Coverage Report

Created: 2026-04-01 07:25

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/wolfssl-heapmath/src/x509.c
Line
Count
Source
1
/* x509.c
2
 *
3
 * Copyright (C) 2006-2026 wolfSSL Inc.
4
 *
5
 * This file is part of wolfSSL.
6
 *
7
 * wolfSSL is free software; you can redistribute it and/or modify
8
 * it under the terms of the GNU General Public License as published by
9
 * the Free Software Foundation; either version 3 of the License, or
10
 * (at your option) any later version.
11
 *
12
 * wolfSSL is distributed in the hope that it will be useful,
13
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15
 * GNU General Public License for more details.
16
 *
17
 * You should have received a copy of the GNU General Public License
18
 * along with this program; if not, write to the Free Software
19
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
20
 */
21
22
#include <wolfssl/wolfcrypt/libwolfssl_sources.h>
23
24
#if !defined(WOLFSSL_X509_INCLUDED)
25
    #ifndef WOLFSSL_IGNORE_FILE_WARN
26
        #warning x509.c does not need to be compiled separately from ssl.c
27
    #endif
28
#else
29
30
#ifndef WOLFCRYPT_ONLY
31
32
#ifndef NO_CERTS
33
34
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
35
    #include <wolfssl/openssl/x509v3.h>
36
#endif
37
#ifdef OPENSSL_EXTRA
38
    #include <wolfssl/wolfio.h>
39
#endif
40
41
/* 16 times MAX_X509_SIZE should be more than enough to read any X509
42
 * certificate file */
43
#define MAX_BIO_READ_BUFFER (MAX_X509_SIZE * 16)
44
45
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)
46
unsigned int wolfSSL_X509_get_extension_flags(WOLFSSL_X509* x509)
47
{
48
    unsigned int flags = 0;
49
50
    WOLFSSL_ENTER("wolfSSL_X509_get_extension_flags");
51
52
    if (x509 != NULL) {
53
        if (x509->keyUsageSet) {
54
            flags |= WOLFSSL_EXFLAG_KUSAGE;
55
        }
56
        if (x509->extKeyUsageSrc != NULL) {
57
            flags |= WOLFSSL_EXFLAG_XKUSAGE;
58
        }
59
    }
60
61
    WOLFSSL_LEAVE("wolfSSL_X509_get_extension_flags", flags);
62
63
    return flags;
64
}
65
66
unsigned int wolfSSL_X509_get_key_usage(WOLFSSL_X509* x509)
67
{
68
    unsigned int ret = 0;
69
70
    WOLFSSL_ENTER("wolfSSL_X509_get_key_usage");
71
72
    if (x509 == NULL) {
73
        WOLFSSL_MSG("x509 is NULL");
74
    }
75
    else {
76
        if (x509->keyUsageSet) {
77
            ret = wolfSSL_X509_get_keyUsage(x509);
78
        }
79
        else {
80
            ret = (unsigned int)-1;
81
        }
82
    }
83
84
    WOLFSSL_LEAVE("wolfSSL_X509_get_key_usage", ret);
85
86
    return ret;
87
}
88
89
unsigned int wolfSSL_X509_get_extended_key_usage(WOLFSSL_X509* x509)
90
{
91
    int ret = 0;
92
93
    WOLFSSL_ENTER("wolfSSL_X509_get_extended_key_usage");
94
95
    if (x509 != NULL) {
96
        if (x509->extKeyUsage & EXTKEYUSE_OCSP_SIGN)
97
            ret |= WOLFSSL_XKU_OCSP_SIGN;
98
        if (x509->extKeyUsage & EXTKEYUSE_TIMESTAMP)
99
            ret |= WOLFSSL_XKU_TIMESTAMP;
100
        if (x509->extKeyUsage & EXTKEYUSE_EMAILPROT)
101
            ret |= WOLFSSL_XKU_SMIME;
102
        if (x509->extKeyUsage & EXTKEYUSE_CODESIGN)
103
            ret |= WOLFSSL_XKU_CODE_SIGN;
104
        if (x509->extKeyUsage & EXTKEYUSE_CLIENT_AUTH)
105
            ret |= WOLFSSL_XKU_SSL_CLIENT;
106
        if (x509->extKeyUsage & EXTKEYUSE_SERVER_AUTH)
107
            ret |= WOLFSSL_XKU_SSL_SERVER;
108
        if (x509->extKeyUsage & EXTKEYUSE_ANY)
109
            ret |= WOLFSSL_XKU_ANYEKU;
110
    }
111
112
    WOLFSSL_LEAVE("wolfSSL_X509_get_extended_key_usage", ret);
113
114
    return (unsigned int)ret;
115
}
116
117
/* Returns the number of X509V3 extensions in X509 object, or 0 on failure */
118
int wolfSSL_X509_get_ext_count(const WOLFSSL_X509* passedCert)
119
{
120
    int extCount = 0;
121
    int length = 0;
122
    int outSz = 0;
123
    const byte* rawCert;
124
    int sz = 0;
125
    word32 idx = 0;
126
    const byte* input;
127
    WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
128
129
    WOLFSSL_ENTER("wolfSSL_X509_get_ext_count");
130
    if (passedCert == NULL) {
131
        WOLFSSL_MSG("\tNot passed a certificate");
132
        return WOLFSSL_FAILURE;
133
    }
134
135
    rawCert = wolfSSL_X509_get_der((WOLFSSL_X509*)passedCert, &outSz);
136
    if (rawCert == NULL) {
137
        WOLFSSL_MSG("\tpassedCert has no internal DerBuffer set.");
138
        return WOLFSSL_FAILURE;
139
    }
140
141
#ifdef WOLFSSL_SMALL_STACK
142
    cert = (DecodedCert *)XMALLOC(sizeof(*cert), NULL, DYNAMIC_TYPE_DCERT);
143
    if (cert == NULL) {
144
        WOLFSSL_MSG("out of memory");
145
        return WOLFSSL_FAILURE;
146
    }
147
#endif
148
149
    InitDecodedCert(cert, rawCert, (word32)outSz, 0);
150
151
    if (ParseCert(cert,
152
#ifdef WOLFSSL_CERT_REQ
153
            passedCert->isCSR ? CERTREQ_TYPE :
154
#endif
155
                    CA_TYPE,
156
            NO_VERIFY, NULL) < 0) {
157
        WOLFSSL_MSG("\tCertificate parsing failed");
158
        goto out;
159
    }
160
161
    input = cert->extensions;
162
    sz = cert->extensionsSz;
163
164
    if (input == NULL || sz == 0) {
165
        WOLFSSL_MSG("\tsz or input NULL error");
166
        goto out;
167
    }
168
169
#ifdef WOLFSSL_CERT_REQ
170
    if (!passedCert->isCSR)
171
#endif
172
    {
173
        if (input[idx++] != ASN_EXTENSIONS) {
174
            WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
175
            goto out;
176
        }
177
178
        if (GetLength(input, &idx, &length, (word32)sz) < 0) {
179
            WOLFSSL_MSG("\tfail: invalid length");
180
            goto out;
181
        }
182
    }
183
184
    if (GetSequence(input, &idx, &length, (word32)sz) < 0) {
185
        WOLFSSL_MSG("\tfail: should be a SEQUENCE (1)");
186
        goto out;
187
    }
188
189
    while (idx < (word32)sz) {
190
        if (GetSequence(input, &idx, &length, (word32)sz) < 0) {
191
            WOLFSSL_MSG("\tfail: should be a SEQUENCE");
192
            FreeDecodedCert(cert);
193
            return WOLFSSL_FAILURE;
194
        }
195
        idx += length;
196
        extCount++;
197
    }
198
199
out:
200
201
    FreeDecodedCert(cert);
202
    WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
203
    return extCount;
204
}
205
206
/* Creates and returns pointer to a new X509_EXTENSION object in memory */
207
WOLFSSL_X509_EXTENSION* wolfSSL_X509_EXTENSION_new(void)
208
{
209
    WOLFSSL_X509_EXTENSION* newExt;
210
211
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_new");
212
213
    newExt = (WOLFSSL_X509_EXTENSION*)XMALLOC(sizeof(WOLFSSL_X509_EXTENSION),
214
              NULL, DYNAMIC_TYPE_X509_EXT);
215
    if (newExt == NULL)
216
        return NULL;
217
    XMEMSET(newExt, 0, sizeof(WOLFSSL_X509_EXTENSION));
218
219
    return newExt;
220
}
221
222
223
/* Clear out and free internal pointers of ASN.1 STRING object.
224
 *
225
 * @param [in] asn1  ASN.1 STRING object.
226
 */
227
static void wolfSSL_ASN1_STRING_clear(WOLFSSL_ASN1_STRING* asn1)
228
{
229
    /* Check we have an object to free. */
230
    if (asn1 != NULL) {
231
        /* Dispose of dynamic data. */
232
        if ((asn1->length > 0) && asn1->isDynamic) {
233
            XFREE(asn1->data, NULL, DYNAMIC_TYPE_OPENSSL);
234
        }
235
        XMEMSET(asn1, 0, sizeof(WOLFSSL_ASN1_STRING));
236
    }
237
}
238
239
240
void wolfSSL_X509_EXTENSION_free(WOLFSSL_X509_EXTENSION* x)
241
{
242
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_free");
243
    if (x == NULL)
244
        return;
245
246
    if (x->obj != NULL) {
247
        wolfSSL_ASN1_OBJECT_free(x->obj);
248
    }
249
250
    wolfSSL_ASN1_STRING_clear(&x->value);
251
    wolfSSL_sk_pop_free(x->ext_sk, NULL);
252
253
    XFREE(x, NULL, DYNAMIC_TYPE_X509_EXT);
254
}
255
256
WOLFSSL_X509_EXTENSION* wolfSSL_X509_EXTENSION_dup(WOLFSSL_X509_EXTENSION* src)
257
{
258
    WOLFSSL_X509_EXTENSION* ret = NULL;
259
    int err = 0;
260
261
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_dup");
262
263
    if (src == NULL) {
264
        err = 1;
265
    }
266
267
    if (err == 0) {
268
        ret = wolfSSL_X509_EXTENSION_new();
269
        if (ret == NULL) {
270
            err = 1;
271
        }
272
    }
273
    if (err == 0 && src->obj != NULL) {
274
        ret->obj = wolfSSL_ASN1_OBJECT_dup(src->obj);
275
        if (ret->obj == NULL) {
276
            err = 1;
277
        }
278
    }
279
    if (err == 0) {
280
        ret->crit = src->crit;
281
        if (wolfSSL_ASN1_STRING_copy(&ret->value, &src->value) !=
282
                WOLFSSL_SUCCESS) {
283
            err = 1;
284
        }
285
    }
286
287
    if (err == 1 && ret != NULL) {
288
        wolfSSL_X509_EXTENSION_free(ret);
289
        ret = NULL;
290
    }
291
292
    return ret;
293
}
294
295
WOLFSSL_X509_EXTENSION* wolfSSL_X509_EXTENSION_create_by_OBJ(
296
    WOLFSSL_X509_EXTENSION* ex, WOLFSSL_ASN1_OBJECT *obj, int crit,
297
    WOLFSSL_ASN1_STRING *data)
298
{
299
    int err = 0;
300
    WOLFSSL_X509_EXTENSION *ret = ex;
301
302
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_create_by_OBJ");
303
304
    if ((obj == NULL) || (data == NULL)) {
305
       return NULL;
306
    }
307
308
    if (ret == NULL) {
309
        ret = wolfSSL_X509_EXTENSION_new();
310
        if (ret == NULL) {
311
            err = 1;
312
        }
313
    }
314
    else {
315
        /* Prevent potential memory leaks and dangling pointers. */
316
        wolfSSL_ASN1_OBJECT_free(ret->obj);
317
        ret->obj = NULL;
318
        wolfSSL_ASN1_STRING_clear(&ret->value);
319
    }
320
321
    if (err == 0) {
322
        ret->crit = crit;
323
        ret->obj = wolfSSL_ASN1_OBJECT_dup(obj);
324
        if (ret->obj == NULL) {
325
            err = 1;
326
        }
327
    }
328
329
    if (err == 0) {
330
        if (wolfSSL_ASN1_STRING_copy(&ret->value, data) != WOLFSSL_SUCCESS) {
331
            err = 1;
332
        }
333
    }
334
335
    if (err == 1) {
336
        if (ret != ex) {
337
            wolfSSL_X509_EXTENSION_free(ret);
338
        }
339
        ret = NULL;
340
    }
341
    return ret;
342
}
343
344
/* Creates and returns a new WOLFSSL_X509_EXTENSION stack. */
345
WOLFSSL_STACK* wolfSSL_sk_new_x509_ext(void)
346
{
347
    WOLFSSL_STACK* sk;
348
    WOLFSSL_ENTER("wolfSSL_sk_new_x509_ext");
349
350
    sk = wolfSSL_sk_new_null();
351
    if (sk) {
352
        sk->type = STACK_TYPE_X509_EXT;
353
    }
354
    return sk;
355
}
356
357
/* This function does NOT return 1 on success. It returns 0 on fail, and the
358
 * number of items in the stack upon success. This is for compatibility with
359
 * OpenSSL. */
360
int wolfSSL_sk_X509_EXTENSION_push(WOLFSSL_STACK* sk,
361
    WOLFSSL_X509_EXTENSION* ext)
362
{
363
    WOLFSSL_ENTER("wolfSSL_sk_X509_EXTENSION_push");
364
365
    return wolfSSL_sk_push(sk, ext);
366
}
367
368
static WOLFSSL_STACK* generateExtStack(const WOLFSSL_X509 *x)
369
{
370
    int numOfExt, i;
371
    WOLFSSL_X509 *x509 = (WOLFSSL_X509*)x;
372
    WOLFSSL_STACK* ret;
373
    WOLFSSL_STACK* tmp;
374
375
    if (!x509) {
376
        WOLFSSL_MSG("Bad parameter");
377
        return NULL;
378
    }
379
380
    /* Save x509->ext_sk */
381
    tmp = x509->ext_sk;
382
    x509->ext_sk = NULL;
383
    numOfExt = wolfSSL_X509_get_ext_count(x509);
384
385
    for (i = 0; i < numOfExt; i++) {
386
        /* Build the extension stack */
387
        (void)wolfSSL_X509_set_ext(x509, i);
388
    }
389
390
    /* Restore */
391
    ret = x509->ext_sk;
392
    x509->ext_sk = tmp;
393
    return ret;
394
}
395
396
/**
397
 * @param x Certificate to extract extensions from
398
 * @return STACK_OF(X509_EXTENSION)*
399
 */
400
const WOLFSSL_STACK *wolfSSL_X509_get0_extensions(const WOLFSSL_X509 *x)
401
{
402
    int numOfExt;
403
    WOLFSSL_X509 *x509 = (WOLFSSL_X509*)x;
404
    WOLFSSL_ENTER("wolfSSL_X509_get0_extensions");
405
406
    if (!x509) {
407
        WOLFSSL_MSG("Bad parameter");
408
        return NULL;
409
    }
410
411
    numOfExt = wolfSSL_X509_get_ext_count(x509);
412
413
    if (numOfExt != wolfSSL_sk_num(x509->ext_sk_full)) {
414
        wolfSSL_sk_pop_free(x509->ext_sk_full, NULL);
415
        x509->ext_sk_full = generateExtStack(x);
416
    }
417
418
    return x509->ext_sk_full;
419
}
420
421
/**
422
 * Caller is responsible for freeing the returned stack.
423
 */
424
const WOLFSSL_STACK *wolfSSL_X509_REQ_get_extensions(const WOLFSSL_X509 *x)
425
{
426
    return generateExtStack(x);
427
}
428
429
/* Gets the X509_EXTENSION* ext based on it's location in WOLFSSL_X509* x509.
430
 *
431
 * x509   : The X509 structure to look for the extension.
432
 * loc    : Location of the extension. If the extension is found at the given
433
 * location, a new X509_EXTENSION structure is populated with extension-specific
434
 * data based on the extension type.
435
436
 * Returns NULL on error or pointer to X509_EXTENSION structure containing the
437
 * extension. The returned X509_EXTENSION should not be free'd by caller.
438
 * The returned X509_EXTENSION is pushed onto a stack inside the x509 argument.
439
 * This is later free'd when x509 is free'd.
440
 *
441
 * NOTE: for unknown extension NIDs, a X509_EXTENSION is populated with the
442
 * extension oid as the ASN1_OBJECT (QT compatibility)
443
 */
444
WOLFSSL_X509_EXTENSION* wolfSSL_X509_get_ext(const WOLFSSL_X509* x509, int loc)
445
{
446
    WOLFSSL_X509_EXTENSION* ext = NULL;
447
    WOLFSSL_ENTER("wolfSSL_X509_get_ext");
448
    if (x509 == NULL)
449
        return NULL;
450
451
   ext = wolfSSL_X509_set_ext((WOLFSSL_X509*) x509, loc);
452
   return ext;
453
}
454
455
int wolfSSL_X509_get_ext_by_OBJ(const WOLFSSL_X509 *x,
456
        const WOLFSSL_ASN1_OBJECT *obj, int lastpos)
457
{
458
    const WOLF_STACK_OF(WOLFSSL_X509_EXTENSION) *sk;
459
460
    if (!x || !obj) {
461
        WOLFSSL_MSG("Bad parameter");
462
        return WOLFSSL_FATAL_ERROR;
463
    }
464
465
    sk = wolfSSL_X509_get0_extensions(x);
466
    if (!sk) {
467
        WOLFSSL_MSG("No extensions");
468
        return WOLFSSL_FATAL_ERROR;
469
    }
470
    lastpos++;
471
    if (lastpos < 0)
472
        lastpos = 0;
473
    for (; lastpos < wolfSSL_sk_num(sk); lastpos++) {
474
        const WOLFSSL_X509_EXTENSION *ext =
475
            wolfSSL_sk_X509_EXTENSION_value(sk, lastpos);
476
        if (ext == NULL)
477
            continue;
478
        if (wolfSSL_OBJ_cmp(ext->obj, obj) == 0)
479
            return lastpos;
480
    }
481
    return WOLFSSL_FATAL_ERROR;
482
}
483
484
485
int wolfSSL_X509_OBJECT_set1_X509(WOLFSSL_X509_OBJECT *a, WOLFSSL_X509 *obj)
486
{
487
    WOLFSSL_STUB("wolfSSL_X509_OBJECT_set1_X509");
488
    (void)a;
489
    (void)obj;
490
    return 0;
491
}
492
493
int wolfSSL_X509_OBJECT_set1_X509_CRL(WOLFSSL_X509_OBJECT *a,
494
    WOLFSSL_X509_CRL *obj)
495
{
496
    WOLFSSL_STUB("wolfSSL_X509_OBJECT_set1_X509_CRL");
497
    (void)a;
498
    (void)obj;
499
    return 0;
500
}
501
502
#endif /* OPENSSL_ALL || OPENSSL_EXTRA */
503
504
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
505
    defined(WOLFSSL_WPAS_SMALL)
506
/* Set a general name from the DNS entry data.
507
 *
508
 * @param [in]      dns  DNS entry.
509
 * @param [in, out] gn   General name to place data in.
510
 * @return  1 on success.
511
 * @return  0 on failure.
512
 */
513
static int wolfssl_dns_entry_othername_to_gn(DNS_entry* dns,
514
    WOLFSSL_GENERAL_NAME* gn)
515
{
516
    int ret = 0;
517
    WOLFSSL_ASN1_OBJECT* obj = NULL;
518
    WOLFSSL_ASN1_TYPE* type = NULL;
519
    WOLFSSL_ASN1_STRING* str = NULL;
520
    byte tag = 0;
521
    unsigned char* p = (unsigned char *)dns->name;
522
    long len = dns->len;
523
524
#ifdef WOLFSSL_FPKI
525
    if (dns->oidSum != 0) {
526
        /* UPN OID: 1.3.6.1.4.1.311.20.2.3 */
527
        static const unsigned char upn_oid[] = {
528
            0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x14, 0x02, 0x03
529
        };
530
        /* FASCN OID: 2.16.840.1.101.3.6.6 */
531
        static const unsigned char fascn_oid[] = {
532
            0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x06, 0x06
533
        };
534
        const unsigned char* oid;
535
        word32 oidSz;
536
537
        if ((oid = OidFromId(dns->oidSum, oidCertAltNameType, &oidSz)) ==
538
                NULL) {
539
            if (dns->oidSum == UPN_OID) {
540
                oid = upn_oid;
541
                oidSz = (word32)sizeof(upn_oid);
542
            }
543
            else if (dns->oidSum == FASCN_OID) {
544
                oid = fascn_oid;
545
                oidSz = (word32)sizeof(fascn_oid);
546
            }
547
            else {
548
                goto err;
549
            }
550
        }
551
        if ((obj = wolfSSL_c2i_ASN1_OBJECT(NULL, &oid, oidSz)) == NULL) {
552
            goto err;
553
        }
554
555
        tag = WOLFSSL_V_ASN1_UTF8STRING;
556
    }
557
    else
558
#endif
559
    {
560
        word32 idx = 0;
561
        int nameLen;
562
563
        /* Create an object id for general name from DER encoding. */
564
        obj = wolfSSL_d2i_ASN1_OBJECT(NULL, (const unsigned char**)&p, len);
565
        if (obj == NULL)
566
            goto err;
567
        /* Pointer moved on and now update length of remaining data. */
568
        len -= (long)((size_t)p - (size_t)dns->name);
569
570
        /* Next is "value      [0] EXPLICIT ANY DEFINED BY type-id" */
571
        if (GetASNHeader(p, ASN_CONTEXT_SPECIFIC | ASN_CONSTRUCTED | 0,
572
                &idx, &nameLen, (word32)len) < 0)
573
            goto err;
574
        p += idx;
575
        len -= idx;
576
577
        /* Set the tag to object so that it gets output in raw form */
578
        tag = WOLFSSL_V_ASN1_SEQUENCE;
579
    }
580
581
    /* Create a WOLFSSL_ASN1_STRING from the DER. */
582
    str = wolfSSL_ASN1_STRING_type_new(tag);
583
    if (str == NULL) {
584
        goto err;
585
    }
586
    wolfSSL_ASN1_STRING_set(str, p, (int)len);
587
588
    /* Wrap string in a WOLFSSL_ASN1_TYPE. */
589
    type = wolfSSL_ASN1_TYPE_new();
590
    if (type == NULL)
591
        goto err;
592
    wolfSSL_ASN1_TYPE_set(type, tag, str);
593
    str = NULL; /* type now owns str */
594
595
    if (wolfSSL_GENERAL_NAME_set_type(gn, WOLFSSL_GEN_OTHERNAME)
596
            != WOLFSSL_SUCCESS) {
597
        goto err;
598
    }
599
600
    /* Store the object and string in general name. */
601
    gn->d.otherName->type_id = obj;
602
    gn->d.otherName->value = type;
603
    type = NULL; /* gn->d.otherName owns type */
604
605
    ret = 1;
606
err:
607
    if (ret != 1) {
608
        wolfSSL_ASN1_OBJECT_free(obj);
609
        wolfSSL_ASN1_TYPE_free(type);
610
        wolfSSL_ASN1_STRING_free(str);
611
    }
612
    return ret;
613
}
614
#endif /* OPENSSL_ALL || WOLFSSL_WPAS_SMALL */
615
616
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)
617
static int DNS_to_GENERAL_NAME(WOLFSSL_GENERAL_NAME* gn, DNS_entry* dns)
618
{
619
    switch (dns->type) {
620
        case WOLFSSL_GEN_OTHERNAME:
621
            /* Sets gn->type internally */
622
            if (!wolfssl_dns_entry_othername_to_gn(dns, gn)) {
623
                WOLFSSL_MSG("OTHERNAME set failed");
624
                return WOLFSSL_FAILURE;
625
            }
626
            break;
627
628
        case WOLFSSL_GEN_EMAIL:
629
        case WOLFSSL_GEN_DNS:
630
        case WOLFSSL_GEN_URI:
631
        case WOLFSSL_GEN_IPADD:
632
        case WOLFSSL_GEN_IA5:
633
            gn->type = dns->type;
634
            gn->d.ia5->length = dns->len;
635
            if (wolfSSL_ASN1_STRING_set(gn->d.ia5, dns->name,
636
                    gn->d.ia5->length) != WOLFSSL_SUCCESS) {
637
                WOLFSSL_MSG("ASN1_STRING_set failed");
638
                return WOLFSSL_FAILURE;
639
            }
640
            break;
641
642
643
        case WOLFSSL_GEN_DIRNAME:
644
            gn->type = dns->type;
645
            /* wolfSSL_GENERAL_NAME_new() mallocs this by default */
646
            wolfSSL_ASN1_STRING_free(gn->d.ia5);
647
            gn->d.ia5 = NULL;
648
649
            gn->d.dirn = wolfSSL_X509_NAME_new();;
650
            /* @TODO extract dir name info from DNS_entry */
651
            break;
652
653
#ifdef WOLFSSL_RID_ALT_NAME
654
        case WOLFSSL_GEN_RID:
655
            gn->type = dns->type;
656
            /* wolfSSL_GENERAL_NAME_new() mallocs this by default */
657
            wolfSSL_ASN1_STRING_free(gn->d.ia5);
658
            gn->d.ia5 = NULL;
659
660
            gn->d.registeredID = wolfSSL_ASN1_OBJECT_new();
661
            if (gn->d.registeredID == NULL) {
662
                return WOLFSSL_FAILURE;
663
            }
664
            {
665
                /* Store DER-encoded OID (tag + length + content) in obj */
666
                word32 derSz = 1 + SetLength(dns->len, NULL) + dns->len;
667
                byte* der = (byte*)XMALLOC(derSz,
668
                    gn->d.registeredID->heap, DYNAMIC_TYPE_ASN1);
669
                if (der == NULL) {
670
                    return WOLFSSL_FAILURE;
671
                }
672
                {
673
                    word32 idx = 0;
674
                    der[idx++] = ASN_OBJECT_ID;
675
                    idx += SetLength(dns->len, der + idx);
676
                    XMEMCPY(der + idx, dns->name, dns->len);
677
                }
678
                gn->d.registeredID->obj = der;
679
                gn->d.registeredID->objSz = derSz;
680
            }
681
            gn->d.registeredID->dynamic |= WOLFSSL_ASN1_DYNAMIC_DATA;
682
            gn->d.registeredID->grp = oidCertExtType;
683
            break;
684
#endif
685
686
        case WOLFSSL_GEN_X400:
687
            /* Unsupported: fall through */
688
        case WOLFSSL_GEN_EDIPARTY:
689
            /* Unsupported: fall through */
690
        default:
691
            WOLFSSL_MSG("Unsupported type conversion");
692
            return WOLFSSL_FAILURE;
693
    }
694
    return WOLFSSL_SUCCESS;
695
}
696
697
698
static int wolfssl_x509_alt_names_to_gn(WOLFSSL_X509* x509,
699
    WOLFSSL_X509_EXTENSION* ext)
700
{
701
    int ret = 0;
702
    WOLFSSL_GENERAL_NAME* gn = NULL;
703
    DNS_entry* dns = NULL;
704
    WOLFSSL_STACK* sk;
705
706
    sk = (WOLFSSL_GENERAL_NAMES*)XMALLOC(sizeof(WOLFSSL_GENERAL_NAMES), NULL,
707
        DYNAMIC_TYPE_ASN1);
708
    if (sk == NULL) {
709
        goto err;
710
    }
711
    XMEMSET(sk, 0, sizeof(WOLFSSL_GENERAL_NAMES));
712
    sk->type = STACK_TYPE_GEN_NAME;
713
714
    if (x509->subjAltNameSet && x509->altNames != NULL) {
715
        /* alt names are DNS_entry structs */
716
        dns = x509->altNames;
717
        /* Currently only support GEN_DNS type */
718
        while (dns != NULL) {
719
            gn = wolfSSL_GENERAL_NAME_new();
720
            if (gn == NULL) {
721
                WOLFSSL_MSG("Error creating GENERAL_NAME");
722
                wolfSSL_sk_pop_free(sk, NULL);
723
                goto err;
724
            }
725
726
            if (DNS_to_GENERAL_NAME(gn, dns) != WOLFSSL_SUCCESS) {
727
                wolfSSL_GENERAL_NAME_free(gn);
728
                wolfSSL_sk_pop_free(sk, NULL);
729
                goto err;
730
            }
731
732
            if (wolfSSL_sk_GENERAL_NAME_push(sk, gn) <= 0) {
733
                WOLFSSL_MSG("Error pushing onto stack");
734
                wolfSSL_GENERAL_NAME_free(gn);
735
                wolfSSL_sk_pop_free(sk, NULL);
736
                goto err;
737
            }
738
739
            dns = dns->next;
740
        }
741
    }
742
    ext->ext_sk = sk;
743
    ext->crit = x509->subjAltNameCrit;
744
745
    ret = 1;
746
err:
747
    return ret;
748
}
749
750
/* Pushes a new X509_EXTENSION* ext onto the stack inside WOLFSSL_X509* x509.
751
 * This is currently a helper function for wolfSSL_X509_get_ext
752
 * Caller does not free the returned WOLFSSL_X509_EXTENSION*
753
 */
754
WOLFSSL_X509_EXTENSION* wolfSSL_X509_set_ext(WOLFSSL_X509* x509, int loc)
755
{
756
    int extCount = 0, length = 0, outSz = 0, sz = 0, ret = 0;
757
    int objSz = 0, isSet = 0;
758
    const byte* rawCert;
759
    const byte* input;
760
    byte* oidBuf;
761
    word32 oid, idx = 0, tmpIdx = 0, nid;
762
    WOLFSSL_X509_EXTENSION* ext = NULL;
763
    WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
764
765
    WOLFSSL_ENTER("wolfSSL_X509_set_ext");
766
767
    if (x509 == NULL) {
768
        WOLFSSL_MSG("\tNot passed a certificate");
769
        return NULL;
770
    }
771
772
    if (loc < 0 || (loc > wolfSSL_X509_get_ext_count(x509))) {
773
        WOLFSSL_MSG("\tBad location argument");
774
        return NULL;
775
    }
776
777
    ext = wolfSSL_X509_EXTENSION_new();
778
    if (ext == NULL) {
779
        WOLFSSL_MSG("\tX509_EXTENSION_new() failed");
780
        return NULL;
781
    }
782
783
    rawCert = wolfSSL_X509_get_der((WOLFSSL_X509*)x509, &outSz);
784
    if (rawCert == NULL) {
785
        WOLFSSL_MSG("\tX509_get_der() failed");
786
        wolfSSL_X509_EXTENSION_free(ext);
787
        return NULL;
788
    }
789
790
#ifdef WOLFSSL_SMALL_STACK
791
    cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL, DYNAMIC_TYPE_DCERT);
792
    if (cert == NULL) {
793
        WOLFSSL_MSG("Failed to allocate memory for DecodedCert");
794
        wolfSSL_X509_EXTENSION_free(ext);
795
        return NULL;
796
    }
797
#endif
798
799
    InitDecodedCert(cert, rawCert, (word32)outSz, 0);
800
801
    if (ParseCert(cert,
802
#ifdef WOLFSSL_CERT_REQ
803
            x509->isCSR ? CERTREQ_TYPE :
804
#endif
805
                    CA_TYPE,
806
            NO_VERIFY, NULL) < 0) {
807
        WOLFSSL_MSG("\tCertificate parsing failed");
808
        wolfSSL_X509_EXTENSION_free(ext);
809
        FreeDecodedCert(cert);
810
        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
811
        return NULL;
812
    }
813
814
    input = cert->extensions;
815
    sz = cert->extensionsSz;
816
817
    if (input == NULL || sz == 0) {
818
        WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
819
        wolfSSL_X509_EXTENSION_free(ext);
820
        FreeDecodedCert(cert);
821
        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
822
        return NULL;
823
    }
824
825
#ifdef WOLFSSL_CERT_REQ
826
    if (!x509->isCSR)
827
#endif
828
    {
829
        if (input[idx++] != ASN_EXTENSIONS) {
830
            WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
831
            wolfSSL_X509_EXTENSION_free(ext);
832
            FreeDecodedCert(cert);
833
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
834
            return NULL;
835
        }
836
837
        if (GetLength(input, &idx, &length, (word32)sz) < 0) {
838
            WOLFSSL_MSG("\tfail: invalid length");
839
            wolfSSL_X509_EXTENSION_free(ext);
840
            FreeDecodedCert(cert);
841
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
842
            return NULL;
843
        }
844
    }
845
846
    if (GetSequence(input, &idx, &length, (word32)sz) < 0) {
847
        WOLFSSL_MSG("\tfail: should be a SEQUENCE (1)");
848
        wolfSSL_X509_EXTENSION_free(ext);
849
        FreeDecodedCert(cert);
850
        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
851
        return NULL;
852
    }
853
854
    while (idx < (word32)sz) {
855
        oid = 0;
856
857
        if (GetSequence(input, &idx, &length, (word32)sz) < 0) {
858
            WOLFSSL_MSG("\tfail: should be a SEQUENCE");
859
            wolfSSL_X509_EXTENSION_free(ext);
860
            FreeDecodedCert(cert);
861
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
862
            return NULL;
863
        }
864
865
        tmpIdx = idx;
866
        ret = GetObjectId(input, &idx, &oid, oidCertExtType, (word32)sz);
867
        if (ret < 0) {
868
            WOLFSSL_MSG("\tfail: OBJECT ID");
869
            wolfSSL_X509_EXTENSION_free(ext);
870
            FreeDecodedCert(cert);
871
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
872
            return NULL;
873
        }
874
        idx = tmpIdx;
875
        nid = (word32)oid2nid(oid, oidCertExtType);
876
877
        /* Continue while loop until extCount == loc or idx > sz */
878
        if (extCount != loc) {
879
            idx += length;
880
            extCount++;
881
            continue;
882
        }
883
        /* extCount == loc. Now get the extension. */
884
        /* Check if extension has been set */
885
        isSet = wolfSSL_X509_ext_isSet_by_NID((WOLFSSL_X509*)x509, (int)nid);
886
887
        if (wolfSSL_OBJ_nid2ln((int)nid) != NULL) {
888
            /* This is NOT an unknown OID. */
889
            ext->obj = wolfSSL_OBJ_nid2obj((int)nid);
890
            if (ext->obj == NULL) {
891
                WOLFSSL_MSG("\tfail: Invalid OBJECT");
892
                wolfSSL_X509_EXTENSION_free(ext);
893
                FreeDecodedCert(cert);
894
                WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
895
                return NULL;
896
            }
897
        }
898
899
        if (ext->obj) {
900
            ext->obj->nid = (int)nid;
901
        }
902
903
        switch (oid) {
904
            case BASIC_CA_OID:
905
            {
906
                WOLFSSL_ASN1_INTEGER* a;
907
                word32 dataIdx = idx;
908
                word32 dummyOid;
909
                int dataLen = 0;
910
911
                if (!isSet)
912
                    break;
913
914
                /* Set pathlength */
915
                a = wolfSSL_ASN1_INTEGER_new();
916
917
                /* Set the data */
918
                ret = GetObjectId(input, &dataIdx, &dummyOid, oidCertExtType,
919
                        (word32)sz) == 0;
920
                if (ret && dataIdx < (word32)sz) {
921
                    /* Skip the critical information */
922
                    if (input[dataIdx] == ASN_BOOLEAN) {
923
                        dataIdx++;
924
                        ret = GetLength(input, &dataIdx, &dataLen, sz) >= 0;
925
                        dataIdx += dataLen;
926
                    }
927
                }
928
                if (ret) {
929
                    ret = GetOctetString(input, &dataIdx, &dataLen,
930
                            (word32)sz) > 0;
931
                }
932
                if (ret) {
933
                    ret = wolfSSL_ASN1_STRING_set(&ext->value, input + dataIdx,
934
                            dataLen) == 1;
935
                }
936
937
                if (a == NULL || !ret) {
938
                    wolfSSL_X509_EXTENSION_free(ext);
939
                    FreeDecodedCert(cert);
940
                    WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
941
                    return NULL;
942
                }
943
                a->length = (int)x509->pathLength;
944
945
                /* Save ASN1_INTEGER in x509 extension */
946
                ext->obj->pathlen = a;
947
948
                ext->obj->ca = x509->isCa;
949
                break;
950
            }
951
952
            case AUTH_INFO_OID:
953
            {
954
                WOLFSSL_STACK* sk;
955
956
                if (!isSet)
957
                    break;
958
959
                /* Create a stack to hold both the caIssuer and ocsp objects
960
                    in X509_EXTENSION structure */
961
                sk = wolfSSL_sk_new_asn1_obj();
962
                if (sk == NULL) {
963
                    WOLFSSL_MSG("Failed to malloc stack");
964
                    wolfSSL_X509_EXTENSION_free(ext);
965
                    FreeDecodedCert(cert);
966
                    WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
967
                    return NULL;
968
                }
969
970
                /* Add CaIssuers object to stack */
971
                if (x509->authInfoCaIssuer != NULL &&
972
                    x509->authInfoCaIssuerSz > 0)
973
                {
974
                    WOLFSSL_ASN1_OBJECT* obj;
975
                    obj = wolfSSL_ASN1_OBJECT_new();
976
                    if (obj == NULL) {
977
                        WOLFSSL_MSG("Error creating ASN1 object");
978
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
979
                        wolfSSL_X509_EXTENSION_free(ext);
980
                        FreeDecodedCert(cert);
981
                        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
982
                        return NULL;
983
                    }
984
                    obj->obj = (byte*)x509->authInfoCaIssuer;
985
                    obj->objSz = (unsigned int)x509->authInfoCaIssuerSz;
986
                    obj->grp = oidCertAuthInfoType;
987
                    obj->nid = WC_NID_ad_ca_issuers;
988
989
                    ret = wolfSSL_sk_ASN1_OBJECT_push(sk, obj) > 0
990
                            ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
991
                    if (ret != WOLFSSL_SUCCESS) {
992
                        WOLFSSL_MSG("Error pushing ASN1 object onto stack");
993
                        wolfSSL_ASN1_OBJECT_free(obj);
994
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
995
                        wolfSSL_X509_EXTENSION_free(ext);
996
                        FreeDecodedCert(cert);
997
                        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
998
                        return NULL;
999
                    }
1000
                }
1001
1002
                /* Add OCSP object to stack */
1003
                if (x509->authInfo != NULL &&
1004
                    x509->authInfoSz > 0)
1005
                {
1006
                    WOLFSSL_ASN1_OBJECT* obj;
1007
                    obj = wolfSSL_ASN1_OBJECT_new();
1008
                    if (obj == NULL) {
1009
                        WOLFSSL_MSG("Error creating ASN1 object");
1010
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
1011
                        wolfSSL_X509_EXTENSION_free(ext);
1012
                        FreeDecodedCert(cert);
1013
                        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1014
                        return NULL;
1015
                    }
1016
                    obj->obj = x509->authInfo;
1017
                    obj->objSz = (unsigned int)x509->authInfoSz;
1018
                    obj->grp = oidCertAuthInfoType;
1019
                    obj->nid = WC_NID_ad_OCSP;
1020
1021
                    ret = wolfSSL_sk_ASN1_OBJECT_push(sk, obj) > 0
1022
                            ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
1023
                    if (ret != WOLFSSL_SUCCESS) {
1024
                        WOLFSSL_MSG("Error pushing ASN1 object onto stack");
1025
                        wolfSSL_ASN1_OBJECT_free(obj);
1026
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
1027
                        wolfSSL_X509_EXTENSION_free(ext);
1028
                        FreeDecodedCert(cert);
1029
                        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1030
                        return NULL;
1031
                    }
1032
                }
1033
                ext->ext_sk = sk;
1034
                break;
1035
            }
1036
1037
            case ALT_NAMES_OID:
1038
                if (!isSet)
1039
                    break;
1040
                if (!wolfssl_x509_alt_names_to_gn(x509, ext)) {
1041
                    wolfSSL_X509_EXTENSION_free(ext);
1042
                    FreeDecodedCert(cert);
1043
                    WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1044
                    return NULL;
1045
                }
1046
                break;
1047
        }
1048
1049
        /* The ASN1_OBJECT in the extension is set in the same way
1050
         * for recognized and for unrecognized extension types, as
1051
         * the full OCTET STRING */
1052
1053
        /* Get OID from input */
1054
        if (GetASNObjectId(input, &idx, &length, (word32)sz) != 0) {
1055
            WOLFSSL_MSG("Failed to Get ASN Object Id");
1056
            wolfSSL_X509_EXTENSION_free(ext);
1057
            FreeDecodedCert(cert);
1058
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1059
            return NULL;
1060
        }
1061
        oidBuf = (byte*)XMALLOC(length+1+MAX_LENGTH_SZ, NULL,
1062
                            DYNAMIC_TYPE_TMP_BUFFER);
1063
        if (oidBuf == NULL) {
1064
            WOLFSSL_MSG("Failed to malloc tmp buffer");
1065
            wolfSSL_X509_EXTENSION_free(ext);
1066
            FreeDecodedCert(cert);
1067
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1068
            return NULL;
1069
        }
1070
        oidBuf[0] = ASN_OBJECT_ID;
1071
        objSz++;
1072
        objSz += SetLength(length, oidBuf + 1);
1073
        objSz += length;
1074
1075
        /* Set object size and reallocate space in object buffer */
1076
        if (ext->obj == NULL) {
1077
            ext->obj = wolfSSL_ASN1_OBJECT_new();
1078
            if (ext->obj == NULL) {
1079
                XFREE(oidBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1080
                wolfSSL_X509_EXTENSION_free(ext);
1081
                FreeDecodedCert(cert);
1082
                WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1083
                return NULL;
1084
            }
1085
        }
1086
1087
        if (((ext->obj->dynamic & WOLFSSL_ASN1_DYNAMIC_DATA) != 0) ||
1088
            (ext->obj->obj == NULL)) {
1089
            byte* tmp;
1090
        #ifdef WOLFSSL_NO_REALLOC
1091
            tmp = (byte*)XMALLOC(objSz, NULL, DYNAMIC_TYPE_ASN1);
1092
            if (tmp != NULL && ext->obj->obj != NULL) {
1093
                XMEMCPY(tmp, ext->obj->obj, ext->obj->objSz);
1094
                XFREE((byte*)ext->obj->obj, NULL, DYNAMIC_TYPE_ASN1);
1095
            }
1096
            else if (tmp == NULL) {
1097
                XFREE((byte*)ext->obj->obj, NULL, DYNAMIC_TYPE_ASN1);
1098
            }
1099
            ext->obj->obj = tmp;
1100
        #else
1101
            tmp = (byte*)XREALLOC((byte*)ext->obj->obj, objSz, NULL,
1102
                                  DYNAMIC_TYPE_ASN1);
1103
            if (tmp == NULL)
1104
                XFREE((byte*)ext->obj->obj, NULL, DYNAMIC_TYPE_ASN1);
1105
            ext->obj->obj = tmp;
1106
        #endif
1107
            if (ext->obj->obj == NULL) {
1108
                wolfSSL_X509_EXTENSION_free(ext);
1109
                FreeDecodedCert(cert);
1110
                XFREE(oidBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1111
                WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1112
                return NULL;
1113
            }
1114
            ext->obj->dynamic |= WOLFSSL_ASN1_DYNAMIC_DATA;
1115
        }
1116
        else {
1117
            ext->obj->dynamic &= ~WOLFSSL_ASN1_DYNAMIC_DATA;
1118
        }
1119
        ext->obj->objSz = (unsigned int)objSz;
1120
1121
        /* Get OID from input and copy to ASN1_OBJECT buffer */
1122
        XMEMCPY(oidBuf+2, input+idx, length);
1123
        XMEMCPY((byte*)ext->obj->obj, oidBuf, ext->obj->objSz);
1124
        XFREE(oidBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1125
        oidBuf = NULL;
1126
        ext->obj->grp = oidCertExtType;
1127
        ext->crit = 0;
1128
1129
        tmpIdx = idx + length;
1130
1131
        /* Get CRITICAL. If not present, defaults to false.
1132
         * It present, must be a valid TRUE */
1133
        if ((tmpIdx < (word32)sz) &&
1134
            (input[tmpIdx] == ASN_BOOLEAN))
1135
        {
1136
            if (((tmpIdx + 2) >= (word32)sz) ||
1137
                /* Check bool length */
1138
                (input[tmpIdx+1] != 1) ||
1139
                /* Assert true if CRITICAL present */
1140
                (input[tmpIdx+2] != 0xff))
1141
            {
1142
                WOLFSSL_MSG("Error decoding unknown extension data");
1143
                wolfSSL_ASN1_OBJECT_free(ext->obj);
1144
                wolfSSL_X509_EXTENSION_free(ext);
1145
                FreeDecodedCert(cert);
1146
                WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1147
                return NULL;
1148
            }
1149
1150
            ext->crit = 1;
1151
            tmpIdx += 3;
1152
        }
1153
1154
        /* Get extension data and copy as ASN1_STRING */
1155
        if ((tmpIdx >= (word32)sz) ||
1156
            (input[tmpIdx] != ASN_OCTET_STRING))
1157
        {
1158
            WOLFSSL_MSG("Error decoding unknown extension data");
1159
            wolfSSL_ASN1_OBJECT_free(ext->obj);
1160
            wolfSSL_X509_EXTENSION_free(ext);
1161
            FreeDecodedCert(cert);
1162
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1163
            return NULL;
1164
        }
1165
1166
        tmpIdx++;
1167
1168
        if (GetLength(input, &tmpIdx, &length, (word32)sz) <= 0) {
1169
            WOLFSSL_MSG("Error: Invalid Input Length.");
1170
            wolfSSL_ASN1_OBJECT_free(ext->obj);
1171
            wolfSSL_X509_EXTENSION_free(ext);
1172
            FreeDecodedCert(cert);
1173
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1174
            return NULL;
1175
        }
1176
        ext->value.data = (char*)XMALLOC(length, NULL,
1177
            DYNAMIC_TYPE_ASN1);
1178
        ext->value.isDynamic = 1;
1179
        if (ext->value.data == NULL) {
1180
            WOLFSSL_MSG("Failed to malloc ASN1_STRING data");
1181
            wolfSSL_X509_EXTENSION_free(ext);
1182
            FreeDecodedCert(cert);
1183
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1184
            return NULL;
1185
        }
1186
        XMEMCPY(ext->value.data,input+tmpIdx,length);
1187
        ext->value.length = length;
1188
1189
        break; /* Got the Extension. Now exit while loop. */
1190
1191
    } /* while(idx < sz) */
1192
1193
    /* Store the new extension in a stack inside x509
1194
     * The extensions on the stack are free'd internally when FreeX509 is called
1195
     */
1196
    if (x509->ext_sk == NULL)
1197
        x509->ext_sk = wolfSSL_sk_new_x509_ext();
1198
    if (wolfSSL_sk_insert(x509->ext_sk, ext, -1) <= 0) {
1199
        wolfSSL_X509_EXTENSION_free(ext);
1200
        ext = NULL;
1201
    }
1202
1203
    FreeDecodedCert(cert);
1204
    WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1205
    return ext;
1206
}
1207
1208
/**
1209
 * @param str String to copy
1210
 * @param buf Output buffer. If this contains a pointer then it is free'd
1211
 *            with the DYNAMIC_TYPE_X509_EXT hint.
1212
 * @param len Output length
1213
 * @return WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on error
1214
 */
1215
static int asn1_string_copy_to_buffer(WOLFSSL_ASN1_STRING* str, byte** buf,
1216
        word32* len, void* heap)
1217
{
1218
    if (str->data && str->length > 0) {
1219
        if (*buf)
1220
            XFREE(*buf, heap, DYNAMIC_TYPE_X509_EXT);
1221
        *len = 0;
1222
        *buf = (byte*)XMALLOC(str->length, heap, DYNAMIC_TYPE_X509_EXT);
1223
        if (!*buf) {
1224
            WOLFSSL_MSG("malloc error");
1225
            return WOLFSSL_FAILURE;
1226
        }
1227
        *len = (word32)str->length;
1228
        XMEMCPY(*buf, str->data, str->length);
1229
    }
1230
1231
    (void)heap;
1232
    return WOLFSSL_SUCCESS;
1233
}
1234
1235
int wolfSSL_X509_add_ext(WOLFSSL_X509 *x509, WOLFSSL_X509_EXTENSION *ext,
1236
    int loc)
1237
{
1238
    int nid;
1239
1240
    WOLFSSL_ENTER("wolfSSL_X509_add_ext");
1241
1242
    if (!x509 || !ext || loc >= 0) {
1243
        WOLFSSL_MSG("Bad parameter");
1244
        return WOLFSSL_FAILURE;
1245
    }
1246
    nid = (ext->obj != NULL) ? ext->obj->type : ext->value.nid;
1247
1248
    switch (nid) {
1249
    case WC_NID_authority_key_identifier:
1250
        if (x509->authKeyIdSrc != NULL) {
1251
            /* If authKeyId points into authKeyIdSrc then free it and
1252
             * revert to old functionality */
1253
            XFREE(x509->authKeyIdSrc, x509->heap, DYNAMIC_TYPE_X509_EXT);
1254
            x509->authKeyIdSrc = NULL;
1255
            x509->authKeyId = NULL;
1256
        }
1257
        if (asn1_string_copy_to_buffer(&ext->value, &x509->authKeyId,
1258
                &x509->authKeyIdSz, x509->heap) != WOLFSSL_SUCCESS) {
1259
            WOLFSSL_MSG("asn1_string_copy_to_buffer error");
1260
            return WOLFSSL_FAILURE;
1261
        }
1262
        x509->authKeyIdCrit = (byte)ext->crit;
1263
        break;
1264
    case WC_NID_subject_key_identifier:
1265
        if (asn1_string_copy_to_buffer(&ext->value, &x509->subjKeyId,
1266
                &x509->subjKeyIdSz, x509->heap) != WOLFSSL_SUCCESS) {
1267
            WOLFSSL_MSG("asn1_string_copy_to_buffer error");
1268
            return WOLFSSL_FAILURE;
1269
        }
1270
        x509->subjKeyIdCrit = (byte)ext->crit;
1271
        break;
1272
    case WC_NID_subject_alt_name:
1273
    {
1274
        WOLFSSL_GENERAL_NAMES* gns = ext->ext_sk;
1275
        while (gns) {
1276
            WOLFSSL_GENERAL_NAME* gn = gns->data.gn;
1277
            if ((gn != NULL) && (gn->type == ASN_OTHER_TYPE)) {
1278
                char *buf = NULL;
1279
                int ret = 0;
1280
                word32 len = 0;
1281
1282
                len = SetOthername(gn->d.otherName, NULL);
1283
                if (len == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
1284
                    return WOLFSSL_FAILURE;
1285
                }
1286
1287
                buf = (char*)XMALLOC(len, x509->heap, DYNAMIC_TYPE_X509_EXT);
1288
                if (buf == NULL) {
1289
                    WOLFSSL_MSG("Couldn't allocate memory for othername");
1290
                    return WOLFSSL_FAILURE;
1291
                }
1292
1293
                /* SetOthername() cannot fail; already passed above. */
1294
                SetOthername(gn->d.otherName, (byte*)buf);
1295
1296
                ret = wolfSSL_X509_add_altname_ex(x509, buf, len,
1297
                                                  ASN_OTHER_TYPE);
1298
                XFREE(buf, x509->heap, DYNAMIC_TYPE_X509_EXT);
1299
                if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
1300
                     WOLFSSL_MSG("wolfSSL_X509_add_altname_ex() failed");
1301
                     return WOLFSSL_FAILURE;
1302
                }
1303
            }
1304
            else if (!gn || !gn->d.ia5 ||
1305
                wolfSSL_X509_add_altname_ex(x509, gn->d.ia5->data,
1306
                    gn->d.ia5->length, gn->type) != WOLFSSL_SUCCESS) {
1307
                WOLFSSL_MSG("Subject alternative name missing extension");
1308
                return WOLFSSL_FAILURE;
1309
            }
1310
            gns = gns->next;
1311
        }
1312
        x509->subjAltNameSet = 1;
1313
        x509->subjAltNameCrit = (byte)ext->crit;
1314
        break;
1315
    }
1316
    case WC_NID_key_usage:
1317
        if (ext && ext->value.data) {
1318
            if (ext->value.length == sizeof(word16)) {
1319
                /* if ext->value is already word16, set directly */
1320
                x509->keyUsage = *(word16*)ext->value.data;
1321
#ifdef BIG_ENDIAN_ORDER
1322
                x509->keyUsage = rotlFixed16(x509->keyUsage, 8U);
1323
#endif
1324
                x509->keyUsageCrit = (byte)ext->crit;
1325
                x509->keyUsageSet = 1;
1326
            }
1327
            else if (ext->value.length > 0) {
1328
                /* ext->value is comma-delimited string, convert to word16 */
1329
                if (ParseKeyUsageStr(ext->value.data, &x509->keyUsage,
1330
                                     x509->heap) != 0) {
1331
                    return WOLFSSL_FAILURE;
1332
                }
1333
                x509->keyUsageCrit = (byte)ext->crit;
1334
                x509->keyUsageSet = 1;
1335
            }
1336
            else {
1337
                return WOLFSSL_FAILURE;
1338
            }
1339
        }
1340
        break;
1341
    case WC_NID_ext_key_usage:
1342
        if (ext && ext->value.data) {
1343
            if (ext->value.length == sizeof(byte)) {
1344
                /* if ext->value is already 1 byte, set directly */
1345
                x509->extKeyUsage = *(byte*)ext->value.data;
1346
                x509->extKeyUsageCrit = (byte)ext->crit;
1347
            }
1348
            else if (ext->value.length > 0) {
1349
                /* ext->value is comma-delimited string, convert to word16 */
1350
                if (ParseExtKeyUsageStr(ext->value.data, &x509->extKeyUsage,
1351
                                        x509->heap) != 0) {
1352
                    return WOLFSSL_FAILURE;
1353
                }
1354
                x509->extKeyUsageCrit = (byte)ext->crit;
1355
            }
1356
            else {
1357
                return WOLFSSL_FAILURE;
1358
            }
1359
        }
1360
        break;
1361
    case WC_NID_basic_constraints:
1362
        if (ext->obj) {
1363
            x509->isCa = (byte)ext->obj->ca;
1364
            x509->basicConstCrit = (byte)ext->crit;
1365
            if (ext->obj->pathlen) {
1366
                x509->pathLength = (word32)ext->obj->pathlen->length;
1367
                x509->basicConstPlSet = 1;
1368
                x509->pathLengthSet = 1;
1369
            }
1370
            x509->basicConstSet = 1;
1371
        }
1372
        break;
1373
    default:
1374
#ifdef WOLFSSL_CUSTOM_OID
1375
    {
1376
        char *oid = NULL;
1377
        byte *val = NULL;
1378
        int err = 0;
1379
1380
        if ((ext->obj == NULL) || (ext->value.length == 0)) {
1381
            WOLFSSL_MSG("Extension has insufficient information.");
1382
            return WOLFSSL_FAILURE;
1383
        }
1384
1385
        if ((x509->customExtCount < 0) ||
1386
            (x509->customExtCount >= NUM_CUSTOM_EXT)) {
1387
            WOLFSSL_MSG("Bad value for customExtCount.");
1388
            return WOLFSSL_FAILURE;
1389
        }
1390
1391
        /* This is a viable custom extension. */
1392
        oid = (char*)XMALLOC(MAX_OID_STRING_SZ, x509->heap,
1393
            DYNAMIC_TYPE_X509_EXT);
1394
        val = (byte*)XMALLOC(ext->value.length, x509->heap,
1395
            DYNAMIC_TYPE_X509_EXT);
1396
        if ((oid == NULL) || (val == NULL)) {
1397
            WOLFSSL_MSG("Memory allocation failure.\n");
1398
            err = 1;
1399
        }
1400
1401
        if (err == 0) {
1402
            XMEMCPY(val, ext->value.data, ext->value.length);
1403
            if (wolfSSL_OBJ_obj2txt(oid, MAX_OID_STRING_SZ, ext->obj, 1) < 0) {
1404
                err = 1;
1405
            }
1406
        }
1407
1408
        if (err == 1) {
1409
            XFREE(val, x509->heap, DYNAMIC_TYPE_X509_EXT);
1410
            XFREE(oid, x509->heap, DYNAMIC_TYPE_X509_EXT);
1411
            return WOLFSSL_FAILURE;
1412
        }
1413
1414
        /* ext->crit is WOLFSSL_ASN1_BOOLEAN */
1415
        if (ext->crit != 0 && ext->crit != -1) {
1416
            XFREE(val, x509->heap, DYNAMIC_TYPE_X509_EXT);
1417
            XFREE(oid, x509->heap, DYNAMIC_TYPE_X509_EXT);
1418
            return WOLFSSL_FAILURE;
1419
        }
1420
1421
        /* x509->custom_exts now owns the buffers and they must be managed. */
1422
        x509->custom_exts[x509->customExtCount].oid = oid;
1423
        x509->custom_exts[x509->customExtCount].crit = (byte)ext->crit;
1424
        x509->custom_exts[x509->customExtCount].val = val;
1425
        x509->custom_exts[x509->customExtCount].valSz = ext->value.length;
1426
        x509->customExtCount++;
1427
        break;
1428
    }
1429
#else
1430
        WOLFSSL_MSG("Unsupported extension to add");
1431
        return WOLFSSL_FAILURE;
1432
#endif /* WOLFSSL_CUSTOM_OID */
1433
    } /* switch (nid) */
1434
1435
    return WOLFSSL_SUCCESS;
1436
}
1437
1438
/* Returns pointer to ASN1_STRING in X509_EXTENSION object */
1439
static WOLFSSL_ASN1_STRING* wolfSSL_X509_EXTENSION_get_data_internal(
1440
    WOLFSSL_X509_EXTENSION* ext)
1441
{
1442
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_get_data_internal");
1443
    if (ext == NULL)
1444
        return NULL;
1445
1446
    return &ext->value;
1447
}
1448
1449
1450
#ifndef NO_BIO
1451
1452
#ifndef MAX_INDENT
1453
    #define MAX_INDENT 40
1454
#endif
1455
1456
1457
/* Return 0 on success and 1 on failure. Copies ext data to bio, using indent
1458
 *  to pad the output. flag is ignored. */
1459
int wolfSSL_X509V3_EXT_print(WOLFSSL_BIO *out, WOLFSSL_X509_EXTENSION *ext,
1460
        unsigned long flag, int indent)
1461
{
1462
    WOLFSSL_ASN1_OBJECT* obj;
1463
    WOLFSSL_ASN1_STRING* str;
1464
    int nid;
1465
    int rc = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
1466
    char tmp[CTC_NAME_SIZE*2 + 1];
1467
    const int tmpSz = sizeof(tmp);
1468
    int tmpLen = 0;
1469
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_print");
1470
1471
    if (indent < 0) indent = 0;
1472
    if (indent > MAX_INDENT) indent = MAX_INDENT;
1473
1474
    if ((out == NULL) || (ext == NULL)) {
1475
        WOLFSSL_MSG("NULL parameter error");
1476
        return rc;
1477
    }
1478
1479
    obj = wolfSSL_X509_EXTENSION_get_object(ext);
1480
    if (obj == NULL) {
1481
        WOLFSSL_MSG("Error getting ASN1_OBJECT from X509_EXTENSION");
1482
        return rc;
1483
    }
1484
1485
    str = wolfSSL_X509_EXTENSION_get_data_internal(ext);
1486
    if (str == NULL) {
1487
        WOLFSSL_MSG("Error getting ASN1_STRING from X509_EXTENSION");
1488
        return rc;
1489
    }
1490
1491
    /* Print extension based on the type */
1492
    nid = wolfSSL_OBJ_obj2nid(obj);
1493
    switch (nid) {
1494
        case BASIC_CA_OID:
1495
        {
1496
            char isCa[] = "TRUE";
1497
            char notCa[] = "FALSE";
1498
            if ((tmpLen = XSNPRINTF(tmp, tmpSz, "%*sCA:%s", indent, "",
1499
                                     obj->ca ? isCa : notCa))
1500
                >= tmpSz)
1501
                return rc;
1502
            break;
1503
        }
1504
        case ALT_NAMES_OID:
1505
        {
1506
            WOLFSSL_STACK* sk;
1507
            char* val;
1508
            int valLen;
1509
            int len;
1510
1511
            sk = ext->ext_sk;
1512
            while (sk != NULL) {
1513
                if (sk->type == STACK_TYPE_GEN_NAME && sk->data.gn) {
1514
                    /* str is GENERAL_NAME for subject alternative name ext */
1515
                    str = sk->data.gn->d.ia5;
1516
                    len = str->length + 2; /* + 2 for NULL char and "," */
1517
                    if (len > tmpSz) {
1518
                        WOLFSSL_MSG("len greater than buffer size");
1519
                        return rc;
1520
                    }
1521
1522
                    val = (char*)XMALLOC(len + indent, NULL,
1523
                                                       DYNAMIC_TYPE_TMP_BUFFER);
1524
                    if (val == NULL) {
1525
                        WOLFSSL_MSG("Memory error");
1526
                        return rc;
1527
                    }
1528
                    valLen = XSNPRINTF(val, (size_t)len, "%*s%s", indent, "",
1529
                            str->strData);
1530
                    if ((valLen < 0) || (valLen >= len)
1531
                            || ((tmpLen + valLen) >= tmpSz)) {
1532
                        XFREE(val, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1533
                        return rc;
1534
                    }
1535
                    XMEMCPY(tmp + tmpLen, val, valLen);
1536
                    tmpLen += valLen;
1537
                    XFREE(val, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1538
                }
1539
                sk = sk->next;
1540
            }
1541
            break;
1542
        }
1543
        case AUTH_KEY_OID:
1544
        case SUBJ_KEY_OID:
1545
        {
1546
            char* asn1str;
1547
            asn1str = wolfSSL_i2s_ASN1_STRING(NULL, str);
1548
            tmpLen = XSNPRINTF(tmp, tmpSz, "%*s%s", indent, "", asn1str);
1549
            XFREE(asn1str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1550
            if (tmpLen >= tmpSz)
1551
                tmpLen = tmpSz - 1;
1552
            break;
1553
        }
1554
        case AUTH_INFO_OID:
1555
        case CERT_POLICY_OID:
1556
        case CRL_DIST_OID:
1557
        case KEY_USAGE_OID:
1558
            WOLFSSL_MSG("X509V3_EXT_print not yet implemented for ext type");
1559
            break;
1560
1561
        default:
1562
            if ((tmpLen = XSNPRINTF(
1563
                     tmp, tmpSz, "%*s%s", indent, "", str->strData))
1564
                >= tmpSz)
1565
                return rc;
1566
    }
1567
1568
    if (wolfSSL_BIO_write(out, tmp, tmpLen) == tmpLen) {
1569
        rc = WOLFSSL_SUCCESS;
1570
    }
1571
    (void) flag;
1572
1573
    return rc;
1574
}
1575
#endif /* !NO_BIO */
1576
1577
#ifndef NO_WOLFSSL_STUB
1578
int wolfSSL_X509V3_EXT_add_nconf(WOLFSSL_CONF *conf, WOLFSSL_X509V3_CTX *ctx,
1579
        const char *section, WOLFSSL_X509 *cert)
1580
{
1581
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_add_nconf");
1582
    WOLFSSL_STUB("wolfSSL_X509V3_EXT_add_nconf");
1583
    (void)conf;
1584
    (void)ctx;
1585
    (void)section;
1586
    (void)cert;
1587
    return WOLFSSL_SUCCESS;
1588
}
1589
#endif
1590
1591
/* Find extension by NID in a stack of extensions.
1592
 *
1593
 * @param sk Stack of extensions
1594
 * @param nid ID to search for
1595
 * @param lastpos Start search from this position (not inclusive, -1 means start from beginning)
1596
 * @return Index of matching extension or -1 on error/not found
1597
 */
1598
int wolfSSL_X509v3_get_ext_by_NID(const WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk,
1599
                                 int nid, int lastpos)
1600
{
1601
    int i;
1602
    WOLFSSL_ENTER("wolfSSL_X509v3_get_ext_by_NID");
1603
1604
    if (sk == NULL) {
1605
        WOLFSSL_MSG("Stack pointer is NULL");
1606
        return WOLFSSL_FATAL_ERROR;
1607
    }
1608
1609
    if (lastpos < -1 || lastpos >= wolfSSL_sk_num(sk)) {
1610
        WOLFSSL_MSG("Invalid position argument");
1611
        return WOLFSSL_FATAL_ERROR;
1612
    }
1613
1614
    for (i = lastpos + 1; i < wolfSSL_sk_num(sk); i++) {
1615
        WOLFSSL_X509_EXTENSION* ext = wolfSSL_sk_X509_EXTENSION_value(sk, i);
1616
        if (ext && ext->obj) {
1617
            if (wolfSSL_OBJ_obj2nid(ext->obj) == nid)
1618
                return i;
1619
        }
1620
    }
1621
1622
    /* Not found */
1623
    return -1;
1624
}
1625
1626
/* Get extension from a stack of extensions by location.
1627
 *
1628
 * @param sk Stack of extensions
1629
 * @param loc Index of extension to retrieve
1630
 * @return Pointer to extension or NULL on error
1631
 */
1632
WOLFSSL_X509_EXTENSION* wolfSSL_X509v3_get_ext(
1633
    const WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk, int loc)
1634
{
1635
    WOLFSSL_ENTER("wolfSSL_X509v3_get_ext");
1636
1637
    if (sk == NULL) {
1638
        WOLFSSL_MSG("Stack pointer is NULL");
1639
        return NULL;
1640
    }
1641
1642
    if (loc < 0 || loc >= wolfSSL_sk_num(sk)) {
1643
        WOLFSSL_MSG("Invalid location argument");
1644
        return NULL;
1645
    }
1646
1647
    return wolfSSL_sk_X509_EXTENSION_value(sk, loc);
1648
}
1649
1650
/* Returns crit flag in X509_EXTENSION object */
1651
int wolfSSL_X509_EXTENSION_get_critical(const WOLFSSL_X509_EXTENSION* ex)
1652
{
1653
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_get_critical");
1654
    if (ex == NULL)
1655
        return BAD_FUNC_ARG;
1656
    return ex->crit;
1657
}
1658
1659
/* Sets if the extension is critical
1660
 * returns WOLFSSL_SUCCESS on success
1661
 */
1662
int wolfSSL_X509_EXTENSION_set_critical(WOLFSSL_X509_EXTENSION* ex, int crit)
1663
{
1664
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_set_critical");
1665
    if (ex == NULL)
1666
        return WOLFSSL_FAILURE;
1667
    ex->crit = crit;
1668
    return WOLFSSL_SUCCESS;
1669
}
1670
1671
/* Creates v3_ext_method for a given X509v3 extension
1672
 *
1673
 * ex   : The X509_EXTENSION used to create v3_ext_method. If the extension is
1674
 * not NULL, get the NID of the extension object and populate the
1675
 * extension type-specific X509V3_EXT_* function(s) in v3_ext_method.
1676
 *
1677
 * Returns NULL on error or pointer to the v3_ext_method populated with
1678
 * extension type-specific X509V3_EXT_* function(s).
1679
 *
1680
 * NOTE: WC_NID_subject_key_identifier is currently the only extension
1681
 * implementing the X509V3_EXT_* functions, as it is the only type called
1682
 * directly by QT. The other extension types return a pointer to a
1683
 * v3_ext_method struct that contains only the NID.
1684
 */
1685
#if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L
1686
const WOLFSSL_v3_ext_method* wolfSSL_X509V3_EXT_get(WOLFSSL_X509_EXTENSION* ex)
1687
#else
1688
WOLFSSL_v3_ext_method* wolfSSL_X509V3_EXT_get(WOLFSSL_X509_EXTENSION* ex)
1689
#endif
1690
{
1691
    int nid;
1692
    WOLFSSL_v3_ext_method method;
1693
1694
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_get");
1695
    if ((ex == NULL) || (ex->obj == NULL)) {
1696
        WOLFSSL_MSG("Passed an invalid X509_EXTENSION*");
1697
        return NULL;
1698
    }
1699
    /* Initialize method to 0 */
1700
    XMEMSET(&method, 0, sizeof(struct WOLFSSL_v3_ext_method));
1701
1702
    nid = ex->obj->nid;
1703
    if (nid <= 0) {
1704
        WOLFSSL_MSG("Failed to get nid from passed extension object");
1705
        return NULL;
1706
    }
1707
    switch (nid) {
1708
        case WC_NID_basic_constraints:
1709
            break;
1710
        case WC_NID_subject_key_identifier:
1711
            method.i2s = (WOLFSSL_X509V3_EXT_I2S)wolfSSL_i2s_ASN1_STRING;
1712
            break;
1713
        case WC_NID_subject_alt_name:
1714
            WOLFSSL_MSG("i2v function not yet implemented for Subject "
1715
                        "Alternative Name");
1716
            break;
1717
        case WC_NID_key_usage:
1718
            WOLFSSL_MSG("i2v function not yet implemented for Key Usage");
1719
            break;
1720
        case WC_NID_authority_key_identifier:
1721
            WOLFSSL_MSG("i2v function not yet implemented for Auth Key Id");
1722
            break;
1723
        case WC_NID_info_access:
1724
            WOLFSSL_MSG("i2v function not yet implemented for Info Access");
1725
            break;
1726
        case WC_NID_ext_key_usage:
1727
            WOLFSSL_MSG("i2v function not yet implemented for Ext Key Usage");
1728
            break;
1729
        case WC_NID_certificate_policies:
1730
            WOLFSSL_MSG("r2i function not yet implemented for Cert Policies");
1731
            break;
1732
        case WC_NID_crl_distribution_points:
1733
            WOLFSSL_MSG("r2i function not yet implemented for CRL Dist Points");
1734
            break;
1735
        default:
1736
            /* If extension type is unknown, return NULL -- QT makes call to
1737
                X509_EXTENSION_get_data() if there is no v3_ext_method */
1738
            WOLFSSL_MSG("X509V3_EXT_get(): Unknown extension type found");
1739
            return NULL;
1740
    }
1741
1742
    method.ext_nid = nid;
1743
    ex->ext_method = method;
1744
1745
#if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L
1746
    return (const WOLFSSL_v3_ext_method*)&ex->ext_method;
1747
#else
1748
    return (WOLFSSL_v3_ext_method*)&ex->ext_method;
1749
#endif
1750
}
1751
1752
/* Create an Authority Info Access (AIA) from the contents of the extension.
1753
 *
1754
 * AIA is a stack of Access Descriptions.
1755
 *
1756
 * RFC 5280: 4.2.2.1
1757
 *
1758
 * @param [in] ext  X509v3 extension.
1759
 * @return  Stack of Access Descriptions as an AIA on success.
1760
 * @return  NULL on error.
1761
 */
1762
static WOLFSSL_AUTHORITY_INFO_ACCESS* wolfssl_x509v3_ext_aia_d2i(
1763
    WOLFSSL_X509_EXTENSION* ext)
1764
{
1765
    int err = 0;
1766
    int ret;
1767
    WOLFSSL_AUTHORITY_INFO_ACCESS* aia = NULL;
1768
    WOLFSSL_STACK* sk;
1769
    WOLFSSL_ACCESS_DESCRIPTION* ad = NULL;
1770
1771
    /* Get the type specific data of this extension. */
1772
    sk = ext->ext_sk;
1773
    if (sk == NULL) {
1774
        WOLFSSL_MSG("ACCESS_DESCRIPTION stack NULL");
1775
        err = 1;
1776
    }
1777
1778
    if (!err) {
1779
        /* AUTHORITY_INFO_ACCESS is a stack of ACCESS_DESCRIPTION entries. */
1780
        aia = wolfSSL_sk_new_null();
1781
        if (aia == NULL) {
1782
            WOLFSSL_MSG("Failed to malloc AUTHORITY_INFO_ACCESS");
1783
            err = 1;
1784
        }
1785
    }
1786
    if (!err) {
1787
        /* AIA is a stack of Access Descriptions. */
1788
        aia->type = STACK_TYPE_ACCESS_DESCRIPTION;
1789
    }
1790
1791
    while ((!err) && (sk != NULL)) {
1792
        WOLFSSL_ASN1_OBJECT* aiaEntry;
1793
1794
        /* Looking for objects in extension's data. */
1795
        if (sk->type != STACK_TYPE_OBJ) {
1796
            sk = sk->next;
1797
            continue;
1798
        }
1799
1800
        /* Get ASN.1 Object from the stack entry's data. */
1801
        aiaEntry = sk->data.obj;
1802
1803
        /* ACCESS_DESCRIPTION has two members: method and location.
1804
         *  method: ASN1_OBJECT as either AIA_OCSP_OID or AIA_CA_ISSUER_OID
1805
         *  location: GENERAL_NAME structure containing the URI.
1806
         */
1807
1808
        /* Allocate a new Access Description. */
1809
        ad = (WOLFSSL_ACCESS_DESCRIPTION*)XMALLOC(
1810
            sizeof(WOLFSSL_ACCESS_DESCRIPTION), NULL, DYNAMIC_TYPE_X509_EXT);
1811
        if (ad == NULL) {
1812
            WOLFSSL_MSG("Failed to malloc ACCESS_DESCRIPTION");
1813
            err = 1;
1814
            break;
1815
        }
1816
        XMEMSET(ad, 0, sizeof(WOLFSSL_ACCESS_DESCRIPTION));
1817
1818
        /* Create new ASN1_OBJECT from NID. */
1819
        ad->method = wolfSSL_OBJ_nid2obj(aiaEntry->nid);
1820
        if (ad->method == NULL) {
1821
            WOLFSSL_MSG("OBJ_nid2obj() failed");
1822
            err = 1;
1823
            break;
1824
        }
1825
1826
        /* Allocate memory for GENERAL NAME. */
1827
        ad->location = wolfSSL_GENERAL_NAME_new();
1828
        if (ad->location == NULL) {
1829
            WOLFSSL_MSG("Failed to malloc GENERAL_NAME");
1830
            err = 1;
1831
            break;
1832
        }
1833
1834
        /* Set the type of general name to URI (only type supported). */
1835
        ret = wolfSSL_GENERAL_NAME_set_type(ad->location, WOLFSSL_GEN_URI);
1836
        if (ret != WOLFSSL_SUCCESS) {
1837
            err = 1;
1838
            break;
1839
        }
1840
1841
        /* Set the URI into GENERAL_NAME. */
1842
        ret = wolfSSL_ASN1_STRING_set(ad->location->d.uniformResourceIdentifier,
1843
            aiaEntry->obj, aiaEntry->objSz);
1844
        if (ret != WOLFSSL_SUCCESS) {
1845
            WOLFSSL_MSG("ASN1_STRING_set() failed");
1846
            err = 1;
1847
            break;
1848
        }
1849
        /* Push onto AUTHORITY_INFO_ACCESS stack. */
1850
        ret = wolfSSL_sk_ACCESS_DESCRIPTION_push(aia, ad) > 0
1851
                ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
1852
        if (ret != WOLFSSL_SUCCESS) {
1853
            WOLFSSL_MSG("Error pushing ASN1 AD onto stack");
1854
            err = 1;
1855
            break;
1856
        }
1857
        /* Set to NULL so that it doesn't get freed now it is in AIA stack. */
1858
        ad = NULL;
1859
1860
        sk = sk->next;
1861
    }
1862
1863
    if (err) {
1864
        /* Dispose of Access Description if not put in stack. */
1865
        if (ad != NULL) {
1866
            wolfSSL_ASN1_OBJECT_free(ad->method);
1867
            wolfSSL_GENERAL_NAME_free(ad->location);
1868
            XFREE(ad, NULL, DYNAMIC_TYPE_X509_EXT);
1869
        }
1870
        /* Dispose of incomplete Access Description stack. */
1871
        wolfSSL_sk_ACCESS_DESCRIPTION_pop_free(aia, NULL);
1872
        aia = NULL;
1873
    }
1874
    return aia;
1875
}
1876
1877
/* Parses and returns an x509v3 extension internal structure.
1878
 *
1879
 * ext   : The X509_EXTENSION for parsing internal structure. If extension is
1880
 * not NULL, get the NID of the extension object and create a new
1881
 * extension-specific internal structure based on the extension type.
1882
 *
1883
 * Returns NULL on error or if NID is not found, otherwise returns a pointer to
1884
 * the extension type-specific X509_EXTENSION internal structure.
1885
 * Return is expected to be free'd by caller.
1886
 */
1887
void* wolfSSL_X509V3_EXT_d2i(WOLFSSL_X509_EXTENSION* ext)
1888
{
1889
    const WOLFSSL_v3_ext_method* method;
1890
    int ret;
1891
    WOLFSSL_ASN1_OBJECT* object;
1892
    WOLFSSL_BASIC_CONSTRAINTS* bc;
1893
    WOLFSSL_AUTHORITY_KEYID* akey;
1894
    WOLFSSL_ASN1_STRING* asn1String = NULL, *newString = NULL;
1895
    WOLFSSL_STACK* sk;
1896
    void *data = NULL;
1897
    WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
1898
1899
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_d2i");
1900
1901
    if (ext == NULL) {
1902
        WOLFSSL_MSG("Bad function Argument");
1903
        return NULL;
1904
    }
1905
1906
    object = wolfSSL_X509_EXTENSION_get_object(ext);
1907
    if (object == NULL) {
1908
        WOLFSSL_MSG("X509_EXTENSION_get_object failed");
1909
        return NULL;
1910
    }
1911
    /* extract extension info */
1912
    method = wolfSSL_X509V3_EXT_get(ext);
1913
    if (method == NULL) {
1914
        WOLFSSL_MSG("wolfSSL_X509V3_EXT_get error");
1915
        return NULL;
1916
    }
1917
1918
#ifdef WOLFSSL_SMALL_STACK
1919
    cert = (DecodedCert *)XMALLOC(sizeof(*cert), NULL,
1920
            DYNAMIC_TYPE_X509_EXT);
1921
    if (cert == NULL) {
1922
        WOLFSSL_MSG("\tout of memory");
1923
        return NULL;
1924
    }
1925
#endif
1926
1927
    InitDecodedCert(cert, NULL, 0, NULL);
1928
1929
    if ((object->type != WC_NID_basic_constraints) &&
1930
        (object->type != WC_NID_subject_alt_name) &&
1931
        (object->type != WC_NID_info_access)) {
1932
1933
        asn1String = wolfSSL_X509_EXTENSION_get_data_internal(ext);
1934
        if (asn1String == NULL) {
1935
            WOLFSSL_MSG("X509_EXTENSION_get_data() failed");
1936
            goto out;
1937
        }
1938
1939
        ret = DecodeExtensionType((const byte*)asn1String->data,
1940
                asn1String->length, object->type, (byte)ext->crit, cert, NULL);
1941
        if (ret != 0) {
1942
            WOLFSSL_MSG("DecodeExtensionType() failed");
1943
            goto out;
1944
        }
1945
    }
1946
1947
    /* Return pointer to proper internal structure based on NID */
1948
    switch (object->type) {
1949
        /* basicConstraints */
1950
        case WC_NID_basic_constraints:
1951
            WOLFSSL_MSG("basicConstraints");
1952
            /* Allocate new BASIC_CONSTRAINTS structure */
1953
            bc = wolfSSL_BASIC_CONSTRAINTS_new();
1954
            if (bc == NULL) {
1955
                WOLFSSL_MSG("Failed to malloc basic constraints");
1956
                break;
1957
            }
1958
            /* Copy pathlen and CA into BASIC_CONSTRAINTS from object */
1959
            bc->ca = object->ca;
1960
            if (object->pathlen != NULL && object->pathlen->length > 0) {
1961
                bc->pathlen = wolfSSL_ASN1_INTEGER_dup(object->pathlen);
1962
                if (bc->pathlen == NULL) {
1963
                    WOLFSSL_MSG("Failed to duplicate ASN1_INTEGER");
1964
                    wolfSSL_BASIC_CONSTRAINTS_free(bc);
1965
                    break;
1966
                }
1967
            }
1968
            else
1969
                bc->pathlen = NULL;
1970
1971
            data = bc;
1972
            break;
1973
1974
        /* subjectKeyIdentifier */
1975
        case WC_NID_subject_key_identifier:
1976
        {
1977
            WOLFSSL_MSG("subjectKeyIdentifier");
1978
1979
            newString = wolfSSL_ASN1_STRING_new();
1980
            if (newString == NULL) {
1981
                WOLFSSL_MSG("Failed to malloc ASN1_STRING");
1982
                break;
1983
            }
1984
            ret = wolfSSL_ASN1_STRING_set(newString, cert->extSubjKeyId,
1985
                                          cert->extSubjKeyIdSz);
1986
            if (ret != WOLFSSL_SUCCESS) {
1987
                WOLFSSL_MSG("ASN1_STRING_set() failed");
1988
                wolfSSL_ASN1_STRING_free(newString);
1989
                break;
1990
            };
1991
1992
            newString->type = asn1String->type;
1993
            data = newString;
1994
            break;
1995
        }
1996
1997
        /* authorityKeyIdentifier */
1998
        case WC_NID_authority_key_identifier:
1999
        {
2000
            WOLFSSL_MSG("AuthorityKeyIdentifier");
2001
2002
            akey = (WOLFSSL_AUTHORITY_KEYID*)
2003
                    XMALLOC(sizeof(WOLFSSL_AUTHORITY_KEYID), NULL,
2004
                    DYNAMIC_TYPE_X509_EXT);
2005
            if (akey == NULL) {
2006
                WOLFSSL_MSG("Failed to malloc authority key id");
2007
                break;
2008
            }
2009
2010
            XMEMSET(akey, 0, sizeof(WOLFSSL_AUTHORITY_KEYID));
2011
2012
            akey->keyid = wolfSSL_ASN1_STRING_new();
2013
            if (akey->keyid == NULL) {
2014
                WOLFSSL_MSG("ASN1_STRING_new() failed");
2015
                wolfSSL_AUTHORITY_KEYID_free(akey);
2016
                break;
2017
            }
2018
2019
            ret = wolfSSL_ASN1_STRING_set(akey->keyid, cert->extAuthKeyId,
2020
                                          cert->extAuthKeyIdSz);
2021
            if (ret != WOLFSSL_SUCCESS) {
2022
                WOLFSSL_MSG("ASN1_STRING_set() failed");
2023
                wolfSSL_AUTHORITY_KEYID_free(akey);
2024
                break;
2025
            };
2026
            akey->keyid->type   = asn1String->type;
2027
2028
            /* For now, set issuer and serial to NULL. This may need to be
2029
                updated for future use */
2030
            akey->issuer = NULL;
2031
            akey->serial = NULL;
2032
2033
            data = akey;
2034
            break;
2035
        }
2036
2037
        /* keyUsage */
2038
        case WC_NID_key_usage:
2039
        {
2040
            WOLFSSL_MSG("keyUsage");
2041
2042
            /* This may need to be updated for future use. The i2v method for
2043
                keyUsage is not currently set. For now, return the ASN1_STRING
2044
                representation of KeyUsage bit string */
2045
            newString = wolfSSL_ASN1_STRING_new();
2046
            if (newString == NULL) {
2047
                WOLFSSL_MSG("Failed to malloc ASN1_STRING");
2048
                break;
2049
            }
2050
            ret = wolfSSL_ASN1_STRING_set(newString, (byte*)&cert->extKeyUsage,
2051
                                                                sizeof(word16));
2052
            if (ret != WOLFSSL_SUCCESS) {
2053
                WOLFSSL_MSG("ASN1_STRING_set() failed");
2054
                wolfSSL_ASN1_STRING_free(newString);
2055
                break;
2056
            };
2057
            newString->type = asn1String->type;
2058
            data = newString;
2059
            break;
2060
        }
2061
2062
        /* extKeyUsage */
2063
        case WC_NID_ext_key_usage:
2064
            WOLFSSL_MSG("extKeyUsage not supported yet");
2065
            break;
2066
2067
        /* certificatePolicies */
2068
        case WC_NID_certificate_policies:
2069
            WOLFSSL_MSG("certificatePolicies not supported yet");
2070
            break;
2071
2072
        /* cRLDistributionPoints */
2073
        case WC_NID_crl_distribution_points:
2074
            WOLFSSL_MSG("cRLDistributionPoints not supported yet");
2075
            break;
2076
2077
        case WC_NID_subject_alt_name:
2078
            if (ext->ext_sk == NULL) {
2079
                WOLFSSL_MSG("Subject alt name stack NULL");
2080
                break;
2081
            }
2082
            sk = wolfSSL_sk_dup(ext->ext_sk);
2083
            if (sk == NULL) {
2084
                WOLFSSL_MSG("Failed to duplicate subject alt names stack.");
2085
                break;
2086
            }
2087
            data = sk;
2088
            break;
2089
2090
        /* authorityInfoAccess */
2091
        case WC_NID_info_access:
2092
            WOLFSSL_MSG("AuthorityInfoAccess");
2093
            data = wolfssl_x509v3_ext_aia_d2i(ext);
2094
            break;
2095
2096
        default:
2097
            WOLFSSL_MSG("Extension NID not in table, returning NULL");
2098
            break;
2099
    }
2100
2101
out:
2102
2103
    FreeDecodedCert(cert);
2104
    WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_X509_EXT);
2105
2106
    return data;
2107
}
2108
2109
/* Looks for the extension matching the passed in nid
2110
 *
2111
 * x509 : certificate to get parse through for extension.
2112
 * nid : Extension OID to be found.
2113
 * lastPos : Start search from extension after lastPos.
2114
 *           Set to -1 to search from index 0.
2115
 * return >= 0 If successful the extension index is returned.
2116
 * return WOLFSSL_FATAL_ERROR If extension is not found or error is encountered.
2117
 */
2118
int wolfSSL_X509_get_ext_by_NID(const WOLFSSL_X509* x509, int nid, int lastPos)
2119
{
2120
    int extCount = 0, length = 0, outSz = 0, sz = 0, ret = 0;
2121
    int isSet = 0, found = 0, loc;
2122
    const byte* rawCert;
2123
    const byte* input;
2124
    word32 oid, idx = 0, tmpIdx = 0, foundNID;
2125
    WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
2126
2127
    WOLFSSL_ENTER("wolfSSL_X509_get_ext_by_NID");
2128
2129
    if (x509 == NULL) {
2130
        WOLFSSL_MSG("\tNot passed a certificate");
2131
        return WOLFSSL_FATAL_ERROR;
2132
    }
2133
2134
    if (lastPos < -1 || (lastPos > (wolfSSL_X509_get_ext_count(x509) - 1))) {
2135
        WOLFSSL_MSG("\tBad location argument");
2136
        return WOLFSSL_FATAL_ERROR;
2137
    }
2138
2139
    loc = lastPos + 1;
2140
2141
    rawCert = wolfSSL_X509_get_der((WOLFSSL_X509*)x509, &outSz);
2142
    if (rawCert == NULL) {
2143
        WOLFSSL_MSG("\tX509_get_der() failed");
2144
        return WOLFSSL_FATAL_ERROR;
2145
    }
2146
2147
#ifdef WOLFSSL_SMALL_STACK
2148
    cert = (DecodedCert *)XMALLOC(sizeof(*cert), x509->heap,
2149
                                  DYNAMIC_TYPE_DCERT);
2150
    if (cert == NULL) {
2151
        WOLFSSL_MSG("\tout of memory");
2152
        return WOLFSSL_FATAL_ERROR;
2153
    }
2154
#endif
2155
2156
    InitDecodedCert( cert, rawCert, (word32)outSz, 0);
2157
2158
    if (ParseCert(cert,
2159
#ifdef WOLFSSL_CERT_REQ
2160
            x509->isCSR ? CERTREQ_TYPE :
2161
#endif
2162
            CA_TYPE,
2163
            NO_VERIFY, NULL) < 0) {
2164
        WOLFSSL_MSG("\tCertificate parsing failed");
2165
        goto out;
2166
    }
2167
2168
    input = cert->extensions;
2169
    sz = cert->extensionsSz;
2170
2171
    if (input == NULL || sz == 0) {
2172
        WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
2173
        goto out;
2174
    }
2175
2176
#ifdef WOLFSSL_CERT_REQ
2177
    if (!x509->isCSR)
2178
#endif
2179
    {
2180
        if (input[idx++] != ASN_EXTENSIONS) {
2181
            WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
2182
            goto out;
2183
        }
2184
2185
        if (GetLength(input, &idx, &length, (word32)sz) < 0) {
2186
            WOLFSSL_MSG("\tfail: invalid length");
2187
            goto out;
2188
        }
2189
    }
2190
2191
    if (GetSequence(input, &idx, &length, (word32)sz) < 0) {
2192
        WOLFSSL_MSG("\tfail: should be a SEQUENCE (1)");
2193
        goto out;
2194
    }
2195
2196
    while (idx < (word32)sz) {
2197
        oid = 0;
2198
2199
        if (GetSequence(input, &idx, &length, (word32)sz) < 0) {
2200
            WOLFSSL_MSG("\tfail: should be a SEQUENCE");
2201
            goto out;
2202
        }
2203
2204
        tmpIdx = idx;
2205
        ret = GetObjectId(input, &idx, &oid, oidCertExtType, (word32)sz);
2206
        if (ret < 0) {
2207
            WOLFSSL_MSG("\tfail: OBJECT ID");
2208
            goto out;
2209
        }
2210
        idx = tmpIdx;
2211
        foundNID = (word32)oid2nid(oid, oidCertExtType);
2212
2213
        if (extCount >= loc) {
2214
            /* extCount >= loc. Now check if extension has been set */
2215
            isSet = wolfSSL_X509_ext_isSet_by_NID((WOLFSSL_X509*)x509,
2216
                (int)foundNID);
2217
            if (isSet && ((word32)nid == foundNID)) {
2218
                found = 1;
2219
                break;
2220
            }
2221
        }
2222
2223
        idx += length;
2224
        extCount++;
2225
    } /* while(idx < sz) */
2226
2227
out:
2228
2229
    FreeDecodedCert(cert);
2230
    WC_FREE_VAR_EX(cert, x509->heap, DYNAMIC_TYPE_DCERT);
2231
2232
    return found ? extCount : WOLFSSL_FATAL_ERROR;
2233
}
2234
2235
#endif /* OPENSSL_ALL || OPENSSL_EXTRA */
2236
2237
#if defined(OPENSSL_EXTRA) && !defined(IGNORE_NAME_CONSTRAINTS)
2238
/*
2239
 * Convert a Base_entry linked list to a STACK of GENERAL_SUBTREE.
