Coverage Report

Created: 2026-04-05 07:22

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/wolfssl-sp-math-all-8bit/src/x509.c
Line
Count
Source
1
/* x509.c
2
 *
3
 * Copyright (C) 2006-2026 wolfSSL Inc.
4
 *
5
 * This file is part of wolfSSL.
6
 *
7
 * wolfSSL is free software; you can redistribute it and/or modify
8
 * it under the terms of the GNU General Public License as published by
9
 * the Free Software Foundation; either version 3 of the License, or
10
 * (at your option) any later version.
11
 *
12
 * wolfSSL is distributed in the hope that it will be useful,
13
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15
 * GNU General Public License for more details.
16
 *
17
 * You should have received a copy of the GNU General Public License
18
 * along with this program; if not, write to the Free Software
19
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
20
 */
21
22
#include <wolfssl/wolfcrypt/libwolfssl_sources.h>
23
24
#if !defined(WOLFSSL_X509_INCLUDED)
25
    #ifndef WOLFSSL_IGNORE_FILE_WARN
26
        #warning x509.c does not need to be compiled separately from ssl.c
27
    #endif
28
#else
29
30
#ifndef WOLFCRYPT_ONLY
31
32
#ifndef NO_CERTS
33
34
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
35
    #include <wolfssl/openssl/x509v3.h>
36
#endif
37
#ifdef OPENSSL_EXTRA
38
    #include <wolfssl/wolfio.h>
39
#endif
40
41
/* 16 times MAX_X509_SIZE should be more than enough to read any X509
42
 * certificate file */
43
#define MAX_BIO_READ_BUFFER (MAX_X509_SIZE * 16)
44
45
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)
46
unsigned int wolfSSL_X509_get_extension_flags(WOLFSSL_X509* x509)
47
{
48
    unsigned int flags = 0;
49
50
    WOLFSSL_ENTER("wolfSSL_X509_get_extension_flags");
51
52
    if (x509 != NULL) {
53
        if (x509->keyUsageSet) {
54
            flags |= WOLFSSL_EXFLAG_KUSAGE;
55
        }
56
        if (x509->extKeyUsageSrc != NULL) {
57
            flags |= WOLFSSL_EXFLAG_XKUSAGE;
58
        }
59
    }
60
61
    WOLFSSL_LEAVE("wolfSSL_X509_get_extension_flags", flags);
62
63
    return flags;
64
}
65
66
unsigned int wolfSSL_X509_get_key_usage(WOLFSSL_X509* x509)
67
{
68
    unsigned int ret = 0;
69
70
    WOLFSSL_ENTER("wolfSSL_X509_get_key_usage");
71
72
    if (x509 == NULL) {
73
        WOLFSSL_MSG("x509 is NULL");
74
    }
75
    else {
76
        if (x509->keyUsageSet) {
77
            ret = wolfSSL_X509_get_keyUsage(x509);
78
        }
79
        else {
80
            ret = (unsigned int)-1;
81
        }
82
    }
83
84
    WOLFSSL_LEAVE("wolfSSL_X509_get_key_usage", ret);
85
86
    return ret;
87
}
88
89
unsigned int wolfSSL_X509_get_extended_key_usage(WOLFSSL_X509* x509)
90
{
91
    int ret = 0;
92
93
    WOLFSSL_ENTER("wolfSSL_X509_get_extended_key_usage");
94
95
    if (x509 != NULL) {
96
        if (x509->extKeyUsage & EXTKEYUSE_OCSP_SIGN)
97
            ret |= WOLFSSL_XKU_OCSP_SIGN;
98
        if (x509->extKeyUsage & EXTKEYUSE_TIMESTAMP)
99
            ret |= WOLFSSL_XKU_TIMESTAMP;
100
        if (x509->extKeyUsage & EXTKEYUSE_EMAILPROT)
101
            ret |= WOLFSSL_XKU_SMIME;
102
        if (x509->extKeyUsage & EXTKEYUSE_CODESIGN)
103
            ret |= WOLFSSL_XKU_CODE_SIGN;
104
        if (x509->extKeyUsage & EXTKEYUSE_CLIENT_AUTH)
105
            ret |= WOLFSSL_XKU_SSL_CLIENT;
106
        if (x509->extKeyUsage & EXTKEYUSE_SERVER_AUTH)
107
            ret |= WOLFSSL_XKU_SSL_SERVER;
108
        if (x509->extKeyUsage & EXTKEYUSE_ANY)
109
            ret |= WOLFSSL_XKU_ANYEKU;
110
    }
111
112
    WOLFSSL_LEAVE("wolfSSL_X509_get_extended_key_usage", ret);
113
114
    return (unsigned int)ret;
115
}
116
117
/* Returns the number of X509V3 extensions in X509 object, or 0 on failure */
118
int wolfSSL_X509_get_ext_count(const WOLFSSL_X509* passedCert)
119
{
120
    int extCount = 0;
121
    int length = 0;
122
    int outSz = 0;
123
    const byte* rawCert;
124
    int sz = 0;
125
    word32 idx = 0;
126
    const byte* input;
127
    WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
128
129
    WOLFSSL_ENTER("wolfSSL_X509_get_ext_count");
130
    if (passedCert == NULL) {
131
        WOLFSSL_MSG("\tNot passed a certificate");
132
        return WOLFSSL_FAILURE;
133
    }
134
135
    rawCert = wolfSSL_X509_get_der((WOLFSSL_X509*)passedCert, &outSz);
136
    if (rawCert == NULL) {
137
        WOLFSSL_MSG("\tpassedCert has no internal DerBuffer set.");
138
        return WOLFSSL_FAILURE;
139
    }
140
141
#ifdef WOLFSSL_SMALL_STACK
142
    cert = (DecodedCert *)XMALLOC(sizeof(*cert), NULL, DYNAMIC_TYPE_DCERT);
143
    if (cert == NULL) {
144
        WOLFSSL_MSG("out of memory");
145
        return WOLFSSL_FAILURE;
146
    }
147
#endif
148
149
    InitDecodedCert(cert, rawCert, (word32)outSz, 0);
150
151
    if (ParseCert(cert,
152
#ifdef WOLFSSL_CERT_REQ
153
            passedCert->isCSR ? CERTREQ_TYPE :
154
#endif
155
                    CA_TYPE,
156
            NO_VERIFY, NULL) < 0) {
157
        WOLFSSL_MSG("\tCertificate parsing failed");
158
        goto out;
159
    }
160
161
    input = cert->extensions;
162
    sz = cert->extensionsSz;
163
164
    if (input == NULL || sz == 0) {
165
        WOLFSSL_MSG("\tsz or input NULL error");
166
        goto out;
167
    }
168
169
#ifdef WOLFSSL_CERT_REQ
170
    if (!passedCert->isCSR)
171
#endif
172
    {
173
        if (input[idx++] != ASN_EXTENSIONS) {
174
            WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
175
            goto out;
176
        }
177
178
        if (GetLength(input, &idx, &length, (word32)sz) < 0) {
179
            WOLFSSL_MSG("\tfail: invalid length");
180
            goto out;
181
        }
182
    }
183
184
    if (GetSequence(input, &idx, &length, (word32)sz) < 0) {
185
        WOLFSSL_MSG("\tfail: should be a SEQUENCE (1)");
186
        goto out;
187
    }
188
189
    while (idx < (word32)sz) {
190
        if (GetSequence(input, &idx, &length, (word32)sz) < 0) {
191
            WOLFSSL_MSG("\tfail: should be a SEQUENCE");
192
            FreeDecodedCert(cert);
193
            return WOLFSSL_FAILURE;
194
        }
195
        idx += length;
196
        extCount++;
197
    }
198
199
out:
200
201
    FreeDecodedCert(cert);
202
    WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
203
    return extCount;
204
}
205
206
/* Creates and returns pointer to a new X509_EXTENSION object in memory */
207
WOLFSSL_X509_EXTENSION* wolfSSL_X509_EXTENSION_new(void)
208
{
209
    WOLFSSL_X509_EXTENSION* newExt;
210
211
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_new");
212
213
    newExt = (WOLFSSL_X509_EXTENSION*)XMALLOC(sizeof(WOLFSSL_X509_EXTENSION),
214
              NULL, DYNAMIC_TYPE_X509_EXT);
215
    if (newExt == NULL)
216
        return NULL;
217
    XMEMSET(newExt, 0, sizeof(WOLFSSL_X509_EXTENSION));
218
219
    return newExt;
220
}
221
222
223
/* Clear out and free internal pointers of ASN.1 STRING object.
224
 *
225
 * @param [in] asn1  ASN.1 STRING object.
226
 */
227
static void wolfSSL_ASN1_STRING_clear(WOLFSSL_ASN1_STRING* asn1)
228
{
229
    /* Check we have an object to free. */
230
    if (asn1 != NULL) {
231
        /* Dispose of dynamic data. */
232
        if ((asn1->length > 0) && asn1->isDynamic) {
233
            XFREE(asn1->data, NULL, DYNAMIC_TYPE_OPENSSL);
234
        }
235
        XMEMSET(asn1, 0, sizeof(WOLFSSL_ASN1_STRING));
236
    }
237
}
238
239
240
void wolfSSL_X509_EXTENSION_free(WOLFSSL_X509_EXTENSION* x)
241
{
242
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_free");
243
    if (x == NULL)
244
        return;
245
246
    if (x->obj != NULL) {
247
        wolfSSL_ASN1_OBJECT_free(x->obj);
248
    }
249
250
    wolfSSL_ASN1_STRING_clear(&x->value);
251
    wolfSSL_sk_pop_free(x->ext_sk, NULL);
252
253
    XFREE(x, NULL, DYNAMIC_TYPE_X509_EXT);
254
}
255
256
WOLFSSL_X509_EXTENSION* wolfSSL_X509_EXTENSION_dup(WOLFSSL_X509_EXTENSION* src)
257
{
258
    WOLFSSL_X509_EXTENSION* ret = NULL;
259
    int err = 0;
260
261
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_dup");
262
263
    if (src == NULL) {
264
        err = 1;
265
    }
266
267
    if (err == 0) {
268
        ret = wolfSSL_X509_EXTENSION_new();
269
        if (ret == NULL) {
270
            err = 1;
271
        }
272
    }
273
    if (err == 0 && src->obj != NULL) {
274
        ret->obj = wolfSSL_ASN1_OBJECT_dup(src->obj);
275
        if (ret->obj == NULL) {
276
            err = 1;
277
        }
278
    }
279
    if (err == 0) {
280
        ret->crit = src->crit;
281
        if (wolfSSL_ASN1_STRING_copy(&ret->value, &src->value) !=
282
                WOLFSSL_SUCCESS) {
283
            err = 1;
284
        }
285
    }
286
287
    if (err == 1 && ret != NULL) {
288
        wolfSSL_X509_EXTENSION_free(ret);
289
        ret = NULL;
290
    }
291
292
    return ret;
293
}
294
295
WOLFSSL_X509_EXTENSION* wolfSSL_X509_EXTENSION_create_by_OBJ(
296
    WOLFSSL_X509_EXTENSION* ex, WOLFSSL_ASN1_OBJECT *obj, int crit,
297
    WOLFSSL_ASN1_STRING *data)
298
{
299
    int err = 0;
300
    WOLFSSL_X509_EXTENSION *ret = ex;
301
302
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_create_by_OBJ");
303
304
    if ((obj == NULL) || (data == NULL)) {
305
       return NULL;
306
    }
307
308
    if (ret == NULL) {
309
        ret = wolfSSL_X509_EXTENSION_new();
310
        if (ret == NULL) {
311
            err = 1;
312
        }
313
    }
314
    else {
315
        /* Prevent potential memory leaks and dangling pointers. */
316
        wolfSSL_ASN1_OBJECT_free(ret->obj);
317
        ret->obj = NULL;
318
        wolfSSL_ASN1_STRING_clear(&ret->value);
319
    }
320
321
    if (err == 0) {
322
        ret->crit = crit;
323
        ret->obj = wolfSSL_ASN1_OBJECT_dup(obj);
324
        if (ret->obj == NULL) {
325
            err = 1;
326
        }
327
    }
328
329
    if (err == 0) {
330
        if (wolfSSL_ASN1_STRING_copy(&ret->value, data) != WOLFSSL_SUCCESS) {
331
            err = 1;
332
        }
333
    }
334
335
    if (err == 1) {
336
        if (ret != ex) {
337
            wolfSSL_X509_EXTENSION_free(ret);
338
        }
339
        ret = NULL;
340
    }
341
    return ret;
342
}
343
344
/* Creates and returns a new WOLFSSL_X509_EXTENSION stack. */
345
WOLFSSL_STACK* wolfSSL_sk_new_x509_ext(void)
346
{
347
    WOLFSSL_STACK* sk;
348
    WOLFSSL_ENTER("wolfSSL_sk_new_x509_ext");
349
350
    sk = wolfSSL_sk_new_null();
351
    if (sk) {
352
        sk->type = STACK_TYPE_X509_EXT;
353
    }
354
    return sk;
355
}
356
357
/* This function does NOT return 1 on success. It returns 0 on fail, and the
358
 * number of items in the stack upon success. This is for compatibility with
359
 * OpenSSL. */
360
int wolfSSL_sk_X509_EXTENSION_push(WOLFSSL_STACK* sk,
361
    WOLFSSL_X509_EXTENSION* ext)
362
{
363
    WOLFSSL_ENTER("wolfSSL_sk_X509_EXTENSION_push");
364
365
    return wolfSSL_sk_push(sk, ext);
366
}
367
368
static WOLFSSL_STACK* generateExtStack(const WOLFSSL_X509 *x)
369
{
370
    int numOfExt, i;
371
    WOLFSSL_X509 *x509 = (WOLFSSL_X509*)x;
372
    WOLFSSL_STACK* ret;
373
    WOLFSSL_STACK* tmp;
374
375
    if (!x509) {
376
        WOLFSSL_MSG("Bad parameter");
377
        return NULL;
378
    }
379
380
    /* Save x509->ext_sk */
381
    tmp = x509->ext_sk;
382
    x509->ext_sk = NULL;
383
    numOfExt = wolfSSL_X509_get_ext_count(x509);
384
385
    for (i = 0; i < numOfExt; i++) {
386
        /* Build the extension stack */
387
        (void)wolfSSL_X509_set_ext(x509, i);
388
    }
389
390
    /* Restore */
391
    ret = x509->ext_sk;
392
    x509->ext_sk = tmp;
393
    return ret;
394
}
395
396
/**
397
 * @param x Certificate to extract extensions from
398
 * @return STACK_OF(X509_EXTENSION)*
399
 */
400
const WOLFSSL_STACK *wolfSSL_X509_get0_extensions(const WOLFSSL_X509 *x)
401
{
402
    int numOfExt;
403
    WOLFSSL_X509 *x509 = (WOLFSSL_X509*)x;
404
    WOLFSSL_ENTER("wolfSSL_X509_get0_extensions");
405
406
    if (!x509) {
407
        WOLFSSL_MSG("Bad parameter");
408
        return NULL;
409
    }
410
411
    numOfExt = wolfSSL_X509_get_ext_count(x509);
412
413
    if (numOfExt != wolfSSL_sk_num(x509->ext_sk_full)) {
414
        wolfSSL_sk_pop_free(x509->ext_sk_full, NULL);
415
        x509->ext_sk_full = generateExtStack(x);
416
    }
417
418
    return x509->ext_sk_full;
419
}
420
421
/**
422
 * Caller is responsible for freeing the returned stack.
423
 */
424
const WOLFSSL_STACK *wolfSSL_X509_REQ_get_extensions(const WOLFSSL_X509 *x)
425
{
426
    return generateExtStack(x);
427
}
428
429
/* Gets the X509_EXTENSION* ext based on it's location in WOLFSSL_X509* x509.
430
 *
431
 * x509   : The X509 structure to look for the extension.
432
 * loc    : Location of the extension. If the extension is found at the given
433
 * location, a new X509_EXTENSION structure is populated with extension-specific
434
 * data based on the extension type.
435
436
 * Returns NULL on error or pointer to X509_EXTENSION structure containing the
437
 * extension. The returned X509_EXTENSION should not be free'd by caller.
438
 * The returned X509_EXTENSION is pushed onto a stack inside the x509 argument.
439
 * This is later free'd when x509 is free'd.
440
 *
441
 * NOTE: for unknown extension NIDs, a X509_EXTENSION is populated with the
442
 * extension oid as the ASN1_OBJECT (QT compatibility)
443
 */
444
WOLFSSL_X509_EXTENSION* wolfSSL_X509_get_ext(const WOLFSSL_X509* x509, int loc)
445
{
446
    WOLFSSL_X509_EXTENSION* ext = NULL;
447
    WOLFSSL_ENTER("wolfSSL_X509_get_ext");
448
    if (x509 == NULL)
449
        return NULL;
450
451
   ext = wolfSSL_X509_set_ext((WOLFSSL_X509*) x509, loc);
452
   return ext;
453
}
454
455
int wolfSSL_X509_get_ext_by_OBJ(const WOLFSSL_X509 *x,
456
        const WOLFSSL_ASN1_OBJECT *obj, int lastpos)
457
{
458
    const WOLF_STACK_OF(WOLFSSL_X509_EXTENSION) *sk;
459
460
    if (!x || !obj) {
461
        WOLFSSL_MSG("Bad parameter");
462
        return WOLFSSL_FATAL_ERROR;
463
    }
464
465
    sk = wolfSSL_X509_get0_extensions(x);
466
    if (!sk) {
467
        WOLFSSL_MSG("No extensions");
468
        return WOLFSSL_FATAL_ERROR;
469
    }
470
    lastpos++;
471
    if (lastpos < 0)
472
        lastpos = 0;
473
    for (; lastpos < wolfSSL_sk_num(sk); lastpos++) {
474
        const WOLFSSL_X509_EXTENSION *ext =
475
            wolfSSL_sk_X509_EXTENSION_value(sk, lastpos);
476
        if (ext == NULL)
477
            continue;
478
        if (wolfSSL_OBJ_cmp(ext->obj, obj) == 0)
479
            return lastpos;
480
    }
481
    return WOLFSSL_FATAL_ERROR;
482
}
483
484
485
int wolfSSL_X509_OBJECT_set1_X509(WOLFSSL_X509_OBJECT *a, WOLFSSL_X509 *obj)
486
{
487
    WOLFSSL_STUB("wolfSSL_X509_OBJECT_set1_X509");
488
    (void)a;
489
    (void)obj;
490
    return 0;
491
}
492
493
int wolfSSL_X509_OBJECT_set1_X509_CRL(WOLFSSL_X509_OBJECT *a,
494
    WOLFSSL_X509_CRL *obj)
495
{
496
    WOLFSSL_STUB("wolfSSL_X509_OBJECT_set1_X509_CRL");
497
    (void)a;
498
    (void)obj;
499
    return 0;
500
}
501
502
#endif /* OPENSSL_ALL || OPENSSL_EXTRA */
503
504
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
505
    defined(WOLFSSL_WPAS_SMALL)
506
/* Set a general name from the DNS entry data.
507
 *
508
 * @param [in]      dns  DNS entry.
509
 * @param [in, out] gn   General name to place data in.
510
 * @return  1 on success.
511
 * @return  0 on failure.
512
 */
513
static int wolfssl_dns_entry_othername_to_gn(DNS_entry* dns,
514
    WOLFSSL_GENERAL_NAME* gn)
515
{
516
    int ret = 0;
517
    WOLFSSL_ASN1_OBJECT* obj = NULL;
518
    WOLFSSL_ASN1_TYPE* type = NULL;
519
    WOLFSSL_ASN1_STRING* str = NULL;
520
    byte tag = 0;
521
    unsigned char* p = (unsigned char *)dns->name;
522
    long len = dns->len;
523
524
#ifdef WOLFSSL_FPKI
525
    if (dns->oidSum != 0) {
526
        /* UPN OID: 1.3.6.1.4.1.311.20.2.3 */
527
        static const unsigned char upn_oid[] = {
528
            0x2B, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x14, 0x02, 0x03
529
        };
530
        /* FASCN OID: 2.16.840.1.101.3.6.6 */
531
        static const unsigned char fascn_oid[] = {
532
            0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x06, 0x06
533
        };
534
        const unsigned char* oid;
535
        word32 oidSz;
536
537
        if ((oid = OidFromId(dns->oidSum, oidCertAltNameType, &oidSz)) ==
538
                NULL) {
539
            if (dns->oidSum == UPN_OID) {
540
                oid = upn_oid;
541
                oidSz = (word32)sizeof(upn_oid);
542
            }
543
            else if (dns->oidSum == FASCN_OID) {
544
                oid = fascn_oid;
545
                oidSz = (word32)sizeof(fascn_oid);
546
            }
547
            else {
548
                goto err;
549
            }
550
        }
551
        if ((obj = wolfSSL_c2i_ASN1_OBJECT(NULL, &oid, oidSz)) == NULL) {
552
            goto err;
553
        }
554
555
        tag = WOLFSSL_V_ASN1_UTF8STRING;
556
    }
557
    else
558
#endif
559
    {
560
        word32 idx = 0;
561
        int nameLen;
562
563
        /* Create an object id for general name from DER encoding. */
564
        obj = wolfSSL_d2i_ASN1_OBJECT(NULL, (const unsigned char**)&p, len);
565
        if (obj == NULL)
566
            goto err;
567
        /* Pointer moved on and now update length of remaining data. */
568
        len -= (long)((size_t)p - (size_t)dns->name);
569
570
        /* Next is "value      [0] EXPLICIT ANY DEFINED BY type-id" */
571
        if (GetASNHeader(p, ASN_CONTEXT_SPECIFIC | ASN_CONSTRUCTED | 0,
572
                &idx, &nameLen, (word32)len) < 0)
573
            goto err;
574
        p += idx;
575
        len -= idx;
576
577
        /* Set the tag to object so that it gets output in raw form */
578
        tag = WOLFSSL_V_ASN1_SEQUENCE;
579
    }
580
581
    /* Create a WOLFSSL_ASN1_STRING from the DER. */
582
    str = wolfSSL_ASN1_STRING_type_new(tag);
583
    if (str == NULL) {
584
        goto err;
585
    }
586
    wolfSSL_ASN1_STRING_set(str, p, (int)len);
587
588
    /* Wrap string in a WOLFSSL_ASN1_TYPE. */
589
    type = wolfSSL_ASN1_TYPE_new();
590
    if (type == NULL)
591
        goto err;
592
    wolfSSL_ASN1_TYPE_set(type, tag, str);
593
    str = NULL; /* type now owns str */
594
595
    if (wolfSSL_GENERAL_NAME_set_type(gn, WOLFSSL_GEN_OTHERNAME)
596
            != WOLFSSL_SUCCESS) {
597
        goto err;
598
    }
599
600
    /* Store the object and string in general name. */
601
    gn->d.otherName->type_id = obj;
602
    gn->d.otherName->value = type;
603
    type = NULL; /* gn->d.otherName owns type */
604
605
    ret = 1;
606
err:
607
    if (ret != 1) {
608
        wolfSSL_ASN1_OBJECT_free(obj);
609
        wolfSSL_ASN1_TYPE_free(type);
610
        wolfSSL_ASN1_STRING_free(str);
611
    }
612
    return ret;
613
}
614
#endif /* OPENSSL_ALL || WOLFSSL_WPAS_SMALL */
615
616
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)
617
static int DNS_to_GENERAL_NAME(WOLFSSL_GENERAL_NAME* gn, DNS_entry* dns)
618
{
619
    switch (dns->type) {
620
        case WOLFSSL_GEN_OTHERNAME:
621
            /* Sets gn->type internally */
622
            if (!wolfssl_dns_entry_othername_to_gn(dns, gn)) {
623
                WOLFSSL_MSG("OTHERNAME set failed");
624
                return WOLFSSL_FAILURE;
625
            }
626
            break;
627
628
        case WOLFSSL_GEN_EMAIL:
629
        case WOLFSSL_GEN_DNS:
630
        case WOLFSSL_GEN_URI:
631
        case WOLFSSL_GEN_IPADD:
632
        case WOLFSSL_GEN_IA5:
633
            gn->type = dns->type;
634
            gn->d.ia5->length = dns->len;
635
            if (wolfSSL_ASN1_STRING_set(gn->d.ia5, dns->name,
636
                    gn->d.ia5->length) != WOLFSSL_SUCCESS) {
637
                WOLFSSL_MSG("ASN1_STRING_set failed");
638
                return WOLFSSL_FAILURE;
639
            }
640
            break;
641
642
643
        case WOLFSSL_GEN_DIRNAME:
644
            gn->type = dns->type;
645
            /* wolfSSL_GENERAL_NAME_new() mallocs this by default */
646
            wolfSSL_ASN1_STRING_free(gn->d.ia5);
647
            gn->d.ia5 = NULL;
648
649
            gn->d.dirn = wolfSSL_X509_NAME_new();;
650
            /* @TODO extract dir name info from DNS_entry */
651
            break;
652
653
#ifdef WOLFSSL_RID_ALT_NAME
654
        case WOLFSSL_GEN_RID:
655
            gn->type = dns->type;
656
            /* wolfSSL_GENERAL_NAME_new() mallocs this by default */
657
            wolfSSL_ASN1_STRING_free(gn->d.ia5);
658
            gn->d.ia5 = NULL;
659
660
            gn->d.registeredID = wolfSSL_ASN1_OBJECT_new();
661
            if (gn->d.registeredID == NULL) {
662
                return WOLFSSL_FAILURE;
663
            }
664
            {
665
                /* Store DER-encoded OID (tag + length + content) in obj */
666
                word32 derSz = 1 + SetLength(dns->len, NULL) + dns->len;
667
                byte* der = (byte*)XMALLOC(derSz,
668
                    gn->d.registeredID->heap, DYNAMIC_TYPE_ASN1);
669
                if (der == NULL) {
670
                    return WOLFSSL_FAILURE;
671
                }
672
                {
673
                    word32 idx = 0;
674
                    der[idx++] = ASN_OBJECT_ID;
675
                    idx += SetLength(dns->len, der + idx);
676
                    XMEMCPY(der + idx, dns->name, dns->len);
677
                }
678
                gn->d.registeredID->obj = der;
679
                gn->d.registeredID->objSz = derSz;
680
            }
681
            gn->d.registeredID->dynamic |= WOLFSSL_ASN1_DYNAMIC_DATA;
682
            gn->d.registeredID->grp = oidCertExtType;
683
            break;
684
#endif
685
686
        case WOLFSSL_GEN_X400:
687
            /* Unsupported: fall through */
688
        case WOLFSSL_GEN_EDIPARTY:
689
            /* Unsupported: fall through */
690
        default:
691
            WOLFSSL_MSG("Unsupported type conversion");
692
            return WOLFSSL_FAILURE;
693
    }
694
    return WOLFSSL_SUCCESS;
695
}
696
697
698
static int wolfssl_x509_alt_names_to_gn(WOLFSSL_X509* x509,
699
    WOLFSSL_X509_EXTENSION* ext)
700
{
701
    int ret = 0;
702
    WOLFSSL_GENERAL_NAME* gn = NULL;
703
    DNS_entry* dns = NULL;
704
    WOLFSSL_STACK* sk;
705
706
    sk = (WOLFSSL_GENERAL_NAMES*)XMALLOC(sizeof(WOLFSSL_GENERAL_NAMES), NULL,
707
        DYNAMIC_TYPE_ASN1);
708
    if (sk == NULL) {
709
        goto err;
710
    }
711
    XMEMSET(sk, 0, sizeof(WOLFSSL_GENERAL_NAMES));
712
    sk->type = STACK_TYPE_GEN_NAME;
713
714
    if (x509->subjAltNameSet && x509->altNames != NULL) {
715
        /* alt names are DNS_entry structs */
716
        dns = x509->altNames;
717
        /* Currently only support GEN_DNS type */
718
        while (dns != NULL) {
719
            gn = wolfSSL_GENERAL_NAME_new();
720
            if (gn == NULL) {
721
                WOLFSSL_MSG("Error creating GENERAL_NAME");
722
                wolfSSL_sk_pop_free(sk, NULL);
723
                goto err;
724
            }
725
726
            if (DNS_to_GENERAL_NAME(gn, dns) != WOLFSSL_SUCCESS) {
727
                wolfSSL_GENERAL_NAME_free(gn);
728
                wolfSSL_sk_pop_free(sk, NULL);
729
                goto err;
730
            }
731
732
            if (wolfSSL_sk_GENERAL_NAME_push(sk, gn) <= 0) {
733
                WOLFSSL_MSG("Error pushing onto stack");
734
                wolfSSL_GENERAL_NAME_free(gn);
735
                wolfSSL_sk_pop_free(sk, NULL);
736
                goto err;
737
            }
738
739
            dns = dns->next;
740
        }
741
    }
742
    ext->ext_sk = sk;
743
    ext->crit = x509->subjAltNameCrit;
744
745
    ret = 1;
746
err:
747
    return ret;
748
}
749
750
/* Pushes a new X509_EXTENSION* ext onto the stack inside WOLFSSL_X509* x509.
751
 * This is currently a helper function for wolfSSL_X509_get_ext
752
 * Caller does not free the returned WOLFSSL_X509_EXTENSION*
753
 */
754
WOLFSSL_X509_EXTENSION* wolfSSL_X509_set_ext(WOLFSSL_X509* x509, int loc)
755
{
756
    int extCount = 0, length = 0, outSz = 0, sz = 0, ret = 0;
757
    int objSz = 0, isSet = 0;
758
    const byte* rawCert;
759
    const byte* input;
760
    byte* oidBuf;
761
    word32 oid, idx = 0, tmpIdx = 0, nid;
762
    WOLFSSL_X509_EXTENSION* ext = NULL;
763
    WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
764
765
    WOLFSSL_ENTER("wolfSSL_X509_set_ext");
766
767
    if (x509 == NULL) {
768
        WOLFSSL_MSG("\tNot passed a certificate");
769
        return NULL;
770
    }
771
772
    if (loc < 0 || (loc > wolfSSL_X509_get_ext_count(x509))) {
773
        WOLFSSL_MSG("\tBad location argument");
774
        return NULL;
775
    }
776
777
    ext = wolfSSL_X509_EXTENSION_new();
778
    if (ext == NULL) {
779
        WOLFSSL_MSG("\tX509_EXTENSION_new() failed");
780
        return NULL;
781
    }
782
783
    rawCert = wolfSSL_X509_get_der((WOLFSSL_X509*)x509, &outSz);
784
    if (rawCert == NULL) {
785
        WOLFSSL_MSG("\tX509_get_der() failed");
786
        wolfSSL_X509_EXTENSION_free(ext);
787
        return NULL;
788
    }
789
790
#ifdef WOLFSSL_SMALL_STACK
791
    cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert), NULL, DYNAMIC_TYPE_DCERT);
792
    if (cert == NULL) {
793
        WOLFSSL_MSG("Failed to allocate memory for DecodedCert");
794
        wolfSSL_X509_EXTENSION_free(ext);
795
        return NULL;
796
    }
797
#endif
798
799
    InitDecodedCert(cert, rawCert, (word32)outSz, 0);
800
801
    if (ParseCert(cert,
802
#ifdef WOLFSSL_CERT_REQ
803
            x509->isCSR ? CERTREQ_TYPE :
804
#endif
805
                    CA_TYPE,
806
            NO_VERIFY, NULL) < 0) {
807
        WOLFSSL_MSG("\tCertificate parsing failed");
808
        wolfSSL_X509_EXTENSION_free(ext);
809
        FreeDecodedCert(cert);
810
        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
811
        return NULL;
812
    }
813
814
    input = cert->extensions;
815
    sz = cert->extensionsSz;
816
817
    if (input == NULL || sz == 0) {
818
        WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
819
        wolfSSL_X509_EXTENSION_free(ext);
820
        FreeDecodedCert(cert);
821
        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
822
        return NULL;
823
    }
824
825
#ifdef WOLFSSL_CERT_REQ
826
    if (!x509->isCSR)
827
#endif
828
    {
829
        if (input[idx++] != ASN_EXTENSIONS) {
830
            WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
831
            wolfSSL_X509_EXTENSION_free(ext);
832
            FreeDecodedCert(cert);
833
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
834
            return NULL;
835
        }
836
837
        if (GetLength(input, &idx, &length, (word32)sz) < 0) {
838
            WOLFSSL_MSG("\tfail: invalid length");
839
            wolfSSL_X509_EXTENSION_free(ext);
840
            FreeDecodedCert(cert);
841
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
842
            return NULL;
843
        }
844
    }
845
846
    if (GetSequence(input, &idx, &length, (word32)sz) < 0) {
847
        WOLFSSL_MSG("\tfail: should be a SEQUENCE (1)");
848
        wolfSSL_X509_EXTENSION_free(ext);
849
        FreeDecodedCert(cert);
850
        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
851
        return NULL;
852
    }
853
854
    while (idx < (word32)sz) {
855
        oid = 0;
856
857
        if (GetSequence(input, &idx, &length, (word32)sz) < 0) {
858
            WOLFSSL_MSG("\tfail: should be a SEQUENCE");
859
            wolfSSL_X509_EXTENSION_free(ext);
860
            FreeDecodedCert(cert);
861
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
862
            return NULL;
863
        }
864
865
        tmpIdx = idx;
866
        ret = GetObjectId(input, &idx, &oid, oidCertExtType, (word32)sz);
867
        if (ret < 0) {
868
            WOLFSSL_MSG("\tfail: OBJECT ID");
869
            wolfSSL_X509_EXTENSION_free(ext);
870
            FreeDecodedCert(cert);
871
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
872
            return NULL;
873
        }
874
        idx = tmpIdx;
875
        nid = (word32)oid2nid(oid, oidCertExtType);
876
877
        /* Continue while loop until extCount == loc or idx > sz */
878
        if (extCount != loc) {
879
            idx += length;
880
            extCount++;
881
            continue;
882
        }
883
        /* extCount == loc. Now get the extension. */
884
        /* Check if extension has been set */
885
        isSet = wolfSSL_X509_ext_isSet_by_NID((WOLFSSL_X509*)x509, (int)nid);
886
887
        if (wolfSSL_OBJ_nid2ln((int)nid) != NULL) {
888
            /* This is NOT an unknown OID. */
889
            ext->obj = wolfSSL_OBJ_nid2obj((int)nid);
890
            if (ext->obj == NULL) {
891
                WOLFSSL_MSG("\tfail: Invalid OBJECT");
892
                wolfSSL_X509_EXTENSION_free(ext);
893
                FreeDecodedCert(cert);
894
                WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
895
                return NULL;
896
            }
897
        }
898
899
        if (ext->obj) {
900
            ext->obj->nid = (int)nid;
901
        }
902
903
        switch (oid) {
904
            case BASIC_CA_OID:
905
            {
906
                WOLFSSL_ASN1_INTEGER* a;
907
                word32 dataIdx = idx;
908
                word32 dummyOid;
909
                int dataLen = 0;
910
911
                if (!isSet)
912
                    break;
913
914
                /* Set pathlength */
915
                a = wolfSSL_ASN1_INTEGER_new();
916
917
                /* Set the data */
918
                ret = GetObjectId(input, &dataIdx, &dummyOid, oidCertExtType,
919
                        (word32)sz) == 0;
920
                if (ret && dataIdx < (word32)sz) {
921
                    /* Skip the critical information */
922
                    if (input[dataIdx] == ASN_BOOLEAN) {
923
                        dataIdx++;
924
                        ret = GetLength(input, &dataIdx, &dataLen, sz) >= 0;
925
                        dataIdx += dataLen;
926
                    }
927
                }
928
                if (ret) {
929
                    ret = GetOctetString(input, &dataIdx, &dataLen,
930
                            (word32)sz) > 0;
931
                }
932
                if (ret) {
933
                    ret = wolfSSL_ASN1_STRING_set(&ext->value, input + dataIdx,
934
                            dataLen) == 1;
935
                }
936
937
                if (a == NULL || !ret) {
938
                    wolfSSL_X509_EXTENSION_free(ext);
939
                    FreeDecodedCert(cert);
940
                    WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
941
                    return NULL;
942
                }
943
                a->length = (int)x509->pathLength;
944
945
                /* Save ASN1_INTEGER in x509 extension */
946
                ext->obj->pathlen = a;
947
948
                ext->obj->ca = x509->isCa;
949
                break;
950
            }
951
952
            case AUTH_INFO_OID:
953
            {
954
                WOLFSSL_STACK* sk;
955
956
                if (!isSet)
957
                    break;
958
959
                /* Create a stack to hold both the caIssuer and ocsp objects
960
                    in X509_EXTENSION structure */
961
                sk = wolfSSL_sk_new_asn1_obj();
962
                if (sk == NULL) {
963
                    WOLFSSL_MSG("Failed to malloc stack");
964
                    wolfSSL_X509_EXTENSION_free(ext);
965
                    FreeDecodedCert(cert);
966
                    WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
967
                    return NULL;
968
                }
969
970
                /* Add CaIssuers object to stack */
971
                if (x509->authInfoCaIssuer != NULL &&
972
                    x509->authInfoCaIssuerSz > 0)
973
                {
974
                    WOLFSSL_ASN1_OBJECT* obj;
975
                    obj = wolfSSL_ASN1_OBJECT_new();
976
                    if (obj == NULL) {
977
                        WOLFSSL_MSG("Error creating ASN1 object");
978
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
979
                        wolfSSL_X509_EXTENSION_free(ext);
980
                        FreeDecodedCert(cert);
981
                        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
982
                        return NULL;
983
                    }
984
                    obj->obj = (byte*)x509->authInfoCaIssuer;
985
                    obj->objSz = (unsigned int)x509->authInfoCaIssuerSz;
986
                    obj->grp = oidCertAuthInfoType;
987
                    obj->nid = WC_NID_ad_ca_issuers;
988
989
                    ret = wolfSSL_sk_ASN1_OBJECT_push(sk, obj) > 0
990
                            ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
991
                    if (ret != WOLFSSL_SUCCESS) {
992
                        WOLFSSL_MSG("Error pushing ASN1 object onto stack");
993
                        wolfSSL_ASN1_OBJECT_free(obj);
994
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
995
                        wolfSSL_X509_EXTENSION_free(ext);
996
                        FreeDecodedCert(cert);
997
                        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
998
                        return NULL;
999
                    }
1000
                }
1001
1002
                /* Add OCSP object to stack */
1003
                if (x509->authInfo != NULL &&
1004
                    x509->authInfoSz > 0)
1005
                {
1006
                    WOLFSSL_ASN1_OBJECT* obj;
1007
                    obj = wolfSSL_ASN1_OBJECT_new();
1008
                    if (obj == NULL) {
1009
                        WOLFSSL_MSG("Error creating ASN1 object");
1010
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
1011
                        wolfSSL_X509_EXTENSION_free(ext);
1012
                        FreeDecodedCert(cert);
1013
                        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1014
                        return NULL;
1015
                    }
1016
                    obj->obj = x509->authInfo;
1017
                    obj->objSz = (unsigned int)x509->authInfoSz;
1018
                    obj->grp = oidCertAuthInfoType;
1019
                    obj->nid = WC_NID_ad_OCSP;
1020
1021
                    ret = wolfSSL_sk_ASN1_OBJECT_push(sk, obj) > 0
1022
                            ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
1023
                    if (ret != WOLFSSL_SUCCESS) {
1024
                        WOLFSSL_MSG("Error pushing ASN1 object onto stack");
1025
                        wolfSSL_ASN1_OBJECT_free(obj);
1026
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
1027
                        wolfSSL_X509_EXTENSION_free(ext);
1028
                        FreeDecodedCert(cert);
1029
                        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1030
                        return NULL;
1031
                    }
1032
                }
1033
                ext->ext_sk = sk;
1034
                break;
1035
            }
1036
1037
            case ALT_NAMES_OID:
1038
                if (!isSet)
1039
                    break;
1040
                if (!wolfssl_x509_alt_names_to_gn(x509, ext)) {
1041
                    wolfSSL_X509_EXTENSION_free(ext);
1042
                    FreeDecodedCert(cert);
1043
                    WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1044
                    return NULL;
1045
                }
1046
                break;
1047
        }
1048
1049
        /* The ASN1_OBJECT in the extension is set in the same way
1050
         * for recognized and for unrecognized extension types, as
1051
         * the full OCTET STRING */
1052
1053
        /* Get OID from input */
1054
        if (GetASNObjectId(input, &idx, &length, (word32)sz) != 0) {
1055
            WOLFSSL_MSG("Failed to Get ASN Object Id");
1056
            wolfSSL_X509_EXTENSION_free(ext);
1057
            FreeDecodedCert(cert);
1058
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1059
            return NULL;
1060
        }
1061
        oidBuf = (byte*)XMALLOC(length+1+MAX_LENGTH_SZ, NULL,
1062
                            DYNAMIC_TYPE_TMP_BUFFER);
1063
        if (oidBuf == NULL) {
1064
            WOLFSSL_MSG("Failed to malloc tmp buffer");
1065
            wolfSSL_X509_EXTENSION_free(ext);
1066
            FreeDecodedCert(cert);
1067
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1068
            return NULL;
1069
        }
1070
        oidBuf[0] = ASN_OBJECT_ID;
1071
        objSz++;
1072
        objSz += SetLength(length, oidBuf + 1);
1073
        objSz += length;
1074
1075
        /* Set object size and reallocate space in object buffer */
1076
        if (ext->obj == NULL) {
1077
            ext->obj = wolfSSL_ASN1_OBJECT_new();
1078
            if (ext->obj == NULL) {
1079
                XFREE(oidBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1080
                wolfSSL_X509_EXTENSION_free(ext);
1081
                FreeDecodedCert(cert);
1082
                WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1083
                return NULL;
1084
            }
1085
        }
1086
1087
        if (((ext->obj->dynamic & WOLFSSL_ASN1_DYNAMIC_DATA) != 0) ||
1088
            (ext->obj->obj == NULL)) {
1089
            byte* tmp;
1090
        #ifdef WOLFSSL_NO_REALLOC
1091
            tmp = (byte*)XMALLOC(objSz, NULL, DYNAMIC_TYPE_ASN1);
1092
            if (tmp != NULL && ext->obj->obj != NULL) {
1093
                XMEMCPY(tmp, ext->obj->obj, ext->obj->objSz);
1094
                XFREE((byte*)ext->obj->obj, NULL, DYNAMIC_TYPE_ASN1);
1095
            }
1096
            else if (tmp == NULL) {
1097
                XFREE((byte*)ext->obj->obj, NULL, DYNAMIC_TYPE_ASN1);
1098
            }
1099
            ext->obj->obj = tmp;
1100
        #else
1101
            tmp = (byte*)XREALLOC((byte*)ext->obj->obj, objSz, NULL,
1102
                                  DYNAMIC_TYPE_ASN1);
1103
            if (tmp == NULL)
1104
                XFREE((byte*)ext->obj->obj, NULL, DYNAMIC_TYPE_ASN1);
1105
            ext->obj->obj = tmp;
1106
        #endif
1107
            if (ext->obj->obj == NULL) {
1108
                wolfSSL_X509_EXTENSION_free(ext);
1109
                FreeDecodedCert(cert);
1110
                XFREE(oidBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1111
                WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1112
                return NULL;
1113
            }
1114
            ext->obj->dynamic |= WOLFSSL_ASN1_DYNAMIC_DATA;
1115
        }
1116
        else {
1117
            ext->obj->dynamic &= ~WOLFSSL_ASN1_DYNAMIC_DATA;
1118
        }
1119
        ext->obj->objSz = (unsigned int)objSz;
1120
1121
        /* Get OID from input and copy to ASN1_OBJECT buffer */
1122
        XMEMCPY(oidBuf+2, input+idx, length);
1123
        XMEMCPY((byte*)ext->obj->obj, oidBuf, ext->obj->objSz);
1124
        XFREE(oidBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1125
        oidBuf = NULL;
1126
        ext->obj->grp = oidCertExtType;
1127
        ext->crit = 0;
1128
1129
        tmpIdx = idx + length;
1130
1131
        /* Get CRITICAL. If not present, defaults to false.
1132
         * It present, must be a valid TRUE */
1133
        if ((tmpIdx < (word32)sz) &&
1134
            (input[tmpIdx] == ASN_BOOLEAN))
1135
        {
1136
            if (((tmpIdx + 2) >= (word32)sz) ||
1137
                /* Check bool length */
1138
                (input[tmpIdx+1] != 1) ||
1139
                /* Assert true if CRITICAL present */
1140
                (input[tmpIdx+2] != 0xff))
1141
            {
1142
                WOLFSSL_MSG("Error decoding unknown extension data");
1143
                wolfSSL_ASN1_OBJECT_free(ext->obj);
1144
                wolfSSL_X509_EXTENSION_free(ext);
1145
                FreeDecodedCert(cert);
1146
                WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1147
                return NULL;
1148
            }
1149
1150
            ext->crit = 1;
1151
            tmpIdx += 3;
1152
        }
1153
1154
        /* Get extension data and copy as ASN1_STRING */
1155
        if ((tmpIdx >= (word32)sz) ||
1156
            (input[tmpIdx] != ASN_OCTET_STRING))
1157
        {
1158
            WOLFSSL_MSG("Error decoding unknown extension data");
1159
            wolfSSL_ASN1_OBJECT_free(ext->obj);
1160
            wolfSSL_X509_EXTENSION_free(ext);
1161
            FreeDecodedCert(cert);
1162
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1163
            return NULL;
1164
        }
1165
1166
        tmpIdx++;
1167
1168
        if (GetLength(input, &tmpIdx, &length, (word32)sz) <= 0) {
1169
            WOLFSSL_MSG("Error: Invalid Input Length.");
1170
            wolfSSL_ASN1_OBJECT_free(ext->obj);
1171
            wolfSSL_X509_EXTENSION_free(ext);
1172
            FreeDecodedCert(cert);
1173
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1174
            return NULL;
1175
        }
1176
        ext->value.data = (char*)XMALLOC(length, NULL,
1177
            DYNAMIC_TYPE_ASN1);
1178
        ext->value.isDynamic = 1;
1179
        if (ext->value.data == NULL) {
1180
            WOLFSSL_MSG("Failed to malloc ASN1_STRING data");
1181
            wolfSSL_X509_EXTENSION_free(ext);
1182
            FreeDecodedCert(cert);
1183
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1184
            return NULL;
1185
        }
1186
        XMEMCPY(ext->value.data,input+tmpIdx,length);
1187
        ext->value.length = length;
1188
1189
        break; /* Got the Extension. Now exit while loop. */
1190
1191
    } /* while(idx < sz) */
1192
1193
    /* Store the new extension in a stack inside x509
1194
     * The extensions on the stack are free'd internally when FreeX509 is called
1195
     */
1196
    if (x509->ext_sk == NULL)
1197
        x509->ext_sk = wolfSSL_sk_new_x509_ext();
1198
    if (wolfSSL_sk_insert(x509->ext_sk, ext, -1) <= 0) {
1199
        wolfSSL_X509_EXTENSION_free(ext);
1200
        ext = NULL;
1201
    }
1202
1203
    FreeDecodedCert(cert);
1204
    WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
1205
    return ext;
1206
}
1207
1208
/**
1209
 * @param str String to copy
1210
 * @param buf Output buffer. If this contains a pointer then it is free'd
1211
 *            with the DYNAMIC_TYPE_X509_EXT hint.
1212
 * @param len Output length
1213
 * @return WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on error
1214
 */
1215
static int asn1_string_copy_to_buffer(WOLFSSL_ASN1_STRING* str, byte** buf,
1216
        word32* len, void* heap)
1217
{
1218
    if (str->data && str->length > 0) {
1219
        if (*buf)
1220
            XFREE(*buf, heap, DYNAMIC_TYPE_X509_EXT);
1221
        *len = 0;
1222
        *buf = (byte*)XMALLOC(str->length, heap, DYNAMIC_TYPE_X509_EXT);
1223
        if (!*buf) {
1224
            WOLFSSL_MSG("malloc error");
1225
            return WOLFSSL_FAILURE;
1226
        }
1227
        *len = (word32)str->length;
1228
        XMEMCPY(*buf, str->data, str->length);
1229
    }
1230
1231
    (void)heap;
1232
    return WOLFSSL_SUCCESS;
1233
}
1234
1235
int wolfSSL_X509_add_ext(WOLFSSL_X509 *x509, WOLFSSL_X509_EXTENSION *ext,
1236
    int loc)
1237
{
1238
    int nid;
1239
1240
    WOLFSSL_ENTER("wolfSSL_X509_add_ext");
1241
1242
    if (!x509 || !ext || loc >= 0) {
1243
        WOLFSSL_MSG("Bad parameter");
1244
        return WOLFSSL_FAILURE;
1245
    }
1246
    nid = (ext->obj != NULL) ? ext->obj->type : ext->value.nid;
1247
1248
    switch (nid) {
1249
    case WC_NID_authority_key_identifier:
1250
        if (x509->authKeyIdSrc != NULL) {
1251
            /* If authKeyId points into authKeyIdSrc then free it and
1252
             * revert to old functionality */
1253
            XFREE(x509->authKeyIdSrc, x509->heap, DYNAMIC_TYPE_X509_EXT);
1254
            x509->authKeyIdSrc = NULL;
1255
            x509->authKeyId = NULL;
1256
        }
1257
        if (asn1_string_copy_to_buffer(&ext->value, &x509->authKeyId,
1258
                &x509->authKeyIdSz, x509->heap) != WOLFSSL_SUCCESS) {
1259
            WOLFSSL_MSG("asn1_string_copy_to_buffer error");
1260
            return WOLFSSL_FAILURE;
1261
        }
1262
        x509->authKeyIdCrit = (byte)ext->crit;
1263
        break;
1264
    case WC_NID_subject_key_identifier:
1265
        if (asn1_string_copy_to_buffer(&ext->value, &x509->subjKeyId,
1266
                &x509->subjKeyIdSz, x509->heap) != WOLFSSL_SUCCESS) {
1267
            WOLFSSL_MSG("asn1_string_copy_to_buffer error");
1268
            return WOLFSSL_FAILURE;
1269
        }
1270
        x509->subjKeyIdCrit = (byte)ext->crit;
1271
        break;
1272
    case WC_NID_subject_alt_name:
1273
    {
1274
        WOLFSSL_GENERAL_NAMES* gns = ext->ext_sk;
1275
        while (gns) {
1276
            WOLFSSL_GENERAL_NAME* gn = gns->data.gn;
1277
            if ((gn != NULL) && (gn->type == ASN_OTHER_TYPE)) {
1278
                char *buf = NULL;
1279
                int ret = 0;
1280
                word32 len = 0;
1281
1282
                len = SetOthername(gn->d.otherName, NULL);
1283
                if (len == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
1284
                    return WOLFSSL_FAILURE;
1285
                }
1286
1287
                buf = (char*)XMALLOC(len, x509->heap, DYNAMIC_TYPE_X509_EXT);
1288
                if (buf == NULL) {
1289
                    WOLFSSL_MSG("Couldn't allocate memory for othername");
1290
                    return WOLFSSL_FAILURE;
1291
                }
1292
1293
                /* SetOthername() cannot fail; already passed above. */
1294
                SetOthername(gn->d.otherName, (byte*)buf);
1295
1296
                ret = wolfSSL_X509_add_altname_ex(x509, buf, len,
1297
                                                  ASN_OTHER_TYPE);
1298
                XFREE(buf, x509->heap, DYNAMIC_TYPE_X509_EXT);
1299
                if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
1300
                     WOLFSSL_MSG("wolfSSL_X509_add_altname_ex() failed");
1301
                     return WOLFSSL_FAILURE;
1302
                }
1303
            }
1304
            else if (!gn || !gn->d.ia5 ||
1305
                wolfSSL_X509_add_altname_ex(x509, gn->d.ia5->data,
1306
                    gn->d.ia5->length, gn->type) != WOLFSSL_SUCCESS) {
1307
                WOLFSSL_MSG("Subject alternative name missing extension");
1308
                return WOLFSSL_FAILURE;
1309
            }
1310
            gns = gns->next;
1311
        }
1312
        x509->subjAltNameSet = 1;
1313
        x509->subjAltNameCrit = (byte)ext->crit;
1314
        break;
1315
    }
1316
    case WC_NID_key_usage:
1317
        if (ext && ext->value.data) {
1318
            if (ext->value.length == sizeof(word16)) {
1319
                /* if ext->value is already word16, set directly */
1320
                x509->keyUsage = *(word16*)ext->value.data;
1321
#ifdef BIG_ENDIAN_ORDER
1322
                x509->keyUsage = rotlFixed16(x509->keyUsage, 8U);
1323
#endif
1324
                x509->keyUsageCrit = (byte)ext->crit;
1325
                x509->keyUsageSet = 1;
1326
            }
1327
            else if (ext->value.length > 0) {
1328
                /* ext->value is comma-delimited string, convert to word16 */
1329
                if (ParseKeyUsageStr(ext->value.data, &x509->keyUsage,
1330
                                     x509->heap) != 0) {
1331
                    return WOLFSSL_FAILURE;
1332
                }
1333
                x509->keyUsageCrit = (byte)ext->crit;
1334
                x509->keyUsageSet = 1;
1335
            }
1336
            else {
1337
                return WOLFSSL_FAILURE;
1338
            }
1339
        }
1340
        break;
1341
    case WC_NID_ext_key_usage:
1342
        if (ext && ext->value.data) {
1343
            if (ext->value.length == sizeof(byte)) {
1344
                /* if ext->value is already 1 byte, set directly */
1345
                x509->extKeyUsage = *(byte*)ext->value.data;
1346
                x509->extKeyUsageCrit = (byte)ext->crit;
1347
            }
1348
            else if (ext->value.length > 0) {
1349
                /* ext->value is comma-delimited string, convert to word16 */
1350
                if (ParseExtKeyUsageStr(ext->value.data, &x509->extKeyUsage,
1351
                                        x509->heap) != 0) {
1352
                    return WOLFSSL_FAILURE;
1353
                }
1354
                x509->extKeyUsageCrit = (byte)ext->crit;
1355
            }
1356
            else {
1357
                return WOLFSSL_FAILURE;
1358
            }
1359
        }
1360
        break;
1361
    case WC_NID_basic_constraints:
1362
        if (ext->obj) {
1363
            x509->isCa = (byte)ext->obj->ca;
1364
            x509->basicConstCrit = (byte)ext->crit;
1365
            if (ext->obj->pathlen) {
1366
                x509->pathLength = (word32)ext->obj->pathlen->length;
1367
                x509->basicConstPlSet = 1;
1368
                x509->pathLengthSet = 1;
1369
            }
1370
            x509->basicConstSet = 1;
1371
        }
1372
        break;
1373
    default:
1374
#ifdef WOLFSSL_CUSTOM_OID
1375
    {
1376
        char *oid = NULL;
1377
        byte *val = NULL;
1378
        int err = 0;
1379
1380
        if ((ext->obj == NULL) || (ext->value.length == 0)) {
1381
            WOLFSSL_MSG("Extension has insufficient information.");
1382
            return WOLFSSL_FAILURE;
1383
        }
1384
1385
        if ((x509->customExtCount < 0) ||
1386
            (x509->customExtCount >= NUM_CUSTOM_EXT)) {
1387
            WOLFSSL_MSG("Bad value for customExtCount.");
1388
            return WOLFSSL_FAILURE;
1389
        }
1390
1391
        /* This is a viable custom extension. */
1392
        oid = (char*)XMALLOC(MAX_OID_STRING_SZ, x509->heap,
1393
            DYNAMIC_TYPE_X509_EXT);
1394
        val = (byte*)XMALLOC(ext->value.length, x509->heap,
1395
            DYNAMIC_TYPE_X509_EXT);
1396
        if ((oid == NULL) || (val == NULL)) {
1397
            WOLFSSL_MSG("Memory allocation failure.\n");
1398
            err = 1;
1399
        }
1400
1401
        if (err == 0) {
1402
            XMEMCPY(val, ext->value.data, ext->value.length);
1403
            if (wolfSSL_OBJ_obj2txt(oid, MAX_OID_STRING_SZ, ext->obj, 1) < 0) {
1404
                err = 1;
1405
            }
1406
        }
1407
1408
        if (err == 1) {
1409
            XFREE(val, x509->heap, DYNAMIC_TYPE_X509_EXT);
1410
            XFREE(oid, x509->heap, DYNAMIC_TYPE_X509_EXT);
1411
            return WOLFSSL_FAILURE;
1412
        }
1413
1414
        /* ext->crit is WOLFSSL_ASN1_BOOLEAN */
1415
        if (ext->crit != 0 && ext->crit != -1) {
1416
            XFREE(val, x509->heap, DYNAMIC_TYPE_X509_EXT);
1417
            XFREE(oid, x509->heap, DYNAMIC_TYPE_X509_EXT);
1418
            return WOLFSSL_FAILURE;
1419
        }
1420
1421
        /* x509->custom_exts now owns the buffers and they must be managed. */
1422
        x509->custom_exts[x509->customExtCount].oid = oid;
1423
        x509->custom_exts[x509->customExtCount].crit = (byte)ext->crit;
1424
        x509->custom_exts[x509->customExtCount].val = val;
1425
        x509->custom_exts[x509->customExtCount].valSz = ext->value.length;
1426
        x509->customExtCount++;
1427
        break;
1428
    }
1429
#else
1430
        WOLFSSL_MSG("Unsupported extension to add");
1431
        return WOLFSSL_FAILURE;
1432
#endif /* WOLFSSL_CUSTOM_OID */
1433
    } /* switch (nid) */
1434
1435
    return WOLFSSL_SUCCESS;
1436
}
1437
1438
/* Returns pointer to ASN1_STRING in X509_EXTENSION object */
1439
static WOLFSSL_ASN1_STRING* wolfSSL_X509_EXTENSION_get_data_internal(
1440
    WOLFSSL_X509_EXTENSION* ext)
1441
{
1442
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_get_data_internal");
1443
    if (ext == NULL)
1444
        return NULL;
1445
1446
    return &ext->value;
1447
}
1448
1449
1450
#ifndef NO_BIO
1451
1452
#ifndef MAX_INDENT
1453
    #define MAX_INDENT 40
1454
#endif
1455
1456
1457
/* Return 0 on success and 1 on failure. Copies ext data to bio, using indent
1458
 *  to pad the output. flag is ignored. */
1459
int wolfSSL_X509V3_EXT_print(WOLFSSL_BIO *out, WOLFSSL_X509_EXTENSION *ext,
1460
        unsigned long flag, int indent)
1461
{
1462
    WOLFSSL_ASN1_OBJECT* obj;
1463
    WOLFSSL_ASN1_STRING* str;
1464
    int nid;
1465
    int rc = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
1466
    char tmp[CTC_NAME_SIZE*2 + 1];
1467
    const int tmpSz = sizeof(tmp);
1468
    int tmpLen = 0;
1469
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_print");
1470
1471
    if (indent < 0) indent = 0;
1472
    if (indent > MAX_INDENT) indent = MAX_INDENT;
1473
1474
    if ((out == NULL) || (ext == NULL)) {
1475
        WOLFSSL_MSG("NULL parameter error");
1476
        return rc;
1477
    }
1478
1479
    obj = wolfSSL_X509_EXTENSION_get_object(ext);
1480
    if (obj == NULL) {
1481
        WOLFSSL_MSG("Error getting ASN1_OBJECT from X509_EXTENSION");
1482
        return rc;
1483
    }
1484
1485
    str = wolfSSL_X509_EXTENSION_get_data_internal(ext);
1486
    if (str == NULL) {
1487
        WOLFSSL_MSG("Error getting ASN1_STRING from X509_EXTENSION");
1488
        return rc;
1489
    }
1490
1491
    /* Print extension based on the type */
1492
    nid = wolfSSL_OBJ_obj2nid(obj);
1493
    switch (nid) {
1494
        case BASIC_CA_OID:
1495
        {
1496
            char isCa[] = "TRUE";
1497
            char notCa[] = "FALSE";
1498
            if ((tmpLen = XSNPRINTF(tmp, tmpSz, "%*sCA:%s", indent, "",
1499
                                     obj->ca ? isCa : notCa))
1500
                >= tmpSz)
1501
                return rc;
1502
            break;
1503
        }
1504
        case ALT_NAMES_OID:
1505
        {
1506
            WOLFSSL_STACK* sk;
1507
            char* val;
1508
            int valLen;
1509
            int len;
1510
1511
            sk = ext->ext_sk;
1512
            while (sk != NULL) {
1513
                if (sk->type == STACK_TYPE_GEN_NAME && sk->data.gn) {
1514
                    /* str is GENERAL_NAME for subject alternative name ext */
1515
                    str = sk->data.gn->d.ia5;
1516
                    len = str->length + 2; /* + 2 for NULL char and "," */
1517
                    if (len > tmpSz) {
1518
                        WOLFSSL_MSG("len greater than buffer size");
1519
                        return rc;
1520
                    }
1521
1522
                    val = (char*)XMALLOC(len + indent, NULL,
1523
                                                       DYNAMIC_TYPE_TMP_BUFFER);
1524
                    if (val == NULL) {
1525
                        WOLFSSL_MSG("Memory error");
1526
                        return rc;
1527
                    }
1528
                    valLen = XSNPRINTF(val, (size_t)len, "%*s%s", indent, "",
1529
                            str->strData);
1530
                    if ((valLen < 0) || (valLen >= len)
1531
                            || ((tmpLen + valLen) >= tmpSz)) {
1532
                        XFREE(val, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1533
                        return rc;
1534
                    }
1535
                    XMEMCPY(tmp + tmpLen, val, valLen);
1536
                    tmpLen += valLen;
1537
                    XFREE(val, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1538
                }
1539
                sk = sk->next;
1540
            }
1541
            break;
1542
        }
1543
        case AUTH_KEY_OID:
1544
        case SUBJ_KEY_OID:
1545
        {
1546
            char* asn1str;
1547
            asn1str = wolfSSL_i2s_ASN1_STRING(NULL, str);
1548
            tmpLen = XSNPRINTF(tmp, tmpSz, "%*s%s", indent, "", asn1str);
1549
            XFREE(asn1str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1550
            if (tmpLen >= tmpSz)
1551
                tmpLen = tmpSz - 1;
1552
            break;
1553
        }
1554
        case AUTH_INFO_OID:
1555
        case CERT_POLICY_OID:
1556
        case CRL_DIST_OID:
1557
        case KEY_USAGE_OID:
1558
            WOLFSSL_MSG("X509V3_EXT_print not yet implemented for ext type");
1559
            break;
1560
1561
        default:
1562
            if ((tmpLen = XSNPRINTF(
1563
                     tmp, tmpSz, "%*s%s", indent, "", str->strData))
1564
                >= tmpSz)
1565
                return rc;
1566
    }
1567
1568
    if (wolfSSL_BIO_write(out, tmp, tmpLen) == tmpLen) {
1569
        rc = WOLFSSL_SUCCESS;
1570
    }
1571
    (void) flag;
1572
1573
    return rc;
1574
}
1575
#endif /* !NO_BIO */
1576
1577
#ifndef NO_WOLFSSL_STUB
1578
int wolfSSL_X509V3_EXT_add_nconf(WOLFSSL_CONF *conf, WOLFSSL_X509V3_CTX *ctx,
1579
        const char *section, WOLFSSL_X509 *cert)
1580
{
1581
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_add_nconf");
1582
    WOLFSSL_STUB("wolfSSL_X509V3_EXT_add_nconf");
1583
    (void)conf;
1584
    (void)ctx;
1585
    (void)section;
1586
    (void)cert;
1587
    return WOLFSSL_SUCCESS;
1588
}
1589
#endif
1590
1591
/* Find extension by NID in a stack of extensions.
1592
 *
1593
 * @param sk Stack of extensions
1594
 * @param nid ID to search for
1595
 * @param lastpos Start search from this position (not inclusive, -1 means start from beginning)
1596
 * @return Index of matching extension or -1 on error/not found
1597
 */
1598
int wolfSSL_X509v3_get_ext_by_NID(const WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk,
1599
                                 int nid, int lastpos)
1600
{
1601
    int i;
1602
    WOLFSSL_ENTER("wolfSSL_X509v3_get_ext_by_NID");
1603
1604
    if (sk == NULL) {
1605
        WOLFSSL_MSG("Stack pointer is NULL");
1606
        return WOLFSSL_FATAL_ERROR;
1607
    }
1608
1609
    if (lastpos < -1 || lastpos >= wolfSSL_sk_num(sk)) {
1610
        WOLFSSL_MSG("Invalid position argument");
1611
        return WOLFSSL_FATAL_ERROR;
1612
    }
1613
1614
    for (i = lastpos + 1; i < wolfSSL_sk_num(sk); i++) {
1615
        WOLFSSL_X509_EXTENSION* ext = wolfSSL_sk_X509_EXTENSION_value(sk, i);
1616
        if (ext && ext->obj) {
1617
            if (wolfSSL_OBJ_obj2nid(ext->obj) == nid)
1618
                return i;
1619
        }
1620
    }
1621
1622
    /* Not found */
1623
    return -1;
1624
}
1625
1626
/* Get extension from a stack of extensions by location.
1627
 *
1628
 * @param sk Stack of extensions
1629
 * @param loc Index of extension to retrieve
1630
 * @return Pointer to extension or NULL on error
1631
 */
1632
WOLFSSL_X509_EXTENSION* wolfSSL_X509v3_get_ext(
1633
    const WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk, int loc)
1634
{
1635
    WOLFSSL_ENTER("wolfSSL_X509v3_get_ext");
1636
1637
    if (sk == NULL) {
1638
        WOLFSSL_MSG("Stack pointer is NULL");
1639
        return NULL;
1640
    }
1641
1642
    if (loc < 0 || loc >= wolfSSL_sk_num(sk)) {
1643
        WOLFSSL_MSG("Invalid location argument");
1644
        return NULL;
1645
    }
1646
1647
    return wolfSSL_sk_X509_EXTENSION_value(sk, loc);
1648
}
1649
1650
/* Returns crit flag in X509_EXTENSION object */
1651
int wolfSSL_X509_EXTENSION_get_critical(const WOLFSSL_X509_EXTENSION* ex)
1652
{
1653
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_get_critical");
1654
    if (ex == NULL)
1655
        return BAD_FUNC_ARG;
1656
    return ex->crit;
1657
}
1658
1659
/* Sets if the extension is critical
1660
 * returns WOLFSSL_SUCCESS on success
1661
 */
1662
int wolfSSL_X509_EXTENSION_set_critical(WOLFSSL_X509_EXTENSION* ex, int crit)
1663
{
1664
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_set_critical");
1665
    if (ex == NULL)
1666
        return WOLFSSL_FAILURE;
1667
    ex->crit = crit;
1668
    return WOLFSSL_SUCCESS;
1669
}
1670
1671
/* Creates v3_ext_method for a given X509v3 extension
1672
 *
1673
 * ex   : The X509_EXTENSION used to create v3_ext_method. If the extension is
1674
 * not NULL, get the NID of the extension object and populate the
1675
 * extension type-specific X509V3_EXT_* function(s) in v3_ext_method.
1676
 *
1677
 * Returns NULL on error or pointer to the v3_ext_method populated with
1678
 * extension type-specific X509V3_EXT_* function(s).
1679
 *
1680
 * NOTE: WC_NID_subject_key_identifier is currently the only extension
1681
 * implementing the X509V3_EXT_* functions, as it is the only type called
1682
 * directly by QT. The other extension types return a pointer to a
1683
 * v3_ext_method struct that contains only the NID.
1684
 */
1685
#if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L
1686
const WOLFSSL_v3_ext_method* wolfSSL_X509V3_EXT_get(WOLFSSL_X509_EXTENSION* ex)
1687
#else
1688
WOLFSSL_v3_ext_method* wolfSSL_X509V3_EXT_get(WOLFSSL_X509_EXTENSION* ex)
1689
#endif
1690
{
1691
    int nid;
1692
    WOLFSSL_v3_ext_method method;
1693
1694
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_get");
1695
    if ((ex == NULL) || (ex->obj == NULL)) {
1696
        WOLFSSL_MSG("Passed an invalid X509_EXTENSION*");
1697
        return NULL;
1698
    }
1699
    /* Initialize method to 0 */
1700
    XMEMSET(&method, 0, sizeof(struct WOLFSSL_v3_ext_method));
1701
1702
    nid = ex->obj->nid;
1703
    if (nid <= 0) {
1704
        WOLFSSL_MSG("Failed to get nid from passed extension object");
1705
        return NULL;
1706
    }
1707
    switch (nid) {
1708
        case WC_NID_basic_constraints:
1709
            break;
1710
        case WC_NID_subject_key_identifier:
1711
            method.i2s = (WOLFSSL_X509V3_EXT_I2S)wolfSSL_i2s_ASN1_STRING;
1712
            break;
1713
        case WC_NID_subject_alt_name:
1714
            WOLFSSL_MSG("i2v function not yet implemented for Subject "
1715
                        "Alternative Name");
1716
            break;
1717
        case WC_NID_key_usage:
1718
            WOLFSSL_MSG("i2v function not yet implemented for Key Usage");
1719
            break;
1720
        case WC_NID_authority_key_identifier:
1721
            WOLFSSL_MSG("i2v function not yet implemented for Auth Key Id");
1722
            break;
1723
        case WC_NID_info_access:
1724
            WOLFSSL_MSG("i2v function not yet implemented for Info Access");
1725
            break;
1726
        case WC_NID_ext_key_usage:
1727
            WOLFSSL_MSG("i2v function not yet implemented for Ext Key Usage");
1728
            break;
1729
        case WC_NID_certificate_policies:
1730
            WOLFSSL_MSG("r2i function not yet implemented for Cert Policies");
1731
            break;
1732
        case WC_NID_crl_distribution_points:
1733
            WOLFSSL_MSG("r2i function not yet implemented for CRL Dist Points");
1734
            break;
1735
        default:
1736
            /* If extension type is unknown, return NULL -- QT makes call to
1737
                X509_EXTENSION_get_data() if there is no v3_ext_method */
1738
            WOLFSSL_MSG("X509V3_EXT_get(): Unknown extension type found");
1739
            return NULL;
1740
    }
1741
1742
    method.ext_nid = nid;
1743
    ex->ext_method = method;
1744
1745
#if defined(OPENSSL_VERSION_NUMBER) && OPENSSL_VERSION_NUMBER >= 0x10100000L
1746
    return (const WOLFSSL_v3_ext_method*)&ex->ext_method;
1747
#else
1748
    return (WOLFSSL_v3_ext_method*)&ex->ext_method;
1749
#endif
1750
}
1751
1752
/* Create an Authority Info Access (AIA) from the contents of the extension.
1753
 *
1754
 * AIA is a stack of Access Descriptions.
1755
 *
1756
 * RFC 5280: 4.2.2.1
1757
 *
1758
 * @param [in] ext  X509v3 extension.
1759
 * @return  Stack of Access Descriptions as an AIA on success.
1760
 * @return  NULL on error.
1761
 */
1762
static WOLFSSL_AUTHORITY_INFO_ACCESS* wolfssl_x509v3_ext_aia_d2i(
1763
    WOLFSSL_X509_EXTENSION* ext)
1764
{
1765
    int err = 0;
1766
    int ret;
1767
    WOLFSSL_AUTHORITY_INFO_ACCESS* aia = NULL;
1768
    WOLFSSL_STACK* sk;
1769
    WOLFSSL_ACCESS_DESCRIPTION* ad = NULL;
1770
1771
    /* Get the type specific data of this extension. */
1772
    sk = ext->ext_sk;
1773
    if (sk == NULL) {
1774
        WOLFSSL_MSG("ACCESS_DESCRIPTION stack NULL");
1775
        err = 1;
1776
    }
1777
1778
    if (!err) {
1779
        /* AUTHORITY_INFO_ACCESS is a stack of ACCESS_DESCRIPTION entries. */
1780
        aia = wolfSSL_sk_new_null();
1781
        if (aia == NULL) {
1782
            WOLFSSL_MSG("Failed to malloc AUTHORITY_INFO_ACCESS");
1783
            err = 1;
1784
        }
1785
    }
1786
    if (!err) {
1787
        /* AIA is a stack of Access Descriptions. */
1788
        aia->type = STACK_TYPE_ACCESS_DESCRIPTION;
1789
    }
1790
1791
    while ((!err) && (sk != NULL)) {
1792
        WOLFSSL_ASN1_OBJECT* aiaEntry;
1793
1794
        /* Looking for objects in extension's data. */
1795
        if (sk->type != STACK_TYPE_OBJ) {
1796
            sk = sk->next;
1797
            continue;
1798
        }
1799
1800
        /* Get ASN.1 Object from the stack entry's data. */
1801
        aiaEntry = sk->data.obj;
1802
1803
        /* ACCESS_DESCRIPTION has two members: method and location.
1804
         *  method: ASN1_OBJECT as either AIA_OCSP_OID or AIA_CA_ISSUER_OID
1805
         *  location: GENERAL_NAME structure containing the URI.
1806
         */
1807
1808
        /* Allocate a new Access Description. */
1809
        ad = (WOLFSSL_ACCESS_DESCRIPTION*)XMALLOC(
1810
            sizeof(WOLFSSL_ACCESS_DESCRIPTION), NULL, DYNAMIC_TYPE_X509_EXT);
1811
        if (ad == NULL) {
1812
            WOLFSSL_MSG("Failed to malloc ACCESS_DESCRIPTION");
1813
            err = 1;
1814
            break;
1815
        }
1816
        XMEMSET(ad, 0, sizeof(WOLFSSL_ACCESS_DESCRIPTION));
1817
1818
        /* Create new ASN1_OBJECT from NID. */
1819
        ad->method = wolfSSL_OBJ_nid2obj(aiaEntry->nid);
1820
        if (ad->method == NULL) {
1821
            WOLFSSL_MSG("OBJ_nid2obj() failed");
1822
            err = 1;
1823
            break;
1824
        }
1825
1826
        /* Allocate memory for GENERAL NAME. */
1827
        ad->location = wolfSSL_GENERAL_NAME_new();
1828
        if (ad->location == NULL) {
1829
            WOLFSSL_MSG("Failed to malloc GENERAL_NAME");
1830
            err = 1;
1831
            break;
1832
        }
1833
1834
        /* Set the type of general name to URI (only type supported). */
1835
        ret = wolfSSL_GENERAL_NAME_set_type(ad->location, WOLFSSL_GEN_URI);
1836
        if (ret != WOLFSSL_SUCCESS) {
1837
            err = 1;
1838
            break;
1839
        }
1840
1841
        /* Set the URI into GENERAL_NAME. */
1842
        ret = wolfSSL_ASN1_STRING_set(ad->location->d.uniformResourceIdentifier,
1843
            aiaEntry->obj, aiaEntry->objSz);
1844
        if (ret != WOLFSSL_SUCCESS) {
1845
            WOLFSSL_MSG("ASN1_STRING_set() failed");
1846
            err = 1;
1847
            break;
1848
        }
1849
        /* Push onto AUTHORITY_INFO_ACCESS stack. */
1850
        ret = wolfSSL_sk_ACCESS_DESCRIPTION_push(aia, ad) > 0
1851
                ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
1852
        if (ret != WOLFSSL_SUCCESS) {
1853
            WOLFSSL_MSG("Error pushing ASN1 AD onto stack");
1854
            err = 1;
1855
            break;
1856
        }
1857
        /* Set to NULL so that it doesn't get freed now it is in AIA stack. */
1858
        ad = NULL;
1859
1860
        sk = sk->next;
1861
    }
1862
1863
    if (err) {
1864
        /* Dispose of Access Description if not put in stack. */
1865
        if (ad != NULL) {
1866
            wolfSSL_ASN1_OBJECT_free(ad->method);
1867
            wolfSSL_GENERAL_NAME_free(ad->location);
1868
            XFREE(ad, NULL, DYNAMIC_TYPE_X509_EXT);
1869
        }
1870
        /* Dispose of incomplete Access Description stack. */
1871
        wolfSSL_sk_ACCESS_DESCRIPTION_pop_free(aia, NULL);
1872
        aia = NULL;
1873
    }
1874
    return aia;
1875
}
1876
1877
/* Parses and returns an x509v3 extension internal structure.
1878
 *
1879
 * ext   : The X509_EXTENSION for parsing internal structure. If extension is
1880
 * not NULL, get the NID of the extension object and create a new
1881
 * extension-specific internal structure based on the extension type.
1882
 *
1883
 * Returns NULL on error or if NID is not found, otherwise returns a pointer to
1884
 * the extension type-specific X509_EXTENSION internal structure.
1885
 * Return is expected to be free'd by caller.
1886
 */
1887
void* wolfSSL_X509V3_EXT_d2i(WOLFSSL_X509_EXTENSION* ext)
1888
{
1889
    const WOLFSSL_v3_ext_method* method;
1890
    int ret;
1891
    WOLFSSL_ASN1_OBJECT* object;
1892
    WOLFSSL_BASIC_CONSTRAINTS* bc;
1893
    WOLFSSL_AUTHORITY_KEYID* akey;
1894
    WOLFSSL_ASN1_STRING* asn1String = NULL, *newString = NULL;
1895
    WOLFSSL_STACK* sk;
1896
    void *data = NULL;
1897
    WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
1898
1899
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_d2i");
1900
1901
    if (ext == NULL) {
1902
        WOLFSSL_MSG("Bad function Argument");
1903
        return NULL;
1904
    }
1905
1906
    object = wolfSSL_X509_EXTENSION_get_object(ext);
1907
    if (object == NULL) {
1908
        WOLFSSL_MSG("X509_EXTENSION_get_object failed");
1909
        return NULL;
1910
    }
1911
    /* extract extension info */
1912
    method = wolfSSL_X509V3_EXT_get(ext);
1913
    if (method == NULL) {
1914
        WOLFSSL_MSG("wolfSSL_X509V3_EXT_get error");
1915
        return NULL;
1916
    }
1917
1918
#ifdef WOLFSSL_SMALL_STACK
1919
    cert = (DecodedCert *)XMALLOC(sizeof(*cert), NULL,
1920
            DYNAMIC_TYPE_X509_EXT);
1921
    if (cert == NULL) {
1922
        WOLFSSL_MSG("\tout of memory");
1923
        return NULL;
1924
    }
1925
#endif
1926
1927
    InitDecodedCert(cert, NULL, 0, NULL);
1928
1929
    if ((object->type != WC_NID_basic_constraints) &&
1930
        (object->type != WC_NID_subject_alt_name) &&
1931
        (object->type != WC_NID_info_access)) {
1932
1933
        asn1String = wolfSSL_X509_EXTENSION_get_data_internal(ext);
1934
        if (asn1String == NULL) {
1935
            WOLFSSL_MSG("X509_EXTENSION_get_data() failed");
1936
            goto out;
1937
        }
1938
1939
        ret = DecodeExtensionType((const byte*)asn1String->data,
1940
                asn1String->length, object->type, (byte)ext->crit, cert, NULL);
1941
        if (ret != 0) {
1942
            WOLFSSL_MSG("DecodeExtensionType() failed");
1943
            goto out;
1944
        }
1945
    }
1946
1947
    /* Return pointer to proper internal structure based on NID */
1948
    switch (object->type) {
1949
        /* basicConstraints */
1950
        case WC_NID_basic_constraints:
1951
            WOLFSSL_MSG("basicConstraints");
1952
            /* Allocate new BASIC_CONSTRAINTS structure */
1953
            bc = wolfSSL_BASIC_CONSTRAINTS_new();
1954
            if (bc == NULL) {
1955
                WOLFSSL_MSG("Failed to malloc basic constraints");
1956
                break;
1957
            }
1958
            /* Copy pathlen and CA into BASIC_CONSTRAINTS from object */
1959
            bc->ca = object->ca;
1960
            if (object->pathlen != NULL && object->pathlen->length > 0) {
1961
                bc->pathlen = wolfSSL_ASN1_INTEGER_dup(object->pathlen);
1962
                if (bc->pathlen == NULL) {
1963
                    WOLFSSL_MSG("Failed to duplicate ASN1_INTEGER");
1964
                    wolfSSL_BASIC_CONSTRAINTS_free(bc);
1965
                    break;
1966
                }
1967
            }
1968
            else
1969
                bc->pathlen = NULL;
1970
1971
            data = bc;
1972
            break;
1973
1974
        /* subjectKeyIdentifier */
1975
        case WC_NID_subject_key_identifier:
1976
        {
1977
            WOLFSSL_MSG("subjectKeyIdentifier");
1978
1979
            newString = wolfSSL_ASN1_STRING_new();
1980
            if (newString == NULL) {
1981
                WOLFSSL_MSG("Failed to malloc ASN1_STRING");
1982
                break;
1983
            }
1984
            ret = wolfSSL_ASN1_STRING_set(newString, cert->extSubjKeyId,
1985
                                          cert->extSubjKeyIdSz);
1986
            if (ret != WOLFSSL_SUCCESS) {
1987
                WOLFSSL_MSG("ASN1_STRING_set() failed");
1988
                wolfSSL_ASN1_STRING_free(newString);
1989
                break;
1990
            };
1991
1992
            newString->type = asn1String->type;
1993
            data = newString;
1994
            break;
1995
        }
1996
1997
        /* authorityKeyIdentifier */
1998
        case WC_NID_authority_key_identifier:
1999
        {
2000
            WOLFSSL_MSG("AuthorityKeyIdentifier");
2001
2002
            akey = (WOLFSSL_AUTHORITY_KEYID*)
2003
                    XMALLOC(sizeof(WOLFSSL_AUTHORITY_KEYID), NULL,
2004
                    DYNAMIC_TYPE_X509_EXT);
2005
            if (akey == NULL) {
2006
                WOLFSSL_MSG("Failed to malloc authority key id");
2007
                break;
2008
            }
2009
2010
            XMEMSET(akey, 0, sizeof(WOLFSSL_AUTHORITY_KEYID));
2011
2012
            akey->keyid = wolfSSL_ASN1_STRING_new();
2013
            if (akey->keyid == NULL) {
2014
                WOLFSSL_MSG("ASN1_STRING_new() failed");
2015
                wolfSSL_AUTHORITY_KEYID_free(akey);
2016
                break;
2017
            }
2018
2019
            ret = wolfSSL_ASN1_STRING_set(akey->keyid, cert->extAuthKeyId,
2020
                                          cert->extAuthKeyIdSz);
2021
            if (ret != WOLFSSL_SUCCESS) {
2022
                WOLFSSL_MSG("ASN1_STRING_set() failed");
2023
                wolfSSL_AUTHORITY_KEYID_free(akey);
2024
                break;
2025
            };
2026
            akey->keyid->type   = asn1String->type;
2027
2028
            /* For now, set issuer and serial to NULL. This may need to be
2029
                updated for future use */
2030
            akey->issuer = NULL;
2031
            akey->serial = NULL;
2032
2033
            data = akey;
2034
            break;
2035
        }
2036
2037
        /* keyUsage */
2038
        case WC_NID_key_usage:
2039
        {
2040
            WOLFSSL_MSG("keyUsage");
2041
2042
            /* This may need to be updated for future use. The i2v method for
2043
                keyUsage is not currently set. For now, return the ASN1_STRING
2044
                representation of KeyUsage bit string */
2045
            newString = wolfSSL_ASN1_STRING_new();
2046
            if (newString == NULL) {
2047
                WOLFSSL_MSG("Failed to malloc ASN1_STRING");
2048
                break;
2049
            }
2050
            ret = wolfSSL_ASN1_STRING_set(newString, (byte*)&cert->extKeyUsage,
2051
                                                                sizeof(word16));
2052
            if (ret != WOLFSSL_SUCCESS) {
2053
                WOLFSSL_MSG("ASN1_STRING_set() failed");
2054
                wolfSSL_ASN1_STRING_free(newString);
2055
                break;
2056
            };
2057
            newString->type = asn1String->type;
2058
            data = newString;
2059
            break;
2060
        }
2061
2062
        /* extKeyUsage */
2063
        case WC_NID_ext_key_usage:
2064
            WOLFSSL_MSG("extKeyUsage not supported yet");
2065
            break;
2066
2067
        /* certificatePolicies */
2068
        case WC_NID_certificate_policies:
2069
            WOLFSSL_MSG("certificatePolicies not supported yet");
2070
            break;
2071
2072
        /* cRLDistributionPoints */
2073
        case WC_NID_crl_distribution_points:
2074
            WOLFSSL_MSG("cRLDistributionPoints not supported yet");
2075
            break;
2076
2077
        case WC_NID_subject_alt_name:
2078
            if (ext->ext_sk == NULL) {
2079
                WOLFSSL_MSG("Subject alt name stack NULL");
2080
                break;
2081
            }
2082
            sk = wolfSSL_sk_dup(ext->ext_sk);
2083
            if (sk == NULL) {
2084
                WOLFSSL_MSG("Failed to duplicate subject alt names stack.");
2085
                break;
2086
            }
2087
            data = sk;
2088
            break;
2089
2090
        /* authorityInfoAccess */
2091
        case WC_NID_info_access:
2092
            WOLFSSL_MSG("AuthorityInfoAccess");
2093
            data = wolfssl_x509v3_ext_aia_d2i(ext);
2094
            break;
2095
2096
        default:
2097
            WOLFSSL_MSG("Extension NID not in table, returning NULL");
2098
            break;
2099
    }
2100
2101
out:
2102
2103
    FreeDecodedCert(cert);
2104
    WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_X509_EXT);
2105
2106
    return data;
2107
}
2108
2109
/* Looks for the extension matching the passed in nid
2110
 *
2111
 * x509 : certificate to get parse through for extension.
2112
 * nid : Extension OID to be found.
2113
 * lastPos : Start search from extension after lastPos.
2114
 *           Set to -1 to search from index 0.
2115
 * return >= 0 If successful the extension index is returned.
2116
 * return WOLFSSL_FATAL_ERROR If extension is not found or error is encountered.
