Coverage Report

Created: 2022-08-24 06:37

/src/wolfssl-sp-math/src/x509.c
Line
Count
Source (jump to first uncovered line)
1
/* x509.c
2
 *
3
 * Copyright (C) 2006-2022 wolfSSL Inc.
4
 *
5
 * This file is part of wolfSSL.
6
 *
7
 * wolfSSL is free software; you can redistribute it and/or modify
8
 * it under the terms of the GNU General Public License as published by
9
 * the Free Software Foundation; either version 2 of the License, or
10
 * (at your option) any later version.
11
 *
12
 * wolfSSL is distributed in the hope that it will be useful,
13
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15
 * GNU General Public License for more details.
16
 *
17
 * You should have received a copy of the GNU General Public License
18
 * along with this program; if not, write to the Free Software
19
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
20
 */
21
22
23
#ifdef HAVE_CONFIG_H
24
    #include <config.h>
25
#endif
26
27
#include <wolfssl/wolfcrypt/settings.h>
28
29
#if !defined(WOLFSSL_X509_INCLUDED)
30
    #ifndef WOLFSSL_IGNORE_FILE_WARN
31
        #warning x509.c does not need to be compiled separately from ssl.c
32
    #endif
33
#else
34
35
#ifndef WOLFCRYPT_ONLY
36
37
#ifndef NO_CERTS
38
39
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
40
    #include <wolfssl/openssl/x509v3.h>
41
#endif
42
43
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)
44
unsigned int wolfSSL_X509_get_extension_flags(WOLFSSL_X509* x509)
45
{
46
    unsigned int flags = 0;
47
48
    WOLFSSL_ENTER("wolfSSL_X509_get_extension_flags");
49
50
    if (x509 != NULL) {
51
        if (x509->keyUsageSet) {
52
            flags |= EXFLAG_KUSAGE;
53
        }
54
        if (x509->extKeyUsageSrc != NULL) {
55
            flags |= EXFLAG_XKUSAGE;
56
        }
57
    }
58
59
    WOLFSSL_LEAVE("wolfSSL_X509_get_extension_flags", flags);
60
61
    return flags;
62
}
63
64
unsigned int wolfSSL_X509_get_key_usage(WOLFSSL_X509* x509)
65
{
66
    unsigned int ret = 0;
67
68
    WOLFSSL_ENTER("wolfSSL_X509_get_key_usage");
69
70
    if (x509 == NULL) {
71
        WOLFSSL_MSG("x509 is NULL");
72
    }
73
    else {
74
        if (x509->keyUsageSet) {
75
            ret = wolfSSL_X509_get_keyUsage(x509);
76
        }
77
        else {
78
            ret = (unsigned int)-1;
79
        }
80
    }
81
82
    WOLFSSL_LEAVE("wolfSSL_X509_get_key_usage", ret);
83
84
    return ret;
85
}
86
87
unsigned int wolfSSL_X509_get_extended_key_usage(WOLFSSL_X509* x509)
88
{
89
    int ret = 0;
90
91
    WOLFSSL_ENTER("wolfSSL_X509_get_extended_key_usage");
92
93
    if (x509 != NULL) {
94
        if (x509->extKeyUsage & EXTKEYUSE_OCSP_SIGN)
95
            ret |= XKU_OCSP_SIGN;
96
        if (x509->extKeyUsage & EXTKEYUSE_TIMESTAMP)
97
            ret |= XKU_TIMESTAMP;
98
        if (x509->extKeyUsage & EXTKEYUSE_EMAILPROT)
99
            ret |= XKU_SMIME;
100
        if (x509->extKeyUsage & EXTKEYUSE_CODESIGN)
101
            ret |= XKU_CODE_SIGN;
102
        if (x509->extKeyUsage & EXTKEYUSE_CLIENT_AUTH)
103
            ret |= XKU_SSL_CLIENT;
104
        if (x509->extKeyUsage & EXTKEYUSE_SERVER_AUTH)
105
            ret |= XKU_SSL_SERVER;
106
        if (x509->extKeyUsage & EXTKEYUSE_ANY)
107
            ret |= XKU_ANYEKU;
108
    }
109
110
    WOLFSSL_LEAVE("wolfSSL_X509_get_extended_key_usage", ret);
111
112
    return (unsigned int)ret;
113
}
114
115
/* Returns the number of X509V3 extensions in X509 object, or 0 on failure */
116
int wolfSSL_X509_get_ext_count(const WOLFSSL_X509* passedCert)
117
{
118
    int extCount = 0;
119
    int length = 0;
120
    int outSz = 0;
121
    const byte* rawCert;
122
    int sz = 0;
123
    word32 idx = 0;
124
    const byte* input;
125
#ifdef WOLFSSL_SMALL_STACK
126
    DecodedCert *cert;
127
#else
128
    DecodedCert cert[1];
129
#endif
130
131
    WOLFSSL_ENTER("wolfSSL_X509_get_ext_count()");
132
    if (passedCert == NULL) {
133
        WOLFSSL_MSG("\tNot passed a certificate");
134
        return WOLFSSL_FAILURE;
135
    }
136
137
    rawCert = wolfSSL_X509_get_der((WOLFSSL_X509*)passedCert, &outSz);
138
    if (rawCert == NULL) {
139
        WOLFSSL_MSG("\tpassedCert has no internal DerBuffer set.");
140
        return WOLFSSL_FAILURE;
141
    }
142
143
#ifdef WOLFSSL_SMALL_STACK
144
    cert = (DecodedCert *)XMALLOC(sizeof(*cert), NULL, DYNAMIC_TYPE_DCERT);
145
    if (cert == NULL) {
146
        WOLFSSL_MSG("out of memory");
147
        return WOLFSSL_FAILURE;
148
    }
149
#endif
150
151
    InitDecodedCert(cert, rawCert, (word32)outSz, 0);
152
153
    if (ParseCert(cert,
154
#ifdef WOLFSSL_CERT_REQ
155
            passedCert->isCSR ? CERTREQ_TYPE :
156
#endif
157
                    CA_TYPE,
158
            NO_VERIFY, NULL) < 0) {
159
        WOLFSSL_MSG("\tCertificate parsing failed");
160
        goto out;
161
    }
162
163
    input = cert->extensions;
164
    sz = cert->extensionsSz;
165
166
    if (input == NULL || sz == 0) {
167
        WOLFSSL_MSG("\tsz or input NULL error");
168
        goto out;
169
    }
170
171
#ifdef WOLFSSL_CERT_REQ
172
    if (!passedCert->isCSR)
173
#endif
174
    {
175
        if (input[idx++] != ASN_EXTENSIONS) {
176
            WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
177
            goto out;
178
        }
179
180
        if (GetLength(input, &idx, &length, sz) < 0) {
181
            WOLFSSL_MSG("\tfail: invalid length");
182
            goto out;
183
        }
184
    }
185
186
    if (GetSequence(input, &idx, &length, sz) < 0) {
187
        WOLFSSL_MSG("\tfail: should be a SEQUENCE (1)");
188
        goto out;
189
    }
190
191
    while (idx < (word32)sz) {
192
        if (GetSequence(input, &idx, &length, sz) < 0) {
193
            WOLFSSL_MSG("\tfail: should be a SEQUENCE");
194
            FreeDecodedCert(cert);
195
            return WOLFSSL_FAILURE;
196
        }
197
        idx += length;
198
        extCount++;
199
    }
200
201
out:
202
203
    FreeDecodedCert(cert);
204
#ifdef WOLFSSL_SMALL_STACK
205
    XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
206
#endif
207
    return extCount;
208
}
209
210
/* Creates and returns pointer to a new X509_EXTENSION object in memory */
211
WOLFSSL_X509_EXTENSION* wolfSSL_X509_EXTENSION_new(void)
212
{
213
    WOLFSSL_X509_EXTENSION* newExt;
214
215
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_new");
216
217
    newExt = (WOLFSSL_X509_EXTENSION*)XMALLOC(sizeof(WOLFSSL_X509_EXTENSION),
218
              NULL, DYNAMIC_TYPE_X509_EXT);
219
    if (newExt == NULL)
220
        return NULL;
221
    XMEMSET(newExt, 0, sizeof(WOLFSSL_X509_EXTENSION));
222
223
    return newExt;
224
}
225
226
void wolfSSL_X509_EXTENSION_free(WOLFSSL_X509_EXTENSION* x)
227
{
228
    WOLFSSL_ASN1_STRING asn1;
229
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_free");
230
    if (x == NULL)
231
        return;
232
233
    if (x->obj != NULL) {
234
        if (x->obj->pathlen != NULL) {
235
            wolfSSL_ASN1_INTEGER_free(x->obj->pathlen);
236
            x->obj->pathlen = NULL;
237
        }
238
        wolfSSL_ASN1_OBJECT_free(x->obj);
239
    }
240
241
    asn1 = x->value;
242
    if (asn1.length > 0 && asn1.data != NULL && asn1.isDynamic)
243
        XFREE(asn1.data, NULL, DYNAMIC_TYPE_OPENSSL);
244
245
    wolfSSL_sk_pop_free(x->ext_sk, NULL);
246
247
    XFREE(x, NULL, DYNAMIC_TYPE_X509_EXT);
248
}
249
250
WOLFSSL_X509_EXTENSION* wolfSSL_X509_EXTENSION_dup(WOLFSSL_X509_EXTENSION* src)
251
{
252
    WOLFSSL_X509_EXTENSION* ret = NULL;
253
    int err = 0;
254
255
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_dup");
256
257
    if (src == NULL) {
258
        err = 1;
259
    }
260
261
    if (err == 0) {
262
        ret = wolfSSL_X509_EXTENSION_new();
263
        if (ret == NULL) {
264
            err = 1;
265
        }
266
    }
267
    if (err == 0 && src->obj != NULL) {
268
        ret->obj = wolfSSL_ASN1_OBJECT_dup(src->obj);
269
        if (ret->obj == NULL) {
270
            err = 1;
271
        }
272
    }
273
    if (err == 0) {
274
        ret->crit = src->crit;
275
        if (wolfSSL_ASN1_STRING_copy(&ret->value, &src->value) !=
276
                WOLFSSL_SUCCESS) {
277
            err = 1;
278
        }
279
    }
280
281
    if (err == 1 && ret != NULL) {
282
        wolfSSL_X509_EXTENSION_free(ret);
283
        ret = NULL;
284
    }
285
286
    return ret;
287
}
288
289
/* Creates and returns a new WOLFSSL_X509_EXTENSION stack. */
290
WOLFSSL_STACK* wolfSSL_sk_new_x509_ext(void)
291
{
292
    WOLFSSL_STACK* sk;
293
    WOLFSSL_ENTER("wolfSSL_sk_new_x509_ext");
294
295
    sk = wolfSSL_sk_new_null();
296
    if (sk) {
297
        sk->type = STACK_TYPE_X509_EXT;
298
    }
299
    return sk;
300
}
301
302
/* return 1 on success 0 on fail */
303
int wolfSSL_sk_X509_EXTENSION_push(WOLFSSL_STACK* sk,WOLFSSL_X509_EXTENSION* ext)
304
{
305
    WOLFSSL_STACK* node;
306
307
    WOLFSSL_ENTER("wolfSSL_sk_X509_EXTENSION_push");
308
309
    if (sk == NULL || ext == NULL) {
310
        return WOLFSSL_FAILURE;
311
    }
312
313
    /* no previous values in stack */
314
    if (sk->data.ext == NULL) {
315
        sk->data.ext = ext;
316
        sk->num += 1;
317
        return WOLFSSL_SUCCESS;
318
    }
319
320
    /* stack already has value(s) create a new node and add more */
321
    node = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK), NULL,
322
                                                             DYNAMIC_TYPE_X509);
323
    if (node == NULL) {
324
        WOLFSSL_MSG("Memory error");
325
        return WOLFSSL_FAILURE;
326
    }
327
    XMEMSET(node, 0, sizeof(WOLFSSL_STACK));
328
329
    /* push new obj onto head of stack */
330
    node->data.ext  = sk->data.ext;
331
    node->next      = sk->next;
332
    node->type      = sk->type;
333
    sk->next        = node;
334
    sk->data.ext    = ext;
335
    sk->num        += 1;
336
337
    return WOLFSSL_SUCCESS;
338
}
339
340
/* Free the structure for X509_EXTENSION stack
341
 *
342
 * sk  stack to free nodes in
343
 */
344
void wolfSSL_sk_X509_EXTENSION_free(WOLFSSL_STACK* sk)
345
{
346
    WOLFSSL_STACK* node;
347
348
    WOLFSSL_ENTER("wolfSSL_sk_X509_EXTENSION_free");
349
350
    if (sk == NULL) {
351
        return;
352
    }
353
354
    /* parse through stack freeing each node */
355
    node = sk->next;
356
    while ((node != NULL) && (sk->num > 1)) {
357
        WOLFSSL_STACK* tmp = node;
358
        node = node->next;
359
360
        wolfSSL_X509_EXTENSION_free(tmp->data.ext);
361
        XFREE(tmp, NULL, DYNAMIC_TYPE_X509);
362
        sk->num -= 1;
363
    }
364
365
    /* free head of stack */
366
    if (sk->num == 1) {
367
        wolfSSL_X509_EXTENSION_free(sk->data.ext);
368
    }
369
    XFREE(sk, NULL, DYNAMIC_TYPE_X509);
370
}
371
372
static WOLFSSL_STACK* generateExtStack(const WOLFSSL_X509 *x)
373
{
374
    int numOfExt, i;
375
    WOLFSSL_X509 *x509 = (WOLFSSL_X509*)x;
376
    WOLFSSL_STACK* ret;
377
    WOLFSSL_STACK* tmp;
378
379
    if (!x509) {
380
        WOLFSSL_MSG("Bad parameter");
381
        return NULL;
382
    }
383
384
    /* Save x509->ext_sk */
385
    tmp = x509->ext_sk;
386
    x509->ext_sk = NULL;
387
    numOfExt = wolfSSL_X509_get_ext_count(x509);
388
389
    for (i = 0; i < numOfExt; i++) {
390
        /* Build the extension stack */
391
        (void)wolfSSL_X509_set_ext(x509, i);
392
    }
393
394
    /* Restore */
395
    ret = x509->ext_sk;
396
    x509->ext_sk = tmp;
397
    return ret;
398
}
399
400
/**
401
 * @param x Certificate to extract extensions from
402
 * @return STACK_OF(X509_EXTENSION)*
403
 */
404
const WOLFSSL_STACK *wolfSSL_X509_get0_extensions(const WOLFSSL_X509 *x)
405
{
406
    int numOfExt;
407
    WOLFSSL_X509 *x509 = (WOLFSSL_X509*)x;
408
    WOLFSSL_ENTER("wolfSSL_X509_get0_extensions");
409
410
    if (!x509) {
411
        WOLFSSL_MSG("Bad parameter");
412
        return NULL;
413
    }
414
415
    numOfExt = wolfSSL_X509_get_ext_count(x509);
416
417
    if (numOfExt != wolfSSL_sk_num(x509->ext_sk_full)) {
418
        wolfSSL_sk_pop_free(x509->ext_sk_full, NULL);
419
        x509->ext_sk_full = generateExtStack(x);
420
    }
421
422
    return x509->ext_sk_full;
423
}
424
425
/**
426
 * Caller is responsible for freeing the returned stack.
427
 */
428
const WOLFSSL_STACK *wolfSSL_X509_REQ_get_extensions(const WOLFSSL_X509 *x)
429
{
430
    return generateExtStack(x);
431
}
432
433
/* Gets the X509_EXTENSION* ext based on it's location in WOLFSSL_X509* x509.
434
 *
435
 * x509   : The X509 structure to look for the extension.
436
 * loc    : Location of the extension. If the extension is found at the given
437
 * location, a new X509_EXTENSION structure is populated with extension-specific
438
 * data based on the extension type.
439
440
 * Returns NULL on error or pointer to X509_EXTENSION structure containing the
441
 * extension. The returned X509_EXTENSION should not be free'd by caller.
442
 * The returned X509_EXTENSION is pushed onto a stack inside the x509 argument.
443
 * This is later free'd when x509 is free'd.
444
 *
445
 * NOTE: for unknown extension NIDs, a X509_EXTENSION is populated with the
446
 * extension oid as the ASN1_OBJECT (QT compatibility)
447
 */
448
WOLFSSL_X509_EXTENSION* wolfSSL_X509_get_ext(const WOLFSSL_X509* x509, int loc)
449
{
450
    WOLFSSL_X509_EXTENSION* ext = NULL;
451
    WOLFSSL_ENTER("wolfSSL_X509_get_ext");
452
    if (x509 == NULL)
453
        return NULL;
454
455
   ext = wolfSSL_X509_set_ext((WOLFSSL_X509*) x509, loc);
456
   return ext;
457
}
458
459
int wolfSSL_X509_get_ext_by_OBJ(const WOLFSSL_X509 *x,
460
        const WOLFSSL_ASN1_OBJECT *obj, int lastpos)
461
{
462
    const WOLF_STACK_OF(WOLFSSL_X509_EXTENSION) *sk;
463
464
    if (!x || !obj) {
465
        WOLFSSL_MSG("Bad parameter");
466
        return -1;
467
    }
468
469
    sk = wolfSSL_X509_get0_extensions(x);
470
    if (!sk) {
471
        WOLFSSL_MSG("No extensions");
472
        return -1;
473
    }
474
    lastpos++;
475
    if (lastpos < 0)
476
        lastpos = 0;
477
    for (; lastpos < wolfSSL_sk_num(sk); lastpos++)
478
        if (wolfSSL_OBJ_cmp((WOLFSSL_ASN1_OBJECT*)wolfSSL_sk_value(sk,
479
                        lastpos), obj) == 0)
480
            return lastpos;
481
    return -1;
482
}
483
484
/* Pushes a new X509_EXTENSION* ext onto the stack inside WOLFSSL_X509* x509.
485
 * This is currently a helper function for wolfSSL_X509_get_ext
486
 * Caller does not free the returned WOLFSSL_X509_EXTENSION*
487
 */
488
WOLFSSL_X509_EXTENSION* wolfSSL_X509_set_ext(WOLFSSL_X509* x509, int loc)
489
{
490
    int extCount = 0, length = 0, outSz = 0, sz = 0, ret = 0;
491
    int objSz = 0, isSet = 0;
492
    const byte* rawCert;
493
    const byte* input;
494
    byte* oidBuf;
495
    word32 oid, idx = 0, tmpIdx = 0, nid;
496
    WOLFSSL_X509_EXTENSION* ext = NULL;
497
    WOLFSSL_ASN1_INTEGER* a;
498
    WOLFSSL_STACK* sk;
499
#ifdef WOLFSSL_SMALL_STACK
500
    DecodedCert* cert = NULL;
501
#else
502
    DecodedCert cert[1];
503
#endif
504
505
    WOLFSSL_ENTER("wolfSSL_X509_set_ext");
506
507
    if(x509 == NULL){
508
        WOLFSSL_MSG("\tNot passed a certificate");
509
        return NULL;
510
    }
511
512
    if(loc <0 || (loc > wolfSSL_X509_get_ext_count(x509))){
513
        WOLFSSL_MSG("\tBad location argument");
514
        return NULL;
515
    }
516
517
    ext = wolfSSL_X509_EXTENSION_new();
518
    if (ext == NULL) {
519
        WOLFSSL_MSG("\tX509_EXTENSION_new() failed");
520
        return NULL;
521
    }
522
523
    rawCert = wolfSSL_X509_get_der((WOLFSSL_X509*)x509, &outSz);
524
    if (rawCert == NULL) {
525
        WOLFSSL_MSG("\tX509_get_der() failed");
526
        wolfSSL_X509_EXTENSION_free(ext);
527
        return NULL;
528
    }
529
530
#ifdef WOLFSSL_SMALL_STACK
531
    cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL, DYNAMIC_TYPE_DCERT);
532
    if (cert == NULL) {
533
        WOLFSSL_MSG("Failed to allocate memory for DecodedCert");
534
        wolfSSL_X509_EXTENSION_free(ext);
535
        return NULL;
536
    }
537
#endif
538
539
    InitDecodedCert(cert, rawCert, (word32)outSz, 0);
540
541
    if (ParseCert(cert,
542
#ifdef WOLFSSL_CERT_REQ
543
            x509->isCSR ? CERTREQ_TYPE :
544
#endif
545
                    CA_TYPE,
546
            NO_VERIFY, NULL) < 0) {
547
        WOLFSSL_MSG("\tCertificate parsing failed");
548
        wolfSSL_X509_EXTENSION_free(ext);
549
        FreeDecodedCert(cert);
550
    #ifdef WOLFSSL_SMALL_STACK
551
        XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
552
    #endif
553
        return NULL;
554
    }
555
556
    input = cert->extensions;
557
    sz = cert->extensionsSz;
558
559
    if (input == NULL || sz == 0) {
560
        WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
561
        wolfSSL_X509_EXTENSION_free(ext);
562
        FreeDecodedCert(cert);
563
#ifdef WOLFSSL_SMALL_STACK
564
        XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
565
#endif
566
        return NULL;
567
    }
568
569
#ifdef WOLFSSL_CERT_REQ
570
    if (!x509->isCSR)
571
#endif
572
    {
573
        if (input[idx++] != ASN_EXTENSIONS) {
574
            WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
575
            wolfSSL_X509_EXTENSION_free(ext);
576
            FreeDecodedCert(cert);
577
    #ifdef WOLFSSL_SMALL_STACK
578
            XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
579
    #endif
580
            return NULL;
581
        }
582
583
        if (GetLength(input, &idx, &length, sz) < 0) {
584
            WOLFSSL_MSG("\tfail: invalid length");
585
            wolfSSL_X509_EXTENSION_free(ext);
586
            FreeDecodedCert(cert);
587
    #ifdef WOLFSSL_SMALL_STACK
588
            XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
589
    #endif
590
            return NULL;
591
        }
592
    }
593
594
    if (GetSequence(input, &idx, &length, sz) < 0) {
595
        WOLFSSL_MSG("\tfail: should be a SEQUENCE (1)");
596
        wolfSSL_X509_EXTENSION_free(ext);
597
        FreeDecodedCert(cert);
598
#ifdef WOLFSSL_SMALL_STACK
599
        XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
600
#endif
601
        return NULL;
602
    }
603
604
    while (idx < (word32)sz) {
605
        oid = 0;
606
607
        if (GetSequence(input, &idx, &length, sz) < 0) {
608
            WOLFSSL_MSG("\tfail: should be a SEQUENCE");
609
            wolfSSL_X509_EXTENSION_free(ext);
610
            FreeDecodedCert(cert);
611
    #ifdef WOLFSSL_SMALL_STACK
612
            XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
613
    #endif
614
            return NULL;
615
        }
616
617
        tmpIdx = idx;
618
        ret = GetObjectId(input, &idx, &oid, oidCertExtType, sz);
619
        if (ret < 0) {
620
            WOLFSSL_MSG("\tfail: OBJECT ID");
621
            wolfSSL_X509_EXTENSION_free(ext);
622
            FreeDecodedCert(cert);
623
        #ifdef WOLFSSL_SMALL_STACK
624
            XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
625
        #endif
626
            return NULL;
627
        }
628
        idx = tmpIdx;
629
        nid = (word32)oid2nid(oid, oidCertExtType);
630
631
        /* Continue while loop until extCount == loc or idx > sz */
632
        if (extCount != loc) {
633
            idx += length;
634
            extCount++;
635
            continue;
636
        }
637
        /* extCount == loc. Now get the extension. */
638
        /* Check if extension has been set */
639
        isSet = wolfSSL_X509_ext_isSet_by_NID((WOLFSSL_X509*)x509, nid);
640
        ext->obj = wolfSSL_OBJ_nid2obj(nid);
641
        if (ext->obj == NULL) {
642
            WOLFSSL_MSG("\tfail: Invalid OBJECT");
643
            wolfSSL_X509_EXTENSION_free(ext);
644
            FreeDecodedCert(cert);
645
        #ifdef WOLFSSL_SMALL_STACK
646
            XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
647
        #endif
648
            return NULL;
649
        }
650
        ext->obj->nid = nid;
651
652
        switch (oid) {
653
            case BASIC_CA_OID:
654
                if (!isSet)
655
                    break;
656
                /* Set pathlength */
657
                a = wolfSSL_ASN1_INTEGER_new();
658
                if (a == NULL) {
659
                    wolfSSL_X509_EXTENSION_free(ext);
660
                    FreeDecodedCert(cert);
661
                #ifdef WOLFSSL_SMALL_STACK
662
                    XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
663
                #endif
664
                    return NULL;
665
                }
666
                a->length = x509->pathLength;
667
668
                /* Save ASN1_INTEGER in x509 extension */
669
                ext->obj->pathlen = a;
670
671
                ext->obj->ca = x509->isCa;
672
                ext->crit = x509->basicConstCrit;
673
                break;
674
675
            case AUTH_INFO_OID:
676
                if (!isSet)
677
                    break;
678
679
                /* Create a stack to hold both the caIssuer and ocsp objects
680
                    in X509_EXTENSION structure */
681
                sk = wolfSSL_sk_new_asn1_obj();
682
                if (sk == NULL) {
683
                    WOLFSSL_MSG("Failed to malloc stack");
684
                    wolfSSL_X509_EXTENSION_free(ext);
685
                    FreeDecodedCert(cert);
686
                #ifdef WOLFSSL_SMALL_STACK
687
                    XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
688
                #endif
689
                    return NULL;
690
                }
691
692
                /* Add CaIssuers object to stack */
693
                if (x509->authInfoCaIssuer != NULL &&
694
                    x509->authInfoCaIssuerSz > 0)
695
                {
696
                    WOLFSSL_ASN1_OBJECT* obj;
697
                    obj = wolfSSL_ASN1_OBJECT_new();
698
                    if (obj == NULL) {
699
                        WOLFSSL_MSG("Error creating ASN1 object");
700
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
701
                        wolfSSL_X509_EXTENSION_free(ext);
702
                        FreeDecodedCert(cert);
703
                    #ifdef WOLFSSL_SMALL_STACK
704
                        XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
705
                    #endif
706
                        return NULL;
707
                    }
708
                    obj->obj = (byte*)x509->authInfoCaIssuer;
709
                    obj->objSz = x509->authInfoCaIssuerSz;
710
                    obj->grp = oidCertAuthInfoType;
711
                    obj->nid = NID_ad_ca_issuers;
712
713
                    ret = wolfSSL_sk_ASN1_OBJECT_push(sk, obj);
714
                    if (ret != WOLFSSL_SUCCESS) {
715
                        WOLFSSL_MSG("Error pushing ASN1 object onto stack");
716
                        wolfSSL_ASN1_OBJECT_free(obj);
717
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
718
                        wolfSSL_X509_EXTENSION_free(ext);
719
                        FreeDecodedCert(cert);
720
                    #ifdef WOLFSSL_SMALL_STACK
721
                        XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
722
                    #endif
723
                        return NULL;
724
                    }
725
                }
726
727
                /* Add OCSP object to stack */
728
                if (x509->authInfo != NULL &&
729
                    x509->authInfoSz > 0)
730
                {
731
                    WOLFSSL_ASN1_OBJECT* obj;
732
                    obj = wolfSSL_ASN1_OBJECT_new();
733
                    if (obj == NULL) {
734
                        WOLFSSL_MSG("Error creating ASN1 object");
735
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
736
                        wolfSSL_X509_EXTENSION_free(ext);
737
                        FreeDecodedCert(cert);
738
                    #ifdef WOLFSSL_SMALL_STACK
739
                        XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
740
                    #endif
741
                        return NULL;
742
                    }
743
                    obj->obj = x509->authInfo;
744
                    obj->objSz = x509->authInfoSz;
745
                    obj->grp = oidCertAuthInfoType;
746
                    obj->nid = NID_ad_OCSP;
747
748
                    ret = wolfSSL_sk_ASN1_OBJECT_push(sk, obj);
749
                    if (ret != WOLFSSL_SUCCESS) {
750
                        WOLFSSL_MSG("Error pushing ASN1 object onto stack");
751
                        wolfSSL_ASN1_OBJECT_free(obj);
752
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
753
                        wolfSSL_X509_EXTENSION_free(ext);
754
                        FreeDecodedCert(cert);
755
                    #ifdef WOLFSSL_SMALL_STACK
756
                        XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
757
                    #endif
758
                        return NULL;
759
                    }
760
                }
761
                ext->ext_sk = sk;
762
                ext->crit = x509->authInfoCrit;
763
                break;
764
765
            case AUTH_KEY_OID:
766
                if (!isSet)
767
                    break;
768
769
                ret = wolfSSL_ASN1_STRING_set(&ext->value, x509->authKeyId,
770
                                        x509->authKeyIdSz);
771
                if (ret != WOLFSSL_SUCCESS) {
772
                    WOLFSSL_MSG("ASN1_STRING_set() failed");
773
                    wolfSSL_X509_EXTENSION_free(ext);
774
                    FreeDecodedCert(cert);
775
                #ifdef WOLFSSL_SMALL_STACK
776
                    XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
777
                #endif
778
                    return NULL;
779
                }
780
                ext->crit = x509->authKeyIdCrit;
781
                break;
782
783
            case SUBJ_KEY_OID:
784
                if (!isSet)
785
                    break;
786
787
                ret = wolfSSL_ASN1_STRING_set(&ext->value, x509->subjKeyId,
788
                                        x509->subjKeyIdSz);
789
                if (ret != WOLFSSL_SUCCESS) {
790
                    WOLFSSL_MSG("ASN1_STRING_set() failed");
791
                    wolfSSL_X509_EXTENSION_free(ext);
792
                    FreeDecodedCert(cert);
793
                #ifdef WOLFSSL_SMALL_STACK
794
                    XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
795
                #endif
796
                    return NULL;
797
                }
798
                ext->crit = x509->subjKeyIdCrit;
799
                break;
800
801
            case CERT_POLICY_OID:
802
                if (!isSet)
803
                    break;
804
                ext->crit = x509->certPolicyCrit;
805
                break;
806
807
            case KEY_USAGE_OID:
808
                if (!isSet)
809
                    break;
810
811
                ret = wolfSSL_ASN1_STRING_set(&ext->value,
812
                                  (byte*)&(x509->keyUsage), sizeof(word16));
813
                if (ret != WOLFSSL_SUCCESS) {
814
                    WOLFSSL_MSG("ASN1_STRING_set() failed");
815
                    wolfSSL_X509_EXTENSION_free(ext);
816
                    FreeDecodedCert(cert);
817
                #ifdef WOLFSSL_SMALL_STACK
818
                    XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
819
                #endif
820
                    return NULL;
821
                }
822
                ext->crit = x509->keyUsageCrit;
823
                break;
824
825
            case EXT_KEY_USAGE_OID:
826
                if (!isSet)
827
                    break;
828
829
                ret = wolfSSL_ASN1_STRING_set(&ext->value, x509->extKeyUsageSrc,
830
                                              x509->extKeyUsageSz);
831
                if (ret != WOLFSSL_SUCCESS) {
832
                    WOLFSSL_MSG("ASN1_STRING_set() failed");
833
                    wolfSSL_X509_EXTENSION_free(ext);
834
                    FreeDecodedCert(cert);
835
                #ifdef WOLFSSL_SMALL_STACK
836
                    XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
837
                #endif
838
                    return NULL;
839
                }
840
                ext->crit = x509->keyUsageCrit;
841
                break;
842
843
            case CRL_DIST_OID:
844
                if (!isSet)
845
                    break;
846
                ext->crit = x509->CRLdistCrit;
847
                break;
848
849
            case ALT_NAMES_OID:
850
            {
851
                WOLFSSL_GENERAL_NAME* gn = NULL;
852
                DNS_entry* dns = NULL;
853
                if (!isSet)
854
                    break;
855
856
            #ifdef OPENSSL_ALL
857
                ret = wolfSSL_ASN1_STRING_set(&ext->value, x509->subjAltNameSrc,
858
                          x509->subjAltNameSz);
859
                if (ret != WOLFSSL_SUCCESS) {
860
                    WOLFSSL_MSG("ASN1_STRING_set() failed");
861
                    wolfSSL_X509_EXTENSION_free(ext);
862
                    FreeDecodedCert(cert);
863
                #ifdef WOLFSSL_SMALL_STACK
864
                    XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
865
                #endif
866
                    return NULL;
867
                }
868
            #endif
869
870
                sk = (WOLFSSL_GENERAL_NAMES*)XMALLOC(
871
                          sizeof(WOLFSSL_GENERAL_NAMES), NULL,
872
                          DYNAMIC_TYPE_ASN1);
873
                if (sk == NULL) {
874
                    wolfSSL_X509_EXTENSION_free(ext);
875
                    FreeDecodedCert(cert);
876
                #ifdef WOLFSSL_SMALL_STACK
877
                    XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
878
                #endif
879
                    return NULL;
880
                }
881
                XMEMSET(sk, 0, sizeof(WOLFSSL_GENERAL_NAMES));
882
                sk->type = STACK_TYPE_GEN_NAME;
883
884
                if (x509->subjAltNameSet && x509->altNames != NULL) {
885
                    /* alt names are DNS_entry structs */
886
                    dns = x509->altNames;
887
                    /* Currently only support GEN_DNS type */
888
                    while (dns != NULL) {
889
                        gn = wolfSSL_GENERAL_NAME_new();
890
                        if (gn == NULL) {
891
                            WOLFSSL_MSG("Error creating GENERAL_NAME");
892
                            wolfSSL_X509_EXTENSION_free(ext);
893
                            FreeDecodedCert(cert);
894
                            wolfSSL_sk_pop_free(sk, NULL);
895
                        #ifdef WOLFSSL_SMALL_STACK
896
                            XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
897
                        #endif
898
                            return NULL;
899
                        }
900
901
                        gn->type = dns->type;
902
                        gn->d.ia5->length = dns->len;
903
                        if (wolfSSL_ASN1_STRING_set(gn->d.ia5, dns->name,
904
                                    gn->d.ia5->length) != WOLFSSL_SUCCESS) {
905
                            WOLFSSL_MSG("ASN1_STRING_set failed");
906
                            wolfSSL_X509_EXTENSION_free(ext);
907
                            FreeDecodedCert(cert);
908
                            wolfSSL_GENERAL_NAME_free(gn);
909
                            wolfSSL_sk_pop_free(sk, NULL);
910
                        #ifdef WOLFSSL_SMALL_STACK
911
                            XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
912
                        #endif
913
                            return NULL;
914
                        }
915
916
                        dns = dns->next;
917
                        /* last dns in list add at end of function */
918
                        if (dns != NULL) {
919
                            if (wolfSSL_sk_GENERAL_NAME_push(sk, gn) !=
920
                                                          WOLFSSL_SUCCESS) {
921
                                WOLFSSL_MSG("Error pushing onto stack");
922
                                wolfSSL_X509_EXTENSION_free(ext);
923
                                FreeDecodedCert(cert);
924
                                wolfSSL_GENERAL_NAME_free(gn);
925
                                wolfSSL_sk_pop_free(sk, NULL);
926
                            #ifdef WOLFSSL_SMALL_STACK
927
                                XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
928
                            #endif
929
                                return NULL;
930
                            }
931
                        }
932
                    }
933
                    if (wolfSSL_sk_GENERAL_NAME_push(sk,gn) !=
934
                                                          WOLFSSL_SUCCESS) {
935
                        WOLFSSL_MSG("Error pushing onto stack");
936
                        wolfSSL_X509_EXTENSION_free(ext);
937
                        FreeDecodedCert(cert);
938
                        wolfSSL_GENERAL_NAME_free(gn);
939
                        wolfSSL_sk_pop_free(sk, NULL);
940
                    #ifdef WOLFSSL_SMALL_STACK
941
                        XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
942
                    #endif
943
                        return NULL;
944
                    }
945
                }
946
                ext->ext_sk = sk;
947
                ext->crit = x509->subjAltNameCrit;
948
                break;
949
            }
950
951
            default:
952
                WOLFSSL_MSG("Unknown extension type found, parsing OID");
953
                /* If the extension type is not recognized/supported,
954
                    set the ASN1_OBJECT in the extension with the
955
                    parsed oid for access in later function calls */
956
957
                /* Get OID from input */
958
                if (GetASNObjectId(input, &idx, &length, sz) != 0) {
959
                    WOLFSSL_MSG("Failed to Get ASN Object Id");
960
                    wolfSSL_X509_EXTENSION_free(ext);
961
                    FreeDecodedCert(cert);
962
                #ifdef WOLFSSL_SMALL_STACK
963
                    XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
964
                #endif
965
                    return NULL;
966
                }
967
                oidBuf = (byte*)XMALLOC(length+1+MAX_LENGTH_SZ, NULL,
968
                                    DYNAMIC_TYPE_TMP_BUFFER);
969
                if (oidBuf == NULL) {
970
                    WOLFSSL_MSG("Failed to malloc tmp buffer");
971
                    wolfSSL_X509_EXTENSION_free(ext);
972
                    FreeDecodedCert(cert);
973
                #ifdef WOLFSSL_SMALL_STACK
974
                    XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
975
                #endif
976
                    return NULL;
977
                }
978
                oidBuf[0] = ASN_OBJECT_ID;
979
                objSz++;
980
                objSz += SetLength(length, oidBuf + 1);
981
                objSz += length;
982
983
                /* Set object size and reallocate space in object buffer */
984
                ext->obj->objSz = objSz;
985
                if(((ext->obj->dynamic & WOLFSSL_ASN1_DYNAMIC_DATA) != 0) ||
986
                   (ext->obj->obj == NULL)) {
987
                        ext->obj->obj =(byte*)XREALLOC((byte*)ext->obj->obj,
988
                                             ext->obj->objSz,
989
                                             NULL,DYNAMIC_TYPE_ASN1);
990
                    if (ext->obj->obj == NULL) {
991
                        wolfSSL_ASN1_OBJECT_free(ext->obj);
992
                        wolfSSL_X509_EXTENSION_free(ext);
993
                        FreeDecodedCert(cert);
994
                        XFREE(oidBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
995
                    #ifdef WOLFSSL_SMALL_STACK
996
                        XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
997
                    #endif
998
                        return NULL;
999
                    }
1000
                    ext->obj->dynamic |= WOLFSSL_ASN1_DYNAMIC_DATA;
1001
                } else {
1002
                    ext->obj->dynamic &= ~WOLFSSL_ASN1_DYNAMIC_DATA;
1003
                }
1004
                /* Get OID from input and copy to ASN1_OBJECT buffer */
1005
                XMEMCPY(oidBuf+2, input+idx, length);
1006
                XMEMCPY((byte*)ext->obj->obj, oidBuf, ext->obj->objSz);
1007
                XFREE(oidBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1008
                oidBuf = NULL;
1009
                ext->obj->grp = oidCertExtType;
1010
                ext->crit = 0;
1011
1012
                /* Get extension data and copy as ASN1_STRING */
1013
                tmpIdx = idx + length;
1014
                if ((tmpIdx >= (word32)sz) || (input[tmpIdx++] != ASN_OCTET_STRING)) {
1015
                    WOLFSSL_MSG("Error decoding unknown extension data");
1016
                    wolfSSL_ASN1_OBJECT_free(ext->obj);
1017
                    wolfSSL_X509_EXTENSION_free(ext);
1018
                    FreeDecodedCert(cert);
1019
                #ifdef WOLFSSL_SMALL_STACK
1020
                    XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
1021
                #endif
1022
                    return NULL;
1023
                }
1024
1025
                if (GetLength(input, &tmpIdx, &length, sz) <= 0) {
1026
                    WOLFSSL_MSG("Error: Invalid Input Length.");
1027
                    wolfSSL_ASN1_OBJECT_free(ext->obj);
1028
                    wolfSSL_X509_EXTENSION_free(ext);
1029
                    FreeDecodedCert(cert);
1030
                #ifdef WOLFSSL_SMALL_STACK
1031
                    XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
1032
                #endif
1033
                    return NULL;
1034
                }
1035
                ext->value.data = (char*)XMALLOC(length, NULL, DYNAMIC_TYPE_ASN1);
1036
                ext->value.isDynamic = 1;
1037
                if (ext->value.data == NULL) {
1038
                    WOLFSSL_MSG("Failed to malloc ASN1_STRING data");
1039
                    wolfSSL_X509_EXTENSION_free(ext);
1040
                    FreeDecodedCert(cert);
1041
                #ifdef WOLFSSL_SMALL_STACK
1042
                    XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
1043
                #endif
1044
                    return NULL;
1045
                }
1046
                XMEMCPY(ext->value.data,input+tmpIdx,length);
1047
                ext->value.length = length;
1048
        } /* switch(oid) */
1049
1050
        break; /* Got the Extension. Now exit while loop. */
1051
1052
    } /* while(idx < sz) */
1053
1054
    /* Store the new extension in a stack inside x509
1055
     * The extensions on the stack are free'd internally when FreeX509 is called
1056
     */
1057
    if (x509->ext_sk == NULL)
1058
        x509->ext_sk = wolfSSL_sk_new_x509_ext();
1059
    if (x509->ext_sk != NULL)
1060
        wolfSSL_sk_X509_EXTENSION_push(x509->ext_sk, ext);
1061
1062
    FreeDecodedCert(cert);
1063
#ifdef WOLFSSL_SMALL_STACK
1064
    XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
1065
#endif
1066
    return ext;
1067
}
1068
1069
/**
1070
 * @param str String to copy
1071
 * @param buf Output buffer. If this contains a pointer then it is free'd
1072
 *            with the DYNAMIC_TYPE_X509_EXT hint.
1073
 * @param len Output length
1074
 * @return WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on error
1075
 */
1076
static int asn1_string_copy_to_buffer(WOLFSSL_ASN1_STRING* str, byte** buf,
1077
        word32* len, void* heap) {
1078
    if (!str || !buf || !len) {
1079
        return WOLFSSL_FAILURE;
1080
    }
1081
    if (str->data && str->length > 0) {
1082
        if (*buf)
1083
            XFREE(*buf, heap, DYNAMIC_TYPE_X509_EXT);
1084
        *len = 0;
1085
        *buf = (byte*)XMALLOC(str->length, heap,
1086
                DYNAMIC_TYPE_X509_EXT);
1087
        if (!*buf) {
1088
            WOLFSSL_MSG("malloc error");
1089
            return WOLFSSL_FAILURE;
1090
        }
1091
        *len = str->length;
1092
        XMEMCPY(*buf, str->data, str->length);
1093
    }
1094
1095
    (void)heap;
1096
    return WOLFSSL_SUCCESS;
1097
}
1098
1099
int wolfSSL_X509_add_ext(WOLFSSL_X509 *x509, WOLFSSL_X509_EXTENSION *ext, int loc)
1100
{
1101
    int nid;
1102
1103
    WOLFSSL_ENTER("wolfSSL_X509_add_ext");
1104
1105
    if (!x509 || !ext || loc >= 0) {
1106
        WOLFSSL_MSG("Bad parameter");
1107
        return WOLFSSL_FAILURE;
1108
    }
1109
    nid = (ext->obj != NULL) ? ext->obj->type : ext->value.nid;
1110
1111
    switch (nid) {
1112
    case NID_authority_key_identifier:
1113
        if (x509->authKeyIdSrc != NULL) {
1114
            /* If authKeyId points into authKeyIdSrc then free it and
1115
             * revert to old functionality */
1116
            XFREE(x509->authKeyIdSrc, x509->heap, DYNAMIC_TYPE_X509_EXT);
1117
            x509->authKeyIdSrc = NULL;
1118
            x509->authKeyId = NULL;
1119
        }
1120
        if (asn1_string_copy_to_buffer(&ext->value, &x509->authKeyId,
1121
                &x509->authKeyIdSz, x509->heap) != WOLFSSL_SUCCESS) {
1122
            WOLFSSL_MSG("asn1_string_copy_to_buffer error");
1123
            return WOLFSSL_FAILURE;
1124
        }
1125
        x509->authKeyIdCrit = (byte)ext->crit;
1126
        break;
1127
    case NID_subject_key_identifier:
1128
        if (asn1_string_copy_to_buffer(&ext->value, &x509->subjKeyId,
1129
                &x509->subjKeyIdSz, x509->heap) != WOLFSSL_SUCCESS) {
1130
            WOLFSSL_MSG("asn1_string_copy_to_buffer error");
1131
            return WOLFSSL_FAILURE;
1132
        }
1133
        x509->subjKeyIdCrit = (byte)ext->crit;
1134
        break;
1135
    case NID_subject_alt_name:
1136
    {
1137
        WOLFSSL_GENERAL_NAMES* gns = ext->ext_sk;
1138
        while (gns) {
1139
            WOLFSSL_GENERAL_NAME* gn = gns->data.gn;
1140
            if (!gn || !gn->d.ia5 ||
1141
                wolfSSL_X509_add_altname_ex(x509, gn->d.ia5->data,
1142
                    gn->d.ia5->length, gn->type) != WOLFSSL_SUCCESS) {
1143
                WOLFSSL_MSG("Subject alternative name missing extension");
1144
                return WOLFSSL_FAILURE;
1145
            }
1146
            gns = gns->next;
1147
        }
1148
        x509->subjAltNameSet = 1;
1149
        x509->subjAltNameCrit = (byte)ext->crit;
1150
        break;
1151
    }
1152
    case NID_key_usage:
1153
        if (ext && ext->value.data &&
1154
                ext->value.length == sizeof(word16)) {
1155
            x509->keyUsage = *(word16*)ext->value.data;
1156
            x509->keyUsageCrit = (byte)ext->crit;
1157
            x509->keyUsageSet = 1;
1158
        }
1159
        break;
1160
    case NID_basic_constraints:
1161
        if (ext->obj) {
1162
            x509->isCa = (byte)ext->obj->ca;
1163
            x509->basicConstCrit = (byte)ext->crit;
1164
            if (ext->obj->pathlen)
1165
                x509->pathLength = ext->obj->pathlen->length;
1166
            x509->basicConstSet = 1;
1167
        }
1168
        break;
1169
    default:
1170
        WOLFSSL_MSG("Unsupported extension to add");
1171
        return WOLFSSL_FAILURE;
1172
    }
1173
1174
    return WOLFSSL_SUCCESS;
1175
}
1176
1177
#ifndef NO_BIO
1178
/* Return 0 on success and 1 on failure. Copies ext data to bio, using indent
1179
 *  to pad the output. flag is ignored. */
1180
int wolfSSL_X509V3_EXT_print(WOLFSSL_BIO *out, WOLFSSL_X509_EXTENSION *ext,
1181
        unsigned long flag, int indent)
1182
{
1183
    ASN1_OBJECT* obj;
1184
    ASN1_STRING* str;
1185
    int nid;
1186
    int rc = WOLFSSL_FAILURE;
1187
    char tmp[CTC_NAME_SIZE*2 + 1];
1188
    const int tmpSz = sizeof(tmp);
1189
    int tmpLen = 0;
1190
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_print");
1191
1192
    if ((out == NULL) || (ext == NULL)) {
1193
        WOLFSSL_MSG("NULL parameter error");
1194
        return rc;
1195
    }
1196
1197
    obj = wolfSSL_X509_EXTENSION_get_object(ext);
1198
    if (obj == NULL) {
1199
        WOLFSSL_MSG("Error getting ASN1_OBJECT from X509_EXTENSION");
1200
        return rc;
1201
    }
1202
1203
    str = wolfSSL_X509_EXTENSION_get_data(ext);
1204
    if (str == NULL) {
1205
        WOLFSSL_MSG("Error getting ASN1_STRING from X509_EXTENSION");
1206
        return rc;
1207
    }
1208
1209
    /* Print extension based on the type */
1210
    nid = wolfSSL_OBJ_obj2nid(obj);
1211
    switch (nid) {
1212
        case BASIC_CA_OID:
1213
        {
1214
            char isCa[] = "TRUE";
1215
            char notCa[] = "FALSE";
1216
            if ((tmpLen = XSNPRINTF(tmp, tmpSz, "%*sCA:%s", indent, "",
1217
                                     obj->ca ? isCa : notCa))
1218
                >= tmpSz)
1219
                return rc;
1220
            break;
1221
        }
1222
        case ALT_NAMES_OID:
1223
        {
1224
            WOLFSSL_STACK* sk;
1225
            char* val;
1226
            int valLen;
1227
            int len;
1228
1229
            sk = ext->ext_sk;
1230
            while (sk != NULL) {
1231
                if (sk->type == STACK_TYPE_GEN_NAME && sk->data.gn) {
1232
                    /* str is GENERAL_NAME for subject alternative name ext */
1233
                    str = sk->data.gn->d.ia5;
1234
                    len = str->length + 2; /* + 2 for NULL char and "," */
1235
                    if (len > tmpSz) {
1236
                        WOLFSSL_MSG("len greater than buffer size");
1237
                        return rc;
1238
                    }
1239
1240
                    val = (char*)XMALLOC(len + indent, NULL,
1241
                                                       DYNAMIC_TYPE_TMP_BUFFER);
1242
                    if (val == NULL) {
1243
                        WOLFSSL_MSG("Memory error");
1244
                        return rc;
1245
                    }
1246
                    if (sk->next) {
1247
                        if ((valLen = XSNPRINTF(val, len, "%*s%s,",
1248
                                      indent, "", str->strData))
1249
                            >= len)
1250
                            return rc;
1251
                    } else {
1252
                        if ((valLen = XSNPRINTF(val, len, "%*s%s",
1253
                                      indent, "", str->strData))
1254
                            >= len)
1255
                            return rc;
1256
                    }
1257
                    if (tmpLen + valLen > tmpSz) {
1258
                        XFREE(val, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1259
                        return rc;
1260
                    }
1261
                    XMEMCPY(tmp + tmpLen, val, valLen);
1262
                    tmpLen += valLen;
1263
                    XFREE(val, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1264
                }
1265
                sk = sk->next;
1266
            }
1267
            break;
1268
        }
1269
        case AUTH_KEY_OID:
1270
        case SUBJ_KEY_OID:
1271
        {
1272
            char* asn1str;
1273
            asn1str = wolfSSL_i2s_ASN1_STRING(NULL, str);
1274
            if ((tmpLen = XSNPRINTF(
1275
                     tmp, tmpSz, "%*s%s", indent, "", asn1str))
1276
                >= tmpSz)
1277
                return rc;
1278
            XFREE(asn1str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1279
            break;
1280
        }
1281
        case AUTH_INFO_OID:
1282
        case CERT_POLICY_OID:
1283
        case CRL_DIST_OID:
1284
        case KEY_USAGE_OID:
1285
            WOLFSSL_MSG("X509V3_EXT_print not yet implemented for ext type");
1286
            break;
1287
1288
        default:
1289
            if ((tmpLen = XSNPRINTF(
1290
                     tmp, tmpSz, "%*s%s", indent, "", str->strData))
1291
                >= tmpSz)
1292
                return rc;
1293
    }
1294
1295
    if (wolfSSL_BIO_write(out, tmp, tmpLen) == tmpLen) {
1296
        rc = WOLFSSL_SUCCESS;
1297
    }
1298
    (void) flag;
1299
1300
    return rc;
1301
}
1302
#endif /* !NO_BIO */
1303
1304
#ifndef NO_WOLFSSL_STUB
1305
int wolfSSL_X509V3_EXT_add_nconf(WOLFSSL_CONF *conf, WOLFSSL_X509V3_CTX *ctx,
1306
        const char *section, WOLFSSL_X509 *cert)
1307
{
1308
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_add_nconf");
1309
    WOLFSSL_STUB("wolfSSL_X509V3_EXT_add_nconf");
1310
    (void)conf;
1311
    (void)ctx;
1312
    (void)section;
1313
    (void)cert;
1314
    return WOLFSSL_SUCCESS;
1315
}
1316
#endif
1317
1318
/* Returns crit flag in X509_EXTENSION object */
1319
int wolfSSL_X509_EXTENSION_get_critical(const WOLFSSL_X509_EXTENSION* ex)
1320
{
1321
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_get_critical");
1322
    if (ex == NULL)
1323
        return BAD_FUNC_ARG;
1324
    return ex->crit;
1325
}
1326
1327
/* Sets if the extension is critical
1328
 * returns WOLFSSL_SUCCESS on success
1329
 */
1330
int wolfSSL_X509_EXTENSION_set_critical(WOLFSSL_X509_EXTENSION* ex, int crit)
1331
{
1332
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_set_critical");
1333
    if (ex == NULL)
1334
        return WOLFSSL_FAILURE;
1335
    ex->crit = crit;
1336
    return WOLFSSL_SUCCESS;
1337
}
1338
1339
/* Creates v3_ext_method for a given X509v3 extension
1340
 *
1341
 * ex   : The X509_EXTENSION used to create v3_ext_method. If the extension is
1342
 * not NULL, get the NID of the extension object and populate the
1343
 * extension type-specific X509V3_EXT_* function(s) in v3_ext_method.
1344
 *
1345
 * Returns NULL on error or pointer to the v3_ext_method populated with extension
1346
 * type-specific X509V3_EXT_* function(s).
1347
 *
1348
 * NOTE: NID_subject_key_identifier is currently the only extension implementing
1349
 * the X509V3_EXT_* functions, as it is the only type called directly by QT. The
1350
 * other extension types return a pointer to a v3_ext_method struct that contains
1351
 * only the NID.
1352
 */
1353
#if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L
1354
const WOLFSSL_v3_ext_method* wolfSSL_X509V3_EXT_get(WOLFSSL_X509_EXTENSION* ex)
1355
#else
1356
WOLFSSL_v3_ext_method* wolfSSL_X509V3_EXT_get(WOLFSSL_X509_EXTENSION* ex)
1357
#endif
1358
{
1359
    int nid;
1360
    WOLFSSL_v3_ext_method method;
1361
1362
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_get");
1363
    if ((ex == NULL) || (ex->obj == NULL)) {
1364
        WOLFSSL_MSG("Passed an invalid X509_EXTENSION*");
1365
        return NULL;
1366
    }
1367
    /* Initialize method to 0 */
1368
    XMEMSET(&method, 0, sizeof(struct WOLFSSL_v3_ext_method));
1369
1370
    nid = ex->obj->nid;
1371
    if (nid <= 0) {
1372
        WOLFSSL_MSG("Failed to get nid from passed extension object");
1373
        return NULL;
1374
    }
1375
    XMEMSET(&method, 0, sizeof(WOLFSSL_v3_ext_method));
1376
    switch (nid) {
1377
        case NID_basic_constraints:
1378
            break;
1379
        case NID_subject_key_identifier:
1380
            method.i2s = (X509V3_EXT_I2S)wolfSSL_i2s_ASN1_STRING;
1381
            break;
1382
        case NID_subject_alt_name:
1383
            WOLFSSL_MSG("i2v function not yet implemented for Subject Alternative Name");
1384
            break;
1385
        case NID_key_usage:
1386
            WOLFSSL_MSG("i2v function not yet implemented for Key Usage");
1387
            break;
1388
        case NID_authority_key_identifier:
1389
            WOLFSSL_MSG("i2v function not yet implemented for Auth Key Id");
1390
            break;
1391
        case NID_info_access:
1392
            WOLFSSL_MSG("i2v function not yet implemented for Info Access");
1393
            break;
1394
        case NID_ext_key_usage:
1395
            WOLFSSL_MSG("i2v function not yet implemented for Ext Key Usage");
1396
            break;
1397
        case NID_certificate_policies:
1398
            WOLFSSL_MSG("r2i function not yet implemented for Cert Policies");
1399
            break;
1400
        case NID_crl_distribution_points:
1401
            WOLFSSL_MSG("r2i function not yet implemented for CRL Dist Points");
1402
            break;
1403
        default:
1404
            /* If extension type is unknown, return NULL -- QT makes call to
1405
                X509_EXTENSION_get_data() if there is no v3_ext_method */
1406
            WOLFSSL_MSG("X509V3_EXT_get(): Unknown extension type found");
1407
            return NULL;
1408
    }
1409
1410
    method.ext_nid = nid;
1411
    ex->ext_method = method;
1412
1413
#if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L
1414
    return (const WOLFSSL_v3_ext_method*)&ex->ext_method;
1415
#else
1416
    return (WOLFSSL_v3_ext_method*)&ex->ext_method;
1417
#endif
1418
}
1419
1420
/* Parses and returns an x509v3 extension internal structure.
1421
 *
1422
 * ext   : The X509_EXTENSION for parsing internal structure. If extension is
1423
 * not NULL, get the NID of the extension object and create a new
1424
 * extension-specific internal structure based on the extension type.
1425
 *
1426
 * Returns NULL on error or if NID is not found, otherwise returns a pointer to
1427
 * the extension type-specific X509_EXTENSION internal structure.
1428
 * Return is expected to be free'd by caller.
1429
 */
1430
void* wolfSSL_X509V3_EXT_d2i(WOLFSSL_X509_EXTENSION* ext)
1431
{
1432
    const WOLFSSL_v3_ext_method* method;
1433
    int ret;
1434
    WOLFSSL_ASN1_OBJECT* object;
1435
    WOLFSSL_BASIC_CONSTRAINTS* bc;
1436
    WOLFSSL_AUTHORITY_KEYID* akey;
1437
    WOLFSSL_ASN1_STRING* asn1String, *newString;
1438
    WOLFSSL_AUTHORITY_INFO_ACCESS* aia;
1439
    WOLFSSL_STACK* sk;
1440
1441
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_d2i");
1442
1443
    if(ext == NULL) {
1444
        WOLFSSL_MSG("Bad function Argument");
1445
        return NULL;
1446
    }
1447
1448
    /* extract extension info */
1449
    method = wolfSSL_X509V3_EXT_get(ext);
1450
    if (method == NULL) {
1451
        WOLFSSL_MSG("wolfSSL_X509V3_EXT_get error");
1452
        return NULL;
1453
    }
1454
    object = wolfSSL_X509_EXTENSION_get_object(ext);
1455
    if (object == NULL) {
1456
        WOLFSSL_MSG("X509_EXTENSION_get_object failed");
1457
        return NULL;
1458
    }
1459
1460
    /* Return pointer to proper internal structure based on NID */
1461
    switch (object->type) {
1462
        /* basicConstraints */
1463
        case (NID_basic_constraints):
1464
            WOLFSSL_MSG("basicConstraints");
1465
            /* Allocate new BASIC_CONSTRAINTS structure */
1466
            bc = wolfSSL_BASIC_CONSTRAINTS_new();
1467
            if (bc == NULL) {
1468
                WOLFSSL_MSG("Failed to malloc basic constraints");
1469
                return NULL;
1470
            }
1471
            /* Copy pathlen and CA into BASIC_CONSTRAINTS from object */
1472
            bc->ca = object->ca;
1473
            if (object->pathlen->length > 0) {
1474
                bc->pathlen = wolfSSL_ASN1_INTEGER_dup(object->pathlen);
1475
                if (bc->pathlen == NULL) {
1476
                    WOLFSSL_MSG("Failed to duplicate ASN1_INTEGER");
1477
                    wolfSSL_BASIC_CONSTRAINTS_free(bc);
1478
                    return NULL;
1479
                }
1480
            }
1481
            else
1482
                bc->pathlen = NULL;
1483
            return bc;
1484
1485
        /* subjectKeyIdentifier */
1486
        case (NID_subject_key_identifier):
1487
            WOLFSSL_MSG("subjectKeyIdentifier");
1488
            asn1String = wolfSSL_X509_EXTENSION_get_data(ext);
1489
            if (asn1String == NULL) {
1490
                WOLFSSL_MSG("X509_EXTENSION_get_data() failed");
1491
                return NULL;
1492
            }
1493
            newString = wolfSSL_ASN1_STRING_new();
1494
            if (newString == NULL) {
1495
                WOLFSSL_MSG("Failed to malloc ASN1_STRING");
1496
                return NULL;
1497
            }
1498
            ret = wolfSSL_ASN1_STRING_set(newString, asn1String->data,
1499
                                                            asn1String->length);
1500
            if (ret != WOLFSSL_SUCCESS) {
1501
                WOLFSSL_MSG("ASN1_STRING_set() failed");
1502
                wolfSSL_ASN1_STRING_free(newString);
1503
                return NULL;
1504
            };
1505
            newString->type = asn1String->type;
1506
            return newString;
1507
1508
        /* authorityKeyIdentifier */
1509
        case (NID_authority_key_identifier):
1510
            WOLFSSL_MSG("AuthorityKeyIdentifier");
1511
1512
            akey = (WOLFSSL_AUTHORITY_KEYID*)
1513
                    XMALLOC(sizeof(WOLFSSL_AUTHORITY_KEYID), NULL,
1514
                    DYNAMIC_TYPE_X509_EXT);
1515
            if (akey == NULL) {
1516
                WOLFSSL_MSG("Failed to malloc authority key id");
1517
                return NULL;
1518
            }
1519
1520
            XMEMSET(akey, 0, sizeof(WOLFSSL_AUTHORITY_KEYID));
1521
1522
            akey->keyid = wolfSSL_ASN1_STRING_new();
1523
            if (akey->keyid == NULL) {
1524
                WOLFSSL_MSG("ASN1_STRING_new() failed");
1525
                wolfSSL_AUTHORITY_KEYID_free(akey);
1526
                return NULL;
1527
            }
1528
1529
            asn1String = wolfSSL_X509_EXTENSION_get_data(ext);
1530
            if (asn1String == NULL) {
1531
                WOLFSSL_MSG("X509_EXTENSION_get_data() failed");
1532
                wolfSSL_AUTHORITY_KEYID_free(akey);
1533
                return NULL;
1534
            }
1535
1536
            ret = wolfSSL_ASN1_STRING_set(akey->keyid, asn1String->data,
1537
                                                            asn1String->length);
1538
            if (ret != WOLFSSL_SUCCESS) {
1539
                WOLFSSL_MSG("ASN1_STRING_set() failed");
1540
                wolfSSL_AUTHORITY_KEYID_free(akey);
1541
                return NULL;
1542
            };
1543
            akey->keyid->type   = asn1String->type;
1544
1545
            /* For now, set issuer and serial to NULL. This may need to be
1546
                updated for future use */
1547
            akey->issuer = NULL;
1548
            akey->serial = NULL;
1549
            return akey;
1550
1551
        /* keyUsage */
1552
        case (NID_key_usage):
1553
            WOLFSSL_MSG("keyUsage");
1554
            /* This may need to be updated for future use. The i2v method for
1555
                keyUsage is not currently set. For now, return the ASN1_STRING
1556
                representation of KeyUsage bit string */
1557
            asn1String = wolfSSL_X509_EXTENSION_get_data(ext);
1558
            if (asn1String == NULL) {
1559
                WOLFSSL_MSG("X509_EXTENSION_get_data() failed");
1560
                return NULL;
1561
            }
1562
            newString = wolfSSL_ASN1_STRING_new();
1563
            if (newString == NULL) {
1564
                WOLFSSL_MSG("Failed to malloc ASN1_STRING");
1565
                return NULL;
1566
            }
1567
            ret = wolfSSL_ASN1_STRING_set(newString, asn1String->data,
1568
                                                            asn1String->length);
1569
            if (ret != WOLFSSL_SUCCESS) {
1570
                WOLFSSL_MSG("ASN1_STRING_set() failed");
1571
                wolfSSL_ASN1_STRING_free(newString);
1572
                return NULL;
1573
            };
1574
            newString->type = asn1String->type;
1575
            return newString;
1576
1577
        /* extKeyUsage */
1578
        case (NID_ext_key_usage):
1579
            WOLFSSL_MSG("extKeyUsage not supported yet");
1580
            return NULL;
1581
1582
        /* certificatePolicies */
1583
        case (NID_certificate_policies):
1584
            WOLFSSL_MSG("certificatePolicies not supported yet");
1585
            return NULL;
1586
1587
        /* cRLDistributionPoints */
1588
        case (NID_crl_distribution_points):
1589
            WOLFSSL_MSG("cRLDistributionPoints not supported yet");
1590
            return NULL;
1591
1592
        case NID_subject_alt_name:
1593
            if (ext->ext_sk == NULL) {
1594
                WOLFSSL_MSG("Subject alt name stack NULL");
1595
                return NULL;
1596
            }
1597
            sk = wolfSSL_sk_dup(ext->ext_sk);
1598
            if (sk == NULL) {
1599
                WOLFSSL_MSG("Failed to duplicate subject alt names stack.");
1600
                return NULL;
1601
            }
1602
            return sk;
1603
1604
        /* authorityInfoAccess */
1605
        case (NID_info_access):
1606
            WOLFSSL_MSG("AuthorityInfoAccess");
1607
1608
            sk = ext->ext_sk;
1609
            if (sk == NULL) {
1610
                WOLFSSL_MSG("ACCESS_DESCRIPTION stack NULL");
1611
                return NULL;
1612
            }
1613
1614
            /* AUTHORITY_INFO_ACCESS is a stack of ACCESS_DESCRIPTION entries */
1615
            aia = wolfSSL_sk_new_null();
1616
            if (aia == NULL) {
1617
                WOLFSSL_MSG("Failed to malloc AUTHORITY_INFO_ACCESS");
1618
                return NULL;
1619
            }
1620
            aia->type = STACK_TYPE_ACCESS_DESCRIPTION;
1621
1622
            while (sk) {
1623
                WOLFSSL_ACCESS_DESCRIPTION* ad;
1624
                WOLFSSL_ASN1_OBJECT* aiaEntry;
1625
1626
                if (sk->type != STACK_TYPE_OBJ) {
1627
                    sk = sk->next;
1628
                    continue;
1629
                }
1630
1631
                aiaEntry = sk->data.obj;
1632
1633
                /* ACCESS_DESCRIPTION has two members, method and location.