2240
 *
2241
 * Base_entry stores name constraint data from DecodedCert. This function
2242
 * converts it to GENERAL_SUBTREE format.
2243
 *
2244
 * Supported types: ASN_DNS_TYPE, ASN_RFC822_TYPE, ASN_DIR_TYPE, ASN_IP_TYPE,
2245
 *                  ASN_URI_TYPE
2246
 *
2247
 * Returns 0 on success, negative on error.
2248
 */
2249
static int ConvertBaseEntryToSubtreeStack(Base_entry* list, WOLFSSL_STACK* sk,
2250
                                          void* heap)
2251
{
2252
    Base_entry* entry = list;
2253
    WOLFSSL_GENERAL_SUBTREE* subtree = NULL;
2254
    WOLFSSL_GENERAL_NAME* gn = NULL;
2255
    (void)heap;
2256
2257
    while (entry != NULL) {
2258
2259
        if (entry->type != ASN_DNS_TYPE && entry->type != ASN_RFC822_TYPE &&
2260
            entry->type != ASN_DIR_TYPE && entry->type != ASN_IP_TYPE &&
2261
            entry->type != ASN_URI_TYPE) {
2262
            entry = entry->next;
2263
            continue;
2264
        }
2265
2266
        /* Allocate subtree and general name */
2267
        subtree = (WOLFSSL_GENERAL_SUBTREE*)XMALLOC(
2268
            sizeof(WOLFSSL_GENERAL_SUBTREE), heap, DYNAMIC_TYPE_OPENSSL);
2269
        if (subtree == NULL) {
2270
            WOLFSSL_MSG("Failed to allocate GENERAL_SUBTREE");
2271
            return MEMORY_E;
2272
        }
2273
        XMEMSET(subtree, 0, sizeof(WOLFSSL_GENERAL_SUBTREE));
2274
2275
        gn = wolfSSL_GENERAL_NAME_new();
2276
        if (gn == NULL) {
2277
            WOLFSSL_MSG("Failed to allocate GENERAL_NAME");
2278
            XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2279
            return MEMORY_E;
2280
        }
2281
2282
        /* Free default ia5 string allocated by GENERAL_NAME_new */
2283
        wolfSSL_ASN1_STRING_free(gn->d.ia5);
2284
        gn->d.ia5 = NULL;
2285
2286
        switch (entry->type) {
2287
            case ASN_DNS_TYPE:
2288
            case ASN_RFC822_TYPE:
2289
            case ASN_URI_TYPE:
2290
            {
2291
                if (entry->type == ASN_DNS_TYPE) {
2292
                    gn->type = WOLFSSL_GEN_DNS;
2293
                }
2294
                else if (entry->type == ASN_RFC822_TYPE) {
2295
                    gn->type = WOLFSSL_GEN_EMAIL;
2296
                }
2297
                else {
2298
                    gn->type = WOLFSSL_GEN_URI;
2299
                }
2300
                gn->d.ia5 = wolfSSL_ASN1_STRING_new();
2301
                if (gn->d.ia5 == NULL) {
2302
                    WOLFSSL_MSG("Failed to allocate ASN1_STRING");
2303
                    wolfSSL_GENERAL_NAME_free(gn);
2304
                    XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2305
                    return MEMORY_E;
2306
                }
2307
                if (wolfSSL_ASN1_STRING_set(gn->d.ia5, entry->name,
2308
                        entry->nameSz) != WOLFSSL_SUCCESS) {
2309
                    WOLFSSL_MSG("Failed to set ASN1_STRING");
2310
                    wolfSSL_GENERAL_NAME_free(gn);
2311
                    XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2312
                    return MEMORY_E;
2313
                }
2314
                gn->d.ia5->type = WOLFSSL_V_ASN1_IA5STRING;
2315
                break;
2316
            }
2317
2318
            case ASN_DIR_TYPE:
2319
            {
2320
                byte* seqBuf = NULL;
2321
                unsigned char* p = NULL;
2322
                int seqLen = 0;
2323
2324
                /* Wrap in SEQUENCE and parse as X509_NAME */
2325
                gn->type = WOLFSSL_GEN_DIRNAME;
2326
                seqBuf = (byte*)XMALLOC((word32)entry->nameSz + MAX_SEQ_SZ,
2327
                                        heap, DYNAMIC_TYPE_TMP_BUFFER);
2328
                if (seqBuf == NULL) {
2329
                    WOLFSSL_MSG("Failed to allocate sequence buffer");
2330
                    wolfSSL_GENERAL_NAME_free(gn);
2331
                    XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2332
                    return MEMORY_E;
2333
                }
2334
2335
                seqLen = SetSequence(entry->nameSz, seqBuf);
2336
                XMEMCPY(seqBuf + seqLen, entry->name, entry->nameSz);
2337
2338
                p = seqBuf;
2339
                gn->d.directoryName = wolfSSL_d2i_X509_NAME(NULL, &p,
2340
                    (long)entry->nameSz + seqLen);
2341
                XFREE(seqBuf, heap, DYNAMIC_TYPE_TMP_BUFFER);
2342
2343
                if (gn->d.directoryName == NULL) {
2344
                    WOLFSSL_MSG("Failed to parse directoryName");
2345
                    wolfSSL_GENERAL_NAME_free(gn);
2346
                    XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2347
                    return ASN_PARSE_E;
2348
                }
2349
                break;
2350
            }
2351
2352
            case ASN_IP_TYPE:
2353
            {
2354
                /* For IP address, store raw bytes as OCTET_STRING. */
2355
                gn->type = WOLFSSL_GEN_IPADD;
2356
                gn->d.iPAddress = wolfSSL_ASN1_STRING_new();
2357
                if (gn->d.iPAddress == NULL) {
2358
                    WOLFSSL_MSG("Failed to allocate ASN1_STRING for IP");
2359
                    wolfSSL_GENERAL_NAME_free(gn);
2360
                    XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2361
                    return MEMORY_E;
2362
                }
2363
                if (wolfSSL_ASN1_STRING_set(gn->d.iPAddress, entry->name,
2364
                        entry->nameSz) != WOLFSSL_SUCCESS) {
2365
                    WOLFSSL_MSG("Failed to set IP ASN1_STRING");
2366
                    wolfSSL_GENERAL_NAME_free(gn);
2367
                    XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2368
                    return MEMORY_E;
2369
                }
2370
                gn->d.iPAddress->type = WOLFSSL_V_ASN1_OCTET_STRING;
2371
                break;
2372
            }
2373
        }
2374
2375
        subtree->base = gn;
2376
2377
        if (wolfSSL_sk_push(sk, subtree) <= 0) {
2378
            WOLFSSL_MSG("Failed to push subtree onto stack");
2379
            wolfSSL_GENERAL_NAME_free(gn);
2380
            XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2381
            return MEMORY_E;
2382
        }
2383
        entry = entry->next;
2384
    }
2385
2386
    return 0;
2387
}
2388
#endif /* OPENSSL_EXTRA && !IGNORE_NAME_CONSTRAINTS */
2389
2390
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
2391
/* Looks for the extension matching the passed in nid
2392
 *
2393
 * c   : if not null then is set to status value -2 if multiple occurrences
2394
 *       of the extension are found, -1 if not found, 0 if found and not
2395
 *       critical, and 1 if found and critical.
2396
 * nid : Extension OID to be found.
2397
 * idx : if NULL return first extension found match, otherwise start search at
2398
 *       idx location and set idx to the location of extension returned.
2399
 * returns NULL or a pointer to an WOLFSSL_ASN1_BIT_STRING (for KEY_USAGE_OID)
2400
 * or WOLFSSL_STACK (for other)
2401
 * holding extension structure
2402
 *
2403
 * NOTE code for decoding extensions is in asn.c DecodeCertExtensions --
2404
 * use already decoded extension in this function to avoid decoding twice.
2405
 * Currently we do not make use of idx since getting pre decoded extensions.
2406
 */
2407
void* wolfSSL_X509_get_ext_d2i(const WOLFSSL_X509* x509, int nid, int* c,
2408
    int* idx)
2409
{
2410
    void* ret = NULL;
2411
    WOLFSSL_STACK* sk = NULL;
2412
    WOLFSSL_ASN1_OBJECT* obj = NULL;
2413
    WOLFSSL_GENERAL_NAME* gn = NULL;
2414
#ifdef OPENSSL_EXTRA
2415
    WOLFSSL_DIST_POINT* dp = NULL;
2416
#endif
2417
    WOLFSSL_BASIC_CONSTRAINTS* bc = NULL;
2418
2419
    WOLFSSL_ENTER("wolfSSL_X509_get_ext_d2i");
2420
2421
    if (x509 == NULL) {
2422
        return NULL;
2423
    }
2424
2425
    if (c != NULL) {
2426
        *c = -1; /* default to not found */
2427
    }
2428
2429
    switch (nid) {
2430
        case BASIC_CA_OID:
2431
            if (x509->basicConstSet) {
2432
                WOLFSSL_ASN1_INTEGER* a;
2433
2434
                bc = wolfSSL_BASIC_CONSTRAINTS_new();
2435
                if (!bc) {
2436
                    WOLFSSL_MSG("wolfSSL_BASIC_CONSTRAINTS_new error");
2437
                    return NULL;
2438
                }
2439
2440
                a = wolfSSL_ASN1_INTEGER_new();
2441
                if (!a) {
2442
                    WOLFSSL_MSG("wolfSSL_ASN1_INTEGER_new error");
2443
                    wolfSSL_BASIC_CONSTRAINTS_free(bc);
2444
                    return NULL;
2445
                }
2446
                a->length = (int)x509->pathLength;
2447
2448
#if defined(OPENSSL_ALL) || defined(WOLFSSL_QT) || \
2449
        defined(WOLFSSL_APACHE_HTTPD)
2450
                bc->ca = x509->isCa;
2451
#endif
2452
                bc->pathlen = a;
2453
                if (c != NULL) {
2454
                    *c = x509->basicConstCrit;
2455
                }
2456
            }
2457
            else {
2458
                WOLFSSL_MSG("No Basic Constraint set");
2459
            }
2460
            return bc;
2461
2462
        case ALT_NAMES_OID:
2463
        {
2464
            DNS_entry* dns = NULL;
2465
2466
            if (x509->subjAltNameSet && x509->altNames != NULL) {
2467
                /* Malloc GENERAL_NAME stack */
2468
                sk = wolfSSL_sk_new_null();
2469
                if (sk == NULL)
2470
                    return NULL;
2471
                sk->type = STACK_TYPE_GEN_NAME;
2472
2473
                /* alt names are DNS_entry structs */
2474
                if (c != NULL) {
2475
                    if (x509->altNames->next != NULL) {
2476
                        *c = -2; /* more then one found */
2477
                    }
2478
                    else {
2479
                        *c = x509->subjAltNameCrit;
2480
                    }
2481
                }
2482
2483
                dns = x509->altNames;
2484
                /* Currently only support GEN_DNS type */
2485
                while (dns != NULL) {
2486
                    gn = wolfSSL_GENERAL_NAME_new();
2487
                    if (gn == NULL) {
2488
                        WOLFSSL_MSG("Error creating GENERAL_NAME");
2489
                        goto err;
2490
                    }
2491
2492
                    switch (dns->type) {
2493
                        case ASN_DIR_TYPE:
2494
                            gn->type = dns->type;
2495
                            {
2496
                                int localIdx = 0;
2497
                                unsigned char* n = (unsigned char*)XMALLOC(
2498
                                        dns->len + MAX_SEQ_SZ, x509->heap,
2499
                                        DYNAMIC_TYPE_TMP_BUFFER);
2500
                                if (n == NULL) {
2501
                                    goto err;
2502
                                }
2503
2504
                                localIdx += SetSequence(dns->len, n);
2505
                                XMEMCPY(n + localIdx, dns->name, dns->len);
2506
                                gn->d.dirn =  wolfSSL_d2i_X509_NAME(NULL, &n,
2507
                                        dns->len + localIdx);
2508
                                XFREE(n, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
2509
                                if (gn->d.dirn == NULL) {
2510
                                    WOLFSSL_MSG("Convert altDirName to X509 "
2511
                                            "NAME failed");
2512
                                    goto err;
2513
                                }
2514
                            }
2515
                            break;
2516
2517
                        case ASN_OTHER_TYPE:
2518
                            /* gn->type set internally */
2519
                            if (!wolfssl_dns_entry_othername_to_gn(dns, gn)) {
2520
                                goto err;
2521
                            }
2522
                            break;
2523
2524
                        case ASN_IP_TYPE:
2525
                            gn->type = dns->type;
2526
                            if (wolfSSL_ASN1_STRING_set(gn->d.iPAddress,
2527
                                    dns->name, dns->len) != WOLFSSL_SUCCESS) {
2528
                                WOLFSSL_MSG("ASN1_STRING_set failed");
2529
                                goto err;
2530
                            }
2531
                            gn->d.iPAddress->type = WOLFSSL_V_ASN1_OCTET_STRING;
2532
                            break;
2533
2534
                    #ifdef WOLFSSL_RID_ALT_NAME
2535
                        case ASN_RID_TYPE:
2536
                            gn->type = dns->type;
2537
                            /* Free ia5 before using union for registeredID */
2538
                            wolfSSL_ASN1_STRING_free(gn->d.ia5);
2539
                            gn->d.ia5 = NULL;
2540
2541
                            gn->d.registeredID = wolfSSL_ASN1_OBJECT_new();
2542
                            if (gn->d.registeredID == NULL) {
2543
                                goto err;
2544
                            }
2545
                            {
2546
                                /* Store DER-encoded OID (tag+length+content) */
2547
                                word32 derSz = 1 + SetLength(dns->len, NULL)
2548
                                               + dns->len;
2549
                                byte* der = (byte*)XMALLOC(derSz,
2550
                                    gn->d.registeredID->heap,
2551
                                    DYNAMIC_TYPE_ASN1);
2552
                                if (der == NULL) {
2553
                                    goto err;
2554
                                }
2555
                                {
2556
                                    word32 derIdx = 0;
2557
                                    der[derIdx++] = ASN_OBJECT_ID;
2558
                                    derIdx += SetLength(dns->len, der + derIdx);
2559
                                    XMEMCPY(der + derIdx, dns->name, dns->len);
2560
                                }
2561
                                gn->d.registeredID->obj = der;
2562
                                gn->d.registeredID->objSz = derSz;
2563
                            }
2564
                            gn->d.registeredID->dynamic |=
2565
                                WOLFSSL_ASN1_DYNAMIC_DATA;
2566
                            gn->d.registeredID->grp = oidCertExtType;
2567
                            break;
2568
                    #endif /* WOLFSSL_RID_ALT_NAME */
2569
2570
                        default:
2571
                            gn->type = dns->type;
2572
                            if (wolfSSL_ASN1_STRING_set(gn->d.dNSName,
2573
                                    dns->name, dns->len) != WOLFSSL_SUCCESS) {
2574
                                WOLFSSL_MSG("ASN1_STRING_set failed");
2575
                                goto err;
2576
                            }
2577
                            gn->d.dNSName->type = WOLFSSL_V_ASN1_IA5STRING;
2578
                    }
2579
2580
                    dns = dns->next;
2581
                    /* Using wolfSSL_sk_insert to maintain backwards
2582
                     * compatibility with earlier versions of _push API that
2583
                     * pushed items to the start of the list instead of the
2584
                     * end. */
2585
                    if (wolfSSL_sk_insert(sk, gn, 0) <= 0) {
2586
                        WOLFSSL_MSG("Error pushing ASN1 object onto stack");
2587
                        goto err;
2588
                    }
2589
                    /* null so that it doesn't get pushed again after switch */
2590
                    gn = NULL;
2591
                }
2592
            }
2593
            else {
2594
                WOLFSSL_MSG("No Alt Names set");
2595
            }
2596
2597
            break;
2598
        }
2599
2600
        case CRL_DIST_OID:
2601
    #if defined(OPENSSL_EXTRA)
2602
            if (x509->CRLdistSet && x509->CRLInfo != NULL) {
2603
                if (c != NULL) {
2604
                    *c = x509->CRLdistCrit;
2605
                }
2606
2607
                sk = wolfSSL_sk_new_null();
2608
                if (sk == NULL) {
2609
                    return NULL;
2610
                }
2611
                sk->type = STACK_TYPE_DIST_POINT;
2612
2613
                gn = wolfSSL_GENERAL_NAME_new();
2614
                if (gn == NULL) {
2615
                    WOLFSSL_MSG("Error creating GENERAL_NAME");
2616
                    goto err;
2617
                }
2618
2619
                if (wolfSSL_GENERAL_NAME_set_type(gn, WOLFSSL_GEN_URI) !=
2620
                        WOLFSSL_SUCCESS) {
2621
                    WOLFSSL_MSG("Error setting GENERAL_NAME type");
2622
                    goto err;
2623
                }
2624
2625
                if (wolfSSL_ASN1_STRING_set(gn->d.uniformResourceIdentifier,
2626
                        x509->CRLInfo, x509->CRLInfoSz) != WOLFSSL_SUCCESS) {
2627
                    WOLFSSL_MSG("ASN1_STRING_set failed");
2628
                    goto err;
2629
                }
2630
2631
                /* wolfSSL only decodes one dist point */
2632
                dp = wolfSSL_DIST_POINT_new();
2633
                if (dp == NULL) {
2634
                    WOLFSSL_MSG("Error creating DIST_POINT");
2635
                    goto err;
2636
                }
2637
2638
                /* push GENERAL_NAME onto fullname stack */
2639
                if (wolfSSL_sk_GENERAL_NAME_push(dp->distpoint->name.fullname,
2640
                                                 gn) <= 0) {
2641
                    WOLFSSL_MSG("wolfSSL_sk_GENERAL_NAME_push error");
2642
                    goto err;
2643
                }
2644
2645
                /* push DIST_POINT onto stack */
2646
                if (wolfSSL_sk_DIST_POINT_push(sk, dp) <= 0) {
2647
                    WOLFSSL_MSG("Error pushing DIST_POINT onto stack");
2648
                    goto err;
2649
                }
2650
2651
                gn = NULL;
2652
                dp = NULL;
2653
2654
            }
2655
            else {
2656
                WOLFSSL_MSG("No CRL dist set");
2657
            }
2658
    #endif /* OPENSSL_EXTRA */
2659
            break;
2660
2661
        case AUTH_INFO_OID:
2662
            if (x509->authInfoSet && x509->authInfo != NULL) {
2663
                if (c != NULL) {
2664
                    *c = x509->authInfoCrit;
2665
                }
2666
                obj = wolfSSL_ASN1_OBJECT_new();
2667
                if (obj == NULL) {
2668
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2669
                    return NULL;
2670
                }
2671
                obj->type  = AUTH_INFO_OID;
2672
                obj->grp   = oidCertExtType;
2673
                obj->obj   = x509->authInfo;
2674
                obj->objSz = (unsigned int)x509->authInfoSz;
2675
            }
2676
            else {
2677
                WOLFSSL_MSG("No Auth Info set");
2678
            }
2679
            break;
2680
2681
        case AUTH_KEY_OID:
2682
            if (x509->authKeyIdSet) {
2683
                WOLFSSL_AUTHORITY_KEYID* akey = wolfSSL_AUTHORITY_KEYID_new();
2684
                if (!akey) {
2685
                    WOLFSSL_MSG(
2686
                        "Issue creating WOLFSSL_AUTHORITY_KEYID struct");
2687
                    return NULL;
2688
                }
2689
2690
                if (c != NULL) {
2691
                    *c = x509->authKeyIdCrit;
2692
                }
2693
                obj = wolfSSL_ASN1_OBJECT_new();
2694
                if (obj == NULL) {
2695
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2696
                    wolfSSL_AUTHORITY_KEYID_free(akey);
2697
                    return NULL;
2698
                }
2699
                obj->type  = AUTH_KEY_OID;
2700
                obj->grp   = oidCertExtType;
2701
                obj->obj   = x509->authKeyId;
2702
                obj->objSz = x509->authKeyIdSz;
2703
                akey->issuer = obj;
2704
                return akey;
2705
            }
2706
            else {
2707
                WOLFSSL_MSG("No Auth Key set");
2708
            }
2709
            break;
2710
2711
        case SUBJ_KEY_OID:
2712
            if (x509->subjKeyIdSet) {
2713
                if (c != NULL) {
2714
                    *c = x509->subjKeyIdCrit;
2715
                }
2716
                obj = wolfSSL_ASN1_OBJECT_new();
2717
                if (obj == NULL) {
2718
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2719
                    return NULL;
2720
                }
2721
                obj->type  = SUBJ_KEY_OID;
2722
                obj->grp   = oidCertExtType;
2723
                obj->obj   = x509->subjKeyId;
2724
                obj->objSz = x509->subjKeyIdSz;
2725
            }
2726
            else {
2727
                WOLFSSL_MSG("No Subject Key set");
2728
            }
2729
            break;
2730
2731
        case CERT_POLICY_OID:
2732
        {
2733
        #ifdef WOLFSSL_CERT_EXT
2734
            int i;
2735
2736
            if (x509->certPoliciesNb > 0) {
2737
                if (c != NULL) {
2738
                    if (x509->certPoliciesNb > 1) {
2739
                        *c = -2;
2740
                    }
2741
                    else {
2742
                        *c = 0;
2743
                    }
2744
                }
2745
2746
                sk = wolfSSL_sk_new_asn1_obj();
2747
                if (sk == NULL) {
2748
                    return NULL;
2749
                }
2750
2751
                for (i = 0; i < x509->certPoliciesNb - 1; i++) {
2752
                    obj = wolfSSL_ASN1_OBJECT_new();
2753
                    if (obj == NULL) {
2754
                        WOLFSSL_MSG(
2755
                            "Issue creating WOLFSSL_ASN1_OBJECT struct");
2756
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2757
                        return NULL;
2758
                    }
2759
                    obj->type  = CERT_POLICY_OID;
2760
                    obj->grp   = oidCertExtType;
2761
                    obj->obj   = (byte*)(x509->certPolicies[i]);
2762
                    obj->objSz = MAX_CERTPOL_SZ;
2763
                    if (wolfSSL_sk_ASN1_OBJECT_push(sk, obj) <= 0) {
2764
                        WOLFSSL_MSG("Error pushing ASN1 object onto stack");
2765
                        wolfSSL_ASN1_OBJECT_free(obj);
2766
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2767
                        sk = NULL;
2768
                    }
2769
                }
2770
2771
                obj = wolfSSL_ASN1_OBJECT_new();
2772
                if (obj == NULL) {
2773
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2774
                    wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2775
                    return NULL;
2776
                }
2777
                obj->type  = CERT_POLICY_OID;
2778
                obj->grp   = oidCertExtType;
2779
                obj->obj   = (byte*)(x509->certPolicies[i]);
2780
                obj->objSz = MAX_CERTPOL_SZ;
2781
2782
                if (wolfSSL_sk_ASN1_OBJECT_push(sk, obj) <= 0) {
2783
                    WOLFSSL_MSG("Error pushing ASN1 object onto stack");
2784
                    wolfSSL_ASN1_OBJECT_free(obj);
2785
                    wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2786
                    sk = NULL;
2787
                }
2788
2789
                obj = NULL;
2790
            }
2791
            else {
2792
                WOLFSSL_MSG("No Cert Policy set");
2793
            }
2794
        #endif /* WOLFSSL_CERT_EXT */
2795
        #ifdef WOLFSSL_SEP
2796
            if (x509->certPolicySet) {
2797
                if (c != NULL) {
2798
                    *c = x509->certPolicyCrit;
2799
                }
2800
                obj = wolfSSL_ASN1_OBJECT_new();
2801
                if (obj == NULL) {
2802
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2803
                    return NULL;
2804
                }
2805
                obj->type  = CERT_POLICY_OID;
2806
                obj->grp   = oidCertExtType;
2807
            }
2808
            else {
2809
                WOLFSSL_MSG("No Cert Policy set");
2810
            }
2811
        #endif
2812
            break;
2813
        }
2814
        case KEY_USAGE_OID:
2815
        {
2816
            WOLFSSL_ASN1_STRING* asn1str = NULL;
2817
            if (x509->keyUsageSet) {
2818
                if (c != NULL) {
2819
                    *c = x509->keyUsageCrit;
2820
                }
2821
2822
                asn1str = wolfSSL_ASN1_STRING_new();
2823
                if (asn1str == NULL) {
2824
                    WOLFSSL_MSG("Failed to malloc ASN1_STRING");
2825
                    return NULL;
2826
                }
2827
2828
                if (wolfSSL_ASN1_STRING_set(asn1str, &x509->keyUsage,
2829
                        sizeof(word16)) != WOLFSSL_SUCCESS) {
2830
                    WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
2831
                    wolfSSL_ASN1_STRING_free(asn1str);
2832
                    return NULL;
2833
                }
2834
2835
                asn1str->type = KEY_USAGE_OID;
2836
            }
2837
            else {
2838
                WOLFSSL_MSG("No Key Usage set");
2839
            }
2840
            /* don't add stack of and return bit string directly */
2841
            return asn1str;
2842
        }
2843
        case INHIBIT_ANY_OID:
2844
            WOLFSSL_MSG("INHIBIT ANY extension not supported");
2845
            break;
2846
2847
        case EXT_KEY_USAGE_OID:
2848
            if (x509->extKeyUsageSrc != NULL) {
2849
                const byte* ekuSrc = x509->extKeyUsageSrc;
2850
                word32 i;
2851
2852
                sk = wolfSSL_sk_new_asn1_obj();
2853
                if (sk == NULL) {
2854
                    WOLFSSL_MSG("Issue creating stack");
2855
                    return NULL;
2856
                }
2857
2858
                for (i = 0; i < x509->extKeyUsageCount; i++) {
2859
                    long ekuSrcLen = (long)(x509->extKeyUsageSz -
2860
                            (word32)(ekuSrc - x509->extKeyUsageSrc));
2861
                    WOLFSSL_ASN1_OBJECT* ekuObj = wolfSSL_d2i_ASN1_OBJECT(NULL,
2862
                            &ekuSrc, ekuSrcLen);
2863
                    if (ekuObj == NULL) {
2864
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2865
                        WOLFSSL_MSG("d2i obj error");
2866
                        return NULL;
2867
                    }
2868
                    ekuObj->type  = EXT_KEY_USAGE_OID;
2869
                    ekuObj->grp   = oidCertExtType;
2870
                    /* Push to end to maintain order */
2871
                    if (wolfSSL_sk_insert(sk, ekuObj, -1) <= 0) {
2872
                        wolfSSL_ASN1_OBJECT_free(ekuObj);
2873
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2874
                        WOLFSSL_MSG("d2i obj error");
2875
                        return NULL;
2876
                    }
2877
                }
2878
2879
                if ((word32)(ekuSrc - x509->extKeyUsageSrc)
2880
                        != x509->extKeyUsageSz ||
2881
                        i != x509->extKeyUsageCount) {
2882
                    wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2883
                    WOLFSSL_MSG("incorrect eku count or buffer not exhausted");
2884
                    return NULL;
2885
                }
2886
2887
                if (c != NULL) {
2888
                    if (x509->extKeyUsageCount > 1) {
2889
                        *c = -2;
2890
                    }
2891
                    else {
2892
                        *c = x509->extKeyUsageCrit;
2893
                    }
2894
                }
2895
            }
2896
            else {
2897
                WOLFSSL_MSG("No Extended Key Usage set");
2898
            }
2899
            break;
2900
2901
    #if defined(OPENSSL_EXTRA) && !defined(IGNORE_NAME_CONSTRAINTS)
2902
        case NAME_CONS_OID:
2903
        {
2904
            WOLFSSL_NAME_CONSTRAINTS* nc = NULL;
2905
2906
            /* Check if name constraints exist in stored X509 */
2907
            if (x509->permittedNames == NULL && x509->excludedNames == NULL) {
2908
                WOLFSSL_MSG("No Name Constraints set");
2909
                break;
2910
            }
2911
2912
            if (c != NULL) {
2913
                *c = x509->nameConstraintCrit;
2914
            }
2915
2916
            nc = (WOLFSSL_NAME_CONSTRAINTS*)XMALLOC(
2917
                sizeof(WOLFSSL_NAME_CONSTRAINTS), x509->heap,
2918
                DYNAMIC_TYPE_OPENSSL);
2919
            if (nc == NULL) {
2920
                WOLFSSL_MSG("Failed to allocate NAME_CONSTRAINTS");
2921
                break;
2922
            }
2923
            XMEMSET(nc, 0, sizeof(WOLFSSL_NAME_CONSTRAINTS));
2924
2925
            /* Convert permitted names */
2926
            if (x509->permittedNames != NULL) {
2927
                nc->permittedSubtrees = wolfSSL_sk_new_null();
2928
                if (nc->permittedSubtrees == NULL) {
2929
                    WOLFSSL_MSG("Failed to allocate permitted stack");
2930
                    wolfSSL_NAME_CONSTRAINTS_free(nc);
2931
                    break;
2932
                }
2933
                nc->permittedSubtrees->type = STACK_TYPE_GENERAL_SUBTREE;
2934
2935
                if (ConvertBaseEntryToSubtreeStack(x509->permittedNames,
2936
                        nc->permittedSubtrees, x509->heap) != 0) {
2937
                    WOLFSSL_MSG("Failed to convert permitted names");
2938
                    wolfSSL_NAME_CONSTRAINTS_free(nc);
2939
                    break;
2940
                }
2941
            }
2942
2943
            /* Convert excluded names */
2944
            if (x509->excludedNames != NULL) {
2945
                nc->excludedSubtrees = wolfSSL_sk_new_null();
2946
                if (nc->excludedSubtrees == NULL) {
2947
                    WOLFSSL_MSG("Failed to allocate excluded stack");
2948
                    wolfSSL_NAME_CONSTRAINTS_free(nc);
2949
                    break;
2950
                }
2951
                nc->excludedSubtrees->type = STACK_TYPE_GENERAL_SUBTREE;
2952
2953
                if (ConvertBaseEntryToSubtreeStack(x509->excludedNames,
2954
                        nc->excludedSubtrees, x509->heap) != 0) {
2955
                    WOLFSSL_MSG("Failed to convert excluded names");
2956
                    wolfSSL_NAME_CONSTRAINTS_free(nc);
2957
                    break;
2958
                }
2959
            }
2960
2961
            return nc;
2962
        }
2963
    #endif /* OPENSSL_EXTRA && !IGNORE_NAME_CONSTRAINTS */
2964
2965
        case PRIV_KEY_USAGE_PERIOD_OID:
2966
            WOLFSSL_MSG("Private Key Usage Period extension not supported");
2967
            break;
2968
2969
        case SUBJ_INFO_ACC_OID:
2970
            WOLFSSL_MSG("Subject Info Access extension not supported");
2971
            break;
2972
2973
        case POLICY_MAP_OID:
2974
            WOLFSSL_MSG("Policy Map extension not supported");
2975
            break;
2976
2977
        case POLICY_CONST_OID:
2978
            WOLFSSL_MSG("Policy Constraint extension not supported");
2979
            break;
2980
2981
        case ISSUE_ALT_NAMES_OID:
2982
            WOLFSSL_MSG("Issue Alt Names extension not supported");
2983
            break;
2984
2985
        case TLS_FEATURE_OID:
2986
            WOLFSSL_MSG("TLS Feature extension not supported");
2987
            break;
2988
2989
        default:
2990
            WOLFSSL_MSG("Unsupported/Unknown extension OID");
2991
    }
2992
2993
    /* make sure stack of is allocated */
2994
    if ((obj || gn) && sk == NULL) {
2995
        sk = wolfSSL_sk_new_asn1_obj();
2996
        if (sk == NULL) {
2997
            goto err;
2998
        }
2999
    }
3000
    if (obj) {
3001
        if (wolfSSL_sk_ASN1_OBJECT_push(sk, obj) <= 0) {
3002
            WOLFSSL_MSG("Error pushing ASN1_OBJECT object onto "
3003
                        "stack.");
3004
            goto err;
3005
        }
3006
    }
3007
3008
    ret = sk;
3009
3010
    (void)idx;
3011
3012
    return ret;
3013
3014
err:
3015
    if (obj) {
3016
        wolfSSL_ASN1_OBJECT_free(obj);
3017
    }
3018
    if (gn) {
3019
        wolfSSL_GENERAL_NAME_free(gn);
3020
    }
3021
    #ifdef OPENSSL_EXTRA
3022
    if (dp) {
3023
        wolfSSL_DIST_POINT_free(dp);
3024
    }
3025
    #endif
3026
    if (sk) {
3027
        wolfSSL_sk_pop_free(sk, NULL);
3028
    }
3029
    return NULL;
3030
}
3031
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
3032
3033
#ifdef OPENSSL_EXTRA
3034
int wolfSSL_X509_add_altname_ex(WOLFSSL_X509* x509, const char* name,
3035
        word32 nameSz, int type)
3036
{
3037
    DNS_entry* newAltName = NULL;
3038
    char* nameCopy = NULL;
3039
3040
    if (x509 == NULL)
3041
        return WOLFSSL_FAILURE;
3042
3043
    if ((name == NULL) || (nameSz == 0))
3044
        return WOLFSSL_SUCCESS;
3045
3046
    newAltName = AltNameNew(x509->heap);
3047
    if (newAltName == NULL)
3048
        return WOLFSSL_FAILURE;
3049
3050
    nameCopy = (char*)XMALLOC(nameSz + 1, x509->heap, DYNAMIC_TYPE_ALTNAME);
3051
    if (nameCopy == NULL) {
3052
        XFREE(newAltName, x509->heap, DYNAMIC_TYPE_ALTNAME);
3053
        return WOLFSSL_FAILURE;
3054
    }
3055
3056
    XMEMCPY(nameCopy, name, nameSz);
3057
3058
    nameCopy[nameSz] = '\0';
3059
3060
    newAltName->next = x509->altNames;
3061
    newAltName->type = type;
3062
    newAltName->len = (int)nameSz;
3063
    newAltName->name = nameCopy;
3064
    x509->altNames = newAltName;
3065
3066
    return WOLFSSL_SUCCESS;
3067
}
3068
3069
int wolfSSL_X509_add_altname(WOLFSSL_X509* x509, const char* name, int type)
3070
{
3071
    word32 nameSz;
3072
3073
    if (name == NULL)
3074
        return WOLFSSL_SUCCESS;
3075
3076
    nameSz = (word32)XSTRLEN(name);
3077
    if (nameSz == 0)
3078
        return WOLFSSL_SUCCESS;
3079
3080
    if (type == ASN_IP_TYPE) {
3081
#ifdef WOLFSSL_IP_ALT_NAME
3082
        byte ip4[4];
3083
        byte ip6[16];
3084
        int ptonRet;
3085
3086
        /* Check if this is an ip4 address */
3087
        ptonRet = XINET_PTON(WOLFSSL_IP4, name, ip4);
3088
        if (ptonRet == 1) {
3089
            return wolfSSL_X509_add_altname_ex(x509, (const char*)ip4, 4,
3090
                type);
3091
        }
3092
3093
        /* Check for ip6 */
3094
        ptonRet = XINET_PTON(WOLFSSL_IP6, name, ip6);
3095
        if (ptonRet == 1) {
3096
            return wolfSSL_X509_add_altname_ex(x509, (const char*)ip6, 16,
3097
                type);
3098
        }
3099
3100
        WOLFSSL_MSG("IP address parse failed");
3101
        return WOLFSSL_FAILURE;
3102
#else
3103
        WOLFSSL_MSG("WOLFSSL_IP_ALT_NAME not enabled");
3104
        return WOLFSSL_FAILURE;
3105
#endif
3106
    }
3107
3108
    return wolfSSL_X509_add_altname_ex(x509, name, nameSz, type);
3109
}
3110
3111
#ifndef NO_WOLFSSL_STUB
3112
WOLFSSL_X509_EXTENSION *wolfSSL_X509_delete_ext(WOLFSSL_X509 *x509, int loc)
3113
{
3114
    WOLFSSL_STUB("wolfSSL_X509_delete_ext");
3115
    (void)x509;
3116
    (void)loc;
3117
    return NULL;
3118
}
3119
3120
/* currently LHASH is not implemented (and not needed for Apache port) */
3121
WOLFSSL_X509_EXTENSION* wolfSSL_X509V3_EXT_conf_nid(
3122
        WOLF_LHASH_OF(CONF_VALUE)* conf, WOLFSSL_X509V3_CTX* ctx, int nid,
3123
        char* value)
3124
{
3125
    WOLFSSL_STUB("wolfSSL_X509V3_EXT_conf_nid");
3126
3127
    if (conf != NULL) {
3128
        WOLFSSL_MSG("Handling LHASH not implemented yet");
3129
        return NULL;
3130
    }
3131
3132
    (void)conf;
3133
    (void)ctx;
3134
    (void)nid;
3135
    (void)value;
3136
    return NULL;
3137
}
3138
3139
void wolfSSL_X509V3_set_ctx_nodb(WOLFSSL_X509V3_CTX* ctx)
3140
{
3141
    WOLFSSL_STUB("wolfSSL_X509V3_set_ctx_nodb");
3142
    (void)ctx;
3143
}
3144
#endif /* !NO_WOLFSSL_STUB */
3145
3146
#ifdef OPENSSL_EXTRA
3147
static WOLFSSL_X509_EXTENSION* createExtFromStr(int nid, const char *value)
3148
{
3149
    WOLFSSL_X509_EXTENSION* ext;
3150
3151
    ext = wolfSSL_X509_EXTENSION_new();
3152
    if (ext == NULL) {
3153
        WOLFSSL_MSG("memory error");
3154
        return NULL;
3155
    }
3156
    ext->value.nid = nid;
3157
3158
    switch (nid) {
3159
        case WC_NID_subject_key_identifier:
3160
        case WC_NID_authority_key_identifier:
3161
            if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
3162
                    != WOLFSSL_SUCCESS) {
3163
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
3164
                goto err_cleanup;
3165
            }
3166
            ext->value.type = CTC_UTF8;
3167
            break;
3168
        case WC_NID_subject_alt_name:
3169
        {
3170
            WOLFSSL_GENERAL_NAMES* gns;
3171
            WOLFSSL_GENERAL_NAME* gn;
3172
3173
            if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
3174
                    != WOLFSSL_SUCCESS) {
3175
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
3176
                goto err_cleanup;
3177
            }
3178
            ext->value.type = ASN_DNS_TYPE;
3179
3180
            /* add stack of general names */
3181
            gns = wolfSSL_sk_new_null();
3182
            if (gns == NULL) {
3183
                WOLFSSL_MSG("wolfSSL_sk_new_null error");
3184
                goto err_cleanup;
3185
            }
3186
            ext->ext_sk = gns; /* wolfSSL_X509_EXTENSION_free will handle
3187
                                * free'ing gns */
3188
            gns->type = STACK_TYPE_GEN_NAME;
3189
            gn = wolfSSL_GENERAL_NAME_new();
3190
            if (gn == NULL) {
3191
                WOLFSSL_MSG("wolfSSL_GENERAL_NAME_new error");
3192
                goto err_cleanup;
3193
            }
3194
            if (wolfSSL_sk_GENERAL_NAME_push(gns, gn) <= 0) {
3195
                WOLFSSL_MSG("wolfSSL_sk_GENERAL_NAME_push error");
3196
                wolfSSL_GENERAL_NAME_free(gn);
3197
                goto err_cleanup;
3198
            }
3199
            if (wolfSSL_ASN1_STRING_set(gn->d.ia5, value, -1)
3200
                    != WOLFSSL_SUCCESS) {
3201
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set failed");
3202
                goto err_cleanup;
3203
            }
3204
            gn->type = ASN_DNS_TYPE;
3205
            break;
3206
        }
3207
        case WC_NID_key_usage:
3208
            if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
3209
                    != WOLFSSL_SUCCESS) {
3210
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
3211
                goto err_cleanup;
3212
            }
3213
            ext->value.type = KEY_USAGE_OID;
3214
            break;
3215
        case WC_NID_ext_key_usage:
3216
            if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
3217
                    != WOLFSSL_SUCCESS) {
3218
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
3219
                goto err_cleanup;
3220
            }
3221
            ext->value.type = EXT_KEY_USAGE_OID;
3222
            break;
3223
        default:
3224
            WOLFSSL_MSG("invalid or unsupported NID");
3225
            goto err_cleanup;
3226
    }
3227
    return ext;
3228
err_cleanup:
3229
    wolfSSL_X509_EXTENSION_free(ext);
3230
    return NULL;
3231
}
3232
3233
/**
3234
 * Create a WOLFSSL_X509_EXTENSION from the input arguments.
3235
 * @param conf  Not used
3236
 * @param ctx   Not used
3237
 * @param nid   Interprets the value parameter as the x509 extension that
3238
 *              corresponds to this NID.
3239
 * @param value A NULL terminated string that is taken as the value of the
3240
 *              newly created extension object.
3241
 * @return WOLFSSL_X509_EXTENSION* on success or NULL on failure.
3242
 */
3243
WOLFSSL_X509_EXTENSION* wolfSSL_X509V3_EXT_nconf_nid(WOLFSSL_CONF* conf,
3244
        WOLFSSL_X509V3_CTX *ctx, int nid, const char *value)
3245
{
3246
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_nconf_nid");
3247
3248
    if (value == NULL) {
3249
        WOLFSSL_MSG("value NULL parameter");
3250
        return NULL;
3251
    }
3252
3253
    if (conf != NULL || ctx != NULL) {
3254
        WOLFSSL_MSG("wolfSSL_X509V3_EXT_nconf_nid does not handle either "
3255
                    "conf or ctx parameters");
3256
    }
3257
3258
    return createExtFromStr(nid, value);
3259
}
3260
3261
/**
3262
 * Create a WOLFSSL_X509_EXTENSION from the input arguments.
3263
 * @param conf  Not used
3264
 * @param ctx   Not used
3265
 * @param sName The textual representation of the NID that the value parameter
3266
 *              should be interpreted as.
3267
 * @param value A NULL terminated string that is taken as the value of the
3268
 *              newly created extension object.
3269
 * @return WOLFSSL_X509_EXTENSION* on success or NULL on failure.
3270
 */
3271
WOLFSSL_X509_EXTENSION* wolfSSL_X509V3_EXT_nconf(WOLFSSL_CONF *conf,
3272
        WOLFSSL_X509V3_CTX *ctx, const char *sName, const char *value)
3273
{
3274
    const WOLFSSL_ObjectInfo* info = wolfssl_object_info;
3275
    size_t i;
3276
3277
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_nconf");
3278
3279
    if (value == NULL) {
3280
        WOLFSSL_MSG("value NULL parameter");
3281
        return NULL;
3282
    }
3283
3284
    if (conf != NULL || ctx != NULL) {
3285
        WOLFSSL_MSG("wolfSSL_X509V3_EXT_nconf does not handle either "
3286
                    "conf or ctx parameters");
3287
    }
3288
3289
    for (i = 0; i < wolfssl_object_info_sz; i++, info++) {
3290
        if (XSTRCMP(info->sName, sName) == 0)
3291
            return createExtFromStr(info->nid, value);
3292
    }
3293
3294
    WOLFSSL_MSG("value didn't match any known NID");
3295
    return NULL;
3296
}
3297
3298
static void wolfSSL_X509V3_EXT_METHOD_populate(WOLFSSL_v3_ext_method *method,
3299
                                               int nid)
3300
{
3301
    if (!method)
3302
        return;
3303
3304
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_METHOD_populate");
3305
    switch (nid) {
3306
    case WC_NID_subject_key_identifier:
3307
        method->i2s = (WOLFSSL_X509V3_EXT_I2S)wolfSSL_i2s_ASN1_STRING;
3308
        FALL_THROUGH;
3309
    case WC_NID_authority_key_identifier:
3310
    case WC_NID_key_usage:
3311
    case WC_NID_certificate_policies:
3312
    case WC_NID_policy_mappings:
3313
    case WC_NID_subject_alt_name:
3314
    case WC_NID_issuer_alt_name:
3315
    case WC_NID_basic_constraints:
3316
    case WC_NID_name_constraints:
3317
    case WC_NID_policy_constraints:
3318
    case WC_NID_ext_key_usage:
3319
    case WC_NID_crl_distribution_points:
3320
    case WC_NID_inhibit_any_policy:
3321
    case WC_NID_info_access:
3322
        WOLFSSL_MSG("Nothing to populate for current NID");
3323
        break;
3324
    default:
3325
        WOLFSSL_MSG("Unknown or unsupported NID");
3326
        break;
3327
    }
3328
3329
    return;
3330
}
3331
3332
/**
3333
 * @param nid One of the WC_NID_* constants defined in asn.h
3334
 * @param crit
3335
 * @param data This data is copied to the returned extension.
3336
 * @return
3337
 */
3338
WOLFSSL_X509_EXTENSION *wolfSSL_X509V3_EXT_i2d(int nid, int crit,
3339
                                               void *data)
3340
{
3341
    WOLFSSL_X509_EXTENSION *ext = NULL;
3342
    WOLFSSL_ASN1_STRING* asn1str = NULL;
3343
3344
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_i2d");
3345
3346
    if (!data) {
3347
        return NULL;
3348
    }
3349
3350
    if (!(ext = wolfSSL_X509_EXTENSION_new())) {
3351
        return NULL;
3352
    }
3353
3354
    wolfSSL_X509V3_EXT_METHOD_populate(&ext->ext_method, nid);
3355
3356
    switch (nid) {
3357
    case WC_NID_subject_key_identifier:
3358
        /* WOLFSSL_ASN1_STRING */
3359
    case WC_NID_key_usage:
3360
        /* WOLFSSL_ASN1_STRING */
3361
    {
3362
        asn1str = (WOLFSSL_ASN1_STRING*)data;
3363
        ext->value = *asn1str;
3364
        if (asn1str->isDynamic) {
3365
            ext->value.data = (char*)XMALLOC(asn1str->length, NULL,
3366
                                             DYNAMIC_TYPE_OPENSSL);
3367
            if (!ext->value.data) {
3368
                WOLFSSL_MSG("malloc failed");
3369
                /* Zero so that no existing memory is freed */
3370
                XMEMSET(&ext->value, 0, sizeof(WOLFSSL_ASN1_STRING));
3371
                goto err_cleanup;
3372
            }
3373
            XMEMCPY(ext->value.data, asn1str->data, asn1str->length);
3374
        }
3375
        else {
3376
            ext->value.data = ext->value.strData;
3377
        }
3378
3379
        if (!(ext->obj = wolfSSL_OBJ_nid2obj(nid))) {
3380
            WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
3381
            goto err_cleanup;
3382
        }
3383
3384
        break;
3385
    }
3386
    case WC_NID_subject_alt_name:
3387
        /* typedef STACK_OF(GENERAL_NAME) GENERAL_NAMES */
3388
    case WC_NID_issuer_alt_name:
3389
        /* typedef STACK_OF(GENERAL_NAME) GENERAL_NAMES */
3390
    case WC_NID_ext_key_usage:
3391
        /* typedef STACK_OF(ASN1_OBJECT) EXTENDED_KEY_USAGE */
3392
    case WC_NID_info_access:
3393
        /* typedef STACK_OF(ACCESS_DESCRIPTION) AUTHORITY_INFO_ACCESS */
3394
    {
3395
        WOLFSSL_STACK* sk = (WOLFSSL_STACK*)data;
3396
3397
        if (ext->ext_sk) {
3398
            wolfSSL_sk_pop_free(ext->ext_sk, NULL);
3399
        }
3400
3401
        if (!(ext->ext_sk = wolfSSL_sk_dup(sk))) {
3402
            WOLFSSL_MSG("wolfSSL_sk_dup failed");
3403
            goto err_cleanup;
3404
        }
3405
3406
        if (!(ext->obj = wolfSSL_OBJ_nid2obj(nid))) {
3407
            WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
3408
            goto err_cleanup;
3409
        }
3410
3411
        break;
3412
    }
3413
    case WC_NID_basic_constraints:
3414
    {
3415
        /* WOLFSSL_BASIC_CONSTRAINTS */
3416
        WOLFSSL_BASIC_CONSTRAINTS* bc = (WOLFSSL_BASIC_CONSTRAINTS*)data;
3417
3418
        if (!(ext->obj = wolfSSL_ASN1_OBJECT_new())) {
3419
            WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
3420
            goto err_cleanup;
3421
        }
3422
3423
        ext->obj->ca = bc->ca;
3424
        if (bc->pathlen) {
3425
            ext->obj->pathlen = wolfSSL_ASN1_INTEGER_dup(bc->pathlen);
3426
            if (!ext->obj->pathlen) {
3427
                WOLFSSL_MSG("wolfSSL_ASN1_INTEGER_dup failed");
3428
                goto err_cleanup;
3429
            }
3430
        }
3431
        break;
3432
    }
3433
    case WC_NID_authority_key_identifier:
3434
    {
3435
        /* AUTHORITY_KEYID */
3436
        WOLFSSL_AUTHORITY_KEYID* akey = (WOLFSSL_AUTHORITY_KEYID*)data;
3437
3438
        if (akey->keyid) {
3439
            if (wolfSSL_ASN1_STRING_set(&ext->value, akey->keyid->data,
3440
                                    akey->keyid->length) != WOLFSSL_SUCCESS) {
3441
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set failed");
3442
                goto err_cleanup;
3443
            }
3444
            ext->value.type = akey->keyid->type;
3445
3446
            if (!(ext->obj = wolfSSL_OBJ_nid2obj(nid))) {
3447
                WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
3448
                goto err_cleanup;
3449
            }
3450
3451
        }
3452
        else if (akey->issuer) {
3453
            ext->obj = wolfSSL_ASN1_OBJECT_dup(akey->issuer);
3454
            if (!ext->obj) {
3455
                WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_dup failed");
3456
                goto err_cleanup;
3457
            }
3458
        }
3459
        else {
3460
            WOLFSSL_MSG("WC_NID_authority_key_identifier empty data");
3461
            goto err_cleanup;
3462
        }
3463
        break;
3464
    }
3465
    case WC_NID_inhibit_any_policy:
3466
        /* ASN1_INTEGER */
3467
    case WC_NID_certificate_policies:
3468
        /* STACK_OF(POLICYINFO) */
3469
    case WC_NID_policy_mappings:
3470
        /* STACK_OF(POLICY_MAPPING) */
3471
    case WC_NID_name_constraints:
3472
        /* NAME_CONSTRAINTS */
3473
    case WC_NID_policy_constraints:
3474
        /* POLICY_CONSTRAINTS */
3475
    case WC_NID_crl_distribution_points:
3476
        /* typedef STACK_OF(DIST_POINT) CRL_DIST_POINTS */
3477
    default:
3478
        WOLFSSL_MSG("Unknown or unsupported NID");
3479
        break;
3480
    }
3481
3482
    ext->crit = crit;
3483
3484
    return ext;
3485
err_cleanup:
3486
    if (ext) {
3487
        wolfSSL_X509_EXTENSION_free(ext);
3488
    }
3489
    return NULL;
3490
}
3491
3492
/* Returns pointer to ASN1_OBJECT from an X509_EXTENSION object */
3493
WOLFSSL_ASN1_OBJECT* wolfSSL_X509_EXTENSION_get_object(
3494
    WOLFSSL_X509_EXTENSION* ext)
3495
{
3496
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_get_object");
3497
    if (ext == NULL)
3498
        return NULL;
3499
    return ext->obj;
3500
}
3501
3502
3503
/**
3504
 * duplicates the 'obj' input and sets it into the 'ext' structure
3505
 * returns WOLFSSL_SUCCESS on success
3506
 */
3507
int wolfSSL_X509_EXTENSION_set_object(WOLFSSL_X509_EXTENSION* ext,
3508
        const WOLFSSL_ASN1_OBJECT* obj)
3509
{
3510
    WOLFSSL_ASN1_OBJECT *current;
3511
3512
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_set_object");
3513
    if (ext == NULL)
3514
        return WOLFSSL_FAILURE;
3515
3516
    current = wolfSSL_X509_EXTENSION_get_object(ext);
3517
    if (current != NULL) {
3518
        wolfSSL_ASN1_OBJECT_free(current);
3519
    }
3520
    ext->obj = wolfSSL_ASN1_OBJECT_dup((WOLFSSL_ASN1_OBJECT*)obj);
3521
    return WOLFSSL_SUCCESS;
3522
}
3523
#endif /* OPENSSL_ALL */
3524
3525
#ifdef WOLFSSL_OLD_EXTDATA_FMT
3526
/*
3527
 * Replace the current string in 'asn1str', which is the full X.509
3528
 * extension octet string with some data specific for the extension
3529
 * type. The extension is the one given in 'oid'.
3530
 * Return 0 in case of success, or a negative error code.
3531
 */
3532
static int wolfSSL_ASN1_STRING_into_old_ext_fmt(WOLFSSL_ASN1_STRING *asn1str,
3533
                                                word32 oid)
3534
{
3535
    switch (oid)
3536
    {
3537
        case AUTH_INFO_OID:
3538
            wolfSSL_ASN1_STRING_clear(asn1str);
3539
            asn1str->data = NULL;
3540
            asn1str->length = 0;
3541
            return 0;
3542
3543
        case AUTH_KEY_OID:
3544
        {
3545
            int ret = 0;
3546
            const byte *extAuthKeyId = NULL;
3547
            word32 extAuthKeyIdSz = 0;
3548
            char *data = NULL;
3549
3550
            ret = DecodeAuthKeyId((const byte *)asn1str->data, asn1str->length,
3551
                    &extAuthKeyId, &extAuthKeyIdSz, NULL, NULL, NULL, NULL);
3552
3553
            if (ret != 0)
3554
                return ret;
3555
3556
            data = (char*)XMALLOC((size_t)(extAuthKeyIdSz), NULL,
3557
                                  DYNAMIC_TYPE_OPENSSL);
3558
            if (data == NULL)
3559
                return MEMORY_ERROR;
3560
3561
            XMEMCPY(data, extAuthKeyId, (size_t)extAuthKeyIdSz);
3562
            wolfSSL_ASN1_STRING_set(asn1str, data, extAuthKeyIdSz);
3563
            XFREE(data, NULL, DYNAMIC_TYPE_OPENSSL);
3564
            return 0;
3565
        }
3566
3567
        case SUBJ_KEY_OID:
3568
        {
3569
            int ret = 0;
3570
            const byte *extSubjKeyId = NULL;
3571
            word32 extSubjKeyIdSz = 0;
3572
            char *data = NULL;
3573
3574
            ret = DecodeSubjKeyId((const byte *)asn1str->data, asn1str->length,
3575
                    &extSubjKeyId, &extSubjKeyIdSz);
3576
            if (ret != 0)
3577
                return ret;
3578
3579
            data = (char*)XMALLOC((size_t)(extSubjKeyIdSz), NULL,
3580
                                  DYNAMIC_TYPE_OPENSSL);
3581
            if (data == NULL)
3582
                return MEMORY_ERROR;
3583
3584
            XMEMCPY(data, extSubjKeyId, (size_t)extSubjKeyIdSz);
3585
            wolfSSL_ASN1_STRING_set(asn1str, data, extSubjKeyIdSz);
3586
            XFREE(data, NULL, DYNAMIC_TYPE_OPENSSL);
3587
            return 0;
3588
        }
3589
3590
        case CERT_POLICY_OID:
3591
            wolfSSL_ASN1_STRING_clear(asn1str);
3592
            asn1str->data = NULL;
3593
            asn1str->length = 0;
3594
            return 0;
3595
3596
        case KEY_USAGE_OID:
3597
        {
3598
            int ret = 0;
3599
            word16 extKeyUsage = 0;
3600
3601
            ret = DecodeKeyUsage((const byte *)asn1str->data, asn1str->length,
3602
                    &extKeyUsage);
3603
            if (ret != 0)
3604
                return ret;
3605
3606
            wolfSSL_ASN1_STRING_set(asn1str, (byte*)&extKeyUsage,
3607
                                    sizeof(extKeyUsage));
3608
            return 0;
3609
        }
3610
3611
        case EXT_KEY_USAGE_OID:
3612
        {
3613
            int ret = 0;
3614
            const byte *extExtKeyUsageSrc = NULL;
3615
            word32 extExtKeyUsageSz = 0;
3616
            word32 extExtKeyUsageCount = 0;
3617
            byte extExtKeyUsage = 0;
3618
            byte extExtKeyUsageSsh = 0;
3619
            char *data = NULL;
3620
3621
            ret = DecodeExtKeyUsage((const byte*)asn1str->data, asn1str->length,
3622
                    &extExtKeyUsageSrc, &extExtKeyUsageSz, &extExtKeyUsageCount,
3623
                    &extExtKeyUsage, &extExtKeyUsageSsh);
3624
            if (ret != 0)
3625
                return ret;
3626
3627
            data = (char*)XMALLOC((size_t)(extExtKeyUsageSz), NULL,
3628
                                  DYNAMIC_TYPE_OPENSSL);
3629
            if (data == NULL)
3630
                return MEMORY_ERROR;
3631
3632
            XMEMCPY(data, extExtKeyUsageSrc, (size_t)extExtKeyUsageSz);
3633
            wolfSSL_ASN1_STRING_set(asn1str, data, extExtKeyUsageSz);
3634
            XFREE(data, NULL, DYNAMIC_TYPE_OPENSSL);
3635
            return 0;
3636
        }
3637
3638
        case CRL_DIST_OID:
3639
            wolfSSL_ASN1_STRING_clear(asn1str);
3640
            asn1str->data = NULL;
3641
            asn1str->length = 0;
3642
            return 0;
3643
3644
        default:
3645
            /* Do nothing, it is already set */
3646
            return 0;
3647
    }
3648
}
3649
#endif /* WOLFSSL_OLD_EXTDATA_FMT */
3650
3651
/* Returns pointer to ASN1_STRING in X509_EXTENSION object */
3652
WOLFSSL_ASN1_STRING* wolfSSL_X509_EXTENSION_get_data(
3653
    WOLFSSL_X509_EXTENSION* ext)
3654
{
3655
    WOLFSSL_ASN1_STRING *ret;
3656
3657
    ret =  wolfSSL_X509_EXTENSION_get_data_internal(ext);
3658
3659
#ifdef WOLFSSL_OLD_EXTDATA_FMT
3660
    if (ret)
3661
    {
3662
        int error;
3663
        error = wolfSSL_ASN1_STRING_into_old_ext_fmt (ret, ext->obj->type);
3664
        if (error != 0)
3665
        {
3666
            WOLFSSL_MSG("Error calling wolfSSL_ASN1_STRING_into_old_ext_fmt");
3667
            return NULL;
3668
        }
3669
    }
3670
#endif
3671
3672
    return ret;
3673
}
3674
3675
3676
/**
3677
 * Creates a duplicate of input 'data' and sets it into 'ext' structure
3678
 * returns WOLFSSL_SUCCESS on success
3679
 */
3680
int wolfSSL_X509_EXTENSION_set_data(WOLFSSL_X509_EXTENSION* ext,
3681
        WOLFSSL_ASN1_STRING* data)
3682
{
3683
    WOLFSSL_ASN1_STRING* current;
3684
3685
    if (ext == NULL || data == NULL)
3686
        return WOLFSSL_FAILURE;
3687
3688
    current = wolfSSL_X509_EXTENSION_get_data_internal(ext);
3689
    if (current->length > 0 && current->data != NULL && current->isDynamic) {
3690
        XFREE(current->data, NULL, DYNAMIC_TYPE_OPENSSL);
3691
    }
3692
3693
    return wolfSSL_ASN1_STRING_copy(&ext->value, data);
3694
}
3695
3696
#if !defined(NO_PWDBASED)
3697
int wolfSSL_X509_digest(const WOLFSSL_X509* x509, const WOLFSSL_EVP_MD* digest,
3698
        unsigned char* buf, unsigned int* len)
3699
{
3700
    int ret;
3701
3702
    WOLFSSL_ENTER("wolfSSL_X509_digest");
3703
3704
    if (x509 == NULL || digest == NULL) {
3705
        WOLFSSL_MSG("Null argument found");
3706
        return WOLFSSL_FAILURE;
3707
    }
3708
3709
    if (x509->derCert == NULL) {
3710
        WOLFSSL_MSG("No DER certificate stored in X509");
3711
        return WOLFSSL_FAILURE;
3712
    }
3713
3714
    ret = wolfSSL_EVP_Digest(x509->derCert->buffer, x509->derCert->length, buf,
3715
                              len, digest, NULL);
3716
    WOLFSSL_LEAVE("wolfSSL_X509_digest", ret);
3717
    return ret;
3718
}
3719
3720
int wolfSSL_X509_pubkey_digest(const WOLFSSL_X509 *x509,
3721
        const WOLFSSL_EVP_MD *digest, unsigned char* buf, unsigned int* len)
3722
{
3723
    int ret;
3724
3725
    WOLFSSL_ENTER("wolfSSL_X509_pubkey_digest");
3726
3727
    if (x509 == NULL || digest == NULL) {
3728
        WOLFSSL_MSG("Null argument found");
3729
        return WOLFSSL_FAILURE;
3730
    }
3731
3732
    if (x509->pubKey.buffer == NULL || x509->pubKey.length == 0) {
3733
        WOLFSSL_MSG("No DER public key stored in X509");
3734
        return WOLFSSL_FAILURE;
3735
    }
3736
3737
    ret = wolfSSL_EVP_Digest(x509->pubKey.buffer, x509->pubKey.length, buf,
3738
                              len, digest, NULL);
3739
    WOLFSSL_LEAVE("wolfSSL_X509_pubkey_digest", ret);
3740
    return ret;
3741
}
3742
#endif
3743
3744
#endif /* OPENSSL_EXTRA */
3745
3746
#ifdef OPENSSL_EXTRA
3747
3748
    #ifndef NO_WOLFSSL_STUB
3749
    const char* wolfSSL_X509_get_default_cert_file_env(void)
3750
    {
3751
        WOLFSSL_STUB("X509_get_default_cert_file_env");
3752
        return "";
3753
    }
3754
3755
    const char* wolfSSL_X509_get_default_cert_file(void)
3756
    {
3757
        WOLFSSL_STUB("X509_get_default_cert_file");
3758
        return "";
3759
    }
3760
3761
    const char* wolfSSL_X509_get_default_cert_dir_env(void)
3762
    {
3763
        WOLFSSL_STUB("X509_get_default_cert_dir_env");
3764
        return "";
3765
    }
3766
3767
    const char* wolfSSL_X509_get_default_cert_dir(void)
3768
    {
3769
        WOLFSSL_STUB("X509_get_default_cert_dir");
3770
        return "";
3771
    }
3772
    #endif
3773
3774
#endif /* OPENSSL_EXTRA */
3775
3776
#if defined(KEEP_PEER_CERT) || defined(SESSION_CERTS) || \
3777
    defined(KEEP_OUR_CERT) || \
3778
    defined(OPENSSL_EXTRA)  || defined(OPENSSL_EXTRA_X509_SMALL)
3779
3780
/* user externally called free X509, if dynamic go ahead with free, otherwise
3781
 * don't */
3782
static void ExternalFreeX509(WOLFSSL_X509* x509)
3783
{
3784
#if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
3785
    int doFree = 0;
3786
#endif
3787
3788
    WOLFSSL_ENTER("ExternalFreeX509");
3789
    if (x509) {
3790
#ifdef HAVE_EX_DATA_CLEANUP_HOOKS
3791
        wolfSSL_CRYPTO_cleanup_ex_data(&x509->ex_data);
3792
#endif
3793
        if (x509->dynamicMemory) {
3794
        #if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
3795
            int ret;
3796
            wolfSSL_RefDec(&x509->ref, &doFree, &ret);
3797
            if (ret != 0) {
3798
                WOLFSSL_MSG("Couldn't lock x509 mutex");
3799
            }
3800
            if (doFree)
3801
        #endif /* OPENSSL_EXTRA_X509_SMALL || OPENSSL_EXTRA */
3802
            {
3803
                FreeX509(x509);
3804
                XFREE(x509, x509->heap, DYNAMIC_TYPE_X509);
3805
            }
3806
        }
3807
        else {
3808
            WOLFSSL_MSG("free called on non dynamic object, not freeing");
3809
        }
3810
    }
3811
}
3812
3813
/* Frees an external WOLFSSL_X509 structure */
3814
WOLFSSL_ABI
3815
void wolfSSL_X509_free(WOLFSSL_X509* x509)
3816
{
3817
    WOLFSSL_ENTER("wolfSSL_X509_free");
3818
    ExternalFreeX509(x509);
3819
}
3820
#endif
3821
3822
#if defined(KEEP_PEER_CERT) || defined(SESSION_CERTS) || \
3823
    defined(OPENSSL_EXTRA)  || defined(OPENSSL_EXTRA_X509_SMALL)
3824
3825
/* copy name into in buffer, at most sz bytes, if buffer is null will
3826
   malloc buffer, call responsible for freeing                     */
3827
WOLFSSL_ABI
3828
char* wolfSSL_X509_NAME_oneline(WOLFSSL_X509_NAME* name, char* in, int sz)
3829
{
3830
    int copySz;
3831
3832
    WOLFSSL_ENTER("wolfSSL_X509_NAME_oneline");
3833
3834
    if (name == NULL) {
3835
        WOLFSSL_MSG("WOLFSSL_X509_NAME pointer was NULL");
3836
        return NULL;
3837
    }
3838
3839
    if (name->sz == 0)
3840
        return in;
3841
3842
    if (!in) {
3843
    #ifdef WOLFSSL_STATIC_MEMORY
3844
        WOLFSSL_MSG("Using static memory -- please pass in a buffer");
3845
        return NULL;
3846
    #else
3847
        in = (char*)XMALLOC(name->sz, NULL, DYNAMIC_TYPE_OPENSSL);
3848
        if (!in)
3849
            return in;
3850
        copySz = name->sz;
3851
    #endif
3852
    }
3853
    else {
3854
        copySz = (int)min((word32)sz, (word32)name->sz);
3855
        if (copySz <= 0)
3856
            return in;
3857
    }
3858
3859
    XMEMCPY(in, name->name, copySz - 1);
3860
    in[copySz - 1] = 0;
3861
3862
    return in;
3863
}
3864
3865
#ifdef OPENSSL_EXTRA
3866
/* Given an X509_NAME, convert it to canonical form and then hash
3867
 * with the provided hash type. Returns the first 4 bytes of the hash
3868
 * as unsigned long on success, and 0 otherwise. */
3869
static unsigned long X509NameHash(WOLFSSL_X509_NAME* name,
3870
    enum wc_HashType hashType)
3871
{
3872
    unsigned long  hash = 0;
3873
    unsigned char* canonName = NULL;
3874
    byte           digest[WC_MAX_DIGEST_SIZE];
3875
    int            size = 0;
3876
    int            rc;
3877
3878
    WOLFSSL_ENTER("X509NameHash");
3879
3880
    if (name == NULL) {
3881
        WOLFSSL_ERROR_MSG("WOLFSSL_X509_NAME pointer was NULL");
3882
        return 0;
3883
    }
3884
3885
    if (name->sz == 0) {
3886
        WOLFSSL_ERROR_MSG("Nothing to hash in WOLFSSL_X509_NAME");
3887
        return 0;
3888
    }
3889
3890
    size = wolfSSL_i2d_X509_NAME_canon(name, &canonName);
3891
3892
    if (size <= 0 || canonName == NULL) {
3893
        WOLFSSL_ERROR_MSG("wolfSSL_i2d_X509_NAME_canon error");
3894
        return 0;
3895
    }
3896
3897
    rc = wc_Hash(hashType, (const byte*)canonName, (word32)size, digest,
3898
        sizeof(digest));
3899
3900
    if (rc == 0) {
3901
        hash = (((unsigned long)digest[3] << 24) |
3902
                ((unsigned long)digest[2] << 16) |
3903
                ((unsigned long)digest[1] <<  8) |
3904
                ((unsigned long)digest[0]));
3905
    }
3906
    else if (rc == WC_NO_ERR_TRACE(HASH_TYPE_E)) {
3907
        WOLFSSL_ERROR_MSG("Hash function not compiled in");
3908
    }
3909
    else {
3910
        WOLFSSL_ERROR_MSG("Error hashing name");
3911
    }
3912
3913
    XFREE(canonName, NULL, DYNAMIC_TYPE_OPENSSL);
3914
    return hash;
3915
}
3916
3917
unsigned long wolfSSL_X509_NAME_hash(WOLFSSL_X509_NAME* name)
3918
{
3919
    return X509NameHash(name, WC_HASH_TYPE_SHA);
3920
}
3921
3922
/******************************************************************************
3923
* wolfSSL_X509_subject_name_hash
3924
* wolfSSL_X509_issuer_name_hash
3925
* Compute the hash digest of the subject / issuer name.
3926
* These functions prefer SHA-1 (if available) for compatibility. Otherwise
3927
* they use SHA-256.
3928
*
3929
* RETURNS:
3930
* The first 4 bytes of SHA-1 (or SHA-256) hash in little endian order as
3931
* unsigned long.
3932
* Otherwise, returns zero.
3933
*
3934
* Note:
3935
* Returns the same hash value as OpenSSL's X509_X_name_hash() API
3936
* if SHA-1 support is compiled in. SHA-256 will be used if SHA-1 is
3937
* not available.
3938
*/
3939
unsigned long wolfSSL_X509_subject_name_hash(const WOLFSSL_X509* x509)
3940
{
3941
    if (x509 == NULL) {
3942
        WOLFSSL_ERROR_MSG("WOLFSSL_X509 pointer was NULL");
3943
        return 0;
3944
    }
3945
3946
    #ifndef NO_SHA
3947
    return X509NameHash((WOLFSSL_X509_NAME*) &x509->subject, WC_HASH_TYPE_SHA);
3948
    #elif !defined(NO_SHA256)
3949
    return X509NameHash((WOLFSSL_X509_NAME*) &x509->subject,
3950
                        WC_HASH_TYPE_SHA256);
3951
    #else
3952
    WOLFSSL_ERROR_MSG("Hash function not compiled in");
3953
    return 0;
3954
    #endif
3955
}
3956
3957
unsigned long wolfSSL_X509_issuer_name_hash(const WOLFSSL_X509* x509)
3958
{
3959
    if (x509 == NULL) {
3960
        WOLFSSL_ERROR_MSG("WOLFSSL_X509 pointer was NULL");
3961
        return 0;
3962
    }
3963
3964
    #ifndef NO_SHA
3965
    return X509NameHash((WOLFSSL_X509_NAME*) &x509->issuer, WC_HASH_TYPE_SHA);
3966
    #elif !defined(NO_SHA256)
3967
    return X509NameHash((WOLFSSL_X509_NAME*) &x509->issuer,
3968
                        WC_HASH_TYPE_SHA256);
3969
    #else
3970
    WOLFSSL_ERROR_MSG("Hash function not compiled in");
3971
    return 0;
3972
    #endif
3973
}
3974
#endif /* OPENSSL_EXTRA */
3975
3976
#if defined(OPENSSL_EXTRA) && defined(XSNPRINTF)
3977
/* Copies X509 subject name into a buffer, with comma-separated name entries
3978
 *   (matching OpenSSL v1.0.0 format)
3979
 * Example Output for Issuer:
3980
 *
3981
 * C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting,
3982
 *  CN=www.wolfssl.com, emailAddress=info@wolfssl.com
3983
 */
3984
char* wolfSSL_X509_get_name_oneline(WOLFSSL_X509_NAME* name, char* in, int sz)
3985
{
3986
    int count, i;
3987
    int totalLen = 0;
3988
    char tmpBuf[256];
3989
    WOLFSSL_ENTER("wolfSSL_X509_get_name_oneline");
3990
3991
    if (name == NULL) {
3992
        WOLFSSL_MSG("wolfSSL_X509_get_name_oneline failed");
3993
        return NULL;
3994
    }
3995
    #ifdef WOLFSSL_STATIC_MEMORY
3996
    if (!in) {
3997
        WOLFSSL_MSG("Using static memory -- please pass in a buffer");
3998
        return NULL;
3999
    }
4000
    #endif
4001
4002
    /* Loop through X509 name entries and copy new format to buffer */
4003
    count = wolfSSL_X509_NAME_entry_count(name);
4004
    for (i = 0; i < count; i++) {
4005
        WOLFSSL_X509_NAME_ENTRY* entry;
4006
        int nameSz;
4007
        int strSz;
4008
        int strLen;
4009
        char *str;
4010
        const int tmpBufSz = sizeof(tmpBuf);
4011
        char buf[80];
4012
        const char* sn;
4013
4014
        /* Get name entry and size */
4015
        entry = wolfSSL_X509_NAME_get_entry(name, i);
4016
        if (entry == NULL) {
4017
            WOLFSSL_MSG("wolfSSL_X509_NAME_get_entry failed");
4018
            return NULL;
4019
        }
4020
        nameSz = wolfSSL_X509_NAME_get_text_by_NID(name, entry->nid, buf,
4021
                                                                   sizeof(buf));
4022
        if (nameSz < 0) {
4023
            WOLFSSL_MSG("wolfSSL_X509_NAME_get_text_by_NID failed");
4024
            return NULL;
4025
        }
4026
4027
        /* Get short name */
4028
        sn = wolfSSL_OBJ_nid2sn(entry->nid);
4029
        if (sn == NULL) {
4030
            WOLFSSL_MSG("OBJ_nid2sn failed");
4031
            return NULL;
4032
        }
4033
4034
        /* Copy sn and name text to buffer
4035
         * Add extra strSz for '=', ',', ' ' and '\0' characters in XSNPRINTF.
4036
         */
4037
        if (i != count - 1) {
4038
            strSz = (int)XSTRLEN(sn) + nameSz + 4;
4039
            str = (char*)XMALLOC(strSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
4040
            if (str == NULL) {
4041
                WOLFSSL_MSG("Memory error");
4042
                return NULL;
4043
            }
4044
            strLen = XSNPRINTF(str, (size_t)strSz, "%s=%s, ", sn, buf);
4045
            if ((strLen  < 0) || (strLen  >= strSz)) {
4046
                WOLFSSL_MSG("buffer overrun");
4047
                XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
4048
                return NULL;
4049
            }
4050
        }
4051
        else {
4052
            /* Copy last name entry
4053
            * Add extra strSz for '=' and '\0' characters in XSNPRINTF.
4054
            */
4055
            strSz = (int)XSTRLEN(sn) + nameSz + 2;
4056
            str = (char*)XMALLOC(strSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
4057
            if (str == NULL) {
4058
                WOLFSSL_MSG("Memory error");
4059
                return NULL;
4060
            }
4061
            strLen = XSNPRINTF(str, (size_t)strSz, "%s=%s", sn, buf);
4062
            if ((strLen  < 0) || (strLen  >= strSz)) {
4063
                WOLFSSL_MSG("buffer overrun");
4064
                XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
4065
                return NULL;
4066
            }
4067
        }
4068
        /* Copy string to tmpBuf */
4069
        if (totalLen + strLen > tmpBufSz) {
4070
            WOLFSSL_MSG("buffer overrun");
4071
            XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
4072
            return NULL;
4073
        }
4074
        XMEMCPY(tmpBuf + totalLen, str, strLen);
4075
        totalLen += strLen;
4076
        XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
4077
    }
4078
4079
    /* Allocate space based on total string size if no buffer was provided */
4080
    if (!in) {
4081
        in = (char*)XMALLOC(totalLen+1, NULL, DYNAMIC_TYPE_OPENSSL);
4082
        if (in == NULL) {
4083
            WOLFSSL_MSG("Memory error");
4084
            return in;
4085
        }
4086
    }
4087
    else {
4088
        if (totalLen + 1 > sz) {
4089
            WOLFSSL_MSG("buffer overrun");
4090
            return NULL;
4091
        }
4092
    }
4093
4094
    XMEMCPY(in, tmpBuf, totalLen); /* cppcheck-suppress uninitvar */
4095
    in[totalLen] = '\0';
4096
4097
    return in;
4098
}
4099
#endif
4100
4101
4102
/* Wraps wolfSSL_X509_d2i
4103
 *
4104
 * returns a WOLFSSL_X509 structure pointer on success and NULL on fail
4105
 */
4106
WOLFSSL_X509* wolfSSL_d2i_X509(WOLFSSL_X509** x509, const unsigned char** in,
4107
        int len)
4108
{
4109
    WOLFSSL_X509* newX509 = NULL;
4110
    WOLFSSL_ENTER("wolfSSL_d2i_X509");
4111
4112
    if (in == NULL) {
4113
        WOLFSSL_MSG("NULL input for wolfSSL_d2i_X509");
4114
        return NULL;
4115
    }
4116
4117
    newX509 = wolfSSL_X509_d2i(x509, *in, len);
4118
    if (newX509 != NULL) {
4119
        *in += newX509->derCert->length;
4120
    }
4121
    return newX509;
4122
}
4123
4124
static WOLFSSL_X509* d2i_X509orX509REQ(WOLFSSL_X509** x509,
4125
                                  const byte* in, int len, int req, void* heap)
4126
{
4127
    WOLFSSL_X509 *newX509 = NULL;
4128
    int type = req ? CERTREQ_TYPE : CERT_TYPE;
4129
4130
    WOLFSSL_ENTER("wolfSSL_X509_d2i");
4131
4132
    if (in != NULL && len != 0
4133
    #ifndef WOLFSSL_CERT_REQ
4134
            && req == 0
4135
    #else
4136
            && (req == 0 || req == 1)
4137
    #endif
4138
            ) {
4139
        WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
4140
4141
        WC_ALLOC_VAR_EX(cert, DecodedCert, 1, NULL, DYNAMIC_TYPE_DCERT,
4142
            return NULL);
4143
4144
        InitDecodedCert(cert, (byte*)in, (word32)len, heap);
4145
    #ifdef WOLFSSL_CERT_REQ
4146
        cert->isCSR = (byte)req;
4147
    #endif
4148
        if (ParseCertRelative(cert, type, 0, NULL, NULL) == 0) {
4149
            newX509 = wolfSSL_X509_new_ex(heap);
4150
            if (newX509 != NULL) {
4151
                if (CopyDecodedToX509(newX509, cert) != 0) {
4152
                    wolfSSL_X509_free(newX509);
4153
                    newX509 = NULL;
4154
                }
4155
            }
4156
        }
4157
        FreeDecodedCert(cert);
4158
        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
4159
    }
4160
4161
    if (x509 != NULL)
4162
        *x509 = newX509;
4163
4164
    return newX509;
4165
}
4166
4167
int wolfSSL_X509_get_isCA(WOLFSSL_X509* x509)
4168
{
4169
    int isCA = 0;
4170
4171
    WOLFSSL_ENTER("wolfSSL_X509_get_isCA");
4172
4173
    if (x509 != NULL)
4174
        isCA = x509->isCa;
4175
4176
    WOLFSSL_LEAVE("wolfSSL_X509_get_isCA", isCA);
4177
4178
    return isCA;
4179
}
4180
4181
WOLFSSL_X509* wolfSSL_X509_d2i_ex(WOLFSSL_X509** x509, const byte* in, int len,
4182
    void* heap)
4183
{
4184
    return d2i_X509orX509REQ(x509, in, len, 0, heap);
4185
}
4186
4187
WOLFSSL_X509* wolfSSL_X509_d2i(WOLFSSL_X509** x509, const byte* in, int len)
4188
{
4189
    return wolfSSL_X509_d2i_ex(x509, in, len, NULL);
4190
}
4191
4192
#ifdef WOLFSSL_CERT_REQ
4193
WOLFSSL_X509* wolfSSL_X509_REQ_d2i(WOLFSSL_X509** x509,
4194
        const unsigned char* in, int len)
4195
{
4196
    return d2i_X509orX509REQ(x509, in, len, 1, NULL);
4197
}
4198
4199
WOLFSSL_X509* wolfSSL_d2i_X509_REQ_INFO(WOLFSSL_X509** req,
4200
        const unsigned char** in, int len)
4201
{
4202
    WOLFSSL_X509* ret = NULL;
4203
    WOLFSSL_ENTER("wolfSSL_d2i_X509_REQ_INFO");
4204
4205
    if (in == NULL) {
4206
        WOLFSSL_MSG("NULL input for wolfSSL_d2i_X509");
4207
        return NULL;
4208
    }
4209
4210
    ret = wolfSSL_X509_REQ_d2i(req, *in, len);
4211
    if (ret != NULL) {
4212
        *in += ret->derCert->length;
4213
    }
4214
    return ret;
4215
}
4216
#endif
4217
4218
#endif /* KEEP_PEER_CERT || SESSION_CERTS || OPENSSL_EXTRA ||
4219
          OPENSSL_EXTRA_X509_SMALL */
4220
4221
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
4222
/* returns the number of entries in the WOLFSSL_X509_NAME */
4223
int wolfSSL_X509_NAME_entry_count(WOLFSSL_X509_NAME* name)
4224
{
4225
    int count = 0;
4226
4227
    WOLFSSL_ENTER("wolfSSL_X509_NAME_entry_count");
4228
4229
    if (name != NULL)
4230
        count = name->entrySz;
4231
4232
    WOLFSSL_LEAVE("wolfSSL_X509_NAME_entry_count", count);
4233
    return count;
4234
}
4235
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
4236
4237
#if defined(OPENSSL_EXTRA) || \
4238
    defined(KEEP_OUR_CERT) || defined(KEEP_PEER_CERT)
4239
4240
/* return the next, if any, altname from the peer cert */
4241
WOLFSSL_ABI
4242
char* wolfSSL_X509_get_next_altname(WOLFSSL_X509* cert)
4243
{
4244
    char* ret = NULL;
4245
    WOLFSSL_ENTER("wolfSSL_X509_get_next_altname");
4246
4247
    /* don't have any to work with */
4248
    if (cert == NULL || cert->altNames == NULL)
4249
        return NULL;
4250
4251
    /* already went through them */
4252
    if (cert->altNamesNext == NULL) {
4253
#ifdef WOLFSSL_MULTICIRCULATE_ALTNAMELIST
4254
        /* Reset altNames List to head
4255
         * so that caller can circulate the list again
4256
         */
4257
        cert->altNamesNext = cert->altNames;
4258
#endif
4259
        return NULL;
4260
    }
4261
4262
    ret = cert->altNamesNext->name;
4263
#ifdef WOLFSSL_IP_ALT_NAME
4264
    /* return the IP address as a string */
4265
    if (cert->altNamesNext->type == ASN_IP_TYPE) {
4266
        ret = cert->altNamesNext->ipString;
4267
    }
4268
#endif
4269
    cert->altNamesNext = cert->altNamesNext->next;
4270
4271
    return ret;
4272
}
4273
4274
int wolfSSL_X509_get_signature(WOLFSSL_X509* x509,
4275
                                                unsigned char* buf, int* bufSz)
4276
{
4277
    WOLFSSL_ENTER("wolfSSL_X509_get_signature");
4278
    if (x509 == NULL || bufSz == NULL || (*bufSz < (int)x509->sig.length &&
4279
                buf != NULL))
4280
        return WOLFSSL_FATAL_ERROR;
4281
4282
    if (buf != NULL)
4283
        XMEMCPY(buf, x509->sig.buffer, x509->sig.length);
4284
    *bufSz = (int)x509->sig.length;
4285
4286
    return WOLFSSL_SUCCESS;
4287
}
4288
4289
4290
/* Getter function that copies over the DER public key buffer to "buf" and
4291
    * sets the size in bufSz. If "buf" is NULL then just bufSz is set to needed
4292
    * buffer size. "bufSz" passed in should initially be set by the user to be
4293
    * the size of "buf". This gets checked to make sure the buffer is large
4294
    * enough to hold the public key.
4295
    *
4296
    * Note: this is the X.509 form of key with "header" info.
4297
    * return WOLFSSL_SUCCESS on success
4298
    */
4299
int wolfSSL_X509_get_pubkey_buffer(WOLFSSL_X509* x509,
4300
                                            unsigned char* buf, int* bufSz)
4301
{
4302
    WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
4303
    const byte*  der;
4304
    int length = 0;
4305
    int    ret = 0, derSz = 0;
4306
    int badDate = 0;
4307
    const byte* pubKeyX509 = NULL;
4308
    int   pubKeyX509Sz = 0;
4309
4310
    WOLFSSL_ENTER("wolfSSL_X509_get_pubkey_buffer");
4311
    if (x509 == NULL || bufSz == NULL) {
4312
        WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", BAD_FUNC_ARG);
4313
        return WOLFSSL_FATAL_ERROR;
4314
    }
4315
4316
4317
#ifdef WOLFSSL_SMALL_STACK
4318
    cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert),
4319
                                    x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
4320
    if (cert == NULL) {
4321
        WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", MEMORY_E);
4322
        return WOLFSSL_FATAL_ERROR;
4323
    }
4324
#endif
4325
4326
    der = wolfSSL_X509_get_der(x509, &derSz);
4327
    if (der != NULL) {
4328
        InitDecodedCert(cert, der, (word32)derSz, NULL);
4329
        ret = wc_GetPubX509(cert, 0, &badDate);
4330
        if (ret >= 0) {
4331
            word32 idx = cert->srcIdx;
4332
            pubKeyX509 = cert->source + cert->srcIdx;
4333
            ret = GetSequence(cert->source, &cert->srcIdx, &length,
4334
                    cert->maxIdx);
4335
            pubKeyX509Sz = length + (cert->srcIdx - idx);
4336
        }
4337
        FreeDecodedCert(cert);
4338
    }
4339
    WC_FREE_VAR_EX(cert, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
4340
4341
    if (ret < 0) {
4342
        WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", ret);
4343
        return WOLFSSL_FATAL_ERROR;
4344
    }
4345
4346
    if (buf != NULL && pubKeyX509 != NULL) {
4347
        if (pubKeyX509Sz > *bufSz) {
4348
            WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", BUFFER_E);
4349
            return WOLFSSL_FATAL_ERROR;
4350
        }
4351
        XMEMCPY(buf, pubKeyX509, pubKeyX509Sz);
4352
    }
4353
    *bufSz = pubKeyX509Sz;
4354
4355
    return WOLFSSL_SUCCESS;
4356
}
4357
4358
4359
/* Getter function for the public key OID value
4360
    * return public key OID stored in WOLFSSL_X509 structure */
4361
int wolfSSL_X509_get_pubkey_type(WOLFSSL_X509* x509)
4362
{
4363
    if (x509 == NULL)
4364
        return WOLFSSL_FAILURE;
4365
    return x509->pubKeyOID;
4366
}
4367
4368
#endif /* OPENSSL_EXTRA || KEEP_OUR_CERT || KEEP_PEER_CERT || SESSION_CERTS */
4369
4370
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
4371
    defined(KEEP_OUR_CERT) || defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
4372
4373
/* write X509 serial number in unsigned binary to buffer
4374
    buffer needs to be at least EXTERNAL_SERIAL_SIZE (32) for all cases
4375
    return WOLFSSL_SUCCESS on success */
4376
int wolfSSL_X509_get_serial_number(WOLFSSL_X509* x509,
4377
                                    byte* in, int* inOutSz)
4378
{
4379
    WOLFSSL_ENTER("wolfSSL_X509_get_serial_number");
4380
    if (x509 == NULL || inOutSz == NULL) {
4381
        WOLFSSL_MSG("Null argument passed in");
4382
        return BAD_FUNC_ARG;
4383
    }
4384
4385
    if (in != NULL) {
4386
        if (*inOutSz < x509->serialSz) {
4387
            WOLFSSL_MSG("Serial buffer too small");
4388
            return BUFFER_E;
4389
        }
4390
        XMEMCPY(in, x509->serial, x509->serialSz);
4391
    }
4392
    *inOutSz = x509->serialSz;
4393
4394
    return WOLFSSL_SUCCESS;
4395
}
4396
4397
/* not an openssl compatibility function - getting for derCert */
4398
const byte* wolfSSL_X509_get_der(WOLFSSL_X509* x509, int* outSz)
4399
{
4400
    WOLFSSL_ENTER("wolfSSL_X509_get_der");
4401
4402
    if (x509 == NULL || x509->derCert == NULL || outSz == NULL)
4403
        return NULL;
4404
4405
    *outSz = (int)x509->derCert->length;
4406
    return x509->derCert->buffer;
4407
}
4408
4409
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL || KEEP_OUR_CERT ||
4410
        * KEEP_PEER_CERT || SESSION_CERTS */
4411
4412
#if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA) || \
4413
    defined(OPENSSL_ALL) || defined(KEEP_OUR_CERT) || \
4414
    defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
4415
4416
/* used by JSSE (not a standard compatibility function) */
4417
WOLFSSL_ABI
4418
const byte* wolfSSL_X509_notBefore(WOLFSSL_X509* x509)
4419
{
4420
    WOLFSSL_ENTER("wolfSSL_X509_notBefore");
4421
4422
    if (x509 == NULL)
4423
        return NULL;
4424
4425
    XMEMSET(x509->notBeforeData, 0, sizeof(x509->notBeforeData));
4426
    x509->notBeforeData[0] = (byte)x509->notBefore.type;
4427
    x509->notBeforeData[1] = (byte)x509->notBefore.length;
4428
    XMEMCPY(&x509->notBeforeData[2], x509->notBefore.data,
4429
        x509->notBefore.length);
4430
4431
    return x509->notBeforeData;
4432
}
4433
4434
/* used by JSSE (not a standard compatibility function) */
4435
WOLFSSL_ABI
4436
const byte* wolfSSL_X509_notAfter(WOLFSSL_X509* x509)
4437
{
4438
    WOLFSSL_ENTER("wolfSSL_X509_notAfter");
4439
4440
    if (x509 == NULL)
4441
        return NULL;
4442
4443
    XMEMSET(x509->notAfterData, 0, sizeof(x509->notAfterData));
4444
    x509->notAfterData[0] = (byte)x509->notAfter.type;
4445
    x509->notAfterData[1] = (byte)x509->notAfter.length;
4446
    XMEMCPY(&x509->notAfterData[2], x509->notAfter.data, x509->notAfter.length);
4447
4448
    return x509->notAfterData;
4449
}
4450
4451
int wolfSSL_X509_version(WOLFSSL_X509* x509)
4452
{
4453
    WOLFSSL_ENTER("wolfSSL_X509_version");
4454
4455
    if (x509 == NULL)
4456
        return 0;
4457
4458
    return x509->version;
4459
}
4460
#endif
4461
4462
#ifdef OPENSSL_EXTRA
4463
4464
/* get the buffer to be signed (tbs) from the WOLFSSL_X509 certificate
4465
    *
4466
    * outSz : gets set to the size of the buffer
4467
    * returns a pointer to the internal buffer at the location of TBS on
4468
    *         on success and NULL on failure.
