLFSSL_X509_EXTENSION));
  183. return newExt;
  184. }
  185. /* Clear out and free internal pointers of ASN.1 STRING object.
  186. *
  187. * @param [in] asn1 ASN.1 STRING object.
  188. */
  189. static void wolfSSL_ASN1_STRING_clear(WOLFSSL_ASN1_STRING* asn1)
  190. {
  191. /* Check we have an object to free. */
  192. if (asn1 != NULL) {
  193. /* Dispose of dynamic data. */
  194. if ((asn1->length > 0) && asn1->isDynamic) {
  195. XFREE(asn1->data, NULL, DYNAMIC_TYPE_OPENSSL);
  196. }
  197. XMEMSET(asn1, 0, sizeof(WOLFSSL_ASN1_STRING));
  198. }
  199. }
  200. void wolfSSL_X509_EXTENSION_free(WOLFSSL_X509_EXTENSION* x)
  201. {
  202. WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_free");
  203. if (x == NULL)
  204. return;
  205. if (x->obj != NULL) {
  206. wolfSSL_ASN1_OBJECT_free(x->obj);
  207. }
  208. wolfSSL_ASN1_STRING_clear(&x->value);
  209. wolfSSL_sk_pop_free(x->ext_sk, NULL);
  210. XFREE(x, NULL, DYNAMIC_TYPE_X509_EXT);
  211. }
  212. WOLFSSL_X509_EXTENSION* wolfSSL_X509_EXTENSION_dup(WOLFSSL_X509_EXTENSION* src)
  213. {
  214. WOLFSSL_X509_EXTENSION* ret = NULL;
  215. int err = 0;
  216. WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_dup");
  217. if (src == NULL) {
  218. err = 1;
  219. }
  220. if (err == 0) {
  221. ret = wolfSSL_X509_EXTENSION_new();
  222. if (ret == NULL) {
  223. err = 1;
  224. }
  225. }
  226. if (err == 0 && src->obj != NULL) {
  227. ret->obj = wolfSSL_ASN1_OBJECT_dup(src->obj);
  228. if (ret->obj == NULL) {
  229. err = 1;
  230. }
  231. }
  232. if (err == 0) {
  233. ret->crit = src->crit;
  234. if (wolfSSL_ASN1_STRING_copy(&ret->value, &src->value) !=
  235. WOLFSSL_SUCCESS) {
  236. err = 1;
  237. }
  238. }
  239. if (err == 1 && ret != NULL) {
  240. wolfSSL_X509_EXTENSION_free(ret);
  241. ret = NULL;
  242. }
  243. return ret;
  244. }
  245. WOLFSSL_X509_EXTENSION* wolfSSL_X509_EXTENSION_create_by_OBJ(
  246. WOLFSSL_X509_EXTENSION* ex, WOLFSSL_ASN1_OBJECT *obj, int crit,
  247. WOLFSSL_ASN1_STRING *data)
  248. {
  249. int err = 0;
  250. WOLFSSL_X509_EXTENSION *ret = ex;
  251. WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_create_by_OBJ");
  252. if ((obj == NULL) || (data == NULL)) {
  253. return NULL;
  254. }
  255. if (ret == NULL) {
  256. ret = wolfSSL_X509_EXTENSION_new();
  257. if (ret == NULL) {
  258. err = 1;
  259. }
  260. } else {
  261. /* Prevent potential memory leaks and dangling pointers. */
  262. wolfSSL_ASN1_OBJECT_free(ret->obj);
  263. ret->obj = NULL;
  264. wolfSSL_ASN1_STRING_clear(&ret->value);
  265. }
  266. if (err == 0) {
  267. ret->crit = crit;
  268. ret->obj = wolfSSL_ASN1_OBJECT_dup(obj);
  269. if (ret->obj == NULL) {
  270. err = 1;
  271. }
  272. }
  273. if (err == 0) {
  274. if (wolfSSL_ASN1_STRING_copy(&ret->value, data) != WOLFSSL_SUCCESS) {
  275. err = 1;
  276. }
  277. }
  278. if (err == 1) {
  279. if (ret != ex) {
  280. wolfSSL_X509_EXTENSION_free(ret);
  281. }
  282. ret = NULL;
  283. }
  284. return ret;
  285. }
  286. /* Creates and returns a new WOLFSSL_X509_EXTENSION stack. */
  287. WOLFSSL_STACK* wolfSSL_sk_new_x509_ext(void)
  288. {
  289. WOLFSSL_STACK* sk;
  290. WOLFSSL_ENTER("wolfSSL_sk_new_x509_ext");
  291. sk = wolfSSL_sk_new_null();
  292. if (sk) {
  293. sk->type = STACK_TYPE_X509_EXT;
  294. }
  295. return sk;
  296. }
  297. /* This function does NOT return 1 on success. It returns 0 on fail, and the
  298. * number of items in the stack upon success. This is for compatibility with
  299. * OpenSSL. */
  300. int wolfSSL_sk_X509_EXTENSION_push(WOLFSSL_STACK* sk,WOLFSSL_X509_EXTENSION* ext)
  301. {
  302. WOLFSSL_STACK* node;
  303. WOLFSSL_ENTER("wolfSSL_sk_X509_EXTENSION_push");
  304. if (sk == NULL || ext == NULL) {
  305. return WOLFSSL_FAILURE;
  306. }
  307. /* no previous values in stack */
  308. if (sk->data.ext == NULL) {
  309. sk->data.ext = ext;
  310. sk->num += 1;
  311. return (int)sk->num;
  312. }
  313. /* stack already has value(s) create a new node and add more */
  314. node = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK), NULL,
  315. DYNAMIC_TYPE_X509);
  316. if (node == NULL) {
  317. WOLFSSL_MSG("Memory error");
  318. return WOLFSSL_FAILURE;
  319. }
  320. XMEMSET(node, 0, sizeof(WOLFSSL_STACK));
  321. /* push new obj onto head of stack */
  322. node->data.ext = sk->data.ext;
  323. node->next = sk->next;
  324. node->type = sk->type;
  325. sk->next = node;
  326. sk->data.ext = ext;
  327. sk->num += 1;
  328. return (int)sk->num;
  329. }
  330. /* Free the structure for X509_EXTENSION stack
  331. *
  332. * sk stack to free nodes in
  333. */
  334. void wolfSSL_sk_X509_EXTENSION_free(WOLFSSL_STACK* sk)
  335. {
  336. WOLFSSL_STACK* node;
  337. WOLFSSL_ENTER("wolfSSL_sk_X509_EXTENSION_free");
  338. if (sk == NULL) {
  339. return;
  340. }
  341. /* parse through stack freeing each node */
  342. node = sk->next;
  343. while ((node != NULL) && (sk->num > 1)) {
  344. WOLFSSL_STACK* tmp = node;
  345. node = node->next;
  346. wolfSSL_X509_EXTENSION_free(tmp->data.ext);
  347. XFREE(tmp, NULL, DYNAMIC_TYPE_X509);
  348. sk->num -= 1;
  349. }
  350. /* free head of stack */
  351. if (sk->num == 1) {
  352. wolfSSL_X509_EXTENSION_free(sk->data.ext);
  353. }
  354. XFREE(sk, NULL, DYNAMIC_TYPE_X509);
  355. }
  356. static WOLFSSL_STACK* generateExtStack(const WOLFSSL_X509 *x)
  357. {
  358. int numOfExt, i;
  359. WOLFSSL_X509 *x509 = (WOLFSSL_X509*)x;
  360. WOLFSSL_STACK* ret;
  361. WOLFSSL_STACK* tmp;
  362. if (!x509) {
  363. WOLFSSL_MSG("Bad parameter");
  364. return NULL;
  365. }
  366. /* Save x509->ext_sk */
  367. tmp = x509->ext_sk;
  368. x509->ext_sk = NULL;
  369. numOfExt = wolfSSL_X509_get_ext_count(x509);
  370. for (i = 0; i < numOfExt; i++) {
  371. /* Build the extension stack */
  372. (void)wolfSSL_X509_set_ext(x509, i);
  373. }
  374. /* Restore */
  375. ret = x509->ext_sk;
  376. x509->ext_sk = tmp;
  377. return ret;
  378. }
  379. /**
  380. * @param x Certificate to extract extensions from
  381. * @return STACK_OF(X509_EXTENSION)*
  382. */
  383. const WOLFSSL_STACK *wolfSSL_X509_get0_extensions(const WOLFSSL_X509 *x)
  384. {
  385. int numOfExt;
  386. WOLFSSL_X509 *x509 = (WOLFSSL_X509*)x;
  387. WOLFSSL_ENTER("wolfSSL_X509_get0_extensions");
  388. if (!x509) {
  389. WOLFSSL_MSG("Bad parameter");
  390. return NULL;
  391. }
  392. numOfExt = wolfSSL_X509_get_ext_count(x509);
  393. if (numOfExt != wolfSSL_sk_num(x509->ext_sk_full)) {
  394. wolfSSL_sk_pop_free(x509->ext_sk_full, NULL);
  395. x509->ext_sk_full = generateExtStack(x);
  396. }
  397. return x509->ext_sk_full;
  398. }
  399. /**
  400. * Caller is responsible for freeing the returned stack.
  401. */
  402. const WOLFSSL_STACK *wolfSSL_X509_REQ_get_extensions(const WOLFSSL_X509 *x)
  403. {
  404. return generateExtStack(x);
  405. }
  406. /* Gets the X509_EXTENSION* ext based on it's location in WOLFSSL_X509* x509.
  407. *
  408. * x509 : The X509 structure to look for the extension.
  409. * loc : Location of the extension. If the extension is found at the given
  410. * location, a new X509_EXTENSION structure is populated with extension-specific
  411. * data based on the extension type.
  412. * Returns NULL on error or pointer to X509_EXTENSION structure containing the
  413. * extension. The returned X509_EXTENSION should not be free'd by caller.
  414. * The returned X509_EXTENSION is pushed onto a stack inside the x509 argument.
  415. * This is later free'd when x509 is free'd.
  416. *
  417. * NOTE: for unknown extension NIDs, a X509_EXTENSION is populated with the
  418. * extension oid as the ASN1_OBJECT (QT compatibility)
  419. */
  420. WOLFSSL_X509_EXTENSION* wolfSSL_X509_get_ext(const WOLFSSL_X509* x509, int loc)
  421. {
  422. WOLFSSL_X509_EXTENSION* ext = NULL;
  423. WOLFSSL_ENTER("wolfSSL_X509_get_ext");
  424. if (x509 == NULL)
  425. return NULL;
  426. ext = wolfSSL_X509_set_ext((WOLFSSL_X509*) x509, loc);
  427. return ext;
  428. }
  429. int wolfSSL_X509_get_ext_by_OBJ(const WOLFSSL_X509 *x,
  430. const WOLFSSL_ASN1_OBJECT *obj, int lastpos)
  431. {
  432. const WOLF_STACK_OF(WOLFSSL_X509_EXTENSION) *sk;
  433. if (!x || !obj) {
  434. WOLFSSL_MSG("Bad parameter");
  435. return -1;
  436. }
  437. sk = wolfSSL_X509_get0_extensions(x);
  438. if (!sk) {
  439. WOLFSSL_MSG("No extensions");
  440. return -1;
  441. }
  442. lastpos++;
  443. if (lastpos < 0)
  444. lastpos = 0;
  445. for (; lastpos < wolfSSL_sk_num(sk); lastpos++)
  446. if (wolfSSL_OBJ_cmp((WOLFSSL_ASN1_OBJECT*)wolfSSL_sk_value(sk,
  447. lastpos), obj) == 0)
  448. return lastpos;
  449. return -1;
  450. }
  451. #endif /* OPENSSL_ALL || OPENSSL_EXTRA */
  452. #if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
  453. defined(WOLFSSL_WPAS_SMALL)
  454. /* Set a general name from the DNS entry data.
  455. *
  456. * @param [in] dns DNS entry.
  457. * @param [in, out] gn General name to place data in.
  458. * @return 1 on success.
  459. * @return 0 on failure.
  460. */
  461. static int wolfssl_dns_entry_othername_to_gn(DNS_entry* dns,
  462. WOLFSSL_GENERAL_NAME* gn)
  463. {
  464. int ret = 0;
  465. WOLFSSL_ASN1_OBJECT* obj;
  466. WOLFSSL_ASN1_TYPE* type;
  467. WOLFSSL_ASN1_STRING* str;
  468. byte tag;
  469. unsigned char* p = (unsigned char *)dns->name;
  470. long len = dns->len;
  471. #ifdef WOLFSSL_FPKI
  472. if (dns->oidSum != 0) {
  473. /* UPN OID: 1.3.6.1.4.1.311.20.2.3 */
  474. static const unsigned char upn_oid[] = {
  475. 0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x14, 0x02, 0x03
  476. };
  477. /* FASCN OID: 2.16.840.1.101.3.6.6 */
  478. static const unsigned char fascn_oid[] = {
  479. 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x06, 0x06
  480. };
  481. const unsigned char* oid;
  482. word32 oidSz;
  483. if ((oid = OidFromId(dns->oidSum, oidCertAltNameType, &oidSz)) ==
  484. NULL) {
  485. if (dns->oidSum == UPN_OID) {
  486. oid = upn_oid;
  487. oidSz = (word32)sizeof(upn_oid);
  488. }
  489. else if (dns->oidSum == FASCN_OID) {
  490. oid = fascn_oid;
  491. oidSz = (word32)sizeof(fascn_oid);
  492. }
  493. else {
  494. goto err;
  495. }
  496. }
  497. if ((obj = wolfSSL_c2i_ASN1_OBJECT(NULL, &oid, oidSz)) == NULL) {
  498. goto err;
  499. }
  500. tag = ASN_UTF8STRING;
  501. }
  502. else
  503. #endif
  504. {
  505. word32 idx = 0;
  506. int nameLen;
  507. /* Create an object id for general name from DER encoding. */
  508. obj = wolfSSL_d2i_ASN1_OBJECT(NULL, (const unsigned char**)&p, len);
  509. if (obj == NULL) {
  510. goto err;
  511. }
  512. /* Pointer moved on and now update length of remaining data. */
  513. len -= (long)((size_t)p - (size_t)dns->name);
  514. /* Next is: [0]. Check tag and length. */
  515. if (GetASNTag(p, &idx, &tag, (word32)len) < 0) {
  516. wolfSSL_ASN1_OBJECT_free(obj);
  517. goto err;
  518. }
  519. if (tag != (ASN_CONTEXT_SPECIFIC | ASN_CONSTRUCTED | 0)) {
  520. wolfSSL_ASN1_OBJECT_free(obj);
  521. goto err;
  522. }
  523. if (GetLength(p, &idx, &nameLen, (word32)len) <= 1) {
  524. wolfSSL_ASN1_OBJECT_free(obj);
  525. goto err;
  526. }
  527. /* Next is a string of some type. */
  528. if (GetASNTag(p, &idx, &tag, (word32)len) < 0) {
  529. wolfSSL_ASN1_OBJECT_free(obj);
  530. goto err;
  531. }
  532. if (GetLength(p, &idx, &nameLen, (word32)len) <= 0) {
  533. wolfSSL_ASN1_OBJECT_free(obj);
  534. goto err;
  535. }
  536. p += idx;
  537. len -= idx;
  538. }
  539. /* Create a WOLFSSL_ASN1_STRING from the DER. */
  540. str = wolfSSL_ASN1_STRING_type_new(tag);
  541. if (str == NULL) {
  542. wolfSSL_ASN1_OBJECT_free(obj);
  543. goto err;
  544. }
  545. wolfSSL_ASN1_STRING_set(str, p, (word32)len);
  546. /* Wrap string in a WOLFSSL_ASN1_TYPE. */
  547. type = wolfSSL_ASN1_TYPE_new();
  548. if (type == NULL) {
  549. wolfSSL_ASN1_OBJECT_free(obj);
  550. wolfSSL_ASN1_STRING_free(str);
  551. goto err;
  552. }
  553. wolfSSL_ASN1_TYPE_set(type, tag, str);
  554. /* Store the object and string in general name. */
  555. gn->d.otherName->type_id = obj;
  556. gn->d.otherName->value = type;
  557. ret = 1;
  558. err:
  559. return ret;
  560. }
  561. #endif /* OPENSSL_ALL || WOLFSSL_WPAS_SMALL */
  562. #if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)
  563. static int wolfssl_x509_alt_names_to_gn(WOLFSSL_X509* x509,
  564. WOLFSSL_X509_EXTENSION* ext)
  565. {
  566. int ret = 0;
  567. WOLFSSL_GENERAL_NAME* gn = NULL;
  568. DNS_entry* dns = NULL;
  569. WOLFSSL_STACK* sk;
  570. #ifdef OPENSSL_ALL
  571. ret = wolfSSL_ASN1_STRING_set(&ext->value, x509->subjAltNameSrc,
  572. x509->subjAltNameSz);
  573. if (ret != WOLFSSL_SUCCESS) {
  574. WOLFSSL_MSG("ASN1_STRING_set() failed");
  575. goto err;
  576. }
  577. #endif
  578. sk = (WOLFSSL_GENERAL_NAMES*)XMALLOC(sizeof(WOLFSSL_GENERAL_NAMES), NULL,
  579. DYNAMIC_TYPE_ASN1);
  580. if (sk == NULL) {
  581. goto err;
  582. }
  583. XMEMSET(sk, 0, sizeof(WOLFSSL_GENERAL_NAMES));
  584. sk->type = STACK_TYPE_GEN_NAME;
  585. if (x509->subjAltNameSet && x509->altNames != NULL) {
  586. /* alt names are DNS_entry structs */
  587. dns = x509->altNames;
  588. /* Currently only support GEN_DNS type */
  589. while (dns != NULL) {
  590. gn = wolfSSL_GENERAL_NAME_new();
  591. if (gn == NULL) {
  592. WOLFSSL_MSG("Error creating GENERAL_NAME");
  593. wolfSSL_sk_pop_free(sk, NULL);
  594. goto err;
  595. }
  596. gn->type = dns->type;
  597. if (gn->type == GEN_OTHERNAME) {
  598. if (!wolfssl_dns_entry_othername_to_gn(dns, gn)) {
  599. WOLFSSL_MSG("OTHERNAME set failed");
  600. wolfSSL_GENERAL_NAME_free(gn);
  601. wolfSSL_sk_pop_free(sk, NULL);
  602. goto err;
  603. }
  604. }
  605. else {
  606. gn->d.ia5->length = dns->len;
  607. if (wolfSSL_ASN1_STRING_set(gn->d.ia5, dns->name,
  608. gn->d.ia5->length) != WOLFSSL_SUCCESS) {
  609. WOLFSSL_MSG("ASN1_STRING_set failed");
  610. wolfSSL_GENERAL_NAME_free(gn);
  611. wolfSSL_sk_pop_free(sk, NULL);
  612. goto err;
  613. }
  614. }
  615. if (wolfSSL_sk_GENERAL_NAME_push(sk, gn) != WOLFSSL_SUCCESS) {
  616. WOLFSSL_MSG("Error pushing onto stack");
  617. wolfSSL_GENERAL_NAME_free(gn);
  618. wolfSSL_sk_pop_free(sk, NULL);
  619. goto err;
  620. }
  621. dns = dns->next;
  622. }
  623. }
  624. ext->ext_sk = sk;
  625. ext->crit = x509->subjAltNameCrit;
  626. ret = 1;
  627. err:
  628. return ret;
  629. }
  630. /* Pushes a new X509_EXTENSION* ext onto the stack inside WOLFSSL_X509* x509.
  631. * This is currently a helper function for wolfSSL_X509_get_ext
  632. * Caller does not free the returned WOLFSSL_X509_EXTENSION*
  633. */
  634. WOLFSSL_X509_EXTENSION* wolfSSL_X509_set_ext(WOLFSSL_X509* x509, int loc)
  635. {
  636. int extCount = 0, length = 0, outSz = 0, sz = 0, ret = 0;
  637. int objSz = 0, isSet = 0;
  638. const byte* rawCert;
  639. const byte* input;
  640. byte* oidBuf;
  641. word32 oid, idx = 0, tmpIdx = 0, nid;
  642. WOLFSSL_X509_EXTENSION* ext = NULL;
  643. WOLFSSL_ASN1_INTEGER* a;
  644. WOLFSSL_STACK* sk;
  645. #ifdef WOLFSSL_SMALL_STACK
  646. DecodedCert* cert = NULL;
  647. #else
  648. DecodedCert cert[1];
  649. #endif
  650. WOLFSSL_ENTER("wolfSSL_X509_set_ext");
  651. if(x509 == NULL){
  652. WOLFSSL_MSG("\tNot passed a certificate");
  653. return NULL;
  654. }
  655. if(loc <0 || (loc > wolfSSL_X509_get_ext_count(x509))){
  656. WOLFSSL_MSG("\tBad location argument");
  657. return NULL;
  658. }
  659. ext = wolfSSL_X509_EXTENSION_new();
  660. if (ext == NULL) {
  661. WOLFSSL_MSG("\tX509_EXTENSION_new() failed");
  662. return NULL;
  663. }
  664. rawCert = wolfSSL_X509_get_der((WOLFSSL_X509*)x509, &outSz);
  665. if (rawCert == NULL) {
  666. WOLFSSL_MSG("\tX509_get_der() failed");
  667. wolfSSL_X509_EXTENSION_free(ext);
  668. return NULL;
  669. }
  670. #ifdef WOLFSSL_SMALL_STACK
  671. cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL, DYNAMIC_TYPE_DCERT);
  672. if (cert == NULL) {
  673. WOLFSSL_MSG("Failed to allocate memory for DecodedCert");
  674. wolfSSL_X509_EXTENSION_free(ext);
  675. return NULL;
  676. }
  677. #endif
  678. InitDecodedCert(cert, rawCert, (word32)outSz, 0);
  679. if (ParseCert(cert,
  680. #ifdef WOLFSSL_CERT_REQ
  681. x509->isCSR ? CERTREQ_TYPE :
  682. #endif
  683. CA_TYPE,
  684. NO_VERIFY, NULL) < 0) {
  685. WOLFSSL_MSG("\tCertificate parsing failed");
  686. wolfSSL_X509_EXTENSION_free(ext);
  687. FreeDecodedCert(cert);
  688. #ifdef WOLFSSL_SMALL_STACK
  689. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  690. #endif
  691. return NULL;
  692. }
  693. input = cert->extensions;
  694. sz = cert->extensionsSz;
  695. if (input == NULL || sz == 0) {
  696. WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
  697. wolfSSL_X509_EXTENSION_free(ext);
  698. FreeDecodedCert(cert);
  699. #ifdef WOLFSSL_SMALL_STACK
  700. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  701. #endif
  702. return NULL;
  703. }
  704. #ifdef WOLFSSL_CERT_REQ
  705. if (!x509->isCSR)
  706. #endif
  707. {
  708. if (input[idx++] != ASN_EXTENSIONS) {
  709. WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
  710. wolfSSL_X509_EXTENSION_free(ext);
  711. FreeDecodedCert(cert);
  712. #ifdef WOLFSSL_SMALL_STACK
  713. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  714. #endif
  715. return NULL;
  716. }
  717. if (GetLength(input, &idx, &length, sz) < 0) {
  718. WOLFSSL_MSG("\tfail: invalid length");
  719. wolfSSL_X509_EXTENSION_free(ext);
  720. FreeDecodedCert(cert);
  721. #ifdef WOLFSSL_SMALL_STACK
  722. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  723. #endif
  724. return NULL;
  725. }
  726. }
  727. if (GetSequence(input, &idx, &length, sz) < 0) {
  728. WOLFSSL_MSG("\tfail: should be a SEQUENCE (1)");
  729. wolfSSL_X509_EXTENSION_free(ext);
  730. FreeDecodedCert(cert);
  731. #ifdef WOLFSSL_SMALL_STACK
  732. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  733. #endif
  734. return NULL;
  735. }
  736. while (idx < (word32)sz) {
  737. oid = 0;
  738. if (GetSequence(input, &idx, &length, sz) < 0) {
  739. WOLFSSL_MSG("\tfail: should be a SEQUENCE");
  740. wolfSSL_X509_EXTENSION_free(ext);
  741. FreeDecodedCert(cert);
  742. #ifdef WOLFSSL_SMALL_STACK
  743. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  744. #endif
  745. return NULL;
  746. }
  747. tmpIdx = idx;
  748. ret = GetObjectId(input, &idx, &oid, oidCertExtType, sz);
  749. if (ret < 0) {
  750. WOLFSSL_MSG("\tfail: OBJECT ID");
  751. wolfSSL_X509_EXTENSION_free(ext);
  752. FreeDecodedCert(cert);
  753. #ifdef WOLFSSL_SMALL_STACK
  754. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  755. #endif
  756. return NULL;
  757. }
  758. idx = tmpIdx;
  759. nid = (word32)oid2nid(oid, oidCertExtType);
  760. /* Continue while loop until extCount == loc or idx > sz */
  761. if (extCount != loc) {
  762. idx += length;
  763. extCount++;
  764. continue;
  765. }
  766. /* extCount == loc. Now get the extension. */
  767. /* Check if extension has been set */
  768. isSet = wolfSSL_X509_ext_isSet_by_NID((WOLFSSL_X509*)x509, nid);
  769. if (wolfSSL_OBJ_nid2ln(nid) != NULL) {
  770. /* This is NOT an unknown OID. */
  771. ext->obj = wolfSSL_OBJ_nid2obj(nid);
  772. if (ext->obj == NULL) {
  773. WOLFSSL_MSG("\tfail: Invalid OBJECT");
  774. wolfSSL_X509_EXTENSION_free(ext);
  775. FreeDecodedCert(cert);
  776. #ifdef WOLFSSL_SMALL_STACK
  777. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  778. #endif
  779. return NULL;
  780. }
  781. }
  782. if (ext->obj) {
  783. ext->obj->nid = nid;
  784. }
  785. switch (oid) {
  786. case BASIC_CA_OID:
  787. if (!isSet)
  788. break;
  789. /* Set pathlength */
  790. a = wolfSSL_ASN1_INTEGER_new();
  791. if (a == NULL) {
  792. wolfSSL_X509_EXTENSION_free(ext);
  793. FreeDecodedCert(cert);
  794. #ifdef WOLFSSL_SMALL_STACK
  795. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  796. #endif
  797. return NULL;
  798. }
  799. a->length = x509->pathLength;
  800. /* Save ASN1_INTEGER in x509 extension */
  801. ext->obj->pathlen = a;
  802. ext->obj->ca = x509->isCa;
  803. ext->crit = x509->basicConstCrit;
  804. break;
  805. case AUTH_INFO_OID:
  806. if (!isSet)
  807. break;
  808. /* Create a stack to hold both the caIssuer and ocsp objects
  809. in X509_EXTENSION structure */
  810. sk = wolfSSL_sk_new_asn1_obj();
  811. if (sk == NULL) {
  812. WOLFSSL_MSG("Failed to malloc stack");
  813. wolfSSL_X509_EXTENSION_free(ext);
  814. FreeDecodedCert(cert);
  815. #ifdef WOLFSSL_SMALL_STACK
  816. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  817. #endif
  818. return NULL;
  819. }
  820. /* Add CaIssuers object to stack */
  821. if (x509->authInfoCaIssuer != NULL &&
  822. x509->authInfoCaIssuerSz > 0)
  823. {
  824. WOLFSSL_ASN1_OBJECT* obj;
  825. obj = wolfSSL_ASN1_OBJECT_new();
  826. if (obj == NULL) {
  827. WOLFSSL_MSG("Error creating ASN1 object");
  828. wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
  829. wolfSSL_X509_EXTENSION_free(ext);
  830. FreeDecodedCert(cert);
  831. #ifdef WOLFSSL_SMALL_STACK
  832. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  833. #endif
  834. return NULL;
  835. }
  836. obj->obj = (byte*)x509->authInfoCaIssuer;
  837. obj->objSz = x509->authInfoCaIssuerSz;
  838. obj->grp = oidCertAuthInfoType;
  839. obj->nid = NID_ad_ca_issuers;
  840. ret = wolfSSL_sk_ASN1_OBJECT_push(sk, obj);
  841. if (ret != WOLFSSL_SUCCESS) {
  842. WOLFSSL_MSG("Error pushing ASN1 object onto stack");
  843. wolfSSL_ASN1_OBJECT_free(obj);
  844. wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
  845. wolfSSL_X509_EXTENSION_free(ext);
  846. FreeDecodedCert(cert);
  847. #ifdef WOLFSSL_SMALL_STACK
  848. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  849. #endif
  850. return NULL;
  851. }
  852. }
  853. /* Add OCSP object to stack */
  854. if (x509->authInfo != NULL &&
  855. x509->authInfoSz > 0)
  856. {
  857. WOLFSSL_ASN1_OBJECT* obj;
  858. obj = wolfSSL_ASN1_OBJECT_new();
  859. if (obj == NULL) {
  860. WOLFSSL_MSG("Error creating ASN1 object");
  861. wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
  862. wolfSSL_X509_EXTENSION_free(ext);
  863. FreeDecodedCert(cert);
  864. #ifdef WOLFSSL_SMALL_STACK
  865. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  866. #endif
  867. return NULL;
  868. }
  869. obj->obj = x509->authInfo;
  870. obj->objSz = x509->authInfoSz;
  871. obj->grp = oidCertAuthInfoType;
  872. obj->nid = NID_ad_OCSP;
  873. ret = wolfSSL_sk_ASN1_OBJECT_push(sk, obj);
  874. if (ret != WOLFSSL_SUCCESS) {
  875. WOLFSSL_MSG("Error pushing ASN1 object onto stack");
  876. wolfSSL_ASN1_OBJECT_free(obj);
  877. wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
  878. wolfSSL_X509_EXTENSION_free(ext);
  879. FreeDecodedCert(cert);
  880. #ifdef WOLFSSL_SMALL_STACK
  881. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  882. #endif
  883. return NULL;
  884. }
  885. }
  886. ext->ext_sk = sk;
  887. ext->crit = x509->authInfoCrit;
  888. break;
  889. case AUTH_KEY_OID:
  890. if (!isSet)
  891. break;
  892. ret = wolfSSL_ASN1_STRING_set(&ext->value, x509->authKeyId,
  893. x509->authKeyIdSz);
  894. if (ret != WOLFSSL_SUCCESS) {
  895. WOLFSSL_MSG("ASN1_STRING_set() failed");
  896. wolfSSL_X509_EXTENSION_free(ext);
  897. FreeDecodedCert(cert);
  898. #ifdef WOLFSSL_SMALL_STACK
  899. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  900. #endif
  901. return NULL;
  902. }
  903. ext->crit = x509->authKeyIdCrit;
  904. break;
  905. case SUBJ_KEY_OID:
  906. if (!isSet)
  907. break;
  908. ret = wolfSSL_ASN1_STRING_set(&ext->value, x509->subjKeyId,
  909. x509->subjKeyIdSz);
  910. if (ret != WOLFSSL_SUCCESS) {
  911. WOLFSSL_MSG("ASN1_STRING_set() failed");
  912. wolfSSL_X509_EXTENSION_free(ext);
  913. FreeDecodedCert(cert);
  914. #ifdef WOLFSSL_SMALL_STACK
  915. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  916. #endif
  917. return NULL;
  918. }
  919. ext->crit = x509->subjKeyIdCrit;
  920. break;
  921. case CERT_POLICY_OID:
  922. if (!isSet)
  923. break;
  924. ext->crit = x509->certPolicyCrit;
  925. break;
  926. case KEY_USAGE_OID:
  927. if (!isSet)
  928. break;
  929. ret = wolfSSL_ASN1_STRING_set(&ext->value,
  930. (byte*)&(x509->keyUsage), sizeof(word16));
  931. if (ret != WOLFSSL_SUCCESS) {
  932. WOLFSSL_MSG("ASN1_STRING_set() failed");
  933. wolfSSL_X509_EXTENSION_free(ext);
  934. FreeDecodedCert(cert);
  935. #ifdef WOLFSSL_SMALL_STACK
  936. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  937. #endif
  938. return NULL;
  939. }
  940. ext->crit = x509->keyUsageCrit;
  941. break;
  942. case EXT_KEY_USAGE_OID:
  943. if (!isSet)
  944. break;
  945. ret = wolfSSL_ASN1_STRING_set(&ext->value, x509->extKeyUsageSrc,
  946. x509->extKeyUsageSz);
  947. if (ret != WOLFSSL_SUCCESS) {
  948. WOLFSSL_MSG("ASN1_STRING_set() failed");
  949. wolfSSL_X509_EXTENSION_free(ext);
  950. FreeDecodedCert(cert);
  951. #ifdef WOLFSSL_SMALL_STACK
  952. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  953. #endif
  954. return NULL;
  955. }
  956. ext->crit = x509->extKeyUsageCrit;
  957. break;
  958. case CRL_DIST_OID:
  959. if (!isSet)
  960. break;
  961. ext->crit = x509->CRLdistCrit;
  962. break;
  963. case ALT_NAMES_OID:
  964. if (!isSet)
  965. break;
  966. if (!wolfssl_x509_alt_names_to_gn(x509, ext)) {
  967. wolfSSL_X509_EXTENSION_free(ext);
  968. FreeDecodedCert(cert);
  969. #ifdef WOLFSSL_SMALL_STACK
  970. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  971. #endif
  972. return NULL;
  973. }
  974. break;
  975. default:
  976. WOLFSSL_MSG("Unknown extension type found, parsing OID");
  977. /* If the extension type is not recognized/supported,
  978. * set the ASN1_OBJECT in the extension with the
  979. * parsed oid for access in later function calls */
  980. /* Get OID from input */
  981. if (GetASNObjectId(input, &idx, &length, sz) != 0) {
  982. WOLFSSL_MSG("Failed to Get ASN Object Id");
  983. wolfSSL_X509_EXTENSION_free(ext);
  984. FreeDecodedCert(cert);
  985. #ifdef WOLFSSL_SMALL_STACK
  986. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  987. #endif
  988. return NULL;
  989. }
  990. oidBuf = (byte*)XMALLOC(length+1+MAX_LENGTH_SZ, NULL,
  991. DYNAMIC_TYPE_TMP_BUFFER);
  992. if (oidBuf == NULL) {
  993. WOLFSSL_MSG("Failed to malloc tmp buffer");
  994. wolfSSL_X509_EXTENSION_free(ext);
  995. FreeDecodedCert(cert);
  996. #ifdef WOLFSSL_SMALL_STACK
  997. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  998. #endif
  999. return NULL;
  1000. }
  1001. oidBuf[0] = ASN_OBJECT_ID;
  1002. objSz++;
  1003. objSz += SetLength(length, oidBuf + 1);
  1004. objSz += length;
  1005. /* Set object size and reallocate space in object buffer */
  1006. if (ext->obj == NULL) {
  1007. ext->obj = wolfSSL_ASN1_OBJECT_new();
  1008. if (ext->obj == NULL) {
  1009. XFREE(oidBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  1010. wolfSSL_X509_EXTENSION_free(ext);
  1011. FreeDecodedCert(cert);
  1012. #ifdef WOLFSSL_SMALL_STACK
  1013. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  1014. #endif
  1015. return NULL;
  1016. }
  1017. }
  1018. ext->obj->objSz = objSz;
  1019. if(((ext->obj->dynamic & WOLFSSL_ASN1_DYNAMIC_DATA) != 0) ||
  1020. (ext->obj->obj == NULL)) {
  1021. ext->obj->obj =(byte*)XREALLOC((byte*)ext->obj->obj,
  1022. ext->obj->objSz,
  1023. NULL,DYNAMIC_TYPE_ASN1);
  1024. if (ext->obj->obj == NULL) {
  1025. wolfSSL_X509_EXTENSION_free(ext);
  1026. FreeDecodedCert(cert);
  1027. XFREE(oidBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  1028. #ifdef WOLFSSL_SMALL_STACK
  1029. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  1030. #endif
  1031. return NULL;
  1032. }
  1033. ext->obj->dynamic |= WOLFSSL_ASN1_DYNAMIC_DATA;
  1034. } else {
  1035. ext->obj->dynamic &= ~WOLFSSL_ASN1_DYNAMIC_DATA;
  1036. }
  1037. /* Get OID from input and copy to ASN1_OBJECT buffer */
  1038. XMEMCPY(oidBuf+2, input+idx, length);
  1039. XMEMCPY((byte*)ext->obj->obj, oidBuf, ext->obj->objSz);
  1040. XFREE(oidBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  1041. oidBuf = NULL;
  1042. ext->obj->grp = oidCertExtType;
  1043. ext->crit = 0;
  1044. /* Get extension data and copy as ASN1_STRING */
  1045. tmpIdx = idx + length;
  1046. if ((tmpIdx >= (word32)sz) ||
  1047. (input[tmpIdx] != ASN_OCTET_STRING))
  1048. {
  1049. WOLFSSL_MSG("Error decoding unknown extension data");
  1050. wolfSSL_ASN1_OBJECT_free(ext->obj);
  1051. wolfSSL_X509_EXTENSION_free(ext);
  1052. FreeDecodedCert(cert);
  1053. #ifdef WOLFSSL_SMALL_STACK
  1054. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  1055. #endif
  1056. return NULL;
  1057. }
  1058. tmpIdx++;
  1059. if (GetLength(input, &tmpIdx, &length, sz) <= 0) {
  1060. WOLFSSL_MSG("Error: Invalid Input Length.");
  1061. wolfSSL_ASN1_OBJECT_free(ext->obj);
  1062. wolfSSL_X509_EXTENSION_free(ext);
  1063. FreeDecodedCert(cert);
  1064. #ifdef WOLFSSL_SMALL_STACK
  1065. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  1066. #endif
  1067. return NULL;
  1068. }
  1069. ext->value.data = (char*)XMALLOC(length, NULL, DYNAMIC_TYPE_ASN1);
  1070. ext->value.isDynamic = 1;
  1071. if (ext->value.data == NULL) {
  1072. WOLFSSL_MSG("Failed to malloc ASN1_STRING data");
  1073. wolfSSL_X509_EXTENSION_free(ext);
  1074. FreeDecodedCert(cert);
  1075. #ifdef WOLFSSL_SMALL_STACK
  1076. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  1077. #endif
  1078. return NULL;
  1079. }
  1080. XMEMCPY(ext->value.data,input+tmpIdx,length);
  1081. ext->value.length = length;
  1082. } /* switch(oid) */
  1083. break; /* Got the Extension. Now exit while loop. */
  1084. } /* while(idx < sz) */
  1085. /* Store the new extension in a stack inside x509
  1086. * The extensions on the stack are free'd internally when FreeX509 is called
  1087. */
  1088. if (x509->ext_sk == NULL)
  1089. x509->ext_sk = wolfSSL_sk_new_x509_ext();
  1090. if (wolfSSL_sk_X509_EXTENSION_push(x509->ext_sk, ext) == WOLFSSL_FAILURE) {
  1091. wolfSSL_X509_EXTENSION_free(ext);
  1092. ext = NULL;
  1093. }
  1094. FreeDecodedCert(cert);
  1095. #ifdef WOLFSSL_SMALL_STACK
  1096. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  1097. #endif
  1098. return ext;
  1099. }
  1100. /**
  1101. * @param str String to copy
  1102. * @param buf Output buffer. If this contains a pointer then it is free'd
  1103. * with the DYNAMIC_TYPE_X509_EXT hint.
  1104. * @param len Output length
  1105. * @return WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on error
  1106. */
  1107. static int asn1_string_copy_to_buffer(WOLFSSL_ASN1_STRING* str, byte** buf,
  1108. word32* len, void* heap) {
  1109. if (!str || !buf || !len) {
  1110. return WOLFSSL_FAILURE;
  1111. }
  1112. if (str->data && str->length > 0) {
  1113. if (*buf)
  1114. XFREE(*buf, heap, DYNAMIC_TYPE_X509_EXT);
  1115. *len = 0;
  1116. *buf = (byte*)XMALLOC(str->length, heap,
  1117. DYNAMIC_TYPE_X509_EXT);
  1118. if (!*buf) {
  1119. WOLFSSL_MSG("malloc error");
  1120. return WOLFSSL_FAILURE;
  1121. }
  1122. *len = str->length;
  1123. XMEMCPY(*buf, str->data, str->length);
  1124. }
  1125. (void)heap;
  1126. return WOLFSSL_SUCCESS;
  1127. }
  1128. int wolfSSL_X509_add_ext(WOLFSSL_X509 *x509, WOLFSSL_X509_EXTENSION *ext, int loc)
  1129. {
  1130. int nid;
  1131. WOLFSSL_ENTER("wolfSSL_X509_add_ext");
  1132. if (!x509 || !ext || loc >= 0) {
  1133. WOLFSSL_MSG("Bad parameter");
  1134. return WOLFSSL_FAILURE;
  1135. }
  1136. nid = (ext->obj != NULL) ? ext->obj->type : ext->value.nid;
  1137. switch (nid) {
  1138. case NID_authority_key_identifier:
  1139. if (x509->authKeyIdSrc != NULL) {
  1140. /* If authKeyId points into authKeyIdSrc then free it and
  1141. * revert to old functionality */
  1142. XFREE(x509->authKeyIdSrc, x509->heap, DYNAMIC_TYPE_X509_EXT);
  1143. x509->authKeyIdSrc = NULL;
  1144. x509->authKeyId = NULL;
  1145. }
  1146. if (asn1_string_copy_to_buffer(&ext->value, &x509->authKeyId,
  1147. &x509->authKeyIdSz, x509->heap) != WOLFSSL_SUCCESS) {
  1148. WOLFSSL_MSG("asn1_string_copy_to_buffer error");
  1149. return WOLFSSL_FAILURE;
  1150. }
  1151. x509->authKeyIdCrit = (byte)ext->crit;
  1152. break;
  1153. case NID_subject_key_identifier:
  1154. if (asn1_string_copy_to_buffer(&ext->value, &x509->subjKeyId,
  1155. &x509->subjKeyIdSz, x509->heap) != WOLFSSL_SUCCESS) {
  1156. WOLFSSL_MSG("asn1_string_copy_to_buffer error");
  1157. return WOLFSSL_FAILURE;
  1158. }
  1159. x509->subjKeyIdCrit = (byte)ext->crit;
  1160. break;
  1161. case NID_subject_alt_name:
  1162. {
  1163. WOLFSSL_GENERAL_NAMES* gns = ext->ext_sk;
  1164. while (gns) {
  1165. WOLFSSL_GENERAL_NAME* gn = gns->data.gn;
  1166. if ((gn != NULL) && (gn->type == ASN_OTHER_TYPE)) {
  1167. char *buf = NULL;
  1168. int ret = 0;
  1169. word32 len = 0;
  1170. len = SetOthername(gn->d.otherName, NULL);
  1171. if (len == WOLFSSL_FAILURE) {
  1172. return WOLFSSL_FAILURE;
  1173. }
  1174. buf = (char*)XMALLOC(len, x509->heap, DYNAMIC_TYPE_X509_EXT);
  1175. if (buf == NULL) {
  1176. WOLFSSL_MSG("Couldn't allocate memory for othername");
  1177. return WOLFSSL_FAILURE;
  1178. }
  1179. /* SetOthername() cannot fail; already passed above. */
  1180. SetOthername(gn->d.otherName, (byte*)buf);
  1181. ret = wolfSSL_X509_add_altname_ex(x509, buf, len,
  1182. ASN_OTHER_TYPE);
  1183. XFREE(buf, x509->heap, DYNAMIC_TYPE_X509_EXT);
  1184. if (ret == WOLFSSL_FAILURE) {
  1185. WOLFSSL_MSG("wolfSSL_X509_add_altname_ex() failed");
  1186. return WOLFSSL_FAILURE;
  1187. }
  1188. }
  1189. else if (!gn || !gn->d.ia5 ||
  1190. wolfSSL_X509_add_altname_ex(x509, gn->d.ia5->data,
  1191. gn->d.ia5->length, gn->type) != WOLFSSL_SUCCESS) {
  1192. WOLFSSL_MSG("Subject alternative name missing extension");
  1193. return WOLFSSL_FAILURE;
  1194. }
  1195. gns = gns->next;
  1196. }
  1197. x509->subjAltNameSet = 1;
  1198. x509->subjAltNameCrit = (byte)ext->crit;
  1199. break;
  1200. }
  1201. case NID_key_usage:
  1202. if (ext && ext->value.data) {
  1203. if (ext->value.length == sizeof(word16)) {
  1204. /* if ext->value is already word16, set directly */
  1205. x509->keyUsage = *(word16*)ext->value.data;
  1206. x509->keyUsageCrit = (byte)ext->crit;
  1207. x509->keyUsageSet = 1;
  1208. }
  1209. else if (ext->value.length > 0) {
  1210. /* ext->value is comma-delimited string, convert to word16 */
  1211. if (ParseKeyUsageStr(ext->value.data, &x509->keyUsage,
  1212. x509->heap) != 0) {
  1213. return WOLFSSL_FAILURE;
  1214. }
  1215. x509->keyUsageCrit = (byte)ext->crit;
  1216. x509->keyUsageSet = 1;
  1217. }
  1218. else {
  1219. return WOLFSSL_FAILURE;
  1220. }
  1221. }
  1222. break;
  1223. case NID_ext_key_usage:
  1224. if (ext && ext->value.data) {
  1225. if (ext->value.length == sizeof(byte)) {
  1226. /* if ext->value is already word16, set directly */
  1227. x509->extKeyUsage = *(byte*)ext->value.data;
  1228. x509->extKeyUsageCrit = (byte)ext->crit;
  1229. }
  1230. else if (ext->value.length > 0) {
  1231. /* ext->value is comma-delimited string, convert to word16 */
  1232. if (ParseExtKeyUsageStr(ext->value.data, &x509->extKeyUsage,
  1233. x509->heap) != 0) {
  1234. return WOLFSSL_FAILURE;
  1235. }
  1236. x509->extKeyUsageCrit = (byte)ext->crit;
  1237. }
  1238. else {
  1239. return WOLFSSL_FAILURE;
  1240. }
  1241. }
  1242. break;
  1243. case NID_basic_constraints:
  1244. if (ext->obj) {
  1245. x509->isCa = (byte)ext->obj->ca;
  1246. x509->basicConstCrit = (byte)ext->crit;
  1247. if (ext->obj->pathlen)
  1248. x509->pathLength = ext->obj->pathlen->length;
  1249. x509->basicConstSet = 1;
  1250. }
  1251. break;
  1252. default:
  1253. #ifdef WOLFSSL_CUSTOM_OID
  1254. if ((ext->obj == NULL) || (ext->value.length == 0)) {
  1255. WOLFSSL_MSG("Extension has insufficient information.");
  1256. return WOLFSSL_FAILURE;
  1257. }
  1258. if ((x509->customExtCount < 0) ||
  1259. (x509->customExtCount >= NUM_CUSTOM_EXT)) {
  1260. WOLFSSL_MSG("Bad value for customExtCount.");
  1261. return WOLFSSL_FAILURE;
  1262. }
  1263. /* This is a viable custom extension. */
  1264. char *oid = XMALLOC(MAX_OID_STRING_SZ, x509->heap,
  1265. DYNAMIC_TYPE_X509_EXT);
  1266. byte *val = XMALLOC(ext->value.length, x509->heap,
  1267. DYNAMIC_TYPE_X509_EXT);
  1268. int err = 0;
  1269. if ((oid == NULL) || (val == NULL)) {
  1270. WOLFSSL_MSG("Memory allocation failure.\n");
  1271. err = 1;
  1272. }
  1273. if (err == 0) {
  1274. XMEMCPY(val, ext->value.data, ext->value.length);
  1275. if (wolfSSL_OBJ_obj2txt(oid, MAX_OID_STRING_SZ, ext->obj, 1) < 0) {
  1276. err = 1;
  1277. }
  1278. }
  1279. if (err == 1) {
  1280. XFREE(val, x509->heap, DYNAMIC_TYPE_X509_EXT);
  1281. XFREE(oid, x509->heap, DYNAMIC_TYPE_X509_EXT);
  1282. return WOLFSSL_FAILURE;
  1283. }
  1284. /* x509->custom_exts now owns the buffers and they must be managed. */
  1285. x509->custom_exts[x509->customExtCount].oid = oid;
  1286. x509->custom_exts[x509->customExtCount].crit = ext->crit;
  1287. x509->custom_exts[x509->customExtCount].val = val;
  1288. x509->custom_exts[x509->customExtCount].valSz = ext->value.length;
  1289. x509->customExtCount++;
  1290. #else
  1291. WOLFSSL_MSG("Unsupported extension to add");
  1292. return WOLFSSL_FAILURE;
  1293. #endif /* WOLFSSL_CUSTOM_OID */
  1294. break;
  1295. }
  1296. return WOLFSSL_SUCCESS;
  1297. }
  1298. #ifndef NO_BIO
  1299. /* Return 0 on success and 1 on failure. Copies ext data to bio, using indent
  1300. * to pad the output. flag is ignored. */
  1301. int wolfSSL_X509V3_EXT_print(WOLFSSL_BIO *out, WOLFSSL_X509_EXTENSION *ext,
  1302. unsigned long flag, int indent)
  1303. {
  1304. ASN1_OBJECT* obj;
  1305. ASN1_STRING* str;
  1306. int nid;
  1307. int rc = WOLFSSL_FAILURE;
  1308. char tmp[CTC_NAME_SIZE*2 + 1];
  1309. const int tmpSz = sizeof(tmp);
  1310. int tmpLen = 0;
  1311. WOLFSSL_ENTER("wolfSSL_X509V3_EXT_print");
  1312. if ((out == NULL) || (ext == NULL)) {
  1313. WOLFSSL_MSG("NULL parameter error");
  1314. return rc;
  1315. }
  1316. obj = wolfSSL_X509_EXTENSION_get_object(ext);
  1317. if (obj == NULL) {
  1318. WOLFSSL_MSG("Error getting ASN1_OBJECT from X509_EXTENSION");
  1319. return rc;
  1320. }
  1321. str = wolfSSL_X509_EXTENSION_get_data(ext);
  1322. if (str == NULL) {
  1323. WOLFSSL_MSG("Error getting ASN1_STRING from X509_EXTENSION");
  1324. return rc;
  1325. }
  1326. /* Print extension based on the type */
  1327. nid = wolfSSL_OBJ_obj2nid(obj);
  1328. switch (nid) {
  1329. case BASIC_CA_OID:
  1330. {
  1331. char isCa[] = "TRUE";
  1332. char notCa[] = "FALSE";
  1333. if ((tmpLen = XSNPRINTF(tmp, tmpSz, "%*sCA:%s", indent, "",
  1334. obj->ca ? isCa : notCa))
  1335. >= tmpSz)
  1336. return rc;
  1337. break;
  1338. }
  1339. case ALT_NAMES_OID:
  1340. {
  1341. WOLFSSL_STACK* sk;
  1342. char* val;
  1343. int valLen;
  1344. int len;
  1345. sk = ext->ext_sk;
  1346. while (sk != NULL) {
  1347. if (sk->type == STACK_TYPE_GEN_NAME && sk->data.gn) {
  1348. /* str is GENERAL_NAME for subject alternative name ext */
  1349. str = sk->data.gn->d.ia5;
  1350. len = str->length + 2; /* + 2 for NULL char and "," */
  1351. if (len > tmpSz) {
  1352. WOLFSSL_MSG("len greater than buffer size");
  1353. return rc;
  1354. }
  1355. val = (char*)XMALLOC(len + indent, NULL,
  1356. DYNAMIC_TYPE_TMP_BUFFER);
  1357. if (val == NULL) {
  1358. WOLFSSL_MSG("Memory error");
  1359. return rc;
  1360. }
  1361. if (sk->next) {
  1362. if ((valLen = XSNPRINTF(val, len, "%*s%s,",
  1363. indent, "", str->strData))
  1364. >= len) {
  1365. XFREE(val, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  1366. return rc;
  1367. }
  1368. } else {
  1369. if ((valLen = XSNPRINTF(val, len, "%*s%s",
  1370. indent, "", str->strData))
  1371. >= len) {
  1372. XFREE(val, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  1373. return rc;
  1374. }
  1375. }
  1376. if ((tmpLen + valLen) >= tmpSz) {
  1377. XFREE(val, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  1378. return rc;
  1379. }
  1380. XMEMCPY(tmp + tmpLen, val, valLen);
  1381. tmpLen += valLen;
  1382. XFREE(val, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  1383. }
  1384. sk = sk->next;
  1385. }
  1386. break;
  1387. }
  1388. case AUTH_KEY_OID:
  1389. case SUBJ_KEY_OID:
  1390. {
  1391. char* asn1str;
  1392. asn1str = wolfSSL_i2s_ASN1_STRING(NULL, str);
  1393. tmpLen = XSNPRINTF(tmp, tmpSz, "%*s%s", indent, "", asn1str);
  1394. XFREE(asn1str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  1395. if (tmpLen >= tmpSz) return rc;
  1396. break;
  1397. }
  1398. case AUTH_INFO_OID:
  1399. case CERT_POLICY_OID:
  1400. case CRL_DIST_OID:
  1401. case KEY_USAGE_OID:
  1402. WOLFSSL_MSG("X509V3_EXT_print not yet implemented for ext type");
  1403. break;
  1404. default:
  1405. if ((tmpLen = XSNPRINTF(
  1406. tmp, tmpSz, "%*s%s", indent, "", str->strData))
  1407. >= tmpSz)
  1408. return rc;
  1409. }
  1410. if (wolfSSL_BIO_write(out, tmp, tmpLen) == tmpLen) {
  1411. rc = WOLFSSL_SUCCESS;
  1412. }
  1413. (void) flag;
  1414. return rc;
  1415. }
  1416. #endif /* !NO_BIO */
  1417. #ifndef NO_WOLFSSL_STUB
  1418. int wolfSSL_X509V3_EXT_add_nconf(WOLFSSL_CONF *conf, WOLFSSL_X509V3_CTX *ctx,
  1419. const char *section, WOLFSSL_X509 *cert)
  1420. {
  1421. WOLFSSL_ENTER("wolfSSL_X509V3_EXT_add_nconf");
  1422. WOLFSSL_STUB("wolfSSL_X509V3_EXT_add_nconf");
  1423. (void)conf;
  1424. (void)ctx;
  1425. (void)section;
  1426. (void)cert;
  1427. return WOLFSSL_SUCCESS;
  1428. }
  1429. #endif
  1430. /* Returns crit flag in X509_EXTENSION object */
  1431. int wolfSSL_X509_EXTENSION_get_critical(const WOLFSSL_X509_EXTENSION* ex)
  1432. {
  1433. WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_get_critical");
  1434. if (ex == NULL)
  1435. return BAD_FUNC_ARG;
  1436. return ex->crit;
  1437. }
  1438. /* Sets if the extension is critical
  1439. * returns WOLFSSL_SUCCESS on success
  1440. */
  1441. int wolfSSL_X509_EXTENSION_set_critical(WOLFSSL_X509_EXTENSION* ex, int crit)
  1442. {
  1443. WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_set_critical");
  1444. if (ex == NULL)
  1445. return WOLFSSL_FAILURE;
  1446. ex->crit = crit;
  1447. return WOLFSSL_SUCCESS;
  1448. }
  1449. /* Creates v3_ext_method for a given X509v3 extension
  1450. *
  1451. * ex : The X509_EXTENSION used to create v3_ext_method. If the extension is
  1452. * not NULL, get the NID of the extension object and populate the
  1453. * extension type-specific X509V3_EXT_* function(s) in v3_ext_method.
  1454. *
  1455. * Returns NULL on error or pointer to the v3_ext_method populated with extension
  1456. * type-specific X509V3_EXT_* function(s).
  1457. *
  1458. * NOTE: NID_subject_key_identifier is currently the only extension implementing
  1459. * the X509V3_EXT_* functions, as it is the only type called directly by QT. The
  1460. * other extension types return a pointer to a v3_ext_method struct that contains
  1461. * only the NID.
  1462. */
  1463. #if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L
  1464. const WOLFSSL_v3_ext_method* wolfSSL_X509V3_EXT_get(WOLFSSL_X509_EXTENSION* ex)
  1465. #else
  1466. WOLFSSL_v3_ext_method* wolfSSL_X509V3_EXT_get(WOLFSSL_X509_EXTENSION* ex)
  1467. #endif
  1468. {
  1469. int nid;
  1470. WOLFSSL_v3_ext_method method;
  1471. WOLFSSL_ENTER("wolfSSL_X509V3_EXT_get");
  1472. if ((ex == NULL) || (ex->obj == NULL)) {
  1473. WOLFSSL_MSG("Passed an invalid X509_EXTENSION*");
  1474. return NULL;
  1475. }
  1476. /* Initialize method to 0 */
  1477. XMEMSET(&method, 0, sizeof(struct WOLFSSL_v3_ext_method));
  1478. nid = ex->obj->nid;
  1479. if (nid <= 0) {
  1480. WOLFSSL_MSG("Failed to get nid from passed extension object");
  1481. return NULL;
  1482. }
  1483. XMEMSET(&method, 0, sizeof(WOLFSSL_v3_ext_method));
  1484. switch (nid) {
  1485. case NID_basic_constraints:
  1486. break;
  1487. case NID_subject_key_identifier:
  1488. method.i2s = (X509V3_EXT_I2S)wolfSSL_i2s_ASN1_STRING;
  1489. break;
  1490. case NID_subject_alt_name:
  1491. WOLFSSL_MSG("i2v function not yet implemented for Subject Alternative Name");
  1492. break;
  1493. case NID_key_usage:
  1494. WOLFSSL_MSG("i2v function not yet implemented for Key Usage");
  1495. break;
  1496. case NID_authority_key_identifier:
  1497. WOLFSSL_MSG("i2v function not yet implemented for Auth Key Id");
  1498. break;
  1499. case NID_info_access:
  1500. WOLFSSL_MSG("i2v function not yet implemented for Info Access");
  1501. break;
  1502. case NID_ext_key_usage:
  1503. WOLFSSL_MSG("i2v function not yet implemented for Ext Key Usage");
  1504. break;
  1505. case NID_certificate_policies:
  1506. WOLFSSL_MSG("r2i function not yet implemented for Cert Policies");
  1507. break;
  1508. case NID_crl_distribution_points:
  1509. WOLFSSL_MSG("r2i function not yet implemented for CRL Dist Points");
  1510. break;
  1511. default:
  1512. /* If extension type is unknown, return NULL -- QT makes call to
  1513. X509_EXTENSION_get_data() if there is no v3_ext_method */
  1514. WOLFSSL_MSG("X509V3_EXT_get(): Unknown extension type found");
  1515. return NULL;
  1516. }
  1517. method.ext_nid = nid;
  1518. ex->ext_method = method;
  1519. #if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L
  1520. return (const WOLFSSL_v3_ext_method*)&ex->ext_method;
  1521. #else
  1522. return (WOLFSSL_v3_ext_method*)&ex->ext_method;
  1523. #endif
  1524. }
  1525. /* Create an Authority Info Access (AIA) from the contents of the extension.
  1526. *
  1527. * AIA is a stack of Access Descriptions.
  1528. *
  1529. * RFC 5280: 4.2.2.1
  1530. *
  1531. * @param [in] ext X509v3 extension.
  1532. * @return Stack of Access Descriptions as an AIA on success.
  1533. * @return NULL on error.
  1534. */
  1535. static WOLFSSL_AUTHORITY_INFO_ACCESS* wolfssl_x509v3_ext_aia_d2i(
  1536. WOLFSSL_X509_EXTENSION* ext)
  1537. {
  1538. int err = 0;
  1539. int ret;
  1540. WOLFSSL_AUTHORITY_INFO_ACCESS* aia = NULL;
  1541. WOLFSSL_STACK* sk;
  1542. WOLFSSL_ACCESS_DESCRIPTION* ad = NULL;
  1543. /* Get the type specific data of this extension. */
  1544. sk = ext->ext_sk;
  1545. if (sk == NULL) {
  1546. WOLFSSL_MSG("ACCESS_DESCRIPTION stack NULL");
  1547. err = 1;
  1548. }
  1549. if (!err) {
  1550. /* AUTHORITY_INFO_ACCESS is a stack of ACCESS_DESCRIPTION entries. */
  1551. aia = wolfSSL_sk_new_null();
  1552. if (aia == NULL) {
  1553. WOLFSSL_MSG("Failed to malloc AUTHORITY_INFO_ACCESS");
  1554. err = 1;
  1555. }
  1556. }
  1557. if (!err) {
  1558. /* AIA is a stack of Access Descriptions. */
  1559. aia->type = STACK_TYPE_ACCESS_DESCRIPTION;
  1560. }
  1561. while ((!err) && (sk != NULL)) {
  1562. WOLFSSL_ASN1_OBJECT* aiaEntry;
  1563. /* Looking for objects in extension's data. */
  1564. if (sk->type != STACK_TYPE_OBJ) {
  1565. sk = sk->next;
  1566. continue;
  1567. }
  1568. /* Get ASN.1 Object from the stack entry's data. */
  1569. aiaEntry = sk->data.obj;
  1570. /* ACCESS_DESCRIPTION has two members: method and location.
  1571. * method: ASN1_OBJECT as either AIA_OCSP_OID or AIA_CA_ISSUER_OID
  1572. * location: GENERAL_NAME structure containing the URI.
  1573. */
  1574. /* Allocate a new Access Description. */
  1575. ad = (WOLFSSL_ACCESS_DESCRIPTION*)XMALLOC(
  1576. sizeof(WOLFSSL_ACCESS_DESCRIPTION), NULL, DYNAMIC_TYPE_X509_EXT);
  1577. if (ad == NULL) {
  1578. WOLFSSL_MSG("Failed to malloc ACCESS_DESCRIPTION");
  1579. err = 1;
  1580. break;
  1581. }
  1582. XMEMSET(ad, 0, sizeof(WOLFSSL_ACCESS_DESCRIPTION));
  1583. /* Create new ASN1_OBJECT from NID. */
  1584. ad->method = wolfSSL_OBJ_nid2obj(aiaEntry->nid);
  1585. if (ad->method == NULL) {
  1586. WOLFSSL_MSG("OBJ_nid2obj() failed");
  1587. err = 1;
  1588. break;
  1589. }
  1590. /* Allocate memory for GENERAL NAME. */
  1591. ad->location = wolfSSL_GENERAL_NAME_new();
  1592. if (ad->location == NULL) {
  1593. WOLFSSL_MSG("Failed to malloc GENERAL_NAME");
  1594. err = 1;
  1595. break;
  1596. }
  1597. /* Set the type of general name to URI (only type supported). */
  1598. ret = wolfSSL_GENERAL_NAME_set_type(ad->location, GEN_URI);
  1599. if (ret != WOLFSSL_SUCCESS) {
  1600. err = 1;
  1601. break;
  1602. }
  1603. /* Set the URI into GENERAL_NAME. */
  1604. ret = wolfSSL_ASN1_STRING_set(ad->location->d.uniformResourceIdentifier,
  1605. aiaEntry->obj, aiaEntry->objSz);
  1606. if (ret != WOLFSSL_SUCCESS) {
  1607. WOLFSSL_MSG("ASN1_STRING_set() failed");
  1608. err = 1;
  1609. break;
  1610. }
  1611. /* Push onto AUTHORITY_INFO_ACCESS stack. */
  1612. ret = wolfSSL_sk_ACCESS_DESCRIPTION_push(aia, ad);
  1613. if (ret != WOLFSSL_SUCCESS) {
  1614. WOLFSSL_MSG("Error pushing ASN1 AD onto stack");
  1615. err = 1;
  1616. break;
  1617. }
  1618. /* Set to NULL so that it doesn't get freed now it is in AIA stack. */
  1619. ad = NULL;
  1620. sk = sk->next;
  1621. }
  1622. if (err) {
  1623. /* Dispose of Access Description if not put in stack. */
  1624. if (ad != NULL) {
  1625. wolfSSL_ASN1_OBJECT_free(ad->method);
  1626. wolfSSL_GENERAL_NAME_free(ad->location);
  1627. XFREE(ad, NULL, DYNAMIC_TYPE_X509_EXT);
  1628. }
  1629. /* Dispose of incomplete Access Description stack. */
  1630. wolfSSL_sk_ACCESS_DESCRIPTION_pop_free(aia, NULL);
  1631. aia = NULL;
  1632. }
  1633. return aia;
  1634. }
  1635. /* Parses and returns an x509v3 extension internal structure.
  1636. *
  1637. * ext : The X509_EXTENSION for parsing internal structure. If extension is
  1638. * not NULL, get the NID of the extension object and create a new
  1639. * extension-specific internal structure based on the extension type.
  1640. *
  1641. * Returns NULL on error or if NID is not found, otherwise returns a pointer to
  1642. * the extension type-specific X509_EXTENSION internal structure.
  1643. * Return is expected to be free'd by caller.
  1644. */
  1645. void* wolfSSL_X509V3_EXT_d2i(WOLFSSL_X509_EXTENSION* ext)
  1646. {
  1647. const WOLFSSL_v3_ext_method* method;
  1648. int ret;
  1649. WOLFSSL_ASN1_OBJECT* object;
  1650. WOLFSSL_BASIC_CONSTRAINTS* bc;
  1651. WOLFSSL_AUTHORITY_KEYID* akey;
  1652. WOLFSSL_ASN1_STRING* asn1String, *newString;
  1653. WOLFSSL_STACK* sk;
  1654. WOLFSSL_ENTER("wolfSSL_X509V3_EXT_d2i");
  1655. if(ext == NULL) {
  1656. WOLFSSL_MSG("Bad function Argument");
  1657. return NULL;
  1658. }
  1659. /* extract extension info */
  1660. method = wolfSSL_X509V3_EXT_get(ext);
  1661. if (method == NULL) {
  1662. WOLFSSL_MSG("wolfSSL_X509V3_EXT_get error");
  1663. return NULL;
  1664. }
  1665. object = wolfSSL_X509_EXTENSION_get_object(ext);
  1666. if (object == NULL) {
  1667. WOLFSSL_MSG("X509_EXTENSION_get_object failed");
  1668. return NULL;
  1669. }
  1670. /* Return pointer to proper internal structure based on NID */
  1671. switch (object->type) {
  1672. /* basicConstraints */
  1673. case (NID_basic_constraints):
  1674. WOLFSSL_MSG("basicConstraints");
  1675. /* Allocate new BASIC_CONSTRAINTS structure */
  1676. bc = wolfSSL_BASIC_CONSTRAINTS_new();
  1677. if (bc == NULL) {
  1678. WOLFSSL_MSG("Failed to malloc basic constraints");
  1679. return NULL;
  1680. }
  1681. /* Copy pathlen and CA into BASIC_CONSTRAINTS from object */
  1682. bc->ca = object->ca;
  1683. if (object->pathlen->length > 0) {
  1684. bc->pathlen = wolfSSL_ASN1_INTEGER_dup(object->pathlen);
  1685. if (bc->pathlen == NULL) {
  1686. WOLFSSL_MSG("Failed to duplicate ASN1_INTEGER");
  1687. wolfSSL_BASIC_CONSTRAINTS_free(bc);
  1688. return NULL;
  1689. }
  1690. }
  1691. else
  1692. bc->pathlen = NULL;
  1693. return bc;
  1694. /* subjectKeyIdentifier */
  1695. case (NID_subject_key_identifier):
  1696. WOLFSSL_MSG("subjectKeyIdentifier");
  1697. asn1String = wolfSSL_X509_EXTENSION_get_data(ext);
  1698. if (asn1String == NULL) {
  1699. WOLFSSL_MSG("X509_EXTENSION_get_data() failed");
  1700. return NULL;
  1701. }
  1702. newString = wolfSSL_ASN1_STRING_new();
  1703. if (newString == NULL) {
  1704. WOLFSSL_MSG("Failed to malloc ASN1_STRING");
  1705. return NULL;
  1706. }
  1707. ret = wolfSSL_ASN1_STRING_set(newString, asn1String->data,
  1708. asn1String->length);
  1709. if (ret != WOLFSSL_SUCCESS) {
  1710. WOLFSSL_MSG("ASN1_STRING_set() failed");
  1711. wolfSSL_ASN1_STRING_free(newString);
  1712. return NULL;
  1713. };
  1714. newString->type = asn1String->type;
  1715. return newString;
  1716. /* authorityKeyIdentifier */
  1717. case (NID_authority_key_identifier):
  1718. WOLFSSL_MSG("AuthorityKeyIdentifier");
  1719. akey = (WOLFSSL_AUTHORITY_KEYID*)
  1720. XMALLOC(sizeof(WOLFSSL_AUTHORITY_KEYID), NULL,
  1721. DYNAMIC_TYPE_X509_EXT);
  1722. if (akey == NULL) {
  1723. WOLFSSL_MSG("Failed to malloc authority key id");
  1724. return NULL;
  1725. }
  1726. XMEMSET(akey, 0, sizeof(WOLFSSL_AUTHORITY_KEYID));
  1727. akey->keyid = wolfSSL_ASN1_STRING_new();
  1728. if (akey->keyid == NULL) {
  1729. WOLFSSL_MSG("ASN1_STRING_new() failed");
  1730. wolfSSL_AUTHORITY_KEYID_free(akey);
  1731. return NULL;
  1732. }
  1733. asn1String = wolfSSL_X509_EXTENSION_get_data(ext);
  1734. if (asn1String == NULL) {
  1735. WOLFSSL_MSG("X509_EXTENSION_get_data() failed");
  1736. wolfSSL_AUTHORITY_KEYID_free(akey);
  1737. return NULL;
  1738. }
  1739. ret = wolfSSL_ASN1_STRING_set(akey->keyid, asn1String->data,
  1740. asn1String->length);
  1741. if (ret != WOLFSSL_SUCCESS) {
  1742. WOLFSSL_MSG("ASN1_STRING_set() failed");
  1743. wolfSSL_AUTHORITY_KEYID_free(akey);
  1744. return NULL;
  1745. };
  1746. akey->keyid->type = asn1String->type;
  1747. /* For now, set issuer and serial to NULL. This may need to be
  1748. updated for future use */
  1749. akey->issuer = NULL;
  1750. akey->serial = NULL;
  1751. return akey;
  1752. /* keyUsage */
  1753. case (NID_key_usage):
  1754. WOLFSSL_MSG("keyUsage");
  1755. /* This may need to be updated for future use. The i2v method for
  1756. keyUsage is not currently set. For now, return the ASN1_STRING
  1757. representation of KeyUsage bit string */
  1758. asn1String = wolfSSL_X509_EXTENSION_get_data(ext);
  1759. if (asn1String == NULL) {
  1760. WOLFSSL_MSG("X509_EXTENSION_get_data() failed");
  1761. return NULL;
  1762. }
  1763. newString = wolfSSL_ASN1_STRING_new();
  1764. if (newString == NULL) {
  1765. WOLFSSL_MSG("Failed to malloc ASN1_STRING");
  1766. return NULL;
  1767. }
  1768. ret = wolfSSL_ASN1_STRING_set(newString, asn1String->data,
  1769. asn1String->length);
  1770. if (ret != WOLFSSL_SUCCESS) {
  1771. WOLFSSL_MSG("ASN1_STRING_set() failed");
  1772. wolfSSL_ASN1_STRING_free(newString);
  1773. return NULL;
  1774. };
  1775. newString->type = asn1String->type;
  1776. return newString;
  1777. /* extKeyUsage */
  1778. case (NID_ext_key_usage):
  1779. WOLFSSL_MSG("extKeyUsage not supported yet");
  1780. return NULL;
  1781. /* certificatePolicies */
  1782. case (NID_certificate_policies):
  1783. WOLFSSL_MSG("certificatePolicies not supported yet");
  1784. return NULL;
  1785. /* cRLDistributionPoints */
  1786. case (NID_crl_distribution_points):
  1787. WOLFSSL_MSG("cRLDistributionPoints not supported yet");
  1788. return NULL;
  1789. case NID_subject_alt_name:
  1790. if (ext->ext_sk == NULL) {
  1791. WOLFSSL_MSG("Subject alt name stack NULL");
  1792. return NULL;
  1793. }
  1794. sk = wolfSSL_sk_dup(ext->ext_sk);
  1795. if (sk == NULL) {
  1796. WOLFSSL_MSG("Failed to duplicate subject alt names stack.");
  1797. return NULL;
  1798. }
  1799. return sk;
  1800. /* authorityInfoAccess */
  1801. case NID_info_access:
  1802. WOLFSSL_MSG("AuthorityInfoAccess");
  1803. return wolfssl_x509v3_ext_aia_d2i(ext);
  1804. default:
  1805. WOLFSSL_MSG("Extension NID not in table, returning NULL");
  1806. break;
  1807. }
  1808. return NULL;
  1809. }
  1810. /* Looks for the extension matching the passed in nid
  1811. *
  1812. * x509 : certificate to get parse through for extension.