1634
                Method: ASN1_OBJECT as either AIA_OCSP_OID or AIA_CA_ISSUER_OID
1635
                Location: GENERAL_NAME structure containing the URI. */
1636
1637
                ad = (WOLFSSL_ACCESS_DESCRIPTION*)
1638
                        XMALLOC(sizeof(WOLFSSL_ACCESS_DESCRIPTION), NULL,
1639
                        DYNAMIC_TYPE_X509_EXT);
1640
                if (ad == NULL) {
1641
                    WOLFSSL_MSG("Failed to malloc ACCESS_DESCRIPTION");
1642
                    XFREE(aia, NULL, DYNAMIC_TYPE_X509_EXT);
1643
                    return NULL;
1644
                }
1645
                XMEMSET(ad, 0, sizeof(WOLFSSL_ACCESS_DESCRIPTION));
1646
1647
                /* Create new ASN1_OBJECT from oid */
1648
                ad->method = wolfSSL_OBJ_nid2obj(aiaEntry->nid);
1649
                if (ad->method == NULL) {
1650
                    WOLFSSL_MSG("OBJ_nid2obj() failed");
1651
                    XFREE(aia, NULL, DYNAMIC_TYPE_X509_EXT);
1652
                    XFREE(ad, NULL, DYNAMIC_TYPE_X509_EXT);
1653
                    return NULL;
1654
                }
1655
1656
                /* Allocate memory for GENERAL NAME */
1657
                ad->location = wolfSSL_GENERAL_NAME_new();
1658
                if (ad->location == NULL) {
1659
                    WOLFSSL_MSG("Failed to malloc GENERAL_NAME");
1660
                    wolfSSL_ASN1_OBJECT_free(ad->method);
1661
                    XFREE(aia, NULL, DYNAMIC_TYPE_X509_EXT);
1662
                    XFREE(ad, NULL, DYNAMIC_TYPE_X509_EXT);
1663
                    return NULL;
1664
                }
1665
1666
                ret = wolfSSL_GENERAL_NAME_set_type(ad->location, GEN_URI);
1667
                if (ret != WOLFSSL_SUCCESS) {
1668
                    wolfSSL_ASN1_OBJECT_free(ad->method);
1669
                    XFREE(aia, NULL, DYNAMIC_TYPE_X509_EXT);
1670
                    wolfSSL_GENERAL_NAME_free(ad->location);
1671
                    XFREE(ad, NULL, DYNAMIC_TYPE_X509_EXT);
1672
                    return NULL;
1673
                }
1674
1675
                /* Set the URI in GENERAL_NAME */
1676
                ret = wolfSSL_ASN1_STRING_set(
1677
                                    ad->location->d.uniformResourceIdentifier,
1678
                                    aiaEntry->obj, aiaEntry->objSz);
1679
                if (ret != WOLFSSL_SUCCESS) {
1680
                    WOLFSSL_MSG("ASN1_STRING_set() failed");
1681
                    wolfSSL_ASN1_OBJECT_free(ad->method);
1682
                    XFREE(aia, NULL, DYNAMIC_TYPE_X509_EXT);
1683
                    wolfSSL_GENERAL_NAME_free(ad->location);
1684
                    XFREE(ad, NULL, DYNAMIC_TYPE_X509_EXT);
1685
                    return NULL;
1686
                }
1687
                /* Push to AUTHORITY_INFO_ACCESS stack */
1688
                ret = wolfSSL_sk_ACCESS_DESCRIPTION_push(aia, ad);
1689
                if (ret != WOLFSSL_SUCCESS) {
1690
                    WOLFSSL_MSG("Error pushing ASN1 AD onto stack");
1691
                    wolfSSL_sk_ACCESS_DESCRIPTION_pop_free(aia, NULL);
1692
                    wolfSSL_ASN1_OBJECT_free(ad->method);
1693
                    wolfSSL_GENERAL_NAME_free(ad->location);
1694
                    XFREE(aia, NULL, DYNAMIC_TYPE_X509_EXT);
1695
                    XFREE(ad, NULL, DYNAMIC_TYPE_X509_EXT);
1696
                    return NULL;
1697
                }
1698
1699
                sk = sk->next;
1700
            }
1701
            return aia;
1702
1703
        default:
1704
            WOLFSSL_MSG("Extension NID not in table, returning NULL");
1705
            break;
1706
    }
1707
    return NULL;
1708
}
1709
1710
/* Looks for the extension matching the passed in nid
1711
 *
1712
 * x509 : certificate to get parse through for extension.
1713
 * nid : Extension OID to be found.
1714
 * lastPos : Start search from extension after lastPos.
1715
 *           Set to -1 to search from index 0.
1716
 * return >= 0 If successful the extension index is returned.
1717
 * return -1 If extension is not found or error is encountered.
1718
 */
1719
int wolfSSL_X509_get_ext_by_NID(const WOLFSSL_X509* x509, int nid, int lastPos)
1720
{
1721
    int extCount = 0, length = 0, outSz = 0, sz = 0, ret = 0;
1722
    int isSet = 0, found = 0, loc;
1723
    const byte* rawCert;
1724
    const byte* input;
1725
    word32 oid, idx = 0, tmpIdx = 0, foundNID;
1726
#ifdef WOLFSSL_SMALL_STACK
1727
    DecodedCert *cert;
1728
#else
1729
    DecodedCert cert[1];
1730
#endif
1731
1732
    WOLFSSL_ENTER("wolfSSL_X509_get_ext_by_NID");
1733
1734
    if(x509 == NULL){
1735
        WOLFSSL_MSG("\tNot passed a certificate");
1736
        return WOLFSSL_FATAL_ERROR;
1737
    }
1738
1739
    if(lastPos < -1 || (lastPos > (wolfSSL_X509_get_ext_count(x509) - 1))){
1740
        WOLFSSL_MSG("\tBad location argument");
1741
        return WOLFSSL_FATAL_ERROR;
1742
    }
1743
1744
    loc = lastPos + 1;
1745
1746
    rawCert = wolfSSL_X509_get_der((WOLFSSL_X509*)x509, &outSz);
1747
    if (rawCert == NULL) {
1748
        WOLFSSL_MSG("\tX509_get_der() failed");
1749
        return WOLFSSL_FATAL_ERROR;
1750
    }
1751
1752
#ifdef WOLFSSL_SMALL_STACK
1753
    cert = (DecodedCert *)XMALLOC(sizeof(*cert), x509->heap,
1754
                                  DYNAMIC_TYPE_DCERT);
1755
    if (cert == NULL) {
1756
        WOLFSSL_MSG("\tout of memory");
1757
        return WOLFSSL_FATAL_ERROR;
1758
    }
1759
#endif
1760
1761
    InitDecodedCert( cert, rawCert, (word32)outSz, 0);
1762
1763
    if (ParseCert(cert,
1764
#ifdef WOLFSSL_CERT_REQ
1765
            x509->isCSR ? CERTREQ_TYPE :
1766
#endif
1767
            CA_TYPE,
1768
            NO_VERIFY, NULL) < 0) {
1769
        WOLFSSL_MSG("\tCertificate parsing failed");
1770
        goto out;
1771
    }
1772
1773
    input = cert->extensions;
1774
    sz = cert->extensionsSz;
1775
1776
    if (input == NULL || sz == 0) {
1777
        WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
1778
        goto out;
1779
    }
1780
1781
#ifdef WOLFSSL_CERT_REQ
1782
    if (!x509->isCSR)
1783
#endif
1784
    {
1785
        if (input[idx++] != ASN_EXTENSIONS) {
1786
            WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
1787
            goto out;
1788
        }
1789
1790
        if (GetLength(input, &idx, &length, sz) < 0) {
1791
            WOLFSSL_MSG("\tfail: invalid length");
1792
            goto out;
1793
        }
1794
    }
1795
1796
    if (GetSequence(input, &idx, &length, sz) < 0) {
1797
        WOLFSSL_MSG("\tfail: should be a SEQUENCE (1)");
1798
        goto out;
1799
    }
1800
1801
    while (idx < (word32)sz) {
1802
        oid = 0;
1803
1804
        if (GetSequence(input, &idx, &length, sz) < 0) {
1805
            WOLFSSL_MSG("\tfail: should be a SEQUENCE");
1806
            goto out;
1807
        }
1808
1809
        tmpIdx = idx;
1810
        ret = GetObjectId(input, &idx, &oid, oidCertExtType, sz);
1811
        if (ret < 0) {
1812
            WOLFSSL_MSG("\tfail: OBJECT ID");
1813
            goto out;
1814
        }
1815
        idx = tmpIdx;
1816
        foundNID = (word32)oid2nid(oid, oidCertExtType);
1817
1818
        if (extCount >= loc) {
1819
            /* extCount >= loc. Now check if extension has been set */
1820
            isSet = wolfSSL_X509_ext_isSet_by_NID((WOLFSSL_X509*)x509, foundNID);
1821
1822
            if (isSet && ((word32)nid == foundNID)) {
1823
                found = 1;
1824
                break;
1825
            }
1826
        }
1827
1828
        idx += length;
1829
        extCount++;
1830
    } /* while(idx < sz) */
1831
1832
out:
1833
1834
    FreeDecodedCert(cert);
1835
#ifdef WOLFSSL_SMALL_STACK
1836
    XFREE(cert, x509->heap, DYNAMIC_TYPE_DCERT);
1837
#endif
1838
1839
    return found ? extCount : WOLFSSL_FATAL_ERROR;
1840
}
1841
1842
#endif /* OPENSSL_ALL */
1843
1844
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
1845
/* Looks for the extension matching the passed in nid
1846
 *
1847
 * c   : if not null then is set to status value -2 if multiple occurrences
1848
 *       of the extension are found, -1 if not found, 0 if found and not
1849
 *       critical, and 1 if found and critical.
1850
 * nid : Extension OID to be found.
1851
 * idx : if NULL return first extension found match, otherwise start search at
1852
 *       idx location and set idx to the location of extension returned.
1853
 * returns NULL or a pointer to an WOLFSSL_ASN1_BIT_STRING (for KEY_USAGE_OID)
1854
 * or WOLFSSL_STACK (for other)
1855
 * holding extension structure
1856
 *
1857
 * NOTE code for decoding extensions is in asn.c DecodeCertExtensions --
1858
 * use already decoded extension in this function to avoid decoding twice.
1859
 * Currently we do not make use of idx since getting pre decoded extensions.
1860
 */
1861
void* wolfSSL_X509_get_ext_d2i(const WOLFSSL_X509* x509, int nid, int* c,
1862
    int* idx)
1863
{
1864
    void* ret = NULL;
1865
    WOLFSSL_STACK* sk = NULL;
1866
    WOLFSSL_ASN1_OBJECT* obj = NULL;
1867
    WOLFSSL_GENERAL_NAME* gn = NULL;
1868
#ifdef OPENSSL_EXTRA
1869
    WOLFSSL_DIST_POINT* dp = NULL;
1870
#endif
1871
    WOLFSSL_BASIC_CONSTRAINTS* bc = NULL;
1872
1873
    WOLFSSL_ENTER("wolfSSL_X509_get_ext_d2i");
1874
1875
    if (x509 == NULL) {
1876
        return NULL;
1877
    }
1878
1879
    if (c != NULL) {
1880
        *c = -1; /* default to not found */
1881
    }
1882
1883
    switch (nid) {
1884
        case BASIC_CA_OID:
1885
            if (x509->basicConstSet) {
1886
                WOLFSSL_ASN1_INTEGER* a;
1887
1888
                bc = wolfSSL_BASIC_CONSTRAINTS_new();
1889
                if (!bc) {
1890
                    WOLFSSL_MSG("wolfSSL_BASIC_CONSTRAINTS_new error");
1891
                    return NULL;
1892
                }
1893
1894
                a = wolfSSL_ASN1_INTEGER_new();
1895
                if (!a) {
1896
                    WOLFSSL_MSG("wolfSSL_ASN1_INTEGER_new error");
1897
                    wolfSSL_BASIC_CONSTRAINTS_free(bc);
1898
                    return NULL;
1899
                }
1900
                a->length = x509->pathLength;
1901
1902
#if defined(OPENSSL_ALL) || defined(WOLFSSL_QT) || \
1903
        defined(WOLFSSL_APACHE_HTTPD)
1904
                bc->ca = x509->isCa;
1905
#endif
1906
                bc->pathlen = a;
1907
                if (c != NULL) {
1908
                    *c = x509->basicConstCrit;
1909
                }
1910
            }
1911
            else {
1912
                WOLFSSL_MSG("No Basic Constraint set");
1913
            }
1914
            return bc;
1915
1916
        case ALT_NAMES_OID:
1917
        {
1918
            DNS_entry* dns = NULL;
1919
1920
            if (x509->subjAltNameSet && x509->altNames != NULL) {
1921
                /* Malloc GENERAL_NAME stack */
1922
                sk = wolfSSL_sk_new_null();
1923
                if (sk == NULL)
1924
                    return NULL;
1925
                sk->type = STACK_TYPE_GEN_NAME;
1926
1927
                /* alt names are DNS_entry structs */
1928
                if (c != NULL) {
1929
                    if (x509->altNames->next != NULL) {
1930
                        *c = -2; /* more then one found */
1931
                    }
1932
                    else {
1933
                        *c = x509->subjAltNameCrit;
1934
                    }
1935
                }
1936
1937
                dns = x509->altNames;
1938
                /* Currently only support GEN_DNS type */
1939
                while (dns != NULL) {
1940
                    gn = wolfSSL_GENERAL_NAME_new();
1941
                    if (gn == NULL) {
1942
                        WOLFSSL_MSG("Error creating GENERAL_NAME");
1943
                        goto err;
1944
                    }
1945
1946
                    gn->type = dns->type;
1947
                    switch (gn->type) {
1948
                        case ASN_DIR_TYPE:
1949
                            {
1950
                                int localIdx = 0;
1951
                                unsigned char* n = (unsigned char*)XMALLOC(
1952
                                        dns->len + MAX_SEQ_SZ, x509->heap,
1953
                                        DYNAMIC_TYPE_TMP_BUFFER);
1954
                                if (n == NULL) {
1955
                                    goto err;
1956
                                }
1957
1958
                                localIdx += SetSequence(dns->len, n);
1959
                                XMEMCPY(n + localIdx, dns->name, dns->len);
1960
                                gn->d.dirn =  wolfSSL_d2i_X509_NAME(NULL, &n,
1961
                                        dns->len + localIdx);
1962
                                XFREE(n, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
1963
                                if (gn->d.dirn == NULL) {
1964
                                    WOLFSSL_MSG("Convert altDirName to X509 "
1965
                                            "NAME failed");
1966
                                    goto err;
1967
                                }
1968
                            }
1969
                            break;
1970
1971
                        default:
1972
                            if (wolfSSL_ASN1_STRING_set(gn->d.ia5, dns->name,
1973
                                    dns->len) != WOLFSSL_SUCCESS) {
1974
                                WOLFSSL_MSG("ASN1_STRING_set failed");
1975
                                goto err;
1976
                            }
1977
                    }
1978
1979
                    dns = dns->next;
1980
                    if (wolfSSL_sk_GENERAL_NAME_push(sk, gn) !=
1981
                                                      WOLFSSL_SUCCESS) {
1982
                        WOLFSSL_MSG("Error pushing ASN1 object onto stack");
1983
                        goto err;
1984
                    }
1985
                    /* null so that it doesn't get pushed again after switch */
1986
                    gn = NULL;
1987
                }
1988
            }
1989
            else {
1990
                WOLFSSL_MSG("No Alt Names set");
1991
            }
1992
1993
            break;
1994
        }
1995
1996
        case CRL_DIST_OID:
1997
    #if defined(OPENSSL_EXTRA)
1998
            if (x509->CRLdistSet && x509->CRLInfo != NULL) {
1999
                if (c != NULL) {
2000
                    *c = x509->CRLdistCrit;
2001
                }
2002
2003
                sk = wolfSSL_sk_new_null();
2004
                if (sk == NULL) {
2005
                    return NULL;
2006
                }
2007
                sk->type = STACK_TYPE_DIST_POINT;
2008
2009
                gn = wolfSSL_GENERAL_NAME_new();
2010
                if (gn == NULL) {
2011
                    WOLFSSL_MSG("Error creating GENERAL_NAME");
2012
                    goto err;
2013
                }
2014
2015
                if (wolfSSL_GENERAL_NAME_set_type(gn, GEN_URI) !=
2016
                        WOLFSSL_SUCCESS) {
2017
                    WOLFSSL_MSG("Error setting GENERAL_NAME type");
2018
                    goto err;
2019
                }
2020
2021
                if (wolfSSL_ASN1_STRING_set(gn->d.uniformResourceIdentifier,
2022
                        x509->CRLInfo, x509->CRLInfoSz) != WOLFSSL_SUCCESS) {
2023
                    WOLFSSL_MSG("ASN1_STRING_set failed");
2024
                    goto err;
2025
                }
2026
2027
                /* wolfSSL only decodes one dist point */
2028
                dp = wolfSSL_DIST_POINT_new();
2029
                if (dp == NULL) {
2030
                    WOLFSSL_MSG("Error creating DIST_POINT");
2031
                    goto err;
2032
                }
2033
2034
                /* push GENERAL_NAME onto fullname stack */
2035
                if (wolfSSL_sk_GENERAL_NAME_push(dp->distpoint->name.fullname,
2036
                                                 gn) != WOLFSSL_SUCCESS) {
2037
                    WOLFSSL_MSG("wolfSSL_sk_GENERAL_NAME_push error");
2038
                    goto err;
2039
                }
2040
2041
                /* push DIST_POINT onto stack */
2042
                if (wolfSSL_sk_DIST_POINT_push(sk, dp) != WOLFSSL_SUCCESS) {
2043
                    WOLFSSL_MSG("Error pushing DIST_POINT onto stack");
2044
                    goto err;
2045
                }
2046
2047
                gn = NULL;
2048
                dp = NULL;
2049
2050
            }
2051
            else {
2052
                WOLFSSL_MSG("No CRL dist set");
2053
            }
2054
    #endif /* OPENSSL_EXTRA */
2055
            break;
2056
2057
        case AUTH_INFO_OID:
2058
            if (x509->authInfoSet && x509->authInfo != NULL) {
2059
                if (c != NULL) {
2060
                    *c = x509->authInfoCrit;
2061
                }
2062
                obj = wolfSSL_ASN1_OBJECT_new();
2063
                if (obj == NULL) {
2064
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2065
                    return NULL;
2066
                }
2067
                obj->type  = AUTH_INFO_OID;
2068
                obj->grp   = oidCertExtType;
2069
                obj->obj   = x509->authInfo;
2070
                obj->objSz = x509->authInfoSz;
2071
            }
2072
            else {
2073
                WOLFSSL_MSG("No Auth Info set");
2074
            }
2075
            break;
2076
2077
        case AUTH_KEY_OID:
2078
            if (x509->authKeyIdSet) {
2079
                WOLFSSL_AUTHORITY_KEYID* akey = wolfSSL_AUTHORITY_KEYID_new();
2080
                if (!akey) {
2081
                    WOLFSSL_MSG("Issue creating WOLFSSL_AUTHORITY_KEYID struct");
2082
                    return NULL;
2083
                }
2084
2085
                if (c != NULL) {
2086
                    *c = x509->authKeyIdCrit;
2087
                }
2088
                obj = wolfSSL_ASN1_OBJECT_new();
2089
                if (obj == NULL) {
2090
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2091
                    wolfSSL_AUTHORITY_KEYID_free(akey);
2092
                    return NULL;
2093
                }
2094
                obj->type  = AUTH_KEY_OID;
2095
                obj->grp   = oidCertExtType;
2096
                obj->obj   = x509->authKeyId;
2097
                obj->objSz = x509->authKeyIdSz;
2098
                akey->issuer = obj;
2099
                return akey;
2100
            }
2101
            else {
2102
                WOLFSSL_MSG("No Auth Key set");
2103
            }
2104
            break;
2105
2106
        case SUBJ_KEY_OID:
2107
            if (x509->subjKeyIdSet) {
2108
                if (c != NULL) {
2109
                    *c = x509->subjKeyIdCrit;
2110
                }
2111
                obj = wolfSSL_ASN1_OBJECT_new();
2112
                if (obj == NULL) {
2113
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2114
                    return NULL;
2115
                }
2116
                obj->type  = SUBJ_KEY_OID;
2117
                obj->grp   = oidCertExtType;
2118
                obj->obj   = x509->subjKeyId;
2119
                obj->objSz = x509->subjKeyIdSz;
2120
            }
2121
            else {
2122
                WOLFSSL_MSG("No Subject Key set");
2123
            }
2124
            break;
2125
2126
        case CERT_POLICY_OID:
2127
        {
2128
        #ifdef WOLFSSL_CERT_EXT
2129
            int i;
2130
2131
            if (x509->certPoliciesNb > 0) {
2132
                if (c != NULL) {
2133
                    if (x509->certPoliciesNb > 1) {
2134
                        *c = -2;
2135
                    }
2136
                    else {
2137
                        *c = 0;
2138
                    }
2139
                }
2140
2141
                sk = wolfSSL_sk_new_asn1_obj();
2142
                if (sk == NULL) {
2143
                    return NULL;
2144
                }
2145
2146
                for (i = 0; i < x509->certPoliciesNb - 1; i++) {
2147
                    obj = wolfSSL_ASN1_OBJECT_new();
2148
                    if (obj == NULL) {
2149
                        WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2150
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2151
                        return NULL;
2152
                    }
2153
                    obj->type  = CERT_POLICY_OID;
2154
                    obj->grp   = oidCertExtType;
2155
                    obj->obj   = (byte*)(x509->certPolicies[i]);
2156
                    obj->objSz = MAX_CERTPOL_SZ;
2157
                    if (wolfSSL_sk_ASN1_OBJECT_push(sk, obj)
2158
                                                           != WOLFSSL_SUCCESS) {
2159
                        WOLFSSL_MSG("Error pushing ASN1 object onto stack");
2160
                        wolfSSL_ASN1_OBJECT_free(obj);
2161
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2162
                        sk = NULL;
2163
                    }
2164
                }
2165
                obj = wolfSSL_ASN1_OBJECT_new();
2166
                if (obj == NULL) {
2167
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2168
                    wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2169
                    return NULL;
2170
                }
2171
                obj->type  = CERT_POLICY_OID;
2172
                obj->grp   = oidCertExtType;
2173
                obj->obj   = (byte*)(x509->certPolicies[i]);
2174
                obj->objSz = MAX_CERTPOL_SZ;
2175
            }
2176
            else {
2177
                WOLFSSL_MSG("No Cert Policy set");
2178
            }
2179
        #elif defined(WOLFSSL_SEP)
2180
            if (x509->certPolicySet) {
2181
                if (c != NULL) {
2182
                    *c = x509->certPolicyCrit;
2183
                }
2184
                obj = wolfSSL_ASN1_OBJECT_new();
2185
                if (obj == NULL) {
2186
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2187
                    return NULL;
2188
                }
2189
                obj->type  = CERT_POLICY_OID;
2190
                obj->grp   = oidCertExtType;
2191
            }
2192
            else {
2193
                WOLFSSL_MSG("No Cert Policy set");
2194
            }
2195
        #else
2196
            WOLFSSL_MSG("wolfSSL not built with WOLFSSL_SEP or WOLFSSL_CERT_EXT");
2197
        #endif
2198
            break;
2199
        }
2200
        case KEY_USAGE_OID:
2201
        {
2202
            WOLFSSL_ASN1_STRING* asn1str = NULL;
2203
            if (x509->keyUsageSet) {
2204
                if (c != NULL) {
2205
                    *c = x509->keyUsageCrit;
2206
                }
2207
2208
                asn1str = wolfSSL_ASN1_STRING_new();
2209
                if (asn1str == NULL) {
2210
                    WOLFSSL_MSG("Failed to malloc ASN1_STRING");
2211
                    return NULL;
2212
                }
2213
2214
                if (wolfSSL_ASN1_STRING_set(asn1str, &x509->keyUsage,
2215
                        sizeof(word16)) != WOLFSSL_SUCCESS) {
2216
                    WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
2217
                    wolfSSL_ASN1_STRING_free(asn1str);
2218
                    return NULL;
2219
                }
2220
2221
                asn1str->type = KEY_USAGE_OID;
2222
            }
2223
            else {
2224
                WOLFSSL_MSG("No Key Usage set");
2225
            }
2226
            /* don't add stack of and return bit string directly */
2227
            return asn1str;
2228
        }
2229
        case INHIBIT_ANY_OID:
2230
            WOLFSSL_MSG("INHIBIT ANY extension not supported");
2231
            break;
2232
2233
        case EXT_KEY_USAGE_OID:
2234
            if (x509->extKeyUsageSrc != NULL) {
2235
                if (c != NULL) {
2236
                    if (x509->extKeyUsageCount > 1) {
2237
                        *c = -2;
2238
                    }
2239
                    else {
2240
                        *c = x509->extKeyUsageCrit;
2241
                    }
2242
                }
2243
                obj = wolfSSL_ASN1_OBJECT_new();
2244
                if (obj == NULL) {
2245
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2246
                    return NULL;
2247
                }
2248
                obj->type  = EXT_KEY_USAGE_OID;
2249
                obj->grp   = oidCertExtType;
2250
                obj->obj   = x509->extKeyUsageSrc;
2251
                obj->objSz = x509->extKeyUsageSz;
2252
            }
2253
            else {
2254
                WOLFSSL_MSG("No Extended Key Usage set");
2255
            }
2256
            break;
2257
2258
        case NAME_CONS_OID:
2259
            WOLFSSL_MSG("Name Constraint OID extension not supported");
2260
            break;
2261
2262
        case PRIV_KEY_USAGE_PERIOD_OID:
2263
            WOLFSSL_MSG("Private Key Usage Period extension not supported");
2264
            break;
2265
2266
        case SUBJ_INFO_ACC_OID:
2267
            WOLFSSL_MSG("Subject Info Access extension not supported");
2268
            break;
2269
2270
        case POLICY_MAP_OID:
2271
            WOLFSSL_MSG("Policy Map extension not supported");
2272
            break;
2273
2274
        case POLICY_CONST_OID:
2275
            WOLFSSL_MSG("Policy Constraint extension not supported");
2276
            break;
2277
2278
        case ISSUE_ALT_NAMES_OID:
2279
            WOLFSSL_MSG("Issue Alt Names extension not supported");
2280
            break;
2281
2282
        case TLS_FEATURE_OID:
2283
            WOLFSSL_MSG("TLS Feature extension not supported");
2284
            break;
2285
2286
        default:
2287
            WOLFSSL_MSG("Unsupported/Unknown extension OID");
2288
    }
2289
2290
    /* make sure stack of is allocated */
2291
    if ((obj || gn) && sk == NULL) {
2292
        sk = wolfSSL_sk_new_asn1_obj();
2293
        if (sk == NULL) {
2294
            goto err;
2295
        }
2296
    }
2297
    if (obj) {
2298
        if (wolfSSL_sk_ASN1_OBJECT_push(sk, obj) != WOLFSSL_SUCCESS) {
2299
            WOLFSSL_MSG("Error pushing ASN1_OBJECT object onto "
2300
                        "stack.");
2301
            goto err;
2302
        }
2303
    }
2304
2305
    ret = sk;
2306
2307
    (void)idx;
2308
2309
    return ret;
2310
2311
err:
2312
    if (obj) {
2313
        wolfSSL_ASN1_OBJECT_free(obj);
2314
    }
2315
    if (gn) {
2316
        wolfSSL_GENERAL_NAME_free(gn);
2317
    }
2318
    #ifdef OPENSSL_EXTRA
2319
    if (dp) {
2320
        wolfSSL_DIST_POINT_free(dp);
2321
    }
2322
    #endif
2323
    if (sk) {
2324
        wolfSSL_sk_free(sk);
2325
    }
2326
    return NULL;
2327
}
2328
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
2329
2330
#ifdef OPENSSL_EXTRA
2331
int wolfSSL_X509_add_altname_ex(WOLFSSL_X509* x509, const char* name,
2332
        word32 nameSz, int type)
2333
{
2334
    DNS_entry* newAltName = NULL;
2335
    char* nameCopy = NULL;
2336
2337
    if (x509 == NULL)
2338
        return WOLFSSL_FAILURE;
2339
2340
    if ((name == NULL) || (nameSz == 0))
2341
        return WOLFSSL_SUCCESS;
2342
2343
    newAltName = AltNameNew(x509->heap);
2344
    if (newAltName == NULL)
2345
        return WOLFSSL_FAILURE;
2346
2347
    nameCopy = (char*)XMALLOC(nameSz + 1, x509->heap, DYNAMIC_TYPE_ALTNAME);
2348
    if (nameCopy == NULL) {
2349
        XFREE(newAltName, x509->heap, DYNAMIC_TYPE_ALTNAME);
2350
        return WOLFSSL_FAILURE;
2351
    }
2352
2353
    XMEMCPY(nameCopy, name, nameSz);
2354
2355
    nameCopy[nameSz] = '\0';
2356
2357
    newAltName->next = x509->altNames;
2358
    newAltName->type = type;
2359
    newAltName->len = nameSz;
2360
    newAltName->name = nameCopy;
2361
    x509->altNames = newAltName;
2362
2363
    return WOLFSSL_SUCCESS;
2364
}
2365
2366
int wolfSSL_X509_add_altname(WOLFSSL_X509* x509, const char* name, int type)
2367
{
2368
    word32 nameSz;
2369
2370
    if (name == NULL)
2371
        return WOLFSSL_SUCCESS;
2372
2373
    nameSz = (word32)XSTRLEN(name);
2374
    if (nameSz == 0)
2375
        return WOLFSSL_SUCCESS;
2376
2377
    if (type == ASN_IP_TYPE) {
2378
        WOLFSSL_MSG("Type not supported, use wolfSSL_X509_add_altname_ex");
2379
        return WOLFSSL_FAILURE;
2380
    }
2381
2382
    return wolfSSL_X509_add_altname_ex(x509, name, nameSz, type);
2383
}
2384
2385
#ifndef NO_WOLFSSL_STUB
2386
WOLFSSL_X509_EXTENSION *wolfSSL_X509_delete_ext(WOLFSSL_X509 *x509, int loc)
2387
{
2388
    WOLFSSL_STUB("wolfSSL_X509_delete_ext");
2389
    (void)x509;
2390
    (void)loc;
2391
    return NULL;
2392
}
2393
2394
/* currently LHASH is not implemented (and not needed for Apache port) */
2395
WOLFSSL_X509_EXTENSION* wolfSSL_X509V3_EXT_conf_nid(
2396
        WOLF_LHASH_OF(CONF_VALUE)* conf, WOLFSSL_X509V3_CTX* ctx, int nid,
2397
        char* value)
2398
{
2399
    WOLFSSL_STUB("wolfSSL_X509V3_EXT_conf_nid");
2400
2401
    if (conf != NULL) {
2402
        WOLFSSL_MSG("Handling LHASH not implemented yet");
2403
        return NULL;
2404
    }
2405
2406
    (void)conf;
2407
    (void)ctx;
2408
    (void)nid;
2409
    (void)value;
2410
    return NULL;
2411
}
2412
2413
void wolfSSL_X509V3_set_ctx_nodb(WOLFSSL_X509V3_CTX* ctx)
2414
{
2415
    WOLFSSL_STUB("wolfSSL_X509V3_set_ctx_nodb");
2416
    (void)ctx;
2417
}
2418
#endif /* !NO_WOLFSSL_STUB */
2419
2420
#ifdef OPENSSL_EXTRA
2421
static WOLFSSL_X509_EXTENSION* createExtFromStr(int nid, const char *value)
2422
{
2423
    WOLFSSL_X509_EXTENSION* ext;
2424
2425
    if (value == NULL)
2426
        return NULL;
2427
2428
    ext = wolfSSL_X509_EXTENSION_new();
2429
    if (ext == NULL) {
2430
        WOLFSSL_MSG("memory error");
2431
        return NULL;
2432
    }
2433
    ext->value.nid = nid;
2434
2435
    switch (nid) {
2436
        case NID_subject_key_identifier:
2437
        case NID_authority_key_identifier:
2438
            if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
2439
                    != WOLFSSL_SUCCESS) {
2440
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
2441
                goto err_cleanup;
2442
            }
2443
            ext->value.type = CTC_UTF8;
2444
            break;
2445
        case NID_subject_alt_name:
2446
        {
2447
            WOLFSSL_GENERAL_NAMES* gns;
2448
            WOLFSSL_GENERAL_NAME* gn;
2449
2450
            if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
2451
                    != WOLFSSL_SUCCESS) {
2452
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
2453
                goto err_cleanup;
2454
            }
2455
            ext->value.type = ASN_DNS_TYPE;
2456
2457
            /* add stack of general names */
2458
            gns = wolfSSL_sk_new_null();
2459
            if (gns == NULL) {
2460
                WOLFSSL_MSG("wolfSSL_sk_new_null error");
2461
                goto err_cleanup;
2462
            }
2463
            ext->ext_sk = gns; /* wolfSSL_X509_EXTENSION_free will handle
2464
                                * free'ing gns */
2465
            gns->type = STACK_TYPE_GEN_NAME;
2466
            gn = wolfSSL_GENERAL_NAME_new();
2467
            if (gn == NULL) {
2468
                WOLFSSL_MSG("wolfSSL_GENERAL_NAME_new error");
2469
                goto err_cleanup;
2470
            }
2471
            if (wolfSSL_sk_GENERAL_NAME_push(gns, gn) != WOLFSSL_SUCCESS) {
2472
                WOLFSSL_MSG("wolfSSL_sk_GENERAL_NAME_push error");
2473
                wolfSSL_GENERAL_NAME_free(gn);
2474
                goto err_cleanup;
2475
            }
2476
            if (wolfSSL_ASN1_STRING_set(gn->d.ia5, value, -1)
2477
                    != WOLFSSL_SUCCESS) {
2478
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set failed");
2479
                goto err_cleanup;
2480
            }
2481
            gn->type = ASN_DNS_TYPE;
2482
            break;
2483
        }
2484
        case NID_key_usage:
2485
            if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
2486
                    != WOLFSSL_SUCCESS) {
2487
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
2488
                goto err_cleanup;
2489
            }
2490
            ext->value.type = KEY_USAGE_OID;
2491
            break;
2492
        default:
2493
            WOLFSSL_MSG("invalid or unsupported NID");
2494
            goto err_cleanup;
2495
    }
2496
    return ext;
2497
err_cleanup:
2498
    wolfSSL_X509_EXTENSION_free(ext);
2499
    return NULL;
2500
}
2501
2502
/**
2503
 * Create a WOLFSSL_X509_EXTENSION from the input arguments.
2504
 * @param conf  Not used
2505
 * @param ctx   Not used
2506
 * @param nid   Interprets the value parameter as the x509 extension that
2507
 *              corresponds to this NID.
2508
 * @param value A NULL terminated string that is taken as the value of the
2509
 *              newly created extension object.
2510
 * @return WOLFSSL_X509_EXTENSION* on success or NULL on failure.
2511
 */
2512
WOLFSSL_X509_EXTENSION* wolfSSL_X509V3_EXT_nconf_nid(WOLFSSL_CONF* conf,
2513
        WOLFSSL_X509V3_CTX *ctx, int nid, const char *value)
2514
{
2515
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_nconf_nid");
2516
2517
    if (value == NULL) {
2518
        WOLFSSL_MSG("value NULL parameter");
2519
        return NULL;
2520
    }
2521
2522
    if (conf != NULL || ctx != NULL) {
2523
        WOLFSSL_MSG("wolfSSL_X509V3_EXT_nconf_nid does not handle either "
2524
                    "conf or ctx parameters");
2525
    }
2526
2527
    return createExtFromStr(nid, value);
2528
}
2529
2530
/**
2531
 * Create a WOLFSSL_X509_EXTENSION from the input arguments.
2532
 * @param conf  Not used
2533
 * @param ctx   Not used
2534
 * @param sName The textual representation of the NID that the value parameter
2535
 *              should be interpreted as.
2536
 * @param value A NULL terminated string that is taken as the value of the
2537
 *              newly created extension object.
2538
 * @return WOLFSSL_X509_EXTENSION* on success or NULL on failure.
2539
 */
2540
WOLFSSL_X509_EXTENSION* wolfSSL_X509V3_EXT_nconf(WOLFSSL_CONF *conf,
2541
        WOLFSSL_X509V3_CTX *ctx, const char *sName, const char *value)
2542
{
2543
    const WOLFSSL_ObjectInfo* info = wolfssl_object_info;
2544
    size_t i;
2545
2546
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_nconf");
2547
2548
    if (value == NULL) {
2549
        WOLFSSL_MSG("value NULL parameter");
2550
        return NULL;
2551
    }
2552
2553
    if (conf != NULL || ctx != NULL) {
2554
        WOLFSSL_MSG("wolfSSL_X509V3_EXT_nconf does not handle either "
2555
                    "conf or ctx parameters");
2556
    }
2557
2558
    for (i = 0; i < wolfssl_object_info_sz; i++, info++) {
2559
        if (XSTRCMP(info->sName, sName) == 0)
2560
            return createExtFromStr(info->nid, value);
2561
    }
2562
2563
    WOLFSSL_MSG("value didn't match any known NID");
2564
    return NULL;
2565
}
2566
2567
static void wolfSSL_X509V3_EXT_METHOD_populate(WOLFSSL_v3_ext_method *method,
2568
                                               int nid)
2569
{
2570
    if (!method)
2571
        return;
2572
2573
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_METHOD_populate");
2574
    switch (nid) {
2575
    case NID_subject_key_identifier:
2576
        method->i2s = (X509V3_EXT_I2S)wolfSSL_i2s_ASN1_STRING;
2577
        FALL_THROUGH;
2578
    case NID_authority_key_identifier:
2579
    case NID_key_usage:
2580
    case NID_certificate_policies:
2581
    case NID_policy_mappings:
2582
    case NID_subject_alt_name:
2583
    case NID_issuer_alt_name:
2584
    case NID_basic_constraints:
2585
    case NID_name_constraints:
2586
    case NID_policy_constraints:
2587
    case NID_ext_key_usage:
2588
    case NID_crl_distribution_points:
2589
    case NID_inhibit_any_policy:
2590
    case NID_info_access:
2591
        WOLFSSL_MSG("Nothing to populate for current NID");
2592
        break;
2593
    default:
2594
        WOLFSSL_MSG("Unknown or unsupported NID");
2595
        break;
2596
    }
2597
2598
    return;
2599
}
2600
2601
/**
2602
 * @param nid One of the NID_* constants defined in asn.h
2603
 * @param crit
2604
 * @param data This data is copied to the returned extension.
2605
 * @return
2606
 */
2607
WOLFSSL_X509_EXTENSION *wolfSSL_X509V3_EXT_i2d(int nid, int crit,
2608
                                               void *data)
2609
{
2610
    WOLFSSL_X509_EXTENSION *ext = NULL;
2611
    WOLFSSL_ASN1_STRING* asn1str = NULL;
2612
2613
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_i2d");
2614
2615
    if (!data) {
2616
        return NULL;
2617
    }
2618
2619
    if (!(ext = wolfSSL_X509_EXTENSION_new())) {
2620
        return NULL;
2621
    }
2622
2623
    wolfSSL_X509V3_EXT_METHOD_populate(&ext->ext_method, nid);
2624
2625
    switch (nid) {
2626
    case NID_subject_key_identifier:
2627
        /* WOLFSSL_ASN1_STRING */
2628
    case NID_key_usage:
2629
        /* WOLFSSL_ASN1_STRING */
2630
    {
2631
        asn1str = (WOLFSSL_ASN1_STRING*)data;
2632
        ext->value = *asn1str;
2633
        if (asn1str->isDynamic) {
2634
            ext->value.data = (char*)XMALLOC(asn1str->length, NULL,
2635
                                             DYNAMIC_TYPE_OPENSSL);
2636
            if (!ext->value.data) {
2637
                WOLFSSL_MSG("malloc failed");
2638
                /* Zero so that no existing memory is freed */
2639
                XMEMSET(&ext->value, 0, sizeof(WOLFSSL_ASN1_STRING));
2640
                goto err_cleanup;
2641
            }
2642
            XMEMCPY(ext->value.data, asn1str->data, asn1str->length);
2643
        }
2644
        else {
2645
            ext->value.data = ext->value.strData;
2646
        }
2647
2648
        if (!(ext->obj = wolfSSL_OBJ_nid2obj(nid))) {
2649
            WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
2650
            goto err_cleanup;
2651
        }
2652
2653
        break;
2654
    }
2655
    case NID_subject_alt_name:
2656
        /* typedef STACK_OF(GENERAL_NAME) GENERAL_NAMES */
2657
    case NID_issuer_alt_name:
2658
        /* typedef STACK_OF(GENERAL_NAME) GENERAL_NAMES */
2659
    case NID_ext_key_usage:
2660
        /* typedef STACK_OF(ASN1_OBJECT) EXTENDED_KEY_USAGE */
2661
    case NID_info_access:
2662
        /* typedef STACK_OF(ACCESS_DESCRIPTION) AUTHORITY_INFO_ACCESS */
2663
    {
2664
        WOLFSSL_STACK* sk = (WOLFSSL_STACK*)data;
2665
2666
        if (ext->ext_sk) {
2667
            wolfSSL_sk_pop_free(ext->ext_sk, NULL);
2668
        }
2669
2670
        if (!(ext->ext_sk = wolfSSL_sk_dup(sk))) {
2671
            WOLFSSL_MSG("wolfSSL_sk_dup failed");
2672
            goto err_cleanup;
2673
        }
2674
        break;
2675
    }
2676
    case NID_basic_constraints:
2677
    {
2678
        /* WOLFSSL_BASIC_CONSTRAINTS */
2679
        WOLFSSL_BASIC_CONSTRAINTS* bc = (WOLFSSL_BASIC_CONSTRAINTS*)data;
2680
2681
        if (!(ext->obj = wolfSSL_ASN1_OBJECT_new())) {
2682
            WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
2683
            goto err_cleanup;
2684
        }
2685
2686
        ext->obj->ca = bc->ca;
2687
        if (bc->pathlen) {
2688
            ext->obj->pathlen = wolfSSL_ASN1_INTEGER_dup(bc->pathlen);
2689
            if (!ext->obj->pathlen) {
2690
                WOLFSSL_MSG("wolfSSL_ASN1_INTEGER_dup failed");
2691
                goto err_cleanup;
2692
            }
2693
        }
2694
        break;
2695
    }
2696
    case NID_authority_key_identifier:
2697
    {
2698
        /* AUTHORITY_KEYID */
2699
        WOLFSSL_AUTHORITY_KEYID* akey = (WOLFSSL_AUTHORITY_KEYID*)data;
2700
2701
        if (akey->keyid) {
2702
            if (wolfSSL_ASN1_STRING_set(&ext->value, akey->keyid->data,
2703
                                    akey->keyid->length) != WOLFSSL_SUCCESS) {
2704
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set failed");
2705
                goto err_cleanup;
2706
            }
2707
            ext->value.type = akey->keyid->type;
2708
2709
            if (!(ext->obj = wolfSSL_OBJ_nid2obj(nid))) {
2710
                WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
2711
                goto err_cleanup;
2712
            }
2713
2714
        }
2715
        else if (akey->issuer) {
2716
            ext->obj = wolfSSL_ASN1_OBJECT_dup(akey->issuer);
2717
            if (!ext->obj) {
2718
                WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_dup failed");
2719
                goto err_cleanup;
2720
            }
2721
        }
2722
        else {
2723
            WOLFSSL_MSG("NID_authority_key_identifier empty data");
2724
            goto err_cleanup;
2725
        }
2726
        break;
2727
    }
2728
    case NID_inhibit_any_policy:
2729
        /* ASN1_INTEGER */
2730
    case NID_certificate_policies:
2731
        /* STACK_OF(POLICYINFO) */
2732
    case NID_policy_mappings:
2733
        /* STACK_OF(POLICY_MAPPING) */
2734
    case NID_name_constraints:
2735
        /* NAME_CONSTRAINTS */
2736
    case NID_policy_constraints:
2737
        /* POLICY_CONSTRAINTS */
2738
    case NID_crl_distribution_points:
2739
        /* typedef STACK_OF(DIST_POINT) CRL_DIST_POINTS */
2740
    default:
2741
        WOLFSSL_MSG("Unknown or unsupported NID");
2742
        break;
2743
    }
2744
2745
    ext->crit = crit;
2746
2747
    return ext;
2748
err_cleanup:
2749
    if (ext) {
2750
        wolfSSL_X509_EXTENSION_free(ext);
2751
    }
2752
    if (asn1str) {
2753
        wolfSSL_ASN1_STRING_free(asn1str);
2754
    }
2755
    return NULL;
2756
}
2757
2758
/* Returns pointer to ASN1_OBJECT from an X509_EXTENSION object */
2759
WOLFSSL_ASN1_OBJECT* wolfSSL_X509_EXTENSION_get_object \
2760
    (WOLFSSL_X509_EXTENSION* ext)
2761
{
2762
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_get_object");
2763
    if(ext == NULL)
2764
        return NULL;
2765
    return ext->obj;
2766
}
2767
2768
2769
/**
2770
 * duplicates the 'obj' input and sets it into the 'ext' structure
2771
 * returns WOLFSSL_SUCCESS on success
2772
 */
2773
int wolfSSL_X509_EXTENSION_set_object(WOLFSSL_X509_EXTENSION* ext,
2774
        const WOLFSSL_ASN1_OBJECT* obj)
2775
{
2776
    WOLFSSL_ASN1_OBJECT *current;
2777
2778
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_set_object");
2779
    if (ext == NULL)
2780
        return WOLFSSL_FAILURE;
2781
2782
    current = wolfSSL_X509_EXTENSION_get_object(ext);
2783
    if (current != NULL) {
2784
        wolfSSL_ASN1_OBJECT_free(current);
2785
    }
2786
    ext->obj = wolfSSL_ASN1_OBJECT_dup((WOLFSSL_ASN1_OBJECT*)obj);
2787
    return WOLFSSL_SUCCESS;
2788
}
2789
#endif /* OPENSSL_ALL */
2790
2791
/* Returns pointer to ASN1_STRING in X509_EXTENSION object */
2792
WOLFSSL_ASN1_STRING* wolfSSL_X509_EXTENSION_get_data(WOLFSSL_X509_EXTENSION* ext)
2793
{
2794
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_get_data");
2795
    if (ext == NULL)
2796
        return NULL;
2797
    return &ext->value;
2798
}
2799
2800
2801
/**
2802
 * Creates a duplicate of input 'data' and sets it into 'ext' structure
2803
 * returns WOLFSSL_SUCCESS on success
2804
 */
2805
int wolfSSL_X509_EXTENSION_set_data(WOLFSSL_X509_EXTENSION* ext,
2806
        WOLFSSL_ASN1_STRING* data)
2807
{
2808
    WOLFSSL_ASN1_STRING* current;
2809
2810
    if (ext == NULL || data == NULL)
2811
        return WOLFSSL_FAILURE;
2812
2813
    current = wolfSSL_X509_EXTENSION_get_data(ext);
2814
    if (current->length > 0 && current->data != NULL && current->isDynamic) {
2815
        XFREE(current->data, NULL, DYNAMIC_TYPE_OPENSSL);
2816
    }
2817
2818
    return wolfSSL_ASN1_STRING_copy(&ext->value, data);
2819
}
2820
2821
#if !defined(NO_PWDBASED)
2822
int wolfSSL_X509_digest(const WOLFSSL_X509* x509, const WOLFSSL_EVP_MD* digest,
2823
        unsigned char* buf, unsigned int* len)
2824
{
2825
    int ret;
2826
2827
    WOLFSSL_ENTER("wolfSSL_X509_digest");
2828
2829
    if (x509 == NULL || digest == NULL) {
2830
        WOLFSSL_MSG("Null argument found");
2831
        return WOLFSSL_FAILURE;
2832
    }
2833
2834
    if (x509->derCert == NULL) {
2835
        WOLFSSL_MSG("No DER certificate stored in X509");
2836
        return WOLFSSL_FAILURE;
2837
    }
2838
2839
    ret = wolfSSL_EVP_Digest(x509->derCert->buffer, x509->derCert->length, buf,
2840
                              len, digest, NULL);
2841
    WOLFSSL_LEAVE("wolfSSL_X509_digest", ret);
2842
    return ret;
2843
}
2844
2845
int wolfSSL_X509_pubkey_digest(const WOLFSSL_X509 *x509,
2846
        const WOLFSSL_EVP_MD *digest, unsigned char* buf, unsigned int* len)
2847
{
2848
    int ret;
2849
2850
    WOLFSSL_ENTER("wolfSSL_X509_pubkey_digest");
2851
2852
    if (x509 == NULL || digest == NULL) {
2853
        WOLFSSL_MSG("Null argument found");
2854
        return WOLFSSL_FAILURE;
2855
    }
2856
2857
    if (x509->pubKey.buffer == NULL || x509->pubKey.length == 0) {
2858
        WOLFSSL_MSG("No DER public key stored in X509");
2859
        return WOLFSSL_FAILURE;
2860
    }
2861
2862
    ret = wolfSSL_EVP_Digest(x509->pubKey.buffer, x509->pubKey.length, buf,
2863
                              len, digest, NULL);
2864
    WOLFSSL_LEAVE("wolfSSL_X509_pubkey_digest", ret);
2865
    return ret;
2866
}
2867
#endif
2868
2869
#endif /* OPENSSL_EXTRA */
2870
2871
#ifdef OPENSSL_EXTRA
2872
2873
    #ifndef NO_WOLFSSL_STUB
2874
    const char* wolfSSL_X509_get_default_cert_file_env(void)
2875
    {
2876
        WOLFSSL_STUB("X509_get_default_cert_file_env");
2877
        return NULL;
2878
    }
2879
2880
    const char* wolfSSL_X509_get_default_cert_file(void)
2881
    {
2882
        WOLFSSL_STUB("X509_get_default_cert_file");
2883
        return NULL;
2884
    }
2885
2886
    const char* wolfSSL_X509_get_default_cert_dir_env(void)
2887
    {
2888
        WOLFSSL_STUB("X509_get_default_cert_dir_env");
2889
        return NULL;
2890
    }
2891
2892
    const char* wolfSSL_X509_get_default_cert_dir(void)
2893
    {
2894
        WOLFSSL_STUB("X509_get_default_cert_dir");
2895
        return NULL;
2896
    }
2897
    #endif
2898
2899
#endif /* OPENSSL_EXTRA */
2900
2901
#if defined(KEEP_PEER_CERT) || defined(SESSION_CERTS) || \
2902
    defined(OPENSSL_EXTRA)  || defined(OPENSSL_EXTRA_X509_SMALL)
2903
2904
/* user externally called free X509, if dynamic go ahead with free, otherwise
2905
 * don't */
2906
static void ExternalFreeX509(WOLFSSL_X509* x509)
2907
{
2908
#if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
2909
    int doFree = 0;
2910
#endif
2911
2912
    WOLFSSL_ENTER("ExternalFreeX509");
2913
    if (x509) {
2914
#ifdef HAVE_EX_DATA_CLEANUP_HOOKS
2915
        wolfSSL_CRYPTO_cleanup_ex_data(&x509->ex_data);
2916
#endif
2917
        if (x509->dynamicMemory) {
2918
        #if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
2919
        #ifndef SINGLE_THREADED
2920
            if (wc_LockMutex(&x509->refMutex) != 0) {
2921
                WOLFSSL_MSG("Couldn't lock x509 mutex");
2922
            }
2923
        #endif
2924
            /* only free if all references to it are done */
2925
            x509->refCount--;
2926
            if (x509->refCount == 0)
2927
                doFree = 1;
2928
        #ifndef SINGLE_THREADED
2929
            wc_UnLockMutex(&x509->refMutex);
2930
        #endif
2931
        #endif /* OPENSSL_EXTRA_X509_SMALL || OPENSSL_EXTRA */
2932
2933
        #if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
2934
            if (doFree)
2935
        #endif /* OPENSSL_EXTRA_X509_SMALL || OPENSSL_EXTRA */
2936
            {
2937
                FreeX509(x509);
2938
                XFREE(x509, x509->heap, DYNAMIC_TYPE_X509);
2939
            }
2940
        } else {
2941
            WOLFSSL_MSG("free called on non dynamic object, not freeing");
2942
        }
2943
    }
2944
}
2945
2946
/* Frees an external WOLFSSL_X509 structure */
2947
WOLFSSL_ABI
2948
void wolfSSL_X509_free(WOLFSSL_X509* x509)
2949
{
2950
    WOLFSSL_ENTER("wolfSSL_FreeX509");
2951
    ExternalFreeX509(x509);
2952
}
2953
2954
2955
/* copy name into in buffer, at most sz bytes, if buffer is null will
2956
   malloc buffer, call responsible for freeing                     */
2957
WOLFSSL_ABI
2958
char* wolfSSL_X509_NAME_oneline(WOLFSSL_X509_NAME* name, char* in, int sz)
2959
{
2960
    int copySz;
2961
2962
    if (name == NULL) {
2963
        WOLFSSL_MSG("WOLFSSL_X509_NAME pointer was NULL");
2964
        return NULL;
2965
    }
2966
2967
    copySz = min(sz, name->sz);
2968
2969
    WOLFSSL_ENTER("wolfSSL_X509_NAME_oneline");
2970
    if (!name->sz) return in;
2971
2972
    if (!in) {
2973
    #ifdef WOLFSSL_STATIC_MEMORY
2974
        WOLFSSL_MSG("Using static memory -- please pass in a buffer");
2975
        return NULL;
2976
    #else
2977
        in = (char*)XMALLOC(name->sz, NULL, DYNAMIC_TYPE_OPENSSL);
2978
        if (!in ) return in;
2979
        copySz = name->sz;
2980
    #endif
2981
    }
2982
2983
    if (copySz <= 0)
2984
        return in;
2985
2986
    XMEMCPY(in, name->name, copySz - 1);
2987
    in[copySz - 1] = 0;
2988
2989
    return in;
2990
}
2991
2992
#ifdef OPENSSL_EXTRA
2993
unsigned long wolfSSL_X509_NAME_hash(WOLFSSL_X509_NAME* name)
2994
{
2995
#ifndef NO_SHA
2996
    byte digest[WC_SHA_DIGEST_SIZE];
2997
    unsigned long ret = 0;
2998
    unsigned char* canon_name = NULL;
2999
    int size = 0;
3000
3001
    WOLFSSL_ENTER("wolfSSL_X509_NAME_hash");
3002
    if (name == NULL) {
3003
        WOLFSSL_MSG("WOLFSSL_X509_NAME pointer was NULL");
3004
        return 0;
3005
    }
3006
    if (name->sz == 0) {
3007
        WOLFSSL_MSG("nothing to hash in WOLFSSL_X509_NAME");
3008
        return 0;
3009
    }
3010
3011
    size = wolfSSL_i2d_X509_NAME_canon(name, &canon_name);
3012
3013
    if (size <= 0){
3014
        WOLFSSL_MSG("wolfSSL_i2d_X509_NAME_canon error");
3015
        return 0;
3016
    }
3017
3018
    if (wc_ShaHash((byte*)canon_name, size, digest) != 0) {
3019
        WOLFSSL_MSG("wc_ShaHash error");
3020
        return 0;
3021
    }
3022
3023
    XFREE(canon_name, NULL, DYNAMIC_TYPE_OPENSSL);
3024
3025
    ret  =  (unsigned long) digest[0];
3026
    ret |= ((unsigned long) digest[1]) << 8;
3027
    ret |= ((unsigned long) digest[2]) << 16;
3028
    ret |= ((unsigned long) digest[3]) << 24;
3029
    return ret;
3030
#else
3031
    (void)name;
3032
    WOLFSSL_MSG("wolfSSL_X509_NAME_hash sha support not compiled in");
3033
    return 0;
3034
#endif
3035
}
3036
#endif /* OPENSSL_EXTRA */
3037
3038
#if defined(OPENSSL_EXTRA) && defined(XSNPRINTF)
3039
/* Copies X509 subject name into a buffer, with comma-separated name entries
3040
 *   (matching OpenSSL v1.0.0 format)
3041
 * Example Output for Issuer:
3042
 *
3043
 * C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting,
3044
 *  CN=www.wolfssl.com, emailAddress=info@wolfssl.com
3045
 */
3046
char* wolfSSL_X509_get_name_oneline(WOLFSSL_X509_NAME* name, char* in, int sz)
3047
{
3048
    WOLFSSL_X509_NAME_ENTRY* entry;
3049
    int nameSz, strSz, strLen, count, i;
3050
    int totalLen = 0;
3051
    char *str;
3052
    char tmpBuf[256];
3053
    const int tmpBufSz = sizeof(tmpBuf);
3054
    char buf[80];
3055
    const char* sn;
3056
    WOLFSSL_ENTER("wolfSSL_X509_get_name_oneline");
3057
3058
    if (name == NULL) {
3059
        WOLFSSL_MSG("wolfSSL_X509_get_subject_name failed");
3060
        return NULL;
3061
    }
3062
    #ifdef WOLFSSL_STATIC_MEMORY
3063
    if (!in) {
3064
        WOLFSSL_MSG("Using static memory -- please pass in a buffer");
3065
        return NULL;
3066
    }
3067
    #endif
3068
3069
    /* Loop through X509 name entries and copy new format to buffer */
3070
    count = wolfSSL_X509_NAME_entry_count(name);
3071
    for (i = 0; i < count; i++) {
3072
3073
        /* Get name entry and size */
3074
        entry = wolfSSL_X509_NAME_get_entry(name, i);
3075
        if (entry == NULL) {
3076
            WOLFSSL_MSG("wolfSSL_X509_NAME_get_entry failed");
3077
            return NULL;
3078
        }
3079
        nameSz = wolfSSL_X509_NAME_get_text_by_NID(name, entry->nid, buf,
3080
                                                                   sizeof(buf));
3081
        if (nameSz < 0) {
3082
            WOLFSSL_MSG("wolfSSL_X509_NAME_get_text_by_NID failed");
3083
            return NULL;
3084
        }
3085
3086
        /* Get short name */
3087
        sn = wolfSSL_OBJ_nid2sn(entry->nid);
3088
        if (sn == NULL) {
3089
            WOLFSSL_MSG("OBJ_nid2sn failed");
3090
            return NULL;
3091
        }
3092
3093
        /* Copy sn and name text to buffer
3094
         * Add extra strSz for '=', ',', ' ' and '\0' characters in XSNPRINTF.
3095
         */
3096
        if (i != count - 1) {
3097
            strSz = (int)XSTRLEN(sn) + nameSz + 4;
3098
            str = (char*)XMALLOC(strSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
3099
            if (str == NULL) {
3100
                WOLFSSL_MSG("Memory error");
3101
                return NULL;
3102
            }
3103
            if ((strLen = XSNPRINTF(str, strSz, "%s=%s, ", sn, buf))
3104
                >= strSz)
3105
            {
3106
                WOLFSSL_MSG("buffer overrun");
3107
                XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
3108
                return NULL;
3109
            }
3110
        }
3111
        else {
3112
            /* Copy last name entry
3113
            * Add extra strSz for '=' and '\0' characters in XSNPRINTF.
3114
            */
3115
            strSz = (int)XSTRLEN(sn) + nameSz + 2;
3116
            str = (char*)XMALLOC(strSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
3117
            if (str == NULL) {
3118
                WOLFSSL_MSG("Memory error");
3119
                return NULL;
3120
            }
3121
            if ((strLen = XSNPRINTF(str, strSz, "%s=%s", sn, buf)) >= strSz) {
3122
                WOLFSSL_MSG("buffer overrun");
3123
                XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
3124
                return NULL;
3125
            }
3126
        }
3127
        /* Copy string to tmpBuf */
3128
        if (totalLen + strLen > tmpBufSz) {
3129
            WOLFSSL_MSG("buffer overrun");
3130
            XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
3131
            return NULL;
3132
        }
3133
        XMEMCPY(tmpBuf + totalLen, str, strLen);
3134
        totalLen += strLen;
3135
        XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
3136
    }
3137
3138
    /* Allocate space based on total string size if no buffer was provided */
3139
    if (!in) {
3140
        in = (char*)XMALLOC(totalLen+1, NULL, DYNAMIC_TYPE_OPENSSL);
3141
        if (in == NULL) {
3142
            WOLFSSL_MSG("Memory error");
3143
            return in;
3144
        }
3145
    }
3146
    else {
3147
        if (totalLen + 1 > sz) {
3148
            WOLFSSL_MSG("buffer overrun");
3149
            return NULL;
3150
        }
3151
    }
3152
3153
    XMEMCPY(in, tmpBuf, totalLen);
3154
    in[totalLen] = '\0';
3155
3156
    return in;
3157
}
3158
#endif
3159
3160
3161
/* Wraps wolfSSL_X509_d2i
3162
 *
3163
 * returns a WOLFSSL_X509 structure pointer on success and NULL on fail
3164
 */
3165
WOLFSSL_X509* wolfSSL_d2i_X509(WOLFSSL_X509** x509, const unsigned char** in,
3166
        int len)
3167
{
3168
    WOLFSSL_X509* newX509 = NULL;
3169
    WOLFSSL_ENTER("wolfSSL_d2i_X509");
3170
3171
    if (in == NULL) {
3172
        WOLFSSL_MSG("NULL input for wolfSSL_d2i_X509");
3173
        return NULL;
3174
    }
3175
3176
    newX509 = wolfSSL_X509_d2i(x509, *in, len);
3177
    if (newX509 != NULL) {
3178
        *in += newX509->derCert->length;
3179
    }
3180
    return newX509;
3181
}
3182
3183
static WOLFSSL_X509* d2i_X509orX509REQ(WOLFSSL_X509** x509,
3184
                                        const byte* in, int len, int req)
3185
{
3186
    WOLFSSL_X509 *newX509 = NULL;
3187
    int type = req ? CERTREQ_TYPE : CERT_TYPE;
3188
3189
    WOLFSSL_ENTER("wolfSSL_X509_d2i");
3190
3191
    if (in != NULL && len != 0
3192
    #ifndef WOLFSSL_CERT_REQ
3193
            && req == 0
3194
    #else
3195
            && (req == 0 || req == 1)
3196
    #endif
3197
            ) {
3198
    #ifdef WOLFSSL_SMALL_STACK
3199
        DecodedCert* cert;
3200
    #else
3201
        DecodedCert  cert[1];
3202
    #endif
3203
3204
    #ifdef WOLFSSL_SMALL_STACK
3205
        cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL,
3206
                                     DYNAMIC_TYPE_DCERT);
3207
        if (cert == NULL)
3208
            return NULL;
3209
    #endif
3210
3211
        InitDecodedCert(cert, (byte*)in, len, NULL);
3212
    #ifdef WOLFSSL_CERT_REQ
3213
        cert->isCSR = (byte)req;
3214
    #endif
3215
        if (ParseCertRelative(cert, type, 0, NULL) == 0) {
3216
            newX509 = wolfSSL_X509_new();
3217
            if (newX509 != NULL) {
3218
                if (CopyDecodedToX509(newX509, cert) != 0) {
3219
                    wolfSSL_X509_free(newX509);
3220
                    newX509 = NULL;
3221
                }
3222
            }
3223
        }
3224
        FreeDecodedCert(cert);
3225
    #ifdef WOLFSSL_SMALL_STACK
3226
        XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
3227
    #endif
3228
    }
3229
3230
    if (x509 != NULL)
3231
        *x509 = newX509;
3232
3233
    return newX509;
3234
}
3235
3236
int wolfSSL_X509_get_isCA(WOLFSSL_X509* x509)
3237
{
3238
    int isCA = 0;
3239
3240
    WOLFSSL_ENTER("wolfSSL_X509_get_isCA");
3241
3242
    if (x509 != NULL)
3243
        isCA = x509->isCa;
3244
3245
    WOLFSSL_LEAVE("wolfSSL_X509_get_isCA", isCA);
3246
3247
    return isCA;
3248
}
3249
3250
WOLFSSL_X509* wolfSSL_X509_d2i(WOLFSSL_X509** x509, const byte* in, int len)
3251
{
3252
    return d2i_X509orX509REQ(x509, in, len, 0);
3253
}
3254
3255
#ifdef WOLFSSL_CERT_REQ
3256
WOLFSSL_X509* wolfSSL_X509_REQ_d2i(WOLFSSL_X509** x509,
3257
        const unsigned char* in, int len)
3258
{
3259
    return d2i_X509orX509REQ(x509, in, len, 1);
3260
}
3261
#endif
3262
#endif /* KEEP_PEER_CERT || SESSION_CERTS || OPENSSL_EXTRA ||
3263
          OPENSSL_EXTRA_X509_SMALL */
3264
3265
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
3266
/* returns the number of entries in the WOLFSSL_X509_NAME */
3267
int wolfSSL_X509_NAME_entry_count(WOLFSSL_X509_NAME* name)
3268
{
3269
    int count = 0;
3270
3271
    WOLFSSL_ENTER("wolfSSL_X509_NAME_entry_count");
3272
3273
    if (name != NULL)
3274
        count = name->entrySz;
3275
3276
    WOLFSSL_LEAVE("wolfSSL_X509_NAME_entry_count", count);
3277
    return count;
3278
}
3279
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
3280
3281
#if defined(OPENSSL_EXTRA) || \
3282
    defined(KEEP_OUR_CERT) || defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
3283
3284
/* return the next, if any, altname from the peer cert */
3285
WOLFSSL_ABI
3286
char* wolfSSL_X509_get_next_altname(WOLFSSL_X509* cert)
3287
{
3288
    char* ret = NULL;
3289
    WOLFSSL_ENTER("wolfSSL_X509_get_next_altname");
3290
3291
    /* don't have any to work with */
3292
    if (cert == NULL || cert->altNames == NULL)
3293
        return NULL;
3294
3295
    /* already went through them */
3296
    if (cert->altNamesNext == NULL)
3297
        return NULL;
3298
3299
    ret = cert->altNamesNext->name;
3300
#if defined(OPENSSL_ALL) || defined(WOLFSSL_IP_ALT_NAME)
3301
    /* return the IP address as a string */
3302
    if (cert->altNamesNext->type == ASN_IP_TYPE) {
3303
        ret = cert->altNamesNext->ipString;
3304
    }
3305
#endif
3306
    cert->altNamesNext = cert->altNamesNext->next;
3307
3308
    return ret;
3309
}
3310
3311
int wolfSSL_X509_get_signature(WOLFSSL_X509* x509,
3312
                                                unsigned char* buf, int* bufSz)
3313
{
3314
    WOLFSSL_ENTER("wolfSSL_X509_get_signature");
3315
    if (x509 == NULL || bufSz == NULL || (*bufSz < (int)x509->sig.length &&
3316
                buf != NULL))
3317
        return WOLFSSL_FATAL_ERROR;
3318
3319
    if (buf != NULL)
3320
        XMEMCPY(buf, x509->sig.buffer, x509->sig.length);
3321
    *bufSz = x509->sig.length;
3322
3323
    return WOLFSSL_SUCCESS;
3324
}
3325
3326
3327
/* Getter function that copies over the DER public key buffer to "buf" and
3328
    * sets the size in bufSz. If "buf" is NULL then just bufSz is set to needed
3329
    * buffer size. "bufSz" passed in should initially be set by the user to be
3330
    * the size of "buf". This gets checked to make sure the buffer is large
3331
    * enough to hold the public key.
3332
    *
3333
    * Note: this is the X.509 form of key with "header" info.