2117
 */
2118
int wolfSSL_X509_get_ext_by_NID(const WOLFSSL_X509* x509, int nid, int lastPos)
2119
{
2120
    int extCount = 0, length = 0, outSz = 0, sz = 0, ret = 0;
2121
    int isSet = 0, found = 0, loc;
2122
    const byte* rawCert;
2123
    const byte* input;
2124
    word32 oid, idx = 0, tmpIdx = 0, foundNID;
2125
    WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
2126
2127
    WOLFSSL_ENTER("wolfSSL_X509_get_ext_by_NID");
2128
2129
    if (x509 == NULL) {
2130
        WOLFSSL_MSG("\tNot passed a certificate");
2131
        return WOLFSSL_FATAL_ERROR;
2132
    }
2133
2134
    if (lastPos < -1 || (lastPos > (wolfSSL_X509_get_ext_count(x509) - 1))) {
2135
        WOLFSSL_MSG("\tBad location argument");
2136
        return WOLFSSL_FATAL_ERROR;
2137
    }
2138
2139
    loc = lastPos + 1;
2140
2141
    rawCert = wolfSSL_X509_get_der((WOLFSSL_X509*)x509, &outSz);
2142
    if (rawCert == NULL) {
2143
        WOLFSSL_MSG("\tX509_get_der() failed");
2144
        return WOLFSSL_FATAL_ERROR;
2145
    }
2146
2147
#ifdef WOLFSSL_SMALL_STACK
2148
    cert = (DecodedCert *)XMALLOC(sizeof(*cert), x509->heap,
2149
                                  DYNAMIC_TYPE_DCERT);
2150
    if (cert == NULL) {
2151
        WOLFSSL_MSG("\tout of memory");
2152
        return WOLFSSL_FATAL_ERROR;
2153
    }
2154
#endif
2155
2156
    InitDecodedCert( cert, rawCert, (word32)outSz, 0);
2157
2158
    if (ParseCert(cert,
2159
#ifdef WOLFSSL_CERT_REQ
2160
            x509->isCSR ? CERTREQ_TYPE :
2161
#endif
2162
            CA_TYPE,
2163
            NO_VERIFY, NULL) < 0) {
2164
        WOLFSSL_MSG("\tCertificate parsing failed");
2165
        goto out;
2166
    }
2167
2168
    input = cert->extensions;
2169
    sz = cert->extensionsSz;
2170
2171
    if (input == NULL || sz == 0) {
2172
        WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
2173
        goto out;
2174
    }
2175
2176
#ifdef WOLFSSL_CERT_REQ
2177
    if (!x509->isCSR)
2178
#endif
2179
    {
2180
        if (input[idx++] != ASN_EXTENSIONS) {
2181
            WOLFSSL_MSG("\tfail: should be an EXTENSIONS");
2182
            goto out;
2183
        }
2184
2185
        if (GetLength(input, &idx, &length, (word32)sz) < 0) {
2186
            WOLFSSL_MSG("\tfail: invalid length");
2187
            goto out;
2188
        }
2189
    }
2190
2191
    if (GetSequence(input, &idx, &length, (word32)sz) < 0) {
2192
        WOLFSSL_MSG("\tfail: should be a SEQUENCE (1)");
2193
        goto out;
2194
    }
2195
2196
    while (idx < (word32)sz) {
2197
        oid = 0;
2198
2199
        if (GetSequence(input, &idx, &length, (word32)sz) < 0) {
2200
            WOLFSSL_MSG("\tfail: should be a SEQUENCE");
2201
            goto out;
2202
        }
2203
2204
        tmpIdx = idx;
2205
        ret = GetObjectId(input, &idx, &oid, oidCertExtType, (word32)sz);
2206
        if (ret < 0) {
2207
            WOLFSSL_MSG("\tfail: OBJECT ID");
2208
            goto out;
2209
        }
2210
        idx = tmpIdx;
2211
        foundNID = (word32)oid2nid(oid, oidCertExtType);
2212
2213
        if (extCount >= loc) {
2214
            /* extCount >= loc. Now check if extension has been set */
2215
            isSet = wolfSSL_X509_ext_isSet_by_NID((WOLFSSL_X509*)x509,
2216
                (int)foundNID);
2217
            if (isSet && ((word32)nid == foundNID)) {
2218
                found = 1;
2219
                break;
2220
            }
2221
        }
2222
2223
        idx += length;
2224
        extCount++;
2225
    } /* while(idx < sz) */
2226
2227
out:
2228
2229
    FreeDecodedCert(cert);
2230
    WC_FREE_VAR_EX(cert, x509->heap, DYNAMIC_TYPE_DCERT);
2231
2232
    return found ? extCount : WOLFSSL_FATAL_ERROR;
2233
}
2234
2235
#endif /* OPENSSL_ALL || OPENSSL_EXTRA */
2236
2237
#if defined(OPENSSL_EXTRA) && !defined(IGNORE_NAME_CONSTRAINTS)
2238
/*
2239
 * Convert a Base_entry linked list to a STACK of GENERAL_SUBTREE.
2240
 *
2241
 * Base_entry stores name constraint data from DecodedCert. This function
2242
 * converts it to GENERAL_SUBTREE format.
2243
 *
2244
 * Supported types: ASN_DNS_TYPE, ASN_RFC822_TYPE, ASN_DIR_TYPE, ASN_IP_TYPE,
2245
 *                  ASN_URI_TYPE
2246
 *
2247
 * Returns 0 on success, negative on error.
2248
 */
2249
static int ConvertBaseEntryToSubtreeStack(Base_entry* list, WOLFSSL_STACK* sk,
2250
                                          void* heap)
2251
{
2252
    Base_entry* entry = list;
2253
    WOLFSSL_GENERAL_SUBTREE* subtree = NULL;
2254
    WOLFSSL_GENERAL_NAME* gn = NULL;
2255
    (void)heap;
2256
2257
    while (entry != NULL) {
2258
2259
        if (entry->type != ASN_DNS_TYPE && entry->type != ASN_RFC822_TYPE &&
2260
            entry->type != ASN_DIR_TYPE && entry->type != ASN_IP_TYPE &&
2261
            entry->type != ASN_URI_TYPE) {
2262
            entry = entry->next;
2263
            continue;
2264
        }
2265
2266
        /* Allocate subtree and general name */
2267
        subtree = (WOLFSSL_GENERAL_SUBTREE*)XMALLOC(
2268
            sizeof(WOLFSSL_GENERAL_SUBTREE), heap, DYNAMIC_TYPE_OPENSSL);
2269
        if (subtree == NULL) {
2270
            WOLFSSL_MSG("Failed to allocate GENERAL_SUBTREE");
2271
            return MEMORY_E;
2272
        }
2273
        XMEMSET(subtree, 0, sizeof(WOLFSSL_GENERAL_SUBTREE));
2274
2275
        gn = wolfSSL_GENERAL_NAME_new();
2276
        if (gn == NULL) {
2277
            WOLFSSL_MSG("Failed to allocate GENERAL_NAME");
2278
            XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2279
            return MEMORY_E;
2280
        }
2281
2282
        /* Free default ia5 string allocated by GENERAL_NAME_new */
2283
        wolfSSL_ASN1_STRING_free(gn->d.ia5);
2284
        gn->d.ia5 = NULL;
2285
2286
        switch (entry->type) {
2287
            case ASN_DNS_TYPE:
2288
            case ASN_RFC822_TYPE:
2289
            case ASN_URI_TYPE:
2290
            {
2291
                if (entry->type == ASN_DNS_TYPE) {
2292
                    gn->type = WOLFSSL_GEN_DNS;
2293
                }
2294
                else if (entry->type == ASN_RFC822_TYPE) {
2295
                    gn->type = WOLFSSL_GEN_EMAIL;
2296
                }
2297
                else {
2298
                    gn->type = WOLFSSL_GEN_URI;
2299
                }
2300
                gn->d.ia5 = wolfSSL_ASN1_STRING_new();
2301
                if (gn->d.ia5 == NULL) {
2302
                    WOLFSSL_MSG("Failed to allocate ASN1_STRING");
2303
                    wolfSSL_GENERAL_NAME_free(gn);
2304
                    XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2305
                    return MEMORY_E;
2306
                }
2307
                if (wolfSSL_ASN1_STRING_set(gn->d.ia5, entry->name,
2308
                        entry->nameSz) != WOLFSSL_SUCCESS) {
2309
                    WOLFSSL_MSG("Failed to set ASN1_STRING");
2310
                    wolfSSL_GENERAL_NAME_free(gn);
2311
                    XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2312
                    return MEMORY_E;
2313
                }
2314
                gn->d.ia5->type = WOLFSSL_V_ASN1_IA5STRING;
2315
                break;
2316
            }
2317
2318
            case ASN_DIR_TYPE:
2319
            {
2320
                byte* seqBuf = NULL;
2321
                unsigned char* p = NULL;
2322
                int seqLen = 0;
2323
2324
                /* Wrap in SEQUENCE and parse as X509_NAME */
2325
                gn->type = WOLFSSL_GEN_DIRNAME;
2326
                seqBuf = (byte*)XMALLOC((word32)entry->nameSz + MAX_SEQ_SZ,
2327
                                        heap, DYNAMIC_TYPE_TMP_BUFFER);
2328
                if (seqBuf == NULL) {
2329
                    WOLFSSL_MSG("Failed to allocate sequence buffer");
2330
                    wolfSSL_GENERAL_NAME_free(gn);
2331
                    XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2332
                    return MEMORY_E;
2333
                }
2334
2335
                seqLen = SetSequence(entry->nameSz, seqBuf);
2336
                XMEMCPY(seqBuf + seqLen, entry->name, entry->nameSz);
2337
2338
                p = seqBuf;
2339
                gn->d.directoryName = wolfSSL_d2i_X509_NAME(NULL, &p,
2340
                    (long)entry->nameSz + seqLen);
2341
                XFREE(seqBuf, heap, DYNAMIC_TYPE_TMP_BUFFER);
2342
2343
                if (gn->d.directoryName == NULL) {
2344
                    WOLFSSL_MSG("Failed to parse directoryName");
2345
                    wolfSSL_GENERAL_NAME_free(gn);
2346
                    XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2347
                    return ASN_PARSE_E;
2348
                }
2349
                break;
2350
            }
2351
2352
            case ASN_IP_TYPE:
2353
            {
2354
                /* For IP address, store raw bytes as OCTET_STRING. */
2355
                gn->type = WOLFSSL_GEN_IPADD;
2356
                gn->d.iPAddress = wolfSSL_ASN1_STRING_new();
2357
                if (gn->d.iPAddress == NULL) {
2358
                    WOLFSSL_MSG("Failed to allocate ASN1_STRING for IP");
2359
                    wolfSSL_GENERAL_NAME_free(gn);
2360
                    XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2361
                    return MEMORY_E;
2362
                }
2363
                if (wolfSSL_ASN1_STRING_set(gn->d.iPAddress, entry->name,
2364
                        entry->nameSz) != WOLFSSL_SUCCESS) {
2365
                    WOLFSSL_MSG("Failed to set IP ASN1_STRING");
2366
                    wolfSSL_GENERAL_NAME_free(gn);
2367
                    XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2368
                    return MEMORY_E;
2369
                }
2370
                gn->d.iPAddress->type = WOLFSSL_V_ASN1_OCTET_STRING;
2371
                break;
2372
            }
2373
        }
2374
2375
        subtree->base = gn;
2376
2377
        if (wolfSSL_sk_push(sk, subtree) <= 0) {
2378
            WOLFSSL_MSG("Failed to push subtree onto stack");
2379
            wolfSSL_GENERAL_NAME_free(gn);
2380
            XFREE(subtree, heap, DYNAMIC_TYPE_OPENSSL);
2381
            return MEMORY_E;
2382
        }
2383
        entry = entry->next;
2384
    }
2385
2386
    return 0;
2387
}
2388
#endif /* OPENSSL_EXTRA && !IGNORE_NAME_CONSTRAINTS */
2389
2390
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
2391
/* Looks for the extension matching the passed in nid
2392
 *
2393
 * c   : if not null then is set to status value -2 if multiple occurrences
2394
 *       of the extension are found, -1 if not found, 0 if found and not
2395
 *       critical, and 1 if found and critical.
2396
 * nid : Extension OID to be found.
2397
 * idx : if NULL return first extension found match, otherwise start search at
2398
 *       idx location and set idx to the location of extension returned.
2399
 * returns NULL or a pointer to an WOLFSSL_ASN1_BIT_STRING (for KEY_USAGE_OID)
2400
 * or WOLFSSL_STACK (for other)
2401
 * holding extension structure
2402
 *
2403
 * NOTE code for decoding extensions is in asn.c DecodeCertExtensions --
2404
 * use already decoded extension in this function to avoid decoding twice.
2405
 * Currently we do not make use of idx since getting pre decoded extensions.
2406
 */
2407
void* wolfSSL_X509_get_ext_d2i(const WOLFSSL_X509* x509, int nid, int* c,
2408
    int* idx)
2409
{
2410
    void* ret = NULL;
2411
    WOLFSSL_STACK* sk = NULL;
2412
    WOLFSSL_ASN1_OBJECT* obj = NULL;
2413
    WOLFSSL_GENERAL_NAME* gn = NULL;
2414
#ifdef OPENSSL_EXTRA
2415
    WOLFSSL_DIST_POINT* dp = NULL;
2416
#endif
2417
    WOLFSSL_BASIC_CONSTRAINTS* bc = NULL;
2418
2419
    WOLFSSL_ENTER("wolfSSL_X509_get_ext_d2i");
2420
2421
    if (x509 == NULL) {
2422
        return NULL;
2423
    }
2424
2425
    if (c != NULL) {
2426
        *c = -1; /* default to not found */
2427
    }
2428
2429
    switch (nid) {
2430
        case BASIC_CA_OID:
2431
            if (x509->basicConstSet) {
2432
                WOLFSSL_ASN1_INTEGER* a;
2433
2434
                bc = wolfSSL_BASIC_CONSTRAINTS_new();
2435
                if (!bc) {
2436
                    WOLFSSL_MSG("wolfSSL_BASIC_CONSTRAINTS_new error");
2437
                    return NULL;
2438
                }
2439
2440
                a = wolfSSL_ASN1_INTEGER_new();
2441
                if (!a) {
2442
                    WOLFSSL_MSG("wolfSSL_ASN1_INTEGER_new error");
2443
                    wolfSSL_BASIC_CONSTRAINTS_free(bc);
2444
                    return NULL;
2445
                }
2446
                a->length = (int)x509->pathLength;
2447
2448
#if defined(OPENSSL_ALL) || defined(WOLFSSL_QT) || \
2449
        defined(WOLFSSL_APACHE_HTTPD)
2450
                bc->ca = x509->isCa;
2451
#endif
2452
                bc->pathlen = a;
2453
                if (c != NULL) {
2454
                    *c = x509->basicConstCrit;
2455
                }
2456
            }
2457
            else {
2458
                WOLFSSL_MSG("No Basic Constraint set");
2459
            }
2460
            return bc;
2461
2462
        case ALT_NAMES_OID:
2463
        {
2464
            DNS_entry* dns = NULL;
2465
2466
            if (x509->subjAltNameSet && x509->altNames != NULL) {
2467
                /* Malloc GENERAL_NAME stack */
2468
                sk = wolfSSL_sk_new_null();
2469
                if (sk == NULL)
2470
                    return NULL;
2471
                sk->type = STACK_TYPE_GEN_NAME;
2472
2473
                /* alt names are DNS_entry structs */
2474
                if (c != NULL) {
2475
                    if (x509->altNames->next != NULL) {
2476
                        *c = -2; /* more then one found */
2477
                    }
2478
                    else {
2479
                        *c = x509->subjAltNameCrit;
2480
                    }
2481
                }
2482
2483
                dns = x509->altNames;
2484
                /* Currently only support GEN_DNS type */
2485
                while (dns != NULL) {
2486
                    gn = wolfSSL_GENERAL_NAME_new();
2487
                    if (gn == NULL) {
2488
                        WOLFSSL_MSG("Error creating GENERAL_NAME");
2489
                        goto err;
2490
                    }
2491
2492
                    switch (dns->type) {
2493
                        case ASN_DIR_TYPE:
2494
                            gn->type = dns->type;
2495
                            {
2496
                                int localIdx = 0;
2497
                                unsigned char* n = (unsigned char*)XMALLOC(
2498
                                        dns->len + MAX_SEQ_SZ, x509->heap,
2499
                                        DYNAMIC_TYPE_TMP_BUFFER);
2500
                                if (n == NULL) {
2501
                                    goto err;
2502
                                }
2503
2504
                                localIdx += SetSequence(dns->len, n);
2505
                                XMEMCPY(n + localIdx, dns->name, dns->len);
2506
                                gn->d.dirn =  wolfSSL_d2i_X509_NAME(NULL, &n,
2507
                                        dns->len + localIdx);
2508
                                XFREE(n, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
2509
                                if (gn->d.dirn == NULL) {
2510
                                    WOLFSSL_MSG("Convert altDirName to X509 "
2511
                                            "NAME failed");
2512
                                    goto err;
2513
                                }
2514
                            }
2515
                            break;
2516
2517
                        case ASN_OTHER_TYPE:
2518
                            /* gn->type set internally */
2519
                            if (!wolfssl_dns_entry_othername_to_gn(dns, gn)) {
2520
                                goto err;
2521
                            }
2522
                            break;
2523
2524
                        case ASN_IP_TYPE:
2525
                            gn->type = dns->type;
2526
                            if (wolfSSL_ASN1_STRING_set(gn->d.iPAddress,
2527
                                    dns->name, dns->len) != WOLFSSL_SUCCESS) {
2528
                                WOLFSSL_MSG("ASN1_STRING_set failed");
2529
                                goto err;
2530
                            }
2531
                            gn->d.iPAddress->type = WOLFSSL_V_ASN1_OCTET_STRING;
2532
                            break;
2533
2534
                    #ifdef WOLFSSL_RID_ALT_NAME
2535
                        case ASN_RID_TYPE:
2536
                            gn->type = dns->type;
2537
                            /* Free ia5 before using union for registeredID */
2538
                            wolfSSL_ASN1_STRING_free(gn->d.ia5);
2539
                            gn->d.ia5 = NULL;
2540
2541
                            gn->d.registeredID = wolfSSL_ASN1_OBJECT_new();
2542
                            if (gn->d.registeredID == NULL) {
2543
                                goto err;
2544
                            }
2545
                            {
2546
                                /* Store DER-encoded OID (tag+length+content) */
2547
                                word32 derSz = 1 + SetLength(dns->len, NULL)
2548
                                               + dns->len;
2549
                                byte* der = (byte*)XMALLOC(derSz,
2550
                                    gn->d.registeredID->heap,
2551
                                    DYNAMIC_TYPE_ASN1);
2552
                                if (der == NULL) {
2553
                                    goto err;
2554
                                }
2555
                                {
2556
                                    word32 derIdx = 0;
2557
                                    der[derIdx++] = ASN_OBJECT_ID;
2558
                                    derIdx += SetLength(dns->len, der + derIdx);
2559
                                    XMEMCPY(der + derIdx, dns->name, dns->len);
2560
                                }
2561
                                gn->d.registeredID->obj = der;
2562
                                gn->d.registeredID->objSz = derSz;
2563
                            }
2564
                            gn->d.registeredID->dynamic |=
2565
                                WOLFSSL_ASN1_DYNAMIC_DATA;
2566
                            gn->d.registeredID->grp = oidCertExtType;
2567
                            break;
2568
                    #endif /* WOLFSSL_RID_ALT_NAME */
2569
2570
                        default:
2571
                            gn->type = dns->type;
2572
                            if (wolfSSL_ASN1_STRING_set(gn->d.dNSName,
2573
                                    dns->name, dns->len) != WOLFSSL_SUCCESS) {
2574
                                WOLFSSL_MSG("ASN1_STRING_set failed");
2575
                                goto err;
2576
                            }
2577
                            gn->d.dNSName->type = WOLFSSL_V_ASN1_IA5STRING;
2578
                    }
2579
2580
                    dns = dns->next;
2581
                    /* Using wolfSSL_sk_insert to maintain backwards
2582
                     * compatibility with earlier versions of _push API that
2583
                     * pushed items to the start of the list instead of the
2584
                     * end. */
2585
                    if (wolfSSL_sk_insert(sk, gn, 0) <= 0) {
2586
                        WOLFSSL_MSG("Error pushing ASN1 object onto stack");
2587
                        goto err;
2588
                    }
2589
                    /* null so that it doesn't get pushed again after switch */
2590
                    gn = NULL;
2591
                }
2592
            }
2593
            else {
2594
                WOLFSSL_MSG("No Alt Names set");
2595
            }
2596
2597
            break;
2598
        }
2599
2600
        case CRL_DIST_OID:
2601
    #if defined(OPENSSL_EXTRA)
2602
            if (x509->CRLdistSet && x509->CRLInfo != NULL) {
2603
                if (c != NULL) {
2604
                    *c = x509->CRLdistCrit;
2605
                }
2606
2607
                sk = wolfSSL_sk_new_null();
2608
                if (sk == NULL) {
2609
                    return NULL;
2610
                }
2611
                sk->type = STACK_TYPE_DIST_POINT;
2612
2613
                gn = wolfSSL_GENERAL_NAME_new();
2614
                if (gn == NULL) {
2615
                    WOLFSSL_MSG("Error creating GENERAL_NAME");
2616
                    goto err;
2617
                }
2618
2619
                if (wolfSSL_GENERAL_NAME_set_type(gn, WOLFSSL_GEN_URI) !=
2620
                        WOLFSSL_SUCCESS) {
2621
                    WOLFSSL_MSG("Error setting GENERAL_NAME type");
2622
                    goto err;
2623
                }
2624
2625
                if (wolfSSL_ASN1_STRING_set(gn->d.uniformResourceIdentifier,
2626
                        x509->CRLInfo, x509->CRLInfoSz) != WOLFSSL_SUCCESS) {
2627
                    WOLFSSL_MSG("ASN1_STRING_set failed");
2628
                    goto err;
2629
                }
2630
2631
                /* wolfSSL only decodes one dist point */
2632
                dp = wolfSSL_DIST_POINT_new();
2633
                if (dp == NULL) {
2634
                    WOLFSSL_MSG("Error creating DIST_POINT");
2635
                    goto err;
2636
                }
2637
2638
                /* push GENERAL_NAME onto fullname stack */
2639
                if (wolfSSL_sk_GENERAL_NAME_push(dp->distpoint->name.fullname,
2640
                                                 gn) <= 0) {
2641
                    WOLFSSL_MSG("wolfSSL_sk_GENERAL_NAME_push error");
2642
                    goto err;
2643
                }
2644
2645
                /* push DIST_POINT onto stack */
2646
                if (wolfSSL_sk_DIST_POINT_push(sk, dp) <= 0) {
2647
                    WOLFSSL_MSG("Error pushing DIST_POINT onto stack");
2648
                    goto err;
2649
                }
2650
2651
                gn = NULL;
2652
                dp = NULL;
2653
2654
            }
2655
            else {
2656
                WOLFSSL_MSG("No CRL dist set");
2657
            }
2658
    #endif /* OPENSSL_EXTRA */
2659
            break;
2660
2661
        case AUTH_INFO_OID:
2662
            if (x509->authInfoSet && x509->authInfo != NULL) {
2663
                if (c != NULL) {
2664
                    *c = x509->authInfoCrit;
2665
                }
2666
                obj = wolfSSL_ASN1_OBJECT_new();
2667
                if (obj == NULL) {
2668
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2669
                    return NULL;
2670
                }
2671
                obj->type  = AUTH_INFO_OID;
2672
                obj->grp   = oidCertExtType;
2673
                obj->obj   = x509->authInfo;
2674
                obj->objSz = (unsigned int)x509->authInfoSz;
2675
            }
2676
            else {
2677
                WOLFSSL_MSG("No Auth Info set");
2678
            }
2679
            break;
2680
2681
        case AUTH_KEY_OID:
2682
            if (x509->authKeyIdSet) {
2683
                WOLFSSL_AUTHORITY_KEYID* akey = wolfSSL_AUTHORITY_KEYID_new();
2684
                if (!akey) {
2685
                    WOLFSSL_MSG(
2686
                        "Issue creating WOLFSSL_AUTHORITY_KEYID struct");
2687
                    return NULL;
2688
                }
2689
2690
                if (c != NULL) {
2691
                    *c = x509->authKeyIdCrit;
2692
                }
2693
                obj = wolfSSL_ASN1_OBJECT_new();
2694
                if (obj == NULL) {
2695
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2696
                    wolfSSL_AUTHORITY_KEYID_free(akey);
2697
                    return NULL;
2698
                }
2699
                obj->type  = AUTH_KEY_OID;
2700
                obj->grp   = oidCertExtType;
2701
                obj->obj   = x509->authKeyId;
2702
                obj->objSz = x509->authKeyIdSz;
2703
                akey->issuer = obj;
2704
                return akey;
2705
            }
2706
            else {
2707
                WOLFSSL_MSG("No Auth Key set");
2708
            }
2709
            break;
2710
2711
        case SUBJ_KEY_OID:
2712
            if (x509->subjKeyIdSet) {
2713
                if (c != NULL) {
2714
                    *c = x509->subjKeyIdCrit;
2715
                }
2716
                obj = wolfSSL_ASN1_OBJECT_new();
2717
                if (obj == NULL) {
2718
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2719
                    return NULL;
2720
                }
2721
                obj->type  = SUBJ_KEY_OID;
2722
                obj->grp   = oidCertExtType;
2723
                obj->obj   = x509->subjKeyId;
2724
                obj->objSz = x509->subjKeyIdSz;
2725
            }
2726
            else {
2727
                WOLFSSL_MSG("No Subject Key set");
2728
            }
2729
            break;
2730
2731
        case CERT_POLICY_OID:
2732
        {
2733
        #ifdef WOLFSSL_CERT_EXT
2734
            int i;
2735
2736
            if (x509->certPoliciesNb > 0) {
2737
                if (c != NULL) {
2738
                    if (x509->certPoliciesNb > 1) {
2739
                        *c = -2;
2740
                    }
2741
                    else {
2742
                        *c = 0;
2743
                    }
2744
                }
2745
2746
                sk = wolfSSL_sk_new_asn1_obj();
2747
                if (sk == NULL) {
2748
                    return NULL;
2749
                }
2750
2751
                for (i = 0; i < x509->certPoliciesNb - 1; i++) {
2752
                    obj = wolfSSL_ASN1_OBJECT_new();
2753
                    if (obj == NULL) {
2754
                        WOLFSSL_MSG(
2755
                            "Issue creating WOLFSSL_ASN1_OBJECT struct");
2756
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2757
                        return NULL;
2758
                    }
2759
                    obj->type  = CERT_POLICY_OID;
2760
                    obj->grp   = oidCertExtType;
2761
                    obj->obj   = (byte*)(x509->certPolicies[i]);
2762
                    obj->objSz = MAX_CERTPOL_SZ;
2763
                    if (wolfSSL_sk_ASN1_OBJECT_push(sk, obj) <= 0) {
2764
                        WOLFSSL_MSG("Error pushing ASN1 object onto stack");
2765
                        wolfSSL_ASN1_OBJECT_free(obj);
2766
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2767
                        sk = NULL;
2768
                    }
2769
                }
2770
2771
                obj = wolfSSL_ASN1_OBJECT_new();
2772
                if (obj == NULL) {
2773
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2774
                    wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2775
                    return NULL;
2776
                }
2777
                obj->type  = CERT_POLICY_OID;
2778
                obj->grp   = oidCertExtType;
2779
                obj->obj   = (byte*)(x509->certPolicies[i]);
2780
                obj->objSz = MAX_CERTPOL_SZ;
2781
2782
                if (wolfSSL_sk_ASN1_OBJECT_push(sk, obj) <= 0) {
2783
                    WOLFSSL_MSG("Error pushing ASN1 object onto stack");
2784
                    wolfSSL_ASN1_OBJECT_free(obj);
2785
                    wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2786
                    sk = NULL;
2787
                }
2788
2789
                obj = NULL;
2790
            }
2791
            else {
2792
                WOLFSSL_MSG("No Cert Policy set");
2793
            }
2794
        #endif /* WOLFSSL_CERT_EXT */
2795
        #ifdef WOLFSSL_SEP
2796
            if (x509->certPolicySet) {
2797
                if (c != NULL) {
2798
                    *c = x509->certPolicyCrit;
2799
                }
2800
                obj = wolfSSL_ASN1_OBJECT_new();
2801
                if (obj == NULL) {
2802
                    WOLFSSL_MSG("Issue creating WOLFSSL_ASN1_OBJECT struct");
2803
                    return NULL;
2804
                }
2805
                obj->type  = CERT_POLICY_OID;
2806
                obj->grp   = oidCertExtType;
2807
            }
2808
            else {
2809
                WOLFSSL_MSG("No Cert Policy set");
2810
            }
2811
        #endif
2812
            break;
2813
        }
2814
        case KEY_USAGE_OID:
2815
        {
2816
            WOLFSSL_ASN1_STRING* asn1str = NULL;
2817
            if (x509->keyUsageSet) {
2818
                if (c != NULL) {
2819
                    *c = x509->keyUsageCrit;
2820
                }
2821
2822
                asn1str = wolfSSL_ASN1_STRING_new();
2823
                if (asn1str == NULL) {
2824
                    WOLFSSL_MSG("Failed to malloc ASN1_STRING");
2825
                    return NULL;
2826
                }
2827
2828
                if (wolfSSL_ASN1_STRING_set(asn1str, &x509->keyUsage,
2829
                        sizeof(word16)) != WOLFSSL_SUCCESS) {
2830
                    WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
2831
                    wolfSSL_ASN1_STRING_free(asn1str);
2832
                    return NULL;
2833
                }
2834
2835
                asn1str->type = KEY_USAGE_OID;
2836
            }
2837
            else {
2838
                WOLFSSL_MSG("No Key Usage set");
2839
            }
2840
            /* don't add stack of and return bit string directly */
2841
            return asn1str;
2842
        }
2843
        case INHIBIT_ANY_OID:
2844
            WOLFSSL_MSG("INHIBIT ANY extension not supported");
2845
            break;
2846
2847
        case EXT_KEY_USAGE_OID:
2848
            if (x509->extKeyUsageSrc != NULL) {
2849
                const byte* ekuSrc = x509->extKeyUsageSrc;
2850
                word32 i;
2851
2852
                sk = wolfSSL_sk_new_asn1_obj();
2853
                if (sk == NULL) {
2854
                    WOLFSSL_MSG("Issue creating stack");
2855
                    return NULL;
2856
                }
2857
2858
                for (i = 0; i < x509->extKeyUsageCount; i++) {
2859
                    long ekuSrcLen = (long)(x509->extKeyUsageSz -
2860
                            (word32)(ekuSrc - x509->extKeyUsageSrc));
2861
                    WOLFSSL_ASN1_OBJECT* ekuObj = wolfSSL_d2i_ASN1_OBJECT(NULL,
2862
                            &ekuSrc, ekuSrcLen);
2863
                    if (ekuObj == NULL) {
2864
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2865
                        WOLFSSL_MSG("d2i obj error");
2866
                        return NULL;
2867
                    }
2868
                    ekuObj->type  = EXT_KEY_USAGE_OID;
2869
                    ekuObj->grp   = oidCertExtType;
2870
                    /* Push to end to maintain order */
2871
                    if (wolfSSL_sk_insert(sk, ekuObj, -1) <= 0) {
2872
                        wolfSSL_ASN1_OBJECT_free(ekuObj);
2873
                        wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2874
                        WOLFSSL_MSG("d2i obj error");
2875
                        return NULL;
2876
                    }
2877
                }
2878
2879
                if ((word32)(ekuSrc - x509->extKeyUsageSrc)
2880
                        != x509->extKeyUsageSz ||
2881
                        i != x509->extKeyUsageCount) {
2882
                    wolfSSL_sk_ASN1_OBJECT_pop_free(sk, NULL);
2883
                    WOLFSSL_MSG("incorrect eku count or buffer not exhausted");
2884
                    return NULL;
2885
                }
2886
2887
                if (c != NULL) {
2888
                    if (x509->extKeyUsageCount > 1) {
2889
                        *c = -2;
2890
                    }
2891
                    else {
2892
                        *c = x509->extKeyUsageCrit;
2893
                    }
2894
                }
2895
            }
2896
            else {
2897
                WOLFSSL_MSG("No Extended Key Usage set");
2898
            }
2899
            break;
2900
2901
    #if defined(OPENSSL_EXTRA) && !defined(IGNORE_NAME_CONSTRAINTS)
2902
        case NAME_CONS_OID:
2903
        {
2904
            WOLFSSL_NAME_CONSTRAINTS* nc = NULL;
2905
2906
            /* Check if name constraints exist in stored X509 */
2907
            if (x509->permittedNames == NULL && x509->excludedNames == NULL) {
2908
                WOLFSSL_MSG("No Name Constraints set");
2909
                break;
2910
            }
2911
2912
            if (c != NULL) {
2913
                *c = x509->nameConstraintCrit;
2914
            }
2915
2916
            nc = (WOLFSSL_NAME_CONSTRAINTS*)XMALLOC(
2917
                sizeof(WOLFSSL_NAME_CONSTRAINTS), x509->heap,
2918
                DYNAMIC_TYPE_OPENSSL);
2919
            if (nc == NULL) {
2920
                WOLFSSL_MSG("Failed to allocate NAME_CONSTRAINTS");
2921
                break;
2922
            }
2923
            XMEMSET(nc, 0, sizeof(WOLFSSL_NAME_CONSTRAINTS));
2924
2925
            /* Convert permitted names */
2926
            if (x509->permittedNames != NULL) {
2927
                nc->permittedSubtrees = wolfSSL_sk_new_null();
2928
                if (nc->permittedSubtrees == NULL) {
2929
                    WOLFSSL_MSG("Failed to allocate permitted stack");
2930
                    wolfSSL_NAME_CONSTRAINTS_free(nc);
2931
                    break;
2932
                }
2933
                nc->permittedSubtrees->type = STACK_TYPE_GENERAL_SUBTREE;
2934
2935
                if (ConvertBaseEntryToSubtreeStack(x509->permittedNames,
2936
                        nc->permittedSubtrees, x509->heap) != 0) {
2937
                    WOLFSSL_MSG("Failed to convert permitted names");
2938
                    wolfSSL_NAME_CONSTRAINTS_free(nc);
2939
                    break;
2940
                }
2941
            }
2942
2943
            /* Convert excluded names */
2944
            if (x509->excludedNames != NULL) {
2945
                nc->excludedSubtrees = wolfSSL_sk_new_null();
2946
                if (nc->excludedSubtrees == NULL) {
2947
                    WOLFSSL_MSG("Failed to allocate excluded stack");
2948
                    wolfSSL_NAME_CONSTRAINTS_free(nc);
2949
                    break;
2950
                }
2951
                nc->excludedSubtrees->type = STACK_TYPE_GENERAL_SUBTREE;
2952
2953
                if (ConvertBaseEntryToSubtreeStack(x509->excludedNames,
2954
                        nc->excludedSubtrees, x509->heap) != 0) {
2955
                    WOLFSSL_MSG("Failed to convert excluded names");
2956
                    wolfSSL_NAME_CONSTRAINTS_free(nc);
2957
                    break;
2958
                }
2959
            }
2960
2961
            return nc;
2962
        }
2963
    #endif /* OPENSSL_EXTRA && !IGNORE_NAME_CONSTRAINTS */
2964
2965
        case PRIV_KEY_USAGE_PERIOD_OID:
2966
            WOLFSSL_MSG("Private Key Usage Period extension not supported");
2967
            break;
2968
2969
        case SUBJ_INFO_ACC_OID:
2970
            WOLFSSL_MSG("Subject Info Access extension not supported");
2971
            break;
2972
2973
        case POLICY_MAP_OID:
2974
            WOLFSSL_MSG("Policy Map extension not supported");
2975
            break;
2976
2977
        case POLICY_CONST_OID:
2978
            WOLFSSL_MSG("Policy Constraint extension not supported");
2979
            break;
2980
2981
        case ISSUE_ALT_NAMES_OID:
2982
            WOLFSSL_MSG("Issue Alt Names extension not supported");
2983
            break;
2984
2985
        case TLS_FEATURE_OID:
2986
            WOLFSSL_MSG("TLS Feature extension not supported");
2987
            break;
2988
2989
        default:
2990
            WOLFSSL_MSG("Unsupported/Unknown extension OID");
2991
    }
2992
2993
    /* make sure stack of is allocated */
2994
    if ((obj || gn) && sk == NULL) {
2995
        sk = wolfSSL_sk_new_asn1_obj();
2996
        if (sk == NULL) {
2997
            goto err;
2998
        }
2999
    }
3000
    if (obj) {
3001
        if (wolfSSL_sk_ASN1_OBJECT_push(sk, obj) <= 0) {
3002
            WOLFSSL_MSG("Error pushing ASN1_OBJECT object onto "
3003
                        "stack.");
3004
            goto err;
3005
        }
3006
    }
3007
3008
    ret = sk;
3009
3010
    (void)idx;
3011
3012
    return ret;
3013
3014
err:
3015
    if (obj) {
3016
        wolfSSL_ASN1_OBJECT_free(obj);
3017
    }
3018
    if (gn) {
3019
        wolfSSL_GENERAL_NAME_free(gn);
3020
    }
3021
    #ifdef OPENSSL_EXTRA
3022
    if (dp) {
3023
        wolfSSL_DIST_POINT_free(dp);
3024
    }
3025
    #endif
3026
    if (sk) {
3027
        wolfSSL_sk_pop_free(sk, NULL);
3028
    }
3029
    return NULL;
3030
}
3031
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
3032
3033
#ifdef OPENSSL_EXTRA
3034
int wolfSSL_X509_add_altname_ex(WOLFSSL_X509* x509, const char* name,
3035
        word32 nameSz, int type)
3036
{
3037
    DNS_entry* newAltName = NULL;
3038
    char* nameCopy = NULL;
3039
3040
    if (x509 == NULL)
3041
        return WOLFSSL_FAILURE;
3042
3043
    if ((name == NULL) || (nameSz == 0))
3044
        return WOLFSSL_SUCCESS;
3045
3046
    newAltName = AltNameNew(x509->heap);
3047
    if (newAltName == NULL)
3048
        return WOLFSSL_FAILURE;
3049
3050
    nameCopy = (char*)XMALLOC(nameSz + 1, x509->heap, DYNAMIC_TYPE_ALTNAME);
3051
    if (nameCopy == NULL) {
3052
        XFREE(newAltName, x509->heap, DYNAMIC_TYPE_ALTNAME);
3053
        return WOLFSSL_FAILURE;
3054
    }
3055
3056
    XMEMCPY(nameCopy, name, nameSz);
3057
3058
    nameCopy[nameSz] = '\0';
3059
3060
    newAltName->next = x509->altNames;
3061
    newAltName->type = type;
3062
    newAltName->len = (int)nameSz;
3063
    newAltName->name = nameCopy;
3064
    newAltName->nameStored = 1;
3065
    x509->altNames = newAltName;
3066
3067
    return WOLFSSL_SUCCESS;
3068
}
3069
3070
int wolfSSL_X509_add_altname(WOLFSSL_X509* x509, const char* name, int type)
3071
{
3072
    word32 nameSz;
3073
3074
    if (name == NULL)
3075
        return WOLFSSL_SUCCESS;
3076
3077
    nameSz = (word32)XSTRLEN(name);
3078
    if (nameSz == 0)
3079
        return WOLFSSL_SUCCESS;
3080
3081
    if (type == ASN_IP_TYPE) {
3082
#ifdef WOLFSSL_IP_ALT_NAME
3083
        byte ip4[4];
3084
        byte ip6[16];
3085
        int ptonRet;
3086
3087
        /* Check if this is an ip4 address */
3088
        ptonRet = XINET_PTON(WOLFSSL_IP4, name, ip4);
3089
        if (ptonRet == 1) {
3090
            return wolfSSL_X509_add_altname_ex(x509, (const char*)ip4, 4,
3091
                type);
3092
        }
3093
3094
        /* Check for ip6 */
3095
        ptonRet = XINET_PTON(WOLFSSL_IP6, name, ip6);
3096
        if (ptonRet == 1) {
3097
            return wolfSSL_X509_add_altname_ex(x509, (const char*)ip6, 16,
3098
                type);
3099
        }
3100
3101
        WOLFSSL_MSG("IP address parse failed");
3102
        return WOLFSSL_FAILURE;
3103
#else
3104
        WOLFSSL_MSG("WOLFSSL_IP_ALT_NAME not enabled");
3105
        return WOLFSSL_FAILURE;
3106
#endif
3107
    }
3108
3109
    return wolfSSL_X509_add_altname_ex(x509, name, nameSz, type);
3110
}
3111
3112
#ifndef NO_WOLFSSL_STUB
3113
WOLFSSL_X509_EXTENSION *wolfSSL_X509_delete_ext(WOLFSSL_X509 *x509, int loc)
3114
{
3115
    WOLFSSL_STUB("wolfSSL_X509_delete_ext");
3116
    (void)x509;
3117
    (void)loc;
3118
    return NULL;
3119
}
3120
3121
/* currently LHASH is not implemented (and not needed for Apache port) */
3122
WOLFSSL_X509_EXTENSION* wolfSSL_X509V3_EXT_conf_nid(
3123
        WOLF_LHASH_OF(CONF_VALUE)* conf, WOLFSSL_X509V3_CTX* ctx, int nid,
3124
        char* value)
3125
{
3126
    WOLFSSL_STUB("wolfSSL_X509V3_EXT_conf_nid");
3127
3128
    if (conf != NULL) {
3129
        WOLFSSL_MSG("Handling LHASH not implemented yet");
3130
        return NULL;
3131
    }
3132
3133
    (void)conf;
3134
    (void)ctx;
3135
    (void)nid;
3136
    (void)value;
3137
    return NULL;
3138
}
3139
3140
void wolfSSL_X509V3_set_ctx_nodb(WOLFSSL_X509V3_CTX* ctx)
3141
{
3142
    WOLFSSL_STUB("wolfSSL_X509V3_set_ctx_nodb");
3143
    (void)ctx;
3144
}
3145
#endif /* !NO_WOLFSSL_STUB */
3146
3147
#ifdef OPENSSL_EXTRA
3148
static WOLFSSL_X509_EXTENSION* createExtFromStr(int nid, const char *value)
3149
{
3150
    WOLFSSL_X509_EXTENSION* ext;
3151
3152
    ext = wolfSSL_X509_EXTENSION_new();
3153
    if (ext == NULL) {
3154
        WOLFSSL_MSG("memory error");
3155
        return NULL;
3156
    }
3157
    ext->value.nid = nid;
3158
3159
    switch (nid) {
3160
        case WC_NID_subject_key_identifier:
3161
        case WC_NID_authority_key_identifier:
3162
            if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
3163
                    != WOLFSSL_SUCCESS) {
3164
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
3165
                goto err_cleanup;
3166
            }
3167
            ext->value.type = CTC_UTF8;
3168
            break;
3169
        case WC_NID_subject_alt_name:
3170
        {
3171
            WOLFSSL_GENERAL_NAMES* gns;
3172
            WOLFSSL_GENERAL_NAME* gn;
3173
3174
            if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
3175
                    != WOLFSSL_SUCCESS) {
3176
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
3177
                goto err_cleanup;
3178
            }
3179
            ext->value.type = ASN_DNS_TYPE;
3180
3181
            /* add stack of general names */
3182
            gns = wolfSSL_sk_new_null();
3183
            if (gns == NULL) {
3184
                WOLFSSL_MSG("wolfSSL_sk_new_null error");
3185
                goto err_cleanup;
3186
            }
3187
            ext->ext_sk = gns; /* wolfSSL_X509_EXTENSION_free will handle
3188
                                * free'ing gns */
3189
            gns->type = STACK_TYPE_GEN_NAME;
3190
            gn = wolfSSL_GENERAL_NAME_new();
3191
            if (gn == NULL) {
3192
                WOLFSSL_MSG("wolfSSL_GENERAL_NAME_new error");
3193
                goto err_cleanup;
3194
            }
3195
            if (wolfSSL_sk_GENERAL_NAME_push(gns, gn) <= 0) {
3196
                WOLFSSL_MSG("wolfSSL_sk_GENERAL_NAME_push error");
3197
                wolfSSL_GENERAL_NAME_free(gn);
3198
                goto err_cleanup;
3199
            }
3200
            if (wolfSSL_ASN1_STRING_set(gn->d.ia5, value, -1)
3201
                    != WOLFSSL_SUCCESS) {
3202
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set failed");
3203
                goto err_cleanup;
3204
            }
3205
            gn->type = ASN_DNS_TYPE;
3206
            break;
3207
        }
3208
        case WC_NID_key_usage:
3209
            if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
3210
                    != WOLFSSL_SUCCESS) {
3211
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
3212
                goto err_cleanup;
3213
            }
3214
            ext->value.type = KEY_USAGE_OID;
3215
            break;
3216
        case WC_NID_ext_key_usage:
3217
            if (wolfSSL_ASN1_STRING_set(&ext->value, value, -1)
3218
                    != WOLFSSL_SUCCESS) {
3219
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
3220
                goto err_cleanup;
3221
            }
3222
            ext->value.type = EXT_KEY_USAGE_OID;
3223
            break;
3224
        default:
3225
            WOLFSSL_MSG("invalid or unsupported NID");
3226
            goto err_cleanup;
3227
    }
3228
    return ext;
3229
err_cleanup:
3230
    wolfSSL_X509_EXTENSION_free(ext);
3231
    return NULL;
3232
}
3233
3234
/**
3235
 * Create a WOLFSSL_X509_EXTENSION from the input arguments.
3236
 * @param conf  Not used
3237
 * @param ctx   Not used
3238
 * @param nid   Interprets the value parameter as the x509 extension that
3239
 *              corresponds to this NID.
3240
 * @param value A NULL terminated string that is taken as the value of the
3241
 *              newly created extension object.
3242
 * @return WOLFSSL_X509_EXTENSION* on success or NULL on failure.
3243
 */
3244
WOLFSSL_X509_EXTENSION* wolfSSL_X509V3_EXT_nconf_nid(WOLFSSL_CONF* conf,
3245
        WOLFSSL_X509V3_CTX *ctx, int nid, const char *value)
3246
{
3247
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_nconf_nid");
3248
3249
    if (value == NULL) {
3250
        WOLFSSL_MSG("value NULL parameter");
3251
        return NULL;
3252
    }
3253
3254
    if (conf != NULL || ctx != NULL) {
3255
        WOLFSSL_MSG("wolfSSL_X509V3_EXT_nconf_nid does not handle either "
3256
                    "conf or ctx parameters");
3257
    }
3258
3259
    return createExtFromStr(nid, value);
3260
}
3261
3262
/**
3263
 * Create a WOLFSSL_X509_EXTENSION from the input arguments.
3264
 * @param conf  Not used
3265
 * @param ctx   Not used
3266
 * @param sName The textual representation of the NID that the value parameter
3267
 *              should be interpreted as.
3268
 * @param value A NULL terminated string that is taken as the value of the
3269
 *              newly created extension object.
3270
 * @return WOLFSSL_X509_EXTENSION* on success or NULL on failure.
3271
 */
3272
WOLFSSL_X509_EXTENSION* wolfSSL_X509V3_EXT_nconf(WOLFSSL_CONF *conf,
3273
        WOLFSSL_X509V3_CTX *ctx, const char *sName, const char *value)
3274
{
3275
    const WOLFSSL_ObjectInfo* info = wolfssl_object_info;
3276
    size_t i;
3277
3278
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_nconf");
3279
3280
    if (value == NULL) {
3281
        WOLFSSL_MSG("value NULL parameter");
3282
        return NULL;
3283
    }
3284
3285
    if (conf != NULL || ctx != NULL) {
3286
        WOLFSSL_MSG("wolfSSL_X509V3_EXT_nconf does not handle either "
3287
                    "conf or ctx parameters");
3288
    }
3289
3290
    for (i = 0; i < wolfssl_object_info_sz; i++, info++) {
3291
        if (XSTRCMP(info->sName, sName) == 0)
3292
            return createExtFromStr(info->nid, value);
3293
    }
3294
3295
    WOLFSSL_MSG("value didn't match any known NID");
3296
    return NULL;
3297
}
3298
3299
static void wolfSSL_X509V3_EXT_METHOD_populate(WOLFSSL_v3_ext_method *method,
3300
                                               int nid)
3301
{
3302
    if (!method)
3303
        return;
3304
3305
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_METHOD_populate");
3306
    switch (nid) {
3307
    case WC_NID_subject_key_identifier:
3308
        method->i2s = (WOLFSSL_X509V3_EXT_I2S)wolfSSL_i2s_ASN1_STRING;
3309
        FALL_THROUGH;
3310
    case WC_NID_authority_key_identifier:
3311
    case WC_NID_key_usage:
3312
    case WC_NID_certificate_policies:
3313
    case WC_NID_policy_mappings:
3314
    case WC_NID_subject_alt_name:
3315
    case WC_NID_issuer_alt_name:
3316
    case WC_NID_basic_constraints:
3317
    case WC_NID_name_constraints:
3318
    case WC_NID_policy_constraints:
3319
    case WC_NID_ext_key_usage:
3320
    case WC_NID_crl_distribution_points:
3321
    case WC_NID_inhibit_any_policy:
3322
    case WC_NID_info_access:
3323
        WOLFSSL_MSG("Nothing to populate for current NID");
3324
        break;
3325
    default:
3326
        WOLFSSL_MSG("Unknown or unsupported NID");
3327
        break;
3328
    }
3329
3330
    return;
3331
}
3332
3333
/**
3334
 * @param nid One of the WC_NID_* constants defined in asn.h
3335
 * @param crit
3336
 * @param data This data is copied to the returned extension.
3337
 * @return
3338
 */
3339
WOLFSSL_X509_EXTENSION *wolfSSL_X509V3_EXT_i2d(int nid, int crit,
3340
                                               void *data)
3341
{
3342
    WOLFSSL_X509_EXTENSION *ext = NULL;
3343
    WOLFSSL_ASN1_STRING* asn1str = NULL;
3344
3345
    WOLFSSL_ENTER("wolfSSL_X509V3_EXT_i2d");
3346
3347
    if (!data) {
3348
        return NULL;
3349
    }
3350
3351
    if (!(ext = wolfSSL_X509_EXTENSION_new())) {
3352
        return NULL;
3353
    }
3354
3355
    wolfSSL_X509V3_EXT_METHOD_populate(&ext->ext_method, nid);
3356
3357
    switch (nid) {
3358
    case WC_NID_subject_key_identifier:
3359
        /* WOLFSSL_ASN1_STRING */
3360
    case WC_NID_key_usage:
3361
        /* WOLFSSL_ASN1_STRING */
3362
    {
3363
        asn1str = (WOLFSSL_ASN1_STRING*)data;
3364
        ext->value = *asn1str;
3365
        if (asn1str->isDynamic) {
3366
            ext->value.data = (char*)XMALLOC(asn1str->length, NULL,
3367
                                             DYNAMIC_TYPE_OPENSSL);
3368
            if (!ext->value.data) {
3369
                WOLFSSL_MSG("malloc failed");
3370
                /* Zero so that no existing memory is freed */
3371
                XMEMSET(&ext->value, 0, sizeof(WOLFSSL_ASN1_STRING));
3372
                goto err_cleanup;
3373
            }
3374
            XMEMCPY(ext->value.data, asn1str->data, asn1str->length);
3375
        }
3376
        else {
3377
            ext->value.data = ext->value.strData;
3378
        }
3379
3380
        if (!(ext->obj = wolfSSL_OBJ_nid2obj(nid))) {
3381
            WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
3382
            goto err_cleanup;
3383
        }
3384
3385
        break;
3386
    }
3387
    case WC_NID_subject_alt_name:
3388
        /* typedef STACK_OF(GENERAL_NAME) GENERAL_NAMES */
3389
    case WC_NID_issuer_alt_name:
3390
        /* typedef STACK_OF(GENERAL_NAME) GENERAL_NAMES */
3391
    case WC_NID_ext_key_usage:
3392
        /* typedef STACK_OF(ASN1_OBJECT) EXTENDED_KEY_USAGE */
3393
    case WC_NID_info_access:
3394
        /* typedef STACK_OF(ACCESS_DESCRIPTION) AUTHORITY_INFO_ACCESS */
3395
    {
3396
        WOLFSSL_STACK* sk = (WOLFSSL_STACK*)data;
3397
3398
        if (ext->ext_sk) {
3399
            wolfSSL_sk_pop_free(ext->ext_sk, NULL);
3400
        }
3401
3402
        if (!(ext->ext_sk = wolfSSL_sk_dup(sk))) {
3403
            WOLFSSL_MSG("wolfSSL_sk_dup failed");
3404
            goto err_cleanup;
3405
        }
3406
3407
        if (!(ext->obj = wolfSSL_OBJ_nid2obj(nid))) {
3408
            WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
3409
            goto err_cleanup;
3410
        }
3411
3412
        break;
3413
    }
3414
    case WC_NID_basic_constraints:
3415
    {
3416
        /* WOLFSSL_BASIC_CONSTRAINTS */
3417
        WOLFSSL_BASIC_CONSTRAINTS* bc = (WOLFSSL_BASIC_CONSTRAINTS*)data;
3418
3419
        if (!(ext->obj = wolfSSL_ASN1_OBJECT_new())) {
3420
            WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
3421
            goto err_cleanup;
3422
        }
3423
3424
        ext->obj->ca = bc->ca;
3425
        if (bc->pathlen) {
3426
            ext->obj->pathlen = wolfSSL_ASN1_INTEGER_dup(bc->pathlen);
3427
            if (!ext->obj->pathlen) {
3428
                WOLFSSL_MSG("wolfSSL_ASN1_INTEGER_dup failed");
3429
                goto err_cleanup;
3430
            }
3431
        }
3432
        break;
3433
    }
3434
    case WC_NID_authority_key_identifier:
3435
    {
3436
        /* AUTHORITY_KEYID */
3437
        WOLFSSL_AUTHORITY_KEYID* akey = (WOLFSSL_AUTHORITY_KEYID*)data;
3438
3439
        if (akey->keyid) {
3440
            if (wolfSSL_ASN1_STRING_set(&ext->value, akey->keyid->data,
3441
                                    akey->keyid->length) != WOLFSSL_SUCCESS) {
3442
                WOLFSSL_MSG("wolfSSL_ASN1_STRING_set failed");
3443
                goto err_cleanup;
3444
            }
3445
            ext->value.type = akey->keyid->type;
3446
3447
            if (!(ext->obj = wolfSSL_OBJ_nid2obj(nid))) {
3448
                WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new failed");
3449
                goto err_cleanup;
3450
            }
3451
3452
        }
3453
        else if (akey->issuer) {
3454
            ext->obj = wolfSSL_ASN1_OBJECT_dup(akey->issuer);
3455
            if (!ext->obj) {
3456
                WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_dup failed");
3457
                goto err_cleanup;
3458
            }
3459
        }
3460
        else {
3461
            WOLFSSL_MSG("WC_NID_authority_key_identifier empty data");
3462
            goto err_cleanup;
3463
        }
3464
        break;
3465
    }
3466
    case WC_NID_inhibit_any_policy:
3467
        /* ASN1_INTEGER */
3468
    case WC_NID_certificate_policies:
3469
        /* STACK_OF(POLICYINFO) */
3470
    case WC_NID_policy_mappings:
3471
        /* STACK_OF(POLICY_MAPPING) */
3472
    case WC_NID_name_constraints:
3473
        /* NAME_CONSTRAINTS */
3474
    case WC_NID_policy_constraints:
3475
        /* POLICY_CONSTRAINTS */
3476
    case WC_NID_crl_distribution_points:
3477
        /* typedef STACK_OF(DIST_POINT) CRL_DIST_POINTS */
3478
    default:
3479
        WOLFSSL_MSG("Unknown or unsupported NID");
3480
        break;
3481
    }
3482
3483
    ext->crit = crit;
3484
3485
    return ext;
3486
err_cleanup:
3487
    if (ext) {
3488
        wolfSSL_X509_EXTENSION_free(ext);
3489
    }
3490
    return NULL;
3491
}
3492
3493
/* Returns pointer to ASN1_OBJECT from an X509_EXTENSION object */
3494
WOLFSSL_ASN1_OBJECT* wolfSSL_X509_EXTENSION_get_object(
3495
    WOLFSSL_X509_EXTENSION* ext)
3496
{
3497
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_get_object");
3498
    if (ext == NULL)
3499
        return NULL;
3500
    return ext->obj;
3501
}
3502
3503
3504
/**
3505
 * duplicates the 'obj' input and sets it into the 'ext' structure
3506
 * returns WOLFSSL_SUCCESS on success
3507
 */
3508
int wolfSSL_X509_EXTENSION_set_object(WOLFSSL_X509_EXTENSION* ext,
3509
        const WOLFSSL_ASN1_OBJECT* obj)
3510
{
3511
    WOLFSSL_ASN1_OBJECT *current;
3512
3513
    WOLFSSL_ENTER("wolfSSL_X509_EXTENSION_set_object");
3514
    if (ext == NULL)
3515
        return WOLFSSL_FAILURE;
3516
3517
    current = wolfSSL_X509_EXTENSION_get_object(ext);
3518
    if (current != NULL) {
3519
        wolfSSL_ASN1_OBJECT_free(current);
3520
    }
3521
    ext->obj = wolfSSL_ASN1_OBJECT_dup((WOLFSSL_ASN1_OBJECT*)obj);
3522
    return WOLFSSL_SUCCESS;
3523
}
3524
#endif /* OPENSSL_ALL */
3525
3526
#ifdef WOLFSSL_OLD_EXTDATA_FMT
3527
/*
3528
 * Replace the current string in 'asn1str', which is the full X.509
3529
 * extension octet string with some data specific for the extension
3530
 * type. The extension is the one given in 'oid'.
3531
 * Return 0 in case of success, or a negative error code.
3532
 */
3533
static int wolfSSL_ASN1_STRING_into_old_ext_fmt(WOLFSSL_ASN1_STRING *asn1str,
3534
                                                word32 oid)
3535
{
3536
    switch (oid)
3537
    {
3538
        case AUTH_INFO_OID:
3539
            wolfSSL_ASN1_STRING_clear(asn1str);
3540
            asn1str->data = NULL;
3541
            asn1str->length = 0;
3542
            return 0;
3543
3544
        case AUTH_KEY_OID:
3545
        {
3546
            int ret = 0;
3547
            const byte *extAuthKeyId = NULL;
3548
            word32 extAuthKeyIdSz = 0;
3549
            char *data = NULL;
3550
3551
            ret = DecodeAuthKeyId((const byte *)asn1str->data, asn1str->length,
3552
                    &extAuthKeyId, &extAuthKeyIdSz, NULL, NULL, NULL, NULL);
3553
3554
            if (ret != 0)
3555
                return ret;
3556
3557
            data = (char*)XMALLOC((size_t)(extAuthKeyIdSz), NULL,
3558
                                  DYNAMIC_TYPE_OPENSSL);
3559
            if (data == NULL)
3560
                return MEMORY_ERROR;
3561
3562
            XMEMCPY(data, extAuthKeyId, (size_t)extAuthKeyIdSz);
3563
            wolfSSL_ASN1_STRING_set(asn1str, data, extAuthKeyIdSz);
3564
            XFREE(data, NULL, DYNAMIC_TYPE_OPENSSL);
3565
            return 0;
3566
        }
3567
3568
        case SUBJ_KEY_OID:
3569
        {
3570
            int ret = 0;
3571
            const byte *extSubjKeyId = NULL;
3572
            word32 extSubjKeyIdSz = 0;
3573
            char *data = NULL;
3574
3575
            ret = DecodeSubjKeyId((const byte *)asn1str->data, asn1str->length,
3576
                    &extSubjKeyId, &extSubjKeyIdSz);
3577
            if (ret != 0)
3578
                return ret;
3579
3580
            data = (char*)XMALLOC((size_t)(extSubjKeyIdSz), NULL,
3581
                                  DYNAMIC_TYPE_OPENSSL);
3582
            if (data == NULL)
3583
                return MEMORY_ERROR;
3584
3585
            XMEMCPY(data, extSubjKeyId, (size_t)extSubjKeyIdSz);
3586
            wolfSSL_ASN1_STRING_set(asn1str, data, extSubjKeyIdSz);
3587
            XFREE(data, NULL, DYNAMIC_TYPE_OPENSSL);
3588
            return 0;
3589
        }
3590
3591
        case CERT_POLICY_OID:
3592
            wolfSSL_ASN1_STRING_clear(asn1str);
3593
            asn1str->data = NULL;
3594
            asn1str->length = 0;
3595
            return 0;
3596
3597
        case KEY_USAGE_OID:
3598
        {
3599
            int ret = 0;
3600
            word16 extKeyUsage = 0;
3601
3602
            ret = DecodeKeyUsage((const byte *)asn1str->data, asn1str->length,
3603
                    &extKeyUsage);
3604
            if (ret != 0)
3605
                return ret;
3606
3607
            wolfSSL_ASN1_STRING_set(asn1str, (byte*)&extKeyUsage,
3608
                                    sizeof(extKeyUsage));
3609
            return 0;
3610
        }
3611
3612
        case EXT_KEY_USAGE_OID:
3613
        {
3614
            int ret = 0;
3615
            const byte *extExtKeyUsageSrc = NULL;
3616
            word32 extExtKeyUsageSz = 0;
3617
            word32 extExtKeyUsageCount = 0;
3618
            byte extExtKeyUsage = 0;
3619
            byte extExtKeyUsageSsh = 0;
3620
            char *data = NULL;
3621
3622
            ret = DecodeExtKeyUsage((const byte*)asn1str->data, asn1str->length,
3623
                    &extExtKeyUsageSrc, &extExtKeyUsageSz, &extExtKeyUsageCount,
3624
                    &extExtKeyUsage, &extExtKeyUsageSsh);
3625
            if (ret != 0)
3626
                return ret;
3627
3628
            data = (char*)XMALLOC((size_t)(extExtKeyUsageSz), NULL,
3629
                                  DYNAMIC_TYPE_OPENSSL);
3630
            if (data == NULL)
3631
                return MEMORY_ERROR;
3632
3633
            XMEMCPY(data, extExtKeyUsageSrc, (size_t)extExtKeyUsageSz);
3634
            wolfSSL_ASN1_STRING_set(asn1str, data, extExtKeyUsageSz);
3635
            XFREE(data, NULL, DYNAMIC_TYPE_OPENSSL);
3636
            return 0;
3637
        }
3638
3639
        case CRL_DIST_OID:
3640
            wolfSSL_ASN1_STRING_clear(asn1str);
3641
            asn1str->data = NULL;
3642
            asn1str->length = 0;
3643
            return 0;
3644
3645
        default:
3646
            /* Do nothing, it is already set */
3647
            return 0;
3648
    }
3649
}
3650
#endif /* WOLFSSL_OLD_EXTDATA_FMT */
3651
3652
/* Returns pointer to ASN1_STRING in X509_EXTENSION object */
3653
WOLFSSL_ASN1_STRING* wolfSSL_X509_EXTENSION_get_data(
3654
    WOLFSSL_X509_EXTENSION* ext)
3655
{
3656
    WOLFSSL_ASN1_STRING *ret;
3657
3658
    ret =  wolfSSL_X509_EXTENSION_get_data_internal(ext);
3659
3660
#ifdef WOLFSSL_OLD_EXTDATA_FMT
3661
    if (ret)
3662
    {
3663
        int error;
3664
        error = wolfSSL_ASN1_STRING_into_old_ext_fmt (ret, ext->obj->type);
3665
        if (error != 0)
3666
        {
3667
            WOLFSSL_MSG("Error calling wolfSSL_ASN1_STRING_into_old_ext_fmt");
3668
            return NULL;
3669
        }
3670
    }
3671
#endif
3672
3673
    return ret;
3674
}
3675
3676
3677
/**
3678
 * Creates a duplicate of input 'data' and sets it into 'ext' structure
3679
 * returns WOLFSSL_SUCCESS on success
3680
 */
3681
int wolfSSL_X509_EXTENSION_set_data(WOLFSSL_X509_EXTENSION* ext,
3682
        WOLFSSL_ASN1_STRING* data)
3683
{
3684
    WOLFSSL_ASN1_STRING* current;
3685
3686
    if (ext == NULL || data == NULL)
3687
        return WOLFSSL_FAILURE;
3688
3689
    current = wolfSSL_X509_EXTENSION_get_data_internal(ext);
3690
    if (current->length > 0 && current->data != NULL && current->isDynamic) {
3691
        XFREE(current->data, NULL, DYNAMIC_TYPE_OPENSSL);
3692
    }
3693
3694
    return wolfSSL_ASN1_STRING_copy(&ext->value, data);
3695
}
3696
3697
#if !defined(NO_PWDBASED)
3698
int wolfSSL_X509_digest(const WOLFSSL_X509* x509, const WOLFSSL_EVP_MD* digest,
3699
        unsigned char* buf, unsigned int* len)
3700
{
3701
    int ret;
3702
3703
    WOLFSSL_ENTER("wolfSSL_X509_digest");
3704
3705
    if (x509 == NULL || digest == NULL) {
3706
        WOLFSSL_MSG("Null argument found");
3707
        return WOLFSSL_FAILURE;
3708
    }
3709
3710
    if (x509->derCert == NULL) {
3711
        WOLFSSL_MSG("No DER certificate stored in X509");
3712
        return WOLFSSL_FAILURE;
3713
    }
3714
3715
    ret = wolfSSL_EVP_Digest(x509->derCert->buffer, x509->derCert->length, buf,
3716
                              len, digest, NULL);
3717
    WOLFSSL_LEAVE("wolfSSL_X509_digest", ret);
3718
    return ret;
3719
}
3720
3721
int wolfSSL_X509_pubkey_digest(const WOLFSSL_X509 *x509,
3722
        const WOLFSSL_EVP_MD *digest, unsigned char* buf, unsigned int* len)
3723
{
3724
    int ret;
3725
3726
    WOLFSSL_ENTER("wolfSSL_X509_pubkey_digest");
3727
3728
    if (x509 == NULL || digest == NULL) {
3729
        WOLFSSL_MSG("Null argument found");
3730
        return WOLFSSL_FAILURE;
3731
    }
3732
3733
    if (x509->pubKey.buffer == NULL || x509->pubKey.length == 0) {
3734
        WOLFSSL_MSG("No DER public key stored in X509");
3735
        return WOLFSSL_FAILURE;
3736
    }
3737
3738
    ret = wolfSSL_EVP_Digest(x509->pubKey.buffer, x509->pubKey.length, buf,
3739
                              len, digest, NULL);
3740
    WOLFSSL_LEAVE("wolfSSL_X509_pubkey_digest", ret);
3741
    return ret;
3742
}
3743
#endif
3744
3745
#endif /* OPENSSL_EXTRA */
3746
3747
#ifdef OPENSSL_EXTRA
3748
3749
    #ifndef NO_WOLFSSL_STUB
3750
    const char* wolfSSL_X509_get_default_cert_file_env(void)
3751
    {
3752
        WOLFSSL_STUB("X509_get_default_cert_file_env");
3753
        return "";
3754
    }
3755
3756
    const char* wolfSSL_X509_get_default_cert_file(void)
3757
    {
3758
        WOLFSSL_STUB("X509_get_default_cert_file");
3759
        return "";
3760
    }
3761
3762
    const char* wolfSSL_X509_get_default_cert_dir_env(void)
3763
    {
3764
        WOLFSSL_STUB("X509_get_default_cert_dir_env");
3765
        return "";
3766
    }
3767
3768
    const char* wolfSSL_X509_get_default_cert_dir(void)
3769
    {
3770
        WOLFSSL_STUB("X509_get_default_cert_dir");
3771
        return "";
3772
    }
3773
    #endif
3774
3775
#endif /* OPENSSL_EXTRA */
3776
3777
#if defined(KEEP_PEER_CERT) || defined(SESSION_CERTS) || \
3778
    defined(KEEP_OUR_CERT) || \
3779
    defined(OPENSSL_EXTRA)  || defined(OPENSSL_EXTRA_X509_SMALL)
3780
3781
/* user externally called free X509, if dynamic go ahead with free, otherwise
3782
 * don't */
3783
static void ExternalFreeX509(WOLFSSL_X509* x509)
3784
{
3785
#if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
3786
    int doFree = 0;
3787
#endif
3788
3789
    WOLFSSL_ENTER("ExternalFreeX509");
3790
    if (x509) {
3791
#ifdef HAVE_EX_DATA_CLEANUP_HOOKS
3792
        wolfSSL_CRYPTO_cleanup_ex_data(&x509->ex_data);
3793
#endif
3794
        if (x509->dynamicMemory) {
3795
        #if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
3796
            int ret;
3797
            wolfSSL_RefDec(&x509->ref, &doFree, &ret);
3798
            if (ret != 0) {
3799
                WOLFSSL_MSG("Couldn't lock x509 mutex");
3800
            }
3801
            if (doFree)
3802
        #endif /* OPENSSL_EXTRA_X509_SMALL || OPENSSL_EXTRA */
3803
            {
3804
                FreeX509(x509);
3805
                XFREE(x509, x509->heap, DYNAMIC_TYPE_X509);
3806
            }
3807
        }
3808
        else {
3809
            WOLFSSL_MSG("free called on non dynamic object, not freeing");
3810
        }
3811
    }
3812
}
3813
3814
/* Frees an external WOLFSSL_X509 structure */
3815
WOLFSSL_ABI
3816
void wolfSSL_X509_free(WOLFSSL_X509* x509)
3817
{
3818
    WOLFSSL_ENTER("wolfSSL_X509_free");
3819
    ExternalFreeX509(x509);
3820
}
3821
#endif
3822
3823
#if defined(KEEP_PEER_CERT) || defined(SESSION_CERTS) || \
3824
    defined(OPENSSL_EXTRA)  || defined(OPENSSL_EXTRA_X509_SMALL)
3825
3826
/* copy name into in buffer, at most sz bytes, if buffer is null will
3827
   malloc buffer, call responsible for freeing                     */
3828
WOLFSSL_ABI
3829
char* wolfSSL_X509_NAME_oneline(WOLFSSL_X509_NAME* name, char* in, int sz)
3830
{
3831
    int copySz;
3832
3833
    WOLFSSL_ENTER("wolfSSL_X509_NAME_oneline");
3834
3835
    if (name == NULL) {
3836
        WOLFSSL_MSG("WOLFSSL_X509_NAME pointer was NULL");
3837
        return NULL;
3838
    }
3839
3840
    if (name->sz == 0)
3841
        return in;
3842
3843
    if (!in) {
3844
    #ifdef WOLFSSL_STATIC_MEMORY
3845
        WOLFSSL_MSG("Using static memory -- please pass in a buffer");
3846
        return NULL;
3847
    #else
3848
        in = (char*)XMALLOC(name->sz, NULL, DYNAMIC_TYPE_OPENSSL);
3849
        if (!in)
3850
            return in;
3851
        copySz = name->sz;
3852
    #endif
3853
    }
3854
    else {
3855
        copySz = (int)min((word32)sz, (word32)name->sz);
3856
        if (copySz <= 0)
3857
            return in;
3858
    }
3859
3860
    XMEMCPY(in, name->name, copySz - 1);
3861
    in[copySz - 1] = 0;
3862
3863
    return in;
3864
}
3865
3866
#ifdef OPENSSL_EXTRA
3867
/* Given an X509_NAME, convert it to canonical form and then hash
3868
 * with the provided hash type. Returns the first 4 bytes of the hash
3869
 * as unsigned long on success, and 0 otherwise. */
3870
static unsigned long X509NameHash(WOLFSSL_X509_NAME* name,
3871
    enum wc_HashType hashType)
3872
{
3873
    unsigned long  hash = 0;
3874
    unsigned char* canonName = NULL;
3875
    byte           digest[WC_MAX_DIGEST_SIZE];
3876
    int            size = 0;
3877
    int            rc;
3878
3879
    WOLFSSL_ENTER("X509NameHash");
3880
3881
    if (name == NULL) {
3882
        WOLFSSL_ERROR_MSG("WOLFSSL_X509_NAME pointer was NULL");
3883
        return 0;
3884
    }
3885
3886
    if (name->sz == 0) {
3887
        WOLFSSL_ERROR_MSG("Nothing to hash in WOLFSSL_X509_NAME");
3888
        return 0;
3889
    }
3890
3891
    size = wolfSSL_i2d_X509_NAME_canon(name, &canonName);
3892
3893
    if (size <= 0 || canonName == NULL) {
3894
        WOLFSSL_ERROR_MSG("wolfSSL_i2d_X509_NAME_canon error");
3895
        return 0;
3896
    }
3897
3898
    rc = wc_Hash(hashType, (const byte*)canonName, (word32)size, digest,
3899
        sizeof(digest));
3900
3901
    if (rc == 0) {
3902
        hash = (((unsigned long)digest[3] << 24) |
3903
                ((unsigned long)digest[2] << 16) |
3904
                ((unsigned long)digest[1] <<  8) |
3905
                ((unsigned long)digest[0]));
3906
    }
3907
    else if (rc == WC_NO_ERR_TRACE(HASH_TYPE_E)) {
3908
        WOLFSSL_ERROR_MSG("Hash function not compiled in");
3909
    }
3910
    else {
3911
        WOLFSSL_ERROR_MSG("Error hashing name");
3912
    }
3913
3914
    XFREE(canonName, NULL, DYNAMIC_TYPE_OPENSSL);
3915
    return hash;
3916
}
3917
3918
unsigned long wolfSSL_X509_NAME_hash(WOLFSSL_X509_NAME* name)
3919
{
3920
    return X509NameHash(name, WC_HASH_TYPE_SHA);
3921
}
3922
3923
/******************************************************************************
3924
* wolfSSL_X509_subject_name_hash
3925
* wolfSSL_X509_issuer_name_hash
3926
* Compute the hash digest of the subject / issuer name.
3927
* These functions prefer SHA-1 (if available) for compatibility. Otherwise
3928
* they use SHA-256.
3929
*
3930
* RETURNS:
3931
* The first 4 bytes of SHA-1 (or SHA-256) hash in little endian order as
3932
* unsigned long.
3933
* Otherwise, returns zero.
3934
*
3935
* Note:
3936
* Returns the same hash value as OpenSSL's X509_X_name_hash() API
3937
* if SHA-1 support is compiled in. SHA-256 will be used if SHA-1 is
3938
* not available.
3939
*/
3940
unsigned long wolfSSL_X509_subject_name_hash(const WOLFSSL_X509* x509)
3941
{
3942
    if (x509 == NULL) {
3943
        WOLFSSL_ERROR_MSG("WOLFSSL_X509 pointer was NULL");
3944
        return 0;
3945
    }
3946
3947
    #ifndef NO_SHA
3948
    return X509NameHash((WOLFSSL_X509_NAME*) &x509->subject, WC_HASH_TYPE_SHA);
3949
    #elif !defined(NO_SHA256)
3950
    return X509NameHash((WOLFSSL_X509_NAME*) &x509->subject,
3951
                        WC_HASH_TYPE_SHA256);
3952
    #else
3953
    WOLFSSL_ERROR_MSG("Hash function not compiled in");
3954
    return 0;
3955
    #endif
3956
}
3957
3958
unsigned long wolfSSL_X509_issuer_name_hash(const WOLFSSL_X509* x509)
3959
{
3960
    if (x509 == NULL) {
3961
        WOLFSSL_ERROR_MSG("WOLFSSL_X509 pointer was NULL");
3962
        return 0;
3963
    }
3964
3965
    #ifndef NO_SHA
3966
    return X509NameHash((WOLFSSL_X509_NAME*) &x509->issuer, WC_HASH_TYPE_SHA);
3967
    #elif !defined(NO_SHA256)
3968
    return X509NameHash((WOLFSSL_X509_NAME*) &x509->issuer,
3969
                        WC_HASH_TYPE_SHA256);
3970
    #else
3971
    WOLFSSL_ERROR_MSG("Hash function not compiled in");
3972
    return 0;
3973
    #endif
3974
}
3975
#endif /* OPENSSL_EXTRA */
3976
3977
#if defined(OPENSSL_EXTRA) && defined(XSNPRINTF)
3978
/* Copies X509 subject name into a buffer, with comma-separated name entries
3979
 *   (matching OpenSSL v1.0.0 format)
3980
 * Example Output for Issuer:
3981
 *
3982
 * C=US, ST=Montana, L=Bozeman, O=Sawtooth, OU=Consulting,
3983
 *  CN=www.wolfssl.com, emailAddress=info@wolfssl.com
3984
 */
3985
char* wolfSSL_X509_get_name_oneline(WOLFSSL_X509_NAME* name, char* in, int sz)
3986
{
3987
    int count, i;
3988
    int totalLen = 0;
3989
    char tmpBuf[256];
3990
    WOLFSSL_ENTER("wolfSSL_X509_get_name_oneline");
3991
3992
    if (name == NULL) {
3993
        WOLFSSL_MSG("wolfSSL_X509_get_name_oneline failed");
3994
        return NULL;
3995
    }
3996
    #ifdef WOLFSSL_STATIC_MEMORY
3997
    if (!in) {
3998
        WOLFSSL_MSG("Using static memory -- please pass in a buffer");
3999
        return NULL;
4000
    }
4001
    #endif
4002
4003
    /* Loop through X509 name entries and copy new format to buffer */
4004
    count = wolfSSL_X509_NAME_entry_count(name);
4005
    for (i = 0; i < count; i++) {
4006
        WOLFSSL_X509_NAME_ENTRY* entry;
4007
        int nameSz;
4008
        int strSz;
4009
        int strLen;
4010
        char *str;
4011
        const int tmpBufSz = sizeof(tmpBuf);
4012
        char buf[80];
4013
        const char* sn;
4014
4015
        /* Get name entry and size */
4016
        entry = wolfSSL_X509_NAME_get_entry(name, i);
4017
        if (entry == NULL) {
4018
            WOLFSSL_MSG("wolfSSL_X509_NAME_get_entry failed");
4019
            return NULL;
4020
        }
4021
        nameSz = wolfSSL_X509_NAME_get_text_by_NID(name, entry->nid, buf,
4022
                                                                   sizeof(buf));
4023
        if (nameSz < 0) {
4024
            WOLFSSL_MSG("wolfSSL_X509_NAME_get_text_by_NID failed");
4025
            return NULL;
4026
        }
4027
4028
        /* Get short name */
4029
        sn = wolfSSL_OBJ_nid2sn(entry->nid);
4030
        if (sn == NULL) {
4031
            WOLFSSL_MSG("OBJ_nid2sn failed");
4032
            return NULL;
4033
        }
4034
4035
        /* Copy sn and name text to buffer
4036
         * Add extra strSz for '=', ',', ' ' and '\0' characters in XSNPRINTF.
4037
         */
4038
        if (i != count - 1) {
4039
            strSz = (int)XSTRLEN(sn) + nameSz + 4;
4040
            str = (char*)XMALLOC(strSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
4041
            if (str == NULL) {
4042
                WOLFSSL_MSG("Memory error");
4043
                return NULL;
4044
            }
4045
            strLen = XSNPRINTF(str, (size_t)strSz, "%s=%s, ", sn, buf);
4046
            if ((strLen  < 0) || (strLen  >= strSz)) {
4047
                WOLFSSL_MSG("buffer overrun");
4048
                XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
4049
                return NULL;
4050
            }
4051
        }
4052
        else {
4053
            /* Copy last name entry
4054
            * Add extra strSz for '=' and '\0' characters in XSNPRINTF.
4055
            */
4056
            strSz = (int)XSTRLEN(sn) + nameSz + 2;
4057
            str = (char*)XMALLOC(strSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
4058
            if (str == NULL) {
4059
                WOLFSSL_MSG("Memory error");
4060
                return NULL;
4061
            }
4062
            strLen = XSNPRINTF(str, (size_t)strSz, "%s=%s", sn, buf);
4063
            if ((strLen  < 0) || (strLen  >= strSz)) {
4064
                WOLFSSL_MSG("buffer overrun");
4065
                XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
4066
                return NULL;
4067
            }
4068
        }
4069
        /* Copy string to tmpBuf */
4070
        if (totalLen + strLen > tmpBufSz) {
4071
            WOLFSSL_MSG("buffer overrun");
4072
            XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
4073
            return NULL;
4074
        }
4075
        XMEMCPY(tmpBuf + totalLen, str, strLen);
4076
        totalLen += strLen;
4077
        XFREE(str, NULL, DYNAMIC_TYPE_TMP_BUFFER);
4078
    }
4079
4080
    /* Allocate space based on total string size if no buffer was provided */
4081
    if (!in) {
4082
        in = (char*)XMALLOC(totalLen+1, NULL, DYNAMIC_TYPE_OPENSSL);
4083
        if (in == NULL) {
4084
            WOLFSSL_MSG("Memory error");
4085
            return in;
4086
        }
4087
    }
4088
    else {
4089
        if (totalLen + 1 > sz) {
4090
            WOLFSSL_MSG("buffer overrun");
4091
            return NULL;
4092
        }
4093
    }
4094
4095
    XMEMCPY(in, tmpBuf, totalLen); /* cppcheck-suppress uninitvar */
4096
    in[totalLen] = '\0';
4097
4098
    return in;
4099
}
4100
#endif
4101
4102
4103
/* Wraps wolfSSL_X509_d2i
4104
 *
4105
 * returns a WOLFSSL_X509 structure pointer on success and NULL on fail
4106
 */
4107
WOLFSSL_X509* wolfSSL_d2i_X509(WOLFSSL_X509** x509, const unsigned char** in,
4108
        int len)
4109
{
4110
    WOLFSSL_X509* newX509 = NULL;
4111
    WOLFSSL_ENTER("wolfSSL_d2i_X509");
4112
4113
    if (in == NULL) {
4114
        WOLFSSL_MSG("NULL input for wolfSSL_d2i_X509");
4115
        return NULL;
4116
    }
4117
4118
    newX509 = wolfSSL_X509_d2i(x509, *in, len);
4119
    if (newX509 != NULL) {
4120
        *in += newX509->derCert->length;
4121
    }
4122
    return newX509;
4123
}
4124
4125
static WOLFSSL_X509* d2i_X509orX509REQ(WOLFSSL_X509** x509,
4126
                                  const byte* in, int len, int req, void* heap)
4127
{
4128
    WOLFSSL_X509 *newX509 = NULL;
4129
    int type = req ? CERTREQ_TYPE : CERT_TYPE;
4130
4131
    WOLFSSL_ENTER("wolfSSL_X509_d2i");
4132
4133
    if (in != NULL && len != 0
4134
    #ifndef WOLFSSL_CERT_REQ
4135
            && req == 0
4136
    #else
4137
            && (req == 0 || req == 1)
4138
    #endif
4139
            ) {
4140
        WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
4141
4142
        WC_ALLOC_VAR_EX(cert, DecodedCert, 1, NULL, DYNAMIC_TYPE_DCERT,
4143
            return NULL);
4144
4145
        InitDecodedCert(cert, (byte*)in, (word32)len, heap);
4146
    #ifdef WOLFSSL_CERT_REQ
4147
        cert->isCSR = (byte)req;
4148
    #endif
4149
        if (ParseCertRelative(cert, type, 0, NULL, NULL) == 0) {
4150
            newX509 = wolfSSL_X509_new_ex(heap);
4151
            if (newX509 != NULL) {
4152
                if (CopyDecodedToX509(newX509, cert) != 0) {
4153
                    wolfSSL_X509_free(newX509);
4154
                    newX509 = NULL;
4155
                }
4156
            }
4157
        }
4158
        FreeDecodedCert(cert);
4159
        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
4160
    }
4161
4162
    if (x509 != NULL)
4163
        *x509 = newX509;
4164
4165
    return newX509;
4166
}
4167
4168
int wolfSSL_X509_get_isCA(WOLFSSL_X509* x509)
4169
{
4170
    int isCA = 0;
4171
4172
    WOLFSSL_ENTER("wolfSSL_X509_get_isCA");
4173
4174
    if (x509 != NULL)
4175
        isCA = x509->isCa;
4176
4177
    WOLFSSL_LEAVE("wolfSSL_X509_get_isCA", isCA);
4178
4179
    return isCA;
4180
}
4181
4182
WOLFSSL_X509* wolfSSL_X509_d2i_ex(WOLFSSL_X509** x509, const byte* in, int len,
4183
    void* heap)
4184
{
4185
    return d2i_X509orX509REQ(x509, in, len, 0, heap);
4186
}
4187
4188
WOLFSSL_X509* wolfSSL_X509_d2i(WOLFSSL_X509** x509, const byte* in, int len)
4189
{
4190
    return wolfSSL_X509_d2i_ex(x509, in, len, NULL);
4191
}
4192
4193
#ifdef WOLFSSL_CERT_REQ
4194
WOLFSSL_X509* wolfSSL_X509_REQ_d2i(WOLFSSL_X509** x509,
4195
        const unsigned char* in, int len)
4196
{
4197
    return d2i_X509orX509REQ(x509, in, len, 1, NULL);
4198
}
4199
4200
WOLFSSL_X509* wolfSSL_d2i_X509_REQ_INFO(WOLFSSL_X509** req,
4201
        const unsigned char** in, int len)
4202
{
4203
    WOLFSSL_X509* ret = NULL;
4204
    WOLFSSL_ENTER("wolfSSL_d2i_X509_REQ_INFO");
4205
4206
    if (in == NULL) {
4207
        WOLFSSL_MSG("NULL input for wolfSSL_d2i_X509");
4208
        return NULL;
4209
    }
4210
4211
    ret = wolfSSL_X509_REQ_d2i(req, *in, len);
4212
    if (ret != NULL) {
4213
        *in += ret->derCert->length;
4214
    }
4215
    return ret;
4216
}
4217
#endif
4218
4219
#endif /* KEEP_PEER_CERT || SESSION_CERTS || OPENSSL_EXTRA ||
4220
          OPENSSL_EXTRA_X509_SMALL */
4221
4222
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
4223
/* returns the number of entries in the WOLFSSL_X509_NAME */
4224
int wolfSSL_X509_NAME_entry_count(WOLFSSL_X509_NAME* name)
4225
{
4226
    int count = 0;
4227
4228
    WOLFSSL_ENTER("wolfSSL_X509_NAME_entry_count");
4229
4230
    if (name != NULL)
4231
        count = name->entrySz;
4232
4233
    WOLFSSL_LEAVE("wolfSSL_X509_NAME_entry_count", count);
4234
    return count;
4235
}
4236
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
4237
4238
#if defined(OPENSSL_EXTRA) || \
4239
    defined(KEEP_OUR_CERT) || defined(KEEP_PEER_CERT)
4240
4241
/* return the next, if any, altname from the peer cert */
4242
WOLFSSL_ABI
4243
char* wolfSSL_X509_get_next_altname(WOLFSSL_X509* cert)
4244
{
4245
    char* ret = NULL;
4246
    WOLFSSL_ENTER("wolfSSL_X509_get_next_altname");
4247
4248
    /* don't have any to work with */
4249
    if (cert == NULL || cert->altNames == NULL)
4250
        return NULL;
4251
4252
    /* already went through them */
4253
    if (cert->altNamesNext == NULL) {
4254
#ifdef WOLFSSL_MULTICIRCULATE_ALTNAMELIST
4255
        /* Reset altNames List to head
4256
         * so that caller can circulate the list again
4257
         */
4258
        cert->altNamesNext = cert->altNames;
4259
#endif
4260
        return NULL;
4261
    }
4262
4263
    /* unsafe cast required for ABI compatibility. */
4264
    ret = (char *)(wc_ptr_t)cert->altNamesNext->name;
4265
#ifdef WOLFSSL_IP_ALT_NAME
4266
    /* return the IP address as a string */
4267
    if (cert->altNamesNext->type == ASN_IP_TYPE) {
4268
        ret = cert->altNamesNext->ipString;
4269
    }
4270
#endif
4271
    cert->altNamesNext = cert->altNamesNext->next;
4272
4273
    return ret;
4274
}
4275
4276
int wolfSSL_X509_get_signature(WOLFSSL_X509* x509,
4277
                                                unsigned char* buf, int* bufSz)
4278
{
4279
    WOLFSSL_ENTER("wolfSSL_X509_get_signature");
4280
    if (x509 == NULL || bufSz == NULL || (*bufSz < (int)x509->sig.length &&
4281
                buf != NULL))
4282
        return WOLFSSL_FATAL_ERROR;
4283
4284
    if (buf != NULL)
4285
        XMEMCPY(buf, x509->sig.buffer, x509->sig.length);
4286
    *bufSz = (int)x509->sig.length;
4287
4288
    return WOLFSSL_SUCCESS;
4289
}
4290
4291
4292
/* Getter function that copies over the DER public key buffer to "buf" and
4293
    * sets the size in bufSz. If "buf" is NULL then just bufSz is set to needed
4294
    * buffer size. "bufSz" passed in should initially be set by the user to be
4295
    * the size of "buf". This gets checked to make sure the buffer is large
4296
    * enough to hold the public key.