4469
    */
4470
const unsigned char* wolfSSL_X509_get_tbs(WOLFSSL_X509* x509, int* outSz)
4471
{
4472
    int sz = 0, len;
4473
    unsigned int idx = 0, tmpIdx;
4474
    const unsigned char* der = NULL;
4475
    const unsigned char* tbs = NULL;
4476
4477
    if (x509 == NULL || outSz == NULL) {
4478
        return NULL;
4479
    }
4480
4481
    der = wolfSSL_X509_get_der(x509, &sz);
4482
    if (der == NULL) {
4483
        return NULL;
4484
    }
4485
4486
    if (GetSequence(der, &idx, &len, (word32)sz) < 0) {
4487
        return NULL;
4488
    }
4489
    tbs = der + idx;
4490
    tmpIdx = idx;
4491
    if (GetSequence(der, &idx, &len, (word32)sz) < 0) {
4492
        return NULL;
4493
    }
4494
    *outSz = len + (idx - tmpIdx);
4495
    return tbs;
4496
}
4497
4498
#ifdef WOLFSSL_SEP
4499
4500
/* copy oid into in buffer, at most *inOutSz bytes, if buffer is null will
4501
   malloc buffer, call responsible for freeing. Actual size returned in
4502
   *inOutSz. Requires inOutSz be non-null */
4503
byte* wolfSSL_X509_get_device_type(WOLFSSL_X509* x509, byte* in, int *inOutSz)
4504
{
4505
    int copySz;
4506
4507
    WOLFSSL_ENTER("wolfSSL_X509_get_dev_type");
4508
    if (x509 == NULL) return NULL;
4509
    if (inOutSz == NULL) return NULL;
4510
    if (!x509->deviceTypeSz) return in;
4511
4512
    copySz = min(*inOutSz, x509->deviceTypeSz);
4513
4514
    if (!in) {
4515
    #ifdef WOLFSSL_STATIC_MEMORY
4516
        WOLFSSL_MSG("Using static memory -- please pass in a buffer");
4517
        return NULL;
4518
    #else
4519
        in = (byte*)XMALLOC(x509->deviceTypeSz, 0, DYNAMIC_TYPE_OPENSSL);
4520
        if (!in) return in;
4521
        copySz = x509->deviceTypeSz;
4522
    #endif
4523
    }
4524
4525
    XMEMCPY(in, x509->deviceType, copySz);
4526
    *inOutSz = copySz;
4527
4528
    return in;
4529
}
4530
4531
4532
byte* wolfSSL_X509_get_hw_type(WOLFSSL_X509* x509, byte* in, int* inOutSz)
4533
{
4534
    int copySz;
4535
4536
    WOLFSSL_ENTER("wolfSSL_X509_get_hw_type");
4537
    if (x509 == NULL) return NULL;
4538
    if (inOutSz == NULL) return NULL;
4539
    if (!x509->hwTypeSz) return in;
4540
4541
    copySz = min(*inOutSz, x509->hwTypeSz);
4542
4543
    if (!in) {
4544
    #ifdef WOLFSSL_STATIC_MEMORY
4545
        WOLFSSL_MSG("Using static memory -- please pass in a buffer");
4546
        return NULL;
4547
    #else
4548
        in = (byte*)XMALLOC(x509->hwTypeSz, 0, DYNAMIC_TYPE_OPENSSL);
4549
        if (!in) return in;
4550
        copySz = x509->hwTypeSz;
4551
    #endif
4552
    }
4553
4554
    XMEMCPY(in, x509->hwType, copySz);
4555
    *inOutSz = copySz;
4556
4557
    return in;
4558
}
4559
4560
4561
byte* wolfSSL_X509_get_hw_serial_number(WOLFSSL_X509* x509,byte* in,
4562
                                        int* inOutSz)
4563
{
4564
    int copySz;
4565
4566
    WOLFSSL_ENTER("wolfSSL_X509_get_hw_serial_number");
4567
    if (x509 == NULL) return NULL;
4568
    if (inOutSz == NULL) return NULL;
4569
    if (!x509->hwTypeSz) return in;
4570
4571
    copySz = min(*inOutSz, x509->hwSerialNumSz);
4572
4573
    if (!in) {
4574
    #ifdef WOLFSSL_STATIC_MEMORY
4575
        WOLFSSL_MSG("Using static memory -- please pass in a buffer");
4576
        return NULL;
4577
    #else
4578
        in = (byte*)XMALLOC(x509->hwSerialNumSz, 0, DYNAMIC_TYPE_OPENSSL);
4579
        if (!in) return in;
4580
        copySz = x509->hwSerialNumSz;
4581
    #endif
4582
    }
4583
4584
    XMEMCPY(in, x509->hwSerialNum, copySz);
4585
    *inOutSz = copySz;
4586
4587
    return in;
4588
}
4589
4590
#endif /* WOLFSSL_SEP */
4591
#endif /* OPENSSL_EXTRA */
4592
4593
/* require OPENSSL_EXTRA since wolfSSL_X509_free is wrapped by OPENSSL_EXTRA */
4594
#if defined(OPENSSL_EXTRA)
4595
4596
WOLFSSL_ASN1_TIME* wolfSSL_X509_get_notBefore(const WOLFSSL_X509* x509)
4597
{
4598
    WOLFSSL_ENTER("wolfSSL_X509_get_notBefore");
4599
4600
    if (x509 == NULL)
4601
        return NULL;
4602
4603
    return (WOLFSSL_ASN1_TIME*)&x509->notBefore;
4604
}
4605
4606
4607
WOLFSSL_ASN1_TIME* wolfSSL_X509_get_notAfter(const WOLFSSL_X509* x509)
4608
{
4609
    WOLFSSL_ENTER("wolfSSL_X509_get_notAfter");
4610
4611
    if (x509 == NULL)
4612
        return NULL;
4613
4614
    return (WOLFSSL_ASN1_TIME*)&x509->notAfter;
4615
}
4616
4617
4618
/* return number of elements on success 0 on fail */
4619
int wolfSSL_sk_X509_push(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
4620
    WOLFSSL_X509* x509)
4621
{
4622
    WOLFSSL_ENTER("wolfSSL_sk_X509_push");
4623
4624
    if (sk == NULL || x509 == NULL) {
4625
        return WOLFSSL_FAILURE;
4626
    }
4627
4628
    return wolfSSL_sk_push(sk, x509);
4629
}
4630
4631
4632
/* Return and remove the last x509 pushed on stack */
4633
WOLFSSL_X509* wolfSSL_sk_X509_pop(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
4634
{
4635
    return (WOLFSSL_X509*)wolfSSL_sk_pop(sk);
4636
}
4637
4638
/* Getter function for WOLFSSL_X509 pointer
4639
 *
4640
 * sk is the stack to retrieve pointer from
4641
 * i  is the index value in stack
4642
 *
4643
 * returns a pointer to a WOLFSSL_X509 structure on success and NULL on
4644
 *         fail
4645
 */
4646
WOLFSSL_X509* wolfSSL_sk_X509_value(WOLF_STACK_OF(WOLFSSL_X509)* sk, int i)
4647
{
4648
    WOLFSSL_ENTER("wolfSSL_sk_X509_value");
4649
4650
    for (; sk != NULL && i > 0; i--)
4651
        sk = sk->next;
4652
4653
    if (i != 0 || sk == NULL)
4654
        return NULL;
4655
    return sk->data.x509;
4656
}
4657
4658
4659
/* Return and remove the first x509 pushed on stack */
4660
WOLFSSL_X509* wolfSSL_sk_X509_shift(WOLF_STACK_OF(WOLFSSL_X509)* sk)
4661
{
4662
    return (WOLFSSL_X509*)wolfSSL_sk_pop_node(sk, 0);
4663
}
4664
4665
#endif /* OPENSSL_EXTRA */
4666
4667
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
4668
/* Free's all nodes in X509 stack. This is different then wolfSSL_sk_X509_free
4669
 * in that it free's the underlying objects pushed to the stack.
4670
 *
4671
 * sk  stack to free nodes in
4672
 * f   X509 free function
4673
 */
4674
void wolfSSL_sk_X509_pop_free(WOLF_STACK_OF(WOLFSSL_X509)* sk,
4675
    void (*f) (WOLFSSL_X509*))
4676
{
4677
    WOLFSSL_ENTER("wolfSSL_sk_X509_pop_free");
4678
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
4679
}
4680
4681
4682
/* free just the stack structure */
4683
void wolfSSL_sk_X509_free(WOLF_STACK_OF(WOLFSSL_X509)* sk)
4684
{
4685
    wolfSSL_sk_free(sk);
4686
}
4687
4688
#ifdef HAVE_CRL
4689
WOLFSSL_STACK* wolfSSL_sk_X509_CRL_new(void)
4690
{
4691
    WOLFSSL_STACK* s = wolfSSL_sk_new_node(NULL);
4692
    if (s != NULL)
4693
        s->type = STACK_TYPE_X509_CRL;
4694
    return s;
4695
}
4696
4697
WOLFSSL_STACK* wolfSSL_sk_X509_CRL_new_null(void)
4698
{
4699
    WOLFSSL_STACK* s = wolfSSL_sk_new_null();
4700
    if (s != NULL)
4701
        s->type = STACK_TYPE_X509_CRL;
4702
    return s;
4703
}
4704
4705
void wolfSSL_sk_X509_CRL_pop_free(WOLF_STACK_OF(WOLFSSL_X509_CRL)* sk,
4706
    void (*f) (WOLFSSL_X509_CRL*))
4707
{
4708
    WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_pop_free");
4709
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
4710
}
4711
4712
void wolfSSL_sk_X509_CRL_free(WOLF_STACK_OF(WOLFSSL_X509_CRL)* sk)
4713
{
4714
    wolfSSL_sk_X509_CRL_pop_free(sk, NULL);
4715
}
4716
4717
/* return number of elements on success 0 on fail */
4718
int wolfSSL_sk_X509_CRL_push(WOLF_STACK_OF(WOLFSSL_X509_CRL)* sk,
4719
    WOLFSSL_X509_CRL* crl)
4720
{
4721
    WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_push");
4722
4723
    if (sk == NULL || crl == NULL) {
4724
        return WOLFSSL_FAILURE;
4725
    }
4726
4727
    return wolfSSL_sk_push(sk, crl);
4728
}
4729
4730
WOLFSSL_X509_CRL* wolfSSL_sk_X509_CRL_value(WOLF_STACK_OF(WOLFSSL_X509)* sk,
4731
                                            int i)
4732
{
4733
    WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_value");
4734
    if (sk)
4735
        return (WOLFSSL_X509_CRL*)wolfSSL_sk_value(sk, i);
4736
    return NULL;
4737
}
4738
4739
int wolfSSL_sk_X509_CRL_num(WOLF_STACK_OF(WOLFSSL_X509)* sk)
4740
{
4741
    WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_num");
4742
    if (sk)
4743
        return wolfSSL_sk_num(sk);
4744
    return 0;
4745
}
4746
#endif /* HAVE_CRL */
4747
4748
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
4749
4750
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_QT)
4751
/* return number of elements on success 0 on fail */
4752
int wolfSSL_sk_ACCESS_DESCRIPTION_push(WOLF_STACK_OF(ACCESS_DESCRIPTION)* sk,
4753
                                              WOLFSSL_ACCESS_DESCRIPTION* a)
4754
{
4755
    WOLFSSL_ENTER("wolfSSL_sk_ACCESS_DESCRIPTION_push");
4756
4757
    return wolfSSL_sk_push(sk, a);
4758
}
4759
4760
/* Frees all nodes in ACCESS_DESCRIPTION stack
4761
*
4762
* sk stack of nodes to free
4763
* f  free function to use
4764
*/
4765
void wolfSSL_sk_ACCESS_DESCRIPTION_pop_free(WOLFSSL_STACK* sk,
4766
    void (*f) (WOLFSSL_ACCESS_DESCRIPTION*))
4767
{
4768
   WOLFSSL_ENTER("wolfSSL_sk_ACCESS_DESCRIPTION_pop_free");
4769
   wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
4770
}
4771
4772
void wolfSSL_sk_ACCESS_DESCRIPTION_free(WOLFSSL_STACK* sk)
4773
{
4774
    wolfSSL_sk_free(sk);
4775
}
4776
4777
4778
/* AUTHORITY_INFO_ACCESS object is a stack of ACCESS_DESCRIPTION objects,
4779
 * to free the stack the WOLFSSL_ACCESS_DESCRIPTION stack free function is
4780
 * used */
4781
void wolfSSL_AUTHORITY_INFO_ACCESS_free(
4782
        WOLF_STACK_OF(WOLFSSL_ACCESS_DESCRIPTION)* sk)
4783
{
4784
    WOLFSSL_ENTER("wolfSSL_AUTHORITY_INFO_ACCESS_free");
4785
    wolfSSL_sk_ACCESS_DESCRIPTION_free(sk);
4786
}
4787
4788
void wolfSSL_AUTHORITY_INFO_ACCESS_pop_free(
4789
        WOLF_STACK_OF(WOLFSSL_ACCESS_DESCRIPTION)* sk,
4790
        void (*f) (WOLFSSL_ACCESS_DESCRIPTION*))
4791
{
4792
    WOLFSSL_ENTER("wolfSSL_AUTHORITY_INFO_ACCESS_free");
4793
    wolfSSL_sk_ACCESS_DESCRIPTION_pop_free(sk, f);
4794
}
4795
4796
4797
void wolfSSL_ACCESS_DESCRIPTION_free(WOLFSSL_ACCESS_DESCRIPTION* a)
4798
{
4799
    WOLFSSL_ENTER("wolfSSL_ACCESS_DESCRIPTION_free");
4800
    if (a == NULL)
4801
        return;
4802
4803
    if (a->method)
4804
        wolfSSL_ASN1_OBJECT_free(a->method);
4805
    if (a->location)
4806
        wolfSSL_GENERAL_NAME_free(a->location);
4807
    XFREE(a, NULL, DYNAMIC_TYPE_X509_EXT);
4808
4809
    /* a = NULL, don't try to a or double free it */
4810
}
4811
#endif /* OPENSSL_EXTRA || WOLFSSL_QT */
4812
4813
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
4814
4815
/* Creates and returns new GENERAL_NAME structure */
4816
WOLFSSL_GENERAL_NAME* wolfSSL_GENERAL_NAME_new(void)
4817
{
4818
    WOLFSSL_GENERAL_NAME* gn;
4819
    WOLFSSL_ENTER("GENERAL_NAME_new");
4820
4821
    gn = (WOLFSSL_GENERAL_NAME*)XMALLOC(sizeof(WOLFSSL_GENERAL_NAME), NULL,
4822
                                                             DYNAMIC_TYPE_ASN1);
4823
    if (gn == NULL) {
4824
        return NULL;
4825
    }
4826
    XMEMSET(gn, 0, sizeof(WOLFSSL_GENERAL_NAME));
4827
4828
    gn->d.ia5 = wolfSSL_ASN1_STRING_new();
4829
    if (gn->d.ia5 == NULL) {
4830
        WOLFSSL_MSG("Issue creating ASN1_STRING struct");
4831
        wolfSSL_GENERAL_NAME_free(gn);
4832
        return NULL;
4833
    }
4834
    gn->type = WOLFSSL_GEN_IA5;
4835
    return gn;
4836
}
4837
4838
WOLFSSL_GENERAL_NAME* wolfSSL_GENERAL_NAME_dup(WOLFSSL_GENERAL_NAME* gn)
4839
{
4840
    WOLFSSL_GENERAL_NAME* dupl = NULL;
4841
4842
    WOLFSSL_ENTER("wolfSSL_GENERAL_NAME_dup");
4843
4844
    if (!gn) {
4845
        WOLFSSL_MSG("Bad parameter");
4846
        return NULL;
4847
    }
4848
4849
    if (!(dupl = wolfSSL_GENERAL_NAME_new())) {
4850
        WOLFSSL_MSG("wolfSSL_GENERAL_NAME_new error");
4851
        return NULL;
4852
    }
4853
4854
    wolfSSL_ASN1_STRING_free(dupl->d.ia5);
4855
    dupl->d.ia5 = NULL;
4856
    switch (gn->type) {
4857
    /* WOLFSSL_ASN1_STRING types */
4858
    case WOLFSSL_GEN_DNS:
4859
        if (!(dupl->d.dNSName = wolfSSL_ASN1_STRING_dup(gn->d.dNSName))) {
4860
            WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
4861
            goto error;
4862
        }
4863
        break;
4864
    case WOLFSSL_GEN_IPADD:
4865
        if (!(dupl->d.iPAddress = wolfSSL_ASN1_STRING_dup(gn->d.iPAddress))) {
4866
            WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
4867
            goto error;
4868
        }
4869
        break;
4870
    case WOLFSSL_GEN_EMAIL:
4871
        if (!(dupl->d.rfc822Name = wolfSSL_ASN1_STRING_dup(gn->d.rfc822Name))) {
4872
            WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
4873
            goto error;
4874
        }
4875
        break;
4876
    case WOLFSSL_GEN_URI:
4877
        if (!(dupl->d.uniformResourceIdentifier =
4878
                wolfSSL_ASN1_STRING_dup(gn->d.uniformResourceIdentifier))) {
4879
            WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
4880
            goto error;
4881
        }
4882
        break;
4883
    case WOLFSSL_GEN_OTHERNAME:
4884
        if (gn->d.otherName->value->type != WOLFSSL_V_ASN1_UTF8STRING) {
4885
            WOLFSSL_MSG("Unsupported othername value type");
4886
            goto error;
4887
        }
4888
        dupl->d.otherName = (WOLFSSL_ASN1_OTHERNAME*)XMALLOC(
4889
            sizeof(WOLFSSL_ASN1_OTHERNAME), NULL, DYNAMIC_TYPE_ASN1);
4890
        if (dupl->d.otherName == NULL) {
4891
            WOLFSSL_MSG("XMALLOC error");
4892
            goto error;
4893
        }
4894
        dupl->d.otherName->type_id = wolfSSL_ASN1_OBJECT_dup(
4895
            gn->d.otherName->type_id);
4896
        dupl->d.otherName->value = (WOLFSSL_ASN1_TYPE*)XMALLOC(
4897
            sizeof(WOLFSSL_ASN1_TYPE), NULL, DYNAMIC_TYPE_ASN1);
4898
        if (dupl->d.otherName->value != NULL) {
4899
            dupl->d.otherName->value->type = gn->d.otherName->value->type;
4900
            dupl->d.otherName->value->value.utf8string =
4901
                wolfSSL_ASN1_STRING_dup(
4902
                                      gn->d.otherName->value->value.utf8string);
4903
        }
4904
        if ((dupl->d.otherName->type_id == NULL) ||
4905
            (dupl->d.otherName->value == NULL) ||
4906
            (dupl->d.otherName->value->value.utf8string == NULL)) {
4907
            wolfSSL_ASN1_OBJECT_free(dupl->d.otherName->type_id);
4908
            wolfSSL_ASN1_TYPE_free(dupl->d.otherName->value);
4909
            XFREE(dupl->d.otherName, NULL, DYNAMIC_TYPE_ASN1);
4910
            dupl->d.otherName = NULL;
4911
            WOLFSSL_MSG("error duping othername");
4912
            goto error;
4913
        }
4914
        break;
4915
    case WOLFSSL_GEN_X400:
4916
    case WOLFSSL_GEN_DIRNAME:
4917
    case WOLFSSL_GEN_EDIPARTY:
4918
    case WOLFSSL_GEN_RID:
4919
    default:
4920
        WOLFSSL_MSG("Unrecognized or unsupported GENERAL_NAME type");
4921
        goto error;
4922
    }
4923
    dupl->type = gn->type;
4924
4925
    return dupl;
4926
error:
4927
    wolfSSL_GENERAL_NAME_free(dupl);
4928
    return NULL;
4929
}
4930
4931
/* Set an Othername in a general name.
4932
 *
4933
 * @param [out] gen     Pointer to the GENERAL_NAME where the othername is set.
4934
 * @param [in]  oid     Object ID (ie UPN).
4935
 * @param [in]  name    The actual name.
4936
 * @return  WOLFSSL_FAILURE on invalid parameter or memory error,
4937
 *          WOLFSSL_SUCCESS otherwise.
4938
 */
4939
int wolfSSL_GENERAL_NAME_set0_othername(WOLFSSL_GENERAL_NAME* gen,
4940
                                        WOLFSSL_ASN1_OBJECT* oid,
4941
                                        WOLFSSL_ASN1_TYPE* value)
4942
{
4943
    WOLFSSL_ASN1_OBJECT *x = NULL;
4944
4945
    if ((gen == NULL) || (oid == NULL) || (value == NULL)) {
4946
        return WOLFSSL_FAILURE;
4947
    }
4948
4949
    x = wolfSSL_ASN1_OBJECT_dup(oid);
4950
    if (x == NULL) {
4951
        WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_dup() failed");
4952
        return WOLFSSL_FAILURE;
4953
    }
4954
4955
    if (wolfSSL_GENERAL_NAME_set_type(gen, WOLFSSL_GEN_OTHERNAME)
4956
            != WOLFSSL_SUCCESS) {
4957
        wolfSSL_ASN1_OBJECT_free(x);
4958
        return WOLFSSL_FAILURE;
4959
    }
4960
4961
    gen->d.otherName->type_id = x;
4962
    gen->d.otherName->value = value;
4963
    return WOLFSSL_SUCCESS;
4964
}
4965
4966
/* return number of elements on success 0 on fail */
4967
int wolfSSL_sk_GENERAL_NAME_push(WOLFSSL_GENERAL_NAMES* sk,
4968
                                 WOLFSSL_GENERAL_NAME* gn)
4969
{
4970
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_push");
4971
4972
    return wolfSSL_sk_push(sk, gn);
4973
}
4974
4975
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
4976
4977
#ifdef OPENSSL_EXTRA
4978
4979
/* Returns the general name at index i from the stack
4980
 *
4981
 * sk  stack to get general name from
4982
 * idx index to get
4983
 *
4984
 * return a pointer to the internal node of the stack
4985
 */
4986
WOLFSSL_GENERAL_NAME* wolfSSL_sk_GENERAL_NAME_value(WOLFSSL_STACK* sk, int idx)
4987
{
4988
    return (WOLFSSL_GENERAL_NAME*)wolfSSL_sk_value(sk, idx);
4989
}
4990
4991
/* Gets the number of nodes in the stack
4992
 *
4993
 * sk  stack to get the number of nodes from
4994
 *
4995
 * returns the number of nodes, -1 if no nodes
4996
 */
4997
int wolfSSL_sk_GENERAL_NAME_num(WOLFSSL_STACK* sk)
4998
{
4999
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_num");
5000
5001
    return wolfSSL_sk_num(sk);
5002
}
5003
5004
/* Allocates an empty GENERAL NAME stack */
5005
WOLFSSL_STACK* wolfSSL_sk_GENERAL_NAME_new(void *cmpFunc) {
5006
    WOLFSSL_STACK* sk = NULL;
5007
    (void)cmpFunc;
5008
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_new");
5009
5010
    sk = wolfSSL_sk_new_null();
5011
    if (sk != NULL) {
5012
        sk->type = STACK_TYPE_GEN_NAME;
5013
    }
5014
5015
    return sk;
5016
}
5017
#endif /* OPENSSL_EXTRA */
5018
5019
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
5020
5021
/* Frees all nodes in a GENERAL NAME stack
5022
 *
5023
 * sk stack of nodes to free
5024
 * f  free function to use, not called with wolfSSL
5025
 */
5026
void wolfSSL_sk_GENERAL_NAME_pop_free(WOLFSSL_STACK* sk,
5027
        void (*f) (WOLFSSL_GENERAL_NAME*))
5028
{
5029
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_pop_free");
5030
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
5031
}
5032
5033
void wolfSSL_sk_GENERAL_NAME_free(WOLFSSL_STACK* sk)
5034
{
5035
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_free");
5036
    wolfSSL_sk_X509_pop_free(sk, NULL);
5037
}
5038
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
5039
5040
#ifdef OPENSSL_EXTRA
5041
static void wolfSSL_DIST_POINT_NAME_free(WOLFSSL_DIST_POINT_NAME* dpn)
5042
{
5043
    if (dpn != NULL) {
5044
        if (dpn->name.fullname != NULL) {
5045
            wolfSSL_sk_X509_pop_free(dpn->name.fullname, NULL);
5046
        }
5047
        XFREE(dpn, NULL, DYNAMIC_TYPE_OPENSSL);
5048
    }
5049
}
5050
5051
5052
/* returns new pointer on success and NULL on fail */
5053
static WOLFSSL_DIST_POINT_NAME* wolfSSL_DIST_POINT_NAME_new(void)
5054
{
5055
    WOLFSSL_DIST_POINT_NAME* dpn = NULL;
5056
    WOLFSSL_GENERAL_NAMES* gns = NULL;
5057
5058
    dpn = (WOLFSSL_DIST_POINT_NAME*)XMALLOC(sizeof(WOLFSSL_DIST_POINT_NAME),
5059
                                            NULL, DYNAMIC_TYPE_OPENSSL);
5060
    if (dpn == NULL) {
5061
        return NULL;
5062
    }
5063
    XMEMSET(dpn, 0, sizeof(WOLFSSL_DIST_POINT_NAME));
5064
5065
    gns = wolfSSL_sk_new_null();
5066
    if (gns == NULL) {
5067
        WOLFSSL_MSG("wolfSSL_sk_new_null error");
5068
        XFREE(dpn, NULL, DYNAMIC_TYPE_OPENSSL);
5069
        return NULL;
5070
    }
5071
    gns->type = STACK_TYPE_GEN_NAME;
5072
5073
    /* DIST_POINT_NAME type may be 0 or 1, indicating whether fullname or
5074
     * relativename is used. See: RFC 5280 section 4.2.1.13 */
5075
    dpn->name.fullname = gns;
5076
    dpn->type = 0;
5077
5078
    return dpn;
5079
}
5080
5081
5082
/* Creates and returns new DIST_POINT structure */
5083
WOLFSSL_DIST_POINT* wolfSSL_DIST_POINT_new(void)
5084
{
5085
    WOLFSSL_DIST_POINT* dp = NULL;
5086
    WOLFSSL_DIST_POINT_NAME* dpn = NULL;
5087
5088
    WOLFSSL_ENTER("wolfSSL_DIST_POINT_new");
5089
5090
    dp = (WOLFSSL_DIST_POINT*)XMALLOC(sizeof(WOLFSSL_DIST_POINT), NULL,
5091
                                      DYNAMIC_TYPE_OPENSSL);
5092
    if (dp == NULL) {
5093
        return NULL;
5094
    }
5095
    XMEMSET(dp, 0, sizeof(WOLFSSL_DIST_POINT));
5096
5097
    dpn = wolfSSL_DIST_POINT_NAME_new();
5098
    if (dpn == NULL) {
5099
        XFREE(dp, NULL, DYNAMIC_TYPE_OPENSSL);
5100
        return NULL;
5101
    }
5102
    dp->distpoint = dpn;
5103
5104
    return dp;
5105
}
5106
5107
5108
/* Frees DIST_POINT objects.
5109
*/
5110
void wolfSSL_DIST_POINT_free(WOLFSSL_DIST_POINT* dp)
5111
{
5112
    WOLFSSL_ENTER("wolfSSL_DIST_POINT_free");
5113
    if (dp != NULL) {
5114
        wolfSSL_DIST_POINT_NAME_free(dp->distpoint);
5115
        XFREE(dp, NULL, DYNAMIC_TYPE_OPENSSL);
5116
    }
5117
}
5118
5119
void wolfSSL_DIST_POINTS_free(WOLFSSL_DIST_POINTS *dps)
5120
{
5121
    WOLFSSL_ENTER("wolfSSL_DIST_POINTS_free");
5122
5123
    if (dps == NULL) {
5124
        return;
5125
    }
5126
5127
    wolfSSL_sk_free(dps);
5128
}
5129
5130
/* return number of elements on success 0 on fail */
5131
int wolfSSL_sk_DIST_POINT_push(WOLFSSL_DIST_POINTS* sk, WOLFSSL_DIST_POINT* dp)
5132
{
5133
    WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_push");
5134
5135
    if (sk == NULL || dp == NULL) {
5136
        return WOLFSSL_FAILURE;
5137
    }
5138
5139
    return wolfSSL_sk_push(sk, dp);
5140
}
5141
5142
/* Returns the CRL dist point at index i from the stack
5143
 *
5144
 * sk  stack to get general name from
5145
 * idx index to get
5146
 *
5147
 * return a pointer to the internal node of the stack
5148
 */
5149
WOLFSSL_DIST_POINT* wolfSSL_sk_DIST_POINT_value(WOLFSSL_STACK* sk, int idx)
5150
{
5151
    if (sk == NULL) {
5152
        return NULL;
5153
    }
5154
5155
    return (WOLFSSL_DIST_POINT*)wolfSSL_sk_value(sk, idx);
5156
}
5157
5158
/* Gets the number of nodes in the stack
5159
 *
5160
 * sk  stack to get the number of nodes from
5161
 *
5162
 * returns the number of nodes, -1 if no nodes
5163
 */
5164
int wolfSSL_sk_DIST_POINT_num(WOLFSSL_STACK* sk)
5165
{
5166
    WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_num");
5167
5168
    if (sk == NULL) {
5169
        return WOLFSSL_FATAL_ERROR;
5170
    }
5171
5172
    return wolfSSL_sk_num(sk);
5173
}
5174
5175
/* Frees all nodes in a DIST_POINT stack
5176
 *
5177
 * sk stack of nodes to free
5178
 * f  free function to use
5179
 */
5180
void wolfSSL_sk_DIST_POINT_pop_free(WOLFSSL_STACK* sk,
5181
        void (*f) (WOLFSSL_DIST_POINT*))
5182
{
5183
    WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_pop_free");
5184
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
5185
}
5186
5187
void wolfSSL_sk_DIST_POINT_free(WOLFSSL_STACK* sk)
5188
{
5189
    WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_free");
5190
    wolfSSL_sk_free(sk);
5191
}
5192
5193
/* returns the number of nodes in stack on success and WOLFSSL_FATAL_ERROR
5194
 * on fail */
5195
int wolfSSL_sk_ACCESS_DESCRIPTION_num(WOLFSSL_STACK* sk)
5196
{
5197
    if (sk == NULL) {
5198
        return WOLFSSL_FATAL_ERROR;
5199
    }
5200
5201
    return (int)sk->num;
5202
}
5203
5204
/* returns NULL on fail and pointer to internal data on success */
5205
WOLFSSL_ACCESS_DESCRIPTION* wolfSSL_sk_ACCESS_DESCRIPTION_value(
5206
        WOLFSSL_STACK* sk, int idx)
5207
{
5208
    WOLFSSL_STACK* ret;
5209
5210
    if (sk == NULL) {
5211
        return NULL;
5212
    }
5213
5214
    ret = wolfSSL_sk_get_node(sk, idx);
5215
    if (ret != NULL) {
5216
        return ret->data.access;
5217
    }
5218
    return NULL;
5219
}
5220
#endif /* OPENSSL_EXTRA */
5221
5222
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
5223
/* free's the internal type for the general name */
5224
static void wolfSSL_GENERAL_NAME_type_free(WOLFSSL_GENERAL_NAME* name)
5225
{
5226
    if (name != NULL) {
5227
        switch (name->type) {
5228
        case WOLFSSL_GEN_IA5:
5229
            wolfSSL_ASN1_STRING_free(name->d.ia5);
5230
            name->d.ia5 = NULL;
5231
            break;
5232
        case WOLFSSL_GEN_EMAIL:
5233
            wolfSSL_ASN1_STRING_free(name->d.rfc822Name);
5234
            name->d.rfc822Name = NULL;
5235
            break;
5236
        case WOLFSSL_GEN_DNS:
5237
            wolfSSL_ASN1_STRING_free(name->d.dNSName);
5238
            name->d.dNSName = NULL;
5239
            break;
5240
        case WOLFSSL_GEN_DIRNAME:
5241
            wolfSSL_X509_NAME_free(name->d.dirn);
5242
            name->d.dirn = NULL;
5243
            break;
5244
        case WOLFSSL_GEN_URI:
5245
            wolfSSL_ASN1_STRING_free(name->d.uniformResourceIdentifier);
5246
            name->d.uniformResourceIdentifier = NULL;
5247
            break;
5248
        case WOLFSSL_GEN_IPADD:
5249
            wolfSSL_ASN1_STRING_free(name->d.iPAddress);
5250
            name->d.iPAddress = NULL;
5251
            break;
5252
        case WOLFSSL_GEN_RID:
5253
            wolfSSL_ASN1_OBJECT_free(name->d.registeredID);
5254
            name->d.registeredID = NULL;
5255
            break;
5256
        case WOLFSSL_GEN_OTHERNAME:
5257
            if (name->d.otherName != NULL) {
5258
                wolfSSL_ASN1_OBJECT_free(name->d.otherName->type_id);
5259
                wolfSSL_ASN1_TYPE_free(name->d.otherName->value);
5260
                XFREE(name->d.otherName, NULL, DYNAMIC_TYPE_ASN1);
5261
                name->d.otherName = NULL;
5262
            }
5263
            break;
5264
        case WOLFSSL_GEN_X400:
5265
            /* Unsupported: fall through */
5266
        case WOLFSSL_GEN_EDIPARTY:
5267
            /* Unsupported: fall through */
5268
        default:
5269
            WOLFSSL_MSG("wolfSSL_GENERAL_NAME_type_free: possible leak");
5270
            break;
5271
        }
5272
    }
5273
}
5274
5275
/* sets the general name type and free's the existing one
5276
 * can fail with a memory error if malloc fails or bad arg error
5277
 * otherwise return WOLFSSL_SUCCESS */
5278
int wolfSSL_GENERAL_NAME_set_type(WOLFSSL_GENERAL_NAME* name, int typ)
5279
{
5280
    int ret = WOLFSSL_SUCCESS;
5281
5282
    if (name != NULL) {
5283
        wolfSSL_GENERAL_NAME_type_free(name);
5284
        name->type = typ;
5285
5286
        switch (typ) {
5287
            case WOLFSSL_GEN_URI:
5288
                name->d.uniformResourceIdentifier = wolfSSL_ASN1_STRING_new();
5289
                if (name->d.uniformResourceIdentifier == NULL)
5290
                    ret = MEMORY_E;
5291
                break;
5292
            case WOLFSSL_GEN_OTHERNAME:
5293
                name->d.otherName = (WOLFSSL_ASN1_OTHERNAME*)XMALLOC(
5294
                    sizeof(WOLFSSL_ASN1_OTHERNAME), NULL, DYNAMIC_TYPE_ASN1);
5295
                if (name->d.otherName == NULL) {
5296
                    ret = MEMORY_E;
5297
                }
5298
                else {
5299
                    XMEMSET(name->d.otherName, 0, sizeof(WOLFSSL_ASN1_OTHERNAME));
5300
                }
5301
                break;
5302
            default:
5303
                name->type = WOLFSSL_GEN_IA5;
5304
                name->d.ia5 = wolfSSL_ASN1_STRING_new();
5305
                if (name->d.ia5 == NULL)
5306
                    ret = MEMORY_E;
5307
        }
5308
    }
5309
    else {
5310
        ret = BAD_FUNC_ARG;
5311
    }
5312
5313
    return ret;
5314
}
5315
5316
/* Set the value in a general name. This is a compat layer API.
5317
 *
5318
 * @param [out] a       Pointer to the GENERAL_NAME where the othername is set.
5319
 * @param [in]  type    The type of this general name.
5320
 * @param [in]  value   The ASN.1 string that is the value.
5321
 * @return none
5322
 * @note the set0 indicates we take ownership so the user does NOT free value.
5323
 */
5324
void wolfSSL_GENERAL_NAME_set0_value(WOLFSSL_GENERAL_NAME *a, int type,
5325
                                     void *value)
5326
{
5327
    WOLFSSL_ASN1_STRING *val = (WOLFSSL_ASN1_STRING *)value;
5328
    if (a == NULL) {
5329
        WOLFSSL_MSG("a is NULL");
5330
        return;
5331
    }
5332
5333
    if (val == NULL) {
5334
        WOLFSSL_MSG("value is NULL");
5335
        return;
5336
    }
5337
5338
    if (type != WOLFSSL_GEN_DNS) {
5339
        WOLFSSL_MSG("Only WOLFSSL_GEN_DNS is supported");
5340
        return;
5341
    }
5342
5343
    wolfSSL_GENERAL_NAME_type_free(a);
5344
    a->type = type;
5345
    /* Only when WOLFSSL_GEN_DNS. */
5346
    a->d.dNSName = val;
5347
}
5348
5349
/* Frees GENERAL_NAME objects.
5350
*/
5351
void wolfSSL_GENERAL_NAME_free(WOLFSSL_GENERAL_NAME* name)
5352
{
5353
    WOLFSSL_ENTER("wolfSSL_GENERAL_NAME_Free");
5354
    if (name != NULL) {
5355
        wolfSSL_GENERAL_NAME_type_free(name);
5356
        XFREE(name, NULL, DYNAMIC_TYPE_OPENSSL);
5357
    }
5358
}
5359
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL*/
5360
5361
#ifdef OPENSSL_EXTRA
5362
void wolfSSL_GENERAL_NAMES_free(WOLFSSL_GENERAL_NAMES *gens)
5363
{
5364
    WOLFSSL_ENTER("wolfSSL_GENERAL_NAMES_free");
5365
5366
    if (gens == NULL) {
5367
        return;
5368
    }
5369
5370
    wolfSSL_sk_GENERAL_NAME_free(gens);
5371
}
5372
5373
void wolfSSL_EXTENDED_KEY_USAGE_free(WOLFSSL_STACK * sk)
5374
{
5375
    WOLFSSL_ENTER("wolfSSL_EXTENDED_KEY_USAGE_free");
5376
5377
    if (sk == NULL) {
5378
        return;
5379
    }
5380
5381
    wolfSSL_sk_X509_pop_free(sk, NULL);
5382
}
5383
5384
#if !defined(IGNORE_NAME_CONSTRAINTS)
5385
/*
5386
 * Allocate and initialize an empty GENERAL_SUBTREE structure.
5387
 * Returns NULL on allocation failure.
5388
 */
5389
WOLFSSL_GENERAL_SUBTREE* wolfSSL_GENERAL_SUBTREE_new(void)
5390
{
5391
    WOLFSSL_GENERAL_SUBTREE* subtree;
5392
5393
    WOLFSSL_ENTER("wolfSSL_GENERAL_SUBTREE_new");
5394
5395
    subtree = (WOLFSSL_GENERAL_SUBTREE*)XMALLOC(sizeof(WOLFSSL_GENERAL_SUBTREE),
5396
                                                NULL, DYNAMIC_TYPE_OPENSSL);
5397
    if (subtree == NULL) {
5398
        WOLFSSL_MSG("Failed to allocate GENERAL_SUBTREE");
5399
        return NULL;
5400
    }
5401
    XMEMSET(subtree, 0, sizeof(WOLFSSL_GENERAL_SUBTREE));
5402
    return subtree;
5403
}
5404
5405
/*
5406
 * Create an empty NAME_CONSTRAINTS structure.
5407
 * Returns NULL on allocation failure.
5408
 */
5409
WOLFSSL_NAME_CONSTRAINTS* wolfSSL_NAME_CONSTRAINTS_new(void)
5410
{
5411
    WOLFSSL_NAME_CONSTRAINTS* nc;
5412
5413
    WOLFSSL_ENTER("wolfSSL_NAME_CONSTRAINTS_new");
5414
5415
    nc = (WOLFSSL_NAME_CONSTRAINTS*)XMALLOC(sizeof(WOLFSSL_NAME_CONSTRAINTS),
5416
                                            NULL, DYNAMIC_TYPE_OPENSSL);
5417
    if (nc == NULL) {
5418
        WOLFSSL_MSG("Failed to allocate NAME_CONSTRAINTS");
5419
        return NULL;
5420
    }
5421
    XMEMSET(nc, 0, sizeof(WOLFSSL_NAME_CONSTRAINTS));
5422
    return nc;
5423
}
5424
5425
/* Free a GENERAL_SUBTREE and its contents. */
5426
void wolfSSL_GENERAL_SUBTREE_free(WOLFSSL_GENERAL_SUBTREE* subtree)
5427
{
5428
    if (subtree == NULL) {
5429
        return;
5430
    }
5431
    wolfSSL_GENERAL_NAME_free(subtree->base);
5432
    XFREE(subtree, NULL, DYNAMIC_TYPE_OPENSSL);
5433
}
5434
5435
/* Free a NAME_CONSTRAINTS structure and all its contents. */
5436
void wolfSSL_NAME_CONSTRAINTS_free(WOLFSSL_NAME_CONSTRAINTS* nc)
5437
{
5438
    WOLFSSL_ENTER("wolfSSL_NAME_CONSTRAINTS_free");
5439
5440
    if (nc == NULL) {
5441
        return;
5442
    }
5443
5444
    if (nc->permittedSubtrees != NULL) {
5445
        wolfSSL_sk_pop_free(nc->permittedSubtrees,
5446
            (wolfSSL_sk_freefunc)wolfSSL_GENERAL_SUBTREE_free);
5447
    }
5448
5449
    if (nc->excludedSubtrees != NULL) {
5450
        wolfSSL_sk_pop_free(nc->excludedSubtrees,
5451
            (wolfSSL_sk_freefunc)wolfSSL_GENERAL_SUBTREE_free);
5452
    }
5453
5454
    XFREE(nc, NULL, DYNAMIC_TYPE_OPENSSL);
5455
}
5456
5457
/* Get number of items in GENERAL_SUBTREE stack. */
5458
int wolfSSL_sk_GENERAL_SUBTREE_num(const WOLFSSL_STACK* sk)
5459
{
5460
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_SUBTREE_num");
5461
5462
    return wolfSSL_sk_num(sk);
5463
}
5464
5465
/* Get GENERAL_SUBTREE at index from stack. */
5466
WOLFSSL_GENERAL_SUBTREE* wolfSSL_sk_GENERAL_SUBTREE_value(
5467
    const WOLFSSL_STACK* sk, int idx)
5468
{
5469
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_SUBTREE_value");
5470
5471
    return (WOLFSSL_GENERAL_SUBTREE*)wolfSSL_sk_value(sk, idx);
5472
}
5473
5474
/* Check IP address string matches constraint.
5475
 *
5476
 * name: IP address string (ex "192.168.1.50")
5477
 * nameSz: length of name string
5478
 * gn: GENERAL_NAME containing IP constraint (IP + mask bytes)
5479
 *
5480
 * Return 1 on match, otherwise 0
5481
 */
5482
static int MatchIpName(const char* name, int nameSz, WOLFSSL_GENERAL_NAME* gn)
5483
{
5484
    int ipLen = 0;
5485
    int constraintLen;
5486
    char ipStr[WOLFSSL_MAX_IPSTR];
5487
    unsigned char ipBytes[16]; /* Max 16 bytes for IPv6 */
5488
    const unsigned char* constraintData;
5489
5490
    if (name == NULL || nameSz <= 0 || gn == NULL || gn->d.iPAddress == NULL) {
5491
        return 0;
5492
    }
5493
5494
    constraintData = wolfSSL_ASN1_STRING_get0_data(gn->d.iPAddress);
5495
    constraintLen = wolfSSL_ASN1_STRING_length(gn->d.iPAddress);
5496
    if (constraintData == NULL || constraintLen <= 0) {
5497
        return 0;
5498
    }
5499
5500
    /* Null-terminate IP string */
5501
    if (nameSz >= (int)sizeof(ipStr)) {
5502
        return 0;
5503
    }
5504
    XMEMCPY(ipStr, name, nameSz);
5505
    ipStr[nameSz] = '\0';
5506
5507
    /* IPv4 constraint 8 bytes (IP + mask),
5508
     * IPv6 constraint 32 bytes (IP + mask) */
5509
    if (constraintLen == 8) {
5510
        if (XINET_PTON(WOLFSSL_IP4, ipStr, ipBytes) == 1) {
5511
            ipLen = 4;
5512
        }
5513
    }
5514
    else if (constraintLen == 32) {
5515
        if (XINET_PTON(WOLFSSL_IP6, ipStr, ipBytes) == 1) {
5516
            ipLen = 16;
5517
        }
5518
    }
5519
5520
    if (ipLen == 0) {
5521
        return 0;
5522
    }
5523
5524
    return wolfssl_local_MatchIpSubnet(ipBytes, ipLen,
5525
        constraintData, constraintLen);
5526
}
5527
5528
/* Extract host from URI for name constraint matching.
5529
 * URI format: scheme://[userinfo@]host[:port][/path][?query][#fragment]
5530
 * IPv6 literals are enclosed in brackets: scheme://[ipv6addr]:port/path
5531
 * Returns pointer to host start and sets hostLen, or NULL on failure. */
5532
static const char* ExtractHostFromUri(const char* uri, int uriLen, int* hostLen)
5533
{
5534
    const char* hostStart;
5535
    const char* hostEnd;
5536
    const char* p;
5537
    const char* uriEnd;
5538
5539
    if (uri == NULL || uriLen <= 0 || hostLen == NULL) {
5540
        return NULL;
5541
    }
5542
5543
    uriEnd = uri + uriLen;
5544
5545
    /* Find "://" to skip scheme */
5546
    hostStart = NULL;
5547
    for (p = uri; p < uriEnd - 2; p++) {
5548
        if (p[0] == ':' && p[1] == '/' && p[2] == '/') {
5549
            hostStart = p + 3;
5550
            break;
5551
        }
5552
    }
5553
    if (hostStart == NULL || hostStart >= uriEnd) {
5554
        return NULL;
5555
    }
5556
5557
    /* Skip userinfo if present (look for @ before any /, ?, #)
5558
     * userinfo can contain ':' (ex: user:pass@host), don't stop at ':'
5559
     * For IPv6, also don't stop at '[' in userinfo */
5560
    for (p = hostStart; p < uriEnd; p++) {
5561
        if (*p == '@') {
5562
            hostStart = p + 1;
5563
            break;
5564
        }
5565
        if (*p == '/' || *p == '?' || *p == '#') {
5566
            /* No userinfo found */
5567
            break;
5568
        }
5569
        /* If '[' before '@', found IPv6 literal, not userinfo */
5570
        if (*p == '[') {
5571
            break;
5572
        }
5573
    }
5574
    if (hostStart >= uriEnd) {
5575
        return NULL;
5576
    }
5577
5578
    /* Check for IPv6 literal */
5579
    if (*hostStart == '[') {
5580
        /* Find closing bracket, skip opening one */
5581
        hostStart++;
5582
        hostEnd = hostStart;
5583
        while (hostEnd < uriEnd && *hostEnd != ']') {
5584
            hostEnd++;
5585
        }
5586
        if (hostEnd >= uriEnd) {
5587
            /* No closing bracket found, malformed */
5588
            return NULL;
5589
        }
5590
        /* hostEnd points to closing bracket, extract content between */
5591
        *hostLen = (int)(hostEnd - hostStart);
5592
        if (*hostLen <= 0) {
5593
            return NULL;
5594
        }
5595
        return hostStart;
5596
    }
5597
5598
    /* Regular hostname, find end */
5599
    hostEnd = hostStart;
5600
    while (hostEnd < uriEnd && *hostEnd != ':' && *hostEnd != '/' &&
5601
           *hostEnd != '?' && *hostEnd != '#') {
5602
        hostEnd++;
5603
    }
5604
5605
    *hostLen = (int)(hostEnd - hostStart);
5606
    if (*hostLen <= 0) {
5607
        return NULL;
5608
    }
5609
5610
    return hostStart;
5611
}
5612
5613
/* Helper to check if name string matches a single GENERAL_NAME constraint.
5614
 * Returns 1 if matches, 0 if not. */
5615
static int MatchNameConstraint(int type, const char* name, int nameSz,
5616
    WOLFSSL_GENERAL_NAME* gn)
5617
{
5618
    const char* baseStr;
5619
    int baseLen;
5620
5621
    if (gn == NULL || gn->type != type) {
5622
        return 0;
5623
    }
5624
5625
    switch (type) {
5626
        case WOLFSSL_GEN_IPADD:
5627
            return MatchIpName(name, nameSz, gn);
5628
5629
        case WOLFSSL_GEN_DNS:
5630
        case WOLFSSL_GEN_EMAIL:
5631
        case WOLFSSL_GEN_URI:
5632
            if (gn->d.ia5 == NULL) {
5633
                return 0;
5634
            }
5635
            baseStr = (const char*)wolfSSL_ASN1_STRING_get0_data(gn->d.ia5);
5636
            baseLen = wolfSSL_ASN1_STRING_length(gn->d.ia5);
5637
            if (baseStr == NULL || baseLen <= 0) {
5638
                return 0;
5639
            }
5640
5641
            if (type == WOLFSSL_GEN_EMAIL) {
5642
                return wolfssl_local_MatchBaseName(ASN_RFC822_TYPE, name,
5643
                    nameSz, baseStr, baseLen);
5644
            }
5645
            else if (type == WOLFSSL_GEN_URI) {
5646
                const char* host;
5647
                int hostLen;
5648
5649
                /* For URI, extract host and match against DNS-style */
5650
                host = ExtractHostFromUri(name, nameSz, &hostLen);
5651
                if (host == NULL) {
5652
                    return 0;
5653
                }
5654
                return wolfssl_local_MatchBaseName(ASN_DNS_TYPE, host, hostLen,
5655
                    baseStr, baseLen);
5656
            }
5657
            else {
5658
                /* WOLFSSL_GEN_DNS uses DNS-style matching */
5659
                return wolfssl_local_MatchBaseName(ASN_DNS_TYPE, name, nameSz,
5660
                    baseStr, baseLen);
5661
            }
5662
5663
        default:
5664
            /* Unsupported type */
5665
            return 0;
5666
    }
5667
}
5668
5669
/*
5670
 * Check if a name string satisfies given name constraints.
5671
 *
5672
 * nc: NAME_CONSTRAINTS struct containing permitted/excluded subtrees
5673
 * type: GeneralName type (WOLFSSL_GEN_DNS, WOLFSSL_GEN_EMAIL, etc.)
5674
 * name: The name string to check
5675
 * nameSz: Length of name string
5676
 *
5677
 * Returns 1 if name satisfies constraints (permitted and not excluded),
5678
 * otherwise 0 if name does not satisfy constraints or on error
5679
 *
5680
 * A name satisfies constraints if permitted subtrees exist for the type,
5681
 * name matches at least one, and name does not match any excluded subtree.
5682
 */
5683
int wolfSSL_NAME_CONSTRAINTS_check_name(WOLFSSL_NAME_CONSTRAINTS* nc,
5684
    int type, const char* name, int nameSz)
5685
{
5686
    int i, num;
5687
    int hasPermittedType = 0;
5688
    int matchedPermitted = 0;
5689
    WOLFSSL_GENERAL_SUBTREE* subtree;
5690
    WOLFSSL_GENERAL_NAME* gn;
5691
5692
    WOLFSSL_ENTER("wolfSSL_NAME_CONSTRAINTS_check_name");
5693
5694
    if (nc == NULL || name == NULL || nameSz <= 0) {
5695
        WOLFSSL_MSG("Bad argument to NAME_CONSTRAINTS_check_name");
5696
        return 0;
5697
    }
5698
5699
    /* Check permitted subtrees */
5700
    if (nc->permittedSubtrees != NULL) {
5701
        num = wolfSSL_sk_GENERAL_SUBTREE_num(nc->permittedSubtrees);
5702
        for (i = 0; i < num; i++) {
5703
            subtree = wolfSSL_sk_GENERAL_SUBTREE_value(
5704
                nc->permittedSubtrees, i);
5705
            if (subtree == NULL || subtree->base == NULL) {
5706
                continue;
5707
            }
5708
5709
            gn = subtree->base;
5710
            if (gn->type != type) {
5711
                continue;
5712
            }
5713
            hasPermittedType = 1;
5714
5715
            if (MatchNameConstraint(type, name, nameSz, gn)) {
5716
                matchedPermitted = 1;
5717
                break;
5718
            }
5719
        }
5720
    }
5721
5722
    /* If permitted constraints exist for this type but none matched, fail */
5723
    if (hasPermittedType && !matchedPermitted) {
5724
        WOLFSSL_MSG("Name not in permitted subtrees");
5725
        return 0;
5726
    }
5727
5728
    /* Check excluded subtrees */
5729
    if (nc->excludedSubtrees != NULL) {
5730
        num = wolfSSL_sk_GENERAL_SUBTREE_num(nc->excludedSubtrees);
5731
        for (i = 0; i < num; i++) {
5732
            subtree = wolfSSL_sk_GENERAL_SUBTREE_value(nc->excludedSubtrees, i);
5733
            if (subtree == NULL || subtree->base == NULL) {
5734
                continue;
5735
            }
5736
5737
            gn = subtree->base;
5738
            if (gn->type != type) {
5739
                continue;
5740
            }
5741
5742
            if (MatchNameConstraint(type, name, nameSz, gn)) {
5743
                WOLFSSL_MSG("Name in excluded subtrees");
5744
                return 0;
5745
            }
5746
        }
5747
    }
5748
5749
    return 1;
5750
}
5751
#endif /* !IGNORE_NAME_CONSTRAINTS */
5752
5753
#if defined(OPENSSL_ALL) && !defined(NO_BIO)
5754
/* Outputs name string of the given WOLFSSL_GENERAL_NAME_OBJECT to WOLFSSL_BIO.
5755
 * Can handle following GENERAL_NAME_OBJECT types:
5756
 *  - GEN_OTHERNAME #
5757
 *  - GEN_EMAIL
5758
 *  - GEN_DNS
5759
 *  - GEN_X400  #
5760
 *  - GEN_DIRNAME
5761
 *  - GEN_EDIPARTY #
5762
 *  - GEN_URI
5763
 *  - GEN_RID
5764
 * The each name string to be output has "typename:namestring" format.
5765
 * For instance, email name string will be output as "email:info@wolfssl.com".
5766
 * However,some types above marked with "#" will be output with
5767
 * "typename:<unsupported>".
5768
 *
5769
 * Parameters:
5770
 *  - out: WOLFSSL_BIO object which is the output destination
5771
 *  - gen: WOLFSSL_GENERAL_NAME object to be output its name
5772
 *
5773
 * Returns WOLFSSL_SUCCESS on success, WOLFSSL_FAILURE on failure.
5774
 */
5775
int wolfSSL_GENERAL_NAME_print(WOLFSSL_BIO* out, WOLFSSL_GENERAL_NAME* gen)
5776
{
5777
    int ret, i;
5778
    unsigned int wd;
5779
    unsigned char* p;
5780
    (void)wd;
5781
    (void)p;
5782
    (void)i;
5783
    WOLFSSL_ENTER("wolfSSL_GENERAL_NAME_print");
5784
5785
    if (out == NULL || gen == NULL)
5786
        return WOLFSSL_FAILURE;
5787
5788
    ret = WOLFSSL_FAILURE;
5789
    switch (gen->type)
5790
    {
5791
    case GEN_OTHERNAME:
5792
        ret = wolfSSL_BIO_printf(out, "othername:<unsupported>");
5793
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5794
        break;
5795
5796
    case GEN_EMAIL:
5797
        ret = wolfSSL_BIO_printf(out, "email:");
5798
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5799
        if (ret == WOLFSSL_SUCCESS)
5800
        {
5801
            ret = wolfSSL_ASN1_STRING_print(out, gen->d.rfc822Name);
5802
        }
5803
        break;
5804
5805
    case GEN_DNS:
5806
        ret = wolfSSL_BIO_printf(out, "DNS:");
5807
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5808
        if (ret == WOLFSSL_SUCCESS) {
5809
            ret = wolfSSL_BIO_printf(out, "%s", gen->d.dNSName->strData);
5810
            ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5811
        }
5812
        break;
5813
5814
    case GEN_X400:
5815
        ret = wolfSSL_BIO_printf(out, "X400Name:<unsupported>");
5816
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5817
        break;
5818
5819
    case GEN_DIRNAME:
5820
        ret = wolfSSL_BIO_printf(out, "DirName:");
5821
        if (ret == WOLFSSL_SUCCESS) {
5822
            ret = wolfSSL_X509_NAME_print_ex(out, gen->d.directoryName, 0,
5823
                                                         XN_FLAG_ONELINE);
5824
        }
5825
        break;
5826
5827
    case GEN_EDIPARTY:
5828
        ret = wolfSSL_BIO_printf(out, "EdiPartyName:<unsupported>");
5829
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5830
        break;
5831
5832
    case GEN_URI:
5833
        ret = wolfSSL_BIO_printf(out, "URI:");
5834
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5835
        if (ret == WOLFSSL_SUCCESS) {
5836
            ret = wolfSSL_ASN1_STRING_print(out,
5837
                                    gen->d.uniformResourceIdentifier);
5838
        }
5839
        break;
5840
5841
    case GEN_IPADD:
5842
        ret = wolfSSL_BIO_printf(out, "IP Address");
5843
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5844
        if (ret == WOLFSSL_SUCCESS) {
5845
5846
            if (!gen->d.iPAddress->length) {
5847
                ret = WOLFSSL_FAILURE;
5848
                break;
5849
            }
5850
            p = (unsigned char*)gen->d.iPAddress->strData;
5851
5852
            if (gen->d.iPAddress->length == 4) {
5853
                ret = wolfSSL_BIO_printf(out, ":%d.%d.%d.%d",
5854
                                  p[0],p[1],p[2],p[3]);
5855
            }
5856
            else if (gen->d.iPAddress->length == 16) {
5857
5858
                for (i = 0; i < 16 && ret == WOLFSSL_SUCCESS;) {
5859
                    wd = p[i] << 8 | p[i+1];
5860
5861
                    i += 2;
5862
                    ret = wolfSSL_BIO_printf(out, ":%X", wd);
5863
                    ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5864
                }
5865
            }
5866
            else {
5867
                ret = wolfSSL_BIO_printf(out, "<unsupported>");
5868
            }
5869
            ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5870
        }
5871
        break;
5872
5873
    case GEN_RID:
5874
        ret = wolfSSL_BIO_printf(out, "Registered ID:");
5875
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5876
        if (ret == WOLFSSL_SUCCESS) {
5877
            ret = wolfSSL_i2a_ASN1_OBJECT(out, gen->d.registeredID);
5878
        }
5879
        break;
5880
5881
    default:
5882
        /* unsupported type */
5883
        break;
5884
    }
5885
5886
    if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
5887
        return WOLFSSL_FAILURE;
5888
    else
5889
        return WOLFSSL_SUCCESS;
5890
}
5891
#endif /* OPENSSL_ALL */
5892
5893
WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* wolfSSL_sk_X509_EXTENSION_new_null(void)
5894
{
5895
    WOLFSSL_STACK* sk = wolfSSL_sk_new_node(NULL);
5896
    if (sk) {
5897
        sk->type = STACK_TYPE_X509_EXT;
5898
    }
5899
5900
    return (WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)*)sk;;
5901
}
5902
5903
/* returns the number of nodes on the stack */
5904
int wolfSSL_sk_X509_EXTENSION_num(WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk)
5905
{
5906
    if (sk != NULL) {
5907
        return (int)sk->num;
5908
    }
5909
    return WOLFSSL_FATAL_ERROR;
5910
}
5911
5912
5913
/* returns null on failure and pointer to internal value on success */
5914
WOLFSSL_X509_EXTENSION* wolfSSL_sk_X509_EXTENSION_value(
5915
        const WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk, int idx)
5916
{
5917
    return (WOLFSSL_X509_EXTENSION*)wolfSSL_sk_value(sk, idx);
5918
}
5919
5920
/* frees all of the nodes and the values in stack */
5921
void wolfSSL_sk_X509_EXTENSION_pop_free(
5922
        WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk,
5923
        void (*f) (WOLFSSL_X509_EXTENSION*))
5924
{
5925
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
5926
}
5927
5928
void wolfSSL_sk_X509_EXTENSION_free(WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk)
5929
{
5930
    wolfSSL_sk_pop_free(sk, NULL);
5931
}
5932
5933
#endif /* OPENSSL_EXTRA */
5934
5935
#if defined(OPENSSL_EXTRA) && !defined(NO_FILESYSTEM) && \
5936
    !defined(NO_STDIO_FILESYSTEM)
5937
5938
WOLFSSL_X509* wolfSSL_X509_d2i_fp(WOLFSSL_X509** x509, XFILE file)
5939
{
5940
    WOLFSSL_X509* newX509 = NULL;
5941
5942
    WOLFSSL_ENTER("wolfSSL_X509_d2i_fp");
5943
5944
    if (file != XBADFILE) {
5945
        byte* fileBuffer = NULL;
5946
        long sz = 0;
5947
5948
        if (XFSEEK(file, 0, XSEEK_END) != 0)
5949
            return NULL;
5950
        sz = XFTELL(file);
5951
        if (XFSEEK(file, 0, XSEEK_SET) != 0)
5952
            return NULL;
5953
5954
        if (sz > MAX_WOLFSSL_FILE_SIZE || sz < 0) {
5955
            WOLFSSL_MSG("X509_d2i file size error");
5956
            return NULL;
5957
        }
5958
5959
        fileBuffer = (byte*)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE);
5960
        if (fileBuffer != NULL) {
5961
            int ret = (int)XFREAD(fileBuffer, 1, (size_t)sz, file);
5962
            if (ret == sz) {
5963
                newX509 = wolfSSL_X509_d2i(NULL, fileBuffer, (int)sz);
5964
            }
5965
            XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
5966
        }
5967
    }
5968
5969
    if (x509 != NULL)
5970
        *x509 = newX509;
5971
5972
    return newX509;
5973
}
5974
5975
#endif /* OPENSSL_EXTRA && !NO_FILESYSTEM && !NO_STDIO_FILESYSTEM */
5976
5977
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
5978
    defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
5979
5980
#ifndef NO_FILESYSTEM
5981
WOLFSSL_ABI
5982
WOLFSSL_X509* wolfSSL_X509_load_certificate_file(const char* fname, int format)
5983
{
5984
#ifdef WOLFSSL_SMALL_STACK
5985
    byte  staticBuffer[1]; /* force heap usage */
5986
#else
5987
    byte  staticBuffer[FILE_BUFFER_SIZE];
5988
#endif
5989
    byte* fileBuffer = staticBuffer;
5990
    int   dynamic = 0;
5991
    int   ret;
5992
    long  sz = 0;
5993
    XFILE file;
5994
5995
    WOLFSSL_X509* x509 = NULL;
5996
5997
    /* Check the inputs */
5998
    if ((fname == NULL) ||
5999
        (format != WOLFSSL_FILETYPE_ASN1 && format != WOLFSSL_FILETYPE_PEM))
6000
        return NULL;
6001
6002
    file = XFOPEN(fname, "rb");
6003
    if (file == XBADFILE)
6004
        return NULL;
6005
6006
    if (XFSEEK(file, 0, XSEEK_END) != 0) {
6007
        XFCLOSE(file);
6008
        return NULL;
6009
    }
6010
    sz = XFTELL(file);
6011
    if (XFSEEK(file, 0, XSEEK_SET) != 0) {
6012
        XFCLOSE(file);
6013
        return NULL;
6014
    }
6015
6016
    if (sz > MAX_WOLFSSL_FILE_SIZE || sz < 0) {
6017
        WOLFSSL_MSG("X509_load_certificate_file size error");
6018
        XFCLOSE(file);
6019
        return NULL;
6020
    }
6021
6022
    if (sz > (long)sizeof(staticBuffer)) {
6023
        fileBuffer = (byte*)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE);
6024
        if (fileBuffer == NULL) {
6025
            XFCLOSE(file);
6026
            return NULL;
6027
        }
6028
        dynamic = 1;
6029
    }
6030
6031
    ret = (int)XFREAD(fileBuffer, 1, (size_t)sz, file);
6032
    if (ret != sz) {
6033
        XFCLOSE(file);
6034
        if (dynamic)
6035
            XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
6036
        return NULL;
6037
    }
6038
6039
    XFCLOSE(file);
6040
6041
    x509 = wolfSSL_X509_load_certificate_buffer(fileBuffer, (int)sz, format);
6042
6043
    if (dynamic)
6044
        XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
6045
6046
    return x509;
6047
}
6048
#endif /* !NO_FILESYSTEM */
6049
6050
static WOLFSSL_X509* loadX509orX509REQFromBuffer(
6051
    const unsigned char* buf, int sz, int format, int type,
6052
    wc_pem_password_cb *cb, void *u)
6053
{
6054
6055
    int ret = 0;
6056
    WOLFSSL_X509* x509 = NULL;
6057
    DerBuffer* der = NULL;
6058
6059
    WOLFSSL_ENTER("wolfSSL_X509_load_certificate_ex");
6060
6061
    if (format == WOLFSSL_FILETYPE_PEM) {
6062
        EncryptedInfo info;
6063
        XMEMSET(&info, 0, sizeof(EncryptedInfo));
6064
    #ifdef WOLFSSL_ENCRYPTED_KEYS
6065
        info.passwd_cb       = cb;
6066
        info.passwd_userdata = u;
6067
    #endif
6068
6069
    #ifdef WOLFSSL_PEM_TO_DER
6070
        ret = PemToDer(buf, sz, type, &der, NULL, &info, NULL);
6071
        if (ret != 0) {
6072
            FreeDer(&der);
6073
        }
6074
    #else
6075
        ret = NOT_COMPILED_IN;
6076
    #endif
6077
    }
6078
    else {
6079
        ret = AllocDer(&der, (word32)sz, type, NULL);
6080
        if (ret == 0) {
6081
            XMEMCPY(der->buffer, buf, sz);
6082
        }
6083
    }
6084
6085
    /* At this point we want `der` to have the certificate in DER format */
6086
    /* ready to be decoded. */
6087
    if (der != NULL && der->buffer != NULL) {
6088
        WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
6089
        /* For TRUSTED_CERT_TYPE, the DER buffer contains the certificate
6090
         * followed by auxiliary trust info. ParseCertRelative expects CERT_TYPE
6091
         * and will parse only the certificate portion, ignoring the rest. */
6092
        int parseType = (type == TRUSTED_CERT_TYPE) ? CERT_TYPE : type;
6093
6094
        WC_ALLOC_VAR_EX(cert, DecodedCert, 1, NULL, DYNAMIC_TYPE_DCERT,
6095
            ret=MEMORY_ERROR);
6096
        if (WC_VAR_OK(cert))
6097
        {
6098
            InitDecodedCert(cert, der->buffer, der->length, NULL);
6099
            ret = ParseCertRelative(cert, parseType, 0, NULL, NULL);
6100
            if (ret == 0) {
6101
                /* For TRUSTED_CERT_TYPE, truncate the DER buffer to exclude
6102
                 * auxiliary trust data. ParseCertRelative sets srcIdx to the
6103
                 * end of the certificate, so we adjust cert->maxIdx accordingly. */
6104
                if (type == TRUSTED_CERT_TYPE && cert->srcIdx < cert->maxIdx) {
6105
                    cert->maxIdx = cert->srcIdx;
6106
                }
6107
6108
                x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), NULL,
6109
                                                             DYNAMIC_TYPE_X509);
6110
                if (x509 != NULL) {
6111
                    InitX509(x509, 1, NULL);
6112
                    ret = CopyDecodedToX509(x509, cert);
6113
                    if (ret != 0) {
6114
                        wolfSSL_X509_free(x509);
6115
                        x509 = NULL;
6116
                    }
6117
                }
6118
                else {
6119
                    ret = MEMORY_ERROR;
6120
                }
6121
            }
6122
6123
            FreeDecodedCert(cert);
6124
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
6125
        }
6126
6127
        FreeDer(&der);
6128
    }
6129
6130
    if (ret != 0) {
6131
        WOLFSSL_ERROR(ret);
6132
    }
6133
6134
    /* unused parameter when built without WOLFSSL_ENCRYPTED_KEYS */
6135
    (void)cb;
6136
    (void)u;
6137
    return x509;
6138
}
6139
6140
WOLFSSL_X509* wolfSSL_X509_load_certificate_buffer(
6141
    const unsigned char* buf, int sz, int format)
6142
{
6143
    return loadX509orX509REQFromBuffer(buf, sz,
6144
            format, CERT_TYPE, NULL, NULL);
6145
}
6146
6147
#ifdef WOLFSSL_CERT_REQ
6148
WOLFSSL_X509* wolfSSL_X509_REQ_load_certificate_buffer(
6149
    const unsigned char* buf, int sz, int format)
6150
{
6151
    return loadX509orX509REQFromBuffer(buf, sz,
6152
            format, CERTREQ_TYPE, NULL, NULL);
6153
}
6154
#endif
6155
6156
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL || KEEP_PEER_CERT || \
6157
          SESSION_CERTS */
6158
6159
#if defined(OPENSSL_EXTRA_X509_SMALL) || defined(KEEP_PEER_CERT) || \
6160
    defined(SESSION_CERTS)
6161
/* Smaller subset of X509 compatibility functions. Avoid increasing the size of
6162
 * this subset and its memory usage */
6163
6164
/* returns a pointer to a new WOLFSSL_X509 structure on success and NULL on
6165
 * fail
6166
 */
6167
WOLFSSL_X509* wolfSSL_X509_new_ex(void* heap)
6168
{
6169
    WOLFSSL_X509* x509;
6170
6171
    x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), heap,
6172
            DYNAMIC_TYPE_X509);
6173
    if (x509 != NULL) {
6174
        InitX509(x509, 1, heap);
6175
    }
6176
6177
    return x509;
6178
}
6179
6180
WOLFSSL_X509* wolfSSL_X509_new(void)
6181
{
6182
    return wolfSSL_X509_new_ex(NULL);
6183
}
6184
6185
WOLFSSL_ABI
6186
WOLFSSL_X509_NAME* wolfSSL_X509_get_subject_name(WOLFSSL_X509* cert)
6187
{
6188
    WOLFSSL_ENTER("wolfSSL_X509_get_subject_name");
6189
    if (cert)
6190
        return &cert->subject;
6191
    return NULL;
6192
}
6193
6194
WOLFSSL_ABI
6195
WOLFSSL_X509_NAME* wolfSSL_X509_get_issuer_name(WOLFSSL_X509* cert)
6196
{
6197
    WOLFSSL_ENTER("wolfSSL_X509_get_issuer_name");
6198
    if (cert)
6199
        return &cert->issuer;
6200
    return NULL;
6201
}
6202
6203
6204
int wolfSSL_X509_get_signature_type(WOLFSSL_X509* x509)
6205
{
6206
    int type = 0;
6207
6208
    WOLFSSL_ENTER("wolfSSL_X509_get_signature_type");
6209
6210
    if (x509 != NULL)
6211
        type = x509->sigOID;
6212
6213
    return type;
6214
}
6215
6216
#if defined(OPENSSL_EXTRA_X509_SMALL)
6217
6218
int wolfSSL_X509_NAME_get_sz(WOLFSSL_X509_NAME* name)
6219
{
6220
    WOLFSSL_ENTER("wolfSSL_X509_NAME_get_sz");
6221
    if (!name)
6222
        return WOLFSSL_FATAL_ERROR;
6223
    return name->sz;
6224
}
6225
6226
/* Searches for the first ENTRY of type NID
6227
 * idx is the location to start searching from, the value at when the entry was
6228
 *     found is stored into idx
6229
 * returns a pointer to the entry on success and null on fail */
6230
static WOLFSSL_X509_NAME_ENTRY* GetEntryByNID(WOLFSSL_X509_NAME* name, int nid,
6231
        int* idx)
6232
{
6233
    int i;
6234
    WOLFSSL_X509_NAME_ENTRY* ret = NULL;
6235
6236
    for (i = *idx; i < MAX_NAME_ENTRIES; i++) {
6237
        if (name->entry[i].nid == nid) {
6238
            ret = &name->entry[i];
6239
            *idx = i;
6240
            break;
6241
        }
6242
    }
6243
    return ret;
6244
}
6245
6246
6247
/* Used to get a string from the WOLFSSL_X509_NAME structure that
6248
 * corresponds with the NID value passed in. This finds the first entry with
6249
 * matching NID value, if searching for the case where there is multiple
6250
 * entries with the same NID value than other functions should be used
6251
 * (i.e. wolfSSL_X509_NAME_get_index_by_NID, wolfSSL_X509_NAME_get_entry)
6252
 *
6253
 * name structure to get string from
6254
 * nid  NID value to search for
6255
 * buf  [out] buffer to hold results. If NULL then the buffer size minus the
6256
 *      null char is returned.
6257
 * len  size of "buf" passed in
6258
 *
6259
 * returns the length of string found, not including the NULL terminator.
6260
 *         It's possible the function could return a negative value in the
6261
 *         case that len is less than or equal to 0. A negative value is
6262
 *         considered an error case.
6263
 */
6264
int wolfSSL_X509_NAME_get_text_by_NID(WOLFSSL_X509_NAME* name,
6265
                                      int nid, char* buf, int len)
6266
{
6267
    WOLFSSL_X509_NAME_ENTRY* e;
6268
    unsigned char *text = NULL;
6269
    int textSz = 0;
6270
    int idx    = 0;
6271
6272
    WOLFSSL_ENTER("wolfSSL_X509_NAME_get_text_by_NID");
6273
6274
    if (name == NULL) {
6275
        WOLFSSL_MSG("NULL argument passed in");
6276
        return WOLFSSL_FATAL_ERROR;
6277
    }
6278
6279
    e = GetEntryByNID(name, nid, &idx);
6280
    if (e == NULL) {
6281
        WOLFSSL_MSG("Entry type not found");
6282
        return WOLFSSL_FATAL_ERROR;
6283
    }
6284
    text   = wolfSSL_ASN1_STRING_data(e->value);
6285
    textSz = wolfSSL_ASN1_STRING_length(e->value);
6286
6287
    if (text == NULL) {
6288
        WOLFSSL_MSG("Unable to get entry text");
6289
        return WOLFSSL_FATAL_ERROR;
6290
    }
6291
6292
    /* if buf is NULL return size of buffer needed (minus null char) */
6293
    if (buf == NULL) {
6294
        WOLFSSL_MSG("Buffer is NULL, returning buffer size only");
6295
        return textSz;
6296
    }
6297
    if (len <= 0) {
6298
        return 0;
6299
    }
6300
6301
    /* + 1 to account for null char */
6302
    textSz = (int)min((word32)textSz + 1, (word32)len);
6303
    if (textSz > 0) {
6304
        XMEMCPY(buf, text, textSz - 1);
6305
        buf[textSz - 1] = '\0';
6306
    }
6307
6308
    WOLFSSL_LEAVE("wolfSSL_X509_NAME_get_text_by_NID", textSz);
6309
    return (textSz - 1); /* do not include null character in size */
6310
}
6311
6312
/* Creates a new WOLFSSL_EVP_PKEY structure that has the public key from x509
6313
 *
6314
 * returns a pointer to the created WOLFSSL_EVP_PKEY on success and NULL on fail
6315
 */
6316
WOLFSSL_EVP_PKEY* wolfSSL_X509_get_pubkey(WOLFSSL_X509* x509)
6317
{
6318
    WOLFSSL_EVP_PKEY* key = NULL;
6319
    int ret = 0;
6320
6321
    (void)ret;
6322
6323
    WOLFSSL_ENTER("wolfSSL_X509_get_pubkey");
6324
    if (x509 != NULL) {
6325
        key = wolfSSL_EVP_PKEY_new_ex(x509->heap);
6326
        if (key != NULL) {
6327
            if (x509->pubKeyOID == RSAk) {
6328
                key->type = WC_EVP_PKEY_RSA;
6329
            }
6330
            else if (x509->pubKeyOID == DSAk) {
6331
                key->type = WC_EVP_PKEY_DSA;
6332
            }
6333
            else {
6334
                key->type = WC_EVP_PKEY_EC;
6335
            }
6336
            key->save_type = 0;
6337
            key->pkey.ptr = (char*)XMALLOC(
6338
                        x509->pubKey.length, x509->heap,
6339
                                                       DYNAMIC_TYPE_PUBLIC_KEY);
6340
            if (key->pkey.ptr == NULL) {
6341
                wolfSSL_EVP_PKEY_free(key);
6342
                return NULL;
6343
            }
6344
            XMEMCPY(key->pkey.ptr, x509->pubKey.buffer, x509->pubKey.length);
6345
            key->pkey_sz = (int)x509->pubKey.length;
6346
6347
            #ifdef HAVE_ECC
6348
                key->pkey_curve = (int)x509->pkCurveOID;
6349
            #endif /* HAVE_ECC */
6350
6351
            /* decode RSA key */
6352
            #ifndef NO_RSA
6353
            if (key->type == WC_EVP_PKEY_RSA) {
6354
                key->ownRsa = 1;
6355
                key->rsa = wolfSSL_RSA_new();
6356
                if (key->rsa == NULL) {
6357
                    wolfSSL_EVP_PKEY_free(key);
6358
                    return NULL;
6359
                }
6360
6361
                if (wolfSSL_RSA_LoadDer_ex(key->rsa,
6362
                            (const unsigned char*)key->pkey.ptr, key->pkey_sz,
6363
                            WOLFSSL_RSA_LOAD_PUBLIC) != WOLFSSL_SUCCESS) {
6364
                    wolfSSL_EVP_PKEY_free(key);
6365
                    return NULL;
6366
                }
6367
            }
6368
            #endif /* NO_RSA */
6369
6370
            /* decode ECC key */
6371
            #if defined(HAVE_ECC) && defined(OPENSSL_EXTRA)
6372
            if (key->type == WC_EVP_PKEY_EC) {
6373
                word32 idx = 0;
6374
6375
                key->ownEcc = 1;
6376
                key->ecc = wolfSSL_EC_KEY_new();
6377
                if (key->ecc == NULL || key->ecc->internal == NULL) {
6378
                    wolfSSL_EVP_PKEY_free(key);
6379
                    return NULL;
6380
                }
6381
6382
                /* not using wolfSSL_EC_KEY_LoadDer because public key in x509
6383
                 * is in the format of x963 (no sequence at start of buffer) */
6384
                ret = wc_EccPublicKeyDecode((const unsigned char*)key->pkey.ptr,
6385
                                            &idx, (ecc_key*)key->ecc->internal,
6386
                                            key->pkey_sz);
6387
                if (ret < 0) {
6388
                    WOLFSSL_ERROR_VERBOSE(ret);
6389
                    WOLFSSL_MSG("wc_EccPublicKeyDecode failed");
6390
                    wolfSSL_EVP_PKEY_free(key);
6391
                    return NULL;
6392
                }
6393
6394
                if (SetECKeyExternal(key->ecc) != WOLFSSL_SUCCESS) {
6395
                    WOLFSSL_MSG("SetECKeyExternal failed");
6396
                    wolfSSL_EVP_PKEY_free(key);
6397
                    return NULL;
6398
                }
6399
6400
                key->ecc->inSet = 1;
6401
            }
6402
            #endif /* HAVE_ECC && OPENSSL_EXTRA */
6403
6404
            #ifndef NO_DSA
6405
            if (key->type == WC_EVP_PKEY_DSA) {
6406
                key->ownDsa = 1;
6407
                key->dsa = wolfSSL_DSA_new();
6408
                if (key->dsa == NULL) {
6409
                    wolfSSL_EVP_PKEY_free(key);
6410
                    return NULL;
6411
                }
6412
6413
                if (wolfSSL_DSA_LoadDer_ex(key->dsa,
6414
                            (const unsigned char*)key->pkey.ptr, key->pkey_sz, \
6415
                            WOLFSSL_DSA_LOAD_PUBLIC) != WOLFSSL_SUCCESS) {
6416
                    wolfSSL_DSA_free(key->dsa);
6417
                    key->dsa = NULL;
6418
                    wolfSSL_EVP_PKEY_free(key);
6419
                    return NULL;
6420
                }
6421
            }
6422
            #endif /* NO_DSA */
6423
        }
6424
    }
6425
    return key;
6426
}
6427
#endif /* OPENSSL_EXTRA_X509_SMALL */
6428
6429
/* End of smaller subset of X509 compatibility functions. Avoid increasing the
6430
 * size of this subset and its memory usage */
6431
#endif /* OPENSSL_EXTRA_X509_SMALL || KEEP_PEER_CERT || SESSION_CERTS */
6432
6433
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)
6434
/*
6435
 * Converts a and b to DER and then does an XMEMCMP to check if they match.
6436
 * Returns 0 when certificates match and WOLFSSL_FATAL_ERROR when they don't.
