Coverage Report

Created: 2026-04-01 07:25

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/wolfssl-openssl-api/src/x509.c
Line
Count
Source
1
/* x509.c
2
 *
3
 * Copyright (C) 2006-2026 wolfSSL Inc.
4
 *
5
 * This file is part of wolfSSL.
6
 *
7
 * wolfSSL is free software; you can redistribute it and/or modify
8
 * it under the terms of the GNU General Public License as published by
9
 * the Free Software Foundation; either version 3 of the License, or
10
 * (at your option) any later version.
11
 *
12
 * wolfSSL is distributed in the hope that it will be useful,
13
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15
 * GNU General Public License for more details.
16
 *
17
 * You should have received a copy of the GNU General Public License
18
 * along with this program; if not, write to the Free Software
19
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
20
 */
21
22
#include <wolfssl/wolfcrypt/libwolfssl_sources.h>
23
24
#if !defined(WOLFSSL_X509_INCLUDED)
25
    #ifndef WOLFSSL_IGNORE_FILE_WARN
26
        #warning x509.c does not need to be compiled separately from ssl.c
27
    #endif
28
#else
29
30
#ifndef WOLFCRYPT_ONLY
31
32
#ifndef NO_CERTS
33
34
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
35
    #include <wolfssl/openssl/x509v3.h>
36
#endif
37
#ifdef OPENSSL_EXTRA
38
    #include <wolfssl/wolfio.h>
39
#endif
40
41
/* 16 times MAX_X509_SIZE should be more than enough to read any X509
42
 * certificate file */
43
0
#define MAX_BIO_READ_BUFFER (MAX_X509_SIZE * 16)
44
45
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)
46
unsigned int wolfSSL_X509_get_extension_flags(WOLFSSL_X509* x509)
47
0
{
48
0
    unsigned int flags = 0;
49
50
0
    WOLFSSL_ENTER("wolfSSL_X509_get_extension_flags");
51
52
0
    if (x509 != NULL) {
53
0
        if (x509->keyUsageSet) {
54
0
            flags |= WOLFSSL_EXFLAG_KUSAGE;
55
0
        }
56
0
        if (x509->extKeyUsageSrc != NULL) {
57
0
            flags |= WOLFSSL_EXFLAG_XKUSAGE;
58
0
        }
59
0
    }
60
61
0
    WOLFSSL_LEAVE("wolfSSL_X509_get_extension_flags", flags);
62
63
0
    return flags;
64
0
}
65
66
unsigned int wolfSSL_X509_get_key_usage(WOLFSSL_X509* x509)
67
0
{
68
0
    unsigned int ret = 0;
69
70
0
    WOLFSSL_ENTER("wolfSSL_X509_get_key_usage");
71
72
0
    if (x509 == NULL) {
73
0
        WOLFSSL_MSG("x509 is NULL");
74
0
    }
75
0
    else {
76
0
        if (x509->keyUsageSet) {
77
0
            ret = wolfSSL_X509_get_keyUsage(x509);
78
0
        }
79
0
        else {
80
0
            ret = (unsigned int)-1;
81
0
        }
82
0
    }
83
84
0
    WOLFSSL_LEAVE("wolfSSL_X509_get_key_usage", ret);
85
86
0
    return ret;
87
0
}
88
89
unsigned int wolfSSL_X509_get_extended_key_usage(WOLFSSL_X509* x509)
90
0
{
91
0
    int ret = 0;
92
93
0
    WOLFSSL_ENTER("wolfSSL_X509_get_extended_key_usage");
94
95
0
    if (x509 != NULL) {
96
0
        if (x509->extKeyUsage & EXTKEYUSE_OCSP_SIGN)
97
0
            ret |= WOLFSSL_XKU_OCSP_SIGN;
98
0
        if (x509->extKeyUsage & EXTKEYUSE_TIMESTAMP)
99
0
            ret |= WOLFSSL_XKU_TIMESTAMP;
100
0
        if (x509->extKeyUsage & EXTKEYUSE_EMAILPROT)
101
0
            ret |= WOLFSSL_XKU_SMIME;
102
0
        if (x509->extKeyUsage & EXTKEYUSE_CODESIGN)
103
0
            ret |= WOLFSSL_XKU_CODE_SIGN;
104
0
        if (x509->extKeyUsage & EXTKEYUSE_CLIENT_AUTH)
105
0
            ret |= WOLFSSL_XKU_SSL_CLIENT;
106
0
        if (x509->extKeyUsage & EXTKEYUSE_SERVER_AUTH)
107
0
            ret |= WOLFSSL_XKU_SSL_SERVER;
108
0
        if (x509->extKeyUsage & EXTKEYUSE_ANY)
109
0
            ret |= WOLFSSL_XKU_ANYEKU;
110
0
    }
111
112
0
    WOLFSSL_LEAVE("wolfSSL_X509_get_extended_key_usage", ret);
113
114
0
    return (unsigned int)ret;
115
0
}
116
117
/* Returns the number of X509V3 extensions in X509 object, or 0 on failure */
118
int wolfSSL_X509_get_ext_count(const WOLFSSL_X509* passedCert)
119
0
{
120
0
    int extCount = 0;
121
0
    int length = 0;
122
0
    int outSz = 0;
123
0
    const byte* rawCert;
124
0
    int sz = 0;
125
0
    word32 idx = 0;
126
0
    const byte* input;
127
0
    WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
128
129
0
    WOLFSSL_ENTER("wolfSSL_X509_get_ext_count");
130
0
    if (passedCert == NULL) {
131
0
        WOLFSSL_MSG("\tNot passed a certificate");
132
0
        return WOLFSSL_FAILURE;
133
0
    }
134
135
0
    rawCert = wolfSSL_X509_get_der((WOLFSSL_X509*)passedCert, &outSz);
136
0
    if (rawCert == NULL) {
137
0
        WOLFSSL_MSG("\tpassedCert has no internal DerBuffer set.");
138
0
        return WOLFSSL_FAILURE;
139
0
    }
140
141
0
#ifdef WOLFSSL_SMALL_STACK
142
0
    cert = (DecodedCert *)XMALLOC(sizeof(*cert), NULL, DYNAMIC_TYPE_DCERT);
143
0
    if (cert == NULL) {
144
0
        WOLFSSL_MSG("out of memory");
145
0
        return WOLFSSL_FAILURE;
146
0
    }
147
0
#endif
148
149
0
    InitDecodedCert(cert, rawCert, (word32)outSz, 0);
150
151
0
    if (ParseCert(cert,
152
#ifdef WOLFSSL_CERT_REQ
153
            passedCert->isCSR ? CERTREQ_TYPE :
154
#endif
155
0
                    CA_TYPE,
156
0
            NO_VERIFY, NULL) < 0) {
157
0
        WOLFSSL_MSG("\tCertificate parsing failed");
158
0
        goto out;
159
0
    }
160
161
0
    input = cert->extensions;
162
0
    sz = cert->extensionsSz;
163
164
0
    if (input == NULL || sz == 0) {
165
0
        WOLFSSL_MSG("\tsz or input NULL error");
166
0
        goto out;
167
0
    }
168
169
#ifdef WOLFSSL_CERT_REQ
170
    if (!passedCert->isCSR)
171
#endif
172
0
    {
173
0
        if (input[idx++] != ASN_EXTENSIONS) {
174
0
            WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
175
0
            goto out;
176
0
        }
177
178
0
        if (GetLength(input, &idx, &length, (word32)sz) < 0) {
179
0
            WOLFSSL_MSG("\tfail: invalid length");
180
0
            goto out;
181
0
        }
182
0
    }
183
184
0
    if (GetSequence(input, &idx, &length, (word32)sz) < 0) {
185
0
        WOLFSSL_MSG("\tfail: should be a SEQUENCE (1)");
186
0
        goto out;
187
0
    }
188
189
0
    while (idx < (word32)sz) {
190
0
        if (GetSequence(input, &idx, &length, (word32)sz) < 0) {
191
0
            WOLFSSL_MSG("\tfail: should be a SEQUENCE");
192
0
            FreeDecodedCert(cert);
193
0
            return WOLFSSL_FAILURE;
194
0
        }
195
0
        idx += length;
196
0
        extCount++;
197
0
    }
198
199
0
out:
200
201
0
    FreeDecodedCert(cert);
202
0
    WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
203
0
    return extCount;
204
0
}
205
206
/* Creates and returns pointer to a new X509_EXTENSION object in memory */
207
WOLFSSL_X509_EXTENSION* wolfSSL_X509_EXTENSION_new(void)
208
0
{
209
0
    WOLFSSL_X509_EXTENSION* newExt;
210
211
0
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_new");
212
213
0
    newExt = (WOLFSSL_X509_EXTENSION*)XMALLOC(sizeof(WOLFSSL_X509_EXTENSION),
214
0
              NULL, DYNAMIC_TYPE_X509_EXT);
215
0
    if (newExt == NULL)
216
0
        return NULL;
217
0
    XMEMSET(newExt, 0, sizeof(WOLFSSL_X509_EXTENSION));
218
219
0
    return newExt;
220
0
}
221
222
223
/* Clear out and free internal pointers of ASN.1 STRING object.
224
 *
225
 * @param [in] asn1  ASN.1 STRING object.
226
 */
227
static void wolfSSL_ASN1_STRING_clear(WOLFSSL_ASN1_STRING* asn1)
228
0
{
229
    /* Check we have an object to free. */
230
0
    if (asn1 != NULL) {
231
        /* Dispose of dynamic data. */
232
0
        if ((asn1->length > 0) && asn1->isDynamic) {
233
0
            XFREE(asn1->data, NULL, DYNAMIC_TYPE_OPENSSL);
234
0
        }
235
0
        XMEMSET(asn1, 0, sizeof(WOLFSSL_ASN1_STRING));
236
0
    }
237
0
}
238
239
240
void wolfSSL_X509_EXTENSION_free(WOLFSSL_X509_EXTENSION* x)
241
0
{
242
0
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_free");
243
0
    if (x == NULL)
244
0
        return;
245
246
0
    if (x->obj != NULL) {
247
0
        wolfSSL_ASN1_OBJECT_free(x->obj);
248
0
    }
249
250
0
    wolfSSL_ASN1_STRING_clear(&x->value);
251
0
    wolfSSL_sk_pop_free(x->ext_sk, NULL);
252
253
0
    XFREE(x, NULL, DYNAMIC_TYPE_X509_EXT);
254
0
}
255
256
WOLFSSL_X509_EXTENSION* wolfSSL_X509_EXTENSION_dup(WOLFSSL_X509_EXTENSION* src)
257
0
{
258
0
    WOLFSSL_X509_EXTENSION* ret = NULL;
259
0
    int err = 0;
260
261
0
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_dup");
262
263
0
    if (src == NULL) {
264
0
        err = 1;
265
0
    }
266
267
0
    if (err == 0) {
268
0
        ret = wolfSSL_X509_EXTENSION_new();
269
0
        if (ret == NULL) {
270
0
            err = 1;
271
0
        }
272
0
    }
273
0
    if (err == 0 && src->obj != NULL) {
274
0
        ret->obj = wolfSSL_ASN1_OBJECT_dup(src->obj);
275
0
        if (ret->obj == NULL) {
276
0
            err = 1;
277
0
        }
278
0
    }
279
0
    if (err == 0) {
280
0
        ret->crit = src->crit;
281
0
        if (wolfSSL_ASN1_STRING_copy(&ret->value, &src->value) !=
282
0
                WOLFSSL_SUCCESS) {
283
0
            err = 1;
284
0
        }
285
0
    }
286
287
0
    if (err == 1 && ret != NULL) {
288
0
        wolfSSL_X509_EXTENSION_free(ret);
289
0
        ret = NULL;
290
0
    }
291
292
0
    return ret;
293
0
}
294
295
WOLFSSL_X509_EXTENSION* wolfSSL_X509_EXTENSION_create_by_OBJ(
296
    WOLFSSL_X509_EXTENSION* ex, WOLFSSL_ASN1_OBJECT *obj, int crit,
297
    WOLFSSL_ASN1_STRING *data)
298
0
{
299
0
    int err = 0;
300
0
    WOLFSSL_X509_EXTENSION *ret = ex;
301
302
0
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_create_by_OBJ");
303
304
0
    if ((obj == NULL) || (data == NULL)) {
305
0
       return NULL;
306
0
    }
307
308
0
    if (ret == NULL) {
309
0
        ret = wolfSSL_X509_EXTENSION_new();
310
0
        if (ret == NULL) {
311
0
            err = 1;
312
0
        }
313
0
    }
314
0
    else {
315
        /* Prevent potential memory leaks and dangling pointers. */
316
0
        wolfSSL_ASN1_OBJECT_free(ret->obj);
317
0
        ret->obj = NULL;
318
0
        wolfSSL_ASN1_STRING_clear(&ret->value);
319
0
    }
320
321
0
    if (err == 0) {
322
0
        ret->crit = crit;
323
0
        ret->obj = wolfSSL_ASN1_OBJECT_dup(obj);
324
0
        if (ret->obj == NULL) {
325
0
            err = 1;
326
0
        }
327
0
    }
328
329
0
    if (err == 0) {
330
0
        if (wolfSSL_ASN1_STRING_copy(&ret->value, data) != WOLFSSL_SUCCESS) {
331
0
            err = 1;
332
0
        }
333
0
    }
334
335
0
    if (err == 1) {
336
0
        if (ret != ex) {
337
0
            wolfSSL_X509_EXTENSION_free(ret);
338
0
        }
339
0
        ret = NULL;
340
0
    }
341
0
    return ret;
342
0
}
343
344
/* Creates and returns a new WOLFSSL_X509_EXTENSION stack. */
345
WOLFSSL_STACK* wolfSSL_sk_new_x509_ext(void)
346
0
{
347
0
    WOLFSSL_STACK* sk;
348
0
    WOLFSSL_ENTER("wolfSSL_sk_new_x509_ext");
349
350
0
    sk = wolfSSL_sk_new_null();
351
0
    if (sk) {
352
0
        sk->type = STACK_TYPE_X509_EXT;
353
0
    }
354
0
    return sk;
355
0
}
356
357
/* This function does NOT return 1 on success. It returns 0 on fail, and the
358
 * number of items in the stack upon success. This is for compatibility with
359
 * OpenSSL. */
360
int wolfSSL_sk_X509_EXTENSION_push(WOLFSSL_STACK* sk,
361
    WOLFSSL_X509_EXTENSION* ext)
362
0
{
363
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_EXTENSION_push");
364
365
0
    return wolfSSL_sk_push(sk, ext);
366
0
}
367
368
static WOLFSSL_STACK* generateExtStack(const WOLFSSL_X509 *x)
369
0
{
370
0
    int numOfExt, i;
371
0
    WOLFSSL_X509 *x509 = (WOLFSSL_X509*)x;
372
0
    WOLFSSL_STACK* ret;
373
0
    WOLFSSL_STACK* tmp;
374
375
0
    if (!x509) {
376
0
        WOLFSSL_MSG("Bad parameter");
377
0
        return NULL;
378
0
    }
379
380
    /* Save x509->ext_sk */
381
0
    tmp = x509->ext_sk;
382
0
    x509->ext_sk = NULL;
383
0
    numOfExt = wolfSSL_X509_get_ext_count(x509);
384
385
0
    for (i = 0; i < numOfExt; i++) {
386
        /* Build the extension stack */
387
0
        (void)wolfSSL_X509_set_ext(x509, i);
388
0
    }
389
390
    /* Restore */
391
0
    ret = x509->ext_sk;
392
0
    x509->ext_sk = tmp;
393
0
    return ret;
394
0
}
395
396
/**
397
 * @param x Certificate to extract extensions from
398
 * @return STACK_OF(X509_EXTENSION)*
399
 */
400
const WOLFSSL_STACK *wolfSSL_X509_get0_extensions(const WOLFSSL_X509 *x)
401
0
{
402
0
    int numOfExt;
403
0
    WOLFSSL_X509 *x509 = (WOLFSSL_X509*)x;
404
0
    WOLFSSL_ENTER("wolfSSL_X509_get0_extensions");
405
406
0
    if (!x509) {
407
0
        WOLFSSL_MSG("Bad parameter");
408
0
        return NULL;
409
0
    }
410
411
0
    numOfExt = wolfSSL_X509_get_ext_count(x509);
412
413
0
    if (numOfExt != wolfSSL_sk_num(x509->ext_sk_full)) {
414
0
        wolfSSL_sk_pop_free(x509->ext_sk_full, NULL);
415
0
        x509->ext_sk_full = generateExtStack(x);
416
0
    }
417
418
0
    return x509->ext_sk_full;
419
0
}
420
421
/**
422
 * Caller is responsible for freeing the returned stack.
423
 */
424
const WOLFSSL_STACK *wolfSSL_X509_REQ_get_extensions(const WOLFSSL_X509 *x)
425
0
{
426
0
    return generateExtStack(x);
427
0
}
428
429
/* Gets the X509_EXTENSION* ext based on it's location in WOLFSSL_X509* x509.
430
 *
431
 * x509   : The X509 structure to look for the extension.
432
 * loc    : Location of the extension. If the extension is found at the given
433
 * location, a new X509_EXTENSION structure is populated with extension-specific
434
 * data based on the extension type.
435
436
 * Returns NULL on error or pointer to X509_EXTENSION structure containing the
437
 * extension. The returned X509_EXTENSION should not be free'd by caller.
438
 * The returned X509_EXTENSION is pushed onto a stack inside the x509 argument.
439
 * This is later free'd when x509 is free'd.
440
 *
441
 * NOTE: for unknown extension NIDs, a X509_EXTENSION is populated with the
442
 * extension oid as the ASN1_OBJECT (QT compatibility)
443
 */
444
WOLFSSL_X509_EXTENSION* wolfSSL_X509_get_ext(const WOLFSSL_X509* x509, int loc)
445
0
{
446
0
    WOLFSSL_X509_EXTENSION* ext = NULL;
447
0
    WOLFSSL_ENTER("wolfSSL_X509_get_ext");
448
0
    if (x509 == NULL)
449
0
        return NULL;
450
451
0
   ext = wolfSSL_X509_set_ext((WOLFSSL_X509*) x509, loc);
452
0
   return ext;
453
0
}
454
455
int wolfSSL_X509_get_ext_by_OBJ(const WOLFSSL_X509 *x,
456
        const WOLFSSL_ASN1_OBJECT *obj, int lastpos)
457
0
{
458
0
    const WOLF_STACK_OF(WOLFSSL_X509_EXTENSION) *sk;
459
460
0
    if (!x || !obj) {
461
0
        WOLFSSL_MSG("Bad parameter");
462
0
        return WOLFSSL_FATAL_ERROR;
463
0
    }
464
465
0
    sk = wolfSSL_X509_get0_extensions(x);
466
0
    if (!sk) {
467
0
        WOLFSSL_MSG("No extensions");
468
0
        return WOLFSSL_FATAL_ERROR;
469
0
    }
470
0
    lastpos++;
471
0
    if (lastpos < 0)
472
0
        lastpos = 0;
473
0
    for (; lastpos < wolfSSL_sk_num(sk); lastpos++) {
474
0
        const WOLFSSL_X509_EXTENSION *ext =
475
0
            wolfSSL_sk_X509_EXTENSION_value(sk, lastpos);
476
0
        if (ext == NULL)
477
0
            continue;
478
0
        if (wolfSSL_OBJ_cmp(ext->obj, obj) == 0)
479
0
            return lastpos;
480
0
    }
481
0
    return WOLFSSL_FATAL_ERROR;
482
0
}
483
484
485
int wolfSSL_X509_OBJECT_set1_X509(WOLFSSL_X509_OBJECT *a, WOLFSSL_X509 *obj)
486
0
{
487
0
    WOLFSSL_STUB("wolfSSL_X509_OBJECT_set1_X509");
488
0
    (void)a;
489
0
    (void)obj;
490
0
    return 0;
491
0
}
492
493
int wolfSSL_X509_OBJECT_set1_X509_CRL(WOLFSSL_X509_OBJECT *a,
494
    WOLFSSL_X509_CRL *obj)
495
0
{
496
0
    WOLFSSL_STUB("wolfSSL_X509_OBJECT_set1_X509_CRL");
497
0
    (void)a;
498
0
    (void)obj;
499
0
    return 0;
500
0
}
501
502
#endif /* OPENSSL_ALL || OPENSSL_EXTRA */
503
504
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
505
    defined(WOLFSSL_WPAS_SMALL)
506
/* Set a general name from the DNS entry data.
507
 *
508
 * @param [in]      dns  DNS entry.
509
 * @param [in, out] gn   General name to place data in.
510
 * @return  1 on success.
511
 * @return  0 on failure.
512
 */
513
static int wolfssl_dns_entry_othername_to_gn(DNS_entry* dns,
514
    WOLFSSL_GENERAL_NAME* gn)
515
0
{
516
0
    int ret = 0;
517
0
    WOLFSSL_ASN1_OBJECT* obj = NULL;
518
0
    WOLFSSL_ASN1_TYPE* type = NULL;
519
0
    WOLFSSL_ASN1_STRING* str = NULL;
520
0
    byte tag = 0;
521
0
    unsigned char* p = (unsigned char *)dns->name;
522
0
    long len = dns->len;
523
524
0
#ifdef WOLFSSL_FPKI
525
0
    if (dns->oidSum != 0) {
526
        /* UPN OID: 1.3.6.1.4.1.311.20.2.3 */
527
0
        static const unsigned char upn_oid[] = {
528
0
            0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x14, 0x02, 0x03
529
0
        };
530
        /* FASCN OID: 2.16.840.1.101.3.6.6 */
531
0
        static const unsigned char fascn_oid[] = {
532
0
            0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x06, 0x06
533
0
        };
534
0
        const unsigned char* oid;
535
0
        word32 oidSz;
536
537
0
        if ((oid = OidFromId(dns->oidSum, oidCertAltNameType, &oidSz)) ==
538
0
                NULL) {
539
0
            if (dns->oidSum == UPN_OID) {
540
0
                oid = upn_oid;
541
0
                oidSz = (word32)sizeof(upn_oid);
542
0
            }
543
0
            else if (dns->oidSum == FASCN_OID) {
544
0
                oid = fascn_oid;
545
0
                oidSz = (word32)sizeof(fascn_oid);
546
0
            }
547
0
            else {
548
0
                goto err;
549
0
            }
550
0
        }
551
0
        if ((obj = wolfSSL_c2i_ASN1_OBJECT(NULL, &oid, oidSz)) == NULL) {
552
0
            goto err;
553
0
        }
554
555
0
        tag = WOLFSSL_V_ASN1_UTF8STRING;
556
0
    }
557
0
    else
558
0
#endif
559
0
    {
560
0
        word32 idx = 0;
561
0
        int nameLen;
562
563
        /* Create an object id for general name from DER encoding. */
564
0
        obj = wolfSSL_d2i_ASN1_OBJECT(NULL, (const unsigned char**)&p, len);
565
0
        if (obj == NULL)
566
0
            goto err;
567
        /* Pointer moved on and now update length of remaining data. */
568
0
        len -= (long)((size_t)p - (size_t)dns->name);
569
570
        /* Next is "value      [0] EXPLICIT ANY DEFINED BY type-id" */
571
0
        if (GetASNHeader(p, ASN_CONTEXT_SPECIFIC | ASN_CONSTRUCTED | 0,
572
0
                &idx, &nameLen, (word32)len) < 0)
573
0
            goto err;
574
0
        p += idx;
575
0
        len -= idx;
576
577
        /* Set the tag to object so that it gets output in raw form */
578
0
        tag = WOLFSSL_V_ASN1_SEQUENCE;
579
0
    }
580
581
    /* Create a WOLFSSL_ASN1_STRING from the DER. */
582
0
    str = wolfSSL_ASN1_STRING_type_new(tag);
583
0
    if (str == NULL) {
584
0
        goto err;
585
0
    }
586
0
    wolfSSL_ASN1_STRING_set(str, p, (int)len);
587
588
    /* Wrap string in a WOLFSSL_ASN1_TYPE. */
589
0
    type = wolfSSL_ASN1_TYPE_new();
590
0
    if (type == NULL)
591
0
        goto err;
592
0
    wolfSSL_ASN1_TYPE_set(type, tag, str);
593
0
    str = NULL; /* type now owns str */
594
595
0
    if (wolfSSL_GENERAL_NAME_set_type(gn, WOLFSSL_GEN_OTHERNAME)
596
0
            != WOLFSSL_SUCCESS) {
597
0
        goto err;
598
0
    }
599
600
    /* Store the object and string in general name. */
601
0
    gn->d.otherName->type_id = obj;
602
0
    gn->d.otherName->value = type;
603
0
    type = NULL; /* gn->d.otherName owns type */
604
605
0
    ret = 1;
606
0
err:
607
0
    if (ret != 1) {
608
0
        wolfSSL_ASN1_OBJECT_free(obj);
609
0
        wolfSSL_ASN1_TYPE_free(type);
610
0
        wolfSSL_ASN1_STRING_free(str);
611
0
    }
612
0
    return ret;
613
0
}
614
#endif /* OPENSSL_ALL || WOLFSSL_WPAS_SMALL */
615
616
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)
617
static int DNS_to_GENERAL_NAME(WOLFSSL_GENERAL_NAME* gn, DNS_entry* dns)
618
0
{
619
0
    switch (dns->type) {
620
0
        case WOLFSSL_GEN_OTHERNAME:
621
            /* Sets gn->type internally */
622
0
            if (!wolfssl_dns_entry_othername_to_gn(dns, gn)) {
623
0
                WOLFSSL_MSG("OTHERNAME set failed");
624
0
                return WOLFSSL_FAILURE;
625
0
            }
626
0
            break;
627
628
0
        case WOLFSSL_GEN_EMAIL:
629
0
        case WOLFSSL_GEN_DNS:
630
0
        case WOLFSSL_GEN_URI:
631
0
        case WOLFSSL_GEN_IPADD:
632
0
        case WOLFSSL_GEN_IA5:
633
0
            gn->type = dns->type;
634
0
            gn->d.ia5->length = dns->len;
635
0
            if (wolfSSL_ASN1_STRING_set(gn->d.ia5, dns->name,
636
0
                    gn->d.ia5->length) != WOLFSSL_SUCCESS) {
637
0
                WOLFSSL_MSG("ASN1_STRING_set failed");
638
0
                return WOLFSSL_FAILURE;
639
0
            }
640
0
            break;
641
642
643
0
        case WOLFSSL_GEN_DIRNAME:
644
0
            gn->type = dns->type;
645
            /* wolfSSL_GENERAL_NAME_new() mallocs this by default */
646
0
            wolfSSL_ASN1_STRING_free(gn->d.ia5);
647
0
            gn->d.ia5 = NULL;
648
649
0
            gn->d.dirn = wolfSSL_X509_NAME_new();;
650
            /* @TODO extract dir name info from DNS_entry */
651
0
            break;
652
653
0
#ifdef WOLFSSL_RID_ALT_NAME
654
0
        case WOLFSSL_GEN_RID:
655
0
            gn->type = dns->type;
656
            /* wolfSSL_GENERAL_NAME_new() mallocs this by default */
657
0
            wolfSSL_ASN1_STRING_free(gn->d.ia5);
658
0
            gn->d.ia5 = NULL;
659
660
0
            gn->d.registeredID = wolfSSL_ASN1_OBJECT_new();
661
0
            if (gn->d.registeredID == NULL) {
662
0
                return WOLFSSL_FAILURE;
663
0
            }
664
0
            {
665
                /* Store DER-encoded OID (tag + length + content) in obj */
666
0
                word32 derSz = 1 + SetLength(dns->len, NULL) + dns->len;
667
0
                byte* der = (byte*)XMALLOC(derSz,
668
0
                    gn->d.registeredID->heap, DYNAMIC_TYPE_ASN1);
669
0
                if (der == NULL) {
670
0
                    return WOLFSSL_FAILURE;
671
0
                }
672
0
                {
673
0
                    word32 idx = 0;
674
0
                    der[idx++] = ASN_OBJECT_ID;
675
0
                    idx += SetLength(dns->len, der + idx);
676
0
                    XMEMCPY(der + idx, dns->name, dns->len);
677
0
                }
678
0
                gn->d.registeredID->obj = der;
679
0
                gn->d.registeredID->objSz = derSz;
680
0
            }
681
0
            gn->d.registeredID->dynamic |= WOLFSSL_ASN1_DYNAMIC_DATA;
682
0
            gn->d.registeredID->grp = oidCertExtType;
683
0
            break;
684
0
#endif
685
686
0
        case WOLFSSL_GEN_X400:
687
            /* Unsupported: fall through */
688
0
        case WOLFSSL_GEN_EDIPARTY:
689
            /* Unsupported: fall through */
690
0
        default:
691
0
            WOLFSSL_MSG("Unsupported type conversion");
692
0
            return WOLFSSL_FAILURE;
693
0
    }
694
0
    return WOLFSSL_SUCCESS;
695
0
}
696
697
698
static int wolfssl_x509_alt_names_to_gn(WOLFSSL_X509* x509,
699
    WOLFSSL_X509_EXTENSION* ext)
700
0
{
701
0
    int ret = 0;
702
0
    WOLFSSL_GENERAL_NAME* gn = NULL;
703
0
    DNS_entry* dns = NULL;
704
0
    WOLFSSL_STACK* sk;
705
706
0
    sk = (WOLFSSL_GENERAL_NAMES*)XMALLOC(sizeof(WOLFSSL_GENERAL_NAMES), NULL,
707
0
        DYNAMIC_TYPE_ASN1);
708
0
    if (sk == NULL) {
709
0
        goto err;
710
0
    }
711
0
    XMEMSET(sk, 0, sizeof(WOLFSSL_GENERAL_NAMES));
712
0
    sk->type = STACK_TYPE_GEN_NAME;
713
714
0
    if (x509->subjAltNameSet && x509->altNames != NULL) {
715
        /* alt names are DNS_entry structs */
716
0
        dns = x509->altNames;
717
        /* Currently only support GEN_DNS type */
718
0
        while (dns != NULL) {
719
0
            gn = wolfSSL_GENERAL_NAME_new();
720
0
            if (gn == NULL) {
721
0
                WOLFSSL_MSG("Error creating GENERAL_NAME");
722
0
                wolfSSL_sk_pop_free(sk, NULL);
723
0
                goto err;
724
0
            }
725
726
0
            if (DNS_to_GENERAL_NAME(gn, dns) != WOLFSSL_SUCCESS) {
727
0
                wolfSSL_GENERAL_NAME_free(gn);
728
0
                wolfSSL_sk_pop_free(sk, NULL);
729
0
                goto err;
730
0
            }
731
732
0
            if (wolfSSL_sk_GENERAL_NAME_push(sk, gn) <= 0) {
733
0
                WOLFSSL_MSG("Error pushing onto stack");
734
0
                wolfSSL_GENERAL_NAME_free(gn);
735
0
                wolfSSL_sk_pop_free(sk, NULL);
736
0
                goto err;
737
0
            }
738
739
0
            dns = dns->next;
740
0
        }
741
0
    }
742
0
    ext->ext_sk = sk;
743
0
    ext->crit = x509->subjAltNameCrit;
744
745
0
    ret = 1;
746
0
err:
747
0
    return ret;
748
0
}
749
750
/* Pushes a new X509_EXTENSION* ext onto the stack inside WOLFSSL_X509* x509.
751
 * This is currently a helper function for wolfSSL_X509_get_ext
752
 * Caller does not free the returned WOLFSSL_X509_EXTENSION*
753
 */
754
WOLFSSL_X509_EXTENSION* wolfSSL_X509_set_ext(WOLFSSL_X509* x509, int loc)
755
0
{
756
0
    int extCount = 0, length = 0, outSz = 0, sz = 0, ret = 0;
757
0
    int objSz = 0, isSet = 0;
758
0
    const byte* rawCert;
759
0
    const byte* input;
760
0
    byte* oidBuf;
761
0
    word32 oid, idx = 0, tmpIdx = 0, nid;
762
0
    WOLFSSL_X509_EXTENSION* ext = NULL;
763
0
    WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
764
765
0
    WOLFSSL_ENTER("wolfSSL_X509_set_ext");
766
767
0
    if (x509 == NULL) {
768
0
        WOLFSSL_MSG("\tNot passed a certificate");
769
0
        return NULL;
770
0
    }
771
772
0
    if (loc < 0 || (loc > wolfSSL_X509_get_ext_count(x509))) {
773
0
        WOLFSSL_MSG("\tBad location argument");
774
0
        return NULL;
775
0
    }
776
777
0
    ext = wolfSSL_X509_EXTENSION_new();
778
0
    if (ext == NULL) {
779
0
        WOLFSSL_MSG("\tX509_EXTENSION_new() failed");
780
0
        return NULL;
781
0
    }
782
783
0
    rawCert = wolfSSL_X509_get_der((WOLFSSL_X509*)x509, &outSz);
784
0
    if (rawCert == NULL) {
785
0
        WOLFSSL_MSG("\tX509_get_der() failed");
786
0
        wolfSSL_X509_EXTENSION_free(ext);
787
0
        return NULL;
788
0
    }
789
790
0
#ifdef WOLFSSL_SMALL_STACK
791
0
    cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL, DYNAMIC_TYPE_DCERT);
792
0
    if (cert == NULL) {
793
0
        WOLFSSL_MSG("Failed to allocate memory for DecodedCert");
794
0
        wolfSSL_X509_EXTENSION_free(ext);
795
0
        return NULL;
796
0
    }
797
0
#endif
798
799
0
    InitDecodedCert(cert, rawCert, (word32)outSz, 0);
800
801
0
    if (ParseCert(cert,
802
#ifdef WOLFSSL_CERT_REQ
803
            x509->isCSR ? CERTREQ_TYPE :
804
#endif
805
0
                    CA_TYPE,
806
0
            NO_VERIFY, NULL) < 0) {
807
0
        WOLFSSL_MSG("\tCertificate parsing failed");
808
0
        wolfSSL_X509_EXTENSION_free(ext);
809
0
        FreeDecodedCert(cert);
810
0
        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
811
0
        return NULL;
812
0
    }
813
814
0
    input = cert->extensions;
815
0
    sz = cert->extensionsSz;
816
817
0
    if (input == NULL || sz == 0) {
818
0
        WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
819
0
        wolfSSL_X509_EXTENSION_free(ext);
820
0
        FreeDecodedCert(cert);
821
0
        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
822
0
        return NULL;
823
0
    }
824
825
#ifdef WOLFSSL_CERT_REQ
826
    if (!x509->isCSR)
827
#endif
828
0
    {
829
0
        if (input[idx++] != ASN_EXTENSIONS) {
830
0
            WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
831
0
            wolfSSL_X509_EXTENSION_free(ext);
832
0
            FreeDecodedCert(cert);
833
0
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
834
0
            return NULL;
835
0
        }
836
837
0
        if (GetLength(input, &idx, &length, (word32)sz) < 0) {
838
0
            WOLFSSL_MSG("\tfail: invalid length");
839
0
            wolfSSL_X509_EXTENSION_free(ext);
840
0
            FreeDecodedCert(cert);
841
0
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
842
0
            return NULL;
843
0
        }
844
0
    }
845
846
0
    if (GetSequence(input, &idx, &length, (word32)sz) < 0) {
847
0
        WOLFSSL_MSG("\tfail: should be a SEQUENCE (1)");
848
0
        wolfSSL_X509_EXTENSION_free(ext);
849
0
        FreeDecodedCert(cert);
850
0
        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
851
0
        return NULL;
852
0
    }
853
854
0
    while (idx < (word32)sz) {
855
0
        oid = 0;
856
857
0
        if (GetSequence(input, &idx, &length, (word32)sz) < 0) {
858
0
            WOLFSSL_MSG("\tfail: should be a SEQUENCE");
859
0
            wolfSSL_X509_EXTENSION_free(ext);
860
0
            FreeDecodedCert(cert);
861
0
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
862
0
            return NULL;
863
0
        }
864
865
0
        tmpIdx = idx;
866
0
        ret = GetObjectId(input, &idx, &oid, oidCertExtType, (word32)sz);
867
0
        if (ret < 0) {
868
0
            WOLFSSL_MSG("\tfail: OBJECT ID");
869
0
            wolfSSL_X509_EXTENSION_free(ext);
870
0
            FreeDecodedCert(cert);
871
0
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
872
0
            return NULL;
873
0
        }
874
0
        idx = tmpIdx;
875
0
        nid = (word32)oid2nid(oid, oidCertExtType);
876
877
        /* Continue while loop until extCount == loc or idx > sz */
878
0
        if (extCount != loc) {
879
0
            idx += length;
880
0
            extCount++;
881
0
            continue;
882
0
        }
883
        /* extCount == loc. Now get the extension. */
884
        /* Check if extension has been set */
885
0
        isSet = wolfSSL_X509_ext_isSet_by_NID((WOLFSSL_X509*)x509, (int)nid);
886
887
0
        if (wolfSSL_OBJ_nid2ln((int)nid) != NULL) {
888
            /* This is NOT an unknown OID. */
889
0
            ext->obj = wolfSSL_OBJ_nid2obj((int)nid);
890
0
            if (ext->obj == NULL) {
891
0
                WOLFSSL_MSG("\tfail: Invalid OBJECT");
892
0
                wolfSSL_X509_EXTENSION_free(ext);
893
0
                FreeDecodedCert(cert);
894
0
                WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
895
0
                return NULL;
896
0
            }
897
0
        }
898
899
0
        if (ext->obj) {
900
0
            ext->obj->nid = (int)nid;
901
0
        }
902
903
0
        switch (oid) {
904
0
            case BASIC_CA_OID:
905
0
            {
906
0
                WOLFSSL_ASN1_INTEGER* a;
907
0
                word32 dataIdx = idx;
908
0
                word32 dummyOid;
909
0
                int dataLen = 0;
910
911
0
                if (!isSet)
912
0
                    break;
913
914
                /* Set pathlength */
915
0
                a = wolfSSL_ASN1_INTEGER_new();
916
917
                /* Set the data */
918
0
                ret = GetObjectId(input, &dataIdx, &dummyOid, oidCertExtType,
919
0
                        (word32)sz) == 0;
920
0
                if (ret && dataIdx < (word32)sz) {
921
                    /* Skip the critical information */
922
0
                    if (input[dataIdx] == ASN_BOOLEAN) {
923
0
                        dataIdx++;
924
0
                        ret = GetLength(input, &dataIdx, &dataLen, sz) >= 0;
925
0
                        dataIdx += dataLen;
926
0
                    }
927
0
                }
928
0
                if (ret) {
929
0
                    ret = GetOctetString(input, &dataIdx, &dataLen,
930
0
                            (word32)sz) > 0;
931
0
                }
932
0
                if (ret) {
933
0
                    ret = wolfSSL_ASN1_STRING_set(&ext->value, input + dataIdx,
934
0
                            dataLen) == 1;
935
0
                }
936
937
0
                if (a == NULL || !ret) {
938
0
                    wolfSSL_X509_EXTENSION_free(ext);
939
0
                    FreeDecodedCert(cert);
940
0
                    WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
941
0
                    return NULL;
942
0
                }
943
0
                a->length = (int)x509->pathLength;
944
945
                /* Save ASN1_INTEGER in x509 extension */
946
0
                ext->obj->pathlen = a;
947
948
0
                ext->obj->ca = x509->isCa;
949
0
                break;
950
0
            }
951
952
0
            case AUTH_INFO_OID:
953
0
            {
954
0
                WOLFSSL_STACK* sk;
955
956
0
                if (!isSet)
957
0
                    break;
958
959
                /* Create a stack to hold both the caIssuer and ocsp objects
960
                    in X509_EXTENSION structure */
961
0
                sk = wolfSSL_sk_new_asn1_obj();
962
0
                if (sk == NULL) {
963
0
                    WOLFSSL_MSG("Failed to malloc stack");
964
0
                    wolfSSL_X509_EXTENSION_free(ext);
965
0
                    FreeDecodedCert(cert);
966
0
                    WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
967
0
                    return NULL;
968
0
                }
969
970
                /* Add CaIssuers object to stack */
971
0
                if (x509->authInfoCaIssuer != NULL &&
972
0
                    x509->authInfoCaIssuerSz > 0)
973
0
                {
974
0
                    WOLFSSL_ASN1_OBJECT* obj;
975
0
                    obj = wolfSSL_ASN1_OBJECT_new();
976
0
                    if (obj == NULL) {
977
0
                        WOLFSSL_MSG("Error creating ASN1 object");
978
0
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
979
0
                        wolfSSL_X509_EXTENSION_free(ext);
980
0
                        FreeDecodedCert(cert);
981
0
                        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
982
0
                        return NULL;
983
0
                    }
984
0
                    obj->obj = (byte*)x509->authInfoCaIssuer;
985
0
                    obj->objSz = (unsigned int)x509->authInfoCaIssuerSz;
986
0
                    obj->grp = oidCertAuthInfoType;
987
0
                    obj->nid = WC_NID_ad_ca_issuers;
988
989
0
                    ret = wolfSSL_sk_ASN1_OBJECT_push(sk, obj) > 0
990
0
                            ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
991
0
                    if (ret != WOLFSSL_SUCCESS) {
992
0
                        WOLFSSL_MSG("Error pushing ASN1 object onto stack");
993
0
                        wolfSSL_ASN1_OBJECT_free(obj);
994
0
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
995
0
                        wolfSSL_X509_EXTENSION_free(ext);
996
0
                        FreeDecodedCert(cert);
997
0
                        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
998
0
                        return NULL;
999
0
                    }
1000
0
                }
1001
1002
                /* Add OCSP object to stack */
1003
0
                if (x509->authInfo != NULL &&
1004
0
                    x509->authInfoSz > 0)
1005
0
                {
1006
0
                    WOLFSSL_ASN1_OBJECT* obj;
1007
0
                    obj = wolfSSL_ASN1_OBJECT_new();
1008
0
                    if (obj == NULL) {
1009
0
                        WOLFSSL_MSG("Error creating ASN1 object");
1010
0
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
1011
0
                        wolfSSL_X509_EXTENSION_free(ext);
1012
0
                        FreeDecodedCert(cert);
1013
0
                        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1014
0
                        return NULL;
1015
0
                    }
1016
0
                    obj->obj = x509->authInfo;
1017
0
                    obj->objSz = (unsigned int)x509->authInfoSz;
1018
0
                    obj->grp = oidCertAuthInfoType;
1019
0
                    obj->nid = WC_NID_ad_OCSP;
1020
1021
0
                    ret = wolfSSL_sk_ASN1_OBJECT_push(sk, obj) > 0
1022
0
                            ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
1023
0
                    if (ret != WOLFSSL_SUCCESS) {
1024
0
                        WOLFSSL_MSG("Error pushing ASN1 object onto stack");
1025
0
                        wolfSSL_ASN1_OBJECT_free(obj);
1026
0
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
1027
0
                        wolfSSL_X509_EXTENSION_free(ext);
1028
0
                        FreeDecodedCert(cert);
1029
0
                        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1030
0
                        return NULL;
1031
0
                    }
1032
0
                }
1033
0
                ext->ext_sk = sk;
1034
0
                break;
1035
0
            }
1036
1037
0
            case ALT_NAMES_OID:
1038
0
                if (!isSet)
1039
0
                    break;
1040
0
                if (!wolfssl_x509_alt_names_to_gn(x509, ext)) {
1041
0
                    wolfSSL_X509_EXTENSION_free(ext);
1042
0
                    FreeDecodedCert(cert);
1043
0
                    WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1044
0
                    return NULL;
1045
0
                }
1046
0
                break;
1047
0
        }
1048
1049
        /* The ASN1_OBJECT in the extension is set in the same way
1050
         * for recognized and for unrecognized extension types, as
1051
         * the full OCTET STRING */
1052
1053
        /* Get OID from input */
1054
0
        if (GetASNObjectId(input, &idx, &length, (word32)sz) != 0) {
1055
0
            WOLFSSL_MSG("Failed to Get ASN Object Id");
1056
0
            wolfSSL_X509_EXTENSION_free(ext);
1057
0
            FreeDecodedCert(cert);
1058
0
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1059
0
            return NULL;
1060
0
        }
1061
0
        oidBuf = (byte*)XMALLOC(length+1+MAX_LENGTH_SZ, NULL,
1062
0
                            DYNAMIC_TYPE_TMP_BUFFER);
1063
0
        if (oidBuf == NULL) {
1064
0
            WOLFSSL_MSG("Failed to malloc tmp buffer");
1065
0
            wolfSSL_X509_EXTENSION_free(ext);
1066
0
            FreeDecodedCert(cert);
1067
0
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1068
0
            return NULL;
1069
0
        }
1070
0
        oidBuf[0] = ASN_OBJECT_ID;
1071
0
        objSz++;
1072
0
        objSz += SetLength(length, oidBuf + 1);
1073
0
        objSz += length;
1074
1075
        /* Set object size and reallocate space in object buffer */
1076
0
        if (ext->obj == NULL) {
1077
0
            ext->obj = wolfSSL_ASN1_OBJECT_new();
1078
0
            if (ext->obj == NULL) {
1079
0
                XFREE(oidBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1080
0
                wolfSSL_X509_EXTENSION_free(ext);
1081
0
                FreeDecodedCert(cert);
1082
0
                WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1083
0
                return NULL;
1084
0
            }
1085
0
        }
1086
1087
0
        if (((ext->obj->dynamic & WOLFSSL_ASN1_DYNAMIC_DATA) != 0) ||
1088
0
            (ext->obj->obj == NULL)) {
1089
0
            byte* tmp;
1090
        #ifdef WOLFSSL_NO_REALLOC
1091
            tmp = (byte*)XMALLOC(objSz, NULL, DYNAMIC_TYPE_ASN1);
1092
            if (tmp != NULL && ext->obj->obj != NULL) {
1093
                XMEMCPY(tmp, ext->obj->obj, ext->obj->objSz);
1094
                XFREE((byte*)ext->obj->obj, NULL, DYNAMIC_TYPE_ASN1);
1095
            }
1096
            else if (tmp == NULL) {
1097
                XFREE((byte*)ext->obj->obj, NULL, DYNAMIC_TYPE_ASN1);
1098
            }
1099
            ext->obj->obj = tmp;
1100
        #else
1101
0
            tmp = (byte*)XREALLOC((byte*)ext->obj->obj, objSz, NULL,
1102
0
                                  DYNAMIC_TYPE_ASN1);
1103
0
            if (tmp == NULL)
1104
0
                XFREE((byte*)ext->obj->obj, NULL, DYNAMIC_TYPE_ASN1);
1105
0
            ext->obj->obj = tmp;
1106
0
        #endif
1107
0
            if (ext->obj->obj == NULL) {
1108
0
                wolfSSL_X509_EXTENSION_free(ext);
1109
0
                FreeDecodedCert(cert);
1110
0
                XFREE(oidBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1111
0
                WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1112
0
                return NULL;
1113
0
            }
1114
0
            ext->obj->dynamic |= WOLFSSL_ASN1_DYNAMIC_DATA;
1115
0
        }
1116
0
        else {
1117
0
            ext->obj->dynamic &= ~WOLFSSL_ASN1_DYNAMIC_DATA;
1118
0
        }
1119
0
        ext->obj->objSz = (unsigned int)objSz;
1120
1121
        /* Get OID from input and copy to ASN1_OBJECT buffer */
1122
0
        XMEMCPY(oidBuf+2, input+idx, length);
1123
0
        XMEMCPY((byte*)ext->obj->obj, oidBuf, ext->obj->objSz);
1124
0
        XFREE(oidBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1125
0
        oidBuf = NULL;
1126
0
        ext->obj->grp = oidCertExtType;
1127
0
        ext->crit = 0;
1128
1129
0
        tmpIdx = idx + length;
1130
1131
        /* Get CRITICAL. If not present, defaults to false.
1132
         * It present, must be a valid TRUE */
1133
0
        if ((tmpIdx < (word32)sz) &&
1134
0
            (input[tmpIdx] == ASN_BOOLEAN))
1135
0
        {
1136
0
            if (((tmpIdx + 2) >= (word32)sz) ||
1137
                /* Check bool length */
1138
0
                (input[tmpIdx+1] != 1) ||
1139
                /* Assert true if CRITICAL present */
1140
0
                (input[tmpIdx+2] != 0xff))
1141
0
            {
1142
0
                WOLFSSL_MSG("Error decoding unknown extension data");
1143
0
                wolfSSL_ASN1_OBJECT_free(ext->obj);
1144
0
                wolfSSL_X509_EXTENSION_free(ext);
1145
0
                FreeDecodedCert(cert);
1146
0
                WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1147
0
                return NULL;
1148
0
            }
1149
1150
0
            ext->crit = 1;
1151
0
            tmpIdx += 3;
1152
0
        }
1153
1154
        /* Get extension data and copy as ASN1_STRING */
1155
0
        if ((tmpIdx >= (word32)sz) ||
1156
0
            (input[tmpIdx] != ASN_OCTET_STRING))
1157
0
        {
1158
0
            WOLFSSL_MSG("Error decoding unknown extension data");
1159
0
            wolfSSL_ASN1_OBJECT_free(ext->obj);
1160
0
            wolfSSL_X509_EXTENSION_free(ext);
1161
0
            FreeDecodedCert(cert);
1162
0
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1163
0
            return NULL;
1164
0
        }
1165
1166
0
        tmpIdx++;
1167
1168
0
        if (GetLength(input, &tmpIdx, &length, (word32)sz) <= 0) {
1169
0
            WOLFSSL_MSG("Error: Invalid Input Length.");
1170
0
            wolfSSL_ASN1_OBJECT_free(ext->obj);
1171
0
            wolfSSL_X509_EXTENSION_free(ext);
1172
0
            FreeDecodedCert(cert);
1173
0
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1174
0
            return NULL;
1175
0
        }
1176
0
        ext->value.data = (char*)XMALLOC(length, NULL,
1177
0
            DYNAMIC_TYPE_ASN1);
1178
0
        ext->value.isDynamic = 1;
1179
0
        if (ext->value.data == NULL) {
1180
0
            WOLFSSL_MSG("Failed to malloc ASN1_STRING data");
1181
0
            wolfSSL_X509_EXTENSION_free(ext);
1182
0
            FreeDecodedCert(cert);
1183
0
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1184
0
            return NULL;
1185
0
        }
1186
0
        XMEMCPY(ext->value.data,input+tmpIdx,length);
1187
0
        ext->value.length = length;
1188
1189
0
        break; /* Got the Extension. Now exit while loop. */
1190
1191
0
    } /* while(idx < sz) */
1192
1193
    /* Store the new extension in a stack inside x509
1194
     * The extensions on the stack are free'd internally when FreeX509 is called
1195
     */
1196
0
    if (x509->ext_sk == NULL)
1197
0
        x509->ext_sk = wolfSSL_sk_new_x509_ext();
1198
0
    if (wolfSSL_sk_insert(x509->ext_sk, ext, -1) <= 0) {
1199
0
        wolfSSL_X509_EXTENSION_free(ext);
1200
0
        ext = NULL;
1201
0
    }
1202
1203
0
    FreeDecodedCert(cert);
1204
0
    WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1205
0
    return ext;
1206
0
}
1207
1208
/**
1209
 * @param str String to copy
1210
 * @param buf Output buffer. If this contains a pointer then it is free'd
1211
 *            with the DYNAMIC_TYPE_X509_EXT hint.
1212
 * @param len Output length
1213
 * @return WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on error
1214
 */
1215
static int asn1_string_copy_to_buffer(WOLFSSL_ASN1_STRING* str, byte** buf,
1216
        word32* len, void* heap)
1217
0
{
1218
0
    if (str->data && str->length > 0) {
1219
0
        if (*buf)
1220
0
            XFREE(*buf, heap, DYNAMIC_TYPE_X509_EXT);
1221
0
        *len = 0;
1222
0
        *buf = (byte*)XMALLOC(str->length, heap, DYNAMIC_TYPE_X509_EXT);
1223
0
        if (!*buf) {
1224
0
            WOLFSSL_MSG("malloc error");
1225
0
            return WOLFSSL_FAILURE;
1226
0
        }
1227
0
        *len = (word32)str->length;
1228
0
        XMEMCPY(*buf, str->data, str->length);
1229
0
    }
1230
1231
0
    (void)heap;
1232
0
    return WOLFSSL_SUCCESS;
1233
0
}
1234
1235
int wolfSSL_X509_add_ext(WOLFSSL_X509 *x509, WOLFSSL_X509_EXTENSION *ext,
1236
    int loc)
1237
0
{
1238
0
    int nid;
1239
1240
0
    WOLFSSL_ENTER("wolfSSL_X509_add_ext");
1241
1242
0
    if (!x509 || !ext || loc >= 0) {
1243
0
        WOLFSSL_MSG("Bad parameter");
1244
0
        return WOLFSSL_FAILURE;
1245
0
    }
1246
0
    nid = (ext->obj != NULL) ? ext->obj->type : ext->value.nid;
1247
1248
0
    switch (nid) {
1249
0
    case WC_NID_authority_key_identifier:
1250
0
        if (x509->authKeyIdSrc != NULL) {
1251
            /* If authKeyId points into authKeyIdSrc then free it and
1252
             * revert to old functionality */
1253
0
            XFREE(x509->authKeyIdSrc, x509->heap, DYNAMIC_TYPE_X509_EXT);
1254
0
            x509->authKeyIdSrc = NULL;
1255
0
            x509->authKeyId = NULL;
1256
0
        }
1257
0
        if (asn1_string_copy_to_buffer(&ext->value, &x509->authKeyId,
1258
0
                &x509->authKeyIdSz, x509->heap) != WOLFSSL_SUCCESS) {
1259
0
            WOLFSSL_MSG("asn1_string_copy_to_buffer error");
1260
0
            return WOLFSSL_FAILURE;
1261
0
        }
1262
0
        x509->authKeyIdCrit = (byte)ext->crit;
1263
0
        break;
1264
0
    case WC_NID_subject_key_identifier:
1265
0
        if (asn1_string_copy_to_buffer(&ext->value, &x509->subjKeyId,
1266
0
                &x509->subjKeyIdSz, x509->heap) != WOLFSSL_SUCCESS) {
1267
0
            WOLFSSL_MSG("asn1_string_copy_to_buffer error");
1268
0
            return WOLFSSL_FAILURE;
1269
0
        }
1270
0
        x509->subjKeyIdCrit = (byte)ext->crit;
1271
0
        break;
1272
0
    case WC_NID_subject_alt_name:
1273
0
    {
1274
0
        WOLFSSL_GENERAL_NAMES* gns = ext->ext_sk;
1275
0
        while (gns) {
1276
0
            WOLFSSL_GENERAL_NAME* gn = gns->data.gn;
1277
0
            if ((gn != NULL) && (gn->type == ASN_OTHER_TYPE)) {
1278
0
                char *buf = NULL;
1279
0
                int ret = 0;
1280
0
                word32 len = 0;
1281
1282
0
                len = SetOthername(gn->d.otherName, NULL);
1283
0
                if (len == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
1284
0
                    return WOLFSSL_FAILURE;
1285
0
                }
1286
1287
0
                buf = (char*)XMALLOC(len, x509->heap, DYNAMIC_TYPE_X509_EXT);
1288
0
                if (buf == NULL) {
1289
0
                    WOLFSSL_MSG("Couldn't allocate memory for othername");
1290
0
                    return WOLFSSL_FAILURE;
1291
0
                }
1292
1293
                /* SetOthername() cannot fail; already passed above. */
1294
0
                SetOthername(gn->d.otherName, (byte*)buf);
1295
1296
0
                ret = wolfSSL_X509_add_altname_ex(x509, buf, len,
1297
0
                                                  ASN_OTHER_TYPE);
1298
0
                XFREE(buf, x509->heap, DYNAMIC_TYPE_X509_EXT);
1299
0
                if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
1300
0
                     WOLFSSL_MSG("wolfSSL_X509_add_altname_ex() failed");
1301
0
                     return WOLFSSL_FAILURE;
1302
0
                }
1303
0
            }
1304
0
            else if (!gn || !gn->d.ia5 ||
1305
0
                wolfSSL_X509_add_altname_ex(x509, gn->d.ia5->data,
1306
0
                    gn->d.ia5->length, gn->type) != WOLFSSL_SUCCESS) {
1307
0
                WOLFSSL_MSG("Subject alternative name missing extension");
1308
0
                return WOLFSSL_FAILURE;
1309
0
            }
1310
0
            gns = gns->next;
1311
0
        }
1312
0
        x509->subjAltNameSet = 1;
1313
0
        x509->subjAltNameCrit = (byte)ext->crit;
1314
0
        break;
1315
0
    }
1316
0
    case WC_NID_key_usage:
1317
0
        if (ext && ext->value.data) {
1318
0
            if (ext->value.length == sizeof(word16)) {
1319
                /* if ext->value is already word16, set directly */
1320
0
                x509->keyUsage = *(word16*)ext->value.data;
1321
#ifdef BIG_ENDIAN_ORDER
1322
                x509->keyUsage = rotlFixed16(x509->keyUsage, 8U);
1323
#endif
1324
0
                x509->keyUsageCrit = (byte)ext->crit;
1325
0
                x509->keyUsageSet = 1;
1326
0
            }
1327
0
            else if (ext->value.length > 0) {
1328
                /* ext->value is comma-delimited string, convert to word16 */
1329
0
                if (ParseKeyUsageStr(ext->value.data, &x509->keyUsage,
1330
0
                                     x509->heap) != 0) {
1331
0
                    return WOLFSSL_FAILURE;
1332
0
                }
1333
0
                x509->keyUsageCrit = (byte)ext->crit;
1334
0
                x509->keyUsageSet = 1;
1335
0
            }
1336
0
            else {
1337
0
                return WOLFSSL_FAILURE;
1338
0
            }
1339
0
        }
1340
0
        break;
1341
0
    case WC_NID_ext_key_usage:
1342
0
        if (ext && ext->value.data) {
1343
0
            if (ext->value.length == sizeof(byte)) {
1344
                /* if ext->value is already 1 byte, set directly */
1345
0
                x509->extKeyUsage = *(byte*)ext->value.data;
1346
0
                x509->extKeyUsageCrit = (byte)ext->crit;
1347
0
            }
1348
0
            else if (ext->value.length > 0) {
1349
                /* ext->value is comma-delimited string, convert to word16 */
1350
0
                if (ParseExtKeyUsageStr(ext->value.data, &x509->extKeyUsage,
1351
0
                                        x509->heap) != 0) {
1352
0
                    return WOLFSSL_FAILURE;
1353
0
                }
1354
0
                x509->extKeyUsageCrit = (byte)ext->crit;
1355
0
            }
1356
0
            else {
1357
0
                return WOLFSSL_FAILURE;
1358
0
            }
1359
0
        }
1360
0
        break;
1361
0
    case WC_NID_basic_constraints:
1362
0
        if (ext->obj) {
1363
0
            x509->isCa = (byte)ext->obj->ca;
1364
0
            x509->basicConstCrit = (byte)ext->crit;
1365
0
            if (ext->obj->pathlen) {
1366
0
                x509->pathLength = (word32)ext->obj->pathlen->length;
1367
0
                x509->basicConstPlSet = 1;
1368
0
                x509->pathLengthSet = 1;
1369
0
            }
1370
0
            x509->basicConstSet = 1;
1371
0
        }
1372
0
        break;
1373
0
    default:
1374
0
#ifdef WOLFSSL_CUSTOM_OID
1375
0
    {
1376
0
        char *oid = NULL;
1377
0
        byte *val = NULL;
1378
0
        int err = 0;
1379
1380
0
        if ((ext->obj == NULL) || (ext->value.length == 0)) {
1381
0
            WOLFSSL_MSG("Extension has insufficient information.");
1382
0
            return WOLFSSL_FAILURE;
1383
0
        }
1384
1385
0
        if ((x509->customExtCount < 0) ||
1386
0
            (x509->customExtCount >= NUM_CUSTOM_EXT)) {
1387
0
            WOLFSSL_MSG("Bad value for customExtCount.");
1388
0
            return WOLFSSL_FAILURE;
1389
0
        }
1390
1391
        /* This is a viable custom extension. */
1392
0
        oid = (char*)XMALLOC(MAX_OID_STRING_SZ, x509->heap,
1393
0
            DYNAMIC_TYPE_X509_EXT);
1394
0
        val = (byte*)XMALLOC(ext->value.length, x509->heap,
1395
0
            DYNAMIC_TYPE_X509_EXT);
1396
0
        if ((oid == NULL) || (val == NULL)) {
1397
0
            WOLFSSL_MSG("Memory allocation failure.\n");
1398
0
            err = 1;
1399
0
        }
1400
1401
0
        if (err == 0) {
1402
0
            XMEMCPY(val, ext->value.data, ext->value.length);
1403
0
            if (wolfSSL_OBJ_obj2txt(oid, MAX_OID_STRING_SZ, ext->obj, 1) < 0) {
1404
0
                err = 1;
1405
0
            }
1406
0
        }
1407
1408
0
        if (err == 1) {
1409
0
            XFREE(val, x509->heap, DYNAMIC_TYPE_X509_EXT);
1410
0
            XFREE(oid, x509->heap, DYNAMIC_TYPE_X509_EXT);
1411
0
            return WOLFSSL_FAILURE;
1412
0
        }
1413
1414
        /* ext->crit is WOLFSSL_ASN1_BOOLEAN */
1415
0
        if (ext->crit != 0 && ext->crit != -1) {
1416
0
            XFREE(val, x509->heap, DYNAMIC_TYPE_X509_EXT);
1417
0
            XFREE(oid, x509->heap, DYNAMIC_TYPE_X509_EXT);
1418
0
            return WOLFSSL_FAILURE;
1419
0
        }
1420
1421
        /* x509->custom_exts now owns the buffers and they must be managed. */
1422
0
        x509->custom_exts[x509->customExtCount].oid = oid;
1423
0
        x509->custom_exts[x509->customExtCount].crit = (byte)ext->crit;
1424
0
        x509->custom_exts[x509->customExtCount].val = val;
1425
0
        x509->custom_exts[x509->customExtCount].valSz = ext->value.length;
1426
0
        x509->customExtCount++;
1427
0
        break;
1428
0
    }
1429
#else
1430
        WOLFSSL_MSG("Unsupported extension to add");
1431
        return WOLFSSL_FAILURE;
1432
#endif /* WOLFSSL_CUSTOM_OID */
1433
0
    } /* switch (nid) */
1434
1435
0
    return WOLFSSL_SUCCESS;
1436
0
}
1437
1438
/* Returns pointer to ASN1_STRING in X509_EXTENSION object */
1439
static WOLFSSL_ASN1_STRING* wolfSSL_X509_EXTENSION_get_data_internal(
1440
    WOLFSSL_X509_EXTENSION* ext)
1441
0
{
1442
0
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_get_data_internal");
1443
0
    if (ext == NULL)
1444
0
        return NULL;
1445
1446
0
    return &ext->value;
1447
0
}
1448
1449
1450
#ifndef NO_BIO
1451
1452
#ifndef MAX_INDENT
1453
0
    #define MAX_INDENT 40
1454
#endif
1455
1456
1457
/* Return 0 on success and 1 on failure. Copies ext data to bio, using indent
1458
 *  to pad the output. flag is ignored. */
1459
int wolfSSL_X509V3_EXT_print(WOLFSSL_BIO *out, WOLFSSL_X509_EXTENSION *ext,
1460
        unsigned long flag, int indent)
1461
0
{
1462
0
    WOLFSSL_ASN1_OBJECT* obj;
1463
0
    WOLFSSL_ASN1_STRING* str;
1464
0
    int nid;
1465
0
    int rc = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
1466
0
    char tmp[CTC_NAME_SIZE*2 + 1];
1467
0
    const int tmpSz = sizeof(tmp);
1468
0
    int tmpLen = 0;
1469
0
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_print");
1470
1471
0
    if (indent < 0) indent = 0;
1472
0
    if (indent > MAX_INDENT) indent = MAX_INDENT;
1473
1474
0
    if ((out == NULL) || (ext == NULL)) {
1475
0
        WOLFSSL_MSG("NULL parameter error");
1476
0
        return rc;
1477
0
    }
1478
1479
0
    obj = wolfSSL_X509_EXTENSION_get_object(ext);
1480
0
    if (obj == NULL) {
1481
0
        WOLFSSL_MSG("Error getting ASN1_OBJECT from X509_EXTENSION");
1482
0
        return rc;
1483
0
    }
1484
1485
0
    str = wolfSSL_X509_EXTENSION_get_data_internal(ext);
1486
0
    if (str == NULL) {
1487
0
        WOLFSSL_MSG("Error getting ASN1_STRING from X509_EXTENSION");
1488
0
        return rc;
1489
0
    }
1490
1491
    /* Print extension based on the type */
1492
0
    nid = wolfSSL_OBJ_obj2nid(obj);
1493
0
    switch (nid) {
1494
0
        case BASIC_CA_OID:
1495
0
        {
1496
0
            char isCa[] = "TRUE";
1497
0
            char notCa[] = "FALSE";
1498
0
            if ((tmpLen = XSNPRINTF(tmp, tmpSz, "%*sCA:%s", indent, "",
1499
0
                                     obj->ca ? isCa : notCa))
1500
0
                >= tmpSz)
1501
0
                return rc;
1502
0
            break;
1503
0
        }
1504
0
        case ALT_NAMES_OID:
1505
0
        {
1506
0
            WOLFSSL_STACK* sk;
1507
0
            char* val;
1508
0
            int valLen;
1509
0
            int len;
1510
1511
0
            sk = ext->ext_sk;
1512
0
            while (sk != NULL) {
1513
0
                if (sk->type == STACK_TYPE_GEN_NAME && sk->data.gn) {
1514
                    /* str is GENERAL_NAME for subject alternative name ext */
1515
0
                    str = sk->data.gn->d.ia5;
1516
0
                    len = str->length + 2; /* + 2 for NULL char and "," */
1517
0
                    if (len > tmpSz) {
1518
0
                        WOLFSSL_MSG("len greater than buffer size");
1519
0
                        return rc;
1520
0
                    }
1521
1522
0
                    val = (char*)XMALLOC(len + indent, NULL,
1523
0
                                                       DYNAMIC_TYPE_TMP_BUFFER);
1524
0
                    if (val == NULL) {
1525
0
                        WOLFSSL_MSG("Memory error");
1526
0
                        return rc;
1527
0
                    }
1528
0
                    valLen = XSNPRINTF(val, (size_t)len, "%*s%s", indent, "",
1529
0
                            str->strData);
1530
0
                    if ((valLen < 0) || (valLen >= len)
1531
0
                            || ((tmpLen + valLen) >= tmpSz)) {
1532
0
                        XFREE(val, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1533
0
                        return rc;
1534
0
                    }
1535
0
                    XMEMCPY(tmp + tmpLen, val, valLen);
1536
0
                    tmpLen += valLen;
1537
0
                    XFREE(val, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1538
0
                }
1539
0
                sk = sk->next;
1540
0
            }
1541
0
            break;
1542
0
        }
1543
0
        case AUTH_KEY_OID:
1544
0
        case SUBJ_KEY_OID:
1545
0
        {
1546
0
            char* asn1str;
1547
0
            asn1str = wolfSSL_i2s_ASN1_STRING(NULL, str);
1548
0
            tmpLen = XSNPRINTF(tmp, tmpSz, "%*s%s", indent, "", asn1str);
1549
0
            XFREE(asn1str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1550
0
            if (tmpLen >= tmpSz)
1551
0
                tmpLen = tmpSz - 1;
1552
0
            break;
1553
0
        }
1554
0
        case AUTH_INFO_OID:
1555
0
        case CERT_POLICY_OID:
1556
0
        case CRL_DIST_OID:
1557
0
        case KEY_USAGE_OID:
1558
0
            WOLFSSL_MSG("X509V3_EXT_print not yet implemented for ext type");
1559
0
            break;
1560
1561
0
        default:
1562
0
            if ((tmpLen = XSNPRINTF(
1563
0
                     tmp, tmpSz, "%*s%s", indent, "", str->strData))
1564
0
                >= tmpSz)
1565
0
                return rc;
1566
0
    }
1567
1568
0
    if (wolfSSL_BIO_write(out, tmp, tmpLen) == tmpLen) {
1569
0
        rc = WOLFSSL_SUCCESS;
1570
0
    }
1571
0
    (void) flag;
1572
1573
0
    return rc;
1574
0
}
1575
#endif /* !NO_BIO */
1576
1577
#ifndef NO_WOLFSSL_STUB
1578
int wolfSSL_X509V3_EXT_add_nconf(WOLFSSL_CONF *conf, WOLFSSL_X509V3_CTX *ctx,
1579
        const char *section, WOLFSSL_X509 *cert)
1580
0
{
1581
0
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_add_nconf");
1582
0
    WOLFSSL_STUB("wolfSSL_X509V3_EXT_add_nconf");
1583
0
    (void)conf;
1584
0
    (void)ctx;
1585
0
    (void)section;
1586
0
    (void)cert;
1587
0
    return WOLFSSL_SUCCESS;
1588
0
}
1589
#endif
1590
1591
/* Find extension by NID in a stack of extensions.
1592
 *
1593
 * @param sk Stack of extensions
1594
 * @param nid ID to search for
1595
 * @param lastpos Start search from this position (not inclusive, -1 means start from beginning)
1596
 * @return Index of matching extension or -1 on error/not found
1597
 */
1598
int wolfSSL_X509v3_get_ext_by_NID(const WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk,
1599
                                 int nid, int lastpos)
1600
0
{
1601
0
    int i;
1602
0
    WOLFSSL_ENTER("wolfSSL_X509v3_get_ext_by_NID");
1603
1604
0
    if (sk == NULL) {
1605
0
        WOLFSSL_MSG("Stack pointer is NULL");
1606
0
        return WOLFSSL_FATAL_ERROR;
1607
0
    }
1608
1609
0
    if (lastpos < -1 || lastpos >= wolfSSL_sk_num(sk)) {
1610
0
        WOLFSSL_MSG("Invalid position argument");
1611
0
        return WOLFSSL_FATAL_ERROR;
1612
0
    }
1613
1614
0
    for (i = lastpos + 1; i < wolfSSL_sk_num(sk); i++) {
1615
0
        WOLFSSL_X509_EXTENSION* ext = wolfSSL_sk_X509_EXTENSION_value(sk, i);
1616
0
        if (ext && ext->obj) {
1617
0
            if (wolfSSL_OBJ_obj2nid(ext->obj) == nid)
1618
0
                return i;
1619
0
        }
1620
0
    }
1621
1622
    /* Not found */
1623
0
    return -1;
1624
0
}
1625
1626
/* Get extension from a stack of extensions by location.
1627
 *
1628
 * @param sk Stack of extensions
1629
 * @param loc Index of extension to retrieve
1630
 * @return Pointer to extension or NULL on error
1631
 */
1632
WOLFSSL_X509_EXTENSION* wolfSSL_X509v3_get_ext(
1633
    const WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk, int loc)
1634
0
{
1635
0
    WOLFSSL_ENTER("wolfSSL_X509v3_get_ext");
1636
1637
0
    if (sk == NULL) {
1638
0
        WOLFSSL_MSG("Stack pointer is NULL");
1639
0
        return NULL;
1640
0
    }
1641
1642
0
    if (loc < 0 || loc >= wolfSSL_sk_num(sk)) {
1643
0
        WOLFSSL_MSG("Invalid location argument");
1644
0
        return NULL;
1645
0
    }
1646
1647
0
    return wolfSSL_sk_X509_EXTENSION_value(sk, loc);
1648
0
}
1649
1650
/* Returns crit flag in X509_EXTENSION object */
1651
int wolfSSL_X509_EXTENSION_get_critical(const WOLFSSL_X509_EXTENSION* ex)
1652
0
{
1653
0
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_get_critical");
1654
0
    if (ex == NULL)
1655
0
        return BAD_FUNC_ARG;
1656
0
    return ex->crit;
1657
0
}
1658
1659
/* Sets if the extension is critical
1660
 * returns WOLFSSL_SUCCESS on success
1661
 */
1662
int wolfSSL_X509_EXTENSION_set_critical(WOLFSSL_X509_EXTENSION* ex, int crit)
1663
0
{
1664
0
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_set_critical");
1665
0
    if (ex == NULL)
1666
0
        return WOLFSSL_FAILURE;
1667
0
    ex->crit = crit;
1668
0
    return WOLFSSL_SUCCESS;
1669
0
}
1670
1671
/* Creates v3_ext_method for a given X509v3 extension
1672
 *
1673
 * ex   : The X509_EXTENSION used to create v3_ext_method. If the extension is
1674
 * not NULL, get the NID of the extension object and populate the
1675
 * extension type-specific X509V3_EXT_* function(s) in v3_ext_method.
1676
 *
1677
 * Returns NULL on error or pointer to the v3_ext_method populated with
1678
 * extension type-specific X509V3_EXT_* function(s).
1679
 *
1680
 * NOTE: WC_NID_subject_key_identifier is currently the only extension
1681
 * implementing the X509V3_EXT_* functions, as it is the only type called
1682
 * directly by QT. The other extension types return a pointer to a
1683
 * v3_ext_method struct that contains only the NID.
1684
 */
1685
#if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L
1686
const WOLFSSL_v3_ext_method* wolfSSL_X509V3_EXT_get(WOLFSSL_X509_EXTENSION* ex)
1687
#else
1688
WOLFSSL_v3_ext_method* wolfSSL_X509V3_EXT_get(WOLFSSL_X509_EXTENSION* ex)
1689
#endif
1690
0
{
1691
0
    int nid;
1692
0
    WOLFSSL_v3_ext_method method;
1693
1694
0
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_get");
1695
0
    if ((ex == NULL) || (ex->obj == NULL)) {
1696
0
        WOLFSSL_MSG("Passed an invalid X509_EXTENSION*");
1697
0
        return NULL;
1698
0
    }
1699
    /* Initialize method to 0 */
1700
0
    XMEMSET(&method, 0, sizeof(struct WOLFSSL_v3_ext_method));
1701
1702
0
    nid = ex->obj->nid;
1703
0
    if (nid <= 0) {
1704
0
        WOLFSSL_MSG("Failed to get nid from passed extension object");
1705
0
        return NULL;
1706
0
    }
1707
0
    switch (nid) {
1708
0
        case WC_NID_basic_constraints:
1709
0
            break;
1710
0
        case WC_NID_subject_key_identifier:
1711
0
            method.i2s = (WOLFSSL_X509V3_EXT_I2S)wolfSSL_i2s_ASN1_STRING;
1712
0
            break;
1713
0
        case WC_NID_subject_alt_name:
1714
0
            WOLFSSL_MSG("i2v function not yet implemented for Subject "
1715
0
                        "Alternative Name");
1716
0
            break;
1717
0
        case WC_NID_key_usage:
1718
0
            WOLFSSL_MSG("i2v function not yet implemented for Key Usage");
1719
0
            break;
1720
0
        case WC_NID_authority_key_identifier:
1721
0
            WOLFSSL_MSG("i2v function not yet implemented for Auth Key Id");
1722
0
            break;
1723
0
        case WC_NID_info_access:
1724
0
            WOLFSSL_MSG("i2v function not yet implemented for Info Access");
1725
0
            break;
1726
0
        case WC_NID_ext_key_usage:
1727
0
            WOLFSSL_MSG("i2v function not yet implemented for Ext Key Usage");
1728
0
            break;
1729
0
        case WC_NID_certificate_policies:
1730
0
            WOLFSSL_MSG("r2i function not yet implemented for Cert Policies");
1731
0
            break;
1732
0
        case WC_NID_crl_distribution_points:
1733
0
            WOLFSSL_MSG("r2i function not yet implemented for CRL Dist Points");
1734
0
            break;
1735
0
        default:
1736
            /* If extension type is unknown, return NULL -- QT makes call to
1737
                X509_EXTENSION_get_data() if there is no v3_ext_method */
1738
0
            WOLFSSL_MSG("X509V3_EXT_get(): Unknown extension type found");
1739
0
            return NULL;
1740
0
    }
1741
1742
0
    method.ext_nid = nid;
1743
0
    ex->ext_method = method;
1744
1745
#if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L
1746
    return (const WOLFSSL_v3_ext_method*)&ex->ext_method;
1747
#else
1748
0
    return (WOLFSSL_v3_ext_method*)&ex->ext_method;
1749
0
#endif
1750
0
}
1751
1752
/* Create an Authority Info Access (AIA) from the contents of the extension.
1753
 *
1754
 * AIA is a stack of Access Descriptions.
1755
 *
1756
 * RFC 5280: 4.2.2.1
1757
 *
1758
 * @param [in] ext  X509v3 extension.
1759
 * @return  Stack of Access Descriptions as an AIA on success.
1760
 * @return  NULL on error.
1761
 */
1762
static WOLFSSL_AUTHORITY_INFO_ACCESS* wolfssl_x509v3_ext_aia_d2i(
1763
    WOLFSSL_X509_EXTENSION* ext)
1764
0
{
1765
0
    int err = 0;
1766
0
    int ret;
1767
0
    WOLFSSL_AUTHORITY_INFO_ACCESS* aia = NULL;
1768
0
    WOLFSSL_STACK* sk;
1769
0
    WOLFSSL_ACCESS_DESCRIPTION* ad = NULL;
1770
1771
    /* Get the type specific data of this extension. */
1772
0
    sk = ext->ext_sk;
1773
0
    if (sk == NULL) {
1774
0
        WOLFSSL_MSG("ACCESS_DESCRIPTION stack NULL");
1775
0
        err = 1;
1776
0
    }
1777
1778
0
    if (!err) {
1779
        /* AUTHORITY_INFO_ACCESS is a stack of ACCESS_DESCRIPTION entries. */
1780
0
        aia = wolfSSL_sk_new_null();
1781
0
        if (aia == NULL) {
1782
0
            WOLFSSL_MSG("Failed to malloc AUTHORITY_INFO_ACCESS");
1783
0
            err = 1;
1784
0
        }
1785
0
    }
1786
0
    if (!err) {
1787
        /* AIA is a stack of Access Descriptions. */
1788
0
        aia->type = STACK_TYPE_ACCESS_DESCRIPTION;
1789
0
    }
1790
1791
0
    while ((!err) && (sk != NULL)) {
1792
0
        WOLFSSL_ASN1_OBJECT* aiaEntry;
1793
1794
        /* Looking for objects in extension's data. */
1795
0
        if (sk->type != STACK_TYPE_OBJ) {
1796
0
            sk = sk->next;
1797
0
            continue;
1798
0
        }
1799
1800
        /* Get ASN.1 Object from the stack entry's data. */
1801
0
        aiaEntry = sk->data.obj;
1802
1803
        /* ACCESS_DESCRIPTION has two members: method and location.
1804
         *  method: ASN1_OBJECT as either AIA_OCSP_OID or AIA_CA_ISSUER_OID
1805
         *  location: GENERAL_NAME structure containing the URI.
1806
         */
1807
1808
        /* Allocate a new Access Description. */
1809
0
        ad = (WOLFSSL_ACCESS_DESCRIPTION*)XMALLOC(
1810
0
            sizeof(WOLFSSL_ACCESS_DESCRIPTION), NULL, DYNAMIC_TYPE_X509_EXT);
1811
0
        if (ad == NULL) {
1812
0
            WOLFSSL_MSG("Failed to malloc ACCESS_DESCRIPTION");
1813
0
            err = 1;
1814
0
            break;
1815
0
        }
1816
0
        XMEMSET(ad, 0, sizeof(WOLFSSL_ACCESS_DESCRIPTION));
1817
1818
        /* Create new ASN1_OBJECT from NID. */
1819
0
        ad->method = wolfSSL_OBJ_nid2obj(aiaEntry->nid);
1820
0
        if (ad->method == NULL) {
1821
0
            WOLFSSL_MSG("OBJ_nid2obj() failed");
1822
0
            err = 1;
1823
0
            break;
1824
0
        }
1825
1826
        /* Allocate memory for GENERAL NAME. */
1827
0
        ad->location = wolfSSL_GENERAL_NAME_new();
1828
0
        if (ad->location == NULL) {
1829
0
            WOLFSSL_MSG("Failed to malloc GENERAL_NAME");
1830
0
            err = 1;
1831
0
            break;
1832
0
        }
1833
1834
        /* Set the type of general name to URI (only type supported). */
1835
0
        ret = wolfSSL_GENERAL_NAME_set_type(ad->location, WOLFSSL_GEN_URI);
1836
0
        if (ret != WOLFSSL_SUCCESS) {
1837
0
            err = 1;
1838
0
            break;
1839
0
        }
1840
1841
        /* Set the URI into GENERAL_NAME. */
1842
0
        ret = wolfSSL_ASN1_STRING_set(ad->location->d.uniformResourceIdentifier,
1843
0
            aiaEntry->obj, aiaEntry->objSz);
1844
0
        if (ret != WOLFSSL_SUCCESS) {
1845
0
            WOLFSSL_MSG("ASN1_STRING_set() failed");
1846
0
            err = 1;
1847
0
            break;
1848
0
        }
1849
        /* Push onto AUTHORITY_INFO_ACCESS stack. */
1850
0
        ret = wolfSSL_sk_ACCESS_DESCRIPTION_push(aia, ad) > 0
1851
0
                ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
1852
0
        if (ret != WOLFSSL_SUCCESS) {
1853
0
            WOLFSSL_MSG("Error pushing ASN1 AD onto stack");
1854
0
            err = 1;
1855
0
            break;
1856
0
        }
1857
        /* Set to NULL so that it doesn't get freed now it is in AIA stack. */
1858
0
        ad = NULL;
1859
1860
0
        sk = sk->next;
1861
0
    }
1862
1863
0
    if (err) {
1864
        /* Dispose of Access Description if not put in stack. */
1865
0
        if (ad != NULL) {
1866
0
            wolfSSL_ASN1_OBJECT_free(ad->method);
1867
0
            wolfSSL_GENERAL_NAME_free(ad->location);
1868
0
            XFREE(ad, NULL, DYNAMIC_TYPE_X509_EXT);
1869
0
        }
1870
        /* Dispose of incomplete Access Description stack. */
1871
0
        wolfSSL_sk_ACCESS_DESCRIPTION_pop_free(aia, NULL);
1872
0
        aia = NULL;
1873
0
    }
1874
0
    return aia;
1875
0
}
1876
1877
/* Parses and returns an x509v3 extension internal structure.
1878
 *
1879
 * ext   : The X509_EXTENSION for parsing internal structure. If extension is
1880
 * not NULL, get the NID of the extension object and create a new
1881
 * extension-specific internal structure based on the extension type.
1882
 *
1883
 * Returns NULL on error or if NID is not found, otherwise returns a pointer to
1884
 * the extension type-specific X509_EXTENSION internal structure.
1885
 * Return is expected to be free'd by caller.
1886
 */
1887
void* wolfSSL_X509V3_EXT_d2i(WOLFSSL_X509_EXTENSION* ext)
1888
0
{
1889
0
    const WOLFSSL_v3_ext_method* method;
1890
0
    int ret;
1891
0
    WOLFSSL_ASN1_OBJECT* object;
1892
0
    WOLFSSL_BASIC_CONSTRAINTS* bc;
1893
0
    WOLFSSL_AUTHORITY_KEYID* akey;
1894
0
    WOLFSSL_ASN1_STRING* asn1String = NULL, *newString = NULL;
1895
0
    WOLFSSL_STACK* sk;
1896
0
    void *data = NULL;
1897
0
    WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
1898
1899
0
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_d2i");
1900
1901
0
    if (ext == NULL) {
1902
0
        WOLFSSL_MSG("Bad function Argument");
1903
0
        return NULL;
1904
0
    }
1905
1906
0
    object = wolfSSL_X509_EXTENSION_get_object(ext);
1907
0
    if (object == NULL) {
1908
0
        WOLFSSL_MSG("X509_EXTENSION_get_object failed");
1909
0
        return NULL;
1910
0
    }
1911
    /* extract extension info */
1912
0
    method = wolfSSL_X509V3_EXT_get(ext);
1913
0
    if (method == NULL) {
1914
0
        WOLFSSL_MSG("wolfSSL_X509V3_EXT_get error");
1915
0
        return NULL;
1916
0
    }
1917
1918
0
#ifdef WOLFSSL_SMALL_STACK
1919
0
    cert = (DecodedCert *)XMALLOC(sizeof(*cert), NULL,
1920
0
            DYNAMIC_TYPE_X509_EXT);
1921
0
    if (cert == NULL) {
1922
0
        WOLFSSL_MSG("\tout of memory");
1923
0
        return NULL;
1924
0
    }
1925
0
#endif
1926
1927
0
    InitDecodedCert(cert, NULL, 0, NULL);
1928
1929
0
    if ((object->type != WC_NID_basic_constraints) &&
1930
0
        (object->type != WC_NID_subject_alt_name) &&
1931
0
        (object->type != WC_NID_info_access)) {
1932
1933
0
        asn1String = wolfSSL_X509_EXTENSION_get_data_internal(ext);
1934
0
        if (asn1String == NULL) {
1935
0
            WOLFSSL_MSG("X509_EXTENSION_get_data() failed");
1936
0
            goto out;
1937
0
        }
1938
1939
0
        ret = DecodeExtensionType((const byte*)asn1String->data,
1940
0
                asn1String->length, object->type, (byte)ext->crit, cert, NULL);
1941
0
        if (ret != 0) {
1942
0
            WOLFSSL_MSG("DecodeExtensionType() failed");
1943
0
            goto out;
1944
0
        }
1945
0
    }
1946
1947
    /* Return pointer to proper internal structure based on NID */
1948
0
    switch (object->type) {
1949
        /* basicConstraints */
1950
0
        case WC_NID_basic_constraints:
1951
0
            WOLFSSL_MSG("basicConstraints");
1952
            /* Allocate new BASIC_CONSTRAINTS structure */
1953
0
            bc = wolfSSL_BASIC_CONSTRAINTS_new();
1954
0
            if (bc == NULL) {
1955
0
                WOLFSSL_MSG("Failed to malloc basic constraints");
1956
0
                break;
1957
0
            }
1958
            /* Copy pathlen and CA into BASIC_CONSTRAINTS from object */
1959
0
            bc->ca = object->ca;
1960
0
            if (object->pathlen != NULL && object->pathlen->length > 0) {
1961
0
                bc->pathlen = wolfSSL_ASN1_INTEGER_dup(object->pathlen);
1962
0
                if (bc->pathlen == NULL) {
1963
0
                    WOLFSSL_MSG("Failed to duplicate ASN1_INTEGER");
1964
0
                    wolfSSL_BASIC_CONSTRAINTS_free(bc);
1965
0
                    break;
1966
0
                }
1967
0
            }
1968
0
            else
1969
0
                bc->pathlen = NULL;
1970
1971
0
            data = bc;
1972
0
            break;
1973
1974
        /* subjectKeyIdentifier */
1975
0
        case WC_NID_subject_key_identifier:
1976
0
        {
1977
0
            WOLFSSL_MSG("subjectKeyIdentifier");
1978
1979
0
            newString = wolfSSL_ASN1_STRING_new();
1980
0
            if (newString == NULL) {
1981
0
                WOLFSSL_MSG("Failed to malloc ASN1_STRING");
1982
0
                break;
1983
0
            }
1984
0
            ret = wolfSSL_ASN1_STRING_set(newString, cert->extSubjKeyId,
1985
0
                                          cert->extSubjKeyIdSz);
1986
0
            if (ret != WOLFSSL_SUCCESS) {
1987
0
                WOLFSSL_MSG("ASN1_STRING_set() failed");
1988
0
                wolfSSL_ASN1_STRING_free(newString);
1989
0
                break;
1990
0
            };
1991
1992
0
            newString->type = asn1String->type;
1993
0
            data = newString;
1994
0
            break;
1995
0
        }
1996
1997
        /* authorityKeyIdentifier */
1998
0
        case WC_NID_authority_key_identifier:
1999
0
        {
2000
0
            WOLFSSL_MSG("AuthorityKeyIdentifier");
2001
2002
0
            akey = (WOLFSSL_AUTHORITY_KEYID*)
2003
0
                    XMALLOC(sizeof(WOLFSSL_AUTHORITY_KEYID), NULL,
2004
0
                    DYNAMIC_TYPE_X509_EXT);
2005
0
            if (akey == NULL) {
2006
0
                WOLFSSL_MSG("Failed to malloc authority key id");
2007
0
                break;
2008
0
            }
2009
2010
0
            XMEMSET(akey, 0, sizeof(WOLFSSL_AUTHORITY_KEYID));
2011
2012
0
            akey->keyid = wolfSSL_ASN1_STRING_new();
2013
0
            if (akey->keyid == NULL) {
2014
0
                WOLFSSL_MSG("ASN1_STRING_new() failed");
2015
0
                wolfSSL_AUTHORITY_KEYID_free(akey);
2016
0
                break;
2017
0
            }
2018
2019
0
            ret = wolfSSL_ASN1_STRING_set(akey->keyid, cert->extAuthKeyId,
2020
0
                                          cert->extAuthKeyIdSz);
2021
0
            if (ret != WOLFSSL_SUCCESS) {
2022
0
                WOLFSSL_MSG("ASN1_STRING_set() failed");
2023
0
                wolfSSL_AUTHORITY_KEYID_free(akey);
2024
0
                break;
2025
0
            };
2026
0
            akey->keyid->type   = asn1String->type;
2027
2028
            /* For now, set issuer and serial to NULL. This may need to be
2029
                updated for future use */
2030
0
            akey->issuer = NULL;
2031
0
            akey->serial = NULL;
2032
2033
0
            data = akey;
2034
0
            break;
2035
0
        }
2036
2037
        /* keyUsage */
2038
0
        case WC_NID_key_usage:
2039
0
        {
2040
0
            WOLFSSL_MSG("keyUsage");
2041
2042
            /* This may need to be updated for future use. The i2v method for
2043
                keyUsage is not currently set. For now, return the ASN1_STRING
2044
                representation of KeyUsage bit string */
2045
0
            newString = wolfSSL_ASN1_STRING_new();
2046
0
            if (newString == NULL) {
2047
0
                WOLFSSL_MSG("Failed to malloc ASN1_STRING");
2048
0
                break;
2049
0
            }
2050
0
            ret = wolfSSL_ASN1_STRING_set(newString, (byte*)&cert->extKeyUsage,
2051
0
                                                                sizeof(word16));
2052
0
            if (ret != WOLFSSL_SUCCESS) {
2053
0
                WOLFSSL_MSG("ASN1_STRING_set() failed");
2054
0
                wolfSSL_ASN1_STRING_free(newString);
2055
0
                break;
2056
0
            };
2057
0
            newString->type = asn1String->type;
2058
0
            data = newString;
2059
0
            break;
2060
0
        }
2061
2062
        /* extKeyUsage */
2063
0
        case WC_NID_ext_key_usage:
2064
0
            WOLFSSL_MSG("extKeyUsage not supported yet");
2065
0
            break;
2066
2067
        /* certificatePolicies */
2068
0
        case WC_NID_certificate_policies:
2069
0
            WOLFSSL_MSG("certificatePolicies not supported yet");
2070
0
            break;
2071
2072
        /* cRLDistributionPoints */
2073
0
        case WC_NID_crl_distribution_points:
2074
0
            WOLFSSL_MSG("cRLDistributionPoints not supported yet");
2075
0
            break;
2076
2077
0
        case WC_NID_subject_alt_name:
2078
0
            if (ext->ext_sk == NULL) {
2079
0
                WOLFSSL_MSG("Subject alt name stack NULL");
2080
0
                break;
2081
0
            }
2082
0
            sk = wolfSSL_sk_dup(ext->ext_sk);
2083
0
            if (sk == NULL) {
2084
0
                WOLFSSL_MSG("Failed to duplicate subject alt names stack.");
2085
0
                break;
2086
0
            }
2087
0
            data = sk;
2088
0
            break;
2089
2090
        /* authorityInfoAccess */
2091
0
        case WC_NID_info_access:
2092
0
            WOLFSSL_MSG("AuthorityInfoAccess");
2093
0
            data = wolfssl_x509v3_ext_aia_d2i(ext);
2094
0
            break;
2095
2096
0
        default:
2097
0
            WOLFSSL_MSG("Extension NID not in table, returning NULL");
2098
0
            break;
2099
0
    }
2100
2101
0
out:
2102
2103
0
    FreeDecodedCert(cert);
2104
0
    WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_X509_EXT);
2105
2106
0
    return data;
2107
0
}
2108
2109
/* Looks for the extension matching the passed in nid
2110
 *
2111
 * x509 : certificate to get parse through for extension.
2112
 * nid : Extension OID to be found.
2113
 * lastPos : Start search from extension after lastPos.
2114
 *           Set to -1 to search from index 0.
2115
 * return >= 0 If successful the extension index is returned.
2116
 * return WOLFSSL_FATAL_ERROR If extension is not found or error is encountered.