4297
    *
4298
    * Note: this is the X.509 form of key with "header" info.
4299
    * return WOLFSSL_SUCCESS on success
4300
    */
4301
int wolfSSL_X509_get_pubkey_buffer(WOLFSSL_X509* x509,
4302
                                            unsigned char* buf, int* bufSz)
4303
{
4304
    WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
4305
    const byte*  der;
4306
    int length = 0;
4307
    int    ret = 0, derSz = 0;
4308
    int badDate = 0;
4309
    const byte* pubKeyX509 = NULL;
4310
    int   pubKeyX509Sz = 0;
4311
4312
    WOLFSSL_ENTER("wolfSSL_X509_get_pubkey_buffer");
4313
    if (x509 == NULL || bufSz == NULL) {
4314
        WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", BAD_FUNC_ARG);
4315
        return WOLFSSL_FATAL_ERROR;
4316
    }
4317
4318
4319
#ifdef WOLFSSL_SMALL_STACK
4320
    cert = (DecodedCert*)XMALLOC(sizeof(DecodedCert),
4321
                                    x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
4322
    if (cert == NULL) {
4323
        WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", MEMORY_E);
4324
        return WOLFSSL_FATAL_ERROR;
4325
    }
4326
#endif
4327
4328
    der = wolfSSL_X509_get_der(x509, &derSz);
4329
    if (der != NULL) {
4330
        InitDecodedCert(cert, der, (word32)derSz, NULL);
4331
        ret = wc_GetPubX509(cert, 0, &badDate);
4332
        if (ret >= 0) {
4333
            word32 idx = cert->srcIdx;
4334
            pubKeyX509 = cert->source + cert->srcIdx;
4335
            ret = GetSequence(cert->source, &cert->srcIdx, &length,
4336
                    cert->maxIdx);
4337
            pubKeyX509Sz = length + (cert->srcIdx - idx);
4338
        }
4339
        FreeDecodedCert(cert);
4340
    }
4341
    WC_FREE_VAR_EX(cert, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
4342
4343
    if (ret < 0) {
4344
        WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", ret);
4345
        return WOLFSSL_FATAL_ERROR;
4346
    }
4347
4348
    if (buf != NULL && pubKeyX509 != NULL) {
4349
        if (pubKeyX509Sz > *bufSz) {
4350
            WOLFSSL_LEAVE("wolfSSL_X509_get_pubkey_buffer", BUFFER_E);
4351
            return WOLFSSL_FATAL_ERROR;
4352
        }
4353
        XMEMCPY(buf, pubKeyX509, pubKeyX509Sz);
4354
    }
4355
    *bufSz = pubKeyX509Sz;
4356
4357
    return WOLFSSL_SUCCESS;
4358
}
4359
4360
4361
/* Getter function for the public key OID value
4362
    * return public key OID stored in WOLFSSL_X509 structure */
4363
int wolfSSL_X509_get_pubkey_type(WOLFSSL_X509* x509)
4364
{
4365
    if (x509 == NULL)
4366
        return WOLFSSL_FAILURE;
4367
    return x509->pubKeyOID;
4368
}
4369
4370
#endif /* OPENSSL_EXTRA || KEEP_OUR_CERT || KEEP_PEER_CERT || SESSION_CERTS */
4371
4372
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
4373
    defined(KEEP_OUR_CERT) || defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
4374
4375
/* write X509 serial number in unsigned binary to buffer
4376
    buffer needs to be at least EXTERNAL_SERIAL_SIZE (32) for all cases
4377
    return WOLFSSL_SUCCESS on success */
4378
int wolfSSL_X509_get_serial_number(WOLFSSL_X509* x509,
4379
                                    byte* in, int* inOutSz)
4380
{
4381
    WOLFSSL_ENTER("wolfSSL_X509_get_serial_number");
4382
    if (x509 == NULL || inOutSz == NULL) {
4383
        WOLFSSL_MSG("Null argument passed in");
4384
        return BAD_FUNC_ARG;
4385
    }
4386
4387
    if (in != NULL) {
4388
        if (*inOutSz < x509->serialSz) {
4389
            WOLFSSL_MSG("Serial buffer too small");
4390
            return BUFFER_E;
4391
        }
4392
        XMEMCPY(in, x509->serial, x509->serialSz);
4393
    }
4394
    *inOutSz = x509->serialSz;
4395
4396
    return WOLFSSL_SUCCESS;
4397
}
4398
4399
/* not an openssl compatibility function - getting for derCert */
4400
const byte* wolfSSL_X509_get_der(WOLFSSL_X509* x509, int* outSz)
4401
{
4402
    WOLFSSL_ENTER("wolfSSL_X509_get_der");
4403
4404
    if (x509 == NULL || x509->derCert == NULL || outSz == NULL)
4405
        return NULL;
4406
4407
    *outSz = (int)x509->derCert->length;
4408
    return x509->derCert->buffer;
4409
}
4410
4411
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL || KEEP_OUR_CERT ||
4412
        * KEEP_PEER_CERT || SESSION_CERTS */
4413
4414
#if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA) || \
4415
    defined(OPENSSL_ALL) || defined(KEEP_OUR_CERT) || \
4416
    defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
4417
4418
/* used by JSSE (not a standard compatibility function) */
4419
WOLFSSL_ABI
4420
const byte* wolfSSL_X509_notBefore(WOLFSSL_X509* x509)
4421
{
4422
    WOLFSSL_ENTER("wolfSSL_X509_notBefore");
4423
4424
    if (x509 == NULL) {
4425
        return NULL;
4426
    }
4427
4428
    if (x509->notBefore.length < 0 ||
4429
            x509->notBefore.length > (int)sizeof(x509->notBeforeData) - 2) {
4430
        return NULL;
4431
    }
4432
4433
    XMEMSET(x509->notBeforeData, 0, sizeof(x509->notBeforeData));
4434
    x509->notBeforeData[0] = (byte)x509->notBefore.type;
4435
    x509->notBeforeData[1] = (byte)x509->notBefore.length;
4436
    XMEMCPY(&x509->notBeforeData[2], x509->notBefore.data,
4437
        x509->notBefore.length);
4438
4439
    return x509->notBeforeData;
4440
}
4441
4442
/* used by JSSE (not a standard compatibility function) */
4443
WOLFSSL_ABI
4444
const byte* wolfSSL_X509_notAfter(WOLFSSL_X509* x509)
4445
{
4446
    WOLFSSL_ENTER("wolfSSL_X509_notAfter");
4447
4448
    if (x509 == NULL) {
4449
        return NULL;
4450
    }
4451
4452
    if (x509->notAfter.length < 0 ||
4453
            x509->notAfter.length > (int)sizeof(x509->notAfterData) - 2) {
4454
        return NULL;
4455
    }
4456
4457
    XMEMSET(x509->notAfterData, 0, sizeof(x509->notAfterData));
4458
    x509->notAfterData[0] = (byte)x509->notAfter.type;
4459
    x509->notAfterData[1] = (byte)x509->notAfter.length;
4460
    XMEMCPY(&x509->notAfterData[2], x509->notAfter.data, x509->notAfter.length);
4461
4462
    return x509->notAfterData;
4463
}
4464
4465
int wolfSSL_X509_version(WOLFSSL_X509* x509)
4466
{
4467
    WOLFSSL_ENTER("wolfSSL_X509_version");
4468
4469
    if (x509 == NULL)
4470
        return 0;
4471
4472
    return x509->version;
4473
}
4474
#endif
4475
4476
#ifdef OPENSSL_EXTRA
4477
4478
/* get the buffer to be signed (tbs) from the WOLFSSL_X509 certificate
4479
    *
4480
    * outSz : gets set to the size of the buffer
4481
    * returns a pointer to the internal buffer at the location of TBS on
4482
    *         on success and NULL on failure.
4483
    */
4484
const unsigned char* wolfSSL_X509_get_tbs(WOLFSSL_X509* x509, int* outSz)
4485
{
4486
    int sz = 0, len;
4487
    unsigned int idx = 0, tmpIdx;
4488
    const unsigned char* der = NULL;
4489
    const unsigned char* tbs = NULL;
4490
4491
    if (x509 == NULL || outSz == NULL) {
4492
        return NULL;
4493
    }
4494
4495
    der = wolfSSL_X509_get_der(x509, &sz);
4496
    if (der == NULL) {
4497
        return NULL;
4498
    }
4499
4500
    if (GetSequence(der, &idx, &len, (word32)sz) < 0) {
4501
        return NULL;
4502
    }
4503
    tbs = der + idx;
4504
    tmpIdx = idx;
4505
    if (GetSequence(der, &idx, &len, (word32)sz) < 0) {
4506
        return NULL;
4507
    }
4508
    *outSz = len + (idx - tmpIdx);
4509
    return tbs;
4510
}
4511
4512
#ifdef WOLFSSL_SEP
4513
4514
/* copy oid into in buffer, at most *inOutSz bytes, if buffer is null will
4515
   malloc buffer, call responsible for freeing. Actual size returned in
4516
   *inOutSz. Requires inOutSz be non-null */
4517
byte* wolfSSL_X509_get_device_type(WOLFSSL_X509* x509, byte* in, int *inOutSz)
4518
{
4519
    int copySz;
4520
4521
    WOLFSSL_ENTER("wolfSSL_X509_get_dev_type");
4522
    if (x509 == NULL) return NULL;
4523
    if (inOutSz == NULL) return NULL;
4524
    if (!x509->deviceTypeSz) return in;
4525
4526
    copySz = min(*inOutSz, x509->deviceTypeSz);
4527
4528
    if (!in) {
4529
    #ifdef WOLFSSL_STATIC_MEMORY
4530
        WOLFSSL_MSG("Using static memory -- please pass in a buffer");
4531
        return NULL;
4532
    #else
4533
        in = (byte*)XMALLOC(x509->deviceTypeSz, 0, DYNAMIC_TYPE_OPENSSL);
4534
        if (!in) return in;
4535
        copySz = x509->deviceTypeSz;
4536
    #endif
4537
    }
4538
4539
    XMEMCPY(in, x509->deviceType, copySz);
4540
    *inOutSz = copySz;
4541
4542
    return in;
4543
}
4544
4545
4546
byte* wolfSSL_X509_get_hw_type(WOLFSSL_X509* x509, byte* in, int* inOutSz)
4547
{
4548
    int copySz;
4549
4550
    WOLFSSL_ENTER("wolfSSL_X509_get_hw_type");
4551
    if (x509 == NULL) return NULL;
4552
    if (inOutSz == NULL) return NULL;
4553
    if (!x509->hwTypeSz) return in;
4554
4555
    copySz = min(*inOutSz, x509->hwTypeSz);
4556
4557
    if (!in) {
4558
    #ifdef WOLFSSL_STATIC_MEMORY
4559
        WOLFSSL_MSG("Using static memory -- please pass in a buffer");
4560
        return NULL;
4561
    #else
4562
        in = (byte*)XMALLOC(x509->hwTypeSz, 0, DYNAMIC_TYPE_OPENSSL);
4563
        if (!in) return in;
4564
        copySz = x509->hwTypeSz;
4565
    #endif
4566
    }
4567
4568
    XMEMCPY(in, x509->hwType, copySz);
4569
    *inOutSz = copySz;
4570
4571
    return in;
4572
}
4573
4574
4575
byte* wolfSSL_X509_get_hw_serial_number(WOLFSSL_X509* x509,byte* in,
4576
                                        int* inOutSz)
4577
{
4578
    int copySz;
4579
4580
    WOLFSSL_ENTER("wolfSSL_X509_get_hw_serial_number");
4581
    if (x509 == NULL) return NULL;
4582
    if (inOutSz == NULL) return NULL;
4583
    if (!x509->hwTypeSz) return in;
4584
4585
    copySz = min(*inOutSz, x509->hwSerialNumSz);
4586
4587
    if (!in) {
4588
    #ifdef WOLFSSL_STATIC_MEMORY
4589
        WOLFSSL_MSG("Using static memory -- please pass in a buffer");
4590
        return NULL;
4591
    #else
4592
        in = (byte*)XMALLOC(x509->hwSerialNumSz, 0, DYNAMIC_TYPE_OPENSSL);
4593
        if (!in) return in;
4594
        copySz = x509->hwSerialNumSz;
4595
    #endif
4596
    }
4597
4598
    XMEMCPY(in, x509->hwSerialNum, copySz);
4599
    *inOutSz = copySz;
4600
4601
    return in;
4602
}
4603
4604
#endif /* WOLFSSL_SEP */
4605
#endif /* OPENSSL_EXTRA */
4606
4607
/* require OPENSSL_EXTRA since wolfSSL_X509_free is wrapped by OPENSSL_EXTRA */
4608
#if defined(OPENSSL_EXTRA)
4609
4610
WOLFSSL_ASN1_TIME* wolfSSL_X509_get_notBefore(const WOLFSSL_X509* x509)
4611
{
4612
    WOLFSSL_ENTER("wolfSSL_X509_get_notBefore");
4613
4614
    if (x509 == NULL)
4615
        return NULL;
4616
4617
    return (WOLFSSL_ASN1_TIME*)&x509->notBefore;
4618
}
4619
4620
4621
WOLFSSL_ASN1_TIME* wolfSSL_X509_get_notAfter(const WOLFSSL_X509* x509)
4622
{
4623
    WOLFSSL_ENTER("wolfSSL_X509_get_notAfter");
4624
4625
    if (x509 == NULL)
4626
        return NULL;
4627
4628
    return (WOLFSSL_ASN1_TIME*)&x509->notAfter;
4629
}
4630
4631
4632
/* return number of elements on success 0 on fail */
4633
int wolfSSL_sk_X509_push(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
4634
    WOLFSSL_X509* x509)
4635
{
4636
    WOLFSSL_ENTER("wolfSSL_sk_X509_push");
4637
4638
    if (sk == NULL || x509 == NULL) {
4639
        return WOLFSSL_FAILURE;
4640
    }
4641
4642
    return wolfSSL_sk_push(sk, x509);
4643
}
4644
4645
4646
/* Return and remove the last x509 pushed on stack */
4647
WOLFSSL_X509* wolfSSL_sk_X509_pop(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
4648
{
4649
    return (WOLFSSL_X509*)wolfSSL_sk_pop(sk);
4650
}
4651
4652
/* Getter function for WOLFSSL_X509 pointer
4653
 *
4654
 * sk is the stack to retrieve pointer from
4655
 * i  is the index value in stack
4656
 *
4657
 * returns a pointer to a WOLFSSL_X509 structure on success and NULL on
4658
 *         fail
4659
 */
4660
WOLFSSL_X509* wolfSSL_sk_X509_value(WOLF_STACK_OF(WOLFSSL_X509)* sk, int i)
4661
{
4662
    WOLFSSL_ENTER("wolfSSL_sk_X509_value");
4663
4664
    for (; sk != NULL && i > 0; i--)
4665
        sk = sk->next;
4666
4667
    if (i != 0 || sk == NULL)
4668
        return NULL;
4669
    return sk->data.x509;
4670
}
4671
4672
4673
/* Return and remove the first x509 pushed on stack */
4674
WOLFSSL_X509* wolfSSL_sk_X509_shift(WOLF_STACK_OF(WOLFSSL_X509)* sk)
4675
{
4676
    return (WOLFSSL_X509*)wolfSSL_sk_pop_node(sk, 0);
4677
}
4678
4679
#endif /* OPENSSL_EXTRA */
4680
4681
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
4682
/* Free's all nodes in X509 stack. This is different then wolfSSL_sk_X509_free
4683
 * in that it free's the underlying objects pushed to the stack.
4684
 *
4685
 * sk  stack to free nodes in
4686
 * f   X509 free function
4687
 */
4688
void wolfSSL_sk_X509_pop_free(WOLF_STACK_OF(WOLFSSL_X509)* sk,
4689
    void (*f) (WOLFSSL_X509*))
4690
{
4691
    WOLFSSL_ENTER("wolfSSL_sk_X509_pop_free");
4692
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
4693
}
4694
4695
4696
/* free just the stack structure */
4697
void wolfSSL_sk_X509_free(WOLF_STACK_OF(WOLFSSL_X509)* sk)
4698
{
4699
    wolfSSL_sk_free(sk);
4700
}
4701
4702
#ifdef HAVE_CRL
4703
WOLFSSL_STACK* wolfSSL_sk_X509_CRL_new(void)
4704
{
4705
    WOLFSSL_STACK* s = wolfSSL_sk_new_node(NULL);
4706
    if (s != NULL)
4707
        s->type = STACK_TYPE_X509_CRL;
4708
    return s;
4709
}
4710
4711
WOLFSSL_STACK* wolfSSL_sk_X509_CRL_new_null(void)
4712
{
4713
    WOLFSSL_STACK* s = wolfSSL_sk_new_null();
4714
    if (s != NULL)
4715
        s->type = STACK_TYPE_X509_CRL;
4716
    return s;
4717
}
4718
4719
void wolfSSL_sk_X509_CRL_pop_free(WOLF_STACK_OF(WOLFSSL_X509_CRL)* sk,
4720
    void (*f) (WOLFSSL_X509_CRL*))
4721
{
4722
    WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_pop_free");
4723
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
4724
}
4725
4726
void wolfSSL_sk_X509_CRL_free(WOLF_STACK_OF(WOLFSSL_X509_CRL)* sk)
4727
{
4728
    wolfSSL_sk_X509_CRL_pop_free(sk, NULL);
4729
}
4730
4731
/* return number of elements on success 0 on fail */
4732
int wolfSSL_sk_X509_CRL_push(WOLF_STACK_OF(WOLFSSL_X509_CRL)* sk,
4733
    WOLFSSL_X509_CRL* crl)
4734
{
4735
    WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_push");
4736
4737
    if (sk == NULL || crl == NULL) {
4738
        return WOLFSSL_FAILURE;
4739
    }
4740
4741
    return wolfSSL_sk_push(sk, crl);
4742
}
4743
4744
WOLFSSL_X509_CRL* wolfSSL_sk_X509_CRL_value(WOLF_STACK_OF(WOLFSSL_X509)* sk,
4745
                                            int i)
4746
{
4747
    WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_value");
4748
    if (sk)
4749
        return (WOLFSSL_X509_CRL*)wolfSSL_sk_value(sk, i);
4750
    return NULL;
4751
}
4752
4753
int wolfSSL_sk_X509_CRL_num(WOLF_STACK_OF(WOLFSSL_X509)* sk)
4754
{
4755
    WOLFSSL_ENTER("wolfSSL_sk_X509_CRL_num");
4756
    if (sk)
4757
        return wolfSSL_sk_num(sk);
4758
    return 0;
4759
}
4760
#endif /* HAVE_CRL */
4761
4762
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
4763
4764
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_QT)
4765
/* return number of elements on success 0 on fail */
4766
int wolfSSL_sk_ACCESS_DESCRIPTION_push(WOLF_STACK_OF(ACCESS_DESCRIPTION)* sk,
4767
                                              WOLFSSL_ACCESS_DESCRIPTION* a)
4768
{
4769
    WOLFSSL_ENTER("wolfSSL_sk_ACCESS_DESCRIPTION_push");
4770
4771
    return wolfSSL_sk_push(sk, a);
4772
}
4773
4774
/* Frees all nodes in ACCESS_DESCRIPTION stack
4775
*
4776
* sk stack of nodes to free
4777
* f  free function to use
4778
*/
4779
void wolfSSL_sk_ACCESS_DESCRIPTION_pop_free(WOLFSSL_STACK* sk,
4780
    void (*f) (WOLFSSL_ACCESS_DESCRIPTION*))
4781
{
4782
   WOLFSSL_ENTER("wolfSSL_sk_ACCESS_DESCRIPTION_pop_free");
4783
   wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
4784
}
4785
4786
void wolfSSL_sk_ACCESS_DESCRIPTION_free(WOLFSSL_STACK* sk)
4787
{
4788
    wolfSSL_sk_free(sk);
4789
}
4790
4791
4792
/* AUTHORITY_INFO_ACCESS object is a stack of ACCESS_DESCRIPTION objects,
4793
 * to free the stack the WOLFSSL_ACCESS_DESCRIPTION stack free function is
4794
 * used */
4795
void wolfSSL_AUTHORITY_INFO_ACCESS_free(
4796
        WOLF_STACK_OF(WOLFSSL_ACCESS_DESCRIPTION)* sk)
4797
{
4798
    WOLFSSL_ENTER("wolfSSL_AUTHORITY_INFO_ACCESS_free");
4799
    wolfSSL_sk_ACCESS_DESCRIPTION_free(sk);
4800
}
4801
4802
void wolfSSL_AUTHORITY_INFO_ACCESS_pop_free(
4803
        WOLF_STACK_OF(WOLFSSL_ACCESS_DESCRIPTION)* sk,
4804
        void (*f) (WOLFSSL_ACCESS_DESCRIPTION*))
4805
{
4806
    WOLFSSL_ENTER("wolfSSL_AUTHORITY_INFO_ACCESS_free");
4807
    wolfSSL_sk_ACCESS_DESCRIPTION_pop_free(sk, f);
4808
}
4809
4810
4811
void wolfSSL_ACCESS_DESCRIPTION_free(WOLFSSL_ACCESS_DESCRIPTION* a)
4812
{
4813
    WOLFSSL_ENTER("wolfSSL_ACCESS_DESCRIPTION_free");
4814
    if (a == NULL)
4815
        return;
4816
4817
    if (a->method)
4818
        wolfSSL_ASN1_OBJECT_free(a->method);
4819
    if (a->location)
4820
        wolfSSL_GENERAL_NAME_free(a->location);
4821
    XFREE(a, NULL, DYNAMIC_TYPE_X509_EXT);
4822
4823
    /* a = NULL, don't try to a or double free it */
4824
}
4825
#endif /* OPENSSL_EXTRA || WOLFSSL_QT */
4826
4827
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
4828
4829
/* Creates and returns new GENERAL_NAME structure */
4830
WOLFSSL_GENERAL_NAME* wolfSSL_GENERAL_NAME_new(void)
4831
{
4832
    WOLFSSL_GENERAL_NAME* gn;
4833
    WOLFSSL_ENTER("GENERAL_NAME_new");
4834
4835
    gn = (WOLFSSL_GENERAL_NAME*)XMALLOC(sizeof(WOLFSSL_GENERAL_NAME), NULL,
4836
                                                             DYNAMIC_TYPE_ASN1);
4837
    if (gn == NULL) {
4838
        return NULL;
4839
    }
4840
    XMEMSET(gn, 0, sizeof(WOLFSSL_GENERAL_NAME));
4841
4842
    gn->d.ia5 = wolfSSL_ASN1_STRING_new();
4843
    if (gn->d.ia5 == NULL) {
4844
        WOLFSSL_MSG("Issue creating ASN1_STRING struct");
4845
        wolfSSL_GENERAL_NAME_free(gn);
4846
        return NULL;
4847
    }
4848
    gn->type = WOLFSSL_GEN_IA5;
4849
    return gn;
4850
}
4851
4852
WOLFSSL_GENERAL_NAME* wolfSSL_GENERAL_NAME_dup(WOLFSSL_GENERAL_NAME* gn)
4853
{
4854
    WOLFSSL_GENERAL_NAME* dupl = NULL;
4855
4856
    WOLFSSL_ENTER("wolfSSL_GENERAL_NAME_dup");
4857
4858
    if (!gn) {
4859
        WOLFSSL_MSG("Bad parameter");
4860
        return NULL;
4861
    }
4862
4863
    if (!(dupl = wolfSSL_GENERAL_NAME_new())) {
4864
        WOLFSSL_MSG("wolfSSL_GENERAL_NAME_new error");
4865
        return NULL;
4866
    }
4867
4868
    wolfSSL_ASN1_STRING_free(dupl->d.ia5);
4869
    dupl->d.ia5 = NULL;
4870
    switch (gn->type) {
4871
    /* WOLFSSL_ASN1_STRING types */
4872
    case WOLFSSL_GEN_DNS:
4873
        if (!(dupl->d.dNSName = wolfSSL_ASN1_STRING_dup(gn->d.dNSName))) {
4874
            WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
4875
            goto error;
4876
        }
4877
        break;
4878
    case WOLFSSL_GEN_IPADD:
4879
        if (!(dupl->d.iPAddress = wolfSSL_ASN1_STRING_dup(gn->d.iPAddress))) {
4880
            WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
4881
            goto error;
4882
        }
4883
        break;
4884
    case WOLFSSL_GEN_EMAIL:
4885
        if (!(dupl->d.rfc822Name = wolfSSL_ASN1_STRING_dup(gn->d.rfc822Name))) {
4886
            WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
4887
            goto error;
4888
        }
4889
        break;
4890
    case WOLFSSL_GEN_URI:
4891
        if (!(dupl->d.uniformResourceIdentifier =
4892
                wolfSSL_ASN1_STRING_dup(gn->d.uniformResourceIdentifier))) {
4893
            WOLFSSL_MSG("wolfSSL_ASN1_STRING_dup error");
4894
            goto error;
4895
        }
4896
        break;
4897
    case WOLFSSL_GEN_OTHERNAME:
4898
        if (gn->d.otherName->value->type != WOLFSSL_V_ASN1_UTF8STRING) {
4899
            WOLFSSL_MSG("Unsupported othername value type");
4900
            goto error;
4901
        }
4902
        dupl->d.otherName = (WOLFSSL_ASN1_OTHERNAME*)XMALLOC(
4903
            sizeof(WOLFSSL_ASN1_OTHERNAME), NULL, DYNAMIC_TYPE_ASN1);
4904
        if (dupl->d.otherName == NULL) {
4905
            WOLFSSL_MSG("XMALLOC error");
4906
            goto error;
4907
        }
4908
        dupl->d.otherName->type_id = wolfSSL_ASN1_OBJECT_dup(
4909
            gn->d.otherName->type_id);
4910
        dupl->d.otherName->value = (WOLFSSL_ASN1_TYPE*)XMALLOC(
4911
            sizeof(WOLFSSL_ASN1_TYPE), NULL, DYNAMIC_TYPE_ASN1);
4912
        if (dupl->d.otherName->value != NULL) {
4913
            dupl->d.otherName->value->type = gn->d.otherName->value->type;
4914
            dupl->d.otherName->value->value.utf8string =
4915
                wolfSSL_ASN1_STRING_dup(
4916
                                      gn->d.otherName->value->value.utf8string);
4917
        }
4918
        if ((dupl->d.otherName->type_id == NULL) ||
4919
            (dupl->d.otherName->value == NULL) ||
4920
            (dupl->d.otherName->value->value.utf8string == NULL)) {
4921
            wolfSSL_ASN1_OBJECT_free(dupl->d.otherName->type_id);
4922
            wolfSSL_ASN1_TYPE_free(dupl->d.otherName->value);
4923
            XFREE(dupl->d.otherName, NULL, DYNAMIC_TYPE_ASN1);
4924
            dupl->d.otherName = NULL;
4925
            WOLFSSL_MSG("error duping othername");
4926
            goto error;
4927
        }
4928
        break;
4929
    case WOLFSSL_GEN_X400:
4930
    case WOLFSSL_GEN_DIRNAME:
4931
    case WOLFSSL_GEN_EDIPARTY:
4932
    case WOLFSSL_GEN_RID:
4933
    default:
4934
        WOLFSSL_MSG("Unrecognized or unsupported GENERAL_NAME type");
4935
        goto error;
4936
    }
4937
    dupl->type = gn->type;
4938
4939
    return dupl;
4940
error:
4941
    wolfSSL_GENERAL_NAME_free(dupl);
4942
    return NULL;
4943
}
4944
4945
/* Set an Othername in a general name.
4946
 *
4947
 * @param [out] gen     Pointer to the GENERAL_NAME where the othername is set.
4948
 * @param [in]  oid     Object ID (ie UPN).
4949
 * @param [in]  name    The actual name.
4950
 * @return  WOLFSSL_FAILURE on invalid parameter or memory error,
4951
 *          WOLFSSL_SUCCESS otherwise.
4952
 */
4953
int wolfSSL_GENERAL_NAME_set0_othername(WOLFSSL_GENERAL_NAME* gen,
4954
                                        WOLFSSL_ASN1_OBJECT* oid,
4955
                                        WOLFSSL_ASN1_TYPE* value)
4956
{
4957
    WOLFSSL_ASN1_OBJECT *x = NULL;
4958
4959
    if ((gen == NULL) || (oid == NULL) || (value == NULL)) {
4960
        return WOLFSSL_FAILURE;
4961
    }
4962
4963
    x = wolfSSL_ASN1_OBJECT_dup(oid);
4964
    if (x == NULL) {
4965
        WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_dup() failed");
4966
        return WOLFSSL_FAILURE;
4967
    }
4968
4969
    if (wolfSSL_GENERAL_NAME_set_type(gen, WOLFSSL_GEN_OTHERNAME)
4970
            != WOLFSSL_SUCCESS) {
4971
        wolfSSL_ASN1_OBJECT_free(x);
4972
        return WOLFSSL_FAILURE;
4973
    }
4974
4975
    gen->d.otherName->type_id = x;
4976
    gen->d.otherName->value = value;
4977
    return WOLFSSL_SUCCESS;
4978
}
4979
4980
/* return number of elements on success 0 on fail */
4981
int wolfSSL_sk_GENERAL_NAME_push(WOLFSSL_GENERAL_NAMES* sk,
4982
                                 WOLFSSL_GENERAL_NAME* gn)
4983
{
4984
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_push");
4985
4986
    return wolfSSL_sk_push(sk, gn);
4987
}
4988
4989
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
4990
4991
#ifdef OPENSSL_EXTRA
4992
4993
/* Returns the general name at index i from the stack
4994
 *
4995
 * sk  stack to get general name from
4996
 * idx index to get
4997
 *
4998
 * return a pointer to the internal node of the stack
4999
 */
5000
WOLFSSL_GENERAL_NAME* wolfSSL_sk_GENERAL_NAME_value(WOLFSSL_STACK* sk, int idx)
5001
{
5002
    return (WOLFSSL_GENERAL_NAME*)wolfSSL_sk_value(sk, idx);
5003
}
5004
5005
/* Gets the number of nodes in the stack
5006
 *
5007
 * sk  stack to get the number of nodes from
5008
 *
5009
 * returns the number of nodes, -1 if no nodes
5010
 */
5011
int wolfSSL_sk_GENERAL_NAME_num(WOLFSSL_STACK* sk)
5012
{
5013
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_num");
5014
5015
    return wolfSSL_sk_num(sk);
5016
}
5017
5018
/* Allocates an empty GENERAL NAME stack */
5019
WOLFSSL_STACK* wolfSSL_sk_GENERAL_NAME_new(void *cmpFunc) {
5020
    WOLFSSL_STACK* sk = NULL;
5021
    (void)cmpFunc;
5022
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_new");
5023
5024
    sk = wolfSSL_sk_new_null();
5025
    if (sk != NULL) {
5026
        sk->type = STACK_TYPE_GEN_NAME;
5027
    }
5028
5029
    return sk;
5030
}
5031
#endif /* OPENSSL_EXTRA */
5032
5033
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
5034
5035
/* Frees all nodes in a GENERAL NAME stack
5036
 *
5037
 * sk stack of nodes to free
5038
 * f  free function to use, not called with wolfSSL
5039
 */
5040
void wolfSSL_sk_GENERAL_NAME_pop_free(WOLFSSL_STACK* sk,
5041
        void (*f) (WOLFSSL_GENERAL_NAME*))
5042
{
5043
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_pop_free");
5044
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
5045
}
5046
5047
void wolfSSL_sk_GENERAL_NAME_free(WOLFSSL_STACK* sk)
5048
{
5049
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_NAME_free");
5050
    wolfSSL_sk_X509_pop_free(sk, NULL);
5051
}
5052
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
5053
5054
#ifdef OPENSSL_EXTRA
5055
static void wolfSSL_DIST_POINT_NAME_free(WOLFSSL_DIST_POINT_NAME* dpn)
5056
{
5057
    if (dpn != NULL) {
5058
        if (dpn->name.fullname != NULL) {
5059
            wolfSSL_sk_X509_pop_free(dpn->name.fullname, NULL);
5060
        }
5061
        XFREE(dpn, NULL, DYNAMIC_TYPE_OPENSSL);
5062
    }
5063
}
5064
5065
5066
/* returns new pointer on success and NULL on fail */
5067
static WOLFSSL_DIST_POINT_NAME* wolfSSL_DIST_POINT_NAME_new(void)
5068
{
5069
    WOLFSSL_DIST_POINT_NAME* dpn = NULL;
5070
    WOLFSSL_GENERAL_NAMES* gns = NULL;
5071
5072
    dpn = (WOLFSSL_DIST_POINT_NAME*)XMALLOC(sizeof(WOLFSSL_DIST_POINT_NAME),
5073
                                            NULL, DYNAMIC_TYPE_OPENSSL);
5074
    if (dpn == NULL) {
5075
        return NULL;
5076
    }
5077
    XMEMSET(dpn, 0, sizeof(WOLFSSL_DIST_POINT_NAME));
5078
5079
    gns = wolfSSL_sk_new_null();
5080
    if (gns == NULL) {
5081
        WOLFSSL_MSG("wolfSSL_sk_new_null error");
5082
        XFREE(dpn, NULL, DYNAMIC_TYPE_OPENSSL);
5083
        return NULL;
5084
    }
5085
    gns->type = STACK_TYPE_GEN_NAME;
5086
5087
    /* DIST_POINT_NAME type may be 0 or 1, indicating whether fullname or
5088
     * relativename is used. See: RFC 5280 section 4.2.1.13 */
5089
    dpn->name.fullname = gns;
5090
    dpn->type = 0;
5091
5092
    return dpn;
5093
}
5094
5095
5096
/* Creates and returns new DIST_POINT structure */
5097
WOLFSSL_DIST_POINT* wolfSSL_DIST_POINT_new(void)
5098
{
5099
    WOLFSSL_DIST_POINT* dp = NULL;
5100
    WOLFSSL_DIST_POINT_NAME* dpn = NULL;
5101
5102
    WOLFSSL_ENTER("wolfSSL_DIST_POINT_new");
5103
5104
    dp = (WOLFSSL_DIST_POINT*)XMALLOC(sizeof(WOLFSSL_DIST_POINT), NULL,
5105
                                      DYNAMIC_TYPE_OPENSSL);
5106
    if (dp == NULL) {
5107
        return NULL;
5108
    }
5109
    XMEMSET(dp, 0, sizeof(WOLFSSL_DIST_POINT));
5110
5111
    dpn = wolfSSL_DIST_POINT_NAME_new();
5112
    if (dpn == NULL) {
5113
        XFREE(dp, NULL, DYNAMIC_TYPE_OPENSSL);
5114
        return NULL;
5115
    }
5116
    dp->distpoint = dpn;
5117
5118
    return dp;
5119
}
5120
5121
5122
/* Frees DIST_POINT objects.
5123
*/
5124
void wolfSSL_DIST_POINT_free(WOLFSSL_DIST_POINT* dp)
5125
{
5126
    WOLFSSL_ENTER("wolfSSL_DIST_POINT_free");
5127
    if (dp != NULL) {
5128
        wolfSSL_DIST_POINT_NAME_free(dp->distpoint);
5129
        XFREE(dp, NULL, DYNAMIC_TYPE_OPENSSL);
5130
    }
5131
}
5132
5133
void wolfSSL_DIST_POINTS_free(WOLFSSL_DIST_POINTS *dps)
5134
{
5135
    WOLFSSL_ENTER("wolfSSL_DIST_POINTS_free");
5136
5137
    if (dps == NULL) {
5138
        return;
5139
    }
5140
5141
    wolfSSL_sk_free(dps);
5142
}
5143
5144
/* return number of elements on success 0 on fail */
5145
int wolfSSL_sk_DIST_POINT_push(WOLFSSL_DIST_POINTS* sk, WOLFSSL_DIST_POINT* dp)
5146
{
5147
    WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_push");
5148
5149
    if (sk == NULL || dp == NULL) {
5150
        return WOLFSSL_FAILURE;
5151
    }
5152
5153
    return wolfSSL_sk_push(sk, dp);
5154
}
5155
5156
/* Returns the CRL dist point at index i from the stack
5157
 *
5158
 * sk  stack to get general name from
5159
 * idx index to get
5160
 *
5161
 * return a pointer to the internal node of the stack
5162
 */
5163
WOLFSSL_DIST_POINT* wolfSSL_sk_DIST_POINT_value(WOLFSSL_STACK* sk, int idx)
5164
{
5165
    if (sk == NULL) {
5166
        return NULL;
5167
    }
5168
5169
    return (WOLFSSL_DIST_POINT*)wolfSSL_sk_value(sk, idx);
5170
}
5171
5172
/* Gets the number of nodes in the stack
5173
 *
5174
 * sk  stack to get the number of nodes from
5175
 *
5176
 * returns the number of nodes, -1 if no nodes
5177
 */
5178
int wolfSSL_sk_DIST_POINT_num(WOLFSSL_STACK* sk)
5179
{
5180
    WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_num");
5181
5182
    if (sk == NULL) {
5183
        return WOLFSSL_FATAL_ERROR;
5184
    }
5185
5186
    return wolfSSL_sk_num(sk);
5187
}
5188
5189
/* Frees all nodes in a DIST_POINT stack
5190
 *
5191
 * sk stack of nodes to free
5192
 * f  free function to use
5193
 */
5194
void wolfSSL_sk_DIST_POINT_pop_free(WOLFSSL_STACK* sk,
5195
        void (*f) (WOLFSSL_DIST_POINT*))
5196
{
5197
    WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_pop_free");
5198
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
5199
}
5200
5201
void wolfSSL_sk_DIST_POINT_free(WOLFSSL_STACK* sk)
5202
{
5203
    WOLFSSL_ENTER("wolfSSL_sk_DIST_POINT_free");
5204
    wolfSSL_sk_free(sk);
5205
}
5206
5207
/* returns the number of nodes in stack on success and WOLFSSL_FATAL_ERROR
5208
 * on fail */
5209
int wolfSSL_sk_ACCESS_DESCRIPTION_num(WOLFSSL_STACK* sk)
5210
{
5211
    if (sk == NULL) {
5212
        return WOLFSSL_FATAL_ERROR;
5213
    }
5214
5215
    return (int)sk->num;
5216
}
5217
5218
/* returns NULL on fail and pointer to internal data on success */
5219
WOLFSSL_ACCESS_DESCRIPTION* wolfSSL_sk_ACCESS_DESCRIPTION_value(
5220
        WOLFSSL_STACK* sk, int idx)
5221
{
5222
    WOLFSSL_STACK* ret;
5223
5224
    if (sk == NULL) {
5225
        return NULL;
5226
    }
5227
5228
    ret = wolfSSL_sk_get_node(sk, idx);
5229
    if (ret != NULL) {
5230
        return ret->data.access;
5231
    }
5232
    return NULL;
5233
}
5234
#endif /* OPENSSL_EXTRA */
5235
5236
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
5237
/* free's the internal type for the general name */
5238
static void wolfSSL_GENERAL_NAME_type_free(WOLFSSL_GENERAL_NAME* name)
5239
{
5240
    if (name != NULL) {
5241
        switch (name->type) {
5242
        case WOLFSSL_GEN_IA5:
5243
            wolfSSL_ASN1_STRING_free(name->d.ia5);
5244
            name->d.ia5 = NULL;
5245
            break;
5246
        case WOLFSSL_GEN_EMAIL:
5247
            wolfSSL_ASN1_STRING_free(name->d.rfc822Name);
5248
            name->d.rfc822Name = NULL;
5249
            break;
5250
        case WOLFSSL_GEN_DNS:
5251
            wolfSSL_ASN1_STRING_free(name->d.dNSName);
5252
            name->d.dNSName = NULL;
5253
            break;
5254
        case WOLFSSL_GEN_DIRNAME:
5255
            wolfSSL_X509_NAME_free(name->d.dirn);
5256
            name->d.dirn = NULL;
5257
            break;
5258
        case WOLFSSL_GEN_URI:
5259
            wolfSSL_ASN1_STRING_free(name->d.uniformResourceIdentifier);
5260
            name->d.uniformResourceIdentifier = NULL;
5261
            break;
5262
        case WOLFSSL_GEN_IPADD:
5263
            wolfSSL_ASN1_STRING_free(name->d.iPAddress);
5264
            name->d.iPAddress = NULL;
5265
            break;
5266
        case WOLFSSL_GEN_RID:
5267
            wolfSSL_ASN1_OBJECT_free(name->d.registeredID);
5268
            name->d.registeredID = NULL;
5269
            break;
5270
        case WOLFSSL_GEN_OTHERNAME:
5271
            if (name->d.otherName != NULL) {
5272
                wolfSSL_ASN1_OBJECT_free(name->d.otherName->type_id);
5273
                wolfSSL_ASN1_TYPE_free(name->d.otherName->value);
5274
                XFREE(name->d.otherName, NULL, DYNAMIC_TYPE_ASN1);
5275
                name->d.otherName = NULL;
5276
            }
5277
            break;
5278
        case WOLFSSL_GEN_X400:
5279
            /* Unsupported: fall through */
5280
        case WOLFSSL_GEN_EDIPARTY:
5281
            /* Unsupported: fall through */
5282
        default:
5283
            WOLFSSL_MSG("wolfSSL_GENERAL_NAME_type_free: possible leak");
5284
            break;
5285
        }
5286
    }
5287
}
5288
5289
/* sets the general name type and free's the existing one
5290
 * can fail with a memory error if malloc fails or bad arg error
5291
 * otherwise return WOLFSSL_SUCCESS */
5292
int wolfSSL_GENERAL_NAME_set_type(WOLFSSL_GENERAL_NAME* name, int typ)
5293
{
5294
    int ret = WOLFSSL_SUCCESS;
5295
5296
    if (name != NULL) {
5297
        wolfSSL_GENERAL_NAME_type_free(name);
5298
        name->type = typ;
5299
5300
        switch (typ) {
5301
            case WOLFSSL_GEN_URI:
5302
                name->d.uniformResourceIdentifier = wolfSSL_ASN1_STRING_new();
5303
                if (name->d.uniformResourceIdentifier == NULL)
5304
                    ret = MEMORY_E;
5305
                break;
5306
            case WOLFSSL_GEN_OTHERNAME:
5307
                name->d.otherName = (WOLFSSL_ASN1_OTHERNAME*)XMALLOC(
5308
                    sizeof(WOLFSSL_ASN1_OTHERNAME), NULL, DYNAMIC_TYPE_ASN1);
5309
                if (name->d.otherName == NULL) {
5310
                    ret = MEMORY_E;
5311
                }
5312
                else {
5313
                    XMEMSET(name->d.otherName, 0, sizeof(WOLFSSL_ASN1_OTHERNAME));
5314
                }
5315
                break;
5316
            default:
5317
                name->type = WOLFSSL_GEN_IA5;
5318
                name->d.ia5 = wolfSSL_ASN1_STRING_new();
5319
                if (name->d.ia5 == NULL)
5320
                    ret = MEMORY_E;
5321
        }
5322
    }
5323
    else {
5324
        ret = BAD_FUNC_ARG;
5325
    }
5326
5327
    return ret;
5328
}
5329
5330
/* Set the value in a general name. This is a compat layer API.
5331
 *
5332
 * @param [out] a       Pointer to the GENERAL_NAME where the othername is set.
5333
 * @param [in]  type    The type of this general name.
5334
 * @param [in]  value   The ASN.1 string that is the value.
5335
 * @return none
5336
 * @note the set0 indicates we take ownership so the user does NOT free value.
5337
 */
5338
void wolfSSL_GENERAL_NAME_set0_value(WOLFSSL_GENERAL_NAME *a, int type,
5339
                                     void *value)
5340
{
5341
    WOLFSSL_ASN1_STRING *val = (WOLFSSL_ASN1_STRING *)value;
5342
    if (a == NULL) {
5343
        WOLFSSL_MSG("a is NULL");
5344
        return;
5345
    }
5346
5347
    if (val == NULL) {
5348
        WOLFSSL_MSG("value is NULL");
5349
        return;
5350
    }
5351
5352
    if (type != WOLFSSL_GEN_DNS) {
5353
        WOLFSSL_MSG("Only WOLFSSL_GEN_DNS is supported");
5354
        return;
5355
    }
5356
5357
    wolfSSL_GENERAL_NAME_type_free(a);
5358
    a->type = type;
5359
    /* Only when WOLFSSL_GEN_DNS. */
5360
    a->d.dNSName = val;
5361
}
5362
5363
/* Frees GENERAL_NAME objects.
5364
*/
5365
void wolfSSL_GENERAL_NAME_free(WOLFSSL_GENERAL_NAME* name)
5366
{
5367
    WOLFSSL_ENTER("wolfSSL_GENERAL_NAME_Free");
5368
    if (name != NULL) {
5369
        wolfSSL_GENERAL_NAME_type_free(name);
5370
        XFREE(name, NULL, DYNAMIC_TYPE_OPENSSL);
5371
    }
5372
}
5373
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL*/
5374
5375
#ifdef OPENSSL_EXTRA
5376
void wolfSSL_GENERAL_NAMES_free(WOLFSSL_GENERAL_NAMES *gens)
5377
{
5378
    WOLFSSL_ENTER("wolfSSL_GENERAL_NAMES_free");
5379
5380
    if (gens == NULL) {
5381
        return;
5382
    }
5383
5384
    wolfSSL_sk_GENERAL_NAME_free(gens);
5385
}
5386
5387
void wolfSSL_EXTENDED_KEY_USAGE_free(WOLFSSL_STACK * sk)
5388
{
5389
    WOLFSSL_ENTER("wolfSSL_EXTENDED_KEY_USAGE_free");
5390
5391
    if (sk == NULL) {
5392
        return;
5393
    }
5394
5395
    wolfSSL_sk_X509_pop_free(sk, NULL);
5396
}
5397
5398
#if !defined(IGNORE_NAME_CONSTRAINTS)
5399
/*
5400
 * Allocate and initialize an empty GENERAL_SUBTREE structure.
5401
 * Returns NULL on allocation failure.
5402
 */
5403
WOLFSSL_GENERAL_SUBTREE* wolfSSL_GENERAL_SUBTREE_new(void)
5404
{
5405
    WOLFSSL_GENERAL_SUBTREE* subtree;
5406
5407
    WOLFSSL_ENTER("wolfSSL_GENERAL_SUBTREE_new");
5408
5409
    subtree = (WOLFSSL_GENERAL_SUBTREE*)XMALLOC(sizeof(WOLFSSL_GENERAL_SUBTREE),
5410
                                                NULL, DYNAMIC_TYPE_OPENSSL);
5411
    if (subtree == NULL) {
5412
        WOLFSSL_MSG("Failed to allocate GENERAL_SUBTREE");
5413
        return NULL;
5414
    }
5415
    XMEMSET(subtree, 0, sizeof(WOLFSSL_GENERAL_SUBTREE));
5416
    return subtree;
5417
}
5418
5419
/*
5420
 * Create an empty NAME_CONSTRAINTS structure.
5421
 * Returns NULL on allocation failure.
5422
 */
5423
WOLFSSL_NAME_CONSTRAINTS* wolfSSL_NAME_CONSTRAINTS_new(void)
5424
{
5425
    WOLFSSL_NAME_CONSTRAINTS* nc;
5426
5427
    WOLFSSL_ENTER("wolfSSL_NAME_CONSTRAINTS_new");
5428
5429
    nc = (WOLFSSL_NAME_CONSTRAINTS*)XMALLOC(sizeof(WOLFSSL_NAME_CONSTRAINTS),
5430
                                            NULL, DYNAMIC_TYPE_OPENSSL);
5431
    if (nc == NULL) {
5432
        WOLFSSL_MSG("Failed to allocate NAME_CONSTRAINTS");
5433
        return NULL;
5434
    }
5435
    XMEMSET(nc, 0, sizeof(WOLFSSL_NAME_CONSTRAINTS));
5436
    return nc;
5437
}
5438
5439
/* Free a GENERAL_SUBTREE and its contents. */
5440
void wolfSSL_GENERAL_SUBTREE_free(WOLFSSL_GENERAL_SUBTREE* subtree)
5441
{
5442
    if (subtree == NULL) {
5443
        return;
5444
    }
5445
    wolfSSL_GENERAL_NAME_free(subtree->base);
5446
    XFREE(subtree, NULL, DYNAMIC_TYPE_OPENSSL);
5447
}
5448
5449
/* Free a NAME_CONSTRAINTS structure and all its contents. */
5450
void wolfSSL_NAME_CONSTRAINTS_free(WOLFSSL_NAME_CONSTRAINTS* nc)
5451
{
5452
    WOLFSSL_ENTER("wolfSSL_NAME_CONSTRAINTS_free");
5453
5454
    if (nc == NULL) {
5455
        return;
5456
    }
5457
5458
    if (nc->permittedSubtrees != NULL) {
5459
        wolfSSL_sk_pop_free(nc->permittedSubtrees,
5460
            (wolfSSL_sk_freefunc)wolfSSL_GENERAL_SUBTREE_free);
5461
    }
5462
5463
    if (nc->excludedSubtrees != NULL) {
5464
        wolfSSL_sk_pop_free(nc->excludedSubtrees,
5465
            (wolfSSL_sk_freefunc)wolfSSL_GENERAL_SUBTREE_free);
5466
    }
5467
5468
    XFREE(nc, NULL, DYNAMIC_TYPE_OPENSSL);
5469
}
5470
5471
/* Get number of items in GENERAL_SUBTREE stack. */
5472
int wolfSSL_sk_GENERAL_SUBTREE_num(const WOLFSSL_STACK* sk)
5473
{
5474
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_SUBTREE_num");
5475
5476
    return wolfSSL_sk_num(sk);
5477
}
5478
5479
/* Get GENERAL_SUBTREE at index from stack. */
5480
WOLFSSL_GENERAL_SUBTREE* wolfSSL_sk_GENERAL_SUBTREE_value(
5481
    const WOLFSSL_STACK* sk, int idx)
5482
{
5483
    WOLFSSL_ENTER("wolfSSL_sk_GENERAL_SUBTREE_value");
5484
5485
    return (WOLFSSL_GENERAL_SUBTREE*)wolfSSL_sk_value(sk, idx);
5486
}
5487
5488
/* Check IP address string matches constraint.
5489
 *
5490
 * name: IP address string (ex "192.168.1.50")
5491
 * nameSz: length of name string
5492
 * gn: GENERAL_NAME containing IP constraint (IP + mask bytes)
5493
 *
5494
 * Return 1 on match, otherwise 0
5495
 */
5496
static int MatchIpName(const char* name, int nameSz, WOLFSSL_GENERAL_NAME* gn)
5497
{
5498
    int ipLen = 0;
5499
    int constraintLen;
5500
    char ipStr[WOLFSSL_MAX_IPSTR];
5501
    unsigned char ipBytes[16]; /* Max 16 bytes for IPv6 */
5502
    const unsigned char* constraintData;
5503
5504
    if (name == NULL || nameSz <= 0 || gn == NULL || gn->d.iPAddress == NULL) {
5505
        return 0;
5506
    }
5507
5508
    constraintData = wolfSSL_ASN1_STRING_get0_data(gn->d.iPAddress);
5509
    constraintLen = wolfSSL_ASN1_STRING_length(gn->d.iPAddress);
5510
    if (constraintData == NULL || constraintLen <= 0) {
5511
        return 0;
5512
    }
5513
5514
    /* Null-terminate IP string */
5515
    if (nameSz >= (int)sizeof(ipStr)) {
5516
        return 0;
5517
    }
5518
    XMEMCPY(ipStr, name, nameSz);
5519
    ipStr[nameSz] = '\0';
5520
5521
    /* IPv4 constraint 8 bytes (IP + mask),
5522
     * IPv6 constraint 32 bytes (IP + mask) */
5523
    if (constraintLen == 8) {
5524
        if (XINET_PTON(WOLFSSL_IP4, ipStr, ipBytes) == 1) {
5525
            ipLen = 4;
5526
        }
5527
    }
5528
    else if (constraintLen == 32) {
5529
        if (XINET_PTON(WOLFSSL_IP6, ipStr, ipBytes) == 1) {
5530
            ipLen = 16;
5531
        }
5532
    }
5533
5534
    if (ipLen == 0) {
5535
        return 0;
5536
    }
5537
5538
    return wolfssl_local_MatchIpSubnet(ipBytes, ipLen,
5539
        constraintData, constraintLen);
5540
}
5541
5542
/* Extract host from URI for name constraint matching.
5543
 * URI format: scheme://[userinfo@]host[:port][/path][?query][#fragment]
5544
 * IPv6 literals are enclosed in brackets: scheme://[ipv6addr]:port/path
5545
 * Returns pointer to host start and sets hostLen, or NULL on failure. */
5546
static const char* ExtractHostFromUri(const char* uri, int uriLen, int* hostLen)
5547
{
5548
    const char* hostStart;
5549
    const char* hostEnd;
5550
    const char* p;
5551
    const char* uriEnd;
5552
5553
    if (uri == NULL || uriLen <= 0 || hostLen == NULL) {
5554
        return NULL;
5555
    }
5556
5557
    uriEnd = uri + uriLen;
5558
5559
    /* Find "://" to skip scheme */
5560
    hostStart = NULL;
5561
    for (p = uri; p < uriEnd - 2; p++) {
5562
        if (p[0] == ':' && p[1] == '/' && p[2] == '/') {
5563
            hostStart = p + 3;
5564
            break;
5565
        }
5566
    }
5567
    if (hostStart == NULL || hostStart >= uriEnd) {
5568
        return NULL;
5569
    }
5570
5571
    /* Skip userinfo if present (look for @ before any /, ?, #)
5572
     * userinfo can contain ':' (ex: user:pass@host), don't stop at ':'
5573
     * For IPv6, also don't stop at '[' in userinfo */
5574
    for (p = hostStart; p < uriEnd; p++) {
5575
        if (*p == '@') {
5576
            hostStart = p + 1;
5577
            break;
5578
        }
5579
        if (*p == '/' || *p == '?' || *p == '#') {
5580
            /* No userinfo found */
5581
            break;
5582
        }
5583
        /* If '[' before '@', found IPv6 literal, not userinfo */
5584
        if (*p == '[') {
5585
            break;
5586
        }
5587
    }
5588
    if (hostStart >= uriEnd) {
5589
        return NULL;
5590
    }
5591
5592
    /* Check for IPv6 literal */
5593
    if (*hostStart == '[') {
5594
        /* Find closing bracket, skip opening one */
5595
        hostStart++;
5596
        hostEnd = hostStart;
5597
        while (hostEnd < uriEnd && *hostEnd != ']') {
5598
            hostEnd++;
5599
        }
5600
        if (hostEnd >= uriEnd) {
5601
            /* No closing bracket found, malformed */
5602
            return NULL;
5603
        }
5604
        /* hostEnd points to closing bracket, extract content between */
5605
        *hostLen = (int)(hostEnd - hostStart);
5606
        if (*hostLen <= 0) {
5607
            return NULL;
5608
        }
5609
        return hostStart;
5610
    }
5611
5612
    /* Regular hostname, find end */
5613
    hostEnd = hostStart;
5614
    while (hostEnd < uriEnd && *hostEnd != ':' && *hostEnd != '/' &&
5615
           *hostEnd != '?' && *hostEnd != '#') {
5616
        hostEnd++;
5617
    }
5618
5619
    *hostLen = (int)(hostEnd - hostStart);
5620
    if (*hostLen <= 0) {
5621
        return NULL;
5622
    }
5623
5624
    return hostStart;
5625
}
5626
5627
/* Helper to check if name string matches a single GENERAL_NAME constraint.
5628
 * Returns 1 if matches, 0 if not. */
5629
static int MatchNameConstraint(int type, const char* name, int nameSz,
5630
    WOLFSSL_GENERAL_NAME* gn)
5631
{
5632
    const char* baseStr;
5633
    int baseLen;
5634
5635
    if (gn == NULL || gn->type != type) {
5636
        return 0;
5637
    }
5638
5639
    switch (type) {
5640
        case WOLFSSL_GEN_IPADD:
5641
            return MatchIpName(name, nameSz, gn);
5642
5643
        case WOLFSSL_GEN_DNS:
5644
        case WOLFSSL_GEN_EMAIL:
5645
        case WOLFSSL_GEN_URI:
5646
            if (gn->d.ia5 == NULL) {
5647
                return 0;
5648
            }
5649
            baseStr = (const char*)wolfSSL_ASN1_STRING_get0_data(gn->d.ia5);
5650
            baseLen = wolfSSL_ASN1_STRING_length(gn->d.ia5);
5651
            if (baseStr == NULL || baseLen <= 0) {
5652
                return 0;
5653
            }
5654
5655
            if (type == WOLFSSL_GEN_EMAIL) {
5656
                return wolfssl_local_MatchBaseName(ASN_RFC822_TYPE, name,
5657
                    nameSz, baseStr, baseLen);
5658
            }
5659
            else if (type == WOLFSSL_GEN_URI) {
5660
                const char* host;
5661
                int hostLen;
5662
5663
                /* For URI, extract host and match against DNS-style */
5664
                host = ExtractHostFromUri(name, nameSz, &hostLen);
5665
                if (host == NULL) {
5666
                    return 0;
5667
                }
5668
                return wolfssl_local_MatchBaseName(ASN_DNS_TYPE, host, hostLen,
5669
                    baseStr, baseLen);
5670
            }
5671
            else {
5672
                /* WOLFSSL_GEN_DNS uses DNS-style matching */
5673
                return wolfssl_local_MatchBaseName(ASN_DNS_TYPE, name, nameSz,
5674
                    baseStr, baseLen);
5675
            }
5676
5677
        default:
5678
            /* Unsupported type */
5679
            return 0;
5680
    }
5681
}
5682
5683
/*
5684
 * Check if a name string satisfies given name constraints.
5685
 *
5686
 * nc: NAME_CONSTRAINTS struct containing permitted/excluded subtrees
5687
 * type: GeneralName type (WOLFSSL_GEN_DNS, WOLFSSL_GEN_EMAIL, etc.)
5688
 * name: The name string to check
5689
 * nameSz: Length of name string
5690
 *
5691
 * Returns 1 if name satisfies constraints (permitted and not excluded),
5692
 * otherwise 0 if name does not satisfy constraints or on error
5693
 *
5694
 * A name satisfies constraints if permitted subtrees exist for the type,
5695
 * name matches at least one, and name does not match any excluded subtree.
5696
 */
5697
int wolfSSL_NAME_CONSTRAINTS_check_name(WOLFSSL_NAME_CONSTRAINTS* nc,
5698
    int type, const char* name, int nameSz)
5699
{
5700
    int i, num;
5701
    int hasPermittedType = 0;
5702
    int matchedPermitted = 0;
5703
    WOLFSSL_GENERAL_SUBTREE* subtree;
5704
    WOLFSSL_GENERAL_NAME* gn;
5705
5706
    WOLFSSL_ENTER("wolfSSL_NAME_CONSTRAINTS_check_name");
5707
5708
    if (nc == NULL || name == NULL || nameSz <= 0) {
5709
        WOLFSSL_MSG("Bad argument to NAME_CONSTRAINTS_check_name");
5710
        return 0;
5711
    }
5712
5713
    /* Check permitted subtrees */
5714
    if (nc->permittedSubtrees != NULL) {
5715
        num = wolfSSL_sk_GENERAL_SUBTREE_num(nc->permittedSubtrees);
5716
        for (i = 0; i < num; i++) {
5717
            subtree = wolfSSL_sk_GENERAL_SUBTREE_value(
5718
                nc->permittedSubtrees, i);
5719
            if (subtree == NULL || subtree->base == NULL) {
5720
                continue;
5721
            }
5722
5723
            gn = subtree->base;
5724
            if (gn->type != type) {
5725
                continue;
5726
            }
5727
            hasPermittedType = 1;
5728
5729
            if (MatchNameConstraint(type, name, nameSz, gn)) {
5730
                matchedPermitted = 1;
5731
                break;
5732
            }
5733
        }
5734
    }
5735
5736
    /* If permitted constraints exist for this type but none matched, fail */
5737
    if (hasPermittedType && !matchedPermitted) {
5738
        WOLFSSL_MSG("Name not in permitted subtrees");
5739
        return 0;
5740
    }
5741
5742
    /* Check excluded subtrees */
5743
    if (nc->excludedSubtrees != NULL) {
5744
        num = wolfSSL_sk_GENERAL_SUBTREE_num(nc->excludedSubtrees);
5745
        for (i = 0; i < num; i++) {
5746
            subtree = wolfSSL_sk_GENERAL_SUBTREE_value(nc->excludedSubtrees, i);
5747
            if (subtree == NULL || subtree->base == NULL) {
5748
                continue;
5749
            }
5750
5751
            gn = subtree->base;
5752
            if (gn->type != type) {
5753
                continue;
5754
            }
5755
5756
            if (MatchNameConstraint(type, name, nameSz, gn)) {
5757
                WOLFSSL_MSG("Name in excluded subtrees");
5758
                return 0;
5759
            }
5760
        }
5761
    }
5762
5763
    return 1;
5764
}
5765
#endif /* !IGNORE_NAME_CONSTRAINTS */
5766
5767
#if defined(OPENSSL_ALL) && !defined(NO_BIO)
5768
/* Outputs name string of the given WOLFSSL_GENERAL_NAME_OBJECT to WOLFSSL_BIO.
5769
 * Can handle following GENERAL_NAME_OBJECT types:
5770
 *  - GEN_OTHERNAME #
5771
 *  - GEN_EMAIL
5772
 *  - GEN_DNS
5773
 *  - GEN_X400  #
5774
 *  - GEN_DIRNAME
5775
 *  - GEN_EDIPARTY #
5776
 *  - GEN_URI
5777
 *  - GEN_RID
5778
 * The each name string to be output has "typename:namestring" format.
5779
 * For instance, email name string will be output as "email:info@wolfssl.com".
5780
 * However,some types above marked with "#" will be output with
5781
 * "typename:<unsupported>".
5782
 *
5783
 * Parameters:
5784
 *  - out: WOLFSSL_BIO object which is the output destination
5785
 *  - gen: WOLFSSL_GENERAL_NAME object to be output its name
5786
 *
5787
 * Returns WOLFSSL_SUCCESS on success, WOLFSSL_FAILURE on failure.
5788
 */
5789
int wolfSSL_GENERAL_NAME_print(WOLFSSL_BIO* out, WOLFSSL_GENERAL_NAME* gen)
5790
{
5791
    int ret, i;
5792
    unsigned int wd;
5793
    unsigned char* p;
5794
    (void)wd;
5795
    (void)p;
5796
    (void)i;
5797
    WOLFSSL_ENTER("wolfSSL_GENERAL_NAME_print");
5798
5799
    if (out == NULL || gen == NULL)
5800
        return WOLFSSL_FAILURE;
5801
5802
    ret = WOLFSSL_FAILURE;
5803
    switch (gen->type)
5804
    {
5805
    case GEN_OTHERNAME:
5806
        ret = wolfSSL_BIO_printf(out, "othername:<unsupported>");
5807
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5808
        break;
5809
5810
    case GEN_EMAIL:
5811
        ret = wolfSSL_BIO_printf(out, "email:");
5812
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5813
        if (ret == WOLFSSL_SUCCESS)
5814
        {
5815
            ret = wolfSSL_ASN1_STRING_print(out, gen->d.rfc822Name);
5816
        }
5817
        break;
5818
5819
    case GEN_DNS:
5820
        ret = wolfSSL_BIO_printf(out, "DNS:");
5821
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5822
        if (ret == WOLFSSL_SUCCESS) {
5823
            ret = wolfSSL_BIO_printf(out, "%s", gen->d.dNSName->strData);
5824
            ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5825
        }
5826
        break;
5827
5828
    case GEN_X400:
5829
        ret = wolfSSL_BIO_printf(out, "X400Name:<unsupported>");
5830
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5831
        break;
5832
5833
    case GEN_DIRNAME:
5834
        ret = wolfSSL_BIO_printf(out, "DirName:");
5835
        if (ret == WOLFSSL_SUCCESS) {
5836
            ret = wolfSSL_X509_NAME_print_ex(out, gen->d.directoryName, 0,
5837
                                                         XN_FLAG_ONELINE);
5838
        }
5839
        break;
5840
5841
    case GEN_EDIPARTY:
5842
        ret = wolfSSL_BIO_printf(out, "EdiPartyName:<unsupported>");
5843
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5844
        break;
5845
5846
    case GEN_URI:
5847
        ret = wolfSSL_BIO_printf(out, "URI:");
5848
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5849
        if (ret == WOLFSSL_SUCCESS) {
5850
            ret = wolfSSL_ASN1_STRING_print(out,
5851
                                    gen->d.uniformResourceIdentifier);
5852
        }
5853
        break;
5854
5855
    case GEN_IPADD:
5856
        ret = wolfSSL_BIO_printf(out, "IP Address");
5857
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5858
        if (ret == WOLFSSL_SUCCESS) {
5859
5860
            if (!gen->d.iPAddress->length) {
5861
                ret = WOLFSSL_FAILURE;
5862
                break;
5863
            }
5864
            p = (unsigned char*)gen->d.iPAddress->strData;
5865
5866
            if (gen->d.iPAddress->length == 4) {
5867
                ret = wolfSSL_BIO_printf(out, ":%d.%d.%d.%d",
5868
                                  p[0],p[1],p[2],p[3]);
5869
            }
5870
            else if (gen->d.iPAddress->length == 16) {
5871
5872
                for (i = 0; i < 16 && ret == WOLFSSL_SUCCESS;) {
5873
                    wd = p[i] << 8 | p[i+1];
5874
5875
                    i += 2;
5876
                    ret = wolfSSL_BIO_printf(out, ":%X", wd);
5877
                    ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5878
                }
5879
            }
5880
            else {
5881
                ret = wolfSSL_BIO_printf(out, "<unsupported>");
5882
            }
5883
            ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5884
        }
5885
        break;
5886
5887
    case GEN_RID:
5888
        ret = wolfSSL_BIO_printf(out, "Registered ID:");
5889
        ret = (ret > 0) ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
5890
        if (ret == WOLFSSL_SUCCESS) {
5891
            ret = wolfSSL_i2a_ASN1_OBJECT(out, gen->d.registeredID);
5892
        }
5893
        break;
5894
5895
    default:
5896
        /* unsupported type */
5897
        break;
5898
    }
5899
5900
    if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
5901
        return WOLFSSL_FAILURE;
5902
    else
5903
        return WOLFSSL_SUCCESS;
5904
}
5905
#endif /* OPENSSL_ALL */
5906
5907
WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* wolfSSL_sk_X509_EXTENSION_new_null(void)
5908
{
5909
    WOLFSSL_STACK* sk = wolfSSL_sk_new_node(NULL);
5910
    if (sk) {
5911
        sk->type = STACK_TYPE_X509_EXT;
5912
    }
5913
5914
    return (WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)*)sk;;
5915
}
5916
5917
/* returns the number of nodes on the stack */
5918
int wolfSSL_sk_X509_EXTENSION_num(WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk)
5919
{
5920
    if (sk != NULL) {
5921
        return (int)sk->num;
5922
    }
5923
    return WOLFSSL_FATAL_ERROR;
5924
}
5925
5926
5927
/* returns null on failure and pointer to internal value on success */
5928
WOLFSSL_X509_EXTENSION* wolfSSL_sk_X509_EXTENSION_value(
5929
        const WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk, int idx)
5930
{
5931
    return (WOLFSSL_X509_EXTENSION*)wolfSSL_sk_value(sk, idx);
5932
}
5933
5934
/* frees all of the nodes and the values in stack */
5935
void wolfSSL_sk_X509_EXTENSION_pop_free(
5936
        WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk,
5937
        void (*f) (WOLFSSL_X509_EXTENSION*))
5938
{
5939
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
5940
}
5941
5942
void wolfSSL_sk_X509_EXTENSION_free(WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* sk)
5943
{
5944
    wolfSSL_sk_pop_free(sk, NULL);
5945
}
5946
5947
#endif /* OPENSSL_EXTRA */
5948
5949
#if defined(OPENSSL_EXTRA) && !defined(NO_FILESYSTEM) && \
5950
    !defined(NO_STDIO_FILESYSTEM)
5951
5952
WOLFSSL_X509* wolfSSL_X509_d2i_fp(WOLFSSL_X509** x509, XFILE file)
5953
{
5954
    WOLFSSL_X509* newX509 = NULL;
5955
5956
    WOLFSSL_ENTER("wolfSSL_X509_d2i_fp");
5957
5958
    if (file != XBADFILE) {
5959
        byte* fileBuffer = NULL;
5960
        long sz = 0;
5961
5962
        if (XFSEEK(file, 0, XSEEK_END) != 0)
5963
            return NULL;
5964
        sz = XFTELL(file);
5965
        if (XFSEEK(file, 0, XSEEK_SET) != 0)
5966
            return NULL;
5967
5968
        if (sz > MAX_WOLFSSL_FILE_SIZE || sz < 0) {
5969
            WOLFSSL_MSG("X509_d2i file size error");
5970
            return NULL;
5971
        }
5972
5973
        fileBuffer = (byte*)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE);
5974
        if (fileBuffer != NULL) {
5975
            int ret = (int)XFREAD(fileBuffer, 1, (size_t)sz, file);
5976
            if (ret == sz) {
5977
                newX509 = wolfSSL_X509_d2i(NULL, fileBuffer, (int)sz);
5978
            }
5979
            XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
5980
        }
5981
    }
5982
5983
    if (x509 != NULL)
5984
        *x509 = newX509;
5985
5986
    return newX509;
5987
}
5988
5989
#endif /* OPENSSL_EXTRA && !NO_FILESYSTEM && !NO_STDIO_FILESYSTEM */
5990
5991
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
5992
    defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
5993
5994
#ifndef NO_FILESYSTEM
5995
WOLFSSL_ABI
5996
WOLFSSL_X509* wolfSSL_X509_load_certificate_file(const char* fname, int format)
5997
{
5998
#ifdef WOLFSSL_SMALL_STACK
5999
    byte  staticBuffer[1]; /* force heap usage */
6000
#else
6001
    byte  staticBuffer[FILE_BUFFER_SIZE];
6002
#endif
6003
    byte* fileBuffer = staticBuffer;
6004
    int   dynamic = 0;
6005
    int   ret;
6006
    long  sz = 0;
6007
    XFILE file;
6008
6009
    WOLFSSL_X509* x509 = NULL;
6010
6011
    /* Check the inputs */
6012
    if ((fname == NULL) ||
6013
        (format != WOLFSSL_FILETYPE_ASN1 && format != WOLFSSL_FILETYPE_PEM))
6014
        return NULL;
6015
6016
    file = XFOPEN(fname, "rb");
6017
    if (file == XBADFILE)
6018
        return NULL;
6019
6020
    if (XFSEEK(file, 0, XSEEK_END) != 0) {
6021
        XFCLOSE(file);
6022
        return NULL;
6023
    }
6024
    sz = XFTELL(file);
6025
    if (XFSEEK(file, 0, XSEEK_SET) != 0) {
6026
        XFCLOSE(file);
6027
        return NULL;
6028
    }
6029
6030
    if (sz > MAX_WOLFSSL_FILE_SIZE || sz < 0) {
6031
        WOLFSSL_MSG("X509_load_certificate_file size error");
6032
        XFCLOSE(file);
6033
        return NULL;
6034
    }
6035
6036
    if (sz > (long)sizeof(staticBuffer)) {
6037
        fileBuffer = (byte*)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE);
6038
        if (fileBuffer == NULL) {
6039
            XFCLOSE(file);
6040
            return NULL;
6041
        }
6042
        dynamic = 1;
6043
    }
6044
6045
    ret = (int)XFREAD(fileBuffer, 1, (size_t)sz, file);
6046
    if (ret != sz) {
6047
        XFCLOSE(file);
6048
        if (dynamic)
6049
            XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
6050
        return NULL;
6051
    }
6052
6053
    XFCLOSE(file);
6054
6055
    x509 = wolfSSL_X509_load_certificate_buffer(fileBuffer, (int)sz, format);
6056
6057
    if (dynamic)
6058
        XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
6059
6060
    return x509;
6061
}
6062
#endif /* !NO_FILESYSTEM */
6063
6064
static WOLFSSL_X509* loadX509orX509REQFromBuffer(
6065
    const unsigned char* buf, int sz, int format, int type,
6066
    wc_pem_password_cb *cb, void *u)
6067
{
6068
6069
    int ret = 0;
6070
    WOLFSSL_X509* x509 = NULL;
6071
    DerBuffer* der = NULL;
6072
6073
    WOLFSSL_ENTER("wolfSSL_X509_load_certificate_ex");
6074
6075
    if (format == WOLFSSL_FILETYPE_PEM) {
6076
        EncryptedInfo info;
6077
        XMEMSET(&info, 0, sizeof(EncryptedInfo));
6078
    #ifdef WOLFSSL_ENCRYPTED_KEYS
6079
        info.passwd_cb       = cb;
6080
        info.passwd_userdata = u;
6081
    #endif
6082
6083
    #ifdef WOLFSSL_PEM_TO_DER
6084
        ret = PemToDer(buf, sz, type, &der, NULL, &info, NULL);
6085
        if (ret != 0) {
6086
            FreeDer(&der);
6087
        }
6088
    #else
6089
        ret = NOT_COMPILED_IN;
6090
    #endif
6091
    }
6092
    else {
6093
        ret = AllocDer(&der, (word32)sz, type, NULL);
6094
        if (ret == 0) {
6095
            XMEMCPY(der->buffer, buf, sz);
6096
        }
6097
    }
6098
6099
    /* At this point we want `der` to have the certificate in DER format */
6100
    /* ready to be decoded. */
6101
    if (der != NULL && der->buffer != NULL) {
6102
        WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
6103
        /* For TRUSTED_CERT_TYPE, the DER buffer contains the certificate
6104
         * followed by auxiliary trust info. ParseCertRelative expects CERT_TYPE
6105
         * and will parse only the certificate portion, ignoring the rest. */
6106
        int parseType = (type == TRUSTED_CERT_TYPE) ? CERT_TYPE : type;
6107
6108
        WC_ALLOC_VAR_EX(cert, DecodedCert, 1, NULL, DYNAMIC_TYPE_DCERT,
6109
            ret=MEMORY_ERROR);
6110
        if (WC_VAR_OK(cert))
6111
        {
6112
            InitDecodedCert(cert, der->buffer, der->length, NULL);
6113
            ret = ParseCertRelative(cert, parseType, 0, NULL, NULL);
6114
            if (ret == 0) {
6115
                /* For TRUSTED_CERT_TYPE, truncate the DER buffer to exclude
6116
                 * auxiliary trust data. ParseCertRelative sets srcIdx to the
6117
                 * end of the certificate, so we adjust cert->maxIdx accordingly. */
6118
                if (type == TRUSTED_CERT_TYPE && cert->srcIdx < cert->maxIdx) {
6119
                    cert->maxIdx = cert->srcIdx;
6120
                }
6121
6122
                x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), NULL,
6123
                                                             DYNAMIC_TYPE_X509);
6124
                if (x509 != NULL) {
6125
                    InitX509(x509, 1, NULL);
6126
                    ret = CopyDecodedToX509(x509, cert);
6127
                    if (ret != 0) {
6128
                        wolfSSL_X509_free(x509);
6129
                        x509 = NULL;
6130
                    }
6131
                }
6132
                else {
6133
                    ret = MEMORY_ERROR;
6134
                }
6135
            }
6136
6137
            FreeDecodedCert(cert);
6138
            WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
6139
        }
6140
6141
        FreeDer(&der);
6142
    }
6143
6144
    if (ret != 0) {
6145
        WOLFSSL_ERROR(ret);
6146
    }
6147
6148
    /* unused parameter when built without WOLFSSL_ENCRYPTED_KEYS */
6149
    (void)cb;
6150
    (void)u;
6151
    return x509;
6152
}
6153
6154
WOLFSSL_X509* wolfSSL_X509_load_certificate_buffer(
6155
    const unsigned char* buf, int sz, int format)
6156
{
6157
    return loadX509orX509REQFromBuffer(buf, sz,
6158
            format, CERT_TYPE, NULL, NULL);
6159
}
6160
6161
#ifdef WOLFSSL_CERT_REQ
6162
WOLFSSL_X509* wolfSSL_X509_REQ_load_certificate_buffer(
6163
    const unsigned char* buf, int sz, int format)
6164
{
6165
    return loadX509orX509REQFromBuffer(buf, sz,
6166
            format, CERTREQ_TYPE, NULL, NULL);
6167
}
6168
#endif
6169
6170
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL || KEEP_PEER_CERT || \
6171
          SESSION_CERTS */
6172
6173
#if defined(OPENSSL_EXTRA_X509_SMALL) || defined(KEEP_PEER_CERT) || \
6174
    defined(SESSION_CERTS)
6175
/* Smaller subset of X509 compatibility functions. Avoid increasing the size of
6176
 * this subset and its memory usage */
6177
6178
/* returns a pointer to a new WOLFSSL_X509 structure on success and NULL on
6179
 * fail
6180
 */
6181
WOLFSSL_X509* wolfSSL_X509_new_ex(void* heap)
6182
{
6183
    WOLFSSL_X509* x509;
6184
6185
    x509 = (WOLFSSL_X509*)XMALLOC(sizeof(WOLFSSL_X509), heap,
6186
            DYNAMIC_TYPE_X509);
6187
    if (x509 != NULL) {
6188
        InitX509(x509, 1, heap);
6189
    }
6190
6191
    return x509;
6192
}
6193
6194
WOLFSSL_X509* wolfSSL_X509_new(void)
6195
{
6196
    return wolfSSL_X509_new_ex(NULL);
6197
}
6198
6199
WOLFSSL_ABI
6200
WOLFSSL_X509_NAME* wolfSSL_X509_get_subject_name(WOLFSSL_X509* cert)
6201
{
6202
    WOLFSSL_ENTER("wolfSSL_X509_get_subject_name");
6203
    if (cert)
6204
        return &cert->subject;
6205
    return NULL;
6206
}
6207
6208
WOLFSSL_ABI
6209
WOLFSSL_X509_NAME* wolfSSL_X509_get_issuer_name(WOLFSSL_X509* cert)
6210
{
6211
    WOLFSSL_ENTER("wolfSSL_X509_get_issuer_name");
6212
    if (cert)
6213
        return &cert->issuer;
6214
    return NULL;
6215
}
6216
6217
6218
int wolfSSL_X509_get_signature_type(WOLFSSL_X509* x509)
6219
{
6220
    int type = 0;
6221
6222
    WOLFSSL_ENTER("wolfSSL_X509_get_signature_type");
6223
6224
    if (x509 != NULL)
6225
        type = x509->sigOID;
6226
6227
    return type;
6228
}
6229
6230
#if defined(OPENSSL_EXTRA_X509_SMALL)
6231
6232
int wolfSSL_X509_NAME_get_sz(WOLFSSL_X509_NAME* name)
6233
{
6234
    WOLFSSL_ENTER("wolfSSL_X509_NAME_get_sz");
6235
    if (!name)
6236
        return WOLFSSL_FATAL_ERROR;
6237
    return name->sz;
6238
}
6239
6240
/* Searches for the first ENTRY of type NID
6241
 * idx is the location to start searching from, the value at when the entry was
6242
 *     found is stored into idx
6243
 * returns a pointer to the entry on success and null on fail */
6244
static WOLFSSL_X509_NAME_ENTRY* GetEntryByNID(WOLFSSL_X509_NAME* name, int nid,
6245
        int* idx)
6246
{
6247
    int i;
6248
    WOLFSSL_X509_NAME_ENTRY* ret = NULL;
6249
6250
    for (i = *idx; i < MAX_NAME_ENTRIES; i++) {
6251
        if (name->entry[i].nid == nid) {
6252
            ret = &name->entry[i];
6253
            *idx = i;
6254
            break;
6255
        }
6256
    }
6257
    return ret;
6258
}
6259
6260
6261
/* Used to get a string from the WOLFSSL_X509_NAME structure that
6262
 * corresponds with the NID value passed in. This finds the first entry with
6263
 * matching NID value, if searching for the case where there is multiple
6264
 * entries with the same NID value than other functions should be used
6265
 * (i.e. wolfSSL_X509_NAME_get_index_by_NID, wolfSSL_X509_NAME_get_entry)
6266
 *
6267
 * name structure to get string from
6268
 * nid  NID value to search for
6269
 * buf  [out] buffer to hold results. If NULL then the buffer size minus the
6270
 *      null char is returned.
6271
 * len  size of "buf" passed in
6272
 *
6273
 * returns the length of string found, not including the NULL terminator.
6274
 *         It's possible the function could return a negative value in the
6275
 *         case that len is less than or equal to 0. A negative value is
6276
 *         considered an error case.
6277
 */
6278
int wolfSSL_X509_NAME_get_text_by_NID(WOLFSSL_X509_NAME* name,
6279
                                      int nid, char* buf, int len)
6280
{
6281
    WOLFSSL_X509_NAME_ENTRY* e;
6282
    unsigned char *text = NULL;
6283
    int textSz = 0;
6284
    int idx    = 0;
6285
6286
    WOLFSSL_ENTER("wolfSSL_X509_NAME_get_text_by_NID");
6287
6288
    if (name == NULL) {
6289
        WOLFSSL_MSG("NULL argument passed in");
6290
        return WOLFSSL_FATAL_ERROR;
6291
    }
6292
6293
    e = GetEntryByNID(name, nid, &idx);
6294
    if (e == NULL) {
6295
        WOLFSSL_MSG("Entry type not found");
6296
        return WOLFSSL_FATAL_ERROR;
6297
    }
6298
    text   = wolfSSL_ASN1_STRING_data(e->value);
6299
    textSz = wolfSSL_ASN1_STRING_length(e->value);
6300
6301
    if (text == NULL) {
6302
        WOLFSSL_MSG("Unable to get entry text");
6303
        return WOLFSSL_FATAL_ERROR;
6304
    }
6305
6306
    /* if buf is NULL return size of buffer needed (minus null char) */
6307
    if (buf == NULL) {
6308
        WOLFSSL_MSG("Buffer is NULL, returning buffer size only");
6309
        return textSz;
6310
    }
6311
    if (len <= 0) {
6312
        return 0;
6313
    }
6314
6315
    /* + 1 to account for null char */
6316
    textSz = (int)min((word32)textSz + 1, (word32)len);
6317
    if (textSz > 0) {
6318
        XMEMCPY(buf, text, textSz - 1);
6319
        buf[textSz - 1] = '\0';
6320
    }
6321
6322
    WOLFSSL_LEAVE("wolfSSL_X509_NAME_get_text_by_NID", textSz);
6323
    return (textSz - 1); /* do not include null character in size */
6324
}
6325
6326
/* Creates a new WOLFSSL_EVP_PKEY structure that has the public key from x509
6327
 *
6328
 * returns a pointer to the created WOLFSSL_EVP_PKEY on success and NULL on fail
6329
 */
6330
WOLFSSL_EVP_PKEY* wolfSSL_X509_get_pubkey(WOLFSSL_X509* x509)
6331
{
6332
    WOLFSSL_EVP_PKEY* key = NULL;
6333
    int ret = 0;
6334
6335
    (void)ret;
6336
6337
    WOLFSSL_ENTER("wolfSSL_X509_get_pubkey");
6338
    if (x509 != NULL) {
6339
        key = wolfSSL_EVP_PKEY_new_ex(x509->heap);
6340
        if (key != NULL) {
6341
            if (x509->pubKeyOID == RSAk) {
6342
                key->type = WC_EVP_PKEY_RSA;
6343
            }
6344
            else if (x509->pubKeyOID == DSAk) {
6345
                key->type = WC_EVP_PKEY_DSA;
6346
            }
6347
            else {
6348
                key->type = WC_EVP_PKEY_EC;
6349
            }
6350
            key->save_type = 0;
6351
            key->pkey.ptr = (char*)XMALLOC(
6352
                        x509->pubKey.length, x509->heap,
6353
                                                       DYNAMIC_TYPE_PUBLIC_KEY);
6354
            if (key->pkey.ptr == NULL) {
6355
                wolfSSL_EVP_PKEY_free(key);
6356
                return NULL;
6357
            }
6358
            XMEMCPY(key->pkey.ptr, x509->pubKey.buffer, x509->pubKey.length);
6359
            key->pkey_sz = (int)x509->pubKey.length;
6360
6361
            #ifdef HAVE_ECC
6362
                key->pkey_curve = (int)x509->pkCurveOID;
6363
            #endif /* HAVE_ECC */
6364
6365
            /* decode RSA key */
6366
            #ifndef NO_RSA
6367
            if (key->type == WC_EVP_PKEY_RSA) {
6368
                key->ownRsa = 1;
6369
                key->rsa = wolfSSL_RSA_new();
6370
                if (key->rsa == NULL) {
6371
                    wolfSSL_EVP_PKEY_free(key);
6372
                    return NULL;
6373
                }
6374
6375
                if (wolfSSL_RSA_LoadDer_ex(key->rsa,
6376
                            (const unsigned char*)key->pkey.ptr, key->pkey_sz,
6377
                            WOLFSSL_RSA_LOAD_PUBLIC) != WOLFSSL_SUCCESS) {
6378
                    wolfSSL_EVP_PKEY_free(key);
6379
                    return NULL;
6380
                }
6381
            }
6382
            #endif /* NO_RSA */
6383
6384
            /* decode ECC key */
6385
            #if defined(HAVE_ECC) && defined(OPENSSL_EXTRA)
6386
            if (key->type == WC_EVP_PKEY_EC) {
6387
                word32 idx = 0;
6388
6389
                key->ownEcc = 1;
6390
                key->ecc = wolfSSL_EC_KEY_new();
6391
                if (key->ecc == NULL || key->ecc->internal == NULL) {
6392
                    wolfSSL_EVP_PKEY_free(key);
6393
                    return NULL;
6394
                }
6395
6396
                /* not using wolfSSL_EC_KEY_LoadDer because public key in x509
6397
                 * is in the format of x963 (no sequence at start of buffer) */
6398
                ret = wc_EccPublicKeyDecode((const unsigned char*)key->pkey.ptr,
6399
                                            &idx, (ecc_key*)key->ecc->internal,
6400
                                            key->pkey_sz);
6401
                if (ret < 0) {
6402
                    WOLFSSL_ERROR_VERBOSE(ret);
6403
                    WOLFSSL_MSG("wc_EccPublicKeyDecode failed");
6404
                    wolfSSL_EVP_PKEY_free(key);
6405
                    return NULL;
6406
                }
6407
6408
                if (SetECKeyExternal(key->ecc) != WOLFSSL_SUCCESS) {
6409
                    WOLFSSL_MSG("SetECKeyExternal failed");
6410
                    wolfSSL_EVP_PKEY_free(key);
6411
                    return NULL;
6412
                }
6413
6414
                key->ecc->inSet = 1;
6415
            }
6416
            #endif /* HAVE_ECC && OPENSSL_EXTRA */
6417
6418
            #ifndef NO_DSA
6419
            if (key->type == WC_EVP_PKEY_DSA) {
6420
                key->ownDsa = 1;
6421
                key->dsa = wolfSSL_DSA_new();
6422
                if (key->dsa == NULL) {
6423
                    wolfSSL_EVP_PKEY_free(key);
6424
                    return NULL;
6425
                }
6426
6427
                if (wolfSSL_DSA_LoadDer_ex(key->dsa,
6428
                            (const unsigned char*)key->pkey.ptr, key->pkey_sz, \
6429
                            WOLFSSL_DSA_LOAD_PUBLIC) != WOLFSSL_SUCCESS) {
6430
                    wolfSSL_DSA_free(key->dsa);
6431
                    key->dsa = NULL;
6432
                    wolfSSL_EVP_PKEY_free(key);
6433
                    return NULL;
6434
                }
6435
            }
6436
            #endif /* NO_DSA */
6437
        }
6438
    }
6439
    return key;
6440
}
6441
#endif /* OPENSSL_EXTRA_X509_SMALL */
6442
6443
/* End of smaller subset of X509 compatibility functions. Avoid increasing the
6444
 * size of this subset and its memory usage */
6445
#endif /* OPENSSL_EXTRA_X509_SMALL || KEEP_PEER_CERT || SESSION_CERTS */
6446
6447
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)
6448
/*
6449
 * Converts a and b to DER and then does an XMEMCMP to check if they match.