3334
    * return WOLFSSL_SUCCESS on success
3335
    */
3336
int wolfSSL_X509_get_pubkey_buffer(WOLFSSL_X509* x509,
3337
                                            unsigned char* buf, int* bufSz)
3338
{
3339
#ifdef WOLFSSL_SMALL_STACK
3340
    DecodedCert* cert;
3341
#else
3342
    DecodedCert cert[1];
3343
#endif
3344
    word32 idx;
3345
    const byte*  der;
3346
    int length = 0;
3347
    int    ret = 0, derSz = 0;
3348
    int badDate = 0;
3349
    const byte* pubKeyX509 = NULL;
3350
    int   pubKeyX509Sz = 0;
3351
3352
    WOLFSSL_ENTER("wolfSSL_X509_get_pubkey_buffer");
3353
    if (x509 == NULL || bufSz == NULL) {
3354
        WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", BAD_FUNC_ARG);
3355
        return WOLFSSL_FATAL_ERROR;
3356
    }
3357
3358
3359
#ifdef WOLFSSL_SMALL_STACK
3360
    cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert),
3361
                                    x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
3362
    if (cert == NULL) {
3363
        WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", MEMORY_E);
3364
        return WOLFSSL_FATAL_ERROR;
3365
    }
3366
#endif
3367
3368
    der = wolfSSL_X509_get_der(x509, &derSz);
3369
    if (der != NULL) {
3370
        InitDecodedCert(cert, der, derSz, NULL);
3371
        ret = wc_GetPubX509(cert, 0, &badDate);
3372
        if (ret >= 0) {
3373
            idx = cert->srcIdx;
3374
            pubKeyX509 = cert->source + cert->srcIdx;
3375
            ret = GetSequence(cert->source, &cert->srcIdx, &length,
3376
                    cert->maxIdx);
3377
            pubKeyX509Sz = length + (cert->srcIdx - idx);
3378
        }
3379
        FreeDecodedCert(cert);
3380
    }
3381
#ifdef WOLFSSL_SMALL_STACK
3382
    XFREE(cert, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
3383
#endif
3384
3385
    if (ret < 0) {
3386
        WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", ret);
3387
        return WOLFSSL_FATAL_ERROR;
3388
    }
3389
3390
    if (buf != NULL && pubKeyX509 != NULL) {
3391
        if (pubKeyX509Sz > *bufSz) {
3392
            WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", BUFFER_E);
3393
            return WOLFSSL_FATAL_ERROR;
3394
        }
3395
        XMEMCPY(buf, pubKeyX509, pubKeyX509Sz);
3396
    }
3397
    *bufSz = pubKeyX509Sz;
3398
3399
    return WOLFSSL_SUCCESS;
3400
}
3401
3402
3403
/* Getter function for the public key OID value
3404
    * return public key OID stored in WOLFSSL_X509 structure */
3405
int wolfSSL_X509_get_pubkey_type(WOLFSSL_X509* x509)
3406
{
3407
    if (x509 == NULL)
3408
        return WOLFSSL_FAILURE;
3409
    return x509->pubKeyOID;
3410
}
3411
3412
#endif /* OPENSSL_EXTRA || KEEP_OUR_CERT || KEEP_PEER_CERT || SESSION_CERTS */
3413
3414
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
3415
    defined(KEEP_OUR_CERT) || defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
3416
3417
/* write X509 serial number in unsigned binary to buffer
3418
    buffer needs to be at least EXTERNAL_SERIAL_SIZE (32) for all cases
3419
    return WOLFSSL_SUCCESS on success */
3420
int wolfSSL_X509_get_serial_number(WOLFSSL_X509* x509,
3421
                                    byte* in, int* inOutSz)
3422
{
3423
    WOLFSSL_ENTER("wolfSSL_X509_get_serial_number");
3424
    if (x509 == NULL || inOutSz == NULL) {
3425
        WOLFSSL_MSG("Null argument passed in");
3426
        return BAD_FUNC_ARG;
3427
    }
3428
3429
    if (in != NULL) {
3430
        if (*inOutSz < x509->serialSz) {
3431
            WOLFSSL_MSG("Serial buffer too small");
3432
            return BUFFER_E;
3433
        }
3434
        XMEMCPY(in, x509->serial, x509->serialSz);
3435
    }
3436
    *inOutSz = x509->serialSz;
3437
3438
    return WOLFSSL_SUCCESS;
3439
}
3440
3441
/* not an openssl compatibility function - getting for derCert */
3442
const byte* wolfSSL_X509_get_der(WOLFSSL_X509* x509, int* outSz)
3443
{
3444
    WOLFSSL_ENTER("wolfSSL_X509_get_der");
3445
3446
    if (x509 == NULL || x509->derCert == NULL || outSz == NULL)
3447
        return NULL;
3448
3449
    *outSz = (int)x509->derCert->length;
3450
    return x509->derCert->buffer;
3451
}
3452
3453
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL || KEEP_OUR_CERT || KEEP_PEER_CERT || SESSION_CERTS */
3454
3455
#if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA) || \
3456
    defined(OPENSSL_ALL) || defined(KEEP_OUR_CERT) || \
3457
    defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
3458
3459
/* used by JSSE (not a standard compatibility function) */
3460
WOLFSSL_ABI
3461
const byte* wolfSSL_X509_notBefore(WOLFSSL_X509* x509)
3462
{
3463
    WOLFSSL_ENTER("wolfSSL_X509_notBefore");
3464
3465
    if (x509 == NULL)
3466
        return NULL;
3467
3468
    XMEMSET(x509->notBeforeData, 0, sizeof(x509->notBeforeData));
3469
    x509->notBeforeData[0] = (byte)x509->notBefore.type;
3470
    x509->notBeforeData[1] = (byte)x509->notBefore.length;
3471
    XMEMCPY(&x509->notBeforeData[2], x509->notBefore.data, x509->notBefore.length);
3472
3473
    return x509->notBeforeData;
3474
}
3475
3476
/* used by JSSE (not a standard compatibility function) */
3477
WOLFSSL_ABI
3478
const byte* wolfSSL_X509_notAfter(WOLFSSL_X509* x509)
3479
{
3480
    WOLFSSL_ENTER("wolfSSL_X509_notAfter");
3481
3482
    if (x509 == NULL)
3483
        return NULL;
3484
3485
    XMEMSET(x509->notAfterData, 0, sizeof(x509->notAfterData));
3486
    x509->notAfterData[0] = (byte)x509->notAfter.type;
3487
    x509->notAfterData[1] = (byte)x509->notAfter.length;
3488
    XMEMCPY(&x509->notAfterData[2], x509->notAfter.data, x509->notAfter.length);
3489
3490
    return x509->notAfterData;
3491
}
3492
3493
int wolfSSL_X509_version(WOLFSSL_X509* x509)
3494
{
3495
    WOLFSSL_ENTER("wolfSSL_X509_version");
3496
3497
    if (x509 == NULL)
3498
        return 0;
3499
3500
    return x509->version;
3501
}
3502
#endif
3503
3504
#ifdef OPENSSL_EXTRA
3505
3506
/* get the buffer to be signed (tbs) from the WOLFSSL_X509 certificate
3507
    *
3508
    * outSz : gets set to the size of the buffer
3509
    * returns a pointer to the internal buffer at the location of TBS on
3510
    *         on success and NULL on failure.
3511
    */
3512
const unsigned char* wolfSSL_X509_get_tbs(WOLFSSL_X509* x509, int* outSz)
3513
{
3514
    int sz = 0, len;
3515
    unsigned int idx = 0, tmpIdx;
3516
    const unsigned char* der = NULL;
3517
    const unsigned char* tbs = NULL;
3518
3519
    if (x509 == NULL || outSz == NULL) {
3520
        return NULL;
3521
    }
3522
3523
    der = wolfSSL_X509_get_der(x509, &sz);
3524
    if (der == NULL) {
3525
        return NULL;
3526
    }
3527
3528
    if (GetSequence(der, &idx, &len, sz) < 0) {
3529
        return NULL;
3530
    }
3531
    tbs = der + idx;
3532
    tmpIdx = idx;
3533
    if (GetSequence(der, &idx, &len, sz) < 0) {
3534
        return NULL;
3535
    }
3536
    *outSz = len + (idx - tmpIdx);
3537
    return tbs;
3538
}
3539
3540
#ifdef WOLFSSL_SEP
3541
3542
/* copy oid into in buffer, at most *inOutSz bytes, if buffer is null will
3543
   malloc buffer, call responsible for freeing. Actual size returned in
3544
   *inOutSz. Requires inOutSz be non-null */
3545
byte* wolfSSL_X509_get_device_type(WOLFSSL_X509* x509, byte* in, int *inOutSz)
3546
{
3547
    int copySz;
3548
3549
    WOLFSSL_ENTER("wolfSSL_X509_get_dev_type");
3550
    if (inOutSz == NULL) return NULL;
3551
    if (!x509->deviceTypeSz) return in;
3552
3553
    copySz = min(*inOutSz, x509->deviceTypeSz);
3554
3555
    if (!in) {
3556
    #ifdef WOLFSSL_STATIC_MEMORY
3557
        WOLFSSL_MSG("Using static memory -- please pass in a buffer");
3558
        return NULL;
3559
    #else
3560
        in = (byte*)XMALLOC(x509->deviceTypeSz, 0, DYNAMIC_TYPE_OPENSSL);
3561
        if (!in) return in;
3562
        copySz = x509->deviceTypeSz;
3563
    #endif
3564
    }
3565
3566
    XMEMCPY(in, x509->deviceType, copySz);
3567
    *inOutSz = copySz;
3568
3569
    return in;
3570
}
3571
3572
3573
byte* wolfSSL_X509_get_hw_type(WOLFSSL_X509* x509, byte* in, int* inOutSz)
3574
{
3575
    int copySz;
3576
3577
    WOLFSSL_ENTER("wolfSSL_X509_get_hw_type");
3578
    if (inOutSz == NULL) return NULL;
3579
    if (!x509->hwTypeSz) return in;
3580
3581
    copySz = min(*inOutSz, x509->hwTypeSz);
3582
3583
    if (!in) {
3584
    #ifdef WOLFSSL_STATIC_MEMORY
3585
        WOLFSSL_MSG("Using static memory -- please pass in a buffer");
3586
        return NULL;
3587
    #else
3588
        in = (byte*)XMALLOC(x509->hwTypeSz, 0, DYNAMIC_TYPE_OPENSSL);
3589
        if (!in) return in;
3590
        copySz = x509->hwTypeSz;
3591
    #endif
3592
    }
3593
3594
    XMEMCPY(in, x509->hwType, copySz);
3595
    *inOutSz = copySz;
3596
3597
    return in;
3598
}
3599
3600
3601
byte* wolfSSL_X509_get_hw_serial_number(WOLFSSL_X509* x509,byte* in,
3602
                                        int* inOutSz)
3603
{
3604
    int copySz;
3605
3606
    WOLFSSL_ENTER("wolfSSL_X509_get_hw_serial_number");
3607
    if (inOutSz == NULL) return NULL;
3608
    if (!x509->hwTypeSz) return in;
3609
3610
    copySz = min(*inOutSz, x509->hwSerialNumSz);
3611
3612
    if (!in) {
3613
    #ifdef WOLFSSL_STATIC_MEMORY
3614
        WOLFSSL_MSG("Using static memory -- please pass in a buffer");
3615
        return NULL;
3616
    #else
3617
        in = (byte*)XMALLOC(x509->hwSerialNumSz, 0, DYNAMIC_TYPE_OPENSSL);
3618
        if (!in) return in;
3619
        copySz = x509->hwSerialNumSz;
3620
    #endif
3621
    }
3622
3623
    XMEMCPY(in, x509->hwSerialNum, copySz);
3624
    *inOutSz = copySz;
3625
3626
    return in;
3627
}
3628
3629
#endif /* WOLFSSL_SEP */
3630
#endif /* OPENSSL_EXTRA */
3631
3632
/* require OPENSSL_EXTRA since wolfSSL_X509_free is wrapped by OPENSSL_EXTRA */
3633
#if defined(OPENSSL_EXTRA)
3634
3635
WOLFSSL_ASN1_TIME* wolfSSL_X509_get_notBefore(const WOLFSSL_X509* x509)
3636
{
3637
    WOLFSSL_ENTER("wolfSSL_X509_get_notBefore");
3638
3639
    if (x509 == NULL)
3640
        return NULL;
3641
3642
    return (WOLFSSL_ASN1_TIME*)&x509->notBefore;
3643
}
3644
3645
3646
WOLFSSL_ASN1_TIME* wolfSSL_X509_get_notAfter(const WOLFSSL_X509* x509)
3647
{
3648
    WOLFSSL_ENTER("wolfSSL_X509_get_notAfter");
3649
3650
    if (x509 == NULL)
3651
        return NULL;
3652
3653
    return (WOLFSSL_ASN1_TIME*)&x509->notAfter;
3654
}
3655
3656
3657
/* return 1 on success 0 on fail */
3658
int wolfSSL_sk_X509_push(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk, WOLFSSL_X509* x509)
3659
{
3660
    WOLFSSL_ENTER("wolfSSL_sk_X509_push");
3661
3662
    if (sk == NULL || x509 == NULL) {
3663
        return WOLFSSL_FAILURE;
3664
    }
3665
3666
    return wolfSSL_sk_push(sk, x509);
3667
}
3668
3669
3670
WOLFSSL_X509* wolfSSL_sk_X509_pop(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk) {
3671
    WOLFSSL_STACK* node;
3672
    WOLFSSL_X509*  x509;
3673
3674
    if (sk == NULL) {
3675
        return NULL;
3676
    }
3677
3678
    node = sk->next;
3679
    x509 = sk->data.x509;
3680
3681
    if (node != NULL) { /* update sk and remove node from stack */
3682
        sk->data.x509 = node->data.x509;
3683
        sk->next = node->next;
3684
        XFREE(node, NULL, DYNAMIC_TYPE_X509);
3685
    }
3686
    else { /* last x509 in stack */
3687
        sk->data.x509 = NULL;
3688
    }
3689
3690
    if (sk->num > 0) {
3691
        sk->num -= 1;
3692
    }
3693
3694
    return x509;
3695
}
3696
3697
/* Getter function for WOLFSSL_X509 pointer
3698
 *
3699
 * sk is the stack to retrieve pointer from
3700
 * i  is the index value in stack
3701
 *
3702
 * returns a pointer to a WOLFSSL_X509 structure on success and NULL on
3703
 *         fail
3704
 */
3705
WOLFSSL_X509* wolfSSL_sk_X509_value(STACK_OF(WOLFSSL_X509)* sk, int i)
3706
{
3707
    WOLFSSL_ENTER("wolfSSL_sk_X509_value");
3708
3709
    for (; sk != NULL && i > 0; i--)
3710
        sk = sk->next;
3711
3712
    if (i != 0 || sk == NULL)
3713
        return NULL;
3714
    return sk->data.x509;
3715
}
3716
3717
WOLFSSL_X509* wolfSSL_sk_X509_shift(WOLF_STACK_OF(WOLFSSL_X509)* sk)
3718
{
3719
    return wolfSSL_sk_X509_pop(sk);
3720
}
3721
3722
#endif /* OPENSSL_EXTRA */
3723
3724
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
3725
/* Free's all nodes in X509 stack. This is different then wolfSSL_sk_X509_free
3726
 * in that it free's the underlying objects pushed to the stack.
3727
 *
3728
 * sk  stack to free nodes in
3729
 * f   X509 free function
3730
 */
3731
void wolfSSL_sk_X509_pop_free(STACK_OF(WOLFSSL_X509)* sk,
3732
    void (*f) (WOLFSSL_X509*))
3733
{
3734
    WOLFSSL_ENTER("wolfSSL_sk_X509_pop_free");
3735
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
3736
}
3737
3738
3739
/* free just the stack structure */
3740
void wolfSSL_sk_X509_free(WOLF_STACK_OF(WOLFSSL_X509)* sk)
3741
{
3742
    wolfSSL_sk_free(sk);
3743
}
3744
3745
#ifdef HAVE_CRL
3746
WOLFSSL_STACK* wolfSSL_sk_X509_CRL_new(void)
3747
{
3748
    WOLFSSL_STACK* s = wolfSSL_sk_new_node(NULL);
3749
    if (s != NULL)
3750
        s->type = STACK_TYPE_X509_CRL;
3751
    return s;
3752
}
3753
3754
void wolfSSL_sk_X509_CRL_pop_free(WOLF_STACK_OF(WOLFSSL_X509_CRL)* sk,
3755
    void (*f) (WOLFSSL_X509_CRL*))
3756
{
3757
    WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_pop_free");
3758
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
3759
}
3760
3761
void wolfSSL_sk_X509_CRL_free(WOLF_STACK_OF(WOLFSSL_X509_CRL)* sk)
3762
{
3763
    wolfSSL_sk_X509_CRL_pop_free(sk, NULL);
3764
}
3765
3766
/* return 1 on success 0 on fail */
3767
int wolfSSL_sk_X509_CRL_push(WOLF_STACK_OF(WOLFSSL_X509_CRL)* sk, WOLFSSL_X509_CRL* crl)
3768
{
3769
    WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_push");
3770
3771
    if (sk == NULL || crl == NULL) {
3772
        return WOLFSSL_FAILURE;
3773
    }
3774
3775
    return wolfSSL_sk_push(sk, crl);
3776
}
3777
3778
WOLFSSL_X509_CRL* wolfSSL_sk_X509_CRL_value(WOLF_STACK_OF(WOLFSSL_X509)* sk,
3779
                                            int i)
3780
{
3781
    WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_value");
3782
    if (sk)
3783
        return (WOLFSSL_X509_CRL*)wolfSSL_sk_value(sk, i);
3784
    return NULL;
3785
}
3786
3787
int wolfSSL_sk_X509_CRL_num(WOLF_STACK_OF(WOLFSSL_X509)* sk)
3788
{
3789
    WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_num");
3790
    if (sk)
3791
        return wolfSSL_sk_num(sk);
3792
    return 0;
3793
}
3794
#endif /* HAVE_CRL */
3795
3796
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
3797
3798
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_QT)
3799
/* return 1 on success 0 on fail */
3800
int wolfSSL_sk_ACCESS_DESCRIPTION_push(WOLF_STACK_OF(ACCESS_DESCRIPTION)* sk,
3801
                                              WOLFSSL_ACCESS_DESCRIPTION* a)
3802
{
3803
    WOLFSSL_ENTER("wolfSSL_sk_ACCESS_DESCRIPTION_push");
3804
3805
    return wolfSSL_sk_push(sk, a);
3806
}
3807
3808
/* Frees all nodes in ACCESS_DESCRIPTION stack
3809
*
3810
* sk stack of nodes to free
3811
* f  free function to use
3812
*/
3813
void wolfSSL_sk_ACCESS_DESCRIPTION_pop_free(WOLFSSL_STACK* sk,
3814
    void (*f) (WOLFSSL_ACCESS_DESCRIPTION*))
3815
{
3816
   WOLFSSL_ENTER("wolfSSL_sk_ACCESS_DESCRIPTION_pop_free");
3817
   wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
3818
}
3819
3820
void wolfSSL_sk_ACCESS_DESCRIPTION_free(WOLFSSL_STACK* sk)
3821
{
3822
    wolfSSL_sk_free(sk);
3823
}
3824
3825
3826
/* AUTHORITY_INFO_ACCESS object is a stack of ACCESS_DESCRIPTION objects,
3827
 * to free the stack the WOLFSSL_ACCESS_DESCRIPTION stack free function is
3828
 * used */
3829
void wolfSSL_AUTHORITY_INFO_ACCESS_free(
3830
        WOLF_STACK_OF(WOLFSSL_ACCESS_DESCRIPTION)* sk)
3831
{
3832
    WOLFSSL_ENTER("wolfSSL_AUTHORITY_INFO_ACCESS_free");
3833
    wolfSSL_sk_ACCESS_DESCRIPTION_free(sk);
3834
}
3835
3836
void wolfSSL_AUTHORITY_INFO_ACCESS_pop_free(
3837
        WOLF_STACK_OF(WOLFSSL_ACCESS_DESCRIPTION)* sk,
3838
        void (*f) (WOLFSSL_ACCESS_DESCRIPTION*))
3839
{
3840
    WOLFSSL_ENTER("wolfSSL_AUTHORITY_INFO_ACCESS_free");
3841
    wolfSSL_sk_ACCESS_DESCRIPTION_pop_free(sk, f);
3842
}
3843
3844
3845
void wolfSSL_ACCESS_DESCRIPTION_free(WOLFSSL_ACCESS_DESCRIPTION* a)
3846
{
3847
    WOLFSSL_ENTER("wolfSSL_ACCESS_DESCRIPTION_free");
3848
    if (a == NULL)
3849
        return;
3850
3851
    if (a->method)
3852
        wolfSSL_ASN1_OBJECT_free(a->method);
3853
    if (a->location)
3854
        wolfSSL_GENERAL_NAME_free(a->location);
3855
    XFREE(a, NULL, DYNAMIC_TYPE_X509_EXT);
3856
3857
    /* a = NULL, don't try to a or double free it */
3858
}
3859
#endif /* OPENSSL_EXTRA || WOLFSSL_QT */
3860
3861
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
3862
3863
/* Creates and returns new GENERAL_NAME structure */
3864
WOLFSSL_GENERAL_NAME* wolfSSL_GENERAL_NAME_new(void)
3865
{
3866
    WOLFSSL_GENERAL_NAME* gn;
3867
    WOLFSSL_ENTER("GENERAL_NAME_new");
3868
3869
    gn = (WOLFSSL_GENERAL_NAME*)XMALLOC(sizeof(WOLFSSL_GENERAL_NAME), NULL,
3870
                                                             DYNAMIC_TYPE_ASN1);
3871
    if (gn == NULL) {
3872
        return NULL;
3873
    }
3874
    XMEMSET(gn, 0, sizeof(WOLFSSL_GENERAL_NAME));
3875
3876
    gn->d.ia5 = wolfSSL_ASN1_STRING_new();
3877
    if (gn->d.ia5 == NULL) {
3878
        WOLFSSL_MSG("Issue creating ASN1_STRING struct");
3879
        wolfSSL_GENERAL_NAME_free(gn);
3880
        return NULL;
3881
    }
3882
    return gn;
3883
}
3884
3885
WOLFSSL_GENERAL_NAME* wolfSSL_GENERAL_NAME_dup(WOLFSSL_GENERAL_NAME* gn)
3886
{
3887
    WOLFSSL_GENERAL_NAME* dupl = NULL;
3888
3889
    WOLFSSL_ENTER("wolfSSL_GENERAL_NAME_dup");
3890
3891
    if (!gn) {
3892
        WOLFSSL_MSG("Bad parameter");
3893
        return NULL;
3894
    }
3895
3896
    if (!(dupl = wolfSSL_GENERAL_NAME_new())) {
3897
        WOLFSSL_MSG("wolfSSL_GENERAL_NAME_new error");
3898
        return NULL;
3899
    }
3900
3901
    switch (gn->type) {
3902
    /* WOLFSSL_ASN1_STRING types */
3903
    case GEN_DNS:
3904
        if (!(dupl->d.dNSName = wolfSSL_ASN1_STRING_dup(gn->d.dNSName))) {
3905
            WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
3906
            goto error;
3907
        }
3908
        break;
3909
    case GEN_IPADD:
3910
        if (!(dupl->d.iPAddress = wolfSSL_ASN1_STRING_dup(gn->d.iPAddress))) {
3911
            WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
3912
            goto error;
3913
        }
3914
        break;
3915
    case GEN_EMAIL:
3916
        if (!(dupl->d.rfc822Name = wolfSSL_ASN1_STRING_dup(gn->d.rfc822Name))) {
3917
            WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
3918
            goto error;
3919
        }
3920
        break;
3921
    case GEN_URI:
3922
        if (!(dupl->d.uniformResourceIdentifier =
3923
                wolfSSL_ASN1_STRING_dup(gn->d.uniformResourceIdentifier))) {
3924
            WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
3925
            goto error;
3926
        }
3927
        break;
3928
    case GEN_OTHERNAME:
3929
    case GEN_X400:
3930
    case GEN_DIRNAME:
3931
    case GEN_EDIPARTY:
3932
    case GEN_RID:
3933
    default:
3934
        WOLFSSL_MSG("Unrecognized or unsupported GENERAL_NAME type");
3935
        goto error;
3936
    }
3937
    dupl->type = gn->type;
3938
3939
    return dupl;
3940
error:
3941
    if (dupl) {
3942
        wolfSSL_GENERAL_NAME_free(dupl);
3943
    }
3944
    return NULL;
3945
}
3946
3947
3948
/* return 1 on success 0 on fail */
3949
int wolfSSL_sk_GENERAL_NAME_push(WOLFSSL_GENERAL_NAMES* sk,
3950
                                 WOLFSSL_GENERAL_NAME* gn)
3951
{
3952
    WOLFSSL_STACK* node;
3953
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_push");
3954
3955
    if (sk == NULL || gn == NULL) {
3956
        return WOLFSSL_FAILURE;
3957
    }
3958
3959
    /* no previous values in stack */
3960
    if (sk->data.gn == NULL) {
3961
        sk->data.gn = gn;
3962
        sk->num += 1;
3963
3964
        return WOLFSSL_SUCCESS;
3965
    }
3966
3967
    /* stack already has value(s) create a new node and add more */
3968
    node = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK), NULL,
3969
                                                             DYNAMIC_TYPE_ASN1);
3970
    if (node == NULL) {
3971
        WOLFSSL_MSG("Memory error");
3972
        return WOLFSSL_FAILURE;
3973
    }
3974
    XMEMSET(node, 0, sizeof(WOLFSSL_STACK));
3975
3976
    /* push new obj onto head of stack */
3977
    node->type    = STACK_TYPE_GEN_NAME;
3978
    node->data.gn = sk->data.gn;
3979
    node->next    = sk->next;
3980
    sk->next      = node;
3981
    sk->data.gn   = gn;
3982
    sk->num      += 1;
3983
3984
    return WOLFSSL_SUCCESS;
3985
}
3986
3987
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
3988
3989
#ifdef OPENSSL_EXTRA
3990
3991
/* Returns the general name at index i from the stack
3992
 *
3993
 * sk  stack to get general name from
3994
 * idx index to get
3995
 *
3996
 * return a pointer to the internal node of the stack
3997
 */
3998
WOLFSSL_GENERAL_NAME* wolfSSL_sk_GENERAL_NAME_value(WOLFSSL_STACK* sk, int idx)
3999
{
4000
    WOLFSSL_STACK* ret;
4001
4002
    if (sk == NULL) {
4003
        return NULL;
4004
    }
4005
4006
    ret = wolfSSL_sk_get_node(sk, idx);
4007
    if (ret != NULL) {
4008
        return ret->data.gn;
4009
    }
4010
    return NULL;
4011
}
4012
4013
/* Gets the number of nodes in the stack
4014
 *
4015
 * sk  stack to get the number of nodes from
4016
 *
4017
 * returns the number of nodes, -1 if no nodes
4018
 */
4019
int wolfSSL_sk_GENERAL_NAME_num(WOLFSSL_STACK* sk)
4020
{
4021
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_num");
4022
4023
    if (sk == NULL) {
4024
        return -1;
4025
    }
4026
4027
    return (int)sk->num;
4028
}
4029
4030
#endif /* OPENSSL_EXTRA */
4031
4032
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
4033
4034
/* Frees all nodes in a GENERAL NAME stack
4035
 *
4036
 * sk stack of nodes to free
4037
 * f  free function to use, not called with wolfSSL
4038
 */
4039
void wolfSSL_sk_GENERAL_NAME_pop_free(WOLFSSL_STACK* sk,
4040
        void (*f) (WOLFSSL_GENERAL_NAME*))
4041
{
4042
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_pop_free");
4043
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
4044
}
4045
4046
void wolfSSL_sk_GENERAL_NAME_free(WOLFSSL_STACK* sk)
4047
{
4048
    WOLFSSL_ENTER("sk_GENERAL_NAME_free");
4049
    wolfSSL_sk_X509_pop_free(sk, NULL);
4050
}
4051
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
4052
4053
#ifdef OPENSSL_EXTRA
4054
static void wolfSSL_DIST_POINT_NAME_free(WOLFSSL_DIST_POINT_NAME* dpn)
4055
{
4056
    if (dpn != NULL) {
4057
        if (dpn->name.fullname != NULL) {
4058
            wolfSSL_sk_X509_pop_free(dpn->name.fullname, NULL);
4059
        }
4060
        XFREE(dpn, NULL, DYNAMIC_TYPE_OPENSSL);
4061
    }
4062
}
4063
4064
4065
/* returns new pointer on success and NULL on fail */
4066
static WOLFSSL_DIST_POINT_NAME* wolfSSL_DIST_POINT_NAME_new(void)
4067
{
4068
    WOLFSSL_DIST_POINT_NAME* dpn = NULL;
4069
    WOLFSSL_GENERAL_NAMES* gns = NULL;
4070
4071
    dpn = (WOLFSSL_DIST_POINT_NAME*)XMALLOC(sizeof(WOLFSSL_DIST_POINT_NAME),
4072
                                            NULL, DYNAMIC_TYPE_OPENSSL);
4073
    if (dpn == NULL) {
4074
        return NULL;
4075
    }
4076
    XMEMSET(dpn, 0, sizeof(WOLFSSL_DIST_POINT_NAME));
4077
4078
    gns = wolfSSL_sk_new_null();
4079
    if (gns == NULL) {
4080
        WOLFSSL_MSG("wolfSSL_sk_new_null error");
4081
        XFREE(dpn, NULL, DYNAMIC_TYPE_OPENSSL);
4082
        return NULL;
4083
    }
4084
    gns->type = STACK_TYPE_GEN_NAME;
4085
4086
    dpn->name.fullname = gns;
4087
    dpn->type = CRL_DIST_OID;
4088
4089
    return dpn;
4090
}
4091
4092
4093
/* Creates and returns new DIST_POINT structure */
4094
WOLFSSL_DIST_POINT* wolfSSL_DIST_POINT_new(void)
4095
{
4096
    WOLFSSL_DIST_POINT* dp = NULL;
4097
    WOLFSSL_DIST_POINT_NAME* dpn = NULL;
4098
4099
    WOLFSSL_ENTER("DIST_POINT_new");
4100
4101
    dp = (WOLFSSL_DIST_POINT*)XMALLOC(sizeof(WOLFSSL_DIST_POINT), NULL,
4102
                                      DYNAMIC_TYPE_OPENSSL);
4103
    if (dp == NULL) {
4104
        return NULL;
4105
    }
4106
    XMEMSET(dp, 0, sizeof(WOLFSSL_DIST_POINT));
4107
4108
    dpn = wolfSSL_DIST_POINT_NAME_new();
4109
    if (dpn == NULL) {
4110
        XFREE(dp, NULL, DYNAMIC_TYPE_OPENSSL);
4111
        return NULL;
4112
    }
4113
    dp->distpoint = dpn;
4114
4115
    return dp;
4116
}
4117
4118
4119
/* Frees DIST_POINT objects.
4120
*/
4121
void wolfSSL_DIST_POINT_free(WOLFSSL_DIST_POINT* dp)
4122
{
4123
    WOLFSSL_ENTER("wolfSSL_DIST_POINT_free");
4124
    if (dp != NULL) {
4125
        wolfSSL_DIST_POINT_NAME_free(dp->distpoint);
4126
        XFREE(dp, NULL, DYNAMIC_TYPE_OPENSSL);
4127
    }
4128
}
4129
4130
void wolfSSL_DIST_POINTS_free(WOLFSSL_DIST_POINTS *dps)
4131
{
4132
    WOLFSSL_ENTER("wolfSSL_DIST_POINTS_free");
4133
4134
    if (dps == NULL) {
4135
        return;
4136
    }
4137
4138
    wolfSSL_sk_free(dps);
4139
}
4140
4141
/* return 1 on success 0 on fail */
4142
int wolfSSL_sk_DIST_POINT_push(WOLFSSL_DIST_POINTS* sk, WOLFSSL_DIST_POINT* dp)
4143
{
4144
    WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_push");
4145
4146
    if (sk == NULL || dp == NULL) {
4147
        return WOLFSSL_FAILURE;
4148
    }
4149
4150
    return wolfSSL_sk_push(sk, dp);
4151
}
4152
4153
/* Returns the CRL dist point at index i from the stack
4154
 *
4155
 * sk  stack to get general name from
4156
 * idx index to get
4157
 *
4158
 * return a pointer to the internal node of the stack
4159
 */
4160
WOLFSSL_DIST_POINT* wolfSSL_sk_DIST_POINT_value(WOLFSSL_STACK* sk, int idx)
4161
{
4162
    if (sk == NULL) {
4163
        return NULL;
4164
    }
4165
4166
    return (WOLFSSL_DIST_POINT*)wolfSSL_sk_value(sk, idx);
4167
}
4168
4169
/* Gets the number of nodes in the stack
4170
 *
4171
 * sk  stack to get the number of nodes from
4172
 *
4173
 * returns the number of nodes, -1 if no nodes
4174
 */
4175
int wolfSSL_sk_DIST_POINT_num(WOLFSSL_STACK* sk)
4176
{
4177
    WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_num");
4178
4179
    if (sk == NULL) {
4180
        return -1;
4181
    }
4182
4183
    return wolfSSL_sk_num(sk);
4184
}
4185
4186
/* Frees all nodes in a DIST_POINT stack
4187
 *
4188
 * sk stack of nodes to free
4189
 * f  free function to use
4190
 */
4191
void wolfSSL_sk_DIST_POINT_pop_free(WOLFSSL_STACK* sk,
4192
        void (*f) (WOLFSSL_DIST_POINT*))
4193
{
4194
    WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_pop_free");
4195
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
4196
}
4197
4198
void wolfSSL_sk_DIST_POINT_free(WOLFSSL_STACK* sk)
4199
{
4200
    WOLFSSL_ENTER("sk_DIST_POINT_free");
4201
    wolfSSL_sk_free(sk);
4202
}
4203
4204
/* returns the number of nodes in stack on success and WOLFSSL_FATAL_ERROR
4205
 * on fail */
4206
int wolfSSL_sk_ACCESS_DESCRIPTION_num(WOLFSSL_STACK* sk)
4207
{
4208
    if (sk == NULL) {
4209
        return WOLFSSL_FATAL_ERROR;
4210
    }
4211
4212
    return (int)sk->num;
4213
}
4214
4215
/* returns NULL on fail and pointer to internal data on success */
4216
WOLFSSL_ACCESS_DESCRIPTION* wolfSSL_sk_ACCESS_DESCRIPTION_value(
4217
        WOLFSSL_STACK* sk, int idx)
4218
{
4219
    WOLFSSL_STACK* ret;
4220
4221
    if (sk == NULL) {
4222
        return NULL;
4223
    }
4224
4225
    ret = wolfSSL_sk_get_node(sk, idx);
4226
    if (ret != NULL) {
4227
        return ret->data.access;
4228
    }
4229
    return NULL;
4230
}
4231
#endif /* OPENSSL_EXTRA */
4232
4233
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
4234
/* free's the internal type for the general name */
4235
static void wolfSSL_GENERAL_NAME_type_free(WOLFSSL_GENERAL_NAME* name)
4236
{
4237
    if (name != NULL) {
4238
        if (name->d.dNSName != NULL) {
4239
            wolfSSL_ASN1_STRING_free(name->d.dNSName);
4240
            name->d.dNSName = NULL;
4241
        }
4242
        if (name->d.dirn != NULL) {
4243
            wolfSSL_X509_NAME_free(name->d.dirn);
4244
            name->d.dirn = NULL;
4245
        }
4246
        if (name->d.uniformResourceIdentifier != NULL) {
4247
            wolfSSL_ASN1_STRING_free(name->d.uniformResourceIdentifier);
4248
            name->d.uniformResourceIdentifier = NULL;
4249
        }
4250
        if (name->d.iPAddress != NULL) {
4251
            wolfSSL_ASN1_STRING_free(name->d.iPAddress);
4252
            name->d.iPAddress = NULL;
4253
        }
4254
        if (name->d.registeredID != NULL) {
4255
            wolfSSL_ASN1_OBJECT_free(name->d.registeredID);
4256
            name->d.registeredID = NULL;
4257
        }
4258
        if (name->d.ia5 != NULL) {
4259
            wolfSSL_ASN1_STRING_free(name->d.ia5);
4260
            name->d.ia5 = NULL;
4261
        }
4262
    }
4263
}
4264
4265
4266
/* sets the general name type and free's the existing one
4267
 * can fail with a memory error if malloc fails or bad arg error
4268
 * otherwise return WOLFSSL_SUCCESS */
4269
int wolfSSL_GENERAL_NAME_set_type(WOLFSSL_GENERAL_NAME* name, int typ)
4270
{
4271
    int ret = WOLFSSL_SUCCESS;
4272
4273
    if (name != NULL) {
4274
        wolfSSL_GENERAL_NAME_type_free(name);
4275
        name->type = typ;
4276
4277
        switch (typ) {
4278
            case GEN_URI:
4279
                name->d.uniformResourceIdentifier = wolfSSL_ASN1_STRING_new();
4280
                if (name->d.uniformResourceIdentifier == NULL)
4281
                    ret = MEMORY_E;
4282
                break;
4283
            default:
4284
                name->d.ia5 = wolfSSL_ASN1_STRING_new();
4285
                if (name->d.ia5 == NULL)
4286
                    ret = MEMORY_E;
4287
        }
4288
    }
4289
    else {
4290
        ret = BAD_FUNC_ARG;
4291
    }
4292
4293
    return ret;
4294
}
4295
4296
4297
/* Frees GENERAL_NAME objects.
4298
*/
4299
void wolfSSL_GENERAL_NAME_free(WOLFSSL_GENERAL_NAME* name)
4300
{
4301
    WOLFSSL_ENTER("wolfSSL_GENERAL_NAME_Free");
4302
    if (name != NULL) {
4303
        wolfSSL_GENERAL_NAME_type_free(name);
4304
        XFREE(name, NULL, DYNAMIC_TYPE_OPENSSL);
4305
    }
4306
}
4307
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL*/
4308
4309
#ifdef OPENSSL_EXTRA
4310
void wolfSSL_GENERAL_NAMES_free(WOLFSSL_GENERAL_NAMES *gens)
4311
{
4312
    WOLFSSL_ENTER("wolfSSL_GENERAL_NAMES_free");
4313
4314
    if (gens == NULL) {
4315
        return;
4316
    }
4317
4318
    wolfSSL_sk_free(gens);
4319
}
4320
4321
#if defined(OPENSSL_ALL) && !defined(NO_BIO)
4322
/* Outputs name string of the given WOLFSSL_GENERAL_NAME_OBJECT to WOLFSSL_BIO.
4323
 * Can handle following GENERAL_NAME_OBJECT types:
4324
 *  - GEN_OTHERNAME #
4325
 *  - GEN_EMAIL
4326
 *  - GEN_DNS
4327
 *  - GEN_X400  #
4328
 *  - GEN_DIRNAME
4329
 *  - GEN_EDIPARTY #
4330
 *  - GEN_URI
4331
 *  - GEN_RID
4332
 * The each name string to be output has "typename:namestring" format.
4333
 * For instance, email name string will be output as "email:info@wolfssl.com".
4334
 * However,some types above marked with "#" will be output with
4335
 * "typename:<unsupported>".
4336
 *
4337
 * Parameters:
4338
 *  - out: WOLFSSL_BIO object which is the output destination
4339
 *  - gen: WOLFSSL_GENERAL_NAME object to be output its name
4340
 *
4341
 * Returns WOLFSSL_SUCCESS on success, WOLFSSL_FAILURE on failure.
4342
 */
4343
int wolfSSL_GENERAL_NAME_print(WOLFSSL_BIO* out, WOLFSSL_GENERAL_NAME* gen)
4344
{
4345
    int ret, i;
4346
    unsigned int wd;
4347
    unsigned char* p;
4348
    (void)wd;
4349
    (void)p;
4350
    (void)i;
4351
    WOLFSSL_ENTER("wolfSSL_GENERAL_NAME_print");
4352
4353
    if (out == NULL || gen == NULL)
4354
        return WOLFSSL_FAILURE;
4355
4356
    ret = WOLFSSL_FAILURE;
4357
    switch (gen->type)
4358
    {
4359
    case GEN_OTHERNAME:
4360
        ret = wolfSSL_BIO_printf(out, "othername:<unsupported>");
4361
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
4362
        break;
4363
4364
    case GEN_EMAIL:
4365
        ret = wolfSSL_BIO_printf(out, "email:");
4366
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
4367
        if (ret == WOLFSSL_SUCCESS)
4368
        {
4369
            ret = wolfSSL_ASN1_STRING_print(out, gen->d.rfc822Name);
4370
        }
4371
        break;
4372
4373
    case GEN_DNS:
4374
        ret = wolfSSL_BIO_printf(out, "DNS:");
4375
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
4376
        if (ret == WOLFSSL_SUCCESS) {
4377
            ret = wolfSSL_BIO_printf(out, "%s", gen->d.dNSName->strData);
4378
            ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
4379
        }
4380
        break;
4381
4382
    case GEN_X400:
4383
        ret = wolfSSL_BIO_printf(out, "X400Name:<unsupported>");
4384
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
4385
        break;
4386
4387
    case GEN_DIRNAME:
4388
        ret = wolfSSL_BIO_printf(out, "DirName:");
4389
        if (ret == WOLFSSL_SUCCESS) {
4390
            ret = wolfSSL_X509_NAME_print_ex(out, gen->d.directoryName, 0,
4391
                                                         XN_FLAG_ONELINE);
4392
        }
4393
        break;
4394
4395
    case GEN_EDIPARTY:
4396
        ret = wolfSSL_BIO_printf(out, "EdiPartyName:<unsupported>");
4397
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
4398
        break;
4399
4400
    case GEN_URI:
4401
        ret = wolfSSL_BIO_printf(out, "URI:");
4402
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
4403
        if (ret == WOLFSSL_SUCCESS) {
4404
            ret = wolfSSL_ASN1_STRING_print(out,
4405
                                    gen->d.uniformResourceIdentifier);
4406
        }
4407
        break;
4408
4409
    case GEN_IPADD:
4410
        ret = wolfSSL_BIO_printf(out, "IP Address");
4411
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
4412
        if (ret == WOLFSSL_SUCCESS) {
4413
4414
            if (!gen->d.iPAddress->length) {
4415
                ret = WOLFSSL_FAILURE;
4416
                break;
4417
            }
4418
            p = (unsigned char*)gen->d.iPAddress->strData;
4419
4420
            if (gen->d.iPAddress->length == 4) {
4421
                ret = wolfSSL_BIO_printf(out, ":%d.%d.%d.%d",
4422
                                  p[0],p[1],p[2],p[3]);
4423
            }
4424
            else if (gen->d.iPAddress->length == 16) {
4425
4426
                for (i = 0; i < 16 && ret == WOLFSSL_SUCCESS;) {
4427
                    wd = p[i] << 8 | p[i+1];
4428
4429
                    i += 2;
4430
                    ret = wolfSSL_BIO_printf(out, ":%X", wd);
4431
                    ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
4432
                }
4433
            }
4434
            else {
4435
                ret = wolfSSL_BIO_printf(out, "<unsupported>");
4436
            }
4437
            ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
4438
        }
4439
        break;
4440
4441
    case GEN_RID:
4442
        ret = wolfSSL_BIO_printf(out, "Registered ID:");
4443
        if (ret == WOLFSSL_SUCCESS) {
4444
            ret = wolfSSL_i2a_ASN1_OBJECT(out, gen->d.registeredID);
4445
        }
4446
        break;
4447
4448
    default:
4449
        /* unsupported type */
4450
        break;
4451
    }
4452
4453
    if (ret == WOLFSSL_FAILURE)
4454
        return WOLFSSL_FAILURE;
4455
    else
4456
        return WOLFSSL_SUCCESS;
4457
}
4458
#endif /* OPENSSL_ALL */
4459
4460
WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* wolfSSL_sk_X509_EXTENSION_new_null(void)
4461
{
4462
    WOLFSSL_STACK* sk = wolfSSL_sk_new_node(NULL);
4463
    if (sk) {
4464
        sk->type = STACK_TYPE_X509_EXT;
4465
    }
4466
4467
    return (WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)*)sk;;
4468
}
4469
4470
/* returns the number of nodes on the stack */
4471
int wolfSSL_sk_X509_EXTENSION_num(WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk)
4472
{
4473
    if (sk != NULL) {
4474
        return (int)sk->num;
4475
    }
4476
    return WOLFSSL_FATAL_ERROR;
4477
}
4478
4479
4480
/* returns null on failure and pointer to internal value on success */
4481
WOLFSSL_X509_EXTENSION* wolfSSL_sk_X509_EXTENSION_value(
4482
        WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk, int idx)
4483
{
4484
    WOLFSSL_STACK* ret;
4485
4486
    if (sk == NULL) {
4487
        return NULL;
4488
    }
4489
4490
    ret = wolfSSL_sk_get_node(sk, idx);
4491
    if (ret != NULL) {
4492
        return ret->data.ext;
4493
    }
4494
    return NULL;
4495
}
4496
4497
/* frees all of the nodes and the values in stack */
4498
void wolfSSL_sk_X509_EXTENSION_pop_free(
4499
        WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk,
4500
        void (*f) (WOLFSSL_X509_EXTENSION*))
4501
{
4502
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
4503
}
4504
4505
#endif /* OPENSSL_EXTRA */
4506
4507
#if defined(OPENSSL_EXTRA) && !defined(NO_FILESYSTEM) && !defined(NO_STDIO_FILESYSTEM)
4508
4509
WOLFSSL_X509* wolfSSL_X509_d2i_fp(WOLFSSL_X509** x509, XFILE file)
4510
{
4511
    WOLFSSL_X509* newX509 = NULL;
4512
4513
    WOLFSSL_ENTER("wolfSSL_X509_d2i_fp");
4514
4515
    if (file != XBADFILE) {
4516
        byte* fileBuffer = NULL;
4517
        long sz = 0;
4518
4519
        if (XFSEEK(file, 0, XSEEK_END) != 0)
4520
            return NULL;
4521
        sz = XFTELL(file);
4522
        XREWIND(file);
4523
4524
        if (sz > MAX_WOLFSSL_FILE_SIZE || sz < 0) {
4525
            WOLFSSL_MSG("X509_d2i file size error");
4526
            return NULL;
4527
        }
4528
4529
        fileBuffer = (byte*)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE);
4530
        if (fileBuffer != NULL) {
4531
            int ret = (int)XFREAD(fileBuffer, 1, sz, file);
4532
            if (ret == sz) {
4533
                newX509 = wolfSSL_X509_d2i(NULL, fileBuffer, (int)sz);
4534
            }
4535
            XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
4536
        }
4537
    }
4538
4539
    if (x509 != NULL)
4540
        *x509 = newX509;
4541
4542
    return newX509;
4543
}
4544
4545
#endif /* OPENSSL_EXTRA && !NO_FILESYSTEM && !NO_STDIO_FILESYSTEM */
4546
4547
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
4548
    defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
4549
4550
#ifndef NO_FILESYSTEM
4551
WOLFSSL_ABI
4552
WOLFSSL_X509* wolfSSL_X509_load_certificate_file(const char* fname, int format)
4553
{
4554
#ifdef WOLFSSL_SMALL_STACK
4555
    byte  staticBuffer[1]; /* force heap usage */
4556
#else
4557
    byte  staticBuffer[FILE_BUFFER_SIZE];
4558
#endif
4559
    byte* fileBuffer = staticBuffer;
4560
    int   dynamic = 0;
4561
    int   ret;
4562
    long  sz = 0;
4563
    XFILE file;
4564
4565
    WOLFSSL_X509* x509 = NULL;
4566
4567
    /* Check the inputs */
4568
    if ((fname == NULL) ||
4569
        (format != WOLFSSL_FILETYPE_ASN1 && format != WOLFSSL_FILETYPE_PEM))
4570
        return NULL;
4571
4572
    file = XFOPEN(fname, "rb");
4573
    if (file == XBADFILE)
4574
        return NULL;
4575
4576
    if (XFSEEK(file, 0, XSEEK_END) != 0){
4577
        XFCLOSE(file);
4578
        return NULL;
4579
    }
4580
    sz = XFTELL(file);
4581
    XREWIND(file);
4582
4583
    if (sz > MAX_WOLFSSL_FILE_SIZE || sz < 0) {
4584
        WOLFSSL_MSG("X509_load_certificate_file size error");
4585
        XFCLOSE(file);
4586
        return NULL;
4587
    }
4588
4589
    if (sz > (long)sizeof(staticBuffer)) {
4590
        fileBuffer = (byte*)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE);
4591
        if (fileBuffer == NULL) {
4592
            XFCLOSE(file);
4593
            return NULL;
4594
        }
4595
        dynamic = 1;
4596
    }
4597
4598
    ret = (int)XFREAD(fileBuffer, 1, sz, file);
4599
    if (ret != sz) {
4600
        XFCLOSE(file);
4601
        if (dynamic)
4602
            XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
4603
        return NULL;
4604
    }
4605
4606
    XFCLOSE(file);
4607
4608
    x509 = wolfSSL_X509_load_certificate_buffer(fileBuffer, (int)sz, format);
4609
4610
    if (dynamic)
4611
        XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
4612
4613
    return x509;
4614
}
4615
#endif /* !NO_FILESYSTEM */
4616
4617
static WOLFSSL_X509* loadX509orX509REQFromBuffer(
4618
    const unsigned char* buf, int sz, int format, int type)
4619
{
4620
4621
    int ret;
4622
    WOLFSSL_X509* x509 = NULL;
4623
    DerBuffer* der = NULL;
4624
4625
    WOLFSSL_ENTER("wolfSSL_X509_load_certificate_ex");
4626
4627
    if (format == WOLFSSL_FILETYPE_PEM) {
4628
    #ifdef WOLFSSL_PEM_TO_DER
4629
        if (PemToDer(buf, sz, type, &der, NULL, NULL, NULL) != 0) {
4630
            FreeDer(&der);
4631
        }
4632
    #else
4633
        ret = NOT_COMPILED_IN;
4634
    #endif
4635
    }
4636
    else {
4637
        ret = AllocDer(&der, (word32)sz, type, NULL);
4638
        if (ret == 0) {
4639
            XMEMCPY(der->buffer, buf, sz);
4640
        }
4641
    }
4642
4643
    /* At this point we want `der` to have the certificate in DER format */
4644
    /* ready to be decoded. */
4645
    if (der != NULL && der->buffer != NULL) {
4646
    #ifdef WOLFSSL_SMALL_STACK
4647
        DecodedCert* cert;
4648
    #else
4649
        DecodedCert  cert[1];
4650
    #endif
4651
4652
    #ifdef WOLFSSL_SMALL_STACK
4653
        cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL,
4654
                                     DYNAMIC_TYPE_DCERT);
4655
        if (cert != NULL)
4656
    #endif
4657
        {
4658
            InitDecodedCert(cert, der->buffer, der->length, NULL);
4659
            if (ParseCertRelative(cert, type, 0, NULL) == 0) {
4660
                x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), NULL,
4661
                                                             DYNAMIC_TYPE_X509);
4662
                if (x509 != NULL) {
4663
                    InitX509(x509, 1, NULL);
4664
                    if (CopyDecodedToX509(x509, cert) != 0) {
4665
                        wolfSSL_X509_free(x509);
4666
                        x509 = NULL;
4667
                    }
4668
                }
4669
            }
4670
4671
            FreeDecodedCert(cert);
4672
        #ifdef WOLFSSL_SMALL_STACK
4673
            XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
4674
        #endif
4675
        }
4676
4677
        FreeDer(&der);
4678
    }
4679
4680
    return x509;
4681
}
4682
4683
WOLFSSL_X509* wolfSSL_X509_load_certificate_buffer(
4684
    const unsigned char* buf, int sz, int format)
4685
{
4686
    return loadX509orX509REQFromBuffer(buf, sz,
4687
            format, CERT_TYPE);
4688
}
4689
4690
#ifdef WOLFSSL_CERT_REQ
4691
WOLFSSL_X509* wolfSSL_X509_REQ_load_certificate_buffer(
4692
    const unsigned char* buf, int sz, int format)
4693
{
4694
    return loadX509orX509REQFromBuffer(buf, sz,
4695
            format, CERTREQ_TYPE);
4696
}
4697
#endif
4698
4699
#endif /* KEEP_PEER_CERT || SESSION_CERTS */
4700
4701
#if defined(OPENSSL_EXTRA_X509_SMALL) || defined(KEEP_PEER_CERT) || \
4702
    defined(SESSION_CERTS)
4703
/* Smaller subset of X509 compatibility functions. Avoid increasing the size of
4704
 * this subset and its memory usage */
4705
4706
/* returns a pointer to a new WOLFSSL_X509 structure on success and NULL on
4707
 * fail
4708
 */
4709
WOLFSSL_X509* wolfSSL_X509_new(void)
4710
{
4711
    WOLFSSL_X509* x509;
4712
4713
    x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), NULL,
4714
            DYNAMIC_TYPE_X509);
4715
    if (x509 != NULL) {
4716
        InitX509(x509, 1, NULL);
4717
    }
4718
4719
    return x509;
4720
}
4721
4722
WOLFSSL_ABI
4723
WOLFSSL_X509_NAME* wolfSSL_X509_get_subject_name(WOLFSSL_X509* cert)
4724
{
4725
    WOLFSSL_ENTER("wolfSSL_X509_get_subject_name");
4726
    if (cert)
4727
        return &cert->subject;
4728
    return NULL;
4729
}
4730
4731
#if defined(OPENSSL_EXTRA) && (!defined(NO_SHA) || !defined(NO_SHA256))
4732
/******************************************************************************
4733
* wolfSSL_X509_subject_name_hash - compute the hash digest of the raw subject name
4734
* This function prefers SHA-1 (if available) for compatibility
4735
*
4736
* RETURNS:
4737
* The beginning of the hash digest. Otherwise, returns zero.
4738
* Note:
4739
* Returns a different hash value from OpenSSL's X509_subject_name_hash() API
4740
* depending on the subject name.
4741
*/
4742
unsigned long wolfSSL_X509_subject_name_hash(const WOLFSSL_X509* x509)
4743
{
4744
    unsigned long ret = 0;
4745
    int retHash = NOT_COMPILED_IN;
4746
    WOLFSSL_X509_NAME *subjectName = NULL;
4747
    byte digest[WC_MAX_DIGEST_SIZE];
4748
4749
    if (x509 == NULL) {
4750
        return ret;
4751
    }
4752
4753
    subjectName = wolfSSL_X509_get_subject_name((WOLFSSL_X509*)x509);
4754
    if (subjectName != NULL) {
4755
    #ifndef NO_SHA
4756
        retHash = wc_ShaHash((const byte*)subjectName->name,
4757
                             (word32)subjectName->sz, digest);
4758
    #elif !defined(NO_SHA256)
4759
        retHash = wc_Sha256Hash((const byte*)subjectName->name,
4760
                                (word32)subjectName->sz, digest);
4761
    #endif
4762
        if (retHash == 0) {
4763
            ret = (unsigned long)MakeWordFromHash(digest);
4764
        }
4765
    }
4766
4767
    return ret;
4768
}
4769
4770
unsigned long wolfSSL_X509_issuer_name_hash(const WOLFSSL_X509* x509)
4771
{
4772
    unsigned long ret = 0;
4773
    int retHash = NOT_COMPILED_IN;
4774
    WOLFSSL_X509_NAME *issuerName = NULL;
4775
    byte digest[WC_MAX_DIGEST_SIZE];
4776
4777
    if (x509 == NULL) {
4778
        return ret;
4779
    }
4780
4781
    issuerName = wolfSSL_X509_get_issuer_name((WOLFSSL_X509*)x509);
4782
    if (issuerName != NULL) {
4783
    #ifndef NO_SHA
4784
        retHash = wc_ShaHash((const byte*)issuerName->name,
4785
                             (word32)issuerName->sz, digest);
4786
    #elif !defined(NO_SHA256)
4787
        retHash = wc_Sha256Hash((const byte*)issuerName->name,
4788
                                (word32)issuerName->sz, digest);
4789
    #endif
4790
        if (retHash == 0) {
4791
            ret = (unsigned long)MakeWordFromHash(digest);
4792
        }
4793
    }
4794
    return ret;
4795
}
4796
#endif /* OPENSSL_EXTRA && (!NO_SHA || !NO_SHA256) */
4797
4798
WOLFSSL_ABI
4799
WOLFSSL_X509_NAME* wolfSSL_X509_get_issuer_name(WOLFSSL_X509* cert)
4800
{
4801
    WOLFSSL_ENTER("X509_get_issuer_name");
4802
    if (cert)
4803
        return &cert->issuer;
4804
    return NULL;
4805
}
4806
4807
4808
int wolfSSL_X509_get_signature_type(WOLFSSL_X509* x509)
4809
{
4810
    int type = 0;
4811
4812
    WOLFSSL_ENTER("wolfSSL_X509_get_signature_type");
4813
4814
    if (x509 != NULL)
4815
        type = x509->sigOID;
4816
4817
    return type;
4818
}
4819
4820
#if defined(OPENSSL_EXTRA_X509_SMALL)
4821
4822
int wolfSSL_X509_NAME_get_sz(WOLFSSL_X509_NAME* name)
4823
{
4824
    WOLFSSL_ENTER("wolfSSL_X509_NAME_get_sz");
4825
    if (!name)
4826
        return -1;
4827
    return name->sz;
4828
}
4829
4830
/* Searches for the first ENTRY of type NID
4831
 * idx is the location to start searching from, the value at when the entry was
4832
 *     found is stored into idx
4833
 * returns a pointer to the entry on success and null on fail */
4834
static WOLFSSL_X509_NAME_ENTRY* GetEntryByNID(WOLFSSL_X509_NAME* name, int nid,
4835
        int* idx)
4836
{
4837
    int i;
4838
    WOLFSSL_X509_NAME_ENTRY* ret = NULL;
4839
4840
    /* and index of less than 0 is assumed to be starting from 0 */
4841
    if (*idx < 0) {
4842
        *idx = 0;
4843
    }
4844
4845
    for (i = *idx; i < MAX_NAME_ENTRIES; i++) {
4846
        if (name->entry[i].nid == nid) {
4847
            ret = &name->entry[i];
4848
            *idx = i;
4849
            break;
4850
        }
4851
    }
4852
    return ret;
4853
}
4854
4855
4856
/* Used to get a string from the WOLFSSL_X509_NAME structure that
4857
 * corresponds with the NID value passed in. This finds the first entry with
4858
 * matching NID value, if searching for the case where there is multiple
4859
 * entries with the same NID value than other functions should be used
4860
 * (i.e. wolfSSL_X509_NAME_get_index_by_NID, wolfSSL_X509_NAME_get_entry)
4861
 *
4862
 * name structure to get string from
4863
 * nid  NID value to search for
4864
 * buf  [out] buffer to hold results. If NULL then the buffer size minus the
4865
 *      null char is returned.
4866
 * len  size of "buf" passed in
4867
 *
4868
 * returns the length of string found, not including the NULL terminator.
4869
 *         It's possible the function could return a negative value in the
4870
 *         case that len is less than or equal to 0. A negative value is
4871
 *         considered an error case.
4872
 */
4873
int wolfSSL_X509_NAME_get_text_by_NID(WOLFSSL_X509_NAME* name,
4874
                                      int nid, char* buf, int len)
4875
{
4876
    WOLFSSL_X509_NAME_ENTRY* e;
4877
    unsigned char *text = NULL;
4878
    int textSz = 0;
4879
    int idx    = 0;
4880
4881
    WOLFSSL_ENTER("wolfSSL_X509_NAME_get_text_by_NID");
4882
4883
    if (name == NULL) {
4884
        WOLFSSL_MSG("NULL argument passed in");
4885
        return WOLFSSL_FATAL_ERROR;
4886
    }
4887
4888
    e = GetEntryByNID(name, nid, &idx);
4889
    if (e == NULL) {
4890
        WOLFSSL_MSG("Entry type not found");
4891
        return WOLFSSL_FATAL_ERROR;
4892
    }
4893
    text   = wolfSSL_ASN1_STRING_data(e->value);
4894
    textSz = wolfSSL_ASN1_STRING_length(e->value);
4895
4896
    if (text == NULL) {
4897
        WOLFSSL_MSG("Unable to get entry text");
4898
        return WOLFSSL_FATAL_ERROR;
4899
    }
4900
4901
    /* if buf is NULL return size of buffer needed (minus null char) */
4902
    if (buf == NULL) {
4903
        WOLFSSL_MSG("Buffer is NULL, returning buffer size only");
4904
        return textSz;
4905
    }
4906
4907
    /* buf is not NULL from above */
4908
    if (text != NULL) {
4909
        textSz = min(textSz + 1, len); /* + 1 to account for null char */
4910
        if (textSz > 0) {
4911
            XMEMCPY(buf, text, textSz - 1);
4912
            buf[textSz - 1] = '\0';
4913
        }
4914
    }
4915
4916
    WOLFSSL_LEAVE("wolfSSL_X509_NAME_get_text_by_NID", textSz);
4917
    return (textSz - 1); /* do not include null character in size */
4918
}
4919
4920
/* Creates a new WOLFSSL_EVP_PKEY structure that has the public key from x509
4921
 *
4922
 * returns a pointer to the created WOLFSSL_EVP_PKEY on success and NULL on fail
4923
 */
4924
WOLFSSL_EVP_PKEY* wolfSSL_X509_get_pubkey(WOLFSSL_X509* x509)
4925
{
4926
    WOLFSSL_EVP_PKEY* key = NULL;
4927
    int ret;
4928
4929
    (void)ret;
4930
4931
    WOLFSSL_ENTER("X509_get_pubkey");
4932
    if (x509 != NULL) {
4933
        key = wolfSSL_EVP_PKEY_new_ex(x509->heap);
4934
        if (key != NULL) {
4935
            if (x509->pubKeyOID == RSAk) {
4936
                key->type = EVP_PKEY_RSA;
4937
            }
4938
            else if (x509->pubKeyOID == DSAk) {
4939
                key->type = EVP_PKEY_DSA;
4940
            }
4941
            else {
4942
                key->type = EVP_PKEY_EC;
4943
            }
4944
            key->save_type = 0;
4945
            key->pkey.ptr = (char*)XMALLOC(
4946
                        x509->pubKey.length, x509->heap,
4947
                                                       DYNAMIC_TYPE_PUBLIC_KEY);
4948
            if (key->pkey.ptr == NULL) {
4949
                wolfSSL_EVP_PKEY_free(key);
4950
                return NULL;
4951
            }
4952
            XMEMCPY(key->pkey.ptr, x509->pubKey.buffer, x509->pubKey.length);
4953
            key->pkey_sz = x509->pubKey.length;
4954
4955
            #ifdef HAVE_ECC
4956
                key->pkey_curve = (int)x509->pkCurveOID;
4957
            #endif /* HAVE_ECC */
4958
4959
            /* decode RSA key */
4960
            #ifndef NO_RSA
4961
            if (key->type == EVP_PKEY_RSA) {
4962
                key->ownRsa = 1;
4963
                key->rsa = wolfSSL_RSA_new();
4964
                if (key->rsa == NULL) {
4965
                    wolfSSL_EVP_PKEY_free(key);
4966
                    return NULL;
4967
                }
4968
4969
                if (wolfSSL_RSA_LoadDer_ex(key->rsa,
4970
                            (const unsigned char*)key->pkey.ptr, key->pkey_sz,
4971
                            WOLFSSL_RSA_LOAD_PUBLIC) != WOLFSSL_SUCCESS) {
4972
                    wolfSSL_EVP_PKEY_free(key);
4973
                    return NULL;
4974
                }
4975
            }
4976
            #endif /* NO_RSA */
4977
4978
            /* decode ECC key */
4979
            #if defined(HAVE_ECC) && defined(OPENSSL_EXTRA)
4980
            if (key->type == EVP_PKEY_EC) {
4981
                word32 idx = 0;
4982
4983
                key->ownEcc = 1;
4984
                key->ecc = wolfSSL_EC_KEY_new();
4985
                if (key->ecc == NULL || key->ecc->internal == NULL) {
4986
                    wolfSSL_EVP_PKEY_free(key);
4987
                    return NULL;
4988
                }
4989
4990
                /* not using wolfSSL_EC_KEY_LoadDer because public key in x509
4991
                 * is in the format of x963 (no sequence at start of buffer) */
4992
                ret = wc_EccPublicKeyDecode((const unsigned char*)key->pkey.ptr,
4993
                                            &idx, (ecc_key*)key->ecc->internal,
4994
                                            key->pkey_sz);
4995
                if (ret < 0) {
4996
                    WOLFSSL_ERROR_VERBOSE(ret);
4997
                    WOLFSSL_MSG("wc_EccPublicKeyDecode failed");
4998
                    wolfSSL_EVP_PKEY_free(key);
4999
                    return NULL;
5000
                }
5001
5002
                if (SetECKeyExternal(key->ecc) != WOLFSSL_SUCCESS) {
5003
                    WOLFSSL_MSG("SetECKeyExternal failed");
5004
                    wolfSSL_EVP_PKEY_free(key);
5005
                    return NULL;
5006
                }
5007
5008
                key->ecc->inSet = 1;
5009
            }
5010
            #endif /* HAVE_ECC && OPENSSL_EXTRA */
5011
5012
            #ifndef NO_DSA
5013
            if (key->type == EVP_PKEY_DSA) {
5014
                key->ownDsa = 1;
5015
                key->dsa = wolfSSL_DSA_new();
5016
                if (key->dsa == NULL) {
5017
                    wolfSSL_EVP_PKEY_free(key);
5018
                    return NULL;
5019
                }
5020
5021
                if (wolfSSL_DSA_LoadDer_ex(key->dsa,
5022
                            (const unsigned char*)key->pkey.ptr, key->pkey_sz, \
5023
                            WOLFSSL_DSA_LOAD_PUBLIC) != WOLFSSL_SUCCESS) {
5024
                    wolfSSL_DSA_free(key->dsa);
5025
                    key->dsa = NULL;
5026
                    wolfSSL_EVP_PKEY_free(key);
5027
                    return NULL;
5028
                }
5029
            }
5030
            #endif /* NO_DSA */
5031
        }
5032
    }
5033
    return key;
5034
}
5035
#endif /* OPENSSL_EXTRA_X509_SMALL */
5036
5037
/* End of smaller subset of X509 compatibility functions. Avoid increasing the
5038
 * size of this subset and its memory usage */
5039
#endif /* OPENSSL_EXTRA_X509_SMALL || KEEP_PEER_CERT || SESSION_CERTS */
5040
5041
#if defined(OPENSSL_ALL)
5042
/*
5043
 * Converts a and b to DER and then does an XMEMCMP to check if they match.
5044
 * Returns 0 when certificates match and WOLFSSL_FATAL_ERROR when they don't.