2117
 */
2118
int wolfSSL_X509_get_ext_by_NID(const WOLFSSL_X509* x509, int nid, int lastPos)
2119
0
{
2120
0
    int extCount = 0, length = 0, outSz = 0, sz = 0, ret = 0;
2121
0
    int isSet = 0, found = 0, loc;
2122
0
    const byte* rawCert;
2123
0
    const byte* input;
2124
0
    word32 oid, idx = 0, tmpIdx = 0, foundNID;
2125
0
    WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
2126
2127
0
    WOLFSSL_ENTER("wolfSSL_X509_get_ext_by_NID");
2128
2129
0
    if (x509 == NULL) {
2130
0
        WOLFSSL_MSG("\tNot passed a certificate");
2131
0
        return WOLFSSL_FATAL_ERROR;
2132
0
    }
2133
2134
0
    if (lastPos < -1 || (lastPos > (wolfSSL_X509_get_ext_count(x509) - 1))) {
2135
0
        WOLFSSL_MSG("\tBad location argument");
2136
0
        return WOLFSSL_FATAL_ERROR;
2137
0
    }
2138
2139
0
    loc = lastPos + 1;
2140
2141
0
    rawCert = wolfSSL_X509_get_der((WOLFSSL_X509*)x509, &outSz);
2142
0
    if (rawCert == NULL) {
2143
0
        WOLFSSL_MSG("\tX509_get_der() failed");
2144
0
        return WOLFSSL_FATAL_ERROR;
2145
0
    }
2146
2147
0
#ifdef WOLFSSL_SMALL_STACK
2148
0
    cert = (DecodedCert *)XMALLOC(sizeof(*cert), x509->heap,
2149
0
                                  DYNAMIC_TYPE_DCERT);
2150
0
    if (cert == NULL) {
2151
0
        WOLFSSL_MSG("\tout of memory");
2152
0
        return WOLFSSL_FATAL_ERROR;
2153
0
    }
2154
0
#endif
2155
2156
0
    InitDecodedCert( cert, rawCert, (word32)outSz, 0);
2157
2158
0
    if (ParseCert(cert,
2159
#ifdef WOLFSSL_CERT_REQ
2160
            x509->isCSR ? CERTREQ_TYPE :
2161
#endif
2162
0
            CA_TYPE,
2163
0
            NO_VERIFY, NULL) < 0) {
2164
0
        WOLFSSL_MSG("\tCertificate parsing failed");
2165
0
        goto out;
2166
0
    }
2167
2168
0
    input = cert->extensions;
2169
0
    sz = cert->extensionsSz;
2170
2171
0
    if (input == NULL || sz == 0) {
2172
0
        WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
2173
0
        goto out;
2174
0
    }
2175
2176
#ifdef WOLFSSL_CERT_REQ
2177
    if (!x509->isCSR)
2178
#endif
2179
0
    {
2180
0
        if (input[idx++] != ASN_EXTENSIONS) {
2181
0
            WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
2182
0
            goto out;
2183
0
        }
2184
2185
0
        if (GetLength(input, &idx, &length, (word32)sz) < 0) {
2186
0
            WOLFSSL_MSG("\tfail: invalid length");
2187
0
            goto out;
2188
0
        }
2189
0
    }
2190
2191
0
    if (GetSequence(input, &idx, &length, (word32)sz) < 0) {
2192
0
        WOLFSSL_MSG("\tfail: should be a SEQUENCE (1)");
2193
0
        goto out;
2194
0
    }
2195
2196
0
    while (idx < (word32)sz) {
2197
0
        oid = 0;
2198
2199
0
        if (GetSequence(input, &idx, &length, (word32)sz) < 0) {
2200
0
            WOLFSSL_MSG("\tfail: should be a SEQUENCE");
2201
0
            goto out;
2202
0
        }
2203
2204
0
        tmpIdx = idx;
2205
0
        ret = GetObjectId(input, &idx, &oid, oidCertExtType, (word32)sz);
2206
0
        if (ret < 0) {
2207
0
            WOLFSSL_MSG("\tfail: OBJECT ID");
2208
0
            goto out;
2209
0
        }
2210
0
        idx = tmpIdx;
2211
0
        foundNID = (word32)oid2nid(oid, oidCertExtType);
2212
2213
0
        if (extCount >= loc) {
2214
            /* extCount >= loc. Now check if extension has been set */
2215
0
            isSet = wolfSSL_X509_ext_isSet_by_NID((WOLFSSL_X509*)x509,
2216
0
                (int)foundNID);
2217
0
            if (isSet && ((word32)nid == foundNID)) {
2218
0
                found = 1;
2219
0
                break;
2220
0
            }
2221
0
        }
2222
2223
0
        idx += length;
2224
0
        extCount++;
2225
0
    } /* while(idx < sz) */
2226
2227
0
out:
2228
2229
0
    FreeDecodedCert(cert);
2230
0
    WC_FREE_VAR_EX(cert, x509->heap, DYNAMIC_TYPE_DCERT);
2231
2232
0
    return found ? extCount : WOLFSSL_FATAL_ERROR;
2233
0
}
2234
2235
#endif /* OPENSSL_ALL || OPENSSL_EXTRA */
2236
2237
#if defined(OPENSSL_EXTRA) && !defined(IGNORE_NAME_CONSTRAINTS)
2238
/*
2239
 * Convert a Base_entry linked list to a STACK of GENERAL_SUBTREE.
2240
 *
2241
 * Base_entry stores name constraint data from DecodedCert. This function
2242
 * converts it to GENERAL_SUBTREE format.
2243
 *
2244
 * Supported types: ASN_DNS_TYPE, ASN_RFC822_TYPE, ASN_DIR_TYPE, ASN_IP_TYPE,
2245
 *                  ASN_URI_TYPE
2246
 *
2247
 * Returns 0 on success, negative on error.
2248
 */
2249
static int ConvertBaseEntryToSubtreeStack(Base_entry* list, WOLFSSL_STACK* sk,
2250
                                          void* heap)
2251
0
{
2252
0
    Base_entry* entry = list;
2253
0
    WOLFSSL_GENERAL_SUBTREE* subtree = NULL;
2254
0
    WOLFSSL_GENERAL_NAME* gn = NULL;
2255
0
    (void)heap;
2256
2257
0
    while (entry != NULL) {
2258
2259
0
        if (entry->type != ASN_DNS_TYPE && entry->type != ASN_RFC822_TYPE &&
2260
0
            entry->type != ASN_DIR_TYPE && entry->type != ASN_IP_TYPE &&
2261
0
            entry->type != ASN_URI_TYPE) {
2262
0
            entry = entry->next;
2263
0
            continue;
2264
0
        }
2265
2266
        /* Allocate subtree and general name */
2267
0
        subtree = (WOLFSSL_GENERAL_SUBTREE*)XMALLOC(
2268
0
            sizeof(WOLFSSL_GENERAL_SUBTREE), heap, DYNAMIC_TYPE_OPENSSL);
2269
0
        if (subtree == NULL) {
2270
0
            WOLFSSL_MSG("Failed to allocate GENERAL_SUBTREE");
2271
0
            return MEMORY_E;
2272
0
        }
2273
0
        XMEMSET(subtree, 0, sizeof(WOLFSSL_GENERAL_SUBTREE));
2274
2275
0
        gn = wolfSSL_GENERAL_NAME_new();
2276
0
        if (gn == NULL) {
2277
0
            WOLFSSL_MSG("Failed to allocate GENERAL_NAME");
2278
0
            XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2279
0
            return MEMORY_E;
2280
0
        }
2281
2282
        /* Free default ia5 string allocated by GENERAL_NAME_new */
2283
0
        wolfSSL_ASN1_STRING_free(gn->d.ia5);
2284
0
        gn->d.ia5 = NULL;
2285
2286
0
        switch (entry->type) {
2287
0
            case ASN_DNS_TYPE:
2288
0
            case ASN_RFC822_TYPE:
2289
0
            case ASN_URI_TYPE:
2290
0
            {
2291
0
                if (entry->type == ASN_DNS_TYPE) {
2292
0
                    gn->type = WOLFSSL_GEN_DNS;
2293
0
                }
2294
0
                else if (entry->type == ASN_RFC822_TYPE) {
2295
0
                    gn->type = WOLFSSL_GEN_EMAIL;
2296
0
                }
2297
0
                else {
2298
0
                    gn->type = WOLFSSL_GEN_URI;
2299
0
                }
2300
0
                gn->d.ia5 = wolfSSL_ASN1_STRING_new();
2301
0
                if (gn->d.ia5 == NULL) {
2302
0
                    WOLFSSL_MSG("Failed to allocate ASN1_STRING");
2303
0
                    wolfSSL_GENERAL_NAME_free(gn);
2304
0
                    XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2305
0
                    return MEMORY_E;
2306
0
                }
2307
0
                if (wolfSSL_ASN1_STRING_set(gn->d.ia5, entry->name,
2308
0
                        entry->nameSz) != WOLFSSL_SUCCESS) {
2309
0
                    WOLFSSL_MSG("Failed to set ASN1_STRING");
2310
0
                    wolfSSL_GENERAL_NAME_free(gn);
2311
0
                    XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2312
0
                    return MEMORY_E;
2313
0
                }
2314
0
                gn->d.ia5->type = WOLFSSL_V_ASN1_IA5STRING;
2315
0
                break;
2316
0
            }
2317
2318
0
            case ASN_DIR_TYPE:
2319
0
            {
2320
0
                byte* seqBuf = NULL;
2321
0
                unsigned char* p = NULL;
2322
0
                int seqLen = 0;
2323
2324
                /* Wrap in SEQUENCE and parse as X509_NAME */
2325
0
                gn->type = WOLFSSL_GEN_DIRNAME;
2326
0
                seqBuf = (byte*)XMALLOC((word32)entry->nameSz + MAX_SEQ_SZ,
2327
0
                                        heap, DYNAMIC_TYPE_TMP_BUFFER);
2328
0
                if (seqBuf == NULL) {
2329
0
                    WOLFSSL_MSG("Failed to allocate sequence buffer");
2330
0
                    wolfSSL_GENERAL_NAME_free(gn);
2331
0
                    XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2332
0
                    return MEMORY_E;
2333
0
                }
2334
2335
0
                seqLen = SetSequence(entry->nameSz, seqBuf);
2336
0
                XMEMCPY(seqBuf + seqLen, entry->name, entry->nameSz);
2337
2338
0
                p = seqBuf;
2339
0
                gn->d.directoryName = wolfSSL_d2i_X509_NAME(NULL, &p,
2340
0
                    (long)entry->nameSz + seqLen);
2341
0
                XFREE(seqBuf, heap, DYNAMIC_TYPE_TMP_BUFFER);
2342
2343
0
                if (gn->d.directoryName == NULL) {
2344
0
                    WOLFSSL_MSG("Failed to parse directoryName");
2345
0
                    wolfSSL_GENERAL_NAME_free(gn);
2346
0
                    XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2347
0
                    return ASN_PARSE_E;
2348
0
                }
2349
0
                break;
2350
0
            }
2351
2352
0
            case ASN_IP_TYPE:
2353
0
            {
2354
                /* For IP address, store raw bytes as OCTET_STRING. */
2355
0
                gn->type = WOLFSSL_GEN_IPADD;
2356
0
                gn->d.iPAddress = wolfSSL_ASN1_STRING_new();
2357
0
                if (gn->d.iPAddress == NULL) {
2358
0
                    WOLFSSL_MSG("Failed to allocate ASN1_STRING for IP");
2359
0
                    wolfSSL_GENERAL_NAME_free(gn);
2360
0
                    XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2361
0
                    return MEMORY_E;
2362
0
                }
2363
0
                if (wolfSSL_ASN1_STRING_set(gn->d.iPAddress, entry->name,
2364
0
                        entry->nameSz) != WOLFSSL_SUCCESS) {
2365
0
                    WOLFSSL_MSG("Failed to set IP ASN1_STRING");
2366
0
                    wolfSSL_GENERAL_NAME_free(gn);
2367
0
                    XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2368
0
                    return MEMORY_E;
2369
0
                }
2370
0
                gn->d.iPAddress->type = WOLFSSL_V_ASN1_OCTET_STRING;
2371
0
                break;
2372
0
            }
2373
0
        }
2374
2375
0
        subtree->base = gn;
2376
2377
0
        if (wolfSSL_sk_push(sk, subtree) <= 0) {
2378
0
            WOLFSSL_MSG("Failed to push subtree onto stack");
2379
0
            wolfSSL_GENERAL_NAME_free(gn);
2380
0
            XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2381
0
            return MEMORY_E;
2382
0
        }
2383
0
        entry = entry->next;
2384
0
    }
2385
2386
0
    return 0;
2387
0
}
2388
#endif /* OPENSSL_EXTRA && !IGNORE_NAME_CONSTRAINTS */
2389
2390
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
2391
/* Looks for the extension matching the passed in nid
2392
 *
2393
 * c   : if not null then is set to status value -2 if multiple occurrences
2394
 *       of the extension are found, -1 if not found, 0 if found and not
2395
 *       critical, and 1 if found and critical.
2396
 * nid : Extension OID to be found.
2397
 * idx : if NULL return first extension found match, otherwise start search at
2398
 *       idx location and set idx to the location of extension returned.
2399
 * returns NULL or a pointer to an WOLFSSL_ASN1_BIT_STRING (for KEY_USAGE_OID)
2400
 * or WOLFSSL_STACK (for other)
2401
 * holding extension structure
2402
 *
2403
 * NOTE code for decoding extensions is in asn.c DecodeCertExtensions --
2404
 * use already decoded extension in this function to avoid decoding twice.
2405
 * Currently we do not make use of idx since getting pre decoded extensions.
2406
 */
2407
void* wolfSSL_X509_get_ext_d2i(const WOLFSSL_X509* x509, int nid, int* c,
2408
    int* idx)
2409
0
{
2410
0
    void* ret = NULL;
2411
0
    WOLFSSL_STACK* sk = NULL;
2412
0
    WOLFSSL_ASN1_OBJECT* obj = NULL;
2413
0
    WOLFSSL_GENERAL_NAME* gn = NULL;
2414
0
#ifdef OPENSSL_EXTRA
2415
0
    WOLFSSL_DIST_POINT* dp = NULL;
2416
0
#endif
2417
0
    WOLFSSL_BASIC_CONSTRAINTS* bc = NULL;
2418
2419
0
    WOLFSSL_ENTER("wolfSSL_X509_get_ext_d2i");
2420
2421
0
    if (x509 == NULL) {
2422
0
        return NULL;
2423
0
    }
2424
2425
0
    if (c != NULL) {
2426
0
        *c = -1; /* default to not found */
2427
0
    }
2428
2429
0
    switch (nid) {
2430
0
        case BASIC_CA_OID:
2431
0
            if (x509->basicConstSet) {
2432
0
                WOLFSSL_ASN1_INTEGER* a;
2433
2434
0
                bc = wolfSSL_BASIC_CONSTRAINTS_new();
2435
0
                if (!bc) {
2436
0
                    WOLFSSL_MSG("wolfSSL_BASIC_CONSTRAINTS_new error");
2437
0
                    return NULL;
2438
0
                }
2439
2440
0
                a = wolfSSL_ASN1_INTEGER_new();
2441
0
                if (!a) {
2442
0
                    WOLFSSL_MSG("wolfSSL_ASN1_INTEGER_new error");
2443
0
                    wolfSSL_BASIC_CONSTRAINTS_free(bc);
2444
0
                    return NULL;
2445
0
                }
2446
0
                a->length = (int)x509->pathLength;
2447
2448
0
#if defined(OPENSSL_ALL) || defined(WOLFSSL_QT) || \
2449
0
        defined(WOLFSSL_APACHE_HTTPD)
2450
0
                bc->ca = x509->isCa;
2451
0
#endif
2452
0
                bc->pathlen = a;
2453
0
                if (c != NULL) {
2454
0
                    *c = x509->basicConstCrit;
2455
0
                }
2456
0
            }
2457
0
            else {
2458
0
                WOLFSSL_MSG("No Basic Constraint set");
2459
0
            }
2460
0
            return bc;
2461
2462
0
        case ALT_NAMES_OID:
2463
0
        {
2464
0
            DNS_entry* dns = NULL;
2465
2466
0
            if (x509->subjAltNameSet && x509->altNames != NULL) {
2467
                /* Malloc GENERAL_NAME stack */
2468
0
                sk = wolfSSL_sk_new_null();
2469
0
                if (sk == NULL)
2470
0
                    return NULL;
2471
0
                sk->type = STACK_TYPE_GEN_NAME;
2472
2473
                /* alt names are DNS_entry structs */
2474
0
                if (c != NULL) {
2475
0
                    if (x509->altNames->next != NULL) {
2476
0
                        *c = -2; /* more then one found */
2477
0
                    }
2478
0
                    else {
2479
0
                        *c = x509->subjAltNameCrit;
2480
0
                    }
2481
0
                }
2482
2483
0
                dns = x509->altNames;
2484
                /* Currently only support GEN_DNS type */
2485
0
                while (dns != NULL) {
2486
0
                    gn = wolfSSL_GENERAL_NAME_new();
2487
0
                    if (gn == NULL) {
2488
0
                        WOLFSSL_MSG("Error creating GENERAL_NAME");
2489
0
                        goto err;
2490
0
                    }
2491
2492
0
                    switch (dns->type) {
2493
0
                        case ASN_DIR_TYPE:
2494
0
                            gn->type = dns->type;
2495
0
                            {
2496
0
                                int localIdx = 0;
2497
0
                                unsigned char* n = (unsigned char*)XMALLOC(
2498
0
                                        dns->len + MAX_SEQ_SZ, x509->heap,
2499
0
                                        DYNAMIC_TYPE_TMP_BUFFER);
2500
0
                                if (n == NULL) {
2501
0
                                    goto err;
2502
0
                                }
2503
2504
0
                                localIdx += SetSequence(dns->len, n);
2505
0
                                XMEMCPY(n + localIdx, dns->name, dns->len);
2506
0
                                gn->d.dirn =  wolfSSL_d2i_X509_NAME(NULL, &n,
2507
0
                                        dns->len + localIdx);
2508
0
                                XFREE(n, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
2509
0
                                if (gn->d.dirn == NULL) {
2510
0
                                    WOLFSSL_MSG("Convert altDirName to X509 "
2511
0
                                            "NAME failed");
2512
0
                                    goto err;
2513
0
                                }
2514
0
                            }
2515
0
                            break;
2516
2517
0
                        case ASN_OTHER_TYPE:
2518
                            /* gn->type set internally */
2519
0
                            if (!wolfssl_dns_entry_othername_to_gn(dns, gn)) {
2520
0
                                goto err;
2521
0
                            }
2522
0
                            break;
2523
2524
0
                        case ASN_IP_TYPE:
2525
0
                            gn->type = dns->type;
2526
0
                            if (wolfSSL_ASN1_STRING_set(gn->d.iPAddress,
2527
0
                                    dns->name, dns->len) != WOLFSSL_SUCCESS) {
2528
0
                                WOLFSSL_MSG("ASN1_STRING_set failed");
2529
0
                                goto err;
2530
0
                            }
2531
0
                            gn->d.iPAddress->type = WOLFSSL_V_ASN1_OCTET_STRING;
2532
0
                            break;
2533
2534
0
                    #ifdef WOLFSSL_RID_ALT_NAME
2535
0
                        case ASN_RID_TYPE:
2536
0
                            gn->type = dns->type;
2537
                            /* Free ia5 before using union for registeredID */
2538
0
                            wolfSSL_ASN1_STRING_free(gn->d.ia5);
2539
0
                            gn->d.ia5 = NULL;
2540
2541
0
                            gn->d.registeredID = wolfSSL_ASN1_OBJECT_new();
2542
0
                            if (gn->d.registeredID == NULL) {
2543
0
                                goto err;
2544
0
                            }
2545
0
                            {
2546
                                /* Store DER-encoded OID (tag+length+content) */
2547
0
                                word32 derSz = 1 + SetLength(dns->len, NULL)
2548
0
                                               + dns->len;
2549
0
                                byte* der = (byte*)XMALLOC(derSz,
2550
0
                                    gn->d.registeredID->heap,
2551
0
                                    DYNAMIC_TYPE_ASN1);
2552
0
                                if (der == NULL) {
2553
0
                                    goto err;
2554
0
                                }
2555
0
                                {
2556
0
                                    word32 derIdx = 0;
2557
0
                                    der[derIdx++] = ASN_OBJECT_ID;
2558
0
                                    derIdx += SetLength(dns->len, der + derIdx);
2559
0
                                    XMEMCPY(der + derIdx, dns->name, dns->len);
2560
0
                                }
2561
0
                                gn->d.registeredID->obj = der;
2562
0
                                gn->d.registeredID->objSz = derSz;
2563
0
                            }
2564
0
                            gn->d.registeredID->dynamic |=
2565
0
                                WOLFSSL_ASN1_DYNAMIC_DATA;
2566
0
                            gn->d.registeredID->grp = oidCertExtType;
2567
0
                            break;
2568
0
                    #endif /* WOLFSSL_RID_ALT_NAME */
2569
2570
0
                        default:
2571
0
                            gn->type = dns->type;
2572
0
                            if (wolfSSL_ASN1_STRING_set(gn->d.dNSName,
2573
0
                                    dns->name, dns->len) != WOLFSSL_SUCCESS) {
2574
0
                                WOLFSSL_MSG("ASN1_STRING_set failed");
2575
0
                                goto err;
2576
0
                            }
2577
0
                            gn->d.dNSName->type = WOLFSSL_V_ASN1_IA5STRING;
2578
0
                    }
2579
2580
0
                    dns = dns->next;
2581
                    /* Using wolfSSL_sk_insert to maintain backwards
2582
                     * compatibility with earlier versions of _push API that
2583
                     * pushed items to the start of the list instead of the
2584
                     * end. */
2585
0
                    if (wolfSSL_sk_insert(sk, gn, 0) <= 0) {
2586
0
                        WOLFSSL_MSG("Error pushing ASN1 object onto stack");
2587
0
                        goto err;
2588
0
                    }
2589
                    /* null so that it doesn't get pushed again after switch */
2590
0
                    gn = NULL;
2591
0
                }
2592
0
            }
2593
0
            else {
2594
0
                WOLFSSL_MSG("No Alt Names set");
2595
0
            }
2596
2597
0
            break;
2598
0
        }
2599
2600
0
        case CRL_DIST_OID:
2601
0
    #if defined(OPENSSL_EXTRA)
2602
0
            if (x509->CRLdistSet && x509->CRLInfo != NULL) {
2603
0
                if (c != NULL) {
2604
0
                    *c = x509->CRLdistCrit;
2605
0
                }
2606
2607
0
                sk = wolfSSL_sk_new_null();
2608
0
                if (sk == NULL) {
2609
0
                    return NULL;
2610
0
                }
2611
0
                sk->type = STACK_TYPE_DIST_POINT;
2612
2613
0
                gn = wolfSSL_GENERAL_NAME_new();
2614
0
                if (gn == NULL) {
2615
0
                    WOLFSSL_MSG("Error creating GENERAL_NAME");
2616
0
                    goto err;
2617
0
                }
2618
2619
0
                if (wolfSSL_GENERAL_NAME_set_type(gn, WOLFSSL_GEN_URI) !=
2620
0
                        WOLFSSL_SUCCESS) {
2621
0
                    WOLFSSL_MSG("Error setting GENERAL_NAME type");
2622
0
                    goto err;
2623
0
                }
2624
2625
0
                if (wolfSSL_ASN1_STRING_set(gn->d.uniformResourceIdentifier,
2626
0
                        x509->CRLInfo, x509->CRLInfoSz) != WOLFSSL_SUCCESS) {
2627
0
                    WOLFSSL_MSG("ASN1_STRING_set failed");
2628
0
                    goto err;
2629
0
                }
2630
2631
                /* wolfSSL only decodes one dist point */
2632
0
                dp = wolfSSL_DIST_POINT_new();
2633
0
                if (dp == NULL) {
2634
0
                    WOLFSSL_MSG("Error creating DIST_POINT");
2635
0
                    goto err;
2636
0
                }
2637
2638
                /* push GENERAL_NAME onto fullname stack */
2639
0
                if (wolfSSL_sk_GENERAL_NAME_push(dp->distpoint->name.fullname,
2640
0
                                                 gn) <= 0) {
2641
0
                    WOLFSSL_MSG("wolfSSL_sk_GENERAL_NAME_push error");
2642
0
                    goto err;
2643
0
                }
2644
2645
                /* push DIST_POINT onto stack */
2646
0
                if (wolfSSL_sk_DIST_POINT_push(sk, dp) <= 0) {
2647
0
                    WOLFSSL_MSG("Error pushing DIST_POINT onto stack");
2648
0
                    goto err;
2649
0
                }
2650
2651
0
                gn = NULL;
2652
0
                dp = NULL;
2653
2654
0
            }
2655
0
            else {
2656
0
                WOLFSSL_MSG("No CRL dist set");
2657
0
            }
2658
0
    #endif /* OPENSSL_EXTRA */
2659
0
            break;
2660
2661
0
        case AUTH_INFO_OID:
2662
0
            if (x509->authInfoSet && x509->authInfo != NULL) {
2663
0
                if (c != NULL) {
2664
0
                    *c = x509->authInfoCrit;
2665
0
                }
2666
0
                obj = wolfSSL_ASN1_OBJECT_new();
2667
0
                if (obj == NULL) {
2668
0
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2669
0
                    return NULL;
2670
0
                }
2671
0
                obj->type  = AUTH_INFO_OID;
2672
0
                obj->grp   = oidCertExtType;
2673
0
                obj->obj   = x509->authInfo;
2674
0
                obj->objSz = (unsigned int)x509->authInfoSz;
2675
0
            }
2676
0
            else {
2677
0
                WOLFSSL_MSG("No Auth Info set");
2678
0
            }
2679
0
            break;
2680
2681
0
        case AUTH_KEY_OID:
2682
0
            if (x509->authKeyIdSet) {
2683
0
                WOLFSSL_AUTHORITY_KEYID* akey = wolfSSL_AUTHORITY_KEYID_new();
2684
0
                if (!akey) {
2685
0
                    WOLFSSL_MSG(
2686
0
                        "Issue creating WOLFSSL_AUTHORITY_KEYID struct");
2687
0
                    return NULL;
2688
0
                }
2689
2690
0
                if (c != NULL) {
2691
0
                    *c = x509->authKeyIdCrit;
2692
0
                }
2693
0
                obj = wolfSSL_ASN1_OBJECT_new();
2694
0
                if (obj == NULL) {
2695
0
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2696
0
                    wolfSSL_AUTHORITY_KEYID_free(akey);
2697
0
                    return NULL;
2698
0
                }
2699
0
                obj->type  = AUTH_KEY_OID;
2700
0
                obj->grp   = oidCertExtType;
2701
0
                obj->obj   = x509->authKeyId;
2702
0
                obj->objSz = x509->authKeyIdSz;
2703
0
                akey->issuer = obj;
2704
0
                return akey;
2705
0
            }
2706
0
            else {
2707
0
                WOLFSSL_MSG("No Auth Key set");
2708
0
            }
2709
0
            break;
2710
2711
0
        case SUBJ_KEY_OID:
2712
0
            if (x509->subjKeyIdSet) {
2713
0
                if (c != NULL) {
2714
0
                    *c = x509->subjKeyIdCrit;
2715
0
                }
2716
0
                obj = wolfSSL_ASN1_OBJECT_new();
2717
0
                if (obj == NULL) {
2718
0
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2719
0
                    return NULL;
2720
0
                }
2721
0
                obj->type  = SUBJ_KEY_OID;
2722
0
                obj->grp   = oidCertExtType;
2723
0
                obj->obj   = x509->subjKeyId;
2724
0
                obj->objSz = x509->subjKeyIdSz;
2725
0
            }
2726
0
            else {
2727
0
                WOLFSSL_MSG("No Subject Key set");
2728
0
            }
2729
0
            break;
2730
2731
0
        case CERT_POLICY_OID:
2732
0
        {
2733
0
        #ifdef WOLFSSL_CERT_EXT
2734
0
            int i;
2735
2736
0
            if (x509->certPoliciesNb > 0) {
2737
0
                if (c != NULL) {
2738
0
                    if (x509->certPoliciesNb > 1) {
2739
0
                        *c = -2;
2740
0
                    }
2741
0
                    else {
2742
0
                        *c = 0;
2743
0
                    }
2744
0
                }
2745
2746
0
                sk = wolfSSL_sk_new_asn1_obj();
2747
0
                if (sk == NULL) {
2748
0
                    return NULL;
2749
0
                }
2750
2751
0
                for (i = 0; i < x509->certPoliciesNb - 1; i++) {
2752
0
                    obj = wolfSSL_ASN1_OBJECT_new();
2753
0
                    if (obj == NULL) {
2754
0
                        WOLFSSL_MSG(
2755
0
                            "Issue creating WOLFSSL_ASN1_OBJECT struct");
2756
0
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2757
0
                        return NULL;
2758
0
                    }
2759
0
                    obj->type  = CERT_POLICY_OID;
2760
0
                    obj->grp   = oidCertExtType;
2761
0
                    obj->obj   = (byte*)(x509->certPolicies[i]);
2762
0
                    obj->objSz = MAX_CERTPOL_SZ;
2763
0
                    if (wolfSSL_sk_ASN1_OBJECT_push(sk, obj) <= 0) {
2764
0
                        WOLFSSL_MSG("Error pushing ASN1 object onto stack");
2765
0
                        wolfSSL_ASN1_OBJECT_free(obj);
2766
0
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2767
0
                        sk = NULL;
2768
0
                    }
2769
0
                }
2770
2771
0
                obj = wolfSSL_ASN1_OBJECT_new();
2772
0
                if (obj == NULL) {
2773
0
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2774
0
                    wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2775
0
                    return NULL;
2776
0
                }
2777
0
                obj->type  = CERT_POLICY_OID;
2778
0
                obj->grp   = oidCertExtType;
2779
0
                obj->obj   = (byte*)(x509->certPolicies[i]);
2780
0
                obj->objSz = MAX_CERTPOL_SZ;
2781
2782
0
                if (wolfSSL_sk_ASN1_OBJECT_push(sk, obj) <= 0) {
2783
0
                    WOLFSSL_MSG("Error pushing ASN1 object onto stack");
2784
0
                    wolfSSL_ASN1_OBJECT_free(obj);
2785
0
                    wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2786
0
                    sk = NULL;
2787
0
                }
2788
2789
0
                obj = NULL;
2790
0
            }
2791
0
            else {
2792
0
                WOLFSSL_MSG("No Cert Policy set");
2793
0
            }
2794
0
        #endif /* WOLFSSL_CERT_EXT */
2795
0
        #ifdef WOLFSSL_SEP
2796
0
            if (x509->certPolicySet) {
2797
0
                if (c != NULL) {
2798
0
                    *c = x509->certPolicyCrit;
2799
0
                }
2800
0
                obj = wolfSSL_ASN1_OBJECT_new();
2801
0
                if (obj == NULL) {
2802
0
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2803
0
                    return NULL;
2804
0
                }
2805
0
                obj->type  = CERT_POLICY_OID;
2806
0
                obj->grp   = oidCertExtType;
2807
0
            }
2808
0
            else {
2809
0
                WOLFSSL_MSG("No Cert Policy set");
2810
0
            }
2811
0
        #endif
2812
0
            break;
2813
0
        }
2814
0
        case KEY_USAGE_OID:
2815
0
        {
2816
0
            WOLFSSL_ASN1_STRING* asn1str = NULL;
2817
0
            if (x509->keyUsageSet) {
2818
0
                if (c != NULL) {
2819
0
                    *c = x509->keyUsageCrit;
2820
0
                }
2821
2822
0
                asn1str = wolfSSL_ASN1_STRING_new();
2823
0
                if (asn1str == NULL) {
2824
0
                    WOLFSSL_MSG("Failed to malloc ASN1_STRING");
2825
0
                    return NULL;
2826
0
                }
2827
2828
0
                if (wolfSSL_ASN1_STRING_set(asn1str, &x509->keyUsage,
2829
0
                        sizeof(word16)) != WOLFSSL_SUCCESS) {
2830
0
                    WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
2831
0
                    wolfSSL_ASN1_STRING_free(asn1str);
2832
0
                    return NULL;
2833
0
                }
2834
2835
0
                asn1str->type = KEY_USAGE_OID;
2836
0
            }
2837
0
            else {
2838
0
                WOLFSSL_MSG("No Key Usage set");
2839
0
            }
2840
            /* don't add stack of and return bit string directly */
2841
0
            return asn1str;
2842
0
        }
2843
0
        case INHIBIT_ANY_OID:
2844
0
            WOLFSSL_MSG("INHIBIT ANY extension not supported");
2845
0
            break;
2846
2847
0
        case EXT_KEY_USAGE_OID:
2848
0
            if (x509->extKeyUsageSrc != NULL) {
2849
0
                const byte* ekuSrc = x509->extKeyUsageSrc;
2850
0
                word32 i;
2851
2852
0
                sk = wolfSSL_sk_new_asn1_obj();
2853
0
                if (sk == NULL) {
2854
0
                    WOLFSSL_MSG("Issue creating stack");
2855
0
                    return NULL;
2856
0
                }
2857
2858
0
                for (i = 0; i < x509->extKeyUsageCount; i++) {
2859
0
                    long ekuSrcLen = (long)(x509->extKeyUsageSz -
2860
0
                            (word32)(ekuSrc - x509->extKeyUsageSrc));
2861
0
                    WOLFSSL_ASN1_OBJECT* ekuObj = wolfSSL_d2i_ASN1_OBJECT(NULL,
2862
0
                            &ekuSrc, ekuSrcLen);
2863
0
                    if (ekuObj == NULL) {
2864
0
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2865
0
                        WOLFSSL_MSG("d2i obj error");
2866
0
                        return NULL;
2867
0
                    }
2868
0
                    ekuObj->type  = EXT_KEY_USAGE_OID;
2869
0
                    ekuObj->grp   = oidCertExtType;
2870
                    /* Push to end to maintain order */
2871
0
                    if (wolfSSL_sk_insert(sk, ekuObj, -1) <= 0) {
2872
0
                        wolfSSL_ASN1_OBJECT_free(ekuObj);
2873
0
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2874
0
                        WOLFSSL_MSG("d2i obj error");
2875
0
                        return NULL;
2876
0
                    }
2877
0
                }
2878
2879
0
                if ((word32)(ekuSrc - x509->extKeyUsageSrc)
2880
0
                        != x509->extKeyUsageSz ||
2881
0
                        i != x509->extKeyUsageCount) {
2882
0
                    wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2883
0
                    WOLFSSL_MSG("incorrect eku count or buffer not exhausted");
2884
0
                    return NULL;
2885
0
                }
2886
2887
0
                if (c != NULL) {
2888
0
                    if (x509->extKeyUsageCount > 1) {
2889
0
                        *c = -2;
2890
0
                    }
2891
0
                    else {
2892
0
                        *c = x509->extKeyUsageCrit;
2893
0
                    }
2894
0
                }
2895
0
            }
2896
0
            else {
2897
0
                WOLFSSL_MSG("No Extended Key Usage set");
2898
0
            }
2899
0
            break;
2900
2901
0
    #if defined(OPENSSL_EXTRA) && !defined(IGNORE_NAME_CONSTRAINTS)
2902
0
        case NAME_CONS_OID:
2903
0
        {
2904
0
            WOLFSSL_NAME_CONSTRAINTS* nc = NULL;
2905
2906
            /* Check if name constraints exist in stored X509 */
2907
0
            if (x509->permittedNames == NULL && x509->excludedNames == NULL) {
2908
0
                WOLFSSL_MSG("No Name Constraints set");
2909
0
                break;
2910
0
            }
2911
2912
0
            if (c != NULL) {
2913
0
                *c = x509->nameConstraintCrit;
2914
0
            }
2915
2916
0
            nc = (WOLFSSL_NAME_CONSTRAINTS*)XMALLOC(
2917
0
                sizeof(WOLFSSL_NAME_CONSTRAINTS), x509->heap,
2918
0
                DYNAMIC_TYPE_OPENSSL);
2919
0
            if (nc == NULL) {
2920
0
                WOLFSSL_MSG("Failed to allocate NAME_CONSTRAINTS");
2921
0
                break;
2922
0
            }
2923
0
            XMEMSET(nc, 0, sizeof(WOLFSSL_NAME_CONSTRAINTS));
2924
2925
            /* Convert permitted names */
2926
0
            if (x509->permittedNames != NULL) {
2927
0
                nc->permittedSubtrees = wolfSSL_sk_new_null();
2928
0
                if (nc->permittedSubtrees == NULL) {
2929
0
                    WOLFSSL_MSG("Failed to allocate permitted stack");
2930
0
                    wolfSSL_NAME_CONSTRAINTS_free(nc);
2931
0
                    break;
2932
0
                }
2933
0
                nc->permittedSubtrees->type = STACK_TYPE_GENERAL_SUBTREE;
2934
2935
0
                if (ConvertBaseEntryToSubtreeStack(x509->permittedNames,
2936
0
                        nc->permittedSubtrees, x509->heap) != 0) {
2937
0
                    WOLFSSL_MSG("Failed to convert permitted names");
2938
0
                    wolfSSL_NAME_CONSTRAINTS_free(nc);
2939
0
                    break;
2940
0
                }
2941
0
            }
2942
2943
            /* Convert excluded names */
2944
0
            if (x509->excludedNames != NULL) {
2945
0
                nc->excludedSubtrees = wolfSSL_sk_new_null();
2946
0
                if (nc->excludedSubtrees == NULL) {
2947
0
                    WOLFSSL_MSG("Failed to allocate excluded stack");
2948
0
                    wolfSSL_NAME_CONSTRAINTS_free(nc);
2949
0
                    break;
2950
0
                }
2951
0
                nc->excludedSubtrees->type = STACK_TYPE_GENERAL_SUBTREE;
2952
2953
0
                if (ConvertBaseEntryToSubtreeStack(x509->excludedNames,
2954
0
                        nc->excludedSubtrees, x509->heap) != 0) {
2955
0
                    WOLFSSL_MSG("Failed to convert excluded names");
2956
0
                    wolfSSL_NAME_CONSTRAINTS_free(nc);
2957
0
                    break;
2958
0
                }
2959
0
            }
2960
2961
0
            return nc;
2962
0
        }
2963
0
    #endif /* OPENSSL_EXTRA && !IGNORE_NAME_CONSTRAINTS */
2964
2965
0
        case PRIV_KEY_USAGE_PERIOD_OID:
2966
0
            WOLFSSL_MSG("Private Key Usage Period extension not supported");
2967
0
            break;
2968
2969
0
        case SUBJ_INFO_ACC_OID:
2970
0
            WOLFSSL_MSG("Subject Info Access extension not supported");
2971
0
            break;
2972
2973
0
        case POLICY_MAP_OID:
2974
0
            WOLFSSL_MSG("Policy Map extension not supported");
2975
0
            break;
2976
2977
0
        case POLICY_CONST_OID:
2978
0
            WOLFSSL_MSG("Policy Constraint extension not supported");
2979
0
            break;
2980
2981
0
        case ISSUE_ALT_NAMES_OID:
2982
0
            WOLFSSL_MSG("Issue Alt Names extension not supported");
2983
0
            break;
2984
2985
0
        case TLS_FEATURE_OID:
2986
0
            WOLFSSL_MSG("TLS Feature extension not supported");
2987
0
            break;
2988
2989
0
        default:
2990
0
            WOLFSSL_MSG("Unsupported/Unknown extension OID");
2991
0
    }
2992
2993
    /* make sure stack of is allocated */
2994
0
    if ((obj || gn) && sk == NULL) {
2995
0
        sk = wolfSSL_sk_new_asn1_obj();
2996
0
        if (sk == NULL) {
2997
0
            goto err;
2998
0
        }
2999
0
    }
3000
0
    if (obj) {
3001
0
        if (wolfSSL_sk_ASN1_OBJECT_push(sk, obj) <= 0) {
3002
0
            WOLFSSL_MSG("Error pushing ASN1_OBJECT object onto "
3003
0
                        "stack.");
3004
0
            goto err;
3005
0
        }
3006
0
    }
3007
3008
0
    ret = sk;
3009
3010
0
    (void)idx;
3011
3012
0
    return ret;
3013
3014
0
err:
3015
0
    if (obj) {
3016
0
        wolfSSL_ASN1_OBJECT_free(obj);
3017
0
    }
3018
0
    if (gn) {
3019
0
        wolfSSL_GENERAL_NAME_free(gn);
3020
0
    }
3021
0
    #ifdef OPENSSL_EXTRA
3022
0
    if (dp) {
3023
0
        wolfSSL_DIST_POINT_free(dp);
3024
0
    }
3025
0
    #endif
3026
0
    if (sk) {
3027
0
        wolfSSL_sk_pop_free(sk, NULL);
3028
0
    }
3029
0
    return NULL;
3030
0
}
3031
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
3032
3033
#ifdef OPENSSL_EXTRA
3034
int wolfSSL_X509_add_altname_ex(WOLFSSL_X509* x509, const char* name,
3035
        word32 nameSz, int type)
3036
0
{
3037
0
    DNS_entry* newAltName = NULL;
3038
0
    char* nameCopy = NULL;
3039
3040
0
    if (x509 == NULL)
3041
0
        return WOLFSSL_FAILURE;
3042
3043
0
    if ((name == NULL) || (nameSz == 0))
3044
0
        return WOLFSSL_SUCCESS;
3045
3046
0
    newAltName = AltNameNew(x509->heap);
3047
0
    if (newAltName == NULL)
3048
0
        return WOLFSSL_FAILURE;
3049
3050
0
    nameCopy = (char*)XMALLOC(nameSz + 1, x509->heap, DYNAMIC_TYPE_ALTNAME);
3051
0
    if (nameCopy == NULL) {
3052
0
        XFREE(newAltName, x509->heap, DYNAMIC_TYPE_ALTNAME);
3053
0
        return WOLFSSL_FAILURE;
3054
0
    }
3055
3056
0
    XMEMCPY(nameCopy, name, nameSz);
3057
3058
0
    nameCopy[nameSz] = '\0';
3059
3060
0
    newAltName->next = x509->altNames;
3061
0
    newAltName->type = type;
3062
0
    newAltName->len = (int)nameSz;
3063
0
    newAltName->name = nameCopy;
3064
0
    x509->altNames = newAltName;
3065
3066
0
    return WOLFSSL_SUCCESS;
3067
0
}
3068
3069
int wolfSSL_X509_add_altname(WOLFSSL_X509* x509, const char* name, int type)
3070
0
{
3071
0
    word32 nameSz;
3072
3073
0
    if (name == NULL)
3074
0
        return WOLFSSL_SUCCESS;
3075
3076
0
    nameSz = (word32)XSTRLEN(name);
3077
0
    if (nameSz == 0)
3078
0
        return WOLFSSL_SUCCESS;
3079
3080
0
    if (type == ASN_IP_TYPE) {
3081
0
#ifdef WOLFSSL_IP_ALT_NAME
3082
0
        byte ip4[4];
3083
0
        byte ip6[16];
3084
0
        int ptonRet;
3085
3086
        /* Check if this is an ip4 address */
3087
0
        ptonRet = XINET_PTON(WOLFSSL_IP4, name, ip4);
3088
0
        if (ptonRet == 1) {
3089
0
            return wolfSSL_X509_add_altname_ex(x509, (const char*)ip4, 4,
3090
0
                type);
3091
0
        }
3092
3093
        /* Check for ip6 */
3094
0
        ptonRet = XINET_PTON(WOLFSSL_IP6, name, ip6);
3095
0
        if (ptonRet == 1) {
3096
0
            return wolfSSL_X509_add_altname_ex(x509, (const char*)ip6, 16,
3097
0
                type);
3098
0
        }
3099
3100
0
        WOLFSSL_MSG("IP address parse failed");
3101
0
        return WOLFSSL_FAILURE;
3102
#else
3103
        WOLFSSL_MSG("WOLFSSL_IP_ALT_NAME not enabled");
3104
        return WOLFSSL_FAILURE;
3105
#endif
3106
0
    }
3107
3108
0
    return wolfSSL_X509_add_altname_ex(x509, name, nameSz, type);
3109
0
}
3110
3111
#ifndef NO_WOLFSSL_STUB
3112
WOLFSSL_X509_EXTENSION *wolfSSL_X509_delete_ext(WOLFSSL_X509 *x509, int loc)
3113
0
{
3114
0
    WOLFSSL_STUB("wolfSSL_X509_delete_ext");
3115
0
    (void)x509;
3116
0
    (void)loc;
3117
0
    return NULL;
3118
0
}
3119
3120
/* currently LHASH is not implemented (and not needed for Apache port) */
3121
WOLFSSL_X509_EXTENSION* wolfSSL_X509V3_EXT_conf_nid(
3122
        WOLF_LHASH_OF(CONF_VALUE)* conf, WOLFSSL_X509V3_CTX* ctx, int nid,
3123
        char* value)
3124
0
{
3125
0
    WOLFSSL_STUB("wolfSSL_X509V3_EXT_conf_nid");
3126
3127
0
    if (conf != NULL) {
3128
0
        WOLFSSL_MSG("Handling LHASH not implemented yet");
3129
0
        return NULL;
3130
0
    }
3131
3132
0
    (void)conf;
3133
0
    (void)ctx;
3134
0
    (void)nid;
3135
0
    (void)value;
3136
0
    return NULL;
3137
0
}
3138
3139
void wolfSSL_X509V3_set_ctx_nodb(WOLFSSL_X509V3_CTX* ctx)
3140
0
{
3141
0
    WOLFSSL_STUB("wolfSSL_X509V3_set_ctx_nodb");
3142
0
    (void)ctx;
3143
0
}
3144
#endif /* !NO_WOLFSSL_STUB */
3145
3146
#ifdef OPENSSL_EXTRA
3147
static WOLFSSL_X509_EXTENSION* createExtFromStr(int nid, const char *value)
3148
0
{
3149
0
    WOLFSSL_X509_EXTENSION* ext;
3150
3151
0
    ext = wolfSSL_X509_EXTENSION_new();
3152
0
    if (ext == NULL) {
3153
0
        WOLFSSL_MSG("memory error");
3154
0
        return NULL;
3155
0
    }
3156
0
    ext->value.nid = nid;
3157
3158
0
    switch (nid) {
3159
0
        case WC_NID_subject_key_identifier:
3160
0
        case WC_NID_authority_key_identifier:
3161
0
            if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
3162
0
                    != WOLFSSL_SUCCESS) {
3163
0
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
3164
0
                goto err_cleanup;
3165
0
            }
3166
0
            ext->value.type = CTC_UTF8;
3167
0
            break;
3168
0
        case WC_NID_subject_alt_name:
3169
0
        {
3170
0
            WOLFSSL_GENERAL_NAMES* gns;
3171
0
            WOLFSSL_GENERAL_NAME* gn;
3172
3173
0
            if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
3174
0
                    != WOLFSSL_SUCCESS) {
3175
0
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
3176
0
                goto err_cleanup;
3177
0
            }
3178
0
            ext->value.type = ASN_DNS_TYPE;
3179
3180
            /* add stack of general names */
3181
0
            gns = wolfSSL_sk_new_null();
3182
0
            if (gns == NULL) {
3183
0
                WOLFSSL_MSG("wolfSSL_sk_new_null error");
3184
0
                goto err_cleanup;
3185
0
            }
3186
0
            ext->ext_sk = gns; /* wolfSSL_X509_EXTENSION_free will handle
3187
                                * free'ing gns */
3188
0
            gns->type = STACK_TYPE_GEN_NAME;
3189
0
            gn = wolfSSL_GENERAL_NAME_new();
3190
0
            if (gn == NULL) {
3191
0
                WOLFSSL_MSG("wolfSSL_GENERAL_NAME_new error");
3192
0
                goto err_cleanup;
3193
0
            }
3194
0
            if (wolfSSL_sk_GENERAL_NAME_push(gns, gn) <= 0) {
3195
0
                WOLFSSL_MSG("wolfSSL_sk_GENERAL_NAME_push error");
3196
0
                wolfSSL_GENERAL_NAME_free(gn);
3197
0
                goto err_cleanup;
3198
0
            }
3199
0
            if (wolfSSL_ASN1_STRING_set(gn->d.ia5, value, -1)
3200
0
                    != WOLFSSL_SUCCESS) {
3201
0
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set failed");
3202
0
                goto err_cleanup;
3203
0
            }
3204
0
            gn->type = ASN_DNS_TYPE;
3205
0
            break;
3206
0
        }
3207
0
        case WC_NID_key_usage:
3208
0
            if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
3209
0
                    != WOLFSSL_SUCCESS) {
3210
0
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
3211
0
                goto err_cleanup;
3212
0
            }
3213
0
            ext->value.type = KEY_USAGE_OID;
3214
0
            break;
3215
0
        case WC_NID_ext_key_usage:
3216
0
            if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
3217
0
                    != WOLFSSL_SUCCESS) {
3218
0
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
3219
0
                goto err_cleanup;
3220
0
            }
3221
0
            ext->value.type = EXT_KEY_USAGE_OID;
3222
0
            break;
3223
0
        default:
3224
0
            WOLFSSL_MSG("invalid or unsupported NID");
3225
0
            goto err_cleanup;
3226
0
    }
3227
0
    return ext;
3228
0
err_cleanup:
3229
0
    wolfSSL_X509_EXTENSION_free(ext);
3230
0
    return NULL;
3231
0
}
3232
3233
/**
3234
 * Create a WOLFSSL_X509_EXTENSION from the input arguments.
3235
 * @param conf  Not used
3236
 * @param ctx   Not used
3237
 * @param nid   Interprets the value parameter as the x509 extension that
3238
 *              corresponds to this NID.
3239
 * @param value A NULL terminated string that is taken as the value of the
3240
 *              newly created extension object.
3241
 * @return WOLFSSL_X509_EXTENSION* on success or NULL on failure.
3242
 */
3243
WOLFSSL_X509_EXTENSION* wolfSSL_X509V3_EXT_nconf_nid(WOLFSSL_CONF* conf,
3244
        WOLFSSL_X509V3_CTX *ctx, int nid, const char *value)
3245
0
{
3246
0
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_nconf_nid");
3247
3248
0
    if (value == NULL) {
3249
0
        WOLFSSL_MSG("value NULL parameter");
3250
0
        return NULL;
3251
0
    }
3252
3253
0
    if (conf != NULL || ctx != NULL) {
3254
0
        WOLFSSL_MSG("wolfSSL_X509V3_EXT_nconf_nid does not handle either "
3255
0
                    "conf or ctx parameters");
3256
0
    }
3257
3258
0
    return createExtFromStr(nid, value);
3259
0
}
3260
3261
/**
3262
 * Create a WOLFSSL_X509_EXTENSION from the input arguments.
3263
 * @param conf  Not used
3264
 * @param ctx   Not used
3265
 * @param sName The textual representation of the NID that the value parameter
3266
 *              should be interpreted as.
3267
 * @param value A NULL terminated string that is taken as the value of the
3268
 *              newly created extension object.
3269
 * @return WOLFSSL_X509_EXTENSION* on success or NULL on failure.
3270
 */
3271
WOLFSSL_X509_EXTENSION* wolfSSL_X509V3_EXT_nconf(WOLFSSL_CONF *conf,
3272
        WOLFSSL_X509V3_CTX *ctx, const char *sName, const char *value)
3273
0
{
3274
0
    const WOLFSSL_ObjectInfo* info = wolfssl_object_info;
3275
0
    size_t i;
3276
3277
0
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_nconf");
3278
3279
0
    if (value == NULL) {
3280
0
        WOLFSSL_MSG("value NULL parameter");
3281
0
        return NULL;
3282
0
    }
3283
3284
0
    if (conf != NULL || ctx != NULL) {
3285
0
        WOLFSSL_MSG("wolfSSL_X509V3_EXT_nconf does not handle either "
3286
0
                    "conf or ctx parameters");
3287
0
    }
3288
3289
0
    for (i = 0; i < wolfssl_object_info_sz; i++, info++) {
3290
0
        if (XSTRCMP(info->sName, sName) == 0)
3291
0
            return createExtFromStr(info->nid, value);
3292
0
    }
3293
3294
0
    WOLFSSL_MSG("value didn't match any known NID");
3295
0
    return NULL;
3296
0
}
3297
3298
static void wolfSSL_X509V3_EXT_METHOD_populate(WOLFSSL_v3_ext_method *method,
3299
                                               int nid)
3300
0
{
3301
0
    if (!method)
3302
0
        return;
3303
3304
0
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_METHOD_populate");
3305
0
    switch (nid) {
3306
0
    case WC_NID_subject_key_identifier:
3307
0
        method->i2s = (WOLFSSL_X509V3_EXT_I2S)wolfSSL_i2s_ASN1_STRING;
3308
0
        FALL_THROUGH;
3309
0
    case WC_NID_authority_key_identifier:
3310
0
    case WC_NID_key_usage:
3311
0
    case WC_NID_certificate_policies:
3312
0
    case WC_NID_policy_mappings:
3313
0
    case WC_NID_subject_alt_name:
3314
0
    case WC_NID_issuer_alt_name:
3315
0
    case WC_NID_basic_constraints:
3316
0
    case WC_NID_name_constraints:
3317
0
    case WC_NID_policy_constraints:
3318
0
    case WC_NID_ext_key_usage:
3319
0
    case WC_NID_crl_distribution_points:
3320
0
    case WC_NID_inhibit_any_policy:
3321
0
    case WC_NID_info_access:
3322
0
        WOLFSSL_MSG("Nothing to populate for current NID");
3323
0
        break;
3324
0
    default:
3325
0
        WOLFSSL_MSG("Unknown or unsupported NID");
3326
0
        break;
3327
0
    }
3328
3329
0
    return;
3330
0
}
3331
3332
/**
3333
 * @param nid One of the WC_NID_* constants defined in asn.h
3334
 * @param crit
3335
 * @param data This data is copied to the returned extension.
3336
 * @return
3337
 */
3338
WOLFSSL_X509_EXTENSION *wolfSSL_X509V3_EXT_i2d(int nid, int crit,
3339
                                               void *data)
3340
0
{
3341
0
    WOLFSSL_X509_EXTENSION *ext = NULL;
3342
0
    WOLFSSL_ASN1_STRING* asn1str = NULL;
3343
3344
0
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_i2d");
3345
3346
0
    if (!data) {
3347
0
        return NULL;
3348
0
    }
3349
3350
0
    if (!(ext = wolfSSL_X509_EXTENSION_new())) {
3351
0
        return NULL;
3352
0
    }
3353
3354
0
    wolfSSL_X509V3_EXT_METHOD_populate(&ext->ext_method, nid);
3355
3356
0
    switch (nid) {
3357
0
    case WC_NID_subject_key_identifier:
3358
        /* WOLFSSL_ASN1_STRING */
3359
0
    case WC_NID_key_usage:
3360
        /* WOLFSSL_ASN1_STRING */
3361
0
    {
3362
0
        asn1str = (WOLFSSL_ASN1_STRING*)data;
3363
0
        ext->value = *asn1str;
3364
0
        if (asn1str->isDynamic) {
3365
0
            ext->value.data = (char*)XMALLOC(asn1str->length, NULL,
3366
0
                                             DYNAMIC_TYPE_OPENSSL);
3367
0
            if (!ext->value.data) {
3368
0
                WOLFSSL_MSG("malloc failed");
3369
                /* Zero so that no existing memory is freed */
3370
0
                XMEMSET(&ext->value, 0, sizeof(WOLFSSL_ASN1_STRING));
3371
0
                goto err_cleanup;
3372
0
            }
3373
0
            XMEMCPY(ext->value.data, asn1str->data, asn1str->length);
3374
0
        }
3375
0
        else {
3376
0
            ext->value.data = ext->value.strData;
3377
0
        }
3378
3379
0
        if (!(ext->obj = wolfSSL_OBJ_nid2obj(nid))) {
3380
0
            WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
3381
0
            goto err_cleanup;
3382
0
        }
3383
3384
0
        break;
3385
0
    }
3386
0
    case WC_NID_subject_alt_name:
3387
        /* typedef STACK_OF(GENERAL_NAME) GENERAL_NAMES */
3388
0
    case WC_NID_issuer_alt_name:
3389
        /* typedef STACK_OF(GENERAL_NAME) GENERAL_NAMES */
3390
0
    case WC_NID_ext_key_usage:
3391
        /* typedef STACK_OF(ASN1_OBJECT) EXTENDED_KEY_USAGE */
3392
0
    case WC_NID_info_access:
3393
        /* typedef STACK_OF(ACCESS_DESCRIPTION) AUTHORITY_INFO_ACCESS */
3394
0
    {
3395
0
        WOLFSSL_STACK* sk = (WOLFSSL_STACK*)data;
3396
3397
0
        if (ext->ext_sk) {
3398
0
            wolfSSL_sk_pop_free(ext->ext_sk, NULL);
3399
0
        }
3400
3401
0
        if (!(ext->ext_sk = wolfSSL_sk_dup(sk))) {
3402
0
            WOLFSSL_MSG("wolfSSL_sk_dup failed");
3403
0
            goto err_cleanup;
3404
0
        }
3405
3406
0
        if (!(ext->obj = wolfSSL_OBJ_nid2obj(nid))) {
3407
0
            WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
3408
0
            goto err_cleanup;
3409
0
        }
3410
3411
0
        break;
3412
0
    }
3413
0
    case WC_NID_basic_constraints:
3414
0
    {
3415
        /* WOLFSSL_BASIC_CONSTRAINTS */
3416
0
        WOLFSSL_BASIC_CONSTRAINTS* bc = (WOLFSSL_BASIC_CONSTRAINTS*)data;
3417
3418
0
        if (!(ext->obj = wolfSSL_ASN1_OBJECT_new())) {
3419
0
            WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
3420
0
            goto err_cleanup;
3421
0
        }
3422
3423
0
        ext->obj->ca = bc->ca;
3424
0
        if (bc->pathlen) {
3425
0
            ext->obj->pathlen = wolfSSL_ASN1_INTEGER_dup(bc->pathlen);
3426
0
            if (!ext->obj->pathlen) {
3427
0
                WOLFSSL_MSG("wolfSSL_ASN1_INTEGER_dup failed");
3428
0
                goto err_cleanup;
3429
0
            }
3430
0
        }
3431
0
        break;
3432
0
    }
3433
0
    case WC_NID_authority_key_identifier:
3434
0
    {
3435
        /* AUTHORITY_KEYID */
3436
0
        WOLFSSL_AUTHORITY_KEYID* akey = (WOLFSSL_AUTHORITY_KEYID*)data;
3437
3438
0
        if (akey->keyid) {
3439
0
            if (wolfSSL_ASN1_STRING_set(&ext->value, akey->keyid->data,
3440
0
                                    akey->keyid->length) != WOLFSSL_SUCCESS) {
3441
0
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set failed");
3442
0
                goto err_cleanup;
3443
0
            }
3444
0
            ext->value.type = akey->keyid->type;
3445
3446
0
            if (!(ext->obj = wolfSSL_OBJ_nid2obj(nid))) {
3447
0
                WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
3448
0
                goto err_cleanup;
3449
0
            }
3450
3451
0
        }
3452
0
        else if (akey->issuer) {
3453
0
            ext->obj = wolfSSL_ASN1_OBJECT_dup(akey->issuer);
3454
0
            if (!ext->obj) {
3455
0
                WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_dup failed");
3456
0
                goto err_cleanup;
3457
0
            }
3458
0
        }
3459
0
        else {
3460
0
            WOLFSSL_MSG("WC_NID_authority_key_identifier empty data");
3461
0
            goto err_cleanup;
3462
0
        }
3463
0
        break;
3464
0
    }
3465
0
    case WC_NID_inhibit_any_policy:
3466
        /* ASN1_INTEGER */
3467
0
    case WC_NID_certificate_policies:
3468
        /* STACK_OF(POLICYINFO) */
3469
0
    case WC_NID_policy_mappings:
3470
        /* STACK_OF(POLICY_MAPPING) */
3471
0
    case WC_NID_name_constraints:
3472
        /* NAME_CONSTRAINTS */
3473
0
    case WC_NID_policy_constraints:
3474
        /* POLICY_CONSTRAINTS */
3475
0
    case WC_NID_crl_distribution_points:
3476
        /* typedef STACK_OF(DIST_POINT) CRL_DIST_POINTS */
3477
0
    default:
3478
0
        WOLFSSL_MSG("Unknown or unsupported NID");
3479
0
        break;
3480
0
    }
3481
3482
0
    ext->crit = crit;
3483
3484
0
    return ext;
3485
0
err_cleanup:
3486
0
    if (ext) {
3487
0
        wolfSSL_X509_EXTENSION_free(ext);
3488
0
    }
3489
0
    return NULL;
3490
0
}
3491
3492
/* Returns pointer to ASN1_OBJECT from an X509_EXTENSION object */
3493
WOLFSSL_ASN1_OBJECT* wolfSSL_X509_EXTENSION_get_object(
3494
    WOLFSSL_X509_EXTENSION* ext)
3495
0
{
3496
0
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_get_object");
3497
0
    if (ext == NULL)
3498
0
        return NULL;
3499
0
    return ext->obj;
3500
0
}
3501
3502
3503
/**
3504
 * duplicates the 'obj' input and sets it into the 'ext' structure
3505
 * returns WOLFSSL_SUCCESS on success
3506
 */
3507
int wolfSSL_X509_EXTENSION_set_object(WOLFSSL_X509_EXTENSION* ext,
3508
        const WOLFSSL_ASN1_OBJECT* obj)
3509
0
{
3510
0
    WOLFSSL_ASN1_OBJECT *current;
3511
3512
0
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_set_object");
3513
0
    if (ext == NULL)
3514
0
        return WOLFSSL_FAILURE;
3515
3516
0
    current = wolfSSL_X509_EXTENSION_get_object(ext);
3517
0
    if (current != NULL) {
3518
0
        wolfSSL_ASN1_OBJECT_free(current);
3519
0
    }
3520
0
    ext->obj = wolfSSL_ASN1_OBJECT_dup((WOLFSSL_ASN1_OBJECT*)obj);
3521
0
    return WOLFSSL_SUCCESS;
3522
0
}
3523
#endif /* OPENSSL_ALL */
3524
3525
#ifdef WOLFSSL_OLD_EXTDATA_FMT
3526
/*
3527
 * Replace the current string in 'asn1str', which is the full X.509
3528
 * extension octet string with some data specific for the extension
3529
 * type. The extension is the one given in 'oid'.
3530
 * Return 0 in case of success, or a negative error code.
3531
 */
3532
static int wolfSSL_ASN1_STRING_into_old_ext_fmt(WOLFSSL_ASN1_STRING *asn1str,
3533
                                                word32 oid)
3534
{
3535
    switch (oid)
3536
    {
3537
        case AUTH_INFO_OID:
3538
            wolfSSL_ASN1_STRING_clear(asn1str);
3539
            asn1str->data = NULL;
3540
            asn1str->length = 0;
3541
            return 0;
3542
3543
        case AUTH_KEY_OID:
3544
        {
3545
            int ret = 0;
3546
            const byte *extAuthKeyId = NULL;
3547
            word32 extAuthKeyIdSz = 0;
3548
            char *data = NULL;
3549
3550
            ret = DecodeAuthKeyId((const byte *)asn1str->data, asn1str->length,
3551
                    &extAuthKeyId, &extAuthKeyIdSz, NULL, NULL, NULL, NULL);
3552
3553
            if (ret != 0)
3554
                return ret;
3555
3556
            data = (char*)XMALLOC((size_t)(extAuthKeyIdSz), NULL,
3557
                                  DYNAMIC_TYPE_OPENSSL);
3558
            if (data == NULL)
3559
                return MEMORY_ERROR;
3560
3561
            XMEMCPY(data, extAuthKeyId, (size_t)extAuthKeyIdSz);
3562
            wolfSSL_ASN1_STRING_set(asn1str, data, extAuthKeyIdSz);
3563
            XFREE(data, NULL, DYNAMIC_TYPE_OPENSSL);
3564
            return 0;
3565
        }
3566
3567
        case SUBJ_KEY_OID:
3568
        {
3569
            int ret = 0;
3570
            const byte *extSubjKeyId = NULL;
3571
            word32 extSubjKeyIdSz = 0;
3572
            char *data = NULL;
3573
3574
            ret = DecodeSubjKeyId((const byte *)asn1str->data, asn1str->length,
3575
                    &extSubjKeyId, &extSubjKeyIdSz);
3576
            if (ret != 0)
3577
                return ret;
3578
3579
            data = (char*)XMALLOC((size_t)(extSubjKeyIdSz), NULL,
3580
                                  DYNAMIC_TYPE_OPENSSL);
3581
            if (data == NULL)
3582
                return MEMORY_ERROR;
3583
3584
            XMEMCPY(data, extSubjKeyId, (size_t)extSubjKeyIdSz);
3585
            wolfSSL_ASN1_STRING_set(asn1str, data, extSubjKeyIdSz);
3586
            XFREE(data, NULL, DYNAMIC_TYPE_OPENSSL);
3587
            return 0;
3588
        }
3589
3590
        case CERT_POLICY_OID:
3591
            wolfSSL_ASN1_STRING_clear(asn1str);
3592
            asn1str->data = NULL;
3593
            asn1str->length = 0;
3594
            return 0;
3595
3596
        case KEY_USAGE_OID:
3597
        {
3598
            int ret = 0;
3599
            word16 extKeyUsage = 0;
3600
3601
            ret = DecodeKeyUsage((const byte *)asn1str->data, asn1str->length,
3602
                    &extKeyUsage);
3603
            if (ret != 0)
3604
                return ret;
3605
3606
            wolfSSL_ASN1_STRING_set(asn1str, (byte*)&extKeyUsage,
3607
                                    sizeof(extKeyUsage));
3608
            return 0;
3609
        }
3610
3611
        case EXT_KEY_USAGE_OID:
3612
        {
3613
            int ret = 0;
3614
            const byte *extExtKeyUsageSrc = NULL;
3615
            word32 extExtKeyUsageSz = 0;
3616
            word32 extExtKeyUsageCount = 0;
3617
            byte extExtKeyUsage = 0;
3618
            byte extExtKeyUsageSsh = 0;
3619
            char *data = NULL;
3620
3621
            ret = DecodeExtKeyUsage((const byte*)asn1str->data, asn1str->length,
3622
                    &extExtKeyUsageSrc, &extExtKeyUsageSz, &extExtKeyUsageCount,
3623
                    &extExtKeyUsage, &extExtKeyUsageSsh);
3624
            if (ret != 0)
3625
                return ret;
3626
3627
            data = (char*)XMALLOC((size_t)(extExtKeyUsageSz), NULL,
3628
                                  DYNAMIC_TYPE_OPENSSL);
3629
            if (data == NULL)
3630
                return MEMORY_ERROR;
3631
3632
            XMEMCPY(data, extExtKeyUsageSrc, (size_t)extExtKeyUsageSz);
3633
            wolfSSL_ASN1_STRING_set(asn1str, data, extExtKeyUsageSz);
3634
            XFREE(data, NULL, DYNAMIC_TYPE_OPENSSL);
3635
            return 0;
3636
        }
3637
3638
        case CRL_DIST_OID:
3639
            wolfSSL_ASN1_STRING_clear(asn1str);
3640
            asn1str->data = NULL;
3641
            asn1str->length = 0;
3642
            return 0;
3643
3644
        default:
3645
            /* Do nothing, it is already set */
3646
            return 0;
3647
    }
3648
}
3649
#endif /* WOLFSSL_OLD_EXTDATA_FMT */
3650
3651
/* Returns pointer to ASN1_STRING in X509_EXTENSION object */
3652
WOLFSSL_ASN1_STRING* wolfSSL_X509_EXTENSION_get_data(
3653
    WOLFSSL_X509_EXTENSION* ext)
3654
0
{
3655
0
    WOLFSSL_ASN1_STRING *ret;
3656
3657
0
    ret =  wolfSSL_X509_EXTENSION_get_data_internal(ext);
3658
3659
#ifdef WOLFSSL_OLD_EXTDATA_FMT
3660
    if (ret)
3661
    {
3662
        int error;
3663
        error = wolfSSL_ASN1_STRING_into_old_ext_fmt (ret, ext->obj->type);
3664
        if (error != 0)
3665
        {
3666
            WOLFSSL_MSG("Error calling wolfSSL_ASN1_STRING_into_old_ext_fmt");
3667
            return NULL;
3668
        }
3669
    }
3670
#endif
3671
3672
0
    return ret;
3673
0
}
3674
3675
3676
/**
3677
 * Creates a duplicate of input 'data' and sets it into 'ext' structure
3678
 * returns WOLFSSL_SUCCESS on success
3679
 */
3680
int wolfSSL_X509_EXTENSION_set_data(WOLFSSL_X509_EXTENSION* ext,
3681
        WOLFSSL_ASN1_STRING* data)
3682
0
{
3683
0
    WOLFSSL_ASN1_STRING* current;
3684
3685
0
    if (ext == NULL || data == NULL)
3686
0
        return WOLFSSL_FAILURE;
3687
3688
0
    current = wolfSSL_X509_EXTENSION_get_data_internal(ext);
3689
0
    if (current->length > 0 && current->data != NULL && current->isDynamic) {
3690
0
        XFREE(current->data, NULL, DYNAMIC_TYPE_OPENSSL);
3691
0
    }
3692
3693
0
    return wolfSSL_ASN1_STRING_copy(&ext->value, data);
3694
0
}
3695
3696
#if !defined(NO_PWDBASED)
3697
int wolfSSL_X509_digest(const WOLFSSL_X509* x509, const WOLFSSL_EVP_MD* digest,
3698
        unsigned char* buf, unsigned int* len)
3699
0
{
3700
0
    int ret;
3701
3702
0
    WOLFSSL_ENTER("wolfSSL_X509_digest");
3703
3704
0
    if (x509 == NULL || digest == NULL) {
3705
0
        WOLFSSL_MSG("Null argument found");
3706
0
        return WOLFSSL_FAILURE;
3707
0
    }
3708
3709
0
    if (x509->derCert == NULL) {
3710
0
        WOLFSSL_MSG("No DER certificate stored in X509");
3711
0
        return WOLFSSL_FAILURE;
3712
0
    }
3713
3714
0
    ret = wolfSSL_EVP_Digest(x509->derCert->buffer, x509->derCert->length, buf,
3715
0
                              len, digest, NULL);
3716
0
    WOLFSSL_LEAVE("wolfSSL_X509_digest", ret);
3717
0
    return ret;
3718
0
}
3719
3720
int wolfSSL_X509_pubkey_digest(const WOLFSSL_X509 *x509,
3721
        const WOLFSSL_EVP_MD *digest, unsigned char* buf, unsigned int* len)
3722
0
{
3723
0
    int ret;
3724
3725
0
    WOLFSSL_ENTER("wolfSSL_X509_pubkey_digest");
3726
3727
0
    if (x509 == NULL || digest == NULL) {
3728
0
        WOLFSSL_MSG("Null argument found");
3729
0
        return WOLFSSL_FAILURE;
3730
0
    }
3731
3732
0
    if (x509->pubKey.buffer == NULL || x509->pubKey.length == 0) {
3733
0
        WOLFSSL_MSG("No DER public key stored in X509");
3734
0
        return WOLFSSL_FAILURE;
3735
0
    }
3736
3737
0
    ret = wolfSSL_EVP_Digest(x509->pubKey.buffer, x509->pubKey.length, buf,
3738
0
                              len, digest, NULL);
3739
0
    WOLFSSL_LEAVE("wolfSSL_X509_pubkey_digest", ret);
3740
0
    return ret;
3741
0
}
3742
#endif
3743
3744
#endif /* OPENSSL_EXTRA */
3745
3746
#ifdef OPENSSL_EXTRA
3747
3748
    #ifndef NO_WOLFSSL_STUB
3749
    const char* wolfSSL_X509_get_default_cert_file_env(void)
3750
0
    {
3751
0
        WOLFSSL_STUB("X509_get_default_cert_file_env");
3752
0
        return "";
3753
0
    }
3754
3755
    const char* wolfSSL_X509_get_default_cert_file(void)
3756
0
    {
3757
0
        WOLFSSL_STUB("X509_get_default_cert_file");
3758
0
        return "";
3759
0
    }
3760
3761
    const char* wolfSSL_X509_get_default_cert_dir_env(void)
3762
0
    {
3763
0
        WOLFSSL_STUB("X509_get_default_cert_dir_env");
3764
0
        return "";
3765
0
    }
3766
3767
    const char* wolfSSL_X509_get_default_cert_dir(void)
3768
0
    {
3769
0
        WOLFSSL_STUB("X509_get_default_cert_dir");
3770
0
        return "";
3771
0
    }
3772
    #endif
3773
3774
#endif /* OPENSSL_EXTRA */
3775
3776
#if defined(KEEP_PEER_CERT) || defined(SESSION_CERTS) || \
3777
    defined(KEEP_OUR_CERT) || \
3778
    defined(OPENSSL_EXTRA)  || defined(OPENSSL_EXTRA_X509_SMALL)
3779
3780
/* user externally called free X509, if dynamic go ahead with free, otherwise
3781
 * don't */
3782
static void ExternalFreeX509(WOLFSSL_X509* x509)
3783
71.7k
{
3784
71.7k
#if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
3785
71.7k
    int doFree = 0;
3786
71.7k
#endif
3787
3788
71.7k
    WOLFSSL_ENTER("ExternalFreeX509");
3789
71.7k
    if (x509) {
3790
#ifdef HAVE_EX_DATA_CLEANUP_HOOKS
3791
        wolfSSL_CRYPTO_cleanup_ex_data(&x509->ex_data);
3792
#endif
3793
0
        if (x509->dynamicMemory) {
3794
0
        #if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
3795
0
            int ret;
3796
0
            wolfSSL_RefDec(&x509->ref, &doFree, &ret);
3797
0
            if (ret != 0) {
3798
0
                WOLFSSL_MSG("Couldn't lock x509 mutex");
3799
0
            }
3800
0
            if (doFree)
3801
0
        #endif /* OPENSSL_EXTRA_X509_SMALL || OPENSSL_EXTRA */
3802
0
            {
3803
0
                FreeX509(x509);
3804
0
                XFREE(x509, x509->heap, DYNAMIC_TYPE_X509);
3805
0
            }
3806
0
        }
3807
0
        else {
3808
0
            WOLFSSL_MSG("free called on non dynamic object, not freeing");
3809
0
        }
3810
0
    }
3811
71.7k
}
3812
3813
/* Frees an external WOLFSSL_X509 structure */
3814
WOLFSSL_ABI
3815
void wolfSSL_X509_free(WOLFSSL_X509* x509)
3816
71.7k
{
3817
71.7k
    WOLFSSL_ENTER("wolfSSL_X509_free");
3818
71.7k
    ExternalFreeX509(x509);
3819
71.7k
}
3820
#endif
3821
3822
#if defined(KEEP_PEER_CERT) || defined(SESSION_CERTS) || \
3823
    defined(OPENSSL_EXTRA)  || defined(OPENSSL_EXTRA_X509_SMALL)
3824
3825
/* copy name into in buffer, at most sz bytes, if buffer is null will
3826
   malloc buffer, call responsible for freeing                     */
3827
WOLFSSL_ABI
3828
char* wolfSSL_X509_NAME_oneline(WOLFSSL_X509_NAME* name, char* in, int sz)
3829
0
{
3830
0
    int copySz;
3831
3832
0
    WOLFSSL_ENTER("wolfSSL_X509_NAME_oneline");
3833
3834
0
    if (name == NULL) {
3835
0
        WOLFSSL_MSG("WOLFSSL_X509_NAME pointer was NULL");
3836
0
        return NULL;
3837
0
    }
3838
3839
0
    if (name->sz == 0)
3840
0
        return in;
3841
3842
0
    if (!in) {
3843
    #ifdef WOLFSSL_STATIC_MEMORY
3844
        WOLFSSL_MSG("Using static memory -- please pass in a buffer");
3845
        return NULL;
3846
    #else
3847
0
        in = (char*)XMALLOC(name->sz, NULL, DYNAMIC_TYPE_OPENSSL);
3848
0
        if (!in)
3849
0
            return in;
3850
0
        copySz = name->sz;
3851
0
    #endif
3852
0
    }
3853
0
    else {
3854
0
        copySz = (int)min((word32)sz, (word32)name->sz);
3855
0
        if (copySz <= 0)
3856
0
            return in;
3857
0
    }
3858
3859
0
    XMEMCPY(in, name->name, copySz - 1);
3860
0
    in[copySz - 1] = 0;
3861
3862
0
    return in;
3863
0
}
3864
3865
#ifdef OPENSSL_EXTRA
3866
/* Given an X509_NAME, convert it to canonical form and then hash
3867
 * with the provided hash type. Returns the first 4 bytes of the hash
3868
 * as unsigned long on success, and 0 otherwise. */
3869
static unsigned long X509NameHash(WOLFSSL_X509_NAME* name,
3870
    enum wc_HashType hashType)
3871
0
{
3872
0
    unsigned long  hash = 0;
3873
0
    unsigned char* canonName = NULL;
3874
0
    byte           digest[WC_MAX_DIGEST_SIZE];
3875
0
    int            size = 0;
3876
0
    int            rc;
3877
3878
0
    WOLFSSL_ENTER("X509NameHash");
3879
3880
0
    if (name == NULL) {
3881
0
        WOLFSSL_ERROR_MSG("WOLFSSL_X509_NAME pointer was NULL");
3882
0
        return 0;
3883
0
    }
3884
3885
0
    if (name->sz == 0) {
3886
0
        WOLFSSL_ERROR_MSG("Nothing to hash in WOLFSSL_X509_NAME");
3887
0
        return 0;
3888
0
    }
3889
3890
0
    size = wolfSSL_i2d_X509_NAME_canon(name, &canonName);
3891
3892
0
    if (size <= 0 || canonName == NULL) {
3893
0
        WOLFSSL_ERROR_MSG("wolfSSL_i2d_X509_NAME_canon error");
3894
0
        return 0;
3895
0
    }
3896
3897
0
    rc = wc_Hash(hashType, (const byte*)canonName, (word32)size, digest,
3898
0
        sizeof(digest));
3899
3900
0
    if (rc == 0) {
3901
0
        hash = (((unsigned long)digest[3] << 24) |
3902
0
                ((unsigned long)digest[2] << 16) |
3903
0
                ((unsigned long)digest[1] <<  8) |
3904
0
                ((unsigned long)digest[0]));
3905
0
    }
3906
0
    else if (rc == WC_NO_ERR_TRACE(HASH_TYPE_E)) {
3907
0
        WOLFSSL_ERROR_MSG("Hash function not compiled in");
3908
0
    }
3909
0
    else {
3910
0
        WOLFSSL_ERROR_MSG("Error hashing name");
3911
0
    }
3912
3913
0
    XFREE(canonName, NULL, DYNAMIC_TYPE_OPENSSL);
3914
0
    return hash;
3915
0
}
3916
3917
unsigned long wolfSSL_X509_NAME_hash(WOLFSSL_X509_NAME* name)
3918
0
{
3919
0
    return X509NameHash(name, WC_HASH_TYPE_SHA);
3920
0
}
3921
3922
/******************************************************************************
3923
* wolfSSL_X509_subject_name_hash
3924
* wolfSSL_X509_issuer_name_hash
3925
* Compute the hash digest of the subject / issuer name.
3926
* These functions prefer SHA-1 (if available) for compatibility. Otherwise
3927
* they use SHA-256.
3928
*
3929
* RETURNS:
3930
* The first 4 bytes of SHA-1 (or SHA-256) hash in little endian order as
3931
* unsigned long.
3932
* Otherwise, returns zero.
3933
*
3934
* Note:
3935
* Returns the same hash value as OpenSSL's X509_X_name_hash() API
3936
* if SHA-1 support is compiled in. SHA-256 will be used if SHA-1 is
3937
* not available.
3938
*/
3939
unsigned long wolfSSL_X509_subject_name_hash(const WOLFSSL_X509* x509)
3940
0
{
3941
0
    if (x509 == NULL) {
3942
0
        WOLFSSL_ERROR_MSG("WOLFSSL_X509 pointer was NULL");
3943
0
        return 0;
3944
0
    }
3945
3946
0
    #ifndef NO_SHA
3947
0
    return X509NameHash((WOLFSSL_X509_NAME*) &x509->subject, WC_HASH_TYPE_SHA);
3948
    #elif !defined(NO_SHA256)
3949
    return X509NameHash((WOLFSSL_X509_NAME*) &x509->subject,
3950
                        WC_HASH_TYPE_SHA256);
3951
    #else
3952
    WOLFSSL_ERROR_MSG("Hash function not compiled in");
3953
    return 0;
3954
    #endif
3955
0
}
3956
3957
unsigned long wolfSSL_X509_issuer_name_hash(const WOLFSSL_X509* x509)
3958
0
{
3959
0
    if (x509 == NULL) {
3960
0
        WOLFSSL_ERROR_MSG("WOLFSSL_X509 pointer was NULL");
3961
0
        return 0;
3962
0
    }
3963
3964
0
    #ifndef NO_SHA
3965
0
    return X509NameHash((WOLFSSL_X509_NAME*) &x509->issuer, WC_HASH_TYPE_SHA);
3966
    #elif !defined(NO_SHA256)
3967
    return X509NameHash((WOLFSSL_X509_NAME*) &x509->issuer,
3968
                        WC_HASH_TYPE_SHA256);
3969
    #else
3970
    WOLFSSL_ERROR_MSG("Hash function not compiled in");
3971
    return 0;
3972
    #endif
3973
0
}
3974
#endif /* OPENSSL_EXTRA */
3975
3976
#if defined(OPENSSL_EXTRA) && defined(XSNPRINTF)
3977
/* Copies X509 subject name into a buffer, with comma-separated name entries
3978
 *   (matching OpenSSL v1.0.0 format)
3979
 * Example Output for Issuer:
3980
 *
3981
 * C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting,
3982
 *  CN=www.wolfssl.com, emailAddress=info@wolfssl.com
3983
 */
3984
char* wolfSSL_X509_get_name_oneline(WOLFSSL_X509_NAME* name, char* in, int sz)
3985
0
{
3986
0
    int count, i;
3987
0
    int totalLen = 0;
3988
0
    char tmpBuf[256];
3989
0
    WOLFSSL_ENTER("wolfSSL_X509_get_name_oneline");
3990
3991
0
    if (name == NULL) {
3992
0
        WOLFSSL_MSG("wolfSSL_X509_get_name_oneline failed");
3993
0
        return NULL;
3994
0
    }
3995
    #ifdef WOLFSSL_STATIC_MEMORY
3996
    if (!in) {
3997
        WOLFSSL_MSG("Using static memory -- please pass in a buffer");
3998
        return NULL;
3999
    }
4000
    #endif
4001
4002
    /* Loop through X509 name entries and copy new format to buffer */
4003
0
    count = wolfSSL_X509_NAME_entry_count(name);
4004
0
    for (i = 0; i < count; i++) {
4005
0
        WOLFSSL_X509_NAME_ENTRY* entry;
4006
0
        int nameSz;
4007
0
        int strSz;
4008
0
        int strLen;
4009
0
        char *str;
4010
0
        const int tmpBufSz = sizeof(tmpBuf);
4011
0
        char buf[80];
4012
0
        const char* sn;
4013
4014
        /* Get name entry and size */
4015
0
        entry = wolfSSL_X509_NAME_get_entry(name, i);
4016
0
        if (entry == NULL) {
4017
0
            WOLFSSL_MSG("wolfSSL_X509_NAME_get_entry failed");
4018
0
            return NULL;
4019
0
        }
4020
0
        nameSz = wolfSSL_X509_NAME_get_text_by_NID(name, entry->nid, buf,
4021
0
                                                                   sizeof(buf));
4022
0
        if (nameSz < 0) {
4023
0
            WOLFSSL_MSG("wolfSSL_X509_NAME_get_text_by_NID failed");
4024
0
            return NULL;
4025
0
        }
4026
4027
        /* Get short name */
4028
0
        sn = wolfSSL_OBJ_nid2sn(entry->nid);
4029
0
        if (sn == NULL) {
4030
0
            WOLFSSL_MSG("OBJ_nid2sn failed");
4031
0
            return NULL;
4032
0
        }
4033
4034
        /* Copy sn and name text to buffer
4035
         * Add extra strSz for '=', ',', ' ' and '\0' characters in XSNPRINTF.
4036
         */
4037
0
        if (i != count - 1) {
4038
0
            strSz = (int)XSTRLEN(sn) + nameSz + 4;
4039
0
            str = (char*)XMALLOC(strSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
4040
0
            if (str == NULL) {
4041
0
                WOLFSSL_MSG("Memory error");
4042
0
                return NULL;
4043
0
            }
4044
0
            strLen = XSNPRINTF(str, (size_t)strSz, "%s=%s, ", sn, buf);
4045
0
            if ((strLen  < 0) || (strLen  >= strSz)) {
4046
0
                WOLFSSL_MSG("buffer overrun");
4047
0
                XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
4048
0
                return NULL;
4049
0
            }
4050
0
        }
4051
0
        else {
4052
            /* Copy last name entry
4053
            * Add extra strSz for '=' and '\0' characters in XSNPRINTF.
4054
            */
4055
0
            strSz = (int)XSTRLEN(sn) + nameSz + 2;
4056
0
            str = (char*)XMALLOC(strSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
4057
0
            if (str == NULL) {
4058
0
                WOLFSSL_MSG("Memory error");
4059
0
                return NULL;
4060
0
            }
4061
0
            strLen = XSNPRINTF(str, (size_t)strSz, "%s=%s", sn, buf);
4062
0
            if ((strLen  < 0) || (strLen  >= strSz)) {
4063
0
                WOLFSSL_MSG("buffer overrun");
4064
0
                XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
4065
0
                return NULL;
4066
0
            }
4067
0
        }
4068
        /* Copy string to tmpBuf */
4069
0
        if (totalLen + strLen > tmpBufSz) {
4070
0
            WOLFSSL_MSG("buffer overrun");
4071
0
            XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
4072
0
            return NULL;
4073
0
        }
4074
0
        XMEMCPY(tmpBuf + totalLen, str, strLen);
4075
0
        totalLen += strLen;
4076
0
        XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
4077
0
    }
4078
4079
    /* Allocate space based on total string size if no buffer was provided */
4080
0
    if (!in) {
4081
0
        in = (char*)XMALLOC(totalLen+1, NULL, DYNAMIC_TYPE_OPENSSL);
4082
0
        if (in == NULL) {
4083
0
            WOLFSSL_MSG("Memory error");
4084
0
            return in;
4085
0
        }
4086
0
    }
4087
0
    else {
4088
0
        if (totalLen + 1 > sz) {
4089
0
            WOLFSSL_MSG("buffer overrun");
4090
0
            return NULL;
4091
0
        }
4092
0
    }
4093
4094
0
    XMEMCPY(in, tmpBuf, totalLen); /* cppcheck-suppress uninitvar */
4095
0
    in[totalLen] = '\0';
4096
4097
0
    return in;
4098
0
}
4099
#endif
4100
4101
4102
/* Wraps wolfSSL_X509_d2i
4103
 *
4104
 * returns a WOLFSSL_X509 structure pointer on success and NULL on fail
4105
 */
4106
WOLFSSL_X509* wolfSSL_d2i_X509(WOLFSSL_X509** x509, const unsigned char** in,
4107
        int len)
4108
0
{
4109
0
    WOLFSSL_X509* newX509 = NULL;
4110
0
    WOLFSSL_ENTER("wolfSSL_d2i_X509");
4111
4112
0
    if (in == NULL) {
4113
0
        WOLFSSL_MSG("NULL input for wolfSSL_d2i_X509");
4114
0
        return NULL;
4115
0
    }
4116
4117
0
    newX509 = wolfSSL_X509_d2i(x509, *in, len);
4118
0
    if (newX509 != NULL) {
4119
0
        *in += newX509->derCert->length;
4120
0
    }
4121
0
    return newX509;
4122
0
}
4123
4124
static WOLFSSL_X509* d2i_X509orX509REQ(WOLFSSL_X509** x509,
4125
                                  const byte* in, int len, int req, void* heap)
4126
0
{
4127
0
    WOLFSSL_X509 *newX509 = NULL;
4128
0
    int type = req ? CERTREQ_TYPE : CERT_TYPE;
4129
4130
0
    WOLFSSL_ENTER("wolfSSL_X509_d2i");
4131
4132
0
    if (in != NULL && len != 0
4133
0
    #ifndef WOLFSSL_CERT_REQ
4134
0
            && req == 0
4135
    #else
4136
            && (req == 0 || req == 1)
4137
    #endif
4138
0
            ) {
4139
0
        WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
4140
4141
0
        WC_ALLOC_VAR_EX(cert, DecodedCert, 1, NULL, DYNAMIC_TYPE_DCERT,
4142
0
            return NULL);
4143
4144
0
        InitDecodedCert(cert, (byte*)in, (word32)len, heap);
4145
    #ifdef WOLFSSL_CERT_REQ
4146
        cert->isCSR = (byte)req;
4147
    #endif
4148
0
        if (ParseCertRelative(cert, type, 0, NULL, NULL) == 0) {
4149
0
            newX509 = wolfSSL_X509_new_ex(heap);
4150
0
            if (newX509 != NULL) {
4151
0
                if (CopyDecodedToX509(newX509, cert) != 0) {
4152
0
                    wolfSSL_X509_free(newX509);
4153
0
                    newX509 = NULL;
4154
0
                }
4155
0
            }
4156
0
        }
4157
0
        FreeDecodedCert(cert);
4158
0
        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
4159
0
    }
4160
4161
0
    if (x509 != NULL)
4162
0
        *x509 = newX509;
4163
4164
0
    return newX509;
4165
0
}
4166
4167
int wolfSSL_X509_get_isCA(WOLFSSL_X509* x509)
4168
0
{
4169
0
    int isCA = 0;
4170
4171
0
    WOLFSSL_ENTER("wolfSSL_X509_get_isCA");
4172
4173
0
    if (x509 != NULL)
4174
0
        isCA = x509->isCa;
4175
4176
0
    WOLFSSL_LEAVE("wolfSSL_X509_get_isCA", isCA);
4177
4178
0
    return isCA;
4179
0
}
4180
4181
WOLFSSL_X509* wolfSSL_X509_d2i_ex(WOLFSSL_X509** x509, const byte* in, int len,
4182
    void* heap)
4183
0
{
4184
0
    return d2i_X509orX509REQ(x509, in, len, 0, heap);
4185
0
}
4186
4187
WOLFSSL_X509* wolfSSL_X509_d2i(WOLFSSL_X509** x509, const byte* in, int len)
4188
0
{
4189
0
    return wolfSSL_X509_d2i_ex(x509, in, len, NULL);
4190
0
}
4191
4192
#ifdef WOLFSSL_CERT_REQ
4193
WOLFSSL_X509* wolfSSL_X509_REQ_d2i(WOLFSSL_X509** x509,
4194
        const unsigned char* in, int len)
4195
{
4196
    return d2i_X509orX509REQ(x509, in, len, 1, NULL);
4197
}
4198
4199
WOLFSSL_X509* wolfSSL_d2i_X509_REQ_INFO(WOLFSSL_X509** req,
4200
        const unsigned char** in, int len)
4201
{
4202
    WOLFSSL_X509* ret = NULL;
4203
    WOLFSSL_ENTER("wolfSSL_d2i_X509_REQ_INFO");
4204
4205
    if (in == NULL) {
4206
        WOLFSSL_MSG("NULL input for wolfSSL_d2i_X509");
4207
        return NULL;
4208
    }
4209
4210
    ret = wolfSSL_X509_REQ_d2i(req, *in, len);
4211
    if (ret != NULL) {
4212
        *in += ret->derCert->length;
4213
    }
4214
    return ret;
4215
}
4216
#endif
4217
4218
#endif /* KEEP_PEER_CERT || SESSION_CERTS || OPENSSL_EXTRA ||
4219
          OPENSSL_EXTRA_X509_SMALL */
4220
4221
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
4222
/* returns the number of entries in the WOLFSSL_X509_NAME */
4223
int wolfSSL_X509_NAME_entry_count(WOLFSSL_X509_NAME* name)
4224
0
{
4225
0
    int count = 0;
4226
4227
0
    WOLFSSL_ENTER("wolfSSL_X509_NAME_entry_count");
4228
4229
0
    if (name != NULL)
4230
0
        count = name->entrySz;
4231
4232
0
    WOLFSSL_LEAVE("wolfSSL_X509_NAME_entry_count", count);
4233
0
    return count;
4234
0
}
4235
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
4236
4237
#if defined(OPENSSL_EXTRA) || \
4238
    defined(KEEP_OUR_CERT) || defined(KEEP_PEER_CERT)
4239
4240
/* return the next, if any, altname from the peer cert */
4241
WOLFSSL_ABI
4242
char* wolfSSL_X509_get_next_altname(WOLFSSL_X509* cert)
4243
0
{
4244
0
    char* ret = NULL;
4245
0
    WOLFSSL_ENTER("wolfSSL_X509_get_next_altname");
4246
4247
    /* don't have any to work with */
4248
0
    if (cert == NULL || cert->altNames == NULL)
4249
0
        return NULL;
4250
4251
    /* already went through them */
4252
0
    if (cert->altNamesNext == NULL) {
4253
#ifdef WOLFSSL_MULTICIRCULATE_ALTNAMELIST
4254
        /* Reset altNames List to head
4255
         * so that caller can circulate the list again
4256
         */
4257
        cert->altNamesNext = cert->altNames;
4258
#endif
4259
0
        return NULL;
4260
0
    }
4261
4262
0
    ret = cert->altNamesNext->name;
4263
0
#ifdef WOLFSSL_IP_ALT_NAME
4264
    /* return the IP address as a string */
4265
0
    if (cert->altNamesNext->type == ASN_IP_TYPE) {
4266
0
        ret = cert->altNamesNext->ipString;
4267
0
    }
4268
0
#endif
4269
0
    cert->altNamesNext = cert->altNamesNext->next;
4270
4271
0
    return ret;
4272
0
}
4273
4274
int wolfSSL_X509_get_signature(WOLFSSL_X509* x509,
4275
                                                unsigned char* buf, int* bufSz)
4276
0
{
4277
0
    WOLFSSL_ENTER("wolfSSL_X509_get_signature");
4278
0
    if (x509 == NULL || bufSz == NULL || (*bufSz < (int)x509->sig.length &&
4279
0
                buf != NULL))
4280
0
        return WOLFSSL_FATAL_ERROR;
4281
4282
0
    if (buf != NULL)
4283
0
        XMEMCPY(buf, x509->sig.buffer, x509->sig.length);
4284
0
    *bufSz = (int)x509->sig.length;
4285
4286
0
    return WOLFSSL_SUCCESS;
4287
0
}
4288
4289
4290
/* Getter function that copies over the DER public key buffer to "buf" and
4291
    * sets the size in bufSz. If "buf" is NULL then just bufSz is set to needed
4292
    * buffer size. "bufSz" passed in should initially be set by the user to be
4293
    * the size of "buf". This gets checked to make sure the buffer is large
4294
    * enough to hold the public key.
4295
    *
4296
    * Note: this is the X.509 form of key with "header" info.