6450
 * Returns 0 when certificates match and WOLFSSL_FATAL_ERROR when they don't.
6451
 */
6452
int wolfSSL_X509_cmp(const WOLFSSL_X509 *a, const WOLFSSL_X509 *b)
6453
{
6454
        const byte* derA;
6455
        const byte* derB;
6456
        int outSzA = 0;
6457
        int outSzB = 0;
6458
6459
        if (a == NULL || b == NULL) {
6460
            return BAD_FUNC_ARG;
6461
        }
6462
6463
        derA = wolfSSL_X509_get_der((WOLFSSL_X509*)a, &outSzA);
6464
        if (derA == NULL) {
6465
            WOLFSSL_MSG("wolfSSL_X509_get_der - certificate A has failed");
6466
            return WOLFSSL_FATAL_ERROR;
6467
        }
6468
        derB = wolfSSL_X509_get_der((WOLFSSL_X509*)b, &outSzB);
6469
        if (derB == NULL) {
6470
            WOLFSSL_MSG("wolfSSL_X509_get_der - certificate B has failed");
6471
            return WOLFSSL_FATAL_ERROR;
6472
        }
6473
6474
        if (outSzA != outSzB || XMEMCMP(derA, derB, outSzA) != 0) {
6475
            WOLFSSL_LEAVE("wolfSSL_X509_cmp", WOLFSSL_FATAL_ERROR);
6476
            return WOLFSSL_FATAL_ERROR;
6477
        }
6478
6479
        WOLFSSL_LEAVE("wolfSSL_X509_cmp", 0);
6480
6481
        return 0;
6482
    }
6483
#endif /* OPENSSL_ALL */
6484
6485
#if defined(OPENSSL_EXTRA)
6486
    int wolfSSL_X509_ext_isSet_by_NID(WOLFSSL_X509* x509, int nid)
6487
    {
6488
        int isSet = 0;
6489
6490
        WOLFSSL_ENTER("wolfSSL_X509_ext_isSet_by_NID");
6491
6492
        if (x509 != NULL) {
6493
            switch (nid) {
6494
                case WC_NID_basic_constraints:
6495
                    isSet = x509->basicConstSet; break;
6496
                case WC_NID_subject_alt_name:
6497
                    isSet = x509->subjAltNameSet; break;
6498
                case WC_NID_authority_key_identifier:
6499
                    isSet = x509->authKeyIdSet; break;
6500
                case WC_NID_subject_key_identifier:
6501
                    isSet = x509->subjKeyIdSet; break;
6502
                case WC_NID_key_usage:
6503
                    isSet = x509->keyUsageSet; break;
6504
                case WC_NID_crl_distribution_points:
6505
                    isSet = x509->CRLdistSet; break;
6506
                case WC_NID_ext_key_usage:
6507
                    isSet = ((x509->extKeyUsageSrc) ? 1 : 0); break;
6508
                case WC_NID_info_access:
6509
                    isSet = x509->authInfoSet; break;
6510
            #if defined(WOLFSSL_SEP) || defined(WOLFSSL_QT)
6511
                case WC_NID_certificate_policies:
6512
                    isSet = x509->certPolicySet; break;
6513
            #endif /* WOLFSSL_SEP || WOLFSSL_QT */
6514
                default:
6515
                    WOLFSSL_MSG("NID not in table");
6516
            }
6517
        }
6518
6519
        WOLFSSL_LEAVE("wolfSSL_X509_ext_isSet_by_NID", isSet);
6520
6521
        return isSet;
6522
    }
6523
6524
6525
    int wolfSSL_X509_ext_get_critical_by_NID(WOLFSSL_X509* x509, int nid)
6526
    {
6527
        int crit = 0;
6528
6529
        WOLFSSL_ENTER("wolfSSL_X509_ext_get_critical_by_NID");
6530
6531
        if (x509 != NULL) {
6532
            switch (nid) {
6533
                case WC_NID_basic_constraints:
6534
                    crit = x509->basicConstCrit; break;
6535
                case WC_NID_subject_alt_name:
6536
                    crit = x509->subjAltNameCrit; break;
6537
                case WC_NID_authority_key_identifier:
6538
                    crit = x509->authKeyIdCrit; break;
6539
                case WC_NID_subject_key_identifier:
6540
                    crit = x509->subjKeyIdCrit; break;
6541
                case WC_NID_key_usage:
6542
                    crit = x509->keyUsageCrit; break;
6543
                case WC_NID_crl_distribution_points:
6544
                    crit= x509->CRLdistCrit; break;
6545
                case WC_NID_ext_key_usage:
6546
                    crit= x509->extKeyUsageCrit; break;
6547
            #ifdef WOLFSSL_SEP
6548
                case WC_NID_certificate_policies:
6549
                    crit = x509->certPolicyCrit; break;
6550
            #endif /* WOLFSSL_SEP */
6551
            }
6552
        }
6553
6554
        WOLFSSL_LEAVE("wolfSSL_X509_ext_get_critical_by_NID", crit);
6555
6556
        return crit;
6557
    }
6558
6559
6560
    int wolfSSL_X509_get_isSet_pathLength(WOLFSSL_X509* x509)
6561
    {
6562
        int isSet = 0;
6563
6564
        WOLFSSL_ENTER("wolfSSL_X509_get_isSet_pathLength");
6565
6566
        if (x509 != NULL)
6567
            isSet = x509->basicConstPlSet;
6568
6569
        WOLFSSL_LEAVE("wolfSSL_X509_get_isSet_pathLength", isSet);
6570
6571
        return isSet;
6572
    }
6573
6574
6575
    word32 wolfSSL_X509_get_pathLength(WOLFSSL_X509* x509)
6576
    {
6577
        word32 pathLength = 0;
6578
6579
        WOLFSSL_ENTER("wolfSSL_X509_get_pathLength");
6580
6581
        if (x509 != NULL)
6582
            pathLength = x509->pathLength;
6583
6584
        WOLFSSL_LEAVE("wolfSSL_X509_get_pathLength", pathLength);
6585
6586
        return pathLength;
6587
    }
6588
6589
6590
    unsigned int wolfSSL_X509_get_keyUsage(WOLFSSL_X509* x509)
6591
    {
6592
        word16 usage = 0;
6593
6594
        WOLFSSL_ENTER("wolfSSL_X509_get_keyUsage");
6595
6596
        if (x509 != NULL)
6597
            usage = x509->keyUsage;
6598
6599
        WOLFSSL_LEAVE("wolfSSL_X509_get_keyUsage", usage);
6600
6601
        return usage;
6602
    }
6603
6604
6605
    byte* wolfSSL_X509_get_authorityKeyID(WOLFSSL_X509* x509,
6606
                                          byte* dst, int* dstLen)
6607
    {
6608
        byte *id = NULL;
6609
        int copySz = 0;
6610
6611
        WOLFSSL_ENTER("wolfSSL_X509_get_authorityKeyID");
6612
6613
        if (x509 != NULL) {
6614
            if (x509->authKeyIdSet) {
6615
                copySz = (int)min(dstLen != NULL ? (word32)*dstLen : 0,
6616
                                  x509->authKeyIdSz);
6617
                id = x509->authKeyId;
6618
            }
6619
6620
            if (dst != NULL && dstLen != NULL && id != NULL && copySz > 0) {
6621
                XMEMCPY(dst, id, copySz);
6622
                id = dst;
6623
                *dstLen = copySz;
6624
            }
6625
        }
6626
6627
        WOLFSSL_LEAVE("wolfSSL_X509_get_authorityKeyID", copySz);
6628
6629
        return id;
6630
    }
6631
6632
    byte* wolfSSL_X509_get_subjectKeyID(WOLFSSL_X509* x509,
6633
                                        byte* dst, int* dstLen)
6634
    {
6635
        byte *id = NULL;
6636
        int copySz = 0;
6637
6638
        WOLFSSL_ENTER("wolfSSL_X509_get_subjectKeyID");
6639
6640
        if (x509 != NULL) {
6641
            if (x509->subjKeyIdSet) {
6642
                copySz = (int)min(dstLen != NULL ? (word32) *dstLen : 0,
6643
                                  x509->subjKeyIdSz);
6644
                id = x509->subjKeyId;
6645
            }
6646
6647
            if (dst != NULL && dstLen != NULL && id != NULL && copySz > 0) {
6648
                XMEMCPY(dst, id, copySz);
6649
                id = dst;
6650
                *dstLen = copySz;
6651
            }
6652
        }
6653
6654
        WOLFSSL_LEAVE("wolfSSL_X509_get_subjectKeyID", copySz);
6655
6656
        return id;
6657
    }
6658
6659
    const WOLFSSL_ASN1_STRING *wolfSSL_X509_get0_subject_key_id(
6660
            WOLFSSL_X509 *x509)
6661
    {
6662
        WOLFSSL_ASN1_STRING* ret = NULL;
6663
6664
        WOLFSSL_ENTER("wolfSSL_X509_get0_subject_key_id");
6665
6666
        if (x509 != NULL && x509->subjKeyIdSet) {
6667
            if (x509->subjKeyIdStr == NULL) {
6668
                x509->subjKeyIdStr = wolfSSL_ASN1_STRING_new();
6669
                if (x509->subjKeyIdStr != NULL) {
6670
                    if (wolfSSL_ASN1_STRING_set(x509->subjKeyIdStr,
6671
                            x509->subjKeyId, x509->subjKeyIdSz) == 1) {
6672
                    }
6673
                    else {
6674
                        wolfSSL_ASN1_STRING_free(x509->subjKeyIdStr);
6675
                        x509->subjKeyIdStr = NULL;
6676
                    }
6677
                }
6678
            }
6679
            ret = x509->subjKeyIdStr;
6680
        }
6681
6682
        WOLFSSL_LEAVE("wolfSSL_X509_get0_subject_key_id", ret != NULL);
6683
6684
        return ret;
6685
    }
6686
#endif /* OPENSSL_EXTRA */
6687
6688
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
6689
    defined(OPENSSL_EXTRA_X509_SMALL)
6690
6691
    /* Looks up the index of the first entry encountered with matching NID
6692
     * The search starts from index 'pos'
6693
     * returns a negative value on failure and positive index value on success*/
6694
    int wolfSSL_X509_NAME_get_index_by_NID(WOLFSSL_X509_NAME* name,
6695
                                          int nid, int pos)
6696
    {
6697
        int value = nid, i;
6698
6699
        WOLFSSL_ENTER("wolfSSL_X509_NAME_get_index_by_NID");
6700
6701
        if (name == NULL) {
6702
            return BAD_FUNC_ARG;
6703
        }
6704
6705
        i = pos + 1; /* start search after index passed in */
6706
        if (i < 0) {
6707
            i = 0;
6708
        }
6709
6710
        for (;i < name->entrySz && i < MAX_NAME_ENTRIES; i++) {
6711
            if (name->entry[i].nid == value) {
6712
                return i;
6713
            }
6714
        }
6715
        return WOLFSSL_FATAL_ERROR;
6716
    }
6717
6718
6719
    WOLFSSL_ASN1_STRING*  wolfSSL_X509_NAME_ENTRY_get_data(
6720
                                                    WOLFSSL_X509_NAME_ENTRY* in)
6721
    {
6722
        WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_get_data");
6723
        if (in == NULL)
6724
            return NULL;
6725
6726
        return in->value;
6727
    }
6728
6729
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
6730
6731
#ifdef OPENSSL_EXTRA
6732
#ifndef NO_BIO
6733
6734
#ifndef MAX_WIDTH
6735
    #define MAX_WIDTH 80
6736
#endif
6737
6738
#define ACERT_NUM_DIR_TAGS 4
6739
6740
/* Convenience struct and function for printing the Holder sub fields
6741
 * of an X509 Attribute struct. */
6742
struct acert_dir_print_t {
6743
    const char * pfx;
6744
    const byte   tag[3];
6745
};
6746
6747
static struct acert_dir_print_t acert_dir_print[ACERT_NUM_DIR_TAGS] =
6748
{
6749
    { "C=", {0x55, 0x04, ASN_COUNTRY_NAME} },
6750
    { "O=", {0x55, 0x04, ASN_ORG_NAME} },
6751
    { "OU=", {0x55, 0x04, ASN_ORGUNIT_NAME} },
6752
    { "CN=", {0x55, 0x04, ASN_COMMON_NAME} },
6753
};
6754
6755
/* Print an entry of ASN_DIR_TYPE into dst of length max_len.
6756
 *
6757
 * Returns total_len of str on success.
6758
 * Returns < 0 on failure.
6759
 * */
6760
static int X509PrintDirType(char * dst, int max_len, const DNS_entry * entry)
6761
{
6762
    word32       k = 0;
6763
    word32       i = 0;
6764
    const char * src = entry->name;
6765
    word32       src_len = (word32)XSTRLEN(src);
6766
    int          total_len = 0;
6767
    int          bytes_left = max_len;
6768
    int          fld_len = 0;
6769
    int          match_found = 0;
6770
6771
    XMEMSET(dst, 0, max_len);
6772
6773
    /* loop over printable DIR tags. */
6774
    for (k = 0; k < ACERT_NUM_DIR_TAGS; ++k) {
6775
        const char * pfx = acert_dir_print[k].pfx;
6776
        const byte * tag = acert_dir_print[k].tag;
6777
        byte         asn_tag;
6778
6779
        /* walk through entry looking for matches. */
6780
        for (i = 0; i < src_len - 5; ++i) {
6781
            if (XMEMCMP(tag, &src[i], 3) == 0) {
6782
                if (bytes_left < 5) {
6783
                    /* Not enough space left for name oid + tag + len. */
6784
                    break;
6785
                }
6786
6787
                if (match_found) {
6788
                    /* append a {',', ' '} before doing anything else. */
6789
                    *dst++ = ',';
6790
                    *dst++ = ' ';
6791
                    total_len += 2;
6792
                    bytes_left -= 2;
6793
                }
6794
6795
                i += 3;
6796
6797
                /* Get the ASN Tag. */
6798
                if (GetASNTag((const byte *)src, &i, &asn_tag, src_len) < 0) {
6799
                    WOLFSSL_MSG("error: GetASNTag failed");
6800
                    break;
6801
                }
6802
6803
                /* Check it is printable. */
6804
                if ((asn_tag != ASN_PRINTABLE_STRING) &&
6805
                    (asn_tag != ASN_IA5_STRING) &&
6806
                    (asn_tag != ASN_UTF8STRING)) {
6807
                    /* Don't know what this is but we can't print it. */
6808
                    WOLFSSL_MSG("error: asn tag not printable string");
6809
                    break;
6810
                }
6811
6812
                /* Now get the length of the printable string. */
6813
                if (GetLength((const byte *)src, &i, &fld_len, src_len) < 0) {
6814
                    break;
6815
                }
6816
6817
                /* Make sure we have space to fit it. */
6818
                if ((int) XSTRLEN(pfx) > bytes_left) {
6819
                    /* Not enough space left. */
6820
                    break;
6821
                }
6822
6823
                /* Copy it in, decrement available space. */
6824
                XSTRNCPY(dst, pfx, bytes_left);
6825
                dst += XSTRLEN(pfx);
6826
                total_len += (int)XSTRLEN(pfx);
6827
                bytes_left -= (int)XSTRLEN(pfx);
6828
6829
                if (fld_len > bytes_left) {
6830
                    /* Not enough space left. */
6831
                    break;
6832
                }
6833
6834
                XMEMCPY(dst, &src[i], fld_len);
6835
                i += fld_len;
6836
                dst += fld_len;
6837
                total_len += fld_len;
6838
                bytes_left -= fld_len;
6839
6840
                match_found = 1;
6841
            }
6842
        }
6843
    }
6844
6845
    return total_len;
6846
}
6847
static int X509_print_name_entry(WOLFSSL_BIO* bio,
6848
                                 const DNS_entry* entry, int indent)
6849
{
6850
    int  ret = WOLFSSL_SUCCESS;
6851
    int  nameCount = 0;
6852
    char scratch[MAX_WIDTH];
6853
    int  len;
6854
6855
    if (bio == NULL || entry == NULL) {
6856
        return WOLFSSL_FAILURE;
6857
    }
6858
6859
    len = XSNPRINTF(scratch, MAX_WIDTH, "%*s", indent, "");
6860
    if (len >= MAX_WIDTH) {
6861
        return WOLFSSL_FAILURE;
6862
    }
6863
6864
    if (wolfSSL_BIO_write(bio, scratch, (int)XSTRLEN(scratch)) <= 0) {
6865
        return WOLFSSL_FAILURE;
6866
    }
6867
6868
    while (entry != NULL) {
6869
        ++nameCount;
6870
        if (nameCount > 1) {
6871
            if (wolfSSL_BIO_write(bio, ", ", 2) <= 0) {
6872
                ret = WOLFSSL_FAILURE;
6873
                break;
6874
            }
6875
        }
6876
6877
        if (entry->type == ASN_DNS_TYPE) {
6878
            len = XSNPRINTF(scratch, MAX_WIDTH, "DNS:%s", entry->name);
6879
        }
6880
    #if defined(OPENSSL_ALL) || defined(WOLFSSL_IP_ALT_NAME)
6881
        else if (entry->type == ASN_IP_TYPE) {
6882
            len = XSNPRINTF(scratch, MAX_WIDTH, "IP Address:%s",
6883
                    entry->ipString);
6884
        }
6885
    #endif /* OPENSSL_ALL || WOLFSSL_IP_ALT_NAME */
6886
        else if (entry->type == ASN_RFC822_TYPE) {
6887
            len = XSNPRINTF(scratch, MAX_WIDTH, "email:%s",
6888
                    entry->name);
6889
        }
6890
        else if (entry->type == ASN_DIR_TYPE) {
6891
            len = X509PrintDirType(scratch, MAX_WIDTH, entry);
6892
        }
6893
        else if (entry->type == ASN_URI_TYPE) {
6894
            len = XSNPRINTF(scratch, MAX_WIDTH, "URI:%s",
6895
                entry->name);
6896
        }
6897
    #if defined(OPENSSL_ALL)
6898
        else if (entry->type == ASN_RID_TYPE) {
6899
            len = XSNPRINTF(scratch, MAX_WIDTH, "Registered ID:%s",
6900
                entry->ridString);
6901
        }
6902
    #endif
6903
        else if (entry->type == ASN_OTHER_TYPE) {
6904
            len = XSNPRINTF(scratch, MAX_WIDTH,
6905
                "othername <unsupported>");
6906
        }
6907
        else {
6908
            WOLFSSL_MSG("Bad alt name type.");
6909
            ret = WOLFSSL_FAILURE;
6910
            break;
6911
        }
6912
        if (len >= MAX_WIDTH) {
6913
            ret = WOLFSSL_FAILURE;
6914
            break;
6915
        }
6916
        if (wolfSSL_BIO_write(bio, scratch, (int)XSTRLEN(scratch))
6917
                <= 0) {
6918
            ret = WOLFSSL_FAILURE;
6919
            break;
6920
        }
6921
6922
        entry = entry->next;
6923
    }
6924
6925
    if (ret == WOLFSSL_SUCCESS && wolfSSL_BIO_write(bio, "\n", 1) <= 0) {
6926
        ret = WOLFSSL_FAILURE;
6927
    }
6928
6929
    return ret;
6930
}
6931
6932
#ifdef XSNPRINTF
6933
static int X509PrintKeyUsage(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int indent)
6934
{
6935
    int ret = WOLFSSL_SUCCESS;
6936
    const int usages[] = {
6937
        KEYUSE_DIGITAL_SIG,
6938
        KEYUSE_CONTENT_COMMIT,
6939
        KEYUSE_KEY_ENCIPHER,
6940
        KEYUSE_DATA_ENCIPHER,
6941
        KEYUSE_KEY_AGREE,
6942
        KEYUSE_KEY_CERT_SIGN,
6943
        KEYUSE_CRL_SIGN,
6944
        KEYUSE_ENCIPHER_ONLY,
6945
        KEYUSE_DECIPHER_ONLY
6946
    };
6947
    const char* usageStrs[] = {
6948
        "Digital Signature",
6949
        "Non Repudiation",
6950
        "Key Encipherment",
6951
        "Data Encipherment",
6952
        "Key Agreement",
6953
        "Certificate Sign",
6954
        "CRL Sign",
6955
        "Encipher Only",
6956
        "Decipher Only"
6957
    };
6958
6959
    if (indent < 0) indent = 0;
6960
    if (indent > MAX_INDENT) indent = MAX_INDENT;
6961
6962
    if (bio == NULL || x509 == NULL) {
6963
        ret = WOLFSSL_FAILURE;
6964
    }
6965
6966
    if (ret == WOLFSSL_SUCCESS && x509->keyUsageSet && x509->keyUsage != 0) {
6967
        char scratch[MAX_WIDTH];
6968
        int len;
6969
        word32 i = 0;
6970
        int usageCount = 0;
6971
6972
        len = XSNPRINTF(scratch, MAX_WIDTH, "%*s", indent, "");
6973
        if (len >= MAX_WIDTH)
6974
            ret = WOLFSSL_FAILURE;
6975
        if (ret == WOLFSSL_SUCCESS) {
6976
            if (wolfSSL_BIO_write(bio, scratch, (int)XSTRLEN(scratch)) <= 0) {
6977
                ret = WOLFSSL_FAILURE;
6978
            }
6979
        }
6980
        for (; ret == WOLFSSL_SUCCESS && i < sizeof(usages) / sizeof(usages[i]);
6981
             i++) {
6982
            if (x509->keyUsage & usages[i]) {
6983
                ++usageCount;
6984
                if (usageCount > 1 && wolfSSL_BIO_write(bio, ", ", 2) <= 0) {
6985
                    ret = WOLFSSL_FAILURE;
6986
                    break;
6987
                }
6988
                if (wolfSSL_BIO_write(bio, usageStrs[i],
6989
                                      (int)XSTRLEN(usageStrs[i])) <= 0) {
6990
                    ret = WOLFSSL_FAILURE;
6991
                    break;
6992
                }
6993
            }
6994
        }
6995
        if (ret == WOLFSSL_SUCCESS && wolfSSL_BIO_write(bio, "\n", 1) <= 0) {
6996
            ret = WOLFSSL_FAILURE;
6997
        }
6998
    }
6999
7000
    return ret;
7001
}
7002
7003
static int X509PrintExtendedKeyUsage(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
7004
        int indent)
7005
{
7006
    int ret = WOLFSSL_SUCCESS;
7007
    const int usages[] = {
7008
        EXTKEYUSE_OCSP_SIGN,
7009
        EXTKEYUSE_TIMESTAMP,
7010
        EXTKEYUSE_EMAILPROT,
7011
        EXTKEYUSE_CODESIGN,
7012
        EXTKEYUSE_CLIENT_AUTH,
7013
        EXTKEYUSE_SERVER_AUTH
7014
    };
7015
    const char* usageStrs[] = {
7016
        "OCSP Signing",
7017
        "Time Stamping",
7018
        "E-mail Protection",
7019
        "Code Signing",
7020
        "TLS Web Client Authentication",
7021
        "TLS Web Server Authentication"
7022
    };
7023
7024
    if (bio == NULL || x509 == NULL) {
7025
        ret = WOLFSSL_FAILURE;
7026
    }
7027
7028
    if (ret == WOLFSSL_SUCCESS && x509->extKeyUsageCount > 0
7029
            && x509->extKeyUsage != 0) {
7030
        char scratch[MAX_WIDTH];
7031
        int len;
7032
        word32 i = 0;
7033
        int usageCount = 0;
7034
7035
        len = XSNPRINTF(scratch, MAX_WIDTH, "%*s", indent, "");
7036
        if (len >= MAX_WIDTH)
7037
            ret = WOLFSSL_FAILURE;
7038
        if (ret == WOLFSSL_SUCCESS) {
7039
            if (wolfSSL_BIO_write(bio, scratch, (int)XSTRLEN(scratch)) <= 0) {
7040
                ret = WOLFSSL_FAILURE;
7041
            }
7042
        }
7043
        for (; ret == WOLFSSL_SUCCESS && i < sizeof(usages) / sizeof(usages[i]);
7044
             i++) {
7045
            if (x509->extKeyUsage & usages[i]) {
7046
                ++usageCount;
7047
                if (usageCount > 1 && wolfSSL_BIO_write(bio, ", ", 2) <= 0) {
7048
                    ret = WOLFSSL_FAILURE;
7049
                    break;
7050
                }
7051
                if (wolfSSL_BIO_write(bio, usageStrs[i],
7052
                                      (int)XSTRLEN(usageStrs[i])) <= 0) {
7053
                    ret = WOLFSSL_FAILURE;
7054
                    break;
7055
                }
7056
            }
7057
        }
7058
        if (ret == WOLFSSL_SUCCESS && wolfSSL_BIO_write(bio, "\n", 1) <= 0) {
7059
            ret = WOLFSSL_FAILURE;
7060
        }
7061
    }
7062
7063
    return ret;
7064
}
7065
7066
7067
/* print serial number out
7068
 * return WOLFSSL_SUCCESS on success
7069
 */
7070
static int X509PrintSerial_ex(WOLFSSL_BIO* bio, byte* serial, int sz,
7071
        int delimiter, int indent)
7072
{
7073
    char scratch[MAX_WIDTH];
7074
    const int scratchSz = sizeof(scratch);
7075
    int scratchLen;
7076
7077
    if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*sSerial Number:",
7078
                                 indent, "")) >= MAX_WIDTH) {
7079
        WOLFSSL_MSG("buffer overrun");
7080
        return WOLFSSL_FAILURE;
7081
    }
7082
    if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7083
        return WOLFSSL_FAILURE;
7084
    }
7085
7086
    if (sz > (int)sizeof(byte)) {
7087
        int i;
7088
7089
        /* serial is larger than int size so print off hex values */
7090
        if ((scratchLen = XSNPRINTF(
7091
                 scratch, MAX_WIDTH, "\n%*s", indent + 4, ""))
7092
                >= MAX_WIDTH) {
7093
            WOLFSSL_MSG("buffer overrun");
7094
            return WOLFSSL_FAILURE;
7095
        }
7096
        for (i = 0; i < sz; i++) {
7097
            int valLen;
7098
7099
            if ((valLen = XSNPRINTF(
7100
                     scratch + scratchLen, scratchSz - scratchLen,
7101
                     "%02x%s", serial[i], (i < sz - 1) ?
7102
                     (delimiter ? ":" : "") : "\n"))
7103
                >= scratchSz - scratchLen) {
7104
                WOLFSSL_MSG("buffer overrun");
7105
                return WOLFSSL_FAILURE;
7106
            }
7107
            scratchLen += valLen;
7108
        }
7109
        if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7110
            return WOLFSSL_FAILURE;
7111
        }
7112
    }
7113
7114
    /* if serial can fit into byte then print on the same line */
7115
    else  {
7116
        if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, " %d (0x%x)\n",
7117
                (char)serial[0], serial[0])) >= MAX_WIDTH) {
7118
            WOLFSSL_MSG("buffer overrun");
7119
            return WOLFSSL_FAILURE;
7120
        }
7121
        if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7122
            return WOLFSSL_FAILURE;
7123
        }
7124
    }
7125
    return WOLFSSL_SUCCESS;
7126
}
7127
7128
static int X509PrintSerial(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int indent)
7129
{
7130
    unsigned char serial[32];
7131
    int  sz = sizeof(serial);
7132
7133
    if (indent < 0) indent = 0;
7134
    if (indent > MAX_INDENT) indent = MAX_INDENT;
7135
7136
    XMEMSET(serial, 0, sz);
7137
    if (wolfSSL_X509_get_serial_number(x509, serial, &sz) == WOLFSSL_SUCCESS) {
7138
        X509PrintSerial_ex(bio, serial, sz, 1, indent);
7139
    }
7140
    return WOLFSSL_SUCCESS;
7141
}
7142
7143
#ifndef NO_ASN_TIME
7144
static int X509PrintValidity(WOLFSSL_BIO* bio, WOLFSSL_ASN1_TIME * notBefore,
7145
                             WOLFSSL_ASN1_TIME * notAfter, int indent)
7146
{
7147
    char tmp[80];
7148
    (void) indent;
7149
7150
    if (wolfSSL_BIO_write(bio, "        Validity\n",
7151
                  (int)XSTRLEN("        Validity\n")) <= 0) {
7152
        return WOLFSSL_FAILURE;
7153
    }
7154
7155
    if (wolfSSL_BIO_write(bio, "            Not Before: ",
7156
                  (int)XSTRLEN("            Not Before: ")) <= 0) {
7157
        return WOLFSSL_FAILURE;
7158
    }
7159
    if (notBefore->length > 0) {
7160
        if (GetTimeString(notBefore->data, ASN_UTC_TIME,
7161
            tmp, sizeof(tmp), notBefore->length) != WOLFSSL_SUCCESS) {
7162
            if (GetTimeString(notBefore->data, ASN_GENERALIZED_TIME,
7163
            tmp, sizeof(tmp), notBefore->length) != WOLFSSL_SUCCESS) {
7164
                WOLFSSL_MSG("Error getting not before date");
7165
                return WOLFSSL_FAILURE;
7166
            }
7167
        }
7168
    }
7169
    else {
7170
        XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
7171
    }
7172
    tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
7173
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
7174
        return WOLFSSL_FAILURE;
7175
    }
7176
7177
    if (wolfSSL_BIO_write(bio, "\n            Not After : ",
7178
                  (int)XSTRLEN("\n            Not After : ")) <= 0) {
7179
        return WOLFSSL_FAILURE;
7180
    }
7181
    if (notAfter->length > 0) {
7182
        if (GetTimeString(notAfter->data, ASN_UTC_TIME,
7183
            tmp, sizeof(tmp), notAfter->length) != WOLFSSL_SUCCESS) {
7184
            if (GetTimeString(notAfter->data, ASN_GENERALIZED_TIME,
7185
                tmp, sizeof(tmp), notAfter->length) != WOLFSSL_SUCCESS) {
7186
                WOLFSSL_MSG("Error getting not after date");
7187
                return WOLFSSL_FAILURE;
7188
            }
7189
        }
7190
    }
7191
    else {
7192
        XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
7193
    }
7194
    tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
7195
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
7196
        return WOLFSSL_FAILURE;
7197
    }
7198
7199
    if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
7200
        return WOLFSSL_FAILURE;
7201
    }
7202
7203
    return WOLFSSL_SUCCESS;
7204
}
7205
#endif /* ifndef NO_ASN_TIME */
7206
7207
static int X509PrintSubjAltName(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
7208
                                int indent)
7209
{
7210
    if (!x509 || !x509->altNames || !x509->subjAltNameSet)
7211
        return WOLFSSL_FAILURE;
7212
    return X509_print_name_entry(bio, x509->altNames, indent);
7213
}
7214
7215
/* iterate through certificate extensions printing them out in human readable
7216
 * form
7217
 * return WOLFSSL_SUCCESS on success
7218
 */
7219
static int X509PrintExtensions(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int indent)
7220
{
7221
    int  ret = WOLFSSL_SUCCESS;
7222
    char scratch[MAX_WIDTH];
7223
    const int scratchSz = sizeof(scratch);
7224
    int scratchLen;
7225
    int  count, i;
7226
    char* buf = NULL;
7227
7228
    if (indent < 0) indent = 0;
7229
    if (indent > MAX_INDENT) indent = MAX_INDENT;
7230
7231
    count = wolfSSL_X509_get_ext_count(x509);
7232
    if (count <= 0)
7233
        return WOLFSSL_SUCCESS;
7234
7235
#ifdef WOLFSSL_CERT_REQ
7236
    if (x509->isCSR) {
7237
        if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*s%s\n", indent, "",
7238
                      "Requested extensions:")) >= MAX_WIDTH) {
7239
            return WOLFSSL_FAILURE;
7240
        }
7241
    }
7242
    else
7243
#endif
7244
    {
7245
        if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*s%s\n", indent, "",
7246
                                     "X509v3 extensions:")) >= MAX_WIDTH) {
7247
            return WOLFSSL_FAILURE;
7248
        }
7249
    }
7250
    if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7251
        return WOLFSSL_FAILURE;
7252
    }
7253
7254
    buf = (char*)XMALLOC(MAX_WIDTH, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
7255
    if (buf == NULL) {
7256
        return WOLFSSL_FAILURE;
7257
    }
7258
7259
    for (i = 0; (i < count) && (ret != WC_NO_ERR_TRACE(WOLFSSL_FAILURE)); i++) {
7260
        WOLFSSL_X509_EXTENSION* ext;
7261
7262
        ext = wolfSSL_X509_get_ext(x509, i);
7263
        if (ext != NULL) {
7264
            WOLFSSL_ASN1_OBJECT* obj;
7265
            int nid;
7266
            char val[6];
7267
            int valLen;
7268
            word32 j;
7269
7270
            obj = wolfSSL_X509_EXTENSION_get_object(ext);
7271
            if (obj == NULL) {
7272
                ret = WOLFSSL_FAILURE;
7273
                break;
7274
            }
7275
            if (wolfSSL_OBJ_obj2txt(buf, MAX_WIDTH, obj, 0)
7276
                == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
7277
            {
7278
                ret = WOLFSSL_FAILURE;
7279
                break;
7280
            }
7281
            if ((scratchLen = XSNPRINTF(
7282
                     scratch, MAX_WIDTH, "%*s%s%s\n", indent + 4, "",
7283
                     buf,
7284
                     (wolfSSL_X509_EXTENSION_get_critical(ext)
7285
                      ? ": critical"
7286
                      : ": ")))
7287
                >= MAX_WIDTH)
7288
            {
7289
                ret = WOLFSSL_FAILURE;
7290
                break;
7291
            }
7292
7293
            if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7294
                ret = WOLFSSL_FAILURE;
7295
                break;
7296
            }
7297
            nid = wolfSSL_OBJ_obj2nid(obj);
7298
            switch (nid) {
7299
            case WC_NID_subject_alt_name:
7300
                ret = X509PrintSubjAltName(bio, x509, indent + 8);
7301
                break;
7302
7303
            case WC_NID_subject_key_identifier:
7304
                if (!x509->subjKeyIdSet || x509->subjKeyId == NULL ||
7305
                    x509->subjKeyIdSz == 0)
7306
                {
7307
                    ret = WOLFSSL_FAILURE;
7308
                    break;
7309
                }
7310
7311
                if ((scratchLen = XSNPRINTF(
7312
                         scratch, scratchSz,
7313
                         "%*s", indent + 8, "")) >= scratchSz)
7314
                {
7315
                    ret = WOLFSSL_FAILURE;
7316
                    break;
7317
                }
7318
                for (j = 0; j < x509->subjKeyIdSz; j++) {
7319
                    if ((valLen = XSNPRINTF(
7320
                             val, sizeof(val), "%02X%s",
7321
                             x509->subjKeyId[j],
7322
                             (j < x509->subjKeyIdSz - 1) ? ":" : "\n"))
7323
                        >= (int)sizeof(val))
7324
                    {
7325
                        ret = WOLFSSL_FAILURE;
7326
                        break;
7327
                    }
7328
                    if (scratchLen + valLen >= scratchSz) {
7329
                        if (wolfSSL_BIO_write(bio, scratch,
7330
                                              scratchLen) <= 0) {
7331
                            ret = WOLFSSL_FAILURE;
7332
                            break;
7333
                        }
7334
                        scratchLen = 0;
7335
                    }
7336
                    XMEMCPY(scratch + scratchLen, val, valLen);
7337
                    scratchLen += valLen;
7338
                }
7339
                if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
7340
                    break;
7341
                if (wolfSSL_BIO_write(bio, scratch,
7342
                                      scratchLen) <= 0) {
7343
                    ret = WOLFSSL_FAILURE;
7344
                    break;
7345
                }
7346
                break;
7347
7348
            case WC_NID_authority_key_identifier:
7349
                if (!x509->authKeyIdSet || x509->authKeyId == NULL ||
7350
                    x509->authKeyIdSz == 0) {
7351
                    ret = WOLFSSL_FAILURE;
7352
                    break;
7353
                }
7354
7355
                if ((scratchLen = XSNPRINTF(
7356
                         scratch, scratchSz, "%*s%s",
7357
                         indent + 8, "", "keyid:")) >= scratchSz)
7358
                {
7359
                    ret = WOLFSSL_FAILURE;
7360
                    break;
7361
                }
7362
                for (j = 0; j < x509->authKeyIdSz; j++) {
7363
                    if ((valLen = XSNPRINTF(
7364
                             val, sizeof(val), "%02X%s",
7365
                             x509->authKeyId[j],
7366
                             (j < x509->authKeyIdSz - 1) ? ":" : "\n\n"))
7367
                        >= (int)sizeof(val))
7368
                    {
7369
                        ret = WOLFSSL_FAILURE;
7370
                        break;
7371
                    }
7372
                    if (scratchLen >= scratchSz - valLen) {
7373
                        if (wolfSSL_BIO_write(bio, scratch,
7374
                                              scratchLen) <= 0)
7375
                        {
7376
                            ret = WOLFSSL_FAILURE;
7377
                            break;
7378
                        }
7379
                        scratchLen = 0;
7380
                    }
7381
                    if (scratchLen + valLen >= scratchSz) {
7382
                        ret = WOLFSSL_FAILURE;
7383
                        break;
7384
                    }
7385
                    XMEMCPY(scratch + scratchLen, val, valLen);
7386
                    scratchLen += valLen;
7387
                }
7388
                if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
7389
                    break;
7390
                if (wolfSSL_BIO_write(bio, scratch,
7391
                                      scratchLen) <= 0) {
7392
                    ret = WOLFSSL_FAILURE;
7393
                    break;
7394
                }
7395
                break;
7396
7397
            case WC_NID_basic_constraints:
7398
                if (!x509->basicConstSet) {
7399
                    ret = WOLFSSL_FAILURE;
7400
                    break;
7401
                }
7402
                if ((scratchLen = XSNPRINTF(
7403
                         scratch, scratchSz,
7404
                         "%*sCA:%s\n",
7405
                         indent + 8, "", (x509->isCa)? "TRUE": "FALSE"))
7406
                    >= scratchSz)
7407
                {
7408
                    ret = WOLFSSL_FAILURE;
7409
                    break;
7410
                }
7411
                if (wolfSSL_BIO_write(bio, scratch,
7412
                                      scratchLen) <= 0) {
7413
                    ret = WOLFSSL_FAILURE;
7414
                    break;
7415
                }
7416
                break;
7417
7418
            case WC_NID_key_usage:
7419
                ret = X509PrintKeyUsage(bio, x509, indent + 8);
7420
                break;
7421
7422
            case WC_NID_ext_key_usage:
7423
                ret = X509PrintExtendedKeyUsage(bio, x509, indent + 8);
7424
                break;
7425
7426
            default:
7427
                /* extension nid not yet supported */
7428
                if ((scratchLen = XSNPRINTF(
7429
                         scratch, MAX_WIDTH,
7430
                         "%*sNID %d print not yet supported\n",
7431
                         indent + 8, "", nid)) >= MAX_WIDTH)
7432
                {
7433
                    ret = WOLFSSL_FAILURE;
7434
                    break;
7435
                }
7436
7437
                if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7438
                    ret = WOLFSSL_FAILURE;
7439
                    break;
7440
                }
7441
            }
7442
        }
7443
    }
7444
7445
    XFREE(buf, x509->heap, DYNAMIC_TYPE_TMP_BUFFER);
7446
7447
    return ret;
7448
}
7449
7450
7451
/* print out the signature in human readable format for use with
7452
 * wolfSSL_X509_print()
7453
 * return WOLFSSL_SUCCESS on success
7454
 */
7455
static int X509PrintSignature_ex(WOLFSSL_BIO* bio, byte* sig,
7456
        int sigSz, int sigNid, int algOnly, int indent)
7457
{
7458
    char scratch[MAX_WIDTH];
7459
    int scratchLen;
7460
    WOLFSSL_ASN1_OBJECT* obj = NULL;
7461
    int ret = WOLFSSL_SUCCESS;
7462
    char tmp[100];
7463
    int tmpLen = 0;
7464
7465
    if (sigSz <= 0) {
7466
        return WOLFSSL_SUCCESS;
7467
    }
7468
7469
    if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*s%s", indent, "",
7470
                                "Signature Algorithm: ")) >= MAX_WIDTH) {
7471
        ret = WOLFSSL_FAILURE;
7472
    }
7473
7474
    if (ret == WOLFSSL_SUCCESS) {
7475
        if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0)
7476
            ret = WOLFSSL_FAILURE;
7477
    }
7478
7479
    if (ret == WOLFSSL_SUCCESS) {
7480
        obj = wolfSSL_OBJ_nid2obj(sigNid);
7481
        if (obj == NULL)
7482
            ret = WOLFSSL_FAILURE;
7483
    }
7484
    if (ret == WOLFSSL_SUCCESS) {
7485
        if (wolfSSL_OBJ_obj2txt(scratch, MAX_WIDTH, obj, 0)
7486
            == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
7487
        {
7488
            ret = WOLFSSL_FAILURE;
7489
        }
7490
    }
7491
7492
    if (ret == WOLFSSL_SUCCESS) {
7493
        if ((tmpLen = XSNPRINTF(tmp, sizeof(tmp),"%s\n", scratch))
7494
            >= (int)sizeof(tmp))
7495
        {
7496
            ret = WOLFSSL_FAILURE;
7497
        }
7498
    }
7499
    if (ret == WOLFSSL_SUCCESS) {
7500
        if (wolfSSL_BIO_write(bio, tmp, tmpLen) <= 0)
7501
            ret = WOLFSSL_FAILURE;
7502
    }
7503
7504
    /* Leave function if the desired content to print
7505
     * is only the signature algorithm */
7506
    if (algOnly) {
7507
        if (obj != NULL)
7508
            wolfSSL_ASN1_OBJECT_free(obj);
7509
7510
        return ret;
7511
    }
7512
7513
    if (ret == WOLFSSL_SUCCESS) {
7514
        if ((tmpLen = XSNPRINTF(tmp, sizeof(tmp), "%*s", indent + 5, ""))
7515
            >= (int)sizeof(tmp))
7516
        {
7517
            ret = WOLFSSL_FAILURE;
7518
        }
7519
    }
7520
7521
    if (ret == WOLFSSL_SUCCESS) {
7522
        int i;
7523
7524
        for (i = 0; i < sigSz; i++) {
7525
            char val[6];
7526
            int valLen;
7527
7528
            if (i == 0) {
7529
                if ((valLen = XSNPRINTF(val, sizeof(val), "%02x", sig[i]))
7530
                    >= (int)sizeof(val))
7531
                {
7532
                    ret = WOLFSSL_FAILURE;
7533
                    break;
7534
                }
7535
            }
7536
            else if (((i % 18) == 0)) {
7537
                if (wolfSSL_BIO_write(bio, tmp, tmpLen)
7538
                    <= 0) {
7539
                    ret = WOLFSSL_FAILURE;
7540
                    break;
7541
                }
7542
                if ((tmpLen = XSNPRINTF(tmp, sizeof(tmp), ":\n%*s",
7543
                                        indent + 5, ""))
7544
                    >= (int)sizeof(tmp))
7545
                {
7546
                    ret = WOLFSSL_FAILURE;
7547
                    break;
7548
                }
7549
                if ((valLen = XSNPRINTF(val, sizeof(val), "%02x", sig[i]))
7550
                    >= (int)sizeof(val))
7551
                {
7552
                    ret = WOLFSSL_FAILURE;
7553
                    break;
7554
                }
7555
            }
7556
            else {
7557
                if ((valLen = XSNPRINTF(val, sizeof(val), ":%02x", sig[i]))
7558
                    >= (int)sizeof(val))
7559
                {
7560
                    ret = WOLFSSL_FAILURE;
7561
                    break;
7562
                }
7563
            }
7564
            if ((tmpLen < 0) || (valLen < 0) ||
7565
                    (valLen >= ((int)sizeof(tmp) - tmpLen - 1))) {
7566
                ret = WOLFSSL_FAILURE;
7567
                break;
7568
            }
7569
            XMEMCPY(tmp + tmpLen, val, valLen);
7570
            tmpLen += valLen;
7571
            tmp[tmpLen] = 0;
7572
        }
7573
    }
7574
7575
    /* print out remaining sig values */
7576
    if (ret == WOLFSSL_SUCCESS) {
7577
        if (tmpLen > 0) {
7578
            if (wolfSSL_BIO_write(bio, tmp, tmpLen)
7579
                <= 0)
7580
            {
7581
                ret = WOLFSSL_FAILURE;
7582
            }
7583
        }
7584
    }
7585
7586
    if (obj != NULL)
7587
        wolfSSL_ASN1_OBJECT_free(obj);
7588
7589
    return ret;
7590
}
7591
7592
static int X509PrintSignature(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
7593
        int algOnly, int indent)
7594
{
7595
    int sigSz = 0;
7596
    if (wolfSSL_X509_get_signature(x509, NULL, &sigSz) <= 0) {
7597
        return WOLFSSL_FAILURE;
7598
    }
7599
7600
    if (sigSz > 0) {
7601
        unsigned char* sig;
7602
        int sigNid;
7603
7604
        sigNid = wolfSSL_X509_get_signature_nid(x509);
7605
        if (sigNid <= 0) {
7606
            return WOLFSSL_FAILURE;
7607
        }
7608
7609
        sig = (unsigned char*)XMALLOC(sigSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
7610
        if (sig == NULL) {
7611
            return WOLFSSL_FAILURE;
7612
        }
7613
7614
        if (wolfSSL_X509_get_signature(x509, sig, &sigSz) <= 0) {
7615
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
7616
            return WOLFSSL_FAILURE;
7617
        }
7618
7619
        if (X509PrintSignature_ex(bio, sig, sigSz, sigNid, algOnly, indent)
7620
                != WOLFSSL_SUCCESS) {
7621
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
7622
            return WOLFSSL_FAILURE;
7623
        }
7624
7625
        XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
7626
7627
    }
7628
7629
    return WOLFSSL_SUCCESS;
7630
}
7631
7632
7633
/* print out the public key in human readable format for use with
7634
 * wolfSSL_X509_print()
7635
 * return WOLFSSL_SUCCESS on success
7636
 */
7637
static int X509PrintPubKey(WOLFSSL_BIO* bio, WOLFSSL_X509* x509, int indent)
7638
{
7639
    char scratch[MAX_WIDTH];
7640
    WOLFSSL_EVP_PKEY* pubKey;
7641
    int len;
7642
    int ret = WOLFSSL_SUCCESS;
7643
7644
    if (indent < 0) indent = 0;
7645
    if (indent > MAX_INDENT) indent = MAX_INDENT;
7646
7647
    if (bio == NULL || x509 == NULL)
7648
        return BAD_FUNC_ARG;
7649
7650
    len = XSNPRINTF(scratch, MAX_WIDTH, "%*sSubject Public Key Info:\n", indent,
7651
        "");
7652
    if (len >= MAX_WIDTH)
7653
        return WOLFSSL_FAILURE;
7654
    if (wolfSSL_BIO_write(bio, scratch, len) <= 0)
7655
        return WOLFSSL_FAILURE;
7656
7657
    switch (x509->pubKeyOID) {
7658
    #ifndef NO_RSA
7659
        case RSAk:
7660
            len = XSNPRINTF(scratch, MAX_WIDTH,
7661
                    "%*sPublic Key Algorithm: rsaEncryption\n", indent + 4, "");
7662
            if (len >= MAX_WIDTH)
7663
                return WOLFSSL_FAILURE;
7664
            if (wolfSSL_BIO_write(bio, scratch, len) <= 0)
7665
                return WOLFSSL_FAILURE;
7666
            break;
7667
    #endif
7668
    #ifdef HAVE_ECC
7669
        case ECDSAk:
7670
            len = XSNPRINTF(scratch, MAX_WIDTH,
7671
                    "%*sPublic Key Algorithm: EC\n", indent + 4, "");
7672
            if ((len < 0) || (len >= MAX_WIDTH))
7673
                return WOLFSSL_FAILURE;
7674
            if (wolfSSL_BIO_write(bio, scratch, len) <= 0)
7675
                return WOLFSSL_FAILURE;
7676
            break;
7677
    #endif
7678
        default:
7679
                WOLFSSL_MSG("Unknown key type");
7680
                return WOLFSSL_FAILURE;
7681
    }
7682
7683
    pubKey = wolfSSL_X509_get_pubkey(x509);
7684
    if (pubKey == NULL)
7685
        return WOLFSSL_FAILURE;
7686
7687
    ret = wolfSSL_EVP_PKEY_print_public(bio, pubKey, indent + 8, NULL);
7688
7689
    wolfSSL_EVP_PKEY_free(pubKey);
7690
7691
    return ret;
7692
}
7693
7694
7695
/* human readable print out of x509 name formatted for use with
7696
 * wolfSSL_X509_print()
7697
 * return WOLFSSL_SUCCESS on success
7698
 */
7699
static int X509PrintName(WOLFSSL_BIO* bio, WOLFSSL_X509_NAME* name,
7700
        char* type, int indent)
7701
{
7702
    if (name != NULL) {
7703
        char scratch[MAX_WIDTH];
7704
        int scratchLen;
7705
7706
        if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH,
7707
                                     "%*s%s", indent, "", type))
7708
            >= MAX_WIDTH)
7709
        {
7710
            return WOLFSSL_FAILURE;
7711
        }
7712
        if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7713
            return WOLFSSL_FAILURE;
7714
        }
7715
        if (wolfSSL_X509_NAME_print_ex(bio, name, 1, 0) <= 0) {
7716
            return WOLFSSL_FAILURE;
7717
        }
7718
        if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
7719
            return WOLFSSL_FAILURE;
7720
        }
7721
    }
7722
    return WOLFSSL_SUCCESS;
7723
}
7724
7725
7726
/* human readable print out of x509 version
7727
 * return WOLFSSL_SUCCESS on success
7728
 */
7729
static int X509PrintVersion(WOLFSSL_BIO* bio, int version, int indent)
7730
{
7731
    char scratch[MAX_WIDTH];
7732
    int scratchLen;
7733
7734
    if (indent < 0) indent = 0;
7735
    if (indent > MAX_INDENT) indent = MAX_INDENT;
7736
7737
    scratchLen = XSNPRINTF(scratch, MAX_WIDTH, "%*s%s", indent, "", "Version:");
7738
    if ((scratchLen < 0) || (scratchLen >= MAX_WIDTH)) {
7739
        return WOLFSSL_FAILURE;
7740
    }
7741
7742
    if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7743
        return WOLFSSL_FAILURE;
7744
    }
7745
7746
    scratchLen = XSNPRINTF(scratch, MAX_WIDTH, " %d (0x%x)\n",
7747
                    version, (byte)version-1);
7748
    if ((scratchLen < 0) || (scratchLen >= MAX_WIDTH)) {
7749
        return WOLFSSL_FAILURE;
7750
    }
7751
7752
    if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7753
        return WOLFSSL_FAILURE;
7754
    }
7755
    return WOLFSSL_SUCCESS;
7756
}
7757
7758
#ifdef WOLFSSL_CERT_REQ
7759
/* Print out of REQ attributes
7760
 * return WOLFSSL_SUCCESS on success
7761
 */
7762
static int X509PrintReqAttributes(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
7763
        int indent)
7764
{
7765
    WOLFSSL_X509_ATTRIBUTE* attr;
7766
    char scratch[MAX_WIDTH];
7767
    int scratchLen;
7768
    int i = 0;
7769
7770
    if (indent < 0) indent = 0;
7771
    if (indent > MAX_INDENT) indent = MAX_INDENT;
7772
7773
    if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH,
7774
                                 "%*s%s", indent, "", "Attributes: \n"))
7775
        >= MAX_WIDTH)
7776
    {
7777
        return WOLFSSL_FAILURE;
7778
    }
7779
    if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7780
        return WOLFSSL_FAILURE;
7781
    }
7782
    do {
7783
        attr = wolfSSL_X509_REQ_get_attr(x509, i);
7784
        if (attr != NULL) {
7785
            char lName[NAME_SZ/4]; /* NAME_SZ default is 80 */
7786
            int lNameSz = NAME_SZ/4;
7787
            const byte* data;
7788
7789
            if (wolfSSL_OBJ_obj2txt(lName, lNameSz, attr->object, 0)
7790
                == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
7791
            {
7792
                return WOLFSSL_FAILURE;
7793
            }
7794
            lNameSz = (int)XSTRLEN(lName);
7795
            data = wolfSSL_ASN1_STRING_get0_data(
7796
                    attr->value->value.asn1_string);
7797
            if (data == NULL) {
7798
                WOLFSSL_MSG("No REQ attribute found when expected");
7799
                return WOLFSSL_FAILURE;
7800
            }
7801
            if ((scratchLen = XSNPRINTF(scratch, MAX_WIDTH,
7802
                          "%*s%s%*s:%s\n", indent+4, "",
7803
                          lName, (NAME_SZ/4)-lNameSz, "", data))
7804
                >= MAX_WIDTH)
7805
            {
7806
                return WOLFSSL_FAILURE;
7807
            }
7808
            if (wolfSSL_BIO_write(bio, scratch, scratchLen) <= 0) {
7809
                WOLFSSL_MSG("Error writing REQ attribute");
7810
                return WOLFSSL_FAILURE;
7811
            }
7812
        }
7813
        i++;
7814
    } while (attr != NULL);
7815
7816
    return WOLFSSL_SUCCESS;
7817
}
7818
7819
7820
/*
7821
 * return WOLFSSL_SUCCESS on success
7822
 */
7823
int wolfSSL_X509_REQ_print(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
7824
{
7825
    char subjType[] = "Subject: ";
7826
7827
    if (bio == NULL || x509 == NULL) {
7828
        return WOLFSSL_FAILURE;
7829
    }
7830
7831
    if (wolfSSL_BIO_write(bio, "Certificate Request:\n",
7832
                  (int)XSTRLEN("Certificate Request:\n")) <= 0) {
7833
            return WOLFSSL_FAILURE;
7834
    }
7835
7836
    if (wolfSSL_BIO_write(bio, "    Data:\n",
7837
                  (int)XSTRLEN("    Data:\n")) <= 0) {
7838
            return WOLFSSL_FAILURE;
7839
    }
7840
7841
    /* print version of cert.  Note that we increment by 1 because for REQs,
7842
     * the value stored in x509->version is the actual value of the field; not
7843
     * the version. */
7844
    if (X509PrintVersion(bio, (int)wolfSSL_X509_REQ_get_version(x509) + 1, 8)
7845
            != WOLFSSL_SUCCESS) {
7846
        return WOLFSSL_FAILURE;
7847
    }
7848
7849
    if (X509PrintSerial(bio, x509, 8) != WOLFSSL_SUCCESS) {
7850
        return WOLFSSL_FAILURE;
7851
    }
7852
7853
    /* print subject */
7854
    if (X509PrintName(bio, wolfSSL_X509_get_subject_name(x509), subjType, 8)
7855
            != WOLFSSL_SUCCESS) {
7856
        return WOLFSSL_FAILURE;
7857
    }
7858
7859
    /* get and print public key */
7860
    if (X509PrintPubKey(bio, x509, 8) != WOLFSSL_SUCCESS) {
7861
        return WOLFSSL_FAILURE;
7862
    }
7863
7864
    /* print out extensions */
7865
    if (X509PrintExtensions(bio, x509, 4) != WOLFSSL_SUCCESS) {
7866
        return WOLFSSL_FAILURE;
7867
    }
7868
7869
    /* print out req attributes */
7870
    if (X509PrintReqAttributes(bio, x509, 4) != WOLFSSL_SUCCESS) {
7871
        return WOLFSSL_FAILURE;
7872
    }
7873
7874
    /* print out signature */
7875
    if (X509PrintSignature(bio, x509, 0, 4) != WOLFSSL_SUCCESS) {
7876
        return WOLFSSL_FAILURE;
7877
    }
7878
7879
    /* done with print out */
7880
    if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
7881
        return WOLFSSL_FAILURE;
7882
    }
7883
7884
    return WOLFSSL_SUCCESS;
7885
}
7886
#endif /* WOLFSSL_CERT_REQ */
7887
7888
7889
/* Writes the human readable form of x509 to bio.
7890
 *
7891
 * bio  WOLFSSL_BIO to write to.
7892
 * x509 Certificate to write.
7893
 *
7894
 * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on failure
7895
 */
7896
int wolfSSL_X509_print_ex(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
7897
    unsigned long nmflags, unsigned long cflag)
7898
{
7899
    char issuType[] = "Issuer:";
7900
    char subjType[] = "Subject:";
7901
7902
    WOLFSSL_ENTER("wolfSSL_X509_print_ex");
7903
7904
    /* flags currently not supported */
7905
    (void)nmflags;
7906
    (void)cflag;
7907
7908
    if (bio == NULL || x509 == NULL) {
7909
        return WOLFSSL_FAILURE;
7910
    }
7911
7912
    if (wolfSSL_BIO_write(bio, "Certificate:\n",
7913
                  (int)XSTRLEN("Certificate:\n")) <= 0) {
7914
            return WOLFSSL_FAILURE;
7915
    }
7916
7917
    if (wolfSSL_BIO_write(bio, "    Data:\n",
7918
                  (int)XSTRLEN("    Data:\n")) <= 0) {
7919
            return WOLFSSL_FAILURE;
7920
    }
7921
7922
    /* print version of cert */
7923
    if (X509PrintVersion(bio, wolfSSL_X509_version(x509), 8)
7924
            != WOLFSSL_SUCCESS) {
7925
        return WOLFSSL_FAILURE;
7926
    }
7927
7928
    /* print serial number out */
7929
    if (X509PrintSerial(bio, x509, 8) != WOLFSSL_SUCCESS) {
7930
        return WOLFSSL_FAILURE;
7931
    }
7932
7933
    /* print out signature algo*/
7934
    if (X509PrintSignature(bio, x509, 1, 8) != WOLFSSL_SUCCESS) {
7935
        return WOLFSSL_FAILURE;
7936
    }
7937
7938
    /* print issuer */
7939
    if (X509PrintName(bio, wolfSSL_X509_get_issuer_name(x509), issuType, 8)
7940
            != WOLFSSL_SUCCESS) {
7941
        return WOLFSSL_FAILURE;
7942
    }
7943
7944
    #ifndef NO_ASN_TIME
7945
    /* print validity */
7946
    if (X509PrintValidity(bio, &x509->notBefore, &x509->notAfter, 8)
7947
        != WOLFSSL_SUCCESS) {
7948
        return WOLFSSL_FAILURE;
7949
    }
7950
    #endif /* NO_ASN_TIME */
7951
7952
    /* print subject */
7953
    if (X509PrintName(bio, wolfSSL_X509_get_subject_name(x509), subjType, 8)
7954
            != WOLFSSL_SUCCESS) {
7955
        return WOLFSSL_FAILURE;
7956
    }
7957
7958
    /* get and print public key */
7959
    if (X509PrintPubKey(bio, x509, 8) != WOLFSSL_SUCCESS) {
7960
        return WOLFSSL_FAILURE;
7961
    }
7962
7963
    /* print out extensions */
7964
    if (X509PrintExtensions(bio, x509, 8) != WOLFSSL_SUCCESS) {
7965
        return WOLFSSL_FAILURE;
7966
    }
7967
7968
    /* print out signature */
7969
    if (X509PrintSignature(bio, x509, 0, 4) != WOLFSSL_SUCCESS) {
7970
        return WOLFSSL_FAILURE;
7971
    }
7972
7973
    /* done with print out */
7974
    if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
7975
        return WOLFSSL_FAILURE;
7976
    }
7977
7978
    return WOLFSSL_SUCCESS;
7979
}
7980
int wolfSSL_X509_print(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
7981
{
7982
    return wolfSSL_X509_print_ex(bio, x509, 0, 0);
7983
}
7984
7985
#if defined(WOLFSSL_ACERT)
7986
/* Retrieve sig NID from an ACERT.
7987
 *
7988
 * returns  NID on success
7989
 * returns  0 on failure
7990
 */
7991
int wolfSSL_X509_ACERT_get_signature_nid(const WOLFSSL_X509_ACERT *x509)
7992
{
7993
    if (x509 == NULL) {
7994
        return 0;
7995
    }
7996
7997
    return oid2nid((word32)x509->sigOID, oidSigType);
7998
}
7999
8000
static int X509AcertPrintSignature(WOLFSSL_BIO* bio, WOLFSSL_X509_ACERT* x509,
8001
                                   int algOnly, int indent)
8002
{
8003
    int sigSz = 0;
8004
    if (wolfSSL_X509_ACERT_get_signature(x509, NULL, &sigSz) <= 0) {
8005
        return WOLFSSL_FAILURE;
8006
    }
8007
8008
    if (sigSz > 0) {
8009
        unsigned char* sig;
8010
        int sigNid;
8011
8012
        sigNid = wolfSSL_X509_ACERT_get_signature_nid(x509);
8013
        if (sigNid <= 0) {
8014
            return WOLFSSL_FAILURE;
8015
        }
8016
8017
        sig = (unsigned char*)XMALLOC(sigSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8018
        if (sig == NULL) {
8019
            return WOLFSSL_FAILURE;
8020
        }
8021
8022
        if (wolfSSL_X509_ACERT_get_signature(x509, sig, &sigSz) <= 0) {
8023
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8024
            return WOLFSSL_FAILURE;
8025
        }
8026
8027
        if (X509PrintSignature_ex(bio, sig, sigSz, sigNid, algOnly, indent)
8028
                != WOLFSSL_SUCCESS) {
8029
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8030
            return WOLFSSL_FAILURE;
8031
        }
8032
8033
        if (sig != NULL) {
8034
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8035
        }
8036
8037
    }
8038
8039
    return WOLFSSL_SUCCESS;
8040
}
8041
8042
static int X509AcertPrintSerial(WOLFSSL_BIO* bio, WOLFSSL_X509_ACERT* x509,
8043
                                int indent)
8044
{
8045
    unsigned char serial[32];
8046
    int  sz = sizeof(serial);
8047
8048
    XMEMSET(serial, 0, sz);
8049
    if (wolfSSL_X509_ACERT_get_serial_number(x509, serial, &sz)
8050
        == WOLFSSL_SUCCESS) {
8051
        X509PrintSerial_ex(bio, serial, sz, 1, indent);
8052
    }
8053
    return WOLFSSL_SUCCESS;
8054
}
8055
8056
int wolfSSL_X509_ACERT_print(WOLFSSL_BIO* bio, WOLFSSL_X509_ACERT* x509)
8057
{
8058
    const char * hdr =                "Attribute Certificate:\n";
8059
    const char * data_hdr =           "    Data:\n";
8060
    const char * holder_hdr =         "        Holder:\n";
8061
    const char * holder_issuer_hdr =  "            Issuer:";
8062
    const char * holder_name_hdr =    "            Name:";
8063
    const char * attcert_issuer_hdr = "        Issuer:";
8064
8065
    if (bio == NULL || x509 == NULL) {
8066
        return WOLFSSL_FAILURE;
8067
    }
8068
8069
    /* print acert header */
8070
    if (wolfSSL_BIO_write(bio, hdr, (int)XSTRLEN(hdr)) <= 0) {
8071
        return WOLFSSL_FAILURE;
8072
    }
8073
8074
    /* print data header */
8075
    if (wolfSSL_BIO_write(bio, data_hdr, (int)XSTRLEN(data_hdr)) <= 0) {
8076
        return WOLFSSL_FAILURE;
8077
    }
8078
8079
    /* print version of cert */
8080
    if (X509PrintVersion(bio, wolfSSL_X509_ACERT_version(x509), 8)
8081
            != WOLFSSL_SUCCESS) {
8082
        return WOLFSSL_FAILURE;
8083
    }
8084
8085
    /* print serial number out */
8086
    if (X509AcertPrintSerial(bio, x509, 8) != WOLFSSL_SUCCESS) {
8087
        return WOLFSSL_FAILURE;
8088
    }
8089
8090
    /* print holder field */
8091
    if (wolfSSL_BIO_write(bio, holder_hdr, (int)XSTRLEN(holder_hdr)) <= 0) {
8092
        return WOLFSSL_FAILURE;
8093
    }
8094
8095
    if (x509->holderEntityName != NULL) {
8096
        /* print issuer header */
8097
        if (wolfSSL_BIO_write(bio, holder_name_hdr,
8098
            (int)XSTRLEN(holder_name_hdr)) <= 0) {
8099
            return WOLFSSL_FAILURE;
8100
        }
8101
8102
        if (X509_print_name_entry(bio, x509->holderEntityName, 1)
8103
                != WOLFSSL_SUCCESS) {
8104
            return WOLFSSL_FAILURE;
8105
        }
8106
    }
8107
8108
    if (x509->holderIssuerName != NULL) {
8109
        /* print issuer header */
8110
        if (wolfSSL_BIO_write(bio, holder_issuer_hdr,
8111
            (int)XSTRLEN(holder_issuer_hdr)) <= 0) {
8112
            return WOLFSSL_FAILURE;
8113
        }
8114
8115
        if (X509_print_name_entry(bio, x509->holderIssuerName, 1)
8116
            != WOLFSSL_SUCCESS) {
8117
            return WOLFSSL_FAILURE;
8118
        }
8119
    }
8120
8121
    if (x509->holderSerialSz > 0) {
8122
        X509PrintSerial_ex(bio, x509->holderSerial, x509->holderSerialSz,
8123
                           1, 12);
8124
    }
8125
8126
    /* print issuer header */
8127
    if (wolfSSL_BIO_write(bio, attcert_issuer_hdr,
8128
        (int)XSTRLEN(attcert_issuer_hdr)) <= 0) {
8129
        return WOLFSSL_FAILURE;
8130
    }
8131
8132
    if (x509->AttCertIssuerName != NULL) {
8133
        if (X509_print_name_entry(bio, x509->AttCertIssuerName, 1)
8134
                != WOLFSSL_SUCCESS) {
8135
            return WOLFSSL_FAILURE;
8136
        }
8137
    }
8138
    else {
8139
        const char * msg = " Issuer type not supported.\n";
8140
        if (wolfSSL_BIO_write(bio, msg, (int)XSTRLEN(msg)) <= 0) {
8141
            return WOLFSSL_FAILURE;
8142
        }
8143
    }
8144
8145
    #ifndef NO_ASN_TIME
8146
    /* print validity */
8147
    if (X509PrintValidity(bio, &x509->notBefore, &x509->notAfter, 8)
8148
        != WOLFSSL_SUCCESS) {
8149
        return WOLFSSL_FAILURE;
8150
    }
8151
    #endif /* NO_ASN_TIME */
8152
8153
    /* print raw attributes */
8154
    if (x509->rawAttr && x509->rawAttrLen > 0) {
8155
        char attr_hdr[128]; /* buffer for XSNPRINTF */
8156
8157
        if (XSNPRINTF(attr_hdr, 128, "%*s%s: %d bytes\n", 8, "",
8158
                    "Attributes", x509->rawAttrLen) >= 128) {
8159
            return WOLFSSL_FAILURE;
8160
        }
8161
8162
        if (wolfSSL_BIO_write(bio, attr_hdr, (int)XSTRLEN(attr_hdr)) <= 0) {
8163
                return WOLFSSL_FAILURE;
8164
        }
8165
    }
8166
8167
    /* print out sig algo and signature */
8168
    if (X509AcertPrintSignature(bio, x509, 0, 8) != WOLFSSL_SUCCESS) {
8169
        return WOLFSSL_FAILURE;
8170
    }
8171
8172
    /* done with print out */
8173
    if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
8174
        return WOLFSSL_FAILURE;
8175
    }
8176
8177
    return WOLFSSL_SUCCESS;
8178
}
8179
#endif /* WOLFSSL_ACERT */
8180
8181
#ifndef NO_FILESYSTEM
8182
int wolfSSL_X509_print_fp(XFILE fp, WOLFSSL_X509 *x509)
8183
{
8184
    WOLFSSL_BIO* bio;
8185
    int ret;
8186
8187
    WOLFSSL_ENTER("wolfSSL_X509_print_fp");
8188
8189
    if (!fp || !x509) {
8190
        WOLFSSL_MSG("Bad parameter");
8191
        return WOLFSSL_FAILURE;
8192
    }
8193
8194
    if (!(bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file()))) {
8195
        WOLFSSL_MSG("wolfSSL_BIO_new wolfSSL_BIO_s_file error");
8196
        return WOLFSSL_FAILURE;
8197
    }
8198
8199
    if (wolfSSL_BIO_set_fp(bio, fp, WOLFSSL_BIO_NOCLOSE) != WOLFSSL_SUCCESS) {
8200
        WOLFSSL_MSG("wolfSSL_BIO_set_fp error");
8201
        wolfSSL_BIO_free(bio);
8202
        return WOLFSSL_FAILURE;
8203
    }
8204
8205
    ret = wolfSSL_X509_print(bio, x509);
8206
8207
    wolfSSL_BIO_free(bio);
8208
8209
    return ret;
8210
}
8211
#endif /* NO_FILESYSTEM */
8212
8213
#endif /* XSNPRINTF */
8214
8215
int wolfSSL_X509_signature_print(WOLFSSL_BIO *bp,
8216
        const WOLFSSL_X509_ALGOR *sigalg, const WOLFSSL_ASN1_STRING *sig)
8217
{
8218
    int length = 0;
8219
    word32 idx = 0;
8220
    int i;
8221
8222
    (void)sig;
8223
8224
    WOLFSSL_ENTER("wolfSSL_X509_signature_print");
8225
8226
    if (!bp || !sigalg) {
8227
        WOLFSSL_MSG("Bad parameter");
8228
        return WOLFSSL_FAILURE;
8229
    }
8230
8231
    if ((sigalg->algorithm->obj == NULL) ||
8232
        (sigalg->algorithm->obj[idx] != ASN_OBJECT_ID)) {
8233
        WOLFSSL_MSG("Bad ASN1 Object");
8234
        return WOLFSSL_FAILURE;
8235
    }
8236
    idx++; /* skip object id */
8237
8238
    if (GetLength((const byte*)sigalg->algorithm->obj, &idx, &length,
8239
                  sigalg->algorithm->objSz) < 0 || length < 0) {
8240
        return WOLFSSL_FAILURE;
8241
    }
8242
8243
    if (wolfSSL_BIO_puts(bp, "    Raw Signature Algorithm:") <= 0) {
8244
        WOLFSSL_MSG("wolfSSL_BIO_puts error");
8245
        return WOLFSSL_FAILURE;
8246
    }
8247
8248
    for (i = 0; i < length; ++i) {
8249
        char hex_digits[4];
8250
        if (XSNPRINTF(hex_digits, sizeof(hex_digits), "%c%02X", i>0 ? ':' : ' ',
8251
                  (unsigned int)sigalg->algorithm->obj[idx+i])
8252
            >= (int)sizeof(hex_digits))
8253
        {
8254
            WOLFSSL_MSG("buffer overrun");
8255
            return WOLFSSL_FAILURE;
8256
        }
8257
        if (wolfSSL_BIO_puts(bp, hex_digits) <= 0)
8258
            return WOLFSSL_FAILURE;
8259
    }
8260
8261
    if (wolfSSL_BIO_puts(bp, "\n") <= 0)
8262
        return WOLFSSL_FAILURE;
8263
8264
    return WOLFSSL_SUCCESS;
8265
}
8266
#endif /* !NO_BIO */
8267
8268
#ifndef NO_WOLFSSL_STUB
8269
void wolfSSL_X509_get0_signature(const WOLFSSL_ASN1_BIT_STRING **psig,
8270
        const WOLFSSL_X509_ALGOR **palg, const WOLFSSL_X509 *x509)
8271
{
8272
    (void)psig;
8273
    (void)palg;
8274
    (void)x509;
8275
    WOLFSSL_STUB("wolfSSL_X509_get0_signature");
8276
}
8277
#endif
8278
8279
#endif /* OPENSSL_EXTRA */
8280
8281
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
8282
const char* wolfSSL_X509_verify_cert_error_string(long err)
8283
{
8284
    return wolfSSL_ERR_reason_error_string((unsigned long)err);
8285
}
8286
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
8287
8288
#ifdef OPENSSL_EXTRA
8289
8290
/* Add directory path that will be used for loading certs and CRLs
8291
 * which have the <hash>.rn name format.
8292
 * type may be WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1.
8293
 * returns WOLFSSL_SUCCESS on successful, otherwise negative or zero. */
8294
int wolfSSL_X509_LOOKUP_add_dir(WOLFSSL_X509_LOOKUP* lookup, const char* dir,
8295
                               long type)
8296
{
8297
    return wolfSSL_X509_LOOKUP_ctrl(lookup, WOLFSSL_X509_L_ADD_DIR, dir, type,
8298
                                    NULL);
8299
}
8300
8301
int wolfSSL_X509_LOOKUP_load_file(WOLFSSL_X509_LOOKUP* lookup,
8302
                                 const char* file, long type)
8303
{
8304
#if !defined(NO_FILESYSTEM) && \
8305
    (defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM))
8306
    int           ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
8307
    XFILE         fp;
8308
    long          sz;
8309
    byte*         pem = NULL;
8310
    byte*         curr = NULL;
8311
    byte*         prev = NULL;
8312
    const char* header = NULL;
8313
    const char* footer = NULL;
8314
8315
    if (type != WOLFSSL_FILETYPE_PEM)
8316
        return WS_RETURN_CODE(BAD_FUNC_ARG, (int)WOLFSSL_FAILURE);
8317
8318
    fp = XFOPEN(file, "rb");
8319
    if (fp == XBADFILE)
8320
        return WS_RETURN_CODE(BAD_FUNC_ARG, (int)WOLFSSL_FAILURE);
8321
8322
    if (XFSEEK(fp, 0, XSEEK_END) != 0) {
8323
        XFCLOSE(fp);
8324
        return WS_RETURN_CODE(WOLFSSL_BAD_FILE,WOLFSSL_FAILURE);
8325
    }
8326
    sz = XFTELL(fp);
8327
    if (XFSEEK(fp, 0, XSEEK_SET) != 0) {
8328
        XFCLOSE(fp);
8329
        return WS_RETURN_CODE(WOLFSSL_BAD_FILE,WOLFSSL_FAILURE);
8330
    }
8331
8332
    if (sz > MAX_WOLFSSL_FILE_SIZE || sz <= 0) {
8333
        WOLFSSL_MSG("X509_LOOKUP_load_file size error");
8334
        goto end;
8335
    }
8336
8337
    pem = (byte*)XMALLOC(sz, 0, DYNAMIC_TYPE_PEM);
8338
    if (pem == NULL) {
8339
        ret = MEMORY_ERROR;
8340
        goto end;
8341
    }
8342
8343
    /* Read in file which may be CRLs or certificates. */
8344
    if (XFREAD(pem, (size_t)sz, 1, fp) != 1)
8345
        goto end;
8346
8347
    prev = curr = pem;
8348
    do {
8349
        /* get PEM header and footer based on type */
8350
        if (wc_PemGetHeaderFooter(CRL_TYPE, &header, &footer) == 0 &&
8351
                XSTRNSTR((char*)curr, header, (unsigned int)sz) != NULL) {
8352
#ifdef HAVE_CRL
8353
            WOLFSSL_CERT_MANAGER* cm = lookup->store->cm;
8354
8355
            if (cm->crl == NULL) {
8356
                if (wolfSSL_CertManagerEnableCRL(cm, WOLFSSL_CRL_CHECK)
8357
                    != WOLFSSL_SUCCESS) {
8358
                    WOLFSSL_MSG("Enable CRL failed");
8359
                    goto end;
8360
                }
8361
            }
8362
8363
            ret = BufferLoadCRL(cm->crl, curr, sz, WOLFSSL_FILETYPE_PEM,
8364
                NO_VERIFY);
8365
            if (ret != WOLFSSL_SUCCESS)
8366
                goto end;
8367
#endif
8368
            curr = (byte*)XSTRNSTR((char*)curr, footer, (unsigned int)sz);
8369
        }
8370
        else if (wc_PemGetHeaderFooter(CERT_TYPE, &header, &footer) == 0 &&
8371
                XSTRNSTR((char*)curr, header, (unsigned int)sz) != NULL) {
8372
            ret = X509StoreLoadCertBuffer(lookup->store, curr,
8373
                                        (word32)sz, WOLFSSL_FILETYPE_PEM);
8374
            if (ret != WOLFSSL_SUCCESS)
8375
                goto end;
8376
            curr = (byte*)XSTRNSTR((char*)curr, footer, (unsigned int)sz);
8377
        }
8378
        else
8379
            goto end;
8380
8381
        if (curr == NULL)
8382
            goto end;
8383
8384
        curr++;
8385
        sz -= (long)(curr - prev);
8386
        prev = curr;
8387
    }
8388
    while (ret == WOLFSSL_SUCCESS);
8389
8390
end:
8391
    XFREE(pem, 0, DYNAMIC_TYPE_PEM);
8392
    XFCLOSE(fp);
8393
    return WS_RETURN_CODE(ret, (int)WOLFSSL_FAILURE);
8394
#else
8395
    (void)lookup;
8396
    (void)file;
8397
    (void)type;
8398
    return WS_RETURN_CODE(WOLFSSL_FAILURE,WOLFSSL_FAILURE);
8399
#endif
8400
}
8401
8402
WOLFSSL_X509_LOOKUP_METHOD* wolfSSL_X509_LOOKUP_hash_dir(void)
8403
{
8404
    /* Method implementation in functions. */
8405
    static WOLFSSL_X509_LOOKUP_METHOD meth = { 1 };
8406
    return &meth;
8407
}
8408
8409
WOLFSSL_X509_LOOKUP_METHOD* wolfSSL_X509_LOOKUP_file(void)
8410
{
8411
    /* Method implementation in functions. */
8412
    static WOLFSSL_X509_LOOKUP_METHOD meth = { 0 };
8413
    return &meth;
8414
}
8415
8416
/* set directory path to load certificate or CRL which have the hash.N form */
8417
/* for late use                                                             */
8418
/* @param ctx    a pointer to WOLFSSL_BY_DIR structure                      */
8419
/* @param argc   directory path                                             */
8420
/* @param argl   file type, either WOLFSSL_FILETYPE_PEM or                  */
8421
/*                                          WOLFSSL_FILETYPE_ASN1           */
8422
/* @return WOLFSSL_SUCCESS on successful, otherwise negative or zero        */
8423
static int x509AddCertDir(WOLFSSL_BY_DIR *ctx, const char *argc, long argl)
8424
{
8425
#if defined(OPENSSL_ALL) && !defined(NO_FILESYSTEM) && !defined(NO_WOLFSSL_DIR)
8426
    WOLFSSL_BY_DIR_entry *entry;
8427
    size_t pathLen;
8428
    int i, num;
8429
    const char* c;
8430
    WC_DECLARE_VAR(buf, char, MAX_FILENAME_SZ, 0);
8431
8432
    WOLFSSL_ENTER("x509AddCertDir");
8433
8434
    pathLen = 0;
8435
    c = argc;
8436
    /* sanity check, zero length */
8437
    if (ctx == NULL || c == NULL || *c == '\0')
8438
        return WOLFSSL_FAILURE;
8439
8440
#ifdef WOLFSSL_SMALL_STACK
8441
    buf = (char*)XMALLOC(MAX_FILENAME_SZ, NULL, DYNAMIC_TYPE_OPENSSL);
8442
    if (buf == NULL) {
8443
        WOLFSSL_LEAVE("x509AddCertDir", MEMORY_E);
8444
        return MEMORY_E;
8445
    }
8446
#endif
8447
8448
    XMEMSET(buf, 0, MAX_FILENAME_SZ);
8449
8450
    do {
8451
        if (*c == SEPARATOR_CHAR || *c == '\0') {
8452
8453
            num = wolfSSL_sk_BY_DIR_entry_num(ctx->dir_entry);
8454
8455
            for (i=0; i<num; i++) {
8456
8457
                entry = wolfSSL_sk_BY_DIR_entry_value(ctx->dir_entry, i);
8458
8459
                if (XSTRLEN(entry->dir_name) == pathLen &&
8460
                    XSTRNCMP(entry->dir_name, buf, pathLen) == 0) {
8461
                    WOLFSSL_MSG("dir entry found");
8462
                    break;
8463
                }
8464
            }
8465
8466
            if (num == -1 || i == num) {
8467
                WOLFSSL_MSG("no entry found");
8468
8469
                if (ctx->dir_entry == NULL) {
8470
                    ctx->dir_entry = wolfSSL_sk_BY_DIR_entry_new_null();
8471
8472
                    if (ctx->dir_entry == NULL) {
8473
                        WOLFSSL_MSG("failed to allocate dir_entry");
8474
                            WC_FREE_VAR_EX(buf, 0, DYNAMIC_TYPE_OPENSSL);
8475
                        return 0;
8476
                    }
8477
                }
8478
8479
                entry = wolfSSL_BY_DIR_entry_new();
8480
                if (entry == NULL) {
8481
                    WOLFSSL_MSG("failed to allocate dir entry");
8482
                        WC_FREE_VAR_EX(buf, 0, DYNAMIC_TYPE_OPENSSL);
8483
                    return 0;
8484
                }
8485
                entry->dir_type = (int)argl;
8486
                entry->dir_name = (char*)XMALLOC(pathLen + 1/* \0 termination*/
8487
                                                , NULL, DYNAMIC_TYPE_OPENSSL);
8488
                entry->hashes = wolfSSL_sk_BY_DIR_HASH_new_null();
8489
                if (entry->dir_name == NULL || entry->hashes == NULL) {
8490
                    WOLFSSL_MSG("failed to allocate dir name");
8491
                    wolfSSL_BY_DIR_entry_free(entry);
8492
                        WC_FREE_VAR_EX(buf, 0, DYNAMIC_TYPE_OPENSSL);
8493
                    return 0;
8494
                }
8495
8496
                XSTRNCPY(entry->dir_name, buf, pathLen);
8497
                entry->dir_name[pathLen] = '\0';
8498
8499
                if (wolfSSL_sk_BY_DIR_entry_push(ctx->dir_entry, entry) <= 0) {
8500
                    wolfSSL_BY_DIR_entry_free(entry);
8501
                        WC_FREE_VAR_EX(buf, 0, DYNAMIC_TYPE_OPENSSL);
8502
                    return 0;
8503
                }
8504
            }
8505
            /* skip separator */
8506
            if (*c == SEPARATOR_CHAR) c++;
8507
8508
            pathLen = 0;
8509
            XMEMSET(buf, 0, MAX_FILENAME_SZ);
8510
        }
8511
        buf[pathLen++] = *c;
8512
8513
    } while(*c++ != '\0');
8514
8515
    WC_FREE_VAR_EX(buf, 0, DYNAMIC_TYPE_OPENSSL);
8516
8517
    return WOLFSSL_SUCCESS;
8518
#else
8519
    (void)ctx;
8520
    (void)argc;
8521
    (void)argl;
8522
    return WOLFSSL_NOT_IMPLEMENTED;
8523
#endif
8524
}
8525
8526
/* set additional data to X509_LOOKUP                                   */
8527
/* @param ctx    a pointer to X509_LOOKUP structure                     */
8528
/* @param cmd    control command :                                      */
8529
/*               X509_L_FILE_LOAD, X509_L_ADD_DIR X509_L_ADD_STORE or   */
8530
/*               X509_L_LOAD_STORE                                      */
8531
/* @param argc   arguments for the control command                      */
8532
/* @param argl   arguments for the control command                      */
8533
/* @param **ret  return value of the control command                    */
8534
/* @return WOLFSSL_SUCCESS on successful, otherwise WOLFSSL_FAILURE     */
8535
/* note: WOLFSSL_X509_L_ADD_STORE and WOLFSSL_X509_L_LOAD_STORE have not*/
8536
/*       yet implemented. It returns WOLFSSL_NOT_IMPLEMENTED            */
8537
/*       when those control commands are passed.                        */
8538
int wolfSSL_X509_LOOKUP_ctrl(WOLFSSL_X509_LOOKUP *ctx, int cmd,
8539
        const char *argc, long argl, char **ret)
8540
{
8541
    int lret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
8542
8543
    WOLFSSL_ENTER("wolfSSL_X509_LOOKUP_ctrl");
8544
#if !defined(NO_FILESYSTEM)
8545
    if (ctx != NULL) {
8546
        switch (cmd) {
8547
        case WOLFSSL_X509_L_FILE_LOAD:
8548
            /* expects to return a number of processed cert or crl file */
8549
            lret = wolfSSL_X509_load_cert_crl_file(ctx, argc, (int)argl) > 0 ?
8550
                            WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
8551
            break;
8552
        case WOLFSSL_X509_L_ADD_DIR:
8553
            /* store directory location to use it later */
8554
#if !defined(NO_WOLFSSL_DIR)
8555
            lret = x509AddCertDir(ctx->dirs, argc, argl);
8556
#else
8557
            (void)x509AddCertDir;
8558
            lret = WOLFSSL_NOT_IMPLEMENTED;
8559
#endif
8560
            break;
8561
        case WOLFSSL_X509_L_ADD_STORE:
8562
        case WOLFSSL_X509_L_LOAD_STORE:
8563
            return WOLFSSL_NOT_IMPLEMENTED;
8564
8565
        default:
8566
            break;
8567
        }
8568
    }
8569
    (void)ret;
8570
#else
8571
    (void)ctx;
8572
    (void)argc;
8573
    (void)argl;
8574
    (void)ret;
8575
    (void)cmd;
8576
    (void)x509AddCertDir;
8577
    lret = WOLFSSL_NOT_IMPLEMENTED;
8578
#endif
8579
    return lret;
8580
}
8581
8582
8583
#if defined(WOLFSSL_CERT_GEN)
8584
static int wolfssl_x509_make_der(WOLFSSL_X509* x509, int req,
8585
        unsigned char* der, int* derSz, int includeSig);
8586
#endif
8587
8588
#ifdef WOLFSSL_CERT_GEN
8589
#ifndef NO_BIO
8590
/* Converts the X509 to DER format and outputs it into bio.