  1813. * nid : Extension OID to be found.
  1814. * lastPos : Start search from extension after lastPos.
  1815. * Set to -1 to search from index 0.
  1816. * return >= 0 If successful the extension index is returned.
  1817. * return -1 If extension is not found or error is encountered.
  1818. */
  1819. int wolfSSL_X509_get_ext_by_NID(const WOLFSSL_X509* x509, int nid, int lastPos)
  1820. {
  1821. int extCount = 0, length = 0, outSz = 0, sz = 0, ret = 0;
  1822. int isSet = 0, found = 0, loc;
  1823. const byte* rawCert;
  1824. const byte* input;
  1825. word32 oid, idx = 0, tmpIdx = 0, foundNID;
  1826. #ifdef WOLFSSL_SMALL_STACK
  1827. DecodedCert *cert;
  1828. #else
  1829. DecodedCert cert[1];
  1830. #endif
  1831. WOLFSSL_ENTER("wolfSSL_X509_get_ext_by_NID");
  1832. if(x509 == NULL){
  1833. WOLFSSL_MSG("\tNot passed a certificate");
  1834. return WOLFSSL_FATAL_ERROR;
  1835. }
  1836. if(lastPos < -1 || (lastPos > (wolfSSL_X509_get_ext_count(x509) - 1))){
  1837. WOLFSSL_MSG("\tBad location argument");
  1838. return WOLFSSL_FATAL_ERROR;
  1839. }
  1840. loc = lastPos + 1;
  1841. rawCert = wolfSSL_X509_get_der((WOLFSSL_X509*)x509, &outSz);
  1842. if (rawCert == NULL) {
  1843. WOLFSSL_MSG("\tX509_get_der() failed");
  1844. return WOLFSSL_FATAL_ERROR;
  1845. }
  1846. #ifdef WOLFSSL_SMALL_STACK
  1847. cert = (DecodedCert *)XMALLOC(sizeof(*cert), x509->heap,
  1848. DYNAMIC_TYPE_DCERT);
  1849. if (cert == NULL) {
  1850. WOLFSSL_MSG("\tout of memory");
  1851. return WOLFSSL_FATAL_ERROR;
  1852. }
  1853. #endif
  1854. InitDecodedCert( cert, rawCert, (word32)outSz, 0);
  1855. if (ParseCert(cert,
  1856. #ifdef WOLFSSL_CERT_REQ
  1857. x509->isCSR ? CERTREQ_TYPE :
  1858. #endif
  1859. CA_TYPE,
  1860. NO_VERIFY, NULL) < 0) {
  1861. WOLFSSL_MSG("\tCertificate parsing failed");
  1862. goto out;
  1863. }
  1864. input = cert->extensions;
  1865. sz = cert->extensionsSz;
  1866. if (input == NULL || sz == 0) {
  1867. WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
  1868. goto out;
  1869. }
  1870. #ifdef WOLFSSL_CERT_REQ
  1871. if (!x509->isCSR)
  1872. #endif
  1873. {
  1874. if (input[idx++] != ASN_EXTENSIONS) {
  1875. WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
  1876. goto out;
  1877. }
  1878. if (GetLength(input, &idx, &length, sz) < 0) {
  1879. WOLFSSL_MSG("\tfail: invalid length");
  1880. goto out;
  1881. }
  1882. }
  1883. if (GetSequence(input, &idx, &length, sz) < 0) {
  1884. WOLFSSL_MSG("\tfail: should be a SEQUENCE (1)");
  1885. goto out;
  1886. }
  1887. while (idx < (word32)sz) {
  1888. oid = 0;
  1889. if (GetSequence(input, &idx, &length, sz) < 0) {
  1890. WOLFSSL_MSG("\tfail: should be a SEQUENCE");
  1891. goto out;
  1892. }
  1893. tmpIdx = idx;
  1894. ret = GetObjectId(input, &idx, &oid, oidCertExtType, sz);
  1895. if (ret < 0) {
  1896. WOLFSSL_MSG("\tfail: OBJECT ID");
  1897. goto out;
  1898. }
  1899. idx = tmpIdx;
  1900. foundNID = (word32)oid2nid(oid, oidCertExtType);
  1901. if (extCount >= loc) {
  1902. /* extCount >= loc. Now check if extension has been set */
  1903. isSet = wolfSSL_X509_ext_isSet_by_NID((WOLFSSL_X509*)x509, foundNID);
  1904. if (isSet && ((word32)nid == foundNID)) {
  1905. found = 1;
  1906. break;
  1907. }
  1908. }
  1909. idx += length;
  1910. extCount++;
  1911. } /* while(idx < sz) */
  1912. out:
  1913. FreeDecodedCert(cert);
  1914. #ifdef WOLFSSL_SMALL_STACK
  1915. XFREE(cert, x509->heap, DYNAMIC_TYPE_DCERT);
  1916. #endif
  1917. return found ? extCount : WOLFSSL_FATAL_ERROR;
  1918. }
  1919. #endif /* OPENSSL_ALL || OPENSSL_EXTRA */
  1920. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  1921. /* Looks for the extension matching the passed in nid
  1922. *
  1923. * c : if not null then is set to status value -2 if multiple occurrences
  1924. * of the extension are found, -1 if not found, 0 if found and not
  1925. * critical, and 1 if found and critical.
  1926. * nid : Extension OID to be found.
  1927. * idx : if NULL return first extension found match, otherwise start search at
  1928. * idx location and set idx to the location of extension returned.
  1929. * returns NULL or a pointer to an WOLFSSL_ASN1_BIT_STRING (for KEY_USAGE_OID)
  1930. * or WOLFSSL_STACK (for other)
  1931. * holding extension structure
  1932. *
  1933. * NOTE code for decoding extensions is in asn.c DecodeCertExtensions --
  1934. * use already decoded extension in this function to avoid decoding twice.
  1935. * Currently we do not make use of idx since getting pre decoded extensions.
  1936. */
  1937. void* wolfSSL_X509_get_ext_d2i(const WOLFSSL_X509* x509, int nid, int* c,
  1938. int* idx)
  1939. {
  1940. void* ret = NULL;
  1941. WOLFSSL_STACK* sk = NULL;
  1942. WOLFSSL_ASN1_OBJECT* obj = NULL;
  1943. WOLFSSL_GENERAL_NAME* gn = NULL;
  1944. #ifdef OPENSSL_EXTRA
  1945. WOLFSSL_DIST_POINT* dp = NULL;
  1946. #endif
  1947. WOLFSSL_BASIC_CONSTRAINTS* bc = NULL;
  1948. WOLFSSL_ENTER("wolfSSL_X509_get_ext_d2i");
  1949. if (x509 == NULL) {
  1950. return NULL;
  1951. }
  1952. if (c != NULL) {
  1953. *c = -1; /* default to not found */
  1954. }
  1955. switch (nid) {
  1956. case BASIC_CA_OID:
  1957. if (x509->basicConstSet) {
  1958. WOLFSSL_ASN1_INTEGER* a;
  1959. bc = wolfSSL_BASIC_CONSTRAINTS_new();
  1960. if (!bc) {
  1961. WOLFSSL_MSG("wolfSSL_BASIC_CONSTRAINTS_new error");
  1962. return NULL;
  1963. }
  1964. a = wolfSSL_ASN1_INTEGER_new();
  1965. if (!a) {
  1966. WOLFSSL_MSG("wolfSSL_ASN1_INTEGER_new error");
  1967. wolfSSL_BASIC_CONSTRAINTS_free(bc);
  1968. return NULL;
  1969. }
  1970. a->length = x509->pathLength;
  1971. #if defined(OPENSSL_ALL) || defined(WOLFSSL_QT) || \
  1972. defined(WOLFSSL_APACHE_HTTPD)
  1973. bc->ca = x509->isCa;
  1974. #endif
  1975. bc->pathlen = a;
  1976. if (c != NULL) {
  1977. *c = x509->basicConstCrit;
  1978. }
  1979. }
  1980. else {
  1981. WOLFSSL_MSG("No Basic Constraint set");
  1982. }
  1983. return bc;
  1984. case ALT_NAMES_OID:
  1985. {
  1986. DNS_entry* dns = NULL;
  1987. if (x509->subjAltNameSet && x509->altNames != NULL) {
  1988. /* Malloc GENERAL_NAME stack */
  1989. sk = wolfSSL_sk_new_null();
  1990. if (sk == NULL)
  1991. return NULL;
  1992. sk->type = STACK_TYPE_GEN_NAME;
  1993. /* alt names are DNS_entry structs */
  1994. if (c != NULL) {
  1995. if (x509->altNames->next != NULL) {
  1996. *c = -2; /* more then one found */
  1997. }
  1998. else {
  1999. *c = x509->subjAltNameCrit;
  2000. }
  2001. }
  2002. dns = x509->altNames;
  2003. /* Currently only support GEN_DNS type */
  2004. while (dns != NULL) {
  2005. gn = wolfSSL_GENERAL_NAME_new();
  2006. if (gn == NULL) {
  2007. WOLFSSL_MSG("Error creating GENERAL_NAME");
  2008. goto err;
  2009. }
  2010. gn->type = dns->type;
  2011. switch (gn->type) {
  2012. case ASN_DIR_TYPE:
  2013. {
  2014. int localIdx = 0;
  2015. unsigned char* n = (unsigned char*)XMALLOC(
  2016. dns->len + MAX_SEQ_SZ, x509->heap,
  2017. DYNAMIC_TYPE_TMP_BUFFER);
  2018. if (n == NULL) {
  2019. goto err;
  2020. }
  2021. localIdx += SetSequence(dns->len, n);
  2022. XMEMCPY(n + localIdx, dns->name, dns->len);
  2023. gn->d.dirn = wolfSSL_d2i_X509_NAME(NULL, &n,
  2024. dns->len + localIdx);
  2025. XFREE(n, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
  2026. if (gn->d.dirn == NULL) {
  2027. WOLFSSL_MSG("Convert altDirName to X509 "
  2028. "NAME failed");
  2029. goto err;
  2030. }
  2031. }
  2032. break;
  2033. case ASN_OTHER_TYPE:
  2034. if (!wolfssl_dns_entry_othername_to_gn(dns, gn)) {
  2035. goto err;
  2036. }
  2037. break;
  2038. default:
  2039. if (wolfSSL_ASN1_STRING_set(gn->d.dNSName,
  2040. dns->name, dns->len) != WOLFSSL_SUCCESS) {
  2041. WOLFSSL_MSG("ASN1_STRING_set failed");
  2042. goto err;
  2043. }
  2044. gn->d.dNSName->type = V_ASN1_IA5STRING;
  2045. }
  2046. dns = dns->next;
  2047. if (wolfSSL_sk_GENERAL_NAME_push(sk, gn) !=
  2048. WOLFSSL_SUCCESS) {
  2049. WOLFSSL_MSG("Error pushing ASN1 object onto stack");
  2050. goto err;
  2051. }
  2052. /* null so that it doesn't get pushed again after switch */
  2053. gn = NULL;
  2054. }
  2055. }
  2056. else {
  2057. WOLFSSL_MSG("No Alt Names set");
  2058. }
  2059. break;
  2060. }
  2061. case CRL_DIST_OID:
  2062. #if defined(OPENSSL_EXTRA)
  2063. if (x509->CRLdistSet && x509->CRLInfo != NULL) {
  2064. if (c != NULL) {
  2065. *c = x509->CRLdistCrit;
  2066. }
  2067. sk = wolfSSL_sk_new_null();
  2068. if (sk == NULL) {
  2069. return NULL;
  2070. }
  2071. sk->type = STACK_TYPE_DIST_POINT;
  2072. gn = wolfSSL_GENERAL_NAME_new();
  2073. if (gn == NULL) {
  2074. WOLFSSL_MSG("Error creating GENERAL_NAME");
  2075. goto err;
  2076. }
  2077. if (wolfSSL_GENERAL_NAME_set_type(gn, GEN_URI) !=
  2078. WOLFSSL_SUCCESS) {
  2079. WOLFSSL_MSG("Error setting GENERAL_NAME type");
  2080. goto err;
  2081. }
  2082. if (wolfSSL_ASN1_STRING_set(gn->d.uniformResourceIdentifier,
  2083. x509->CRLInfo, x509->CRLInfoSz) != WOLFSSL_SUCCESS) {
  2084. WOLFSSL_MSG("ASN1_STRING_set failed");
  2085. goto err;
  2086. }
  2087. /* wolfSSL only decodes one dist point */
  2088. dp = wolfSSL_DIST_POINT_new();
  2089. if (dp == NULL) {
  2090. WOLFSSL_MSG("Error creating DIST_POINT");
  2091. goto err;
  2092. }
  2093. /* push GENERAL_NAME onto fullname stack */
  2094. if (wolfSSL_sk_GENERAL_NAME_push(dp->distpoint->name.fullname,
  2095. gn) != WOLFSSL_SUCCESS) {
  2096. WOLFSSL_MSG("wolfSSL_sk_GENERAL_NAME_push error");
  2097. goto err;
  2098. }
  2099. /* push DIST_POINT onto stack */
  2100. if (wolfSSL_sk_DIST_POINT_push(sk, dp) != WOLFSSL_SUCCESS) {
  2101. WOLFSSL_MSG("Error pushing DIST_POINT onto stack");
  2102. goto err;
  2103. }
  2104. gn = NULL;
  2105. dp = NULL;
  2106. }
  2107. else {
  2108. WOLFSSL_MSG("No CRL dist set");
  2109. }
  2110. #endif /* OPENSSL_EXTRA */
  2111. break;
  2112. case AUTH_INFO_OID:
  2113. if (x509->authInfoSet && x509->authInfo != NULL) {
  2114. if (c != NULL) {
  2115. *c = x509->authInfoCrit;
  2116. }
  2117. obj = wolfSSL_ASN1_OBJECT_new();
  2118. if (obj == NULL) {
  2119. WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
  2120. return NULL;
  2121. }
  2122. obj->type = AUTH_INFO_OID;
  2123. obj->grp = oidCertExtType;
  2124. obj->obj = x509->authInfo;
  2125. obj->objSz = x509->authInfoSz;
  2126. }
  2127. else {
  2128. WOLFSSL_MSG("No Auth Info set");
  2129. }
  2130. break;
  2131. case AUTH_KEY_OID:
  2132. if (x509->authKeyIdSet) {
  2133. WOLFSSL_AUTHORITY_KEYID* akey = wolfSSL_AUTHORITY_KEYID_new();
  2134. if (!akey) {
  2135. WOLFSSL_MSG("Issue creating WOLFSSL_AUTHORITY_KEYID struct");
  2136. return NULL;
  2137. }
  2138. if (c != NULL) {
  2139. *c = x509->authKeyIdCrit;
  2140. }
  2141. obj = wolfSSL_ASN1_OBJECT_new();
  2142. if (obj == NULL) {
  2143. WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
  2144. wolfSSL_AUTHORITY_KEYID_free(akey);
  2145. return NULL;
  2146. }
  2147. obj->type = AUTH_KEY_OID;
  2148. obj->grp = oidCertExtType;
  2149. obj->obj = x509->authKeyId;
  2150. obj->objSz = x509->authKeyIdSz;
  2151. akey->issuer = obj;
  2152. return akey;
  2153. }
  2154. else {
  2155. WOLFSSL_MSG("No Auth Key set");
  2156. }
  2157. break;
  2158. case SUBJ_KEY_OID:
  2159. if (x509->subjKeyIdSet) {
  2160. if (c != NULL) {
  2161. *c = x509->subjKeyIdCrit;
  2162. }
  2163. obj = wolfSSL_ASN1_OBJECT_new();
  2164. if (obj == NULL) {
  2165. WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
  2166. return NULL;
  2167. }
  2168. obj->type = SUBJ_KEY_OID;
  2169. obj->grp = oidCertExtType;
  2170. obj->obj = x509->subjKeyId;
  2171. obj->objSz = x509->subjKeyIdSz;
  2172. }
  2173. else {
  2174. WOLFSSL_MSG("No Subject Key set");
  2175. }
  2176. break;
  2177. case CERT_POLICY_OID:
  2178. {
  2179. #ifdef WOLFSSL_CERT_EXT
  2180. int i;
  2181. if (x509->certPoliciesNb > 0) {
  2182. if (c != NULL) {
  2183. if (x509->certPoliciesNb > 1) {
  2184. *c = -2;
  2185. }
  2186. else {
  2187. *c = 0;
  2188. }
  2189. }
  2190. sk = wolfSSL_sk_new_asn1_obj();
  2191. if (sk == NULL) {
  2192. return NULL;
  2193. }
  2194. for (i = 0; i < x509->certPoliciesNb - 1; i++) {
  2195. obj = wolfSSL_ASN1_OBJECT_new();
  2196. if (obj == NULL) {
  2197. WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
  2198. wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
  2199. return NULL;
  2200. }
  2201. obj->type = CERT_POLICY_OID;
  2202. obj->grp = oidCertExtType;
  2203. obj->obj = (byte*)(x509->certPolicies[i]);
  2204. obj->objSz = MAX_CERTPOL_SZ;
  2205. if (wolfSSL_sk_ASN1_OBJECT_push(sk, obj)
  2206. != WOLFSSL_SUCCESS) {
  2207. WOLFSSL_MSG("Error pushing ASN1 object onto stack");
  2208. wolfSSL_ASN1_OBJECT_free(obj);
  2209. wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
  2210. sk = NULL;
  2211. }
  2212. }
  2213. obj = wolfSSL_ASN1_OBJECT_new();
  2214. if (obj == NULL) {
  2215. WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
  2216. wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
  2217. return NULL;
  2218. }
  2219. obj->type = CERT_POLICY_OID;
  2220. obj->grp = oidCertExtType;
  2221. obj->obj = (byte*)(x509->certPolicies[i]);
  2222. obj->objSz = MAX_CERTPOL_SZ;
  2223. }
  2224. else {
  2225. WOLFSSL_MSG("No Cert Policy set");
  2226. }
  2227. #elif defined(WOLFSSL_SEP)
  2228. if (x509->certPolicySet) {
  2229. if (c != NULL) {
  2230. *c = x509->certPolicyCrit;
  2231. }
  2232. obj = wolfSSL_ASN1_OBJECT_new();
  2233. if (obj == NULL) {
  2234. WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
  2235. return NULL;
  2236. }
  2237. obj->type = CERT_POLICY_OID;
  2238. obj->grp = oidCertExtType;
  2239. }
  2240. else {
  2241. WOLFSSL_MSG("No Cert Policy set");
  2242. }
  2243. #else
  2244. WOLFSSL_MSG("wolfSSL not built with WOLFSSL_SEP or WOLFSSL_CERT_EXT");
  2245. #endif
  2246. break;
  2247. }
  2248. case KEY_USAGE_OID:
  2249. {
  2250. WOLFSSL_ASN1_STRING* asn1str = NULL;
  2251. if (x509->keyUsageSet) {
  2252. if (c != NULL) {
  2253. *c = x509->keyUsageCrit;
  2254. }
  2255. asn1str = wolfSSL_ASN1_STRING_new();
  2256. if (asn1str == NULL) {
  2257. WOLFSSL_MSG("Failed to malloc ASN1_STRING");
  2258. return NULL;
  2259. }
  2260. if (wolfSSL_ASN1_STRING_set(asn1str, &x509->keyUsage,
  2261. sizeof(word16)) != WOLFSSL_SUCCESS) {
  2262. WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
  2263. wolfSSL_ASN1_STRING_free(asn1str);
  2264. return NULL;
  2265. }
  2266. asn1str->type = KEY_USAGE_OID;
  2267. }
  2268. else {
  2269. WOLFSSL_MSG("No Key Usage set");
  2270. }
  2271. /* don't add stack of and return bit string directly */
  2272. return asn1str;
  2273. }
  2274. case INHIBIT_ANY_OID:
  2275. WOLFSSL_MSG("INHIBIT ANY extension not supported");
  2276. break;
  2277. case EXT_KEY_USAGE_OID:
  2278. if (x509->extKeyUsageSrc != NULL) {
  2279. if (c != NULL) {
  2280. if (x509->extKeyUsageCount > 1) {
  2281. *c = -2;
  2282. }
  2283. else {
  2284. *c = x509->extKeyUsageCrit;
  2285. }
  2286. }
  2287. obj = wolfSSL_ASN1_OBJECT_new();
  2288. if (obj == NULL) {
  2289. WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
  2290. return NULL;
  2291. }
  2292. obj->type = EXT_KEY_USAGE_OID;
  2293. obj->grp = oidCertExtType;
  2294. obj->obj = x509->extKeyUsageSrc;
  2295. obj->objSz = x509->extKeyUsageSz;
  2296. }
  2297. else {
  2298. WOLFSSL_MSG("No Extended Key Usage set");
  2299. }
  2300. break;
  2301. case NAME_CONS_OID:
  2302. WOLFSSL_MSG("Name Constraint OID extension not supported");
  2303. break;
  2304. case PRIV_KEY_USAGE_PERIOD_OID:
  2305. WOLFSSL_MSG("Private Key Usage Period extension not supported");
  2306. break;
  2307. case SUBJ_INFO_ACC_OID:
  2308. WOLFSSL_MSG("Subject Info Access extension not supported");
  2309. break;
  2310. case POLICY_MAP_OID:
  2311. WOLFSSL_MSG("Policy Map extension not supported");
  2312. break;
  2313. case POLICY_CONST_OID:
  2314. WOLFSSL_MSG("Policy Constraint extension not supported");
  2315. break;
  2316. case ISSUE_ALT_NAMES_OID:
  2317. WOLFSSL_MSG("Issue Alt Names extension not supported");
  2318. break;
  2319. case TLS_FEATURE_OID:
  2320. WOLFSSL_MSG("TLS Feature extension not supported");
  2321. break;
  2322. default:
  2323. WOLFSSL_MSG("Unsupported/Unknown extension OID");
  2324. }
  2325. /* make sure stack of is allocated */
  2326. if ((obj || gn) && sk == NULL) {
  2327. sk = wolfSSL_sk_new_asn1_obj();
  2328. if (sk == NULL) {
  2329. goto err;
  2330. }
  2331. }
  2332. if (obj) {
  2333. if (wolfSSL_sk_ASN1_OBJECT_push(sk, obj) != WOLFSSL_SUCCESS) {
  2334. WOLFSSL_MSG("Error pushing ASN1_OBJECT object onto "
  2335. "stack.");
  2336. goto err;
  2337. }
  2338. }
  2339. ret = sk;
  2340. (void)idx;
  2341. return ret;
  2342. err:
  2343. if (obj) {
  2344. wolfSSL_ASN1_OBJECT_free(obj);
  2345. }
  2346. if (gn) {
  2347. wolfSSL_GENERAL_NAME_free(gn);
  2348. }
  2349. #ifdef OPENSSL_EXTRA
  2350. if (dp) {
  2351. wolfSSL_DIST_POINT_free(dp);
  2352. }
  2353. #endif
  2354. if (sk) {
  2355. wolfSSL_sk_pop_free(sk, NULL);
  2356. }
  2357. return NULL;
  2358. }
  2359. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  2360. #ifdef OPENSSL_EXTRA
  2361. int wolfSSL_X509_add_altname_ex(WOLFSSL_X509* x509, const char* name,
  2362. word32 nameSz, int type)
  2363. {
  2364. DNS_entry* newAltName = NULL;
  2365. char* nameCopy = NULL;
  2366. if (x509 == NULL)
  2367. return WOLFSSL_FAILURE;
  2368. if ((name == NULL) || (nameSz == 0))
  2369. return WOLFSSL_SUCCESS;
  2370. newAltName = AltNameNew(x509->heap);
  2371. if (newAltName == NULL)
  2372. return WOLFSSL_FAILURE;
  2373. nameCopy = (char*)XMALLOC(nameSz + 1, x509->heap, DYNAMIC_TYPE_ALTNAME);
  2374. if (nameCopy == NULL) {
  2375. XFREE(newAltName, x509->heap, DYNAMIC_TYPE_ALTNAME);
  2376. return WOLFSSL_FAILURE;
  2377. }
  2378. XMEMCPY(nameCopy, name, nameSz);
  2379. nameCopy[nameSz] = '\0';
  2380. newAltName->next = x509->altNames;
  2381. newAltName->type = type;
  2382. newAltName->len = nameSz;
  2383. newAltName->name = nameCopy;
  2384. x509->altNames = newAltName;
  2385. return WOLFSSL_SUCCESS;
  2386. }
  2387. int wolfSSL_X509_add_altname(WOLFSSL_X509* x509, const char* name, int type)
  2388. {
  2389. word32 nameSz;
  2390. if (name == NULL)
  2391. return WOLFSSL_SUCCESS;
  2392. nameSz = (word32)XSTRLEN(name);
  2393. if (nameSz == 0)
  2394. return WOLFSSL_SUCCESS;
  2395. if (type == ASN_IP_TYPE) {
  2396. WOLFSSL_MSG("Type not supported, use wolfSSL_X509_add_altname_ex");
  2397. return WOLFSSL_FAILURE;
  2398. }
  2399. return wolfSSL_X509_add_altname_ex(x509, name, nameSz, type);
  2400. }
  2401. #ifndef NO_WOLFSSL_STUB
  2402. WOLFSSL_X509_EXTENSION *wolfSSL_X509_delete_ext(WOLFSSL_X509 *x509, int loc)
  2403. {
  2404. WOLFSSL_STUB("wolfSSL_X509_delete_ext");
  2405. (void)x509;
  2406. (void)loc;
  2407. return NULL;
  2408. }
  2409. /* currently LHASH is not implemented (and not needed for Apache port) */
  2410. WOLFSSL_X509_EXTENSION* wolfSSL_X509V3_EXT_conf_nid(
  2411. WOLF_LHASH_OF(CONF_VALUE)* conf, WOLFSSL_X509V3_CTX* ctx, int nid,
  2412. char* value)
  2413. {
  2414. WOLFSSL_STUB("wolfSSL_X509V3_EXT_conf_nid");
  2415. if (conf != NULL) {
  2416. WOLFSSL_MSG("Handling LHASH not implemented yet");
  2417. return NULL;
  2418. }
  2419. (void)conf;
  2420. (void)ctx;
  2421. (void)nid;
  2422. (void)value;
  2423. return NULL;
  2424. }
  2425. void wolfSSL_X509V3_set_ctx_nodb(WOLFSSL_X509V3_CTX* ctx)
  2426. {
  2427. WOLFSSL_STUB("wolfSSL_X509V3_set_ctx_nodb");
  2428. (void)ctx;
  2429. }
  2430. #endif /* !NO_WOLFSSL_STUB */
  2431. #ifdef OPENSSL_EXTRA
  2432. static WOLFSSL_X509_EXTENSION* createExtFromStr(int nid, const char *value)
  2433. {
  2434. WOLFSSL_X509_EXTENSION* ext;
  2435. if (value == NULL)
  2436. return NULL;
  2437. ext = wolfSSL_X509_EXTENSION_new();
  2438. if (ext == NULL) {
  2439. WOLFSSL_MSG("memory error");
  2440. return NULL;
  2441. }
  2442. ext->value.nid = nid;
  2443. switch (nid) {
  2444. case NID_subject_key_identifier:
  2445. case NID_authority_key_identifier:
  2446. if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
  2447. != WOLFSSL_SUCCESS) {
  2448. WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
  2449. goto err_cleanup;
  2450. }
  2451. ext->value.type = CTC_UTF8;
  2452. break;
  2453. case NID_subject_alt_name:
  2454. {
  2455. WOLFSSL_GENERAL_NAMES* gns;
  2456. WOLFSSL_GENERAL_NAME* gn;
  2457. if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
  2458. != WOLFSSL_SUCCESS) {
  2459. WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
  2460. goto err_cleanup;
  2461. }
  2462. ext->value.type = ASN_DNS_TYPE;
  2463. /* add stack of general names */
  2464. gns = wolfSSL_sk_new_null();
  2465. if (gns == NULL) {
  2466. WOLFSSL_MSG("wolfSSL_sk_new_null error");
  2467. goto err_cleanup;
  2468. }
  2469. ext->ext_sk = gns; /* wolfSSL_X509_EXTENSION_free will handle
  2470. * free'ing gns */
  2471. gns->type = STACK_TYPE_GEN_NAME;
  2472. gn = wolfSSL_GENERAL_NAME_new();
  2473. if (gn == NULL) {
  2474. WOLFSSL_MSG("wolfSSL_GENERAL_NAME_new error");
  2475. goto err_cleanup;
  2476. }
  2477. if (wolfSSL_sk_GENERAL_NAME_push(gns, gn) != WOLFSSL_SUCCESS) {
  2478. WOLFSSL_MSG("wolfSSL_sk_GENERAL_NAME_push error");
  2479. wolfSSL_GENERAL_NAME_free(gn);
  2480. goto err_cleanup;
  2481. }
  2482. if (wolfSSL_ASN1_STRING_set(gn->d.ia5, value, -1)
  2483. != WOLFSSL_SUCCESS) {
  2484. WOLFSSL_MSG("wolfSSL_ASN1_STRING_set failed");
  2485. goto err_cleanup;
  2486. }
  2487. gn->type = ASN_DNS_TYPE;
  2488. break;
  2489. }
  2490. case NID_key_usage:
  2491. if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
  2492. != WOLFSSL_SUCCESS) {
  2493. WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
  2494. goto err_cleanup;
  2495. }
  2496. ext->value.type = KEY_USAGE_OID;
  2497. break;
  2498. case NID_ext_key_usage:
  2499. if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
  2500. != WOLFSSL_SUCCESS) {
  2501. WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
  2502. goto err_cleanup;
  2503. }
  2504. ext->value.type = EXT_KEY_USAGE_OID;
  2505. break;
  2506. default:
  2507. WOLFSSL_MSG("invalid or unsupported NID");
  2508. goto err_cleanup;
  2509. }
  2510. return ext;
  2511. err_cleanup:
  2512. wolfSSL_X509_EXTENSION_free(ext);
  2513. return NULL;
  2514. }
  2515. /**
  2516. * Create a WOLFSSL_X509_EXTENSION from the input arguments.
  2517. * @param conf Not used
  2518. * @param ctx Not used
  2519. * @param nid Interprets the value parameter as the x509 extension that
  2520. * corresponds to this NID.
  2521. * @param value A NULL terminated string that is taken as the value of the
  2522. * newly created extension object.
  2523. * @return WOLFSSL_X509_EXTENSION* on success or NULL on failure.
  2524. */
  2525. WOLFSSL_X509_EXTENSION* wolfSSL_X509V3_EXT_nconf_nid(WOLFSSL_CONF* conf,
  2526. WOLFSSL_X509V3_CTX *ctx, int nid, const char *value)
  2527. {
  2528. WOLFSSL_ENTER("wolfSSL_X509V3_EXT_nconf_nid");
  2529. if (value == NULL) {
  2530. WOLFSSL_MSG("value NULL parameter");
  2531. return NULL;
  2532. }
  2533. if (conf != NULL || ctx != NULL) {
  2534. WOLFSSL_MSG("wolfSSL_X509V3_EXT_nconf_nid does not handle either "
  2535. "conf or ctx parameters");
  2536. }
  2537. return createExtFromStr(nid, value);
  2538. }
  2539. /**
  2540. * Create a WOLFSSL_X509_EXTENSION from the input arguments.
  2541. * @param conf Not used
  2542. * @param ctx Not used
  2543. * @param sName The textual representation of the NID that the value parameter
  2544. * should be interpreted as.
  2545. * @param value A NULL terminated string that is taken as the value of the
  2546. * newly created extension object.
  2547. * @return WOLFSSL_X509_EXTENSION* on success or NULL on failure.
  2548. */
  2549. WOLFSSL_X509_EXTENSION* wolfSSL_X509V3_EXT_nconf(WOLFSSL_CONF *conf,
  2550. WOLFSSL_X509V3_CTX *ctx, const char *sName, const char *value)
  2551. {
  2552. const WOLFSSL_ObjectInfo* info = wolfssl_object_info;
  2553. size_t i;
  2554. WOLFSSL_ENTER("wolfSSL_X509V3_EXT_nconf");
  2555. if (value == NULL) {
  2556. WOLFSSL_MSG("value NULL parameter");
  2557. return NULL;
  2558. }
  2559. if (conf != NULL || ctx != NULL) {
  2560. WOLFSSL_MSG("wolfSSL_X509V3_EXT_nconf does not handle either "
  2561. "conf or ctx parameters");
  2562. }
  2563. for (i = 0; i < wolfssl_object_info_sz; i++, info++) {
  2564. if (XSTRCMP(info->sName, sName) == 0)
  2565. return createExtFromStr(info->nid, value);
  2566. }
  2567. WOLFSSL_MSG("value didn't match any known NID");
  2568. return NULL;
  2569. }
  2570. static void wolfSSL_X509V3_EXT_METHOD_populate(WOLFSSL_v3_ext_method *method,
  2571. int nid)
  2572. {
  2573. if (!method)
  2574. return;
  2575. WOLFSSL_ENTER("wolfSSL_X509V3_EXT_METHOD_populate");
  2576. switch (nid) {
  2577. case NID_subject_key_identifier:
  2578. method->i2s = (X509V3_EXT_I2S)wolfSSL_i2s_ASN1_STRING;
  2579. FALL_THROUGH;
  2580. case NID_authority_key_identifier:
  2581. case NID_key_usage:
  2582. case NID_certificate_policies:
  2583. case NID_policy_mappings:
  2584. case NID_subject_alt_name:
  2585. case NID_issuer_alt_name:
  2586. case NID_basic_constraints:
  2587. case NID_name_constraints:
  2588. case NID_policy_constraints:
  2589. case NID_ext_key_usage:
  2590. case NID_crl_distribution_points:
  2591. case NID_inhibit_any_policy:
  2592. case NID_info_access:
  2593. WOLFSSL_MSG("Nothing to populate for current NID");
  2594. break;
  2595. default:
  2596. WOLFSSL_MSG("Unknown or unsupported NID");
  2597. break;
  2598. }
  2599. return;
  2600. }
  2601. /**
  2602. * @param nid One of the NID_* constants defined in asn.h
  2603. * @param crit
  2604. * @param data This data is copied to the returned extension.
  2605. * @return
  2606. */
  2607. WOLFSSL_X509_EXTENSION *wolfSSL_X509V3_EXT_i2d(int nid, int crit,
  2608. void *data)
  2609. {
  2610. WOLFSSL_X509_EXTENSION *ext = NULL;
  2611. WOLFSSL_ASN1_STRING* asn1str = NULL;
  2612. WOLFSSL_ENTER("wolfSSL_X509V3_EXT_i2d");
  2613. if (!data) {
  2614. return NULL;
  2615. }
  2616. if (!(ext = wolfSSL_X509_EXTENSION_new())) {
  2617. return NULL;
  2618. }
  2619. wolfSSL_X509V3_EXT_METHOD_populate(&ext->ext_method, nid);
  2620. switch (nid) {
  2621. case NID_subject_key_identifier:
  2622. /* WOLFSSL_ASN1_STRING */
  2623. case NID_key_usage:
  2624. /* WOLFSSL_ASN1_STRING */
  2625. {
  2626. asn1str = (WOLFSSL_ASN1_STRING*)data;
  2627. ext->value = *asn1str;
  2628. if (asn1str->isDynamic) {
  2629. ext->value.data = (char*)XMALLOC(asn1str->length, NULL,
  2630. DYNAMIC_TYPE_OPENSSL);
  2631. if (!ext->value.data) {
  2632. WOLFSSL_MSG("malloc failed");
  2633. /* Zero so that no existing memory is freed */
  2634. XMEMSET(&ext->value, 0, sizeof(WOLFSSL_ASN1_STRING));
  2635. goto err_cleanup;
  2636. }
  2637. XMEMCPY(ext->value.data, asn1str->data, asn1str->length);
  2638. }
  2639. else {
  2640. ext->value.data = ext->value.strData;
  2641. }
  2642. if (!(ext->obj = wolfSSL_OBJ_nid2obj(nid))) {
  2643. WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
  2644. goto err_cleanup;
  2645. }
  2646. break;
  2647. }
  2648. case NID_subject_alt_name:
  2649. /* typedef STACK_OF(GENERAL_NAME) GENERAL_NAMES */
  2650. case NID_issuer_alt_name:
  2651. /* typedef STACK_OF(GENERAL_NAME) GENERAL_NAMES */
  2652. case NID_ext_key_usage:
  2653. /* typedef STACK_OF(ASN1_OBJECT) EXTENDED_KEY_USAGE */
  2654. case NID_info_access:
  2655. /* typedef STACK_OF(ACCESS_DESCRIPTION) AUTHORITY_INFO_ACCESS */
  2656. {
  2657. WOLFSSL_STACK* sk = (WOLFSSL_STACK*)data;
  2658. if (ext->ext_sk) {
  2659. wolfSSL_sk_pop_free(ext->ext_sk, NULL);
  2660. }
  2661. if (!(ext->ext_sk = wolfSSL_sk_dup(sk))) {
  2662. WOLFSSL_MSG("wolfSSL_sk_dup failed");
  2663. goto err_cleanup;
  2664. }
  2665. if (!(ext->obj = wolfSSL_OBJ_nid2obj(nid))) {
  2666. WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
  2667. goto err_cleanup;
  2668. }
  2669. break;
  2670. }
  2671. case NID_basic_constraints:
  2672. {
  2673. /* WOLFSSL_BASIC_CONSTRAINTS */
  2674. WOLFSSL_BASIC_CONSTRAINTS* bc = (WOLFSSL_BASIC_CONSTRAINTS*)data;
  2675. if (!(ext->obj = wolfSSL_ASN1_OBJECT_new())) {
  2676. WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
  2677. goto err_cleanup;
  2678. }
  2679. ext->obj->ca = bc->ca;
  2680. if (bc->pathlen) {
  2681. ext->obj->pathlen = wolfSSL_ASN1_INTEGER_dup(bc->pathlen);
  2682. if (!ext->obj->pathlen) {
  2683. WOLFSSL_MSG("wolfSSL_ASN1_INTEGER_dup failed");
  2684. goto err_cleanup;
  2685. }
  2686. }
  2687. break;
  2688. }
  2689. case NID_authority_key_identifier:
  2690. {
  2691. /* AUTHORITY_KEYID */
  2692. WOLFSSL_AUTHORITY_KEYID* akey = (WOLFSSL_AUTHORITY_KEYID*)data;
  2693. if (akey->keyid) {
  2694. if (wolfSSL_ASN1_STRING_set(&ext->value, akey->keyid->data,
  2695. akey->keyid->length) != WOLFSSL_SUCCESS) {
  2696. WOLFSSL_MSG("wolfSSL_ASN1_STRING_set failed");
  2697. goto err_cleanup;
  2698. }
  2699. ext->value.type = akey->keyid->type;
  2700. if (!(ext->obj = wolfSSL_OBJ_nid2obj(nid))) {
  2701. WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
  2702. goto err_cleanup;
  2703. }
  2704. }
  2705. else if (akey->issuer) {
  2706. ext->obj = wolfSSL_ASN1_OBJECT_dup(akey->issuer);
  2707. if (!ext->obj) {
  2708. WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_dup failed");
  2709. goto err_cleanup;
  2710. }
  2711. }
  2712. else {
  2713. WOLFSSL_MSG("NID_authority_key_identifier empty data");
  2714. goto err_cleanup;
  2715. }
  2716. break;
  2717. }
  2718. case NID_inhibit_any_policy:
  2719. /* ASN1_INTEGER */
  2720. case NID_certificate_policies:
  2721. /* STACK_OF(POLICYINFO) */
  2722. case NID_policy_mappings:
  2723. /* STACK_OF(POLICY_MAPPING) */
  2724. case NID_name_constraints:
  2725. /* NAME_CONSTRAINTS */
  2726. case NID_policy_constraints:
  2727. /* POLICY_CONSTRAINTS */
  2728. case NID_crl_distribution_points:
  2729. /* typedef STACK_OF(DIST_POINT) CRL_DIST_POINTS */
  2730. default:
  2731. WOLFSSL_MSG("Unknown or unsupported NID");
  2732. break;
  2733. }
  2734. ext->crit = crit;
  2735. return ext;
  2736. err_cleanup:
  2737. if (ext) {
  2738. wolfSSL_X509_EXTENSION_free(ext);
  2739. }
  2740. return NULL;
  2741. }
  2742. /* Returns pointer to ASN1_OBJECT from an X509_EXTENSION object */
  2743. WOLFSSL_ASN1_OBJECT* wolfSSL_X509_EXTENSION_get_object \
  2744. (WOLFSSL_X509_EXTENSION* ext)
  2745. {
  2746. WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_get_object");
  2747. if(ext == NULL)
  2748. return NULL;
  2749. return ext->obj;
  2750. }
  2751. /**
  2752. * duplicates the 'obj' input and sets it into the 'ext' structure
  2753. * returns WOLFSSL_SUCCESS on success
  2754. */
  2755. int wolfSSL_X509_EXTENSION_set_object(WOLFSSL_X509_EXTENSION* ext,
  2756. const WOLFSSL_ASN1_OBJECT* obj)
  2757. {
  2758. WOLFSSL_ASN1_OBJECT *current;
  2759. WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_set_object");
  2760. if (ext == NULL)
  2761. return WOLFSSL_FAILURE;
  2762. current = wolfSSL_X509_EXTENSION_get_object(ext);
  2763. if (current != NULL) {
  2764. wolfSSL_ASN1_OBJECT_free(current);
  2765. }
  2766. ext->obj = wolfSSL_ASN1_OBJECT_dup((WOLFSSL_ASN1_OBJECT*)obj);
  2767. return WOLFSSL_SUCCESS;
  2768. }
  2769. #endif /* OPENSSL_ALL */
  2770. /* Returns pointer to ASN1_STRING in X509_EXTENSION object */
  2771. WOLFSSL_ASN1_STRING* wolfSSL_X509_EXTENSION_get_data(WOLFSSL_X509_EXTENSION* ext)
  2772. {
  2773. WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_get_data");
  2774. if (ext == NULL)
  2775. return NULL;
  2776. return &ext->value;
  2777. }
  2778. /**
  2779. * Creates a duplicate of input 'data' and sets it into 'ext' structure
  2780. * returns WOLFSSL_SUCCESS on success
  2781. */
  2782. int wolfSSL_X509_EXTENSION_set_data(WOLFSSL_X509_EXTENSION* ext,
  2783. WOLFSSL_ASN1_STRING* data)
  2784. {
  2785. WOLFSSL_ASN1_STRING* current;
  2786. if (ext == NULL || data == NULL)
  2787. return WOLFSSL_FAILURE;
  2788. current = wolfSSL_X509_EXTENSION_get_data(ext);
  2789. if (current->length > 0 && current->data != NULL && current->isDynamic) {
  2790. XFREE(current->data, NULL, DYNAMIC_TYPE_OPENSSL);
  2791. }
  2792. return wolfSSL_ASN1_STRING_copy(&ext->value, data);
  2793. }
  2794. #if !defined(NO_PWDBASED)
  2795. int wolfSSL_X509_digest(const WOLFSSL_X509* x509, const WOLFSSL_EVP_MD* digest,
  2796. unsigned char* buf, unsigned int* len)
  2797. {
  2798. int ret;
  2799. WOLFSSL_ENTER("wolfSSL_X509_digest");
  2800. if (x509 == NULL || digest == NULL) {
  2801. WOLFSSL_MSG("Null argument found");
  2802. return WOLFSSL_FAILURE;
  2803. }
  2804. if (x509->derCert == NULL) {
  2805. WOLFSSL_MSG("No DER certificate stored in X509");
  2806. return WOLFSSL_FAILURE;
  2807. }
  2808. ret = wolfSSL_EVP_Digest(x509->derCert->buffer, x509->derCert->length, buf,
  2809. len, digest, NULL);
  2810. WOLFSSL_LEAVE("wolfSSL_X509_digest", ret);
  2811. return ret;
  2812. }
  2813. int wolfSSL_X509_pubkey_digest(const WOLFSSL_X509 *x509,
  2814. const WOLFSSL_EVP_MD *digest, unsigned char* buf, unsigned int* len)
  2815. {
  2816. int ret;
  2817. WOLFSSL_ENTER("wolfSSL_X509_pubkey_digest");
  2818. if (x509 == NULL || digest == NULL) {
  2819. WOLFSSL_MSG("Null argument found");
  2820. return WOLFSSL_FAILURE;
  2821. }
  2822. if (x509->pubKey.buffer == NULL || x509->pubKey.length == 0) {
  2823. WOLFSSL_MSG("No DER public key stored in X509");
  2824. return WOLFSSL_FAILURE;
  2825. }
  2826. ret = wolfSSL_EVP_Digest(x509->pubKey.buffer, x509->pubKey.length, buf,
  2827. len, digest, NULL);
  2828. WOLFSSL_LEAVE("wolfSSL_X509_pubkey_digest", ret);
  2829. return ret;
  2830. }
  2831. #endif
  2832. #endif /* OPENSSL_EXTRA */
  2833. #ifdef OPENSSL_EXTRA
  2834. #ifndef NO_WOLFSSL_STUB
  2835. const char* wolfSSL_X509_get_default_cert_file_env(void)
  2836. {
  2837. WOLFSSL_STUB("X509_get_default_cert_file_env");
  2838. return NULL;
  2839. }
  2840. const char* wolfSSL_X509_get_default_cert_file(void)
  2841. {
  2842. WOLFSSL_STUB("X509_get_default_cert_file");
  2843. return NULL;
  2844. }
  2845. const char* wolfSSL_X509_get_default_cert_dir_env(void)
  2846. {
  2847. WOLFSSL_STUB("X509_get_default_cert_dir_env");
  2848. return NULL;
  2849. }
  2850. const char* wolfSSL_X509_get_default_cert_dir(void)
  2851. {
  2852. WOLFSSL_STUB("X509_get_default_cert_dir");
  2853. return NULL;
  2854. }
  2855. #endif
  2856. #endif /* OPENSSL_EXTRA */
  2857. #if defined(KEEP_PEER_CERT) || defined(SESSION_CERTS) || \
  2858. defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  2859. /* user externally called free X509, if dynamic go ahead with free, otherwise
  2860. * don't */
  2861. static void ExternalFreeX509(WOLFSSL_X509* x509)
  2862. {
  2863. #if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
  2864. int doFree = 0;
  2865. #endif
  2866. WOLFSSL_ENTER("ExternalFreeX509");
  2867. if (x509) {
  2868. #ifdef HAVE_EX_DATA_CLEANUP_HOOKS
  2869. wolfSSL_CRYPTO_cleanup_ex_data(&x509->ex_data);
  2870. #endif
  2871. if (x509->dynamicMemory) {
  2872. #if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
  2873. int ret;
  2874. wolfSSL_RefDec(&x509->ref, &doFree, &ret);
  2875. if (ret != 0) {
  2876. WOLFSSL_MSG("Couldn't lock x509 mutex");
  2877. }
  2878. #endif /* OPENSSL_EXTRA_X509_SMALL || OPENSSL_EXTRA */
  2879. #if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
  2880. if (doFree)
  2881. #endif /* OPENSSL_EXTRA_X509_SMALL || OPENSSL_EXTRA */
  2882. {
  2883. FreeX509(x509);
  2884. XFREE(x509, x509->heap, DYNAMIC_TYPE_X509);
  2885. }
  2886. } else {
  2887. WOLFSSL_MSG("free called on non dynamic object, not freeing");
  2888. }
  2889. }
  2890. }
  2891. /* Frees an external WOLFSSL_X509 structure */
  2892. WOLFSSL_ABI
  2893. void wolfSSL_X509_free(WOLFSSL_X509* x509)
  2894. {
  2895. WOLFSSL_ENTER("wolfSSL_FreeX509");
  2896. ExternalFreeX509(x509);
  2897. }
  2898. /* copy name into in buffer, at most sz bytes, if buffer is null will
  2899. malloc buffer, call responsible for freeing */
  2900. WOLFSSL_ABI
  2901. char* wolfSSL_X509_NAME_oneline(WOLFSSL_X509_NAME* name, char* in, int sz)
  2902. {
  2903. int copySz;
  2904. if (name == NULL) {
  2905. WOLFSSL_MSG("WOLFSSL_X509_NAME pointer was NULL");
  2906. return NULL;
  2907. }
  2908. copySz = min(sz, name->sz);
  2909. WOLFSSL_ENTER("wolfSSL_X509_NAME_oneline");
  2910. if (!name->sz) return in;
  2911. if (!in) {
  2912. #ifdef WOLFSSL_STATIC_MEMORY
  2913. WOLFSSL_MSG("Using static memory -- please pass in a buffer");
  2914. return NULL;
  2915. #else
  2916. in = (char*)XMALLOC(name->sz, NULL, DYNAMIC_TYPE_OPENSSL);
  2917. if (!in ) return in;
  2918. copySz = name->sz;
  2919. #endif
  2920. }
  2921. if (copySz <= 0)
  2922. return in;
  2923. XMEMCPY(in, name->name, copySz - 1);
  2924. in[copySz - 1] = 0;
  2925. return in;
  2926. }
  2927. #ifdef OPENSSL_EXTRA
  2928. /* Given an X509_NAME, convert it to canonical form and then hash
  2929. * with the provided hash type. Returns the first 4 bytes of the hash
  2930. * as unsigned long on success, and 0 otherwise. */
  2931. static unsigned long X509NameHash(WOLFSSL_X509_NAME* name,
  2932. enum wc_HashType hashType)
  2933. {
  2934. unsigned long hash = 0;
  2935. unsigned char* canonName = NULL;
  2936. byte digest[WC_MAX_DIGEST_SIZE];
  2937. int size = 0;
  2938. int rc;
  2939. WOLFSSL_ENTER("X509NameHash");
  2940. if (name == NULL) {
  2941. WOLFSSL_ERROR_MSG("WOLFSSL_X509_NAME pointer was NULL");
  2942. return 0;
  2943. }
  2944. if (name->sz == 0) {
  2945. WOLFSSL_ERROR_MSG("Nothing to hash in WOLFSSL_X509_NAME");
  2946. return 0;
  2947. }
  2948. size = wolfSSL_i2d_X509_NAME_canon(name, &canonName);
  2949. if (size <= 0 || canonName == NULL) {
  2950. WOLFSSL_ERROR_MSG("wolfSSL_i2d_X509_NAME_canon error");
  2951. return 0;
  2952. }
  2953. rc = wc_Hash(hashType, (const byte*)canonName,(word32)size, digest,
  2954. sizeof(digest));
  2955. if (rc == 0) {
  2956. hash = (((unsigned long)digest[3] << 24) |
  2957. ((unsigned long)digest[2] << 16) |
  2958. ((unsigned long)digest[1] << 8) |
  2959. ((unsigned long)digest[0]));
  2960. }
  2961. else if (rc == HASH_TYPE_E) {
  2962. WOLFSSL_ERROR_MSG("Hash function not compiled in");
  2963. }
  2964. else {
  2965. WOLFSSL_ERROR_MSG("Error hashing name");
  2966. }
  2967. XFREE(canonName, NULL, DYNAMIC_TYPE_OPENSSL);
  2968. return hash;
  2969. }
  2970. unsigned long wolfSSL_X509_NAME_hash(WOLFSSL_X509_NAME* name)
  2971. {
  2972. return X509NameHash(name, WC_HASH_TYPE_SHA);
  2973. }
  2974. /******************************************************************************
  2975. * wolfSSL_X509_subject_name_hash
  2976. * wolfSSL_X509_issuer_name_hash
  2977. * Compute the hash digest of the subject / issuer name.
  2978. * These functions prefer SHA-1 (if available) for compatibility. Otherwise
  2979. * they use SHA-256.
  2980. *
  2981. * RETURNS:
  2982. * The first 4 bytes of SHA-1 (or SHA-256) hash in little endian order as
  2983. * unsigned long.
  2984. * Otherwise, returns zero.
  2985. *
  2986. * Note:
  2987. * Returns the same hash value as OpenSSL's X509_X_name_hash() API
  2988. * if SHA-1 support is compiled in. SHA-256 will be used if SHA-1 is
  2989. * not available.
  2990. */
  2991. unsigned long wolfSSL_X509_subject_name_hash(const WOLFSSL_X509* x509)
  2992. {
  2993. if (x509 == NULL) {
  2994. WOLFSSL_ERROR_MSG("WOLFSSL_X509 pointer was NULL");
  2995. return 0;
  2996. }
  2997. #ifndef NO_SHA
  2998. return X509NameHash((WOLFSSL_X509_NAME*) &x509->subject, WC_HASH_TYPE_SHA);
  2999. #elif !defined(NO_SHA256)
  3000. return X509NameHash((WOLFSSL_X509_NAME*) &x509->subject,
  3001. WC_HASH_TYPE_SHA256);
  3002. #else
  3003. WOLFSSL_ERROR_MSG("Hash function not compiled in");
  3004. return 0;
  3005. #endif
  3006. }
  3007. unsigned long wolfSSL_X509_issuer_name_hash(const WOLFSSL_X509* x509)
  3008. {
  3009. if (x509 == NULL) {
  3010. WOLFSSL_ERROR_MSG("WOLFSSL_X509 pointer was NULL");
  3011. return 0;
  3012. }
  3013. #ifndef NO_SHA
  3014. return X509NameHash((WOLFSSL_X509_NAME*) &x509->issuer, WC_HASH_TYPE_SHA);
  3015. #elif !defined(NO_SHA256)
  3016. return X509NameHash((WOLFSSL_X509_NAME*) &x509->issuer,
  3017. WC_HASH_TYPE_SHA256);
  3018. #else
  3019. WOLFSSL_ERROR_MSG("Hash function not compiled in");
  3020. return 0;
  3021. #endif
  3022. }
  3023. #endif /* OPENSSL_EXTRA */
  3024. #if defined(OPENSSL_EXTRA) && defined(XSNPRINTF)
  3025. /* Copies X509 subject name into a buffer, with comma-separated name entries
  3026. * (matching OpenSSL v1.0.0 format)
  3027. * Example Output for Issuer:
  3028. *
  3029. * C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting,
  3030. * CN=www.wolfssl.com, emailAddress=info@wolfssl.com
  3031. */
  3032. char* wolfSSL_X509_get_name_oneline(WOLFSSL_X509_NAME* name, char* in, int sz)
  3033. {
  3034. int count, i;
  3035. int totalLen = 0;
  3036. char tmpBuf[256];
  3037. WOLFSSL_ENTER("wolfSSL_X509_get_name_oneline");
  3038. if (name == NULL) {
  3039. WOLFSSL_MSG("wolfSSL_X509_get_name_oneline failed");
  3040. return NULL;
  3041. }
  3042. #ifdef WOLFSSL_STATIC_MEMORY
  3043. if (!in) {
  3044. WOLFSSL_MSG("Using static memory -- please pass in a buffer");
  3045. return NULL;
  3046. }
  3047. #endif
  3048. /* Loop through X509 name entries and copy new format to buffer */
  3049. count = wolfSSL_X509_NAME_entry_count(name);
  3050. for (i = 0; i < count; i++) {
  3051. WOLFSSL_X509_NAME_ENTRY* entry;
  3052. int nameSz;
  3053. int strSz;
  3054. int strLen;
  3055. char *str;
  3056. const int tmpBufSz = sizeof(tmpBuf);
  3057. char buf[80];
  3058. const char* sn;
  3059. /* Get name entry and size */
  3060. entry = wolfSSL_X509_NAME_get_entry(name, i);
  3061. if (entry == NULL) {
  3062. WOLFSSL_MSG("wolfSSL_X509_NAME_get_entry failed");
  3063. return NULL;
  3064. }
  3065. nameSz = wolfSSL_X509_NAME_get_text_by_NID(name, entry->nid, buf,
  3066. sizeof(buf));
  3067. if (nameSz < 0) {
  3068. WOLFSSL_MSG("wolfSSL_X509_NAME_get_text_by_NID failed");
  3069. return NULL;
  3070. }
  3071. /* Get short name */
  3072. sn = wolfSSL_OBJ_nid2sn(entry->nid);
  3073. if (sn == NULL) {
  3074. WOLFSSL_MSG("OBJ_nid2sn failed");
  3075. return NULL;
  3076. }
  3077. /* Copy sn and name text to buffer
  3078. * Add extra strSz for '=', ',', ' ' and '\0' characters in XSNPRINTF.
  3079. */
  3080. if (i != count - 1) {
  3081. strSz = (int)XSTRLEN(sn) + nameSz + 4;
  3082. str = (char*)XMALLOC(strSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  3083. if (str == NULL) {
  3084. WOLFSSL_MSG("Memory error");
  3085. return NULL;
  3086. }
  3087. if ((strLen = XSNPRINTF(str, strSz, "%s=%s, ", sn, buf))
  3088. >= strSz)
  3089. {
  3090. WOLFSSL_MSG("buffer overrun");
  3091. XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  3092. return NULL;
  3093. }
  3094. }
  3095. else {
  3096. /* Copy last name entry
  3097. * Add extra strSz for '=' and '\0' characters in XSNPRINTF.
  3098. */
  3099. strSz = (int)XSTRLEN(sn) + nameSz + 2;
  3100. str = (char*)XMALLOC(strSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  3101. if (str == NULL) {
  3102. WOLFSSL_MSG("Memory error");
  3103. return NULL;
  3104. }
  3105. if ((strLen = XSNPRINTF(str, strSz, "%s=%s", sn, buf)) >= strSz) {
  3106. WOLFSSL_MSG("buffer overrun");
  3107. XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  3108. return NULL;
  3109. }
  3110. }
  3111. /* Copy string to tmpBuf */
  3112. if (totalLen + strLen > tmpBufSz) {
  3113. WOLFSSL_MSG("buffer overrun");
  3114. XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  3115. return NULL;
  3116. }
  3117. XMEMCPY(tmpBuf + totalLen, str, strLen);
  3118. totalLen += strLen;
  3119. XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  3120. }
  3121. /* Allocate space based on total string size if no buffer was provided */
  3122. if (!in) {
  3123. in = (char*)XMALLOC(totalLen+1, NULL, DYNAMIC_TYPE_OPENSSL);
  3124. if (in == NULL) {
  3125. WOLFSSL_MSG("Memory error");
  3126. return in;
  3127. }
  3128. }
  3129. else {
  3130. if (totalLen + 1 > sz) {
  3131. WOLFSSL_MSG("buffer overrun");
  3132. return NULL;
  3133. }
  3134. }
  3135. XMEMCPY(in, tmpBuf, totalLen);
  3136. in[totalLen] = '\0';
  3137. return in;
  3138. }
  3139. #endif
  3140. /* Wraps wolfSSL_X509_d2i
  3141. *
  3142. * returns a WOLFSSL_X509 structure pointer on success and NULL on fail
  3143. */
  3144. WOLFSSL_X509* wolfSSL_d2i_X509(WOLFSSL_X509** x509, const unsigned char** in,
  3145. int len)
  3146. {
  3147. WOLFSSL_X509* newX509 = NULL;
  3148. WOLFSSL_ENTER("wolfSSL_d2i_X509");
  3149. if (in == NULL) {
  3150. WOLFSSL_MSG("NULL input for wolfSSL_d2i_X509");
  3151. return NULL;
  3152. }
  3153. newX509 = wolfSSL_X509_d2i(x509, *in, len);
  3154. if (newX509 != NULL) {
  3155. *in += newX509->derCert->length;
  3156. }
  3157. return newX509;
  3158. }
  3159. static WOLFSSL_X509* d2i_X509orX509REQ(WOLFSSL_X509** x509,
  3160. const byte* in, int len, int req)
  3161. {
  3162. WOLFSSL_X509 *newX509 = NULL;
  3163. int type = req ? CERTREQ_TYPE : CERT_TYPE;
  3164. WOLFSSL_ENTER("wolfSSL_X509_d2i");
  3165. if (in != NULL && len != 0
  3166. #ifndef WOLFSSL_CERT_REQ
  3167. && req == 0
  3168. #else
  3169. && (req == 0 || req == 1)
  3170. #endif
  3171. ) {
  3172. #ifdef WOLFSSL_SMALL_STACK
  3173. DecodedCert* cert;
  3174. #else
  3175. DecodedCert cert[1];
  3176. #endif
  3177. #ifdef WOLFSSL_SMALL_STACK
  3178. cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL,
  3179. DYNAMIC_TYPE_DCERT);
  3180. if (cert == NULL)
  3181. return NULL;
  3182. #endif
  3183. InitDecodedCert(cert, (byte*)in, len, NULL);
  3184. #ifdef WOLFSSL_CERT_REQ
  3185. cert->isCSR = (byte)req;
  3186. #endif
  3187. if (ParseCertRelative(cert, type, 0, NULL) == 0) {
  3188. newX509 = wolfSSL_X509_new();
  3189. if (newX509 != NULL) {
  3190. if (CopyDecodedToX509(newX509, cert) != 0) {
  3191. wolfSSL_X509_free(newX509);
  3192. newX509 = NULL;
  3193. }
  3194. }
  3195. }
  3196. FreeDecodedCert(cert);
  3197. #ifdef WOLFSSL_SMALL_STACK
  3198. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  3199. #endif
  3200. }
  3201. if (x509 != NULL)
  3202. *x509 = newX509;
  3203. return newX509;
  3204. }
  3205. int wolfSSL_X509_get_isCA(WOLFSSL_X509* x509)
  3206. {
  3207. int isCA = 0;
  3208. WOLFSSL_ENTER("wolfSSL_X509_get_isCA");
  3209. if (x509 != NULL)
  3210. isCA = x509->isCa;
  3211. WOLFSSL_LEAVE("wolfSSL_X509_get_isCA", isCA);
  3212. return isCA;
  3213. }
  3214. WOLFSSL_X509* wolfSSL_X509_d2i(WOLFSSL_X509** x509, const byte* in, int len)
  3215. {
  3216. return d2i_X509orX509REQ(x509, in, len, 0);
  3217. }
  3218. #ifdef WOLFSSL_CERT_REQ
  3219. WOLFSSL_X509* wolfSSL_X509_REQ_d2i(WOLFSSL_X509** x509,
  3220. const unsigned char* in, int len)
  3221. {
  3222. return d2i_X509orX509REQ(x509, in, len, 1);
  3223. }
  3224. #endif
  3225. #endif /* KEEP_PEER_CERT || SESSION_CERTS || OPENSSL_EXTRA ||
  3226. OPENSSL_EXTRA_X509_SMALL */
  3227. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  3228. /* returns the number of entries in the WOLFSSL_X509_NAME */
  3229. int wolfSSL_X509_NAME_entry_count(WOLFSSL_X509_NAME* name)
  3230. {
  3231. int count = 0;
  3232. WOLFSSL_ENTER("wolfSSL_X509_NAME_entry_count");
  3233. if (name != NULL)
  3234. count = name->entrySz;
  3235. WOLFSSL_LEAVE("wolfSSL_X509_NAME_entry_count", count);
  3236. return count;
  3237. }
  3238. #endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
  3239. #if defined(OPENSSL_EXTRA) || \
  3240. defined(KEEP_OUR_CERT) || defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
  3241. /* return the next, if any, altname from the peer cert */
  3242. WOLFSSL_ABI
  3243. char* wolfSSL_X509_get_next_altname(WOLFSSL_X509* cert)
  3244. {
  3245. char* ret = NULL;
  3246. WOLFSSL_ENTER("wolfSSL_X509_get_next_altname");
  3247. /* don't have any to work with */
  3248. if (cert == NULL || cert->altNames == NULL)
  3249. return NULL;
  3250. /* already went through them */
  3251. if (cert->altNamesNext == NULL) {
  3252. #ifdef WOLFSSL_MULTICIRCULATE_ALTNAMELIST
  3253. /* Reset altNames List to head
  3254. * so that caller can circulate the list again
  3255. */
  3256. cert->altNamesNext = cert->altNames;
  3257. #endif
  3258. return NULL;
  3259. }
  3260. ret = cert->altNamesNext->name;
  3261. #if defined(OPENSSL_ALL) || defined(WOLFSSL_IP_ALT_NAME)
  3262. /* return the IP address as a string */
  3263. if (cert->altNamesNext->type == ASN_IP_TYPE) {
  3264. ret = cert->altNamesNext->ipString;
  3265. }
  3266. #endif
  3267. cert->altNamesNext = cert->altNamesNext->next;
  3268. return ret;
  3269. }
  3270. int wolfSSL_X509_get_signature(WOLFSSL_X509* x509,
  3271. unsigned char* buf, int* bufSz)
  3272. {
  3273. WOLFSSL_ENTER("wolfSSL_X509_get_signature");
  3274. if (x509 == NULL || bufSz == NULL || (*bufSz < (int)x509->sig.length &&
  3275. buf != NULL))
  3276. return WOLFSSL_FATAL_ERROR;
  3277. if (buf != NULL)
  3278. XMEMCPY(buf, x509->sig.buffer, x509->sig.length);
  3279. *bufSz = x509->sig.length;
  3280. return WOLFSSL_SUCCESS;
  3281. }
  3282. /* Getter function that copies over the DER public key buffer to "buf" and
  3283. * sets the size in bufSz. If "buf" is NULL then just bufSz is set to needed
  3284. * buffer size. "bufSz" passed in should initially be set by the user to be
  3285. * the size of "buf". This gets checked to make sure the buffer is large
  3286. * enough to hold the public key.
  3287. *
  3288. * Note: this is the X.509 form of key with "header" info.