4297
    * return WOLFSSL_SUCCESS on success
4298
    */
4299
int wolfSSL_X509_get_pubkey_buffer(WOLFSSL_X509* x509,
4300
                                            unsigned char* buf, int* bufSz)
4301
0
{
4302
0
    WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
4303
0
    const byte*  der;
4304
0
    int length = 0;
4305
0
    int    ret = 0, derSz = 0;
4306
0
    int badDate = 0;
4307
0
    const byte* pubKeyX509 = NULL;
4308
0
    int   pubKeyX509Sz = 0;
4309
4310
0
    WOLFSSL_ENTER("wolfSSL_X509_get_pubkey_buffer");
4311
0
    if (x509 == NULL || bufSz == NULL) {
4312
0
        WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", BAD_FUNC_ARG);
4313
0
        return WOLFSSL_FATAL_ERROR;
4314
0
    }
4315
4316
4317
0
#ifdef WOLFSSL_SMALL_STACK
4318
0
    cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert),
4319
0
                                    x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
4320
0
    if (cert == NULL) {
4321
0
        WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", MEMORY_E);
4322
0
        return WOLFSSL_FATAL_ERROR;
4323
0
    }
4324
0
#endif
4325
4326
0
    der = wolfSSL_X509_get_der(x509, &derSz);
4327
0
    if (der != NULL) {
4328
0
        InitDecodedCert(cert, der, (word32)derSz, NULL);
4329
0
        ret = wc_GetPubX509(cert, 0, &badDate);
4330
0
        if (ret >= 0) {
4331
0
            word32 idx = cert->srcIdx;
4332
0
            pubKeyX509 = cert->source + cert->srcIdx;
4333
0
            ret = GetSequence(cert->source, &cert->srcIdx, &length,
4334
0
                    cert->maxIdx);
4335
0
            pubKeyX509Sz = length + (cert->srcIdx - idx);
4336
0
        }
4337
0
        FreeDecodedCert(cert);
4338
0
    }
4339
0
    WC_FREE_VAR_EX(cert, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
4340
4341
0
    if (ret < 0) {
4342
0
        WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", ret);
4343
0
        return WOLFSSL_FATAL_ERROR;
4344
0
    }
4345
4346
0
    if (buf != NULL && pubKeyX509 != NULL) {
4347
0
        if (pubKeyX509Sz > *bufSz) {
4348
0
            WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", BUFFER_E);
4349
0
            return WOLFSSL_FATAL_ERROR;
4350
0
        }
4351
0
        XMEMCPY(buf, pubKeyX509, pubKeyX509Sz);
4352
0
    }
4353
0
    *bufSz = pubKeyX509Sz;
4354
4355
0
    return WOLFSSL_SUCCESS;
4356
0
}
4357
4358
4359
/* Getter function for the public key OID value
4360
    * return public key OID stored in WOLFSSL_X509 structure */
4361
int wolfSSL_X509_get_pubkey_type(WOLFSSL_X509* x509)
4362
0
{
4363
0
    if (x509 == NULL)
4364
0
        return WOLFSSL_FAILURE;
4365
0
    return x509->pubKeyOID;
4366
0
}
4367
4368
#endif /* OPENSSL_EXTRA || KEEP_OUR_CERT || KEEP_PEER_CERT || SESSION_CERTS */
4369
4370
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
4371
    defined(KEEP_OUR_CERT) || defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
4372
4373
/* write X509 serial number in unsigned binary to buffer
4374
    buffer needs to be at least EXTERNAL_SERIAL_SIZE (32) for all cases
4375
    return WOLFSSL_SUCCESS on success */
4376
int wolfSSL_X509_get_serial_number(WOLFSSL_X509* x509,
4377
                                    byte* in, int* inOutSz)
4378
0
{
4379
0
    WOLFSSL_ENTER("wolfSSL_X509_get_serial_number");
4380
0
    if (x509 == NULL || inOutSz == NULL) {
4381
0
        WOLFSSL_MSG("Null argument passed in");
4382
0
        return BAD_FUNC_ARG;
4383
0
    }
4384
4385
0
    if (in != NULL) {
4386
0
        if (*inOutSz < x509->serialSz) {
4387
0
            WOLFSSL_MSG("Serial buffer too small");
4388
0
            return BUFFER_E;
4389
0
        }
4390
0
        XMEMCPY(in, x509->serial, x509->serialSz);
4391
0
    }
4392
0
    *inOutSz = x509->serialSz;
4393
4394
0
    return WOLFSSL_SUCCESS;
4395
0
}
4396
4397
/* not an openssl compatibility function - getting for derCert */
4398
const byte* wolfSSL_X509_get_der(WOLFSSL_X509* x509, int* outSz)
4399
0
{
4400
0
    WOLFSSL_ENTER("wolfSSL_X509_get_der");
4401
4402
0
    if (x509 == NULL || x509->derCert == NULL || outSz == NULL)
4403
0
        return NULL;
4404
4405
0
    *outSz = (int)x509->derCert->length;
4406
0
    return x509->derCert->buffer;
4407
0
}
4408
4409
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL || KEEP_OUR_CERT ||
4410
        * KEEP_PEER_CERT || SESSION_CERTS */
4411
4412
#if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA) || \
4413
    defined(OPENSSL_ALL) || defined(KEEP_OUR_CERT) || \
4414
    defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
4415
4416
/* used by JSSE (not a standard compatibility function) */
4417
WOLFSSL_ABI
4418
const byte* wolfSSL_X509_notBefore(WOLFSSL_X509* x509)
4419
0
{
4420
0
    WOLFSSL_ENTER("wolfSSL_X509_notBefore");
4421
4422
0
    if (x509 == NULL)
4423
0
        return NULL;
4424
4425
0
    XMEMSET(x509->notBeforeData, 0, sizeof(x509->notBeforeData));
4426
0
    x509->notBeforeData[0] = (byte)x509->notBefore.type;
4427
0
    x509->notBeforeData[1] = (byte)x509->notBefore.length;
4428
0
    XMEMCPY(&x509->notBeforeData[2], x509->notBefore.data,
4429
0
        x509->notBefore.length);
4430
4431
0
    return x509->notBeforeData;
4432
0
}
4433
4434
/* used by JSSE (not a standard compatibility function) */
4435
WOLFSSL_ABI
4436
const byte* wolfSSL_X509_notAfter(WOLFSSL_X509* x509)
4437
0
{
4438
0
    WOLFSSL_ENTER("wolfSSL_X509_notAfter");
4439
4440
0
    if (x509 == NULL)
4441
0
        return NULL;
4442
4443
0
    XMEMSET(x509->notAfterData, 0, sizeof(x509->notAfterData));
4444
0
    x509->notAfterData[0] = (byte)x509->notAfter.type;
4445
0
    x509->notAfterData[1] = (byte)x509->notAfter.length;
4446
0
    XMEMCPY(&x509->notAfterData[2], x509->notAfter.data, x509->notAfter.length);
4447
4448
0
    return x509->notAfterData;
4449
0
}
4450
4451
int wolfSSL_X509_version(WOLFSSL_X509* x509)
4452
0
{
4453
0
    WOLFSSL_ENTER("wolfSSL_X509_version");
4454
4455
0
    if (x509 == NULL)
4456
0
        return 0;
4457
4458
0
    return x509->version;
4459
0
}
4460
#endif
4461
4462
#ifdef OPENSSL_EXTRA
4463
4464
/* get the buffer to be signed (tbs) from the WOLFSSL_X509 certificate
4465
    *
4466
    * outSz : gets set to the size of the buffer
4467
    * returns a pointer to the internal buffer at the location of TBS on
4468
    *         on success and NULL on failure.
4469
    */
4470
const unsigned char* wolfSSL_X509_get_tbs(WOLFSSL_X509* x509, int* outSz)
4471
0
{
4472
0
    int sz = 0, len;
4473
0
    unsigned int idx = 0, tmpIdx;
4474
0
    const unsigned char* der = NULL;
4475
0
    const unsigned char* tbs = NULL;
4476
4477
0
    if (x509 == NULL || outSz == NULL) {
4478
0
        return NULL;
4479
0
    }
4480
4481
0
    der = wolfSSL_X509_get_der(x509, &sz);
4482
0
    if (der == NULL) {
4483
0
        return NULL;
4484
0
    }
4485
4486
0
    if (GetSequence(der, &idx, &len, (word32)sz) < 0) {
4487
0
        return NULL;
4488
0
    }
4489
0
    tbs = der + idx;
4490
0
    tmpIdx = idx;
4491
0
    if (GetSequence(der, &idx, &len, (word32)sz) < 0) {
4492
0
        return NULL;
4493
0
    }
4494
0
    *outSz = len + (idx - tmpIdx);
4495
0
    return tbs;
4496
0
}
4497
4498
#ifdef WOLFSSL_SEP
4499
4500
/* copy oid into in buffer, at most *inOutSz bytes, if buffer is null will
4501
   malloc buffer, call responsible for freeing. Actual size returned in
4502
   *inOutSz. Requires inOutSz be non-null */
4503
byte* wolfSSL_X509_get_device_type(WOLFSSL_X509* x509, byte* in, int *inOutSz)
4504
0
{
4505
0
    int copySz;
4506
4507
0
    WOLFSSL_ENTER("wolfSSL_X509_get_dev_type");
4508
0
    if (x509 == NULL) return NULL;
4509
0
    if (inOutSz == NULL) return NULL;
4510
0
    if (!x509->deviceTypeSz) return in;
4511
4512
0
    copySz = min(*inOutSz, x509->deviceTypeSz);
4513
4514
0
    if (!in) {
4515
    #ifdef WOLFSSL_STATIC_MEMORY
4516
        WOLFSSL_MSG("Using static memory -- please pass in a buffer");
4517
        return NULL;
4518
    #else
4519
0
        in = (byte*)XMALLOC(x509->deviceTypeSz, 0, DYNAMIC_TYPE_OPENSSL);
4520
0
        if (!in) return in;
4521
0
        copySz = x509->deviceTypeSz;
4522
0
    #endif
4523
0
    }
4524
4525
0
    XMEMCPY(in, x509->deviceType, copySz);
4526
0
    *inOutSz = copySz;
4527
4528
0
    return in;
4529
0
}
4530
4531
4532
byte* wolfSSL_X509_get_hw_type(WOLFSSL_X509* x509, byte* in, int* inOutSz)
4533
0
{
4534
0
    int copySz;
4535
4536
0
    WOLFSSL_ENTER("wolfSSL_X509_get_hw_type");
4537
0
    if (x509 == NULL) return NULL;
4538
0
    if (inOutSz == NULL) return NULL;
4539
0
    if (!x509->hwTypeSz) return in;
4540
4541
0
    copySz = min(*inOutSz, x509->hwTypeSz);
4542
4543
0
    if (!in) {
4544
    #ifdef WOLFSSL_STATIC_MEMORY
4545
        WOLFSSL_MSG("Using static memory -- please pass in a buffer");
4546
        return NULL;
4547
    #else
4548
0
        in = (byte*)XMALLOC(x509->hwTypeSz, 0, DYNAMIC_TYPE_OPENSSL);
4549
0
        if (!in) return in;
4550
0
        copySz = x509->hwTypeSz;
4551
0
    #endif
4552
0
    }
4553
4554
0
    XMEMCPY(in, x509->hwType, copySz);
4555
0
    *inOutSz = copySz;
4556
4557
0
    return in;
4558
0
}
4559
4560
4561
byte* wolfSSL_X509_get_hw_serial_number(WOLFSSL_X509* x509,byte* in,
4562
                                        int* inOutSz)
4563
0
{
4564
0
    int copySz;
4565
4566
0
    WOLFSSL_ENTER("wolfSSL_X509_get_hw_serial_number");
4567
0
    if (x509 == NULL) return NULL;
4568
0
    if (inOutSz == NULL) return NULL;
4569
0
    if (!x509->hwTypeSz) return in;
4570
4571
0
    copySz = min(*inOutSz, x509->hwSerialNumSz);
4572
4573
0
    if (!in) {
4574
    #ifdef WOLFSSL_STATIC_MEMORY
4575
        WOLFSSL_MSG("Using static memory -- please pass in a buffer");
4576
        return NULL;
4577
    #else
4578
0
        in = (byte*)XMALLOC(x509->hwSerialNumSz, 0, DYNAMIC_TYPE_OPENSSL);
4579
0
        if (!in) return in;
4580
0
        copySz = x509->hwSerialNumSz;
4581
0
    #endif
4582
0
    }
4583
4584
0
    XMEMCPY(in, x509->hwSerialNum, copySz);
4585
0
    *inOutSz = copySz;
4586
4587
0
    return in;
4588
0
}
4589
4590
#endif /* WOLFSSL_SEP */
4591
#endif /* OPENSSL_EXTRA */
4592
4593
/* require OPENSSL_EXTRA since wolfSSL_X509_free is wrapped by OPENSSL_EXTRA */
4594
#if defined(OPENSSL_EXTRA)
4595
4596
WOLFSSL_ASN1_TIME* wolfSSL_X509_get_notBefore(const WOLFSSL_X509* x509)
4597
0
{
4598
0
    WOLFSSL_ENTER("wolfSSL_X509_get_notBefore");
4599
4600
0
    if (x509 == NULL)
4601
0
        return NULL;
4602
4603
0
    return (WOLFSSL_ASN1_TIME*)&x509->notBefore;
4604
0
}
4605
4606
4607
WOLFSSL_ASN1_TIME* wolfSSL_X509_get_notAfter(const WOLFSSL_X509* x509)
4608
0
{
4609
0
    WOLFSSL_ENTER("wolfSSL_X509_get_notAfter");
4610
4611
0
    if (x509 == NULL)
4612
0
        return NULL;
4613
4614
0
    return (WOLFSSL_ASN1_TIME*)&x509->notAfter;
4615
0
}
4616
4617
4618
/* return number of elements on success 0 on fail */
4619
int wolfSSL_sk_X509_push(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
4620
    WOLFSSL_X509* x509)
4621
0
{
4622
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_push");
4623
4624
0
    if (sk == NULL || x509 == NULL) {
4625
0
        return WOLFSSL_FAILURE;
4626
0
    }
4627
4628
0
    return wolfSSL_sk_push(sk, x509);
4629
0
}
4630
4631
4632
/* Return and remove the last x509 pushed on stack */
4633
WOLFSSL_X509* wolfSSL_sk_X509_pop(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
4634
0
{
4635
0
    return (WOLFSSL_X509*)wolfSSL_sk_pop(sk);
4636
0
}
4637
4638
/* Getter function for WOLFSSL_X509 pointer
4639
 *
4640
 * sk is the stack to retrieve pointer from
4641
 * i  is the index value in stack
4642
 *
4643
 * returns a pointer to a WOLFSSL_X509 structure on success and NULL on
4644
 *         fail
4645
 */
4646
WOLFSSL_X509* wolfSSL_sk_X509_value(WOLF_STACK_OF(WOLFSSL_X509)* sk, int i)
4647
0
{
4648
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_value");
4649
4650
0
    for (; sk != NULL && i > 0; i--)
4651
0
        sk = sk->next;
4652
4653
0
    if (i != 0 || sk == NULL)
4654
0
        return NULL;
4655
0
    return sk->data.x509;
4656
0
}
4657
4658
4659
/* Return and remove the first x509 pushed on stack */
4660
WOLFSSL_X509* wolfSSL_sk_X509_shift(WOLF_STACK_OF(WOLFSSL_X509)* sk)
4661
0
{
4662
0
    return (WOLFSSL_X509*)wolfSSL_sk_pop_node(sk, 0);
4663
0
}
4664
4665
#endif /* OPENSSL_EXTRA */
4666
4667
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
4668
/* Free's all nodes in X509 stack. This is different then wolfSSL_sk_X509_free
4669
 * in that it free's the underlying objects pushed to the stack.
4670
 *
4671
 * sk  stack to free nodes in
4672
 * f   X509 free function
4673
 */
4674
void wolfSSL_sk_X509_pop_free(WOLF_STACK_OF(WOLFSSL_X509)* sk,
4675
    void (*f) (WOLFSSL_X509*))
4676
266k
{
4677
266k
    WOLFSSL_ENTER("wolfSSL_sk_X509_pop_free");
4678
266k
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
4679
266k
}
4680
4681
4682
/* free just the stack structure */
4683
void wolfSSL_sk_X509_free(WOLF_STACK_OF(WOLFSSL_X509)* sk)
4684
0
{
4685
0
    wolfSSL_sk_free(sk);
4686
0
}
4687
4688
#ifdef HAVE_CRL
4689
WOLFSSL_STACK* wolfSSL_sk_X509_CRL_new(void)
4690
{
4691
    WOLFSSL_STACK* s = wolfSSL_sk_new_node(NULL);
4692
    if (s != NULL)
4693
        s->type = STACK_TYPE_X509_CRL;
4694
    return s;
4695
}
4696
4697
WOLFSSL_STACK* wolfSSL_sk_X509_CRL_new_null(void)
4698
{
4699
    WOLFSSL_STACK* s = wolfSSL_sk_new_null();
4700
    if (s != NULL)
4701
        s->type = STACK_TYPE_X509_CRL;
4702
    return s;
4703
}
4704
4705
void wolfSSL_sk_X509_CRL_pop_free(WOLF_STACK_OF(WOLFSSL_X509_CRL)* sk,
4706
    void (*f) (WOLFSSL_X509_CRL*))
4707
{
4708
    WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_pop_free");
4709
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
4710
}
4711
4712
void wolfSSL_sk_X509_CRL_free(WOLF_STACK_OF(WOLFSSL_X509_CRL)* sk)
4713
{
4714
    wolfSSL_sk_X509_CRL_pop_free(sk, NULL);
4715
}
4716
4717
/* return number of elements on success 0 on fail */
4718
int wolfSSL_sk_X509_CRL_push(WOLF_STACK_OF(WOLFSSL_X509_CRL)* sk,
4719
    WOLFSSL_X509_CRL* crl)
4720
{
4721
    WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_push");
4722
4723
    if (sk == NULL || crl == NULL) {
4724
        return WOLFSSL_FAILURE;
4725
    }
4726
4727
    return wolfSSL_sk_push(sk, crl);
4728
}
4729
4730
WOLFSSL_X509_CRL* wolfSSL_sk_X509_CRL_value(WOLF_STACK_OF(WOLFSSL_X509)* sk,
4731
                                            int i)
4732
{
4733
    WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_value");
4734
    if (sk)
4735
        return (WOLFSSL_X509_CRL*)wolfSSL_sk_value(sk, i);
4736
    return NULL;
4737
}
4738
4739
int wolfSSL_sk_X509_CRL_num(WOLF_STACK_OF(WOLFSSL_X509)* sk)
4740
{
4741
    WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_num");
4742
    if (sk)
4743
        return wolfSSL_sk_num(sk);
4744
    return 0;
4745
}
4746
#endif /* HAVE_CRL */
4747
4748
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
4749
4750
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_QT)
4751
/* return number of elements on success 0 on fail */
4752
int wolfSSL_sk_ACCESS_DESCRIPTION_push(WOLF_STACK_OF(ACCESS_DESCRIPTION)* sk,
4753
                                              WOLFSSL_ACCESS_DESCRIPTION* a)
4754
0
{
4755
0
    WOLFSSL_ENTER("wolfSSL_sk_ACCESS_DESCRIPTION_push");
4756
4757
0
    return wolfSSL_sk_push(sk, a);
4758
0
}
4759
4760
/* Frees all nodes in ACCESS_DESCRIPTION stack
4761
*
4762
* sk stack of nodes to free
4763
* f  free function to use
4764
*/
4765
void wolfSSL_sk_ACCESS_DESCRIPTION_pop_free(WOLFSSL_STACK* sk,
4766
    void (*f) (WOLFSSL_ACCESS_DESCRIPTION*))
4767
0
{
4768
0
   WOLFSSL_ENTER("wolfSSL_sk_ACCESS_DESCRIPTION_pop_free");
4769
0
   wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
4770
0
}
4771
4772
void wolfSSL_sk_ACCESS_DESCRIPTION_free(WOLFSSL_STACK* sk)
4773
0
{
4774
0
    wolfSSL_sk_free(sk);
4775
0
}
4776
4777
4778
/* AUTHORITY_INFO_ACCESS object is a stack of ACCESS_DESCRIPTION objects,
4779
 * to free the stack the WOLFSSL_ACCESS_DESCRIPTION stack free function is
4780
 * used */
4781
void wolfSSL_AUTHORITY_INFO_ACCESS_free(
4782
        WOLF_STACK_OF(WOLFSSL_ACCESS_DESCRIPTION)* sk)
4783
0
{
4784
0
    WOLFSSL_ENTER("wolfSSL_AUTHORITY_INFO_ACCESS_free");
4785
0
    wolfSSL_sk_ACCESS_DESCRIPTION_free(sk);
4786
0
}
4787
4788
void wolfSSL_AUTHORITY_INFO_ACCESS_pop_free(
4789
        WOLF_STACK_OF(WOLFSSL_ACCESS_DESCRIPTION)* sk,
4790
        void (*f) (WOLFSSL_ACCESS_DESCRIPTION*))
4791
0
{
4792
0
    WOLFSSL_ENTER("wolfSSL_AUTHORITY_INFO_ACCESS_free");
4793
0
    wolfSSL_sk_ACCESS_DESCRIPTION_pop_free(sk, f);
4794
0
}
4795
4796
4797
void wolfSSL_ACCESS_DESCRIPTION_free(WOLFSSL_ACCESS_DESCRIPTION* a)
4798
0
{
4799
0
    WOLFSSL_ENTER("wolfSSL_ACCESS_DESCRIPTION_free");
4800
0
    if (a == NULL)
4801
0
        return;
4802
4803
0
    if (a->method)
4804
0
        wolfSSL_ASN1_OBJECT_free(a->method);
4805
0
    if (a->location)
4806
0
        wolfSSL_GENERAL_NAME_free(a->location);
4807
0
    XFREE(a, NULL, DYNAMIC_TYPE_X509_EXT);
4808
4809
    /* a = NULL, don't try to a or double free it */
4810
0
}
4811
#endif /* OPENSSL_EXTRA || WOLFSSL_QT */
4812
4813
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
4814
4815
/* Creates and returns new GENERAL_NAME structure */
4816
WOLFSSL_GENERAL_NAME* wolfSSL_GENERAL_NAME_new(void)
4817
0
{
4818
0
    WOLFSSL_GENERAL_NAME* gn;
4819
0
    WOLFSSL_ENTER("GENERAL_NAME_new");
4820
4821
0
    gn = (WOLFSSL_GENERAL_NAME*)XMALLOC(sizeof(WOLFSSL_GENERAL_NAME), NULL,
4822
0
                                                             DYNAMIC_TYPE_ASN1);
4823
0
    if (gn == NULL) {
4824
0
        return NULL;
4825
0
    }
4826
0
    XMEMSET(gn, 0, sizeof(WOLFSSL_GENERAL_NAME));
4827
4828
0
    gn->d.ia5 = wolfSSL_ASN1_STRING_new();
4829
0
    if (gn->d.ia5 == NULL) {
4830
0
        WOLFSSL_MSG("Issue creating ASN1_STRING struct");
4831
0
        wolfSSL_GENERAL_NAME_free(gn);
4832
0
        return NULL;
4833
0
    }
4834
0
    gn->type = WOLFSSL_GEN_IA5;
4835
0
    return gn;
4836
0
}
4837
4838
WOLFSSL_GENERAL_NAME* wolfSSL_GENERAL_NAME_dup(WOLFSSL_GENERAL_NAME* gn)
4839
0
{
4840
0
    WOLFSSL_GENERAL_NAME* dupl = NULL;
4841
4842
0
    WOLFSSL_ENTER("wolfSSL_GENERAL_NAME_dup");
4843
4844
0
    if (!gn) {
4845
0
        WOLFSSL_MSG("Bad parameter");
4846
0
        return NULL;
4847
0
    }
4848
4849
0
    if (!(dupl = wolfSSL_GENERAL_NAME_new())) {
4850
0
        WOLFSSL_MSG("wolfSSL_GENERAL_NAME_new error");
4851
0
        return NULL;
4852
0
    }
4853
4854
0
    wolfSSL_ASN1_STRING_free(dupl->d.ia5);
4855
0
    dupl->d.ia5 = NULL;
4856
0
    switch (gn->type) {
4857
    /* WOLFSSL_ASN1_STRING types */
4858
0
    case WOLFSSL_GEN_DNS:
4859
0
        if (!(dupl->d.dNSName = wolfSSL_ASN1_STRING_dup(gn->d.dNSName))) {
4860
0
            WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
4861
0
            goto error;
4862
0
        }
4863
0
        break;
4864
0
    case WOLFSSL_GEN_IPADD:
4865
0
        if (!(dupl->d.iPAddress = wolfSSL_ASN1_STRING_dup(gn->d.iPAddress))) {
4866
0
            WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
4867
0
            goto error;
4868
0
        }
4869
0
        break;
4870
0
    case WOLFSSL_GEN_EMAIL:
4871
0
        if (!(dupl->d.rfc822Name = wolfSSL_ASN1_STRING_dup(gn->d.rfc822Name))) {
4872
0
            WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
4873
0
            goto error;
4874
0
        }
4875
0
        break;
4876
0
    case WOLFSSL_GEN_URI:
4877
0
        if (!(dupl->d.uniformResourceIdentifier =
4878
0
                wolfSSL_ASN1_STRING_dup(gn->d.uniformResourceIdentifier))) {
4879
0
            WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
4880
0
            goto error;
4881
0
        }
4882
0
        break;
4883
0
    case WOLFSSL_GEN_OTHERNAME:
4884
0
        if (gn->d.otherName->value->type != WOLFSSL_V_ASN1_UTF8STRING) {
4885
0
            WOLFSSL_MSG("Unsupported othername value type");
4886
0
            goto error;
4887
0
        }
4888
0
        dupl->d.otherName = (WOLFSSL_ASN1_OTHERNAME*)XMALLOC(
4889
0
            sizeof(WOLFSSL_ASN1_OTHERNAME), NULL, DYNAMIC_TYPE_ASN1);
4890
0
        if (dupl->d.otherName == NULL) {
4891
0
            WOLFSSL_MSG("XMALLOC error");
4892
0
            goto error;
4893
0
        }
4894
0
        dupl->d.otherName->type_id = wolfSSL_ASN1_OBJECT_dup(
4895
0
            gn->d.otherName->type_id);
4896
0
        dupl->d.otherName->value = (WOLFSSL_ASN1_TYPE*)XMALLOC(
4897
0
            sizeof(WOLFSSL_ASN1_TYPE), NULL, DYNAMIC_TYPE_ASN1);
4898
0
        if (dupl->d.otherName->value != NULL) {
4899
0
            dupl->d.otherName->value->type = gn->d.otherName->value->type;
4900
0
            dupl->d.otherName->value->value.utf8string =
4901
0
                wolfSSL_ASN1_STRING_dup(
4902
0
                                      gn->d.otherName->value->value.utf8string);
4903
0
        }
4904
0
        if ((dupl->d.otherName->type_id == NULL) ||
4905
0
            (dupl->d.otherName->value == NULL) ||
4906
0
            (dupl->d.otherName->value->value.utf8string == NULL)) {
4907
0
            wolfSSL_ASN1_OBJECT_free(dupl->d.otherName->type_id);
4908
0
            wolfSSL_ASN1_TYPE_free(dupl->d.otherName->value);
4909
0
            XFREE(dupl->d.otherName, NULL, DYNAMIC_TYPE_ASN1);
4910
0
            dupl->d.otherName = NULL;
4911
0
            WOLFSSL_MSG("error duping othername");
4912
0
            goto error;
4913
0
        }
4914
0
        break;
4915
0
    case WOLFSSL_GEN_X400:
4916
0
    case WOLFSSL_GEN_DIRNAME:
4917
0
    case WOLFSSL_GEN_EDIPARTY:
4918
0
    case WOLFSSL_GEN_RID:
4919
0
    default:
4920
0
        WOLFSSL_MSG("Unrecognized or unsupported GENERAL_NAME type");
4921
0
        goto error;
4922
0
    }
4923
0
    dupl->type = gn->type;
4924
4925
0
    return dupl;
4926
0
error:
4927
0
    wolfSSL_GENERAL_NAME_free(dupl);
4928
0
    return NULL;
4929
0
}
4930
4931
/* Set an Othername in a general name.
4932
 *
4933
 * @param [out] gen     Pointer to the GENERAL_NAME where the othername is set.
4934
 * @param [in]  oid     Object ID (ie UPN).
4935
 * @param [in]  name    The actual name.
4936
 * @return  WOLFSSL_FAILURE on invalid parameter or memory error,
4937
 *          WOLFSSL_SUCCESS otherwise.
4938
 */
4939
int wolfSSL_GENERAL_NAME_set0_othername(WOLFSSL_GENERAL_NAME* gen,
4940
                                        WOLFSSL_ASN1_OBJECT* oid,
4941
                                        WOLFSSL_ASN1_TYPE* value)
4942
0
{
4943
0
    WOLFSSL_ASN1_OBJECT *x = NULL;
4944
4945
0
    if ((gen == NULL) || (oid == NULL) || (value == NULL)) {
4946
0
        return WOLFSSL_FAILURE;
4947
0
    }
4948
4949
0
    x = wolfSSL_ASN1_OBJECT_dup(oid);
4950
0
    if (x == NULL) {
4951
0
        WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_dup() failed");
4952
0
        return WOLFSSL_FAILURE;
4953
0
    }
4954
4955
0
    if (wolfSSL_GENERAL_NAME_set_type(gen, WOLFSSL_GEN_OTHERNAME)
4956
0
            != WOLFSSL_SUCCESS) {
4957
0
        wolfSSL_ASN1_OBJECT_free(x);
4958
0
        return WOLFSSL_FAILURE;
4959
0
    }
4960
4961
0
    gen->d.otherName->type_id = x;
4962
0
    gen->d.otherName->value = value;
4963
0
    return WOLFSSL_SUCCESS;
4964
0
}
4965
4966
/* return number of elements on success 0 on fail */
4967
int wolfSSL_sk_GENERAL_NAME_push(WOLFSSL_GENERAL_NAMES* sk,
4968
                                 WOLFSSL_GENERAL_NAME* gn)
4969
0
{
4970
0
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_push");
4971
4972
0
    return wolfSSL_sk_push(sk, gn);
4973
0
}
4974
4975
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
4976
4977
#ifdef OPENSSL_EXTRA
4978
4979
/* Returns the general name at index i from the stack
4980
 *
4981
 * sk  stack to get general name from
4982
 * idx index to get
4983
 *
4984
 * return a pointer to the internal node of the stack
4985
 */
4986
WOLFSSL_GENERAL_NAME* wolfSSL_sk_GENERAL_NAME_value(WOLFSSL_STACK* sk, int idx)
4987
0
{
4988
0
    return (WOLFSSL_GENERAL_NAME*)wolfSSL_sk_value(sk, idx);
4989
0
}
4990
4991
/* Gets the number of nodes in the stack
4992
 *
4993
 * sk  stack to get the number of nodes from
4994
 *
4995
 * returns the number of nodes, -1 if no nodes
4996
 */
4997
int wolfSSL_sk_GENERAL_NAME_num(WOLFSSL_STACK* sk)
4998
0
{
4999
0
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_num");
5000
5001
0
    return wolfSSL_sk_num(sk);
5002
0
}
5003
5004
/* Allocates an empty GENERAL NAME stack */
5005
0
WOLFSSL_STACK* wolfSSL_sk_GENERAL_NAME_new(void *cmpFunc) {
5006
0
    WOLFSSL_STACK* sk = NULL;
5007
0
    (void)cmpFunc;
5008
0
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_new");
5009
5010
0
    sk = wolfSSL_sk_new_null();
5011
0
    if (sk != NULL) {
5012
0
        sk->type = STACK_TYPE_GEN_NAME;
5013
0
    }
5014
5015
0
    return sk;
5016
0
}
5017
#endif /* OPENSSL_EXTRA */
5018
5019
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
5020
5021
/* Frees all nodes in a GENERAL NAME stack
5022
 *
5023
 * sk stack of nodes to free
5024
 * f  free function to use, not called with wolfSSL
5025
 */
5026
void wolfSSL_sk_GENERAL_NAME_pop_free(WOLFSSL_STACK* sk,
5027
        void (*f) (WOLFSSL_GENERAL_NAME*))
5028
0
{
5029
0
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_pop_free");
5030
0
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
5031
0
}
5032
5033
void wolfSSL_sk_GENERAL_NAME_free(WOLFSSL_STACK* sk)
5034
0
{
5035
0
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_free");
5036
0
    wolfSSL_sk_X509_pop_free(sk, NULL);
5037
0
}
5038
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
5039
5040
#ifdef OPENSSL_EXTRA
5041
static void wolfSSL_DIST_POINT_NAME_free(WOLFSSL_DIST_POINT_NAME* dpn)
5042
0
{
5043
0
    if (dpn != NULL) {
5044
0
        if (dpn->name.fullname != NULL) {
5045
0
            wolfSSL_sk_X509_pop_free(dpn->name.fullname, NULL);
5046
0
        }
5047
0
        XFREE(dpn, NULL, DYNAMIC_TYPE_OPENSSL);
5048
0
    }
5049
0
}
5050
5051
5052
/* returns new pointer on success and NULL on fail */
5053
static WOLFSSL_DIST_POINT_NAME* wolfSSL_DIST_POINT_NAME_new(void)
5054
0
{
5055
0
    WOLFSSL_DIST_POINT_NAME* dpn = NULL;
5056
0
    WOLFSSL_GENERAL_NAMES* gns = NULL;
5057
5058
0
    dpn = (WOLFSSL_DIST_POINT_NAME*)XMALLOC(sizeof(WOLFSSL_DIST_POINT_NAME),
5059
0
                                            NULL, DYNAMIC_TYPE_OPENSSL);
5060
0
    if (dpn == NULL) {
5061
0
        return NULL;
5062
0
    }
5063
0
    XMEMSET(dpn, 0, sizeof(WOLFSSL_DIST_POINT_NAME));
5064
5065
0
    gns = wolfSSL_sk_new_null();
5066
0
    if (gns == NULL) {
5067
0
        WOLFSSL_MSG("wolfSSL_sk_new_null error");
5068
0
        XFREE(dpn, NULL, DYNAMIC_TYPE_OPENSSL);
5069
0
        return NULL;
5070
0
    }
5071
0
    gns->type = STACK_TYPE_GEN_NAME;
5072
5073
    /* DIST_POINT_NAME type may be 0 or 1, indicating whether fullname or
5074
     * relativename is used. See: RFC 5280 section 4.2.1.13 */
5075
0
    dpn->name.fullname = gns;
5076
0
    dpn->type = 0;
5077
5078
0
    return dpn;
5079
0
}
5080
5081
5082
/* Creates and returns new DIST_POINT structure */
5083
WOLFSSL_DIST_POINT* wolfSSL_DIST_POINT_new(void)
5084
0
{
5085
0
    WOLFSSL_DIST_POINT* dp = NULL;
5086
0
    WOLFSSL_DIST_POINT_NAME* dpn = NULL;
5087
5088
0
    WOLFSSL_ENTER("wolfSSL_DIST_POINT_new");
5089
5090
0
    dp = (WOLFSSL_DIST_POINT*)XMALLOC(sizeof(WOLFSSL_DIST_POINT), NULL,
5091
0
                                      DYNAMIC_TYPE_OPENSSL);
5092
0
    if (dp == NULL) {
5093
0
        return NULL;
5094
0
    }
5095
0
    XMEMSET(dp, 0, sizeof(WOLFSSL_DIST_POINT));
5096
5097
0
    dpn = wolfSSL_DIST_POINT_NAME_new();
5098
0
    if (dpn == NULL) {
5099
0
        XFREE(dp, NULL, DYNAMIC_TYPE_OPENSSL);
5100
0
        return NULL;
5101
0
    }
5102
0
    dp->distpoint = dpn;
5103
5104
0
    return dp;
5105
0
}
5106
5107
5108
/* Frees DIST_POINT objects.
5109
*/
5110
void wolfSSL_DIST_POINT_free(WOLFSSL_DIST_POINT* dp)
5111
0
{
5112
0
    WOLFSSL_ENTER("wolfSSL_DIST_POINT_free");
5113
0
    if (dp != NULL) {
5114
0
        wolfSSL_DIST_POINT_NAME_free(dp->distpoint);
5115
0
        XFREE(dp, NULL, DYNAMIC_TYPE_OPENSSL);
5116
0
    }
5117
0
}
5118
5119
void wolfSSL_DIST_POINTS_free(WOLFSSL_DIST_POINTS *dps)
5120
0
{
5121
0
    WOLFSSL_ENTER("wolfSSL_DIST_POINTS_free");
5122
5123
0
    if (dps == NULL) {
5124
0
        return;
5125
0
    }
5126
5127
0
    wolfSSL_sk_free(dps);
5128
0
}
5129
5130
/* return number of elements on success 0 on fail */
5131
int wolfSSL_sk_DIST_POINT_push(WOLFSSL_DIST_POINTS* sk, WOLFSSL_DIST_POINT* dp)
5132
0
{
5133
0
    WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_push");
5134
5135
0
    if (sk == NULL || dp == NULL) {
5136
0
        return WOLFSSL_FAILURE;
5137
0
    }
5138
5139
0
    return wolfSSL_sk_push(sk, dp);
5140
0
}
5141
5142
/* Returns the CRL dist point at index i from the stack
5143
 *
5144
 * sk  stack to get general name from
5145
 * idx index to get
5146
 *
5147
 * return a pointer to the internal node of the stack
5148
 */
5149
WOLFSSL_DIST_POINT* wolfSSL_sk_DIST_POINT_value(WOLFSSL_STACK* sk, int idx)
5150
0
{
5151
0
    if (sk == NULL) {
5152
0
        return NULL;
5153
0
    }
5154
5155
0
    return (WOLFSSL_DIST_POINT*)wolfSSL_sk_value(sk, idx);
5156
0
}
5157
5158
/* Gets the number of nodes in the stack
5159
 *
5160
 * sk  stack to get the number of nodes from
5161
 *
5162
 * returns the number of nodes, -1 if no nodes
5163
 */
5164
int wolfSSL_sk_DIST_POINT_num(WOLFSSL_STACK* sk)
5165
0
{
5166
0
    WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_num");
5167
5168
0
    if (sk == NULL) {
5169
0
        return WOLFSSL_FATAL_ERROR;
5170
0
    }
5171
5172
0
    return wolfSSL_sk_num(sk);
5173
0
}
5174
5175
/* Frees all nodes in a DIST_POINT stack
5176
 *
5177
 * sk stack of nodes to free
5178
 * f  free function to use
5179
 */
5180
void wolfSSL_sk_DIST_POINT_pop_free(WOLFSSL_STACK* sk,
5181
        void (*f) (WOLFSSL_DIST_POINT*))
5182
0
{
5183
0
    WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_pop_free");
5184
0
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
5185
0
}
5186
5187
void wolfSSL_sk_DIST_POINT_free(WOLFSSL_STACK* sk)
5188
0
{
5189
0
    WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_free");
5190
0
    wolfSSL_sk_free(sk);
5191
0
}
5192
5193
/* returns the number of nodes in stack on success and WOLFSSL_FATAL_ERROR
5194
 * on fail */
5195
int wolfSSL_sk_ACCESS_DESCRIPTION_num(WOLFSSL_STACK* sk)
5196
0
{
5197
0
    if (sk == NULL) {
5198
0
        return WOLFSSL_FATAL_ERROR;
5199
0
    }
5200
5201
0
    return (int)sk->num;
5202
0
}
5203
5204
/* returns NULL on fail and pointer to internal data on success */
5205
WOLFSSL_ACCESS_DESCRIPTION* wolfSSL_sk_ACCESS_DESCRIPTION_value(
5206
        WOLFSSL_STACK* sk, int idx)
5207
0
{
5208
0
    WOLFSSL_STACK* ret;
5209
5210
0
    if (sk == NULL) {
5211
0
        return NULL;
5212
0
    }
5213
5214
0
    ret = wolfSSL_sk_get_node(sk, idx);
5215
0
    if (ret != NULL) {
5216
0
        return ret->data.access;
5217
0
    }
5218
0
    return NULL;
5219
0
}
5220
#endif /* OPENSSL_EXTRA */
5221
5222
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
5223
/* free's the internal type for the general name */
5224
static void wolfSSL_GENERAL_NAME_type_free(WOLFSSL_GENERAL_NAME* name)
5225
0
{
5226
0
    if (name != NULL) {
5227
0
        switch (name->type) {
5228
0
        case WOLFSSL_GEN_IA5:
5229
0
            wolfSSL_ASN1_STRING_free(name->d.ia5);
5230
0
            name->d.ia5 = NULL;
5231
0
            break;
5232
0
        case WOLFSSL_GEN_EMAIL:
5233
0
            wolfSSL_ASN1_STRING_free(name->d.rfc822Name);
5234
0
            name->d.rfc822Name = NULL;
5235
0
            break;
5236
0
        case WOLFSSL_GEN_DNS:
5237
0
            wolfSSL_ASN1_STRING_free(name->d.dNSName);
5238
0
            name->d.dNSName = NULL;
5239
0
            break;
5240
0
        case WOLFSSL_GEN_DIRNAME:
5241
0
            wolfSSL_X509_NAME_free(name->d.dirn);
5242
0
            name->d.dirn = NULL;
5243
0
            break;
5244
0
        case WOLFSSL_GEN_URI:
5245
0
            wolfSSL_ASN1_STRING_free(name->d.uniformResourceIdentifier);
5246
0
            name->d.uniformResourceIdentifier = NULL;
5247
0
            break;
5248
0
        case WOLFSSL_GEN_IPADD:
5249
0
            wolfSSL_ASN1_STRING_free(name->d.iPAddress);
5250
0
            name->d.iPAddress = NULL;
5251
0
            break;
5252
0
        case WOLFSSL_GEN_RID:
5253
0
            wolfSSL_ASN1_OBJECT_free(name->d.registeredID);
5254
0
            name->d.registeredID = NULL;
5255
0
            break;
5256
0
        case WOLFSSL_GEN_OTHERNAME:
5257
0
            if (name->d.otherName != NULL) {
5258
0
                wolfSSL_ASN1_OBJECT_free(name->d.otherName->type_id);
5259
0
                wolfSSL_ASN1_TYPE_free(name->d.otherName->value);
5260
0
                XFREE(name->d.otherName, NULL, DYNAMIC_TYPE_ASN1);
5261
0
                name->d.otherName = NULL;
5262
0
            }
5263
0
            break;
5264
0
        case WOLFSSL_GEN_X400:
5265
            /* Unsupported: fall through */
5266
0
        case WOLFSSL_GEN_EDIPARTY:
5267
            /* Unsupported: fall through */
5268
0
        default:
5269
0
            WOLFSSL_MSG("wolfSSL_GENERAL_NAME_type_free: possible leak");
5270
0
            break;
5271
0
        }
5272
0
    }
5273
0
}
5274
5275
/* sets the general name type and free's the existing one
5276
 * can fail with a memory error if malloc fails or bad arg error
5277
 * otherwise return WOLFSSL_SUCCESS */
5278
int wolfSSL_GENERAL_NAME_set_type(WOLFSSL_GENERAL_NAME* name, int typ)
5279
0
{
5280
0
    int ret = WOLFSSL_SUCCESS;
5281
5282
0
    if (name != NULL) {
5283
0
        wolfSSL_GENERAL_NAME_type_free(name);
5284
0
        name->type = typ;
5285
5286
0
        switch (typ) {
5287
0
            case WOLFSSL_GEN_URI:
5288
0
                name->d.uniformResourceIdentifier = wolfSSL_ASN1_STRING_new();
5289
0
                if (name->d.uniformResourceIdentifier == NULL)
5290
0
                    ret = MEMORY_E;
5291
0
                break;
5292
0
            case WOLFSSL_GEN_OTHERNAME:
5293
0
                name->d.otherName = (WOLFSSL_ASN1_OTHERNAME*)XMALLOC(
5294
0
                    sizeof(WOLFSSL_ASN1_OTHERNAME), NULL, DYNAMIC_TYPE_ASN1);
5295
0
                if (name->d.otherName == NULL) {
5296
0
                    ret = MEMORY_E;
5297
0
                }
5298
0
                else {
5299
0
                    XMEMSET(name->d.otherName, 0, sizeof(WOLFSSL_ASN1_OTHERNAME));
5300
0
                }
5301
0
                break;
5302
0
            default:
5303
0
                name->type = WOLFSSL_GEN_IA5;
5304
0
                name->d.ia5 = wolfSSL_ASN1_STRING_new();
5305
0
                if (name->d.ia5 == NULL)
5306
0
                    ret = MEMORY_E;
5307
0
        }
5308
0
    }
5309
0
    else {
5310
0
        ret = BAD_FUNC_ARG;
5311
0
    }
5312
5313
0
    return ret;
5314
0
}
5315
5316
/* Set the value in a general name. This is a compat layer API.
5317
 *
5318
 * @param [out] a       Pointer to the GENERAL_NAME where the othername is set.
5319
 * @param [in]  type    The type of this general name.
5320
 * @param [in]  value   The ASN.1 string that is the value.
5321
 * @return none
5322
 * @note the set0 indicates we take ownership so the user does NOT free value.
5323
 */
5324
void wolfSSL_GENERAL_NAME_set0_value(WOLFSSL_GENERAL_NAME *a, int type,
5325
                                     void *value)
5326
0
{
5327
0
    WOLFSSL_ASN1_STRING *val = (WOLFSSL_ASN1_STRING *)value;
5328
0
    if (a == NULL) {
5329
0
        WOLFSSL_MSG("a is NULL");
5330
0
        return;
5331
0
    }
5332
5333
0
    if (val == NULL) {
5334
0
        WOLFSSL_MSG("value is NULL");
5335
0
        return;
5336
0
    }
5337
5338
0
    if (type != WOLFSSL_GEN_DNS) {
5339
0
        WOLFSSL_MSG("Only WOLFSSL_GEN_DNS is supported");
5340
0
        return;
5341
0
    }
5342
5343
0
    wolfSSL_GENERAL_NAME_type_free(a);
5344
0
    a->type = type;
5345
    /* Only when WOLFSSL_GEN_DNS. */
5346
0
    a->d.dNSName = val;
5347
0
}
5348
5349
/* Frees GENERAL_NAME objects.
5350
*/
5351
void wolfSSL_GENERAL_NAME_free(WOLFSSL_GENERAL_NAME* name)
5352
0
{
5353
0
    WOLFSSL_ENTER("wolfSSL_GENERAL_NAME_Free");
5354
0
    if (name != NULL) {
5355
0
        wolfSSL_GENERAL_NAME_type_free(name);
5356
0
        XFREE(name, NULL, DYNAMIC_TYPE_OPENSSL);
5357
0
    }
5358
0
}
5359
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL*/
5360
5361
#ifdef OPENSSL_EXTRA
5362
void wolfSSL_GENERAL_NAMES_free(WOLFSSL_GENERAL_NAMES *gens)
5363
0
{
5364
0
    WOLFSSL_ENTER("wolfSSL_GENERAL_NAMES_free");
5365
5366
0
    if (gens == NULL) {
5367
0
        return;
5368
0
    }
5369
5370
0
    wolfSSL_sk_GENERAL_NAME_free(gens);
5371
0
}
5372
5373
void wolfSSL_EXTENDED_KEY_USAGE_free(WOLFSSL_STACK * sk)
5374
0
{
5375
0
    WOLFSSL_ENTER("wolfSSL_EXTENDED_KEY_USAGE_free");
5376
5377
0
    if (sk == NULL) {
5378
0
        return;
5379
0
    }
5380
5381
0
    wolfSSL_sk_X509_pop_free(sk, NULL);
5382
0
}
5383
5384
#if !defined(IGNORE_NAME_CONSTRAINTS)
5385
/*
5386
 * Allocate and initialize an empty GENERAL_SUBTREE structure.
5387
 * Returns NULL on allocation failure.
5388
 */
5389
WOLFSSL_GENERAL_SUBTREE* wolfSSL_GENERAL_SUBTREE_new(void)
5390
0
{
5391
0
    WOLFSSL_GENERAL_SUBTREE* subtree;
5392
5393
0
    WOLFSSL_ENTER("wolfSSL_GENERAL_SUBTREE_new");
5394
5395
0
    subtree = (WOLFSSL_GENERAL_SUBTREE*)XMALLOC(sizeof(WOLFSSL_GENERAL_SUBTREE),
5396
0
                                                NULL, DYNAMIC_TYPE_OPENSSL);
5397
0
    if (subtree == NULL) {
5398
0
        WOLFSSL_MSG("Failed to allocate GENERAL_SUBTREE");
5399
0
        return NULL;
5400
0
    }
5401
0
    XMEMSET(subtree, 0, sizeof(WOLFSSL_GENERAL_SUBTREE));
5402
0
    return subtree;
5403
0
}
5404
5405
/*
5406
 * Create an empty NAME_CONSTRAINTS structure.
5407
 * Returns NULL on allocation failure.
5408
 */
5409
WOLFSSL_NAME_CONSTRAINTS* wolfSSL_NAME_CONSTRAINTS_new(void)
5410
0
{
5411
0
    WOLFSSL_NAME_CONSTRAINTS* nc;
5412
5413
0
    WOLFSSL_ENTER("wolfSSL_NAME_CONSTRAINTS_new");
5414
5415
0
    nc = (WOLFSSL_NAME_CONSTRAINTS*)XMALLOC(sizeof(WOLFSSL_NAME_CONSTRAINTS),
5416
0
                                            NULL, DYNAMIC_TYPE_OPENSSL);
5417
0
    if (nc == NULL) {
5418
0
        WOLFSSL_MSG("Failed to allocate NAME_CONSTRAINTS");
5419
0
        return NULL;
5420
0
    }
5421
0
    XMEMSET(nc, 0, sizeof(WOLFSSL_NAME_CONSTRAINTS));
5422
0
    return nc;
5423
0
}
5424
5425
/* Free a GENERAL_SUBTREE and its contents. */
5426
void wolfSSL_GENERAL_SUBTREE_free(WOLFSSL_GENERAL_SUBTREE* subtree)
5427
0
{
5428
0
    if (subtree == NULL) {
5429
0
        return;
5430
0
    }
5431
0
    wolfSSL_GENERAL_NAME_free(subtree->base);
5432
0
    XFREE(subtree, NULL, DYNAMIC_TYPE_OPENSSL);
5433
0
}
5434
5435
/* Free a NAME_CONSTRAINTS structure and all its contents. */
5436
void wolfSSL_NAME_CONSTRAINTS_free(WOLFSSL_NAME_CONSTRAINTS* nc)
5437
0
{
5438
0
    WOLFSSL_ENTER("wolfSSL_NAME_CONSTRAINTS_free");
5439
5440
0
    if (nc == NULL) {
5441
0
        return;
5442
0
    }
5443
5444
0
    if (nc->permittedSubtrees != NULL) {
5445
0
        wolfSSL_sk_pop_free(nc->permittedSubtrees,
5446
0
            (wolfSSL_sk_freefunc)wolfSSL_GENERAL_SUBTREE_free);
5447
0
    }
5448
5449
0
    if (nc->excludedSubtrees != NULL) {
5450
0
        wolfSSL_sk_pop_free(nc->excludedSubtrees,
5451
0
            (wolfSSL_sk_freefunc)wolfSSL_GENERAL_SUBTREE_free);
5452
0
    }
5453
5454
0
    XFREE(nc, NULL, DYNAMIC_TYPE_OPENSSL);
5455
0
}
5456
5457
/* Get number of items in GENERAL_SUBTREE stack. */
5458
int wolfSSL_sk_GENERAL_SUBTREE_num(const WOLFSSL_STACK* sk)
5459
0
{
5460
0
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_SUBTREE_num");
5461
5462
0
    return wolfSSL_sk_num(sk);
5463
0
}
5464
5465
/* Get GENERAL_SUBTREE at index from stack. */
5466
WOLFSSL_GENERAL_SUBTREE* wolfSSL_sk_GENERAL_SUBTREE_value(
5467
    const WOLFSSL_STACK* sk, int idx)
5468
0
{
5469
0
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_SUBTREE_value");
5470
5471
0
    return (WOLFSSL_GENERAL_SUBTREE*)wolfSSL_sk_value(sk, idx);
5472
0
}
5473
5474
/* Check IP address string matches constraint.
5475
 *
5476
 * name: IP address string (ex "192.168.1.50")
5477
 * nameSz: length of name string
5478
 * gn: GENERAL_NAME containing IP constraint (IP + mask bytes)
5479
 *
5480
 * Return 1 on match, otherwise 0
5481
 */
5482
static int MatchIpName(const char* name, int nameSz, WOLFSSL_GENERAL_NAME* gn)
5483
0
{
5484
0
    int ipLen = 0;
5485
0
    int constraintLen;
5486
0
    char ipStr[WOLFSSL_MAX_IPSTR];
5487
0
    unsigned char ipBytes[16]; /* Max 16 bytes for IPv6 */
5488
0
    const unsigned char* constraintData;
5489
5490
0
    if (name == NULL || nameSz <= 0 || gn == NULL || gn->d.iPAddress == NULL) {
5491
0
        return 0;
5492
0
    }
5493
5494
0
    constraintData = wolfSSL_ASN1_STRING_get0_data(gn->d.iPAddress);
5495
0
    constraintLen = wolfSSL_ASN1_STRING_length(gn->d.iPAddress);
5496
0
    if (constraintData == NULL || constraintLen <= 0) {
5497
0
        return 0;
5498
0
    }
5499
5500
    /* Null-terminate IP string */
5501
0
    if (nameSz >= (int)sizeof(ipStr)) {
5502
0
        return 0;
5503
0
    }
5504
0
    XMEMCPY(ipStr, name, nameSz);
5505
0
    ipStr[nameSz] = '\0';
5506
5507
    /* IPv4 constraint 8 bytes (IP + mask),
5508
     * IPv6 constraint 32 bytes (IP + mask) */
5509
0
    if (constraintLen == 8) {
5510
0
        if (XINET_PTON(WOLFSSL_IP4, ipStr, ipBytes) == 1) {
5511
0
            ipLen = 4;
5512
0
        }
5513
0
    }
5514
0
    else if (constraintLen == 32) {
5515
0
        if (XINET_PTON(WOLFSSL_IP6, ipStr, ipBytes) == 1) {
5516
0
            ipLen = 16;
5517
0
        }
5518
0
    }
5519
5520
0
    if (ipLen == 0) {
5521
0
        return 0;
5522
0
    }
5523
5524
0
    return wolfssl_local_MatchIpSubnet(ipBytes, ipLen,
5525
0
        constraintData, constraintLen);
5526
0
}
5527
5528
/* Extract host from URI for name constraint matching.
5529
 * URI format: scheme://[userinfo@]host[:port][/path][?query][#fragment]
5530
 * IPv6 literals are enclosed in brackets: scheme://[ipv6addr]:port/path
5531
 * Returns pointer to host start and sets hostLen, or NULL on failure. */
5532
static const char* ExtractHostFromUri(const char* uri, int uriLen, int* hostLen)
5533
0
{
5534
0
    const char* hostStart;
5535
0
    const char* hostEnd;
5536
0
    const char* p;
5537
0
    const char* uriEnd;
5538
5539
0
    if (uri == NULL || uriLen <= 0 || hostLen == NULL) {
5540
0
        return NULL;
5541
0
    }
5542
5543
0
    uriEnd = uri + uriLen;
5544
5545
    /* Find "://" to skip scheme */
5546
0
    hostStart = NULL;
5547
0
    for (p = uri; p < uriEnd - 2; p++) {
5548
0
        if (p[0] == ':' && p[1] == '/' && p[2] == '/') {
5549
0
            hostStart = p + 3;
5550
0
            break;
5551
0
        }
5552
0
    }
5553
0
    if (hostStart == NULL || hostStart >= uriEnd) {
5554
0
        return NULL;
5555
0
    }
5556
5557
    /* Skip userinfo if present (look for @ before any /, ?, #)
5558
     * userinfo can contain ':' (ex: user:pass@host), don't stop at ':'
5559
     * For IPv6, also don't stop at '[' in userinfo */
5560
0
    for (p = hostStart; p < uriEnd; p++) {
5561
0
        if (*p == '@') {
5562
0
            hostStart = p + 1;
5563
0
            break;
5564
0
        }
5565
0
        if (*p == '/' || *p == '?' || *p == '#') {
5566
            /* No userinfo found */
5567
0
            break;
5568
0
        }
5569
        /* If '[' before '@', found IPv6 literal, not userinfo */
5570
0
        if (*p == '[') {
5571
0
            break;
5572
0
        }
5573
0
    }
5574
0
    if (hostStart >= uriEnd) {
5575
0
        return NULL;
5576
0
    }
5577
5578
    /* Check for IPv6 literal */
5579
0
    if (*hostStart == '[') {
5580
        /* Find closing bracket, skip opening one */
5581
0
        hostStart++;
5582
0
        hostEnd = hostStart;
5583
0
        while (hostEnd < uriEnd && *hostEnd != ']') {
5584
0
            hostEnd++;
5585
0
        }
5586
0
        if (hostEnd >= uriEnd) {
5587
            /* No closing bracket found, malformed */
5588
0
            return NULL;
5589
0
        }
5590
        /* hostEnd points to closing bracket, extract content between */
5591
0
        *hostLen = (int)(hostEnd - hostStart);
5592
0
        if (*hostLen <= 0) {
5593
0
            return NULL;
5594
0
        }
5595
0
        return hostStart;
5596
0
    }
5597
5598
    /* Regular hostname, find end */
5599
0
    hostEnd = hostStart;
5600
0
    while (hostEnd < uriEnd && *hostEnd != ':' && *hostEnd != '/' &&
5601
0
           *hostEnd != '?' && *hostEnd != '#') {
5602
0
        hostEnd++;
5603
0
    }
5604
5605
0
    *hostLen = (int)(hostEnd - hostStart);
5606
0
    if (*hostLen <= 0) {
5607
0
        return NULL;
5608
0
    }
5609
5610
0
    return hostStart;
5611
0
}
5612
5613
/* Helper to check if name string matches a single GENERAL_NAME constraint.
5614
 * Returns 1 if matches, 0 if not. */
5615
static int MatchNameConstraint(int type, const char* name, int nameSz,
5616
    WOLFSSL_GENERAL_NAME* gn)
5617
0
{
5618
0
    const char* baseStr;
5619
0
    int baseLen;
5620
5621
0
    if (gn == NULL || gn->type != type) {
5622
0
        return 0;
5623
0
    }
5624
5625
0
    switch (type) {
5626
0
        case WOLFSSL_GEN_IPADD:
5627
0
            return MatchIpName(name, nameSz, gn);
5628
5629
0
        case WOLFSSL_GEN_DNS:
5630
0
        case WOLFSSL_GEN_EMAIL:
5631
0
        case WOLFSSL_GEN_URI:
5632
0
            if (gn->d.ia5 == NULL) {
5633
0
                return 0;
5634
0
            }
5635
0
            baseStr = (const char*)wolfSSL_ASN1_STRING_get0_data(gn->d.ia5);
5636
0
            baseLen = wolfSSL_ASN1_STRING_length(gn->d.ia5);
5637
0
            if (baseStr == NULL || baseLen <= 0) {
5638
0
                return 0;
5639
0
            }
5640
5641
0
            if (type == WOLFSSL_GEN_EMAIL) {
5642
0
                return wolfssl_local_MatchBaseName(ASN_RFC822_TYPE, name,
5643
0
                    nameSz, baseStr, baseLen);
5644
0
            }
5645
0
            else if (type == WOLFSSL_GEN_URI) {
5646
0
                const char* host;
5647
0
                int hostLen;
5648
5649
                /* For URI, extract host and match against DNS-style */
5650
0
                host = ExtractHostFromUri(name, nameSz, &hostLen);
5651
0
                if (host == NULL) {
5652
0
                    return 0;
5653
0
                }
5654
0
                return wolfssl_local_MatchBaseName(ASN_DNS_TYPE, host, hostLen,
5655
0
                    baseStr, baseLen);
5656
0
            }
5657
0
            else {
5658
                /* WOLFSSL_GEN_DNS uses DNS-style matching */
5659
0
                return wolfssl_local_MatchBaseName(ASN_DNS_TYPE, name, nameSz,
5660
0
                    baseStr, baseLen);
5661
0
            }
5662
5663
0
        default:
5664
            /* Unsupported type */
5665
0
            return 0;
5666
0
    }
5667
0
}
5668
5669
/*
5670
 * Check if a name string satisfies given name constraints.
5671
 *
5672
 * nc: NAME_CONSTRAINTS struct containing permitted/excluded subtrees
5673
 * type: GeneralName type (WOLFSSL_GEN_DNS, WOLFSSL_GEN_EMAIL, etc.)
5674
 * name: The name string to check
5675
 * nameSz: Length of name string
5676
 *
5677
 * Returns 1 if name satisfies constraints (permitted and not excluded),
5678
 * otherwise 0 if name does not satisfy constraints or on error
5679
 *
5680
 * A name satisfies constraints if permitted subtrees exist for the type,
5681
 * name matches at least one, and name does not match any excluded subtree.
5682
 */
5683
int wolfSSL_NAME_CONSTRAINTS_check_name(WOLFSSL_NAME_CONSTRAINTS* nc,
5684
    int type, const char* name, int nameSz)
5685
0
{
5686
0
    int i, num;
5687
0
    int hasPermittedType = 0;
5688
0
    int matchedPermitted = 0;
5689
0
    WOLFSSL_GENERAL_SUBTREE* subtree;
5690
0
    WOLFSSL_GENERAL_NAME* gn;
5691
5692
0
    WOLFSSL_ENTER("wolfSSL_NAME_CONSTRAINTS_check_name");
5693
5694
0
    if (nc == NULL || name == NULL || nameSz <= 0) {
5695
0
        WOLFSSL_MSG("Bad argument to NAME_CONSTRAINTS_check_name");
5696
0
        return 0;
5697
0
    }
5698
5699
    /* Check permitted subtrees */
5700
0
    if (nc->permittedSubtrees != NULL) {
5701
0
        num = wolfSSL_sk_GENERAL_SUBTREE_num(nc->permittedSubtrees);
5702
0
        for (i = 0; i < num; i++) {
5703
0
            subtree = wolfSSL_sk_GENERAL_SUBTREE_value(
5704
0
                nc->permittedSubtrees, i);
5705
0
            if (subtree == NULL || subtree->base == NULL) {
5706
0
                continue;
5707
0
            }
5708
5709
0
            gn = subtree->base;
5710
0
            if (gn->type != type) {
5711
0
                continue;
5712
0
            }
5713
0
            hasPermittedType = 1;
5714
5715
0
            if (MatchNameConstraint(type, name, nameSz, gn)) {
5716
0
                matchedPermitted = 1;
5717
0
                break;
5718
0
            }
5719
0
        }
5720
0
    }
5721
5722
    /* If permitted constraints exist for this type but none matched, fail */
5723
0
    if (hasPermittedType && !matchedPermitted) {
5724
0
        WOLFSSL_MSG("Name not in permitted subtrees");
5725
0
        return 0;
5726
0
    }
5727
5728
    /* Check excluded subtrees */
5729
0
    if (nc->excludedSubtrees != NULL) {
5730
0
        num = wolfSSL_sk_GENERAL_SUBTREE_num(nc->excludedSubtrees);
5731
0
        for (i = 0; i < num; i++) {
5732
0
            subtree = wolfSSL_sk_GENERAL_SUBTREE_value(nc->excludedSubtrees, i);
5733
0
            if (subtree == NULL || subtree->base == NULL) {
5734
0
                continue;
5735
0
            }
5736
5737
0
            gn = subtree->base;
5738
0
            if (gn->type != type) {
5739
0
                continue;
5740
0
            }
5741
5742
0
            if (MatchNameConstraint(type, name, nameSz, gn)) {
5743
0
                WOLFSSL_MSG("Name in excluded subtrees");
5744
0
                return 0;
5745
0
            }
5746
0
        }
5747
0
    }
5748
5749
0
    return 1;
5750
0
}
5751
#endif /* !IGNORE_NAME_CONSTRAINTS */
5752
5753
#if defined(OPENSSL_ALL) && !defined(NO_BIO)
5754
/* Outputs name string of the given WOLFSSL_GENERAL_NAME_OBJECT to WOLFSSL_BIO.
5755
 * Can handle following GENERAL_NAME_OBJECT types:
5756
 *  - GEN_OTHERNAME #
5757
 *  - GEN_EMAIL
5758
 *  - GEN_DNS
5759
 *  - GEN_X400  #
5760
 *  - GEN_DIRNAME
5761
 *  - GEN_EDIPARTY #
5762
 *  - GEN_URI
5763
 *  - GEN_RID
5764
 * The each name string to be output has "typename:namestring" format.
5765
 * For instance, email name string will be output as "email:info@wolfssl.com".
5766
 * However,some types above marked with "#" will be output with
5767
 * "typename:<unsupported>".
5768
 *
5769
 * Parameters:
5770
 *  - out: WOLFSSL_BIO object which is the output destination
5771
 *  - gen: WOLFSSL_GENERAL_NAME object to be output its name
5772
 *
5773
 * Returns WOLFSSL_SUCCESS on success, WOLFSSL_FAILURE on failure.
5774
 */
5775
int wolfSSL_GENERAL_NAME_print(WOLFSSL_BIO* out, WOLFSSL_GENERAL_NAME* gen)
5776
0
{
5777
0
    int ret, i;
5778
0
    unsigned int wd;
5779
0
    unsigned char* p;
5780
0
    (void)wd;
5781
0
    (void)p;
5782
0
    (void)i;
5783
0
    WOLFSSL_ENTER("wolfSSL_GENERAL_NAME_print");
5784
5785
0
    if (out == NULL || gen == NULL)
5786
0
        return WOLFSSL_FAILURE;
5787
5788
0
    ret = WOLFSSL_FAILURE;
5789
0
    switch (gen->type)
5790
0
    {
5791
0
    case GEN_OTHERNAME:
5792
0
        ret = wolfSSL_BIO_printf(out, "othername:<unsupported>");
5793
0
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5794
0
        break;
5795
5796
0
    case GEN_EMAIL:
5797
0
        ret = wolfSSL_BIO_printf(out, "email:");
5798
0
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5799
0
        if (ret == WOLFSSL_SUCCESS)
5800
0
        {
5801
0
            ret = wolfSSL_ASN1_STRING_print(out, gen->d.rfc822Name);
5802
0
        }
5803
0
        break;
5804
5805
0
    case GEN_DNS:
5806
0
        ret = wolfSSL_BIO_printf(out, "DNS:");
5807
0
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5808
0
        if (ret == WOLFSSL_SUCCESS) {
5809
0
            ret = wolfSSL_BIO_printf(out, "%s", gen->d.dNSName->strData);
5810
0
            ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5811
0
        }
5812
0
        break;
5813
5814
0
    case GEN_X400:
5815
0
        ret = wolfSSL_BIO_printf(out, "X400Name:<unsupported>");
5816
0
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5817
0
        break;
5818
5819
0
    case GEN_DIRNAME:
5820
0
        ret = wolfSSL_BIO_printf(out, "DirName:");
5821
0
        if (ret == WOLFSSL_SUCCESS) {
5822
0
            ret = wolfSSL_X509_NAME_print_ex(out, gen->d.directoryName, 0,
5823
0
                                                         XN_FLAG_ONELINE);
5824
0
        }
5825
0
        break;
5826
5827
0
    case GEN_EDIPARTY:
5828
0
        ret = wolfSSL_BIO_printf(out, "EdiPartyName:<unsupported>");
5829
0
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5830
0
        break;
5831
5832
0
    case GEN_URI:
5833
0
        ret = wolfSSL_BIO_printf(out, "URI:");
5834
0
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5835
0
        if (ret == WOLFSSL_SUCCESS) {
5836
0
            ret = wolfSSL_ASN1_STRING_print(out,
5837
0
                                    gen->d.uniformResourceIdentifier);
5838
0
        }
5839
0
        break;
5840
5841
0
    case GEN_IPADD:
5842
0
        ret = wolfSSL_BIO_printf(out, "IP Address");
5843
0
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5844
0
        if (ret == WOLFSSL_SUCCESS) {
5845
5846
0
            if (!gen->d.iPAddress->length) {
5847
0
                ret = WOLFSSL_FAILURE;
5848
0
                break;
5849
0
            }
5850
0
            p = (unsigned char*)gen->d.iPAddress->strData;
5851
5852
0
            if (gen->d.iPAddress->length == 4) {
5853
0
                ret = wolfSSL_BIO_printf(out, ":%d.%d.%d.%d",
5854
0
                                  p[0],p[1],p[2],p[3]);
5855
0
            }
5856
0
            else if (gen->d.iPAddress->length == 16) {
5857
5858
0
                for (i = 0; i < 16 && ret == WOLFSSL_SUCCESS;) {
5859
0
                    wd = p[i] << 8 | p[i+1];
5860
5861
0
                    i += 2;
5862
0
                    ret = wolfSSL_BIO_printf(out, ":%X", wd);
5863
0
                    ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5864
0
                }
5865
0
            }
5866
0
            else {
5867
0
                ret = wolfSSL_BIO_printf(out, "<unsupported>");
5868
0
            }
5869
0
            ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5870
0
        }
5871
0
        break;
5872
5873
0
    case GEN_RID:
5874
0
        ret = wolfSSL_BIO_printf(out, "Registered ID:");
5875
0
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5876
0
        if (ret == WOLFSSL_SUCCESS) {
5877
0
            ret = wolfSSL_i2a_ASN1_OBJECT(out, gen->d.registeredID);
5878
0
        }
5879
0
        break;
5880
5881
0
    default:
5882
        /* unsupported type */
5883
0
        break;
5884
0
    }
5885
5886
0
    if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
5887
0
        return WOLFSSL_FAILURE;
5888
0
    else
5889
0
        return WOLFSSL_SUCCESS;
5890
0
}
5891
#endif /* OPENSSL_ALL */
5892
5893
WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* wolfSSL_sk_X509_EXTENSION_new_null(void)
5894
0
{
5895
0
    WOLFSSL_STACK* sk = wolfSSL_sk_new_node(NULL);
5896
0
    if (sk) {
5897
0
        sk->type = STACK_TYPE_X509_EXT;
5898
0
    }
5899
5900
0
    return (WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)*)sk;;
5901
0
}
5902
5903
/* returns the number of nodes on the stack */
5904
int wolfSSL_sk_X509_EXTENSION_num(WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk)
5905
0
{
5906
0
    if (sk != NULL) {
5907
0
        return (int)sk->num;
5908
0
    }
5909
0
    return WOLFSSL_FATAL_ERROR;
5910
0
}
5911
5912
5913
/* returns null on failure and pointer to internal value on success */
5914
WOLFSSL_X509_EXTENSION* wolfSSL_sk_X509_EXTENSION_value(
5915
        const WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk, int idx)
5916
0
{
5917
0
    return (WOLFSSL_X509_EXTENSION*)wolfSSL_sk_value(sk, idx);
5918
0
}
5919
5920
/* frees all of the nodes and the values in stack */
5921
void wolfSSL_sk_X509_EXTENSION_pop_free(
5922
        WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk,
5923
        void (*f) (WOLFSSL_X509_EXTENSION*))
5924
0
{
5925
0
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
5926
0
}
5927
5928
void wolfSSL_sk_X509_EXTENSION_free(WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk)
5929
0
{
5930
0
    wolfSSL_sk_pop_free(sk, NULL);
5931
0
}
5932
5933
#endif /* OPENSSL_EXTRA */
5934
5935
#if defined(OPENSSL_EXTRA) && !defined(NO_FILESYSTEM) && \
5936
    !defined(NO_STDIO_FILESYSTEM)
5937
5938
WOLFSSL_X509* wolfSSL_X509_d2i_fp(WOLFSSL_X509** x509, XFILE file)
5939
0
{
5940
0
    WOLFSSL_X509* newX509 = NULL;
5941
5942
0
    WOLFSSL_ENTER("wolfSSL_X509_d2i_fp");
5943
5944
0
    if (file != XBADFILE) {
5945
0
        byte* fileBuffer = NULL;
5946
0
        long sz = 0;
5947
5948
0
        if (XFSEEK(file, 0, XSEEK_END) != 0)
5949
0
            return NULL;
5950
0
        sz = XFTELL(file);
5951
0
        if (XFSEEK(file, 0, XSEEK_SET) != 0)
5952
0
            return NULL;
5953
5954
0
        if (sz > MAX_WOLFSSL_FILE_SIZE || sz < 0) {
5955
0
            WOLFSSL_MSG("X509_d2i file size error");
5956
0
            return NULL;
5957
0
        }
5958
5959
0
        fileBuffer = (byte*)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE);
5960
0
        if (fileBuffer != NULL) {
5961
0
            int ret = (int)XFREAD(fileBuffer, 1, (size_t)sz, file);
5962
0
            if (ret == sz) {
5963
0
                newX509 = wolfSSL_X509_d2i(NULL, fileBuffer, (int)sz);
5964
0
            }
5965
0
            XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
5966
0
        }
5967
0
    }
5968
5969
0
    if (x509 != NULL)
5970
0
        *x509 = newX509;
5971
5972
0
    return newX509;
5973
0
}
5974
5975
#endif /* OPENSSL_EXTRA && !NO_FILESYSTEM && !NO_STDIO_FILESYSTEM */
5976
5977
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
5978
    defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
5979
5980
#ifndef NO_FILESYSTEM
5981
WOLFSSL_ABI
5982
WOLFSSL_X509* wolfSSL_X509_load_certificate_file(const char* fname, int format)
5983
0
{
5984
0
#ifdef WOLFSSL_SMALL_STACK
5985
0
    byte  staticBuffer[1]; /* force heap usage */
5986
#else
5987
    byte  staticBuffer[FILE_BUFFER_SIZE];
5988
#endif
5989
0
    byte* fileBuffer = staticBuffer;
5990
0
    int   dynamic = 0;
5991
0
    int   ret;
5992
0
    long  sz = 0;
5993
0
    XFILE file;
5994
5995
0
    WOLFSSL_X509* x509 = NULL;
5996
5997
    /* Check the inputs */
5998
0
    if ((fname == NULL) ||
5999
0
        (format != WOLFSSL_FILETYPE_ASN1 && format != WOLFSSL_FILETYPE_PEM))
6000
0
        return NULL;
6001
6002
0
    file = XFOPEN(fname, "rb");
6003
0
    if (file == XBADFILE)
6004
0
        return NULL;
6005
6006
0
    if (XFSEEK(file, 0, XSEEK_END) != 0) {
6007
0
        XFCLOSE(file);
6008
0
        return NULL;
6009
0
    }
6010
0
    sz = XFTELL(file);
6011
0
    if (XFSEEK(file, 0, XSEEK_SET) != 0) {
6012
0
        XFCLOSE(file);
6013
0
        return NULL;
6014
0
    }
6015
6016
0
    if (sz > MAX_WOLFSSL_FILE_SIZE || sz < 0) {
6017
0
        WOLFSSL_MSG("X509_load_certificate_file size error");
6018
0
        XFCLOSE(file);
6019
0
        return NULL;
6020
0
    }
6021
6022
0
    if (sz > (long)sizeof(staticBuffer)) {
6023
0
        fileBuffer = (byte*)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE);
6024
0
        if (fileBuffer == NULL) {
6025
0
            XFCLOSE(file);
6026
0
            return NULL;
6027
0
        }
6028
0
        dynamic = 1;
6029
0
    }
6030
6031
0
    ret = (int)XFREAD(fileBuffer, 1, (size_t)sz, file);
6032
0
    if (ret != sz) {
6033
0
        XFCLOSE(file);
6034
0
        if (dynamic)
6035
0
            XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
6036
0
        return NULL;
6037
0
    }
6038
6039
0
    XFCLOSE(file);
6040
6041
0
    x509 = wolfSSL_X509_load_certificate_buffer(fileBuffer, (int)sz, format);
6042
6043
0
    if (dynamic)
6044
0
        XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
6045
6046
0
    return x509;
6047
0
}
6048
#endif /* !NO_FILESYSTEM */
6049
6050
static WOLFSSL_X509* loadX509orX509REQFromBuffer(
6051
    const unsigned char* buf, int sz, int format, int type,
6052
    wc_pem_password_cb *cb, void *u)
6053
0
{
6054
6055
0
    int ret = 0;
6056
0
    WOLFSSL_X509* x509 = NULL;
6057
0
    DerBuffer* der = NULL;
6058
6059
0
    WOLFSSL_ENTER("wolfSSL_X509_load_certificate_ex");
6060
6061
0
    if (format == WOLFSSL_FILETYPE_PEM) {
6062
0
        EncryptedInfo info;
6063
0
        XMEMSET(&info, 0, sizeof(EncryptedInfo));
6064
0
    #ifdef WOLFSSL_ENCRYPTED_KEYS
6065
0
        info.passwd_cb       = cb;
6066
0
        info.passwd_userdata = u;
6067
0
    #endif
6068
6069
0
    #ifdef WOLFSSL_PEM_TO_DER
6070
0
        ret = PemToDer(buf, sz, type, &der, NULL, &info, NULL);
6071
0
        if (ret != 0) {
6072
0
            FreeDer(&der);
6073
0
        }
6074
    #else
6075
        ret = NOT_COMPILED_IN;
6076
    #endif
6077
0
    }
6078
0
    else {
6079
0
        ret = AllocDer(&der, (word32)sz, type, NULL);
6080
0
        if (ret == 0) {
6081
0
            XMEMCPY(der->buffer, buf, sz);
6082
0
        }
6083
0
    }
6084
6085
    /* At this point we want `der` to have the certificate in DER format */
6086
    /* ready to be decoded. */
6087
0
    if (der != NULL && der->buffer != NULL) {
6088
0
        WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
6089
        /* For TRUSTED_CERT_TYPE, the DER buffer contains the certificate
6090
         * followed by auxiliary trust info. ParseCertRelative expects CERT_TYPE
6091
         * and will parse only the certificate portion, ignoring the rest. */
6092
0
        int parseType = (type == TRUSTED_CERT_TYPE) ? CERT_TYPE : type;
6093
6094
0
        WC_ALLOC_VAR_EX(cert, DecodedCert, 1, NULL, DYNAMIC_TYPE_DCERT,
6095
0
            ret=MEMORY_ERROR);
6096
0
        if (WC_VAR_OK(cert))
6097
0
        {
6098
0
            InitDecodedCert(cert, der->buffer, der->length, NULL);
6099
0
            ret = ParseCertRelative(cert, parseType, 0, NULL, NULL);
6100
0
            if (ret == 0) {
6101
                /* For TRUSTED_CERT_TYPE, truncate the DER buffer to exclude
6102
                 * auxiliary trust data. ParseCertRelative sets srcIdx to the
6103
                 * end of the certificate, so we adjust cert->maxIdx accordingly. */
6104
0
                if (type == TRUSTED_CERT_TYPE && cert->srcIdx < cert->maxIdx) {
6105
0
                    cert->maxIdx = cert->srcIdx;
6106
0
                }
6107
6108
0
                x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), NULL,
6109
0
                                                             DYNAMIC_TYPE_X509);
6110
0
                if (x509 != NULL) {
6111
0
                    InitX509(x509, 1, NULL);
6112
0
                    ret = CopyDecodedToX509(x509, cert);
6113
0
                    if (ret != 0) {
6114
0
                        wolfSSL_X509_free(x509);
6115
0
                        x509 = NULL;
6116
0
                    }
6117
0
                }
6118
0
                else {
6119
0
                    ret = MEMORY_ERROR;
6120
0
                }
6121
0
            }
6122
6123
0
            FreeDecodedCert(cert);
6124
0
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
6125
0
        }
6126
6127
0
        FreeDer(&der);
6128
0
    }
6129
6130
0
    if (ret != 0) {
6131
0
        WOLFSSL_ERROR(ret);
6132
0
    }
6133
6134
    /* unused parameter when built without WOLFSSL_ENCRYPTED_KEYS */
6135
0
    (void)cb;
6136
0
    (void)u;
6137
0
    return x509;
6138
0
}
6139
6140
WOLFSSL_X509* wolfSSL_X509_load_certificate_buffer(
6141
    const unsigned char* buf, int sz, int format)
6142
0
{
6143
0
    return loadX509orX509REQFromBuffer(buf, sz,
6144
0
            format, CERT_TYPE, NULL, NULL);
6145
0
}
6146
6147
#ifdef WOLFSSL_CERT_REQ
6148
WOLFSSL_X509* wolfSSL_X509_REQ_load_certificate_buffer(
6149
    const unsigned char* buf, int sz, int format)
6150
{
6151
    return loadX509orX509REQFromBuffer(buf, sz,
6152
            format, CERTREQ_TYPE, NULL, NULL);
6153
}
6154
#endif
6155
6156
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL || KEEP_PEER_CERT || \
6157
          SESSION_CERTS */
6158
6159
#if defined(OPENSSL_EXTRA_X509_SMALL) || defined(KEEP_PEER_CERT) || \
6160
    defined(SESSION_CERTS)
6161
/* Smaller subset of X509 compatibility functions. Avoid increasing the size of
6162
 * this subset and its memory usage */
6163
6164
/* returns a pointer to a new WOLFSSL_X509 structure on success and NULL on
6165
 * fail
6166
 */
6167
WOLFSSL_X509* wolfSSL_X509_new_ex(void* heap)
6168
0
{
6169
0
    WOLFSSL_X509* x509;
6170
6171
0
    x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), heap,
6172
0
            DYNAMIC_TYPE_X509);
6173
0
    if (x509 != NULL) {
6174
0
        InitX509(x509, 1, heap);
6175
0
    }
6176
6177
0
    return x509;
6178
0
}
6179
6180
WOLFSSL_X509* wolfSSL_X509_new(void)
6181
0
{
6182
0
    return wolfSSL_X509_new_ex(NULL);
6183
0
}
6184
6185
WOLFSSL_ABI
6186
WOLFSSL_X509_NAME* wolfSSL_X509_get_subject_name(WOLFSSL_X509* cert)
6187
0
{
6188
0
    WOLFSSL_ENTER("wolfSSL_X509_get_subject_name");
6189
0
    if (cert)
6190
0
        return &cert->subject;
6191
0
    return NULL;
6192
0
}
6193
6194
WOLFSSL_ABI
6195
WOLFSSL_X509_NAME* wolfSSL_X509_get_issuer_name(WOLFSSL_X509* cert)
6196
0
{
6197
0
    WOLFSSL_ENTER("wolfSSL_X509_get_issuer_name");
6198
0
    if (cert)
6199
0
        return &cert->issuer;
6200
0
    return NULL;
6201
0
}
6202
6203
6204
int wolfSSL_X509_get_signature_type(WOLFSSL_X509* x509)
6205
0
{
6206
0
    int type = 0;
6207
6208
0
    WOLFSSL_ENTER("wolfSSL_X509_get_signature_type");
6209
6210
0
    if (x509 != NULL)
6211
0
        type = x509->sigOID;
6212
6213
0
    return type;
6214
0
}
6215
6216
#if defined(OPENSSL_EXTRA_X509_SMALL)
6217
6218
int wolfSSL_X509_NAME_get_sz(WOLFSSL_X509_NAME* name)
6219
0
{
6220
0
    WOLFSSL_ENTER("wolfSSL_X509_NAME_get_sz");
6221
0
    if (!name)
6222
0
        return WOLFSSL_FATAL_ERROR;
6223
0
    return name->sz;
6224
0
}
6225
6226
/* Searches for the first ENTRY of type NID
6227
 * idx is the location to start searching from, the value at when the entry was
6228
 *     found is stored into idx
6229
 * returns a pointer to the entry on success and null on fail */
6230
static WOLFSSL_X509_NAME_ENTRY* GetEntryByNID(WOLFSSL_X509_NAME* name, int nid,
6231
        int* idx)
6232
0
{
6233
0
    int i;
6234
0
    WOLFSSL_X509_NAME_ENTRY* ret = NULL;
6235
6236
0
    for (i = *idx; i < MAX_NAME_ENTRIES; i++) {
6237
0
        if (name->entry[i].nid == nid) {
6238
0
            ret = &name->entry[i];
6239
0
            *idx = i;
6240
0
            break;
6241
0
        }
6242
0
    }
6243
0
    return ret;
6244
0
}
6245
6246
6247
/* Used to get a string from the WOLFSSL_X509_NAME structure that
6248
 * corresponds with the NID value passed in. This finds the first entry with
6249
 * matching NID value, if searching for the case where there is multiple
6250
 * entries with the same NID value than other functions should be used
6251
 * (i.e. wolfSSL_X509_NAME_get_index_by_NID, wolfSSL_X509_NAME_get_entry)
6252
 *
6253
 * name structure to get string from
6254
 * nid  NID value to search for
6255
 * buf  [out] buffer to hold results. If NULL then the buffer size minus the
6256
 *      null char is returned.
6257
 * len  size of "buf" passed in
6258
 *
6259
 * returns the length of string found, not including the NULL terminator.
6260
 *         It's possible the function could return a negative value in the
6261
 *         case that len is less than or equal to 0. A negative value is
6262
 *         considered an error case.
6263
 */
6264
int wolfSSL_X509_NAME_get_text_by_NID(WOLFSSL_X509_NAME* name,
6265
                                      int nid, char* buf, int len)
6266
0
{
6267
0
    WOLFSSL_X509_NAME_ENTRY* e;
6268
0
    unsigned char *text = NULL;
6269
0
    int textSz = 0;
6270
0
    int idx    = 0;
6271
6272
0
    WOLFSSL_ENTER("wolfSSL_X509_NAME_get_text_by_NID");
6273
6274
0
    if (name == NULL) {
6275
0
        WOLFSSL_MSG("NULL argument passed in");
6276
0
        return WOLFSSL_FATAL_ERROR;
6277
0
    }
6278
6279
0
    e = GetEntryByNID(name, nid, &idx);
6280
0
    if (e == NULL) {
6281
0
        WOLFSSL_MSG("Entry type not found");
6282
0
        return WOLFSSL_FATAL_ERROR;
6283
0
    }
6284
0
    text   = wolfSSL_ASN1_STRING_data(e->value);
6285
0
    textSz = wolfSSL_ASN1_STRING_length(e->value);
6286
6287
0
    if (text == NULL) {
6288
0
        WOLFSSL_MSG("Unable to get entry text");
6289
0
        return WOLFSSL_FATAL_ERROR;
6290
0
    }
6291
6292
    /* if buf is NULL return size of buffer needed (minus null char) */
6293
0
    if (buf == NULL) {
6294
0
        WOLFSSL_MSG("Buffer is NULL, returning buffer size only");
6295
0
        return textSz;
6296
0
    }
6297
0
    if (len <= 0) {
6298
0
        return 0;
6299
0
    }
6300
6301
    /* + 1 to account for null char */
6302
0
    textSz = (int)min((word32)textSz + 1, (word32)len);
6303
0
    if (textSz > 0) {
6304
0
        XMEMCPY(buf, text, textSz - 1);
6305
0
        buf[textSz - 1] = '\0';
6306
0
    }
6307
6308
0
    WOLFSSL_LEAVE("wolfSSL_X509_NAME_get_text_by_NID", textSz);
6309
0
    return (textSz - 1); /* do not include null character in size */
6310
0
}
6311
6312
/* Creates a new WOLFSSL_EVP_PKEY structure that has the public key from x509
6313
 *
6314
 * returns a pointer to the created WOLFSSL_EVP_PKEY on success and NULL on fail
6315
 */
6316
WOLFSSL_EVP_PKEY* wolfSSL_X509_get_pubkey(WOLFSSL_X509* x509)
6317
0
{
6318
0
    WOLFSSL_EVP_PKEY* key = NULL;
6319
0
    int ret = 0;
6320
6321
0
    (void)ret;
6322
6323
0
    WOLFSSL_ENTER("wolfSSL_X509_get_pubkey");
6324
0
    if (x509 != NULL) {
6325
0
        key = wolfSSL_EVP_PKEY_new_ex(x509->heap);
6326
0
        if (key != NULL) {
6327
0
            if (x509->pubKeyOID == RSAk) {
6328
0
                key->type = WC_EVP_PKEY_RSA;
6329
0
            }
6330
0
            else if (x509->pubKeyOID == DSAk) {
6331
0
                key->type = WC_EVP_PKEY_DSA;
6332
0
            }
6333
0
            else {
6334
0
                key->type = WC_EVP_PKEY_EC;
6335
0
            }
6336
0
            key->save_type = 0;
6337
0
            key->pkey.ptr = (char*)XMALLOC(
6338
0
                        x509->pubKey.length, x509->heap,
6339
0
                                                       DYNAMIC_TYPE_PUBLIC_KEY);
6340
0
            if (key->pkey.ptr == NULL) {
6341
0
                wolfSSL_EVP_PKEY_free(key);
6342
0
                return NULL;
6343
0
            }
6344
0
            XMEMCPY(key->pkey.ptr, x509->pubKey.buffer, x509->pubKey.length);
6345
0
            key->pkey_sz = (int)x509->pubKey.length;
6346
6347
0
            #ifdef HAVE_ECC
6348
0
                key->pkey_curve = (int)x509->pkCurveOID;
6349
0
            #endif /* HAVE_ECC */
6350
6351
            /* decode RSA key */
6352
0
            #ifndef NO_RSA
6353
0
            if (key->type == WC_EVP_PKEY_RSA) {
6354
0
                key->ownRsa = 1;
6355
0
                key->rsa = wolfSSL_RSA_new();
6356
0
                if (key->rsa == NULL) {
6357
0
                    wolfSSL_EVP_PKEY_free(key);
6358
0
                    return NULL;
6359
0
                }
6360
6361
0
                if (wolfSSL_RSA_LoadDer_ex(key->rsa,
6362
0
                            (const unsigned char*)key->pkey.ptr, key->pkey_sz,
6363
0
                            WOLFSSL_RSA_LOAD_PUBLIC) != WOLFSSL_SUCCESS) {
6364
0
                    wolfSSL_EVP_PKEY_free(key);
6365
0
                    return NULL;
6366
0
                }
6367
0
            }
6368
0
            #endif /* NO_RSA */
6369
6370
            /* decode ECC key */
6371
0
            #if defined(HAVE_ECC) && defined(OPENSSL_EXTRA)
6372
0
            if (key->type == WC_EVP_PKEY_EC) {
6373
0
                word32 idx = 0;
6374
6375
0
                key->ownEcc = 1;
6376
0
                key->ecc = wolfSSL_EC_KEY_new();
6377
0
                if (key->ecc == NULL || key->ecc->internal == NULL) {
6378
0
                    wolfSSL_EVP_PKEY_free(key);
6379
0
                    return NULL;
6380
0
                }
6381
6382
                /* not using wolfSSL_EC_KEY_LoadDer because public key in x509
6383
                 * is in the format of x963 (no sequence at start of buffer) */
6384
0
                ret = wc_EccPublicKeyDecode((const unsigned char*)key->pkey.ptr,
6385
0
                                            &idx, (ecc_key*)key->ecc->internal,
6386
0
                                            key->pkey_sz);
6387
0
                if (ret < 0) {
6388
0
                    WOLFSSL_ERROR_VERBOSE(ret);
6389
0
                    WOLFSSL_MSG("wc_EccPublicKeyDecode failed");
6390
0
                    wolfSSL_EVP_PKEY_free(key);
6391
0
                    return NULL;
6392
0
                }
6393
6394
0
                if (SetECKeyExternal(key->ecc) != WOLFSSL_SUCCESS) {
6395
0
                    WOLFSSL_MSG("SetECKeyExternal failed");
6396
0
                    wolfSSL_EVP_PKEY_free(key);
6397
0
                    return NULL;
6398
0
                }
6399
6400
0
                key->ecc->inSet = 1;
6401
0
            }
6402
0
            #endif /* HAVE_ECC && OPENSSL_EXTRA */
6403
6404
            #ifndef NO_DSA
6405
            if (key->type == WC_EVP_PKEY_DSA) {
6406
                key->ownDsa = 1;
6407
                key->dsa = wolfSSL_DSA_new();
6408
                if (key->dsa == NULL) {
6409
                    wolfSSL_EVP_PKEY_free(key);
6410
                    return NULL;
6411
                }
6412
6413
                if (wolfSSL_DSA_LoadDer_ex(key->dsa,
6414
                            (const unsigned char*)key->pkey.ptr, key->pkey_sz, \
6415
                            WOLFSSL_DSA_LOAD_PUBLIC) != WOLFSSL_SUCCESS) {
6416
                    wolfSSL_DSA_free(key->dsa);
6417
                    key->dsa = NULL;
6418
                    wolfSSL_EVP_PKEY_free(key);
6419
                    return NULL;
6420
                }
6421
            }
6422
            #endif /* NO_DSA */
6423
0
        }
6424
0
    }
6425
0
    return key;
6426
0
}
6427
#endif /* OPENSSL_EXTRA_X509_SMALL */
6428
6429
/* End of smaller subset of X509 compatibility functions. Avoid increasing the
6430
 * size of this subset and its memory usage */
6431
#endif /* OPENSSL_EXTRA_X509_SMALL || KEEP_PEER_CERT || SESSION_CERTS */
6432
6433
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)
6434
/*
6435
 * Converts a and b to DER and then does an XMEMCMP to check if they match.
6436
 * Returns 0 when certificates match and WOLFSSL_FATAL_ERROR when they don't.