8591
 *
8592
 * bio  is the structure to hold output DER
8593
 * x509 certificate to create DER from
8594
 * req  if set then a CSR is generated
8595
 *
8596
 * returns WOLFSSL_SUCCESS on success
8597
 */
8598
static int loadX509orX509REQFromBio(WOLFSSL_BIO* bio, WOLFSSL_X509* x509,
8599
    int req)
8600
{
8601
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
8602
    /* Get large buffer to hold cert der */
8603
    int derSz = X509_BUFFER_SZ;
8604
    WC_DECLARE_VAR(der, byte, X509_BUFFER_SZ, 0);
8605
    WOLFSSL_ENTER("wolfSSL_i2d_X509_bio");
8606
8607
    if (bio == NULL || x509 == NULL) {
8608
        return WOLFSSL_FAILURE;
8609
    }
8610
8611
#ifdef WOLFSSL_SMALL_STACK
8612
    der = (byte*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8613
    if (!der) {
8614
        WOLFSSL_MSG("malloc failed");
8615
        return WOLFSSL_FAILURE;
8616
    }
8617
#endif
8618
8619
    if (wolfssl_x509_make_der(x509, req, der, &derSz, 1) != WOLFSSL_SUCCESS) {
8620
        goto cleanup;
8621
    }
8622
8623
    if (wolfSSL_BIO_write(bio, der, derSz) != derSz) {
8624
        goto cleanup;
8625
    }
8626
8627
    ret = WOLFSSL_SUCCESS;
8628
cleanup:
8629
    WC_FREE_VAR_EX(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
8630
8631
    return ret;
8632
}
8633
8634
/* Converts the X509 to DER format and outputs it into bio.
8635
 *
8636
 * bio  is the structure to hold output DER
8637
 * x509 certificate to create DER from
8638
 *
8639
 * returns WOLFSSL_SUCCESS on success
8640
 */
8641
int wolfSSL_i2d_X509_bio(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
8642
{
8643
    return loadX509orX509REQFromBio(bio, x509, 0);
8644
}
8645
8646
#ifdef WOLFSSL_CERT_REQ
8647
int wolfSSL_i2d_X509_REQ_bio(WOLFSSL_BIO* bio, WOLFSSL_X509* x509)
8648
{
8649
    return loadX509orX509REQFromBio(bio, x509, 1);
8650
}
8651
#endif /* WOLFSSL_CERT_REQ */
8652
#endif /* !NO_BIO */
8653
#endif /* WOLFSSL_CERT_GEN */
8654
8655
/* Converts an internal structure to a DER buffer
8656
 *
8657
 * x509 structure to get DER buffer from
8658
 * out  buffer to hold result. If NULL then *out is NULL then a new buffer is
8659
 *      created.
8660
 *
8661
 * returns the size of the DER result on success
8662
 */
8663
int wolfSSL_i2d_X509(WOLFSSL_X509* x509, unsigned char** out)
8664
{
8665
    const unsigned char* der;
8666
    int derSz = 0;
8667
    int advance = 1;
8668
8669
    WOLFSSL_ENTER("wolfSSL_i2d_X509");
8670
8671
    if (x509 == NULL) {
8672
        WOLFSSL_LEAVE("wolfSSL_i2d_X509", BAD_FUNC_ARG);
8673
        return BAD_FUNC_ARG;
8674
    }
8675
8676
    der = wolfSSL_X509_get_der(x509, &derSz);
8677
    if (der == NULL) {
8678
        WOLFSSL_LEAVE("wolfSSL_i2d_X509", MEMORY_E);
8679
        return MEMORY_E;
8680
    }
8681
8682
    if (out != NULL && *out == NULL) {
8683
        *out = (unsigned char*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_OPENSSL);
8684
        if (*out == NULL) {
8685
            WOLFSSL_LEAVE("wolfSSL_i2d_X509", MEMORY_E);
8686
            return MEMORY_E;
8687
        }
8688
        advance = 0;
8689
    }
8690
8691
    if (out != NULL) {
8692
        XMEMCPY(*out, der, derSz);
8693
        if (advance)
8694
            *out += derSz;
8695
    }
8696
8697
    WOLFSSL_LEAVE("wolfSSL_i2d_X509", derSz);
8698
    return derSz;
8699
}
8700
8701
#ifdef WOLFSSL_DUAL_ALG_CERTS
8702
/* Generate a der preTBS from a decoded cert, and write
8703
 * to buffer.
8704
 *
8705
 * @param [in]  cert  The decoded cert to parse.
8706
 * @param [out] der   The der buffer to write in.
8707
 * @param [in]  derSz The der buffer size.
8708
 *
8709
 * @return  preTBS der size on success.
8710
 * */
8711
int wc_GeneratePreTBS(DecodedCert* cert, byte *der, int derSz) {
8712
    int ret = 0;
8713
    WOLFSSL_X509 *x = NULL;
8714
    byte certIsCSR = 0;
8715
8716
    WOLFSSL_ENTER("wc_GeneratePreTBS");
8717
8718
    if ((cert == NULL) || (der == NULL) || (derSz <= 0)) {
8719
        return BAD_FUNC_ARG;
8720
    }
8721
8722
#ifdef WOLFSSL_CERT_REQ
8723
    certIsCSR = cert->isCSR;
8724
#endif
8725
8726
    x = wolfSSL_X509_new();
8727
    if (x == NULL) {
8728
        ret = MEMORY_E;
8729
    }
8730
    else {
8731
        ret = CopyDecodedToX509(x, cert);
8732
    }
8733
8734
    if (ret == 0) {
8735
        /* Remove the altsigval extension. */
8736
        XFREE(x->altSigValDer, x->heap, DYNAMIC_TYPE_X509_EXT);
8737
        x->altSigValDer = NULL;
8738
        x->altSigValLen = 0;
8739
        /* Remove sigOID so it won't be encoded. */
8740
        x->sigOID = 0;
8741
        /* We now have a PreTBS. Encode it. */
8742
        ret = wolfssl_x509_make_der(x, certIsCSR, der, &derSz, 0);
8743
        if (ret == WOLFSSL_SUCCESS) {
8744
            ret = derSz;
8745
        }
8746
    }
8747
8748
    if (x != NULL) {
8749
        wolfSSL_X509_free(x);
8750
        x = NULL;
8751
    }
8752
8753
    return ret;
8754
}
8755
#endif /* WOLFSSL_DUAL_ALG_CERTS */
8756
8757
#ifndef NO_BIO
8758
/**
8759
 * Converts the DER from bio and creates a WOLFSSL_X509 structure from it.
8760
 * @param bio  is the structure holding DER
8761
 * @param x509 certificate to create from DER. Can be NULL
8762
 * @param req  1 for a CSR and 0 for a x509 cert
8763
 * @return pointer to WOLFSSL_X509 structure on success and NULL on fail
8764
 */
8765
static WOLFSSL_X509* d2i_X509orX509REQ_bio(WOLFSSL_BIO* bio,
8766
                                            WOLFSSL_X509** x509, int req)
8767
{
8768
    WOLFSSL_X509* localX509 = NULL;
8769
    byte* mem  = NULL;
8770
    int    size;
8771
8772
    WOLFSSL_ENTER("wolfSSL_d2i_X509_bio");
8773
8774
    if (bio == NULL) {
8775
        WOLFSSL_MSG("Bad Function Argument bio is NULL");
8776
        return NULL;
8777
    }
8778
8779
    size = wolfSSL_BIO_get_len(bio);
8780
    if (size <= 0) {
8781
        WOLFSSL_MSG("wolfSSL_BIO_get_len error. Possibly no pending data.");
8782
        WOLFSSL_ERROR(WOLFSSL_ASN1_R_HEADER_TOO_LONG_E);
8783
        return NULL;
8784
    }
8785
8786
    if (!(mem = (byte*)XMALLOC(size, NULL, DYNAMIC_TYPE_OPENSSL))) {
8787
        WOLFSSL_MSG("malloc error");
8788
        return NULL;
8789
    }
8790
8791
    if ((size = wolfSSL_BIO_read(bio, mem, size)) == 0) {
8792
        WOLFSSL_MSG("wolfSSL_BIO_read error");
8793
        XFREE(mem, NULL, DYNAMIC_TYPE_OPENSSL);
8794
        return NULL;
8795
    }
8796
8797
    if (req) {
8798
#ifdef WOLFSSL_CERT_REQ
8799
        localX509 = wolfSSL_X509_REQ_d2i(NULL, mem, size);
8800
#else
8801
        WOLFSSL_MSG("CSR not compiled in");
8802
#endif
8803
    }
8804
    else {
8805
        localX509 = wolfSSL_X509_d2i_ex(NULL, mem, size, bio->heap);
8806
    }
8807
    if (localX509 == NULL) {
8808
        WOLFSSL_MSG("wolfSSL_X509_d2i error");
8809
        XFREE(mem, NULL, DYNAMIC_TYPE_OPENSSL);
8810
        return NULL;
8811
    }
8812
8813
    if (x509 != NULL) {
8814
        *x509 = localX509;
8815
    }
8816
8817
    XFREE(mem, NULL, DYNAMIC_TYPE_OPENSSL);
8818
    return localX509;
8819
}
8820
8821
WOLFSSL_X509* wolfSSL_d2i_X509_bio(WOLFSSL_BIO* bio, WOLFSSL_X509** x509)
8822
{
8823
    return d2i_X509orX509REQ_bio(bio, x509, 0);
8824
}
8825
8826
#ifdef WOLFSSL_CERT_REQ
8827
WOLFSSL_X509* wolfSSL_d2i_X509_REQ_bio(WOLFSSL_BIO* bio, WOLFSSL_X509** x509)
8828
{
8829
    return d2i_X509orX509REQ_bio(bio, x509, 1);
8830
}
8831
#endif
8832
#endif /* !NO_BIO */
8833
8834
#endif /* OPENSSL_EXTRA */
8835
8836
#ifdef OPENSSL_EXTRA
8837
/* Use the public key to verify the signature. Note: this only verifies
8838
 * the certificate signature.
8839
 * returns WOLFSSL_SUCCESS on successful signature verification */
8840
static int verifyX509orX509REQ(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey,
8841
    int req)
8842
{
8843
    int ret;
8844
    const byte* der;
8845
    int derSz = 0;
8846
    int type;
8847
8848
    (void)req;
8849
8850
    if (x509 == NULL || pkey == NULL) {
8851
        return WOLFSSL_FATAL_ERROR;
8852
    }
8853
8854
    der = wolfSSL_X509_get_der(x509, &derSz);
8855
    if (der == NULL) {
8856
        WOLFSSL_MSG("Error getting WOLFSSL_X509 DER");
8857
        return WOLFSSL_FATAL_ERROR;
8858
    }
8859
8860
    switch (pkey->type) {
8861
        case WC_EVP_PKEY_RSA:
8862
            type = RSAk;
8863
            break;
8864
8865
        case WC_EVP_PKEY_EC:
8866
            type = ECDSAk;
8867
            break;
8868
8869
        case WC_EVP_PKEY_DSA:
8870
            type = DSAk;
8871
            break;
8872
8873
        default:
8874
            WOLFSSL_MSG("Unknown pkey key type");
8875
            return WOLFSSL_FATAL_ERROR;
8876
    }
8877
8878
#ifdef WOLFSSL_CERT_REQ
8879
    if (req)
8880
        ret = CheckCSRSignaturePubKey(der, (word32)derSz, x509->heap,
8881
                (unsigned char*)pkey->pkey.ptr, pkey->pkey_sz, type);
8882
    else
8883
#endif
8884
        ret = CheckCertSignaturePubKey(der, (word32)derSz, x509->heap,
8885
                (unsigned char*)pkey->pkey.ptr, pkey->pkey_sz, type);
8886
    if (ret == 0) {
8887
        return WOLFSSL_SUCCESS;
8888
    }
8889
    return WOLFSSL_FAILURE;
8890
}
8891
8892
int wolfSSL_X509_verify(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey)
8893
{
8894
    return verifyX509orX509REQ(x509, pkey, 0);
8895
}
8896
8897
#ifdef WOLFSSL_CERT_REQ
8898
int wolfSSL_X509_REQ_verify(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey)
8899
{
8900
    return verifyX509orX509REQ(x509, pkey, 1);
8901
}
8902
#endif /* WOLFSSL_CERT_REQ */
8903
8904
#if !defined(NO_FILESYSTEM)
8905
static void *wolfSSL_d2i_X509_fp_ex(XFILE file, void **x509, int type)
8906
{
8907
    void *newx509 = NULL;
8908
    byte *fileBuffer = NULL;
8909
    long sz = 0;
8910
8911
    /* init variable */
8912
    if (x509)
8913
        *x509 = NULL;
8914
8915
    /* argument check */
8916
    if (file == XBADFILE) {
8917
        return NULL;
8918
    }
8919
8920
    /* determine file size */
8921
    if (XFSEEK(file, 0, XSEEK_END) != 0) {
8922
        return NULL;
8923
    }
8924
    sz = XFTELL(file);
8925
    if (XFSEEK(file, 0, XSEEK_SET) != 0) {
8926
        return NULL;
8927
    }
8928
8929
    if (sz > MAX_WOLFSSL_FILE_SIZE || sz <= 0) {
8930
        WOLFSSL_MSG("d2i_X509_fp_ex file size error");
8931
        return NULL;
8932
    }
8933
8934
    fileBuffer = (byte *)XMALLOC(sz, NULL, DYNAMIC_TYPE_FILE);
8935
    if (fileBuffer != NULL) {
8936
        if ((long)XFREAD(fileBuffer, 1, (size_t)sz, file) != sz) {
8937
            WOLFSSL_MSG("File read failed");
8938
            goto err_exit;
8939
        }
8940
        if (type == CERT_TYPE) {
8941
            newx509 = (void *)wolfSSL_X509_d2i(NULL, fileBuffer, (int)sz);
8942
        }
8943
    #ifdef HAVE_CRL
8944
        else if (type == CRL_TYPE) {
8945
            newx509 = (void *)wolfSSL_d2i_X509_CRL(NULL, fileBuffer, (int)sz);
8946
        }
8947
    #endif
8948
    #ifdef WOLFSSL_CERT_REQ
8949
        else if (type == CERTREQ_TYPE) {
8950
             newx509 = (void *)wolfSSL_X509_REQ_d2i(NULL, fileBuffer, (int)sz);
8951
        }
8952
    #endif
8953
    #if !defined(NO_ASN) && !defined(NO_PWDBASED) && defined(HAVE_PKCS12)
8954
        else if (type == PKCS12_TYPE) {
8955
            if ((newx509 = wc_PKCS12_new()) == NULL) {
8956
                goto err_exit;
8957
            }
8958
            if (wc_d2i_PKCS12(fileBuffer, (word32)sz,
8959
                                                     (WC_PKCS12*)newx509) < 0) {
8960
                goto err_exit;
8961
            }
8962
        }
8963
    #endif
8964
        else {
8965
            goto err_exit;
8966
        }
8967
        if (newx509 == NULL) {
8968
            WOLFSSL_MSG("X509 failed");
8969
            goto err_exit;
8970
        }
8971
    }
8972
8973
    if (x509)
8974
        *x509 = newx509;
8975
8976
    goto _exit;
8977
8978
err_exit:
8979
#if !defined(NO_ASN) && !defined(NO_PWDBASED) && defined(HAVE_PKCS12)
8980
    if ((newx509 != NULL) && (type == PKCS12_TYPE)) {
8981
        wc_PKCS12_free((WC_PKCS12*)newx509);
8982
        newx509 = NULL;
8983
    }
8984
#endif
8985
_exit:
8986
    XFREE(fileBuffer, NULL, DYNAMIC_TYPE_FILE);
8987
8988
    return newx509;
8989
}
8990
8991
#ifdef WOLFSSL_CERT_REQ
8992
WOLFSSL_X509* wolfSSL_d2i_X509_REQ_fp(XFILE fp, WOLFSSL_X509 **req)
8993
{
8994
    return (WOLFSSL_X509 *)wolfSSL_d2i_X509_fp_ex(fp, (void **)req,
8995
                                                  CERTREQ_TYPE);
8996
}
8997
#endif /* WOLFSSL_CERT_REQ */
8998
8999
WOLFSSL_X509 *wolfSSL_d2i_X509_fp(XFILE fp, WOLFSSL_X509 **x509)
9000
{
9001
    WOLFSSL_ENTER("wolfSSL_d2i_X509_fp");
9002
    return (WOLFSSL_X509 *)wolfSSL_d2i_X509_fp_ex(fp, (void **)x509, CERT_TYPE);
9003
}
9004
9005
/* load certificate or CRL file, and add it to the STORE           */
9006
/* @param ctx    a pointer to X509_LOOKUP structure                */
9007
/* @param file   file name to load                                 */
9008
/* @param type   WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1     */
9009
/* @return a number of loading CRL or certificate, otherwise zero  */
9010
int wolfSSL_X509_load_cert_crl_file(WOLFSSL_X509_LOOKUP *ctx,
9011
    const char *file, int type)
9012
{
9013
    WOLFSSL_X509 *x509 = NULL;
9014
9015
    int cnt = 0;
9016
9017
    WOLFSSL_ENTER("wolfSSL_X509_load_cert_crl_file");
9018
9019
    /* stanity check */
9020
    if (ctx == NULL || file == NULL) {
9021
        WOLFSSL_MSG("bad arguments");
9022
        return 0;
9023
    }
9024
9025
    if (type != WOLFSSL_FILETYPE_PEM) {
9026
        x509 = wolfSSL_X509_load_certificate_file(file, type);
9027
        if (x509 != NULL) {
9028
            if (wolfSSL_X509_STORE_add_cert(ctx->store, x509)
9029
                                    == WOLFSSL_SUCCESS) {
9030
                cnt++;
9031
            }
9032
            else {
9033
                WOLFSSL_MSG("wolfSSL_X509_STORE_add_cert error");
9034
            }
9035
            wolfSSL_X509_free(x509);
9036
            x509 = NULL;
9037
        }
9038
        else {
9039
            WOLFSSL_MSG("wolfSSL_X509_load_certificate_file error");
9040
        }
9041
9042
    }
9043
    else {
9044
#if defined(OPENSSL_ALL)
9045
    #if !defined(NO_BIO)
9046
        STACK_OF(WOLFSSL_X509_INFO) *info;
9047
        WOLFSSL_X509_INFO *info_tmp;
9048
        int i;
9049
        int num = 0;
9050
        WOLFSSL_BIO *bio = wolfSSL_BIO_new_file(file, "rb");
9051
        if (!bio) {
9052
            WOLFSSL_MSG("wolfSSL_BIO_new error");
9053
            return cnt;
9054
        }
9055
9056
        info = wolfSSL_PEM_X509_INFO_read_bio(bio, NULL, NULL, NULL);
9057
9058
        wolfSSL_BIO_free(bio);
9059
9060
        if (!info) {
9061
            WOLFSSL_MSG("wolfSSL_PEM_X509_INFO_read_bio error");
9062
            return cnt;
9063
        }
9064
        num = wolfSSL_sk_X509_INFO_num(info);
9065
        for (i=0; i < num; i++) {
9066
            info_tmp = wolfSSL_sk_X509_INFO_value(info, i);
9067
9068
            if (info_tmp == NULL)
9069
                continue;
9070
9071
            if (info_tmp->x509) {
9072
                if (wolfSSL_X509_STORE_add_cert(ctx->store, info_tmp->x509) ==
9073
                    WOLFSSL_SUCCESS) {
9074
                    cnt ++;
9075
                }
9076
                else {
9077
                    WOLFSSL_MSG("wolfSSL_X509_STORE_add_cert failed");
9078
                }
9079
            }
9080
#ifdef HAVE_CRL
9081
            if (info_tmp->crl) {
9082
                if (wolfSSL_X509_STORE_add_crl(ctx->store, info_tmp->crl) ==
9083
                    WOLFSSL_SUCCESS) {
9084
                    cnt ++;
9085
                }
9086
                else {
9087
                    WOLFSSL_MSG("wolfSSL_X509_STORE_add_crl failed");
9088
                }
9089
            }
9090
#endif
9091
        }
9092
        wolfSSL_sk_X509_INFO_pop_free(info, wolfSSL_X509_INFO_free);
9093
    #elif defined(HAVE_CRL)
9094
        /* Only supports one certificate or CRL in the file. */
9095
        WOLFSSL_X509_CRL* crl = NULL;
9096
        XFILE fp = XFOPEN(file, "rb");
9097
        if (fp == XBADFILE) {
9098
            WOLFSSL_MSG("XFOPEN error");
9099
            return cnt;
9100
        }
9101
9102
        x509 = wolfSSL_PEM_read_X509(fp, NULL, NULL, NULL);
9103
        if (x509 != NULL) {
9104
            if (wolfSSL_X509_STORE_add_cert(ctx->store, x509) ==
9105
                WOLFSSL_SUCCESS) {
9106
                cnt++;
9107
            }
9108
            else {
9109
                WOLFSSL_MSG("wolfSSL_X509_STORE_add_cert failed");
9110
            }
9111
        }
9112
        else {
9113
            if (XFSEEK(fp, 0, XSEEK_SET) != 0) {
9114
                WOLFSSL_MSG("XFSEEK error");
9115
                return cnt;
9116
            }
9117
            crl = wolfSSL_PEM_read_X509_CRL(fp, NULL, NULL, NULL);
9118
            if (crl != NULL) {
9119
                if (wolfSSL_X509_STORE_add_crl(ctx->store, crl) ==
9120
                    WOLFSSL_SUCCESS) {
9121
                    cnt++;
9122
                }
9123
                else {
9124
                    WOLFSSL_MSG("wolfSSL_X509_STORE_add_crl failed");
9125
                }
9126
            }
9127
            else {
9128
                WOLFSSL_MSG("Certificate and CRL not recognized");
9129
                return cnt;
9130
            }
9131
        }
9132
9133
        wolfSSL_X509_free(x509);
9134
        wolfSSL_X509_CRL_free(crl);
9135
    #endif
9136
#else
9137
    (void)cnt;
9138
#endif /* OPENSSL_ALL && !NO_BIO */
9139
    }
9140
9141
    WOLFSSL_LEAVE("wolfSSL_X509_load_ceretificate_crl_file", cnt);
9142
    return cnt;
9143
}
9144
#endif /* !NO_FILESYSTEM */
9145
9146
9147
#ifdef HAVE_CRL
9148
9149
#ifndef NO_BIO
9150
WOLFSSL_X509_CRL *wolfSSL_d2i_X509_CRL_bio(WOLFSSL_BIO *bp,
9151
                                                    WOLFSSL_X509_CRL **x)
9152
{
9153
    int derSz;
9154
    byte* der = NULL;
9155
    WOLFSSL_X509_CRL* crl = NULL;
9156
9157
    if (bp == NULL)
9158
        return NULL;
9159
9160
    if ((derSz = wolfSSL_BIO_get_len(bp)) > 0) {
9161
        der = (byte*)XMALLOC(derSz, 0, DYNAMIC_TYPE_DER);
9162
        if (der != NULL) {
9163
            if (wolfSSL_BIO_read(bp, der, derSz) == derSz) {
9164
                crl = wolfSSL_d2i_X509_CRL(x, der, derSz);
9165
            }
9166
        }
9167
    }
9168
9169
    XFREE(der, 0, DYNAMIC_TYPE_DER);
9170
9171
    return crl;
9172
}
9173
#endif
9174
9175
#if !defined(NO_FILESYSTEM) && !defined(NO_STDIO_FILESYSTEM)
9176
WOLFSSL_X509_CRL *wolfSSL_d2i_X509_CRL_fp(XFILE fp, WOLFSSL_X509_CRL **crl)
9177
{
9178
    WOLFSSL_ENTER("wolfSSL_d2i_X509_CRL_fp");
9179
    return (WOLFSSL_X509_CRL *)wolfSSL_d2i_X509_fp_ex(fp, (void **)crl,
9180
        CRL_TYPE);
9181
}
9182
9183
/* Read CRL file, and add it to store and corresponding cert manager     */
9184
/* @param ctx   a pointer of X509_LOOKUP back to the X509_STORE          */
9185
/* @param file  a file to read                                           */
9186
/* @param type  WOLFSSL_FILETYPE_PEM or WOLFSSL_FILETYPE_ASN1            */
9187
/* @return WOLFSSL_SUCCESS(1) on successful, otherwise WOLFSSL_FAILURE(0)*/
9188
int wolfSSL_X509_load_crl_file(WOLFSSL_X509_LOOKUP *ctx,
9189
                                             const char *file, int type)
9190
{
9191
#ifndef NO_BIO
9192
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
9193
    int count = 0;
9194
    WOLFSSL_BIO *bio = NULL;
9195
    WOLFSSL_X509_CRL *crl = NULL;
9196
9197
    WOLFSSL_ENTER("wolfSSL_X509_load_crl_file");
9198
9199
    if (ctx == NULL || file == NULL)
9200
        return ret;
9201
9202
    if ((bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file())) == NULL)
9203
        return ret;
9204
9205
    if (wolfSSL_BIO_read_filename(bio, file) <= 0) {
9206
        wolfSSL_BIO_free(bio);
9207
        return ret;
9208
    }
9209
9210
    if (wolfSSL_BIO_read_filename(bio, file) <= 0) {
9211
        wolfSSL_BIO_free(bio);
9212
        return ret;
9213
    }
9214
9215
    if (type == WOLFSSL_FILETYPE_PEM) {
9216
        do {
9217
            crl = wolfSSL_PEM_read_bio_X509_CRL(bio, NULL, NULL, NULL);
9218
            if (crl == NULL) {
9219
                if (count <= 0) {
9220
                    WOLFSSL_MSG("Load crl failed");
9221
                }
9222
                break;
9223
            }
9224
9225
            ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
9226
            if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
9227
                WOLFSSL_MSG("Adding crl failed");
9228
                break;
9229
            }
9230
            count++;
9231
            wolfSSL_X509_CRL_free(crl);
9232
            crl = NULL;
9233
        }   while(crl == NULL);
9234
9235
        ret = count;
9236
    }
9237
    else if (type == WOLFSSL_FILETYPE_ASN1) {
9238
        crl = wolfSSL_d2i_X509_CRL_bio(bio, NULL);
9239
        if (crl == NULL) {
9240
            WOLFSSL_MSG("Load crl failed");
9241
        }
9242
        else {
9243
            ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
9244
            if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
9245
                WOLFSSL_MSG("Adding crl failed");
9246
            }
9247
            else {
9248
                ret = 1;/* handled a file */
9249
            }
9250
        }
9251
    }
9252
    else {
9253
        WOLFSSL_MSG("Invalid file type");
9254
    }
9255
9256
    wolfSSL_X509_CRL_free(crl);
9257
    wolfSSL_BIO_free(bio);
9258
9259
    WOLFSSL_LEAVE("wolfSSL_X509_load_crl_file", ret);
9260
    return ret;
9261
#else
9262
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
9263
    int count = 0;
9264
    XFILE fp;
9265
    WOLFSSL_X509_CRL *crl = NULL;
9266
9267
    WOLFSSL_ENTER("wolfSSL_X509_load_crl_file");
9268
9269
    if (ctx == NULL || file == NULL)
9270
        return ret;
9271
9272
    if ((fp = XFOPEN(file, "rb")) == XBADFILE)
9273
        return ret;
9274
9275
    if (type == WOLFSSL_FILETYPE_PEM) {
9276
        do {
9277
            crl = wolfSSL_PEM_read_X509_CRL(fp, NULL, NULL, NULL);
9278
            if (crl == NULL) {
9279
                if (count <= 0) {
9280
                    WOLFSSL_MSG("Load crl failed");
9281
                }
9282
                break;
9283
            }
9284
9285
            ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
9286
            if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
9287
                WOLFSSL_MSG("Adding crl failed");
9288
                break;
9289
            }
9290
            count++;
9291
            wolfSSL_X509_CRL_free(crl);
9292
            crl = NULL;
9293
        }
9294
        while(crl == NULL);
9295
9296
        ret = count;
9297
    }
9298
    else if (type == WOLFSSL_FILETYPE_ASN1) {
9299
        crl = wolfSSL_d2i_X509_CRL_fp(fp, NULL);
9300
        if (crl == NULL) {
9301
            WOLFSSL_MSG("Load crl failed");
9302
        }
9303
        else {
9304
            ret = wolfSSL_X509_STORE_add_crl(ctx->store, crl);
9305
            if (ret == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
9306
                WOLFSSL_MSG("Adding crl failed");
9307
            }
9308
            else {
9309
                ret = 1;/* handled a file */
9310
            }
9311
        }
9312
    }
9313
    else {
9314
        WOLFSSL_MSG("Invalid file type");
9315
    }
9316
9317
    wolfSSL_X509_CRL_free(crl);
9318
    XFCLOSE(fp);
9319
9320
    WOLFSSL_LEAVE("wolfSSL_X509_load_crl_file", ret);
9321
    return ret;
9322
#endif /* !NO_BIO */
9323
}
9324
#endif /* !NO_FILESYSTEM */
9325
9326
9327
WOLFSSL_X509_CRL* wolfSSL_d2i_X509_CRL(WOLFSSL_X509_CRL** crl,
9328
        const unsigned char* in, int len)
9329
{
9330
    WOLFSSL_X509_CRL *newcrl = NULL;
9331
    int ret = WOLFSSL_SUCCESS;
9332
9333
    WOLFSSL_ENTER("wolfSSL_d2i_X509_CRL");
9334
9335
    if (in == NULL) {
9336
        WOLFSSL_MSG("Bad argument value");
9337
    }
9338
    else {
9339
        newcrl =(WOLFSSL_X509_CRL*)XMALLOC(sizeof(WOLFSSL_X509_CRL), NULL,
9340
                DYNAMIC_TYPE_CRL);
9341
        if (newcrl == NULL) {
9342
            WOLFSSL_MSG("New CRL allocation failed");
9343
        }
9344
        else {
9345
            ret = InitCRL(newcrl, NULL);
9346
            if (ret < 0) {
9347
                WOLFSSL_MSG("Init tmp CRL failed");
9348
            }
9349
            else {
9350
                ret = BufferLoadCRL(newcrl, in, len, WOLFSSL_FILETYPE_ASN1,
9351
                    NO_VERIFY);
9352
                if (ret != WOLFSSL_SUCCESS) {
9353
                    WOLFSSL_MSG("Buffer Load CRL failed");
9354
                }
9355
                else {
9356
                    if (crl) {
9357
                        *crl = newcrl;
9358
                    }
9359
                }
9360
            }
9361
        }
9362
    }
9363
9364
    if ((ret != WOLFSSL_SUCCESS) && (newcrl != NULL)) {
9365
        wolfSSL_X509_CRL_free(newcrl);
9366
        newcrl = NULL;
9367
    }
9368
9369
    return newcrl;
9370
}
9371
9372
/* Retrieve issuer X509_NAME from CRL
9373
 * return X509_NAME*  on success
9374
 * return NULL on failure
9375
 */
9376
WOLFSSL_X509_NAME* wolfSSL_X509_CRL_get_issuer_name(const WOLFSSL_X509_CRL* crl)
9377
{
9378
    if (crl == NULL || crl->crlList == NULL)
9379
        return NULL;
9380
9381
    return crl->crlList->issuer;
9382
}
9383
9384
/* Set issuer name of CRL
9385
 * return WOLFSSL_SUCCESS on success
9386
 * return WOLFSSL_FAILURE on failure
9387
 */
9388
int wolfSSL_X509_CRL_set_issuer_name(WOLFSSL_X509_CRL* crl,
9389
                                     const WOLFSSL_X509_NAME* name)
9390
{
9391
    WOLFSSL_X509_NAME* newName;
9392
9393
    if (crl == NULL || crl->crlList == NULL || name == NULL)
9394
        return WOLFSSL_FAILURE;
9395
9396
    newName = wolfSSL_X509_NAME_dup(name);
9397
    if (newName == NULL)
9398
        return WOLFSSL_FAILURE;
9399
9400
    if (crl->crlList->issuer != NULL) {
9401
        FreeX509Name(crl->crlList->issuer);
9402
        XFREE(crl->crlList->issuer, crl->heap, DYNAMIC_TYPE_X509);
9403
    }
9404
    crl->crlList->issuer = newName;
9405
9406
    return WOLFSSL_SUCCESS;
9407
}
9408
9409
/* Retrieve version from CRL
9410
 * return version on success
9411
 * return 0 on failure
9412
 */
9413
int wolfSSL_X509_CRL_version(WOLFSSL_X509_CRL* crl)
9414
{
9415
    if (crl == NULL || crl->crlList == NULL)
9416
        return 0;
9417
9418
    return crl->crlList->version;
9419
}
9420
9421
/* Set version of CRL
9422
 * Caller passes the RFC 5280 value: 0 for v1, 1 for v2.
9423
 * Internally wolfSSL stores version + 1 (v1 = 1, v2 = 2) to match
9424
 * what ParseCRL produces, so apply the same normalization here.
9425
 * return WOLFSSL_SUCCESS on success
9426
 * return WOLFSSL_FAILURE on failure
9427
 */
9428
int wolfSSL_X509_CRL_set_version(WOLFSSL_X509_CRL* crl, long version)
9429
{
9430
    if (crl == NULL || crl->crlList == NULL)
9431
        return WOLFSSL_FAILURE;
9432
9433
    /* Only v1 (0) and v2 (1) are defined by RFC 5280. */
9434
    if (version < 0 || version > 1)
9435
        return WOLFSSL_FAILURE;
9436
9437
    /* Store as version + 1 to match internal convention. */
9438
    crl->crlList->version = (int)version + 1;
9439
    return WOLFSSL_SUCCESS;
9440
}
9441
9442
/* Retrieve sig OID from CRL
9443
 * return OID on success
9444
 * return 0 on failure
9445
 */
9446
int wolfSSL_X509_CRL_get_signature_type(WOLFSSL_X509_CRL* crl)
9447
{
9448
    if (crl == NULL || crl->crlList == NULL)
9449
        return 0;
9450
9451
    return crl->crlList->signatureOID;
9452
}
9453
9454
/* Set signature type of CRL
9455
 * return WOLFSSL_SUCCESS on success
9456
 * return WOLFSSL_FAILURE on failure
9457
 */
9458
int wolfSSL_X509_CRL_set_signature_type(WOLFSSL_X509_CRL* crl,
9459
                                        int signatureType)
9460
{
9461
    if (crl == NULL || crl->crlList == NULL)
9462
        return WOLFSSL_FAILURE;
9463
9464
    crl->crlList->signatureOID = signatureType;
9465
    return WOLFSSL_SUCCESS;
9466
}
9467
9468
/* Retrieve sig NID from CRL
9469
 * return NID on success
9470
 * return 0 on failure
9471
 */
9472
int wolfSSL_X509_CRL_get_signature_nid(const WOLFSSL_X509_CRL* crl)
9473
{
9474
    if (crl == NULL || crl->crlList == NULL)
9475
        return 0;
9476
9477
    return oid2nid(crl->crlList->signatureOID, oidSigType);
9478
}
9479
9480
/* Set signature NID of CRL
9481
 * return WOLFSSL_SUCCESS on success
9482
 * return negative value on failure
9483
 */
9484
int wolfSSL_X509_CRL_set_signature_nid(WOLFSSL_X509_CRL* crl, int nid)
9485
{
9486
    int ret = WOLFSSL_SUCCESS;
9487
    word32 oid;
9488
9489
    if (crl == NULL || crl->crlList == NULL || nid <= 0) {
9490
        ret = BAD_FUNC_ARG;
9491
    }
9492
9493
    if (ret == WOLFSSL_SUCCESS) {
9494
        oid = nid2oid(nid, oidSigType);
9495
        if (oid == (word32)-1 || oid == (word32)WOLFSSL_FATAL_ERROR) {
9496
            ret = WOLFSSL_FATAL_ERROR;
9497
        }
9498
        else {
9499
            crl->crlList->signatureOID = oid;
9500
        }
9501
    }
9502
9503
    return ret;
9504
}
9505
9506
/* Retrieve signature from CRL
9507
 * return WOLFSSL_SUCCESS on success and negative values on failure
9508
 */
9509
int wolfSSL_X509_CRL_get_signature(WOLFSSL_X509_CRL* crl,
9510
    unsigned char* buf, int* bufSz)
9511
{
9512
    WOLFSSL_ENTER("wolfSSL_X509_CRL_get_signature");
9513
9514
    if (crl == NULL || crl->crlList == NULL ||
9515
        crl->crlList->signature == NULL || bufSz == NULL)
9516
        return BAD_FUNC_ARG;
9517
9518
    if (buf != NULL) {
9519
        if (*bufSz < (int)crl->crlList->signatureSz) {
9520
            WOLFSSL_MSG("Signature buffer too small");
9521
            return BUFFER_E;
9522
        }
9523
        else {
9524
            XMEMCPY(buf, crl->crlList->signature, crl->crlList->signatureSz);
9525
        }
9526
    }
9527
    *bufSz = (int)crl->crlList->signatureSz;
9528
9529
    return WOLFSSL_SUCCESS;
9530
}
9531
9532
int wolfSSL_X509_CRL_set_signature(WOLFSSL_X509_CRL* crl,
9533
    unsigned char* buf, int bufSz)
9534
{
9535
    byte* newSig;
9536
9537
    if (crl == NULL || crl->crlList == NULL || buf == NULL || bufSz <= 0) {
9538
        return BAD_FUNC_ARG;
9539
    }
9540
9541
    /* Ensure signature buffer is allocated and large enough. */
9542
    if (crl->crlList->signature == NULL) {
9543
        crl->crlList->signature = (byte*)XMALLOC((word32)bufSz, crl->heap,
9544
                                                 DYNAMIC_TYPE_CRL_ENTRY);
9545
        if (crl->crlList->signature == NULL) {
9546
            return MEMORY_E;
9547
        }
9548
        crl->crlList->signatureSz = (word32)bufSz;
9549
    }
9550
    else if ((word32)bufSz > crl->crlList->signatureSz) {
9551
        newSig = (byte*)XMALLOC((word32)bufSz, crl->heap,
9552
                                DYNAMIC_TYPE_CRL_ENTRY);
9553
        if (newSig == NULL) {
9554
            return MEMORY_E;
9555
        }
9556
        XFREE(crl->crlList->signature, crl->heap, DYNAMIC_TYPE_CRL_ENTRY);
9557
        crl->crlList->signature = newSig;
9558
        crl->crlList->signatureSz = (word32)bufSz;
9559
    }
9560
    else {
9561
        /* Reuse existing buffer, clear contents in case new signature
9562
         * is smaller. Note that we do not shrink the buffer. */
9563
        XMEMSET(crl->crlList->signature, 0, crl->crlList->signatureSz);
9564
    }
9565
9566
    XMEMCPY(crl->crlList->signature, buf, bufSz);
9567
    crl->crlList->signatureSz = (word32)bufSz;
9568
    return WOLFSSL_SUCCESS;
9569
}
9570
9571
/* Retrieve serial number from RevokedCert
9572
 * return WOLFSSL_SUCCESS on success and negative values on failure
9573
 */
9574
int wolfSSL_X509_REVOKED_get_serial_number(RevokedCert* rev,
9575
    byte* in, int* inOutSz)
9576
{
9577
    WOLFSSL_ENTER("wolfSSL_X509_REVOKED_get_serial_number");
9578
    if (rev == NULL || inOutSz == NULL) {
9579
        return BAD_FUNC_ARG;
9580
    }
9581
9582
    if (in != NULL) {
9583
        if (*inOutSz < rev->serialSz) {
9584
            WOLFSSL_MSG("Serial buffer too small");
9585
            return BUFFER_E;
9586
        }
9587
        XMEMCPY(in, rev->serialNumber, rev->serialSz);
9588
    }
9589
    *inOutSz = rev->serialSz;
9590
9591
    return WOLFSSL_SUCCESS;
9592
}
9593
9594
const WOLFSSL_ASN1_INTEGER* wolfSSL_X509_REVOKED_get0_serial_number(const
9595
                                                      WOLFSSL_X509_REVOKED *rev)
9596
{
9597
    WOLFSSL_ENTER("wolfSSL_X509_REVOKED_get0_serial_number");
9598
9599
    if (rev != NULL) {
9600
        return rev->serialNumber;
9601
    }
9602
    else
9603
        return NULL;
9604
}
9605
9606
const WOLFSSL_ASN1_TIME* wolfSSL_X509_REVOKED_get0_revocation_date(const
9607
                                                      WOLFSSL_X509_REVOKED *rev)
9608
{
9609
    WOLFSSL_ENTER("wolfSSL_X509_REVOKED_get0_revocation_date");
9610
9611
    if (rev != NULL) {
9612
        return rev->revocationDate;
9613
    }
9614
    return NULL;
9615
}
9616
9617
9618
#ifndef NO_BIO
9619
/* print serial number out
9620
*  return WOLFSSL_SUCCESS on success
9621
*/
9622
static int X509RevokedPrintSerial(WOLFSSL_BIO* bio, RevokedCert* rev,
9623
    int indent)
9624
{
9625
    unsigned char serial[32];
9626
    int  sz = sizeof(serial);
9627
9628
    if (indent < 0) indent = 0;
9629
    if (indent > MAX_INDENT) indent = MAX_INDENT;
9630
9631
    XMEMSET(serial, 0, sz);
9632
    if (wolfSSL_X509_REVOKED_get_serial_number(rev, serial, &sz)
9633
            == WOLFSSL_SUCCESS) {
9634
        X509PrintSerial_ex(bio, serial, sz, 0, indent);
9635
    }
9636
    return WOLFSSL_SUCCESS;
9637
}
9638
9639
9640
/* print out the signature in human readable format for use with
9641
* wolfSSL_X509_CRL_print()
9642
 * return WOLFSSL_SUCCESS on success
9643
 */
9644
static int X509CRLPrintSignature(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl,
9645
        int algOnly, int indent)
9646
{
9647
    int sigSz = 0;
9648
9649
    if (wolfSSL_X509_CRL_get_signature(crl, NULL, &sigSz) <= 0) {
9650
        return WOLFSSL_FAILURE;
9651
    }
9652
9653
    if (sigSz > 0) {
9654
        unsigned char* sig;
9655
        int sigNid = wolfSSL_X509_CRL_get_signature_nid(crl);
9656
9657
        sig = (unsigned char*)XMALLOC(sigSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
9658
        if (sig == NULL) {
9659
            return WOLFSSL_FAILURE;
9660
        }
9661
9662
        if (wolfSSL_X509_CRL_get_signature(crl, sig, &sigSz) <= 0) {
9663
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
9664
            return WOLFSSL_FAILURE;
9665
        }
9666
9667
        if (X509PrintSignature_ex(bio, sig, sigSz, sigNid, algOnly, indent)
9668
                != WOLFSSL_SUCCESS) {
9669
            XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
9670
            return WOLFSSL_FAILURE;
9671
        }
9672
9673
        XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
9674
9675
    }
9676
9677
    return WOLFSSL_SUCCESS;
9678
}
9679
#endif /* !NO_BIO */
9680
9681
#if !defined(NO_BIO) && defined(XSNPRINTF)
9682
/* print out the extensions in human readable format for use with
9683
 * wolfSSL_X509_CRL_print()
9684
 * return WOLFSSL_SUCCESS on success
9685
 */
9686
static int X509CRLPrintExtensions(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl,
9687
        int indent)
9688
{
9689
    char tmp[MAX_WIDTH]; /* buffer for XSNPRINTF */
9690
    int  ret = 0;
9691
9692
    if (indent < 0) indent = 0;
9693
    if (indent > MAX_INDENT) indent = MAX_INDENT;
9694
9695
    if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s\n", indent, "",
9696
                "CRL extensions:") >= MAX_WIDTH) {
9697
        ret = WOLFSSL_FAILURE;
9698
    }
9699
9700
    if (ret == 0 && wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9701
        ret = WOLFSSL_FAILURE;
9702
    }
9703
9704
    if (ret == 0 && crl->crlList->crlNumberSet) {
9705
        char dec_string[49]; /* 20 octets can express numbers up to approx
9706
                                49 decimal digits */
9707
        int freeMp = 0;
9708
    #ifdef WOLFSSL_SMALL_STACK
9709
        mp_int* dec_num = (mp_int*)XMALLOC(sizeof(*dec_num), NULL,
9710
                            DYNAMIC_TYPE_BIGINT);
9711
        if (dec_num == NULL) {
9712
            ret = MEMORY_E;
9713
        }
9714
    #else
9715
        mp_int dec_num[1];
9716
    #endif
9717
9718
        if (ret == 0 && (mp_init(dec_num) != MP_OKAY)) {
9719
             ret = MP_INIT_E;
9720
        }
9721
        else if (ret == 0) {
9722
            freeMp = 1;
9723
        }
9724
9725
        if (ret == 0 && mp_read_radix(dec_num, (char *)crl->crlList->crlNumber,
9726
                    MP_RADIX_HEX) != MP_OKAY) {
9727
            ret = WOLFSSL_FAILURE;
9728
        }
9729
9730
        if (ret == 0 && mp_toradix(dec_num, dec_string, MP_RADIX_DEC)
9731
                    != MP_OKAY) {
9732
            ret = WOLFSSL_FAILURE;
9733
        }
9734
9735
        if (ret == 0 && XSNPRINTF(tmp, MAX_WIDTH, "%*s%s\n", indent + 4, "",
9736
                    "X509v3 CRL Number:") >= MAX_WIDTH) {
9737
            ret = WOLFSSL_FAILURE;
9738
        }
9739
9740
        if (ret == 0 && wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9741
            ret = WOLFSSL_FAILURE;
9742
        }
9743
9744
        if (ret == 0 && XSNPRINTF(tmp, MAX_WIDTH, "%*s%s\n", indent + 8, "",
9745
            dec_string) >= MAX_WIDTH) {
9746
            ret = WOLFSSL_FAILURE;
9747
        }
9748
9749
        if (ret == 0 && wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9750
            ret = WOLFSSL_FAILURE;
9751
        }
9752
9753
        XMEMSET(tmp, 0, sizeof(tmp));
9754
9755
        if (freeMp) {
9756
            mp_free(dec_num);
9757
        }
9758
9759
        WC_FREE_VAR_EX(dec_num, NULL, DYNAMIC_TYPE_BIGINT);
9760
    }
9761
9762
#if !defined(NO_SKID)
9763
    if (ret == 0 && crl->crlList->extAuthKeyIdSet &&
9764
            crl->crlList->extAuthKeyId[0] != 0) {
9765
        word32 i;
9766
        char val[5];
9767
        int valSz = 5;
9768
9769
        if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s", indent + 4, "",
9770
                    "X509v3 Authority Key Identifier:") >= MAX_WIDTH) {
9771
            ret = WOLFSSL_FAILURE;
9772
        }
9773
9774
        if (ret == 0) {
9775
            XSTRNCAT(tmp, "\n", MAX_WIDTH - XSTRLEN(tmp) - 1);
9776
        }
9777
9778
        if (ret == 0 && wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9779
            ret = WOLFSSL_FAILURE;
9780
        }
9781
        XMEMSET(tmp, 0, MAX_WIDTH);
9782
9783
        if (ret == 0 && XSNPRINTF(tmp, MAX_WIDTH - 1, "%*s%s",
9784
                    indent + 8, "", "keyid") >= MAX_WIDTH) {
9785
            ret = WOLFSSL_FAILURE;
9786
        }
9787
9788
9789
        for (i = 0; i < XSTRLEN((char*)crl->crlList->extAuthKeyId); i++) {
9790
            /* check if buffer is almost full */
9791
            if (ret == 0 && XSTRLEN(tmp) >= sizeof(tmp) - valSz) {
9792
                if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9793
                    ret = WOLFSSL_FAILURE;
9794
                }
9795
                tmp[0] = '\0';
9796
            }
9797
            if (ret == 0 && XSNPRINTF(val, (size_t)valSz, ":%02X",
9798
                    crl->crlList->extAuthKeyId[i]) >= valSz) {
9799
                WOLFSSL_MSG("buffer overrun");
9800
                ret = WOLFSSL_FAILURE;
9801
            }
9802
            if (ret == 0) {
9803
                XSTRNCAT(tmp, val, valSz);
9804
            }
9805
        }
9806
        if (ret == 0) {
9807
            XSTRNCAT(tmp, "\n", XSTRLEN("\n") + 1);
9808
        }
9809
        if (ret == 0 && wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9810
            ret = WOLFSSL_FAILURE;
9811
        }
9812
    }
9813
#endif
9814
9815
    if (ret == 0) {
9816
        ret = WOLFSSL_SUCCESS;
9817
    }
9818
9819
    return ret;
9820
}
9821
9822
/* iterate through a CRL's Revoked Certs and print out in human
9823
 * readable format for use with wolfSSL_X509_CRL_print()
9824
 * return WOLFSSL_SUCCESS on success
9825
 */
9826
static int X509CRLPrintRevoked(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl,
9827
        int indent)
9828
{
9829
    char tmp[MAX_WIDTH]; /* buffer for XSNPRINTF */
9830
    int i;
9831
9832
    if (crl->crlList->totalCerts > 0) {
9833
        RevokedCert* revoked = crl->crlList->certs;
9834
9835
        if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s\n", indent, "",
9836
                    "Revoked Certificates:") >= MAX_WIDTH) {
9837
            return WOLFSSL_FAILURE;
9838
        }
9839
9840
        if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9841
            return WOLFSSL_FAILURE;
9842
        }
9843
        XMEMSET(tmp, 0, MAX_WIDTH);
9844
9845
        for (i = 0; i < crl->crlList->totalCerts; i++) {
9846
            if (revoked->serialSz > 0) {
9847
                if (X509RevokedPrintSerial(bio, revoked, indent + 4)
9848
                        != WOLFSSL_SUCCESS) {
9849
                    return WOLFSSL_FAILURE;
9850
                }
9851
            }
9852
        #ifndef NO_ASN_TIME
9853
             if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s", indent + 8, "",
9854
                         "Revocation Date: ") >= MAX_WIDTH) {
9855
                return WOLFSSL_FAILURE;
9856
            }
9857
9858
            if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9859
                return WOLFSSL_FAILURE;
9860
            }
9861
9862
            if (revoked->revDate[0] != 0) {
9863
                if (GetTimeString(revoked->revDate, ASN_UTC_TIME,
9864
                    tmp, MAX_WIDTH, MAX_DATE_SIZE) != WOLFSSL_SUCCESS) {
9865
                    if (GetTimeString(revoked->revDate, ASN_GENERALIZED_TIME,
9866
                    tmp, MAX_WIDTH, MAX_DATE_SIZE) != WOLFSSL_SUCCESS) {
9867
                        WOLFSSL_MSG("Error getting revocation date");
9868
                        return WOLFSSL_FAILURE;
9869
                    }
9870
                }
9871
            }
9872
            else {
9873
                XSTRNCPY(tmp, "Not Set", MAX_WIDTH-1);
9874
            }
9875
            tmp[MAX_WIDTH - 1] = '\0'; /* make sure null terminated */
9876
            if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9877
                return WOLFSSL_FAILURE;
9878
            }
9879
9880
            if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
9881
                return WOLFSSL_FAILURE;
9882
            }
9883
        #endif
9884
            revoked = revoked->next;
9885
        }
9886
    }
9887
    else {
9888
        if (wolfSSL_BIO_write(bio, "No Revoked Certificates.\n",
9889
                       (int)XSTRLEN("No Revoked Certificates.\n")) <= 0) {
9890
            return WOLFSSL_FAILURE;
9891
        }
9892
    }
9893
9894
    return WOLFSSL_SUCCESS;
9895
}
9896
9897
#ifndef NO_ASN_TIME
9898
/* print out the last/next update times in human readable
9899
 * format for use with wolfSSL_X509_CRL_print()
9900
 * return WOLFSSL_SUCCESS on success
9901
 */
9902
static int X509CRLPrintDates(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl,
9903
        int indent)
9904
{
9905
    char tmp[MAX_WIDTH]; /* buffer for XSNPRINTF */
9906
9907
    if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s", indent, "",
9908
                "Last Update: ") >= MAX_WIDTH) {
9909
        return WOLFSSL_FAILURE;
9910
    }
9911
9912
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9913
        return WOLFSSL_FAILURE;
9914
    }
9915
9916
    if (crl->crlList->lastDate[0] != 0) {
9917
        if (GetTimeString(crl->crlList->lastDate, crl->crlList->lastDateFormat,
9918
            tmp, MAX_WIDTH, MAX_DATE_SIZE) != WOLFSSL_SUCCESS) {
9919
            WOLFSSL_MSG("Error getting last update date");
9920
            return WOLFSSL_FAILURE;
9921
        }
9922
    }
9923
    else {
9924
        XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
9925
    }
9926
    tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
9927
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9928
        return WOLFSSL_FAILURE;
9929
    }
9930
9931
    if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
9932
        return WOLFSSL_FAILURE;
9933
    }
9934
9935
    if (XSNPRINTF(tmp, MAX_WIDTH, "%*s%s", indent, "",
9936
                "Next Update: ") >= MAX_WIDTH) {
9937
        return WOLFSSL_FAILURE;
9938
    }
9939
9940
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9941
        return WOLFSSL_FAILURE;
9942
    }
9943
9944
    if (crl->crlList->nextDate[0] != 0) {
9945
        if (GetTimeString(crl->crlList->nextDate, crl->crlList->nextDateFormat,
9946
            tmp, MAX_WIDTH, MAX_DATE_SIZE) != WOLFSSL_SUCCESS) {
9947
            WOLFSSL_MSG("Error getting next update date");
9948
            return WOLFSSL_FAILURE;
9949
        }
9950
    }
9951
    else {
9952
        XSTRNCPY(tmp, "Not Set", sizeof(tmp)-1);
9953
    }
9954
    tmp[sizeof(tmp) - 1] = '\0'; /* make sure null terminated */
9955
    if (wolfSSL_BIO_write(bio, tmp, (int)XSTRLEN(tmp)) <= 0) {
9956
        return WOLFSSL_FAILURE;
9957
    }
9958
9959
    if (wolfSSL_BIO_write(bio, "\n", (int)XSTRLEN("\n")) <= 0) {
9960
        return WOLFSSL_FAILURE;
9961
    }
9962
9963
    return WOLFSSL_SUCCESS;
9964
}
9965
#endif
9966
9967
/* Writes the human readable form of x509 to bio.
9968
 *
9969
 * bio  WOLFSSL_BIO to write to.
9970
 * crl Certificate revocation list to write.
9971
 *
9972
 * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on failure
9973
 */
9974
int wolfSSL_X509_CRL_print(WOLFSSL_BIO* bio, WOLFSSL_X509_CRL* crl)
9975
{
9976
    char issuType[] = "Issuer: ";
9977
9978
    if (bio == NULL || crl == NULL || crl->crlList == NULL) {
9979
        return WOLFSSL_FAILURE;
9980
    }
9981
9982
    if (wolfSSL_BIO_write(bio, "Certificate Revocation List (CRL):\n",
9983
                  (int)XSTRLEN("Certificate Revocation List (CRL):\n")) <= 0) {
9984
            return WOLFSSL_FAILURE;
9985
    }
9986
9987
    /* print version */
9988
    if (X509PrintVersion(bio, wolfSSL_X509_CRL_version(crl), 8)
9989
            != WOLFSSL_SUCCESS) {
9990
        return WOLFSSL_FAILURE;
9991
    }
9992
9993
    /* print signature algo */
9994
    if (X509CRLPrintSignature(bio, crl, 1, 8) != WOLFSSL_SUCCESS) {
9995
        return WOLFSSL_FAILURE;
9996
    }
9997
9998
    /* print issuer name */
9999
    if (X509PrintName(bio, wolfSSL_X509_CRL_get_issuer_name(crl), issuType, 8)
10000
            != WOLFSSL_SUCCESS) {
10001
        return WOLFSSL_FAILURE;
10002
    }
10003
10004
#ifndef NO_ASN_TIME
10005
    /* print last and next update times */
10006
    if (X509CRLPrintDates(bio, crl, 8) != WOLFSSL_SUCCESS) {
10007
        return WOLFSSL_FAILURE;
10008
    }
10009
#endif
10010
10011
    /* print CRL extensions */
10012
    if (X509CRLPrintExtensions(bio, crl, 8) != WOLFSSL_SUCCESS) {
10013
        return WOLFSSL_FAILURE;
10014
    }
10015
10016
    /* print CRL Revoked Certs */
10017
    if (X509CRLPrintRevoked(bio, crl, 0) != WOLFSSL_SUCCESS) {
10018
        return WOLFSSL_FAILURE;
10019
    }
10020
10021
    if (X509CRLPrintSignature(bio, crl, 0, 4) != WOLFSSL_SUCCESS) {
10022
        return WOLFSSL_FAILURE;
10023
    }
10024
10025
    if (wolfSSL_BIO_write(bio, "\n\0", (int)XSTRLEN("\n\0")) <= 0) {
10026
        return WOLFSSL_FAILURE;
10027
    }
10028
10029
    return WOLFSSL_SUCCESS;
10030
}
10031
#endif /* !NO_BIO && XSNPRINTF */
10032
#endif /* HAVE_CRL */
10033
#endif /* OPENSSL_EXTRA */
10034
10035
#if defined(HAVE_CRL) && (defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL))
10036
void wolfSSL_X509_CRL_free(WOLFSSL_X509_CRL *crl)
10037
{
10038
    WOLFSSL_ENTER("wolfSSL_X509_CRL_free");
10039
10040
    if (crl)
10041
        FreeCRL(crl, 1);
10042
}
10043
#endif /* HAVE_CRL && (OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL) */
10044
10045
#if defined(HAVE_CRL) && defined(OPENSSL_EXTRA)
10046
WOLFSSL_ASN1_TIME* wolfSSL_X509_CRL_get_lastUpdate(WOLFSSL_X509_CRL* crl)
10047
{
10048
    if ((crl != NULL) && (crl->crlList != NULL) &&
10049
        (crl->crlList->lastDateAsn1.data[0] != 0)) {
10050
        return &crl->crlList->lastDateAsn1;
10051
    }
10052
    return NULL;
10053
}
10054
10055
int wolfSSL_X509_CRL_set_lastUpdate(WOLFSSL_X509_CRL* crl,
10056
                                    const WOLFSSL_ASN1_TIME* time)
10057
{
10058
    if (crl != NULL && crl->crlList != NULL && time != NULL) {
10059
        crl->crlList->lastDateAsn1 = *time;
10060
        return WOLFSSL_SUCCESS;
10061
    }
10062
    return WOLFSSL_FAILURE;
10063
}
10064
10065
WOLFSSL_ASN1_TIME* wolfSSL_X509_CRL_get_nextUpdate(WOLFSSL_X509_CRL* crl)
10066
{
10067
    if ((crl != NULL) && (crl->crlList != NULL) &&
10068
        (crl->crlList->nextDateAsn1.data[0] != 0)) {
10069
        return &crl->crlList->nextDateAsn1;
10070
    }
10071
    return NULL;
10072
}
10073
10074
int wolfSSL_X509_CRL_set_nextUpdate(WOLFSSL_X509_CRL* crl,
10075
                                    const WOLFSSL_ASN1_TIME* time)
10076
{
10077
    if (crl != NULL && crl->crlList != NULL && time != NULL) {
10078
        crl->crlList->nextDateAsn1 = *time;
10079
        return WOLFSSL_SUCCESS;
10080
    }
10081
    return WOLFSSL_FAILURE;
10082
}
10083
10084
#ifndef NO_WOLFSSL_STUB
10085
int wolfSSL_X509_CRL_verify(WOLFSSL_X509_CRL* crl, WOLFSSL_EVP_PKEY* key)
10086
{
10087
    (void)crl;
10088
    (void)key;
10089
    WOLFSSL_STUB("X509_CRL_verify");
10090
    return 0;
10091
}
10092
#endif
10093
10094
/* Encode CRL to DER format in memory.
10095
 *
10096
 * If *out is NULL, allocates memory and returns it via *out.
10097
 * If *out is not NULL, writes DER data starting at *out.
10098
 *
10099
 * @param crl  CRL to encode
10100
 * @param out  Pointer to output buffer pointer
10101
 * @return     Size of DER encoding on success, WOLFSSL_FAILURE on failure
10102
 */
10103
int wolfSSL_i2d_X509_CRL(WOLFSSL_X509_CRL* crl, unsigned char** out)
10104
{
10105
    int ret;
10106
    long derSz = 0;
10107
    byte* der = NULL;
10108
    int alloced = 0;
10109
10110
    WOLFSSL_ENTER("wolfSSL_i2d_X509_CRL");
10111
10112
    if (crl == NULL) {
10113
        return BAD_FUNC_ARG;
10114
    }
10115
10116
    /* Get required size */
10117
    ret = BufferStoreCRL(crl, NULL, &derSz, WOLFSSL_FILETYPE_ASN1);
10118
    if (ret != WOLFSSL_SUCCESS || derSz <= 0) {
10119
        WOLFSSL_MSG("BufferStoreCRL failed to get size");
10120
        return WOLFSSL_FAILURE;
10121
    }
10122
10123
    if (out == NULL) {
10124
        /* Just return size */
10125
        return (int)derSz;
10126
    }
10127
10128
    if (*out == NULL) {
10129
        /* Allocate output buffer */
10130
        der = (byte*)XMALLOC((size_t)derSz, NULL, DYNAMIC_TYPE_OPENSSL);
10131
        if (der == NULL) {
10132
            WOLFSSL_MSG("Memory allocation failed");
10133
            return MEMORY_E;
10134
        }
10135
        alloced = 1;
10136
    }
10137
    else {
10138
        der = *out;
10139
    }
10140
10141
    /* Encode CRL to DER */
10142
    ret = BufferStoreCRL(crl, der, &derSz, WOLFSSL_FILETYPE_ASN1);
10143
    if (ret != WOLFSSL_SUCCESS) {
10144
        WOLFSSL_MSG("BufferStoreCRL failed to encode");
10145
        if (alloced) {
10146
            XFREE(der, NULL, DYNAMIC_TYPE_OPENSSL);
10147
        }
10148
        return WOLFSSL_FAILURE;
10149
    }
10150
10151
    if (alloced) {
10152
        *out = der;
10153
    }
10154
    else {
10155
        *out += derSz;
10156
    }
10157
10158
    return (int)derSz;
10159
}
10160
#endif /* HAVE_CRL && OPENSSL_EXTRA */
10161
10162
#if defined(WOLFSSL_CERT_EXT) && \
10163
    (defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL))
10164
/* Set CRL Distribution Points from pre-encoded DER.
10165
 *
10166
 * x509  - Certificate to modify
10167
 * der   - Pre-encoded CRLDistributionPoints DER
10168
 * derSz - Size of DER in bytes
10169
 *
10170
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
10171
 */
10172
int wolfSSL_X509_CRL_set_dist_points(WOLFSSL_X509* x509,
10173
    const unsigned char* der, int derSz)
10174
{
10175
    WOLFSSL_ENTER("wolfSSL_X509_CRL_set_dist_points");
10176
10177
    if (x509 == NULL || der == NULL || derSz <= 0) {
10178
        return WOLFSSL_FAILURE;
10179
    }
10180
10181
    if (x509->rawCRLInfo != NULL) {
10182
        XFREE(x509->rawCRLInfo, x509->heap, DYNAMIC_TYPE_X509_EXT);
10183
    }
10184
    x509->rawCRLInfo = (byte*)XMALLOC((word32)derSz, x509->heap,
10185
                                       DYNAMIC_TYPE_X509_EXT);
10186
    if (x509->rawCRLInfo == NULL) {
10187
        return WOLFSSL_FAILURE;
10188
    }
10189
10190
    XMEMCPY(x509->rawCRLInfo, der, (word32)derSz);
10191
    x509->rawCRLInfoSz = derSz;
10192
    x509->CRLdistSet = 1;
10193
10194
    return WOLFSSL_SUCCESS;
10195
}
10196
10197
/* Add CRL Distribution Point URI.
10198
 * Encodes URI into proper CRLDistributionPoints DER format.
10199
 *
10200
 * x509     - Certificate to modify
10201
 * uri      - URI string (e.g., "http://crl.example.com/ca.crl")
10202
 * critical - Whether extension is critical
10203
 *
10204
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
10205
 */
10206
int wolfSSL_X509_CRL_add_dist_point(WOLFSSL_X509* x509,
10207
    const char* uri, int critical)
10208
{
10209
    word32 uriLen;
10210
    byte* derBuf = NULL;
10211
    word32 derSz;
10212
    word32 idx;
10213
    word32 uriTagLen;    /* [6] tag + length + URI */
10214
    word32 genNamesLen;  /* [0] IMPLICIT GeneralNames wrapper */
10215
    word32 distPtNmLen;  /* [0] EXPLICIT distributionPoint wrapper */
10216
    word32 distPtSeqLen; /* SEQUENCE for DistributionPoint */
10217
    word32 outerSeqLen;  /* SEQUENCE for CRLDistributionPoints */
10218
    int ret = WOLFSSL_SUCCESS;
10219
10220
    WOLFSSL_ENTER("wolfSSL_X509_CRL_add_dist_point");
10221
10222
    if (x509 == NULL || uri == NULL) {
10223
        return WOLFSSL_FAILURE;
10224
    }
10225
10226
    uriLen = (word32)XSTRLEN(uri);
10227
    if (uriLen == 0) {
10228
        WOLFSSL_MSG("URI empty");
10229
        return WOLFSSL_FAILURE;
10230
    }
10231
10232
    /*
10233
     * Encode CRL Distribution Points in DER format:
10234
     * CRLDistributionPoints ::= SEQUENCE OF DistributionPoint
10235
     * DistributionPoint ::= SEQUENCE {
10236
     *     distributionPoint [0] EXPLICIT DistributionPointName OPTIONAL
10237
     * }
10238
     * DistributionPointName ::= CHOICE {
10239
     *     fullName [0] IMPLICIT GeneralNames
10240
     * }
10241
     * GeneralNames ::= SEQUENCE OF GeneralName
10242
     * GeneralName ::= [6] IMPLICIT IA5String (uniformResourceIdentifier)
10243
     */
10244
10245
    /* Calculate sizes from innermost to outermost */
10246
    /* [6] tag (1 byte) + length encoding + URI data */
10247
    uriTagLen = ASN_TAG_SZ + SetLength(uriLen, NULL) + uriLen;
10248
    /* [0] CONSTRUCTED tag (1 byte) + length encoding + uriTagLen */
10249
    genNamesLen = ASN_TAG_SZ + SetLength(uriTagLen, NULL) + uriTagLen;
10250
    /* [0] CONSTRUCTED tag (1 byte) + length encoding + genNamesLen */
10251
    distPtNmLen = ASN_TAG_SZ + SetLength(genNamesLen, NULL) + genNamesLen;
10252
    /* SEQUENCE header + distPtNmLen */
10253
    distPtSeqLen = SetSequence(distPtNmLen, NULL) + distPtNmLen;
10254
    /* Outer SEQUENCE header + distPtSeqLen */
10255
    outerSeqLen = SetSequence(distPtSeqLen, NULL) + distPtSeqLen;
10256
10257
    derSz = outerSeqLen;
10258
10259
    /* Allocate buffer for DER encoding */
10260
    derBuf = (byte*)XMALLOC(derSz, x509->heap, DYNAMIC_TYPE_X509_EXT);
10261
    if (derBuf == NULL) {
10262
        return WOLFSSL_FAILURE;
10263
    }
10264
10265
    /* Build forward using SetSequence/SetHeader/SetLength */
10266
    idx = 0;
10267
10268
    /* SEQUENCE for CRLDistributionPoints (outer) */
10269
    idx += SetSequence(distPtSeqLen, derBuf + idx);
10270
10271
    /* SEQUENCE for DistributionPoint */
10272
    idx += SetSequence(distPtNmLen, derBuf + idx);
10273
10274
    /* [0] EXPLICIT wrapper for distributionPoint */
10275
    derBuf[idx++] = (ASN_CONTEXT_SPECIFIC | ASN_CONSTRUCTED);
10276
    idx += SetLength(genNamesLen, derBuf + idx);
10277
10278
    /* [0] IMPLICIT wrapper for GeneralNames (constructed) */
10279
    derBuf[idx++] = (ASN_CONTEXT_SPECIFIC | ASN_CONSTRUCTED);
10280
    idx += SetLength(uriTagLen, derBuf + idx);
10281
10282
    /* [6] IMPLICIT IA5String tag for URI (context-specific, primitive) */
10283
    derBuf[idx++] = (ASN_CONTEXT_SPECIFIC | 6); /* [6] tag */
10284
    idx += SetLength(uriLen, derBuf + idx);
10285
10286
    /* Copy URI string */
10287
    XMEMCPY(derBuf + idx, uri, uriLen);
10288
    idx += uriLen;
10289
10290
    /* Store the encoded CRL info in x509 */
10291
    {
10292
        ret = wolfSSL_X509_CRL_set_dist_points(x509, derBuf, (int)idx);
10293
        if (ret == WOLFSSL_SUCCESS && critical) {
10294
            x509->CRLdistCrit = 1;
10295
        }
10296
    }
10297
10298
    XFREE(derBuf, x509->heap, DYNAMIC_TYPE_X509_EXT);
10299
10300
    return ret;
10301
}
10302
#endif /* WOLFSSL_CERT_EXT && (OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL) */
10303
10304
#ifdef OPENSSL_EXTRA
10305
10306
10307
WOLFSSL_X509_VERIFY_PARAM* wolfSSL_X509_VERIFY_PARAM_new(void)
10308
{
10309
    WOLFSSL_X509_VERIFY_PARAM *param = NULL;
10310
    param = (WOLFSSL_X509_VERIFY_PARAM*)XMALLOC(
10311
            sizeof(WOLFSSL_X509_VERIFY_PARAM), NULL, DYNAMIC_TYPE_OPENSSL);
10312
    if (param != NULL)
10313
        XMEMSET(param, 0, sizeof(WOLFSSL_X509_VERIFY_PARAM ));
10314
10315
    return(param);
10316
}
10317
10318
10319
void wolfSSL_X509_VERIFY_PARAM_free(WOLFSSL_X509_VERIFY_PARAM *param)
10320
{
10321
    XFREE(param, NULL, DYNAMIC_TYPE_OPENSSL);
10322
}
10323
10324
10325
/* Sets flags by OR'ing with existing value. */
10326
int wolfSSL_X509_VERIFY_PARAM_set_flags(WOLFSSL_X509_VERIFY_PARAM *param,
10327
        unsigned long flags)
10328
{
10329
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
10330
10331
    if (param != NULL) {
10332
        param->flags |= flags;
10333
        ret = WOLFSSL_SUCCESS;
10334
    }
10335
10336
    return ret;
10337
}
10338
10339
10340
int wolfSSL_X509_VERIFY_PARAM_get_flags(WOLFSSL_X509_VERIFY_PARAM *param)
10341
{
10342
    int ret = 0;
10343
10344
    if (param != NULL) {
10345
        ret = (int)param->flags;
10346
    }
10347
10348
    return ret;
10349
}
10350
10351
10352
int wolfSSL_X509_VERIFY_PARAM_clear_flags(WOLFSSL_X509_VERIFY_PARAM *param,
10353
        unsigned long flags)
10354
{
10355
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
10356
10357
    if (param != NULL) {
10358
        param->flags &= ~flags;
10359
        ret = WOLFSSL_SUCCESS;
10360
    }
10361
10362
    return ret;
10363
}
10364
10365
/* note WOLFSSL_X509_VERIFY_PARAM does not record purpose, trust, depth, or
10366
 * auth_level.
10367
 */
10368
static const WOLFSSL_X509_VERIFY_PARAM x509_verify_param_builtins[] = {
10369
    {
10370
     "ssl_client",              /* name */
10371
     0,                         /* check_time */
10372
     0,                         /* inherit_flags */
10373
     0,                         /* flags */
10374
     "",                        /* hostname */
10375
     0,                         /* hostFlags */
10376
     ""                         /* ipasc */
10377
    },
10378
    {
10379
     "ssl_server",              /* name */
10380
     0,                         /* check_time */
10381
     0,                         /* inherit_flags */
10382
     0,                         /* flags */
10383
     "",                        /* hostname */
10384
     0,                         /* hostFlags */
10385
     ""                         /* ipasc */
10386
    }
10387
};
10388
10389
const WOLFSSL_X509_VERIFY_PARAM *wolfSSL_X509_VERIFY_PARAM_lookup(
10390
    const char *name)
10391
{
10392
    const WOLFSSL_X509_VERIFY_PARAM *param = &x509_verify_param_builtins[0],
10393
        *param_end = &x509_verify_param_builtins[
10394
                                         XELEM_CNT(x509_verify_param_builtins)];
10395
10396
    if (name == NULL) {
10397
        return NULL;
10398
    }
10399
    while (param < param_end) {
10400
        if (XSTRCMP(name, param->name) == 0)
10401
            return param;
10402
        ++param;
10403
    }
10404
    return NULL;
10405
}
10406
10407
/* inherits properties of param "to" to param "from"
10408
*
10409
* WOLFSSL_VPARAM_DEFAULT          any values in "src" is copied
10410
*                                 if "src" value is new for "to".
10411
* WOLFSSL_VPARAM_OVERWRITE        all values of "form" are copied to "to"
10412
* WOLFSSL_VPARAM_RESET_FLAGS      the flag values are copied, not Ored
10413
* WOLFSSL_VPARAM_LOCKED           don't copy any values
10414
* WOLFSSL_VPARAM_ONCE             the current inherit_flags is zerroed
10415
*/
10416
int wolfSSL_X509_VERIFY_PARAM_inherit(WOLFSSL_X509_VERIFY_PARAM *to,
10417
                                         const WOLFSSL_X509_VERIFY_PARAM *from)
10418
{
10419
    int ret = WOLFSSL_SUCCESS;
10420
    int isOverWrite = 0;
10421
    int isDefault = 0;
10422
    unsigned int flags;
10423
10424
    /* sanity check */
10425
    if (!to || !from) {
10426
        /* be compatible to openssl return value */
10427
        return WOLFSSL_SUCCESS;
10428
    }
10429
    flags = to->inherit_flags | from->inherit_flags;
10430
10431
    if (flags & WOLFSSL_VPARAM_LOCKED) {
10432
        return WOLFSSL_SUCCESS;
10433
    }
10434
10435
    if (flags & WOLFSSL_VPARAM_ONCE) {
10436
        to->inherit_flags = 0;
10437
    }
10438
10439
    isOverWrite = (flags & WOLFSSL_VPARAM_OVERWRITE);
10440
    isDefault = (flags & WOLFSSL_VPARAM_DEFAULT);
10441
10442
    /* copy check_time if check time is not set */
10443
    if ((to->flags & WOLFSSL_USE_CHECK_TIME) == 0 || isOverWrite) {
10444
           to->check_time = from->check_time;
10445
           to->flags &= ~WOLFSSL_USE_CHECK_TIME;
10446
    }
10447
    /* host name */
10448
    if (isOverWrite ||
10449
        (from->hostName[0] != 0 && (to->hostName[0] == 0 || isDefault))) {
10450
            if (!(ret = wolfSSL_X509_VERIFY_PARAM_set1_host(to, from->hostName,
10451
                (unsigned int)XSTRLEN(from->hostName))))
10452
                return ret;
10453
        to->hostFlags = from->hostFlags;
10454
    }
10455
    /* ip ascii */
10456
    if (isOverWrite ||
10457
        (from->ipasc[0] != 0 && (to->ipasc[0] == 0 || isDefault))) {
10458
10459
            if (!(ret = wolfSSL_X509_VERIFY_PARAM_set1_ip_asc(to, from->ipasc)))
10460
                return ret;
10461
    }
10462
10463
    if (flags & WOLFSSL_VPARAM_RESET_FLAGS)
10464
        to->flags = 0;
10465
10466
    to->flags |= from->flags;
10467
10468
    return ret;
10469
}
10470
10471
/******************************************************************************
10472
* wolfSSL_X509_VERIFY_PARAM_set1_host - sets the DNS hostname to name
10473
* hostnames is cleared if name is NULL or empty.
10474
*
10475
* RETURNS:
10476
*
10477
*/
10478
int wolfSSL_X509_VERIFY_PARAM_set1_host(WOLFSSL_X509_VERIFY_PARAM* pParam,
10479
                                         const char* name,
10480
                                         unsigned int nameSz)
10481
{
10482
    WOLFSSL_ENTER("wolfSSL_X509_VERIFY_PARAM_set1_host");
10483
10484
    if (pParam == NULL)
10485
        return WOLFSSL_FAILURE;
10486
10487
    /* If name is NULL, clear hostname. */
10488
    if (name == NULL) {
10489
        XMEMSET(pParam->hostName, 0, WOLFSSL_HOST_NAME_MAX);
10490
        return WOLFSSL_SUCCESS;
10491
    }
10492
10493
    /* If name is NULL-terminated, namelen can be set to zero. */
10494
    if (nameSz == 0) {
10495
        nameSz = (unsigned int)XSTRLEN(name);
10496
    }
10497
10498
    if (nameSz > 0 && name[nameSz - 1] == '\0')
10499
        nameSz--;
10500
10501
    if (nameSz > WOLFSSL_HOST_NAME_MAX-1) {
10502
        WOLFSSL_MSG("Truncating name");
10503
        nameSz = WOLFSSL_HOST_NAME_MAX-1;
10504
    }
10505
10506
    if (nameSz > 0) {
10507
        XMEMCPY(pParam->hostName, name, nameSz);
10508
        XMEMSET(pParam->hostName + nameSz, 0,
10509
                WOLFSSL_HOST_NAME_MAX - nameSz);
10510
    }
10511
10512
    pParam->hostName[nameSz] = '\0';
10513
10514
    return WOLFSSL_SUCCESS;
10515
}
10516
10517
/* Set VERIFY PARAM from "from" pointer to "to" pointer */
10518
int wolfSSL_X509_VERIFY_PARAM_set1(WOLFSSL_X509_VERIFY_PARAM *to,
10519
                                   const WOLFSSL_X509_VERIFY_PARAM *from)
10520
{
10521
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
10522
    unsigned int _inherit_flags;
10523
10524
    if (!to) {
10525
        return ret;
10526
    }
10527
    /* keeps the inherit flags for save */
10528
    _inherit_flags = to->inherit_flags;
10529
10530
    /* Ored DEFAULT inherit flag property to copy "from" contents to "to"
10531
    *  contents
10532
    */
10533
    to->inherit_flags |= WOLFSSL_VPARAM_DEFAULT;
10534
10535
    ret = wolfSSL_X509_VERIFY_PARAM_inherit(to, from);
10536
10537
    /* restore inherit flag */
10538
    to->inherit_flags = _inherit_flags;
10539
10540
    return ret;
10541
}
10542
10543
/* Set the host flag in the X509_VERIFY_PARAM structure */
10544
void wolfSSL_X509_VERIFY_PARAM_set_hostflags(WOLFSSL_X509_VERIFY_PARAM* param,
10545
                                             unsigned int flags)
10546
{
10547
    if (param != NULL) {
10548
        param->hostFlags = flags;
10549
    }
10550
}
10551
10552
/* Sets the expected IP address to ipasc.
10553
 *
10554
 * param is a pointer to the X509_VERIFY_PARAM structure
10555
 * ipasc is a NULL-terminated string with N.N.N.N for IPv4 and
10556
 *       HH:HH ... HH:HH for IPv6. There is no validation performed on the
10557
 *       parameter, and it must be an exact match with the IP in the cert.
10558
 *
10559
 * return 1 for success and 0 for failure*/
10560
int wolfSSL_X509_VERIFY_PARAM_set1_ip_asc(WOLFSSL_X509_VERIFY_PARAM *param,
10561
        const char *ipasc)
10562
{
10563
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
10564
10565
    if (param != NULL) {
10566
        if (ipasc == NULL) {
10567
            param->ipasc[0] = '\0';
10568
        }
10569
        else {
10570
            XSTRLCPY(param->ipasc, ipasc, WOLFSSL_MAX_IPSTR);
10571
            param->ipasc[WOLFSSL_MAX_IPSTR-1] = '\0';
10572
        }
10573
        ret = WOLFSSL_SUCCESS;
10574
    }
10575
10576
    return ret;
10577
}
10578
/* Sets the expected IP address to ip(asc)
10579
 *          by re-constructing IP address in ascii
10580
 * @param  param is a pointer to the X509_VERIFY_PARAM structure
10581
 * @param  ip    in binary format of ip address
10582
 * @param  iplen size of ip, 4 for ipv4, 16 for ipv6
10583
 * @return 1 for success and 0 for failure
10584
 */
10585
int wolfSSL_X509_VERIFY_PARAM_set1_ip(WOLFSSL_X509_VERIFY_PARAM* param,
10586
    const unsigned char* ip, size_t iplen)
10587
{
10588
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
10589
#ifndef NO_FILESYSTEM
10590
    char* buf = NULL;
10591
    char* p = NULL;
10592
    word32 val = 0;
10593
    int i;
10594
    const size_t max_ipv6_len = 40;
10595
    byte write_zero = 0;
10596
#endif
10597
10598
    /* sanity check */
10599
    if (param == NULL || (iplen != 0 && iplen != 4 && iplen != 16)) {
10600
        WOLFSSL_MSG("bad function arg");
10601
        return ret;
10602
    }
10603
    if (ip == NULL && iplen != 0) {
10604
        WOLFSSL_MSG("bad function arg");
10605
        return ret;
10606
    }
10607
#ifndef NO_FILESYSTEM
10608
    if (iplen == 4) {
10609
        /* ipv4 www.xxx.yyy.zzz max 15 length + Null termination */
10610
        buf = (char*)XMALLOC(16, NULL, DYNAMIC_TYPE_TMP_BUFFER);
10611
        if (!buf) {
10612
            WOLFSSL_MSG("failed malloc");
10613
            return ret;
10614
        }
10615
10616
        (void)XSNPRINTF(buf, 16, "%d.%d.%d.%d", ip[0], ip[1], ip[2], ip[3]);
10617
        buf[15] = '\0'; /* null terminate */
10618
    }
10619
    else if (iplen == 16) {
10620
        /* ipv6 normal address scheme
10621
        *   y1:y2:y3:y4:y5:y6:y7:y8, len(yx):4, len(y1-y8):32. len(":"):7
10622
        *   Max len is 32 + 7 + 1(Termination) = 40 bytes
10623
        *
10624
        *   ipv6 dual address
10625
        *   Or y1:y2:y3:y4:y:y6:x.x.x.x yx is 4, y1-y6 is 24, ":" is 6
10626
        *   x.x.x.x is 15.
10627
        *   Max len is 24 + 6 + 15 + 1(Termination) = 46 bytes
10628
        *
10629
        *   Expect data in ip[16]
10630
        *   e.g (aaaa):(bbbb):(cccc):....(hhhh)
10631
        *   (aaaa) = (ip[0<<8)|ip[1]
10632
        *   ......
10633
        *   (hhhh) = (ip[14]<<8)|(ip[15])
10634
        *
10635
        *   e.g ::(gggg):(hhhh)
10636
        *   ip[0]-[11] = 0
10637
        *   (gggg) = (ip[12]<<8) |(ip[13])
10638
        *   (hhhh) = (ip[14]<<8) |(ip[15])
10639
        *
10640
        *   Because it is not able to know which ivp6 scheme uses from data to
10641
        *   reconstruct IP address, this function assumes
10642
        *   ivp6 normal address scheme, not dual address scheme,
10643
        *   to re-construct IP address in ascii.
10644
        */
10645
        buf = (char*)XMALLOC(max_ipv6_len, NULL, DYNAMIC_TYPE_TMP_BUFFER);
10646
        if (!buf) {
10647
            WOLFSSL_MSG("failed malloc");
10648
            return ret;
10649
        }
10650
        p = buf;
10651
        for (i = 0; i < 16; i += 2) {
10652
            val = (((word32)(ip[i]<<8)) | (ip[i+1])) & 0xFFFF;
10653
            if (val == 0) {
10654
                if (!write_zero) {
10655
                    *p = ':';
10656
                }
10657
                p++;
10658
                *p = '\0';
10659
                write_zero = 1;
10660
            }
10661
            else {
10662
                if (i != 0) {
10663
                    *p++ = ':';
10664
                }
10665
                (void)XSNPRINTF(p, max_ipv6_len - (size_t)(p - buf), "%x", val);
10666
            }
10667
            /* sanity check */
10668
            if (XSTRLEN(buf) > max_ipv6_len) {
10669
                WOLFSSL_MSG("The target ip address exceeds buffer length(40)");
10670
                XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
10671
                buf = NULL;
10672
                break;
10673
            }
10674
            /* move the pointer to the last */
10675
            /* XSTRLEN includes NULL because of XSPRINTF use */
10676
            p = buf + (XSTRLEN(buf));
10677
        }
10678
        /* termination */
10679
        if (i == 16 && buf) {
10680
            p--;
10681
            if ((*p) == ':') {
10682
                /* when the last character is :, the following segments are zero
10683
                 * Therefore, adding : and null termination */
10684
                p++;
10685
                *p++ = ':';
10686
                *p = '\0';
10687
            }
10688
        }
10689
    }
10690
    else {
10691
        WOLFSSL_MSG("iplen is zero, do nothing");
10692
        return WOLFSSL_SUCCESS;
10693
    }
10694
10695
    if (buf) {
10696
        /* set address to ip asc */
10697
        ret = wolfSSL_X509_VERIFY_PARAM_set1_ip_asc(param, buf);
10698
        XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
10699
    }
10700
#else
10701
    (void)param;
10702
    (void)ip;
10703
    (void)iplen;
10704
#endif
10705
10706
    return ret;
10707
}
10708
10709
#ifndef NO_WOLFSSL_STUB
10710
void wolfSSL_X509_OBJECT_free_contents(WOLFSSL_X509_OBJECT* obj)
10711
{
10712
    (void)obj;
10713
    WOLFSSL_STUB("X509_OBJECT_free_contents");
10714
}
10715
#endif
10716
10717
#ifndef NO_ASN_TIME
10718
int wolfSSL_X509_cmp_current_time(const WOLFSSL_ASN1_TIME* asnTime)
10719
{
10720
    return wolfSSL_X509_cmp_time(asnTime, NULL);
10721
}
10722
10723
/* return WOLFSSL_FATAL_ERROR if asnTime is earlier than or equal to cmpTime,
10724
 * and 1 otherwise
10725
 * return 0 on error
10726
 */
10727
int wolfSSL_X509_cmp_time(const WOLFSSL_ASN1_TIME* asnTime, time_t* cmpTime)
10728
{
10729
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
10730
    time_t tmpTime, *pTime = &tmpTime;
10731
    struct tm ts, *tmpTs, *ct;
10732
#if defined(NEED_TMP_TIME)
10733
    /* for use with gmtime_r */
10734
    struct tm tmpTimeStorage;
10735
10736
    tmpTs = &tmpTimeStorage;
10737
#else
10738
    tmpTs = NULL;
10739
#endif
10740
    (void)tmpTs;
10741
10742
    if (asnTime == NULL) {
10743
        return WOLFSSL_FAILURE;
10744
    }
10745
10746
    if (cmpTime == NULL) {
10747
        /* Use current time */
10748
        *pTime = wc_Time(0);
10749
    }
10750
    else {
10751
        pTime = cmpTime;
10752
    }
10753
10754
    if (wolfSSL_ASN1_TIME_to_tm((WOLFSSL_ASN1_TIME*)asnTime, &ts) !=
10755
                                                              WOLFSSL_SUCCESS) {
10756
        WOLFSSL_MSG("Failed to convert WOLFSSL_ASN1_TIME to struct tm.");
10757
        return WOLFSSL_FAILURE;
10758
    }
10759
10760
    /* Convert to time struct*/
10761
    ct = XGMTIME(pTime, tmpTs);
10762
10763
    if (ct == NULL)
10764
        return GETTIME_ERROR;
10765
10766
    /* DateGreaterThan returns 1 for >; 0 for <= */
10767
    ret = DateGreaterThan(&ts, ct) ? 1 : -1;
10768
10769
    return ret;
10770
}
10771
#endif /* !NO_ASN_TIME */
10772
10773
#if (defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)) && \
10774
    !defined(NO_ASN_TIME) && !defined(USER_TIME) && !defined(TIME_OVERRIDES)
10775
WOLFSSL_ASN1_TIME *wolfSSL_X509_time_adj_ex(WOLFSSL_ASN1_TIME *asnTime,
10776
    int offset_day, long offset_sec, time_t *in_tm)
10777
{
10778
    /* get current time if in_tm is null */
10779
    time_t t = in_tm ? *in_tm : wc_Time(0);
10780
    return wolfSSL_ASN1_TIME_adj(asnTime, t, offset_day, offset_sec);
10781
}
10782
10783
WOLFSSL_ASN1_TIME *wolfSSL_X509_time_adj(WOLFSSL_ASN1_TIME *asnTime,
10784
    long offset_sec, time_t *in_tm)
10785
{
10786
    return wolfSSL_X509_time_adj_ex(asnTime, 0, offset_sec, in_tm);
10787
}
10788
10789
WOLFSSL_ASN1_TIME* wolfSSL_X509_gmtime_adj(WOLFSSL_ASN1_TIME *s, long adj)
10790
{
10791
    return wolfSSL_X509_time_adj(s, adj, NULL);
10792
}
10793
#endif
10794
10795
int wolfSSL_sk_X509_REVOKED_num(WOLFSSL_STACK* sk)
10796
{
10797
    WOLFSSL_ENTER("wolfSSL_sk_X509_REVOKED_num");
10798
    if (sk != NULL) {
10799
        return (int)sk->num;
10800
    }
10801
    return 0;
10802
}
10803
10804
/* Free a WOLFSSL_X509_REVOKED and all its owned memory. */
10805
void wolfSSL_X509_REVOKED_free(WOLFSSL_X509_REVOKED* rev)
10806
{
10807
    if (rev == NULL) {
10808
        return;
10809
    }
10810
10811
    wolfSSL_ASN1_INTEGER_free(rev->serialNumber);
10812
    wolfSSL_ASN1_TIME_free(rev->revocationDate);
10813
10814
    if (rev->extensions != NULL) {
10815
        wolfSSL_sk_pop_free(rev->extensions, NULL);
10816
    }
10817
    if (rev->issuer != NULL) {
10818
        wolfSSL_sk_pop_free(rev->issuer, NULL);
10819
    }
10820
10821
    XFREE(rev, NULL, DYNAMIC_TYPE_OPENSSL);
10822
}
10823
10824
#ifdef HAVE_CRL
10825
/* Build a WOLFSSL_X509_REVOKED from an internal RevokedCert.