5045
 */
5046
int wolfSSL_X509_cmp(const WOLFSSL_X509 *a, const WOLFSSL_X509 *b)
5047
{
5048
        const byte* derA;
5049
        const byte* derB;
5050
        int outSzA = 0;
5051
        int outSzB = 0;
5052
5053
        if (a == NULL || b == NULL){
5054
            return BAD_FUNC_ARG;
5055
        }
5056
5057
        derA = wolfSSL_X509_get_der((WOLFSSL_X509*)a, &outSzA);
5058
        if (derA == NULL){
5059
            WOLFSSL_MSG("wolfSSL_X509_get_der - certificate A has failed");
5060
            return WOLFSSL_FATAL_ERROR;
5061
        }
5062
        derB = wolfSSL_X509_get_der((WOLFSSL_X509*)b, &outSzB);
5063
        if (derB == NULL){
5064
            WOLFSSL_MSG("wolfSSL_X509_get_der - certificate B has failed");
5065
            return WOLFSSL_FATAL_ERROR;
5066
        }
5067
5068
        if (outSzA != outSzB || XMEMCMP(derA, derB, outSzA) != 0) {
5069
            WOLFSSL_LEAVE("wolfSSL_X509_cmp", WOLFSSL_FATAL_ERROR);
5070
            return WOLFSSL_FATAL_ERROR;
5071
        }
5072
5073
        WOLFSSL_LEAVE("wolfSSL_X509_cmp", 0);
5074
5075
        return 0;
5076
    }
5077
#endif /* OPENSSL_ALL */
5078
5079
#if defined(OPENSSL_EXTRA)
5080
    int wolfSSL_X509_ext_isSet_by_NID(WOLFSSL_X509* x509, int nid)
5081
    {
5082
        int isSet = 0;
5083
5084
        WOLFSSL_ENTER("wolfSSL_X509_ext_isSet_by_NID");
5085
5086
        if (x509 != NULL) {
5087
            switch (nid) {
5088
                case NID_basic_constraints: isSet = x509->basicConstSet; break;
5089
                case NID_subject_alt_name: isSet = x509->subjAltNameSet; break;
5090
                case NID_authority_key_identifier: isSet = x509->authKeyIdSet; break;
5091
                case NID_subject_key_identifier: isSet = x509->subjKeyIdSet; break;
5092
                case NID_key_usage: isSet = x509->keyUsageSet; break;
5093
                case NID_crl_distribution_points: isSet = x509->CRLdistSet; break;
5094
                case NID_ext_key_usage: isSet = ((x509->extKeyUsageSrc) ? 1 : 0);
5095
                    break;
5096
                case NID_info_access: isSet = x509->authInfoSet; break;
5097
                #if defined(WOLFSSL_SEP) || defined(WOLFSSL_QT)
5098
                    case NID_certificate_policies: isSet = x509->certPolicySet; break;
5099
                #endif /* WOLFSSL_SEP || WOLFSSL_QT */
5100
                default:
5101
                    WOLFSSL_MSG("NID not in table");
5102
            }
5103
        }
5104
5105
        WOLFSSL_LEAVE("wolfSSL_X509_ext_isSet_by_NID", isSet);
5106
5107
        return isSet;
5108
    }
5109
5110
5111
    int wolfSSL_X509_ext_get_critical_by_NID(WOLFSSL_X509* x509, int nid)
5112
    {
5113
        int crit = 0;
5114
5115
        WOLFSSL_ENTER("wolfSSL_X509_ext_get_critical_by_NID");
5116
5117
        if (x509 != NULL) {
5118
            switch (nid) {
5119
                case NID_basic_constraints: crit = x509->basicConstCrit; break;
5120
                case NID_subject_alt_name: crit = x509->subjAltNameCrit; break;
5121
                case NID_authority_key_identifier: crit = x509->authKeyIdCrit; break;
5122
                case NID_subject_key_identifier: crit = x509->subjKeyIdCrit; break;
5123
                case NID_key_usage: crit = x509->keyUsageCrit; break;
5124
                case NID_crl_distribution_points: crit= x509->CRLdistCrit; break;
5125
                case NID_ext_key_usage: crit= x509->extKeyUsageCrit; break;
5126
                #if defined(WOLFSSL_SEP) || defined(WOLFSSL_QT)
5127
                    case NID_certificate_policies: crit = x509->certPolicyCrit; break;
5128
                #endif /* WOLFSSL_SEP || WOLFSSL_QT */
5129
            }
5130
        }
5131
5132
        WOLFSSL_LEAVE("wolfSSL_X509_ext_get_critical_by_NID", crit);
5133
5134
        return crit;
5135
    }
5136
5137
5138
    int wolfSSL_X509_get_isSet_pathLength(WOLFSSL_X509* x509)
5139
    {
5140
        int isSet = 0;
5141
5142
        WOLFSSL_ENTER("wolfSSL_X509_get_isSet_pathLength");
5143
5144
        if (x509 != NULL)
5145
            isSet = x509->basicConstPlSet;
5146
5147
        WOLFSSL_LEAVE("wolfSSL_X509_get_isSet_pathLength", isSet);
5148
5149
        return isSet;
5150
    }
5151
5152
5153
    word32 wolfSSL_X509_get_pathLength(WOLFSSL_X509* x509)
5154
    {
5155
        word32 pathLength = 0;
5156
5157
        WOLFSSL_ENTER("wolfSSL_X509_get_pathLength");
5158
5159
        if (x509 != NULL)
5160
            pathLength = x509->pathLength;
5161
5162
        WOLFSSL_LEAVE("wolfSSL_X509_get_pathLength", pathLength);
5163
5164
        return pathLength;
5165
    }
5166
5167
5168
    unsigned int wolfSSL_X509_get_keyUsage(WOLFSSL_X509* x509)
5169
    {
5170
        word16 usage = 0;
5171
5172
        WOLFSSL_ENTER("wolfSSL_X509_get_keyUsage");
5173
5174
        if (x509 != NULL)
5175
            usage = x509->keyUsage;
5176
5177
        WOLFSSL_LEAVE("wolfSSL_X509_get_keyUsage", usage);
5178
5179
        return usage;
5180
    }
5181
5182
5183
    byte* wolfSSL_X509_get_authorityKeyID(WOLFSSL_X509* x509,
5184
                                          byte* dst, int* dstLen)
5185
    {
5186
        byte *id = NULL;
5187
        int copySz = 0;
5188
5189
        WOLFSSL_ENTER("wolfSSL_X509_get_authorityKeyID");
5190
5191
        if (x509 != NULL) {
5192
            if (x509->authKeyIdSet) {
5193
                copySz = min(dstLen != NULL ? *dstLen : 0,
5194
                             (int)x509->authKeyIdSz);
5195
                id = x509->authKeyId;
5196
            }
5197
5198
            if (dst != NULL && dstLen != NULL && id != NULL && copySz > 0) {
5199
                XMEMCPY(dst, id, copySz);
5200
                id = dst;
5201
                *dstLen = copySz;
5202
            }
5203
        }
5204
5205
        WOLFSSL_LEAVE("wolfSSL_X509_get_authorityKeyID", copySz);
5206
5207
        return id;
5208
    }
5209
5210
    byte* wolfSSL_X509_get_subjectKeyID(WOLFSSL_X509* x509,
5211
                                        byte* dst, int* dstLen)
5212
    {
5213
        byte *id = NULL;
5214
        int copySz = 0;
5215
5216
        WOLFSSL_ENTER("wolfSSL_X509_get_subjectKeyID");
5217
5218
        if (x509 != NULL) {
5219
            if (x509->subjKeyIdSet) {
5220
                copySz = min(dstLen != NULL ? *dstLen : 0,
5221
                                                        (int)x509->subjKeyIdSz);
5222
                id = x509->subjKeyId;
5223
            }
5224
5225
            if (dst != NULL && dstLen != NULL && id != NULL && copySz > 0) {
5226
                XMEMCPY(dst, id, copySz);
5227
                id = dst;
5228
                *dstLen = copySz;
5229
            }
5230
        }
5231
5232
        WOLFSSL_LEAVE("wolfSSL_X509_get_subjectKeyID", copySz);
5233
5234
        return id;
5235
    }
5236
#endif /* OPENSSL_EXTRA */
5237
5238
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
5239
    defined(OPENSSL_EXTRA_X509_SMALL)
5240
5241
    /* Looks up the index of the first entry encountered with matching NID
5242
     * The search starts from index 'pos'
5243
     * returns a negative value on failure and positive index value on success*/
5244
    int wolfSSL_X509_NAME_get_index_by_NID(WOLFSSL_X509_NAME* name,
5245
                                          int nid, int pos)
5246
    {
5247
        int value = nid, i;
5248
5249
        WOLFSSL_ENTER("wolfSSL_X509_NAME_get_index_by_NID");
5250
5251
        if (name == NULL) {
5252
            return BAD_FUNC_ARG;
5253
        }
5254
5255
        i = pos + 1; /* start search after index passed in */
5256
        if (i < 0) {
5257
            i = 0;
5258
        }
5259
5260
        for (;i < name->entrySz && i < MAX_NAME_ENTRIES; i++) {
5261
            if (name->entry[i].nid == value) {
5262
                return i;
5263
            }
5264
        }
5265
        return WOLFSSL_FATAL_ERROR;
5266
    }
5267
5268
5269
    WOLFSSL_ASN1_STRING*  wolfSSL_X509_NAME_ENTRY_get_data(
5270
                                                    WOLFSSL_X509_NAME_ENTRY* in)
5271
    {
5272
        WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_get_data");
5273
        if (in == NULL)
5274
            return NULL;
5275
5276
        return in->value;
5277
    }
5278
5279
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
5280
5281
#ifdef OPENSSL_EXTRA
5282
#ifndef NO_BIO
5283
5284
#ifndef MAX_WIDTH
5285
    #define MAX_WIDTH 80
5286
#endif
5287
5288
static int X509PrintSubjAltName(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
5289
        int indent)
5290
{
5291
    int ret = WOLFSSL_SUCCESS;
5292
    int nameCount = 0;
5293
    DNS_entry* entry;
5294
5295
    if (bio == NULL || x509 == NULL) {
5296
        ret = WOLFSSL_FAILURE;
5297
    }
5298
5299
    if (ret == WOLFSSL_SUCCESS && x509->subjAltNameSet &&
5300
            x509->altNames != NULL) {
5301
        char scratch[MAX_WIDTH];
5302
        int len;
5303
5304
        len = XSNPRINTF(scratch, MAX_WIDTH, "%*s", indent, "");
5305
        if (len >= MAX_WIDTH)
5306
            ret = WOLFSSL_FAILURE;
5307
        if (ret == WOLFSSL_SUCCESS) {
5308
            if (wolfSSL_BIO_write(bio, scratch, (int)XSTRLEN(scratch)) <= 0) {
5309
                ret = WOLFSSL_FAILURE;
5310
            }
5311
        }
5312
        if (ret == WOLFSSL_SUCCESS) {
5313
            entry = x509->altNames;
5314
            while (entry != NULL) {
5315
                ++nameCount;
5316
                if (nameCount > 1) {
5317
                    if (wolfSSL_BIO_write(bio, ", ", 2) <= 0) {
5318
                        ret = WOLFSSL_FAILURE;
5319
                        break;
5320
                    }
5321
                }
5322
5323
                if (entry->type == ASN_DNS_TYPE) {
5324
                    len = XSNPRINTF(scratch, MAX_WIDTH, "DNS:%s", entry->name);
5325
                    if (len >= MAX_WIDTH) {
5326
                        ret = WOLFSSL_FAILURE;
5327
                        break;
5328
                    }
5329
                }
5330
            #if defined(OPENSSL_ALL) || defined(WOLFSSL_IP_ALT_NAME)
5331
                else if (entry->type == ASN_IP_TYPE) {
5332
                    len = XSNPRINTF(scratch, MAX_WIDTH, "IP Address:%s",
5333
                            entry->ipString);
5334
                    if (len >= MAX_WIDTH) {
5335
                        ret = WOLFSSL_FAILURE;
5336
                        break;
5337
                    }
5338
                }
5339
            #endif /* OPENSSL_ALL || WOLFSSL_IP_ALT_NAME */
5340
                else if (entry->type == ASN_RFC822_TYPE) {
5341
                    len = XSNPRINTF(scratch, MAX_WIDTH, "Email Address:%s",
5342
                            entry->name);
5343
                    if (len >= MAX_WIDTH) {
5344
                        ret = WOLFSSL_FAILURE;
5345
                        break;
5346
                    }
5347
                }
5348
                else {
5349
                    WOLFSSL_MSG("Bad alt name type.");
5350
                    ret = WOLFSSL_FAILURE;
5351
                    break;
5352
                }
5353
5354
                if (wolfSSL_BIO_write(bio, scratch, (int)XSTRLEN(scratch))
5355
                        <= 0) {
5356
                    ret = WOLFSSL_FAILURE;
5357
                    break;
5358
                }
5359
5360
                entry = entry->next;
5361
            }
5362
        }
5363
5364
        if (ret == WOLFSSL_SUCCESS && wolfSSL_BIO_write(bio, "\n", 1) <= 0) {
5365
            ret = WOLFSSL_FAILURE;
5366
        }
5367
    }
5368
5369
    return ret;
5370
}
5371
5372
#ifdef XSNPRINTF
5373
static int X509PrintKeyUsage(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int indent)
5374
{
5375
    int ret = WOLFSSL_SUCCESS;
5376
    word32 i = 0;
5377
    int usageCount = 0;
5378
    const int usages[] = {
5379
        KEYUSE_DIGITAL_SIG,
5380
        KEYUSE_CONTENT_COMMIT,
5381
        KEYUSE_KEY_ENCIPHER,
5382
        KEYUSE_DATA_ENCIPHER,
5383
        KEYUSE_KEY_AGREE,
5384
        KEYUSE_KEY_CERT_SIGN,
5385
        KEYUSE_CRL_SIGN,
5386
        KEYUSE_ENCIPHER_ONLY,
5387
        KEYUSE_DECIPHER_ONLY
5388
    };
5389
    const char* usageStrs[] = {
5390
        "Digital Signature",
5391
        "Non Repudiation",
5392
        "Key Encipherment",
5393
        "Data Encipherment",
5394
        "Key Agreement",
5395
        "Certificate Sign",
5396
        "CRL Sign",
5397
        "Encipher Only",
5398
        "Decipher Only"
5399
    };
5400
5401
    if (bio == NULL || x509 == NULL) {
5402
        ret = WOLFSSL_FAILURE;
5403
    }
5404
5405
    if (ret == WOLFSSL_SUCCESS && x509->keyUsageSet && x509->keyUsage != 0) {
5406
        char scratch[MAX_WIDTH];
5407
        int len;
5408
5409
        len = XSNPRINTF(scratch, MAX_WIDTH, "%*s", indent, "");
5410
        if (len >= MAX_WIDTH)
5411
            ret = WOLFSSL_FAILURE;
5412
        if (ret == WOLFSSL_SUCCESS) {
5413
            if (wolfSSL_BIO_write(bio, scratch, (int)XSTRLEN(scratch)) <= 0) {
5414
                ret = WOLFSSL_FAILURE;
5415
            }
5416
        }
5417
        for (; ret == WOLFSSL_SUCCESS && i < sizeof(usages) / sizeof(usages[i]);
5418
             i++) {
5419
            if (x509->keyUsage & usages[i]) {
5420
                ++usageCount;
5421
                if (usageCount > 1 && wolfSSL_BIO_write(bio, ", ", 2) <= 0) {
5422
                    ret = WOLFSSL_FAILURE;
5423
                    break;
5424
                }
5425
                if (wolfSSL_BIO_write(bio, usageStrs[i],
5426
                                      (int)XSTRLEN(usageStrs[i])) <= 0) {
5427
                    ret = WOLFSSL_FAILURE;
5428
                    break;
5429
                }
5430
            }
5431
        }
5432
        if (ret == WOLFSSL_SUCCESS && wolfSSL_BIO_write(bio, "\n", 1) <= 0) {
5433
            ret = WOLFSSL_FAILURE;
5434
        }
5435
    }
5436
5437
    return ret;
5438
}
5439
5440
static int X509PrintExtendedKeyUsage(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
5441
        int indent)
5442
{
5443
    int ret = WOLFSSL_SUCCESS;
5444
    word32 i = 0;
5445
    int usageCount = 0;
5446
    const int usages[] = {
5447
        EXTKEYUSE_OCSP_SIGN,
5448
        EXTKEYUSE_TIMESTAMP,
5449
        EXTKEYUSE_EMAILPROT,
5450
        EXTKEYUSE_CODESIGN,
5451
        EXTKEYUSE_CLIENT_AUTH,
5452
        EXTKEYUSE_SERVER_AUTH
5453
    };
5454
    const char* usageStrs[] = {
5455
        "OCSP Signing",
5456
        "Time Stamping",
5457
        "E-mail Protection",
5458
        "Code Signing",
5459
        "TLS Web Client Authentication",
5460
        "TLS Web Server Authentication"
5461
    };
5462
5463
    if (bio == NULL || x509 == NULL) {
5464
        ret = WOLFSSL_FAILURE;
5465
    }
5466
5467
    if (ret == WOLFSSL_SUCCESS && x509->extKeyUsageCount > 0
5468
            && x509->extKeyUsage != 0) {
5469
        char scratch[MAX_WIDTH];
5470
        int len;
5471
5472
        len = XSNPRINTF(scratch, MAX_WIDTH, "%*s", indent, "");
5473
        if (len >= MAX_WIDTH)
5474
            ret = WOLFSSL_FAILURE;
5475
        if (ret == WOLFSSL_SUCCESS) {
5476
            if (wolfSSL_BIO_write(bio, scratch, (int)XSTRLEN(scratch)) <= 0) {
5477
                ret = WOLFSSL_FAILURE;
5478
            }
5479
        }
5480
        for (; ret == WOLFSSL_SUCCESS && i < sizeof(usages) / sizeof(usages[i]);
5481
             i++) {
5482
            if (x509->extKeyUsage & usages[i]) {
5483
                ++usageCount;
5484
                if (usageCount > 1 && wolfSSL_BIO_write(bio, ", ", 2) <= 0) {
5485
                    ret = WOLFSSL_FAILURE;
5486
                    break;
5487
                }
5488
                if (wolfSSL_BIO_write(bio, usageStrs[i],
5489
                                      (int)XSTRLEN(usageStrs[i])) <= 0) {
5490
                    ret = WOLFSSL_FAILURE;
5491
                    break;
5492
                }
5493
            }
5494
        }
5495
        if (ret == WOLFSSL_SUCCESS && wolfSSL_BIO_write(bio, "\n", 1) <= 0) {
5496
            ret = WOLFSSL_FAILURE;
5497
        }
5498
    }
5499
5500
    return ret;
5501
}
5502
5503
5504
/* print serial number out
5505
 * return WOLFSSL_SUCCESS on success
5506
 */
5507
static int X509PrintSerial_ex(WOLFSSL_BIO* bio, byte* serial, int sz,
5508
        int delimiter, int indent)
5509
{
5510
    char scratch[MAX_WIDTH];
5511
    const int scratchSz = sizeof(scratch);
5512
    int scratchLen;
5513
5514
    if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*sSerial Number:",
5515
                                 indent, "")) >= MAX_WIDTH) {
5516
        WOLFSSL_MSG("buffer overrun");
5517
        return WOLFSSL_FAILURE;
5518
    }
5519
    if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
5520
        return WOLFSSL_FAILURE;
5521
    }
5522
5523
    if (sz > (int)sizeof(byte)) {
5524
        int i;
5525
        int valLen;
5526
5527
        /* serial is larger than int size so print off hex values */
5528
        if ((scratchLen = XSNPRINTF(
5529
                 scratch, MAX_WIDTH, "\n%*s", indent, ""))
5530
                >= MAX_WIDTH) {
5531
            WOLFSSL_MSG("buffer overrun");
5532
            return WOLFSSL_FAILURE;
5533
        }
5534
        for (i = 0; i < sz; i++) {
5535
            if ((valLen = XSNPRINTF(
5536
                     scratch + scratchLen, scratchSz - scratchLen,
5537
                     "%02x%s", serial[i], (i < sz - 1) ?
5538
                     (delimiter ? ":" : "") : "\n"))
5539
                >= scratchSz - scratchLen)
5540
            {
5541
                WOLFSSL_MSG("buffer overrun");
5542
                return WOLFSSL_FAILURE;
5543
            }
5544
            scratchLen += valLen;
5545
        }
5546
        if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
5547
            return WOLFSSL_FAILURE;
5548
        }
5549
    }
5550
5551
    /* if serial can fit into byte then print on the same line */
5552
    else  {
5553
        if ((scratchLen = XSNPRINTF(
5554
                 scratch, MAX_WIDTH, " %d (0x%x)\n", serial[0], serial[0]))
5555
            >= MAX_WIDTH)
5556
        {
5557
            WOLFSSL_MSG("buffer overrun");
5558
            return WOLFSSL_FAILURE;
5559
        }
5560
        if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
5561
            return WOLFSSL_FAILURE;
5562
        }
5563
    }
5564
    return WOLFSSL_SUCCESS;
5565
}
5566
5567
static int X509PrintSerial(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int indent)
5568
{
5569
    unsigned char serial[32];
5570
    int  sz = sizeof(serial);
5571
5572
    XMEMSET(serial, 0, sz);
5573
    if (wolfSSL_X509_get_serial_number(x509, serial, &sz) == WOLFSSL_SUCCESS) {
5574
        X509PrintSerial_ex(bio, serial, sz, 1, indent);
5575
    }
5576
    return WOLFSSL_SUCCESS;
5577
}
5578
5579
/* iterate through certificate extensions printing them out in human readable
5580
 * form
5581
 * return WOLFSSL_SUCCESS on success
5582
 */
5583
static int X509PrintExtensions(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int indent)
5584
{
5585
    int  ret = WOLFSSL_SUCCESS;
5586
    char scratch[MAX_WIDTH];
5587
    const int scratchSz = sizeof(scratch);
5588
    int scratchLen;
5589
    int  count, i;
5590
    char* buf = NULL;
5591
5592
    count = wolfSSL_X509_get_ext_count(x509);
5593
    if (count <= 0)
5594
        return WOLFSSL_SUCCESS;
5595
5596
#ifdef WOLFSSL_CERT_REQ
5597
    if (x509->isCSR) {
5598
        if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*s%s\n", indent, "",
5599
                      "Requested extensions:")) >= MAX_WIDTH) {
5600
            return WOLFSSL_FAILURE;
5601
        }
5602
    }
5603
    else
5604
#endif
5605
    {
5606
        if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*s%s\n", indent, "",
5607
                                     "X509v3 extensions:")) >= MAX_WIDTH) {
5608
            return WOLFSSL_FAILURE;
5609
        }
5610
    }
5611
    if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
5612
        return WOLFSSL_FAILURE;
5613
    }
5614
5615
    buf = (char*)XMALLOC(MAX_WIDTH-4-indent, x509->heap,
5616
                         DYNAMIC_TYPE_TMP_BUFFER);
5617
    if (buf == NULL) {
5618
        return WOLFSSL_FAILURE;
5619
    }
5620
5621
    for (i = 0; (i < count) && (ret != WOLFSSL_FAILURE); i++) {
5622
        WOLFSSL_X509_EXTENSION* ext;
5623
5624
        ext = wolfSSL_X509_get_ext(x509, i);
5625
        if (ext != NULL) {
5626
            WOLFSSL_ASN1_OBJECT* obj;
5627
            int nid;
5628
            char val[6];
5629
            int valLen;
5630
            word32 j;
5631
5632
            obj = wolfSSL_X509_EXTENSION_get_object(ext);
5633
            if (obj == NULL) {
5634
                ret = WOLFSSL_FAILURE;
5635
                break;
5636
            }
5637
            if (wolfSSL_OBJ_obj2txt(buf, MAX_WIDTH, obj, 0)
5638
                == WOLFSSL_FAILURE)
5639
            {
5640
                ret = WOLFSSL_FAILURE;
5641
                break;
5642
            }
5643
            if ((scratchLen = XSNPRINTF(
5644
                     scratch, MAX_WIDTH, "%*s%s%s\n", indent + 4, "",
5645
                     buf,
5646
                     (wolfSSL_X509_EXTENSION_get_critical(ext)
5647
                      ? ": Critical"
5648
                      : ":")))
5649
                >= MAX_WIDTH)
5650
            {
5651
                ret = WOLFSSL_FAILURE;
5652
                break;
5653
            }
5654
5655
            if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
5656
                ret = WOLFSSL_FAILURE;
5657
                break;
5658
            }
5659
            nid = wolfSSL_OBJ_obj2nid(obj);
5660
            switch (nid) {
5661
            case NID_subject_alt_name:
5662
                ret = X509PrintSubjAltName(bio, x509, indent + 8);
5663
                break;
5664
5665
            case NID_subject_key_identifier:
5666
                if (!x509->subjKeyIdSet || x509->subjKeyId == NULL ||
5667
                    x509->subjKeyIdSz == 0)
5668
                {
5669
                    ret = WOLFSSL_FAILURE;
5670
                    break;
5671
                }
5672
5673
                if ((scratchLen = XSNPRINTF(
5674
                         scratch, scratchSz,
5675
                         "%*s", indent + 8, "")) >= scratchSz)
5676
                {
5677
                    ret = WOLFSSL_FAILURE;
5678
                    break;
5679
                }
5680
                for (j = 0; j < x509->subjKeyIdSz; j++) {
5681
                    if ((valLen = XSNPRINTF(
5682
                             val, sizeof(val), "%02X%s",
5683
                             x509->subjKeyId[j],
5684
                             (j < x509->subjKeyIdSz - 1) ? ":" : "\n"))
5685
                        >= (int)sizeof(val))
5686
                    {
5687
                        ret = WOLFSSL_FAILURE;
5688
                        break;
5689
                    }
5690
                    if (scratchLen + valLen >= scratchSz) {
5691
                        if (wolfSSL_BIO_write(bio, scratch,
5692
                                              scratchLen) <= 0) {
5693
                            ret = WOLFSSL_FAILURE;
5694
                            break;
5695
                        }
5696
                        scratchLen = 0;
5697
                    }
5698
                    XMEMCPY(scratch + scratchLen, val, valLen);
5699
                    scratchLen += valLen;
5700
                }
5701
                if (ret == WOLFSSL_FAILURE)
5702
                    break;
5703
                if (wolfSSL_BIO_write(bio, scratch,
5704
                                      scratchLen) <= 0) {
5705
                    ret = WOLFSSL_FAILURE;
5706
                    break;
5707
                }
5708
                break;
5709
5710
            case NID_authority_key_identifier:
5711
                if (!x509->authKeyIdSet || x509->authKeyId == NULL ||
5712
                    x509->authKeyIdSz == 0) {
5713
                    ret = WOLFSSL_FAILURE;
5714
                    break;
5715
                }
5716
5717
                if ((scratchLen = XSNPRINTF(
5718
                         scratch, scratchSz, "%*s%s",
5719
                         indent + 8, "", "keyid:")) >= scratchSz)
5720
                {
5721
                    ret = WOLFSSL_FAILURE;
5722
                    break;
5723
                }
5724
                for (j = 0; j < x509->authKeyIdSz; j++) {
5725
                    if ((valLen = XSNPRINTF(
5726
                             val, sizeof(val), "%02X%s",
5727
                             x509->authKeyId[j],
5728
                             (j < x509->authKeyIdSz - 1) ? ":" : "\n"))
5729
                        >= (int)sizeof(val))
5730
                    {
5731
                        ret = WOLFSSL_FAILURE;
5732
                        break;
5733
                    }
5734
                    if (scratchLen >= scratchSz - valLen) {
5735
                        if (wolfSSL_BIO_write(bio, scratch,
5736
                                              scratchLen) <= 0)
5737
                        {
5738
                            ret = WOLFSSL_FAILURE;
5739
                            break;
5740
                        }
5741
                        scratchLen = 0;
5742
                    }
5743
                    if (scratchLen + valLen >= scratchSz) {
5744
                        ret = WOLFSSL_FAILURE;
5745
                        break;
5746
                    }
5747
                    XMEMCPY(scratch + scratchLen, val, valLen);
5748
                    scratchLen += valLen;
5749
                }
5750
                if (ret == WOLFSSL_FAILURE)
5751
                    break;
5752
                if (wolfSSL_BIO_write(bio, scratch,
5753
                                      scratchLen) <= 0) {
5754
                    ret = WOLFSSL_FAILURE;
5755
                    break;
5756
                }
5757
                break;
5758
5759
            case NID_basic_constraints:
5760
                if (!x509->basicConstSet) {
5761
                    ret = WOLFSSL_FAILURE;
5762
                    break;
5763
                }
5764
                if ((scratchLen = XSNPRINTF(
5765
                         scratch, scratchSz,
5766
                         "%*sCA:%s\n",
5767
                         indent + 8, "", (x509->isCa)? "TRUE": "FALSE"))
5768
                    >= scratchSz)
5769
                {
5770
                    ret = WOLFSSL_FAILURE;
5771
                    break;
5772
                }
5773
                if (wolfSSL_BIO_write(bio, scratch,
5774
                                      scratchLen) <= 0) {
5775
                    ret = WOLFSSL_FAILURE;
5776
                    break;
5777
                }
5778
                break;
5779
5780
            case NID_key_usage:
5781
                ret = X509PrintKeyUsage(bio, x509, indent + 8);
5782
                break;
5783
5784
            case NID_ext_key_usage:
5785
                ret = X509PrintExtendedKeyUsage(bio, x509, indent + 8);
5786
                break;
5787
5788
            default:
5789
                /* extension nid not yet supported */
5790
                if ((scratchLen = XSNPRINTF(
5791
                         scratch, MAX_WIDTH,
5792
                         "%*sNID %d print not yet supported\n",
5793
                         indent + 8, "", nid)) >= MAX_WIDTH)
5794
                {
5795
                    ret = WOLFSSL_FAILURE;
5796
                    break;
5797
                }
5798
                ret = wolfSSL_BIO_write(bio, scratch, scratchLen);
5799
            }
5800
        }
5801
    }
5802
5803
    if (buf != NULL) {
5804
        XFREE(buf, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
5805
    }
5806
5807
    return ret;
5808
}
5809
5810
5811
/* print out the signature in human readable format for use with
5812
 * wolfSSL_X509_print()
5813
 * return WOLFSSL_SUCCESS on success
5814
 */
5815
static int X509PrintSignature_ex(WOLFSSL_BIO* bio, byte* sig,
5816
        int sigSz, int sigNid, int algOnly, int indent)
5817
{
5818
    char scratch[MAX_WIDTH];
5819
    int scratchLen;
5820
    WOLFSSL_ASN1_OBJECT* obj = NULL;
5821
    int ret = WOLFSSL_SUCCESS;
5822
    int i;
5823
    char tmp[100];
5824
    int tmpLen = 0;
5825
5826
    if (sigSz <= 0) {
5827
        return WOLFSSL_SUCCESS;
5828
    }
5829
5830
    if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*s%s", indent, "",
5831
                                "Signature Algorithm: ")) >= MAX_WIDTH) {
5832
        ret = WOLFSSL_FAILURE;
5833
    }
5834
5835
    if (ret == WOLFSSL_SUCCESS) {
5836
        if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0)
5837
            ret = WOLFSSL_FAILURE;
5838
    }
5839
5840
    if (ret == WOLFSSL_SUCCESS) {
5841
        obj = wolfSSL_OBJ_nid2obj(sigNid);
5842
        if (obj == NULL)
5843
            ret = WOLFSSL_FAILURE;
5844
    }
5845
    if (ret == WOLFSSL_SUCCESS) {
5846
        if (wolfSSL_OBJ_obj2txt(scratch, MAX_WIDTH, obj, 0)
5847
            == WOLFSSL_FAILURE)
5848
        {
5849
            ret = WOLFSSL_FAILURE;
5850
        }
5851
    }
5852
5853
    if (ret == WOLFSSL_SUCCESS) {
5854
        if ((tmpLen = XSNPRINTF(tmp, sizeof(tmp),"%s\n", scratch))
5855
            >= (int)sizeof(tmp))
5856
        {
5857
            ret = WOLFSSL_FAILURE;
5858
        }
5859
    }
5860
    if (ret == WOLFSSL_SUCCESS) {
5861
        if (wolfSSL_BIO_write(bio, tmp, tmpLen) <= 0)
5862
            ret = WOLFSSL_FAILURE;
5863
    }
5864
5865
    /* Leave function if the desired content to print
5866
     * is only the signature algorithm */
5867
    if (algOnly) {
5868
        if (obj != NULL)
5869
            wolfSSL_ASN1_OBJECT_free(obj);
5870
5871
        return ret;
5872
    }
5873
5874
    if (ret == WOLFSSL_SUCCESS) {
5875
        if ((tmpLen = XSNPRINTF(tmp, sizeof(tmp), "%*s", indent + 5, ""))
5876
            >= (int)sizeof(tmp))
5877
        {
5878
            ret = WOLFSSL_FAILURE;
5879
        }
5880
    }
5881
5882
    if (ret == WOLFSSL_SUCCESS) {
5883
        for (i = 0; i < sigSz; i++) {
5884
            char val[6];
5885
            int valLen;
5886
5887
            if (i == 0) {
5888
                if ((valLen = XSNPRINTF(val, sizeof(val), "%02x", sig[i]))
5889
                    >= (int)sizeof(val))
5890
                {
5891
                    ret = WOLFSSL_FAILURE;
5892
                    break;
5893
                }
5894
            }
5895
            else if (((i % 18) == 0)) {
5896
                if (wolfSSL_BIO_write(bio, tmp, tmpLen)
5897
                    <= 0) {
5898
                    ret = WOLFSSL_FAILURE;
5899
                    break;
5900
                }
5901
                if ((tmpLen = XSNPRINTF(tmp, sizeof(tmp), ":\n%*s",
5902
                                        indent + 5, ""))
5903
                    >= (int)sizeof(tmp))
5904
                {
5905
                    ret = WOLFSSL_FAILURE;
5906
                    break;
5907
                }
5908
                if ((valLen = XSNPRINTF(val, sizeof(val), "%02x", sig[i]))
5909
                    >= (int)sizeof(val))
5910
                {
5911
                    ret = WOLFSSL_FAILURE;
5912
                    break;
5913
                }
5914
            }
5915
            else {
5916
                if ((valLen = XSNPRINTF(val, sizeof(val), ":%02x", sig[i]))
5917
                    >= (int)sizeof(val))
5918
                {
5919
                    ret = WOLFSSL_FAILURE;
5920
                    break;
5921
                }
5922
            }
5923
            if (valLen >= (int)sizeof(tmp) - tmpLen - 1) {
5924
                ret = WOLFSSL_FAILURE;
5925
                break;
5926
            }
5927
            XMEMCPY(tmp + tmpLen, val, valLen);
5928
            tmpLen += valLen;
5929
            tmp[tmpLen] = 0;
5930
        }
5931
    }
5932
5933
    /* print out remaining sig values */
5934
    if (ret == WOLFSSL_SUCCESS) {
5935
        if (tmpLen > 0) {
5936
            if (wolfSSL_BIO_write(bio, tmp, tmpLen)
5937
                <= 0)
5938
            {
5939
                ret = WOLFSSL_FAILURE;
5940
            }
5941
        }
5942
    }
5943
5944
    if (obj != NULL)
5945
        wolfSSL_ASN1_OBJECT_free(obj);
5946
5947
    return ret;
5948
}
5949
5950
static int X509PrintSignature(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
5951
        int algOnly, int indent)
5952
{
5953
    int sigSz = 0;
5954
    if (wolfSSL_X509_get_signature(x509, NULL, &sigSz) <= 0) {
5955
        return WOLFSSL_FAILURE;
5956
    }
5957
5958
    if (sigSz > 0) {
5959
        unsigned char* sig;
5960
        int sigNid;
5961
5962
        sigNid = wolfSSL_X509_get_signature_nid(x509);
5963
        if (sigNid <= 0) {
5964
            return WOLFSSL_FAILURE;
5965
        }
5966
5967
        sig = (unsigned char*)XMALLOC(sigSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
5968
        if (sig == NULL) {
5969
            return WOLFSSL_FAILURE;
5970
        }
5971
5972
        if (wolfSSL_X509_get_signature(x509, sig, &sigSz) <= 0) {
5973
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
5974
            return WOLFSSL_FAILURE;
5975
        }
5976
5977
        if (X509PrintSignature_ex(bio, sig, sigSz, sigNid, algOnly, indent)
5978
                != WOLFSSL_SUCCESS) {
5979
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
5980
            return WOLFSSL_FAILURE;
5981
        }
5982
5983
        if (sig != NULL) {
5984
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
5985
        }
5986
5987
    }
5988
5989
    return WOLFSSL_SUCCESS;
5990
}
5991
5992
5993
/* print out the public key in human readable format for use with
5994
 * wolfSSL_X509_print()
5995
 * return WOLFSSL_SUCCESS on success
5996
 */
5997
static int X509PrintPubKey(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int indent)
5998
{
5999
    char scratch[MAX_WIDTH];
6000
    WOLFSSL_EVP_PKEY* pubKey;
6001
    int len;
6002
    int ret = WOLFSSL_SUCCESS;
6003
6004
    len = XSNPRINTF(scratch, MAX_WIDTH, "%*sPublic Key:\n", indent, "");
6005
    if (len >= MAX_WIDTH)
6006
        return WOLFSSL_FAILURE;
6007
    if (wolfSSL_BIO_write(bio, scratch, len) <= 0)
6008
        return WOLFSSL_FAILURE;
6009
6010
    pubKey = wolfSSL_X509_get_pubkey(x509);
6011
    if (pubKey == NULL)
6012
        return WOLFSSL_FAILURE;
6013
6014
    ret = wolfSSL_EVP_PKEY_print_public(bio, pubKey, indent + 4, NULL);
6015
6016
    wolfSSL_EVP_PKEY_free(pubKey);
6017
6018
    return ret;
6019
}
6020
6021
6022
/* human readable print out of x509 name formatted for use with
6023
 * wolfSSL_X509_print()
6024
 * return WOLFSSL_SUCCESS on success
6025
 */
6026
static int X509PrintName(WOLFSSL_BIO* bio, WOLFSSL_X509_NAME* name,
6027
        char* type, int indent)
6028
{
6029
    char scratch[MAX_WIDTH];
6030
    int scratchLen;
6031
    if (name != NULL) {
6032
        if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH,
6033
                                     "%*s%s", indent, "", type))
6034
            >= MAX_WIDTH)
6035
        {
6036
            return WOLFSSL_FAILURE;
6037
        }
6038
        if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
6039
            return WOLFSSL_FAILURE;
6040
        }
6041
        if (wolfSSL_X509_NAME_print_ex(bio, name, 1, 0) <= 0) {
6042
            return WOLFSSL_FAILURE;
6043
        }
6044
        if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
6045
            return WOLFSSL_FAILURE;
6046
        }
6047
    }
6048
    return WOLFSSL_SUCCESS;
6049
}
6050
6051
6052
/* human readable print out of x509 version
6053
 * return WOLFSSL_SUCCESS on success
6054
 */
6055
static int X509PrintVersion(WOLFSSL_BIO* bio, int version, int indent)
6056
{
6057
    char scratch[MAX_WIDTH];
6058
    int scratchLen;
6059
6060
    if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH,
6061
                                 "%*s%s", indent, "", "Version:"))
6062
        >= MAX_WIDTH)
6063
    {
6064
        return WOLFSSL_FAILURE;
6065
    }
6066
    if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
6067
        return WOLFSSL_FAILURE;
6068
    }
6069
6070
    if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH,
6071
                                 " %d (0x%x)\n", version, (byte)version-1))
6072
        >= MAX_WIDTH)
6073
    {
6074
        return WOLFSSL_FAILURE;
6075
    }
6076
    if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
6077
        return WOLFSSL_FAILURE;
6078
    }
6079
    return WOLFSSL_SUCCESS;
6080
}
6081
6082
#ifdef WOLFSSL_CERT_REQ
6083
/* Print out of REQ attributes
6084
 * return WOLFSSL_SUCCESS on success
6085
 */
6086
static int X509PrintReqAttributes(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
6087
        int indent)
6088
{
6089
    WOLFSSL_X509_ATTRIBUTE* attr;
6090
    char scratch[MAX_WIDTH];
6091
    int scratchLen;
6092
    int i = 0;
6093
6094
    if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH,
6095
                                 "%*s%s", indent, "", "Attributes: \n"))
6096
        >= MAX_WIDTH)
6097
    {
6098
        return WOLFSSL_FAILURE;
6099
    }
6100
    if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
6101
        return WOLFSSL_FAILURE;
6102
    }
6103
    do {
6104
        attr = wolfSSL_X509_REQ_get_attr(x509, i);
6105
        if (attr != NULL) {
6106
            char lName[NAME_SZ/4]; /* NAME_SZ default is 80 */
6107
            int lNameSz = NAME_SZ/4;
6108
            const byte* data;
6109
6110
            if (wolfSSL_OBJ_obj2txt(lName, lNameSz, attr->object, 0)
6111
                == WOLFSSL_FAILURE)
6112
            {
6113
                return WOLFSSL_FAILURE;
6114
            }
6115
            lNameSz = (int)XSTRLEN(lName);
6116
            data = wolfSSL_ASN1_STRING_get0_data(
6117
                    attr->value->value.asn1_string);
6118
            if (data == NULL) {
6119
                WOLFSSL_MSG("No REQ attribute found when expected");
6120
                return WOLFSSL_FAILURE;
6121
            }
6122
            if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH,
6123
                          "%*s%s%*s:%s\n", indent+4, "",
6124
                          lName, (NAME_SZ/4)-lNameSz, "", data))
6125
                >= MAX_WIDTH)
6126
            {
6127
                return WOLFSSL_FAILURE;
6128
            }
6129
            if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
6130
                WOLFSSL_MSG("Error writing REQ attribute");
6131
                return WOLFSSL_FAILURE;
6132
            }
6133
        }
6134
        i++;
6135
    } while (attr != NULL);
6136
6137
    return WOLFSSL_SUCCESS;
6138
}
6139
6140
6141
/*
6142
 * return WOLFSSL_SUCCESS on success
6143
 */
6144
int wolfSSL_X509_REQ_print(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
6145
{
6146
    char subjType[] = "Subject: ";
6147
6148
    if (bio == NULL || x509 == NULL) {
6149
        return WOLFSSL_FAILURE;
6150
    }
6151
6152
    if (wolfSSL_BIO_write(bio, "Certificate Request:\n",
6153
                  (int)XSTRLEN("Certificate Request:\n")) <= 0) {
6154
            return WOLFSSL_FAILURE;
6155
    }
6156
6157
    if (wolfSSL_BIO_write(bio, "    Data:\n",
6158
                  (int)XSTRLEN("    Data:\n")) <= 0) {
6159
            return WOLFSSL_FAILURE;
6160
    }
6161
6162
    /* print version of cert */
6163
    if (X509PrintVersion(bio, wolfSSL_X509_version(x509), 8)
6164
            != WOLFSSL_SUCCESS) {
6165
        return WOLFSSL_FAILURE;
6166
    }
6167
6168
    if (X509PrintSerial(bio, x509, 8) != WOLFSSL_SUCCESS) {
6169
        return WOLFSSL_FAILURE;
6170
    }
6171
6172
    /* print subject */
6173
    if (X509PrintName(bio, wolfSSL_X509_get_subject_name(x509), subjType, 8)
6174
            != WOLFSSL_SUCCESS) {
6175
        return WOLFSSL_FAILURE;
6176
    }
6177
6178
    /* get and print public key */
6179
    if (X509PrintPubKey(bio, x509, 8) != WOLFSSL_SUCCESS) {
6180
        return WOLFSSL_FAILURE;
6181
    }
6182
6183
    /* print out extensions */
6184
    if (X509PrintExtensions(bio, x509, 4) != WOLFSSL_SUCCESS) {
6185
        return WOLFSSL_FAILURE;
6186
    }
6187
6188
    /* print out req attributes */
6189
    if (X509PrintReqAttributes(bio, x509, 4) != WOLFSSL_SUCCESS) {
6190
        return WOLFSSL_FAILURE;
6191
    }
6192
6193
    /* print out signature */
6194
    if (X509PrintSignature(bio, x509, 0, 4) != WOLFSSL_SUCCESS) {
6195
        return WOLFSSL_FAILURE;
6196
    }
6197
6198
    /* done with print out */
6199
    if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
6200
        return WOLFSSL_FAILURE;
6201
    }
6202
6203
    return WOLFSSL_SUCCESS;
6204
}
6205
#endif /* WOLFSSL_CERT_REQ */
6206
6207
6208
/* Writes the human readable form of x509 to bio.
6209
 *
6210
 * bio  WOLFSSL_BIO to write to.
6211
 * x509 Certificate to write.
6212
 *
6213
 * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on failure
6214
 */
6215
int wolfSSL_X509_print_ex(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
6216
    unsigned long nmflags, unsigned long cflag)
6217
{
6218
    char issuType[] = "Issuer: ";
6219
    char subjType[] = "Subject: ";
6220
6221
    WOLFSSL_ENTER("wolfSSL_X509_print_ex");
6222
6223
    /* flags currently not supported */
6224
    (void)nmflags;
6225
    (void)cflag;
6226
6227
    if (bio == NULL || x509 == NULL) {
6228
        return WOLFSSL_FAILURE;
6229
    }
6230
6231
    if (wolfSSL_BIO_write(bio, "Certificate:\n",
6232
                  (int)XSTRLEN("Certificate:\n")) <= 0) {
6233
            return WOLFSSL_FAILURE;
6234
    }
6235
6236
    if (wolfSSL_BIO_write(bio, "    Data:\n",
6237
                  (int)XSTRLEN("    Data:\n")) <= 0) {
6238
            return WOLFSSL_FAILURE;
6239
    }
6240
6241
    /* print version of cert */
6242
    if (X509PrintVersion(bio, wolfSSL_X509_version(x509), 8)
6243
            != WOLFSSL_SUCCESS) {
6244
        return WOLFSSL_FAILURE;
6245
    }
6246
6247
    /* print serial number out */
6248
    if (X509PrintSerial(bio, x509, 8) != WOLFSSL_SUCCESS) {
6249
        return WOLFSSL_FAILURE;
6250
    }
6251
6252
    /* print out signature algo*/
6253
    if (X509PrintSignature(bio, x509, 1, 8) != WOLFSSL_SUCCESS) {
6254
        return WOLFSSL_FAILURE;
6255
    }
6256
6257
    /* print issuer */
6258
    if (X509PrintName(bio, wolfSSL_X509_get_issuer_name(x509), issuType, 8)
6259
            != WOLFSSL_SUCCESS) {
6260
        return WOLFSSL_FAILURE;
6261
    }
6262
6263
#ifndef NO_ASN_TIME
6264
    /* print validity */
6265
    {
6266
        char tmp[80];
6267
6268
        if (wolfSSL_BIO_write(bio, "        Validity\n",
6269
                      (int)XSTRLEN("        Validity\n")) <= 0) {
6270
            return WOLFSSL_FAILURE;
6271
        }
6272
6273
        if (wolfSSL_BIO_write(bio, "            Not Before: ",
6274
                      (int)XSTRLEN("            Not Before: ")) <= 0) {
6275
            return WOLFSSL_FAILURE;
6276
        }
6277
        if (x509->notBefore.length > 0) {
6278
            if (GetTimeString(x509->notBefore.data, ASN_UTC_TIME,
6279
                tmp, sizeof(tmp)) != WOLFSSL_SUCCESS) {
6280
                if (GetTimeString(x509->notBefore.data, ASN_GENERALIZED_TIME,
6281
                tmp, sizeof(tmp)) != WOLFSSL_SUCCESS) {
6282
                    WOLFSSL_MSG("Error getting not before date");
6283
                    return WOLFSSL_FAILURE;
6284
                }
6285
            }
6286
        }
6287
        else {
6288
            XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
6289
        }
6290
        tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
6291
        if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
6292
            return WOLFSSL_FAILURE;
6293
        }
6294
6295
        if (wolfSSL_BIO_write(bio, "\n            Not After : ",
6296
                      (int)XSTRLEN("\n            Not After : ")) <= 0) {
6297
            return WOLFSSL_FAILURE;
6298
        }
6299
        if (x509->notAfter.length > 0) {
6300
            if (GetTimeString(x509->notAfter.data, ASN_UTC_TIME,
6301
                tmp, sizeof(tmp)) != WOLFSSL_SUCCESS) {
6302
                if (GetTimeString(x509->notAfter.data, ASN_GENERALIZED_TIME,
6303
                    tmp, sizeof(tmp)) != WOLFSSL_SUCCESS) {
6304
                    WOLFSSL_MSG("Error getting not after date");
6305
                    return WOLFSSL_FAILURE;
6306
                }
6307
            }
6308
        }
6309
        else {
6310
            XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
6311
        }
6312
        tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
6313
        if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
6314
            return WOLFSSL_FAILURE;
6315
        }
6316
6317
        if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
6318
            return WOLFSSL_FAILURE;
6319
        }
6320
    }
6321
    #endif
6322
6323
    /* print subject */
6324
    if (X509PrintName(bio, wolfSSL_X509_get_subject_name(x509), subjType, 8)
6325
            != WOLFSSL_SUCCESS) {
6326
        return WOLFSSL_FAILURE;
6327
    }
6328
6329
    /* get and print public key */
6330
    if (X509PrintPubKey(bio, x509, 8) != WOLFSSL_SUCCESS) {
6331
        return WOLFSSL_FAILURE;
6332
    }
6333
6334
    /* print out extensions */
6335
    if (X509PrintExtensions(bio, x509, 8) != WOLFSSL_SUCCESS) {
6336
        return WOLFSSL_FAILURE;
6337
    }
6338
6339
    /* print out signature */
6340
    if (X509PrintSignature(bio, x509, 0, 8) != WOLFSSL_SUCCESS) {
6341
        return WOLFSSL_FAILURE;
6342
    }
6343
6344
    /* done with print out */
6345
    if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
6346
        return WOLFSSL_FAILURE;
6347
    }
6348
6349
    return WOLFSSL_SUCCESS;
6350
}
6351
int wolfSSL_X509_print(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
6352
{
6353
    return wolfSSL_X509_print_ex(bio, x509, 0, 0);
6354
}
6355
6356
#ifndef NO_FILESYSTEM
6357
int wolfSSL_X509_print_fp(XFILE fp, WOLFSSL_X509 *x509)
6358
{
6359
    WOLFSSL_BIO* bio;
6360
    int ret;
6361
6362
    WOLFSSL_ENTER("wolfSSL_X509_print_fp");
6363
6364
    if (!fp || !x509) {
6365
        WOLFSSL_MSG("Bad parameter");
6366
        return WOLFSSL_FAILURE;
6367
    }
6368
6369
    if (!(bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file()))) {
6370
        WOLFSSL_MSG("wolfSSL_BIO_new wolfSSL_BIO_s_file error");
6371
        return WOLFSSL_FAILURE;
6372
    }
6373
6374
    if (wolfSSL_BIO_set_fp(bio, fp, BIO_NOCLOSE) != WOLFSSL_SUCCESS) {
6375
        WOLFSSL_MSG("wolfSSL_BIO_set_fp error");
6376
        wolfSSL_BIO_free(bio);
6377
        return WOLFSSL_FAILURE;
6378
    }
6379
6380
    ret = wolfSSL_X509_print(bio, x509);
6381
6382
    wolfSSL_BIO_free(bio);
6383
6384
    return ret;
6385
}
6386
#endif /* NO_FILESYSTEM */
6387
6388
#endif /* XSNPRINTF */
6389
6390
int wolfSSL_X509_signature_print(WOLFSSL_BIO *bp,
6391
        const WOLFSSL_X509_ALGOR *sigalg, const WOLFSSL_ASN1_STRING *sig)
6392
{
6393
    int length = 0;
6394
    word32 idx = 0;
6395
    int i;
6396
6397
    (void)sig;
6398
6399
    WOLFSSL_ENTER("wolfSSL_X509_signature_print");
6400
6401
    if (!bp || !sigalg) {
6402
        WOLFSSL_MSG("Bad parameter");
6403
        return WOLFSSL_FAILURE;
6404
    }
6405
6406
    if ((sigalg->algorithm->obj == NULL) ||
6407
        (sigalg->algorithm->obj[idx] != ASN_OBJECT_ID)) {
6408
        WOLFSSL_MSG("Bad ASN1 Object");
6409
        return WOLFSSL_FAILURE;
6410
    }
6411
    idx++; /* skip object id */
6412
6413
    if (GetLength((const byte*)sigalg->algorithm->obj, &idx, &length,
6414
                  sigalg->algorithm->objSz) < 0 || length < 0) {
6415
        return WOLFSSL_FAILURE;
6416
    }
6417
6418
    if (wolfSSL_BIO_puts(bp, "    Raw Signature Algorithm:") <= 0) {
6419
        WOLFSSL_MSG("wolfSSL_BIO_puts error");
6420
        return WOLFSSL_FAILURE;
6421
    }
6422
6423
    for (i = 0; i < length; ++i) {
6424
        char hex_digits[4];
6425
#ifdef XSNPRINTF
6426
        if (XSNPRINTF(hex_digits, sizeof(hex_digits), "%c%02X", i>0 ? ':' : ' ',
6427
                  (unsigned int)sigalg->algorithm->obj[idx+i])
6428
            >= (int)sizeof(hex_digits))
6429
        {
6430
            WOLFSSL_MSG("buffer overrun");
6431
            return WOLFSSL_FAILURE;
6432
        }
6433
#else
6434
        XSPRINTF(hex_digits, "%c%02X", i>0 ? ':' : ' ',
6435
                 (unsigned int)sigalg->algorithm->obj[idx+i]);
6436
#endif
6437
        if (wolfSSL_BIO_puts(bp, hex_digits) <= 0)
6438
            return WOLFSSL_FAILURE;
6439
    }
6440
6441
    if (wolfSSL_BIO_puts(bp, "\n") <= 0)
6442
        return WOLFSSL_FAILURE;
6443
6444
    return WOLFSSL_SUCCESS;
6445
}
6446
#endif /* !NO_BIO */
6447
6448
#ifndef NO_WOLFSSL_STUB
6449
void wolfSSL_X509_get0_signature(const WOLFSSL_ASN1_BIT_STRING **psig,
6450
        const WOLFSSL_X509_ALGOR **palg, const WOLFSSL_X509 *x509)
6451
{
6452
    (void)psig;
6453
    (void)palg;
6454
    (void)x509;
6455
    WOLFSSL_STUB("wolfSSL_X509_get0_signature");
6456
}
6457
#endif
6458
6459
#endif /* OPENSSL_EXTRA */
6460
6461
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
6462
const char* wolfSSL_X509_verify_cert_error_string(long err)
6463
{
6464
    return wolfSSL_ERR_reason_error_string(err);
6465
}
6466
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
6467
6468
#ifdef OPENSSL_EXTRA
6469
6470
#ifndef NO_WOLFSSL_STUB
6471
int wolfSSL_X509_LOOKUP_add_dir(WOLFSSL_X509_LOOKUP* lookup, const char* dir,
6472
                               long len)
6473
{
6474
    (void)lookup;
6475
    (void)dir;
6476
    (void)len;
6477
    WOLFSSL_STUB("X509_LOOKUP_add_dir");
6478
    return 0;
6479
}
6480
#endif
6481
6482
int wolfSSL_X509_LOOKUP_load_file(WOLFSSL_X509_LOOKUP* lookup,
6483
                                 const char* file, long type)
6484
{
6485
#if !defined(NO_FILESYSTEM) && \
6486
    (defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM))
6487
    int           ret = WOLFSSL_FAILURE;
6488
    XFILE         fp;
6489
    long          sz;
6490
    byte*         pem = NULL;
6491
    byte*         curr = NULL;
6492
    byte*         prev = NULL;
6493
    WOLFSSL_X509* x509;
6494
    const char* header = NULL;
6495
    const char* footer = NULL;
6496
6497
    if (type != X509_FILETYPE_PEM)
6498
        return WS_RETURN_CODE(BAD_FUNC_ARG, (int)WOLFSSL_FAILURE);
6499
6500
    fp = XFOPEN(file, "rb");
6501
    if (fp == XBADFILE)
6502
        return WS_RETURN_CODE(BAD_FUNC_ARG, (int)WOLFSSL_FAILURE);
6503
6504
    if(XFSEEK(fp, 0, XSEEK_END) != 0) {
6505
        XFCLOSE(fp);
6506
        return WS_RETURN_CODE(WOLFSSL_BAD_FILE,WOLFSSL_FAILURE);
6507
    }
6508
    sz = XFTELL(fp);
6509
    XREWIND(fp);
6510
6511
    if (sz > MAX_WOLFSSL_FILE_SIZE || sz <= 0) {
6512
        WOLFSSL_MSG("X509_LOOKUP_load_file size error");
6513
        goto end;
6514
    }
6515
6516
    pem = (byte*)XMALLOC(sz, 0, DYNAMIC_TYPE_PEM);
6517
    if (pem == NULL) {
6518
        ret = MEMORY_ERROR;
6519
        goto end;
6520
    }
6521
6522
    /* Read in file which may be CRLs or certificates. */
6523
    if (XFREAD(pem, (size_t)sz, 1, fp) != 1)
6524
        goto end;
6525
6526
    prev = curr = pem;
6527
    do {
6528
        /* get PEM header and footer based on type */
6529
        if (wc_PemGetHeaderFooter(CRL_TYPE, &header, &footer) == 0 &&
6530
                XSTRNSTR((char*)curr, header, (unsigned int)sz) != NULL) {
6531
#ifdef HAVE_CRL
6532
            WOLFSSL_CERT_MANAGER* cm = lookup->store->cm;
6533
6534
            if (cm->crl == NULL) {
6535
                if (wolfSSL_CertManagerEnableCRL(cm, 0) != WOLFSSL_SUCCESS) {
6536
                    WOLFSSL_MSG("Enable CRL failed");
6537
                    goto end;
6538
                }
6539
            }
6540
6541
            ret = BufferLoadCRL(cm->crl, curr, sz, WOLFSSL_FILETYPE_PEM,
6542
                NO_VERIFY);
6543
            if (ret != WOLFSSL_SUCCESS)
6544
                goto end;
6545
#endif
6546
            curr = (byte*)XSTRNSTR((char*)curr, footer, (unsigned int)sz);
6547
        }
6548
        else if (wc_PemGetHeaderFooter(CERT_TYPE, &header, &footer) == 0 &&
6549
                XSTRNSTR((char*)curr, header, (unsigned int)sz) != NULL) {
6550
            x509 = wolfSSL_X509_load_certificate_buffer(curr, (int)sz,
6551
                                                        WOLFSSL_FILETYPE_PEM);
6552
            if (x509 == NULL)
6553
                 goto end;
6554
            ret = wolfSSL_X509_STORE_add_cert(lookup->store, x509);
6555
            wolfSSL_X509_free(x509);
6556
            if (ret != WOLFSSL_SUCCESS)
6557
                goto end;
6558
            curr = (byte*)XSTRNSTR((char*)curr, footer, (unsigned int)sz);
6559
        }
6560
        else
6561
            goto end;
6562
6563
        if (curr == NULL)
6564
            goto end;
6565
6566
        curr++;
6567
        sz -= (long)(curr - prev);
6568
        prev = curr;
6569
    }
6570
    while (ret == WOLFSSL_SUCCESS);
6571
6572
end:
6573
    if (pem != NULL)
6574
        XFREE(pem, 0, DYNAMIC_TYPE_PEM);
6575
    XFCLOSE(fp);
6576
    return WS_RETURN_CODE(ret, (int)WOLFSSL_FAILURE);
6577
#else
6578
    (void)lookup;
6579
    (void)file;
6580
    (void)type;
6581
    return WS_RETURN_CODE(WOLFSSL_FAILURE,WOLFSSL_FAILURE);
6582
#endif
6583
}
6584
6585
WOLFSSL_X509_LOOKUP_METHOD* wolfSSL_X509_LOOKUP_hash_dir(void)
6586
{
6587
    /* Method implementation in functions. */
6588
    static WOLFSSL_X509_LOOKUP_METHOD meth = { 1 };
6589
    return &meth;
6590
}
6591
6592
WOLFSSL_X509_LOOKUP_METHOD* wolfSSL_X509_LOOKUP_file(void)
6593
{
6594
    /* Method implementation in functions. */
6595
    static WOLFSSL_X509_LOOKUP_METHOD meth = { 0 };
6596
    return &meth;
6597
}
6598
6599
/* set directory path to load certificate or CRL which have the hash.N form */
6600
/* for late use                                                             */
6601
/* @param ctx    a pointer to WOLFSSL_BY_DIR structure                      */
6602
/* @param argc   directory path                                             */
6603
/* @param argl   file type, either WOLFSSL_FILETYPE_PEM or                  */
6604
/*                                          WOLFSSL_FILETYPE_ASN1           */
6605
/* @return WOLFSSL_SUCCESS on successful, othewise negative or zero         */
6606
static int x509AddCertDir(WOLFSSL_BY_DIR *ctx, const char *argc, long argl)
6607
{
6608
#if defined(OPENSSL_ALL) && !defined(NO_FILESYSTEM) && !defined(NO_WOLFSSL_DIR)
6609
    WOLFSSL_BY_DIR_entry *entry;
6610
    size_t pathLen;
6611
    int i, num;
6612
    const char* c;
6613
#ifdef WOLFSSL_SMALL_STACK
6614
    char *buf;
6615
#else
6616
    char  buf[MAX_FILENAME_SZ];
6617
#endif
6618
6619
    WOLFSSL_ENTER("x509AddCertDir");
6620
6621
    pathLen = 0;
6622
    c = argc;
6623
    /* sanity check, zero length */
6624
    if (ctx == NULL || c == NULL || *c == '\0')
6625
        return WOLFSSL_FAILURE;
6626
6627
#ifdef WOLFSSL_SMALL_STACK
6628
    buf = (char*)XMALLOC(MAX_FILENAME_SZ, NULL, DYNAMIC_TYPE_OPENSSL);
6629
    if (buf == NULL) {
6630
        WOLFSSL_LEAVE("x509AddCertDir", MEMORY_E);
6631
        return MEMORY_E;
6632
    }
6633
#endif
6634
6635
    XMEMSET(buf, 0, MAX_FILENAME_SZ);
6636
6637
    do {
6638
        if (*c == SEPARATOR_CHAR || *c == '\0') {
6639
6640
            num = wolfSSL_sk_BY_DIR_entry_num(ctx->dir_entry);
6641
6642
            for (i=0; i<num; i++) {
6643
6644
                entry = wolfSSL_sk_BY_DIR_entry_value(ctx->dir_entry, i);
6645
6646
                if (XSTRLEN(entry->dir_name) == pathLen &&
6647
                    XSTRNCMP(entry->dir_name, buf, pathLen) == 0) {
6648
                    WOLFSSL_MSG("dir entry found");
6649
                    break;
6650
                }
6651
            }
6652
6653
            if (num == -1 || i == num) {
6654
                WOLFSSL_MSG("no entry found");
6655
6656
                if (ctx->dir_entry == NULL) {
6657
                    ctx->dir_entry = wolfSSL_sk_BY_DIR_entry_new_null();
6658
6659
                    if (ctx->dir_entry == NULL) {
6660
                        WOLFSSL_MSG("failed to allocate dir_entry");
6661
                        #ifdef WOLFSSL_SMALL_STACK
6662
                            XFREE(buf, 0, DYNAMIC_TYPE_OPENSSL);
6663
                        #endif
6664
                        return 0;
6665
                    }
6666
                }
6667
6668
                entry = wolfSSL_BY_DIR_entry_new();
6669
                if (entry == NULL) {
6670
                    WOLFSSL_MSG("failed to allocate dir entry");
6671
                    #ifdef WOLFSSL_SMALL_STACK
6672
                        XFREE(buf, 0, DYNAMIC_TYPE_OPENSSL);
6673
                    #endif
6674
                    return 0;
6675
                }
6676
                entry->dir_type = (int)argl;
6677
                entry->dir_name = (char*)XMALLOC(pathLen + 1/* \0 termination*/
6678
                                                , NULL, DYNAMIC_TYPE_OPENSSL);
6679
                entry->hashes = wolfSSL_sk_BY_DIR_HASH_new_null();
6680
                if (entry->dir_name == NULL || entry->hashes == NULL) {
6681
                    WOLFSSL_MSG("failed to allocate dir name");
6682
                    wolfSSL_BY_DIR_entry_free(entry);
6683
                    #ifdef WOLFSSL_SMALL_STACK
6684
                        XFREE(buf, 0, DYNAMIC_TYPE_OPENSSL);
6685
                    #endif
6686
                    return 0;
6687
                }
6688
6689
                XSTRNCPY(entry->dir_name, buf, pathLen);
6690
                entry->dir_name[pathLen] = '\0';
6691
6692
                if (wolfSSL_sk_BY_DIR_entry_push(ctx->dir_entry, entry)
6693
                                                    != WOLFSSL_SUCCESS) {
6694
                    wolfSSL_BY_DIR_entry_free(entry);
6695
                    #ifdef WOLFSSL_SMALL_STACK
6696
                        XFREE(buf, 0, DYNAMIC_TYPE_OPENSSL);
6697
                    #endif
6698
                    return 0;
6699
                }
6700
            }
6701
            /* skip separator */
6702
            if (*c == SEPARATOR_CHAR) c++;
6703
6704
            pathLen = 0;
6705
            XMEMSET(buf, 0, MAX_FILENAME_SZ);
6706
        }
6707
        buf[pathLen++] = *c;
6708
6709
    } while(*c++ != '\0');
6710
6711
#ifdef WOLFSSL_SMALL_STACK
6712
    XFREE(buf, 0, DYNAMIC_TYPE_OPENSSL);
6713
#endif
6714
6715
    return WOLFSSL_SUCCESS;
6716
#else
6717
    (void)ctx;
6718
    (void)argc;
6719
    (void)argl;
6720
    return WOLFSSL_NOT_IMPLEMENTED;
6721
#endif
6722
}
6723
6724
/* set additional data to X509_LOOKUP                                   */
6725
/* @param ctx    a pointer to X509_LOOKUP structure                     */
6726
/* @param cmd    control command :                                      */
6727
/*               X509_L_FILE_LOAD, X509_L_ADD_DIR X509_L_ADD_STORE or   */
6728
/*               X509_L_LOAD_STORE                                      */
6729
/* @param argc   arguments for the control command                      */
6730
/* @param argl   arguments for the control command                      */
6731
/* @param **ret  return value of the control command                    */
6732
/* @return WOLFSSL_SUCCESS on successful, othewise WOLFSSL_FAILURE      */
6733
/* note: WOLFSSL_X509_L_ADD_STORE and WOLFSSL_X509_L_LOAD_STORE have not*/
6734
/*       yet implemented. It retutns WOLFSSL_NOT_IMPLEMENTED            */
6735
/*       when those control commands are passed.                        */
6736
int wolfSSL_X509_LOOKUP_ctrl(WOLFSSL_X509_LOOKUP *ctx, int cmd,
6737
        const char *argc, long argl, char **ret)
6738
{
6739
    int lret = WOLFSSL_FAILURE;
6740
6741
    WOLFSSL_ENTER("wolfSSL_X509_LOOKUP_ctrl");
6742
#if !defined(NO_FILESYSTEM)
6743
    if (ctx != NULL) {
6744
        switch (cmd) {
6745
        case WOLFSSL_X509_L_FILE_LOAD:
6746
            /* expects to return a number of processed cert or crl file */
6747
            lret = wolfSSL_X509_load_cert_crl_file(ctx, argc, (int)argl) > 0 ?
6748
                            WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
6749
            break;
6750
        case WOLFSSL_X509_L_ADD_DIR:
6751
            /* store directory loaction to use it later */
6752
#if !defined(NO_WOLFSSL_DIR)
6753
            lret = x509AddCertDir(ctx->dirs, argc, argl);
6754
#else
6755
            (void)x509AddCertDir;
6756
            lret = WOLFSSL_NOT_IMPLEMENTED;
6757
#endif
6758
            break;
6759
        case WOLFSSL_X509_L_ADD_STORE:
6760
        case WOLFSSL_X509_L_LOAD_STORE:
6761
            return WOLFSSL_NOT_IMPLEMENTED;
6762
6763
        default:
6764
            break;
6765
        }
6766
    }
6767
    (void)ret;
6768
#else
6769
    (void)ctx;
6770
    (void)argc;
6771
    (void)argl;
6772
    (void)ret;
6773
    (void)cmd;
6774
    (void)x509AddCertDir;
6775
    lret = WOLFSSL_NOT_IMPLEMENTED;
6776
#endif
6777
    return lret;
6778
}
6779
6780
6781
#if defined(WOLFSSL_CERT_GEN)
6782
static int wolfssl_x509_make_der(WOLFSSL_X509* x509, int req,
6783
        unsigned char* der, int* derSz, int includeSig);
6784
#endif
6785
6786
#ifdef WOLFSSL_CERT_GEN
6787
#ifndef NO_BIO
6788
/* Converts the X509 to DER format and outputs it into bio.
6789
 *
6790
 * bio  is the structure to hold output DER
6791
 * x509 certificate to create DER from
6792
 * req  if set then a CSR is generated
6793
 *
6794
 * returns WOLFSSL_SUCCESS on success
6795
 */
6796
static int loadX509orX509REQFromBio(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int req)
6797
{
6798
    int ret = WOLFSSL_FAILURE;
6799
    /* Get large buffer to hold cert der */
6800
    int derSz = X509_BUFFER_SZ;
6801
#ifdef WOLFSSL_SMALL_STACK
6802
    byte* der;
6803
#else
6804
    byte der[X509_BUFFER_SZ];
6805
#endif
6806
    WOLFSSL_ENTER("wolfSSL_i2d_X509_bio");
6807
6808
    if (bio == NULL || x509 == NULL) {
6809
        return WOLFSSL_FAILURE;
6810
    }
6811
6812
#ifdef WOLFSSL_SMALL_STACK
6813
    der = (byte*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
6814
    if (!der) {
6815
        WOLFSSL_MSG("malloc failed");
6816
        return WOLFSSL_FAILURE;
6817
    }
6818
#endif
6819
6820
    if (wolfssl_x509_make_der(x509, req, der, &derSz, 1) != WOLFSSL_SUCCESS) {
6821
        goto cleanup;
6822
    }
6823
6824
    if (wolfSSL_BIO_write(bio, der, derSz) != derSz) {
6825
        goto cleanup;
6826
    }
6827
6828
    ret = WOLFSSL_SUCCESS;
6829
cleanup:
6830
    #ifdef WOLFSSL_SMALL_STACK
6831
    XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
6832
    #endif
6833
6834
    return ret;
6835
}
6836
6837
/* Converts the X509 to DER format and outputs it into bio.