6437
 */
6438
int wolfSSL_X509_cmp(const WOLFSSL_X509 *a, const WOLFSSL_X509 *b)
6439
0
{
6440
0
        const byte* derA;
6441
0
        const byte* derB;
6442
0
        int outSzA = 0;
6443
0
        int outSzB = 0;
6444
6445
0
        if (a == NULL || b == NULL) {
6446
0
            return BAD_FUNC_ARG;
6447
0
        }
6448
6449
0
        derA = wolfSSL_X509_get_der((WOLFSSL_X509*)a, &outSzA);
6450
0
        if (derA == NULL) {
6451
0
            WOLFSSL_MSG("wolfSSL_X509_get_der - certificate A has failed");
6452
0
            return WOLFSSL_FATAL_ERROR;
6453
0
        }
6454
0
        derB = wolfSSL_X509_get_der((WOLFSSL_X509*)b, &outSzB);
6455
0
        if (derB == NULL) {
6456
0
            WOLFSSL_MSG("wolfSSL_X509_get_der - certificate B has failed");
6457
0
            return WOLFSSL_FATAL_ERROR;
6458
0
        }
6459
6460
0
        if (outSzA != outSzB || XMEMCMP(derA, derB, outSzA) != 0) {
6461
0
            WOLFSSL_LEAVE("wolfSSL_X509_cmp", WOLFSSL_FATAL_ERROR);
6462
0
            return WOLFSSL_FATAL_ERROR;
6463
0
        }
6464
6465
0
        WOLFSSL_LEAVE("wolfSSL_X509_cmp", 0);
6466
6467
0
        return 0;
6468
0
    }
6469
#endif /* OPENSSL_ALL */
6470
6471
#if defined(OPENSSL_EXTRA)
6472
    int wolfSSL_X509_ext_isSet_by_NID(WOLFSSL_X509* x509, int nid)
6473
0
    {
6474
0
        int isSet = 0;
6475
6476
0
        WOLFSSL_ENTER("wolfSSL_X509_ext_isSet_by_NID");
6477
6478
0
        if (x509 != NULL) {
6479
0
            switch (nid) {
6480
0
                case WC_NID_basic_constraints:
6481
0
                    isSet = x509->basicConstSet; break;
6482
0
                case WC_NID_subject_alt_name:
6483
0
                    isSet = x509->subjAltNameSet; break;
6484
0
                case WC_NID_authority_key_identifier:
6485
0
                    isSet = x509->authKeyIdSet; break;
6486
0
                case WC_NID_subject_key_identifier:
6487
0
                    isSet = x509->subjKeyIdSet; break;
6488
0
                case WC_NID_key_usage:
6489
0
                    isSet = x509->keyUsageSet; break;
6490
0
                case WC_NID_crl_distribution_points:
6491
0
                    isSet = x509->CRLdistSet; break;
6492
0
                case WC_NID_ext_key_usage:
6493
0
                    isSet = ((x509->extKeyUsageSrc) ? 1 : 0); break;
6494
0
                case WC_NID_info_access:
6495
0
                    isSet = x509->authInfoSet; break;
6496
0
            #if defined(WOLFSSL_SEP) || defined(WOLFSSL_QT)
6497
0
                case WC_NID_certificate_policies:
6498
0
                    isSet = x509->certPolicySet; break;
6499
0
            #endif /* WOLFSSL_SEP || WOLFSSL_QT */
6500
0
                default:
6501
0
                    WOLFSSL_MSG("NID not in table");
6502
0
            }
6503
0
        }
6504
6505
0
        WOLFSSL_LEAVE("wolfSSL_X509_ext_isSet_by_NID", isSet);
6506
6507
0
        return isSet;
6508
0
    }
6509
6510
6511
    int wolfSSL_X509_ext_get_critical_by_NID(WOLFSSL_X509* x509, int nid)
6512
0
    {
6513
0
        int crit = 0;
6514
6515
0
        WOLFSSL_ENTER("wolfSSL_X509_ext_get_critical_by_NID");
6516
6517
0
        if (x509 != NULL) {
6518
0
            switch (nid) {
6519
0
                case WC_NID_basic_constraints:
6520
0
                    crit = x509->basicConstCrit; break;
6521
0
                case WC_NID_subject_alt_name:
6522
0
                    crit = x509->subjAltNameCrit; break;
6523
0
                case WC_NID_authority_key_identifier:
6524
0
                    crit = x509->authKeyIdCrit; break;
6525
0
                case WC_NID_subject_key_identifier:
6526
0
                    crit = x509->subjKeyIdCrit; break;
6527
0
                case WC_NID_key_usage:
6528
0
                    crit = x509->keyUsageCrit; break;
6529
0
                case WC_NID_crl_distribution_points:
6530
0
                    crit= x509->CRLdistCrit; break;
6531
0
                case WC_NID_ext_key_usage:
6532
0
                    crit= x509->extKeyUsageCrit; break;
6533
0
            #ifdef WOLFSSL_SEP
6534
0
                case WC_NID_certificate_policies:
6535
0
                    crit = x509->certPolicyCrit; break;
6536
0
            #endif /* WOLFSSL_SEP */
6537
0
            }
6538
0
        }
6539
6540
0
        WOLFSSL_LEAVE("wolfSSL_X509_ext_get_critical_by_NID", crit);
6541
6542
0
        return crit;
6543
0
    }
6544
6545
6546
    int wolfSSL_X509_get_isSet_pathLength(WOLFSSL_X509* x509)
6547
0
    {
6548
0
        int isSet = 0;
6549
6550
0
        WOLFSSL_ENTER("wolfSSL_X509_get_isSet_pathLength");
6551
6552
0
        if (x509 != NULL)
6553
0
            isSet = x509->basicConstPlSet;
6554
6555
0
        WOLFSSL_LEAVE("wolfSSL_X509_get_isSet_pathLength", isSet);
6556
6557
0
        return isSet;
6558
0
    }
6559
6560
6561
    word32 wolfSSL_X509_get_pathLength(WOLFSSL_X509* x509)
6562
0
    {
6563
0
        word32 pathLength = 0;
6564
6565
0
        WOLFSSL_ENTER("wolfSSL_X509_get_pathLength");
6566
6567
0
        if (x509 != NULL)
6568
0
            pathLength = x509->pathLength;
6569
6570
0
        WOLFSSL_LEAVE("wolfSSL_X509_get_pathLength", pathLength);
6571
6572
0
        return pathLength;
6573
0
    }
6574
6575
6576
    unsigned int wolfSSL_X509_get_keyUsage(WOLFSSL_X509* x509)
6577
0
    {
6578
0
        word16 usage = 0;
6579
6580
0
        WOLFSSL_ENTER("wolfSSL_X509_get_keyUsage");
6581
6582
0
        if (x509 != NULL)
6583
0
            usage = x509->keyUsage;
6584
6585
0
        WOLFSSL_LEAVE("wolfSSL_X509_get_keyUsage", usage);
6586
6587
0
        return usage;
6588
0
    }
6589
6590
6591
    byte* wolfSSL_X509_get_authorityKeyID(WOLFSSL_X509* x509,
6592
                                          byte* dst, int* dstLen)
6593
0
    {
6594
0
        byte *id = NULL;
6595
0
        int copySz = 0;
6596
6597
0
        WOLFSSL_ENTER("wolfSSL_X509_get_authorityKeyID");
6598
6599
0
        if (x509 != NULL) {
6600
0
            if (x509->authKeyIdSet) {
6601
0
                copySz = (int)min(dstLen != NULL ? (word32)*dstLen : 0,
6602
0
                                  x509->authKeyIdSz);
6603
0
                id = x509->authKeyId;
6604
0
            }
6605
6606
0
            if (dst != NULL && dstLen != NULL && id != NULL && copySz > 0) {
6607
0
                XMEMCPY(dst, id, copySz);
6608
0
                id = dst;
6609
0
                *dstLen = copySz;
6610
0
            }
6611
0
        }
6612
6613
0
        WOLFSSL_LEAVE("wolfSSL_X509_get_authorityKeyID", copySz);
6614
6615
0
        return id;
6616
0
    }
6617
6618
    byte* wolfSSL_X509_get_subjectKeyID(WOLFSSL_X509* x509,
6619
                                        byte* dst, int* dstLen)
6620
0
    {
6621
0
        byte *id = NULL;
6622
0
        int copySz = 0;
6623
6624
0
        WOLFSSL_ENTER("wolfSSL_X509_get_subjectKeyID");
6625
6626
0
        if (x509 != NULL) {
6627
0
            if (x509->subjKeyIdSet) {
6628
0
                copySz = (int)min(dstLen != NULL ? (word32) *dstLen : 0,
6629
0
                                  x509->subjKeyIdSz);
6630
0
                id = x509->subjKeyId;
6631
0
            }
6632
6633
0
            if (dst != NULL && dstLen != NULL && id != NULL && copySz > 0) {
6634
0
                XMEMCPY(dst, id, copySz);
6635
0
                id = dst;
6636
0
                *dstLen = copySz;
6637
0
            }
6638
0
        }
6639
6640
0
        WOLFSSL_LEAVE("wolfSSL_X509_get_subjectKeyID", copySz);
6641
6642
0
        return id;
6643
0
    }
6644
6645
    const WOLFSSL_ASN1_STRING *wolfSSL_X509_get0_subject_key_id(
6646
            WOLFSSL_X509 *x509)
6647
0
    {
6648
0
        WOLFSSL_ASN1_STRING* ret = NULL;
6649
6650
0
        WOLFSSL_ENTER("wolfSSL_X509_get0_subject_key_id");
6651
6652
0
        if (x509 != NULL && x509->subjKeyIdSet) {
6653
0
            if (x509->subjKeyIdStr == NULL) {
6654
0
                x509->subjKeyIdStr = wolfSSL_ASN1_STRING_new();
6655
0
                if (x509->subjKeyIdStr != NULL) {
6656
0
                    if (wolfSSL_ASN1_STRING_set(x509->subjKeyIdStr,
6657
0
                            x509->subjKeyId, x509->subjKeyIdSz) == 1) {
6658
0
                    }
6659
0
                    else {
6660
0
                        wolfSSL_ASN1_STRING_free(x509->subjKeyIdStr);
6661
0
                        x509->subjKeyIdStr = NULL;
6662
0
                    }
6663
0
                }
6664
0
            }
6665
0
            ret = x509->subjKeyIdStr;
6666
0
        }
6667
6668
0
        WOLFSSL_LEAVE("wolfSSL_X509_get0_subject_key_id", ret != NULL);
6669
6670
0
        return ret;
6671
0
    }
6672
#endif /* OPENSSL_EXTRA */
6673
6674
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
6675
    defined(OPENSSL_EXTRA_X509_SMALL)
6676
6677
    /* Looks up the index of the first entry encountered with matching NID
6678
     * The search starts from index 'pos'
6679
     * returns a negative value on failure and positive index value on success*/
6680
    int wolfSSL_X509_NAME_get_index_by_NID(WOLFSSL_X509_NAME* name,
6681
                                          int nid, int pos)
6682
0
    {
6683
0
        int value = nid, i;
6684
6685
0
        WOLFSSL_ENTER("wolfSSL_X509_NAME_get_index_by_NID");
6686
6687
0
        if (name == NULL) {
6688
0
            return BAD_FUNC_ARG;
6689
0
        }
6690
6691
0
        i = pos + 1; /* start search after index passed in */
6692
0
        if (i < 0) {
6693
0
            i = 0;
6694
0
        }
6695
6696
0
        for (;i < name->entrySz && i < MAX_NAME_ENTRIES; i++) {
6697
0
            if (name->entry[i].nid == value) {
6698
0
                return i;
6699
0
            }
6700
0
        }
6701
0
        return WOLFSSL_FATAL_ERROR;
6702
0
    }
6703
6704
6705
    WOLFSSL_ASN1_STRING*  wolfSSL_X509_NAME_ENTRY_get_data(
6706
                                                    WOLFSSL_X509_NAME_ENTRY* in)
6707
0
    {
6708
0
        WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_get_data");
6709
0
        if (in == NULL)
6710
0
            return NULL;
6711
6712
0
        return in->value;
6713
0
    }
6714
6715
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
6716
6717
#ifdef OPENSSL_EXTRA
6718
#ifndef NO_BIO
6719
6720
#ifndef MAX_WIDTH
6721
0
    #define MAX_WIDTH 80
6722
#endif
6723
6724
0
#define ACERT_NUM_DIR_TAGS 4
6725
6726
/* Convenience struct and function for printing the Holder sub fields
6727
 * of an X509 Attribute struct. */
6728
struct acert_dir_print_t {
6729
    const char * pfx;
6730
    const byte   tag[3];
6731
};
6732
6733
static struct acert_dir_print_t acert_dir_print[ACERT_NUM_DIR_TAGS] =
6734
{
6735
    { "C=", {0x55, 0x04, ASN_COUNTRY_NAME} },
6736
    { "O=", {0x55, 0x04, ASN_ORG_NAME} },
6737
    { "OU=", {0x55, 0x04, ASN_ORGUNIT_NAME} },
6738
    { "CN=", {0x55, 0x04, ASN_COMMON_NAME} },
6739
};
6740
6741
/* Print an entry of ASN_DIR_TYPE into dst of length max_len.
6742
 *
6743
 * Returns total_len of str on success.
6744
 * Returns < 0 on failure.
6745
 * */
6746
static int X509PrintDirType(char * dst, int max_len, const DNS_entry * entry)
6747
0
{
6748
0
    word32       k = 0;
6749
0
    word32       i = 0;
6750
0
    const char * src = entry->name;
6751
0
    word32       src_len = (word32)XSTRLEN(src);
6752
0
    int          total_len = 0;
6753
0
    int          bytes_left = max_len;
6754
0
    int          fld_len = 0;
6755
0
    int          match_found = 0;
6756
6757
0
    XMEMSET(dst, 0, max_len);
6758
6759
    /* loop over printable DIR tags. */
6760
0
    for (k = 0; k < ACERT_NUM_DIR_TAGS; ++k) {
6761
0
        const char * pfx = acert_dir_print[k].pfx;
6762
0
        const byte * tag = acert_dir_print[k].tag;
6763
0
        byte         asn_tag;
6764
6765
        /* walk through entry looking for matches. */
6766
0
        for (i = 0; i < src_len - 5; ++i) {
6767
0
            if (XMEMCMP(tag, &src[i], 3) == 0) {
6768
0
                if (bytes_left < 5) {
6769
                    /* Not enough space left for name oid + tag + len. */
6770
0
                    break;
6771
0
                }
6772
6773
0
                if (match_found) {
6774
                    /* append a {',', ' '} before doing anything else. */
6775
0
                    *dst++ = ',';
6776
0
                    *dst++ = ' ';
6777
0
                    total_len += 2;
6778
0
                    bytes_left -= 2;
6779
0
                }
6780
6781
0
                i += 3;
6782
6783
                /* Get the ASN Tag. */
6784
0
                if (GetASNTag((const byte *)src, &i, &asn_tag, src_len) < 0) {
6785
0
                    WOLFSSL_MSG("error: GetASNTag failed");
6786
0
                    break;
6787
0
                }
6788
6789
                /* Check it is printable. */
6790
0
                if ((asn_tag != ASN_PRINTABLE_STRING) &&
6791
0
                    (asn_tag != ASN_IA5_STRING) &&
6792
0
                    (asn_tag != ASN_UTF8STRING)) {
6793
                    /* Don't know what this is but we can't print it. */
6794
0
                    WOLFSSL_MSG("error: asn tag not printable string");
6795
0
                    break;
6796
0
                }
6797
6798
                /* Now get the length of the printable string. */
6799
0
                if (GetLength((const byte *)src, &i, &fld_len, src_len) < 0) {
6800
0
                    break;
6801
0
                }
6802
6803
                /* Make sure we have space to fit it. */
6804
0
                if ((int) XSTRLEN(pfx) > bytes_left) {
6805
                    /* Not enough space left. */
6806
0
                    break;
6807
0
                }
6808
6809
                /* Copy it in, decrement available space. */
6810
0
                XSTRNCPY(dst, pfx, bytes_left);
6811
0
                dst += XSTRLEN(pfx);
6812
0
                total_len += (int)XSTRLEN(pfx);
6813
0
                bytes_left -= (int)XSTRLEN(pfx);
6814
6815
0
                if (fld_len > bytes_left) {
6816
                    /* Not enough space left. */
6817
0
                    break;
6818
0
                }
6819
6820
0
                XMEMCPY(dst, &src[i], fld_len);
6821
0
                i += fld_len;
6822
0
                dst += fld_len;
6823
0
                total_len += fld_len;
6824
0
                bytes_left -= fld_len;
6825
6826
0
                match_found = 1;
6827
0
            }
6828
0
        }
6829
0
    }
6830
6831
0
    return total_len;
6832
0
}
6833
static int X509_print_name_entry(WOLFSSL_BIO* bio,
6834
                                 const DNS_entry* entry, int indent)
6835
0
{
6836
0
    int  ret = WOLFSSL_SUCCESS;
6837
0
    int  nameCount = 0;
6838
0
    char scratch[MAX_WIDTH];
6839
0
    int  len;
6840
6841
0
    if (bio == NULL || entry == NULL) {
6842
0
        return WOLFSSL_FAILURE;
6843
0
    }
6844
6845
0
    len = XSNPRINTF(scratch, MAX_WIDTH, "%*s", indent, "");
6846
0
    if (len >= MAX_WIDTH) {
6847
0
        return WOLFSSL_FAILURE;
6848
0
    }
6849
6850
0
    if (wolfSSL_BIO_write(bio, scratch, (int)XSTRLEN(scratch)) <= 0) {
6851
0
        return WOLFSSL_FAILURE;
6852
0
    }
6853
6854
0
    while (entry != NULL) {
6855
0
        ++nameCount;
6856
0
        if (nameCount > 1) {
6857
0
            if (wolfSSL_BIO_write(bio, ", ", 2) <= 0) {
6858
0
                ret = WOLFSSL_FAILURE;
6859
0
                break;
6860
0
            }
6861
0
        }
6862
6863
0
        if (entry->type == ASN_DNS_TYPE) {
6864
0
            len = XSNPRINTF(scratch, MAX_WIDTH, "DNS:%s", entry->name);
6865
0
        }
6866
0
    #if defined(OPENSSL_ALL) || defined(WOLFSSL_IP_ALT_NAME)
6867
0
        else if (entry->type == ASN_IP_TYPE) {
6868
0
            len = XSNPRINTF(scratch, MAX_WIDTH, "IP Address:%s",
6869
0
                    entry->ipString);
6870
0
        }
6871
0
    #endif /* OPENSSL_ALL || WOLFSSL_IP_ALT_NAME */
6872
0
        else if (entry->type == ASN_RFC822_TYPE) {
6873
0
            len = XSNPRINTF(scratch, MAX_WIDTH, "email:%s",
6874
0
                    entry->name);
6875
0
        }
6876
0
        else if (entry->type == ASN_DIR_TYPE) {
6877
0
            len = X509PrintDirType(scratch, MAX_WIDTH, entry);
6878
0
        }
6879
0
        else if (entry->type == ASN_URI_TYPE) {
6880
0
            len = XSNPRINTF(scratch, MAX_WIDTH, "URI:%s",
6881
0
                entry->name);
6882
0
        }
6883
0
    #if defined(OPENSSL_ALL)
6884
0
        else if (entry->type == ASN_RID_TYPE) {
6885
0
            len = XSNPRINTF(scratch, MAX_WIDTH, "Registered ID:%s",
6886
0
                entry->ridString);
6887
0
        }
6888
0
    #endif
6889
0
        else if (entry->type == ASN_OTHER_TYPE) {
6890
0
            len = XSNPRINTF(scratch, MAX_WIDTH,
6891
0
                "othername <unsupported>");
6892
0
        }
6893
0
        else {
6894
0
            WOLFSSL_MSG("Bad alt name type.");
6895
0
            ret = WOLFSSL_FAILURE;
6896
0
            break;
6897
0
        }
6898
0
        if (len >= MAX_WIDTH) {
6899
0
            ret = WOLFSSL_FAILURE;
6900
0
            break;
6901
0
        }
6902
0
        if (wolfSSL_BIO_write(bio, scratch, (int)XSTRLEN(scratch))
6903
0
                <= 0) {
6904
0
            ret = WOLFSSL_FAILURE;
6905
0
            break;
6906
0
        }
6907
6908
0
        entry = entry->next;
6909
0
    }
6910
6911
0
    if (ret == WOLFSSL_SUCCESS && wolfSSL_BIO_write(bio, "\n", 1) <= 0) {
6912
0
        ret = WOLFSSL_FAILURE;
6913
0
    }
6914
6915
0
    return ret;
6916
0
}
6917
6918
#ifdef XSNPRINTF
6919
static int X509PrintKeyUsage(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int indent)
6920
0
{
6921
0
    int ret = WOLFSSL_SUCCESS;
6922
0
    const int usages[] = {
6923
0
        KEYUSE_DIGITAL_SIG,
6924
0
        KEYUSE_CONTENT_COMMIT,
6925
0
        KEYUSE_KEY_ENCIPHER,
6926
0
        KEYUSE_DATA_ENCIPHER,
6927
0
        KEYUSE_KEY_AGREE,
6928
0
        KEYUSE_KEY_CERT_SIGN,
6929
0
        KEYUSE_CRL_SIGN,
6930
0
        KEYUSE_ENCIPHER_ONLY,
6931
0
        KEYUSE_DECIPHER_ONLY
6932
0
    };
6933
0
    const char* usageStrs[] = {
6934
0
        "Digital Signature",
6935
0
        "Non Repudiation",
6936
0
        "Key Encipherment",
6937
0
        "Data Encipherment",
6938
0
        "Key Agreement",
6939
0
        "Certificate Sign",
6940
0
        "CRL Sign",
6941
0
        "Encipher Only",
6942
0
        "Decipher Only"
6943
0
    };
6944
6945
0
    if (indent < 0) indent = 0;
6946
0
    if (indent > MAX_INDENT) indent = MAX_INDENT;
6947
6948
0
    if (bio == NULL || x509 == NULL) {
6949
0
        ret = WOLFSSL_FAILURE;
6950
0
    }
6951
6952
0
    if (ret == WOLFSSL_SUCCESS && x509->keyUsageSet && x509->keyUsage != 0) {
6953
0
        char scratch[MAX_WIDTH];
6954
0
        int len;
6955
0
        word32 i = 0;
6956
0
        int usageCount = 0;
6957
6958
0
        len = XSNPRINTF(scratch, MAX_WIDTH, "%*s", indent, "");
6959
0
        if (len >= MAX_WIDTH)
6960
0
            ret = WOLFSSL_FAILURE;
6961
0
        if (ret == WOLFSSL_SUCCESS) {
6962
0
            if (wolfSSL_BIO_write(bio, scratch, (int)XSTRLEN(scratch)) <= 0) {
6963
0
                ret = WOLFSSL_FAILURE;
6964
0
            }
6965
0
        }
6966
0
        for (; ret == WOLFSSL_SUCCESS && i < sizeof(usages) / sizeof(usages[i]);
6967
0
             i++) {
6968
0
            if (x509->keyUsage & usages[i]) {
6969
0
                ++usageCount;
6970
0
                if (usageCount > 1 && wolfSSL_BIO_write(bio, ", ", 2) <= 0) {
6971
0
                    ret = WOLFSSL_FAILURE;
6972
0
                    break;
6973
0
                }
6974
0
                if (wolfSSL_BIO_write(bio, usageStrs[i],
6975
0
                                      (int)XSTRLEN(usageStrs[i])) <= 0) {
6976
0
                    ret = WOLFSSL_FAILURE;
6977
0
                    break;
6978
0
                }
6979
0
            }
6980
0
        }
6981
0
        if (ret == WOLFSSL_SUCCESS && wolfSSL_BIO_write(bio, "\n", 1) <= 0) {
6982
0
            ret = WOLFSSL_FAILURE;
6983
0
        }
6984
0
    }
6985
6986
0
    return ret;
6987
0
}
6988
6989
static int X509PrintExtendedKeyUsage(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
6990
        int indent)
6991
0
{
6992
0
    int ret = WOLFSSL_SUCCESS;
6993
0
    const int usages[] = {
6994
0
        EXTKEYUSE_OCSP_SIGN,
6995
0
        EXTKEYUSE_TIMESTAMP,
6996
0
        EXTKEYUSE_EMAILPROT,
6997
0
        EXTKEYUSE_CODESIGN,
6998
0
        EXTKEYUSE_CLIENT_AUTH,
6999
0
        EXTKEYUSE_SERVER_AUTH
7000
0
    };
7001
0
    const char* usageStrs[] = {
7002
0
        "OCSP Signing",
7003
0
        "Time Stamping",
7004
0
        "E-mail Protection",
7005
0
        "Code Signing",
7006
0
        "TLS Web Client Authentication",
7007
0
        "TLS Web Server Authentication"
7008
0
    };
7009
7010
0
    if (bio == NULL || x509 == NULL) {
7011
0
        ret = WOLFSSL_FAILURE;
7012
0
    }
7013
7014
0
    if (ret == WOLFSSL_SUCCESS && x509->extKeyUsageCount > 0
7015
0
            && x509->extKeyUsage != 0) {
7016
0
        char scratch[MAX_WIDTH];
7017
0
        int len;
7018
0
        word32 i = 0;
7019
0
        int usageCount = 0;
7020
7021
0
        len = XSNPRINTF(scratch, MAX_WIDTH, "%*s", indent, "");
7022
0
        if (len >= MAX_WIDTH)
7023
0
            ret = WOLFSSL_FAILURE;
7024
0
        if (ret == WOLFSSL_SUCCESS) {
7025
0
            if (wolfSSL_BIO_write(bio, scratch, (int)XSTRLEN(scratch)) <= 0) {
7026
0
                ret = WOLFSSL_FAILURE;
7027
0
            }
7028
0
        }
7029
0
        for (; ret == WOLFSSL_SUCCESS && i < sizeof(usages) / sizeof(usages[i]);
7030
0
             i++) {
7031
0
            if (x509->extKeyUsage & usages[i]) {
7032
0
                ++usageCount;
7033
0
                if (usageCount > 1 && wolfSSL_BIO_write(bio, ", ", 2) <= 0) {
7034
0
                    ret = WOLFSSL_FAILURE;
7035
0
                    break;
7036
0
                }
7037
0
                if (wolfSSL_BIO_write(bio, usageStrs[i],
7038
0
                                      (int)XSTRLEN(usageStrs[i])) <= 0) {
7039
0
                    ret = WOLFSSL_FAILURE;
7040
0
                    break;
7041
0
                }
7042
0
            }
7043
0
        }
7044
0
        if (ret == WOLFSSL_SUCCESS && wolfSSL_BIO_write(bio, "\n", 1) <= 0) {
7045
0
            ret = WOLFSSL_FAILURE;
7046
0
        }
7047
0
    }
7048
7049
0
    return ret;
7050
0
}
7051
7052
7053
/* print serial number out
7054
 * return WOLFSSL_SUCCESS on success
7055
 */
7056
static int X509PrintSerial_ex(WOLFSSL_BIO* bio, byte* serial, int sz,
7057
        int delimiter, int indent)
7058
0
{
7059
0
    char scratch[MAX_WIDTH];
7060
0
    const int scratchSz = sizeof(scratch);
7061
0
    int scratchLen;
7062
7063
0
    if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*sSerial Number:",
7064
0
                                 indent, "")) >= MAX_WIDTH) {
7065
0
        WOLFSSL_MSG("buffer overrun");
7066
0
        return WOLFSSL_FAILURE;
7067
0
    }
7068
0
    if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7069
0
        return WOLFSSL_FAILURE;
7070
0
    }
7071
7072
0
    if (sz > (int)sizeof(byte)) {
7073
0
        int i;
7074
7075
        /* serial is larger than int size so print off hex values */
7076
0
        if ((scratchLen = XSNPRINTF(
7077
0
                 scratch, MAX_WIDTH, "\n%*s", indent + 4, ""))
7078
0
                >= MAX_WIDTH) {
7079
0
            WOLFSSL_MSG("buffer overrun");
7080
0
            return WOLFSSL_FAILURE;
7081
0
        }
7082
0
        for (i = 0; i < sz; i++) {
7083
0
            int valLen;
7084
7085
0
            if ((valLen = XSNPRINTF(
7086
0
                     scratch + scratchLen, scratchSz - scratchLen,
7087
0
                     "%02x%s", serial[i], (i < sz - 1) ?
7088
0
                     (delimiter ? ":" : "") : "\n"))
7089
0
                >= scratchSz - scratchLen) {
7090
0
                WOLFSSL_MSG("buffer overrun");
7091
0
                return WOLFSSL_FAILURE;
7092
0
            }
7093
0
            scratchLen += valLen;
7094
0
        }
7095
0
        if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7096
0
            return WOLFSSL_FAILURE;
7097
0
        }
7098
0
    }
7099
7100
    /* if serial can fit into byte then print on the same line */
7101
0
    else  {
7102
0
        if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, " %d (0x%x)\n",
7103
0
                (char)serial[0], serial[0])) >= MAX_WIDTH) {
7104
0
            WOLFSSL_MSG("buffer overrun");
7105
0
            return WOLFSSL_FAILURE;
7106
0
        }
7107
0
        if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7108
0
            return WOLFSSL_FAILURE;
7109
0
        }
7110
0
    }
7111
0
    return WOLFSSL_SUCCESS;
7112
0
}
7113
7114
static int X509PrintSerial(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int indent)
7115
0
{
7116
0
    unsigned char serial[32];
7117
0
    int  sz = sizeof(serial);
7118
7119
0
    if (indent < 0) indent = 0;
7120
0
    if (indent > MAX_INDENT) indent = MAX_INDENT;
7121
7122
0
    XMEMSET(serial, 0, sz);
7123
0
    if (wolfSSL_X509_get_serial_number(x509, serial, &sz) == WOLFSSL_SUCCESS) {
7124
0
        X509PrintSerial_ex(bio, serial, sz, 1, indent);
7125
0
    }
7126
0
    return WOLFSSL_SUCCESS;
7127
0
}
7128
7129
#ifndef NO_ASN_TIME
7130
static int X509PrintValidity(WOLFSSL_BIO* bio, WOLFSSL_ASN1_TIME * notBefore,
7131
                             WOLFSSL_ASN1_TIME * notAfter, int indent)
7132
0
{
7133
0
    char tmp[80];
7134
0
    (void) indent;
7135
7136
0
    if (wolfSSL_BIO_write(bio, "        Validity\n",
7137
0
                  (int)XSTRLEN("        Validity\n")) <= 0) {
7138
0
        return WOLFSSL_FAILURE;
7139
0
    }
7140
7141
0
    if (wolfSSL_BIO_write(bio, "            Not Before: ",
7142
0
                  (int)XSTRLEN("            Not Before: ")) <= 0) {
7143
0
        return WOLFSSL_FAILURE;
7144
0
    }
7145
0
    if (notBefore->length > 0) {
7146
0
        if (GetTimeString(notBefore->data, ASN_UTC_TIME,
7147
0
            tmp, sizeof(tmp), notBefore->length) != WOLFSSL_SUCCESS) {
7148
0
            if (GetTimeString(notBefore->data, ASN_GENERALIZED_TIME,
7149
0
            tmp, sizeof(tmp), notBefore->length) != WOLFSSL_SUCCESS) {
7150
0
                WOLFSSL_MSG("Error getting not before date");
7151
0
                return WOLFSSL_FAILURE;
7152
0
            }
7153
0
        }
7154
0
    }
7155
0
    else {
7156
0
        XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
7157
0
    }
7158
0
    tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
7159
0
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
7160
0
        return WOLFSSL_FAILURE;
7161
0
    }
7162
7163
0
    if (wolfSSL_BIO_write(bio, "\n            Not After : ",
7164
0
                  (int)XSTRLEN("\n            Not After : ")) <= 0) {
7165
0
        return WOLFSSL_FAILURE;
7166
0
    }
7167
0
    if (notAfter->length > 0) {
7168
0
        if (GetTimeString(notAfter->data, ASN_UTC_TIME,
7169
0
            tmp, sizeof(tmp), notAfter->length) != WOLFSSL_SUCCESS) {
7170
0
            if (GetTimeString(notAfter->data, ASN_GENERALIZED_TIME,
7171
0
                tmp, sizeof(tmp), notAfter->length) != WOLFSSL_SUCCESS) {
7172
0
                WOLFSSL_MSG("Error getting not after date");
7173
0
                return WOLFSSL_FAILURE;
7174
0
            }
7175
0
        }
7176
0
    }
7177
0
    else {
7178
0
        XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
7179
0
    }
7180
0
    tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
7181
0
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
7182
0
        return WOLFSSL_FAILURE;
7183
0
    }
7184
7185
0
    if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
7186
0
        return WOLFSSL_FAILURE;
7187
0
    }
7188
7189
0
    return WOLFSSL_SUCCESS;
7190
0
}
7191
#endif /* ifndef NO_ASN_TIME */
7192
7193
static int X509PrintSubjAltName(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
7194
                                int indent)
7195
0
{
7196
0
    if (!x509 || !x509->altNames || !x509->subjAltNameSet)
7197
0
        return WOLFSSL_FAILURE;
7198
0
    return X509_print_name_entry(bio, x509->altNames, indent);
7199
0
}
7200
7201
/* iterate through certificate extensions printing them out in human readable
7202
 * form
7203
 * return WOLFSSL_SUCCESS on success
7204
 */
7205
static int X509PrintExtensions(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int indent)
7206
0
{
7207
0
    int  ret = WOLFSSL_SUCCESS;
7208
0
    char scratch[MAX_WIDTH];
7209
0
    const int scratchSz = sizeof(scratch);
7210
0
    int scratchLen;
7211
0
    int  count, i;
7212
0
    char* buf = NULL;
7213
7214
0
    if (indent < 0) indent = 0;
7215
0
    if (indent > MAX_INDENT) indent = MAX_INDENT;
7216
7217
0
    count = wolfSSL_X509_get_ext_count(x509);
7218
0
    if (count <= 0)
7219
0
        return WOLFSSL_SUCCESS;
7220
7221
#ifdef WOLFSSL_CERT_REQ
7222
    if (x509->isCSR) {
7223
        if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*s%s\n", indent, "",
7224
                      "Requested extensions:")) >= MAX_WIDTH) {
7225
            return WOLFSSL_FAILURE;
7226
        }
7227
    }
7228
    else
7229
#endif
7230
0
    {
7231
0
        if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*s%s\n", indent, "",
7232
0
                                     "X509v3 extensions:")) >= MAX_WIDTH) {
7233
0
            return WOLFSSL_FAILURE;
7234
0
        }
7235
0
    }
7236
0
    if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7237
0
        return WOLFSSL_FAILURE;
7238
0
    }
7239
7240
0
    buf = (char*)XMALLOC(MAX_WIDTH, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
7241
0
    if (buf == NULL) {
7242
0
        return WOLFSSL_FAILURE;
7243
0
    }
7244
7245
0
    for (i = 0; (i < count) && (ret != WC_NO_ERR_TRACE(WOLFSSL_FAILURE)); i++) {
7246
0
        WOLFSSL_X509_EXTENSION* ext;
7247
7248
0
        ext = wolfSSL_X509_get_ext(x509, i);
7249
0
        if (ext != NULL) {
7250
0
            WOLFSSL_ASN1_OBJECT* obj;
7251
0
            int nid;
7252
0
            char val[6];
7253
0
            int valLen;
7254
0
            word32 j;
7255
7256
0
            obj = wolfSSL_X509_EXTENSION_get_object(ext);
7257
0
            if (obj == NULL) {
7258
0
                ret = WOLFSSL_FAILURE;
7259
0
                break;
7260
0
            }
7261
0
            if (wolfSSL_OBJ_obj2txt(buf, MAX_WIDTH, obj, 0)
7262
0
                == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
7263
0
            {
7264
0
                ret = WOLFSSL_FAILURE;
7265
0
                break;
7266
0
            }
7267
0
            if ((scratchLen = XSNPRINTF(
7268
0
                     scratch, MAX_WIDTH, "%*s%s%s\n", indent + 4, "",
7269
0
                     buf,
7270
0
                     (wolfSSL_X509_EXTENSION_get_critical(ext)
7271
0
                      ? ": critical"
7272
0
                      : ": ")))
7273
0
                >= MAX_WIDTH)
7274
0
            {
7275
0
                ret = WOLFSSL_FAILURE;
7276
0
                break;
7277
0
            }
7278
7279
0
            if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7280
0
                ret = WOLFSSL_FAILURE;
7281
0
                break;
7282
0
            }
7283
0
            nid = wolfSSL_OBJ_obj2nid(obj);
7284
0
            switch (nid) {
7285
0
            case WC_NID_subject_alt_name:
7286
0
                ret = X509PrintSubjAltName(bio, x509, indent + 8);
7287
0
                break;
7288
7289
0
            case WC_NID_subject_key_identifier:
7290
0
                if (!x509->subjKeyIdSet || x509->subjKeyId == NULL ||
7291
0
                    x509->subjKeyIdSz == 0)
7292
0
                {
7293
0
                    ret = WOLFSSL_FAILURE;
7294
0
                    break;
7295
0
                }
7296
7297
0
                if ((scratchLen = XSNPRINTF(
7298
0
                         scratch, scratchSz,
7299
0
                         "%*s", indent + 8, "")) >= scratchSz)
7300
0
                {
7301
0
                    ret = WOLFSSL_FAILURE;
7302
0
                    break;
7303
0
                }
7304
0
                for (j = 0; j < x509->subjKeyIdSz; j++) {
7305
0
                    if ((valLen = XSNPRINTF(
7306
0
                             val, sizeof(val), "%02X%s",
7307
0
                             x509->subjKeyId[j],
7308
0
                             (j < x509->subjKeyIdSz - 1) ? ":" : "\n"))
7309
0
                        >= (int)sizeof(val))
7310
0
                    {
7311
0
                        ret = WOLFSSL_FAILURE;
7312
0
                        break;
7313
0
                    }
7314
0
                    if (scratchLen + valLen >= scratchSz) {
7315
0
                        if (wolfSSL_BIO_write(bio, scratch,
7316
0
                                              scratchLen) <= 0) {
7317
0
                            ret = WOLFSSL_FAILURE;
7318
0
                            break;
7319
0
                        }
7320
0
                        scratchLen = 0;
7321
0
                    }
7322
0
                    XMEMCPY(scratch + scratchLen, val, valLen);
7323
0
                    scratchLen += valLen;
7324
0
                }
7325
0
                if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
7326
0
                    break;
7327
0
                if (wolfSSL_BIO_write(bio, scratch,
7328
0
                                      scratchLen) <= 0) {
7329
0
                    ret = WOLFSSL_FAILURE;
7330
0
                    break;
7331
0
                }
7332
0
                break;
7333
7334
0
            case WC_NID_authority_key_identifier:
7335
0
                if (!x509->authKeyIdSet || x509->authKeyId == NULL ||
7336
0
                    x509->authKeyIdSz == 0) {
7337
0
                    ret = WOLFSSL_FAILURE;
7338
0
                    break;
7339
0
                }
7340
7341
0
                if ((scratchLen = XSNPRINTF(
7342
0
                         scratch, scratchSz, "%*s%s",
7343
0
                         indent + 8, "", "keyid:")) >= scratchSz)
7344
0
                {
7345
0
                    ret = WOLFSSL_FAILURE;
7346
0
                    break;
7347
0
                }
7348
0
                for (j = 0; j < x509->authKeyIdSz; j++) {
7349
0
                    if ((valLen = XSNPRINTF(
7350
0
                             val, sizeof(val), "%02X%s",
7351
0
                             x509->authKeyId[j],
7352
0
                             (j < x509->authKeyIdSz - 1) ? ":" : "\n\n"))
7353
0
                        >= (int)sizeof(val))
7354
0
                    {
7355
0
                        ret = WOLFSSL_FAILURE;
7356
0
                        break;
7357
0
                    }
7358
0
                    if (scratchLen >= scratchSz - valLen) {
7359
0
                        if (wolfSSL_BIO_write(bio, scratch,
7360
0
                                              scratchLen) <= 0)
7361
0
                        {
7362
0
                            ret = WOLFSSL_FAILURE;
7363
0
                            break;
7364
0
                        }
7365
0
                        scratchLen = 0;
7366
0
                    }
7367
0
                    if (scratchLen + valLen >= scratchSz) {
7368
0
                        ret = WOLFSSL_FAILURE;
7369
0
                        break;
7370
0
                    }
7371
0
                    XMEMCPY(scratch + scratchLen, val, valLen);
7372
0
                    scratchLen += valLen;
7373
0
                }
7374
0
                if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
7375
0
                    break;
7376
0
                if (wolfSSL_BIO_write(bio, scratch,
7377
0
                                      scratchLen) <= 0) {
7378
0
                    ret = WOLFSSL_FAILURE;
7379
0
                    break;
7380
0
                }
7381
0
                break;
7382
7383
0
            case WC_NID_basic_constraints:
7384
0
                if (!x509->basicConstSet) {
7385
0
                    ret = WOLFSSL_FAILURE;
7386
0
                    break;
7387
0
                }
7388
0
                if ((scratchLen = XSNPRINTF(
7389
0
                         scratch, scratchSz,
7390
0
                         "%*sCA:%s\n",
7391
0
                         indent + 8, "", (x509->isCa)? "TRUE": "FALSE"))
7392
0
                    >= scratchSz)
7393
0
                {
7394
0
                    ret = WOLFSSL_FAILURE;
7395
0
                    break;
7396
0
                }
7397
0
                if (wolfSSL_BIO_write(bio, scratch,
7398
0
                                      scratchLen) <= 0) {
7399
0
                    ret = WOLFSSL_FAILURE;
7400
0
                    break;
7401
0
                }
7402
0
                break;
7403
7404
0
            case WC_NID_key_usage:
7405
0
                ret = X509PrintKeyUsage(bio, x509, indent + 8);
7406
0
                break;
7407
7408
0
            case WC_NID_ext_key_usage:
7409
0
                ret = X509PrintExtendedKeyUsage(bio, x509, indent + 8);
7410
0
                break;
7411
7412
0
            default:
7413
                /* extension nid not yet supported */
7414
0
                if ((scratchLen = XSNPRINTF(
7415
0
                         scratch, MAX_WIDTH,
7416
0
                         "%*sNID %d print not yet supported\n",
7417
0
                         indent + 8, "", nid)) >= MAX_WIDTH)
7418
0
                {
7419
0
                    ret = WOLFSSL_FAILURE;
7420
0
                    break;
7421
0
                }
7422
7423
0
                if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7424
0
                    ret = WOLFSSL_FAILURE;
7425
0
                    break;
7426
0
                }
7427
0
            }
7428
0
        }
7429
0
    }
7430
7431
0
    XFREE(buf, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
7432
7433
0
    return ret;
7434
0
}
7435
7436
7437
/* print out the signature in human readable format for use with
7438
 * wolfSSL_X509_print()
7439
 * return WOLFSSL_SUCCESS on success
7440
 */
7441
static int X509PrintSignature_ex(WOLFSSL_BIO* bio, byte* sig,
7442
        int sigSz, int sigNid, int algOnly, int indent)
7443
0
{
7444
0
    char scratch[MAX_WIDTH];
7445
0
    int scratchLen;
7446
0
    WOLFSSL_ASN1_OBJECT* obj = NULL;
7447
0
    int ret = WOLFSSL_SUCCESS;
7448
0
    char tmp[100];
7449
0
    int tmpLen = 0;
7450
7451
0
    if (sigSz <= 0) {
7452
0
        return WOLFSSL_SUCCESS;
7453
0
    }
7454
7455
0
    if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*s%s", indent, "",
7456
0
                                "Signature Algorithm: ")) >= MAX_WIDTH) {
7457
0
        ret = WOLFSSL_FAILURE;
7458
0
    }
7459
7460
0
    if (ret == WOLFSSL_SUCCESS) {
7461
0
        if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0)
7462
0
            ret = WOLFSSL_FAILURE;
7463
0
    }
7464
7465
0
    if (ret == WOLFSSL_SUCCESS) {
7466
0
        obj = wolfSSL_OBJ_nid2obj(sigNid);
7467
0
        if (obj == NULL)
7468
0
            ret = WOLFSSL_FAILURE;
7469
0
    }
7470
0
    if (ret == WOLFSSL_SUCCESS) {
7471
0
        if (wolfSSL_OBJ_obj2txt(scratch, MAX_WIDTH, obj, 0)
7472
0
            == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
7473
0
        {
7474
0
            ret = WOLFSSL_FAILURE;
7475
0
        }
7476
0
    }
7477
7478
0
    if (ret == WOLFSSL_SUCCESS) {
7479
0
        if ((tmpLen = XSNPRINTF(tmp, sizeof(tmp),"%s\n", scratch))
7480
0
            >= (int)sizeof(tmp))
7481
0
        {
7482
0
            ret = WOLFSSL_FAILURE;
7483
0
        }
7484
0
    }
7485
0
    if (ret == WOLFSSL_SUCCESS) {
7486
0
        if (wolfSSL_BIO_write(bio, tmp, tmpLen) <= 0)
7487
0
            ret = WOLFSSL_FAILURE;
7488
0
    }
7489
7490
    /* Leave function if the desired content to print
7491
     * is only the signature algorithm */
7492
0
    if (algOnly) {
7493
0
        if (obj != NULL)
7494
0
            wolfSSL_ASN1_OBJECT_free(obj);
7495
7496
0
        return ret;
7497
0
    }
7498
7499
0
    if (ret == WOLFSSL_SUCCESS) {
7500
0
        if ((tmpLen = XSNPRINTF(tmp, sizeof(tmp), "%*s", indent + 5, ""))
7501
0
            >= (int)sizeof(tmp))
7502
0
        {
7503
0
            ret = WOLFSSL_FAILURE;
7504
0
        }
7505
0
    }
7506
7507
0
    if (ret == WOLFSSL_SUCCESS) {
7508
0
        int i;
7509
7510
0
        for (i = 0; i < sigSz; i++) {
7511
0
            char val[6];
7512
0
            int valLen;
7513
7514
0
            if (i == 0) {
7515
0
                if ((valLen = XSNPRINTF(val, sizeof(val), "%02x", sig[i]))
7516
0
                    >= (int)sizeof(val))
7517
0
                {
7518
0
                    ret = WOLFSSL_FAILURE;
7519
0
                    break;
7520
0
                }
7521
0
            }
7522
0
            else if (((i % 18) == 0)) {
7523
0
                if (wolfSSL_BIO_write(bio, tmp, tmpLen)
7524
0
                    <= 0) {
7525
0
                    ret = WOLFSSL_FAILURE;
7526
0
                    break;
7527
0
                }
7528
0
                if ((tmpLen = XSNPRINTF(tmp, sizeof(tmp), ":\n%*s",
7529
0
                                        indent + 5, ""))
7530
0
                    >= (int)sizeof(tmp))
7531
0
                {
7532
0
                    ret = WOLFSSL_FAILURE;
7533
0
                    break;
7534
0
                }
7535
0
                if ((valLen = XSNPRINTF(val, sizeof(val), "%02x", sig[i]))
7536
0
                    >= (int)sizeof(val))
7537
0
                {
7538
0
                    ret = WOLFSSL_FAILURE;
7539
0
                    break;
7540
0
                }
7541
0
            }
7542
0
            else {
7543
0
                if ((valLen = XSNPRINTF(val, sizeof(val), ":%02x", sig[i]))
7544
0
                    >= (int)sizeof(val))
7545
0
                {
7546
0
                    ret = WOLFSSL_FAILURE;
7547
0
                    break;
7548
0
                }
7549
0
            }
7550
0
            if ((tmpLen < 0) || (valLen < 0) ||
7551
0
                    (valLen >= ((int)sizeof(tmp) - tmpLen - 1))) {
7552
0
                ret = WOLFSSL_FAILURE;
7553
0
                break;
7554
0
            }
7555
0
            XMEMCPY(tmp + tmpLen, val, valLen);
7556
0
            tmpLen += valLen;
7557
0
            tmp[tmpLen] = 0;
7558
0
        }
7559
0
    }
7560
7561
    /* print out remaining sig values */
7562
0
    if (ret == WOLFSSL_SUCCESS) {
7563
0
        if (tmpLen > 0) {
7564
0
            if (wolfSSL_BIO_write(bio, tmp, tmpLen)
7565
0
                <= 0)
7566
0
            {
7567
0
                ret = WOLFSSL_FAILURE;
7568
0
            }
7569
0
        }
7570
0
    }
7571
7572
0
    if (obj != NULL)
7573
0
        wolfSSL_ASN1_OBJECT_free(obj);
7574
7575
0
    return ret;
7576
0
}
7577
7578
static int X509PrintSignature(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
7579
        int algOnly, int indent)
7580
0
{
7581
0
    int sigSz = 0;
7582
0
    if (wolfSSL_X509_get_signature(x509, NULL, &sigSz) <= 0) {
7583
0
        return WOLFSSL_FAILURE;
7584
0
    }
7585
7586
0
    if (sigSz > 0) {
7587
0
        unsigned char* sig;
7588
0
        int sigNid;
7589
7590
0
        sigNid = wolfSSL_X509_get_signature_nid(x509);
7591
0
        if (sigNid <= 0) {
7592
0
            return WOLFSSL_FAILURE;
7593
0
        }
7594
7595
0
        sig = (unsigned char*)XMALLOC(sigSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
7596
0
        if (sig == NULL) {
7597
0
            return WOLFSSL_FAILURE;
7598
0
        }
7599
7600
0
        if (wolfSSL_X509_get_signature(x509, sig, &sigSz) <= 0) {
7601
0
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
7602
0
            return WOLFSSL_FAILURE;
7603
0
        }
7604
7605
0
        if (X509PrintSignature_ex(bio, sig, sigSz, sigNid, algOnly, indent)
7606
0
                != WOLFSSL_SUCCESS) {
7607
0
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
7608
0
            return WOLFSSL_FAILURE;
7609
0
        }
7610
7611
0
        XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
7612
7613
0
    }
7614
7615
0
    return WOLFSSL_SUCCESS;
7616
0
}
7617
7618
7619
/* print out the public key in human readable format for use with
7620
 * wolfSSL_X509_print()
7621
 * return WOLFSSL_SUCCESS on success
7622
 */
7623
static int X509PrintPubKey(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int indent)
7624
0
{
7625
0
    char scratch[MAX_WIDTH];
7626
0
    WOLFSSL_EVP_PKEY* pubKey;
7627
0
    int len;
7628
0
    int ret = WOLFSSL_SUCCESS;
7629
7630
0
    if (indent < 0) indent = 0;
7631
0
    if (indent > MAX_INDENT) indent = MAX_INDENT;
7632
7633
0
    if (bio == NULL || x509 == NULL)
7634
0
        return BAD_FUNC_ARG;
7635
7636
0
    len = XSNPRINTF(scratch, MAX_WIDTH, "%*sSubject Public Key Info:\n", indent,
7637
0
        "");
7638
0
    if (len >= MAX_WIDTH)
7639
0
        return WOLFSSL_FAILURE;
7640
0
    if (wolfSSL_BIO_write(bio, scratch, len) <= 0)
7641
0
        return WOLFSSL_FAILURE;
7642
7643
0
    switch (x509->pubKeyOID) {
7644
0
    #ifndef NO_RSA
7645
0
        case RSAk:
7646
0
            len = XSNPRINTF(scratch, MAX_WIDTH,
7647
0
                    "%*sPublic Key Algorithm: rsaEncryption\n", indent + 4, "");
7648
0
            if (len >= MAX_WIDTH)
7649
0
                return WOLFSSL_FAILURE;
7650
0
            if (wolfSSL_BIO_write(bio, scratch, len) <= 0)
7651
0
                return WOLFSSL_FAILURE;
7652
0
            break;
7653
0
    #endif
7654
0
    #ifdef HAVE_ECC
7655
0
        case ECDSAk:
7656
0
            len = XSNPRINTF(scratch, MAX_WIDTH,
7657
0
                    "%*sPublic Key Algorithm: EC\n", indent + 4, "");
7658
0
            if ((len < 0) || (len >= MAX_WIDTH))
7659
0
                return WOLFSSL_FAILURE;
7660
0
            if (wolfSSL_BIO_write(bio, scratch, len) <= 0)
7661
0
                return WOLFSSL_FAILURE;
7662
0
            break;
7663
0
    #endif
7664
0
        default:
7665
0
                WOLFSSL_MSG("Unknown key type");
7666
0
                return WOLFSSL_FAILURE;
7667
0
    }
7668
7669
0
    pubKey = wolfSSL_X509_get_pubkey(x509);
7670
0
    if (pubKey == NULL)
7671
0
        return WOLFSSL_FAILURE;
7672
7673
0
    ret = wolfSSL_EVP_PKEY_print_public(bio, pubKey, indent + 8, NULL);
7674
7675
0
    wolfSSL_EVP_PKEY_free(pubKey);
7676
7677
0
    return ret;
7678
0
}
7679
7680
7681
/* human readable print out of x509 name formatted for use with
7682
 * wolfSSL_X509_print()
7683
 * return WOLFSSL_SUCCESS on success
7684
 */
7685
static int X509PrintName(WOLFSSL_BIO* bio, WOLFSSL_X509_NAME* name,
7686
        char* type, int indent)
7687
0
{
7688
0
    if (name != NULL) {
7689
0
        char scratch[MAX_WIDTH];
7690
0
        int scratchLen;
7691
7692
0
        if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH,
7693
0
                                     "%*s%s", indent, "", type))
7694
0
            >= MAX_WIDTH)
7695
0
        {
7696
0
            return WOLFSSL_FAILURE;
7697
0
        }
7698
0
        if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7699
0
            return WOLFSSL_FAILURE;
7700
0
        }
7701
0
        if (wolfSSL_X509_NAME_print_ex(bio, name, 1, 0) <= 0) {
7702
0
            return WOLFSSL_FAILURE;
7703
0
        }
7704
0
        if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
7705
0
            return WOLFSSL_FAILURE;
7706
0
        }
7707
0
    }
7708
0
    return WOLFSSL_SUCCESS;
7709
0
}
7710
7711
7712
/* human readable print out of x509 version
7713
 * return WOLFSSL_SUCCESS on success
7714
 */
7715
static int X509PrintVersion(WOLFSSL_BIO* bio, int version, int indent)
7716
0
{
7717
0
    char scratch[MAX_WIDTH];
7718
0
    int scratchLen;
7719
7720
0
    if (indent < 0) indent = 0;
7721
0
    if (indent > MAX_INDENT) indent = MAX_INDENT;
7722
7723
0
    scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*s%s", indent, "", "Version:");
7724
0
    if ((scratchLen < 0) || (scratchLen >= MAX_WIDTH)) {
7725
0
        return WOLFSSL_FAILURE;
7726
0
    }
7727
7728
0
    if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7729
0
        return WOLFSSL_FAILURE;
7730
0
    }
7731
7732
0
    scratchLen = XSNPRINTF(scratch, MAX_WIDTH, " %d (0x%x)\n",
7733
0
                    version, (byte)version-1);
7734
0
    if ((scratchLen < 0) || (scratchLen >= MAX_WIDTH)) {
7735
0
        return WOLFSSL_FAILURE;
7736
0
    }
7737
7738
0
    if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7739
0
        return WOLFSSL_FAILURE;
7740
0
    }
7741
0
    return WOLFSSL_SUCCESS;
7742
0
}
7743
7744
#ifdef WOLFSSL_CERT_REQ
7745
/* Print out of REQ attributes
7746
 * return WOLFSSL_SUCCESS on success
7747
 */
7748
static int X509PrintReqAttributes(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
7749
        int indent)
7750
{
7751
    WOLFSSL_X509_ATTRIBUTE* attr;
7752
    char scratch[MAX_WIDTH];
7753
    int scratchLen;
7754
    int i = 0;
7755
7756
    if (indent < 0) indent = 0;
7757
    if (indent > MAX_INDENT) indent = MAX_INDENT;
7758
7759
    if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH,
7760
                                 "%*s%s", indent, "", "Attributes: \n"))
7761
        >= MAX_WIDTH)
7762
    {
7763
        return WOLFSSL_FAILURE;
7764
    }
7765
    if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7766
        return WOLFSSL_FAILURE;
7767
    }
7768
    do {
7769
        attr = wolfSSL_X509_REQ_get_attr(x509, i);
7770
        if (attr != NULL) {
7771
            char lName[NAME_SZ/4]; /* NAME_SZ default is 80 */
7772
            int lNameSz = NAME_SZ/4;
7773
            const byte* data;
7774
7775
            if (wolfSSL_OBJ_obj2txt(lName, lNameSz, attr->object, 0)
7776
                == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
7777
            {
7778
                return WOLFSSL_FAILURE;
7779
            }
7780
            lNameSz = (int)XSTRLEN(lName);
7781
            data = wolfSSL_ASN1_STRING_get0_data(
7782
                    attr->value->value.asn1_string);
7783
            if (data == NULL) {
7784
                WOLFSSL_MSG("No REQ attribute found when expected");
7785
                return WOLFSSL_FAILURE;
7786
            }
7787
            if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH,
7788
                          "%*s%s%*s:%s\n", indent+4, "",
7789
                          lName, (NAME_SZ/4)-lNameSz, "", data))
7790
                >= MAX_WIDTH)
7791
            {
7792
                return WOLFSSL_FAILURE;
7793
            }
7794
            if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7795
                WOLFSSL_MSG("Error writing REQ attribute");
7796
                return WOLFSSL_FAILURE;
7797
            }
7798
        }
7799
        i++;
7800
    } while (attr != NULL);
7801
7802
    return WOLFSSL_SUCCESS;
7803
}
7804
7805
7806
/*
7807
 * return WOLFSSL_SUCCESS on success
7808
 */
7809
int wolfSSL_X509_REQ_print(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
7810
{
7811
    char subjType[] = "Subject: ";
7812
7813
    if (bio == NULL || x509 == NULL) {
7814
        return WOLFSSL_FAILURE;
7815
    }
7816
7817
    if (wolfSSL_BIO_write(bio, "Certificate Request:\n",
7818
                  (int)XSTRLEN("Certificate Request:\n")) <= 0) {
7819
            return WOLFSSL_FAILURE;
7820
    }
7821
7822
    if (wolfSSL_BIO_write(bio, "    Data:\n",
7823
                  (int)XSTRLEN("    Data:\n")) <= 0) {
7824
            return WOLFSSL_FAILURE;
7825
    }
7826
7827
    /* print version of cert.  Note that we increment by 1 because for REQs,
7828
     * the value stored in x509->version is the actual value of the field; not
7829
     * the version. */
7830
    if (X509PrintVersion(bio, (int)wolfSSL_X509_REQ_get_version(x509) + 1, 8)
7831
            != WOLFSSL_SUCCESS) {
7832
        return WOLFSSL_FAILURE;
7833
    }
7834
7835
    if (X509PrintSerial(bio, x509, 8) != WOLFSSL_SUCCESS) {
7836
        return WOLFSSL_FAILURE;
7837
    }
7838
7839
    /* print subject */
7840
    if (X509PrintName(bio, wolfSSL_X509_get_subject_name(x509), subjType, 8)
7841
            != WOLFSSL_SUCCESS) {
7842
        return WOLFSSL_FAILURE;
7843
    }
7844
7845
    /* get and print public key */
7846
    if (X509PrintPubKey(bio, x509, 8) != WOLFSSL_SUCCESS) {
7847
        return WOLFSSL_FAILURE;
7848
    }
7849
7850
    /* print out extensions */
7851
    if (X509PrintExtensions(bio, x509, 4) != WOLFSSL_SUCCESS) {
7852
        return WOLFSSL_FAILURE;
7853
    }
7854
7855
    /* print out req attributes */
7856
    if (X509PrintReqAttributes(bio, x509, 4) != WOLFSSL_SUCCESS) {
7857
        return WOLFSSL_FAILURE;
7858
    }
7859
7860
    /* print out signature */
7861
    if (X509PrintSignature(bio, x509, 0, 4) != WOLFSSL_SUCCESS) {
7862
        return WOLFSSL_FAILURE;
7863
    }
7864
7865
    /* done with print out */
7866
    if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
7867
        return WOLFSSL_FAILURE;
7868
    }
7869
7870
    return WOLFSSL_SUCCESS;
7871
}
7872
#endif /* WOLFSSL_CERT_REQ */
7873
7874
7875
/* Writes the human readable form of x509 to bio.
7876
 *
7877
 * bio  WOLFSSL_BIO to write to.
7878
 * x509 Certificate to write.
7879
 *
7880
 * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on failure
7881
 */
7882
int wolfSSL_X509_print_ex(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
7883
    unsigned long nmflags, unsigned long cflag)
7884
0
{
7885
0
    char issuType[] = "Issuer:";
7886
0
    char subjType[] = "Subject:";
7887
7888
0
    WOLFSSL_ENTER("wolfSSL_X509_print_ex");
7889
7890
    /* flags currently not supported */
7891
0
    (void)nmflags;
7892
0
    (void)cflag;
7893
7894
0
    if (bio == NULL || x509 == NULL) {
7895
0
        return WOLFSSL_FAILURE;
7896
0
    }
7897
7898
0
    if (wolfSSL_BIO_write(bio, "Certificate:\n",
7899
0
                  (int)XSTRLEN("Certificate:\n")) <= 0) {
7900
0
            return WOLFSSL_FAILURE;
7901
0
    }
7902
7903
0
    if (wolfSSL_BIO_write(bio, "    Data:\n",
7904
0
                  (int)XSTRLEN("    Data:\n")) <= 0) {
7905
0
            return WOLFSSL_FAILURE;
7906
0
    }
7907
7908
    /* print version of cert */
7909
0
    if (X509PrintVersion(bio, wolfSSL_X509_version(x509), 8)
7910
0
            != WOLFSSL_SUCCESS) {
7911
0
        return WOLFSSL_FAILURE;
7912
0
    }
7913
7914
    /* print serial number out */
7915
0
    if (X509PrintSerial(bio, x509, 8) != WOLFSSL_SUCCESS) {
7916
0
        return WOLFSSL_FAILURE;
7917
0
    }
7918
7919
    /* print out signature algo*/
7920
0
    if (X509PrintSignature(bio, x509, 1, 8) != WOLFSSL_SUCCESS) {
7921
0
        return WOLFSSL_FAILURE;
7922
0
    }
7923
7924
    /* print issuer */
7925
0
    if (X509PrintName(bio, wolfSSL_X509_get_issuer_name(x509), issuType, 8)
7926
0
            != WOLFSSL_SUCCESS) {
7927
0
        return WOLFSSL_FAILURE;
7928
0
    }
7929
7930
0
    #ifndef NO_ASN_TIME
7931
    /* print validity */
7932
0
    if (X509PrintValidity(bio, &x509->notBefore, &x509->notAfter, 8)
7933
0
        != WOLFSSL_SUCCESS) {
7934
0
        return WOLFSSL_FAILURE;
7935
0
    }
7936
0
    #endif /* NO_ASN_TIME */
7937
7938
    /* print subject */
7939
0
    if (X509PrintName(bio, wolfSSL_X509_get_subject_name(x509), subjType, 8)
7940
0
            != WOLFSSL_SUCCESS) {
7941
0
        return WOLFSSL_FAILURE;
7942
0
    }
7943
7944
    /* get and print public key */
7945
0
    if (X509PrintPubKey(bio, x509, 8) != WOLFSSL_SUCCESS) {
7946
0
        return WOLFSSL_FAILURE;
7947
0
    }
7948
7949
    /* print out extensions */
7950
0
    if (X509PrintExtensions(bio, x509, 8) != WOLFSSL_SUCCESS) {
7951
0
        return WOLFSSL_FAILURE;
7952
0
    }
7953
7954
    /* print out signature */
7955
0
    if (X509PrintSignature(bio, x509, 0, 4) != WOLFSSL_SUCCESS) {
7956
0
        return WOLFSSL_FAILURE;
7957
0
    }
7958
7959
    /* done with print out */
7960
0
    if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
7961
0
        return WOLFSSL_FAILURE;
7962
0
    }
7963
7964
0
    return WOLFSSL_SUCCESS;
7965
0
}
7966
int wolfSSL_X509_print(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
7967
0
{
7968
0
    return wolfSSL_X509_print_ex(bio, x509, 0, 0);
7969
0
}
7970
7971
#if defined(WOLFSSL_ACERT)
7972
/* Retrieve sig NID from an ACERT.
7973
 *
7974
 * returns  NID on success
7975
 * returns  0 on failure
7976
 */
7977
int wolfSSL_X509_ACERT_get_signature_nid(const WOLFSSL_X509_ACERT *x509)
7978
0
{
7979
0
    if (x509 == NULL) {
7980
0
        return 0;
7981
0
    }
7982
7983
0
    return oid2nid((word32)x509->sigOID, oidSigType);
7984
0
}
7985
7986
static int X509AcertPrintSignature(WOLFSSL_BIO* bio, WOLFSSL_X509_ACERT* x509,
7987
                                   int algOnly, int indent)
7988
0
{
7989
0
    int sigSz = 0;
7990
0
    if (wolfSSL_X509_ACERT_get_signature(x509, NULL, &sigSz) <= 0) {
7991
0
        return WOLFSSL_FAILURE;
7992
0
    }
7993
7994
0
    if (sigSz > 0) {
7995
0
        unsigned char* sig;
7996
0
        int sigNid;
7997
7998
0
        sigNid = wolfSSL_X509_ACERT_get_signature_nid(x509);
7999
0
        if (sigNid <= 0) {
8000
0
            return WOLFSSL_FAILURE;
8001
0
        }
8002
8003
0
        sig = (unsigned char*)XMALLOC(sigSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8004
0
        if (sig == NULL) {
8005
0
            return WOLFSSL_FAILURE;
8006
0
        }
8007
8008
0
        if (wolfSSL_X509_ACERT_get_signature(x509, sig, &sigSz) <= 0) {
8009
0
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8010
0
            return WOLFSSL_FAILURE;
8011
0
        }
8012
8013
0
        if (X509PrintSignature_ex(bio, sig, sigSz, sigNid, algOnly, indent)
8014
0
                != WOLFSSL_SUCCESS) {
8015
0
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8016
0
            return WOLFSSL_FAILURE;
8017
0
        }
8018
8019
0
        if (sig != NULL) {
8020
0
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8021
0
        }
8022
8023
0
    }
8024
8025
0
    return WOLFSSL_SUCCESS;
8026
0
}
8027
8028
static int X509AcertPrintSerial(WOLFSSL_BIO* bio, WOLFSSL_X509_ACERT* x509,
8029
                                int indent)
8030
0
{
8031
0
    unsigned char serial[32];
8032
0
    int  sz = sizeof(serial);
8033
8034
0
    XMEMSET(serial, 0, sz);
8035
0
    if (wolfSSL_X509_ACERT_get_serial_number(x509, serial, &sz)
8036
0
        == WOLFSSL_SUCCESS) {
8037
0
        X509PrintSerial_ex(bio, serial, sz, 1, indent);
8038
0
    }
8039
0
    return WOLFSSL_SUCCESS;
8040
0
}
8041
8042
int wolfSSL_X509_ACERT_print(WOLFSSL_BIO* bio, WOLFSSL_X509_ACERT* x509)
8043
0
{
8044
0
    const char * hdr =                "Attribute Certificate:\n";
8045
0
    const char * data_hdr =           "    Data:\n";
8046
0
    const char * holder_hdr =         "        Holder:\n";
8047
0
    const char * holder_issuer_hdr =  "            Issuer:";
8048
0
    const char * holder_name_hdr =    "            Name:";
8049
0
    const char * attcert_issuer_hdr = "        Issuer:";
8050
8051
0
    if (bio == NULL || x509 == NULL) {
8052
0
        return WOLFSSL_FAILURE;
8053
0
    }
8054
8055
    /* print acert header */
8056
0
    if (wolfSSL_BIO_write(bio, hdr, (int)XSTRLEN(hdr)) <= 0) {
8057
0
        return WOLFSSL_FAILURE;
8058
0
    }
8059
8060
    /* print data header */
8061
0
    if (wolfSSL_BIO_write(bio, data_hdr, (int)XSTRLEN(data_hdr)) <= 0) {
8062
0
        return WOLFSSL_FAILURE;
8063
0
    }
8064
8065
    /* print version of cert */
8066
0
    if (X509PrintVersion(bio, wolfSSL_X509_ACERT_version(x509), 8)
8067
0
            != WOLFSSL_SUCCESS) {
8068
0
        return WOLFSSL_FAILURE;
8069
0
    }
8070
8071
    /* print serial number out */
8072
0
    if (X509AcertPrintSerial(bio, x509, 8) != WOLFSSL_SUCCESS) {
8073
0
        return WOLFSSL_FAILURE;
8074
0
    }
8075
8076
    /* print holder field */
8077
0
    if (wolfSSL_BIO_write(bio, holder_hdr, (int)XSTRLEN(holder_hdr)) <= 0) {
8078
0
        return WOLFSSL_FAILURE;
8079
0
    }
8080
8081
0
    if (x509->holderEntityName != NULL) {
8082
        /* print issuer header */
8083
0
        if (wolfSSL_BIO_write(bio, holder_name_hdr,
8084
0
            (int)XSTRLEN(holder_name_hdr)) <= 0) {
8085
0
            return WOLFSSL_FAILURE;
8086
0
        }
8087
8088
0
        if (X509_print_name_entry(bio, x509->holderEntityName, 1)
8089
0
                != WOLFSSL_SUCCESS) {
8090
0
            return WOLFSSL_FAILURE;
8091
0
        }
8092
0
    }
8093
8094
0
    if (x509->holderIssuerName != NULL) {
8095
        /* print issuer header */
8096
0
        if (wolfSSL_BIO_write(bio, holder_issuer_hdr,
8097
0
            (int)XSTRLEN(holder_issuer_hdr)) <= 0) {
8098
0
            return WOLFSSL_FAILURE;
8099
0
        }
8100
8101
0
        if (X509_print_name_entry(bio, x509->holderIssuerName, 1)
8102
0
            != WOLFSSL_SUCCESS) {
8103
0
            return WOLFSSL_FAILURE;
8104
0
        }
8105
0
    }
8106
8107
0
    if (x509->holderSerialSz > 0) {
8108
0
        X509PrintSerial_ex(bio, x509->holderSerial, x509->holderSerialSz,
8109
0
                           1, 12);
8110
0
    }
8111
8112
    /* print issuer header */
8113
0
    if (wolfSSL_BIO_write(bio, attcert_issuer_hdr,
8114
0
        (int)XSTRLEN(attcert_issuer_hdr)) <= 0) {
8115
0
        return WOLFSSL_FAILURE;
8116
0
    }
8117
8118
0
    if (x509->AttCertIssuerName != NULL) {
8119
0
        if (X509_print_name_entry(bio, x509->AttCertIssuerName, 1)
8120
0
                != WOLFSSL_SUCCESS) {
8121
0
            return WOLFSSL_FAILURE;
8122
0
        }
8123
0
    }
8124
0
    else {
8125
0
        const char * msg = " Issuer type not supported.\n";
8126
0
        if (wolfSSL_BIO_write(bio, msg, (int)XSTRLEN(msg)) <= 0) {
8127
0
            return WOLFSSL_FAILURE;
8128
0
        }
8129
0
    }
8130
8131
0
    #ifndef NO_ASN_TIME
8132
    /* print validity */
8133
0
    if (X509PrintValidity(bio, &x509->notBefore, &x509->notAfter, 8)
8134
0
        != WOLFSSL_SUCCESS) {
8135
0
        return WOLFSSL_FAILURE;
8136
0
    }
8137
0
    #endif /* NO_ASN_TIME */
8138
8139
    /* print raw attributes */
8140
0
    if (x509->rawAttr && x509->rawAttrLen > 0) {
8141
0
        char attr_hdr[128]; /* buffer for XSNPRINTF */
8142
8143
0
        if (XSNPRINTF(attr_hdr, 128, "%*s%s: %d bytes\n", 8, "",
8144
0
                    "Attributes", x509->rawAttrLen) >= 128) {
8145
0
            return WOLFSSL_FAILURE;
8146
0
        }
8147
8148
0
        if (wolfSSL_BIO_write(bio, attr_hdr, (int)XSTRLEN(attr_hdr)) <= 0) {
8149
0
                return WOLFSSL_FAILURE;
8150
0
        }
8151
0
    }
8152
8153
    /* print out sig algo and signature */
8154
0
    if (X509AcertPrintSignature(bio, x509, 0, 8) != WOLFSSL_SUCCESS) {
8155
0
        return WOLFSSL_FAILURE;
8156
0
    }
8157
8158
    /* done with print out */
8159
0
    if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
8160
0
        return WOLFSSL_FAILURE;
8161
0
    }
8162
8163
0
    return WOLFSSL_SUCCESS;
8164
0
}
8165
#endif /* WOLFSSL_ACERT */
8166
8167
#ifndef NO_FILESYSTEM
8168
int wolfSSL_X509_print_fp(XFILE fp, WOLFSSL_X509 *x509)
8169
0
{
8170
0
    WOLFSSL_BIO* bio;
8171
0
    int ret;
8172
8173
0
    WOLFSSL_ENTER("wolfSSL_X509_print_fp");
8174
8175
0
    if (!fp || !x509) {
8176
0
        WOLFSSL_MSG("Bad parameter");
8177
0
        return WOLFSSL_FAILURE;
8178
0
    }
8179
8180
0
    if (!(bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file()))) {
8181
0
        WOLFSSL_MSG("wolfSSL_BIO_new wolfSSL_BIO_s_file error");
8182
0
        return WOLFSSL_FAILURE;
8183
0
    }
8184
8185
0
    if (wolfSSL_BIO_set_fp(bio, fp, WOLFSSL_BIO_NOCLOSE) != WOLFSSL_SUCCESS) {
8186
0
        WOLFSSL_MSG("wolfSSL_BIO_set_fp error");
8187
0
        wolfSSL_BIO_free(bio);
8188
0
        return WOLFSSL_FAILURE;
8189
0
    }
8190
8191
0
    ret = wolfSSL_X509_print(bio, x509);
8192
8193
0
    wolfSSL_BIO_free(bio);
8194
8195
0
    return ret;
8196
0
}
8197
#endif /* NO_FILESYSTEM */
8198
8199
#endif /* XSNPRINTF */
8200
8201
int wolfSSL_X509_signature_print(WOLFSSL_BIO *bp,
8202
        const WOLFSSL_X509_ALGOR *sigalg, const WOLFSSL_ASN1_STRING *sig)
8203
0
{
8204
0
    int length = 0;
8205
0
    word32 idx = 0;
8206
0
    int i;
8207
8208
0
    (void)sig;
8209
8210
0
    WOLFSSL_ENTER("wolfSSL_X509_signature_print");
8211
8212
0
    if (!bp || !sigalg) {
8213
0
        WOLFSSL_MSG("Bad parameter");
8214
0
        return WOLFSSL_FAILURE;
8215
0
    }
8216
8217
0
    if ((sigalg->algorithm->obj == NULL) ||
8218
0
        (sigalg->algorithm->obj[idx] != ASN_OBJECT_ID)) {
8219
0
        WOLFSSL_MSG("Bad ASN1 Object");
8220
0
        return WOLFSSL_FAILURE;
8221
0
    }
8222
0
    idx++; /* skip object id */
8223
8224
0
    if (GetLength((const byte*)sigalg->algorithm->obj, &idx, &length,
8225
0
                  sigalg->algorithm->objSz) < 0 || length < 0) {
8226
0
        return WOLFSSL_FAILURE;
8227
0
    }
8228
8229
0
    if (wolfSSL_BIO_puts(bp, "    Raw Signature Algorithm:") <= 0) {
8230
0
        WOLFSSL_MSG("wolfSSL_BIO_puts error");
8231
0
        return WOLFSSL_FAILURE;
8232
0
    }
8233
8234
0
    for (i = 0; i < length; ++i) {
8235
0
        char hex_digits[4];
8236
0
        if (XSNPRINTF(hex_digits, sizeof(hex_digits), "%c%02X", i>0 ? ':' : ' ',
8237
0
                  (unsigned int)sigalg->algorithm->obj[idx+i])
8238
0
            >= (int)sizeof(hex_digits))
8239
0
        {
8240
0
            WOLFSSL_MSG("buffer overrun");
8241
0
            return WOLFSSL_FAILURE;
8242
0
        }
8243
0
        if (wolfSSL_BIO_puts(bp, hex_digits) <= 0)
8244
0
            return WOLFSSL_FAILURE;
8245
0
    }
8246
8247
0
    if (wolfSSL_BIO_puts(bp, "\n") <= 0)
8248
0
        return WOLFSSL_FAILURE;
8249
8250
0
    return WOLFSSL_SUCCESS;
8251
0
}
8252
#endif /* !NO_BIO */
8253
8254
#ifndef NO_WOLFSSL_STUB
8255
void wolfSSL_X509_get0_signature(const WOLFSSL_ASN1_BIT_STRING **psig,
8256
        const WOLFSSL_X509_ALGOR **palg, const WOLFSSL_X509 *x509)
8257
0
{
8258
0
    (void)psig;
8259
0
    (void)palg;
8260
0
    (void)x509;
8261
0
    WOLFSSL_STUB("wolfSSL_X509_get0_signature");
8262
0
}
8263
#endif
8264
8265
#endif /* OPENSSL_EXTRA */
8266
8267
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
8268
const char* wolfSSL_X509_verify_cert_error_string(long err)
8269
0
{
8270
0
    return wolfSSL_ERR_reason_error_string((unsigned long)err);
8271
0
}
8272
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
8273
8274
#ifdef OPENSSL_EXTRA
8275
8276
/* Add directory path that will be used for loading certs and CRLs
8277
 * which have the <hash>.rn name format.
8278
 * type may be WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1.
8279
 * returns WOLFSSL_SUCCESS on successful, otherwise negative or zero. */
8280
int wolfSSL_X509_LOOKUP_add_dir(WOLFSSL_X509_LOOKUP* lookup, const char* dir,
8281
                               long type)
8282
0
{
8283
0
    return wolfSSL_X509_LOOKUP_ctrl(lookup, WOLFSSL_X509_L_ADD_DIR, dir, type,
8284
0
                                    NULL);
8285
0
}
8286
8287
int wolfSSL_X509_LOOKUP_load_file(WOLFSSL_X509_LOOKUP* lookup,
8288
                                 const char* file, long type)
8289
0
{
8290
0
#if !defined(NO_FILESYSTEM) && \
8291
0
    (defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM))
8292
0
    int           ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
8293
0
    XFILE         fp;
8294
0
    long          sz;
8295
0
    byte*         pem = NULL;
8296
0
    byte*         curr = NULL;
8297
0
    byte*         prev = NULL;
8298
0
    const char* header = NULL;
8299
0
    const char* footer = NULL;
8300
8301
0
    if (type != WOLFSSL_FILETYPE_PEM)
8302
0
        return WS_RETURN_CODE(BAD_FUNC_ARG, (int)WOLFSSL_FAILURE);
8303
8304
0
    fp = XFOPEN(file, "rb");
8305
0
    if (fp == XBADFILE)
8306
0
        return WS_RETURN_CODE(BAD_FUNC_ARG, (int)WOLFSSL_FAILURE);
8307
8308
0
    if (XFSEEK(fp, 0, XSEEK_END) != 0) {
8309
0
        XFCLOSE(fp);
8310
0
        return WS_RETURN_CODE(WOLFSSL_BAD_FILE,WOLFSSL_FAILURE);
8311
0
    }
8312
0
    sz = XFTELL(fp);
8313
0
    if (XFSEEK(fp, 0, XSEEK_SET) != 0) {
8314
0
        XFCLOSE(fp);
8315
0
        return WS_RETURN_CODE(WOLFSSL_BAD_FILE,WOLFSSL_FAILURE);
8316
0
    }
8317
8318
0
    if (sz > MAX_WOLFSSL_FILE_SIZE || sz <= 0) {
8319
0
        WOLFSSL_MSG("X509_LOOKUP_load_file size error");
8320
0
        goto end;
8321
0
    }
8322
8323
0
    pem = (byte*)XMALLOC(sz, 0, DYNAMIC_TYPE_PEM);
8324
0
    if (pem == NULL) {
8325
0
        ret = MEMORY_ERROR;
8326
0
        goto end;
8327
0
    }
8328
8329
    /* Read in file which may be CRLs or certificates. */
8330
0
    if (XFREAD(pem, (size_t)sz, 1, fp) != 1)
8331
0
        goto end;
8332
8333
0
    prev = curr = pem;
8334
0
    do {
8335
        /* get PEM header and footer based on type */
8336
0
        if (wc_PemGetHeaderFooter(CRL_TYPE, &header, &footer) == 0 &&
8337
0
                XSTRNSTR((char*)curr, header, (unsigned int)sz) != NULL) {
8338
#ifdef HAVE_CRL
8339
            WOLFSSL_CERT_MANAGER* cm = lookup->store->cm;
8340
8341
            if (cm->crl == NULL) {
8342
                if (wolfSSL_CertManagerEnableCRL(cm, WOLFSSL_CRL_CHECK)
8343
                    != WOLFSSL_SUCCESS) {
8344
                    WOLFSSL_MSG("Enable CRL failed");
8345
                    goto end;
8346
                }
8347
            }
8348
8349
            ret = BufferLoadCRL(cm->crl, curr, sz, WOLFSSL_FILETYPE_PEM,
8350
                NO_VERIFY);
8351
            if (ret != WOLFSSL_SUCCESS)
8352
                goto end;
8353
#endif
8354
0
            curr = (byte*)XSTRNSTR((char*)curr, footer, (unsigned int)sz);
8355
0
        }
8356
0
        else if (wc_PemGetHeaderFooter(CERT_TYPE, &header, &footer) == 0 &&
8357
0
                XSTRNSTR((char*)curr, header, (unsigned int)sz) != NULL) {
8358
0
            ret = X509StoreLoadCertBuffer(lookup->store, curr,
8359
0
                                        (word32)sz, WOLFSSL_FILETYPE_PEM);
8360
0
            if (ret != WOLFSSL_SUCCESS)
8361
0
                goto end;
8362
0
            curr = (byte*)XSTRNSTR((char*)curr, footer, (unsigned int)sz);
8363
0
        }
8364
0
        else
8365
0
            goto end;
8366
8367
0
        if (curr == NULL)
8368
0
            goto end;
8369
8370
0
        curr++;
8371
0
        sz -= (long)(curr - prev);
8372
0
        prev = curr;
8373
0
    }
8374
0
    while (ret == WOLFSSL_SUCCESS);
8375
8376
0
end:
8377
0
    XFREE(pem, 0, DYNAMIC_TYPE_PEM);
8378
0
    XFCLOSE(fp);
8379
0
    return WS_RETURN_CODE(ret, (int)WOLFSSL_FAILURE);
8380
#else
8381
    (void)lookup;
8382
    (void)file;
8383
    (void)type;
8384
    return WS_RETURN_CODE(WOLFSSL_FAILURE,WOLFSSL_FAILURE);
8385
#endif
8386
0
}
8387
8388
WOLFSSL_X509_LOOKUP_METHOD* wolfSSL_X509_LOOKUP_hash_dir(void)
8389
0
{
8390
    /* Method implementation in functions. */
8391
0
    static WOLFSSL_X509_LOOKUP_METHOD meth = { 1 };
8392
0
    return &meth;
8393
0
}
8394
8395
WOLFSSL_X509_LOOKUP_METHOD* wolfSSL_X509_LOOKUP_file(void)
8396
0
{
8397
    /* Method implementation in functions. */
8398
0
    static WOLFSSL_X509_LOOKUP_METHOD meth = { 0 };
8399
0
    return &meth;
8400
0
}
8401
8402
/* set directory path to load certificate or CRL which have the hash.N form */
8403
/* for late use                                                             */
8404
/* @param ctx    a pointer to WOLFSSL_BY_DIR structure                      */
8405
/* @param argc   directory path                                             */
8406
/* @param argl   file type, either WOLFSSL_FILETYPE_PEM or                  */
8407
/*                                          WOLFSSL_FILETYPE_ASN1           */
8408
/* @return WOLFSSL_SUCCESS on successful, otherwise negative or zero        */
8409
static int x509AddCertDir(WOLFSSL_BY_DIR *ctx, const char *argc, long argl)
8410
0
{
8411
0
#if defined(OPENSSL_ALL) && !defined(NO_FILESYSTEM) && !defined(NO_WOLFSSL_DIR)
8412
0
    WOLFSSL_BY_DIR_entry *entry;
8413
0
    size_t pathLen;
8414
0
    int i, num;
8415
0
    const char* c;
8416
0
    WC_DECLARE_VAR(buf, char, MAX_FILENAME_SZ, 0);
8417
8418
0
    WOLFSSL_ENTER("x509AddCertDir");
8419
8420
0
    pathLen = 0;
8421
0
    c = argc;
8422
    /* sanity check, zero length */
8423
0
    if (ctx == NULL || c == NULL || *c == '\0')
8424
0
        return WOLFSSL_FAILURE;
8425
8426
0
#ifdef WOLFSSL_SMALL_STACK
8427
0
    buf = (char*)XMALLOC(MAX_FILENAME_SZ, NULL, DYNAMIC_TYPE_OPENSSL);
8428
0
    if (buf == NULL) {
8429
0
        WOLFSSL_LEAVE("x509AddCertDir", MEMORY_E);
8430
0
        return MEMORY_E;
8431
0
    }
8432
0
#endif
8433
8434
0
    XMEMSET(buf, 0, MAX_FILENAME_SZ);
8435
8436
0
    do {
8437
0
        if (*c == SEPARATOR_CHAR || *c == '\0') {
8438
8439
0
            num = wolfSSL_sk_BY_DIR_entry_num(ctx->dir_entry);
8440
8441
0
            for (i=0; i<num; i++) {
8442
8443
0
                entry = wolfSSL_sk_BY_DIR_entry_value(ctx->dir_entry, i);
8444
8445
0
                if (XSTRLEN(entry->dir_name) == pathLen &&
8446
0
                    XSTRNCMP(entry->dir_name, buf, pathLen) == 0) {
8447
0
                    WOLFSSL_MSG("dir entry found");
8448
0
                    break;
8449
0
                }
8450
0
            }
8451
8452
0
            if (num == -1 || i == num) {
8453
0
                WOLFSSL_MSG("no entry found");
8454
8455
0
                if (ctx->dir_entry == NULL) {
8456
0
                    ctx->dir_entry = wolfSSL_sk_BY_DIR_entry_new_null();
8457
8458
0
                    if (ctx->dir_entry == NULL) {
8459
0
                        WOLFSSL_MSG("failed to allocate dir_entry");
8460
0
                            WC_FREE_VAR_EX(buf, 0, DYNAMIC_TYPE_OPENSSL);
8461
0
                        return 0;
8462
0
                    }
8463
0
                }
8464
8465
0
                entry = wolfSSL_BY_DIR_entry_new();
8466
0
                if (entry == NULL) {
8467
0
                    WOLFSSL_MSG("failed to allocate dir entry");
8468
0
                        WC_FREE_VAR_EX(buf, 0, DYNAMIC_TYPE_OPENSSL);
8469
0
                    return 0;
8470
0
                }
8471
0
                entry->dir_type = (int)argl;
8472
0
                entry->dir_name = (char*)XMALLOC(pathLen + 1/* \0 termination*/
8473
0
                                                , NULL, DYNAMIC_TYPE_OPENSSL);
8474
0
                entry->hashes = wolfSSL_sk_BY_DIR_HASH_new_null();
8475
0
                if (entry->dir_name == NULL || entry->hashes == NULL) {
8476
0
                    WOLFSSL_MSG("failed to allocate dir name");
8477
0
                    wolfSSL_BY_DIR_entry_free(entry);
8478
0
                        WC_FREE_VAR_EX(buf, 0, DYNAMIC_TYPE_OPENSSL);
8479
0
                    return 0;
8480
0
                }
8481
8482
0
                XSTRNCPY(entry->dir_name, buf, pathLen);
8483
0
                entry->dir_name[pathLen] = '\0';
8484
8485
0
                if (wolfSSL_sk_BY_DIR_entry_push(ctx->dir_entry, entry) <= 0) {
8486
0
                    wolfSSL_BY_DIR_entry_free(entry);
8487
0
                        WC_FREE_VAR_EX(buf, 0, DYNAMIC_TYPE_OPENSSL);
8488
0
                    return 0;
8489
0
                }
8490
0
            }
8491
            /* skip separator */
8492
0
            if (*c == SEPARATOR_CHAR) c++;
8493
8494
0
            pathLen = 0;
8495
0
            XMEMSET(buf, 0, MAX_FILENAME_SZ);
8496
0
        }
8497
0
        buf[pathLen++] = *c;
8498
8499
0
    } while(*c++ != '\0');
8500
8501
0
    WC_FREE_VAR_EX(buf, 0, DYNAMIC_TYPE_OPENSSL);
8502
8503
0
    return WOLFSSL_SUCCESS;
8504
#else
8505
    (void)ctx;
8506
    (void)argc;
8507
    (void)argl;
8508
    return WOLFSSL_NOT_IMPLEMENTED;
8509
#endif
8510
0
}
8511
8512
/* set additional data to X509_LOOKUP                                   */
8513
/* @param ctx    a pointer to X509_LOOKUP structure                     */
8514
/* @param cmd    control command :                                      */
8515
/*               X509_L_FILE_LOAD, X509_L_ADD_DIR X509_L_ADD_STORE or   */
8516
/*               X509_L_LOAD_STORE                                      */
8517
/* @param argc   arguments for the control command                      */
8518
/* @param argl   arguments for the control command                      */
8519
/* @param **ret  return value of the control command                    */
8520
/* @return WOLFSSL_SUCCESS on successful, otherwise WOLFSSL_FAILURE     */
8521
/* note: WOLFSSL_X509_L_ADD_STORE and WOLFSSL_X509_L_LOAD_STORE have not*/
8522
/*       yet implemented. It returns WOLFSSL_NOT_IMPLEMENTED            */
8523
/*       when those control commands are passed.                        */
8524
int wolfSSL_X509_LOOKUP_ctrl(WOLFSSL_X509_LOOKUP *ctx, int cmd,
8525
        const char *argc, long argl, char **ret)
8526
0
{
8527
0
    int lret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
8528
8529
0
    WOLFSSL_ENTER("wolfSSL_X509_LOOKUP_ctrl");
8530
0
#if !defined(NO_FILESYSTEM)
8531
0
    if (ctx != NULL) {
8532
0
        switch (cmd) {
8533
0
        case WOLFSSL_X509_L_FILE_LOAD:
8534
            /* expects to return a number of processed cert or crl file */
8535
0
            lret = wolfSSL_X509_load_cert_crl_file(ctx, argc, (int)argl) > 0 ?
8536
0
                            WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
8537
0
            break;
8538
0
        case WOLFSSL_X509_L_ADD_DIR:
8539
            /* store directory location to use it later */
8540
0
#if !defined(NO_WOLFSSL_DIR)
8541
0
            lret = x509AddCertDir(ctx->dirs, argc, argl);
8542
#else
8543
            (void)x509AddCertDir;
8544
            lret = WOLFSSL_NOT_IMPLEMENTED;
8545
#endif
8546
0
            break;
8547
0
        case WOLFSSL_X509_L_ADD_STORE:
8548
0
        case WOLFSSL_X509_L_LOAD_STORE:
8549
0
            return WOLFSSL_NOT_IMPLEMENTED;
8550
8551
0
        default:
8552
0
            break;
8553
0
        }
8554
0
    }
8555
0
    (void)ret;
8556
#else
8557
    (void)ctx;
8558
    (void)argc;
8559
    (void)argl;
8560
    (void)ret;
8561
    (void)cmd;
8562
    (void)x509AddCertDir;
8563
    lret = WOLFSSL_NOT_IMPLEMENTED;
8564
#endif
8565
0
    return lret;
8566
0
}
8567
8568
8569
#if defined(WOLFSSL_CERT_GEN)
8570
static int wolfssl_x509_make_der(WOLFSSL_X509* x509, int req,
8571
        unsigned char* der, int* derSz, int includeSig);
8572
#endif
8573
8574
#ifdef WOLFSSL_CERT_GEN
8575
#ifndef NO_BIO
8576
/* Converts the X509 to DER format and outputs it into bio.
8577
 *
8578
 * bio  is the structure to hold output DER
8579
 * x509 certificate to create DER from
8580
 * req  if set then a CSR is generated
8581
 *
8582
 * returns WOLFSSL_SUCCESS on success
8583
 */
8584
static int loadX509orX509REQFromBio(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
8585
    int req)
8586
{
8587
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
8588
    /* Get large buffer to hold cert der */
8589
    int derSz = X509_BUFFER_SZ;
8590
    WC_DECLARE_VAR(der, byte, X509_BUFFER_SZ, 0);
8591
    WOLFSSL_ENTER("wolfSSL_i2d_X509_bio");
8592
8593
    if (bio == NULL || x509 == NULL) {
8594
        return WOLFSSL_FAILURE;
8595
    }
8596
8597
#ifdef WOLFSSL_SMALL_STACK
8598
    der = (byte*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8599
    if (!der) {
8600
        WOLFSSL_MSG("malloc failed");
8601
        return WOLFSSL_FAILURE;
8602
    }
8603
#endif
8604
8605
    if (wolfssl_x509_make_der(x509, req, der, &derSz, 1) != WOLFSSL_SUCCESS) {
8606
        goto cleanup;
8607
    }
8608
8609
    if (wolfSSL_BIO_write(bio, der, derSz) != derSz) {
8610
        goto cleanup;
8611
    }
8612
8613
    ret = WOLFSSL_SUCCESS;
8614
cleanup:
8615
    WC_FREE_VAR_EX(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8616
8617
    return ret;
8618
}
8619
8620
/* Converts the X509 to DER format and outputs it into bio.
8621
 *
8622
 * bio  is the structure to hold output DER
8623
 * x509 certificate to create DER from
8624
 *
8625
 * returns WOLFSSL_SUCCESS on success
8626
 */
8627
int wolfSSL_i2d_X509_bio(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
8628
{
8629
    return loadX509orX509REQFromBio(bio, x509, 0);
8630
}
8631
8632
#ifdef WOLFSSL_CERT_REQ
8633
int wolfSSL_i2d_X509_REQ_bio(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
8634
{
8635
    return loadX509orX509REQFromBio(bio, x509, 1);
8636
}
8637
#endif /* WOLFSSL_CERT_REQ */
8638
#endif /* !NO_BIO */
8639
#endif /* WOLFSSL_CERT_GEN */
8640
8641
/* Converts an internal structure to a DER buffer
8642
 *
8643
 * x509 structure to get DER buffer from
8644
 * out  buffer to hold result. If NULL then *out is NULL then a new buffer is
8645
 *      created.
8646
 *
8647
 * returns the size of the DER result on success
8648
 */
8649
int wolfSSL_i2d_X509(WOLFSSL_X509* x509, unsigned char** out)
8650
0
{
8651
0
    const unsigned char* der;
8652
0
    int derSz = 0;
8653
0
    int advance = 1;
8654
8655
0
    WOLFSSL_ENTER("wolfSSL_i2d_X509");
8656
8657
0
    if (x509 == NULL) {
8658
0
        WOLFSSL_LEAVE("wolfSSL_i2d_X509", BAD_FUNC_ARG);
8659
0
        return BAD_FUNC_ARG;
8660
0
    }
8661
8662
0
    der = wolfSSL_X509_get_der(x509, &derSz);
8663
0
    if (der == NULL) {
8664
0
        WOLFSSL_LEAVE("wolfSSL_i2d_X509", MEMORY_E);
8665
0
        return MEMORY_E;
8666
0
    }
8667
8668
0
    if (out != NULL && *out == NULL) {
8669
0
        *out = (unsigned char*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_OPENSSL);
8670
0
        if (*out == NULL) {
8671
0
            WOLFSSL_LEAVE("wolfSSL_i2d_X509", MEMORY_E);
8672
0
            return MEMORY_E;
8673
0
        }
8674
0
        advance = 0;
8675
0
    }
8676
8677
0
    if (out != NULL) {
8678
0
        XMEMCPY(*out, der, derSz);
8679
0
        if (advance)
8680
0
            *out += derSz;
8681
0
    }
8682
8683
0
    WOLFSSL_LEAVE("wolfSSL_i2d_X509", derSz);
8684
0
    return derSz;
8685
0
}
8686
8687
#ifdef WOLFSSL_DUAL_ALG_CERTS
8688
/* Generate a der preTBS from a decoded cert, and write
8689
 * to buffer.