  3289. * return WOLFSSL_SUCCESS on success
  3290. */
  3291. int wolfSSL_X509_get_pubkey_buffer(WOLFSSL_X509* x509,
  3292. unsigned char* buf, int* bufSz)
  3293. {
  3294. #ifdef WOLFSSL_SMALL_STACK
  3295. DecodedCert* cert;
  3296. #else
  3297. DecodedCert cert[1];
  3298. #endif
  3299. const byte* der;
  3300. int length = 0;
  3301. int ret = 0, derSz = 0;
  3302. int badDate = 0;
  3303. const byte* pubKeyX509 = NULL;
  3304. int pubKeyX509Sz = 0;
  3305. WOLFSSL_ENTER("wolfSSL_X509_get_pubkey_buffer");
  3306. if (x509 == NULL || bufSz == NULL) {
  3307. WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", BAD_FUNC_ARG);
  3308. return WOLFSSL_FATAL_ERROR;
  3309. }
  3310. #ifdef WOLFSSL_SMALL_STACK
  3311. cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert),
  3312. x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
  3313. if (cert == NULL) {
  3314. WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", MEMORY_E);
  3315. return WOLFSSL_FATAL_ERROR;
  3316. }
  3317. #endif
  3318. der = wolfSSL_X509_get_der(x509, &derSz);
  3319. if (der != NULL) {
  3320. InitDecodedCert(cert, der, derSz, NULL);
  3321. ret = wc_GetPubX509(cert, 0, &badDate);
  3322. if (ret >= 0) {
  3323. word32 idx = cert->srcIdx;
  3324. pubKeyX509 = cert->source + cert->srcIdx;
  3325. ret = GetSequence(cert->source, &cert->srcIdx, &length,
  3326. cert->maxIdx);
  3327. pubKeyX509Sz = length + (cert->srcIdx - idx);
  3328. }
  3329. FreeDecodedCert(cert);
  3330. }
  3331. #ifdef WOLFSSL_SMALL_STACK
  3332. XFREE(cert, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
  3333. #endif
  3334. if (ret < 0) {
  3335. WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", ret);
  3336. return WOLFSSL_FATAL_ERROR;
  3337. }
  3338. if (buf != NULL && pubKeyX509 != NULL) {
  3339. if (pubKeyX509Sz > *bufSz) {
  3340. WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", BUFFER_E);
  3341. return WOLFSSL_FATAL_ERROR;
  3342. }
  3343. XMEMCPY(buf, pubKeyX509, pubKeyX509Sz);
  3344. }
  3345. *bufSz = pubKeyX509Sz;
  3346. return WOLFSSL_SUCCESS;
  3347. }
  3348. /* Getter function for the public key OID value
  3349. * return public key OID stored in WOLFSSL_X509 structure */
  3350. int wolfSSL_X509_get_pubkey_type(WOLFSSL_X509* x509)
  3351. {
  3352. if (x509 == NULL)
  3353. return WOLFSSL_FAILURE;
  3354. return x509->pubKeyOID;
  3355. }
  3356. #endif /* OPENSSL_EXTRA || KEEP_OUR_CERT || KEEP_PEER_CERT || SESSION_CERTS */
  3357. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
  3358. defined(KEEP_OUR_CERT) || defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
  3359. /* write X509 serial number in unsigned binary to buffer
  3360. buffer needs to be at least EXTERNAL_SERIAL_SIZE (32) for all cases
  3361. return WOLFSSL_SUCCESS on success */
  3362. int wolfSSL_X509_get_serial_number(WOLFSSL_X509* x509,
  3363. byte* in, int* inOutSz)
  3364. {
  3365. WOLFSSL_ENTER("wolfSSL_X509_get_serial_number");
  3366. if (x509 == NULL || inOutSz == NULL) {
  3367. WOLFSSL_MSG("Null argument passed in");
  3368. return BAD_FUNC_ARG;
  3369. }
  3370. if (in != NULL) {
  3371. if (*inOutSz < x509->serialSz) {
  3372. WOLFSSL_MSG("Serial buffer too small");
  3373. return BUFFER_E;
  3374. }
  3375. XMEMCPY(in, x509->serial, x509->serialSz);
  3376. }
  3377. *inOutSz = x509->serialSz;
  3378. return WOLFSSL_SUCCESS;
  3379. }
  3380. /* not an openssl compatibility function - getting for derCert */
  3381. const byte* wolfSSL_X509_get_der(WOLFSSL_X509* x509, int* outSz)
  3382. {
  3383. WOLFSSL_ENTER("wolfSSL_X509_get_der");
  3384. if (x509 == NULL || x509->derCert == NULL || outSz == NULL)
  3385. return NULL;
  3386. *outSz = (int)x509->derCert->length;
  3387. return x509->derCert->buffer;
  3388. }
  3389. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL || KEEP_OUR_CERT || KEEP_PEER_CERT || SESSION_CERTS */
  3390. #if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA) || \
  3391. defined(OPENSSL_ALL) || defined(KEEP_OUR_CERT) || \
  3392. defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
  3393. /* used by JSSE (not a standard compatibility function) */
  3394. WOLFSSL_ABI
  3395. const byte* wolfSSL_X509_notBefore(WOLFSSL_X509* x509)
  3396. {
  3397. WOLFSSL_ENTER("wolfSSL_X509_notBefore");
  3398. if (x509 == NULL)
  3399. return NULL;
  3400. XMEMSET(x509->notBeforeData, 0, sizeof(x509->notBeforeData));
  3401. x509->notBeforeData[0] = (byte)x509->notBefore.type;
  3402. x509->notBeforeData[1] = (byte)x509->notBefore.length;
  3403. XMEMCPY(&x509->notBeforeData[2], x509->notBefore.data, x509->notBefore.length);
  3404. return x509->notBeforeData;
  3405. }
  3406. /* used by JSSE (not a standard compatibility function) */
  3407. WOLFSSL_ABI
  3408. const byte* wolfSSL_X509_notAfter(WOLFSSL_X509* x509)
  3409. {
  3410. WOLFSSL_ENTER("wolfSSL_X509_notAfter");
  3411. if (x509 == NULL)
  3412. return NULL;
  3413. XMEMSET(x509->notAfterData, 0, sizeof(x509->notAfterData));
  3414. x509->notAfterData[0] = (byte)x509->notAfter.type;
  3415. x509->notAfterData[1] = (byte)x509->notAfter.length;
  3416. XMEMCPY(&x509->notAfterData[2], x509->notAfter.data, x509->notAfter.length);
  3417. return x509->notAfterData;
  3418. }
  3419. int wolfSSL_X509_version(WOLFSSL_X509* x509)
  3420. {
  3421. WOLFSSL_ENTER("wolfSSL_X509_version");
  3422. if (x509 == NULL)
  3423. return 0;
  3424. return x509->version;
  3425. }
  3426. #endif
  3427. #ifdef OPENSSL_EXTRA
  3428. /* get the buffer to be signed (tbs) from the WOLFSSL_X509 certificate
  3429. *
  3430. * outSz : gets set to the size of the buffer
  3431. * returns a pointer to the internal buffer at the location of TBS on
  3432. * on success and NULL on failure.
  3433. */
  3434. const unsigned char* wolfSSL_X509_get_tbs(WOLFSSL_X509* x509, int* outSz)
  3435. {
  3436. int sz = 0, len;
  3437. unsigned int idx = 0, tmpIdx;
  3438. const unsigned char* der = NULL;
  3439. const unsigned char* tbs = NULL;
  3440. if (x509 == NULL || outSz == NULL) {
  3441. return NULL;
  3442. }
  3443. der = wolfSSL_X509_get_der(x509, &sz);
  3444. if (der == NULL) {
  3445. return NULL;
  3446. }
  3447. if (GetSequence(der, &idx, &len, sz) < 0) {
  3448. return NULL;
  3449. }
  3450. tbs = der + idx;
  3451. tmpIdx = idx;
  3452. if (GetSequence(der, &idx, &len, sz) < 0) {
  3453. return NULL;
  3454. }
  3455. *outSz = len + (idx - tmpIdx);
  3456. return tbs;
  3457. }
  3458. #ifdef WOLFSSL_SEP
  3459. /* copy oid into in buffer, at most *inOutSz bytes, if buffer is null will
  3460. malloc buffer, call responsible for freeing. Actual size returned in
  3461. *inOutSz. Requires inOutSz be non-null */
  3462. byte* wolfSSL_X509_get_device_type(WOLFSSL_X509* x509, byte* in, int *inOutSz)
  3463. {
  3464. int copySz;
  3465. WOLFSSL_ENTER("wolfSSL_X509_get_dev_type");
  3466. if (inOutSz == NULL) return NULL;
  3467. if (!x509->deviceTypeSz) return in;
  3468. copySz = min(*inOutSz, x509->deviceTypeSz);
  3469. if (!in) {
  3470. #ifdef WOLFSSL_STATIC_MEMORY
  3471. WOLFSSL_MSG("Using static memory -- please pass in a buffer");
  3472. return NULL;
  3473. #else
  3474. in = (byte*)XMALLOC(x509->deviceTypeSz, 0, DYNAMIC_TYPE_OPENSSL);
  3475. if (!in) return in;
  3476. copySz = x509->deviceTypeSz;
  3477. #endif
  3478. }
  3479. XMEMCPY(in, x509->deviceType, copySz);
  3480. *inOutSz = copySz;
  3481. return in;
  3482. }
  3483. byte* wolfSSL_X509_get_hw_type(WOLFSSL_X509* x509, byte* in, int* inOutSz)
  3484. {
  3485. int copySz;
  3486. WOLFSSL_ENTER("wolfSSL_X509_get_hw_type");
  3487. if (inOutSz == NULL) return NULL;
  3488. if (!x509->hwTypeSz) return in;
  3489. copySz = min(*inOutSz, x509->hwTypeSz);
  3490. if (!in) {
  3491. #ifdef WOLFSSL_STATIC_MEMORY
  3492. WOLFSSL_MSG("Using static memory -- please pass in a buffer");
  3493. return NULL;
  3494. #else
  3495. in = (byte*)XMALLOC(x509->hwTypeSz, 0, DYNAMIC_TYPE_OPENSSL);
  3496. if (!in) return in;
  3497. copySz = x509->hwTypeSz;
  3498. #endif
  3499. }
  3500. XMEMCPY(in, x509->hwType, copySz);
  3501. *inOutSz = copySz;
  3502. return in;
  3503. }
  3504. byte* wolfSSL_X509_get_hw_serial_number(WOLFSSL_X509* x509,byte* in,
  3505. int* inOutSz)
  3506. {
  3507. int copySz;
  3508. WOLFSSL_ENTER("wolfSSL_X509_get_hw_serial_number");
  3509. if (inOutSz == NULL) return NULL;
  3510. if (!x509->hwTypeSz) return in;
  3511. copySz = min(*inOutSz, x509->hwSerialNumSz);
  3512. if (!in) {
  3513. #ifdef WOLFSSL_STATIC_MEMORY
  3514. WOLFSSL_MSG("Using static memory -- please pass in a buffer");
  3515. return NULL;
  3516. #else
  3517. in = (byte*)XMALLOC(x509->hwSerialNumSz, 0, DYNAMIC_TYPE_OPENSSL);
  3518. if (!in) return in;
  3519. copySz = x509->hwSerialNumSz;
  3520. #endif
  3521. }
  3522. XMEMCPY(in, x509->hwSerialNum, copySz);
  3523. *inOutSz = copySz;
  3524. return in;
  3525. }
  3526. #endif /* WOLFSSL_SEP */
  3527. #endif /* OPENSSL_EXTRA */
  3528. /* require OPENSSL_EXTRA since wolfSSL_X509_free is wrapped by OPENSSL_EXTRA */
  3529. #if defined(OPENSSL_EXTRA)
  3530. WOLFSSL_ASN1_TIME* wolfSSL_X509_get_notBefore(const WOLFSSL_X509* x509)
  3531. {
  3532. WOLFSSL_ENTER("wolfSSL_X509_get_notBefore");
  3533. if (x509 == NULL)
  3534. return NULL;
  3535. return (WOLFSSL_ASN1_TIME*)&x509->notBefore;
  3536. }
  3537. WOLFSSL_ASN1_TIME* wolfSSL_X509_get_notAfter(const WOLFSSL_X509* x509)
  3538. {
  3539. WOLFSSL_ENTER("wolfSSL_X509_get_notAfter");
  3540. if (x509 == NULL)
  3541. return NULL;
  3542. return (WOLFSSL_ASN1_TIME*)&x509->notAfter;
  3543. }
  3544. /* return 1 on success 0 on fail */
  3545. int wolfSSL_sk_X509_push(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk, WOLFSSL_X509* x509)
  3546. {
  3547. WOLFSSL_ENTER("wolfSSL_sk_X509_push");
  3548. if (sk == NULL || x509 == NULL) {
  3549. return WOLFSSL_FAILURE;
  3550. }
  3551. return wolfSSL_sk_push(sk, x509);
  3552. }
  3553. /* Return and remove the last x509 pushed on stack */
  3554. WOLFSSL_X509* wolfSSL_sk_X509_pop(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
  3555. {
  3556. WOLFSSL_STACK* node;
  3557. WOLFSSL_X509* x509;
  3558. if (sk == NULL) {
  3559. return NULL;
  3560. }
  3561. node = sk->next;
  3562. x509 = sk->data.x509;
  3563. if (node != NULL) { /* update sk and remove node from stack */
  3564. sk->data.x509 = node->data.x509;
  3565. sk->next = node->next;
  3566. XFREE(node, NULL, DYNAMIC_TYPE_X509);
  3567. }
  3568. else { /* last x509 in stack */
  3569. sk->data.x509 = NULL;
  3570. }
  3571. if (sk->num > 0) {
  3572. sk->num -= 1;
  3573. }
  3574. return x509;
  3575. }
  3576. /* Getter function for WOLFSSL_X509 pointer
  3577. *
  3578. * sk is the stack to retrieve pointer from
  3579. * i is the index value in stack
  3580. *
  3581. * returns a pointer to a WOLFSSL_X509 structure on success and NULL on
  3582. * fail
  3583. */
  3584. WOLFSSL_X509* wolfSSL_sk_X509_value(STACK_OF(WOLFSSL_X509)* sk, int i)
  3585. {
  3586. WOLFSSL_ENTER("wolfSSL_sk_X509_value");
  3587. for (; sk != NULL && i > 0; i--)
  3588. sk = sk->next;
  3589. if (i != 0 || sk == NULL)
  3590. return NULL;
  3591. return sk->data.x509;
  3592. }
  3593. /* Return and remove the first x509 pushed on stack */
  3594. WOLFSSL_X509* wolfSSL_sk_X509_shift(WOLF_STACK_OF(WOLFSSL_X509)* sk)
  3595. {
  3596. WOLFSSL_STACK* node;
  3597. WOLFSSL_X509* x509;
  3598. if (sk == NULL) {
  3599. return NULL;
  3600. }
  3601. node = sk->next;
  3602. x509 = sk->data.x509;
  3603. if (node != NULL) {
  3604. /* walk to end of stack to first node pushed, and remove it */
  3605. WOLFSSL_STACK* prevNode = sk;
  3606. while (node->next != NULL) {
  3607. prevNode = node;
  3608. node = node->next;
  3609. }
  3610. x509 = node->data.x509;
  3611. prevNode->next = NULL;
  3612. XFREE(node, NULL, DYNAMIC_TYPE_X509);
  3613. }
  3614. else { /* only one x509 in stack */
  3615. sk->data.x509 = NULL;
  3616. }
  3617. if (sk->num > 0) {
  3618. sk->num -= 1;
  3619. }
  3620. return x509;
  3621. }
  3622. #endif /* OPENSSL_EXTRA */
  3623. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  3624. /* Free's all nodes in X509 stack. This is different then wolfSSL_sk_X509_free
  3625. * in that it free's the underlying objects pushed to the stack.
  3626. *
  3627. * sk stack to free nodes in
  3628. * f X509 free function
  3629. */
  3630. void wolfSSL_sk_X509_pop_free(STACK_OF(WOLFSSL_X509)* sk,
  3631. void (*f) (WOLFSSL_X509*))
  3632. {
  3633. WOLFSSL_ENTER("wolfSSL_sk_X509_pop_free");
  3634. wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
  3635. }
  3636. /* free just the stack structure */
  3637. void wolfSSL_sk_X509_free(WOLF_STACK_OF(WOLFSSL_X509)* sk)
  3638. {
  3639. wolfSSL_sk_free(sk);
  3640. }
  3641. #ifdef HAVE_CRL
  3642. WOLFSSL_STACK* wolfSSL_sk_X509_CRL_new(void)
  3643. {
  3644. WOLFSSL_STACK* s = wolfSSL_sk_new_node(NULL);
  3645. if (s != NULL)
  3646. s->type = STACK_TYPE_X509_CRL;
  3647. return s;
  3648. }
  3649. void wolfSSL_sk_X509_CRL_pop_free(WOLF_STACK_OF(WOLFSSL_X509_CRL)* sk,
  3650. void (*f) (WOLFSSL_X509_CRL*))
  3651. {
  3652. WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_pop_free");
  3653. wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
  3654. }
  3655. void wolfSSL_sk_X509_CRL_free(WOLF_STACK_OF(WOLFSSL_X509_CRL)* sk)
  3656. {
  3657. wolfSSL_sk_X509_CRL_pop_free(sk, NULL);
  3658. }
  3659. /* return 1 on success 0 on fail */
  3660. int wolfSSL_sk_X509_CRL_push(WOLF_STACK_OF(WOLFSSL_X509_CRL)* sk, WOLFSSL_X509_CRL* crl)
  3661. {
  3662. WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_push");
  3663. if (sk == NULL || crl == NULL) {
  3664. return WOLFSSL_FAILURE;
  3665. }
  3666. return wolfSSL_sk_push(sk, crl);
  3667. }
  3668. WOLFSSL_X509_CRL* wolfSSL_sk_X509_CRL_value(WOLF_STACK_OF(WOLFSSL_X509)* sk,
  3669. int i)
  3670. {
  3671. WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_value");
  3672. if (sk)
  3673. return (WOLFSSL_X509_CRL*)wolfSSL_sk_value(sk, i);
  3674. return NULL;
  3675. }
  3676. int wolfSSL_sk_X509_CRL_num(WOLF_STACK_OF(WOLFSSL_X509)* sk)
  3677. {
  3678. WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_num");
  3679. if (sk)
  3680. return wolfSSL_sk_num(sk);
  3681. return 0;
  3682. }
  3683. #endif /* HAVE_CRL */
  3684. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  3685. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_QT)
  3686. /* return 1 on success 0 on fail */
  3687. int wolfSSL_sk_ACCESS_DESCRIPTION_push(WOLF_STACK_OF(ACCESS_DESCRIPTION)* sk,
  3688. WOLFSSL_ACCESS_DESCRIPTION* a)
  3689. {
  3690. WOLFSSL_ENTER("wolfSSL_sk_ACCESS_DESCRIPTION_push");
  3691. return wolfSSL_sk_push(sk, a);
  3692. }
  3693. /* Frees all nodes in ACCESS_DESCRIPTION stack
  3694. *
  3695. * sk stack of nodes to free
  3696. * f free function to use
  3697. */
  3698. void wolfSSL_sk_ACCESS_DESCRIPTION_pop_free(WOLFSSL_STACK* sk,
  3699. void (*f) (WOLFSSL_ACCESS_DESCRIPTION*))
  3700. {
  3701. WOLFSSL_ENTER("wolfSSL_sk_ACCESS_DESCRIPTION_pop_free");
  3702. wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
  3703. }
  3704. void wolfSSL_sk_ACCESS_DESCRIPTION_free(WOLFSSL_STACK* sk)
  3705. {
  3706. wolfSSL_sk_free(sk);
  3707. }
  3708. /* AUTHORITY_INFO_ACCESS object is a stack of ACCESS_DESCRIPTION objects,
  3709. * to free the stack the WOLFSSL_ACCESS_DESCRIPTION stack free function is
  3710. * used */
  3711. void wolfSSL_AUTHORITY_INFO_ACCESS_free(
  3712. WOLF_STACK_OF(WOLFSSL_ACCESS_DESCRIPTION)* sk)
  3713. {
  3714. WOLFSSL_ENTER("wolfSSL_AUTHORITY_INFO_ACCESS_free");
  3715. wolfSSL_sk_ACCESS_DESCRIPTION_free(sk);
  3716. }
  3717. void wolfSSL_AUTHORITY_INFO_ACCESS_pop_free(
  3718. WOLF_STACK_OF(WOLFSSL_ACCESS_DESCRIPTION)* sk,
  3719. void (*f) (WOLFSSL_ACCESS_DESCRIPTION*))
  3720. {
  3721. WOLFSSL_ENTER("wolfSSL_AUTHORITY_INFO_ACCESS_free");
  3722. wolfSSL_sk_ACCESS_DESCRIPTION_pop_free(sk, f);
  3723. }
  3724. void wolfSSL_ACCESS_DESCRIPTION_free(WOLFSSL_ACCESS_DESCRIPTION* a)
  3725. {
  3726. WOLFSSL_ENTER("wolfSSL_ACCESS_DESCRIPTION_free");
  3727. if (a == NULL)
  3728. return;
  3729. if (a->method)
  3730. wolfSSL_ASN1_OBJECT_free(a->method);
  3731. if (a->location)
  3732. wolfSSL_GENERAL_NAME_free(a->location);
  3733. XFREE(a, NULL, DYNAMIC_TYPE_X509_EXT);
  3734. /* a = NULL, don't try to a or double free it */
  3735. }
  3736. #endif /* OPENSSL_EXTRA || WOLFSSL_QT */
  3737. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  3738. /* Creates and returns new GENERAL_NAME structure */
  3739. WOLFSSL_GENERAL_NAME* wolfSSL_GENERAL_NAME_new(void)
  3740. {
  3741. WOLFSSL_GENERAL_NAME* gn;
  3742. WOLFSSL_ENTER("GENERAL_NAME_new");
  3743. gn = (WOLFSSL_GENERAL_NAME*)XMALLOC(sizeof(WOLFSSL_GENERAL_NAME), NULL,
  3744. DYNAMIC_TYPE_ASN1);
  3745. if (gn == NULL) {
  3746. return NULL;
  3747. }
  3748. XMEMSET(gn, 0, sizeof(WOLFSSL_GENERAL_NAME));
  3749. gn->d.ia5 = wolfSSL_ASN1_STRING_new();
  3750. if (gn->d.ia5 == NULL) {
  3751. WOLFSSL_MSG("Issue creating ASN1_STRING struct");
  3752. wolfSSL_GENERAL_NAME_free(gn);
  3753. return NULL;
  3754. }
  3755. gn->type = GEN_IA5;
  3756. return gn;
  3757. }
  3758. WOLFSSL_GENERAL_NAME* wolfSSL_GENERAL_NAME_dup(WOLFSSL_GENERAL_NAME* gn)
  3759. {
  3760. WOLFSSL_GENERAL_NAME* dupl = NULL;
  3761. WOLFSSL_ENTER("wolfSSL_GENERAL_NAME_dup");
  3762. if (!gn) {
  3763. WOLFSSL_MSG("Bad parameter");
  3764. return NULL;
  3765. }
  3766. if (!(dupl = wolfSSL_GENERAL_NAME_new())) {
  3767. WOLFSSL_MSG("wolfSSL_GENERAL_NAME_new error");
  3768. return NULL;
  3769. }
  3770. wolfSSL_ASN1_STRING_free(dupl->d.ia5);
  3771. dupl->d.ia5 = NULL;
  3772. switch (gn->type) {
  3773. /* WOLFSSL_ASN1_STRING types */
  3774. case GEN_DNS:
  3775. if (!(dupl->d.dNSName = wolfSSL_ASN1_STRING_dup(gn->d.dNSName))) {
  3776. WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
  3777. goto error;
  3778. }
  3779. break;
  3780. case GEN_IPADD:
  3781. if (!(dupl->d.iPAddress = wolfSSL_ASN1_STRING_dup(gn->d.iPAddress))) {
  3782. WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
  3783. goto error;
  3784. }
  3785. break;
  3786. case GEN_EMAIL:
  3787. if (!(dupl->d.rfc822Name = wolfSSL_ASN1_STRING_dup(gn->d.rfc822Name))) {
  3788. WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
  3789. goto error;
  3790. }
  3791. break;
  3792. case GEN_URI:
  3793. if (!(dupl->d.uniformResourceIdentifier =
  3794. wolfSSL_ASN1_STRING_dup(gn->d.uniformResourceIdentifier))) {
  3795. WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
  3796. goto error;
  3797. }
  3798. break;
  3799. case GEN_OTHERNAME:
  3800. if (gn->d.otherName->value->type != V_ASN1_UTF8STRING) {
  3801. WOLFSSL_MSG("Unsupported othername value type");
  3802. goto error;
  3803. }
  3804. dupl->d.otherName = (WOLFSSL_ASN1_OTHERNAME*)XMALLOC(
  3805. sizeof(WOLFSSL_ASN1_OTHERNAME), NULL, DYNAMIC_TYPE_ASN1);
  3806. if (dupl->d.otherName == NULL) {
  3807. WOLFSSL_MSG("XMALLOC error");
  3808. goto error;
  3809. }
  3810. dupl->d.otherName->type_id = wolfSSL_ASN1_OBJECT_dup(
  3811. gn->d.otherName->type_id);
  3812. dupl->d.otherName->value = (WOLFSSL_ASN1_TYPE*)XMALLOC(
  3813. sizeof(WOLFSSL_ASN1_TYPE), NULL, DYNAMIC_TYPE_ASN1);
  3814. if (dupl->d.otherName->value != NULL) {
  3815. dupl->d.otherName->value->type = gn->d.otherName->value->type;
  3816. dupl->d.otherName->value->value.utf8string =
  3817. wolfSSL_ASN1_STRING_dup(
  3818. gn->d.otherName->value->value.utf8string);
  3819. }
  3820. if ((dupl->d.otherName->type_id == NULL) ||
  3821. (dupl->d.otherName->value == NULL) ||
  3822. (dupl->d.otherName->value->value.utf8string == NULL)) {
  3823. wolfSSL_ASN1_OBJECT_free(dupl->d.otherName->type_id);
  3824. wolfSSL_ASN1_TYPE_free(dupl->d.otherName->value);
  3825. XFREE(dupl->d.otherName, NULL, DYNAMIC_TYPE_ASN1);
  3826. dupl->d.otherName = NULL;
  3827. WOLFSSL_MSG("error duping othername");
  3828. goto error;
  3829. }
  3830. break;
  3831. case GEN_X400:
  3832. case GEN_DIRNAME:
  3833. case GEN_EDIPARTY:
  3834. case GEN_RID:
  3835. default:
  3836. WOLFSSL_MSG("Unrecognized or unsupported GENERAL_NAME type");
  3837. goto error;
  3838. }
  3839. dupl->type = gn->type;
  3840. return dupl;
  3841. error:
  3842. if (dupl) {
  3843. wolfSSL_GENERAL_NAME_free(dupl);
  3844. }
  3845. return NULL;
  3846. }
  3847. /* Set an Othername in a general name.
  3848. *
  3849. * @param [out] gen Pointer to the GENERAL_NAME where the othername is set.
  3850. * @param [in] oid Object ID (ie UPN).
  3851. * @param [in] name The actual name.
  3852. * @return WOLFSSL_FAILURE on invalid parameter or memory error,
  3853. * WOLFSSL_SUCCESS otherwise.
  3854. */
  3855. int wolfSSL_GENERAL_NAME_set0_othername(WOLFSSL_GENERAL_NAME* gen,
  3856. ASN1_OBJECT* oid, ASN1_TYPE* value)
  3857. {
  3858. WOLFSSL_ASN1_OBJECT *x = NULL;
  3859. if ((gen == NULL) || (oid == NULL) || (value == NULL)) {
  3860. return WOLFSSL_FAILURE;
  3861. }
  3862. x = wolfSSL_ASN1_OBJECT_dup(oid);
  3863. if (x == NULL) {
  3864. WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_dup() failed");
  3865. return WOLFSSL_FAILURE;
  3866. }
  3867. gen->type = GEN_OTHERNAME;
  3868. gen->d.otherName->type_id = x;
  3869. gen->d.otherName->value = value;
  3870. return WOLFSSL_SUCCESS;
  3871. }
  3872. /* return 1 on success 0 on fail */
  3873. int wolfSSL_sk_GENERAL_NAME_push(WOLFSSL_GENERAL_NAMES* sk,
  3874. WOLFSSL_GENERAL_NAME* gn)
  3875. {
  3876. WOLFSSL_STACK* node;
  3877. WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_push");
  3878. if (sk == NULL || gn == NULL) {
  3879. return WOLFSSL_FAILURE;
  3880. }
  3881. /* no previous values in stack */
  3882. if (sk->data.gn == NULL) {
  3883. sk->data.gn = gn;
  3884. sk->num += 1;
  3885. return WOLFSSL_SUCCESS;
  3886. }
  3887. /* stack already has value(s) create a new node and add more */
  3888. node = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK), NULL,
  3889. DYNAMIC_TYPE_ASN1);
  3890. if (node == NULL) {
  3891. WOLFSSL_MSG("Memory error");
  3892. return WOLFSSL_FAILURE;
  3893. }
  3894. XMEMSET(node, 0, sizeof(WOLFSSL_STACK));
  3895. /* push new obj onto head of stack */
  3896. node->type = STACK_TYPE_GEN_NAME;
  3897. node->data.gn = sk->data.gn;
  3898. node->next = sk->next;
  3899. sk->next = node;
  3900. sk->data.gn = gn;
  3901. sk->num += 1;
  3902. return WOLFSSL_SUCCESS;
  3903. }
  3904. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  3905. #ifdef OPENSSL_EXTRA
  3906. /* Returns the general name at index i from the stack
  3907. *
  3908. * sk stack to get general name from
  3909. * idx index to get
  3910. *
  3911. * return a pointer to the internal node of the stack
  3912. */
  3913. WOLFSSL_GENERAL_NAME* wolfSSL_sk_GENERAL_NAME_value(WOLFSSL_STACK* sk, int idx)
  3914. {
  3915. WOLFSSL_STACK* ret;
  3916. if (sk == NULL) {
  3917. return NULL;
  3918. }
  3919. ret = wolfSSL_sk_get_node(sk, idx);
  3920. if (ret != NULL) {
  3921. return ret->data.gn;
  3922. }
  3923. return NULL;
  3924. }
  3925. /* Gets the number of nodes in the stack
  3926. *
  3927. * sk stack to get the number of nodes from
  3928. *
  3929. * returns the number of nodes, -1 if no nodes
  3930. */
  3931. int wolfSSL_sk_GENERAL_NAME_num(WOLFSSL_STACK* sk)
  3932. {
  3933. WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_num");
  3934. if (sk == NULL) {
  3935. return -1;
  3936. }
  3937. return (int)sk->num;
  3938. }
  3939. /* Allocates an empty GENERAL NAME stack */
  3940. WOLFSSL_STACK* wolfSSL_sk_GENERAL_NAME_new(void *cmpFunc) {
  3941. WOLFSSL_STACK* sk = NULL;
  3942. (void)cmpFunc;
  3943. WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_new");
  3944. sk = wolfSSL_sk_new_null();
  3945. if (sk != NULL) {
  3946. sk->type = STACK_TYPE_GEN_NAME;
  3947. }
  3948. return sk;
  3949. }
  3950. #endif /* OPENSSL_EXTRA */
  3951. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  3952. /* Frees all nodes in a GENERAL NAME stack
  3953. *
  3954. * sk stack of nodes to free
  3955. * f free function to use, not called with wolfSSL
  3956. */
  3957. void wolfSSL_sk_GENERAL_NAME_pop_free(WOLFSSL_STACK* sk,
  3958. void (*f) (WOLFSSL_GENERAL_NAME*))
  3959. {
  3960. WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_pop_free");
  3961. wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
  3962. }
  3963. void wolfSSL_sk_GENERAL_NAME_free(WOLFSSL_STACK* sk)
  3964. {
  3965. WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_free");
  3966. wolfSSL_sk_X509_pop_free(sk, NULL);
  3967. }
  3968. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  3969. #ifdef OPENSSL_EXTRA
  3970. static void wolfSSL_DIST_POINT_NAME_free(WOLFSSL_DIST_POINT_NAME* dpn)
  3971. {
  3972. if (dpn != NULL) {
  3973. if (dpn->name.fullname != NULL) {
  3974. wolfSSL_sk_X509_pop_free(dpn->name.fullname, NULL);
  3975. }
  3976. XFREE(dpn, NULL, DYNAMIC_TYPE_OPENSSL);
  3977. }
  3978. }
  3979. /* returns new pointer on success and NULL on fail */
  3980. static WOLFSSL_DIST_POINT_NAME* wolfSSL_DIST_POINT_NAME_new(void)
  3981. {
  3982. WOLFSSL_DIST_POINT_NAME* dpn = NULL;
  3983. WOLFSSL_GENERAL_NAMES* gns = NULL;
  3984. dpn = (WOLFSSL_DIST_POINT_NAME*)XMALLOC(sizeof(WOLFSSL_DIST_POINT_NAME),
  3985. NULL, DYNAMIC_TYPE_OPENSSL);
  3986. if (dpn == NULL) {
  3987. return NULL;
  3988. }
  3989. XMEMSET(dpn, 0, sizeof(WOLFSSL_DIST_POINT_NAME));
  3990. gns = wolfSSL_sk_new_null();
  3991. if (gns == NULL) {
  3992. WOLFSSL_MSG("wolfSSL_sk_new_null error");
  3993. XFREE(dpn, NULL, DYNAMIC_TYPE_OPENSSL);
  3994. return NULL;
  3995. }
  3996. gns->type = STACK_TYPE_GEN_NAME;
  3997. /* DIST_POINT_NAME type may be 0 or 1, indicating whether fullname or
  3998. * relativename is used. See: RFC 5280 section 4.2.1.13 */
  3999. dpn->name.fullname = gns;
  4000. dpn->type = 0;
  4001. return dpn;
  4002. }
  4003. /* Creates and returns new DIST_POINT structure */
  4004. WOLFSSL_DIST_POINT* wolfSSL_DIST_POINT_new(void)
  4005. {
  4006. WOLFSSL_DIST_POINT* dp = NULL;
  4007. WOLFSSL_DIST_POINT_NAME* dpn = NULL;
  4008. WOLFSSL_ENTER("wolfSSL_DIST_POINT_new");
  4009. dp = (WOLFSSL_DIST_POINT*)XMALLOC(sizeof(WOLFSSL_DIST_POINT), NULL,
  4010. DYNAMIC_TYPE_OPENSSL);
  4011. if (dp == NULL) {
  4012. return NULL;
  4013. }
  4014. XMEMSET(dp, 0, sizeof(WOLFSSL_DIST_POINT));
  4015. dpn = wolfSSL_DIST_POINT_NAME_new();
  4016. if (dpn == NULL) {
  4017. XFREE(dp, NULL, DYNAMIC_TYPE_OPENSSL);
  4018. return NULL;
  4019. }
  4020. dp->distpoint = dpn;
  4021. return dp;
  4022. }
  4023. /* Frees DIST_POINT objects.
  4024. */
  4025. void wolfSSL_DIST_POINT_free(WOLFSSL_DIST_POINT* dp)
  4026. {
  4027. WOLFSSL_ENTER("wolfSSL_DIST_POINT_free");
  4028. if (dp != NULL) {
  4029. wolfSSL_DIST_POINT_NAME_free(dp->distpoint);
  4030. XFREE(dp, NULL, DYNAMIC_TYPE_OPENSSL);
  4031. }
  4032. }
  4033. void wolfSSL_DIST_POINTS_free(WOLFSSL_DIST_POINTS *dps)
  4034. {
  4035. WOLFSSL_ENTER("wolfSSL_DIST_POINTS_free");
  4036. if (dps == NULL) {
  4037. return;
  4038. }
  4039. wolfSSL_sk_free(dps);
  4040. }
  4041. /* return 1 on success 0 on fail */
  4042. int wolfSSL_sk_DIST_POINT_push(WOLFSSL_DIST_POINTS* sk, WOLFSSL_DIST_POINT* dp)
  4043. {
  4044. WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_push");
  4045. if (sk == NULL || dp == NULL) {
  4046. return WOLFSSL_FAILURE;
  4047. }
  4048. return wolfSSL_sk_push(sk, dp);
  4049. }
  4050. /* Returns the CRL dist point at index i from the stack
  4051. *
  4052. * sk stack to get general name from
  4053. * idx index to get
  4054. *
  4055. * return a pointer to the internal node of the stack
  4056. */
  4057. WOLFSSL_DIST_POINT* wolfSSL_sk_DIST_POINT_value(WOLFSSL_STACK* sk, int idx)
  4058. {
  4059. if (sk == NULL) {
  4060. return NULL;
  4061. }
  4062. return (WOLFSSL_DIST_POINT*)wolfSSL_sk_value(sk, idx);
  4063. }
  4064. /* Gets the number of nodes in the stack
  4065. *
  4066. * sk stack to get the number of nodes from
  4067. *
  4068. * returns the number of nodes, -1 if no nodes
  4069. */
  4070. int wolfSSL_sk_DIST_POINT_num(WOLFSSL_STACK* sk)
  4071. {
  4072. WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_num");
  4073. if (sk == NULL) {
  4074. return -1;
  4075. }
  4076. return wolfSSL_sk_num(sk);
  4077. }
  4078. /* Frees all nodes in a DIST_POINT stack
  4079. *
  4080. * sk stack of nodes to free
  4081. * f free function to use
  4082. */
  4083. void wolfSSL_sk_DIST_POINT_pop_free(WOLFSSL_STACK* sk,
  4084. void (*f) (WOLFSSL_DIST_POINT*))
  4085. {
  4086. WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_pop_free");
  4087. wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
  4088. }
  4089. void wolfSSL_sk_DIST_POINT_free(WOLFSSL_STACK* sk)
  4090. {
  4091. WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_free");
  4092. wolfSSL_sk_free(sk);
  4093. }
  4094. /* returns the number of nodes in stack on success and WOLFSSL_FATAL_ERROR
  4095. * on fail */
  4096. int wolfSSL_sk_ACCESS_DESCRIPTION_num(WOLFSSL_STACK* sk)
  4097. {
  4098. if (sk == NULL) {
  4099. return WOLFSSL_FATAL_ERROR;
  4100. }
  4101. return (int)sk->num;
  4102. }
  4103. /* returns NULL on fail and pointer to internal data on success */
  4104. WOLFSSL_ACCESS_DESCRIPTION* wolfSSL_sk_ACCESS_DESCRIPTION_value(
  4105. WOLFSSL_STACK* sk, int idx)
  4106. {
  4107. WOLFSSL_STACK* ret;
  4108. if (sk == NULL) {
  4109. return NULL;
  4110. }
  4111. ret = wolfSSL_sk_get_node(sk, idx);
  4112. if (ret != NULL) {
  4113. return ret->data.access;
  4114. }
  4115. return NULL;
  4116. }
  4117. #endif /* OPENSSL_EXTRA */
  4118. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  4119. /* free's the internal type for the general name */
  4120. static void wolfSSL_GENERAL_NAME_type_free(WOLFSSL_GENERAL_NAME* name)
  4121. {
  4122. if (name != NULL) {
  4123. switch (name->type) {
  4124. case GEN_IA5:
  4125. wolfSSL_ASN1_STRING_free(name->d.ia5);
  4126. name->d.ia5 = NULL;
  4127. break;
  4128. case GEN_EMAIL:
  4129. wolfSSL_ASN1_STRING_free(name->d.rfc822Name);
  4130. name->d.rfc822Name = NULL;
  4131. break;
  4132. case GEN_DNS:
  4133. wolfSSL_ASN1_STRING_free(name->d.dNSName);
  4134. name->d.dNSName = NULL;
  4135. break;
  4136. case GEN_DIRNAME:
  4137. wolfSSL_X509_NAME_free(name->d.dirn);
  4138. name->d.dirn = NULL;
  4139. break;
  4140. case GEN_URI:
  4141. wolfSSL_ASN1_STRING_free(name->d.uniformResourceIdentifier);
  4142. name->d.uniformResourceIdentifier = NULL;
  4143. break;
  4144. case GEN_IPADD:
  4145. wolfSSL_ASN1_STRING_free(name->d.iPAddress);
  4146. name->d.iPAddress = NULL;
  4147. break;
  4148. case GEN_RID:
  4149. wolfSSL_ASN1_OBJECT_free(name->d.registeredID);
  4150. name->d.registeredID = NULL;
  4151. break;
  4152. case GEN_OTHERNAME:
  4153. if (name->d.otherName != NULL) {
  4154. wolfSSL_ASN1_OBJECT_free(name->d.otherName->type_id);
  4155. wolfSSL_ASN1_TYPE_free(name->d.otherName->value);
  4156. XFREE(name->d.otherName, NULL, DYNAMIC_TYPE_ASN1);
  4157. name->d.otherName = NULL;
  4158. }
  4159. break;
  4160. case GEN_X400:
  4161. /* Unsupported: fall through */
  4162. case GEN_EDIPARTY:
  4163. /* Unsupported: fall through */
  4164. default:
  4165. WOLFSSL_MSG("wolfSSL_GENERAL_NAME_type_free: possible leak");
  4166. break;
  4167. }
  4168. }
  4169. }
  4170. /* sets the general name type and free's the existing one
  4171. * can fail with a memory error if malloc fails or bad arg error
  4172. * otherwise return WOLFSSL_SUCCESS */
  4173. int wolfSSL_GENERAL_NAME_set_type(WOLFSSL_GENERAL_NAME* name, int typ)
  4174. {
  4175. int ret = WOLFSSL_SUCCESS;
  4176. if (name != NULL) {
  4177. wolfSSL_GENERAL_NAME_type_free(name);
  4178. name->type = typ;
  4179. switch (typ) {
  4180. case GEN_URI:
  4181. name->d.uniformResourceIdentifier = wolfSSL_ASN1_STRING_new();
  4182. if (name->d.uniformResourceIdentifier == NULL)
  4183. ret = MEMORY_E;
  4184. break;
  4185. default:
  4186. name->type = GEN_IA5;
  4187. name->d.ia5 = wolfSSL_ASN1_STRING_new();
  4188. if (name->d.ia5 == NULL)
  4189. ret = MEMORY_E;
  4190. }
  4191. }
  4192. else {
  4193. ret = BAD_FUNC_ARG;
  4194. }
  4195. return ret;
  4196. }
  4197. /* Set the value in a general name. This is a compat layer API.
  4198. *
  4199. * @param [out] a Pointer to the GENERAL_NAME where the othername is set.
  4200. * @param [in] type The type of this general name.
  4201. * @param [in] value The ASN.1 string that is the value.
  4202. * @return none
  4203. * @note the set0 indicates we take ownership so the user does NOT free value.
  4204. */
  4205. void wolfSSL_GENERAL_NAME_set0_value(WOLFSSL_GENERAL_NAME *a, int type,
  4206. void *value)
  4207. {
  4208. WOLFSSL_ASN1_STRING *val = (WOLFSSL_ASN1_STRING *)value;
  4209. if (a == NULL) {
  4210. WOLFSSL_MSG("a is NULL");
  4211. return;
  4212. }
  4213. if (val == NULL) {
  4214. WOLFSSL_MSG("value is NULL");
  4215. return;
  4216. }
  4217. if (type != GEN_DNS) {
  4218. WOLFSSL_MSG("Only GEN_DNS is supported");
  4219. return;
  4220. }
  4221. wolfSSL_GENERAL_NAME_type_free(a);
  4222. a->type = type;
  4223. if (type == GEN_DNS) {
  4224. a->d.dNSName = val;
  4225. }
  4226. }
  4227. /* Frees GENERAL_NAME objects.
  4228. */
  4229. void wolfSSL_GENERAL_NAME_free(WOLFSSL_GENERAL_NAME* name)
  4230. {
  4231. WOLFSSL_ENTER("wolfSSL_GENERAL_NAME_Free");
  4232. if (name != NULL) {
  4233. wolfSSL_GENERAL_NAME_type_free(name);
  4234. XFREE(name, NULL, DYNAMIC_TYPE_OPENSSL);
  4235. }
  4236. }
  4237. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL*/
  4238. #ifdef OPENSSL_EXTRA
  4239. void wolfSSL_GENERAL_NAMES_free(WOLFSSL_GENERAL_NAMES *gens)
  4240. {
  4241. WOLFSSL_ENTER("wolfSSL_GENERAL_NAMES_free");
  4242. if (gens == NULL) {
  4243. return;
  4244. }
  4245. wolfSSL_sk_GENERAL_NAME_free(gens);
  4246. }
  4247. void wolfSSL_EXTENDED_KEY_USAGE_free(WOLFSSL_STACK * sk)
  4248. {
  4249. WOLFSSL_ENTER("wolfSSL_EXTENDED_KEY_USAGE_free");
  4250. if (sk == NULL) {
  4251. return;
  4252. }
  4253. wolfSSL_sk_X509_pop_free(sk, NULL);
  4254. }
  4255. #if defined(OPENSSL_ALL) && !defined(NO_BIO)
  4256. /* Outputs name string of the given WOLFSSL_GENERAL_NAME_OBJECT to WOLFSSL_BIO.
  4257. * Can handle following GENERAL_NAME_OBJECT types:
  4258. * - GEN_OTHERNAME #
  4259. * - GEN_EMAIL
  4260. * - GEN_DNS
  4261. * - GEN_X400 #
  4262. * - GEN_DIRNAME
  4263. * - GEN_EDIPARTY #
  4264. * - GEN_URI
  4265. * - GEN_RID
  4266. * The each name string to be output has "typename:namestring" format.
  4267. * For instance, email name string will be output as "email:info@wolfssl.com".
  4268. * However,some types above marked with "#" will be output with
  4269. * "typename:<unsupported>".
  4270. *
  4271. * Parameters:
  4272. * - out: WOLFSSL_BIO object which is the output destination
  4273. * - gen: WOLFSSL_GENERAL_NAME object to be output its name
  4274. *
  4275. * Returns WOLFSSL_SUCCESS on success, WOLFSSL_FAILURE on failure.
  4276. */
  4277. int wolfSSL_GENERAL_NAME_print(WOLFSSL_BIO* out, WOLFSSL_GENERAL_NAME* gen)
  4278. {
  4279. int ret, i;
  4280. unsigned int wd;
  4281. unsigned char* p;
  4282. (void)wd;
  4283. (void)p;
  4284. (void)i;
  4285. WOLFSSL_ENTER("wolfSSL_GENERAL_NAME_print");
  4286. if (out == NULL || gen == NULL)
  4287. return WOLFSSL_FAILURE;
  4288. ret = WOLFSSL_FAILURE;
  4289. switch (gen->type)
  4290. {
  4291. case GEN_OTHERNAME:
  4292. ret = wolfSSL_BIO_printf(out, "othername:<unsupported>");
  4293. ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  4294. break;
  4295. case GEN_EMAIL:
  4296. ret = wolfSSL_BIO_printf(out, "email:");
  4297. ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  4298. if (ret == WOLFSSL_SUCCESS)
  4299. {
  4300. ret = wolfSSL_ASN1_STRING_print(out, gen->d.rfc822Name);
  4301. }
  4302. break;
  4303. case GEN_DNS:
  4304. ret = wolfSSL_BIO_printf(out, "DNS:");
  4305. ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  4306. if (ret == WOLFSSL_SUCCESS) {
  4307. ret = wolfSSL_BIO_printf(out, "%s", gen->d.dNSName->strData);
  4308. ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  4309. }
  4310. break;
  4311. case GEN_X400:
  4312. ret = wolfSSL_BIO_printf(out, "X400Name:<unsupported>");
  4313. ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  4314. break;
  4315. case GEN_DIRNAME:
  4316. ret = wolfSSL_BIO_printf(out, "DirName:");
  4317. if (ret == WOLFSSL_SUCCESS) {
  4318. ret = wolfSSL_X509_NAME_print_ex(out, gen->d.directoryName, 0,
  4319. XN_FLAG_ONELINE);
  4320. }
  4321. break;
  4322. case GEN_EDIPARTY:
  4323. ret = wolfSSL_BIO_printf(out, "EdiPartyName:<unsupported>");
  4324. ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  4325. break;
  4326. case GEN_URI:
  4327. ret = wolfSSL_BIO_printf(out, "URI:");
  4328. ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  4329. if (ret == WOLFSSL_SUCCESS) {
  4330. ret = wolfSSL_ASN1_STRING_print(out,
  4331. gen->d.uniformResourceIdentifier);
  4332. }
  4333. break;
  4334. case GEN_IPADD:
  4335. ret = wolfSSL_BIO_printf(out, "IP Address");
  4336. ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  4337. if (ret == WOLFSSL_SUCCESS) {
  4338. if (!gen->d.iPAddress->length) {
  4339. ret = WOLFSSL_FAILURE;
  4340. break;
  4341. }
  4342. p = (unsigned char*)gen->d.iPAddress->strData;
  4343. if (gen->d.iPAddress->length == 4) {
  4344. ret = wolfSSL_BIO_printf(out, ":%d.%d.%d.%d",
  4345. p[0],p[1],p[2],p[3]);
  4346. }
  4347. else if (gen->d.iPAddress->length == 16) {
  4348. for (i = 0; i < 16 && ret == WOLFSSL_SUCCESS;) {
  4349. wd = p[i] << 8 | p[i+1];
  4350. i += 2;
  4351. ret = wolfSSL_BIO_printf(out, ":%X", wd);
  4352. ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  4353. }
  4354. }
  4355. else {
  4356. ret = wolfSSL_BIO_printf(out, "<unsupported>");
  4357. }
  4358. ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  4359. }
  4360. break;
  4361. case GEN_RID:
  4362. ret = wolfSSL_BIO_printf(out, "Registered ID:");
  4363. if (ret == WOLFSSL_SUCCESS) {
  4364. ret = wolfSSL_i2a_ASN1_OBJECT(out, gen->d.registeredID);
  4365. }
  4366. break;
  4367. default:
  4368. /* unsupported type */
  4369. break;
  4370. }
  4371. if (ret == WOLFSSL_FAILURE)
  4372. return WOLFSSL_FAILURE;
  4373. else
  4374. return WOLFSSL_SUCCESS;
  4375. }
  4376. #endif /* OPENSSL_ALL */
  4377. WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* wolfSSL_sk_X509_EXTENSION_new_null(void)
  4378. {
  4379. WOLFSSL_STACK* sk = wolfSSL_sk_new_node(NULL);
  4380. if (sk) {
  4381. sk->type = STACK_TYPE_X509_EXT;
  4382. }
  4383. return (WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)*)sk;;
  4384. }
  4385. /* returns the number of nodes on the stack */
  4386. int wolfSSL_sk_X509_EXTENSION_num(WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk)
  4387. {
  4388. if (sk != NULL) {
  4389. return (int)sk->num;
  4390. }
  4391. return WOLFSSL_FATAL_ERROR;
  4392. }
  4393. /* returns null on failure and pointer to internal value on success */
  4394. WOLFSSL_X509_EXTENSION* wolfSSL_sk_X509_EXTENSION_value(
  4395. WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk, int idx)
  4396. {
  4397. WOLFSSL_STACK* ret;
  4398. if (sk == NULL) {
  4399. return NULL;
  4400. }
  4401. ret = wolfSSL_sk_get_node(sk, idx);
  4402. if (ret != NULL) {
  4403. return ret->data.ext;
  4404. }
  4405. return NULL;
  4406. }
  4407. /* frees all of the nodes and the values in stack */
  4408. void wolfSSL_sk_X509_EXTENSION_pop_free(
  4409. WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk,
  4410. void (*f) (WOLFSSL_X509_EXTENSION*))
  4411. {
  4412. wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
  4413. }
  4414. #endif /* OPENSSL_EXTRA */
  4415. #if defined(OPENSSL_EXTRA) && !defined(NO_FILESYSTEM) && !defined(NO_STDIO_FILESYSTEM)
  4416. WOLFSSL_X509* wolfSSL_X509_d2i_fp(WOLFSSL_X509** x509, XFILE file)
  4417. {
  4418. WOLFSSL_X509* newX509 = NULL;
  4419. WOLFSSL_ENTER("wolfSSL_X509_d2i_fp");
  4420. if (file != XBADFILE) {
  4421. byte* fileBuffer = NULL;
  4422. long sz = 0;
  4423. if (XFSEEK(file, 0, XSEEK_END) != 0)
  4424. return NULL;
  4425. sz = XFTELL(file);
  4426. if (XFSEEK(file, 0, XSEEK_SET) != 0)
  4427. return NULL;
  4428. if (sz > MAX_WOLFSSL_FILE_SIZE || sz < 0) {
  4429. WOLFSSL_MSG("X509_d2i file size error");
  4430. return NULL;
  4431. }
  4432. fileBuffer = (byte*)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE);
  4433. if (fileBuffer != NULL) {
  4434. int ret = (int)XFREAD(fileBuffer, 1, sz, file);
  4435. if (ret == sz) {
  4436. newX509 = wolfSSL_X509_d2i(NULL, fileBuffer, (int)sz);
  4437. }
  4438. XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
  4439. }
  4440. }
  4441. if (x509 != NULL)
  4442. *x509 = newX509;
  4443. return newX509;
  4444. }
  4445. #endif /* OPENSSL_EXTRA && !NO_FILESYSTEM && !NO_STDIO_FILESYSTEM */
  4446. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
  4447. defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
  4448. #ifndef NO_FILESYSTEM
  4449. WOLFSSL_ABI
  4450. WOLFSSL_X509* wolfSSL_X509_load_certificate_file(const char* fname, int format)
  4451. {
  4452. #ifdef WOLFSSL_SMALL_STACK
  4453. byte staticBuffer[1]; /* force heap usage */
  4454. #else
  4455. byte staticBuffer[FILE_BUFFER_SIZE];
  4456. #endif
  4457. byte* fileBuffer = staticBuffer;
  4458. int dynamic = 0;
  4459. int ret;
  4460. long sz = 0;
  4461. XFILE file;
  4462. WOLFSSL_X509* x509 = NULL;
  4463. /* Check the inputs */
  4464. if ((fname == NULL) ||
  4465. (format != WOLFSSL_FILETYPE_ASN1 && format != WOLFSSL_FILETYPE_PEM))
  4466. return NULL;
  4467. file = XFOPEN(fname, "rb");
  4468. if (file == XBADFILE)
  4469. return NULL;
  4470. if (XFSEEK(file, 0, XSEEK_END) != 0){
  4471. XFCLOSE(file);
  4472. return NULL;
  4473. }
  4474. sz = XFTELL(file);
  4475. if (XFSEEK(file, 0, XSEEK_SET) != 0){
  4476. XFCLOSE(file);
  4477. return NULL;
  4478. }
  4479. if (sz > MAX_WOLFSSL_FILE_SIZE || sz < 0) {
  4480. WOLFSSL_MSG("X509_load_certificate_file size error");
  4481. XFCLOSE(file);
  4482. return NULL;
  4483. }
  4484. if (sz > (long)sizeof(staticBuffer)) {
  4485. fileBuffer = (byte*)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE);
  4486. if (fileBuffer == NULL) {
  4487. XFCLOSE(file);
  4488. return NULL;
  4489. }
  4490. dynamic = 1;
  4491. }
  4492. ret = (int)XFREAD(fileBuffer, 1, sz, file);
  4493. if (ret != sz) {
  4494. XFCLOSE(file);
  4495. if (dynamic)
  4496. XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
  4497. return NULL;
  4498. }
  4499. XFCLOSE(file);
  4500. x509 = wolfSSL_X509_load_certificate_buffer(fileBuffer, (int)sz, format);
  4501. if (dynamic)
  4502. XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
  4503. return x509;
  4504. }
  4505. #endif /* !NO_FILESYSTEM */
  4506. static WOLFSSL_X509* loadX509orX509REQFromBuffer(
  4507. const unsigned char* buf, int sz, int format, int type)
  4508. {
  4509. int ret = 0;
  4510. WOLFSSL_X509* x509 = NULL;
  4511. DerBuffer* der = NULL;
  4512. WOLFSSL_ENTER("wolfSSL_X509_load_certificate_ex");
  4513. if (format == WOLFSSL_FILETYPE_PEM) {
  4514. #ifdef WOLFSSL_PEM_TO_DER
  4515. ret = PemToDer(buf, sz, type, &der, NULL, NULL, NULL);
  4516. if (ret != 0) {
  4517. FreeDer(&der);
  4518. }
  4519. #else
  4520. ret = NOT_COMPILED_IN;
  4521. #endif
  4522. }
  4523. else {
  4524. ret = AllocDer(&der, (word32)sz, type, NULL);
  4525. if (ret == 0) {
  4526. XMEMCPY(der->buffer, buf, sz);
  4527. }
  4528. }
  4529. /* At this point we want `der` to have the certificate in DER format */
  4530. /* ready to be decoded. */
  4531. if (der != NULL && der->buffer != NULL) {
  4532. #ifdef WOLFSSL_SMALL_STACK
  4533. DecodedCert* cert;
  4534. #else
  4535. DecodedCert cert[1];
  4536. #endif
  4537. #ifdef WOLFSSL_SMALL_STACK
  4538. cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL,
  4539. DYNAMIC_TYPE_DCERT);
  4540. if (cert == NULL) {
  4541. ret = MEMORY_ERROR;
  4542. }
  4543. else
  4544. #endif
  4545. {
  4546. InitDecodedCert(cert, der->buffer, der->length, NULL);
  4547. ret = ParseCertRelative(cert, type, 0, NULL);
  4548. if (ret == 0) {
  4549. x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), NULL,
  4550. DYNAMIC_TYPE_X509);
  4551. if (x509 != NULL) {
  4552. InitX509(x509, 1, NULL);
  4553. ret = CopyDecodedToX509(x509, cert);
  4554. if (ret != 0) {
  4555. wolfSSL_X509_free(x509);
  4556. x509 = NULL;
  4557. }
  4558. }
  4559. else {
  4560. ret = MEMORY_ERROR;
  4561. }
  4562. }
  4563. FreeDecodedCert(cert);
  4564. #ifdef WOLFSSL_SMALL_STACK
  4565. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  4566. #endif
  4567. }
  4568. FreeDer(&der);
  4569. }
  4570. if (ret != 0) {
  4571. WOLFSSL_ERROR(ret);
  4572. }
  4573. return x509;
  4574. }
  4575. WOLFSSL_X509* wolfSSL_X509_load_certificate_buffer(
  4576. const unsigned char* buf, int sz, int format)
  4577. {
  4578. return loadX509orX509REQFromBuffer(buf, sz,
  4579. format, CERT_TYPE);
  4580. }
  4581. #ifdef WOLFSSL_CERT_REQ
  4582. WOLFSSL_X509* wolfSSL_X509_REQ_load_certificate_buffer(
  4583. const unsigned char* buf, int sz, int format)
  4584. {
  4585. return loadX509orX509REQFromBuffer(buf, sz,
  4586. format, CERTREQ_TYPE);
  4587. }
  4588. #endif
  4589. #endif /* KEEP_PEER_CERT || SESSION_CERTS */
  4590. #if defined(OPENSSL_EXTRA_X509_SMALL) || defined(KEEP_PEER_CERT) || \
  4591. defined(SESSION_CERTS)
  4592. /* Smaller subset of X509 compatibility functions. Avoid increasing the size of
  4593. * this subset and its memory usage */
  4594. /* returns a pointer to a new WOLFSSL_X509 structure on success and NULL on
  4595. * fail
  4596. */
  4597. WOLFSSL_X509* wolfSSL_X509_new(void)
  4598. {
  4599. WOLFSSL_X509* x509;
  4600. x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), NULL,
  4601. DYNAMIC_TYPE_X509);
  4602. if (x509 != NULL) {
  4603. InitX509(x509, 1, NULL);
  4604. }
  4605. return x509;
  4606. }
  4607. WOLFSSL_ABI
  4608. WOLFSSL_X509_NAME* wolfSSL_X509_get_subject_name(WOLFSSL_X509* cert)
  4609. {
  4610. WOLFSSL_ENTER("wolfSSL_X509_get_subject_name");
  4611. if (cert)
  4612. return &cert->subject;
  4613. return NULL;
  4614. }
  4615. WOLFSSL_ABI
  4616. WOLFSSL_X509_NAME* wolfSSL_X509_get_issuer_name(WOLFSSL_X509* cert)
  4617. {
  4618. WOLFSSL_ENTER("wolfSSL_X509_get_issuer_name");
  4619. if (cert)
  4620. return &cert->issuer;
  4621. return NULL;
  4622. }
  4623. int wolfSSL_X509_get_signature_type(WOLFSSL_X509* x509)
  4624. {
  4625. int type = 0;
  4626. WOLFSSL_ENTER("wolfSSL_X509_get_signature_type");
  4627. if (x509 != NULL)
  4628. type = x509->sigOID;
  4629. return type;
  4630. }
  4631. #if defined(OPENSSL_EXTRA_X509_SMALL)
  4632. int wolfSSL_X509_NAME_get_sz(WOLFSSL_X509_NAME* name)
  4633. {
  4634. WOLFSSL_ENTER("wolfSSL_X509_NAME_get_sz");
  4635. if (!name)
  4636. return -1;
  4637. return name->sz;
  4638. }
  4639. /* Searches for the first ENTRY of type NID
  4640. * idx is the location to start searching from, the value at when the entry was
  4641. * found is stored into idx
  4642. * returns a pointer to the entry on success and null on fail */
  4643. static WOLFSSL_X509_NAME_ENTRY* GetEntryByNID(WOLFSSL_X509_NAME* name, int nid,
  4644. int* idx)
  4645. {
  4646. int i;
  4647. WOLFSSL_X509_NAME_ENTRY* ret = NULL;
  4648. /* and index of less than 0 is assumed to be starting from 0 */
  4649. if (*idx < 0) {
  4650. *idx = 0;
  4651. }
  4652. for (i = *idx; i < MAX_NAME_ENTRIES; i++) {
  4653. if (name->entry[i].nid == nid) {
  4654. ret = &name->entry[i];
  4655. *idx = i;
  4656. break;
  4657. }
  4658. }
  4659. return ret;
  4660. }
  4661. /* Used to get a string from the WOLFSSL_X509_NAME structure that
  4662. * corresponds with the NID value passed in. This finds the first entry with
  4663. * matching NID value, if searching for the case where there is multiple
  4664. * entries with the same NID value than other functions should be used
  4665. * (i.e. wolfSSL_X509_NAME_get_index_by_NID, wolfSSL_X509_NAME_get_entry)
  4666. *
  4667. * name structure to get string from
  4668. * nid NID value to search for
  4669. * buf [out] buffer to hold results. If NULL then the buffer size minus the
  4670. * null char is returned.
  4671. * len size of "buf" passed in
  4672. *
  4673. * returns the length of string found, not including the NULL terminator.
  4674. * It's possible the function could return a negative value in the
  4675. * case that len is less than or equal to 0. A negative value is
  4676. * considered an error case.
  4677. */
  4678. int wolfSSL_X509_NAME_get_text_by_NID(WOLFSSL_X509_NAME* name,
  4679. int nid, char* buf, int len)
  4680. {
  4681. WOLFSSL_X509_NAME_ENTRY* e;
  4682. unsigned char *text = NULL;
  4683. int textSz = 0;
  4684. int idx = 0;
  4685. WOLFSSL_ENTER("wolfSSL_X509_NAME_get_text_by_NID");
  4686. if (name == NULL) {
  4687. WOLFSSL_MSG("NULL argument passed in");
  4688. return WOLFSSL_FATAL_ERROR;
  4689. }
  4690. e = GetEntryByNID(name, nid, &idx);
  4691. if (e == NULL) {
  4692. WOLFSSL_MSG("Entry type not found");
  4693. return WOLFSSL_FATAL_ERROR;
  4694. }
  4695. text = wolfSSL_ASN1_STRING_data(e->value);
  4696. textSz = wolfSSL_ASN1_STRING_length(e->value);
  4697. if (text == NULL) {
  4698. WOLFSSL_MSG("Unable to get entry text");
  4699. return WOLFSSL_FATAL_ERROR;
  4700. }
  4701. /* if buf is NULL return size of buffer needed (minus null char) */
  4702. if (buf == NULL) {
  4703. WOLFSSL_MSG("Buffer is NULL, returning buffer size only");
  4704. return textSz;
  4705. }
  4706. /* buf is not NULL from above */
  4707. if (text != NULL) {
  4708. textSz = min(textSz + 1, len); /* + 1 to account for null char */
  4709. if (textSz > 0) {
  4710. XMEMCPY(buf, text, textSz - 1);
  4711. buf[textSz - 1] = '\0';
  4712. }
  4713. }
  4714. WOLFSSL_LEAVE("wolfSSL_X509_NAME_get_text_by_NID", textSz);
  4715. return (textSz - 1); /* do not include null character in size */
  4716. }
  4717. /* Creates a new WOLFSSL_EVP_PKEY structure that has the public key from x509
  4718. *
  4719. * returns a pointer to the created WOLFSSL_EVP_PKEY on success and NULL on fail
  4720. */
  4721. WOLFSSL_EVP_PKEY* wolfSSL_X509_get_pubkey(WOLFSSL_X509* x509)
  4722. {
  4723. WOLFSSL_EVP_PKEY* key = NULL;
  4724. int ret;
  4725. (void)ret;
  4726. WOLFSSL_ENTER("wolfSSL_X509_get_pubkey");
  4727. if (x509 != NULL) {
  4728. key = wolfSSL_EVP_PKEY_new_ex(x509->heap);
  4729. if (key != NULL) {
  4730. if (x509->pubKeyOID == RSAk) {
  4731. key->type = EVP_PKEY_RSA;
  4732. }
  4733. else if (x509->pubKeyOID == DSAk) {
  4734. key->type = EVP_PKEY_DSA;
  4735. }
  4736. else {
  4737. key->type = EVP_PKEY_EC;
  4738. }
  4739. key->save_type = 0;
  4740. key->pkey.ptr = (char*)XMALLOC(
  4741. x509->pubKey.length, x509->heap,
  4742. DYNAMIC_TYPE_PUBLIC_KEY);
  4743. if (key->pkey.ptr == NULL) {
  4744. wolfSSL_EVP_PKEY_free(key);
  4745. return NULL;
  4746. }
  4747. XMEMCPY(key->pkey.ptr, x509->pubKey.buffer, x509->pubKey.length);
  4748. key->pkey_sz = x509->pubKey.length;
  4749. #ifdef HAVE_ECC
  4750. key->pkey_curve = (int)x509->pkCurveOID;
  4751. #endif /* HAVE_ECC */
  4752. /* decode RSA key */
  4753. #ifndef NO_RSA
  4754. if (key->type == EVP_PKEY_RSA) {
  4755. key->ownRsa = 1;
  4756. key->rsa = wolfSSL_RSA_new();
  4757. if (key->rsa == NULL) {
  4758. wolfSSL_EVP_PKEY_free(key);
  4759. return NULL;
  4760. }
  4761. if (wolfSSL_RSA_LoadDer_ex(key->rsa,
  4762. (const unsigned char*)key->pkey.ptr, key->pkey_sz,
  4763. WOLFSSL_RSA_LOAD_PUBLIC) != WOLFSSL_SUCCESS) {
  4764. wolfSSL_EVP_PKEY_free(key);
  4765. return NULL;
  4766. }
  4767. }
  4768. #endif /* NO_RSA */
  4769. /* decode ECC key */
  4770. #if defined(HAVE_ECC) && defined(OPENSSL_EXTRA)
  4771. if (key->type == EVP_PKEY_EC) {
  4772. word32 idx = 0;
  4773. key->ownEcc = 1;
  4774. key->ecc = wolfSSL_EC_KEY_new();
  4775. if (key->ecc == NULL || key->ecc->internal == NULL) {
  4776. wolfSSL_EVP_PKEY_free(key);
  4777. return NULL;
  4778. }
  4779. /* not using wolfSSL_EC_KEY_LoadDer because public key in x509
  4780. * is in the format of x963 (no sequence at start of buffer) */
  4781. ret = wc_EccPublicKeyDecode((const unsigned char*)key->pkey.ptr,
  4782. &idx, (ecc_key*)key->ecc->internal,
  4783. key->pkey_sz);
  4784. if (ret < 0) {
  4785. WOLFSSL_ERROR_VERBOSE(ret);
  4786. WOLFSSL_MSG("wc_EccPublicKeyDecode failed");
  4787. wolfSSL_EVP_PKEY_free(key);
  4788. return NULL;
  4789. }
  4790. if (SetECKeyExternal(key->ecc) != WOLFSSL_SUCCESS) {
  4791. WOLFSSL_MSG("SetECKeyExternal failed");
  4792. wolfSSL_EVP_PKEY_free(key);
  4793. return NULL;
  4794. }
  4795. key->ecc->inSet = 1;
  4796. }
  4797. #endif /* HAVE_ECC && OPENSSL_EXTRA */
  4798. #ifndef NO_DSA
  4799. if (key->type == EVP_PKEY_DSA) {
  4800. key->ownDsa = 1;
  4801. key->dsa = wolfSSL_DSA_new();
  4802. if (key->dsa == NULL) {
  4803. wolfSSL_EVP_PKEY_free(key);
  4804. return NULL;
  4805. }
  4806. if (wolfSSL_DSA_LoadDer_ex(key->dsa,
  4807. (const unsigned char*)key->pkey.ptr, key->pkey_sz, \
  4808. WOLFSSL_DSA_LOAD_PUBLIC) != WOLFSSL_SUCCESS) {
  4809. wolfSSL_DSA_free(key->dsa);
  4810. key->dsa = NULL;
  4811. wolfSSL_EVP_PKEY_free(key);
  4812. return NULL;
  4813. }
  4814. }
  4815. #endif /* NO_DSA */
  4816. }
  4817. }
  4818. return key;
  4819. }
  4820. #endif /* OPENSSL_EXTRA_X509_SMALL */
  4821. /* End of smaller subset of X509 compatibility functions. Avoid increasing the
  4822. * size of this subset and its memory usage */
  4823. #endif /* OPENSSL_EXTRA_X509_SMALL || KEEP_PEER_CERT || SESSION_CERTS */
  4824. #if defined(OPENSSL_ALL)
  4825. /*
  4826. * Converts a and b to DER and then does an XMEMCMP to check if they match.