6838
 *
6839
 * bio  is the structure to hold output DER
6840
 * x509 certificate to create DER from
6841
 *
6842
 * returns WOLFSSL_SUCCESS on success
6843
 */
6844
int wolfSSL_i2d_X509_bio(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
6845
{
6846
    return loadX509orX509REQFromBio(bio, x509, 0);
6847
}
6848
6849
#ifdef WOLFSSL_CERT_REQ
6850
int wolfSSL_i2d_X509_REQ_bio(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
6851
{
6852
    return loadX509orX509REQFromBio(bio, x509, 1);
6853
}
6854
#endif /* WOLFSSL_CERT_REQ */
6855
#endif /* !NO_BIO */
6856
#endif /* WOLFSSL_CERT_GEN */
6857
6858
/* Converts an internal structure to a DER buffer
6859
 *
6860
 * x509 structure to get DER buffer from
6861
 * out  buffer to hold result. If NULL then *out is NULL then a new buffer is
6862
 *      created.
6863
 *
6864
 * returns the size of the DER result on success
6865
 */
6866
int wolfSSL_i2d_X509(WOLFSSL_X509* x509, unsigned char** out)
6867
{
6868
    const unsigned char* der;
6869
    int derSz = 0;
6870
6871
    WOLFSSL_ENTER("wolfSSL_i2d_X509");
6872
6873
    if (x509 == NULL) {
6874
        WOLFSSL_LEAVE("wolfSSL_i2d_X509", BAD_FUNC_ARG);
6875
        return BAD_FUNC_ARG;
6876
    }
6877
6878
    der = wolfSSL_X509_get_der(x509, &derSz);
6879
    if (der == NULL) {
6880
        WOLFSSL_LEAVE("wolfSSL_i2d_X509", MEMORY_E);
6881
        return MEMORY_E;
6882
    }
6883
6884
    if (out != NULL && *out == NULL) {
6885
        *out = (unsigned char*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_OPENSSL);
6886
        if (*out == NULL) {
6887
            WOLFSSL_LEAVE("wolfSSL_i2d_X509", MEMORY_E);
6888
            return MEMORY_E;
6889
        }
6890
    }
6891
6892
    if (out != NULL)
6893
        XMEMCPY(*out, der, derSz);
6894
6895
    WOLFSSL_LEAVE("wolfSSL_i2d_X509", derSz);
6896
    return derSz;
6897
}
6898
6899
#ifndef NO_BIO
6900
/**
6901
 * Converts the DER from bio and creates a WOLFSSL_X509 structure from it.
6902
 * @param bio  is the structure holding DER
6903
 * @param x509 certificate to create from DER. Can be NULL
6904
 * @param req  1 for a CSR and 0 for a x509 cert
6905
 * @return pointer to WOLFSSL_X509 structure on success and NULL on fail
6906
 */
6907
static WOLFSSL_X509* d2i_X509orX509REQ_bio(WOLFSSL_BIO* bio,
6908
                                            WOLFSSL_X509** x509, int req)
6909
{
6910
    WOLFSSL_X509* localX509 = NULL;
6911
    byte* mem  = NULL;
6912
    int    size;
6913
6914
    WOLFSSL_ENTER("wolfSSL_d2i_X509_bio");
6915
6916
    if (bio == NULL) {
6917
        WOLFSSL_MSG("Bad Function Argument bio is NULL");
6918
        return NULL;
6919
    }
6920
6921
    size = wolfSSL_BIO_get_len(bio);
6922
    if (size <= 0) {
6923
        WOLFSSL_MSG("wolfSSL_BIO_get_len error. Possibly no pending data.");
6924
        WOLFSSL_ERROR(ASN1_R_HEADER_TOO_LONG);
6925
        return NULL;
6926
    }
6927
6928
    if (!(mem = (byte*)XMALLOC(size, NULL, DYNAMIC_TYPE_OPENSSL))) {
6929
        WOLFSSL_MSG("malloc error");
6930
        return NULL;
6931
    }
6932
6933
    if ((size = wolfSSL_BIO_read(bio, mem, size)) == 0) {
6934
        WOLFSSL_MSG("wolfSSL_BIO_read error");
6935
        XFREE(mem, NULL, DYNAMIC_TYPE_OPENSSL);
6936
        return NULL;
6937
    }
6938
6939
    if (req) {
6940
#ifdef WOLFSSL_CERT_REQ
6941
        localX509 = wolfSSL_X509_REQ_d2i(NULL, mem, size);
6942
#else
6943
        WOLFSSL_MSG("CSR not compiled in");
6944
#endif
6945
    }
6946
    else {
6947
        localX509 = wolfSSL_X509_d2i(NULL, mem, size);
6948
    }
6949
    if (localX509 == NULL) {
6950
        WOLFSSL_MSG("wolfSSL_X509_d2i error");
6951
        XFREE(mem, NULL, DYNAMIC_TYPE_OPENSSL);
6952
        return NULL;
6953
    }
6954
6955
    if (x509 != NULL) {
6956
        *x509 = localX509;
6957
    }
6958
6959
    XFREE(mem, NULL, DYNAMIC_TYPE_OPENSSL);
6960
    return localX509;
6961
}
6962
6963
WOLFSSL_X509* wolfSSL_d2i_X509_bio(WOLFSSL_BIO* bio, WOLFSSL_X509** x509)
6964
{
6965
    return d2i_X509orX509REQ_bio(bio, x509, 0);
6966
}
6967
6968
#ifdef WOLFSSL_CERT_REQ
6969
WOLFSSL_X509* wolfSSL_d2i_X509_REQ_bio(WOLFSSL_BIO* bio, WOLFSSL_X509** x509)
6970
{
6971
    return d2i_X509orX509REQ_bio(bio, x509, 1);
6972
}
6973
#endif
6974
#endif /* !NO_BIO */
6975
6976
#endif /* OPENSSL_EXTRA */
6977
6978
#ifdef OPENSSL_EXTRA
6979
/* Use the public key to verify the signature. Note: this only verifies
6980
 * the certificate signature.
6981
 * returns WOLFSSL_SUCCESS on successful signature verification */
6982
static int verifyX509orX509REQ(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey, int req)
6983
{
6984
    int ret;
6985
    const byte* der;
6986
    int derSz = 0;
6987
    int type;
6988
6989
    (void)req;
6990
6991
    if (x509 == NULL || pkey == NULL) {
6992
        return WOLFSSL_FATAL_ERROR;
6993
    }
6994
6995
    der = wolfSSL_X509_get_der(x509, &derSz);
6996
    if (der == NULL) {
6997
        WOLFSSL_MSG("Error getting WOLFSSL_X509 DER");
6998
        return WOLFSSL_FATAL_ERROR;
6999
    }
7000
7001
    switch (pkey->type) {
7002
        case EVP_PKEY_RSA:
7003
            type = RSAk;
7004
            break;
7005
7006
        case EVP_PKEY_EC:
7007
            type = ECDSAk;
7008
            break;
7009
7010
        case EVP_PKEY_DSA:
7011
            type = DSAk;
7012
            break;
7013
7014
        default:
7015
            WOLFSSL_MSG("Unknown pkey key type");
7016
            return WOLFSSL_FATAL_ERROR;
7017
    }
7018
7019
#ifdef WOLFSSL_CERT_REQ
7020
    if (req)
7021
        ret = CheckCSRSignaturePubKey(der, derSz, x509->heap,
7022
                (unsigned char*)pkey->pkey.ptr, pkey->pkey_sz, type);
7023
    else
7024
#endif
7025
        ret = CheckCertSignaturePubKey(der, derSz, x509->heap,
7026
                (unsigned char*)pkey->pkey.ptr, pkey->pkey_sz, type);
7027
    if (ret == 0) {
7028
        return WOLFSSL_SUCCESS;
7029
    }
7030
    return WOLFSSL_FAILURE;
7031
}
7032
7033
int wolfSSL_X509_verify(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey)
7034
{
7035
    return verifyX509orX509REQ(x509, pkey, 0);
7036
}
7037
7038
#ifdef WOLFSSL_CERT_REQ
7039
int wolfSSL_X509_REQ_verify(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey)
7040
{
7041
    return verifyX509orX509REQ(x509, pkey, 1);
7042
}
7043
#endif /* WOLFSSL_CERT_REQ */
7044
7045
#if !defined(NO_FILESYSTEM)
7046
static void *wolfSSL_d2i_X509_fp_ex(XFILE file, void **x509, int type)
7047
{
7048
    void *newx509 = NULL;
7049
    byte *fileBuffer = NULL;
7050
    long sz = 0;
7051
7052
    /* init variable */
7053
    if (x509)
7054
        *x509 = NULL;
7055
7056
    /* argument check */
7057
    if (file == XBADFILE) {
7058
        return NULL;
7059
    }
7060
7061
    /* determine file size */
7062
    if (XFSEEK(file, 0, XSEEK_END) != 0) {
7063
        return NULL;
7064
    }
7065
    sz = XFTELL(file);
7066
    XREWIND(file);
7067
7068
    if (sz > MAX_WOLFSSL_FILE_SIZE || sz <= 0) {
7069
        WOLFSSL_MSG("d2i_X509_fp_ex file size error");
7070
        return NULL;
7071
    }
7072
7073
    fileBuffer = (byte *)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE);
7074
    if (fileBuffer != NULL) {
7075
        if ((long)XFREAD(fileBuffer, 1, sz, file) != sz) {
7076
            WOLFSSL_MSG("File read failed");
7077
            goto err_exit;
7078
        }
7079
        if (type == CERT_TYPE) {
7080
            newx509 = (void *)wolfSSL_X509_d2i(NULL, fileBuffer, (int)sz);
7081
        }
7082
    #ifdef HAVE_CRL
7083
        else if (type == CRL_TYPE) {
7084
            newx509 = (void *)wolfSSL_d2i_X509_CRL(NULL, fileBuffer, (int)sz);
7085
        }
7086
    #endif
7087
    #if !defined(NO_ASN) && !defined(NO_PWDBASED) && defined(HAVE_PKCS12)
7088
        else if (type == PKCS12_TYPE) {
7089
            if ((newx509 = wc_PKCS12_new()) == NULL) {
7090
                goto err_exit;
7091
            }
7092
            if (wc_d2i_PKCS12(fileBuffer, (int)sz, (WC_PKCS12*)newx509) < 0) {
7093
                goto err_exit;
7094
            }
7095
        }
7096
    #endif
7097
        else {
7098
            goto err_exit;
7099
        }
7100
        if (newx509 == NULL) {
7101
            WOLFSSL_MSG("X509 failed");
7102
            goto err_exit;
7103
        }
7104
    }
7105
7106
    if (x509)
7107
        *x509 = newx509;
7108
7109
    goto _exit;
7110
7111
err_exit:
7112
#if !defined(NO_ASN) && !defined(NO_PWDBASED) && defined(HAVE_PKCS12)
7113
    if ((newx509 != NULL) && (type == PKCS12_TYPE)) {
7114
        wc_PKCS12_free((WC_PKCS12*)newx509);
7115
        newx509 = NULL;
7116
    }
7117
#endif
7118
_exit:
7119
    if (fileBuffer != NULL)
7120
        XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
7121
7122
    return newx509;
7123
}
7124
7125
WOLFSSL_X509 *wolfSSL_d2i_X509_fp(XFILE fp, WOLFSSL_X509 **x509)
7126
{
7127
    WOLFSSL_ENTER("wolfSSL_d2i_X509_fp");
7128
    return (WOLFSSL_X509 *)wolfSSL_d2i_X509_fp_ex(fp, (void **)x509, CERT_TYPE);
7129
}
7130
/* load certificate or CRL file, and add it to the STORE           */
7131
/* @param ctx    a pointer to X509_LOOKUP structure                */
7132
/* @param file   file name to load                                 */
7133
/* @param type   WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1     */
7134
/* @return a number of loading CRL or certificate, otherwise zero  */
7135
WOLFSSL_API int wolfSSL_X509_load_cert_crl_file(WOLFSSL_X509_LOOKUP *ctx,
7136
    const char *file, int type)
7137
{
7138
    WOLFSSL_X509 *x509 = NULL;
7139
7140
    int cnt = 0;
7141
7142
    WOLFSSL_ENTER("wolfSSL_X509_load_cert_crl_file");
7143
7144
    /* stanity check */
7145
    if (ctx == NULL || file == NULL) {
7146
        WOLFSSL_MSG("bad arguments");
7147
        return 0;
7148
    }
7149
7150
    if (type != WOLFSSL_FILETYPE_PEM) {
7151
        x509 = wolfSSL_X509_load_certificate_file(file, type);
7152
        if (x509 != NULL) {
7153
            if (wolfSSL_X509_STORE_add_cert(ctx->store, x509)
7154
                                    == WOLFSSL_SUCCESS) {
7155
                cnt++;
7156
            } else {
7157
                WOLFSSL_MSG("wolfSSL_X509_STORE_add_cert error");
7158
            }
7159
            wolfSSL_X509_free(x509);
7160
            x509 = NULL;
7161
        } else {
7162
            WOLFSSL_MSG("wolfSSL_X509_load_certificate_file error");
7163
        }
7164
7165
    } else {
7166
#if defined(OPENSSL_ALL)
7167
    #if !defined(NO_BIO)
7168
        STACK_OF(WOLFSSL_X509_INFO) *info;
7169
        WOLFSSL_X509_INFO *info_tmp;
7170
        int i;
7171
        int num = 0;
7172
        WOLFSSL_BIO *bio = wolfSSL_BIO_new_file(file, "rb");
7173
        if(!bio) {
7174
            WOLFSSL_MSG("wolfSSL_BIO_new error");
7175
            return cnt;
7176
        }
7177
7178
        info = wolfSSL_PEM_X509_INFO_read_bio(bio, NULL, NULL, NULL);
7179
7180
        wolfSSL_BIO_free(bio);
7181
7182
        if (!info) {
7183
            WOLFSSL_MSG("wolfSSL_PEM_X509_INFO_read_bio error");
7184
            return cnt;
7185
        }
7186
        num = wolfSSL_sk_X509_INFO_num(info);
7187
        for (i=0; i < num; i++) {
7188
            info_tmp = wolfSSL_sk_X509_INFO_value(info, i);
7189
7190
            if (info_tmp->x509) {
7191
                if(wolfSSL_X509_STORE_add_cert(ctx->store, info_tmp->x509) ==
7192
                    WOLFSSL_SUCCESS) {
7193
                    cnt ++;
7194
                } else {
7195
                    WOLFSSL_MSG("wolfSSL_X509_STORE_add_cert failed");
7196
                }
7197
            }
7198
#ifdef HAVE_CRL
7199
            if (info_tmp->crl) {
7200
                if(wolfSSL_X509_STORE_add_crl(ctx->store, info_tmp->crl) ==
7201
                    WOLFSSL_SUCCESS) {
7202
                    cnt ++;
7203
                } else {
7204
                    WOLFSSL_MSG("wolfSSL_X509_STORE_add_crl failed");
7205
                }
7206
            }
7207
#endif
7208
        }
7209
        wolfSSL_sk_X509_INFO_pop_free(info, wolfSSL_X509_INFO_free);
7210
    #else
7211
        /* Only supports one certificate or CRL in the file. */
7212
        WOLFSSL_X509_CRL* crl = NULL;
7213
        XFILE fp = XFOPEN(file, "rb");
7214
        if (fp == XBADFILE) {
7215
            WOLFSSL_MSG("XFOPEN error");
7216
            return cnt;
7217
        }
7218
7219
        x509 = wolfSSL_PEM_read_X509(fp, NULL, NULL, NULL);
7220
        if (x509 != NULL) {
7221
            if (wolfSSL_X509_STORE_add_cert(ctx->store, x509) ==
7222
                WOLFSSL_SUCCESS) {
7223
                cnt++;
7224
            }
7225
            else {
7226
                WOLFSSL_MSG("wolfSSL_X509_STORE_add_cert failed");
7227
            }
7228
        }
7229
        else {
7230
            XREWIND(fp);
7231
            crl = wolfSSL_PEM_read_X509_CRL(fp, NULL, NULL, NULL);
7232
            if (crl != NULL) {
7233
                if (wolfSSL_X509_STORE_add_crl(ctx->store, crl) ==
7234
                    WOLFSSL_SUCCESS) {
7235
                    cnt++;
7236
                }
7237
                else {
7238
                    WOLFSSL_MSG("wolfSSL_X509_STORE_add_crl failed");
7239
                }
7240
            }
7241
            else {
7242
                WOLFSSL_MSG("Certificate and CRL not recognized");
7243
                return cnt;
7244
            }
7245
        }
7246
7247
        wolfSSL_X509_free(x509);
7248
        wolfSSL_X509_CRL_free(crl);
7249
    #endif
7250
#else
7251
    (void)cnt;
7252
#endif /* OPENSSL_ALL && !NO_BIO */
7253
    }
7254
7255
    WOLFSSL_LEAVE("wolfSSL_X509_load_ceretificate_crl_file", cnt);
7256
    return cnt;
7257
}
7258
#endif /* !NO_FILESYSTEM */
7259
7260
7261
#ifdef HAVE_CRL
7262
7263
#ifndef NO_BIO
7264
WOLFSSL_API WOLFSSL_X509_CRL *wolfSSL_d2i_X509_CRL_bio(WOLFSSL_BIO *bp,
7265
                                                    WOLFSSL_X509_CRL **x)
7266
{
7267
    int derSz;
7268
    byte* der = NULL;
7269
    WOLFSSL_X509_CRL* crl = NULL;
7270
7271
    if (bp == NULL)
7272
        return NULL;
7273
7274
    if ((derSz = wolfSSL_BIO_get_len(bp)) > 0) {
7275
        der = (byte*)XMALLOC(derSz, 0, DYNAMIC_TYPE_DER);
7276
        if (der != NULL) {
7277
            if (wolfSSL_BIO_read(bp, der, derSz) == derSz) {
7278
                crl = wolfSSL_d2i_X509_CRL(x, der, derSz);
7279
            }
7280
        }
7281
    }
7282
7283
    if (der != NULL) {
7284
        XFREE(der, 0, DYNAMIC_TYPE_DER);
7285
    }
7286
7287
    return crl;
7288
}
7289
#endif
7290
7291
#ifndef NO_FILESYSTEM
7292
WOLFSSL_X509_CRL *wolfSSL_d2i_X509_CRL_fp(XFILE fp, WOLFSSL_X509_CRL **crl)
7293
{
7294
    WOLFSSL_ENTER("wolfSSL_d2i_X509_CRL_fp");
7295
    return (WOLFSSL_X509_CRL *)wolfSSL_d2i_X509_fp_ex(fp, (void **)crl, CRL_TYPE);
7296
}
7297
7298
/* Read CRL file, and add it to store and corresponding cert manager    */
7299
/* @param ctx   a pointer of X509_LOOKUP back to the X509_STORE         */
7300
/* @param file  a file to read                                          */
7301
/* @param type  WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1           */
7302
/* @return WOLFSSL_SUCCESS(1) on successful, othewise WOLFSSL_FAILURE(0)*/
7303
WOLFSSL_API int wolfSSL_X509_load_crl_file(WOLFSSL_X509_LOOKUP *ctx,
7304
                                             const char *file, int type)
7305
{
7306
#ifndef NO_BIO
7307
    int ret = WOLFSSL_FAILURE;
7308
    int count = 0;
7309
    WOLFSSL_BIO *bio = NULL;
7310
    WOLFSSL_X509_CRL *crl = NULL;
7311
7312
    WOLFSSL_ENTER("wolfSSL_X509_load_crl_file");
7313
7314
    if (ctx == NULL || file == NULL)
7315
        return ret;
7316
7317
    if ((bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file())) == NULL)
7318
        return ret;
7319
7320
    if (wolfSSL_BIO_read_filename(bio, file) <= 0) {
7321
        wolfSSL_BIO_free(bio);
7322
        return ret;
7323
    }
7324
7325
    if (wolfSSL_BIO_read_filename(bio, file) <= 0) {
7326
        wolfSSL_BIO_free(bio);
7327
        return ret;
7328
    }
7329
7330
    if (type == WOLFSSL_FILETYPE_PEM) {
7331
        do {
7332
            crl = wolfSSL_PEM_read_bio_X509_CRL(bio, NULL, NULL, NULL);
7333
            if (crl == NULL) {
7334
                if (count <= 0) {
7335
                    WOLFSSL_MSG("Load crl failed");
7336
                }
7337
                break;
7338
            }
7339
7340
            ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
7341
            if (ret == WOLFSSL_FAILURE) {
7342
                WOLFSSL_MSG("Adding crl failed");
7343
                break;
7344
            }
7345
            count++;
7346
            wolfSSL_X509_CRL_free(crl);
7347
            crl = NULL;
7348
        }   while(crl == NULL);
7349
7350
        ret = count;
7351
    } else if (type == WOLFSSL_FILETYPE_ASN1) {
7352
        crl = wolfSSL_d2i_X509_CRL_bio(bio, NULL);
7353
        if (crl == NULL) {
7354
            WOLFSSL_MSG("Load crl failed");
7355
        } else {
7356
            ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
7357
            if (ret == WOLFSSL_FAILURE) {
7358
                WOLFSSL_MSG("Adding crl failed");
7359
            } else {
7360
                ret = 1;/* handled a file */
7361
            }
7362
        }
7363
    } else {
7364
        WOLFSSL_MSG("Invalid file type");
7365
    }
7366
7367
    wolfSSL_X509_CRL_free(crl);
7368
    wolfSSL_BIO_free(bio);
7369
7370
    WOLFSSL_LEAVE("wolfSSL_X509_load_crl_file", ret);
7371
    return ret;
7372
#else
7373
    int ret = WOLFSSL_FAILURE;
7374
    int count = 0;
7375
    XFILE fp;
7376
    WOLFSSL_X509_CRL *crl = NULL;
7377
7378
    WOLFSSL_ENTER("wolfSSL_X509_load_crl_file");
7379
7380
    if (ctx == NULL || file == NULL)
7381
        return ret;
7382
7383
    if ((fp = XFOPEN(file, "rb")) == XBADFILE)
7384
        return ret;
7385
7386
    if (type == WOLFSSL_FILETYPE_PEM) {
7387
        do {
7388
            crl = wolfSSL_PEM_read_X509_CRL(fp, NULL, NULL, NULL);
7389
            if (crl == NULL) {
7390
                if (count <= 0) {
7391
                    WOLFSSL_MSG("Load crl failed");
7392
                }
7393
                break;
7394
            }
7395
7396
            ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
7397
            if (ret == WOLFSSL_FAILURE) {
7398
                WOLFSSL_MSG("Adding crl failed");
7399
                break;
7400
            }
7401
            count++;
7402
            wolfSSL_X509_CRL_free(crl);
7403
            crl = NULL;
7404
        }
7405
        while(crl == NULL);
7406
7407
        ret = count;
7408
    }
7409
    else if (type == WOLFSSL_FILETYPE_ASN1) {
7410
        crl = wolfSSL_d2i_X509_CRL_fp(fp, NULL);
7411
        if (crl == NULL) {
7412
            WOLFSSL_MSG("Load crl failed");
7413
        }
7414
        else {
7415
            ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
7416
            if (ret == WOLFSSL_FAILURE) {
7417
                WOLFSSL_MSG("Adding crl failed");
7418
            }
7419
            else {
7420
                ret = 1;/* handled a file */
7421
            }
7422
        }
7423
    }
7424
    else {
7425
        WOLFSSL_MSG("Invalid file type");
7426
    }
7427
7428
    wolfSSL_X509_CRL_free(crl);
7429
    XFCLOSE(fp);
7430
7431
    WOLFSSL_LEAVE("wolfSSL_X509_load_crl_file", ret);
7432
    return ret;
7433
#endif /* !NO_BIO */
7434
}
7435
#endif /* !NO_FILESYSTEM */
7436
7437
7438
WOLFSSL_X509_CRL* wolfSSL_d2i_X509_CRL(WOLFSSL_X509_CRL** crl,
7439
        const unsigned char* in, int len)
7440
{
7441
    WOLFSSL_X509_CRL *newcrl = NULL;
7442
    int ret = WOLFSSL_SUCCESS;
7443
7444
    WOLFSSL_ENTER("wolfSSL_d2i_X509_CRL");
7445
7446
    if (in == NULL) {
7447
        WOLFSSL_MSG("Bad argument value");
7448
    } else {
7449
        newcrl =(WOLFSSL_X509_CRL*)XMALLOC(sizeof(WOLFSSL_X509_CRL), NULL,
7450
                DYNAMIC_TYPE_CRL);
7451
        if (newcrl == NULL){
7452
            WOLFSSL_MSG("New CRL allocation failed");
7453
        } else {
7454
            ret = InitCRL(newcrl, NULL);
7455
            if (ret < 0) {
7456
                WOLFSSL_MSG("Init tmp CRL failed");
7457
            } else {
7458
                ret = BufferLoadCRL(newcrl, in, len, WOLFSSL_FILETYPE_ASN1,
7459
                    NO_VERIFY);
7460
                if (ret != WOLFSSL_SUCCESS) {
7461
                    WOLFSSL_MSG("Buffer Load CRL failed");
7462
                } else {
7463
                    if (crl) {
7464
                        *crl = newcrl;
7465
                    }
7466
                }
7467
            }
7468
        }
7469
    }
7470
7471
    if((ret != WOLFSSL_SUCCESS) && (newcrl != NULL)) {
7472
        wolfSSL_X509_CRL_free(newcrl);
7473
        newcrl = NULL;
7474
    }
7475
7476
    return newcrl;
7477
}
7478
7479
/* Retrieve issuer X509_NAME from CRL
7480
 * return X509_NAME*  on success
7481
 * return NULL on failure
7482
 */
7483
WOLFSSL_X509_NAME* wolfSSL_X509_CRL_get_issuer_name(WOLFSSL_X509_CRL* crl)
7484
{
7485
    if (crl == NULL || crl->crlList == NULL)
7486
        return NULL;
7487
7488
    return crl->crlList->issuer;
7489
}
7490
7491
/* Retrieve version from CRL
7492
 * return version on success
7493
 * return 0 on failure
7494
 */
7495
int wolfSSL_X509_CRL_version(WOLFSSL_X509_CRL* crl)
7496
{
7497
    if (crl == NULL || crl->crlList == NULL)
7498
        return 0;
7499
7500
    return crl->crlList->version;
7501
}
7502
7503
/* Retrieve sig OID from CRL
7504
 * return OID on success
7505
 * return 0 on failure
7506
 */
7507
int wolfSSL_X509_CRL_get_signature_type(WOLFSSL_X509_CRL* crl)
7508
{
7509
    if (crl == NULL || crl->crlList == NULL)
7510
        return 0;
7511
7512
    return crl->crlList->signatureOID;
7513
}
7514
7515
/* Retrieve sig NID from CRL
7516
 * return NID on success
7517
 * return 0 on failure
7518
 */
7519
int wolfSSL_X509_CRL_get_signature_nid(const WOLFSSL_X509_CRL* crl)
7520
{
7521
    if (crl == NULL || crl->crlList == NULL)
7522
        return 0;
7523
7524
    return oid2nid(crl->crlList->signatureOID, oidSigType);
7525
}
7526
7527
/* Retrieve signature from CRL
7528
 * return WOLFSSL_SUCCESS on success
7529
 */
7530
int wolfSSL_X509_CRL_get_signature(WOLFSSL_X509_CRL* crl,
7531
    unsigned char* buf, int* bufSz)
7532
{
7533
    WOLFSSL_ENTER("wolfSSL_X509_CRL_get_signature");
7534
7535
    if (crl == NULL || crl->crlList == NULL || bufSz == NULL)
7536
        return BAD_FUNC_ARG;
7537
7538
    if (buf != NULL)
7539
        XMEMCPY(buf, crl->crlList->signature, *bufSz);
7540
    *bufSz = (int)crl->crlList->signatureSz;
7541
7542
    return WOLFSSL_SUCCESS;
7543
}
7544
7545
/* Retrieve serial number from RevokedCert
7546
 * return WOLFSSL_SUCCESS on success
7547
 */
7548
int wolfSSL_X509_REVOKED_get_serial_number(RevokedCert* rev,
7549
    byte* in, int* inOutSz)
7550
{
7551
    WOLFSSL_ENTER("wolfSSL_X509_REVOKED_get_serial_number");
7552
    if (rev == NULL || inOutSz == NULL) {
7553
        return BAD_FUNC_ARG;
7554
    }
7555
7556
    if (in != NULL) {
7557
        if (*inOutSz < rev->serialSz) {
7558
            WOLFSSL_MSG("Serial buffer too small");
7559
            return BUFFER_E;
7560
        }
7561
        XMEMCPY(in, rev->serialNumber, rev->serialSz);
7562
    }
7563
    *inOutSz = rev->serialSz;
7564
7565
    return WOLFSSL_SUCCESS;
7566
}
7567
7568
/* print serial number out
7569
* return WOLFSSL_SUCCESS on success
7570
*/
7571
static int X509RevokedPrintSerial(WOLFSSL_BIO* bio, RevokedCert* rev,
7572
    int indent)
7573
{
7574
    unsigned char serial[32];
7575
    int  sz = sizeof(serial);
7576
7577
    XMEMSET(serial, 0, sz);
7578
    if (wolfSSL_X509_REVOKED_get_serial_number(rev, serial, &sz)
7579
            == WOLFSSL_SUCCESS) {
7580
        X509PrintSerial_ex(bio, serial, sz, 0, indent);
7581
    }
7582
    return WOLFSSL_SUCCESS;
7583
}
7584
7585
7586
/* print out the signature in human readable format for use with
7587
* wolfSSL_X509_CRL_print()
7588
 * return WOLFSSL_SUCCESS on success
7589
 */
7590
static int X509CRLPrintSignature(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl,
7591
        int algOnly, int indent)
7592
{
7593
    int sigSz = 0;
7594
7595
    if (wolfSSL_X509_CRL_get_signature(crl, NULL, &sigSz) <= 0) {
7596
        return WOLFSSL_FAILURE;
7597
    }
7598
7599
    if (sigSz > 0) {
7600
        unsigned char* sig;
7601
        int sigNid = wolfSSL_X509_CRL_get_signature_nid(crl);
7602
7603
        sig = (unsigned char*)XMALLOC(sigSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
7604
        if (sig == NULL) {
7605
            return WOLFSSL_FAILURE;
7606
        }
7607
7608
        if (wolfSSL_X509_CRL_get_signature(crl, sig, &sigSz) <= 0) {
7609
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
7610
            return WOLFSSL_FAILURE;
7611
        }
7612
7613
        if (X509PrintSignature_ex(bio, sig, sigSz, sigNid, algOnly, indent)
7614
                != WOLFSSL_SUCCESS) {
7615
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
7616
            return WOLFSSL_FAILURE;
7617
        }
7618
7619
        if (sig != NULL) {
7620
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
7621
        }
7622
7623
    }
7624
7625
    return WOLFSSL_SUCCESS;
7626
}
7627
7628
/* print out the extensions in human readable format for use with
7629
 * wolfSSL_X509_CRL_print()
7630
 * return WOLFSSL_SUCCESS on success
7631
 */
7632
static int X509CRLPrintExtensions(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl,
7633
        int indent)
7634
{
7635
    char tmp[MAX_WIDTH]; /* buffer for XSNPRINTF */
7636
7637
    if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s\n", indent, "",
7638
                "CRL extensions:") >= MAX_WIDTH) {
7639
        return WOLFSSL_FAILURE;
7640
    }
7641
7642
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
7643
            return WOLFSSL_FAILURE;
7644
    }
7645
7646
    if (crl->crlList->crlNumber) {
7647
        if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s\n", indent + 4, "",
7648
                    "X509v3 CRL Number:") >= MAX_WIDTH) {
7649
            return WOLFSSL_FAILURE;
7650
        }
7651
7652
        if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
7653
            return WOLFSSL_FAILURE;
7654
        }
7655
7656
        if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%d\n", indent + 8, "",
7657
            crl->crlList->crlNumber) >= MAX_WIDTH)
7658
        {
7659
            return WOLFSSL_FAILURE;
7660
        }
7661
        if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
7662
            return WOLFSSL_FAILURE;
7663
        }
7664
        XMEMSET(tmp, 0, sizeof(tmp));
7665
    }
7666
7667
#if !defined(NO_SKID)
7668
    if (crl->crlList->extAuthKeyIdSet && crl->crlList->extAuthKeyId[0] != 0) {
7669
        word32 i;
7670
        char val[5];
7671
        int valSz = 5;
7672
7673
        if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s", indent + 4, "",
7674
                    "X509v3 Authority Key Identifier:") >= MAX_WIDTH) {
7675
            return WOLFSSL_FAILURE;
7676
        }
7677
7678
        XSTRNCAT(tmp, "\n", MAX_WIDTH - XSTRLEN(tmp) - 1);
7679
7680
        if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
7681
            return WOLFSSL_FAILURE;
7682
        }
7683
        XMEMSET(tmp, 0, MAX_WIDTH);
7684
7685
        if (XSNPRINTF(tmp, MAX_WIDTH - 1, "%*s%s",
7686
                    indent + 8, "", "keyid") >= MAX_WIDTH) {
7687
            return WOLFSSL_FAILURE;
7688
        }
7689
7690
7691
        for (i = 0; i < XSTRLEN((char*)crl->crlList->extAuthKeyId); i++) {
7692
            /* check if buffer is almost full */
7693
            if (XSTRLEN(tmp) >= sizeof(tmp) - valSz) {
7694
                if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
7695
                    return WOLFSSL_FAILURE;
7696
                }
7697
                tmp[0] = '\0';
7698
            }
7699
            if (XSNPRINTF(val, valSz, ":%02X", crl->crlList->extAuthKeyId[i])
7700
                >= valSz)
7701
            {
7702
                WOLFSSL_MSG("buffer overrun");
7703
                return WOLFSSL_FAILURE;
7704
            }
7705
            XSTRNCAT(tmp, val, valSz);
7706
        }
7707
        XSTRNCAT(tmp, "\n", XSTRLEN("\n") + 1);
7708
        if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
7709
            return WOLFSSL_FAILURE;
7710
        }
7711
    }
7712
#endif
7713
7714
    return WOLFSSL_SUCCESS;
7715
}
7716
7717
/* iterate through a CRL's Revoked Certs and print out in human
7718
 * readable format for use with wolfSSL_X509_CRL_print()
7719
 * return WOLFSSL_SUCCESS on success
7720
 */
7721
static int X509CRLPrintRevoked(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl,
7722
        int indent)
7723
{
7724
    char tmp[MAX_WIDTH]; /* buffer for XSNPRINTF */
7725
    int i;
7726
7727
    if (crl->crlList->totalCerts > 0) {
7728
        RevokedCert* revoked = crl->crlList->certs;
7729
7730
        if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s\n", indent, "",
7731
                    "Revoked Certificates:") >= MAX_WIDTH) {
7732
            return WOLFSSL_FAILURE;
7733
        }
7734
7735
        if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
7736
            return WOLFSSL_FAILURE;
7737
        }
7738
        XMEMSET(tmp, 0, MAX_WIDTH);
7739
7740
        for (i = 0; i < crl->crlList->totalCerts; i++) {
7741
            if (revoked->serialSz > 0) {
7742
                if (X509RevokedPrintSerial(bio, revoked, indent + 4)
7743
                        != WOLFSSL_SUCCESS) {
7744
                    return WOLFSSL_FAILURE;
7745
                }
7746
            }
7747
        #ifndef NO_ASN_TIME
7748
             if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s", indent + 8, "",
7749
                         "Revocation Date: ") >= MAX_WIDTH) {
7750
                return WOLFSSL_FAILURE;
7751
            }
7752
7753
            if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
7754
                return WOLFSSL_FAILURE;
7755
            }
7756
7757
            if (revoked->revDate[0] != 0) {
7758
                if (GetTimeString(revoked->revDate, ASN_UTC_TIME,
7759
                    tmp, MAX_WIDTH) != WOLFSSL_SUCCESS) {
7760
                    if (GetTimeString(revoked->revDate, ASN_GENERALIZED_TIME,
7761
                    tmp, MAX_WIDTH) != WOLFSSL_SUCCESS) {
7762
                        WOLFSSL_MSG("Error getting revocation date");
7763
                        return WOLFSSL_FAILURE;
7764
                    }
7765
                }
7766
            }
7767
            else {
7768
                XSTRNCPY(tmp, "Not Set", MAX_WIDTH-1);
7769
            }
7770
            tmp[MAX_WIDTH - 1] = '\0'; /* make sure null terminated */
7771
            if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
7772
                return WOLFSSL_FAILURE;
7773
            }
7774
7775
            if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
7776
                return WOLFSSL_FAILURE;
7777
            }
7778
        #endif
7779
            revoked = revoked->next;
7780
        }
7781
    }
7782
    else {
7783
        if (wolfSSL_BIO_write(bio, "No Revoked Certificates.\n",
7784
                       (int)XSTRLEN("No Revoked Certificates.\n")) <= 0) {
7785
            return WOLFSSL_FAILURE;
7786
        }
7787
    }
7788
7789
    return WOLFSSL_SUCCESS;
7790
}
7791
7792
#ifndef NO_ASN_TIME
7793
/* print out the last/next update times in human readable
7794
 * format for use with wolfSSL_X509_CRL_print()
7795
 * return WOLFSSL_SUCCESS on success
7796
 */
7797
static int X509CRLPrintDates(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl,
7798
        int indent)
7799
{
7800
    char tmp[MAX_WIDTH]; /* buffer for XSNPRINTF */
7801
7802
    if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s", indent, "",
7803
                "Last Update: ") >= MAX_WIDTH) {
7804
        return WOLFSSL_FAILURE;
7805
    }
7806
7807
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
7808
        return WOLFSSL_FAILURE;
7809
    }
7810
7811
    if (crl->crlList->lastDate[0] != 0) {
7812
        if (GetTimeString(crl->crlList->lastDate, ASN_UTC_TIME,
7813
            tmp, MAX_WIDTH) != WOLFSSL_SUCCESS) {
7814
            if (GetTimeString(crl->crlList->lastDate, ASN_GENERALIZED_TIME,
7815
            tmp, MAX_WIDTH) != WOLFSSL_SUCCESS) {
7816
                WOLFSSL_MSG("Error getting last update date");
7817
                return WOLFSSL_FAILURE;
7818
            }
7819
        }
7820
    }
7821
    else {
7822
        XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
7823
    }
7824
    tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
7825
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
7826
        return WOLFSSL_FAILURE;
7827
    }
7828
7829
    if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
7830
        return WOLFSSL_FAILURE;
7831
    }
7832
7833
    if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s", indent, "",
7834
                "Next Update: ") >= MAX_WIDTH) {
7835
        return WOLFSSL_FAILURE;
7836
    }
7837
7838
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
7839
        return WOLFSSL_FAILURE;
7840
    }
7841
7842
    if (crl->crlList->nextDate[0] != 0) {
7843
        if (GetTimeString(crl->crlList->nextDate, ASN_UTC_TIME,
7844
            tmp, MAX_WIDTH) != WOLFSSL_SUCCESS) {
7845
            if (GetTimeString(crl->crlList->nextDate, ASN_GENERALIZED_TIME,
7846
            tmp, MAX_WIDTH) != WOLFSSL_SUCCESS) {
7847
                WOLFSSL_MSG("Error getting next update date");
7848
                return WOLFSSL_FAILURE;
7849
            }
7850
        }
7851
    }
7852
    else {
7853
        XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
7854
    }
7855
    tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
7856
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
7857
        return WOLFSSL_FAILURE;
7858
    }
7859
7860
    if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
7861
        return WOLFSSL_FAILURE;
7862
    }
7863
7864
    return WOLFSSL_SUCCESS;
7865
}
7866
#endif
7867
7868
#if !defined(NO_BIO) && defined(XSNPRINTF)
7869
/* Writes the human readable form of x509 to bio.
7870
 *
7871
 * bio  WOLFSSL_BIO to write to.
7872
 * crl Certificate revocation list to write.
7873
 *
7874
 * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on failure
7875
 */
7876
int wolfSSL_X509_CRL_print(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl)
7877
{
7878
    char issuType[] = "Issuer: ";
7879
7880
    if (bio == NULL || crl == NULL || crl->crlList == NULL) {
7881
        return WOLFSSL_FAILURE;
7882
    }
7883
7884
    if (wolfSSL_BIO_write(bio, "Certificate Revocation List (CRL):\n",
7885
                  (int)XSTRLEN("Certificate Revocation List (CRL):\n")) <= 0) {
7886
            return WOLFSSL_FAILURE;
7887
    }
7888
7889
    /* print version */
7890
    if (X509PrintVersion(bio, wolfSSL_X509_CRL_version(crl), 8)
7891
            != WOLFSSL_SUCCESS) {
7892
        return WOLFSSL_FAILURE;
7893
    }
7894
7895
    /* print signature algo */
7896
    if (X509CRLPrintSignature(bio, crl, 1, 8) != WOLFSSL_SUCCESS) {
7897
        return WOLFSSL_FAILURE;
7898
    }
7899
7900
    /* print issuer name */
7901
    if (X509PrintName(bio, wolfSSL_X509_CRL_get_issuer_name(crl), issuType, 8)
7902
            != WOLFSSL_SUCCESS) {
7903
        return WOLFSSL_FAILURE;
7904
    }
7905
7906
#ifndef NO_ASN_TIME
7907
    /* print last and next update times */
7908
    if (X509CRLPrintDates(bio, crl, 8) != WOLFSSL_SUCCESS) {
7909
        return WOLFSSL_FAILURE;
7910
    }
7911
#endif
7912
7913
    /* print CRL extensions */
7914
    if (X509CRLPrintExtensions(bio, crl, 8) != WOLFSSL_SUCCESS) {
7915
        return WOLFSSL_FAILURE;
7916
    }
7917
7918
    /* print CRL Revoked Certs */
7919
    if (X509CRLPrintRevoked(bio, crl, 0) != WOLFSSL_SUCCESS) {
7920
        return WOLFSSL_FAILURE;
7921
    }
7922
7923
    if (X509CRLPrintSignature(bio, crl, 0, 4) != WOLFSSL_SUCCESS) {
7924
        return WOLFSSL_FAILURE;
7925
    }
7926
7927
    if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
7928
        return WOLFSSL_FAILURE;
7929
    }
7930
7931
    return WOLFSSL_SUCCESS;
7932
}
7933
#endif /* !NO_BIO && XSNPRINTF */
7934
#endif /* HAVE_CRL */
7935
#endif /* OPENSSL_EXTRA */
7936
7937
#if defined(HAVE_CRL) && (defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL))
7938
void wolfSSL_X509_CRL_free(WOLFSSL_X509_CRL *crl)
7939
{
7940
    WOLFSSL_ENTER("wolfSSL_X509_CRL_free");
7941
7942
    if (crl)
7943
        FreeCRL(crl, 1);
7944
}
7945
#endif /* HAVE_CRL && (OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL) */
7946
7947
#ifdef OPENSSL_EXTRA
7948
#ifndef NO_WOLFSSL_STUB
7949
WOLFSSL_ASN1_TIME* wolfSSL_X509_CRL_get_lastUpdate(WOLFSSL_X509_CRL* crl)
7950
{
7951
    (void)crl;
7952
    WOLFSSL_STUB("X509_CRL_get_lastUpdate");
7953
    return 0;
7954
}
7955
#endif
7956
#ifndef NO_WOLFSSL_STUB
7957
WOLFSSL_ASN1_TIME* wolfSSL_X509_CRL_get_nextUpdate(WOLFSSL_X509_CRL* crl)
7958
{
7959
    (void)crl;
7960
    WOLFSSL_STUB("X509_CRL_get_nextUpdate");
7961
    return 0;
7962
}
7963
#endif
7964
7965
7966
#ifndef NO_WOLFSSL_STUB
7967
int wolfSSL_X509_CRL_verify(WOLFSSL_X509_CRL* crl, WOLFSSL_EVP_PKEY* key)
7968
{
7969
    (void)crl;
7970
    (void)key;
7971
    WOLFSSL_STUB("X509_CRL_verify");
7972
    return 0;
7973
}
7974
#endif
7975
#endif /* OPENSSL_EXTRA */
7976
7977
#ifdef OPENSSL_EXTRA
7978
7979
7980
WOLFSSL_X509_VERIFY_PARAM* wolfSSL_X509_VERIFY_PARAM_new(void)
7981
{
7982
    WOLFSSL_X509_VERIFY_PARAM *param = NULL;
7983
    param = (WOLFSSL_X509_VERIFY_PARAM*)XMALLOC(
7984
            sizeof(WOLFSSL_X509_VERIFY_PARAM), NULL, DYNAMIC_TYPE_OPENSSL);
7985
    if (param != NULL)
7986
        XMEMSET(param, 0, sizeof(WOLFSSL_X509_VERIFY_PARAM ));
7987
7988
    return(param);
7989
}
7990
7991
7992
void wolfSSL_X509_VERIFY_PARAM_free(WOLFSSL_X509_VERIFY_PARAM *param)
7993
{
7994
    if (param != NULL)
7995
        XFREE(param, NULL, DYNAMIC_TYPE_OPENSSL);
7996
}
7997
7998
7999
/* Sets flags by OR'ing with existing value. */
8000
int wolfSSL_X509_VERIFY_PARAM_set_flags(WOLFSSL_X509_VERIFY_PARAM *param,
8001
        unsigned long flags)
8002
{
8003
    int ret = WOLFSSL_FAILURE;
8004
8005
    if (param != NULL) {
8006
        param->flags |= flags;
8007
        ret = WOLFSSL_SUCCESS;
8008
    }
8009
8010
    return ret;
8011
}
8012
8013
8014
int wolfSSL_X509_VERIFY_PARAM_get_flags(WOLFSSL_X509_VERIFY_PARAM *param)
8015
{
8016
    int ret = 0;
8017
8018
    if (param != NULL) {
8019
        ret = (int)param->flags;
8020
    }
8021
8022
    return ret;
8023
}
8024
8025
8026
int wolfSSL_X509_VERIFY_PARAM_clear_flags(WOLFSSL_X509_VERIFY_PARAM *param,
8027
        unsigned long flags)
8028
{
8029
    int ret = WOLFSSL_FAILURE;
8030
8031
    if (param != NULL) {
8032
        param->flags &= ~flags;
8033
        ret = WOLFSSL_SUCCESS;
8034
    }
8035
8036
    return ret;
8037
}
8038
8039
8040
/* inherits properties of param "to" to param "from"
8041
*
8042
* WOLFSSL_VPARAM_DEFAULT          any values in "src" is copied
8043
*                                 if "src" value is new for "to".
8044
* WOLFSSL_VPARAM_OVERWRITE        all values of "form" are copied to "to"
8045
* WOLFSSL_VPARAM_RESET_FLAGS      the flag values are copied, not Ored
8046
* WOLFSSL_VPARAM_LOCKED           don't copy any values
8047
* WOLFSSL_VPARAM_ONCE             the current inherit_flags is zerroed
8048
*/
8049
static int wolfSSL_X509_VERIFY_PARAM_inherit(WOLFSSL_X509_VERIFY_PARAM *to,
8050
                                         const WOLFSSL_X509_VERIFY_PARAM *from)
8051
{
8052
    int ret = WOLFSSL_FAILURE;
8053
    int isOverWrite = 0;
8054
    int isDefault = 0;
8055
    unsigned int flags;
8056
8057
    /* sanity check */
8058
    if (!to || !from) {
8059
        /* be compatible to openssl return value */
8060
        return WOLFSSL_SUCCESS;
8061
    }
8062
    flags = to->inherit_flags | from->inherit_flags;
8063
8064
    if (flags & WOLFSSL_VPARAM_LOCKED) {
8065
        return WOLFSSL_SUCCESS;
8066
    }
8067
8068
    if (flags & WOLFSSL_VPARAM_ONCE) {
8069
        to->inherit_flags = 0;
8070
    }
8071
8072
    isOverWrite = (flags & WOLFSSL_VPARAM_OVERWRITE);
8073
    isDefault = (flags & WOLFSSL_VPARAM_DEFAULT);
8074
8075
    /* copy check_time if check time is not set */
8076
    if ((to->flags & WOLFSSL_USE_CHECK_TIME) == 0 || isOverWrite) {
8077
           to->check_time = from->check_time;
8078
           to->flags &= ~WOLFSSL_USE_CHECK_TIME;
8079
    }
8080
    /* host name */
8081
    if (isOverWrite ||
8082
        (from->hostName[0] != 0 && (to->hostName[0] == 0 || isDefault))) {
8083
            if (!(ret = wolfSSL_X509_VERIFY_PARAM_set1_host(to, from->hostName,
8084
                (int)XSTRLEN(from->hostName))))
8085
                return ret;
8086
        to->hostFlags = from->hostFlags;
8087
    }
8088
    /* ip ascii */
8089
    if (isOverWrite ||
8090
        (from->ipasc[0] != 0 && (to->ipasc[0] == 0 || isDefault))) {
8091
8092
            if (!(ret = wolfSSL_X509_VERIFY_PARAM_set1_ip_asc(to, from->ipasc)))
8093
                return ret;
8094
    }
8095
8096
    if (flags & WOLFSSL_VPARAM_RESET_FLAGS)
8097
        to->flags = 0;
8098
8099
    to->flags |= from->flags;
8100
8101
    return ret;
8102
}
8103
/******************************************************************************
8104
* wolfSSL_X509_VERIFY_PARAM_set1_host - sets the DNS hostname to name
8105
* hostnames is cleared if name is NULL or empty.
8106
*
8107
* RETURNS:
8108
*
8109
*/
8110
int wolfSSL_X509_VERIFY_PARAM_set1_host(WOLFSSL_X509_VERIFY_PARAM* pParam,
8111
                                         const char* name,
8112
                                         unsigned int nameSz)
8113
{
8114
    WOLFSSL_ENTER("wolfSSL_X509_VERIFY_PARAM_set1_host");
8115
8116
    if (pParam == NULL)
8117
        return WOLFSSL_FAILURE;
8118
8119
    if (name == NULL)
8120
        return WOLFSSL_SUCCESS;
8121
8122
    /* If name is NULL-terminated, namelen can be set to zero. */
8123
    if (nameSz == 0) {
8124
        nameSz = (unsigned int)XSTRLEN(name);
8125
    }
8126
8127
    if (nameSz > 0 && name[nameSz - 1] == '\0')
8128
        nameSz--;
8129
8130
    if (nameSz > WOLFSSL_HOST_NAME_MAX-1) {
8131
        WOLFSSL_MSG("Truncating name");
8132
        nameSz = WOLFSSL_HOST_NAME_MAX-1;
8133
    }
8134
8135
    if (nameSz > 0) {
8136
        XMEMCPY(pParam->hostName, name, nameSz);
8137
        XMEMSET(pParam->hostName + nameSz, 0,
8138
                WOLFSSL_HOST_NAME_MAX - nameSz);
8139
    }
8140
8141
    pParam->hostName[nameSz] = '\0';
8142
8143
    return WOLFSSL_SUCCESS;
8144
}
8145
8146
/* Set VERIFY PARAM from "from" pointer to "to" pointer */
8147
int wolfSSL_X509_VERIFY_PARAM_set1(WOLFSSL_X509_VERIFY_PARAM *to,
8148
                                   const WOLFSSL_X509_VERIFY_PARAM *from)
8149
{
8150
    int ret = WOLFSSL_FAILURE;
8151
    unsigned int _inherit_flags;
8152
8153
    if (!to) {
8154
        return ret;
8155
    }
8156
    /* keeps the inherit flags for save */
8157
    _inherit_flags = to->inherit_flags;
8158
8159
    /* Ored DEFAULT inherit flag proerty to copy "from" contents to "to"
8160
    *  contents
8161
    */
8162
    to->inherit_flags |= WOLFSSL_VPARAM_DEFAULT;
8163
8164
    ret = wolfSSL_X509_VERIFY_PARAM_inherit(to, from);
8165
8166
    /* restore inherit flag */
8167
    to->inherit_flags = _inherit_flags;
8168
8169
    return ret;
8170
}
8171
8172
/* Set the host flag in the X509_VERIFY_PARAM structure */
8173
void wolfSSL_X509_VERIFY_PARAM_set_hostflags(WOLFSSL_X509_VERIFY_PARAM* param,
8174
                                             unsigned int flags)
8175
{
8176
    if (param != NULL) {
8177
        param->hostFlags = flags;
8178
    }
8179
}
8180
8181
/* Sets the expected IP address to ipasc.
8182
 *
8183
 * param is a pointer to the X509_VERIFY_PARAM structure
8184
 * ipasc is a NULL-terminated string with N.N.N.N for IPv4 and
8185
 *       HH:HH ... HH:HH for IPv6. There is no validation performed on the
8186
 *       parameter, and it must be an exact match with the IP in the cert.
8187
 *
8188
 * return 1 for success and 0 for failure*/
8189
int wolfSSL_X509_VERIFY_PARAM_set1_ip_asc(WOLFSSL_X509_VERIFY_PARAM *param,
8190
        const char *ipasc)
8191
{
8192
    int ret = WOLFSSL_FAILURE;
8193
8194
    if (param != NULL) {
8195
        if (ipasc == NULL) {
8196
            param->ipasc[0] = '\0';
8197
        }
8198
        else {
8199
            XSTRLCPY(param->ipasc, ipasc, WOLFSSL_MAX_IPSTR);
8200
            param->ipasc[WOLFSSL_MAX_IPSTR-1] = '\0';
8201
        }
8202
        ret = WOLFSSL_SUCCESS;
8203
    }
8204
8205
    return ret;
8206
}
8207
/* Sets the expected IP address to ip(asc)
8208
 *          by re-constructing IP address in ascii
8209
 * @param  param is a pointer to the X509_VERIFY_PARAM structure
8210
 * @param  ip    in binary format of ip address
8211
 * @param  iplen size of ip, 4 for ipv4, 16 for ipv6
8212
 * @return 1 for success and 0 for failure
8213
 */
8214
int wolfSSL_X509_VERIFY_PARAM_set1_ip(WOLFSSL_X509_VERIFY_PARAM* param,
8215
    const unsigned char* ip, size_t iplen)
8216
{
8217
    int ret = WOLFSSL_FAILURE;
8218
#ifndef NO_FILESYSTEM
8219
    char* buf = NULL;
8220
    char* p = NULL;
8221
    word32 val = 0;
8222
    int i;
8223
    const size_t max_ipv6_len = 40;
8224
    byte write_zero = 0;
8225
#endif
8226
8227
    /* sanity check */
8228
    if (param == NULL || (iplen != 0 && iplen != 4 && iplen != 16)) {
8229
        WOLFSSL_MSG("bad function arg");
8230
        return ret;
8231
    }
8232
#ifndef NO_FILESYSTEM
8233
    if (iplen == 4) {
8234
        /* ipv4 www.xxx.yyy.zzz max 15 length + Null termination */
8235
        buf = (char*)XMALLOC(16, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8236
8237
        if (!buf) {
8238
            WOLFSSL_MSG("failed malloc");
8239
            return ret;
8240
        }
8241
8242
        XSPRINTF(buf, "%d.%d.%d.%d", ip[0], ip[1], ip[2], ip[3]);
8243
        buf[15] = '\0';
8244
    }
8245
    else if (iplen == 16) {
8246
        /* ipv6 normal address scheme
8247
        *   y1:y2:y3:y4:y5:y6:y7:y8, len(yx):4, len(y1-y8):32. len(":"):7
8248
        *   Max len is 32 + 7 + 1(Termination) = 40 bytes
8249
        *
8250
        *   ipv6 dual address
8251
        *   Or y1:y2:y3:y4:y:y6:x.x.x.x yx is 4, y1-y6 is 24, ":" is 6
8252
        *   x.x.x.x is 15.
8253
        *   Max len is 24 + 6 + 15 + 1(Termination) = 46 bytes
8254
        *
8255
        *   Expect data in ip[16]
8256
        *   e.g (aaaa):(bbbb):(cccc):....(hhhh)
8257
        *   (aaaa) = (ip[0<<8)|ip[1]
8258
        *   ......
8259
        *   (hhhh) = (ip[14]<<8)|(ip[15])
8260
        *
8261
        *   e.g ::(gggg):(hhhh)
8262
        *   ip[0]-[11] = 0
8263
        *   (gggg) = (ip[12]<<8) |(ip[13])
8264
        *   (hhhh) = (ip[14]<<8) |(ip[15])
8265
        *
8266
        *   Because it is not able to know which ivp6 scheme uses from data to
8267
        *   reconstruct IP address, this function assumes
8268
        *   ivp6 normal address scheme, not dual adress scheme,
8269
        *   to re-construct IP address in ascii.
8270
        */
8271
        buf = (char*)XMALLOC(max_ipv6_len, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8272
8273
        if (!buf) {
8274
            WOLFSSL_MSG("failed malloc");
8275
            return ret;
8276
        }
8277
        p = buf;
8278
        for (i = 0; i < 16; i += 2) {
8279
           val = (((word32)(ip[i]<<8)) | (ip[i+1])) & 0xFFFF;
8280
           if (val == 0){
8281
               if (!write_zero) {
8282
                    *p = ':';
8283
               }
8284
               p++;
8285
               *p = '\0';
8286
               write_zero = 1;
8287
           }
8288
           else {
8289
               if (i != 0)
8290
                *p++ = ':';
8291
               XSPRINTF(p, "%x", val);
8292
           }
8293
           /* sanity check */
8294
           if (XSTRLEN(buf) > max_ipv6_len) {
8295
               WOLFSSL_MSG("The target ip adress exceeds buffer length(40)");
8296
               XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8297
               buf = NULL;
8298
               break;
8299
           }
8300
           /* move the pointer to the last */
8301
           /* XSTRLEN includes NULL because of XSPRINTF use */
8302
           p = buf + (XSTRLEN(buf));
8303
        }
8304
        /* termination */
8305
        if(i == 16 && buf) {
8306
            p--;
8307
            if ((*p) == ':') {
8308
            /* when the last character is :, the followig segments are zero
8309
             * Therefore, adding : and null termination
8310
             */
8311
                 p++;
8312
                 *p++ = ':';
8313
                *p = '\0';
8314
            }
8315
        }
8316
    }
8317
    else {
8318
        WOLFSSL_MSG("iplen is zero, do nothing");
8319
        return WOLFSSL_SUCCESS;
8320
    }
8321
8322
    if (buf) {
8323
         /* set address to ip asc */
8324
        ret = wolfSSL_X509_VERIFY_PARAM_set1_ip_asc(param, buf);
8325
        XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8326
    }
8327
#else
8328
    (void)param;
8329
    (void)ip;
8330
    (void)iplen;
8331
#endif
8332
8333
    return ret;
8334
}
8335
8336
#ifndef NO_WOLFSSL_STUB
8337
void wolfSSL_X509_OBJECT_free_contents(WOLFSSL_X509_OBJECT* obj)
8338
{
8339
    (void)obj;
8340
    WOLFSSL_STUB("X509_OBJECT_free_contents");
8341
}
8342
#endif
8343
8344
#ifndef NO_ASN_TIME
8345
int wolfSSL_X509_cmp_current_time(const WOLFSSL_ASN1_TIME* asnTime)
8346
{
8347
    return wolfSSL_X509_cmp_time(asnTime, NULL);
8348
}
8349
8350
/* return -1 if asnTime is earlier than or equal to cmpTime, and 1 otherwise
8351
 * return 0 on error
8352
 */
8353
int wolfSSL_X509_cmp_time(const WOLFSSL_ASN1_TIME* asnTime, time_t* cmpTime)
8354
{
8355
    int ret = WOLFSSL_FAILURE;
8356
    time_t tmpTime, *pTime = &tmpTime;
8357
    struct tm ts, *tmpTs, *ct;
8358
#if defined(NEED_TMP_TIME)
8359
    /* for use with gmtime_r */
8360
    struct tm tmpTimeStorage;
8361
8362
    tmpTs = &tmpTimeStorage;
8363
#else
8364
    tmpTs = NULL;
8365
#endif
8366
    (void)tmpTs;
8367
8368
    if (asnTime == NULL) {
8369
        return WOLFSSL_FAILURE;
8370
    }
8371
8372
    if (cmpTime == NULL) {
8373
        /* Use current time */
8374
        *pTime = wc_Time(0);
8375
    }
8376
    else {
8377
        pTime = cmpTime;
8378
    }
8379
8380
    if (wolfSSL_ASN1_TIME_to_tm((WOLFSSL_ASN1_TIME*)asnTime, &ts) !=
8381
                                                              WOLFSSL_SUCCESS) {
8382
        WOLFSSL_MSG("Failed to convert WOLFSSL_ASN1_TIME to struct tm.");
8383
        return WOLFSSL_FAILURE;
8384
    }
8385
8386
    /* Convert to time struct*/
8387
    ct = XGMTIME(pTime, tmpTs);
8388
8389
    if (ct == NULL)
8390
        return GETTIME_ERROR;
8391
8392
    /* DateGreaterThan returns 1 for >; 0 for <= */
8393
    ret = DateGreaterThan(&ts, ct) ? 1 : -1;
8394
8395
    return ret;
8396
}
8397
#endif /* !NO_ASN_TIME */
8398
8399
#if (defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)) && \
8400
    !defined(NO_ASN_TIME) && !defined(USER_TIME) && !defined(TIME_OVERRIDES)
8401
WOLFSSL_ASN1_TIME *wolfSSL_X509_time_adj_ex(WOLFSSL_ASN1_TIME *asnTime,
8402
    int offset_day, long offset_sec, time_t *in_tm)
8403
{
8404
    /* get current time if in_tm is null */
8405
    time_t t = in_tm ? *in_tm : wc_Time(0);
8406
    return wolfSSL_ASN1_TIME_adj(asnTime, t, offset_day, offset_sec);
8407
}
8408
8409
WOLFSSL_ASN1_TIME *wolfSSL_X509_time_adj(WOLFSSL_ASN1_TIME *asnTime,
8410
    long offset_sec, time_t *in_tm)
8411
{
8412
    return wolfSSL_X509_time_adj_ex(asnTime, 0, offset_sec, in_tm);
8413
}
8414
8415
WOLFSSL_ASN1_TIME* wolfSSL_X509_gmtime_adj(WOLFSSL_ASN1_TIME *s, long adj)
8416
{
8417
    return wolfSSL_X509_time_adj(s, adj, NULL);
8418
}
8419
#endif
8420
8421
#ifndef NO_WOLFSSL_STUB
8422
int wolfSSL_sk_X509_REVOKED_num(WOLFSSL_X509_REVOKED* revoked)
8423
{
8424
    (void)revoked;
8425
    WOLFSSL_STUB("sk_X509_REVOKED_num");
8426
    return 0;
8427
}
8428
#endif
8429
8430
#ifndef NO_WOLFSSL_STUB
8431
WOLFSSL_X509_REVOKED* wolfSSL_X509_CRL_get_REVOKED(WOLFSSL_X509_CRL* crl)
8432
{
8433
    (void)crl;
8434
    WOLFSSL_STUB("X509_CRL_get_REVOKED");
8435
    return 0;
8436
}
8437
#endif
8438
8439
#ifndef NO_WOLFSSL_STUB
8440
WOLFSSL_X509_REVOKED* wolfSSL_sk_X509_REVOKED_value(
8441
                                    WOLFSSL_X509_REVOKED* revoked, int value)
8442
{
8443
    (void)revoked;
8444
    (void)value;
8445
    WOLFSSL_STUB("sk_X509_REVOKED_value");
8446
    return 0;
8447
}
8448
#endif
8449
8450
#endif /* OPENSSL_EXTRA */
8451
8452
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
8453
8454
WOLFSSL_ASN1_INTEGER* wolfSSL_X509_get_serialNumber(WOLFSSL_X509* x509)
8455
{
8456
    WOLFSSL_ASN1_INTEGER* a;
8457
    int i = 0;
8458
8459
    WOLFSSL_ENTER("wolfSSL_X509_get_serialNumber");
8460
8461
    if (x509 == NULL) {
8462
        WOLFSSL_MSG("NULL function argument");
8463
        return NULL;
8464
    }
8465
8466
    if (x509->serialNumber != NULL)
8467
       return x509->serialNumber;
8468
8469
    a = wolfSSL_ASN1_INTEGER_new();
8470
    if (a == NULL)
8471
        return NULL;
8472
8473
    /* Make sure there is space for the data, ASN.1 type and length. */
8474
    if (x509->serialSz > (WOLFSSL_ASN1_INTEGER_MAX - 2)) {
8475
        /* dynamically create data buffer, +2 for type and length */
8476
        a->data = (unsigned char*)XMALLOC(x509->serialSz + 2, NULL,
8477
                DYNAMIC_TYPE_OPENSSL);
8478
        if (a->data == NULL) {
8479
            wolfSSL_ASN1_INTEGER_free(a);
8480
            return NULL;
8481
        }
8482
        a->dataMax   = x509->serialSz + 2;
8483
        a->isDynamic = 1;
8484
    } else {
8485
        /* Use array instead of dynamic memory */
8486
        a->data    = a->intData;
8487
        a->dataMax = WOLFSSL_ASN1_INTEGER_MAX;
8488
    }
8489
8490
    #if defined(WOLFSSL_QT) || defined(WOLFSSL_HAPROXY)
8491
        XMEMCPY(&a->data[i], x509->serial, x509->serialSz);
8492
        a->length = x509->serialSz;
8493
    #else
8494
        a->data[i++] = ASN_INTEGER;
8495
        i += SetLength(x509->serialSz, a->data + i);
8496
        XMEMCPY(&a->data[i], x509->serial, x509->serialSz);
8497
        a->length = x509->serialSz + 2;
8498
    #endif
8499
8500
    x509->serialNumber = a;
8501
8502
    return a;
8503
}
8504
8505
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
8506
8507
#ifdef OPENSSL_EXTRA
8508
8509
#if defined(OPENSSL_ALL) || defined(WOLFSSL_APACHE_HTTPD) \
8510
    || defined(WOLFSSL_HAPROXY) || defined(WOLFSSL_WPAS)
8511
WOLFSSL_X509_ALGOR* wolfSSL_X509_ALGOR_new(void)
8512
{
8513
    WOLFSSL_X509_ALGOR* ret;
8514
    ret = (WOLFSSL_X509_ALGOR*)XMALLOC(sizeof(WOLFSSL_X509_ALGOR), NULL,
8515
                                       DYNAMIC_TYPE_OPENSSL);
8516
    if (ret) {
8517
        XMEMSET(ret, 0, sizeof(WOLFSSL_X509_ALGOR));
8518
    }
8519
    return ret;
8520
}
8521
8522
void wolfSSL_X509_ALGOR_free(WOLFSSL_X509_ALGOR *alg)
8523
{
8524
    if (alg) {
8525
        wolfSSL_ASN1_OBJECT_free(alg->algorithm);
8526
        wolfSSL_ASN1_TYPE_free(alg->parameter);
8527
        XFREE(alg, NULL, DYNAMIC_TYPE_OPENSSL);
8528
    }
8529
}
8530
8531
/* Returns X509_ALGOR struct with signature algorithm */
8532
const WOLFSSL_X509_ALGOR* wolfSSL_X509_get0_tbs_sigalg(const WOLFSSL_X509 *x509)
8533
{
8534
    WOLFSSL_ENTER("X509_get0_tbs_sigalg");
8535
8536
    if (x509 == NULL) {
8537
        WOLFSSL_MSG("x509 struct NULL error");
8538
        return NULL;
8539
    }
8540
8541
    return &x509->algor;
8542
}
8543
8544
/* Sets paobj pointer to X509_ALGOR signature algorithm */
8545
void wolfSSL_X509_ALGOR_get0(const WOLFSSL_ASN1_OBJECT **paobj, int *pptype,
8546
                            const void **ppval, const WOLFSSL_X509_ALGOR *algor)
8547
{
8548
    WOLFSSL_ENTER("X509_ALGOR_get0");
8549
8550
    if (!algor) {
8551
        WOLFSSL_MSG("algor object is NULL");
8552
        return;
8553
    }
8554
8555
    if (paobj)
8556
        *paobj = algor->algorithm;
8557
    if (ppval && algor->parameter)
8558
        *ppval = algor->parameter->value.ptr;
8559
    if (pptype) {
8560
        if (algor->parameter) {
8561
            *pptype = algor->parameter->type;
8562
        }
8563
        else {
8564
            /* Default to V_ASN1_OBJECT */
8565
            *pptype = V_ASN1_OBJECT;
8566
        }
8567
    }
8568
}
8569
8570
/**
8571
 * Populate algor members.