6437
 */
6438
int wolfSSL_X509_cmp(const WOLFSSL_X509 *a, const WOLFSSL_X509 *b)
6439
{
6440
        const byte* derA;
6441
        const byte* derB;
6442
        int outSzA = 0;
6443
        int outSzB = 0;
6444
6445
        if (a == NULL || b == NULL) {
6446
            return BAD_FUNC_ARG;
6447
        }
6448
6449
        derA = wolfSSL_X509_get_der((WOLFSSL_X509*)a, &outSzA);
6450
        if (derA == NULL) {
6451
            WOLFSSL_MSG("wolfSSL_X509_get_der - certificate A has failed");
6452
            return WOLFSSL_FATAL_ERROR;
6453
        }
6454
        derB = wolfSSL_X509_get_der((WOLFSSL_X509*)b, &outSzB);
6455
        if (derB == NULL) {
6456
            WOLFSSL_MSG("wolfSSL_X509_get_der - certificate B has failed");
6457
            return WOLFSSL_FATAL_ERROR;
6458
        }
6459
6460
        if (outSzA != outSzB || XMEMCMP(derA, derB, outSzA) != 0) {
6461
            WOLFSSL_LEAVE("wolfSSL_X509_cmp", WOLFSSL_FATAL_ERROR);
6462
            return WOLFSSL_FATAL_ERROR;
6463
        }
6464
6465
        WOLFSSL_LEAVE("wolfSSL_X509_cmp", 0);
6466
6467
        return 0;
6468
    }
6469
#endif /* OPENSSL_ALL */
6470
6471
#if defined(OPENSSL_EXTRA)
6472
    int wolfSSL_X509_ext_isSet_by_NID(WOLFSSL_X509* x509, int nid)
6473
    {
6474
        int isSet = 0;
6475
6476
        WOLFSSL_ENTER("wolfSSL_X509_ext_isSet_by_NID");
6477
6478
        if (x509 != NULL) {
6479
            switch (nid) {
6480
                case WC_NID_basic_constraints:
6481
                    isSet = x509->basicConstSet; break;
6482
                case WC_NID_subject_alt_name:
6483
                    isSet = x509->subjAltNameSet; break;
6484
                case WC_NID_authority_key_identifier:
6485
                    isSet = x509->authKeyIdSet; break;
6486
                case WC_NID_subject_key_identifier:
6487
                    isSet = x509->subjKeyIdSet; break;
6488
                case WC_NID_key_usage:
6489
                    isSet = x509->keyUsageSet; break;
6490
                case WC_NID_crl_distribution_points:
6491
                    isSet = x509->CRLdistSet; break;
6492
                case WC_NID_ext_key_usage:
6493
                    isSet = ((x509->extKeyUsageSrc) ? 1 : 0); break;
6494
                case WC_NID_info_access:
6495
                    isSet = x509->authInfoSet; break;
6496
            #if defined(WOLFSSL_SEP) || defined(WOLFSSL_QT)
6497
                case WC_NID_certificate_policies:
6498
                    isSet = x509->certPolicySet; break;
6499
            #endif /* WOLFSSL_SEP || WOLFSSL_QT */
6500
                default:
6501
                    WOLFSSL_MSG("NID not in table");
6502
            }
6503
        }
6504
6505
        WOLFSSL_LEAVE("wolfSSL_X509_ext_isSet_by_NID", isSet);
6506
6507
        return isSet;
6508
    }
6509
6510
6511
    int wolfSSL_X509_ext_get_critical_by_NID(WOLFSSL_X509* x509, int nid)
6512
    {
6513
        int crit = 0;
6514
6515
        WOLFSSL_ENTER("wolfSSL_X509_ext_get_critical_by_NID");
6516
6517
        if (x509 != NULL) {
6518
            switch (nid) {
6519
                case WC_NID_basic_constraints:
6520
                    crit = x509->basicConstCrit; break;
6521
                case WC_NID_subject_alt_name:
6522
                    crit = x509->subjAltNameCrit; break;
6523
                case WC_NID_authority_key_identifier:
6524
                    crit = x509->authKeyIdCrit; break;
6525
                case WC_NID_subject_key_identifier:
6526
                    crit = x509->subjKeyIdCrit; break;
6527
                case WC_NID_key_usage:
6528
                    crit = x509->keyUsageCrit; break;
6529
                case WC_NID_crl_distribution_points:
6530
                    crit= x509->CRLdistCrit; break;
6531
                case WC_NID_ext_key_usage:
6532
                    crit= x509->extKeyUsageCrit; break;
6533
            #ifdef WOLFSSL_SEP
6534
                case WC_NID_certificate_policies:
6535
                    crit = x509->certPolicyCrit; break;
6536
            #endif /* WOLFSSL_SEP */
6537
            }
6538
        }
6539
6540
        WOLFSSL_LEAVE("wolfSSL_X509_ext_get_critical_by_NID", crit);
6541
6542
        return crit;
6543
    }
6544
6545
6546
    int wolfSSL_X509_get_isSet_pathLength(WOLFSSL_X509* x509)
6547
    {
6548
        int isSet = 0;
6549
6550
        WOLFSSL_ENTER("wolfSSL_X509_get_isSet_pathLength");
6551
6552
        if (x509 != NULL)
6553
            isSet = x509->basicConstPlSet;
6554
6555
        WOLFSSL_LEAVE("wolfSSL_X509_get_isSet_pathLength", isSet);
6556
6557
        return isSet;
6558
    }
6559
6560
6561
    word32 wolfSSL_X509_get_pathLength(WOLFSSL_X509* x509)
6562
    {
6563
        word32 pathLength = 0;
6564
6565
        WOLFSSL_ENTER("wolfSSL_X509_get_pathLength");
6566
6567
        if (x509 != NULL)
6568
            pathLength = x509->pathLength;
6569
6570
        WOLFSSL_LEAVE("wolfSSL_X509_get_pathLength", pathLength);
6571
6572
        return pathLength;
6573
    }
6574
6575
6576
    unsigned int wolfSSL_X509_get_keyUsage(WOLFSSL_X509* x509)
6577
    {
6578
        word16 usage = 0;
6579
6580
        WOLFSSL_ENTER("wolfSSL_X509_get_keyUsage");
6581
6582
        if (x509 != NULL)
6583
            usage = x509->keyUsage;
6584
6585
        WOLFSSL_LEAVE("wolfSSL_X509_get_keyUsage", usage);
6586
6587
        return usage;
6588
    }
6589
6590
6591
    byte* wolfSSL_X509_get_authorityKeyID(WOLFSSL_X509* x509,
6592
                                          byte* dst, int* dstLen)
6593
    {
6594
        byte *id = NULL;
6595
        int copySz = 0;
6596
6597
        WOLFSSL_ENTER("wolfSSL_X509_get_authorityKeyID");
6598
6599
        if (x509 != NULL) {
6600
            if (x509->authKeyIdSet) {
6601
                copySz = (int)min(dstLen != NULL ? (word32)*dstLen : 0,
6602
                                  x509->authKeyIdSz);
6603
                id = x509->authKeyId;
6604
            }
6605
6606
            if (dst != NULL && dstLen != NULL && id != NULL && copySz > 0) {
6607
                XMEMCPY(dst, id, copySz);
6608
                id = dst;
6609
                *dstLen = copySz;
6610
            }
6611
        }
6612
6613
        WOLFSSL_LEAVE("wolfSSL_X509_get_authorityKeyID", copySz);
6614
6615
        return id;
6616
    }
6617
6618
    byte* wolfSSL_X509_get_subjectKeyID(WOLFSSL_X509* x509,
6619
                                        byte* dst, int* dstLen)
6620
    {
6621
        byte *id = NULL;
6622
        int copySz = 0;
6623
6624
        WOLFSSL_ENTER("wolfSSL_X509_get_subjectKeyID");
6625
6626
        if (x509 != NULL) {
6627
            if (x509->subjKeyIdSet) {
6628
                copySz = (int)min(dstLen != NULL ? (word32) *dstLen : 0,
6629
                                  x509->subjKeyIdSz);
6630
                id = x509->subjKeyId;
6631
            }
6632
6633
            if (dst != NULL && dstLen != NULL && id != NULL && copySz > 0) {
6634
                XMEMCPY(dst, id, copySz);
6635
                id = dst;
6636
                *dstLen = copySz;
6637
            }
6638
        }
6639
6640
        WOLFSSL_LEAVE("wolfSSL_X509_get_subjectKeyID", copySz);
6641
6642
        return id;
6643
    }
6644
6645
    const WOLFSSL_ASN1_STRING *wolfSSL_X509_get0_subject_key_id(
6646
            WOLFSSL_X509 *x509)
6647
    {
6648
        WOLFSSL_ASN1_STRING* ret = NULL;
6649
6650
        WOLFSSL_ENTER("wolfSSL_X509_get0_subject_key_id");
6651
6652
        if (x509 != NULL && x509->subjKeyIdSet) {
6653
            if (x509->subjKeyIdStr == NULL) {
6654
                x509->subjKeyIdStr = wolfSSL_ASN1_STRING_new();
6655
                if (x509->subjKeyIdStr != NULL) {
6656
                    if (wolfSSL_ASN1_STRING_set(x509->subjKeyIdStr,
6657
                            x509->subjKeyId, x509->subjKeyIdSz) == 1) {
6658
                    }
6659
                    else {
6660
                        wolfSSL_ASN1_STRING_free(x509->subjKeyIdStr);
6661
                        x509->subjKeyIdStr = NULL;
6662
                    }
6663
                }
6664
            }
6665
            ret = x509->subjKeyIdStr;
6666
        }
6667
6668
        WOLFSSL_LEAVE("wolfSSL_X509_get0_subject_key_id", ret != NULL);
6669
6670
        return ret;
6671
    }
6672
#endif /* OPENSSL_EXTRA */
6673
6674
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
6675
    defined(OPENSSL_EXTRA_X509_SMALL)
6676
6677
    /* Looks up the index of the first entry encountered with matching NID
6678
     * The search starts from index 'pos'
6679
     * returns a negative value on failure and positive index value on success*/
6680
    int wolfSSL_X509_NAME_get_index_by_NID(WOLFSSL_X509_NAME* name,
6681
                                          int nid, int pos)
6682
    {
6683
        int value = nid, i;
6684
6685
        WOLFSSL_ENTER("wolfSSL_X509_NAME_get_index_by_NID");
6686
6687
        if (name == NULL) {
6688
            return BAD_FUNC_ARG;
6689
        }
6690
6691
        i = pos + 1; /* start search after index passed in */
6692
        if (i < 0) {
6693
            i = 0;
6694
        }
6695
6696
        for (;i < name->entrySz && i < MAX_NAME_ENTRIES; i++) {
6697
            if (name->entry[i].nid == value) {
6698
                return i;
6699
            }
6700
        }
6701
        return WOLFSSL_FATAL_ERROR;
6702
    }
6703
6704
6705
    WOLFSSL_ASN1_STRING*  wolfSSL_X509_NAME_ENTRY_get_data(
6706
                                                    WOLFSSL_X509_NAME_ENTRY* in)
6707
    {
6708
        WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_get_data");
6709
        if (in == NULL)
6710
            return NULL;
6711
6712
        return in->value;
6713
    }
6714
6715
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
6716
6717
#ifdef OPENSSL_EXTRA
6718
#ifndef NO_BIO
6719
6720
#ifndef MAX_WIDTH
6721
    #define MAX_WIDTH 80
6722
#endif
6723
6724
#define ACERT_NUM_DIR_TAGS 4
6725
6726
/* Convenience struct and function for printing the Holder sub fields
6727
 * of an X509 Attribute struct. */
6728
struct acert_dir_print_t {
6729
    const char * pfx;
6730
    const byte   tag[3];
6731
};
6732
6733
static struct acert_dir_print_t acert_dir_print[ACERT_NUM_DIR_TAGS] =
6734
{
6735
    { "C=", {0x55, 0x04, ASN_COUNTRY_NAME} },
6736
    { "O=", {0x55, 0x04, ASN_ORG_NAME} },
6737
    { "OU=", {0x55, 0x04, ASN_ORGUNIT_NAME} },
6738
    { "CN=", {0x55, 0x04, ASN_COMMON_NAME} },
6739
};
6740
6741
/* Print an entry of ASN_DIR_TYPE into dst of length max_len.
6742
 *
6743
 * Returns total_len of str on success.
6744
 * Returns < 0 on failure.
6745
 * */
6746
static int X509PrintDirType(char * dst, int max_len, const DNS_entry * entry)
6747
{
6748
    word32       k = 0;
6749
    word32       i = 0;
6750
    const char * src = entry->name;
6751
    word32       src_len = (word32)XSTRLEN(src);
6752
    int          total_len = 0;
6753
    int          bytes_left = max_len;
6754
    int          fld_len = 0;
6755
    int          match_found = 0;
6756
6757
    XMEMSET(dst, 0, max_len);
6758
6759
    /* loop over printable DIR tags. */
6760
    for (k = 0; k < ACERT_NUM_DIR_TAGS; ++k) {
6761
        const char * pfx = acert_dir_print[k].pfx;
6762
        const byte * tag = acert_dir_print[k].tag;
6763
        byte         asn_tag;
6764
6765
        /* walk through entry looking for matches. */
6766
        for (i = 0; i < src_len - 5; ++i) {
6767
            if (XMEMCMP(tag, &src[i], 3) == 0) {
6768
                if (bytes_left < 5) {
6769
                    /* Not enough space left for name oid + tag + len. */
6770
                    break;
6771
                }
6772
6773
                if (match_found) {
6774
                    /* append a {',', ' '} before doing anything else. */
6775
                    *dst++ = ',';
6776
                    *dst++ = ' ';
6777
                    total_len += 2;
6778
                    bytes_left -= 2;
6779
                }
6780
6781
                i += 3;
6782
6783
                /* Get the ASN Tag. */
6784
                if (GetASNTag((const byte *)src, &i, &asn_tag, src_len) < 0) {
6785
                    WOLFSSL_MSG("error: GetASNTag failed");
6786
                    break;
6787
                }
6788
6789
                /* Check it is printable. */
6790
                if ((asn_tag != ASN_PRINTABLE_STRING) &&
6791
                    (asn_tag != ASN_IA5_STRING) &&
6792
                    (asn_tag != ASN_UTF8STRING)) {
6793
                    /* Don't know what this is but we can't print it. */
6794
                    WOLFSSL_MSG("error: asn tag not printable string");
6795
                    break;
6796
                }
6797
6798
                /* Now get the length of the printable string. */
6799
                if (GetLength((const byte *)src, &i, &fld_len, src_len) < 0) {
6800
                    break;
6801
                }
6802
6803
                /* Make sure we have space to fit it. */
6804
                if ((int) XSTRLEN(pfx) > bytes_left) {
6805
                    /* Not enough space left. */
6806
                    break;
6807
                }
6808
6809
                /* Copy it in, decrement available space. */
6810
                XSTRNCPY(dst, pfx, bytes_left);
6811
                dst += XSTRLEN(pfx);
6812
                total_len += (int)XSTRLEN(pfx);
6813
                bytes_left -= (int)XSTRLEN(pfx);
6814
6815
                if (fld_len > bytes_left) {
6816
                    /* Not enough space left. */
6817
                    break;
6818
                }
6819
6820
                XMEMCPY(dst, &src[i], fld_len);
6821
                i += fld_len;
6822
                dst += fld_len;
6823
                total_len += fld_len;
6824
                bytes_left -= fld_len;
6825
6826
                match_found = 1;
6827
            }
6828
        }
6829
    }
6830
6831
    return total_len;
6832
}
6833
static int X509_print_name_entry(WOLFSSL_BIO* bio,
6834
                                 const DNS_entry* entry, int indent)
6835
{
6836
    int  ret = WOLFSSL_SUCCESS;
6837
    int  nameCount = 0;
6838
    char scratch[MAX_WIDTH];
6839
    int  len;
6840
6841
    if (bio == NULL || entry == NULL) {
6842
        return WOLFSSL_FAILURE;
6843
    }
6844
6845
    len = XSNPRINTF(scratch, MAX_WIDTH, "%*s", indent, "");
6846
    if (len >= MAX_WIDTH) {
6847
        return WOLFSSL_FAILURE;
6848
    }
6849
6850
    if (wolfSSL_BIO_write(bio, scratch, (int)XSTRLEN(scratch)) <= 0) {
6851
        return WOLFSSL_FAILURE;
6852
    }
6853
6854
    while (entry != NULL) {
6855
        ++nameCount;
6856
        if (nameCount > 1) {
6857
            if (wolfSSL_BIO_write(bio, ", ", 2) <= 0) {
6858
                ret = WOLFSSL_FAILURE;
6859
                break;
6860
            }
6861
        }
6862
6863
        if (entry->type == ASN_DNS_TYPE) {
6864
            len = XSNPRINTF(scratch, MAX_WIDTH, "DNS:%s", entry->name);
6865
        }
6866
    #if defined(OPENSSL_ALL) || defined(WOLFSSL_IP_ALT_NAME)
6867
        else if (entry->type == ASN_IP_TYPE) {
6868
            len = XSNPRINTF(scratch, MAX_WIDTH, "IP Address:%s",
6869
                    entry->ipString);
6870
        }
6871
    #endif /* OPENSSL_ALL || WOLFSSL_IP_ALT_NAME */
6872
        else if (entry->type == ASN_RFC822_TYPE) {
6873
            len = XSNPRINTF(scratch, MAX_WIDTH, "email:%s",
6874
                    entry->name);
6875
        }
6876
        else if (entry->type == ASN_DIR_TYPE) {
6877
            len = X509PrintDirType(scratch, MAX_WIDTH, entry);
6878
        }
6879
        else if (entry->type == ASN_URI_TYPE) {
6880
            len = XSNPRINTF(scratch, MAX_WIDTH, "URI:%s",
6881
                entry->name);
6882
        }
6883
    #if defined(OPENSSL_ALL)
6884
        else if (entry->type == ASN_RID_TYPE) {
6885
            len = XSNPRINTF(scratch, MAX_WIDTH, "Registered ID:%s",
6886
                entry->ridString);
6887
        }
6888
    #endif
6889
        else if (entry->type == ASN_OTHER_TYPE) {
6890
            len = XSNPRINTF(scratch, MAX_WIDTH,
6891
                "othername <unsupported>");
6892
        }
6893
        else {
6894
            WOLFSSL_MSG("Bad alt name type.");
6895
            ret = WOLFSSL_FAILURE;
6896
            break;
6897
        }
6898
        if (len >= MAX_WIDTH) {
6899
            ret = WOLFSSL_FAILURE;
6900
            break;
6901
        }
6902
        if (wolfSSL_BIO_write(bio, scratch, (int)XSTRLEN(scratch))
6903
                <= 0) {
6904
            ret = WOLFSSL_FAILURE;
6905
            break;
6906
        }
6907
6908
        entry = entry->next;
6909
    }
6910
6911
    if (ret == WOLFSSL_SUCCESS && wolfSSL_BIO_write(bio, "\n", 1) <= 0) {
6912
        ret = WOLFSSL_FAILURE;
6913
    }
6914
6915
    return ret;
6916
}
6917
6918
#ifdef XSNPRINTF
6919
static int X509PrintKeyUsage(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int indent)
6920
{
6921
    int ret = WOLFSSL_SUCCESS;
6922
    const int usages[] = {
6923
        KEYUSE_DIGITAL_SIG,
6924
        KEYUSE_CONTENT_COMMIT,
6925
        KEYUSE_KEY_ENCIPHER,
6926
        KEYUSE_DATA_ENCIPHER,
6927
        KEYUSE_KEY_AGREE,
6928
        KEYUSE_KEY_CERT_SIGN,
6929
        KEYUSE_CRL_SIGN,
6930
        KEYUSE_ENCIPHER_ONLY,
6931
        KEYUSE_DECIPHER_ONLY
6932
    };
6933
    const char* usageStrs[] = {
6934
        "Digital Signature",
6935
        "Non Repudiation",
6936
        "Key Encipherment",
6937
        "Data Encipherment",
6938
        "Key Agreement",
6939
        "Certificate Sign",
6940
        "CRL Sign",
6941
        "Encipher Only",
6942
        "Decipher Only"
6943
    };
6944
6945
    if (indent < 0) indent = 0;
6946
    if (indent > MAX_INDENT) indent = MAX_INDENT;
6947
6948
    if (bio == NULL || x509 == NULL) {
6949
        ret = WOLFSSL_FAILURE;
6950
    }
6951
6952
    if (ret == WOLFSSL_SUCCESS && x509->keyUsageSet && x509->keyUsage != 0) {
6953
        char scratch[MAX_WIDTH];
6954
        int len;
6955
        word32 i = 0;
6956
        int usageCount = 0;
6957
6958
        len = XSNPRINTF(scratch, MAX_WIDTH, "%*s", indent, "");
6959
        if (len >= MAX_WIDTH)
6960
            ret = WOLFSSL_FAILURE;
6961
        if (ret == WOLFSSL_SUCCESS) {
6962
            if (wolfSSL_BIO_write(bio, scratch, (int)XSTRLEN(scratch)) <= 0) {
6963
                ret = WOLFSSL_FAILURE;
6964
            }
6965
        }
6966
        for (; ret == WOLFSSL_SUCCESS && i < sizeof(usages) / sizeof(usages[i]);
6967
             i++) {
6968
            if (x509->keyUsage & usages[i]) {
6969
                ++usageCount;
6970
                if (usageCount > 1 && wolfSSL_BIO_write(bio, ", ", 2) <= 0) {
6971
                    ret = WOLFSSL_FAILURE;
6972
                    break;
6973
                }
6974
                if (wolfSSL_BIO_write(bio, usageStrs[i],
6975
                                      (int)XSTRLEN(usageStrs[i])) <= 0) {
6976
                    ret = WOLFSSL_FAILURE;
6977
                    break;
6978
                }
6979
            }
6980
        }
6981
        if (ret == WOLFSSL_SUCCESS && wolfSSL_BIO_write(bio, "\n", 1) <= 0) {
6982
            ret = WOLFSSL_FAILURE;
6983
        }
6984
    }
6985
6986
    return ret;
6987
}
6988
6989
static int X509PrintExtendedKeyUsage(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
6990
        int indent)
6991
{
6992
    int ret = WOLFSSL_SUCCESS;
6993
    const int usages[] = {
6994
        EXTKEYUSE_OCSP_SIGN,
6995
        EXTKEYUSE_TIMESTAMP,
6996
        EXTKEYUSE_EMAILPROT,
6997
        EXTKEYUSE_CODESIGN,
6998
        EXTKEYUSE_CLIENT_AUTH,
6999
        EXTKEYUSE_SERVER_AUTH
7000
    };
7001
    const char* usageStrs[] = {
7002
        "OCSP Signing",
7003
        "Time Stamping",
7004
        "E-mail Protection",
7005
        "Code Signing",
7006
        "TLS Web Client Authentication",
7007
        "TLS Web Server Authentication"
7008
    };
7009
7010
    if (bio == NULL || x509 == NULL) {
7011
        ret = WOLFSSL_FAILURE;
7012
    }
7013
7014
    if (ret == WOLFSSL_SUCCESS && x509->extKeyUsageCount > 0
7015
            && x509->extKeyUsage != 0) {
7016
        char scratch[MAX_WIDTH];
7017
        int len;
7018
        word32 i = 0;
7019
        int usageCount = 0;
7020
7021
        len = XSNPRINTF(scratch, MAX_WIDTH, "%*s", indent, "");
7022
        if (len >= MAX_WIDTH)
7023
            ret = WOLFSSL_FAILURE;
7024
        if (ret == WOLFSSL_SUCCESS) {
7025
            if (wolfSSL_BIO_write(bio, scratch, (int)XSTRLEN(scratch)) <= 0) {
7026
                ret = WOLFSSL_FAILURE;
7027
            }
7028
        }
7029
        for (; ret == WOLFSSL_SUCCESS && i < sizeof(usages) / sizeof(usages[i]);
7030
             i++) {
7031
            if (x509->extKeyUsage & usages[i]) {
7032
                ++usageCount;
7033
                if (usageCount > 1 && wolfSSL_BIO_write(bio, ", ", 2) <= 0) {
7034
                    ret = WOLFSSL_FAILURE;
7035
                    break;
7036
                }
7037
                if (wolfSSL_BIO_write(bio, usageStrs[i],
7038
                                      (int)XSTRLEN(usageStrs[i])) <= 0) {
7039
                    ret = WOLFSSL_FAILURE;
7040
                    break;
7041
                }
7042
            }
7043
        }
7044
        if (ret == WOLFSSL_SUCCESS && wolfSSL_BIO_write(bio, "\n", 1) <= 0) {
7045
            ret = WOLFSSL_FAILURE;
7046
        }
7047
    }
7048
7049
    return ret;
7050
}
7051
7052
7053
/* print serial number out
7054
 * return WOLFSSL_SUCCESS on success
7055
 */
7056
static int X509PrintSerial_ex(WOLFSSL_BIO* bio, byte* serial, int sz,
7057
        int delimiter, int indent)
7058
{
7059
    char scratch[MAX_WIDTH];
7060
    const int scratchSz = sizeof(scratch);
7061
    int scratchLen;
7062
7063
    if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*sSerial Number:",
7064
                                 indent, "")) >= MAX_WIDTH) {
7065
        WOLFSSL_MSG("buffer overrun");
7066
        return WOLFSSL_FAILURE;
7067
    }
7068
    if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7069
        return WOLFSSL_FAILURE;
7070
    }
7071
7072
    if (sz > (int)sizeof(byte)) {
7073
        int i;
7074
7075
        /* serial is larger than int size so print off hex values */
7076
        if ((scratchLen = XSNPRINTF(
7077
                 scratch, MAX_WIDTH, "\n%*s", indent + 4, ""))
7078
                >= MAX_WIDTH) {
7079
            WOLFSSL_MSG("buffer overrun");
7080
            return WOLFSSL_FAILURE;
7081
        }
7082
        for (i = 0; i < sz; i++) {
7083
            int valLen;
7084
7085
            if ((valLen = XSNPRINTF(
7086
                     scratch + scratchLen, scratchSz - scratchLen,
7087
                     "%02x%s", serial[i], (i < sz - 1) ?
7088
                     (delimiter ? ":" : "") : "\n"))
7089
                >= scratchSz - scratchLen) {
7090
                WOLFSSL_MSG("buffer overrun");
7091
                return WOLFSSL_FAILURE;
7092
            }
7093
            scratchLen += valLen;
7094
        }
7095
        if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7096
            return WOLFSSL_FAILURE;
7097
        }
7098
    }
7099
7100
    /* if serial can fit into byte then print on the same line */
7101
    else  {
7102
        if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, " %d (0x%x)\n",
7103
                (char)serial[0], serial[0])) >= MAX_WIDTH) {
7104
            WOLFSSL_MSG("buffer overrun");
7105
            return WOLFSSL_FAILURE;
7106
        }
7107
        if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7108
            return WOLFSSL_FAILURE;
7109
        }
7110
    }
7111
    return WOLFSSL_SUCCESS;
7112
}
7113
7114
static int X509PrintSerial(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int indent)
7115
{
7116
    unsigned char serial[32];
7117
    int  sz = sizeof(serial);
7118
7119
    if (indent < 0) indent = 0;
7120
    if (indent > MAX_INDENT) indent = MAX_INDENT;
7121
7122
    XMEMSET(serial, 0, sz);
7123
    if (wolfSSL_X509_get_serial_number(x509, serial, &sz) == WOLFSSL_SUCCESS) {
7124
        X509PrintSerial_ex(bio, serial, sz, 1, indent);
7125
    }
7126
    return WOLFSSL_SUCCESS;
7127
}
7128
7129
#ifndef NO_ASN_TIME
7130
static int X509PrintValidity(WOLFSSL_BIO* bio, WOLFSSL_ASN1_TIME * notBefore,
7131
                             WOLFSSL_ASN1_TIME * notAfter, int indent)
7132
{
7133
    char tmp[80];
7134
    (void) indent;
7135
7136
    if (wolfSSL_BIO_write(bio, "        Validity\n",
7137
                  (int)XSTRLEN("        Validity\n")) <= 0) {
7138
        return WOLFSSL_FAILURE;
7139
    }
7140
7141
    if (wolfSSL_BIO_write(bio, "            Not Before: ",
7142
                  (int)XSTRLEN("            Not Before: ")) <= 0) {
7143
        return WOLFSSL_FAILURE;
7144
    }
7145
    if (notBefore->length > 0) {
7146
        if (GetTimeString(notBefore->data, ASN_UTC_TIME,
7147
            tmp, sizeof(tmp), notBefore->length) != WOLFSSL_SUCCESS) {
7148
            if (GetTimeString(notBefore->data, ASN_GENERALIZED_TIME,
7149
            tmp, sizeof(tmp), notBefore->length) != WOLFSSL_SUCCESS) {
7150
                WOLFSSL_MSG("Error getting not before date");
7151
                return WOLFSSL_FAILURE;
7152
            }
7153
        }
7154
    }
7155
    else {
7156
        XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
7157
    }
7158
    tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
7159
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
7160
        return WOLFSSL_FAILURE;
7161
    }
7162
7163
    if (wolfSSL_BIO_write(bio, "\n            Not After : ",
7164
                  (int)XSTRLEN("\n            Not After : ")) <= 0) {
7165
        return WOLFSSL_FAILURE;
7166
    }
7167
    if (notAfter->length > 0) {
7168
        if (GetTimeString(notAfter->data, ASN_UTC_TIME,
7169
            tmp, sizeof(tmp), notAfter->length) != WOLFSSL_SUCCESS) {
7170
            if (GetTimeString(notAfter->data, ASN_GENERALIZED_TIME,
7171
                tmp, sizeof(tmp), notAfter->length) != WOLFSSL_SUCCESS) {
7172
                WOLFSSL_MSG("Error getting not after date");
7173
                return WOLFSSL_FAILURE;
7174
            }
7175
        }
7176
    }
7177
    else {
7178
        XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
7179
    }
7180
    tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
7181
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
7182
        return WOLFSSL_FAILURE;
7183
    }
7184
7185
    if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
7186
        return WOLFSSL_FAILURE;
7187
    }
7188
7189
    return WOLFSSL_SUCCESS;
7190
}
7191
#endif /* ifndef NO_ASN_TIME */
7192
7193
static int X509PrintSubjAltName(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
7194
                                int indent)
7195
{
7196
    if (!x509 || !x509->altNames || !x509->subjAltNameSet)
7197
        return WOLFSSL_FAILURE;
7198
    return X509_print_name_entry(bio, x509->altNames, indent);
7199
}
7200
7201
/* iterate through certificate extensions printing them out in human readable
7202
 * form
7203
 * return WOLFSSL_SUCCESS on success
7204
 */
7205
static int X509PrintExtensions(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int indent)
7206
{
7207
    int  ret = WOLFSSL_SUCCESS;
7208
    char scratch[MAX_WIDTH];
7209
    const int scratchSz = sizeof(scratch);
7210
    int scratchLen;
7211
    int  count, i;
7212
    char* buf = NULL;
7213
7214
    if (indent < 0) indent = 0;
7215
    if (indent > MAX_INDENT) indent = MAX_INDENT;
7216
7217
    count = wolfSSL_X509_get_ext_count(x509);
7218
    if (count <= 0)
7219
        return WOLFSSL_SUCCESS;
7220
7221
#ifdef WOLFSSL_CERT_REQ
7222
    if (x509->isCSR) {
7223
        if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*s%s\n", indent, "",
7224
                      "Requested extensions:")) >= MAX_WIDTH) {
7225
            return WOLFSSL_FAILURE;
7226
        }
7227
    }
7228
    else
7229
#endif
7230
    {
7231
        if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*s%s\n", indent, "",
7232
                                     "X509v3 extensions:")) >= MAX_WIDTH) {
7233
            return WOLFSSL_FAILURE;
7234
        }
7235
    }
7236
    if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7237
        return WOLFSSL_FAILURE;
7238
    }
7239
7240
    buf = (char*)XMALLOC(MAX_WIDTH, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
7241
    if (buf == NULL) {
7242
        return WOLFSSL_FAILURE;
7243
    }
7244
7245
    for (i = 0; (i < count) && (ret != WC_NO_ERR_TRACE(WOLFSSL_FAILURE)); i++) {
7246
        WOLFSSL_X509_EXTENSION* ext;
7247
7248
        ext = wolfSSL_X509_get_ext(x509, i);
7249
        if (ext != NULL) {
7250
            WOLFSSL_ASN1_OBJECT* obj;
7251
            int nid;
7252
            char val[6];
7253
            int valLen;
7254
            word32 j;
7255
7256
            obj = wolfSSL_X509_EXTENSION_get_object(ext);
7257
            if (obj == NULL) {
7258
                ret = WOLFSSL_FAILURE;
7259
                break;
7260
            }
7261
            if (wolfSSL_OBJ_obj2txt(buf, MAX_WIDTH, obj, 0)
7262
                == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
7263
            {
7264
                ret = WOLFSSL_FAILURE;
7265
                break;
7266
            }
7267
            if ((scratchLen = XSNPRINTF(
7268
                     scratch, MAX_WIDTH, "%*s%s%s\n", indent + 4, "",
7269
                     buf,
7270
                     (wolfSSL_X509_EXTENSION_get_critical(ext)
7271
                      ? ": critical"
7272
                      : ": ")))
7273
                >= MAX_WIDTH)
7274
            {
7275
                ret = WOLFSSL_FAILURE;
7276
                break;
7277
            }
7278
7279
            if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7280
                ret = WOLFSSL_FAILURE;
7281
                break;
7282
            }
7283
            nid = wolfSSL_OBJ_obj2nid(obj);
7284
            switch (nid) {
7285
            case WC_NID_subject_alt_name:
7286
                ret = X509PrintSubjAltName(bio, x509, indent + 8);
7287
                break;
7288
7289
            case WC_NID_subject_key_identifier:
7290
                if (!x509->subjKeyIdSet || x509->subjKeyId == NULL ||
7291
                    x509->subjKeyIdSz == 0)
7292
                {
7293
                    ret = WOLFSSL_FAILURE;
7294
                    break;
7295
                }
7296
7297
                if ((scratchLen = XSNPRINTF(
7298
                         scratch, scratchSz,
7299
                         "%*s", indent + 8, "")) >= scratchSz)
7300
                {
7301
                    ret = WOLFSSL_FAILURE;
7302
                    break;
7303
                }
7304
                for (j = 0; j < x509->subjKeyIdSz; j++) {
7305
                    if ((valLen = XSNPRINTF(
7306
                             val, sizeof(val), "%02X%s",
7307
                             x509->subjKeyId[j],
7308
                             (j < x509->subjKeyIdSz - 1) ? ":" : "\n"))
7309
                        >= (int)sizeof(val))
7310
                    {
7311
                        ret = WOLFSSL_FAILURE;
7312
                        break;
7313
                    }
7314
                    if (scratchLen + valLen >= scratchSz) {
7315
                        if (wolfSSL_BIO_write(bio, scratch,
7316
                                              scratchLen) <= 0) {
7317
                            ret = WOLFSSL_FAILURE;
7318
                            break;
7319
                        }
7320
                        scratchLen = 0;
7321
                    }
7322
                    XMEMCPY(scratch + scratchLen, val, valLen);
7323
                    scratchLen += valLen;
7324
                }
7325
                if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
7326
                    break;
7327
                if (wolfSSL_BIO_write(bio, scratch,
7328
                                      scratchLen) <= 0) {
7329
                    ret = WOLFSSL_FAILURE;
7330
                    break;
7331
                }
7332
                break;
7333
7334
            case WC_NID_authority_key_identifier:
7335
                if (!x509->authKeyIdSet || x509->authKeyId == NULL ||
7336
                    x509->authKeyIdSz == 0) {
7337
                    ret = WOLFSSL_FAILURE;
7338
                    break;
7339
                }
7340
7341
                if ((scratchLen = XSNPRINTF(
7342
                         scratch, scratchSz, "%*s%s",
7343
                         indent + 8, "", "keyid:")) >= scratchSz)
7344
                {
7345
                    ret = WOLFSSL_FAILURE;
7346
                    break;
7347
                }
7348
                for (j = 0; j < x509->authKeyIdSz; j++) {
7349
                    if ((valLen = XSNPRINTF(
7350
                             val, sizeof(val), "%02X%s",
7351
                             x509->authKeyId[j],
7352
                             (j < x509->authKeyIdSz - 1) ? ":" : "\n\n"))
7353
                        >= (int)sizeof(val))
7354
                    {
7355
                        ret = WOLFSSL_FAILURE;
7356
                        break;
7357
                    }
7358
                    if (scratchLen >= scratchSz - valLen) {
7359
                        if (wolfSSL_BIO_write(bio, scratch,
7360
                                              scratchLen) <= 0)
7361
                        {
7362
                            ret = WOLFSSL_FAILURE;
7363
                            break;
7364
                        }
7365
                        scratchLen = 0;
7366
                    }
7367
                    if (scratchLen + valLen >= scratchSz) {
7368
                        ret = WOLFSSL_FAILURE;
7369
                        break;
7370
                    }
7371
                    XMEMCPY(scratch + scratchLen, val, valLen);
7372
                    scratchLen += valLen;
7373
                }
7374
                if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
7375
                    break;
7376
                if (wolfSSL_BIO_write(bio, scratch,
7377
                                      scratchLen) <= 0) {
7378
                    ret = WOLFSSL_FAILURE;
7379
                    break;
7380
                }
7381
                break;
7382
7383
            case WC_NID_basic_constraints:
7384
                if (!x509->basicConstSet) {
7385
                    ret = WOLFSSL_FAILURE;
7386
                    break;
7387
                }
7388
                if ((scratchLen = XSNPRINTF(
7389
                         scratch, scratchSz,
7390
                         "%*sCA:%s\n",
7391
                         indent + 8, "", (x509->isCa)? "TRUE": "FALSE"))
7392
                    >= scratchSz)
7393
                {
7394
                    ret = WOLFSSL_FAILURE;
7395
                    break;
7396
                }
7397
                if (wolfSSL_BIO_write(bio, scratch,
7398
                                      scratchLen) <= 0) {
7399
                    ret = WOLFSSL_FAILURE;
7400
                    break;
7401
                }
7402
                break;
7403
7404
            case WC_NID_key_usage:
7405
                ret = X509PrintKeyUsage(bio, x509, indent + 8);
7406
                break;
7407
7408
            case WC_NID_ext_key_usage:
7409
                ret = X509PrintExtendedKeyUsage(bio, x509, indent + 8);
7410
                break;
7411
7412
            default:
7413
                /* extension nid not yet supported */
7414
                if ((scratchLen = XSNPRINTF(
7415
                         scratch, MAX_WIDTH,
7416
                         "%*sNID %d print not yet supported\n",
7417
                         indent + 8, "", nid)) >= MAX_WIDTH)
7418
                {
7419
                    ret = WOLFSSL_FAILURE;
7420
                    break;
7421
                }
7422
7423
                if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7424
                    ret = WOLFSSL_FAILURE;
7425
                    break;
7426
                }
7427
            }
7428
        }
7429
    }
7430
7431
    XFREE(buf, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
7432
7433
    return ret;
7434
}
7435
7436
7437
/* print out the signature in human readable format for use with
7438
 * wolfSSL_X509_print()
7439
 * return WOLFSSL_SUCCESS on success
7440
 */
7441
static int X509PrintSignature_ex(WOLFSSL_BIO* bio, byte* sig,
7442
        int sigSz, int sigNid, int algOnly, int indent)
7443
{
7444
    char scratch[MAX_WIDTH];
7445
    int scratchLen;
7446
    WOLFSSL_ASN1_OBJECT* obj = NULL;
7447
    int ret = WOLFSSL_SUCCESS;
7448
    char tmp[100];
7449
    int tmpLen = 0;
7450
7451
    if (sigSz <= 0) {
7452
        return WOLFSSL_SUCCESS;
7453
    }
7454
7455
    if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*s%s", indent, "",
7456
                                "Signature Algorithm: ")) >= MAX_WIDTH) {
7457
        ret = WOLFSSL_FAILURE;
7458
    }
7459
7460
    if (ret == WOLFSSL_SUCCESS) {
7461
        if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0)
7462
            ret = WOLFSSL_FAILURE;
7463
    }
7464
7465
    if (ret == WOLFSSL_SUCCESS) {
7466
        obj = wolfSSL_OBJ_nid2obj(sigNid);
7467
        if (obj == NULL)
7468
            ret = WOLFSSL_FAILURE;
7469
    }
7470
    if (ret == WOLFSSL_SUCCESS) {
7471
        if (wolfSSL_OBJ_obj2txt(scratch, MAX_WIDTH, obj, 0)
7472
            == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
7473
        {
7474
            ret = WOLFSSL_FAILURE;
7475
        }
7476
    }
7477
7478
    if (ret == WOLFSSL_SUCCESS) {
7479
        if ((tmpLen = XSNPRINTF(tmp, sizeof(tmp),"%s\n", scratch))
7480
            >= (int)sizeof(tmp))
7481
        {
7482
            ret = WOLFSSL_FAILURE;
7483
        }
7484
    }
7485
    if (ret == WOLFSSL_SUCCESS) {
7486
        if (wolfSSL_BIO_write(bio, tmp, tmpLen) <= 0)
7487
            ret = WOLFSSL_FAILURE;
7488
    }
7489
7490
    /* Leave function if the desired content to print
7491
     * is only the signature algorithm */
7492
    if (algOnly) {
7493
        if (obj != NULL)
7494
            wolfSSL_ASN1_OBJECT_free(obj);
7495
7496
        return ret;
7497
    }
7498
7499
    if (ret == WOLFSSL_SUCCESS) {
7500
        if ((tmpLen = XSNPRINTF(tmp, sizeof(tmp), "%*s", indent + 5, ""))
7501
            >= (int)sizeof(tmp))
7502
        {
7503
            ret = WOLFSSL_FAILURE;
7504
        }
7505
    }
7506
7507
    if (ret == WOLFSSL_SUCCESS) {
7508
        int i;
7509
7510
        for (i = 0; i < sigSz; i++) {
7511
            char val[6];
7512
            int valLen;
7513
7514
            if (i == 0) {
7515
                if ((valLen = XSNPRINTF(val, sizeof(val), "%02x", sig[i]))
7516
                    >= (int)sizeof(val))
7517
                {
7518
                    ret = WOLFSSL_FAILURE;
7519
                    break;
7520
                }
7521
            }
7522
            else if (((i % 18) == 0)) {
7523
                if (wolfSSL_BIO_write(bio, tmp, tmpLen)
7524
                    <= 0) {
7525
                    ret = WOLFSSL_FAILURE;
7526
                    break;
7527
                }
7528
                if ((tmpLen = XSNPRINTF(tmp, sizeof(tmp), ":\n%*s",
7529
                                        indent + 5, ""))
7530
                    >= (int)sizeof(tmp))
7531
                {
7532
                    ret = WOLFSSL_FAILURE;
7533
                    break;
7534
                }
7535
                if ((valLen = XSNPRINTF(val, sizeof(val), "%02x", sig[i]))
7536
                    >= (int)sizeof(val))
7537
                {
7538
                    ret = WOLFSSL_FAILURE;
7539
                    break;
7540
                }
7541
            }
7542
            else {
7543
                if ((valLen = XSNPRINTF(val, sizeof(val), ":%02x", sig[i]))
7544
                    >= (int)sizeof(val))
7545
                {
7546
                    ret = WOLFSSL_FAILURE;
7547
                    break;
7548
                }
7549
            }
7550
            if ((tmpLen < 0) || (valLen < 0) ||
7551
                    (valLen >= ((int)sizeof(tmp) - tmpLen - 1))) {
7552
                ret = WOLFSSL_FAILURE;
7553
                break;
7554
            }
7555
            XMEMCPY(tmp + tmpLen, val, valLen);
7556
            tmpLen += valLen;
7557
            tmp[tmpLen] = 0;
7558
        }
7559
    }
7560
7561
    /* print out remaining sig values */
7562
    if (ret == WOLFSSL_SUCCESS) {
7563
        if (tmpLen > 0) {
7564
            if (wolfSSL_BIO_write(bio, tmp, tmpLen)
7565
                <= 0)
7566
            {
7567
                ret = WOLFSSL_FAILURE;
7568
            }
7569
        }
7570
    }
7571
7572
    if (obj != NULL)
7573
        wolfSSL_ASN1_OBJECT_free(obj);
7574
7575
    return ret;
7576
}
7577
7578
static int X509PrintSignature(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
7579
        int algOnly, int indent)
7580
{
7581
    int sigSz = 0;
7582
    if (wolfSSL_X509_get_signature(x509, NULL, &sigSz) <= 0) {
7583
        return WOLFSSL_FAILURE;
7584
    }
7585
7586
    if (sigSz > 0) {
7587
        unsigned char* sig;
7588
        int sigNid;
7589
7590
        sigNid = wolfSSL_X509_get_signature_nid(x509);
7591
        if (sigNid <= 0) {
7592
            return WOLFSSL_FAILURE;
7593
        }
7594
7595
        sig = (unsigned char*)XMALLOC(sigSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
7596
        if (sig == NULL) {
7597
            return WOLFSSL_FAILURE;
7598
        }
7599
7600
        if (wolfSSL_X509_get_signature(x509, sig, &sigSz) <= 0) {
7601
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
7602
            return WOLFSSL_FAILURE;
7603
        }
7604
7605
        if (X509PrintSignature_ex(bio, sig, sigSz, sigNid, algOnly, indent)
7606
                != WOLFSSL_SUCCESS) {
7607
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
7608
            return WOLFSSL_FAILURE;
7609
        }
7610
7611
        XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
7612
7613
    }
7614
7615
    return WOLFSSL_SUCCESS;
7616
}
7617
7618
7619
/* print out the public key in human readable format for use with
7620
 * wolfSSL_X509_print()
7621
 * return WOLFSSL_SUCCESS on success
7622
 */
7623
static int X509PrintPubKey(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int indent)
7624
{
7625
    char scratch[MAX_WIDTH];
7626
    WOLFSSL_EVP_PKEY* pubKey;
7627
    int len;
7628
    int ret = WOLFSSL_SUCCESS;
7629
7630
    if (indent < 0) indent = 0;
7631
    if (indent > MAX_INDENT) indent = MAX_INDENT;
7632
7633
    if (bio == NULL || x509 == NULL)
7634
        return BAD_FUNC_ARG;
7635
7636
    len = XSNPRINTF(scratch, MAX_WIDTH, "%*sSubject Public Key Info:\n", indent,
7637
        "");
7638
    if (len >= MAX_WIDTH)
7639
        return WOLFSSL_FAILURE;
7640
    if (wolfSSL_BIO_write(bio, scratch, len) <= 0)
7641
        return WOLFSSL_FAILURE;
7642
7643
    switch (x509->pubKeyOID) {
7644
    #ifndef NO_RSA
7645
        case RSAk:
7646
            len = XSNPRINTF(scratch, MAX_WIDTH,
7647
                    "%*sPublic Key Algorithm: rsaEncryption\n", indent + 4, "");
7648
            if (len >= MAX_WIDTH)
7649
                return WOLFSSL_FAILURE;
7650
            if (wolfSSL_BIO_write(bio, scratch, len) <= 0)
7651
                return WOLFSSL_FAILURE;
7652
            break;
7653
    #endif
7654
    #ifdef HAVE_ECC
7655
        case ECDSAk:
7656
            len = XSNPRINTF(scratch, MAX_WIDTH,
7657
                    "%*sPublic Key Algorithm: EC\n", indent + 4, "");
7658
            if ((len < 0) || (len >= MAX_WIDTH))
7659
                return WOLFSSL_FAILURE;
7660
            if (wolfSSL_BIO_write(bio, scratch, len) <= 0)
7661
                return WOLFSSL_FAILURE;
7662
            break;
7663
    #endif
7664
        default:
7665
                WOLFSSL_MSG("Unknown key type");
7666
                return WOLFSSL_FAILURE;
7667
    }
7668
7669
    pubKey = wolfSSL_X509_get_pubkey(x509);
7670
    if (pubKey == NULL)
7671
        return WOLFSSL_FAILURE;
7672
7673
    ret = wolfSSL_EVP_PKEY_print_public(bio, pubKey, indent + 8, NULL);
7674
7675
    wolfSSL_EVP_PKEY_free(pubKey);
7676
7677
    return ret;
7678
}
7679
7680
7681
/* human readable print out of x509 name formatted for use with
7682
 * wolfSSL_X509_print()
7683
 * return WOLFSSL_SUCCESS on success
7684
 */
7685
static int X509PrintName(WOLFSSL_BIO* bio, WOLFSSL_X509_NAME* name,
7686
        char* type, int indent)
7687
{
7688
    if (name != NULL) {
7689
        char scratch[MAX_WIDTH];
7690
        int scratchLen;
7691
7692
        if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH,
7693
                                     "%*s%s", indent, "", type))
7694
            >= MAX_WIDTH)
7695
        {
7696
            return WOLFSSL_FAILURE;
7697
        }
7698
        if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7699
            return WOLFSSL_FAILURE;
7700
        }
7701
        if (wolfSSL_X509_NAME_print_ex(bio, name, 1, 0) <= 0) {
7702
            return WOLFSSL_FAILURE;
7703
        }
7704
        if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
7705
            return WOLFSSL_FAILURE;
7706
        }
7707
    }
7708
    return WOLFSSL_SUCCESS;
7709
}
7710
7711
7712
/* human readable print out of x509 version
7713
 * return WOLFSSL_SUCCESS on success
7714
 */
7715
static int X509PrintVersion(WOLFSSL_BIO* bio, int version, int indent)
7716
{
7717
    char scratch[MAX_WIDTH];
7718
    int scratchLen;
7719
7720
    if (indent < 0) indent = 0;
7721
    if (indent > MAX_INDENT) indent = MAX_INDENT;
7722
7723
    scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*s%s", indent, "", "Version:");
7724
    if ((scratchLen < 0) || (scratchLen >= MAX_WIDTH)) {
7725
        return WOLFSSL_FAILURE;
7726
    }
7727
7728
    if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7729
        return WOLFSSL_FAILURE;
7730
    }
7731
7732
    scratchLen = XSNPRINTF(scratch, MAX_WIDTH, " %d (0x%x)\n",
7733
                    version, (byte)version-1);
7734
    if ((scratchLen < 0) || (scratchLen >= MAX_WIDTH)) {
7735
        return WOLFSSL_FAILURE;
7736
    }
7737
7738
    if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7739
        return WOLFSSL_FAILURE;
7740
    }
7741
    return WOLFSSL_SUCCESS;
7742
}
7743
7744
#ifdef WOLFSSL_CERT_REQ
7745
/* Print out of REQ attributes
7746
 * return WOLFSSL_SUCCESS on success
7747
 */
7748
static int X509PrintReqAttributes(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
7749
        int indent)
7750
{
7751
    WOLFSSL_X509_ATTRIBUTE* attr;
7752
    char scratch[MAX_WIDTH];
7753
    int scratchLen;
7754
    int i = 0;
7755
7756
    if (indent < 0) indent = 0;
7757
    if (indent > MAX_INDENT) indent = MAX_INDENT;
7758
7759
    if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH,
7760
                                 "%*s%s", indent, "", "Attributes: \n"))
7761
        >= MAX_WIDTH)
7762
    {
7763
        return WOLFSSL_FAILURE;
7764
    }
7765
    if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7766
        return WOLFSSL_FAILURE;
7767
    }
7768
    do {
7769
        attr = wolfSSL_X509_REQ_get_attr(x509, i);
7770
        if (attr != NULL) {
7771
            char lName[NAME_SZ/4]; /* NAME_SZ default is 80 */
7772
            int lNameSz = NAME_SZ/4;
7773
            const byte* data;
7774
7775
            if (wolfSSL_OBJ_obj2txt(lName, lNameSz, attr->object, 0)
7776
                == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
7777
            {
7778
                return WOLFSSL_FAILURE;
7779
            }
7780
            lNameSz = (int)XSTRLEN(lName);
7781
            data = wolfSSL_ASN1_STRING_get0_data(
7782
                    attr->value->value.asn1_string);
7783
            if (data == NULL) {
7784
                WOLFSSL_MSG("No REQ attribute found when expected");
7785
                return WOLFSSL_FAILURE;
7786
            }
7787
            if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH,
7788
                          "%*s%s%*s:%s\n", indent+4, "",
7789
                          lName, (NAME_SZ/4)-lNameSz, "", data))
7790
                >= MAX_WIDTH)
7791
            {
7792
                return WOLFSSL_FAILURE;
7793
            }
7794
            if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7795
                WOLFSSL_MSG("Error writing REQ attribute");
7796
                return WOLFSSL_FAILURE;
7797
            }
7798
        }
7799
        i++;
7800
    } while (attr != NULL);
7801
7802
    return WOLFSSL_SUCCESS;
7803
}
7804
7805
7806
/*
7807
 * return WOLFSSL_SUCCESS on success
7808
 */
7809
int wolfSSL_X509_REQ_print(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
7810
{
7811
    char subjType[] = "Subject: ";
7812
7813
    if (bio == NULL || x509 == NULL) {
7814
        return WOLFSSL_FAILURE;
7815
    }
7816
7817
    if (wolfSSL_BIO_write(bio, "Certificate Request:\n",
7818
                  (int)XSTRLEN("Certificate Request:\n")) <= 0) {
7819
            return WOLFSSL_FAILURE;
7820
    }
7821
7822
    if (wolfSSL_BIO_write(bio, "    Data:\n",
7823
                  (int)XSTRLEN("    Data:\n")) <= 0) {
7824
            return WOLFSSL_FAILURE;
7825
    }
7826
7827
    /* print version of cert.  Note that we increment by 1 because for REQs,
7828
     * the value stored in x509->version is the actual value of the field; not
7829
     * the version. */
7830
    if (X509PrintVersion(bio, (int)wolfSSL_X509_REQ_get_version(x509) + 1, 8)
7831
            != WOLFSSL_SUCCESS) {
7832
        return WOLFSSL_FAILURE;
7833
    }
7834
7835
    if (X509PrintSerial(bio, x509, 8) != WOLFSSL_SUCCESS) {
7836
        return WOLFSSL_FAILURE;
7837
    }
7838
7839
    /* print subject */
7840
    if (X509PrintName(bio, wolfSSL_X509_get_subject_name(x509), subjType, 8)
7841
            != WOLFSSL_SUCCESS) {
7842
        return WOLFSSL_FAILURE;
7843
    }
7844
7845
    /* get and print public key */
7846
    if (X509PrintPubKey(bio, x509, 8) != WOLFSSL_SUCCESS) {
7847
        return WOLFSSL_FAILURE;
7848
    }
7849
7850
    /* print out extensions */
7851
    if (X509PrintExtensions(bio, x509, 4) != WOLFSSL_SUCCESS) {
7852
        return WOLFSSL_FAILURE;
7853
    }
7854
7855
    /* print out req attributes */
7856
    if (X509PrintReqAttributes(bio, x509, 4) != WOLFSSL_SUCCESS) {
7857
        return WOLFSSL_FAILURE;
7858
    }
7859
7860
    /* print out signature */
7861
    if (X509PrintSignature(bio, x509, 0, 4) != WOLFSSL_SUCCESS) {
7862
        return WOLFSSL_FAILURE;
7863
    }
7864
7865
    /* done with print out */
7866
    if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
7867
        return WOLFSSL_FAILURE;
7868
    }
7869
7870
    return WOLFSSL_SUCCESS;
7871
}
7872
#endif /* WOLFSSL_CERT_REQ */
7873
7874
7875
/* Writes the human readable form of x509 to bio.
7876
 *
7877
 * bio  WOLFSSL_BIO to write to.
7878
 * x509 Certificate to write.
7879
 *
7880
 * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on failure
7881
 */
7882
int wolfSSL_X509_print_ex(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
7883
    unsigned long nmflags, unsigned long cflag)
7884
{
7885
    char issuType[] = "Issuer:";
7886
    char subjType[] = "Subject:";
7887
7888
    WOLFSSL_ENTER("wolfSSL_X509_print_ex");
7889
7890
    /* flags currently not supported */
7891
    (void)nmflags;
7892
    (void)cflag;
7893
7894
    if (bio == NULL || x509 == NULL) {
7895
        return WOLFSSL_FAILURE;
7896
    }
7897
7898
    if (wolfSSL_BIO_write(bio, "Certificate:\n",
7899
                  (int)XSTRLEN("Certificate:\n")) <= 0) {
7900
            return WOLFSSL_FAILURE;
7901
    }
7902
7903
    if (wolfSSL_BIO_write(bio, "    Data:\n",
7904
                  (int)XSTRLEN("    Data:\n")) <= 0) {
7905
            return WOLFSSL_FAILURE;
7906
    }
7907
7908
    /* print version of cert */
7909
    if (X509PrintVersion(bio, wolfSSL_X509_version(x509), 8)
7910
            != WOLFSSL_SUCCESS) {
7911
        return WOLFSSL_FAILURE;
7912
    }
7913
7914
    /* print serial number out */
7915
    if (X509PrintSerial(bio, x509, 8) != WOLFSSL_SUCCESS) {
7916
        return WOLFSSL_FAILURE;
7917
    }
7918
7919
    /* print out signature algo*/
7920
    if (X509PrintSignature(bio, x509, 1, 8) != WOLFSSL_SUCCESS) {
7921
        return WOLFSSL_FAILURE;
7922
    }
7923
7924
    /* print issuer */
7925
    if (X509PrintName(bio, wolfSSL_X509_get_issuer_name(x509), issuType, 8)
7926
            != WOLFSSL_SUCCESS) {
7927
        return WOLFSSL_FAILURE;
7928
    }
7929
7930
    #ifndef NO_ASN_TIME
7931
    /* print validity */
7932
    if (X509PrintValidity(bio, &x509->notBefore, &x509->notAfter, 8)
7933
        != WOLFSSL_SUCCESS) {
7934
        return WOLFSSL_FAILURE;
7935
    }
7936
    #endif /* NO_ASN_TIME */
7937
7938
    /* print subject */
7939
    if (X509PrintName(bio, wolfSSL_X509_get_subject_name(x509), subjType, 8)
7940
            != WOLFSSL_SUCCESS) {
7941
        return WOLFSSL_FAILURE;
7942
    }
7943
7944
    /* get and print public key */
7945
    if (X509PrintPubKey(bio, x509, 8) != WOLFSSL_SUCCESS) {
7946
        return WOLFSSL_FAILURE;
7947
    }
7948
7949
    /* print out extensions */
7950
    if (X509PrintExtensions(bio, x509, 8) != WOLFSSL_SUCCESS) {
7951
        return WOLFSSL_FAILURE;
7952
    }
7953
7954
    /* print out signature */
7955
    if (X509PrintSignature(bio, x509, 0, 4) != WOLFSSL_SUCCESS) {
7956
        return WOLFSSL_FAILURE;
7957
    }
7958
7959
    /* done with print out */
7960
    if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
7961
        return WOLFSSL_FAILURE;
7962
    }
7963
7964
    return WOLFSSL_SUCCESS;
7965
}
7966
int wolfSSL_X509_print(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
7967
{
7968
    return wolfSSL_X509_print_ex(bio, x509, 0, 0);
7969
}
7970
7971
#if defined(WOLFSSL_ACERT)
7972
/* Retrieve sig NID from an ACERT.
7973
 *
7974
 * returns  NID on success
7975
 * returns  0 on failure
7976
 */
7977
int wolfSSL_X509_ACERT_get_signature_nid(const WOLFSSL_X509_ACERT *x509)
7978
{
7979
    if (x509 == NULL) {
7980
        return 0;
7981
    }
7982
7983
    return oid2nid((word32)x509->sigOID, oidSigType);
7984
}
7985
7986
static int X509AcertPrintSignature(WOLFSSL_BIO* bio, WOLFSSL_X509_ACERT* x509,
7987
                                   int algOnly, int indent)
7988
{
7989
    int sigSz = 0;
7990
    if (wolfSSL_X509_ACERT_get_signature(x509, NULL, &sigSz) <= 0) {
7991
        return WOLFSSL_FAILURE;
7992
    }
7993
7994
    if (sigSz > 0) {
7995
        unsigned char* sig;
7996
        int sigNid;
7997
7998
        sigNid = wolfSSL_X509_ACERT_get_signature_nid(x509);
7999
        if (sigNid <= 0) {
8000
            return WOLFSSL_FAILURE;
8001
        }
8002
8003
        sig = (unsigned char*)XMALLOC(sigSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8004
        if (sig == NULL) {
8005
            return WOLFSSL_FAILURE;
8006
        }
8007
8008
        if (wolfSSL_X509_ACERT_get_signature(x509, sig, &sigSz) <= 0) {
8009
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8010
            return WOLFSSL_FAILURE;
8011
        }
8012
8013
        if (X509PrintSignature_ex(bio, sig, sigSz, sigNid, algOnly, indent)
8014
                != WOLFSSL_SUCCESS) {
8015
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8016
            return WOLFSSL_FAILURE;
8017
        }
8018
8019
        if (sig != NULL) {
8020
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8021
        }
8022
8023
    }
8024
8025
    return WOLFSSL_SUCCESS;
8026
}
8027
8028
static int X509AcertPrintSerial(WOLFSSL_BIO* bio, WOLFSSL_X509_ACERT* x509,
8029
                                int indent)
8030
{
8031
    unsigned char serial[32];
8032
    int  sz = sizeof(serial);
8033
8034
    XMEMSET(serial, 0, sz);
8035
    if (wolfSSL_X509_ACERT_get_serial_number(x509, serial, &sz)
8036
        == WOLFSSL_SUCCESS) {
8037
        X509PrintSerial_ex(bio, serial, sz, 1, indent);
8038
    }
8039
    return WOLFSSL_SUCCESS;
8040
}
8041
8042
int wolfSSL_X509_ACERT_print(WOLFSSL_BIO* bio, WOLFSSL_X509_ACERT* x509)
8043
{
8044
    const char * hdr =                "Attribute Certificate:\n";
8045
    const char * data_hdr =           "    Data:\n";
8046
    const char * holder_hdr =         "        Holder:\n";
8047
    const char * holder_issuer_hdr =  "            Issuer:";
8048
    const char * holder_name_hdr =    "            Name:";
8049
    const char * attcert_issuer_hdr = "        Issuer:";
8050
8051
    if (bio == NULL || x509 == NULL) {
8052
        return WOLFSSL_FAILURE;
8053
    }
8054
8055
    /* print acert header */
8056
    if (wolfSSL_BIO_write(bio, hdr, (int)XSTRLEN(hdr)) <= 0) {
8057
        return WOLFSSL_FAILURE;
8058
    }
8059
8060
    /* print data header */
8061
    if (wolfSSL_BIO_write(bio, data_hdr, (int)XSTRLEN(data_hdr)) <= 0) {
8062
        return WOLFSSL_FAILURE;
8063
    }
8064
8065
    /* print version of cert */
8066
    if (X509PrintVersion(bio, wolfSSL_X509_ACERT_version(x509), 8)
8067
            != WOLFSSL_SUCCESS) {
8068
        return WOLFSSL_FAILURE;
8069
    }
8070
8071
    /* print serial number out */
8072
    if (X509AcertPrintSerial(bio, x509, 8) != WOLFSSL_SUCCESS) {
8073
        return WOLFSSL_FAILURE;
8074
    }
8075
8076
    /* print holder field */
8077
    if (wolfSSL_BIO_write(bio, holder_hdr, (int)XSTRLEN(holder_hdr)) <= 0) {
8078
        return WOLFSSL_FAILURE;
8079
    }
8080
8081
    if (x509->holderEntityName != NULL) {
8082
        /* print issuer header */
8083
        if (wolfSSL_BIO_write(bio, holder_name_hdr,
8084
            (int)XSTRLEN(holder_name_hdr)) <= 0) {
8085
            return WOLFSSL_FAILURE;
8086
        }
8087
8088
        if (X509_print_name_entry(bio, x509->holderEntityName, 1)
8089
                != WOLFSSL_SUCCESS) {
8090
            return WOLFSSL_FAILURE;
8091
        }
8092
    }
8093
8094
    if (x509->holderIssuerName != NULL) {
8095
        /* print issuer header */
8096
        if (wolfSSL_BIO_write(bio, holder_issuer_hdr,
8097
            (int)XSTRLEN(holder_issuer_hdr)) <= 0) {
8098
            return WOLFSSL_FAILURE;
8099
        }
8100
8101
        if (X509_print_name_entry(bio, x509->holderIssuerName, 1)
8102
            != WOLFSSL_SUCCESS) {
8103
            return WOLFSSL_FAILURE;
8104
        }
8105
    }
8106
8107
    if (x509->holderSerialSz > 0) {
8108
        X509PrintSerial_ex(bio, x509->holderSerial, x509->holderSerialSz,
8109
                           1, 12);
8110
    }
8111
8112
    /* print issuer header */
8113
    if (wolfSSL_BIO_write(bio, attcert_issuer_hdr,
8114
        (int)XSTRLEN(attcert_issuer_hdr)) <= 0) {
8115
        return WOLFSSL_FAILURE;
8116
    }
8117
8118
    if (x509->AttCertIssuerName != NULL) {
8119
        if (X509_print_name_entry(bio, x509->AttCertIssuerName, 1)
8120
                != WOLFSSL_SUCCESS) {
8121
            return WOLFSSL_FAILURE;
8122
        }
8123
    }
8124
    else {
8125
        const char * msg = " Issuer type not supported.\n";
8126
        if (wolfSSL_BIO_write(bio, msg, (int)XSTRLEN(msg)) <= 0) {
8127
            return WOLFSSL_FAILURE;
8128
        }
8129
    }
8130
8131
    #ifndef NO_ASN_TIME
8132
    /* print validity */
8133
    if (X509PrintValidity(bio, &x509->notBefore, &x509->notAfter, 8)
8134
        != WOLFSSL_SUCCESS) {
8135
        return WOLFSSL_FAILURE;
8136
    }
8137
    #endif /* NO_ASN_TIME */
8138
8139
    /* print raw attributes */
8140
    if (x509->rawAttr && x509->rawAttrLen > 0) {
8141
        char attr_hdr[128]; /* buffer for XSNPRINTF */
8142
8143
        if (XSNPRINTF(attr_hdr, 128, "%*s%s: %d bytes\n", 8, "",
8144
                    "Attributes", x509->rawAttrLen) >= 128) {
8145
            return WOLFSSL_FAILURE;
8146
        }
8147
8148
        if (wolfSSL_BIO_write(bio, attr_hdr, (int)XSTRLEN(attr_hdr)) <= 0) {
8149
                return WOLFSSL_FAILURE;
8150
        }
8151
    }
8152
8153
    /* print out sig algo and signature */
8154
    if (X509AcertPrintSignature(bio, x509, 0, 8) != WOLFSSL_SUCCESS) {
8155
        return WOLFSSL_FAILURE;
8156
    }
8157
8158
    /* done with print out */
8159
    if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
8160
        return WOLFSSL_FAILURE;
8161
    }
8162
8163
    return WOLFSSL_SUCCESS;
8164
}
8165
#endif /* WOLFSSL_ACERT */
8166
8167
#ifndef NO_FILESYSTEM
8168
int wolfSSL_X509_print_fp(XFILE fp, WOLFSSL_X509 *x509)
8169
{
8170
    WOLFSSL_BIO* bio;
8171
    int ret;
8172
8173
    WOLFSSL_ENTER("wolfSSL_X509_print_fp");
8174
8175
    if (!fp || !x509) {
8176
        WOLFSSL_MSG("Bad parameter");
8177
        return WOLFSSL_FAILURE;
8178
    }
8179
8180
    if (!(bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file()))) {
8181
        WOLFSSL_MSG("wolfSSL_BIO_new wolfSSL_BIO_s_file error");
8182
        return WOLFSSL_FAILURE;
8183
    }
8184
8185
    if (wolfSSL_BIO_set_fp(bio, fp, WOLFSSL_BIO_NOCLOSE) != WOLFSSL_SUCCESS) {
8186
        WOLFSSL_MSG("wolfSSL_BIO_set_fp error");
8187
        wolfSSL_BIO_free(bio);
8188
        return WOLFSSL_FAILURE;
8189
    }
8190
8191
    ret = wolfSSL_X509_print(bio, x509);
8192
8193
    wolfSSL_BIO_free(bio);
8194
8195
    return ret;
8196
}
8197
#endif /* NO_FILESYSTEM */
8198
8199
#endif /* XSNPRINTF */
8200
8201
int wolfSSL_X509_signature_print(WOLFSSL_BIO *bp,
8202
        const WOLFSSL_X509_ALGOR *sigalg, const WOLFSSL_ASN1_STRING *sig)
8203
{
8204
    int length = 0;
8205
    word32 idx = 0;
8206
    int i;
8207
8208
    (void)sig;
8209
8210
    WOLFSSL_ENTER("wolfSSL_X509_signature_print");
8211
8212
    if (!bp || !sigalg) {
8213
        WOLFSSL_MSG("Bad parameter");
8214
        return WOLFSSL_FAILURE;
8215
    }
8216
8217
    if ((sigalg->algorithm->obj == NULL) ||
8218
        (sigalg->algorithm->obj[idx] != ASN_OBJECT_ID)) {
8219
        WOLFSSL_MSG("Bad ASN1 Object");
8220
        return WOLFSSL_FAILURE;
8221
    }
8222
    idx++; /* skip object id */
8223
8224
    if (GetLength((const byte*)sigalg->algorithm->obj, &idx, &length,
8225
                  sigalg->algorithm->objSz) < 0 || length < 0) {
8226
        return WOLFSSL_FAILURE;
8227
    }
8228
8229
    if (wolfSSL_BIO_puts(bp, "    Raw Signature Algorithm:") <= 0) {
8230
        WOLFSSL_MSG("wolfSSL_BIO_puts error");
8231
        return WOLFSSL_FAILURE;
8232
    }
8233
8234
    for (i = 0; i < length; ++i) {
8235
        char hex_digits[4];
8236
        if (XSNPRINTF(hex_digits, sizeof(hex_digits), "%c%02X", i>0 ? ':' : ' ',
8237
                  (unsigned int)sigalg->algorithm->obj[idx+i])
8238
            >= (int)sizeof(hex_digits))
8239
        {
8240
            WOLFSSL_MSG("buffer overrun");
8241
            return WOLFSSL_FAILURE;
8242
        }
8243
        if (wolfSSL_BIO_puts(bp, hex_digits) <= 0)
8244
            return WOLFSSL_FAILURE;
8245
    }
8246
8247
    if (wolfSSL_BIO_puts(bp, "\n") <= 0)
8248
        return WOLFSSL_FAILURE;
8249
8250
    return WOLFSSL_SUCCESS;
8251
}
8252
#endif /* !NO_BIO */
8253
8254
#ifndef NO_WOLFSSL_STUB
8255
void wolfSSL_X509_get0_signature(const WOLFSSL_ASN1_BIT_STRING **psig,
8256
        const WOLFSSL_X509_ALGOR **palg, const WOLFSSL_X509 *x509)
8257
{
8258
    (void)psig;
8259
    (void)palg;
8260
    (void)x509;
8261
    WOLFSSL_STUB("wolfSSL_X509_get0_signature");
8262
}
8263
#endif
8264
8265
#endif /* OPENSSL_EXTRA */
8266
8267
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
8268
const char* wolfSSL_X509_verify_cert_error_string(long err)
8269
{
8270
    return wolfSSL_ERR_reason_error_string((unsigned long)err);
8271
}
8272
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
8273
8274
#ifdef OPENSSL_EXTRA
8275
8276
/* Add directory path that will be used for loading certs and CRLs
8277
 * which have the <hash>.rn name format.
8278
 * type may be WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1.
8279
 * returns WOLFSSL_SUCCESS on successful, otherwise negative or zero. */
8280
int wolfSSL_X509_LOOKUP_add_dir(WOLFSSL_X509_LOOKUP* lookup, const char* dir,
8281
                               long type)
8282
{
8283
    return wolfSSL_X509_LOOKUP_ctrl(lookup, WOLFSSL_X509_L_ADD_DIR, dir, type,
8284
                                    NULL);
8285
}
8286
8287
int wolfSSL_X509_LOOKUP_load_file(WOLFSSL_X509_LOOKUP* lookup,
8288
                                 const char* file, long type)
8289
{
8290
#if !defined(NO_FILESYSTEM) && \
8291
    (defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM))
8292
    int           ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
8293
    XFILE         fp;
8294
    long          sz;
8295
    byte*         pem = NULL;
8296
    byte*         curr = NULL;
8297
    byte*         prev = NULL;
8298
    const char* header = NULL;
8299
    const char* footer = NULL;
8300
8301
    if (type != WOLFSSL_FILETYPE_PEM)
8302
        return WS_RETURN_CODE(BAD_FUNC_ARG, (int)WOLFSSL_FAILURE);
8303
8304
    fp = XFOPEN(file, "rb");
8305
    if (fp == XBADFILE)
8306
        return WS_RETURN_CODE(BAD_FUNC_ARG, (int)WOLFSSL_FAILURE);
8307
8308
    if (XFSEEK(fp, 0, XSEEK_END) != 0) {
8309
        XFCLOSE(fp);
8310
        return WS_RETURN_CODE(WOLFSSL_BAD_FILE,WOLFSSL_FAILURE);
8311
    }
8312
    sz = XFTELL(fp);
8313
    if (XFSEEK(fp, 0, XSEEK_SET) != 0) {
8314
        XFCLOSE(fp);
8315
        return WS_RETURN_CODE(WOLFSSL_BAD_FILE,WOLFSSL_FAILURE);
8316
    }
8317
8318
    if (sz > MAX_WOLFSSL_FILE_SIZE || sz <= 0) {
8319
        WOLFSSL_MSG("X509_LOOKUP_load_file size error");
8320
        goto end;
8321
    }
8322
8323
    pem = (byte*)XMALLOC(sz, 0, DYNAMIC_TYPE_PEM);
8324
    if (pem == NULL) {
8325
        ret = MEMORY_ERROR;
8326
        goto end;
8327
    }
8328
8329
    /* Read in file which may be CRLs or certificates. */
8330
    if (XFREAD(pem, (size_t)sz, 1, fp) != 1)
8331
        goto end;
8332
8333
    prev = curr = pem;
8334
    do {
8335
        /* get PEM header and footer based on type */
8336
        if (wc_PemGetHeaderFooter(CRL_TYPE, &header, &footer) == 0 &&
8337
                XSTRNSTR((char*)curr, header, (unsigned int)sz) != NULL) {
8338
#ifdef HAVE_CRL
8339
            WOLFSSL_CERT_MANAGER* cm = lookup->store->cm;
8340
8341
            if (cm->crl == NULL) {
8342
                if (wolfSSL_CertManagerEnableCRL(cm, WOLFSSL_CRL_CHECK)
8343
                    != WOLFSSL_SUCCESS) {
8344
                    WOLFSSL_MSG("Enable CRL failed");
8345
                    goto end;
8346
                }
8347
            }
8348
8349
            ret = BufferLoadCRL(cm->crl, curr, sz, WOLFSSL_FILETYPE_PEM,
8350
                NO_VERIFY);
8351
            if (ret != WOLFSSL_SUCCESS)
8352
                goto end;
8353
#endif
8354
            curr = (byte*)XSTRNSTR((char*)curr, footer, (unsigned int)sz);
8355
        }
8356
        else if (wc_PemGetHeaderFooter(CERT_TYPE, &header, &footer) == 0 &&
8357
                XSTRNSTR((char*)curr, header, (unsigned int)sz) != NULL) {
8358
            ret = X509StoreLoadCertBuffer(lookup->store, curr,
8359
                                        (word32)sz, WOLFSSL_FILETYPE_PEM);
8360
            if (ret != WOLFSSL_SUCCESS)
8361
                goto end;
8362
            curr = (byte*)XSTRNSTR((char*)curr, footer, (unsigned int)sz);
8363
        }
8364
        else
8365
            goto end;
8366
8367
        if (curr == NULL)
8368
            goto end;
8369
8370
        curr++;
8371
        sz -= (long)(curr - prev);
8372
        prev = curr;
8373
    }
8374
    while (ret == WOLFSSL_SUCCESS);
8375
8376
end:
8377
    XFREE(pem, 0, DYNAMIC_TYPE_PEM);
8378
    XFCLOSE(fp);
8379
    return WS_RETURN_CODE(ret, (int)WOLFSSL_FAILURE);
8380
#else
8381
    (void)lookup;
8382
    (void)file;
8383
    (void)type;
8384
    return WS_RETURN_CODE(WOLFSSL_FAILURE,WOLFSSL_FAILURE);
8385
#endif
8386
}
8387
8388
WOLFSSL_X509_LOOKUP_METHOD* wolfSSL_X509_LOOKUP_hash_dir(void)
8389
{
8390
    /* Method implementation in functions. */
8391
    static WOLFSSL_X509_LOOKUP_METHOD meth = { 1 };
8392
    return &meth;
8393
}
8394
8395
WOLFSSL_X509_LOOKUP_METHOD* wolfSSL_X509_LOOKUP_file(void)
8396
{
8397
    /* Method implementation in functions. */
8398
    static WOLFSSL_X509_LOOKUP_METHOD meth = { 0 };
8399
    return &meth;
8400
}
8401
8402
/* set directory path to load certificate or CRL which have the hash.N form */
8403
/* for late use                                                             */
8404
/* @param ctx    a pointer to WOLFSSL_BY_DIR structure                      */
8405
/* @param argc   directory path                                             */
8406
/* @param argl   file type, either WOLFSSL_FILETYPE_PEM or                  */
8407
/*                                          WOLFSSL_FILETYPE_ASN1           */
8408
/* @return WOLFSSL_SUCCESS on successful, otherwise negative or zero        */
8409
static int x509AddCertDir(WOLFSSL_BY_DIR *ctx, const char *argc, long argl)
8410
{
8411
#if defined(OPENSSL_ALL) && !defined(NO_FILESYSTEM) && !defined(NO_WOLFSSL_DIR)
8412
    WOLFSSL_BY_DIR_entry *entry;
8413
    size_t pathLen;
8414
    int i, num;
8415
    const char* c;
8416
    WC_DECLARE_VAR(buf, char, MAX_FILENAME_SZ, 0);
8417
8418
    WOLFSSL_ENTER("x509AddCertDir");
8419
8420
    pathLen = 0;
8421
    c = argc;
8422
    /* sanity check, zero length */
8423
    if (ctx == NULL || c == NULL || *c == '\0')
8424
        return WOLFSSL_FAILURE;
8425
8426
#ifdef WOLFSSL_SMALL_STACK
8427
    buf = (char*)XMALLOC(MAX_FILENAME_SZ, NULL, DYNAMIC_TYPE_OPENSSL);
8428
    if (buf == NULL) {
8429
        WOLFSSL_LEAVE("x509AddCertDir", MEMORY_E);
8430
        return MEMORY_E;
8431
    }
8432
#endif
8433
8434
    XMEMSET(buf, 0, MAX_FILENAME_SZ);
8435
8436
    do {
8437
        if (*c == SEPARATOR_CHAR || *c == '\0') {
8438
8439
            num = wolfSSL_sk_BY_DIR_entry_num(ctx->dir_entry);
8440
8441
            for (i=0; i<num; i++) {
8442
8443
                entry = wolfSSL_sk_BY_DIR_entry_value(ctx->dir_entry, i);
8444
8445
                if (XSTRLEN(entry->dir_name) == pathLen &&
8446
                    XSTRNCMP(entry->dir_name, buf, pathLen) == 0) {
8447
                    WOLFSSL_MSG("dir entry found");
8448
                    break;
8449
                }
8450
            }
8451
8452
            if (num == -1 || i == num) {
8453
                WOLFSSL_MSG("no entry found");
8454
8455
                if (ctx->dir_entry == NULL) {
8456
                    ctx->dir_entry = wolfSSL_sk_BY_DIR_entry_new_null();
8457
8458
                    if (ctx->dir_entry == NULL) {
8459
                        WOLFSSL_MSG("failed to allocate dir_entry");
8460
                            WC_FREE_VAR_EX(buf, 0, DYNAMIC_TYPE_OPENSSL);
8461
                        return 0;
8462
                    }
8463
                }
8464
8465
                entry = wolfSSL_BY_DIR_entry_new();
8466
                if (entry == NULL) {
8467
                    WOLFSSL_MSG("failed to allocate dir entry");
8468
                        WC_FREE_VAR_EX(buf, 0, DYNAMIC_TYPE_OPENSSL);
8469
                    return 0;
8470
                }
8471
                entry->dir_type = (int)argl;
8472
                entry->dir_name = (char*)XMALLOC(pathLen + 1/* \0 termination*/
8473
                                                , NULL, DYNAMIC_TYPE_OPENSSL);
8474
                entry->hashes = wolfSSL_sk_BY_DIR_HASH_new_null();
8475
                if (entry->dir_name == NULL || entry->hashes == NULL) {
8476
                    WOLFSSL_MSG("failed to allocate dir name");
8477
                    wolfSSL_BY_DIR_entry_free(entry);
8478
                        WC_FREE_VAR_EX(buf, 0, DYNAMIC_TYPE_OPENSSL);
8479
                    return 0;
8480
                }
8481
8482
                XSTRNCPY(entry->dir_name, buf, pathLen);
8483
                entry->dir_name[pathLen] = '\0';
8484
8485
                if (wolfSSL_sk_BY_DIR_entry_push(ctx->dir_entry, entry) <= 0) {
8486
                    wolfSSL_BY_DIR_entry_free(entry);
8487
                        WC_FREE_VAR_EX(buf, 0, DYNAMIC_TYPE_OPENSSL);
8488
                    return 0;
8489
                }
8490
            }
8491
            /* skip separator */
8492
            if (*c == SEPARATOR_CHAR) c++;
8493
8494
            pathLen = 0;
8495
            XMEMSET(buf, 0, MAX_FILENAME_SZ);
8496
        }
8497
        buf[pathLen++] = *c;
8498
8499
    } while(*c++ != '\0');
8500
8501
    WC_FREE_VAR_EX(buf, 0, DYNAMIC_TYPE_OPENSSL);
8502
8503
    return WOLFSSL_SUCCESS;
8504
#else
8505
    (void)ctx;
8506
    (void)argc;
8507
    (void)argl;
8508
    return WOLFSSL_NOT_IMPLEMENTED;
8509
#endif
8510
}
8511
8512
/* set additional data to X509_LOOKUP                                   */
8513
/* @param ctx    a pointer to X509_LOOKUP structure                     */
8514
/* @param cmd    control command :                                      */
8515
/*               X509_L_FILE_LOAD, X509_L_ADD_DIR X509_L_ADD_STORE or   */
8516
/*               X509_L_LOAD_STORE                                      */
8517
/* @param argc   arguments for the control command                      */
8518
/* @param argl   arguments for the control command                      */
8519
/* @param **ret  return value of the control command                    */
8520
/* @return WOLFSSL_SUCCESS on successful, otherwise WOLFSSL_FAILURE     */
8521
/* note: WOLFSSL_X509_L_ADD_STORE and WOLFSSL_X509_L_LOAD_STORE have not*/
8522
/*       yet implemented. It returns WOLFSSL_NOT_IMPLEMENTED            */
8523
/*       when those control commands are passed.                        */
8524
int wolfSSL_X509_LOOKUP_ctrl(WOLFSSL_X509_LOOKUP *ctx, int cmd,
8525
        const char *argc, long argl, char **ret)
8526
{
8527
    int lret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
8528
8529
    WOLFSSL_ENTER("wolfSSL_X509_LOOKUP_ctrl");
8530
#if !defined(NO_FILESYSTEM)
8531
    if (ctx != NULL) {
8532
        switch (cmd) {
8533
        case WOLFSSL_X509_L_FILE_LOAD:
8534
            /* expects to return a number of processed cert or crl file */
8535
            lret = wolfSSL_X509_load_cert_crl_file(ctx, argc, (int)argl) > 0 ?
8536
                            WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
8537
            break;
8538
        case WOLFSSL_X509_L_ADD_DIR:
8539
            /* store directory location to use it later */
8540
#if !defined(NO_WOLFSSL_DIR)
8541
            lret = x509AddCertDir(ctx->dirs, argc, argl);
8542
#else
8543
            (void)x509AddCertDir;
8544
            lret = WOLFSSL_NOT_IMPLEMENTED;
8545
#endif
8546
            break;
8547
        case WOLFSSL_X509_L_ADD_STORE:
8548
        case WOLFSSL_X509_L_LOAD_STORE:
8549
            return WOLFSSL_NOT_IMPLEMENTED;
8550
8551
        default:
8552
            break;
8553
        }
8554
    }
8555
    (void)ret;
8556
#else
8557
    (void)ctx;
8558
    (void)argc;
8559
    (void)argl;
8560
    (void)ret;
8561
    (void)cmd;
8562
    (void)x509AddCertDir;
8563
    lret = WOLFSSL_NOT_IMPLEMENTED;
8564
#endif
8565
    return lret;
8566
}
8567
8568
8569
#if defined(WOLFSSL_CERT_GEN)
8570
static int wolfssl_x509_make_der(WOLFSSL_X509* x509, int req,
8571
        unsigned char* der, int* derSz, int includeSig);
8572
#endif
8573
8574
#ifdef WOLFSSL_CERT_GEN
8575
#ifndef NO_BIO
8576
/* Converts the X509 to DER format and outputs it into bio.
8577
 *
8578
 * bio  is the structure to hold output DER
8579
 * x509 certificate to create DER from
8580
 * req  if set then a CSR is generated
8581
 *
8582
 * returns WOLFSSL_SUCCESS on success
8583
 */
8584
static int loadX509orX509REQFromBio(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
8585
    int req)
8586
{
8587
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
8588
    /* Get large buffer to hold cert der */
8589
    int derSz = X509_BUFFER_SZ;
8590
    WC_DECLARE_VAR(der, byte, X509_BUFFER_SZ, 0);
8591
    WOLFSSL_ENTER("wolfSSL_i2d_X509_bio");
8592
8593
    if (bio == NULL || x509 == NULL) {
8594
        return WOLFSSL_FAILURE;
8595
    }
8596
8597
#ifdef WOLFSSL_SMALL_STACK
8598
    der = (byte*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8599
    if (!der) {
8600
        WOLFSSL_MSG("malloc failed");
8601
        return WOLFSSL_FAILURE;
8602
    }
8603
#endif
8604
8605
    if (wolfssl_x509_make_der(x509, req, der, &derSz, 1) != WOLFSSL_SUCCESS) {
8606
        goto cleanup;
8607
    }
8608
8609
    if (wolfSSL_BIO_write(bio, der, derSz) != derSz) {
8610
        goto cleanup;
8611
    }
8612
8613
    ret = WOLFSSL_SUCCESS;
8614
cleanup:
8615
    WC_FREE_VAR_EX(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8616
8617
    return ret;
8618
}
8619
8620
/* Converts the X509 to DER format and outputs it into bio.
8621
 *
8622
 * bio  is the structure to hold output DER
8623
 * x509 certificate to create DER from
8624
 *
8625
 * returns WOLFSSL_SUCCESS on success
8626
 */
8627
int wolfSSL_i2d_X509_bio(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
8628
{
8629
    return loadX509orX509REQFromBio(bio, x509, 0);
8630
}
8631
8632
#ifdef WOLFSSL_CERT_REQ
8633
int wolfSSL_i2d_X509_REQ_bio(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
8634
{
8635
    return loadX509orX509REQFromBio(bio, x509, 1);
8636
}
8637
#endif /* WOLFSSL_CERT_REQ */
8638
#endif /* !NO_BIO */
8639
#endif /* WOLFSSL_CERT_GEN */
8640
8641
/* Converts an internal structure to a DER buffer
8642
 *
8643
 * x509 structure to get DER buffer from
8644
 * out  buffer to hold result. If NULL then *out is NULL then a new buffer is
8645
 *      created.
8646
 *
8647
 * returns the size of the DER result on success
8648
 */
8649
int wolfSSL_i2d_X509(WOLFSSL_X509* x509, unsigned char** out)
8650
{
8651
    const unsigned char* der;
8652
    int derSz = 0;
8653
    int advance = 1;
8654
8655
    WOLFSSL_ENTER("wolfSSL_i2d_X509");
8656
8657
    if (x509 == NULL) {
8658
        WOLFSSL_LEAVE("wolfSSL_i2d_X509", BAD_FUNC_ARG);
8659
        return BAD_FUNC_ARG;
8660
    }
8661
8662
    der = wolfSSL_X509_get_der(x509, &derSz);
8663
    if (der == NULL) {
8664
        WOLFSSL_LEAVE("wolfSSL_i2d_X509", MEMORY_E);
8665
        return MEMORY_E;
8666
    }
8667
8668
    if (out != NULL && *out == NULL) {
8669
        *out = (unsigned char*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_OPENSSL);
8670
        if (*out == NULL) {
8671
            WOLFSSL_LEAVE("wolfSSL_i2d_X509", MEMORY_E);
8672
            return MEMORY_E;
8673
        }
8674
        advance = 0;
8675
    }
8676
8677
    if (out != NULL) {
8678
        XMEMCPY(*out, der, derSz);
8679
        if (advance)
8680
            *out += derSz;
8681
    }
8682
8683
    WOLFSSL_LEAVE("wolfSSL_i2d_X509", derSz);
8684
    return derSz;
8685
}
8686
8687
#ifdef WOLFSSL_DUAL_ALG_CERTS
8688
/* Generate a der preTBS from a decoded cert, and write
8689
 * to buffer.
8690
 *
8691
 * @param [in]  cert  The decoded cert to parse.
8692
 * @param [out] der   The der buffer to write in.
8693
 * @param [in]  derSz The der buffer size.
8694
 *
8695
 * @return  preTBS der size on success.
8696
 * */
8697
int wc_GeneratePreTBS(DecodedCert* cert, byte *der, int derSz) {
8698
    int ret = 0;
8699
    WOLFSSL_X509 *x = NULL;
8700
    byte certIsCSR = 0;
8701
8702
    WOLFSSL_ENTER("wc_GeneratePreTBS");
8703
8704
    if ((cert == NULL) || (der == NULL) || (derSz <= 0)) {
8705
        return BAD_FUNC_ARG;
8706
    }
8707
8708
#ifdef WOLFSSL_CERT_REQ
8709
    certIsCSR = cert->isCSR;
8710
#endif
8711
8712
    x = wolfSSL_X509_new();
8713
    if (x == NULL) {
8714
        ret = MEMORY_E;
8715
    }
8716
    else {
8717
        ret = CopyDecodedToX509(x, cert);
8718
    }
8719
8720
    if (ret == 0) {
8721
        /* Remove the altsigval extension. */
8722
        XFREE(x->altSigValDer, x->heap, DYNAMIC_TYPE_X509_EXT);
8723
        x->altSigValDer = NULL;
8724
        x->altSigValLen = 0;
8725
        /* Remove sigOID so it won't be encoded. */
8726
        x->sigOID = 0;
8727
        /* We now have a PreTBS. Encode it. */
8728
        ret = wolfssl_x509_make_der(x, certIsCSR, der, &derSz, 0);
8729
        if (ret == WOLFSSL_SUCCESS) {
8730
            ret = derSz;
8731
        }
8732
    }
8733
8734
    if (x != NULL) {
8735
        wolfSSL_X509_free(x);
8736
        x = NULL;
8737
    }
8738
8739
    return ret;
8740
}
8741
#endif /* WOLFSSL_DUAL_ALG_CERTS */
8742
8743
#ifndef NO_BIO
8744
/**
8745
 * Converts the DER from bio and creates a WOLFSSL_X509 structure from it.
8746
 * @param bio  is the structure holding DER
8747
 * @param x509 certificate to create from DER. Can be NULL
8748
 * @param req  1 for a CSR and 0 for a x509 cert
8749
 * @return pointer to WOLFSSL_X509 structure on success and NULL on fail
8750
 */
8751
static WOLFSSL_X509* d2i_X509orX509REQ_bio(WOLFSSL_BIO* bio,
8752
                                            WOLFSSL_X509** x509, int req)
8753
{
8754
    WOLFSSL_X509* localX509 = NULL;
8755
    byte* mem  = NULL;
8756
    int    size;
8757
8758
    WOLFSSL_ENTER("wolfSSL_d2i_X509_bio");
8759
8760
    if (bio == NULL) {
8761
        WOLFSSL_MSG("Bad Function Argument bio is NULL");
8762
        return NULL;
8763
    }
8764
8765
    size = wolfSSL_BIO_get_len(bio);
8766
    if (size <= 0) {
8767
        WOLFSSL_MSG("wolfSSL_BIO_get_len error. Possibly no pending data.");
8768
        WOLFSSL_ERROR(WOLFSSL_ASN1_R_HEADER_TOO_LONG_E);
8769
        return NULL;
8770
    }
8771
8772
    if (!(mem = (byte*)XMALLOC(size, NULL, DYNAMIC_TYPE_OPENSSL))) {
8773
        WOLFSSL_MSG("malloc error");
8774
        return NULL;
8775
    }
8776
8777
    if ((size = wolfSSL_BIO_read(bio, mem, size)) == 0) {
8778
        WOLFSSL_MSG("wolfSSL_BIO_read error");
8779
        XFREE(mem, NULL, DYNAMIC_TYPE_OPENSSL);
8780
        return NULL;
8781
    }
8782
8783
    if (req) {
8784
#ifdef WOLFSSL_CERT_REQ
8785
        localX509 = wolfSSL_X509_REQ_d2i(NULL, mem, size);
8786
#else
8787
        WOLFSSL_MSG("CSR not compiled in");
8788
#endif
8789
    }
8790
    else {
8791
        localX509 = wolfSSL_X509_d2i_ex(NULL, mem, size, bio->heap);
8792
    }
8793
    if (localX509 == NULL) {
8794
        WOLFSSL_MSG("wolfSSL_X509_d2i error");
8795
        XFREE(mem, NULL, DYNAMIC_TYPE_OPENSSL);
8796
        return NULL;
8797
    }
8798
8799
    if (x509 != NULL) {
8800
        *x509 = localX509;
8801
    }
8802
8803
    XFREE(mem, NULL, DYNAMIC_TYPE_OPENSSL);
8804
    return localX509;
8805
}
8806
8807
WOLFSSL_X509* wolfSSL_d2i_X509_bio(WOLFSSL_BIO* bio, WOLFSSL_X509** x509)
8808
{
8809
    return d2i_X509orX509REQ_bio(bio, x509, 0);
8810
}
8811
8812
#ifdef WOLFSSL_CERT_REQ
8813
WOLFSSL_X509* wolfSSL_d2i_X509_REQ_bio(WOLFSSL_BIO* bio, WOLFSSL_X509** x509)
8814
{
8815
    return d2i_X509orX509REQ_bio(bio, x509, 1);
8816
}
8817
#endif
8818
#endif /* !NO_BIO */
8819
8820
#endif /* OPENSSL_EXTRA */
8821
8822
#ifdef OPENSSL_EXTRA
8823
/* Use the public key to verify the signature. Note: this only verifies
8824
 * the certificate signature.