  4827. * Returns 0 when certificates match and WOLFSSL_FATAL_ERROR when they don't.
  4828. */
  4829. int wolfSSL_X509_cmp(const WOLFSSL_X509 *a, const WOLFSSL_X509 *b)
  4830. {
  4831. const byte* derA;
  4832. const byte* derB;
  4833. int outSzA = 0;
  4834. int outSzB = 0;
  4835. if (a == NULL || b == NULL){
  4836. return BAD_FUNC_ARG;
  4837. }
  4838. derA = wolfSSL_X509_get_der((WOLFSSL_X509*)a, &outSzA);
  4839. if (derA == NULL){
  4840. WOLFSSL_MSG("wolfSSL_X509_get_der - certificate A has failed");
  4841. return WOLFSSL_FATAL_ERROR;
  4842. }
  4843. derB = wolfSSL_X509_get_der((WOLFSSL_X509*)b, &outSzB);
  4844. if (derB == NULL){
  4845. WOLFSSL_MSG("wolfSSL_X509_get_der - certificate B has failed");
  4846. return WOLFSSL_FATAL_ERROR;
  4847. }
  4848. if (outSzA != outSzB || XMEMCMP(derA, derB, outSzA) != 0) {
  4849. WOLFSSL_LEAVE("wolfSSL_X509_cmp", WOLFSSL_FATAL_ERROR);
  4850. return WOLFSSL_FATAL_ERROR;
  4851. }
  4852. WOLFSSL_LEAVE("wolfSSL_X509_cmp", 0);
  4853. return 0;
  4854. }
  4855. #endif /* OPENSSL_ALL */
  4856. #if defined(OPENSSL_EXTRA)
  4857. int wolfSSL_X509_ext_isSet_by_NID(WOLFSSL_X509* x509, int nid)
  4858. {
  4859. int isSet = 0;
  4860. WOLFSSL_ENTER("wolfSSL_X509_ext_isSet_by_NID");
  4861. if (x509 != NULL) {
  4862. switch (nid) {
  4863. case NID_basic_constraints: isSet = x509->basicConstSet; break;
  4864. case NID_subject_alt_name: isSet = x509->subjAltNameSet; break;
  4865. case NID_authority_key_identifier: isSet = x509->authKeyIdSet; break;
  4866. case NID_subject_key_identifier: isSet = x509->subjKeyIdSet; break;
  4867. case NID_key_usage: isSet = x509->keyUsageSet; break;
  4868. case NID_crl_distribution_points: isSet = x509->CRLdistSet; break;
  4869. case NID_ext_key_usage: isSet = ((x509->extKeyUsageSrc) ? 1 : 0);
  4870. break;
  4871. case NID_info_access: isSet = x509->authInfoSet; break;
  4872. #if defined(WOLFSSL_SEP) || defined(WOLFSSL_QT)
  4873. case NID_certificate_policies: isSet = x509->certPolicySet; break;
  4874. #endif /* WOLFSSL_SEP || WOLFSSL_QT */
  4875. default:
  4876. WOLFSSL_MSG("NID not in table");
  4877. }
  4878. }
  4879. WOLFSSL_LEAVE("wolfSSL_X509_ext_isSet_by_NID", isSet);
  4880. return isSet;
  4881. }
  4882. int wolfSSL_X509_ext_get_critical_by_NID(WOLFSSL_X509* x509, int nid)
  4883. {
  4884. int crit = 0;
  4885. WOLFSSL_ENTER("wolfSSL_X509_ext_get_critical_by_NID");
  4886. if (x509 != NULL) {
  4887. switch (nid) {
  4888. case NID_basic_constraints: crit = x509->basicConstCrit; break;
  4889. case NID_subject_alt_name: crit = x509->subjAltNameCrit; break;
  4890. case NID_authority_key_identifier: crit = x509->authKeyIdCrit; break;
  4891. case NID_subject_key_identifier: crit = x509->subjKeyIdCrit; break;
  4892. case NID_key_usage: crit = x509->keyUsageCrit; break;
  4893. case NID_crl_distribution_points: crit= x509->CRLdistCrit; break;
  4894. case NID_ext_key_usage: crit= x509->extKeyUsageCrit; break;
  4895. #if defined(WOLFSSL_SEP) || defined(WOLFSSL_QT)
  4896. case NID_certificate_policies: crit = x509->certPolicyCrit; break;
  4897. #endif /* WOLFSSL_SEP || WOLFSSL_QT */
  4898. }
  4899. }
  4900. WOLFSSL_LEAVE("wolfSSL_X509_ext_get_critical_by_NID", crit);
  4901. return crit;
  4902. }
  4903. int wolfSSL_X509_get_isSet_pathLength(WOLFSSL_X509* x509)
  4904. {
  4905. int isSet = 0;
  4906. WOLFSSL_ENTER("wolfSSL_X509_get_isSet_pathLength");
  4907. if (x509 != NULL)
  4908. isSet = x509->basicConstPlSet;
  4909. WOLFSSL_LEAVE("wolfSSL_X509_get_isSet_pathLength", isSet);
  4910. return isSet;
  4911. }
  4912. word32 wolfSSL_X509_get_pathLength(WOLFSSL_X509* x509)
  4913. {
  4914. word32 pathLength = 0;
  4915. WOLFSSL_ENTER("wolfSSL_X509_get_pathLength");
  4916. if (x509 != NULL)
  4917. pathLength = x509->pathLength;
  4918. WOLFSSL_LEAVE("wolfSSL_X509_get_pathLength", pathLength);
  4919. return pathLength;
  4920. }
  4921. unsigned int wolfSSL_X509_get_keyUsage(WOLFSSL_X509* x509)
  4922. {
  4923. word16 usage = 0;
  4924. WOLFSSL_ENTER("wolfSSL_X509_get_keyUsage");
  4925. if (x509 != NULL)
  4926. usage = x509->keyUsage;
  4927. WOLFSSL_LEAVE("wolfSSL_X509_get_keyUsage", usage);
  4928. return usage;
  4929. }
  4930. byte* wolfSSL_X509_get_authorityKeyID(WOLFSSL_X509* x509,
  4931. byte* dst, int* dstLen)
  4932. {
  4933. byte *id = NULL;
  4934. int copySz = 0;
  4935. WOLFSSL_ENTER("wolfSSL_X509_get_authorityKeyID");
  4936. if (x509 != NULL) {
  4937. if (x509->authKeyIdSet) {
  4938. copySz = min(dstLen != NULL ? *dstLen : 0,
  4939. (int)x509->authKeyIdSz);
  4940. id = x509->authKeyId;
  4941. }
  4942. if (dst != NULL && dstLen != NULL && id != NULL && copySz > 0) {
  4943. XMEMCPY(dst, id, copySz);
  4944. id = dst;
  4945. *dstLen = copySz;
  4946. }
  4947. }
  4948. WOLFSSL_LEAVE("wolfSSL_X509_get_authorityKeyID", copySz);
  4949. return id;
  4950. }
  4951. byte* wolfSSL_X509_get_subjectKeyID(WOLFSSL_X509* x509,
  4952. byte* dst, int* dstLen)
  4953. {
  4954. byte *id = NULL;
  4955. int copySz = 0;
  4956. WOLFSSL_ENTER("wolfSSL_X509_get_subjectKeyID");
  4957. if (x509 != NULL) {
  4958. if (x509->subjKeyIdSet) {
  4959. copySz = min(dstLen != NULL ? *dstLen : 0,
  4960. (int)x509->subjKeyIdSz);
  4961. id = x509->subjKeyId;
  4962. }
  4963. if (dst != NULL && dstLen != NULL && id != NULL && copySz > 0) {
  4964. XMEMCPY(dst, id, copySz);
  4965. id = dst;
  4966. *dstLen = copySz;
  4967. }
  4968. }
  4969. WOLFSSL_LEAVE("wolfSSL_X509_get_subjectKeyID", copySz);
  4970. return id;
  4971. }
  4972. #endif /* OPENSSL_EXTRA */
  4973. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
  4974. defined(OPENSSL_EXTRA_X509_SMALL)
  4975. /* Looks up the index of the first entry encountered with matching NID
  4976. * The search starts from index 'pos'
  4977. * returns a negative value on failure and positive index value on success*/
  4978. int wolfSSL_X509_NAME_get_index_by_NID(WOLFSSL_X509_NAME* name,
  4979. int nid, int pos)
  4980. {
  4981. int value = nid, i;
  4982. WOLFSSL_ENTER("wolfSSL_X509_NAME_get_index_by_NID");
  4983. if (name == NULL) {
  4984. return BAD_FUNC_ARG;
  4985. }
  4986. i = pos + 1; /* start search after index passed in */
  4987. if (i < 0) {
  4988. i = 0;
  4989. }
  4990. for (;i < name->entrySz && i < MAX_NAME_ENTRIES; i++) {
  4991. if (name->entry[i].nid == value) {
  4992. return i;
  4993. }
  4994. }
  4995. return WOLFSSL_FATAL_ERROR;
  4996. }
  4997. WOLFSSL_ASN1_STRING* wolfSSL_X509_NAME_ENTRY_get_data(
  4998. WOLFSSL_X509_NAME_ENTRY* in)
  4999. {
  5000. WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_get_data");
  5001. if (in == NULL)
  5002. return NULL;
  5003. return in->value;
  5004. }
  5005. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  5006. #ifdef OPENSSL_EXTRA
  5007. #ifndef NO_BIO
  5008. #ifndef MAX_WIDTH
  5009. #define MAX_WIDTH 80
  5010. #endif
  5011. static int X509PrintSubjAltName(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
  5012. int indent)
  5013. {
  5014. int ret = WOLFSSL_SUCCESS;
  5015. DNS_entry* entry;
  5016. if (bio == NULL || x509 == NULL) {
  5017. ret = WOLFSSL_FAILURE;
  5018. }
  5019. if (ret == WOLFSSL_SUCCESS && x509->subjAltNameSet &&
  5020. x509->altNames != NULL) {
  5021. char scratch[MAX_WIDTH];
  5022. int len;
  5023. len = XSNPRINTF(scratch, MAX_WIDTH, "%*s", indent, "");
  5024. if (len >= MAX_WIDTH)
  5025. ret = WOLFSSL_FAILURE;
  5026. if (ret == WOLFSSL_SUCCESS) {
  5027. if (wolfSSL_BIO_write(bio, scratch, (int)XSTRLEN(scratch)) <= 0) {
  5028. ret = WOLFSSL_FAILURE;
  5029. }
  5030. }
  5031. if (ret == WOLFSSL_SUCCESS) {
  5032. int nameCount = 0;
  5033. entry = x509->altNames;
  5034. while (entry != NULL) {
  5035. ++nameCount;
  5036. if (nameCount > 1) {
  5037. if (wolfSSL_BIO_write(bio, ", ", 2) <= 0) {
  5038. ret = WOLFSSL_FAILURE;
  5039. break;
  5040. }
  5041. }
  5042. if (entry->type == ASN_DNS_TYPE) {
  5043. len = XSNPRINTF(scratch, MAX_WIDTH, "DNS:%s", entry->name);
  5044. if (len >= MAX_WIDTH) {
  5045. ret = WOLFSSL_FAILURE;
  5046. break;
  5047. }
  5048. }
  5049. #if defined(OPENSSL_ALL) || defined(WOLFSSL_IP_ALT_NAME)
  5050. else if (entry->type == ASN_IP_TYPE) {
  5051. len = XSNPRINTF(scratch, MAX_WIDTH, "IP Address:%s",
  5052. entry->ipString);
  5053. if (len >= MAX_WIDTH) {
  5054. ret = WOLFSSL_FAILURE;
  5055. break;
  5056. }
  5057. }
  5058. #endif /* OPENSSL_ALL || WOLFSSL_IP_ALT_NAME */
  5059. else if (entry->type == ASN_RFC822_TYPE) {
  5060. len = XSNPRINTF(scratch, MAX_WIDTH, "email:%s",
  5061. entry->name);
  5062. if (len >= MAX_WIDTH) {
  5063. ret = WOLFSSL_FAILURE;
  5064. break;
  5065. }
  5066. }
  5067. else if (entry->type == ASN_DIR_TYPE) {
  5068. /* @TODO entry->name in ASN1 syntax */
  5069. len = XSNPRINTF(scratch, MAX_WIDTH,
  5070. "DirName:<print out not supported yet>");
  5071. if (len >= MAX_WIDTH) {
  5072. ret = WOLFSSL_FAILURE;
  5073. break;
  5074. }
  5075. }
  5076. else if (entry->type == ASN_URI_TYPE) {
  5077. len = XSNPRINTF(scratch, MAX_WIDTH, "URI:%s",
  5078. entry->name);
  5079. if (len >= MAX_WIDTH) {
  5080. ret = WOLFSSL_FAILURE;
  5081. break;
  5082. }
  5083. }
  5084. #if defined(OPENSSL_ALL)
  5085. else if (entry->type == ASN_RID_TYPE) {
  5086. len = XSNPRINTF(scratch, MAX_WIDTH, "Registered ID:%s",
  5087. entry->ridString);
  5088. if (len >= MAX_WIDTH) {
  5089. ret = WOLFSSL_FAILURE;
  5090. break;
  5091. }
  5092. }
  5093. #endif
  5094. else if (entry->type == ASN_OTHER_TYPE) {
  5095. len = XSNPRINTF(scratch, MAX_WIDTH,
  5096. "othername <unsupported>");
  5097. if (len >= MAX_WIDTH) {
  5098. ret = WOLFSSL_FAILURE;
  5099. break;
  5100. }
  5101. }
  5102. else {
  5103. WOLFSSL_MSG("Bad alt name type.");
  5104. ret = WOLFSSL_FAILURE;
  5105. break;
  5106. }
  5107. if (wolfSSL_BIO_write(bio, scratch, (int)XSTRLEN(scratch))
  5108. <= 0) {
  5109. ret = WOLFSSL_FAILURE;
  5110. break;
  5111. }
  5112. entry = entry->next;
  5113. }
  5114. }
  5115. if (ret == WOLFSSL_SUCCESS && wolfSSL_BIO_write(bio, "\n", 1) <= 0) {
  5116. ret = WOLFSSL_FAILURE;
  5117. }
  5118. }
  5119. return ret;
  5120. }
  5121. #ifdef XSNPRINTF
  5122. static int X509PrintKeyUsage(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int indent)
  5123. {
  5124. int ret = WOLFSSL_SUCCESS;
  5125. const int usages[] = {
  5126. KEYUSE_DIGITAL_SIG,
  5127. KEYUSE_CONTENT_COMMIT,
  5128. KEYUSE_KEY_ENCIPHER,
  5129. KEYUSE_DATA_ENCIPHER,
  5130. KEYUSE_KEY_AGREE,
  5131. KEYUSE_KEY_CERT_SIGN,
  5132. KEYUSE_CRL_SIGN,
  5133. KEYUSE_ENCIPHER_ONLY,
  5134. KEYUSE_DECIPHER_ONLY
  5135. };
  5136. const char* usageStrs[] = {
  5137. "Digital Signature",
  5138. "Non Repudiation",
  5139. "Key Encipherment",
  5140. "Data Encipherment",
  5141. "Key Agreement",
  5142. "Certificate Sign",
  5143. "CRL Sign",
  5144. "Encipher Only",
  5145. "Decipher Only"
  5146. };
  5147. if (bio == NULL || x509 == NULL) {
  5148. ret = WOLFSSL_FAILURE;
  5149. }
  5150. if (ret == WOLFSSL_SUCCESS && x509->keyUsageSet && x509->keyUsage != 0) {
  5151. char scratch[MAX_WIDTH];
  5152. int len;
  5153. word32 i = 0;
  5154. int usageCount = 0;
  5155. len = XSNPRINTF(scratch, MAX_WIDTH, "%*s", indent, "");
  5156. if (len >= MAX_WIDTH)
  5157. ret = WOLFSSL_FAILURE;
  5158. if (ret == WOLFSSL_SUCCESS) {
  5159. if (wolfSSL_BIO_write(bio, scratch, (int)XSTRLEN(scratch)) <= 0) {
  5160. ret = WOLFSSL_FAILURE;
  5161. }
  5162. }
  5163. for (; ret == WOLFSSL_SUCCESS && i < sizeof(usages) / sizeof(usages[i]);
  5164. i++) {
  5165. if (x509->keyUsage & usages[i]) {
  5166. ++usageCount;
  5167. if (usageCount > 1 && wolfSSL_BIO_write(bio, ", ", 2) <= 0) {
  5168. ret = WOLFSSL_FAILURE;
  5169. break;
  5170. }
  5171. if (wolfSSL_BIO_write(bio, usageStrs[i],
  5172. (int)XSTRLEN(usageStrs[i])) <= 0) {
  5173. ret = WOLFSSL_FAILURE;
  5174. break;
  5175. }
  5176. }
  5177. }
  5178. if (ret == WOLFSSL_SUCCESS && wolfSSL_BIO_write(bio, "\n", 1) <= 0) {
  5179. ret = WOLFSSL_FAILURE;
  5180. }
  5181. }
  5182. return ret;
  5183. }
  5184. static int X509PrintExtendedKeyUsage(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
  5185. int indent)
  5186. {
  5187. int ret = WOLFSSL_SUCCESS;
  5188. const int usages[] = {
  5189. EXTKEYUSE_OCSP_SIGN,
  5190. EXTKEYUSE_TIMESTAMP,
  5191. EXTKEYUSE_EMAILPROT,
  5192. EXTKEYUSE_CODESIGN,
  5193. EXTKEYUSE_CLIENT_AUTH,
  5194. EXTKEYUSE_SERVER_AUTH
  5195. };
  5196. const char* usageStrs[] = {
  5197. "OCSP Signing",
  5198. "Time Stamping",
  5199. "E-mail Protection",
  5200. "Code Signing",
  5201. "TLS Web Client Authentication",
  5202. "TLS Web Server Authentication"
  5203. };
  5204. if (bio == NULL || x509 == NULL) {
  5205. ret = WOLFSSL_FAILURE;
  5206. }
  5207. if (ret == WOLFSSL_SUCCESS && x509->extKeyUsageCount > 0
  5208. && x509->extKeyUsage != 0) {
  5209. char scratch[MAX_WIDTH];
  5210. int len;
  5211. word32 i = 0;
  5212. int usageCount = 0;
  5213. len = XSNPRINTF(scratch, MAX_WIDTH, "%*s", indent, "");
  5214. if (len >= MAX_WIDTH)
  5215. ret = WOLFSSL_FAILURE;
  5216. if (ret == WOLFSSL_SUCCESS) {
  5217. if (wolfSSL_BIO_write(bio, scratch, (int)XSTRLEN(scratch)) <= 0) {
  5218. ret = WOLFSSL_FAILURE;
  5219. }
  5220. }
  5221. for (; ret == WOLFSSL_SUCCESS && i < sizeof(usages) / sizeof(usages[i]);
  5222. i++) {
  5223. if (x509->extKeyUsage & usages[i]) {
  5224. ++usageCount;
  5225. if (usageCount > 1 && wolfSSL_BIO_write(bio, ", ", 2) <= 0) {
  5226. ret = WOLFSSL_FAILURE;
  5227. break;
  5228. }
  5229. if (wolfSSL_BIO_write(bio, usageStrs[i],
  5230. (int)XSTRLEN(usageStrs[i])) <= 0) {
  5231. ret = WOLFSSL_FAILURE;
  5232. break;
  5233. }
  5234. }
  5235. }
  5236. if (ret == WOLFSSL_SUCCESS && wolfSSL_BIO_write(bio, "\n", 1) <= 0) {
  5237. ret = WOLFSSL_FAILURE;
  5238. }
  5239. }
  5240. return ret;
  5241. }
  5242. /* print serial number out
  5243. * return WOLFSSL_SUCCESS on success
  5244. */
  5245. static int X509PrintSerial_ex(WOLFSSL_BIO* bio, byte* serial, int sz,
  5246. int delimiter, int indent)
  5247. {
  5248. char scratch[MAX_WIDTH];
  5249. const int scratchSz = sizeof(scratch);
  5250. int scratchLen;
  5251. if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*sSerial Number:",
  5252. indent, "")) >= MAX_WIDTH) {
  5253. WOLFSSL_MSG("buffer overrun");
  5254. return WOLFSSL_FAILURE;
  5255. }
  5256. if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
  5257. return WOLFSSL_FAILURE;
  5258. }
  5259. if (sz > (int)sizeof(byte)) {
  5260. int i;
  5261. /* serial is larger than int size so print off hex values */
  5262. if ((scratchLen = XSNPRINTF(
  5263. scratch, MAX_WIDTH, "\n%*s", indent + 4, ""))
  5264. >= MAX_WIDTH) {
  5265. WOLFSSL_MSG("buffer overrun");
  5266. return WOLFSSL_FAILURE;
  5267. }
  5268. for (i = 0; i < sz; i++) {
  5269. int valLen;
  5270. if ((valLen = XSNPRINTF(
  5271. scratch + scratchLen, scratchSz - scratchLen,
  5272. "%02x%s", serial[i], (i < sz - 1) ?
  5273. (delimiter ? ":" : "") : "\n"))
  5274. >= scratchSz - scratchLen)
  5275. {
  5276. WOLFSSL_MSG("buffer overrun");
  5277. return WOLFSSL_FAILURE;
  5278. }
  5279. scratchLen += valLen;
  5280. }
  5281. if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
  5282. return WOLFSSL_FAILURE;
  5283. }
  5284. }
  5285. /* if serial can fit into byte then print on the same line */
  5286. else {
  5287. if ((scratchLen = XSNPRINTF(
  5288. scratch, MAX_WIDTH, " %d (0x%x)\n", serial[0], serial[0]))
  5289. >= MAX_WIDTH)
  5290. {
  5291. WOLFSSL_MSG("buffer overrun");
  5292. return WOLFSSL_FAILURE;
  5293. }
  5294. if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
  5295. return WOLFSSL_FAILURE;
  5296. }
  5297. }
  5298. return WOLFSSL_SUCCESS;
  5299. }
  5300. static int X509PrintSerial(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int indent)
  5301. {
  5302. unsigned char serial[32];
  5303. int sz = sizeof(serial);
  5304. XMEMSET(serial, 0, sz);
  5305. if (wolfSSL_X509_get_serial_number(x509, serial, &sz) == WOLFSSL_SUCCESS) {
  5306. X509PrintSerial_ex(bio, serial, sz, 1, indent);
  5307. }
  5308. return WOLFSSL_SUCCESS;
  5309. }
  5310. /* iterate through certificate extensions printing them out in human readable
  5311. * form
  5312. * return WOLFSSL_SUCCESS on success
  5313. */
  5314. static int X509PrintExtensions(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int indent)
  5315. {
  5316. int ret = WOLFSSL_SUCCESS;
  5317. char scratch[MAX_WIDTH];
  5318. const int scratchSz = sizeof(scratch);
  5319. int scratchLen;
  5320. int count, i;
  5321. char* buf = NULL;
  5322. count = wolfSSL_X509_get_ext_count(x509);
  5323. if (count <= 0)
  5324. return WOLFSSL_SUCCESS;
  5325. #ifdef WOLFSSL_CERT_REQ
  5326. if (x509->isCSR) {
  5327. if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*s%s\n", indent, "",
  5328. "Requested extensions:")) >= MAX_WIDTH) {
  5329. return WOLFSSL_FAILURE;
  5330. }
  5331. }
  5332. else
  5333. #endif
  5334. {
  5335. if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*s%s\n", indent, "",
  5336. "X509v3 extensions:")) >= MAX_WIDTH) {
  5337. return WOLFSSL_FAILURE;
  5338. }
  5339. }
  5340. if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
  5341. return WOLFSSL_FAILURE;
  5342. }
  5343. buf = (char*)XMALLOC(MAX_WIDTH-4-indent, x509->heap,
  5344. DYNAMIC_TYPE_TMP_BUFFER);
  5345. if (buf == NULL) {
  5346. return WOLFSSL_FAILURE;
  5347. }
  5348. for (i = 0; (i < count) && (ret != WOLFSSL_FAILURE); i++) {
  5349. WOLFSSL_X509_EXTENSION* ext;
  5350. ext = wolfSSL_X509_get_ext(x509, i);
  5351. if (ext != NULL) {
  5352. WOLFSSL_ASN1_OBJECT* obj;
  5353. int nid;
  5354. char val[6];
  5355. int valLen;
  5356. word32 j;
  5357. obj = wolfSSL_X509_EXTENSION_get_object(ext);
  5358. if (obj == NULL) {
  5359. ret = WOLFSSL_FAILURE;
  5360. break;
  5361. }
  5362. if (wolfSSL_OBJ_obj2txt(buf, MAX_WIDTH, obj, 0)
  5363. == WOLFSSL_FAILURE)
  5364. {
  5365. ret = WOLFSSL_FAILURE;
  5366. break;
  5367. }
  5368. if ((scratchLen = XSNPRINTF(
  5369. scratch, MAX_WIDTH, "%*s%s%s\n", indent + 4, "",
  5370. buf,
  5371. (wolfSSL_X509_EXTENSION_get_critical(ext)
  5372. ? ": critical"
  5373. : ": ")))
  5374. >= MAX_WIDTH)
  5375. {
  5376. ret = WOLFSSL_FAILURE;
  5377. break;
  5378. }
  5379. if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
  5380. ret = WOLFSSL_FAILURE;
  5381. break;
  5382. }
  5383. nid = wolfSSL_OBJ_obj2nid(obj);
  5384. switch (nid) {
  5385. case NID_subject_alt_name:
  5386. ret = X509PrintSubjAltName(bio, x509, indent + 8);
  5387. break;
  5388. case NID_subject_key_identifier:
  5389. if (!x509->subjKeyIdSet || x509->subjKeyId == NULL ||
  5390. x509->subjKeyIdSz == 0)
  5391. {
  5392. ret = WOLFSSL_FAILURE;
  5393. break;
  5394. }
  5395. if ((scratchLen = XSNPRINTF(
  5396. scratch, scratchSz,
  5397. "%*s", indent + 8, "")) >= scratchSz)
  5398. {
  5399. ret = WOLFSSL_FAILURE;
  5400. break;
  5401. }
  5402. for (j = 0; j < x509->subjKeyIdSz; j++) {
  5403. if ((valLen = XSNPRINTF(
  5404. val, sizeof(val), "%02X%s",
  5405. x509->subjKeyId[j],
  5406. (j < x509->subjKeyIdSz - 1) ? ":" : "\n"))
  5407. >= (int)sizeof(val))
  5408. {
  5409. ret = WOLFSSL_FAILURE;
  5410. break;
  5411. }
  5412. if (scratchLen + valLen >= scratchSz) {
  5413. if (wolfSSL_BIO_write(bio, scratch,
  5414. scratchLen) <= 0) {
  5415. ret = WOLFSSL_FAILURE;
  5416. break;
  5417. }
  5418. scratchLen = 0;
  5419. }
  5420. XMEMCPY(scratch + scratchLen, val, valLen);
  5421. scratchLen += valLen;
  5422. }
  5423. if (ret == WOLFSSL_FAILURE)
  5424. break;
  5425. if (wolfSSL_BIO_write(bio, scratch,
  5426. scratchLen) <= 0) {
  5427. ret = WOLFSSL_FAILURE;
  5428. break;
  5429. }
  5430. break;
  5431. case NID_authority_key_identifier:
  5432. if (!x509->authKeyIdSet || x509->authKeyId == NULL ||
  5433. x509->authKeyIdSz == 0) {
  5434. ret = WOLFSSL_FAILURE;
  5435. break;
  5436. }
  5437. if ((scratchLen = XSNPRINTF(
  5438. scratch, scratchSz, "%*s%s",
  5439. indent + 8, "", "keyid:")) >= scratchSz)
  5440. {
  5441. ret = WOLFSSL_FAILURE;
  5442. break;
  5443. }
  5444. for (j = 0; j < x509->authKeyIdSz; j++) {
  5445. if ((valLen = XSNPRINTF(
  5446. val, sizeof(val), "%02X%s",
  5447. x509->authKeyId[j],
  5448. (j < x509->authKeyIdSz - 1) ? ":" : "\n\n"))
  5449. >= (int)sizeof(val))
  5450. {
  5451. ret = WOLFSSL_FAILURE;
  5452. break;
  5453. }
  5454. if (scratchLen >= scratchSz - valLen) {
  5455. if (wolfSSL_BIO_write(bio, scratch,
  5456. scratchLen) <= 0)
  5457. {
  5458. ret = WOLFSSL_FAILURE;
  5459. break;
  5460. }
  5461. scratchLen = 0;
  5462. }
  5463. if (scratchLen + valLen >= scratchSz) {
  5464. ret = WOLFSSL_FAILURE;
  5465. break;
  5466. }
  5467. XMEMCPY(scratch + scratchLen, val, valLen);
  5468. scratchLen += valLen;
  5469. }
  5470. if (ret == WOLFSSL_FAILURE)
  5471. break;
  5472. if (wolfSSL_BIO_write(bio, scratch,
  5473. scratchLen) <= 0) {
  5474. ret = WOLFSSL_FAILURE;
  5475. break;
  5476. }
  5477. break;
  5478. case NID_basic_constraints:
  5479. if (!x509->basicConstSet) {
  5480. ret = WOLFSSL_FAILURE;
  5481. break;
  5482. }
  5483. if ((scratchLen = XSNPRINTF(
  5484. scratch, scratchSz,
  5485. "%*sCA:%s\n",
  5486. indent + 8, "", (x509->isCa)? "TRUE": "FALSE"))
  5487. >= scratchSz)
  5488. {
  5489. ret = WOLFSSL_FAILURE;
  5490. break;
  5491. }
  5492. if (wolfSSL_BIO_write(bio, scratch,
  5493. scratchLen) <= 0) {
  5494. ret = WOLFSSL_FAILURE;
  5495. break;
  5496. }
  5497. break;
  5498. case NID_key_usage:
  5499. ret = X509PrintKeyUsage(bio, x509, indent + 8);
  5500. break;
  5501. case NID_ext_key_usage:
  5502. ret = X509PrintExtendedKeyUsage(bio, x509, indent + 8);
  5503. break;
  5504. default:
  5505. /* extension nid not yet supported */
  5506. if ((scratchLen = XSNPRINTF(
  5507. scratch, MAX_WIDTH,
  5508. "%*sNID %d print not yet supported\n",
  5509. indent + 8, "", nid)) >= MAX_WIDTH)
  5510. {
  5511. ret = WOLFSSL_FAILURE;
  5512. break;
  5513. }
  5514. if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
  5515. ret = WOLFSSL_FAILURE;
  5516. break;
  5517. }
  5518. }
  5519. }
  5520. }
  5521. if (buf != NULL) {
  5522. XFREE(buf, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
  5523. }
  5524. return ret;
  5525. }
  5526. /* print out the signature in human readable format for use with
  5527. * wolfSSL_X509_print()
  5528. * return WOLFSSL_SUCCESS on success
  5529. */
  5530. static int X509PrintSignature_ex(WOLFSSL_BIO* bio, byte* sig,
  5531. int sigSz, int sigNid, int algOnly, int indent)
  5532. {
  5533. char scratch[MAX_WIDTH];
  5534. int scratchLen;
  5535. WOLFSSL_ASN1_OBJECT* obj = NULL;
  5536. int ret = WOLFSSL_SUCCESS;
  5537. char tmp[100];
  5538. int tmpLen = 0;
  5539. if (sigSz <= 0) {
  5540. return WOLFSSL_SUCCESS;
  5541. }
  5542. if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*s%s", indent, "",
  5543. "Signature Algorithm: ")) >= MAX_WIDTH) {
  5544. ret = WOLFSSL_FAILURE;
  5545. }
  5546. if (ret == WOLFSSL_SUCCESS) {
  5547. if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0)
  5548. ret = WOLFSSL_FAILURE;
  5549. }
  5550. if (ret == WOLFSSL_SUCCESS) {
  5551. obj = wolfSSL_OBJ_nid2obj(sigNid);
  5552. if (obj == NULL)
  5553. ret = WOLFSSL_FAILURE;
  5554. }
  5555. if (ret == WOLFSSL_SUCCESS) {
  5556. if (wolfSSL_OBJ_obj2txt(scratch, MAX_WIDTH, obj, 0)
  5557. == WOLFSSL_FAILURE)
  5558. {
  5559. ret = WOLFSSL_FAILURE;
  5560. }
  5561. }
  5562. if (ret == WOLFSSL_SUCCESS) {
  5563. if ((tmpLen = XSNPRINTF(tmp, sizeof(tmp),"%s\n", scratch))
  5564. >= (int)sizeof(tmp))
  5565. {
  5566. ret = WOLFSSL_FAILURE;
  5567. }
  5568. }
  5569. if (ret == WOLFSSL_SUCCESS) {
  5570. if (wolfSSL_BIO_write(bio, tmp, tmpLen) <= 0)
  5571. ret = WOLFSSL_FAILURE;
  5572. }
  5573. /* Leave function if the desired content to print
  5574. * is only the signature algorithm */
  5575. if (algOnly) {
  5576. if (obj != NULL)
  5577. wolfSSL_ASN1_OBJECT_free(obj);
  5578. return ret;
  5579. }
  5580. if (ret == WOLFSSL_SUCCESS) {
  5581. if ((tmpLen = XSNPRINTF(tmp, sizeof(tmp), "%*s", indent + 5, ""))
  5582. >= (int)sizeof(tmp))
  5583. {
  5584. ret = WOLFSSL_FAILURE;
  5585. }
  5586. }
  5587. if (ret == WOLFSSL_SUCCESS) {
  5588. int i;
  5589. for (i = 0; i < sigSz; i++) {
  5590. char val[6];
  5591. int valLen;
  5592. if (i == 0) {
  5593. if ((valLen = XSNPRINTF(val, sizeof(val), "%02x", sig[i]))
  5594. >= (int)sizeof(val))
  5595. {
  5596. ret = WOLFSSL_FAILURE;
  5597. break;
  5598. }
  5599. }
  5600. else if (((i % 18) == 0)) {
  5601. if (wolfSSL_BIO_write(bio, tmp, tmpLen)
  5602. <= 0) {
  5603. ret = WOLFSSL_FAILURE;
  5604. break;
  5605. }
  5606. if ((tmpLen = XSNPRINTF(tmp, sizeof(tmp), ":\n%*s",
  5607. indent + 5, ""))
  5608. >= (int)sizeof(tmp))
  5609. {
  5610. ret = WOLFSSL_FAILURE;
  5611. break;
  5612. }
  5613. if ((valLen = XSNPRINTF(val, sizeof(val), "%02x", sig[i]))
  5614. >= (int)sizeof(val))
  5615. {
  5616. ret = WOLFSSL_FAILURE;
  5617. break;
  5618. }
  5619. }
  5620. else {
  5621. if ((valLen = XSNPRINTF(val, sizeof(val), ":%02x", sig[i]))
  5622. >= (int)sizeof(val))
  5623. {
  5624. ret = WOLFSSL_FAILURE;
  5625. break;
  5626. }
  5627. }
  5628. if ((tmpLen < 0) || (valLen < 0) ||
  5629. (valLen >= ((int)sizeof(tmp) - tmpLen - 1))) {
  5630. ret = WOLFSSL_FAILURE;
  5631. break;
  5632. }
  5633. XMEMCPY(tmp + tmpLen, val, valLen);
  5634. tmpLen += valLen;
  5635. tmp[tmpLen] = 0;
  5636. }
  5637. }
  5638. /* print out remaining sig values */
  5639. if (ret == WOLFSSL_SUCCESS) {
  5640. if (tmpLen > 0) {
  5641. if (wolfSSL_BIO_write(bio, tmp, tmpLen)
  5642. <= 0)
  5643. {
  5644. ret = WOLFSSL_FAILURE;
  5645. }
  5646. }
  5647. }
  5648. if (obj != NULL)
  5649. wolfSSL_ASN1_OBJECT_free(obj);
  5650. return ret;
  5651. }
  5652. static int X509PrintSignature(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
  5653. int algOnly, int indent)
  5654. {
  5655. int sigSz = 0;
  5656. if (wolfSSL_X509_get_signature(x509, NULL, &sigSz) <= 0) {
  5657. return WOLFSSL_FAILURE;
  5658. }
  5659. if (sigSz > 0) {
  5660. unsigned char* sig;
  5661. int sigNid;
  5662. sigNid = wolfSSL_X509_get_signature_nid(x509);
  5663. if (sigNid <= 0) {
  5664. return WOLFSSL_FAILURE;
  5665. }
  5666. sig = (unsigned char*)XMALLOC(sigSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  5667. if (sig == NULL) {
  5668. return WOLFSSL_FAILURE;
  5669. }
  5670. if (wolfSSL_X509_get_signature(x509, sig, &sigSz) <= 0) {
  5671. XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  5672. return WOLFSSL_FAILURE;
  5673. }
  5674. if (X509PrintSignature_ex(bio, sig, sigSz, sigNid, algOnly, indent)
  5675. != WOLFSSL_SUCCESS) {
  5676. XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  5677. return WOLFSSL_FAILURE;
  5678. }
  5679. if (sig != NULL) {
  5680. XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  5681. }
  5682. }
  5683. return WOLFSSL_SUCCESS;
  5684. }
  5685. /* print out the public key in human readable format for use with
  5686. * wolfSSL_X509_print()
  5687. * return WOLFSSL_SUCCESS on success
  5688. */
  5689. static int X509PrintPubKey(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int indent)
  5690. {
  5691. char scratch[MAX_WIDTH];
  5692. WOLFSSL_EVP_PKEY* pubKey;
  5693. int len;
  5694. int ret = WOLFSSL_SUCCESS;
  5695. if (bio == NULL || x509 == NULL)
  5696. return BAD_FUNC_ARG;
  5697. len = XSNPRINTF(scratch, MAX_WIDTH, "%*sSubject Public Key Info:\n", indent, "");
  5698. if (len >= MAX_WIDTH)
  5699. return WOLFSSL_FAILURE;
  5700. if (wolfSSL_BIO_write(bio, scratch, len) <= 0)
  5701. return WOLFSSL_FAILURE;
  5702. switch (x509->pubKeyOID) {
  5703. #ifndef NO_RSA
  5704. case RSAk:
  5705. len = XSNPRINTF(scratch, MAX_WIDTH,
  5706. "%*sPublic Key Algorithm: rsaEncryption\n", indent + 4, "");
  5707. if (len >= MAX_WIDTH)
  5708. return WOLFSSL_FAILURE;
  5709. if (wolfSSL_BIO_write(bio, scratch, len) <= 0)
  5710. return WOLFSSL_FAILURE;
  5711. break;
  5712. #endif
  5713. #ifdef HAVE_ECC
  5714. case ECDSAk:
  5715. len = XSNPRINTF(scratch, MAX_WIDTH,
  5716. "%*sPublic Key Algorithm: EC\n", indent + 4, "");
  5717. if (len >= MAX_WIDTH)
  5718. return WOLFSSL_FAILURE;
  5719. if (wolfSSL_BIO_write(bio, scratch, len) <= 0)
  5720. return WOLFSSL_FAILURE;
  5721. break;
  5722. #endif
  5723. default:
  5724. WOLFSSL_MSG("Unknown key type");
  5725. return WOLFSSL_FAILURE;
  5726. }
  5727. pubKey = wolfSSL_X509_get_pubkey(x509);
  5728. if (pubKey == NULL)
  5729. return WOLFSSL_FAILURE;
  5730. ret = wolfSSL_EVP_PKEY_print_public(bio, pubKey, indent + 8, NULL);
  5731. wolfSSL_EVP_PKEY_free(pubKey);
  5732. return ret;
  5733. }
  5734. /* human readable print out of x509 name formatted for use with
  5735. * wolfSSL_X509_print()
  5736. * return WOLFSSL_SUCCESS on success
  5737. */
  5738. static int X509PrintName(WOLFSSL_BIO* bio, WOLFSSL_X509_NAME* name,
  5739. char* type, int indent)
  5740. {
  5741. if (name != NULL) {
  5742. char scratch[MAX_WIDTH];
  5743. int scratchLen;
  5744. if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH,
  5745. "%*s%s", indent, "", type))
  5746. >= MAX_WIDTH)
  5747. {
  5748. return WOLFSSL_FAILURE;
  5749. }
  5750. if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
  5751. return WOLFSSL_FAILURE;
  5752. }
  5753. if (wolfSSL_X509_NAME_print_ex(bio, name, 1, 0) <= 0) {
  5754. return WOLFSSL_FAILURE;
  5755. }
  5756. if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
  5757. return WOLFSSL_FAILURE;
  5758. }
  5759. }
  5760. return WOLFSSL_SUCCESS;
  5761. }
  5762. /* human readable print out of x509 version
  5763. * return WOLFSSL_SUCCESS on success
  5764. */
  5765. static int X509PrintVersion(WOLFSSL_BIO* bio, int version, int indent)
  5766. {
  5767. char scratch[MAX_WIDTH];
  5768. int scratchLen;
  5769. if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH,
  5770. "%*s%s", indent, "", "Version:"))
  5771. >= MAX_WIDTH)
  5772. {
  5773. return WOLFSSL_FAILURE;
  5774. }
  5775. if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
  5776. return WOLFSSL_FAILURE;
  5777. }
  5778. if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH,
  5779. " %d (0x%x)\n", version, (byte)version-1))
  5780. >= MAX_WIDTH)
  5781. {
  5782. return WOLFSSL_FAILURE;
  5783. }
  5784. if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
  5785. return WOLFSSL_FAILURE;
  5786. }
  5787. return WOLFSSL_SUCCESS;
  5788. }
  5789. #ifdef WOLFSSL_CERT_REQ
  5790. /* Print out of REQ attributes
  5791. * return WOLFSSL_SUCCESS on success
  5792. */
  5793. static int X509PrintReqAttributes(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
  5794. int indent)
  5795. {
  5796. WOLFSSL_X509_ATTRIBUTE* attr;
  5797. char scratch[MAX_WIDTH];
  5798. int scratchLen;
  5799. int i = 0;
  5800. if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH,
  5801. "%*s%s", indent, "", "Attributes: \n"))
  5802. >= MAX_WIDTH)
  5803. {
  5804. return WOLFSSL_FAILURE;
  5805. }
  5806. if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
  5807. return WOLFSSL_FAILURE;
  5808. }
  5809. do {
  5810. attr = wolfSSL_X509_REQ_get_attr(x509, i);
  5811. if (attr != NULL) {
  5812. char lName[NAME_SZ/4]; /* NAME_SZ default is 80 */
  5813. int lNameSz = NAME_SZ/4;
  5814. const byte* data;
  5815. if (wolfSSL_OBJ_obj2txt(lName, lNameSz, attr->object, 0)
  5816. == WOLFSSL_FAILURE)
  5817. {
  5818. return WOLFSSL_FAILURE;
  5819. }
  5820. lNameSz = (int)XSTRLEN(lName);
  5821. data = wolfSSL_ASN1_STRING_get0_data(
  5822. attr->value->value.asn1_string);
  5823. if (data == NULL) {
  5824. WOLFSSL_MSG("No REQ attribute found when expected");
  5825. return WOLFSSL_FAILURE;
  5826. }
  5827. if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH,
  5828. "%*s%s%*s:%s\n", indent+4, "",
  5829. lName, (NAME_SZ/4)-lNameSz, "", data))
  5830. >= MAX_WIDTH)
  5831. {
  5832. return WOLFSSL_FAILURE;
  5833. }
  5834. if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
  5835. WOLFSSL_MSG("Error writing REQ attribute");
  5836. return WOLFSSL_FAILURE;
  5837. }
  5838. }
  5839. i++;
  5840. } while (attr != NULL);
  5841. return WOLFSSL_SUCCESS;
  5842. }
  5843. /*
  5844. * return WOLFSSL_SUCCESS on success
  5845. */
  5846. int wolfSSL_X509_REQ_print(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
  5847. {
  5848. char subjType[] = "Subject: ";
  5849. if (bio == NULL || x509 == NULL) {
  5850. return WOLFSSL_FAILURE;
  5851. }
  5852. if (wolfSSL_BIO_write(bio, "Certificate Request:\n",
  5853. (int)XSTRLEN("Certificate Request:\n")) <= 0) {
  5854. return WOLFSSL_FAILURE;
  5855. }
  5856. if (wolfSSL_BIO_write(bio, " Data:\n",
  5857. (int)XSTRLEN(" Data:\n")) <= 0) {
  5858. return WOLFSSL_FAILURE;
  5859. }
  5860. /* print version of cert */
  5861. if (X509PrintVersion(bio, wolfSSL_X509_version(x509), 8)
  5862. != WOLFSSL_SUCCESS) {
  5863. return WOLFSSL_FAILURE;
  5864. }
  5865. if (X509PrintSerial(bio, x509, 8) != WOLFSSL_SUCCESS) {
  5866. return WOLFSSL_FAILURE;
  5867. }
  5868. /* print subject */
  5869. if (X509PrintName(bio, wolfSSL_X509_get_subject_name(x509), subjType, 8)
  5870. != WOLFSSL_SUCCESS) {
  5871. return WOLFSSL_FAILURE;
  5872. }
  5873. /* get and print public key */
  5874. if (X509PrintPubKey(bio, x509, 8) != WOLFSSL_SUCCESS) {
  5875. return WOLFSSL_FAILURE;
  5876. }
  5877. /* print out extensions */
  5878. if (X509PrintExtensions(bio, x509, 4) != WOLFSSL_SUCCESS) {
  5879. return WOLFSSL_FAILURE;
  5880. }
  5881. /* print out req attributes */
  5882. if (X509PrintReqAttributes(bio, x509, 4) != WOLFSSL_SUCCESS) {
  5883. return WOLFSSL_FAILURE;
  5884. }
  5885. /* print out signature */
  5886. if (X509PrintSignature(bio, x509, 0, 4) != WOLFSSL_SUCCESS) {
  5887. return WOLFSSL_FAILURE;
  5888. }
  5889. /* done with print out */
  5890. if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
  5891. return WOLFSSL_FAILURE;
  5892. }
  5893. return WOLFSSL_SUCCESS;
  5894. }
  5895. #endif /* WOLFSSL_CERT_REQ */
  5896. /* Writes the human readable form of x509 to bio.
  5897. *
  5898. * bio WOLFSSL_BIO to write to.
  5899. * x509 Certificate to write.
  5900. *
  5901. * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on failure
  5902. */
  5903. int wolfSSL_X509_print_ex(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
  5904. unsigned long nmflags, unsigned long cflag)
  5905. {
  5906. char issuType[] = "Issuer:";
  5907. char subjType[] = "Subject:";
  5908. WOLFSSL_ENTER("wolfSSL_X509_print_ex");
  5909. /* flags currently not supported */
  5910. (void)nmflags;
  5911. (void)cflag;
  5912. if (bio == NULL || x509 == NULL) {
  5913. return WOLFSSL_FAILURE;
  5914. }
  5915. if (wolfSSL_BIO_write(bio, "Certificate:\n",
  5916. (int)XSTRLEN("Certificate:\n")) <= 0) {
  5917. return WOLFSSL_FAILURE;
  5918. }
  5919. if (wolfSSL_BIO_write(bio, " Data:\n",
  5920. (int)XSTRLEN(" Data:\n")) <= 0) {
  5921. return WOLFSSL_FAILURE;
  5922. }
  5923. /* print version of cert */
  5924. if (X509PrintVersion(bio, wolfSSL_X509_version(x509), 8)
  5925. != WOLFSSL_SUCCESS) {
  5926. return WOLFSSL_FAILURE;
  5927. }
  5928. /* print serial number out */
  5929. if (X509PrintSerial(bio, x509, 8) != WOLFSSL_SUCCESS) {
  5930. return WOLFSSL_FAILURE;
  5931. }
  5932. /* print out signature algo*/
  5933. if (X509PrintSignature(bio, x509, 1, 8) != WOLFSSL_SUCCESS) {
  5934. return WOLFSSL_FAILURE;
  5935. }
  5936. /* print issuer */
  5937. if (X509PrintName(bio, wolfSSL_X509_get_issuer_name(x509), issuType, 8)
  5938. != WOLFSSL_SUCCESS) {
  5939. return WOLFSSL_FAILURE;
  5940. }
  5941. #ifndef NO_ASN_TIME
  5942. /* print validity */
  5943. {
  5944. char tmp[80];
  5945. if (wolfSSL_BIO_write(bio, " Validity\n",
  5946. (int)XSTRLEN(" Validity\n")) <= 0) {
  5947. return WOLFSSL_FAILURE;
  5948. }
  5949. if (wolfSSL_BIO_write(bio, " Not Before: ",
  5950. (int)XSTRLEN(" Not Before: ")) <= 0) {
  5951. return WOLFSSL_FAILURE;
  5952. }
  5953. if (x509->notBefore.length > 0) {
  5954. if (GetTimeString(x509->notBefore.data, ASN_UTC_TIME,
  5955. tmp, sizeof(tmp)) != WOLFSSL_SUCCESS) {
  5956. if (GetTimeString(x509->notBefore.data, ASN_GENERALIZED_TIME,
  5957. tmp, sizeof(tmp)) != WOLFSSL_SUCCESS) {
  5958. WOLFSSL_MSG("Error getting not before date");
  5959. return WOLFSSL_FAILURE;
  5960. }
  5961. }
  5962. }
  5963. else {
  5964. XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
  5965. }
  5966. tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
  5967. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  5968. return WOLFSSL_FAILURE;
  5969. }
  5970. if (wolfSSL_BIO_write(bio, "\n Not After : ",
  5971. (int)XSTRLEN("\n Not After : ")) <= 0) {
  5972. return WOLFSSL_FAILURE;
  5973. }
  5974. if (x509->notAfter.length > 0) {
  5975. if (GetTimeString(x509->notAfter.data, ASN_UTC_TIME,
  5976. tmp, sizeof(tmp)) != WOLFSSL_SUCCESS) {
  5977. if (GetTimeString(x509->notAfter.data, ASN_GENERALIZED_TIME,
  5978. tmp, sizeof(tmp)) != WOLFSSL_SUCCESS) {
  5979. WOLFSSL_MSG("Error getting not after date");
  5980. return WOLFSSL_FAILURE;
  5981. }
  5982. }
  5983. }
  5984. else {
  5985. XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
  5986. }
  5987. tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
  5988. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  5989. return WOLFSSL_FAILURE;
  5990. }
  5991. if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
  5992. return WOLFSSL_FAILURE;
  5993. }
  5994. }
  5995. #endif
  5996. /* print subject */
  5997. if (X509PrintName(bio, wolfSSL_X509_get_subject_name(x509), subjType, 8)
  5998. != WOLFSSL_SUCCESS) {
  5999. return WOLFSSL_FAILURE;
  6000. }
  6001. /* get and print public key */
  6002. if (X509PrintPubKey(bio, x509, 8) != WOLFSSL_SUCCESS) {
  6003. return WOLFSSL_FAILURE;
  6004. }
  6005. /* print out extensions */
  6006. if (X509PrintExtensions(bio, x509, 8) != WOLFSSL_SUCCESS) {
  6007. return WOLFSSL_FAILURE;
  6008. }
  6009. /* print out signature */
  6010. if (X509PrintSignature(bio, x509, 0, 4) != WOLFSSL_SUCCESS) {
  6011. return WOLFSSL_FAILURE;
  6012. }
  6013. /* done with print out */
  6014. if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
  6015. return WOLFSSL_FAILURE;
  6016. }
  6017. return WOLFSSL_SUCCESS;
  6018. }
  6019. int wolfSSL_X509_print(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
  6020. {
  6021. return wolfSSL_X509_print_ex(bio, x509, 0, 0);
  6022. }
  6023. #ifndef NO_FILESYSTEM
  6024. int wolfSSL_X509_print_fp(XFILE fp, WOLFSSL_X509 *x509)
  6025. {
  6026. WOLFSSL_BIO* bio;
  6027. int ret;
  6028. WOLFSSL_ENTER("wolfSSL_X509_print_fp");
  6029. if (!fp || !x509) {
  6030. WOLFSSL_MSG("Bad parameter");
  6031. return WOLFSSL_FAILURE;
  6032. }
  6033. if (!(bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file()))) {
  6034. WOLFSSL_MSG("wolfSSL_BIO_new wolfSSL_BIO_s_file error");
  6035. return WOLFSSL_FAILURE;
  6036. }
  6037. if (wolfSSL_BIO_set_fp(bio, fp, BIO_NOCLOSE) != WOLFSSL_SUCCESS) {
  6038. WOLFSSL_MSG("wolfSSL_BIO_set_fp error");
  6039. wolfSSL_BIO_free(bio);
  6040. return WOLFSSL_FAILURE;
  6041. }
  6042. ret = wolfSSL_X509_print(bio, x509);
  6043. wolfSSL_BIO_free(bio);
  6044. return ret;
  6045. }
  6046. #endif /* NO_FILESYSTEM */
  6047. #endif /* XSNPRINTF */
  6048. int wolfSSL_X509_signature_print(WOLFSSL_BIO *bp,
  6049. const WOLFSSL_X509_ALGOR *sigalg, const WOLFSSL_ASN1_STRING *sig)
  6050. {
  6051. int length = 0;
  6052. word32 idx = 0;
  6053. int i;
  6054. (void)sig;
  6055. WOLFSSL_ENTER("wolfSSL_X509_signature_print");
  6056. if (!bp || !sigalg) {
  6057. WOLFSSL_MSG("Bad parameter");
  6058. return WOLFSSL_FAILURE;
  6059. }
  6060. if ((sigalg->algorithm->obj == NULL) ||
  6061. (sigalg->algorithm->obj[idx] != ASN_OBJECT_ID)) {
  6062. WOLFSSL_MSG("Bad ASN1 Object");
  6063. return WOLFSSL_FAILURE;
  6064. }
  6065. idx++; /* skip object id */
  6066. if (GetLength((const byte*)sigalg->algorithm->obj, &idx, &length,
  6067. sigalg->algorithm->objSz) < 0 || length < 0) {
  6068. return WOLFSSL_FAILURE;
  6069. }
  6070. if (wolfSSL_BIO_puts(bp, " Raw Signature Algorithm:") <= 0) {
  6071. WOLFSSL_MSG("wolfSSL_BIO_puts error");
  6072. return WOLFSSL_FAILURE;
  6073. }
  6074. for (i = 0; i < length; ++i) {
  6075. char hex_digits[4];
  6076. #ifdef XSNPRINTF
  6077. if (XSNPRINTF(hex_digits, sizeof(hex_digits), "%c%02X", i>0 ? ':' : ' ',
  6078. (unsigned int)sigalg->algorithm->obj[idx+i])
  6079. >= (int)sizeof(hex_digits))
  6080. {
  6081. WOLFSSL_MSG("buffer overrun");
  6082. return WOLFSSL_FAILURE;
  6083. }
  6084. #else
  6085. XSPRINTF(hex_digits, "%c%02X", i>0 ? ':' : ' ',
  6086. (unsigned int)sigalg->algorithm->obj[idx+i]);
  6087. #endif
  6088. if (wolfSSL_BIO_puts(bp, hex_digits) <= 0)
  6089. return WOLFSSL_FAILURE;
  6090. }
  6091. if (wolfSSL_BIO_puts(bp, "\n") <= 0)
  6092. return WOLFSSL_FAILURE;
  6093. return WOLFSSL_SUCCESS;
  6094. }
  6095. #endif /* !NO_BIO */
  6096. #ifndef NO_WOLFSSL_STUB
  6097. void wolfSSL_X509_get0_signature(const WOLFSSL_ASN1_BIT_STRING **psig,
  6098. const WOLFSSL_X509_ALGOR **palg, const WOLFSSL_X509 *x509)
  6099. {
  6100. (void)psig;
  6101. (void)palg;
  6102. (void)x509;
  6103. WOLFSSL_STUB("wolfSSL_X509_get0_signature");
  6104. }
  6105. #endif
  6106. #endif /* OPENSSL_EXTRA */
  6107. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  6108. const char* wolfSSL_X509_verify_cert_error_string(long err)
  6109. {
  6110. return wolfSSL_ERR_reason_error_string(err);
  6111. }
  6112. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  6113. #ifdef OPENSSL_EXTRA
  6114. /* Add directory path that will be used for loading certs and CRLs
  6115. * which have the <hash>.rn name format.
  6116. * type may be WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1.
  6117. * returns WOLFSSL_SUCCESS on successful, otherwise negative or zero. */
  6118. int wolfSSL_X509_LOOKUP_add_dir(WOLFSSL_X509_LOOKUP* lookup, const char* dir,
  6119. long type)
  6120. {
  6121. return wolfSSL_X509_LOOKUP_ctrl(lookup, WOLFSSL_X509_L_ADD_DIR, dir, type,
  6122. NULL);
  6123. }
  6124. int wolfSSL_X509_LOOKUP_load_file(WOLFSSL_X509_LOOKUP* lookup,
  6125. const char* file, long type)
  6126. {
  6127. #if !defined(NO_FILESYSTEM) && \
  6128. (defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM))
  6129. int ret = WOLFSSL_FAILURE;
  6130. XFILE fp;
  6131. long sz;
  6132. byte* pem = NULL;
  6133. byte* curr = NULL;
  6134. byte* prev = NULL;
  6135. WOLFSSL_X509* x509;
  6136. const char* header = NULL;
  6137. const char* footer = NULL;
  6138. if (type != WOLFSSL_FILETYPE_PEM)
  6139. return WS_RETURN_CODE(BAD_FUNC_ARG, (int)WOLFSSL_FAILURE);
  6140. fp = XFOPEN(file, "rb");
  6141. if (fp == XBADFILE)
  6142. return WS_RETURN_CODE(BAD_FUNC_ARG, (int)WOLFSSL_FAILURE);
  6143. if(XFSEEK(fp, 0, XSEEK_END) != 0) {
  6144. XFCLOSE(fp);
  6145. return WS_RETURN_CODE(WOLFSSL_BAD_FILE,WOLFSSL_FAILURE);
  6146. }
  6147. sz = XFTELL(fp);
  6148. if(XFSEEK(fp, 0, XSEEK_SET) != 0) {
  6149. XFCLOSE(fp);
  6150. return WS_RETURN_CODE(WOLFSSL_BAD_FILE,WOLFSSL_FAILURE);
  6151. }
  6152. if (sz > MAX_WOLFSSL_FILE_SIZE || sz <= 0) {
  6153. WOLFSSL_MSG("X509_LOOKUP_load_file size error");
  6154. goto end;
  6155. }
  6156. pem = (byte*)XMALLOC(sz, 0, DYNAMIC_TYPE_PEM);
  6157. if (pem == NULL) {
  6158. ret = MEMORY_ERROR;
  6159. goto end;
  6160. }
  6161. /* Read in file which may be CRLs or certificates. */
  6162. if (XFREAD(pem, (size_t)sz, 1, fp) != 1)
  6163. goto end;
  6164. prev = curr = pem;
  6165. do {
  6166. /* get PEM header and footer based on type */
  6167. if (wc_PemGetHeaderFooter(CRL_TYPE, &header, &footer) == 0 &&
  6168. XSTRNSTR((char*)curr, header, (unsigned int)sz) != NULL) {
  6169. #ifdef HAVE_CRL
  6170. WOLFSSL_CERT_MANAGER* cm = lookup->store->cm;
  6171. if (cm->crl == NULL) {
  6172. if (wolfSSL_CertManagerEnableCRL(cm, WOLFSSL_CRL_CHECK)
  6173. != WOLFSSL_SUCCESS) {
  6174. WOLFSSL_MSG("Enable CRL failed");
  6175. goto end;
  6176. }
  6177. }
  6178. ret = BufferLoadCRL(cm->crl, curr, sz, WOLFSSL_FILETYPE_PEM,
  6179. NO_VERIFY);
  6180. if (ret != WOLFSSL_SUCCESS)
  6181. goto end;
  6182. #endif
  6183. curr = (byte*)XSTRNSTR((char*)curr, footer, (unsigned int)sz);
  6184. }
  6185. else if (wc_PemGetHeaderFooter(CERT_TYPE, &header, &footer) == 0 &&
  6186. XSTRNSTR((char*)curr, header, (unsigned int)sz) != NULL) {
  6187. x509 = wolfSSL_X509_load_certificate_buffer(curr, (int)sz,
  6188. WOLFSSL_FILETYPE_PEM);
  6189. if (x509 == NULL)
  6190. goto end;
  6191. ret = wolfSSL_X509_STORE_add_cert(lookup->store, x509);
  6192. wolfSSL_X509_free(x509);
  6193. if (ret != WOLFSSL_SUCCESS)
  6194. goto end;
  6195. curr = (byte*)XSTRNSTR((char*)curr, footer, (unsigned int)sz);
  6196. }
  6197. else
  6198. goto end;
  6199. if (curr == NULL)
  6200. goto end;
  6201. curr++;
  6202. sz -= (long)(curr - prev);
  6203. prev = curr;
  6204. }
  6205. while (ret == WOLFSSL_SUCCESS);
  6206. end:
  6207. if (pem != NULL)
  6208. XFREE(pem, 0, DYNAMIC_TYPE_PEM);
  6209. XFCLOSE(fp);
  6210. return WS_RETURN_CODE(ret, (int)WOLFSSL_FAILURE);
  6211. #else
  6212. (void)lookup;
  6213. (void)file;
  6214. (void)type;
  6215. return WS_RETURN_CODE(WOLFSSL_FAILURE,WOLFSSL_FAILURE);
  6216. #endif
  6217. }
  6218. WOLFSSL_X509_LOOKUP_METHOD* wolfSSL_X509_LOOKUP_hash_dir(void)
  6219. {
  6220. /* Method implementation in functions. */
  6221. static WOLFSSL_X509_LOOKUP_METHOD meth = { 1 };
  6222. return &meth;
  6223. }
  6224. WOLFSSL_X509_LOOKUP_METHOD* wolfSSL_X509_LOOKUP_file(void)
  6225. {
  6226. /* Method implementation in functions. */
  6227. static WOLFSSL_X509_LOOKUP_METHOD meth = { 0 };
  6228. return &meth;
  6229. }
  6230. /* set directory path to load certificate or CRL which have the hash.N form */
  6231. /* for late use */
  6232. /* @param ctx a pointer to WOLFSSL_BY_DIR structure */
  6233. /* @param argc directory path */
  6234. /* @param argl file type, either WOLFSSL_FILETYPE_PEM or */
  6235. /* WOLFSSL_FILETYPE_ASN1 */
  6236. /* @return WOLFSSL_SUCCESS on successful, otherwise negative or zero */
  6237. static int x509AddCertDir(WOLFSSL_BY_DIR *ctx, const char *argc, long argl)
  6238. {
  6239. #if defined(OPENSSL_ALL) && !defined(NO_FILESYSTEM) && !defined(NO_WOLFSSL_DIR)
  6240. WOLFSSL_BY_DIR_entry *entry;
  6241. size_t pathLen;
  6242. int i, num;
  6243. const char* c;
  6244. #ifdef WOLFSSL_SMALL_STACK
  6245. char *buf;
  6246. #else
  6247. char buf[MAX_FILENAME_SZ];
  6248. #endif
  6249. WOLFSSL_ENTER("x509AddCertDir");
  6250. pathLen = 0;
  6251. c = argc;
  6252. /* sanity check, zero length */
  6253. if (ctx == NULL || c == NULL || *c == '\0')
  6254. return WOLFSSL_FAILURE;
  6255. #ifdef WOLFSSL_SMALL_STACK
  6256. buf = (char*)XMALLOC(MAX_FILENAME_SZ, NULL, DYNAMIC_TYPE_OPENSSL);
  6257. if (buf == NULL) {
  6258. WOLFSSL_LEAVE("x509AddCertDir", MEMORY_E);
  6259. return MEMORY_E;
  6260. }
  6261. #endif
  6262. XMEMSET(buf, 0, MAX_FILENAME_SZ);
  6263. do {
  6264. if (*c == SEPARATOR_CHAR || *c == '\0') {
  6265. num = wolfSSL_sk_BY_DIR_entry_num(ctx->dir_entry);
  6266. for (i=0; i<num; i++) {
  6267. entry = wolfSSL_sk_BY_DIR_entry_value(ctx->dir_entry, i);
  6268. if (XSTRLEN(entry->dir_name) == pathLen &&
  6269. XSTRNCMP(entry->dir_name, buf, pathLen) == 0) {
  6270. WOLFSSL_MSG("dir entry found");
  6271. break;
  6272. }
  6273. }
  6274. if (num == -1 || i == num) {
  6275. WOLFSSL_MSG("no entry found");
  6276. if (ctx->dir_entry == NULL) {
  6277. ctx->dir_entry = wolfSSL_sk_BY_DIR_entry_new_null();
  6278. if (ctx->dir_entry == NULL) {
  6279. WOLFSSL_MSG("failed to allocate dir_entry");
  6280. #ifdef WOLFSSL_SMALL_STACK
  6281. XFREE(buf, 0, DYNAMIC_TYPE_OPENSSL);
  6282. #endif
  6283. return 0;
  6284. }
  6285. }
  6286. entry = wolfSSL_BY_DIR_entry_new();
  6287. if (entry == NULL) {
  6288. WOLFSSL_MSG("failed to allocate dir entry");
  6289. #ifdef WOLFSSL_SMALL_STACK
  6290. XFREE(buf, 0, DYNAMIC_TYPE_OPENSSL);
  6291. #endif
  6292. return 0;
  6293. }
  6294. entry->dir_type = (int)argl;
  6295. entry->dir_name = (char*)XMALLOC(pathLen + 1/* \0 termination*/
  6296. , NULL, DYNAMIC_TYPE_OPENSSL);
  6297. entry->hashes = wolfSSL_sk_BY_DIR_HASH_new_null();
  6298. if (entry->dir_name == NULL || entry->hashes == NULL) {
  6299. WOLFSSL_MSG("failed to allocate dir name");
  6300. wolfSSL_BY_DIR_entry_free(entry);
  6301. #ifdef WOLFSSL_SMALL_STACK
  6302. XFREE(buf, 0, DYNAMIC_TYPE_OPENSSL);
  6303. #endif
  6304. return 0;
  6305. }
  6306. XSTRNCPY(entry->dir_name, buf, pathLen);
  6307. entry->dir_name[pathLen] = '\0';
  6308. if (wolfSSL_sk_BY_DIR_entry_push(ctx->dir_entry, entry)
  6309. != WOLFSSL_SUCCESS) {
  6310. wolfSSL_BY_DIR_entry_free(entry);
  6311. #ifdef WOLFSSL_SMALL_STACK
  6312. XFREE(buf, 0, DYNAMIC_TYPE_OPENSSL);
  6313. #endif
  6314. return 0;
  6315. }
  6316. }
  6317. /* skip separator */
  6318. if (*c == SEPARATOR_CHAR) c++;
  6319. pathLen = 0;
  6320. XMEMSET(buf, 0, MAX_FILENAME_SZ);
  6321. }
  6322. buf[pathLen++] = *c;
  6323. } while(*c++ != '\0');
  6324. #ifdef WOLFSSL_SMALL_STACK
  6325. XFREE(buf, 0, DYNAMIC_TYPE_OPENSSL);
  6326. #endif
  6327. return WOLFSSL_SUCCESS;
  6328. #else
  6329. (void)ctx;
  6330. (void)argc;
  6331. (void)argl;
  6332. return WOLFSSL_NOT_IMPLEMENTED;
  6333. #endif
  6334. }
  6335. /* set additional data to X509_LOOKUP */
  6336. /* @param ctx a pointer to X509_LOOKUP structure */
  6337. /* @param cmd control command : */
  6338. /* X509_L_FILE_LOAD, X509_L_ADD_DIR X509_L_ADD_STORE or */
  6339. /* X509_L_LOAD_STORE */
  6340. /* @param argc arguments for the control command */
  6341. /* @param argl arguments for the control command */
  6342. /* @param **ret return value of the control command */
  6343. /* @return WOLFSSL_SUCCESS on successful, otherwise WOLFSSL_FAILURE */
  6344. /* note: WOLFSSL_X509_L_ADD_STORE and WOLFSSL_X509_L_LOAD_STORE have not*/
  6345. /* yet implemented. It returns WOLFSSL_NOT_IMPLEMENTED */
  6346. /* when those control commands are passed. */
  6347. int wolfSSL_X509_LOOKUP_ctrl(WOLFSSL_X509_LOOKUP *ctx, int cmd,
  6348. const char *argc, long argl, char **ret)
  6349. {
  6350. int lret = WOLFSSL_FAILURE;
  6351. WOLFSSL_ENTER("wolfSSL_X509_LOOKUP_ctrl");
  6352. #if !defined(NO_FILESYSTEM)
  6353. if (ctx != NULL) {
  6354. switch (cmd) {
  6355. case WOLFSSL_X509_L_FILE_LOAD:
  6356. /* expects to return a number of processed cert or crl file */
  6357. lret = wolfSSL_X509_load_cert_crl_file(ctx, argc, (int)argl) > 0 ?