8690
 *
8691
 * @param [in]  cert  The decoded cert to parse.
8692
 * @param [out] der   The der buffer to write in.
8693
 * @param [in]  derSz The der buffer size.
8694
 *
8695
 * @return  preTBS der size on success.
8696
 * */
8697
int wc_GeneratePreTBS(DecodedCert* cert, byte *der, int derSz) {
8698
    int ret = 0;
8699
    WOLFSSL_X509 *x = NULL;
8700
    byte certIsCSR = 0;
8701
8702
    WOLFSSL_ENTER("wc_GeneratePreTBS");
8703
8704
    if ((cert == NULL) || (der == NULL) || (derSz <= 0)) {
8705
        return BAD_FUNC_ARG;
8706
    }
8707
8708
#ifdef WOLFSSL_CERT_REQ
8709
    certIsCSR = cert->isCSR;
8710
#endif
8711
8712
    x = wolfSSL_X509_new();
8713
    if (x == NULL) {
8714
        ret = MEMORY_E;
8715
    }
8716
    else {
8717
        ret = CopyDecodedToX509(x, cert);
8718
    }
8719
8720
    if (ret == 0) {
8721
        /* Remove the altsigval extension. */
8722
        XFREE(x->altSigValDer, x->heap, DYNAMIC_TYPE_X509_EXT);
8723
        x->altSigValDer = NULL;
8724
        x->altSigValLen = 0;
8725
        /* Remove sigOID so it won't be encoded. */
8726
        x->sigOID = 0;
8727
        /* We now have a PreTBS. Encode it. */
8728
        ret = wolfssl_x509_make_der(x, certIsCSR, der, &derSz, 0);
8729
        if (ret == WOLFSSL_SUCCESS) {
8730
            ret = derSz;
8731
        }
8732
    }
8733
8734
    if (x != NULL) {
8735
        wolfSSL_X509_free(x);
8736
        x = NULL;
8737
    }
8738
8739
    return ret;
8740
}
8741
#endif /* WOLFSSL_DUAL_ALG_CERTS */
8742
8743
#ifndef NO_BIO
8744
/**
8745
 * Converts the DER from bio and creates a WOLFSSL_X509 structure from it.
8746
 * @param bio  is the structure holding DER
8747
 * @param x509 certificate to create from DER. Can be NULL
8748
 * @param req  1 for a CSR and 0 for a x509 cert
8749
 * @return pointer to WOLFSSL_X509 structure on success and NULL on fail
8750
 */
8751
static WOLFSSL_X509* d2i_X509orX509REQ_bio(WOLFSSL_BIO* bio,
8752
                                            WOLFSSL_X509** x509, int req)
8753
0
{
8754
0
    WOLFSSL_X509* localX509 = NULL;
8755
0
    byte* mem  = NULL;
8756
0
    int    size;
8757
8758
0
    WOLFSSL_ENTER("wolfSSL_d2i_X509_bio");
8759
8760
0
    if (bio == NULL) {
8761
0
        WOLFSSL_MSG("Bad Function Argument bio is NULL");
8762
0
        return NULL;
8763
0
    }
8764
8765
0
    size = wolfSSL_BIO_get_len(bio);
8766
0
    if (size <= 0) {
8767
0
        WOLFSSL_MSG("wolfSSL_BIO_get_len error. Possibly no pending data.");
8768
0
        WOLFSSL_ERROR(WOLFSSL_ASN1_R_HEADER_TOO_LONG_E);
8769
0
        return NULL;
8770
0
    }
8771
8772
0
    if (!(mem = (byte*)XMALLOC(size, NULL, DYNAMIC_TYPE_OPENSSL))) {
8773
0
        WOLFSSL_MSG("malloc error");
8774
0
        return NULL;
8775
0
    }
8776
8777
0
    if ((size = wolfSSL_BIO_read(bio, mem, size)) == 0) {
8778
0
        WOLFSSL_MSG("wolfSSL_BIO_read error");
8779
0
        XFREE(mem, NULL, DYNAMIC_TYPE_OPENSSL);
8780
0
        return NULL;
8781
0
    }
8782
8783
0
    if (req) {
8784
#ifdef WOLFSSL_CERT_REQ
8785
        localX509 = wolfSSL_X509_REQ_d2i(NULL, mem, size);
8786
#else
8787
0
        WOLFSSL_MSG("CSR not compiled in");
8788
0
#endif
8789
0
    }
8790
0
    else {
8791
0
        localX509 = wolfSSL_X509_d2i_ex(NULL, mem, size, bio->heap);
8792
0
    }
8793
0
    if (localX509 == NULL) {
8794
0
        WOLFSSL_MSG("wolfSSL_X509_d2i error");
8795
0
        XFREE(mem, NULL, DYNAMIC_TYPE_OPENSSL);
8796
0
        return NULL;
8797
0
    }
8798
8799
0
    if (x509 != NULL) {
8800
0
        *x509 = localX509;
8801
0
    }
8802
8803
0
    XFREE(mem, NULL, DYNAMIC_TYPE_OPENSSL);
8804
0
    return localX509;
8805
0
}
8806
8807
WOLFSSL_X509* wolfSSL_d2i_X509_bio(WOLFSSL_BIO* bio, WOLFSSL_X509** x509)
8808
0
{
8809
0
    return d2i_X509orX509REQ_bio(bio, x509, 0);
8810
0
}
8811
8812
#ifdef WOLFSSL_CERT_REQ
8813
WOLFSSL_X509* wolfSSL_d2i_X509_REQ_bio(WOLFSSL_BIO* bio, WOLFSSL_X509** x509)
8814
{
8815
    return d2i_X509orX509REQ_bio(bio, x509, 1);
8816
}
8817
#endif
8818
#endif /* !NO_BIO */
8819
8820
#endif /* OPENSSL_EXTRA */
8821
8822
#ifdef OPENSSL_EXTRA
8823
/* Use the public key to verify the signature. Note: this only verifies
8824
 * the certificate signature.
8825
 * returns WOLFSSL_SUCCESS on successful signature verification */
8826
static int verifyX509orX509REQ(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey,
8827
    int req)
8828
0
{
8829
0
    int ret;
8830
0
    const byte* der;
8831
0
    int derSz = 0;
8832
0
    int type;
8833
8834
0
    (void)req;
8835
8836
0
    if (x509 == NULL || pkey == NULL) {
8837
0
        return WOLFSSL_FATAL_ERROR;
8838
0
    }
8839
8840
0
    der = wolfSSL_X509_get_der(x509, &derSz);
8841
0
    if (der == NULL) {
8842
0
        WOLFSSL_MSG("Error getting WOLFSSL_X509 DER");
8843
0
        return WOLFSSL_FATAL_ERROR;
8844
0
    }
8845
8846
0
    switch (pkey->type) {
8847
0
        case WC_EVP_PKEY_RSA:
8848
0
            type = RSAk;
8849
0
            break;
8850
8851
0
        case WC_EVP_PKEY_EC:
8852
0
            type = ECDSAk;
8853
0
            break;
8854
8855
0
        case WC_EVP_PKEY_DSA:
8856
0
            type = DSAk;
8857
0
            break;
8858
8859
0
        default:
8860
0
            WOLFSSL_MSG("Unknown pkey key type");
8861
0
            return WOLFSSL_FATAL_ERROR;
8862
0
    }
8863
8864
#ifdef WOLFSSL_CERT_REQ
8865
    if (req)
8866
        ret = CheckCSRSignaturePubKey(der, (word32)derSz, x509->heap,
8867
                (unsigned char*)pkey->pkey.ptr, pkey->pkey_sz, type);
8868
    else
8869
#endif
8870
0
        ret = CheckCertSignaturePubKey(der, (word32)derSz, x509->heap,
8871
0
                (unsigned char*)pkey->pkey.ptr, pkey->pkey_sz, type);
8872
0
    if (ret == 0) {
8873
0
        return WOLFSSL_SUCCESS;
8874
0
    }
8875
0
    return WOLFSSL_FAILURE;
8876
0
}
8877
8878
int wolfSSL_X509_verify(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey)
8879
0
{
8880
0
    return verifyX509orX509REQ(x509, pkey, 0);
8881
0
}
8882
8883
#ifdef WOLFSSL_CERT_REQ
8884
int wolfSSL_X509_REQ_verify(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey)
8885
{
8886
    return verifyX509orX509REQ(x509, pkey, 1);
8887
}
8888
#endif /* WOLFSSL_CERT_REQ */
8889
8890
#if !defined(NO_FILESYSTEM)
8891
static void *wolfSSL_d2i_X509_fp_ex(XFILE file, void **x509, int type)
8892
0
{
8893
0
    void *newx509 = NULL;
8894
0
    byte *fileBuffer = NULL;
8895
0
    long sz = 0;
8896
8897
    /* init variable */
8898
0
    if (x509)
8899
0
        *x509 = NULL;
8900
8901
    /* argument check */
8902
0
    if (file == XBADFILE) {
8903
0
        return NULL;
8904
0
    }
8905
8906
    /* determine file size */
8907
0
    if (XFSEEK(file, 0, XSEEK_END) != 0) {
8908
0
        return NULL;
8909
0
    }
8910
0
    sz = XFTELL(file);
8911
0
    if (XFSEEK(file, 0, XSEEK_SET) != 0) {
8912
0
        return NULL;
8913
0
    }
8914
8915
0
    if (sz > MAX_WOLFSSL_FILE_SIZE || sz <= 0) {
8916
0
        WOLFSSL_MSG("d2i_X509_fp_ex file size error");
8917
0
        return NULL;
8918
0
    }
8919
8920
0
    fileBuffer = (byte *)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE);
8921
0
    if (fileBuffer != NULL) {
8922
0
        if ((long)XFREAD(fileBuffer, 1, (size_t)sz, file) != sz) {
8923
0
            WOLFSSL_MSG("File read failed");
8924
0
            goto err_exit;
8925
0
        }
8926
0
        if (type == CERT_TYPE) {
8927
0
            newx509 = (void *)wolfSSL_X509_d2i(NULL, fileBuffer, (int)sz);
8928
0
        }
8929
    #ifdef HAVE_CRL
8930
        else if (type == CRL_TYPE) {
8931
            newx509 = (void *)wolfSSL_d2i_X509_CRL(NULL, fileBuffer, (int)sz);
8932
        }
8933
    #endif
8934
    #ifdef WOLFSSL_CERT_REQ
8935
        else if (type == CERTREQ_TYPE) {
8936
             newx509 = (void *)wolfSSL_X509_REQ_d2i(NULL, fileBuffer, (int)sz);
8937
        }
8938
    #endif
8939
0
    #if !defined(NO_ASN) && !defined(NO_PWDBASED) && defined(HAVE_PKCS12)
8940
0
        else if (type == PKCS12_TYPE) {
8941
0
            if ((newx509 = wc_PKCS12_new()) == NULL) {
8942
0
                goto err_exit;
8943
0
            }
8944
0
            if (wc_d2i_PKCS12(fileBuffer, (word32)sz,
8945
0
                                                     (WC_PKCS12*)newx509) < 0) {
8946
0
                goto err_exit;
8947
0
            }
8948
0
        }
8949
0
    #endif
8950
0
        else {
8951
0
            goto err_exit;
8952
0
        }
8953
0
        if (newx509 == NULL) {
8954
0
            WOLFSSL_MSG("X509 failed");
8955
0
            goto err_exit;
8956
0
        }
8957
0
    }
8958
8959
0
    if (x509)
8960
0
        *x509 = newx509;
8961
8962
0
    goto _exit;
8963
8964
0
err_exit:
8965
0
#if !defined(NO_ASN) && !defined(NO_PWDBASED) && defined(HAVE_PKCS12)
8966
0
    if ((newx509 != NULL) && (type == PKCS12_TYPE)) {
8967
0
        wc_PKCS12_free((WC_PKCS12*)newx509);
8968
0
        newx509 = NULL;
8969
0
    }
8970
0
#endif
8971
0
_exit:
8972
0
    XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
8973
8974
0
    return newx509;
8975
0
}
8976
8977
#ifdef WOLFSSL_CERT_REQ
8978
WOLFSSL_X509* wolfSSL_d2i_X509_REQ_fp(XFILE fp, WOLFSSL_X509 **req)
8979
{
8980
    return (WOLFSSL_X509 *)wolfSSL_d2i_X509_fp_ex(fp, (void **)req,
8981
                                                  CERTREQ_TYPE);
8982
}
8983
#endif /* WOLFSSL_CERT_REQ */
8984
8985
WOLFSSL_X509 *wolfSSL_d2i_X509_fp(XFILE fp, WOLFSSL_X509 **x509)
8986
0
{
8987
0
    WOLFSSL_ENTER("wolfSSL_d2i_X509_fp");
8988
0
    return (WOLFSSL_X509 *)wolfSSL_d2i_X509_fp_ex(fp, (void **)x509, CERT_TYPE);
8989
0
}
8990
8991
/* load certificate or CRL file, and add it to the STORE           */
8992
/* @param ctx    a pointer to X509_LOOKUP structure                */
8993
/* @param file   file name to load                                 */
8994
/* @param type   WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1     */
8995
/* @return a number of loading CRL or certificate, otherwise zero  */
8996
int wolfSSL_X509_load_cert_crl_file(WOLFSSL_X509_LOOKUP *ctx,
8997
    const char *file, int type)
8998
0
{
8999
0
    WOLFSSL_X509 *x509 = NULL;
9000
9001
0
    int cnt = 0;
9002
9003
0
    WOLFSSL_ENTER("wolfSSL_X509_load_cert_crl_file");
9004
9005
    /* stanity check */
9006
0
    if (ctx == NULL || file == NULL) {
9007
0
        WOLFSSL_MSG("bad arguments");
9008
0
        return 0;
9009
0
    }
9010
9011
0
    if (type != WOLFSSL_FILETYPE_PEM) {
9012
0
        x509 = wolfSSL_X509_load_certificate_file(file, type);
9013
0
        if (x509 != NULL) {
9014
0
            if (wolfSSL_X509_STORE_add_cert(ctx->store, x509)
9015
0
                                    == WOLFSSL_SUCCESS) {
9016
0
                cnt++;
9017
0
            }
9018
0
            else {
9019
0
                WOLFSSL_MSG("wolfSSL_X509_STORE_add_cert error");
9020
0
            }
9021
0
            wolfSSL_X509_free(x509);
9022
0
            x509 = NULL;
9023
0
        }
9024
0
        else {
9025
0
            WOLFSSL_MSG("wolfSSL_X509_load_certificate_file error");
9026
0
        }
9027
9028
0
    }
9029
0
    else {
9030
0
#if defined(OPENSSL_ALL)
9031
0
    #if !defined(NO_BIO)
9032
0
        STACK_OF(WOLFSSL_X509_INFO) *info;
9033
0
        WOLFSSL_X509_INFO *info_tmp;
9034
0
        int i;
9035
0
        int num = 0;
9036
0
        WOLFSSL_BIO *bio = wolfSSL_BIO_new_file(file, "rb");
9037
0
        if (!bio) {
9038
0
            WOLFSSL_MSG("wolfSSL_BIO_new error");
9039
0
            return cnt;
9040
0
        }
9041
9042
0
        info = wolfSSL_PEM_X509_INFO_read_bio(bio, NULL, NULL, NULL);
9043
9044
0
        wolfSSL_BIO_free(bio);
9045
9046
0
        if (!info) {
9047
0
            WOLFSSL_MSG("wolfSSL_PEM_X509_INFO_read_bio error");
9048
0
            return cnt;
9049
0
        }
9050
0
        num = wolfSSL_sk_X509_INFO_num(info);
9051
0
        for (i=0; i < num; i++) {
9052
0
            info_tmp = wolfSSL_sk_X509_INFO_value(info, i);
9053
9054
0
            if (info_tmp == NULL)
9055
0
                continue;
9056
9057
0
            if (info_tmp->x509) {
9058
0
                if (wolfSSL_X509_STORE_add_cert(ctx->store, info_tmp->x509) ==
9059
0
                    WOLFSSL_SUCCESS) {
9060
0
                    cnt ++;
9061
0
                }
9062
0
                else {
9063
0
                    WOLFSSL_MSG("wolfSSL_X509_STORE_add_cert failed");
9064
0
                }
9065
0
            }
9066
#ifdef HAVE_CRL
9067
            if (info_tmp->crl) {
9068
                if (wolfSSL_X509_STORE_add_crl(ctx->store, info_tmp->crl) ==
9069
                    WOLFSSL_SUCCESS) {
9070
                    cnt ++;
9071
                }
9072
                else {
9073
                    WOLFSSL_MSG("wolfSSL_X509_STORE_add_crl failed");
9074
                }
9075
            }
9076
#endif
9077
0
        }
9078
0
        wolfSSL_sk_X509_INFO_pop_free(info, wolfSSL_X509_INFO_free);
9079
    #elif defined(HAVE_CRL)
9080
        /* Only supports one certificate or CRL in the file. */
9081
        WOLFSSL_X509_CRL* crl = NULL;
9082
        XFILE fp = XFOPEN(file, "rb");
9083
        if (fp == XBADFILE) {
9084
            WOLFSSL_MSG("XFOPEN error");
9085
            return cnt;
9086
        }
9087
9088
        x509 = wolfSSL_PEM_read_X509(fp, NULL, NULL, NULL);
9089
        if (x509 != NULL) {
9090
            if (wolfSSL_X509_STORE_add_cert(ctx->store, x509) ==
9091
                WOLFSSL_SUCCESS) {
9092
                cnt++;
9093
            }
9094
            else {
9095
                WOLFSSL_MSG("wolfSSL_X509_STORE_add_cert failed");
9096
            }
9097
        }
9098
        else {
9099
            if (XFSEEK(fp, 0, XSEEK_SET) != 0) {
9100
                WOLFSSL_MSG("XFSEEK error");
9101
                return cnt;
9102
            }
9103
            crl = wolfSSL_PEM_read_X509_CRL(fp, NULL, NULL, NULL);
9104
            if (crl != NULL) {
9105
                if (wolfSSL_X509_STORE_add_crl(ctx->store, crl) ==
9106
                    WOLFSSL_SUCCESS) {
9107
                    cnt++;
9108
                }
9109
                else {
9110
                    WOLFSSL_MSG("wolfSSL_X509_STORE_add_crl failed");
9111
                }
9112
            }
9113
            else {
9114
                WOLFSSL_MSG("Certificate and CRL not recognized");
9115
                return cnt;
9116
            }
9117
        }
9118
9119
        wolfSSL_X509_free(x509);
9120
        wolfSSL_X509_CRL_free(crl);
9121
    #endif
9122
#else
9123
    (void)cnt;
9124
#endif /* OPENSSL_ALL && !NO_BIO */
9125
0
    }
9126
9127
0
    WOLFSSL_LEAVE("wolfSSL_X509_load_ceretificate_crl_file", cnt);
9128
0
    return cnt;
9129
0
}
9130
#endif /* !NO_FILESYSTEM */
9131
9132
9133
#ifdef HAVE_CRL
9134
9135
#ifndef NO_BIO
9136
WOLFSSL_X509_CRL *wolfSSL_d2i_X509_CRL_bio(WOLFSSL_BIO *bp,
9137
                                                    WOLFSSL_X509_CRL **x)
9138
{
9139
    int derSz;
9140
    byte* der = NULL;
9141
    WOLFSSL_X509_CRL* crl = NULL;
9142
9143
    if (bp == NULL)
9144
        return NULL;
9145
9146
    if ((derSz = wolfSSL_BIO_get_len(bp)) > 0) {
9147
        der = (byte*)XMALLOC(derSz, 0, DYNAMIC_TYPE_DER);
9148
        if (der != NULL) {
9149
            if (wolfSSL_BIO_read(bp, der, derSz) == derSz) {
9150
                crl = wolfSSL_d2i_X509_CRL(x, der, derSz);
9151
            }
9152
        }
9153
    }
9154
9155
    XFREE(der, 0, DYNAMIC_TYPE_DER);
9156
9157
    return crl;
9158
}
9159
#endif
9160
9161
#if !defined(NO_FILESYSTEM) && !defined(NO_STDIO_FILESYSTEM)
9162
WOLFSSL_X509_CRL *wolfSSL_d2i_X509_CRL_fp(XFILE fp, WOLFSSL_X509_CRL **crl)
9163
{
9164
    WOLFSSL_ENTER("wolfSSL_d2i_X509_CRL_fp");
9165
    return (WOLFSSL_X509_CRL *)wolfSSL_d2i_X509_fp_ex(fp, (void **)crl,
9166
        CRL_TYPE);
9167
}
9168
9169
/* Read CRL file, and add it to store and corresponding cert manager     */
9170
/* @param ctx   a pointer of X509_LOOKUP back to the X509_STORE          */
9171
/* @param file  a file to read                                           */
9172
/* @param type  WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1            */
9173
/* @return WOLFSSL_SUCCESS(1) on successful, otherwise WOLFSSL_FAILURE(0)*/
9174
int wolfSSL_X509_load_crl_file(WOLFSSL_X509_LOOKUP *ctx,
9175
                                             const char *file, int type)
9176
{
9177
#ifndef NO_BIO
9178
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
9179
    int count = 0;
9180
    WOLFSSL_BIO *bio = NULL;
9181
    WOLFSSL_X509_CRL *crl = NULL;
9182
9183
    WOLFSSL_ENTER("wolfSSL_X509_load_crl_file");
9184
9185
    if (ctx == NULL || file == NULL)
9186
        return ret;
9187
9188
    if ((bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file())) == NULL)
9189
        return ret;
9190
9191
    if (wolfSSL_BIO_read_filename(bio, file) <= 0) {
9192
        wolfSSL_BIO_free(bio);
9193
        return ret;
9194
    }
9195
9196
    if (wolfSSL_BIO_read_filename(bio, file) <= 0) {
9197
        wolfSSL_BIO_free(bio);
9198
        return ret;
9199
    }
9200
9201
    if (type == WOLFSSL_FILETYPE_PEM) {
9202
        do {
9203
            crl = wolfSSL_PEM_read_bio_X509_CRL(bio, NULL, NULL, NULL);
9204
            if (crl == NULL) {
9205
                if (count <= 0) {
9206
                    WOLFSSL_MSG("Load crl failed");
9207
                }
9208
                break;
9209
            }
9210
9211
            ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
9212
            if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
9213
                WOLFSSL_MSG("Adding crl failed");
9214
                break;
9215
            }
9216
            count++;
9217
            wolfSSL_X509_CRL_free(crl);
9218
            crl = NULL;
9219
        }   while(crl == NULL);
9220
9221
        ret = count;
9222
    }
9223
    else if (type == WOLFSSL_FILETYPE_ASN1) {
9224
        crl = wolfSSL_d2i_X509_CRL_bio(bio, NULL);
9225
        if (crl == NULL) {
9226
            WOLFSSL_MSG("Load crl failed");
9227
        }
9228
        else {
9229
            ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
9230
            if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
9231
                WOLFSSL_MSG("Adding crl failed");
9232
            }
9233
            else {
9234
                ret = 1;/* handled a file */
9235
            }
9236
        }
9237
    }
9238
    else {
9239
        WOLFSSL_MSG("Invalid file type");
9240
    }
9241
9242
    wolfSSL_X509_CRL_free(crl);
9243
    wolfSSL_BIO_free(bio);
9244
9245
    WOLFSSL_LEAVE("wolfSSL_X509_load_crl_file", ret);
9246
    return ret;
9247
#else
9248
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
9249
    int count = 0;
9250
    XFILE fp;
9251
    WOLFSSL_X509_CRL *crl = NULL;
9252
9253
    WOLFSSL_ENTER("wolfSSL_X509_load_crl_file");
9254
9255
    if (ctx == NULL || file == NULL)
9256
        return ret;
9257
9258
    if ((fp = XFOPEN(file, "rb")) == XBADFILE)
9259
        return ret;
9260
9261
    if (type == WOLFSSL_FILETYPE_PEM) {
9262
        do {
9263
            crl = wolfSSL_PEM_read_X509_CRL(fp, NULL, NULL, NULL);
9264
            if (crl == NULL) {
9265
                if (count <= 0) {
9266
                    WOLFSSL_MSG("Load crl failed");
9267
                }
9268
                break;
9269
            }
9270
9271
            ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
9272
            if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
9273
                WOLFSSL_MSG("Adding crl failed");
9274
                break;
9275
            }
9276
            count++;
9277
            wolfSSL_X509_CRL_free(crl);
9278
            crl = NULL;
9279
        }
9280
        while(crl == NULL);
9281
9282
        ret = count;
9283
    }
9284
    else if (type == WOLFSSL_FILETYPE_ASN1) {
9285
        crl = wolfSSL_d2i_X509_CRL_fp(fp, NULL);
9286
        if (crl == NULL) {
9287
            WOLFSSL_MSG("Load crl failed");
9288
        }
9289
        else {
9290
            ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
9291
            if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
9292
                WOLFSSL_MSG("Adding crl failed");
9293
            }
9294
            else {
9295
                ret = 1;/* handled a file */
9296
            }
9297
        }
9298
    }
9299
    else {
9300
        WOLFSSL_MSG("Invalid file type");
9301
    }
9302
9303
    wolfSSL_X509_CRL_free(crl);
9304
    XFCLOSE(fp);
9305
9306
    WOLFSSL_LEAVE("wolfSSL_X509_load_crl_file", ret);
9307
    return ret;
9308
#endif /* !NO_BIO */
9309
}
9310
#endif /* !NO_FILESYSTEM */
9311
9312
9313
WOLFSSL_X509_CRL* wolfSSL_d2i_X509_CRL(WOLFSSL_X509_CRL** crl,
9314
        const unsigned char* in, int len)
9315
{
9316
    WOLFSSL_X509_CRL *newcrl = NULL;
9317
    int ret = WOLFSSL_SUCCESS;
9318
9319
    WOLFSSL_ENTER("wolfSSL_d2i_X509_CRL");
9320
9321
    if (in == NULL) {
9322
        WOLFSSL_MSG("Bad argument value");
9323
    }
9324
    else {
9325
        newcrl =(WOLFSSL_X509_CRL*)XMALLOC(sizeof(WOLFSSL_X509_CRL), NULL,
9326
                DYNAMIC_TYPE_CRL);
9327
        if (newcrl == NULL) {
9328
            WOLFSSL_MSG("New CRL allocation failed");
9329
        }
9330
        else {
9331
            ret = InitCRL(newcrl, NULL);
9332
            if (ret < 0) {
9333
                WOLFSSL_MSG("Init tmp CRL failed");
9334
            }
9335
            else {
9336
                ret = BufferLoadCRL(newcrl, in, len, WOLFSSL_FILETYPE_ASN1,
9337
                    NO_VERIFY);
9338
                if (ret != WOLFSSL_SUCCESS) {
9339
                    WOLFSSL_MSG("Buffer Load CRL failed");
9340
                }
9341
                else {
9342
                    if (crl) {
9343
                        *crl = newcrl;
9344
                    }
9345
                }
9346
            }
9347
        }
9348
    }
9349
9350
    if ((ret != WOLFSSL_SUCCESS) && (newcrl != NULL)) {
9351
        wolfSSL_X509_CRL_free(newcrl);
9352
        newcrl = NULL;
9353
    }
9354
9355
    return newcrl;
9356
}
9357
9358
/* Retrieve issuer X509_NAME from CRL
9359
 * return X509_NAME*  on success
9360
 * return NULL on failure
9361
 */
9362
WOLFSSL_X509_NAME* wolfSSL_X509_CRL_get_issuer_name(const WOLFSSL_X509_CRL* crl)
9363
{
9364
    if (crl == NULL || crl->crlList == NULL)
9365
        return NULL;
9366
9367
    return crl->crlList->issuer;
9368
}
9369
9370
/* Set issuer name of CRL
9371
 * return WOLFSSL_SUCCESS on success
9372
 * return WOLFSSL_FAILURE on failure
9373
 */
9374
int wolfSSL_X509_CRL_set_issuer_name(WOLFSSL_X509_CRL* crl,
9375
                                     const WOLFSSL_X509_NAME* name)
9376
{
9377
    WOLFSSL_X509_NAME* newName;
9378
9379
    if (crl == NULL || crl->crlList == NULL || name == NULL)
9380
        return WOLFSSL_FAILURE;
9381
9382
    newName = wolfSSL_X509_NAME_dup(name);
9383
    if (newName == NULL)
9384
        return WOLFSSL_FAILURE;
9385
9386
    if (crl->crlList->issuer != NULL) {
9387
        FreeX509Name(crl->crlList->issuer);
9388
        XFREE(crl->crlList->issuer, crl->heap, DYNAMIC_TYPE_X509);
9389
    }
9390
    crl->crlList->issuer = newName;
9391
9392
    return WOLFSSL_SUCCESS;
9393
}
9394
9395
/* Retrieve version from CRL
9396
 * return version on success
9397
 * return 0 on failure
9398
 */
9399
int wolfSSL_X509_CRL_version(WOLFSSL_X509_CRL* crl)
9400
{
9401
    if (crl == NULL || crl->crlList == NULL)
9402
        return 0;
9403
9404
    return crl->crlList->version;
9405
}
9406
9407
/* Set version of CRL
9408
 * Caller passes the RFC 5280 value: 0 for v1, 1 for v2.
9409
 * Internally wolfSSL stores version + 1 (v1 = 1, v2 = 2) to match
9410
 * what ParseCRL produces, so apply the same normalization here.
9411
 * return WOLFSSL_SUCCESS on success
9412
 * return WOLFSSL_FAILURE on failure
9413
 */
9414
int wolfSSL_X509_CRL_set_version(WOLFSSL_X509_CRL* crl, long version)
9415
{
9416
    if (crl == NULL || crl->crlList == NULL)
9417
        return WOLFSSL_FAILURE;
9418
9419
    /* Only v1 (0) and v2 (1) are defined by RFC 5280. */
9420
    if (version < 0 || version > 1)
9421
        return WOLFSSL_FAILURE;
9422
9423
    /* Store as version + 1 to match internal convention. */
9424
    crl->crlList->version = (int)version + 1;
9425
    return WOLFSSL_SUCCESS;
9426
}
9427
9428
/* Retrieve sig OID from CRL
9429
 * return OID on success
9430
 * return 0 on failure
9431
 */
9432
int wolfSSL_X509_CRL_get_signature_type(WOLFSSL_X509_CRL* crl)
9433
{
9434
    if (crl == NULL || crl->crlList == NULL)
9435
        return 0;
9436
9437
    return crl->crlList->signatureOID;
9438
}
9439
9440
/* Set signature type of CRL
9441
 * return WOLFSSL_SUCCESS on success
9442
 * return WOLFSSL_FAILURE on failure
9443
 */
9444
int wolfSSL_X509_CRL_set_signature_type(WOLFSSL_X509_CRL* crl,
9445
                                        int signatureType)
9446
{
9447
    if (crl == NULL || crl->crlList == NULL)
9448
        return WOLFSSL_FAILURE;
9449
9450
    crl->crlList->signatureOID = signatureType;
9451
    return WOLFSSL_SUCCESS;
9452
}
9453
9454
/* Retrieve sig NID from CRL
9455
 * return NID on success
9456
 * return 0 on failure
9457
 */
9458
int wolfSSL_X509_CRL_get_signature_nid(const WOLFSSL_X509_CRL* crl)
9459
{
9460
    if (crl == NULL || crl->crlList == NULL)
9461
        return 0;
9462
9463
    return oid2nid(crl->crlList->signatureOID, oidSigType);
9464
}
9465
9466
/* Set signature NID of CRL
9467
 * return WOLFSSL_SUCCESS on success
9468
 * return negative value on failure
9469
 */
9470
int wolfSSL_X509_CRL_set_signature_nid(WOLFSSL_X509_CRL* crl, int nid)
9471
{
9472
    int ret = WOLFSSL_SUCCESS;
9473
    word32 oid;
9474
9475
    if (crl == NULL || crl->crlList == NULL || nid <= 0) {
9476
        ret = BAD_FUNC_ARG;
9477
    }
9478
9479
    if (ret == WOLFSSL_SUCCESS) {
9480
        oid = nid2oid(nid, oidSigType);
9481
        if (oid == (word32)-1 || oid == (word32)WOLFSSL_FATAL_ERROR) {
9482
            ret = WOLFSSL_FATAL_ERROR;
9483
        }
9484
        else {
9485
            crl->crlList->signatureOID = oid;
9486
        }
9487
    }
9488
9489
    return ret;
9490
}
9491
9492
/* Retrieve signature from CRL
9493
 * return WOLFSSL_SUCCESS on success and negative values on failure
9494
 */
9495
int wolfSSL_X509_CRL_get_signature(WOLFSSL_X509_CRL* crl,
9496
    unsigned char* buf, int* bufSz)
9497
{
9498
    WOLFSSL_ENTER("wolfSSL_X509_CRL_get_signature");
9499
9500
    if (crl == NULL || crl->crlList == NULL ||
9501
        crl->crlList->signature == NULL || bufSz == NULL)
9502
        return BAD_FUNC_ARG;
9503
9504
    if (buf != NULL) {
9505
        if (*bufSz < (int)crl->crlList->signatureSz) {
9506
            WOLFSSL_MSG("Signature buffer too small");
9507
            return BUFFER_E;
9508
        }
9509
        else {
9510
            XMEMCPY(buf, crl->crlList->signature, crl->crlList->signatureSz);
9511
        }
9512
    }
9513
    *bufSz = (int)crl->crlList->signatureSz;
9514
9515
    return WOLFSSL_SUCCESS;
9516
}
9517
9518
int wolfSSL_X509_CRL_set_signature(WOLFSSL_X509_CRL* crl,
9519
    unsigned char* buf, int bufSz)
9520
{
9521
    byte* newSig;
9522
9523
    if (crl == NULL || crl->crlList == NULL || buf == NULL || bufSz <= 0) {
9524
        return BAD_FUNC_ARG;
9525
    }
9526
9527
    /* Ensure signature buffer is allocated and large enough. */
9528
    if (crl->crlList->signature == NULL) {
9529
        crl->crlList->signature = (byte*)XMALLOC((word32)bufSz, crl->heap,
9530
                                                 DYNAMIC_TYPE_CRL_ENTRY);
9531
        if (crl->crlList->signature == NULL) {
9532
            return MEMORY_E;
9533
        }
9534
        crl->crlList->signatureSz = (word32)bufSz;
9535
    }
9536
    else if ((word32)bufSz > crl->crlList->signatureSz) {
9537
        newSig = (byte*)XMALLOC((word32)bufSz, crl->heap,
9538
                                DYNAMIC_TYPE_CRL_ENTRY);
9539
        if (newSig == NULL) {
9540
            return MEMORY_E;
9541
        }
9542
        XFREE(crl->crlList->signature, crl->heap, DYNAMIC_TYPE_CRL_ENTRY);
9543
        crl->crlList->signature = newSig;
9544
        crl->crlList->signatureSz = (word32)bufSz;
9545
    }
9546
    else {
9547
        /* Reuse existing buffer, clear contents in case new signature
9548
         * is smaller. Note that we do not shrink the buffer. */
9549
        XMEMSET(crl->crlList->signature, 0, crl->crlList->signatureSz);
9550
    }
9551
9552
    XMEMCPY(crl->crlList->signature, buf, bufSz);
9553
    crl->crlList->signatureSz = (word32)bufSz;
9554
    return WOLFSSL_SUCCESS;
9555
}
9556
9557
/* Retrieve serial number from RevokedCert
9558
 * return WOLFSSL_SUCCESS on success and negative values on failure
9559
 */
9560
int wolfSSL_X509_REVOKED_get_serial_number(RevokedCert* rev,
9561
    byte* in, int* inOutSz)
9562
{
9563
    WOLFSSL_ENTER("wolfSSL_X509_REVOKED_get_serial_number");
9564
    if (rev == NULL || inOutSz == NULL) {
9565
        return BAD_FUNC_ARG;
9566
    }
9567
9568
    if (in != NULL) {
9569
        if (*inOutSz < rev->serialSz) {
9570
            WOLFSSL_MSG("Serial buffer too small");
9571
            return BUFFER_E;
9572
        }
9573
        XMEMCPY(in, rev->serialNumber, rev->serialSz);
9574
    }
9575
    *inOutSz = rev->serialSz;
9576
9577
    return WOLFSSL_SUCCESS;
9578
}
9579
9580
const WOLFSSL_ASN1_INTEGER* wolfSSL_X509_REVOKED_get0_serial_number(const
9581
                                                      WOLFSSL_X509_REVOKED *rev)
9582
{
9583
    WOLFSSL_ENTER("wolfSSL_X509_REVOKED_get0_serial_number");
9584
9585
    if (rev != NULL) {
9586
        return rev->serialNumber;
9587
    }
9588
    else
9589
        return NULL;
9590
}
9591
9592
const WOLFSSL_ASN1_TIME* wolfSSL_X509_REVOKED_get0_revocation_date(const
9593
                                                      WOLFSSL_X509_REVOKED *rev)
9594
{
9595
    WOLFSSL_ENTER("wolfSSL_X509_REVOKED_get0_revocation_date");
9596
9597
    if (rev != NULL) {
9598
        return rev->revocationDate;
9599
    }
9600
    return NULL;
9601
}
9602
9603
9604
#ifndef NO_BIO
9605
/* print serial number out
9606
*  return WOLFSSL_SUCCESS on success
9607
*/
9608
static int X509RevokedPrintSerial(WOLFSSL_BIO* bio, RevokedCert* rev,
9609
    int indent)
9610
{
9611
    unsigned char serial[32];
9612
    int  sz = sizeof(serial);
9613
9614
    if (indent < 0) indent = 0;
9615
    if (indent > MAX_INDENT) indent = MAX_INDENT;
9616
9617
    XMEMSET(serial, 0, sz);
9618
    if (wolfSSL_X509_REVOKED_get_serial_number(rev, serial, &sz)
9619
            == WOLFSSL_SUCCESS) {
9620
        X509PrintSerial_ex(bio, serial, sz, 0, indent);
9621
    }
9622
    return WOLFSSL_SUCCESS;
9623
}
9624
9625
9626
/* print out the signature in human readable format for use with
9627
* wolfSSL_X509_CRL_print()
9628
 * return WOLFSSL_SUCCESS on success
9629
 */
9630
static int X509CRLPrintSignature(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl,
9631
        int algOnly, int indent)
9632
{
9633
    int sigSz = 0;
9634
9635
    if (wolfSSL_X509_CRL_get_signature(crl, NULL, &sigSz) <= 0) {
9636
        return WOLFSSL_FAILURE;
9637
    }
9638
9639
    if (sigSz > 0) {
9640
        unsigned char* sig;
9641
        int sigNid = wolfSSL_X509_CRL_get_signature_nid(crl);
9642
9643
        sig = (unsigned char*)XMALLOC(sigSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
9644
        if (sig == NULL) {
9645
            return WOLFSSL_FAILURE;
9646
        }
9647
9648
        if (wolfSSL_X509_CRL_get_signature(crl, sig, &sigSz) <= 0) {
9649
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
9650
            return WOLFSSL_FAILURE;
9651
        }
9652
9653
        if (X509PrintSignature_ex(bio, sig, sigSz, sigNid, algOnly, indent)
9654
                != WOLFSSL_SUCCESS) {
9655
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
9656
            return WOLFSSL_FAILURE;
9657
        }
9658
9659
        XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
9660
9661
    }
9662
9663
    return WOLFSSL_SUCCESS;
9664
}
9665
#endif /* !NO_BIO */
9666
9667
#if !defined(NO_BIO) && defined(XSNPRINTF)
9668
/* print out the extensions in human readable format for use with
9669
 * wolfSSL_X509_CRL_print()
9670
 * return WOLFSSL_SUCCESS on success
9671
 */
9672
static int X509CRLPrintExtensions(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl,
9673
        int indent)
9674
{
9675
    char tmp[MAX_WIDTH]; /* buffer for XSNPRINTF */
9676
    int  ret = 0;
9677
9678
    if (indent < 0) indent = 0;
9679
    if (indent > MAX_INDENT) indent = MAX_INDENT;
9680
9681
    if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s\n", indent, "",
9682
                "CRL extensions:") >= MAX_WIDTH) {
9683
        ret = WOLFSSL_FAILURE;
9684
    }
9685
9686
    if (ret == 0 && wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9687
        ret = WOLFSSL_FAILURE;
9688
    }
9689
9690
    if (ret == 0 && crl->crlList->crlNumberSet) {
9691
        char dec_string[49]; /* 20 octets can express numbers up to approx
9692
                                49 decimal digits */
9693
        int freeMp = 0;
9694
    #ifdef WOLFSSL_SMALL_STACK
9695
        mp_int* dec_num = (mp_int*)XMALLOC(sizeof(*dec_num), NULL,
9696
                            DYNAMIC_TYPE_BIGINT);
9697
        if (dec_num == NULL) {
9698
            ret = MEMORY_E;
9699
        }
9700
    #else
9701
        mp_int dec_num[1];
9702
    #endif
9703
9704
        if (ret == 0 && (mp_init(dec_num) != MP_OKAY)) {
9705
             ret = MP_INIT_E;
9706
        }
9707
        else if (ret == 0) {
9708
            freeMp = 1;
9709
        }
9710
9711
        if (ret == 0 && mp_read_radix(dec_num, (char *)crl->crlList->crlNumber,
9712
                    MP_RADIX_HEX) != MP_OKAY) {
9713
            ret = WOLFSSL_FAILURE;
9714
        }
9715
9716
        if (ret == 0 && mp_toradix(dec_num, dec_string, MP_RADIX_DEC)
9717
                    != MP_OKAY) {
9718
            ret = WOLFSSL_FAILURE;
9719
        }
9720
9721
        if (ret == 0 && XSNPRINTF(tmp, MAX_WIDTH, "%*s%s\n", indent + 4, "",
9722
                    "X509v3 CRL Number:") >= MAX_WIDTH) {
9723
            ret = WOLFSSL_FAILURE;
9724
        }
9725
9726
        if (ret == 0 && wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9727
            ret = WOLFSSL_FAILURE;
9728
        }
9729
9730
        if (ret == 0 && XSNPRINTF(tmp, MAX_WIDTH, "%*s%s\n", indent + 8, "",
9731
            dec_string) >= MAX_WIDTH) {
9732
            ret = WOLFSSL_FAILURE;
9733
        }
9734
9735
        if (ret == 0 && wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9736
            ret = WOLFSSL_FAILURE;
9737
        }
9738
9739
        XMEMSET(tmp, 0, sizeof(tmp));
9740
9741
        if (freeMp) {
9742
            mp_free(dec_num);
9743
        }
9744
9745
        WC_FREE_VAR_EX(dec_num, NULL, DYNAMIC_TYPE_BIGINT);
9746
    }
9747
9748
#if !defined(NO_SKID)
9749
    if (ret == 0 && crl->crlList->extAuthKeyIdSet &&
9750
            crl->crlList->extAuthKeyId[0] != 0) {
9751
        word32 i;
9752
        char val[5];
9753
        int valSz = 5;
9754
9755
        if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s", indent + 4, "",
9756
                    "X509v3 Authority Key Identifier:") >= MAX_WIDTH) {
9757
            ret = WOLFSSL_FAILURE;
9758
        }
9759
9760
        if (ret == 0) {
9761
            XSTRNCAT(tmp, "\n", MAX_WIDTH - XSTRLEN(tmp) - 1);
9762
        }
9763
9764
        if (ret == 0 && wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9765
            ret = WOLFSSL_FAILURE;
9766
        }
9767
        XMEMSET(tmp, 0, MAX_WIDTH);
9768
9769
        if (ret == 0 && XSNPRINTF(tmp, MAX_WIDTH - 1, "%*s%s",
9770
                    indent + 8, "", "keyid") >= MAX_WIDTH) {
9771
            ret = WOLFSSL_FAILURE;
9772
        }
9773
9774
9775
        for (i = 0; i < XSTRLEN((char*)crl->crlList->extAuthKeyId); i++) {
9776
            /* check if buffer is almost full */
9777
            if (ret == 0 && XSTRLEN(tmp) >= sizeof(tmp) - valSz) {
9778
                if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9779
                    ret = WOLFSSL_FAILURE;
9780
                }
9781
                tmp[0] = '\0';
9782
            }
9783
            if (ret == 0 && XSNPRINTF(val, (size_t)valSz, ":%02X",
9784
                    crl->crlList->extAuthKeyId[i]) >= valSz) {
9785
                WOLFSSL_MSG("buffer overrun");
9786
                ret = WOLFSSL_FAILURE;
9787
            }
9788
            if (ret == 0) {
9789
                XSTRNCAT(tmp, val, valSz);
9790
            }
9791
        }
9792
        if (ret == 0) {
9793
            XSTRNCAT(tmp, "\n", XSTRLEN("\n") + 1);
9794
        }
9795
        if (ret == 0 && wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9796
            ret = WOLFSSL_FAILURE;
9797
        }
9798
    }
9799
#endif
9800
9801
    if (ret == 0) {
9802
        ret = WOLFSSL_SUCCESS;
9803
    }
9804
9805
    return ret;
9806
}
9807
9808
/* iterate through a CRL's Revoked Certs and print out in human
9809
 * readable format for use with wolfSSL_X509_CRL_print()
9810
 * return WOLFSSL_SUCCESS on success
9811
 */
9812
static int X509CRLPrintRevoked(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl,
9813
        int indent)
9814
{
9815
    char tmp[MAX_WIDTH]; /* buffer for XSNPRINTF */
9816
    int i;
9817
9818
    if (crl->crlList->totalCerts > 0) {
9819
        RevokedCert* revoked = crl->crlList->certs;
9820
9821
        if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s\n", indent, "",
9822
                    "Revoked Certificates:") >= MAX_WIDTH) {
9823
            return WOLFSSL_FAILURE;
9824
        }
9825
9826
        if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9827
            return WOLFSSL_FAILURE;
9828
        }
9829
        XMEMSET(tmp, 0, MAX_WIDTH);
9830
9831
        for (i = 0; i < crl->crlList->totalCerts; i++) {
9832
            if (revoked->serialSz > 0) {
9833
                if (X509RevokedPrintSerial(bio, revoked, indent + 4)
9834
                        != WOLFSSL_SUCCESS) {
9835
                    return WOLFSSL_FAILURE;
9836
                }
9837
            }
9838
        #ifndef NO_ASN_TIME
9839
             if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s", indent + 8, "",
9840
                         "Revocation Date: ") >= MAX_WIDTH) {
9841
                return WOLFSSL_FAILURE;
9842
            }
9843
9844
            if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9845
                return WOLFSSL_FAILURE;
9846
            }
9847
9848
            if (revoked->revDate[0] != 0) {
9849
                if (GetTimeString(revoked->revDate, ASN_UTC_TIME,
9850
                    tmp, MAX_WIDTH, MAX_DATE_SIZE) != WOLFSSL_SUCCESS) {
9851
                    if (GetTimeString(revoked->revDate, ASN_GENERALIZED_TIME,
9852
                    tmp, MAX_WIDTH, MAX_DATE_SIZE) != WOLFSSL_SUCCESS) {
9853
                        WOLFSSL_MSG("Error getting revocation date");
9854
                        return WOLFSSL_FAILURE;
9855
                    }
9856
                }
9857
            }
9858
            else {
9859
                XSTRNCPY(tmp, "Not Set", MAX_WIDTH-1);
9860
            }
9861
            tmp[MAX_WIDTH - 1] = '\0'; /* make sure null terminated */
9862
            if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9863
                return WOLFSSL_FAILURE;
9864
            }
9865
9866
            if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
9867
                return WOLFSSL_FAILURE;
9868
            }
9869
        #endif
9870
            revoked = revoked->next;
9871
        }
9872
    }
9873
    else {
9874
        if (wolfSSL_BIO_write(bio, "No Revoked Certificates.\n",
9875
                       (int)XSTRLEN("No Revoked Certificates.\n")) <= 0) {
9876
            return WOLFSSL_FAILURE;
9877
        }
9878
    }
9879
9880
    return WOLFSSL_SUCCESS;
9881
}
9882
9883
#ifndef NO_ASN_TIME
9884
/* print out the last/next update times in human readable
9885
 * format for use with wolfSSL_X509_CRL_print()
9886
 * return WOLFSSL_SUCCESS on success
9887
 */
9888
static int X509CRLPrintDates(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl,
9889
        int indent)
9890
{
9891
    char tmp[MAX_WIDTH]; /* buffer for XSNPRINTF */
9892
9893
    if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s", indent, "",
9894
                "Last Update: ") >= MAX_WIDTH) {
9895
        return WOLFSSL_FAILURE;
9896
    }
9897
9898
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9899
        return WOLFSSL_FAILURE;
9900
    }
9901
9902
    if (crl->crlList->lastDate[0] != 0) {
9903
        if (GetTimeString(crl->crlList->lastDate, crl->crlList->lastDateFormat,
9904
            tmp, MAX_WIDTH, MAX_DATE_SIZE) != WOLFSSL_SUCCESS) {
9905
            WOLFSSL_MSG("Error getting last update date");
9906
            return WOLFSSL_FAILURE;
9907
        }
9908
    }
9909
    else {
9910
        XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
9911
    }
9912
    tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
9913
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9914
        return WOLFSSL_FAILURE;
9915
    }
9916
9917
    if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
9918
        return WOLFSSL_FAILURE;
9919
    }
9920
9921
    if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s", indent, "",
9922
                "Next Update: ") >= MAX_WIDTH) {
9923
        return WOLFSSL_FAILURE;
9924
    }
9925
9926
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9927
        return WOLFSSL_FAILURE;
9928
    }
9929
9930
    if (crl->crlList->nextDate[0] != 0) {
9931
        if (GetTimeString(crl->crlList->nextDate, crl->crlList->nextDateFormat,
9932
            tmp, MAX_WIDTH, MAX_DATE_SIZE) != WOLFSSL_SUCCESS) {
9933
            WOLFSSL_MSG("Error getting next update date");
9934
            return WOLFSSL_FAILURE;
9935
        }
9936
    }
9937
    else {
9938
        XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
9939
    }
9940
    tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
9941
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9942
        return WOLFSSL_FAILURE;
9943
    }
9944
9945
    if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
9946
        return WOLFSSL_FAILURE;
9947
    }
9948
9949
    return WOLFSSL_SUCCESS;
9950
}
9951
#endif
9952
9953
/* Writes the human readable form of x509 to bio.
9954
 *
9955
 * bio  WOLFSSL_BIO to write to.
9956
 * crl Certificate revocation list to write.
9957
 *
9958
 * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on failure
9959
 */
9960
int wolfSSL_X509_CRL_print(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl)
9961
{
9962
    char issuType[] = "Issuer: ";
9963
9964
    if (bio == NULL || crl == NULL || crl->crlList == NULL) {
9965
        return WOLFSSL_FAILURE;
9966
    }
9967
9968
    if (wolfSSL_BIO_write(bio, "Certificate Revocation List (CRL):\n",
9969
                  (int)XSTRLEN("Certificate Revocation List (CRL):\n")) <= 0) {
9970
            return WOLFSSL_FAILURE;
9971
    }
9972
9973
    /* print version */
9974
    if (X509PrintVersion(bio, wolfSSL_X509_CRL_version(crl), 8)
9975
            != WOLFSSL_SUCCESS) {
9976
        return WOLFSSL_FAILURE;
9977
    }
9978
9979
    /* print signature algo */
9980
    if (X509CRLPrintSignature(bio, crl, 1, 8) != WOLFSSL_SUCCESS) {
9981
        return WOLFSSL_FAILURE;
9982
    }
9983
9984
    /* print issuer name */
9985
    if (X509PrintName(bio, wolfSSL_X509_CRL_get_issuer_name(crl), issuType, 8)
9986
            != WOLFSSL_SUCCESS) {
9987
        return WOLFSSL_FAILURE;
9988
    }
9989
9990
#ifndef NO_ASN_TIME
9991
    /* print last and next update times */
9992
    if (X509CRLPrintDates(bio, crl, 8) != WOLFSSL_SUCCESS) {
9993
        return WOLFSSL_FAILURE;
9994
    }
9995
#endif
9996
9997
    /* print CRL extensions */
9998
    if (X509CRLPrintExtensions(bio, crl, 8) != WOLFSSL_SUCCESS) {
9999
        return WOLFSSL_FAILURE;
10000
    }
10001
10002
    /* print CRL Revoked Certs */
10003
    if (X509CRLPrintRevoked(bio, crl, 0) != WOLFSSL_SUCCESS) {
10004
        return WOLFSSL_FAILURE;
10005
    }
10006
10007
    if (X509CRLPrintSignature(bio, crl, 0, 4) != WOLFSSL_SUCCESS) {
10008
        return WOLFSSL_FAILURE;
10009
    }
10010
10011
    if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
10012
        return WOLFSSL_FAILURE;
10013
    }
10014
10015
    return WOLFSSL_SUCCESS;
10016
}
10017
#endif /* !NO_BIO && XSNPRINTF */
10018
#endif /* HAVE_CRL */
10019
#endif /* OPENSSL_EXTRA */
10020
10021
#if defined(HAVE_CRL) && (defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL))
10022
void wolfSSL_X509_CRL_free(WOLFSSL_X509_CRL *crl)
10023
{
10024
    WOLFSSL_ENTER("wolfSSL_X509_CRL_free");
10025
10026
    if (crl)
10027
        FreeCRL(crl, 1);
10028
}
10029
#endif /* HAVE_CRL && (OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL) */
10030
10031
#if defined(HAVE_CRL) && defined(OPENSSL_EXTRA)
10032
WOLFSSL_ASN1_TIME* wolfSSL_X509_CRL_get_lastUpdate(WOLFSSL_X509_CRL* crl)
10033
{
10034
    if ((crl != NULL) && (crl->crlList != NULL) &&
10035
        (crl->crlList->lastDateAsn1.data[0] != 0)) {
10036
        return &crl->crlList->lastDateAsn1;
10037
    }
10038
    return NULL;
10039
}
10040
10041
int wolfSSL_X509_CRL_set_lastUpdate(WOLFSSL_X509_CRL* crl,
10042
                                    const WOLFSSL_ASN1_TIME* time)
10043
{
10044
    if (crl != NULL && crl->crlList != NULL && time != NULL) {
10045
        crl->crlList->lastDateAsn1 = *time;
10046
        return WOLFSSL_SUCCESS;
10047
    }
10048
    return WOLFSSL_FAILURE;
10049
}
10050
10051
WOLFSSL_ASN1_TIME* wolfSSL_X509_CRL_get_nextUpdate(WOLFSSL_X509_CRL* crl)
10052
{
10053
    if ((crl != NULL) && (crl->crlList != NULL) &&
10054
        (crl->crlList->nextDateAsn1.data[0] != 0)) {
10055
        return &crl->crlList->nextDateAsn1;
10056
    }
10057
    return NULL;
10058
}
10059
10060
int wolfSSL_X509_CRL_set_nextUpdate(WOLFSSL_X509_CRL* crl,
10061
                                    const WOLFSSL_ASN1_TIME* time)
10062
{
10063
    if (crl != NULL && crl->crlList != NULL && time != NULL) {
10064
        crl->crlList->nextDateAsn1 = *time;
10065
        return WOLFSSL_SUCCESS;
10066
    }
10067
    return WOLFSSL_FAILURE;
10068
}
10069
10070
#ifndef NO_WOLFSSL_STUB
10071
int wolfSSL_X509_CRL_verify(WOLFSSL_X509_CRL* crl, WOLFSSL_EVP_PKEY* key)
10072
{
10073
    (void)crl;
10074
    (void)key;
10075
    WOLFSSL_STUB("X509_CRL_verify");
10076
    return 0;
10077
}
10078
#endif
10079
10080
/* Encode CRL to DER format in memory.
10081
 *
10082
 * If *out is NULL, allocates memory and returns it via *out.
10083
 * If *out is not NULL, writes DER data starting at *out.
10084
 *
10085
 * @param crl  CRL to encode
10086
 * @param out  Pointer to output buffer pointer
10087
 * @return     Size of DER encoding on success, WOLFSSL_FAILURE on failure
10088
 */
10089
int wolfSSL_i2d_X509_CRL(WOLFSSL_X509_CRL* crl, unsigned char** out)
10090
{
10091
    int ret;
10092
    long derSz = 0;
10093
    byte* der = NULL;
10094
    int alloced = 0;
10095
10096
    WOLFSSL_ENTER("wolfSSL_i2d_X509_CRL");
10097
10098
    if (crl == NULL) {
10099
        return BAD_FUNC_ARG;
10100
    }
10101
10102
    /* Get required size */
10103
    ret = BufferStoreCRL(crl, NULL, &derSz, WOLFSSL_FILETYPE_ASN1);
10104
    if (ret != WOLFSSL_SUCCESS || derSz <= 0) {
10105
        WOLFSSL_MSG("BufferStoreCRL failed to get size");
10106
        return WOLFSSL_FAILURE;
10107
    }
10108
10109
    if (out == NULL) {
10110
        /* Just return size */
10111
        return (int)derSz;
10112
    }
10113
10114
    if (*out == NULL) {
10115
        /* Allocate output buffer */
10116
        der = (byte*)XMALLOC((size_t)derSz, NULL, DYNAMIC_TYPE_OPENSSL);
10117
        if (der == NULL) {
10118
            WOLFSSL_MSG("Memory allocation failed");
10119
            return MEMORY_E;
10120
        }
10121
        alloced = 1;
10122
    }
10123
    else {
10124
        der = *out;
10125
    }
10126
10127
    /* Encode CRL to DER */
10128
    ret = BufferStoreCRL(crl, der, &derSz, WOLFSSL_FILETYPE_ASN1);
10129
    if (ret != WOLFSSL_SUCCESS) {
10130
        WOLFSSL_MSG("BufferStoreCRL failed to encode");
10131
        if (alloced) {
10132
            XFREE(der, NULL, DYNAMIC_TYPE_OPENSSL);
10133
        }
10134
        return WOLFSSL_FAILURE;
10135
    }
10136
10137
    if (alloced) {
10138
        *out = der;
10139
    }
10140
    else {
10141
        *out += derSz;
10142
    }
10143
10144
    return (int)derSz;
10145
}
10146
#endif /* HAVE_CRL && OPENSSL_EXTRA */
10147
10148
#if defined(WOLFSSL_CERT_EXT) && \
10149
    (defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL))
10150
/* Set CRL Distribution Points from pre-encoded DER.
10151
 *
10152
 * x509  - Certificate to modify
10153
 * der   - Pre-encoded CRLDistributionPoints DER
10154
 * derSz - Size of DER in bytes
10155
 *
10156
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
10157
 */
10158
int wolfSSL_X509_CRL_set_dist_points(WOLFSSL_X509* x509,
10159
    const unsigned char* der, int derSz)
10160
0
{
10161
0
    WOLFSSL_ENTER("wolfSSL_X509_CRL_set_dist_points");
10162
10163
0
    if (x509 == NULL || der == NULL || derSz <= 0) {
10164
0
        return WOLFSSL_FAILURE;
10165
0
    }
10166
10167
0
    if (x509->rawCRLInfo != NULL) {
10168
0
        XFREE(x509->rawCRLInfo, x509->heap, DYNAMIC_TYPE_X509_EXT);
10169
0
    }
10170
0
    x509->rawCRLInfo = (byte*)XMALLOC((word32)derSz, x509->heap,
10171
0
                                       DYNAMIC_TYPE_X509_EXT);
10172
0
    if (x509->rawCRLInfo == NULL) {
10173
0
        return WOLFSSL_FAILURE;
10174
0
    }
10175
10176
0
    XMEMCPY(x509->rawCRLInfo, der, (word32)derSz);
10177
0
    x509->rawCRLInfoSz = derSz;
10178
0
    x509->CRLdistSet = 1;
10179
10180
0
    return WOLFSSL_SUCCESS;
10181
0
}
10182
10183
/* Add CRL Distribution Point URI.
10184
 * Encodes URI into proper CRLDistributionPoints DER format.
10185
 *
10186
 * x509     - Certificate to modify
10187
 * uri      - URI string (e.g., "http://crl.example.com/ca.crl")
10188
 * critical - Whether extension is critical
10189
 *
10190
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
10191
 */
10192
int wolfSSL_X509_CRL_add_dist_point(WOLFSSL_X509* x509,
10193
    const char* uri, int critical)
10194
0
{
10195
0
    word32 uriLen;
10196
0
    byte* derBuf = NULL;
10197
0
    word32 derSz;
10198
0
    word32 idx;
10199
0
    word32 uriTagLen;    /* [6] tag + length + URI */
10200
0
    word32 genNamesLen;  /* [0] IMPLICIT GeneralNames wrapper */
10201
0
    word32 distPtNmLen;  /* [0] EXPLICIT distributionPoint wrapper */
10202
0
    word32 distPtSeqLen; /* SEQUENCE for DistributionPoint */
10203
0
    word32 outerSeqLen;  /* SEQUENCE for CRLDistributionPoints */
10204
0
    int ret = WOLFSSL_SUCCESS;
10205
10206
0
    WOLFSSL_ENTER("wolfSSL_X509_CRL_add_dist_point");
10207
10208
0
    if (x509 == NULL || uri == NULL) {
10209
0
        return WOLFSSL_FAILURE;
10210
0
    }
10211
10212
0
    uriLen = (word32)XSTRLEN(uri);
10213
0
    if (uriLen == 0) {
10214
0
        WOLFSSL_MSG("URI empty");
10215
0
        return WOLFSSL_FAILURE;
10216
0
    }
10217
10218
    /*
10219
     * Encode CRL Distribution Points in DER format:
10220
     * CRLDistributionPoints ::= SEQUENCE OF DistributionPoint
10221
     * DistributionPoint ::= SEQUENCE {
10222
     *     distributionPoint [0] EXPLICIT DistributionPointName OPTIONAL
10223
     * }
10224
     * DistributionPointName ::= CHOICE {
10225
     *     fullName [0] IMPLICIT GeneralNames
10226
     * }
10227
     * GeneralNames ::= SEQUENCE OF GeneralName
10228
     * GeneralName ::= [6] IMPLICIT IA5String (uniformResourceIdentifier)
10229
     */
10230
10231
    /* Calculate sizes from innermost to outermost */
10232
    /* [6] tag (1 byte) + length encoding + URI data */
10233
0
    uriTagLen = ASN_TAG_SZ + SetLength(uriLen, NULL) + uriLen;
10234
    /* [0] CONSTRUCTED tag (1 byte) + length encoding + uriTagLen */
10235
0
    genNamesLen = ASN_TAG_SZ + SetLength(uriTagLen, NULL) + uriTagLen;
10236
    /* [0] CONSTRUCTED tag (1 byte) + length encoding + genNamesLen */
10237
0
    distPtNmLen = ASN_TAG_SZ + SetLength(genNamesLen, NULL) + genNamesLen;
10238
    /* SEQUENCE header + distPtNmLen */
10239
0
    distPtSeqLen = SetSequence(distPtNmLen, NULL) + distPtNmLen;
10240
    /* Outer SEQUENCE header + distPtSeqLen */
10241
0
    outerSeqLen = SetSequence(distPtSeqLen, NULL) + distPtSeqLen;
10242
10243
0
    derSz = outerSeqLen;
10244
10245
    /* Allocate buffer for DER encoding */
10246
0
    derBuf = (byte*)XMALLOC(derSz, x509->heap, DYNAMIC_TYPE_X509_EXT);
10247
0
    if (derBuf == NULL) {
10248
0
        return WOLFSSL_FAILURE;
10249
0
    }
10250
10251
    /* Build forward using SetSequence/SetHeader/SetLength */
10252
0
    idx = 0;
10253
10254
    /* SEQUENCE for CRLDistributionPoints (outer) */
10255
0
    idx += SetSequence(distPtSeqLen, derBuf + idx);
10256
10257
    /* SEQUENCE for DistributionPoint */
10258
0
    idx += SetSequence(distPtNmLen, derBuf + idx);
10259
10260
    /* [0] EXPLICIT wrapper for distributionPoint */
10261
0
    derBuf[idx++] = (ASN_CONTEXT_SPECIFIC | ASN_CONSTRUCTED);
10262
0
    idx += SetLength(genNamesLen, derBuf + idx);
10263
10264
    /* [0] IMPLICIT wrapper for GeneralNames (constructed) */
10265
0
    derBuf[idx++] = (ASN_CONTEXT_SPECIFIC | ASN_CONSTRUCTED);
10266
0
    idx += SetLength(uriTagLen, derBuf + idx);
10267
10268
    /* [6] IMPLICIT IA5String tag for URI (context-specific, primitive) */
10269
0
    derBuf[idx++] = (ASN_CONTEXT_SPECIFIC | 6); /* [6] tag */
10270
0
    idx += SetLength(uriLen, derBuf + idx);
10271
10272
    /* Copy URI string */
10273
0
    XMEMCPY(derBuf + idx, uri, uriLen);
10274
0
    idx += uriLen;
10275
10276
    /* Store the encoded CRL info in x509 */
10277
0
    {
10278
0
        ret = wolfSSL_X509_CRL_set_dist_points(x509, derBuf, (int)idx);
10279
0
        if (ret == WOLFSSL_SUCCESS && critical) {
10280
0
            x509->CRLdistCrit = 1;
10281
0
        }
10282
0
    }
10283
10284
0
    XFREE(derBuf, x509->heap, DYNAMIC_TYPE_X509_EXT);
10285
10286
0
    return ret;
10287
0
}
10288
#endif /* WOLFSSL_CERT_EXT && (OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL) */
10289
10290
#ifdef OPENSSL_EXTRA
10291
10292
10293
WOLFSSL_X509_VERIFY_PARAM* wolfSSL_X509_VERIFY_PARAM_new(void)
10294
0
{
10295
0
    WOLFSSL_X509_VERIFY_PARAM *param = NULL;
10296
0
    param = (WOLFSSL_X509_VERIFY_PARAM*)XMALLOC(
10297
0
            sizeof(WOLFSSL_X509_VERIFY_PARAM), NULL, DYNAMIC_TYPE_OPENSSL);
10298
0
    if (param != NULL)
10299
0
        XMEMSET(param, 0, sizeof(WOLFSSL_X509_VERIFY_PARAM ));
10300
10301
0
    return(param);
10302
0
}
10303
10304
10305
void wolfSSL_X509_VERIFY_PARAM_free(WOLFSSL_X509_VERIFY_PARAM *param)
10306
0
{
10307
0
    XFREE(param, NULL, DYNAMIC_TYPE_OPENSSL);
10308
0
}
10309
10310
10311
/* Sets flags by OR'ing with existing value. */
10312
int wolfSSL_X509_VERIFY_PARAM_set_flags(WOLFSSL_X509_VERIFY_PARAM *param,
10313
        unsigned long flags)
10314
88.7k
{
10315
88.7k
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
10316
10317
88.7k
    if (param != NULL) {
10318
88.7k
        param->flags |= flags;
10319
88.7k
        ret = WOLFSSL_SUCCESS;
10320
88.7k
    }
10321
10322
88.7k
    return ret;
10323
88.7k
}
10324
10325
10326
int wolfSSL_X509_VERIFY_PARAM_get_flags(WOLFSSL_X509_VERIFY_PARAM *param)
10327
96.9k
{
10328
96.9k
    int ret = 0;
10329
10330
96.9k
    if (param != NULL) {
10331
96.9k
        ret = (int)param->flags;
10332
96.9k
    }
10333
10334
96.9k
    return ret;
10335
96.9k
}
10336
10337
10338
int wolfSSL_X509_VERIFY_PARAM_clear_flags(WOLFSSL_X509_VERIFY_PARAM *param,
10339
        unsigned long flags)
10340
0
{
10341
0
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
10342
10343
0
    if (param != NULL) {
10344
0
        param->flags &= ~flags;
10345
0
        ret = WOLFSSL_SUCCESS;
10346
0
    }
10347
10348
0
    return ret;
10349
0
}
10350
10351
/* note WOLFSSL_X509_VERIFY_PARAM does not record purpose, trust, depth, or
10352
 * auth_level.
10353
 */
10354
static const WOLFSSL_X509_VERIFY_PARAM x509_verify_param_builtins[] = {
10355
    {
10356
     "ssl_client",              /* name */
10357
     0,                         /* check_time */
10358
     0,                         /* inherit_flags */
10359
     0,                         /* flags */
10360
     "",                        /* hostname */
10361
     0,                         /* hostFlags */
10362
     ""                         /* ipasc */
10363
    },
10364
    {
10365
     "ssl_server",              /* name */
10366
     0,                         /* check_time */
10367
     0,                         /* inherit_flags */
10368
     0,                         /* flags */
10369
     "",                        /* hostname */
10370
     0,                         /* hostFlags */
10371
     ""                         /* ipasc */
10372
    }
10373
};
10374
10375
const WOLFSSL_X509_VERIFY_PARAM *wolfSSL_X509_VERIFY_PARAM_lookup(
10376
    const char *name)
10377
0
{
10378
0
    const WOLFSSL_X509_VERIFY_PARAM *param = &x509_verify_param_builtins[0],
10379
0
        *param_end = &x509_verify_param_builtins[
10380
0
                                         XELEM_CNT(x509_verify_param_builtins)];
10381
10382
0
    if (name == NULL) {
10383
0
        return NULL;
10384
0
    }
10385
0
    while (param < param_end) {
10386
0
        if (XSTRCMP(name, param->name) == 0)
10387
0
            return param;
10388
0
        ++param;
10389
0
    }
10390
0
    return NULL;
10391
0
}
10392
10393
/* inherits properties of param "to" to param "from"
10394
*
10395
* WOLFSSL_VPARAM_DEFAULT          any values in "src" is copied
10396
*                                 if "src" value is new for "to".
10397
* WOLFSSL_VPARAM_OVERWRITE        all values of "form" are copied to "to"
10398
* WOLFSSL_VPARAM_RESET_FLAGS      the flag values are copied, not Ored
10399
* WOLFSSL_VPARAM_LOCKED           don't copy any values
10400
* WOLFSSL_VPARAM_ONCE             the current inherit_flags is zerroed
10401
*/
10402
int wolfSSL_X509_VERIFY_PARAM_inherit(WOLFSSL_X509_VERIFY_PARAM *to,
10403
                                         const WOLFSSL_X509_VERIFY_PARAM *from)
10404
0
{
10405
0
    int ret = WOLFSSL_SUCCESS;
10406
0
    int isOverWrite = 0;
10407
0
    int isDefault = 0;
10408
0
    unsigned int flags;
10409
10410
    /* sanity check */
10411
0
    if (!to || !from) {
10412
        /* be compatible to openssl return value */
10413
0
        return WOLFSSL_SUCCESS;
10414
0
    }
10415
0
    flags = to->inherit_flags | from->inherit_flags;
10416
10417
0
    if (flags & WOLFSSL_VPARAM_LOCKED) {
10418
0
        return WOLFSSL_SUCCESS;
10419
0
    }
10420
10421
0
    if (flags & WOLFSSL_VPARAM_ONCE) {
10422
0
        to->inherit_flags = 0;
10423
0
    }
10424
10425
0
    isOverWrite = (flags & WOLFSSL_VPARAM_OVERWRITE);
10426
0
    isDefault = (flags & WOLFSSL_VPARAM_DEFAULT);
10427
10428
    /* copy check_time if check time is not set */
10429
0
    if ((to->flags & WOLFSSL_USE_CHECK_TIME) == 0 || isOverWrite) {
10430
0
           to->check_time = from->check_time;
10431
0
           to->flags &= ~WOLFSSL_USE_CHECK_TIME;
10432
0
    }
10433
    /* host name */
10434
0
    if (isOverWrite ||
10435
0
        (from->hostName[0] != 0 && (to->hostName[0] == 0 || isDefault))) {
10436
0
            if (!(ret = wolfSSL_X509_VERIFY_PARAM_set1_host(to, from->hostName,
10437
0
                (unsigned int)XSTRLEN(from->hostName))))
10438
0
                return ret;
10439
0
        to->hostFlags = from->hostFlags;
10440
0
    }
10441
    /* ip ascii */
10442
0
    if (isOverWrite ||
10443
0
        (from->ipasc[0] != 0 && (to->ipasc[0] == 0 || isDefault))) {
10444
10445
0
            if (!(ret = wolfSSL_X509_VERIFY_PARAM_set1_ip_asc(to, from->ipasc)))
10446
0
                return ret;
10447
0
    }
10448
10449
0
    if (flags & WOLFSSL_VPARAM_RESET_FLAGS)
10450
0
        to->flags = 0;
10451
10452
0
    to->flags |= from->flags;
10453
10454
0
    return ret;
10455
0
}
10456
10457
/******************************************************************************
10458
* wolfSSL_X509_VERIFY_PARAM_set1_host - sets the DNS hostname to name
10459
* hostnames is cleared if name is NULL or empty.
10460
*
10461
* RETURNS:
10462
*
10463
*/
10464
int wolfSSL_X509_VERIFY_PARAM_set1_host(WOLFSSL_X509_VERIFY_PARAM* pParam,
10465
                                         const char* name,
10466
                                         unsigned int nameSz)
10467
0
{
10468
0
    WOLFSSL_ENTER("wolfSSL_X509_VERIFY_PARAM_set1_host");
10469
10470
0
    if (pParam == NULL)
10471
0
        return WOLFSSL_FAILURE;
10472
10473
    /* If name is NULL, clear hostname. */
10474
0
    if (name == NULL) {
10475
0
        XMEMSET(pParam->hostName, 0, WOLFSSL_HOST_NAME_MAX);
10476
0
        return WOLFSSL_SUCCESS;
10477
0
    }
10478
10479
    /* If name is NULL-terminated, namelen can be set to zero. */
10480
0
    if (nameSz == 0) {
10481
0
        nameSz = (unsigned int)XSTRLEN(name);
10482
0
    }
10483
10484
0
    if (nameSz > 0 && name[nameSz - 1] == '\0')
10485
0
        nameSz--;
10486
10487
0
    if (nameSz > WOLFSSL_HOST_NAME_MAX-1) {
10488
0
        WOLFSSL_MSG("Truncating name");
10489
0
        nameSz = WOLFSSL_HOST_NAME_MAX-1;
10490
0
    }
10491
10492
0
    if (nameSz > 0) {
10493
0
        XMEMCPY(pParam->hostName, name, nameSz);
10494
0
        XMEMSET(pParam->hostName + nameSz, 0,
10495
0
                WOLFSSL_HOST_NAME_MAX - nameSz);
10496
0
    }
10497
10498
0
    pParam->hostName[nameSz] = '\0';
10499
10500
0
    return WOLFSSL_SUCCESS;
10501
0
}
10502
10503
/* Set VERIFY PARAM from "from" pointer to "to" pointer */
10504
int wolfSSL_X509_VERIFY_PARAM_set1(WOLFSSL_X509_VERIFY_PARAM *to,
10505
                                   const WOLFSSL_X509_VERIFY_PARAM *from)
10506
0
{
10507
0
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
10508
0
    unsigned int _inherit_flags;
10509
10510
0
    if (!to) {
10511
0
        return ret;
10512
0
    }
10513
    /* keeps the inherit flags for save */
10514
0
    _inherit_flags = to->inherit_flags;
10515
10516
    /* Ored DEFAULT inherit flag property to copy "from" contents to "to"
10517
    *  contents
10518
    */
10519
0
    to->inherit_flags |= WOLFSSL_VPARAM_DEFAULT;
10520
10521
0
    ret = wolfSSL_X509_VERIFY_PARAM_inherit(to, from);
10522
10523
    /* restore inherit flag */
10524
0
    to->inherit_flags = _inherit_flags;
10525
10526
0
    return ret;
10527
0
}
10528
10529
/* Set the host flag in the X509_VERIFY_PARAM structure */
10530
void wolfSSL_X509_VERIFY_PARAM_set_hostflags(WOLFSSL_X509_VERIFY_PARAM* param,
10531
                                             unsigned int flags)
10532
0
{
10533
0
    if (param != NULL) {
10534
0
        param->hostFlags = flags;
10535
0
    }
10536
0
}
10537
10538
/* Sets the expected IP address to ipasc.
10539
 *
10540
 * param is a pointer to the X509_VERIFY_PARAM structure
10541
 * ipasc is a NULL-terminated string with N.N.N.N for IPv4 and
10542
 *       HH:HH ... HH:HH for IPv6. There is no validation performed on the
10543
 *       parameter, and it must be an exact match with the IP in the cert.
10544
 *
10545
 * return 1 for success and 0 for failure*/
10546
int wolfSSL_X509_VERIFY_PARAM_set1_ip_asc(WOLFSSL_X509_VERIFY_PARAM *param,
10547
        const char *ipasc)
10548
0
{
10549
0
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
10550
10551
0
    if (param != NULL) {
10552
0
        if (ipasc == NULL) {
10553
0
            param->ipasc[0] = '\0';
10554
0
        }
10555
0
        else {
10556
0
            XSTRLCPY(param->ipasc, ipasc, WOLFSSL_MAX_IPSTR);
10557
0
            param->ipasc[WOLFSSL_MAX_IPSTR-1] = '\0';
10558
0
        }
10559
0
        ret = WOLFSSL_SUCCESS;
10560
0
    }
10561
10562
0
    return ret;
10563
0
}
10564
/* Sets the expected IP address to ip(asc)
10565
 *          by re-constructing IP address in ascii
10566
 * @param  param is a pointer to the X509_VERIFY_PARAM structure
10567
 * @param  ip    in binary format of ip address
10568
 * @param  iplen size of ip, 4 for ipv4, 16 for ipv6
10569
 * @return 1 for success and 0 for failure
10570
 */
10571
int wolfSSL_X509_VERIFY_PARAM_set1_ip(WOLFSSL_X509_VERIFY_PARAM* param,
10572
    const unsigned char* ip, size_t iplen)
10573
0
{
10574
0
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
10575
0
#ifndef NO_FILESYSTEM
10576
0
    char* buf = NULL;
10577
0
    char* p = NULL;
10578
0
    word32 val = 0;
10579
0
    int i;
10580
0
    const size_t max_ipv6_len = 40;
10581
0
    byte write_zero = 0;
10582
0
#endif
10583
10584
    /* sanity check */
10585
0
    if (param == NULL || (iplen != 0 && iplen != 4 && iplen != 16)) {
10586
0
        WOLFSSL_MSG("bad function arg");
10587
0
        return ret;
10588
0
    }
10589
0
    if (ip == NULL && iplen != 0) {
10590
0
        WOLFSSL_MSG("bad function arg");
10591
0
        return ret;
10592
0
    }
10593
0
#ifndef NO_FILESYSTEM
10594
0
    if (iplen == 4) {
10595
        /* ipv4 www.xxx.yyy.zzz max 15 length + Null termination */
10596
0
        buf = (char*)XMALLOC(16, NULL, DYNAMIC_TYPE_TMP_BUFFER);
10597
0
        if (!buf) {
10598
0
            WOLFSSL_MSG("failed malloc");
10599
0
            return ret;
10600
0
        }
10601
10602
0
        (void)XSNPRINTF(buf, 16, "%d.%d.%d.%d", ip[0], ip[1], ip[2], ip[3]);
10603
0
        buf[15] = '\0'; /* null terminate */
10604
0
    }
10605
0
    else if (iplen == 16) {
10606
        /* ipv6 normal address scheme
10607
        *   y1:y2:y3:y4:y5:y6:y7:y8, len(yx):4, len(y1-y8):32. len(":"):7
10608
        *   Max len is 32 + 7 + 1(Termination) = 40 bytes
10609
        *
10610
        *   ipv6 dual address
10611
        *   Or y1:y2:y3:y4:y:y6:x.x.x.x yx is 4, y1-y6 is 24, ":" is 6
10612
        *   x.x.x.x is 15.
10613
        *   Max len is 24 + 6 + 15 + 1(Termination) = 46 bytes
10614
        *
10615
        *   Expect data in ip[16]
10616
        *   e.g (aaaa):(bbbb):(cccc):....(hhhh)
10617
        *   (aaaa) = (ip[0<<8)|ip[1]
10618
        *   ......
10619
        *   (hhhh) = (ip[14]<<8)|(ip[15])
10620
        *
10621
        *   e.g ::(gggg):(hhhh)
10622
        *   ip[0]-[11] = 0
10623
        *   (gggg) = (ip[12]<<8) |(ip[13])
10624
        *   (hhhh) = (ip[14]<<8) |(ip[15])
10625
        *
10626
        *   Because it is not able to know which ivp6 scheme uses from data to
10627
        *   reconstruct IP address, this function assumes
10628
        *   ivp6 normal address scheme, not dual address scheme,
10629
        *   to re-construct IP address in ascii.
10630
        */
10631
0
        buf = (char*)XMALLOC(max_ipv6_len, NULL, DYNAMIC_TYPE_TMP_BUFFER);
10632
0
        if (!buf) {
10633
0
            WOLFSSL_MSG("failed malloc");
10634
0
            return ret;
10635
0
        }
10636
0
        p = buf;
10637
0
        for (i = 0; i < 16; i += 2) {
10638
0
            val = (((word32)(ip[i]<<8)) | (ip[i+1])) & 0xFFFF;
10639
0
            if (val == 0) {
10640
0
                if (!write_zero) {
10641
0
                    *p = ':';
10642
0
                }
10643
0
                p++;
10644
0
                *p = '\0';
10645
0
                write_zero = 1;
10646
0
            }
10647
0
            else {
10648
0
                if (i != 0) {
10649
0
                    *p++ = ':';
10650
0
                }
10651
0
                (void)XSNPRINTF(p, max_ipv6_len - (size_t)(p - buf), "%x", val);
10652
0
            }
10653
            /* sanity check */
10654
0
            if (XSTRLEN(buf) > max_ipv6_len) {
10655
0
                WOLFSSL_MSG("The target ip address exceeds buffer length(40)");
10656
0
                XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
10657
0
                buf = NULL;
10658
0
                break;
10659
0
            }
10660
            /* move the pointer to the last */
10661
            /* XSTRLEN includes NULL because of XSPRINTF use */
10662
0
            p = buf + (XSTRLEN(buf));
10663
0
        }
10664
        /* termination */
10665
0
        if (i == 16 && buf) {
10666
0
            p--;
10667
0
            if ((*p) == ':') {
10668
                /* when the last character is :, the following segments are zero
10669
                 * Therefore, adding : and null termination */
10670
0
                p++;
10671
0
                *p++ = ':';
10672
0
                *p = '\0';
10673
0
            }
10674
0
        }
10675
0
    }
10676
0
    else {
10677
0
        WOLFSSL_MSG("iplen is zero, do nothing");
10678
0
        return WOLFSSL_SUCCESS;
10679
0
    }
10680
10681
0
    if (buf) {
10682
        /* set address to ip asc */
10683
0
        ret = wolfSSL_X509_VERIFY_PARAM_set1_ip_asc(param, buf);
10684
0
        XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
10685
0
    }
10686
#else
10687
    (void)param;
10688
    (void)ip;
10689
    (void)iplen;
10690
#endif
10691
10692
0
    return ret;
10693
0
}
10694
10695
#ifndef NO_WOLFSSL_STUB
10696
void wolfSSL_X509_OBJECT_free_contents(WOLFSSL_X509_OBJECT* obj)
10697
0
{
10698
0
    (void)obj;
10699
0
    WOLFSSL_STUB("X509_OBJECT_free_contents");
10700
0
}
10701
#endif
10702
10703
#ifndef NO_ASN_TIME
10704
int wolfSSL_X509_cmp_current_time(const WOLFSSL_ASN1_TIME* asnTime)
10705
0
{
10706
0
    return wolfSSL_X509_cmp_time(asnTime, NULL);
10707
0
}
10708
10709
/* return WOLFSSL_FATAL_ERROR if asnTime is earlier than or equal to cmpTime,
10710
 * and 1 otherwise
10711
 * return 0 on error
10712
 */
10713
int wolfSSL_X509_cmp_time(const WOLFSSL_ASN1_TIME* asnTime, time_t* cmpTime)
10714
0
{
10715
0
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
10716
0
    time_t tmpTime, *pTime = &tmpTime;
10717
0
    struct tm ts, *tmpTs, *ct;
10718
0
#if defined(NEED_TMP_TIME)
10719
    /* for use with gmtime_r */
10720
0
    struct tm tmpTimeStorage;
10721
10722
0
    tmpTs = &tmpTimeStorage;
10723
#else
10724
    tmpTs = NULL;
10725
#endif
10726
0
    (void)tmpTs;
10727
10728
0
    if (asnTime == NULL) {
10729
0
        return WOLFSSL_FAILURE;
10730
0
    }
10731
10732
0
    if (cmpTime == NULL) {
10733
        /* Use current time */
10734
0
        *pTime = wc_Time(0);
10735
0
    }
10736
0
    else {
10737
0
        pTime = cmpTime;
10738
0
    }
10739
10740
0
    if (wolfSSL_ASN1_TIME_to_tm((WOLFSSL_ASN1_TIME*)asnTime, &ts) !=
10741
0
                                                              WOLFSSL_SUCCESS) {
10742
0
        WOLFSSL_MSG("Failed to convert WOLFSSL_ASN1_TIME to struct tm.");
10743
0
        return WOLFSSL_FAILURE;
10744
0
    }
10745
10746
    /* Convert to time struct*/
10747
0
    ct = XGMTIME(pTime, tmpTs);
10748
10749
0
    if (ct == NULL)
10750
0
        return GETTIME_ERROR;
10751
10752
    /* DateGreaterThan returns 1 for >; 0 for <= */
10753
0
    ret = DateGreaterThan(&ts, ct) ? 1 : -1;
10754
10755
0
    return ret;
10756
0
}
10757
#endif /* !NO_ASN_TIME */
10758
10759
#if (defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)) && \
10760
    !defined(NO_ASN_TIME) && !defined(USER_TIME) && !defined(TIME_OVERRIDES)
10761
WOLFSSL_ASN1_TIME *wolfSSL_X509_time_adj_ex(WOLFSSL_ASN1_TIME *asnTime,
10762
    int offset_day, long offset_sec, time_t *in_tm)
10763
0
{
10764
    /* get current time if in_tm is null */
10765
0
    time_t t = in_tm ? *in_tm : wc_Time(0);
10766
0
    return wolfSSL_ASN1_TIME_adj(asnTime, t, offset_day, offset_sec);
10767
0
}
10768
10769
WOLFSSL_ASN1_TIME *wolfSSL_X509_time_adj(WOLFSSL_ASN1_TIME *asnTime,
10770
    long offset_sec, time_t *in_tm)
10771
0
{
10772
0
    return wolfSSL_X509_time_adj_ex(asnTime, 0, offset_sec, in_tm);
10773
0
}
10774
10775
WOLFSSL_ASN1_TIME* wolfSSL_X509_gmtime_adj(WOLFSSL_ASN1_TIME *s, long adj)
10776
0
{
10777
0
    return wolfSSL_X509_time_adj(s, adj, NULL);
10778
0
}
10779
#endif
10780
10781
int wolfSSL_sk_X509_REVOKED_num(WOLFSSL_STACK* sk)
10782
0
{
10783
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_REVOKED_num");
10784
0
    if (sk != NULL) {
10785
0
        return (int)sk->num;
10786
0
    }
10787
0
    return 0;
10788
0
}
10789
10790
/* Free a WOLFSSL_X509_REVOKED and all its owned memory. */
10791
void wolfSSL_X509_REVOKED_free(WOLFSSL_X509_REVOKED* rev)
10792
0
{
10793
0
    if (rev == NULL) {
10794
0
        return;
10795
0
    }
10796
10797
0
    wolfSSL_ASN1_INTEGER_free(rev->serialNumber);
10798
0
    wolfSSL_ASN1_TIME_free(rev->revocationDate);
10799
10800
0
    if (rev->extensions != NULL) {
10801
0
        wolfSSL_sk_pop_free(rev->extensions, NULL);
10802
0
    }
10803
0
    if (rev->issuer != NULL) {
10804
0
        wolfSSL_sk_pop_free(rev->issuer, NULL);
10805
0
    }
10806
10807
0
    XFREE(rev, NULL, DYNAMIC_TYPE_OPENSSL);
10808
0
}
10809
10810
#ifdef HAVE_CRL
10811
/* Build a WOLFSSL_X509_REVOKED from an internal RevokedCert.