8825
 * returns WOLFSSL_SUCCESS on successful signature verification */
8826
static int verifyX509orX509REQ(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey,
8827
    int req)
8828
{
8829
    int ret;
8830
    const byte* der;
8831
    int derSz = 0;
8832
    int type;
8833
8834
    (void)req;
8835
8836
    if (x509 == NULL || pkey == NULL) {
8837
        return WOLFSSL_FATAL_ERROR;
8838
    }
8839
8840
    der = wolfSSL_X509_get_der(x509, &derSz);
8841
    if (der == NULL) {
8842
        WOLFSSL_MSG("Error getting WOLFSSL_X509 DER");
8843
        return WOLFSSL_FATAL_ERROR;
8844
    }
8845
8846
    switch (pkey->type) {
8847
        case WC_EVP_PKEY_RSA:
8848
            type = RSAk;
8849
            break;
8850
8851
        case WC_EVP_PKEY_EC:
8852
            type = ECDSAk;
8853
            break;
8854
8855
        case WC_EVP_PKEY_DSA:
8856
            type = DSAk;
8857
            break;
8858
8859
        default:
8860
            WOLFSSL_MSG("Unknown pkey key type");
8861
            return WOLFSSL_FATAL_ERROR;
8862
    }
8863
8864
#ifdef WOLFSSL_CERT_REQ
8865
    if (req)
8866
        ret = CheckCSRSignaturePubKey(der, (word32)derSz, x509->heap,
8867
                (unsigned char*)pkey->pkey.ptr, pkey->pkey_sz, type);
8868
    else
8869
#endif
8870
        ret = CheckCertSignaturePubKey(der, (word32)derSz, x509->heap,
8871
                (unsigned char*)pkey->pkey.ptr, pkey->pkey_sz, type);
8872
    if (ret == 0) {
8873
        return WOLFSSL_SUCCESS;
8874
    }
8875
    return WOLFSSL_FAILURE;
8876
}
8877
8878
int wolfSSL_X509_verify(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey)
8879
{
8880
    return verifyX509orX509REQ(x509, pkey, 0);
8881
}
8882
8883
#ifdef WOLFSSL_CERT_REQ
8884
int wolfSSL_X509_REQ_verify(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey)
8885
{
8886
    return verifyX509orX509REQ(x509, pkey, 1);
8887
}
8888
#endif /* WOLFSSL_CERT_REQ */
8889
8890
#if !defined(NO_FILESYSTEM)
8891
static void *wolfSSL_d2i_X509_fp_ex(XFILE file, void **x509, int type)
8892
{
8893
    void *newx509 = NULL;
8894
    byte *fileBuffer = NULL;
8895
    long sz = 0;
8896
8897
    /* init variable */
8898
    if (x509)
8899
        *x509 = NULL;
8900
8901
    /* argument check */
8902
    if (file == XBADFILE) {
8903
        return NULL;
8904
    }
8905
8906
    /* determine file size */
8907
    if (XFSEEK(file, 0, XSEEK_END) != 0) {
8908
        return NULL;
8909
    }
8910
    sz = XFTELL(file);
8911
    if (XFSEEK(file, 0, XSEEK_SET) != 0) {
8912
        return NULL;
8913
    }
8914
8915
    if (sz > MAX_WOLFSSL_FILE_SIZE || sz <= 0) {
8916
        WOLFSSL_MSG("d2i_X509_fp_ex file size error");
8917
        return NULL;
8918
    }
8919
8920
    fileBuffer = (byte *)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE);
8921
    if (fileBuffer != NULL) {
8922
        if ((long)XFREAD(fileBuffer, 1, (size_t)sz, file) != sz) {
8923
            WOLFSSL_MSG("File read failed");
8924
            goto err_exit;
8925
        }
8926
        if (type == CERT_TYPE) {
8927
            newx509 = (void *)wolfSSL_X509_d2i(NULL, fileBuffer, (int)sz);
8928
        }
8929
    #ifdef HAVE_CRL
8930
        else if (type == CRL_TYPE) {
8931
            newx509 = (void *)wolfSSL_d2i_X509_CRL(NULL, fileBuffer, (int)sz);
8932
        }
8933
    #endif
8934
    #ifdef WOLFSSL_CERT_REQ
8935
        else if (type == CERTREQ_TYPE) {
8936
             newx509 = (void *)wolfSSL_X509_REQ_d2i(NULL, fileBuffer, (int)sz);
8937
        }
8938
    #endif
8939
    #if !defined(NO_ASN) && !defined(NO_PWDBASED) && defined(HAVE_PKCS12)
8940
        else if (type == PKCS12_TYPE) {
8941
            if ((newx509 = wc_PKCS12_new()) == NULL) {
8942
                goto err_exit;
8943
            }
8944
            if (wc_d2i_PKCS12(fileBuffer, (word32)sz,
8945
                                                     (WC_PKCS12*)newx509) < 0) {
8946
                goto err_exit;
8947
            }
8948
        }
8949
    #endif
8950
        else {
8951
            goto err_exit;
8952
        }
8953
        if (newx509 == NULL) {
8954
            WOLFSSL_MSG("X509 failed");
8955
            goto err_exit;
8956
        }
8957
    }
8958
8959
    if (x509)
8960
        *x509 = newx509;
8961
8962
    goto _exit;
8963
8964
err_exit:
8965
#if !defined(NO_ASN) && !defined(NO_PWDBASED) && defined(HAVE_PKCS12)
8966
    if ((newx509 != NULL) && (type == PKCS12_TYPE)) {
8967
        wc_PKCS12_free((WC_PKCS12*)newx509);
8968
        newx509 = NULL;
8969
    }
8970
#endif
8971
_exit:
8972
    XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
8973
8974
    return newx509;
8975
}
8976
8977
#ifdef WOLFSSL_CERT_REQ
8978
WOLFSSL_X509* wolfSSL_d2i_X509_REQ_fp(XFILE fp, WOLFSSL_X509 **req)
8979
{
8980
    return (WOLFSSL_X509 *)wolfSSL_d2i_X509_fp_ex(fp, (void **)req,
8981
                                                  CERTREQ_TYPE);
8982
}
8983
#endif /* WOLFSSL_CERT_REQ */
8984
8985
WOLFSSL_X509 *wolfSSL_d2i_X509_fp(XFILE fp, WOLFSSL_X509 **x509)
8986
{
8987
    WOLFSSL_ENTER("wolfSSL_d2i_X509_fp");
8988
    return (WOLFSSL_X509 *)wolfSSL_d2i_X509_fp_ex(fp, (void **)x509, CERT_TYPE);
8989
}
8990
8991
/* load certificate or CRL file, and add it to the STORE           */
8992
/* @param ctx    a pointer to X509_LOOKUP structure                */
8993
/* @param file   file name to load                                 */
8994
/* @param type   WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1     */
8995
/* @return a number of loading CRL or certificate, otherwise zero  */
8996
int wolfSSL_X509_load_cert_crl_file(WOLFSSL_X509_LOOKUP *ctx,
8997
    const char *file, int type)
8998
{
8999
    WOLFSSL_X509 *x509 = NULL;
9000
9001
    int cnt = 0;
9002
9003
    WOLFSSL_ENTER("wolfSSL_X509_load_cert_crl_file");
9004
9005
    /* stanity check */
9006
    if (ctx == NULL || file == NULL) {
9007
        WOLFSSL_MSG("bad arguments");
9008
        return 0;
9009
    }
9010
9011
    if (type != WOLFSSL_FILETYPE_PEM) {
9012
        x509 = wolfSSL_X509_load_certificate_file(file, type);
9013
        if (x509 != NULL) {
9014
            if (wolfSSL_X509_STORE_add_cert(ctx->store, x509)
9015
                                    == WOLFSSL_SUCCESS) {
9016
                cnt++;
9017
            }
9018
            else {
9019
                WOLFSSL_MSG("wolfSSL_X509_STORE_add_cert error");
9020
            }
9021
            wolfSSL_X509_free(x509);
9022
            x509 = NULL;
9023
        }
9024
        else {
9025
            WOLFSSL_MSG("wolfSSL_X509_load_certificate_file error");
9026
        }
9027
9028
    }
9029
    else {
9030
#if defined(OPENSSL_ALL)
9031
    #if !defined(NO_BIO)
9032
        STACK_OF(WOLFSSL_X509_INFO) *info;
9033
        WOLFSSL_X509_INFO *info_tmp;
9034
        int i;
9035
        int num = 0;
9036
        WOLFSSL_BIO *bio = wolfSSL_BIO_new_file(file, "rb");
9037
        if (!bio) {
9038
            WOLFSSL_MSG("wolfSSL_BIO_new error");
9039
            return cnt;
9040
        }
9041
9042
        info = wolfSSL_PEM_X509_INFO_read_bio(bio, NULL, NULL, NULL);
9043
9044
        wolfSSL_BIO_free(bio);
9045
9046
        if (!info) {
9047
            WOLFSSL_MSG("wolfSSL_PEM_X509_INFO_read_bio error");
9048
            return cnt;
9049
        }
9050
        num = wolfSSL_sk_X509_INFO_num(info);
9051
        for (i=0; i < num; i++) {
9052
            info_tmp = wolfSSL_sk_X509_INFO_value(info, i);
9053
9054
            if (info_tmp == NULL)
9055
                continue;
9056
9057
            if (info_tmp->x509) {
9058
                if (wolfSSL_X509_STORE_add_cert(ctx->store, info_tmp->x509) ==
9059
                    WOLFSSL_SUCCESS) {
9060
                    cnt ++;
9061
                }
9062
                else {
9063
                    WOLFSSL_MSG("wolfSSL_X509_STORE_add_cert failed");
9064
                }
9065
            }
9066
#ifdef HAVE_CRL
9067
            if (info_tmp->crl) {
9068
                if (wolfSSL_X509_STORE_add_crl(ctx->store, info_tmp->crl) ==
9069
                    WOLFSSL_SUCCESS) {
9070
                    cnt ++;
9071
                }
9072
                else {
9073
                    WOLFSSL_MSG("wolfSSL_X509_STORE_add_crl failed");
9074
                }
9075
            }
9076
#endif
9077
        }
9078
        wolfSSL_sk_X509_INFO_pop_free(info, wolfSSL_X509_INFO_free);
9079
    #elif defined(HAVE_CRL)
9080
        /* Only supports one certificate or CRL in the file. */
9081
        WOLFSSL_X509_CRL* crl = NULL;
9082
        XFILE fp = XFOPEN(file, "rb");
9083
        if (fp == XBADFILE) {
9084
            WOLFSSL_MSG("XFOPEN error");
9085
            return cnt;
9086
        }
9087
9088
        x509 = wolfSSL_PEM_read_X509(fp, NULL, NULL, NULL);
9089
        if (x509 != NULL) {
9090
            if (wolfSSL_X509_STORE_add_cert(ctx->store, x509) ==
9091
                WOLFSSL_SUCCESS) {
9092
                cnt++;
9093
            }
9094
            else {
9095
                WOLFSSL_MSG("wolfSSL_X509_STORE_add_cert failed");
9096
            }
9097
        }
9098
        else {
9099
            if (XFSEEK(fp, 0, XSEEK_SET) != 0) {
9100
                WOLFSSL_MSG("XFSEEK error");
9101
                return cnt;
9102
            }
9103
            crl = wolfSSL_PEM_read_X509_CRL(fp, NULL, NULL, NULL);
9104
            if (crl != NULL) {
9105
                if (wolfSSL_X509_STORE_add_crl(ctx->store, crl) ==
9106
                    WOLFSSL_SUCCESS) {
9107
                    cnt++;
9108
                }
9109
                else {
9110
                    WOLFSSL_MSG("wolfSSL_X509_STORE_add_crl failed");
9111
                }
9112
            }
9113
            else {
9114
                WOLFSSL_MSG("Certificate and CRL not recognized");
9115
                return cnt;
9116
            }
9117
        }
9118
9119
        wolfSSL_X509_free(x509);
9120
        wolfSSL_X509_CRL_free(crl);
9121
    #endif
9122
#else
9123
    (void)cnt;
9124
#endif /* OPENSSL_ALL && !NO_BIO */
9125
    }
9126
9127
    WOLFSSL_LEAVE("wolfSSL_X509_load_ceretificate_crl_file", cnt);
9128
    return cnt;
9129
}
9130
#endif /* !NO_FILESYSTEM */
9131
9132
9133
#ifdef HAVE_CRL
9134
9135
#ifndef NO_BIO
9136
WOLFSSL_X509_CRL *wolfSSL_d2i_X509_CRL_bio(WOLFSSL_BIO *bp,
9137
                                                    WOLFSSL_X509_CRL **x)
9138
{
9139
    int derSz;
9140
    byte* der = NULL;
9141
    WOLFSSL_X509_CRL* crl = NULL;
9142
9143
    if (bp == NULL)
9144
        return NULL;
9145
9146
    if ((derSz = wolfSSL_BIO_get_len(bp)) > 0) {
9147
        der = (byte*)XMALLOC(derSz, 0, DYNAMIC_TYPE_DER);
9148
        if (der != NULL) {
9149
            if (wolfSSL_BIO_read(bp, der, derSz) == derSz) {
9150
                crl = wolfSSL_d2i_X509_CRL(x, der, derSz);
9151
            }
9152
        }
9153
    }
9154
9155
    XFREE(der, 0, DYNAMIC_TYPE_DER);
9156
9157
    return crl;
9158
}
9159
#endif
9160
9161
#if !defined(NO_FILESYSTEM) && !defined(NO_STDIO_FILESYSTEM)
9162
WOLFSSL_X509_CRL *wolfSSL_d2i_X509_CRL_fp(XFILE fp, WOLFSSL_X509_CRL **crl)
9163
{
9164
    WOLFSSL_ENTER("wolfSSL_d2i_X509_CRL_fp");
9165
    return (WOLFSSL_X509_CRL *)wolfSSL_d2i_X509_fp_ex(fp, (void **)crl,
9166
        CRL_TYPE);
9167
}
9168
9169
/* Read CRL file, and add it to store and corresponding cert manager     */
9170
/* @param ctx   a pointer of X509_LOOKUP back to the X509_STORE          */
9171
/* @param file  a file to read                                           */
9172
/* @param type  WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1            */
9173
/* @return WOLFSSL_SUCCESS(1) on successful, otherwise WOLFSSL_FAILURE(0)*/
9174
int wolfSSL_X509_load_crl_file(WOLFSSL_X509_LOOKUP *ctx,
9175
                                             const char *file, int type)
9176
{
9177
#ifndef NO_BIO
9178
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
9179
    int count = 0;
9180
    WOLFSSL_BIO *bio = NULL;
9181
    WOLFSSL_X509_CRL *crl = NULL;
9182
9183
    WOLFSSL_ENTER("wolfSSL_X509_load_crl_file");
9184
9185
    if (ctx == NULL || file == NULL)
9186
        return ret;
9187
9188
    if ((bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file())) == NULL)
9189
        return ret;
9190
9191
    if (wolfSSL_BIO_read_filename(bio, file) <= 0) {
9192
        wolfSSL_BIO_free(bio);
9193
        return ret;
9194
    }
9195
9196
    if (wolfSSL_BIO_read_filename(bio, file) <= 0) {
9197
        wolfSSL_BIO_free(bio);
9198
        return ret;
9199
    }
9200
9201
    if (type == WOLFSSL_FILETYPE_PEM) {
9202
        do {
9203
            crl = wolfSSL_PEM_read_bio_X509_CRL(bio, NULL, NULL, NULL);
9204
            if (crl == NULL) {
9205
                if (count <= 0) {
9206
                    WOLFSSL_MSG("Load crl failed");
9207
                }
9208
                break;
9209
            }
9210
9211
            ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
9212
            if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
9213
                WOLFSSL_MSG("Adding crl failed");
9214
                break;
9215
            }
9216
            count++;
9217
            wolfSSL_X509_CRL_free(crl);
9218
            crl = NULL;
9219
        }   while(crl == NULL);
9220
9221
        ret = count;
9222
    }
9223
    else if (type == WOLFSSL_FILETYPE_ASN1) {
9224
        crl = wolfSSL_d2i_X509_CRL_bio(bio, NULL);
9225
        if (crl == NULL) {
9226
            WOLFSSL_MSG("Load crl failed");
9227
        }
9228
        else {
9229
            ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
9230
            if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
9231
                WOLFSSL_MSG("Adding crl failed");
9232
            }
9233
            else {
9234
                ret = 1;/* handled a file */
9235
            }
9236
        }
9237
    }
9238
    else {
9239
        WOLFSSL_MSG("Invalid file type");
9240
    }
9241
9242
    wolfSSL_X509_CRL_free(crl);
9243
    wolfSSL_BIO_free(bio);
9244
9245
    WOLFSSL_LEAVE("wolfSSL_X509_load_crl_file", ret);
9246
    return ret;
9247
#else
9248
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
9249
    int count = 0;
9250
    XFILE fp;
9251
    WOLFSSL_X509_CRL *crl = NULL;
9252
9253
    WOLFSSL_ENTER("wolfSSL_X509_load_crl_file");
9254
9255
    if (ctx == NULL || file == NULL)
9256
        return ret;
9257
9258
    if ((fp = XFOPEN(file, "rb")) == XBADFILE)
9259
        return ret;
9260
9261
    if (type == WOLFSSL_FILETYPE_PEM) {
9262
        do {
9263
            crl = wolfSSL_PEM_read_X509_CRL(fp, NULL, NULL, NULL);
9264
            if (crl == NULL) {
9265
                if (count <= 0) {
9266
                    WOLFSSL_MSG("Load crl failed");
9267
                }
9268
                break;
9269
            }
9270
9271
            ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
9272
            if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
9273
                WOLFSSL_MSG("Adding crl failed");
9274
                break;
9275
            }
9276
            count++;
9277
            wolfSSL_X509_CRL_free(crl);
9278
            crl = NULL;
9279
        }
9280
        while(crl == NULL);
9281
9282
        ret = count;
9283
    }
9284
    else if (type == WOLFSSL_FILETYPE_ASN1) {
9285
        crl = wolfSSL_d2i_X509_CRL_fp(fp, NULL);
9286
        if (crl == NULL) {
9287
            WOLFSSL_MSG("Load crl failed");
9288
        }
9289
        else {
9290
            ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
9291
            if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
9292
                WOLFSSL_MSG("Adding crl failed");
9293
            }
9294
            else {
9295
                ret = 1;/* handled a file */
9296
            }
9297
        }
9298
    }
9299
    else {
9300
        WOLFSSL_MSG("Invalid file type");
9301
    }
9302
9303
    wolfSSL_X509_CRL_free(crl);
9304
    XFCLOSE(fp);
9305
9306
    WOLFSSL_LEAVE("wolfSSL_X509_load_crl_file", ret);
9307
    return ret;
9308
#endif /* !NO_BIO */
9309
}
9310
#endif /* !NO_FILESYSTEM */
9311
9312
9313
WOLFSSL_X509_CRL* wolfSSL_d2i_X509_CRL(WOLFSSL_X509_CRL** crl,
9314
        const unsigned char* in, int len)
9315
{
9316
    WOLFSSL_X509_CRL *newcrl = NULL;
9317
    int ret = WOLFSSL_SUCCESS;
9318
9319
    WOLFSSL_ENTER("wolfSSL_d2i_X509_CRL");
9320
9321
    if (in == NULL) {
9322
        WOLFSSL_MSG("Bad argument value");
9323
    }
9324
    else {
9325
        newcrl =(WOLFSSL_X509_CRL*)XMALLOC(sizeof(WOLFSSL_X509_CRL), NULL,
9326
                DYNAMIC_TYPE_CRL);
9327
        if (newcrl == NULL) {
9328
            WOLFSSL_MSG("New CRL allocation failed");
9329
        }
9330
        else {
9331
            ret = InitCRL(newcrl, NULL);
9332
            if (ret < 0) {
9333
                WOLFSSL_MSG("Init tmp CRL failed");
9334
            }
9335
            else {
9336
                ret = BufferLoadCRL(newcrl, in, len, WOLFSSL_FILETYPE_ASN1,
9337
                    NO_VERIFY);
9338
                if (ret != WOLFSSL_SUCCESS) {
9339
                    WOLFSSL_MSG("Buffer Load CRL failed");
9340
                }
9341
                else {
9342
                    if (crl) {
9343
                        *crl = newcrl;
9344
                    }
9345
                }
9346
            }
9347
        }
9348
    }
9349
9350
    if ((ret != WOLFSSL_SUCCESS) && (newcrl != NULL)) {
9351
        wolfSSL_X509_CRL_free(newcrl);
9352
        newcrl = NULL;
9353
    }
9354
9355
    return newcrl;
9356
}
9357
9358
/* Retrieve issuer X509_NAME from CRL
9359
 * return X509_NAME*  on success
9360
 * return NULL on failure
9361
 */
9362
WOLFSSL_X509_NAME* wolfSSL_X509_CRL_get_issuer_name(const WOLFSSL_X509_CRL* crl)
9363
{
9364
    if (crl == NULL || crl->crlList == NULL)
9365
        return NULL;
9366
9367
    return crl->crlList->issuer;
9368
}
9369
9370
/* Set issuer name of CRL
9371
 * return WOLFSSL_SUCCESS on success
9372
 * return WOLFSSL_FAILURE on failure
9373
 */
9374
int wolfSSL_X509_CRL_set_issuer_name(WOLFSSL_X509_CRL* crl,
9375
                                     const WOLFSSL_X509_NAME* name)
9376
{
9377
    WOLFSSL_X509_NAME* newName;
9378
9379
    if (crl == NULL || crl->crlList == NULL || name == NULL)
9380
        return WOLFSSL_FAILURE;
9381
9382
    newName = wolfSSL_X509_NAME_dup(name);
9383
    if (newName == NULL)
9384
        return WOLFSSL_FAILURE;
9385
9386
    if (crl->crlList->issuer != NULL) {
9387
        FreeX509Name(crl->crlList->issuer);
9388
        XFREE(crl->crlList->issuer, crl->heap, DYNAMIC_TYPE_X509);
9389
    }
9390
    crl->crlList->issuer = newName;
9391
9392
    return WOLFSSL_SUCCESS;
9393
}
9394
9395
/* Retrieve version from CRL
9396
 * return version on success
9397
 * return 0 on failure
9398
 */
9399
int wolfSSL_X509_CRL_version(WOLFSSL_X509_CRL* crl)
9400
{
9401
    if (crl == NULL || crl->crlList == NULL)
9402
        return 0;
9403
9404
    return crl->crlList->version;
9405
}
9406
9407
/* Set version of CRL
9408
 * Caller passes the RFC 5280 value: 0 for v1, 1 for v2.
9409
 * Internally wolfSSL stores version + 1 (v1 = 1, v2 = 2) to match
9410
 * what ParseCRL produces, so apply the same normalization here.
9411
 * return WOLFSSL_SUCCESS on success
9412
 * return WOLFSSL_FAILURE on failure
9413
 */
9414
int wolfSSL_X509_CRL_set_version(WOLFSSL_X509_CRL* crl, long version)
9415
{
9416
    if (crl == NULL || crl->crlList == NULL)
9417
        return WOLFSSL_FAILURE;
9418
9419
    /* Only v1 (0) and v2 (1) are defined by RFC 5280. */
9420
    if (version < 0 || version > 1)
9421
        return WOLFSSL_FAILURE;
9422
9423
    /* Store as version + 1 to match internal convention. */
9424
    crl->crlList->version = (int)version + 1;
9425
    return WOLFSSL_SUCCESS;
9426
}
9427
9428
/* Retrieve sig OID from CRL
9429
 * return OID on success
9430
 * return 0 on failure
9431
 */
9432
int wolfSSL_X509_CRL_get_signature_type(WOLFSSL_X509_CRL* crl)
9433
{
9434
    if (crl == NULL || crl->crlList == NULL)
9435
        return 0;
9436
9437
    return crl->crlList->signatureOID;
9438
}
9439
9440
/* Set signature type of CRL
9441
 * return WOLFSSL_SUCCESS on success
9442
 * return WOLFSSL_FAILURE on failure
9443
 */
9444
int wolfSSL_X509_CRL_set_signature_type(WOLFSSL_X509_CRL* crl,
9445
                                        int signatureType)
9446
{
9447
    if (crl == NULL || crl->crlList == NULL)
9448
        return WOLFSSL_FAILURE;
9449
9450
    crl->crlList->signatureOID = signatureType;
9451
    return WOLFSSL_SUCCESS;
9452
}
9453
9454
/* Retrieve sig NID from CRL
9455
 * return NID on success
9456
 * return 0 on failure
9457
 */
9458
int wolfSSL_X509_CRL_get_signature_nid(const WOLFSSL_X509_CRL* crl)
9459
{
9460
    if (crl == NULL || crl->crlList == NULL)
9461
        return 0;
9462
9463
    return oid2nid(crl->crlList->signatureOID, oidSigType);
9464
}
9465
9466
/* Set signature NID of CRL
9467
 * return WOLFSSL_SUCCESS on success
9468
 * return negative value on failure
9469
 */
9470
int wolfSSL_X509_CRL_set_signature_nid(WOLFSSL_X509_CRL* crl, int nid)
9471
{
9472
    int ret = WOLFSSL_SUCCESS;
9473
    word32 oid;
9474
9475
    if (crl == NULL || crl->crlList == NULL || nid <= 0) {
9476
        ret = BAD_FUNC_ARG;
9477
    }
9478
9479
    if (ret == WOLFSSL_SUCCESS) {
9480
        oid = nid2oid(nid, oidSigType);
9481
        if (oid == (word32)-1 || oid == (word32)WOLFSSL_FATAL_ERROR) {
9482
            ret = WOLFSSL_FATAL_ERROR;
9483
        }
9484
        else {
9485
            crl->crlList->signatureOID = oid;
9486
        }
9487
    }
9488
9489
    return ret;
9490
}
9491
9492
/* Retrieve signature from CRL
9493
 * return WOLFSSL_SUCCESS on success and negative values on failure
9494
 */
9495
int wolfSSL_X509_CRL_get_signature(WOLFSSL_X509_CRL* crl,
9496
    unsigned char* buf, int* bufSz)
9497
{
9498
    WOLFSSL_ENTER("wolfSSL_X509_CRL_get_signature");
9499
9500
    if (crl == NULL || crl->crlList == NULL ||
9501
        crl->crlList->signature == NULL || bufSz == NULL)
9502
        return BAD_FUNC_ARG;
9503
9504
    if (buf != NULL) {
9505
        if (*bufSz < (int)crl->crlList->signatureSz) {
9506
            WOLFSSL_MSG("Signature buffer too small");
9507
            return BUFFER_E;
9508
        }
9509
        else {
9510
            XMEMCPY(buf, crl->crlList->signature, crl->crlList->signatureSz);
9511
        }
9512
    }
9513
    *bufSz = (int)crl->crlList->signatureSz;
9514
9515
    return WOLFSSL_SUCCESS;
9516
}
9517
9518
int wolfSSL_X509_CRL_set_signature(WOLFSSL_X509_CRL* crl,
9519
    unsigned char* buf, int bufSz)
9520
{
9521
    byte* newSig;
9522
9523
    if (crl == NULL || crl->crlList == NULL || buf == NULL || bufSz <= 0) {
9524
        return BAD_FUNC_ARG;
9525
    }
9526
9527
    /* Ensure signature buffer is allocated and large enough. */
9528
    if (crl->crlList->signature == NULL) {
9529
        crl->crlList->signature = (byte*)XMALLOC((word32)bufSz, crl->heap,
9530
                                                 DYNAMIC_TYPE_CRL_ENTRY);
9531
        if (crl->crlList->signature == NULL) {
9532
            return MEMORY_E;
9533
        }
9534
        crl->crlList->signatureSz = (word32)bufSz;
9535
    }
9536
    else if ((word32)bufSz > crl->crlList->signatureSz) {
9537
        newSig = (byte*)XMALLOC((word32)bufSz, crl->heap,
9538
                                DYNAMIC_TYPE_CRL_ENTRY);
9539
        if (newSig == NULL) {
9540
            return MEMORY_E;
9541
        }
9542
        XFREE(crl->crlList->signature, crl->heap, DYNAMIC_TYPE_CRL_ENTRY);
9543
        crl->crlList->signature = newSig;
9544
        crl->crlList->signatureSz = (word32)bufSz;
9545
    }
9546
    else {
9547
        /* Reuse existing buffer, clear contents in case new signature
9548
         * is smaller. Note that we do not shrink the buffer. */
9549
        XMEMSET(crl->crlList->signature, 0, crl->crlList->signatureSz);
9550
    }
9551
9552
    XMEMCPY(crl->crlList->signature, buf, bufSz);
9553
    crl->crlList->signatureSz = (word32)bufSz;
9554
    return WOLFSSL_SUCCESS;
9555
}
9556
9557
/* Retrieve serial number from RevokedCert
9558
 * return WOLFSSL_SUCCESS on success and negative values on failure
9559
 */
9560
int wolfSSL_X509_REVOKED_get_serial_number(RevokedCert* rev,
9561
    byte* in, int* inOutSz)
9562
{
9563
    WOLFSSL_ENTER("wolfSSL_X509_REVOKED_get_serial_number");
9564
    if (rev == NULL || inOutSz == NULL) {
9565
        return BAD_FUNC_ARG;
9566
    }
9567
9568
    if (in != NULL) {
9569
        if (*inOutSz < rev->serialSz) {
9570
            WOLFSSL_MSG("Serial buffer too small");
9571
            return BUFFER_E;
9572
        }
9573
        XMEMCPY(in, rev->serialNumber, rev->serialSz);
9574
    }
9575
    *inOutSz = rev->serialSz;
9576
9577
    return WOLFSSL_SUCCESS;
9578
}
9579
9580
const WOLFSSL_ASN1_INTEGER* wolfSSL_X509_REVOKED_get0_serial_number(const
9581
                                                      WOLFSSL_X509_REVOKED *rev)
9582
{
9583
    WOLFSSL_ENTER("wolfSSL_X509_REVOKED_get0_serial_number");
9584
9585
    if (rev != NULL) {
9586
        return rev->serialNumber;
9587
    }
9588
    else
9589
        return NULL;
9590
}
9591
9592
const WOLFSSL_ASN1_TIME* wolfSSL_X509_REVOKED_get0_revocation_date(const
9593
                                                      WOLFSSL_X509_REVOKED *rev)
9594
{
9595
    WOLFSSL_ENTER("wolfSSL_X509_REVOKED_get0_revocation_date");
9596
9597
    if (rev != NULL) {
9598
        return rev->revocationDate;
9599
    }
9600
    return NULL;
9601
}
9602
9603
9604
#ifndef NO_BIO
9605
/* print serial number out
9606
*  return WOLFSSL_SUCCESS on success
9607
*/
9608
static int X509RevokedPrintSerial(WOLFSSL_BIO* bio, RevokedCert* rev,
9609
    int indent)
9610
{
9611
    unsigned char serial[32];
9612
    int  sz = sizeof(serial);
9613
9614
    if (indent < 0) indent = 0;
9615
    if (indent > MAX_INDENT) indent = MAX_INDENT;
9616
9617
    XMEMSET(serial, 0, sz);
9618
    if (wolfSSL_X509_REVOKED_get_serial_number(rev, serial, &sz)
9619
            == WOLFSSL_SUCCESS) {
9620
        X509PrintSerial_ex(bio, serial, sz, 0, indent);
9621
    }
9622
    return WOLFSSL_SUCCESS;
9623
}
9624
9625
9626
/* print out the signature in human readable format for use with
9627
* wolfSSL_X509_CRL_print()
9628
 * return WOLFSSL_SUCCESS on success
9629
 */
9630
static int X509CRLPrintSignature(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl,
9631
        int algOnly, int indent)
9632
{
9633
    int sigSz = 0;
9634
9635
    if (wolfSSL_X509_CRL_get_signature(crl, NULL, &sigSz) <= 0) {
9636
        return WOLFSSL_FAILURE;
9637
    }
9638
9639
    if (sigSz > 0) {
9640
        unsigned char* sig;
9641
        int sigNid = wolfSSL_X509_CRL_get_signature_nid(crl);
9642
9643
        sig = (unsigned char*)XMALLOC(sigSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
9644
        if (sig == NULL) {
9645
            return WOLFSSL_FAILURE;
9646
        }
9647
9648
        if (wolfSSL_X509_CRL_get_signature(crl, sig, &sigSz) <= 0) {
9649
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
9650
            return WOLFSSL_FAILURE;
9651
        }
9652
9653
        if (X509PrintSignature_ex(bio, sig, sigSz, sigNid, algOnly, indent)
9654
                != WOLFSSL_SUCCESS) {
9655
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
9656
            return WOLFSSL_FAILURE;
9657
        }
9658
9659
        XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
9660
9661
    }
9662
9663
    return WOLFSSL_SUCCESS;
9664
}
9665
#endif /* !NO_BIO */
9666
9667
#if !defined(NO_BIO) && defined(XSNPRINTF)
9668
/* print out the extensions in human readable format for use with
9669
 * wolfSSL_X509_CRL_print()
9670
 * return WOLFSSL_SUCCESS on success
9671
 */
9672
static int X509CRLPrintExtensions(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl,
9673
        int indent)
9674
{
9675
    char tmp[MAX_WIDTH]; /* buffer for XSNPRINTF */
9676
    int  ret = 0;
9677
9678
    if (indent < 0) indent = 0;
9679
    if (indent > MAX_INDENT) indent = MAX_INDENT;
9680
9681
    if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s\n", indent, "",
9682
                "CRL extensions:") >= MAX_WIDTH) {
9683
        ret = WOLFSSL_FAILURE;
9684
    }
9685
9686
    if (ret == 0 && wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9687
        ret = WOLFSSL_FAILURE;
9688
    }
9689
9690
    if (ret == 0 && crl->crlList->crlNumberSet) {
9691
        char dec_string[49]; /* 20 octets can express numbers up to approx
9692
                                49 decimal digits */
9693
        int freeMp = 0;
9694
    #ifdef WOLFSSL_SMALL_STACK
9695
        mp_int* dec_num = (mp_int*)XMALLOC(sizeof(*dec_num), NULL,
9696
                            DYNAMIC_TYPE_BIGINT);
9697
        if (dec_num == NULL) {
9698
            ret = MEMORY_E;
9699
        }
9700
    #else
9701
        mp_int dec_num[1];
9702
    #endif
9703
9704
        if (ret == 0 && (mp_init(dec_num) != MP_OKAY)) {
9705
             ret = MP_INIT_E;
9706
        }
9707
        else if (ret == 0) {
9708
            freeMp = 1;
9709
        }
9710
9711
        if (ret == 0 && mp_read_radix(dec_num, (char *)crl->crlList->crlNumber,
9712
                    MP_RADIX_HEX) != MP_OKAY) {
9713
            ret = WOLFSSL_FAILURE;
9714
        }
9715
9716
        if (ret == 0 && mp_toradix(dec_num, dec_string, MP_RADIX_DEC)
9717
                    != MP_OKAY) {
9718
            ret = WOLFSSL_FAILURE;
9719
        }
9720
9721
        if (ret == 0 && XSNPRINTF(tmp, MAX_WIDTH, "%*s%s\n", indent + 4, "",
9722
                    "X509v3 CRL Number:") >= MAX_WIDTH) {
9723
            ret = WOLFSSL_FAILURE;
9724
        }
9725
9726
        if (ret == 0 && wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9727
            ret = WOLFSSL_FAILURE;
9728
        }
9729
9730
        if (ret == 0 && XSNPRINTF(tmp, MAX_WIDTH, "%*s%s\n", indent + 8, "",
9731
            dec_string) >= MAX_WIDTH) {
9732
            ret = WOLFSSL_FAILURE;
9733
        }
9734
9735
        if (ret == 0 && wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9736
            ret = WOLFSSL_FAILURE;
9737
        }
9738
9739
        XMEMSET(tmp, 0, sizeof(tmp));
9740
9741
        if (freeMp) {
9742
            mp_free(dec_num);
9743
        }
9744
9745
        WC_FREE_VAR_EX(dec_num, NULL, DYNAMIC_TYPE_BIGINT);
9746
    }
9747
9748
#if !defined(NO_SKID)
9749
    if (ret == 0 && crl->crlList->extAuthKeyIdSet &&
9750
            crl->crlList->extAuthKeyId[0] != 0) {
9751
        word32 i;
9752
        char val[5];
9753
        int valSz = 5;
9754
9755
        if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s", indent + 4, "",
9756
                    "X509v3 Authority Key Identifier:") >= MAX_WIDTH) {
9757
            ret = WOLFSSL_FAILURE;
9758
        }
9759
9760
        if (ret == 0) {
9761
            XSTRNCAT(tmp, "\n", MAX_WIDTH - XSTRLEN(tmp) - 1);
9762
        }
9763
9764
        if (ret == 0 && wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9765
            ret = WOLFSSL_FAILURE;
9766
        }
9767
        XMEMSET(tmp, 0, MAX_WIDTH);
9768
9769
        if (ret == 0 && XSNPRINTF(tmp, MAX_WIDTH - 1, "%*s%s",
9770
                    indent + 8, "", "keyid") >= MAX_WIDTH) {
9771
            ret = WOLFSSL_FAILURE;
9772
        }
9773
9774
9775
        for (i = 0; i < XSTRLEN((char*)crl->crlList->extAuthKeyId); i++) {
9776
            /* check if buffer is almost full */
9777
            if (ret == 0 && XSTRLEN(tmp) >= sizeof(tmp) - valSz) {
9778
                if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9779
                    ret = WOLFSSL_FAILURE;
9780
                }
9781
                tmp[0] = '\0';
9782
            }
9783
            if (ret == 0 && XSNPRINTF(val, (size_t)valSz, ":%02X",
9784
                    crl->crlList->extAuthKeyId[i]) >= valSz) {
9785
                WOLFSSL_MSG("buffer overrun");
9786
                ret = WOLFSSL_FAILURE;
9787
            }
9788
            if (ret == 0) {
9789
                XSTRNCAT(tmp, val, valSz);
9790
            }
9791
        }
9792
        if (ret == 0) {
9793
            XSTRNCAT(tmp, "\n", XSTRLEN("\n") + 1);
9794
        }
9795
        if (ret == 0 && wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9796
            ret = WOLFSSL_FAILURE;
9797
        }
9798
    }
9799
#endif
9800
9801
    if (ret == 0) {
9802
        ret = WOLFSSL_SUCCESS;
9803
    }
9804
9805
    return ret;
9806
}
9807
9808
/* iterate through a CRL's Revoked Certs and print out in human
9809
 * readable format for use with wolfSSL_X509_CRL_print()
9810
 * return WOLFSSL_SUCCESS on success
9811
 */
9812
static int X509CRLPrintRevoked(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl,
9813
        int indent)
9814
{
9815
    char tmp[MAX_WIDTH]; /* buffer for XSNPRINTF */
9816
    int i;
9817
9818
    if (crl->crlList->totalCerts > 0) {
9819
        RevokedCert* revoked = crl->crlList->certs;
9820
9821
        if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s\n", indent, "",
9822
                    "Revoked Certificates:") >= MAX_WIDTH) {
9823
            return WOLFSSL_FAILURE;
9824
        }
9825
9826
        if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9827
            return WOLFSSL_FAILURE;
9828
        }
9829
        XMEMSET(tmp, 0, MAX_WIDTH);
9830
9831
        for (i = 0; i < crl->crlList->totalCerts; i++) {
9832
            if (revoked->serialSz > 0) {
9833
                if (X509RevokedPrintSerial(bio, revoked, indent + 4)
9834
                        != WOLFSSL_SUCCESS) {
9835
                    return WOLFSSL_FAILURE;
9836
                }
9837
            }
9838
        #ifndef NO_ASN_TIME
9839
             if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s", indent + 8, "",
9840
                         "Revocation Date: ") >= MAX_WIDTH) {
9841
                return WOLFSSL_FAILURE;
9842
            }
9843
9844
            if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9845
                return WOLFSSL_FAILURE;
9846
            }
9847
9848
            if (revoked->revDate[0] != 0) {
9849
                if (GetTimeString(revoked->revDate, ASN_UTC_TIME,
9850
                    tmp, MAX_WIDTH, MAX_DATE_SIZE) != WOLFSSL_SUCCESS) {
9851
                    if (GetTimeString(revoked->revDate, ASN_GENERALIZED_TIME,
9852
                    tmp, MAX_WIDTH, MAX_DATE_SIZE) != WOLFSSL_SUCCESS) {
9853
                        WOLFSSL_MSG("Error getting revocation date");
9854
                        return WOLFSSL_FAILURE;
9855
                    }
9856
                }
9857
            }
9858
            else {
9859
                XSTRNCPY(tmp, "Not Set", MAX_WIDTH-1);
9860
            }
9861
            tmp[MAX_WIDTH - 1] = '\0'; /* make sure null terminated */
9862
            if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9863
                return WOLFSSL_FAILURE;
9864
            }
9865
9866
            if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
9867
                return WOLFSSL_FAILURE;
9868
            }
9869
        #endif
9870
            revoked = revoked->next;
9871
        }
9872
    }
9873
    else {
9874
        if (wolfSSL_BIO_write(bio, "No Revoked Certificates.\n",
9875
                       (int)XSTRLEN("No Revoked Certificates.\n")) <= 0) {
9876
            return WOLFSSL_FAILURE;
9877
        }
9878
    }
9879
9880
    return WOLFSSL_SUCCESS;
9881
}
9882
9883
#ifndef NO_ASN_TIME
9884
/* print out the last/next update times in human readable
9885
 * format for use with wolfSSL_X509_CRL_print()
9886
 * return WOLFSSL_SUCCESS on success
9887
 */
9888
static int X509CRLPrintDates(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl,
9889
        int indent)
9890
{
9891
    char tmp[MAX_WIDTH]; /* buffer for XSNPRINTF */
9892
9893
    if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s", indent, "",
9894
                "Last Update: ") >= MAX_WIDTH) {
9895
        return WOLFSSL_FAILURE;
9896
    }
9897
9898
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9899
        return WOLFSSL_FAILURE;
9900
    }
9901
9902
    if (crl->crlList->lastDate[0] != 0) {
9903
        if (GetTimeString(crl->crlList->lastDate, crl->crlList->lastDateFormat,
9904
            tmp, MAX_WIDTH, MAX_DATE_SIZE) != WOLFSSL_SUCCESS) {
9905
            WOLFSSL_MSG("Error getting last update date");
9906
            return WOLFSSL_FAILURE;
9907
        }
9908
    }
9909
    else {
9910
        XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
9911
    }
9912
    tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
9913
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9914
        return WOLFSSL_FAILURE;
9915
    }
9916
9917
    if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
9918
        return WOLFSSL_FAILURE;
9919
    }
9920
9921
    if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s", indent, "",
9922
                "Next Update: ") >= MAX_WIDTH) {
9923
        return WOLFSSL_FAILURE;
9924
    }
9925
9926
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9927
        return WOLFSSL_FAILURE;
9928
    }
9929
9930
    if (crl->crlList->nextDate[0] != 0) {
9931
        if (GetTimeString(crl->crlList->nextDate, crl->crlList->nextDateFormat,
9932
            tmp, MAX_WIDTH, MAX_DATE_SIZE) != WOLFSSL_SUCCESS) {
9933
            WOLFSSL_MSG("Error getting next update date");
9934
            return WOLFSSL_FAILURE;
9935
        }
9936
    }
9937
    else {
9938
        XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
9939
    }
9940
    tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
9941
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9942
        return WOLFSSL_FAILURE;
9943
    }
9944
9945
    if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
9946
        return WOLFSSL_FAILURE;
9947
    }
9948
9949
    return WOLFSSL_SUCCESS;
9950
}
9951
#endif
9952
9953
/* Writes the human readable form of x509 to bio.
9954
 *
9955
 * bio  WOLFSSL_BIO to write to.
9956
 * crl Certificate revocation list to write.
9957
 *
9958
 * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on failure
9959
 */
9960
int wolfSSL_X509_CRL_print(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl)
9961
{
9962
    char issuType[] = "Issuer: ";
9963
9964
    if (bio == NULL || crl == NULL || crl->crlList == NULL) {
9965
        return WOLFSSL_FAILURE;
9966
    }
9967
9968
    if (wolfSSL_BIO_write(bio, "Certificate Revocation List (CRL):\n",
9969
                  (int)XSTRLEN("Certificate Revocation List (CRL):\n")) <= 0) {
9970
            return WOLFSSL_FAILURE;
9971
    }
9972
9973
    /* print version */
9974
    if (X509PrintVersion(bio, wolfSSL_X509_CRL_version(crl), 8)
9975
            != WOLFSSL_SUCCESS) {
9976
        return WOLFSSL_FAILURE;
9977
    }
9978
9979
    /* print signature algo */
9980
    if (X509CRLPrintSignature(bio, crl, 1, 8) != WOLFSSL_SUCCESS) {
9981
        return WOLFSSL_FAILURE;
9982
    }
9983
9984
    /* print issuer name */
9985
    if (X509PrintName(bio, wolfSSL_X509_CRL_get_issuer_name(crl), issuType, 8)
9986
            != WOLFSSL_SUCCESS) {
9987
        return WOLFSSL_FAILURE;
9988
    }
9989
9990
#ifndef NO_ASN_TIME
9991
    /* print last and next update times */
9992
    if (X509CRLPrintDates(bio, crl, 8) != WOLFSSL_SUCCESS) {
9993
        return WOLFSSL_FAILURE;
9994
    }
9995
#endif
9996
9997
    /* print CRL extensions */
9998
    if (X509CRLPrintExtensions(bio, crl, 8) != WOLFSSL_SUCCESS) {
9999
        return WOLFSSL_FAILURE;
10000
    }
10001
10002
    /* print CRL Revoked Certs */
10003
    if (X509CRLPrintRevoked(bio, crl, 0) != WOLFSSL_SUCCESS) {
10004
        return WOLFSSL_FAILURE;
10005
    }
10006
10007
    if (X509CRLPrintSignature(bio, crl, 0, 4) != WOLFSSL_SUCCESS) {
10008
        return WOLFSSL_FAILURE;
10009
    }
10010
10011
    if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
10012
        return WOLFSSL_FAILURE;
10013
    }
10014
10015
    return WOLFSSL_SUCCESS;
10016
}
10017
#endif /* !NO_BIO && XSNPRINTF */
10018
#endif /* HAVE_CRL */
10019
#endif /* OPENSSL_EXTRA */
10020
10021
#if defined(HAVE_CRL) && (defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL))
10022
void wolfSSL_X509_CRL_free(WOLFSSL_X509_CRL *crl)
10023
{
10024
    WOLFSSL_ENTER("wolfSSL_X509_CRL_free");
10025
10026
    if (crl)
10027
        FreeCRL(crl, 1);
10028
}
10029
#endif /* HAVE_CRL && (OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL) */
10030
10031
#if defined(HAVE_CRL) && defined(OPENSSL_EXTRA)
10032
WOLFSSL_ASN1_TIME* wolfSSL_X509_CRL_get_lastUpdate(WOLFSSL_X509_CRL* crl)
10033
{
10034
    if ((crl != NULL) && (crl->crlList != NULL) &&
10035
        (crl->crlList->lastDateAsn1.data[0] != 0)) {
10036
        return &crl->crlList->lastDateAsn1;
10037
    }
10038
    return NULL;
10039
}
10040
10041
int wolfSSL_X509_CRL_set_lastUpdate(WOLFSSL_X509_CRL* crl,
10042
                                    const WOLFSSL_ASN1_TIME* time)
10043
{
10044
    if (crl != NULL && crl->crlList != NULL && time != NULL) {
10045
        crl->crlList->lastDateAsn1 = *time;
10046
        return WOLFSSL_SUCCESS;
10047
    }
10048
    return WOLFSSL_FAILURE;
10049
}
10050
10051
WOLFSSL_ASN1_TIME* wolfSSL_X509_CRL_get_nextUpdate(WOLFSSL_X509_CRL* crl)
10052
{
10053
    if ((crl != NULL) && (crl->crlList != NULL) &&
10054
        (crl->crlList->nextDateAsn1.data[0] != 0)) {
10055
        return &crl->crlList->nextDateAsn1;
10056
    }
10057
    return NULL;
10058
}
10059
10060
int wolfSSL_X509_CRL_set_nextUpdate(WOLFSSL_X509_CRL* crl,
10061
                                    const WOLFSSL_ASN1_TIME* time)
10062
{
10063
    if (crl != NULL && crl->crlList != NULL && time != NULL) {
10064
        crl->crlList->nextDateAsn1 = *time;
10065
        return WOLFSSL_SUCCESS;
10066
    }
10067
    return WOLFSSL_FAILURE;
10068
}
10069
10070
#ifndef NO_WOLFSSL_STUB
10071
int wolfSSL_X509_CRL_verify(WOLFSSL_X509_CRL* crl, WOLFSSL_EVP_PKEY* key)
10072
{
10073
    (void)crl;
10074
    (void)key;
10075
    WOLFSSL_STUB("X509_CRL_verify");
10076
    return 0;
10077
}
10078
#endif
10079
10080
/* Encode CRL to DER format in memory.
10081
 *
10082
 * If *out is NULL, allocates memory and returns it via *out.
10083
 * If *out is not NULL, writes DER data starting at *out.
10084
 *
10085
 * @param crl  CRL to encode
10086
 * @param out  Pointer to output buffer pointer
10087
 * @return     Size of DER encoding on success, WOLFSSL_FAILURE on failure
10088
 */
10089
int wolfSSL_i2d_X509_CRL(WOLFSSL_X509_CRL* crl, unsigned char** out)
10090
{
10091
    int ret;
10092
    long derSz = 0;
10093
    byte* der = NULL;
10094
    int alloced = 0;
10095
10096
    WOLFSSL_ENTER("wolfSSL_i2d_X509_CRL");
10097
10098
    if (crl == NULL) {
10099
        return BAD_FUNC_ARG;
10100
    }
10101
10102
    /* Get required size */
10103
    ret = BufferStoreCRL(crl, NULL, &derSz, WOLFSSL_FILETYPE_ASN1);
10104
    if (ret != WOLFSSL_SUCCESS || derSz <= 0) {
10105
        WOLFSSL_MSG("BufferStoreCRL failed to get size");
10106
        return WOLFSSL_FAILURE;
10107
    }
10108
10109
    if (out == NULL) {
10110
        /* Just return size */
10111
        return (int)derSz;
10112
    }
10113
10114
    if (*out == NULL) {
10115
        /* Allocate output buffer */
10116
        der = (byte*)XMALLOC((size_t)derSz, NULL, DYNAMIC_TYPE_OPENSSL);
10117
        if (der == NULL) {
10118
            WOLFSSL_MSG("Memory allocation failed");
10119
            return MEMORY_E;
10120
        }
10121
        alloced = 1;
10122
    }
10123
    else {
10124
        der = *out;
10125
    }
10126
10127
    /* Encode CRL to DER */
10128
    ret = BufferStoreCRL(crl, der, &derSz, WOLFSSL_FILETYPE_ASN1);
10129
    if (ret != WOLFSSL_SUCCESS) {
10130
        WOLFSSL_MSG("BufferStoreCRL failed to encode");
10131
        if (alloced) {
10132
            XFREE(der, NULL, DYNAMIC_TYPE_OPENSSL);
10133
        }
10134
        return WOLFSSL_FAILURE;
10135
    }
10136
10137
    if (alloced) {
10138
        *out = der;
10139
    }
10140
    else {
10141
        *out += derSz;
10142
    }
10143
10144
    return (int)derSz;
10145
}
10146
#endif /* HAVE_CRL && OPENSSL_EXTRA */
10147
10148
#if defined(WOLFSSL_CERT_EXT) && \
10149
    (defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL))
10150
/* Set CRL Distribution Points from pre-encoded DER.
10151
 *
10152
 * x509  - Certificate to modify
10153
 * der   - Pre-encoded CRLDistributionPoints DER
10154
 * derSz - Size of DER in bytes
10155
 *
10156
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
10157
 */
10158
int wolfSSL_X509_CRL_set_dist_points(WOLFSSL_X509* x509,
10159
    const unsigned char* der, int derSz)
10160
{
10161
    WOLFSSL_ENTER("wolfSSL_X509_CRL_set_dist_points");
10162
10163
    if (x509 == NULL || der == NULL || derSz <= 0) {
10164
        return WOLFSSL_FAILURE;
10165
    }
10166
10167
    if (x509->rawCRLInfo != NULL) {
10168
        XFREE(x509->rawCRLInfo, x509->heap, DYNAMIC_TYPE_X509_EXT);
10169
    }
10170
    x509->rawCRLInfo = (byte*)XMALLOC((word32)derSz, x509->heap,
10171
                                       DYNAMIC_TYPE_X509_EXT);
10172
    if (x509->rawCRLInfo == NULL) {
10173
        return WOLFSSL_FAILURE;
10174
    }
10175
10176
    XMEMCPY(x509->rawCRLInfo, der, (word32)derSz);
10177
    x509->rawCRLInfoSz = derSz;
10178
    x509->CRLdistSet = 1;
10179
10180
    return WOLFSSL_SUCCESS;
10181
}
10182
10183
/* Add CRL Distribution Point URI.
10184
 * Encodes URI into proper CRLDistributionPoints DER format.
10185
 *
10186
 * x509     - Certificate to modify
10187
 * uri      - URI string (e.g., "http://crl.example.com/ca.crl")
10188
 * critical - Whether extension is critical
10189
 *
10190
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
10191
 */
10192
int wolfSSL_X509_CRL_add_dist_point(WOLFSSL_X509* x509,
10193
    const char* uri, int critical)
10194
{
10195
    word32 uriLen;
10196
    byte* derBuf = NULL;
10197
    word32 derSz;
10198
    word32 idx;
10199
    word32 uriTagLen;    /* [6] tag + length + URI */
10200
    word32 genNamesLen;  /* [0] IMPLICIT GeneralNames wrapper */
10201
    word32 distPtNmLen;  /* [0] EXPLICIT distributionPoint wrapper */
10202
    word32 distPtSeqLen; /* SEQUENCE for DistributionPoint */
10203
    word32 outerSeqLen;  /* SEQUENCE for CRLDistributionPoints */
10204
    int ret = WOLFSSL_SUCCESS;
10205
10206
    WOLFSSL_ENTER("wolfSSL_X509_CRL_add_dist_point");
10207
10208
    if (x509 == NULL || uri == NULL) {
10209
        return WOLFSSL_FAILURE;
10210
    }
10211
10212
    uriLen = (word32)XSTRLEN(uri);
10213
    if (uriLen == 0) {
10214
        WOLFSSL_MSG("URI empty");
10215
        return WOLFSSL_FAILURE;
10216
    }
10217
10218
    /*
10219
     * Encode CRL Distribution Points in DER format:
10220
     * CRLDistributionPoints ::= SEQUENCE OF DistributionPoint
10221
     * DistributionPoint ::= SEQUENCE {
10222
     *     distributionPoint [0] EXPLICIT DistributionPointName OPTIONAL
10223
     * }
10224
     * DistributionPointName ::= CHOICE {
10225
     *     fullName [0] IMPLICIT GeneralNames
10226
     * }
10227
     * GeneralNames ::= SEQUENCE OF GeneralName
10228
     * GeneralName ::= [6] IMPLICIT IA5String (uniformResourceIdentifier)
10229
     */
10230
10231
    /* Calculate sizes from innermost to outermost */
10232
    /* [6] tag (1 byte) + length encoding + URI data */
10233
    uriTagLen = ASN_TAG_SZ + SetLength(uriLen, NULL) + uriLen;
10234
    /* [0] CONSTRUCTED tag (1 byte) + length encoding + uriTagLen */
10235
    genNamesLen = ASN_TAG_SZ + SetLength(uriTagLen, NULL) + uriTagLen;
10236
    /* [0] CONSTRUCTED tag (1 byte) + length encoding + genNamesLen */
10237
    distPtNmLen = ASN_TAG_SZ + SetLength(genNamesLen, NULL) + genNamesLen;
10238
    /* SEQUENCE header + distPtNmLen */
10239
    distPtSeqLen = SetSequence(distPtNmLen, NULL) + distPtNmLen;
10240
    /* Outer SEQUENCE header + distPtSeqLen */
10241
    outerSeqLen = SetSequence(distPtSeqLen, NULL) + distPtSeqLen;
10242
10243
    derSz = outerSeqLen;
10244
10245
    /* Allocate buffer for DER encoding */
10246
    derBuf = (byte*)XMALLOC(derSz, x509->heap, DYNAMIC_TYPE_X509_EXT);
10247
    if (derBuf == NULL) {
10248
        return WOLFSSL_FAILURE;
10249
    }
10250
10251
    /* Build forward using SetSequence/SetHeader/SetLength */
10252
    idx = 0;
10253
10254
    /* SEQUENCE for CRLDistributionPoints (outer) */
10255
    idx += SetSequence(distPtSeqLen, derBuf + idx);
10256
10257
    /* SEQUENCE for DistributionPoint */
10258
    idx += SetSequence(distPtNmLen, derBuf + idx);
10259
10260
    /* [0] EXPLICIT wrapper for distributionPoint */
10261
    derBuf[idx++] = (ASN_CONTEXT_SPECIFIC | ASN_CONSTRUCTED);
10262
    idx += SetLength(genNamesLen, derBuf + idx);
10263
10264
    /* [0] IMPLICIT wrapper for GeneralNames (constructed) */
10265
    derBuf[idx++] = (ASN_CONTEXT_SPECIFIC | ASN_CONSTRUCTED);
10266
    idx += SetLength(uriTagLen, derBuf + idx);
10267
10268
    /* [6] IMPLICIT IA5String tag for URI (context-specific, primitive) */
10269
    derBuf[idx++] = (ASN_CONTEXT_SPECIFIC | 6); /* [6] tag */
10270
    idx += SetLength(uriLen, derBuf + idx);
10271
10272
    /* Copy URI string */
10273
    XMEMCPY(derBuf + idx, uri, uriLen);
10274
    idx += uriLen;
10275
10276
    /* Store the encoded CRL info in x509 */
10277
    {
10278
        ret = wolfSSL_X509_CRL_set_dist_points(x509, derBuf, (int)idx);
10279
        if (ret == WOLFSSL_SUCCESS && critical) {
10280
            x509->CRLdistCrit = 1;
10281
        }
10282
    }
10283
10284
    XFREE(derBuf, x509->heap, DYNAMIC_TYPE_X509_EXT);
10285
10286
    return ret;
10287
}
10288
#endif /* WOLFSSL_CERT_EXT && (OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL) */
10289
10290
#ifdef OPENSSL_EXTRA
10291
10292
10293
WOLFSSL_X509_VERIFY_PARAM* wolfSSL_X509_VERIFY_PARAM_new(void)
10294
{
10295
    WOLFSSL_X509_VERIFY_PARAM *param = NULL;
10296
    param = (WOLFSSL_X509_VERIFY_PARAM*)XMALLOC(
10297
            sizeof(WOLFSSL_X509_VERIFY_PARAM), NULL, DYNAMIC_TYPE_OPENSSL);
10298
    if (param != NULL)
10299
        XMEMSET(param, 0, sizeof(WOLFSSL_X509_VERIFY_PARAM ));
10300
10301
    return(param);
10302
}
10303
10304
10305
void wolfSSL_X509_VERIFY_PARAM_free(WOLFSSL_X509_VERIFY_PARAM *param)
10306
{
10307
    XFREE(param, NULL, DYNAMIC_TYPE_OPENSSL);
10308
}
10309
10310
10311
/* Sets flags by OR'ing with existing value. */
10312
int wolfSSL_X509_VERIFY_PARAM_set_flags(WOLFSSL_X509_VERIFY_PARAM *param,
10313
        unsigned long flags)
10314
{
10315
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
10316
10317
    if (param != NULL) {
10318
        param->flags |= flags;
10319
        ret = WOLFSSL_SUCCESS;
10320
    }
10321
10322
    return ret;
10323
}
10324
10325
10326
int wolfSSL_X509_VERIFY_PARAM_get_flags(WOLFSSL_X509_VERIFY_PARAM *param)
10327
{
10328
    int ret = 0;
10329
10330
    if (param != NULL) {
10331
        ret = (int)param->flags;
10332
    }
10333
10334
    return ret;
10335
}
10336
10337
10338
int wolfSSL_X509_VERIFY_PARAM_clear_flags(WOLFSSL_X509_VERIFY_PARAM *param,
10339
        unsigned long flags)
10340
{
10341
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
10342
10343
    if (param != NULL) {
10344
        param->flags &= ~flags;
10345
        ret = WOLFSSL_SUCCESS;
10346
    }
10347
10348
    return ret;
10349
}
10350
10351
/* note WOLFSSL_X509_VERIFY_PARAM does not record purpose, trust, depth, or
10352
 * auth_level.
10353
 */
10354
static const WOLFSSL_X509_VERIFY_PARAM x509_verify_param_builtins[] = {
10355
    {
10356
     "ssl_client",              /* name */
10357
     0,                         /* check_time */
10358
     0,                         /* inherit_flags */
10359
     0,                         /* flags */
10360
     "",                        /* hostname */
10361
     0,                         /* hostFlags */
10362
     ""                         /* ipasc */
10363
    },
10364
    {
10365
     "ssl_server",              /* name */
10366
     0,                         /* check_time */
10367
     0,                         /* inherit_flags */
10368
     0,                         /* flags */
10369
     "",                        /* hostname */
10370
     0,                         /* hostFlags */
10371
     ""                         /* ipasc */
10372
    }
10373
};
10374
10375
const WOLFSSL_X509_VERIFY_PARAM *wolfSSL_X509_VERIFY_PARAM_lookup(
10376
    const char *name)
10377
{
10378
    const WOLFSSL_X509_VERIFY_PARAM *param = &x509_verify_param_builtins[0],
10379
        *param_end = &x509_verify_param_builtins[
10380
                                         XELEM_CNT(x509_verify_param_builtins)];
10381
10382
    if (name == NULL) {
10383
        return NULL;
10384
    }
10385
    while (param < param_end) {
10386
        if (XSTRCMP(name, param->name) == 0)
10387
            return param;
10388
        ++param;
10389
    }
10390
    return NULL;
10391
}
10392
10393
/* inherits properties of param "to" to param "from"
10394
*
10395
* WOLFSSL_VPARAM_DEFAULT          any values in "src" is copied
10396
*                                 if "src" value is new for "to".
10397
* WOLFSSL_VPARAM_OVERWRITE        all values of "form" are copied to "to"
10398
* WOLFSSL_VPARAM_RESET_FLAGS      the flag values are copied, not Ored
10399
* WOLFSSL_VPARAM_LOCKED           don't copy any values
10400
* WOLFSSL_VPARAM_ONCE             the current inherit_flags is zerroed
10401
*/
10402
int wolfSSL_X509_VERIFY_PARAM_inherit(WOLFSSL_X509_VERIFY_PARAM *to,
10403
                                         const WOLFSSL_X509_VERIFY_PARAM *from)
10404
{
10405
    int ret = WOLFSSL_SUCCESS;
10406
    int isOverWrite = 0;
10407
    int isDefault = 0;
10408
    unsigned int flags;
10409
10410
    /* sanity check */
10411
    if (!to || !from) {
10412
        /* be compatible to openssl return value */
10413
        return WOLFSSL_SUCCESS;
10414
    }
10415
    flags = to->inherit_flags | from->inherit_flags;
10416
10417
    if (flags & WOLFSSL_VPARAM_LOCKED) {
10418
        return WOLFSSL_SUCCESS;
10419
    }
10420
10421
    if (flags & WOLFSSL_VPARAM_ONCE) {
10422
        to->inherit_flags = 0;
10423
    }
10424
10425
    isOverWrite = (flags & WOLFSSL_VPARAM_OVERWRITE);
10426
    isDefault = (flags & WOLFSSL_VPARAM_DEFAULT);
10427
10428
    /* copy check_time if check time is not set */
10429
    if ((to->flags & WOLFSSL_USE_CHECK_TIME) == 0 || isOverWrite) {
10430
           to->check_time = from->check_time;
10431
           to->flags &= ~WOLFSSL_USE_CHECK_TIME;
10432
    }
10433
    /* host name */
10434
    if (isOverWrite ||
10435
        (from->hostName[0] != 0 && (to->hostName[0] == 0 || isDefault))) {
10436
            if (!(ret = wolfSSL_X509_VERIFY_PARAM_set1_host(to, from->hostName,
10437
                (unsigned int)XSTRLEN(from->hostName))))
10438
                return ret;
10439
        to->hostFlags = from->hostFlags;
10440
    }
10441
    /* ip ascii */
10442
    if (isOverWrite ||
10443
        (from->ipasc[0] != 0 && (to->ipasc[0] == 0 || isDefault))) {
10444
10445
            if (!(ret = wolfSSL_X509_VERIFY_PARAM_set1_ip_asc(to, from->ipasc)))
10446
                return ret;
10447
    }
10448
10449
    if (flags & WOLFSSL_VPARAM_RESET_FLAGS)
10450
        to->flags = 0;
10451
10452
    to->flags |= from->flags;
10453
10454
    return ret;
10455
}
10456
10457
/******************************************************************************
10458
* wolfSSL_X509_VERIFY_PARAM_set1_host - sets the DNS hostname to name
10459
* hostnames is cleared if name is NULL or empty.
10460
*
10461
* RETURNS:
10462
*
10463
*/
10464
int wolfSSL_X509_VERIFY_PARAM_set1_host(WOLFSSL_X509_VERIFY_PARAM* pParam,
10465
                                         const char* name,
10466
                                         unsigned int nameSz)
10467
{
10468
    WOLFSSL_ENTER("wolfSSL_X509_VERIFY_PARAM_set1_host");
10469
10470
    if (pParam == NULL)
10471
        return WOLFSSL_FAILURE;
10472
10473
    /* If name is NULL, clear hostname. */
10474
    if (name == NULL) {
10475
        XMEMSET(pParam->hostName, 0, WOLFSSL_HOST_NAME_MAX);
10476
        return WOLFSSL_SUCCESS;
10477
    }
10478
10479
    /* If name is NULL-terminated, namelen can be set to zero. */
10480
    if (nameSz == 0) {
10481
        nameSz = (unsigned int)XSTRLEN(name);
10482
    }
10483
10484
    if (nameSz > 0 && name[nameSz - 1] == '\0')
10485
        nameSz--;
10486
10487
    if (nameSz > WOLFSSL_HOST_NAME_MAX-1) {
10488
        WOLFSSL_MSG("Truncating name");
10489
        nameSz = WOLFSSL_HOST_NAME_MAX-1;
10490
    }
10491
10492
    if (nameSz > 0) {
10493
        XMEMCPY(pParam->hostName, name, nameSz);
10494
        XMEMSET(pParam->hostName + nameSz, 0,
10495
                WOLFSSL_HOST_NAME_MAX - nameSz);
10496
    }
10497
10498
    pParam->hostName[nameSz] = '\0';
10499
10500
    return WOLFSSL_SUCCESS;
10501
}
10502
10503
/* Set VERIFY PARAM from "from" pointer to "to" pointer */
10504
int wolfSSL_X509_VERIFY_PARAM_set1(WOLFSSL_X509_VERIFY_PARAM *to,
10505
                                   const WOLFSSL_X509_VERIFY_PARAM *from)
10506
{
10507
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
10508
    unsigned int _inherit_flags;
10509
10510
    if (!to) {
10511
        return ret;
10512
    }
10513
    /* keeps the inherit flags for save */
10514
    _inherit_flags = to->inherit_flags;
10515
10516
    /* Ored DEFAULT inherit flag property to copy "from" contents to "to"
10517
    *  contents
10518
    */
10519
    to->inherit_flags |= WOLFSSL_VPARAM_DEFAULT;
10520
10521
    ret = wolfSSL_X509_VERIFY_PARAM_inherit(to, from);
10522
10523
    /* restore inherit flag */
10524
    to->inherit_flags = _inherit_flags;
10525
10526
    return ret;
10527
}
10528
10529
/* Set the host flag in the X509_VERIFY_PARAM structure */
10530
void wolfSSL_X509_VERIFY_PARAM_set_hostflags(WOLFSSL_X509_VERIFY_PARAM* param,
10531
                                             unsigned int flags)
10532
{
10533
    if (param != NULL) {
10534
        param->hostFlags = flags;
10535
    }
10536
}
10537
10538
/* Sets the expected IP address to ipasc.
10539
 *
10540
 * param is a pointer to the X509_VERIFY_PARAM structure
10541
 * ipasc is a NULL-terminated string with N.N.N.N for IPv4 and
10542
 *       HH:HH ... HH:HH for IPv6. There is no validation performed on the
10543
 *       parameter, and it must be an exact match with the IP in the cert.
10544
 *
10545
 * return 1 for success and 0 for failure*/
10546
int wolfSSL_X509_VERIFY_PARAM_set1_ip_asc(WOLFSSL_X509_VERIFY_PARAM *param,
10547
        const char *ipasc)
10548
{
10549
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
10550
10551
    if (param != NULL) {
10552
        if (ipasc == NULL) {
10553
            param->ipasc[0] = '\0';
10554
        }
10555
        else {
10556
            XSTRLCPY(param->ipasc, ipasc, WOLFSSL_MAX_IPSTR);
10557
            param->ipasc[WOLFSSL_MAX_IPSTR-1] = '\0';
10558
        }
10559
        ret = WOLFSSL_SUCCESS;
10560
    }
10561
10562
    return ret;
10563
}
10564
/* Sets the expected IP address to ip(asc)
10565
 *          by re-constructing IP address in ascii
10566
 * @param  param is a pointer to the X509_VERIFY_PARAM structure
10567
 * @param  ip    in binary format of ip address
10568
 * @param  iplen size of ip, 4 for ipv4, 16 for ipv6
10569
 * @return 1 for success and 0 for failure
10570
 */
10571
int wolfSSL_X509_VERIFY_PARAM_set1_ip(WOLFSSL_X509_VERIFY_PARAM* param,
10572
    const unsigned char* ip, size_t iplen)
10573
{
10574
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
10575
#ifndef NO_FILESYSTEM
10576
    char* buf = NULL;
10577
    char* p = NULL;
10578
    word32 val = 0;
10579
    int i;
10580
    const size_t max_ipv6_len = 40;
10581
    byte write_zero = 0;
10582
#endif
10583
10584
    /* sanity check */
10585
    if (param == NULL || (iplen != 0 && iplen != 4 && iplen != 16)) {
10586
        WOLFSSL_MSG("bad function arg");
10587
        return ret;
10588
    }
10589
    if (ip == NULL && iplen != 0) {
10590
        WOLFSSL_MSG("bad function arg");
10591
        return ret;
10592
    }
10593
#ifndef NO_FILESYSTEM
10594
    if (iplen == 4) {
10595
        /* ipv4 www.xxx.yyy.zzz max 15 length + Null termination */
10596
        buf = (char*)XMALLOC(16, NULL, DYNAMIC_TYPE_TMP_BUFFER);
10597
        if (!buf) {
10598
            WOLFSSL_MSG("failed malloc");
10599
            return ret;
10600
        }
10601
10602
        (void)XSNPRINTF(buf, 16, "%d.%d.%d.%d", ip[0], ip[1], ip[2], ip[3]);
10603
        buf[15] = '\0'; /* null terminate */
10604
    }
10605
    else if (iplen == 16) {
10606
        /* ipv6 normal address scheme
10607
        *   y1:y2:y3:y4:y5:y6:y7:y8, len(yx):4, len(y1-y8):32. len(":"):7
10608
        *   Max len is 32 + 7 + 1(Termination) = 40 bytes
10609
        *
10610
        *   ipv6 dual address
10611
        *   Or y1:y2:y3:y4:y:y6:x.x.x.x yx is 4, y1-y6 is 24, ":" is 6
10612
        *   x.x.x.x is 15.
10613
        *   Max len is 24 + 6 + 15 + 1(Termination) = 46 bytes
10614
        *
10615
        *   Expect data in ip[16]
10616
        *   e.g (aaaa):(bbbb):(cccc):....(hhhh)
10617
        *   (aaaa) = (ip[0<<8)|ip[1]
10618
        *   ......
10619
        *   (hhhh) = (ip[14]<<8)|(ip[15])
10620
        *
10621
        *   e.g ::(gggg):(hhhh)
10622
        *   ip[0]-[11] = 0
10623
        *   (gggg) = (ip[12]<<8) |(ip[13])
10624
        *   (hhhh) = (ip[14]<<8) |(ip[15])
10625
        *
10626
        *   Because it is not able to know which ivp6 scheme uses from data to
10627
        *   reconstruct IP address, this function assumes
10628
        *   ivp6 normal address scheme, not dual address scheme,
10629
        *   to re-construct IP address in ascii.
10630
        */
10631
        buf = (char*)XMALLOC(max_ipv6_len, NULL, DYNAMIC_TYPE_TMP_BUFFER);
10632
        if (!buf) {
10633
            WOLFSSL_MSG("failed malloc");
10634
            return ret;
10635
        }
10636
        p = buf;
10637
        for (i = 0; i < 16; i += 2) {
10638
            val = (((word32)(ip[i]<<8)) | (ip[i+1])) & 0xFFFF;
10639
            if (val == 0) {
10640
                if (!write_zero) {
10641
                    *p = ':';
10642
                }
10643
                p++;
10644
                *p = '\0';
10645
                write_zero = 1;
10646
            }
10647
            else {
10648
                if (i != 0) {
10649
                    *p++ = ':';
10650
                }
10651
                (void)XSNPRINTF(p, max_ipv6_len - (size_t)(p - buf), "%x", val);
10652
            }
10653
            /* sanity check */
10654
            if (XSTRLEN(buf) > max_ipv6_len) {
10655
                WOLFSSL_MSG("The target ip address exceeds buffer length(40)");
10656
                XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
10657
                buf = NULL;
10658
                break;
10659
            }
10660
            /* move the pointer to the last */
10661
            /* XSTRLEN includes NULL because of XSPRINTF use */
10662
            p = buf + (XSTRLEN(buf));
10663
        }
10664
        /* termination */
10665
        if (i == 16 && buf) {
10666
            p--;
10667
            if ((*p) == ':') {
10668
                /* when the last character is :, the following segments are zero
10669
                 * Therefore, adding : and null termination */
10670
                p++;
10671
                *p++ = ':';
10672
                *p = '\0';
10673
            }
10674
        }
10675
    }
10676
    else {
10677
        WOLFSSL_MSG("iplen is zero, do nothing");
10678
        return WOLFSSL_SUCCESS;
10679
    }
10680
10681
    if (buf) {
10682
        /* set address to ip asc */
10683
        ret = wolfSSL_X509_VERIFY_PARAM_set1_ip_asc(param, buf);
10684
        XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
10685
    }
10686
#else
10687
    (void)param;
10688
    (void)ip;
10689
    (void)iplen;
10690
#endif
10691
10692
    return ret;
10693
}
10694
10695
#ifndef NO_WOLFSSL_STUB
10696
void wolfSSL_X509_OBJECT_free_contents(WOLFSSL_X509_OBJECT* obj)
10697
{
10698
    (void)obj;
10699
    WOLFSSL_STUB("X509_OBJECT_free_contents");
10700
}
10701
#endif
10702
10703
#ifndef NO_ASN_TIME
10704
int wolfSSL_X509_cmp_current_time(const WOLFSSL_ASN1_TIME* asnTime)
10705
{
10706
    return wolfSSL_X509_cmp_time(asnTime, NULL);
10707
}
10708
10709
/* return WOLFSSL_FATAL_ERROR if asnTime is earlier than or equal to cmpTime,
10710
 * and 1 otherwise
10711
 * return 0 on error
10712
 */
10713
int wolfSSL_X509_cmp_time(const WOLFSSL_ASN1_TIME* asnTime, time_t* cmpTime)
10714
{
10715
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
10716
    time_t tmpTime, *pTime = &tmpTime;
10717
    struct tm ts, *tmpTs, *ct;
10718
#if defined(NEED_TMP_TIME)
10719
    /* for use with gmtime_r */
10720
    struct tm tmpTimeStorage;
10721
10722
    tmpTs = &tmpTimeStorage;
10723
#else
10724
    tmpTs = NULL;
10725
#endif
10726
    (void)tmpTs;
10727
10728
    if (asnTime == NULL) {
10729
        return WOLFSSL_FAILURE;
10730
    }
10731
10732
    if (cmpTime == NULL) {
10733
        /* Use current time */
10734
        *pTime = wc_Time(0);
10735
    }
10736
    else {
10737
        pTime = cmpTime;
10738
    }
10739
10740
    if (wolfSSL_ASN1_TIME_to_tm((WOLFSSL_ASN1_TIME*)asnTime, &ts) !=
10741
                                                              WOLFSSL_SUCCESS) {
10742
        WOLFSSL_MSG("Failed to convert WOLFSSL_ASN1_TIME to struct tm.");
10743
        return WOLFSSL_FAILURE;
10744
    }
10745
10746
    /* Convert to time struct*/
10747
    ct = XGMTIME(pTime, tmpTs);
10748
10749
    if (ct == NULL)
10750
        return GETTIME_ERROR;
10751
10752
    /* DateGreaterThan returns 1 for >; 0 for <= */
10753
    ret = DateGreaterThan(&ts, ct) ? 1 : -1;
10754
10755
    return ret;
10756
}
10757
#endif /* !NO_ASN_TIME */
10758
10759
#if (defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)) && \
10760
    !defined(NO_ASN_TIME) && !defined(USER_TIME) && !defined(TIME_OVERRIDES)
10761
WOLFSSL_ASN1_TIME *wolfSSL_X509_time_adj_ex(WOLFSSL_ASN1_TIME *asnTime,
10762
    int offset_day, long offset_sec, time_t *in_tm)
10763
{
10764
    /* get current time if in_tm is null */
10765
    time_t t = in_tm ? *in_tm : wc_Time(0);
10766
    return wolfSSL_ASN1_TIME_adj(asnTime, t, offset_day, offset_sec);
10767
}
10768
10769
WOLFSSL_ASN1_TIME *wolfSSL_X509_time_adj(WOLFSSL_ASN1_TIME *asnTime,
10770
    long offset_sec, time_t *in_tm)
10771
{
10772
    return wolfSSL_X509_time_adj_ex(asnTime, 0, offset_sec, in_tm);
10773
}
10774
10775
WOLFSSL_ASN1_TIME* wolfSSL_X509_gmtime_adj(WOLFSSL_ASN1_TIME *s, long adj)
10776
{
10777
    return wolfSSL_X509_time_adj(s, adj, NULL);
10778
}
10779
#endif
10780
10781
int wolfSSL_sk_X509_REVOKED_num(WOLFSSL_STACK* sk)
10782
{
10783
    WOLFSSL_ENTER("wolfSSL_sk_X509_REVOKED_num");
10784
    if (sk != NULL) {
10785
        return (int)sk->num;
10786
    }
10787
    return 0;
10788
}
10789
10790
/* Free a WOLFSSL_X509_REVOKED and all its owned memory. */
10791
void wolfSSL_X509_REVOKED_free(WOLFSSL_X509_REVOKED* rev)
10792
{
10793
    if (rev == NULL) {
10794
        return;
10795
    }
10796
10797
    wolfSSL_ASN1_INTEGER_free(rev->serialNumber);
10798
    wolfSSL_ASN1_TIME_free(rev->revocationDate);
10799
10800
    if (rev->extensions != NULL) {
10801
        wolfSSL_sk_pop_free(rev->extensions, NULL);
10802
    }
10803
    if (rev->issuer != NULL) {
10804
        wolfSSL_sk_pop_free(rev->issuer, NULL);
10805
    }
10806
10807
    XFREE(rev, NULL, DYNAMIC_TYPE_OPENSSL);
10808
}
10809
10810
#ifdef HAVE_CRL
10811
/* Build a WOLFSSL_X509_REVOKED from an internal RevokedCert.
10812
 * Caller takes ownership of the returned object. */
10813
static WOLFSSL_X509_REVOKED* RevokedCertToRevoked(RevokedCert* rc, int seq)
10814
{
10815
    WOLFSSL_X509_REVOKED* rev;
10816
    WOLFSSL_ASN1_INTEGER* serial;
10817
10818
    if (rc == NULL) {
10819
        return NULL;
10820
    }
10821
10822
    rev = (WOLFSSL_X509_REVOKED*)XMALLOC(sizeof(WOLFSSL_X509_REVOKED), NULL,
10823
                                          DYNAMIC_TYPE_OPENSSL);
10824
    if (rev == NULL) {
10825
        return NULL;
10826
    }
10827
    XMEMSET(rev, 0, sizeof(WOLFSSL_X509_REVOKED));
10828
10829
    /* Serial number */
10830
    serial = wolfSSL_ASN1_INTEGER_new();
10831
    if (serial == NULL) {
10832
        XFREE(rev, NULL, DYNAMIC_TYPE_OPENSSL);
10833
        return NULL;
10834
    }
10835
    if (rc->serialSz > 0 && rc->serialSz <= EXTERNAL_SERIAL_SIZE) {
10836
        serial->data = (unsigned char*)XMALLOC((size_t)rc->serialSz, NULL,
10837
                                               DYNAMIC_TYPE_OPENSSL);
10838
        if (serial->data == NULL) {
10839
            wolfSSL_ASN1_INTEGER_free(serial);
10840
            XFREE(rev, NULL, DYNAMIC_TYPE_OPENSSL);
10841
            return NULL;
10842
        }
10843
        XMEMCPY(serial->data, rc->serialNumber, (size_t)rc->serialSz);
10844
        serial->length = rc->serialSz;
10845
        serial->dataMax = rc->serialSz;
10846
        serial->isDynamic = 1;
10847
    }
10848
    rev->serialNumber = serial;
10849
10850
    /* Revocation date */
10851
    {
10852
        WOLFSSL_ASN1_TIME* revDate = wolfSSL_ASN1_TIME_new();
10853
        if (revDate != NULL) {
10854
            int dateLen = 0;
10855
            /* Determine date length from the format byte */
10856
            if (rc->revDateFormat == ASN_UTC_TIME ||
10857
                    rc->revDateFormat == ASN_GENERALIZED_TIME) {
10858
                /* Find actual length: dates are null-terminated strings in
10859
                 * revDate buffer up to MAX_DATE_SIZE */
10860
                while (dateLen < MAX_DATE_SIZE && rc->revDate[dateLen] != 0)
10861
                    dateLen++;
10862
            }
10863
            if (dateLen > 0 && dateLen < MAX_DATE_SIZE) {
10864
                XMEMCPY(revDate->data, rc->revDate, (size_t)dateLen);
10865
                revDate->length = dateLen;
10866
                revDate->type = rc->revDateFormat;
10867
            }
10868
        }
10869
        rev->revocationDate = revDate;
10870
    }
10871
10872
    /* Reason code */
10873
    rev->reason = rc->reasonCode;
10874
10875
    /* Sequence (load order) */
10876
    rev->sequence = seq;
10877
10878
    /* issuer: left as NULL (indirect CRL not yet supported) */
10879
    /* extensions: left as NULL for now (raw DER available in RevokedCert
10880
     * but decoded STACK_OF(X509_EXTENSION) build not yet implemented) */
10881
10882
    return rev;
10883
}
10884
#endif /* HAVE_CRL */
10885
10886
WOLFSSL_STACK* wolfSSL_X509_CRL_get_REVOKED(WOLFSSL_X509_CRL* crl)
10887
{
10888
    WOLFSSL_ENTER("wolfSSL_X509_CRL_get_REVOKED");
10889
10890
    if (crl == NULL) {
10891
        return NULL;
10892
    }
10893
10894
#if defined(OPENSSL_EXTRA) && defined(HAVE_CRL)
10895
    /* Return cached stack if already built */
10896
    if (crl->revokedStack != NULL) {
10897
        return crl->revokedStack;
10898
    }
10899
10900
    /* Build the stack from the internal RevokedCert linked list */
10901
    if (crl->crlList != NULL) {
10902
        WOLFSSL_STACK* sk;
10903
        RevokedCert* rc;
10904
        int seq = 0;
10905
10906
        sk = wolfSSL_sk_new_null();
10907
        if (sk == NULL) {
10908
            return NULL;
10909
        }
10910
        sk->type = STACK_TYPE_X509_REVOKED;
10911
10912
        for (rc = crl->crlList->certs; rc != NULL; rc = rc->next) {
10913
            WOLFSSL_X509_REVOKED* rev = RevokedCertToRevoked(rc, seq);
10914
            if (rev == NULL) {
10915
                /* Clean up on failure */
10916
                wolfSSL_sk_pop_free(sk, NULL);
10917
                return NULL;
10918
            }
10919
            /* Push to stack. wolfSSL_sk_push returns total count on success. */
10920
            if (wolfSSL_sk_push(sk, rev) <= 0) {
10921
                wolfSSL_X509_REVOKED_free(rev);
10922
                wolfSSL_sk_pop_free(sk, NULL);
10923
                return NULL;
10924
            }
10925
            seq++;
10926
        }
10927
10928
        crl->revokedStack = sk;
10929
        return sk;
10930
    }
10931
#endif /* OPENSSL_EXTRA && HAVE_CRL */
10932
10933
    return NULL;
10934
}
10935
10936
WOLFSSL_X509_REVOKED* wolfSSL_sk_X509_REVOKED_value(
10937
                                    WOLFSSL_STACK* sk, int idx)
10938
{
10939
    WOLFSSL_ENTER("wolfSSL_sk_X509_REVOKED_value");
10940
10941
    if (sk == NULL) {
10942
        return NULL;
10943
    }
10944
10945
    return (WOLFSSL_X509_REVOKED*)wolfSSL_sk_value(sk, idx);
10946
}
10947
10948
/* Extension accessors for WOLFSSL_X509_REVOKED */
10949
int wolfSSL_X509_REVOKED_get_ext_count(const WOLFSSL_X509_REVOKED* rev)
10950
{
10951
    WOLFSSL_ENTER("wolfSSL_X509_REVOKED_get_ext_count");
10952
    if (rev != NULL && rev->extensions != NULL) {
10953
        return (int)rev->extensions->num;
10954
    }
10955
    return 0;
10956
}
10957
10958
WOLFSSL_X509_EXTENSION* wolfSSL_X509_REVOKED_get_ext(
10959
                                     const WOLFSSL_X509_REVOKED* rev, int loc)
10960
{
10961
    WOLFSSL_ENTER("wolfSSL_X509_REVOKED_get_ext");
10962
    if (rev != NULL && rev->extensions != NULL) {
10963
        return (WOLFSSL_X509_EXTENSION*)wolfSSL_sk_value(rev->extensions, loc);
10964
    }
10965
    return NULL;
10966
}
10967
10968
#endif /* OPENSSL_EXTRA */
10969
10970
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
10971
10972
WOLFSSL_ASN1_INTEGER* wolfSSL_X509_get_serialNumber(WOLFSSL_X509* x509)
10973
{
10974
    WOLFSSL_ASN1_INTEGER* a;
10975
    int i = 0;
10976
10977
    WOLFSSL_ENTER("wolfSSL_X509_get_serialNumber");
10978
10979
    if (x509 == NULL) {
10980
        WOLFSSL_MSG("NULL function argument");
10981
        return NULL;
10982
    }
10983
10984
    if (x509->serialNumber != NULL)
10985
       return x509->serialNumber;
10986
10987
    a = wolfSSL_ASN1_INTEGER_new();
10988
    if (a == NULL)
10989
        return NULL;
10990
10991
    /* Make sure there is space for the data, ASN.1 type and length. */
10992
    if (x509->serialSz > (WOLFSSL_ASN1_INTEGER_MAX - 2)) {
10993
        /* dynamically create data buffer, +2 for type and length */
10994
        a->data = (unsigned char*)XMALLOC(x509->serialSz + 2, NULL,
10995
                DYNAMIC_TYPE_OPENSSL);
10996
        if (a->data == NULL) {
10997
            wolfSSL_ASN1_INTEGER_free(a);
10998
            return NULL;
10999
        }
11000
        a->dataMax   = (unsigned int)x509->serialSz + 2;
11001
        a->isDynamic = 1;
11002
    }
11003
    else {
11004
        /* Use array instead of dynamic memory */
11005
        a->data    = a->intData;
11006
        a->dataMax = WOLFSSL_ASN1_INTEGER_MAX;
11007
    }
11008
11009
    #if defined(WOLFSSL_QT) || defined(WOLFSSL_HAPROXY)
11010
        XMEMCPY(&a->data[i], x509->serial, x509->serialSz);
11011
        a->length = x509->serialSz;
11012
    #else
11013
        a->data[i++] = ASN_INTEGER;
11014
        i += SetLength(x509->serialSz, a->data + i);
11015
        XMEMCPY(&a->data[i], x509->serial, x509->serialSz);
11016
        a->length = x509->serialSz + 2;
11017
    #endif
11018
11019
    x509->serialNumber = a;
11020
11021
    return a;
11022
}
11023
11024
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
11025
11026
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
11027
11028
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
11029
    defined(WOLFSSL_APACHE_HTTPD) || defined(WOLFSSL_HAPROXY) || \
11030
    defined(WOLFSSL_WPAS)
11031
WOLFSSL_X509_ALGOR* wolfSSL_X509_ALGOR_new(void)
11032
{
11033
    WOLFSSL_X509_ALGOR* ret;
11034
    ret = (WOLFSSL_X509_ALGOR*)XMALLOC(sizeof(WOLFSSL_X509_ALGOR), NULL,
11035
                                       DYNAMIC_TYPE_OPENSSL);
11036
    if (ret) {
11037
        XMEMSET(ret, 0, sizeof(WOLFSSL_X509_ALGOR));
11038
    }
11039
    return ret;
11040
}
11041
11042
void wolfSSL_X509_ALGOR_free(WOLFSSL_X509_ALGOR *alg)
11043
{
11044
    if (alg) {
11045
        wolfSSL_ASN1_OBJECT_free(alg->algorithm);
11046
        wolfSSL_ASN1_TYPE_free(alg->parameter);
11047
        XFREE(alg, NULL, DYNAMIC_TYPE_OPENSSL);
11048
    }
11049
}
11050
11051
/* Returns X509_ALGOR struct with signature algorithm */
11052
const WOLFSSL_X509_ALGOR* wolfSSL_X509_get0_tbs_sigalg(const WOLFSSL_X509 *x509)
11053
{
11054
    WOLFSSL_ENTER("wolfSSL_X509_get0_tbs_sigalg");
11055
11056
    if (x509 == NULL) {
11057
        WOLFSSL_MSG("x509 struct NULL error");
11058
        return NULL;
11059
    }
11060
11061
    return &x509->algor;
11062
}
11063
11064
/* Sets paobj pointer to X509_ALGOR signature algorithm */
11065
void wolfSSL_X509_ALGOR_get0(const WOLFSSL_ASN1_OBJECT **paobj, int *pptype,
11066
                            const void **ppval, const WOLFSSL_X509_ALGOR *algor)
11067
{
11068
    WOLFSSL_ENTER("wolfSSL_X509_ALGOR_get0");
11069
11070
    if (!algor) {
11071
        WOLFSSL_MSG("algor object is NULL");
11072
        return;
11073
    }
11074
11075
    if (paobj)
11076
        *paobj = algor->algorithm;
11077
    if (ppval && algor->parameter)
11078
        *ppval = algor->parameter->value.ptr;
11079
    if (pptype) {
11080
        if (algor->parameter) {
11081
            *pptype = algor->parameter->type;
11082
        }
11083
        else {
11084
            /* Default to WOLFSSL_V_ASN1_OBJECT */
11085
            *pptype = WOLFSSL_V_ASN1_OBJECT;
11086
        }
11087
    }
11088
}
11089
11090
/**
11091
 * Populate algor members.