  6358. WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  6359. break;
  6360. case WOLFSSL_X509_L_ADD_DIR:
  6361. /* store directory location to use it later */
  6362. #if !defined(NO_WOLFSSL_DIR)
  6363. lret = x509AddCertDir(ctx->dirs, argc, argl);
  6364. #else
  6365. (void)x509AddCertDir;
  6366. lret = WOLFSSL_NOT_IMPLEMENTED;
  6367. #endif
  6368. break;
  6369. case WOLFSSL_X509_L_ADD_STORE:
  6370. case WOLFSSL_X509_L_LOAD_STORE:
  6371. return WOLFSSL_NOT_IMPLEMENTED;
  6372. default:
  6373. break;
  6374. }
  6375. }
  6376. (void)ret;
  6377. #else
  6378. (void)ctx;
  6379. (void)argc;
  6380. (void)argl;
  6381. (void)ret;
  6382. (void)cmd;
  6383. (void)x509AddCertDir;
  6384. lret = WOLFSSL_NOT_IMPLEMENTED;
  6385. #endif
  6386. return lret;
  6387. }
  6388. #if defined(WOLFSSL_CERT_GEN)
  6389. static int wolfssl_x509_make_der(WOLFSSL_X509* x509, int req,
  6390. unsigned char* der, int* derSz, int includeSig);
  6391. #endif
  6392. #ifdef WOLFSSL_CERT_GEN
  6393. #ifndef NO_BIO
  6394. /* Converts the X509 to DER format and outputs it into bio.
  6395. *
  6396. * bio is the structure to hold output DER
  6397. * x509 certificate to create DER from
  6398. * req if set then a CSR is generated
  6399. *
  6400. * returns WOLFSSL_SUCCESS on success
  6401. */
  6402. static int loadX509orX509REQFromBio(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int req)
  6403. {
  6404. int ret = WOLFSSL_FAILURE;
  6405. /* Get large buffer to hold cert der */
  6406. int derSz = X509_BUFFER_SZ;
  6407. #ifdef WOLFSSL_SMALL_STACK
  6408. byte* der;
  6409. #else
  6410. byte der[X509_BUFFER_SZ];
  6411. #endif
  6412. WOLFSSL_ENTER("wolfSSL_i2d_X509_bio");
  6413. if (bio == NULL || x509 == NULL) {
  6414. return WOLFSSL_FAILURE;
  6415. }
  6416. #ifdef WOLFSSL_SMALL_STACK
  6417. der = (byte*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  6418. if (!der) {
  6419. WOLFSSL_MSG("malloc failed");
  6420. return WOLFSSL_FAILURE;
  6421. }
  6422. #endif
  6423. if (wolfssl_x509_make_der(x509, req, der, &derSz, 1) != WOLFSSL_SUCCESS) {
  6424. goto cleanup;
  6425. }
  6426. if (wolfSSL_BIO_write(bio, der, derSz) != derSz) {
  6427. goto cleanup;
  6428. }
  6429. ret = WOLFSSL_SUCCESS;
  6430. cleanup:
  6431. #ifdef WOLFSSL_SMALL_STACK
  6432. XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  6433. #endif
  6434. return ret;
  6435. }
  6436. /* Converts the X509 to DER format and outputs it into bio.
  6437. *
  6438. * bio is the structure to hold output DER
  6439. * x509 certificate to create DER from
  6440. *
  6441. * returns WOLFSSL_SUCCESS on success
  6442. */
  6443. int wolfSSL_i2d_X509_bio(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
  6444. {
  6445. return loadX509orX509REQFromBio(bio, x509, 0);
  6446. }
  6447. #ifdef WOLFSSL_CERT_REQ
  6448. int wolfSSL_i2d_X509_REQ_bio(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
  6449. {
  6450. return loadX509orX509REQFromBio(bio, x509, 1);
  6451. }
  6452. #endif /* WOLFSSL_CERT_REQ */
  6453. #endif /* !NO_BIO */
  6454. #endif /* WOLFSSL_CERT_GEN */
  6455. /* Converts an internal structure to a DER buffer
  6456. *
  6457. * x509 structure to get DER buffer from
  6458. * out buffer to hold result. If NULL then *out is NULL then a new buffer is
  6459. * created.
  6460. *
  6461. * returns the size of the DER result on success
  6462. */
  6463. int wolfSSL_i2d_X509(WOLFSSL_X509* x509, unsigned char** out)
  6464. {
  6465. const unsigned char* der;
  6466. int derSz = 0;
  6467. int advance = 1;
  6468. WOLFSSL_ENTER("wolfSSL_i2d_X509");
  6469. if (x509 == NULL) {
  6470. WOLFSSL_LEAVE("wolfSSL_i2d_X509", BAD_FUNC_ARG);
  6471. return BAD_FUNC_ARG;
  6472. }
  6473. der = wolfSSL_X509_get_der(x509, &derSz);
  6474. if (der == NULL) {
  6475. WOLFSSL_LEAVE("wolfSSL_i2d_X509", MEMORY_E);
  6476. return MEMORY_E;
  6477. }
  6478. if (out != NULL && *out == NULL) {
  6479. *out = (unsigned char*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_OPENSSL);
  6480. if (*out == NULL) {
  6481. WOLFSSL_LEAVE("wolfSSL_i2d_X509", MEMORY_E);
  6482. return MEMORY_E;
  6483. }
  6484. advance = 0;
  6485. }
  6486. if (out != NULL) {
  6487. XMEMCPY(*out, der, derSz);
  6488. if (advance)
  6489. *out += derSz;
  6490. }
  6491. WOLFSSL_LEAVE("wolfSSL_i2d_X509", derSz);
  6492. return derSz;
  6493. }
  6494. #ifndef NO_BIO
  6495. /**
  6496. * Converts the DER from bio and creates a WOLFSSL_X509 structure from it.
  6497. * @param bio is the structure holding DER
  6498. * @param x509 certificate to create from DER. Can be NULL
  6499. * @param req 1 for a CSR and 0 for a x509 cert
  6500. * @return pointer to WOLFSSL_X509 structure on success and NULL on fail
  6501. */
  6502. static WOLFSSL_X509* d2i_X509orX509REQ_bio(WOLFSSL_BIO* bio,
  6503. WOLFSSL_X509** x509, int req)
  6504. {
  6505. WOLFSSL_X509* localX509 = NULL;
  6506. byte* mem = NULL;
  6507. int size;
  6508. WOLFSSL_ENTER("wolfSSL_d2i_X509_bio");
  6509. if (bio == NULL) {
  6510. WOLFSSL_MSG("Bad Function Argument bio is NULL");
  6511. return NULL;
  6512. }
  6513. size = wolfSSL_BIO_get_len(bio);
  6514. if (size <= 0) {
  6515. WOLFSSL_MSG("wolfSSL_BIO_get_len error. Possibly no pending data.");
  6516. WOLFSSL_ERROR(ASN1_R_HEADER_TOO_LONG);
  6517. return NULL;
  6518. }
  6519. if (!(mem = (byte*)XMALLOC(size, NULL, DYNAMIC_TYPE_OPENSSL))) {
  6520. WOLFSSL_MSG("malloc error");
  6521. return NULL;
  6522. }
  6523. if ((size = wolfSSL_BIO_read(bio, mem, size)) == 0) {
  6524. WOLFSSL_MSG("wolfSSL_BIO_read error");
  6525. XFREE(mem, NULL, DYNAMIC_TYPE_OPENSSL);
  6526. return NULL;
  6527. }
  6528. if (req) {
  6529. #ifdef WOLFSSL_CERT_REQ
  6530. localX509 = wolfSSL_X509_REQ_d2i(NULL, mem, size);
  6531. #else
  6532. WOLFSSL_MSG("CSR not compiled in");
  6533. #endif
  6534. }
  6535. else {
  6536. localX509 = wolfSSL_X509_d2i(NULL, mem, size);
  6537. }
  6538. if (localX509 == NULL) {
  6539. WOLFSSL_MSG("wolfSSL_X509_d2i error");
  6540. XFREE(mem, NULL, DYNAMIC_TYPE_OPENSSL);
  6541. return NULL;
  6542. }
  6543. if (x509 != NULL) {
  6544. *x509 = localX509;
  6545. }
  6546. XFREE(mem, NULL, DYNAMIC_TYPE_OPENSSL);
  6547. return localX509;
  6548. }
  6549. WOLFSSL_X509* wolfSSL_d2i_X509_bio(WOLFSSL_BIO* bio, WOLFSSL_X509** x509)
  6550. {
  6551. return d2i_X509orX509REQ_bio(bio, x509, 0);
  6552. }
  6553. #ifdef WOLFSSL_CERT_REQ
  6554. WOLFSSL_X509* wolfSSL_d2i_X509_REQ_bio(WOLFSSL_BIO* bio, WOLFSSL_X509** x509)
  6555. {
  6556. return d2i_X509orX509REQ_bio(bio, x509, 1);
  6557. }
  6558. #endif
  6559. #endif /* !NO_BIO */
  6560. #endif /* OPENSSL_EXTRA */
  6561. #ifdef OPENSSL_EXTRA
  6562. /* Use the public key to verify the signature. Note: this only verifies
  6563. * the certificate signature.
  6564. * returns WOLFSSL_SUCCESS on successful signature verification */
  6565. static int verifyX509orX509REQ(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey, int req)
  6566. {
  6567. int ret;
  6568. const byte* der;
  6569. int derSz = 0;
  6570. int type;
  6571. (void)req;
  6572. if (x509 == NULL || pkey == NULL) {
  6573. return WOLFSSL_FATAL_ERROR;
  6574. }
  6575. der = wolfSSL_X509_get_der(x509, &derSz);
  6576. if (der == NULL) {
  6577. WOLFSSL_MSG("Error getting WOLFSSL_X509 DER");
  6578. return WOLFSSL_FATAL_ERROR;
  6579. }
  6580. switch (pkey->type) {
  6581. case EVP_PKEY_RSA:
  6582. type = RSAk;
  6583. break;
  6584. case EVP_PKEY_EC:
  6585. type = ECDSAk;
  6586. break;
  6587. case EVP_PKEY_DSA:
  6588. type = DSAk;
  6589. break;
  6590. default:
  6591. WOLFSSL_MSG("Unknown pkey key type");
  6592. return WOLFSSL_FATAL_ERROR;
  6593. }
  6594. #ifdef WOLFSSL_CERT_REQ
  6595. if (req)
  6596. ret = CheckCSRSignaturePubKey(der, derSz, x509->heap,
  6597. (unsigned char*)pkey->pkey.ptr, pkey->pkey_sz, type);
  6598. else
  6599. #endif
  6600. ret = CheckCertSignaturePubKey(der, derSz, x509->heap,
  6601. (unsigned char*)pkey->pkey.ptr, pkey->pkey_sz, type);
  6602. if (ret == 0) {
  6603. return WOLFSSL_SUCCESS;
  6604. }
  6605. return WOLFSSL_FAILURE;
  6606. }
  6607. int wolfSSL_X509_verify(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey)
  6608. {
  6609. return verifyX509orX509REQ(x509, pkey, 0);
  6610. }
  6611. #ifdef WOLFSSL_CERT_REQ
  6612. int wolfSSL_X509_REQ_verify(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey)
  6613. {
  6614. return verifyX509orX509REQ(x509, pkey, 1);
  6615. }
  6616. #endif /* WOLFSSL_CERT_REQ */
  6617. #if !defined(NO_FILESYSTEM)
  6618. static void *wolfSSL_d2i_X509_fp_ex(XFILE file, void **x509, int type)
  6619. {
  6620. void *newx509 = NULL;
  6621. byte *fileBuffer = NULL;
  6622. long sz = 0;
  6623. /* init variable */
  6624. if (x509)
  6625. *x509 = NULL;
  6626. /* argument check */
  6627. if (file == XBADFILE) {
  6628. return NULL;
  6629. }
  6630. /* determine file size */
  6631. if (XFSEEK(file, 0, XSEEK_END) != 0) {
  6632. return NULL;
  6633. }
  6634. sz = XFTELL(file);
  6635. if (XFSEEK(file, 0, XSEEK_SET) != 0) {
  6636. return NULL;
  6637. }
  6638. if (sz > MAX_WOLFSSL_FILE_SIZE || sz <= 0) {
  6639. WOLFSSL_MSG("d2i_X509_fp_ex file size error");
  6640. return NULL;
  6641. }
  6642. fileBuffer = (byte *)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE);
  6643. if (fileBuffer != NULL) {
  6644. if ((long)XFREAD(fileBuffer, 1, sz, file) != sz) {
  6645. WOLFSSL_MSG("File read failed");
  6646. goto err_exit;
  6647. }
  6648. if (type == CERT_TYPE) {
  6649. newx509 = (void *)wolfSSL_X509_d2i(NULL, fileBuffer, (int)sz);
  6650. }
  6651. #ifdef HAVE_CRL
  6652. else if (type == CRL_TYPE) {
  6653. newx509 = (void *)wolfSSL_d2i_X509_CRL(NULL, fileBuffer, (int)sz);
  6654. }
  6655. #endif
  6656. #ifdef WOLFSSL_CERT_REQ
  6657. else if (type == CERTREQ_TYPE) {
  6658. newx509 = (void *)wolfSSL_X509_REQ_d2i(NULL, fileBuffer, (int)sz);
  6659. }
  6660. #endif
  6661. #if !defined(NO_ASN) && !defined(NO_PWDBASED) && defined(HAVE_PKCS12)
  6662. else if (type == PKCS12_TYPE) {
  6663. if ((newx509 = wc_PKCS12_new()) == NULL) {
  6664. goto err_exit;
  6665. }
  6666. if (wc_d2i_PKCS12(fileBuffer, (int)sz, (WC_PKCS12*)newx509) < 0) {
  6667. goto err_exit;
  6668. }
  6669. }
  6670. #endif
  6671. else {
  6672. goto err_exit;
  6673. }
  6674. if (newx509 == NULL) {
  6675. WOLFSSL_MSG("X509 failed");
  6676. goto err_exit;
  6677. }
  6678. }
  6679. if (x509)
  6680. *x509 = newx509;
  6681. goto _exit;
  6682. err_exit:
  6683. #if !defined(NO_ASN) && !defined(NO_PWDBASED) && defined(HAVE_PKCS12)
  6684. if ((newx509 != NULL) && (type == PKCS12_TYPE)) {
  6685. wc_PKCS12_free((WC_PKCS12*)newx509);
  6686. newx509 = NULL;
  6687. }
  6688. #endif
  6689. _exit:
  6690. if (fileBuffer != NULL)
  6691. XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
  6692. return newx509;
  6693. }
  6694. #ifdef WOLFSSL_CERT_REQ
  6695. WOLFSSL_X509* wolfSSL_d2i_X509_REQ_fp(XFILE fp, WOLFSSL_X509 **req)
  6696. {
  6697. return (WOLFSSL_X509 *)wolfSSL_d2i_X509_fp_ex(fp, (void **)req,
  6698. CERTREQ_TYPE);
  6699. }
  6700. #endif /* WOLFSSL_CERT_REQ */
  6701. WOLFSSL_X509 *wolfSSL_d2i_X509_fp(XFILE fp, WOLFSSL_X509 **x509)
  6702. {
  6703. WOLFSSL_ENTER("wolfSSL_d2i_X509_fp");
  6704. return (WOLFSSL_X509 *)wolfSSL_d2i_X509_fp_ex(fp, (void **)x509, CERT_TYPE);
  6705. }
  6706. /* load certificate or CRL file, and add it to the STORE */
  6707. /* @param ctx a pointer to X509_LOOKUP structure */
  6708. /* @param file file name to load */
  6709. /* @param type WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1 */
  6710. /* @return a number of loading CRL or certificate, otherwise zero */
  6711. WOLFSSL_API int wolfSSL_X509_load_cert_crl_file(WOLFSSL_X509_LOOKUP *ctx,
  6712. const char *file, int type)
  6713. {
  6714. WOLFSSL_X509 *x509 = NULL;
  6715. int cnt = 0;
  6716. WOLFSSL_ENTER("wolfSSL_X509_load_cert_crl_file");
  6717. /* stanity check */
  6718. if (ctx == NULL || file == NULL) {
  6719. WOLFSSL_MSG("bad arguments");
  6720. return 0;
  6721. }
  6722. if (type != WOLFSSL_FILETYPE_PEM) {
  6723. x509 = wolfSSL_X509_load_certificate_file(file, type);
  6724. if (x509 != NULL) {
  6725. if (wolfSSL_X509_STORE_add_cert(ctx->store, x509)
  6726. == WOLFSSL_SUCCESS) {
  6727. cnt++;
  6728. } else {
  6729. WOLFSSL_MSG("wolfSSL_X509_STORE_add_cert error");
  6730. }
  6731. wolfSSL_X509_free(x509);
  6732. x509 = NULL;
  6733. } else {
  6734. WOLFSSL_MSG("wolfSSL_X509_load_certificate_file error");
  6735. }
  6736. } else {
  6737. #if defined(OPENSSL_ALL)
  6738. #if !defined(NO_BIO)
  6739. STACK_OF(WOLFSSL_X509_INFO) *info;
  6740. WOLFSSL_X509_INFO *info_tmp;
  6741. int i;
  6742. int num = 0;
  6743. WOLFSSL_BIO *bio = wolfSSL_BIO_new_file(file, "rb");
  6744. if(!bio) {
  6745. WOLFSSL_MSG("wolfSSL_BIO_new error");
  6746. return cnt;
  6747. }
  6748. info = wolfSSL_PEM_X509_INFO_read_bio(bio, NULL, NULL, NULL);
  6749. wolfSSL_BIO_free(bio);
  6750. if (!info) {
  6751. WOLFSSL_MSG("wolfSSL_PEM_X509_INFO_read_bio error");
  6752. return cnt;
  6753. }
  6754. num = wolfSSL_sk_X509_INFO_num(info);
  6755. for (i=0; i < num; i++) {
  6756. info_tmp = wolfSSL_sk_X509_INFO_value(info, i);
  6757. if (info_tmp->x509) {
  6758. if(wolfSSL_X509_STORE_add_cert(ctx->store, info_tmp->x509) ==
  6759. WOLFSSL_SUCCESS) {
  6760. cnt ++;
  6761. } else {
  6762. WOLFSSL_MSG("wolfSSL_X509_STORE_add_cert failed");
  6763. }
  6764. }
  6765. #ifdef HAVE_CRL
  6766. if (info_tmp->crl) {
  6767. if(wolfSSL_X509_STORE_add_crl(ctx->store, info_tmp->crl) ==
  6768. WOLFSSL_SUCCESS) {
  6769. cnt ++;
  6770. } else {
  6771. WOLFSSL_MSG("wolfSSL_X509_STORE_add_crl failed");
  6772. }
  6773. }
  6774. #endif
  6775. }
  6776. wolfSSL_sk_X509_INFO_pop_free(info, wolfSSL_X509_INFO_free);
  6777. #elif defined(HAVE_CRL)
  6778. /* Only supports one certificate or CRL in the file. */
  6779. WOLFSSL_X509_CRL* crl = NULL;
  6780. XFILE fp = XFOPEN(file, "rb");
  6781. if (fp == XBADFILE) {
  6782. WOLFSSL_MSG("XFOPEN error");
  6783. return cnt;
  6784. }
  6785. x509 = wolfSSL_PEM_read_X509(fp, NULL, NULL, NULL);
  6786. if (x509 != NULL) {
  6787. if (wolfSSL_X509_STORE_add_cert(ctx->store, x509) ==
  6788. WOLFSSL_SUCCESS) {
  6789. cnt++;
  6790. }
  6791. else {
  6792. WOLFSSL_MSG("wolfSSL_X509_STORE_add_cert failed");
  6793. }
  6794. }
  6795. else {
  6796. if (XFSEEK(fp, 0, XSEEK_SET) != 0) {
  6797. WOLFSSL_MSG("XFSEEK error");
  6798. return cnt;
  6799. }
  6800. crl = wolfSSL_PEM_read_X509_CRL(fp, NULL, NULL, NULL);
  6801. if (crl != NULL) {
  6802. if (wolfSSL_X509_STORE_add_crl(ctx->store, crl) ==
  6803. WOLFSSL_SUCCESS) {
  6804. cnt++;
  6805. }
  6806. else {
  6807. WOLFSSL_MSG("wolfSSL_X509_STORE_add_crl failed");
  6808. }
  6809. }
  6810. else {
  6811. WOLFSSL_MSG("Certificate and CRL not recognized");
  6812. return cnt;
  6813. }
  6814. }
  6815. wolfSSL_X509_free(x509);
  6816. wolfSSL_X509_CRL_free(crl);
  6817. #endif
  6818. #else
  6819. (void)cnt;
  6820. #endif /* OPENSSL_ALL && !NO_BIO */
  6821. }
  6822. WOLFSSL_LEAVE("wolfSSL_X509_load_ceretificate_crl_file", cnt);
  6823. return cnt;
  6824. }
  6825. #endif /* !NO_FILESYSTEM */
  6826. #ifdef HAVE_CRL
  6827. #ifndef NO_BIO
  6828. WOLFSSL_API WOLFSSL_X509_CRL *wolfSSL_d2i_X509_CRL_bio(WOLFSSL_BIO *bp,
  6829. WOLFSSL_X509_CRL **x)
  6830. {
  6831. int derSz;
  6832. byte* der = NULL;
  6833. WOLFSSL_X509_CRL* crl = NULL;
  6834. if (bp == NULL)
  6835. return NULL;
  6836. if ((derSz = wolfSSL_BIO_get_len(bp)) > 0) {
  6837. der = (byte*)XMALLOC(derSz, 0, DYNAMIC_TYPE_DER);
  6838. if (der != NULL) {
  6839. if (wolfSSL_BIO_read(bp, der, derSz) == derSz) {
  6840. crl = wolfSSL_d2i_X509_CRL(x, der, derSz);
  6841. }
  6842. }
  6843. }
  6844. if (der != NULL) {
  6845. XFREE(der, 0, DYNAMIC_TYPE_DER);
  6846. }
  6847. return crl;
  6848. }
  6849. #endif
  6850. #ifndef NO_FILESYSTEM
  6851. WOLFSSL_X509_CRL *wolfSSL_d2i_X509_CRL_fp(XFILE fp, WOLFSSL_X509_CRL **crl)
  6852. {
  6853. WOLFSSL_ENTER("wolfSSL_d2i_X509_CRL_fp");
  6854. return (WOLFSSL_X509_CRL *)wolfSSL_d2i_X509_fp_ex(fp, (void **)crl, CRL_TYPE);
  6855. }
  6856. /* Read CRL file, and add it to store and corresponding cert manager */
  6857. /* @param ctx a pointer of X509_LOOKUP back to the X509_STORE */
  6858. /* @param file a file to read */
  6859. /* @param type WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1 */
  6860. /* @return WOLFSSL_SUCCESS(1) on successful, otherwise WOLFSSL_FAILURE(0)*/
  6861. WOLFSSL_API int wolfSSL_X509_load_crl_file(WOLFSSL_X509_LOOKUP *ctx,
  6862. const char *file, int type)
  6863. {
  6864. #ifndef NO_BIO
  6865. int ret = WOLFSSL_FAILURE;
  6866. int count = 0;
  6867. WOLFSSL_BIO *bio = NULL;
  6868. WOLFSSL_X509_CRL *crl = NULL;
  6869. WOLFSSL_ENTER("wolfSSL_X509_load_crl_file");
  6870. if (ctx == NULL || file == NULL)
  6871. return ret;
  6872. if ((bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file())) == NULL)
  6873. return ret;
  6874. if (wolfSSL_BIO_read_filename(bio, file) <= 0) {
  6875. wolfSSL_BIO_free(bio);
  6876. return ret;
  6877. }
  6878. if (wolfSSL_BIO_read_filename(bio, file) <= 0) {
  6879. wolfSSL_BIO_free(bio);
  6880. return ret;
  6881. }
  6882. if (type == WOLFSSL_FILETYPE_PEM) {
  6883. do {
  6884. crl = wolfSSL_PEM_read_bio_X509_CRL(bio, NULL, NULL, NULL);
  6885. if (crl == NULL) {
  6886. if (count <= 0) {
  6887. WOLFSSL_MSG("Load crl failed");
  6888. }
  6889. break;
  6890. }
  6891. ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
  6892. if (ret == WOLFSSL_FAILURE) {
  6893. WOLFSSL_MSG("Adding crl failed");
  6894. break;
  6895. }
  6896. count++;
  6897. wolfSSL_X509_CRL_free(crl);
  6898. crl = NULL;
  6899. } while(crl == NULL);
  6900. ret = count;
  6901. }
  6902. else if (type == WOLFSSL_FILETYPE_ASN1) {
  6903. crl = wolfSSL_d2i_X509_CRL_bio(bio, NULL);
  6904. if (crl == NULL) {
  6905. WOLFSSL_MSG("Load crl failed");
  6906. } else {
  6907. ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
  6908. if (ret == WOLFSSL_FAILURE) {
  6909. WOLFSSL_MSG("Adding crl failed");
  6910. } else {
  6911. ret = 1;/* handled a file */
  6912. }
  6913. }
  6914. } else {
  6915. WOLFSSL_MSG("Invalid file type");
  6916. }
  6917. wolfSSL_X509_CRL_free(crl);
  6918. wolfSSL_BIO_free(bio);
  6919. WOLFSSL_LEAVE("wolfSSL_X509_load_crl_file", ret);
  6920. return ret;
  6921. #else
  6922. int ret = WOLFSSL_FAILURE;
  6923. int count = 0;
  6924. XFILE fp;
  6925. WOLFSSL_X509_CRL *crl = NULL;
  6926. WOLFSSL_ENTER("wolfSSL_X509_load_crl_file");
  6927. if (ctx == NULL || file == NULL)
  6928. return ret;
  6929. if ((fp = XFOPEN(file, "rb")) == XBADFILE)
  6930. return ret;
  6931. if (type == WOLFSSL_FILETYPE_PEM) {
  6932. do {
  6933. crl = wolfSSL_PEM_read_X509_CRL(fp, NULL, NULL, NULL);
  6934. if (crl == NULL) {
  6935. if (count <= 0) {
  6936. WOLFSSL_MSG("Load crl failed");
  6937. }
  6938. break;
  6939. }
  6940. ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
  6941. if (ret == WOLFSSL_FAILURE) {
  6942. WOLFSSL_MSG("Adding crl failed");
  6943. break;
  6944. }
  6945. count++;
  6946. wolfSSL_X509_CRL_free(crl);
  6947. crl = NULL;
  6948. }
  6949. while(crl == NULL);
  6950. ret = count;
  6951. }
  6952. else if (type == WOLFSSL_FILETYPE_ASN1) {
  6953. crl = wolfSSL_d2i_X509_CRL_fp(fp, NULL);
  6954. if (crl == NULL) {
  6955. WOLFSSL_MSG("Load crl failed");
  6956. }
  6957. else {
  6958. ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
  6959. if (ret == WOLFSSL_FAILURE) {
  6960. WOLFSSL_MSG("Adding crl failed");
  6961. }
  6962. else {
  6963. ret = 1;/* handled a file */
  6964. }
  6965. }
  6966. }
  6967. else {
  6968. WOLFSSL_MSG("Invalid file type");
  6969. }
  6970. wolfSSL_X509_CRL_free(crl);
  6971. XFCLOSE(fp);
  6972. WOLFSSL_LEAVE("wolfSSL_X509_load_crl_file", ret);
  6973. return ret;
  6974. #endif /* !NO_BIO */
  6975. }
  6976. #endif /* !NO_FILESYSTEM */
  6977. WOLFSSL_X509_CRL* wolfSSL_d2i_X509_CRL(WOLFSSL_X509_CRL** crl,
  6978. const unsigned char* in, int len)
  6979. {
  6980. WOLFSSL_X509_CRL *newcrl = NULL;
  6981. int ret = WOLFSSL_SUCCESS;
  6982. WOLFSSL_ENTER("wolfSSL_d2i_X509_CRL");
  6983. if (in == NULL) {
  6984. WOLFSSL_MSG("Bad argument value");
  6985. } else {
  6986. newcrl =(WOLFSSL_X509_CRL*)XMALLOC(sizeof(WOLFSSL_X509_CRL), NULL,
  6987. DYNAMIC_TYPE_CRL);
  6988. if (newcrl == NULL){
  6989. WOLFSSL_MSG("New CRL allocation failed");
  6990. } else {
  6991. ret = InitCRL(newcrl, NULL);
  6992. if (ret < 0) {
  6993. WOLFSSL_MSG("Init tmp CRL failed");
  6994. } else {
  6995. ret = BufferLoadCRL(newcrl, in, len, WOLFSSL_FILETYPE_ASN1,
  6996. NO_VERIFY);
  6997. if (ret != WOLFSSL_SUCCESS) {
  6998. WOLFSSL_MSG("Buffer Load CRL failed");
  6999. } else {
  7000. if (crl) {
  7001. *crl = newcrl;
  7002. }
  7003. }
  7004. }
  7005. }
  7006. }
  7007. if((ret != WOLFSSL_SUCCESS) && (newcrl != NULL)) {
  7008. wolfSSL_X509_CRL_free(newcrl);
  7009. newcrl = NULL;
  7010. }
  7011. return newcrl;
  7012. }
  7013. /* Retrieve issuer X509_NAME from CRL
  7014. * return X509_NAME* on success
  7015. * return NULL on failure
  7016. */
  7017. WOLFSSL_X509_NAME* wolfSSL_X509_CRL_get_issuer_name(WOLFSSL_X509_CRL* crl)
  7018. {
  7019. if (crl == NULL || crl->crlList == NULL)
  7020. return NULL;
  7021. return crl->crlList->issuer;
  7022. }
  7023. /* Retrieve version from CRL
  7024. * return version on success
  7025. * return 0 on failure
  7026. */
  7027. int wolfSSL_X509_CRL_version(WOLFSSL_X509_CRL* crl)
  7028. {
  7029. if (crl == NULL || crl->crlList == NULL)
  7030. return 0;
  7031. return crl->crlList->version;
  7032. }
  7033. /* Retrieve sig OID from CRL
  7034. * return OID on success
  7035. * return 0 on failure
  7036. */
  7037. int wolfSSL_X509_CRL_get_signature_type(WOLFSSL_X509_CRL* crl)
  7038. {
  7039. if (crl == NULL || crl->crlList == NULL)
  7040. return 0;
  7041. return crl->crlList->signatureOID;
  7042. }
  7043. /* Retrieve sig NID from CRL
  7044. * return NID on success
  7045. * return 0 on failure
  7046. */
  7047. int wolfSSL_X509_CRL_get_signature_nid(const WOLFSSL_X509_CRL* crl)
  7048. {
  7049. if (crl == NULL || crl->crlList == NULL)
  7050. return 0;
  7051. return oid2nid(crl->crlList->signatureOID, oidSigType);
  7052. }
  7053. /* Retrieve signature from CRL
  7054. * return WOLFSSL_SUCCESS on success and negative values on failure
  7055. */
  7056. int wolfSSL_X509_CRL_get_signature(WOLFSSL_X509_CRL* crl,
  7057. unsigned char* buf, int* bufSz)
  7058. {
  7059. WOLFSSL_ENTER("wolfSSL_X509_CRL_get_signature");
  7060. if (crl == NULL || crl->crlList == NULL || bufSz == NULL)
  7061. return BAD_FUNC_ARG;
  7062. if (buf != NULL)
  7063. XMEMCPY(buf, crl->crlList->signature, *bufSz);
  7064. *bufSz = (int)crl->crlList->signatureSz;
  7065. return WOLFSSL_SUCCESS;
  7066. }
  7067. /* Retrieve serial number from RevokedCert
  7068. * return WOLFSSL_SUCCESS on success and negative values on failure
  7069. */
  7070. int wolfSSL_X509_REVOKED_get_serial_number(RevokedCert* rev,
  7071. byte* in, int* inOutSz)
  7072. {
  7073. WOLFSSL_ENTER("wolfSSL_X509_REVOKED_get_serial_number");
  7074. if (rev == NULL || inOutSz == NULL) {
  7075. return BAD_FUNC_ARG;
  7076. }
  7077. if (in != NULL) {
  7078. if (*inOutSz < rev->serialSz) {
  7079. WOLFSSL_MSG("Serial buffer too small");
  7080. return BUFFER_E;
  7081. }
  7082. XMEMCPY(in, rev->serialNumber, rev->serialSz);
  7083. }
  7084. *inOutSz = rev->serialSz;
  7085. return WOLFSSL_SUCCESS;
  7086. }
  7087. const WOLFSSL_ASN1_INTEGER* wolfSSL_X509_REVOKED_get0_serial_number(const
  7088. WOLFSSL_X509_REVOKED *rev)
  7089. {
  7090. WOLFSSL_ENTER("wolfSSL_X509_REVOKED_get0_serial_number");
  7091. if (rev != NULL) {
  7092. return rev->serialNumber;
  7093. }
  7094. else
  7095. return NULL;
  7096. }
  7097. #ifndef NO_WOLFSSL_STUB
  7098. const WOLFSSL_ASN1_TIME* wolfSSL_X509_REVOKED_get0_revocation_date(const
  7099. WOLFSSL_X509_REVOKED *rev)
  7100. {
  7101. WOLFSSL_STUB("wolfSSL_X509_REVOKED_get0_revocation_date");
  7102. (void) rev;
  7103. return NULL;
  7104. }
  7105. #endif
  7106. #ifndef NO_BIO
  7107. /* print serial number out
  7108. * return WOLFSSL_SUCCESS on success
  7109. */
  7110. static int X509RevokedPrintSerial(WOLFSSL_BIO* bio, RevokedCert* rev,
  7111. int indent)
  7112. {
  7113. unsigned char serial[32];
  7114. int sz = sizeof(serial);
  7115. XMEMSET(serial, 0, sz);
  7116. if (wolfSSL_X509_REVOKED_get_serial_number(rev, serial, &sz)
  7117. == WOLFSSL_SUCCESS) {
  7118. X509PrintSerial_ex(bio, serial, sz, 0, indent);
  7119. }
  7120. return WOLFSSL_SUCCESS;
  7121. }
  7122. /* print out the signature in human readable format for use with
  7123. * wolfSSL_X509_CRL_print()
  7124. * return WOLFSSL_SUCCESS on success
  7125. */
  7126. static int X509CRLPrintSignature(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl,
  7127. int algOnly, int indent)
  7128. {
  7129. int sigSz = 0;
  7130. if (wolfSSL_X509_CRL_get_signature(crl, NULL, &sigSz) <= 0) {
  7131. return WOLFSSL_FAILURE;
  7132. }
  7133. if (sigSz > 0) {
  7134. unsigned char* sig;
  7135. int sigNid = wolfSSL_X509_CRL_get_signature_nid(crl);
  7136. sig = (unsigned char*)XMALLOC(sigSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  7137. if (sig == NULL) {
  7138. return WOLFSSL_FAILURE;
  7139. }
  7140. if (wolfSSL_X509_CRL_get_signature(crl, sig, &sigSz) <= 0) {
  7141. XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  7142. return WOLFSSL_FAILURE;
  7143. }
  7144. if (X509PrintSignature_ex(bio, sig, sigSz, sigNid, algOnly, indent)
  7145. != WOLFSSL_SUCCESS) {
  7146. XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  7147. return WOLFSSL_FAILURE;
  7148. }
  7149. if (sig != NULL) {
  7150. XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  7151. }
  7152. }
  7153. return WOLFSSL_SUCCESS;
  7154. }
  7155. #endif /* !NO_BIO */
  7156. #if !defined(NO_BIO) && defined(XSNPRINTF)
  7157. /* print out the extensions in human readable format for use with
  7158. * wolfSSL_X509_CRL_print()
  7159. * return WOLFSSL_SUCCESS on success
  7160. */
  7161. static int X509CRLPrintExtensions(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl,
  7162. int indent)
  7163. {
  7164. char tmp[MAX_WIDTH]; /* buffer for XSNPRINTF */
  7165. if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s\n", indent, "",
  7166. "CRL extensions:") >= MAX_WIDTH) {
  7167. return WOLFSSL_FAILURE;
  7168. }
  7169. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  7170. return WOLFSSL_FAILURE;
  7171. }
  7172. if (crl->crlList->crlNumber) {
  7173. if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s\n", indent + 4, "",
  7174. "X509v3 CRL Number:") >= MAX_WIDTH) {
  7175. return WOLFSSL_FAILURE;
  7176. }
  7177. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  7178. return WOLFSSL_FAILURE;
  7179. }
  7180. if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%d\n", indent + 8, "",
  7181. crl->crlList->crlNumber) >= MAX_WIDTH)
  7182. {
  7183. return WOLFSSL_FAILURE;
  7184. }
  7185. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  7186. return WOLFSSL_FAILURE;
  7187. }
  7188. XMEMSET(tmp, 0, sizeof(tmp));
  7189. }
  7190. #if !defined(NO_SKID)
  7191. if (crl->crlList->extAuthKeyIdSet && crl->crlList->extAuthKeyId[0] != 0) {
  7192. word32 i;
  7193. char val[5];
  7194. int valSz = 5;
  7195. if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s", indent + 4, "",
  7196. "X509v3 Authority Key Identifier:") >= MAX_WIDTH) {
  7197. return WOLFSSL_FAILURE;
  7198. }
  7199. XSTRNCAT(tmp, "\n", MAX_WIDTH - XSTRLEN(tmp) - 1);
  7200. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  7201. return WOLFSSL_FAILURE;
  7202. }
  7203. XMEMSET(tmp, 0, MAX_WIDTH);
  7204. if (XSNPRINTF(tmp, MAX_WIDTH - 1, "%*s%s",
  7205. indent + 8, "", "keyid") >= MAX_WIDTH) {
  7206. return WOLFSSL_FAILURE;
  7207. }
  7208. for (i = 0; i < XSTRLEN((char*)crl->crlList->extAuthKeyId); i++) {
  7209. /* check if buffer is almost full */
  7210. if (XSTRLEN(tmp) >= sizeof(tmp) - valSz) {
  7211. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  7212. return WOLFSSL_FAILURE;
  7213. }
  7214. tmp[0] = '\0';
  7215. }
  7216. if (XSNPRINTF(val, valSz, ":%02X", crl->crlList->extAuthKeyId[i])
  7217. >= valSz)
  7218. {
  7219. WOLFSSL_MSG("buffer overrun");
  7220. return WOLFSSL_FAILURE;
  7221. }
  7222. XSTRNCAT(tmp, val, valSz);
  7223. }
  7224. XSTRNCAT(tmp, "\n", XSTRLEN("\n") + 1);
  7225. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  7226. return WOLFSSL_FAILURE;
  7227. }
  7228. }
  7229. #endif
  7230. return WOLFSSL_SUCCESS;
  7231. }
  7232. /* iterate through a CRL's Revoked Certs and print out in human
  7233. * readable format for use with wolfSSL_X509_CRL_print()
  7234. * return WOLFSSL_SUCCESS on success
  7235. */
  7236. static int X509CRLPrintRevoked(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl,
  7237. int indent)
  7238. {
  7239. char tmp[MAX_WIDTH]; /* buffer for XSNPRINTF */
  7240. int i;
  7241. if (crl->crlList->totalCerts > 0) {
  7242. RevokedCert* revoked = crl->crlList->certs;
  7243. if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s\n", indent, "",
  7244. "Revoked Certificates:") >= MAX_WIDTH) {
  7245. return WOLFSSL_FAILURE;
  7246. }
  7247. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  7248. return WOLFSSL_FAILURE;
  7249. }
  7250. XMEMSET(tmp, 0, MAX_WIDTH);
  7251. for (i = 0; i < crl->crlList->totalCerts; i++) {
  7252. if (revoked->serialSz > 0) {
  7253. if (X509RevokedPrintSerial(bio, revoked, indent + 4)
  7254. != WOLFSSL_SUCCESS) {
  7255. return WOLFSSL_FAILURE;
  7256. }
  7257. }
  7258. #ifndef NO_ASN_TIME
  7259. if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s", indent + 8, "",
  7260. "Revocation Date: ") >= MAX_WIDTH) {
  7261. return WOLFSSL_FAILURE;
  7262. }
  7263. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  7264. return WOLFSSL_FAILURE;
  7265. }
  7266. if (revoked->revDate[0] != 0) {
  7267. if (GetTimeString(revoked->revDate, ASN_UTC_TIME,
  7268. tmp, MAX_WIDTH) != WOLFSSL_SUCCESS) {
  7269. if (GetTimeString(revoked->revDate, ASN_GENERALIZED_TIME,
  7270. tmp, MAX_WIDTH) != WOLFSSL_SUCCESS) {
  7271. WOLFSSL_MSG("Error getting revocation date");
  7272. return WOLFSSL_FAILURE;
  7273. }
  7274. }
  7275. }
  7276. else {
  7277. XSTRNCPY(tmp, "Not Set", MAX_WIDTH-1);
  7278. }
  7279. tmp[MAX_WIDTH - 1] = '\0'; /* make sure null terminated */
  7280. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  7281. return WOLFSSL_FAILURE;
  7282. }
  7283. if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
  7284. return WOLFSSL_FAILURE;
  7285. }
  7286. #endif
  7287. revoked = revoked->next;
  7288. }
  7289. }
  7290. else {
  7291. if (wolfSSL_BIO_write(bio, "No Revoked Certificates.\n",
  7292. (int)XSTRLEN("No Revoked Certificates.\n")) <= 0) {
  7293. return WOLFSSL_FAILURE;
  7294. }
  7295. }
  7296. return WOLFSSL_SUCCESS;
  7297. }
  7298. #ifndef NO_ASN_TIME
  7299. /* print out the last/next update times in human readable
  7300. * format for use with wolfSSL_X509_CRL_print()
  7301. * return WOLFSSL_SUCCESS on success
  7302. */
  7303. static int X509CRLPrintDates(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl,
  7304. int indent)
  7305. {
  7306. char tmp[MAX_WIDTH]; /* buffer for XSNPRINTF */
  7307. if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s", indent, "",
  7308. "Last Update: ") >= MAX_WIDTH) {
  7309. return WOLFSSL_FAILURE;
  7310. }
  7311. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  7312. return WOLFSSL_FAILURE;
  7313. }
  7314. if (crl->crlList->lastDate[0] != 0) {
  7315. if (GetTimeString(crl->crlList->lastDate, ASN_UTC_TIME,
  7316. tmp, MAX_WIDTH) != WOLFSSL_SUCCESS) {
  7317. if (GetTimeString(crl->crlList->lastDate, ASN_GENERALIZED_TIME,
  7318. tmp, MAX_WIDTH) != WOLFSSL_SUCCESS) {
  7319. WOLFSSL_MSG("Error getting last update date");
  7320. return WOLFSSL_FAILURE;
  7321. }
  7322. }
  7323. }
  7324. else {
  7325. XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
  7326. }
  7327. tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
  7328. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  7329. return WOLFSSL_FAILURE;
  7330. }
  7331. if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
  7332. return WOLFSSL_FAILURE;
  7333. }
  7334. if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s", indent, "",
  7335. "Next Update: ") >= MAX_WIDTH) {
  7336. return WOLFSSL_FAILURE;
  7337. }
  7338. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  7339. return WOLFSSL_FAILURE;
  7340. }
  7341. if (crl->crlList->nextDate[0] != 0) {
  7342. if (GetTimeString(crl->crlList->nextDate, ASN_UTC_TIME,
  7343. tmp, MAX_WIDTH) != WOLFSSL_SUCCESS) {
  7344. if (GetTimeString(crl->crlList->nextDate, ASN_GENERALIZED_TIME,
  7345. tmp, MAX_WIDTH) != WOLFSSL_SUCCESS) {
  7346. WOLFSSL_MSG("Error getting next update date");
  7347. return WOLFSSL_FAILURE;
  7348. }
  7349. }
  7350. }
  7351. else {
  7352. XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
  7353. }
  7354. tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
  7355. if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
  7356. return WOLFSSL_FAILURE;
  7357. }
  7358. if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
  7359. return WOLFSSL_FAILURE;
  7360. }
  7361. return WOLFSSL_SUCCESS;
  7362. }
  7363. #endif
  7364. /* Writes the human readable form of x509 to bio.
  7365. *
  7366. * bio WOLFSSL_BIO to write to.
  7367. * crl Certificate revocation list to write.
  7368. *
  7369. * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on failure
  7370. */
  7371. int wolfSSL_X509_CRL_print(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl)
  7372. {
  7373. char issuType[] = "Issuer: ";
  7374. if (bio == NULL || crl == NULL || crl->crlList == NULL) {
  7375. return WOLFSSL_FAILURE;
  7376. }
  7377. if (wolfSSL_BIO_write(bio, "Certificate Revocation List (CRL):\n",
  7378. (int)XSTRLEN("Certificate Revocation List (CRL):\n")) <= 0) {
  7379. return WOLFSSL_FAILURE;
  7380. }
  7381. /* print version */
  7382. if (X509PrintVersion(bio, wolfSSL_X509_CRL_version(crl), 8)
  7383. != WOLFSSL_SUCCESS) {
  7384. return WOLFSSL_FAILURE;
  7385. }
  7386. /* print signature algo */
  7387. if (X509CRLPrintSignature(bio, crl, 1, 8) != WOLFSSL_SUCCESS) {
  7388. return WOLFSSL_FAILURE;
  7389. }
  7390. /* print issuer name */
  7391. if (X509PrintName(bio, wolfSSL_X509_CRL_get_issuer_name(crl), issuType, 8)
  7392. != WOLFSSL_SUCCESS) {
  7393. return WOLFSSL_FAILURE;
  7394. }
  7395. #ifndef NO_ASN_TIME
  7396. /* print last and next update times */
  7397. if (X509CRLPrintDates(bio, crl, 8) != WOLFSSL_SUCCESS) {
  7398. return WOLFSSL_FAILURE;
  7399. }
  7400. #endif
  7401. /* print CRL extensions */
  7402. if (X509CRLPrintExtensions(bio, crl, 8) != WOLFSSL_SUCCESS) {
  7403. return WOLFSSL_FAILURE;
  7404. }
  7405. /* print CRL Revoked Certs */
  7406. if (X509CRLPrintRevoked(bio, crl, 0) != WOLFSSL_SUCCESS) {
  7407. return WOLFSSL_FAILURE;
  7408. }
  7409. if (X509CRLPrintSignature(bio, crl, 0, 4) != WOLFSSL_SUCCESS) {
  7410. return WOLFSSL_FAILURE;
  7411. }
  7412. if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
  7413. return WOLFSSL_FAILURE;
  7414. }
  7415. return WOLFSSL_SUCCESS;
  7416. }
  7417. #endif /* !NO_BIO && XSNPRINTF */
  7418. #endif /* HAVE_CRL */
  7419. #endif /* OPENSSL_EXTRA */
  7420. #if defined(HAVE_CRL) && (defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL))
  7421. void wolfSSL_X509_CRL_free(WOLFSSL_X509_CRL *crl)
  7422. {
  7423. WOLFSSL_ENTER("wolfSSL_X509_CRL_free");
  7424. if (crl)
  7425. FreeCRL(crl, 1);
  7426. }
  7427. #endif /* HAVE_CRL && (OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL) */
  7428. #ifdef OPENSSL_EXTRA
  7429. WOLFSSL_ASN1_TIME* wolfSSL_X509_CRL_get_lastUpdate(WOLFSSL_X509_CRL* crl)
  7430. {
  7431. if ((crl != NULL) && (crl->crlList != NULL) &&
  7432. (crl->crlList->lastDateAsn1.data[0] != 0)) {
  7433. return &crl->crlList->lastDateAsn1;
  7434. }
  7435. else
  7436. return NULL;
  7437. }
  7438. WOLFSSL_ASN1_TIME* wolfSSL_X509_CRL_get_nextUpdate(WOLFSSL_X509_CRL* crl)
  7439. {
  7440. if ((crl != NULL) && (crl->crlList != NULL) &&
  7441. (crl->crlList->nextDateAsn1.data[0] != 0)) {
  7442. return &crl->crlList->nextDateAsn1;
  7443. }
  7444. else
  7445. return NULL;
  7446. }
  7447. #ifndef NO_WOLFSSL_STUB
  7448. int wolfSSL_X509_CRL_verify(WOLFSSL_X509_CRL* crl, WOLFSSL_EVP_PKEY* key)
  7449. {
  7450. (void)crl;
  7451. (void)key;
  7452. WOLFSSL_STUB("X509_CRL_verify");
  7453. return 0;
  7454. }
  7455. #endif
  7456. #endif /* OPENSSL_EXTRA */
  7457. #ifdef OPENSSL_EXTRA
  7458. WOLFSSL_X509_VERIFY_PARAM* wolfSSL_X509_VERIFY_PARAM_new(void)
  7459. {
  7460. WOLFSSL_X509_VERIFY_PARAM *param = NULL;
  7461. param = (WOLFSSL_X509_VERIFY_PARAM*)XMALLOC(
  7462. sizeof(WOLFSSL_X509_VERIFY_PARAM), NULL, DYNAMIC_TYPE_OPENSSL);
  7463. if (param != NULL)
  7464. XMEMSET(param, 0, sizeof(WOLFSSL_X509_VERIFY_PARAM ));
  7465. return(param);
  7466. }
  7467. void wolfSSL_X509_VERIFY_PARAM_free(WOLFSSL_X509_VERIFY_PARAM *param)
  7468. {
  7469. if (param != NULL)
  7470. XFREE(param, NULL, DYNAMIC_TYPE_OPENSSL);
  7471. }
  7472. /* Sets flags by OR'ing with existing value. */
  7473. int wolfSSL_X509_VERIFY_PARAM_set_flags(WOLFSSL_X509_VERIFY_PARAM *param,
  7474. unsigned long flags)
  7475. {
  7476. int ret = WOLFSSL_FAILURE;
  7477. if (param != NULL) {
  7478. param->flags |= flags;
  7479. ret = WOLFSSL_SUCCESS;
  7480. }
  7481. return ret;
  7482. }
  7483. int wolfSSL_X509_VERIFY_PARAM_get_flags(WOLFSSL_X509_VERIFY_PARAM *param)
  7484. {
  7485. int ret = 0;
  7486. if (param != NULL) {
  7487. ret = (int)param->flags;
  7488. }
  7489. return ret;
  7490. }
  7491. int wolfSSL_X509_VERIFY_PARAM_clear_flags(WOLFSSL_X509_VERIFY_PARAM *param,
  7492. unsigned long flags)
  7493. {
  7494. int ret = WOLFSSL_FAILURE;
  7495. if (param != NULL) {
  7496. param->flags &= ~flags;
  7497. ret = WOLFSSL_SUCCESS;
  7498. }
  7499. return ret;
  7500. }
  7501. /* inherits properties of param "to" to param "from"
  7502. *
  7503. * WOLFSSL_VPARAM_DEFAULT any values in "src" is copied
  7504. * if "src" value is new for "to".
  7505. * WOLFSSL_VPARAM_OVERWRITE all values of "form" are copied to "to"
  7506. * WOLFSSL_VPARAM_RESET_FLAGS the flag values are copied, not Ored
  7507. * WOLFSSL_VPARAM_LOCKED don't copy any values
  7508. * WOLFSSL_VPARAM_ONCE the current inherit_flags is zerroed
  7509. */
  7510. static int wolfSSL_X509_VERIFY_PARAM_inherit(WOLFSSL_X509_VERIFY_PARAM *to,
  7511. const WOLFSSL_X509_VERIFY_PARAM *from)
  7512. {
  7513. int ret = WOLFSSL_FAILURE;
  7514. int isOverWrite = 0;
  7515. int isDefault = 0;
  7516. unsigned int flags;
  7517. /* sanity check */
  7518. if (!to || !from) {
  7519. /* be compatible to openssl return value */
  7520. return WOLFSSL_SUCCESS;
  7521. }
  7522. flags = to->inherit_flags | from->inherit_flags;
  7523. if (flags & WOLFSSL_VPARAM_LOCKED) {
  7524. return WOLFSSL_SUCCESS;
  7525. }
  7526. if (flags & WOLFSSL_VPARAM_ONCE) {
  7527. to->inherit_flags = 0;
  7528. }
  7529. isOverWrite = (flags & WOLFSSL_VPARAM_OVERWRITE);
  7530. isDefault = (flags & WOLFSSL_VPARAM_DEFAULT);
  7531. /* copy check_time if check time is not set */
  7532. if ((to->flags & WOLFSSL_USE_CHECK_TIME) == 0 || isOverWrite) {
  7533. to->check_time = from->check_time;
  7534. to->flags &= ~WOLFSSL_USE_CHECK_TIME;
  7535. }
  7536. /* host name */
  7537. if (isOverWrite ||
  7538. (from->hostName[0] != 0 && (to->hostName[0] == 0 || isDefault))) {
  7539. if (!(ret = wolfSSL_X509_VERIFY_PARAM_set1_host(to, from->hostName,
  7540. (int)XSTRLEN(from->hostName))))
  7541. return ret;
  7542. to->hostFlags = from->hostFlags;
  7543. }
  7544. /* ip ascii */
  7545. if (isOverWrite ||
  7546. (from->ipasc[0] != 0 && (to->ipasc[0] == 0 || isDefault))) {
  7547. if (!(ret = wolfSSL_X509_VERIFY_PARAM_set1_ip_asc(to, from->ipasc)))
  7548. return ret;
  7549. }
  7550. if (flags & WOLFSSL_VPARAM_RESET_FLAGS)
  7551. to->flags = 0;
  7552. to->flags |= from->flags;
  7553. return ret;
  7554. }
  7555. /******************************************************************************
  7556. * wolfSSL_X509_VERIFY_PARAM_set1_host - sets the DNS hostname to name
  7557. * hostnames is cleared if name is NULL or empty.
  7558. *
  7559. * RETURNS:
  7560. *
  7561. */
  7562. int wolfSSL_X509_VERIFY_PARAM_set1_host(WOLFSSL_X509_VERIFY_PARAM* pParam,
  7563. const char* name,
  7564. unsigned int nameSz)
  7565. {
  7566. WOLFSSL_ENTER("wolfSSL_X509_VERIFY_PARAM_set1_host");
  7567. if (pParam == NULL)
  7568. return WOLFSSL_FAILURE;
  7569. /* If name is NULL, clear hostname. */
  7570. if (name == NULL) {
  7571. XMEMSET(pParam->hostName, 0, WOLFSSL_HOST_NAME_MAX);
  7572. return WOLFSSL_SUCCESS;
  7573. }
  7574. /* If name is NULL-terminated, namelen can be set to zero. */
  7575. if (nameSz == 0) {
  7576. nameSz = (unsigned int)XSTRLEN(name);
  7577. }
  7578. if (nameSz > 0 && name[nameSz - 1] == '\0')
  7579. nameSz--;
  7580. if (nameSz > WOLFSSL_HOST_NAME_MAX-1) {
  7581. WOLFSSL_MSG("Truncating name");
  7582. nameSz = WOLFSSL_HOST_NAME_MAX-1;
  7583. }
  7584. if (nameSz > 0) {
  7585. XMEMCPY(pParam->hostName, name, nameSz);
  7586. XMEMSET(pParam->hostName + nameSz, 0,
  7587. WOLFSSL_HOST_NAME_MAX - nameSz);
  7588. }
  7589. pParam->hostName[nameSz] = '\0';
  7590. return WOLFSSL_SUCCESS;
  7591. }
  7592. /* Set VERIFY PARAM from "from" pointer to "to" pointer */
  7593. int wolfSSL_X509_VERIFY_PARAM_set1(WOLFSSL_X509_VERIFY_PARAM *to,
  7594. const WOLFSSL_X509_VERIFY_PARAM *from)
  7595. {
  7596. int ret = WOLFSSL_FAILURE;
  7597. unsigned int _inherit_flags;
  7598. if (!to) {
  7599. return ret;
  7600. }
  7601. /* keeps the inherit flags for save */
  7602. _inherit_flags = to->inherit_flags;
  7603. /* Ored DEFAULT inherit flag property to copy "from" contents to "to"
  7604. * contents
  7605. */
  7606. to->inherit_flags |= WOLFSSL_VPARAM_DEFAULT;
  7607. ret = wolfSSL_X509_VERIFY_PARAM_inherit(to, from);
  7608. /* restore inherit flag */
  7609. to->inherit_flags = _inherit_flags;
  7610. return ret;
  7611. }
  7612. /* Set the host flag in the X509_VERIFY_PARAM structure */
  7613. void wolfSSL_X509_VERIFY_PARAM_set_hostflags(WOLFSSL_X509_VERIFY_PARAM* param,
  7614. unsigned int flags)
  7615. {
  7616. if (param != NULL) {
  7617. param->hostFlags = flags;
  7618. }
  7619. }
  7620. /* Sets the expected IP address to ipasc.
  7621. *
  7622. * param is a pointer to the X509_VERIFY_PARAM structure
  7623. * ipasc is a NULL-terminated string with N.N.N.N for IPv4 and
  7624. * HH:HH ... HH:HH for IPv6. There is no validation performed on the
  7625. * parameter, and it must be an exact match with the IP in the cert.
  7626. *
  7627. * return 1 for success and 0 for failure*/
  7628. int wolfSSL_X509_VERIFY_PARAM_set1_ip_asc(WOLFSSL_X509_VERIFY_PARAM *param,
  7629. const char *ipasc)
  7630. {
  7631. int ret = WOLFSSL_FAILURE;
  7632. if (param != NULL) {
  7633. if (ipasc == NULL) {
  7634. param->ipasc[0] = '\0';
  7635. }
  7636. else {
  7637. XSTRLCPY(param->ipasc, ipasc, WOLFSSL_MAX_IPSTR);
  7638. param->ipasc[WOLFSSL_MAX_IPSTR-1] = '\0';
  7639. }
  7640. ret = WOLFSSL_SUCCESS;
  7641. }
  7642. return ret;
  7643. }
  7644. /* Sets the expected IP address to ip(asc)
  7645. * by re-constructing IP address in ascii
  7646. * @param param is a pointer to the X509_VERIFY_PARAM structure
  7647. * @param ip in binary format of ip address
  7648. * @param iplen size of ip, 4 for ipv4, 16 for ipv6
  7649. * @return 1 for success and 0 for failure
  7650. */
  7651. int wolfSSL_X509_VERIFY_PARAM_set1_ip(WOLFSSL_X509_VERIFY_PARAM* param,
  7652. const unsigned char* ip, size_t iplen)
  7653. {
  7654. int ret = WOLFSSL_FAILURE;
  7655. #ifndef NO_FILESYSTEM
  7656. char* buf = NULL;
  7657. char* p = NULL;
  7658. word32 val = 0;
  7659. int i;
  7660. const size_t max_ipv6_len = 40;
  7661. byte write_zero = 0;
  7662. #endif
  7663. /* sanity check */
  7664. if (param == NULL || (iplen != 0 && iplen != 4 && iplen != 16)) {
  7665. WOLFSSL_MSG("bad function arg");
  7666. return ret;
  7667. }
  7668. #ifndef NO_FILESYSTEM
  7669. if (iplen == 4) {
  7670. /* ipv4 www.xxx.yyy.zzz max 15 length + Null termination */
  7671. buf = (char*)XMALLOC(16, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  7672. if (!buf) {
  7673. WOLFSSL_MSG("failed malloc");
  7674. return ret;
  7675. }
  7676. XSPRINTF(buf, "%d.%d.%d.%d", ip[0], ip[1], ip[2], ip[3]);
  7677. buf[15] = '\0';
  7678. }
  7679. else if (iplen == 16) {
  7680. /* ipv6 normal address scheme
  7681. * y1:y2:y3:y4:y5:y6:y7:y8, len(yx):4, len(y1-y8):32. len(":"):7
  7682. * Max len is 32 + 7 + 1(Termination) = 40 bytes
  7683. *
  7684. * ipv6 dual address
  7685. * Or y1:y2:y3:y4:y:y6:x.x.x.x yx is 4, y1-y6 is 24, ":" is 6
  7686. * x.x.x.x is 15.
  7687. * Max len is 24 + 6 + 15 + 1(Termination) = 46 bytes
  7688. *
  7689. * Expect data in ip[16]
  7690. * e.g (aaaa):(bbbb):(cccc):....(hhhh)
  7691. * (aaaa) = (ip[0<<8)|ip[1]
  7692. * ......
  7693. * (hhhh) = (ip[14]<<8)|(ip[15])
  7694. *
  7695. * e.g ::(gggg):(hhhh)
  7696. * ip[0]-[11] = 0
  7697. * (gggg) = (ip[12]<<8) |(ip[13])
  7698. * (hhhh) = (ip[14]<<8) |(ip[15])
  7699. *
  7700. * Because it is not able to know which ivp6 scheme uses from data to
  7701. * reconstruct IP address, this function assumes
  7702. * ivp6 normal address scheme, not dual address scheme,
  7703. * to re-construct IP address in ascii.
  7704. */
  7705. buf = (char*)XMALLOC(max_ipv6_len, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  7706. if (!buf) {
  7707. WOLFSSL_MSG("failed malloc");
  7708. return ret;
  7709. }
  7710. p = buf;
  7711. for (i = 0; i < 16; i += 2) {
  7712. val = (((word32)(ip[i]<<8)) | (ip[i+1])) & 0xFFFF;
  7713. if (val == 0){
  7714. if (!write_zero) {
  7715. *p = ':';
  7716. }
  7717. p++;
  7718. *p = '\0';
  7719. write_zero = 1;
  7720. }
  7721. else {
  7722. if (i != 0)
  7723. *p++ = ':';
  7724. XSPRINTF(p, "%x", val);
  7725. }
  7726. /* sanity check */
  7727. if (XSTRLEN(buf) > max_ipv6_len) {
  7728. WOLFSSL_MSG("The target ip address exceeds buffer length(40)");
  7729. XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  7730. buf = NULL;
  7731. break;
  7732. }
  7733. /* move the pointer to the last */
  7734. /* XSTRLEN includes NULL because of XSPRINTF use */
  7735. p = buf + (XSTRLEN(buf));
  7736. }
  7737. /* termination */
  7738. if(i == 16 && buf) {
  7739. p--;
  7740. if ((*p) == ':') {
  7741. /* when the last character is :, the following segments are zero
  7742. * Therefore, adding : and null termination
  7743. */
  7744. p++;
  7745. *p++ = ':';
  7746. *p = '\0';
  7747. }
  7748. }
  7749. }
  7750. else {
  7751. WOLFSSL_MSG("iplen is zero, do nothing");
  7752. return WOLFSSL_SUCCESS;
  7753. }
  7754. if (buf) {
  7755. /* set address to ip asc */
  7756. ret = wolfSSL_X509_VERIFY_PARAM_set1_ip_asc(param, buf);
  7757. XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  7758. }
  7759. #else
  7760. (void)param;
  7761. (void)ip;
  7762. (void)iplen;
  7763. #endif
  7764. return ret;
  7765. }
  7766. #ifndef NO_WOLFSSL_STUB
  7767. void wolfSSL_X509_OBJECT_free_contents(WOLFSSL_X509_OBJECT* obj)
  7768. {
  7769. (void)obj;
  7770. WOLFSSL_STUB("X509_OBJECT_free_contents");
  7771. }
  7772. #endif
  7773. #ifndef NO_ASN_TIME
  7774. int wolfSSL_X509_cmp_current_time(const WOLFSSL_ASN1_TIME* asnTime)
  7775. {
  7776. return wolfSSL_X509_cmp_time(asnTime, NULL);
  7777. }
  7778. /* return -1 if asnTime is earlier than or equal to cmpTime, and 1 otherwise
  7779. * return 0 on error
  7780. */
  7781. int wolfSSL_X509_cmp_time(const WOLFSSL_ASN1_TIME* asnTime, time_t* cmpTime)
  7782. {
  7783. int ret = WOLFSSL_FAILURE;
  7784. time_t tmpTime, *pTime = &tmpTime;
  7785. struct tm ts, *tmpTs, *ct;
  7786. #if defined(NEED_TMP_TIME)
  7787. /* for use with gmtime_r */
  7788. struct tm tmpTimeStorage;
  7789. tmpTs = &tmpTimeStorage;
  7790. #else
  7791. tmpTs = NULL;
  7792. #endif
  7793. (void)tmpTs;
  7794. if (asnTime == NULL) {
  7795. return WOLFSSL_FAILURE;
  7796. }
  7797. if (cmpTime == NULL) {
  7798. /* Use current time */
  7799. *pTime = wc_Time(0);
  7800. }
  7801. else {
  7802. pTime = cmpTime;
  7803. }
  7804. if (wolfSSL_ASN1_TIME_to_tm((WOLFSSL_ASN1_TIME*)asnTime, &ts) !=
  7805. WOLFSSL_SUCCESS) {
  7806. WOLFSSL_MSG("Failed to convert WOLFSSL_ASN1_TIME to struct tm.");
  7807. return WOLFSSL_FAILURE;
  7808. }
  7809. /* Convert to time struct*/
  7810. ct = XGMTIME(pTime, tmpTs);
  7811. if (ct == NULL)
  7812. return GETTIME_ERROR;
  7813. /* DateGreaterThan returns 1 for >; 0 for <= */
  7814. ret = DateGreaterThan(&ts, ct) ? 1 : -1;
  7815. return ret;
  7816. }
  7817. #endif /* !NO_ASN_TIME */
  7818. #if (defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)) && \
  7819. !defined(NO_ASN_TIME) && !defined(USER_TIME) && !defined(TIME_OVERRIDES)
  7820. WOLFSSL_ASN1_TIME *wolfSSL_X509_time_adj_ex(WOLFSSL_ASN1_TIME *asnTime,
  7821. int offset_day, long offset_sec, time_t *in_tm)
  7822. {
  7823. /* get current time if in_tm is null */
  7824. time_t t = in_tm ? *in_tm : wc_Time(0);
  7825. return wolfSSL_ASN1_TIME_adj(asnTime, t, offset_day, offset_sec);
  7826. }
  7827. WOLFSSL_ASN1_TIME *wolfSSL_X509_time_adj(WOLFSSL_ASN1_TIME *asnTime,
  7828. long offset_sec, time_t *in_tm)
  7829. {
  7830. return wolfSSL_X509_time_adj_ex(asnTime, 0, offset_sec, in_tm);
  7831. }
  7832. WOLFSSL_ASN1_TIME* wolfSSL_X509_gmtime_adj(WOLFSSL_ASN1_TIME *s, long adj)
  7833. {
  7834. return wolfSSL_X509_time_adj(s, adj, NULL);
  7835. }
  7836. #endif
  7837. #ifndef NO_WOLFSSL_STUB
  7838. int wolfSSL_sk_X509_REVOKED_num(WOLFSSL_X509_REVOKED* revoked)
  7839. {
  7840. (void)revoked;
  7841. WOLFSSL_STUB("sk_X509_REVOKED_num");
  7842. return 0;
  7843. }
  7844. #endif
  7845. #ifndef NO_WOLFSSL_STUB
  7846. WOLFSSL_X509_REVOKED* wolfSSL_X509_CRL_get_REVOKED(WOLFSSL_X509_CRL* crl)
  7847. {
  7848. (void)crl;
  7849. WOLFSSL_STUB("X509_CRL_get_REVOKED");
  7850. return 0;
  7851. }
  7852. #endif
  7853. #ifndef NO_WOLFSSL_STUB
  7854. WOLFSSL_X509_REVOKED* wolfSSL_sk_X509_REVOKED_value(
  7855. WOLFSSL_X509_REVOKED* revoked, int value)
  7856. {
  7857. (void)revoked;
  7858. (void)value;
  7859. WOLFSSL_STUB("sk_X509_REVOKED_value");
  7860. return 0;
  7861. }
  7862. #endif
  7863. #endif /* OPENSSL_EXTRA */
  7864. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  7865. WOLFSSL_ASN1_INTEGER* wolfSSL_X509_get_serialNumber(WOLFSSL_X509* x509)
  7866. {
  7867. WOLFSSL_ASN1_INTEGER* a;
  7868. int i = 0;
  7869. WOLFSSL_ENTER("wolfSSL_X509_get_serialNumber");
  7870. if (x509 == NULL) {
  7871. WOLFSSL_MSG("NULL function argument");
  7872. return NULL;
  7873. }
  7874. if (x509->serialNumber != NULL)
  7875. return x509->serialNumber;
  7876. a = wolfSSL_ASN1_INTEGER_new();
  7877. if (a == NULL)
  7878. return NULL;
  7879. /* Make sure there is space for the data, ASN.1 type and length. */
  7880. if (x509->serialSz > (WOLFSSL_ASN1_INTEGER_MAX - 2)) {
  7881. /* dynamically create data buffer, +2 for type and length */
  7882. a->data = (unsigned char*)XMALLOC(x509->serialSz + 2, NULL,
  7883. DYNAMIC_TYPE_OPENSSL);
  7884. if (a->data == NULL) {
  7885. wolfSSL_ASN1_INTEGER_free(a);
  7886. return NULL;
  7887. }
  7888. a->dataMax = x509->serialSz + 2;
  7889. a->isDynamic = 1;
  7890. } else {
  7891. /* Use array instead of dynamic memory */
  7892. a->data = a->intData;
  7893. a->dataMax = WOLFSSL_ASN1_INTEGER_MAX;
  7894. }
  7895. #if defined(WOLFSSL_QT) || defined(WOLFSSL_HAPROXY)
  7896. XMEMCPY(&a->data[i], x509->serial, x509->serialSz);
  7897. a->length = x509->serialSz;
  7898. #else
  7899. a->data[i++] = ASN_INTEGER;
  7900. i += SetLength(x509->serialSz, a->data + i);
  7901. XMEMCPY(&a->data[i], x509->serial, x509->serialSz);
  7902. a->length = x509->serialSz + 2;
  7903. #endif
  7904. x509->serialNumber = a;
  7905. return a;
  7906. }
  7907. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  7908. #ifdef OPENSSL_EXTRA
  7909. #if defined(OPENSSL_ALL) || defined(WOLFSSL_APACHE_HTTPD) \
  7910. || defined(WOLFSSL_HAPROXY) || defined(WOLFSSL_WPAS)
  7911. WOLFSSL_X509_ALGOR* wolfSSL_X509_ALGOR_new(void)
  7912. {
  7913. WOLFSSL_X509_ALGOR* ret;
  7914. ret = (WOLFSSL_X509_ALGOR*)XMALLOC(sizeof(WOLFSSL_X509_ALGOR), NULL,
  7915. DYNAMIC_TYPE_OPENSSL);
  7916. if (ret) {
  7917. XMEMSET(ret, 0, sizeof(WOLFSSL_X509_ALGOR));
  7918. }
  7919. return ret;
  7920. }
  7921. void wolfSSL_X509_ALGOR_free(WOLFSSL_X509_ALGOR *alg)
  7922. {
  7923. if (alg) {
  7924. wolfSSL_ASN1_OBJECT_free(alg->algorithm);
  7925. wolfSSL_ASN1_TYPE_free(alg->parameter);
  7926. XFREE(alg, NULL, DYNAMIC_TYPE_OPENSSL);
  7927. }
  7928. }
  7929. /* Returns X509_ALGOR struct with signature algorithm */
  7930. const WOLFSSL_X509_ALGOR* wolfSSL_X509_get0_tbs_sigalg(const WOLFSSL_X509 *x509)
  7931. {
  7932. WOLFSSL_ENTER("wolfSSL_X509_get0_tbs_sigalg");
  7933. if (x509 == NULL) {
  7934. WOLFSSL_MSG("x509 struct NULL error");
  7935. return NULL;
  7936. }
  7937. return &x509->algor;
  7938. }
  7939. /* Sets paobj pointer to X509_ALGOR signature algorithm */
  7940. void wolfSSL_X509_ALGOR_get0(const WOLFSSL_ASN1_OBJECT **paobj, int *pptype,
  7941. const void **ppval, const WOLFSSL_X509_ALGOR *algor)
  7942. {
  7943. WOLFSSL_ENTER("wolfSSL_X509_ALGOR_get0");
  7944. if (!algor) {
  7945. WOLFSSL_MSG("algor object is NULL");
  7946. return;
  7947. }
  7948. if (paobj)
  7949. *paobj = algor->algorithm;
  7950. if (ppval && algor->parameter)
  7951. *ppval = algor->parameter->value.ptr;
  7952. if (pptype) {
  7953. if (algor->parameter) {
  7954. *pptype = algor->parameter->type;
  7955. }
  7956. else {
  7957. /* Default to V_ASN1_OBJECT */
  7958. *pptype = V_ASN1_OBJECT;
  7959. }
  7960. }
  7961. }
  7962. /**
  7963. * Populate algor members.