8572
 *
8573
 * @param algor The object to be set
8574
 * @param aobj The value to be set in algor->algorithm
8575
 * @param ptype The type of algor->parameter
8576
 * @param pval The value of algor->parameter
8577
 * @return WOLFSSL_SUCCESS on success
8578
 *         WOLFSSL_FAILURE on missing parameters or bad malloc
8579
 */
8580
int wolfSSL_X509_ALGOR_set0(WOLFSSL_X509_ALGOR *algor, WOLFSSL_ASN1_OBJECT *aobj,
8581
                            int ptype, void *pval)
8582
{
8583
    if (!algor) {
8584
        return WOLFSSL_FAILURE;
8585
    }
8586
    if (aobj) {
8587
        algor->algorithm = aobj;
8588
    }
8589
8590
    if (!algor->parameter) {
8591
        algor->parameter = wolfSSL_ASN1_TYPE_new();
8592
        if (!algor->parameter) {
8593
            return WOLFSSL_FAILURE;
8594
        }
8595
    }
8596
8597
    wolfSSL_ASN1_TYPE_set(algor->parameter, ptype, pval);
8598
8599
    return WOLFSSL_SUCCESS;
8600
}
8601
8602
/**
8603
 * Allocate a new WOLFSSL_X509_PUBKEY object.
8604
 *
8605
 * @return New zero'ed WOLFSSL_X509_PUBKEY object
8606
 */
8607
WOLFSSL_X509_PUBKEY *wolfSSL_X509_PUBKEY_new(void)
8608
{
8609
    WOLFSSL_X509_PUBKEY *ret;
8610
    ret = (WOLFSSL_X509_PUBKEY*)XMALLOC(sizeof(WOLFSSL_X509_PUBKEY), NULL,
8611
                                        DYNAMIC_TYPE_OPENSSL);
8612
    if (!ret) {
8613
        return NULL;
8614
    }
8615
    XMEMSET(ret, 0, sizeof(WOLFSSL_X509_PUBKEY));
8616
    ret->algor = wolfSSL_X509_ALGOR_new();
8617
    if (!ret->algor) {
8618
        wolfSSL_X509_PUBKEY_free(ret);
8619
        return NULL;
8620
    }
8621
    return ret;
8622
}
8623
8624
/**
8625
 * Free WOLFSSL_X509_PUBKEY and all its members.
8626
 *
8627
 * @param at Object to free
8628
 */
8629
void wolfSSL_X509_PUBKEY_free(WOLFSSL_X509_PUBKEY *x)
8630
{
8631
    if (x) {
8632
        if (x->algor) {
8633
            wolfSSL_X509_ALGOR_free(x->algor);
8634
        }
8635
        if (x->pkey) {
8636
            wolfSSL_EVP_PKEY_free(x->pkey);
8637
        }
8638
        XFREE(x, NULL, DYNAMIC_TYPE_OPENSSL);
8639
    }
8640
}
8641
8642
/* Returns X509_PUBKEY structure containing X509_ALGOR and EVP_PKEY */
8643
WOLFSSL_X509_PUBKEY* wolfSSL_X509_get_X509_PUBKEY(const WOLFSSL_X509* x509)
8644
{
8645
    WOLFSSL_ENTER("X509_get_X509_PUBKEY");
8646
8647
    if (x509 == NULL) {
8648
        WOLFSSL_MSG("x509 struct NULL error");
8649
        return NULL;
8650
    }
8651
8652
    return (WOLFSSL_X509_PUBKEY*)&x509->key;
8653
}
8654
8655
/* Sets ppkalg pointer to X509_PUBKEY algorithm. Returns WOLFSSL_SUCCESS on
8656
    success or WOLFSSL_FAILURE on error. */
8657
int wolfSSL_X509_PUBKEY_get0_param(WOLFSSL_ASN1_OBJECT **ppkalg,
8658
     const unsigned char **pk, int *ppklen, WOLFSSL_X509_ALGOR **pa,
8659
     WOLFSSL_X509_PUBKEY *pub)
8660
{
8661
    WOLFSSL_ENTER("X509_PUBKEY_get0_param");
8662
8663
    if (!pub || !pub->pubKeyOID) {
8664
        WOLFSSL_MSG("X509_PUBKEY struct not populated");
8665
        return WOLFSSL_FAILURE;
8666
    }
8667
8668
    if (!pub->algor) {
8669
        if (!(pub->algor = wolfSSL_X509_ALGOR_new())) {
8670
            return WOLFSSL_FAILURE;
8671
        }
8672
        pub->algor->algorithm = wolfSSL_OBJ_nid2obj(pub->pubKeyOID);
8673
        if (pub->algor->algorithm == NULL) {
8674
            WOLFSSL_MSG("Failed to create object from NID");
8675
            return WOLFSSL_FAILURE;
8676
        }
8677
    }
8678
8679
    if (pa)
8680
        *pa = pub->algor;
8681
    if (ppkalg)
8682
        *ppkalg = pub->algor->algorithm;
8683
    if (pk)
8684
        *pk = (unsigned char*)pub->pkey->pkey.ptr;
8685
    if (ppklen)
8686
        *ppklen = pub->pkey->pkey_sz;
8687
8688
    return WOLFSSL_SUCCESS;
8689
}
8690
8691
/* Returns a pointer to the pkey when passed a key */
8692
WOLFSSL_EVP_PKEY* wolfSSL_X509_PUBKEY_get(WOLFSSL_X509_PUBKEY* key)
8693
{
8694
    WOLFSSL_ENTER("wolfSSL_X509_PUBKEY_get");
8695
    if (key == NULL || key->pkey == NULL) {
8696
        WOLFSSL_LEAVE("wolfSSL_X509_PUBKEY_get", BAD_FUNC_ARG);
8697
        return NULL;
8698
    }
8699
    if (wolfSSL_EVP_PKEY_up_ref(key->pkey) != WOLFSSL_SUCCESS) {
8700
        WOLFSSL_LEAVE("wolfSSL_X509_PUBKEY_get", BAD_MUTEX_E);
8701
        return NULL;
8702
    }
8703
    WOLFSSL_LEAVE("wolfSSL_X509_PUBKEY_get", WOLFSSL_SUCCESS);
8704
    return key->pkey;
8705
}
8706
8707
int wolfSSL_X509_PUBKEY_set(WOLFSSL_X509_PUBKEY **x, WOLFSSL_EVP_PKEY *key)
8708
{
8709
    WOLFSSL_X509_PUBKEY *pk = NULL;
8710
    int ptype;
8711
    void *pval;
8712
#ifndef NO_DSA
8713
    WOLFSSL_ASN1_STRING *str;
8714
#endif
8715
#ifdef HAVE_ECC
8716
    int nid;
8717
    const WOLFSSL_EC_GROUP *group;
8718
#endif
8719
8720
    WOLFSSL_ENTER("wolfSSL_X509_PUBKEY_set");
8721
8722
    if (!x || !key) {
8723
        return WOLFSSL_FAILURE;
8724
    }
8725
8726
    if (!(pk = wolfSSL_X509_PUBKEY_new())) {
8727
        return WOLFSSL_FAILURE;
8728
    }
8729
8730
    switch (key->type) {
8731
#ifndef NO_RSA
8732
    case EVP_PKEY_RSA:
8733
        pval = NULL;
8734
        ptype = V_ASN1_NULL;
8735
        pk->pubKeyOID = RSAk;
8736
        break;
8737
#endif
8738
#ifndef NO_DSA
8739
    case EVP_PKEY_DSA:
8740
        if (!key->dsa->p || !key->dsa->q || !key->dsa->g)
8741
            goto error;
8742
8743
        str = wolfSSL_ASN1_STRING_new();
8744
        if (str == NULL)
8745
            goto error;
8746
8747
        str->length = wolfSSL_i2d_DSAparams(key->dsa, (unsigned char **)&str->data);
8748
        if (str->length <= 0)
8749
            goto error;
8750
        str->isDynamic = 1;
8751
8752
        pval = str;
8753
        ptype = V_ASN1_SEQUENCE;
8754
        pk->pubKeyOID = DSAk;
8755
        break;
8756
#endif
8757
#ifdef HAVE_ECC
8758
    case EVP_PKEY_EC:
8759
        group = wolfSSL_EC_KEY_get0_group(key->ecc);
8760
        if (!group)
8761
            goto error;
8762
8763
        nid = wolfSSL_EC_GROUP_get_curve_name(group);
8764
        if (nid == WOLFSSL_FAILURE) {
8765
            /* TODO: Add support for no nid case */
8766
            WOLFSSL_MSG("nid not found");
8767
            goto error;
8768
        }
8769
8770
        pval = wolfSSL_OBJ_nid2obj(nid);
8771
        if (!pval)
8772
            goto error;
8773
8774
        ptype = V_ASN1_OBJECT;
8775
        pk->pubKeyOID = ECDSAk;
8776
        break;
8777
#endif
8778
    default:
8779
        WOLFSSL_MSG("Unknown key type");
8780
        goto error;
8781
    }
8782
8783
    if (!wolfSSL_X509_ALGOR_set0(pk->algor, wolfSSL_OBJ_nid2obj(key->type), ptype, pval)) {
8784
        WOLFSSL_MSG("Failed to create algorithm object");
8785
        if (ptype == V_ASN1_OBJECT)
8786
            ASN1_OBJECT_free((WOLFSSL_ASN1_OBJECT *)pval);
8787
        else
8788
            ASN1_STRING_free((WOLFSSL_ASN1_STRING *)pval);
8789
        goto error;
8790
    }
8791
8792
    if (!wolfSSL_EVP_PKEY_up_ref(key)) {
8793
        WOLFSSL_MSG("Failed to up key reference");
8794
        goto error;
8795
    }
8796
    pk->pkey = key;
8797
8798
    wolfSSL_X509_PUBKEY_free(*x);
8799
    *x = pk;
8800
    return WOLFSSL_SUCCESS;
8801
error:
8802
    if (pk) {
8803
        wolfSSL_X509_PUBKEY_free(pk);
8804
    }
8805
    return WOLFSSL_FAILURE;
8806
}
8807
8808
#endif /* OPENSSL_ALL || WOLFSSL_APACHE_HTTPD || WOLFSSL_HAPROXY || WOLFSSL_WPAS */
8809
8810
#endif /* OPENSSL_EXTRA */
8811
8812
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
8813
WOLFSSL_BASIC_CONSTRAINTS* wolfSSL_BASIC_CONSTRAINTS_new(void)
8814
{
8815
    WOLFSSL_BASIC_CONSTRAINTS* bc;
8816
    bc = (WOLFSSL_BASIC_CONSTRAINTS*)
8817
          XMALLOC(sizeof(WOLFSSL_BASIC_CONSTRAINTS), NULL,
8818
          DYNAMIC_TYPE_X509_EXT);
8819
    if (bc == NULL) {
8820
        WOLFSSL_MSG("Failed to malloc basic constraints");
8821
        return NULL;
8822
    }
8823
    XMEMSET(bc, 0, sizeof(WOLFSSL_BASIC_CONSTRAINTS));
8824
    return bc;
8825
}
8826
8827
/* frees the wolfSSL_BASIC_CONSTRAINTS object */
8828
void wolfSSL_BASIC_CONSTRAINTS_free(WOLFSSL_BASIC_CONSTRAINTS *bc)
8829
{
8830
    WOLFSSL_ENTER("wolfSSL_BASIC_CONSTRAINTS_free");
8831
    if (bc == NULL) {
8832
        WOLFSSL_MSG("Argument is NULL");
8833
        return;
8834
    }
8835
    if (bc->pathlen) {
8836
        wolfSSL_ASN1_INTEGER_free(bc->pathlen);
8837
    }
8838
    XFREE(bc, NULL, DYNAMIC_TYPE_OPENSSL);
8839
}
8840
8841
WOLFSSL_AUTHORITY_KEYID* wolfSSL_AUTHORITY_KEYID_new(void)
8842
{
8843
    WOLFSSL_AUTHORITY_KEYID* akey = (WOLFSSL_AUTHORITY_KEYID*)XMALLOC(
8844
          sizeof(WOLFSSL_AUTHORITY_KEYID), NULL, DYNAMIC_TYPE_OPENSSL);
8845
    if (!akey) {
8846
        WOLFSSL_MSG("Issue creating WOLFSSL_AUTHORITY_KEYID struct");
8847
        return NULL;
8848
    }
8849
    XMEMSET(akey, 0, sizeof(WOLFSSL_AUTHORITY_KEYID));
8850
    return akey;
8851
}
8852
8853
/* frees the wolfSSL_AUTHORITY_KEYID object */
8854
void wolfSSL_AUTHORITY_KEYID_free(WOLFSSL_AUTHORITY_KEYID *id)
8855
{
8856
    WOLFSSL_ENTER("wolfSSL_AUTHORITY_KEYID_free");
8857
    if(id == NULL) {
8858
        WOLFSSL_MSG("Argument is NULL");
8859
        return;
8860
    }
8861
    if (id->keyid) {
8862
        wolfSSL_ASN1_STRING_free(id->keyid);
8863
    }
8864
    if (id->issuer) {
8865
        wolfSSL_ASN1_OBJECT_free(id->issuer);
8866
    }
8867
    if (id->serial) {
8868
        wolfSSL_ASN1_INTEGER_free(id->serial);
8869
    }
8870
    XFREE(id, NULL, DYNAMIC_TYPE_OPENSSL);
8871
}
8872
8873
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
8874
8875
#ifdef KEEP_PEER_CERT
8876
char*  wolfSSL_X509_get_subjectCN(WOLFSSL_X509* x509)
8877
{
8878
    if (x509 == NULL)
8879
        return NULL;
8880
8881
    return x509->subjectCN;
8882
}
8883
#endif /* KEEP_PEER_CERT */
8884
8885
#if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
8886
8887
/* increments ref count of WOLFSSL_X509. Return 1 on success, 0 on error */
8888
int wolfSSL_X509_up_ref(WOLFSSL_X509* x509)
8889
{
8890
    if (x509) {
8891
#ifndef SINGLE_THREADED
8892
        if (wc_LockMutex(&x509->refMutex) != 0) {
8893
            WOLFSSL_MSG("Failed to lock x509 mutex");
8894
            return WOLFSSL_FAILURE;
8895
        }
8896
#endif
8897
        x509->refCount++;
8898
#ifndef SINGLE_THREADED
8899
        wc_UnLockMutex(&x509->refMutex);
8900
#endif
8901
8902
        return WOLFSSL_SUCCESS;
8903
    }
8904
8905
    return WOLFSSL_FAILURE;
8906
}
8907
#endif /* OPENSSL_EXTRA_X509_SMALL || OPENSSL_EXTRA */
8908
8909
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
8910
WOLF_STACK_OF(WOLFSSL_X509)* wolfSSL_X509_chain_up_ref(
8911
        WOLF_STACK_OF(WOLFSSL_X509)* chain)
8912
{
8913
    /* wolfSSL_sk_dup takes care of doing a deep copy */
8914
    return wolfSSL_sk_dup(chain);
8915
}
8916
#endif
8917
8918
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
8919
    void wolfSSL_X509_NAME_free(WOLFSSL_X509_NAME *name)
8920
    {
8921
        WOLFSSL_ENTER("wolfSSL_X509_NAME_free");
8922
        FreeX509Name(name);
8923
        XFREE(name, NULL, DYNAMIC_TYPE_X509);
8924
    }
8925
8926
8927
    /* Malloc's a new WOLFSSL_X509_NAME structure
8928
     *
8929
     * returns NULL on failure, otherwise returns a new structure.
8930
     */
8931
    WOLFSSL_X509_NAME* wolfSSL_X509_NAME_new(void)
8932
    {
8933
        WOLFSSL_X509_NAME* name;
8934
8935
        WOLFSSL_ENTER("wolfSSL_X509_NAME_new");
8936
8937
        name = (WOLFSSL_X509_NAME*)XMALLOC(sizeof(WOLFSSL_X509_NAME), NULL,
8938
                DYNAMIC_TYPE_X509);
8939
        if (name != NULL) {
8940
            InitX509Name(name, 1, NULL);
8941
        }
8942
        return name;
8943
    }
8944
8945
    /* Creates a duplicate of a WOLFSSL_X509_NAME structure.
8946
       Returns a new WOLFSSL_X509_NAME structure or NULL on failure */
8947
    WOLFSSL_X509_NAME* wolfSSL_X509_NAME_dup(WOLFSSL_X509_NAME *name)
8948
    {
8949
        WOLFSSL_X509_NAME* copy = NULL;
8950
8951
        WOLFSSL_ENTER("wolfSSL_X509_NAME_dup");
8952
8953
        if (name == NULL) {
8954
            WOLFSSL_MSG("NULL parameter");
8955
            return NULL;
8956
        }
8957
8958
        if (!(copy = wolfSSL_X509_NAME_new())) {
8959
            return NULL;
8960
        }
8961
8962
        /* copy contents */
8963
        InitX509Name(copy, 1, name->heap);
8964
        if (wolfSSL_X509_NAME_copy(name, copy) != WOLFSSL_SUCCESS) {
8965
            wolfSSL_X509_NAME_free(copy);
8966
            return NULL;
8967
        }
8968
8969
        return copy;
8970
    }
8971
8972
#ifdef WOLFSSL_CERT_GEN
8973
8974
#if defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_EXT) || defined(OPENSSL_EXTRA)
8975
    /* Helper function to copy cert name from a WOLFSSL_X509_NAME structure to
8976
    * a Cert structure.
8977
    *
8978
    * returns length of DER on success and a negative error value on failure
8979
    */
8980
    static int CopyX509NameToCert(WOLFSSL_X509_NAME* n, byte* out)
8981
    {
8982
        unsigned char* der = NULL;
8983
        int length = BAD_FUNC_ARG, ret;
8984
        word32 idx = 0;
8985
8986
        ret = wolfSSL_i2d_X509_NAME(n, &der);
8987
        if (ret > (int)sizeof(CertName) || ret < 0) {
8988
            WOLFSSL_MSG("Name conversion error");
8989
            ret = MEMORY_E;
8990
        }
8991
8992
        if (ret > 0) {
8993
            /* strip off sequence, this gets added on certificate creation */
8994
            ret = GetSequence(der, &idx, &length, ret);
8995
        }
8996
8997
        if (ret > 0) {
8998
            XMEMCPY(out, der + idx, length);
8999
        }
9000
9001
        if (der != NULL)
9002
            XFREE(der, NULL, DYNAMIC_TYPE_OPENSSL);
9003
9004
        return length;
9005
    }
9006
#endif
9007
9008
#ifdef WOLFSSL_CERT_REQ
9009
    static int ReqCertFromX509(Cert* cert, WOLFSSL_X509* req)
9010
    {
9011
        int ret;
9012
9013
        if (wc_InitCert(cert) != 0)
9014
            return WOLFSSL_FAILURE;
9015
9016
9017
        ret = CopyX509NameToCert(&req->subject, cert->sbjRaw);
9018
        if (ret < 0) {
9019
            WOLFSSL_MSG("REQ subject conversion error");
9020
            ret = MEMORY_E;
9021
        }
9022
        else {
9023
            ret = WOLFSSL_SUCCESS;
9024
        }
9025
9026
        if (ret == WOLFSSL_SUCCESS) {
9027
        #if defined(OPENSSL_ALL)
9028
            int idx;
9029
        #endif
9030
9031
            cert->version = req->version;
9032
            cert->isCA = req->isCa;
9033
            cert->basicConstSet = req->basicConstSet;
9034
    #ifdef WOLFSSL_CERT_EXT
9035
            if (req->subjKeyIdSz != 0) {
9036
                XMEMCPY(cert->skid, req->subjKeyId, req->subjKeyIdSz);
9037
                cert->skidSz = req->subjKeyIdSz;
9038
            }
9039
            if (req->keyUsageSet)
9040
                cert->keyUsage = req->keyUsage;
9041
            /* Extended Key Usage not supported. */
9042
    #endif
9043
9044
            XMEMCPY(cert->challengePw, req->challengePw, CTC_NAME_SIZE);
9045
            cert->challengePwPrintableString = req->challengePw[0] != 0;
9046
9047
        #if defined(OPENSSL_ALL)
9048
            idx = wolfSSL_X509_REQ_get_attr_by_NID(req,
9049
                    NID_pkcs9_unstructuredName, -1);
9050
            if (idx != WOLFSSL_FATAL_ERROR) {
9051
                WOLFSSL_X509_ATTRIBUTE *attr;
9052
                attr = wolfSSL_X509_REQ_get_attr(req, idx);
9053
                if (attr != NULL) {
9054
                    const unsigned char *attrData;
9055
                    int attrDataSz;
9056
9057
                    attrData = wolfSSL_ASN1_STRING_get0_data(
9058
                            attr->value->value.asn1_string);
9059
                    attrDataSz = wolfSSL_ASN1_STRING_length(
9060
                            attr->value->value.asn1_string);
9061
9062
                    /* +1 to make sure is terminated string */
9063
                    if (attrDataSz + 1 > CTC_NAME_SIZE) {
9064
                        WOLFSSL_MSG("attribute size was too large to copy");
9065
                        ret = REQ_ATTRIBUTE_E;
9066
                    }
9067
                    else {
9068
                        XMEMCPY(cert->unstructuredName, attrData, attrDataSz);
9069
                        cert->unstructuredName[attrDataSz] = '\0';
9070
                    }
9071
                }
9072
            }
9073
        #endif /* OPENSSL_ALL */
9074
9075
    #ifdef WOLFSSL_ALT_NAMES
9076
            cert->altNamesSz = FlattenAltNames(cert->altNames,
9077
                    sizeof(cert->altNames), req->altNames);
9078
    #endif /* WOLFSSL_ALT_NAMES */
9079
        }
9080
9081
        return ret;
9082
    }
9083
#endif /* WOLFSSL_CERT_REQ */
9084
9085
    /* converts WOLFSSL_AN1_TIME to Cert form, returns positive size on
9086
     * success */
9087
    static int CertDateFromX509(byte* out, int outSz, WOLFSSL_ASN1_TIME* t)
9088
    {
9089
        int sz, i;
9090
9091
        if (t->length + 1 >= outSz) {
9092
            return BUFFER_E;
9093
        }
9094
9095
        out[0] = (byte) t->type;
9096
        sz = SetLength(t->length, out + 1) + 1;  /* gen tag */
9097
        for (i = 0; i < t->length; i++) {
9098
            out[sz + i] = t->data[i];
9099
        }
9100
        return t->length + sz;
9101
    }
9102
9103
    /* convert a WOLFSSL_X509 to a Cert structure for writing out */
9104
    static int CertFromX509(Cert* cert, WOLFSSL_X509* x509)
9105
    {
9106
        int ret;
9107
        #ifdef WOLFSSL_CERT_EXT
9108
        int i;
9109
        #endif
9110
9111
        WOLFSSL_ENTER("wolfSSL_X509_to_Cert()");
9112
9113
        if (x509 == NULL || cert == NULL) {
9114
            return BAD_FUNC_ARG;
9115
        }
9116
9117
        wc_InitCert(cert);
9118
9119
        cert->version = (int)wolfSSL_X509_get_version(x509);
9120
9121
        if (x509->notBefore.length > 0) {
9122
            cert->beforeDateSz = CertDateFromX509(cert->beforeDate,
9123
                        CTC_DATE_SIZE, &x509->notBefore);
9124
            if (cert->beforeDateSz <= 0){
9125
                WOLFSSL_MSG("Error converting WOLFSSL_X509 not before date");
9126
                return WOLFSSL_FAILURE;
9127
            }
9128
        }
9129
        else {
9130
            cert->beforeDateSz = 0;
9131
        }
9132
9133
        if (x509->notAfter.length > 0) {
9134
            cert->afterDateSz = CertDateFromX509(cert->afterDate,
9135
                        CTC_DATE_SIZE, &x509->notAfter);
9136
            if (cert->afterDateSz <= 0){
9137
                WOLFSSL_MSG("Error converting WOLFSSL_X509 not after date");
9138
                return WOLFSSL_FAILURE;
9139
            }
9140
        }
9141
        else {
9142
            cert->afterDateSz = 0;
9143
        }
9144
9145
    #ifdef WOLFSSL_ALT_NAMES
9146
        cert->altNamesSz = FlattenAltNames(cert->altNames,
9147
                sizeof(cert->altNames), x509->altNames);
9148
    #endif /* WOLFSSL_ALT_NAMES */
9149
9150
        cert->sigType = wolfSSL_X509_get_signature_type(x509);
9151
        cert->keyType = x509->pubKeyOID;
9152
        cert->isCA    = wolfSSL_X509_get_isCA(x509);
9153
        cert->basicConstSet = x509->basicConstSet;
9154
9155
    #ifdef WOLFSSL_CERT_EXT
9156
        if (x509->subjKeyIdSz <= CTC_MAX_SKID_SIZE) {
9157
            if (x509->subjKeyId) {
9158
                XMEMCPY(cert->skid, x509->subjKeyId, x509->subjKeyIdSz);
9159
            }
9160
            cert->skidSz = (int)x509->subjKeyIdSz;
9161
        }
9162
        else {
9163
            WOLFSSL_MSG("Subject Key ID too large");
9164
            WOLFSSL_ERROR_VERBOSE(BUFFER_E);
9165
            return WOLFSSL_FAILURE;
9166
        }
9167
9168
        if (x509->authKeyIdSz < sizeof(cert->akid)) {
9169
        #ifdef WOLFSSL_AKID_NAME
9170
            cert->rawAkid = 0;
9171
            if (x509->authKeyIdSrc) {
9172
                XMEMCPY(cert->akid, x509->authKeyIdSrc, x509->authKeyIdSrcSz);
9173
                cert->akidSz = (int)x509->authKeyIdSrcSz;
9174
                cert->rawAkid = 1;
9175
            }
9176
            else
9177
        #endif
9178
            if (x509->authKeyId) {
9179
                XMEMCPY(cert->akid, x509->authKeyId, x509->authKeyIdSz);
9180
                cert->akidSz = (int)x509->authKeyIdSz;
9181
            }
9182
        }
9183
        else {
9184
            WOLFSSL_MSG("Auth Key ID too large");
9185
            WOLFSSL_ERROR_VERBOSE(BUFFER_E);
9186
            return WOLFSSL_FAILURE;
9187
        }
9188
9189
        for (i = 0; i < x509->certPoliciesNb; i++) {
9190
            /* copy the smaller of MAX macros, by default they are currently equal*/
9191
            if ((int)CTC_MAX_CERTPOL_SZ <= (int)MAX_CERTPOL_SZ) {
9192
                XMEMCPY(cert->certPolicies[i], x509->certPolicies[i],
9193
                        CTC_MAX_CERTPOL_SZ);
9194
            }
9195
            else {
9196
                XMEMCPY(cert->certPolicies[i], x509->certPolicies[i],
9197
                        MAX_CERTPOL_SZ);
9198
            }
9199
        }
9200
        cert->certPoliciesNb = (word16)x509->certPoliciesNb;
9201
9202
        cert->keyUsage = x509->keyUsage;
9203
        cert->extKeyUsage = x509->extKeyUsage;
9204
        cert->nsCertType = x509->nsCertType;
9205
9206
        if (x509->rawCRLInfo != NULL) {
9207
            if (x509->rawCRLInfoSz > CTC_MAX_CRLINFO_SZ) {
9208
                WOLFSSL_MSG("CRL Info too large");
9209
                WOLFSSL_ERROR_VERBOSE(BUFFER_E);
9210
                return WOLFSSL_FAILURE;
9211
            }
9212
            XMEMCPY(cert->crlInfo, x509->rawCRLInfo, x509->rawCRLInfoSz);
9213
            cert->crlInfoSz = x509->rawCRLInfoSz;
9214
        }
9215
    #endif /* WOLFSSL_CERT_EXT */
9216
9217
    #ifdef WOLFSSL_CERT_REQ
9218
        /* copy over challenge password for REQ certs */
9219
        XMEMCPY(cert->challengePw, x509->challengePw, CTC_NAME_SIZE);
9220
    #endif
9221
9222
        /* Only makes sense to do this for OPENSSL_EXTRA because without
9223
         * this define the function will error out below */
9224
        #ifdef OPENSSL_EXTRA
9225
        if (x509->serialSz == 0 && x509->serialNumber != NULL &&
9226
                /* Check if the buffer contains more than just the
9227
                 * ASN tag and length */
9228
                x509->serialNumber->length > 2) {
9229
            if (wolfSSL_X509_set_serialNumber(x509, x509->serialNumber)
9230
                    != WOLFSSL_SUCCESS) {
9231
                WOLFSSL_MSG("Failed to set serial number");
9232
                return WOLFSSL_FAILURE;
9233
            }
9234
        }
9235
        #endif
9236
9237
        /* set serial number */
9238
        if (x509->serialSz > 0) {
9239
        #if defined(OPENSSL_EXTRA)
9240
            byte serial[EXTERNAL_SERIAL_SIZE];
9241
            int  serialSz = EXTERNAL_SERIAL_SIZE;
9242
9243
            ret = wolfSSL_X509_get_serial_number(x509, serial, &serialSz);
9244
            if (ret != WOLFSSL_SUCCESS) {
9245
                WOLFSSL_MSG("Serial size error");
9246
                return WOLFSSL_FAILURE;
9247
            }
9248
9249
            if (serialSz > EXTERNAL_SERIAL_SIZE ||
9250
                    serialSz > CTC_SERIAL_SIZE) {
9251
                WOLFSSL_MSG("Serial size too large error");
9252
                WOLFSSL_ERROR_VERBOSE(BUFFER_E);
9253
                return WOLFSSL_FAILURE;
9254
            }
9255
            XMEMCPY(cert->serial, serial, serialSz);
9256
            cert->serialSz = serialSz;
9257
        #else
9258
            WOLFSSL_MSG("Getting X509 serial number not supported");
9259
            return WOLFSSL_FAILURE;
9260
        #endif
9261
        }
9262
9263
        /* copy over Name structures */
9264
        if (x509->issuerSet)
9265
            cert->selfSigned = 0;
9266
9267
    #if defined(WOLFSSL_CERT_EXT) || defined(OPENSSL_EXTRA)
9268
        ret = CopyX509NameToCert(&x509->subject, cert->sbjRaw);
9269
        if (ret < 0) {
9270
            WOLFSSL_MSG("Subject conversion error");
9271
            return MEMORY_E;
9272
        }
9273
        if (cert->selfSigned) {
9274
            XMEMCPY(cert->issRaw, cert->sbjRaw, sizeof(CertName));
9275
        }
9276
        else {
9277
            ret = CopyX509NameToCert(&x509->issuer, cert->issRaw);
9278
            if (ret < 0) {
9279
                WOLFSSL_MSG("Issuer conversion error");
9280
                return MEMORY_E;
9281
            }
9282
        }
9283
    #endif
9284
9285
        cert->heap = x509->heap;
9286
9287
        (void)ret;
9288
        return WOLFSSL_SUCCESS;
9289
    }
9290
9291
9292
    /* returns the sig type to use on success i.e CTC_SHAwRSA and WOLFSSL_FALURE
9293
     * on fail case */
9294
    static int wolfSSL_sigTypeFromPKEY(WOLFSSL_EVP_MD* md,
9295
            WOLFSSL_EVP_PKEY* pkey)
9296
    {
9297
    #if !defined(NO_PWDBASED) && defined(OPENSSL_EXTRA)
9298
        int hashType;
9299
        int sigType = WOLFSSL_FAILURE;
9300
9301
        /* Convert key type and hash algorithm to a signature algorithm */
9302
        if (wolfSSL_EVP_get_hashinfo(md, &hashType, NULL) == WOLFSSL_FAILURE) {
9303
            return WOLFSSL_FAILURE;
9304
        }
9305
9306
        if (pkey->type == EVP_PKEY_RSA) {
9307
            switch (hashType) {
9308
                case WC_HASH_TYPE_SHA:
9309
                    sigType = CTC_SHAwRSA;
9310
                    break;
9311
                case WC_HASH_TYPE_SHA224:
9312
                    sigType = CTC_SHA224wRSA;
9313
                    break;
9314
                case WC_HASH_TYPE_SHA256:
9315
                    sigType = CTC_SHA256wRSA;
9316
                    break;
9317
                case WC_HASH_TYPE_SHA384:
9318
                    sigType = CTC_SHA384wRSA;
9319
                    break;
9320
                case WC_HASH_TYPE_SHA512:
9321
                    sigType = CTC_SHA512wRSA;
9322
                    break;
9323
            #ifdef WOLFSSL_SHA3
9324
                case WC_HASH_TYPE_SHA3_224:
9325
                    sigType = CTC_SHA3_224wRSA;
9326
                    break;
9327
                case WC_HASH_TYPE_SHA3_256:
9328
                    sigType = CTC_SHA3_256wRSA;
9329
                    break;
9330
                case WC_HASH_TYPE_SHA3_384:
9331
                    sigType = CTC_SHA3_384wRSA;
9332
                    break;
9333
                case WC_HASH_TYPE_SHA3_512:
9334
                    sigType = CTC_SHA3_512wRSA;
9335
                    break;
9336
            #endif
9337
                default:
9338
                    return WOLFSSL_FAILURE;
9339
            }
9340
        }
9341
        else if (pkey->type == EVP_PKEY_EC) {
9342
            switch (hashType) {
9343
                case WC_HASH_TYPE_SHA:
9344
                    sigType = CTC_SHAwECDSA;
9345
                    break;
9346
                case WC_HASH_TYPE_SHA224:
9347
                    sigType = CTC_SHA224wECDSA;
9348
                    break;
9349
                case WC_HASH_TYPE_SHA256:
9350
                    sigType = CTC_SHA256wECDSA;
9351
                    break;
9352
                case WC_HASH_TYPE_SHA384:
9353
                    sigType = CTC_SHA384wECDSA;
9354
                    break;
9355
                case WC_HASH_TYPE_SHA512:
9356
                    sigType = CTC_SHA512wECDSA;
9357
                    break;
9358
            #ifdef WOLFSSL_SHA3
9359
                case WC_HASH_TYPE_SHA3_224:
9360
                    sigType = CTC_SHA3_224wECDSA;
9361
                    break;
9362
                case WC_HASH_TYPE_SHA3_256:
9363
                    sigType = CTC_SHA3_256wECDSA;
9364
                    break;
9365
                case WC_HASH_TYPE_SHA3_384:
9366
                    sigType = CTC_SHA3_384wECDSA;
9367
                    break;
9368
                case WC_HASH_TYPE_SHA3_512:
9369
                    sigType = CTC_SHA3_512wECDSA;
9370
                    break;
9371
            #endif
9372
                default:
9373
                    return WOLFSSL_FAILURE;
9374
            }
9375
        }
9376
        else
9377
            return WOLFSSL_FAILURE;
9378
        return sigType;
9379
#else
9380
        (void)md;
9381
        (void)pkey;
9382
        WOLFSSL_MSG("Cannot get hashinfo when NO_PWDBASED is defined");
9383
        return WOLFSSL_FAILURE;
9384
#endif /* !NO_PWDBASED && OPENSSL_EXTRA */
9385
    }
9386
9387
9388
    /* generates DER buffer from WOLFSSL_X509
9389
     * If req == 1 then creates a request DER buffer
9390
     *
9391
     * updates derSz with certificate body size on success
9392
     * return WOLFSSL_SUCCESS on success
9393
     */
9394
    static int wolfssl_x509_make_der(WOLFSSL_X509* x509, int req,
9395
            unsigned char* der, int* derSz, int includeSig)
9396
    {
9397
        int ret = WOLFSSL_FAILURE;
9398
        int totalLen;
9399
        Cert* cert = NULL;
9400
        void* key = NULL;
9401
        int type = -1;
9402
    #ifndef NO_RSA
9403
        RsaKey* rsa = NULL;
9404
    #endif
9405
    #ifdef HAVE_ECC
9406
        ecc_key* ecc = NULL;
9407
    #endif
9408
    #ifndef NO_DSA
9409
        DsaKey* dsa = NULL;
9410
    #endif
9411
        WC_RNG rng;
9412
        word32 idx = 0;
9413
9414
        if (x509 == NULL || der == NULL || derSz == NULL)
9415
            return BAD_FUNC_ARG;
9416
9417
    #ifndef WOLFSSL_CERT_REQ
9418
        if (req) {
9419
            WOLFSSL_MSG("WOLFSSL_CERT_REQ needed for certificate request");
9420
            return WOLFSSL_FAILURE;
9421
        }
9422
    #endif
9423
9424
        /* allocate Cert struct on heap since it is large */
9425
        cert = (Cert*)XMALLOC(sizeof(Cert), NULL, DYNAMIC_TYPE_CERT);
9426
        if (cert == NULL) {
9427
            WOLFSSL_MSG("Failed to allocate memory for Cert struct");
9428
            return WOLFSSL_FAILURE;
9429
        }
9430
        XMEMSET(cert, 0, sizeof(Cert));
9431
9432
    #ifdef WOLFSSL_CERT_REQ
9433
        if (req) {
9434
            if (ReqCertFromX509(cert, x509) != WOLFSSL_SUCCESS) {
9435
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
9436
                return WOLFSSL_FAILURE;
9437
            }
9438
        }
9439
        else
9440
    #endif
9441
        {
9442
            /* Create a Cert that has the certificate fields. */
9443
            if (CertFromX509(cert, x509) != WOLFSSL_SUCCESS) {
9444
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
9445
                return WOLFSSL_FAILURE;
9446
            }
9447
        }
9448
9449
        /* Create a public key object from requests public key. */
9450
    #ifndef NO_RSA
9451
        if (x509->pubKeyOID == RSAk) {
9452
9453
            rsa = (RsaKey*)XMALLOC(sizeof(RsaKey), NULL, DYNAMIC_TYPE_RSA);
9454
            if (rsa == NULL) {
9455
                WOLFSSL_MSG("Failed to allocate memory for RsaKey");
9456
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
9457
                return WOLFSSL_FAILURE;
9458
            }
9459
9460
            type = RSA_TYPE;
9461
            ret = wc_InitRsaKey(rsa, x509->heap);
9462
            if (ret != 0) {
9463
                XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
9464
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
9465
                return ret;
9466
            }
9467
            ret = wc_RsaPublicKeyDecode(x509->pubKey.buffer, &idx, rsa,
9468
                                                           x509->pubKey.length);
9469
            if (ret != 0) {
9470
                WOLFSSL_ERROR_VERBOSE(ret);
9471
                wc_FreeRsaKey(rsa);
9472
                XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
9473
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
9474
                return ret;
9475
            }
9476
            key = (void*)rsa;
9477
        }
9478
    #endif
9479
    #ifdef HAVE_ECC
9480
        if (x509->pubKeyOID == ECDSAk) {
9481
9482
            ecc = (ecc_key*)XMALLOC(sizeof(ecc_key), NULL, DYNAMIC_TYPE_ECC);
9483
            if (ecc == NULL) {
9484
                WOLFSSL_MSG("Failed to allocate memory for ecc_key");
9485
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
9486
                return WOLFSSL_FAILURE;
9487
            }
9488
9489
            type = ECC_TYPE;
9490
            ret = wc_ecc_init(ecc);
9491
            if (ret != 0) {
9492
                XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
9493
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
9494
                return ret;
9495
            }
9496
            ret = wc_EccPublicKeyDecode(x509->pubKey.buffer, &idx, ecc,
9497
                                                           x509->pubKey.length);
9498
            if (ret != 0) {
9499
                WOLFSSL_ERROR_VERBOSE(ret);
9500
                wc_ecc_free(ecc);
9501
                XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
9502
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
9503
                return ret;
9504
            }
9505
            key = (void*)ecc;
9506
        }
9507
    #endif
9508
    #ifndef NO_DSA
9509
        if (x509->pubKeyOID == DSAk) {
9510
9511
            dsa = (DsaKey*)XMALLOC(sizeof(DsaKey), NULL, DYNAMIC_TYPE_DSA);
9512
            if (dsa == NULL) {
9513
                WOLFSSL_MSG("Failed to allocate memory for DsaKey");
9514
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
9515
                return WOLFSSL_FAILURE;
9516
            }
9517
9518
            type = DSA_TYPE;
9519
            ret = wc_InitDsaKey(dsa);
9520
            if (ret != 0) {
9521
                XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
9522
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
9523
                return ret;
9524
            }
9525
            ret = wc_DsaPublicKeyDecode(x509->pubKey.buffer, &idx, dsa,
9526
                                                           x509->pubKey.length);
9527
            if (ret != 0) {
9528
                WOLFSSL_ERROR_VERBOSE(ret);
9529
                wc_FreeDsaKey(dsa);
9530
                XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
9531
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
9532
                return ret;
9533
            }
9534
            key = (void*)dsa;
9535
        }
9536
    #endif
9537
        if (key == NULL) {
9538
            WOLFSSL_MSG("No public key found for certificate");
9539
            XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
9540
            return WOLFSSL_FAILURE;
9541
        }
9542
9543
        /* Make the body of the certificate request. */
9544
    #ifdef WOLFSSL_CERT_REQ
9545
        if (req) {
9546
            ret = wc_MakeCertReq_ex(cert, der, *derSz, type, key);
9547
        }
9548
        else
9549
    #endif
9550
        {
9551
            ret = wc_InitRng(&rng);
9552
            if (ret != 0) {
9553
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
9554
                return WOLFSSL_FAILURE;
9555
            }
9556
9557
            ret = wc_MakeCert_ex(cert, der, *derSz, type, key, &rng);
9558
            wc_FreeRng(&rng);
9559
        }
9560
        if (ret <= 0) {
9561
            WOLFSSL_ERROR_VERBOSE(ret);
9562
            ret = WOLFSSL_FAILURE;
9563
            goto cleanup;
9564
        }
9565
9566
        if ((x509->serialSz == 0) &&
9567
                (cert->serialSz <= EXTERNAL_SERIAL_SIZE) &&
9568
                (cert->serialSz > 0)) {
9569
        #if defined(OPENSSL_EXTRA)
9570
            WOLFSSL_ASN1_INTEGER *i = wolfSSL_ASN1_INTEGER_new();
9571
9572
            if (i == NULL) {
9573
                WOLFSSL_MSG("wolfSSL_ASN1_INTEGER_new error");
9574
                ret = WOLFSSL_FAILURE;
9575
                goto cleanup;
9576
            }
9577
            else {
9578
                i->length = cert->serialSz + 2;
9579
                i->data[0] = ASN_INTEGER;
9580
                i->data[1] = (unsigned char)cert->serialSz;
9581
                XMEMCPY(i->data + 2, cert->serial, cert->serialSz);
9582
                if (wolfSSL_X509_set_serialNumber(x509, i) != WOLFSSL_SUCCESS) {
9583
                    WOLFSSL_MSG("Issue setting generated serial number");
9584
                    wolfSSL_ASN1_INTEGER_free(i);
9585
                    ret = WOLFSSL_FAILURE;
9586
                    goto cleanup;
9587
                }
9588
                wolfSSL_ASN1_INTEGER_free(i);
9589
            }
9590
        #else
9591
            WOLFSSL_MSG("ASN1_INTEGER API not in build");
9592
9593
            ret = WOLFSSL_FAILURE;
9594
            goto cleanup;
9595
        #endif /* OPENSSL_EXTRA */
9596
        }
9597
9598
        if (includeSig) {
9599
            if (!x509->sig.buffer) {
9600
                WOLFSSL_MSG("No signature buffer");
9601
                ret = WOLFSSL_FAILURE;
9602
                goto cleanup;
9603
            }
9604
            totalLen = AddSignature(NULL, ret, NULL, x509->sig.length,
9605
                                  x509->sigOID);
9606
            if (totalLen > *derSz) {
9607
                WOLFSSL_MSG("Output der buffer too short");
9608
                ret = WOLFSSL_FAILURE;
9609
                goto cleanup;
9610
            }
9611
            ret = AddSignature(der, ret, x509->sig.buffer,
9612
                               x509->sig.length, x509->sigOID);
9613
        }
9614
9615
        *derSz = ret;
9616
        ret = WOLFSSL_SUCCESS;
9617
cleanup:
9618
        /* Dispose of the public key object. */
9619
    #ifndef NO_RSA
9620
        if (x509->pubKeyOID == RSAk) {
9621
            wc_FreeRsaKey(rsa);
9622
            XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
9623
        }
9624
    #endif
9625
    #ifdef HAVE_ECC
9626
        if (x509->pubKeyOID == ECDSAk) {
9627
            wc_ecc_free(ecc);
9628
            XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
9629
        }
9630
    #endif
9631
    #ifndef NO_DSA
9632
        if (x509->pubKeyOID == DSAk) {
9633
            wc_FreeDsaKey(dsa);
9634
            XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
9635
        }
9636
    #endif
9637
        XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
9638
9639
        return ret;
9640
    }
9641
9642
9643
    /* signs a der buffer for the WOLFSSL_X509 structure using the PKEY and MD
9644
     * hash passed in
9645
     *
9646
     * WARNING: this free's and replaces the existing DER buffer in the
9647
     *          WOLFSSL_X509 with the newly signed buffer.
9648
     * returns size of signed buffer on success and negative values on fail
9649
     */
9650
    static int wolfSSL_X509_resign_cert(WOLFSSL_X509* x509, int req,
9651
            unsigned char* der, int derSz, int certBodySz, WOLFSSL_EVP_MD* md,
9652
            WOLFSSL_EVP_PKEY* pkey)
9653
    {
9654
        int ret;
9655
        void* key = NULL;
9656
        int type = -1;
9657
        int sigType;
9658
        WC_RNG rng;
9659
9660
        (void)req;
9661
        WOLFSSL_ENTER("wolfSSL_X509_resign_cert");
9662
9663
        sigType = wolfSSL_sigTypeFromPKEY(md, pkey);
9664
        if (sigType == WOLFSSL_FAILURE) {
9665
            WOLFSSL_MSG("Error getting signature type from pkey");
9666
            return WOLFSSL_FATAL_ERROR;
9667
        }
9668
9669
9670
        /* Get the private key object and type from pkey. */
9671
    #ifndef NO_RSA
9672
        if (pkey->type == EVP_PKEY_RSA) {
9673
            type = RSA_TYPE;
9674
            key = pkey->rsa->internal;
9675
        }
9676
    #endif
9677
    #ifdef HAVE_ECC
9678
        if (pkey->type == EVP_PKEY_EC) {
9679
            type = ECC_TYPE;
9680
            key = pkey->ecc->internal;
9681
        }
9682
    #endif
9683
9684
        /* Sign the certificate (request) body. */
9685
        ret = wc_InitRng(&rng);
9686
        if (ret != 0)
9687
            return ret;
9688
        ret = wc_SignCert_ex(certBodySz, sigType, der, derSz, type, key, &rng);
9689
        wc_FreeRng(&rng);
9690
        if (ret < 0) {
9691
            WOLFSSL_LEAVE("wolfSSL_X509_resign_cert", ret);
9692
            return ret;
9693
        }
9694
        derSz = ret;
9695
9696
        /* Extract signature from buffer */
9697
        {
9698
            word32 idx = 0;
9699
            int    len = 0;
9700
9701
            /* Read top level sequence */
9702
            if (GetSequence(der, &idx, &len, derSz) < 0) {
9703
                WOLFSSL_MSG("GetSequence error");
9704
                return WOLFSSL_FATAL_ERROR;
9705
            }
9706
            /* Move idx to signature */
9707
            idx += certBodySz;
9708
            /* Read signature algo sequence */
9709
            if (GetSequence(der, &idx, &len, derSz) < 0) {
9710
                WOLFSSL_MSG("GetSequence error");
9711
                return WOLFSSL_FATAL_ERROR;
9712
            }
9713
            idx += len;
9714
            /* Read signature bit string */
9715
            if (CheckBitString(der, &idx, &len, derSz, 0, NULL) != 0) {
9716
                WOLFSSL_MSG("CheckBitString error");
9717
                return WOLFSSL_FATAL_ERROR;
9718
            }
9719
            /* Sanity check */
9720
            if (idx + len != (word32)derSz) {
9721
                WOLFSSL_MSG("unexpected asn1 structure");
9722
                return WOLFSSL_FATAL_ERROR;
9723
            }
9724
            x509->sig.length = 0;
9725
            if (x509->sig.buffer)
9726
                XFREE(x509->sig.buffer, x509->heap, DYNAMIC_TYPE_SIGNATURE);
9727
            x509->sig.buffer = (byte*)XMALLOC(len, x509->heap,
9728
                                              DYNAMIC_TYPE_SIGNATURE);
9729
            if (!x509->sig.buffer) {
9730
                WOLFSSL_MSG("malloc error");
9731
                return WOLFSSL_FATAL_ERROR;
9732
            }
9733
            XMEMCPY(x509->sig.buffer, der + idx, len);
9734
            x509->sig.length = len;
9735
        }
9736
9737
        /* Put in the new certificate encoding into the x509 object. */
9738
        FreeDer(&x509->derCert);
9739
        type = CERT_TYPE;
9740
    #ifdef WOLFSSL_CERT_REQ
9741
        if (req) {
9742
            type = CERTREQ_TYPE;
9743
        }
9744
    #endif
9745
        if (AllocDer(&x509->derCert, derSz, type, NULL) != 0)
9746
            return WOLFSSL_FATAL_ERROR;
9747
        XMEMCPY(x509->derCert->buffer, der, derSz);
9748
        x509->derCert->length = derSz;
9749
9750
        return ret;
9751
    }
9752
9753
9754
    #ifndef WC_MAX_X509_GEN
9755
        /* able to override max size until dynamic buffer created */
9756
        #define WC_MAX_X509_GEN 4096
9757
    #endif
9758
9759
    /* returns the size of signature on success */
9760
    int wolfSSL_X509_sign(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey,
9761
            const WOLFSSL_EVP_MD* md)
9762
    {
9763
        int  ret;
9764
        /* @TODO dynamic set based on expected cert size */
9765
        byte *der = (byte *)XMALLOC(WC_MAX_X509_GEN, NULL, DYNAMIC_TYPE_TMP_BUFFER);
9766
        int  derSz = WC_MAX_X509_GEN;
9767
9768
        WOLFSSL_ENTER("wolfSSL_X509_sign");
9769
9770
        if (x509 == NULL || pkey == NULL || md == NULL) {
9771
            ret = WOLFSSL_FAILURE;
9772
            goto out;
9773
        }
9774
9775
        x509->sigOID = wolfSSL_sigTypeFromPKEY((WOLFSSL_EVP_MD*)md, pkey);
9776
        if ((ret = wolfssl_x509_make_der(x509, 0, der, &derSz, 0)) !=
9777
                WOLFSSL_SUCCESS) {
9778
            WOLFSSL_MSG("Unable to make DER for X509");
9779
            WOLFSSL_LEAVE("wolfSSL_X509_sign", ret);
9780
            (void)ret;
9781
            ret = WOLFSSL_FAILURE;
9782
            goto out;
9783
        }
9784
9785
        ret = wolfSSL_X509_resign_cert(x509, 0, der, WC_MAX_X509_GEN, derSz,
9786
                (WOLFSSL_EVP_MD*)md, pkey);
9787
        if (ret <= 0) {
9788
            WOLFSSL_LEAVE("wolfSSL_X509_sign", ret);
9789
            ret = WOLFSSL_FAILURE;
9790
            goto out;
9791
        }
9792
9793
    out:
9794
        if (der)
9795
            XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
9796
9797
        return ret;
9798
    }
9799
9800
#if defined(OPENSSL_EXTRA)
9801
    int wolfSSL_X509_sign_ctx(WOLFSSL_X509 *x509, WOLFSSL_EVP_MD_CTX *ctx)
9802
    {
9803
        WOLFSSL_ENTER("wolfSSL_X509_sign_ctx");
9804
9805
        if (!x509 || !ctx || !ctx->pctx || !ctx->pctx->pkey) {
9806
            WOLFSSL_MSG("Bad parameter");
9807
            return WOLFSSL_FAILURE;
9808
        }
9809
9810
        return wolfSSL_X509_sign(x509, ctx->pctx->pkey, wolfSSL_EVP_MD_CTX_md(ctx));
9811
    }
9812
#endif /* OPENSSL_EXTRA */
9813
#endif /* WOLFSSL_CERT_GEN */
9814
9815
9816
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
9817
    defined(OPENSSL_EXTRA_X509_SMALL) || defined(WOLFSSL_WPAS_SMALL)
9818
/* Converts from NID_* value to wolfSSL value if needed.
9819
 *
9820
 * @param [in] nid  Numeric Id of a domain name component.
9821
 * @return  Domain name tag values - wolfSSL internal values.
9822
 * @return  -1 when nid isn't known.
9823
 */
9824
static int ConvertNIDToWolfSSL(int nid)
9825
{
9826
    switch (nid) {
9827
        case NID_commonName : return ASN_COMMON_NAME;
9828
    #ifdef WOLFSSL_CERT_NAME_ALL
9829
        case NID_name :       return ASN_NAME;
9830
        case NID_givenName:   return ASN_GIVEN_NAME;
9831
        case NID_dnQualifier :   return ASN_DNQUALIFIER;
9832
        case NID_initials:   return ASN_INITIALS;
9833
    #endif /* WOLFSSL_CERT_NAME_ALL */
9834
        case NID_surname :    return ASN_SUR_NAME;
9835
        case NID_countryName: return ASN_COUNTRY_NAME;
9836
        case NID_localityName: return ASN_LOCALITY_NAME;
9837
        case NID_stateOrProvinceName: return ASN_STATE_NAME;
9838
        case NID_streetAddress: return ASN_STREET_ADDR;
9839
        case NID_organizationName: return ASN_ORG_NAME;
9840
        case NID_organizationalUnitName: return ASN_ORGUNIT_NAME;
9841
        case NID_emailAddress: return ASN_EMAIL_NAME;
9842
        case NID_serialNumber: return ASN_SERIAL_NUMBER;
9843
        case NID_userId: return ASN_USER_ID;
9844
        case NID_businessCategory: return ASN_BUS_CAT;
9845
        case NID_domainComponent: return ASN_DOMAIN_COMPONENT;
9846
        case NID_postalCode: return ASN_POSTAL_CODE;
9847
        default:
9848
            WOLFSSL_MSG("Attribute NID not found");
9849
            return -1;
9850
    }
9851
}
9852
#endif /* OPENSSL_ALL || OPENSSL_EXTRA ||
9853
          OPENSSL_EXTRA_X509_SMALL || WOLFSSL_WPAS_SMALL*/
9854
9855
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
9856
/* This is to convert the x509 name structure into canonical DER format     */
9857
/*  , which has the following rules:                                        */
9858
/*   convert to UTF8                                                        */
9859
/*   convert to lower case                                                  */
9860
/*   multi-spaces collapsed                                                 */
9861
/*   leading SEQUENCE header is skipped                                     */
9862
/* @param  name a pointer to X509_NAME that is to be converted              */
9863
/* @param  out  a pointer to converted data                                 */
9864
/* @return a number of converted bytes, otherwise <=0 error code            */
9865
int wolfSSL_i2d_X509_NAME_canon(WOLFSSL_X509_NAME* name, unsigned char** out)
9866
{
9867
    int  totalBytes = 0, i, idx;
9868
    byte *output, *local = NULL;
9869
#ifdef WOLFSSL_SMALL_STACK
9870
    EncodedName* names = NULL;
9871
#else
9872
    EncodedName  names[MAX_NAME_ENTRIES];
9873
#endif
9874
9875
    if (name == NULL)
9876
        return BAD_FUNC_ARG;
9877
9878
#ifdef WOLFSSL_SMALL_STACK
9879
    names = (EncodedName*)XMALLOC(sizeof(EncodedName) * MAX_NAME_ENTRIES, NULL,
9880
                                                       DYNAMIC_TYPE_TMP_BUFFER);
9881
    if (names == NULL)
9882
        return MEMORY_E;
9883
#endif
9884
9885
    XMEMSET(names, 0, sizeof(EncodedName) * MAX_NAME_ENTRIES);
9886
9887
    for (i = 0; i < MAX_NAME_ENTRIES; i++) {
9888
        WOLFSSL_X509_NAME_ENTRY* entry;
9889
        int ret;
9890
9891
        entry = wolfSSL_X509_NAME_get_entry(name, i);
9892
        if (entry != NULL && entry->set >= 1) {
9893
            const char* nameStr;
9894
            WOLFSSL_ASN1_STRING* data;
9895
            WOLFSSL_ASN1_STRING* cano_data;
9896
9897
            cano_data = wolfSSL_ASN1_STRING_new();
9898
            if (cano_data == NULL) {
9899
                #ifdef WOLFSSL_SMALL_STACK
9900
                XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
9901
                #endif
9902
                return MEMORY_E;
9903
            }
9904
9905
            data = wolfSSL_X509_NAME_ENTRY_get_data(entry);
9906
            if (data == NULL) {
9907
            #ifdef WOLFSSL_SMALL_STACK
9908
                XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
9909
            #endif
9910
                wolfSSL_ASN1_STRING_free(cano_data);
9911
                WOLFSSL_MSG("Error getting entry data");
9912
                return WOLFSSL_FATAL_ERROR;
9913
            }
9914
            if (wolfSSL_ASN1_STRING_canon(cano_data, data) != WOLFSSL_SUCCESS) {
9915
                return WOLFSSL_FAILURE;
9916
            }
9917
            nameStr = (const char*)wolfSSL_ASN1_STRING_data(cano_data);
9918
9919
            ret = wc_EncodeNameCanonical(&names[i], nameStr, CTC_UTF8,
9920
                (byte)ConvertNIDToWolfSSL(entry->nid));
9921
            if (ret < 0) {
9922
            #ifdef WOLFSSL_SMALL_STACK
9923
                XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
9924
            #endif
9925
                wolfSSL_ASN1_STRING_free(cano_data);
9926
                WOLFSSL_MSG("EncodeName failed");
9927
                return WOLFSSL_FATAL_ERROR;
9928
            }
9929
            totalBytes += ret;
9930
            wolfSSL_OPENSSL_free(cano_data->data);
9931
            wolfSSL_ASN1_STRING_free(cano_data);
9932
        }
9933
    }
9934
9935
    if (out == NULL) {
9936
        /* If out is NULL, caller just wants length. */
9937
#ifdef WOLFSSL_SMALL_STACK
9938
        XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
9939
#endif
9940
        return totalBytes;
9941
    }
9942
9943
    /* skip header */
9944
    /* check if using buffer passed in */
9945
    if (*out == NULL) {
9946
        *out = local = (unsigned char*)XMALLOC(totalBytes, NULL,
9947
                DYNAMIC_TYPE_OPENSSL);
9948
        if (*out == NULL) {
9949
            return MEMORY_E;
9950
        }
9951
    }
9952
    output = *out;
9953
    idx = 0;
9954
9955
    for (i = 0; i < MAX_NAME_ENTRIES; i++) {
9956
        if (names[i].used) {
9957
            XMEMCPY(output + idx, names[i].encoded, names[i].totalLen);
9958
            idx += names[i].totalLen;
9959
        }
9960
    }
9961
9962
#ifdef WOLFSSL_SMALL_STACK
9963
    XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
9964
#endif
9965
9966
    /* used existing buffer passed in, so increment pointer */
9967
    if (local == NULL) {
9968
        *out += totalBytes;
9969
    }
9970
    return totalBytes;
9971
}
9972
#endif /* OPENSSL_ALL || OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
9973
9974
#ifdef WOLFSSL_CERT_GEN
9975
/* Guarded by either
9976
 * A) WOLFSSL_WPAS_SMALL is on or
9977
 * B) (OPENSSL_EXTRA or OPENSSL_EXTRA_X509_SMALL) + WOLFSSL_CERT_GEN +
9978
 *    (WOLFSSL_CERT_REQ or WOLFSSL_CERT_EXT or OPENSSL_EXTRA) has been
9979
 *    defined
9980
 */
9981
#if defined(WOLFSSL_WPAS_SMALL) || \
9982
    (defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)) && \
9983
    defined(WOLFSSL_CERT_GEN) && \
9984
    (defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_EXT) || \
9985
     defined(OPENSSL_EXTRA))
9986
9987
/* Converts the x509 name structure into DER format.
9988
 *
9989
 * out  pointer to either a pre setup buffer or a pointer to null for
9990
 *      creating a dynamic buffer. In the case that a pre-existing buffer is
9991
 *      used out will be incremented the size of the DER buffer on success. If
9992
 *      out is NULL, the function returns the necessary output buffer length.
9993
 *
9994
 * returns the size of the buffer on success, or negative value with failure
9995
 */
9996
int wolfSSL_i2d_X509_NAME(WOLFSSL_X509_NAME* name, unsigned char** out)
9997
{
9998
    int  totalBytes = 0, i, idx;
9999
    byte temp[MAX_SEQ_SZ];
10000
    byte *output, *local = NULL;
10001
#ifdef WOLFSSL_SMALL_STACK
10002
    EncodedName* names = NULL;
10003
#else
10004
    EncodedName  names[MAX_NAME_ENTRIES];
10005
#endif
10006
10007
    if (name == NULL)
10008
        return BAD_FUNC_ARG;
10009
10010
#ifdef WOLFSSL_SMALL_STACK
10011
    names = (EncodedName*)XMALLOC(sizeof(EncodedName) * MAX_NAME_ENTRIES, NULL,
10012
                                                       DYNAMIC_TYPE_TMP_BUFFER);
10013
    if (names == NULL)
10014
        return MEMORY_E;
10015
#endif
10016
10017
    XMEMSET(names, 0, sizeof(EncodedName) * MAX_NAME_ENTRIES);
10018
10019
    for (i = 0; i < MAX_NAME_ENTRIES; i++) {
10020
        WOLFSSL_X509_NAME_ENTRY* entry;
10021
        int ret;
10022
10023
        entry = wolfSSL_X509_NAME_get_entry(name, i);
10024
        if (entry != NULL && entry->set >= 1) {
10025
            const char* nameStr;
10026
            int type;
10027
            WOLFSSL_ASN1_STRING* data;
10028
10029
            data = wolfSSL_X509_NAME_ENTRY_get_data(entry);
10030
            if (data == NULL) {
10031
            #ifdef WOLFSSL_SMALL_STACK
10032
                XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
10033
            #endif
10034
                WOLFSSL_MSG("Error getting entry data");
10035
                return WOLFSSL_FATAL_ERROR;
10036
            }
10037
10038
            nameStr = (const char*)wolfSSL_ASN1_STRING_data(data);
10039
            type    = wolfSSL_ASN1_STRING_type(data);
10040
10041
            switch (type) {
10042
                case MBSTRING_UTF8:
10043
                    type = CTC_UTF8;
10044
                    break;
10045
                case V_ASN1_PRINTABLESTRING:
10046
                    type = CTC_PRINTABLE;
10047
                    break;
10048
                default:
10049
                    WOLFSSL_MSG("Unknown encoding type conversion UTF8 by default");
10050
                    type = CTC_UTF8;
10051
            }
10052
            ret = wc_EncodeName(&names[i], nameStr, (char)type,
10053
                (byte)ConvertNIDToWolfSSL(entry->nid));
10054
            if (ret < 0) {
10055
            #ifdef WOLFSSL_SMALL_STACK
10056
                XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
10057
            #endif
10058
                WOLFSSL_MSG("EncodeName failed");
10059
                return WOLFSSL_FATAL_ERROR;
10060
            }
10061
            totalBytes += ret;
10062
        }
10063
    }
10064
10065
    /* header */
10066
    idx = SetSequence(totalBytes, temp);
10067
    if (totalBytes + idx > ASN_NAME_MAX) {
10068
#ifdef WOLFSSL_SMALL_STACK
10069
        XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
10070
#endif
10071
        WOLFSSL_MSG("Total Bytes is greater than ASN_NAME_MAX");
10072
        return BUFFER_E;
10073
    }
10074
10075
    if (out == NULL) {
10076
        /* If out is NULL, caller just wants length. */
10077
        totalBytes += idx;
10078
#ifdef WOLFSSL_SMALL_STACK
10079
        XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
10080
#endif
10081
        return totalBytes;
10082
    }
10083
10084
    /* check if using buffer passed in */
10085
    if (*out == NULL) {
10086
        *out = local = (unsigned char*)XMALLOC(totalBytes + idx, name->heap,
10087
                DYNAMIC_TYPE_OPENSSL);
10088
        if (*out == NULL) {
10089
            return MEMORY_E;
10090
        }
10091
    }
10092
    output = *out;
10093
10094
    idx = SetSequence(totalBytes, output);
10095
    totalBytes += idx;
10096
    for (i = 0; i < MAX_NAME_ENTRIES; i++) {
10097
        if (names[i].used) {
10098
            XMEMCPY(output + idx, names[i].encoded, names[i].totalLen);
10099
            idx += names[i].totalLen;
10100
        }
10101
    }
10102
10103
#ifdef WOLFSSL_SMALL_STACK
10104
    XFREE(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
10105
#endif
10106
10107
    /* used existing buffer passed in, so increment pointer */
10108
    if (local == NULL) {
10109
        *out += totalBytes;
10110
    }
10111
    return totalBytes;
10112
}
10113
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
10114
#endif /* WOLFSSL_CERT_GEN */
10115
10116
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL) || \
10117
    defined (WOLFSSL_WPAS_SMALL)
10118
10119
    WOLFSSL_X509_NAME *wolfSSL_d2i_X509_NAME(WOLFSSL_X509_NAME **name,
10120
                                             unsigned char **in, long length)
10121
    {
10122
        WOLFSSL_X509_NAME* tmp = NULL;
10123
    #ifdef WOLFSSL_SMALL_STACK
10124
        DecodedCert* cert = NULL;
10125
    #else
10126
        DecodedCert cert[1];
10127
    #endif
10128
10129
        WOLFSSL_ENTER("wolfSSL_d2i_X509_NAME");
10130
10131
        if (!in || !*in || length <= 0) {
10132
            WOLFSSL_MSG("Bad argument");
10133
            return NULL;
10134
        }
10135
10136
    #ifdef WOLFSSL_SMALL_STACK
10137
        cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL,
10138
                                     DYNAMIC_TYPE_DCERT);
10139
        if (cert == NULL) {
10140
            return NULL;
10141
        }
10142
    #endif
10143
10144
        /* Set the X509_NAME buffer as the input data for cert.