10826
 * Caller takes ownership of the returned object. */
10827
static WOLFSSL_X509_REVOKED* RevokedCertToRevoked(RevokedCert* rc, int seq)
10828
{
10829
    WOLFSSL_X509_REVOKED* rev;
10830
    WOLFSSL_ASN1_INTEGER* serial;
10831
10832
    if (rc == NULL) {
10833
        return NULL;
10834
    }
10835
10836
    rev = (WOLFSSL_X509_REVOKED*)XMALLOC(sizeof(WOLFSSL_X509_REVOKED), NULL,
10837
                                          DYNAMIC_TYPE_OPENSSL);
10838
    if (rev == NULL) {
10839
        return NULL;
10840
    }
10841
    XMEMSET(rev, 0, sizeof(WOLFSSL_X509_REVOKED));
10842
10843
    /* Serial number */
10844
    serial = wolfSSL_ASN1_INTEGER_new();
10845
    if (serial == NULL) {
10846
        XFREE(rev, NULL, DYNAMIC_TYPE_OPENSSL);
10847
        return NULL;
10848
    }
10849
    if (rc->serialSz > 0 && rc->serialSz <= EXTERNAL_SERIAL_SIZE) {
10850
        serial->data = (unsigned char*)XMALLOC((size_t)rc->serialSz, NULL,
10851
                                               DYNAMIC_TYPE_OPENSSL);
10852
        if (serial->data == NULL) {
10853
            wolfSSL_ASN1_INTEGER_free(serial);
10854
            XFREE(rev, NULL, DYNAMIC_TYPE_OPENSSL);
10855
            return NULL;
10856
        }
10857
        XMEMCPY(serial->data, rc->serialNumber, (size_t)rc->serialSz);
10858
        serial->length = rc->serialSz;
10859
        serial->dataMax = rc->serialSz;
10860
        serial->isDynamic = 1;
10861
    }
10862
    rev->serialNumber = serial;
10863
10864
    /* Revocation date */
10865
    {
10866
        WOLFSSL_ASN1_TIME* revDate = wolfSSL_ASN1_TIME_new();
10867
        if (revDate != NULL) {
10868
            int dateLen = 0;
10869
            /* Determine date length from the format byte */
10870
            if (rc->revDateFormat == ASN_UTC_TIME ||
10871
                    rc->revDateFormat == ASN_GENERALIZED_TIME) {
10872
                /* Find actual length: dates are null-terminated strings in
10873
                 * revDate buffer up to MAX_DATE_SIZE */
10874
                while (dateLen < MAX_DATE_SIZE && rc->revDate[dateLen] != 0)
10875
                    dateLen++;
10876
            }
10877
            if (dateLen > 0 && dateLen < MAX_DATE_SIZE) {
10878
                XMEMCPY(revDate->data, rc->revDate, (size_t)dateLen);
10879
                revDate->length = dateLen;
10880
                revDate->type = rc->revDateFormat;
10881
            }
10882
        }
10883
        rev->revocationDate = revDate;
10884
    }
10885
10886
    /* Reason code */
10887
    rev->reason = rc->reasonCode;
10888
10889
    /* Sequence (load order) */
10890
    rev->sequence = seq;
10891
10892
    /* issuer: left as NULL (indirect CRL not yet supported) */
10893
    /* extensions: left as NULL for now (raw DER available in RevokedCert
10894
     * but decoded STACK_OF(X509_EXTENSION) build not yet implemented) */
10895
10896
    return rev;
10897
}
10898
#endif /* HAVE_CRL */
10899
10900
WOLFSSL_STACK* wolfSSL_X509_CRL_get_REVOKED(WOLFSSL_X509_CRL* crl)
10901
{
10902
    WOLFSSL_ENTER("wolfSSL_X509_CRL_get_REVOKED");
10903
10904
    if (crl == NULL) {
10905
        return NULL;
10906
    }
10907
10908
#if defined(OPENSSL_EXTRA) && defined(HAVE_CRL)
10909
    /* Return cached stack if already built */
10910
    if (crl->revokedStack != NULL) {
10911
        return crl->revokedStack;
10912
    }
10913
10914
    /* Build the stack from the internal RevokedCert linked list */
10915
    if (crl->crlList != NULL) {
10916
        WOLFSSL_STACK* sk;
10917
        RevokedCert* rc;
10918
        int seq = 0;
10919
10920
        sk = wolfSSL_sk_new_null();
10921
        if (sk == NULL) {
10922
            return NULL;
10923
        }
10924
        sk->type = STACK_TYPE_X509_REVOKED;
10925
10926
        for (rc = crl->crlList->certs; rc != NULL; rc = rc->next) {
10927
            WOLFSSL_X509_REVOKED* rev = RevokedCertToRevoked(rc, seq);
10928
            if (rev == NULL) {
10929
                /* Clean up on failure */
10930
                wolfSSL_sk_pop_free(sk, NULL);
10931
                return NULL;
10932
            }
10933
            /* Push to stack. wolfSSL_sk_push returns total count on success. */
10934
            if (wolfSSL_sk_push(sk, rev) <= 0) {
10935
                wolfSSL_X509_REVOKED_free(rev);
10936
                wolfSSL_sk_pop_free(sk, NULL);
10937
                return NULL;
10938
            }
10939
            seq++;
10940
        }
10941
10942
        crl->revokedStack = sk;
10943
        return sk;
10944
    }
10945
#endif /* OPENSSL_EXTRA && HAVE_CRL */
10946
10947
    return NULL;
10948
}
10949
10950
WOLFSSL_X509_REVOKED* wolfSSL_sk_X509_REVOKED_value(
10951
                                    WOLFSSL_STACK* sk, int idx)
10952
{
10953
    WOLFSSL_ENTER("wolfSSL_sk_X509_REVOKED_value");
10954
10955
    if (sk == NULL) {
10956
        return NULL;
10957
    }
10958
10959
    return (WOLFSSL_X509_REVOKED*)wolfSSL_sk_value(sk, idx);
10960
}
10961
10962
/* Extension accessors for WOLFSSL_X509_REVOKED */
10963
int wolfSSL_X509_REVOKED_get_ext_count(const WOLFSSL_X509_REVOKED* rev)
10964
{
10965
    WOLFSSL_ENTER("wolfSSL_X509_REVOKED_get_ext_count");
10966
    if (rev != NULL && rev->extensions != NULL) {
10967
        return (int)rev->extensions->num;
10968
    }
10969
    return 0;
10970
}
10971
10972
WOLFSSL_X509_EXTENSION* wolfSSL_X509_REVOKED_get_ext(
10973
                                     const WOLFSSL_X509_REVOKED* rev, int loc)
10974
{
10975
    WOLFSSL_ENTER("wolfSSL_X509_REVOKED_get_ext");
10976
    if (rev != NULL && rev->extensions != NULL) {
10977
        return (WOLFSSL_X509_EXTENSION*)wolfSSL_sk_value(rev->extensions, loc);
10978
    }
10979
    return NULL;
10980
}
10981
10982
#endif /* OPENSSL_EXTRA */
10983
10984
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
10985
10986
WOLFSSL_ASN1_INTEGER* wolfSSL_X509_get_serialNumber(WOLFSSL_X509* x509)
10987
{
10988
    WOLFSSL_ASN1_INTEGER* a;
10989
    int i = 0;
10990
10991
    WOLFSSL_ENTER("wolfSSL_X509_get_serialNumber");
10992
10993
    if (x509 == NULL) {
10994
        WOLFSSL_MSG("NULL function argument");
10995
        return NULL;
10996
    }
10997
10998
    if (x509->serialNumber != NULL)
10999
       return x509->serialNumber;
11000
11001
    a = wolfSSL_ASN1_INTEGER_new();
11002
    if (a == NULL)
11003
        return NULL;
11004
11005
    /* Make sure there is space for the data, ASN.1 type and length. */
11006
    if (x509->serialSz > (WOLFSSL_ASN1_INTEGER_MAX - 2)) {
11007
        /* dynamically create data buffer, +2 for type and length */
11008
        a->data = (unsigned char*)XMALLOC(x509->serialSz + 2, NULL,
11009
                DYNAMIC_TYPE_OPENSSL);
11010
        if (a->data == NULL) {
11011
            wolfSSL_ASN1_INTEGER_free(a);
11012
            return NULL;
11013
        }
11014
        a->dataMax   = (unsigned int)x509->serialSz + 2;
11015
        a->isDynamic = 1;
11016
    }
11017
    else {
11018
        /* Use array instead of dynamic memory */
11019
        a->data    = a->intData;
11020
        a->dataMax = WOLFSSL_ASN1_INTEGER_MAX;
11021
    }
11022
11023
    #if defined(WOLFSSL_QT) || defined(WOLFSSL_HAPROXY)
11024
        XMEMCPY(&a->data[i], x509->serial, x509->serialSz);
11025
        a->length = x509->serialSz;
11026
    #else
11027
        a->data[i++] = ASN_INTEGER;
11028
        i += SetLength(x509->serialSz, a->data + i);
11029
        XMEMCPY(&a->data[i], x509->serial, x509->serialSz);
11030
        a->length = x509->serialSz + 2;
11031
    #endif
11032
11033
    x509->serialNumber = a;
11034
11035
    return a;
11036
}
11037
11038
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
11039
11040
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
11041
11042
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
11043
    defined(WOLFSSL_APACHE_HTTPD) || defined(WOLFSSL_HAPROXY) || \
11044
    defined(WOLFSSL_WPAS)
11045
WOLFSSL_X509_ALGOR* wolfSSL_X509_ALGOR_new(void)
11046
{
11047
    WOLFSSL_X509_ALGOR* ret;
11048
    ret = (WOLFSSL_X509_ALGOR*)XMALLOC(sizeof(WOLFSSL_X509_ALGOR), NULL,
11049
                                       DYNAMIC_TYPE_OPENSSL);
11050
    if (ret) {
11051
        XMEMSET(ret, 0, sizeof(WOLFSSL_X509_ALGOR));
11052
    }
11053
    return ret;
11054
}
11055
11056
void wolfSSL_X509_ALGOR_free(WOLFSSL_X509_ALGOR *alg)
11057
{
11058
    if (alg) {
11059
        wolfSSL_ASN1_OBJECT_free(alg->algorithm);
11060
        wolfSSL_ASN1_TYPE_free(alg->parameter);
11061
        XFREE(alg, NULL, DYNAMIC_TYPE_OPENSSL);
11062
    }
11063
}
11064
11065
/* Returns X509_ALGOR struct with signature algorithm */
11066
const WOLFSSL_X509_ALGOR* wolfSSL_X509_get0_tbs_sigalg(const WOLFSSL_X509 *x509)
11067
{
11068
    WOLFSSL_ENTER("wolfSSL_X509_get0_tbs_sigalg");
11069
11070
    if (x509 == NULL) {
11071
        WOLFSSL_MSG("x509 struct NULL error");
11072
        return NULL;
11073
    }
11074
11075
    return &x509->algor;
11076
}
11077
11078
/* Sets paobj pointer to X509_ALGOR signature algorithm */
11079
void wolfSSL_X509_ALGOR_get0(const WOLFSSL_ASN1_OBJECT **paobj, int *pptype,
11080
                            const void **ppval, const WOLFSSL_X509_ALGOR *algor)
11081
{
11082
    WOLFSSL_ENTER("wolfSSL_X509_ALGOR_get0");
11083
11084
    if (!algor) {
11085
        WOLFSSL_MSG("algor object is NULL");
11086
        return;
11087
    }
11088
11089
    if (paobj)
11090
        *paobj = algor->algorithm;
11091
    if (ppval && algor->parameter)
11092
        *ppval = algor->parameter->value.ptr;
11093
    if (pptype) {
11094
        if (algor->parameter) {
11095
            *pptype = algor->parameter->type;
11096
        }
11097
        else {
11098
            /* Default to WOLFSSL_V_ASN1_OBJECT */
11099
            *pptype = WOLFSSL_V_ASN1_OBJECT;
11100
        }
11101
    }
11102
}
11103
11104
/**
11105
 * Populate algor members.
11106
 *
11107
 * @param algor The object to be set
11108
 * @param aobj The value to be set in algor->algorithm
11109
 * @param ptype The type of algor->parameter
11110
 * @param pval The value of algor->parameter
11111
 * @return WOLFSSL_SUCCESS on success
11112
 *         WOLFSSL_FAILURE on missing parameters or bad malloc
11113
 */
11114
int wolfSSL_X509_ALGOR_set0(WOLFSSL_X509_ALGOR *algor,
11115
                            WOLFSSL_ASN1_OBJECT *aobj, int ptype, void *pval)
11116
{
11117
    if (!algor) {
11118
        return WOLFSSL_FAILURE;
11119
    }
11120
11121
    if (!algor->parameter) {
11122
        algor->parameter = wolfSSL_ASN1_TYPE_new();
11123
        if (!algor->parameter) {
11124
            return WOLFSSL_FAILURE;
11125
        }
11126
    }
11127
11128
    if (aobj) {
11129
        algor->algorithm = aobj;
11130
    }
11131
    wolfSSL_ASN1_TYPE_set(algor->parameter, ptype, pval);
11132
11133
    return WOLFSSL_SUCCESS;
11134
}
11135
11136
/**
11137
 * Serialize object to DER encoding
11138
 *
11139
 * @param alg Object to serialize
11140
 * @param pp  Output
11141
 * @return Length on success
11142
 *         Negative number on failure
11143
 */
11144
int wolfSSL_i2d_X509_ALGOR(const WOLFSSL_X509_ALGOR* alg,
11145
        unsigned char** pp)
11146
{
11147
    int len;
11148
    word32 oid = 0;
11149
    word32 idx = 0;
11150
    unsigned char* buf = NULL;
11151
11152
    if (alg == NULL || alg->algorithm == 0) {
11153
        WOLFSSL_MSG("alg is NULL or algorithm not set");
11154
        return WOLFSSL_FATAL_ERROR;
11155
    }
11156
11157
    if (GetObjectId(alg->algorithm->obj, &idx, &oid,
11158
            (word32)alg->algorithm->grp, alg->algorithm->objSz) < 0) {
11159
        WOLFSSL_MSG("Issue getting OID of object");
11160
        return WOLFSSL_FATAL_ERROR;
11161
    }
11162
11163
    len = (int)SetAlgoID((int)oid, NULL, alg->algorithm->grp, 0);
11164
    if (len == 0) {
11165
        WOLFSSL_MSG("SetAlgoID error");
11166
        return WOLFSSL_FATAL_ERROR;
11167
    }
11168
11169
    if (pp != NULL) {
11170
        if (*pp != NULL)
11171
            buf = *pp;
11172
        else {
11173
            buf = (byte*)XMALLOC((size_t)len, NULL, DYNAMIC_TYPE_ASN1);
11174
            if (buf == NULL)
11175
                return WOLFSSL_FATAL_ERROR;
11176
        }
11177
11178
        len = (int)SetAlgoID((int)oid, buf, alg->algorithm->grp, 0);
11179
        if (len == 0) {
11180
            WOLFSSL_MSG("SetAlgoID error");
11181
            if (*pp == NULL)
11182
                XFREE(buf, NULL, DYNAMIC_TYPE_ASN1);
11183
            return WOLFSSL_FATAL_ERROR;
11184
        }
11185
11186
        if (*pp != NULL)
11187
            *pp += len;
11188
        else
11189
            *pp = buf;
11190
    }
11191
11192
    return len;
11193
}
11194
11195
WOLFSSL_X509_ALGOR* wolfSSL_d2i_X509_ALGOR(WOLFSSL_X509_ALGOR** out,
11196
        const byte** src, long len)
11197
{
11198
    WOLFSSL_X509_ALGOR* ret = NULL;
11199
    word32 idx = 0;
11200
    word32 oid = 0;
11201
    int grp;
11202
11203
    WOLFSSL_ENTER("wolfSSL_d2i_X509_ALGOR");
11204
11205
    if (src == NULL || *src == NULL || len == 0)
11206
        return NULL;
11207
11208
    if (GetAlgoId(*src, &idx, &oid, oidIgnoreType, (word32)len) != 0)
11209
        return NULL;
11210
11211
    /* Try to guess the type */
11212
    for (grp = 0; grp < oidIgnoreType; grp++) {
11213
        word32 oidSz;
11214
        if (OidFromId(oid, (word32)grp, &oidSz) != NULL)
11215
            break;
11216
    }
11217
    if (grp == oidIgnoreType)
11218
        return NULL;
11219
11220
    ret = wolfSSL_X509_ALGOR_new();
11221
    if (ret == NULL)
11222
        return NULL;
11223
11224
    ret->algorithm = wolfSSL_OBJ_nid2obj(oid2nid(oid, grp));
11225
    if (ret->algorithm == NULL) {
11226
        wolfSSL_X509_ALGOR_free(ret);
11227
        return NULL;
11228
    }
11229
    *src += idx;
11230
11231
    if (out != NULL) {
11232
        if (*out != NULL)
11233
            wolfSSL_X509_ALGOR_free(*out);
11234
        *out = ret;
11235
    }
11236
11237
    return ret;
11238
}
11239
11240
/**
11241
 * Allocate a new WOLFSSL_X509_PUBKEY object.
11242
 *
11243
 * @return New zero'ed WOLFSSL_X509_PUBKEY object
11244
 */
11245
WOLFSSL_X509_PUBKEY *wolfSSL_X509_PUBKEY_new(void)
11246
{
11247
    WOLFSSL_X509_PUBKEY *ret;
11248
    ret = (WOLFSSL_X509_PUBKEY*)XMALLOC(sizeof(WOLFSSL_X509_PUBKEY), NULL,
11249
                                        DYNAMIC_TYPE_OPENSSL);
11250
    if (!ret) {
11251
        return NULL;
11252
    }
11253
    XMEMSET(ret, 0, sizeof(WOLFSSL_X509_PUBKEY));
11254
    ret->algor = wolfSSL_X509_ALGOR_new();
11255
    if (!ret->algor) {
11256
        wolfSSL_X509_PUBKEY_free(ret);
11257
        return NULL;
11258
    }
11259
    return ret;
11260
}
11261
11262
/**
11263
 * Free WOLFSSL_X509_PUBKEY and all its members.
11264
 *
11265
 * @param at Object to free
11266
 */
11267
void wolfSSL_X509_PUBKEY_free(WOLFSSL_X509_PUBKEY *x)
11268
{
11269
    if (x) {
11270
        if (x->algor) {
11271
            wolfSSL_X509_ALGOR_free(x->algor);
11272
        }
11273
        if (x->pkey) {
11274
            wolfSSL_EVP_PKEY_free(x->pkey);
11275
        }
11276
        XFREE(x, NULL, DYNAMIC_TYPE_OPENSSL);
11277
    }
11278
}
11279
11280
/* Returns X509_PUBKEY structure containing X509_ALGOR and EVP_PKEY */
11281
WOLFSSL_X509_PUBKEY* wolfSSL_X509_get_X509_PUBKEY(const WOLFSSL_X509* x509)
11282
{
11283
    WOLFSSL_ENTER("wolfSSL_X509_get_X509_PUBKEY");
11284
11285
    if (x509 == NULL) {
11286
        WOLFSSL_MSG("x509 struct NULL error");
11287
        return NULL;
11288
    }
11289
11290
    return (WOLFSSL_X509_PUBKEY*)&x509->key;
11291
}
11292
11293
/* Sets ppkalg pointer to X509_PUBKEY algorithm. Returns WOLFSSL_SUCCESS on
11294
    success or WOLFSSL_FAILURE on error. */
11295
int wolfSSL_X509_PUBKEY_get0_param(WOLFSSL_ASN1_OBJECT **ppkalg,
11296
     const unsigned char **pk, int *ppklen, WOLFSSL_X509_ALGOR **pa,
11297
     WOLFSSL_X509_PUBKEY *pub)
11298
{
11299
    WOLFSSL_ENTER("wolfSSL_X509_PUBKEY_get0_param");
11300
11301
    if (!pub || !pub->pubKeyOID) {
11302
        WOLFSSL_MSG("X509_PUBKEY struct not populated");
11303
        return WOLFSSL_FAILURE;
11304
    }
11305
11306
    if (!pub->algor) {
11307
        if (!(pub->algor = wolfSSL_X509_ALGOR_new())) {
11308
            return WOLFSSL_FAILURE;
11309
        }
11310
        pub->algor->algorithm = wolfSSL_OBJ_nid2obj(pub->pubKeyOID);
11311
        if (pub->algor->algorithm == NULL) {
11312
            WOLFSSL_MSG("Failed to create object from NID");
11313
            return WOLFSSL_FAILURE;
11314
        }
11315
    }
11316
11317
    if (pa)
11318
        *pa = pub->algor;
11319
    if (ppkalg)
11320
        *ppkalg = pub->algor->algorithm;
11321
    if (pk)
11322
        *pk = (unsigned char*)pub->pkey->pkey.ptr;
11323
    if (ppklen)
11324
        *ppklen = pub->pkey->pkey_sz;
11325
11326
    return WOLFSSL_SUCCESS;
11327
}
11328
11329
/* Returns a pointer to the pkey when passed a key */
11330
WOLFSSL_EVP_PKEY* wolfSSL_X509_PUBKEY_get(WOLFSSL_X509_PUBKEY* key)
11331
{
11332
    WOLFSSL_ENTER("wolfSSL_X509_PUBKEY_get");
11333
    if (key == NULL || key->pkey == NULL) {
11334
        WOLFSSL_LEAVE("wolfSSL_X509_PUBKEY_get", BAD_FUNC_ARG);
11335
        return NULL;
11336
    }
11337
    if (wolfSSL_EVP_PKEY_up_ref(key->pkey) != WOLFSSL_SUCCESS) {
11338
        WOLFSSL_LEAVE("wolfSSL_X509_PUBKEY_get", BAD_MUTEX_E);
11339
        return NULL;
11340
    }
11341
    WOLFSSL_LEAVE("wolfSSL_X509_PUBKEY_get", WOLFSSL_SUCCESS);
11342
    return key->pkey;
11343
}
11344
11345
int wolfSSL_X509_PUBKEY_set(WOLFSSL_X509_PUBKEY **x, WOLFSSL_EVP_PKEY *key)
11346
{
11347
    WOLFSSL_X509_PUBKEY *pk = NULL;
11348
    int ptype;
11349
    void *pval;
11350
#ifndef NO_DSA
11351
    WOLFSSL_ASN1_STRING *str;
11352
#endif
11353
#ifdef HAVE_ECC
11354
    int nid;
11355
    const WOLFSSL_EC_GROUP *group;
11356
#endif
11357
    WOLFSSL_ASN1_OBJECT *keyTypeObj;
11358
11359
    WOLFSSL_ENTER("wolfSSL_X509_PUBKEY_set");
11360
11361
    if (!x || !key) {
11362
        return WOLFSSL_FAILURE;
11363
    }
11364
11365
    if (!(pk = wolfSSL_X509_PUBKEY_new())) {
11366
        return WOLFSSL_FAILURE;
11367
    }
11368
11369
    switch (key->type) {
11370
#ifndef NO_RSA
11371
    case WC_EVP_PKEY_RSA:
11372
        pval = NULL;
11373
        ptype = WOLFSSL_V_ASN1_NULL;
11374
        pk->pubKeyOID = RSAk;
11375
        break;
11376
#endif
11377
#ifndef NO_DSA
11378
    case WC_EVP_PKEY_DSA:
11379
        if (!key->dsa->p || !key->dsa->q || !key->dsa->g)
11380
            goto error;
11381
11382
        str = wolfSSL_ASN1_STRING_new();
11383
        if (str == NULL)
11384
            goto error;
11385
11386
        str->length = wolfSSL_i2d_DSAparams(key->dsa,
11387
             (unsigned char **)&str->data);
11388
        if (str->length <= 0) {
11389
            wolfSSL_ASN1_STRING_free(str);
11390
            goto error;
11391
        }
11392
        str->isDynamic = 1;
11393
11394
        pval = str;
11395
        ptype = WOLFSSL_V_ASN1_SEQUENCE;
11396
        pk->pubKeyOID = DSAk;
11397
        break;
11398
#endif
11399
#ifdef HAVE_ECC
11400
    case WC_EVP_PKEY_EC:
11401
        group = wolfSSL_EC_KEY_get0_group(key->ecc);
11402
        if (!group)
11403
            goto error;
11404
11405
        nid = wolfSSL_EC_GROUP_get_curve_name(group);
11406
        if (nid <= 0) {
11407
            /* TODO: Add support for no nid case */
11408
            WOLFSSL_MSG("nid not found");
11409
            goto error;
11410
        }
11411
11412
        pval = wolfSSL_OBJ_nid2obj(nid);
11413
        if (!pval)
11414
            goto error;
11415
11416
        ptype = WOLFSSL_V_ASN1_OBJECT;
11417
        pk->pubKeyOID = ECDSAk;
11418
        break;
11419
#endif
11420
    default:
11421
        WOLFSSL_MSG("Unknown key type");
11422
        goto error;
11423
    }
11424
11425
    keyTypeObj = wolfSSL_OBJ_nid2obj(key->type);
11426
    if (keyTypeObj == NULL) {
11427
        if (ptype == WOLFSSL_V_ASN1_OBJECT)
11428
            wolfSSL_ASN1_OBJECT_free((WOLFSSL_ASN1_OBJECT *)pval);
11429
        else
11430
            wolfSSL_ASN1_STRING_free((WOLFSSL_ASN1_STRING *)pval);
11431
        goto error;
11432
    }
11433
    if (!wolfSSL_X509_ALGOR_set0(pk->algor, keyTypeObj, ptype, pval)) {
11434
        WOLFSSL_MSG("Failed to create algorithm object");
11435
        wolfSSL_ASN1_OBJECT_free(keyTypeObj);
11436
        if (ptype == WOLFSSL_V_ASN1_OBJECT)
11437
            wolfSSL_ASN1_OBJECT_free((WOLFSSL_ASN1_OBJECT *)pval);
11438
        else
11439
            wolfSSL_ASN1_STRING_free((WOLFSSL_ASN1_STRING *)pval);
11440
        goto error;
11441
    }
11442
11443
    if (!wolfSSL_EVP_PKEY_up_ref(key)) {
11444
        WOLFSSL_MSG("Failed to up key reference");
11445
        goto error;
11446
    }
11447
    pk->pkey = key;
11448
11449
    wolfSSL_X509_PUBKEY_free(*x);
11450
    *x = pk;
11451
    return WOLFSSL_SUCCESS;
11452
error:
11453
    if (pk) {
11454
        wolfSSL_X509_PUBKEY_free(pk);
11455
    }
11456
    return WOLFSSL_FAILURE;
11457
}
11458
11459
#endif /* OPENSSL_ALL || OPENSSL_EXTRA || WOLFSSL_APACHE_HTTPD ||
11460
        * WOLFSSL_HAPROXY || WOLFSSL_WPAS */
11461
11462
#if defined(OPENSSL_EXTRA) && !defined(NO_CERTS) && !defined(NO_ASN) && \
11463
    !defined(NO_PWDBASED)
11464
11465
int wolfSSL_i2d_X509_PUBKEY(WOLFSSL_X509_PUBKEY* x509_PubKey,
11466
    unsigned char** der)
11467
{
11468
    if (x509_PubKey == NULL)
11469
        return WOLFSSL_FATAL_ERROR;
11470
    return wolfSSL_i2d_PublicKey(x509_PubKey->pkey, der);
11471
}
11472
11473
#endif /* OPENSSL_EXTRA && !NO_CERTS && !NO_ASN && !NO_PWDBASED */
11474
11475
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
11476
11477
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
11478
WOLFSSL_BASIC_CONSTRAINTS* wolfSSL_BASIC_CONSTRAINTS_new(void)
11479
{
11480
    WOLFSSL_BASIC_CONSTRAINTS* bc;
11481
    bc = (WOLFSSL_BASIC_CONSTRAINTS*)
11482
          XMALLOC(sizeof(WOLFSSL_BASIC_CONSTRAINTS), NULL,
11483
          DYNAMIC_TYPE_X509_EXT);
11484
    if (bc == NULL) {
11485
        WOLFSSL_MSG("Failed to malloc basic constraints");
11486
        return NULL;
11487
    }
11488
    XMEMSET(bc, 0, sizeof(WOLFSSL_BASIC_CONSTRAINTS));
11489
    return bc;
11490
}
11491
11492
/* frees the wolfSSL_BASIC_CONSTRAINTS object */
11493
void wolfSSL_BASIC_CONSTRAINTS_free(WOLFSSL_BASIC_CONSTRAINTS *bc)
11494
{
11495
    WOLFSSL_ENTER("wolfSSL_BASIC_CONSTRAINTS_free");
11496
    if (bc == NULL) {
11497
        WOLFSSL_MSG("Argument is NULL");
11498
        return;
11499
    }
11500
    if (bc->pathlen) {
11501
        wolfSSL_ASN1_INTEGER_free(bc->pathlen);
11502
    }
11503
    XFREE(bc, NULL, DYNAMIC_TYPE_OPENSSL);
11504
}
11505
11506
WOLFSSL_AUTHORITY_KEYID* wolfSSL_AUTHORITY_KEYID_new(void)
11507
{
11508
    WOLFSSL_AUTHORITY_KEYID* akey = (WOLFSSL_AUTHORITY_KEYID*)XMALLOC(
11509
          sizeof(WOLFSSL_AUTHORITY_KEYID), NULL, DYNAMIC_TYPE_OPENSSL);
11510
    if (!akey) {
11511
        WOLFSSL_MSG("Issue creating WOLFSSL_AUTHORITY_KEYID struct");
11512
        return NULL;
11513
    }
11514
    XMEMSET(akey, 0, sizeof(WOLFSSL_AUTHORITY_KEYID));
11515
    return akey;
11516
}
11517
11518
/* frees the wolfSSL_AUTHORITY_KEYID object */
11519
void wolfSSL_AUTHORITY_KEYID_free(WOLFSSL_AUTHORITY_KEYID *id)
11520
{
11521
    WOLFSSL_ENTER("wolfSSL_AUTHORITY_KEYID_free");
11522
    if (id == NULL) {
11523
        WOLFSSL_MSG("Argument is NULL");
11524
        return;
11525
    }
11526
    if (id->keyid) {
11527
        wolfSSL_ASN1_STRING_free(id->keyid);
11528
    }
11529
    if (id->issuer) {
11530
        wolfSSL_ASN1_OBJECT_free(id->issuer);
11531
    }
11532
    if (id->serial) {
11533
        wolfSSL_ASN1_INTEGER_free(id->serial);
11534
    }
11535
    XFREE(id, NULL, DYNAMIC_TYPE_OPENSSL);
11536
}
11537
11538
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
11539
11540
#ifdef KEEP_PEER_CERT
11541
char*  wolfSSL_X509_get_subjectCN(WOLFSSL_X509* x509)
11542
{
11543
    if (x509 == NULL)
11544
        return NULL;
11545
11546
    return x509->subjectCN;
11547
}
11548
#endif /* KEEP_PEER_CERT */
11549
11550
#if defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA)
11551
/* increments ref count of WOLFSSL_X509. Return 1 on success, 0 on error */
11552
int wolfSSL_X509_up_ref(WOLFSSL_X509* x509)
11553
{
11554
    if (x509) {
11555
        int ret;
11556
        wolfSSL_RefInc(&x509->ref, &ret);
11557
        if (ret != 0) {
11558
            WOLFSSL_MSG("Failed to lock x509 mutex");
11559
            return WOLFSSL_FAILURE;
11560
        }
11561
11562
        return WOLFSSL_SUCCESS;
11563
    }
11564
11565
    return WOLFSSL_FAILURE;
11566
}
11567
#endif /* OPENSSL_EXTRA_X509_SMALL || OPENSSL_EXTRA */
11568
11569
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
11570
WOLF_STACK_OF(WOLFSSL_X509)* wolfSSL_X509_chain_up_ref(
11571
        WOLF_STACK_OF(WOLFSSL_X509)* chain)
11572
{
11573
    /* wolfSSL_sk_dup takes care of doing a deep copy */
11574
    return wolfSSL_sk_dup(chain);
11575
}
11576
#endif
11577
11578
#if defined(OPENSSL_EXTRA)
11579
11580
WOLF_STACK_OF(WOLFSSL_X509_OBJECT)* wolfSSL_sk_X509_OBJECT_deep_copy(
11581
    const WOLF_STACK_OF(WOLFSSL_X509_OBJECT)* sk,
11582
    WOLFSSL_X509_OBJECT* (*c)(const WOLFSSL_X509_OBJECT*),
11583
    void (*f)(WOLFSSL_X509_OBJECT*))
11584
{
11585
    (void)f; /* free function */
11586
    (void)c; /* copy function */
11587
    return wolfSSL_sk_dup((WOLFSSL_STACK*)sk);
11588
}
11589
#endif
11590
11591
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
11592
    void wolfSSL_X509_NAME_free(WOLFSSL_X509_NAME *name)
11593
    {
11594
        WOLFSSL_ENTER("wolfSSL_X509_NAME_free");
11595
        FreeX509Name(name);
11596
        if (name != NULL) {
11597
            XFREE(name, name->heap, DYNAMIC_TYPE_X509);
11598
        }
11599
    }
11600
11601
11602
    /* Malloc's a new WOLFSSL_X509_NAME structure
11603
     *
11604
     * returns NULL on failure, otherwise returns a new structure.
11605
     */
11606
    WOLFSSL_X509_NAME* wolfSSL_X509_NAME_new_ex(void *heap)
11607
    {
11608
        WOLFSSL_X509_NAME* name;
11609
11610
        WOLFSSL_ENTER("wolfSSL_X509_NAME_new_ex");
11611
11612
        name = (WOLFSSL_X509_NAME*)XMALLOC(sizeof(WOLFSSL_X509_NAME), heap,
11613
                DYNAMIC_TYPE_X509);
11614
        if (name != NULL) {
11615
            InitX509Name(name, 1, heap);
11616
        }
11617
        return name;
11618
    }
11619
11620
    WOLFSSL_X509_NAME* wolfSSL_X509_NAME_new(void) {
11621
        return wolfSSL_X509_NAME_new_ex(NULL);
11622
    }
11623
11624
    /* Creates a duplicate of a WOLFSSL_X509_NAME structure.
11625
       Returns a new WOLFSSL_X509_NAME structure or NULL on failure */
11626
    WOLFSSL_X509_NAME* wolfSSL_X509_NAME_dup(const WOLFSSL_X509_NAME *name)
11627
    {
11628
        WOLFSSL_X509_NAME* copy = NULL;
11629
11630
        WOLFSSL_ENTER("wolfSSL_X509_NAME_dup");
11631
11632
        if (name == NULL) {
11633
            WOLFSSL_MSG("NULL parameter");
11634
            return NULL;
11635
        }
11636
11637
        if (!(copy = wolfSSL_X509_NAME_new_ex(name->heap))) {
11638
            return NULL;
11639
        }
11640
11641
        /* copy contents */
11642
        InitX509Name(copy, 1, name->heap);
11643
        if (wolfSSL_X509_NAME_copy(name, copy) != WOLFSSL_SUCCESS) {
11644
            wolfSSL_X509_NAME_free(copy);
11645
            return NULL;
11646
        }
11647
11648
        return copy;
11649
    }
11650
11651
#ifdef WOLFSSL_CERT_GEN
11652
11653
#if defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_EXT) || \
11654
    defined(OPENSSL_EXTRA)
11655
    /* Helper function to copy cert name from a WOLFSSL_X509_NAME structure to
11656
    * a Cert structure.
11657
    *
11658
    * returns length of DER on success and a negative error value on failure
11659
    */
11660
    static int CopyX509NameToCert(WOLFSSL_X509_NAME* n, byte* out)
11661
    {
11662
        unsigned char* der = NULL;
11663
        int length = WC_NO_ERR_TRACE(BAD_FUNC_ARG), ret;
11664
        word32 idx = 0;
11665
11666
        ret = wolfSSL_i2d_X509_NAME(n, &der);
11667
        if (ret > (int)sizeof(CertName) || ret < 0) {
11668
            WOLFSSL_MSG("Name conversion error");
11669
            ret = MEMORY_E;
11670
        }
11671
11672
        if (ret > 0) {
11673
            /* strip off sequence, this gets added on certificate creation */
11674
            ret = GetSequence(der, &idx, &length, (word32)ret);
11675
        }
11676
11677
        if (ret > 0) {
11678
            XMEMCPY(out, der + idx, length);
11679
        }
11680
11681
        XFREE(der, NULL, DYNAMIC_TYPE_OPENSSL);
11682
11683
        return length;
11684
    }
11685
#endif
11686
11687
#ifdef WOLFSSL_CERT_REQ
11688
    static int ReqCertFromX509(Cert* cert, WOLFSSL_X509* req)
11689
    {
11690
        int ret;
11691
11692
        if (wc_InitCert(cert) != 0)
11693
            return WOLFSSL_FAILURE;
11694
11695
11696
        ret = CopyX509NameToCert(&req->subject, cert->sbjRaw);
11697
        if (ret < 0) {
11698
            WOLFSSL_MSG("REQ subject conversion error");
11699
            ret = MEMORY_E;
11700
        }
11701
        else {
11702
            ret = WOLFSSL_SUCCESS;
11703
        }
11704
11705
        if (ret == WOLFSSL_SUCCESS) {
11706
        #if defined(OPENSSL_ALL)
11707
            int idx;
11708
        #endif
11709
11710
            cert->version = req->version;
11711
            cert->isCA = req->isCa;
11712
            cert->basicConstSet = req->basicConstSet;
11713
    #ifdef WOLFSSL_CERT_EXT
11714
            if (req->subjKeyIdSz != 0) {
11715
                XMEMCPY(cert->skid, req->subjKeyId, req->subjKeyIdSz);
11716
                cert->skidSz = (int)req->subjKeyIdSz;
11717
            }
11718
            if (req->keyUsageSet)
11719
                cert->keyUsage = req->keyUsage;
11720
11721
            cert->extKeyUsage = req->extKeyUsage;
11722
    #endif
11723
11724
            XMEMCPY(cert->challengePw, req->challengePw, CTC_NAME_SIZE);
11725
            cert->challengePwPrintableString = req->challengePw[0] != 0;
11726
11727
        #if defined(OPENSSL_ALL)
11728
            idx = wolfSSL_X509_REQ_get_attr_by_NID(req,
11729
                    WC_NID_pkcs9_unstructuredName, -1);
11730
            if (idx != WC_NO_ERR_TRACE(WOLFSSL_FATAL_ERROR)) {
11731
                WOLFSSL_X509_ATTRIBUTE *attr;
11732
                attr = wolfSSL_X509_REQ_get_attr(req, idx);
11733
                if (attr != NULL) {
11734
                    const unsigned char *attrData;
11735
                    int attrDataSz;
11736
11737
                    attrData = wolfSSL_ASN1_STRING_get0_data(
11738
                            attr->value->value.asn1_string);
11739
                    attrDataSz = wolfSSL_ASN1_STRING_length(
11740
                            attr->value->value.asn1_string);
11741
11742
                    /* +1 to make sure is terminated string */
11743
                    if (attrDataSz + 1 > CTC_NAME_SIZE) {
11744
                        WOLFSSL_MSG("attribute size was too large to copy");
11745
                        ret = REQ_ATTRIBUTE_E;
11746
                    }
11747
                    else {
11748
                        XMEMCPY(cert->unstructuredName, attrData, attrDataSz);
11749
                        cert->unstructuredName[attrDataSz] = '\0';
11750
                    }
11751
                }
11752
            }
11753
11754
        #ifdef WOLFSSL_CUSTOM_OID
11755
            if (ret == WOLFSSL_SUCCESS) {
11756
                if ((req->customExtCount < 0) ||
11757
                    (req->customExtCount >= NUM_CUSTOM_EXT)) {
11758
                    WOLFSSL_MSG("Bad value for customExtCount.");
11759
                    ret = WOLFSSL_FAILURE;
11760
                }
11761
11762
                if (ret == WOLFSSL_SUCCESS) {
11763
                    for (idx = 0; idx < req->customExtCount; idx++) {
11764
                        /* Note that ownership is NOT transferred.
11765
                         * req->custom_exts buffers still need to be cleaned
11766
                         * up. */
11767
                        cert->customCertExt[idx] = req->custom_exts[idx];
11768
                    }
11769
                    cert->customCertExtCount = req->customExtCount;
11770
                }
11771
            }
11772
        #endif /* WOLFSSL_CUSTOM_OID */
11773
        #endif /* OPENSSL_ALL */
11774
11775
    #ifdef WOLFSSL_ALT_NAMES
11776
            if (ret == WOLFSSL_SUCCESS) {
11777
                cert->altNamesSz = FlattenAltNames(cert->altNames,
11778
                        sizeof(cert->altNames), req->altNames);
11779
            }
11780
    #endif /* WOLFSSL_ALT_NAMES */
11781
        }
11782
11783
        return ret;
11784
    }
11785
#endif /* WOLFSSL_CERT_REQ */
11786
11787
/* converts WOLFSSL_AN1_TIME to Cert form, returns positive size on
11788
 * success */
11789
static int CertDateFromX509(byte* out, int outSz, WOLFSSL_ASN1_TIME* t)
11790
{
11791
    int sz, i;
11792
11793
    if (t->length + 1 >= outSz) {
11794
        return BUFFER_E;
11795
    }
11796
11797
    out[0] = (byte) t->type;
11798
    sz = (int)SetLength((word32)t->length, out + 1) + 1;  /* gen tag */
11799
    for (i = 0; i < t->length; i++) {
11800
        out[sz + i] = t->data[i];
11801
    }
11802
    return t->length + sz;
11803
}
11804
11805
/* convert a WOLFSSL_X509 to a Cert structure for writing out */
11806
static int CertFromX509(Cert* cert, WOLFSSL_X509* x509)
11807
{
11808
    int ret;
11809
#ifdef WOLFSSL_CERT_EXT
11810
    int i;
11811
#endif
11812
11813
    WOLFSSL_ENTER("wolfSSL_X509_to_Cert");
11814
11815
    if (x509 == NULL || cert == NULL) {
11816
        return BAD_FUNC_ARG;
11817
    }
11818
11819
    wc_InitCert(cert);
11820
11821
    cert->version = (int)wolfSSL_X509_get_version(x509);
11822
11823
    if (x509->notBefore.length > 0) {
11824
        cert->beforeDateSz = CertDateFromX509(cert->beforeDate,
11825
                    CTC_DATE_SIZE, &x509->notBefore);
11826
        if (cert->beforeDateSz <= 0) {
11827
            WOLFSSL_MSG("Error converting WOLFSSL_X509 not before date");
11828
            return WOLFSSL_FAILURE;
11829
        }
11830
    }
11831
    else {
11832
        cert->beforeDateSz = 0;
11833
    }
11834
11835
    if (x509->notAfter.length > 0) {
11836
        cert->afterDateSz = CertDateFromX509(cert->afterDate,
11837
                    CTC_DATE_SIZE, &x509->notAfter);
11838
        if (cert->afterDateSz <= 0) {
11839
            WOLFSSL_MSG("Error converting WOLFSSL_X509 not after date");
11840
            return WOLFSSL_FAILURE;
11841
        }
11842
    }
11843
    else {
11844
        cert->afterDateSz = 0;
11845
    }
11846
11847
#ifdef WOLFSSL_ALT_NAMES
11848
    cert->altNamesSz = FlattenAltNames(cert->altNames,
11849
            sizeof(cert->altNames), x509->altNames);
11850
#endif /* WOLFSSL_ALT_NAMES */
11851
11852
    cert->sigType = wolfSSL_X509_get_signature_type(x509);
11853
    cert->keyType = x509->pubKeyOID;
11854
    cert->isCA    = wolfSSL_X509_get_isCA(x509);
11855
    cert->basicConstCrit = x509->basicConstCrit;
11856
    cert->basicConstSet = x509->basicConstSet;
11857
    cert->pathLen = (byte)x509->pathLength;
11858
    cert->pathLenSet = x509->pathLengthSet;
11859
11860
#ifdef WOLFSSL_CERT_EXT
11861
    if (x509->subjKeyIdSz <= CTC_MAX_SKID_SIZE) {
11862
        if (x509->subjKeyId) {
11863
            XMEMCPY(cert->skid, x509->subjKeyId, x509->subjKeyIdSz);
11864
        }
11865
        cert->skidSz = (int)x509->subjKeyIdSz;
11866
    }
11867
    else {
11868
        WOLFSSL_MSG("Subject Key ID too large");
11869
        WOLFSSL_ERROR_VERBOSE(BUFFER_E);
11870
        return WOLFSSL_FAILURE;
11871
    }
11872
11873
    #ifdef WOLFSSL_AKID_NAME
11874
    cert->rawAkid = 0;
11875
    if (x509->authKeyIdSrc) {
11876
        if (x509->authKeyIdSrcSz > sizeof(cert->akid)) {
11877
            WOLFSSL_MSG("Auth Key ID too large");
11878
            WOLFSSL_ERROR_VERBOSE(BUFFER_E);
11879
            return WOLFSSL_FAILURE;
11880
        }
11881
        XMEMCPY(cert->akid, x509->authKeyIdSrc, x509->authKeyIdSrcSz);
11882
        cert->akidSz = (int)x509->authKeyIdSrcSz;
11883
        cert->rawAkid = 1;
11884
    }
11885
    else
11886
    #endif
11887
    if (x509->authKeyId) {
11888
        if (x509->authKeyIdSz > sizeof(cert->akid)) {
11889
            WOLFSSL_MSG("Auth Key ID too large");
11890
            WOLFSSL_ERROR_VERBOSE(BUFFER_E);
11891
            return WOLFSSL_FAILURE;
11892
        }
11893
        XMEMCPY(cert->akid, x509->authKeyId, x509->authKeyIdSz);
11894
        cert->akidSz = (int)x509->authKeyIdSz;
11895
    }
11896
11897
    for (i = 0; i < x509->certPoliciesNb; i++) {
11898
        /* copy the smaller of MAX macros, by default they are currently equal*/
11899
        if ((int)CTC_MAX_CERTPOL_SZ <= (int)MAX_CERTPOL_SZ) {
11900
            XMEMCPY(cert->certPolicies[i], x509->certPolicies[i],
11901
                    CTC_MAX_CERTPOL_SZ);
11902
        }
11903
        else {
11904
            XMEMCPY(cert->certPolicies[i], x509->certPolicies[i],
11905
                    MAX_CERTPOL_SZ);
11906
        }
11907
    }
11908
    cert->certPoliciesNb = (word16)x509->certPoliciesNb;
11909
11910
    cert->keyUsage = x509->keyUsage;
11911
    cert->extKeyUsage = x509->extKeyUsage;
11912
    cert->nsCertType = x509->nsCertType;
11913
11914
    if (x509->rawCRLInfo != NULL) {
11915
        if (x509->rawCRLInfoSz > CTC_MAX_CRLINFO_SZ) {
11916
            WOLFSSL_MSG("CRL Info too large");
11917
            WOLFSSL_ERROR_VERBOSE(BUFFER_E);
11918
            return WOLFSSL_FAILURE;
11919
        }
11920
        XMEMCPY(cert->crlInfo, x509->rawCRLInfo, x509->rawCRLInfoSz);
11921
        cert->crlInfoSz = x509->rawCRLInfoSz;
11922
    }
11923
11924
#ifdef WOLFSSL_DUAL_ALG_CERTS
11925
    /* We point to instance in x509 so DON'T need to be free'd. */
11926
    cert->sapkiDer = x509->sapkiDer;
11927
    cert->sapkiLen = x509->sapkiLen;
11928
    cert->sapkiCrit = x509->sapkiCrit;
11929
    cert->altSigAlgDer = x509->altSigAlgDer;
11930
    cert->altSigAlgLen  = x509->altSigAlgLen;
11931
    cert->altSigAlgCrit = x509->altSigAlgCrit;
11932
    cert->altSigValDer = x509->altSigValDer;
11933
    cert->altSigValLen = x509->altSigValLen;
11934
    cert->altSigValCrit = x509->altSigValCrit;
11935
#endif /* WOLFSSL_DUAL_ALG_CERTS */
11936
11937
#if defined(WOLFSSL_ASN_TEMPLATE) && defined(WOLFSSL_CUSTOM_OID) && \
11938
    defined(HAVE_OID_ENCODING)
11939
11940
    if ((x509->customExtCount < 0) ||
11941
            (x509->customExtCount >= NUM_CUSTOM_EXT)) {
11942
        WOLFSSL_MSG("Bad value for customExtCount.");
11943
        return WOLFSSL_FAILURE;
11944
    }
11945
11946
    for (i = 0; i < x509->customExtCount; i++) {
11947
        if (wc_SetCustomExtension(cert, x509->custom_exts[i].crit,
11948
                x509->custom_exts[i].oid, x509->custom_exts[i].val,
11949
                x509->custom_exts[i].valSz))
11950
        {
11951
            return WOLFSSL_FAILURE;
11952
        }
11953
    }
11954
#endif /* WOLFSSL_ASN_TEMPLATE && WOLFSSL_CUSTOM_OID && HAVE_OID_ENCODING */
11955
11956
#endif /* WOLFSSL_CERT_EXT */
11957
11958
#ifdef WOLFSSL_CERT_REQ
11959
    /* copy over challenge password for REQ certs */
11960
    XMEMCPY(cert->challengePw, x509->challengePw, CTC_NAME_SIZE);
11961
#endif
11962
11963
    /* Only makes sense to do this for OPENSSL_EXTRA because without
11964
     * this define the function will error out below */
11965
    #ifdef OPENSSL_EXTRA
11966
    if (x509->serialSz == 0 && x509->serialNumber != NULL &&
11967
            /* Check if the buffer contains more than just the
11968
             * ASN tag and length */
11969
            x509->serialNumber->length > 2) {
11970
        if (wolfSSL_X509_set_serialNumber(x509, x509->serialNumber)
11971
                != WOLFSSL_SUCCESS) {
11972
            WOLFSSL_MSG("Failed to set serial number");
11973
            return WOLFSSL_FAILURE;
11974
        }
11975
    }
11976
    #endif
11977
11978
    /* set serial number */
11979
    if (x509->serialSz > 0) {
11980
    #if defined(OPENSSL_EXTRA)
11981
        byte serial[EXTERNAL_SERIAL_SIZE];
11982
        int  serialSz = EXTERNAL_SERIAL_SIZE;
11983
11984
        ret = wolfSSL_X509_get_serial_number(x509, serial, &serialSz);
11985
        if (ret != WOLFSSL_SUCCESS) {
11986
            WOLFSSL_MSG("Serial size error");
11987
            return WOLFSSL_FAILURE;
11988
        }
11989
11990
        if (serialSz > EXTERNAL_SERIAL_SIZE ||
11991
                serialSz > CTC_SERIAL_SIZE) {
11992
            WOLFSSL_MSG("Serial size too large error");
11993
            WOLFSSL_ERROR_VERBOSE(BUFFER_E);
11994
            return WOLFSSL_FAILURE;
11995
        }
11996
        XMEMCPY(cert->serial, serial, serialSz);
11997
        cert->serialSz = serialSz;
11998
    #else
11999
        WOLFSSL_MSG("Getting X509 serial number not supported");
12000
        return WOLFSSL_FAILURE;
12001
    #endif
12002
    }
12003
12004
    /* copy over Name structures */
12005
    if (x509->issuerSet)
12006
        cert->selfSigned = 0;
12007
12008
#if defined(WOLFSSL_CERT_EXT) || defined(OPENSSL_EXTRA)
12009
    ret = CopyX509NameToCert(&x509->subject, cert->sbjRaw);
12010
    if (ret < 0) {
12011
        WOLFSSL_MSG("Subject conversion error");
12012
        return MEMORY_E;
12013
    }
12014
    if (cert->selfSigned) {
12015
        XMEMCPY(cert->issRaw, cert->sbjRaw, sizeof(CertName));
12016
    }
12017
    else {
12018
        ret = CopyX509NameToCert(&x509->issuer, cert->issRaw);
12019
        if (ret < 0) {
12020
            WOLFSSL_MSG("Issuer conversion error");
12021
            return MEMORY_E;
12022
        }
12023
    }
12024
#endif
12025
12026
    cert->heap = x509->heap;
12027
12028
    (void)ret;
12029
    return WOLFSSL_SUCCESS;
12030
}
12031
12032
12033
    /* returns the sig type to use on success i.e CTC_SHAwRSA and WOLFSSL_FALURE
12034
     * on fail case */
12035
    static int wolfSSL_sigTypeFromPKEY(WOLFSSL_EVP_MD* md,
12036
            WOLFSSL_EVP_PKEY* pkey)
12037
    {
12038
    #if !defined(NO_PWDBASED) && defined(OPENSSL_EXTRA)
12039
        int hashType;
12040
        int sigType = WOLFSSL_FAILURE;
12041
12042
        /* Convert key type and hash algorithm to a signature algorithm */
12043
        if (wolfSSL_EVP_get_hashinfo(md, &hashType, NULL)
12044
            == WC_NO_ERR_TRACE(WOLFSSL_FAILURE))
12045
        {
12046
            return WOLFSSL_FAILURE;
12047
        }
12048
12049
        if (pkey->type == WC_EVP_PKEY_RSA) {
12050
            switch (hashType) {
12051
                case WC_HASH_TYPE_SHA:
12052
                    sigType = CTC_SHAwRSA;
12053
                    break;
12054
                case WC_HASH_TYPE_SHA224:
12055
                    sigType = CTC_SHA224wRSA;
12056
                    break;
12057
                case WC_HASH_TYPE_SHA256:
12058
                    sigType = CTC_SHA256wRSA;
12059
                    break;
12060
                case WC_HASH_TYPE_SHA384:
12061
                    sigType = CTC_SHA384wRSA;
12062
                    break;
12063
                case WC_HASH_TYPE_SHA512:
12064
                    sigType = CTC_SHA512wRSA;
12065
                    break;
12066
            #ifdef WOLFSSL_SHA3
12067
                case WC_HASH_TYPE_SHA3_224:
12068
                    sigType = CTC_SHA3_224wRSA;
12069
                    break;
12070
                case WC_HASH_TYPE_SHA3_256:
12071
                    sigType = CTC_SHA3_256wRSA;
12072
                    break;
12073
                case WC_HASH_TYPE_SHA3_384:
12074
                    sigType = CTC_SHA3_384wRSA;
12075
                    break;
12076
                case WC_HASH_TYPE_SHA3_512:
12077
                    sigType = CTC_SHA3_512wRSA;
12078
                    break;
12079
            #endif
12080
                default:
12081
                    return WOLFSSL_FAILURE;
12082
            }
12083
        }
12084
        else if (pkey->type == WC_EVP_PKEY_EC) {
12085
            switch (hashType) {
12086
                case WC_HASH_TYPE_SHA:
12087
                    sigType = CTC_SHAwECDSA;
12088
                    break;
12089
                case WC_HASH_TYPE_SHA224:
12090
                    sigType = CTC_SHA224wECDSA;
12091
                    break;
12092
                case WC_HASH_TYPE_SHA256:
12093
                    sigType = CTC_SHA256wECDSA;
12094
                    break;
12095
                case WC_HASH_TYPE_SHA384:
12096
                    sigType = CTC_SHA384wECDSA;
12097
                    break;
12098
                case WC_HASH_TYPE_SHA512:
12099
                    sigType = CTC_SHA512wECDSA;
12100
                    break;
12101
            #ifdef WOLFSSL_SHA3
12102
                case WC_HASH_TYPE_SHA3_224:
12103
                    sigType = CTC_SHA3_224wECDSA;
12104
                    break;
12105
                case WC_HASH_TYPE_SHA3_256:
12106
                    sigType = CTC_SHA3_256wECDSA;
12107
                    break;
12108
                case WC_HASH_TYPE_SHA3_384:
12109
                    sigType = CTC_SHA3_384wECDSA;
12110
                    break;
12111
                case WC_HASH_TYPE_SHA3_512:
12112
                    sigType = CTC_SHA3_512wECDSA;
12113
                    break;
12114
            #endif
12115
                default:
12116
                    return WOLFSSL_FAILURE;
12117
            }
12118
        }
12119
        else
12120
            return WOLFSSL_FAILURE;
12121
        return sigType;
12122
#else
12123
        (void)md;
12124
        (void)pkey;
12125
        WOLFSSL_MSG("Cannot get hashinfo when NO_PWDBASED is defined");
12126
        return WOLFSSL_FAILURE;
12127
#endif /* !NO_PWDBASED && OPENSSL_EXTRA */
12128
    }
12129
12130
12131
    /* generates DER buffer from WOLFSSL_X509
12132
     * If req == 1 then creates a request DER buffer
12133
     *
12134
     * updates derSz with certificate body size on success
12135
     * return WOLFSSL_SUCCESS on success
12136
     */
12137
    static int wolfssl_x509_make_der(WOLFSSL_X509* x509, int req,
12138
            unsigned char* der, int* derSz, int includeSig)
12139
    {
12140
        int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
12141
        int totalLen;
12142
        Cert* cert = NULL;
12143
        void* key = NULL;
12144
        int type = -1;
12145
    #ifndef NO_RSA
12146
        RsaKey* rsa = NULL;
12147
    #endif
12148
    #ifdef HAVE_ECC
12149
        ecc_key* ecc = NULL;
12150
    #endif
12151
    #ifndef NO_DSA
12152
        DsaKey* dsa = NULL;
12153
    #endif
12154
    #if defined(HAVE_FALCON)
12155
        falcon_key* falcon = NULL;
12156
    #endif
12157
    #if defined(HAVE_DILITHIUM)
12158
        dilithium_key* dilithium = NULL;
12159
    #endif
12160
    #if defined(HAVE_SPHINCS)
12161
        sphincs_key* sphincs = NULL;
12162
    #endif
12163
        WC_RNG rng;
12164
        word32 idx = 0;
12165
12166
        if (x509 == NULL || der == NULL || derSz == NULL)
12167
            return BAD_FUNC_ARG;
12168
12169
    #ifndef WOLFSSL_CERT_REQ
12170
        if (req) {
12171
            WOLFSSL_MSG("WOLFSSL_CERT_REQ needed for certificate request");
12172
            return WOLFSSL_FAILURE;
12173
        }
12174
    #endif
12175
12176
        /* allocate Cert struct on heap since it is large */
12177
        cert = (Cert*)XMALLOC(sizeof(Cert), NULL, DYNAMIC_TYPE_CERT);
12178
        if (cert == NULL) {
12179
            WOLFSSL_MSG("Failed to allocate memory for Cert struct");
12180
            return WOLFSSL_FAILURE;
12181
        }
12182
        XMEMSET(cert, 0, sizeof(Cert));
12183
12184
    #ifdef WOLFSSL_CERT_REQ
12185
        if (req) {
12186
            if (ReqCertFromX509(cert, x509) != WOLFSSL_SUCCESS) {
12187
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12188
                return WOLFSSL_FAILURE;
12189
            }
12190
        }
12191
        else
12192
    #endif
12193
        {
12194
            /* Create a Cert that has the certificate fields. */
12195
            if (CertFromX509(cert, x509) != WOLFSSL_SUCCESS) {
12196
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12197
                return WOLFSSL_FAILURE;
12198
            }
12199
        }
12200
12201
        /* Create a public key object from requests public key. */
12202
    #ifndef NO_RSA
12203
        if (x509->pubKeyOID == RSAk) {
12204
12205
            rsa = (RsaKey*)XMALLOC(sizeof(RsaKey), NULL, DYNAMIC_TYPE_RSA);
12206
            if (rsa == NULL) {
12207
                WOLFSSL_MSG("Failed to allocate memory for RsaKey");
12208
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12209
                return WOLFSSL_FAILURE;
12210
            }
12211
12212
            type = RSA_TYPE;
12213
            ret = wc_InitRsaKey(rsa, x509->heap);
12214
            if (ret != 0) {
12215
                XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
12216
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12217
                return ret;
12218
            }
12219
            ret = wc_RsaPublicKeyDecode(x509->pubKey.buffer, &idx, rsa,
12220
                                                           x509->pubKey.length);
12221
            if (ret != 0) {
12222
                WOLFSSL_ERROR_VERBOSE(ret);
12223
                wc_FreeRsaKey(rsa);
12224
                XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
12225
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12226
                return ret;
12227
            }
12228
            key = (void*)rsa;
12229
        }
12230
    #endif
12231
    #ifdef HAVE_ECC
12232
        if (x509->pubKeyOID == ECDSAk) {
12233
12234
            ecc = (ecc_key*)XMALLOC(sizeof(ecc_key), NULL, DYNAMIC_TYPE_ECC);
12235
            if (ecc == NULL) {
12236
                WOLFSSL_MSG("Failed to allocate memory for ecc_key");
12237
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12238
                return WOLFSSL_FAILURE;
12239
            }
12240
12241
            type = ECC_TYPE;
12242
            ret = wc_ecc_init(ecc);
12243
            if (ret != 0) {
12244
                XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
12245
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12246
                return ret;
12247
            }
12248
            ret = wc_EccPublicKeyDecode(x509->pubKey.buffer, &idx, ecc,
12249
                                                           x509->pubKey.length);
12250
            if (ret != 0) {
12251
                WOLFSSL_ERROR_VERBOSE(ret);
12252
                wc_ecc_free(ecc);
12253
                XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
12254
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12255
                return ret;
12256
            }
12257
            key = (void*)ecc;
12258
        }
12259
    #endif
12260
    #ifndef NO_DSA
12261
        if (x509->pubKeyOID == DSAk) {
12262
12263
            dsa = (DsaKey*)XMALLOC(sizeof(DsaKey), NULL, DYNAMIC_TYPE_DSA);
12264
            if (dsa == NULL) {
12265
                WOLFSSL_MSG("Failed to allocate memory for DsaKey");
12266
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12267
                return WOLFSSL_FAILURE;
12268
            }
12269
12270
            type = DSA_TYPE;
12271
            ret = wc_InitDsaKey(dsa);
12272
            if (ret != 0) {
12273
                XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
12274
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12275
                return ret;
12276
            }
12277
            ret = wc_DsaPublicKeyDecode(x509->pubKey.buffer, &idx, dsa,
12278
                                                           x509->pubKey.length);
12279
            if (ret != 0) {
12280
                WOLFSSL_ERROR_VERBOSE(ret);
12281
                wc_FreeDsaKey(dsa);
12282
                XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
12283
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12284
                return ret;
12285
            }
12286
            key = (void*)dsa;
12287
        }
12288
    #endif
12289
    #if defined(HAVE_FALCON)
12290
        if ((x509->pubKeyOID == FALCON_LEVEL1k) ||
12291
            (x509->pubKeyOID == FALCON_LEVEL5k)) {
12292
            falcon = (falcon_key*)XMALLOC(sizeof(falcon_key), NULL,
12293
                                          DYNAMIC_TYPE_FALCON);
12294
            if (falcon == NULL) {
12295
                WOLFSSL_MSG("Failed to allocate memory for falcon_key");
12296
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12297
                return WOLFSSL_FAILURE;
12298
            }
12299
12300
            ret = wc_falcon_init(falcon);
12301
            if (ret != 0) {
12302
                XFREE(falcon, NULL, DYNAMIC_TYPE_FALCON);
12303
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12304
                return ret;
12305
            }
12306
12307
            if (x509->pubKeyOID == FALCON_LEVEL1k) {
12308
                type = FALCON_LEVEL1_TYPE;
12309
                wc_falcon_set_level(falcon, 1);
12310
            }
12311
            else if (x509->pubKeyOID == FALCON_LEVEL5k) {
12312
                type = FALCON_LEVEL5_TYPE;
12313
                wc_falcon_set_level(falcon, 5);
12314
            }
12315
12316
            ret = wc_Falcon_PublicKeyDecode(x509->pubKey.buffer, &idx, falcon,
12317
                                            x509->pubKey.length);
12318
            if (ret != 0) {
12319
                WOLFSSL_ERROR_VERBOSE(ret);
12320
                wc_falcon_free(falcon);
12321
                XFREE(falcon, NULL, DYNAMIC_TYPE_FALCON);
12322
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12323
                return ret;
12324
            }
12325
            key = (void*)falcon;
12326
        }
12327
    #endif
12328
    #if defined(HAVE_DILITHIUM)
12329
        if ((x509->pubKeyOID == ML_DSA_LEVEL2k) ||
12330
            (x509->pubKeyOID == ML_DSA_LEVEL3k) ||
12331
            (x509->pubKeyOID == ML_DSA_LEVEL5k)
12332
            #ifdef WOLFSSL_DILITHIUM_FIPS204_DRAFT
12333
         || (x509->pubKeyOID == DILITHIUM_LEVEL2k)
12334
         || (x509->pubKeyOID == DILITHIUM_LEVEL3k)
12335
         || (x509->pubKeyOID == DILITHIUM_LEVEL5k)
12336
            #endif /* WOLFSSL_DILITHIUM_FIPS204_DRAFT */
12337
            ) {
12338
            dilithium = (dilithium_key*)XMALLOC(sizeof(dilithium_key), NULL,
12339
                                          DYNAMIC_TYPE_DILITHIUM);
12340
            if (dilithium == NULL) {
12341
                WOLFSSL_MSG("Failed to allocate memory for dilithium_key");
12342
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12343
                return WOLFSSL_FAILURE;
12344
            }
12345
12346
            ret = wc_dilithium_init(dilithium);
12347
            if (ret != 0) {
12348
                XFREE(dilithium, NULL, DYNAMIC_TYPE_DILITHIUM);
12349
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12350
                return ret;
12351
            }
12352
12353
            if (x509->pubKeyOID == ML_DSA_LEVEL2k) {
12354
                type = ML_DSA_LEVEL2_TYPE;
12355
                wc_dilithium_set_level(dilithium, WC_ML_DSA_44);
12356
            }
12357
            else if (x509->pubKeyOID == ML_DSA_LEVEL3k) {
12358
                type = ML_DSA_LEVEL3_TYPE;
12359
                wc_dilithium_set_level(dilithium, WC_ML_DSA_65);
12360
            }
12361
            else if (x509->pubKeyOID == ML_DSA_LEVEL5k) {
12362
                type = ML_DSA_LEVEL5_TYPE;
12363
                wc_dilithium_set_level(dilithium, WC_ML_DSA_87);
12364
            }
12365
            #ifdef WOLFSSL_DILITHIUM_FIPS204_DRAFT
12366
            else if (x509->pubKeyOID == DILITHIUM_LEVEL2k) {
12367
                type = DILITHIUM_LEVEL2_TYPE;
12368
                wc_dilithium_set_level(dilithium, WC_ML_DSA_44_DRAFT);
12369
            }
12370
            else if (x509->pubKeyOID == DILITHIUM_LEVEL3k) {
12371
                type = DILITHIUM_LEVEL3_TYPE;
12372
                wc_dilithium_set_level(dilithium, WC_ML_DSA_65_DRAFT);
12373
            }
12374
            else if (x509->pubKeyOID == DILITHIUM_LEVEL5k) {
12375
                type = DILITHIUM_LEVEL5_TYPE;
12376
                wc_dilithium_set_level(dilithium, WC_ML_DSA_87_DRAFT);
12377
            }
12378
            #endif /* WOLFSSL_DILITHIUM_FIPS204_DRAFT */
12379
12380
            ret = wc_Dilithium_PublicKeyDecode(x509->pubKey.buffer, &idx,
12381
                                    dilithium, x509->pubKey.length);
12382
            if (ret != 0) {
12383
                WOLFSSL_ERROR_VERBOSE(ret);
12384
                wc_dilithium_free(dilithium);
12385
                XFREE(dilithium, NULL, DYNAMIC_TYPE_DILITHIUM);
12386
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12387
                return ret;
12388
            }
12389
            key = (void*)dilithium;
12390
        }
12391
    #endif
12392
    #if defined(HAVE_SPHINCS)
12393
        if ((x509->pubKeyOID == SPHINCS_FAST_LEVEL1k) ||
12394
            (x509->pubKeyOID == SPHINCS_FAST_LEVEL3k) ||
12395
            (x509->pubKeyOID == SPHINCS_FAST_LEVEL5k) ||
12396
            (x509->pubKeyOID == SPHINCS_SMALL_LEVEL1k) ||
12397
            (x509->pubKeyOID == SPHINCS_SMALL_LEVEL3k) ||
12398
            (x509->pubKeyOID == SPHINCS_SMALL_LEVEL5k)) {
12399
            sphincs = (sphincs_key*)XMALLOC(sizeof(sphincs_key), NULL,
12400
                                          DYNAMIC_TYPE_SPHINCS);
12401
            if (sphincs == NULL) {
12402
                WOLFSSL_MSG("Failed to allocate memory for sphincs_key");
12403
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12404
                return WOLFSSL_FAILURE;
12405
            }
12406
12407
            ret = wc_sphincs_init(sphincs);
12408
            if (ret != 0) {
12409
                XFREE(sphincs, NULL, DYNAMIC_TYPE_SPHINCS);
12410
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12411
                return ret;
12412
            }
12413
12414
            if (x509->pubKeyOID == SPHINCS_FAST_LEVEL1k) {
12415
                type = SPHINCS_FAST_LEVEL1_TYPE;
12416
                wc_sphincs_set_level_and_optim(sphincs, 1, FAST_VARIANT);
12417
            }
12418
            else if (x509->pubKeyOID == SPHINCS_FAST_LEVEL3k) {
12419
                type = SPHINCS_FAST_LEVEL3_TYPE;
12420
                wc_sphincs_set_level_and_optim(sphincs, 3, FAST_VARIANT);
12421
            }
12422
            else if (x509->pubKeyOID == SPHINCS_FAST_LEVEL3k) {
12423
                type = SPHINCS_FAST_LEVEL5_TYPE;
12424
                wc_sphincs_set_level_and_optim(sphincs, 5, FAST_VARIANT);
12425
            }
12426
            else if (x509->pubKeyOID == SPHINCS_SMALL_LEVEL1k) {
12427
                type = SPHINCS_SMALL_LEVEL1_TYPE;
12428
                wc_sphincs_set_level_and_optim(sphincs, 1, SMALL_VARIANT);
12429
            }
12430
            else if (x509->pubKeyOID == SPHINCS_SMALL_LEVEL3k) {
12431
                type = SPHINCS_SMALL_LEVEL3_TYPE;
12432
                wc_sphincs_set_level_and_optim(sphincs, 3, SMALL_VARIANT);
12433
            }
12434
            else if (x509->pubKeyOID == SPHINCS_SMALL_LEVEL3k) {
12435
                type = SPHINCS_SMALL_LEVEL5_TYPE;
12436
                wc_sphincs_set_level_and_optim(sphincs, 5, SMALL_VARIANT);
12437
            }
12438
12439
            ret = wc_Sphincs_PublicKeyDecode(x509->pubKey.buffer, &idx, sphincs,
12440
                                             x509->pubKey.length);
12441
            if (ret != 0) {
12442
                WOLFSSL_ERROR_VERBOSE(ret);
12443
                wc_sphincs_free(sphincs);
12444
                XFREE(sphincs, NULL, DYNAMIC_TYPE_SPHINCS);
12445
                XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12446
                return ret;
12447
            }
12448
            key = (void*)sphincs;
12449
        }
12450
    #endif
12451
        if (key == NULL) {
12452
            WOLFSSL_MSG("No public key found for certificate");
12453
            XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12454
            return WOLFSSL_FAILURE;
12455
        }
12456
12457
        /* Make the body of the certificate request. */
12458
    #ifdef WOLFSSL_CERT_REQ
12459
        if (req) {
12460
            ret = wc_MakeCertReq_ex(cert, der, *derSz, type, key);
12461
        }
12462
        else
12463
    #endif
12464
        {
12465
            ret = wc_InitRng(&rng);
12466
            if (ret != 0) {
12467
                ret = WOLFSSL_FAILURE;
12468
                goto cleanup;
12469
            }
12470
12471
            ret = wc_MakeCert_ex(cert, der, *derSz, type, key, &rng);
12472
            wc_FreeRng(&rng);
12473
        }
12474
        if (ret <= 0) {
12475
            WOLFSSL_ERROR_VERBOSE(ret);
12476
            ret = WOLFSSL_FAILURE;
12477
            goto cleanup;
12478
        }
12479
12480
        if ((x509->serialSz == 0) &&
12481
                (cert->serialSz <= EXTERNAL_SERIAL_SIZE) &&
12482
                (cert->serialSz > 0)) {
12483
        #if defined(OPENSSL_EXTRA)
12484
            WOLFSSL_ASN1_INTEGER *i = wolfSSL_ASN1_INTEGER_new();
12485
12486
            if (i == NULL) {
12487
                WOLFSSL_MSG("wolfSSL_ASN1_INTEGER_new error");
12488
                ret = WOLFSSL_FAILURE;
12489
                goto cleanup;
12490
            }
12491
            else {
12492
                i->length = cert->serialSz + 2;
12493
                i->data[0] = ASN_INTEGER;
12494
                i->data[1] = (unsigned char)cert->serialSz;
12495
                XMEMCPY(i->data + 2, cert->serial, cert->serialSz);
12496
                if (wolfSSL_X509_set_serialNumber(x509, i) != WOLFSSL_SUCCESS) {
12497
                    WOLFSSL_MSG("Issue setting generated serial number");
12498
                    wolfSSL_ASN1_INTEGER_free(i);
12499
                    ret = WOLFSSL_FAILURE;
12500
                    goto cleanup;
12501
                }
12502
                wolfSSL_ASN1_INTEGER_free(i);
12503
            }
12504
        #else
12505
            WOLFSSL_MSG("ASN1_INTEGER API not in build");
12506
12507
            ret = WOLFSSL_FAILURE;
12508
            goto cleanup;
12509
        #endif /* OPENSSL_EXTRA */
12510
        }
12511
12512
        if (includeSig) {
12513
            if (!x509->sig.buffer) {
12514
                WOLFSSL_MSG("No signature buffer");
12515
                ret = WOLFSSL_FAILURE;
12516
                goto cleanup;
12517
            }
12518
            totalLen = AddSignature(NULL, ret, NULL, x509->sig.length,
12519
                                  x509->sigOID);
12520
            if (totalLen > *derSz) {
12521
                WOLFSSL_MSG("Output der buffer too short");
12522
                ret = WOLFSSL_FAILURE;
12523
                goto cleanup;
12524
            }
12525
            ret = AddSignature(der, ret, x509->sig.buffer,
12526
                               x509->sig.length, x509->sigOID);
12527
        }
12528
12529
        *derSz = ret;
12530
        ret = WOLFSSL_SUCCESS;
12531
cleanup:
12532
        /* Dispose of the public key object. */
12533
    #ifndef NO_RSA
12534
        if (x509->pubKeyOID == RSAk) {
12535
            wc_FreeRsaKey(rsa);
12536
            XFREE(rsa, NULL, DYNAMIC_TYPE_RSA);
12537
        }
12538
    #endif
12539
    #ifdef HAVE_ECC
12540
        if (x509->pubKeyOID == ECDSAk) {
12541
            wc_ecc_free(ecc);
12542
            XFREE(ecc, NULL, DYNAMIC_TYPE_ECC);
12543
        }
12544
    #endif
12545
    #ifndef NO_DSA
12546
        if (x509->pubKeyOID == DSAk) {
12547
            wc_FreeDsaKey(dsa);
12548
            XFREE(dsa, NULL, DYNAMIC_TYPE_DSA);
12549
        }
12550
    #endif
12551
    #if defined(HAVE_FALCON)
12552
        if ((x509->pubKeyOID == FALCON_LEVEL1k) ||
12553
            (x509->pubKeyOID == FALCON_LEVEL5k)) {
12554
            wc_falcon_free(falcon);
12555
            XFREE(falcon, NULL, DYNAMIC_TYPE_FALCON);
12556
        }
12557
    #endif
12558
    #if defined(HAVE_DILITHIUM)
12559
        if ((x509->pubKeyOID == ML_DSA_LEVEL2k) ||
12560
            (x509->pubKeyOID == ML_DSA_LEVEL3k) ||
12561
            (x509->pubKeyOID == ML_DSA_LEVEL5k)
12562
        #ifdef WOLFSSL_DILITHIUM_FIPS204_DRAFT
12563
         || (x509->pubKeyOID == DILITHIUM_LEVEL2k)
12564
         || (x509->pubKeyOID == DILITHIUM_LEVEL3k)
12565
         || (x509->pubKeyOID == DILITHIUM_LEVEL5k)
12566
        #endif
12567
        ) {
12568
            wc_dilithium_free(dilithium);
12569
            XFREE(dilithium, NULL, DYNAMIC_TYPE_DILITHIUM);
12570
        }
12571
    #endif
12572
    #if defined(HAVE_SPHINCS)
12573
        if ((x509->pubKeyOID == SPHINCS_FAST_LEVEL1k) ||
12574
            (x509->pubKeyOID == SPHINCS_FAST_LEVEL3k) ||
12575
            (x509->pubKeyOID == SPHINCS_FAST_LEVEL5k) ||
12576
            (x509->pubKeyOID == SPHINCS_SMALL_LEVEL1k) ||
12577
            (x509->pubKeyOID == SPHINCS_SMALL_LEVEL3k) ||
12578
            (x509->pubKeyOID == SPHINCS_SMALL_LEVEL5k)) {
12579
            wc_sphincs_free(sphincs);
12580
            XFREE(sphincs, NULL, DYNAMIC_TYPE_SPHINCS);
12581
        }
12582
    #endif
12583
        XFREE(cert, NULL, DYNAMIC_TYPE_CERT);
12584
12585
        return ret;
12586
    }
12587
12588
12589
    /* signs a der buffer for the WOLFSSL_X509 structure using the PKEY and MD
12590
     * hash passed in
12591
     *
12592
     * WARNING: this free's and replaces the existing DER buffer in the
12593
     *          WOLFSSL_X509 with the newly signed buffer.
12594
     * returns size of signed buffer on success and negative values on fail
12595
     */
12596
    static int wolfSSL_X509_resign_cert(WOLFSSL_X509* x509, int req,
12597
            unsigned char* der, int derSz, int certBodySz, WOLFSSL_EVP_MD* md,
12598
            WOLFSSL_EVP_PKEY* pkey)
12599
    {
12600
        int ret;
12601
        void* key = NULL;
12602
        int type = -1;
12603
        int sigType;
12604
        WC_RNG rng;
12605
12606
        (void)req;
12607
        WOLFSSL_ENTER("wolfSSL_X509_resign_cert");
12608
12609
        sigType = wolfSSL_sigTypeFromPKEY(md, pkey);
12610
        if (sigType == WC_NO_ERR_TRACE(WOLFSSL_FAILURE)) {
12611
            WOLFSSL_MSG("Error getting signature type from pkey");
12612
            return WOLFSSL_FATAL_ERROR;
12613
        }
12614
12615
12616
        /* Get the private key object and type from pkey. */
12617
    #ifndef NO_RSA
12618
        if (pkey->type == WC_EVP_PKEY_RSA) {
12619
            type = RSA_TYPE;
12620
            key = pkey->rsa->internal;
12621
        }
12622
    #endif
12623
    #ifdef HAVE_ECC
12624
        if (pkey->type == WC_EVP_PKEY_EC) {
12625
            type = ECC_TYPE;
12626
            key = pkey->ecc->internal;
12627
        }
12628
    #endif
12629
12630
        /* Sign the certificate (request) body. */
12631
        ret = wc_InitRng(&rng);
12632
        if (ret != 0)
12633
            return ret;
12634
        ret = wc_SignCert_ex(certBodySz, sigType, der, (word32)derSz, type, key,
12635
            &rng);
12636
        wc_FreeRng(&rng);
12637
        if (ret < 0) {
12638
            WOLFSSL_LEAVE("wolfSSL_X509_resign_cert", ret);
12639
            return ret;
12640
        }
12641
        derSz = ret;
12642
12643
        /* Extract signature from buffer */
12644
        {
12645
            word32 idx = 0;
12646
            int    len = 0;
12647
12648
            /* Read top level sequence */
12649
            if (GetSequence(der, &idx, &len, (word32)derSz) < 0) {
12650
                WOLFSSL_MSG("GetSequence error");
12651
                return WOLFSSL_FATAL_ERROR;
12652
            }
12653
            /* Move idx to signature */
12654
            idx += certBodySz;
12655
            /* Read signature algo sequence */
12656
            if (GetSequence(der, &idx, &len, (word32)derSz) < 0) {
12657
                WOLFSSL_MSG("GetSequence error");
12658
                return WOLFSSL_FATAL_ERROR;
12659
            }
12660
            idx += len;
12661
            /* Read signature bit string */
12662
            if (CheckBitString(der, &idx, &len, (word32)derSz, 0, NULL) != 0) {
12663
                WOLFSSL_MSG("CheckBitString error");
12664
                return WOLFSSL_FATAL_ERROR;
12665
            }
12666
            /* Sanity check */
12667
            if (idx + len != (word32)derSz) {
12668
                WOLFSSL_MSG("unexpected asn1 structure");
12669
                return WOLFSSL_FATAL_ERROR;
12670
            }
12671
            x509->sig.length = 0;
12672
            if (x509->sig.buffer)
12673
                XFREE(x509->sig.buffer, x509->heap, DYNAMIC_TYPE_SIGNATURE);
12674
            x509->sig.buffer = (byte*)XMALLOC(len, x509->heap,
12675
                                              DYNAMIC_TYPE_SIGNATURE);
12676
            if (!x509->sig.buffer) {
12677
                WOLFSSL_MSG("malloc error");
12678
                return WOLFSSL_FATAL_ERROR;
12679
            }
12680
            XMEMCPY(x509->sig.buffer, der + idx, len);
12681
            x509->sig.length = (unsigned int)len;
12682
        }
12683
12684
        /* Put in the new certificate encoding into the x509 object. */
12685
        FreeDer(&x509->derCert);
12686
        type = CERT_TYPE;
12687
    #ifdef WOLFSSL_CERT_REQ
12688
        if (req) {
12689
            type = CERTREQ_TYPE;
12690
        }
12691
    #endif
12692
        if (AllocDer(&x509->derCert, (word32)derSz, type, NULL) != 0)
12693
            return WOLFSSL_FATAL_ERROR;
12694
        XMEMCPY(x509->derCert->buffer, der, derSz);
12695
        x509->derCert->length = (word32)derSz;
12696
12697
        return ret;
12698
    }
12699
12700
12701
#ifndef WC_MAX_X509_GEN
12702
    /* able to override max size until dynamic buffer created */
12703
    #define WC_MAX_X509_GEN 4096
12704
#endif
12705
12706
/* returns the size of signature on success */
12707
int wolfSSL_X509_sign(WOLFSSL_X509* x509, WOLFSSL_EVP_PKEY* pkey,
12708
        const WOLFSSL_EVP_MD* md)
12709
{
12710
    int  ret;
12711
    /* @TODO dynamic set based on expected cert size */
12712
    byte *der = (byte *)XMALLOC(WC_MAX_X509_GEN, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12713
    int  derSz = WC_MAX_X509_GEN;
12714
12715
    WOLFSSL_ENTER("wolfSSL_X509_sign");
12716
12717
    if (x509 == NULL || pkey == NULL || md == NULL) {
12718
        ret = WOLFSSL_FAILURE;
12719
        goto out;
12720
    }
12721
12722
    x509->sigOID = wolfSSL_sigTypeFromPKEY((WOLFSSL_EVP_MD*)md, pkey);
12723
    if ((ret = wolfssl_x509_make_der(x509, 0, der, &derSz, 0)) !=
12724
            WOLFSSL_SUCCESS) {
12725
        WOLFSSL_MSG("Unable to make DER for X509");
12726
        WOLFSSL_LEAVE("wolfSSL_X509_sign", ret);
12727
        (void)ret;
12728
        ret = WOLFSSL_FAILURE;
12729
        goto out;
12730
    }
12731
12732
    ret = wolfSSL_X509_resign_cert(x509, 0, der, WC_MAX_X509_GEN, derSz,
12733
            (WOLFSSL_EVP_MD*)md, pkey);
12734
    if (ret <= 0) {
12735
        WOLFSSL_LEAVE("wolfSSL_X509_sign", ret);
12736
        ret = WOLFSSL_FAILURE;
12737
        goto out;
12738
    }
12739
12740
out:
12741
    XFREE(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12742
12743
    return ret;
12744
}
12745
12746
#if defined(OPENSSL_EXTRA)
12747
int wolfSSL_X509_sign_ctx(WOLFSSL_X509 *x509, WOLFSSL_EVP_MD_CTX *ctx)
12748
{
12749
    WOLFSSL_ENTER("wolfSSL_X509_sign_ctx");
12750
12751
    if (!x509 || !ctx || !ctx->pctx || !ctx->pctx->pkey) {
12752
        WOLFSSL_MSG("Bad parameter");
12753
        return WOLFSSL_FAILURE;
12754
    }
12755
12756
    return wolfSSL_X509_sign(x509, ctx->pctx->pkey,
12757
        wolfSSL_EVP_MD_CTX_md(ctx));
12758
}
12759
#endif /* OPENSSL_EXTRA */
12760
#endif /* WOLFSSL_CERT_GEN */
12761
12762
12763
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
12764
    defined(OPENSSL_EXTRA_X509_SMALL) || defined(WOLFSSL_WPAS_SMALL)
12765
/* Converts from WC_NID_* value to wolfSSL value if needed.