11092
 *
11093
 * @param algor The object to be set
11094
 * @param aobj The value to be set in algor->algorithm
11095
 * @param ptype The type of algor->parameter
11096
 * @param pval The value of algor->parameter
11097
 * @return WOLFSSL_SUCCESS on success
11098
 *         WOLFSSL_FAILURE on missing parameters or bad malloc
11099
 */
11100
int wolfSSL_X509_ALGOR_set0(WOLFSSL_X509_ALGOR *algor,
11101
                            WOLFSSL_ASN1_OBJECT *aobj, int ptype, void *pval)
11102
{
11103
    if (!algor) {
11104
        return WOLFSSL_FAILURE;
11105
    }
11106
11107
    if (!algor->parameter) {
11108
        algor->parameter = wolfSSL_ASN1_TYPE_new();
11109
        if (!algor->parameter) {
11110
            return WOLFSSL_FAILURE;
11111
        }
11112
    }
11113
11114
    if (aobj) {
11115
        algor->algorithm = aobj;
11116
    }
11117
    wolfSSL_ASN1_TYPE_set(algor->parameter, ptype, pval);
11118
11119
    return WOLFSSL_SUCCESS;
11120
}
11121
11122
/**
11123
 * Serialize object to DER encoding
11124
 *
11125
 * @param alg Object to serialize
11126
 * @param pp  Output
11127
 * @return Length on success
11128
 *         Negative number on failure
11129
 */
11130
int wolfSSL_i2d_X509_ALGOR(const WOLFSSL_X509_ALGOR* alg,
11131
        unsigned char** pp)
11132
{
11133
    int len;
11134
    word32 oid = 0;
11135
    word32 idx = 0;
11136
    unsigned char* buf = NULL;
11137
11138
    if (alg == NULL || alg->algorithm == 0) {
11139
        WOLFSSL_MSG("alg is NULL or algorithm not set");
11140
        return WOLFSSL_FATAL_ERROR;
11141
    }
11142
11143
    if (GetObjectId(alg->algorithm->obj, &idx, &oid,
11144
            (word32)alg->algorithm->grp, alg->algorithm->objSz) < 0) {
11145
        WOLFSSL_MSG("Issue getting OID of object");
11146
        return WOLFSSL_FATAL_ERROR;
11147
    }
11148
11149
    len = (int)SetAlgoID((int)oid, NULL, alg->algorithm->grp, 0);
11150
    if (len == 0) {
11151
        WOLFSSL_MSG("SetAlgoID error");
11152
        return WOLFSSL_FATAL_ERROR;
11153
    }
11154
11155
    if (pp != NULL) {
11156
        if (*pp != NULL)
11157
            buf = *pp;
11158
        else {
11159
            buf = (byte*)XMALLOC((size_t)len, NULL, DYNAMIC_TYPE_ASN1);
11160
            if (buf == NULL)
11161
                return WOLFSSL_FATAL_ERROR;
11162
        }
11163
11164
        len = (int)SetAlgoID((int)oid, buf, alg->algorithm->grp, 0);
11165
        if (len == 0) {
11166
            WOLFSSL_MSG("SetAlgoID error");
11167
            if (*pp == NULL)
11168
                XFREE(buf, NULL, DYNAMIC_TYPE_ASN1);
11169
            return WOLFSSL_FATAL_ERROR;
11170
        }
11171
11172
        if (*pp != NULL)
11173
            *pp += len;
11174
        else
11175
            *pp = buf;
11176
    }
11177
11178
    return len;
11179
}
11180
11181
WOLFSSL_X509_ALGOR* wolfSSL_d2i_X509_ALGOR(WOLFSSL_X509_ALGOR** out,
11182
        const byte** src, long len)
11183
{
11184
    WOLFSSL_X509_ALGOR* ret = NULL;
11185
    word32 idx = 0;
11186
    word32 oid = 0;
11187
    int grp;
11188
11189
    WOLFSSL_ENTER("wolfSSL_d2i_X509_ALGOR");
11190
11191
    if (src == NULL || *src == NULL || len == 0)
11192
        return NULL;
11193
11194
    if (GetAlgoId(*src, &idx, &oid, oidIgnoreType, (word32)len) != 0)
11195
        return NULL;
11196
11197
    /* Try to guess the type */
11198
    for (grp = 0; grp < oidIgnoreType; grp++) {
11199
        word32 oidSz;
11200
        if (OidFromId(oid, (word32)grp, &oidSz) != NULL)
11201
            break;
11202
    }
11203
    if (grp == oidIgnoreType)
11204
        return NULL;
11205
11206
    ret = wolfSSL_X509_ALGOR_new();
11207
    if (ret == NULL)
11208
        return NULL;
11209
11210
    ret->algorithm = wolfSSL_OBJ_nid2obj(oid2nid(oid, grp));
11211
    if (ret->algorithm == NULL) {
11212
        wolfSSL_X509_ALGOR_free(ret);
11213
        return NULL;
11214
    }
11215
    *src += idx;
11216
11217
    if (out != NULL) {
11218
        if (*out != NULL)
11219
            wolfSSL_X509_ALGOR_free(*out);
11220
        *out = ret;
11221
    }
11222
11223
    return ret;
11224
}
11225
11226
/**
11227
 * Allocate a new WOLFSSL_X509_PUBKEY object.
11228
 *
11229
 * @return New zero'ed WOLFSSL_X509_PUBKEY object
11230
 */
11231
WOLFSSL_X509_PUBKEY *wolfSSL_X509_PUBKEY_new(void)
11232
{
11233
    WOLFSSL_X509_PUBKEY *ret;
11234
    ret = (WOLFSSL_X509_PUBKEY*)XMALLOC(sizeof(WOLFSSL_X509_PUBKEY), NULL,
11235
                                        DYNAMIC_TYPE_OPENSSL);
11236
    if (!ret) {
11237
        return NULL;
11238
    }
11239
    XMEMSET(ret, 0, sizeof(WOLFSSL_X509_PUBKEY));
11240
    ret->algor = wolfSSL_X509_ALGOR_new();
11241
    if (!ret->algor) {
11242
        wolfSSL_X509_PUBKEY_free(ret);
11243
        return NULL;
11244
    }
11245
    return ret;
11246
}
11247
11248
/**
11249
 * Free WOLFSSL_X509_PUBKEY and all its members.
11250
 *
11251
 * @param at Object to free
11252
 */
11253
void wolfSSL_X509_PUBKEY_free(WOLFSSL_X509_PUBKEY *x)
11254
{
11255
    if (x) {
11256
        if (x->algor) {
11257
            wolfSSL_X509_ALGOR_free(x->algor);
11258
        }
11259
        if (x->pkey) {
11260
            wolfSSL_EVP_PKEY_free(x->pkey);
11261
        }
11262
        XFREE(x, NULL, DYNAMIC_TYPE_OPENSSL);
11263
    }
11264
}
11265
11266
/* Returns X509_PUBKEY structure containing X509_ALGOR and EVP_PKEY */
11267
WOLFSSL_X509_PUBKEY* wolfSSL_X509_get_X509_PUBKEY(const WOLFSSL_X509* x509)
11268
{
11269
    WOLFSSL_ENTER("wolfSSL_X509_get_X509_PUBKEY");
11270
11271
    if (x509 == NULL) {
11272
        WOLFSSL_MSG("x509 struct NULL error");
11273
        return NULL;
11274
    }
11275
11276
    return (WOLFSSL_X509_PUBKEY*)&x509->key;
11277
}
11278
11279
/* Sets ppkalg pointer to X509_PUBKEY algorithm. Returns WOLFSSL_SUCCESS on
11280
    success or WOLFSSL_FAILURE on error. */
11281
int wolfSSL_X509_PUBKEY_get0_param(WOLFSSL_ASN1_OBJECT **ppkalg,
11282
     const unsigned char **pk, int *ppklen, WOLFSSL_X509_ALGOR **pa,
11283
     WOLFSSL_X509_PUBKEY *pub)
11284
{
11285
    WOLFSSL_ENTER("wolfSSL_X509_PUBKEY_get0_param");
11286
11287
    if (!pub || !pub->pubKeyOID) {
11288
        WOLFSSL_MSG("X509_PUBKEY struct not populated");
11289
        return WOLFSSL_FAILURE;
11290
    }
11291
11292
    if (!pub->algor) {
11293
        if (!(pub->algor = wolfSSL_X509_ALGOR_new())) {
11294
            return WOLFSSL_FAILURE;
11295
        }
11296
        pub->algor->algorithm = wolfSSL_OBJ_nid2obj(pub->pubKeyOID);
11297
        if (pub->algor->algorithm == NULL) {
11298
            WOLFSSL_MSG("Failed to create object from NID");
11299
            return WOLFSSL_FAILURE;
11300
        }
11301
    }
11302
11303
    if (pa)
11304
        *pa = pub->algor;
11305
    if (ppkalg)
11306
        *ppkalg = pub->algor->algorithm;
11307
    if (pk)
11308
        *pk = (unsigned char*)pub->pkey->pkey.ptr;
11309
    if (ppklen)
11310
        *ppklen = pub->pkey->pkey_sz;
11311
11312
    return WOLFSSL_SUCCESS;
11313
}
11314
11315
/* Returns a pointer to the pkey when passed a key */
11316
WOLFSSL_EVP_PKEY* wolfSSL_X509_PUBKEY_get(WOLFSSL_X509_PUBKEY* key)
11317
{
11318
    WOLFSSL_ENTER("wolfSSL_X509_PUBKEY_get");
11319
    if (key == NULL || key->pkey == NULL) {
11320
        WOLFSSL_LEAVE("wolfSSL_X509_PUBKEY_get", BAD_FUNC_ARG);
11321
        return NULL;
11322
    }
11323
    if (wolfSSL_EVP_PKEY_up_ref(key->pkey) != WOLFSSL_SUCCESS) {
11324
        WOLFSSL_LEAVE("wolfSSL_X509_PUBKEY_get", BAD_MUTEX_E);
11325
        return NULL;
11326
    }
11327
    WOLFSSL_LEAVE("wolfSSL_X509_PUBKEY_get", WOLFSSL_SUCCESS);
11328
    return key->pkey;
11329
}
11330
11331
int wolfSSL_X509_PUBKEY_set(WOLFSSL_X509_PUBKEY **x, WOLFSSL_EVP_PKEY *key)
11332
{
11333
    WOLFSSL_X509_PUBKEY *pk = NULL;
11334
    int ptype;
11335
    void *pval;
11336
#ifndef NO_DSA
11337
    WOLFSSL_ASN1_STRING *str;
11338
#endif
11339
#ifdef HAVE_ECC
11340
    int nid;
11341
    const WOLFSSL_EC_GROUP *group;
11342
#endif
11343
    WOLFSSL_ASN1_OBJECT *keyTypeObj;
11344
11345
    WOLFSSL_ENTER("wolfSSL_X509_PUBKEY_set");
11346
11347
    if (!x || !key) {
11348
        return WOLFSSL_FAILURE;
11349
    }
11350
11351
    if (!(pk = wolfSSL_X509_PUBKEY_new())) {
11352
        return WOLFSSL_FAILURE;
11353
    }
11354
11355
    switch (key->type) {
11356
#ifndef NO_RSA
11357
    case WC_EVP_PKEY_RSA:
11358
        pval = NULL;
11359
        ptype = WOLFSSL_V_ASN1_NULL;
11360
        pk->pubKeyOID = RSAk;
11361
        break;
11362
#endif
11363
#ifndef NO_DSA
11364
    case WC_EVP_PKEY_DSA:
11365
        if (!key->dsa->p || !key->dsa->q || !key->dsa->g)
11366
            goto error;
11367
11368
        str = wolfSSL_ASN1_STRING_new();
11369
        if (str == NULL)
11370
            goto error;
11371
11372
        str->length = wolfSSL_i2d_DSAparams(key->dsa,
11373
             (unsigned char **)&str->data);
11374
        if (str->length <= 0) {
11375
            wolfSSL_ASN1_STRING_free(str);
11376
            goto error;
11377
        }
11378
        str->isDynamic = 1;
11379
11380
        pval = str;
11381
        ptype = WOLFSSL_V_ASN1_SEQUENCE;
11382
        pk->pubKeyOID = DSAk;
11383
        break;
11384
#endif
11385
#ifdef HAVE_ECC
11386
    case WC_EVP_PKEY_EC:
11387
        group = wolfSSL_EC_KEY_get0_group(key->ecc);
11388
        if (!group)
11389
            goto error;
11390
11391
        nid = wolfSSL_EC_GROUP_get_curve_name(group);
11392
        if (nid <= 0) {
11393
            /* TODO: Add support for no nid case */
11394
            WOLFSSL_MSG("nid not found");
11395
            goto error;
11396
        }
11397
11398
        pval = wolfSSL_OBJ_nid2obj(nid);
11399
        if (!pval)
11400
            goto error;
11401
11402
        ptype = WOLFSSL_V_ASN1_OBJECT;
11403
        pk->pubKeyOID = ECDSAk;
11404
        break;
11405
#endif
11406
    default:
11407
        WOLFSSL_MSG("Unknown key type");
11408
        goto error;
11409
    }
11410
11411
    keyTypeObj = wolfSSL_OBJ_nid2obj(key->type);
11412
    if (keyTypeObj == NULL) {
11413
        if (ptype == WOLFSSL_V_ASN1_OBJECT)
11414
            wolfSSL_ASN1_OBJECT_free((WOLFSSL_ASN1_OBJECT *)pval);
11415
        else
11416
            wolfSSL_ASN1_STRING_free((WOLFSSL_ASN1_STRING *)pval);
11417
        goto error;
11418
    }
11419
    if (!wolfSSL_X509_ALGOR_set0(pk->algor, keyTypeObj, ptype, pval)) {
11420
        WOLFSSL_MSG("Failed to create algorithm object");
11421
        wolfSSL_ASN1_OBJECT_free(keyTypeObj);
11422
        if (ptype == WOLFSSL_V_ASN1_OBJECT)
11423
            wolfSSL_ASN1_OBJECT_free((WOLFSSL_ASN1_OBJECT *)pval);
11424
        else
11425
            wolfSSL_ASN1_STRING_free((WOLFSSL_ASN1_STRING *)pval);
11426
        goto error;
11427
    }
11428
11429
    if (!wolfSSL_EVP_PKEY_up_ref(key)) {
11430
        WOLFSSL_MSG("Failed to up key reference");
11431
        goto error;
11432
    }
11433
    pk->pkey = key;
11434
11435
    wolfSSL_X509_PUBKEY_free(*x);
11436
    *x = pk;
11437
    return WOLFSSL_SUCCESS;
11438
error:
11439
    if (pk) {
11440
        wolfSSL_X509_PUBKEY_free(pk);
11441
    }
11442
    return WOLFSSL_FAILURE;
11443
}
11444
11445
#endif /* OPENSSL_ALL || OPENSSL_EXTRA || WOLFSSL_APACHE_HTTPD ||
11446
        * WOLFSSL_HAPROXY || WOLFSSL_WPAS */
11447
11448
#if defined(OPENSSL_EXTRA) && !defined(NO_CERTS) && !defined(NO_ASN) && \
11449
    !defined(NO_PWDBASED)
11450
11451
int wolfSSL_i2d_X509_PUBKEY(WOLFSSL_X509_PUBKEY* x509_PubKey,
11452
    unsigned char** der)
11453
{
11454
    if (x509_PubKey == NULL)
11455
        return WOLFSSL_FATAL_ERROR;
11456
    return wolfSSL_i2d_PublicKey(x509_PubKey->pkey, der);
11457
}
11458
11459
#endif /* OPENSSL_EXTRA && !NO_CERTS && !NO_ASN && !NO_PWDBASED */
11460
11461
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
11462
11463
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
11464
WOLFSSL_BASIC_CONSTRAINTS* wolfSSL_BASIC_CONSTRAINTS_new(void)
11465
{
11466
    WOLFSSL_BASIC_CONSTRAINTS* bc;
11467
    bc = (WOLFSSL_BASIC_CONSTRAINTS*)
11468
          XMALLOC(sizeof(WOLFSSL_BASIC_CONSTRAINTS), NULL,
11469
          DYNAMIC_TYPE_X509_EXT);
11470
    if (bc == NULL) {
11471
        WOLFSSL_MSG("Failed to malloc basic constraints");
11472
        return NULL;
11473
    }
11474
    XMEMSET(bc, 0, sizeof(WOLFSSL_BASIC_CONSTRAINTS));
11475
    return bc;
11476
}
11477
11478
/* frees the wolfSSL_BASIC_CONSTRAINTS object */
11479
void wolfSSL_BASIC_CONSTRAINTS_free(WOLFSSL_BASIC_CONSTRAINTS *bc)
11480
{
11481
    WOLFSSL_ENTER("wolfSSL_BASIC_CONSTRAINTS_free");
11482
    if (bc == NULL) {
11483
        WOLFSSL_MSG("Argument is NULL");
11484
        return;
11485
    }
11486
    if (bc->pathlen) {
11487
        wolfSSL_ASN1_INTEGER_free(bc->pathlen);
11488
    }
11489
    XFREE(bc, NULL, DYNAMIC_TYPE_OPENSSL);
11490
}
11491
11492
WOLFSSL_AUTHORITY_KEYID* wolfSSL_AUTHORITY_KEYID_new(void)
11493
{
11494
    WOLFSSL_AUTHORITY_KEYID* akey = (WOLFSSL_AUTHORITY_KEYID*)XMALLOC(
11495
          sizeof(WOLFSSL_AUTHORITY_KEYID), NULL, DYNAMIC_TYPE_OPENSSL);
11496
    if (!akey) {
11497
        WOLFSSL_MSG("Issue creating WOLFSSL_AUTHORITY_KEYID struct");
11498
        return NULL;
11499
    }
11500
    XMEMSET(akey, 0, sizeof(WOLFSSL_AUTHORITY_KEYID));
11501
    return akey;
11502
}
11503
11504
/* frees the wolfSSL_AUTHORITY_KEYID object */
11505
void wolfSSL_AUTHORITY_KEYID_free(WOLFSSL_AUTHORITY_KEYID *id)
11506
{
11507
    WOLFSSL_ENTER("wolfSSL_AUTHORITY_KEYID_free");
11508
    if (id == NULL) {
11509
        WOLFSSL_MSG("Argument is NULL");
11510
        return;
11511
    }
11512
    if (id->keyid) {
11513
        wolfSSL_ASN1_STRING_free(id->keyid);
11514
    }
11515
    if (id->issuer) {
11516
        wolfSSL_ASN1_OBJECT_free(id->issuer);
11517
    }
11518
    if (id->serial) {
11519
        wolfSSL_ASN1_INTEGER_free(id->serial);
11520
    }
11521
    XFREE(id, NULL, DYNAMIC_TYPE_OPENSSL);
11522
}
11523
11524
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
11525
11526
#ifdef KEEP_PEER_CERT
11527
char*  wolfSSL_X509_get_subjectCN(WOLFSSL_X509* x509)
11528
{
11529
    if (x509 == NULL)
11530
        return NULL;
11531
11532
    return x509->subjectCN;
11533
}
11534
#endif /* KEEP_PEER_CERT */
11535
11536
#if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
11537
/* increments ref count of WOLFSSL_X509. Return 1 on success, 0 on error */
11538
int wolfSSL_X509_up_ref(WOLFSSL_X509* x509)
11539
{
11540
    if (x509) {
11541
        int ret;
11542
        wolfSSL_RefInc(&x509->ref, &ret);
11543
        if (ret != 0) {
11544
            WOLFSSL_MSG("Failed to lock x509 mutex");
11545
            return WOLFSSL_FAILURE;
11546
        }
11547
11548
        return WOLFSSL_SUCCESS;
11549
    }
11550
11551
    return WOLFSSL_FAILURE;
11552
}
11553
#endif /* OPENSSL_EXTRA_X509_SMALL || OPENSSL_EXTRA */
11554
11555
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
11556
WOLF_STACK_OF(WOLFSSL_X509)* wolfSSL_X509_chain_up_ref(
11557
        WOLF_STACK_OF(WOLFSSL_X509)* chain)
11558
{
11559
    /* wolfSSL_sk_dup takes care of doing a deep copy */
11560
    return wolfSSL_sk_dup(chain);
11561
}
11562
#endif
11563
11564
#if defined(OPENSSL_EXTRA)
11565
11566
WOLF_STACK_OF(WOLFSSL_X509_OBJECT)* wolfSSL_sk_X509_OBJECT_deep_copy(
11567
    const WOLF_STACK_OF(WOLFSSL_X509_OBJECT)* sk,
11568
    WOLFSSL_X509_OBJECT* (*c)(const WOLFSSL_X509_OBJECT*),
11569
    void (*f)(WOLFSSL_X509_OBJECT*))
11570
{
11571
    (void)f; /* free function */
11572
    (void)c; /* copy function */
11573
    return wolfSSL_sk_dup((WOLFSSL_STACK*)sk);
11574
}
11575
#endif
11576
11577
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
11578
    void wolfSSL_X509_NAME_free(WOLFSSL_X509_NAME *name)
11579
    {
11580
        WOLFSSL_ENTER("wolfSSL_X509_NAME_free");
11581
        FreeX509Name(name);
11582
        if (name != NULL) {
11583
            XFREE(name, name->heap, DYNAMIC_TYPE_X509);
11584
        }
11585
    }
11586
11587
11588
    /* Malloc's a new WOLFSSL_X509_NAME structure
11589
     *
11590
     * returns NULL on failure, otherwise returns a new structure.
11591
     */
11592
    WOLFSSL_X509_NAME* wolfSSL_X509_NAME_new_ex(void *heap)
11593
    {
11594
        WOLFSSL_X509_NAME* name;
11595
11596
        WOLFSSL_ENTER("wolfSSL_X509_NAME_new_ex");
11597
11598
        name = (WOLFSSL_X509_NAME*)XMALLOC(sizeof(WOLFSSL_X509_NAME), heap,
11599
                DYNAMIC_TYPE_X509);
11600
        if (name != NULL) {
11601
            InitX509Name(name, 1, heap);
11602
        }
11603
        return name;
11604
    }
11605
11606
    WOLFSSL_X509_NAME* wolfSSL_X509_NAME_new(void) {
11607
        return wolfSSL_X509_NAME_new_ex(NULL);
11608
    }
11609
11610
    /* Creates a duplicate of a WOLFSSL_X509_NAME structure.
11611
       Returns a new WOLFSSL_X509_NAME structure or NULL on failure */
11612
    WOLFSSL_X509_NAME* wolfSSL_X509_NAME_dup(const WOLFSSL_X509_NAME *name)
11613
    {
11614
        WOLFSSL_X509_NAME* copy = NULL;
11615
11616
        WOLFSSL_ENTER("wolfSSL_X509_NAME_dup");
11617
11618
        if (name == NULL) {
11619
            WOLFSSL_MSG("NULL parameter");
11620
            return NULL;
11621
        }
11622
11623
        if (!(copy = wolfSSL_X509_NAME_new_ex(name->heap))) {
11624
            return NULL;
11625
        }
11626
11627
        /* copy contents */
11628
        InitX509Name(copy, 1, name->heap);
11629
        if (wolfSSL_X509_NAME_copy(name, copy) != WOLFSSL_SUCCESS) {
11630
            wolfSSL_X509_NAME_free(copy);
11631
            return NULL;
11632
        }
11633
11634
        return copy;
11635
    }
11636
11637
#ifdef WOLFSSL_CERT_GEN
11638
11639
#if defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_EXT) || \
11640
    defined(OPENSSL_EXTRA)
11641
    /* Helper function to copy cert name from a WOLFSSL_X509_NAME structure to
11642
    * a Cert structure.
11643
    *
11644
    * returns length of DER on success and a negative error value on failure
11645
    */
11646
    static int CopyX509NameToCert(WOLFSSL_X509_NAME* n, byte* out)
11647
    {
11648
        unsigned char* der = NULL;
11649
        int length = WC_NO_ERR_TRACE(BAD_FUNC_ARG), ret;
11650
        word32 idx = 0;
11651
11652
        ret = wolfSSL_i2d_X509_NAME(n, &der);
11653
        if (ret > (int)sizeof(CertName) || ret < 0) {
11654
            WOLFSSL_MSG("Name conversion error");
11655
            ret = MEMORY_E;
11656
        }
11657
11658
        if (ret > 0) {
11659
            /* strip off sequence, this gets added on certificate creation */
11660
            ret = GetSequence(der, &idx, &length, (word32)ret);
11661
        }
11662
11663
        if (ret > 0) {
11664
            XMEMCPY(out, der + idx, length);
11665
        }
11666
11667
        XFREE(der, NULL, DYNAMIC_TYPE_OPENSSL);
11668
11669
        return length;
11670
    }
11671
#endif
11672
11673
#ifdef WOLFSSL_CERT_REQ
11674
    static int ReqCertFromX509(Cert* cert, WOLFSSL_X509* req)
11675
    {
11676
        int ret;
11677
11678
        if (wc_InitCert(cert) != 0)
11679
            return WOLFSSL_FAILURE;
11680
11681
11682
        ret = CopyX509NameToCert(&req->subject, cert->sbjRaw);
11683
        if (ret < 0) {
11684
            WOLFSSL_MSG("REQ subject conversion error");
11685
            ret = MEMORY_E;
11686
        }
11687
        else {
11688
            ret = WOLFSSL_SUCCESS;
11689
        }
11690
11691
        if (ret == WOLFSSL_SUCCESS) {
11692
        #if defined(OPENSSL_ALL)
11693
            int idx;
11694
        #endif
11695
11696
            cert->version = req->version;
11697
            cert->isCA = req->isCa;
11698
            cert->basicConstSet = req->basicConstSet;
11699
    #ifdef WOLFSSL_CERT_EXT
11700
            if (req->subjKeyIdSz != 0) {
11701
                XMEMCPY(cert->skid, req->subjKeyId, req->subjKeyIdSz);
11702
                cert->skidSz = (int)req->subjKeyIdSz;
11703
            }
11704
            if (req->keyUsageSet)
11705
                cert->keyUsage = req->keyUsage;
11706
11707
            cert->extKeyUsage = req->extKeyUsage;
11708
    #endif
11709
11710
            XMEMCPY(cert->challengePw, req->challengePw, CTC_NAME_SIZE);
11711
            cert->challengePwPrintableString = req->challengePw[0] != 0;
11712
11713
        #if defined(OPENSSL_ALL)
11714
            idx = wolfSSL_X509_REQ_get_attr_by_NID(req,
11715
                    WC_NID_pkcs9_unstructuredName, -1);
11716
            if (idx != WC_NO_ERR_TRACE(WOLFSSL_FATAL_ERROR)) {
11717
                WOLFSSL_X509_ATTRIBUTE *attr;
11718
                attr = wolfSSL_X509_REQ_get_attr(req, idx);
11719
                if (attr != NULL) {
11720
                    const unsigned char *attrData;
11721
                    int attrDataSz;
11722
11723
                    attrData = wolfSSL_ASN1_STRING_get0_data(
11724
                            attr->value->value.asn1_string);
11725
                    attrDataSz = wolfSSL_ASN1_STRING_length(
11726
                            attr->value->value.asn1_string);
11727
11728
                    /* +1 to make sure is terminated string */
11729
                    if (attrDataSz + 1 > CTC_NAME_SIZE) {
11730
                        WOLFSSL_MSG("attribute size was too large to copy");
11731
                        ret = REQ_ATTRIBUTE_E;
11732
                    }
11733
                    else {
11734
                        XMEMCPY(cert->unstructuredName, attrData, attrDataSz);
11735
                        cert->unstructuredName[attrDataSz] = '\0';
11736
                    }
11737
                }
11738
            }
11739
11740
        #ifdef WOLFSSL_CUSTOM_OID
11741
            if (ret == WOLFSSL_SUCCESS) {
11742
                if ((req->customExtCount < 0) ||
11743
                    (req->customExtCount >= NUM_CUSTOM_EXT)) {
11744
                    WOLFSSL_MSG("Bad value for customExtCount.");
11745
                    ret = WOLFSSL_FAILURE;
11746
                }
11747
11748
                if (ret == WOLFSSL_SUCCESS) {
11749
                    for (idx = 0; idx < req->customExtCount; idx++) {
11750
                        /* Note that ownership is NOT transferred.
11751
                         * req->custom_exts buffers still need to be cleaned
11752
                         * up. */
11753
                        cert->customCertExt[idx] = req->custom_exts[idx];
11754
                    }
11755
                    cert->customCertExtCount = req->customExtCount;
11756
                }
11757
            }
11758
        #endif /* WOLFSSL_CUSTOM_OID */
11759
        #endif /* OPENSSL_ALL */
11760
11761
    #ifdef WOLFSSL_ALT_NAMES
11762
            if (ret == WOLFSSL_SUCCESS) {
11763
                cert->altNamesSz = FlattenAltNames(cert->altNames,
11764
                        sizeof(cert->altNames), req->altNames);
11765
            }
11766
    #endif /* WOLFSSL_ALT_NAMES */
11767
        }
11768
11769
        return ret;
11770
    }
11771
#endif /* WOLFSSL_CERT_REQ */
11772
11773
/* converts WOLFSSL_AN1_TIME to Cert form, returns positive size on
11774
 * success */
11775
static int CertDateFromX509(byte* out, int outSz, WOLFSSL_ASN1_TIME* t)
11776
{
11777
    int sz, i;
11778
11779
    if (t->length + 1 >= outSz) {
11780
        return BUFFER_E;
11781
    }
11782
11783
    out[0] = (byte) t->type;
11784
    sz = (int)SetLength((word32)t->length, out + 1) + 1;  /* gen tag */
11785
    for (i = 0; i < t->length; i++) {
11786
        out[sz + i] = t->data[i];
11787
    }
11788
    return t->length + sz;
11789
}
11790
11791
/* convert a WOLFSSL_X509 to a Cert structure for writing out */
11792
static int CertFromX509(Cert* cert, WOLFSSL_X509* x509)
11793
{
11794
    int ret;
11795
#ifdef WOLFSSL_CERT_EXT
11796
    int i;
11797
#endif
11798
11799
    WOLFSSL_ENTER("wolfSSL_X509_to_Cert");
11800
11801
    if (x509 == NULL || cert == NULL) {
11802
        return BAD_FUNC_ARG;
11803
    }
11804
11805
    wc_InitCert(cert);
11806
11807
    cert->version = (int)wolfSSL_X509_get_version(x509);
11808
11809
    if (x509->notBefore.length > 0) {
11810
        cert->beforeDateSz = CertDateFromX509(cert->beforeDate,
11811
                    CTC_DATE_SIZE, &x509->notBefore);
11812
        if (cert->beforeDateSz <= 0) {
11813
            WOLFSSL_MSG("Error converting WOLFSSL_X509 not before date");
11814
            return WOLFSSL_FAILURE;
11815
        }
11816
    }
11817
    else {
11818
        cert->beforeDateSz = 0;
11819
    }
11820
11821
    if (x509->notAfter.length > 0) {
11822
        cert->afterDateSz = CertDateFromX509(cert->afterDate,
11823
                    CTC_DATE_SIZE, &x509->notAfter);
11824
        if (cert->afterDateSz <= 0) {
11825
            WOLFSSL_MSG("Error converting WOLFSSL_X509 not after date");
11826
            return WOLFSSL_FAILURE;
11827
        }
11828
    }
11829
    else {
11830
        cert->afterDateSz = 0;
11831
    }
11832
11833
#ifdef WOLFSSL_ALT_NAMES
11834
    cert->altNamesSz = FlattenAltNames(cert->altNames,
11835
            sizeof(cert->altNames), x509->altNames);
11836
#endif /* WOLFSSL_ALT_NAMES */
11837
11838
    cert->sigType = wolfSSL_X509_get_signature_type(x509);
11839
    cert->keyType = x509->pubKeyOID;
11840
    cert->isCA    = wolfSSL_X509_get_isCA(x509);
11841
    cert->basicConstCrit = x509->basicConstCrit;
11842
    cert->basicConstSet = x509->basicConstSet;
11843
    cert->pathLen = (byte)x509->pathLength;
11844
    cert->pathLenSet = x509->pathLengthSet;
11845
11846
#ifdef WOLFSSL_CERT_EXT
11847
    if (x509->subjKeyIdSz <= CTC_MAX_SKID_SIZE) {
11848
        if (x509->subjKeyId) {
11849
            XMEMCPY(cert->skid, x509->subjKeyId, x509->subjKeyIdSz);
11850
        }
11851
        cert->skidSz = (int)x509->subjKeyIdSz;
11852
    }
11853
    else {
11854
        WOLFSSL_MSG("Subject Key ID too large");
11855
        WOLFSSL_ERROR_VERBOSE(BUFFER_E);
11856
        return WOLFSSL_FAILURE;
11857
    }
11858
11859
    if (x509->authKeyIdSz < sizeof(cert->akid)) {
11860
    #ifdef WOLFSSL_AKID_NAME
11861
        cert->rawAkid = 0;
11862
        if (x509->authKeyIdSrc) {
11863
            XMEMCPY(cert->akid, x509->authKeyIdSrc, x509->authKeyIdSrcSz);
11864
            cert->akidSz = (int)x509->authKeyIdSrcSz;
11865
            cert->rawAkid = 1;
11866
        }
11867
        else
11868
    #endif
11869
        if (x509->authKeyId) {
11870
            XMEMCPY(cert->akid, x509->authKeyId, x509->authKeyIdSz);
11871
            cert->akidSz = (int)x509->authKeyIdSz;
11872
        }
11873
    }
11874
    else {
11875
        WOLFSSL_MSG("Auth Key ID too large");
11876
        WOLFSSL_ERROR_VERBOSE(BUFFER_E);
11877
        return WOLFSSL_FAILURE;
11878
    }
11879
11880
    for (i = 0; i < x509->certPoliciesNb; i++) {
11881
        /* copy the smaller of MAX macros, by default they are currently equal*/
11882
        if ((int)CTC_MAX_CERTPOL_SZ <= (int)MAX_CERTPOL_SZ) {
11883
            XMEMCPY(cert->certPolicies[i], x509->certPolicies[i],
11884
                    CTC_MAX_CERTPOL_SZ);
11885
        }
11886
        else {
11887
            XMEMCPY(cert->certPolicies[i], x509->certPolicies[i],
11888
                    MAX_CERTPOL_SZ);
11889
        }
11890
    }
11891
    cert->certPoliciesNb = (word16)x509->certPoliciesNb;
11892
11893
    cert->keyUsage = x509->keyUsage;
11894
    cert->extKeyUsage = x509->extKeyUsage;
11895
    cert->nsCertType = x509->nsCertType;
11896
11897
    if (x509->rawCRLInfo != NULL) {
11898
        if (x509->rawCRLInfoSz > CTC_MAX_CRLINFO_SZ) {
11899
            WOLFSSL_MSG("CRL Info too large");
11900
            WOLFSSL_ERROR_VERBOSE(BUFFER_E);
11901
            return WOLFSSL_FAILURE;
11902
        }
11903
        XMEMCPY(cert->crlInfo, x509->rawCRLInfo, x509->rawCRLInfoSz);
11904
        cert->crlInfoSz = x509->rawCRLInfoSz;
11905
    }
11906
11907
#ifdef WOLFSSL_DUAL_ALG_CERTS
11908
    /* We point to instance in x509 so DON'T need to be free'd. */
11909
    cert->sapkiDer = x509->sapkiDer;
11910
    cert->sapkiLen = x509->sapkiLen;
11911
    cert->sapkiCrit = x509->sapkiCrit;
11912
    cert->altSigAlgDer = x509->altSigAlgDer;
11913
    cert->altSigAlgLen  = x509->altSigAlgLen;
11914
    cert->altSigAlgCrit = x509->altSigAlgCrit;
11915
    cert->altSigValDer = x509->altSigValDer;
11916
    cert->altSigValLen = x509->altSigValLen;
11917
    cert->altSigValCrit = x509->altSigValCrit;
11918
#endif /* WOLFSSL_DUAL_ALG_CERTS */
11919
11920
#if defined(WOLFSSL_ASN_TEMPLATE) && defined(WOLFSSL_CUSTOM_OID) && \
11921
    defined(HAVE_OID_ENCODING)
11922
11923
    if ((x509->customExtCount < 0) ||
11924
            (x509->customExtCount >= NUM_CUSTOM_EXT)) {
11925
        WOLFSSL_MSG("Bad value for customExtCount.");
11926
        return WOLFSSL_FAILURE;
11927
    }
11928
11929
    for (i = 0; i < x509->customExtCount; i++) {
11930
        if (wc_SetCustomExtension(cert, x509->custom_exts[i].crit,
11931
                x509->custom_exts[i].oid, x509->custom_exts[i].val,
11932
                x509->custom_exts[i].valSz))
11933
        {
11934
            return WOLFSSL_FAILURE;
11935
        }
11936
    }
11937
#endif /* WOLFSSL_ASN_TEMPLATE && WOLFSSL_CUSTOM_OID && HAVE_OID_ENCODING */
11938
11939
#endif /* WOLFSSL_CERT_EXT */
11940
11941
#ifdef WOLFSSL_CERT_REQ
11942
    /* copy over challenge password for REQ certs */
11943
    XMEMCPY(cert->challengePw, x509->challengePw, CTC_NAME_SIZE);
11944
#endif
11945
11946
    /* Only makes sense to do this for OPENSSL_EXTRA because without
11947
     * this define the function will error out below */
11948
    #ifdef OPENSSL_EXTRA
11949
    if (x509->serialSz == 0 && x509->serialNumber != NULL &&
11950
            /* Check if the buffer contains more than just the
11951
             * ASN tag and length */
11952
            x509->serialNumber->length > 2) {
11953
        if (wolfSSL_X509_set_serialNumber(x509, x509->serialNumber)
11954
                != WOLFSSL_SUCCESS) {
11955
            WOLFSSL_MSG("Failed to set serial number");
11956
            return WOLFSSL_FAILURE;
11957
        }
11958
    }
11959
    #endif
11960
11961
    /* set serial number */
11962
    if (x509->serialSz > 0) {
11963
    #if defined(OPENSSL_EXTRA)
11964
        byte serial[EXTERNAL_SERIAL_SIZE];
11965
        int  serialSz = EXTERNAL_SERIAL_SIZE;
11966
11967
        ret = wolfSSL_X509_get_serial_number(x509, serial, &serialSz);
11968
        if (ret != WOLFSSL_SUCCESS) {
11969
            WOLFSSL_MSG("Serial size error");
11970
            return WOLFSSL_FAILURE;
11971
        }
11972
11973
        if (serialSz > EXTERNAL_SERIAL_SIZE ||
11974
                serialSz > CTC_SERIAL_SIZE) {
11975
            WOLFSSL_MSG("Serial size too large error");
11976
            WOLFSSL_ERROR_VERBOSE(BUFFER_E);
11977
            return WOLFSSL_FAILURE;
11978
        }
11979
        XMEMCPY(cert->serial, serial, serialSz);
11980
        cert->serialSz = serialSz;
11981
    #else
11982
        WOLFSSL_MSG("Getting X509 serial number not supported");
11983
        return WOLFSSL_FAILURE;
11984
    #endif
11985
    }
11986
11987
    /* copy over Name structures */
11988
    if (x509->issuerSet)
11989
        cert->selfSigned = 0;
11990
11991
#if defined(WOLFSSL_CERT_EXT) || defined(OPENSSL_EXTRA)
11992
    ret = CopyX509NameToCert(&x509->subject, cert->sbjRaw);
11993
    if (ret < 0) {
11994
        WOLFSSL_MSG("Subject conversion error");
11995
        return MEMORY_E;
11996
    }
11997
    if (cert->selfSigned) {
11998
        XMEMCPY(cert->issRaw, cert->sbjRaw, sizeof(CertName));
11999
    }
12000
    else {
12001
        ret = CopyX509NameToCert(&x509->issuer, cert->issRaw);
12002
        if (ret < 0) {
12003
            WOLFSSL_MSG("Issuer conversion error");
12004
            return MEMORY_E;
12005
        }
12006
    }
12007
#endif
12008
12009
    cert->heap = x509->heap;
12010
12011
    (void)ret;
12012
    return WOLFSSL_SUCCESS;
12013
}
12014
12015
12016
    /* returns the sig type to use on success i.e CTC_SHAwRSA and WOLFSSL_FALURE
12017
     * on fail case */
12018
    static int wolfSSL_sigTypeFromPKEY(WOLFSSL_EVP_MD* md,
12019
            WOLFSSL_EVP_PKEY* pkey)
12020
    {
12021
    #if !defined(NO_PWDBASED) && defined(OPENSSL_EXTRA)
12022
        int hashType;
12023
        int sigType = WOLFSSL_FAILURE;
12024
12025
        /* Convert key type and hash algorithm to a signature algorithm */
12026
        if (wolfSSL_EVP_get_hashinfo(md, &hashType, NULL)
12027
            == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
12028
        {
12029
            return WOLFSSL_FAILURE;
12030
        }
12031
12032
        if (pkey->type == WC_EVP_PKEY_RSA) {
12033
            switch (hashType) {
12034
                case WC_HASH_TYPE_SHA:
12035
                    sigType = CTC_SHAwRSA;
12036
                    break;
12037
                case WC_HASH_TYPE_SHA224:
12038
                    sigType = CTC_SHA224wRSA;
12039
                    break;
12040
                case WC_HASH_TYPE_SHA256:
12041
                    sigType = CTC_SHA256wRSA;
12042
                    break;
12043
                case WC_HASH_TYPE_SHA384:
12044
                    sigType = CTC_SHA384wRSA;
12045
                    break;
12046
                case WC_HASH_TYPE_SHA512:
12047
                    sigType = CTC_SHA512wRSA;
12048
                    break;
12049
            #ifdef WOLFSSL_SHA3
12050
                case WC_HASH_TYPE_SHA3_224:
12051
                    sigType = CTC_SHA3_224wRSA;
12052
                    break;
12053
                case WC_HASH_TYPE_SHA3_256:
12054
                    sigType = CTC_SHA3_256wRSA;
12055
                    break;
12056
                case WC_HASH_TYPE_SHA3_384:
12057
                    sigType = CTC_SHA3_384wRSA;
12058
                    break;
12059
                case WC_HASH_TYPE_SHA3_512:
12060
                    sigType = CTC_SHA3_512wRSA;
12061
                    break;
12062
            #endif
12063
                default:
12064
                    return WOLFSSL_FAILURE;
12065
            }
12066
        }
12067
        else if (pkey->type == WC_EVP_PKEY_EC) {
12068
            switch (hashType) {
12069
                case WC_HASH_TYPE_SHA:
12070
                    sigType = CTC_SHAwECDSA;
12071
                    break;
12072
                case WC_HASH_TYPE_SHA224:
12073
                    sigType = CTC_SHA224wECDSA;
12074
                    break;
12075
                case WC_HASH_TYPE_SHA256:
12076
                    sigType = CTC_SHA256wECDSA;
12077
                    break;
12078
                case WC_HASH_TYPE_SHA384:
12079
                    sigType = CTC_SHA384wECDSA;
12080
                    break;
12081
                case WC_HASH_TYPE_SHA512:
12082
                    sigType = CTC_SHA512wECDSA;
12083
                    break;
12084
            #ifdef WOLFSSL_SHA3
12085
                case WC_HASH_TYPE_SHA3_224:
12086
                    sigType = CTC_SHA3_224wECDSA;
12087
                    break;
12088
                case WC_HASH_TYPE_SHA3_256:
12089
                    sigType = CTC_SHA3_256wECDSA;
12090
                    break;
12091
                case WC_HASH_TYPE_SHA3_384:
12092
                    sigType = CTC_SHA3_384wECDSA;
12093
                    break;
12094
                case WC_HASH_TYPE_SHA3_512:
12095
                    sigType = CTC_SHA3_512wECDSA;
12096
                    break;
12097
            #endif
12098
                default:
12099
                    return WOLFSSL_FAILURE;
12100
            }
12101
        }
12102
        else
12103
            return WOLFSSL_FAILURE;
12104
        return sigType;
12105
#else
12106
        (void)md;
12107
        (void)pkey;
12108
        WOLFSSL_MSG("Cannot get hashinfo when NO_PWDBASED is defined");
12109
        return WOLFSSL_FAILURE;
12110
#endif /* !NO_PWDBASED && OPENSSL_EXTRA */
12111
    }
12112
12113
12114
    /* generates DER buffer from WOLFSSL_X509
12115
     * If req == 1 then creates a request DER buffer
12116
     *
12117
     * updates derSz with certificate body size on success
12118
     * return WOLFSSL_SUCCESS on success
12119
     */
12120
    static int wolfssl_x509_make_der(WOLFSSL_X509* x509, int req,
12121
            unsigned char* der, int* derSz, int includeSig)
12122
    {
12123
        int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
12124
        int totalLen;
12125
        Cert* cert = NULL;
12126
        void* key = NULL;
12127
        int type = -1;
12128
    #ifndef NO_RSA
12129
        RsaKey* rsa = NULL;
12130
    #endif
12131
    #ifdef HAVE_ECC
12132
        ecc_key* ecc = NULL;
12133
    #endif
12134
    #ifndef NO_DSA
12135
        DsaKey* dsa = NULL;
12136
    #endif
12137
    #if defined(HAVE_FALCON)
12138
        falcon_key* falcon = NULL;
12139
    #endif
12140
    #if defined(HAVE_DILITHIUM)
12141
        dilithium_key* dilithium = NULL;
12142
    #endif
12143
    #if defined(HAVE_SPHINCS)
12144
        sphincs_key* sphincs = NULL;
12145
    #endif
12146
        WC_RNG rng;
12147
        word32 idx = 0;
12148
12149
        if (x509 == NULL || der == NULL || derSz == NULL)
12150
            return BAD_FUNC_ARG;
12151
12152
    #ifndef WOLFSSL_CERT_REQ
12153
        if (req) {
12154
            WOLFSSL_MSG("WOLFSSL_CERT_REQ needed for certificate request");
12155
            return WOLFSSL_FAILURE;
12156
        }
12157
    #endif
12158
12159
        /* allocate Cert struct on heap since it is large */
12160
        cert = (Cert*)XMALLOC(sizeof(Cert), NULL, DYNAMIC_TYPE_CERT);
12161
        if (cert == NULL) {
12162
            WOLFSSL_MSG("Failed to allocate memory for Cert struct");
12163
            return WOLFSSL_FAILURE;
12164
        }
12165
        XMEMSET(cert, 0, sizeof(Cert));
12166
12167
    #ifdef WOLFSSL_CERT_REQ
12168
        if (req) {
12169
            if (ReqCertFromX509(cert, x509) != WOLFSSL_SUCCESS) {
12170
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12171
                return WOLFSSL_FAILURE;
12172
            }
12173
        }
12174
        else
12175
    #endif
12176
        {
12177
            /* Create a Cert that has the certificate fields. */
12178
            if (CertFromX509(cert, x509) != WOLFSSL_SUCCESS) {
12179
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12180
                return WOLFSSL_FAILURE;
12181
            }
12182
        }
12183
12184
        /* Create a public key object from requests public key. */
12185
    #ifndef NO_RSA
12186
        if (x509->pubKeyOID == RSAk) {
12187
12188
            rsa = (RsaKey*)XMALLOC(sizeof(RsaKey), NULL, DYNAMIC_TYPE_RSA);
12189
            if (rsa == NULL) {
12190
                WOLFSSL_MSG("Failed to allocate memory for RsaKey");
12191
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12192
                return WOLFSSL_FAILURE;
12193
            }
12194
12195
            type = RSA_TYPE;
12196
            ret = wc_InitRsaKey(rsa, x509->heap);
12197
            if (ret != 0) {
12198
                XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
12199
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12200
                return ret;
12201
            }
12202
            ret = wc_RsaPublicKeyDecode(x509->pubKey.buffer, &idx, rsa,
12203
                                                           x509->pubKey.length);
12204
            if (ret != 0) {
12205
                WOLFSSL_ERROR_VERBOSE(ret);
12206
                wc_FreeRsaKey(rsa);
12207
                XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
12208
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12209
                return ret;
12210
            }
12211
            key = (void*)rsa;
12212
        }
12213
    #endif
12214
    #ifdef HAVE_ECC
12215
        if (x509->pubKeyOID == ECDSAk) {
12216
12217
            ecc = (ecc_key*)XMALLOC(sizeof(ecc_key), NULL, DYNAMIC_TYPE_ECC);
12218
            if (ecc == NULL) {
12219
                WOLFSSL_MSG("Failed to allocate memory for ecc_key");
12220
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12221
                return WOLFSSL_FAILURE;
12222
            }
12223
12224
            type = ECC_TYPE;
12225
            ret = wc_ecc_init(ecc);
12226
            if (ret != 0) {
12227
                XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
12228
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12229
                return ret;
12230
            }
12231
            ret = wc_EccPublicKeyDecode(x509->pubKey.buffer, &idx, ecc,
12232
                                                           x509->pubKey.length);
12233
            if (ret != 0) {
12234
                WOLFSSL_ERROR_VERBOSE(ret);
12235
                wc_ecc_free(ecc);
12236
                XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
12237
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12238
                return ret;
12239
            }
12240
            key = (void*)ecc;
12241
        }
12242
    #endif
12243
    #ifndef NO_DSA
12244
        if (x509->pubKeyOID == DSAk) {
12245
12246
            dsa = (DsaKey*)XMALLOC(sizeof(DsaKey), NULL, DYNAMIC_TYPE_DSA);
12247
            if (dsa == NULL) {
12248
                WOLFSSL_MSG("Failed to allocate memory for DsaKey");
12249
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12250
                return WOLFSSL_FAILURE;
12251
            }
12252
12253
            type = DSA_TYPE;
12254
            ret = wc_InitDsaKey(dsa);
12255
            if (ret != 0) {
12256
                XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
12257
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12258
                return ret;
12259
            }
12260
            ret = wc_DsaPublicKeyDecode(x509->pubKey.buffer, &idx, dsa,
12261
                                                           x509->pubKey.length);
12262
            if (ret != 0) {
12263
                WOLFSSL_ERROR_VERBOSE(ret);
12264
                wc_FreeDsaKey(dsa);
12265
                XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
12266
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12267
                return ret;
12268
            }
12269
            key = (void*)dsa;
12270
        }
12271
    #endif
12272
    #if defined(HAVE_FALCON)
12273
        if ((x509->pubKeyOID == FALCON_LEVEL1k) ||
12274
            (x509->pubKeyOID == FALCON_LEVEL5k)) {
12275
            falcon = (falcon_key*)XMALLOC(sizeof(falcon_key), NULL,
12276
                                          DYNAMIC_TYPE_FALCON);
12277
            if (falcon == NULL) {
12278
                WOLFSSL_MSG("Failed to allocate memory for falcon_key");
12279
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12280
                return WOLFSSL_FAILURE;
12281
            }
12282
12283
            ret = wc_falcon_init(falcon);
12284
            if (ret != 0) {
12285
                XFREE(falcon, NULL, DYNAMIC_TYPE_FALCON);
12286
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12287
                return ret;
12288
            }
12289
12290
            if (x509->pubKeyOID == FALCON_LEVEL1k) {
12291
                type = FALCON_LEVEL1_TYPE;
12292
                wc_falcon_set_level(falcon, 1);
12293
            }
12294
            else if (x509->pubKeyOID == FALCON_LEVEL5k) {
12295
                type = FALCON_LEVEL5_TYPE;
12296
                wc_falcon_set_level(falcon, 5);
12297
            }
12298
12299
            ret = wc_Falcon_PublicKeyDecode(x509->pubKey.buffer, &idx, falcon,
12300
                                            x509->pubKey.length);
12301
            if (ret != 0) {
12302
                WOLFSSL_ERROR_VERBOSE(ret);
12303
                wc_falcon_free(falcon);
12304
                XFREE(falcon, NULL, DYNAMIC_TYPE_FALCON);
12305
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12306
                return ret;
12307
            }
12308
            key = (void*)falcon;
12309
        }
12310
    #endif
12311
    #if defined(HAVE_DILITHIUM)
12312
        if ((x509->pubKeyOID == ML_DSA_LEVEL2k) ||
12313
            (x509->pubKeyOID == ML_DSA_LEVEL3k) ||
12314
            (x509->pubKeyOID == ML_DSA_LEVEL5k)
12315
            #ifdef WOLFSSL_DILITHIUM_FIPS204_DRAFT
12316
         || (x509->pubKeyOID == DILITHIUM_LEVEL2k)
12317
         || (x509->pubKeyOID == DILITHIUM_LEVEL3k)
12318
         || (x509->pubKeyOID == DILITHIUM_LEVEL5k)
12319
            #endif /* WOLFSSL_DILITHIUM_FIPS204_DRAFT */
12320
            ) {
12321
            dilithium = (dilithium_key*)XMALLOC(sizeof(dilithium_key), NULL,
12322
                                          DYNAMIC_TYPE_DILITHIUM);
12323
            if (dilithium == NULL) {
12324
                WOLFSSL_MSG("Failed to allocate memory for dilithium_key");
12325
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12326
                return WOLFSSL_FAILURE;
12327
            }
12328
12329
            ret = wc_dilithium_init(dilithium);
12330
            if (ret != 0) {
12331
                XFREE(dilithium, NULL, DYNAMIC_TYPE_DILITHIUM);
12332
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12333
                return ret;
12334
            }
12335
12336
            if (x509->pubKeyOID == ML_DSA_LEVEL2k) {
12337
                type = ML_DSA_LEVEL2_TYPE;
12338
                wc_dilithium_set_level(dilithium, WC_ML_DSA_44);
12339
            }
12340
            else if (x509->pubKeyOID == ML_DSA_LEVEL3k) {
12341
                type = ML_DSA_LEVEL3_TYPE;
12342
                wc_dilithium_set_level(dilithium, WC_ML_DSA_65);
12343
            }
12344
            else if (x509->pubKeyOID == ML_DSA_LEVEL5k) {
12345
                type = ML_DSA_LEVEL5_TYPE;
12346
                wc_dilithium_set_level(dilithium, WC_ML_DSA_87);
12347
            }
12348
            #ifdef WOLFSSL_DILITHIUM_FIPS204_DRAFT
12349
            else if (x509->pubKeyOID == DILITHIUM_LEVEL2k) {
12350
                type = DILITHIUM_LEVEL2_TYPE;
12351
                wc_dilithium_set_level(dilithium, WC_ML_DSA_44_DRAFT);
12352
            }
12353
            else if (x509->pubKeyOID == DILITHIUM_LEVEL3k) {
12354
                type = DILITHIUM_LEVEL3_TYPE;
12355
                wc_dilithium_set_level(dilithium, WC_ML_DSA_65_DRAFT);
12356
            }
12357
            else if (x509->pubKeyOID == DILITHIUM_LEVEL5k) {
12358
                type = DILITHIUM_LEVEL5_TYPE;
12359
                wc_dilithium_set_level(dilithium, WC_ML_DSA_87_DRAFT);
12360
            }
12361
            #endif /* WOLFSSL_DILITHIUM_FIPS204_DRAFT */
12362
12363
            ret = wc_Dilithium_PublicKeyDecode(x509->pubKey.buffer, &idx,
12364
                                    dilithium, x509->pubKey.length);
12365
            if (ret != 0) {
12366
                WOLFSSL_ERROR_VERBOSE(ret);
12367
                wc_dilithium_free(dilithium);
12368
                XFREE(dilithium, NULL, DYNAMIC_TYPE_DILITHIUM);
12369
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12370
                return ret;
12371
            }
12372
            key = (void*)dilithium;
12373
        }
12374
    #endif
12375
    #if defined(HAVE_SPHINCS)
12376
        if ((x509->pubKeyOID == SPHINCS_FAST_LEVEL1k) ||
12377
            (x509->pubKeyOID == SPHINCS_FAST_LEVEL3k) ||
12378
            (x509->pubKeyOID == SPHINCS_FAST_LEVEL5k) ||
12379
            (x509->pubKeyOID == SPHINCS_SMALL_LEVEL1k) ||
12380
            (x509->pubKeyOID == SPHINCS_SMALL_LEVEL3k) ||
12381
            (x509->pubKeyOID == SPHINCS_SMALL_LEVEL5k)) {
12382
            sphincs = (sphincs_key*)XMALLOC(sizeof(sphincs_key), NULL,
12383
                                          DYNAMIC_TYPE_SPHINCS);
12384
            if (sphincs == NULL) {
12385
                WOLFSSL_MSG("Failed to allocate memory for sphincs_key");
12386
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12387
                return WOLFSSL_FAILURE;
12388
            }
12389
12390
            ret = wc_sphincs_init(sphincs);
12391
            if (ret != 0) {
12392
                XFREE(sphincs, NULL, DYNAMIC_TYPE_SPHINCS);
12393
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12394
                return ret;
12395
            }
12396
12397
            if (x509->pubKeyOID == SPHINCS_FAST_LEVEL1k) {
12398
                type = SPHINCS_FAST_LEVEL1_TYPE;
12399
                wc_sphincs_set_level_and_optim(sphincs, 1, FAST_VARIANT);
12400
            }
12401
            else if (x509->pubKeyOID == SPHINCS_FAST_LEVEL3k) {
12402
                type = SPHINCS_FAST_LEVEL3_TYPE;
12403
                wc_sphincs_set_level_and_optim(sphincs, 3, FAST_VARIANT);
12404
            }
12405
            else if (x509->pubKeyOID == SPHINCS_FAST_LEVEL3k) {
12406
                type = SPHINCS_FAST_LEVEL5_TYPE;
12407
                wc_sphincs_set_level_and_optim(sphincs, 5, FAST_VARIANT);
12408
            }
12409
            else if (x509->pubKeyOID == SPHINCS_SMALL_LEVEL1k) {
12410
                type = SPHINCS_SMALL_LEVEL1_TYPE;
12411
                wc_sphincs_set_level_and_optim(sphincs, 1, SMALL_VARIANT);
12412
            }
12413
            else if (x509->pubKeyOID == SPHINCS_SMALL_LEVEL3k) {
12414
                type = SPHINCS_SMALL_LEVEL3_TYPE;
12415
                wc_sphincs_set_level_and_optim(sphincs, 3, SMALL_VARIANT);
12416
            }
12417
            else if (x509->pubKeyOID == SPHINCS_SMALL_LEVEL3k) {
12418
                type = SPHINCS_SMALL_LEVEL5_TYPE;
12419
                wc_sphincs_set_level_and_optim(sphincs, 5, SMALL_VARIANT);
12420
            }
12421
12422
            ret = wc_Sphincs_PublicKeyDecode(x509->pubKey.buffer, &idx, sphincs,
12423
                                             x509->pubKey.length);
12424
            if (ret != 0) {
12425
                WOLFSSL_ERROR_VERBOSE(ret);
12426
                wc_sphincs_free(sphincs);
12427
                XFREE(sphincs, NULL, DYNAMIC_TYPE_SPHINCS);
12428
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12429
                return ret;
12430
            }
12431
            key = (void*)sphincs;
12432
        }
12433
    #endif
12434
        if (key == NULL) {
12435
            WOLFSSL_MSG("No public key found for certificate");
12436
            XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12437
            return WOLFSSL_FAILURE;
12438
        }
12439
12440
        /* Make the body of the certificate request. */
12441
    #ifdef WOLFSSL_CERT_REQ
12442
        if (req) {
12443
            ret = wc_MakeCertReq_ex(cert, der, *derSz, type, key);
12444
        }
12445
        else
12446
    #endif
12447
        {
12448
            ret = wc_InitRng(&rng);
12449
            if (ret != 0) {
12450
                ret = WOLFSSL_FAILURE;
12451
                goto cleanup;
12452
            }
12453
12454
            ret = wc_MakeCert_ex(cert, der, *derSz, type, key, &rng);
12455
            wc_FreeRng(&rng);
12456
        }
12457
        if (ret <= 0) {
12458
            WOLFSSL_ERROR_VERBOSE(ret);
12459
            ret = WOLFSSL_FAILURE;
12460
            goto cleanup;
12461
        }
12462
12463
        if ((x509->serialSz == 0) &&
12464
                (cert->serialSz <= EXTERNAL_SERIAL_SIZE) &&
12465
                (cert->serialSz > 0)) {
12466
        #if defined(OPENSSL_EXTRA)
12467
            WOLFSSL_ASN1_INTEGER *i = wolfSSL_ASN1_INTEGER_new();
12468
12469
            if (i == NULL) {
12470
                WOLFSSL_MSG("wolfSSL_ASN1_INTEGER_new error");
12471
                ret = WOLFSSL_FAILURE;
12472
                goto cleanup;
12473
            }
12474
            else {
12475
                i->length = cert->serialSz + 2;
12476
                i->data[0] = ASN_INTEGER;
12477
                i->data[1] = (unsigned char)cert->serialSz;
12478
                XMEMCPY(i->data + 2, cert->serial, cert->serialSz);
12479
                if (wolfSSL_X509_set_serialNumber(x509, i) != WOLFSSL_SUCCESS) {
12480
                    WOLFSSL_MSG("Issue setting generated serial number");
12481
                    wolfSSL_ASN1_INTEGER_free(i);
12482
                    ret = WOLFSSL_FAILURE;
12483
                    goto cleanup;
12484
                }
12485
                wolfSSL_ASN1_INTEGER_free(i);
12486
            }
12487
        #else
12488
            WOLFSSL_MSG("ASN1_INTEGER API not in build");
12489
12490
            ret = WOLFSSL_FAILURE;
12491
            goto cleanup;
12492
        #endif /* OPENSSL_EXTRA */
12493
        }
12494
12495
        if (includeSig) {
12496
            if (!x509->sig.buffer) {
12497
                WOLFSSL_MSG("No signature buffer");
12498
                ret = WOLFSSL_FAILURE;
12499
                goto cleanup;
12500
            }
12501
            totalLen = AddSignature(NULL, ret, NULL, x509->sig.length,
12502
                                  x509->sigOID);
12503
            if (totalLen > *derSz) {
12504
                WOLFSSL_MSG("Output der buffer too short");
12505
                ret = WOLFSSL_FAILURE;
12506
                goto cleanup;
12507
            }
12508
            ret = AddSignature(der, ret, x509->sig.buffer,
12509
                               x509->sig.length, x509->sigOID);
12510
        }
12511
12512
        *derSz = ret;
12513
        ret = WOLFSSL_SUCCESS;
12514
cleanup:
12515
        /* Dispose of the public key object. */
12516
    #ifndef NO_RSA
12517
        if (x509->pubKeyOID == RSAk) {
12518
            wc_FreeRsaKey(rsa);
12519
            XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
12520
        }
12521
    #endif
12522
    #ifdef HAVE_ECC
12523
        if (x509->pubKeyOID == ECDSAk) {
12524
            wc_ecc_free(ecc);
12525
            XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
12526
        }
12527
    #endif
12528
    #ifndef NO_DSA
12529
        if (x509->pubKeyOID == DSAk) {
12530
            wc_FreeDsaKey(dsa);
12531
            XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
12532
        }
12533
    #endif
12534
    #if defined(HAVE_FALCON)
12535
        if ((x509->pubKeyOID == FALCON_LEVEL1k) ||
12536
            (x509->pubKeyOID == FALCON_LEVEL5k)) {
12537
            wc_falcon_free(falcon);
12538
            XFREE(falcon, NULL, DYNAMIC_TYPE_FALCON);
12539
        }
12540
    #endif
12541
    #if defined(HAVE_DILITHIUM)
12542
        if ((x509->pubKeyOID == ML_DSA_LEVEL2k) ||
12543
            (x509->pubKeyOID == ML_DSA_LEVEL3k) ||
12544
            (x509->pubKeyOID == ML_DSA_LEVEL5k)
12545
        #ifdef WOLFSSL_DILITHIUM_FIPS204_DRAFT
12546
         || (x509->pubKeyOID == DILITHIUM_LEVEL2k)
12547
         || (x509->pubKeyOID == DILITHIUM_LEVEL3k)
12548
         || (x509->pubKeyOID == DILITHIUM_LEVEL5k)
12549
        #endif
12550
        ) {
12551
            wc_dilithium_free(dilithium);
12552
            XFREE(dilithium, NULL, DYNAMIC_TYPE_DILITHIUM);
12553
        }
12554
    #endif
12555
    #if defined(HAVE_SPHINCS)
12556
        if ((x509->pubKeyOID == SPHINCS_FAST_LEVEL1k) ||
12557
            (x509->pubKeyOID == SPHINCS_FAST_LEVEL3k) ||
12558
            (x509->pubKeyOID == SPHINCS_FAST_LEVEL5k) ||
12559
            (x509->pubKeyOID == SPHINCS_SMALL_LEVEL1k) ||
12560
            (x509->pubKeyOID == SPHINCS_SMALL_LEVEL3k) ||
12561
            (x509->pubKeyOID == SPHINCS_SMALL_LEVEL5k)) {
12562
            wc_sphincs_free(sphincs);
12563
            XFREE(sphincs, NULL, DYNAMIC_TYPE_SPHINCS);
12564
        }
12565
    #endif
12566
        XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12567
12568
        return ret;
12569
    }
12570
12571
12572
    /* signs a der buffer for the WOLFSSL_X509 structure using the PKEY and MD
12573
     * hash passed in
12574
     *
12575
     * WARNING: this free's and replaces the existing DER buffer in the
12576
     *          WOLFSSL_X509 with the newly signed buffer.
12577
     * returns size of signed buffer on success and negative values on fail
12578
     */
12579
    static int wolfSSL_X509_resign_cert(WOLFSSL_X509* x509, int req,
12580
            unsigned char* der, int derSz, int certBodySz, WOLFSSL_EVP_MD* md,
12581
            WOLFSSL_EVP_PKEY* pkey)
12582
    {
12583
        int ret;
12584
        void* key = NULL;
12585
        int type = -1;
12586
        int sigType;
12587
        WC_RNG rng;
12588
12589
        (void)req;
12590
        WOLFSSL_ENTER("wolfSSL_X509_resign_cert");
12591
12592
        sigType = wolfSSL_sigTypeFromPKEY(md, pkey);
12593
        if (sigType == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
12594
            WOLFSSL_MSG("Error getting signature type from pkey");
12595
            return WOLFSSL_FATAL_ERROR;
12596
        }
12597
12598
12599
        /* Get the private key object and type from pkey. */
12600
    #ifndef NO_RSA
12601
        if (pkey->type == WC_EVP_PKEY_RSA) {
12602
            type = RSA_TYPE;
12603
            key = pkey->rsa->internal;
12604
        }
12605
    #endif
12606
    #ifdef HAVE_ECC
12607
        if (pkey->type == WC_EVP_PKEY_EC) {
12608
            type = ECC_TYPE;
12609
            key = pkey->ecc->internal;
12610
        }
12611
    #endif
12612
12613
        /* Sign the certificate (request) body. */
12614
        ret = wc_InitRng(&rng);
12615
        if (ret != 0)
12616
            return ret;
12617
        ret = wc_SignCert_ex(certBodySz, sigType, der, (word32)derSz, type, key,
12618
            &rng);
12619
        wc_FreeRng(&rng);
12620
        if (ret < 0) {
12621
            WOLFSSL_LEAVE("wolfSSL_X509_resign_cert", ret);
12622
            return ret;
12623
        }
12624
        derSz = ret;
12625
12626
        /* Extract signature from buffer */
12627
        {
12628
            word32 idx = 0;
12629
            int    len = 0;
12630
12631
            /* Read top level sequence */
12632
            if (GetSequence(der, &idx, &len, (word32)derSz) < 0) {
12633
                WOLFSSL_MSG("GetSequence error");
12634
                return WOLFSSL_FATAL_ERROR;
12635
            }
12636
            /* Move idx to signature */
12637
            idx += certBodySz;
12638
            /* Read signature algo sequence */
12639
            if (GetSequence(der, &idx, &len, (word32)derSz) < 0) {
12640
                WOLFSSL_MSG("GetSequence error");
12641
                return WOLFSSL_FATAL_ERROR;
12642
            }
12643
            idx += len;
12644
            /* Read signature bit string */
12645
            if (CheckBitString(der, &idx, &len, (word32)derSz, 0, NULL) != 0) {
12646
                WOLFSSL_MSG("CheckBitString error");
12647
                return WOLFSSL_FATAL_ERROR;
12648
            }
12649
            /* Sanity check */
12650
            if (idx + len != (word32)derSz) {
12651
                WOLFSSL_MSG("unexpected asn1 structure");
12652
                return WOLFSSL_FATAL_ERROR;
12653
            }
12654
            x509->sig.length = 0;
12655
            if (x509->sig.buffer)
12656
                XFREE(x509->sig.buffer, x509->heap, DYNAMIC_TYPE_SIGNATURE);
12657
            x509->sig.buffer = (byte*)XMALLOC(len, x509->heap,
12658
                                              DYNAMIC_TYPE_SIGNATURE);
12659
            if (!x509->sig.buffer) {
12660
                WOLFSSL_MSG("malloc error");
12661
                return WOLFSSL_FATAL_ERROR;
12662
            }
12663
            XMEMCPY(x509->sig.buffer, der + idx, len);
12664
            x509->sig.length = (unsigned int)len;
12665
        }
12666
12667
        /* Put in the new certificate encoding into the x509 object. */
12668
        FreeDer(&x509->derCert);
12669
        type = CERT_TYPE;
12670
    #ifdef WOLFSSL_CERT_REQ
12671
        if (req) {
12672
            type = CERTREQ_TYPE;
12673
        }
12674
    #endif
12675
        if (AllocDer(&x509->derCert, (word32)derSz, type, NULL) != 0)
12676
            return WOLFSSL_FATAL_ERROR;
12677
        XMEMCPY(x509->derCert->buffer, der, derSz);
12678
        x509->derCert->length = (word32)derSz;
12679
12680
        return ret;
12681
    }
12682
12683
12684
#ifndef WC_MAX_X509_GEN
12685
    /* able to override max size until dynamic buffer created */
12686
    #define WC_MAX_X509_GEN 4096
12687
#endif
12688
12689
/* returns the size of signature on success */
12690
int wolfSSL_X509_sign(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey,
12691
        const WOLFSSL_EVP_MD* md)
12692
{
12693
    int  ret;
12694
    /* @TODO dynamic set based on expected cert size */
12695
    byte *der = (byte *)XMALLOC(WC_MAX_X509_GEN, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12696
    int  derSz = WC_MAX_X509_GEN;
12697
12698
    WOLFSSL_ENTER("wolfSSL_X509_sign");
12699
12700
    if (x509 == NULL || pkey == NULL || md == NULL) {
12701
        ret = WOLFSSL_FAILURE;
12702
        goto out;
12703
    }
12704
12705
    x509->sigOID = wolfSSL_sigTypeFromPKEY((WOLFSSL_EVP_MD*)md, pkey);
12706
    if ((ret = wolfssl_x509_make_der(x509, 0, der, &derSz, 0)) !=
12707
            WOLFSSL_SUCCESS) {
12708
        WOLFSSL_MSG("Unable to make DER for X509");
12709
        WOLFSSL_LEAVE("wolfSSL_X509_sign", ret);
12710
        (void)ret;
12711
        ret = WOLFSSL_FAILURE;
12712
        goto out;
12713
    }
12714
12715
    ret = wolfSSL_X509_resign_cert(x509, 0, der, WC_MAX_X509_GEN, derSz,
12716
            (WOLFSSL_EVP_MD*)md, pkey);
12717
    if (ret <= 0) {
12718
        WOLFSSL_LEAVE("wolfSSL_X509_sign", ret);
12719
        ret = WOLFSSL_FAILURE;
12720
        goto out;
12721
    }
12722
12723
out:
12724
    XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12725
12726
    return ret;
12727
}
12728
12729
#if defined(OPENSSL_EXTRA)
12730
int wolfSSL_X509_sign_ctx(WOLFSSL_X509 *x509, WOLFSSL_EVP_MD_CTX *ctx)
12731
{
12732
    WOLFSSL_ENTER("wolfSSL_X509_sign_ctx");
12733
12734
    if (!x509 || !ctx || !ctx->pctx || !ctx->pctx->pkey) {
12735
        WOLFSSL_MSG("Bad parameter");
12736
        return WOLFSSL_FAILURE;
12737
    }
12738
12739
    return wolfSSL_X509_sign(x509, ctx->pctx->pkey,
12740
        wolfSSL_EVP_MD_CTX_md(ctx));
12741
}
12742
#endif /* OPENSSL_EXTRA */
12743
#endif /* WOLFSSL_CERT_GEN */
12744
12745
12746
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
12747
    defined(OPENSSL_EXTRA_X509_SMALL) || defined(WOLFSSL_WPAS_SMALL)
12748
/* Converts from WC_NID_* value to wolfSSL value if needed.
12749
 *
12750
 * @param [in] nid  Numeric Id of a domain name component.
12751
 * @return  Domain name tag values - wolfSSL internal values.
12752
 * @return  -1 when nid isn't known.
12753
 */
12754
static int ConvertNIDToWolfSSL(int nid)
12755
{
12756
    switch (nid) {
12757
        case WC_NID_commonName : return ASN_COMMON_NAME;
12758
    #ifdef WOLFSSL_CERT_NAME_ALL
12759
        case WC_NID_name :       return ASN_NAME;
12760
        case WC_NID_givenName:   return ASN_GIVEN_NAME;
12761
        case WC_NID_dnQualifier :   return ASN_DNQUALIFIER;
12762
        case WC_NID_initials:   return ASN_INITIALS;
12763
    #endif /* WOLFSSL_CERT_NAME_ALL */
12764
        case WC_NID_surname :    return ASN_SUR_NAME;
12765
        case WC_NID_countryName: return ASN_COUNTRY_NAME;
12766
        case WC_NID_localityName: return ASN_LOCALITY_NAME;
12767
        case WC_NID_stateOrProvinceName: return ASN_STATE_NAME;
12768
        case WC_NID_streetAddress: return ASN_STREET_ADDR;
12769
        case WC_NID_organizationName: return ASN_ORG_NAME;
12770
        case WC_NID_organizationalUnitName: return ASN_ORGUNIT_NAME;
12771
        case WC_NID_emailAddress: return ASN_EMAIL_NAME;
12772
        case WC_NID_pkcs9_contentType: return ASN_CONTENT_TYPE;
12773
        case WC_NID_serialNumber: return ASN_SERIAL_NUMBER;
12774
        case WC_NID_userId: return ASN_USER_ID;
12775
        case WC_NID_businessCategory: return ASN_BUS_CAT;
12776
        case WC_NID_domainComponent: return ASN_DOMAIN_COMPONENT;
12777
        case WC_NID_postalCode: return ASN_POSTAL_CODE;
12778
        case WC_NID_rfc822Mailbox: return ASN_RFC822_MAILBOX;
12779
        case WC_NID_favouriteDrink: return ASN_FAVOURITE_DRINK;
12780
        default:
12781
            WOLFSSL_MSG("Attribute NID not found");
12782
            return WOLFSSL_FATAL_ERROR;
12783
    }
12784
}
12785
#endif /* OPENSSL_ALL || OPENSSL_EXTRA ||
12786
          OPENSSL_EXTRA_X509_SMALL || WOLFSSL_WPAS_SMALL*/
12787
12788
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
12789
    defined(OPENSSL_EXTRA_X509_SMALL)
12790
/* This is to convert the x509 name structure into canonical DER format     */
12791
/*  , which has the following rules:                                        */
12792
/*   convert to UTF8                                                        */
12793
/*   convert to lower case                                                  */
12794
/*   multi-spaces collapsed                                                 */
12795
/*   leading SEQUENCE header is skipped                                     */
12796
/* @param  name a pointer to X509_NAME that is to be converted              */
12797
/* @param  out  a pointer to converted data                                 */
12798
/* @return a number of converted bytes, otherwise <=0 error code            */
12799
int wolfSSL_i2d_X509_NAME_canon(WOLFSSL_X509_NAME* name, unsigned char** out)
12800
{
12801
    int  totalBytes = 0, i, idx;
12802
    byte *output, *local = NULL;
12803
    WC_DECLARE_VAR(names, EncodedName, MAX_NAME_ENTRIES, 0);
12804
12805
    if (name == NULL)
12806
        return BAD_FUNC_ARG;
12807
12808
    WC_ALLOC_VAR_EX(names, EncodedName, MAX_NAME_ENTRIES, NULL,
12809
        DYNAMIC_TYPE_TMP_BUFFER, return MEMORY_E);
12810
12811
    XMEMSET(names, 0, sizeof(EncodedName) * MAX_NAME_ENTRIES);
12812
12813
    for (i = 0; i < MAX_NAME_ENTRIES; i++) {
12814
        WOLFSSL_X509_NAME_ENTRY* entry;
12815
        int ret;
12816
12817
        entry = wolfSSL_X509_NAME_get_entry(name, i);
12818
        if (entry != NULL && entry->set >= 1) {
12819
            const char* nameStr;
12820
            WOLFSSL_ASN1_STRING* data;
12821
            WOLFSSL_ASN1_STRING* cano_data;
12822
12823
            cano_data = wolfSSL_ASN1_STRING_new();
12824
            if (cano_data == NULL) {
12825
                WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12826
                return MEMORY_E;
12827
            }
12828
12829
            data = wolfSSL_X509_NAME_ENTRY_get_data(entry);
12830
            if (data == NULL) {
12831
                WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12832
                wolfSSL_ASN1_STRING_free(cano_data);
12833
                WOLFSSL_MSG("Error getting entry data");
12834
                return WOLFSSL_FATAL_ERROR;
12835
            }
12836
            if (wolfSSL_ASN1_STRING_canon(cano_data, data) != WOLFSSL_SUCCESS) {
12837
                WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12838
                wolfSSL_ASN1_STRING_free(cano_data);
12839
                return WOLFSSL_FAILURE;
12840
            }
12841
            nameStr = (const char*)wolfSSL_ASN1_STRING_data(cano_data);
12842
12843
            /* allow for blank values in the name structure, eg OU= */
12844
            if (nameStr)
12845
            {
12846
                ret = wc_EncodeNameCanonical(&names[i], nameStr, CTC_UTF8,
12847
                    (byte)ConvertNIDToWolfSSL(entry->nid));
12848
                if (ret < 0) {
12849
                    WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12850
                    wolfSSL_ASN1_STRING_free(cano_data);
12851
                    WOLFSSL_MSG("EncodeName failed");
12852
                    return WOLFSSL_FATAL_ERROR;
12853
                }
12854
                totalBytes += ret;
12855
            }
12856
12857
            wolfSSL_ASN1_STRING_free(cano_data);
12858
        }
12859
    }
12860
12861
    if (out == NULL) {
12862
        /* If out is NULL, caller just wants length. */
12863
        WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12864
        return totalBytes;
12865
    }
12866
12867
    /* skip header */
12868
    /* check if using buffer passed in */
12869
    if (*out == NULL) {
12870
        *out = local = (unsigned char*)XMALLOC(totalBytes, NULL,
12871
                DYNAMIC_TYPE_OPENSSL);
12872
        if (*out == NULL) {
12873
            return MEMORY_E;
12874
        }
12875
    }
12876
    output = *out;
12877
    idx = 0;
12878
12879
    for (i = 0; i < MAX_NAME_ENTRIES; i++) {
12880
        if (names[i].used) {
12881
            XMEMCPY(output + idx, names[i].encoded, names[i].totalLen);
12882
            idx += names[i].totalLen;
12883
        }
12884
    }
12885
12886
    WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12887
12888
    /* used existing buffer passed in, so increment pointer */
12889
    if (local == NULL) {
12890
        *out += totalBytes;
12891
    }
12892
    return totalBytes;
12893
}
12894
#endif /* OPENSSL_ALL || OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
12895
12896
#ifdef WOLFSSL_CERT_GEN
12897
/* Guarded by either
12898
 * A) WOLFSSL_WPAS_SMALL is on or
12899
 * B) (OPENSSL_EXTRA or OPENSSL_EXTRA_X509_SMALL) + WOLFSSL_CERT_GEN +
12900
 *    (WOLFSSL_CERT_REQ or WOLFSSL_CERT_EXT or OPENSSL_EXTRA) has been
12901
 *    defined
12902
 */
12903
#if defined(WOLFSSL_WPAS_SMALL) || \
12904
    (defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)) && \
12905
    defined(WOLFSSL_CERT_GEN) && \
12906
    (defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_EXT) || \
12907
     defined(OPENSSL_EXTRA))
12908
12909
/* Converts the x509 name structure into DER format.
12910
 *
12911
 * out  pointer to either a pre setup buffer or a pointer to null for
12912
 *      creating a dynamic buffer. In the case that a pre-existing buffer is
12913
 *      used out will be incremented the size of the DER buffer on success. If
12914
 *      out is NULL, the function returns the necessary output buffer length.
12915
 *
12916
 * returns the size of the buffer on success, or negative value with failure
12917
 */
12918
int wolfSSL_i2d_X509_NAME(WOLFSSL_X509_NAME* name, unsigned char** out)
12919
{
12920
    int  totalBytes = 0, i, idx;
12921
    byte temp[MAX_SEQ_SZ];
12922
    byte *output, *local = NULL;
12923
    WC_DECLARE_VAR(names, EncodedName, MAX_NAME_ENTRIES, 0);
12924
12925
    if (name == NULL)
12926
        return BAD_FUNC_ARG;
12927
12928
    WC_ALLOC_VAR_EX(names, EncodedName, MAX_NAME_ENTRIES, NULL,
12929
        DYNAMIC_TYPE_TMP_BUFFER, return MEMORY_E);
12930
12931
    XMEMSET(names, 0, sizeof(EncodedName) * MAX_NAME_ENTRIES);
12932
12933
    for (i = 0; i < MAX_NAME_ENTRIES; i++) {
12934
        WOLFSSL_X509_NAME_ENTRY* entry;
12935
        int ret;
12936
12937
        entry = wolfSSL_X509_NAME_get_entry(name, i);
12938
        if (entry != NULL && entry->set >= 1) {
12939
            const char* nameStr;
12940
            int type;
12941
            WOLFSSL_ASN1_STRING* data;
12942
12943
            data = wolfSSL_X509_NAME_ENTRY_get_data(entry);
12944
            if (data == NULL) {
12945
                WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12946
                WOLFSSL_MSG("Error getting entry data");
12947
                return WOLFSSL_FATAL_ERROR;
12948
            }
12949
12950
            nameStr = (const char*)wolfSSL_ASN1_STRING_data(data);
12951
            type    = wolfSSL_ASN1_STRING_type(data);
12952
12953
            switch (type) {
12954
                case WOLFSSL_MBSTRING_UTF8:
12955
                    type = CTC_UTF8;
12956
                    break;
12957
                case WOLFSSL_MBSTRING_ASC:
12958
                case WOLFSSL_V_ASN1_PRINTABLESTRING:
12959
                    type = CTC_PRINTABLE;
12960
                    break;
12961
                default:
12962
                    WOLFSSL_MSG(
12963
                        "Unknown encoding type conversion UTF8 by default");
12964
                    type = CTC_UTF8;
12965
            }
12966
            ret = wc_EncodeName(&names[i], nameStr, (char)type,
12967
                (byte)ConvertNIDToWolfSSL(entry->nid));
12968
            if (ret < 0) {
12969
                WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12970
                WOLFSSL_MSG("EncodeName failed");
12971
                return WOLFSSL_FATAL_ERROR;
12972
            }
12973
            totalBytes += ret;
12974
        }
12975
    }
12976
12977
    /* header */
12978
    idx = (int)SetSequence((word32)totalBytes, temp);
12979
    if (totalBytes + idx > ASN_NAME_MAX) {
12980
        WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12981
        WOLFSSL_MSG("Total Bytes is greater than ASN_NAME_MAX");
12982
        return BUFFER_E;
12983
    }
12984
12985
    if (out == NULL) {
12986
        /* If out is NULL, caller just wants length. */
12987
        totalBytes += idx;
12988
        WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12989
        return totalBytes;
12990
    }
12991
12992
    /* check if using buffer passed in */
12993
    if (*out == NULL) {
12994
        *out = local = (unsigned char*)XMALLOC(totalBytes + idx, name->heap,
12995
                DYNAMIC_TYPE_OPENSSL);
12996
        if (*out == NULL) {
12997
            return MEMORY_E;
12998
        }
12999
    }
13000
    output = *out;
13001
13002
    idx = (int)SetSequence((word32)totalBytes, output);
13003
    totalBytes += idx;
13004
    for (i = 0; i < MAX_NAME_ENTRIES; i++) {
13005
        if (names[i].used) {
13006
            XMEMCPY(output + idx, names[i].encoded, names[i].totalLen);
13007
            idx += names[i].totalLen;
13008
        }
13009
    }
13010
13011
    WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
13012
13013
    /* used existing buffer passed in, so increment pointer */
13014
    if (local == NULL) {
13015
        *out += totalBytes;
13016
    }
13017
    return totalBytes;
13018
}
13019
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
13020
#endif /* WOLFSSL_CERT_GEN */
13021
13022
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL) || \
13023
    defined (WOLFSSL_WPAS_SMALL)
13024
13025
    WOLFSSL_X509_NAME *wolfSSL_d2i_X509_NAME(WOLFSSL_X509_NAME **name,
13026
                                             unsigned char **in, long length)
13027
    {
13028
        WOLFSSL_X509_NAME* tmp = NULL;
13029
        WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
13030
13031
        WOLFSSL_ENTER("wolfSSL_d2i_X509_NAME");
13032
13033
        if (!in || !*in || length <= 0) {
13034
            WOLFSSL_MSG("Bad argument");
13035
            return NULL;
13036
        }
13037
13038
        WC_ALLOC_VAR_EX(cert, DecodedCert, 1, NULL, DYNAMIC_TYPE_DCERT,
13039
            return NULL);
13040
13041
        /* Set the X509_NAME buffer as the input data for cert.