10145
         * in is NOT a full certificate. Just the name. */
10146
        InitDecodedCert(cert, *in, (word32)length, NULL);
10147
10148
        /* Parse the X509 subject name */
10149
        if (GetName(cert, SUBJECT, (int)length) != 0) {
10150
            WOLFSSL_MSG("WOLFSSL_X509_NAME parse error");
10151
            goto cleanup;
10152
        }
10153
10154
        if (!(tmp = wolfSSL_X509_NAME_new())) {
10155
            WOLFSSL_MSG("wolfSSL_X509_NAME_new error");
10156
            goto cleanup;
10157
        }
10158
10159
        if (wolfSSL_X509_NAME_copy((WOLFSSL_X509_NAME*)cert->subjectName,
10160
                    tmp) != WOLFSSL_SUCCESS) {
10161
            wolfSSL_X509_NAME_free(tmp);
10162
            tmp = NULL;
10163
            goto cleanup;
10164
        }
10165
10166
        if (name)
10167
            *name = tmp;
10168
cleanup:
10169
        FreeDecodedCert(cert);
10170
    #ifdef WOLFSSL_SMALL_STACK
10171
        XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
10172
    #endif
10173
        return tmp;
10174
    }
10175
#endif /* OPENSSL_EXTRA || OPENSSL_ALL || WOLFSSL_WPAS_SMALL */
10176
10177
10178
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL)
10179
10180
    /* Compares the two X509 names. If the size of x is larger then y then a
10181
     * positive value is returned if x is smaller a negative value is returned.
10182
     * In the case that the sizes are equal a the value of strcmp between the
10183
     * two names is returned.
10184
     *
10185
     * x First name for comparison
10186
     * y Second name to compare with x
10187
     */
10188
    int wolfSSL_X509_NAME_cmp(const WOLFSSL_X509_NAME* x,
10189
            const WOLFSSL_X509_NAME* y)
10190
    {
10191
        const char* _x;
10192
        const char* _y;
10193
        WOLFSSL_ENTER("wolfSSL_X509_NAME_cmp");
10194
10195
        if (x == NULL || y == NULL) {
10196
            WOLFSSL_MSG("Bad argument passed in");
10197
            return -2;
10198
        }
10199
10200
        if (x == y) {
10201
            return 0; /* match */
10202
        }
10203
10204
        if (x->sz != y->sz) {
10205
            return x->sz - y->sz;
10206
        }
10207
10208
        /*
10209
         * If the name member is not set or is immediately null terminated then
10210
         * compare the staticName member
10211
         */
10212
        _x = (x->name && *x->name) ? x->name : x->staticName;
10213
        _y = (y->name && *y->name) ? y->name : y->staticName;
10214
10215
        return XSTRNCMP(_x, _y, x->sz); /* y sz is the same */
10216
    }
10217
10218
#ifndef NO_BIO
10219
10220
    static WOLFSSL_X509 *loadX509orX509REQFromPemBio(WOLFSSL_BIO *bp,
10221
            WOLFSSL_X509 **x, wc_pem_password_cb *cb, void *u, int type)
10222
    {
10223
        WOLFSSL_X509* x509 = NULL;
10224
#if defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM)
10225
        unsigned char* pem = NULL;
10226
        int pemSz;
10227
        long  i = 0, l, footerSz;
10228
        const char* footer = NULL;
10229
10230
        WOLFSSL_ENTER("loadX509orX509REQFromPemBio");
10231
10232
        if (bp == NULL || (type != CERT_TYPE && type != CERTREQ_TYPE)) {
10233
            WOLFSSL_LEAVE("wolfSSL_PEM_read_bio_X509", BAD_FUNC_ARG);
10234
            return NULL;
10235
        }
10236
10237
        if ((l = wolfSSL_BIO_get_len(bp)) <= 0) {
10238
            /* No certificate in buffer */
10239
            WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
10240
            return NULL;
10241
        }
10242
10243
        pemSz = (int)l;
10244
        pem   = (unsigned char*)XMALLOC(pemSz, 0, DYNAMIC_TYPE_PEM);
10245
        if (pem == NULL)
10246
            return NULL;
10247
        XMEMSET(pem, 0, pemSz);
10248
10249
        i = 0;
10250
        if (wc_PemGetHeaderFooter(type, NULL, &footer) != 0) {
10251
            XFREE(pem, 0, DYNAMIC_TYPE_PEM);
10252
            return NULL;
10253
        }
10254
        footerSz = (long)XSTRLEN(footer);
10255
10256
        /* TODO: Inefficient
10257
         * reading in one byte at a time until see the footer
10258
         */
10259
        while ((l = wolfSSL_BIO_read(bp, (char *)&pem[i], 1)) == 1) {
10260
            i++;
10261
            if (i > footerSz && XMEMCMP((char *)&pem[i-footerSz], footer,
10262
                    footerSz) == 0) {
10263
                if (wolfSSL_BIO_read(bp, (char *)&pem[i], 1) == 1) {
10264
                    /* attempt to read newline following footer */
10265
                    i++;
10266
                    if (pem[i-1] == '\r') {
10267
                        /* found \r , Windows line ending is \r\n so try to read one
10268
                         * more byte for \n, ignoring return value */
10269
                        (void)wolfSSL_BIO_read(bp, (char *)&pem[i++], 1);
10270
                    }
10271
                }
10272
                break;
10273
            }
10274
        }
10275
        if (l == 0)
10276
            WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
10277
        if (i > pemSz) {
10278
            WOLFSSL_MSG("Error parsing PEM");
10279
        }
10280
        else {
10281
            pemSz = (int)i;
10282
        #ifdef WOLFSSL_CERT_REQ
10283
            if (type == CERTREQ_TYPE)
10284
                x509 = wolfSSL_X509_REQ_load_certificate_buffer(pem, pemSz,
10285
                                                          WOLFSSL_FILETYPE_PEM);
10286
            else
10287
        #endif
10288
                x509 = wolfSSL_X509_load_certificate_buffer(pem, pemSz,
10289
                                                          WOLFSSL_FILETYPE_PEM);
10290
        }
10291
10292
        if (x != NULL) {
10293
            *x = x509;
10294
        }
10295
10296
        XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
10297
10298
#endif /* WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM */
10299
        (void)bp;
10300
        (void)x;
10301
        (void)cb;
10302
        (void)u;
10303
10304
        return x509;
10305
    }
10306
10307
10308
    WOLFSSL_X509 *wolfSSL_PEM_read_bio_X509(WOLFSSL_BIO *bp, WOLFSSL_X509 **x,
10309
                                            wc_pem_password_cb *cb, void *u)
10310
    {
10311
        return loadX509orX509REQFromPemBio(bp, x, cb, u, CERT_TYPE);
10312
    }
10313
10314
#ifdef WOLFSSL_CERT_REQ
10315
    WOLFSSL_X509 *wolfSSL_PEM_read_bio_X509_REQ(WOLFSSL_BIO *bp, WOLFSSL_X509 **x,
10316
                                                wc_pem_password_cb *cb, void *u)
10317
    {
10318
        return loadX509orX509REQFromPemBio(bp, x, cb, u, CERTREQ_TYPE);
10319
    }
10320
10321
#ifndef NO_FILESYSTEM
10322
    WOLFSSL_X509* wolfSSL_PEM_read_X509_REQ(XFILE fp, WOLFSSL_X509** x,
10323
                                            wc_pem_password_cb* cb, void* u)
10324
    {
10325
        int err = 0;
10326
        WOLFSSL_X509* ret = NULL;
10327
        WOLFSSL_BIO* bio = NULL;
10328
10329
        WOLFSSL_ENTER("wolfSSL_PEM_read_X509_REQ");
10330
10331
        if (fp == XBADFILE) {
10332
            WOLFSSL_MSG("Invalid file.");
10333
            err = 1;
10334
        }
10335
10336
        if (err == 0) {
10337
            bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file());
10338
            if (bio == NULL) {
10339
                WOLFSSL_MSG("Failed to create new BIO with input file.");
10340
                err = 1;
10341
            }
10342
        }
10343
        if (err == 0 && wolfSSL_BIO_set_fp(bio, fp, BIO_CLOSE)
10344
                != WOLFSSL_SUCCESS) {
10345
            WOLFSSL_MSG("Failed to set BIO file pointer.");
10346
            err = 1;
10347
        }
10348
        if (err == 0) {
10349
            ret = wolfSSL_PEM_read_bio_X509_REQ(bio, x, cb, u);
10350
        }
10351
10352
        if (bio != NULL) {
10353
            wolfSSL_BIO_free(bio);
10354
        }
10355
10356
        return ret;
10357
    }
10358
#endif /* !NO_FILESYSTEM */
10359
#endif /* WOLFSSL_CERT_REQ */
10360
10361
    WOLFSSL_X509_CRL *wolfSSL_PEM_read_bio_X509_CRL(WOLFSSL_BIO *bp,
10362
            WOLFSSL_X509_CRL **x, wc_pem_password_cb *cb, void *u)
10363
    {
10364
#if defined(WOLFSSL_PEM_TO_DER) && defined(HAVE_CRL)
10365
        unsigned char* pem = NULL;
10366
        int pemSz;
10367
        int derSz;
10368
        DerBuffer* der = NULL;
10369
        WOLFSSL_X509_CRL* crl = NULL;
10370
10371
        if ((pemSz = wolfSSL_BIO_get_len(bp)) <= 0) {
10372
            goto err;
10373
        }
10374
10375
        pem = (unsigned char*)XMALLOC(pemSz, 0, DYNAMIC_TYPE_PEM);
10376
        if (pem == NULL) {
10377
            goto err;
10378
        }
10379
10380
        if (wolfSSL_BIO_read(bp, pem, pemSz) != pemSz) {
10381
            goto err;
10382
        }
10383
10384
        if((PemToDer(pem, pemSz, CRL_TYPE, &der, NULL, NULL, NULL)) < 0) {
10385
            goto err;
10386
        }
10387
        derSz = der->length;
10388
        if((crl = wolfSSL_d2i_X509_CRL(x, der->buffer, derSz)) == NULL) {
10389
            goto err;
10390
        }
10391
10392
err:
10393
        if(pem != NULL) {
10394
            XFREE(pem, 0, DYNAMIC_TYPE_PEM);
10395
        }
10396
        if(der != NULL) {
10397
            FreeDer(&der);
10398
        }
10399
10400
        (void)cb;
10401
        (void)u;
10402
10403
        return crl;
10404
#else
10405
        (void)bp;
10406
        (void)x;
10407
        (void)cb;
10408
        (void)u;
10409
10410
        return NULL;
10411
#endif
10412
    }
10413
10414
#endif /* !NO_BIO */
10415
10416
#if !defined(NO_FILESYSTEM)
10417
    static void* wolfSSL_PEM_read_X509_ex(XFILE fp, void **x,
10418
        wc_pem_password_cb *cb, void *u, int type)
10419
    {
10420
        unsigned char* pem = NULL;
10421
        int pemSz;
10422
        long i = 0, l;
10423
        void *newx509;
10424
        int derSz;
10425
        DerBuffer* der = NULL;
10426
10427
        WOLFSSL_ENTER("wolfSSL_PEM_read_X509");
10428
10429
        if (fp == XBADFILE) {
10430
            WOLFSSL_LEAVE("wolfSSL_PEM_read_X509", BAD_FUNC_ARG);
10431
            return NULL;
10432
        }
10433
        /* Read cert from file */
10434
        i = XFTELL(fp);
10435
        if (i < 0) {
10436
            WOLFSSL_LEAVE("wolfSSL_PEM_read_X509", BAD_FUNC_ARG);
10437
            return NULL;
10438
        }
10439
10440
        if (XFSEEK(fp, 0, XSEEK_END) != 0)
10441
            return NULL;
10442
        l = XFTELL(fp);
10443
        if (l < 0)
10444
            return NULL;
10445
        if (XFSEEK(fp, i, SEEK_SET) != 0)
10446
            return NULL;
10447
        pemSz = (int)(l - i);
10448
10449
        /* check calculated length */
10450
        if (pemSz > MAX_WOLFSSL_FILE_SIZE || pemSz < 0) {
10451
            WOLFSSL_MSG("PEM_read_X509_ex file size error");
10452
            return NULL;
10453
        }
10454
10455
        /* allocate pem buffer */
10456
        pem = (unsigned char*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_PEM);
10457
        if (pem == NULL)
10458
            return NULL;
10459
10460
        if ((int)XFREAD((char *)pem, 1, pemSz, fp) != pemSz)
10461
            goto err_exit;
10462
10463
        switch (type) {
10464
            case CERT_TYPE:
10465
                newx509 = (void *)wolfSSL_X509_load_certificate_buffer(pem,
10466
                    pemSz, WOLFSSL_FILETYPE_PEM);
10467
                break;
10468
10469
        #ifdef HAVE_CRL
10470
            case CRL_TYPE:
10471
                if ((PemToDer(pem, pemSz, CRL_TYPE, &der, NULL, NULL, NULL)) < 0)
10472
                    goto err_exit;
10473
                derSz = der->length;
10474
                newx509 = (void*)wolfSSL_d2i_X509_CRL((WOLFSSL_X509_CRL **)x,
10475
                    (const unsigned char *)der->buffer, derSz);
10476
                if (newx509 == NULL)
10477
                    goto err_exit;
10478
                FreeDer(&der);
10479
                break;
10480
        #endif
10481
10482
            default:
10483
                goto err_exit;
10484
        }
10485
        if (x != NULL) {
10486
            *x = newx509;
10487
        }
10488
        XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
10489
        return newx509;
10490
10491
    err_exit:
10492
        if (pem != NULL)
10493
            XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
10494
        if (der != NULL)
10495
            FreeDer(&der);
10496
10497
        /* unused */
10498
        (void)cb;
10499
        (void)u;
10500
        (void)derSz;
10501
10502
        return NULL;
10503
    }
10504
10505
    WOLFSSL_API WOLFSSL_X509* wolfSSL_PEM_read_X509(XFILE fp, WOLFSSL_X509 **x,
10506
                                                    wc_pem_password_cb *cb,
10507
                                                    void *u)
10508
    {
10509
        return (WOLFSSL_X509* )wolfSSL_PEM_read_X509_ex(fp, (void **)x, cb, u, CERT_TYPE);
10510
    }
10511
10512
#if defined(HAVE_CRL)
10513
    WOLFSSL_API WOLFSSL_X509_CRL* wolfSSL_PEM_read_X509_CRL(XFILE fp, WOLFSSL_X509_CRL **crl,
10514
                                                    wc_pem_password_cb *cb, void *u)
10515
    {
10516
        return (WOLFSSL_X509_CRL* )wolfSSL_PEM_read_X509_ex(fp, (void **)crl, cb, u, CRL_TYPE);
10517
    }
10518
#endif
10519
10520
#ifdef WOLFSSL_CERT_GEN
10521
#ifndef NO_BIO
10522
    int wolfSSL_PEM_write_X509(XFILE fp, WOLFSSL_X509* x)
10523
    {
10524
        int ret;
10525
        WOLFSSL_BIO* bio;
10526
10527
        if (x == NULL)
10528
            return 0;
10529
10530
        bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file());
10531
        if (bio == NULL)
10532
            return 0;
10533
10534
        if (wolfSSL_BIO_set_fp(bio, fp, BIO_NOCLOSE) != WOLFSSL_SUCCESS) {
10535
            wolfSSL_BIO_free(bio);
10536
            bio = NULL;
10537
        }
10538
10539
        ret = wolfSSL_PEM_write_bio_X509(bio, x);
10540
10541
        if (bio != NULL)
10542
            wolfSSL_BIO_free(bio);
10543
10544
        return ret;
10545
    }
10546
#endif /* !NO_BIO */
10547
#endif /* WOLFSSL_CERT_GEN */
10548
#endif /* !NO_FILESYSTEM */
10549
10550
#endif /* OPENSSL_EXTRA || OPENSSL_ALL */
10551
#ifdef OPENSSL_ALL
10552
10553
#ifndef NO_BIO
10554
    /* create and return a new WOLFSSL_X509_PKEY structure or NULL on failure */
10555
    static WOLFSSL_X509_PKEY* wolfSSL_X509_PKEY_new(void* heap)
10556
    {
10557
        WOLFSSL_X509_PKEY* ret;
10558
10559
        ret = (WOLFSSL_X509_PKEY*)XMALLOC(sizeof(WOLFSSL_X509_PKEY), heap,
10560
            DYNAMIC_TYPE_KEY);
10561
        if (ret != NULL) {
10562
            XMEMSET(ret, 0, sizeof(WOLFSSL_X509_PKEY));
10563
            ret->heap = heap;
10564
        }
10565
        return ret;
10566
    }
10567
#endif /* !NO_BIO */
10568
10569
10570
    /* free up all memory used by "xPkey" passed in */
10571
    static void wolfSSL_X509_PKEY_free(WOLFSSL_X509_PKEY* xPkey)
10572
    {
10573
        if (xPkey != NULL) {
10574
            wolfSSL_EVP_PKEY_free(xPkey->dec_pkey);
10575
            XFREE(xPkey, xPkey->heap, DYNAMIC_TYPE_KEY);
10576
        }
10577
    }
10578
10579
10580
#ifndef NO_BIO
10581
10582
#define PEM_COMPARE_HEADER(start, end, header) \
10583
        ((end) - (start) == XSTR_SIZEOF(header) && XMEMCMP(start, header, \
10584
                XSTR_SIZEOF(header)) == 0)
10585
10586
    /**
10587
     * This read one structure from bio and returns the read structure
10588
     * in the appropriate output parameter (x509, crl, x_pkey). The
10589
     * output parameters must be set to NULL.
10590
     * @param bio    Input for reading structures
10591
     * @param cb     Password callback
10592
     * @param x509   Output
10593
     * @param crl    Output
10594
     * @param x_pkey Output
10595
     * @return WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE otherwise
10596
     */
10597
    static int wolfSSL_PEM_X509_X509_CRL_X509_PKEY_read_bio(
10598
            WOLFSSL_BIO* bio, wc_pem_password_cb* cb, WOLFSSL_X509** x509,
10599
            WOLFSSL_X509_CRL** crl, WOLFSSL_X509_PKEY** x_pkey)
10600
    {
10601
10602
#if defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM)
10603
        char* pem = NULL;
10604
        long  i = pem_struct_min_sz, l;
10605
        const char* header = NULL;
10606
        const char* headerEnd = NULL;
10607
        const char* footer = NULL;
10608
        const char* footerEnd = NULL;
10609
    #ifdef HAVE_CRL
10610
        DerBuffer* der = NULL;
10611
    #endif
10612
        WOLFSSL_BIO* pemBio = NULL;
10613
10614
        if (!bio || !x509 || *x509 || !crl || *crl || !x_pkey || *x_pkey) {
10615
            WOLFSSL_MSG("Bad input parameter or output parameters "
10616
                        "not set to a NULL value.");
10617
            return WOLFSSL_FAILURE;
10618
        }
10619
10620
        if ((l = wolfSSL_BIO_get_len(bio)) <= 0) {
10621
            /* No certificate in buffer */
10622
            WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
10623
            return WOLFSSL_FAILURE;
10624
        }
10625
10626
        pem = (char*)XMALLOC(l, 0, DYNAMIC_TYPE_PEM);
10627
        if (pem == NULL)
10628
            return WOLFSSL_FAILURE;
10629
10630
        if (wolfSSL_BIO_read(bio, &pem[0], pem_struct_min_sz) !=
10631
                pem_struct_min_sz) {
10632
            WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
10633
            goto err;
10634
        }
10635
10636
        /* Read the header and footer */
10637
        while (i < l && wolfSSL_BIO_read(bio, &pem[i], 1) == 1) {
10638
            i++;
10639
            if (!header) {
10640
                header = XSTRNSTR(pem, "-----BEGIN ", (unsigned int)i);
10641
            }
10642
            else if (!headerEnd) {
10643
                headerEnd = XSTRNSTR(header + XSTR_SIZEOF("-----BEGIN "),
10644
                        "-----",
10645
                        (unsigned int)
10646
                        (i - (header + XSTR_SIZEOF("-----BEGIN ") - pem)));
10647
                if (headerEnd) {
10648
                    headerEnd += XSTR_SIZEOF("-----");
10649
                    /* Read in the newline */
10650
                    if (wolfSSL_BIO_read(bio, &pem[i], 1) != 1) {
10651
                        WOLFSSL_MSG("wolfSSL_BIO_read error");
10652
                        goto err;
10653
                    }
10654
                    i++;
10655
                    if (*headerEnd != '\n' && *headerEnd != '\r') {
10656
                        WOLFSSL_MSG("Missing newline after header");
10657
                        goto err;
10658
                    }
10659
                }
10660
            }
10661
            else if (!footer) {
10662
                footer = XSTRNSTR(headerEnd, "-----END ",
10663
                        (unsigned int)(i - (headerEnd - pem)));
10664
            }
10665
            else if (!footerEnd) {
10666
                footerEnd = XSTRNSTR(footer + XSTR_SIZEOF("-----"),
10667
                        "-----", (unsigned int)(i -
10668
                            (footer + XSTR_SIZEOF("-----") - pem)));
10669
                if (footerEnd) {
10670
                    footerEnd += XSTR_SIZEOF("-----");
10671
                    /* Now check that footer matches header */
10672
                    if ((headerEnd - (header + XSTR_SIZEOF("-----BEGIN "))) ==
10673
                        (footerEnd - (footer + XSTR_SIZEOF("-----END "))) &&
10674
                        XMEMCMP(header + XSTR_SIZEOF("-----BEGIN "),
10675
                                footer + XSTR_SIZEOF("-----END "),
10676
                        headerEnd - (header + XSTR_SIZEOF("-----BEGIN ")))
10677
                            != 0) {
10678
                        WOLFSSL_MSG("Header and footer don't match");
10679
                        goto err;
10680
                    }
10681
                    /* header and footer match */
10682
                    break;
10683
                }
10684
            }
10685
        }
10686
        if (!footerEnd) {
10687
            /* Only check footerEnd since it is set last */
10688
            WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
10689
            goto err;
10690
        }
10691
        else {
10692
            if (PEM_COMPARE_HEADER(header, headerEnd,
10693
                    "-----BEGIN CERTIFICATE-----")) {
10694
                /* We have a certificate */
10695
                WOLFSSL_MSG("Parsing x509 cert");
10696
                *x509 = wolfSSL_X509_load_certificate_buffer(
10697
                        (const unsigned char*) header,
10698
                        (int)(footerEnd - header), WOLFSSL_FILETYPE_PEM);
10699
                if (!*x509) {
10700
                    WOLFSSL_MSG("wolfSSL_X509_load_certificate_buffer error");
10701
                    goto err;
10702
                }
10703
            }
10704
    #ifdef HAVE_CRL
10705
            else if (PEM_COMPARE_HEADER(header, headerEnd,
10706
                        "-----BEGIN X509 CRL-----")) {
10707
                /* We have a crl */
10708
                WOLFSSL_MSG("Parsing crl");
10709
                if((PemToDer((const unsigned char*) header, footerEnd - header,
10710
                        CRL_TYPE, &der, NULL, NULL, NULL)) < 0) {
10711
                    WOLFSSL_MSG("PemToDer error");
10712
                    goto err;
10713
                }
10714
                *crl = wolfSSL_d2i_X509_CRL(NULL, der->buffer, der->length);
10715
                if (!*crl) {
10716
                    WOLFSSL_MSG("wolfSSL_d2i_X509_CRL error");
10717
                    goto err;
10718
                }
10719
            }
10720
    #endif
10721
            else {
10722
                WOLFSSL_MSG("Parsing x509 key");
10723
10724
                if (!(*x_pkey = wolfSSL_X509_PKEY_new(NULL))) {
10725
                    WOLFSSL_MSG("wolfSSL_X509_PKEY_new error");
10726
                    goto err;
10727
                }
10728
10729
                if (!(pemBio = wolfSSL_BIO_new(wolfSSL_BIO_s_mem()))) {
10730
                    WOLFSSL_MSG("wolfSSL_BIO_new error");
10731
                    goto err;
10732
                }
10733
10734
                if (wolfSSL_BIO_write(pemBio, header,
10735
                        (int)(footerEnd - header)) != footerEnd - header) {
10736
                    WOLFSSL_MSG("wolfSSL_BIO_new error");
10737
                    goto err;
10738
                }
10739
10740
                if (wolfSSL_PEM_read_bio_PrivateKey(pemBio,
10741
                        &(*x_pkey)->dec_pkey, cb, NULL) == NULL) {
10742
                    WOLFSSL_MSG("wolfSSL_PEM_read_bio_PrivateKey error");
10743
                    goto err;
10744
                }
10745
10746
                wolfSSL_BIO_free(pemBio);
10747
            }
10748
        }
10749
10750
        XFREE(pem, 0, DYNAMIC_TYPE_PEM);
10751
    #ifdef HAVE_CRL
10752
        if (der)
10753
            FreeDer(&der);
10754
    #endif
10755
        return WOLFSSL_SUCCESS;
10756
err:
10757
        if (pem)
10758
            XFREE(pem, 0, DYNAMIC_TYPE_PEM);
10759
    #ifdef HAVE_CRL
10760
        if (der)
10761
            FreeDer(&der);
10762
    #endif
10763
        if (*x_pkey) {
10764
            wolfSSL_X509_PKEY_free(*x_pkey);
10765
            *x_pkey = NULL;
10766
        }
10767
        if (pemBio)
10768
            wolfSSL_BIO_free(pemBio);
10769
        return WOLFSSL_FAILURE;
10770
#else /* ! (WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM) */
10771
        return WOLFSSL_FAILURE;
10772
#endif /* WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM */
10773
    }
10774
10775
#ifndef NO_FILESYSTEM
10776
    WOLF_STACK_OF(WOLFSSL_X509_INFO)* wolfSSL_PEM_X509_INFO_read(
10777
            XFILE fp, WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
10778
            pem_password_cb* cb, void* u)
10779
    {
10780
        WOLFSSL_BIO* fileBio = wolfSSL_BIO_new_fp(fp, BIO_NOCLOSE);
10781
        WOLF_STACK_OF(WOLFSSL_X509_INFO)* ret = NULL;
10782
10783
        WOLFSSL_ENTER("wolfSSL_PEM_X509_INFO_read");
10784
        if (fileBio != NULL) {
10785
            ret = wolfSSL_PEM_X509_INFO_read_bio(fileBio, sk, cb, u);
10786
            wolfSSL_BIO_free(fileBio);
10787
        }
10788
        return ret;
10789
    }
10790
#endif /* !NO_FILESYSTEM */
10791
10792
    /*
10793
     * bio WOLFSSL_BIO to read certificates from
10794
     * sk  possible stack to push more X509_INFO structs to. Can be NULL
10795
     * cb  callback password for encrypted PEM certificates
10796
     * u   user input such as password
10797
     *
10798
     * returns stack on success and NULL or default stack passed in on fail
10799
     */
10800
    WOLF_STACK_OF(WOLFSSL_X509_INFO)* wolfSSL_PEM_X509_INFO_read_bio(
10801
        WOLFSSL_BIO* bio, WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
10802
        wc_pem_password_cb* cb, void* u)
10803
    {
10804
        WOLF_STACK_OF(WOLFSSL_X509_INFO)* localSk = NULL;
10805
        int ret = WOLFSSL_SUCCESS;
10806
        WOLFSSL_X509_INFO* current = NULL;
10807
        WOLFSSL_X509*      x509 = NULL;
10808
        WOLFSSL_X509_CRL*  crl  = NULL;
10809
        WOLFSSL_X509_PKEY* x_pkey = NULL;
10810
10811
        (void)u;
10812
10813
        WOLFSSL_ENTER("wolfSSL_PEM_X509_INFO_read_bio");
10814
10815
        /* attempt to use passed in stack or create a new one */
10816
        if (sk != NULL) {
10817
            localSk = sk;
10818
        }
10819
        else {
10820
            localSk = wolfSSL_sk_X509_INFO_new_null();
10821
        }
10822
        if (localSk == NULL) {
10823
            WOLFSSL_LEAVE("wolfSSL_PEM_X509_INFO_read_bio",
10824
                    MEMORY_E);
10825
            return NULL;
10826
        }
10827
10828
        /* parse through BIO and push new info's found onto stack */
10829
        while (1) {
10830
            x509 = NULL;
10831
            crl  = NULL;
10832
            x_pkey = NULL;
10833
10834
            if (wolfSSL_PEM_X509_X509_CRL_X509_PKEY_read_bio(bio, cb,
10835
                    &x509, &crl, &x_pkey) == WOLFSSL_SUCCESS) {
10836
                if (current == NULL ||
10837
                        (x509 && current->x509) ||
10838
                        (crl && current->crl) ||
10839
                        (x_pkey && current->x_pkey)) {
10840
                    /* Need to create new current since existing one already
10841
                     * has the member filled or this is the first successful
10842
                     * read. */
10843
                    current = wolfSSL_X509_INFO_new();
10844
                    if (current == NULL) {
10845
                        ret = MEMORY_E;
10846
                        break;
10847
                    }
10848
                    if (wolfSSL_sk_X509_INFO_push(localSk, current) !=
10849
                            WOLFSSL_SUCCESS) {
10850
                        wolfSSL_X509_INFO_free(current);
10851
                        current = NULL;
10852
                        ret = WOLFSSL_FAILURE;
10853
                        break;
10854
                    }
10855
                }
10856
10857
                if (x509) {
10858
                    current->x509 = x509;
10859
                }
10860
                else if (crl) {
10861
                    current->crl = crl;
10862
                }
10863
                else if (x_pkey) {
10864
                    current->x_pkey = x_pkey;
10865
                }
10866
                else {
10867
                    WOLFSSL_MSG("No output parameters set");
10868
                    ret = WOLFSSL_FAILURE;
10869
                    break;
10870
                }
10871
            }
10872
            else {
10873
#ifdef WOLFSSL_HAVE_ERROR_QUEUE
10874
                unsigned long err;
10875
                CLEAR_ASN_NO_PEM_HEADER_ERROR(err);
10876
                if (ERR_GET_LIB(err) != ERR_LIB_PEM ||
10877
                    ERR_GET_REASON(err) != PEM_R_NO_START_LINE) {
10878
                    ret = WOLFSSL_FAILURE;
10879
                }
10880
#else
10881
                if (wolfSSL_sk_X509_INFO_num(localSk) > 0) {
10882
                    WOLFSSL_MSG("At least one X509_INFO object on stack."
10883
                                "Assuming error means EOF or no more PEM"
10884
                                "headers found.");
10885
                }
10886
                else {
10887
                    ret = WOLFSSL_FAILURE;
10888
                }
10889
#endif
10890
                break;
10891
            }
10892
        }
10893
        if (ret != WOLFSSL_SUCCESS ||
10894
                wolfSSL_sk_X509_INFO_num(localSk) == 0) {
10895
            /* current should always be pushed onto the localsk stack at this
10896
             * point. The only case when it isn't is when
10897
             * wolfSSL_sk_X509_INFO_push fails but in that case the current
10898
             * free is handled inside the loop. */
10899
            if (localSk != sk) {
10900
                wolfSSL_sk_pop_free(localSk, NULL);
10901
            }
10902
            wolfSSL_X509_free(x509);
10903
#ifdef HAVE_CRL
10904
            wolfSSL_X509_CRL_free(crl);
10905
#endif
10906
            wolfSSL_X509_PKEY_free(x_pkey);
10907
            localSk = NULL;
10908
        }
10909
        WOLFSSL_LEAVE("wolfSSL_PEM_X509_INFO_read_bio", ret);
10910
        return localSk;
10911
    }
10912
#endif /* !NO_BIO */
10913
#endif /* OPENSSL_ALL */
10914
10915
    void wolfSSL_X509_NAME_ENTRY_free(WOLFSSL_X509_NAME_ENTRY* ne)
10916
    {
10917
        WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_free");
10918
        if (ne != NULL) {
10919
            wolfSSL_ASN1_OBJECT_free(ne->object);
10920
            if (ne->value != NULL) {
10921
                wolfSSL_ASN1_STRING_free(ne->value);
10922
            }
10923
            XFREE(ne, NULL, DYNAMIC_TYPE_NAME_ENTRY);
10924
        }
10925
    }
10926
10927
10928
    WOLFSSL_X509_NAME_ENTRY* wolfSSL_X509_NAME_ENTRY_new(void)
10929
    {
10930
        WOLFSSL_X509_NAME_ENTRY* ne;
10931
10932
        ne = (WOLFSSL_X509_NAME_ENTRY*)XMALLOC(sizeof(WOLFSSL_X509_NAME_ENTRY),
10933
                NULL, DYNAMIC_TYPE_NAME_ENTRY);
10934
        if (ne != NULL) {
10935
            XMEMSET(ne, 0, sizeof(WOLFSSL_X509_NAME_ENTRY));
10936
        }
10937
10938
        return ne;
10939
    }
10940
10941
10942
    /* Create a new WOLFSSL_X509_NAME_ENTRY structure based on the text passed
10943
     * in. Returns NULL on failure */
10944
    WOLFSSL_X509_NAME_ENTRY* wolfSSL_X509_NAME_ENTRY_create_by_txt(
10945
            WOLFSSL_X509_NAME_ENTRY **neIn, const char *txt, int type,
10946
            const unsigned char *data, int dataSz)
10947
    {
10948
        int nid = -1;
10949
        WOLFSSL_X509_NAME_ENTRY* ne = NULL;
10950
10951
        WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_create_by_txt()");
10952
10953
        if (txt == NULL) {
10954
            return NULL;
10955
        }
10956
10957
        if (neIn != NULL) {
10958
            ne = *neIn;
10959
        }
10960
10961
        nid = wolfSSL_OBJ_txt2nid(txt);
10962
        if (nid == NID_undef) {
10963
            WOLFSSL_MSG("Unable to find text");
10964
            ne = NULL;
10965
        }
10966
        else {
10967
            if (ne == NULL) {
10968
                ne = wolfSSL_X509_NAME_ENTRY_new();
10969
                if (ne == NULL) {
10970
                    return NULL;
10971
                }
10972
            }
10973
            ne->nid = nid;
10974
            ne->object = wolfSSL_OBJ_nid2obj_ex(nid, ne->object);
10975
            ne->value = wolfSSL_ASN1_STRING_type_new(type);
10976
            if (ne->value != NULL) {
10977
                if (wolfSSL_ASN1_STRING_set(ne->value, (const void*)data,
10978
                                            dataSz) == WOLFSSL_SUCCESS) {
10979
                    ne->set = 1;
10980
                }
10981
            }
10982
        }
10983
10984
        return ne;
10985
    }
10986
10987
10988
    /* Creates a new entry given the NID, type, and data
10989
     * "dataSz" is number of bytes in data, if set to -1 then XSTRLEN is used
10990
     * "out" can be used to store the new entry data in an existing structure
10991
     *       if NULL then a new WOLFSSL_X509_NAME_ENTRY structure is created
10992
     * returns a pointer to WOLFSSL_X509_NAME_ENTRY on success and NULL on fail
10993
     */
10994
    WOLFSSL_X509_NAME_ENTRY* wolfSSL_X509_NAME_ENTRY_create_by_NID(
10995
            WOLFSSL_X509_NAME_ENTRY** out, int nid, int type,
10996
            const unsigned char* data, int dataSz)
10997
    {
10998
        WOLFSSL_X509_NAME_ENTRY* ne;
10999
11000
#ifdef WOLFSSL_DEBUG_OPENSSL
11001
        WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_create_by_NID()");
11002
#endif
11003
11004
        if (!data) {
11005
            WOLFSSL_MSG("Bad parameter");
11006
            return NULL;
11007
        }
11008
11009
        if (out == NULL || *out == NULL) {
11010
            ne = wolfSSL_X509_NAME_ENTRY_new();
11011
            if (ne == NULL) {
11012
                return NULL;
11013
            }
11014
            if (out != NULL) {
11015
                *out = ne;
11016
            }
11017
        }
11018
        else {
11019
            ne = *out;
11020
        }
11021
11022
        ne->nid = nid;
11023
        ne->object = wolfSSL_OBJ_nid2obj_ex(nid, ne->object);
11024
        ne->value = wolfSSL_ASN1_STRING_type_new(type);
11025
        if (ne->value != NULL) {
11026
            if (wolfSSL_ASN1_STRING_set(ne->value, (const void*)data, dataSz)
11027
                    == WOLFSSL_SUCCESS) {
11028
                ne->set = 1;
11029
            }
11030
        }
11031
11032
        return ne;
11033
    }
11034
11035
    /* add all entry of type "nid" to the buffer "fullName" and advance "idx"
11036
     * since number of entries is small, a brute force search is used here
11037
     * returns the number of entries added
11038
     */
11039
    static int AddAllEntry(WOLFSSL_X509_NAME* name, char* fullName,
11040
            int fullNameSz, int* idx)
11041
    {
11042
        int i;
11043
        int ret = 0;
11044
11045
        for (i = 0; i < MAX_NAME_ENTRIES; i++) {
11046
            if (name->entry[i].set) {
11047
                WOLFSSL_X509_NAME_ENTRY* e;
11048
                WOLFSSL_ASN1_OBJECT* obj;
11049
11050
                int sz;
11051
                unsigned char* data;
11052
11053
                e = &name->entry[i];
11054
                obj = wolfSSL_X509_NAME_ENTRY_get_object(e);
11055
                if (obj == NULL) {
11056
                    return BAD_FUNC_ARG;
11057
                }
11058
11059
                XMEMCPY(fullName + *idx, "/", 1); *idx = *idx + 1;
11060
                sz = (int)XSTRLEN(obj->sName);
11061
                XMEMCPY(fullName + *idx, obj->sName, sz);
11062
                *idx += sz;
11063
                XMEMCPY(fullName + *idx, "=", 1); *idx = *idx + 1;
11064
11065
                data = wolfSSL_ASN1_STRING_data(e->value);
11066
                if (data != NULL) {
11067
                    sz = (int)XSTRLEN((const char*)data);
11068
                    XMEMCPY(fullName + *idx, data, sz);
11069
                    *idx += sz;
11070
                }
11071
11072
                ret++;
11073
            }
11074
        }
11075
        (void)fullNameSz;
11076
        return ret;
11077
    }
11078
11079
11080
    /* Converts a list of entries in WOLFSSL_X509_NAME struct into a string
11081
     * returns 0 on success */
11082
    static int RebuildFullName(WOLFSSL_X509_NAME* name)
11083
    {
11084
        int totalLen = 0, i, idx, entryCount = 0;
11085
        char* fullName;
11086
11087
        if (name == NULL)
11088
            return BAD_FUNC_ARG;
11089
11090
        for (i = 0; i < MAX_NAME_ENTRIES; i++) {
11091
            if (name->entry[i].set) {
11092
                WOLFSSL_X509_NAME_ENTRY* e;
11093
                WOLFSSL_ASN1_OBJECT* obj;
11094
11095
                e = &name->entry[i];
11096
                obj = wolfSSL_X509_NAME_ENTRY_get_object(e);
11097
                if (obj == NULL)
11098
                    return BAD_FUNC_ARG;
11099
11100
                totalLen += (int)XSTRLEN(obj->sName) + 2;/*+2 for '/' and '=' */
11101
                totalLen += wolfSSL_ASN1_STRING_length(e->value);
11102
            }
11103
        }
11104
11105
        fullName = (char*)XMALLOC(totalLen + 1, name->heap, DYNAMIC_TYPE_X509);
11106
        if (fullName == NULL)
11107
            return MEMORY_E;
11108
11109
        idx = 0;
11110
        entryCount = AddAllEntry(name, fullName, totalLen, &idx);
11111
        if (entryCount < 0) {
11112
            XFREE(fullName, name->heap, DYNAMIC_TYPE_X509);
11113
            return entryCount;
11114
        }
11115
11116
        if (name->dynamicName) {
11117
            XFREE(name->name, name->heap, DYNAMIC_TYPE_X509);
11118
        }
11119
        fullName[idx] = '\0';
11120
        name->name = fullName;
11121
        name->dynamicName = 1;
11122
        name->sz = idx + 1; /* size includes null terminator */
11123
        name->entrySz = entryCount;
11124
11125
        return 0;
11126
    }
11127
11128
    /* Copies entry into name. With it being copied freeing entry becomes the
11129
     * callers responsibility.
11130
     * returns 1 for success and 0 for error */
11131
    int wolfSSL_X509_NAME_add_entry(WOLFSSL_X509_NAME* name,
11132
            WOLFSSL_X509_NAME_ENTRY* entry, int idx, int set)
11133
    {
11134
        WOLFSSL_X509_NAME_ENTRY* current = NULL;
11135
        int ret, i;
11136
11137
#ifdef WOLFSSL_DEBUG_OPENSSL
11138
        WOLFSSL_ENTER("wolfSSL_X509_NAME_add_entry()");
11139
#endif
11140
11141
        if (name == NULL || entry == NULL || entry->value == NULL) {
11142
            WOLFSSL_MSG("NULL argument passed in");
11143
            return WOLFSSL_FAILURE;
11144
        }
11145
11146
        if (idx >= 0) {
11147
            /* place in specific index */
11148
11149
            if (idx >= MAX_NAME_ENTRIES) {
11150
                WOLFSSL_MSG("Error index to insert entry is larger than array");
11151
                return WOLFSSL_FAILURE;
11152
            }
11153
            i = idx;
11154
        }
11155
        else {
11156
            /* iterate through and find first open spot */
11157
            for (i = 0; i < MAX_NAME_ENTRIES; i++) {
11158
                if (name->entry[i].set != 1) { /* not set so overwritten */
11159
                    WOLFSSL_MSG("Found place for name entry");
11160
                    break;
11161
                }
11162
            }
11163
11164
            if (i == MAX_NAME_ENTRIES) {
11165
                WOLFSSL_MSG("No spot found for name entry");
11166
                return WOLFSSL_FAILURE;
11167
            }
11168
        }
11169
11170
        current = &name->entry[i];
11171
        if (current->set == 0)
11172
            name->entrySz++;
11173
11174
        if (wolfSSL_X509_NAME_ENTRY_create_by_NID(&current,
11175
                            entry->nid,
11176
                            wolfSSL_ASN1_STRING_type(entry->value),
11177
                            wolfSSL_ASN1_STRING_data(entry->value),
11178
                            wolfSSL_ASN1_STRING_length(entry->value)) != NULL)
11179
        {
11180
            ret = WOLFSSL_SUCCESS;
11181
        #ifdef OPENSSL_ALL
11182
            if (name->entries == NULL) {
11183
                name->entries = wolfSSL_sk_X509_NAME_new(NULL);
11184
            }
11185
            if (wolfSSL_sk_X509_NAME_ENTRY_push(name->entries, current
11186
                                                         ) != WOLFSSL_SUCCESS) {
11187
                ret = WOLFSSL_FAILURE;
11188
            }
11189
        #endif
11190
        }
11191
        else {
11192
            ret = WOLFSSL_FAILURE;
11193
        }
11194
11195
        if (ret != WOLFSSL_SUCCESS) {
11196
            WOLFSSL_MSG("Error adding the name entry");
11197
            if (current->set == 0)
11198
                name->entrySz--;
11199
            return WOLFSSL_FAILURE;
11200
        }
11201
11202
        if (RebuildFullName(name) != 0)
11203
            return WOLFSSL_FAILURE;
11204
11205
        (void)set;
11206
        return WOLFSSL_SUCCESS;
11207
    }
11208
11209
    int wolfSSL_X509_NAME_add_entry_by_txt(WOLFSSL_X509_NAME *name,
11210
                                           const char *field, int type,
11211
                                           const unsigned char *bytes, int len,
11212
                                           int loc, int set)
11213
    {
11214
        int ret = WOLFSSL_FAILURE;
11215
        int nid;
11216
        WOLFSSL_X509_NAME_ENTRY* entry;
11217
11218
        (void)type;
11219
        WOLFSSL_ENTER("wolfSSL_X509_NAME_add_entry_by_txt");
11220
11221
        if (name == NULL || field == NULL)
11222
            return WOLFSSL_FAILURE;
11223
11224
        if ((nid = wolfSSL_OBJ_txt2nid(field)) == NID_undef) {
11225
            WOLFSSL_MSG("Unable convert text to NID");
11226
            return WOLFSSL_FAILURE;
11227
        }
11228
11229
        entry = wolfSSL_X509_NAME_ENTRY_create_by_NID(NULL,
11230
                  nid, type, (unsigned char*)bytes, len);
11231
        if (entry == NULL)
11232
            return WOLFSSL_FAILURE;
11233
11234
        ret = wolfSSL_X509_NAME_add_entry(name, entry, loc, set);
11235
        wolfSSL_X509_NAME_ENTRY_free(entry);
11236
11237
        return ret;
11238
    }
11239
11240
    int wolfSSL_X509_NAME_add_entry_by_NID(WOLFSSL_X509_NAME *name, int nid,
11241
                                           int type, const unsigned char *bytes,
11242
                                           int len, int loc, int set)
11243
    {
11244
        int ret;
11245
        WOLFSSL_X509_NAME_ENTRY* entry;
11246
        WOLFSSL_ENTER("wolfSSL_X509_NAME_add_entry_by_NID");
11247
        entry = wolfSSL_X509_NAME_ENTRY_create_by_NID(NULL, nid, type, bytes,
11248
                len);
11249
        if (entry == NULL)
11250
            return WOLFSSL_FAILURE;
11251
        ret = wolfSSL_X509_NAME_add_entry(name, entry, loc, set);
11252
        wolfSSL_X509_NAME_ENTRY_free(entry);
11253
        return ret;
11254
    }
11255
11256
    WOLFSSL_X509_NAME_ENTRY *wolfSSL_X509_NAME_delete_entry(
11257
            WOLFSSL_X509_NAME *name, int loc)
11258
    {
11259
        WOLFSSL_X509_NAME_ENTRY* ret;
11260
        WOLFSSL_ENTER("wolfSSL_X509_NAME_delete_entry");
11261
11262
        if (!name) {
11263
            WOLFSSL_MSG("Bad parameter");
11264
            return NULL;
11265
        }
11266
11267
        ret = wolfSSL_X509_NAME_get_entry(name, loc);
11268
        if (!ret) {
11269
            WOLFSSL_MSG("loc entry not found");
11270
            return NULL;
11271
        }
11272
        name->entry[loc].set = 0;
11273
        return ret;
11274
    }
11275
11276
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
11277
11278
#if defined(OPENSSL_EXTRA) && !defined(NO_ASN)
11279
    int wolfSSL_X509_NAME_get_index_by_OBJ(WOLFSSL_X509_NAME *name,
11280
                                           const WOLFSSL_ASN1_OBJECT *obj,
11281
                                           int idx) {
11282
        if (!name || idx >= MAX_NAME_ENTRIES ||
11283
                !obj || !obj->obj) {
11284
            return -1;
11285
        }
11286
11287
        if (idx < 0) {
11288
            idx = -1;
11289
        }
11290
11291
        for (idx++; idx < MAX_NAME_ENTRIES; idx++) {
11292
            /* Find index of desired name */
11293
            if (name->entry[idx].set) {
11294
                if (XSTRLEN(obj->sName) == XSTRLEN(name->entry[idx].object->sName) &&
11295
                    XSTRNCMP((const char*) obj->sName,
11296
                        name->entry[idx].object->sName, obj->objSz - 1) == 0) {
11297
                    return idx;
11298
                }
11299
            }
11300
        }
11301
        return -1;
11302
    }
11303
#endif
11304
11305
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
11306
    defined(OPENSSL_EXTRA_X509_SMALL)
11307
11308
    /* returns a pointer to the internal entry at location 'loc' on success,
11309
     * a null pointer is returned in fail cases */
11310
    WOLFSSL_X509_NAME_ENTRY *wolfSSL_X509_NAME_get_entry(
11311
                                             WOLFSSL_X509_NAME *name, int loc)
11312
    {
11313
#ifdef WOLFSSL_DEBUG_OPENSSL
11314
        WOLFSSL_ENTER("wolfSSL_X509_NAME_get_entry");
11315
#endif
11316
11317
        if (name == NULL) {
11318
            return NULL;
11319
        }
11320
11321
        if (loc < 0 || loc >= MAX_NAME_ENTRIES) {
11322
            WOLFSSL_MSG("Bad argument");
11323
            return NULL;
11324
        }
11325
11326
        if (name->entry[loc].set) {
11327
#ifdef WOLFSSL_PYTHON
11328
            /* "set" is not only flag use, but also stack index position use in
11329
            *  OpenSSL. Python makes tuple based on this number. Therefore,
11330
            *  updating "set" by position + 1. "plus 1" means to avoid "not set"
11331
            *  zero.
11332
            */
11333
            name->entry[loc].set = loc + 1;
11334
#endif
11335
            return &name->entry[loc];
11336
        }
11337
        else {
11338
            return NULL;
11339
        }
11340
    }
11341
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
11342
11343
#ifdef OPENSSL_EXTRA
11344
11345
    int wolfSSL_X509_check_private_key(WOLFSSL_X509 *x509, WOLFSSL_EVP_PKEY *key)
11346
    {
11347
        WOLFSSL_ENTER("wolfSSL_X509_check_private_key");
11348
11349
        if (!x509 || !key) {
11350
            WOLFSSL_MSG("Bad parameter");
11351
            return WOLFSSL_FAILURE;
11352
        }
11353
11354
    #ifndef NO_CHECK_PRIVATE_KEY
11355
        return wc_CheckPrivateKey((byte*)key->pkey.ptr, key->pkey_sz,
11356
                x509->pubKey.buffer, x509->pubKey.length,
11357
                (enum Key_Sum)x509->pubKeyOID) == 1 ?
11358
                        WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
11359
    #else
11360
        /* not compiled in */
11361
        return WOLFSSL_SUCCESS;
11362
    #endif
11363
    }
11364
11365
#endif /* OPENSSL_EXTRA */
11366
11367
#if defined(HAVE_LIGHTY) || defined(HAVE_STUNNEL) \
11368
    || defined(WOLFSSL_MYSQL_COMPATIBLE) || defined(OPENSSL_EXTRA)
11369
#ifndef NO_BIO
11370
11371
#ifdef WOLFSSL_CERT_GEN
11372
11373
#ifdef WOLFSSL_CERT_REQ
11374
/* writes the x509 from x to the WOLFSSL_BIO bp
11375
 *
11376
 * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on fail
11377
 */
11378
int wolfSSL_PEM_write_bio_X509_REQ(WOLFSSL_BIO *bp, WOLFSSL_X509 *x)
11379
{
11380
    byte* pem;
11381
    int   pemSz = 0;
11382
    const unsigned char* der;
11383
    int derSz;
11384
    int ret;
11385
11386
    WOLFSSL_ENTER("wolfSSL_PEM_write_bio_X509_REQ()");
11387
11388
    if (x == NULL || bp == NULL) {
11389
        return WOLFSSL_FAILURE;
11390
    }
11391
11392
    der = wolfSSL_X509_get_der(x, &derSz);
11393
    if (der == NULL) {
11394
        return WOLFSSL_FAILURE;
11395
    }
11396
11397
    /* get PEM size */
11398
    pemSz = wc_DerToPemEx(der, derSz, NULL, 0, NULL, CERTREQ_TYPE);
11399
    if (pemSz < 0) {
11400
        return WOLFSSL_FAILURE;
11401
    }
11402
11403
    /* create PEM buffer and convert from DER */
11404
    pem = (byte*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
11405
    if (pem == NULL) {
11406
        return WOLFSSL_FAILURE;
11407
    }
11408
    if (wc_DerToPemEx(der, derSz, pem, pemSz, NULL, CERTREQ_TYPE) < 0) {
11409
        XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
11410
        return WOLFSSL_FAILURE;
11411
    }
11412
11413
    /* write the PEM to BIO */
11414
    ret = wolfSSL_BIO_write(bp, pem, pemSz);
11415
    XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
11416
11417
    if (ret <= 0) return WOLFSSL_FAILURE;
11418
    return WOLFSSL_SUCCESS;
11419
}
11420
#endif /* WOLFSSL_CERT_REQ */
11421
11422
11423
/* writes the x509 from x to the WOLFSSL_BIO bp
11424
 *
11425
 * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on fail
11426
 */
11427
int wolfSSL_PEM_write_bio_X509_AUX(WOLFSSL_BIO *bp, WOLFSSL_X509 *x)
11428
{
11429
    byte* pem;
11430
    int   pemSz = 0;
11431
    const unsigned char* der;
11432
    int derSz;
11433
    int ret;
11434
11435
    WOLFSSL_ENTER("wolfSSL_PEM_write_bio_X509_AUX()");
11436
11437
    if (bp == NULL || x == NULL) {
11438
        WOLFSSL_MSG("NULL argument passed in");
11439
        return WOLFSSL_FAILURE;
11440
    }
11441
11442
    der = wolfSSL_X509_get_der(x, &derSz);
11443
    if (der == NULL) {
11444
        return WOLFSSL_FAILURE;
11445
    }
11446
11447
    /* get PEM size */
11448
    pemSz = wc_DerToPemEx(der, derSz, NULL, 0, NULL, CERT_TYPE);
11449
    if (pemSz < 0) {
11450
        return WOLFSSL_FAILURE;
11451
    }
11452
11453
    /* create PEM buffer and convert from DER */
11454
    pem = (byte*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
11455
    if (pem == NULL) {
11456
        return WOLFSSL_FAILURE;
11457
    }
11458
    if (wc_DerToPemEx(der, derSz, pem, pemSz, NULL, CERT_TYPE) < 0) {
11459
        XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
11460
        return WOLFSSL_FAILURE;
11461
    }
11462
11463
    /* write the PEM to BIO */
11464
    ret = wolfSSL_BIO_write(bp, pem, pemSz);
11465
    XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
11466
11467
    if (ret <= 0) return WOLFSSL_FAILURE;
11468
    return WOLFSSL_SUCCESS;
11469
}
11470
11471
int wolfSSL_PEM_write_bio_X509(WOLFSSL_BIO *bio, WOLFSSL_X509 *cert)
11472
{
11473
    byte* pem = NULL;
11474
    int   pemSz = 0;
11475
    /* Get large buffer to hold cert der */
11476
    int derSz = X509_BUFFER_SZ;
11477
#ifdef WOLFSSL_SMALL_STACK
11478
    byte* der;
11479
#else
11480
    byte der[X509_BUFFER_SZ];
11481
#endif
11482
    int ret;
11483
11484
    WOLFSSL_ENTER("wolfSSL_PEM_write_bio_X509()");
11485
11486
    if (bio == NULL || cert == NULL) {
11487
        WOLFSSL_MSG("NULL argument passed in");
11488
        return WOLFSSL_FAILURE;
11489
    }
11490
11491
#ifdef WOLFSSL_SMALL_STACK
11492
    der = (byte*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
11493
    if (!der) {
11494
        WOLFSSL_MSG("malloc failed");
11495
        return WOLFSSL_FAILURE;
11496
    }
11497
#endif
11498
11499
    if (wolfssl_x509_make_der(cert, 0, der, &derSz, 1) != WOLFSSL_SUCCESS) {
11500
        goto error;
11501
    }
11502
11503
    /* get PEM size */
11504
    pemSz = wc_DerToPemEx(der, derSz, NULL, 0, NULL, CERT_TYPE);
11505
    if (pemSz < 0) {
11506
        goto error;
11507
    }
11508
11509
    /* create PEM buffer and convert from DER */
11510
    pem = (byte*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
11511
    if (pem == NULL) {
11512
        goto error;
11513
    }
11514
    if (wc_DerToPemEx(der, derSz, pem, pemSz, NULL, CERT_TYPE) < 0) {
11515
        goto error;
11516
    }
11517
11518
    /* write the PEM to BIO */
11519
    ret = wolfSSL_BIO_write(bio, pem, pemSz);
11520
    XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
11521
    #ifdef WOLFSSL_SMALL_STACK
11522
    XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
11523
    #endif
11524
11525
    if (ret <= 0) return WOLFSSL_FAILURE;
11526
    return WOLFSSL_SUCCESS;
11527
11528
error:
11529
    #ifdef WOLFSSL_SMALL_STACK
11530
    XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
11531
    #endif
11532
    if (pem)
11533
        XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
11534
    return WOLFSSL_FAILURE;
11535
}
11536
#endif /* WOLFSSL_CERT_GEN */
11537
11538
#endif /* !NO_BIO */
11539
#endif /* HAVE_LIGHTY || HAVE_STUNNEL || WOLFSSL_MYSQL_COMPATIBLE */
11540
11541
#if defined(OPENSSL_EXTRA) || defined(HAVE_STUNNEL) || defined(WOLFSSL_NGINX) || \
11542
        defined(HAVE_LIGHTY) || defined(WOLFSSL_HAPROXY) || \
11543
        defined(WOLFSSL_OPENSSH) || defined(HAVE_SBLIM_SFCB)
11544
11545
WOLF_STACK_OF(WOLFSSL_X509_NAME)* wolfSSL_sk_X509_NAME_new(wolf_sk_compare_cb cb)
11546
{
11547
    WOLFSSL_STACK* sk;
11548
    (void)cb;
11549
11550
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_new");
11551
11552
    sk = wolfSSL_sk_new_node(NULL);
11553
    if (sk != NULL) {
11554
        sk->type = STACK_TYPE_X509_NAME;
11555
#ifdef OPENSSL_ALL
11556
        sk->comp = cb;
11557
#endif
11558
    }
11559
11560
    return sk;
11561
}
11562
11563
int wolfSSL_sk_X509_NAME_num(const WOLF_STACK_OF(WOLFSSL_X509_NAME) *sk)
11564
{
11565
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_num");
11566
11567
    if (sk == NULL)
11568
        return BAD_FUNC_ARG;
11569
11570
    return (int)sk->num;
11571
}
11572
11573
/* Getter function for WOLFSSL_X509_NAME pointer
11574
 *
11575
 * sk is the stack to retrieve pointer from
11576
 * i  is the index value in stack
11577
 *
11578
 * returns a pointer to a WOLFSSL_X509_NAME structure on success and NULL on
11579
 *         fail
11580
 */
11581
WOLFSSL_X509_NAME* wolfSSL_sk_X509_NAME_value(const STACK_OF(WOLFSSL_X509_NAME)* sk,
11582
    int i)
11583
{
11584
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_value");
11585
    return (WOLFSSL_X509_NAME*)wolfSSL_sk_value(sk, i);
11586
}
11587
11588
WOLFSSL_X509_NAME* wolfSSL_sk_X509_NAME_pop(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
11589
{
11590
    WOLFSSL_STACK* node;
11591
    WOLFSSL_X509_NAME* name;
11592
11593
    if (sk == NULL) {
11594
        return NULL;
11595
    }
11596
11597
    node = sk->next;
11598
    name = sk->data.name;
11599
11600
    if (node != NULL) { /* update sk and remove node from stack */
11601
        sk->data.name = node->data.name;
11602
        sk->next = node->next;
11603
        XFREE(node, NULL, DYNAMIC_TYPE_OPENSSL);
11604
    }
11605
    else { /* last x509 in stack */
11606
        sk->data.name = NULL;
11607
    }
11608
11609
    if (sk->num > 0) {
11610
        sk->num -= 1;
11611
    }
11612
11613
    return name;
11614
}
11615
11616
void wolfSSL_sk_X509_NAME_pop_free(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
11617
    void (*f) (WOLFSSL_X509_NAME*))
11618
{
11619
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_pop_free");
11620
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
11621
}
11622
11623
/* Free only the sk structure, NOT X509_NAME members */
11624
void wolfSSL_sk_X509_NAME_free(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
11625
{
11626
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_free");
11627
    wolfSSL_sk_free(sk);
11628
}
11629
11630
int wolfSSL_sk_X509_NAME_push(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
11631
    WOLFSSL_X509_NAME* name)
11632
{
11633
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_push");
11634
11635
    return wolfSSL_sk_push(sk, name);
11636
}
11637
11638
/* return index of found, or negative to indicate not found */
11639
int wolfSSL_sk_X509_NAME_find(const WOLF_STACK_OF(WOLFSSL_X509_NAME) *sk,
11640
    WOLFSSL_X509_NAME *name)
11641
{
11642
    int i;
11643
11644
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_find");
11645
11646
    if (sk == NULL)
11647
        return BAD_FUNC_ARG;
11648
11649
    for (i = 0; sk; i++, sk = sk->next) {
11650
        if (wolfSSL_X509_NAME_cmp(sk->data.name, name) == 0) {
11651
            return i;
11652
        }
11653
    }
11654
    return -1;
11655
}
11656
11657
/* Name Entry */
11658
WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* wolfSSL_sk_X509_NAME_ENTRY_new(
11659
    wolf_sk_compare_cb cb)
11660
{
11661
    WOLFSSL_STACK* sk = wolfSSL_sk_new_node(NULL);
11662
    if (sk != NULL) {
11663
        sk->type = STACK_TYPE_X509_NAME_ENTRY;
11664
    #ifdef OPENSSL_ALL
11665
        sk->comp = cb;
11666
    #else
11667
        (void)cb;
11668
    #endif
11669
    }
11670
    return sk;
11671
}
11672
11673
int wolfSSL_sk_X509_NAME_ENTRY_push(WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk,
11674
    WOLFSSL_X509_NAME_ENTRY* name_entry)
11675
{
11676
    return wolfSSL_sk_push(sk, name_entry);
11677
}
11678
11679
WOLFSSL_X509_NAME_ENTRY* wolfSSL_sk_X509_NAME_ENTRY_value(
11680
    const WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk, int i)
11681
{
11682
    return (WOLFSSL_X509_NAME_ENTRY*)wolfSSL_sk_value(sk, i);
11683
}
11684
11685
int wolfSSL_sk_X509_NAME_ENTRY_num(const WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk)
11686
{
11687
    if (sk == NULL)
11688
        return BAD_FUNC_ARG;
11689
    return (int)sk->num;
11690
}
11691
11692
void wolfSSL_sk_X509_NAME_ENTRY_free(WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk)
11693
{
11694
    wolfSSL_sk_free(sk);
11695
}
11696
11697
#endif /* OPENSSL_EXTRA || HAVE_STUNNEL || WOLFSSL_NGINX ||
11698
            HAVE_LIGHTY || WOLFSSL_HAPROXY ||
11699
            WOLFSSL_OPENSSH || HAVE_SBLIM_SFCB */
11700
11701
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
11702
    (defined(HAVE_STUNNEL) || defined(WOLFSSL_NGINX) || \
11703
    defined(HAVE_LIGHTY) || defined(WOLFSSL_HAPROXY) || \
11704
    defined(WOLFSSL_OPENSSH) || defined(HAVE_SBLIM_SFCB))
11705
11706
#if defined(OPENSSL_ALL)
11707
WOLFSSL_X509_INFO* wolfSSL_X509_INFO_new(void)
11708
{
11709
    WOLFSSL_X509_INFO* info;
11710
    info = (WOLFSSL_X509_INFO*)XMALLOC(sizeof(WOLFSSL_X509_INFO), NULL,
11711
        DYNAMIC_TYPE_X509);
11712
    if (info) {
11713
        XMEMSET(info, 0, sizeof(*info));
11714
    }
11715
    return info;
11716
}
11717
11718
void wolfSSL_X509_INFO_free(WOLFSSL_X509_INFO* info)
11719
{
11720
    if (info == NULL)
11721
        return;
11722
11723
    if (info->x509) {
11724
        wolfSSL_X509_free(info->x509);
11725
        info->x509 = NULL;
11726
    }
11727
#ifdef HAVE_CRL
11728
    if (info->crl) {
11729
        wolfSSL_X509_CRL_free(info->crl);
11730
        info->crl = NULL;
11731
    }
11732
#endif
11733
    wolfSSL_X509_PKEY_free(info->x_pkey);
11734
    info->x_pkey = NULL;
11735
11736
    XFREE(info, NULL, DYNAMIC_TYPE_X509);
11737
}
11738
#endif
11739
11740
WOLFSSL_STACK* wolfSSL_sk_X509_INFO_new_null(void)
11741
{
11742
    WOLFSSL_STACK* sk = wolfSSL_sk_new_node(NULL);
11743
    if (sk) {
11744
        sk->type = STACK_TYPE_X509_INFO;
11745
    }
11746
    return sk;
11747
}
11748
11749
int wolfSSL_sk_X509_INFO_num(const WOLF_STACK_OF(WOLFSSL_X509_INFO) *sk)
11750
{
11751
    WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_num");
11752
11753
    return wolfSSL_sk_num(sk);
11754
}
11755
11756
WOLFSSL_X509_INFO* wolfSSL_sk_X509_INFO_value(
11757
        const WOLF_STACK_OF(WOLFSSL_X509_INFO) *sk, int i)
11758
{
11759
    WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_value");
11760
11761
    return (WOLFSSL_X509_INFO *)wolfSSL_sk_value(sk, i);
11762
}
11763
11764
WOLFSSL_X509_INFO* wolfSSL_sk_X509_INFO_pop(
11765
        WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk)
11766
{
11767
    WOLFSSL_STACK* node;
11768
    WOLFSSL_X509_INFO* info;
11769
11770
    if (sk == NULL) {
11771
        return NULL;
11772
    }
11773
11774
    node = sk->next;
11775
    info = sk->data.info;
11776
11777
    if (node != NULL) { /* update sk and remove node from stack */
11778
        sk->data.info = node->data.info;
11779
        sk->next = node->next;
11780
        wolfSSL_sk_free_node(node);
11781
    }
11782
    else { /* last x509 in stack */
11783
        sk->data.info = NULL;
11784
    }
11785
11786
    if (sk->num > 0) {
11787
        sk->num -= 1;
11788
    }
11789
11790
    return info;
11791
}
11792
11793
#if defined(OPENSSL_ALL)
11794
void wolfSSL_sk_X509_INFO_pop_free(WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
11795
    void (*f) (WOLFSSL_X509_INFO*))
11796
{
11797
    WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_pop_free");
11798
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
11799
}
11800
11801
void wolfSSL_sk_X509_INFO_free(WOLF_STACK_OF(WOLFSSL_X509_INFO) *sk)
11802
{
11803
    WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_free");
11804
    wolfSSL_sk_free(sk);
11805
}
11806
11807
/* Adds the WOLFSSL_X509_INFO to the stack "sk". "sk" takes control of "in" and
11808
 * tries to free it when the stack is free'd.
11809
 *
11810
 * return 1 on success 0 on fail
11811
 */
11812
int wolfSSL_sk_X509_INFO_push(WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
11813
                                                      WOLFSSL_X509_INFO* in)
11814
{
11815
    return wolfSSL_sk_push(sk, in);
11816
}
11817
11818
/* Creates a duplicate of WOLF_STACK_OF(WOLFSSL_X509_NAME).