10812
 * Caller takes ownership of the returned object. */
10813
static WOLFSSL_X509_REVOKED* RevokedCertToRevoked(RevokedCert* rc, int seq)
10814
{
10815
    WOLFSSL_X509_REVOKED* rev;
10816
    WOLFSSL_ASN1_INTEGER* serial;
10817
10818
    if (rc == NULL) {
10819
        return NULL;
10820
    }
10821
10822
    rev = (WOLFSSL_X509_REVOKED*)XMALLOC(sizeof(WOLFSSL_X509_REVOKED), NULL,
10823
                                          DYNAMIC_TYPE_OPENSSL);
10824
    if (rev == NULL) {
10825
        return NULL;
10826
    }
10827
    XMEMSET(rev, 0, sizeof(WOLFSSL_X509_REVOKED));
10828
10829
    /* Serial number */
10830
    serial = wolfSSL_ASN1_INTEGER_new();
10831
    if (serial == NULL) {
10832
        XFREE(rev, NULL, DYNAMIC_TYPE_OPENSSL);
10833
        return NULL;
10834
    }
10835
    if (rc->serialSz > 0 && rc->serialSz <= EXTERNAL_SERIAL_SIZE) {
10836
        serial->data = (unsigned char*)XMALLOC((size_t)rc->serialSz, NULL,
10837
                                               DYNAMIC_TYPE_OPENSSL);
10838
        if (serial->data == NULL) {
10839
            wolfSSL_ASN1_INTEGER_free(serial);
10840
            XFREE(rev, NULL, DYNAMIC_TYPE_OPENSSL);
10841
            return NULL;
10842
        }
10843
        XMEMCPY(serial->data, rc->serialNumber, (size_t)rc->serialSz);
10844
        serial->length = rc->serialSz;
10845
        serial->dataMax = rc->serialSz;
10846
        serial->isDynamic = 1;
10847
    }
10848
    rev->serialNumber = serial;
10849
10850
    /* Revocation date */
10851
    {
10852
        WOLFSSL_ASN1_TIME* revDate = wolfSSL_ASN1_TIME_new();
10853
        if (revDate != NULL) {
10854
            int dateLen = 0;
10855
            /* Determine date length from the format byte */
10856
            if (rc->revDateFormat == ASN_UTC_TIME ||
10857
                    rc->revDateFormat == ASN_GENERALIZED_TIME) {
10858
                /* Find actual length: dates are null-terminated strings in
10859
                 * revDate buffer up to MAX_DATE_SIZE */
10860
                while (dateLen < MAX_DATE_SIZE && rc->revDate[dateLen] != 0)
10861
                    dateLen++;
10862
            }
10863
            if (dateLen > 0 && dateLen < MAX_DATE_SIZE) {
10864
                XMEMCPY(revDate->data, rc->revDate, (size_t)dateLen);
10865
                revDate->length = dateLen;
10866
                revDate->type = rc->revDateFormat;
10867
            }
10868
        }
10869
        rev->revocationDate = revDate;
10870
    }
10871
10872
    /* Reason code */
10873
    rev->reason = rc->reasonCode;
10874
10875
    /* Sequence (load order) */
10876
    rev->sequence = seq;
10877
10878
    /* issuer: left as NULL (indirect CRL not yet supported) */
10879
    /* extensions: left as NULL for now (raw DER available in RevokedCert
10880
     * but decoded STACK_OF(X509_EXTENSION) build not yet implemented) */
10881
10882
    return rev;
10883
}
10884
#endif /* HAVE_CRL */
10885
10886
WOLFSSL_STACK* wolfSSL_X509_CRL_get_REVOKED(WOLFSSL_X509_CRL* crl)
10887
0
{
10888
0
    WOLFSSL_ENTER("wolfSSL_X509_CRL_get_REVOKED");
10889
10890
0
    if (crl == NULL) {
10891
0
        return NULL;
10892
0
    }
10893
10894
#if defined(OPENSSL_EXTRA) && defined(HAVE_CRL)
10895
    /* Return cached stack if already built */
10896
    if (crl->revokedStack != NULL) {
10897
        return crl->revokedStack;
10898
    }
10899
10900
    /* Build the stack from the internal RevokedCert linked list */
10901
    if (crl->crlList != NULL) {
10902
        WOLFSSL_STACK* sk;
10903
        RevokedCert* rc;
10904
        int seq = 0;
10905
10906
        sk = wolfSSL_sk_new_null();
10907
        if (sk == NULL) {
10908
            return NULL;
10909
        }
10910
        sk->type = STACK_TYPE_X509_REVOKED;
10911
10912
        for (rc = crl->crlList->certs; rc != NULL; rc = rc->next) {
10913
            WOLFSSL_X509_REVOKED* rev = RevokedCertToRevoked(rc, seq);
10914
            if (rev == NULL) {
10915
                /* Clean up on failure */
10916
                wolfSSL_sk_pop_free(sk, NULL);
10917
                return NULL;
10918
            }
10919
            /* Push to stack. wolfSSL_sk_push returns total count on success. */
10920
            if (wolfSSL_sk_push(sk, rev) <= 0) {
10921
                wolfSSL_X509_REVOKED_free(rev);
10922
                wolfSSL_sk_pop_free(sk, NULL);
10923
                return NULL;
10924
            }
10925
            seq++;
10926
        }
10927
10928
        crl->revokedStack = sk;
10929
        return sk;
10930
    }
10931
#endif /* OPENSSL_EXTRA && HAVE_CRL */
10932
10933
0
    return NULL;
10934
0
}
10935
10936
WOLFSSL_X509_REVOKED* wolfSSL_sk_X509_REVOKED_value(
10937
                                    WOLFSSL_STACK* sk, int idx)
10938
0
{
10939
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_REVOKED_value");
10940
10941
0
    if (sk == NULL) {
10942
0
        return NULL;
10943
0
    }
10944
10945
0
    return (WOLFSSL_X509_REVOKED*)wolfSSL_sk_value(sk, idx);
10946
0
}
10947
10948
/* Extension accessors for WOLFSSL_X509_REVOKED */
10949
int wolfSSL_X509_REVOKED_get_ext_count(const WOLFSSL_X509_REVOKED* rev)
10950
0
{
10951
0
    WOLFSSL_ENTER("wolfSSL_X509_REVOKED_get_ext_count");
10952
0
    if (rev != NULL && rev->extensions != NULL) {
10953
0
        return (int)rev->extensions->num;
10954
0
    }
10955
0
    return 0;
10956
0
}
10957
10958
WOLFSSL_X509_EXTENSION* wolfSSL_X509_REVOKED_get_ext(
10959
                                     const WOLFSSL_X509_REVOKED* rev, int loc)
10960
0
{
10961
0
    WOLFSSL_ENTER("wolfSSL_X509_REVOKED_get_ext");
10962
0
    if (rev != NULL && rev->extensions != NULL) {
10963
0
        return (WOLFSSL_X509_EXTENSION*)wolfSSL_sk_value(rev->extensions, loc);
10964
0
    }
10965
0
    return NULL;
10966
0
}
10967
10968
#endif /* OPENSSL_EXTRA */
10969
10970
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
10971
10972
WOLFSSL_ASN1_INTEGER* wolfSSL_X509_get_serialNumber(WOLFSSL_X509* x509)
10973
0
{
10974
0
    WOLFSSL_ASN1_INTEGER* a;
10975
0
    int i = 0;
10976
10977
0
    WOLFSSL_ENTER("wolfSSL_X509_get_serialNumber");
10978
10979
0
    if (x509 == NULL) {
10980
0
        WOLFSSL_MSG("NULL function argument");
10981
0
        return NULL;
10982
0
    }
10983
10984
0
    if (x509->serialNumber != NULL)
10985
0
       return x509->serialNumber;
10986
10987
0
    a = wolfSSL_ASN1_INTEGER_new();
10988
0
    if (a == NULL)
10989
0
        return NULL;
10990
10991
    /* Make sure there is space for the data, ASN.1 type and length. */
10992
0
    if (x509->serialSz > (WOLFSSL_ASN1_INTEGER_MAX - 2)) {
10993
        /* dynamically create data buffer, +2 for type and length */
10994
0
        a->data = (unsigned char*)XMALLOC(x509->serialSz + 2, NULL,
10995
0
                DYNAMIC_TYPE_OPENSSL);
10996
0
        if (a->data == NULL) {
10997
0
            wolfSSL_ASN1_INTEGER_free(a);
10998
0
            return NULL;
10999
0
        }
11000
0
        a->dataMax   = (unsigned int)x509->serialSz + 2;
11001
0
        a->isDynamic = 1;
11002
0
    }
11003
0
    else {
11004
        /* Use array instead of dynamic memory */
11005
0
        a->data    = a->intData;
11006
0
        a->dataMax = WOLFSSL_ASN1_INTEGER_MAX;
11007
0
    }
11008
11009
    #if defined(WOLFSSL_QT) || defined(WOLFSSL_HAPROXY)
11010
        XMEMCPY(&a->data[i], x509->serial, x509->serialSz);
11011
        a->length = x509->serialSz;
11012
    #else
11013
0
        a->data[i++] = ASN_INTEGER;
11014
0
        i += SetLength(x509->serialSz, a->data + i);
11015
0
        XMEMCPY(&a->data[i], x509->serial, x509->serialSz);
11016
0
        a->length = x509->serialSz + 2;
11017
0
    #endif
11018
11019
0
    x509->serialNumber = a;
11020
11021
0
    return a;
11022
0
}
11023
11024
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
11025
11026
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
11027
11028
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
11029
    defined(WOLFSSL_APACHE_HTTPD) || defined(WOLFSSL_HAPROXY) || \
11030
    defined(WOLFSSL_WPAS)
11031
WOLFSSL_X509_ALGOR* wolfSSL_X509_ALGOR_new(void)
11032
2.97k
{
11033
2.97k
    WOLFSSL_X509_ALGOR* ret;
11034
2.97k
    ret = (WOLFSSL_X509_ALGOR*)XMALLOC(sizeof(WOLFSSL_X509_ALGOR), NULL,
11035
2.97k
                                       DYNAMIC_TYPE_OPENSSL);
11036
2.97k
    if (ret) {
11037
2.97k
        XMEMSET(ret, 0, sizeof(WOLFSSL_X509_ALGOR));
11038
2.97k
    }
11039
2.97k
    return ret;
11040
2.97k
}
11041
11042
void wolfSSL_X509_ALGOR_free(WOLFSSL_X509_ALGOR *alg)
11043
2.97k
{
11044
2.97k
    if (alg) {
11045
2.97k
        wolfSSL_ASN1_OBJECT_free(alg->algorithm);
11046
2.97k
        wolfSSL_ASN1_TYPE_free(alg->parameter);
11047
2.97k
        XFREE(alg, NULL, DYNAMIC_TYPE_OPENSSL);
11048
2.97k
    }
11049
2.97k
}
11050
11051
/* Returns X509_ALGOR struct with signature algorithm */
11052
const WOLFSSL_X509_ALGOR* wolfSSL_X509_get0_tbs_sigalg(const WOLFSSL_X509 *x509)
11053
0
{
11054
0
    WOLFSSL_ENTER("wolfSSL_X509_get0_tbs_sigalg");
11055
11056
0
    if (x509 == NULL) {
11057
0
        WOLFSSL_MSG("x509 struct NULL error");
11058
0
        return NULL;
11059
0
    }
11060
11061
0
    return &x509->algor;
11062
0
}
11063
11064
/* Sets paobj pointer to X509_ALGOR signature algorithm */
11065
void wolfSSL_X509_ALGOR_get0(const WOLFSSL_ASN1_OBJECT **paobj, int *pptype,
11066
                            const void **ppval, const WOLFSSL_X509_ALGOR *algor)
11067
0
{
11068
0
    WOLFSSL_ENTER("wolfSSL_X509_ALGOR_get0");
11069
11070
0
    if (!algor) {
11071
0
        WOLFSSL_MSG("algor object is NULL");
11072
0
        return;
11073
0
    }
11074
11075
0
    if (paobj)
11076
0
        *paobj = algor->algorithm;
11077
0
    if (ppval && algor->parameter)
11078
0
        *ppval = algor->parameter->value.ptr;
11079
0
    if (pptype) {
11080
0
        if (algor->parameter) {
11081
0
            *pptype = algor->parameter->type;
11082
0
        }
11083
0
        else {
11084
            /* Default to WOLFSSL_V_ASN1_OBJECT */
11085
0
            *pptype = WOLFSSL_V_ASN1_OBJECT;
11086
0
        }
11087
0
    }
11088
0
}
11089
11090
/**
11091
 * Populate algor members.
11092
 *
11093
 * @param algor The object to be set
11094
 * @param aobj The value to be set in algor->algorithm
11095
 * @param ptype The type of algor->parameter
11096
 * @param pval The value of algor->parameter
11097
 * @return WOLFSSL_SUCCESS on success
11098
 *         WOLFSSL_FAILURE on missing parameters or bad malloc
11099
 */
11100
int wolfSSL_X509_ALGOR_set0(WOLFSSL_X509_ALGOR *algor,
11101
                            WOLFSSL_ASN1_OBJECT *aobj, int ptype, void *pval)
11102
0
{
11103
0
    if (!algor) {
11104
0
        return WOLFSSL_FAILURE;
11105
0
    }
11106
11107
0
    if (!algor->parameter) {
11108
0
        algor->parameter = wolfSSL_ASN1_TYPE_new();
11109
0
        if (!algor->parameter) {
11110
0
            return WOLFSSL_FAILURE;
11111
0
        }
11112
0
    }
11113
11114
0
    if (aobj) {
11115
0
        algor->algorithm = aobj;
11116
0
    }
11117
0
    wolfSSL_ASN1_TYPE_set(algor->parameter, ptype, pval);
11118
11119
0
    return WOLFSSL_SUCCESS;
11120
0
}
11121
11122
/**
11123
 * Serialize object to DER encoding
11124
 *
11125
 * @param alg Object to serialize
11126
 * @param pp  Output
11127
 * @return Length on success
11128
 *         Negative number on failure
11129
 */
11130
int wolfSSL_i2d_X509_ALGOR(const WOLFSSL_X509_ALGOR* alg,
11131
        unsigned char** pp)
11132
0
{
11133
0
    int len;
11134
0
    word32 oid = 0;
11135
0
    word32 idx = 0;
11136
0
    unsigned char* buf = NULL;
11137
11138
0
    if (alg == NULL || alg->algorithm == 0) {
11139
0
        WOLFSSL_MSG("alg is NULL or algorithm not set");
11140
0
        return WOLFSSL_FATAL_ERROR;
11141
0
    }
11142
11143
0
    if (GetObjectId(alg->algorithm->obj, &idx, &oid,
11144
0
            (word32)alg->algorithm->grp, alg->algorithm->objSz) < 0) {
11145
0
        WOLFSSL_MSG("Issue getting OID of object");
11146
0
        return WOLFSSL_FATAL_ERROR;
11147
0
    }
11148
11149
0
    len = (int)SetAlgoID((int)oid, NULL, alg->algorithm->grp, 0);
11150
0
    if (len == 0) {
11151
0
        WOLFSSL_MSG("SetAlgoID error");
11152
0
        return WOLFSSL_FATAL_ERROR;
11153
0
    }
11154
11155
0
    if (pp != NULL) {
11156
0
        if (*pp != NULL)
11157
0
            buf = *pp;
11158
0
        else {
11159
0
            buf = (byte*)XMALLOC((size_t)len, NULL, DYNAMIC_TYPE_ASN1);
11160
0
            if (buf == NULL)
11161
0
                return WOLFSSL_FATAL_ERROR;
11162
0
        }
11163
11164
0
        len = (int)SetAlgoID((int)oid, buf, alg->algorithm->grp, 0);
11165
0
        if (len == 0) {
11166
0
            WOLFSSL_MSG("SetAlgoID error");
11167
0
            if (*pp == NULL)
11168
0
                XFREE(buf, NULL, DYNAMIC_TYPE_ASN1);
11169
0
            return WOLFSSL_FATAL_ERROR;
11170
0
        }
11171
11172
0
        if (*pp != NULL)
11173
0
            *pp += len;
11174
0
        else
11175
0
            *pp = buf;
11176
0
    }
11177
11178
0
    return len;
11179
0
}
11180
11181
WOLFSSL_X509_ALGOR* wolfSSL_d2i_X509_ALGOR(WOLFSSL_X509_ALGOR** out,
11182
        const byte** src, long len)
11183
0
{
11184
0
    WOLFSSL_X509_ALGOR* ret = NULL;
11185
0
    word32 idx = 0;
11186
0
    word32 oid = 0;
11187
0
    int grp;
11188
11189
0
    WOLFSSL_ENTER("wolfSSL_d2i_X509_ALGOR");
11190
11191
0
    if (src == NULL || *src == NULL || len == 0)
11192
0
        return NULL;
11193
11194
0
    if (GetAlgoId(*src, &idx, &oid, oidIgnoreType, (word32)len) != 0)
11195
0
        return NULL;
11196
11197
    /* Try to guess the type */
11198
0
    for (grp = 0; grp < oidIgnoreType; grp++) {
11199
0
        word32 oidSz;
11200
0
        if (OidFromId(oid, (word32)grp, &oidSz) != NULL)
11201
0
            break;
11202
0
    }
11203
0
    if (grp == oidIgnoreType)
11204
0
        return NULL;
11205
11206
0
    ret = wolfSSL_X509_ALGOR_new();
11207
0
    if (ret == NULL)
11208
0
        return NULL;
11209
11210
0
    ret->algorithm = wolfSSL_OBJ_nid2obj(oid2nid(oid, grp));
11211
0
    if (ret->algorithm == NULL) {
11212
0
        wolfSSL_X509_ALGOR_free(ret);
11213
0
        return NULL;
11214
0
    }
11215
0
    *src += idx;
11216
11217
0
    if (out != NULL) {
11218
0
        if (*out != NULL)
11219
0
            wolfSSL_X509_ALGOR_free(*out);
11220
0
        *out = ret;
11221
0
    }
11222
11223
0
    return ret;
11224
0
}
11225
11226
/**
11227
 * Allocate a new WOLFSSL_X509_PUBKEY object.
11228
 *
11229
 * @return New zero'ed WOLFSSL_X509_PUBKEY object
11230
 */
11231
WOLFSSL_X509_PUBKEY *wolfSSL_X509_PUBKEY_new(void)
11232
0
{
11233
0
    WOLFSSL_X509_PUBKEY *ret;
11234
0
    ret = (WOLFSSL_X509_PUBKEY*)XMALLOC(sizeof(WOLFSSL_X509_PUBKEY), NULL,
11235
0
                                        DYNAMIC_TYPE_OPENSSL);
11236
0
    if (!ret) {
11237
0
        return NULL;
11238
0
    }
11239
0
    XMEMSET(ret, 0, sizeof(WOLFSSL_X509_PUBKEY));
11240
0
    ret->algor = wolfSSL_X509_ALGOR_new();
11241
0
    if (!ret->algor) {
11242
0
        wolfSSL_X509_PUBKEY_free(ret);
11243
0
        return NULL;
11244
0
    }
11245
0
    return ret;
11246
0
}
11247
11248
/**
11249
 * Free WOLFSSL_X509_PUBKEY and all its members.
11250
 *
11251
 * @param at Object to free
11252
 */
11253
void wolfSSL_X509_PUBKEY_free(WOLFSSL_X509_PUBKEY *x)
11254
0
{
11255
0
    if (x) {
11256
0
        if (x->algor) {
11257
0
            wolfSSL_X509_ALGOR_free(x->algor);
11258
0
        }
11259
0
        if (x->pkey) {
11260
0
            wolfSSL_EVP_PKEY_free(x->pkey);
11261
0
        }
11262
0
        XFREE(x, NULL, DYNAMIC_TYPE_OPENSSL);
11263
0
    }
11264
0
}
11265
11266
/* Returns X509_PUBKEY structure containing X509_ALGOR and EVP_PKEY */
11267
WOLFSSL_X509_PUBKEY* wolfSSL_X509_get_X509_PUBKEY(const WOLFSSL_X509* x509)
11268
0
{
11269
0
    WOLFSSL_ENTER("wolfSSL_X509_get_X509_PUBKEY");
11270
11271
0
    if (x509 == NULL) {
11272
0
        WOLFSSL_MSG("x509 struct NULL error");
11273
0
        return NULL;
11274
0
    }
11275
11276
0
    return (WOLFSSL_X509_PUBKEY*)&x509->key;
11277
0
}
11278
11279
/* Sets ppkalg pointer to X509_PUBKEY algorithm. Returns WOLFSSL_SUCCESS on
11280
    success or WOLFSSL_FAILURE on error. */
11281
int wolfSSL_X509_PUBKEY_get0_param(WOLFSSL_ASN1_OBJECT **ppkalg,
11282
     const unsigned char **pk, int *ppklen, WOLFSSL_X509_ALGOR **pa,
11283
     WOLFSSL_X509_PUBKEY *pub)
11284
0
{
11285
0
    WOLFSSL_ENTER("wolfSSL_X509_PUBKEY_get0_param");
11286
11287
0
    if (!pub || !pub->pubKeyOID) {
11288
0
        WOLFSSL_MSG("X509_PUBKEY struct not populated");
11289
0
        return WOLFSSL_FAILURE;
11290
0
    }
11291
11292
0
    if (!pub->algor) {
11293
0
        if (!(pub->algor = wolfSSL_X509_ALGOR_new())) {
11294
0
            return WOLFSSL_FAILURE;
11295
0
        }
11296
0
        pub->algor->algorithm = wolfSSL_OBJ_nid2obj(pub->pubKeyOID);
11297
0
        if (pub->algor->algorithm == NULL) {
11298
0
            WOLFSSL_MSG("Failed to create object from NID");
11299
0
            return WOLFSSL_FAILURE;
11300
0
        }
11301
0
    }
11302
11303
0
    if (pa)
11304
0
        *pa = pub->algor;
11305
0
    if (ppkalg)
11306
0
        *ppkalg = pub->algor->algorithm;
11307
0
    if (pk)
11308
0
        *pk = (unsigned char*)pub->pkey->pkey.ptr;
11309
0
    if (ppklen)
11310
0
        *ppklen = pub->pkey->pkey_sz;
11311
11312
0
    return WOLFSSL_SUCCESS;
11313
0
}
11314
11315
/* Returns a pointer to the pkey when passed a key */
11316
WOLFSSL_EVP_PKEY* wolfSSL_X509_PUBKEY_get(WOLFSSL_X509_PUBKEY* key)
11317
0
{
11318
0
    WOLFSSL_ENTER("wolfSSL_X509_PUBKEY_get");
11319
0
    if (key == NULL || key->pkey == NULL) {
11320
0
        WOLFSSL_LEAVE("wolfSSL_X509_PUBKEY_get", BAD_FUNC_ARG);
11321
0
        return NULL;
11322
0
    }
11323
0
    if (wolfSSL_EVP_PKEY_up_ref(key->pkey) != WOLFSSL_SUCCESS) {
11324
0
        WOLFSSL_LEAVE("wolfSSL_X509_PUBKEY_get", BAD_MUTEX_E);
11325
0
        return NULL;
11326
0
    }
11327
0
    WOLFSSL_LEAVE("wolfSSL_X509_PUBKEY_get", WOLFSSL_SUCCESS);
11328
0
    return key->pkey;
11329
0
}
11330
11331
int wolfSSL_X509_PUBKEY_set(WOLFSSL_X509_PUBKEY **x, WOLFSSL_EVP_PKEY *key)
11332
0
{
11333
0
    WOLFSSL_X509_PUBKEY *pk = NULL;
11334
0
    int ptype;
11335
0
    void *pval;
11336
#ifndef NO_DSA
11337
    WOLFSSL_ASN1_STRING *str;
11338
#endif
11339
0
#ifdef HAVE_ECC
11340
0
    int nid;
11341
0
    const WOLFSSL_EC_GROUP *group;
11342
0
#endif
11343
0
    WOLFSSL_ASN1_OBJECT *keyTypeObj;
11344
11345
0
    WOLFSSL_ENTER("wolfSSL_X509_PUBKEY_set");
11346
11347
0
    if (!x || !key) {
11348
0
        return WOLFSSL_FAILURE;
11349
0
    }
11350
11351
0
    if (!(pk = wolfSSL_X509_PUBKEY_new())) {
11352
0
        return WOLFSSL_FAILURE;
11353
0
    }
11354
11355
0
    switch (key->type) {
11356
0
#ifndef NO_RSA
11357
0
    case WC_EVP_PKEY_RSA:
11358
0
        pval = NULL;
11359
0
        ptype = WOLFSSL_V_ASN1_NULL;
11360
0
        pk->pubKeyOID = RSAk;
11361
0
        break;
11362
0
#endif
11363
#ifndef NO_DSA
11364
    case WC_EVP_PKEY_DSA:
11365
        if (!key->dsa->p || !key->dsa->q || !key->dsa->g)
11366
            goto error;
11367
11368
        str = wolfSSL_ASN1_STRING_new();
11369
        if (str == NULL)
11370
            goto error;
11371
11372
        str->length = wolfSSL_i2d_DSAparams(key->dsa,
11373
             (unsigned char **)&str->data);
11374
        if (str->length <= 0) {
11375
            wolfSSL_ASN1_STRING_free(str);
11376
            goto error;
11377
        }
11378
        str->isDynamic = 1;
11379
11380
        pval = str;
11381
        ptype = WOLFSSL_V_ASN1_SEQUENCE;
11382
        pk->pubKeyOID = DSAk;
11383
        break;
11384
#endif
11385
0
#ifdef HAVE_ECC
11386
0
    case WC_EVP_PKEY_EC:
11387
0
        group = wolfSSL_EC_KEY_get0_group(key->ecc);
11388
0
        if (!group)
11389
0
            goto error;
11390
11391
0
        nid = wolfSSL_EC_GROUP_get_curve_name(group);
11392
0
        if (nid <= 0) {
11393
            /* TODO: Add support for no nid case */
11394
0
            WOLFSSL_MSG("nid not found");
11395
0
            goto error;
11396
0
        }
11397
11398
0
        pval = wolfSSL_OBJ_nid2obj(nid);
11399
0
        if (!pval)
11400
0
            goto error;
11401
11402
0
        ptype = WOLFSSL_V_ASN1_OBJECT;
11403
0
        pk->pubKeyOID = ECDSAk;
11404
0
        break;
11405
0
#endif
11406
0
    default:
11407
0
        WOLFSSL_MSG("Unknown key type");
11408
0
        goto error;
11409
0
    }
11410
11411
0
    keyTypeObj = wolfSSL_OBJ_nid2obj(key->type);
11412
0
    if (keyTypeObj == NULL) {
11413
0
        if (ptype == WOLFSSL_V_ASN1_OBJECT)
11414
0
            wolfSSL_ASN1_OBJECT_free((WOLFSSL_ASN1_OBJECT *)pval);
11415
0
        else
11416
0
            wolfSSL_ASN1_STRING_free((WOLFSSL_ASN1_STRING *)pval);
11417
0
        goto error;
11418
0
    }
11419
0
    if (!wolfSSL_X509_ALGOR_set0(pk->algor, keyTypeObj, ptype, pval)) {
11420
0
        WOLFSSL_MSG("Failed to create algorithm object");
11421
0
        wolfSSL_ASN1_OBJECT_free(keyTypeObj);
11422
0
        if (ptype == WOLFSSL_V_ASN1_OBJECT)
11423
0
            wolfSSL_ASN1_OBJECT_free((WOLFSSL_ASN1_OBJECT *)pval);
11424
0
        else
11425
0
            wolfSSL_ASN1_STRING_free((WOLFSSL_ASN1_STRING *)pval);
11426
0
        goto error;
11427
0
    }
11428
11429
0
    if (!wolfSSL_EVP_PKEY_up_ref(key)) {
11430
0
        WOLFSSL_MSG("Failed to up key reference");
11431
0
        goto error;
11432
0
    }
11433
0
    pk->pkey = key;
11434
11435
0
    wolfSSL_X509_PUBKEY_free(*x);
11436
0
    *x = pk;
11437
0
    return WOLFSSL_SUCCESS;
11438
0
error:
11439
0
    if (pk) {
11440
0
        wolfSSL_X509_PUBKEY_free(pk);
11441
0
    }
11442
0
    return WOLFSSL_FAILURE;
11443
0
}
11444
11445
#endif /* OPENSSL_ALL || OPENSSL_EXTRA || WOLFSSL_APACHE_HTTPD ||
11446
        * WOLFSSL_HAPROXY || WOLFSSL_WPAS */
11447
11448
#if defined(OPENSSL_EXTRA) && !defined(NO_CERTS) && !defined(NO_ASN) && \
11449
    !defined(NO_PWDBASED)
11450
11451
int wolfSSL_i2d_X509_PUBKEY(WOLFSSL_X509_PUBKEY* x509_PubKey,
11452
    unsigned char** der)
11453
0
{
11454
0
    if (x509_PubKey == NULL)
11455
0
        return WOLFSSL_FATAL_ERROR;
11456
0
    return wolfSSL_i2d_PublicKey(x509_PubKey->pkey, der);
11457
0
}
11458
11459
#endif /* OPENSSL_EXTRA && !NO_CERTS && !NO_ASN && !NO_PWDBASED */
11460
11461
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
11462
11463
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
11464
WOLFSSL_BASIC_CONSTRAINTS* wolfSSL_BASIC_CONSTRAINTS_new(void)
11465
0
{
11466
0
    WOLFSSL_BASIC_CONSTRAINTS* bc;
11467
0
    bc = (WOLFSSL_BASIC_CONSTRAINTS*)
11468
0
          XMALLOC(sizeof(WOLFSSL_BASIC_CONSTRAINTS), NULL,
11469
0
          DYNAMIC_TYPE_X509_EXT);
11470
0
    if (bc == NULL) {
11471
0
        WOLFSSL_MSG("Failed to malloc basic constraints");
11472
0
        return NULL;
11473
0
    }
11474
0
    XMEMSET(bc, 0, sizeof(WOLFSSL_BASIC_CONSTRAINTS));
11475
0
    return bc;
11476
0
}
11477
11478
/* frees the wolfSSL_BASIC_CONSTRAINTS object */
11479
void wolfSSL_BASIC_CONSTRAINTS_free(WOLFSSL_BASIC_CONSTRAINTS *bc)
11480
0
{
11481
0
    WOLFSSL_ENTER("wolfSSL_BASIC_CONSTRAINTS_free");
11482
0
    if (bc == NULL) {
11483
0
        WOLFSSL_MSG("Argument is NULL");
11484
0
        return;
11485
0
    }
11486
0
    if (bc->pathlen) {
11487
0
        wolfSSL_ASN1_INTEGER_free(bc->pathlen);
11488
0
    }
11489
0
    XFREE(bc, NULL, DYNAMIC_TYPE_OPENSSL);
11490
0
}
11491
11492
WOLFSSL_AUTHORITY_KEYID* wolfSSL_AUTHORITY_KEYID_new(void)
11493
0
{
11494
0
    WOLFSSL_AUTHORITY_KEYID* akey = (WOLFSSL_AUTHORITY_KEYID*)XMALLOC(
11495
0
          sizeof(WOLFSSL_AUTHORITY_KEYID), NULL, DYNAMIC_TYPE_OPENSSL);
11496
0
    if (!akey) {
11497
0
        WOLFSSL_MSG("Issue creating WOLFSSL_AUTHORITY_KEYID struct");
11498
0
        return NULL;
11499
0
    }
11500
0
    XMEMSET(akey, 0, sizeof(WOLFSSL_AUTHORITY_KEYID));
11501
0
    return akey;
11502
0
}
11503
11504
/* frees the wolfSSL_AUTHORITY_KEYID object */
11505
void wolfSSL_AUTHORITY_KEYID_free(WOLFSSL_AUTHORITY_KEYID *id)
11506
0
{
11507
0
    WOLFSSL_ENTER("wolfSSL_AUTHORITY_KEYID_free");
11508
0
    if (id == NULL) {
11509
0
        WOLFSSL_MSG("Argument is NULL");
11510
0
        return;
11511
0
    }
11512
0
    if (id->keyid) {
11513
0
        wolfSSL_ASN1_STRING_free(id->keyid);
11514
0
    }
11515
0
    if (id->issuer) {
11516
0
        wolfSSL_ASN1_OBJECT_free(id->issuer);
11517
0
    }
11518
0
    if (id->serial) {
11519
0
        wolfSSL_ASN1_INTEGER_free(id->serial);
11520
0
    }
11521
0
    XFREE(id, NULL, DYNAMIC_TYPE_OPENSSL);
11522
0
}
11523
11524
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
11525
11526
#ifdef KEEP_PEER_CERT
11527
char*  wolfSSL_X509_get_subjectCN(WOLFSSL_X509* x509)
11528
0
{
11529
0
    if (x509 == NULL)
11530
0
        return NULL;
11531
11532
0
    return x509->subjectCN;
11533
0
}
11534
#endif /* KEEP_PEER_CERT */
11535
11536
#if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
11537
/* increments ref count of WOLFSSL_X509. Return 1 on success, 0 on error */
11538
int wolfSSL_X509_up_ref(WOLFSSL_X509* x509)
11539
0
{
11540
0
    if (x509) {
11541
0
        int ret;
11542
0
        wolfSSL_RefInc(&x509->ref, &ret);
11543
0
        if (ret != 0) {
11544
0
            WOLFSSL_MSG("Failed to lock x509 mutex");
11545
0
            return WOLFSSL_FAILURE;
11546
0
        }
11547
11548
0
        return WOLFSSL_SUCCESS;
11549
0
    }
11550
11551
0
    return WOLFSSL_FAILURE;
11552
0
}
11553
#endif /* OPENSSL_EXTRA_X509_SMALL || OPENSSL_EXTRA */
11554
11555
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
11556
WOLF_STACK_OF(WOLFSSL_X509)* wolfSSL_X509_chain_up_ref(
11557
        WOLF_STACK_OF(WOLFSSL_X509)* chain)
11558
0
{
11559
    /* wolfSSL_sk_dup takes care of doing a deep copy */
11560
0
    return wolfSSL_sk_dup(chain);
11561
0
}
11562
#endif
11563
11564
#if defined(OPENSSL_EXTRA)
11565
11566
WOLF_STACK_OF(WOLFSSL_X509_OBJECT)* wolfSSL_sk_X509_OBJECT_deep_copy(
11567
    const WOLF_STACK_OF(WOLFSSL_X509_OBJECT)* sk,
11568
    WOLFSSL_X509_OBJECT* (*c)(const WOLFSSL_X509_OBJECT*),
11569
    void (*f)(WOLFSSL_X509_OBJECT*))
11570
0
{
11571
0
    (void)f; /* free function */
11572
0
    (void)c; /* copy function */
11573
0
    return wolfSSL_sk_dup((WOLFSSL_STACK*)sk);
11574
0
}
11575
#endif
11576
11577
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
11578
    void wolfSSL_X509_NAME_free(WOLFSSL_X509_NAME *name)
11579
67.2k
    {
11580
67.2k
        WOLFSSL_ENTER("wolfSSL_X509_NAME_free");
11581
67.2k
        FreeX509Name(name);
11582
67.2k
        if (name != NULL) {
11583
67.0k
            XFREE(name, name->heap, DYNAMIC_TYPE_X509);
11584
67.0k
        }
11585
67.2k
    }
11586
11587
11588
    /* Malloc's a new WOLFSSL_X509_NAME structure
11589
     *
11590
     * returns NULL on failure, otherwise returns a new structure.
11591
     */
11592
    WOLFSSL_X509_NAME* wolfSSL_X509_NAME_new_ex(void *heap)
11593
67.0k
    {
11594
67.0k
        WOLFSSL_X509_NAME* name;
11595
11596
67.0k
        WOLFSSL_ENTER("wolfSSL_X509_NAME_new_ex");
11597
11598
67.0k
        name = (WOLFSSL_X509_NAME*)XMALLOC(sizeof(WOLFSSL_X509_NAME), heap,
11599
67.0k
                DYNAMIC_TYPE_X509);
11600
67.0k
        if (name != NULL) {
11601
67.0k
            InitX509Name(name, 1, heap);
11602
67.0k
        }
11603
67.0k
        return name;
11604
67.0k
    }
11605
11606
9
    WOLFSSL_X509_NAME* wolfSSL_X509_NAME_new(void) {
11607
9
        return wolfSSL_X509_NAME_new_ex(NULL);
11608
9
    }
11609
11610
    /* Creates a duplicate of a WOLFSSL_X509_NAME structure.
11611
       Returns a new WOLFSSL_X509_NAME structure or NULL on failure */
11612
    WOLFSSL_X509_NAME* wolfSSL_X509_NAME_dup(const WOLFSSL_X509_NAME *name)
11613
0
    {
11614
0
        WOLFSSL_X509_NAME* copy = NULL;
11615
11616
0
        WOLFSSL_ENTER("wolfSSL_X509_NAME_dup");
11617
11618
0
        if (name == NULL) {
11619
0
            WOLFSSL_MSG("NULL parameter");
11620
0
            return NULL;
11621
0
        }
11622
11623
0
        if (!(copy = wolfSSL_X509_NAME_new_ex(name->heap))) {
11624
0
            return NULL;
11625
0
        }
11626
11627
        /* copy contents */
11628
0
        InitX509Name(copy, 1, name->heap);
11629
0
        if (wolfSSL_X509_NAME_copy(name, copy) != WOLFSSL_SUCCESS) {
11630
0
            wolfSSL_X509_NAME_free(copy);
11631
0
            return NULL;
11632
0
        }
11633
11634
0
        return copy;
11635
0
    }
11636
11637
#ifdef WOLFSSL_CERT_GEN
11638
11639
#if defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_EXT) || \
11640
    defined(OPENSSL_EXTRA)
11641
    /* Helper function to copy cert name from a WOLFSSL_X509_NAME structure to
11642
    * a Cert structure.
11643
    *
11644
    * returns length of DER on success and a negative error value on failure
11645
    */
11646
    static int CopyX509NameToCert(WOLFSSL_X509_NAME* n, byte* out)
11647
    {
11648
        unsigned char* der = NULL;
11649
        int length = WC_NO_ERR_TRACE(BAD_FUNC_ARG), ret;
11650
        word32 idx = 0;
11651
11652
        ret = wolfSSL_i2d_X509_NAME(n, &der);
11653
        if (ret > (int)sizeof(CertName) || ret < 0) {
11654
            WOLFSSL_MSG("Name conversion error");
11655
            ret = MEMORY_E;
11656
        }
11657
11658
        if (ret > 0) {
11659
            /* strip off sequence, this gets added on certificate creation */
11660
            ret = GetSequence(der, &idx, &length, (word32)ret);
11661
        }
11662
11663
        if (ret > 0) {
11664
            XMEMCPY(out, der + idx, length);
11665
        }
11666
11667
        XFREE(der, NULL, DYNAMIC_TYPE_OPENSSL);
11668
11669
        return length;
11670
    }
11671
#endif
11672
11673
#ifdef WOLFSSL_CERT_REQ
11674
    static int ReqCertFromX509(Cert* cert, WOLFSSL_X509* req)
11675
    {
11676
        int ret;
11677
11678
        if (wc_InitCert(cert) != 0)
11679
            return WOLFSSL_FAILURE;
11680
11681
11682
        ret = CopyX509NameToCert(&req->subject, cert->sbjRaw);
11683
        if (ret < 0) {
11684
            WOLFSSL_MSG("REQ subject conversion error");
11685
            ret = MEMORY_E;
11686
        }
11687
        else {
11688
            ret = WOLFSSL_SUCCESS;
11689
        }
11690
11691
        if (ret == WOLFSSL_SUCCESS) {
11692
        #if defined(OPENSSL_ALL)
11693
            int idx;
11694
        #endif
11695
11696
            cert->version = req->version;
11697
            cert->isCA = req->isCa;
11698
            cert->basicConstSet = req->basicConstSet;
11699
    #ifdef WOLFSSL_CERT_EXT
11700
            if (req->subjKeyIdSz != 0) {
11701
                XMEMCPY(cert->skid, req->subjKeyId, req->subjKeyIdSz);
11702
                cert->skidSz = (int)req->subjKeyIdSz;
11703
            }
11704
            if (req->keyUsageSet)
11705
                cert->keyUsage = req->keyUsage;
11706
11707
            cert->extKeyUsage = req->extKeyUsage;
11708
    #endif
11709
11710
            XMEMCPY(cert->challengePw, req->challengePw, CTC_NAME_SIZE);
11711
            cert->challengePwPrintableString = req->challengePw[0] != 0;
11712
11713
        #if defined(OPENSSL_ALL)
11714
            idx = wolfSSL_X509_REQ_get_attr_by_NID(req,
11715
                    WC_NID_pkcs9_unstructuredName, -1);
11716
            if (idx != WC_NO_ERR_TRACE(WOLFSSL_FATAL_ERROR)) {
11717
                WOLFSSL_X509_ATTRIBUTE *attr;
11718
                attr = wolfSSL_X509_REQ_get_attr(req, idx);
11719
                if (attr != NULL) {
11720
                    const unsigned char *attrData;
11721
                    int attrDataSz;
11722
11723
                    attrData = wolfSSL_ASN1_STRING_get0_data(
11724
                            attr->value->value.asn1_string);
11725
                    attrDataSz = wolfSSL_ASN1_STRING_length(
11726
                            attr->value->value.asn1_string);
11727
11728
                    /* +1 to make sure is terminated string */
11729
                    if (attrDataSz + 1 > CTC_NAME_SIZE) {
11730
                        WOLFSSL_MSG("attribute size was too large to copy");
11731
                        ret = REQ_ATTRIBUTE_E;
11732
                    }
11733
                    else {
11734
                        XMEMCPY(cert->unstructuredName, attrData, attrDataSz);
11735
                        cert->unstructuredName[attrDataSz] = '\0';
11736
                    }
11737
                }
11738
            }
11739
11740
        #ifdef WOLFSSL_CUSTOM_OID
11741
            if (ret == WOLFSSL_SUCCESS) {
11742
                if ((req->customExtCount < 0) ||
11743
                    (req->customExtCount >= NUM_CUSTOM_EXT)) {
11744
                    WOLFSSL_MSG("Bad value for customExtCount.");
11745
                    ret = WOLFSSL_FAILURE;
11746
                }
11747
11748
                if (ret == WOLFSSL_SUCCESS) {
11749
                    for (idx = 0; idx < req->customExtCount; idx++) {
11750
                        /* Note that ownership is NOT transferred.
11751
                         * req->custom_exts buffers still need to be cleaned
11752
                         * up. */
11753
                        cert->customCertExt[idx] = req->custom_exts[idx];
11754
                    }
11755
                    cert->customCertExtCount = req->customExtCount;
11756
                }
11757
            }
11758
        #endif /* WOLFSSL_CUSTOM_OID */
11759
        #endif /* OPENSSL_ALL */
11760
11761
    #ifdef WOLFSSL_ALT_NAMES
11762
            if (ret == WOLFSSL_SUCCESS) {
11763
                cert->altNamesSz = FlattenAltNames(cert->altNames,
11764
                        sizeof(cert->altNames), req->altNames);
11765
            }
11766
    #endif /* WOLFSSL_ALT_NAMES */
11767
        }
11768
11769
        return ret;
11770
    }
11771
#endif /* WOLFSSL_CERT_REQ */
11772
11773
/* converts WOLFSSL_AN1_TIME to Cert form, returns positive size on
11774
 * success */
11775
static int CertDateFromX509(byte* out, int outSz, WOLFSSL_ASN1_TIME* t)
11776
{
11777
    int sz, i;
11778
11779
    if (t->length + 1 >= outSz) {
11780
        return BUFFER_E;
11781
    }
11782
11783
    out[0] = (byte) t->type;
11784
    sz = (int)SetLength((word32)t->length, out + 1) + 1;  /* gen tag */
11785
    for (i = 0; i < t->length; i++) {
11786
        out[sz + i] = t->data[i];
11787
    }
11788
    return t->length + sz;
11789
}
11790
11791
/* convert a WOLFSSL_X509 to a Cert structure for writing out */
11792
static int CertFromX509(Cert* cert, WOLFSSL_X509* x509)
11793
{
11794
    int ret;
11795
#ifdef WOLFSSL_CERT_EXT
11796
    int i;
11797
#endif
11798
11799
    WOLFSSL_ENTER("wolfSSL_X509_to_Cert");
11800
11801
    if (x509 == NULL || cert == NULL) {
11802
        return BAD_FUNC_ARG;
11803
    }
11804
11805
    wc_InitCert(cert);
11806
11807
    cert->version = (int)wolfSSL_X509_get_version(x509);
11808
11809
    if (x509->notBefore.length > 0) {
11810
        cert->beforeDateSz = CertDateFromX509(cert->beforeDate,
11811
                    CTC_DATE_SIZE, &x509->notBefore);
11812
        if (cert->beforeDateSz <= 0) {
11813
            WOLFSSL_MSG("Error converting WOLFSSL_X509 not before date");
11814
            return WOLFSSL_FAILURE;
11815
        }
11816
    }
11817
    else {
11818
        cert->beforeDateSz = 0;
11819
    }
11820
11821
    if (x509->notAfter.length > 0) {
11822
        cert->afterDateSz = CertDateFromX509(cert->afterDate,
11823
                    CTC_DATE_SIZE, &x509->notAfter);
11824
        if (cert->afterDateSz <= 0) {
11825
            WOLFSSL_MSG("Error converting WOLFSSL_X509 not after date");
11826
            return WOLFSSL_FAILURE;
11827
        }
11828
    }
11829
    else {
11830
        cert->afterDateSz = 0;
11831
    }
11832
11833
#ifdef WOLFSSL_ALT_NAMES
11834
    cert->altNamesSz = FlattenAltNames(cert->altNames,
11835
            sizeof(cert->altNames), x509->altNames);
11836
#endif /* WOLFSSL_ALT_NAMES */
11837
11838
    cert->sigType = wolfSSL_X509_get_signature_type(x509);
11839
    cert->keyType = x509->pubKeyOID;
11840
    cert->isCA    = wolfSSL_X509_get_isCA(x509);
11841
    cert->basicConstCrit = x509->basicConstCrit;
11842
    cert->basicConstSet = x509->basicConstSet;
11843
    cert->pathLen = (byte)x509->pathLength;
11844
    cert->pathLenSet = x509->pathLengthSet;
11845
11846
#ifdef WOLFSSL_CERT_EXT
11847
    if (x509->subjKeyIdSz <= CTC_MAX_SKID_SIZE) {
11848
        if (x509->subjKeyId) {
11849
            XMEMCPY(cert->skid, x509->subjKeyId, x509->subjKeyIdSz);
11850
        }
11851
        cert->skidSz = (int)x509->subjKeyIdSz;
11852
    }
11853
    else {
11854
        WOLFSSL_MSG("Subject Key ID too large");
11855
        WOLFSSL_ERROR_VERBOSE(BUFFER_E);
11856
        return WOLFSSL_FAILURE;
11857
    }
11858
11859
    if (x509->authKeyIdSz < sizeof(cert->akid)) {
11860
    #ifdef WOLFSSL_AKID_NAME
11861
        cert->rawAkid = 0;
11862
        if (x509->authKeyIdSrc) {
11863
            XMEMCPY(cert->akid, x509->authKeyIdSrc, x509->authKeyIdSrcSz);
11864
            cert->akidSz = (int)x509->authKeyIdSrcSz;
11865
            cert->rawAkid = 1;
11866
        }
11867
        else
11868
    #endif
11869
        if (x509->authKeyId) {
11870
            XMEMCPY(cert->akid, x509->authKeyId, x509->authKeyIdSz);
11871
            cert->akidSz = (int)x509->authKeyIdSz;
11872
        }
11873
    }
11874
    else {
11875
        WOLFSSL_MSG("Auth Key ID too large");
11876
        WOLFSSL_ERROR_VERBOSE(BUFFER_E);
11877
        return WOLFSSL_FAILURE;
11878
    }
11879
11880
    for (i = 0; i < x509->certPoliciesNb; i++) {
11881
        /* copy the smaller of MAX macros, by default they are currently equal*/
11882
        if ((int)CTC_MAX_CERTPOL_SZ <= (int)MAX_CERTPOL_SZ) {
11883
            XMEMCPY(cert->certPolicies[i], x509->certPolicies[i],
11884
                    CTC_MAX_CERTPOL_SZ);
11885
        }
11886
        else {
11887
            XMEMCPY(cert->certPolicies[i], x509->certPolicies[i],
11888
                    MAX_CERTPOL_SZ);
11889
        }
11890
    }
11891
    cert->certPoliciesNb = (word16)x509->certPoliciesNb;
11892
11893
    cert->keyUsage = x509->keyUsage;
11894
    cert->extKeyUsage = x509->extKeyUsage;
11895
    cert->nsCertType = x509->nsCertType;
11896
11897
    if (x509->rawCRLInfo != NULL) {
11898
        if (x509->rawCRLInfoSz > CTC_MAX_CRLINFO_SZ) {
11899
            WOLFSSL_MSG("CRL Info too large");
11900
            WOLFSSL_ERROR_VERBOSE(BUFFER_E);
11901
            return WOLFSSL_FAILURE;
11902
        }
11903
        XMEMCPY(cert->crlInfo, x509->rawCRLInfo, x509->rawCRLInfoSz);
11904
        cert->crlInfoSz = x509->rawCRLInfoSz;
11905
    }
11906
11907
#ifdef WOLFSSL_DUAL_ALG_CERTS
11908
    /* We point to instance in x509 so DON'T need to be free'd. */
11909
    cert->sapkiDer = x509->sapkiDer;
11910
    cert->sapkiLen = x509->sapkiLen;
11911
    cert->sapkiCrit = x509->sapkiCrit;
11912
    cert->altSigAlgDer = x509->altSigAlgDer;
11913
    cert->altSigAlgLen  = x509->altSigAlgLen;
11914
    cert->altSigAlgCrit = x509->altSigAlgCrit;
11915
    cert->altSigValDer = x509->altSigValDer;
11916
    cert->altSigValLen = x509->altSigValLen;
11917
    cert->altSigValCrit = x509->altSigValCrit;
11918
#endif /* WOLFSSL_DUAL_ALG_CERTS */
11919
11920
#if defined(WOLFSSL_ASN_TEMPLATE) && defined(WOLFSSL_CUSTOM_OID) && \
11921
    defined(HAVE_OID_ENCODING)
11922
11923
    if ((x509->customExtCount < 0) ||
11924
            (x509->customExtCount >= NUM_CUSTOM_EXT)) {
11925
        WOLFSSL_MSG("Bad value for customExtCount.");
11926
        return WOLFSSL_FAILURE;
11927
    }
11928
11929
    for (i = 0; i < x509->customExtCount; i++) {
11930
        if (wc_SetCustomExtension(cert, x509->custom_exts[i].crit,
11931
                x509->custom_exts[i].oid, x509->custom_exts[i].val,
11932
                x509->custom_exts[i].valSz))
11933
        {
11934
            return WOLFSSL_FAILURE;
11935
        }
11936
    }
11937
#endif /* WOLFSSL_ASN_TEMPLATE && WOLFSSL_CUSTOM_OID && HAVE_OID_ENCODING */
11938
11939
#endif /* WOLFSSL_CERT_EXT */
11940
11941
#ifdef WOLFSSL_CERT_REQ
11942
    /* copy over challenge password for REQ certs */
11943
    XMEMCPY(cert->challengePw, x509->challengePw, CTC_NAME_SIZE);
11944
#endif
11945
11946
    /* Only makes sense to do this for OPENSSL_EXTRA because without
11947
     * this define the function will error out below */
11948
    #ifdef OPENSSL_EXTRA
11949
    if (x509->serialSz == 0 && x509->serialNumber != NULL &&
11950
            /* Check if the buffer contains more than just the
11951
             * ASN tag and length */
11952
            x509->serialNumber->length > 2) {
11953
        if (wolfSSL_X509_set_serialNumber(x509, x509->serialNumber)
11954
                != WOLFSSL_SUCCESS) {
11955
            WOLFSSL_MSG("Failed to set serial number");
11956
            return WOLFSSL_FAILURE;
11957
        }
11958
    }
11959
    #endif
11960
11961
    /* set serial number */
11962
    if (x509->serialSz > 0) {
11963
    #if defined(OPENSSL_EXTRA)
11964
        byte serial[EXTERNAL_SERIAL_SIZE];
11965
        int  serialSz = EXTERNAL_SERIAL_SIZE;
11966
11967
        ret = wolfSSL_X509_get_serial_number(x509, serial, &serialSz);
11968
        if (ret != WOLFSSL_SUCCESS) {
11969
            WOLFSSL_MSG("Serial size error");
11970
            return WOLFSSL_FAILURE;
11971
        }
11972
11973
        if (serialSz > EXTERNAL_SERIAL_SIZE ||
11974
                serialSz > CTC_SERIAL_SIZE) {
11975
            WOLFSSL_MSG("Serial size too large error");
11976
            WOLFSSL_ERROR_VERBOSE(BUFFER_E);
11977
            return WOLFSSL_FAILURE;
11978
        }
11979
        XMEMCPY(cert->serial, serial, serialSz);
11980
        cert->serialSz = serialSz;
11981
    #else
11982
        WOLFSSL_MSG("Getting X509 serial number not supported");
11983
        return WOLFSSL_FAILURE;
11984
    #endif
11985
    }
11986
11987
    /* copy over Name structures */
11988
    if (x509->issuerSet)
11989
        cert->selfSigned = 0;
11990
11991
#if defined(WOLFSSL_CERT_EXT) || defined(OPENSSL_EXTRA)
11992
    ret = CopyX509NameToCert(&x509->subject, cert->sbjRaw);
11993
    if (ret < 0) {
11994
        WOLFSSL_MSG("Subject conversion error");
11995
        return MEMORY_E;
11996
    }
11997
    if (cert->selfSigned) {
11998
        XMEMCPY(cert->issRaw, cert->sbjRaw, sizeof(CertName));
11999
    }
12000
    else {
12001
        ret = CopyX509NameToCert(&x509->issuer, cert->issRaw);
12002
        if (ret < 0) {
12003
            WOLFSSL_MSG("Issuer conversion error");
12004
            return MEMORY_E;
12005
        }
12006
    }
12007
#endif
12008
12009
    cert->heap = x509->heap;
12010
12011
    (void)ret;
12012
    return WOLFSSL_SUCCESS;
12013
}
12014
12015
12016
    /* returns the sig type to use on success i.e CTC_SHAwRSA and WOLFSSL_FALURE
12017
     * on fail case */
12018
    static int wolfSSL_sigTypeFromPKEY(WOLFSSL_EVP_MD* md,
12019
            WOLFSSL_EVP_PKEY* pkey)
12020
    {
12021
    #if !defined(NO_PWDBASED) && defined(OPENSSL_EXTRA)
12022
        int hashType;
12023
        int sigType = WOLFSSL_FAILURE;
12024
12025
        /* Convert key type and hash algorithm to a signature algorithm */
12026
        if (wolfSSL_EVP_get_hashinfo(md, &hashType, NULL)
12027
            == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
12028
        {
12029
            return WOLFSSL_FAILURE;
12030
        }
12031
12032
        if (pkey->type == WC_EVP_PKEY_RSA) {
12033
            switch (hashType) {
12034
                case WC_HASH_TYPE_SHA:
12035
                    sigType = CTC_SHAwRSA;
12036
                    break;
12037
                case WC_HASH_TYPE_SHA224:
12038
                    sigType = CTC_SHA224wRSA;
12039
                    break;
12040
                case WC_HASH_TYPE_SHA256:
12041
                    sigType = CTC_SHA256wRSA;
12042
                    break;
12043
                case WC_HASH_TYPE_SHA384:
12044
                    sigType = CTC_SHA384wRSA;
12045
                    break;
12046
                case WC_HASH_TYPE_SHA512:
12047
                    sigType = CTC_SHA512wRSA;
12048
                    break;
12049
            #ifdef WOLFSSL_SHA3
12050
                case WC_HASH_TYPE_SHA3_224:
12051
                    sigType = CTC_SHA3_224wRSA;
12052
                    break;
12053
                case WC_HASH_TYPE_SHA3_256:
12054
                    sigType = CTC_SHA3_256wRSA;
12055
                    break;
12056
                case WC_HASH_TYPE_SHA3_384:
12057
                    sigType = CTC_SHA3_384wRSA;
12058
                    break;
12059
                case WC_HASH_TYPE_SHA3_512:
12060
                    sigType = CTC_SHA3_512wRSA;
12061
                    break;
12062
            #endif
12063
                default:
12064
                    return WOLFSSL_FAILURE;
12065
            }
12066
        }
12067
        else if (pkey->type == WC_EVP_PKEY_EC) {
12068
            switch (hashType) {
12069
                case WC_HASH_TYPE_SHA:
12070
                    sigType = CTC_SHAwECDSA;
12071
                    break;
12072
                case WC_HASH_TYPE_SHA224:
12073
                    sigType = CTC_SHA224wECDSA;
12074
                    break;
12075
                case WC_HASH_TYPE_SHA256:
12076
                    sigType = CTC_SHA256wECDSA;
12077
                    break;
12078
                case WC_HASH_TYPE_SHA384:
12079
                    sigType = CTC_SHA384wECDSA;
12080
                    break;
12081
                case WC_HASH_TYPE_SHA512:
12082
                    sigType = CTC_SHA512wECDSA;
12083
                    break;
12084
            #ifdef WOLFSSL_SHA3
12085
                case WC_HASH_TYPE_SHA3_224:
12086
                    sigType = CTC_SHA3_224wECDSA;
12087
                    break;
12088
                case WC_HASH_TYPE_SHA3_256:
12089
                    sigType = CTC_SHA3_256wECDSA;
12090
                    break;
12091
                case WC_HASH_TYPE_SHA3_384:
12092
                    sigType = CTC_SHA3_384wECDSA;
12093
                    break;
12094
                case WC_HASH_TYPE_SHA3_512:
12095
                    sigType = CTC_SHA3_512wECDSA;
12096
                    break;
12097
            #endif
12098
                default:
12099
                    return WOLFSSL_FAILURE;
12100
            }
12101
        }
12102
        else
12103
            return WOLFSSL_FAILURE;
12104
        return sigType;
12105
#else
12106
        (void)md;
12107
        (void)pkey;
12108
        WOLFSSL_MSG("Cannot get hashinfo when NO_PWDBASED is defined");
12109
        return WOLFSSL_FAILURE;
12110
#endif /* !NO_PWDBASED && OPENSSL_EXTRA */
12111
    }
12112
12113
12114
    /* generates DER buffer from WOLFSSL_X509
12115
     * If req == 1 then creates a request DER buffer
12116
     *
12117
     * updates derSz with certificate body size on success
12118
     * return WOLFSSL_SUCCESS on success
12119
     */
12120
    static int wolfssl_x509_make_der(WOLFSSL_X509* x509, int req,
12121
            unsigned char* der, int* derSz, int includeSig)
12122
    {
12123
        int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
12124
        int totalLen;
12125
        Cert* cert = NULL;
12126
        void* key = NULL;
12127
        int type = -1;
12128
    #ifndef NO_RSA
12129
        RsaKey* rsa = NULL;
12130
    #endif
12131
    #ifdef HAVE_ECC
12132
        ecc_key* ecc = NULL;
12133
    #endif
12134
    #ifndef NO_DSA
12135
        DsaKey* dsa = NULL;
12136
    #endif
12137
    #if defined(HAVE_FALCON)
12138
        falcon_key* falcon = NULL;
12139
    #endif
12140
    #if defined(HAVE_DILITHIUM)
12141
        dilithium_key* dilithium = NULL;
12142
    #endif
12143
    #if defined(HAVE_SPHINCS)
12144
        sphincs_key* sphincs = NULL;
12145
    #endif
12146
        WC_RNG rng;
12147
        word32 idx = 0;
12148
12149
        if (x509 == NULL || der == NULL || derSz == NULL)
12150
            return BAD_FUNC_ARG;
12151
12152
    #ifndef WOLFSSL_CERT_REQ
12153
        if (req) {
12154
            WOLFSSL_MSG("WOLFSSL_CERT_REQ needed for certificate request");
12155
            return WOLFSSL_FAILURE;
12156
        }
12157
    #endif
12158
12159
        /* allocate Cert struct on heap since it is large */
12160
        cert = (Cert*)XMALLOC(sizeof(Cert), NULL, DYNAMIC_TYPE_CERT);
12161
        if (cert == NULL) {
12162
            WOLFSSL_MSG("Failed to allocate memory for Cert struct");
12163
            return WOLFSSL_FAILURE;
12164
        }
12165
        XMEMSET(cert, 0, sizeof(Cert));
12166
12167
    #ifdef WOLFSSL_CERT_REQ
12168
        if (req) {
12169
            if (ReqCertFromX509(cert, x509) != WOLFSSL_SUCCESS) {
12170
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12171
                return WOLFSSL_FAILURE;
12172
            }
12173
        }
12174
        else
12175
    #endif
12176
        {
12177
            /* Create a Cert that has the certificate fields. */
12178
            if (CertFromX509(cert, x509) != WOLFSSL_SUCCESS) {
12179
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12180
                return WOLFSSL_FAILURE;
12181
            }
12182
        }
12183
12184
        /* Create a public key object from requests public key. */
12185
    #ifndef NO_RSA
12186
        if (x509->pubKeyOID == RSAk) {
12187
12188
            rsa = (RsaKey*)XMALLOC(sizeof(RsaKey), NULL, DYNAMIC_TYPE_RSA);
12189
            if (rsa == NULL) {
12190
                WOLFSSL_MSG("Failed to allocate memory for RsaKey");
12191
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12192
                return WOLFSSL_FAILURE;
12193
            }
12194
12195
            type = RSA_TYPE;
12196
            ret = wc_InitRsaKey(rsa, x509->heap);
12197
            if (ret != 0) {
12198
                XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
12199
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12200
                return ret;
12201
            }
12202
            ret = wc_RsaPublicKeyDecode(x509->pubKey.buffer, &idx, rsa,
12203
                                                           x509->pubKey.length);
12204
            if (ret != 0) {
12205
                WOLFSSL_ERROR_VERBOSE(ret);
12206
                wc_FreeRsaKey(rsa);
12207
                XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
12208
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12209
                return ret;
12210
            }
12211
            key = (void*)rsa;
12212
        }
12213
    #endif
12214
    #ifdef HAVE_ECC
12215
        if (x509->pubKeyOID == ECDSAk) {
12216
12217
            ecc = (ecc_key*)XMALLOC(sizeof(ecc_key), NULL, DYNAMIC_TYPE_ECC);
12218
            if (ecc == NULL) {
12219
                WOLFSSL_MSG("Failed to allocate memory for ecc_key");
12220
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12221
                return WOLFSSL_FAILURE;
12222
            }
12223
12224
            type = ECC_TYPE;
12225
            ret = wc_ecc_init(ecc);
12226
            if (ret != 0) {
12227
                XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
12228
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12229
                return ret;
12230
            }
12231
            ret = wc_EccPublicKeyDecode(x509->pubKey.buffer, &idx, ecc,
12232
                                                           x509->pubKey.length);
12233
            if (ret != 0) {
12234
                WOLFSSL_ERROR_VERBOSE(ret);
12235
                wc_ecc_free(ecc);
12236
                XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
12237
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12238
                return ret;
12239
            }
12240
            key = (void*)ecc;
12241
        }
12242
    #endif
12243
    #ifndef NO_DSA
12244
        if (x509->pubKeyOID == DSAk) {
12245
12246
            dsa = (DsaKey*)XMALLOC(sizeof(DsaKey), NULL, DYNAMIC_TYPE_DSA);
12247
            if (dsa == NULL) {
12248
                WOLFSSL_MSG("Failed to allocate memory for DsaKey");
12249
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12250
                return WOLFSSL_FAILURE;
12251
            }
12252
12253
            type = DSA_TYPE;
12254
            ret = wc_InitDsaKey(dsa);
12255
            if (ret != 0) {
12256
                XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
12257
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12258
                return ret;
12259
            }
12260
            ret = wc_DsaPublicKeyDecode(x509->pubKey.buffer, &idx, dsa,
12261
                                                           x509->pubKey.length);
12262
            if (ret != 0) {
12263
                WOLFSSL_ERROR_VERBOSE(ret);
12264
                wc_FreeDsaKey(dsa);
12265
                XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
12266
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12267
                return ret;
12268
            }
12269
            key = (void*)dsa;
12270
        }
12271
    #endif
12272
    #if defined(HAVE_FALCON)
12273
        if ((x509->pubKeyOID == FALCON_LEVEL1k) ||
12274
            (x509->pubKeyOID == FALCON_LEVEL5k)) {
12275
            falcon = (falcon_key*)XMALLOC(sizeof(falcon_key), NULL,
12276
                                          DYNAMIC_TYPE_FALCON);
12277
            if (falcon == NULL) {
12278
                WOLFSSL_MSG("Failed to allocate memory for falcon_key");
12279
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12280
                return WOLFSSL_FAILURE;
12281
            }
12282
12283
            ret = wc_falcon_init(falcon);
12284
            if (ret != 0) {
12285
                XFREE(falcon, NULL, DYNAMIC_TYPE_FALCON);
12286
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12287
                return ret;
12288
            }
12289
12290
            if (x509->pubKeyOID == FALCON_LEVEL1k) {
12291
                type = FALCON_LEVEL1_TYPE;
12292
                wc_falcon_set_level(falcon, 1);
12293
            }
12294
            else if (x509->pubKeyOID == FALCON_LEVEL5k) {
12295
                type = FALCON_LEVEL5_TYPE;
12296
                wc_falcon_set_level(falcon, 5);
12297
            }
12298
12299
            ret = wc_Falcon_PublicKeyDecode(x509->pubKey.buffer, &idx, falcon,
12300
                                            x509->pubKey.length);
12301
            if (ret != 0) {
12302
                WOLFSSL_ERROR_VERBOSE(ret);
12303
                wc_falcon_free(falcon);
12304
                XFREE(falcon, NULL, DYNAMIC_TYPE_FALCON);
12305
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12306
                return ret;
12307
            }
12308
            key = (void*)falcon;
12309
        }
12310
    #endif
12311
    #if defined(HAVE_DILITHIUM)
12312
        if ((x509->pubKeyOID == ML_DSA_LEVEL2k) ||
12313
            (x509->pubKeyOID == ML_DSA_LEVEL3k) ||
12314
            (x509->pubKeyOID == ML_DSA_LEVEL5k)
12315
            #ifdef WOLFSSL_DILITHIUM_FIPS204_DRAFT
12316
         || (x509->pubKeyOID == DILITHIUM_LEVEL2k)
12317
         || (x509->pubKeyOID == DILITHIUM_LEVEL3k)
12318
         || (x509->pubKeyOID == DILITHIUM_LEVEL5k)
12319
            #endif /* WOLFSSL_DILITHIUM_FIPS204_DRAFT */
12320
            ) {
12321
            dilithium = (dilithium_key*)XMALLOC(sizeof(dilithium_key), NULL,
12322
                                          DYNAMIC_TYPE_DILITHIUM);
12323
            if (dilithium == NULL) {
12324
                WOLFSSL_MSG("Failed to allocate memory for dilithium_key");
12325
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12326
                return WOLFSSL_FAILURE;
12327
            }
12328
12329
            ret = wc_dilithium_init(dilithium);
12330
            if (ret != 0) {
12331
                XFREE(dilithium, NULL, DYNAMIC_TYPE_DILITHIUM);
12332
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12333
                return ret;
12334
            }
12335
12336
            if (x509->pubKeyOID == ML_DSA_LEVEL2k) {
12337
                type = ML_DSA_LEVEL2_TYPE;
12338
                wc_dilithium_set_level(dilithium, WC_ML_DSA_44);
12339
            }
12340
            else if (x509->pubKeyOID == ML_DSA_LEVEL3k) {
12341
                type = ML_DSA_LEVEL3_TYPE;
12342
                wc_dilithium_set_level(dilithium, WC_ML_DSA_65);
12343
            }
12344
            else if (x509->pubKeyOID == ML_DSA_LEVEL5k) {
12345
                type = ML_DSA_LEVEL5_TYPE;
12346
                wc_dilithium_set_level(dilithium, WC_ML_DSA_87);
12347
            }
12348
            #ifdef WOLFSSL_DILITHIUM_FIPS204_DRAFT
12349
            else if (x509->pubKeyOID == DILITHIUM_LEVEL2k) {
12350
                type = DILITHIUM_LEVEL2_TYPE;
12351
                wc_dilithium_set_level(dilithium, WC_ML_DSA_44_DRAFT);
12352
            }
12353
            else if (x509->pubKeyOID == DILITHIUM_LEVEL3k) {
12354
                type = DILITHIUM_LEVEL3_TYPE;
12355
                wc_dilithium_set_level(dilithium, WC_ML_DSA_65_DRAFT);
12356
            }
12357
            else if (x509->pubKeyOID == DILITHIUM_LEVEL5k) {
12358
                type = DILITHIUM_LEVEL5_TYPE;
12359
                wc_dilithium_set_level(dilithium, WC_ML_DSA_87_DRAFT);
12360
            }
12361
            #endif /* WOLFSSL_DILITHIUM_FIPS204_DRAFT */
12362
12363
            ret = wc_Dilithium_PublicKeyDecode(x509->pubKey.buffer, &idx,
12364
                                    dilithium, x509->pubKey.length);
12365
            if (ret != 0) {
12366
                WOLFSSL_ERROR_VERBOSE(ret);
12367
                wc_dilithium_free(dilithium);
12368
                XFREE(dilithium, NULL, DYNAMIC_TYPE_DILITHIUM);
12369
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12370
                return ret;
12371
            }
12372
            key = (void*)dilithium;
12373
        }
12374
    #endif
12375
    #if defined(HAVE_SPHINCS)
12376
        if ((x509->pubKeyOID == SPHINCS_FAST_LEVEL1k) ||
12377
            (x509->pubKeyOID == SPHINCS_FAST_LEVEL3k) ||
12378
            (x509->pubKeyOID == SPHINCS_FAST_LEVEL5k) ||
12379
            (x509->pubKeyOID == SPHINCS_SMALL_LEVEL1k) ||
12380
            (x509->pubKeyOID == SPHINCS_SMALL_LEVEL3k) ||
12381
            (x509->pubKeyOID == SPHINCS_SMALL_LEVEL5k)) {
12382
            sphincs = (sphincs_key*)XMALLOC(sizeof(sphincs_key), NULL,
12383
                                          DYNAMIC_TYPE_SPHINCS);
12384
            if (sphincs == NULL) {
12385
                WOLFSSL_MSG("Failed to allocate memory for sphincs_key");
12386
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12387
                return WOLFSSL_FAILURE;
12388
            }
12389
12390
            ret = wc_sphincs_init(sphincs);
12391
            if (ret != 0) {
12392
                XFREE(sphincs, NULL, DYNAMIC_TYPE_SPHINCS);
12393
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12394
                return ret;
12395
            }
12396
12397
            if (x509->pubKeyOID == SPHINCS_FAST_LEVEL1k) {
12398
                type = SPHINCS_FAST_LEVEL1_TYPE;
12399
                wc_sphincs_set_level_and_optim(sphincs, 1, FAST_VARIANT);
12400
            }
12401
            else if (x509->pubKeyOID == SPHINCS_FAST_LEVEL3k) {
12402
                type = SPHINCS_FAST_LEVEL3_TYPE;
12403
                wc_sphincs_set_level_and_optim(sphincs, 3, FAST_VARIANT);
12404
            }
12405
            else if (x509->pubKeyOID == SPHINCS_FAST_LEVEL3k) {
12406
                type = SPHINCS_FAST_LEVEL5_TYPE;
12407
                wc_sphincs_set_level_and_optim(sphincs, 5, FAST_VARIANT);
12408
            }
12409
            else if (x509->pubKeyOID == SPHINCS_SMALL_LEVEL1k) {
12410
                type = SPHINCS_SMALL_LEVEL1_TYPE;
12411
                wc_sphincs_set_level_and_optim(sphincs, 1, SMALL_VARIANT);
12412
            }
12413
            else if (x509->pubKeyOID == SPHINCS_SMALL_LEVEL3k) {
12414
                type = SPHINCS_SMALL_LEVEL3_TYPE;
12415
                wc_sphincs_set_level_and_optim(sphincs, 3, SMALL_VARIANT);
12416
            }
12417
            else if (x509->pubKeyOID == SPHINCS_SMALL_LEVEL3k) {
12418
                type = SPHINCS_SMALL_LEVEL5_TYPE;
12419
                wc_sphincs_set_level_and_optim(sphincs, 5, SMALL_VARIANT);
12420
            }
12421
12422
            ret = wc_Sphincs_PublicKeyDecode(x509->pubKey.buffer, &idx, sphincs,
12423
                                             x509->pubKey.length);
12424
            if (ret != 0) {
12425
                WOLFSSL_ERROR_VERBOSE(ret);
12426
                wc_sphincs_free(sphincs);
12427
                XFREE(sphincs, NULL, DYNAMIC_TYPE_SPHINCS);
12428
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12429
                return ret;
12430
            }
12431
            key = (void*)sphincs;
12432
        }
12433
    #endif
12434
        if (key == NULL) {
12435
            WOLFSSL_MSG("No public key found for certificate");
12436
            XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12437
            return WOLFSSL_FAILURE;
12438
        }
12439
12440
        /* Make the body of the certificate request. */
12441
    #ifdef WOLFSSL_CERT_REQ
12442
        if (req) {
12443
            ret = wc_MakeCertReq_ex(cert, der, *derSz, type, key);
12444
        }
12445
        else
12446
    #endif
12447
        {
12448
            ret = wc_InitRng(&rng);
12449
            if (ret != 0) {
12450
                ret = WOLFSSL_FAILURE;
12451
                goto cleanup;
12452
            }
12453
12454
            ret = wc_MakeCert_ex(cert, der, *derSz, type, key, &rng);
12455
            wc_FreeRng(&rng);
12456
        }
12457
        if (ret <= 0) {
12458
            WOLFSSL_ERROR_VERBOSE(ret);
12459
            ret = WOLFSSL_FAILURE;
12460
            goto cleanup;
12461
        }
12462
12463
        if ((x509->serialSz == 0) &&
12464
                (cert->serialSz <= EXTERNAL_SERIAL_SIZE) &&
12465
                (cert->serialSz > 0)) {
12466
        #if defined(OPENSSL_EXTRA)
12467
            WOLFSSL_ASN1_INTEGER *i = wolfSSL_ASN1_INTEGER_new();
12468
12469
            if (i == NULL) {
12470
                WOLFSSL_MSG("wolfSSL_ASN1_INTEGER_new error");
12471
                ret = WOLFSSL_FAILURE;
12472
                goto cleanup;
12473
            }
12474
            else {
12475
                i->length = cert->serialSz + 2;
12476
                i->data[0] = ASN_INTEGER;
12477
                i->data[1] = (unsigned char)cert->serialSz;
12478
                XMEMCPY(i->data + 2, cert->serial, cert->serialSz);
12479
                if (wolfSSL_X509_set_serialNumber(x509, i) != WOLFSSL_SUCCESS) {
12480
                    WOLFSSL_MSG("Issue setting generated serial number");
12481
                    wolfSSL_ASN1_INTEGER_free(i);
12482
                    ret = WOLFSSL_FAILURE;
12483
                    goto cleanup;
12484
                }
12485
                wolfSSL_ASN1_INTEGER_free(i);
12486
            }
12487
        #else
12488
            WOLFSSL_MSG("ASN1_INTEGER API not in build");
12489
12490
            ret = WOLFSSL_FAILURE;
12491
            goto cleanup;
12492
        #endif /* OPENSSL_EXTRA */
12493
        }
12494
12495
        if (includeSig) {
12496
            if (!x509->sig.buffer) {
12497
                WOLFSSL_MSG("No signature buffer");
12498
                ret = WOLFSSL_FAILURE;
12499
                goto cleanup;
12500
            }
12501
            totalLen = AddSignature(NULL, ret, NULL, x509->sig.length,
12502
                                  x509->sigOID);
12503
            if (totalLen > *derSz) {
12504
                WOLFSSL_MSG("Output der buffer too short");
12505
                ret = WOLFSSL_FAILURE;
12506
                goto cleanup;
12507
            }
12508
            ret = AddSignature(der, ret, x509->sig.buffer,
12509
                               x509->sig.length, x509->sigOID);
12510
        }
12511
12512
        *derSz = ret;
12513
        ret = WOLFSSL_SUCCESS;
12514
cleanup:
12515
        /* Dispose of the public key object. */
12516
    #ifndef NO_RSA
12517
        if (x509->pubKeyOID == RSAk) {
12518
            wc_FreeRsaKey(rsa);
12519
            XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
12520
        }
12521
    #endif
12522
    #ifdef HAVE_ECC
12523
        if (x509->pubKeyOID == ECDSAk) {
12524
            wc_ecc_free(ecc);
12525
            XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
12526
        }
12527
    #endif
12528
    #ifndef NO_DSA
12529
        if (x509->pubKeyOID == DSAk) {
12530
            wc_FreeDsaKey(dsa);
12531
            XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
12532
        }
12533
    #endif
12534
    #if defined(HAVE_FALCON)
12535
        if ((x509->pubKeyOID == FALCON_LEVEL1k) ||
12536
            (x509->pubKeyOID == FALCON_LEVEL5k)) {
12537
            wc_falcon_free(falcon);
12538
            XFREE(falcon, NULL, DYNAMIC_TYPE_FALCON);
12539
        }
12540
    #endif
12541
    #if defined(HAVE_DILITHIUM)
12542
        if ((x509->pubKeyOID == ML_DSA_LEVEL2k) ||
12543
            (x509->pubKeyOID == ML_DSA_LEVEL3k) ||
12544
            (x509->pubKeyOID == ML_DSA_LEVEL5k)
12545
        #ifdef WOLFSSL_DILITHIUM_FIPS204_DRAFT
12546
         || (x509->pubKeyOID == DILITHIUM_LEVEL2k)
12547
         || (x509->pubKeyOID == DILITHIUM_LEVEL3k)
12548
         || (x509->pubKeyOID == DILITHIUM_LEVEL5k)
12549
        #endif
12550
        ) {
12551
            wc_dilithium_free(dilithium);
12552
            XFREE(dilithium, NULL, DYNAMIC_TYPE_DILITHIUM);
12553
        }
12554
    #endif
12555
    #if defined(HAVE_SPHINCS)
12556
        if ((x509->pubKeyOID == SPHINCS_FAST_LEVEL1k) ||
12557
            (x509->pubKeyOID == SPHINCS_FAST_LEVEL3k) ||
12558
            (x509->pubKeyOID == SPHINCS_FAST_LEVEL5k) ||
12559
            (x509->pubKeyOID == SPHINCS_SMALL_LEVEL1k) ||
12560
            (x509->pubKeyOID == SPHINCS_SMALL_LEVEL3k) ||
12561
            (x509->pubKeyOID == SPHINCS_SMALL_LEVEL5k)) {
12562
            wc_sphincs_free(sphincs);
12563
            XFREE(sphincs, NULL, DYNAMIC_TYPE_SPHINCS);
12564
        }
12565
    #endif
12566
        XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12567
12568
        return ret;
12569
    }
12570
12571
12572
    /* signs a der buffer for the WOLFSSL_X509 structure using the PKEY and MD
12573
     * hash passed in
12574
     *
12575
     * WARNING: this free's and replaces the existing DER buffer in the
12576
     *          WOLFSSL_X509 with the newly signed buffer.
12577
     * returns size of signed buffer on success and negative values on fail
12578
     */
12579
    static int wolfSSL_X509_resign_cert(WOLFSSL_X509* x509, int req,
12580
            unsigned char* der, int derSz, int certBodySz, WOLFSSL_EVP_MD* md,
12581
            WOLFSSL_EVP_PKEY* pkey)
12582
    {
12583
        int ret;
12584
        void* key = NULL;
12585
        int type = -1;
12586
        int sigType;
12587
        WC_RNG rng;
12588
12589
        (void)req;
12590
        WOLFSSL_ENTER("wolfSSL_X509_resign_cert");
12591
12592
        sigType = wolfSSL_sigTypeFromPKEY(md, pkey);
12593
        if (sigType == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
12594
            WOLFSSL_MSG("Error getting signature type from pkey");
12595
            return WOLFSSL_FATAL_ERROR;
12596
        }
12597
12598
12599
        /* Get the private key object and type from pkey. */
12600
    #ifndef NO_RSA
12601
        if (pkey->type == WC_EVP_PKEY_RSA) {
12602
            type = RSA_TYPE;
12603
            key = pkey->rsa->internal;
12604
        }
12605
    #endif
12606
    #ifdef HAVE_ECC
12607
        if (pkey->type == WC_EVP_PKEY_EC) {
12608
            type = ECC_TYPE;
12609
            key = pkey->ecc->internal;
12610
        }
12611
    #endif
12612
12613
        /* Sign the certificate (request) body. */
12614
        ret = wc_InitRng(&rng);
12615
        if (ret != 0)
12616
            return ret;
12617
        ret = wc_SignCert_ex(certBodySz, sigType, der, (word32)derSz, type, key,
12618
            &rng);
12619
        wc_FreeRng(&rng);
12620
        if (ret < 0) {
12621
            WOLFSSL_LEAVE("wolfSSL_X509_resign_cert", ret);
12622
            return ret;
12623
        }
12624
        derSz = ret;
12625
12626
        /* Extract signature from buffer */
12627
        {
12628
            word32 idx = 0;
12629
            int    len = 0;
12630
12631
            /* Read top level sequence */
12632
            if (GetSequence(der, &idx, &len, (word32)derSz) < 0) {
12633
                WOLFSSL_MSG("GetSequence error");
12634
                return WOLFSSL_FATAL_ERROR;
12635
            }
12636
            /* Move idx to signature */
12637
            idx += certBodySz;
12638
            /* Read signature algo sequence */
12639
            if (GetSequence(der, &idx, &len, (word32)derSz) < 0) {
12640
                WOLFSSL_MSG("GetSequence error");
12641
                return WOLFSSL_FATAL_ERROR;
12642
            }
12643
            idx += len;
12644
            /* Read signature bit string */
12645
            if (CheckBitString(der, &idx, &len, (word32)derSz, 0, NULL) != 0) {
12646
                WOLFSSL_MSG("CheckBitString error");
12647
                return WOLFSSL_FATAL_ERROR;
12648
            }
12649
            /* Sanity check */
12650
            if (idx + len != (word32)derSz) {
12651
                WOLFSSL_MSG("unexpected asn1 structure");
12652
                return WOLFSSL_FATAL_ERROR;
12653
            }
12654
            x509->sig.length = 0;
12655
            if (x509->sig.buffer)
12656
                XFREE(x509->sig.buffer, x509->heap, DYNAMIC_TYPE_SIGNATURE);
12657
            x509->sig.buffer = (byte*)XMALLOC(len, x509->heap,
12658
                                              DYNAMIC_TYPE_SIGNATURE);
12659
            if (!x509->sig.buffer) {
12660
                WOLFSSL_MSG("malloc error");
12661
                return WOLFSSL_FATAL_ERROR;
12662
            }
12663
            XMEMCPY(x509->sig.buffer, der + idx, len);
12664
            x509->sig.length = (unsigned int)len;
12665
        }
12666
12667
        /* Put in the new certificate encoding into the x509 object. */
12668
        FreeDer(&x509->derCert);
12669
        type = CERT_TYPE;
12670
    #ifdef WOLFSSL_CERT_REQ
12671
        if (req) {
12672
            type = CERTREQ_TYPE;
12673
        }
12674
    #endif
12675
        if (AllocDer(&x509->derCert, (word32)derSz, type, NULL) != 0)
12676
            return WOLFSSL_FATAL_ERROR;
12677
        XMEMCPY(x509->derCert->buffer, der, derSz);
12678
        x509->derCert->length = (word32)derSz;
12679
12680
        return ret;
12681
    }
12682
12683
12684
#ifndef WC_MAX_X509_GEN
12685
    /* able to override max size until dynamic buffer created */
12686
    #define WC_MAX_X509_GEN 4096
12687
#endif
12688
12689
/* returns the size of signature on success */
12690
int wolfSSL_X509_sign(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey,
12691
        const WOLFSSL_EVP_MD* md)
12692
{
12693
    int  ret;
12694
    /* @TODO dynamic set based on expected cert size */
12695
    byte *der = (byte *)XMALLOC(WC_MAX_X509_GEN, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12696
    int  derSz = WC_MAX_X509_GEN;
12697
12698
    WOLFSSL_ENTER("wolfSSL_X509_sign");
12699
12700
    if (x509 == NULL || pkey == NULL || md == NULL) {
12701
        ret = WOLFSSL_FAILURE;
12702
        goto out;
12703
    }
12704
12705
    x509->sigOID = wolfSSL_sigTypeFromPKEY((WOLFSSL_EVP_MD*)md, pkey);
12706
    if ((ret = wolfssl_x509_make_der(x509, 0, der, &derSz, 0)) !=
12707
            WOLFSSL_SUCCESS) {
12708
        WOLFSSL_MSG("Unable to make DER for X509");
12709
        WOLFSSL_LEAVE("wolfSSL_X509_sign", ret);
12710
        (void)ret;
12711
        ret = WOLFSSL_FAILURE;
12712
        goto out;
12713
    }
12714
12715
    ret = wolfSSL_X509_resign_cert(x509, 0, der, WC_MAX_X509_GEN, derSz,
12716
            (WOLFSSL_EVP_MD*)md, pkey);
12717
    if (ret <= 0) {
12718
        WOLFSSL_LEAVE("wolfSSL_X509_sign", ret);
12719
        ret = WOLFSSL_FAILURE;
12720
        goto out;
12721
    }
12722
12723
out:
12724
    XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12725
12726
    return ret;
12727
}
12728
12729
#if defined(OPENSSL_EXTRA)
12730
int wolfSSL_X509_sign_ctx(WOLFSSL_X509 *x509, WOLFSSL_EVP_MD_CTX *ctx)
12731
{
12732
    WOLFSSL_ENTER("wolfSSL_X509_sign_ctx");
12733
12734
    if (!x509 || !ctx || !ctx->pctx || !ctx->pctx->pkey) {
12735
        WOLFSSL_MSG("Bad parameter");
12736
        return WOLFSSL_FAILURE;
12737
    }
12738
12739
    return wolfSSL_X509_sign(x509, ctx->pctx->pkey,
12740
        wolfSSL_EVP_MD_CTX_md(ctx));
12741
}
12742
#endif /* OPENSSL_EXTRA */
12743
#endif /* WOLFSSL_CERT_GEN */
12744
12745
12746
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
12747
    defined(OPENSSL_EXTRA_X509_SMALL) || defined(WOLFSSL_WPAS_SMALL)
12748
/* Converts from WC_NID_* value to wolfSSL value if needed.
12749
 *
12750
 * @param [in] nid  Numeric Id of a domain name component.
12751
 * @return  Domain name tag values - wolfSSL internal values.
12752
 * @return  -1 when nid isn't known.
12753
 */
12754
static int ConvertNIDToWolfSSL(int nid)
12755
0
{
12756
0
    switch (nid) {
12757
0
        case WC_NID_commonName : return ASN_COMMON_NAME;
12758
0
    #ifdef WOLFSSL_CERT_NAME_ALL
12759
0
        case WC_NID_name :       return ASN_NAME;
12760
0
        case WC_NID_givenName:   return ASN_GIVEN_NAME;
12761
0
        case WC_NID_dnQualifier :   return ASN_DNQUALIFIER;
12762
0
        case WC_NID_initials:   return ASN_INITIALS;
12763
0
    #endif /* WOLFSSL_CERT_NAME_ALL */
12764
0
        case WC_NID_surname :    return ASN_SUR_NAME;
12765
0
        case WC_NID_countryName: return ASN_COUNTRY_NAME;
12766
0
        case WC_NID_localityName: return ASN_LOCALITY_NAME;
12767
0
        case WC_NID_stateOrProvinceName: return ASN_STATE_NAME;
12768
0
        case WC_NID_streetAddress: return ASN_STREET_ADDR;
12769
0
        case WC_NID_organizationName: return ASN_ORG_NAME;
12770
0
        case WC_NID_organizationalUnitName: return ASN_ORGUNIT_NAME;
12771
0
        case WC_NID_emailAddress: return ASN_EMAIL_NAME;
12772
0
        case WC_NID_pkcs9_contentType: return ASN_CONTENT_TYPE;
12773
0
        case WC_NID_serialNumber: return ASN_SERIAL_NUMBER;
12774
0
        case WC_NID_userId: return ASN_USER_ID;
12775
0
        case WC_NID_businessCategory: return ASN_BUS_CAT;
12776
0
        case WC_NID_domainComponent: return ASN_DOMAIN_COMPONENT;
12777
0
        case WC_NID_postalCode: return ASN_POSTAL_CODE;
12778
0
        case WC_NID_rfc822Mailbox: return ASN_RFC822_MAILBOX;
12779
0
        case WC_NID_favouriteDrink: return ASN_FAVOURITE_DRINK;
12780
0
        default:
12781
0
            WOLFSSL_MSG("Attribute NID not found");
12782
0
            return WOLFSSL_FATAL_ERROR;
12783
0
    }
12784
0
}
12785
#endif /* OPENSSL_ALL || OPENSSL_EXTRA ||
12786
          OPENSSL_EXTRA_X509_SMALL || WOLFSSL_WPAS_SMALL*/
12787
12788
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
12789
    defined(OPENSSL_EXTRA_X509_SMALL)
12790
/* This is to convert the x509 name structure into canonical DER format     */
12791
/*  , which has the following rules:                                        */
12792
/*   convert to UTF8                                                        */
12793
/*   convert to lower case                                                  */
12794
/*   multi-spaces collapsed                                                 */
12795
/*   leading SEQUENCE header is skipped                                     */
12796
/* @param  name a pointer to X509_NAME that is to be converted              */
12797
/* @param  out  a pointer to converted data                                 */
12798
/* @return a number of converted bytes, otherwise <=0 error code            */
12799
int wolfSSL_i2d_X509_NAME_canon(WOLFSSL_X509_NAME* name, unsigned char** out)
12800
0
{
12801
0
    int  totalBytes = 0, i, idx;
12802
0
    byte *output, *local = NULL;
12803
0
    WC_DECLARE_VAR(names, EncodedName, MAX_NAME_ENTRIES, 0);
12804
12805
0
    if (name == NULL)
12806
0
        return BAD_FUNC_ARG;
12807
12808
0
    WC_ALLOC_VAR_EX(names, EncodedName, MAX_NAME_ENTRIES, NULL,
12809
0
        DYNAMIC_TYPE_TMP_BUFFER, return MEMORY_E);
12810
12811
0
    XMEMSET(names, 0, sizeof(EncodedName) * MAX_NAME_ENTRIES);
12812
12813
0
    for (i = 0; i < MAX_NAME_ENTRIES; i++) {
12814
0
        WOLFSSL_X509_NAME_ENTRY* entry;
12815
0
        int ret;
12816
12817
0
        entry = wolfSSL_X509_NAME_get_entry(name, i);
12818
0
        if (entry != NULL && entry->set >= 1) {
12819
0
            const char* nameStr;
12820
0
            WOLFSSL_ASN1_STRING* data;
12821
0
            WOLFSSL_ASN1_STRING* cano_data;
12822
12823
0
            cano_data = wolfSSL_ASN1_STRING_new();
12824
0
            if (cano_data == NULL) {
12825
0
                WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12826
0
                return MEMORY_E;
12827
0
            }
12828
12829
0
            data = wolfSSL_X509_NAME_ENTRY_get_data(entry);
12830
0
            if (data == NULL) {
12831
0
                WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12832
0
                wolfSSL_ASN1_STRING_free(cano_data);
12833
0
                WOLFSSL_MSG("Error getting entry data");
12834
0
                return WOLFSSL_FATAL_ERROR;
12835
0
            }
12836
0
            if (wolfSSL_ASN1_STRING_canon(cano_data, data) != WOLFSSL_SUCCESS) {
12837
0
                WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12838
0
                wolfSSL_ASN1_STRING_free(cano_data);
12839
0
                return WOLFSSL_FAILURE;
12840
0
            }
12841
0
            nameStr = (const char*)wolfSSL_ASN1_STRING_data(cano_data);
12842
12843
            /* allow for blank values in the name structure, eg OU= */
12844
0
            if (nameStr)
12845
0
            {
12846
0
                ret = wc_EncodeNameCanonical(&names[i], nameStr, CTC_UTF8,
12847
0
                    (byte)ConvertNIDToWolfSSL(entry->nid));
12848
0
                if (ret < 0) {
12849
0
                    WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12850
0
                    wolfSSL_ASN1_STRING_free(cano_data);
12851
0
                    WOLFSSL_MSG("EncodeName failed");
12852
0
                    return WOLFSSL_FATAL_ERROR;
12853
0
                }
12854
0
                totalBytes += ret;
12855
0
            }
12856
12857
0
            wolfSSL_ASN1_STRING_free(cano_data);
12858
0
        }
12859
0
    }
12860
12861
0
    if (out == NULL) {
12862
        /* If out is NULL, caller just wants length. */
12863
0
        WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12864
0
        return totalBytes;
12865
0
    }
12866
12867
    /* skip header */
12868
    /* check if using buffer passed in */
12869
0
    if (*out == NULL) {
12870
0
        *out = local = (unsigned char*)XMALLOC(totalBytes, NULL,
12871
0
                DYNAMIC_TYPE_OPENSSL);
12872
0
        if (*out == NULL) {
12873
0
            return MEMORY_E;
12874
0
        }
12875
0
    }
12876
0
    output = *out;
12877
0
    idx = 0;
12878
12879
0
    for (i = 0; i < MAX_NAME_ENTRIES; i++) {
12880
0
        if (names[i].used) {
12881
0
            XMEMCPY(output + idx, names[i].encoded, names[i].totalLen);
12882
0
            idx += names[i].totalLen;
12883
0
        }
12884
0
    }
12885
12886
0
    WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12887
12888
    /* used existing buffer passed in, so increment pointer */
12889
0
    if (local == NULL) {
12890
0
        *out += totalBytes;
12891
0
    }
12892
0
    return totalBytes;
12893
0
}
12894
#endif /* OPENSSL_ALL || OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
12895
12896
#ifdef WOLFSSL_CERT_GEN
12897
/* Guarded by either
12898
 * A) WOLFSSL_WPAS_SMALL is on or
12899
 * B) (OPENSSL_EXTRA or OPENSSL_EXTRA_X509_SMALL) + WOLFSSL_CERT_GEN +
12900
 *    (WOLFSSL_CERT_REQ or WOLFSSL_CERT_EXT or OPENSSL_EXTRA) has been
12901
 *    defined
12902
 */
12903
#if defined(WOLFSSL_WPAS_SMALL) || \
12904
    (defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)) && \
12905
    defined(WOLFSSL_CERT_GEN) && \
12906
    (defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_EXT) || \
12907
     defined(OPENSSL_EXTRA))
12908
12909
/* Converts the x509 name structure into DER format.
12910
 *
12911
 * out  pointer to either a pre setup buffer or a pointer to null for
12912
 *      creating a dynamic buffer. In the case that a pre-existing buffer is
12913
 *      used out will be incremented the size of the DER buffer on success. If
12914
 *      out is NULL, the function returns the necessary output buffer length.
12915
 *
12916
 * returns the size of the buffer on success, or negative value with failure
12917
 */
12918
int wolfSSL_i2d_X509_NAME(WOLFSSL_X509_NAME* name, unsigned char** out)
12919
{
12920
    int  totalBytes = 0, i, idx;
12921
    byte temp[MAX_SEQ_SZ];
12922
    byte *output, *local = NULL;
12923
    WC_DECLARE_VAR(names, EncodedName, MAX_NAME_ENTRIES, 0);
12924
12925
    if (name == NULL)
12926
        return BAD_FUNC_ARG;
12927
12928
    WC_ALLOC_VAR_EX(names, EncodedName, MAX_NAME_ENTRIES, NULL,
12929
        DYNAMIC_TYPE_TMP_BUFFER, return MEMORY_E);
12930
12931
    XMEMSET(names, 0, sizeof(EncodedName) * MAX_NAME_ENTRIES);
12932
12933
    for (i = 0; i < MAX_NAME_ENTRIES; i++) {
12934
        WOLFSSL_X509_NAME_ENTRY* entry;
12935
        int ret;
12936
12937
        entry = wolfSSL_X509_NAME_get_entry(name, i);
12938
        if (entry != NULL && entry->set >= 1) {
12939
            const char* nameStr;
12940
            int type;
12941
            WOLFSSL_ASN1_STRING* data;
12942
12943
            data = wolfSSL_X509_NAME_ENTRY_get_data(entry);
12944
            if (data == NULL) {
12945
                WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12946
                WOLFSSL_MSG("Error getting entry data");
12947
                return WOLFSSL_FATAL_ERROR;
12948
            }
12949
12950
            nameStr = (const char*)wolfSSL_ASN1_STRING_data(data);
12951
            type    = wolfSSL_ASN1_STRING_type(data);
12952
12953
            switch (type) {
12954
                case WOLFSSL_MBSTRING_UTF8:
12955
                    type = CTC_UTF8;
12956
                    break;
12957
                case WOLFSSL_MBSTRING_ASC:
12958
                case WOLFSSL_V_ASN1_PRINTABLESTRING:
12959
                    type = CTC_PRINTABLE;
12960
                    break;
12961
                default:
12962
                    WOLFSSL_MSG(
12963
                        "Unknown encoding type conversion UTF8 by default");
12964
                    type = CTC_UTF8;
12965
            }
12966
            ret = wc_EncodeName(&names[i], nameStr, (char)type,
12967
                (byte)ConvertNIDToWolfSSL(entry->nid));
12968
            if (ret < 0) {
12969
                WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12970
                WOLFSSL_MSG("EncodeName failed");
12971
                return WOLFSSL_FATAL_ERROR;
12972
            }
12973
            totalBytes += ret;
12974
        }
12975
    }
12976
12977
    /* header */
12978
    idx = (int)SetSequence((word32)totalBytes, temp);
12979
    if (totalBytes + idx > ASN_NAME_MAX) {
12980
        WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12981
        WOLFSSL_MSG("Total Bytes is greater than ASN_NAME_MAX");
12982
        return BUFFER_E;
12983
    }
12984
12985
    if (out == NULL) {
12986
        /* If out is NULL, caller just wants length. */
12987
        totalBytes += idx;
12988
        WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12989
        return totalBytes;
12990
    }
12991
12992
    /* check if using buffer passed in */
12993
    if (*out == NULL) {
12994
        *out = local = (unsigned char*)XMALLOC(totalBytes + idx, name->heap,
12995
                DYNAMIC_TYPE_OPENSSL);
12996
        if (*out == NULL) {
12997
            return MEMORY_E;
12998
        }
12999
    }
13000
    output = *out;
13001
13002
    idx = (int)SetSequence((word32)totalBytes, output);
13003
    totalBytes += idx;
13004
    for (i = 0; i < MAX_NAME_ENTRIES; i++) {
13005
        if (names[i].used) {
13006
            XMEMCPY(output + idx, names[i].encoded, names[i].totalLen);
13007
            idx += names[i].totalLen;
13008
        }
13009
    }
13010
13011
    WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
13012
13013
    /* used existing buffer passed in, so increment pointer */
13014
    if (local == NULL) {
13015
        *out += totalBytes;
13016
    }
13017
    return totalBytes;
13018
}
13019
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
13020
#endif /* WOLFSSL_CERT_GEN */
13021
13022
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL) || \
13023
    defined (WOLFSSL_WPAS_SMALL)
13024
13025
    WOLFSSL_X509_NAME *wolfSSL_d2i_X509_NAME(WOLFSSL_X509_NAME **name,
13026
                                             unsigned char **in, long length)
13027
0
    {
13028
0
        WOLFSSL_X509_NAME* tmp = NULL;
13029
0
        WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
13030
13031
0
        WOLFSSL_ENTER("wolfSSL_d2i_X509_NAME");
13032
13033
0
        if (!in || !*in || length <= 0) {
13034
0
            WOLFSSL_MSG("Bad argument");
13035
0
            return NULL;
13036
0
        }
13037
13038
0
        WC_ALLOC_VAR_EX(cert, DecodedCert, 1, NULL, DYNAMIC_TYPE_DCERT,
13039
0
            return NULL);
13040
13041
        /* Set the X509_NAME buffer as the input data for cert.