  7964. *
  7965. * @param algor The object to be set
  7966. * @param aobj The value to be set in algor->algorithm
  7967. * @param ptype The type of algor->parameter
  7968. * @param pval The value of algor->parameter
  7969. * @return WOLFSSL_SUCCESS on success
  7970. * WOLFSSL_FAILURE on missing parameters or bad malloc
  7971. */
  7972. int wolfSSL_X509_ALGOR_set0(WOLFSSL_X509_ALGOR *algor, WOLFSSL_ASN1_OBJECT *aobj,
  7973. int ptype, void *pval)
  7974. {
  7975. if (!algor) {
  7976. return WOLFSSL_FAILURE;
  7977. }
  7978. if (!algor->parameter) {
  7979. algor->parameter = wolfSSL_ASN1_TYPE_new();
  7980. if (!algor->parameter) {
  7981. return WOLFSSL_FAILURE;
  7982. }
  7983. }
  7984. if (aobj) {
  7985. algor->algorithm = aobj;
  7986. }
  7987. wolfSSL_ASN1_TYPE_set(algor->parameter, ptype, pval);
  7988. return WOLFSSL_SUCCESS;
  7989. }
  7990. /**
  7991. * Allocate a new WOLFSSL_X509_PUBKEY object.
  7992. *
  7993. * @return New zero'ed WOLFSSL_X509_PUBKEY object
  7994. */
  7995. WOLFSSL_X509_PUBKEY *wolfSSL_X509_PUBKEY_new(void)
  7996. {
  7997. WOLFSSL_X509_PUBKEY *ret;
  7998. ret = (WOLFSSL_X509_PUBKEY*)XMALLOC(sizeof(WOLFSSL_X509_PUBKEY), NULL,
  7999. DYNAMIC_TYPE_OPENSSL);
  8000. if (!ret) {
  8001. return NULL;
  8002. }
  8003. XMEMSET(ret, 0, sizeof(WOLFSSL_X509_PUBKEY));
  8004. ret->algor = wolfSSL_X509_ALGOR_new();
  8005. if (!ret->algor) {
  8006. wolfSSL_X509_PUBKEY_free(ret);
  8007. return NULL;
  8008. }
  8009. return ret;
  8010. }
  8011. /**
  8012. * Free WOLFSSL_X509_PUBKEY and all its members.
  8013. *
  8014. * @param at Object to free
  8015. */
  8016. void wolfSSL_X509_PUBKEY_free(WOLFSSL_X509_PUBKEY *x)
  8017. {
  8018. if (x) {
  8019. if (x->algor) {
  8020. wolfSSL_X509_ALGOR_free(x->algor);
  8021. }
  8022. if (x->pkey) {
  8023. wolfSSL_EVP_PKEY_free(x->pkey);
  8024. }
  8025. XFREE(x, NULL, DYNAMIC_TYPE_OPENSSL);
  8026. }
  8027. }
  8028. /* Returns X509_PUBKEY structure containing X509_ALGOR and EVP_PKEY */
  8029. WOLFSSL_X509_PUBKEY* wolfSSL_X509_get_X509_PUBKEY(const WOLFSSL_X509* x509)
  8030. {
  8031. WOLFSSL_ENTER("wolfSSL_X509_get_X509_PUBKEY");
  8032. if (x509 == NULL) {
  8033. WOLFSSL_MSG("x509 struct NULL error");
  8034. return NULL;
  8035. }
  8036. return (WOLFSSL_X509_PUBKEY*)&x509->key;
  8037. }
  8038. /* Sets ppkalg pointer to X509_PUBKEY algorithm. Returns WOLFSSL_SUCCESS on
  8039. success or WOLFSSL_FAILURE on error. */
  8040. int wolfSSL_X509_PUBKEY_get0_param(WOLFSSL_ASN1_OBJECT **ppkalg,
  8041. const unsigned char **pk, int *ppklen, WOLFSSL_X509_ALGOR **pa,
  8042. WOLFSSL_X509_PUBKEY *pub)
  8043. {
  8044. WOLFSSL_ENTER("wolfSSL_X509_PUBKEY_get0_param");
  8045. if (!pub || !pub->pubKeyOID) {
  8046. WOLFSSL_MSG("X509_PUBKEY struct not populated");
  8047. return WOLFSSL_FAILURE;
  8048. }
  8049. if (!pub->algor) {
  8050. if (!(pub->algor = wolfSSL_X509_ALGOR_new())) {
  8051. return WOLFSSL_FAILURE;
  8052. }
  8053. pub->algor->algorithm = wolfSSL_OBJ_nid2obj(pub->pubKeyOID);
  8054. if (pub->algor->algorithm == NULL) {
  8055. WOLFSSL_MSG("Failed to create object from NID");
  8056. return WOLFSSL_FAILURE;
  8057. }
  8058. }
  8059. if (pa)
  8060. *pa = pub->algor;
  8061. if (ppkalg)
  8062. *ppkalg = pub->algor->algorithm;
  8063. if (pk)
  8064. *pk = (unsigned char*)pub->pkey->pkey.ptr;
  8065. if (ppklen)
  8066. *ppklen = pub->pkey->pkey_sz;
  8067. return WOLFSSL_SUCCESS;
  8068. }
  8069. /* Returns a pointer to the pkey when passed a key */
  8070. WOLFSSL_EVP_PKEY* wolfSSL_X509_PUBKEY_get(WOLFSSL_X509_PUBKEY* key)
  8071. {
  8072. WOLFSSL_ENTER("wolfSSL_X509_PUBKEY_get");
  8073. if (key == NULL || key->pkey == NULL) {
  8074. WOLFSSL_LEAVE("wolfSSL_X509_PUBKEY_get", BAD_FUNC_ARG);
  8075. return NULL;
  8076. }
  8077. if (wolfSSL_EVP_PKEY_up_ref(key->pkey) != WOLFSSL_SUCCESS) {
  8078. WOLFSSL_LEAVE("wolfSSL_X509_PUBKEY_get", BAD_MUTEX_E);
  8079. return NULL;
  8080. }
  8081. WOLFSSL_LEAVE("wolfSSL_X509_PUBKEY_get", WOLFSSL_SUCCESS);
  8082. return key->pkey;
  8083. }
  8084. int wolfSSL_X509_PUBKEY_set(WOLFSSL_X509_PUBKEY **x, WOLFSSL_EVP_PKEY *key)
  8085. {
  8086. WOLFSSL_X509_PUBKEY *pk = NULL;
  8087. int ptype;
  8088. void *pval;
  8089. #ifndef NO_DSA
  8090. WOLFSSL_ASN1_STRING *str;
  8091. #endif
  8092. #ifdef HAVE_ECC
  8093. int nid;
  8094. const WOLFSSL_EC_GROUP *group;
  8095. #endif
  8096. WOLFSSL_ASN1_OBJECT *keyTypeObj;
  8097. WOLFSSL_ENTER("wolfSSL_X509_PUBKEY_set");
  8098. if (!x || !key) {
  8099. return WOLFSSL_FAILURE;
  8100. }
  8101. if (!(pk = wolfSSL_X509_PUBKEY_new())) {
  8102. return WOLFSSL_FAILURE;
  8103. }
  8104. switch (key->type) {
  8105. #ifndef NO_RSA
  8106. case EVP_PKEY_RSA:
  8107. pval = NULL;
  8108. ptype = V_ASN1_NULL;
  8109. pk->pubKeyOID = RSAk;
  8110. break;
  8111. #endif
  8112. #ifndef NO_DSA
  8113. case EVP_PKEY_DSA:
  8114. if (!key->dsa->p || !key->dsa->q || !key->dsa->g)
  8115. goto error;
  8116. str = wolfSSL_ASN1_STRING_new();
  8117. if (str == NULL)
  8118. goto error;
  8119. str->length = wolfSSL_i2d_DSAparams(key->dsa,
  8120. (unsigned char **)&str->data);
  8121. if (str->length <= 0) {
  8122. wolfSSL_ASN1_STRING_free(str);
  8123. goto error;
  8124. }
  8125. str->isDynamic = 1;
  8126. pval = str;
  8127. ptype = V_ASN1_SEQUENCE;
  8128. pk->pubKeyOID = DSAk;
  8129. break;
  8130. #endif
  8131. #ifdef HAVE_ECC
  8132. case EVP_PKEY_EC:
  8133. group = wolfSSL_EC_KEY_get0_group(key->ecc);
  8134. if (!group)
  8135. goto error;
  8136. nid = wolfSSL_EC_GROUP_get_curve_name(group);
  8137. if (nid <= 0) {
  8138. /* TODO: Add support for no nid case */
  8139. WOLFSSL_MSG("nid not found");
  8140. goto error;
  8141. }
  8142. pval = wolfSSL_OBJ_nid2obj(nid);
  8143. if (!pval)
  8144. goto error;
  8145. ptype = V_ASN1_OBJECT;
  8146. pk->pubKeyOID = ECDSAk;
  8147. break;
  8148. #endif
  8149. default:
  8150. WOLFSSL_MSG("Unknown key type");
  8151. goto error;
  8152. }
  8153. keyTypeObj = wolfSSL_OBJ_nid2obj(key->type);
  8154. if (keyTypeObj == NULL) {
  8155. if (ptype == V_ASN1_OBJECT)
  8156. ASN1_OBJECT_free((WOLFSSL_ASN1_OBJECT *)pval);
  8157. else
  8158. ASN1_STRING_free((WOLFSSL_ASN1_STRING *)pval);
  8159. goto error;
  8160. }
  8161. if (!wolfSSL_X509_ALGOR_set0(pk->algor, keyTypeObj, ptype, pval)) {
  8162. WOLFSSL_MSG("Failed to create algorithm object");
  8163. ASN1_OBJECT_free(keyTypeObj);
  8164. if (ptype == V_ASN1_OBJECT)
  8165. ASN1_OBJECT_free((WOLFSSL_ASN1_OBJECT *)pval);
  8166. else
  8167. ASN1_STRING_free((WOLFSSL_ASN1_STRING *)pval);
  8168. goto error;
  8169. }
  8170. if (!wolfSSL_EVP_PKEY_up_ref(key)) {
  8171. WOLFSSL_MSG("Failed to up key reference");
  8172. goto error;
  8173. }
  8174. pk->pkey = key;
  8175. wolfSSL_X509_PUBKEY_free(*x);
  8176. *x = pk;
  8177. return WOLFSSL_SUCCESS;
  8178. error:
  8179. if (pk) {
  8180. wolfSSL_X509_PUBKEY_free(pk);
  8181. }
  8182. return WOLFSSL_FAILURE;
  8183. }
  8184. #endif /* OPENSSL_ALL || WOLFSSL_APACHE_HTTPD || WOLFSSL_HAPROXY || WOLFSSL_WPAS */
  8185. #endif /* OPENSSL_EXTRA */
  8186. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  8187. WOLFSSL_BASIC_CONSTRAINTS* wolfSSL_BASIC_CONSTRAINTS_new(void)
  8188. {
  8189. WOLFSSL_BASIC_CONSTRAINTS* bc;
  8190. bc = (WOLFSSL_BASIC_CONSTRAINTS*)
  8191. XMALLOC(sizeof(WOLFSSL_BASIC_CONSTRAINTS), NULL,
  8192. DYNAMIC_TYPE_X509_EXT);
  8193. if (bc == NULL) {
  8194. WOLFSSL_MSG("Failed to malloc basic constraints");
  8195. return NULL;
  8196. }
  8197. XMEMSET(bc, 0, sizeof(WOLFSSL_BASIC_CONSTRAINTS));
  8198. return bc;
  8199. }
  8200. /* frees the wolfSSL_BASIC_CONSTRAINTS object */
  8201. void wolfSSL_BASIC_CONSTRAINTS_free(WOLFSSL_BASIC_CONSTRAINTS *bc)
  8202. {
  8203. WOLFSSL_ENTER("wolfSSL_BASIC_CONSTRAINTS_free");
  8204. if (bc == NULL) {
  8205. WOLFSSL_MSG("Argument is NULL");
  8206. return;
  8207. }
  8208. if (bc->pathlen) {
  8209. wolfSSL_ASN1_INTEGER_free(bc->pathlen);
  8210. }
  8211. XFREE(bc, NULL, DYNAMIC_TYPE_OPENSSL);
  8212. }
  8213. WOLFSSL_AUTHORITY_KEYID* wolfSSL_AUTHORITY_KEYID_new(void)
  8214. {
  8215. WOLFSSL_AUTHORITY_KEYID* akey = (WOLFSSL_AUTHORITY_KEYID*)XMALLOC(
  8216. sizeof(WOLFSSL_AUTHORITY_KEYID), NULL, DYNAMIC_TYPE_OPENSSL);
  8217. if (!akey) {
  8218. WOLFSSL_MSG("Issue creating WOLFSSL_AUTHORITY_KEYID struct");
  8219. return NULL;
  8220. }
  8221. XMEMSET(akey, 0, sizeof(WOLFSSL_AUTHORITY_KEYID));
  8222. return akey;
  8223. }
  8224. /* frees the wolfSSL_AUTHORITY_KEYID object */
  8225. void wolfSSL_AUTHORITY_KEYID_free(WOLFSSL_AUTHORITY_KEYID *id)
  8226. {
  8227. WOLFSSL_ENTER("wolfSSL_AUTHORITY_KEYID_free");
  8228. if(id == NULL) {
  8229. WOLFSSL_MSG("Argument is NULL");
  8230. return;
  8231. }
  8232. if (id->keyid) {
  8233. wolfSSL_ASN1_STRING_free(id->keyid);
  8234. }
  8235. if (id->issuer) {
  8236. wolfSSL_ASN1_OBJECT_free(id->issuer);
  8237. }
  8238. if (id->serial) {
  8239. wolfSSL_ASN1_INTEGER_free(id->serial);
  8240. }
  8241. XFREE(id, NULL, DYNAMIC_TYPE_OPENSSL);
  8242. }
  8243. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  8244. #ifdef KEEP_PEER_CERT
  8245. char* wolfSSL_X509_get_subjectCN(WOLFSSL_X509* x509)
  8246. {
  8247. if (x509 == NULL)
  8248. return NULL;
  8249. return x509->subjectCN;
  8250. }
  8251. #endif /* KEEP_PEER_CERT */
  8252. #if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
  8253. /* increments ref count of WOLFSSL_X509. Return 1 on success, 0 on error */
  8254. int wolfSSL_X509_up_ref(WOLFSSL_X509* x509)
  8255. {
  8256. if (x509) {
  8257. int ret;
  8258. wolfSSL_RefInc(&x509->ref, &ret);
  8259. if (ret != 0) {
  8260. WOLFSSL_MSG("Failed to lock x509 mutex");
  8261. return WOLFSSL_FAILURE;
  8262. }
  8263. return WOLFSSL_SUCCESS;
  8264. }
  8265. return WOLFSSL_FAILURE;
  8266. }
  8267. #endif /* OPENSSL_EXTRA_X509_SMALL || OPENSSL_EXTRA */
  8268. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
  8269. WOLF_STACK_OF(WOLFSSL_X509)* wolfSSL_X509_chain_up_ref(
  8270. WOLF_STACK_OF(WOLFSSL_X509)* chain)
  8271. {
  8272. /* wolfSSL_sk_dup takes care of doing a deep copy */
  8273. return wolfSSL_sk_dup(chain);
  8274. }
  8275. #endif
  8276. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  8277. void wolfSSL_X509_NAME_free(WOLFSSL_X509_NAME *name)
  8278. {
  8279. WOLFSSL_ENTER("wolfSSL_X509_NAME_free");
  8280. FreeX509Name(name);
  8281. if (name != NULL) {
  8282. XFREE(name, name->heap, DYNAMIC_TYPE_X509);
  8283. }
  8284. }
  8285. /* Malloc's a new WOLFSSL_X509_NAME structure
  8286. *
  8287. * returns NULL on failure, otherwise returns a new structure.
  8288. */
  8289. WOLFSSL_X509_NAME* wolfSSL_X509_NAME_new_ex(void *heap)
  8290. {
  8291. WOLFSSL_X509_NAME* name;
  8292. WOLFSSL_ENTER("wolfSSL_X509_NAME_new_ex");
  8293. name = (WOLFSSL_X509_NAME*)XMALLOC(sizeof(WOLFSSL_X509_NAME), heap,
  8294. DYNAMIC_TYPE_X509);
  8295. if (name != NULL) {
  8296. InitX509Name(name, 1, heap);
  8297. }
  8298. return name;
  8299. }
  8300. WOLFSSL_X509_NAME* wolfSSL_X509_NAME_new(void) {
  8301. return wolfSSL_X509_NAME_new_ex(NULL);
  8302. }
  8303. /* Creates a duplicate of a WOLFSSL_X509_NAME structure.
  8304. Returns a new WOLFSSL_X509_NAME structure or NULL on failure */
  8305. WOLFSSL_X509_NAME* wolfSSL_X509_NAME_dup(WOLFSSL_X509_NAME *name)
  8306. {
  8307. WOLFSSL_X509_NAME* copy = NULL;
  8308. WOLFSSL_ENTER("wolfSSL_X509_NAME_dup");
  8309. if (name == NULL) {
  8310. WOLFSSL_MSG("NULL parameter");
  8311. return NULL;
  8312. }
  8313. if (!(copy = wolfSSL_X509_NAME_new_ex(name->heap))) {
  8314. return NULL;
  8315. }
  8316. /* copy contents */
  8317. InitX509Name(copy, 1, name->heap);
  8318. if (wolfSSL_X509_NAME_copy(name, copy) != WOLFSSL_SUCCESS) {
  8319. wolfSSL_X509_NAME_free(copy);
  8320. return NULL;
  8321. }
  8322. return copy;
  8323. }
  8324. #ifdef WOLFSSL_CERT_GEN
  8325. #if defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_EXT) || defined(OPENSSL_EXTRA)
  8326. /* Helper function to copy cert name from a WOLFSSL_X509_NAME structure to
  8327. * a Cert structure.
  8328. *
  8329. * returns length of DER on success and a negative error value on failure
  8330. */
  8331. static int CopyX509NameToCert(WOLFSSL_X509_NAME* n, byte* out)
  8332. {
  8333. unsigned char* der = NULL;
  8334. int length = BAD_FUNC_ARG, ret;
  8335. word32 idx = 0;
  8336. ret = wolfSSL_i2d_X509_NAME(n, &der);
  8337. if (ret > (int)sizeof(CertName) || ret < 0) {
  8338. WOLFSSL_MSG("Name conversion error");
  8339. ret = MEMORY_E;
  8340. }
  8341. if (ret > 0) {
  8342. /* strip off sequence, this gets added on certificate creation */
  8343. ret = GetSequence(der, &idx, &length, ret);
  8344. }
  8345. if (ret > 0) {
  8346. XMEMCPY(out, der + idx, length);
  8347. }
  8348. if (der != NULL)
  8349. XFREE(der, NULL, DYNAMIC_TYPE_OPENSSL);
  8350. return length;
  8351. }
  8352. #endif
  8353. #ifdef WOLFSSL_CERT_REQ
  8354. static int ReqCertFromX509(Cert* cert, WOLFSSL_X509* req)
  8355. {
  8356. int ret;
  8357. if (wc_InitCert(cert) != 0)
  8358. return WOLFSSL_FAILURE;
  8359. ret = CopyX509NameToCert(&req->subject, cert->sbjRaw);
  8360. if (ret < 0) {
  8361. WOLFSSL_MSG("REQ subject conversion error");
  8362. ret = MEMORY_E;
  8363. }
  8364. else {
  8365. ret = WOLFSSL_SUCCESS;
  8366. }
  8367. if (ret == WOLFSSL_SUCCESS) {
  8368. #if defined(OPENSSL_ALL)
  8369. int idx;
  8370. #endif
  8371. cert->version = req->version;
  8372. cert->isCA = req->isCa;
  8373. cert->basicConstSet = req->basicConstSet;
  8374. #ifdef WOLFSSL_CERT_EXT
  8375. if (req->subjKeyIdSz != 0) {
  8376. XMEMCPY(cert->skid, req->subjKeyId, req->subjKeyIdSz);
  8377. cert->skidSz = req->subjKeyIdSz;
  8378. }
  8379. if (req->keyUsageSet)
  8380. cert->keyUsage = req->keyUsage;
  8381. cert->extKeyUsage = req->extKeyUsage;
  8382. #endif
  8383. XMEMCPY(cert->challengePw, req->challengePw, CTC_NAME_SIZE);
  8384. cert->challengePwPrintableString = req->challengePw[0] != 0;
  8385. #if defined(OPENSSL_ALL)
  8386. idx = wolfSSL_X509_REQ_get_attr_by_NID(req,
  8387. NID_pkcs9_unstructuredName, -1);
  8388. if (idx != WOLFSSL_FATAL_ERROR) {
  8389. WOLFSSL_X509_ATTRIBUTE *attr;
  8390. attr = wolfSSL_X509_REQ_get_attr(req, idx);
  8391. if (attr != NULL) {
  8392. const unsigned char *attrData;
  8393. int attrDataSz;
  8394. attrData = wolfSSL_ASN1_STRING_get0_data(
  8395. attr->value->value.asn1_string);
  8396. attrDataSz = wolfSSL_ASN1_STRING_length(
  8397. attr->value->value.asn1_string);
  8398. /* +1 to make sure is terminated string */
  8399. if (attrDataSz + 1 > CTC_NAME_SIZE) {
  8400. WOLFSSL_MSG("attribute size was too large to copy");
  8401. ret = REQ_ATTRIBUTE_E;
  8402. }
  8403. else {
  8404. XMEMCPY(cert->unstructuredName, attrData, attrDataSz);
  8405. cert->unstructuredName[attrDataSz] = '\0';
  8406. }
  8407. }
  8408. }
  8409. #ifdef WOLFSSL_CUSTOM_OID
  8410. if (ret == WOLFSSL_SUCCESS) {
  8411. if ((req->customExtCount < 0) ||
  8412. (req->customExtCount >= NUM_CUSTOM_EXT)) {
  8413. WOLFSSL_MSG("Bad value for customExtCount.");
  8414. ret = WOLFSSL_FAILURE;
  8415. }
  8416. if (ret == WOLFSSL_SUCCESS) {
  8417. for (idx = 0; idx < req->customExtCount; idx++) {
  8418. /* Note that ownership is NOT transferred.
  8419. * req->custom_exts buffers still need to be cleaned
  8420. * up. */
  8421. cert->customCertExt[idx] = req->custom_exts[idx];
  8422. }
  8423. cert->customCertExtCount = req->customExtCount;
  8424. }
  8425. }
  8426. #endif /* WOLFSSL_CUSTOM_OID */
  8427. #endif /* OPENSSL_ALL */
  8428. #ifdef WOLFSSL_ALT_NAMES
  8429. if (ret == WOLFSSL_SUCCESS) {
  8430. cert->altNamesSz = FlattenAltNames(cert->altNames,
  8431. sizeof(cert->altNames), req->altNames);
  8432. }
  8433. #endif /* WOLFSSL_ALT_NAMES */
  8434. }
  8435. return ret;
  8436. }
  8437. #endif /* WOLFSSL_CERT_REQ */
  8438. /* converts WOLFSSL_AN1_TIME to Cert form, returns positive size on
  8439. * success */
  8440. static int CertDateFromX509(byte* out, int outSz, WOLFSSL_ASN1_TIME* t)
  8441. {
  8442. int sz, i;
  8443. if (t->length + 1 >= outSz) {
  8444. return BUFFER_E;
  8445. }
  8446. out[0] = (byte) t->type;
  8447. sz = SetLength(t->length, out + 1) + 1; /* gen tag */
  8448. for (i = 0; i < t->length; i++) {
  8449. out[sz + i] = t->data[i];
  8450. }
  8451. return t->length + sz;
  8452. }
  8453. /* convert a WOLFSSL_X509 to a Cert structure for writing out */
  8454. static int CertFromX509(Cert* cert, WOLFSSL_X509* x509)
  8455. {
  8456. int ret;
  8457. #ifdef WOLFSSL_CERT_EXT
  8458. int i;
  8459. #endif
  8460. WOLFSSL_ENTER("wolfSSL_X509_to_Cert");
  8461. if (x509 == NULL || cert == NULL) {
  8462. return BAD_FUNC_ARG;
  8463. }
  8464. wc_InitCert(cert);
  8465. cert->version = (int)wolfSSL_X509_get_version(x509);
  8466. if (x509->notBefore.length > 0) {
  8467. cert->beforeDateSz = CertDateFromX509(cert->beforeDate,
  8468. CTC_DATE_SIZE, &x509->notBefore);
  8469. if (cert->beforeDateSz <= 0){
  8470. WOLFSSL_MSG("Error converting WOLFSSL_X509 not before date");
  8471. return WOLFSSL_FAILURE;
  8472. }
  8473. }
  8474. else {
  8475. cert->beforeDateSz = 0;
  8476. }
  8477. if (x509->notAfter.length > 0) {
  8478. cert->afterDateSz = CertDateFromX509(cert->afterDate,
  8479. CTC_DATE_SIZE, &x509->notAfter);
  8480. if (cert->afterDateSz <= 0){
  8481. WOLFSSL_MSG("Error converting WOLFSSL_X509 not after date");
  8482. return WOLFSSL_FAILURE;
  8483. }
  8484. }
  8485. else {
  8486. cert->afterDateSz = 0;
  8487. }
  8488. #ifdef WOLFSSL_ALT_NAMES
  8489. cert->altNamesSz = FlattenAltNames(cert->altNames,
  8490. sizeof(cert->altNames), x509->altNames);
  8491. #endif /* WOLFSSL_ALT_NAMES */
  8492. cert->sigType = wolfSSL_X509_get_signature_type(x509);
  8493. cert->keyType = x509->pubKeyOID;
  8494. cert->isCA = wolfSSL_X509_get_isCA(x509);
  8495. cert->basicConstSet = x509->basicConstSet;
  8496. #ifdef WOLFSSL_CERT_EXT
  8497. if (x509->subjKeyIdSz <= CTC_MAX_SKID_SIZE) {
  8498. if (x509->subjKeyId) {
  8499. XMEMCPY(cert->skid, x509->subjKeyId, x509->subjKeyIdSz);
  8500. }
  8501. cert->skidSz = (int)x509->subjKeyIdSz;
  8502. }
  8503. else {
  8504. WOLFSSL_MSG("Subject Key ID too large");
  8505. WOLFSSL_ERROR_VERBOSE(BUFFER_E);
  8506. return WOLFSSL_FAILURE;
  8507. }
  8508. if (x509->authKeyIdSz < sizeof(cert->akid)) {
  8509. #ifdef WOLFSSL_AKID_NAME
  8510. cert->rawAkid = 0;
  8511. if (x509->authKeyIdSrc) {
  8512. XMEMCPY(cert->akid, x509->authKeyIdSrc, x509->authKeyIdSrcSz);
  8513. cert->akidSz = (int)x509->authKeyIdSrcSz;
  8514. cert->rawAkid = 1;
  8515. }
  8516. else
  8517. #endif
  8518. if (x509->authKeyId) {
  8519. XMEMCPY(cert->akid, x509->authKeyId, x509->authKeyIdSz);
  8520. cert->akidSz = (int)x509->authKeyIdSz;
  8521. }
  8522. }
  8523. else {
  8524. WOLFSSL_MSG("Auth Key ID too large");
  8525. WOLFSSL_ERROR_VERBOSE(BUFFER_E);
  8526. return WOLFSSL_FAILURE;
  8527. }
  8528. for (i = 0; i < x509->certPoliciesNb; i++) {
  8529. /* copy the smaller of MAX macros, by default they are currently equal*/
  8530. if ((int)CTC_MAX_CERTPOL_SZ <= (int)MAX_CERTPOL_SZ) {
  8531. XMEMCPY(cert->certPolicies[i], x509->certPolicies[i],
  8532. CTC_MAX_CERTPOL_SZ);
  8533. }
  8534. else {
  8535. XMEMCPY(cert->certPolicies[i], x509->certPolicies[i],
  8536. MAX_CERTPOL_SZ);
  8537. }
  8538. }
  8539. cert->certPoliciesNb = (word16)x509->certPoliciesNb;
  8540. cert->keyUsage = x509->keyUsage;
  8541. cert->extKeyUsage = x509->extKeyUsage;
  8542. cert->nsCertType = x509->nsCertType;
  8543. if (x509->rawCRLInfo != NULL) {
  8544. if (x509->rawCRLInfoSz > CTC_MAX_CRLINFO_SZ) {
  8545. WOLFSSL_MSG("CRL Info too large");
  8546. WOLFSSL_ERROR_VERBOSE(BUFFER_E);
  8547. return WOLFSSL_FAILURE;
  8548. }
  8549. XMEMCPY(cert->crlInfo, x509->rawCRLInfo, x509->rawCRLInfoSz);
  8550. cert->crlInfoSz = x509->rawCRLInfoSz;
  8551. }
  8552. #endif /* WOLFSSL_CERT_EXT */
  8553. #ifdef WOLFSSL_CERT_REQ
  8554. /* copy over challenge password for REQ certs */
  8555. XMEMCPY(cert->challengePw, x509->challengePw, CTC_NAME_SIZE);
  8556. #endif
  8557. /* Only makes sense to do this for OPENSSL_EXTRA because without
  8558. * this define the function will error out below */
  8559. #ifdef OPENSSL_EXTRA
  8560. if (x509->serialSz == 0 && x509->serialNumber != NULL &&
  8561. /* Check if the buffer contains more than just the
  8562. * ASN tag and length */
  8563. x509->serialNumber->length > 2) {
  8564. if (wolfSSL_X509_set_serialNumber(x509, x509->serialNumber)
  8565. != WOLFSSL_SUCCESS) {
  8566. WOLFSSL_MSG("Failed to set serial number");
  8567. return WOLFSSL_FAILURE;
  8568. }
  8569. }
  8570. #endif
  8571. /* set serial number */
  8572. if (x509->serialSz > 0) {
  8573. #if defined(OPENSSL_EXTRA)
  8574. byte serial[EXTERNAL_SERIAL_SIZE];
  8575. int serialSz = EXTERNAL_SERIAL_SIZE;
  8576. ret = wolfSSL_X509_get_serial_number(x509, serial, &serialSz);
  8577. if (ret != WOLFSSL_SUCCESS) {
  8578. WOLFSSL_MSG("Serial size error");
  8579. return WOLFSSL_FAILURE;
  8580. }
  8581. if (serialSz > EXTERNAL_SERIAL_SIZE ||
  8582. serialSz > CTC_SERIAL_SIZE) {
  8583. WOLFSSL_MSG("Serial size too large error");
  8584. WOLFSSL_ERROR_VERBOSE(BUFFER_E);
  8585. return WOLFSSL_FAILURE;
  8586. }
  8587. XMEMCPY(cert->serial, serial, serialSz);
  8588. cert->serialSz = serialSz;
  8589. #else
  8590. WOLFSSL_MSG("Getting X509 serial number not supported");
  8591. return WOLFSSL_FAILURE;
  8592. #endif
  8593. }
  8594. /* copy over Name structures */
  8595. if (x509->issuerSet)
  8596. cert->selfSigned = 0;
  8597. #if defined(WOLFSSL_CERT_EXT) || defined(OPENSSL_EXTRA)
  8598. ret = CopyX509NameToCert(&x509->subject, cert->sbjRaw);
  8599. if (ret < 0) {
  8600. WOLFSSL_MSG("Subject conversion error");
  8601. return MEMORY_E;
  8602. }
  8603. if (cert->selfSigned) {
  8604. XMEMCPY(cert->issRaw, cert->sbjRaw, sizeof(CertName));
  8605. }
  8606. else {
  8607. ret = CopyX509NameToCert(&x509->issuer, cert->issRaw);
  8608. if (ret < 0) {
  8609. WOLFSSL_MSG("Issuer conversion error");
  8610. return MEMORY_E;
  8611. }
  8612. }
  8613. #endif
  8614. cert->heap = x509->heap;
  8615. (void)ret;
  8616. return WOLFSSL_SUCCESS;
  8617. }
  8618. /* returns the sig type to use on success i.e CTC_SHAwRSA and WOLFSSL_FALURE
  8619. * on fail case */
  8620. static int wolfSSL_sigTypeFromPKEY(WOLFSSL_EVP_MD* md,
  8621. WOLFSSL_EVP_PKEY* pkey)
  8622. {
  8623. #if !defined(NO_PWDBASED) && defined(OPENSSL_EXTRA)
  8624. int hashType;
  8625. int sigType = WOLFSSL_FAILURE;
  8626. /* Convert key type and hash algorithm to a signature algorithm */
  8627. if (wolfSSL_EVP_get_hashinfo(md, &hashType, NULL) == WOLFSSL_FAILURE) {
  8628. return WOLFSSL_FAILURE;
  8629. }
  8630. if (pkey->type == EVP_PKEY_RSA) {
  8631. switch (hashType) {
  8632. case WC_HASH_TYPE_SHA:
  8633. sigType = CTC_SHAwRSA;
  8634. break;
  8635. case WC_HASH_TYPE_SHA224:
  8636. sigType = CTC_SHA224wRSA;
  8637. break;
  8638. case WC_HASH_TYPE_SHA256:
  8639. sigType = CTC_SHA256wRSA;
  8640. break;
  8641. case WC_HASH_TYPE_SHA384:
  8642. sigType = CTC_SHA384wRSA;
  8643. break;
  8644. case WC_HASH_TYPE_SHA512:
  8645. sigType = CTC_SHA512wRSA;
  8646. break;
  8647. #ifdef WOLFSSL_SHA3
  8648. case WC_HASH_TYPE_SHA3_224:
  8649. sigType = CTC_SHA3_224wRSA;
  8650. break;
  8651. case WC_HASH_TYPE_SHA3_256:
  8652. sigType = CTC_SHA3_256wRSA;
  8653. break;
  8654. case WC_HASH_TYPE_SHA3_384:
  8655. sigType = CTC_SHA3_384wRSA;
  8656. break;
  8657. case WC_HASH_TYPE_SHA3_512:
  8658. sigType = CTC_SHA3_512wRSA;
  8659. break;
  8660. #endif
  8661. default:
  8662. return WOLFSSL_FAILURE;
  8663. }
  8664. }
  8665. else if (pkey->type == EVP_PKEY_EC) {
  8666. switch (hashType) {
  8667. case WC_HASH_TYPE_SHA:
  8668. sigType = CTC_SHAwECDSA;
  8669. break;
  8670. case WC_HASH_TYPE_SHA224:
  8671. sigType = CTC_SHA224wECDSA;
  8672. break;
  8673. case WC_HASH_TYPE_SHA256:
  8674. sigType = CTC_SHA256wECDSA;
  8675. break;
  8676. case WC_HASH_TYPE_SHA384:
  8677. sigType = CTC_SHA384wECDSA;
  8678. break;
  8679. case WC_HASH_TYPE_SHA512:
  8680. sigType = CTC_SHA512wECDSA;
  8681. break;
  8682. #ifdef WOLFSSL_SHA3
  8683. case WC_HASH_TYPE_SHA3_224:
  8684. sigType = CTC_SHA3_224wECDSA;
  8685. break;
  8686. case WC_HASH_TYPE_SHA3_256:
  8687. sigType = CTC_SHA3_256wECDSA;
  8688. break;
  8689. case WC_HASH_TYPE_SHA3_384:
  8690. sigType = CTC_SHA3_384wECDSA;
  8691. break;
  8692. case WC_HASH_TYPE_SHA3_512:
  8693. sigType = CTC_SHA3_512wECDSA;
  8694. break;
  8695. #endif
  8696. default:
  8697. return WOLFSSL_FAILURE;
  8698. }
  8699. }
  8700. else
  8701. return WOLFSSL_FAILURE;
  8702. return sigType;
  8703. #else
  8704. (void)md;
  8705. (void)pkey;
  8706. WOLFSSL_MSG("Cannot get hashinfo when NO_PWDBASED is defined");
  8707. return WOLFSSL_FAILURE;
  8708. #endif /* !NO_PWDBASED && OPENSSL_EXTRA */
  8709. }
  8710. /* generates DER buffer from WOLFSSL_X509
  8711. * If req == 1 then creates a request DER buffer
  8712. *
  8713. * updates derSz with certificate body size on success
  8714. * return WOLFSSL_SUCCESS on success
  8715. */
  8716. static int wolfssl_x509_make_der(WOLFSSL_X509* x509, int req,
  8717. unsigned char* der, int* derSz, int includeSig)
  8718. {
  8719. int ret = WOLFSSL_FAILURE;
  8720. int totalLen;
  8721. Cert* cert = NULL;
  8722. void* key = NULL;
  8723. int type = -1;
  8724. #ifndef NO_RSA
  8725. RsaKey* rsa = NULL;
  8726. #endif
  8727. #ifdef HAVE_ECC
  8728. ecc_key* ecc = NULL;
  8729. #endif
  8730. #ifndef NO_DSA
  8731. DsaKey* dsa = NULL;
  8732. #endif
  8733. WC_RNG rng;
  8734. word32 idx = 0;
  8735. if (x509 == NULL || der == NULL || derSz == NULL)
  8736. return BAD_FUNC_ARG;
  8737. #ifndef WOLFSSL_CERT_REQ
  8738. if (req) {
  8739. WOLFSSL_MSG("WOLFSSL_CERT_REQ needed for certificate request");
  8740. return WOLFSSL_FAILURE;
  8741. }
  8742. #endif
  8743. /* allocate Cert struct on heap since it is large */
  8744. cert = (Cert*)XMALLOC(sizeof(Cert), NULL, DYNAMIC_TYPE_CERT);
  8745. if (cert == NULL) {
  8746. WOLFSSL_MSG("Failed to allocate memory for Cert struct");
  8747. return WOLFSSL_FAILURE;
  8748. }
  8749. XMEMSET(cert, 0, sizeof(Cert));
  8750. #ifdef WOLFSSL_CERT_REQ
  8751. if (req) {
  8752. if (ReqCertFromX509(cert, x509) != WOLFSSL_SUCCESS) {
  8753. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  8754. return WOLFSSL_FAILURE;
  8755. }
  8756. }
  8757. else
  8758. #endif
  8759. {
  8760. /* Create a Cert that has the certificate fields. */
  8761. if (CertFromX509(cert, x509) != WOLFSSL_SUCCESS) {
  8762. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  8763. return WOLFSSL_FAILURE;
  8764. }
  8765. }
  8766. /* Create a public key object from requests public key. */
  8767. #ifndef NO_RSA
  8768. if (x509->pubKeyOID == RSAk) {
  8769. rsa = (RsaKey*)XMALLOC(sizeof(RsaKey), NULL, DYNAMIC_TYPE_RSA);
  8770. if (rsa == NULL) {
  8771. WOLFSSL_MSG("Failed to allocate memory for RsaKey");
  8772. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  8773. return WOLFSSL_FAILURE;
  8774. }
  8775. type = RSA_TYPE;
  8776. ret = wc_InitRsaKey(rsa, x509->heap);
  8777. if (ret != 0) {
  8778. XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
  8779. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  8780. return ret;
  8781. }
  8782. ret = wc_RsaPublicKeyDecode(x509->pubKey.buffer, &idx, rsa,
  8783. x509->pubKey.length);
  8784. if (ret != 0) {
  8785. WOLFSSL_ERROR_VERBOSE(ret);
  8786. wc_FreeRsaKey(rsa);
  8787. XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
  8788. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  8789. return ret;
  8790. }
  8791. key = (void*)rsa;
  8792. }
  8793. #endif
  8794. #ifdef HAVE_ECC
  8795. if (x509->pubKeyOID == ECDSAk) {
  8796. ecc = (ecc_key*)XMALLOC(sizeof(ecc_key), NULL, DYNAMIC_TYPE_ECC);
  8797. if (ecc == NULL) {
  8798. WOLFSSL_MSG("Failed to allocate memory for ecc_key");
  8799. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  8800. return WOLFSSL_FAILURE;
  8801. }
  8802. type = ECC_TYPE;
  8803. ret = wc_ecc_init(ecc);
  8804. if (ret != 0) {
  8805. XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
  8806. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  8807. return ret;
  8808. }
  8809. ret = wc_EccPublicKeyDecode(x509->pubKey.buffer, &idx, ecc,
  8810. x509->pubKey.length);
  8811. if (ret != 0) {
  8812. WOLFSSL_ERROR_VERBOSE(ret);
  8813. wc_ecc_free(ecc);
  8814. XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
  8815. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  8816. return ret;
  8817. }
  8818. key = (void*)ecc;
  8819. }
  8820. #endif
  8821. #ifndef NO_DSA
  8822. if (x509->pubKeyOID == DSAk) {
  8823. dsa = (DsaKey*)XMALLOC(sizeof(DsaKey), NULL, DYNAMIC_TYPE_DSA);
  8824. if (dsa == NULL) {
  8825. WOLFSSL_MSG("Failed to allocate memory for DsaKey");
  8826. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  8827. return WOLFSSL_FAILURE;
  8828. }
  8829. type = DSA_TYPE;
  8830. ret = wc_InitDsaKey(dsa);
  8831. if (ret != 0) {
  8832. XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
  8833. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  8834. return ret;
  8835. }
  8836. ret = wc_DsaPublicKeyDecode(x509->pubKey.buffer, &idx, dsa,
  8837. x509->pubKey.length);
  8838. if (ret != 0) {
  8839. WOLFSSL_ERROR_VERBOSE(ret);
  8840. wc_FreeDsaKey(dsa);
  8841. XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
  8842. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  8843. return ret;
  8844. }
  8845. key = (void*)dsa;
  8846. }
  8847. #endif
  8848. if (key == NULL) {
  8849. WOLFSSL_MSG("No public key found for certificate");
  8850. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  8851. return WOLFSSL_FAILURE;
  8852. }
  8853. /* Make the body of the certificate request. */
  8854. #ifdef WOLFSSL_CERT_REQ
  8855. if (req) {
  8856. ret = wc_MakeCertReq_ex(cert, der, *derSz, type, key);
  8857. }
  8858. else
  8859. #endif
  8860. {
  8861. ret = wc_InitRng(&rng);
  8862. if (ret != 0) {
  8863. ret = WOLFSSL_FAILURE;
  8864. goto cleanup;
  8865. }
  8866. ret = wc_MakeCert_ex(cert, der, *derSz, type, key, &rng);
  8867. wc_FreeRng(&rng);
  8868. }
  8869. if (ret <= 0) {
  8870. WOLFSSL_ERROR_VERBOSE(ret);
  8871. ret = WOLFSSL_FAILURE;
  8872. goto cleanup;
  8873. }
  8874. if ((x509->serialSz == 0) &&
  8875. (cert->serialSz <= EXTERNAL_SERIAL_SIZE) &&
  8876. (cert->serialSz > 0)) {
  8877. #if defined(OPENSSL_EXTRA)
  8878. WOLFSSL_ASN1_INTEGER *i = wolfSSL_ASN1_INTEGER_new();
  8879. if (i == NULL) {
  8880. WOLFSSL_MSG("wolfSSL_ASN1_INTEGER_new error");
  8881. ret = WOLFSSL_FAILURE;
  8882. goto cleanup;
  8883. }
  8884. else {
  8885. i->length = cert->serialSz + 2;
  8886. i->data[0] = ASN_INTEGER;
  8887. i->data[1] = (unsigned char)cert->serialSz;
  8888. XMEMCPY(i->data + 2, cert->serial, cert->serialSz);
  8889. if (wolfSSL_X509_set_serialNumber(x509, i) != WOLFSSL_SUCCESS) {
  8890. WOLFSSL_MSG("Issue setting generated serial number");
  8891. wolfSSL_ASN1_INTEGER_free(i);
  8892. ret = WOLFSSL_FAILURE;
  8893. goto cleanup;
  8894. }
  8895. wolfSSL_ASN1_INTEGER_free(i);
  8896. }
  8897. #else
  8898. WOLFSSL_MSG("ASN1_INTEGER API not in build");
  8899. ret = WOLFSSL_FAILURE;
  8900. goto cleanup;
  8901. #endif /* OPENSSL_EXTRA */
  8902. }
  8903. if (includeSig) {
  8904. if (!x509->sig.buffer) {
  8905. WOLFSSL_MSG("No signature buffer");
  8906. ret = WOLFSSL_FAILURE;
  8907. goto cleanup;
  8908. }
  8909. totalLen = AddSignature(NULL, ret, NULL, x509->sig.length,
  8910. x509->sigOID);
  8911. if (totalLen > *derSz) {
  8912. WOLFSSL_MSG("Output der buffer too short");
  8913. ret = WOLFSSL_FAILURE;
  8914. goto cleanup;
  8915. }
  8916. ret = AddSignature(der, ret, x509->sig.buffer,
  8917. x509->sig.length, x509->sigOID);
  8918. }
  8919. *derSz = ret;
  8920. ret = WOLFSSL_SUCCESS;
  8921. cleanup:
  8922. /* Dispose of the public key object. */
  8923. #ifndef NO_RSA
  8924. if (x509->pubKeyOID == RSAk) {
  8925. wc_FreeRsaKey(rsa);
  8926. XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
  8927. }
  8928. #endif
  8929. #ifdef HAVE_ECC
  8930. if (x509->pubKeyOID == ECDSAk) {
  8931. wc_ecc_free(ecc);
  8932. XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
  8933. }
  8934. #endif
  8935. #ifndef NO_DSA
  8936. if (x509->pubKeyOID == DSAk) {
  8937. wc_FreeDsaKey(dsa);
  8938. XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
  8939. }
  8940. #endif
  8941. XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
  8942. return ret;
  8943. }
  8944. /* signs a der buffer for the WOLFSSL_X509 structure using the PKEY and MD
  8945. * hash passed in
  8946. *
  8947. * WARNING: this free's and replaces the existing DER buffer in the
  8948. * WOLFSSL_X509 with the newly signed buffer.
  8949. * returns size of signed buffer on success and negative values on fail
  8950. */
  8951. static int wolfSSL_X509_resign_cert(WOLFSSL_X509* x509, int req,
  8952. unsigned char* der, int derSz, int certBodySz, WOLFSSL_EVP_MD* md,
  8953. WOLFSSL_EVP_PKEY* pkey)
  8954. {
  8955. int ret;
  8956. void* key = NULL;
  8957. int type = -1;
  8958. int sigType;
  8959. WC_RNG rng;
  8960. (void)req;
  8961. WOLFSSL_ENTER("wolfSSL_X509_resign_cert");
  8962. sigType = wolfSSL_sigTypeFromPKEY(md, pkey);
  8963. if (sigType == WOLFSSL_FAILURE) {
  8964. WOLFSSL_MSG("Error getting signature type from pkey");
  8965. return WOLFSSL_FATAL_ERROR;
  8966. }
  8967. /* Get the private key object and type from pkey. */
  8968. #ifndef NO_RSA
  8969. if (pkey->type == EVP_PKEY_RSA) {
  8970. type = RSA_TYPE;
  8971. key = pkey->rsa->internal;
  8972. }
  8973. #endif
  8974. #ifdef HAVE_ECC
  8975. if (pkey->type == EVP_PKEY_EC) {
  8976. type = ECC_TYPE;
  8977. key = pkey->ecc->internal;
  8978. }
  8979. #endif
  8980. /* Sign the certificate (request) body. */
  8981. ret = wc_InitRng(&rng);
  8982. if (ret != 0)
  8983. return ret;
  8984. ret = wc_SignCert_ex(certBodySz, sigType, der, derSz, type, key, &rng);
  8985. wc_FreeRng(&rng);
  8986. if (ret < 0) {
  8987. WOLFSSL_LEAVE("wolfSSL_X509_resign_cert", ret);
  8988. return ret;
  8989. }
  8990. derSz = ret;
  8991. /* Extract signature from buffer */
  8992. {
  8993. word32 idx = 0;
  8994. int len = 0;
  8995. /* Read top level sequence */
  8996. if (GetSequence(der, &idx, &len, derSz) < 0) {
  8997. WOLFSSL_MSG("GetSequence error");
  8998. return WOLFSSL_FATAL_ERROR;
  8999. }
  9000. /* Move idx to signature */
  9001. idx += certBodySz;
  9002. /* Read signature algo sequence */
  9003. if (GetSequence(der, &idx, &len, derSz) < 0) {
  9004. WOLFSSL_MSG("GetSequence error");
  9005. return WOLFSSL_FATAL_ERROR;
  9006. }
  9007. idx += len;
  9008. /* Read signature bit string */
  9009. if (CheckBitString(der, &idx, &len, derSz, 0, NULL) != 0) {
  9010. WOLFSSL_MSG("CheckBitString error");
  9011. return WOLFSSL_FATAL_ERROR;
  9012. }
  9013. /* Sanity check */
  9014. if (idx + len != (word32)derSz) {
  9015. WOLFSSL_MSG("unexpected asn1 structure");
  9016. return WOLFSSL_FATAL_ERROR;
  9017. }
  9018. x509->sig.length = 0;
  9019. if (x509->sig.buffer)
  9020. XFREE(x509->sig.buffer, x509->heap, DYNAMIC_TYPE_SIGNATURE);
  9021. x509->sig.buffer = (byte*)XMALLOC(len, x509->heap,
  9022. DYNAMIC_TYPE_SIGNATURE);
  9023. if (!x509->sig.buffer) {
  9024. WOLFSSL_MSG("malloc error");
  9025. return WOLFSSL_FATAL_ERROR;
  9026. }
  9027. XMEMCPY(x509->sig.buffer, der + idx, len);
  9028. x509->sig.length = len;
  9029. }
  9030. /* Put in the new certificate encoding into the x509 object. */
  9031. FreeDer(&x509->derCert);
  9032. type = CERT_TYPE;
  9033. #ifdef WOLFSSL_CERT_REQ
  9034. if (req) {
  9035. type = CERTREQ_TYPE;
  9036. }
  9037. #endif
  9038. if (AllocDer(&x509->derCert, derSz, type, NULL) != 0)
  9039. return WOLFSSL_FATAL_ERROR;
  9040. XMEMCPY(x509->derCert->buffer, der, derSz);
  9041. x509->derCert->length = derSz;
  9042. return ret;
  9043. }
  9044. #ifndef WC_MAX_X509_GEN
  9045. /* able to override max size until dynamic buffer created */
  9046. #define WC_MAX_X509_GEN 4096
  9047. #endif
  9048. /* returns the size of signature on success */
  9049. int wolfSSL_X509_sign(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey,
  9050. const WOLFSSL_EVP_MD* md)
  9051. {
  9052. int ret;
  9053. /* @TODO dynamic set based on expected cert size */
  9054. byte *der = (byte *)XMALLOC(WC_MAX_X509_GEN, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9055. int derSz = WC_MAX_X509_GEN;
  9056. WOLFSSL_ENTER("wolfSSL_X509_sign");
  9057. if (x509 == NULL || pkey == NULL || md == NULL) {
  9058. ret = WOLFSSL_FAILURE;
  9059. goto out;
  9060. }
  9061. x509->sigOID = wolfSSL_sigTypeFromPKEY((WOLFSSL_EVP_MD*)md, pkey);
  9062. if ((ret = wolfssl_x509_make_der(x509, 0, der, &derSz, 0)) !=
  9063. WOLFSSL_SUCCESS) {
  9064. WOLFSSL_MSG("Unable to make DER for X509");
  9065. WOLFSSL_LEAVE("wolfSSL_X509_sign", ret);
  9066. (void)ret;
  9067. ret = WOLFSSL_FAILURE;
  9068. goto out;
  9069. }
  9070. ret = wolfSSL_X509_resign_cert(x509, 0, der, WC_MAX_X509_GEN, derSz,
  9071. (WOLFSSL_EVP_MD*)md, pkey);
  9072. if (ret <= 0) {
  9073. WOLFSSL_LEAVE("wolfSSL_X509_sign", ret);
  9074. ret = WOLFSSL_FAILURE;
  9075. goto out;
  9076. }
  9077. out:
  9078. if (der)
  9079. XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9080. return ret;
  9081. }
  9082. #if defined(OPENSSL_EXTRA)
  9083. int wolfSSL_X509_sign_ctx(WOLFSSL_X509 *x509, WOLFSSL_EVP_MD_CTX *ctx)
  9084. {
  9085. WOLFSSL_ENTER("wolfSSL_X509_sign_ctx");
  9086. if (!x509 || !ctx || !ctx->pctx || !ctx->pctx->pkey) {
  9087. WOLFSSL_MSG("Bad parameter");
  9088. return WOLFSSL_FAILURE;
  9089. }
  9090. return wolfSSL_X509_sign(x509, ctx->pctx->pkey, wolfSSL_EVP_MD_CTX_md(ctx));
  9091. }
  9092. #endif /* OPENSSL_EXTRA */
  9093. #endif /* WOLFSSL_CERT_GEN */
  9094. #if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
  9095. defined(OPENSSL_EXTRA_X509_SMALL) || defined(WOLFSSL_WPAS_SMALL)
  9096. /* Converts from NID_* value to wolfSSL value if needed.
  9097. *
  9098. * @param [in] nid Numeric Id of a domain name component.
  9099. * @return Domain name tag values - wolfSSL internal values.
  9100. * @return -1 when nid isn't known.
  9101. */
  9102. static int ConvertNIDToWolfSSL(int nid)
  9103. {
  9104. switch (nid) {
  9105. case NID_commonName : return ASN_COMMON_NAME;
  9106. #ifdef WOLFSSL_CERT_NAME_ALL
  9107. case NID_name : return ASN_NAME;
  9108. case NID_givenName: return ASN_GIVEN_NAME;
  9109. case NID_dnQualifier : return ASN_DNQUALIFIER;
  9110. case NID_initials: return ASN_INITIALS;
  9111. #endif /* WOLFSSL_CERT_NAME_ALL */
  9112. case NID_surname : return ASN_SUR_NAME;
  9113. case NID_countryName: return ASN_COUNTRY_NAME;
  9114. case NID_localityName: return ASN_LOCALITY_NAME;
  9115. case NID_stateOrProvinceName: return ASN_STATE_NAME;
  9116. case NID_streetAddress: return ASN_STREET_ADDR;
  9117. case NID_organizationName: return ASN_ORG_NAME;
  9118. case NID_organizationalUnitName: return ASN_ORGUNIT_NAME;
  9119. case NID_emailAddress: return ASN_EMAIL_NAME;
  9120. case NID_pkcs9_contentType: return ASN_CONTENT_TYPE;
  9121. case NID_serialNumber: return ASN_SERIAL_NUMBER;
  9122. case NID_userId: return ASN_USER_ID;
  9123. case NID_businessCategory: return ASN_BUS_CAT;
  9124. case NID_domainComponent: return ASN_DOMAIN_COMPONENT;
  9125. case NID_postalCode: return ASN_POSTAL_CODE;
  9126. case NID_favouriteDrink: return ASN_FAVOURITE_DRINK;
  9127. default:
  9128. WOLFSSL_MSG("Attribute NID not found");
  9129. return -1;
  9130. }
  9131. }
  9132. #endif /* OPENSSL_ALL || OPENSSL_EXTRA ||
  9133. OPENSSL_EXTRA_X509_SMALL || WOLFSSL_WPAS_SMALL*/
  9134. #if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  9135. /* This is to convert the x509 name structure into canonical DER format */
  9136. /* , which has the following rules: */
  9137. /* convert to UTF8 */
  9138. /* convert to lower case */
  9139. /* multi-spaces collapsed */
  9140. /* leading SEQUENCE header is skipped */
  9141. /* @param name a pointer to X509_NAME that is to be converted */
  9142. /* @param out a pointer to converted data */
  9143. /* @return a number of converted bytes, otherwise <=0 error code */
  9144. int wolfSSL_i2d_X509_NAME_canon(WOLFSSL_X509_NAME* name, unsigned char** out)
  9145. {
  9146. int totalBytes = 0, i, idx;
  9147. byte *output, *local = NULL;
  9148. #ifdef WOLFSSL_SMALL_STACK
  9149. EncodedName* names = NULL;
  9150. #else
  9151. EncodedName names[MAX_NAME_ENTRIES];
  9152. #endif
  9153. if (name == NULL)
  9154. return BAD_FUNC_ARG;
  9155. #ifdef WOLFSSL_SMALL_STACK
  9156. names = (EncodedName*)XMALLOC(sizeof(EncodedName) * MAX_NAME_ENTRIES, NULL,
  9157. DYNAMIC_TYPE_TMP_BUFFER);
  9158. if (names == NULL)
  9159. return MEMORY_E;
  9160. #endif
  9161. XMEMSET(names, 0, sizeof(EncodedName) * MAX_NAME_ENTRIES);
  9162. for (i = 0; i < MAX_NAME_ENTRIES; i++) {
  9163. WOLFSSL_X509_NAME_ENTRY* entry;
  9164. int ret;
  9165. entry = wolfSSL_X509_NAME_get_entry(name, i);
  9166. if (entry != NULL && entry->set >= 1) {
  9167. const char* nameStr;
  9168. WOLFSSL_ASN1_STRING* data;
  9169. WOLFSSL_ASN1_STRING* cano_data;
  9170. cano_data = wolfSSL_ASN1_STRING_new();
  9171. if (cano_data == NULL) {
  9172. #ifdef WOLFSSL_SMALL_STACK
  9173. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9174. #endif
  9175. return MEMORY_E;
  9176. }
  9177. data = wolfSSL_X509_NAME_ENTRY_get_data(entry);
  9178. if (data == NULL) {
  9179. #ifdef WOLFSSL_SMALL_STACK
  9180. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9181. #endif
  9182. wolfSSL_ASN1_STRING_free(cano_data);
  9183. WOLFSSL_MSG("Error getting entry data");
  9184. return WOLFSSL_FATAL_ERROR;
  9185. }
  9186. if (wolfSSL_ASN1_STRING_canon(cano_data, data) != WOLFSSL_SUCCESS) {
  9187. #ifdef WOLFSSL_SMALL_STACK
  9188. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9189. #endif
  9190. wolfSSL_ASN1_STRING_free(cano_data);
  9191. return WOLFSSL_FAILURE;
  9192. }
  9193. nameStr = (const char*)wolfSSL_ASN1_STRING_data(cano_data);
  9194. ret = wc_EncodeNameCanonical(&names[i], nameStr, CTC_UTF8,
  9195. (byte)ConvertNIDToWolfSSL(entry->nid));
  9196. if (ret < 0) {
  9197. #ifdef WOLFSSL_SMALL_STACK
  9198. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9199. #endif
  9200. wolfSSL_ASN1_STRING_free(cano_data);
  9201. WOLFSSL_MSG("EncodeName failed");
  9202. return WOLFSSL_FATAL_ERROR;
  9203. }
  9204. totalBytes += ret;
  9205. wolfSSL_ASN1_STRING_free(cano_data);
  9206. }
  9207. }
  9208. if (out == NULL) {
  9209. /* If out is NULL, caller just wants length. */
  9210. #ifdef WOLFSSL_SMALL_STACK
  9211. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9212. #endif
  9213. return totalBytes;
  9214. }
  9215. /* skip header */
  9216. /* check if using buffer passed in */
  9217. if (*out == NULL) {
  9218. *out = local = (unsigned char*)XMALLOC(totalBytes, NULL,
  9219. DYNAMIC_TYPE_OPENSSL);
  9220. if (*out == NULL) {
  9221. return MEMORY_E;
  9222. }
  9223. }
  9224. output = *out;
  9225. idx = 0;
  9226. for (i = 0; i < MAX_NAME_ENTRIES; i++) {
  9227. if (names[i].used) {
  9228. XMEMCPY(output + idx, names[i].encoded, names[i].totalLen);
  9229. idx += names[i].totalLen;
  9230. }
  9231. }
  9232. #ifdef WOLFSSL_SMALL_STACK
  9233. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9234. #endif
  9235. /* used existing buffer passed in, so increment pointer */
  9236. if (local == NULL) {
  9237. *out += totalBytes;
  9238. }
  9239. return totalBytes;
  9240. }
  9241. #endif /* OPENSSL_ALL || OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
  9242. #ifdef WOLFSSL_CERT_GEN
  9243. /* Guarded by either
  9244. * A) WOLFSSL_WPAS_SMALL is on or
  9245. * B) (OPENSSL_EXTRA or OPENSSL_EXTRA_X509_SMALL) + WOLFSSL_CERT_GEN +
  9246. * (WOLFSSL_CERT_REQ or WOLFSSL_CERT_EXT or OPENSSL_EXTRA) has been
  9247. * defined
  9248. */
  9249. #if defined(WOLFSSL_WPAS_SMALL) || \
  9250. (defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)) && \
  9251. defined(WOLFSSL_CERT_GEN) && \
  9252. (defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_EXT) || \
  9253. defined(OPENSSL_EXTRA))
  9254. /* Converts the x509 name structure into DER format.
  9255. *
  9256. * out pointer to either a pre setup buffer or a pointer to null for
  9257. * creating a dynamic buffer. In the case that a pre-existing buffer is
  9258. * used out will be incremented the size of the DER buffer on success. If
  9259. * out is NULL, the function returns the necessary output buffer length.
  9260. *
  9261. * returns the size of the buffer on success, or negative value with failure
  9262. */
  9263. int wolfSSL_i2d_X509_NAME(WOLFSSL_X509_NAME* name, unsigned char** out)
  9264. {
  9265. int totalBytes = 0, i, idx;
  9266. byte temp[MAX_SEQ_SZ];
  9267. byte *output, *local = NULL;
  9268. #ifdef WOLFSSL_SMALL_STACK
  9269. EncodedName* names = NULL;
  9270. #else
  9271. EncodedName names[MAX_NAME_ENTRIES];
  9272. #endif
  9273. if (name == NULL)
  9274. return BAD_FUNC_ARG;
  9275. #ifdef WOLFSSL_SMALL_STACK
  9276. names = (EncodedName*)XMALLOC(sizeof(EncodedName) * MAX_NAME_ENTRIES, NULL,
  9277. DYNAMIC_TYPE_TMP_BUFFER);
  9278. if (names == NULL)
  9279. return MEMORY_E;
  9280. #endif
  9281. XMEMSET(names, 0, sizeof(EncodedName) * MAX_NAME_ENTRIES);
  9282. for (i = 0; i < MAX_NAME_ENTRIES; i++) {
  9283. WOLFSSL_X509_NAME_ENTRY* entry;
  9284. int ret;
  9285. entry = wolfSSL_X509_NAME_get_entry(name, i);
  9286. if (entry != NULL && entry->set >= 1) {
  9287. const char* nameStr;
  9288. int type;
  9289. WOLFSSL_ASN1_STRING* data;
  9290. data = wolfSSL_X509_NAME_ENTRY_get_data(entry);
  9291. if (data == NULL) {
  9292. #ifdef WOLFSSL_SMALL_STACK
  9293. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9294. #endif
  9295. WOLFSSL_MSG("Error getting entry data");
  9296. return WOLFSSL_FATAL_ERROR;
  9297. }
  9298. nameStr = (const char*)wolfSSL_ASN1_STRING_data(data);
  9299. type = wolfSSL_ASN1_STRING_type(data);
  9300. switch (type) {
  9301. case MBSTRING_UTF8:
  9302. type = CTC_UTF8;
  9303. break;
  9304. case MBSTRING_ASC:
  9305. case V_ASN1_PRINTABLESTRING:
  9306. type = CTC_PRINTABLE;
  9307. break;
  9308. default:
  9309. WOLFSSL_MSG("Unknown encoding type conversion UTF8 by default");
  9310. type = CTC_UTF8;
  9311. }
  9312. ret = wc_EncodeName(&names[i], nameStr, (char)type,
  9313. (byte)ConvertNIDToWolfSSL(entry->nid));
  9314. if (ret < 0) {
  9315. #ifdef WOLFSSL_SMALL_STACK
  9316. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9317. #endif
  9318. WOLFSSL_MSG("EncodeName failed");
  9319. return WOLFSSL_FATAL_ERROR;
  9320. }
  9321. totalBytes += ret;
  9322. }
  9323. }
  9324. /* header */
  9325. idx = SetSequence(totalBytes, temp);
  9326. if (totalBytes + idx > ASN_NAME_MAX) {
  9327. #ifdef WOLFSSL_SMALL_STACK
  9328. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9329. #endif
  9330. WOLFSSL_MSG("Total Bytes is greater than ASN_NAME_MAX");
  9331. return BUFFER_E;
  9332. }
  9333. if (out == NULL) {
  9334. /* If out is NULL, caller just wants length. */
  9335. totalBytes += idx;
  9336. #ifdef WOLFSSL_SMALL_STACK
  9337. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9338. #endif
  9339. return totalBytes;
  9340. }
  9341. /* check if using buffer passed in */
  9342. if (*out == NULL) {
  9343. *out = local = (unsigned char*)XMALLOC(totalBytes + idx, name->heap,
  9344. DYNAMIC_TYPE_OPENSSL);
  9345. if (*out == NULL) {
  9346. return MEMORY_E;
  9347. }
  9348. }
  9349. output = *out;
  9350. idx = SetSequence(totalBytes, output);
  9351. totalBytes += idx;
  9352. for (i = 0; i < MAX_NAME_ENTRIES; i++) {
  9353. if (names[i].used) {
  9354. XMEMCPY(output + idx, names[i].encoded, names[i].totalLen);
  9355. idx += names[i].totalLen;
  9356. }
  9357. }
  9358. #ifdef WOLFSSL_SMALL_STACK
  9359. XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  9360. #endif
  9361. /* used existing buffer passed in, so increment pointer */
  9362. if (local == NULL) {
  9363. *out += totalBytes;
  9364. }
  9365. return totalBytes;
  9366. }
  9367. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  9368. #endif /* WOLFSSL_CERT_GEN */
  9369. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL) || \
  9370. defined (WOLFSSL_WPAS_SMALL)
  9371. WOLFSSL_X509_NAME *wolfSSL_d2i_X509_NAME(WOLFSSL_X509_NAME **name,
  9372. unsigned char **in, long length)
  9373. {
  9374. WOLFSSL_X509_NAME* tmp = NULL;
  9375. #ifdef WOLFSSL_SMALL_STACK
  9376. DecodedCert* cert = NULL;
  9377. #else
  9378. DecodedCert cert[1];
  9379. #endif
  9380. WOLFSSL_ENTER("wolfSSL_d2i_X509_NAME");
  9381. if (!in || !*in || length <= 0) {
  9382. WOLFSSL_MSG("Bad argument");
  9383. return NULL;
  9384. }
  9385. #ifdef WOLFSSL_SMALL_STACK
  9386. cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL,
  9387. DYNAMIC_TYPE_DCERT);
  9388. if (cert == NULL) {
  9389. return NULL;
  9390. }
  9391. #endif
  9392. /* Set the X509_NAME buffer as the input data for cert.