11819
 * Returns a new WOLF_STACK_OF(WOLFSSL_X509_NAME) or NULL on failure */
11820
WOLF_STACK_OF(WOLFSSL_X509_NAME) *wolfSSL_dup_CA_list(
11821
    WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
11822
{
11823
    int i;
11824
    const int num = wolfSSL_sk_X509_NAME_num(sk);
11825
    WOLF_STACK_OF(WOLFSSL_X509_NAME) *copy;
11826
    WOLFSSL_X509_NAME *name;
11827
11828
    WOLFSSL_ENTER("wolfSSL_dup_CA_list");
11829
11830
    copy = wolfSSL_sk_X509_NAME_new(sk->comp);
11831
    if (copy == NULL) {
11832
        WOLFSSL_MSG("Memory error");
11833
        return NULL;
11834
    }
11835
11836
    for (i = 0; i < num; i++) {
11837
        name = wolfSSL_X509_NAME_dup(wolfSSL_sk_X509_NAME_value(sk, i));
11838
        if (name == NULL || 0 != wolfSSL_sk_X509_NAME_push(copy, name)) {
11839
            WOLFSSL_MSG("Memory error");
11840
            wolfSSL_sk_X509_NAME_pop_free(copy, wolfSSL_X509_NAME_free);
11841
            return NULL;
11842
        }
11843
    }
11844
11845
    return copy;
11846
}
11847
11848
void* wolfSSL_sk_X509_OBJECT_value(WOLF_STACK_OF(WOLFSSL_X509_OBJECT)* sk, int i)
11849
{
11850
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_value");
11851
    for (; sk != NULL && i > 0; i--)
11852
        sk = sk->next;
11853
11854
    if (i != 0 || sk == NULL)
11855
        return NULL;
11856
    return sk->data.x509_obj;
11857
}
11858
11859
int wolfSSL_sk_X509_OBJECT_num(const WOLF_STACK_OF(WOLFSSL_X509_OBJECT) *s)
11860
{
11861
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_num");
11862
    if (s) {
11863
        return (int)s->num;
11864
    } else {
11865
        return 0;
11866
    }
11867
}
11868
11869
int wolfSSL_sk_X509_NAME_set_cmp_func(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
11870
    wolf_sk_compare_cb cb)
11871
{
11872
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_set_cmp_func");
11873
11874
    if (sk == NULL)
11875
        return BAD_FUNC_ARG;
11876
11877
    sk->comp = cb;
11878
    return 0;
11879
}
11880
#endif /* OPENSSL_ALL */
11881
11882
#ifndef NO_BIO
11883
11884
/* Helper function for X509_NAME_print_ex. Sets *buf to string for domain
11885
   name attribute based on NID. Returns size of buf */
11886
static int get_dn_attr_by_nid(int n, const char** buf)
11887
{
11888
    int len = 0;
11889
    const char *str;
11890
11891
    switch(n)
11892
    {
11893
        case NID_commonName :
11894
            str = "CN";
11895
            len = 2;
11896
            break;
11897
        case NID_countryName:
11898
            str = "C";
11899
            len = 1;
11900
            break;
11901
        case NID_localityName:
11902
            str = "L";
11903
            len = 1;
11904
            break;
11905
        case NID_stateOrProvinceName:
11906
            str = "ST";
11907
            len = 2;
11908
            break;
11909
        case NID_organizationName:
11910
            str = "O";
11911
            len = 1;
11912
            break;
11913
        case NID_organizationalUnitName:
11914
            str = "OU";
11915
            len = 2;
11916
            break;
11917
        case NID_emailAddress:
11918
            str = "emailAddress";
11919
            len = 12;
11920
            break;
11921
        case NID_surname:
11922
            str = "SN";
11923
            len = 2;
11924
            break;
11925
        case NID_givenName:
11926
            str = "GN";
11927
            len = 2;
11928
            break;
11929
        case NID_dnQualifier:
11930
            str = "dnQualifier";
11931
            len = 11;
11932
            break;
11933
        case NID_name:
11934
            str = "name";
11935
            len = 4;
11936
            break;
11937
        case NID_initials:
11938
            str = "initials";
11939
            len = 8;
11940
            break;
11941
        default:
11942
            WOLFSSL_MSG("Attribute type not found");
11943
            str = NULL;
11944
11945
    }
11946
    if (buf != NULL)
11947
        *buf = str;
11948
    return len;
11949
}
11950
11951
/**
11952
 * Escape input string for RFC2253 requirements. The following characters
11953
 * are escaped with a backslash (\):
11954
 *
11955
 *     1. A space or '#' at the beginning of the string
11956
 *     2. A space at the end of the string
11957
 *     3. One of: ",", "+", """, "\", "<", ">", ";"
11958
 *
11959
 * in    - input string to escape
11960
 * inSz  - length of in, not including the null terminator
11961
 * out   - buffer for output string to be written, will be null terminated
11962
 * outSz - size of out
11963
 *
11964
 * Returns size of output string (not counting NULL terminator) on success,
11965
 * negative on error.
11966
 */
11967
static int wolfSSL_EscapeString_RFC2253(char* in, word32 inSz,
11968
                                        char* out, word32 outSz)
11969
{
11970
    word32 inIdx = 0;
11971
    word32 outIdx = 0;
11972
    char c = 0;
11973
11974
    if (in == NULL || out == NULL || inSz == 0 || outSz == 0) {
11975
        return BAD_FUNC_ARG;
11976
    }
11977
11978
    for (inIdx = 0; inIdx < inSz; inIdx++) {
11979
11980
        c = in[inIdx];
11981
11982
        if (((inIdx == 0) && (c == ' ' || c == '#')) ||
11983
            ((inIdx == (inSz-1)) && (c == ' ')) ||
11984
            c == ',' || c == '+' || c == '"' || c == '\\' ||
11985
            c == '<' || c == '>' || c == ';') {
11986
11987
            if (outIdx > (outSz - 1)) {
11988
                return BUFFER_E;
11989
            }
11990
            out[outIdx] = '\\';
11991
            outIdx++;
11992
        }
11993
        if (outIdx > (outSz - 1)) {
11994
            return BUFFER_E;
11995
        }
11996
        out[outIdx] = c;
11997
        outIdx++;
11998
    }
11999
12000
    /* null terminate out */
12001
    if (outIdx > (outSz -1)) {
12002
        return BUFFER_E;
12003
    }
12004
    out[outIdx] = '\0';
12005
12006
    return outIdx;
12007
}
12008
12009
/*
12010
 * Print human readable version of X509_NAME to provided BIO.
12011
 *
12012
 * bio    - output BIO to place name string. Does not include null terminator.
12013
 * name   - input name to convert to string
12014
 * indent - number of indent spaces to prepend to name string
12015
 * flags  - flags to control function behavior. Not all flags are currently
12016
 *          supported/implemented. Currently supported are:
12017
 *              XN_FLAG_RFC2253 - only the backslash escape requirements from
12018
 *                                RFC22523 currently implemented.
12019
 *              XN_FLAG_DN_REV  - print name reversed. Automatically done by
12020
 *                                XN_FLAG_RFC2253.
12021
 *
12022
 * Returns WOLFSSL_SUCCESS (1) on success, WOLFSSL_FAILURE (0) on failure.
12023
 */
12024
int wolfSSL_X509_NAME_print_ex(WOLFSSL_BIO* bio, WOLFSSL_X509_NAME* name,
12025
                int indent, unsigned long flags)
12026
{
12027
    int i, count = 0, len = 0, tmpSz = 0, nameStrSz = 0, escapeSz = 0;
12028
    char* tmp = NULL;
12029
    char* nameStr = NULL;
12030
    const char *buf = NULL;
12031
    WOLFSSL_X509_NAME_ENTRY* ne;
12032
    WOLFSSL_ASN1_STRING* str;
12033
    char escaped[ASN_NAME_MAX];
12034
12035
    WOLFSSL_ENTER("wolfSSL_X509_NAME_print_ex");
12036
12037
    if ((name == NULL) || (name->sz == 0) || (bio == NULL))
12038
        return WOLFSSL_FAILURE;
12039
12040
    for (i = 0; i < indent; i++) {
12041
        if (wolfSSL_BIO_write(bio, " ", 1) != 1)
12042
            return WOLFSSL_FAILURE;
12043
    }
12044
12045
    count = wolfSSL_X509_NAME_entry_count(name);
12046
12047
    for (i = 0; i < count; i++) {
12048
        /* reverse name order for RFC2253 and DN_REV */
12049
        if ((flags & XN_FLAG_RFC2253) || (flags & XN_FLAG_DN_REV)) {
12050
            ne = wolfSSL_X509_NAME_get_entry(name, count - i - 1);
12051
        } else {
12052
            ne = wolfSSL_X509_NAME_get_entry(name, i);
12053
        }
12054
        if (ne == NULL)
12055
            return WOLFSSL_FAILURE;
12056
12057
        str = wolfSSL_X509_NAME_ENTRY_get_data(ne);
12058
        if (str == NULL)
12059
            return WOLFSSL_FAILURE;
12060
12061
        if (flags & XN_FLAG_RFC2253) {
12062
            /* escape string for RFC 2253, ret sz not counting null term */
12063
            escapeSz = wolfSSL_EscapeString_RFC2253(str->data,
12064
                            str->length, escaped, sizeof(escaped));
12065
            if (escapeSz < 0)
12066
                return WOLFSSL_FAILURE;
12067
12068
            nameStr = escaped;
12069
            nameStrSz = escapeSz;
12070
        }
12071
        else {
12072
            nameStr = str->data;
12073
            nameStrSz = str->length;
12074
        }
12075
12076
        /* len is without null terminator */
12077
        len = get_dn_attr_by_nid(ne->nid, &buf);
12078
        if (len == 0 || buf == NULL)
12079
            return WOLFSSL_FAILURE;
12080
12081
        tmpSz = nameStrSz + len + 3; /* + 3 for '=', comma, and '\0' */
12082
        tmp = (char*)XMALLOC(tmpSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12083
        if (tmp == NULL) {
12084
            return WOLFSSL_FAILURE;
12085
        }
12086
12087
        if (i < count - 1) {
12088
            if (XSNPRINTF(tmp, tmpSz, "%s=%s,", buf, nameStr)
12089
                >= tmpSz)
12090
            {
12091
                WOLFSSL_MSG("buffer overrun");
12092
                return WOLFSSL_FAILURE;
12093
            }
12094
            tmpSz = len + nameStrSz + 2; /* 2 for '=', comma */
12095
        }
12096
        else {
12097
            if (XSNPRINTF(tmp, tmpSz, "%s=%s", buf, nameStr)
12098
                >= tmpSz)
12099
            {
12100
                WOLFSSL_MSG("buffer overrun");
12101
                return WOLFSSL_FAILURE;
12102
            }
12103
            tmpSz = len + nameStrSz + 1; /* 1 for '=' */
12104
            if (bio->type != WOLFSSL_BIO_FILE)
12105
                ++tmpSz; /* include the terminating null when not writing to a
12106
                          * file.
12107
                          */
12108
        }
12109
12110
        if (wolfSSL_BIO_write(bio, tmp, tmpSz) != tmpSz) {
12111
            XFREE(tmp, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12112
            return WOLFSSL_FAILURE;
12113
        }
12114
12115
        XFREE(tmp, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12116
    }
12117
12118
    return WOLFSSL_SUCCESS;
12119
}
12120
12121
#ifndef NO_FILESYSTEM
12122
int wolfSSL_X509_NAME_print_ex_fp(XFILE file, WOLFSSL_X509_NAME* name,
12123
        int indent, unsigned long flags)
12124
{
12125
    WOLFSSL_BIO* bio;
12126
    int ret;
12127
12128
    WOLFSSL_ENTER("wolfSSL_X509_NAME_print_ex_fp");
12129
12130
    if (!(bio = wolfSSL_BIO_new_fp(file, BIO_NOCLOSE))) {
12131
        WOLFSSL_MSG("wolfSSL_BIO_new_fp error");
12132
        return WOLFSSL_FAILURE;
12133
    }
12134
12135
    ret = wolfSSL_X509_NAME_print_ex(bio, name, indent, flags);
12136
12137
    wolfSSL_BIO_free(bio);
12138
12139
    return ret;
12140
}
12141
#endif /* NO_FILESYSTEM */
12142
#endif /* !NO_BIO */
12143
12144
#ifndef NO_WOLFSSL_STUB
12145
WOLFSSL_ASN1_BIT_STRING* wolfSSL_X509_get0_pubkey_bitstr(const WOLFSSL_X509* x)
12146
{
12147
    (void)x;
12148
    WOLFSSL_ENTER("wolfSSL_X509_get0_pubkey_bitstr");
12149
    WOLFSSL_STUB("X509_get0_pubkey_bitstr");
12150
12151
    return NULL;
12152
}
12153
#endif
12154
12155
#ifdef OPENSSL_ALL
12156
WOLFSSL_X509_LOOKUP_TYPE wolfSSL_X509_OBJECT_get_type(
12157
        const WOLFSSL_X509_OBJECT* obj)
12158
{
12159
    if (obj == NULL)
12160
        return WOLFSSL_X509_LU_NONE;
12161
    return obj->type;
12162
}
12163
12164
WOLFSSL_X509_OBJECT* wolfSSL_X509_OBJECT_new(void)
12165
{
12166
    WOLFSSL_X509_OBJECT* ret = (WOLFSSL_X509_OBJECT*)
12167
            XMALLOC(sizeof(WOLFSSL_X509_OBJECT), NULL, DYNAMIC_TYPE_OPENSSL);
12168
    if (ret != NULL)
12169
        XMEMSET(ret, 0, sizeof(WOLFSSL_X509_OBJECT));
12170
    return ret;
12171
}
12172
12173
void wolfSSL_X509_OBJECT_free(WOLFSSL_X509_OBJECT *obj)
12174
{
12175
    WOLFSSL_ENTER("wolfSSL_X509_OBJECT_free");
12176
    if (obj != NULL) {
12177
        if (obj->type == WOLFSSL_X509_LU_X509) {
12178
            wolfSSL_X509_free(obj->data.x509);
12179
        }
12180
        else {
12181
            /* We don't free as this will point to
12182
             * store->cm->crl which we don't own */
12183
            WOLFSSL_MSG("Not free'ing CRL in WOLFSSL_X509_OBJECT");
12184
        }
12185
        XFREE(obj, NULL, DYNAMIC_TYPE_OPENSSL);
12186
    }
12187
}
12188
#endif /* OPENSSL_ALL */
12189
12190
#ifndef NO_WOLFSSL_STUB
12191
WOLFSSL_X509_OBJECT* wolfSSL_sk_X509_OBJECT_delete(
12192
    WOLF_STACK_OF(WOLFSSL_X509_OBJECT)* sk, int i)
12193
{
12194
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_delete");
12195
    WOLFSSL_STUB("wolfSSL_sk_X509_OBJECT_delete");
12196
    (void)sk;
12197
    (void)i;
12198
    return NULL;
12199
}
12200
#endif
12201
12202
WOLFSSL_X509 *wolfSSL_X509_OBJECT_get0_X509(const WOLFSSL_X509_OBJECT *obj)
12203
{
12204
    if (obj != NULL && obj->type == WOLFSSL_X509_LU_X509)
12205
        return obj->data.x509;
12206
    return NULL;
12207
}
12208
12209
WOLFSSL_X509_CRL *wolfSSL_X509_OBJECT_get0_X509_CRL(WOLFSSL_X509_OBJECT *obj)
12210
{
12211
    if (obj != NULL && obj->type == WOLFSSL_X509_LU_CRL)
12212
        return obj->data.crl;
12213
    return NULL;
12214
}
12215
12216
#endif /* OPENSSL_ALL || (OPENSSL_EXTRA && (HAVE_STUNNEL || WOLFSSL_NGINX ||
12217
        * HAVE_LIGHTY || WOLFSSL_HAPROXY || WOLFSSL_OPENSSH ||
12218
        * HAVE_SBLIM_SFCB)) */
12219
12220
12221
#if defined(OPENSSL_EXTRA)
12222
12223
int wolfSSL_sk_X509_num(const WOLF_STACK_OF(WOLFSSL_X509) *s)
12224
{
12225
    WOLFSSL_ENTER("wolfSSL_sk_X509_num");
12226
12227
    if (s == NULL)
12228
        return -1;
12229
    return (int)s->num;
12230
}
12231
12232
#endif /* OPENSSL_EXTRA */
12233
12234
#if defined(HAVE_EX_DATA) && (defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) \
12235
     || defined(WOLFSSL_HAPROXY) || defined(OPENSSL_EXTRA)                   \
12236
     || defined(HAVE_LIGHTY))
12237
12238
int wolfSSL_X509_get_ex_new_index(int idx, void *arg, void *a, void *b, void *c)
12239
{
12240
    WOLFSSL_ENTER("wolfSSL_X509_get_ex_new_index");
12241
12242
    WOLFSSL_CRYPTO_EX_DATA_IGNORE_PARAMS(idx, arg, a, b, c);
12243
12244
    return wolfssl_get_ex_new_index(CRYPTO_EX_INDEX_X509);
12245
}
12246
#endif
12247
12248
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL) || \
12249
    defined(WOLFSSL_WPAS_SMALL)
12250
void *wolfSSL_X509_get_ex_data(X509 *x509, int idx)
12251
{
12252
    WOLFSSL_ENTER("wolfSSL_X509_get_ex_data");
12253
#ifdef HAVE_EX_DATA
12254
    if (x509 != NULL) {
12255
        return wolfSSL_CRYPTO_get_ex_data(&x509->ex_data, idx);
12256
    }
12257
#else
12258
    (void)x509;
12259
    (void)idx;
12260
#endif
12261
    return NULL;
12262
}
12263
12264
int wolfSSL_X509_set_ex_data(X509 *x509, int idx, void *data)
12265
{
12266
    WOLFSSL_ENTER("wolfSSL_X509_set_ex_data");
12267
#ifdef HAVE_EX_DATA
12268
    if (x509 != NULL)
12269
    {
12270
        return wolfSSL_CRYPTO_set_ex_data(&x509->ex_data, idx, data);
12271
    }
12272
#else
12273
    (void)x509;
12274
    (void)idx;
12275
    (void)data;
12276
#endif
12277
    return WOLFSSL_FAILURE;
12278
}
12279
12280
#ifdef HAVE_EX_DATA_CLEANUP_HOOKS
12281
int wolfSSL_X509_set_ex_data_with_cleanup(
12282
    X509 *x509,
12283
    int idx,
12284
    void *data,
12285
    wolfSSL_ex_data_cleanup_routine_t cleanup_routine)
12286
{
12287
    WOLFSSL_ENTER("wolfSSL_X509_set_ex_data_with_cleanup");
12288
    if (x509 != NULL)
12289
    {
12290
        return wolfSSL_CRYPTO_set_ex_data_with_cleanup(&x509->ex_data, idx,
12291
                                                       data, cleanup_routine);
12292
    }
12293
    return WOLFSSL_FAILURE;
12294
}
12295
#endif /* HAVE_EX_DATA_CLEANUP_HOOKS */
12296
12297
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL || WOLFSSL_WPAS_SMALL */
12298
12299
12300
#ifndef NO_ASN
12301
int wolfSSL_X509_check_host(WOLFSSL_X509 *x, const char *chk, size_t chklen,
12302
                    unsigned int flags, char **peername)
12303
0
{
12304
0
    int         ret;
12305
0
#ifdef WOLFSSL_SMALL_STACK
12306
0
    DecodedCert *dCert;
12307
#else
12308
    DecodedCert dCert[1];
12309
#endif
12310
12311
0
    WOLFSSL_ENTER("wolfSSL_X509_check_host");
12312
12313
    /* flags and peername not needed for Nginx. */
12314
0
    (void)flags;
12315
0
    (void)peername;
12316
12317
0
    if ((x == NULL) || (chk == NULL)) {
12318
0
        WOLFSSL_MSG("Invalid parameter");
12319
0
        return WOLFSSL_FAILURE;
12320
0
    }
12321
12322
0
    if (flags == WOLFSSL_NO_WILDCARDS) {
12323
0
        WOLFSSL_MSG("X509_CHECK_FLAG_NO_WILDCARDS not yet implemented");
12324
0
        return WOLFSSL_FAILURE;
12325
0
    }
12326
0
    if (flags == WOLFSSL_NO_PARTIAL_WILDCARDS) {
12327
0
        WOLFSSL_MSG("X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS not yet implemented");
12328
0
        return WOLFSSL_FAILURE;
12329
0
    }
12330
12331
0
#ifdef WOLFSSL_SMALL_STACK
12332
0
    dCert = (DecodedCert *)XMALLOC(sizeof(*dCert), x->heap,
12333
0
                                   DYNAMIC_TYPE_DCERT);
12334
0
    if (dCert == NULL) {
12335
0
        WOLFSSL_MSG("\tout of memory");
12336
0
        return WOLFSSL_FATAL_ERROR;
12337
0
    }
12338
0
#endif
12339
12340
0
    InitDecodedCert(dCert, x->derCert->buffer, x->derCert->length, NULL);
12341
0
    ret = ParseCertRelative(dCert, CERT_TYPE, 0, NULL);
12342
0
    if (ret != 0) {
12343
0
        goto out;
12344
0
    }
12345
12346
0
    ret = CheckHostName(dCert, (char *)chk, chklen);
12347
12348
0
out:
12349
12350
0
    FreeDecodedCert(dCert);
12351
0
#ifdef WOLFSSL_SMALL_STACK
12352
0
    XFREE(dCert, x->heap, DYNAMIC_TYPE_DCERT);
12353
0
#endif
12354
12355
0
    if (ret != 0)
12356
0
        return WOLFSSL_FAILURE;
12357
0
    return WOLFSSL_SUCCESS;
12358
0
}
12359
12360
12361
int wolfSSL_X509_check_ip_asc(WOLFSSL_X509 *x, const char *ipasc,
12362
        unsigned int flags)
12363
0
{
12364
0
    int ret = WOLFSSL_FAILURE;
12365
0
#ifdef WOLFSSL_SMALL_STACK
12366
0
    DecodedCert *dCert = NULL;
12367
#else
12368
    DecodedCert dCert[1];
12369
#endif
12370
12371
0
    WOLFSSL_ENTER("wolfSSL_X509_check_ip_asc");
12372
12373
    /* flags not yet implemented */
12374
0
    (void)flags;
12375
12376
0
    if ((x == NULL) || (x->derCert == NULL) || (ipasc == NULL)) {
12377
0
        WOLFSSL_MSG("Invalid parameter");
12378
0
    }
12379
0
    else {
12380
0
        ret = WOLFSSL_SUCCESS;
12381
0
    }
12382
12383
0
#ifdef WOLFSSL_SMALL_STACK
12384
0
    if (ret == WOLFSSL_SUCCESS) {
12385
0
        dCert = (DecodedCert *)XMALLOC(sizeof(*dCert), x->heap,
12386
0
                                       DYNAMIC_TYPE_DCERT);
12387
0
        if (dCert == NULL) {
12388
0
            WOLFSSL_MSG("\tout of memory");
12389
0
            ret = WOLFSSL_FAILURE;
12390
0
        }
12391
0
    }
12392
0
#endif
12393
12394
0
    if (ret == WOLFSSL_SUCCESS) {
12395
0
        InitDecodedCert(dCert, x->derCert->buffer, x->derCert->length, NULL);
12396
0
        ret = ParseCertRelative(dCert, CERT_TYPE, 0, NULL);
12397
0
        if (ret != 0) {
12398
0
            ret = WOLFSSL_FAILURE;
12399
0
        }
12400
0
        else {
12401
0
            ret = CheckIPAddr(dCert, ipasc);
12402
0
            if (ret != 0) {
12403
0
                ret = WOLFSSL_FAILURE;
12404
0
            }
12405
0
            else {
12406
0
                ret = WOLFSSL_SUCCESS;
12407
0
            }
12408
0
        }
12409
0
        FreeDecodedCert(dCert);
12410
0
    }
12411
12412
0
#ifdef WOLFSSL_SMALL_STACK
12413
0
    if (dCert != NULL)
12414
0
        XFREE(dCert, x->heap, DYNAMIC_TYPE_DCERT);
12415
0
#endif
12416
12417
0
    return ret;
12418
0
}
12419
#endif
12420
12421
#if defined(OPENSSL_EXTRA) && defined(WOLFSSL_CERT_GEN)
12422
int wolfSSL_X509_check_email(WOLFSSL_X509 *x, const char *chk, size_t chkLen,
12423
                             unsigned int flags)
12424
{
12425
    WOLFSSL_X509_NAME *subjName;
12426
    int emailLen;
12427
    char *emailBuf;
12428
12429
    (void)flags;
12430
12431
    WOLFSSL_ENTER("wolfSSL_X509_check_email");
12432
12433
    if ((x == NULL) || (chk == NULL)) {
12434
        WOLFSSL_MSG("Invalid parameter");
12435
        return WOLFSSL_FAILURE;
12436
    }
12437
12438
    subjName = wolfSSL_X509_get_subject_name(x);
12439
    if (subjName == NULL)
12440
        return WOLFSSL_FAILURE;
12441
12442
    /* Call with NULL buffer to get required length. */
12443
    emailLen = wolfSSL_X509_NAME_get_text_by_NID(subjName, NID_emailAddress,
12444
                                                 NULL, 0);
12445
    if (emailLen < 0)
12446
        return WOLFSSL_FAILURE;
12447
12448
    ++emailLen; /* Add 1 for the NUL. */
12449
12450
    emailBuf = (char*)XMALLOC(emailLen, x->heap, DYNAMIC_TYPE_OPENSSL);
12451
    if (emailBuf == NULL)
12452
        return WOLFSSL_FAILURE;
12453
12454
    emailLen = wolfSSL_X509_NAME_get_text_by_NID(subjName, NID_emailAddress,
12455
                                                 emailBuf, emailLen);
12456
    if (emailLen < 0) {
12457
        XFREE(emailBuf, x->heap, DYNAMIC_TYPE_OPENSSL);
12458
        return WOLFSSL_FAILURE;
12459
    }
12460
12461
    if (chkLen == 0)
12462
        chkLen = XSTRLEN(chk);
12463
12464
    if (chkLen != (size_t)emailLen
12465
     || XSTRNCMP(chk, emailBuf, chkLen)) {
12466
        XFREE(emailBuf, x->heap, DYNAMIC_TYPE_OPENSSL);
12467
        return WOLFSSL_FAILURE;
12468
    }
12469
12470
    XFREE(emailBuf, x->heap, DYNAMIC_TYPE_OPENSSL);
12471
    return WOLFSSL_SUCCESS;
12472
}
12473
#endif /* OPENSSL_EXTRA && WOLFSSL_CERT_GEN */
12474
12475
#if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) || defined(WOLFSSL_HAPROXY) \
12476
    || defined(OPENSSL_EXTRA) || defined(HAVE_LIGHTY)
12477
12478
int wolfSSL_X509_NAME_digest(const WOLFSSL_X509_NAME *name,
12479
        const WOLFSSL_EVP_MD *type, unsigned char *md, unsigned int *len)
12480
{
12481
    WOLFSSL_ENTER("wolfSSL_X509_NAME_digest");
12482
12483
    if (name == NULL || type == NULL)
12484
        return WOLFSSL_FAILURE;
12485
12486
#if !defined(NO_FILESYSTEM) && !defined(NO_PWDBASED)
12487
    return wolfSSL_EVP_Digest((unsigned char*)name->name,
12488
                              name->sz, md, len, type, NULL);
12489
#else
12490
    (void)md;
12491
    (void)len;
12492
    return NOT_COMPILED_IN;
12493
#endif
12494
}
12495
12496
#endif /* OPENSSL_ALL || WOLFSSL_NGINX || WOLFSSL_HAPROXY ||
12497
    OPENSSL_EXTRA || HAVE_LIGHTY */
12498
12499
#if defined(WOLFSSL_NGINX) || defined(WOLFSSL_HAPROXY) || \
12500
    defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL)
12501
12502
/**
12503
 * Find the issuing cert of the input cert. On a self-signed cert this
12504
 * function will return an error.
12505
 * @param issuer The issuer x509 struct is returned here
12506
 * @param cm     The cert manager that is queried for the issuer
12507
 * @param x      This cert's issuer will be queried in cm
12508
 * @return       WOLFSSL_SUCCESS on success
12509
 *               WOLFSSL_FAILURE on error
12510
 */
12511
static int x509GetIssuerFromCM(WOLFSSL_X509 **issuer, WOLFSSL_CERT_MANAGER* cm,
12512
        WOLFSSL_X509 *x)
12513
{
12514
    Signer* ca = NULL;
12515
#ifdef WOLFSSL_SMALL_STACK
12516
    DecodedCert* cert = NULL;
12517
#else
12518
    DecodedCert  cert[1];
12519
#endif
12520
12521
    if (cm == NULL || x == NULL || x->derCert == NULL) {
12522
        WOLFSSL_MSG("No cert DER buffer or NULL cm. Defining "
12523
                    "WOLFSSL_SIGNER_DER_CERT could solve the issue");
12524
        return WOLFSSL_FAILURE;
12525
    }
12526
12527
#ifdef WOLFSSL_SMALL_STACK
12528
    cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL, DYNAMIC_TYPE_DCERT);
12529
    if (cert == NULL)
12530
        return WOLFSSL_FAILURE;
12531
#endif
12532
12533
    /* Use existing CA retrieval APIs that use DecodedCert. */
12534
    InitDecodedCert(cert, x->derCert->buffer, x->derCert->length, NULL);
12535
    if (ParseCertRelative(cert, CERT_TYPE, 0, NULL) == 0
12536
            && !cert->selfSigned) {
12537
    #ifndef NO_SKID
12538
        if (cert->extAuthKeyIdSet)
12539
            ca = GetCA(cm, cert->extAuthKeyId);
12540
        if (ca == NULL)
12541
            ca = GetCAByName(cm, cert->issuerHash);
12542
    #else /* NO_SKID */
12543
        ca = GetCA(cm, cert->issuerHash);
12544
    #endif /* NO SKID */
12545
    }
12546
    FreeDecodedCert(cert);
12547
#ifdef WOLFSSL_SMALL_STACK
12548
    XFREE(cert, NULL, DYNAMIC_TYPE_DCERT);
12549
#endif
12550
12551
    if (ca == NULL)
12552
        return WOLFSSL_FAILURE;
12553
12554
#ifdef WOLFSSL_SIGNER_DER_CERT
12555
    /* populate issuer with Signer DER */
12556
    if (wolfSSL_X509_d2i(issuer, ca->derCert->buffer,
12557
            ca->derCert->length) == NULL)
12558
        return WOLFSSL_FAILURE;
12559
#else
12560
    /* Create an empty certificate as CA doesn't have a certificate. */
12561
    *issuer = (WOLFSSL_X509 *)XMALLOC(sizeof(WOLFSSL_X509), 0,
12562
        DYNAMIC_TYPE_OPENSSL);
12563
    if (*issuer == NULL)
12564
        return WOLFSSL_FAILURE;
12565
12566
    InitX509((*issuer), 1, NULL);
12567
#endif
12568
12569
    return WOLFSSL_SUCCESS;
12570
}
12571
12572
void wolfSSL_X509_email_free(WOLF_STACK_OF(WOLFSSL_STRING) *sk)
12573
{
12574
    WOLFSSL_STACK *curr;
12575
12576
    while (sk != NULL) {
12577
        curr = sk;
12578
        sk = sk->next;
12579
12580
        XFREE(curr, NULL, DYNAMIC_TYPE_OPENSSL);
12581
    }
12582
}
12583
12584
WOLF_STACK_OF(WOLFSSL_STRING) *wolfSSL_X509_get1_ocsp(WOLFSSL_X509 *x)
12585
{
12586
    WOLFSSL_STACK* list = NULL;
12587
    char*          url;
12588
12589
    if (x == NULL || x->authInfoSz == 0)
12590
        return NULL;
12591
12592
    list = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK) + x->authInfoSz + 1,
12593
                                   NULL, DYNAMIC_TYPE_OPENSSL);
12594
    if (list == NULL)
12595
        return NULL;
12596
12597
    url = (char*)list;
12598
    url += sizeof(WOLFSSL_STACK);
12599
    XMEMCPY(url, x->authInfo, x->authInfoSz);
12600
    url[x->authInfoSz] = '\0';
12601
12602
    list->data.string = url;
12603
    list->next = NULL;
12604
12605
    return list;
12606
}
12607
12608
int wolfSSL_X509_check_issued(WOLFSSL_X509 *issuer, WOLFSSL_X509 *subject)
12609
{
12610
    WOLFSSL_X509_NAME *issuerName = wolfSSL_X509_get_issuer_name(subject);
12611
    WOLFSSL_X509_NAME *subjectName = wolfSSL_X509_get_subject_name(issuer);
12612
12613
    if (issuerName == NULL || subjectName == NULL)
12614
        return X509_V_ERR_SUBJECT_ISSUER_MISMATCH;
12615
12616
    /* Literal matching of encoded names and key ids. */
12617
    if (issuerName->sz != subjectName->sz ||
12618
           XMEMCMP(issuerName->name, subjectName->name, subjectName->sz) != 0) {
12619
        return X509_V_ERR_SUBJECT_ISSUER_MISMATCH;
12620
    }
12621
12622
    if (subject->authKeyId != NULL && issuer->subjKeyId != NULL) {
12623
        if (subject->authKeyIdSz != issuer->subjKeyIdSz ||
12624
                XMEMCMP(subject->authKeyId, issuer->subjKeyId,
12625
                        issuer->subjKeyIdSz) != 0) {
12626
            return X509_V_ERR_SUBJECT_ISSUER_MISMATCH;
12627
        }
12628
    }
12629
12630
    return X509_V_OK;
12631
}
12632
12633
#endif /* WOLFSSL_NGINX || WOLFSSL_HAPROXY || OPENSSL_EXTRA || OPENSSL_ALL */
12634
12635
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
12636
    defined(KEEP_PEER_CERT)
12637
WOLFSSL_X509* wolfSSL_X509_dup(WOLFSSL_X509 *x)
12638
{
12639
    WOLFSSL_ENTER("wolfSSL_X509_dup");
12640
12641
    if (x == NULL) {
12642
        WOLFSSL_MSG("Error: NULL input");
12643
        return NULL;
12644
    }
12645
12646
    if (x->derCert == NULL) {
12647
        WOLFSSL_MSG("Error: NULL derCert parameter");
12648
        return NULL;
12649
    }
12650
12651
    return wolfSSL_X509_d2i(NULL, x->derCert->buffer, x->derCert->length);
12652
}
12653
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
12654
12655
#if defined(OPENSSL_EXTRA)
12656
int wolfSSL_X509_check_ca(WOLFSSL_X509 *x509)
12657
{
12658
    WOLFSSL_ENTER("X509_check_ca");
12659
12660
    if (x509 == NULL)
12661
        return WOLFSSL_FAILURE;
12662
    if (x509->isCa)
12663
        return 1;
12664
    if (x509->extKeyUsageCrit)
12665
        return 4;
12666
12667
    return 0;
12668
}
12669
#endif /* OPENSSL_EXTRA */
12670
12671
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
12672
long wolfSSL_X509_get_version(const WOLFSSL_X509 *x509)
12673
{
12674
    int version = 0;
12675
12676
    WOLFSSL_ENTER("wolfSSL_X509_get_version");
12677
12678
    if (x509 == NULL){
12679
        WOLFSSL_MSG("invalid parameter");
12680
        return 0L;
12681
    }
12682
    version = x509->version;
12683
    if (version != 0)
12684
        return (long)version - 1L;
12685
12686
    return 0L;
12687
}
12688
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
12689
12690
#if defined(OPENSSL_EXTRA)
12691
int wolfSSL_X509_get_signature_nid(const WOLFSSL_X509 *x)
12692
{
12693
    if (x == NULL)
12694
        return 0;
12695
12696
    return oid2nid(x->sigOID, oidSigType);
12697
}
12698
#endif  /* OPENSSL_EXTRA */
12699
12700
#if defined(OPENSSL_EXTRA)
12701
WOLFSSL_STACK* wolfSSL_sk_X509_new(void)
12702
{
12703
    WOLFSSL_STACK* s = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK), NULL,
12704
            DYNAMIC_TYPE_OPENSSL);
12705
    if (s != NULL) {
12706
        XMEMSET(s, 0, sizeof(*s));
12707
        s->type = STACK_TYPE_X509;
12708
    }
12709
12710
    return s;
12711
}
12712
#endif
12713
12714
#ifdef OPENSSL_ALL
12715
12716
WOLFSSL_STACK* wolfSSL_sk_X509_OBJECT_new(void)
12717
{
12718
    WOLFSSL_STACK* s = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK), NULL,
12719
            DYNAMIC_TYPE_OPENSSL);
12720
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_new");
12721
    if (s != NULL) {
12722
        XMEMSET(s, 0, sizeof(*s));
12723
        s->type = STACK_TYPE_X509_OBJ;
12724
    }
12725
    return s;
12726
}
12727
12728
void wolfSSL_sk_X509_OBJECT_free(WOLFSSL_STACK* s)
12729
{
12730
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_free");
12731
    wolfSSL_sk_free(s);
12732
}
12733
12734
void wolfSSL_sk_X509_OBJECT_pop_free(WOLFSSL_STACK* s,
12735
        void (*f) (WOLFSSL_X509_OBJECT*))
12736
{
12737
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_pop_free");
12738
    wolfSSL_sk_pop_free(s, (wolfSSL_sk_freefunc)f);
12739
}
12740
12741
int wolfSSL_sk_X509_OBJECT_push(WOLFSSL_STACK* sk, WOLFSSL_X509_OBJECT* obj)
12742
{
12743
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_push");
12744
12745
    if (sk == NULL || obj == NULL) {
12746
        return WOLFSSL_FAILURE;
12747
    }
12748
12749
    return wolfSSL_sk_push(sk, obj);
12750
}
12751
12752
#endif /* OPENSSL_ALL */
12753
12754
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
12755
/* unlike wolfSSL_X509_NAME_dup this does not malloc a duplicate, only deep
12756
 * copy. "to" is expected to be a fresh blank name, if not pointers could be
12757
 * lost */
12758
int wolfSSL_X509_NAME_copy(WOLFSSL_X509_NAME* from, WOLFSSL_X509_NAME* to)
12759
{
12760
    int i;
12761
    WOLFSSL_X509_NAME_ENTRY* ne;
12762
12763
    WOLFSSL_ENTER("wolfSSL_X509_NAME_copy");
12764
12765
    if (from == NULL || to == NULL) {
12766
        WOLFSSL_MSG("NULL parameter");
12767
        return BAD_FUNC_ARG;
12768
    }
12769
12770
#if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) || defined(HAVE_LIGHTY)
12771
    if (from->rawLen > 0) {
12772
        if (from->rawLen > ASN_NAME_MAX) {
12773
            WOLFSSL_MSG("Bad raw size");
12774
            return BAD_FUNC_ARG;
12775
        }
12776
        XMEMCPY(to->raw, from->raw, from->rawLen);
12777
        to->rawLen = from->rawLen;
12778
    }
12779
#endif
12780
12781
    if (from->dynamicName) {
12782
        to->name = (char*)XMALLOC(from->sz, to->heap, DYNAMIC_TYPE_SUBJECT_CN);
12783
        if (to->name == NULL)
12784
            return WOLFSSL_FAILURE;
12785
        to->dynamicName = 1;
12786
    }
12787
    XMEMCPY(to->name, from->name, from->sz);
12788
    to->sz = from->sz;
12789
12790
    for (i = 0; i < MAX_NAME_ENTRIES; i++) {
12791
        ne = wolfSSL_X509_NAME_get_entry(from, i);
12792
        if (ne != NULL)
12793
            wolfSSL_X509_NAME_add_entry(to, ne, i, 1);
12794
    }
12795
    to->entrySz = from->entrySz;
12796
    return WOLFSSL_SUCCESS;
12797
}
12798
12799
12800
/* copies over information from "name" to the "cert" subject name
12801
 * returns WOLFSSL_SUCCESS on success */
12802
int wolfSSL_X509_set_subject_name(WOLFSSL_X509 *cert, WOLFSSL_X509_NAME *name)
12803
{
12804
    WOLFSSL_ENTER("X509_set_subject_name");
12805
    if (cert == NULL || name == NULL)
12806
        return WOLFSSL_FAILURE;
12807
12808
    FreeX509Name(&cert->subject);
12809
    InitX509Name(&cert->subject, 0, cert->heap);
12810
12811
    if (wolfSSL_X509_NAME_copy(name, &cert->subject) != WOLFSSL_SUCCESS) {
12812
        FreeX509Name(&cert->subject);
12813
        return WOLFSSL_FAILURE;
12814
    }
12815
12816
    cert->subject.x509 = cert;
12817
    return WOLFSSL_SUCCESS;
12818
}
12819
12820
12821
/* copies over information from "name" to the "cert" issuer name
12822
 * returns WOLFSSL_SUCCESS on success */
12823
int wolfSSL_X509_set_issuer_name(WOLFSSL_X509 *cert, WOLFSSL_X509_NAME *name)
12824
{
12825
    WOLFSSL_ENTER("X509_set_issuer_name");
12826
    if (cert == NULL || name == NULL)
12827
        return WOLFSSL_FAILURE;
12828
12829
    FreeX509Name(&cert->issuer);
12830
    InitX509Name(&cert->issuer, 0, cert->heap);
12831
12832
    if (wolfSSL_X509_NAME_copy(name, &cert->issuer) != WOLFSSL_SUCCESS) {
12833
        FreeX509Name(&cert->issuer);
12834
        return WOLFSSL_FAILURE;
12835
    }
12836
12837
    cert->issuer.x509 = cert;
12838
    cert->issuerSet = 1;
12839
12840
    return WOLFSSL_SUCCESS;
12841
}
12842
12843
12844
int wolfSSL_X509_set_notAfter(WOLFSSL_X509* x509, const WOLFSSL_ASN1_TIME* t)
12845
{
12846
    if (x509 == NULL || t == NULL) {
12847
        return WOLFSSL_FAILURE;
12848
    }
12849
12850
    x509->notAfter.type = t->type;
12851
    x509->notAfter.length = t->length;
12852
12853
    XMEMCPY(x509->notAfter.data, t->data, CTC_DATE_SIZE);
12854
12855
    return WOLFSSL_SUCCESS;
12856
}
12857
12858
int wolfSSL_X509_set_notBefore(WOLFSSL_X509* x509, const WOLFSSL_ASN1_TIME* t)
12859
{
12860
    if (x509 == NULL || t == NULL) {
12861
        return WOLFSSL_FAILURE;
12862
    }
12863
12864
    x509->notBefore.type = t->type;
12865
    x509->notBefore.length = t->length;
12866
12867
    XMEMCPY(x509->notBefore.data, t->data, CTC_DATE_SIZE);
12868
12869
    return WOLFSSL_SUCCESS;
12870
}
12871
12872
int wolfSSL_X509_set_serialNumber(WOLFSSL_X509* x509, WOLFSSL_ASN1_INTEGER* s)
12873
{
12874
    WOLFSSL_ENTER("wolfSSL_X509_set_serialNumber");
12875
    if (!x509 || !s || s->length >= EXTERNAL_SERIAL_SIZE)
12876
        return WOLFSSL_FAILURE;
12877
12878
    /* WOLFSSL_ASN1_INTEGER has type | size | data
12879
     * Sanity check that the data is actually in ASN format */
12880
    if (s->length < 3 && s->data[0] != ASN_INTEGER &&
12881
            s->data[1] != s->length - 2) {
12882
        return WOLFSSL_FAILURE;
12883
    }
12884
    XMEMCPY(x509->serial, s->data + 2, s->length - 2);
12885
    x509->serialSz = s->length - 2;
12886
    x509->serial[s->length] = 0;
12887
12888
    return WOLFSSL_SUCCESS;
12889
}
12890
12891
12892
int wolfSSL_X509_set_pubkey(WOLFSSL_X509 *cert, WOLFSSL_EVP_PKEY *pkey)
12893
{
12894
    byte* p = NULL;
12895
    int derSz = 0;
12896
    WOLFSSL_ENTER("wolfSSL_X509_set_pubkey");
12897
12898
    if (cert == NULL || pkey == NULL)
12899
        return WOLFSSL_FAILURE;
12900
12901
    /* Regenerate since pkey->pkey.ptr may contain private key */
12902
    switch (pkey->type) {
12903
#if (defined(WOLFSSL_KEY_GEN) || defined(OPENSSL_EXTRA)) && !defined(NO_RSA)
12904
    case EVP_PKEY_RSA:
12905
        {
12906
            RsaKey* rsa;
12907
12908
            if (pkey->rsa == NULL || pkey->rsa->internal == NULL)
12909
                return WOLFSSL_FAILURE;
12910
12911
            rsa = (RsaKey*)pkey->rsa->internal;
12912
            derSz = wc_RsaPublicKeyDerSize(rsa, 1);
12913
            if (derSz <= 0)
12914
                return WOLFSSL_FAILURE;
12915
12916
            p = (byte*)XMALLOC(derSz, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
12917
            if (p == NULL)
12918
                return WOLFSSL_FAILURE;
12919
12920
            if ((derSz = wc_RsaKeyToPublicDer(rsa, p, derSz)) <= 0) {
12921
                XFREE(p, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
12922
                return WOLFSSL_FAILURE;
12923
            }
12924
            cert->pubKeyOID = RSAk;
12925
        }
12926
        break;
12927
#endif /* (WOLFSSL_KEY_GEN || OPENSSL_EXTRA) && !NO_RSA */
12928
#if !defined(HAVE_SELFTEST) && (defined(WOLFSSL_KEY_GEN) || \
12929
        defined(WOLFSSL_CERT_GEN)) && !defined(NO_DSA)
12930
    case EVP_PKEY_DSA:
12931
        {
12932
            DsaKey* dsa;
12933
12934
            if (pkey->dsa == NULL || pkey->dsa->internal == NULL)
12935
                return WOLFSSL_FAILURE;
12936
12937
            dsa = (DsaKey*)pkey->dsa->internal;
12938
            /* size of pub, priv, p, q, g + ASN.1 additional information */
12939
            derSz = 5 * mp_unsigned_bin_size(&dsa->g) + MAX_ALGO_SZ;
12940
            p = (byte*)XMALLOC(derSz, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
12941
            if (p == NULL)
12942
                return WOLFSSL_FAILURE;
12943
12944
            if ((derSz = wc_DsaKeyToPublicDer(dsa, p, derSz)) <= 0) {
12945
                XFREE(p, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
12946
                return WOLFSSL_FAILURE;
12947
            }
12948
            cert->pubKeyOID = RSAk;
12949
        }
12950
        break;
12951
#endif /* !HAVE_SELFTEST && (WOLFSSL_KEY_GEN || WOLFSSL_CERT_GEN) && !NO_DSA */
12952
#ifdef HAVE_ECC
12953
    case EVP_PKEY_EC:
12954
        {
12955
            ecc_key* ecc;
12956
12957
            if (pkey->ecc == NULL || pkey->ecc->internal == NULL)
12958
                return WOLFSSL_FAILURE;
12959
12960
            ecc = (ecc_key*)pkey->ecc->internal;
12961
            derSz = wc_EccPublicKeyDerSize(ecc, 1);
12962
            if (derSz <= 0)
12963
                return WOLFSSL_FAILURE;
12964
12965
            p = (byte*)XMALLOC(derSz, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
12966
            if (p == NULL)
12967
                return WOLFSSL_FAILURE;
12968
12969
            if ((derSz = wc_EccPublicKeyToDer(ecc, p, derSz, 1)) <= 0) {
12970
                XFREE(p, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
12971
                return WOLFSSL_FAILURE;
12972
            }
12973
            cert->pubKeyOID = ECDSAk;
12974
        }
12975
        break;
12976
#endif
12977
    default:
12978
        return WOLFSSL_FAILURE;
12979
    }
12980
    cert->pubKey.buffer = p;
12981
    cert->pubKey.length = derSz;
12982
12983
    return WOLFSSL_SUCCESS;
12984
}
12985
12986
int wolfSSL_X509_set_version(WOLFSSL_X509* x509, long v)
12987
{
12988
    WOLFSSL_ENTER("wolfSSL_X509_set_version");
12989
    if ((x509 == NULL) || (v < 0) || (v >= INT_MAX)) {
12990
        return WOLFSSL_FAILURE;
12991
    }
12992
    x509->version = (int) v + 1;
12993
12994
    return WOLFSSL_SUCCESS;
12995
}
12996
12997
#endif /* (OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL) && WOLFSSL_CERT_GEN */
12998
12999
#if defined(OPENSSL_ALL) && \
13000
    defined(WOLFSSL_CERT_GEN) && defined(WOLFSSL_CERT_REQ)
13001
13002
void wolfSSL_X509V3_set_ctx(WOLFSSL_X509V3_CTX* ctx, WOLFSSL_X509* issuer,
13003
        WOLFSSL_X509* subject, WOLFSSL_X509* req, WOLFSSL_X509_CRL* crl,
13004
        int flag)
13005
{
13006
    int ret = WOLFSSL_SUCCESS;
13007
    WOLFSSL_ENTER("wolfSSL_X509V3_set_ctx");
13008
    if (!ctx)
13009
        return;
13010
13011
    /* not checking ctx->x509 for null first since app won't have initalized
13012
     * this X509V3_CTX before this function call */
13013
    ctx->x509 = wolfSSL_X509_new();
13014
    if (!ctx->x509)
13015
        return;
13016
13017
    /* Set parameters in ctx as long as ret == WOLFSSL_SUCCESS */
13018
    if (issuer)
13019
        ret = wolfSSL_X509_set_issuer_name(ctx->x509,&issuer->issuer);
13020
13021
    if (subject && ret == WOLFSSL_SUCCESS)
13022
        ret = wolfSSL_X509_set_subject_name(ctx->x509,&subject->subject);
13023
13024
    if (req && ret == WOLFSSL_SUCCESS) {
13025
        WOLFSSL_MSG("req not implemented.");
13026
    }
13027
13028
    if (crl && ret == WOLFSSL_SUCCESS) {
13029
        WOLFSSL_MSG("crl not implemented.");
13030
    }
13031
13032
    if (flag && ret == WOLFSSL_SUCCESS) {
13033
        WOLFSSL_MSG("flag not implemented.");
13034
    }
13035
13036
    if (!ret) {
13037
        WOLFSSL_MSG("Error setting WOLFSSL_X509V3_CTX parameters.");
13038
    }
13039
}
13040
13041
#ifndef NO_BIO
13042
int wolfSSL_i2d_X509_REQ(WOLFSSL_X509* req, unsigned char** out)
13043
{
13044
    int derSz = 0;
13045
    int ret = WOLFSSL_FAILURE;
13046
    WOLFSSL_BIO* bio = NULL;
13047
    WOLFSSL_ENTER("wolfSSL_i2d_X509_REQ");
13048
13049
    if (req == NULL || out == NULL) {
13050
        return BAD_FUNC_ARG;
13051
    }
13052
13053
    if (!(bio = wolfSSL_BIO_new(wolfSSL_BIO_s_mem()))) {
13054
        return WOLFSSL_FAILURE;
13055
    }
13056
13057
    if (wolfSSL_i2d_X509_REQ_bio(bio, req) != WOLFSSL_SUCCESS) {
13058
        WOLFSSL_MSG("wolfSSL_i2d_X509_REQ_bio error");
13059
        goto cleanup;
13060
    }
13061
13062
    derSz = wolfSSL_BIO_get_len(bio);
13063
13064
    if (*out == NULL) {
13065
        *out = (unsigned char*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_OPENSSL);
13066
        if (!*out) {
13067
            WOLFSSL_MSG("malloc error");
13068
            ret = MEMORY_E;
13069
            goto cleanup;
13070
        }
13071
    }
13072
13073
    if (wolfSSL_BIO_read(bio, *out, derSz) != derSz) {
13074
        WOLFSSL_MSG("wolfSSL_BIO_read error");
13075
        goto cleanup;
13076
    }
13077
13078
    ret = derSz;
13079
cleanup:
13080
    wolfSSL_BIO_free(bio);
13081
13082
    return ret;
13083
}
13084
#endif /* !NO_BIO */
13085
13086
WOLFSSL_X509* wolfSSL_X509_REQ_new(void)
13087
{
13088
    return wolfSSL_X509_new();
13089
}
13090
13091
void wolfSSL_X509_REQ_free(WOLFSSL_X509* req)
13092
{
13093
    wolfSSL_X509_free(req);
13094
}
13095
13096
int wolfSSL_X509_REQ_sign(WOLFSSL_X509 *req, WOLFSSL_EVP_PKEY *pkey,
13097
                          const WOLFSSL_EVP_MD *md)
13098
{
13099
    int ret;
13100
#ifdef WOLFSSL_SMALL_STACK
13101
    byte* der = NULL;
13102
#else
13103
    byte der[2048];
13104
#endif
13105
    int derSz = 2048;
13106
13107
    if (req == NULL || pkey == NULL || md == NULL) {
13108
        WOLFSSL_LEAVE("wolfSSL_X509_REQ_sign", BAD_FUNC_ARG);
13109
        return WOLFSSL_FAILURE;
13110
    }
13111
13112
#ifdef WOLFSSL_SMALL_STACK
13113
    der = (byte*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
13114
    if (der == NULL) {
13115
        return WOLFSSL_FAILURE;
13116
    }
13117
#endif
13118
13119
    /* Create a Cert that has the certificate request fields. */
13120
    req->sigOID = wolfSSL_sigTypeFromPKEY((WOLFSSL_EVP_MD*)md, pkey);
13121
    ret = wolfssl_x509_make_der(req, 1, der, &derSz, 0);
13122
    if (ret != WOLFSSL_SUCCESS) {
13123
#ifdef WOLFSSL_SMALL_STACK
13124
        XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
13125
#endif
13126
        WOLFSSL_MSG("Unable to make DER for X509");
13127
        WOLFSSL_LEAVE("wolfSSL_X509_REQ_sign", ret);
13128
        return WOLFSSL_FAILURE;
13129
    }
13130
13131
    if (wolfSSL_X509_resign_cert(req, 1, der, 2048, derSz,
13132
            (WOLFSSL_EVP_MD*)md, pkey) <= 0) {
13133
#ifdef WOLFSSL_SMALL_STACK
13134
        XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
13135
#endif
13136
        return WOLFSSL_FAILURE;
13137
    }
13138
#ifdef WOLFSSL_SMALL_STACK
13139
    XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
13140
#endif
13141
    return WOLFSSL_SUCCESS;
13142
}
13143
13144
int wolfSSL_X509_REQ_sign_ctx(WOLFSSL_X509 *req,
13145
                              WOLFSSL_EVP_MD_CTX* md_ctx)
13146
{
13147
    if (md_ctx && md_ctx->pctx)
13148
        return wolfSSL_X509_REQ_sign(req, md_ctx->pctx->pkey,
13149
                wolfSSL_EVP_MD_CTX_md(md_ctx));
13150
    else
13151
        return WOLFSSL_FAILURE;
13152
}
13153
13154
static int regenX509REQDerBuffer(WOLFSSL_X509* x509)
13155
{
13156
    int derSz = X509_BUFFER_SZ;
13157
    int ret = WOLFSSL_FAILURE;
13158
#ifdef WOLFSSL_SMALL_STACK
13159
    byte* der;
13160
    der = (byte*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
13161
    if (!der) {
13162
        WOLFSSL_MSG("malloc failed");
13163
        return WOLFSSL_FAILURE;
13164
    }
13165
#else
13166
    byte der[X509_BUFFER_SZ];
13167
#endif
13168
13169
    if (wolfssl_x509_make_der(x509, 1, der, &derSz, 0) == WOLFSSL_SUCCESS) {
13170
        FreeDer(&x509->derCert);
13171
        if (AllocDer(&x509->derCert, derSz, CERT_TYPE, x509->heap) == 0) {
13172
            XMEMCPY(x509->derCert->buffer, der, derSz);
13173
            ret = WOLFSSL_SUCCESS;
13174
        }
13175
        else {
13176
            WOLFSSL_MSG("Failed to allocate DER buffer for X509");
13177
        }
13178
    }
13179
    else {
13180
        WOLFSSL_MSG("Unable to make DER for X509 REQ");
13181
    }
13182
#ifdef WOLFSSL_SMALL_STACK
13183
    XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
13184
#endif
13185
    return ret;
13186
}
13187
13188
int wolfSSL_X509_REQ_add_extensions(WOLFSSL_X509* req,
13189
        WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* ext_sk)
13190
{
13191
    if (!req || !ext_sk) {
13192
        WOLFSSL_MSG("Bad parameter");
13193
        return WOLFSSL_FAILURE;
13194
    }
13195
13196
    while (ext_sk) {
13197
        WOLFSSL_X509_EXTENSION* ext = ext_sk->data.ext;
13198
13199
        if (wolfSSL_X509_add_ext(req, ext, -1) != WOLFSSL_SUCCESS) {
13200
            WOLFSSL_MSG("wolfSSL_X509_add_ext error");
13201
            return WOLFSSL_FAILURE;
13202
        }
13203
13204
        ext_sk = ext_sk->next;
13205
    }
13206
13207
    return regenX509REQDerBuffer(req);
13208
}
13209
13210
int wolfSSL_X509_REQ_add1_attr_by_txt(WOLFSSL_X509 *req,
13211
                              const char *attrname, int type,
13212
                              const unsigned char *bytes, int len)
13213
{
13214
    WOLFSSL_ENTER("wolfSSL_X509_REQ_add1_attr_by_txt");
13215
13216
#ifdef HAVE_LIBEST
13217
    if (!req || !attrname || !bytes || type != MBSTRING_ASC) {
13218
        WOLFSSL_MSG("Bad parameter");
13219
        return WOLFSSL_FAILURE;
13220
    }
13221
13222
    if (len < 0) {
13223
        len = (int)XSTRLEN((char*)bytes);
13224
    }
13225
13226
    /* For now just pretend that we support this for libest testing */
13227
    if (len == XSTR_SIZEOF("1.3.6.1.1.1.1.22") &&
13228
            XMEMCMP("1.3.6.1.1.1.1.22", bytes, len) == 0) {
13229
        /* MAC Address */
13230
    }
13231
    else if (len == XSTR_SIZEOF("1.2.840.10045.2.1") &&
13232
            XMEMCMP("1.2.840.10045.2.1", bytes, len) == 0) {
13233
        /* ecPublicKey */
13234
    }
13235
    else if (len == XSTR_SIZEOF("1.2.840.10045.4.3.3") &&
13236
            XMEMCMP("1.2.840.10045.4.3.3", bytes, len) == 0) {
13237
        /* ecdsa-with-SHA384 */
13238
    }
13239
    else {
13240
        return WOLFSSL_FAILURE;
13241
    }
13242
13243
    /* return error if not built for libest */
13244
    return WOLFSSL_SUCCESS;
13245
#else
13246
    (void)req;
13247
    (void)attrname;
13248
    (void)type;
13249
    (void)bytes;
13250
    (void)len;
13251
    return WOLFSSL_FAILURE;
13252
#endif
13253
}
13254
13255
13256
static int wolfSSL_X509_ATTRIBUTE_set(WOLFSSL_X509_ATTRIBUTE* attr,
13257
        const char* data, int dataSz, int type, int nid)
13258
{
13259
    if (attr) {
13260
        attr->value->value.asn1_string = wolfSSL_ASN1_STRING_new();
13261
        if (wolfSSL_ASN1_STRING_set(attr->value->value.asn1_string,
13262
                data, dataSz) != WOLFSSL_SUCCESS) {
13263
            wolfSSL_ASN1_STRING_free(attr->value->value.asn1_string);
13264
            WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
13265
            return WOLFSSL_FAILURE;
13266
        }
13267
        attr->value->type = type;
13268
        attr->object->nid = nid;
13269
    }
13270
    else {
13271
        WOLFSSL_MSG("wolfSSL_X509_ATTRIBUTE_new error");
13272
        return WOLFSSL_FAILURE;
13273
    }
13274
13275
    return WOLFSSL_SUCCESS;
13276
}
13277
13278
13279
int wolfSSL_X509_REQ_add1_attr_by_NID(WOLFSSL_X509 *req,
13280
                                      int nid, int type,
13281
                                      const unsigned char *bytes,
13282
                                      int len)
13283
{
13284
    int ret;
13285
    WOLFSSL_X509_ATTRIBUTE* attr;
13286
13287
    WOLFSSL_ENTER("wolfSSL_X509_REQ_add1_attr_by_NID");
13288
13289
    if (!req || !bytes || type != MBSTRING_ASC) {
13290
        WOLFSSL_MSG("Bad parameter");
13291
        return WOLFSSL_FAILURE;
13292
    }
13293
13294
    switch (nid) {
13295
    case NID_pkcs9_challengePassword:
13296
        if (len < 0)
13297
            len = (int)XSTRLEN((char*)bytes);
13298
        if (len < CTC_NAME_SIZE) {
13299
            XMEMCPY(req->challengePw, bytes, len);
13300
            req->challengePw[len] = '\0';
13301
        }
13302
        else {
13303
            WOLFSSL_MSG("Challenge password too long");
13304
            WOLFSSL_ERROR_VERBOSE(BUFFER_E);
13305
            return WOLFSSL_FAILURE;
13306
        }
13307
        break;
13308
    case NID_serialNumber:
13309
        if (len < 0)
13310
            len = (int)XSTRLEN((char*)bytes);
13311
        if (len + 1 > EXTERNAL_SERIAL_SIZE) {
13312
            WOLFSSL_MSG("SerialNumber too long");
13313
            WOLFSSL_ERROR_VERBOSE(BUFFER_E);
13314
            return WOLFSSL_FAILURE;
13315
        }
13316
        XMEMCPY(req->serial, bytes, len);
13317
        req->serialSz = len;
13318
        break;
13319
13320
    case NID_pkcs9_unstructuredName:
13321
    case NID_pkcs9_contentType:
13322
    case NID_surname:
13323
    case NID_initials:
13324
    case NID_givenName:
13325
    case NID_dnQualifier:
13326
        break;
13327
13328
    default:
13329
        WOLFSSL_MSG("Unsupported attribute");
13330
        return WOLFSSL_FAILURE;
13331
    }
13332
13333
    attr = wolfSSL_X509_ATTRIBUTE_new();
13334
    ret = wolfSSL_X509_ATTRIBUTE_set(attr, (const char*)bytes, len,
13335
            V_ASN1_PRINTABLESTRING, nid);
13336
    if (ret != WOLFSSL_SUCCESS) {
13337
        wolfSSL_X509_ATTRIBUTE_free(attr);
13338
    }
13339
    else {
13340
        if (req->reqAttributes == NULL) {
13341
            req->reqAttributes = wolfSSL_sk_new_node(req->heap);
13342
            req->reqAttributes->type = STACK_TYPE_X509_REQ_ATTR;
13343
        }
13344
        ret = wolfSSL_sk_push(req->reqAttributes, attr);
13345
    }
13346
13347
    return ret;
13348
}
13349
13350
WOLFSSL_X509 *wolfSSL_X509_to_X509_REQ(WOLFSSL_X509 *x,
13351
        WOLFSSL_EVP_PKEY *pkey, const WOLFSSL_EVP_MD *md)
13352
{
13353
    WOLFSSL_ENTER("wolfSSL_X509_to_X509_REQ");
13354
    (void)pkey;
13355
    (void)md;
13356
    return wolfSSL_X509_dup(x);
13357
}
13358
13359
int wolfSSL_X509_REQ_set_subject_name(WOLFSSL_X509 *req,
13360
                                      WOLFSSL_X509_NAME *name)
13361
{
13362
    return wolfSSL_X509_set_subject_name(req, name);
13363
}
13364
13365
int wolfSSL_X509_REQ_set_pubkey(WOLFSSL_X509 *req, WOLFSSL_EVP_PKEY *pkey)
13366
{
13367
    return wolfSSL_X509_set_pubkey(req, pkey);
13368
}
13369
#endif /* OPENSSL_ALL && WOLFSSL_CERT_GEN && WOLFSSL_CERT_REQ */
13370
13371
#if (defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)) && \
13372
    (defined(WOLFSSL_CERT_GEN) || defined(WOLFSSL_CERT_REQ))
13373
13374
WOLFSSL_ASN1_TYPE *wolfSSL_X509_ATTRIBUTE_get0_type(
13375
        WOLFSSL_X509_ATTRIBUTE *attr, int idx)
13376
{
13377
    WOLFSSL_ENTER("wolfSSL_X509_ATTRIBUTE_get0_type");
13378
13379
    if (!attr || idx != 0) {
13380
        WOLFSSL_MSG("Bad parameter");
13381
        return NULL;
13382
    }
13383
13384
    return attr->value;
13385
}
13386
13387
13388
/**
13389
 * @param req X509_REQ containing attribute
13390
 * @return the number of attributes
13391
 */
13392
int wolfSSL_X509_REQ_get_attr_count(const WOLFSSL_X509 *req)
13393
{
13394
    if (req == NULL || req->reqAttributes == NULL)
13395
        return 0;
13396
13397
    return wolfSSL_sk_num(req->reqAttributes);
13398
}
13399
13400
13401
/**
13402
 * @param req X509_REQ containing attribute
13403
 * @param loc NID of the attribute to return
13404
 */
13405
WOLFSSL_X509_ATTRIBUTE *wolfSSL_X509_REQ_get_attr(
13406
        const WOLFSSL_X509 *req, int loc)
13407
{
13408
    WOLFSSL_ENTER("wolfSSL_X509_REQ_get_attr");
13409
13410
    if (!req || req->reqAttributes == NULL) {
13411
        WOLFSSL_MSG("Bad parameter");
13412
        return NULL;
13413
    }
13414
13415
    return (WOLFSSL_X509_ATTRIBUTE*)wolfSSL_sk_value(req->reqAttributes, loc);
13416
}
13417
13418
/* Return NID as the attr index */
13419
int wolfSSL_X509_REQ_get_attr_by_NID(const WOLFSSL_X509 *req,
13420
        int nid, int lastpos)
13421
{
13422
    WOLFSSL_STACK* sk;
13423
    int idx;
13424
13425
    WOLFSSL_ENTER("wolfSSL_X509_REQ_get_attr_by_NID");
13426
13427
    if (!req) {
13428
        WOLFSSL_MSG("Bad parameter");
13429
        return WOLFSSL_FATAL_ERROR;
13430
    }
13431
13432
    /* search through stack for first matching nid */
13433
    idx = lastpos + 1;
13434
    do {
13435
        sk = wolfSSL_sk_get_node(req->reqAttributes, idx);
13436
        if (sk != NULL) {
13437
            WOLFSSL_X509_ATTRIBUTE* attr;
13438
            attr = (WOLFSSL_X509_ATTRIBUTE*)sk->data.generic;
13439
            if (nid == attr->object->nid) {
13440
                /* found a match */
13441
                break;
13442
            }
13443
        }
13444
        idx++;
13445
    } while (sk != NULL);
13446
13447
    /* no matches found */
13448
    if (sk == NULL) {
13449
        idx = WOLFSSL_FATAL_ERROR;
13450
    }
13451
13452
    return idx;
13453
}
13454
13455
WOLFSSL_X509_ATTRIBUTE* wolfSSL_X509_ATTRIBUTE_new(void)
13456
{
13457
    WOLFSSL_X509_ATTRIBUTE* ret;
13458
    WOLFSSL_ENTER("wolfSSL_X509_ATTRIBUTE_new");
13459
    ret = (WOLFSSL_X509_ATTRIBUTE*)XMALLOC(sizeof(WOLFSSL_X509_ATTRIBUTE),
13460
            NULL, DYNAMIC_TYPE_OPENSSL);
13461
    if (!ret) {
13462
        WOLFSSL_MSG("malloc error");
13463
        return NULL;
13464
    }
13465
    XMEMSET(ret, 0, sizeof(WOLFSSL_X509_ATTRIBUTE));
13466
    ret->object = wolfSSL_ASN1_OBJECT_new();
13467
    ret->value = wolfSSL_ASN1_TYPE_new();
13468
    /* Don't allocate ret->set since WOLFSSL_ASN1_TYPE
13469
     * is not supported as a stack type */
13470
    if (!ret->object || !ret->value) {
13471
        WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new or wolfSSL_ASN1_TYPE_new error");
13472
        wolfSSL_X509_ATTRIBUTE_free(ret);
13473
        return NULL;
13474
    }
13475
    return ret;
13476
}
13477
13478
void wolfSSL_X509_ATTRIBUTE_free(WOLFSSL_X509_ATTRIBUTE* attr)
13479
{
13480
    WOLFSSL_ENTER("wolfSSL_X509_ATTRIBUTE_free");
13481
    if (attr) {
13482
        if (attr->object) {
13483
            wolfSSL_ASN1_OBJECT_free(attr->object);
13484
        }
13485
        if (attr->value) {
13486
            wolfSSL_ASN1_TYPE_free(attr->value);
13487
        }
13488
        if (attr->set) {
13489
            wolfSSL_sk_pop_free(attr->set, NULL);
13490
        }
13491
        XFREE(attr, NULL, DYNAMIC_TYPE_OPENSSL);
13492
    }
13493
}
13494
#endif
13495
13496
#endif /* !NO_CERT */
13497
13498
#endif /* !WOLFCRYPT_ONLY */
13499
13500
#endif /* WOLFSSL_X509_INCLUDED */