13042
         * in is NOT a full certificate. Just the name. */
13043
0
        InitDecodedCert(cert, *in, (word32)length, NULL);
13044
13045
        /* Parse the X509 subject name */
13046
0
        if (GetName(cert, ASN_SUBJECT, (int)length) != 0) {
13047
0
            WOLFSSL_MSG("WOLFSSL_X509_NAME parse error");
13048
0
            goto cleanup;
13049
0
        }
13050
13051
0
        if (!(tmp = wolfSSL_X509_NAME_new_ex(cert->heap))) {
13052
0
            WOLFSSL_MSG("wolfSSL_X509_NAME_new_ex error");
13053
0
            goto cleanup;
13054
0
        }
13055
13056
0
        if (wolfSSL_X509_NAME_copy((WOLFSSL_X509_NAME*)cert->subjectName,
13057
0
                    tmp) != WOLFSSL_SUCCESS) {
13058
0
            wolfSSL_X509_NAME_free(tmp);
13059
0
            tmp = NULL;
13060
0
            goto cleanup;
13061
0
        }
13062
13063
0
        if (name)
13064
0
            *name = tmp;
13065
0
cleanup:
13066
0
        FreeDecodedCert(cert);
13067
0
        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
13068
0
        return tmp;
13069
0
    }
13070
#endif /* OPENSSL_EXTRA || OPENSSL_ALL || WOLFSSL_WPAS_SMALL */
13071
13072
13073
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL)
13074
13075
    /* Compares the two X509 names. If the size of x is larger then y then a
13076
     * positive value is returned if x is smaller a negative value is returned.
13077
     * In the case that the sizes are equal a the value of strcmp between the
13078
     * two names is returned.
13079
     *
13080
     * x First name for comparison
13081
     * y Second name to compare with x
13082
     */
13083
    int wolfSSL_X509_NAME_cmp(const WOLFSSL_X509_NAME* x,
13084
            const WOLFSSL_X509_NAME* y)
13085
0
    {
13086
0
        const char* _x;
13087
0
        const char* _y;
13088
0
        WOLFSSL_ENTER("wolfSSL_X509_NAME_cmp");
13089
13090
0
        if (x == NULL || y == NULL) {
13091
0
            WOLFSSL_MSG("Bad argument passed in");
13092
0
            return -2;
13093
0
        }
13094
13095
0
        if (x == y) {
13096
0
            return 0; /* match */
13097
0
        }
13098
13099
0
        if (x->sz != y->sz) {
13100
0
            return x->sz - y->sz;
13101
0
        }
13102
13103
        /*
13104
         * If the name member is not set or is immediately null terminated then
13105
         * compare the staticName member
13106
         */
13107
0
        _x = (x->name && *x->name) ? x->name : x->staticName;
13108
0
        _y = (y->name && *y->name) ? y->name : y->staticName;
13109
13110
0
        return XSTRNCASECMP(_x, _y, x->sz); /* y sz is the same */
13111
0
    }
13112
13113
#ifndef NO_BIO
13114
13115
static WOLFSSL_X509 *loadX509orX509REQFromPemBio(WOLFSSL_BIO *bp,
13116
        WOLFSSL_X509 **x, wc_pem_password_cb *cb, void *u, int type)
13117
0
{
13118
0
    WOLFSSL_X509* x509 = NULL;
13119
0
#if defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM)
13120
0
    unsigned char* pem = NULL;
13121
0
    int pemSz;
13122
0
    long  i = 0, l, footerSz;
13123
0
    const char* footer = NULL;
13124
0
    int streaming = 0;  /* Flag to indicate if source is streaming (FIFO) */
13125
0
    const char* altFooter = NULL;
13126
0
    long altFooterSz = 0;
13127
13128
0
    WOLFSSL_ENTER("loadX509orX509REQFromPemBio");
13129
13130
0
    if (bp == NULL || (type != CERT_TYPE && type != CERTREQ_TYPE &&
13131
0
                       type != TRUSTED_CERT_TYPE)) {
13132
0
        WOLFSSL_LEAVE("wolfSSL_PEM_read_bio_X509", BAD_FUNC_ARG);
13133
0
        return NULL;
13134
0
    }
13135
13136
0
    if ((l = wolfSSL_BIO_get_len(bp)) <= 0) {
13137
        /* No certificate size available - could be FIFO or other streaming
13138
         * source. Use MAX_X509_SIZE as initial buffer, will resize if needed. */
13139
0
        l = MAX_X509_SIZE;
13140
0
        streaming = 1;
13141
0
    }
13142
13143
0
    pemSz = (int)l;
13144
0
    pem   = (unsigned char*)XMALLOC(pemSz, 0, DYNAMIC_TYPE_PEM);
13145
0
    if (pem == NULL)
13146
0
        return NULL;
13147
0
    XMEMSET(pem, 0, pemSz);
13148
13149
0
    i = 0;
13150
0
    if (wc_PemGetHeaderFooter(type, NULL, &footer) != 0) {
13151
0
        XFREE(pem, 0, DYNAMIC_TYPE_PEM);
13152
0
        return NULL;
13153
0
    }
13154
0
    footerSz = (long)XSTRLEN(footer);
13155
13156
    /* For TRUSTED_CERT_TYPE, also prepare to check for regular CERT footer
13157
     * as the file might contain regular certificates instead of TRUSTED
13158
     * format */
13159
0
    if (type == TRUSTED_CERT_TYPE) {
13160
0
        wc_PemGetHeaderFooter(CERT_TYPE, NULL, &altFooter);
13161
0
        if (altFooter != NULL) {
13162
0
            altFooterSz = (long)XSTRLEN(altFooter);
13163
0
        }
13164
0
    }
13165
13166
    /* TODO: Inefficient
13167
     * reading in one byte at a time until see the footer
13168
     */
13169
0
    while ((l = wolfSSL_BIO_read(bp, (char *)&pem[i], 1)) == 1) {
13170
0
        int foundFooter = 0;
13171
0
        i++;
13172
        /* Check if buffer is full and we're reading from streaming source */
13173
0
        if (i >= pemSz && streaming) {
13174
            /* Double the buffer size for streaming sources */
13175
0
            int newSz = pemSz * 2;
13176
0
            unsigned char* newPem;
13177
13178
            /* Sanity check: don't grow beyond reasonable limit */
13179
0
            if (newSz > MAX_BIO_READ_BUFFER) {
13180
0
                WOLFSSL_MSG("PEM data too large for streaming source");
13181
0
                XFREE(pem, 0, DYNAMIC_TYPE_PEM);
13182
0
                return NULL;
13183
0
            }
13184
13185
0
            newPem = (unsigned char*)XREALLOC(pem, newSz, 0, DYNAMIC_TYPE_PEM);
13186
0
            if (newPem == NULL) {
13187
0
                WOLFSSL_MSG("Failed to resize PEM buffer");
13188
0
                XFREE(pem, 0, DYNAMIC_TYPE_PEM);
13189
0
                return NULL;
13190
0
            }
13191
13192
0
            pem = newPem;
13193
0
            pemSz = newSz;
13194
0
        }
13195
0
        else if (i > pemSz) {
13196
            /* Buffer full for non-streaming source - this shouldn't happen */
13197
0
            break;
13198
0
        }
13199
13200
        /* Check for the expected footer OR alternate footer (for
13201
         * TRUSTED_CERT_TYPE) */
13202
0
        if (i > footerSz &&
13203
0
            XMEMCMP((char *)&pem[i-footerSz], footer, footerSz) == 0) {
13204
0
            foundFooter = 1;
13205
0
        }
13206
0
        else if (i > altFooterSz && altFooter != NULL &&
13207
0
            XMEMCMP((char *)&pem[i-altFooterSz], altFooter, altFooterSz) == 0) {
13208
0
            foundFooter = 1;
13209
0
        }
13210
13211
0
        if (foundFooter) {
13212
0
            if (i < pemSz && wolfSSL_BIO_read(bp, (char *)&pem[i], 1) == 1) {
13213
                /* attempt to read newline following footer */
13214
0
                i++;
13215
0
                if (i < pemSz && pem[i-1] == '\r') {
13216
                    /* found \r , Windows line ending is \r\n so try to read one
13217
                     * more byte for \n, ignoring return value */
13218
0
                    (void)wolfSSL_BIO_read(bp, (char *)&pem[i++], 1);
13219
0
                }
13220
0
            }
13221
0
            break;
13222
0
        }
13223
0
    }
13224
0
    if (l == 0 && i == 0) {
13225
0
        WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
13226
0
    }
13227
0
    if (i > pemSz) {
13228
0
        WOLFSSL_MSG("Error parsing PEM");
13229
0
    }
13230
0
    else {
13231
0
        pemSz = (int)i;
13232
    #ifdef WOLFSSL_CERT_REQ
13233
        if (type == CERTREQ_TYPE)
13234
            x509 = loadX509orX509REQFromBuffer(pem, pemSz, WOLFSSL_FILETYPE_PEM,
13235
                CERTREQ_TYPE, cb, u);
13236
        else
13237
    #endif
13238
        /* Use TRUSTED_CERT_TYPE if input was TRUSTED CERTIFICATE format,
13239
         * otherwise use CERT_TYPE for regular certificates */
13240
0
        if (type == TRUSTED_CERT_TYPE)
13241
0
            x509 = loadX509orX509REQFromBuffer(pem, pemSz, WOLFSSL_FILETYPE_PEM,
13242
0
                TRUSTED_CERT_TYPE, cb, u);
13243
0
        else
13244
0
            x509 = loadX509orX509REQFromBuffer(pem, pemSz, WOLFSSL_FILETYPE_PEM,
13245
0
                CERT_TYPE, cb, u);
13246
0
    }
13247
13248
0
    if (x != NULL) {
13249
0
        *x = x509;
13250
0
    }
13251
13252
0
    XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13253
13254
0
#endif /* WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM */
13255
0
    (void)bp;
13256
0
    (void)x;
13257
0
    (void)cb;
13258
0
    (void)u;
13259
13260
0
    return x509;
13261
0
}
13262
13263
13264
WC_MAYBE_UNUSED
13265
static unsigned char* ReadPemFromBioToBuffer(WOLFSSL_BIO *bp, int *pemSz)
13266
0
{
13267
0
    unsigned char* pem = NULL;
13268
13269
0
    WOLFSSL_ENTER("ReadPemFromBioToBuffer");
13270
13271
0
    if (bp == NULL || pemSz == NULL) {
13272
0
        WOLFSSL_LEAVE("ReadPemFromBioToBuffer", BAD_FUNC_ARG);
13273
0
        return NULL;
13274
0
    }
13275
13276
0
    if ((*pemSz = wolfSSL_BIO_get_len(bp)) <= 0) {
13277
        /* No certificate size available - could be FIFO or other streaming
13278
         * source. Use MAX_X509_SIZE as initial buffer, read in loop. */
13279
0
        int totalRead = 0;
13280
0
        int readSz;
13281
13282
0
        *pemSz = MAX_X509_SIZE;
13283
0
        pem = (unsigned char*)XMALLOC(*pemSz, 0, DYNAMIC_TYPE_PEM);
13284
0
        if (pem == NULL) {
13285
0
            return NULL;
13286
0
        }
13287
13288
        /* Read from streaming source until EOF or buffer full */
13289
0
        while ((readSz = wolfSSL_BIO_read(bp, pem + totalRead,
13290
0
                                          *pemSz - totalRead)) > 0) {
13291
0
            totalRead += readSz;
13292
13293
            /* If buffer is full, try to grow it */
13294
0
            if (totalRead >= *pemSz) {
13295
0
                int newSz = *pemSz * 2;
13296
0
                unsigned char* newPem;
13297
13298
                /* Sanity check */
13299
0
                if (newSz > MAX_BIO_READ_BUFFER) {
13300
0
                    WOLFSSL_MSG("PEM data too large for streaming source");
13301
0
                    XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13302
0
                    return NULL;
13303
0
                }
13304
13305
0
                newPem = (unsigned char*)XREALLOC(pem, newSz, 0,
13306
0
                        DYNAMIC_TYPE_PEM);
13307
0
                if (newPem == NULL) {
13308
0
                    XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13309
0
                    return NULL;
13310
0
                }
13311
0
                pem = newPem;
13312
0
                *pemSz = newSz;
13313
0
            }
13314
0
        }
13315
13316
0
        *pemSz = totalRead;
13317
0
        if (*pemSz <= 0) {
13318
0
            XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13319
0
            return NULL;
13320
0
        }
13321
0
    }
13322
0
    else {
13323
        /* Known size - allocate and read */
13324
0
        pem = (unsigned char*)XMALLOC(*pemSz, 0, DYNAMIC_TYPE_PEM);
13325
0
        if (pem == NULL) {
13326
0
            return NULL;
13327
0
        }
13328
13329
0
        XMEMSET(pem, 0, *pemSz);
13330
13331
0
        *pemSz = wolfSSL_BIO_read(bp, pem, *pemSz);
13332
0
        if (*pemSz <= 0) {
13333
0
            XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13334
0
            return NULL;
13335
0
        }
13336
0
    }
13337
13338
0
    WOLFSSL_LEAVE("ReadPemFromBioToBuffer", 0);
13339
0
    return pem;
13340
0
}
13341
13342
13343
13344
#if defined(WOLFSSL_ACERT)
13345
    WOLFSSL_X509_ACERT *wolfSSL_PEM_read_bio_X509_ACERT(WOLFSSL_BIO *bp,
13346
                                                        WOLFSSL_X509_ACERT **x,
13347
                                                        wc_pem_password_cb *cb,
13348
                                                        void *u)
13349
0
    {
13350
0
        WOLFSSL_X509_ACERT* x509 = NULL;
13351
0
#if defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM)
13352
0
        unsigned char * pem = NULL;
13353
0
        int             pemSz;
13354
13355
0
        WOLFSSL_ENTER("wolfSSL_PEM_read_bio_X509_ACERT");
13356
13357
0
        if (bp == NULL) {
13358
0
            return NULL;
13359
0
        }
13360
13361
0
        pem = ReadPemFromBioToBuffer(bp, &pemSz);
13362
0
        if (pem == NULL) {
13363
0
            return NULL;
13364
0
        }
13365
13366
0
        x509 = wolfSSL_X509_ACERT_load_certificate_buffer(pem, pemSz,
13367
0
                                                          WOLFSSL_FILETYPE_PEM);
13368
13369
0
        if (x != NULL) {
13370
0
            *x = x509;
13371
0
        }
13372
13373
0
        XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13374
13375
0
#endif /* WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM */
13376
0
        (void)bp;
13377
0
        (void)x;
13378
0
        (void)cb;
13379
0
        (void)u;
13380
13381
0
        return x509;
13382
13383
0
    }
13384
#endif /* WOLFSSL_ACERT */
13385
13386
    WOLFSSL_X509 *wolfSSL_PEM_read_bio_X509(WOLFSSL_BIO *bp, WOLFSSL_X509 **x,
13387
                                            wc_pem_password_cb *cb, void *u)
13388
0
    {
13389
0
        return loadX509orX509REQFromPemBio(bp, x, cb, u, CERT_TYPE);
13390
0
    }
13391
13392
    /*
13393
     * bp : bio to read X509 from
13394
     * x  : x509 to write to
13395
     * cb : password call back for reading PEM
13396
     * u  : password
13397
     * _AUX is for working with a trusted X509 certificate
13398
     */
13399
    WOLFSSL_X509 *wolfSSL_PEM_read_bio_X509_AUX(WOLFSSL_BIO *bp,
13400
                               WOLFSSL_X509 **x, wc_pem_password_cb *cb,
13401
                               void *u)
13402
0
    {
13403
0
        WOLFSSL_ENTER("wolfSSL_PEM_read_bio_X509_AUX");
13404
13405
        /* AUX info is; trusted/rejected uses, friendly name, private key id,
13406
         * and potentially a stack of "other" info. wolfSSL does not store
13407
         * friendly name or private key id yet in WOLFSSL_X509 for human
13408
         * readability and does not support extra trusted/rejected uses for
13409
         * root CA. Use TRUSTED_CERT_TYPE to properly parse TRUSTED CERTIFICATE
13410
         * format and strip auxiliary data. */
13411
0
        return loadX509orX509REQFromPemBio(bp, x, cb, u, TRUSTED_CERT_TYPE);
13412
0
    }
13413
13414
#ifdef WOLFSSL_CERT_REQ
13415
WOLFSSL_X509 *wolfSSL_PEM_read_bio_X509_REQ(WOLFSSL_BIO *bp, WOLFSSL_X509 **x,
13416
                                                wc_pem_password_cb *cb, void *u)
13417
{
13418
    return loadX509orX509REQFromPemBio(bp, x, cb, u, CERTREQ_TYPE);
13419
}
13420
13421
#ifndef NO_FILESYSTEM
13422
    WOLFSSL_X509* wolfSSL_PEM_read_X509_REQ(XFILE fp, WOLFSSL_X509** x,
13423
                                            wc_pem_password_cb* cb, void* u)
13424
    {
13425
        int err = 0;
13426
        WOLFSSL_X509* ret = NULL;
13427
        WOLFSSL_BIO* bio = NULL;
13428
13429
        WOLFSSL_ENTER("wolfSSL_PEM_read_X509_REQ");
13430
13431
        if (fp == XBADFILE) {
13432
            WOLFSSL_MSG("Invalid file.");
13433
            err = 1;
13434
        }
13435
13436
        if (err == 0) {
13437
            bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file());
13438
            if (bio == NULL) {
13439
                WOLFSSL_MSG("Failed to create new BIO with input file.");
13440
                err = 1;
13441
            }
13442
        }
13443
        if (err == 0 && wolfSSL_BIO_set_fp(bio, fp, WOLFSSL_BIO_CLOSE)
13444
                != WOLFSSL_SUCCESS) {
13445
            WOLFSSL_MSG("Failed to set BIO file pointer.");
13446
            err = 1;
13447
        }
13448
        if (err == 0) {
13449
            ret = wolfSSL_PEM_read_bio_X509_REQ(bio, x, cb, u);
13450
        }
13451
13452
        wolfSSL_BIO_free(bio);
13453
13454
        return ret;
13455
    }
13456
#endif /* !NO_FILESYSTEM */
13457
#endif /* WOLFSSL_CERT_REQ */
13458
13459
    WOLFSSL_X509_CRL *wolfSSL_PEM_read_bio_X509_CRL(WOLFSSL_BIO *bp,
13460
            WOLFSSL_X509_CRL **x, wc_pem_password_cb *cb, void *u)
13461
0
    {
13462
#if defined(WOLFSSL_PEM_TO_DER) && defined(HAVE_CRL)
13463
        unsigned char* pem = NULL;
13464
        int pemSz = 0;
13465
        int derSz = 0;
13466
        DerBuffer* der = NULL;
13467
        WOLFSSL_X509_CRL* crl = NULL;
13468
13469
        WOLFSSL_ENTER("wolfSSL_PEM_read_bio_X509_CRL");
13470
13471
        if ((pem = ReadPemFromBioToBuffer(bp, &pemSz)) == NULL) {
13472
            goto err;
13473
        }
13474
13475
        if ((PemToDer(pem, pemSz, CRL_TYPE, &der, NULL, NULL, NULL)) < 0) {
13476
            goto err;
13477
        }
13478
        derSz = (int)der->length;
13479
        if ((crl = wolfSSL_d2i_X509_CRL(x, der->buffer, derSz)) == NULL) {
13480
            goto err;
13481
        }
13482
13483
err:
13484
        if (pemSz == 0) {
13485
            WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
13486
        }
13487
        XFREE(pem, 0, DYNAMIC_TYPE_PEM);
13488
        if (der != NULL) {
13489
            FreeDer(&der);
13490
        }
13491
13492
        (void)cb;
13493
        (void)u;
13494
13495
        return crl;
13496
#else
13497
0
        (void)bp;
13498
0
        (void)x;
13499
0
        (void)cb;
13500
0
        (void)u;
13501
13502
0
        return NULL;
13503
0
#endif
13504
0
    }
13505
13506
#endif /* !NO_BIO */
13507
13508
#if !defined(NO_FILESYSTEM)
13509
static void* wolfSSL_PEM_read_X509_ex(XFILE fp, void **x,
13510
    wc_pem_password_cb *cb, void *u, int type)
13511
0
{
13512
0
    unsigned char* pem = NULL;
13513
0
    int pemSz;
13514
0
    long i = 0, l;
13515
0
    void *newx509;
13516
0
    int derSz;
13517
0
    DerBuffer* der = NULL;
13518
13519
0
    WOLFSSL_ENTER("wolfSSL_PEM_read_X509");
13520
13521
0
    if (fp == XBADFILE) {
13522
0
        WOLFSSL_LEAVE("wolfSSL_PEM_read_X509", BAD_FUNC_ARG);
13523
0
        return NULL;
13524
0
    }
13525
    /* Read cert from file */
13526
0
    i = XFTELL(fp);
13527
0
    if (i < 0) {
13528
0
        WOLFSSL_LEAVE("wolfSSL_PEM_read_X509", BAD_FUNC_ARG);
13529
0
        return NULL;
13530
0
    }
13531
13532
0
    if (XFSEEK(fp, 0, XSEEK_END) != 0)
13533
0
        return NULL;
13534
0
    l = XFTELL(fp);
13535
0
    if (l < 0)
13536
0
        return NULL;
13537
0
    if (XFSEEK(fp, i, SEEK_SET) != 0)
13538
0
        return NULL;
13539
0
    pemSz = (int)(l - i);
13540
13541
    /* check calculated length */
13542
0
    if (pemSz > MAX_WOLFSSL_FILE_SIZE || pemSz <= 0) {
13543
0
        WOLFSSL_MSG("PEM_read_X509_ex file size error");
13544
0
        return NULL;
13545
0
    }
13546
13547
    /* allocate pem buffer */
13548
0
    pem = (unsigned char*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_PEM);
13549
0
    if (pem == NULL)
13550
0
        return NULL;
13551
13552
0
    if ((int)XFREAD((char *)pem, 1, (size_t)pemSz, fp) != pemSz)
13553
0
        goto err_exit;
13554
13555
0
    switch (type) {
13556
0
        case CERT_TYPE:
13557
0
            newx509 = (void *)wolfSSL_X509_load_certificate_buffer(pem,
13558
0
                pemSz, WOLFSSL_FILETYPE_PEM);
13559
0
            break;
13560
13561
    #ifdef HAVE_CRL
13562
        case CRL_TYPE:
13563
            if ((PemToDer(pem, pemSz, CRL_TYPE, &der, NULL, NULL, NULL)) < 0)
13564
                goto err_exit;
13565
            derSz = (int)der->length;
13566
            newx509 = (void*)wolfSSL_d2i_X509_CRL((WOLFSSL_X509_CRL **)x,
13567
                (const unsigned char *)der->buffer, derSz);
13568
            if (newx509 == NULL)
13569
                goto err_exit;
13570
            FreeDer(&der);
13571
            break;
13572
    #endif
13573
13574
0
        default:
13575
0
            goto err_exit;
13576
0
    }
13577
0
    if (x != NULL) {
13578
0
        *x = newx509;
13579
0
    }
13580
0
    XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13581
0
    return newx509;
13582
13583
0
err_exit:
13584
0
    XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13585
0
    if (der != NULL)
13586
0
        FreeDer(&der);
13587
13588
    /* unused */
13589
0
    (void)cb;
13590
0
    (void)u;
13591
0
    (void)derSz;
13592
13593
0
    return NULL;
13594
0
}
13595
13596
WOLFSSL_X509* wolfSSL_PEM_read_X509(XFILE fp, WOLFSSL_X509 **x,
13597
                                                wc_pem_password_cb *cb, void *u)
13598
0
{
13599
0
    return (WOLFSSL_X509* )wolfSSL_PEM_read_X509_ex(fp, (void **)x, cb, u,
13600
0
         CERT_TYPE);
13601
0
}
13602
13603
#if defined(HAVE_CRL)
13604
WOLFSSL_X509_CRL* wolfSSL_PEM_read_X509_CRL(XFILE fp,
13605
                        WOLFSSL_X509_CRL **crl, wc_pem_password_cb *cb, void *u)
13606
{
13607
    return (WOLFSSL_X509_CRL* )wolfSSL_PEM_read_X509_ex(fp, (void **)crl, cb, u,
13608
         CRL_TYPE);
13609
}
13610
13611
/* Store CRL to file in DER or PEM format.
13612
 * Returns WOLFSSL_SUCCESS on success, negative on failure.
13613
 */
13614
int wolfSSL_write_X509_CRL(WOLFSSL_X509_CRL* crl, const char* path, int type)
13615
{
13616
    int ret;
13617
    WOLFSSL_ENTER("wolfSSL_write_X509_CRL");
13618
    ret = StoreCRL(crl, path, type);
13619
    WOLFSSL_LEAVE("wolfSSL_write_X509_CRL", ret);
13620
    return ret;
13621
}
13622
#endif
13623
13624
#ifdef WOLFSSL_CERT_GEN
13625
#ifndef NO_BIO
13626
    int wolfSSL_PEM_write_X509(XFILE fp, WOLFSSL_X509* x)
13627
    {
13628
        int ret;
13629
        WOLFSSL_BIO* bio;
13630
13631
        if (x == NULL || fp == XBADFILE)
13632
            return 0;
13633
13634
        bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file());
13635
        if (bio == NULL)
13636
            return 0;
13637
13638
        if (wolfSSL_BIO_set_fp(bio, fp, WOLFSSL_BIO_NOCLOSE) != WOLFSSL_SUCCESS) {
13639
            wolfSSL_BIO_free(bio);
13640
            bio = NULL;
13641
        }
13642
13643
        ret = wolfSSL_PEM_write_bio_X509(bio, x);
13644
13645
        if (bio != NULL)
13646
            wolfSSL_BIO_free(bio);
13647
13648
        return ret;
13649
    }
13650
#endif /* !NO_BIO */
13651
#endif /* WOLFSSL_CERT_GEN */
13652
#endif /* !NO_FILESYSTEM */
13653
13654
#endif /* OPENSSL_EXTRA || OPENSSL_ALL */
13655
#ifdef OPENSSL_ALL
13656
13657
#ifndef NO_BIO
13658
    /* create and return a new WOLFSSL_X509_PKEY structure or NULL on failure */
13659
    static WOLFSSL_X509_PKEY* wolfSSL_X509_PKEY_new(void* heap)
13660
0
    {
13661
0
        WOLFSSL_X509_PKEY* ret;
13662
13663
0
        ret = (WOLFSSL_X509_PKEY*)XMALLOC(sizeof(WOLFSSL_X509_PKEY), heap,
13664
0
            DYNAMIC_TYPE_KEY);
13665
0
        if (ret != NULL) {
13666
0
            XMEMSET(ret, 0, sizeof(WOLFSSL_X509_PKEY));
13667
0
            ret->heap = heap;
13668
0
        }
13669
0
        return ret;
13670
0
    }
13671
#endif /* !NO_BIO */
13672
13673
13674
    /* free up all memory used by "xPkey" passed in */
13675
    static void wolfSSL_X509_PKEY_free(WOLFSSL_X509_PKEY* xPkey)
13676
0
    {
13677
0
        if (xPkey != NULL) {
13678
0
            wolfSSL_EVP_PKEY_free(xPkey->dec_pkey);
13679
0
            XFREE(xPkey, xPkey->heap, DYNAMIC_TYPE_KEY);
13680
0
        }
13681
0
    }
13682
13683
13684
#ifndef NO_BIO
13685
13686
#define PEM_COMPARE_HEADER(start, end, header) \
13687
0
        ((end) - (start) == XSTR_SIZEOF(header) && XMEMCMP(start, header, \
13688
0
                XSTR_SIZEOF(header)) == 0)
13689
13690
    /**
13691
     * This read one structure from bio and returns the read structure
13692
     * in the appropriate output parameter (x509, crl, x_pkey). The
13693
     * output parameters must be set to NULL.
13694
     * @param bio    Input for reading structures
13695
     * @param cb     Password callback
13696
     * @param x509   Output
13697
     * @param crl    Output
13698
     * @param x_pkey Output
13699
     * @return WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE otherwise
13700
     */
13701
    static int wolfSSL_PEM_X509_X509_CRL_X509_PKEY_read_bio(
13702
            WOLFSSL_BIO* bio, wc_pem_password_cb* cb, WOLFSSL_X509** x509,
13703
            WOLFSSL_X509_CRL** crl, WOLFSSL_X509_PKEY** x_pkey)
13704
0
    {
13705
13706
0
#if defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM)
13707
0
        char* pem = NULL;
13708
0
        long  i = pem_struct_min_sz, l;
13709
0
        const char* header = NULL;
13710
0
        const char* headerEnd = NULL;
13711
0
        const char* footer = NULL;
13712
0
        const char* footerEnd = NULL;
13713
    #ifdef HAVE_CRL
13714
        DerBuffer* der = NULL;
13715
    #endif
13716
0
        WOLFSSL_BIO* pemBio = NULL;
13717
13718
0
        if (!bio || !x509 || *x509 || !crl || *crl || !x_pkey || *x_pkey) {
13719
0
            WOLFSSL_MSG("Bad input parameter or output parameters "
13720
0
                        "not set to a NULL value.");
13721
0
            return WOLFSSL_FAILURE;
13722
0
        }
13723
13724
0
        l = wolfSSL_BIO_get_len(bio);
13725
13726
0
        if (l < 0) {
13727
0
            WOLFSSL_ERROR(BAD_FUNC_ARG);
13728
0
            return WOLFSSL_FAILURE;
13729
0
        }
13730
13731
0
        if (l <= pem_struct_min_sz) {
13732
            /* No certificate in buffer */
13733
0
            WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
13734
0
            return WOLFSSL_FAILURE;
13735
0
        }
13736
13737
0
        pem = (char*)XMALLOC(l, 0, DYNAMIC_TYPE_PEM);
13738
0
        if (pem == NULL)
13739
0
            return WOLFSSL_FAILURE;
13740
13741
0
        if (wolfSSL_BIO_read(bio, &pem[0], pem_struct_min_sz) !=
13742
0
                pem_struct_min_sz) {
13743
0
            WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
13744
0
            goto err;
13745
0
        }
13746
13747
        /* Read the header and footer */
13748
0
        while (i < l && wolfSSL_BIO_read(bio, &pem[i], 1) == 1) {
13749
0
            i++;
13750
0
            if (!header) {
13751
0
                header = XSTRNSTR(pem, "-----BEGIN ", (unsigned int)i);
13752
0
            }
13753
0
            else if (!headerEnd) {
13754
0
                headerEnd = XSTRNSTR(header + XSTR_SIZEOF("-----BEGIN "),
13755
0
                        "-----",
13756
0
                        (unsigned int)
13757
0
                        (i - (header + XSTR_SIZEOF("-----BEGIN ") - pem)));
13758
0
                if (headerEnd) {
13759
0
                    headerEnd += XSTR_SIZEOF("-----");
13760
                    /* Read in the newline */
13761
0
                    if (wolfSSL_BIO_read(bio, &pem[i], 1) != 1) {
13762
0
                        WOLFSSL_MSG("wolfSSL_BIO_read error");
13763
0
                        goto err;
13764
0
                    }
13765
0
                    i++;
13766
0
                    if (*headerEnd != '\n' && *headerEnd != '\r') {
13767
0
                        WOLFSSL_MSG("Missing newline after header");
13768
0
                        goto err;
13769
0
                    }
13770
0
                }
13771
0
            }
13772
0
            else if (!footer) {
13773
0
                footer = XSTRNSTR(headerEnd, "-----END ",
13774
0
                        (unsigned int)(i - (headerEnd - pem)));
13775
0
            }
13776
0
            else if (!footerEnd) {
13777
0
                footerEnd = XSTRNSTR(footer + XSTR_SIZEOF("-----"),
13778
0
                        "-----", (unsigned int)(i -
13779
0
                            (footer + XSTR_SIZEOF("-----") - pem)));
13780
0
                if (footerEnd) {
13781
0
                    footerEnd += XSTR_SIZEOF("-----");
13782
                    /* Now check that footer matches header */
13783
0
                    if ((headerEnd - (header + XSTR_SIZEOF("-----BEGIN "))) ==
13784
0
                        (footerEnd - (footer + XSTR_SIZEOF("-----END "))) &&
13785
0
                        XMEMCMP(header + XSTR_SIZEOF("-----BEGIN "),
13786
0
                                footer + XSTR_SIZEOF("-----END "),
13787
0
                        headerEnd - (header + XSTR_SIZEOF("-----BEGIN ")))
13788
0
                            != 0) {
13789
0
                        WOLFSSL_MSG("Header and footer don't match");
13790
0
                        goto err;
13791
0
                    }
13792
                    /* header and footer match */
13793
0
                    break;
13794
0
                }
13795
0
            }
13796
0
        }
13797
0
        if (!footerEnd) {
13798
            /* Only check footerEnd since it is set last */
13799
0
            WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
13800
0
            goto err;
13801
0
        }
13802
0
        else {
13803
0
            if (PEM_COMPARE_HEADER(header, headerEnd,
13804
0
                    "-----BEGIN CERTIFICATE-----")) {
13805
                /* We have a certificate */
13806
0
                WOLFSSL_MSG("Parsing x509 cert");
13807
0
                *x509 = wolfSSL_X509_load_certificate_buffer(
13808
0
                        (const unsigned char*) header,
13809
0
                        (int)(footerEnd - header), WOLFSSL_FILETYPE_PEM);
13810
0
                if (!*x509) {
13811
0
                    WOLFSSL_MSG("wolfSSL_X509_load_certificate_buffer error");
13812
0
                    goto err;
13813
0
                }
13814
0
            }
13815
    #ifdef HAVE_CRL
13816
            else if (PEM_COMPARE_HEADER(header, headerEnd,
13817
                        "-----BEGIN X509 CRL-----")) {
13818
                /* We have a crl */
13819
                WOLFSSL_MSG("Parsing crl");
13820
                if ((PemToDer((const unsigned char*) header,
13821
                        (long)(footerEnd - header), CRL_TYPE, &der, NULL, NULL,
13822
                        NULL)) < 0) {
13823
                    WOLFSSL_MSG("PemToDer error");
13824
                    goto err;
13825
                }
13826
                *crl = wolfSSL_d2i_X509_CRL(NULL, der->buffer, der->length);
13827
                if (!*crl) {
13828
                    WOLFSSL_MSG("wolfSSL_d2i_X509_CRL error");
13829
                    goto err;
13830
                }
13831
            }
13832
    #endif
13833
0
            else {
13834
0
                WOLFSSL_MSG("Parsing x509 key");
13835
13836
0
                if (!(*x_pkey = wolfSSL_X509_PKEY_new(NULL))) {
13837
0
                    WOLFSSL_MSG("wolfSSL_X509_PKEY_new error");
13838
0
                    goto err;
13839
0
                }
13840
13841
0
                if (!(pemBio = wolfSSL_BIO_new(wolfSSL_BIO_s_mem()))) {
13842
0
                    WOLFSSL_MSG("wolfSSL_BIO_new error");
13843
0
                    goto err;
13844
0
                }
13845
13846
0
                if (wolfSSL_BIO_write(pemBio, header,
13847
0
                        (int)(footerEnd - header)) != footerEnd - header) {
13848
0
                    WOLFSSL_MSG("wolfSSL_BIO_new error");
13849
0
                    goto err;
13850
0
                }
13851
13852
0
                if (wolfSSL_PEM_read_bio_PrivateKey(pemBio,
13853
0
                        &(*x_pkey)->dec_pkey, cb, NULL) == NULL) {
13854
0
                    WOLFSSL_MSG("wolfSSL_PEM_read_bio_PrivateKey error");
13855
0
                    goto err;
13856
0
                }
13857
13858
0
                wolfSSL_BIO_free(pemBio);
13859
0
            }
13860
0
        }
13861
13862
0
        XFREE(pem, 0, DYNAMIC_TYPE_PEM);
13863
    #ifdef HAVE_CRL
13864
        if (der)
13865
            FreeDer(&der);
13866
    #endif
13867
0
        return WOLFSSL_SUCCESS;
13868
0
err:
13869
0
        XFREE(pem, 0, DYNAMIC_TYPE_PEM);
13870
    #ifdef HAVE_CRL
13871
        if (der)
13872
            FreeDer(&der);
13873
    #endif
13874
0
        if (*x_pkey) {
13875
0
            wolfSSL_X509_PKEY_free(*x_pkey);
13876
0
            *x_pkey = NULL;
13877
0
        }
13878
0
        if (pemBio)
13879
0
            wolfSSL_BIO_free(pemBio);
13880
0
        return WOLFSSL_FAILURE;
13881
#else /* ! (WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM) */
13882
        return WOLFSSL_FAILURE;
13883
#endif /* WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM */
13884
0
    }
13885
13886
#ifndef NO_FILESYSTEM
13887
    WOLF_STACK_OF(WOLFSSL_X509_INFO)* wolfSSL_PEM_X509_INFO_read(
13888
            XFILE fp, WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
13889
            pem_password_cb* cb, void* u)
13890
0
    {
13891
0
        WOLFSSL_BIO* fileBio = wolfSSL_BIO_new_fp(fp, WOLFSSL_BIO_NOCLOSE);
13892
0
        WOLF_STACK_OF(WOLFSSL_X509_INFO)* ret = NULL;
13893
13894
0
        WOLFSSL_ENTER("wolfSSL_PEM_X509_INFO_read");
13895
0
        if (fileBio != NULL) {
13896
0
            ret = wolfSSL_PEM_X509_INFO_read_bio(fileBio, sk, cb, u);
13897
0
            wolfSSL_BIO_free(fileBio);
13898
0
        }
13899
0
        return ret;
13900
0
    }
13901
#endif /* !NO_FILESYSTEM */
13902
13903
    /*
13904
     * bio WOLFSSL_BIO to read certificates from
13905
     * sk  possible stack to push more X509_INFO structs to. Can be NULL
13906
     * cb  callback password for encrypted PEM certificates
13907
     * u   user input such as password
13908
     *
13909
     * returns stack on success and NULL or default stack passed in on fail
13910
     */
13911
    WOLF_STACK_OF(WOLFSSL_X509_INFO)* wolfSSL_PEM_X509_INFO_read_bio(
13912
        WOLFSSL_BIO* bio, WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
13913
        wc_pem_password_cb* cb, void* u)
13914
0
    {
13915
0
        WOLF_STACK_OF(WOLFSSL_X509_INFO)* localSk = NULL;
13916
0
        int ret = WOLFSSL_SUCCESS;
13917
0
        WOLFSSL_X509_INFO* current = NULL;
13918
0
        WOLFSSL_X509*      x509 = NULL;
13919
0
        WOLFSSL_X509_CRL*  crl  = NULL;
13920
0
        WOLFSSL_X509_PKEY* x_pkey = NULL;
13921
13922
0
        (void)u;
13923
13924
0
        WOLFSSL_ENTER("wolfSSL_PEM_X509_INFO_read_bio");
13925
13926
        /* attempt to use passed in stack or create a new one */
13927
0
        if (sk != NULL) {
13928
0
            localSk = sk;
13929
0
        }
13930
0
        else {
13931
0
            localSk = wolfSSL_sk_X509_INFO_new_null();
13932
0
        }
13933
0
        if (localSk == NULL) {
13934
0
            WOLFSSL_LEAVE("wolfSSL_PEM_X509_INFO_read_bio",
13935
0
                    MEMORY_E);
13936
0
            return NULL;
13937
0
        }
13938
13939
        /* parse through BIO and push new info's found onto stack */
13940
0
        while (1) {
13941
0
            x509 = NULL;
13942
0
            crl  = NULL;
13943
0
            x_pkey = NULL;
13944
13945
0
            if (wolfSSL_PEM_X509_X509_CRL_X509_PKEY_read_bio(bio, cb,
13946
0
                    &x509, &crl, &x_pkey) == WOLFSSL_SUCCESS) {
13947
0
                if (current == NULL ||
13948
0
                        (x509 && current->x509) ||
13949
0
                        (crl && current->crl) ||
13950
0
                        (x_pkey && current->x_pkey)) {
13951
                    /* Need to create new current since existing one already
13952
                     * has the member filled or this is the first successful
13953
                     * read. */
13954
0
                    current = wolfSSL_X509_INFO_new();
13955
0
                    if (current == NULL) {
13956
0
                        ret = MEMORY_E;
13957
0
                        break;
13958
0
                    }
13959
0
                    if (wolfSSL_sk_X509_INFO_push(localSk, current) <= 0) {
13960
0
                        wolfSSL_X509_INFO_free(current);
13961
0
                        current = NULL;
13962
0
                        ret = WOLFSSL_FAILURE;
13963
0
                        break;
13964
0
                    }
13965
0
                }
13966
13967
0
                if (x509) {
13968
0
                    current->x509 = x509;
13969
0
                }
13970
0
                else if (crl) {
13971
0
                    current->crl = crl;
13972
0
                }
13973
0
                else if (x_pkey) {
13974
0
                    current->x_pkey = x_pkey;
13975
0
                }
13976
0
                else {
13977
0
                    WOLFSSL_MSG("No output parameters set");
13978
0
                    ret = WOLFSSL_FAILURE;
13979
0
                    break;
13980
0
                }
13981
0
            }
13982
0
            else {
13983
0
#ifdef WOLFSSL_HAVE_ERROR_QUEUE
13984
0
                unsigned long err;
13985
0
                CLEAR_ASN_NO_PEM_HEADER_ERROR(err);
13986
0
                if (ERR_GET_LIB(err) != ERR_LIB_PEM ||
13987
0
                    ERR_GET_REASON(err) != PEM_R_NO_START_LINE) {
13988
0
                    ret = WOLFSSL_FAILURE;
13989
0
                }
13990
#else
13991
                if (wolfSSL_sk_X509_INFO_num(localSk) > 0) {
13992
                    WOLFSSL_MSG("At least one X509_INFO object on stack."
13993
                                "Assuming error means EOF or no more PEM"
13994
                                "headers found.");
13995
                }
13996
                else {
13997
                    ret = WOLFSSL_FAILURE;
13998
                }
13999
#endif
14000
0
                break;
14001
0
            }
14002
0
        }
14003
0
        if (ret != WOLFSSL_SUCCESS ||
14004
0
                wolfSSL_sk_X509_INFO_num(localSk) == 0) {
14005
            /* current should always be pushed onto the localsk stack at this
14006
             * point. The only case when it isn't is when
14007
             * wolfSSL_sk_X509_INFO_push fails but in that case the current
14008
             * free is handled inside the loop. */
14009
0
            if (localSk != sk) {
14010
0
                wolfSSL_sk_pop_free(localSk, NULL);
14011
0
            }
14012
0
            wolfSSL_X509_free(x509);
14013
#ifdef HAVE_CRL
14014
            wolfSSL_X509_CRL_free(crl);
14015
#endif
14016
0
            wolfSSL_X509_PKEY_free(x_pkey);
14017
0
            localSk = NULL;
14018
0
        }
14019
0
        WOLFSSL_LEAVE("wolfSSL_PEM_X509_INFO_read_bio", ret);
14020
0
        return localSk;
14021
0
    }
14022
#endif /* !NO_BIO */
14023
#endif /* OPENSSL_ALL */
14024
14025
    void wolfSSL_X509_NAME_ENTRY_free(WOLFSSL_X509_NAME_ENTRY* ne)
14026
36.0k
    {
14027
36.0k
        WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_free");
14028
36.0k
        if (ne != NULL) {
14029
36.0k
            wolfSSL_ASN1_OBJECT_free(ne->object);
14030
36.0k
            if (ne->value != NULL) {
14031
36.0k
                wolfSSL_ASN1_STRING_free(ne->value);
14032
36.0k
            }
14033
36.0k
            XFREE(ne, NULL, DYNAMIC_TYPE_NAME_ENTRY);
14034
36.0k
        }
14035
36.0k
    }
14036
14037
14038
    WOLFSSL_X509_NAME_ENTRY* wolfSSL_X509_NAME_ENTRY_new(void)
14039
36.0k
    {
14040
36.0k
        WOLFSSL_X509_NAME_ENTRY* ne;
14041
14042
36.0k
        ne = (WOLFSSL_X509_NAME_ENTRY*)XMALLOC(sizeof(WOLFSSL_X509_NAME_ENTRY),
14043
36.0k
                NULL, DYNAMIC_TYPE_NAME_ENTRY);
14044
36.0k
        if (ne != NULL) {
14045
36.0k
            XMEMSET(ne, 0, sizeof(WOLFSSL_X509_NAME_ENTRY));
14046
36.0k
        }
14047
14048
36.0k
        return ne;
14049
36.0k
    }
14050
14051
14052
    static void wolfssl_x509_name_entry_set(WOLFSSL_X509_NAME_ENTRY* ne,
14053
        int nid, int type, const unsigned char *data, int dataSz)
14054
76.3k
    {
14055
76.3k
        ne->nid = nid;
14056
        /* Reuse the object if already available. */
14057
76.3k
        ne->object = wolfSSL_OBJ_nid2obj_ex(nid, ne->object);
14058
76.3k
        if (ne->value == NULL) {
14059
76.3k
            ne->value = wolfSSL_ASN1_STRING_type_new(type);
14060
76.3k
        }
14061
76.3k
        if (ne->value != NULL) {
14062
76.3k
            if (wolfSSL_ASN1_STRING_set(ne->value, (const void*)data,
14063
76.3k
                                            dataSz) == WOLFSSL_SUCCESS) {
14064
76.3k
                ne->set = 1;
14065
76.3k
            }
14066
0
            else {
14067
                /* Free the ASN1_STRING if it is not set. */
14068
0
                wolfSSL_ASN1_STRING_free(ne->value);
14069
0
                ne->value = NULL;
14070
0
            }
14071
76.3k
        }
14072
76.3k
    }
14073
14074
    /* Create a new WOLFSSL_X509_NAME_ENTRY structure based on the text passed
14075
     * in. Returns NULL on failure */
14076
    WOLFSSL_X509_NAME_ENTRY* wolfSSL_X509_NAME_ENTRY_create_by_txt(
14077
            WOLFSSL_X509_NAME_ENTRY **neIn, const char *txt, int type,
14078
            const unsigned char *data, int dataSz)
14079
0
    {
14080
0
        int nid = -1;
14081
0
        WOLFSSL_X509_NAME_ENTRY* ne = NULL;
14082
14083
0
        WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_create_by_txt");
14084
14085
0
        if (txt == NULL) {
14086
0
            return NULL;
14087
0
        }
14088
14089
0
        if (neIn != NULL) {
14090
0
            ne = *neIn;
14091
0
        }
14092
14093
0
        nid = wolfSSL_OBJ_txt2nid(txt);
14094
0
        if (nid == WC_NID_undef) {
14095
0
            WOLFSSL_MSG("Unable to find text");
14096
0
            ne = NULL;
14097
0
        }
14098
0
        else {
14099
0
            if (ne == NULL) {
14100
0
                ne = wolfSSL_X509_NAME_ENTRY_new();
14101
0
                if (ne == NULL) {
14102
0
                    return NULL;
14103
0
                }
14104
0
            }
14105
14106
0
            wolfssl_x509_name_entry_set(ne, nid, type, data, dataSz);
14107
0
        }
14108
14109
0
        return ne;
14110
0
    }
14111
14112
14113
    /* Creates a new entry given the NID, type, and data
14114
     * "dataSz" is number of bytes in data, if set to -1 then XSTRLEN is used
14115
     * "out" can be used to store the new entry data in an existing structure
14116
     *       if NULL then a new WOLFSSL_X509_NAME_ENTRY structure is created
14117
     * returns a pointer to WOLFSSL_X509_NAME_ENTRY on success and NULL on fail
14118
     */
14119
    WOLFSSL_X509_NAME_ENTRY* wolfSSL_X509_NAME_ENTRY_create_by_NID(
14120
            WOLFSSL_X509_NAME_ENTRY** out, int nid, int type,
14121
            const unsigned char* data, int dataSz)
14122
76.3k
    {
14123
76.3k
        WOLFSSL_X509_NAME_ENTRY* ne;
14124
14125
#ifdef WOLFSSL_DEBUG_OPENSSL
14126
        WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_create_by_NID");
14127
#endif
14128
14129
76.3k
        if (!data) {
14130
0
            WOLFSSL_MSG("Bad parameter");
14131
0
            return NULL;
14132
0
        }
14133
14134
76.3k
        if (out == NULL || *out == NULL) {
14135
36.0k
            ne = wolfSSL_X509_NAME_ENTRY_new();
14136
36.0k
            if (ne == NULL) {
14137
0
                return NULL;
14138
0
            }
14139
36.0k
            if (out != NULL) {
14140
0
                *out = ne;
14141
0
            }
14142
36.0k
        }
14143
40.2k
        else {
14144
40.2k
            ne = *out;
14145
40.2k
        }
14146
14147
76.3k
        wolfssl_x509_name_entry_set(ne, nid, type, data, dataSz);
14148
14149
76.3k
        return ne;
14150
76.3k
    }
14151
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
14152
14153
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL) || \
14154
    defined(HAVE_LIGHTY) || defined(WOLFSSL_MYSQL_COMPATIBLE) || \
14155
    defined(HAVE_STUNNEL) || defined(WOLFSSL_NGINX) || \
14156
    defined(HAVE_POCO_LIB) || defined(WOLFSSL_HAPROXY)
14157
WOLFSSL_ASN1_OBJECT* wolfSSL_X509_NAME_ENTRY_get_object(
14158
    WOLFSSL_X509_NAME_ENTRY *ne)
14159
217k
{
14160
217k
    WOLFSSL_ASN1_OBJECT* object = NULL;
14161
14162
#ifdef WOLFSSL_DEBUG_OPENSSL
14163
    WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_get_object");
14164
#endif
14165
14166
217k
    if (ne != NULL) {
14167
        /* Create object from nid - reuse existing object if possible. */
14168
217k
        object = wolfSSL_OBJ_nid2obj_ex(ne->nid, ne->object);
14169
217k
        if (object != NULL) {
14170
            /* Set the object when no error. */
14171
217k
            ne->object = object;
14172
217k
        }
14173
217k
    }
14174
14175
217k
    return object;
14176
217k
}
14177
#endif /* OPENSSL_ALL || HAVE_LIGHTY || WOLFSSL_MYSQL_COMPATIBLE ||
14178
        * HAVE_STUNNEL || WOLFSSL_NGINX || HAVE_POCO_LIB || WOLFSSL_HAPROXY */
14179
14180
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
14181
    /* add all entry of type "nid" to the buffer "fullName" and advance "idx"
14182
     * since number of entries is small, a brute force search is used here
14183
     * returns the number of entries added
14184
     */
14185
    static int AddAllEntry(WOLFSSL_X509_NAME* name, char* fullName,
14186
            int fullNameSz, int* idx)
14187
40.2k
    {
14188
40.2k
        int i;
14189
40.2k
        int ret = 0;
14190
14191
685k
        for (i = 0; i < MAX_NAME_ENTRIES; i++) {
14192
644k
            if (name->entry[i].set) {
14193
108k
                WOLFSSL_X509_NAME_ENTRY* e;
14194
108k
                WOLFSSL_ASN1_OBJECT* obj;
14195
14196
108k
                int sz;
14197
108k
                unsigned char* data;
14198
14199
108k
                e = &name->entry[i];
14200
108k
                obj = wolfSSL_X509_NAME_ENTRY_get_object(e);
14201
108k
                if (obj == NULL) {
14202
0
                    return BAD_FUNC_ARG;
14203
0
                }
14204
14205
108k
                XMEMCPY(fullName + *idx, "/", 1); *idx = *idx + 1;
14206
108k
                sz = (int)XSTRLEN(obj->sName);
14207
108k
                XMEMCPY(fullName + *idx, obj->sName, sz);
14208
108k
                *idx += sz;
14209
108k
                XMEMCPY(fullName + *idx, "=", 1); *idx = *idx + 1;
14210
14211
108k
                data = wolfSSL_ASN1_STRING_data(e->value);
14212
108k
                if (data != NULL) {
14213
108k
                    sz = (int)XSTRLEN((const char*)data);
14214
108k
                    XMEMCPY(fullName + *idx, data, sz);
14215
108k
                    *idx += sz;
14216
108k
                }
14217
14218
108k
                ret++;
14219
108k
            }
14220
644k
        }
14221
40.2k
        (void)fullNameSz;
14222
40.2k
        return ret;
14223
40.2k
    }
14224
14225
14226
    /* Converts a list of entries in WOLFSSL_X509_NAME struct into a string
14227
     * returns 0 on success */
14228
    static int RebuildFullName(WOLFSSL_X509_NAME* name)
14229
40.2k
    {
14230
40.2k
        int totalLen = 0, i, idx, entryCount = 0;
14231
14232
40.2k
        if (name == NULL)
14233
0
            return BAD_FUNC_ARG;
14234
14235
685k
        for (i = 0; i < MAX_NAME_ENTRIES; i++) {
14236
644k
            if (name->entry[i].set) {
14237
108k
                WOLFSSL_X509_NAME_ENTRY* e;
14238
108k
                WOLFSSL_ASN1_OBJECT* obj;
14239
14240
108k
                e = &name->entry[i];
14241
108k
                obj = wolfSSL_X509_NAME_ENTRY_get_object(e);
14242
108k
                if (obj == NULL)
14243
0
                    return BAD_FUNC_ARG;
14244
14245
108k
                totalLen += (int)XSTRLEN(obj->sName) + 2;/*+2 for '/' and '=' */
14246
108k
                totalLen += wolfSSL_ASN1_STRING_length(e->value);
14247
108k
            }
14248
644k
        }
14249
14250
40.2k
        if (name->dynamicName) {
14251
712
            XFREE(name->name, name->heap, DYNAMIC_TYPE_X509);
14252
712
            name->name = name->staticName;
14253
712
            name->dynamicName = 0;
14254
712
        }
14255
14256
40.2k
        if (totalLen >= ASN_NAME_MAX) {
14257
949
            name->name = (char*)XMALLOC(totalLen + 1, name->heap,
14258
949
                    DYNAMIC_TYPE_X509);
14259
949
            if (name->name == NULL)
14260
0
                return MEMORY_E;
14261
949
            name->dynamicName = 1;
14262
949
        }
14263
14264
40.2k
        idx = 0;
14265
40.2k
        entryCount = AddAllEntry(name, name->name, totalLen, &idx);
14266
40.2k
        if (entryCount < 0)
14267
0
            return entryCount;
14268
14269
40.2k
        name->name[idx] = '\0';
14270
40.2k
        name->sz = idx + 1; /* size includes null terminator */
14271
40.2k
        name->entrySz = entryCount;
14272
14273
40.2k
        return 0;
14274
40.2k
    }
14275
14276
    /* Copies entry into name. With it being copied freeing entry becomes the
14277
     * callers responsibility.
14278
     * returns 1 for success and 0 for error */
14279
    int wolfSSL_X509_NAME_add_entry(WOLFSSL_X509_NAME* name,
14280
            WOLFSSL_X509_NAME_ENTRY* entry, int idx, int set)
14281
40.3k
    {
14282
40.3k
        WOLFSSL_X509_NAME_ENTRY* current = NULL;
14283
40.3k
        int ret, i;
14284
14285
#ifdef WOLFSSL_DEBUG_OPENSSL
14286
        WOLFSSL_ENTER("wolfSSL_X509_NAME_add_entry");
14287
#endif
14288
14289
40.3k
        if (name == NULL || entry == NULL || entry->value == NULL) {
14290
0
            WOLFSSL_MSG("NULL argument passed in");
14291
0
            return WOLFSSL_FAILURE;
14292
0
        }
14293
14294
40.3k
        if (idx >= 0) {
14295
            /* place in specific index */
14296
14297
4.36k
            if (idx >= MAX_NAME_ENTRIES) {
14298
0
                WOLFSSL_MSG("Error index to insert entry is larger than array");
14299
0
                return WOLFSSL_FAILURE;
14300
0
            }
14301
4.36k
            i = idx;
14302
4.36k
        }
14303
36.0k
        else {
14304
            /* iterate through and find first open spot */
14305
100k
            for (i = 0; i < MAX_NAME_ENTRIES; i++) {
14306
100k
                if (name->entry[i].set == 0) { /* not set so overwritten */
14307
35.9k
                    WOLFSSL_MSG("Found place for name entry");
14308
35.9k
                    break;
14309
35.9k
                }
14310
100k
            }
14311
14312
36.0k
            if (i == MAX_NAME_ENTRIES) {
14313
80
                WOLFSSL_MSG("No spot found for name entry");
14314
80
                return WOLFSSL_FAILURE;
14315
80
            }
14316
36.0k
        }
14317
14318
40.2k
        current = &name->entry[i];
14319
40.2k
        if (current->set == 0)
14320
40.2k
            name->entrySz++;
14321
14322
40.2k
        if (wolfSSL_X509_NAME_ENTRY_create_by_NID(&current,
14323
40.2k
                            entry->nid,
14324
40.2k
                            wolfSSL_ASN1_STRING_type(entry->value),
14325
40.2k
                            wolfSSL_ASN1_STRING_data(entry->value),
14326
40.2k
                            wolfSSL_ASN1_STRING_length(entry->value)) != NULL)
14327
40.2k
        {
14328
40.2k
            ret = WOLFSSL_SUCCESS;
14329
40.2k
        #ifdef OPENSSL_ALL
14330
40.2k
            if (name->entries == NULL) {
14331
18.1k
                name->entries = wolfSSL_sk_X509_NAME_new(NULL);
14332
18.1k
            }
14333
40.2k
            if (wolfSSL_sk_X509_NAME_ENTRY_push(name->entries, current) <= 0) {
14334
0
                ret = WOLFSSL_FAILURE;
14335
0
            }
14336
40.2k
        #endif
14337
40.2k
        }
14338
0
        else {
14339
0
            ret = WOLFSSL_FAILURE;
14340
0
        }
14341
14342
40.2k
        if (ret != WOLFSSL_SUCCESS) {
14343
0
            WOLFSSL_MSG("Error adding the name entry");
14344
0
            if (current->set == 0)
14345
0
                name->entrySz--;
14346
0
            return WOLFSSL_FAILURE;
14347
0
        }
14348
14349
#ifdef WOLFSSL_PYTHON
14350
        /* Set name index for OpenSSL stack index position and so Python can
14351
         * generate tuples/sets from the list. */
14352
        for (i = 0; i < MAX_NAME_ENTRIES; i++) {
14353
            if (name->entry[i].set != 0)
14354
                name->entry[i].set = i + 1;
14355
        }
14356
#endif
14357
14358
40.2k
        if (RebuildFullName(name) != 0)
14359
0
            return WOLFSSL_FAILURE;
14360
14361
40.2k
        (void)set;
14362
40.2k
        return WOLFSSL_SUCCESS;
14363
40.2k
    }
14364
14365
    int wolfSSL_X509_NAME_add_entry_by_txt(WOLFSSL_X509_NAME *name,
14366
                                           const char *field, int type,
14367
                                           const unsigned char *bytes, int len,
14368
                                           int loc, int set)
14369
0
    {
14370
0
        int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
14371
0
        int nid;
14372
0
        WOLFSSL_X509_NAME_ENTRY* entry;
14373
14374
0
        (void)type;
14375
0
        WOLFSSL_ENTER("wolfSSL_X509_NAME_add_entry_by_txt");
14376
14377
0
        if (name == NULL || field == NULL)
14378
0
            return WOLFSSL_FAILURE;
14379
14380
0
        if ((nid = wolfSSL_OBJ_txt2nid(field)) == WC_NID_undef) {
14381
0
            WOLFSSL_MSG("Unable convert text to NID");
14382
0
            return WOLFSSL_FAILURE;
14383
0
        }
14384
14385
0
        entry = wolfSSL_X509_NAME_ENTRY_create_by_NID(NULL,
14386
0
                  nid, type, (unsigned char*)bytes, len);
14387
0
        if (entry == NULL)
14388
0
            return WOLFSSL_FAILURE;
14389
14390
0
        ret = wolfSSL_X509_NAME_add_entry(name, entry, loc, set);
14391
0
        wolfSSL_X509_NAME_ENTRY_free(entry);
14392
14393
0
        return ret;
14394
0
    }
14395
14396
    int wolfSSL_X509_NAME_add_entry_by_NID(WOLFSSL_X509_NAME *name, int nid,
14397
                                           int type, const unsigned char *bytes,
14398
                                           int len, int loc, int set)
14399
36.0k
    {
14400
36.0k
        int ret;
14401
36.0k
        WOLFSSL_X509_NAME_ENTRY* entry;
14402
36.0k
        WOLFSSL_ENTER("wolfSSL_X509_NAME_add_entry_by_NID");
14403
36.0k
        entry = wolfSSL_X509_NAME_ENTRY_create_by_NID(NULL, nid, type, bytes,
14404
36.0k
                len);
14405
36.0k
        if (entry == NULL)
14406
0
            return WOLFSSL_FAILURE;
14407
36.0k
        ret = wolfSSL_X509_NAME_add_entry(name, entry, loc, set);
14408
36.0k
        wolfSSL_X509_NAME_ENTRY_free(entry);
14409
36.0k
        return ret;
14410
36.0k
    }
14411
14412
    WOLFSSL_X509_NAME_ENTRY *wolfSSL_X509_NAME_delete_entry(
14413
            WOLFSSL_X509_NAME *name, int loc)
14414
0
    {
14415
0
        WOLFSSL_X509_NAME_ENTRY* ret;
14416
0
        WOLFSSL_ENTER("wolfSSL_X509_NAME_delete_entry");
14417
14418
0
        if (!name) {
14419
0
            WOLFSSL_MSG("Bad parameter");
14420
0
            return NULL;
14421
0
        }
14422
14423
0
        ret = wolfSSL_X509_NAME_get_entry(name, loc);
14424
0
        if (!ret) {
14425
0
            WOLFSSL_MSG("loc entry not found");
14426
0
            return NULL;
14427
0
        }
14428
0
        name->entry[loc].set = 0;
14429
#ifdef WOLFSSL_PYTHON
14430
        {
14431
            int i;
14432
            /* Set name index for OpenSSL stack index position and so Python can
14433
            * generate tuples/sets from the list. */
14434
            for (i = 0; i < MAX_NAME_ENTRIES; i++) {
14435
                if (name->entry[i].set != 0)
14436
                    name->entry[i].set = i + 1;
14437
            }
14438
        }
14439
#endif
14440
0
        return ret;
14441
0
    }
14442
14443
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
14444
14445
#if defined(OPENSSL_EXTRA) && !defined(NO_ASN)
14446
    int wolfSSL_X509_NAME_get_index_by_OBJ(WOLFSSL_X509_NAME *name,
14447
                                           const WOLFSSL_ASN1_OBJECT *obj,
14448
0
                                           int idx) {
14449
0
        if (!name || idx >= MAX_NAME_ENTRIES ||
14450
0
                !obj || !obj->obj) {
14451
0
            return WOLFSSL_FATAL_ERROR;
14452
0
        }
14453
14454
0
        if (idx < 0) {
14455
0
            idx = -1;
14456
0
        }
14457
14458
0
        for (idx++; idx < MAX_NAME_ENTRIES; idx++) {
14459
            /* Find index of desired name */
14460
0
            if (name->entry[idx].set) {
14461
0
                if (XSTRLEN(obj->sName) ==
14462
0
                        XSTRLEN(name->entry[idx].object->sName) &&
14463
0
                    XSTRNCMP((const char*) obj->sName,
14464
0
                        name->entry[idx].object->sName, obj->objSz - 1) == 0) {
14465
0
                    return idx;
14466
0
                }
14467
0
            }
14468
0
        }
14469
0
        return WOLFSSL_FATAL_ERROR;
14470
0
    }
14471
#endif
14472
14473
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
14474
    defined(OPENSSL_EXTRA_X509_SMALL)
14475
14476
#ifdef OPENSSL_EXTRA
14477
    int wolfSSL_X509_NAME_ENTRY_set(const WOLFSSL_X509_NAME_ENTRY *ne)
14478
0
    {
14479
0
        if (ne != NULL) {
14480
0
            return ne->set;
14481
0
        }
14482
0
        return 0;
14483
0
    }
14484
#endif
14485
14486
14487
    /* returns a pointer to the internal entry at location 'loc' on success,
14488
     * a null pointer is returned in fail cases */
14489
    WOLFSSL_X509_NAME_ENTRY *wolfSSL_X509_NAME_get_entry(
14490
                                        const WOLFSSL_X509_NAME *name, int loc)
14491
95.2k
    {
14492
#ifdef WOLFSSL_DEBUG_OPENSSL
14493
        WOLFSSL_ENTER("wolfSSL_X509_NAME_get_entry");
14494
#endif
14495
14496
95.2k
        if (name == NULL) {
14497
0
            return NULL;
14498
0
        }
14499
14500
95.2k
        if (loc < 0 || loc >= MAX_NAME_ENTRIES) {
14501
0
            WOLFSSL_MSG("Bad argument");
14502
0
            return NULL;
14503
0
        }
14504
14505
95.2k
        if (name->entry[loc].set) {
14506
4.36k
            return (WOLFSSL_X509_NAME_ENTRY*)&name->entry[loc];
14507
4.36k
        }
14508
90.8k
        else {
14509
90.8k
            return NULL;
14510
90.8k
        }
14511
95.2k
    }
14512
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
14513
14514
#ifdef OPENSSL_EXTRA
14515
14516
int wolfSSL_X509_check_private_key(WOLFSSL_X509 *x509, WOLFSSL_EVP_PKEY *key)
14517
0
{
14518
0
    WOLFSSL_ENTER("wolfSSL_X509_check_private_key");
14519
14520
0
    if (!x509 || !key) {
14521
0
        WOLFSSL_MSG("Bad parameter");
14522
0
        return WOLFSSL_FAILURE;
14523
0
    }
14524
14525
0
#ifndef NO_CHECK_PRIVATE_KEY
14526
0
    return wc_CheckPrivateKey((byte*)key->pkey.ptr, key->pkey_sz,
14527
0
            x509->pubKey.buffer, x509->pubKey.length,
14528
0
            (enum Key_Sum)x509->pubKeyOID, key->heap) == 1 ?
14529
0
                    WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
14530
#else
14531
    /* not compiled in */
14532
    return WOLFSSL_SUCCESS;
14533
#endif
14534
0
}
14535
14536
#endif /* OPENSSL_EXTRA */
14537
14538
#if defined(HAVE_LIGHTY) || defined(HAVE_STUNNEL) \
14539
    || defined(WOLFSSL_MYSQL_COMPATIBLE) || defined(OPENSSL_EXTRA)
14540
#ifndef NO_BIO
14541
14542
#ifdef WOLFSSL_CERT_GEN
14543
14544
#ifdef WOLFSSL_CERT_REQ
14545
/* writes the x509 from x to the WOLFSSL_BIO bp
14546
 *
14547
 * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on fail
14548
 */
14549
int wolfSSL_PEM_write_bio_X509_REQ(WOLFSSL_BIO *bp, WOLFSSL_X509 *x)
14550
{
14551
    byte* pem;
14552
    int   pemSz = 0;
14553
    const unsigned char* der;
14554
    int derSz;
14555
    int ret;
14556
14557
    WOLFSSL_ENTER("wolfSSL_PEM_write_bio_X509_REQ");
14558
14559
    if (x == NULL || bp == NULL) {
14560
        return WOLFSSL_FAILURE;
14561
    }
14562
14563
    der = wolfSSL_X509_get_der(x, &derSz);
14564
    if (der == NULL) {
14565
        return WOLFSSL_FAILURE;
14566
    }
14567
14568
    /* get PEM size */
14569
    pemSz = wc_DerToPemEx(der, (word32)derSz, NULL, 0, NULL, CERTREQ_TYPE);
14570
    if (pemSz < 0) {
14571
        return WOLFSSL_FAILURE;
14572
    }
14573
14574
    /* create PEM buffer and convert from DER */
14575
    pem = (byte*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14576
    if (pem == NULL) {
14577
        return WOLFSSL_FAILURE;
14578
    }
14579
    if (wc_DerToPemEx(der, (word32)derSz, pem, pemSz, NULL, CERTREQ_TYPE) < 0) {
14580
        XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14581
        return WOLFSSL_FAILURE;
14582
    }
14583
14584
    /* write the PEM to BIO */
14585
    ret = wolfSSL_BIO_write(bp, pem, pemSz);
14586
    XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14587
14588
    if (ret <= 0) return WOLFSSL_FAILURE;
14589
    return WOLFSSL_SUCCESS;
14590
}
14591
#endif /* WOLFSSL_CERT_REQ */
14592
14593
14594
/* writes the x509 from x to the WOLFSSL_BIO bp
14595
 *
14596
 * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on fail
14597
 */
14598
int wolfSSL_PEM_write_bio_X509_AUX(WOLFSSL_BIO *bp, WOLFSSL_X509 *x)
14599
{
14600
    byte* pem;
14601
    int   pemSz = 0;
14602
    const unsigned char* der;
14603
    int derSz;
14604
    int ret;
14605
14606
    WOLFSSL_ENTER("wolfSSL_PEM_write_bio_X509_AUX");
14607
14608
    if (bp == NULL || x == NULL) {
14609
        WOLFSSL_MSG("NULL argument passed in");
14610
        return WOLFSSL_FAILURE;
14611
    }
14612
14613
    der = wolfSSL_X509_get_der(x, &derSz);
14614
    if (der == NULL) {
14615
        return WOLFSSL_FAILURE;
14616
    }
14617
14618
    /* get PEM size */
14619
    pemSz = wc_DerToPemEx(der, (word32)derSz, NULL, 0, NULL, CERT_TYPE);
14620
    if (pemSz < 0) {
14621
        return WOLFSSL_FAILURE;
14622
    }
14623
14624
    /* create PEM buffer and convert from DER */
14625
    pem = (byte*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14626
    if (pem == NULL) {
14627
        return WOLFSSL_FAILURE;
14628
    }
14629
    if (wc_DerToPemEx(der, (word32)derSz, pem, pemSz, NULL, CERT_TYPE) < 0) {
14630
        XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14631
        return WOLFSSL_FAILURE;
14632
    }
14633
14634
    /* write the PEM to BIO */
14635
    ret = wolfSSL_BIO_write(bp, pem, pemSz);
14636
    XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14637
14638
    if (ret <= 0) return WOLFSSL_FAILURE;
14639
    return WOLFSSL_SUCCESS;
14640
}
14641
14642
int wolfSSL_PEM_write_bio_X509(WOLFSSL_BIO *bio, WOLFSSL_X509 *cert)
14643
{
14644
    byte* pem = NULL;
14645
    int   pemSz = 0;
14646
    /* Get large buffer to hold cert der */
14647
    const byte* der = NULL;
14648
    int derSz = X509_BUFFER_SZ;
14649
    int ret;
14650
14651
    WOLFSSL_ENTER("wolfSSL_PEM_write_bio_X509");
14652
14653
    if (bio == NULL || cert == NULL) {
14654
        WOLFSSL_MSG("NULL argument passed in");
14655
        return WOLFSSL_FAILURE;
14656
    }
14657
14658
    /* Do not call wolfssl_x509_make_der() here. If we did, then need to re-sign
14659
     * because we don't know the original order of the extensions and so we must
14660
     * assume our extensions are in a different order, thus need to re-sign. */
14661
    der = wolfSSL_X509_get_der(cert, &derSz);
14662
    if (der == NULL) {
14663
        goto error;
14664
    }
14665
14666
    /* get PEM size */
14667
    pemSz = wc_DerToPemEx(der, (word32)derSz, NULL, 0, NULL, CERT_TYPE);
14668
    if (pemSz < 0) {
14669
        goto error;
14670
    }
14671
14672
    /* create PEM buffer and convert from DER */
14673
    pem = (byte*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14674
    if (pem == NULL) {
14675
        goto error;
14676
    }
14677
    if (wc_DerToPemEx(der, (word32)derSz, pem, pemSz, NULL, CERT_TYPE) < 0) {
14678
        goto error;
14679
    }
14680
14681
    /* write the PEM to BIO */
14682
    ret = wolfSSL_BIO_write(bio, pem, pemSz);
14683
    XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14684
14685
    if (ret <= 0) return WOLFSSL_FAILURE;
14686
    return WOLFSSL_SUCCESS;
14687
14688
error:
14689
    XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14690
    return WOLFSSL_FAILURE;
14691
}
14692
#endif /* WOLFSSL_CERT_GEN */
14693
14694
#endif /* !NO_BIO */
14695
#endif /* HAVE_LIGHTY || HAVE_STUNNEL || WOLFSSL_MYSQL_COMPATIBLE */
14696
14697
#if defined(OPENSSL_EXTRA) || defined(HAVE_STUNNEL) || \
14698
        defined(WOLFSSL_NGINX) || defined(HAVE_LIGHTY) || \
14699
        defined(WOLFSSL_HAPROXY) || defined(WOLFSSL_OPENSSH) || \
14700
        defined(HAVE_SBLIM_SFCB)
14701
14702
WOLF_STACK_OF(WOLFSSL_X509_NAME)* wolfSSL_sk_X509_NAME_new(
14703
        WOLF_SK_COMPARE_CB(WOLFSSL_X509_NAME, cb))
14704
18.3k
{
14705
18.3k
    WOLFSSL_STACK* sk;
14706
18.3k
    (void)cb;
14707
14708
18.3k
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_new");
14709
14710
18.3k
    sk = wolfSSL_sk_new_node(NULL);
14711
18.3k
    if (sk != NULL) {
14712
18.3k
        sk->type = STACK_TYPE_X509_NAME;
14713
18.3k
    }
14714
14715
18.3k
    return sk;
14716
18.3k
}
14717
14718
int wolfSSL_sk_X509_NAME_num(const WOLF_STACK_OF(WOLFSSL_X509_NAME) *sk)
14719
0
{
14720
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_num");
14721
14722
0
    if (sk == NULL)
14723
0
        return BAD_FUNC_ARG;
14724
14725
0
    return (int)sk->num;
14726
0
}
14727
14728
/* Getter function for WOLFSSL_X509_NAME pointer
14729
 *
14730
 * sk is the stack to retrieve pointer from
14731
 * i  is the index value in stack
14732
 *
14733
 * returns a pointer to a WOLFSSL_X509_NAME structure on success and NULL on
14734
 *         fail
14735
 */
14736
WOLFSSL_X509_NAME* wolfSSL_sk_X509_NAME_value(
14737
    const WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk, int i)
14738
0
{
14739
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_value");
14740
0
    return (WOLFSSL_X509_NAME*)wolfSSL_sk_value(sk, i);
14741
0
}
14742
14743
WOLFSSL_X509_NAME* wolfSSL_sk_X509_NAME_pop(
14744
    WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
14745
0
{
14746
0
    return (WOLFSSL_X509_NAME*)wolfSSL_sk_pop(sk);
14747
0
}
14748
14749
void wolfSSL_sk_X509_NAME_pop_free(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
14750
    void (*f) (WOLFSSL_X509_NAME*))
14751
267k
{
14752
267k
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_pop_free");
14753
267k
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
14754
267k
}
14755
14756
/* Free only the sk structure, NOT X509_NAME members */
14757
void wolfSSL_sk_X509_NAME_free(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
14758
0
{
14759
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_free");
14760
0
    wolfSSL_sk_free(sk);
14761
0
}
14762
14763
int wolfSSL_sk_X509_NAME_push(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
14764
    WOLFSSL_X509_NAME* name)
14765
8
{
14766
8
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_push");
14767
14768
8
    return wolfSSL_sk_push(sk, name);
14769
8
}
14770
14771
/* return index of found, or negative to indicate not found */
14772
int wolfSSL_sk_X509_NAME_find(const WOLF_STACK_OF(WOLFSSL_X509_NAME) *sk,
14773
    WOLFSSL_X509_NAME *name)
14774
0
{
14775
0
    int i;
14776
14777
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_find");
14778
14779
0
    if (sk == NULL)
14780
0
        return BAD_FUNC_ARG;
14781
14782
0
    for (i = 0; sk; i++, sk = sk->next) {
14783
0
        if (wolfSSL_X509_NAME_cmp(sk->data.name, name) == 0) {
14784
0
            return i;
14785
0
        }
14786
0
    }
14787
0
    return WOLFSSL_FATAL_ERROR;
14788
0
}
14789
14790
/* Name Entry */
14791
WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* wolfSSL_sk_X509_NAME_ENTRY_new(
14792
    WOLF_SK_COMPARE_CB(WOLFSSL_X509_NAME_ENTRY, cb))
14793
0
{
14794
0
    WOLFSSL_STACK* sk = wolfSSL_sk_new_node(NULL);
14795
0
    if (sk != NULL) {
14796
0
        sk->type = STACK_TYPE_X509_NAME_ENTRY;
14797
0
        (void)cb;
14798
0
    }
14799
0
    return sk;
14800
0
}
14801
14802
int wolfSSL_sk_X509_NAME_ENTRY_push(WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk,
14803
    WOLFSSL_X509_NAME_ENTRY* name_entry)
14804
40.2k
{
14805
40.2k
    return wolfSSL_sk_push(sk, name_entry);
14806
40.2k
}
14807
14808
WOLFSSL_X509_NAME_ENTRY* wolfSSL_sk_X509_NAME_ENTRY_value(
14809
    const WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk, int i)
14810
0
{
14811
0
    return (WOLFSSL_X509_NAME_ENTRY*)wolfSSL_sk_value(sk, i);
14812
0
}
14813
14814
int wolfSSL_sk_X509_NAME_ENTRY_num(
14815
    const WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk)
14816
0
{
14817
0
    if (sk == NULL)
14818
0
        return BAD_FUNC_ARG;
14819
0
    return (int)sk->num;
14820
0
}
14821
14822
void wolfSSL_sk_X509_NAME_ENTRY_free(WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk)
14823
18.1k
{
14824
18.1k
    wolfSSL_sk_free(sk);
14825
18.1k
}
14826
14827
#endif /* OPENSSL_EXTRA || HAVE_STUNNEL || WOLFSSL_NGINX ||
14828
            HAVE_LIGHTY || WOLFSSL_HAPROXY ||
14829
            WOLFSSL_OPENSSH || HAVE_SBLIM_SFCB */
14830
14831
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
14832
    (defined(HAVE_STUNNEL) || defined(WOLFSSL_NGINX) || \
14833
    defined(HAVE_LIGHTY) || defined(WOLFSSL_HAPROXY) || \
14834
    defined(WOLFSSL_OPENSSH) || defined(HAVE_SBLIM_SFCB))
14835
14836
#if defined(OPENSSL_ALL)
14837
WOLFSSL_X509_INFO* wolfSSL_X509_INFO_new(void)
14838
0
{
14839
0
    WOLFSSL_X509_INFO* info;
14840
0
    info = (WOLFSSL_X509_INFO*)XMALLOC(sizeof(WOLFSSL_X509_INFO), NULL,
14841
0
        DYNAMIC_TYPE_X509);
14842
0
    if (info) {
14843
0
        XMEMSET(info, 0, sizeof(*info));
14844
0
    }
14845
0
    return info;
14846
0
}
14847
14848
void wolfSSL_X509_INFO_free(WOLFSSL_X509_INFO* info)
14849
0
{
14850
0
    if (info == NULL)
14851
0
        return;
14852
14853
0
    if (info->x509) {
14854
0
        wolfSSL_X509_free(info->x509);
14855
0
        info->x509 = NULL;
14856
0
    }
14857
#ifdef HAVE_CRL
14858
    if (info->crl) {
14859
        wolfSSL_X509_CRL_free(info->crl);
14860
        info->crl = NULL;
14861
    }
14862
#endif
14863
0
    wolfSSL_X509_PKEY_free(info->x_pkey);
14864
0
    info->x_pkey = NULL;
14865
14866
0
    XFREE(info, NULL, DYNAMIC_TYPE_X509);
14867
0
}
14868
#endif
14869
14870
WOLFSSL_STACK* wolfSSL_sk_X509_INFO_new_null(void)
14871
0
{
14872
0
    WOLFSSL_STACK* sk = wolfSSL_sk_new_node(NULL);
14873
0
    if (sk) {
14874
0
        sk->type = STACK_TYPE_X509_INFO;
14875
0
    }
14876
0
    return sk;
14877
0
}
14878
14879
int wolfSSL_sk_X509_INFO_num(const WOLF_STACK_OF(WOLFSSL_X509_INFO) *sk)
14880
0
{
14881
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_num");
14882
14883
0
    return wolfSSL_sk_num(sk);
14884
0
}
14885
14886
WOLFSSL_X509_INFO* wolfSSL_sk_X509_INFO_value(
14887
        const WOLF_STACK_OF(WOLFSSL_X509_INFO) *sk, int i)
14888
0
{
14889
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_value");
14890
14891
0
    return (WOLFSSL_X509_INFO *)wolfSSL_sk_value(sk, i);
14892
0
}
14893
14894
WOLFSSL_X509_INFO* wolfSSL_sk_X509_INFO_pop(
14895
        WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk)
14896
0
{
14897
0
    return (WOLFSSL_X509_INFO*)wolfSSL_sk_pop(sk);
14898
0
}
14899
14900
#if defined(OPENSSL_ALL)
14901
void wolfSSL_sk_X509_INFO_pop_free(WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
14902
    void (*f) (WOLFSSL_X509_INFO*))
14903
0
{
14904
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_pop_free");
14905
0
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
14906
0
}
14907
14908
void wolfSSL_sk_X509_INFO_free(WOLF_STACK_OF(WOLFSSL_X509_INFO) *sk)
14909
0
{
14910
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_free");
14911
0
    wolfSSL_sk_free(sk);
14912
0
}
14913
14914
/* Adds the WOLFSSL_X509_INFO to the stack "sk". "sk" takes control of "in" and
14915
 * tries to free it when the stack is free'd.
14916
 *
14917
 * return number of elements on success 0 on fail
14918
 */
14919
int wolfSSL_sk_X509_INFO_push(WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
14920
                                                      WOLFSSL_X509_INFO* in)
14921
0
{
14922
0
    return wolfSSL_sk_push(sk, in);
14923
0
}
14924
14925
/* Creates a duplicate of WOLF_STACK_OF(WOLFSSL_X509_NAME).
14926
 * Returns a new WOLF_STACK_OF(WOLFSSL_X509_NAME) or NULL on failure */
14927
WOLF_STACK_OF(WOLFSSL_X509_NAME) *wolfSSL_dup_CA_list(
14928
    WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
14929
0
{
14930
0
    int i;
14931
0
    const int num = wolfSSL_sk_X509_NAME_num(sk);
14932
0
    WOLF_STACK_OF(WOLFSSL_X509_NAME) *copy;
14933
0
    WOLFSSL_X509_NAME *name;
14934
14935
0
    WOLFSSL_ENTER("wolfSSL_dup_CA_list");
14936
14937
0
    copy = wolfSSL_sk_X509_NAME_new(NULL);
14938
0
    if (copy == NULL) {
14939
0
        WOLFSSL_MSG("Memory error");
14940
0
        return NULL;
14941
0
    }
14942
14943
0
    for (i = 0; i < num; i++) {
14944
0
        name = wolfSSL_X509_NAME_dup(wolfSSL_sk_X509_NAME_value(sk, i));
14945
0
        if (name == NULL || wolfSSL_sk_X509_NAME_push(copy, name) <= 0) {
14946
0
            WOLFSSL_MSG("Memory error");
14947
0
            wolfSSL_sk_X509_NAME_pop_free(copy, wolfSSL_X509_NAME_free);
14948
0
            wolfSSL_X509_NAME_free(name);
14949
0
            return NULL;
14950
0
        }
14951
0
    }
14952
14953
0
    return copy;
14954
0
}
14955
14956
void* wolfSSL_sk_X509_OBJECT_value(WOLF_STACK_OF(WOLFSSL_X509_OBJECT)* sk,
14957
    int i)
14958
0
{
14959
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_value");
14960
0
    for (; sk != NULL && i > 0; i--)
14961
0
        sk = sk->next;
14962
14963
0
    if (i != 0 || sk == NULL)
14964
0
        return NULL;
14965
0
    return sk->data.x509_obj;
14966
0
}
14967
14968
int wolfSSL_sk_X509_OBJECT_num(const WOLF_STACK_OF(WOLFSSL_X509_OBJECT) *s)
14969
0
{
14970
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_num");
14971
0
    if (s) {
14972
0
        return (int)s->num;
14973
0
    }
14974
0
    else {
14975
0
        return 0;
14976
0
    }
14977
0
}
14978
14979
int wolfSSL_sk_X509_NAME_set_cmp_func(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
14980
    WOLF_SK_COMPARE_CB(WOLFSSL_X509_NAME, cb))
14981
0
{
14982
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_set_cmp_func");
14983
14984
0
    if (sk == NULL)
14985
0
        return BAD_FUNC_ARG;
14986
14987
0
    WOLFSSL_MSG("Stack comparison not used in wolfSSL");
14988
0
    (void)cb;
14989
0
    return 0;
14990
0
}
14991
#endif /* OPENSSL_ALL */
14992
14993
#ifndef NO_BIO
14994
14995
/* Helper function for X509_NAME_print_ex. Sets *buf to string for domain
14996
   name attribute based on NID. Returns size of buf */
14997
static int get_dn_attr_by_nid(int n, const char** buf)
14998
0
{
14999
0
    int len = 0;
15000
0
    const char *str;
15001
15002
0
    switch(n)
15003
0
    {
15004
0
        case WC_NID_commonName :
15005
0
            str = "CN";
15006
0
            len = 2;
15007
0
            break;
15008
0
        case WC_NID_countryName:
15009
0
            str = "C";
15010
0
            len = 1;
15011
0
            break;
15012
0
        case WC_NID_localityName:
15013
0
            str = "L";
15014
0
            len = 1;
15015
0
            break;
15016
0
        case WC_NID_stateOrProvinceName:
15017
0
            str = "ST";
15018
0
            len = 2;
15019
0
            break;
15020
0
        case WC_NID_streetAddress:
15021
0
            str = "street";
15022
0
            len = 6;
15023
0
            break;
15024
0
        case WC_NID_organizationName:
15025
0
            str = "O";
15026
0
            len = 1;
15027
0
            break;
15028
0
        case WC_NID_organizationalUnitName:
15029
0
            str = "OU";
15030
0
            len = 2;
15031
0
            break;
15032
0
        case WC_NID_postalCode:
15033
0
            str = "postalCode";
15034
0
            len = 10;
15035
0
            break;
15036
0
        case WC_NID_emailAddress:
15037
0
            str = "emailAddress";
15038
0
            len = 12;
15039
0
            break;
15040
0
        case WC_NID_surname:
15041
0
            str = "SN";
15042
0
            len = 2;
15043
0
            break;
15044
0
        case WC_NID_givenName:
15045
0
            str = "GN";
15046
0
            len = 2;
15047
0
            break;
15048
0
        case WC_NID_dnQualifier:
15049
0
            str = "dnQualifier";
15050
0
            len = 11;
15051
0
            break;
15052
0
        case WC_NID_name:
15053
0
            str = "name";
15054
0
            len = 4;
15055
0
            break;
15056
0
        case WC_NID_initials:
15057
0
            str = "initials";
15058
0
            len = 8;
15059
0
            break;
15060
0
        case WC_NID_domainComponent:
15061
0
            str = "DC";
15062
0
            len = 2;
15063
0
            break;
15064
0
        case WC_NID_pkcs9_contentType:
15065
0
            str = "contentType";
15066
0
            len = 11;
15067
0
            break;
15068
0
        case WC_NID_userId:
15069
0
            str = "UID";
15070
0
            len = 3;
15071
0
            break;
15072
0
        case WC_NID_serialNumber:
15073
0
            str = "serialNumber";
15074
0
            len = 12;
15075
0
            break;
15076
0
        case WC_NID_title:
15077
0
            str = "title";
15078
0
            len = 5;
15079
0
            break;
15080
0
        case WC_NID_rfc822Mailbox:
15081
0
            str = "mail";
15082
0
            len = 4;
15083
0
            break;
15084
0
        default:
15085
0
            WOLFSSL_MSG("Attribute type not found");
15086
0
            str = NULL;
15087
15088
0
    }
15089
0
    if (buf != NULL)
15090
0
        *buf = str;
15091
0
    return len;
15092
0
}
15093
15094
/**
15095
 * Escape input string for RFC2253 requirements. The following characters
15096
 * are escaped with a backslash (\):
15097
 *
15098
 *     1. A space or '#' at the beginning of the string
15099
 *     2. A space at the end of the string
15100
 *     3. One of: ",", "+", """, "\", "<", ">", ";"
15101
 *
15102
 * in    - input string to escape
15103
 * inSz  - length of in, not including the null terminator
15104
 * out   - buffer for output string to be written, will be null terminated
15105
 * outSz - size of out
15106
 *
15107
 * Returns size of output string (not counting NULL terminator) on success,
15108
 * negative on error.
15109
 */
15110
static int wolfSSL_EscapeString_RFC2253(char* in, word32 inSz,
15111
                                        char* out, word32 outSz)
15112
0
{
15113
0
    word32 inIdx = 0;
15114
0
    word32 outIdx = 0;
15115
15116
0
    if (in == NULL || out == NULL || inSz == 0 || outSz == 0) {
15117
0
        return BAD_FUNC_ARG;
15118
0
    }
15119
15120
0
    for (inIdx = 0; inIdx < inSz; inIdx++) {
15121
15122
0
        char c = in[inIdx];
15123
15124
0
        if (((inIdx == 0) && (c == ' ' || c == '#')) ||
15125
0
            ((inIdx == (inSz-1)) && (c == ' ')) ||
15126
0
            c == ',' || c == '+' || c == '"' || c == '\\' ||
15127
0
            c == '<' || c == '>' || c == ';') {
15128
15129
0
            if (outIdx > (outSz - 1)) {
15130
0
                return BUFFER_E;
15131
0
            }
15132
0
            out[outIdx] = '\\';
15133
0
            outIdx++;
15134
0
        }
15135
0
        if (outIdx > (outSz - 1)) {
15136
0
            return BUFFER_E;
15137
0
        }
15138
0
        out[outIdx] = c;
15139
0
        outIdx++;
15140
0
    }
15141
15142
    /* null terminate out */
15143
0
    if (outIdx > (outSz -1)) {
15144
0
        return BUFFER_E;
15145
0
    }
15146
0
    out[outIdx] = '\0';
15147
15148
0
    return (int)outIdx;
15149
0
}
15150
15151
/*
15152
 * Print human readable version of X509_NAME to provided BIO.
15153
 *
15154
 * bio    - output BIO to place name string. Does not include null terminator.
15155
 * name   - input name to convert to string
15156
 * indent - number of indent spaces to prepend to name string
15157
 * flags  - flags to control function behavior. Not all flags are currently
15158
 *          supported/implemented. Currently supported are:
15159
 *              XN_FLAG_RFC2253 - only the backslash escape requirements from
15160
 *                                RFC22523 currently implemented.
15161
 *              XN_FLAG_DN_REV  - print name reversed. Automatically done by
15162
 *                                XN_FLAG_RFC2253.
15163
 *              XN_FLAG_SPC_EQ  - spaces before and after '=' character
15164
 *
15165
 * Returns WOLFSSL_SUCCESS (1) on success, WOLFSSL_FAILURE (0) on failure.