  9393. * in is NOT a full certificate. Just the name. */
  9394. InitDecodedCert(cert, *in, (word32)length, NULL);
  9395. /* Parse the X509 subject name */
  9396. if (GetName(cert, SUBJECT, (int)length) != 0) {
  9397. WOLFSSL_MSG("WOLFSSL_X509_NAME parse error");
  9398. goto cleanup;
  9399. }
  9400. if (!(tmp = wolfSSL_X509_NAME_new_ex(cert->heap))) {
  9401. WOLFSSL_MSG("wolfSSL_X509_NAME_new_ex error");
  9402. goto cleanup;
  9403. }
  9404. if (wolfSSL_X509_NAME_copy((WOLFSSL_X509_NAME*)cert->subjectName,
  9405. tmp) != WOLFSSL_SUCCESS) {
  9406. wolfSSL_X509_NAME_free(tmp);
  9407. tmp = NULL;
  9408. goto cleanup;
  9409. }
  9410. if (name)
  9411. *name = tmp;
  9412. cleanup:
  9413. FreeDecodedCert(cert);
  9414. #ifdef WOLFSSL_SMALL_STACK
  9415. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  9416. #endif
  9417. return tmp;
  9418. }
  9419. #endif /* OPENSSL_EXTRA || OPENSSL_ALL || WOLFSSL_WPAS_SMALL */
  9420. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL)
  9421. /* Compares the two X509 names. If the size of x is larger then y then a
  9422. * positive value is returned if x is smaller a negative value is returned.
  9423. * In the case that the sizes are equal a the value of strcmp between the
  9424. * two names is returned.
  9425. *
  9426. * x First name for comparison
  9427. * y Second name to compare with x
  9428. */
  9429. int wolfSSL_X509_NAME_cmp(const WOLFSSL_X509_NAME* x,
  9430. const WOLFSSL_X509_NAME* y)
  9431. {
  9432. const char* _x;
  9433. const char* _y;
  9434. WOLFSSL_ENTER("wolfSSL_X509_NAME_cmp");
  9435. if (x == NULL || y == NULL) {
  9436. WOLFSSL_MSG("Bad argument passed in");
  9437. return -2;
  9438. }
  9439. if (x == y) {
  9440. return 0; /* match */
  9441. }
  9442. if (x->sz != y->sz) {
  9443. return x->sz - y->sz;
  9444. }
  9445. /*
  9446. * If the name member is not set or is immediately null terminated then
  9447. * compare the staticName member
  9448. */
  9449. _x = (x->name && *x->name) ? x->name : x->staticName;
  9450. _y = (y->name && *y->name) ? y->name : y->staticName;
  9451. return XSTRNCMP(_x, _y, x->sz); /* y sz is the same */
  9452. }
  9453. #ifndef NO_BIO
  9454. static WOLFSSL_X509 *loadX509orX509REQFromPemBio(WOLFSSL_BIO *bp,
  9455. WOLFSSL_X509 **x, wc_pem_password_cb *cb, void *u, int type)
  9456. {
  9457. WOLFSSL_X509* x509 = NULL;
  9458. #if defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM)
  9459. unsigned char* pem = NULL;
  9460. int pemSz;
  9461. long i = 0, l, footerSz;
  9462. const char* footer = NULL;
  9463. WOLFSSL_ENTER("loadX509orX509REQFromPemBio");
  9464. if (bp == NULL || (type != CERT_TYPE && type != CERTREQ_TYPE)) {
  9465. WOLFSSL_LEAVE("wolfSSL_PEM_read_bio_X509", BAD_FUNC_ARG);
  9466. return NULL;
  9467. }
  9468. if ((l = wolfSSL_BIO_get_len(bp)) <= 0) {
  9469. /* No certificate in buffer */
  9470. #if defined (WOLFSSL_HAPROXY)
  9471. WOLFSSL_ERROR(PEM_R_NO_START_LINE);
  9472. #else
  9473. WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
  9474. #endif
  9475. return NULL;
  9476. }
  9477. pemSz = (int)l;
  9478. pem = (unsigned char*)XMALLOC(pemSz, 0, DYNAMIC_TYPE_PEM);
  9479. if (pem == NULL)
  9480. return NULL;
  9481. XMEMSET(pem, 0, pemSz);
  9482. i = 0;
  9483. if (wc_PemGetHeaderFooter(type, NULL, &footer) != 0) {
  9484. XFREE(pem, 0, DYNAMIC_TYPE_PEM);
  9485. return NULL;
  9486. }
  9487. footerSz = (long)XSTRLEN(footer);
  9488. /* TODO: Inefficient
  9489. * reading in one byte at a time until see the footer
  9490. */
  9491. while ((l = wolfSSL_BIO_read(bp, (char *)&pem[i], 1)) == 1) {
  9492. i++;
  9493. if (i > footerSz && XMEMCMP((char *)&pem[i-footerSz], footer,
  9494. footerSz) == 0) {
  9495. if (wolfSSL_BIO_read(bp, (char *)&pem[i], 1) == 1) {
  9496. /* attempt to read newline following footer */
  9497. i++;
  9498. if (pem[i-1] == '\r') {
  9499. /* found \r , Windows line ending is \r\n so try to read one
  9500. * more byte for \n, ignoring return value */
  9501. (void)wolfSSL_BIO_read(bp, (char *)&pem[i++], 1);
  9502. }
  9503. }
  9504. break;
  9505. }
  9506. }
  9507. if (l == 0)
  9508. WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
  9509. if (i > pemSz) {
  9510. WOLFSSL_MSG("Error parsing PEM");
  9511. }
  9512. else {
  9513. pemSz = (int)i;
  9514. #ifdef WOLFSSL_CERT_REQ
  9515. if (type == CERTREQ_TYPE)
  9516. x509 = wolfSSL_X509_REQ_load_certificate_buffer(pem, pemSz,
  9517. WOLFSSL_FILETYPE_PEM);
  9518. else
  9519. #endif
  9520. x509 = wolfSSL_X509_load_certificate_buffer(pem, pemSz,
  9521. WOLFSSL_FILETYPE_PEM);
  9522. }
  9523. if (x != NULL) {
  9524. *x = x509;
  9525. }
  9526. XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
  9527. #endif /* WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM */
  9528. (void)bp;
  9529. (void)x;
  9530. (void)cb;
  9531. (void)u;
  9532. return x509;
  9533. }
  9534. WOLFSSL_X509 *wolfSSL_PEM_read_bio_X509(WOLFSSL_BIO *bp, WOLFSSL_X509 **x,
  9535. wc_pem_password_cb *cb, void *u)
  9536. {
  9537. return loadX509orX509REQFromPemBio(bp, x, cb, u, CERT_TYPE);
  9538. }
  9539. #ifdef WOLFSSL_CERT_REQ
  9540. WOLFSSL_X509 *wolfSSL_PEM_read_bio_X509_REQ(WOLFSSL_BIO *bp, WOLFSSL_X509 **x,
  9541. wc_pem_password_cb *cb, void *u)
  9542. {
  9543. return loadX509orX509REQFromPemBio(bp, x, cb, u, CERTREQ_TYPE);
  9544. }
  9545. #ifndef NO_FILESYSTEM
  9546. WOLFSSL_X509* wolfSSL_PEM_read_X509_REQ(XFILE fp, WOLFSSL_X509** x,
  9547. wc_pem_password_cb* cb, void* u)
  9548. {
  9549. int err = 0;
  9550. WOLFSSL_X509* ret = NULL;
  9551. WOLFSSL_BIO* bio = NULL;
  9552. WOLFSSL_ENTER("wolfSSL_PEM_read_X509_REQ");
  9553. if (fp == XBADFILE) {
  9554. WOLFSSL_MSG("Invalid file.");
  9555. err = 1;
  9556. }
  9557. if (err == 0) {
  9558. bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file());
  9559. if (bio == NULL) {
  9560. WOLFSSL_MSG("Failed to create new BIO with input file.");
  9561. err = 1;
  9562. }
  9563. }
  9564. if (err == 0 && wolfSSL_BIO_set_fp(bio, fp, BIO_CLOSE)
  9565. != WOLFSSL_SUCCESS) {
  9566. WOLFSSL_MSG("Failed to set BIO file pointer.");
  9567. err = 1;
  9568. }
  9569. if (err == 0) {
  9570. ret = wolfSSL_PEM_read_bio_X509_REQ(bio, x, cb, u);
  9571. }
  9572. if (bio != NULL) {
  9573. wolfSSL_BIO_free(bio);
  9574. }
  9575. return ret;
  9576. }
  9577. #endif /* !NO_FILESYSTEM */
  9578. #endif /* WOLFSSL_CERT_REQ */
  9579. WOLFSSL_X509_CRL *wolfSSL_PEM_read_bio_X509_CRL(WOLFSSL_BIO *bp,
  9580. WOLFSSL_X509_CRL **x, wc_pem_password_cb *cb, void *u)
  9581. {
  9582. #if defined(WOLFSSL_PEM_TO_DER) && defined(HAVE_CRL)
  9583. unsigned char* pem = NULL;
  9584. int pemSz;
  9585. int derSz;
  9586. DerBuffer* der = NULL;
  9587. WOLFSSL_X509_CRL* crl = NULL;
  9588. if ((pemSz = wolfSSL_BIO_get_len(bp)) <= 0) {
  9589. goto err;
  9590. }
  9591. pem = (unsigned char*)XMALLOC(pemSz, 0, DYNAMIC_TYPE_PEM);
  9592. if (pem == NULL) {
  9593. goto err;
  9594. }
  9595. if (wolfSSL_BIO_read(bp, pem, pemSz) != pemSz) {
  9596. goto err;
  9597. }
  9598. if((PemToDer(pem, pemSz, CRL_TYPE, &der, NULL, NULL, NULL)) < 0) {
  9599. goto err;
  9600. }
  9601. derSz = der->length;
  9602. if((crl = wolfSSL_d2i_X509_CRL(x, der->buffer, derSz)) == NULL) {
  9603. goto err;
  9604. }
  9605. err:
  9606. if(pem != NULL) {
  9607. XFREE(pem, 0, DYNAMIC_TYPE_PEM);
  9608. }
  9609. if(der != NULL) {
  9610. FreeDer(&der);
  9611. }
  9612. (void)cb;
  9613. (void)u;
  9614. return crl;
  9615. #else
  9616. (void)bp;
  9617. (void)x;
  9618. (void)cb;
  9619. (void)u;
  9620. return NULL;
  9621. #endif
  9622. }
  9623. #endif /* !NO_BIO */
  9624. #if !defined(NO_FILESYSTEM)
  9625. static void* wolfSSL_PEM_read_X509_ex(XFILE fp, void **x,
  9626. wc_pem_password_cb *cb, void *u, int type)
  9627. {
  9628. unsigned char* pem = NULL;
  9629. int pemSz;
  9630. long i = 0, l;
  9631. void *newx509;
  9632. int derSz;
  9633. DerBuffer* der = NULL;
  9634. WOLFSSL_ENTER("wolfSSL_PEM_read_X509");
  9635. if (fp == XBADFILE) {
  9636. WOLFSSL_LEAVE("wolfSSL_PEM_read_X509", BAD_FUNC_ARG);
  9637. return NULL;
  9638. }
  9639. /* Read cert from file */
  9640. i = XFTELL(fp);
  9641. if (i < 0) {
  9642. WOLFSSL_LEAVE("wolfSSL_PEM_read_X509", BAD_FUNC_ARG);
  9643. return NULL;
  9644. }
  9645. if (XFSEEK(fp, 0, XSEEK_END) != 0)
  9646. return NULL;
  9647. l = XFTELL(fp);
  9648. if (l < 0)
  9649. return NULL;
  9650. if (XFSEEK(fp, i, SEEK_SET) != 0)
  9651. return NULL;
  9652. pemSz = (int)(l - i);
  9653. /* check calculated length */
  9654. if (pemSz > MAX_WOLFSSL_FILE_SIZE || pemSz < 0) {
  9655. WOLFSSL_MSG("PEM_read_X509_ex file size error");
  9656. return NULL;
  9657. }
  9658. /* allocate pem buffer */
  9659. pem = (unsigned char*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_PEM);
  9660. if (pem == NULL)
  9661. return NULL;
  9662. if ((int)XFREAD((char *)pem, 1, pemSz, fp) != pemSz)
  9663. goto err_exit;
  9664. switch (type) {
  9665. case CERT_TYPE:
  9666. newx509 = (void *)wolfSSL_X509_load_certificate_buffer(pem,
  9667. pemSz, WOLFSSL_FILETYPE_PEM);
  9668. break;
  9669. #ifdef HAVE_CRL
  9670. case CRL_TYPE:
  9671. if ((PemToDer(pem, pemSz, CRL_TYPE, &der, NULL, NULL, NULL)) < 0)
  9672. goto err_exit;
  9673. derSz = der->length;
  9674. newx509 = (void*)wolfSSL_d2i_X509_CRL((WOLFSSL_X509_CRL **)x,
  9675. (const unsigned char *)der->buffer, derSz);
  9676. if (newx509 == NULL)
  9677. goto err_exit;
  9678. FreeDer(&der);
  9679. break;
  9680. #endif
  9681. default:
  9682. goto err_exit;
  9683. }
  9684. if (x != NULL) {
  9685. *x = newx509;
  9686. }
  9687. XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
  9688. return newx509;
  9689. err_exit:
  9690. if (pem != NULL)
  9691. XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
  9692. if (der != NULL)
  9693. FreeDer(&der);
  9694. /* unused */
  9695. (void)cb;
  9696. (void)u;
  9697. (void)derSz;
  9698. return NULL;
  9699. }
  9700. WOLFSSL_API WOLFSSL_X509* wolfSSL_PEM_read_X509(XFILE fp, WOLFSSL_X509 **x,
  9701. wc_pem_password_cb *cb,
  9702. void *u)
  9703. {
  9704. return (WOLFSSL_X509* )wolfSSL_PEM_read_X509_ex(fp, (void **)x, cb, u, CERT_TYPE);
  9705. }
  9706. #if defined(HAVE_CRL)
  9707. WOLFSSL_API WOLFSSL_X509_CRL* wolfSSL_PEM_read_X509_CRL(XFILE fp, WOLFSSL_X509_CRL **crl,
  9708. wc_pem_password_cb *cb, void *u)
  9709. {
  9710. return (WOLFSSL_X509_CRL* )wolfSSL_PEM_read_X509_ex(fp, (void **)crl, cb, u, CRL_TYPE);
  9711. }
  9712. #endif
  9713. #ifdef WOLFSSL_CERT_GEN
  9714. #ifndef NO_BIO
  9715. int wolfSSL_PEM_write_X509(XFILE fp, WOLFSSL_X509* x)
  9716. {
  9717. int ret;
  9718. WOLFSSL_BIO* bio;
  9719. if (x == NULL)
  9720. return 0;
  9721. bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file());
  9722. if (bio == NULL)
  9723. return 0;
  9724. if (wolfSSL_BIO_set_fp(bio, fp, BIO_NOCLOSE) != WOLFSSL_SUCCESS) {
  9725. wolfSSL_BIO_free(bio);
  9726. bio = NULL;
  9727. }
  9728. ret = wolfSSL_PEM_write_bio_X509(bio, x);
  9729. if (bio != NULL)
  9730. wolfSSL_BIO_free(bio);
  9731. return ret;
  9732. }
  9733. #endif /* !NO_BIO */
  9734. #endif /* WOLFSSL_CERT_GEN */
  9735. #endif /* !NO_FILESYSTEM */
  9736. #endif /* OPENSSL_EXTRA || OPENSSL_ALL */
  9737. #ifdef OPENSSL_ALL
  9738. #ifndef NO_BIO
  9739. /* create and return a new WOLFSSL_X509_PKEY structure or NULL on failure */
  9740. static WOLFSSL_X509_PKEY* wolfSSL_X509_PKEY_new(void* heap)
  9741. {
  9742. WOLFSSL_X509_PKEY* ret;
  9743. ret = (WOLFSSL_X509_PKEY*)XMALLOC(sizeof(WOLFSSL_X509_PKEY), heap,
  9744. DYNAMIC_TYPE_KEY);
  9745. if (ret != NULL) {
  9746. XMEMSET(ret, 0, sizeof(WOLFSSL_X509_PKEY));
  9747. ret->heap = heap;
  9748. }
  9749. return ret;
  9750. }
  9751. #endif /* !NO_BIO */
  9752. /* free up all memory used by "xPkey" passed in */
  9753. static void wolfSSL_X509_PKEY_free(WOLFSSL_X509_PKEY* xPkey)
  9754. {
  9755. if (xPkey != NULL) {
  9756. wolfSSL_EVP_PKEY_free(xPkey->dec_pkey);
  9757. XFREE(xPkey, xPkey->heap, DYNAMIC_TYPE_KEY);
  9758. }
  9759. }
  9760. #ifndef NO_BIO
  9761. #define PEM_COMPARE_HEADER(start, end, header) \
  9762. ((end) - (start) == XSTR_SIZEOF(header) && XMEMCMP(start, header, \
  9763. XSTR_SIZEOF(header)) == 0)
  9764. /**
  9765. * This read one structure from bio and returns the read structure
  9766. * in the appropriate output parameter (x509, crl, x_pkey). The
  9767. * output parameters must be set to NULL.
  9768. * @param bio Input for reading structures
  9769. * @param cb Password callback
  9770. * @param x509 Output
  9771. * @param crl Output
  9772. * @param x_pkey Output
  9773. * @return WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE otherwise
  9774. */
  9775. static int wolfSSL_PEM_X509_X509_CRL_X509_PKEY_read_bio(
  9776. WOLFSSL_BIO* bio, wc_pem_password_cb* cb, WOLFSSL_X509** x509,
  9777. WOLFSSL_X509_CRL** crl, WOLFSSL_X509_PKEY** x_pkey)
  9778. {
  9779. #if defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM)
  9780. char* pem = NULL;
  9781. long i = pem_struct_min_sz, l;
  9782. const char* header = NULL;
  9783. const char* headerEnd = NULL;
  9784. const char* footer = NULL;
  9785. const char* footerEnd = NULL;
  9786. #ifdef HAVE_CRL
  9787. DerBuffer* der = NULL;
  9788. #endif
  9789. WOLFSSL_BIO* pemBio = NULL;
  9790. if (!bio || !x509 || *x509 || !crl || *crl || !x_pkey || *x_pkey) {
  9791. WOLFSSL_MSG("Bad input parameter or output parameters "
  9792. "not set to a NULL value.");
  9793. return WOLFSSL_FAILURE;
  9794. }
  9795. if ((l = wolfSSL_BIO_get_len(bio)) <= 0) {
  9796. /* No certificate in buffer */
  9797. WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
  9798. return WOLFSSL_FAILURE;
  9799. }
  9800. pem = (char*)XMALLOC(l, 0, DYNAMIC_TYPE_PEM);
  9801. if (pem == NULL)
  9802. return WOLFSSL_FAILURE;
  9803. if (wolfSSL_BIO_read(bio, &pem[0], pem_struct_min_sz) !=
  9804. pem_struct_min_sz) {
  9805. WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
  9806. goto err;
  9807. }
  9808. /* Read the header and footer */
  9809. while (i < l && wolfSSL_BIO_read(bio, &pem[i], 1) == 1) {
  9810. i++;
  9811. if (!header) {
  9812. header = XSTRNSTR(pem, "-----BEGIN ", (unsigned int)i);
  9813. }
  9814. else if (!headerEnd) {
  9815. headerEnd = XSTRNSTR(header + XSTR_SIZEOF("-----BEGIN "),
  9816. "-----",
  9817. (unsigned int)
  9818. (i - (header + XSTR_SIZEOF("-----BEGIN ") - pem)));
  9819. if (headerEnd) {
  9820. headerEnd += XSTR_SIZEOF("-----");
  9821. /* Read in the newline */
  9822. if (wolfSSL_BIO_read(bio, &pem[i], 1) != 1) {
  9823. WOLFSSL_MSG("wolfSSL_BIO_read error");
  9824. goto err;
  9825. }
  9826. i++;
  9827. if (*headerEnd != '\n' && *headerEnd != '\r') {
  9828. WOLFSSL_MSG("Missing newline after header");
  9829. goto err;
  9830. }
  9831. }
  9832. }
  9833. else if (!footer) {
  9834. footer = XSTRNSTR(headerEnd, "-----END ",
  9835. (unsigned int)(i - (headerEnd - pem)));
  9836. }
  9837. else if (!footerEnd) {
  9838. footerEnd = XSTRNSTR(footer + XSTR_SIZEOF("-----"),
  9839. "-----", (unsigned int)(i -
  9840. (footer + XSTR_SIZEOF("-----") - pem)));
  9841. if (footerEnd) {
  9842. footerEnd += XSTR_SIZEOF("-----");
  9843. /* Now check that footer matches header */
  9844. if ((headerEnd - (header + XSTR_SIZEOF("-----BEGIN "))) ==
  9845. (footerEnd - (footer + XSTR_SIZEOF("-----END "))) &&
  9846. XMEMCMP(header + XSTR_SIZEOF("-----BEGIN "),
  9847. footer + XSTR_SIZEOF("-----END "),
  9848. headerEnd - (header + XSTR_SIZEOF("-----BEGIN ")))
  9849. != 0) {
  9850. WOLFSSL_MSG("Header and footer don't match");
  9851. goto err;
  9852. }
  9853. /* header and footer match */
  9854. break;
  9855. }
  9856. }
  9857. }
  9858. if (!footerEnd) {
  9859. /* Only check footerEnd since it is set last */
  9860. WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
  9861. goto err;
  9862. }
  9863. else {
  9864. if (PEM_COMPARE_HEADER(header, headerEnd,
  9865. "-----BEGIN CERTIFICATE-----")) {
  9866. /* We have a certificate */
  9867. WOLFSSL_MSG("Parsing x509 cert");
  9868. *x509 = wolfSSL_X509_load_certificate_buffer(
  9869. (const unsigned char*) header,
  9870. (int)(footerEnd - header), WOLFSSL_FILETYPE_PEM);
  9871. if (!*x509) {
  9872. WOLFSSL_MSG("wolfSSL_X509_load_certificate_buffer error");
  9873. goto err;
  9874. }
  9875. }
  9876. #ifdef HAVE_CRL
  9877. else if (PEM_COMPARE_HEADER(header, headerEnd,
  9878. "-----BEGIN X509 CRL-----")) {
  9879. /* We have a crl */
  9880. WOLFSSL_MSG("Parsing crl");
  9881. if((PemToDer((const unsigned char*) header, footerEnd - header,
  9882. CRL_TYPE, &der, NULL, NULL, NULL)) < 0) {
  9883. WOLFSSL_MSG("PemToDer error");
  9884. goto err;
  9885. }
  9886. *crl = wolfSSL_d2i_X509_CRL(NULL, der->buffer, der->length);
  9887. if (!*crl) {
  9888. WOLFSSL_MSG("wolfSSL_d2i_X509_CRL error");
  9889. goto err;
  9890. }
  9891. }
  9892. #endif
  9893. else {
  9894. WOLFSSL_MSG("Parsing x509 key");
  9895. if (!(*x_pkey = wolfSSL_X509_PKEY_new(NULL))) {
  9896. WOLFSSL_MSG("wolfSSL_X509_PKEY_new error");
  9897. goto err;
  9898. }
  9899. if (!(pemBio = wolfSSL_BIO_new(wolfSSL_BIO_s_mem()))) {
  9900. WOLFSSL_MSG("wolfSSL_BIO_new error");
  9901. goto err;
  9902. }
  9903. if (wolfSSL_BIO_write(pemBio, header,
  9904. (int)(footerEnd - header)) != footerEnd - header) {
  9905. WOLFSSL_MSG("wolfSSL_BIO_new error");
  9906. goto err;
  9907. }
  9908. if (wolfSSL_PEM_read_bio_PrivateKey(pemBio,
  9909. &(*x_pkey)->dec_pkey, cb, NULL) == NULL) {
  9910. WOLFSSL_MSG("wolfSSL_PEM_read_bio_PrivateKey error");
  9911. goto err;
  9912. }
  9913. wolfSSL_BIO_free(pemBio);
  9914. }
  9915. }
  9916. XFREE(pem, 0, DYNAMIC_TYPE_PEM);
  9917. #ifdef HAVE_CRL
  9918. if (der)
  9919. FreeDer(&der);
  9920. #endif
  9921. return WOLFSSL_SUCCESS;
  9922. err:
  9923. if (pem)
  9924. XFREE(pem, 0, DYNAMIC_TYPE_PEM);
  9925. #ifdef HAVE_CRL
  9926. if (der)
  9927. FreeDer(&der);
  9928. #endif
  9929. if (*x_pkey) {
  9930. wolfSSL_X509_PKEY_free(*x_pkey);
  9931. *x_pkey = NULL;
  9932. }
  9933. if (pemBio)
  9934. wolfSSL_BIO_free(pemBio);
  9935. return WOLFSSL_FAILURE;
  9936. #else /* ! (WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM) */
  9937. return WOLFSSL_FAILURE;
  9938. #endif /* WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM */
  9939. }
  9940. #ifndef NO_FILESYSTEM
  9941. WOLF_STACK_OF(WOLFSSL_X509_INFO)* wolfSSL_PEM_X509_INFO_read(
  9942. XFILE fp, WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
  9943. pem_password_cb* cb, void* u)
  9944. {
  9945. WOLFSSL_BIO* fileBio = wolfSSL_BIO_new_fp(fp, BIO_NOCLOSE);
  9946. WOLF_STACK_OF(WOLFSSL_X509_INFO)* ret = NULL;
  9947. WOLFSSL_ENTER("wolfSSL_PEM_X509_INFO_read");
  9948. if (fileBio != NULL) {
  9949. ret = wolfSSL_PEM_X509_INFO_read_bio(fileBio, sk, cb, u);
  9950. wolfSSL_BIO_free(fileBio);
  9951. }
  9952. return ret;
  9953. }
  9954. #endif /* !NO_FILESYSTEM */
  9955. /*
  9956. * bio WOLFSSL_BIO to read certificates from
  9957. * sk possible stack to push more X509_INFO structs to. Can be NULL
  9958. * cb callback password for encrypted PEM certificates
  9959. * u user input such as password
  9960. *
  9961. * returns stack on success and NULL or default stack passed in on fail
  9962. */
  9963. WOLF_STACK_OF(WOLFSSL_X509_INFO)* wolfSSL_PEM_X509_INFO_read_bio(
  9964. WOLFSSL_BIO* bio, WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
  9965. wc_pem_password_cb* cb, void* u)
  9966. {
  9967. WOLF_STACK_OF(WOLFSSL_X509_INFO)* localSk = NULL;
  9968. int ret = WOLFSSL_SUCCESS;
  9969. WOLFSSL_X509_INFO* current = NULL;
  9970. WOLFSSL_X509* x509 = NULL;
  9971. WOLFSSL_X509_CRL* crl = NULL;
  9972. WOLFSSL_X509_PKEY* x_pkey = NULL;
  9973. (void)u;
  9974. WOLFSSL_ENTER("wolfSSL_PEM_X509_INFO_read_bio");
  9975. /* attempt to use passed in stack or create a new one */
  9976. if (sk != NULL) {
  9977. localSk = sk;
  9978. }
  9979. else {
  9980. localSk = wolfSSL_sk_X509_INFO_new_null();
  9981. }
  9982. if (localSk == NULL) {
  9983. WOLFSSL_LEAVE("wolfSSL_PEM_X509_INFO_read_bio",
  9984. MEMORY_E);
  9985. return NULL;
  9986. }
  9987. /* parse through BIO and push new info's found onto stack */
  9988. while (1) {
  9989. x509 = NULL;
  9990. crl = NULL;
  9991. x_pkey = NULL;
  9992. if (wolfSSL_PEM_X509_X509_CRL_X509_PKEY_read_bio(bio, cb,
  9993. &x509, &crl, &x_pkey) == WOLFSSL_SUCCESS) {
  9994. if (current == NULL ||
  9995. (x509 && current->x509) ||
  9996. (crl && current->crl) ||
  9997. (x_pkey && current->x_pkey)) {
  9998. /* Need to create new current since existing one already
  9999. * has the member filled or this is the first successful
  10000. * read. */
  10001. current = wolfSSL_X509_INFO_new();
  10002. if (current == NULL) {
  10003. ret = MEMORY_E;
  10004. break;
  10005. }
  10006. if (wolfSSL_sk_X509_INFO_push(localSk, current) !=
  10007. WOLFSSL_SUCCESS) {
  10008. wolfSSL_X509_INFO_free(current);
  10009. current = NULL;
  10010. ret = WOLFSSL_FAILURE;
  10011. break;
  10012. }
  10013. }
  10014. if (x509) {
  10015. current->x509 = x509;
  10016. }
  10017. else if (crl) {
  10018. current->crl = crl;
  10019. }
  10020. else if (x_pkey) {
  10021. current->x_pkey = x_pkey;
  10022. }
  10023. else {
  10024. WOLFSSL_MSG("No output parameters set");
  10025. ret = WOLFSSL_FAILURE;
  10026. break;
  10027. }
  10028. }
  10029. else {
  10030. #ifdef WOLFSSL_HAVE_ERROR_QUEUE
  10031. unsigned long err;
  10032. CLEAR_ASN_NO_PEM_HEADER_ERROR(err);
  10033. if (ERR_GET_LIB(err) != ERR_LIB_PEM ||
  10034. ERR_GET_REASON(err) != PEM_R_NO_START_LINE) {
  10035. ret = WOLFSSL_FAILURE;
  10036. }
  10037. #else
  10038. if (wolfSSL_sk_X509_INFO_num(localSk) > 0) {
  10039. WOLFSSL_MSG("At least one X509_INFO object on stack."
  10040. "Assuming error means EOF or no more PEM"
  10041. "headers found.");
  10042. }
  10043. else {
  10044. ret = WOLFSSL_FAILURE;
  10045. }
  10046. #endif
  10047. break;
  10048. }
  10049. }
  10050. if (ret != WOLFSSL_SUCCESS ||
  10051. wolfSSL_sk_X509_INFO_num(localSk) == 0) {
  10052. /* current should always be pushed onto the localsk stack at this
  10053. * point. The only case when it isn't is when
  10054. * wolfSSL_sk_X509_INFO_push fails but in that case the current
  10055. * free is handled inside the loop. */
  10056. if (localSk != sk) {
  10057. wolfSSL_sk_pop_free(localSk, NULL);
  10058. }
  10059. wolfSSL_X509_free(x509);
  10060. #ifdef HAVE_CRL
  10061. wolfSSL_X509_CRL_free(crl);
  10062. #endif
  10063. wolfSSL_X509_PKEY_free(x_pkey);
  10064. localSk = NULL;
  10065. }
  10066. WOLFSSL_LEAVE("wolfSSL_PEM_X509_INFO_read_bio", ret);
  10067. return localSk;
  10068. }
  10069. #endif /* !NO_BIO */
  10070. #endif /* OPENSSL_ALL */
  10071. void wolfSSL_X509_NAME_ENTRY_free(WOLFSSL_X509_NAME_ENTRY* ne)
  10072. {
  10073. WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_free");
  10074. if (ne != NULL) {
  10075. wolfSSL_ASN1_OBJECT_free(ne->object);
  10076. if (ne->value != NULL) {
  10077. wolfSSL_ASN1_STRING_free(ne->value);
  10078. }
  10079. XFREE(ne, NULL, DYNAMIC_TYPE_NAME_ENTRY);
  10080. }
  10081. }
  10082. WOLFSSL_X509_NAME_ENTRY* wolfSSL_X509_NAME_ENTRY_new(void)
  10083. {
  10084. WOLFSSL_X509_NAME_ENTRY* ne;
  10085. ne = (WOLFSSL_X509_NAME_ENTRY*)XMALLOC(sizeof(WOLFSSL_X509_NAME_ENTRY),
  10086. NULL, DYNAMIC_TYPE_NAME_ENTRY);
  10087. if (ne != NULL) {
  10088. XMEMSET(ne, 0, sizeof(WOLFSSL_X509_NAME_ENTRY));
  10089. }
  10090. return ne;
  10091. }
  10092. static void wolfssl_x509_name_entry_set(WOLFSSL_X509_NAME_ENTRY* ne,
  10093. int nid, int type, const unsigned char *data, int dataSz)
  10094. {
  10095. WOLFSSL_ASN1_OBJECT* object;
  10096. ne->nid = nid;
  10097. /* Reuse the object if already available. */
  10098. object = wolfSSL_OBJ_nid2obj_ex(nid, ne->object);
  10099. if (object != NULL) {
  10100. /* Set the object when no error. */
  10101. ne->object = object;
  10102. }
  10103. ne->value = wolfSSL_ASN1_STRING_type_new(type);
  10104. if (ne->value != NULL) {
  10105. if (wolfSSL_ASN1_STRING_set(ne->value, (const void*)data,
  10106. dataSz) == WOLFSSL_SUCCESS) {
  10107. ne->set = 1;
  10108. }
  10109. else {
  10110. /* Free the ASN1_STRING if it is not set. */
  10111. wolfSSL_ASN1_STRING_free(ne->value);
  10112. ne->value = NULL;
  10113. }
  10114. }
  10115. }
  10116. /* Create a new WOLFSSL_X509_NAME_ENTRY structure based on the text passed
  10117. * in. Returns NULL on failure */
  10118. WOLFSSL_X509_NAME_ENTRY* wolfSSL_X509_NAME_ENTRY_create_by_txt(
  10119. WOLFSSL_X509_NAME_ENTRY **neIn, const char *txt, int type,
  10120. const unsigned char *data, int dataSz)
  10121. {
  10122. int nid = -1;
  10123. WOLFSSL_X509_NAME_ENTRY* ne = NULL;
  10124. WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_create_by_txt");
  10125. if (txt == NULL) {
  10126. return NULL;
  10127. }
  10128. if (neIn != NULL) {
  10129. ne = *neIn;
  10130. }
  10131. nid = wolfSSL_OBJ_txt2nid(txt);
  10132. if (nid == NID_undef) {
  10133. WOLFSSL_MSG("Unable to find text");
  10134. ne = NULL;
  10135. }
  10136. else {
  10137. if (ne == NULL) {
  10138. ne = wolfSSL_X509_NAME_ENTRY_new();
  10139. if (ne == NULL) {
  10140. return NULL;
  10141. }
  10142. }
  10143. wolfssl_x509_name_entry_set(ne, nid, type, data, dataSz);
  10144. }
  10145. return ne;
  10146. }
  10147. /* Creates a new entry given the NID, type, and data
  10148. * "dataSz" is number of bytes in data, if set to -1 then XSTRLEN is used
  10149. * "out" can be used to store the new entry data in an existing structure
  10150. * if NULL then a new WOLFSSL_X509_NAME_ENTRY structure is created
  10151. * returns a pointer to WOLFSSL_X509_NAME_ENTRY on success and NULL on fail
  10152. */
  10153. WOLFSSL_X509_NAME_ENTRY* wolfSSL_X509_NAME_ENTRY_create_by_NID(
  10154. WOLFSSL_X509_NAME_ENTRY** out, int nid, int type,
  10155. const unsigned char* data, int dataSz)
  10156. {
  10157. WOLFSSL_X509_NAME_ENTRY* ne;
  10158. #ifdef WOLFSSL_DEBUG_OPENSSL
  10159. WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_create_by_NID");
  10160. #endif
  10161. if (!data) {
  10162. WOLFSSL_MSG("Bad parameter");
  10163. return NULL;
  10164. }
  10165. if (out == NULL || *out == NULL) {
  10166. ne = wolfSSL_X509_NAME_ENTRY_new();
  10167. if (ne == NULL) {
  10168. return NULL;
  10169. }
  10170. if (out != NULL) {
  10171. *out = ne;
  10172. }
  10173. }
  10174. else {
  10175. ne = *out;
  10176. }
  10177. wolfssl_x509_name_entry_set(ne, nid, type, data, dataSz);
  10178. return ne;
  10179. }
  10180. #endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
  10181. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL) || \
  10182. defined(HAVE_LIGHTY) || defined(WOLFSSL_MYSQL_COMPATIBLE) || \
  10183. defined(HAVE_STUNNEL) || defined(WOLFSSL_NGINX) || \
  10184. defined(HAVE_POCO_LIB) || defined(WOLFSSL_HAPROXY)
  10185. WOLFSSL_ASN1_OBJECT* wolfSSL_X509_NAME_ENTRY_get_object(
  10186. WOLFSSL_X509_NAME_ENTRY *ne)
  10187. {
  10188. WOLFSSL_ASN1_OBJECT* object = NULL;
  10189. #ifdef WOLFSSL_DEBUG_OPENSSL
  10190. WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_get_object");
  10191. #endif
  10192. if (ne != NULL) {
  10193. /* Create object from nid - reuse existing object if possible. */
  10194. object = wolfSSL_OBJ_nid2obj_ex(ne->nid, ne->object);
  10195. if (object != NULL) {
  10196. /* Set the object when no error. */
  10197. ne->object = object;
  10198. }
  10199. }
  10200. return object;
  10201. }
  10202. #endif /* OPENSSL_ALL || HAVE_LIGHTY || WOLFSSL_MYSQL_COMPATIBLE ||
  10203. * HAVE_STUNNEL || WOLFSSL_NGINX || HAVE_POCO_LIB || WOLFSSL_HAPROXY */
  10204. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  10205. /* add all entry of type "nid" to the buffer "fullName" and advance "idx"
  10206. * since number of entries is small, a brute force search is used here
  10207. * returns the number of entries added
  10208. */
  10209. static int AddAllEntry(WOLFSSL_X509_NAME* name, char* fullName,
  10210. int fullNameSz, int* idx)
  10211. {
  10212. int i;
  10213. int ret = 0;
  10214. for (i = 0; i < MAX_NAME_ENTRIES; i++) {
  10215. if (name->entry[i].set) {
  10216. WOLFSSL_X509_NAME_ENTRY* e;
  10217. WOLFSSL_ASN1_OBJECT* obj;
  10218. int sz;
  10219. unsigned char* data;
  10220. e = &name->entry[i];
  10221. obj = wolfSSL_X509_NAME_ENTRY_get_object(e);
  10222. if (obj == NULL) {
  10223. return BAD_FUNC_ARG;
  10224. }
  10225. XMEMCPY(fullName + *idx, "/", 1); *idx = *idx + 1;
  10226. sz = (int)XSTRLEN(obj->sName);
  10227. XMEMCPY(fullName + *idx, obj->sName, sz);
  10228. *idx += sz;
  10229. XMEMCPY(fullName + *idx, "=", 1); *idx = *idx + 1;
  10230. data = wolfSSL_ASN1_STRING_data(e->value);
  10231. if (data != NULL) {
  10232. sz = (int)XSTRLEN((const char*)data);
  10233. XMEMCPY(fullName + *idx, data, sz);
  10234. *idx += sz;
  10235. }
  10236. ret++;
  10237. }
  10238. }
  10239. (void)fullNameSz;
  10240. return ret;
  10241. }
  10242. /* Converts a list of entries in WOLFSSL_X509_NAME struct into a string
  10243. * returns 0 on success */
  10244. static int RebuildFullName(WOLFSSL_X509_NAME* name)
  10245. {
  10246. int totalLen = 0, i, idx, entryCount = 0;
  10247. char* fullName;
  10248. if (name == NULL)
  10249. return BAD_FUNC_ARG;
  10250. for (i = 0; i < MAX_NAME_ENTRIES; i++) {
  10251. if (name->entry[i].set) {
  10252. WOLFSSL_X509_NAME_ENTRY* e;
  10253. WOLFSSL_ASN1_OBJECT* obj;
  10254. e = &name->entry[i];
  10255. obj = wolfSSL_X509_NAME_ENTRY_get_object(e);
  10256. if (obj == NULL)
  10257. return BAD_FUNC_ARG;
  10258. totalLen += (int)XSTRLEN(obj->sName) + 2;/*+2 for '/' and '=' */
  10259. totalLen += wolfSSL_ASN1_STRING_length(e->value);
  10260. }
  10261. }
  10262. fullName = (char*)XMALLOC(totalLen + 1, name->heap, DYNAMIC_TYPE_X509);
  10263. if (fullName == NULL)
  10264. return MEMORY_E;
  10265. idx = 0;
  10266. entryCount = AddAllEntry(name, fullName, totalLen, &idx);
  10267. if (entryCount < 0) {
  10268. XFREE(fullName, name->heap, DYNAMIC_TYPE_X509);
  10269. return entryCount;
  10270. }
  10271. if (name->dynamicName) {
  10272. XFREE(name->name, name->heap, DYNAMIC_TYPE_X509);
  10273. }
  10274. fullName[idx] = '\0';
  10275. name->name = fullName;
  10276. name->dynamicName = 1;
  10277. name->sz = idx + 1; /* size includes null terminator */
  10278. name->entrySz = entryCount;
  10279. return 0;
  10280. }
  10281. /* Copies entry into name. With it being copied freeing entry becomes the
  10282. * callers responsibility.
  10283. * returns 1 for success and 0 for error */
  10284. int wolfSSL_X509_NAME_add_entry(WOLFSSL_X509_NAME* name,
  10285. WOLFSSL_X509_NAME_ENTRY* entry, int idx, int set)
  10286. {
  10287. WOLFSSL_X509_NAME_ENTRY* current = NULL;
  10288. int ret, i;
  10289. #ifdef WOLFSSL_DEBUG_OPENSSL
  10290. WOLFSSL_ENTER("wolfSSL_X509_NAME_add_entry");
  10291. #endif
  10292. if (name == NULL || entry == NULL || entry->value == NULL) {
  10293. WOLFSSL_MSG("NULL argument passed in");
  10294. return WOLFSSL_FAILURE;
  10295. }
  10296. if (idx >= 0) {
  10297. /* place in specific index */
  10298. if (idx >= MAX_NAME_ENTRIES) {
  10299. WOLFSSL_MSG("Error index to insert entry is larger than array");
  10300. return WOLFSSL_FAILURE;
  10301. }
  10302. i = idx;
  10303. }
  10304. else {
  10305. /* iterate through and find first open spot */
  10306. for (i = 0; i < MAX_NAME_ENTRIES; i++) {
  10307. if (name->entry[i].set != 1) { /* not set so overwritten */
  10308. WOLFSSL_MSG("Found place for name entry");
  10309. break;
  10310. }
  10311. }
  10312. if (i == MAX_NAME_ENTRIES) {
  10313. WOLFSSL_MSG("No spot found for name entry");
  10314. return WOLFSSL_FAILURE;
  10315. }
  10316. }
  10317. current = &name->entry[i];
  10318. if (current->set == 0)
  10319. name->entrySz++;
  10320. if (wolfSSL_X509_NAME_ENTRY_create_by_NID(&current,
  10321. entry->nid,
  10322. wolfSSL_ASN1_STRING_type(entry->value),
  10323. wolfSSL_ASN1_STRING_data(entry->value),
  10324. wolfSSL_ASN1_STRING_length(entry->value)) != NULL)
  10325. {
  10326. ret = WOLFSSL_SUCCESS;
  10327. #ifdef OPENSSL_ALL
  10328. if (name->entries == NULL) {
  10329. name->entries = wolfSSL_sk_X509_NAME_new(NULL);
  10330. }
  10331. if (wolfSSL_sk_X509_NAME_ENTRY_push(name->entries, current
  10332. ) != WOLFSSL_SUCCESS) {
  10333. ret = WOLFSSL_FAILURE;
  10334. }
  10335. #endif
  10336. }
  10337. else {
  10338. ret = WOLFSSL_FAILURE;
  10339. }
  10340. if (ret != WOLFSSL_SUCCESS) {
  10341. WOLFSSL_MSG("Error adding the name entry");
  10342. if (current->set == 0)
  10343. name->entrySz--;
  10344. return WOLFSSL_FAILURE;
  10345. }
  10346. if (RebuildFullName(name) != 0)
  10347. return WOLFSSL_FAILURE;
  10348. (void)set;
  10349. return WOLFSSL_SUCCESS;
  10350. }
  10351. int wolfSSL_X509_NAME_add_entry_by_txt(WOLFSSL_X509_NAME *name,
  10352. const char *field, int type,
  10353. const unsigned char *bytes, int len,
  10354. int loc, int set)
  10355. {
  10356. int ret = WOLFSSL_FAILURE;
  10357. int nid;
  10358. WOLFSSL_X509_NAME_ENTRY* entry;
  10359. (void)type;
  10360. WOLFSSL_ENTER("wolfSSL_X509_NAME_add_entry_by_txt");
  10361. if (name == NULL || field == NULL)
  10362. return WOLFSSL_FAILURE;
  10363. if ((nid = wolfSSL_OBJ_txt2nid(field)) == NID_undef) {
  10364. WOLFSSL_MSG("Unable convert text to NID");
  10365. return WOLFSSL_FAILURE;
  10366. }
  10367. entry = wolfSSL_X509_NAME_ENTRY_create_by_NID(NULL,
  10368. nid, type, (unsigned char*)bytes, len);
  10369. if (entry == NULL)
  10370. return WOLFSSL_FAILURE;
  10371. ret = wolfSSL_X509_NAME_add_entry(name, entry, loc, set);
  10372. wolfSSL_X509_NAME_ENTRY_free(entry);
  10373. return ret;
  10374. }
  10375. int wolfSSL_X509_NAME_add_entry_by_NID(WOLFSSL_X509_NAME *name, int nid,
  10376. int type, const unsigned char *bytes,
  10377. int len, int loc, int set)
  10378. {
  10379. int ret;
  10380. WOLFSSL_X509_NAME_ENTRY* entry;
  10381. WOLFSSL_ENTER("wolfSSL_X509_NAME_add_entry_by_NID");
  10382. entry = wolfSSL_X509_NAME_ENTRY_create_by_NID(NULL, nid, type, bytes,
  10383. len);
  10384. if (entry == NULL)
  10385. return WOLFSSL_FAILURE;
  10386. ret = wolfSSL_X509_NAME_add_entry(name, entry, loc, set);
  10387. wolfSSL_X509_NAME_ENTRY_free(entry);
  10388. return ret;
  10389. }
  10390. WOLFSSL_X509_NAME_ENTRY *wolfSSL_X509_NAME_delete_entry(
  10391. WOLFSSL_X509_NAME *name, int loc)
  10392. {
  10393. WOLFSSL_X509_NAME_ENTRY* ret;
  10394. WOLFSSL_ENTER("wolfSSL_X509_NAME_delete_entry");
  10395. if (!name) {
  10396. WOLFSSL_MSG("Bad parameter");
  10397. return NULL;
  10398. }
  10399. ret = wolfSSL_X509_NAME_get_entry(name, loc);
  10400. if (!ret) {
  10401. WOLFSSL_MSG("loc entry not found");
  10402. return NULL;
  10403. }
  10404. name->entry[loc].set = 0;
  10405. return ret;
  10406. }
  10407. #endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
  10408. #if defined(OPENSSL_EXTRA) && !defined(NO_ASN)
  10409. int wolfSSL_X509_NAME_get_index_by_OBJ(WOLFSSL_X509_NAME *name,
  10410. const WOLFSSL_ASN1_OBJECT *obj,
  10411. int idx) {
  10412. if (!name || idx >= MAX_NAME_ENTRIES ||
  10413. !obj || !obj->obj) {
  10414. return -1;
  10415. }
  10416. if (idx < 0) {
  10417. idx = -1;
  10418. }
  10419. for (idx++; idx < MAX_NAME_ENTRIES; idx++) {
  10420. /* Find index of desired name */
  10421. if (name->entry[idx].set) {
  10422. if (XSTRLEN(obj->sName) == XSTRLEN(name->entry[idx].object->sName) &&
  10423. XSTRNCMP((const char*) obj->sName,
  10424. name->entry[idx].object->sName, obj->objSz - 1) == 0) {
  10425. return idx;
  10426. }
  10427. }
  10428. }
  10429. return -1;
  10430. }
  10431. #endif
  10432. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
  10433. defined(OPENSSL_EXTRA_X509_SMALL)
  10434. /* returns a pointer to the internal entry at location 'loc' on success,
  10435. * a null pointer is returned in fail cases */
  10436. WOLFSSL_X509_NAME_ENTRY *wolfSSL_X509_NAME_get_entry(
  10437. WOLFSSL_X509_NAME *name, int loc)
  10438. {
  10439. #ifdef WOLFSSL_DEBUG_OPENSSL
  10440. WOLFSSL_ENTER("wolfSSL_X509_NAME_get_entry");
  10441. #endif
  10442. if (name == NULL) {
  10443. return NULL;
  10444. }
  10445. if (loc < 0 || loc >= MAX_NAME_ENTRIES) {
  10446. WOLFSSL_MSG("Bad argument");
  10447. return NULL;
  10448. }
  10449. if (name->entry[loc].set) {
  10450. #ifdef WOLFSSL_PYTHON
  10451. /* "set" is not only flag use, but also stack index position use in
  10452. * OpenSSL. Python makes tuple based on this number. Therefore,
  10453. * updating "set" by position + 1. "plus 1" means to avoid "not set"
  10454. * zero.
  10455. */
  10456. name->entry[loc].set = loc + 1;
  10457. #endif
  10458. return &name->entry[loc];
  10459. }
  10460. else {
  10461. return NULL;
  10462. }
  10463. }
  10464. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  10465. #ifdef OPENSSL_EXTRA
  10466. int wolfSSL_X509_check_private_key(WOLFSSL_X509 *x509, WOLFSSL_EVP_PKEY *key)
  10467. {
  10468. WOLFSSL_ENTER("wolfSSL_X509_check_private_key");
  10469. if (!x509 || !key) {
  10470. WOLFSSL_MSG("Bad parameter");
  10471. return WOLFSSL_FAILURE;
  10472. }
  10473. #ifndef NO_CHECK_PRIVATE_KEY
  10474. return wc_CheckPrivateKey((byte*)key->pkey.ptr, key->pkey_sz,
  10475. x509->pubKey.buffer, x509->pubKey.length,
  10476. (enum Key_Sum)x509->pubKeyOID) == 1 ?
  10477. WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
  10478. #else
  10479. /* not compiled in */
  10480. return WOLFSSL_SUCCESS;
  10481. #endif
  10482. }
  10483. #endif /* OPENSSL_EXTRA */
  10484. #if defined(HAVE_LIGHTY) || defined(HAVE_STUNNEL) \
  10485. || defined(WOLFSSL_MYSQL_COMPATIBLE) || defined(OPENSSL_EXTRA)
  10486. #ifndef NO_BIO
  10487. #ifdef WOLFSSL_CERT_GEN
  10488. #ifdef WOLFSSL_CERT_REQ
  10489. /* writes the x509 from x to the WOLFSSL_BIO bp
  10490. *
  10491. * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on fail
  10492. */
  10493. int wolfSSL_PEM_write_bio_X509_REQ(WOLFSSL_BIO *bp, WOLFSSL_X509 *x)
  10494. {
  10495. byte* pem;
  10496. int pemSz = 0;
  10497. const unsigned char* der;
  10498. int derSz;
  10499. int ret;
  10500. WOLFSSL_ENTER("wolfSSL_PEM_write_bio_X509_REQ");
  10501. if (x == NULL || bp == NULL) {
  10502. return WOLFSSL_FAILURE;
  10503. }
  10504. der = wolfSSL_X509_get_der(x, &derSz);
  10505. if (der == NULL) {
  10506. return WOLFSSL_FAILURE;
  10507. }
  10508. /* get PEM size */
  10509. pemSz = wc_DerToPemEx(der, derSz, NULL, 0, NULL, CERTREQ_TYPE);
  10510. if (pemSz < 0) {
  10511. return WOLFSSL_FAILURE;
  10512. }
  10513. /* create PEM buffer and convert from DER */
  10514. pem = (byte*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  10515. if (pem == NULL) {
  10516. return WOLFSSL_FAILURE;
  10517. }
  10518. if (wc_DerToPemEx(der, derSz, pem, pemSz, NULL, CERTREQ_TYPE) < 0) {
  10519. XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  10520. return WOLFSSL_FAILURE;
  10521. }
  10522. /* write the PEM to BIO */
  10523. ret = wolfSSL_BIO_write(bp, pem, pemSz);
  10524. XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  10525. if (ret <= 0) return WOLFSSL_FAILURE;
  10526. return WOLFSSL_SUCCESS;
  10527. }
  10528. #endif /* WOLFSSL_CERT_REQ */
  10529. /* writes the x509 from x to the WOLFSSL_BIO bp
  10530. *
  10531. * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on fail
  10532. */
  10533. int wolfSSL_PEM_write_bio_X509_AUX(WOLFSSL_BIO *bp, WOLFSSL_X509 *x)
  10534. {
  10535. byte* pem;
  10536. int pemSz = 0;
  10537. const unsigned char* der;
  10538. int derSz;
  10539. int ret;
  10540. WOLFSSL_ENTER("wolfSSL_PEM_write_bio_X509_AUX");
  10541. if (bp == NULL || x == NULL) {
  10542. WOLFSSL_MSG("NULL argument passed in");
  10543. return WOLFSSL_FAILURE;
  10544. }
  10545. der = wolfSSL_X509_get_der(x, &derSz);
  10546. if (der == NULL) {
  10547. return WOLFSSL_FAILURE;
  10548. }
  10549. /* get PEM size */
  10550. pemSz = wc_DerToPemEx(der, derSz, NULL, 0, NULL, CERT_TYPE);
  10551. if (pemSz < 0) {
  10552. return WOLFSSL_FAILURE;
  10553. }
  10554. /* create PEM buffer and convert from DER */
  10555. pem = (byte*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  10556. if (pem == NULL) {
  10557. return WOLFSSL_FAILURE;
  10558. }
  10559. if (wc_DerToPemEx(der, derSz, pem, pemSz, NULL, CERT_TYPE) < 0) {
  10560. XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  10561. return WOLFSSL_FAILURE;
  10562. }
  10563. /* write the PEM to BIO */
  10564. ret = wolfSSL_BIO_write(bp, pem, pemSz);
  10565. XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  10566. if (ret <= 0) return WOLFSSL_FAILURE;
  10567. return WOLFSSL_SUCCESS;
  10568. }
  10569. int wolfSSL_PEM_write_bio_X509(WOLFSSL_BIO *bio, WOLFSSL_X509 *cert)
  10570. {
  10571. byte* pem = NULL;
  10572. int pemSz = 0;
  10573. /* Get large buffer to hold cert der */
  10574. const byte* der = NULL;
  10575. int derSz = X509_BUFFER_SZ;
  10576. int ret;
  10577. WOLFSSL_ENTER("wolfSSL_PEM_write_bio_X509");
  10578. if (bio == NULL || cert == NULL) {
  10579. WOLFSSL_MSG("NULL argument passed in");
  10580. return WOLFSSL_FAILURE;
  10581. }
  10582. /* Do not call wolfssl_x509_make_der() here. If we did, then need to re-sign
  10583. * because we don't know the original order of the extensions and so we must
  10584. * assume our extensions are in a different order, thus need to re-sign. */
  10585. der = wolfSSL_X509_get_der(cert, &derSz);
  10586. if (der == NULL) {
  10587. goto error;
  10588. }
  10589. /* get PEM size */
  10590. pemSz = wc_DerToPemEx(der, derSz, NULL, 0, NULL, CERT_TYPE);
  10591. if (pemSz < 0) {
  10592. goto error;
  10593. }
  10594. /* create PEM buffer and convert from DER */
  10595. pem = (byte*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  10596. if (pem == NULL) {
  10597. goto error;
  10598. }
  10599. if (wc_DerToPemEx(der, derSz, pem, pemSz, NULL, CERT_TYPE) < 0) {
  10600. goto error;
  10601. }
  10602. /* write the PEM to BIO */
  10603. ret = wolfSSL_BIO_write(bio, pem, pemSz);
  10604. XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  10605. if (ret <= 0) return WOLFSSL_FAILURE;
  10606. return WOLFSSL_SUCCESS;
  10607. error:
  10608. if (pem)
  10609. XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  10610. return WOLFSSL_FAILURE;
  10611. }
  10612. #endif /* WOLFSSL_CERT_GEN */
  10613. #endif /* !NO_BIO */
  10614. #endif /* HAVE_LIGHTY || HAVE_STUNNEL || WOLFSSL_MYSQL_COMPATIBLE */
  10615. #if defined(OPENSSL_EXTRA) || defined(HAVE_STUNNEL) || defined(WOLFSSL_NGINX) || \
  10616. defined(HAVE_LIGHTY) || defined(WOLFSSL_HAPROXY) || \
  10617. defined(WOLFSSL_OPENSSH) || defined(HAVE_SBLIM_SFCB)
  10618. WOLF_STACK_OF(WOLFSSL_X509_NAME)* wolfSSL_sk_X509_NAME_new(
  10619. WOLF_SK_COMPARE_CB(WOLFSSL_X509_NAME, cb))
  10620. {
  10621. WOLFSSL_STACK* sk;
  10622. (void)cb;
  10623. WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_new");
  10624. sk = wolfSSL_sk_new_node(NULL);
  10625. if (sk != NULL) {
  10626. sk->type = STACK_TYPE_X509_NAME;
  10627. }
  10628. return sk;
  10629. }
  10630. int wolfSSL_sk_X509_NAME_num(const WOLF_STACK_OF(WOLFSSL_X509_NAME) *sk)
  10631. {
  10632. WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_num");
  10633. if (sk == NULL)
  10634. return BAD_FUNC_ARG;
  10635. return (int)sk->num;
  10636. }
  10637. /* Getter function for WOLFSSL_X509_NAME pointer
  10638. *
  10639. * sk is the stack to retrieve pointer from
  10640. * i is the index value in stack
  10641. *
  10642. * returns a pointer to a WOLFSSL_X509_NAME structure on success and NULL on
  10643. * fail
  10644. */
  10645. WOLFSSL_X509_NAME* wolfSSL_sk_X509_NAME_value(const STACK_OF(WOLFSSL_X509_NAME)* sk,
  10646. int i)
  10647. {
  10648. WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_value");
  10649. return (WOLFSSL_X509_NAME*)wolfSSL_sk_value(sk, i);
  10650. }
  10651. WOLFSSL_X509_NAME* wolfSSL_sk_X509_NAME_pop(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
  10652. {
  10653. WOLFSSL_STACK* node;
  10654. WOLFSSL_X509_NAME* name;
  10655. if (sk == NULL) {
  10656. return NULL;
  10657. }
  10658. node = sk->next;
  10659. name = sk->data.name;
  10660. if (node != NULL) { /* update sk and remove node from stack */
  10661. sk->data.name = node->data.name;
  10662. sk->next = node->next;
  10663. XFREE(node, NULL, DYNAMIC_TYPE_OPENSSL);
  10664. }
  10665. else { /* last x509 in stack */
  10666. sk->data.name = NULL;
  10667. }
  10668. if (sk->num > 0) {
  10669. sk->num -= 1;
  10670. }
  10671. return name;
  10672. }
  10673. void wolfSSL_sk_X509_NAME_pop_free(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
  10674. void (*f) (WOLFSSL_X509_NAME*))
  10675. {
  10676. WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_pop_free");
  10677. wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
  10678. }
  10679. /* Free only the sk structure, NOT X509_NAME members */
  10680. void wolfSSL_sk_X509_NAME_free(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
  10681. {
  10682. WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_free");
  10683. wolfSSL_sk_free(sk);
  10684. }
  10685. int wolfSSL_sk_X509_NAME_push(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
  10686. WOLFSSL_X509_NAME* name)
  10687. {
  10688. WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_push");
  10689. return wolfSSL_sk_push(sk, name);
  10690. }
  10691. /* return index of found, or negative to indicate not found */
  10692. int wolfSSL_sk_X509_NAME_find(const WOLF_STACK_OF(WOLFSSL_X509_NAME) *sk,
  10693. WOLFSSL_X509_NAME *name)
  10694. {
  10695. int i;
  10696. WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_find");
  10697. if (sk == NULL)
  10698. return BAD_FUNC_ARG;
  10699. for (i = 0; sk; i++, sk = sk->next) {
  10700. if (wolfSSL_X509_NAME_cmp(sk->data.name, name) == 0) {
  10701. return i;
  10702. }
  10703. }
  10704. return -1;
  10705. }
  10706. /* Name Entry */
  10707. WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* wolfSSL_sk_X509_NAME_ENTRY_new(
  10708. WOLF_SK_COMPARE_CB(WOLFSSL_X509_NAME_ENTRY, cb))
  10709. {
  10710. WOLFSSL_STACK* sk = wolfSSL_sk_new_node(NULL);
  10711. if (sk != NULL) {
  10712. sk->type = STACK_TYPE_X509_NAME_ENTRY;
  10713. (void)cb;
  10714. }
  10715. return sk;
  10716. }
  10717. int wolfSSL_sk_X509_NAME_ENTRY_push(WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk,
  10718. WOLFSSL_X509_NAME_ENTRY* name_entry)
  10719. {
  10720. return wolfSSL_sk_push(sk, name_entry);
  10721. }
  10722. WOLFSSL_X509_NAME_ENTRY* wolfSSL_sk_X509_NAME_ENTRY_value(
  10723. const WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk, int i)
  10724. {
  10725. return (WOLFSSL_X509_NAME_ENTRY*)wolfSSL_sk_value(sk, i);
  10726. }
  10727. int wolfSSL_sk_X509_NAME_ENTRY_num(const WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk)
  10728. {
  10729. if (sk == NULL)
  10730. return BAD_FUNC_ARG;
  10731. return (int)sk->num;
  10732. }
  10733. void wolfSSL_sk_X509_NAME_ENTRY_free(WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk)
  10734. {
  10735. wolfSSL_sk_free(sk);
  10736. }
  10737. #endif /* OPENSSL_EXTRA || HAVE_STUNNEL || WOLFSSL_NGINX ||
  10738. HAVE_LIGHTY || WOLFSSL_HAPROXY ||
  10739. WOLFSSL_OPENSSH || HAVE_SBLIM_SFCB */
  10740. #if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
  10741. (defined(HAVE_STUNNEL) || defined(WOLFSSL_NGINX) || \
  10742. defined(HAVE_LIGHTY) || defined(WOLFSSL_HAPROXY) || \
  10743. defined(WOLFSSL_OPENSSH) || defined(HAVE_SBLIM_SFCB))
  10744. #if defined(OPENSSL_ALL)
  10745. WOLFSSL_X509_INFO* wolfSSL_X509_INFO_new(void)
  10746. {
  10747. WOLFSSL_X509_INFO* info;
  10748. info = (WOLFSSL_X509_INFO*)XMALLOC(sizeof(WOLFSSL_X509_INFO), NULL,
  10749. DYNAMIC_TYPE_X509);
  10750. if (info) {
  10751. XMEMSET(info, 0, sizeof(*info));
  10752. }
  10753. return info;
  10754. }
  10755. void wolfSSL_X509_INFO_free(WOLFSSL_X509_INFO* info)
  10756. {
  10757. if (info == NULL)
  10758. return;
  10759. if (info->x509) {
  10760. wolfSSL_X509_free(info->x509);
  10761. info->x509 = NULL;
  10762. }
  10763. #ifdef HAVE_CRL
  10764. if (info->crl) {
  10765. wolfSSL_X509_CRL_free(info->crl);
  10766. info->crl = NULL;
  10767. }
  10768. #endif
  10769. wolfSSL_X509_PKEY_free(info->x_pkey);
  10770. info->x_pkey = NULL;
  10771. XFREE(info, NULL, DYNAMIC_TYPE_X509);
  10772. }
  10773. #endif
  10774. WOLFSSL_STACK* wolfSSL_sk_X509_INFO_new_null(void)
  10775. {
  10776. WOLFSSL_STACK* sk = wolfSSL_sk_new_node(NULL);
  10777. if (sk) {
  10778. sk->type = STACK_TYPE_X509_INFO;
  10779. }
  10780. return sk;
  10781. }
  10782. int wolfSSL_sk_X509_INFO_num(const WOLF_STACK_OF(WOLFSSL_X509_INFO) *sk)
  10783. {
  10784. WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_num");
  10785. return wolfSSL_sk_num(sk);
  10786. }
  10787. WOLFSSL_X509_INFO* wolfSSL_sk_X509_INFO_value(
  10788. const WOLF_STACK_OF(WOLFSSL_X509_INFO) *sk, int i)
  10789. {
  10790. WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_value");
  10791. return (WOLFSSL_X509_INFO *)wolfSSL_sk_value(sk, i);
  10792. }
  10793. WOLFSSL_X509_INFO* wolfSSL_sk_X509_INFO_pop(
  10794. WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk)
  10795. {
  10796. WOLFSSL_STACK* node;
  10797. WOLFSSL_X509_INFO* info;
  10798. if (sk == NULL) {
  10799. return NULL;
  10800. }
  10801. node = sk->next;
  10802. info = sk->data.info;
  10803. if (node != NULL) { /* update sk and remove node from stack */
  10804. sk->data.info = node->data.info;
  10805. sk->next = node->next;
  10806. wolfSSL_sk_free_node(node);
  10807. }
  10808. else { /* last x509 in stack */
  10809. sk->data.info = NULL;
  10810. }
  10811. if (sk->num > 0) {
  10812. sk->num -= 1;
  10813. }
  10814. return info;
  10815. }
  10816. #if defined(OPENSSL_ALL)
  10817. void wolfSSL_sk_X509_INFO_pop_free(WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
  10818. void (*f) (WOLFSSL_X509_INFO*))
  10819. {
  10820. WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_pop_free");
  10821. wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
  10822. }
  10823. void wolfSSL_sk_X509_INFO_free(WOLF_STACK_OF(WOLFSSL_X509_INFO) *sk)
  10824. {
  10825. WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_free");
  10826. wolfSSL_sk_free(sk);
  10827. }
  10828. /* Adds the WOLFSSL_X509_INFO to the stack "sk". "sk" takes control of "in" and
  10829. * tries to free it when the stack is free'd.
  10830. *
  10831. * return 1 on success 0 on fail
  10832. */
  10833. int wolfSSL_sk_X509_INFO_push(WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
  10834. WOLFSSL_X509_INFO* in)
  10835. {
  10836. return wolfSSL_sk_push(sk, in);
  10837. }
  10838. /* Creates a duplicate of WOLF_STACK_OF(WOLFSSL_X509_NAME).