12766
 *
12767
 * @param [in] nid  Numeric Id of a domain name component.
12768
 * @return  Domain name tag values - wolfSSL internal values.
12769
 * @return  -1 when nid isn't known.
12770
 */
12771
static int ConvertNIDToWolfSSL(int nid)
12772
{
12773
    switch (nid) {
12774
        case WC_NID_commonName : return ASN_COMMON_NAME;
12775
    #ifdef WOLFSSL_CERT_NAME_ALL
12776
        case WC_NID_name :       return ASN_NAME;
12777
        case WC_NID_givenName:   return ASN_GIVEN_NAME;
12778
        case WC_NID_dnQualifier :   return ASN_DNQUALIFIER;
12779
        case WC_NID_initials:   return ASN_INITIALS;
12780
    #endif /* WOLFSSL_CERT_NAME_ALL */
12781
        case WC_NID_surname :    return ASN_SUR_NAME;
12782
        case WC_NID_countryName: return ASN_COUNTRY_NAME;
12783
        case WC_NID_localityName: return ASN_LOCALITY_NAME;
12784
        case WC_NID_stateOrProvinceName: return ASN_STATE_NAME;
12785
        case WC_NID_streetAddress: return ASN_STREET_ADDR;
12786
        case WC_NID_organizationName: return ASN_ORG_NAME;
12787
        case WC_NID_organizationalUnitName: return ASN_ORGUNIT_NAME;
12788
        case WC_NID_emailAddress: return ASN_EMAIL_NAME;
12789
        case WC_NID_pkcs9_contentType: return ASN_CONTENT_TYPE;
12790
        case WC_NID_serialNumber: return ASN_SERIAL_NUMBER;
12791
        case WC_NID_userId: return ASN_USER_ID;
12792
        case WC_NID_businessCategory: return ASN_BUS_CAT;
12793
        case WC_NID_domainComponent: return ASN_DOMAIN_COMPONENT;
12794
        case WC_NID_postalCode: return ASN_POSTAL_CODE;
12795
        case WC_NID_rfc822Mailbox: return ASN_RFC822_MAILBOX;
12796
        case WC_NID_favouriteDrink: return ASN_FAVOURITE_DRINK;
12797
        default:
12798
            WOLFSSL_MSG("Attribute NID not found");
12799
            return WOLFSSL_FATAL_ERROR;
12800
    }
12801
}
12802
#endif /* OPENSSL_ALL || OPENSSL_EXTRA ||
12803
          OPENSSL_EXTRA_X509_SMALL || WOLFSSL_WPAS_SMALL*/
12804
12805
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
12806
    defined(OPENSSL_EXTRA_X509_SMALL)
12807
/* This is to convert the x509 name structure into canonical DER format     */
12808
/*  , which has the following rules:                                        */
12809
/*   convert to UTF8                                                        */
12810
/*   convert to lower case                                                  */
12811
/*   multi-spaces collapsed                                                 */
12812
/*   leading SEQUENCE header is skipped                                     */
12813
/* @param  name a pointer to X509_NAME that is to be converted              */
12814
/* @param  out  a pointer to converted data                                 */
12815
/* @return a number of converted bytes, otherwise <=0 error code            */
12816
int wolfSSL_i2d_X509_NAME_canon(WOLFSSL_X509_NAME* name, unsigned char** out)
12817
{
12818
    int  totalBytes = 0, i, idx;
12819
    byte *output, *local = NULL;
12820
    WC_DECLARE_VAR(names, EncodedName, MAX_NAME_ENTRIES, 0);
12821
12822
    if (name == NULL)
12823
        return BAD_FUNC_ARG;
12824
12825
    WC_ALLOC_VAR_EX(names, EncodedName, MAX_NAME_ENTRIES, NULL,
12826
        DYNAMIC_TYPE_TMP_BUFFER, return MEMORY_E);
12827
12828
    XMEMSET(names, 0, sizeof(EncodedName) * MAX_NAME_ENTRIES);
12829
12830
    for (i = 0; i < MAX_NAME_ENTRIES; i++) {
12831
        WOLFSSL_X509_NAME_ENTRY* entry;
12832
        int ret;
12833
12834
        entry = wolfSSL_X509_NAME_get_entry(name, i);
12835
        if (entry != NULL && entry->set >= 1) {
12836
            const char* nameStr;
12837
            WOLFSSL_ASN1_STRING* data;
12838
            WOLFSSL_ASN1_STRING* cano_data;
12839
12840
            cano_data = wolfSSL_ASN1_STRING_new();
12841
            if (cano_data == NULL) {
12842
                WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12843
                return MEMORY_E;
12844
            }
12845
12846
            data = wolfSSL_X509_NAME_ENTRY_get_data(entry);
12847
            if (data == NULL) {
12848
                WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12849
                wolfSSL_ASN1_STRING_free(cano_data);
12850
                WOLFSSL_MSG("Error getting entry data");
12851
                return WOLFSSL_FATAL_ERROR;
12852
            }
12853
            if (wolfSSL_ASN1_STRING_canon(cano_data, data) != WOLFSSL_SUCCESS) {
12854
                WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12855
                wolfSSL_ASN1_STRING_free(cano_data);
12856
                return WOLFSSL_FAILURE;
12857
            }
12858
            nameStr = (const char*)wolfSSL_ASN1_STRING_data(cano_data);
12859
12860
            /* allow for blank values in the name structure, eg OU= */
12861
            if (nameStr)
12862
            {
12863
                ret = wc_EncodeNameCanonical(&names[i], nameStr, CTC_UTF8,
12864
                    (byte)ConvertNIDToWolfSSL(entry->nid));
12865
                if (ret < 0) {
12866
                    WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12867
                    wolfSSL_ASN1_STRING_free(cano_data);
12868
                    WOLFSSL_MSG("EncodeName failed");
12869
                    return WOLFSSL_FATAL_ERROR;
12870
                }
12871
                totalBytes += ret;
12872
            }
12873
12874
            wolfSSL_ASN1_STRING_free(cano_data);
12875
        }
12876
    }
12877
12878
    if (out == NULL) {
12879
        /* If out is NULL, caller just wants length. */
12880
        WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12881
        return totalBytes;
12882
    }
12883
12884
    /* skip header */
12885
    /* check if using buffer passed in */
12886
    if (*out == NULL) {
12887
        *out = local = (unsigned char*)XMALLOC(totalBytes, NULL,
12888
                DYNAMIC_TYPE_OPENSSL);
12889
        if (*out == NULL) {
12890
            return MEMORY_E;
12891
        }
12892
    }
12893
    output = *out;
12894
    idx = 0;
12895
12896
    for (i = 0; i < MAX_NAME_ENTRIES; i++) {
12897
        if (names[i].used) {
12898
            XMEMCPY(output + idx, names[i].encoded, names[i].totalLen);
12899
            idx += names[i].totalLen;
12900
        }
12901
    }
12902
12903
    WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12904
12905
    /* used existing buffer passed in, so increment pointer */
12906
    if (local == NULL) {
12907
        *out += totalBytes;
12908
    }
12909
    return totalBytes;
12910
}
12911
#endif /* OPENSSL_ALL || OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
12912
12913
#ifdef WOLFSSL_CERT_GEN
12914
/* Guarded by either
12915
 * A) WOLFSSL_WPAS_SMALL is on or
12916
 * B) (OPENSSL_EXTRA or OPENSSL_EXTRA_X509_SMALL) + WOLFSSL_CERT_GEN +
12917
 *    (WOLFSSL_CERT_REQ or WOLFSSL_CERT_EXT or OPENSSL_EXTRA) has been
12918
 *    defined
12919
 */
12920
#if defined(WOLFSSL_WPAS_SMALL) || \
12921
    (defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)) && \
12922
    defined(WOLFSSL_CERT_GEN) && \
12923
    (defined(WOLFSSL_CERT_REQ) || defined(WOLFSSL_CERT_EXT) || \
12924
     defined(OPENSSL_EXTRA))
12925
12926
/* Converts the x509 name structure into DER format.
12927
 *
12928
 * out  pointer to either a pre setup buffer or a pointer to null for
12929
 *      creating a dynamic buffer. In the case that a pre-existing buffer is
12930
 *      used out will be incremented the size of the DER buffer on success. If
12931
 *      out is NULL, the function returns the necessary output buffer length.
12932
 *
12933
 * returns the size of the buffer on success, or negative value with failure
12934
 */
12935
int wolfSSL_i2d_X509_NAME(WOLFSSL_X509_NAME* name, unsigned char** out)
12936
{
12937
    int  totalBytes = 0, i, idx;
12938
    byte temp[MAX_SEQ_SZ];
12939
    byte *output, *local = NULL;
12940
    WC_DECLARE_VAR(names, EncodedName, MAX_NAME_ENTRIES, 0);
12941
12942
    if (name == NULL)
12943
        return BAD_FUNC_ARG;
12944
12945
    WC_ALLOC_VAR_EX(names, EncodedName, MAX_NAME_ENTRIES, NULL,
12946
        DYNAMIC_TYPE_TMP_BUFFER, return MEMORY_E);
12947
12948
    XMEMSET(names, 0, sizeof(EncodedName) * MAX_NAME_ENTRIES);
12949
12950
    for (i = 0; i < MAX_NAME_ENTRIES; i++) {
12951
        WOLFSSL_X509_NAME_ENTRY* entry;
12952
        int ret;
12953
12954
        entry = wolfSSL_X509_NAME_get_entry(name, i);
12955
        if (entry != NULL && entry->set >= 1) {
12956
            const char* nameStr;
12957
            int type;
12958
            WOLFSSL_ASN1_STRING* data;
12959
12960
            data = wolfSSL_X509_NAME_ENTRY_get_data(entry);
12961
            if (data == NULL) {
12962
                WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12963
                WOLFSSL_MSG("Error getting entry data");
12964
                return WOLFSSL_FATAL_ERROR;
12965
            }
12966
12967
            nameStr = (const char*)wolfSSL_ASN1_STRING_data(data);
12968
            type    = wolfSSL_ASN1_STRING_type(data);
12969
12970
            switch (type) {
12971
                case WOLFSSL_MBSTRING_UTF8:
12972
                    type = CTC_UTF8;
12973
                    break;
12974
                case WOLFSSL_MBSTRING_ASC:
12975
                case WOLFSSL_V_ASN1_PRINTABLESTRING:
12976
                    type = CTC_PRINTABLE;
12977
                    break;
12978
                default:
12979
                    WOLFSSL_MSG(
12980
                        "Unknown encoding type conversion UTF8 by default");
12981
                    type = CTC_UTF8;
12982
            }
12983
            ret = wc_EncodeName(&names[i], nameStr, (char)type,
12984
                (byte)ConvertNIDToWolfSSL(entry->nid));
12985
            if (ret < 0) {
12986
                WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12987
                WOLFSSL_MSG("EncodeName failed");
12988
                return WOLFSSL_FATAL_ERROR;
12989
            }
12990
            totalBytes += ret;
12991
        }
12992
    }
12993
12994
    /* header */
12995
    idx = (int)SetSequence((word32)totalBytes, temp);
12996
    if (totalBytes + idx > ASN_NAME_MAX) {
12997
        WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
12998
        WOLFSSL_MSG("Total Bytes is greater than ASN_NAME_MAX");
12999
        return BUFFER_E;
13000
    }
13001
13002
    if (out == NULL) {
13003
        /* If out is NULL, caller just wants length. */
13004
        totalBytes += idx;
13005
        WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
13006
        return totalBytes;
13007
    }
13008
13009
    /* check if using buffer passed in */
13010
    if (*out == NULL) {
13011
        *out = local = (unsigned char*)XMALLOC(totalBytes + idx, name->heap,
13012
                DYNAMIC_TYPE_OPENSSL);
13013
        if (*out == NULL) {
13014
            return MEMORY_E;
13015
        }
13016
    }
13017
    output = *out;
13018
13019
    idx = (int)SetSequence((word32)totalBytes, output);
13020
    totalBytes += idx;
13021
    for (i = 0; i < MAX_NAME_ENTRIES; i++) {
13022
        if (names[i].used) {
13023
            XMEMCPY(output + idx, names[i].encoded, names[i].totalLen);
13024
            idx += names[i].totalLen;
13025
        }
13026
    }
13027
13028
    WC_FREE_VAR_EX(names, NULL, DYNAMIC_TYPE_TMP_BUFFER);
13029
13030
    /* used existing buffer passed in, so increment pointer */
13031
    if (local == NULL) {
13032
        *out += totalBytes;
13033
    }
13034
    return totalBytes;
13035
}
13036
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
13037
#endif /* WOLFSSL_CERT_GEN */
13038
13039
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL) || \
13040
    defined (WOLFSSL_WPAS_SMALL)
13041
13042
    WOLFSSL_X509_NAME *wolfSSL_d2i_X509_NAME(WOLFSSL_X509_NAME **name,
13043
                                             unsigned char **in, long length)
13044
    {
13045
        WOLFSSL_X509_NAME* tmp = NULL;
13046
        WC_DECLARE_VAR(cert, DecodedCert, 1, 0);
13047
13048
        WOLFSSL_ENTER("wolfSSL_d2i_X509_NAME");
13049
13050
        if (!in || !*in || length <= 0) {
13051
            WOLFSSL_MSG("Bad argument");
13052
            return NULL;
13053
        }
13054
13055
        WC_ALLOC_VAR_EX(cert, DecodedCert, 1, NULL, DYNAMIC_TYPE_DCERT,
13056
            return NULL);
13057
13058
        /* Set the X509_NAME buffer as the input data for cert.
13059
         * in is NOT a full certificate. Just the name. */
13060
        InitDecodedCert(cert, *in, (word32)length, NULL);
13061
13062
        /* Parse the X509 subject name */
13063
        if (GetName(cert, ASN_SUBJECT, (int)length) != 0) {
13064
            WOLFSSL_MSG("WOLFSSL_X509_NAME parse error");
13065
            goto cleanup;
13066
        }
13067
13068
        if (!(tmp = wolfSSL_X509_NAME_new_ex(cert->heap))) {
13069
            WOLFSSL_MSG("wolfSSL_X509_NAME_new_ex error");
13070
            goto cleanup;
13071
        }
13072
13073
        if (wolfSSL_X509_NAME_copy((WOLFSSL_X509_NAME*)cert->subjectName,
13074
                    tmp) != WOLFSSL_SUCCESS) {
13075
            wolfSSL_X509_NAME_free(tmp);
13076
            tmp = NULL;
13077
            goto cleanup;
13078
        }
13079
13080
        if (name)
13081
            *name = tmp;
13082
cleanup:
13083
        FreeDecodedCert(cert);
13084
        WC_FREE_VAR_EX(cert, NULL, DYNAMIC_TYPE_DCERT);
13085
        return tmp;
13086
    }
13087
#endif /* OPENSSL_EXTRA || OPENSSL_ALL || WOLFSSL_WPAS_SMALL */
13088
13089
13090
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL)
13091
13092
    /* Compares the two X509 names. If the size of x is larger then y then a
13093
     * positive value is returned if x is smaller a negative value is returned.
13094
     * In the case that the sizes are equal a the value of strcmp between the
13095
     * two names is returned.
13096
     *
13097
     * x First name for comparison
13098
     * y Second name to compare with x
13099
     */
13100
    int wolfSSL_X509_NAME_cmp(const WOLFSSL_X509_NAME* x,
13101
            const WOLFSSL_X509_NAME* y)
13102
    {
13103
        const char* _x;
13104
        const char* _y;
13105
        WOLFSSL_ENTER("wolfSSL_X509_NAME_cmp");
13106
13107
        if (x == NULL || y == NULL) {
13108
            WOLFSSL_MSG("Bad argument passed in");
13109
            return -2;
13110
        }
13111
13112
        if (x == y) {
13113
            return 0; /* match */
13114
        }
13115
13116
        if (x->sz != y->sz) {
13117
            return x->sz - y->sz;
13118
        }
13119
13120
        /*
13121
         * If the name member is not set or is immediately null terminated then
13122
         * compare the staticName member
13123
         */
13124
        _x = (x->name && *x->name) ? x->name : x->staticName;
13125
        _y = (y->name && *y->name) ? y->name : y->staticName;
13126
13127
        return XSTRNCASECMP(_x, _y, x->sz); /* y sz is the same */
13128
    }
13129
13130
#ifndef NO_BIO
13131
13132
static WOLFSSL_X509 *loadX509orX509REQFromPemBio(WOLFSSL_BIO *bp,
13133
        WOLFSSL_X509 **x, wc_pem_password_cb *cb, void *u, int type)
13134
{
13135
    WOLFSSL_X509* x509 = NULL;
13136
#if defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM)
13137
    unsigned char* pem = NULL;
13138
    int pemSz;
13139
    long  i = 0, l, footerSz;
13140
    const char* footer = NULL;
13141
    int streaming = 0;  /* Flag to indicate if source is streaming (FIFO) */
13142
    const char* altFooter = NULL;
13143
    long altFooterSz = 0;
13144
13145
    WOLFSSL_ENTER("loadX509orX509REQFromPemBio");
13146
13147
    if (bp == NULL || (type != CERT_TYPE && type != CERTREQ_TYPE &&
13148
                       type != TRUSTED_CERT_TYPE)) {
13149
        WOLFSSL_LEAVE("wolfSSL_PEM_read_bio_X509", BAD_FUNC_ARG);
13150
        return NULL;
13151
    }
13152
13153
    if ((l = wolfSSL_BIO_get_len(bp)) <= 0) {
13154
        /* No certificate size available - could be FIFO or other streaming
13155
         * source. Use MAX_X509_SIZE as initial buffer, will resize if needed. */
13156
        l = MAX_X509_SIZE;
13157
        streaming = 1;
13158
    }
13159
13160
    pemSz = (int)l;
13161
    pem   = (unsigned char*)XMALLOC(pemSz, 0, DYNAMIC_TYPE_PEM);
13162
    if (pem == NULL)
13163
        return NULL;
13164
    XMEMSET(pem, 0, pemSz);
13165
13166
    i = 0;
13167
    if (wc_PemGetHeaderFooter(type, NULL, &footer) != 0) {
13168
        XFREE(pem, 0, DYNAMIC_TYPE_PEM);
13169
        return NULL;
13170
    }
13171
    footerSz = (long)XSTRLEN(footer);
13172
13173
    /* For TRUSTED_CERT_TYPE, also prepare to check for regular CERT footer
13174
     * as the file might contain regular certificates instead of TRUSTED
13175
     * format */
13176
    if (type == TRUSTED_CERT_TYPE) {
13177
        wc_PemGetHeaderFooter(CERT_TYPE, NULL, &altFooter);
13178
        if (altFooter != NULL) {
13179
            altFooterSz = (long)XSTRLEN(altFooter);
13180
        }
13181
    }
13182
13183
    /* TODO: Inefficient
13184
     * reading in one byte at a time until see the footer
13185
     */
13186
    while ((l = wolfSSL_BIO_read(bp, (char *)&pem[i], 1)) == 1) {
13187
        int foundFooter = 0;
13188
        i++;
13189
        /* Check if buffer is full and we're reading from streaming source */
13190
        if (i >= pemSz && streaming) {
13191
            /* Double the buffer size for streaming sources */
13192
            int newSz = pemSz * 2;
13193
            unsigned char* newPem;
13194
13195
            /* Sanity check: don't grow beyond reasonable limit */
13196
            if (newSz > MAX_BIO_READ_BUFFER) {
13197
                WOLFSSL_MSG("PEM data too large for streaming source");
13198
                XFREE(pem, 0, DYNAMIC_TYPE_PEM);
13199
                return NULL;
13200
            }
13201
13202
            newPem = (unsigned char*)XREALLOC(pem, newSz, 0, DYNAMIC_TYPE_PEM);
13203
            if (newPem == NULL) {
13204
                WOLFSSL_MSG("Failed to resize PEM buffer");
13205
                XFREE(pem, 0, DYNAMIC_TYPE_PEM);
13206
                return NULL;
13207
            }
13208
13209
            pem = newPem;
13210
            pemSz = newSz;
13211
        }
13212
        else if (i > pemSz) {
13213
            /* Buffer full for non-streaming source - this shouldn't happen */
13214
            break;
13215
        }
13216
13217
        /* Check for the expected footer OR alternate footer (for
13218
         * TRUSTED_CERT_TYPE) */
13219
        if (i > footerSz &&
13220
            XMEMCMP((char *)&pem[i-footerSz], footer, footerSz) == 0) {
13221
            foundFooter = 1;
13222
        }
13223
        else if (i > altFooterSz && altFooter != NULL &&
13224
            XMEMCMP((char *)&pem[i-altFooterSz], altFooter, altFooterSz) == 0) {
13225
            foundFooter = 1;
13226
        }
13227
13228
        if (foundFooter) {
13229
            if (i < pemSz && wolfSSL_BIO_read(bp, (char *)&pem[i], 1) == 1) {
13230
                /* attempt to read newline following footer */
13231
                i++;
13232
                if (i < pemSz && pem[i-1] == '\r') {
13233
                    /* found \r , Windows line ending is \r\n so try to read one
13234
                     * more byte for \n, ignoring return value */
13235
                    (void)wolfSSL_BIO_read(bp, (char *)&pem[i++], 1);
13236
                }
13237
            }
13238
            break;
13239
        }
13240
    }
13241
    if (l == 0 && i == 0) {
13242
        WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
13243
    }
13244
    if (i > pemSz) {
13245
        WOLFSSL_MSG("Error parsing PEM");
13246
    }
13247
    else {
13248
        pemSz = (int)i;
13249
    #ifdef WOLFSSL_CERT_REQ
13250
        if (type == CERTREQ_TYPE)
13251
            x509 = loadX509orX509REQFromBuffer(pem, pemSz, WOLFSSL_FILETYPE_PEM,
13252
                CERTREQ_TYPE, cb, u);
13253
        else
13254
    #endif
13255
        /* Use TRUSTED_CERT_TYPE if input was TRUSTED CERTIFICATE format,
13256
         * otherwise use CERT_TYPE for regular certificates */
13257
        if (type == TRUSTED_CERT_TYPE)
13258
            x509 = loadX509orX509REQFromBuffer(pem, pemSz, WOLFSSL_FILETYPE_PEM,
13259
                TRUSTED_CERT_TYPE, cb, u);
13260
        else
13261
            x509 = loadX509orX509REQFromBuffer(pem, pemSz, WOLFSSL_FILETYPE_PEM,
13262
                CERT_TYPE, cb, u);
13263
    }
13264
13265
    if (x != NULL) {
13266
        *x = x509;
13267
    }
13268
13269
    XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13270
13271
#endif /* WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM */
13272
    (void)bp;
13273
    (void)x;
13274
    (void)cb;
13275
    (void)u;
13276
13277
    return x509;
13278
}
13279
13280
13281
WC_MAYBE_UNUSED
13282
static unsigned char* ReadPemFromBioToBuffer(WOLFSSL_BIO *bp, int *pemSz)
13283
{
13284
    unsigned char* pem = NULL;
13285
13286
    WOLFSSL_ENTER("ReadPemFromBioToBuffer");
13287
13288
    if (bp == NULL || pemSz == NULL) {
13289
        WOLFSSL_LEAVE("ReadPemFromBioToBuffer", BAD_FUNC_ARG);
13290
        return NULL;
13291
    }
13292
13293
    if ((*pemSz = wolfSSL_BIO_get_len(bp)) <= 0) {
13294
        /* No certificate size available - could be FIFO or other streaming
13295
         * source. Use MAX_X509_SIZE as initial buffer, read in loop. */
13296
        int totalRead = 0;
13297
        int readSz;
13298
13299
        *pemSz = MAX_X509_SIZE;
13300
        pem = (unsigned char*)XMALLOC(*pemSz, 0, DYNAMIC_TYPE_PEM);
13301
        if (pem == NULL) {
13302
            return NULL;
13303
        }
13304
13305
        /* Read from streaming source until EOF or buffer full */
13306
        while ((readSz = wolfSSL_BIO_read(bp, pem + totalRead,
13307
                                          *pemSz - totalRead)) > 0) {
13308
            totalRead += readSz;
13309
13310
            /* If buffer is full, try to grow it */
13311
            if (totalRead >= *pemSz) {
13312
                int newSz = *pemSz * 2;
13313
                unsigned char* newPem;
13314
13315
                /* Sanity check */
13316
                if (newSz > MAX_BIO_READ_BUFFER) {
13317
                    WOLFSSL_MSG("PEM data too large for streaming source");
13318
                    XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13319
                    return NULL;
13320
                }
13321
13322
                newPem = (unsigned char*)XREALLOC(pem, newSz, 0,
13323
                        DYNAMIC_TYPE_PEM);
13324
                if (newPem == NULL) {
13325
                    XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13326
                    return NULL;
13327
                }
13328
                pem = newPem;
13329
                *pemSz = newSz;
13330
            }
13331
        }
13332
13333
        *pemSz = totalRead;
13334
        if (*pemSz <= 0) {
13335
            XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13336
            return NULL;
13337
        }
13338
    }
13339
    else {
13340
        /* Known size - allocate and read */
13341
        pem = (unsigned char*)XMALLOC(*pemSz, 0, DYNAMIC_TYPE_PEM);
13342
        if (pem == NULL) {
13343
            return NULL;
13344
        }
13345
13346
        XMEMSET(pem, 0, *pemSz);
13347
13348
        *pemSz = wolfSSL_BIO_read(bp, pem, *pemSz);
13349
        if (*pemSz <= 0) {
13350
            XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13351
            return NULL;
13352
        }
13353
    }
13354
13355
    WOLFSSL_LEAVE("ReadPemFromBioToBuffer", 0);
13356
    return pem;
13357
}
13358
13359
13360
13361
#if defined(WOLFSSL_ACERT)
13362
    WOLFSSL_X509_ACERT *wolfSSL_PEM_read_bio_X509_ACERT(WOLFSSL_BIO *bp,
13363
                                                        WOLFSSL_X509_ACERT **x,
13364
                                                        wc_pem_password_cb *cb,
13365
                                                        void *u)
13366
    {
13367
        WOLFSSL_X509_ACERT* x509 = NULL;
13368
#if defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM)
13369
        unsigned char * pem = NULL;
13370
        int             pemSz;
13371
13372
        WOLFSSL_ENTER("wolfSSL_PEM_read_bio_X509_ACERT");
13373
13374
        if (bp == NULL) {
13375
            return NULL;
13376
        }
13377
13378
        pem = ReadPemFromBioToBuffer(bp, &pemSz);
13379
        if (pem == NULL) {
13380
            return NULL;
13381
        }
13382
13383
        x509 = wolfSSL_X509_ACERT_load_certificate_buffer(pem, pemSz,
13384
                                                          WOLFSSL_FILETYPE_PEM);
13385
13386
        if (x != NULL) {
13387
            *x = x509;
13388
        }
13389
13390
        XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13391
13392
#endif /* WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM */
13393
        (void)bp;
13394
        (void)x;
13395
        (void)cb;
13396
        (void)u;
13397
13398
        return x509;
13399
13400
    }
13401
#endif /* WOLFSSL_ACERT */
13402
13403
    WOLFSSL_X509 *wolfSSL_PEM_read_bio_X509(WOLFSSL_BIO *bp, WOLFSSL_X509 **x,
13404
                                            wc_pem_password_cb *cb, void *u)
13405
    {
13406
        return loadX509orX509REQFromPemBio(bp, x, cb, u, CERT_TYPE);
13407
    }
13408
13409
    /*
13410
     * bp : bio to read X509 from
13411
     * x  : x509 to write to
13412
     * cb : password call back for reading PEM
13413
     * u  : password
13414
     * _AUX is for working with a trusted X509 certificate
13415
     */
13416
    WOLFSSL_X509 *wolfSSL_PEM_read_bio_X509_AUX(WOLFSSL_BIO *bp,
13417
                               WOLFSSL_X509 **x, wc_pem_password_cb *cb,
13418
                               void *u)
13419
    {
13420
        WOLFSSL_ENTER("wolfSSL_PEM_read_bio_X509_AUX");
13421
13422
        /* AUX info is; trusted/rejected uses, friendly name, private key id,
13423
         * and potentially a stack of "other" info. wolfSSL does not store
13424
         * friendly name or private key id yet in WOLFSSL_X509 for human
13425
         * readability and does not support extra trusted/rejected uses for
13426
         * root CA. Use TRUSTED_CERT_TYPE to properly parse TRUSTED CERTIFICATE
13427
         * format and strip auxiliary data. */
13428
        return loadX509orX509REQFromPemBio(bp, x, cb, u, TRUSTED_CERT_TYPE);
13429
    }
13430
13431
#ifdef WOLFSSL_CERT_REQ
13432
WOLFSSL_X509 *wolfSSL_PEM_read_bio_X509_REQ(WOLFSSL_BIO *bp, WOLFSSL_X509 **x,
13433
                                                wc_pem_password_cb *cb, void *u)
13434
{
13435
    return loadX509orX509REQFromPemBio(bp, x, cb, u, CERTREQ_TYPE);
13436
}
13437
13438
#ifndef NO_FILESYSTEM
13439
    WOLFSSL_X509* wolfSSL_PEM_read_X509_REQ(XFILE fp, WOLFSSL_X509** x,
13440
                                            wc_pem_password_cb* cb, void* u)
13441
    {
13442
        int err = 0;
13443
        WOLFSSL_X509* ret = NULL;
13444
        WOLFSSL_BIO* bio = NULL;
13445
13446
        WOLFSSL_ENTER("wolfSSL_PEM_read_X509_REQ");
13447
13448
        if (fp == XBADFILE) {
13449
            WOLFSSL_MSG("Invalid file.");
13450
            err = 1;
13451
        }
13452
13453
        if (err == 0) {
13454
            bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file());
13455
            if (bio == NULL) {
13456
                WOLFSSL_MSG("Failed to create new BIO with input file.");
13457
                err = 1;
13458
            }
13459
        }
13460
        if (err == 0 && wolfSSL_BIO_set_fp(bio, fp, WOLFSSL_BIO_CLOSE)
13461
                != WOLFSSL_SUCCESS) {
13462
            WOLFSSL_MSG("Failed to set BIO file pointer.");
13463
            err = 1;
13464
        }
13465
        if (err == 0) {
13466
            ret = wolfSSL_PEM_read_bio_X509_REQ(bio, x, cb, u);
13467
        }
13468
13469
        wolfSSL_BIO_free(bio);
13470
13471
        return ret;
13472
    }
13473
#endif /* !NO_FILESYSTEM */
13474
#endif /* WOLFSSL_CERT_REQ */
13475
13476
    WOLFSSL_X509_CRL *wolfSSL_PEM_read_bio_X509_CRL(WOLFSSL_BIO *bp,
13477
            WOLFSSL_X509_CRL **x, wc_pem_password_cb *cb, void *u)
13478
    {
13479
#if defined(WOLFSSL_PEM_TO_DER) && defined(HAVE_CRL)
13480
        unsigned char* pem = NULL;
13481
        int pemSz = 0;
13482
        int derSz = 0;
13483
        DerBuffer* der = NULL;
13484
        WOLFSSL_X509_CRL* crl = NULL;
13485
13486
        WOLFSSL_ENTER("wolfSSL_PEM_read_bio_X509_CRL");
13487
13488
        if ((pem = ReadPemFromBioToBuffer(bp, &pemSz)) == NULL) {
13489
            goto err;
13490
        }
13491
13492
        if ((PemToDer(pem, pemSz, CRL_TYPE, &der, NULL, NULL, NULL)) < 0) {
13493
            goto err;
13494
        }
13495
        derSz = (int)der->length;
13496
        if ((crl = wolfSSL_d2i_X509_CRL(x, der->buffer, derSz)) == NULL) {
13497
            goto err;
13498
        }
13499
13500
err:
13501
        if (pemSz == 0) {
13502
            WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
13503
        }
13504
        XFREE(pem, 0, DYNAMIC_TYPE_PEM);
13505
        if (der != NULL) {
13506
            FreeDer(&der);
13507
        }
13508
13509
        (void)cb;
13510
        (void)u;
13511
13512
        return crl;
13513
#else
13514
        (void)bp;
13515
        (void)x;
13516
        (void)cb;
13517
        (void)u;
13518
13519
        return NULL;
13520
#endif
13521
    }
13522
13523
#endif /* !NO_BIO */
13524
13525
#if !defined(NO_FILESYSTEM)
13526
static void* wolfSSL_PEM_read_X509_ex(XFILE fp, void **x,
13527
    wc_pem_password_cb *cb, void *u, int type)
13528
{
13529
    unsigned char* pem = NULL;
13530
    int pemSz;
13531
    long i = 0, l;
13532
    void *newx509;
13533
    int derSz;
13534
    DerBuffer* der = NULL;
13535
13536
    WOLFSSL_ENTER("wolfSSL_PEM_read_X509");
13537
13538
    if (fp == XBADFILE) {
13539
        WOLFSSL_LEAVE("wolfSSL_PEM_read_X509", BAD_FUNC_ARG);
13540
        return NULL;
13541
    }
13542
    /* Read cert from file */
13543
    i = XFTELL(fp);
13544
    if (i < 0) {
13545
        WOLFSSL_LEAVE("wolfSSL_PEM_read_X509", BAD_FUNC_ARG);
13546
        return NULL;
13547
    }
13548
13549
    if (XFSEEK(fp, 0, XSEEK_END) != 0)
13550
        return NULL;
13551
    l = XFTELL(fp);
13552
    if (l < 0)
13553
        return NULL;
13554
    if (XFSEEK(fp, i, SEEK_SET) != 0)
13555
        return NULL;
13556
    pemSz = (int)(l - i);
13557
13558
    /* check calculated length */
13559
    if (pemSz > MAX_WOLFSSL_FILE_SIZE || pemSz <= 0) {
13560
        WOLFSSL_MSG("PEM_read_X509_ex file size error");
13561
        return NULL;
13562
    }
13563
13564
    /* allocate pem buffer */
13565
    pem = (unsigned char*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_PEM);
13566
    if (pem == NULL)
13567
        return NULL;
13568
13569
    if ((int)XFREAD((char *)pem, 1, (size_t)pemSz, fp) != pemSz)
13570
        goto err_exit;
13571
13572
    switch (type) {
13573
        case CERT_TYPE:
13574
            newx509 = (void *)wolfSSL_X509_load_certificate_buffer(pem,
13575
                pemSz, WOLFSSL_FILETYPE_PEM);
13576
            break;
13577
13578
    #ifdef HAVE_CRL
13579
        case CRL_TYPE:
13580
            if ((PemToDer(pem, pemSz, CRL_TYPE, &der, NULL, NULL, NULL)) < 0)
13581
                goto err_exit;
13582
            derSz = (int)der->length;
13583
            newx509 = (void*)wolfSSL_d2i_X509_CRL((WOLFSSL_X509_CRL **)x,
13584
                (const unsigned char *)der->buffer, derSz);
13585
            if (newx509 == NULL)
13586
                goto err_exit;
13587
            FreeDer(&der);
13588
            break;
13589
    #endif
13590
13591
        default:
13592
            goto err_exit;
13593
    }
13594
    if (x != NULL) {
13595
        *x = newx509;
13596
    }
13597
    XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13598
    return newx509;
13599
13600
err_exit:
13601
    XFREE(pem, NULL, DYNAMIC_TYPE_PEM);
13602
    if (der != NULL)
13603
        FreeDer(&der);
13604
13605
    /* unused */
13606
    (void)cb;
13607
    (void)u;
13608
    (void)derSz;
13609
13610
    return NULL;
13611
}
13612
13613
WOLFSSL_X509* wolfSSL_PEM_read_X509(XFILE fp, WOLFSSL_X509 **x,
13614
                                                wc_pem_password_cb *cb, void *u)
13615
{
13616
    return (WOLFSSL_X509* )wolfSSL_PEM_read_X509_ex(fp, (void **)x, cb, u,
13617
         CERT_TYPE);
13618
}
13619
13620
#if defined(HAVE_CRL)
13621
WOLFSSL_X509_CRL* wolfSSL_PEM_read_X509_CRL(XFILE fp,
13622
                        WOLFSSL_X509_CRL **crl, wc_pem_password_cb *cb, void *u)
13623
{
13624
    return (WOLFSSL_X509_CRL* )wolfSSL_PEM_read_X509_ex(fp, (void **)crl, cb, u,
13625
         CRL_TYPE);
13626
}
13627
13628
/* Store CRL to file in DER or PEM format.
13629
 * Returns WOLFSSL_SUCCESS on success, negative on failure.
13630
 */
13631
int wolfSSL_write_X509_CRL(WOLFSSL_X509_CRL* crl, const char* path, int type)
13632
{
13633
    int ret;
13634
    WOLFSSL_ENTER("wolfSSL_write_X509_CRL");
13635
    ret = StoreCRL(crl, path, type);
13636
    WOLFSSL_LEAVE("wolfSSL_write_X509_CRL", ret);
13637
    return ret;
13638
}
13639
#endif
13640
13641
#ifdef WOLFSSL_CERT_GEN
13642
#ifndef NO_BIO
13643
    int wolfSSL_PEM_write_X509(XFILE fp, WOLFSSL_X509* x)
13644
    {
13645
        int ret;
13646
        WOLFSSL_BIO* bio;
13647
13648
        if (x == NULL || fp == XBADFILE)
13649
            return 0;
13650
13651
        bio = wolfSSL_BIO_new(wolfSSL_BIO_s_file());
13652
        if (bio == NULL)
13653
            return 0;
13654
13655
        if (wolfSSL_BIO_set_fp(bio, fp, WOLFSSL_BIO_NOCLOSE) != WOLFSSL_SUCCESS) {
13656
            wolfSSL_BIO_free(bio);
13657
            bio = NULL;
13658
        }
13659
13660
        ret = wolfSSL_PEM_write_bio_X509(bio, x);
13661
13662
        if (bio != NULL)
13663
            wolfSSL_BIO_free(bio);
13664
13665
        return ret;
13666
    }
13667
#endif /* !NO_BIO */
13668
#endif /* WOLFSSL_CERT_GEN */
13669
#endif /* !NO_FILESYSTEM */
13670
13671
#endif /* OPENSSL_EXTRA || OPENSSL_ALL */
13672
#ifdef OPENSSL_ALL
13673
13674
#ifndef NO_BIO
13675
    /* create and return a new WOLFSSL_X509_PKEY structure or NULL on failure */
13676
    static WOLFSSL_X509_PKEY* wolfSSL_X509_PKEY_new(void* heap)
13677
    {
13678
        WOLFSSL_X509_PKEY* ret;
13679
13680
        ret = (WOLFSSL_X509_PKEY*)XMALLOC(sizeof(WOLFSSL_X509_PKEY), heap,
13681
            DYNAMIC_TYPE_KEY);
13682
        if (ret != NULL) {
13683
            XMEMSET(ret, 0, sizeof(WOLFSSL_X509_PKEY));
13684
            ret->heap = heap;
13685
        }
13686
        return ret;
13687
    }
13688
#endif /* !NO_BIO */
13689
13690
13691
    /* free up all memory used by "xPkey" passed in */
13692
    static void wolfSSL_X509_PKEY_free(WOLFSSL_X509_PKEY* xPkey)
13693
    {
13694
        if (xPkey != NULL) {
13695
            wolfSSL_EVP_PKEY_free(xPkey->dec_pkey);
13696
            XFREE(xPkey, xPkey->heap, DYNAMIC_TYPE_KEY);
13697
        }
13698
    }
13699
13700
13701
#ifndef NO_BIO
13702
13703
#define PEM_COMPARE_HEADER(start, end, header) \
13704
        ((end) - (start) == XSTR_SIZEOF(header) && XMEMCMP(start, header, \
13705
                XSTR_SIZEOF(header)) == 0)
13706
13707
    /**
13708
     * This read one structure from bio and returns the read structure
13709
     * in the appropriate output parameter (x509, crl, x_pkey). The
13710
     * output parameters must be set to NULL.
13711
     * @param bio    Input for reading structures
13712
     * @param cb     Password callback
13713
     * @param x509   Output
13714
     * @param crl    Output
13715
     * @param x_pkey Output
13716
     * @return WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE otherwise
13717
     */
13718
    static int wolfSSL_PEM_X509_X509_CRL_X509_PKEY_read_bio(
13719
            WOLFSSL_BIO* bio, wc_pem_password_cb* cb, WOLFSSL_X509** x509,
13720
            WOLFSSL_X509_CRL** crl, WOLFSSL_X509_PKEY** x_pkey)
13721
    {
13722
13723
#if defined(WOLFSSL_PEM_TO_DER) || defined(WOLFSSL_DER_TO_PEM)
13724
        char* pem = NULL;
13725
        long  i = pem_struct_min_sz, l;
13726
        const char* header = NULL;
13727
        const char* headerEnd = NULL;
13728
        const char* footer = NULL;
13729
        const char* footerEnd = NULL;
13730
    #ifdef HAVE_CRL
13731
        DerBuffer* der = NULL;
13732
    #endif
13733
        WOLFSSL_BIO* pemBio = NULL;
13734
13735
        if (!bio || !x509 || *x509 || !crl || *crl || !x_pkey || *x_pkey) {
13736
            WOLFSSL_MSG("Bad input parameter or output parameters "
13737
                        "not set to a NULL value.");
13738
            return WOLFSSL_FAILURE;
13739
        }
13740
13741
        l = wolfSSL_BIO_get_len(bio);
13742
13743
        if (l < 0) {
13744
            WOLFSSL_ERROR(BAD_FUNC_ARG);
13745
            return WOLFSSL_FAILURE;
13746
        }
13747
13748
        if (l <= pem_struct_min_sz) {
13749
            /* No certificate in buffer */
13750
            WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
13751
            return WOLFSSL_FAILURE;
13752
        }
13753
13754
        pem = (char*)XMALLOC(l, 0, DYNAMIC_TYPE_PEM);
13755
        if (pem == NULL)
13756
            return WOLFSSL_FAILURE;
13757
13758
        if (wolfSSL_BIO_read(bio, &pem[0], pem_struct_min_sz) !=
13759
                pem_struct_min_sz) {
13760
            WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
13761
            goto err;
13762
        }
13763
13764
        /* Read the header and footer */
13765
        while (i < l && wolfSSL_BIO_read(bio, &pem[i], 1) == 1) {
13766
            i++;
13767
            if (!header) {
13768
                header = XSTRNSTR(pem, "-----BEGIN ", (unsigned int)i);
13769
            }
13770
            else if (!headerEnd) {
13771
                headerEnd = XSTRNSTR(header + XSTR_SIZEOF("-----BEGIN "),
13772
                        "-----",
13773
                        (unsigned int)
13774
                        (i - (header + XSTR_SIZEOF("-----BEGIN ") - pem)));
13775
                if (headerEnd) {
13776
                    headerEnd += XSTR_SIZEOF("-----");
13777
                    /* Read in the newline */
13778
                    if (wolfSSL_BIO_read(bio, &pem[i], 1) != 1) {
13779
                        WOLFSSL_MSG("wolfSSL_BIO_read error");
13780
                        goto err;
13781
                    }
13782
                    i++;
13783
                    if (*headerEnd != '\n' && *headerEnd != '\r') {
13784
                        WOLFSSL_MSG("Missing newline after header");
13785
                        goto err;
13786
                    }
13787
                }
13788
            }
13789
            else if (!footer) {
13790
                footer = XSTRNSTR(headerEnd, "-----END ",
13791
                        (unsigned int)(i - (headerEnd - pem)));
13792
            }
13793
            else if (!footerEnd) {
13794
                footerEnd = XSTRNSTR(footer + XSTR_SIZEOF("-----"),
13795
                        "-----", (unsigned int)(i -
13796
                            (footer + XSTR_SIZEOF("-----") - pem)));
13797
                if (footerEnd) {
13798
                    footerEnd += XSTR_SIZEOF("-----");
13799
                    /* Now check that footer matches header */
13800
                    if ((headerEnd - (header + XSTR_SIZEOF("-----BEGIN "))) ==
13801
                        (footerEnd - (footer + XSTR_SIZEOF("-----END "))) &&
13802
                        XMEMCMP(header + XSTR_SIZEOF("-----BEGIN "),
13803
                                footer + XSTR_SIZEOF("-----END "),
13804
                        headerEnd - (header + XSTR_SIZEOF("-----BEGIN ")))
13805
                            != 0) {
13806
                        WOLFSSL_MSG("Header and footer don't match");
13807
                        goto err;
13808
                    }
13809
                    /* header and footer match */
13810
                    break;
13811
                }
13812
            }
13813
        }
13814
        if (!footerEnd) {
13815
            /* Only check footerEnd since it is set last */
13816
            WOLFSSL_ERROR(ASN_NO_PEM_HEADER);
13817
            goto err;
13818
        }
13819
        else {
13820
            if (PEM_COMPARE_HEADER(header, headerEnd,
13821
                    "-----BEGIN CERTIFICATE-----")) {
13822
                /* We have a certificate */
13823
                WOLFSSL_MSG("Parsing x509 cert");
13824
                *x509 = wolfSSL_X509_load_certificate_buffer(
13825
                        (const unsigned char*) header,
13826
                        (int)(footerEnd - header), WOLFSSL_FILETYPE_PEM);
13827
                if (!*x509) {
13828
                    WOLFSSL_MSG("wolfSSL_X509_load_certificate_buffer error");
13829
                    goto err;
13830
                }
13831
            }
13832
    #ifdef HAVE_CRL
13833
            else if (PEM_COMPARE_HEADER(header, headerEnd,
13834
                        "-----BEGIN X509 CRL-----")) {
13835
                /* We have a crl */
13836
                WOLFSSL_MSG("Parsing crl");
13837
                if ((PemToDer((const unsigned char*) header,
13838
                        (long)(footerEnd - header), CRL_TYPE, &der, NULL, NULL,
13839
                        NULL)) < 0) {
13840
                    WOLFSSL_MSG("PemToDer error");
13841
                    goto err;
13842
                }
13843
                *crl = wolfSSL_d2i_X509_CRL(NULL, der->buffer, der->length);
13844
                if (!*crl) {
13845
                    WOLFSSL_MSG("wolfSSL_d2i_X509_CRL error");
13846
                    goto err;
13847
                }
13848
            }
13849
    #endif
13850
            else {
13851
                WOLFSSL_MSG("Parsing x509 key");
13852
13853
                if (!(*x_pkey = wolfSSL_X509_PKEY_new(NULL))) {
13854
                    WOLFSSL_MSG("wolfSSL_X509_PKEY_new error");
13855
                    goto err;
13856
                }
13857
13858
                if (!(pemBio = wolfSSL_BIO_new(wolfSSL_BIO_s_mem()))) {
13859
                    WOLFSSL_MSG("wolfSSL_BIO_new error");
13860
                    goto err;
13861
                }
13862
13863
                if (wolfSSL_BIO_write(pemBio, header,
13864
                        (int)(footerEnd - header)) != footerEnd - header) {
13865
                    WOLFSSL_MSG("wolfSSL_BIO_new error");
13866
                    goto err;
13867
                }
13868
13869
                if (wolfSSL_PEM_read_bio_PrivateKey(pemBio,
13870
                        &(*x_pkey)->dec_pkey, cb, NULL) == NULL) {
13871
                    WOLFSSL_MSG("wolfSSL_PEM_read_bio_PrivateKey error");
13872
                    goto err;
13873
                }
13874
13875
                wolfSSL_BIO_free(pemBio);
13876
            }
13877
        }
13878
13879
        XFREE(pem, 0, DYNAMIC_TYPE_PEM);
13880
    #ifdef HAVE_CRL
13881
        if (der)
13882
            FreeDer(&der);
13883
    #endif
13884
        return WOLFSSL_SUCCESS;
13885
err:
13886
        XFREE(pem, 0, DYNAMIC_TYPE_PEM);
13887
    #ifdef HAVE_CRL
13888
        if (der)
13889
            FreeDer(&der);
13890
    #endif
13891
        if (*x_pkey) {
13892
            wolfSSL_X509_PKEY_free(*x_pkey);
13893
            *x_pkey = NULL;
13894
        }
13895
        if (pemBio)
13896
            wolfSSL_BIO_free(pemBio);
13897
        return WOLFSSL_FAILURE;
13898
#else /* ! (WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM) */
13899
        return WOLFSSL_FAILURE;
13900
#endif /* WOLFSSL_PEM_TO_DER || WOLFSSL_DER_TO_PEM */
13901
    }
13902
13903
#ifndef NO_FILESYSTEM
13904
    WOLF_STACK_OF(WOLFSSL_X509_INFO)* wolfSSL_PEM_X509_INFO_read(
13905
            XFILE fp, WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
13906
            pem_password_cb* cb, void* u)
13907
    {
13908
        WOLFSSL_BIO* fileBio = wolfSSL_BIO_new_fp(fp, WOLFSSL_BIO_NOCLOSE);
13909
        WOLF_STACK_OF(WOLFSSL_X509_INFO)* ret = NULL;
13910
13911
        WOLFSSL_ENTER("wolfSSL_PEM_X509_INFO_read");
13912
        if (fileBio != NULL) {
13913
            ret = wolfSSL_PEM_X509_INFO_read_bio(fileBio, sk, cb, u);
13914
            wolfSSL_BIO_free(fileBio);
13915
        }
13916
        return ret;
13917
    }
13918
#endif /* !NO_FILESYSTEM */
13919
13920
    /*
13921
     * bio WOLFSSL_BIO to read certificates from
13922
     * sk  possible stack to push more X509_INFO structs to. Can be NULL
13923
     * cb  callback password for encrypted PEM certificates
13924
     * u   user input such as password
13925
     *
13926
     * returns stack on success and NULL or default stack passed in on fail
13927
     */
13928
    WOLF_STACK_OF(WOLFSSL_X509_INFO)* wolfSSL_PEM_X509_INFO_read_bio(
13929
        WOLFSSL_BIO* bio, WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
13930
        wc_pem_password_cb* cb, void* u)
13931
    {
13932
        WOLF_STACK_OF(WOLFSSL_X509_INFO)* localSk = NULL;
13933
        int ret = WOLFSSL_SUCCESS;
13934
        WOLFSSL_X509_INFO* current = NULL;
13935
        WOLFSSL_X509*      x509 = NULL;
13936
        WOLFSSL_X509_CRL*  crl  = NULL;
13937
        WOLFSSL_X509_PKEY* x_pkey = NULL;
13938
13939
        (void)u;
13940
13941
        WOLFSSL_ENTER("wolfSSL_PEM_X509_INFO_read_bio");
13942
13943
        /* attempt to use passed in stack or create a new one */
13944
        if (sk != NULL) {
13945
            localSk = sk;
13946
        }
13947
        else {
13948
            localSk = wolfSSL_sk_X509_INFO_new_null();
13949
        }
13950
        if (localSk == NULL) {
13951
            WOLFSSL_LEAVE("wolfSSL_PEM_X509_INFO_read_bio",
13952
                    MEMORY_E);
13953
            return NULL;
13954
        }
13955
13956
        /* parse through BIO and push new info's found onto stack */
13957
        while (1) {
13958
            x509 = NULL;
13959
            crl  = NULL;
13960
            x_pkey = NULL;
13961
13962
            if (wolfSSL_PEM_X509_X509_CRL_X509_PKEY_read_bio(bio, cb,
13963
                    &x509, &crl, &x_pkey) == WOLFSSL_SUCCESS) {
13964
                if (current == NULL ||
13965
                        (x509 && current->x509) ||
13966
                        (crl && current->crl) ||
13967
                        (x_pkey && current->x_pkey)) {
13968
                    /* Need to create new current since existing one already
13969
                     * has the member filled or this is the first successful
13970
                     * read. */
13971
                    current = wolfSSL_X509_INFO_new();
13972
                    if (current == NULL) {
13973
                        ret = MEMORY_E;
13974
                        break;
13975
                    }
13976
                    if (wolfSSL_sk_X509_INFO_push(localSk, current) <= 0) {
13977
                        wolfSSL_X509_INFO_free(current);
13978
                        current = NULL;
13979
                        ret = WOLFSSL_FAILURE;
13980
                        break;
13981
                    }
13982
                }
13983
13984
                if (x509) {
13985
                    current->x509 = x509;
13986
                }
13987
                else if (crl) {
13988
                    current->crl = crl;
13989
                }
13990
                else if (x_pkey) {
13991
                    current->x_pkey = x_pkey;
13992
                }
13993
                else {
13994
                    WOLFSSL_MSG("No output parameters set");
13995
                    ret = WOLFSSL_FAILURE;
13996
                    break;
13997
                }
13998
            }
13999
            else {
14000
#ifdef WOLFSSL_HAVE_ERROR_QUEUE
14001
                unsigned long err;
14002
                CLEAR_ASN_NO_PEM_HEADER_ERROR(err);
14003
                if (ERR_GET_LIB(err) != ERR_LIB_PEM ||
14004
                    ERR_GET_REASON(err) != PEM_R_NO_START_LINE) {
14005
                    ret = WOLFSSL_FAILURE;
14006
                }
14007
#else
14008
                if (wolfSSL_sk_X509_INFO_num(localSk) > 0) {
14009
                    WOLFSSL_MSG("At least one X509_INFO object on stack."
14010
                                "Assuming error means EOF or no more PEM"
14011
                                "headers found.");
14012
                }
14013
                else {
14014
                    ret = WOLFSSL_FAILURE;
14015
                }
14016
#endif
14017
                break;
14018
            }
14019
        }
14020
        if (ret != WOLFSSL_SUCCESS ||
14021
                wolfSSL_sk_X509_INFO_num(localSk) == 0) {
14022
            /* current should always be pushed onto the localsk stack at this
14023
             * point. The only case when it isn't is when
14024
             * wolfSSL_sk_X509_INFO_push fails but in that case the current
14025
             * free is handled inside the loop. */
14026
            if (localSk != sk) {
14027
                wolfSSL_sk_pop_free(localSk, NULL);
14028
            }
14029
            wolfSSL_X509_free(x509);
14030
#ifdef HAVE_CRL
14031
            wolfSSL_X509_CRL_free(crl);
14032
#endif
14033
            wolfSSL_X509_PKEY_free(x_pkey);
14034
            localSk = NULL;
14035
        }
14036
        WOLFSSL_LEAVE("wolfSSL_PEM_X509_INFO_read_bio", ret);
14037
        return localSk;
14038
    }
14039
#endif /* !NO_BIO */
14040
#endif /* OPENSSL_ALL */
14041
14042
    void wolfSSL_X509_NAME_ENTRY_free(WOLFSSL_X509_NAME_ENTRY* ne)
14043
    {
14044
        WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_free");
14045
        if (ne != NULL) {
14046
            wolfSSL_ASN1_OBJECT_free(ne->object);
14047
            if (ne->value != NULL) {
14048
                wolfSSL_ASN1_STRING_free(ne->value);
14049
            }
14050
            XFREE(ne, NULL, DYNAMIC_TYPE_NAME_ENTRY);
14051
        }
14052
    }
14053
14054
14055
    WOLFSSL_X509_NAME_ENTRY* wolfSSL_X509_NAME_ENTRY_new(void)
14056
    {
14057
        WOLFSSL_X509_NAME_ENTRY* ne;
14058
14059
        ne = (WOLFSSL_X509_NAME_ENTRY*)XMALLOC(sizeof(WOLFSSL_X509_NAME_ENTRY),
14060
                NULL, DYNAMIC_TYPE_NAME_ENTRY);
14061
        if (ne != NULL) {
14062
            XMEMSET(ne, 0, sizeof(WOLFSSL_X509_NAME_ENTRY));
14063
        }
14064
14065
        return ne;
14066
    }
14067
14068
14069
    static void wolfssl_x509_name_entry_set(WOLFSSL_X509_NAME_ENTRY* ne,
14070
        int nid, int type, const unsigned char *data, int dataSz)
14071
    {
14072
        ne->nid = nid;
14073
        /* Reuse the object if already available. */
14074
        ne->object = wolfSSL_OBJ_nid2obj_ex(nid, ne->object);
14075
        if (ne->value == NULL) {
14076
            ne->value = wolfSSL_ASN1_STRING_type_new(type);
14077
        }
14078
        if (ne->value != NULL) {
14079
            if (wolfSSL_ASN1_STRING_set(ne->value, (const void*)data,
14080
                                            dataSz) == WOLFSSL_SUCCESS) {
14081
                ne->set = 1;
14082
            }
14083
            else {
14084
                /* Free the ASN1_STRING if it is not set. */
14085
                wolfSSL_ASN1_STRING_free(ne->value);
14086
                ne->value = NULL;
14087
            }
14088
        }
14089
    }
14090
14091
    /* Create a new WOLFSSL_X509_NAME_ENTRY structure based on the text passed
14092
     * in. Returns NULL on failure */
14093
    WOLFSSL_X509_NAME_ENTRY* wolfSSL_X509_NAME_ENTRY_create_by_txt(
14094
            WOLFSSL_X509_NAME_ENTRY **neIn, const char *txt, int type,
14095
            const unsigned char *data, int dataSz)
14096
    {
14097
        int nid = -1;
14098
        WOLFSSL_X509_NAME_ENTRY* ne = NULL;
14099
14100
        WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_create_by_txt");
14101
14102
        if (txt == NULL) {
14103
            return NULL;
14104
        }
14105
14106
        if (neIn != NULL) {
14107
            ne = *neIn;
14108
        }
14109
14110
        nid = wolfSSL_OBJ_txt2nid(txt);
14111
        if (nid == WC_NID_undef) {
14112
            WOLFSSL_MSG("Unable to find text");
14113
            ne = NULL;
14114
        }
14115
        else {
14116
            if (ne == NULL) {
14117
                ne = wolfSSL_X509_NAME_ENTRY_new();
14118
                if (ne == NULL) {
14119
                    return NULL;
14120
                }
14121
            }
14122
14123
            wolfssl_x509_name_entry_set(ne, nid, type, data, dataSz);
14124
        }
14125
14126
        return ne;
14127
    }
14128
14129
14130
    /* Creates a new entry given the NID, type, and data
14131
     * "dataSz" is number of bytes in data, if set to -1 then XSTRLEN is used
14132
     * "out" can be used to store the new entry data in an existing structure
14133
     *       if NULL then a new WOLFSSL_X509_NAME_ENTRY structure is created
14134
     * returns a pointer to WOLFSSL_X509_NAME_ENTRY on success and NULL on fail
14135
     */
14136
    WOLFSSL_X509_NAME_ENTRY* wolfSSL_X509_NAME_ENTRY_create_by_NID(
14137
            WOLFSSL_X509_NAME_ENTRY** out, int nid, int type,
14138
            const unsigned char* data, int dataSz)
14139
    {
14140
        WOLFSSL_X509_NAME_ENTRY* ne;
14141
14142
#ifdef WOLFSSL_DEBUG_OPENSSL
14143
        WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_create_by_NID");
14144
#endif
14145
14146
        if (!data) {
14147
            WOLFSSL_MSG("Bad parameter");
14148
            return NULL;
14149
        }
14150
14151
        if (out == NULL || *out == NULL) {
14152
            ne = wolfSSL_X509_NAME_ENTRY_new();
14153
            if (ne == NULL) {
14154
                return NULL;
14155
            }
14156
            if (out != NULL) {
14157
                *out = ne;
14158
            }
14159
        }
14160
        else {
14161
            ne = *out;
14162
        }
14163
14164
        wolfssl_x509_name_entry_set(ne, nid, type, data, dataSz);
14165
14166
        return ne;
14167
    }
14168
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
14169
14170
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL) || \
14171
    defined(HAVE_LIGHTY) || defined(WOLFSSL_MYSQL_COMPATIBLE) || \
14172
    defined(HAVE_STUNNEL) || defined(WOLFSSL_NGINX) || \
14173
    defined(HAVE_POCO_LIB) || defined(WOLFSSL_HAPROXY)
14174
WOLFSSL_ASN1_OBJECT* wolfSSL_X509_NAME_ENTRY_get_object(
14175
    WOLFSSL_X509_NAME_ENTRY *ne)
14176
{
14177
    WOLFSSL_ASN1_OBJECT* object = NULL;
14178
14179
#ifdef WOLFSSL_DEBUG_OPENSSL
14180
    WOLFSSL_ENTER("wolfSSL_X509_NAME_ENTRY_get_object");
14181
#endif
14182
14183
    if (ne != NULL) {
14184
        /* Create object from nid - reuse existing object if possible. */
14185
        object = wolfSSL_OBJ_nid2obj_ex(ne->nid, ne->object);
14186
        if (object != NULL) {
14187
            /* Set the object when no error. */
14188
            ne->object = object;
14189
        }
14190
    }
14191
14192
    return object;
14193
}
14194
#endif /* OPENSSL_ALL || HAVE_LIGHTY || WOLFSSL_MYSQL_COMPATIBLE ||
14195
        * HAVE_STUNNEL || WOLFSSL_NGINX || HAVE_POCO_LIB || WOLFSSL_HAPROXY */
14196
14197
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
14198
    /* add all entry of type "nid" to the buffer "fullName" and advance "idx"
14199
     * since number of entries is small, a brute force search is used here
14200
     * returns the number of entries added
14201
     */
14202
    static int AddAllEntry(WOLFSSL_X509_NAME* name, char* fullName,
14203
            int fullNameSz, int* idx)
14204
    {
14205
        int i;
14206
        int ret = 0;
14207
14208
        for (i = 0; i < MAX_NAME_ENTRIES; i++) {
14209
            if (name->entry[i].set) {
14210
                WOLFSSL_X509_NAME_ENTRY* e;
14211
                WOLFSSL_ASN1_OBJECT* obj;
14212
14213
                int sz;
14214
                unsigned char* data;
14215
14216
                e = &name->entry[i];
14217
                obj = wolfSSL_X509_NAME_ENTRY_get_object(e);
14218
                if (obj == NULL) {
14219
                    return BAD_FUNC_ARG;
14220
                }
14221
14222
                XMEMCPY(fullName + *idx, "/", 1); *idx = *idx + 1;
14223
                sz = (int)XSTRLEN(obj->sName);
14224
                XMEMCPY(fullName + *idx, obj->sName, sz);
14225
                *idx += sz;
14226
                XMEMCPY(fullName + *idx, "=", 1); *idx = *idx + 1;
14227
14228
                data = wolfSSL_ASN1_STRING_data(e->value);
14229
                if (data != NULL) {
14230
                    sz = (int)XSTRLEN((const char*)data);
14231
                    XMEMCPY(fullName + *idx, data, sz);
14232
                    *idx += sz;
14233
                }
14234
14235
                ret++;
14236
            }
14237
        }
14238
        (void)fullNameSz;
14239
        return ret;
14240
    }
14241
14242
14243
    /* Converts a list of entries in WOLFSSL_X509_NAME struct into a string
14244
     * returns 0 on success */
14245
    static int RebuildFullName(WOLFSSL_X509_NAME* name)
14246
    {
14247
        int totalLen = 0, i, idx, entryCount = 0;
14248
14249
        if (name == NULL)
14250
            return BAD_FUNC_ARG;
14251
14252
        for (i = 0; i < MAX_NAME_ENTRIES; i++) {
14253
            if (name->entry[i].set) {
14254
                WOLFSSL_X509_NAME_ENTRY* e;
14255
                WOLFSSL_ASN1_OBJECT* obj;
14256
14257
                e = &name->entry[i];
14258
                obj = wolfSSL_X509_NAME_ENTRY_get_object(e);
14259
                if (obj == NULL)
14260
                    return BAD_FUNC_ARG;
14261
14262
                totalLen += (int)XSTRLEN(obj->sName) + 2;/*+2 for '/' and '=' */
14263
                totalLen += wolfSSL_ASN1_STRING_length(e->value);
14264
            }
14265
        }
14266
14267
        if (name->dynamicName) {
14268
            XFREE(name->name, name->heap, DYNAMIC_TYPE_X509);
14269
            name->name = name->staticName;
14270
            name->dynamicName = 0;
14271
        }
14272
14273
        if (totalLen >= ASN_NAME_MAX) {
14274
            name->name = (char*)XMALLOC(totalLen + 1, name->heap,
14275
                    DYNAMIC_TYPE_X509);
14276
            if (name->name == NULL)
14277
                return MEMORY_E;
14278
            name->dynamicName = 1;
14279
        }
14280
14281
        idx = 0;
14282
        entryCount = AddAllEntry(name, name->name, totalLen, &idx);
14283
        if (entryCount < 0)
14284
            return entryCount;
14285
14286
        name->name[idx] = '\0';
14287
        name->sz = idx + 1; /* size includes null terminator */
14288
        name->entrySz = entryCount;
14289
14290
        return 0;
14291
    }
14292
14293
    /* Copies entry into name. With it being copied freeing entry becomes the
14294
     * callers responsibility.
14295
     * returns 1 for success and 0 for error */
14296
    int wolfSSL_X509_NAME_add_entry(WOLFSSL_X509_NAME* name,
14297
            WOLFSSL_X509_NAME_ENTRY* entry, int idx, int set)
14298
    {
14299
        WOLFSSL_X509_NAME_ENTRY* current = NULL;
14300
        int ret, i;
14301
14302
#ifdef WOLFSSL_DEBUG_OPENSSL
14303
        WOLFSSL_ENTER("wolfSSL_X509_NAME_add_entry");
14304
#endif
14305
14306
        if (name == NULL || entry == NULL || entry->value == NULL) {
14307
            WOLFSSL_MSG("NULL argument passed in");
14308
            return WOLFSSL_FAILURE;
14309
        }
14310
14311
        if (idx >= 0) {
14312
            /* place in specific index */
14313
14314
            if (idx >= MAX_NAME_ENTRIES) {
14315
                WOLFSSL_MSG("Error index to insert entry is larger than array");
14316
                return WOLFSSL_FAILURE;
14317
            }
14318
            i = idx;
14319
        }
14320
        else {
14321
            /* iterate through and find first open spot */
14322
            for (i = 0; i < MAX_NAME_ENTRIES; i++) {
14323
                if (name->entry[i].set == 0) { /* not set so overwritten */
14324
                    WOLFSSL_MSG("Found place for name entry");
14325
                    break;
14326
                }
14327
            }
14328
14329
            if (i == MAX_NAME_ENTRIES) {
14330
                WOLFSSL_MSG("No spot found for name entry");
14331
                return WOLFSSL_FAILURE;
14332
            }
14333
        }
14334
14335
        current = &name->entry[i];
14336
        if (current->set == 0)
14337
            name->entrySz++;
14338
14339
        if (wolfSSL_X509_NAME_ENTRY_create_by_NID(&current,
14340
                            entry->nid,
14341
                            wolfSSL_ASN1_STRING_type(entry->value),
14342
                            wolfSSL_ASN1_STRING_data(entry->value),
14343
                            wolfSSL_ASN1_STRING_length(entry->value)) != NULL)
14344
        {
14345
            ret = WOLFSSL_SUCCESS;
14346
        #ifdef OPENSSL_ALL
14347
            if (name->entries == NULL) {
14348
                name->entries = wolfSSL_sk_X509_NAME_new(NULL);
14349
            }
14350
            if (wolfSSL_sk_X509_NAME_ENTRY_push(name->entries, current) <= 0) {
14351
                ret = WOLFSSL_FAILURE;
14352
            }
14353
        #endif
14354
        }
14355
        else {
14356
            ret = WOLFSSL_FAILURE;
14357
        }
14358
14359
        if (ret != WOLFSSL_SUCCESS) {
14360
            WOLFSSL_MSG("Error adding the name entry");
14361
            if (current->set == 0)
14362
                name->entrySz--;
14363
            return WOLFSSL_FAILURE;
14364
        }
14365
14366
#ifdef WOLFSSL_PYTHON
14367
        /* Set name index for OpenSSL stack index position and so Python can
14368
         * generate tuples/sets from the list. */
14369
        for (i = 0; i < MAX_NAME_ENTRIES; i++) {
14370
            if (name->entry[i].set != 0)
14371
                name->entry[i].set = i + 1;
14372
        }
14373
#endif
14374
14375
        if (RebuildFullName(name) != 0)
14376
            return WOLFSSL_FAILURE;
14377
14378
        (void)set;
14379
        return WOLFSSL_SUCCESS;
14380
    }
14381
14382
    int wolfSSL_X509_NAME_add_entry_by_txt(WOLFSSL_X509_NAME *name,
14383
                                           const char *field, int type,
14384
                                           const unsigned char *bytes, int len,
14385
                                           int loc, int set)
14386
    {
14387
        int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
14388
        int nid;
14389
        WOLFSSL_X509_NAME_ENTRY* entry;
14390
14391
        (void)type;
14392
        WOLFSSL_ENTER("wolfSSL_X509_NAME_add_entry_by_txt");
14393
14394
        if (name == NULL || field == NULL)
14395
            return WOLFSSL_FAILURE;
14396
14397
        if ((nid = wolfSSL_OBJ_txt2nid(field)) == WC_NID_undef) {
14398
            WOLFSSL_MSG("Unable convert text to NID");
14399
            return WOLFSSL_FAILURE;
14400
        }
14401
14402
        entry = wolfSSL_X509_NAME_ENTRY_create_by_NID(NULL,
14403
                  nid, type, (unsigned char*)bytes, len);
14404
        if (entry == NULL)
14405
            return WOLFSSL_FAILURE;
14406
14407
        ret = wolfSSL_X509_NAME_add_entry(name, entry, loc, set);
14408
        wolfSSL_X509_NAME_ENTRY_free(entry);
14409
14410
        return ret;
14411
    }
14412
14413
    int wolfSSL_X509_NAME_add_entry_by_NID(WOLFSSL_X509_NAME *name, int nid,
14414
                                           int type, const unsigned char *bytes,
14415
                                           int len, int loc, int set)
14416
    {
14417
        int ret;
14418
        WOLFSSL_X509_NAME_ENTRY* entry;
14419
        WOLFSSL_ENTER("wolfSSL_X509_NAME_add_entry_by_NID");
14420
        entry = wolfSSL_X509_NAME_ENTRY_create_by_NID(NULL, nid, type, bytes,
14421
                len);
14422
        if (entry == NULL)
14423
            return WOLFSSL_FAILURE;
14424
        ret = wolfSSL_X509_NAME_add_entry(name, entry, loc, set);
14425
        wolfSSL_X509_NAME_ENTRY_free(entry);
14426
        return ret;
14427
    }
14428
14429
    WOLFSSL_X509_NAME_ENTRY *wolfSSL_X509_NAME_delete_entry(
14430
            WOLFSSL_X509_NAME *name, int loc)
14431
    {
14432
        WOLFSSL_X509_NAME_ENTRY* ret;
14433
        WOLFSSL_ENTER("wolfSSL_X509_NAME_delete_entry");
14434
14435
        if (!name) {
14436
            WOLFSSL_MSG("Bad parameter");
14437
            return NULL;
14438
        }
14439
14440
        ret = wolfSSL_X509_NAME_get_entry(name, loc);
14441
        if (!ret) {
14442
            WOLFSSL_MSG("loc entry not found");
14443
            return NULL;
14444
        }
14445
        name->entry[loc].set = 0;
14446
#ifdef WOLFSSL_PYTHON
14447
        {
14448
            int i;
14449
            /* Set name index for OpenSSL stack index position and so Python can
14450
            * generate tuples/sets from the list. */
14451
            for (i = 0; i < MAX_NAME_ENTRIES; i++) {
14452
                if (name->entry[i].set != 0)
14453
                    name->entry[i].set = i + 1;
14454
            }
14455
        }
14456
#endif
14457
        return ret;
14458
    }
14459
14460
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
14461
14462
#if defined(OPENSSL_EXTRA) && !defined(NO_ASN)
14463
    int wolfSSL_X509_NAME_get_index_by_OBJ(WOLFSSL_X509_NAME *name,
14464
                                           const WOLFSSL_ASN1_OBJECT *obj,
14465
                                           int idx) {
14466
        if (!name || idx >= MAX_NAME_ENTRIES ||
14467
                !obj || !obj->obj) {
14468
            return WOLFSSL_FATAL_ERROR;
14469
        }
14470
14471
        if (idx < 0) {
14472
            idx = -1;
14473
        }
14474
14475
        for (idx++; idx < MAX_NAME_ENTRIES; idx++) {
14476
            /* Find index of desired name */
14477
            if (name->entry[idx].set) {
14478
                if (XSTRLEN(obj->sName) ==
14479
                        XSTRLEN(name->entry[idx].object->sName) &&
14480
                    XSTRNCMP((const char*) obj->sName,
14481
                        name->entry[idx].object->sName, obj->objSz - 1) == 0) {
14482
                    return idx;
14483
                }
14484
            }
14485
        }
14486
        return WOLFSSL_FATAL_ERROR;
14487
    }
14488
#endif
14489
14490
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
14491
    defined(OPENSSL_EXTRA_X509_SMALL)
14492
14493
#ifdef OPENSSL_EXTRA
14494
    int wolfSSL_X509_NAME_ENTRY_set(const WOLFSSL_X509_NAME_ENTRY *ne)
14495
    {
14496
        if (ne != NULL) {
14497
            return ne->set;
14498
        }
14499
        return 0;
14500
    }
14501
#endif
14502
14503
14504
    /* returns a pointer to the internal entry at location 'loc' on success,
14505
     * a null pointer is returned in fail cases */
14506
    WOLFSSL_X509_NAME_ENTRY *wolfSSL_X509_NAME_get_entry(
14507
                                        const WOLFSSL_X509_NAME *name, int loc)
14508
    {
14509
#ifdef WOLFSSL_DEBUG_OPENSSL
14510
        WOLFSSL_ENTER("wolfSSL_X509_NAME_get_entry");
14511
#endif
14512
14513
        if (name == NULL) {
14514
            return NULL;
14515
        }
14516
14517
        if (loc < 0 || loc >= MAX_NAME_ENTRIES) {
14518
            WOLFSSL_MSG("Bad argument");
14519
            return NULL;
14520
        }
14521
14522
        if (name->entry[loc].set) {
14523
            return (WOLFSSL_X509_NAME_ENTRY*)&name->entry[loc];
14524
        }
14525
        else {
14526
            return NULL;
14527
        }
14528
    }
14529
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL */
14530
14531
#ifdef OPENSSL_EXTRA
14532
14533
int wolfSSL_X509_check_private_key(WOLFSSL_X509 *x509, WOLFSSL_EVP_PKEY *key)
14534
{
14535
    WOLFSSL_ENTER("wolfSSL_X509_check_private_key");
14536
14537
    if (!x509 || !key) {
14538
        WOLFSSL_MSG("Bad parameter");
14539
        return WOLFSSL_FAILURE;
14540
    }
14541
14542
#ifndef NO_CHECK_PRIVATE_KEY
14543
    return wc_CheckPrivateKey((byte*)key->pkey.ptr, key->pkey_sz,
14544
            x509->pubKey.buffer, x509->pubKey.length,
14545
            (enum Key_Sum)x509->pubKeyOID, key->heap) == 1 ?
14546
                    WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
14547
#else
14548
    /* not compiled in */
14549
    return WOLFSSL_SUCCESS;
14550
#endif
14551
}
14552
14553
#endif /* OPENSSL_EXTRA */
14554
14555
#if defined(HAVE_LIGHTY) || defined(HAVE_STUNNEL) \
14556
    || defined(WOLFSSL_MYSQL_COMPATIBLE) || defined(OPENSSL_EXTRA)
14557
#ifndef NO_BIO
14558
14559
#ifdef WOLFSSL_CERT_GEN
14560
14561
#ifdef WOLFSSL_CERT_REQ
14562
/* writes the x509 from x to the WOLFSSL_BIO bp
14563
 *
14564
 * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on fail
14565
 */
14566
int wolfSSL_PEM_write_bio_X509_REQ(WOLFSSL_BIO *bp, WOLFSSL_X509 *x)
14567
{
14568
    byte* pem;
14569
    int   pemSz = 0;
14570
    const unsigned char* der;
14571
    int derSz;
14572
    int ret;
14573
14574
    WOLFSSL_ENTER("wolfSSL_PEM_write_bio_X509_REQ");
14575
14576
    if (x == NULL || bp == NULL) {
14577
        return WOLFSSL_FAILURE;
14578
    }
14579
14580
    der = wolfSSL_X509_get_der(x, &derSz);
14581
    if (der == NULL) {
14582
        return WOLFSSL_FAILURE;
14583
    }
14584
14585
    /* get PEM size */
14586
    pemSz = wc_DerToPemEx(der, (word32)derSz, NULL, 0, NULL, CERTREQ_TYPE);
14587
    if (pemSz < 0) {
14588
        return WOLFSSL_FAILURE;
14589
    }
14590
14591
    /* create PEM buffer and convert from DER */
14592
    pem = (byte*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14593
    if (pem == NULL) {
14594
        return WOLFSSL_FAILURE;
14595
    }
14596
    if (wc_DerToPemEx(der, (word32)derSz, pem, pemSz, NULL, CERTREQ_TYPE) < 0) {
14597
        XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14598
        return WOLFSSL_FAILURE;
14599
    }
14600
14601
    /* write the PEM to BIO */
14602
    ret = wolfSSL_BIO_write(bp, pem, pemSz);
14603
    XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14604
14605
    if (ret <= 0) return WOLFSSL_FAILURE;
14606
    return WOLFSSL_SUCCESS;
14607
}
14608
#endif /* WOLFSSL_CERT_REQ */
14609
14610
14611
/* writes the x509 from x to the WOLFSSL_BIO bp
14612
 *
14613
 * returns WOLFSSL_SUCCESS on success and WOLFSSL_FAILURE on fail
14614
 */
14615
int wolfSSL_PEM_write_bio_X509_AUX(WOLFSSL_BIO *bp, WOLFSSL_X509 *x)
14616
{
14617
    byte* pem;
14618
    int   pemSz = 0;
14619
    const unsigned char* der;
14620
    int derSz;
14621
    int ret;
14622
14623
    WOLFSSL_ENTER("wolfSSL_PEM_write_bio_X509_AUX");
14624
14625
    if (bp == NULL || x == NULL) {
14626
        WOLFSSL_MSG("NULL argument passed in");
14627
        return WOLFSSL_FAILURE;
14628
    }
14629
14630
    der = wolfSSL_X509_get_der(x, &derSz);
14631
    if (der == NULL) {
14632
        return WOLFSSL_FAILURE;
14633
    }
14634
14635
    /* get PEM size */
14636
    pemSz = wc_DerToPemEx(der, (word32)derSz, NULL, 0, NULL, CERT_TYPE);
14637
    if (pemSz < 0) {
14638
        return WOLFSSL_FAILURE;
14639
    }
14640
14641
    /* create PEM buffer and convert from DER */
14642
    pem = (byte*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14643
    if (pem == NULL) {
14644
        return WOLFSSL_FAILURE;
14645
    }
14646
    if (wc_DerToPemEx(der, (word32)derSz, pem, pemSz, NULL, CERT_TYPE) < 0) {
14647
        XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14648
        return WOLFSSL_FAILURE;
14649
    }
14650
14651
    /* write the PEM to BIO */
14652
    ret = wolfSSL_BIO_write(bp, pem, pemSz);
14653
    XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14654
14655
    if (ret <= 0) return WOLFSSL_FAILURE;
14656
    return WOLFSSL_SUCCESS;
14657
}
14658
14659
int wolfSSL_PEM_write_bio_X509(WOLFSSL_BIO *bio, WOLFSSL_X509 *cert)
14660
{
14661
    byte* pem = NULL;
14662
    int   pemSz = 0;
14663
    /* Get large buffer to hold cert der */
14664
    const byte* der = NULL;
14665
    int derSz = X509_BUFFER_SZ;
14666
    int ret;
14667
14668
    WOLFSSL_ENTER("wolfSSL_PEM_write_bio_X509");
14669
14670
    if (bio == NULL || cert == NULL) {
14671
        WOLFSSL_MSG("NULL argument passed in");
14672
        return WOLFSSL_FAILURE;
14673
    }
14674
14675
    /* Do not call wolfssl_x509_make_der() here. If we did, then need to re-sign
14676
     * because we don't know the original order of the extensions and so we must
14677
     * assume our extensions are in a different order, thus need to re-sign. */
14678
    der = wolfSSL_X509_get_der(cert, &derSz);
14679
    if (der == NULL) {
14680
        goto error;
14681
    }
14682
14683
    /* get PEM size */
14684
    pemSz = wc_DerToPemEx(der, (word32)derSz, NULL, 0, NULL, CERT_TYPE);
14685
    if (pemSz < 0) {
14686
        goto error;
14687
    }
14688
14689
    /* create PEM buffer and convert from DER */
14690
    pem = (byte*)XMALLOC(pemSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14691
    if (pem == NULL) {
14692
        goto error;
14693
    }
14694
    if (wc_DerToPemEx(der, (word32)derSz, pem, pemSz, NULL, CERT_TYPE) < 0) {
14695
        goto error;
14696
    }
14697
14698
    /* write the PEM to BIO */
14699
    ret = wolfSSL_BIO_write(bio, pem, pemSz);
14700
    XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14701
14702
    if (ret <= 0) return WOLFSSL_FAILURE;
14703
    return WOLFSSL_SUCCESS;
14704
14705
error:
14706
    XFREE(pem, NULL, DYNAMIC_TYPE_TMP_BUFFER);
14707
    return WOLFSSL_FAILURE;
14708
}
14709
#endif /* WOLFSSL_CERT_GEN */
14710
14711
#endif /* !NO_BIO */
14712
#endif /* HAVE_LIGHTY || HAVE_STUNNEL || WOLFSSL_MYSQL_COMPATIBLE */
14713
14714
#if defined(OPENSSL_EXTRA) || defined(HAVE_STUNNEL) || \
14715
        defined(WOLFSSL_NGINX) || defined(HAVE_LIGHTY) || \
14716
        defined(WOLFSSL_HAPROXY) || defined(WOLFSSL_OPENSSH) || \
14717
        defined(HAVE_SBLIM_SFCB)
14718
14719
WOLF_STACK_OF(WOLFSSL_X509_NAME)* wolfSSL_sk_X509_NAME_new(
14720
        WOLF_SK_COMPARE_CB(WOLFSSL_X509_NAME, cb))
14721
{
14722
    WOLFSSL_STACK* sk;
14723
    (void)cb;
14724
14725
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_new");
14726
14727
    sk = wolfSSL_sk_new_node(NULL);
14728
    if (sk != NULL) {
14729
        sk->type = STACK_TYPE_X509_NAME;
14730
    }
14731
14732
    return sk;
14733
}
14734
14735
int wolfSSL_sk_X509_NAME_num(const WOLF_STACK_OF(WOLFSSL_X509_NAME) *sk)
14736
{
14737
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_num");
14738
14739
    if (sk == NULL)
14740
        return BAD_FUNC_ARG;
14741
14742
    return (int)sk->num;
14743
}
14744
14745
/* Getter function for WOLFSSL_X509_NAME pointer
14746
 *
14747
 * sk is the stack to retrieve pointer from
14748
 * i  is the index value in stack
14749
 *
14750
 * returns a pointer to a WOLFSSL_X509_NAME structure on success and NULL on
14751
 *         fail
14752
 */
14753
WOLFSSL_X509_NAME* wolfSSL_sk_X509_NAME_value(
14754
    const WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk, int i)
14755
{
14756
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_value");
14757
    return (WOLFSSL_X509_NAME*)wolfSSL_sk_value(sk, i);
14758
}
14759
14760
WOLFSSL_X509_NAME* wolfSSL_sk_X509_NAME_pop(
14761
    WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
14762
{
14763
    return (WOLFSSL_X509_NAME*)wolfSSL_sk_pop(sk);
14764
}
14765
14766
void wolfSSL_sk_X509_NAME_pop_free(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
14767
    void (*f) (WOLFSSL_X509_NAME*))
14768
{
14769
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_pop_free");
14770
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
14771
}
14772
14773
/* Free only the sk structure, NOT X509_NAME members */
14774
void wolfSSL_sk_X509_NAME_free(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
14775
{
14776
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_free");
14777
    wolfSSL_sk_free(sk);
14778
}
14779
14780
int wolfSSL_sk_X509_NAME_push(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
14781
    WOLFSSL_X509_NAME* name)
14782
{
14783
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_push");
14784
14785
    return wolfSSL_sk_push(sk, name);
14786
}
14787
14788
/* return index of found, or negative to indicate not found */
14789
int wolfSSL_sk_X509_NAME_find(const WOLF_STACK_OF(WOLFSSL_X509_NAME) *sk,
14790
    WOLFSSL_X509_NAME *name)
14791
{
14792
    int i;
14793
14794
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_find");
14795
14796
    if (sk == NULL)
14797
        return BAD_FUNC_ARG;
14798
14799
    for (i = 0; sk; i++, sk = sk->next) {
14800
        if (wolfSSL_X509_NAME_cmp(sk->data.name, name) == 0) {
14801
            return i;
14802
        }
14803
    }
14804
    return WOLFSSL_FATAL_ERROR;
14805
}
14806
14807
/* Name Entry */
14808
WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* wolfSSL_sk_X509_NAME_ENTRY_new(
14809
    WOLF_SK_COMPARE_CB(WOLFSSL_X509_NAME_ENTRY, cb))
14810
{
14811
    WOLFSSL_STACK* sk = wolfSSL_sk_new_node(NULL);
14812
    if (sk != NULL) {
14813
        sk->type = STACK_TYPE_X509_NAME_ENTRY;
14814
        (void)cb;
14815
    }
14816
    return sk;
14817
}
14818
14819
int wolfSSL_sk_X509_NAME_ENTRY_push(WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk,
14820
    WOLFSSL_X509_NAME_ENTRY* name_entry)
14821
{
14822
    return wolfSSL_sk_push(sk, name_entry);
14823
}
14824
14825
WOLFSSL_X509_NAME_ENTRY* wolfSSL_sk_X509_NAME_ENTRY_value(
14826
    const WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk, int i)
14827
{
14828
    return (WOLFSSL_X509_NAME_ENTRY*)wolfSSL_sk_value(sk, i);
14829
}
14830
14831
int wolfSSL_sk_X509_NAME_ENTRY_num(
14832
    const WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk)
14833
{
14834
    if (sk == NULL)
14835
        return BAD_FUNC_ARG;
14836
    return (int)sk->num;
14837
}
14838
14839
void wolfSSL_sk_X509_NAME_ENTRY_free(WOLF_STACK_OF(WOLFSSL_X509_NAME_ENTRY)* sk)
14840
{
14841
    wolfSSL_sk_free(sk);
14842
}
14843
14844
#endif /* OPENSSL_EXTRA || HAVE_STUNNEL || WOLFSSL_NGINX ||
14845
            HAVE_LIGHTY || WOLFSSL_HAPROXY ||
14846
            WOLFSSL_OPENSSH || HAVE_SBLIM_SFCB */
14847
14848
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
14849
    (defined(HAVE_STUNNEL) || defined(WOLFSSL_NGINX) || \
14850
    defined(HAVE_LIGHTY) || defined(WOLFSSL_HAPROXY) || \
14851
    defined(WOLFSSL_OPENSSH) || defined(HAVE_SBLIM_SFCB))
14852
14853
#if defined(OPENSSL_ALL)
14854
WOLFSSL_X509_INFO* wolfSSL_X509_INFO_new(void)
14855
{
14856
    WOLFSSL_X509_INFO* info;
14857
    info = (WOLFSSL_X509_INFO*)XMALLOC(sizeof(WOLFSSL_X509_INFO), NULL,
14858
        DYNAMIC_TYPE_X509);
14859
    if (info) {
14860
        XMEMSET(info, 0, sizeof(*info));
14861
    }
14862
    return info;
14863
}
14864
14865
void wolfSSL_X509_INFO_free(WOLFSSL_X509_INFO* info)
14866
{
14867
    if (info == NULL)
14868
        return;
14869
14870
    if (info->x509) {
14871
        wolfSSL_X509_free(info->x509);
14872
        info->x509 = NULL;
14873
    }
14874
#ifdef HAVE_CRL
14875
    if (info->crl) {
14876
        wolfSSL_X509_CRL_free(info->crl);
14877
        info->crl = NULL;
14878
    }
14879
#endif
14880
    wolfSSL_X509_PKEY_free(info->x_pkey);
14881
    info->x_pkey = NULL;
14882
14883
    XFREE(info, NULL, DYNAMIC_TYPE_X509);
14884
}
14885
#endif
14886
14887
WOLFSSL_STACK* wolfSSL_sk_X509_INFO_new_null(void)
14888
{
14889
    WOLFSSL_STACK* sk = wolfSSL_sk_new_node(NULL);
14890
    if (sk) {
14891
        sk->type = STACK_TYPE_X509_INFO;
14892
    }
14893
    return sk;
14894
}
14895
14896
int wolfSSL_sk_X509_INFO_num(const WOLF_STACK_OF(WOLFSSL_X509_INFO) *sk)
14897
{
14898
    WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_num");
14899
14900
    return wolfSSL_sk_num(sk);
14901
}
14902
14903
WOLFSSL_X509_INFO* wolfSSL_sk_X509_INFO_value(
14904
        const WOLF_STACK_OF(WOLFSSL_X509_INFO) *sk, int i)
14905
{
14906
    WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_value");
14907
14908
    return (WOLFSSL_X509_INFO *)wolfSSL_sk_value(sk, i);
14909
}
14910
14911
WOLFSSL_X509_INFO* wolfSSL_sk_X509_INFO_pop(
14912
        WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk)
14913
{
14914
    return (WOLFSSL_X509_INFO*)wolfSSL_sk_pop(sk);
14915
}
14916
14917
#if defined(OPENSSL_ALL)
14918
void wolfSSL_sk_X509_INFO_pop_free(WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
14919
    void (*f) (WOLFSSL_X509_INFO*))
14920
{
14921
    WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_pop_free");
14922
    wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
14923
}
14924
14925
void wolfSSL_sk_X509_INFO_free(WOLF_STACK_OF(WOLFSSL_X509_INFO) *sk)
14926
{
14927
    WOLFSSL_ENTER("wolfSSL_sk_X509_INFO_free");
14928
    wolfSSL_sk_free(sk);
14929
}
14930
14931
/* Adds the WOLFSSL_X509_INFO to the stack "sk". "sk" takes control of "in" and
14932
 * tries to free it when the stack is free'd.