13042
         * in is NOT a full certificate. Just the name. */
13043
        InitDecodedCert(cert, *in, (word32)length, NULL);
13044
13045
        /* Parse the X509 subject name */
13046
        if (GetName(cert, ASN_SUBJECT, (int)length) != 0) {
13047
            WOLFSSL_MSG("WOLFSSL_X509_NAME parse error");
13048
            goto cleanup;
13049
        }
13050
13051
        if (!(tmp = wolfSSL_X509_NAME_new_ex(cert->heap))) {
13052
            WOLFSSL_MSG("wolfSSL_X509_NAME_new_ex error");
13053
            goto cleanup;
13054
        }
13055
13056
        if (wolfSSL_X509_NAME_copy((WOLFSSL_X509_NAME*)cert->subjectName,
13057
                    tmp) != WOLFSSL_SUCCESS) {
13058
            wolfSSL_X509_NAME_free(tmp);
13059
            tmp = NULL;
13060
            goto cleanup;
13061
        }
13062
13063
        if (name)
13064
            *name = tmp;
13065
cleanup:
13066
        FreeDecodedCert(cert);
13067
        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
13068
        return tmp;
13069
    }
13070
#endif /* OPENSSL_EXTRA || OPENSSL_ALL || WOLFSSL_WPAS_SMALL */
13071
13072
13073
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL)
13074
13075
    /* Compares the two X509 names. If the size of x is larger then y then a
13076
     * positive value is returned if x is smaller a negative value is returned.
13077
     * In the case that the sizes are equal a the value of strcmp between the
13078
     * two names is returned.
13079
     *
13080
     * x First name for comparison
13081
     * y Second name to compare with x
13082
     */
13083
    int wolfSSL_X509_NAME_cmp(const WOLFSSL_X509_NAME* x,
13084
            const WOLFSSL_X509_NAME* y)
13085
    {
13086
        const char* _x;
13087
        const char* _y;
13088
        WOLFSSL_ENTER("wolfSSL_X509_NAME_cmp");
13089
13090
        if (x == NULL || y == NULL) {
13091
            WOLFSSL_MSG("Bad argument passed in");
13092
            return -2;
13093
        }
13094
13095
        if (x == y) {
13096
            return 0; /* match */
13097
        }
13098
13099
        if (x->sz != y->sz) {
13100
            return x->sz - y->sz;
13101
        }
13102
13103
        /*
13104
         * If the name member is not set or is immediately null terminated then
13105
         * compare the staticName member
13106
         */
13107
        _x = (x->name && *x->name) ? x->name : x->staticName;
13108
        _y = (y->name && *y->name) ? y->name : y->staticName;
13109
13110
        return XSTRNCASECMP(_x, _y, x->sz); /* y sz is the same */
13111
    }
13112
13113
#ifndef NO_BIO
13114
13115
static WOLFSSL_X509 *loadX509orX509REQFromPemBio(WOLFSSL_BIO *bp,
13116
        WOLFSSL_X509 **x, wc_pem_password_cb *cb, void *u, int type)
13117
{
13118
    WOLFSSL_X509* x509 = NULL;
13119
#if defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM)
13120
    unsigned char* pem = NULL;
13121
    int pemSz;
13122
    long  i = 0, l, footerSz;
13123
    const char* footer = NULL;
13124
    int streaming = 0;  /* Flag to indicate if source is streaming (FIFO) */
13125
    const char* altFooter = NULL;
13126
    long altFooterSz = 0;
13127
13128
    WOLFSSL_ENTER("loadX509orX509REQFromPemBio");
13129
13130
    if (bp == NULL || (type != CERT_TYPE && type != CERTREQ_TYPE &&
13131
                       type != TRUSTED_CERT_TYPE)) {
13132
        WOLFSSL_LEAVE("wolfSSL_PEM_read_bio_X509", BAD_FUNC_ARG);
13133
        return NULL;
13134
    }
13135
13136
    if ((l = wolfSSL_BIO_get_len(bp)) <= 0) {
13137
        /* No certificate size available - could be FIFO or other streaming
13138
         * source. Use MAX_X509_SIZE as initial buffer, will resize if needed. */
13139
        l = MAX_X509_SIZE;
13140
        streaming = 1;
13141
    }
13142
13143
    pemSz = (int)l;
13144
    pem   = (unsigned char*)XMALLOC(pemSz, 0, DYNAMIC_TYPE_PEM);
13145
    if (pem == NULL)
13146
        return NULL;
13147
    XMEMSET(pem, 0, pemSz);
13148
13149
    i = 0;
13150
    if (wc_PemGetHeaderFooter(type, NULL, &footer) != 0) {
13151
        XFREE(pem, 0, DYNAMIC_TYPE_PEM);
13152
        return NULL;
13153
    }
13154
    footerSz = (long)XSTRLEN(footer);
13155
13156
    /* For TRUSTED_CERT_TYPE, also prepare to check for regular CERT footer
13157
     * as the file might contain regular certificates instead of TRUSTED
13158
     * format */
13159
    if (type == TRUSTED_CERT_TYPE) {
13160
        wc_PemGetHeaderFooter(CERT_TYPE, NULL, &altFooter);
13161
        if (altFooter != NULL) {
13162
            altFooterSz = (long)XSTRLEN(altFooter);
13163
        }
13164
    }
13165
13166
    /* TODO: Inefficient
13167
     * reading in one byte at a time until see the footer
13168
     */
13169
    while ((l = wolfSSL_BIO_read(bp, (char *)&pem[i], 1)) == 1) {
13170
        int foundFooter = 0;
13171
        i++;
13172
        /* Check if buffer is full and we're reading from streaming source */
13173
        if (i >= pemSz && streaming) {
13174
            /* Double the buffer size for streaming sources */
13175
            int newSz = pemSz * 2;
13176
            unsigned char* newPem;
13177
13178
            /* Sanity check: don't grow beyond reasonable limit */
13179
            if (newSz > MAX_BIO_READ_BUFFER) {
13180
                WOLFSSL_MSG("PEM data too large for streaming source");
13181
                XFREE(pem, 0, DYNAMIC_TYPE_PEM);
13182
                return NULL;
13183
            }
13184
13185
            newPem = (unsigned char*)XREALLOC(pem, newSz, 0, DYNAMIC_TYPE_PEM);
13186
            if (newPem == NULL) {
13187
                WOLFSSL_MSG("Failed to resize PEM buffer");
13188
                XFREE(pem, 0, DYNAMIC_TYPE_PEM);
13189
                return NULL;
13190
            }
13191
13192
            pem = newPem;
13193
            pemSz = newSz;
13194
        }
13195
        else if (i > pemSz) {
13196
            /* Buffer full for non-streaming source - this shouldn't happen */
13197
            break;
13198
        }
13199
13200
        /* Check for the expected footer OR alternate footer (for
13201
         * TRUSTED_CERT_TYPE) */
13202
        if (i > footerSz &&
13203
            XMEMCMP((char *)&pem[i-footerSz], footer, footerSz) == 0) {
13204
            foundFooter = 1;
13205
        }
13206
        else if (i > altFooterSz && altFooter != NULL &&
13207
            XMEMCMP((char *)&pem[i-altFooterSz], altFooter, altFooterSz) == 0) {
13208
            foundFooter = 1;
13209
        }
13210
13211
        if (foundFooter) {
13212
            if (i < pemSz && wolfSSL_BIO_read(bp, (char *)&pem[i], 1) == 1) {
13213
                /* attempt to read newline following footer */
13214
                i++;
13215
                if (i < pemSz && pem[i-1] == '\r') {
13216
                    /* found \r , Windows line ending is \r\n so try to read one
13217
                     * more byte for \n, ignoring return value */
13218
                    (void)wolfSSL_BIO_read(bp, (char *)&pem[i++], 1);
13219
                }
13220
            }
13221
            break;
13222
        }
13223
    }
13224
    if (l == 0 && i == 0) {
13225
        WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
13226
    }
13227
    if (i > pemSz) {
13228
        WOLFSSL_MSG("Error parsing PEM");
13229
    }
13230
    else {
13231
        pemSz = (int)i;
13232
    #ifdef WOLFSSL_CERT_REQ
13233
        if (type == CERTREQ_TYPE)
13234
            x509 = loadX509orX509REQFromBuffer(pem, pemSz, WOLFSSL_FILETYPE_PEM,
13235
                CERTREQ_TYPE, cb, u);
13236
        else
13237
    #endif
13238
        /* Use TRUSTED_CERT_TYPE if input was TRUSTED CERTIFICATE format,
13239
         * otherwise use CERT_TYPE for regular certificates */
13240
        if (type == TRUSTED_CERT_TYPE)
13241
            x509 = loadX509orX509REQFromBuffer(pem, pemSz, WOLFSSL_FILETYPE_PEM,
13242
                TRUSTED_CERT_TYPE, cb, u);
13243
        else
13244
            x509 = loadX509orX509REQFromBuffer(pem, pemSz, WOLFSSL_FILETYPE_PEM,
13245
                CERT_TYPE, cb, u);
13246
    }
13247
13248
    if (x != NULL) {
13249
        *x = x509;
13250
    }
13251
13252
    XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13253
13254
#endif /* WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM */
13255
    (void)bp;
13256
    (void)x;
13257
    (void)cb;
13258
    (void)u;
13259
13260
    return x509;
13261
}
13262
13263
13264
WC_MAYBE_UNUSED
13265
static unsigned char* ReadPemFromBioToBuffer(WOLFSSL_BIO *bp, int *pemSz)
13266
{
13267
    unsigned char* pem = NULL;
13268
13269
    WOLFSSL_ENTER("ReadPemFromBioToBuffer");
13270
13271
    if (bp == NULL || pemSz == NULL) {
13272
        WOLFSSL_LEAVE("ReadPemFromBioToBuffer", BAD_FUNC_ARG);
13273
        return NULL;
13274
    }
13275
13276
    if ((*pemSz = wolfSSL_BIO_get_len(bp)) <= 0) {
13277
        /* No certificate size available - could be FIFO or other streaming
13278
         * source. Use MAX_X509_SIZE as initial buffer, read in loop. */
13279
        int totalRead = 0;
13280
        int readSz;
13281
13282
        *pemSz = MAX_X509_SIZE;
13283
        pem = (unsigned char*)XMALLOC(*pemSz, 0, DYNAMIC_TYPE_PEM);
13284
        if (pem == NULL) {
13285
            return NULL;
13286
        }
13287
13288
        /* Read from streaming source until EOF or buffer full */
13289
        while ((readSz = wolfSSL_BIO_read(bp, pem + totalRead,
13290
                                          *pemSz - totalRead)) > 0) {
13291
            totalRead += readSz;
13292
13293
            /* If buffer is full, try to grow it */
13294
            if (totalRead >= *pemSz) {
13295
                int newSz = *pemSz * 2;
13296
                unsigned char* newPem;
13297
13298
                /* Sanity check */
13299
                if (newSz > MAX_BIO_READ_BUFFER) {
13300
                    WOLFSSL_MSG("PEM data too large for streaming source");
13301
                    XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13302
                    return NULL;
13303
                }
13304
13305
                newPem = (unsigned char*)XREALLOC(pem, newSz, 0,
13306
                        DYNAMIC_TYPE_PEM);
13307
                if (newPem == NULL) {
13308
                    XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13309
                    return NULL;
13310
                }
13311
                pem = newPem;
13312
                *pemSz = newSz;
13313
            }
13314
        }
13315
13316
        *pemSz = totalRead;
13317
        if (*pemSz <= 0) {
13318
            XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13319
            return NULL;
13320
        }
13321
    }
13322
    else {
13323
        /* Known size - allocate and read */
13324
        pem = (unsigned char*)XMALLOC(*pemSz, 0, DYNAMIC_TYPE_PEM);
13325
        if (pem == NULL) {
13326
            return NULL;
13327
        }
13328
13329
        XMEMSET(pem, 0, *pemSz);
13330
13331
        *pemSz = wolfSSL_BIO_read(bp, pem, *pemSz);
13332
        if (*pemSz <= 0) {
13333
            XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13334
            return NULL;
13335
        }
13336
    }
13337
13338
    WOLFSSL_LEAVE("ReadPemFromBioToBuffer", 0);
13339
    return pem;
13340
}
13341
13342
13343
13344
#if defined(WOLFSSL_ACERT)
13345
    WOLFSSL_X509_ACERT *wolfSSL_PEM_read_bio_X509_ACERT(WOLFSSL_BIO *bp,
13346
                                                        WOLFSSL_X509_ACERT **x,
13347
                                                        wc_pem_password_cb *cb,
13348
                                                        void *u)
13349
    {
13350
        WOLFSSL_X509_ACERT* x509 = NULL;
13351
#if defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM)
13352
        unsigned char * pem = NULL;
13353
        int             pemSz;
13354
13355
        WOLFSSL_ENTER("wolfSSL_PEM_read_bio_X509_ACERT");
13356
13357
        if (bp == NULL) {
13358
            return NULL;
13359
        }
13360
13361
        pem = ReadPemFromBioToBuffer(bp, &pemSz);
13362
        if (pem == NULL) {
13363
            return NULL;
13364
        }
13365
13366
        x509 = wolfSSL_X509_ACERT_load_certificate_buffer(pem, pemSz,
13367
                                                          WOLFSSL_FILETYPE_PEM);
13368
13369
        if (x != NULL) {
13370
            *x = x509;
13371
        }
13372
13373
        XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13374
13375
#endif /* WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM */
13376
        (void)bp;
13377
        (void)x;
13378
        (void)cb;
13379
        (void)u;
13380
13381
        return x509;
13382
13383
    }
13384
#endif /* WOLFSSL_ACERT */
13385
13386
    WOLFSSL_X509 *wolfSSL_PEM_read_bio_X509(WOLFSSL_BIO *bp, WOLFSSL_X509 **x,
13387
                                            wc_pem_password_cb *cb, void *u)
13388
    {
13389
        return loadX509orX509REQFromPemBio(bp, x, cb, u, CERT_TYPE);
13390
    }
13391
13392
    /*
13393
     * bp : bio to read X509 from
13394
     * x  : x509 to write to
13395
     * cb : password call back for reading PEM
13396
     * u  : password
13397
     * _AUX is for working with a trusted X509 certificate
13398
     */
13399
    WOLFSSL_X509 *wolfSSL_PEM_read_bio_X509_AUX(WOLFSSL_BIO *bp,
13400
                               WOLFSSL_X509 **x, wc_pem_password_cb *cb,
13401
                               void *u)
13402
    {
13403
        WOLFSSL_ENTER("wolfSSL_PEM_read_bio_X509_AUX");
13404
13405
        /* AUX info is; trusted/rejected uses, friendly name, private key id,
13406
         * and potentially a stack of "other" info. wolfSSL does not store
13407
         * friendly name or private key id yet in WOLFSSL_X509 for human
13408
         * readability and does not support extra trusted/rejected uses for
13409
         * root CA. Use TRUSTED_CERT_TYPE to properly parse TRUSTED CERTIFICATE
13410
         * format and strip auxiliary data. */
13411
        return loadX509orX509REQFromPemBio(bp, x, cb, u, TRUSTED_CERT_TYPE);
13412
    }
13413
13414
#ifdef WOLFSSL_CERT_REQ
13415
WOLFSSL_X509 *wolfSSL_PEM_read_bio_X509_REQ(WOLFSSL_BIO *bp, WOLFSSL_X509 **x,
13416
                                                wc_pem_password_cb *cb, void *u)
13417
{
13418
    return loadX509orX509REQFromPemBio(bp, x, cb, u, CERTREQ_TYPE);
13419
}
13420
13421
#ifndef NO_FILESYSTEM
13422
    WOLFSSL_X509* wolfSSL_PEM_read_X509_REQ(XFILE fp, WOLFSSL_X509** x,
13423
                                            wc_pem_password_cb* cb, void* u)
13424
    {
13425
        int err = 0;
13426
        WOLFSSL_X509* ret = NULL;
13427
        WOLFSSL_BIO* bio = NULL;
13428
13429
        WOLFSSL_ENTER("wolfSSL_PEM_read_X509_REQ");
13430
13431
        if (fp == XBADFILE) {
13432
            WOLFSSL_MSG("Invalid file.");
13433
            err = 1;
13434
        }
13435
13436
        if (err == 0) {
13437
            bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file());
13438
            if (bio == NULL) {
13439
                WOLFSSL_MSG("Failed to create new BIO with input file.");
13440
                err = 1;
13441
            }
13442
        }
13443
        if (err == 0 && wolfSSL_BIO_set_fp(bio, fp, WOLFSSL_BIO_CLOSE)
13444
                != WOLFSSL_SUCCESS) {
13445
            WOLFSSL_MSG("Failed to set BIO file pointer.");
13446
            err = 1;
13447
        }
13448
        if (err == 0) {
13449
            ret = wolfSSL_PEM_read_bio_X509_REQ(bio, x, cb, u);
13450
        }
13451
13452
        wolfSSL_BIO_free(bio);
13453
13454
        return ret;
13455
    }
13456
#endif /* !NO_FILESYSTEM */
13457
#endif /* WOLFSSL_CERT_REQ */
13458
13459
    WOLFSSL_X509_CRL *wolfSSL_PEM_read_bio_X509_CRL(WOLFSSL_BIO *bp,
13460
            WOLFSSL_X509_CRL **x, wc_pem_password_cb *cb, void *u)
13461
    {
13462
#if defined(WOLFSSL_PEM_TO_DER) && defined(HAVE_CRL)
13463
        unsigned char* pem = NULL;
13464
        int pemSz = 0;
13465
        int derSz = 0;
13466
        DerBuffer* der = NULL;
13467
        WOLFSSL_X509_CRL* crl = NULL;
13468
13469
        WOLFSSL_ENTER("wolfSSL_PEM_read_bio_X509_CRL");
13470
13471
        if ((pem = ReadPemFromBioToBuffer(bp, &pemSz)) == NULL) {
13472
            goto err;
13473
        }
13474
13475
        if ((PemToDer(pem, pemSz, CRL_TYPE, &der, NULL, NULL, NULL)) < 0) {
13476
            goto err;
13477
        }
13478
        derSz = (int)der->length;
13479
        if ((crl = wolfSSL_d2i_X509_CRL(x, der->buffer, derSz)) == NULL) {
13480
            goto err;
13481
        }
13482
13483
err:
13484
        if (pemSz == 0) {
13485
            WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
13486
        }
13487
        XFREE(pem, 0, DYNAMIC_TYPE_PEM);
13488
        if (der != NULL) {
13489
            FreeDer(&der);
13490
        }
13491
13492
        (void)cb;
13493
        (void)u;
13494
13495
        return crl;
13496
#else
13497
        (void)bp;
13498
        (void)x;
13499
        (void)cb;
13500
        (void)u;
13501
13502
        return NULL;
13503
#endif
13504
    }
13505
13506
#endif /* !NO_BIO */
13507
13508
#if !defined(NO_FILESYSTEM)
13509
static void* wolfSSL_PEM_read_X509_ex(XFILE fp, void **x,
13510
    wc_pem_password_cb *cb, void *u, int type)
13511
{
13512
    unsigned char* pem = NULL;
13513
    int pemSz;
13514
    long i = 0, l;
13515
    void *newx509;
13516
    int derSz;
13517
    DerBuffer* der = NULL;
13518
13519
    WOLFSSL_ENTER("wolfSSL_PEM_read_X509");
13520
13521
    if (fp == XBADFILE) {
13522
        WOLFSSL_LEAVE("wolfSSL_PEM_read_X509", BAD_FUNC_ARG);
13523
        return NULL;
13524
    }
13525
    /* Read cert from file */
13526
    i = XFTELL(fp);
13527
    if (i < 0) {
13528
        WOLFSSL_LEAVE("wolfSSL_PEM_read_X509", BAD_FUNC_ARG);
13529
        return NULL;
13530
    }
13531
13532
    if (XFSEEK(fp, 0, XSEEK_END) != 0)
13533
        return NULL;
13534
    l = XFTELL(fp);
13535
    if (l < 0)
13536
        return NULL;
13537
    if (XFSEEK(fp, i, SEEK_SET) != 0)
13538
        return NULL;
13539
    pemSz = (int)(l - i);
13540
13541
    /* check calculated length */
13542
    if (pemSz > MAX_WOLFSSL_FILE_SIZE || pemSz <= 0) {
13543
        WOLFSSL_MSG("PEM_read_X509_ex file size error");
13544
        return NULL;
13545
    }
13546
13547
    /* allocate pem buffer */
13548
    pem = (unsigned char*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_PEM);
13549
    if (pem == NULL)
13550
        return NULL;
13551
13552
    if ((int)XFREAD((char *)pem, 1, (size_t)pemSz, fp) != pemSz)
13553
        goto err_exit;
13554
13555
    switch (type) {
13556
        case CERT_TYPE:
13557
            newx509 = (void *)wolfSSL_X509_load_certificate_buffer(pem,
13558
                pemSz, WOLFSSL_FILETYPE_PEM);
13559
            break;
13560
13561
    #ifdef HAVE_CRL
13562
        case CRL_TYPE:
13563
            if ((PemToDer(pem, pemSz, CRL_TYPE, &der, NULL, NULL, NULL)) < 0)
13564
                goto err_exit;
13565
            derSz = (int)der->length;
13566
            newx509 = (void*)wolfSSL_d2i_X509_CRL((WOLFSSL_X509_CRL **)x,
13567
                (const unsigned char *)der->buffer, derSz);
13568
            if (newx509 == NULL)
13569
                goto err_exit;
13570
            FreeDer(&der);
13571
            break;
13572
    #endif
13573
13574
        default:
13575
            goto err_exit;
13576
    }
13577
    if (x != NULL) {
13578
        *x = newx509;
13579
    }
13580
    XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13581
    return newx509;
13582
13583
err_exit:
13584
    XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13585
    if (der != NULL)
13586
        FreeDer(&der);
13587
13588
    /* unused */
13589
    (void)cb;
13590
    (void)u;
13591
    (void)derSz;
13592
13593
    return NULL;
13594
}
13595
13596
WOLFSSL_X509* wolfSSL_PEM_read_X509(XFILE fp, WOLFSSL_X509 **x,
13597
                                                wc_pem_password_cb *cb, void *u)
13598
{
13599
    return (WOLFSSL_X509* )wolfSSL_PEM_read_X509_ex(fp, (void **)x, cb, u,
13600
         CERT_TYPE);
13601
}
13602
13603
#if defined(HAVE_CRL)
13604
WOLFSSL_X509_CRL* wolfSSL_PEM_read_X509_CRL(XFILE fp,
13605
                        WOLFSSL_X509_CRL **crl, wc_pem_password_cb *cb, void *u)
13606
{
13607
    return (WOLFSSL_X509_CRL* )wolfSSL_PEM_read_X509_ex(fp, (void **)crl, cb, u,
13608
         CRL_TYPE);
13609
}
13610
13611
/* Store CRL to file in DER or PEM format.
13612
 * Returns WOLFSSL_SUCCESS on success, negative on failure.
13613
 */
13614
int wolfSSL_write_X509_CRL(WOLFSSL_X509_CRL* crl, const char* path, int type)
13615
{
13616
    int ret;
13617
    WOLFSSL_ENTER("wolfSSL_write_X509_CRL");
13618
    ret = StoreCRL(crl, path, type);
13619
    WOLFSSL_LEAVE("wolfSSL_write_X509_CRL", ret);
13620
    return ret;
13621
}
13622
#endif
13623
13624
#ifdef WOLFSSL_CERT_GEN
13625
#ifndef NO_BIO
13626
    int wolfSSL_PEM_write_X509(XFILE fp, WOLFSSL_X509* x)
13627
    {
13628
        int ret;
13629
        WOLFSSL_BIO* bio;
13630
13631
        if (x == NULL || fp == XBADFILE)
13632
            return 0;
13633
13634
        bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file());
13635
        if (bio == NULL)
13636
            return 0;
13637
13638
        if (wolfSSL_BIO_set_fp(bio, fp, WOLFSSL_BIO_NOCLOSE) != WOLFSSL_SUCCESS) {
13639
            wolfSSL_BIO_free(bio);
13640
            bio = NULL;
13641
        }
13642
13643
        ret = wolfSSL_PEM_write_bio_X509(bio, x);
13644
13645
        if (bio != NULL)
13646
            wolfSSL_BIO_free(bio);
13647
13648
        return ret;
13649
    }
13650
#endif /* !NO_BIO */
13651
#endif /* WOLFSSL_CERT_GEN */
13652
#endif /* !NO_FILESYSTEM */
13653
13654
#endif /* OPENSSL_EXTRA || OPENSSL_ALL */
13655
#ifdef OPENSSL_ALL
13656
13657
#ifndef NO_BIO
13658
    /* create and return a new WOLFSSL_X509_PKEY structure or NULL on failure */
13659
    static WOLFSSL_X509_PKEY* wolfSSL_X509_PKEY_new(void* heap)
13660
    {
13661
        WOLFSSL_X509_PKEY* ret;
13662
13663
        ret = (WOLFSSL_X509_PKEY*)XMALLOC(sizeof(WOLFSSL_X509_PKEY), heap,
13664
            DYNAMIC_TYPE_KEY);
13665
        if (ret != NULL) {
13666
            XMEMSET(ret, 0, sizeof(WOLFSSL_X509_PKEY));
13667
            ret->heap = heap;
13668
        }
13669
        return ret;
13670
    }
13671
#endif /* !NO_BIO */
13672
13673
13674
    /* free up all memory used by "xPkey" passed in */
13675
    static void wolfSSL_X509_PKEY_free(WOLFSSL_X509_PKEY* xPkey)
13676
    {
13677
        if (xPkey != NULL) {
13678
            wolfSSL_EVP_PKEY_free(xPkey->dec_pkey);
13679
            XFREE(xPkey, xPkey->heap, DYNAMIC_TYPE_KEY);
13680
        }
13681
    }
13682
13683
13684
#ifndef NO_BIO
13685
13686
#define PEM_COMPARE_HEADER(start, end, header) \
13687
        ((end) - (start) == XSTR_SIZEOF(header) && XMEMCMP(start, header, \
13688
                XSTR_SIZEOF(header)) == 0)
13689
13690
    /**
13691
     * This read one structure from bio and returns the read structure
13692
     * in the appropriate output parameter (x509, crl, x_pkey). The
13693
     * output parameters must be set to NULL.
13694
     * @param bio    Input for reading structures
13695
     * @param cb     Password callback
13696
     * @param x509   Output
13697
     * @param crl    Output
13698
     * @param x_pkey Output
13699
     * @return WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE otherwise
13700
     */
13701
    static int wolfSSL_PEM_X509_X509_CRL_X509_PKEY_read_bio(
13702
            WOLFSSL_BIO* bio, wc_pem_password_cb* cb, WOLFSSL_X509** x509,
13703
            WOLFSSL_X509_CRL** crl, WOLFSSL_X509_PKEY** x_pkey)
13704
    {
13705
13706
#if defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM)
13707
        char* pem = NULL;
13708
        long  i = pem_struct_min_sz, l;
13709
        const char* header = NULL;
13710
        const char* headerEnd = NULL;
13711
        const char* footer = NULL;
13712
        const char* footerEnd = NULL;
13713
    #ifdef HAVE_CRL
13714
        DerBuffer* der = NULL;
13715
    #endif
13716
        WOLFSSL_BIO* pemBio = NULL;
13717
13718
        if (!bio || !x509 || *x509 || !crl || *crl || !x_pkey || *x_pkey) {
13719
            WOLFSSL_MSG("Bad input parameter or output parameters "
13720
                        "not set to a NULL value.");
13721
            return WOLFSSL_FAILURE;
13722
        }
13723
13724
        l = wolfSSL_BIO_get_len(bio);
13725
13726
        if (l < 0) {
13727
            WOLFSSL_ERROR(BAD_FUNC_ARG);
13728
            return WOLFSSL_FAILURE;
13729
        }
13730
13731
        if (l <= pem_struct_min_sz) {
13732
            /* No certificate in buffer */
13733
            WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
13734
            return WOLFSSL_FAILURE;
13735
        }
13736
13737
        pem = (char*)XMALLOC(l, 0, DYNAMIC_TYPE_PEM);
13738
        if (pem == NULL)
13739
            return WOLFSSL_FAILURE;
13740
13741
        if (wolfSSL_BIO_read(bio, &pem[0], pem_struct_min_sz) !=
13742
                pem_struct_min_sz) {
13743
            WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
13744
            goto err;
13745
        }
13746
13747
        /* Read the header and footer */
13748
        while (i < l && wolfSSL_BIO_read(bio, &pem[i], 1) == 1) {
13749
            i++;
13750
            if (!header) {
13751
                header = XSTRNSTR(pem, "-----BEGIN ", (unsigned int)i);
13752
            }
13753
            else if (!headerEnd) {
13754
                headerEnd = XSTRNSTR(header + XSTR_SIZEOF("-----BEGIN "),
13755
                        "-----",
13756
                        (unsigned int)
13757
                        (i - (header + XSTR_SIZEOF("-----BEGIN ") - pem)));
13758
                if (headerEnd) {
13759
                    headerEnd += XSTR_SIZEOF("-----");
13760
                    /* Read in the newline */
13761
                    if (wolfSSL_BIO_read(bio, &pem[i], 1) != 1) {
13762
                        WOLFSSL_MSG("wolfSSL_BIO_read error");
13763
                        goto err;
13764
                    }
13765
                    i++;
13766
                    if (*headerEnd != '\n' && *headerEnd != '\r') {
13767
                        WOLFSSL_MSG("Missing newline after header");
13768
                        goto err;
13769
                    }
13770
                }
13771
            }
13772
            else if (!footer) {
13773
                footer = XSTRNSTR(headerEnd, "-----END ",
13774
                        (unsigned int)(i - (headerEnd - pem)));
13775
            }
13776
            else if (!footerEnd) {
13777
                footerEnd = XSTRNSTR(footer + XSTR_SIZEOF("-----"),
13778
                        "-----", (unsigned int)(i -
13779
                            (footer + XSTR_SIZEOF("-----") - pem)));
13780
                if (footerEnd) {
13781
                    footerEnd += XSTR_SIZEOF("-----");
13782
                    /* Now check that footer matches header */
13783
                    if ((headerEnd - (header + XSTR_SIZEOF("-----BEGIN "))) ==
13784
                        (footerEnd - (footer + XSTR_SIZEOF("-----END "))) &&
13785
                        XMEMCMP(header + XSTR_SIZEOF("-----BEGIN "),
13786
                                footer + XSTR_SIZEOF("-----END "),
13787
                        headerEnd - (header + XSTR_SIZEOF("-----BEGIN ")))
13788
                            != 0) {
13789
                        WOLFSSL_MSG("Header and footer don't match");
13790
                        goto err;
13791
                    }
13792
                    /* header and footer match */
13793
                    break;
13794
                }
13795
            }
13796
        }
13797
        if (!footerEnd) {
13798
            /* Only check footerEnd since it is set last */
13799
            WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
13800
            goto err;
13801
        }
13802
        else {
13803
            if (PEM_COMPARE_HEADER(header, headerEnd,
13804
                    "-----BEGIN CERTIFICATE-----")) {
13805
                /* We have a certificate */
13806
                WOLFSSL_MSG("Parsing x509 cert");
13807
                *x509 = wolfSSL_X509_load_certificate_buffer(
13808
                        (const unsigned char*) header,
13809
                        (int)(footerEnd - header), WOLFSSL_FILETYPE_PEM);
13810
                if (!*x509) {
13811
                    WOLFSSL_MSG("wolfSSL_X509_load_certificate_buffer error");
13812
                    goto err;
13813
                }
13814
            }
13815
    #ifdef HAVE_CRL
13816
            else if (PEM_COMPARE_HEADER(header, headerEnd,
13817
                        "-----BEGIN X509 CRL-----")) {
13818
                /* We have a crl */
13819
                WOLFSSL_MSG("Parsing crl");
13820
                if ((PemToDer((const unsigned char*) header,
13821
                        (long)(footerEnd - header), CRL_TYPE, &der, NULL, NULL,
13822
                        NULL)) < 0) {
13823
                    WOLFSSL_MSG("PemToDer error");
13824
                    goto err;
13825
                }
13826
                *crl = wolfSSL_d2i_X509_CRL(NULL, der->buffer, der->length);
13827
                if (!*crl) {
13828
                    WOLFSSL_MSG("wolfSSL_d2i_X509_CRL error");
13829
                    goto err;
13830
                }
13831
            }
13832
    #endif
13833
            else {
13834
                WOLFSSL_MSG("Parsing x509 key");
13835
13836
                if (!(*x_pkey = wolfSSL_X509_PKEY_new(NULL))) {
13837
                    WOLFSSL_MSG("wolfSSL_X509_PKEY_new error");
13838
                    goto err;
13839
                }
13840
13841
                if (!(pemBio = wolfSSL_BIO_new(wolfSSL_BIO_s_mem()))) {
13842
                    WOLFSSL_MSG("wolfSSL_BIO_new error");
13843
                    goto err;
13844
                }
13845
13846
                if (wolfSSL_BIO_write(pemBio, header,
13847
                        (int)(footerEnd - header)) != footerEnd - header) {
13848
                    WOLFSSL_MSG("wolfSSL_BIO_new error");
13849
                    goto err;
13850
                }
13851
13852
                if (wolfSSL_PEM_read_bio_PrivateKey(pemBio,
13853
                        &(*x_pkey)->dec_pkey, cb, NULL) == NULL) {
13854
                    WOLFSSL_MSG("wolfSSL_PEM_read_bio_PrivateKey error");
13855
                    goto err;
13856
                }
13857
13858
                wolfSSL_BIO_free(pemBio);
13859
            }
13860
        }
13861
13862
        XFREE(pem, 0, DYNAMIC_TYPE_PEM);
13863
    #ifdef HAVE_CRL
13864
        if (der)
13865
            FreeDer(&der);
13866
    #endif
13867
        return WOLFSSL_SUCCESS;
13868
err:
13869
        XFREE(pem, 0, DYNAMIC_TYPE_PEM);
13870
    #ifdef HAVE_CRL
13871
        if (der)
13872
            FreeDer(&der);
13873
    #endif
13874
        if (*x_pkey) {
13875
            wolfSSL_X509_PKEY_free(*x_pkey);
13876
            *x_pkey = NULL;
13877
        }
13878
        if (pemBio)
13879
            wolfSSL_BIO_free(pemBio);
13880
        return WOLFSSL_FAILURE;
13881
#else /* ! (WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM) */
13882
        return WOLFSSL_FAILURE;
13883
#endif /* WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM */
13884
    }
13885
13886
#ifndef NO_FILESYSTEM
13887
    WOLF_STACK_OF(WOLFSSL_X509_INFO)* wolfSSL_PEM_X509_INFO_read(
13888
            XFILE fp, WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
13889
            pem_password_cb* cb, void* u)
13890
    {
13891
        WOLFSSL_BIO* fileBio = wolfSSL_BIO_new_fp(fp, WOLFSSL_BIO_NOCLOSE);
13892
        WOLF_STACK_OF(WOLFSSL_X509_INFO)* ret = NULL;
13893
13894
        WOLFSSL_ENTER("wolfSSL_PEM_X509_INFO_read");
13895
        if (fileBio != NULL) {
13896
            ret = wolfSSL_PEM_X509_INFO_read_bio(fileBio, sk, cb, u);
13897
            wolfSSL_BIO_free(fileBio);
13898
        }
13899
        return ret;
13900
    }
13901
#endif /* !NO_FILESYSTEM */
13902
13903
    /*
13904
     * bio WOLFSSL_BIO to read certificates from
13905
     * sk  possible stack to push more X509_INFO structs to. Can be NULL
13906
     * cb  callback password for encrypted PEM certificates
13907
     * u   user input such as password
13908
     *
13909
     * returns stack on success and NULL or default stack passed in on fail
13910
     */
13911
    WOLF_STACK_OF(WOLFSSL_X509_INFO)* wolfSSL_PEM_X509_INFO_read_bio(
13912
        WOLFSSL_BIO* bio, WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
13913
        wc_pem_password_cb* cb, void* u)
13914
    {
13915
        WOLF_STACK_OF(WOLFSSL_X509_INFO)* localSk = NULL;
13916
        int ret = WOLFSSL_SUCCESS;
13917
        WOLFSSL_X509_INFO* current = NULL;
13918
        WOLFSSL_X509*      x509 = NULL;
13919
        WOLFSSL_X509_CRL*  crl  = NULL;
13920
        WOLFSSL_X509_PKEY* x_pkey = NULL;
13921
13922
        (void)u;
13923
13924
        WOLFSSL_ENTER("wolfSSL_PEM_X509_INFO_read_bio");
13925
13926
        /* attempt to use passed in stack or create a new one */
13927
        if (sk != NULL) {
13928
            localSk = sk;
13929
        }
13930
        else {
13931
            localSk = wolfSSL_sk_X509_INFO_new_null();
13932
        }
13933
        if (localSk == NULL) {
13934
            WOLFSSL_LEAVE("wolfSSL_PEM_X509_INFO_read_bio",
13935
                    MEMORY_E);
13936
            return NULL;
13937
        }
13938
13939
        /* parse through BIO and push new info's found onto stack */
13940
        while (1) {
13941
            x509 = NULL;
13942
            crl  = NULL;
13943
            x_pkey = NULL;
13944
13945
            if (wolfSSL_PEM_X509_X509_CRL_X509_PKEY_read_bio(bio, cb,
13946
                    &x509, &crl, &x_pkey) == WOLFSSL_SUCCESS) {
13947
                if (current == NULL ||
13948
                        (x509 && current->x509) ||
13949
                        (crl && current->crl) ||
13950
                        (x_pkey && current->x_pkey)) {
13951
                    /* Need to create new current since existing one already
13952
                     * has the member filled or this is the first successful
13953
                     * read. */
13954
                    current = wolfSSL_X509_INFO_new();
13955
                    if (current == NULL) {
13956
                        ret = MEMORY_E;
13957
                        break;
13958
                    }
13959
                    if (wolfSSL_sk_X509_INFO_push(localSk, current) <= 0) {
13960
                        wolfSSL_X509_INFO_free(current);
13961
                        current = NULL;
13962
                        ret = WOLFSSL_FAILURE;
13963
                        break;
13964
                    }
13965
                }
13966
13967
                if (x509) {
13968
                    current->x509 = x509;
13969
                }
13970
                else if (crl) {
13971
                    current->crl = crl;
13972
                }
13973
                else if (x_pkey) {
13974
                    current->x_pkey = x_pkey;
13975
                }
13976
                else {
13977
                    WOLFSSL_MSG("No output parameters set");
13978
                    ret = WOLFSSL_FAILURE;
13979
                    break;
13980
                }
13981
            }
13982
            else {
13983
#ifdef WOLFSSL_HAVE_ERROR_QUEUE
13984
                unsigned long err;
13985
                CLEAR_ASN_NO_PEM_HEADER_ERROR(err);
13986
                if (ERR_GET_LIB(err) != ERR_LIB_PEM ||
13987
                    ERR_GET_REASON(err) != PEM_R_NO_START_LINE) {
13988
                    ret = WOLFSSL_FAILURE;
13989
                }
13990
#else
13991
                if (wolfSSL_sk_X509_INFO_num(localSk) > 0) {
13992
                    WOLFSSL_MSG("At least one X509_INFO object on stack."
13993
                                "Assuming error means EOF or no more PEM"
13994
                                "headers found.");
13995
                }
13996
                else {
13997
                    ret = WOLFSSL_FAILURE;
13998
                }
13999
#endif
14000
                break;
14001
            }
14002
        }
14003
        if (ret != WOLFSSL_SUCCESS ||
14004
                wolfSSL_sk_X509_INFO_num(localSk) == 0) {
14005
            /* current should always be pushed onto the localsk stack at this
14006
             * point. The only case when it isn't is when
14007
             * wolfSSL_sk_X509_INFO_push fails but in that case the current
14008
             * free is handled inside the loop. */
14009
            if (localSk != sk) {
14010
                wolfSSL_sk_pop_free(localSk, NULL);
14011
            }
14012
            wolfSSL_X509_free(x509);
14013
#ifdef HAVE_CRL
14014
            wolfSSL_X509_CRL_free(crl);
14015
#endif
14016
            wolfSSL_X509_PKEY_free(x_pkey);
14017
            localSk = NULL;
14018
        }
14019
        WOLFSSL_LEAVE("wolfSSL_PEM_X509_INFO_read_bio", ret);
14020
        return localSk;
14021
    }
14022
#endif /* !NO_BIO */
14023
#endif /* OPENSSL_ALL */
14024
14025
    void wolfSSL_X509_NAME_ENTRY_free(WOLFSSL_X509_NAME_ENTRY* ne)
14026
    {
14027
        WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_free");
14028
        if (ne != NULL) {
14029
            wolfSSL_ASN1_OBJECT_free(ne->object);
14030
            if (ne->value != NULL) {
14031
                wolfSSL_ASN1_STRING_free(ne->value);
14032
            }
14033
            XFREE(ne, NULL, DYNAMIC_TYPE_NAME_ENTRY);
14034
        }
14035
    }
14036
14037
14038
    WOLFSSL_X509_NAME_ENTRY* wolfSSL_X509_NAME_ENTRY_new(void)
14039
    {
14040
        WOLFSSL_X509_NAME_ENTRY* ne;
14041
14042
        ne = (WOLFSSL_X509_NAME_ENTRY*)XMALLOC(sizeof(WOLFSSL_X509_NAME_ENTRY),
14043
                NULL, DYNAMIC_TYPE_NAME_ENTRY);
14044
        if (ne != NULL) {
14045
            XMEMSET(ne, 0, sizeof(WOLFSSL_X509_NAME_ENTRY));
14046
        }
14047
14048
        return ne;
14049
    }
14050
14051
14052
    static void wolfssl_x509_name_entry_set(WOLFSSL_X509_NAME_ENTRY* ne,
14053
        int nid, int type, const unsigned char *data, int dataSz)
14054
    {
14055
        ne->nid = nid;
14056
        /* Reuse the object if already available. */
14057
        ne->object = wolfSSL_OBJ_nid2obj_ex(nid, ne->object);
14058
        if (ne->value == NULL) {
14059
            ne->value = wolfSSL_ASN1_STRING_type_new(type);
14060
        }
14061
        if (ne->value != NULL) {
14062
            if (wolfSSL_ASN1_STRING_set(ne->value, (const void*)data,
14063
                                            dataSz) == WOLFSSL_SUCCESS) {
14064
                ne->set = 1;
14065
            }
14066
            else {
14067
                /* Free the ASN1_STRING if it is not set. */
14068
                wolfSSL_ASN1_STRING_free(ne->value);
14069
                ne->value = NULL;
14070
            }
14071
        }
14072
    }
14073
14074
    /* Create a new WOLFSSL_X509_NAME_ENTRY structure based on the text passed
14075
     * in. Returns NULL on failure */
14076
    WOLFSSL_X509_NAME_ENTRY* wolfSSL_X509_NAME_ENTRY_create_by_txt(
14077
            WOLFSSL_X509_NAME_ENTRY **neIn, const char *txt, int type,
14078
            const unsigned char *data, int dataSz)
14079
    {
14080
        int nid = -1;
14081
        WOLFSSL_X509_NAME_ENTRY* ne = NULL;
14082
14083
        WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_create_by_txt");
14084
14085
        if (txt == NULL) {
14086
            return NULL;
14087
        }
14088
14089
        if (neIn != NULL) {
14090
            ne = *neIn;
14091
        }
14092
14093
        nid = wolfSSL_OBJ_txt2nid(txt);
14094
        if (nid == WC_NID_undef) {
14095
            WOLFSSL_MSG("Unable to find text");
14096
            ne = NULL;
14097
        }
14098
        else {
14099
            if (ne == NULL) {
14100
                ne = wolfSSL_X509_NAME_ENTRY_new();
14101
                if (ne == NULL) {
14102
                    return NULL;
14103
                }
14104
            }
14105
14106
            wolfssl_x509_name_entry_set(ne, nid, type, data, dataSz);
14107
        }
14108
14109
        return ne;
14110
    }
14111
14112
14113
    /* Creates a new entry given the NID, type, and data
14114
     * "dataSz" is number of bytes in data, if set to -1 then XSTRLEN is used
14115
     * "out" can be used to store the new entry data in an existing structure
14116
     *       if NULL then a new WOLFSSL_X509_NAME_ENTRY structure is created
14117
     * returns a pointer to WOLFSSL_X509_NAME_ENTRY on success and NULL on fail
14118
     */
14119
    WOLFSSL_X509_NAME_ENTRY* wolfSSL_X509_NAME_ENTRY_create_by_NID(
14120
            WOLFSSL_X509_NAME_ENTRY** out, int nid, int type,
14121
            const unsigned char* data, int dataSz)
14122
    {
14123
        WOLFSSL_X509_NAME_ENTRY* ne;
14124
14125
#ifdef WOLFSSL_DEBUG_OPENSSL
14126
        WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_create_by_NID");
14127
#endif
14128
14129
        if (!data) {
14130
            WOLFSSL_MSG("Bad parameter");
14131
            return NULL;
14132
        }
14133
14134
        if (out == NULL || *out == NULL) {
14135
            ne = wolfSSL_X509_NAME_ENTRY_new();
14136
            if (ne == NULL) {
14137
                return NULL;
14138
            }
14139
            if (out != NULL) {
14140
                *out = ne;
14141
            }
14142
        }
14143
        else {
14144
            ne = *out;
14145
        }
14146
14147
        wolfssl_x509_name_entry_set(ne, nid, type, data, dataSz);
14148
14149
        return ne;
14150
    }
14151
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
14152
14153
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL) || \
14154
    defined(HAVE_LIGHTY) || defined(WOLFSSL_MYSQL_COMPATIBLE) || \
14155
    defined(HAVE_STUNNEL) || defined(WOLFSSL_NGINX) || \
14156
    defined(HAVE_POCO_LIB) || defined(WOLFSSL_HAPROXY)
14157
WOLFSSL_ASN1_OBJECT* wolfSSL_X509_NAME_ENTRY_get_object(
14158
    WOLFSSL_X509_NAME_ENTRY *ne)
14159
{
14160
    WOLFSSL_ASN1_OBJECT* object = NULL;
14161
14162
#ifdef WOLFSSL_DEBUG_OPENSSL
14163
    WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_get_object");
14164
#endif
14165
14166
    if (ne != NULL) {
14167
        /* Create object from nid - reuse existing object if possible. */
14168
        object = wolfSSL_OBJ_nid2obj_ex(ne->nid, ne->object);
14169
        if (object != NULL) {
14170
            /* Set the object when no error. */
14171
            ne->object = object;
14172
        }
14173
    }
14174
14175
    return object;
14176
}
14177
#endif /* OPENSSL_ALL || HAVE_LIGHTY || WOLFSSL_MYSQL_COMPATIBLE ||
14178
        * HAVE_STUNNEL || WOLFSSL_NGINX || HAVE_POCO_LIB || WOLFSSL_HAPROXY */
14179
14180
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
14181
    /* add all entry of type "nid" to the buffer "fullName" and advance "idx"
14182
     * since number of entries is small, a brute force search is used here
14183
     * returns the number of entries added
14184
     */
14185
    static int AddAllEntry(WOLFSSL_X509_NAME* name, char* fullName,
14186
            int fullNameSz, int* idx)
14187
    {
14188
        int i;
14189
        int ret = 0;
14190
14191
        for (i = 0; i < MAX_NAME_ENTRIES; i++) {
14192
            if (name->entry[i].set) {
14193
                WOLFSSL_X509_NAME_ENTRY* e;
14194
                WOLFSSL_ASN1_OBJECT* obj;
14195
14196
                int sz;
14197
                unsigned char* data;
14198
14199
                e = &name->entry[i];
14200
                obj = wolfSSL_X509_NAME_ENTRY_get_object(e);
14201
                if (obj == NULL) {
14202
                    return BAD_FUNC_ARG;
14203
                }
14204
14205
                XMEMCPY(fullName + *idx, "/", 1); *idx = *idx + 1;
14206
                sz = (int)XSTRLEN(obj->sName);
14207
                XMEMCPY(fullName + *idx, obj->sName, sz);
14208
                *idx += sz;
14209
                XMEMCPY(fullName + *idx, "=", 1); *idx = *idx + 1;
14210
14211
                data = wolfSSL_ASN1_STRING_data(e->value);
14212
                if (data != NULL) {
14213
                    sz = (int)XSTRLEN((const char*)data);
14214
                    XMEMCPY(fullName + *idx, data, sz);
14215
                    *idx += sz;
14216
                }
14217
14218
                ret++;
14219
            }
14220
        }
14221
        (void)fullNameSz;
14222
        return ret;
14223
    }
14224
14225
14226
    /* Converts a list of entries in WOLFSSL_X509_NAME struct into a string
14227
     * returns 0 on success */
14228
    static int RebuildFullName(WOLFSSL_X509_NAME* name)
14229
    {
14230
        int totalLen = 0, i, idx, entryCount = 0;
14231
14232
        if (name == NULL)
14233
            return BAD_FUNC_ARG;
14234
14235
        for (i = 0; i < MAX_NAME_ENTRIES; i++) {
14236
            if (name->entry[i].set) {
14237
                WOLFSSL_X509_NAME_ENTRY* e;
14238
                WOLFSSL_ASN1_OBJECT* obj;
14239
14240
                e = &name->entry[i];
14241
                obj = wolfSSL_X509_NAME_ENTRY_get_object(e);
14242
                if (obj == NULL)
14243
                    return BAD_FUNC_ARG;
14244
14245
                totalLen += (int)XSTRLEN(obj->sName) + 2;/*+2 for '/' and '=' */
14246
                totalLen += wolfSSL_ASN1_STRING_length(e->value);
14247
            }
14248
        }
14249
14250
        if (name->dynamicName) {
14251
            XFREE(name->name, name->heap, DYNAMIC_TYPE_X509);
14252
            name->name = name->staticName;
14253
            name->dynamicName = 0;
14254
        }
14255
14256
        if (totalLen >= ASN_NAME_MAX) {
14257
            name->name = (char*)XMALLOC(totalLen + 1, name->heap,
14258
                    DYNAMIC_TYPE_X509);
14259
            if (name->name == NULL)
14260
                return MEMORY_E;
14261
            name->dynamicName = 1;
14262
        }
14263
14264
        idx = 0;
14265
        entryCount = AddAllEntry(name, name->name, totalLen, &idx);
14266
        if (entryCount < 0)
14267
            return entryCount;
14268
14269
        name->name[idx] = '\0';
14270
        name->sz = idx + 1; /* size includes null terminator */
14271
        name->entrySz = entryCount;
14272
14273
        return 0;
14274
    }
14275
14276
    /* Copies entry into name. With it being copied freeing entry becomes the
14277
     * callers responsibility.
14278
     * returns 1 for success and 0 for error */
14279
    int wolfSSL_X509_NAME_add_entry(WOLFSSL_X509_NAME* name,
14280
            WOLFSSL_X509_NAME_ENTRY* entry, int idx, int set)
14281
    {
14282
        WOLFSSL_X509_NAME_ENTRY* current = NULL;
14283
        int ret, i;
14284
14285
#ifdef WOLFSSL_DEBUG_OPENSSL
14286
        WOLFSSL_ENTER("wolfSSL_X509_NAME_add_entry");
14287
#endif
14288
14289
        if (name == NULL || entry == NULL || entry->value == NULL) {
14290
            WOLFSSL_MSG("NULL argument passed in");
14291
            return WOLFSSL_FAILURE;
14292
        }
14293
14294
        if (idx >= 0) {
14295
            /* place in specific index */
14296
14297
            if (idx >= MAX_NAME_ENTRIES) {
14298
                WOLFSSL_MSG("Error index to insert entry is larger than array");
14299
                return WOLFSSL_FAILURE;
14300
            }
14301
            i = idx;
14302
        }
14303
        else {
14304
            /* iterate through and find first open spot */
14305
            for (i = 0; i < MAX_NAME_ENTRIES; i++) {
14306
                if (name->entry[i].set == 0) { /* not set so overwritten */
14307
                    WOLFSSL_MSG("Found place for name entry");
14308
                    break;
14309
                }
14310
            }
14311
14312
            if (i == MAX_NAME_ENTRIES) {
14313
                WOLFSSL_MSG("No spot found for name entry");
14314
                return WOLFSSL_FAILURE;
14315
            }
14316
        }
14317
14318
        current = &name->entry[i];
14319
        if (current->set == 0)
14320
            name->entrySz++;
14321
14322
        if (wolfSSL_X509_NAME_ENTRY_create_by_NID(&current,
14323
                            entry->nid,
14324
                            wolfSSL_ASN1_STRING_type(entry->value),
14325
                            wolfSSL_ASN1_STRING_data(entry->value),
14326
                            wolfSSL_ASN1_STRING_length(entry->value)) != NULL)
14327
        {
14328
            ret = WOLFSSL_SUCCESS;
14329
        #ifdef OPENSSL_ALL
14330
            if (name->entries == NULL) {
14331
                name->entries = wolfSSL_sk_X509_NAME_new(NULL);
14332
            }
14333
            if (wolfSSL_sk_X509_NAME_ENTRY_push(name->entries, current) <= 0) {
14334
                ret = WOLFSSL_FAILURE;
14335
            }
14336
        #endif
14337
        }
14338
        else {
14339
            ret = WOLFSSL_FAILURE;
14340
        }
14341
14342
        if (ret != WOLFSSL_SUCCESS) {
14343
            WOLFSSL_MSG("Error adding the name entry");
14344
            if (current->set == 0)
14345
                name->entrySz--;
14346
            return WOLFSSL_FAILURE;
14347
        }
14348
14349
#ifdef WOLFSSL_PYTHON
14350
        /* Set name index for OpenSSL stack index position and so Python can
14351
         * generate tuples/sets from the list. */
14352
        for (i = 0; i < MAX_NAME_ENTRIES; i++) {
14353
            if (name->entry[i].set != 0)
14354
                name->entry[i].set = i + 1;
14355
        }
14356
#endif
14357
14358
        if (RebuildFullName(name) != 0)
14359
            return WOLFSSL_FAILURE;
14360
14361
        (void)set;
14362
        return WOLFSSL_SUCCESS;
14363
    }
14364
14365
    int wolfSSL_X509_NAME_add_entry_by_txt(WOLFSSL_X509_NAME *name,
14366
                                           const char *field, int type,
14367
                                           const unsigned char *bytes, int len,
14368
                                           int loc, int set)
14369
    {
14370
        int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
14371
        int nid;
14372
        WOLFSSL_X509_NAME_ENTRY* entry;
14373
14374
        (void)type;
14375
        WOLFSSL_ENTER("wolfSSL_X509_NAME_add_entry_by_txt");
14376
14377
        if (name == NULL || field == NULL)
14378
            return WOLFSSL_FAILURE;
14379
14380
        if ((nid = wolfSSL_OBJ_txt2nid(field)) == WC_NID_undef) {
14381
            WOLFSSL_MSG("Unable convert text to NID");
14382
            return WOLFSSL_FAILURE;
14383
        }
14384
14385
        entry = wolfSSL_X509_NAME_ENTRY_create_by_NID(NULL,
14386
                  nid, type, (unsigned char*)bytes, len);
14387
        if (entry == NULL)
14388
            return WOLFSSL_FAILURE;
14389
14390
        ret = wolfSSL_X509_NAME_add_entry(name, entry, loc, set);
14391
        wolfSSL_X509_NAME_ENTRY_free(entry);
14392
14393
        return ret;
14394
    }
14395
14396
    int wolfSSL_X509_NAME_add_entry_by_NID(WOLFSSL_X509_NAME *name, int nid,
14397
                                           int type, const unsigned char *bytes,
14398
                                           int len, int loc, int set)
14399
    {
14400
        int ret;
14401
        WOLFSSL_X509_NAME_ENTRY* entry;
14402
        WOLFSSL_ENTER("wolfSSL_X509_NAME_add_entry_by_NID");
14403
        entry = wolfSSL_X509_NAME_ENTRY_create_by_NID(NULL, nid, type, bytes,
14404
                len);
14405
        if (entry == NULL)
14406
            return WOLFSSL_FAILURE;
14407
        ret = wolfSSL_X509_NAME_add_entry(name, entry, loc, set);
14408
        wolfSSL_X509_NAME_ENTRY_free(entry);
14409
        return ret;
14410
    }
14411
14412
    WOLFSSL_X509_NAME_ENTRY *wolfSSL_X509_NAME_delete_entry(
14413
            WOLFSSL_X509_NAME *name, int loc)
14414
    {
14415
        WOLFSSL_X509_NAME_ENTRY* ret;
14416
        WOLFSSL_ENTER("wolfSSL_X509_NAME_delete_entry");
14417
14418
        if (!name) {
14419
            WOLFSSL_MSG("Bad parameter");
14420
            return NULL;
14421
        }
14422
14423
        ret = wolfSSL_X509_NAME_get_entry(name, loc);
14424
        if (!ret) {
14425
            WOLFSSL_MSG("loc entry not found");
14426
            return NULL;
14427
        }
14428
        name->entry[loc].set = 0;
14429
#ifdef WOLFSSL_PYTHON
14430
        {
14431
            int i;
14432
            /* Set name index for OpenSSL stack index position and so Python can
14433
            * generate tuples/sets from the list. */
14434
            for (i = 0; i < MAX_NAME_ENTRIES; i++) {
14435
                if (name->entry[i].set != 0)
14436
                    name->entry[i].set = i + 1;
14437
            }
14438
        }
14439
#endif
14440
        return ret;
14441
    }
14442
14443
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
14444
14445
#if defined(OPENSSL_EXTRA) && !defined(NO_ASN)
14446
    int wolfSSL_X509_NAME_get_index_by_OBJ(WOLFSSL_X509_NAME *name,
14447
                                           const WOLFSSL_ASN1_OBJECT *obj,
14448
                                           int idx) {
14449
        if (!name || idx >= MAX_NAME_ENTRIES ||
14450
                !obj || !obj->obj) {
14451
            return WOLFSSL_FATAL_ERROR;
14452
        }
14453
14454
        if (idx < 0) {
14455
            idx = -1;
14456
        }
14457
14458
        for (idx++; idx < MAX_NAME_ENTRIES; idx++) {
14459
            /* Find index of desired name */
14460
            if (name->entry[idx].set) {
14461
                if (XSTRLEN(obj->sName) ==
14462
                        XSTRLEN(name->entry[idx].object->sName) &&
14463
                    XSTRNCMP((const char*) obj->sName,
14464
                        name->entry[idx].object->sName, obj->objSz - 1) == 0) {
14465
                    return idx;
14466
                }
14467
            }
14468
        }
14469
        return WOLFSSL_FATAL_ERROR;
14470
    }
14471
#endif
14472
14473
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
14474
    defined(OPENSSL_EXTRA_X509_SMALL)
14475
14476
#ifdef OPENSSL_EXTRA
14477
    int wolfSSL_X509_NAME_ENTRY_set(const WOLFSSL_X509_NAME_ENTRY *ne)
14478
    {
14479
        if (ne != NULL) {
14480
            return ne->set;
14481
        }
14482
        return 0;
14483
    }
14484
#endif
14485
14486
14487
    /* returns a pointer to the internal entry at location 'loc' on success,
14488
     * a null pointer is returned in fail cases */
14489
    WOLFSSL_X509_NAME_ENTRY *wolfSSL_X509_NAME_get_entry(
14490
                                        const WOLFSSL_X509_NAME *name, int loc)
14491
    {
14492
#ifdef WOLFSSL_DEBUG_OPENSSL
14493
        WOLFSSL_ENTER("wolfSSL_X509_NAME_get_entry");
14494
#endif
14495
14496
        if (name == NULL) {
14497
            return NULL;
14498
        }
14499
14500
        if (loc < 0 || loc >= MAX_NAME_ENTRIES) {
14501
            WOLFSSL_MSG("Bad argument");
14502
            return NULL;
14503
        }
14504
14505
        if (name->entry[loc].set) {
14506
            return (WOLFSSL_X509_NAME_ENTRY*)&name->entry[loc];
14507
        }
14508
        else {
14509
            return NULL;
14510
        }
14511
    }
14512
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
14513
14514
#ifdef OPENSSL_EXTRA
14515
14516
int wolfSSL_X509_check_private_key(WOLFSSL_X509 *x509, WOLFSSL_EVP_PKEY *key)
14517
{
14518
    WOLFSSL_ENTER("wolfSSL_X509_check_private_key");
14519
14520
    if (!x509 || !key) {
14521
        WOLFSSL_MSG("Bad parameter");
14522
        return WOLFSSL_FAILURE;
14523
    }
14524
14525
#ifndef NO_CHECK_PRIVATE_KEY
14526
    return wc_CheckPrivateKey((byte*)key->pkey.ptr, key->pkey_sz,
14527
            x509->pubKey.buffer, x509->pubKey.length,
14528
            (enum Key_Sum)x509->pubKeyOID, key->heap) == 1 ?
14529
                    WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
14530
#else
14531
    /* not compiled in */
14532
    return WOLFSSL_SUCCESS;
14533
#endif
14534
}
14535
14536
#endif /* OPENSSL_EXTRA */
14537
14538
#if defined(HAVE_LIGHTY) || defined(HAVE_STUNNEL) \
14539
    || defined(WOLFSSL_MYSQL_COMPATIBLE) || defined(OPENSSL_EXTRA)
14540
#ifndef NO_BIO
14541
14542
#ifdef WOLFSSL_CERT_GEN
14543
14544
#ifdef WOLFSSL_CERT_REQ
14545
/* writes the x509 from x to the WOLFSSL_BIO bp
14546
 *
14547
 * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on fail
14548
 */
14549
int wolfSSL_PEM_write_bio_X509_REQ(WOLFSSL_BIO *bp, WOLFSSL_X509 *x)
14550
{
14551
    byte* pem;
14552
    int   pemSz = 0;
14553
    const unsigned char* der;
14554
    int derSz;
14555
    int ret;
14556
14557
    WOLFSSL_ENTER("wolfSSL_PEM_write_bio_X509_REQ");
14558
14559
    if (x == NULL || bp == NULL) {
14560
        return WOLFSSL_FAILURE;
14561
    }
14562
14563
    der = wolfSSL_X509_get_der(x, &derSz);
14564
    if (der == NULL) {
14565
        return WOLFSSL_FAILURE;
14566
    }
14567
14568
    /* get PEM size */
14569
    pemSz = wc_DerToPemEx(der, (word32)derSz, NULL, 0, NULL, CERTREQ_TYPE);
14570
    if (pemSz < 0) {
14571
        return WOLFSSL_FAILURE;
14572
    }
14573
14574
    /* create PEM buffer and convert from DER */
14575
    pem = (byte*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14576
    if (pem == NULL) {
14577
        return WOLFSSL_FAILURE;
14578
    }
14579
    if (wc_DerToPemEx(der, (word32)derSz, pem, pemSz, NULL, CERTREQ_TYPE) < 0) {
14580
        XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14581
        return WOLFSSL_FAILURE;
14582
    }
14583
14584
    /* write the PEM to BIO */
14585
    ret = wolfSSL_BIO_write(bp, pem, pemSz);
14586
    XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14587
14588
    if (ret <= 0) return WOLFSSL_FAILURE;
14589
    return WOLFSSL_SUCCESS;
14590
}
14591
#endif /* WOLFSSL_CERT_REQ */
14592
14593
14594
/* writes the x509 from x to the WOLFSSL_BIO bp
14595
 *
14596
 * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on fail
14597
 */
14598
int wolfSSL_PEM_write_bio_X509_AUX(WOLFSSL_BIO *bp, WOLFSSL_X509 *x)
14599
{
14600
    byte* pem;
14601
    int   pemSz = 0;
14602
    const unsigned char* der;
14603
    int derSz;
14604
    int ret;
14605
14606
    WOLFSSL_ENTER("wolfSSL_PEM_write_bio_X509_AUX");
14607
14608
    if (bp == NULL || x == NULL) {
14609
        WOLFSSL_MSG("NULL argument passed in");
14610
        return WOLFSSL_FAILURE;
14611
    }
14612
14613
    der = wolfSSL_X509_get_der(x, &derSz);
14614
    if (der == NULL) {
14615
        return WOLFSSL_FAILURE;
14616
    }
14617
14618
    /* get PEM size */
14619
    pemSz = wc_DerToPemEx(der, (word32)derSz, NULL, 0, NULL, CERT_TYPE);
14620
    if (pemSz < 0) {
14621
        return WOLFSSL_FAILURE;
14622
    }
14623
14624
    /* create PEM buffer and convert from DER */
14625
    pem = (byte*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14626
    if (pem == NULL) {
14627
        return WOLFSSL_FAILURE;
14628
    }
14629
    if (wc_DerToPemEx(der, (word32)derSz, pem, pemSz, NULL, CERT_TYPE) < 0) {
14630
        XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14631
        return WOLFSSL_FAILURE;
14632
    }
14633
14634
    /* write the PEM to BIO */
14635
    ret = wolfSSL_BIO_write(bp, pem, pemSz);
14636
    XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14637
14638
    if (ret <= 0) return WOLFSSL_FAILURE;
14639
    return WOLFSSL_SUCCESS;
14640
}
14641
14642
int wolfSSL_PEM_write_bio_X509(WOLFSSL_BIO *bio, WOLFSSL_X509 *cert)
14643
{
14644
    byte* pem = NULL;
14645
    int   pemSz = 0;
14646
    /* Get large buffer to hold cert der */
14647
    const byte* der = NULL;
14648
    int derSz = X509_BUFFER_SZ;
14649
    int ret;
14650
14651
    WOLFSSL_ENTER("wolfSSL_PEM_write_bio_X509");
14652
14653
    if (bio == NULL || cert == NULL) {
14654
        WOLFSSL_MSG("NULL argument passed in");
14655
        return WOLFSSL_FAILURE;
14656
    }
14657
14658
    /* Do not call wolfssl_x509_make_der() here. If we did, then need to re-sign
14659
     * because we don't know the original order of the extensions and so we must
14660
     * assume our extensions are in a different order, thus need to re-sign. */
14661
    der = wolfSSL_X509_get_der(cert, &derSz);
14662
    if (der == NULL) {
14663
        goto error;
14664
    }
14665
14666
    /* get PEM size */
14667
    pemSz = wc_DerToPemEx(der, (word32)derSz, NULL, 0, NULL, CERT_TYPE);
14668
    if (pemSz < 0) {
14669
        goto error;
14670
    }
14671
14672
    /* create PEM buffer and convert from DER */
14673
    pem = (byte*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14674
    if (pem == NULL) {
14675
        goto error;
14676
    }
14677
    if (wc_DerToPemEx(der, (word32)derSz, pem, pemSz, NULL, CERT_TYPE) < 0) {
14678
        goto error;
14679
    }
14680
14681
    /* write the PEM to BIO */
14682
    ret = wolfSSL_BIO_write(bio, pem, pemSz);
14683
    XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14684
14685
    if (ret <= 0) return WOLFSSL_FAILURE;
14686
    return WOLFSSL_SUCCESS;
14687
14688
error:
14689
    XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14690
    return WOLFSSL_FAILURE;
14691
}
14692
#endif /* WOLFSSL_CERT_GEN */
14693
14694
#endif /* !NO_BIO */
14695
#endif /* HAVE_LIGHTY || HAVE_STUNNEL || WOLFSSL_MYSQL_COMPATIBLE */
14696
14697
#if defined(OPENSSL_EXTRA) || defined(HAVE_STUNNEL) || \
14698
        defined(WOLFSSL_NGINX) || defined(HAVE_LIGHTY) || \
14699
        defined(WOLFSSL_HAPROXY) || defined(WOLFSSL_OPENSSH) || \
14700
        defined(HAVE_SBLIM_SFCB)
14701
14702
WOLF_STACK_OF(WOLFSSL_X509_NAME)* wolfSSL_sk_X509_NAME_new(
14703
        WOLF_SK_COMPARE_CB(WOLFSSL_X509_NAME, cb))
14704
{
14705
    WOLFSSL_STACK* sk;
14706
    (void)cb;
14707
14708
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_new");
14709
14710
    sk = wolfSSL_sk_new_node(NULL);
14711
    if (sk != NULL) {
14712
        sk->type = STACK_TYPE_X509_NAME;
14713
    }
14714
14715
    return sk;
14716
}
14717
14718
int wolfSSL_sk_X509_NAME_num(const WOLF_STACK_OF(WOLFSSL_X509_NAME) *sk)
14719
{
14720
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_num");
14721
14722
    if (sk == NULL)
14723
        return BAD_FUNC_ARG;
14724
14725
    return (int)sk->num;
14726
}
14727
14728
/* Getter function for WOLFSSL_X509_NAME pointer
14729
 *
14730
 * sk is the stack to retrieve pointer from
14731
 * i  is the index value in stack
14732
 *
14733
 * returns a pointer to a WOLFSSL_X509_NAME structure on success and NULL on
14734
 *         fail
14735
 */
14736
WOLFSSL_X509_NAME* wolfSSL_sk_X509_NAME_value(
14737
    const WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk, int i)
14738
{
14739
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_value");
14740
    return (WOLFSSL_X509_NAME*)wolfSSL_sk_value(sk, i);
14741
}
14742
14743
WOLFSSL_X509_NAME* wolfSSL_sk_X509_NAME_pop(
14744
    WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
14745
{
14746
    return (WOLFSSL_X509_NAME*)wolfSSL_sk_pop(sk);
14747
}
14748
14749
void wolfSSL_sk_X509_NAME_pop_free(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
14750
    void (*f) (WOLFSSL_X509_NAME*))
14751
{
14752
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_pop_free");
14753
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
14754
}
14755
14756
/* Free only the sk structure, NOT X509_NAME members */
14757
void wolfSSL_sk_X509_NAME_free(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
14758
{
14759
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_free");
14760
    wolfSSL_sk_free(sk);
14761
}
14762
14763
int wolfSSL_sk_X509_NAME_push(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
14764
    WOLFSSL_X509_NAME* name)
14765
{
14766
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_push");
14767
14768
    return wolfSSL_sk_push(sk, name);
14769
}
14770
14771
/* return index of found, or negative to indicate not found */
14772
int wolfSSL_sk_X509_NAME_find(const WOLF_STACK_OF(WOLFSSL_X509_NAME) *sk,
14773
    WOLFSSL_X509_NAME *name)
14774
{
14775
    int i;
14776
14777
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_find");
14778
14779
    if (sk == NULL)
14780
        return BAD_FUNC_ARG;
14781
14782
    for (i = 0; sk; i++, sk = sk->next) {
14783
        if (wolfSSL_X509_NAME_cmp(sk->data.name, name) == 0) {
14784
            return i;
14785
        }
14786
    }
14787
    return WOLFSSL_FATAL_ERROR;
14788
}
14789
14790
/* Name Entry */
14791
WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* wolfSSL_sk_X509_NAME_ENTRY_new(
14792
    WOLF_SK_COMPARE_CB(WOLFSSL_X509_NAME_ENTRY, cb))
14793
{
14794
    WOLFSSL_STACK* sk = wolfSSL_sk_new_node(NULL);
14795
    if (sk != NULL) {
14796
        sk->type = STACK_TYPE_X509_NAME_ENTRY;
14797
        (void)cb;
14798
    }
14799
    return sk;
14800
}
14801
14802
int wolfSSL_sk_X509_NAME_ENTRY_push(WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk,
14803
    WOLFSSL_X509_NAME_ENTRY* name_entry)
14804
{
14805
    return wolfSSL_sk_push(sk, name_entry);
14806
}
14807
14808
WOLFSSL_X509_NAME_ENTRY* wolfSSL_sk_X509_NAME_ENTRY_value(
14809
    const WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk, int i)
14810
{
14811
    return (WOLFSSL_X509_NAME_ENTRY*)wolfSSL_sk_value(sk, i);
14812
}
14813
14814
int wolfSSL_sk_X509_NAME_ENTRY_num(
14815
    const WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk)
14816
{
14817
    if (sk == NULL)
14818
        return BAD_FUNC_ARG;
14819
    return (int)sk->num;
14820
}
14821
14822
void wolfSSL_sk_X509_NAME_ENTRY_free(WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk)
14823
{
14824
    wolfSSL_sk_free(sk);
14825
}
14826
14827
#endif /* OPENSSL_EXTRA || HAVE_STUNNEL || WOLFSSL_NGINX ||
14828
            HAVE_LIGHTY || WOLFSSL_HAPROXY ||
14829
            WOLFSSL_OPENSSH || HAVE_SBLIM_SFCB */
14830
14831
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
14832
    (defined(HAVE_STUNNEL) || defined(WOLFSSL_NGINX) || \
14833
    defined(HAVE_LIGHTY) || defined(WOLFSSL_HAPROXY) || \
14834
    defined(WOLFSSL_OPENSSH) || defined(HAVE_SBLIM_SFCB))
14835
14836
#if defined(OPENSSL_ALL)
14837
WOLFSSL_X509_INFO* wolfSSL_X509_INFO_new(void)
14838
{
14839
    WOLFSSL_X509_INFO* info;
14840
    info = (WOLFSSL_X509_INFO*)XMALLOC(sizeof(WOLFSSL_X509_INFO), NULL,
14841
        DYNAMIC_TYPE_X509);
14842
    if (info) {
14843
        XMEMSET(info, 0, sizeof(*info));
14844
    }
14845
    return info;
14846
}
14847
14848
void wolfSSL_X509_INFO_free(WOLFSSL_X509_INFO* info)
14849
{
14850
    if (info == NULL)
14851
        return;
14852
14853
    if (info->x509) {
14854
        wolfSSL_X509_free(info->x509);
14855
        info->x509 = NULL;
14856
    }
14857
#ifdef HAVE_CRL
14858
    if (info->crl) {
14859
        wolfSSL_X509_CRL_free(info->crl);
14860
        info->crl = NULL;
14861
    }
14862
#endif
14863
    wolfSSL_X509_PKEY_free(info->x_pkey);
14864
    info->x_pkey = NULL;
14865
14866
    XFREE(info, NULL, DYNAMIC_TYPE_X509);
14867
}
14868
#endif
14869
14870
WOLFSSL_STACK* wolfSSL_sk_X509_INFO_new_null(void)
14871
{
14872
    WOLFSSL_STACK* sk = wolfSSL_sk_new_node(NULL);
14873
    if (sk) {
14874
        sk->type = STACK_TYPE_X509_INFO;
14875
    }
14876
    return sk;
14877
}
14878
14879
int wolfSSL_sk_X509_INFO_num(const WOLF_STACK_OF(WOLFSSL_X509_INFO) *sk)
14880
{
14881
    WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_num");
14882
14883
    return wolfSSL_sk_num(sk);
14884
}
14885
14886
WOLFSSL_X509_INFO* wolfSSL_sk_X509_INFO_value(
14887
        const WOLF_STACK_OF(WOLFSSL_X509_INFO) *sk, int i)
14888
{
14889
    WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_value");
14890
14891
    return (WOLFSSL_X509_INFO *)wolfSSL_sk_value(sk, i);
14892
}
14893
14894
WOLFSSL_X509_INFO* wolfSSL_sk_X509_INFO_pop(
14895
        WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk)
14896
{
14897
    return (WOLFSSL_X509_INFO*)wolfSSL_sk_pop(sk);
14898
}
14899
14900
#if defined(OPENSSL_ALL)
14901
void wolfSSL_sk_X509_INFO_pop_free(WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
14902
    void (*f) (WOLFSSL_X509_INFO*))
14903
{
14904
    WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_pop_free");
14905
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
14906
}
14907
14908
void wolfSSL_sk_X509_INFO_free(WOLF_STACK_OF(WOLFSSL_X509_INFO) *sk)
14909
{
14910
    WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_free");
14911
    wolfSSL_sk_free(sk);
14912
}
14913
14914
/* Adds the WOLFSSL_X509_INFO to the stack "sk". "sk" takes control of "in" and
14915
 * tries to free it when the stack is free'd.
14916
 *
14917
 * return number of elements on success 0 on fail
14918
 */
14919
int wolfSSL_sk_X509_INFO_push(WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
14920
                                                      WOLFSSL_X509_INFO* in)
14921
{
14922
    return wolfSSL_sk_push(sk, in);
14923
}
14924
14925
/* Creates a duplicate of WOLF_STACK_OF(WOLFSSL_X509_NAME).
14926
 * Returns a new WOLF_STACK_OF(WOLFSSL_X509_NAME) or NULL on failure */
14927
WOLF_STACK_OF(WOLFSSL_X509_NAME) *wolfSSL_dup_CA_list(
14928
    WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
14929
{
14930
    int i;
14931
    const int num = wolfSSL_sk_X509_NAME_num(sk);
14932
    WOLF_STACK_OF(WOLFSSL_X509_NAME) *copy;
14933
    WOLFSSL_X509_NAME *name;
14934
14935
    WOLFSSL_ENTER("wolfSSL_dup_CA_list");
14936
14937
    copy = wolfSSL_sk_X509_NAME_new(NULL);
14938
    if (copy == NULL) {
14939
        WOLFSSL_MSG("Memory error");
14940
        return NULL;
14941
    }
14942
14943
    for (i = 0; i < num; i++) {
14944
        name = wolfSSL_X509_NAME_dup(wolfSSL_sk_X509_NAME_value(sk, i));
14945
        if (name == NULL || wolfSSL_sk_X509_NAME_push(copy, name) <= 0) {
14946
            WOLFSSL_MSG("Memory error");
14947
            wolfSSL_sk_X509_NAME_pop_free(copy, wolfSSL_X509_NAME_free);
14948
            wolfSSL_X509_NAME_free(name);
14949
            return NULL;
14950
        }
14951
    }
14952
14953
    return copy;
14954
}
14955
14956
void* wolfSSL_sk_X509_OBJECT_value(WOLF_STACK_OF(WOLFSSL_X509_OBJECT)* sk,
14957
    int i)
14958
{
14959
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_value");
14960
    for (; sk != NULL && i > 0; i--)
14961
        sk = sk->next;
14962
14963
    if (i != 0 || sk == NULL)
14964
        return NULL;
14965
    return sk->data.x509_obj;
14966
}
14967
14968
int wolfSSL_sk_X509_OBJECT_num(const WOLF_STACK_OF(WOLFSSL_X509_OBJECT) *s)
14969
{
14970
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_num");
14971
    if (s) {
14972
        return (int)s->num;
14973
    }
14974
    else {
14975
        return 0;
14976
    }
14977
}
14978
14979
int wolfSSL_sk_X509_NAME_set_cmp_func(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
14980
    WOLF_SK_COMPARE_CB(WOLFSSL_X509_NAME, cb))
14981
{
14982
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_set_cmp_func");
14983
14984
    if (sk == NULL)
14985
        return BAD_FUNC_ARG;
14986
14987
    WOLFSSL_MSG("Stack comparison not used in wolfSSL");
14988
    (void)cb;
14989
    return 0;
14990
}
14991
#endif /* OPENSSL_ALL */
14992
14993
#ifndef NO_BIO
14994
14995
/* Helper function for X509_NAME_print_ex. Sets *buf to string for domain
14996
   name attribute based on NID. Returns size of buf */
14997
static int get_dn_attr_by_nid(int n, const char** buf)
14998
{
14999
    int len = 0;
15000
    const char *str;
15001
15002
    switch(n)
15003
    {
15004
        case WC_NID_commonName :
15005
            str = "CN";
15006
            len = 2;
15007
            break;
15008
        case WC_NID_countryName:
15009
            str = "C";
15010
            len = 1;
15011
            break;
15012
        case WC_NID_localityName:
15013
            str = "L";
15014
            len = 1;
15015
            break;
15016
        case WC_NID_stateOrProvinceName:
15017
            str = "ST";
15018
            len = 2;
15019
            break;
15020
        case WC_NID_streetAddress:
15021
            str = "street";
15022
            len = 6;
15023
            break;
15024
        case WC_NID_organizationName:
15025
            str = "O";
15026
            len = 1;
15027
            break;
15028
        case WC_NID_organizationalUnitName:
15029
            str = "OU";
15030
            len = 2;
15031
            break;
15032
        case WC_NID_postalCode:
15033
            str = "postalCode";
15034
            len = 10;
15035
            break;
15036
        case WC_NID_emailAddress:
15037
            str = "emailAddress";
15038
            len = 12;
15039
            break;
15040
        case WC_NID_surname:
15041
            str = "SN";
15042
            len = 2;
15043
            break;
15044
        case WC_NID_givenName:
15045
            str = "GN";
15046
            len = 2;
15047
            break;
15048
        case WC_NID_dnQualifier:
15049
            str = "dnQualifier";
15050
            len = 11;
15051
            break;
15052
        case WC_NID_name:
15053
            str = "name";
15054
            len = 4;
15055
            break;
15056
        case WC_NID_initials:
15057
            str = "initials";
15058
            len = 8;
15059
            break;
15060
        case WC_NID_domainComponent:
15061
            str = "DC";
15062
            len = 2;
15063
            break;
15064
        case WC_NID_pkcs9_contentType:
15065
            str = "contentType";
15066
            len = 11;
15067
            break;
15068
        case WC_NID_userId:
15069
            str = "UID";
15070
            len = 3;
15071
            break;
15072
        case WC_NID_serialNumber:
15073
            str = "serialNumber";
15074
            len = 12;
15075
            break;
15076
        case WC_NID_title:
15077
            str = "title";
15078
            len = 5;
15079
            break;
15080
        case WC_NID_rfc822Mailbox:
15081
            str = "mail";
15082
            len = 4;
15083
            break;
15084
        default:
15085
            WOLFSSL_MSG("Attribute type not found");
15086
            str = NULL;
15087
15088
    }
15089
    if (buf != NULL)
15090
        *buf = str;
15091
    return len;
15092
}
15093
15094
/**
15095
 * Escape input string for RFC2253 requirements. The following characters
15096
 * are escaped with a backslash (\):
15097
 *
15098
 *     1. A space or '#' at the beginning of the string
15099
 *     2. A space at the end of the string
15100
 *     3. One of: ",", "+", """, "\", "<", ">", ";"
15101
 *
15102
 * in    - input string to escape
15103
 * inSz  - length of in, not including the null terminator
15104
 * out   - buffer for output string to be written, will be null terminated
15105
 * outSz - size of out
15106
 *
15107
 * Returns size of output string (not counting NULL terminator) on success,
15108
 * negative on error.
15109
 */
15110
static int wolfSSL_EscapeString_RFC2253(char* in, word32 inSz,
15111
                                        char* out, word32 outSz)
15112
{
15113
    word32 inIdx = 0;
15114
    word32 outIdx = 0;
15115
15116
    if (in == NULL || out == NULL || inSz == 0 || outSz == 0) {
15117
        return BAD_FUNC_ARG;
15118
    }
15119
15120
    for (inIdx = 0; inIdx < inSz; inIdx++) {
15121
15122
        char c = in[inIdx];
15123
15124
        if (((inIdx == 0) && (c == ' ' || c == '#')) ||
15125
            ((inIdx == (inSz-1)) && (c == ' ')) ||
15126
            c == ',' || c == '+' || c == '"' || c == '\\' ||
15127
            c == '<' || c == '>' || c == ';') {
15128
15129
            if (outIdx > (outSz - 1)) {
15130
                return BUFFER_E;
15131
            }
15132
            out[outIdx] = '\\';
15133
            outIdx++;
15134
        }
15135
        if (outIdx > (outSz - 1)) {
15136
            return BUFFER_E;
15137
        }
15138
        out[outIdx] = c;
15139
        outIdx++;
15140
    }
15141
15142
    /* null terminate out */
15143
    if (outIdx > (outSz -1)) {
15144
        return BUFFER_E;
15145
    }
15146
    out[outIdx] = '\0';
15147
15148
    return (int)outIdx;
15149
}
15150
15151
/*
15152
 * Print human readable version of X509_NAME to provided BIO.
15153
 *
15154
 * bio    - output BIO to place name string. Does not include null terminator.
15155
 * name   - input name to convert to string
15156
 * indent - number of indent spaces to prepend to name string
15157
 * flags  - flags to control function behavior. Not all flags are currently
15158
 *          supported/implemented. Currently supported are:
15159
 *              XN_FLAG_RFC2253 - only the backslash escape requirements from
15160
 *                                RFC22523 currently implemented.
15161
 *              XN_FLAG_DN_REV  - print name reversed. Automatically done by
15162
 *                                XN_FLAG_RFC2253.
15163
 *              XN_FLAG_SPC_EQ  - spaces before and after '=' character
15164
 *
15165
 * Returns WOLFSSL_SUCCESS (1) on success, WOLFSSL_FAILURE (0) on failure.
15166
 */
15167
int wolfSSL_X509_NAME_print_ex(WOLFSSL_BIO* bio, WOLFSSL_X509_NAME* name,
15168
                int indent, unsigned long flags)
15169
{
15170
    int i, count = 0, nameStrSz = 0, escapeSz = 0;
15171
    int eqSpace  = 0;
15172
    char eqStr[4];
15173
    char* tmp = NULL;
15174
    char* nameStr = NULL;
15175
    const char *buf = NULL;
15176
    WOLFSSL_X509_NAME_ENTRY* ne;
15177
    WOLFSSL_ASN1_STRING* str;
15178
    char escaped[ASN_NAME_MAX];
15179
15180
    WOLFSSL_ENTER("wolfSSL_X509_NAME_print_ex");
15181
15182
    if ((name == NULL) || (bio == NULL))
15183
        return WOLFSSL_FAILURE;
15184
15185
    XMEMSET(eqStr, 0, sizeof(eqStr));
15186
    if (flags & WOLFSSL_XN_FLAG_SPC_EQ) {
15187
        eqSpace = 2;
15188
        XSTRNCPY(eqStr, " = ", 4);
15189
    }
15190
    else {
15191
        XSTRNCPY(eqStr, "=", 4);
15192
    }
15193
15194
    for (i = 0; i < indent; i++) {
15195
        if (wolfSSL_BIO_write(bio, " ", 1) != 1)
15196
            return WOLFSSL_FAILURE;
15197
    }
15198
15199
    count = wolfSSL_X509_NAME_entry_count(name);
15200
15201
    for (i = 0; i < count; i++) {
15202
        int len;
15203
        int tmpSz;
15204
15205
        /* reverse name order for RFC2253 and DN_REV */
15206
        if ((flags & WOLFSSL_XN_FLAG_RFC2253) ||
15207
            (flags & WOLFSSL_XN_FLAG_DN_REV)) {
15208
            ne = wolfSSL_X509_NAME_get_entry(name, count - i - 1);
15209
        }
15210
        else {
15211
            ne = wolfSSL_X509_NAME_get_entry(name, i);
15212
        }
15213
        if (ne == NULL)
15214
            return WOLFSSL_FAILURE;
15215
15216
        str = wolfSSL_X509_NAME_ENTRY_get_data(ne);
15217
        if (str == NULL)
15218
            return WOLFSSL_FAILURE;
15219
15220
        if (flags & WOLFSSL_XN_FLAG_RFC2253) {
15221
            /* escape string for RFC 2253, ret sz not counting null term */
15222
            escapeSz = wolfSSL_EscapeString_RFC2253(str->data,
15223
                            str->length, escaped, sizeof(escaped));
15224
            if (escapeSz < 0)
15225
                return WOLFSSL_FAILURE;
15226
15227
            nameStr = escaped;
15228
            nameStrSz = escapeSz;
15229
        }
15230
        else {
15231
            nameStr = str->data;
15232
            nameStrSz = str->length;
15233
        }
15234
15235
        /* len is without null terminator */
15236
        len = get_dn_attr_by_nid(ne->nid, &buf);
15237
        if (len == 0 || buf == NULL)
15238
            return WOLFSSL_FAILURE;
15239
15240
        /* + 4 for '=', comma space and '\0'*/
15241
        tmpSz = nameStrSz + len + 4 + eqSpace;
15242
        tmp = (char*)XMALLOC(tmpSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
15243
        if (tmp == NULL) {
15244
            return WOLFSSL_FAILURE;
15245
        }
15246
15247
        if (i < count - 1) {
15248
            if (XSNPRINTF(tmp, (size_t)tmpSz, "%s%s%s, ", buf, eqStr, nameStr)
15249
                >= tmpSz)
15250
            {
15251
                WOLFSSL_MSG("buffer overrun");
15252
                XFREE(tmp, NULL, DYNAMIC_TYPE_TMP_BUFFER);
15253
                return WOLFSSL_FAILURE;
15254
            }
15255
15256
            tmpSz = len + nameStrSz + 3 + eqSpace; /* 3 for '=', comma space */
15257
        }
15258
        else {
15259
            if (XSNPRINTF(tmp, (size_t)tmpSz, "%s%s%s", buf, eqStr, nameStr)
15260
                >= tmpSz)
15261
            {
15262
                WOLFSSL_MSG("buffer overrun");
15263
                XFREE(tmp, NULL, DYNAMIC_TYPE_TMP_BUFFER);
15264
                return WOLFSSL_FAILURE;
15265
            }
15266
            tmpSz = len + nameStrSz + 1 + eqSpace; /* 1 for '=' */
15267
            if (bio->type != WOLFSSL_BIO_FILE &&
15268
                                              bio->type != WOLFSSL_BIO_MEMORY) {
15269
                ++tmpSz; /* include the terminating null when not writing to a
15270
                          * file.