  10839. * Returns a new WOLF_STACK_OF(WOLFSSL_X509_NAME) or NULL on failure */
  10840. WOLF_STACK_OF(WOLFSSL_X509_NAME) *wolfSSL_dup_CA_list(
  10841. WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
  10842. {
  10843. int i;
  10844. const int num = wolfSSL_sk_X509_NAME_num(sk);
  10845. WOLF_STACK_OF(WOLFSSL_X509_NAME) *copy;
  10846. WOLFSSL_X509_NAME *name;
  10847. WOLFSSL_ENTER("wolfSSL_dup_CA_list");
  10848. copy = wolfSSL_sk_X509_NAME_new(NULL);
  10849. if (copy == NULL) {
  10850. WOLFSSL_MSG("Memory error");
  10851. return NULL;
  10852. }
  10853. for (i = 0; i < num; i++) {
  10854. name = wolfSSL_X509_NAME_dup(wolfSSL_sk_X509_NAME_value(sk, i));
  10855. if (name == NULL || WOLFSSL_SUCCESS != wolfSSL_sk_X509_NAME_push(copy, name)) {
  10856. WOLFSSL_MSG("Memory error");
  10857. wolfSSL_sk_X509_NAME_pop_free(copy, wolfSSL_X509_NAME_free);
  10858. return NULL;
  10859. }
  10860. }
  10861. return copy;
  10862. }
  10863. void* wolfSSL_sk_X509_OBJECT_value(WOLF_STACK_OF(WOLFSSL_X509_OBJECT)* sk, int i)
  10864. {
  10865. WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_value");
  10866. for (; sk != NULL && i > 0; i--)
  10867. sk = sk->next;
  10868. if (i != 0 || sk == NULL)
  10869. return NULL;
  10870. return sk->data.x509_obj;
  10871. }
  10872. int wolfSSL_sk_X509_OBJECT_num(const WOLF_STACK_OF(WOLFSSL_X509_OBJECT) *s)
  10873. {
  10874. WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_num");
  10875. if (s) {
  10876. return (int)s->num;
  10877. } else {
  10878. return 0;
  10879. }
  10880. }
  10881. int wolfSSL_sk_X509_NAME_set_cmp_func(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
  10882. WOLF_SK_COMPARE_CB(WOLFSSL_X509_NAME, cb))
  10883. {
  10884. WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_set_cmp_func");
  10885. if (sk == NULL)
  10886. return BAD_FUNC_ARG;
  10887. WOLFSSL_MSG("Stack comparison not used in wolfSSL");
  10888. (void)cb;
  10889. return 0;
  10890. }
  10891. #endif /* OPENSSL_ALL */
  10892. #ifndef NO_BIO
  10893. /* Helper function for X509_NAME_print_ex. Sets *buf to string for domain
  10894. name attribute based on NID. Returns size of buf */
  10895. static int get_dn_attr_by_nid(int n, const char** buf)
  10896. {
  10897. int len = 0;
  10898. const char *str;
  10899. switch(n)
  10900. {
  10901. case NID_commonName :
  10902. str = "CN";
  10903. len = 2;
  10904. break;
  10905. case NID_countryName:
  10906. str = "C";
  10907. len = 1;
  10908. break;
  10909. case NID_localityName:
  10910. str = "L";
  10911. len = 1;
  10912. break;
  10913. case NID_stateOrProvinceName:
  10914. str = "ST";
  10915. len = 2;
  10916. break;
  10917. case NID_streetAddress:
  10918. str = "street";
  10919. len = 6;
  10920. break;
  10921. case NID_organizationName:
  10922. str = "O";
  10923. len = 1;
  10924. break;
  10925. case NID_organizationalUnitName:
  10926. str = "OU";
  10927. len = 2;
  10928. break;
  10929. case NID_postalCode:
  10930. str = "postalCode";
  10931. len = 10;
  10932. break;
  10933. case NID_emailAddress:
  10934. str = "emailAddress";
  10935. len = 12;
  10936. break;
  10937. case NID_surname:
  10938. str = "SN";
  10939. len = 2;
  10940. break;
  10941. case NID_givenName:
  10942. str = "GN";
  10943. len = 2;
  10944. break;
  10945. case NID_dnQualifier:
  10946. str = "dnQualifier";
  10947. len = 11;
  10948. break;
  10949. case NID_name:
  10950. str = "name";
  10951. len = 4;
  10952. break;
  10953. case NID_initials:
  10954. str = "initials";
  10955. len = 8;
  10956. break;
  10957. case NID_domainComponent:
  10958. str = "DC";
  10959. len = 2;
  10960. break;
  10961. case NID_pkcs9_contentType:
  10962. str = "contentType";
  10963. len = 11;
  10964. break;
  10965. case NID_userId:
  10966. str = "UID";
  10967. len = 3;
  10968. break;
  10969. default:
  10970. WOLFSSL_MSG("Attribute type not found");
  10971. str = NULL;
  10972. }
  10973. if (buf != NULL)
  10974. *buf = str;
  10975. return len;
  10976. }
  10977. /**
  10978. * Escape input string for RFC2253 requirements. The following characters
  10979. * are escaped with a backslash (\):
  10980. *
  10981. * 1. A space or '#' at the beginning of the string
  10982. * 2. A space at the end of the string
  10983. * 3. One of: ",", "+", """, "\", "<", ">", ";"
  10984. *
  10985. * in - input string to escape
  10986. * inSz - length of in, not including the null terminator
  10987. * out - buffer for output string to be written, will be null terminated
  10988. * outSz - size of out
  10989. *
  10990. * Returns size of output string (not counting NULL terminator) on success,
  10991. * negative on error.
  10992. */
  10993. static int wolfSSL_EscapeString_RFC2253(char* in, word32 inSz,
  10994. char* out, word32 outSz)
  10995. {
  10996. word32 inIdx = 0;
  10997. word32 outIdx = 0;
  10998. if (in == NULL || out == NULL || inSz == 0 || outSz == 0) {
  10999. return BAD_FUNC_ARG;
  11000. }
  11001. for (inIdx = 0; inIdx < inSz; inIdx++) {
  11002. char c = in[inIdx];
  11003. if (((inIdx == 0) && (c == ' ' || c == '#')) ||
  11004. ((inIdx == (inSz-1)) && (c == ' ')) ||
  11005. c == ',' || c == '+' || c == '"' || c == '\\' ||
  11006. c == '<' || c == '>' || c == ';') {
  11007. if (outIdx > (outSz - 1)) {
  11008. return BUFFER_E;
  11009. }
  11010. out[outIdx] = '\\';
  11011. outIdx++;
  11012. }
  11013. if (outIdx > (outSz - 1)) {
  11014. return BUFFER_E;
  11015. }
  11016. out[outIdx] = c;
  11017. outIdx++;
  11018. }
  11019. /* null terminate out */
  11020. if (outIdx > (outSz -1)) {
  11021. return BUFFER_E;
  11022. }
  11023. out[outIdx] = '\0';
  11024. return outIdx;
  11025. }
  11026. /*
  11027. * Print human readable version of X509_NAME to provided BIO.
  11028. *
  11029. * bio - output BIO to place name string. Does not include null terminator.
  11030. * name - input name to convert to string
  11031. * indent - number of indent spaces to prepend to name string
  11032. * flags - flags to control function behavior. Not all flags are currently
  11033. * supported/implemented. Currently supported are:
  11034. * XN_FLAG_RFC2253 - only the backslash escape requirements from
  11035. * RFC22523 currently implemented.
  11036. * XN_FLAG_DN_REV - print name reversed. Automatically done by
  11037. * XN_FLAG_RFC2253.
  11038. *
  11039. * Returns WOLFSSL_SUCCESS (1) on success, WOLFSSL_FAILURE (0) on failure.
  11040. */
  11041. int wolfSSL_X509_NAME_print_ex(WOLFSSL_BIO* bio, WOLFSSL_X509_NAME* name,
  11042. int indent, unsigned long flags)
  11043. {
  11044. int i, count = 0, nameStrSz = 0, escapeSz = 0;
  11045. char* tmp = NULL;
  11046. char* nameStr = NULL;
  11047. const char *buf = NULL;
  11048. WOLFSSL_X509_NAME_ENTRY* ne;
  11049. WOLFSSL_ASN1_STRING* str;
  11050. char escaped[ASN_NAME_MAX];
  11051. WOLFSSL_ENTER("wolfSSL_X509_NAME_print_ex");
  11052. if ((name == NULL) || (name->sz == 0) || (bio == NULL))
  11053. return WOLFSSL_FAILURE;
  11054. for (i = 0; i < indent; i++) {
  11055. if (wolfSSL_BIO_write(bio, " ", 1) != 1)
  11056. return WOLFSSL_FAILURE;
  11057. }
  11058. count = wolfSSL_X509_NAME_entry_count(name);
  11059. for (i = 0; i < count; i++) {
  11060. int len;
  11061. int tmpSz;
  11062. /* reverse name order for RFC2253 and DN_REV */
  11063. if ((flags & XN_FLAG_RFC2253) || (flags & XN_FLAG_DN_REV)) {
  11064. ne = wolfSSL_X509_NAME_get_entry(name, count - i - 1);
  11065. } else {
  11066. ne = wolfSSL_X509_NAME_get_entry(name, i);
  11067. }
  11068. if (ne == NULL)
  11069. return WOLFSSL_FAILURE;
  11070. str = wolfSSL_X509_NAME_ENTRY_get_data(ne);
  11071. if (str == NULL)
  11072. return WOLFSSL_FAILURE;
  11073. if (flags & XN_FLAG_RFC2253) {
  11074. /* escape string for RFC 2253, ret sz not counting null term */
  11075. escapeSz = wolfSSL_EscapeString_RFC2253(str->data,
  11076. str->length, escaped, sizeof(escaped));
  11077. if (escapeSz < 0)
  11078. return WOLFSSL_FAILURE;
  11079. nameStr = escaped;
  11080. nameStrSz = escapeSz;
  11081. }
  11082. else {
  11083. nameStr = str->data;
  11084. nameStrSz = str->length;
  11085. }
  11086. /* len is without null terminator */
  11087. len = get_dn_attr_by_nid(ne->nid, &buf);
  11088. if (len == 0 || buf == NULL)
  11089. return WOLFSSL_FAILURE;
  11090. tmpSz = nameStrSz + len + 4; /* + 4 for '=', comma space and '\0'*/
  11091. tmp = (char*)XMALLOC(tmpSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  11092. if (tmp == NULL) {
  11093. return WOLFSSL_FAILURE;
  11094. }
  11095. if (i < count - 1) {
  11096. if (XSNPRINTF(tmp, tmpSz, "%s=%s, ", buf, nameStr)
  11097. >= tmpSz)
  11098. {
  11099. WOLFSSL_MSG("buffer overrun");
  11100. XFREE(tmp, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  11101. return WOLFSSL_FAILURE;
  11102. }
  11103. tmpSz = len + nameStrSz + 3; /* 3 for '=', comma space */
  11104. }
  11105. else {
  11106. if (XSNPRINTF(tmp, tmpSz, "%s=%s", buf, nameStr)
  11107. >= tmpSz)
  11108. {
  11109. WOLFSSL_MSG("buffer overrun");
  11110. XFREE(tmp, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  11111. return WOLFSSL_FAILURE;
  11112. }
  11113. tmpSz = len + nameStrSz + 1; /* 1 for '=' */
  11114. if (bio->type != WOLFSSL_BIO_FILE && bio->type != WOLFSSL_BIO_MEMORY)
  11115. ++tmpSz; /* include the terminating null when not writing to a
  11116. * file.
  11117. */
  11118. }
  11119. if (wolfSSL_BIO_write(bio, tmp, tmpSz) != tmpSz) {
  11120. XFREE(tmp, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  11121. return WOLFSSL_FAILURE;
  11122. }
  11123. XFREE(tmp, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  11124. }
  11125. return WOLFSSL_SUCCESS;
  11126. }
  11127. #ifndef NO_FILESYSTEM
  11128. int wolfSSL_X509_NAME_print_ex_fp(XFILE file, WOLFSSL_X509_NAME* name,
  11129. int indent, unsigned long flags)
  11130. {
  11131. WOLFSSL_BIO* bio;
  11132. int ret;
  11133. WOLFSSL_ENTER("wolfSSL_X509_NAME_print_ex_fp");
  11134. if (!(bio = wolfSSL_BIO_new_fp(file, BIO_NOCLOSE))) {
  11135. WOLFSSL_MSG("wolfSSL_BIO_new_fp error");
  11136. return WOLFSSL_FAILURE;
  11137. }
  11138. ret = wolfSSL_X509_NAME_print_ex(bio, name, indent, flags);
  11139. wolfSSL_BIO_free(bio);
  11140. return ret;
  11141. }
  11142. #endif /* NO_FILESYSTEM */
  11143. #endif /* !NO_BIO */
  11144. #ifndef NO_WOLFSSL_STUB
  11145. WOLFSSL_ASN1_BIT_STRING* wolfSSL_X509_get0_pubkey_bitstr(const WOLFSSL_X509* x)
  11146. {
  11147. (void)x;
  11148. WOLFSSL_ENTER("wolfSSL_X509_get0_pubkey_bitstr");
  11149. WOLFSSL_STUB("X509_get0_pubkey_bitstr");
  11150. return NULL;
  11151. }
  11152. #endif
  11153. #ifdef OPENSSL_ALL
  11154. WOLFSSL_X509_LOOKUP_TYPE wolfSSL_X509_OBJECT_get_type(
  11155. const WOLFSSL_X509_OBJECT* obj)
  11156. {
  11157. if (obj == NULL)
  11158. return WOLFSSL_X509_LU_NONE;
  11159. return obj->type;
  11160. }
  11161. WOLFSSL_X509_OBJECT* wolfSSL_X509_OBJECT_new(void)
  11162. {
  11163. WOLFSSL_X509_OBJECT* ret = (WOLFSSL_X509_OBJECT*)
  11164. XMALLOC(sizeof(WOLFSSL_X509_OBJECT), NULL, DYNAMIC_TYPE_OPENSSL);
  11165. if (ret != NULL)
  11166. XMEMSET(ret, 0, sizeof(WOLFSSL_X509_OBJECT));
  11167. return ret;
  11168. }
  11169. void wolfSSL_X509_OBJECT_free(WOLFSSL_X509_OBJECT *obj)
  11170. {
  11171. WOLFSSL_ENTER("wolfSSL_X509_OBJECT_free");
  11172. if (obj != NULL) {
  11173. if (obj->type == WOLFSSL_X509_LU_X509) {
  11174. wolfSSL_X509_free(obj->data.x509);
  11175. }
  11176. else {
  11177. /* We don't free as this will point to
  11178. * store->cm->crl which we don't own */
  11179. WOLFSSL_MSG("Not free'ing CRL in WOLFSSL_X509_OBJECT");
  11180. }
  11181. XFREE(obj, NULL, DYNAMIC_TYPE_OPENSSL);
  11182. }
  11183. }
  11184. #endif /* OPENSSL_ALL */
  11185. #ifndef NO_WOLFSSL_STUB
  11186. WOLFSSL_X509_OBJECT* wolfSSL_sk_X509_OBJECT_delete(
  11187. WOLF_STACK_OF(WOLFSSL_X509_OBJECT)* sk, int i)
  11188. {
  11189. WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_delete");
  11190. WOLFSSL_STUB("wolfSSL_sk_X509_OBJECT_delete");
  11191. (void)sk;
  11192. (void)i;
  11193. return NULL;
  11194. }
  11195. #endif
  11196. WOLFSSL_X509 *wolfSSL_X509_OBJECT_get0_X509(const WOLFSSL_X509_OBJECT *obj)
  11197. {
  11198. if (obj != NULL && obj->type == WOLFSSL_X509_LU_X509)
  11199. return obj->data.x509;
  11200. return NULL;
  11201. }
  11202. WOLFSSL_X509_CRL *wolfSSL_X509_OBJECT_get0_X509_CRL(WOLFSSL_X509_OBJECT *obj)
  11203. {
  11204. if (obj != NULL && obj->type == WOLFSSL_X509_LU_CRL)
  11205. return obj->data.crl;
  11206. return NULL;
  11207. }
  11208. #endif /* OPENSSL_ALL || (OPENSSL_EXTRA && (HAVE_STUNNEL || WOLFSSL_NGINX ||
  11209. * HAVE_LIGHTY || WOLFSSL_HAPROXY || WOLFSSL_OPENSSH ||
  11210. * HAVE_SBLIM_SFCB)) */
  11211. #if defined(OPENSSL_EXTRA)
  11212. int wolfSSL_sk_X509_num(const WOLF_STACK_OF(WOLFSSL_X509) *s)
  11213. {
  11214. WOLFSSL_ENTER("wolfSSL_sk_X509_num");
  11215. if (s == NULL)
  11216. return -1;
  11217. return (int)s->num;
  11218. }
  11219. #endif /* OPENSSL_EXTRA */
  11220. #if defined(HAVE_EX_DATA) && (defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) \
  11221. || defined(WOLFSSL_HAPROXY) || defined(OPENSSL_EXTRA) \
  11222. || defined(HAVE_LIGHTY))
  11223. int wolfSSL_X509_get_ex_new_index(int idx, void *arg,
  11224. WOLFSSL_CRYPTO_EX_new* new_func,
  11225. WOLFSSL_CRYPTO_EX_dup* dup_func,
  11226. WOLFSSL_CRYPTO_EX_free* free_func)
  11227. {
  11228. WOLFSSL_ENTER("wolfSSL_X509_get_ex_new_index");
  11229. return wolfssl_get_ex_new_index(CRYPTO_EX_INDEX_X509, idx, arg,
  11230. new_func, dup_func, free_func);
  11231. }
  11232. #endif
  11233. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL) || \
  11234. defined(WOLFSSL_WPAS_SMALL)
  11235. void *wolfSSL_X509_get_ex_data(X509 *x509, int idx)
  11236. {
  11237. WOLFSSL_ENTER("wolfSSL_X509_get_ex_data");
  11238. #ifdef HAVE_EX_DATA
  11239. if (x509 != NULL) {
  11240. return wolfSSL_CRYPTO_get_ex_data(&x509->ex_data, idx);
  11241. }
  11242. #else
  11243. (void)x509;
  11244. (void)idx;
  11245. #endif
  11246. return NULL;
  11247. }
  11248. int wolfSSL_X509_set_ex_data(X509 *x509, int idx, void *data)
  11249. {
  11250. WOLFSSL_ENTER("wolfSSL_X509_set_ex_data");
  11251. #ifdef HAVE_EX_DATA
  11252. if (x509 != NULL)
  11253. {
  11254. return wolfSSL_CRYPTO_set_ex_data(&x509->ex_data, idx, data);
  11255. }
  11256. #else
  11257. (void)x509;
  11258. (void)idx;
  11259. (void)data;
  11260. #endif
  11261. return WOLFSSL_FAILURE;
  11262. }
  11263. #ifdef HAVE_EX_DATA_CLEANUP_HOOKS
  11264. int wolfSSL_X509_set_ex_data_with_cleanup(
  11265. X509 *x509,
  11266. int idx,
  11267. void *data,
  11268. wolfSSL_ex_data_cleanup_routine_t cleanup_routine)
  11269. {
  11270. WOLFSSL_ENTER("wolfSSL_X509_set_ex_data_with_cleanup");
  11271. if (x509 != NULL)
  11272. {
  11273. return wolfSSL_CRYPTO_set_ex_data_with_cleanup(&x509->ex_data, idx,
  11274. data, cleanup_routine);
  11275. }
  11276. return WOLFSSL_FAILURE;
  11277. }
  11278. #endif /* HAVE_EX_DATA_CLEANUP_HOOKS */
  11279. #endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL || WOLFSSL_WPAS_SMALL */
  11280. #ifndef NO_ASN
  11281. int wolfSSL_X509_check_host(WOLFSSL_X509 *x, const char *chk, size_t chklen,
  11282. unsigned int flags, char **peername)
  11283. {
  11284. int ret;
  11285. #ifdef WOLFSSL_SMALL_STACK
  11286. DecodedCert *dCert;
  11287. #else
  11288. DecodedCert dCert[1];
  11289. #endif
  11290. WOLFSSL_ENTER("wolfSSL_X509_check_host");
  11291. /* flags and peername not needed for Nginx. */
  11292. (void)flags;
  11293. (void)peername;
  11294. if ((x == NULL) || (chk == NULL)) {
  11295. WOLFSSL_MSG("Invalid parameter");
  11296. return WOLFSSL_FAILURE;
  11297. }
  11298. if (flags == WOLFSSL_NO_WILDCARDS) {
  11299. WOLFSSL_MSG("X509_CHECK_FLAG_NO_WILDCARDS not yet implemented");
  11300. return WOLFSSL_FAILURE;
  11301. }
  11302. if (flags == WOLFSSL_NO_PARTIAL_WILDCARDS) {
  11303. WOLFSSL_MSG("X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS not yet implemented");
  11304. return WOLFSSL_FAILURE;
  11305. }
  11306. #ifdef WOLFSSL_SMALL_STACK
  11307. dCert = (DecodedCert *)XMALLOC(sizeof(*dCert), x->heap,
  11308. DYNAMIC_TYPE_DCERT);
  11309. if (dCert == NULL) {
  11310. WOLFSSL_MSG("\tout of memory");
  11311. return WOLFSSL_FATAL_ERROR;
  11312. }
  11313. #endif
  11314. InitDecodedCert(dCert, x->derCert->buffer, x->derCert->length, NULL);
  11315. ret = ParseCertRelative(dCert, CERT_TYPE, 0, NULL);
  11316. if (ret != 0) {
  11317. goto out;
  11318. }
  11319. ret = CheckHostName(dCert, (char *)chk, chklen);
  11320. out:
  11321. FreeDecodedCert(dCert);
  11322. #ifdef WOLFSSL_SMALL_STACK
  11323. XFREE(dCert, x->heap, DYNAMIC_TYPE_DCERT);
  11324. #endif
  11325. if (ret != 0)
  11326. return WOLFSSL_FAILURE;
  11327. return WOLFSSL_SUCCESS;
  11328. }
  11329. int wolfSSL_X509_check_ip_asc(WOLFSSL_X509 *x, const char *ipasc,
  11330. unsigned int flags)
  11331. {
  11332. int ret = WOLFSSL_FAILURE;
  11333. #ifdef WOLFSSL_SMALL_STACK
  11334. DecodedCert *dCert = NULL;
  11335. #else
  11336. DecodedCert dCert[1];
  11337. #endif
  11338. WOLFSSL_ENTER("wolfSSL_X509_check_ip_asc");
  11339. /* flags not yet implemented */
  11340. (void)flags;
  11341. if ((x == NULL) || (x->derCert == NULL) || (ipasc == NULL)) {
  11342. WOLFSSL_MSG("Invalid parameter");
  11343. }
  11344. else {
  11345. ret = WOLFSSL_SUCCESS;
  11346. }
  11347. #ifdef WOLFSSL_SMALL_STACK
  11348. if (ret == WOLFSSL_SUCCESS) {
  11349. dCert = (DecodedCert *)XMALLOC(sizeof(*dCert), x->heap,
  11350. DYNAMIC_TYPE_DCERT);
  11351. if (dCert == NULL) {
  11352. WOLFSSL_MSG("\tout of memory");
  11353. ret = WOLFSSL_FAILURE;
  11354. }
  11355. }
  11356. #endif
  11357. if (ret == WOLFSSL_SUCCESS) {
  11358. InitDecodedCert(dCert, x->derCert->buffer, x->derCert->length, NULL);
  11359. ret = ParseCertRelative(dCert, CERT_TYPE, 0, NULL);
  11360. if (ret != 0) {
  11361. ret = WOLFSSL_FAILURE;
  11362. }
  11363. else {
  11364. ret = CheckIPAddr(dCert, ipasc);
  11365. if (ret != 0) {
  11366. ret = WOLFSSL_FAILURE;
  11367. }
  11368. else {
  11369. ret = WOLFSSL_SUCCESS;
  11370. }
  11371. }
  11372. FreeDecodedCert(dCert);
  11373. }
  11374. #ifdef WOLFSSL_SMALL_STACK
  11375. if (dCert != NULL)
  11376. XFREE(dCert, x->heap, DYNAMIC_TYPE_DCERT);
  11377. #endif
  11378. return ret;
  11379. }
  11380. #endif
  11381. #if defined(OPENSSL_EXTRA) && defined(WOLFSSL_CERT_GEN)
  11382. int wolfSSL_X509_check_email(WOLFSSL_X509 *x, const char *chk, size_t chkLen,
  11383. unsigned int flags)
  11384. {
  11385. WOLFSSL_X509_NAME *subjName;
  11386. int emailLen;
  11387. char *emailBuf;
  11388. (void)flags;
  11389. WOLFSSL_ENTER("wolfSSL_X509_check_email");
  11390. if ((x == NULL) || (chk == NULL)) {
  11391. WOLFSSL_MSG("Invalid parameter");
  11392. return WOLFSSL_FAILURE;
  11393. }
  11394. subjName = wolfSSL_X509_get_subject_name(x);
  11395. if (subjName == NULL)
  11396. return WOLFSSL_FAILURE;
  11397. /* Call with NULL buffer to get required length. */
  11398. emailLen = wolfSSL_X509_NAME_get_text_by_NID(subjName, NID_emailAddress,
  11399. NULL, 0);
  11400. if (emailLen < 0)
  11401. return WOLFSSL_FAILURE;
  11402. ++emailLen; /* Add 1 for the NUL. */
  11403. emailBuf = (char*)XMALLOC(emailLen, x->heap, DYNAMIC_TYPE_OPENSSL);
  11404. if (emailBuf == NULL)
  11405. return WOLFSSL_FAILURE;
  11406. emailLen = wolfSSL_X509_NAME_get_text_by_NID(subjName, NID_emailAddress,
  11407. emailBuf, emailLen);
  11408. if (emailLen < 0) {
  11409. XFREE(emailBuf, x->heap, DYNAMIC_TYPE_OPENSSL);
  11410. return WOLFSSL_FAILURE;
  11411. }
  11412. if (chkLen == 0)
  11413. chkLen = XSTRLEN(chk);
  11414. if (chkLen != (size_t)emailLen
  11415. || XSTRNCMP(chk, emailBuf, chkLen)) {
  11416. XFREE(emailBuf, x->heap, DYNAMIC_TYPE_OPENSSL);
  11417. return WOLFSSL_FAILURE;
  11418. }
  11419. XFREE(emailBuf, x->heap, DYNAMIC_TYPE_OPENSSL);
  11420. return WOLFSSL_SUCCESS;
  11421. }
  11422. #endif /* OPENSSL_EXTRA && WOLFSSL_CERT_GEN */
  11423. #if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) || defined(WOLFSSL_HAPROXY) \
  11424. || defined(OPENSSL_EXTRA) || defined(HAVE_LIGHTY)
  11425. int wolfSSL_X509_NAME_digest(const WOLFSSL_X509_NAME *name,
  11426. const WOLFSSL_EVP_MD *type, unsigned char *md, unsigned int *len)
  11427. {
  11428. WOLFSSL_ENTER("wolfSSL_X509_NAME_digest");
  11429. if (name == NULL || type == NULL)
  11430. return WOLFSSL_FAILURE;
  11431. #if !defined(NO_FILESYSTEM) && !defined(NO_PWDBASED)
  11432. return wolfSSL_EVP_Digest((unsigned char*)name->name,
  11433. name->sz, md, len, type, NULL);
  11434. #else
  11435. (void)md;
  11436. (void)len;
  11437. return NOT_COMPILED_IN;
  11438. #endif
  11439. }
  11440. #endif /* OPENSSL_ALL || WOLFSSL_NGINX || WOLFSSL_HAPROXY ||
  11441. OPENSSL_EXTRA || HAVE_LIGHTY */
  11442. #if defined(WOLFSSL_NGINX) || defined(WOLFSSL_HAPROXY) || \
  11443. defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL)
  11444. /**
  11445. * Find the issuing cert of the input cert. On a self-signed cert this
  11446. * function will return an error.
  11447. * @param issuer The issuer x509 struct is returned here
  11448. * @param cm The cert manager that is queried for the issuer
  11449. * @param x This cert's issuer will be queried in cm
  11450. * @return WOLFSSL_SUCCESS on success
  11451. * WOLFSSL_FAILURE on error
  11452. */
  11453. static int x509GetIssuerFromCM(WOLFSSL_X509 **issuer, WOLFSSL_CERT_MANAGER* cm,
  11454. WOLFSSL_X509 *x)
  11455. {
  11456. Signer* ca = NULL;
  11457. #ifdef WOLFSSL_SMALL_STACK
  11458. DecodedCert* cert = NULL;
  11459. #else
  11460. DecodedCert cert[1];
  11461. #endif
  11462. if (cm == NULL || x == NULL || x->derCert == NULL) {
  11463. WOLFSSL_MSG("No cert DER buffer or NULL cm. Defining "
  11464. "WOLFSSL_SIGNER_DER_CERT could solve the issue");
  11465. return WOLFSSL_FAILURE;
  11466. }
  11467. #ifdef WOLFSSL_SMALL_STACK
  11468. cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL, DYNAMIC_TYPE_DCERT);
  11469. if (cert == NULL)
  11470. return WOLFSSL_FAILURE;
  11471. #endif
  11472. /* Use existing CA retrieval APIs that use DecodedCert. */
  11473. InitDecodedCert(cert, x->derCert->buffer, x->derCert->length, NULL);
  11474. if (ParseCertRelative(cert, CERT_TYPE, 0, NULL) == 0
  11475. && !cert->selfSigned) {
  11476. #ifndef NO_SKID
  11477. if (cert->extAuthKeyIdSet)
  11478. ca = GetCA(cm, cert->extAuthKeyId);
  11479. if (ca == NULL)
  11480. ca = GetCAByName(cm, cert->issuerHash);
  11481. #else /* NO_SKID */
  11482. ca = GetCA(cm, cert->issuerHash);
  11483. #endif /* NO SKID */
  11484. }
  11485. FreeDecodedCert(cert);
  11486. #ifdef WOLFSSL_SMALL_STACK
  11487. XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
  11488. #endif
  11489. if (ca == NULL)
  11490. return WOLFSSL_FAILURE;
  11491. #ifdef WOLFSSL_SIGNER_DER_CERT
  11492. /* populate issuer with Signer DER */
  11493. if (wolfSSL_X509_d2i(issuer, ca->derCert->buffer,
  11494. ca->derCert->length) == NULL)
  11495. return WOLFSSL_FAILURE;
  11496. #else
  11497. /* Create an empty certificate as CA doesn't have a certificate. */
  11498. *issuer = (WOLFSSL_X509 *)XMALLOC(sizeof(WOLFSSL_X509), 0,
  11499. DYNAMIC_TYPE_OPENSSL);
  11500. if (*issuer == NULL)
  11501. return WOLFSSL_FAILURE;
  11502. InitX509((*issuer), 1, NULL);
  11503. #endif
  11504. return WOLFSSL_SUCCESS;
  11505. }
  11506. void wolfSSL_X509_email_free(WOLF_STACK_OF(WOLFSSL_STRING) *sk)
  11507. {
  11508. WOLFSSL_STACK *curr;
  11509. while (sk != NULL) {
  11510. curr = sk;
  11511. sk = sk->next;
  11512. XFREE(curr, NULL, DYNAMIC_TYPE_OPENSSL);
  11513. }
  11514. }
  11515. WOLF_STACK_OF(WOLFSSL_STRING) *wolfSSL_X509_get1_ocsp(WOLFSSL_X509 *x)
  11516. {
  11517. WOLFSSL_STACK* list = NULL;
  11518. char* url;
  11519. if (x == NULL || x->authInfoSz == 0)
  11520. return NULL;
  11521. list = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK) + x->authInfoSz + 1,
  11522. NULL, DYNAMIC_TYPE_OPENSSL);
  11523. if (list == NULL)
  11524. return NULL;
  11525. url = (char*)list;
  11526. url += sizeof(WOLFSSL_STACK);
  11527. XMEMCPY(url, x->authInfo, x->authInfoSz);
  11528. url[x->authInfoSz] = '\0';
  11529. list->data.string = url;
  11530. list->next = NULL;
  11531. list->num = 1;
  11532. return list;
  11533. }
  11534. int wolfSSL_X509_check_issued(WOLFSSL_X509 *issuer, WOLFSSL_X509 *subject)
  11535. {
  11536. WOLFSSL_X509_NAME *issuerName = wolfSSL_X509_get_issuer_name(subject);
  11537. WOLFSSL_X509_NAME *subjectName = wolfSSL_X509_get_subject_name(issuer);
  11538. if (issuerName == NULL || subjectName == NULL)
  11539. return WOLFSSL_X509_V_ERR_SUBJECT_ISSUER_MISMATCH;
  11540. /* Literal matching of encoded names and key ids. */
  11541. if (issuerName->sz != subjectName->sz ||
  11542. XMEMCMP(issuerName->name, subjectName->name, subjectName->sz) != 0) {
  11543. return WOLFSSL_X509_V_ERR_SUBJECT_ISSUER_MISMATCH;
  11544. }
  11545. if (subject->authKeyId != NULL && issuer->subjKeyId != NULL) {
  11546. if (subject->authKeyIdSz != issuer->subjKeyIdSz ||
  11547. XMEMCMP(subject->authKeyId, issuer->subjKeyId,
  11548. issuer->subjKeyIdSz) != 0) {
  11549. return WOLFSSL_X509_V_ERR_SUBJECT_ISSUER_MISMATCH;
  11550. }
  11551. }
  11552. return WOLFSSL_X509_V_OK;
  11553. }
  11554. #endif /* WOLFSSL_NGINX || WOLFSSL_HAPROXY || OPENSSL_EXTRA || OPENSSL_ALL */
  11555. #if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
  11556. defined(KEEP_PEER_CERT)
  11557. WOLFSSL_X509* wolfSSL_X509_dup(WOLFSSL_X509 *x)
  11558. {
  11559. WOLFSSL_ENTER("wolfSSL_X509_dup");
  11560. if (x == NULL) {
  11561. WOLFSSL_MSG("Error: NULL input");
  11562. return NULL;
  11563. }
  11564. if (x->derCert == NULL) {
  11565. WOLFSSL_MSG("Error: NULL derCert parameter");
  11566. return NULL;
  11567. }
  11568. return wolfSSL_X509_d2i(NULL, x->derCert->buffer, x->derCert->length);
  11569. }
  11570. #endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
  11571. #if defined(OPENSSL_EXTRA)
  11572. int wolfSSL_X509_check_ca(WOLFSSL_X509 *x509)
  11573. {
  11574. WOLFSSL_ENTER("wolfSSL_X509_check_ca");
  11575. if (x509 == NULL)
  11576. return WOLFSSL_FAILURE;
  11577. if (x509->isCa)
  11578. return 1;
  11579. if (x509->extKeyUsageCrit)
  11580. return 4;
  11581. return 0;
  11582. }
  11583. #endif /* OPENSSL_EXTRA */
  11584. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  11585. long wolfSSL_X509_get_version(const WOLFSSL_X509 *x509)
  11586. {
  11587. int version = 0;
  11588. WOLFSSL_ENTER("wolfSSL_X509_get_version");
  11589. if (x509 == NULL){
  11590. WOLFSSL_MSG("invalid parameter");
  11591. return 0L;
  11592. }
  11593. version = x509->version;
  11594. if (version != 0)
  11595. return (long)version - 1L;
  11596. return 0L;
  11597. }
  11598. #endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
  11599. #if defined(OPENSSL_EXTRA)
  11600. int wolfSSL_X509_get_signature_nid(const WOLFSSL_X509 *x)
  11601. {
  11602. if (x == NULL)
  11603. return 0;
  11604. return oid2nid(x->sigOID, oidSigType);
  11605. }
  11606. #endif /* OPENSSL_EXTRA */
  11607. #if defined(OPENSSL_EXTRA)
  11608. WOLFSSL_STACK* wolfSSL_sk_X509_new(WOLF_SK_COMPARE_CB(WOLFSSL_X509, cb))
  11609. {
  11610. (void)cb;
  11611. return wolfSSL_sk_X509_new_null();
  11612. }
  11613. WOLFSSL_STACK* wolfSSL_sk_X509_new_null(void)
  11614. {
  11615. WOLFSSL_STACK* s = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK), NULL,
  11616. DYNAMIC_TYPE_OPENSSL);
  11617. if (s != NULL) {
  11618. XMEMSET(s, 0, sizeof(*s));
  11619. s->type = STACK_TYPE_X509;
  11620. }
  11621. return s;
  11622. }
  11623. #endif /* OPENSSL_EXTRA */
  11624. #ifdef OPENSSL_ALL
  11625. WOLFSSL_STACK* wolfSSL_sk_X509_OBJECT_new(void)
  11626. {
  11627. WOLFSSL_STACK* s = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK), NULL,
  11628. DYNAMIC_TYPE_OPENSSL);
  11629. WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_new");
  11630. if (s != NULL) {
  11631. XMEMSET(s, 0, sizeof(*s));
  11632. s->type = STACK_TYPE_X509_OBJ;
  11633. }
  11634. return s;
  11635. }
  11636. void wolfSSL_sk_X509_OBJECT_free(WOLFSSL_STACK* s)
  11637. {
  11638. WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_free");
  11639. wolfSSL_sk_free(s);
  11640. }
  11641. void wolfSSL_sk_X509_OBJECT_pop_free(WOLFSSL_STACK* s,
  11642. void (*f) (WOLFSSL_X509_OBJECT*))
  11643. {
  11644. WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_pop_free");
  11645. wolfSSL_sk_pop_free(s, (wolfSSL_sk_freefunc)f);
  11646. }
  11647. int wolfSSL_sk_X509_OBJECT_push(WOLFSSL_STACK* sk, WOLFSSL_X509_OBJECT* obj)
  11648. {
  11649. WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_push");
  11650. if (sk == NULL || obj == NULL) {
  11651. return WOLFSSL_FAILURE;
  11652. }
  11653. return wolfSSL_sk_push(sk, obj);
  11654. }
  11655. #endif /* OPENSSL_ALL */
  11656. #if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
  11657. /* unlike wolfSSL_X509_NAME_dup this does not malloc a duplicate, only deep
  11658. * copy. "to" is expected to be a fresh blank name, if not pointers could be
  11659. * lost */
  11660. int wolfSSL_X509_NAME_copy(WOLFSSL_X509_NAME* from, WOLFSSL_X509_NAME* to)
  11661. {
  11662. int i;
  11663. WOLFSSL_ENTER("wolfSSL_X509_NAME_copy");
  11664. if (from == NULL || to == NULL) {
  11665. WOLFSSL_MSG("NULL parameter");
  11666. return BAD_FUNC_ARG;
  11667. }
  11668. #if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) || defined(HAVE_LIGHTY)
  11669. if (from->rawLen > 0) {
  11670. if (from->rawLen > ASN_NAME_MAX) {
  11671. WOLFSSL_MSG("Bad raw size");
  11672. return BAD_FUNC_ARG;
  11673. }
  11674. XMEMCPY(to->raw, from->raw, from->rawLen);
  11675. to->rawLen = from->rawLen;
  11676. }
  11677. #endif
  11678. if (from->dynamicName) {
  11679. to->name = (char*)XMALLOC(from->sz, to->heap, DYNAMIC_TYPE_SUBJECT_CN);
  11680. if (to->name == NULL)
  11681. return WOLFSSL_FAILURE;
  11682. to->dynamicName = 1;
  11683. }
  11684. XMEMCPY(to->name, from->name, from->sz);
  11685. to->sz = from->sz;
  11686. for (i = 0; i < MAX_NAME_ENTRIES; i++) {
  11687. WOLFSSL_X509_NAME_ENTRY* ne = wolfSSL_X509_NAME_get_entry(from, i);
  11688. if (ne != NULL) {
  11689. if (wolfSSL_X509_NAME_add_entry(to, ne, i, 1) != WOLFSSL_SUCCESS) {
  11690. return WOLFSSL_FAILURE;
  11691. }
  11692. }
  11693. }
  11694. to->entrySz = from->entrySz;
  11695. return WOLFSSL_SUCCESS;
  11696. }
  11697. /* copies over information from "name" to the "cert" subject name
  11698. * returns WOLFSSL_SUCCESS on success */
  11699. int wolfSSL_X509_set_subject_name(WOLFSSL_X509 *cert, WOLFSSL_X509_NAME *name)
  11700. {
  11701. WOLFSSL_ENTER("wolfSSL_X509_set_subject_name");
  11702. if (cert == NULL || name == NULL)
  11703. return WOLFSSL_FAILURE;
  11704. FreeX509Name(&cert->subject);
  11705. InitX509Name(&cert->subject, 0, cert->heap);
  11706. if (wolfSSL_X509_NAME_copy(name, &cert->subject) != WOLFSSL_SUCCESS) {
  11707. FreeX509Name(&cert->subject);
  11708. return WOLFSSL_FAILURE;
  11709. }
  11710. cert->subject.x509 = cert;
  11711. return WOLFSSL_SUCCESS;
  11712. }
  11713. /* copies over information from "name" to the "cert" issuer name
  11714. * returns WOLFSSL_SUCCESS on success */
  11715. int wolfSSL_X509_set_issuer_name(WOLFSSL_X509 *cert, WOLFSSL_X509_NAME *name)
  11716. {
  11717. WOLFSSL_ENTER("wolfSSL_X509_set_issuer_name");
  11718. if (cert == NULL || name == NULL)
  11719. return WOLFSSL_FAILURE;
  11720. FreeX509Name(&cert->issuer);
  11721. InitX509Name(&cert->issuer, 0, cert->heap);
  11722. if (wolfSSL_X509_NAME_copy(name, &cert->issuer) != WOLFSSL_SUCCESS) {
  11723. FreeX509Name(&cert->issuer);
  11724. return WOLFSSL_FAILURE;
  11725. }
  11726. cert->issuer.x509 = cert;
  11727. cert->issuerSet = 1;
  11728. return WOLFSSL_SUCCESS;
  11729. }
  11730. int wolfSSL_X509_set_notAfter(WOLFSSL_X509* x509, const WOLFSSL_ASN1_TIME* t)
  11731. {
  11732. if (x509 == NULL || t == NULL) {
  11733. return WOLFSSL_FAILURE;
  11734. }
  11735. x509->notAfter.type = t->type;
  11736. x509->notAfter.length = t->length;
  11737. XMEMCPY(x509->notAfter.data, t->data, CTC_DATE_SIZE);
  11738. return WOLFSSL_SUCCESS;
  11739. }
  11740. int wolfSSL_X509_set_notBefore(WOLFSSL_X509* x509, const WOLFSSL_ASN1_TIME* t)
  11741. {
  11742. if (x509 == NULL || t == NULL) {
  11743. return WOLFSSL_FAILURE;
  11744. }
  11745. x509->notBefore.type = t->type;
  11746. x509->notBefore.length = t->length;
  11747. XMEMCPY(x509->notBefore.data, t->data, CTC_DATE_SIZE);
  11748. return WOLFSSL_SUCCESS;
  11749. }
  11750. int wolfSSL_X509_set_serialNumber(WOLFSSL_X509* x509, WOLFSSL_ASN1_INTEGER* s)
  11751. {
  11752. WOLFSSL_ENTER("wolfSSL_X509_set_serialNumber");
  11753. if (x509 == NULL || s == NULL || s->length >= EXTERNAL_SERIAL_SIZE)
  11754. return WOLFSSL_FAILURE;
  11755. /* WOLFSSL_ASN1_INTEGER has type | size | data
  11756. * Sanity check that the data is actually in ASN format */
  11757. if (s->length < 3 && s->data[0] != ASN_INTEGER &&
  11758. s->data[1] != s->length - 2) {
  11759. return WOLFSSL_FAILURE;
  11760. }
  11761. XMEMCPY(x509->serial, s->data + 2, s->length - 2);
  11762. x509->serialSz = s->length - 2;
  11763. x509->serial[s->length] = 0;
  11764. return WOLFSSL_SUCCESS;
  11765. }
  11766. int wolfSSL_X509_set_pubkey(WOLFSSL_X509 *cert, WOLFSSL_EVP_PKEY *pkey)
  11767. {
  11768. byte* p = NULL;
  11769. int derSz = 0;
  11770. WOLFSSL_ENTER("wolfSSL_X509_set_pubkey");
  11771. if (cert == NULL || pkey == NULL)
  11772. return WOLFSSL_FAILURE;
  11773. /* Regenerate since pkey->pkey.ptr may contain private key */
  11774. switch (pkey->type) {
  11775. #if (defined(WOLFSSL_KEY_GEN) || defined(OPENSSL_EXTRA)) && !defined(NO_RSA)
  11776. case EVP_PKEY_RSA:
  11777. {
  11778. RsaKey* rsa;
  11779. if (pkey->rsa == NULL || pkey->rsa->internal == NULL)
  11780. return WOLFSSL_FAILURE;
  11781. rsa = (RsaKey*)pkey->rsa->internal;
  11782. derSz = wc_RsaPublicKeyDerSize(rsa, 1);
  11783. if (derSz <= 0)
  11784. return WOLFSSL_FAILURE;
  11785. p = (byte*)XMALLOC(derSz, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
  11786. if (p == NULL)
  11787. return WOLFSSL_FAILURE;
  11788. if ((derSz = wc_RsaKeyToPublicDer(rsa, p, derSz)) <= 0) {
  11789. XFREE(p, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
  11790. return WOLFSSL_FAILURE;
  11791. }
  11792. cert->pubKeyOID = RSAk;
  11793. }
  11794. break;
  11795. #endif /* (WOLFSSL_KEY_GEN || OPENSSL_EXTRA) && !NO_RSA */
  11796. #if !defined(HAVE_SELFTEST) && (defined(WOLFSSL_KEY_GEN) || \
  11797. defined(WOLFSSL_CERT_GEN)) && !defined(NO_DSA)
  11798. case EVP_PKEY_DSA:
  11799. {
  11800. DsaKey* dsa;
  11801. if (pkey->dsa == NULL || pkey->dsa->internal == NULL)
  11802. return WOLFSSL_FAILURE;
  11803. dsa = (DsaKey*)pkey->dsa->internal;
  11804. /* size of pub, priv, p, q, g + ASN.1 additional information */
  11805. derSz = 5 * mp_unsigned_bin_size(&dsa->g) + MAX_ALGO_SZ;
  11806. p = (byte*)XMALLOC(derSz, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
  11807. if (p == NULL)
  11808. return WOLFSSL_FAILURE;
  11809. if ((derSz = wc_DsaKeyToPublicDer(dsa, p, derSz)) <= 0) {
  11810. XFREE(p, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
  11811. return WOLFSSL_FAILURE;
  11812. }
  11813. cert->pubKeyOID = RSAk;
  11814. }
  11815. break;
  11816. #endif /* !HAVE_SELFTEST && (WOLFSSL_KEY_GEN || WOLFSSL_CERT_GEN) && !NO_DSA */
  11817. #ifdef HAVE_ECC
  11818. case EVP_PKEY_EC:
  11819. {
  11820. ecc_key* ecc;
  11821. if (pkey->ecc == NULL || pkey->ecc->internal == NULL)
  11822. return WOLFSSL_FAILURE;
  11823. ecc = (ecc_key*)pkey->ecc->internal;
  11824. derSz = wc_EccPublicKeyDerSize(ecc, 1);
  11825. if (derSz <= 0)
  11826. return WOLFSSL_FAILURE;
  11827. p = (byte*)XMALLOC(derSz, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
  11828. if (p == NULL)
  11829. return WOLFSSL_FAILURE;
  11830. if ((derSz = wc_EccPublicKeyToDer(ecc, p, derSz, 1)) <= 0) {
  11831. XFREE(p, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
  11832. return WOLFSSL_FAILURE;
  11833. }
  11834. cert->pubKeyOID = ECDSAk;
  11835. }
  11836. break;
  11837. #endif
  11838. default:
  11839. return WOLFSSL_FAILURE;
  11840. }
  11841. cert->pubKey.buffer = p;
  11842. cert->pubKey.length = derSz;
  11843. return WOLFSSL_SUCCESS;
  11844. }
  11845. int wolfSSL_X509_set_version(WOLFSSL_X509* x509, long v)
  11846. {
  11847. WOLFSSL_ENTER("wolfSSL_X509_set_version");
  11848. if ((x509 == NULL) || (v < 0) || (v >= INT_MAX)) {
  11849. return WOLFSSL_FAILURE;
  11850. }
  11851. x509->version = (int) v + 1;
  11852. return WOLFSSL_SUCCESS;
  11853. }
  11854. #endif /* (OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL) && WOLFSSL_CERT_GEN */
  11855. #if defined(OPENSSL_ALL) && \
  11856. defined(WOLFSSL_CERT_GEN) && defined(WOLFSSL_CERT_REQ)
  11857. void wolfSSL_X509V3_set_ctx(WOLFSSL_X509V3_CTX* ctx, WOLFSSL_X509* issuer,
  11858. WOLFSSL_X509* subject, WOLFSSL_X509* req, WOLFSSL_X509_CRL* crl,
  11859. int flag)
  11860. {
  11861. int ret = WOLFSSL_SUCCESS;
  11862. WOLFSSL_ENTER("wolfSSL_X509V3_set_ctx");
  11863. if (!ctx)
  11864. return;
  11865. /* not checking ctx->x509 for null first since app won't have initialized
  11866. * this X509V3_CTX before this function call */
  11867. ctx->x509 = wolfSSL_X509_new();
  11868. if (!ctx->x509)
  11869. return;
  11870. /* Set parameters in ctx as long as ret == WOLFSSL_SUCCESS */
  11871. if (issuer)
  11872. ret = wolfSSL_X509_set_issuer_name(ctx->x509,&issuer->issuer);
  11873. if (subject && ret == WOLFSSL_SUCCESS)
  11874. ret = wolfSSL_X509_set_subject_name(ctx->x509,&subject->subject);
  11875. if (req && ret == WOLFSSL_SUCCESS) {
  11876. WOLFSSL_MSG("req not implemented.");
  11877. }
  11878. if (crl && ret == WOLFSSL_SUCCESS) {
  11879. WOLFSSL_MSG("crl not implemented.");
  11880. }
  11881. if (flag && ret == WOLFSSL_SUCCESS) {
  11882. WOLFSSL_MSG("flag not implemented.");
  11883. }
  11884. if (!ret) {
  11885. WOLFSSL_MSG("Error setting WOLFSSL_X509V3_CTX parameters.");
  11886. }
  11887. }
  11888. #ifndef NO_BIO
  11889. int wolfSSL_i2d_X509_REQ(WOLFSSL_X509* req, unsigned char** out)
  11890. {
  11891. int derSz = 0;
  11892. int ret = WOLFSSL_FAILURE;
  11893. WOLFSSL_BIO* bio = NULL;
  11894. WOLFSSL_ENTER("wolfSSL_i2d_X509_REQ");
  11895. if (req == NULL || out == NULL) {
  11896. return BAD_FUNC_ARG;
  11897. }
  11898. if (!(bio = wolfSSL_BIO_new(wolfSSL_BIO_s_mem()))) {
  11899. return WOLFSSL_FAILURE;
  11900. }
  11901. if (wolfSSL_i2d_X509_REQ_bio(bio, req) != WOLFSSL_SUCCESS) {
  11902. WOLFSSL_MSG("wolfSSL_i2d_X509_REQ_bio error");
  11903. goto cleanup;
  11904. }
  11905. derSz = wolfSSL_BIO_get_len(bio);
  11906. if (*out == NULL) {
  11907. *out = (unsigned char*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_OPENSSL);
  11908. if (!*out) {
  11909. WOLFSSL_MSG("malloc error");
  11910. ret = MEMORY_E;
  11911. goto cleanup;
  11912. }
  11913. }
  11914. if (wolfSSL_BIO_read(bio, *out, derSz) != derSz) {
  11915. WOLFSSL_MSG("wolfSSL_BIO_read error");
  11916. goto cleanup;
  11917. }
  11918. ret = derSz;
  11919. cleanup:
  11920. wolfSSL_BIO_free(bio);
  11921. return ret;
  11922. }
  11923. #endif /* !NO_BIO */
  11924. WOLFSSL_X509* wolfSSL_X509_REQ_new(void)
  11925. {
  11926. return wolfSSL_X509_new();
  11927. }
  11928. void wolfSSL_X509_REQ_free(WOLFSSL_X509* req)
  11929. {
  11930. wolfSSL_X509_free(req);
  11931. }
  11932. int wolfSSL_X509_REQ_sign(WOLFSSL_X509 *req, WOLFSSL_EVP_PKEY *pkey,
  11933. const WOLFSSL_EVP_MD *md)
  11934. {
  11935. int ret;
  11936. #ifdef WOLFSSL_SMALL_STACK
  11937. byte* der = NULL;
  11938. #else
  11939. byte der[2048];
  11940. #endif
  11941. int derSz = 2048;
  11942. if (req == NULL || pkey == NULL || md == NULL) {
  11943. WOLFSSL_LEAVE("wolfSSL_X509_REQ_sign", BAD_FUNC_ARG);
  11944. return WOLFSSL_FAILURE;
  11945. }
  11946. #ifdef WOLFSSL_SMALL_STACK
  11947. der = (byte*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  11948. if (der == NULL) {
  11949. return WOLFSSL_FAILURE;
  11950. }
  11951. #endif
  11952. /* Create a Cert that has the certificate request fields. */
  11953. req->sigOID = wolfSSL_sigTypeFromPKEY((WOLFSSL_EVP_MD*)md, pkey);
  11954. ret = wolfssl_x509_make_der(req, 1, der, &derSz, 0);
  11955. if (ret != WOLFSSL_SUCCESS) {
  11956. #ifdef WOLFSSL_SMALL_STACK
  11957. XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  11958. #endif
  11959. WOLFSSL_MSG("Unable to make DER for X509");
  11960. WOLFSSL_LEAVE("wolfSSL_X509_REQ_sign", ret);
  11961. return WOLFSSL_FAILURE;
  11962. }
  11963. if (wolfSSL_X509_resign_cert(req, 1, der, 2048, derSz,
  11964. (WOLFSSL_EVP_MD*)md, pkey) <= 0) {
  11965. #ifdef WOLFSSL_SMALL_STACK
  11966. XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  11967. #endif
  11968. return WOLFSSL_FAILURE;
  11969. }
  11970. #ifdef WOLFSSL_SMALL_STACK
  11971. XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  11972. #endif
  11973. return WOLFSSL_SUCCESS;
  11974. }
  11975. int wolfSSL_X509_REQ_sign_ctx(WOLFSSL_X509 *req,
  11976. WOLFSSL_EVP_MD_CTX* md_ctx)
  11977. {
  11978. if (md_ctx && md_ctx->pctx)
  11979. return wolfSSL_X509_REQ_sign(req, md_ctx->pctx->pkey,
  11980. wolfSSL_EVP_MD_CTX_md(md_ctx));
  11981. else
  11982. return WOLFSSL_FAILURE;
  11983. }
  11984. static int regenX509REQDerBuffer(WOLFSSL_X509* x509)
  11985. {
  11986. int derSz = X509_BUFFER_SZ;
  11987. int ret = WOLFSSL_FAILURE;
  11988. #ifdef WOLFSSL_SMALL_STACK
  11989. byte* der;
  11990. der = (byte*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  11991. if (!der) {
  11992. WOLFSSL_MSG("malloc failed");
  11993. return WOLFSSL_FAILURE;
  11994. }
  11995. #else
  11996. byte der[X509_BUFFER_SZ];
  11997. #endif
  11998. if (wolfssl_x509_make_der(x509, 1, der, &derSz, 0) == WOLFSSL_SUCCESS) {
  11999. FreeDer(&x509->derCert);
  12000. if (AllocDer(&x509->derCert, derSz, CERT_TYPE, x509->heap) == 0) {
  12001. XMEMCPY(x509->derCert->buffer, der, derSz);
  12002. ret = WOLFSSL_SUCCESS;
  12003. }
  12004. else {
  12005. WOLFSSL_MSG("Failed to allocate DER buffer for X509");
  12006. }
  12007. }
  12008. else {
  12009. WOLFSSL_MSG("Unable to make DER for X509 REQ");
  12010. }
  12011. #ifdef WOLFSSL_SMALL_STACK
  12012. XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
  12013. #endif
  12014. return ret;
  12015. }
  12016. int wolfSSL_X509_REQ_add_extensions(WOLFSSL_X509* req,
  12017. WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* ext_sk)
  12018. {
  12019. WOLFSSL_X509_EXTENSION* ext = NULL;
  12020. if (!req || !ext_sk) {
  12021. WOLFSSL_MSG("Bad parameter");
  12022. return WOLFSSL_FAILURE;
  12023. }
  12024. /* It is not an error if the stack is empty. */
  12025. ext = ext_sk->data.ext;
  12026. if (ext == NULL) {
  12027. return WOLFSSL_SUCCESS;
  12028. }
  12029. while (ext_sk) {
  12030. ext = ext_sk->data.ext;
  12031. if (wolfSSL_X509_add_ext(req, ext, -1) != WOLFSSL_SUCCESS) {
  12032. WOLFSSL_MSG("wolfSSL_X509_add_ext error");
  12033. return WOLFSSL_FAILURE;
  12034. }
  12035. ext_sk = ext_sk->next;
  12036. }
  12037. return regenX509REQDerBuffer(req);
  12038. }
  12039. int wolfSSL_X509_REQ_add1_attr_by_txt(WOLFSSL_X509 *req,
  12040. const char *attrname, int type,
  12041. const unsigned char *bytes, int len)
  12042. {
  12043. WOLFSSL_ENTER("wolfSSL_X509_REQ_add1_attr_by_txt");
  12044. #ifdef HAVE_LIBEST
  12045. if (!req || !attrname || !bytes || type != MBSTRING_ASC) {
  12046. WOLFSSL_MSG("Bad parameter");
  12047. return WOLFSSL_FAILURE;
  12048. }
  12049. if (len < 0) {
  12050. len = (int)XSTRLEN((char*)bytes);
  12051. }
  12052. /* For now just pretend that we support this for libest testing */
  12053. if (len == XSTR_SIZEOF("1.3.6.1.1.1.1.22") &&
  12054. XMEMCMP("1.3.6.1.1.1.1.22", bytes, len) == 0) {
  12055. /* MAC Address */
  12056. }
  12057. else if (len == XSTR_SIZEOF("1.2.840.10045.2.1") &&
  12058. XMEMCMP("1.2.840.10045.2.1", bytes, len) == 0) {
  12059. /* ecPublicKey */
  12060. }
  12061. else if (len == XSTR_SIZEOF("1.2.840.10045.4.3.3") &&
  12062. XMEMCMP("1.2.840.10045.4.3.3", bytes, len) == 0) {
  12063. /* ecdsa-with-SHA384 */
  12064. }
  12065. else {
  12066. return WOLFSSL_FAILURE;
  12067. }
  12068. /* return error if not built for libest */
  12069. return WOLFSSL_SUCCESS;
  12070. #else
  12071. (void)req;
  12072. (void)attrname;
  12073. (void)type;
  12074. (void)bytes;
  12075. (void)len;
  12076. return WOLFSSL_FAILURE;
  12077. #endif
  12078. }
  12079. static int wolfSSL_X509_ATTRIBUTE_set(WOLFSSL_X509_ATTRIBUTE* attr,
  12080. const char* data, int dataSz, int type, int nid)
  12081. {
  12082. if (attr) {
  12083. attr->value->value.asn1_string = wolfSSL_ASN1_STRING_new();
  12084. if (wolfSSL_ASN1_STRING_set(attr->value->value.asn1_string,
  12085. data, dataSz) != WOLFSSL_SUCCESS) {
  12086. wolfSSL_ASN1_STRING_free(attr->value->value.asn1_string);
  12087. WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
  12088. return WOLFSSL_FAILURE;
  12089. }
  12090. attr->value->type = type;
  12091. attr->object->nid = nid;
  12092. }
  12093. else {
  12094. WOLFSSL_MSG("wolfSSL_X509_ATTRIBUTE_new error");
  12095. return WOLFSSL_FAILURE;
  12096. }
  12097. return WOLFSSL_SUCCESS;
  12098. }
  12099. int wolfSSL_X509_REQ_add1_attr_by_NID(WOLFSSL_X509 *req,
  12100. int nid, int type,
  12101. const unsigned char *bytes,
  12102. int len)
  12103. {
  12104. int ret;
  12105. WOLFSSL_X509_ATTRIBUTE* attr;
  12106. WOLFSSL_ENTER("wolfSSL_X509_REQ_add1_attr_by_NID");
  12107. if (!req || !bytes || type != MBSTRING_ASC) {
  12108. WOLFSSL_MSG("Bad parameter");
  12109. return WOLFSSL_FAILURE;
  12110. }
  12111. switch (nid) {
  12112. case NID_pkcs9_challengePassword:
  12113. if (len < 0)
  12114. len = (int)XSTRLEN((char*)bytes);
  12115. if (len < CTC_NAME_SIZE) {
  12116. XMEMCPY(req->challengePw, bytes, len);
  12117. req->challengePw[len] = '\0';
  12118. }
  12119. else {
  12120. WOLFSSL_MSG("Challenge password too long");
  12121. WOLFSSL_ERROR_VERBOSE(BUFFER_E);
  12122. return WOLFSSL_FAILURE;
  12123. }
  12124. break;
  12125. case NID_serialNumber:
  12126. if (len < 0)
  12127. len = (int)XSTRLEN((char*)bytes);
  12128. if (len + 1 > EXTERNAL_SERIAL_SIZE) {
  12129. WOLFSSL_MSG("SerialNumber too long");
  12130. WOLFSSL_ERROR_VERBOSE(BUFFER_E);
  12131. return WOLFSSL_FAILURE;
  12132. }
  12133. XMEMCPY(req->serial, bytes, len);
  12134. req->serialSz = len;
  12135. break;
  12136. case NID_pkcs9_unstructuredName:
  12137. case NID_pkcs9_contentType:
  12138. case NID_surname:
  12139. case NID_initials:
  12140. case NID_givenName:
  12141. case NID_dnQualifier:
  12142. break;
  12143. default:
  12144. WOLFSSL_MSG("Unsupported attribute");
  12145. return WOLFSSL_FAILURE;
  12146. }
  12147. attr = wolfSSL_X509_ATTRIBUTE_new();
  12148. ret = wolfSSL_X509_ATTRIBUTE_set(attr, (const char*)bytes, len,
  12149. V_ASN1_PRINTABLESTRING, nid);
  12150. if (ret != WOLFSSL_SUCCESS) {
  12151. wolfSSL_X509_ATTRIBUTE_free(attr);
  12152. }
  12153. else {
  12154. if (req->reqAttributes == NULL) {
  12155. req->reqAttributes = wolfSSL_sk_new_node(req->heap);
  12156. if (req->reqAttributes != NULL) {
  12157. req->reqAttributes->type = STACK_TYPE_X509_REQ_ATTR;
  12158. }
  12159. }
  12160. ret = wolfSSL_sk_push(req->reqAttributes, attr);
  12161. if ((ret != WOLFSSL_SUCCESS) || (req->reqAttributes->type == STACK_TYPE_CIPHER)) {
  12162. /* CIPHER type makes a copy */
  12163. wolfSSL_X509_ATTRIBUTE_free(attr);
  12164. }
  12165. }
  12166. return ret;
  12167. }
  12168. WOLFSSL_X509 *wolfSSL_X509_to_X509_REQ(WOLFSSL_X509 *x,
  12169. WOLFSSL_EVP_PKEY *pkey, const WOLFSSL_EVP_MD *md)
  12170. {
  12171. WOLFSSL_ENTER("wolfSSL_X509_to_X509_REQ");
  12172. (void)pkey;
  12173. (void)md;
  12174. return wolfSSL_X509_dup(x);
  12175. }
  12176. int wolfSSL_X509_REQ_set_subject_name(WOLFSSL_X509 *req,
  12177. WOLFSSL_X509_NAME *name)
  12178. {
  12179. return wolfSSL_X509_set_subject_name(req, name);
  12180. }
  12181. int wolfSSL_X509_REQ_set_pubkey(WOLFSSL_X509 *req, WOLFSSL_EVP_PKEY *pkey)
  12182. {
  12183. return wolfSSL_X509_set_pubkey(req, pkey);
  12184. }
  12185. #endif /* OPENSSL_ALL && WOLFSSL_CERT_GEN && WOLFSSL_CERT_REQ */
  12186. #if (defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)) && \
  12187. (defined(WOLFSSL_CERT_GEN) || defined(WOLFSSL_CERT_REQ))
  12188. WOLFSSL_ASN1_TYPE *wolfSSL_X509_ATTRIBUTE_get0_type(
  12189. WOLFSSL_X509_ATTRIBUTE *attr, int idx)
  12190. {
  12191. WOLFSSL_ENTER("wolfSSL_X509_ATTRIBUTE_get0_type");
  12192. if (!attr || idx != 0) {
  12193. WOLFSSL_MSG("Bad parameter");
  12194. return NULL;
  12195. }
  12196. return attr->value;
  12197. }
  12198. /**
  12199. * @param req X509_REQ containing attribute
  12200. * @return the number of attributes
  12201. */
  12202. int wolfSSL_X509_REQ_get_attr_count(const WOLFSSL_X509 *req)
  12203. {
  12204. if (req == NULL || req->reqAttributes == NULL)
  12205. return 0;
  12206. return wolfSSL_sk_num(req->reqAttributes);
  12207. }
  12208. /**
  12209. * @param req X509_REQ containing attribute
  12210. * @param loc NID of the attribute to return
  12211. */
  12212. WOLFSSL_X509_ATTRIBUTE *wolfSSL_X509_REQ_get_attr(
  12213. const WOLFSSL_X509 *req, int loc)
  12214. {
  12215. WOLFSSL_ENTER("wolfSSL_X509_REQ_get_attr");
  12216. if (!req || req->reqAttributes == NULL) {
  12217. WOLFSSL_MSG("Bad parameter");
  12218. return NULL;
  12219. }
  12220. return (WOLFSSL_X509_ATTRIBUTE*)wolfSSL_sk_value(req->reqAttributes, loc);
  12221. }
  12222. /* Return NID as the attr index */
  12223. int wolfSSL_X509_REQ_get_attr_by_NID(const WOLFSSL_X509 *req,
  12224. int nid, int lastpos)
  12225. {
  12226. WOLFSSL_STACK* sk;
  12227. int idx;
  12228. WOLFSSL_ENTER("wolfSSL_X509_REQ_get_attr_by_NID");
  12229. if (!req) {
  12230. WOLFSSL_MSG("Bad parameter");
  12231. return WOLFSSL_FATAL_ERROR;
  12232. }
  12233. /* search through stack for first matching nid */
  12234. idx = lastpos + 1;
  12235. do {
  12236. sk = wolfSSL_sk_get_node(req->reqAttributes, idx);
  12237. if (sk != NULL) {
  12238. WOLFSSL_X509_ATTRIBUTE* attr;
  12239. attr = (WOLFSSL_X509_ATTRIBUTE*)sk->data.generic;
  12240. if (nid == attr->object->nid) {
  12241. /* found a match */
  12242. break;
  12243. }
  12244. }
  12245. idx++;
  12246. } while (sk != NULL);
  12247. /* no matches found */
  12248. if (sk == NULL) {
  12249. idx = WOLFSSL_FATAL_ERROR;
  12250. }
  12251. return idx;
  12252. }
  12253. WOLFSSL_X509_ATTRIBUTE* wolfSSL_X509_ATTRIBUTE_new(void)
  12254. {
  12255. WOLFSSL_X509_ATTRIBUTE* ret;
  12256. WOLFSSL_ENTER("wolfSSL_X509_ATTRIBUTE_new");
  12257. ret = (WOLFSSL_X509_ATTRIBUTE*)XMALLOC(sizeof(WOLFSSL_X509_ATTRIBUTE),
  12258. NULL, DYNAMIC_TYPE_OPENSSL);
  12259. if (!ret) {
  12260. WOLFSSL_MSG("malloc error");
  12261. return NULL;
  12262. }
  12263. XMEMSET(ret, 0, sizeof(WOLFSSL_X509_ATTRIBUTE));
  12264. ret->object = wolfSSL_ASN1_OBJECT_new();
  12265. ret->value = wolfSSL_ASN1_TYPE_new();
  12266. /* Don't allocate ret->set since WOLFSSL_ASN1_TYPE
  12267. * is not supported as a stack type */
  12268. if (!ret->object || !ret->value) {
  12269. WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new or wolfSSL_ASN1_TYPE_new error");
  12270. wolfSSL_X509_ATTRIBUTE_free(ret);
  12271. return NULL;
  12272. }
  12273. return ret;
  12274. }
  12275. void wolfSSL_X509_ATTRIBUTE_free(WOLFSSL_X509_ATTRIBUTE* attr)
  12276. {
  12277. WOLFSSL_ENTER("wolfSSL_X509_ATTRIBUTE_free");
  12278. if (attr) {
  12279. if (attr->object) {
  12280. wolfSSL_ASN1_OBJECT_free(attr->object);
  12281. }
  12282. if (attr->value) {
  12283. wolfSSL_ASN1_TYPE_free(attr->value);
  12284. }
  12285. if (attr->set) {
  12286. wolfSSL_sk_pop_free(attr->set, NULL);
  12287. }
  12288. XFREE(attr, NULL, DYNAMIC_TYPE_OPENSSL);
  12289. }
  12290. }
  12291. #endif
  12292. #endif /* !NO_CERT */
  12293. #endif /* !WOLFCRYPT_ONLY */
  12294. #endif /* WOLFSSL_X509_INCLUDED */