15166
 */
15167
int wolfSSL_X509_NAME_print_ex(WOLFSSL_BIO* bio, WOLFSSL_X509_NAME* name,
15168
                int indent, unsigned long flags)
15169
0
{
15170
0
    int i, count = 0, nameStrSz = 0, escapeSz = 0;
15171
0
    int eqSpace  = 0;
15172
0
    char eqStr[4];
15173
0
    char* tmp = NULL;
15174
0
    char* nameStr = NULL;
15175
0
    const char *buf = NULL;
15176
0
    WOLFSSL_X509_NAME_ENTRY* ne;
15177
0
    WOLFSSL_ASN1_STRING* str;
15178
0
    char escaped[ASN_NAME_MAX];
15179
15180
0
    WOLFSSL_ENTER("wolfSSL_X509_NAME_print_ex");
15181
15182
0
    if ((name == NULL) || (bio == NULL))
15183
0
        return WOLFSSL_FAILURE;
15184
15185
0
    XMEMSET(eqStr, 0, sizeof(eqStr));
15186
0
    if (flags & WOLFSSL_XN_FLAG_SPC_EQ) {
15187
0
        eqSpace = 2;
15188
0
        XSTRNCPY(eqStr, " = ", 4);
15189
0
    }
15190
0
    else {
15191
0
        XSTRNCPY(eqStr, "=", 4);
15192
0
    }
15193
15194
0
    for (i = 0; i < indent; i++) {
15195
0
        if (wolfSSL_BIO_write(bio, " ", 1) != 1)
15196
0
            return WOLFSSL_FAILURE;
15197
0
    }
15198
15199
0
    count = wolfSSL_X509_NAME_entry_count(name);
15200
15201
0
    for (i = 0; i < count; i++) {
15202
0
        int len;
15203
0
        int tmpSz;
15204
15205
        /* reverse name order for RFC2253 and DN_REV */
15206
0
        if ((flags & WOLFSSL_XN_FLAG_RFC2253) ||
15207
0
            (flags & WOLFSSL_XN_FLAG_DN_REV)) {
15208
0
            ne = wolfSSL_X509_NAME_get_entry(name, count - i - 1);
15209
0
        }
15210
0
        else {
15211
0
            ne = wolfSSL_X509_NAME_get_entry(name, i);
15212
0
        }
15213
0
        if (ne == NULL)
15214
0
            return WOLFSSL_FAILURE;
15215
15216
0
        str = wolfSSL_X509_NAME_ENTRY_get_data(ne);
15217
0
        if (str == NULL)
15218
0
            return WOLFSSL_FAILURE;
15219
15220
0
        if (flags & WOLFSSL_XN_FLAG_RFC2253) {
15221
            /* escape string for RFC 2253, ret sz not counting null term */
15222
0
            escapeSz = wolfSSL_EscapeString_RFC2253(str->data,
15223
0
                            str->length, escaped, sizeof(escaped));
15224
0
            if (escapeSz < 0)
15225
0
                return WOLFSSL_FAILURE;
15226
15227
0
            nameStr = escaped;
15228
0
            nameStrSz = escapeSz;
15229
0
        }
15230
0
        else {
15231
0
            nameStr = str->data;
15232
0
            nameStrSz = str->length;
15233
0
        }
15234
15235
        /* len is without null terminator */
15236
0
        len = get_dn_attr_by_nid(ne->nid, &buf);
15237
0
        if (len == 0 || buf == NULL)
15238
0
            return WOLFSSL_FAILURE;
15239
15240
        /* + 4 for '=', comma space and '\0'*/
15241
0
        tmpSz = nameStrSz + len + 4 + eqSpace;
15242
0
        tmp = (char*)XMALLOC(tmpSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
15243
0
        if (tmp == NULL) {
15244
0
            return WOLFSSL_FAILURE;
15245
0
        }
15246
15247
0
        if (i < count - 1) {
15248
0
            if (XSNPRINTF(tmp, (size_t)tmpSz, "%s%s%s, ", buf, eqStr, nameStr)
15249
0
                >= tmpSz)
15250
0
            {
15251
0
                WOLFSSL_MSG("buffer overrun");
15252
0
                XFREE(tmp, NULL, DYNAMIC_TYPE_TMP_BUFFER);
15253
0
                return WOLFSSL_FAILURE;
15254
0
            }
15255
15256
0
            tmpSz = len + nameStrSz + 3 + eqSpace; /* 3 for '=', comma space */
15257
0
        }
15258
0
        else {
15259
0
            if (XSNPRINTF(tmp, (size_t)tmpSz, "%s%s%s", buf, eqStr, nameStr)
15260
0
                >= tmpSz)
15261
0
            {
15262
0
                WOLFSSL_MSG("buffer overrun");
15263
0
                XFREE(tmp, NULL, DYNAMIC_TYPE_TMP_BUFFER);
15264
0
                return WOLFSSL_FAILURE;
15265
0
            }
15266
0
            tmpSz = len + nameStrSz + 1 + eqSpace; /* 1 for '=' */
15267
0
            if (bio->type != WOLFSSL_BIO_FILE &&
15268
0
                                              bio->type != WOLFSSL_BIO_MEMORY) {
15269
0
                ++tmpSz; /* include the terminating null when not writing to a
15270
                          * file.
15271
                          */
15272
0
            }
15273
0
        }
15274
15275
0
        if (wolfSSL_BIO_write(bio, tmp, tmpSz) != tmpSz) {
15276
0
            XFREE(tmp, NULL, DYNAMIC_TYPE_TMP_BUFFER);
15277
0
            return WOLFSSL_FAILURE;
15278
0
        }
15279
15280
0
        XFREE(tmp, NULL, DYNAMIC_TYPE_TMP_BUFFER);
15281
0
    }
15282
15283
0
    return WOLFSSL_SUCCESS;
15284
0
}
15285
15286
#ifndef NO_FILESYSTEM
15287
int wolfSSL_X509_NAME_print_ex_fp(XFILE file, WOLFSSL_X509_NAME* name,
15288
        int indent, unsigned long flags)
15289
0
{
15290
0
    WOLFSSL_BIO* bio;
15291
0
    int ret;
15292
15293
0
    WOLFSSL_ENTER("wolfSSL_X509_NAME_print_ex_fp");
15294
15295
0
    if (!(bio = wolfSSL_BIO_new_fp(file, WOLFSSL_BIO_NOCLOSE))) {
15296
0
        WOLFSSL_MSG("wolfSSL_BIO_new_fp error");
15297
0
        return WOLFSSL_FAILURE;
15298
0
    }
15299
15300
0
    ret = wolfSSL_X509_NAME_print_ex(bio, name, indent, flags);
15301
15302
0
    wolfSSL_BIO_free(bio);
15303
15304
0
    return ret;
15305
0
}
15306
#endif /* NO_FILESYSTEM */
15307
#endif /* !NO_BIO */
15308
15309
#ifndef NO_WOLFSSL_STUB
15310
WOLFSSL_ASN1_BIT_STRING* wolfSSL_X509_get0_pubkey_bitstr(const WOLFSSL_X509* x)
15311
0
{
15312
0
    (void)x;
15313
0
    WOLFSSL_ENTER("wolfSSL_X509_get0_pubkey_bitstr");
15314
0
    WOLFSSL_STUB("X509_get0_pubkey_bitstr");
15315
15316
0
    return NULL;
15317
0
}
15318
#endif
15319
15320
#ifdef OPENSSL_ALL
15321
WOLFSSL_X509_LOOKUP_TYPE wolfSSL_X509_OBJECT_get_type(
15322
        const WOLFSSL_X509_OBJECT* obj)
15323
0
{
15324
0
    if (obj == NULL)
15325
0
        return WOLFSSL_X509_LU_NONE;
15326
0
    return obj->type;
15327
0
}
15328
15329
WOLFSSL_X509_OBJECT* wolfSSL_X509_OBJECT_new(void)
15330
0
{
15331
0
    WOLFSSL_X509_OBJECT* ret = (WOLFSSL_X509_OBJECT*)
15332
0
            XMALLOC(sizeof(WOLFSSL_X509_OBJECT), NULL, DYNAMIC_TYPE_OPENSSL);
15333
0
    if (ret != NULL)
15334
0
        XMEMSET(ret, 0, sizeof(WOLFSSL_X509_OBJECT));
15335
0
    return ret;
15336
0
}
15337
15338
void wolfSSL_X509_OBJECT_free(WOLFSSL_X509_OBJECT *obj)
15339
0
{
15340
0
    WOLFSSL_ENTER("wolfSSL_X509_OBJECT_free");
15341
0
    if (obj != NULL) {
15342
0
        if (obj->type == WOLFSSL_X509_LU_X509) {
15343
0
            wolfSSL_X509_free(obj->data.x509);
15344
0
        }
15345
    #ifdef HAVE_CRL
15346
        else if (obj->type == WOLFSSL_X509_LU_CRL) {
15347
            wolfSSL_X509_CRL_free(obj->data.crl);
15348
        }
15349
    #endif
15350
0
        else {
15351
            /* We don't free as this will point to
15352
             * store->cm->crl which we don't own */
15353
0
            WOLFSSL_MSG("Not free'ing CRL in WOLFSSL_X509_OBJECT");
15354
0
        }
15355
0
        XFREE(obj, NULL, DYNAMIC_TYPE_OPENSSL);
15356
0
    }
15357
0
}
15358
15359
WOLFSSL_X509_OBJECT *wolfSSL_X509_OBJECT_retrieve_by_subject(
15360
        WOLF_STACK_OF(WOLFSSL_X509_OBJECT) *sk,
15361
        WOLFSSL_X509_LOOKUP_TYPE type,
15362
        WOLFSSL_X509_NAME *name)
15363
0
{
15364
0
    int i;
15365
15366
0
    WOLFSSL_ENTER("wolfSSL_X509_OBJECT_retrieve_by_subject");
15367
15368
0
    if (sk == NULL || name == NULL)
15369
0
        return NULL;
15370
15371
0
    for (i = 0; i < wolfSSL_sk_X509_OBJECT_num(sk); i++) {
15372
0
        WOLFSSL_X509_OBJECT* obj = (WOLFSSL_X509_OBJECT *)
15373
0
            wolfSSL_sk_X509_OBJECT_value(sk, i);
15374
0
        if (obj != NULL && obj->type == type &&
15375
0
            wolfSSL_X509_NAME_cmp(
15376
0
                wolfSSL_X509_get_subject_name(obj->data.x509), name) == 0)
15377
0
            return obj;
15378
0
    }
15379
0
    return NULL;
15380
0
}
15381
#endif /* OPENSSL_ALL */
15382
15383
#ifndef NO_WOLFSSL_STUB
15384
WOLFSSL_X509_OBJECT* wolfSSL_sk_X509_OBJECT_delete(
15385
    WOLF_STACK_OF(WOLFSSL_X509_OBJECT)* sk, int i)
15386
0
{
15387
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_delete");
15388
0
    WOLFSSL_STUB("wolfSSL_sk_X509_OBJECT_delete");
15389
0
    (void)sk;
15390
0
    (void)i;
15391
0
    return NULL;
15392
0
}
15393
#endif
15394
15395
WOLFSSL_X509 *wolfSSL_X509_OBJECT_get0_X509(const WOLFSSL_X509_OBJECT *obj)
15396
0
{
15397
0
    if (obj != NULL && obj->type == WOLFSSL_X509_LU_X509)
15398
0
        return obj->data.x509;
15399
0
    return NULL;
15400
0
}
15401
15402
WOLFSSL_X509_CRL *wolfSSL_X509_OBJECT_get0_X509_CRL(WOLFSSL_X509_OBJECT *obj)
15403
0
{
15404
0
    if (obj != NULL && obj->type == WOLFSSL_X509_LU_CRL)
15405
0
        return obj->data.crl;
15406
0
    return NULL;
15407
0
}
15408
15409
#endif /* OPENSSL_ALL || (OPENSSL_EXTRA && (HAVE_STUNNEL || WOLFSSL_NGINX ||
15410
        * HAVE_LIGHTY || WOLFSSL_HAPROXY || WOLFSSL_OPENSSH ||
15411
        * HAVE_SBLIM_SFCB)) */
15412
15413
15414
#if defined(OPENSSL_EXTRA)
15415
15416
int wolfSSL_sk_X509_num(const WOLF_STACK_OF(WOLFSSL_X509) *s)
15417
0
{
15418
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_num");
15419
15420
0
    if (s == NULL)
15421
0
        return WOLFSSL_FATAL_ERROR;
15422
0
    return (int)s->num;
15423
0
}
15424
15425
#endif /* OPENSSL_EXTRA */
15426
15427
#ifdef HAVE_EX_DATA_CRYPTO
15428
int wolfSSL_X509_get_ex_new_index(int idx, void *arg,
15429
                                  WOLFSSL_CRYPTO_EX_new* new_func,
15430
                                  WOLFSSL_CRYPTO_EX_dup* dup_func,
15431
                                  WOLFSSL_CRYPTO_EX_free* free_func)
15432
0
{
15433
0
    WOLFSSL_ENTER("wolfSSL_X509_get_ex_new_index");
15434
15435
0
    return wolfssl_get_ex_new_index(WOLF_CRYPTO_EX_INDEX_X509, idx, arg,
15436
0
                                    new_func, dup_func, free_func);
15437
0
}
15438
#endif
15439
15440
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
15441
void *wolfSSL_X509_get_ex_data(WOLFSSL_X509 *x509, int idx)
15442
0
{
15443
0
    WOLFSSL_ENTER("wolfSSL_X509_get_ex_data");
15444
0
#ifdef HAVE_EX_DATA
15445
0
    if (x509 != NULL) {
15446
0
        return wolfSSL_CRYPTO_get_ex_data(&x509->ex_data, idx);
15447
0
    }
15448
#else
15449
    (void)x509;
15450
    (void)idx;
15451
#endif
15452
0
    return NULL;
15453
0
}
15454
15455
int wolfSSL_X509_set_ex_data(WOLFSSL_X509 *x509, int idx, void *data)
15456
0
{
15457
0
    WOLFSSL_ENTER("wolfSSL_X509_set_ex_data");
15458
0
#ifdef HAVE_EX_DATA
15459
0
    if (x509 != NULL) {
15460
0
        return wolfSSL_CRYPTO_set_ex_data(&x509->ex_data, idx, data);
15461
0
    }
15462
#else
15463
    (void)x509;
15464
    (void)idx;
15465
    (void)data;
15466
#endif
15467
0
    return WOLFSSL_FAILURE;
15468
0
}
15469
15470
#ifdef HAVE_EX_DATA_CLEANUP_HOOKS
15471
int wolfSSL_X509_set_ex_data_with_cleanup(
15472
    WOLFSSL_X509 *x509,
15473
    int idx,
15474
    void *data,
15475
    wolfSSL_ex_data_cleanup_routine_t cleanup_routine)
15476
{
15477
    WOLFSSL_ENTER("wolfSSL_X509_set_ex_data_with_cleanup");
15478
    if (x509 != NULL)
15479
    {
15480
        return wolfSSL_CRYPTO_set_ex_data_with_cleanup(&x509->ex_data, idx,
15481
                                                       data, cleanup_routine);
15482
    }
15483
    return WOLFSSL_FAILURE;
15484
}
15485
#endif /* HAVE_EX_DATA_CLEANUP_HOOKS */
15486
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
15487
15488
15489
#ifndef NO_ASN
15490
int wolfSSL_X509_check_host(WOLFSSL_X509 *x, const char *chk, size_t chklen,
15491
                    unsigned int flags, char **peername)
15492
0
{
15493
0
    int         ret;
15494
0
    size_t      i;
15495
0
    WC_DECLARE_VAR(dCert, DecodedCert, 1, 0);
15496
15497
0
    WOLFSSL_ENTER("wolfSSL_X509_check_host");
15498
15499
    /* flags and peername not needed for Nginx. */
15500
0
    (void)peername;
15501
15502
0
    if ((x == NULL) || (chk == NULL)) {
15503
0
        WOLFSSL_MSG("Invalid parameter");
15504
0
        return WOLFSSL_FAILURE;
15505
0
    }
15506
15507
0
    if (flags & WOLFSSL_NO_WILDCARDS) {
15508
0
        WOLFSSL_MSG("X509_CHECK_FLAG_NO_WILDCARDS not yet implemented");
15509
0
        return WOLFSSL_FAILURE;
15510
0
    }
15511
0
    if (flags & WOLFSSL_NO_PARTIAL_WILDCARDS) {
15512
0
        WOLFSSL_MSG("X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS not yet implemented");
15513
0
        return WOLFSSL_FAILURE;
15514
0
    }
15515
0
    if (flags & WOLFSSL_MULTI_LABEL_WILDCARDS) {
15516
0
        WOLFSSL_MSG("X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS not yet implemented");
15517
0
        return WOLFSSL_FAILURE;
15518
0
    }
15519
15520
0
#ifdef WOLFSSL_SMALL_STACK
15521
0
    dCert = (DecodedCert *)XMALLOC(sizeof(*dCert), x->heap,
15522
0
                                   DYNAMIC_TYPE_DCERT);
15523
0
    if (dCert == NULL) {
15524
0
        WOLFSSL_MSG("\tout of memory");
15525
0
        return WOLFSSL_FATAL_ERROR;
15526
0
    }
15527
0
#endif
15528
15529
0
    InitDecodedCert(dCert, x->derCert->buffer, x->derCert->length, NULL);
15530
0
    ret = ParseCertRelative(dCert, CERT_TYPE, 0, NULL, NULL);
15531
0
    if (ret != 0) {
15532
0
        goto out;
15533
0
    }
15534
15535
    /* Replicate openssl behavior for checklen */
15536
0
    if (chklen == 0) {
15537
0
        chklen = (size_t)(XSTRLEN(chk));
15538
0
    }
15539
0
    else {
15540
0
        for (i = 0; i < (chklen > 1 ? chklen - 1 : chklen); i++) {
15541
0
            if (chk[i] == '\0') {
15542
0
                ret = WOLFSSL_FATAL_ERROR;
15543
0
                goto out;
15544
0
            }
15545
0
        }
15546
0
    }
15547
0
    if (chklen > 1 && (chk[chklen - 1] == '\0')) {
15548
0
        chklen--;
15549
0
    }
15550
15551
0
#ifdef WOLFSSL_IP_ALT_NAME
15552
0
    ret = CheckIPAddr(dCert, (char *)chk);
15553
0
    if (ret == 0) {
15554
0
        goto out;
15555
0
    }
15556
0
#endif /* WOLFSSL_IP_ALT_NAME */
15557
15558
0
    ret = CheckHostName(dCert, (char *)chk, chklen, flags, 0);
15559
15560
0
out:
15561
15562
0
    FreeDecodedCert(dCert);
15563
0
    WC_FREE_VAR_EX(dCert, x->heap, DYNAMIC_TYPE_DCERT);
15564
15565
0
    if (ret != 0)
15566
0
        return WOLFSSL_FAILURE;
15567
0
    return WOLFSSL_SUCCESS;
15568
0
}
15569
15570
15571
int wolfSSL_X509_check_ip_asc(WOLFSSL_X509 *x, const char *ipasc,
15572
        unsigned int flags)
15573
0
{
15574
0
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
15575
0
    WC_DECLARE_VAR(dCert, DecodedCert, 1, 0);
15576
15577
0
    WOLFSSL_ENTER("wolfSSL_X509_check_ip_asc");
15578
15579
    /* flags not yet implemented */
15580
0
    (void)flags;
15581
15582
0
    if ((x == NULL) || (x->derCert == NULL) || (ipasc == NULL)) {
15583
0
        WOLFSSL_MSG("Invalid parameter");
15584
0
    }
15585
0
    else {
15586
0
        ret = WOLFSSL_SUCCESS;
15587
0
    }
15588
15589
0
#ifdef WOLFSSL_SMALL_STACK
15590
0
    if (ret == WOLFSSL_SUCCESS) {
15591
0
        dCert = (DecodedCert *)XMALLOC(sizeof(*dCert), x->heap,
15592
0
                                       DYNAMIC_TYPE_DCERT);
15593
0
        if (dCert == NULL) {
15594
0
            WOLFSSL_MSG("\tout of memory");
15595
0
            ret = WOLFSSL_FAILURE;
15596
0
        }
15597
0
    }
15598
0
#endif
15599
15600
0
    if (ret == WOLFSSL_SUCCESS) {
15601
0
        InitDecodedCert(dCert, x->derCert->buffer, x->derCert->length, NULL);
15602
0
        ret = ParseCertRelative(dCert, CERT_TYPE, 0, NULL, NULL);
15603
0
        if (ret != 0) {
15604
0
            ret = WOLFSSL_FAILURE;
15605
0
        }
15606
0
        else {
15607
0
            ret = CheckIPAddr(dCert, ipasc);
15608
0
            if (ret != 0) {
15609
0
                ret = WOLFSSL_FAILURE;
15610
0
            }
15611
0
            else {
15612
0
                ret = WOLFSSL_SUCCESS;
15613
0
            }
15614
0
        }
15615
0
        FreeDecodedCert(dCert);
15616
0
    }
15617
15618
0
#ifdef WOLFSSL_SMALL_STACK
15619
0
    if (x != NULL) {
15620
0
        XFREE(dCert, x->heap, DYNAMIC_TYPE_DCERT);
15621
0
    }
15622
0
#endif
15623
15624
0
    return ret;
15625
0
}
15626
#endif
15627
15628
#if defined(OPENSSL_EXTRA) && defined(WOLFSSL_CERT_GEN)
15629
int wolfSSL_X509_check_email(WOLFSSL_X509 *x, const char *chk, size_t chkLen,
15630
                             unsigned int flags)
15631
{
15632
    WOLFSSL_X509_NAME *subjName;
15633
    int emailLen;
15634
    char *emailBuf;
15635
15636
    (void)flags;
15637
15638
    WOLFSSL_ENTER("wolfSSL_X509_check_email");
15639
15640
    if ((x == NULL) || (chk == NULL)) {
15641
        WOLFSSL_MSG("Invalid parameter");
15642
        return WOLFSSL_FAILURE;
15643
    }
15644
15645
    subjName = wolfSSL_X509_get_subject_name(x);
15646
    if (subjName == NULL)
15647
        return WOLFSSL_FAILURE;
15648
15649
    /* Call with NULL buffer to get required length. */
15650
    emailLen = wolfSSL_X509_NAME_get_text_by_NID(subjName, WC_NID_emailAddress,
15651
                                                 NULL, 0);
15652
    if (emailLen < 0)
15653
        return WOLFSSL_FAILURE;
15654
15655
    ++emailLen; /* Add 1 for the NUL. */
15656
15657
    emailBuf = (char*)XMALLOC(emailLen, x->heap, DYNAMIC_TYPE_OPENSSL);
15658
    if (emailBuf == NULL)
15659
        return WOLFSSL_FAILURE;
15660
15661
    emailLen = wolfSSL_X509_NAME_get_text_by_NID(subjName, WC_NID_emailAddress,
15662
                                                 emailBuf, emailLen);
15663
    if (emailLen < 0) {
15664
        XFREE(emailBuf, x->heap, DYNAMIC_TYPE_OPENSSL);
15665
        return WOLFSSL_FAILURE;
15666
    }
15667
15668
    if (chkLen == 0)
15669
        chkLen = XSTRLEN(chk);
15670
15671
    if (chkLen != (size_t)emailLen
15672
     || XSTRNCMP(chk, emailBuf, chkLen)) {
15673
        XFREE(emailBuf, x->heap, DYNAMIC_TYPE_OPENSSL);
15674
        return WOLFSSL_FAILURE;
15675
    }
15676
15677
    XFREE(emailBuf, x->heap, DYNAMIC_TYPE_OPENSSL);
15678
    return WOLFSSL_SUCCESS;
15679
}
15680
#endif /* OPENSSL_EXTRA && WOLFSSL_CERT_GEN */
15681
15682
#if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) || defined(WOLFSSL_HAPROXY) \
15683
    || defined(OPENSSL_EXTRA) || defined(HAVE_LIGHTY)
15684
15685
int wolfSSL_X509_NAME_digest(const WOLFSSL_X509_NAME *name,
15686
        const WOLFSSL_EVP_MD *type, unsigned char *md, unsigned int *len)
15687
0
{
15688
0
    WOLFSSL_ENTER("wolfSSL_X509_NAME_digest");
15689
15690
0
    if (name == NULL || type == NULL)
15691
0
        return WOLFSSL_FAILURE;
15692
15693
0
#if !defined(NO_FILESYSTEM) && !defined(NO_PWDBASED)
15694
0
    return wolfSSL_EVP_Digest((unsigned char*)name->name,
15695
0
                              name->sz, md, len, type, NULL);
15696
#else
15697
    (void)md;
15698
    (void)len;
15699
    return NOT_COMPILED_IN;
15700
#endif
15701
0
}
15702
15703
#endif /* OPENSSL_ALL || WOLFSSL_NGINX || WOLFSSL_HAPROXY ||
15704
    OPENSSL_EXTRA || HAVE_LIGHTY */
15705
15706
#if defined(WOLFSSL_NGINX) || defined(WOLFSSL_HAPROXY) || \
15707
    defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL)
15708
15709
void wolfSSL_X509_email_free(WOLF_STACK_OF(WOLFSSL_STRING) *sk)
15710
0
{
15711
0
    wolfSSL_sk_pop_free(sk, NULL);
15712
0
}
15713
15714
static int x509_aia_append_string(WOLFSSL_STACK* list, const byte* uri,
15715
        word32 uriSz)
15716
0
{
15717
0
    WOLFSSL_STRING url = (WOLFSSL_STRING)XMALLOC(uriSz + 1, NULL,
15718
0
            DYNAMIC_TYPE_OPENSSL);
15719
0
    if (url == NULL)
15720
0
        return -1;
15721
0
    XMEMCPY(url, uri, uriSz);
15722
0
    url[uriSz] = '\0';
15723
15724
0
    if (wolfSSL_sk_push(list, url) <= 0) {
15725
0
        XFREE(url, NULL, DYNAMIC_TYPE_OPENSSL);
15726
0
        return -1;
15727
0
    }
15728
15729
0
    return 0;
15730
0
}
15731
15732
static WOLFSSL_STACK* x509_get1_aia_by_method(WOLFSSL_X509* x, word32 method,
15733
    const byte* fallback, int fallbackSz)
15734
0
{
15735
0
    WOLFSSL_STACK* ret = NULL;
15736
0
    int i;
15737
15738
0
    if (x == NULL)
15739
0
        return NULL;
15740
15741
0
    ret = wolfSSL_sk_WOLFSSL_STRING_new();
15742
0
    if (ret == NULL)
15743
0
        return NULL;
15744
15745
    /* Build from multi-entry list when available; otherwise fall back to the
15746
     * legacy single-entry fields to preserve previous behavior. */
15747
0
    if (x->authInfoListSz > 0) {
15748
0
        for (i = 0; i < x->authInfoListSz; i++) {
15749
0
            if (x->authInfoList[i].method != method ||
15750
0
                    x->authInfoList[i].uri == NULL ||
15751
0
                    x->authInfoList[i].uriSz == 0) {
15752
0
                continue;
15753
0
            }
15754
15755
0
            if (x509_aia_append_string(ret, x->authInfoList[i].uri,
15756
0
                    x->authInfoList[i].uriSz) != 0) {
15757
0
                wolfSSL_X509_email_free(ret);
15758
0
                return NULL;
15759
0
            }
15760
0
        }
15761
0
    }
15762
    /* Only use fallback when nothing was found in the list */
15763
0
    if (wolfSSL_sk_num(ret) == 0 && fallback != NULL && fallbackSz > 0) {
15764
0
        if (x509_aia_append_string(ret, fallback, (word32)fallbackSz) != 0) {
15765
0
            wolfSSL_X509_email_free(ret);
15766
0
            return NULL;
15767
0
        }
15768
0
    }
15769
15770
    /* Return NULL when empty */
15771
0
    if (wolfSSL_sk_num(ret) == 0) {
15772
0
        wolfSSL_X509_email_free(ret);
15773
0
        ret = NULL;
15774
0
    }
15775
15776
0
    return ret;
15777
0
}
15778
15779
WOLF_STACK_OF(WOLFSSL_STRING) *wolfSSL_X509_get1_ocsp(WOLFSSL_X509 *x)
15780
0
{
15781
0
    if (x == NULL)
15782
0
        return NULL;
15783
0
    return x509_get1_aia_by_method(x, AIA_OCSP_OID, x->authInfo, x->authInfoSz);
15784
0
}
15785
15786
int wolfSSL_X509_get_aia_overflow(WOLFSSL_X509 *x)
15787
0
{
15788
0
    int overflow = 0;
15789
15790
0
    WOLFSSL_ENTER("wolfSSL_X509_get_aia_overflow");
15791
15792
0
    if (x != NULL) {
15793
0
        overflow = x->authInfoListOverflow;
15794
0
    }
15795
15796
0
    WOLFSSL_LEAVE("wolfSSL_X509_get_aia_overflow", overflow);
15797
15798
0
    return overflow;
15799
0
}
15800
15801
#ifdef WOLFSSL_ASN_CA_ISSUER
15802
WOLF_STACK_OF(WOLFSSL_STRING) *wolfSSL_X509_get1_ca_issuers(WOLFSSL_X509 *x)
15803
0
{
15804
0
    if (x == NULL)
15805
0
        return NULL;
15806
0
    return x509_get1_aia_by_method(x, AIA_CA_ISSUER_OID, x->authInfoCaIssuer,
15807
0
            x->authInfoCaIssuerSz);
15808
0
}
15809
#endif /* WOLFSSL_ASN_CA_ISSUER */
15810
15811
int wolfSSL_X509_check_issued(WOLFSSL_X509 *issuer, WOLFSSL_X509 *subject)
15812
0
{
15813
0
    WOLFSSL_X509_NAME *issuerName = wolfSSL_X509_get_issuer_name(subject);
15814
0
    WOLFSSL_X509_NAME *subjectName = wolfSSL_X509_get_subject_name(issuer);
15815
15816
0
    if (issuerName == NULL || subjectName == NULL)
15817
0
        return WOLFSSL_X509_V_ERR_SUBJECT_ISSUER_MISMATCH;
15818
15819
    /* Literal matching of encoded names and key ids. */
15820
0
    if (issuerName->sz != subjectName->sz ||
15821
0
           XMEMCMP(issuerName->name, subjectName->name, subjectName->sz) != 0) {
15822
0
        return WOLFSSL_X509_V_ERR_SUBJECT_ISSUER_MISMATCH;
15823
0
    }
15824
15825
0
    if (subject->authKeyId != NULL && issuer->subjKeyId != NULL) {
15826
0
        if (subject->authKeyIdSz != issuer->subjKeyIdSz ||
15827
0
                XMEMCMP(subject->authKeyId, issuer->subjKeyId,
15828
0
                        issuer->subjKeyIdSz) != 0) {
15829
0
            return WOLFSSL_X509_V_ERR_SUBJECT_ISSUER_MISMATCH;
15830
0
        }
15831
0
    }
15832
15833
0
    return WOLFSSL_X509_V_OK;
15834
0
}
15835
15836
#endif /* WOLFSSL_NGINX || WOLFSSL_HAPROXY || OPENSSL_EXTRA || OPENSSL_ALL */
15837
15838
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
15839
    defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
15840
WOLFSSL_X509* wolfSSL_X509_dup(WOLFSSL_X509 *x)
15841
0
{
15842
0
    WOLFSSL_ENTER("wolfSSL_X509_dup");
15843
15844
0
    if (x == NULL) {
15845
0
        WOLFSSL_MSG("Error: NULL input");
15846
0
        return NULL;
15847
0
    }
15848
15849
0
    if (x->derCert == NULL) {
15850
0
        WOLFSSL_MSG("Error: NULL derCert parameter");
15851
0
        return NULL;
15852
0
    }
15853
15854
0
    return wolfSSL_X509_d2i_ex(NULL, x->derCert->buffer, x->derCert->length,
15855
0
        x->heap);
15856
0
}
15857
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL || KEEP_PEER_CERT || \
15858
          SESSION_CERTS */
15859
15860
#if defined(OPENSSL_EXTRA)
15861
int wolfSSL_X509_check_ca(WOLFSSL_X509 *x509)
15862
0
{
15863
0
    WOLFSSL_ENTER("wolfSSL_X509_check_ca");
15864
15865
0
    if (x509 == NULL)
15866
0
        return WOLFSSL_FAILURE;
15867
0
    if (x509->isCa)
15868
0
        return 1;
15869
0
    if (x509->extKeyUsageCrit)
15870
0
        return 4;
15871
15872
0
    return 0;
15873
0
}
15874
#endif /* OPENSSL_EXTRA */
15875
15876
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
15877
long wolfSSL_X509_get_version(const WOLFSSL_X509 *x509)
15878
0
{
15879
0
    int version = 0;
15880
15881
0
    WOLFSSL_ENTER("wolfSSL_X509_get_version");
15882
15883
0
    if (x509 == NULL) {
15884
0
        WOLFSSL_MSG("invalid parameter");
15885
0
        return 0L;
15886
0
    }
15887
0
    version = x509->version;
15888
0
    if (version != 0)
15889
0
        return (long)version - 1L;
15890
15891
0
    return 0L;
15892
0
}
15893
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
15894
15895
#if defined(OPENSSL_EXTRA)
15896
int wolfSSL_X509_get_signature_nid(const WOLFSSL_X509 *x)
15897
0
{
15898
0
    if (x == NULL)
15899
0
        return 0;
15900
15901
0
    return oid2nid((word32)x->sigOID, oidSigType);
15902
0
}
15903
#endif  /* OPENSSL_EXTRA */
15904
15905
#if defined(OPENSSL_EXTRA)
15906
WOLFSSL_STACK* wolfSSL_sk_X509_new(WOLF_SK_COMPARE_CB(WOLFSSL_X509, cb))
15907
0
{
15908
0
    (void)cb;
15909
0
    return wolfSSL_sk_X509_new_null();
15910
0
}
15911
15912
WOLFSSL_STACK* wolfSSL_sk_X509_new_null(void)
15913
0
{
15914
0
    WOLFSSL_STACK* s = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK), NULL,
15915
0
            DYNAMIC_TYPE_OPENSSL);
15916
0
    if (s != NULL) {
15917
0
        XMEMSET(s, 0, sizeof(*s));
15918
0
        s->type = STACK_TYPE_X509;
15919
0
    }
15920
15921
0
    return s;
15922
0
}
15923
#endif  /* OPENSSL_EXTRA */
15924
15925
#ifdef OPENSSL_ALL
15926
15927
WOLFSSL_STACK* wolfSSL_sk_X509_OBJECT_new(void)
15928
0
{
15929
0
    WOLFSSL_STACK* s = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK), NULL,
15930
0
            DYNAMIC_TYPE_OPENSSL);
15931
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_new");
15932
0
    if (s != NULL) {
15933
0
        XMEMSET(s, 0, sizeof(*s));
15934
0
        s->type = STACK_TYPE_X509_OBJ;
15935
0
    }
15936
0
    return s;
15937
0
}
15938
15939
void wolfSSL_sk_X509_OBJECT_free(WOLFSSL_STACK* s)
15940
0
{
15941
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_free");
15942
0
    wolfSSL_sk_free(s);
15943
0
}
15944
15945
void wolfSSL_sk_X509_OBJECT_pop_free(WOLFSSL_STACK* s,
15946
        void (*f) (WOLFSSL_X509_OBJECT*))
15947
0
{
15948
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_pop_free");
15949
0
    wolfSSL_sk_pop_free(s, (wolfSSL_sk_freefunc)f);
15950
0
}
15951
15952
int wolfSSL_sk_X509_OBJECT_push(WOLFSSL_STACK* sk, WOLFSSL_X509_OBJECT* obj)
15953
0
{
15954
0
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_push");
15955
15956
0
    if (sk == NULL || obj == NULL) {
15957
0
        return WOLFSSL_FAILURE;
15958
0
    }
15959
15960
0
    return wolfSSL_sk_push(sk, obj);
15961
0
}
15962
15963
#endif /* OPENSSL_ALL */
15964
15965
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
15966
/* unlike wolfSSL_X509_NAME_dup this does not malloc a duplicate, only deep
15967
 * copy. "to" is expected to be a fresh blank name, if not pointers could be
15968
 * lost */
15969
int wolfSSL_X509_NAME_copy(const WOLFSSL_X509_NAME* from, WOLFSSL_X509_NAME* to)
15970
5.95k
{
15971
5.95k
    int i;
15972
15973
5.95k
    WOLFSSL_ENTER("wolfSSL_X509_NAME_copy");
15974
15975
5.95k
    if (from == NULL || to == NULL) {
15976
0
        WOLFSSL_MSG("NULL parameter");
15977
0
        return BAD_FUNC_ARG;
15978
0
    }
15979
15980
5.95k
#if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) || defined(HAVE_LIGHTY)
15981
5.95k
    if (from->rawLen > 0) {
15982
5.52k
        if (from->rawLen > ASN_NAME_MAX) {
15983
0
            WOLFSSL_MSG("Bad raw size");
15984
0
            return BAD_FUNC_ARG;
15985
0
        }
15986
5.52k
        XMEMCPY(to->raw, from->raw, from->rawLen);
15987
5.52k
        to->rawLen = from->rawLen;
15988
5.52k
    }
15989
5.95k
#endif
15990
15991
5.95k
    if (from->dynamicName) {
15992
21
        to->name = (char*)XMALLOC(from->sz, to->heap, DYNAMIC_TYPE_SUBJECT_CN);
15993
21
        if (to->name == NULL)
15994
0
            return WOLFSSL_FAILURE;
15995
21
        to->dynamicName = 1;
15996
21
    }
15997
5.95k
    XMEMCPY(to->name, from->name, from->sz);
15998
5.95k
    to->sz = from->sz;
15999
16000
101k
    for (i = 0; i < MAX_NAME_ENTRIES; i++) {
16001
95.2k
        WOLFSSL_X509_NAME_ENTRY* ne = wolfSSL_X509_NAME_get_entry(from, i);
16002
95.2k
        if (ne != NULL) {
16003
4.36k
            if (wolfSSL_X509_NAME_add_entry(to, ne, i, 1) != WOLFSSL_SUCCESS) {
16004
0
                return WOLFSSL_FAILURE;
16005
0
            }
16006
4.36k
        }
16007
95.2k
    }
16008
5.95k
    to->entrySz = from->entrySz;
16009
5.95k
    return WOLFSSL_SUCCESS;
16010
5.95k
}
16011
16012
16013
/* copies over information from "name" to the "cert" subject name
16014
 * returns WOLFSSL_SUCCESS on success */
16015
int wolfSSL_X509_set_subject_name(WOLFSSL_X509 *cert, WOLFSSL_X509_NAME *name)
16016
2.97k
{
16017
2.97k
    WOLFSSL_ENTER("wolfSSL_X509_set_subject_name");
16018
2.97k
    if (cert == NULL || name == NULL)
16019
0
        return WOLFSSL_FAILURE;
16020
16021
2.97k
    FreeX509Name(&cert->subject);
16022
2.97k
    InitX509Name(&cert->subject, 0, cert->heap);
16023
16024
2.97k
    if (wolfSSL_X509_NAME_copy(name, &cert->subject) != WOLFSSL_SUCCESS) {
16025
0
        FreeX509Name(&cert->subject);
16026
0
        return WOLFSSL_FAILURE;
16027
0
    }
16028
16029
2.97k
    cert->subject.x509 = cert;
16030
2.97k
    return WOLFSSL_SUCCESS;
16031
2.97k
}
16032
16033
16034
/* copies over information from "name" to the "cert" issuer name
16035
 * returns WOLFSSL_SUCCESS on success */
16036
int wolfSSL_X509_set_issuer_name(WOLFSSL_X509 *cert, WOLFSSL_X509_NAME *name)
16037
2.97k
{
16038
2.97k
    WOLFSSL_ENTER("wolfSSL_X509_set_issuer_name");
16039
2.97k
    if (cert == NULL || name == NULL)
16040
0
        return WOLFSSL_FAILURE;
16041
16042
2.97k
    FreeX509Name(&cert->issuer);
16043
2.97k
    InitX509Name(&cert->issuer, 0, cert->heap);
16044
16045
2.97k
    if (wolfSSL_X509_NAME_copy(name, &cert->issuer) != WOLFSSL_SUCCESS) {
16046
0
        FreeX509Name(&cert->issuer);
16047
0
        return WOLFSSL_FAILURE;
16048
0
    }
16049
16050
2.97k
    cert->issuer.x509 = cert;
16051
2.97k
    cert->issuerSet = 1;
16052
16053
2.97k
    return WOLFSSL_SUCCESS;
16054
2.97k
}
16055
16056
16057
int wolfSSL_X509_set_notAfter(WOLFSSL_X509* x509, const WOLFSSL_ASN1_TIME* t)
16058
0
{
16059
0
    if (x509 == NULL || t == NULL) {
16060
0
        return WOLFSSL_FAILURE;
16061
0
    }
16062
16063
0
    x509->notAfter.type = t->type;
16064
0
    x509->notAfter.length = t->length;
16065
16066
0
    XMEMCPY(x509->notAfter.data, t->data, CTC_DATE_SIZE);
16067
16068
0
    return WOLFSSL_SUCCESS;
16069
0
}
16070
16071
int wolfSSL_X509_set_notBefore(WOLFSSL_X509* x509, const WOLFSSL_ASN1_TIME* t)
16072
0
{
16073
0
    if (x509 == NULL || t == NULL) {
16074
0
        return WOLFSSL_FAILURE;
16075
0
    }
16076
16077
0
    x509->notBefore.type = t->type;
16078
0
    x509->notBefore.length = t->length;
16079
16080
0
    XMEMCPY(x509->notBefore.data, t->data, CTC_DATE_SIZE);
16081
16082
0
    return WOLFSSL_SUCCESS;
16083
0
}
16084
16085
int wolfSSL_X509_set1_notAfter(WOLFSSL_X509* x509, const WOLFSSL_ASN1_TIME *t)
16086
0
{
16087
0
    return wolfSSL_X509_set_notAfter(x509, t);
16088
0
}
16089
16090
int wolfSSL_X509_set1_notBefore(WOLFSSL_X509* x509, const WOLFSSL_ASN1_TIME *t)
16091
0
{
16092
0
    return wolfSSL_X509_set_notBefore(x509, t);
16093
0
}
16094
16095
int wolfSSL_X509_set_serialNumber(WOLFSSL_X509* x509, WOLFSSL_ASN1_INTEGER* s)
16096
0
{
16097
0
    WOLFSSL_ENTER("wolfSSL_X509_set_serialNumber");
16098
0
    if (x509 == NULL || s == NULL || s->length >= EXTERNAL_SERIAL_SIZE)
16099
0
        return WOLFSSL_FAILURE;
16100
16101
    /* WOLFSSL_ASN1_INTEGER has type | size | data
16102
     * Sanity check that the data is actually in ASN format */
16103
0
    if (s->length < 3 || s->data[0] != ASN_INTEGER ||
16104
0
            s->data[1] != s->length - 2) {
16105
0
        return WOLFSSL_FAILURE;
16106
0
    }
16107
0
    XMEMCPY(x509->serial, s->data + 2, s->length - 2);
16108
0
    x509->serialSz = s->length - 2;
16109
0
    x509->serial[x509->serialSz] = 0;
16110
16111
0
    return WOLFSSL_SUCCESS;
16112
0
}
16113
16114
16115
int wolfSSL_X509_set_pubkey(WOLFSSL_X509 *cert, WOLFSSL_EVP_PKEY *pkey)
16116
0
{
16117
0
    byte* p = NULL;
16118
0
    int derSz = 0;
16119
0
    WOLFSSL_ENTER("wolfSSL_X509_set_pubkey");
16120
16121
0
    if (cert == NULL || pkey == NULL)
16122
0
        return WOLFSSL_FAILURE;
16123
16124
    /* Regenerate since pkey->pkey.ptr may contain private key */
16125
0
    switch (pkey->type) {
16126
0
#if (defined(WOLFSSL_KEY_GEN) || defined(OPENSSL_EXTRA)) && !defined(NO_RSA)
16127
0
    case WC_EVP_PKEY_RSA:
16128
0
        {
16129
0
            RsaKey* rsa;
16130
16131
0
            if (pkey->rsa == NULL || pkey->rsa->internal == NULL)
16132
0
                return WOLFSSL_FAILURE;
16133
16134
0
            rsa = (RsaKey*)pkey->rsa->internal;
16135
0
            derSz = wc_RsaPublicKeyDerSize(rsa, 1);
16136
0
            if (derSz <= 0)
16137
0
                return WOLFSSL_FAILURE;
16138
16139
0
            p = (byte*)XMALLOC(derSz, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16140
0
            if (p == NULL)
16141
0
                return WOLFSSL_FAILURE;
16142
16143
0
            if ((derSz = wc_RsaKeyToPublicDer(rsa, p, (word32)derSz)) <= 0) {
16144
0
                XFREE(p, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16145
0
                return WOLFSSL_FAILURE;
16146
0
            }
16147
0
            cert->pubKeyOID = RSAk;
16148
0
        }
16149
0
        break;
16150
0
#endif /* (WOLFSSL_KEY_GEN || OPENSSL_EXTRA) && !NO_RSA */
16151
#if !defined(HAVE_SELFTEST) && (defined(WOLFSSL_KEY_GEN) || \
16152
        defined(WOLFSSL_CERT_GEN)) && !defined(NO_DSA)
16153
    case WC_EVP_PKEY_DSA:
16154
        {
16155
            DsaKey* dsa;
16156
16157
            if (pkey->dsa == NULL || pkey->dsa->internal == NULL)
16158
                return WOLFSSL_FAILURE;
16159
16160
            dsa = (DsaKey*)pkey->dsa->internal;
16161
            /* size of pub, priv, p, q, g + ASN.1 additional information */
16162
            derSz = 5 * mp_unsigned_bin_size(&dsa->g) + MAX_ALGO_SZ;
16163
            p = (byte*)XMALLOC(derSz, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16164
            if (p == NULL)
16165
                return WOLFSSL_FAILURE;
16166
16167
            if ((derSz = wc_DsaKeyToPublicDer(dsa, p, (word32)derSz)) <= 0) {
16168
                XFREE(p, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16169
                return WOLFSSL_FAILURE;
16170
            }
16171
            cert->pubKeyOID = DSAk;
16172
        }
16173
        break;
16174
#endif /* !HAVE_SELFTEST && (WOLFSSL_KEY_GEN || WOLFSSL_CERT_GEN) && !NO_DSA */
16175
0
#ifdef HAVE_ECC
16176
0
    case WC_EVP_PKEY_EC:
16177
0
        {
16178
0
            ecc_key* ecc;
16179
16180
0
            if (pkey->ecc == NULL || pkey->ecc->internal == NULL)
16181
0
                return WOLFSSL_FAILURE;
16182
16183
0
            ecc = (ecc_key*)pkey->ecc->internal;
16184
0
            derSz = wc_EccPublicKeyDerSize(ecc, 1);
16185
0
            if (derSz <= 0)
16186
0
                return WOLFSSL_FAILURE;
16187
16188
0
            p = (byte*)XMALLOC(derSz, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16189
0
            if (p == NULL)
16190
0
                return WOLFSSL_FAILURE;
16191
16192
0
            if ((derSz = wc_EccPublicKeyToDer(ecc, p, (word32)derSz, 1)) <= 0) {
16193
0
                XFREE(p, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16194
0
                return WOLFSSL_FAILURE;
16195
0
            }
16196
0
            cert->pubKeyOID = ECDSAk;
16197
0
        }
16198
0
        break;
16199
0
#endif
16200
0
    default:
16201
0
        return WOLFSSL_FAILURE;
16202
0
    }
16203
0
    XFREE(cert->pubKey.buffer, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16204
0
    cert->pubKey.buffer = p;
16205
0
    cert->pubKey.length = (unsigned int)derSz;
16206
16207
0
    return WOLFSSL_SUCCESS;
16208
0
}
16209
16210
int wolfSSL_X509_set_version(WOLFSSL_X509* x509, long v)
16211
0
{
16212
0
    WOLFSSL_ENTER("wolfSSL_X509_set_version");
16213
0
    if ((x509 == NULL) || (v < 0) || (v >= INT_MAX)) {
16214
0
        return WOLFSSL_FAILURE;
16215
0
    }
16216
0
    x509->version = (int) v + 1;
16217
16218
0
    return WOLFSSL_SUCCESS;
16219
0
}
16220
16221
#ifdef WOLFSSL_CERT_EXT
16222
/* Set Subject Key Identifier from raw bytes.
16223
 *
16224
 * x509  - Certificate to modify
16225
 * skid  - Raw SKID bytes
16226
 * skidSz - Size of SKID in bytes
16227
 *
16228
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
16229
 */
16230
int wolfSSL_X509_set_subject_key_id(WOLFSSL_X509* x509,
16231
    const unsigned char* skid, int skidSz)
16232
0
{
16233
0
    WOLFSSL_ENTER("wolfSSL_X509_set_subject_key_id");
16234
16235
0
    if (x509 == NULL || skid == NULL || skidSz <= 0) {
16236
0
        return WOLFSSL_FAILURE;
16237
0
    }
16238
16239
    /* Allocate/reallocate memory for subjKeyId */
16240
0
    if (x509->subjKeyId == NULL || (int)x509->subjKeyIdSz < skidSz) {
16241
0
        if (x509->subjKeyId != NULL) {
16242
0
            XFREE(x509->subjKeyId, x509->heap, DYNAMIC_TYPE_X509_EXT);
16243
0
        }
16244
0
        x509->subjKeyId = (byte*)XMALLOC((word32)skidSz, x509->heap,
16245
0
                                          DYNAMIC_TYPE_X509_EXT);
16246
0
        if (x509->subjKeyId == NULL) {
16247
0
            return WOLFSSL_FAILURE;
16248
0
        }
16249
0
    }
16250
16251
0
    XMEMCPY(x509->subjKeyId, skid, (word32)skidSz);
16252
0
    x509->subjKeyIdSz = (word32)skidSz;
16253
0
    x509->subjKeyIdSet = 1;
16254
16255
0
    return WOLFSSL_SUCCESS;
16256
0
}
16257
16258
#ifndef NO_SHA
16259
/* Set Subject Key Identifier by computing SHA-1 hash of the public key.
16260
 *
16261
 * x509 - Certificate to modify (must have public key set)
16262
 *
16263
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
16264
 */
16265
int wolfSSL_X509_set_subject_key_id_ex(WOLFSSL_X509* x509)
16266
0
{
16267
0
    byte hash[WC_SHA_DIGEST_SIZE];
16268
0
    int ret;
16269
16270
0
    WOLFSSL_ENTER("wolfSSL_X509_set_subject_key_id_ex");
16271
16272
0
    if (x509 == NULL) {
16273
0
        return WOLFSSL_FAILURE;
16274
0
    }
16275
16276
    /* Check if public key has been set */
16277
0
    if (x509->pubKey.buffer == NULL || x509->pubKey.length == 0) {
16278
0
        WOLFSSL_MSG("Public key not set");
16279
0
        return WOLFSSL_FAILURE;
16280
0
    }
16281
16282
    /* Compute SHA-1 hash of the public key */
16283
0
    ret = wc_ShaHash(x509->pubKey.buffer, x509->pubKey.length, hash);
16284
0
    if (ret != 0) {
16285
0
        WOLFSSL_MSG("wc_ShaHash failed");
16286
0
        return WOLFSSL_FAILURE;
16287
0
    }
16288
16289
0
    return wolfSSL_X509_set_subject_key_id(x509, hash, WC_SHA_DIGEST_SIZE);
16290
0
}
16291
#endif /* !NO_SHA */
16292
16293
/* Set Authority Key Identifier from raw bytes.
16294
 *
16295
 * x509   - Certificate to modify
16296
 * akid   - Raw AKID bytes
16297
 * akidSz - Size of AKID in bytes
16298
 *
16299
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
16300
 */
16301
int wolfSSL_X509_set_authority_key_id(WOLFSSL_X509* x509,
16302
    const unsigned char* akid, int akidSz)
16303
0
{
16304
0
    WOLFSSL_ENTER("wolfSSL_X509_set_authority_key_id");
16305
16306
0
    if (x509 == NULL || akid == NULL || akidSz <= 0) {
16307
0
        return WOLFSSL_FAILURE;
16308
0
    }
16309
16310
    /* Allocate/reallocate memory for authKeyIdSrc */
16311
0
    if (x509->authKeyIdSrc == NULL || (int)x509->authKeyIdSrcSz < akidSz) {
16312
0
        if (x509->authKeyIdSrc != NULL) {
16313
0
            XFREE(x509->authKeyIdSrc, x509->heap, DYNAMIC_TYPE_X509_EXT);
16314
0
        }
16315
0
        x509->authKeyIdSrc = (byte*)XMALLOC((word32)akidSz, x509->heap,
16316
0
                                             DYNAMIC_TYPE_X509_EXT);
16317
0
        if (x509->authKeyIdSrc == NULL) {
16318
0
            return WOLFSSL_FAILURE;
16319
0
        }
16320
0
    }
16321
16322
0
    XMEMCPY(x509->authKeyIdSrc, akid, (word32)akidSz);
16323
0
    x509->authKeyIdSrcSz = (word32)akidSz;
16324
0
    x509->authKeyId = x509->authKeyIdSrc;
16325
0
    x509->authKeyIdSz = (word32)akidSz;
16326
0
    x509->authKeyIdSet = 1;
16327
16328
0
    return WOLFSSL_SUCCESS;
16329
0
}
16330
16331
#ifndef NO_SHA
16332
/* Set Authority Key Identifier from issuer certificate.
16333
 * Extracts SKID from issuer (or computes from issuer's public key).
16334
 *
16335
 * x509   - Certificate to modify
16336
 * issuer - Issuer certificate
16337
 *
16338
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
16339
 */
16340
int wolfSSL_X509_set_authority_key_id_ex(WOLFSSL_X509* x509,
16341
    WOLFSSL_X509* issuer)
16342
0
{
16343
0
    byte hash[WC_SHA_DIGEST_SIZE];
16344
0
    int ret;
16345
16346
0
    WOLFSSL_ENTER("wolfSSL_X509_set_authority_key_id_ex");
16347
16348
0
    if (x509 == NULL || issuer == NULL) {
16349
0
        return WOLFSSL_FAILURE;
16350
0
    }
16351
16352
    /* First try to use issuer's SKID if it's set */
16353
0
    if (issuer->subjKeyIdSet && issuer->subjKeyId != NULL &&
16354
0
        issuer->subjKeyIdSz > 0) {
16355
0
        return wolfSSL_X509_set_authority_key_id(x509, issuer->subjKeyId,
16356
0
                                                  (int)issuer->subjKeyIdSz);
16357
0
    }
16358
16359
    /* Otherwise compute from issuer's public key */
16360
0
    if (issuer->pubKey.buffer == NULL || issuer->pubKey.length == 0) {
16361
0
        WOLFSSL_MSG("Issuer public key not available");
16362
0
        return WOLFSSL_FAILURE;
16363
0
    }
16364
16365
0
    ret = wc_ShaHash(issuer->pubKey.buffer, issuer->pubKey.length, hash);
16366
0
    if (ret != 0) {
16367
0
        WOLFSSL_MSG("wc_ShaHash failed");
16368
0
        return WOLFSSL_FAILURE;
16369
0
    }
16370
16371
0
    return wolfSSL_X509_set_authority_key_id(x509, hash, WC_SHA_DIGEST_SIZE);
16372
0
}
16373
#endif /* !NO_SHA */
16374
#endif /* WOLFSSL_CERT_EXT */
16375
16376
#ifndef IGNORE_NETSCAPE_CERT_TYPE
16377
/* Set Netscape Certificate Type extension.
16378
 *
16379
 * x509       - Certificate to modify
16380
 * nsCertType - Bitwise OR of NS_SSL_CLIENT, NS_SSL_SERVER, etc.
16381
 *
16382
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
16383
 */
16384
int wolfSSL_X509_set_ns_cert_type(WOLFSSL_X509* x509, int nsCertType)
16385
0
{
16386
0
    WOLFSSL_ENTER("wolfSSL_X509_set_ns_cert_type");
16387
16388
0
    if (x509 == NULL) {
16389
0
        return WOLFSSL_FAILURE;
16390
0
    }
16391
16392
0
    x509->nsCertType = (byte)nsCertType;
16393
16394
0
    return WOLFSSL_SUCCESS;
16395
0
}
16396
#endif /* !IGNORE_NETSCAPE_CERT_TYPE */
16397
16398
#endif /* (OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL) && WOLFSSL_CERT_GEN */
16399
16400
#if (defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)) &&           \
16401
    defined(WOLFSSL_CERT_GEN) && defined(WOLFSSL_CERT_REQ)
16402
16403
void wolfSSL_X509V3_set_ctx(WOLFSSL_X509V3_CTX* ctx, WOLFSSL_X509* issuer,
16404
        WOLFSSL_X509* subject, WOLFSSL_X509* req, WOLFSSL_X509_CRL* crl,
16405
        int flag)
16406
{
16407
    int ret = WOLFSSL_SUCCESS;
16408
    WOLFSSL_ENTER("wolfSSL_X509V3_set_ctx");
16409
    if (!ctx) {
16410
        ret = WOLFSSL_FAILURE;
16411
        WOLFSSL_MSG("wolfSSL_X509V3_set_ctx() called with null ctx.");
16412
    }
16413
16414
    if (ret == WOLFSSL_SUCCESS && (ctx->x509 != NULL)) {
16415
        ret = WOLFSSL_FAILURE;
16416
        WOLFSSL_MSG("wolfSSL_X509V3_set_ctx() called "
16417
                    "with ctx->x509 already allocated.");
16418
    }
16419
16420
    if (ret == WOLFSSL_SUCCESS) {
16421
        ctx->x509 = wolfSSL_X509_new_ex(
16422
            (issuer && issuer->heap) ? issuer->heap :
16423
            (subject && subject->heap) ? subject->heap :
16424
            (req && req->heap) ? req->heap :
16425
            NULL);
16426
        if (!ctx->x509) {
16427
            ret = WOLFSSL_FAILURE;
16428
            WOLFSSL_MSG("wolfSSL_X509_new_ex() failed "
16429
                        "in wolfSSL_X509V3_set_ctx().");
16430
        }
16431
    }
16432
16433
    /* Set parameters in ctx as long as ret == WOLFSSL_SUCCESS */
16434
    if (ret == WOLFSSL_SUCCESS && issuer)
16435
        ret = wolfSSL_X509_set_issuer_name(ctx->x509, &issuer->issuer);
16436
16437
    if (ret == WOLFSSL_SUCCESS && subject)
16438
        ret = wolfSSL_X509_set_subject_name(ctx->x509, &subject->subject);
16439
16440
    if (ret == WOLFSSL_SUCCESS && req) {
16441
        WOLFSSL_MSG("req not implemented.");
16442
    }
16443
16444
    if (ret == WOLFSSL_SUCCESS && crl) {
16445
        WOLFSSL_MSG("crl not implemented.");
16446
    }
16447
16448
    if (ret == WOLFSSL_SUCCESS && flag) {
16449
        WOLFSSL_MSG("flag not implemented.");
16450
    }
16451
16452
    if (ret != WOLFSSL_SUCCESS) {
16453
        WOLFSSL_MSG("Error setting WOLFSSL_X509V3_CTX parameters.");
16454
    }
16455
}
16456
16457
#ifndef NO_BIO
16458
int wolfSSL_i2d_X509_REQ(WOLFSSL_X509* req, unsigned char** out)
16459
{
16460
    int derSz = 0;
16461
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
16462
    WOLFSSL_BIO* bio = NULL;
16463
    WOLFSSL_ENTER("wolfSSL_i2d_X509_REQ");
16464
16465
    if (req == NULL || out == NULL) {
16466
        return BAD_FUNC_ARG;
16467
    }
16468
16469
    if (!(bio = wolfSSL_BIO_new(wolfSSL_BIO_s_mem()))) {
16470
        return WOLFSSL_FAILURE;
16471
    }
16472
16473
    if (wolfSSL_i2d_X509_REQ_bio(bio, req) != WOLFSSL_SUCCESS) {
16474
        WOLFSSL_MSG("wolfSSL_i2d_X509_REQ_bio error");
16475
        goto cleanup;
16476
    }
16477
16478
    derSz = wolfSSL_BIO_get_len(bio);
16479
16480
    if (*out == NULL) {
16481
        *out = (unsigned char*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_OPENSSL);
16482
        if (!*out) {
16483
            WOLFSSL_MSG("malloc error");
16484
            ret = MEMORY_E;
16485
            goto cleanup;
16486
        }
16487
    }
16488
16489
    if (wolfSSL_BIO_read(bio, *out, derSz) != derSz) {
16490
        WOLFSSL_MSG("wolfSSL_BIO_read error");
16491
        goto cleanup;
16492
    }
16493
16494
    ret = derSz;
16495
cleanup:
16496
    wolfSSL_BIO_free(bio);
16497
16498
    return ret;
16499
}
16500
#endif /* !NO_BIO */
16501
16502
WOLFSSL_X509* wolfSSL_X509_REQ_new(void)
16503
{
16504
    return wolfSSL_X509_new();
16505
}
16506
16507
void wolfSSL_X509_REQ_free(WOLFSSL_X509* req)
16508
{
16509
    wolfSSL_X509_free(req);
16510
}
16511
16512
int wolfSSL_X509_REQ_set_version(WOLFSSL_X509 *x, long version)
16513
{
16514
    WOLFSSL_ENTER("wolfSSL_X509_REQ_set_version");
16515
    if ((x == NULL) || (version < 0) || (version >= INT_MAX)) {
16516
        return WOLFSSL_FAILURE;
16517
    }
16518
    x->version = (int)version;
16519
    return WOLFSSL_SUCCESS;
16520
}
16521
16522
long wolfSSL_X509_REQ_get_version(const WOLFSSL_X509 *req)
16523
{
16524
    WOLFSSL_ENTER("wolfSSL_X509_REQ_get_version");
16525
    if (req == NULL) {
16526
        return 0; /* invalid arg */
16527
    }
16528
    return (long)req->version;
16529
}
16530
16531
int wolfSSL_X509_REQ_sign(WOLFSSL_X509 *req, WOLFSSL_EVP_PKEY *pkey,
16532
                          const WOLFSSL_EVP_MD *md)
16533
{
16534
    int ret;
16535
    WC_DECLARE_VAR(der, byte, 2048, 0);
16536
    int derSz = 2048;
16537
16538
    if (req == NULL || pkey == NULL || md == NULL) {
16539
        WOLFSSL_LEAVE("wolfSSL_X509_REQ_sign", BAD_FUNC_ARG);
16540
        return WOLFSSL_FAILURE;
16541
    }
16542
16543
    WC_ALLOC_VAR_EX(der, byte, derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER,
16544
        return WOLFSSL_FAILURE);
16545
16546
    /* Create a Cert that has the certificate request fields. */
16547
    req->sigOID = wolfSSL_sigTypeFromPKEY((WOLFSSL_EVP_MD*)md, pkey);
16548
    ret = wolfssl_x509_make_der(req, 1, der, &derSz, 0);
16549
    if (ret != WOLFSSL_SUCCESS) {
16550
        WC_FREE_VAR_EX(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
16551
        WOLFSSL_MSG("Unable to make DER for X509");
16552
        WOLFSSL_LEAVE("wolfSSL_X509_REQ_sign", ret);
16553
        return WOLFSSL_FAILURE;
16554
    }
16555
16556
    if (wolfSSL_X509_resign_cert(req, 1, der, 2048, derSz,
16557
            (WOLFSSL_EVP_MD*)md, pkey) <= 0) {
16558
        WC_FREE_VAR_EX(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
16559
        return WOLFSSL_FAILURE;
16560
    }
16561
    WC_FREE_VAR_EX(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
16562
    return WOLFSSL_SUCCESS;
16563
}
16564
16565
int wolfSSL_X509_REQ_sign_ctx(WOLFSSL_X509 *req,
16566
                              WOLFSSL_EVP_MD_CTX* md_ctx)
16567
{
16568
    if (md_ctx && md_ctx->pctx)
16569
        return wolfSSL_X509_REQ_sign(req, md_ctx->pctx->pkey,
16570
                wolfSSL_EVP_MD_CTX_md(md_ctx));
16571
    else
16572
        return WOLFSSL_FAILURE;
16573
}
16574
16575
static int regenX509REQDerBuffer(WOLFSSL_X509* x509)
16576
{
16577
    int derSz = X509_BUFFER_SZ;
16578
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
16579
#ifndef WOLFSSL_SMALL_STACK
16580
    byte der[X509_BUFFER_SZ];
16581
#else
16582
    byte* der;
16583
16584
    der = (byte*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
16585
    if (!der) {
16586
        WOLFSSL_MSG("malloc failed");
16587
        return WOLFSSL_FAILURE;
16588
    }
16589
#endif
16590
16591
    if (wolfssl_x509_make_der(x509, 1, der, &derSz, 0) == WOLFSSL_SUCCESS) {
16592
        FreeDer(&x509->derCert);
16593
        if (AllocDer(&x509->derCert, (word32)derSz, CERT_TYPE,
16594
                                                             x509->heap) == 0) {
16595
            XMEMCPY(x509->derCert->buffer, der, derSz);
16596
            ret = WOLFSSL_SUCCESS;
16597
        }
16598
        else {
16599
            WOLFSSL_MSG("Failed to allocate DER buffer for X509");
16600
        }
16601
    }
16602
    else {
16603
        WOLFSSL_MSG("Unable to make DER for X509 REQ");
16604
    }
16605
    WC_FREE_VAR_EX(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
16606
    return ret;
16607
}
16608
16609
int wolfSSL_X509_REQ_add_extensions(WOLFSSL_X509* req,
16610
        WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* ext_sk)
16611
{
16612
    WOLFSSL_X509_EXTENSION* ext = NULL;
16613
16614
    if (!req || !ext_sk) {
16615
        WOLFSSL_MSG("Bad parameter");
16616
        return WOLFSSL_FAILURE;
16617
    }
16618
16619
    /* It is not an error if the stack is empty. */
16620
    ext = ext_sk->data.ext;
16621
    if (ext == NULL) {
16622
        return WOLFSSL_SUCCESS;
16623
    }
16624
16625
    while (ext_sk) {
16626
        ext = ext_sk->data.ext;
16627
16628
        if (wolfSSL_X509_add_ext(req, ext, -1) != WOLFSSL_SUCCESS) {
16629
            WOLFSSL_MSG("wolfSSL_X509_add_ext error");
16630
            return WOLFSSL_FAILURE;
16631
        }
16632
16633
        ext_sk = ext_sk->next;
16634
    }
16635
16636
    return regenX509REQDerBuffer(req);
16637
}
16638
16639
int wolfSSL_X509_REQ_add1_attr_by_txt(WOLFSSL_X509 *req,
16640
                              const char *attrname, int type,
16641
                              const unsigned char *bytes, int len)
16642
{
16643
    WOLFSSL_ENTER("wolfSSL_X509_REQ_add1_attr_by_txt");
16644
16645
#ifdef HAVE_LIBEST
16646
    if (!req || !attrname || !bytes || type != MBSTRING_ASC) {
16647
        WOLFSSL_MSG("Bad parameter");
16648
        return WOLFSSL_FAILURE;
16649
    }
16650
16651
    if (len < 0) {
16652
        len = (int)XSTRLEN((char*)bytes);
16653
    }
16654
16655
    /* For now just pretend that we support this for libest testing */
16656
    if (len == XSTR_SIZEOF("1.3.6.1.1.1.1.22") &&
16657
            XMEMCMP("1.3.6.1.1.1.1.22", bytes, len) == 0) {
16658
        /* MAC Address */
16659
    }
16660
    else if (len == XSTR_SIZEOF("1.2.840.10045.2.1") &&
16661
            XMEMCMP("1.2.840.10045.2.1", bytes, len) == 0) {
16662
        /* ecPublicKey */
16663
    }
16664
    else if (len == XSTR_SIZEOF("1.2.840.10045.4.3.3") &&
16665
            XMEMCMP("1.2.840.10045.4.3.3", bytes, len) == 0) {
16666
        /* ecdsa-with-SHA384 */
16667
    }
16668
    else {
16669
        return WOLFSSL_FAILURE;
16670
    }
16671
16672
    /* return error if not built for libest */
16673
    return WOLFSSL_SUCCESS;
16674
#else
16675
    (void)req;
16676
    (void)attrname;
16677
    (void)type;
16678
    (void)bytes;
16679
    (void)len;
16680
    return WOLFSSL_FAILURE;
16681
#endif
16682
}
16683
16684
16685
static int wolfSSL_X509_ATTRIBUTE_set(WOLFSSL_X509_ATTRIBUTE* attr,
16686
        const char* data, int dataSz, int type, int nid)
16687
{
16688
    if (attr) {
16689
        attr->value->value.asn1_string = wolfSSL_ASN1_STRING_new();
16690
        if (wolfSSL_ASN1_STRING_set(attr->value->value.asn1_string,
16691
                data, dataSz) != WOLFSSL_SUCCESS) {
16692
            wolfSSL_ASN1_STRING_free(attr->value->value.asn1_string);
16693
            WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
16694
            return WOLFSSL_FAILURE;
16695
        }
16696
        attr->value->type = type;
16697
        attr->object->nid = nid;
16698
    }
16699
    else {
16700
        WOLFSSL_MSG("wolfSSL_X509_ATTRIBUTE_new error");
16701
        return WOLFSSL_FAILURE;
16702
    }
16703
16704
    return WOLFSSL_SUCCESS;
16705
}
16706
16707
16708
int wolfSSL_X509_REQ_add1_attr_by_NID(WOLFSSL_X509 *req,
16709
                                      int nid, int type,
16710
                                      const unsigned char *bytes,
16711
                                      int len)
16712
{
16713
    int ret;
16714
    WOLFSSL_X509_ATTRIBUTE* attr;
16715
16716
    WOLFSSL_ENTER("wolfSSL_X509_REQ_add1_attr_by_NID");
16717
16718
    if (!req || !bytes || type != WOLFSSL_MBSTRING_ASC) {
16719
        WOLFSSL_MSG("Bad parameter");
16720
        return WOLFSSL_FAILURE;
16721
    }
16722
16723
    switch (nid) {
16724
    case WC_NID_pkcs9_challengePassword:
16725
        if (len < 0)
16726
            len = (int)XSTRLEN((char*)bytes);
16727
        if (len < CTC_NAME_SIZE) {
16728
            XMEMCPY(req->challengePw, bytes, len);
16729
            req->challengePw[len] = '\0';
16730
        }
16731
        else {
16732
            WOLFSSL_MSG("Challenge password too long");
16733
            WOLFSSL_ERROR_VERBOSE(BUFFER_E);
16734
            return WOLFSSL_FAILURE;
16735
        }
16736
        break;
16737
    case WC_NID_serialNumber:
16738
        if (len < 0)
16739
            len = (int)XSTRLEN((char*)bytes);
16740
        if (len + 1 > EXTERNAL_SERIAL_SIZE) {
16741
            WOLFSSL_MSG("SerialNumber too long");
16742
            WOLFSSL_ERROR_VERBOSE(BUFFER_E);
16743
            return WOLFSSL_FAILURE;
16744
        }
16745
        XMEMCPY(req->serial, bytes, len);
16746
        req->serialSz = len;
16747
        break;
16748
16749
    case WC_NID_pkcs9_unstructuredName:
16750
    case WC_NID_pkcs9_contentType:
16751
    case WC_NID_surname:
16752
    case WC_NID_initials:
16753
    case WC_NID_givenName:
16754
    case WC_NID_dnQualifier:
16755
        break;
16756
16757
    default:
16758
        WOLFSSL_MSG("Unsupported attribute");
16759
        return WOLFSSL_FAILURE;
16760
    }
16761
16762
    attr = wolfSSL_X509_ATTRIBUTE_new();
16763
    ret = wolfSSL_X509_ATTRIBUTE_set(attr, (const char*)bytes, len,
16764
            WOLFSSL_V_ASN1_PRINTABLESTRING, nid);
16765
    if (ret != WOLFSSL_SUCCESS) {
16766
        wolfSSL_X509_ATTRIBUTE_free(attr);
16767
    }
16768
    else {
16769
        if (req->reqAttributes == NULL) {
16770
            req->reqAttributes = wolfSSL_sk_new_node(req->heap);
16771
            if (req->reqAttributes != NULL) {
16772
                req->reqAttributes->type = STACK_TYPE_X509_REQ_ATTR;
16773
            }
16774
        }
16775
        if ((req->reqAttributes != NULL) &&
16776
                (req->reqAttributes->type == STACK_TYPE_X509_REQ_ATTR)) {
16777
            /* Using wolfSSL_sk_insert to maintain backwards compatibility with
16778
             * earlier versions of _push API that pushed items to the start of
16779
             * the list instead of the end. */
16780
            ret = wolfSSL_sk_insert(req->reqAttributes, attr, 0) > 0
16781
                    ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
16782
        }
16783
        else {
16784
            ret = WOLFSSL_FAILURE;
16785
        }
16786
        if (ret != WOLFSSL_SUCCESS)
16787
            wolfSSL_X509_ATTRIBUTE_free(attr);
16788
    }
16789
16790
    return ret;
16791
}
16792
16793
WOLFSSL_X509 *wolfSSL_X509_to_X509_REQ(WOLFSSL_X509 *x,
16794
        WOLFSSL_EVP_PKEY *pkey, const WOLFSSL_EVP_MD *md)
16795
{
16796
    WOLFSSL_ENTER("wolfSSL_X509_to_X509_REQ");
16797
    (void)pkey;
16798
    (void)md;
16799
    return wolfSSL_X509_dup(x);
16800
}
16801
16802
int wolfSSL_X509_REQ_set_subject_name(WOLFSSL_X509 *req,
16803
                                      WOLFSSL_X509_NAME *name)
16804
{
16805
    return wolfSSL_X509_set_subject_name(req, name);
16806
}
16807
16808
int wolfSSL_X509_REQ_set_pubkey(WOLFSSL_X509 *req, WOLFSSL_EVP_PKEY *pkey)
16809
{
16810
    return wolfSSL_X509_set_pubkey(req, pkey);
16811
}
16812
#endif /* OPENSSL_ALL && WOLFSSL_CERT_GEN && WOLFSSL_CERT_REQ */
16813
16814
#if (defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)) && \
16815
    (defined(WOLFSSL_CERT_GEN) || defined(WOLFSSL_CERT_REQ))
16816
16817
WOLFSSL_ASN1_TYPE *wolfSSL_X509_ATTRIBUTE_get0_type(
16818
        WOLFSSL_X509_ATTRIBUTE *attr, int idx)
16819
{
16820
    WOLFSSL_ENTER("wolfSSL_X509_ATTRIBUTE_get0_type");
16821
16822
    if (!attr || idx != 0) {
16823
        WOLFSSL_MSG("Bad parameter");
16824
        return NULL;
16825
    }
16826
16827
    return attr->value;
16828
}
16829
16830
16831
/**
16832
 * @param req X509_REQ containing attribute
16833
 * @return the number of attributes
16834
 */
16835
int wolfSSL_X509_REQ_get_attr_count(const WOLFSSL_X509 *req)
16836
{
16837
    if (req == NULL || req->reqAttributes == NULL)
16838
        return 0;
16839
16840
    return wolfSSL_sk_num(req->reqAttributes);
16841
}
16842
16843
16844
/**
16845
 * @param req X509_REQ containing attribute
16846
 * @param loc NID of the attribute to return
16847
 */
16848
WOLFSSL_X509_ATTRIBUTE *wolfSSL_X509_REQ_get_attr(
16849
        const WOLFSSL_X509 *req, int loc)
16850
{
16851
    WOLFSSL_ENTER("wolfSSL_X509_REQ_get_attr");
16852
16853
    if (!req || req->reqAttributes == NULL) {
16854
        WOLFSSL_MSG("Bad parameter");
16855
        return NULL;
16856
    }
16857
16858
    return (WOLFSSL_X509_ATTRIBUTE*)wolfSSL_sk_value(req->reqAttributes, loc);
16859
}
16860
16861
/* Return NID as the attr index */
16862
int wolfSSL_X509_REQ_get_attr_by_NID(const WOLFSSL_X509 *req,
16863
        int nid, int lastpos)
16864
{
16865
    int idx;
16866
16867
    WOLFSSL_ENTER("wolfSSL_X509_REQ_get_attr_by_NID");
16868
16869
    if (!req) {
16870
        WOLFSSL_MSG("Bad parameter");
16871
        return WOLFSSL_FATAL_ERROR;
16872
    }
16873
16874
    /* search through stack for first matching nid */
16875
    for (idx = lastpos + 1; idx < wolfSSL_sk_num(req->reqAttributes); idx++) {
16876
        WOLFSSL_X509_ATTRIBUTE* attr =
16877
             (WOLFSSL_X509_ATTRIBUTE*)wolfSSL_sk_value(req->reqAttributes, idx);
16878
        if (attr != NULL && attr->object != NULL && attr->object->nid == nid)
16879
            return idx;
16880
    }
16881
16882
    return WOLFSSL_FATAL_ERROR;
16883
}
16884
16885
WOLFSSL_X509_ATTRIBUTE* wolfSSL_X509_ATTRIBUTE_new(void)
16886
{
16887
    WOLFSSL_X509_ATTRIBUTE* ret;
16888
    WOLFSSL_ENTER("wolfSSL_X509_ATTRIBUTE_new");
16889
    ret = (WOLFSSL_X509_ATTRIBUTE*)XMALLOC(sizeof(WOLFSSL_X509_ATTRIBUTE),
16890
            NULL, DYNAMIC_TYPE_OPENSSL);
16891
    if (!ret) {
16892
        WOLFSSL_MSG("malloc error");
16893
        return NULL;
16894
    }
16895
    XMEMSET(ret, 0, sizeof(WOLFSSL_X509_ATTRIBUTE));
16896
    ret->object = wolfSSL_ASN1_OBJECT_new();
16897
    ret->value = wolfSSL_ASN1_TYPE_new();
16898
    /* Don't allocate ret->set since WOLFSSL_ASN1_TYPE
16899
     * is not supported as a stack type */
16900
    if (!ret->object || !ret->value) {
16901
        WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new or wolfSSL_ASN1_TYPE_new error");
16902
        wolfSSL_X509_ATTRIBUTE_free(ret);
16903
        return NULL;
16904
    }
16905
    return ret;
16906
}
16907
16908
void wolfSSL_X509_ATTRIBUTE_free(WOLFSSL_X509_ATTRIBUTE* attr)
16909
{
16910
    WOLFSSL_ENTER("wolfSSL_X509_ATTRIBUTE_free");
16911
    if (attr) {
16912
        if (attr->object) {
16913
            wolfSSL_ASN1_OBJECT_free(attr->object);
16914
        }
16915
        if (attr->value) {
16916
            wolfSSL_ASN1_TYPE_free(attr->value);
16917
        }
16918
        if (attr->set) {
16919
            wolfSSL_sk_pop_free(attr->set, NULL);
16920
        }
16921
        XFREE(attr, NULL, DYNAMIC_TYPE_OPENSSL);
16922
    }
16923
}
16924
#endif /* (OPENSSL_ALL || OPENSSL_EXTRA) &&
16925
          (WOLFSSL_CERT_GEN || WOLFSSL_CERT_REQ) */
16926
16927
#if defined(WOLFSSL_ACERT) && \
16928
   (defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA))
16929
16930
/* Allocate and return a new WOLFSSL_X509_ACERT struct pointer.
16931
 *
16932
 * @param [in]      heap        heap hint
16933
 *
16934
 * @return  pointer  on success
16935
 * @return  NULL     on error
16936
 * */
16937
WOLFSSL_X509_ACERT * wolfSSL_X509_ACERT_new_ex(void* heap)
16938
0
{
16939
0
    WOLFSSL_X509_ACERT * x509 = NULL;
16940
16941
0
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_new");
16942
16943
0
    x509 = (WOLFSSL_X509_ACERT*) XMALLOC(sizeof(WOLFSSL_X509_ACERT), heap,
16944
0
                                         DYNAMIC_TYPE_X509_ACERT);
16945
16946
0
    if (x509 != NULL) {
16947
0
        wolfSSL_X509_ACERT_init(x509, 1, heap);
16948
0
    }
16949
16950
0
    return x509;
16951
0
}
16952
16953
WOLFSSL_X509_ACERT * wolfSSL_X509_ACERT_new(void)
16954
0
{
16955
0
    return wolfSSL_X509_ACERT_new_ex(NULL);
16956
0
}
16957
16958
/* Initialize a WOLFSSL_X509_ACERT struct.
16959
 *
16960
 * If dynamic == 1, then the x509 pointer will be freed
16961
 * in wolfSSL_X509_ACERT_free.
16962
 *
16963
 * @param [in]      x509        x509 acert pointer
16964
 * @param [in]      dynamic     dynamic mem flag
16965
 * @param [in]      heap        heap hint
16966
 *
16967
 * @return  void
16968
 * */
16969
void wolfSSL_X509_ACERT_init(WOLFSSL_X509_ACERT * x509, int dynamic, void* heap)
16970
0
{
16971
0
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_init");
16972
16973
0
    if (x509 == NULL) {
16974
0
        WOLFSSL_MSG("error: InitX509Acert: null parameter");
16975
0
        return;
16976
0
    }
16977
16978
0
    XMEMSET(x509, 0, sizeof(*x509));
16979
16980
0
    x509->heap = heap;
16981
0
    x509->dynamic = dynamic;
16982
0
}
16983
16984
/* Free a WOLFSSL_X509_ACERT struct and its sub-fields.
16985
 *
16986
 * If this ACERT was initialized with dynamic == 1, then
16987
 * the x509 pointer itself will be freed as well.
16988
 *
16989
 * @param [in]      x509        x509 acert pointer
16990
 *
16991
 * @return  void
16992
 * */
16993
void wolfSSL_X509_ACERT_free(WOLFSSL_X509_ACERT * x509)
16994
0
{
16995
0
    int    dynamic = 0;
16996
0
    void * heap = NULL;
16997
16998
0
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_free");
16999
17000
0
    if (x509 == NULL) {
17001
0
        WOLFSSL_MSG("error: wolfSSL_X509_ACERT_free: null parameter");
17002
0
        return;
17003
0
    }
17004
17005
0
    dynamic = x509->dynamic;
17006
0
    heap = x509->heap;
17007
17008
    /* Free holder and att cert issuer structures. */
17009
0
    if (x509->holderIssuerName) {
17010
0
        FreeAltNames(x509->holderIssuerName, heap);
17011
0
        x509->holderIssuerName = NULL;
17012
0
    }
17013
17014
0
    if (x509->holderEntityName) {
17015
0
        FreeAltNames(x509->holderEntityName, heap);
17016
0
        x509->holderEntityName = NULL;
17017
0
    }
17018
17019
0
    if (x509->AttCertIssuerName) {
17020
0
        FreeAltNames(x509->AttCertIssuerName, heap);
17021
0
        x509->AttCertIssuerName = NULL;
17022
0
    }
17023
17024
0
    if (x509->rawAttr != NULL) {
17025
0
        XFREE(x509->rawAttr, heap, DYNAMIC_TYPE_X509_EXT);
17026
0
        x509->rawAttr = NULL;
17027
0
        x509->rawAttrLen = 0;
17028
0
    }
17029
17030
    /* Free derCert source and signature buffer. */
17031
0
    FreeDer(&x509->derCert);
17032
17033
0
    if (x509->sig.buffer != NULL) {
17034
0
        XFREE(x509->sig.buffer, heap, DYNAMIC_TYPE_SIGNATURE);
17035
0
        x509->sig.buffer = NULL;
17036
0
    }
17037
17038
    /* Finally memset and free x509 acert structure. */
17039
0
    XMEMSET(x509, 0, sizeof(*x509));
17040
17041
0
    if (dynamic == 1) {
17042
0
        XFREE(x509, heap, DYNAMIC_TYPE_X509_ACERT);
17043
0
    }
17044
17045
0
    return;
17046
0
}
17047
17048
#if defined(OPENSSL_EXTRA)
17049
long wolfSSL_X509_ACERT_get_version(const WOLFSSL_X509_ACERT* x509)
17050
0
{
17051
0
    int version = 0;
17052
17053
0
    if (x509 == NULL) {
17054
0
        return 0L;
17055
0
    }
17056
17057
0
    version = x509->version;
17058
17059
0
    return version != 0 ? (long)version - 1L : 0L;
17060
0
}
17061
#endif /* OPENSSL_EXTRA */
17062
17063
int wolfSSL_X509_ACERT_version(WOLFSSL_X509_ACERT* x509)
17064
0
{
17065
0
    if (x509 == NULL) {
17066
0
        return 0;
17067
0
    }
17068
17069
0
    return x509->version;
17070
0
}
17071
17072
/* Retrieve the serial number from an ACERT.
17073
 *
17074
 * @param [in]       x509    the x509 attribute certificate
17075
 * @param [in, out]  buf     the serial number buffer pointer
17076
 * @param [in, out]  bufSz   the serial number buffer size pointer
17077
 *
17078
 * buf may be null, but bufSz is required. On success, sets
17079
 * bufSz pointer to signature length, and copies signature
17080
 * to buf if provided.
17081
 *
17082
 * Returns  WWOLFSSL_FATAL_ERROR if bufSz is null or too small.
17083
 * Returns  WOLFSSL_SUCCESS on success.
17084
 */
17085
int wolfSSL_X509_ACERT_get_serial_number(WOLFSSL_X509_ACERT* x509,
17086
                                         byte* buf, int* bufSz)
17087
0
{
17088
0
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_get_serial_number");
17089
17090
0
    if (x509 == NULL || bufSz == NULL) {
17091
0
        WOLFSSL_MSG("error: null argument passed in");
17092
0
        return BAD_FUNC_ARG;
17093
0
    }
17094
17095
0
    if (buf != NULL) {
17096
0
        if (*bufSz < x509->serialSz) {
17097
0
            WOLFSSL_MSG("error: serial buffer too small");
17098
0
            return BUFFER_E;
17099
0
        }
17100
17101
0
        XMEMCPY(buf, x509->serial, x509->serialSz);
17102
0
    }
17103
17104
0
    *bufSz = x509->serialSz;
17105
17106
0
    return WOLFSSL_SUCCESS;
17107
0
}
17108
17109
/* Sets buf pointer and len to raw Attribute buffer and buffer len
17110
 * in X509 struct.
17111
 *
17112
 * Returns WOLFSSL_SUCCESS on success.
17113
 * Returns BAD_FUNC_ARG if input pointers are null.
17114
 * */
17115
int wolfSSL_X509_ACERT_get_attr_buf(const WOLFSSL_X509_ACERT* x509,
17116
                                                const byte ** rawAttr,
17117
                                                word32 * rawAttrLen)
17118
0
{
17119
0
    if (x509 == NULL || rawAttr == NULL || rawAttrLen == NULL) {
17120
0
        return BAD_FUNC_ARG;
17121
0
    }
17122
17123
0
    *rawAttr = x509->rawAttr;
17124
0
    *rawAttrLen = x509->rawAttrLen;
17125
17126
0
    return WOLFSSL_SUCCESS;
17127
0
}
17128
17129
#ifndef NO_WOLFSSL_STUB
17130
int wolfSSL_X509_ACERT_sign(WOLFSSL_X509_ACERT * x509,
17131
                                        WOLFSSL_EVP_PKEY * pkey,
17132
                                        const WOLFSSL_EVP_MD * md)
17133
0
{
17134
0
    WOLFSSL_STUB("X509_ACERT_sign");
17135
0
    (void) x509;
17136
0
    (void) pkey;
17137
0
    (void) md;
17138
0
    return WOLFSSL_NOT_IMPLEMENTED;
17139
0
}
17140
#endif /* NO_WOLFSSL_STUB */
17141
17142
/* Helper function for ACERT_verify.
17143
 *
17144
 * @param [in]       x509    the x509 attribute certificate
17145
 * @param [in, out]  outSz   the x509 der length
17146
 *
17147
 * @return  der buffer on success
17148
 * @return  NULL on error
17149
 * */
17150
static const byte* acert_get_der(WOLFSSL_X509_ACERT * x509, int* outSz)
17151
0
{
17152
0
    if (x509 == NULL || x509->derCert == NULL || outSz == NULL) {
17153
0
        return NULL;
17154
0
    }
17155
17156
0
    *outSz = (int)x509->derCert->length;
17157
0
    return x509->derCert->buffer;
17158
0
}
17159
17160
/* Given an X509_ACERT and EVP_PKEY, verify the acert's signature.
17161
 *
17162
 * @param [in]    x509    the x509 attribute certificate
17163
 * @param [in]    pkey    the evp_pkey
17164
 *
17165
 * @return  WOLFSSL_SUCCESS on verify success
17166
 * @return  < 0 on error
17167
 * */
17168
int wolfSSL_X509_ACERT_verify(WOLFSSL_X509_ACERT* x509, WOLFSSL_EVP_PKEY* pkey)
17169
0
{
17170
0
    int          ret = 0;
17171
0
    const byte * der = NULL;
17172
0
    int          derSz = 0;
17173
0
    int          pkey_type;
17174
17175
0
    if (x509 == NULL || pkey == NULL) {
17176
0
        WOLFSSL_MSG("error: wolfSSL_X509_ACERT_verify: bad arg");
17177
0
        return WOLFSSL_FATAL_ERROR;
17178
0
    }
17179
17180
0
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_verify");
17181
17182
0
    der = acert_get_der(x509, &derSz);
17183
17184
0
    if (der == NULL || derSz <= 0) {
17185
0
        WOLFSSL_MSG("error: wolfSSL_X509_ACERT_verify: get der failed");
17186
0
        return WOLFSSL_FATAL_ERROR;
17187
0
    }
17188
17189
0
    switch (pkey->type) {
17190
0
    case WC_EVP_PKEY_RSA:
17191
0
        pkey_type = RSAk;
17192
0
        break;
17193
17194
0
    case WC_EVP_PKEY_EC:
17195
0
        pkey_type = ECDSAk;
17196
0
        break;
17197
17198
0
    case WC_EVP_PKEY_DSA:
17199
0
        pkey_type = DSAk;
17200
0
        break;
17201
17202
0
    default:
17203
0
        WOLFSSL_MSG("error: wolfSSL_X509_ACERT_verify: unknown pkey type");
17204
0
        return WOLFSSL_FATAL_ERROR;
17205
0
    }
17206
17207
17208
0
    ret = VerifyX509Acert(der, (word32)derSz,
17209
0
                          (const byte *)pkey->pkey.ptr, pkey->pkey_sz,
17210
0
                          pkey_type, x509->heap);
17211
17212
0
    return ret == 0 ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
17213
0
}
17214
17215
/* Loads an x509 attribute certificate from buffer, and returns
17216
 * pointer to new WOLFSSL_X509_ACERT struct on success.
17217
 *
17218
 * @param [in]  buf    The acert buffer to load.
17219
 * @param [in]  sz     The size of the buffer.
17220
 * @param [in]  format The format of the buffer data.
17221
 * @param [in]  heap   Dynamic memory allocation hint.
17222
 *
17223
 * @return  pointer to WOLFSSL_X509_ACERT on success.
17224
 * @return  NULL on error.
17225
 * */
17226
WOLFSSL_X509_ACERT * wolfSSL_X509_ACERT_load_certificate_buffer_ex(
17227
    const unsigned char* buf, int sz, int format, void * heap)
17228
0
{
17229
0
    int                  ret = 0;
17230
0
    WOLFSSL_X509_ACERT * x509 = NULL;
17231
0
    DerBuffer *          der = NULL;
17232
0
    WC_DECLARE_VAR(acert, DecodedAcert, 1, 0);
17233
17234
0
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_load_certificate_buffer");
17235
17236
0
    if (format == WOLFSSL_FILETYPE_PEM) {
17237
0
    #ifdef WOLFSSL_PEM_TO_DER
17238
0
        ret = PemToDer(buf, sz, ACERT_TYPE, &der, heap, NULL, NULL);
17239
17240
0
        if (ret != 0 || der == NULL || der->buffer == NULL) {
17241
0
            WOLFSSL_ERROR(ret);
17242
17243
0
            if (der != NULL) {
17244
0
                FreeDer(&der);
17245
0
            }
17246
17247
0
            return NULL;
17248
0
        }
17249
    #else
17250
        WOLFSSL_ERROR(NOT_COMPILED_IN);
17251
        return NULL;
17252
    #endif
17253
0
    }
17254
0
    else {
17255
0
        ret = AllocDer(&der, (word32)sz, ACERT_TYPE, heap);
17256
17257
0
        if (ret != 0 || der == NULL || der->buffer == NULL) {
17258
0
            WOLFSSL_ERROR(ret);
17259
0
            return NULL;
17260
0
        }
17261
17262
0
        XMEMCPY(der->buffer, buf, sz);
17263
0
    }
17264
17265
0
    #ifdef WOLFSSL_SMALL_STACK
17266
0
    acert = (DecodedAcert*)XMALLOC(sizeof(DecodedAcert), heap,
17267
0
                                   DYNAMIC_TYPE_DCERT);
17268
0
    if (acert == NULL) {
17269
0
        WOLFSSL_ERROR(MEMORY_ERROR);
17270
0
        FreeDer(&der);
17271
0
        return NULL;
17272
0
    }
17273
0
    #endif
17274
17275
0
    InitDecodedAcert(acert, der->buffer, der->length, heap);
17276
17277
0
    ret = ParseX509Acert(acert, VERIFY_SKIP_DATE);
17278
17279
0
    if (ret == 0) {
17280
0
        x509 = wolfSSL_X509_ACERT_new_ex(heap);
17281
17282
0
        if (x509 != NULL) {
17283
0
            ret = CopyDecodedAcertToX509(x509, acert);
17284
17285
0
            if (ret != 0) {
17286
0
                wolfSSL_X509_ACERT_free(x509);
17287
0
                x509 = NULL;
17288
0
            }
17289
0
        }
17290
0
        else {
17291
0
            ret = MEMORY_ERROR;
17292
0
        }
17293
0
    }
17294
17295
0
    FreeDecodedAcert(acert);
17296
17297
0
    WC_FREE_VAR_EX(acert, heap, DYNAMIC_TYPE_DCERT);
17298
17299
0
    FreeDer(&der);
17300
17301
0
    if (ret != 0) {
17302
0
        WOLFSSL_ERROR(ret);
17303
0
    }
17304
17305
0
    return x509;
17306
0
}
17307
17308
WOLFSSL_X509_ACERT * wolfSSL_X509_ACERT_load_certificate_buffer(
17309
    const unsigned char* buf, int sz, int format)
17310
0
{
17311
0
    return wolfSSL_X509_ACERT_load_certificate_buffer_ex(buf, sz, format, NULL);
17312
0
}
17313
17314
/* Retrieve the signature from an ACERT.
17315
 *
17316
 * @param [in]       x509    the x509 attribute certificate
17317
 * @param [in, out]  buf     the signature buffer pointer
17318
 * @param [in, out]  bufSz   the signature buffer size pointer
17319
 *
17320
 * buf may be null, but bufSz is required. On success, sets
17321
 * bufSz pointer to signature length, and copies signature
17322
 * to buf if provided.
17323
 *
17324
 * Returns  WWOLFSSL_FATAL_ERROR if bufSz is null or too small.
17325
 * Returns  WOLFSSL_SUCCESS on success.
17326
 */
17327
int wolfSSL_X509_ACERT_get_signature(WOLFSSL_X509_ACERT* x509,
17328
                                     unsigned char* buf, int* bufSz)
17329
0
{
17330
0
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_get_signature");
17331
17332
0
    if (x509 == NULL || bufSz == NULL) {
17333
0
        return WOLFSSL_FATAL_ERROR;
17334
0
    }
17335
17336
    /* If buf array is provided, it must be long enough. */
17337
0
    if (buf != NULL && *bufSz < (int)x509->sig.length) {
17338
0
        return WOLFSSL_FATAL_ERROR;
17339
0
    }
17340
17341
0
    if (buf != NULL) {
17342
        /* Copy in buffer if provided. */
17343
0
        XMEMCPY(buf, x509->sig.buffer, x509->sig.length);
17344
0
    }
17345
17346
0
    *bufSz = (int)x509->sig.length;
17347
17348
0
    return WOLFSSL_SUCCESS;
17349
0
}
17350
#endif /* WOLFSSL_ACERT && (OPENSSL_EXTRA_X509_SMALL || OPENSSL_EXTRA) */
17351
17352
#endif /* !NO_CERTS */
17353
17354
#endif /* !WOLFCRYPT_ONLY */
17355
17356
#endif /* WOLFSSL_X509_INCLUDED */