15271
                          */
15272
            }
15273
        }
15274
15275
        if (wolfSSL_BIO_write(bio, tmp, tmpSz) != tmpSz) {
15276
            XFREE(tmp, NULL, DYNAMIC_TYPE_TMP_BUFFER);
15277
            return WOLFSSL_FAILURE;
15278
        }
15279
15280
        XFREE(tmp, NULL, DYNAMIC_TYPE_TMP_BUFFER);
15281
    }
15282
15283
    return WOLFSSL_SUCCESS;
15284
}
15285
15286
#ifndef NO_FILESYSTEM
15287
int wolfSSL_X509_NAME_print_ex_fp(XFILE file, WOLFSSL_X509_NAME* name,
15288
        int indent, unsigned long flags)
15289
{
15290
    WOLFSSL_BIO* bio;
15291
    int ret;
15292
15293
    WOLFSSL_ENTER("wolfSSL_X509_NAME_print_ex_fp");
15294
15295
    if (!(bio = wolfSSL_BIO_new_fp(file, WOLFSSL_BIO_NOCLOSE))) {
15296
        WOLFSSL_MSG("wolfSSL_BIO_new_fp error");
15297
        return WOLFSSL_FAILURE;
15298
    }
15299
15300
    ret = wolfSSL_X509_NAME_print_ex(bio, name, indent, flags);
15301
15302
    wolfSSL_BIO_free(bio);
15303
15304
    return ret;
15305
}
15306
#endif /* NO_FILESYSTEM */
15307
#endif /* !NO_BIO */
15308
15309
#ifndef NO_WOLFSSL_STUB
15310
WOLFSSL_ASN1_BIT_STRING* wolfSSL_X509_get0_pubkey_bitstr(const WOLFSSL_X509* x)
15311
{
15312
    (void)x;
15313
    WOLFSSL_ENTER("wolfSSL_X509_get0_pubkey_bitstr");
15314
    WOLFSSL_STUB("X509_get0_pubkey_bitstr");
15315
15316
    return NULL;
15317
}
15318
#endif
15319
15320
#ifdef OPENSSL_ALL
15321
WOLFSSL_X509_LOOKUP_TYPE wolfSSL_X509_OBJECT_get_type(
15322
        const WOLFSSL_X509_OBJECT* obj)
15323
{
15324
    if (obj == NULL)
15325
        return WOLFSSL_X509_LU_NONE;
15326
    return obj->type;
15327
}
15328
15329
WOLFSSL_X509_OBJECT* wolfSSL_X509_OBJECT_new(void)
15330
{
15331
    WOLFSSL_X509_OBJECT* ret = (WOLFSSL_X509_OBJECT*)
15332
            XMALLOC(sizeof(WOLFSSL_X509_OBJECT), NULL, DYNAMIC_TYPE_OPENSSL);
15333
    if (ret != NULL)
15334
        XMEMSET(ret, 0, sizeof(WOLFSSL_X509_OBJECT));
15335
    return ret;
15336
}
15337
15338
void wolfSSL_X509_OBJECT_free(WOLFSSL_X509_OBJECT *obj)
15339
{
15340
    WOLFSSL_ENTER("wolfSSL_X509_OBJECT_free");
15341
    if (obj != NULL) {
15342
        if (obj->type == WOLFSSL_X509_LU_X509) {
15343
            wolfSSL_X509_free(obj->data.x509);
15344
        }
15345
    #ifdef HAVE_CRL
15346
        else if (obj->type == WOLFSSL_X509_LU_CRL) {
15347
            wolfSSL_X509_CRL_free(obj->data.crl);
15348
        }
15349
    #endif
15350
        else {
15351
            /* We don't free as this will point to
15352
             * store->cm->crl which we don't own */
15353
            WOLFSSL_MSG("Not free'ing CRL in WOLFSSL_X509_OBJECT");
15354
        }
15355
        XFREE(obj, NULL, DYNAMIC_TYPE_OPENSSL);
15356
    }
15357
}
15358
15359
WOLFSSL_X509_OBJECT *wolfSSL_X509_OBJECT_retrieve_by_subject(
15360
        WOLF_STACK_OF(WOLFSSL_X509_OBJECT) *sk,
15361
        WOLFSSL_X509_LOOKUP_TYPE type,
15362
        WOLFSSL_X509_NAME *name)
15363
{
15364
    int i;
15365
15366
    WOLFSSL_ENTER("wolfSSL_X509_OBJECT_retrieve_by_subject");
15367
15368
    if (sk == NULL || name == NULL)
15369
        return NULL;
15370
15371
    for (i = 0; i < wolfSSL_sk_X509_OBJECT_num(sk); i++) {
15372
        WOLFSSL_X509_OBJECT* obj = (WOLFSSL_X509_OBJECT *)
15373
            wolfSSL_sk_X509_OBJECT_value(sk, i);
15374
        if (obj != NULL && obj->type == type &&
15375
            wolfSSL_X509_NAME_cmp(
15376
                wolfSSL_X509_get_subject_name(obj->data.x509), name) == 0)
15377
            return obj;
15378
    }
15379
    return NULL;
15380
}
15381
#endif /* OPENSSL_ALL */
15382
15383
#ifndef NO_WOLFSSL_STUB
15384
WOLFSSL_X509_OBJECT* wolfSSL_sk_X509_OBJECT_delete(
15385
    WOLF_STACK_OF(WOLFSSL_X509_OBJECT)* sk, int i)
15386
{
15387
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_delete");
15388
    WOLFSSL_STUB("wolfSSL_sk_X509_OBJECT_delete");
15389
    (void)sk;
15390
    (void)i;
15391
    return NULL;
15392
}
15393
#endif
15394
15395
WOLFSSL_X509 *wolfSSL_X509_OBJECT_get0_X509(const WOLFSSL_X509_OBJECT *obj)
15396
{
15397
    if (obj != NULL && obj->type == WOLFSSL_X509_LU_X509)
15398
        return obj->data.x509;
15399
    return NULL;
15400
}
15401
15402
WOLFSSL_X509_CRL *wolfSSL_X509_OBJECT_get0_X509_CRL(WOLFSSL_X509_OBJECT *obj)
15403
{
15404
    if (obj != NULL && obj->type == WOLFSSL_X509_LU_CRL)
15405
        return obj->data.crl;
15406
    return NULL;
15407
}
15408
15409
#endif /* OPENSSL_ALL || (OPENSSL_EXTRA && (HAVE_STUNNEL || WOLFSSL_NGINX ||
15410
        * HAVE_LIGHTY || WOLFSSL_HAPROXY || WOLFSSL_OPENSSH ||
15411
        * HAVE_SBLIM_SFCB)) */
15412
15413
15414
#if defined(OPENSSL_EXTRA)
15415
15416
int wolfSSL_sk_X509_num(const WOLF_STACK_OF(WOLFSSL_X509) *s)
15417
{
15418
    WOLFSSL_ENTER("wolfSSL_sk_X509_num");
15419
15420
    if (s == NULL)
15421
        return WOLFSSL_FATAL_ERROR;
15422
    return (int)s->num;
15423
}
15424
15425
#endif /* OPENSSL_EXTRA */
15426
15427
#ifdef HAVE_EX_DATA_CRYPTO
15428
int wolfSSL_X509_get_ex_new_index(int idx, void *arg,
15429
                                  WOLFSSL_CRYPTO_EX_new* new_func,
15430
                                  WOLFSSL_CRYPTO_EX_dup* dup_func,
15431
                                  WOLFSSL_CRYPTO_EX_free* free_func)
15432
{
15433
    WOLFSSL_ENTER("wolfSSL_X509_get_ex_new_index");
15434
15435
    return wolfssl_get_ex_new_index(WOLF_CRYPTO_EX_INDEX_X509, idx, arg,
15436
                                    new_func, dup_func, free_func);
15437
}
15438
#endif
15439
15440
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
15441
void *wolfSSL_X509_get_ex_data(WOLFSSL_X509 *x509, int idx)
15442
{
15443
    WOLFSSL_ENTER("wolfSSL_X509_get_ex_data");
15444
#ifdef HAVE_EX_DATA
15445
    if (x509 != NULL) {
15446
        return wolfSSL_CRYPTO_get_ex_data(&x509->ex_data, idx);
15447
    }
15448
#else
15449
    (void)x509;
15450
    (void)idx;
15451
#endif
15452
    return NULL;
15453
}
15454
15455
int wolfSSL_X509_set_ex_data(WOLFSSL_X509 *x509, int idx, void *data)
15456
{
15457
    WOLFSSL_ENTER("wolfSSL_X509_set_ex_data");
15458
#ifdef HAVE_EX_DATA
15459
    if (x509 != NULL) {
15460
        return wolfSSL_CRYPTO_set_ex_data(&x509->ex_data, idx, data);
15461
    }
15462
#else
15463
    (void)x509;
15464
    (void)idx;
15465
    (void)data;
15466
#endif
15467
    return WOLFSSL_FAILURE;
15468
}
15469
15470
#ifdef HAVE_EX_DATA_CLEANUP_HOOKS
15471
int wolfSSL_X509_set_ex_data_with_cleanup(
15472
    WOLFSSL_X509 *x509,
15473
    int idx,
15474
    void *data,
15475
    wolfSSL_ex_data_cleanup_routine_t cleanup_routine)
15476
{
15477
    WOLFSSL_ENTER("wolfSSL_X509_set_ex_data_with_cleanup");
15478
    if (x509 != NULL)
15479
    {
15480
        return wolfSSL_CRYPTO_set_ex_data_with_cleanup(&x509->ex_data, idx,
15481
                                                       data, cleanup_routine);
15482
    }
15483
    return WOLFSSL_FAILURE;
15484
}
15485
#endif /* HAVE_EX_DATA_CLEANUP_HOOKS */
15486
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
15487
15488
15489
#ifndef NO_ASN
15490
int wolfSSL_X509_check_host(WOLFSSL_X509 *x, const char *chk, size_t chklen,
15491
                    unsigned int flags, char **peername)
15492
0
{
15493
0
    int         ret;
15494
0
    size_t      i;
15495
0
    WC_DECLARE_VAR(dCert, DecodedCert, 1, 0);
15496
15497
0
    WOLFSSL_ENTER("wolfSSL_X509_check_host");
15498
15499
    /* flags and peername not needed for Nginx. */
15500
0
    (void)peername;
15501
15502
0
    if ((x == NULL) || (chk == NULL)) {
15503
0
        WOLFSSL_MSG("Invalid parameter");
15504
0
        return WOLFSSL_FAILURE;
15505
0
    }
15506
15507
0
    if (flags & WOLFSSL_NO_WILDCARDS) {
15508
0
        WOLFSSL_MSG("X509_CHECK_FLAG_NO_WILDCARDS not yet implemented");
15509
0
        return WOLFSSL_FAILURE;
15510
0
    }
15511
0
    if (flags & WOLFSSL_NO_PARTIAL_WILDCARDS) {
15512
0
        WOLFSSL_MSG("X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS not yet implemented");
15513
0
        return WOLFSSL_FAILURE;
15514
0
    }
15515
0
    if (flags & WOLFSSL_MULTI_LABEL_WILDCARDS) {
15516
0
        WOLFSSL_MSG("X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS not yet implemented");
15517
0
        return WOLFSSL_FAILURE;
15518
0
    }
15519
15520
0
#ifdef WOLFSSL_SMALL_STACK
15521
0
    dCert = (DecodedCert *)XMALLOC(sizeof(*dCert), x->heap,
15522
0
                                   DYNAMIC_TYPE_DCERT);
15523
0
    if (dCert == NULL) {
15524
0
        WOLFSSL_MSG("\tout of memory");
15525
0
        return WOLFSSL_FATAL_ERROR;
15526
0
    }
15527
0
#endif
15528
15529
0
    InitDecodedCert(dCert, x->derCert->buffer, x->derCert->length, NULL);
15530
0
    ret = ParseCertRelative(dCert, CERT_TYPE, 0, NULL, NULL);
15531
0
    if (ret != 0) {
15532
0
        goto out;
15533
0
    }
15534
15535
    /* Replicate openssl behavior for checklen */
15536
0
    if (chklen == 0) {
15537
0
        chklen = (size_t)(XSTRLEN(chk));
15538
0
    }
15539
0
    else {
15540
0
        for (i = 0; i < (chklen > 1 ? chklen - 1 : chklen); i++) {
15541
0
            if (chk[i] == '\0') {
15542
0
                ret = WOLFSSL_FATAL_ERROR;
15543
0
                goto out;
15544
0
            }
15545
0
        }
15546
0
    }
15547
0
    if (chklen > 1 && (chk[chklen - 1] == '\0')) {
15548
0
        chklen--;
15549
0
    }
15550
15551
#ifdef WOLFSSL_IP_ALT_NAME
15552
    ret = CheckIPAddr(dCert, (char *)chk);
15553
    if (ret == 0) {
15554
        goto out;
15555
    }
15556
#endif /* WOLFSSL_IP_ALT_NAME */
15557
15558
0
    ret = CheckHostName(dCert, (char *)chk, chklen, flags, 0);
15559
15560
0
out:
15561
15562
0
    FreeDecodedCert(dCert);
15563
0
    WC_FREE_VAR_EX(dCert, x->heap, DYNAMIC_TYPE_DCERT);
15564
15565
0
    if (ret != 0)
15566
0
        return WOLFSSL_FAILURE;
15567
0
    return WOLFSSL_SUCCESS;
15568
0
}
15569
15570
15571
int wolfSSL_X509_check_ip_asc(WOLFSSL_X509 *x, const char *ipasc,
15572
        unsigned int flags)
15573
0
{
15574
0
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
15575
0
    WC_DECLARE_VAR(dCert, DecodedCert, 1, 0);
15576
15577
0
    WOLFSSL_ENTER("wolfSSL_X509_check_ip_asc");
15578
15579
    /* flags not yet implemented */
15580
0
    (void)flags;
15581
15582
0
    if ((x == NULL) || (x->derCert == NULL) || (ipasc == NULL)) {
15583
0
        WOLFSSL_MSG("Invalid parameter");
15584
0
    }
15585
0
    else {
15586
0
        ret = WOLFSSL_SUCCESS;
15587
0
    }
15588
15589
0
#ifdef WOLFSSL_SMALL_STACK
15590
0
    if (ret == WOLFSSL_SUCCESS) {
15591
0
        dCert = (DecodedCert *)XMALLOC(sizeof(*dCert), x->heap,
15592
0
                                       DYNAMIC_TYPE_DCERT);
15593
0
        if (dCert == NULL) {
15594
0
            WOLFSSL_MSG("\tout of memory");
15595
0
            ret = WOLFSSL_FAILURE;
15596
0
        }
15597
0
    }
15598
0
#endif
15599
15600
0
    if (ret == WOLFSSL_SUCCESS) {
15601
0
        InitDecodedCert(dCert, x->derCert->buffer, x->derCert->length, NULL);
15602
0
        ret = ParseCertRelative(dCert, CERT_TYPE, 0, NULL, NULL);
15603
0
        if (ret != 0) {
15604
0
            ret = WOLFSSL_FAILURE;
15605
0
        }
15606
0
        else {
15607
0
            ret = CheckIPAddr(dCert, ipasc);
15608
0
            if (ret != 0) {
15609
0
                ret = WOLFSSL_FAILURE;
15610
0
            }
15611
0
            else {
15612
0
                ret = WOLFSSL_SUCCESS;
15613
0
            }
15614
0
        }
15615
0
        FreeDecodedCert(dCert);
15616
0
    }
15617
15618
0
#ifdef WOLFSSL_SMALL_STACK
15619
0
    if (x != NULL) {
15620
0
        XFREE(dCert, x->heap, DYNAMIC_TYPE_DCERT);
15621
0
    }
15622
0
#endif
15623
15624
0
    return ret;
15625
0
}
15626
#endif
15627
15628
#if defined(OPENSSL_EXTRA) && defined(WOLFSSL_CERT_GEN)
15629
int wolfSSL_X509_check_email(WOLFSSL_X509 *x, const char *chk, size_t chkLen,
15630
                             unsigned int flags)
15631
{
15632
    WOLFSSL_X509_NAME *subjName;
15633
    int emailLen;
15634
    char *emailBuf;
15635
15636
    (void)flags;
15637
15638
    WOLFSSL_ENTER("wolfSSL_X509_check_email");
15639
15640
    if ((x == NULL) || (chk == NULL)) {
15641
        WOLFSSL_MSG("Invalid parameter");
15642
        return WOLFSSL_FAILURE;
15643
    }
15644
15645
    subjName = wolfSSL_X509_get_subject_name(x);
15646
    if (subjName == NULL)
15647
        return WOLFSSL_FAILURE;
15648
15649
    /* Call with NULL buffer to get required length. */
15650
    emailLen = wolfSSL_X509_NAME_get_text_by_NID(subjName, WC_NID_emailAddress,
15651
                                                 NULL, 0);
15652
    if (emailLen < 0)
15653
        return WOLFSSL_FAILURE;
15654
15655
    ++emailLen; /* Add 1 for the NUL. */
15656
15657
    emailBuf = (char*)XMALLOC(emailLen, x->heap, DYNAMIC_TYPE_OPENSSL);
15658
    if (emailBuf == NULL)
15659
        return WOLFSSL_FAILURE;
15660
15661
    emailLen = wolfSSL_X509_NAME_get_text_by_NID(subjName, WC_NID_emailAddress,
15662
                                                 emailBuf, emailLen);
15663
    if (emailLen < 0) {
15664
        XFREE(emailBuf, x->heap, DYNAMIC_TYPE_OPENSSL);
15665
        return WOLFSSL_FAILURE;
15666
    }
15667
15668
    if (chkLen == 0)
15669
        chkLen = XSTRLEN(chk);
15670
15671
    if (chkLen != (size_t)emailLen
15672
     || XSTRNCMP(chk, emailBuf, chkLen)) {
15673
        XFREE(emailBuf, x->heap, DYNAMIC_TYPE_OPENSSL);
15674
        return WOLFSSL_FAILURE;
15675
    }
15676
15677
    XFREE(emailBuf, x->heap, DYNAMIC_TYPE_OPENSSL);
15678
    return WOLFSSL_SUCCESS;
15679
}
15680
#endif /* OPENSSL_EXTRA && WOLFSSL_CERT_GEN */
15681
15682
#if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) || defined(WOLFSSL_HAPROXY) \
15683
    || defined(OPENSSL_EXTRA) || defined(HAVE_LIGHTY)
15684
15685
int wolfSSL_X509_NAME_digest(const WOLFSSL_X509_NAME *name,
15686
        const WOLFSSL_EVP_MD *type, unsigned char *md, unsigned int *len)
15687
{
15688
    WOLFSSL_ENTER("wolfSSL_X509_NAME_digest");
15689
15690
    if (name == NULL || type == NULL)
15691
        return WOLFSSL_FAILURE;
15692
15693
#if !defined(NO_FILESYSTEM) && !defined(NO_PWDBASED)
15694
    return wolfSSL_EVP_Digest((unsigned char*)name->name,
15695
                              name->sz, md, len, type, NULL);
15696
#else
15697
    (void)md;
15698
    (void)len;
15699
    return NOT_COMPILED_IN;
15700
#endif
15701
}
15702
15703
#endif /* OPENSSL_ALL || WOLFSSL_NGINX || WOLFSSL_HAPROXY ||
15704
    OPENSSL_EXTRA || HAVE_LIGHTY */
15705
15706
#if defined(WOLFSSL_NGINX) || defined(WOLFSSL_HAPROXY) || \
15707
    defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL)
15708
15709
void wolfSSL_X509_email_free(WOLF_STACK_OF(WOLFSSL_STRING) *sk)
15710
{
15711
    wolfSSL_sk_pop_free(sk, NULL);
15712
}
15713
15714
static int x509_aia_append_string(WOLFSSL_STACK* list, const byte* uri,
15715
        word32 uriSz)
15716
{
15717
    WOLFSSL_STRING url = (WOLFSSL_STRING)XMALLOC(uriSz + 1, NULL,
15718
            DYNAMIC_TYPE_OPENSSL);
15719
    if (url == NULL)
15720
        return -1;
15721
    XMEMCPY(url, uri, uriSz);
15722
    url[uriSz] = '\0';
15723
15724
    if (wolfSSL_sk_push(list, url) <= 0) {
15725
        XFREE(url, NULL, DYNAMIC_TYPE_OPENSSL);
15726
        return -1;
15727
    }
15728
15729
    return 0;
15730
}
15731
15732
static WOLFSSL_STACK* x509_get1_aia_by_method(WOLFSSL_X509* x, word32 method,
15733
    const byte* fallback, int fallbackSz)
15734
{
15735
    WOLFSSL_STACK* ret = NULL;
15736
    int i;
15737
15738
    if (x == NULL)
15739
        return NULL;
15740
15741
    ret = wolfSSL_sk_WOLFSSL_STRING_new();
15742
    if (ret == NULL)
15743
        return NULL;
15744
15745
    /* Build from multi-entry list when available; otherwise fall back to the
15746
     * legacy single-entry fields to preserve previous behavior. */
15747
    if (x->authInfoListSz > 0) {
15748
        for (i = 0; i < x->authInfoListSz; i++) {
15749
            if (x->authInfoList[i].method != method ||
15750
                    x->authInfoList[i].uri == NULL ||
15751
                    x->authInfoList[i].uriSz == 0) {
15752
                continue;
15753
            }
15754
15755
            if (x509_aia_append_string(ret, x->authInfoList[i].uri,
15756
                    x->authInfoList[i].uriSz) != 0) {
15757
                wolfSSL_X509_email_free(ret);
15758
                return NULL;
15759
            }
15760
        }
15761
    }
15762
    /* Only use fallback when nothing was found in the list */
15763
    if (wolfSSL_sk_num(ret) == 0 && fallback != NULL && fallbackSz > 0) {
15764
        if (x509_aia_append_string(ret, fallback, (word32)fallbackSz) != 0) {
15765
            wolfSSL_X509_email_free(ret);
15766
            return NULL;
15767
        }
15768
    }
15769
15770
    /* Return NULL when empty */
15771
    if (wolfSSL_sk_num(ret) == 0) {
15772
        wolfSSL_X509_email_free(ret);
15773
        ret = NULL;
15774
    }
15775
15776
    return ret;
15777
}
15778
15779
WOLF_STACK_OF(WOLFSSL_STRING) *wolfSSL_X509_get1_ocsp(WOLFSSL_X509 *x)
15780
{
15781
    if (x == NULL)
15782
        return NULL;
15783
    return x509_get1_aia_by_method(x, AIA_OCSP_OID, x->authInfo, x->authInfoSz);
15784
}
15785
15786
int wolfSSL_X509_get_aia_overflow(WOLFSSL_X509 *x)
15787
{
15788
    int overflow = 0;
15789
15790
    WOLFSSL_ENTER("wolfSSL_X509_get_aia_overflow");
15791
15792
    if (x != NULL) {
15793
        overflow = x->authInfoListOverflow;
15794
    }
15795
15796
    WOLFSSL_LEAVE("wolfSSL_X509_get_aia_overflow", overflow);
15797
15798
    return overflow;
15799
}
15800
15801
#ifdef WOLFSSL_ASN_CA_ISSUER
15802
WOLF_STACK_OF(WOLFSSL_STRING) *wolfSSL_X509_get1_ca_issuers(WOLFSSL_X509 *x)
15803
{
15804
    if (x == NULL)
15805
        return NULL;
15806
    return x509_get1_aia_by_method(x, AIA_CA_ISSUER_OID, x->authInfoCaIssuer,
15807
            x->authInfoCaIssuerSz);
15808
}
15809
#endif /* WOLFSSL_ASN_CA_ISSUER */
15810
15811
int wolfSSL_X509_check_issued(WOLFSSL_X509 *issuer, WOLFSSL_X509 *subject)
15812
{
15813
    WOLFSSL_X509_NAME *issuerName = wolfSSL_X509_get_issuer_name(subject);
15814
    WOLFSSL_X509_NAME *subjectName = wolfSSL_X509_get_subject_name(issuer);
15815
15816
    if (issuerName == NULL || subjectName == NULL)
15817
        return WOLFSSL_X509_V_ERR_SUBJECT_ISSUER_MISMATCH;
15818
15819
    /* Literal matching of encoded names and key ids. */
15820
    if (issuerName->sz != subjectName->sz ||
15821
           XMEMCMP(issuerName->name, subjectName->name, subjectName->sz) != 0) {
15822
        return WOLFSSL_X509_V_ERR_SUBJECT_ISSUER_MISMATCH;
15823
    }
15824
15825
    if (subject->authKeyId != NULL && issuer->subjKeyId != NULL) {
15826
        if (subject->authKeyIdSz != issuer->subjKeyIdSz ||
15827
                XMEMCMP(subject->authKeyId, issuer->subjKeyId,
15828
                        issuer->subjKeyIdSz) != 0) {
15829
            return WOLFSSL_X509_V_ERR_SUBJECT_ISSUER_MISMATCH;
15830
        }
15831
    }
15832
15833
    return WOLFSSL_X509_V_OK;
15834
}
15835
15836
#endif /* WOLFSSL_NGINX || WOLFSSL_HAPROXY || OPENSSL_EXTRA || OPENSSL_ALL */
15837
15838
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
15839
    defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
15840
WOLFSSL_X509* wolfSSL_X509_dup(WOLFSSL_X509 *x)
15841
{
15842
    WOLFSSL_ENTER("wolfSSL_X509_dup");
15843
15844
    if (x == NULL) {
15845
        WOLFSSL_MSG("Error: NULL input");
15846
        return NULL;
15847
    }
15848
15849
    if (x->derCert == NULL) {
15850
        WOLFSSL_MSG("Error: NULL derCert parameter");
15851
        return NULL;
15852
    }
15853
15854
    return wolfSSL_X509_d2i_ex(NULL, x->derCert->buffer, x->derCert->length,
15855
        x->heap);
15856
}
15857
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL || KEEP_PEER_CERT || \
15858
          SESSION_CERTS */
15859
15860
#if defined(OPENSSL_EXTRA)
15861
int wolfSSL_X509_check_ca(WOLFSSL_X509 *x509)
15862
{
15863
    WOLFSSL_ENTER("wolfSSL_X509_check_ca");
15864
15865
    if (x509 == NULL)
15866
        return WOLFSSL_FAILURE;
15867
    if (x509->isCa)
15868
        return 1;
15869
    if (x509->extKeyUsageCrit)
15870
        return 4;
15871
15872
    return 0;
15873
}
15874
#endif /* OPENSSL_EXTRA */
15875
15876
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
15877
long wolfSSL_X509_get_version(const WOLFSSL_X509 *x509)
15878
{
15879
    int version = 0;
15880
15881
    WOLFSSL_ENTER("wolfSSL_X509_get_version");
15882
15883
    if (x509 == NULL) {
15884
        WOLFSSL_MSG("invalid parameter");
15885
        return 0L;
15886
    }
15887
    version = x509->version;
15888
    if (version != 0)
15889
        return (long)version - 1L;
15890
15891
    return 0L;
15892
}
15893
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
15894
15895
#if defined(OPENSSL_EXTRA)
15896
int wolfSSL_X509_get_signature_nid(const WOLFSSL_X509 *x)
15897
{
15898
    if (x == NULL)
15899
        return 0;
15900
15901
    return oid2nid((word32)x->sigOID, oidSigType);
15902
}
15903
#endif  /* OPENSSL_EXTRA */
15904
15905
#if defined(OPENSSL_EXTRA)
15906
WOLFSSL_STACK* wolfSSL_sk_X509_new(WOLF_SK_COMPARE_CB(WOLFSSL_X509, cb))
15907
{
15908
    (void)cb;
15909
    return wolfSSL_sk_X509_new_null();
15910
}
15911
15912
WOLFSSL_STACK* wolfSSL_sk_X509_new_null(void)
15913
{
15914
    WOLFSSL_STACK* s = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK), NULL,
15915
            DYNAMIC_TYPE_OPENSSL);
15916
    if (s != NULL) {
15917
        XMEMSET(s, 0, sizeof(*s));
15918
        s->type = STACK_TYPE_X509;
15919
    }
15920
15921
    return s;
15922
}
15923
#endif  /* OPENSSL_EXTRA */
15924
15925
#ifdef OPENSSL_ALL
15926
15927
WOLFSSL_STACK* wolfSSL_sk_X509_OBJECT_new(void)
15928
{
15929
    WOLFSSL_STACK* s = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK), NULL,
15930
            DYNAMIC_TYPE_OPENSSL);
15931
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_new");
15932
    if (s != NULL) {
15933
        XMEMSET(s, 0, sizeof(*s));
15934
        s->type = STACK_TYPE_X509_OBJ;
15935
    }
15936
    return s;
15937
}
15938
15939
void wolfSSL_sk_X509_OBJECT_free(WOLFSSL_STACK* s)
15940
{
15941
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_free");
15942
    wolfSSL_sk_free(s);
15943
}
15944
15945
void wolfSSL_sk_X509_OBJECT_pop_free(WOLFSSL_STACK* s,
15946
        void (*f) (WOLFSSL_X509_OBJECT*))
15947
{
15948
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_pop_free");
15949
    wolfSSL_sk_pop_free(s, (wolfSSL_sk_freefunc)f);
15950
}
15951
15952
int wolfSSL_sk_X509_OBJECT_push(WOLFSSL_STACK* sk, WOLFSSL_X509_OBJECT* obj)
15953
{
15954
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_push");
15955
15956
    if (sk == NULL || obj == NULL) {
15957
        return WOLFSSL_FAILURE;
15958
    }
15959
15960
    return wolfSSL_sk_push(sk, obj);
15961
}
15962
15963
#endif /* OPENSSL_ALL */
15964
15965
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
15966
/* unlike wolfSSL_X509_NAME_dup this does not malloc a duplicate, only deep
15967
 * copy. "to" is expected to be a fresh blank name, if not pointers could be
15968
 * lost */
15969
int wolfSSL_X509_NAME_copy(const WOLFSSL_X509_NAME* from, WOLFSSL_X509_NAME* to)
15970
{
15971
    int i;
15972
15973
    WOLFSSL_ENTER("wolfSSL_X509_NAME_copy");
15974
15975
    if (from == NULL || to == NULL) {
15976
        WOLFSSL_MSG("NULL parameter");
15977
        return BAD_FUNC_ARG;
15978
    }
15979
15980
#if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) || defined(HAVE_LIGHTY)
15981
    if (from->rawLen > 0) {
15982
        if (from->rawLen > ASN_NAME_MAX) {
15983
            WOLFSSL_MSG("Bad raw size");
15984
            return BAD_FUNC_ARG;
15985
        }
15986
        XMEMCPY(to->raw, from->raw, from->rawLen);
15987
        to->rawLen = from->rawLen;
15988
    }
15989
#endif
15990
15991
    if (from->dynamicName) {
15992
        to->name = (char*)XMALLOC(from->sz, to->heap, DYNAMIC_TYPE_SUBJECT_CN);
15993
        if (to->name == NULL)
15994
            return WOLFSSL_FAILURE;
15995
        to->dynamicName = 1;
15996
    }
15997
    XMEMCPY(to->name, from->name, from->sz);
15998
    to->sz = from->sz;
15999
16000
    for (i = 0; i < MAX_NAME_ENTRIES; i++) {
16001
        WOLFSSL_X509_NAME_ENTRY* ne = wolfSSL_X509_NAME_get_entry(from, i);
16002
        if (ne != NULL) {
16003
            if (wolfSSL_X509_NAME_add_entry(to, ne, i, 1) != WOLFSSL_SUCCESS) {
16004
                return WOLFSSL_FAILURE;
16005
            }
16006
        }
16007
    }
16008
    to->entrySz = from->entrySz;
16009
    return WOLFSSL_SUCCESS;
16010
}
16011
16012
16013
/* copies over information from "name" to the "cert" subject name
16014
 * returns WOLFSSL_SUCCESS on success */
16015
int wolfSSL_X509_set_subject_name(WOLFSSL_X509 *cert, WOLFSSL_X509_NAME *name)
16016
{
16017
    WOLFSSL_ENTER("wolfSSL_X509_set_subject_name");
16018
    if (cert == NULL || name == NULL)
16019
        return WOLFSSL_FAILURE;
16020
16021
    FreeX509Name(&cert->subject);
16022
    InitX509Name(&cert->subject, 0, cert->heap);
16023
16024
    if (wolfSSL_X509_NAME_copy(name, &cert->subject) != WOLFSSL_SUCCESS) {
16025
        FreeX509Name(&cert->subject);
16026
        return WOLFSSL_FAILURE;
16027
    }
16028
16029
    cert->subject.x509 = cert;
16030
    return WOLFSSL_SUCCESS;
16031
}
16032
16033
16034
/* copies over information from "name" to the "cert" issuer name
16035
 * returns WOLFSSL_SUCCESS on success */
16036
int wolfSSL_X509_set_issuer_name(WOLFSSL_X509 *cert, WOLFSSL_X509_NAME *name)
16037
{
16038
    WOLFSSL_ENTER("wolfSSL_X509_set_issuer_name");
16039
    if (cert == NULL || name == NULL)
16040
        return WOLFSSL_FAILURE;
16041
16042
    FreeX509Name(&cert->issuer);
16043
    InitX509Name(&cert->issuer, 0, cert->heap);
16044
16045
    if (wolfSSL_X509_NAME_copy(name, &cert->issuer) != WOLFSSL_SUCCESS) {
16046
        FreeX509Name(&cert->issuer);
16047
        return WOLFSSL_FAILURE;
16048
    }
16049
16050
    cert->issuer.x509 = cert;
16051
    cert->issuerSet = 1;
16052
16053
    return WOLFSSL_SUCCESS;
16054
}
16055
16056
16057
int wolfSSL_X509_set_notAfter(WOLFSSL_X509* x509, const WOLFSSL_ASN1_TIME* t)
16058
{
16059
    if (x509 == NULL || t == NULL) {
16060
        return WOLFSSL_FAILURE;
16061
    }
16062
16063
    x509->notAfter.type = t->type;
16064
    x509->notAfter.length = t->length;
16065
16066
    XMEMCPY(x509->notAfter.data, t->data, CTC_DATE_SIZE);
16067
16068
    return WOLFSSL_SUCCESS;
16069
}
16070
16071
int wolfSSL_X509_set_notBefore(WOLFSSL_X509* x509, const WOLFSSL_ASN1_TIME* t)
16072
{
16073
    if (x509 == NULL || t == NULL) {
16074
        return WOLFSSL_FAILURE;
16075
    }
16076
16077
    x509->notBefore.type = t->type;
16078
    x509->notBefore.length = t->length;
16079
16080
    XMEMCPY(x509->notBefore.data, t->data, CTC_DATE_SIZE);
16081
16082
    return WOLFSSL_SUCCESS;
16083
}
16084
16085
int wolfSSL_X509_set1_notAfter(WOLFSSL_X509* x509, const WOLFSSL_ASN1_TIME *t)
16086
{
16087
    return wolfSSL_X509_set_notAfter(x509, t);
16088
}
16089
16090
int wolfSSL_X509_set1_notBefore(WOLFSSL_X509* x509, const WOLFSSL_ASN1_TIME *t)
16091
{
16092
    return wolfSSL_X509_set_notBefore(x509, t);
16093
}
16094
16095
int wolfSSL_X509_set_serialNumber(WOLFSSL_X509* x509, WOLFSSL_ASN1_INTEGER* s)
16096
{
16097
    WOLFSSL_ENTER("wolfSSL_X509_set_serialNumber");
16098
    if (x509 == NULL || s == NULL || s->length >= EXTERNAL_SERIAL_SIZE)
16099
        return WOLFSSL_FAILURE;
16100
16101
    /* WOLFSSL_ASN1_INTEGER has type | size | data
16102
     * Sanity check that the data is actually in ASN format */
16103
    if (s->length < 3 || s->data[0] != ASN_INTEGER ||
16104
            s->data[1] != s->length - 2) {
16105
        return WOLFSSL_FAILURE;
16106
    }
16107
    XMEMCPY(x509->serial, s->data + 2, s->length - 2);
16108
    x509->serialSz = s->length - 2;
16109
    x509->serial[x509->serialSz] = 0;
16110
16111
    return WOLFSSL_SUCCESS;
16112
}
16113
16114
16115
int wolfSSL_X509_set_pubkey(WOLFSSL_X509 *cert, WOLFSSL_EVP_PKEY *pkey)
16116
{
16117
    byte* p = NULL;
16118
    int derSz = 0;
16119
    WOLFSSL_ENTER("wolfSSL_X509_set_pubkey");
16120
16121
    if (cert == NULL || pkey == NULL)
16122
        return WOLFSSL_FAILURE;
16123
16124
    /* Regenerate since pkey->pkey.ptr may contain private key */
16125
    switch (pkey->type) {
16126
#if (defined(WOLFSSL_KEY_GEN) || defined(OPENSSL_EXTRA)) && !defined(NO_RSA)
16127
    case WC_EVP_PKEY_RSA:
16128
        {
16129
            RsaKey* rsa;
16130
16131
            if (pkey->rsa == NULL || pkey->rsa->internal == NULL)
16132
                return WOLFSSL_FAILURE;
16133
16134
            rsa = (RsaKey*)pkey->rsa->internal;
16135
            derSz = wc_RsaPublicKeyDerSize(rsa, 1);
16136
            if (derSz <= 0)
16137
                return WOLFSSL_FAILURE;
16138
16139
            p = (byte*)XMALLOC(derSz, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16140
            if (p == NULL)
16141
                return WOLFSSL_FAILURE;
16142
16143
            if ((derSz = wc_RsaKeyToPublicDer(rsa, p, (word32)derSz)) <= 0) {
16144
                XFREE(p, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16145
                return WOLFSSL_FAILURE;
16146
            }
16147
            cert->pubKeyOID = RSAk;
16148
        }
16149
        break;
16150
#endif /* (WOLFSSL_KEY_GEN || OPENSSL_EXTRA) && !NO_RSA */
16151
#if !defined(HAVE_SELFTEST) && (defined(WOLFSSL_KEY_GEN) || \
16152
        defined(WOLFSSL_CERT_GEN)) && !defined(NO_DSA)
16153
    case WC_EVP_PKEY_DSA:
16154
        {
16155
            DsaKey* dsa;
16156
16157
            if (pkey->dsa == NULL || pkey->dsa->internal == NULL)
16158
                return WOLFSSL_FAILURE;
16159
16160
            dsa = (DsaKey*)pkey->dsa->internal;
16161
            /* size of pub, priv, p, q, g + ASN.1 additional information */
16162
            derSz = 5 * mp_unsigned_bin_size(&dsa->g) + MAX_ALGO_SZ;
16163
            p = (byte*)XMALLOC(derSz, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16164
            if (p == NULL)
16165
                return WOLFSSL_FAILURE;
16166
16167
            if ((derSz = wc_DsaKeyToPublicDer(dsa, p, (word32)derSz)) <= 0) {
16168
                XFREE(p, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16169
                return WOLFSSL_FAILURE;
16170
            }
16171
            cert->pubKeyOID = DSAk;
16172
        }
16173
        break;
16174
#endif /* !HAVE_SELFTEST && (WOLFSSL_KEY_GEN || WOLFSSL_CERT_GEN) && !NO_DSA */
16175
#ifdef HAVE_ECC
16176
    case WC_EVP_PKEY_EC:
16177
        {
16178
            ecc_key* ecc;
16179
16180
            if (pkey->ecc == NULL || pkey->ecc->internal == NULL)
16181
                return WOLFSSL_FAILURE;
16182
16183
            ecc = (ecc_key*)pkey->ecc->internal;
16184
            derSz = wc_EccPublicKeyDerSize(ecc, 1);
16185
            if (derSz <= 0)
16186
                return WOLFSSL_FAILURE;
16187
16188
            p = (byte*)XMALLOC(derSz, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16189
            if (p == NULL)
16190
                return WOLFSSL_FAILURE;
16191
16192
            if ((derSz = wc_EccPublicKeyToDer(ecc, p, (word32)derSz, 1)) <= 0) {
16193
                XFREE(p, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16194
                return WOLFSSL_FAILURE;
16195
            }
16196
            cert->pubKeyOID = ECDSAk;
16197
        }
16198
        break;
16199
#endif
16200
    default:
16201
        return WOLFSSL_FAILURE;
16202
    }
16203
    XFREE(cert->pubKey.buffer, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16204
    cert->pubKey.buffer = p;
16205
    cert->pubKey.length = (unsigned int)derSz;
16206
16207
    return WOLFSSL_SUCCESS;
16208
}
16209
16210
int wolfSSL_X509_set_version(WOLFSSL_X509* x509, long v)
16211
{
16212
    WOLFSSL_ENTER("wolfSSL_X509_set_version");
16213
    if ((x509 == NULL) || (v < 0) || (v >= INT_MAX)) {
16214
        return WOLFSSL_FAILURE;
16215
    }
16216
    x509->version = (int) v + 1;
16217
16218
    return WOLFSSL_SUCCESS;
16219
}
16220
16221
#ifdef WOLFSSL_CERT_EXT
16222
/* Set Subject Key Identifier from raw bytes.
16223
 *
16224
 * x509  - Certificate to modify
16225
 * skid  - Raw SKID bytes
16226
 * skidSz - Size of SKID in bytes
16227
 *
16228
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
16229
 */
16230
int wolfSSL_X509_set_subject_key_id(WOLFSSL_X509* x509,
16231
    const unsigned char* skid, int skidSz)
16232
{
16233
    WOLFSSL_ENTER("wolfSSL_X509_set_subject_key_id");
16234
16235
    if (x509 == NULL || skid == NULL || skidSz <= 0) {
16236
        return WOLFSSL_FAILURE;
16237
    }
16238
16239
    /* Allocate/reallocate memory for subjKeyId */
16240
    if (x509->subjKeyId == NULL || (int)x509->subjKeyIdSz < skidSz) {
16241
        if (x509->subjKeyId != NULL) {
16242
            XFREE(x509->subjKeyId, x509->heap, DYNAMIC_TYPE_X509_EXT);
16243
        }
16244
        x509->subjKeyId = (byte*)XMALLOC((word32)skidSz, x509->heap,
16245
                                          DYNAMIC_TYPE_X509_EXT);
16246
        if (x509->subjKeyId == NULL) {
16247
            return WOLFSSL_FAILURE;
16248
        }
16249
    }
16250
16251
    XMEMCPY(x509->subjKeyId, skid, (word32)skidSz);
16252
    x509->subjKeyIdSz = (word32)skidSz;
16253
    x509->subjKeyIdSet = 1;
16254
16255
    return WOLFSSL_SUCCESS;
16256
}
16257
16258
#ifndef NO_SHA
16259
/* Set Subject Key Identifier by computing SHA-1 hash of the public key.
16260
 *
16261
 * x509 - Certificate to modify (must have public key set)
16262
 *
16263
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
16264
 */
16265
int wolfSSL_X509_set_subject_key_id_ex(WOLFSSL_X509* x509)
16266
{
16267
    byte hash[WC_SHA_DIGEST_SIZE];
16268
    int ret;
16269
16270
    WOLFSSL_ENTER("wolfSSL_X509_set_subject_key_id_ex");
16271
16272
    if (x509 == NULL) {
16273
        return WOLFSSL_FAILURE;
16274
    }
16275
16276
    /* Check if public key has been set */
16277
    if (x509->pubKey.buffer == NULL || x509->pubKey.length == 0) {
16278
        WOLFSSL_MSG("Public key not set");
16279
        return WOLFSSL_FAILURE;
16280
    }
16281
16282
    /* Compute SHA-1 hash of the public key */
16283
    ret = wc_ShaHash(x509->pubKey.buffer, x509->pubKey.length, hash);
16284
    if (ret != 0) {
16285
        WOLFSSL_MSG("wc_ShaHash failed");
16286
        return WOLFSSL_FAILURE;
16287
    }
16288
16289
    return wolfSSL_X509_set_subject_key_id(x509, hash, WC_SHA_DIGEST_SIZE);
16290
}
16291
#endif /* !NO_SHA */
16292
16293
/* Set Authority Key Identifier from raw bytes.
16294
 *
16295
 * x509   - Certificate to modify
16296
 * akid   - Raw AKID bytes
16297
 * akidSz - Size of AKID in bytes
16298
 *
16299
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
16300
 */
16301
int wolfSSL_X509_set_authority_key_id(WOLFSSL_X509* x509,
16302
    const unsigned char* akid, int akidSz)
16303
{
16304
    WOLFSSL_ENTER("wolfSSL_X509_set_authority_key_id");
16305
16306
    if (x509 == NULL || akid == NULL || akidSz <= 0) {
16307
        return WOLFSSL_FAILURE;
16308
    }
16309
16310
    /* Allocate/reallocate memory for authKeyIdSrc */
16311
    if (x509->authKeyIdSrc == NULL || (int)x509->authKeyIdSrcSz < akidSz) {
16312
        if (x509->authKeyIdSrc != NULL) {
16313
            XFREE(x509->authKeyIdSrc, x509->heap, DYNAMIC_TYPE_X509_EXT);
16314
        }
16315
        x509->authKeyIdSrc = (byte*)XMALLOC((word32)akidSz, x509->heap,
16316
                                             DYNAMIC_TYPE_X509_EXT);
16317
        if (x509->authKeyIdSrc == NULL) {
16318
            return WOLFSSL_FAILURE;
16319
        }
16320
    }
16321
16322
    XMEMCPY(x509->authKeyIdSrc, akid, (word32)akidSz);
16323
    x509->authKeyIdSrcSz = (word32)akidSz;
16324
    x509->authKeyId = x509->authKeyIdSrc;
16325
    x509->authKeyIdSz = (word32)akidSz;
16326
    x509->authKeyIdSet = 1;
16327
16328
    return WOLFSSL_SUCCESS;
16329
}
16330
16331
#ifndef NO_SHA
16332
/* Set Authority Key Identifier from issuer certificate.
16333
 * Extracts SKID from issuer (or computes from issuer's public key).
16334
 *
16335
 * x509   - Certificate to modify
16336
 * issuer - Issuer certificate
16337
 *
16338
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
16339
 */
16340
int wolfSSL_X509_set_authority_key_id_ex(WOLFSSL_X509* x509,
16341
    WOLFSSL_X509* issuer)
16342
{
16343
    byte hash[WC_SHA_DIGEST_SIZE];
16344
    int ret;
16345
16346
    WOLFSSL_ENTER("wolfSSL_X509_set_authority_key_id_ex");
16347
16348
    if (x509 == NULL || issuer == NULL) {
16349
        return WOLFSSL_FAILURE;
16350
    }
16351
16352
    /* First try to use issuer's SKID if it's set */
16353
    if (issuer->subjKeyIdSet && issuer->subjKeyId != NULL &&
16354
        issuer->subjKeyIdSz > 0) {
16355
        return wolfSSL_X509_set_authority_key_id(x509, issuer->subjKeyId,
16356
                                                  (int)issuer->subjKeyIdSz);
16357
    }
16358
16359
    /* Otherwise compute from issuer's public key */
16360
    if (issuer->pubKey.buffer == NULL || issuer->pubKey.length == 0) {
16361
        WOLFSSL_MSG("Issuer public key not available");
16362
        return WOLFSSL_FAILURE;
16363
    }
16364
16365
    ret = wc_ShaHash(issuer->pubKey.buffer, issuer->pubKey.length, hash);
16366
    if (ret != 0) {
16367
        WOLFSSL_MSG("wc_ShaHash failed");
16368
        return WOLFSSL_FAILURE;
16369
    }
16370
16371
    return wolfSSL_X509_set_authority_key_id(x509, hash, WC_SHA_DIGEST_SIZE);
16372
}
16373
#endif /* !NO_SHA */
16374
#endif /* WOLFSSL_CERT_EXT */
16375
16376
#ifndef IGNORE_NETSCAPE_CERT_TYPE
16377
/* Set Netscape Certificate Type extension.
16378
 *
16379
 * x509       - Certificate to modify
16380
 * nsCertType - Bitwise OR of NS_SSL_CLIENT, NS_SSL_SERVER, etc.
16381
 *
16382
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
16383
 */
16384
int wolfSSL_X509_set_ns_cert_type(WOLFSSL_X509* x509, int nsCertType)
16385
{
16386
    WOLFSSL_ENTER("wolfSSL_X509_set_ns_cert_type");
16387
16388
    if (x509 == NULL) {
16389
        return WOLFSSL_FAILURE;
16390
    }
16391
16392
    x509->nsCertType = (byte)nsCertType;
16393
16394
    return WOLFSSL_SUCCESS;
16395
}
16396
#endif /* !IGNORE_NETSCAPE_CERT_TYPE */
16397
16398
#endif /* (OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL) && WOLFSSL_CERT_GEN */
16399
16400
#if (defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)) &&           \
16401
    defined(WOLFSSL_CERT_GEN) && defined(WOLFSSL_CERT_REQ)
16402
16403
void wolfSSL_X509V3_set_ctx(WOLFSSL_X509V3_CTX* ctx, WOLFSSL_X509* issuer,
16404
        WOLFSSL_X509* subject, WOLFSSL_X509* req, WOLFSSL_X509_CRL* crl,
16405
        int flag)
16406
{
16407
    int ret = WOLFSSL_SUCCESS;
16408
    WOLFSSL_ENTER("wolfSSL_X509V3_set_ctx");
16409
    if (!ctx) {
16410
        ret = WOLFSSL_FAILURE;
16411
        WOLFSSL_MSG("wolfSSL_X509V3_set_ctx() called with null ctx.");
16412
    }
16413
16414
    if (ret == WOLFSSL_SUCCESS && (ctx->x509 != NULL)) {
16415
        ret = WOLFSSL_FAILURE;
16416
        WOLFSSL_MSG("wolfSSL_X509V3_set_ctx() called "
16417
                    "with ctx->x509 already allocated.");
16418
    }
16419
16420
    if (ret == WOLFSSL_SUCCESS) {
16421
        ctx->x509 = wolfSSL_X509_new_ex(
16422
            (issuer && issuer->heap) ? issuer->heap :
16423
            (subject && subject->heap) ? subject->heap :
16424
            (req && req->heap) ? req->heap :
16425
            NULL);
16426
        if (!ctx->x509) {
16427
            ret = WOLFSSL_FAILURE;
16428
            WOLFSSL_MSG("wolfSSL_X509_new_ex() failed "
16429
                        "in wolfSSL_X509V3_set_ctx().");
16430
        }
16431
    }
16432
16433
    /* Set parameters in ctx as long as ret == WOLFSSL_SUCCESS */
16434
    if (ret == WOLFSSL_SUCCESS && issuer)
16435
        ret = wolfSSL_X509_set_issuer_name(ctx->x509, &issuer->issuer);
16436
16437
    if (ret == WOLFSSL_SUCCESS && subject)
16438
        ret = wolfSSL_X509_set_subject_name(ctx->x509, &subject->subject);
16439
16440
    if (ret == WOLFSSL_SUCCESS && req) {
16441
        WOLFSSL_MSG("req not implemented.");
16442
    }
16443
16444
    if (ret == WOLFSSL_SUCCESS && crl) {
16445
        WOLFSSL_MSG("crl not implemented.");
16446
    }
16447
16448
    if (ret == WOLFSSL_SUCCESS && flag) {
16449
        WOLFSSL_MSG("flag not implemented.");
16450
    }
16451
16452
    if (ret != WOLFSSL_SUCCESS) {
16453
        WOLFSSL_MSG("Error setting WOLFSSL_X509V3_CTX parameters.");
16454
    }
16455
}
16456
16457
#ifndef NO_BIO
16458
int wolfSSL_i2d_X509_REQ(WOLFSSL_X509* req, unsigned char** out)
16459
{
16460
    int derSz = 0;
16461
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
16462
    WOLFSSL_BIO* bio = NULL;
16463
    WOLFSSL_ENTER("wolfSSL_i2d_X509_REQ");
16464
16465
    if (req == NULL || out == NULL) {
16466
        return BAD_FUNC_ARG;
16467
    }
16468
16469
    if (!(bio = wolfSSL_BIO_new(wolfSSL_BIO_s_mem()))) {
16470
        return WOLFSSL_FAILURE;
16471
    }
16472
16473
    if (wolfSSL_i2d_X509_REQ_bio(bio, req) != WOLFSSL_SUCCESS) {
16474
        WOLFSSL_MSG("wolfSSL_i2d_X509_REQ_bio error");
16475
        goto cleanup;
16476
    }
16477
16478
    derSz = wolfSSL_BIO_get_len(bio);
16479
16480
    if (*out == NULL) {
16481
        *out = (unsigned char*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_OPENSSL);
16482
        if (!*out) {
16483
            WOLFSSL_MSG("malloc error");
16484
            ret = MEMORY_E;
16485
            goto cleanup;
16486
        }
16487
    }
16488
16489
    if (wolfSSL_BIO_read(bio, *out, derSz) != derSz) {
16490
        WOLFSSL_MSG("wolfSSL_BIO_read error");
16491
        goto cleanup;
16492
    }
16493
16494
    ret = derSz;
16495
cleanup:
16496
    wolfSSL_BIO_free(bio);
16497
16498
    return ret;
16499
}
16500
#endif /* !NO_BIO */
16501
16502
WOLFSSL_X509* wolfSSL_X509_REQ_new(void)
16503
{
16504
    return wolfSSL_X509_new();
16505
}
16506
16507
void wolfSSL_X509_REQ_free(WOLFSSL_X509* req)
16508
{
16509
    wolfSSL_X509_free(req);
16510
}
16511
16512
int wolfSSL_X509_REQ_set_version(WOLFSSL_X509 *x, long version)
16513
{
16514
    WOLFSSL_ENTER("wolfSSL_X509_REQ_set_version");
16515
    if ((x == NULL) || (version < 0) || (version >= INT_MAX)) {
16516
        return WOLFSSL_FAILURE;
16517
    }
16518
    x->version = (int)version;
16519
    return WOLFSSL_SUCCESS;
16520
}
16521
16522
long wolfSSL_X509_REQ_get_version(const WOLFSSL_X509 *req)
16523
{
16524
    WOLFSSL_ENTER("wolfSSL_X509_REQ_get_version");
16525
    if (req == NULL) {
16526
        return 0; /* invalid arg */
16527
    }
16528
    return (long)req->version;
16529
}
16530
16531
int wolfSSL_X509_REQ_sign(WOLFSSL_X509 *req, WOLFSSL_EVP_PKEY *pkey,
16532
                          const WOLFSSL_EVP_MD *md)
16533
{
16534
    int ret;
16535
    WC_DECLARE_VAR(der, byte, 2048, 0);
16536
    int derSz = 2048;
16537
16538
    if (req == NULL || pkey == NULL || md == NULL) {
16539
        WOLFSSL_LEAVE("wolfSSL_X509_REQ_sign", BAD_FUNC_ARG);
16540
        return WOLFSSL_FAILURE;
16541
    }
16542
16543
    WC_ALLOC_VAR_EX(der, byte, derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER,
16544
        return WOLFSSL_FAILURE);
16545
16546
    /* Create a Cert that has the certificate request fields. */
16547
    req->sigOID = wolfSSL_sigTypeFromPKEY((WOLFSSL_EVP_MD*)md, pkey);
16548
    ret = wolfssl_x509_make_der(req, 1, der, &derSz, 0);
16549
    if (ret != WOLFSSL_SUCCESS) {
16550
        WC_FREE_VAR_EX(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
16551
        WOLFSSL_MSG("Unable to make DER for X509");
16552
        WOLFSSL_LEAVE("wolfSSL_X509_REQ_sign", ret);
16553
        return WOLFSSL_FAILURE;
16554
    }
16555
16556
    if (wolfSSL_X509_resign_cert(req, 1, der, 2048, derSz,
16557
            (WOLFSSL_EVP_MD*)md, pkey) <= 0) {
16558
        WC_FREE_VAR_EX(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
16559
        return WOLFSSL_FAILURE;
16560
    }
16561
    WC_FREE_VAR_EX(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
16562
    return WOLFSSL_SUCCESS;
16563
}
16564
16565
int wolfSSL_X509_REQ_sign_ctx(WOLFSSL_X509 *req,
16566
                              WOLFSSL_EVP_MD_CTX* md_ctx)
16567
{
16568
    if (md_ctx && md_ctx->pctx)
16569
        return wolfSSL_X509_REQ_sign(req, md_ctx->pctx->pkey,
16570
                wolfSSL_EVP_MD_CTX_md(md_ctx));
16571
    else
16572
        return WOLFSSL_FAILURE;
16573
}
16574
16575
static int regenX509REQDerBuffer(WOLFSSL_X509* x509)
16576
{
16577
    int derSz = X509_BUFFER_SZ;
16578
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
16579
#ifndef WOLFSSL_SMALL_STACK
16580
    byte der[X509_BUFFER_SZ];
16581
#else
16582
    byte* der;
16583
16584
    der = (byte*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
16585
    if (!der) {
16586
        WOLFSSL_MSG("malloc failed");
16587
        return WOLFSSL_FAILURE;
16588
    }
16589
#endif
16590
16591
    if (wolfssl_x509_make_der(x509, 1, der, &derSz, 0) == WOLFSSL_SUCCESS) {
16592
        FreeDer(&x509->derCert);
16593
        if (AllocDer(&x509->derCert, (word32)derSz, CERT_TYPE,
16594
                                                             x509->heap) == 0) {
16595
            XMEMCPY(x509->derCert->buffer, der, derSz);
16596
            ret = WOLFSSL_SUCCESS;
16597
        }
16598
        else {
16599
            WOLFSSL_MSG("Failed to allocate DER buffer for X509");
16600
        }
16601
    }
16602
    else {
16603
        WOLFSSL_MSG("Unable to make DER for X509 REQ");
16604
    }
16605
    WC_FREE_VAR_EX(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
16606
    return ret;
16607
}
16608
16609
int wolfSSL_X509_REQ_add_extensions(WOLFSSL_X509* req,
16610
        WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* ext_sk)
16611
{
16612
    WOLFSSL_X509_EXTENSION* ext = NULL;
16613
16614
    if (!req || !ext_sk) {
16615
        WOLFSSL_MSG("Bad parameter");
16616
        return WOLFSSL_FAILURE;
16617
    }
16618
16619
    /* It is not an error if the stack is empty. */
16620
    ext = ext_sk->data.ext;
16621
    if (ext == NULL) {
16622
        return WOLFSSL_SUCCESS;
16623
    }
16624
16625
    while (ext_sk) {
16626
        ext = ext_sk->data.ext;
16627
16628
        if (wolfSSL_X509_add_ext(req, ext, -1) != WOLFSSL_SUCCESS) {
16629
            WOLFSSL_MSG("wolfSSL_X509_add_ext error");
16630
            return WOLFSSL_FAILURE;
16631
        }
16632
16633
        ext_sk = ext_sk->next;
16634
    }
16635
16636
    return regenX509REQDerBuffer(req);
16637
}
16638
16639
int wolfSSL_X509_REQ_add1_attr_by_txt(WOLFSSL_X509 *req,
16640
                              const char *attrname, int type,
16641
                              const unsigned char *bytes, int len)
16642
{
16643
    WOLFSSL_ENTER("wolfSSL_X509_REQ_add1_attr_by_txt");
16644
16645
#ifdef HAVE_LIBEST
16646
    if (!req || !attrname || !bytes || type != MBSTRING_ASC) {
16647
        WOLFSSL_MSG("Bad parameter");
16648
        return WOLFSSL_FAILURE;
16649
    }
16650
16651
    if (len < 0) {
16652
        len = (int)XSTRLEN((char*)bytes);
16653
    }
16654
16655
    /* For now just pretend that we support this for libest testing */
16656
    if (len == XSTR_SIZEOF("1.3.6.1.1.1.1.22") &&
16657
            XMEMCMP("1.3.6.1.1.1.1.22", bytes, len) == 0) {
16658
        /* MAC Address */
16659
    }
16660
    else if (len == XSTR_SIZEOF("1.2.840.10045.2.1") &&
16661
            XMEMCMP("1.2.840.10045.2.1", bytes, len) == 0) {
16662
        /* ecPublicKey */
16663
    }
16664
    else if (len == XSTR_SIZEOF("1.2.840.10045.4.3.3") &&
16665
            XMEMCMP("1.2.840.10045.4.3.3", bytes, len) == 0) {
16666
        /* ecdsa-with-SHA384 */
16667
    }
16668
    else {
16669
        return WOLFSSL_FAILURE;
16670
    }
16671
16672
    /* return error if not built for libest */
16673
    return WOLFSSL_SUCCESS;
16674
#else
16675
    (void)req;
16676
    (void)attrname;
16677
    (void)type;
16678
    (void)bytes;
16679
    (void)len;
16680
    return WOLFSSL_FAILURE;
16681
#endif
16682
}
16683
16684
16685
static int wolfSSL_X509_ATTRIBUTE_set(WOLFSSL_X509_ATTRIBUTE* attr,
16686
        const char* data, int dataSz, int type, int nid)
16687
{
16688
    if (attr) {
16689
        attr->value->value.asn1_string = wolfSSL_ASN1_STRING_new();
16690
        if (wolfSSL_ASN1_STRING_set(attr->value->value.asn1_string,
16691
                data, dataSz) != WOLFSSL_SUCCESS) {
16692
            wolfSSL_ASN1_STRING_free(attr->value->value.asn1_string);
16693
            WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
16694
            return WOLFSSL_FAILURE;
16695
        }
16696
        attr->value->type = type;
16697
        attr->object->nid = nid;
16698
    }
16699
    else {
16700
        WOLFSSL_MSG("wolfSSL_X509_ATTRIBUTE_new error");
16701
        return WOLFSSL_FAILURE;
16702
    }
16703
16704
    return WOLFSSL_SUCCESS;
16705
}
16706
16707
16708
int wolfSSL_X509_REQ_add1_attr_by_NID(WOLFSSL_X509 *req,
16709
                                      int nid, int type,
16710
                                      const unsigned char *bytes,
16711
                                      int len)
16712
{
16713
    int ret;
16714
    WOLFSSL_X509_ATTRIBUTE* attr;
16715
16716
    WOLFSSL_ENTER("wolfSSL_X509_REQ_add1_attr_by_NID");
16717
16718
    if (!req || !bytes || type != WOLFSSL_MBSTRING_ASC) {
16719
        WOLFSSL_MSG("Bad parameter");
16720
        return WOLFSSL_FAILURE;
16721
    }
16722
16723
    switch (nid) {
16724
    case WC_NID_pkcs9_challengePassword:
16725
        if (len < 0)
16726
            len = (int)XSTRLEN((char*)bytes);
16727
        if (len < CTC_NAME_SIZE) {
16728
            XMEMCPY(req->challengePw, bytes, len);
16729
            req->challengePw[len] = '\0';
16730
        }
16731
        else {
16732
            WOLFSSL_MSG("Challenge password too long");
16733
            WOLFSSL_ERROR_VERBOSE(BUFFER_E);
16734
            return WOLFSSL_FAILURE;
16735
        }
16736
        break;
16737
    case WC_NID_serialNumber:
16738
        if (len < 0)
16739
            len = (int)XSTRLEN((char*)bytes);
16740
        if (len + 1 > EXTERNAL_SERIAL_SIZE) {
16741
            WOLFSSL_MSG("SerialNumber too long");
16742
            WOLFSSL_ERROR_VERBOSE(BUFFER_E);
16743
            return WOLFSSL_FAILURE;
16744
        }
16745
        XMEMCPY(req->serial, bytes, len);
16746
        req->serialSz = len;
16747
        break;
16748
16749
    case WC_NID_pkcs9_unstructuredName:
16750
    case WC_NID_pkcs9_contentType:
16751
    case WC_NID_surname:
16752
    case WC_NID_initials:
16753
    case WC_NID_givenName:
16754
    case WC_NID_dnQualifier:
16755
        break;
16756
16757
    default:
16758
        WOLFSSL_MSG("Unsupported attribute");
16759
        return WOLFSSL_FAILURE;
16760
    }
16761
16762
    attr = wolfSSL_X509_ATTRIBUTE_new();
16763
    ret = wolfSSL_X509_ATTRIBUTE_set(attr, (const char*)bytes, len,
16764
            WOLFSSL_V_ASN1_PRINTABLESTRING, nid);
16765
    if (ret != WOLFSSL_SUCCESS) {
16766
        wolfSSL_X509_ATTRIBUTE_free(attr);
16767
    }
16768
    else {
16769
        if (req->reqAttributes == NULL) {
16770
            req->reqAttributes = wolfSSL_sk_new_node(req->heap);
16771
            if (req->reqAttributes != NULL) {
16772
                req->reqAttributes->type = STACK_TYPE_X509_REQ_ATTR;
16773
            }
16774
        }
16775
        if ((req->reqAttributes != NULL) &&
16776
                (req->reqAttributes->type == STACK_TYPE_X509_REQ_ATTR)) {
16777
            /* Using wolfSSL_sk_insert to maintain backwards compatibility with
16778
             * earlier versions of _push API that pushed items to the start of
16779
             * the list instead of the end. */
16780
            ret = wolfSSL_sk_insert(req->reqAttributes, attr, 0) > 0
16781
                    ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
16782
        }
16783
        else {
16784
            ret = WOLFSSL_FAILURE;
16785
        }
16786
        if (ret != WOLFSSL_SUCCESS)
16787
            wolfSSL_X509_ATTRIBUTE_free(attr);
16788
    }
16789
16790
    return ret;
16791
}
16792
16793
WOLFSSL_X509 *wolfSSL_X509_to_X509_REQ(WOLFSSL_X509 *x,
16794
        WOLFSSL_EVP_PKEY *pkey, const WOLFSSL_EVP_MD *md)
16795
{
16796
    WOLFSSL_ENTER("wolfSSL_X509_to_X509_REQ");
16797
    (void)pkey;
16798
    (void)md;
16799
    return wolfSSL_X509_dup(x);
16800
}
16801
16802
int wolfSSL_X509_REQ_set_subject_name(WOLFSSL_X509 *req,
16803
                                      WOLFSSL_X509_NAME *name)
16804
{
16805
    return wolfSSL_X509_set_subject_name(req, name);
16806
}
16807
16808
int wolfSSL_X509_REQ_set_pubkey(WOLFSSL_X509 *req, WOLFSSL_EVP_PKEY *pkey)
16809
{
16810
    return wolfSSL_X509_set_pubkey(req, pkey);
16811
}
16812
#endif /* OPENSSL_ALL && WOLFSSL_CERT_GEN && WOLFSSL_CERT_REQ */
16813
16814
#if (defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)) && \
16815
    (defined(WOLFSSL_CERT_GEN) || defined(WOLFSSL_CERT_REQ))
16816
16817
WOLFSSL_ASN1_TYPE *wolfSSL_X509_ATTRIBUTE_get0_type(
16818
        WOLFSSL_X509_ATTRIBUTE *attr, int idx)
16819
{
16820
    WOLFSSL_ENTER("wolfSSL_X509_ATTRIBUTE_get0_type");
16821
16822
    if (!attr || idx != 0) {
16823
        WOLFSSL_MSG("Bad parameter");
16824
        return NULL;
16825
    }
16826
16827
    return attr->value;
16828
}
16829
16830
16831
/**
16832
 * @param req X509_REQ containing attribute
16833
 * @return the number of attributes
16834
 */
16835
int wolfSSL_X509_REQ_get_attr_count(const WOLFSSL_X509 *req)
16836
{
16837
    if (req == NULL || req->reqAttributes == NULL)
16838
        return 0;
16839
16840
    return wolfSSL_sk_num(req->reqAttributes);
16841
}
16842
16843
16844
/**
16845
 * @param req X509_REQ containing attribute
16846
 * @param loc NID of the attribute to return
16847
 */
16848
WOLFSSL_X509_ATTRIBUTE *wolfSSL_X509_REQ_get_attr(
16849
        const WOLFSSL_X509 *req, int loc)
16850
{
16851
    WOLFSSL_ENTER("wolfSSL_X509_REQ_get_attr");
16852
16853
    if (!req || req->reqAttributes == NULL) {
16854
        WOLFSSL_MSG("Bad parameter");
16855
        return NULL;
16856
    }
16857
16858
    return (WOLFSSL_X509_ATTRIBUTE*)wolfSSL_sk_value(req->reqAttributes, loc);
16859
}
16860
16861
/* Return NID as the attr index */
16862
int wolfSSL_X509_REQ_get_attr_by_NID(const WOLFSSL_X509 *req,
16863
        int nid, int lastpos)
16864
{
16865
    int idx;
16866
16867
    WOLFSSL_ENTER("wolfSSL_X509_REQ_get_attr_by_NID");
16868
16869
    if (!req) {
16870
        WOLFSSL_MSG("Bad parameter");
16871
        return WOLFSSL_FATAL_ERROR;
16872
    }
16873
16874
    /* search through stack for first matching nid */
16875
    for (idx = lastpos + 1; idx < wolfSSL_sk_num(req->reqAttributes); idx++) {
16876
        WOLFSSL_X509_ATTRIBUTE* attr =
16877
             (WOLFSSL_X509_ATTRIBUTE*)wolfSSL_sk_value(req->reqAttributes, idx);
16878
        if (attr != NULL && attr->object != NULL && attr->object->nid == nid)
16879
            return idx;
16880
    }
16881
16882
    return WOLFSSL_FATAL_ERROR;
16883
}
16884
16885
WOLFSSL_X509_ATTRIBUTE* wolfSSL_X509_ATTRIBUTE_new(void)
16886
{
16887
    WOLFSSL_X509_ATTRIBUTE* ret;
16888
    WOLFSSL_ENTER("wolfSSL_X509_ATTRIBUTE_new");
16889
    ret = (WOLFSSL_X509_ATTRIBUTE*)XMALLOC(sizeof(WOLFSSL_X509_ATTRIBUTE),
16890
            NULL, DYNAMIC_TYPE_OPENSSL);
16891
    if (!ret) {
16892
        WOLFSSL_MSG("malloc error");
16893
        return NULL;
16894
    }
16895
    XMEMSET(ret, 0, sizeof(WOLFSSL_X509_ATTRIBUTE));
16896
    ret->object = wolfSSL_ASN1_OBJECT_new();
16897
    ret->value = wolfSSL_ASN1_TYPE_new();
16898
    /* Don't allocate ret->set since WOLFSSL_ASN1_TYPE
16899
     * is not supported as a stack type */
16900
    if (!ret->object || !ret->value) {
16901
        WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new or wolfSSL_ASN1_TYPE_new error");
16902
        wolfSSL_X509_ATTRIBUTE_free(ret);
16903
        return NULL;
16904
    }
16905
    return ret;
16906
}
16907
16908
void wolfSSL_X509_ATTRIBUTE_free(WOLFSSL_X509_ATTRIBUTE* attr)
16909
{
16910
    WOLFSSL_ENTER("wolfSSL_X509_ATTRIBUTE_free");
16911
    if (attr) {
16912
        if (attr->object) {
16913
            wolfSSL_ASN1_OBJECT_free(attr->object);
16914
        }
16915
        if (attr->value) {
16916
            wolfSSL_ASN1_TYPE_free(attr->value);
16917
        }
16918
        if (attr->set) {
16919
            wolfSSL_sk_pop_free(attr->set, NULL);
16920
        }
16921
        XFREE(attr, NULL, DYNAMIC_TYPE_OPENSSL);
16922
    }
16923
}
16924
#endif /* (OPENSSL_ALL || OPENSSL_EXTRA) &&
16925
          (WOLFSSL_CERT_GEN || WOLFSSL_CERT_REQ) */
16926
16927
#if defined(WOLFSSL_ACERT) && \
16928
   (defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA))
16929
16930
/* Allocate and return a new WOLFSSL_X509_ACERT struct pointer.
16931
 *
16932
 * @param [in]      heap        heap hint
16933
 *
16934
 * @return  pointer  on success
16935
 * @return  NULL     on error
16936
 * */
16937
WOLFSSL_X509_ACERT * wolfSSL_X509_ACERT_new_ex(void* heap)
16938
{
16939
    WOLFSSL_X509_ACERT * x509 = NULL;
16940
16941
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_new");
16942
16943
    x509 = (WOLFSSL_X509_ACERT*) XMALLOC(sizeof(WOLFSSL_X509_ACERT), heap,
16944
                                         DYNAMIC_TYPE_X509_ACERT);
16945
16946
    if (x509 != NULL) {
16947
        wolfSSL_X509_ACERT_init(x509, 1, heap);
16948
    }
16949
16950
    return x509;
16951
}
16952
16953
WOLFSSL_X509_ACERT * wolfSSL_X509_ACERT_new(void)
16954
{
16955
    return wolfSSL_X509_ACERT_new_ex(NULL);
16956
}
16957
16958
/* Initialize a WOLFSSL_X509_ACERT struct.
16959
 *
16960
 * If dynamic == 1, then the x509 pointer will be freed
16961
 * in wolfSSL_X509_ACERT_free.
16962
 *
16963
 * @param [in]      x509        x509 acert pointer
16964
 * @param [in]      dynamic     dynamic mem flag
16965
 * @param [in]      heap        heap hint
16966
 *
16967
 * @return  void
16968
 * */
16969
void wolfSSL_X509_ACERT_init(WOLFSSL_X509_ACERT * x509, int dynamic, void* heap)
16970
{
16971
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_init");
16972
16973
    if (x509 == NULL) {
16974
        WOLFSSL_MSG("error: InitX509Acert: null parameter");
16975
        return;
16976
    }
16977
16978
    XMEMSET(x509, 0, sizeof(*x509));
16979
16980
    x509->heap = heap;
16981
    x509->dynamic = dynamic;
16982
}
16983
16984
/* Free a WOLFSSL_X509_ACERT struct and its sub-fields.
16985
 *
16986
 * If this ACERT was initialized with dynamic == 1, then
16987
 * the x509 pointer itself will be freed as well.
16988
 *
16989
 * @param [in]      x509        x509 acert pointer
16990
 *
16991
 * @return  void
16992
 * */
16993
void wolfSSL_X509_ACERT_free(WOLFSSL_X509_ACERT * x509)
16994
{
16995
    int    dynamic = 0;
16996
    void * heap = NULL;
16997
16998
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_free");
16999
17000
    if (x509 == NULL) {
17001
        WOLFSSL_MSG("error: wolfSSL_X509_ACERT_free: null parameter");
17002
        return;
17003
    }
17004
17005
    dynamic = x509->dynamic;
17006
    heap = x509->heap;
17007
17008
    /* Free holder and att cert issuer structures. */
17009
    if (x509->holderIssuerName) {
17010
        FreeAltNames(x509->holderIssuerName, heap);
17011
        x509->holderIssuerName = NULL;
17012
    }
17013
17014
    if (x509->holderEntityName) {
17015
        FreeAltNames(x509->holderEntityName, heap);
17016
        x509->holderEntityName = NULL;
17017
    }
17018
17019
    if (x509->AttCertIssuerName) {
17020
        FreeAltNames(x509->AttCertIssuerName, heap);
17021
        x509->AttCertIssuerName = NULL;
17022
    }
17023
17024
    if (x509->rawAttr != NULL) {
17025
        XFREE(x509->rawAttr, heap, DYNAMIC_TYPE_X509_EXT);
17026
        x509->rawAttr = NULL;
17027
        x509->rawAttrLen = 0;
17028
    }
17029
17030
    /* Free derCert source and signature buffer. */
17031
    FreeDer(&x509->derCert);
17032
17033
    if (x509->sig.buffer != NULL) {
17034
        XFREE(x509->sig.buffer, heap, DYNAMIC_TYPE_SIGNATURE);
17035
        x509->sig.buffer = NULL;
17036
    }
17037
17038
    /* Finally memset and free x509 acert structure. */
17039
    XMEMSET(x509, 0, sizeof(*x509));
17040
17041
    if (dynamic == 1) {
17042
        XFREE(x509, heap, DYNAMIC_TYPE_X509_ACERT);
17043
    }
17044
17045
    return;
17046
}
17047
17048
#if defined(OPENSSL_EXTRA)
17049
long wolfSSL_X509_ACERT_get_version(const WOLFSSL_X509_ACERT* x509)
17050
{
17051
    int version = 0;
17052
17053
    if (x509 == NULL) {
17054
        return 0L;
17055
    }
17056
17057
    version = x509->version;
17058
17059
    return version != 0 ? (long)version - 1L : 0L;
17060
}
17061
#endif /* OPENSSL_EXTRA */
17062
17063
int wolfSSL_X509_ACERT_version(WOLFSSL_X509_ACERT* x509)
17064
{
17065
    if (x509 == NULL) {
17066
        return 0;
17067
    }
17068
17069
    return x509->version;
17070
}
17071
17072
/* Retrieve the serial number from an ACERT.
17073
 *
17074
 * @param [in]       x509    the x509 attribute certificate
17075
 * @param [in, out]  buf     the serial number buffer pointer
17076
 * @param [in, out]  bufSz   the serial number buffer size pointer
17077
 *
17078
 * buf may be null, but bufSz is required. On success, sets
17079
 * bufSz pointer to signature length, and copies signature
17080
 * to buf if provided.
17081
 *
17082
 * Returns  WWOLFSSL_FATAL_ERROR if bufSz is null or too small.
17083
 * Returns  WOLFSSL_SUCCESS on success.
17084
 */
17085
int wolfSSL_X509_ACERT_get_serial_number(WOLFSSL_X509_ACERT* x509,
17086
                                         byte* buf, int* bufSz)
17087
{
17088
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_get_serial_number");
17089
17090
    if (x509 == NULL || bufSz == NULL) {
17091
        WOLFSSL_MSG("error: null argument passed in");
17092
        return BAD_FUNC_ARG;
17093
    }
17094
17095
    if (buf != NULL) {
17096
        if (*bufSz < x509->serialSz) {
17097
            WOLFSSL_MSG("error: serial buffer too small");
17098
            return BUFFER_E;
17099
        }
17100
17101
        XMEMCPY(buf, x509->serial, x509->serialSz);
17102
    }
17103
17104
    *bufSz = x509->serialSz;
17105
17106
    return WOLFSSL_SUCCESS;
17107
}
17108
17109
/* Sets buf pointer and len to raw Attribute buffer and buffer len
17110
 * in X509 struct.
17111
 *
17112
 * Returns WOLFSSL_SUCCESS on success.
17113
 * Returns BAD_FUNC_ARG if input pointers are null.
17114
 * */
17115
int wolfSSL_X509_ACERT_get_attr_buf(const WOLFSSL_X509_ACERT* x509,
17116
                                                const byte ** rawAttr,
17117
                                                word32 * rawAttrLen)
17118
{
17119
    if (x509 == NULL || rawAttr == NULL || rawAttrLen == NULL) {
17120
        return BAD_FUNC_ARG;
17121
    }
17122
17123
    *rawAttr = x509->rawAttr;
17124
    *rawAttrLen = x509->rawAttrLen;
17125
17126
    return WOLFSSL_SUCCESS;
17127
}
17128
17129
#ifndef NO_WOLFSSL_STUB
17130
int wolfSSL_X509_ACERT_sign(WOLFSSL_X509_ACERT * x509,
17131
                                        WOLFSSL_EVP_PKEY * pkey,
17132
                                        const WOLFSSL_EVP_MD * md)
17133
{
17134
    WOLFSSL_STUB("X509_ACERT_sign");
17135
    (void) x509;
17136
    (void) pkey;
17137
    (void) md;
17138
    return WOLFSSL_NOT_IMPLEMENTED;
17139
}
17140
#endif /* NO_WOLFSSL_STUB */
17141
17142
/* Helper function for ACERT_verify.
17143
 *
17144
 * @param [in]       x509    the x509 attribute certificate
17145
 * @param [in, out]  outSz   the x509 der length
17146
 *
17147
 * @return  der buffer on success
17148
 * @return  NULL on error
17149
 * */
17150
static const byte* acert_get_der(WOLFSSL_X509_ACERT * x509, int* outSz)
17151
{
17152
    if (x509 == NULL || x509->derCert == NULL || outSz == NULL) {
17153
        return NULL;
17154
    }
17155
17156
    *outSz = (int)x509->derCert->length;
17157
    return x509->derCert->buffer;
17158
}
17159
17160
/* Given an X509_ACERT and EVP_PKEY, verify the acert's signature.
17161
 *
17162
 * @param [in]    x509    the x509 attribute certificate
17163
 * @param [in]    pkey    the evp_pkey
17164
 *
17165
 * @return  WOLFSSL_SUCCESS on verify success
17166
 * @return  < 0 on error
17167
 * */
17168
int wolfSSL_X509_ACERT_verify(WOLFSSL_X509_ACERT* x509, WOLFSSL_EVP_PKEY* pkey)
17169
{
17170
    int          ret = 0;
17171
    const byte * der = NULL;
17172
    int          derSz = 0;
17173
    int          pkey_type;
17174
17175
    if (x509 == NULL || pkey == NULL) {
17176
        WOLFSSL_MSG("error: wolfSSL_X509_ACERT_verify: bad arg");
17177
        return WOLFSSL_FATAL_ERROR;
17178
    }
17179
17180
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_verify");
17181
17182
    der = acert_get_der(x509, &derSz);
17183
17184
    if (der == NULL || derSz <= 0) {
17185
        WOLFSSL_MSG("error: wolfSSL_X509_ACERT_verify: get der failed");
17186
        return WOLFSSL_FATAL_ERROR;
17187
    }
17188
17189
    switch (pkey->type) {
17190
    case WC_EVP_PKEY_RSA:
17191
        pkey_type = RSAk;
17192
        break;
17193
17194
    case WC_EVP_PKEY_EC:
17195
        pkey_type = ECDSAk;
17196
        break;
17197
17198
    case WC_EVP_PKEY_DSA:
17199
        pkey_type = DSAk;
17200
        break;
17201
17202
    default:
17203
        WOLFSSL_MSG("error: wolfSSL_X509_ACERT_verify: unknown pkey type");
17204
        return WOLFSSL_FATAL_ERROR;
17205
    }
17206
17207
17208
    ret = VerifyX509Acert(der, (word32)derSz,
17209
                          (const byte *)pkey->pkey.ptr, pkey->pkey_sz,
17210
                          pkey_type, x509->heap);
17211
17212
    return ret == 0 ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
17213
}
17214
17215
/* Loads an x509 attribute certificate from buffer, and returns
17216
 * pointer to new WOLFSSL_X509_ACERT struct on success.
17217
 *
17218
 * @param [in]  buf    The acert buffer to load.
17219
 * @param [in]  sz     The size of the buffer.
17220
 * @param [in]  format The format of the buffer data.
17221
 * @param [in]  heap   Dynamic memory allocation hint.
17222
 *
17223
 * @return  pointer to WOLFSSL_X509_ACERT on success.
17224
 * @return  NULL on error.
17225
 * */
17226
WOLFSSL_X509_ACERT * wolfSSL_X509_ACERT_load_certificate_buffer_ex(
17227
    const unsigned char* buf, int sz, int format, void * heap)
17228
{
17229
    int                  ret = 0;
17230
    WOLFSSL_X509_ACERT * x509 = NULL;
17231
    DerBuffer *          der = NULL;
17232
    WC_DECLARE_VAR(acert, DecodedAcert, 1, 0);
17233
17234
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_load_certificate_buffer");
17235
17236
    if (format == WOLFSSL_FILETYPE_PEM) {
17237
    #ifdef WOLFSSL_PEM_TO_DER
17238
        ret = PemToDer(buf, sz, ACERT_TYPE, &der, heap, NULL, NULL);
17239
17240
        if (ret != 0 || der == NULL || der->buffer == NULL) {
17241
            WOLFSSL_ERROR(ret);
17242
17243
            if (der != NULL) {
17244
                FreeDer(&der);
17245
            }
17246
17247
            return NULL;
17248
        }
17249
    #else
17250
        WOLFSSL_ERROR(NOT_COMPILED_IN);
17251
        return NULL;
17252
    #endif
17253
    }
17254
    else {
17255
        ret = AllocDer(&der, (word32)sz, ACERT_TYPE, heap);
17256
17257
        if (ret != 0 || der == NULL || der->buffer == NULL) {
17258
            WOLFSSL_ERROR(ret);
17259
            return NULL;
17260
        }
17261
17262
        XMEMCPY(der->buffer, buf, sz);
17263
    }
17264
17265
    #ifdef WOLFSSL_SMALL_STACK
17266
    acert = (DecodedAcert*)XMALLOC(sizeof(DecodedAcert), heap,
17267
                                   DYNAMIC_TYPE_DCERT);
17268
    if (acert == NULL) {
17269
        WOLFSSL_ERROR(MEMORY_ERROR);
17270
        FreeDer(&der);
17271
        return NULL;
17272
    }
17273
    #endif
17274
17275
    InitDecodedAcert(acert, der->buffer, der->length, heap);
17276
17277
    ret = ParseX509Acert(acert, VERIFY_SKIP_DATE);
17278
17279
    if (ret == 0) {
17280
        x509 = wolfSSL_X509_ACERT_new_ex(heap);
17281
17282
        if (x509 != NULL) {
17283
            ret = CopyDecodedAcertToX509(x509, acert);
17284
17285
            if (ret != 0) {
17286
                wolfSSL_X509_ACERT_free(x509);
17287
                x509 = NULL;
17288
            }
17289
        }
17290
        else {
17291
            ret = MEMORY_ERROR;
17292
        }
17293
    }
17294
17295
    FreeDecodedAcert(acert);
17296
17297
    WC_FREE_VAR_EX(acert, heap, DYNAMIC_TYPE_DCERT);
17298
17299
    FreeDer(&der);
17300
17301
    if (ret != 0) {
17302
        WOLFSSL_ERROR(ret);
17303
    }
17304
17305
    return x509;
17306
}
17307
17308
WOLFSSL_X509_ACERT * wolfSSL_X509_ACERT_load_certificate_buffer(
17309
    const unsigned char* buf, int sz, int format)
17310
{
17311
    return wolfSSL_X509_ACERT_load_certificate_buffer_ex(buf, sz, format, NULL);
17312
}
17313
17314
/* Retrieve the signature from an ACERT.
17315
 *
17316
 * @param [in]       x509    the x509 attribute certificate
17317
 * @param [in, out]  buf     the signature buffer pointer
17318
 * @param [in, out]  bufSz   the signature buffer size pointer
17319
 *
17320
 * buf may be null, but bufSz is required. On success, sets
17321
 * bufSz pointer to signature length, and copies signature
17322
 * to buf if provided.
17323
 *
17324
 * Returns  WWOLFSSL_FATAL_ERROR if bufSz is null or too small.
17325
 * Returns  WOLFSSL_SUCCESS on success.
17326
 */
17327
int wolfSSL_X509_ACERT_get_signature(WOLFSSL_X509_ACERT* x509,
17328
                                     unsigned char* buf, int* bufSz)
17329
{
17330
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_get_signature");
17331
17332
    if (x509 == NULL || bufSz == NULL) {
17333
        return WOLFSSL_FATAL_ERROR;
17334
    }
17335
17336
    /* If buf array is provided, it must be long enough. */
17337
    if (buf != NULL && *bufSz < (int)x509->sig.length) {
17338
        return WOLFSSL_FATAL_ERROR;
17339
    }
17340
17341
    if (buf != NULL) {
17342
        /* Copy in buffer if provided. */
17343
        XMEMCPY(buf, x509->sig.buffer, x509->sig.length);
17344
    }
17345
17346
    *bufSz = (int)x509->sig.length;
17347
17348
    return WOLFSSL_SUCCESS;
17349
}
17350
#endif /* WOLFSSL_ACERT && (OPENSSL_EXTRA_X509_SMALL || OPENSSL_EXTRA) */
17351
17352
#endif /* !NO_CERTS */
17353
17354
#endif /* !WOLFCRYPT_ONLY */
17355
17356
#endif /* WOLFSSL_X509_INCLUDED */