14933
 *
14934
 * return number of elements on success 0 on fail
14935
 */
14936
int wolfSSL_sk_X509_INFO_push(WOLF_STACK_OF(WOLFSSL_X509_INFO)* sk,
14937
                                                      WOLFSSL_X509_INFO* in)
14938
{
14939
    return wolfSSL_sk_push(sk, in);
14940
}
14941
14942
/* Creates a duplicate of WOLF_STACK_OF(WOLFSSL_X509_NAME).
14943
 * Returns a new WOLF_STACK_OF(WOLFSSL_X509_NAME) or NULL on failure */
14944
WOLF_STACK_OF(WOLFSSL_X509_NAME) *wolfSSL_dup_CA_list(
14945
    WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk)
14946
{
14947
    int i;
14948
    const int num = wolfSSL_sk_X509_NAME_num(sk);
14949
    WOLF_STACK_OF(WOLFSSL_X509_NAME) *copy;
14950
    WOLFSSL_X509_NAME *name;
14951
14952
    WOLFSSL_ENTER("wolfSSL_dup_CA_list");
14953
14954
    copy = wolfSSL_sk_X509_NAME_new(NULL);
14955
    if (copy == NULL) {
14956
        WOLFSSL_MSG("Memory error");
14957
        return NULL;
14958
    }
14959
14960
    for (i = 0; i < num; i++) {
14961
        name = wolfSSL_X509_NAME_dup(wolfSSL_sk_X509_NAME_value(sk, i));
14962
        if (name == NULL || wolfSSL_sk_X509_NAME_push(copy, name) <= 0) {
14963
            WOLFSSL_MSG("Memory error");
14964
            wolfSSL_sk_X509_NAME_pop_free(copy, wolfSSL_X509_NAME_free);
14965
            wolfSSL_X509_NAME_free(name);
14966
            return NULL;
14967
        }
14968
    }
14969
14970
    return copy;
14971
}
14972
14973
void* wolfSSL_sk_X509_OBJECT_value(WOLF_STACK_OF(WOLFSSL_X509_OBJECT)* sk,
14974
    int i)
14975
{
14976
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_value");
14977
    for (; sk != NULL && i > 0; i--)
14978
        sk = sk->next;
14979
14980
    if (i != 0 || sk == NULL)
14981
        return NULL;
14982
    return sk->data.x509_obj;
14983
}
14984
14985
int wolfSSL_sk_X509_OBJECT_num(const WOLF_STACK_OF(WOLFSSL_X509_OBJECT) *s)
14986
{
14987
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_num");
14988
    if (s) {
14989
        return (int)s->num;
14990
    }
14991
    else {
14992
        return 0;
14993
    }
14994
}
14995
14996
int wolfSSL_sk_X509_NAME_set_cmp_func(WOLF_STACK_OF(WOLFSSL_X509_NAME)* sk,
14997
    WOLF_SK_COMPARE_CB(WOLFSSL_X509_NAME, cb))
14998
{
14999
    WOLFSSL_ENTER("wolfSSL_sk_X509_NAME_set_cmp_func");
15000
15001
    if (sk == NULL)
15002
        return BAD_FUNC_ARG;
15003
15004
    WOLFSSL_MSG("Stack comparison not used in wolfSSL");
15005
    (void)cb;
15006
    return 0;
15007
}
15008
#endif /* OPENSSL_ALL */
15009
15010
#ifndef NO_BIO
15011
15012
/* Helper function for X509_NAME_print_ex. Sets *buf to string for domain
15013
   name attribute based on NID. Returns size of buf */
15014
static int get_dn_attr_by_nid(int n, const char** buf)
15015
{
15016
    int len = 0;
15017
    const char *str;
15018
15019
    switch(n)
15020
    {
15021
        case WC_NID_commonName :
15022
            str = "CN";
15023
            len = 2;
15024
            break;
15025
        case WC_NID_countryName:
15026
            str = "C";
15027
            len = 1;
15028
            break;
15029
        case WC_NID_localityName:
15030
            str = "L";
15031
            len = 1;
15032
            break;
15033
        case WC_NID_stateOrProvinceName:
15034
            str = "ST";
15035
            len = 2;
15036
            break;
15037
        case WC_NID_streetAddress:
15038
            str = "street";
15039
            len = 6;
15040
            break;
15041
        case WC_NID_organizationName:
15042
            str = "O";
15043
            len = 1;
15044
            break;
15045
        case WC_NID_organizationalUnitName:
15046
            str = "OU";
15047
            len = 2;
15048
            break;
15049
        case WC_NID_postalCode:
15050
            str = "postalCode";
15051
            len = 10;
15052
            break;
15053
        case WC_NID_emailAddress:
15054
            str = "emailAddress";
15055
            len = 12;
15056
            break;
15057
        case WC_NID_surname:
15058
            str = "SN";
15059
            len = 2;
15060
            break;
15061
        case WC_NID_givenName:
15062
            str = "GN";
15063
            len = 2;
15064
            break;
15065
        case WC_NID_dnQualifier:
15066
            str = "dnQualifier";
15067
            len = 11;
15068
            break;
15069
        case WC_NID_name:
15070
            str = "name";
15071
            len = 4;
15072
            break;
15073
        case WC_NID_initials:
15074
            str = "initials";
15075
            len = 8;
15076
            break;
15077
        case WC_NID_domainComponent:
15078
            str = "DC";
15079
            len = 2;
15080
            break;
15081
        case WC_NID_pkcs9_contentType:
15082
            str = "contentType";
15083
            len = 11;
15084
            break;
15085
        case WC_NID_userId:
15086
            str = "UID";
15087
            len = 3;
15088
            break;
15089
        case WC_NID_serialNumber:
15090
            str = "serialNumber";
15091
            len = 12;
15092
            break;
15093
        case WC_NID_title:
15094
            str = "title";
15095
            len = 5;
15096
            break;
15097
        case WC_NID_rfc822Mailbox:
15098
            str = "mail";
15099
            len = 4;
15100
            break;
15101
        default:
15102
            WOLFSSL_MSG("Attribute type not found");
15103
            str = NULL;
15104
15105
    }
15106
    if (buf != NULL)
15107
        *buf = str;
15108
    return len;
15109
}
15110
15111
/**
15112
 * Escape input string for RFC2253 requirements. The following characters
15113
 * are escaped with a backslash (\):
15114
 *
15115
 *     1. A space or '#' at the beginning of the string
15116
 *     2. A space at the end of the string
15117
 *     3. One of: ",", "+", """, "\", "<", ">", ";"
15118
 *
15119
 * in    - input string to escape
15120
 * inSz  - length of in, not including the null terminator
15121
 * out   - buffer for output string to be written, will be null terminated
15122
 * outSz - size of out
15123
 *
15124
 * Returns size of output string (not counting NULL terminator) on success,
15125
 * negative on error.
15126
 */
15127
static int wolfSSL_EscapeString_RFC2253(char* in, word32 inSz,
15128
                                        char* out, word32 outSz)
15129
{
15130
    word32 inIdx = 0;
15131
    word32 outIdx = 0;
15132
15133
    if (in == NULL || out == NULL || inSz == 0 || outSz == 0) {
15134
        return BAD_FUNC_ARG;
15135
    }
15136
15137
    for (inIdx = 0; inIdx < inSz; inIdx++) {
15138
15139
        char c = in[inIdx];
15140
15141
        if (((inIdx == 0) && (c == ' ' || c == '#')) ||
15142
            ((inIdx == (inSz-1)) && (c == ' ')) ||
15143
            c == ',' || c == '+' || c == '"' || c == '\\' ||
15144
            c == '<' || c == '>' || c == ';') {
15145
15146
            if (outIdx > (outSz - 1)) {
15147
                return BUFFER_E;
15148
            }
15149
            out[outIdx] = '\\';
15150
            outIdx++;
15151
        }
15152
        if (outIdx > (outSz - 1)) {
15153
            return BUFFER_E;
15154
        }
15155
        out[outIdx] = c;
15156
        outIdx++;
15157
    }
15158
15159
    /* null terminate out */
15160
    if (outIdx > (outSz -1)) {
15161
        return BUFFER_E;
15162
    }
15163
    out[outIdx] = '\0';
15164
15165
    return (int)outIdx;
15166
}
15167
15168
/*
15169
 * Print human readable version of X509_NAME to provided BIO.
15170
 *
15171
 * bio    - output BIO to place name string. Does not include null terminator.
15172
 * name   - input name to convert to string
15173
 * indent - number of indent spaces to prepend to name string
15174
 * flags  - flags to control function behavior. Not all flags are currently
15175
 *          supported/implemented. Currently supported are:
15176
 *              XN_FLAG_RFC2253 - only the backslash escape requirements from
15177
 *                                RFC22523 currently implemented.
15178
 *              XN_FLAG_DN_REV  - print name reversed. Automatically done by
15179
 *                                XN_FLAG_RFC2253.
15180
 *              XN_FLAG_SPC_EQ  - spaces before and after '=' character
15181
 *
15182
 * Returns WOLFSSL_SUCCESS (1) on success, WOLFSSL_FAILURE (0) on failure.
15183
 */
15184
int wolfSSL_X509_NAME_print_ex(WOLFSSL_BIO* bio, WOLFSSL_X509_NAME* name,
15185
                int indent, unsigned long flags)
15186
{
15187
    int i, count = 0, nameStrSz = 0, escapeSz = 0;
15188
    int eqSpace  = 0;
15189
    char eqStr[4];
15190
    char* tmp = NULL;
15191
    char* nameStr = NULL;
15192
    const char *buf = NULL;
15193
    WOLFSSL_X509_NAME_ENTRY* ne;
15194
    WOLFSSL_ASN1_STRING* str;
15195
    char escaped[ASN_NAME_MAX];
15196
15197
    WOLFSSL_ENTER("wolfSSL_X509_NAME_print_ex");
15198
15199
    if ((name == NULL) || (bio == NULL))
15200
        return WOLFSSL_FAILURE;
15201
15202
    XMEMSET(eqStr, 0, sizeof(eqStr));
15203
    if (flags & WOLFSSL_XN_FLAG_SPC_EQ) {
15204
        eqSpace = 2;
15205
        XSTRNCPY(eqStr, " = ", 4);
15206
    }
15207
    else {
15208
        XSTRNCPY(eqStr, "=", 4);
15209
    }
15210
15211
    for (i = 0; i < indent; i++) {
15212
        if (wolfSSL_BIO_write(bio, " ", 1) != 1)
15213
            return WOLFSSL_FAILURE;
15214
    }
15215
15216
    count = wolfSSL_X509_NAME_entry_count(name);
15217
15218
    for (i = 0; i < count; i++) {
15219
        int len;
15220
        int tmpSz;
15221
15222
        /* reverse name order for RFC2253 and DN_REV */
15223
        if ((flags & WOLFSSL_XN_FLAG_RFC2253) ||
15224
            (flags & WOLFSSL_XN_FLAG_DN_REV)) {
15225
            ne = wolfSSL_X509_NAME_get_entry(name, count - i - 1);
15226
        }
15227
        else {
15228
            ne = wolfSSL_X509_NAME_get_entry(name, i);
15229
        }
15230
        if (ne == NULL)
15231
            return WOLFSSL_FAILURE;
15232
15233
        str = wolfSSL_X509_NAME_ENTRY_get_data(ne);
15234
        if (str == NULL)
15235
            return WOLFSSL_FAILURE;
15236
15237
        if (flags & WOLFSSL_XN_FLAG_RFC2253) {
15238
            /* escape string for RFC 2253, ret sz not counting null term */
15239
            escapeSz = wolfSSL_EscapeString_RFC2253(str->data,
15240
                            str->length, escaped, sizeof(escaped));
15241
            if (escapeSz < 0)
15242
                return WOLFSSL_FAILURE;
15243
15244
            nameStr = escaped;
15245
            nameStrSz = escapeSz;
15246
        }
15247
        else {
15248
            nameStr = str->data;
15249
            nameStrSz = str->length;
15250
        }
15251
15252
        /* len is without null terminator */
15253
        len = get_dn_attr_by_nid(ne->nid, &buf);
15254
        if (len == 0 || buf == NULL)
15255
            return WOLFSSL_FAILURE;
15256
15257
        /* + 4 for '=', comma space and '\0'*/
15258
        tmpSz = nameStrSz + len + 4 + eqSpace;
15259
        tmp = (char*)XMALLOC(tmpSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
15260
        if (tmp == NULL) {
15261
            return WOLFSSL_FAILURE;
15262
        }
15263
15264
        if (i < count - 1) {
15265
            if (XSNPRINTF(tmp, (size_t)tmpSz, "%s%s%s, ", buf, eqStr, nameStr)
15266
                >= tmpSz)
15267
            {
15268
                WOLFSSL_MSG("buffer overrun");
15269
                XFREE(tmp, NULL, DYNAMIC_TYPE_TMP_BUFFER);
15270
                return WOLFSSL_FAILURE;
15271
            }
15272
15273
            tmpSz = len + nameStrSz + 3 + eqSpace; /* 3 for '=', comma space */
15274
        }
15275
        else {
15276
            if (XSNPRINTF(tmp, (size_t)tmpSz, "%s%s%s", buf, eqStr, nameStr)
15277
                >= tmpSz)
15278
            {
15279
                WOLFSSL_MSG("buffer overrun");
15280
                XFREE(tmp, NULL, DYNAMIC_TYPE_TMP_BUFFER);
15281
                return WOLFSSL_FAILURE;
15282
            }
15283
            tmpSz = len + nameStrSz + 1 + eqSpace; /* 1 for '=' */
15284
            if (bio->type != WOLFSSL_BIO_FILE &&
15285
                                              bio->type != WOLFSSL_BIO_MEMORY) {
15286
                ++tmpSz; /* include the terminating null when not writing to a
15287
                          * file.
15288
                          */
15289
            }
15290
        }
15291
15292
        if (wolfSSL_BIO_write(bio, tmp, tmpSz) != tmpSz) {
15293
            XFREE(tmp, NULL, DYNAMIC_TYPE_TMP_BUFFER);
15294
            return WOLFSSL_FAILURE;
15295
        }
15296
15297
        XFREE(tmp, NULL, DYNAMIC_TYPE_TMP_BUFFER);
15298
    }
15299
15300
    return WOLFSSL_SUCCESS;
15301
}
15302
15303
#ifndef NO_FILESYSTEM
15304
int wolfSSL_X509_NAME_print_ex_fp(XFILE file, WOLFSSL_X509_NAME* name,
15305
        int indent, unsigned long flags)
15306
{
15307
    WOLFSSL_BIO* bio;
15308
    int ret;
15309
15310
    WOLFSSL_ENTER("wolfSSL_X509_NAME_print_ex_fp");
15311
15312
    if (!(bio = wolfSSL_BIO_new_fp(file, WOLFSSL_BIO_NOCLOSE))) {
15313
        WOLFSSL_MSG("wolfSSL_BIO_new_fp error");
15314
        return WOLFSSL_FAILURE;
15315
    }
15316
15317
    ret = wolfSSL_X509_NAME_print_ex(bio, name, indent, flags);
15318
15319
    wolfSSL_BIO_free(bio);
15320
15321
    return ret;
15322
}
15323
#endif /* NO_FILESYSTEM */
15324
#endif /* !NO_BIO */
15325
15326
#ifndef NO_WOLFSSL_STUB
15327
WOLFSSL_ASN1_BIT_STRING* wolfSSL_X509_get0_pubkey_bitstr(const WOLFSSL_X509* x)
15328
{
15329
    (void)x;
15330
    WOLFSSL_ENTER("wolfSSL_X509_get0_pubkey_bitstr");
15331
    WOLFSSL_STUB("X509_get0_pubkey_bitstr");
15332
15333
    return NULL;
15334
}
15335
#endif
15336
15337
#ifdef OPENSSL_ALL
15338
WOLFSSL_X509_LOOKUP_TYPE wolfSSL_X509_OBJECT_get_type(
15339
        const WOLFSSL_X509_OBJECT* obj)
15340
{
15341
    if (obj == NULL)
15342
        return WOLFSSL_X509_LU_NONE;
15343
    return obj->type;
15344
}
15345
15346
WOLFSSL_X509_OBJECT* wolfSSL_X509_OBJECT_new(void)
15347
{
15348
    WOLFSSL_X509_OBJECT* ret = (WOLFSSL_X509_OBJECT*)
15349
            XMALLOC(sizeof(WOLFSSL_X509_OBJECT), NULL, DYNAMIC_TYPE_OPENSSL);
15350
    if (ret != NULL)
15351
        XMEMSET(ret, 0, sizeof(WOLFSSL_X509_OBJECT));
15352
    return ret;
15353
}
15354
15355
void wolfSSL_X509_OBJECT_free(WOLFSSL_X509_OBJECT *obj)
15356
{
15357
    WOLFSSL_ENTER("wolfSSL_X509_OBJECT_free");
15358
    if (obj != NULL) {
15359
        if (obj->type == WOLFSSL_X509_LU_X509) {
15360
            wolfSSL_X509_free(obj->data.x509);
15361
        }
15362
    #ifdef HAVE_CRL
15363
        else if (obj->type == WOLFSSL_X509_LU_CRL) {
15364
            wolfSSL_X509_CRL_free(obj->data.crl);
15365
        }
15366
    #endif
15367
        else {
15368
            /* We don't free as this will point to
15369
             * store->cm->crl which we don't own */
15370
            WOLFSSL_MSG("Not free'ing CRL in WOLFSSL_X509_OBJECT");
15371
        }
15372
        XFREE(obj, NULL, DYNAMIC_TYPE_OPENSSL);
15373
    }
15374
}
15375
15376
WOLFSSL_X509_OBJECT *wolfSSL_X509_OBJECT_retrieve_by_subject(
15377
        WOLF_STACK_OF(WOLFSSL_X509_OBJECT) *sk,
15378
        WOLFSSL_X509_LOOKUP_TYPE type,
15379
        WOLFSSL_X509_NAME *name)
15380
{
15381
    int i;
15382
15383
    WOLFSSL_ENTER("wolfSSL_X509_OBJECT_retrieve_by_subject");
15384
15385
    if (sk == NULL || name == NULL)
15386
        return NULL;
15387
15388
    for (i = 0; i < wolfSSL_sk_X509_OBJECT_num(sk); i++) {
15389
        WOLFSSL_X509_OBJECT* obj = (WOLFSSL_X509_OBJECT *)
15390
            wolfSSL_sk_X509_OBJECT_value(sk, i);
15391
        if (obj != NULL && obj->type == type &&
15392
            wolfSSL_X509_NAME_cmp(
15393
                wolfSSL_X509_get_subject_name(obj->data.x509), name) == 0)
15394
            return obj;
15395
    }
15396
    return NULL;
15397
}
15398
#endif /* OPENSSL_ALL */
15399
15400
#ifndef NO_WOLFSSL_STUB
15401
WOLFSSL_X509_OBJECT* wolfSSL_sk_X509_OBJECT_delete(
15402
    WOLF_STACK_OF(WOLFSSL_X509_OBJECT)* sk, int i)
15403
{
15404
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_delete");
15405
    WOLFSSL_STUB("wolfSSL_sk_X509_OBJECT_delete");
15406
    (void)sk;
15407
    (void)i;
15408
    return NULL;
15409
}
15410
#endif
15411
15412
WOLFSSL_X509 *wolfSSL_X509_OBJECT_get0_X509(const WOLFSSL_X509_OBJECT *obj)
15413
{
15414
    if (obj != NULL && obj->type == WOLFSSL_X509_LU_X509)
15415
        return obj->data.x509;
15416
    return NULL;
15417
}
15418
15419
WOLFSSL_X509_CRL *wolfSSL_X509_OBJECT_get0_X509_CRL(WOLFSSL_X509_OBJECT *obj)
15420
{
15421
    if (obj != NULL && obj->type == WOLFSSL_X509_LU_CRL)
15422
        return obj->data.crl;
15423
    return NULL;
15424
}
15425
15426
#endif /* OPENSSL_ALL || (OPENSSL_EXTRA && (HAVE_STUNNEL || WOLFSSL_NGINX ||
15427
        * HAVE_LIGHTY || WOLFSSL_HAPROXY || WOLFSSL_OPENSSH ||
15428
        * HAVE_SBLIM_SFCB)) */
15429
15430
15431
#if defined(OPENSSL_EXTRA)
15432
15433
int wolfSSL_sk_X509_num(const WOLF_STACK_OF(WOLFSSL_X509) *s)
15434
{
15435
    WOLFSSL_ENTER("wolfSSL_sk_X509_num");
15436
15437
    if (s == NULL)
15438
        return WOLFSSL_FATAL_ERROR;
15439
    return (int)s->num;
15440
}
15441
15442
#endif /* OPENSSL_EXTRA */
15443
15444
#ifdef HAVE_EX_DATA_CRYPTO
15445
int wolfSSL_X509_get_ex_new_index(int idx, void *arg,
15446
                                  WOLFSSL_CRYPTO_EX_new* new_func,
15447
                                  WOLFSSL_CRYPTO_EX_dup* dup_func,
15448
                                  WOLFSSL_CRYPTO_EX_free* free_func)
15449
{
15450
    WOLFSSL_ENTER("wolfSSL_X509_get_ex_new_index");
15451
15452
    return wolfssl_get_ex_new_index(WOLF_CRYPTO_EX_INDEX_X509, idx, arg,
15453
                                    new_func, dup_func, free_func);
15454
}
15455
#endif
15456
15457
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
15458
void *wolfSSL_X509_get_ex_data(WOLFSSL_X509 *x509, int idx)
15459
{
15460
    WOLFSSL_ENTER("wolfSSL_X509_get_ex_data");
15461
#ifdef HAVE_EX_DATA
15462
    if (x509 != NULL) {
15463
        return wolfSSL_CRYPTO_get_ex_data(&x509->ex_data, idx);
15464
    }
15465
#else
15466
    (void)x509;
15467
    (void)idx;
15468
#endif
15469
    return NULL;
15470
}
15471
15472
int wolfSSL_X509_set_ex_data(WOLFSSL_X509 *x509, int idx, void *data)
15473
{
15474
    WOLFSSL_ENTER("wolfSSL_X509_set_ex_data");
15475
#ifdef HAVE_EX_DATA
15476
    if (x509 != NULL) {
15477
        return wolfSSL_CRYPTO_set_ex_data(&x509->ex_data, idx, data);
15478
    }
15479
#else
15480
    (void)x509;
15481
    (void)idx;
15482
    (void)data;
15483
#endif
15484
    return WOLFSSL_FAILURE;
15485
}
15486
15487
#ifdef HAVE_EX_DATA_CLEANUP_HOOKS
15488
int wolfSSL_X509_set_ex_data_with_cleanup(
15489
    WOLFSSL_X509 *x509,
15490
    int idx,
15491
    void *data,
15492
    wolfSSL_ex_data_cleanup_routine_t cleanup_routine)
15493
{
15494
    WOLFSSL_ENTER("wolfSSL_X509_set_ex_data_with_cleanup");
15495
    if (x509 != NULL)
15496
    {
15497
        return wolfSSL_CRYPTO_set_ex_data_with_cleanup(&x509->ex_data, idx,
15498
                                                       data, cleanup_routine);
15499
    }
15500
    return WOLFSSL_FAILURE;
15501
}
15502
#endif /* HAVE_EX_DATA_CLEANUP_HOOKS */
15503
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
15504
15505
15506
#ifndef NO_ASN
15507
int wolfSSL_X509_check_host(WOLFSSL_X509 *x, const char *chk, size_t chklen,
15508
                    unsigned int flags, char **peername)
15509
0
{
15510
0
    int         ret;
15511
0
    size_t      i;
15512
0
    WC_DECLARE_VAR(dCert, DecodedCert, 1, 0);
15513
15514
0
    WOLFSSL_ENTER("wolfSSL_X509_check_host");
15515
15516
    /* flags and peername not needed for Nginx. */
15517
0
    (void)peername;
15518
15519
0
    if ((x == NULL) || (chk == NULL)) {
15520
0
        WOLFSSL_MSG("Invalid parameter");
15521
0
        return WOLFSSL_FAILURE;
15522
0
    }
15523
15524
0
    if (flags & WOLFSSL_NO_WILDCARDS) {
15525
0
        WOLFSSL_MSG("X509_CHECK_FLAG_NO_WILDCARDS not yet implemented");
15526
0
        return WOLFSSL_FAILURE;
15527
0
    }
15528
0
    if (flags & WOLFSSL_NO_PARTIAL_WILDCARDS) {
15529
0
        WOLFSSL_MSG("X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS not yet implemented");
15530
0
        return WOLFSSL_FAILURE;
15531
0
    }
15532
0
    if (flags & WOLFSSL_MULTI_LABEL_WILDCARDS) {
15533
0
        WOLFSSL_MSG("X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS not yet implemented");
15534
0
        return WOLFSSL_FAILURE;
15535
0
    }
15536
15537
0
#ifdef WOLFSSL_SMALL_STACK
15538
0
    dCert = (DecodedCert *)XMALLOC(sizeof(*dCert), x->heap,
15539
0
                                   DYNAMIC_TYPE_DCERT);
15540
0
    if (dCert == NULL) {
15541
0
        WOLFSSL_MSG("\tout of memory");
15542
0
        return WOLFSSL_FATAL_ERROR;
15543
0
    }
15544
0
#endif
15545
15546
0
    InitDecodedCert(dCert, x->derCert->buffer, x->derCert->length, NULL);
15547
0
    ret = ParseCertRelative(dCert, CERT_TYPE, 0, NULL, NULL);
15548
0
    if (ret != 0) {
15549
0
        goto out;
15550
0
    }
15551
15552
    /* Replicate openssl behavior for checklen */
15553
0
    if (chklen == 0) {
15554
0
        chklen = (size_t)(XSTRLEN(chk));
15555
0
    }
15556
0
    else {
15557
0
        for (i = 0; i < (chklen > 1 ? chklen - 1 : chklen); i++) {
15558
0
            if (chk[i] == '\0') {
15559
0
                ret = WOLFSSL_FATAL_ERROR;
15560
0
                goto out;
15561
0
            }
15562
0
        }
15563
0
    }
15564
0
    if (chklen > 1 && (chk[chklen - 1] == '\0')) {
15565
0
        chklen--;
15566
0
    }
15567
15568
#ifdef WOLFSSL_IP_ALT_NAME
15569
    ret = CheckIPAddr(dCert, (char *)chk);
15570
    if (ret == 0) {
15571
        goto out;
15572
    }
15573
#endif /* WOLFSSL_IP_ALT_NAME */
15574
15575
0
    ret = CheckHostName(dCert, (char *)chk, chklen, flags, 0);
15576
15577
0
out:
15578
15579
0
    FreeDecodedCert(dCert);
15580
0
    WC_FREE_VAR_EX(dCert, x->heap, DYNAMIC_TYPE_DCERT);
15581
15582
0
    if (ret != 0)
15583
0
        return WOLFSSL_FAILURE;
15584
0
    return WOLFSSL_SUCCESS;
15585
0
}
15586
15587
15588
int wolfSSL_X509_check_ip_asc(WOLFSSL_X509 *x, const char *ipasc,
15589
        unsigned int flags)
15590
0
{
15591
0
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
15592
0
    WC_DECLARE_VAR(dCert, DecodedCert, 1, 0);
15593
15594
0
    WOLFSSL_ENTER("wolfSSL_X509_check_ip_asc");
15595
15596
    /* flags not yet implemented */
15597
0
    (void)flags;
15598
15599
0
    if ((x == NULL) || (x->derCert == NULL) || (ipasc == NULL)) {
15600
0
        WOLFSSL_MSG("Invalid parameter");
15601
0
    }
15602
0
    else {
15603
0
        ret = WOLFSSL_SUCCESS;
15604
0
    }
15605
15606
0
#ifdef WOLFSSL_SMALL_STACK
15607
0
    if (ret == WOLFSSL_SUCCESS) {
15608
0
        dCert = (DecodedCert *)XMALLOC(sizeof(*dCert), x->heap,
15609
0
                                       DYNAMIC_TYPE_DCERT);
15610
0
        if (dCert == NULL) {
15611
0
            WOLFSSL_MSG("\tout of memory");
15612
0
            ret = WOLFSSL_FAILURE;
15613
0
        }
15614
0
    }
15615
0
#endif
15616
15617
0
    if (ret == WOLFSSL_SUCCESS) {
15618
0
        InitDecodedCert(dCert, x->derCert->buffer, x->derCert->length, NULL);
15619
0
        ret = ParseCertRelative(dCert, CERT_TYPE, 0, NULL, NULL);
15620
0
        if (ret != 0) {
15621
0
            ret = WOLFSSL_FAILURE;
15622
0
        }
15623
0
        else {
15624
0
            ret = CheckIPAddr(dCert, ipasc);
15625
0
            if (ret != 0) {
15626
0
                ret = WOLFSSL_FAILURE;
15627
0
            }
15628
0
            else {
15629
0
                ret = WOLFSSL_SUCCESS;
15630
0
            }
15631
0
        }
15632
0
        FreeDecodedCert(dCert);
15633
0
    }
15634
15635
0
#ifdef WOLFSSL_SMALL_STACK
15636
0
    if (x != NULL) {
15637
0
        XFREE(dCert, x->heap, DYNAMIC_TYPE_DCERT);
15638
0
    }
15639
0
#endif
15640
15641
0
    return ret;
15642
0
}
15643
#endif
15644
15645
#if defined(OPENSSL_EXTRA) && defined(WOLFSSL_CERT_GEN)
15646
int wolfSSL_X509_check_email(WOLFSSL_X509 *x, const char *chk, size_t chkLen,
15647
                             unsigned int flags)
15648
{
15649
    WOLFSSL_X509_NAME *subjName;
15650
    int emailLen;
15651
    char *emailBuf;
15652
15653
    (void)flags;
15654
15655
    WOLFSSL_ENTER("wolfSSL_X509_check_email");
15656
15657
    if ((x == NULL) || (chk == NULL)) {
15658
        WOLFSSL_MSG("Invalid parameter");
15659
        return WOLFSSL_FAILURE;
15660
    }
15661
15662
    subjName = wolfSSL_X509_get_subject_name(x);
15663
    if (subjName == NULL)
15664
        return WOLFSSL_FAILURE;
15665
15666
    /* Call with NULL buffer to get required length. */
15667
    emailLen = wolfSSL_X509_NAME_get_text_by_NID(subjName, WC_NID_emailAddress,
15668
                                                 NULL, 0);
15669
    if (emailLen < 0)
15670
        return WOLFSSL_FAILURE;
15671
15672
    ++emailLen; /* Add 1 for the NUL. */
15673
15674
    emailBuf = (char*)XMALLOC(emailLen, x->heap, DYNAMIC_TYPE_OPENSSL);
15675
    if (emailBuf == NULL)
15676
        return WOLFSSL_FAILURE;
15677
15678
    emailLen = wolfSSL_X509_NAME_get_text_by_NID(subjName, WC_NID_emailAddress,
15679
                                                 emailBuf, emailLen);
15680
    if (emailLen < 0) {
15681
        XFREE(emailBuf, x->heap, DYNAMIC_TYPE_OPENSSL);
15682
        return WOLFSSL_FAILURE;
15683
    }
15684
15685
    if (chkLen == 0)
15686
        chkLen = XSTRLEN(chk);
15687
15688
    if (chkLen != (size_t)emailLen
15689
     || XSTRNCMP(chk, emailBuf, chkLen)) {
15690
        XFREE(emailBuf, x->heap, DYNAMIC_TYPE_OPENSSL);
15691
        return WOLFSSL_FAILURE;
15692
    }
15693
15694
    XFREE(emailBuf, x->heap, DYNAMIC_TYPE_OPENSSL);
15695
    return WOLFSSL_SUCCESS;
15696
}
15697
#endif /* OPENSSL_EXTRA && WOLFSSL_CERT_GEN */
15698
15699
#if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) || defined(WOLFSSL_HAPROXY) \
15700
    || defined(OPENSSL_EXTRA) || defined(HAVE_LIGHTY)
15701
15702
int wolfSSL_X509_NAME_digest(const WOLFSSL_X509_NAME *name,
15703
        const WOLFSSL_EVP_MD *type, unsigned char *md, unsigned int *len)
15704
{
15705
    WOLFSSL_ENTER("wolfSSL_X509_NAME_digest");
15706
15707
    if (name == NULL || type == NULL)
15708
        return WOLFSSL_FAILURE;
15709
15710
#if !defined(NO_FILESYSTEM) && !defined(NO_PWDBASED)
15711
    return wolfSSL_EVP_Digest((unsigned char*)name->name,
15712
                              name->sz, md, len, type, NULL);
15713
#else
15714
    (void)md;
15715
    (void)len;
15716
    return NOT_COMPILED_IN;
15717
#endif
15718
}
15719
15720
#endif /* OPENSSL_ALL || WOLFSSL_NGINX || WOLFSSL_HAPROXY ||
15721
    OPENSSL_EXTRA || HAVE_LIGHTY */
15722
15723
#if defined(WOLFSSL_NGINX) || defined(WOLFSSL_HAPROXY) || \
15724
    defined(OPENSSL_EXTRA) || defined(OPENSSL_ALL)
15725
15726
void wolfSSL_X509_email_free(WOLF_STACK_OF(WOLFSSL_STRING) *sk)
15727
{
15728
    wolfSSL_sk_pop_free(sk, NULL);
15729
}
15730
15731
static int x509_aia_append_string(WOLFSSL_STACK* list, const byte* uri,
15732
        word32 uriSz)
15733
{
15734
    WOLFSSL_STRING url = (WOLFSSL_STRING)XMALLOC(uriSz + 1, NULL,
15735
            DYNAMIC_TYPE_OPENSSL);
15736
    if (url == NULL)
15737
        return -1;
15738
    XMEMCPY(url, uri, uriSz);
15739
    url[uriSz] = '\0';
15740
15741
    if (wolfSSL_sk_push(list, url) <= 0) {
15742
        XFREE(url, NULL, DYNAMIC_TYPE_OPENSSL);
15743
        return -1;
15744
    }
15745
15746
    return 0;
15747
}
15748
15749
static WOLFSSL_STACK* x509_get1_aia_by_method(WOLFSSL_X509* x, word32 method,
15750
    const byte* fallback, int fallbackSz)
15751
{
15752
    WOLFSSL_STACK* ret = NULL;
15753
    int i;
15754
15755
    if (x == NULL)
15756
        return NULL;
15757
15758
    ret = wolfSSL_sk_WOLFSSL_STRING_new();
15759
    if (ret == NULL)
15760
        return NULL;
15761
15762
    /* Build from multi-entry list when available; otherwise fall back to the
15763
     * legacy single-entry fields to preserve previous behavior. */
15764
    if (x->authInfoListSz > 0) {
15765
        for (i = 0; i < x->authInfoListSz; i++) {
15766
            if (x->authInfoList[i].method != method ||
15767
                    x->authInfoList[i].uri == NULL ||
15768
                    x->authInfoList[i].uriSz == 0) {
15769
                continue;
15770
            }
15771
15772
            if (x509_aia_append_string(ret, x->authInfoList[i].uri,
15773
                    x->authInfoList[i].uriSz) != 0) {
15774
                wolfSSL_X509_email_free(ret);
15775
                return NULL;
15776
            }
15777
        }
15778
    }
15779
    /* Only use fallback when nothing was found in the list */
15780
    if (wolfSSL_sk_num(ret) == 0 && fallback != NULL && fallbackSz > 0) {
15781
        if (x509_aia_append_string(ret, fallback, (word32)fallbackSz) != 0) {
15782
            wolfSSL_X509_email_free(ret);
15783
            return NULL;
15784
        }
15785
    }
15786
15787
    /* Return NULL when empty */
15788
    if (wolfSSL_sk_num(ret) == 0) {
15789
        wolfSSL_X509_email_free(ret);
15790
        ret = NULL;
15791
    }
15792
15793
    return ret;
15794
}
15795
15796
WOLF_STACK_OF(WOLFSSL_STRING) *wolfSSL_X509_get1_ocsp(WOLFSSL_X509 *x)
15797
{
15798
    if (x == NULL)
15799
        return NULL;
15800
    return x509_get1_aia_by_method(x, AIA_OCSP_OID, x->authInfo, x->authInfoSz);
15801
}
15802
15803
int wolfSSL_X509_get_aia_overflow(WOLFSSL_X509 *x)
15804
{
15805
    int overflow = 0;
15806
15807
    WOLFSSL_ENTER("wolfSSL_X509_get_aia_overflow");
15808
15809
    if (x != NULL) {
15810
        overflow = x->authInfoListOverflow;
15811
    }
15812
15813
    WOLFSSL_LEAVE("wolfSSL_X509_get_aia_overflow", overflow);
15814
15815
    return overflow;
15816
}
15817
15818
#ifdef WOLFSSL_ASN_CA_ISSUER
15819
WOLF_STACK_OF(WOLFSSL_STRING) *wolfSSL_X509_get1_ca_issuers(WOLFSSL_X509 *x)
15820
{
15821
    if (x == NULL)
15822
        return NULL;
15823
    return x509_get1_aia_by_method(x, AIA_CA_ISSUER_OID, x->authInfoCaIssuer,
15824
            x->authInfoCaIssuerSz);
15825
}
15826
#endif /* WOLFSSL_ASN_CA_ISSUER */
15827
15828
int wolfSSL_X509_check_issued(WOLFSSL_X509 *issuer, WOLFSSL_X509 *subject)
15829
{
15830
    WOLFSSL_X509_NAME *issuerName = wolfSSL_X509_get_issuer_name(subject);
15831
    WOLFSSL_X509_NAME *subjectName = wolfSSL_X509_get_subject_name(issuer);
15832
15833
    if (issuerName == NULL || subjectName == NULL)
15834
        return WOLFSSL_X509_V_ERR_SUBJECT_ISSUER_MISMATCH;
15835
15836
    /* Literal matching of encoded names and key ids. */
15837
    if (issuerName->sz != subjectName->sz ||
15838
           XMEMCMP(issuerName->name, subjectName->name, subjectName->sz) != 0) {
15839
        return WOLFSSL_X509_V_ERR_SUBJECT_ISSUER_MISMATCH;
15840
    }
15841
15842
    if (subject->authKeyId != NULL && issuer->subjKeyId != NULL) {
15843
        if (subject->authKeyIdSz != issuer->subjKeyIdSz ||
15844
                XMEMCMP(subject->authKeyId, issuer->subjKeyId,
15845
                        issuer->subjKeyIdSz) != 0) {
15846
            return WOLFSSL_X509_V_ERR_SUBJECT_ISSUER_MISMATCH;
15847
        }
15848
    }
15849
15850
    return WOLFSSL_X509_V_OK;
15851
}
15852
15853
#endif /* WOLFSSL_NGINX || WOLFSSL_HAPROXY || OPENSSL_EXTRA || OPENSSL_ALL */
15854
15855
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL) || \
15856
    defined(KEEP_PEER_CERT) || defined(SESSION_CERTS)
15857
WOLFSSL_X509* wolfSSL_X509_dup(WOLFSSL_X509 *x)
15858
{
15859
    WOLFSSL_ENTER("wolfSSL_X509_dup");
15860
15861
    if (x == NULL) {
15862
        WOLFSSL_MSG("Error: NULL input");
15863
        return NULL;
15864
    }
15865
15866
    if (x->derCert == NULL) {
15867
        WOLFSSL_MSG("Error: NULL derCert parameter");
15868
        return NULL;
15869
    }
15870
15871
    return wolfSSL_X509_d2i_ex(NULL, x->derCert->buffer, x->derCert->length,
15872
        x->heap);
15873
}
15874
#endif /* OPENSSL_EXTRA || WOLFSSL_WPAS_SMALL || KEEP_PEER_CERT || \
15875
          SESSION_CERTS */
15876
15877
#if defined(OPENSSL_EXTRA)
15878
int wolfSSL_X509_check_ca(WOLFSSL_X509 *x509)
15879
{
15880
    WOLFSSL_ENTER("wolfSSL_X509_check_ca");
15881
15882
    if (x509 == NULL)
15883
        return WOLFSSL_FAILURE;
15884
    if (x509->isCa)
15885
        return 1;
15886
    if (x509->extKeyUsageCrit)
15887
        return 4;
15888
15889
    return 0;
15890
}
15891
#endif /* OPENSSL_EXTRA */
15892
15893
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
15894
long wolfSSL_X509_get_version(const WOLFSSL_X509 *x509)
15895
{
15896
    int version = 0;
15897
15898
    WOLFSSL_ENTER("wolfSSL_X509_get_version");
15899
15900
    if (x509 == NULL) {
15901
        WOLFSSL_MSG("invalid parameter");
15902
        return 0L;
15903
    }
15904
    version = x509->version;
15905
    if (version != 0)
15906
        return (long)version - 1L;
15907
15908
    return 0L;
15909
}
15910
#endif /* OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL */
15911
15912
#if defined(OPENSSL_EXTRA)
15913
int wolfSSL_X509_get_signature_nid(const WOLFSSL_X509 *x)
15914
{
15915
    if (x == NULL)
15916
        return 0;
15917
15918
    return oid2nid((word32)x->sigOID, oidSigType);
15919
}
15920
#endif  /* OPENSSL_EXTRA */
15921
15922
#if defined(OPENSSL_EXTRA)
15923
WOLFSSL_STACK* wolfSSL_sk_X509_new(WOLF_SK_COMPARE_CB(WOLFSSL_X509, cb))
15924
{
15925
    (void)cb;
15926
    return wolfSSL_sk_X509_new_null();
15927
}
15928
15929
WOLFSSL_STACK* wolfSSL_sk_X509_new_null(void)
15930
{
15931
    WOLFSSL_STACK* s = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK), NULL,
15932
            DYNAMIC_TYPE_OPENSSL);
15933
    if (s != NULL) {
15934
        XMEMSET(s, 0, sizeof(*s));
15935
        s->type = STACK_TYPE_X509;
15936
    }
15937
15938
    return s;
15939
}
15940
#endif  /* OPENSSL_EXTRA */
15941
15942
#ifdef OPENSSL_ALL
15943
15944
WOLFSSL_STACK* wolfSSL_sk_X509_OBJECT_new(void)
15945
{
15946
    WOLFSSL_STACK* s = (WOLFSSL_STACK*)XMALLOC(sizeof(WOLFSSL_STACK), NULL,
15947
            DYNAMIC_TYPE_OPENSSL);
15948
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_new");
15949
    if (s != NULL) {
15950
        XMEMSET(s, 0, sizeof(*s));
15951
        s->type = STACK_TYPE_X509_OBJ;
15952
    }
15953
    return s;
15954
}
15955
15956
void wolfSSL_sk_X509_OBJECT_free(WOLFSSL_STACK* s)
15957
{
15958
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_free");
15959
    wolfSSL_sk_free(s);
15960
}
15961
15962
void wolfSSL_sk_X509_OBJECT_pop_free(WOLFSSL_STACK* s,
15963
        void (*f) (WOLFSSL_X509_OBJECT*))
15964
{
15965
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_pop_free");
15966
    wolfSSL_sk_pop_free(s, (wolfSSL_sk_freefunc)f);
15967
}
15968
15969
int wolfSSL_sk_X509_OBJECT_push(WOLFSSL_STACK* sk, WOLFSSL_X509_OBJECT* obj)
15970
{
15971
    WOLFSSL_ENTER("wolfSSL_sk_X509_OBJECT_push");
15972
15973
    if (sk == NULL || obj == NULL) {
15974
        return WOLFSSL_FAILURE;
15975
    }
15976
15977
    return wolfSSL_sk_push(sk, obj);
15978
}
15979
15980
#endif /* OPENSSL_ALL */
15981
15982
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
15983
/* unlike wolfSSL_X509_NAME_dup this does not malloc a duplicate, only deep
15984
 * copy. "to" is expected to be a fresh blank name, if not pointers could be
15985
 * lost */
15986
int wolfSSL_X509_NAME_copy(const WOLFSSL_X509_NAME* from, WOLFSSL_X509_NAME* to)
15987
{
15988
    int i;
15989
15990
    WOLFSSL_ENTER("wolfSSL_X509_NAME_copy");
15991
15992
    if (from == NULL || to == NULL) {
15993
        WOLFSSL_MSG("NULL parameter");
15994
        return BAD_FUNC_ARG;
15995
    }
15996
15997
#if defined(OPENSSL_ALL) || defined(WOLFSSL_NGINX) || defined(HAVE_LIGHTY)
15998
    if (from->rawLen > 0) {
15999
        if (from->rawLen > ASN_NAME_MAX) {
16000
            WOLFSSL_MSG("Bad raw size");
16001
            return BAD_FUNC_ARG;
16002
        }
16003
        XMEMCPY(to->raw, from->raw, from->rawLen);
16004
        to->rawLen = from->rawLen;
16005
    }
16006
#endif
16007
16008
    if (from->dynamicName) {
16009
        to->name = (char*)XMALLOC(from->sz, to->heap, DYNAMIC_TYPE_SUBJECT_CN);
16010
        if (to->name == NULL)
16011
            return WOLFSSL_FAILURE;
16012
        to->dynamicName = 1;
16013
    }
16014
    XMEMCPY(to->name, from->name, from->sz);
16015
    to->sz = from->sz;
16016
16017
    for (i = 0; i < MAX_NAME_ENTRIES; i++) {
16018
        WOLFSSL_X509_NAME_ENTRY* ne = wolfSSL_X509_NAME_get_entry(from, i);
16019
        if (ne != NULL) {
16020
            if (wolfSSL_X509_NAME_add_entry(to, ne, i, 1) != WOLFSSL_SUCCESS) {
16021
                return WOLFSSL_FAILURE;
16022
            }
16023
        }
16024
    }
16025
    to->entrySz = from->entrySz;
16026
    return WOLFSSL_SUCCESS;
16027
}
16028
16029
16030
/* copies over information from "name" to the "cert" subject name
16031
 * returns WOLFSSL_SUCCESS on success */
16032
int wolfSSL_X509_set_subject_name(WOLFSSL_X509 *cert, WOLFSSL_X509_NAME *name)
16033
{
16034
    WOLFSSL_ENTER("wolfSSL_X509_set_subject_name");
16035
    if (cert == NULL || name == NULL)
16036
        return WOLFSSL_FAILURE;
16037
16038
    FreeX509Name(&cert->subject);
16039
    InitX509Name(&cert->subject, 0, cert->heap);
16040
16041
    if (wolfSSL_X509_NAME_copy(name, &cert->subject) != WOLFSSL_SUCCESS) {
16042
        FreeX509Name(&cert->subject);
16043
        return WOLFSSL_FAILURE;
16044
    }
16045
16046
    cert->subject.x509 = cert;
16047
    return WOLFSSL_SUCCESS;
16048
}
16049
16050
16051
/* copies over information from "name" to the "cert" issuer name
16052
 * returns WOLFSSL_SUCCESS on success */
16053
int wolfSSL_X509_set_issuer_name(WOLFSSL_X509 *cert, WOLFSSL_X509_NAME *name)
16054
{
16055
    WOLFSSL_ENTER("wolfSSL_X509_set_issuer_name");
16056
    if (cert == NULL || name == NULL)
16057
        return WOLFSSL_FAILURE;
16058
16059
    FreeX509Name(&cert->issuer);
16060
    InitX509Name(&cert->issuer, 0, cert->heap);
16061
16062
    if (wolfSSL_X509_NAME_copy(name, &cert->issuer) != WOLFSSL_SUCCESS) {
16063
        FreeX509Name(&cert->issuer);
16064
        return WOLFSSL_FAILURE;
16065
    }
16066
16067
    cert->issuer.x509 = cert;
16068
    cert->issuerSet = 1;
16069
16070
    return WOLFSSL_SUCCESS;
16071
}
16072
16073
16074
int wolfSSL_X509_set_notAfter(WOLFSSL_X509* x509, const WOLFSSL_ASN1_TIME* t)
16075
{
16076
    if (x509 == NULL || t == NULL) {
16077
        return WOLFSSL_FAILURE;
16078
    }
16079
16080
    if (t->length < 0 || t->length > CTC_DATE_SIZE - 2) {
16081
        return WOLFSSL_FAILURE;
16082
    }
16083
16084
    x509->notAfter.type = t->type;
16085
    x509->notAfter.length = t->length;
16086
16087
    XMEMCPY(x509->notAfter.data, t->data, CTC_DATE_SIZE);
16088
16089
    return WOLFSSL_SUCCESS;
16090
}
16091
16092
int wolfSSL_X509_set_notBefore(WOLFSSL_X509* x509, const WOLFSSL_ASN1_TIME* t)
16093
{
16094
    if (x509 == NULL || t == NULL) {
16095
        return WOLFSSL_FAILURE;
16096
    }
16097
16098
    if (t->length < 0 || t->length > CTC_DATE_SIZE - 2) {
16099
        return WOLFSSL_FAILURE;
16100
    }
16101
16102
    x509->notBefore.type = t->type;
16103
    x509->notBefore.length = t->length;
16104
16105
    XMEMCPY(x509->notBefore.data, t->data, CTC_DATE_SIZE);
16106
16107
    return WOLFSSL_SUCCESS;
16108
}
16109
16110
int wolfSSL_X509_set1_notAfter(WOLFSSL_X509* x509, const WOLFSSL_ASN1_TIME *t)
16111
{
16112
    return wolfSSL_X509_set_notAfter(x509, t);
16113
}
16114
16115
int wolfSSL_X509_set1_notBefore(WOLFSSL_X509* x509, const WOLFSSL_ASN1_TIME *t)
16116
{
16117
    return wolfSSL_X509_set_notBefore(x509, t);
16118
}
16119
16120
int wolfSSL_X509_set_serialNumber(WOLFSSL_X509* x509, WOLFSSL_ASN1_INTEGER* s)
16121
{
16122
    WOLFSSL_ENTER("wolfSSL_X509_set_serialNumber");
16123
    if (x509 == NULL || s == NULL || s->length >= EXTERNAL_SERIAL_SIZE)
16124
        return WOLFSSL_FAILURE;
16125
16126
    /* WOLFSSL_ASN1_INTEGER has type | size | data
16127
     * Sanity check that the data is actually in ASN format */
16128
    if (s->length < 3 || s->data[0] != ASN_INTEGER ||
16129
            s->data[1] != s->length - 2) {
16130
        return WOLFSSL_FAILURE;
16131
    }
16132
    XMEMCPY(x509->serial, s->data + 2, s->length - 2);
16133
    x509->serialSz = s->length - 2;
16134
    x509->serial[x509->serialSz] = 0;
16135
16136
    return WOLFSSL_SUCCESS;
16137
}
16138
16139
16140
int wolfSSL_X509_set_pubkey(WOLFSSL_X509 *cert, WOLFSSL_EVP_PKEY *pkey)
16141
{
16142
    byte* p = NULL;
16143
    int derSz = 0;
16144
    WOLFSSL_ENTER("wolfSSL_X509_set_pubkey");
16145
16146
    if (cert == NULL || pkey == NULL)
16147
        return WOLFSSL_FAILURE;
16148
16149
    /* Regenerate since pkey->pkey.ptr may contain private key */
16150
    switch (pkey->type) {
16151
#if (defined(WOLFSSL_KEY_GEN) || defined(OPENSSL_EXTRA)) && !defined(NO_RSA)
16152
    case WC_EVP_PKEY_RSA:
16153
        {
16154
            RsaKey* rsa;
16155
16156
            if (pkey->rsa == NULL || pkey->rsa->internal == NULL)
16157
                return WOLFSSL_FAILURE;
16158
16159
            rsa = (RsaKey*)pkey->rsa->internal;
16160
            derSz = wc_RsaPublicKeyDerSize(rsa, 1);
16161
            if (derSz <= 0)
16162
                return WOLFSSL_FAILURE;
16163
16164
            p = (byte*)XMALLOC(derSz, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16165
            if (p == NULL)
16166
                return WOLFSSL_FAILURE;
16167
16168
            if ((derSz = wc_RsaKeyToPublicDer(rsa, p, (word32)derSz)) <= 0) {
16169
                XFREE(p, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16170
                return WOLFSSL_FAILURE;
16171
            }
16172
            cert->pubKeyOID = RSAk;
16173
        }
16174
        break;
16175
#endif /* (WOLFSSL_KEY_GEN || OPENSSL_EXTRA) && !NO_RSA */
16176
#if !defined(HAVE_SELFTEST) && (defined(WOLFSSL_KEY_GEN) || \
16177
        defined(WOLFSSL_CERT_GEN)) && !defined(NO_DSA)
16178
    case WC_EVP_PKEY_DSA:
16179
        {
16180
            DsaKey* dsa;
16181
16182
            if (pkey->dsa == NULL || pkey->dsa->internal == NULL)
16183
                return WOLFSSL_FAILURE;
16184
16185
            dsa = (DsaKey*)pkey->dsa->internal;
16186
            /* size of pub, priv, p, q, g + ASN.1 additional information */
16187
            derSz = 5 * mp_unsigned_bin_size(&dsa->g) + MAX_ALGO_SZ;
16188
            p = (byte*)XMALLOC(derSz, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16189
            if (p == NULL)
16190
                return WOLFSSL_FAILURE;
16191
16192
            if ((derSz = wc_DsaKeyToPublicDer(dsa, p, (word32)derSz)) <= 0) {
16193
                XFREE(p, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16194
                return WOLFSSL_FAILURE;
16195
            }
16196
            cert->pubKeyOID = DSAk;
16197
        }
16198
        break;
16199
#endif /* !HAVE_SELFTEST && (WOLFSSL_KEY_GEN || WOLFSSL_CERT_GEN) && !NO_DSA */
16200
#ifdef HAVE_ECC
16201
    case WC_EVP_PKEY_EC:
16202
        {
16203
            ecc_key* ecc;
16204
16205
            if (pkey->ecc == NULL || pkey->ecc->internal == NULL)
16206
                return WOLFSSL_FAILURE;
16207
16208
            ecc = (ecc_key*)pkey->ecc->internal;
16209
            derSz = wc_EccPublicKeyDerSize(ecc, 1);
16210
            if (derSz <= 0)
16211
                return WOLFSSL_FAILURE;
16212
16213
            p = (byte*)XMALLOC(derSz, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16214
            if (p == NULL)
16215
                return WOLFSSL_FAILURE;
16216
16217
            if ((derSz = wc_EccPublicKeyToDer(ecc, p, (word32)derSz, 1)) <= 0) {
16218
                XFREE(p, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16219
                return WOLFSSL_FAILURE;
16220
            }
16221
            cert->pubKeyOID = ECDSAk;
16222
        }
16223
        break;
16224
#endif
16225
    default:
16226
        return WOLFSSL_FAILURE;
16227
    }
16228
    XFREE(cert->pubKey.buffer, cert->heap, DYNAMIC_TYPE_PUBLIC_KEY);
16229
    cert->pubKey.buffer = p;
16230
    cert->pubKey.length = (unsigned int)derSz;
16231
16232
    return WOLFSSL_SUCCESS;
16233
}
16234
16235
int wolfSSL_X509_set_version(WOLFSSL_X509* x509, long v)
16236
{
16237
    WOLFSSL_ENTER("wolfSSL_X509_set_version");
16238
    if ((x509 == NULL) || (v < 0) || (v >= INT_MAX)) {
16239
        return WOLFSSL_FAILURE;
16240
    }
16241
    x509->version = (int) v + 1;
16242
16243
    return WOLFSSL_SUCCESS;
16244
}
16245
16246
#ifdef WOLFSSL_CERT_EXT
16247
/* Set Subject Key Identifier from raw bytes.
16248
 *
16249
 * x509  - Certificate to modify
16250
 * skid  - Raw SKID bytes
16251
 * skidSz - Size of SKID in bytes
16252
 *
16253
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
16254
 */
16255
int wolfSSL_X509_set_subject_key_id(WOLFSSL_X509* x509,
16256
    const unsigned char* skid, int skidSz)
16257
{
16258
    WOLFSSL_ENTER("wolfSSL_X509_set_subject_key_id");
16259
16260
    if (x509 == NULL || skid == NULL || skidSz <= 0) {
16261
        return WOLFSSL_FAILURE;
16262
    }
16263
16264
    /* Allocate/reallocate memory for subjKeyId */
16265
    if (x509->subjKeyId == NULL || (int)x509->subjKeyIdSz < skidSz) {
16266
        if (x509->subjKeyId != NULL) {
16267
            XFREE(x509->subjKeyId, x509->heap, DYNAMIC_TYPE_X509_EXT);
16268
        }
16269
        x509->subjKeyId = (byte*)XMALLOC((word32)skidSz, x509->heap,
16270
                                          DYNAMIC_TYPE_X509_EXT);
16271
        if (x509->subjKeyId == NULL) {
16272
            return WOLFSSL_FAILURE;
16273
        }
16274
    }
16275
16276
    XMEMCPY(x509->subjKeyId, skid, (word32)skidSz);
16277
    x509->subjKeyIdSz = (word32)skidSz;
16278
    x509->subjKeyIdSet = 1;
16279
16280
    return WOLFSSL_SUCCESS;
16281
}
16282
16283
#ifndef NO_SHA
16284
/* Set Subject Key Identifier by computing SHA-1 hash of the public key.
16285
 *
16286
 * x509 - Certificate to modify (must have public key set)
16287
 *
16288
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
16289
 */
16290
int wolfSSL_X509_set_subject_key_id_ex(WOLFSSL_X509* x509)
16291
{
16292
    byte hash[WC_SHA_DIGEST_SIZE];
16293
    int ret;
16294
16295
    WOLFSSL_ENTER("wolfSSL_X509_set_subject_key_id_ex");
16296
16297
    if (x509 == NULL) {
16298
        return WOLFSSL_FAILURE;
16299
    }
16300
16301
    /* Check if public key has been set */
16302
    if (x509->pubKey.buffer == NULL || x509->pubKey.length == 0) {
16303
        WOLFSSL_MSG("Public key not set");
16304
        return WOLFSSL_FAILURE;
16305
    }
16306
16307
    /* Compute SHA-1 hash of the public key */
16308
    ret = wc_ShaHash(x509->pubKey.buffer, x509->pubKey.length, hash);
16309
    if (ret != 0) {
16310
        WOLFSSL_MSG("wc_ShaHash failed");
16311
        return WOLFSSL_FAILURE;
16312
    }
16313
16314
    return wolfSSL_X509_set_subject_key_id(x509, hash, WC_SHA_DIGEST_SIZE);
16315
}
16316
#endif /* !NO_SHA */
16317
16318
/* Set Authority Key Identifier from raw bytes.
16319
 *
16320
 * x509   - Certificate to modify
16321
 * akid   - Raw AKID bytes
16322
 * akidSz - Size of AKID in bytes
16323
 *
16324
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
16325
 */
16326
int wolfSSL_X509_set_authority_key_id(WOLFSSL_X509* x509,
16327
    const unsigned char* akid, int akidSz)
16328
{
16329
    WOLFSSL_ENTER("wolfSSL_X509_set_authority_key_id");
16330
16331
    if (x509 == NULL || akid == NULL || akidSz <= 0) {
16332
        return WOLFSSL_FAILURE;
16333
    }
16334
16335
    /* Allocate/reallocate memory for authKeyIdSrc */
16336
    if (x509->authKeyIdSrc == NULL || (int)x509->authKeyIdSrcSz < akidSz) {
16337
        if (x509->authKeyIdSrc != NULL) {
16338
            XFREE(x509->authKeyIdSrc, x509->heap, DYNAMIC_TYPE_X509_EXT);
16339
        }
16340
        x509->authKeyIdSrc = (byte*)XMALLOC((word32)akidSz, x509->heap,
16341
                                             DYNAMIC_TYPE_X509_EXT);
16342
        if (x509->authKeyIdSrc == NULL) {
16343
            return WOLFSSL_FAILURE;
16344
        }
16345
    }
16346
16347
    XMEMCPY(x509->authKeyIdSrc, akid, (word32)akidSz);
16348
    x509->authKeyIdSrcSz = (word32)akidSz;
16349
    x509->authKeyId = x509->authKeyIdSrc;
16350
    x509->authKeyIdSz = (word32)akidSz;
16351
    x509->authKeyIdSet = 1;
16352
16353
    return WOLFSSL_SUCCESS;
16354
}
16355
16356
#ifndef NO_SHA
16357
/* Set Authority Key Identifier from issuer certificate.
16358
 * Extracts SKID from issuer (or computes from issuer's public key).
16359
 *
16360
 * x509   - Certificate to modify
16361
 * issuer - Issuer certificate
16362
 *
16363
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
16364
 */
16365
int wolfSSL_X509_set_authority_key_id_ex(WOLFSSL_X509* x509,
16366
    WOLFSSL_X509* issuer)
16367
{
16368
    byte hash[WC_SHA_DIGEST_SIZE];
16369
    int ret;
16370
16371
    WOLFSSL_ENTER("wolfSSL_X509_set_authority_key_id_ex");
16372
16373
    if (x509 == NULL || issuer == NULL) {
16374
        return WOLFSSL_FAILURE;
16375
    }
16376
16377
    /* First try to use issuer's SKID if it's set */
16378
    if (issuer->subjKeyIdSet && issuer->subjKeyId != NULL &&
16379
        issuer->subjKeyIdSz > 0) {
16380
        return wolfSSL_X509_set_authority_key_id(x509, issuer->subjKeyId,
16381
                                                  (int)issuer->subjKeyIdSz);
16382
    }
16383
16384
    /* Otherwise compute from issuer's public key */
16385
    if (issuer->pubKey.buffer == NULL || issuer->pubKey.length == 0) {
16386
        WOLFSSL_MSG("Issuer public key not available");
16387
        return WOLFSSL_FAILURE;
16388
    }
16389
16390
    ret = wc_ShaHash(issuer->pubKey.buffer, issuer->pubKey.length, hash);
16391
    if (ret != 0) {
16392
        WOLFSSL_MSG("wc_ShaHash failed");
16393
        return WOLFSSL_FAILURE;
16394
    }
16395
16396
    return wolfSSL_X509_set_authority_key_id(x509, hash, WC_SHA_DIGEST_SIZE);
16397
}
16398
#endif /* !NO_SHA */
16399
#endif /* WOLFSSL_CERT_EXT */
16400
16401
#ifndef IGNORE_NETSCAPE_CERT_TYPE
16402
/* Set Netscape Certificate Type extension.
16403
 *
16404
 * x509       - Certificate to modify
16405
 * nsCertType - Bitwise OR of NS_SSL_CLIENT, NS_SSL_SERVER, etc.
16406
 *
16407
 * Returns WOLFSSL_SUCCESS or WOLFSSL_FAILURE
16408
 */
16409
int wolfSSL_X509_set_ns_cert_type(WOLFSSL_X509* x509, int nsCertType)
16410
{
16411
    WOLFSSL_ENTER("wolfSSL_X509_set_ns_cert_type");
16412
16413
    if (x509 == NULL) {
16414
        return WOLFSSL_FAILURE;
16415
    }
16416
16417
    x509->nsCertType = (byte)nsCertType;
16418
16419
    return WOLFSSL_SUCCESS;
16420
}
16421
#endif /* !IGNORE_NETSCAPE_CERT_TYPE */
16422
16423
#endif /* (OPENSSL_EXTRA || OPENSSL_EXTRA_X509_SMALL) && WOLFSSL_CERT_GEN */
16424
16425
#if (defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)) &&           \
16426
    defined(WOLFSSL_CERT_GEN) && defined(WOLFSSL_CERT_REQ)
16427
16428
void wolfSSL_X509V3_set_ctx(WOLFSSL_X509V3_CTX* ctx, WOLFSSL_X509* issuer,
16429
        WOLFSSL_X509* subject, WOLFSSL_X509* req, WOLFSSL_X509_CRL* crl,
16430
        int flag)
16431
{
16432
    int ret = WOLFSSL_SUCCESS;
16433
    WOLFSSL_ENTER("wolfSSL_X509V3_set_ctx");
16434
    if (!ctx) {
16435
        ret = WOLFSSL_FAILURE;
16436
        WOLFSSL_MSG("wolfSSL_X509V3_set_ctx() called with null ctx.");
16437
    }
16438
16439
    if (ret == WOLFSSL_SUCCESS && (ctx->x509 != NULL)) {
16440
        ret = WOLFSSL_FAILURE;
16441
        WOLFSSL_MSG("wolfSSL_X509V3_set_ctx() called "
16442
                    "with ctx->x509 already allocated.");
16443
    }
16444
16445
    if (ret == WOLFSSL_SUCCESS) {
16446
        ctx->x509 = wolfSSL_X509_new_ex(
16447
            (issuer && issuer->heap) ? issuer->heap :
16448
            (subject && subject->heap) ? subject->heap :
16449
            (req && req->heap) ? req->heap :
16450
            NULL);
16451
        if (!ctx->x509) {
16452
            ret = WOLFSSL_FAILURE;
16453
            WOLFSSL_MSG("wolfSSL_X509_new_ex() failed "
16454
                        "in wolfSSL_X509V3_set_ctx().");
16455
        }
16456
    }
16457
16458
    /* Set parameters in ctx as long as ret == WOLFSSL_SUCCESS */
16459
    if (ret == WOLFSSL_SUCCESS && issuer)
16460
        ret = wolfSSL_X509_set_issuer_name(ctx->x509, &issuer->issuer);
16461
16462
    if (ret == WOLFSSL_SUCCESS && subject)
16463
        ret = wolfSSL_X509_set_subject_name(ctx->x509, &subject->subject);
16464
16465
    if (ret == WOLFSSL_SUCCESS && req) {
16466
        WOLFSSL_MSG("req not implemented.");
16467
    }
16468
16469
    if (ret == WOLFSSL_SUCCESS && crl) {
16470
        WOLFSSL_MSG("crl not implemented.");
16471
    }
16472
16473
    if (ret == WOLFSSL_SUCCESS && flag) {
16474
        WOLFSSL_MSG("flag not implemented.");
16475
    }
16476
16477
    if (ret != WOLFSSL_SUCCESS) {
16478
        WOLFSSL_MSG("Error setting WOLFSSL_X509V3_CTX parameters.");
16479
    }
16480
}
16481
16482
#ifndef NO_BIO
16483
int wolfSSL_i2d_X509_REQ(WOLFSSL_X509* req, unsigned char** out)
16484
{
16485
    int derSz = 0;
16486
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
16487
    WOLFSSL_BIO* bio = NULL;
16488
    WOLFSSL_ENTER("wolfSSL_i2d_X509_REQ");
16489
16490
    if (req == NULL || out == NULL) {
16491
        return BAD_FUNC_ARG;
16492
    }
16493
16494
    if (!(bio = wolfSSL_BIO_new(wolfSSL_BIO_s_mem()))) {
16495
        return WOLFSSL_FAILURE;
16496
    }
16497
16498
    if (wolfSSL_i2d_X509_REQ_bio(bio, req) != WOLFSSL_SUCCESS) {
16499
        WOLFSSL_MSG("wolfSSL_i2d_X509_REQ_bio error");
16500
        goto cleanup;
16501
    }
16502
16503
    derSz = wolfSSL_BIO_get_len(bio);
16504
16505
    if (*out == NULL) {
16506
        *out = (unsigned char*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_OPENSSL);
16507
        if (!*out) {
16508
            WOLFSSL_MSG("malloc error");
16509
            ret = MEMORY_E;
16510
            goto cleanup;
16511
        }
16512
    }
16513
16514
    if (wolfSSL_BIO_read(bio, *out, derSz) != derSz) {
16515
        WOLFSSL_MSG("wolfSSL_BIO_read error");
16516
        goto cleanup;
16517
    }
16518
16519
    ret = derSz;
16520
cleanup:
16521
    wolfSSL_BIO_free(bio);
16522
16523
    return ret;
16524
}
16525
#endif /* !NO_BIO */
16526
16527
WOLFSSL_X509* wolfSSL_X509_REQ_new(void)
16528
{
16529
    return wolfSSL_X509_new();
16530
}
16531
16532
void wolfSSL_X509_REQ_free(WOLFSSL_X509* req)
16533
{
16534
    wolfSSL_X509_free(req);
16535
}
16536
16537
int wolfSSL_X509_REQ_set_version(WOLFSSL_X509 *x, long version)
16538
{
16539
    WOLFSSL_ENTER("wolfSSL_X509_REQ_set_version");
16540
    if ((x == NULL) || (version < 0) || (version >= INT_MAX)) {
16541
        return WOLFSSL_FAILURE;
16542
    }
16543
    x->version = (int)version;
16544
    return WOLFSSL_SUCCESS;
16545
}
16546
16547
long wolfSSL_X509_REQ_get_version(const WOLFSSL_X509 *req)
16548
{
16549
    WOLFSSL_ENTER("wolfSSL_X509_REQ_get_version");
16550
    if (req == NULL) {
16551
        return 0; /* invalid arg */
16552
    }
16553
    return (long)req->version;
16554
}
16555
16556
int wolfSSL_X509_REQ_sign(WOLFSSL_X509 *req, WOLFSSL_EVP_PKEY *pkey,
16557
                          const WOLFSSL_EVP_MD *md)
16558
{
16559
    int ret;
16560
    WC_DECLARE_VAR(der, byte, 2048, 0);
16561
    int derSz = 2048;
16562
16563
    if (req == NULL || pkey == NULL || md == NULL) {
16564
        WOLFSSL_LEAVE("wolfSSL_X509_REQ_sign", BAD_FUNC_ARG);
16565
        return WOLFSSL_FAILURE;
16566
    }
16567
16568
    WC_ALLOC_VAR_EX(der, byte, derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER,
16569
        return WOLFSSL_FAILURE);
16570
16571
    /* Create a Cert that has the certificate request fields. */
16572
    req->sigOID = wolfSSL_sigTypeFromPKEY((WOLFSSL_EVP_MD*)md, pkey);
16573
    ret = wolfssl_x509_make_der(req, 1, der, &derSz, 0);
16574
    if (ret != WOLFSSL_SUCCESS) {
16575
        WC_FREE_VAR_EX(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
16576
        WOLFSSL_MSG("Unable to make DER for X509");
16577
        WOLFSSL_LEAVE("wolfSSL_X509_REQ_sign", ret);
16578
        return WOLFSSL_FAILURE;
16579
    }
16580
16581
    if (wolfSSL_X509_resign_cert(req, 1, der, 2048, derSz,
16582
            (WOLFSSL_EVP_MD*)md, pkey) <= 0) {
16583
        WC_FREE_VAR_EX(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
16584
        return WOLFSSL_FAILURE;
16585
    }
16586
    WC_FREE_VAR_EX(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
16587
    return WOLFSSL_SUCCESS;
16588
}
16589
16590
int wolfSSL_X509_REQ_sign_ctx(WOLFSSL_X509 *req,
16591
                              WOLFSSL_EVP_MD_CTX* md_ctx)
16592
{
16593
    if (md_ctx && md_ctx->pctx)
16594
        return wolfSSL_X509_REQ_sign(req, md_ctx->pctx->pkey,
16595
                wolfSSL_EVP_MD_CTX_md(md_ctx));
16596
    else
16597
        return WOLFSSL_FAILURE;
16598
}
16599
16600
static int regenX509REQDerBuffer(WOLFSSL_X509* x509)
16601
{
16602
    int derSz = X509_BUFFER_SZ;
16603
    int ret = WC_NO_ERR_TRACE(WOLFSSL_FAILURE);
16604
#ifndef WOLFSSL_SMALL_STACK
16605
    byte der[X509_BUFFER_SZ];
16606
#else
16607
    byte* der;
16608
16609
    der = (byte*)XMALLOC(derSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
16610
    if (!der) {
16611
        WOLFSSL_MSG("malloc failed");
16612
        return WOLFSSL_FAILURE;
16613
    }
16614
#endif
16615
16616
    if (wolfssl_x509_make_der(x509, 1, der, &derSz, 0) == WOLFSSL_SUCCESS) {
16617
        FreeDer(&x509->derCert);
16618
        if (AllocDer(&x509->derCert, (word32)derSz, CERT_TYPE,
16619
                                                             x509->heap) == 0) {
16620
            XMEMCPY(x509->derCert->buffer, der, derSz);
16621
            ret = WOLFSSL_SUCCESS;
16622
        }
16623
        else {
16624
            WOLFSSL_MSG("Failed to allocate DER buffer for X509");
16625
        }
16626
    }
16627
    else {
16628
        WOLFSSL_MSG("Unable to make DER for X509 REQ");
16629
    }
16630
    WC_FREE_VAR_EX(der, NULL, DYNAMIC_TYPE_TMP_BUFFER);
16631
    return ret;
16632
}
16633
16634
int wolfSSL_X509_REQ_add_extensions(WOLFSSL_X509* req,
16635
        WOLF_STACK_OF(WOLFSSL_X509_EXTENSION)* ext_sk)
16636
{
16637
    WOLFSSL_X509_EXTENSION* ext = NULL;
16638
16639
    if (!req || !ext_sk) {
16640
        WOLFSSL_MSG("Bad parameter");
16641
        return WOLFSSL_FAILURE;
16642
    }
16643
16644
    /* It is not an error if the stack is empty. */
16645
    ext = ext_sk->data.ext;
16646
    if (ext == NULL) {
16647
        return WOLFSSL_SUCCESS;
16648
    }
16649
16650
    while (ext_sk) {
16651
        ext = ext_sk->data.ext;
16652
16653
        if (wolfSSL_X509_add_ext(req, ext, -1) != WOLFSSL_SUCCESS) {
16654
            WOLFSSL_MSG("wolfSSL_X509_add_ext error");
16655
            return WOLFSSL_FAILURE;
16656
        }
16657
16658
        ext_sk = ext_sk->next;
16659
    }
16660
16661
    return regenX509REQDerBuffer(req);
16662
}
16663
16664
int wolfSSL_X509_REQ_add1_attr_by_txt(WOLFSSL_X509 *req,
16665
                              const char *attrname, int type,
16666
                              const unsigned char *bytes, int len)
16667
{
16668
    WOLFSSL_ENTER("wolfSSL_X509_REQ_add1_attr_by_txt");
16669
16670
#ifdef HAVE_LIBEST
16671
    if (!req || !attrname || !bytes || type != MBSTRING_ASC) {
16672
        WOLFSSL_MSG("Bad parameter");
16673
        return WOLFSSL_FAILURE;
16674
    }
16675
16676
    if (len < 0) {
16677
        len = (int)XSTRLEN((char*)bytes);
16678
    }
16679
16680
    /* For now just pretend that we support this for libest testing */
16681
    if (len == XSTR_SIZEOF("1.3.6.1.1.1.1.22") &&
16682
            XMEMCMP("1.3.6.1.1.1.1.22", bytes, len) == 0) {
16683
        /* MAC Address */
16684
    }
16685
    else if (len == XSTR_SIZEOF("1.2.840.10045.2.1") &&
16686
            XMEMCMP("1.2.840.10045.2.1", bytes, len) == 0) {
16687
        /* ecPublicKey */
16688
    }
16689
    else if (len == XSTR_SIZEOF("1.2.840.10045.4.3.3") &&
16690
            XMEMCMP("1.2.840.10045.4.3.3", bytes, len) == 0) {
16691
        /* ecdsa-with-SHA384 */
16692
    }
16693
    else {
16694
        return WOLFSSL_FAILURE;
16695
    }
16696
16697
    /* return error if not built for libest */
16698
    return WOLFSSL_SUCCESS;
16699
#else
16700
    (void)req;
16701
    (void)attrname;
16702
    (void)type;
16703
    (void)bytes;
16704
    (void)len;
16705
    return WOLFSSL_FAILURE;
16706
#endif
16707
}
16708
16709
16710
static int wolfSSL_X509_ATTRIBUTE_set(WOLFSSL_X509_ATTRIBUTE* attr,
16711
        const char* data, int dataSz, int type, int nid)
16712
{
16713
    if (attr) {
16714
        attr->value->value.asn1_string = wolfSSL_ASN1_STRING_new();
16715
        if (wolfSSL_ASN1_STRING_set(attr->value->value.asn1_string,
16716
                data, dataSz) != WOLFSSL_SUCCESS) {
16717
            wolfSSL_ASN1_STRING_free(attr->value->value.asn1_string);
16718
            WOLFSSL_MSG("wolfSSL_ASN1_STRING_set error");
16719
            return WOLFSSL_FAILURE;
16720
        }
16721
        attr->value->type = type;
16722
        attr->object->nid = nid;
16723
    }
16724
    else {
16725
        WOLFSSL_MSG("wolfSSL_X509_ATTRIBUTE_new error");
16726
        return WOLFSSL_FAILURE;
16727
    }
16728
16729
    return WOLFSSL_SUCCESS;
16730
}
16731
16732
16733
int wolfSSL_X509_REQ_add1_attr_by_NID(WOLFSSL_X509 *req,
16734
                                      int nid, int type,
16735
                                      const unsigned char *bytes,
16736
                                      int len)
16737
{
16738
    int ret;
16739
    WOLFSSL_X509_ATTRIBUTE* attr;
16740
16741
    WOLFSSL_ENTER("wolfSSL_X509_REQ_add1_attr_by_NID");
16742
16743
    if (!req || !bytes || type != WOLFSSL_MBSTRING_ASC) {
16744
        WOLFSSL_MSG("Bad parameter");
16745
        return WOLFSSL_FAILURE;
16746
    }
16747
16748
    switch (nid) {
16749
    case WC_NID_pkcs9_challengePassword:
16750
        if (len < 0)
16751
            len = (int)XSTRLEN((char*)bytes);
16752
        if (len < CTC_NAME_SIZE) {
16753
            XMEMCPY(req->challengePw, bytes, len);
16754
            req->challengePw[len] = '\0';
16755
        }
16756
        else {
16757
            WOLFSSL_MSG("Challenge password too long");
16758
            WOLFSSL_ERROR_VERBOSE(BUFFER_E);
16759
            return WOLFSSL_FAILURE;
16760
        }
16761
        break;
16762
    case WC_NID_serialNumber:
16763
        if (len < 0)
16764
            len = (int)XSTRLEN((char*)bytes);
16765
        if (len + 1 > EXTERNAL_SERIAL_SIZE) {
16766
            WOLFSSL_MSG("SerialNumber too long");
16767
            WOLFSSL_ERROR_VERBOSE(BUFFER_E);
16768
            return WOLFSSL_FAILURE;
16769
        }
16770
        XMEMCPY(req->serial, bytes, len);
16771
        req->serialSz = len;
16772
        break;
16773
16774
    case WC_NID_pkcs9_unstructuredName:
16775
    case WC_NID_pkcs9_contentType:
16776
    case WC_NID_surname:
16777
    case WC_NID_initials:
16778
    case WC_NID_givenName:
16779
    case WC_NID_dnQualifier:
16780
        break;
16781
16782
    default:
16783
        WOLFSSL_MSG("Unsupported attribute");
16784
        return WOLFSSL_FAILURE;
16785
    }
16786
16787
    attr = wolfSSL_X509_ATTRIBUTE_new();
16788
    ret = wolfSSL_X509_ATTRIBUTE_set(attr, (const char*)bytes, len,
16789
            WOLFSSL_V_ASN1_PRINTABLESTRING, nid);
16790
    if (ret != WOLFSSL_SUCCESS) {
16791
        wolfSSL_X509_ATTRIBUTE_free(attr);
16792
    }
16793
    else {
16794
        if (req->reqAttributes == NULL) {
16795
            req->reqAttributes = wolfSSL_sk_new_node(req->heap);
16796
            if (req->reqAttributes != NULL) {
16797
                req->reqAttributes->type = STACK_TYPE_X509_REQ_ATTR;
16798
            }
16799
        }
16800
        if ((req->reqAttributes != NULL) &&
16801
                (req->reqAttributes->type == STACK_TYPE_X509_REQ_ATTR)) {
16802
            /* Using wolfSSL_sk_insert to maintain backwards compatibility with
16803
             * earlier versions of _push API that pushed items to the start of
16804
             * the list instead of the end. */
16805
            ret = wolfSSL_sk_insert(req->reqAttributes, attr, 0) > 0
16806
                    ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
16807
        }
16808
        else {
16809
            ret = WOLFSSL_FAILURE;
16810
        }
16811
        if (ret != WOLFSSL_SUCCESS)
16812
            wolfSSL_X509_ATTRIBUTE_free(attr);
16813
    }
16814
16815
    return ret;
16816
}
16817
16818
WOLFSSL_X509 *wolfSSL_X509_to_X509_REQ(WOLFSSL_X509 *x,
16819
        WOLFSSL_EVP_PKEY *pkey, const WOLFSSL_EVP_MD *md)
16820
{
16821
    WOLFSSL_ENTER("wolfSSL_X509_to_X509_REQ");
16822
    (void)pkey;
16823
    (void)md;
16824
    return wolfSSL_X509_dup(x);
16825
}
16826
16827
int wolfSSL_X509_REQ_set_subject_name(WOLFSSL_X509 *req,
16828
                                      WOLFSSL_X509_NAME *name)
16829
{
16830
    return wolfSSL_X509_set_subject_name(req, name);
16831
}
16832
16833
int wolfSSL_X509_REQ_set_pubkey(WOLFSSL_X509 *req, WOLFSSL_EVP_PKEY *pkey)
16834
{
16835
    return wolfSSL_X509_set_pubkey(req, pkey);
16836
}
16837
#endif /* OPENSSL_ALL && WOLFSSL_CERT_GEN && WOLFSSL_CERT_REQ */
16838
16839
#if (defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA)) && \
16840
    (defined(WOLFSSL_CERT_GEN) || defined(WOLFSSL_CERT_REQ))
16841
16842
WOLFSSL_ASN1_TYPE *wolfSSL_X509_ATTRIBUTE_get0_type(
16843
        WOLFSSL_X509_ATTRIBUTE *attr, int idx)
16844
{
16845
    WOLFSSL_ENTER("wolfSSL_X509_ATTRIBUTE_get0_type");
16846
16847
    if (!attr || idx != 0) {
16848
        WOLFSSL_MSG("Bad parameter");
16849
        return NULL;
16850
    }
16851
16852
    return attr->value;
16853
}
16854
16855
16856
/**
16857
 * @param req X509_REQ containing attribute
16858
 * @return the number of attributes
16859
 */
16860
int wolfSSL_X509_REQ_get_attr_count(const WOLFSSL_X509 *req)
16861
{
16862
    if (req == NULL || req->reqAttributes == NULL)
16863
        return 0;
16864
16865
    return wolfSSL_sk_num(req->reqAttributes);
16866
}
16867
16868
16869
/**
16870
 * @param req X509_REQ containing attribute
16871
 * @param loc NID of the attribute to return
16872
 */
16873
WOLFSSL_X509_ATTRIBUTE *wolfSSL_X509_REQ_get_attr(
16874
        const WOLFSSL_X509 *req, int loc)
16875
{
16876
    WOLFSSL_ENTER("wolfSSL_X509_REQ_get_attr");
16877
16878
    if (!req || req->reqAttributes == NULL) {
16879
        WOLFSSL_MSG("Bad parameter");
16880
        return NULL;
16881
    }
16882
16883
    return (WOLFSSL_X509_ATTRIBUTE*)wolfSSL_sk_value(req->reqAttributes, loc);
16884
}
16885
16886
/* Return NID as the attr index */
16887
int wolfSSL_X509_REQ_get_attr_by_NID(const WOLFSSL_X509 *req,
16888
        int nid, int lastpos)
16889
{
16890
    int idx;
16891
16892
    WOLFSSL_ENTER("wolfSSL_X509_REQ_get_attr_by_NID");
16893
16894
    if (!req) {
16895
        WOLFSSL_MSG("Bad parameter");
16896
        return WOLFSSL_FATAL_ERROR;
16897
    }
16898
16899
    /* search through stack for first matching nid */
16900
    for (idx = lastpos + 1; idx < wolfSSL_sk_num(req->reqAttributes); idx++) {
16901
        WOLFSSL_X509_ATTRIBUTE* attr =
16902
             (WOLFSSL_X509_ATTRIBUTE*)wolfSSL_sk_value(req->reqAttributes, idx);
16903
        if (attr != NULL && attr->object != NULL && attr->object->nid == nid)
16904
            return idx;
16905
    }
16906
16907
    return WOLFSSL_FATAL_ERROR;
16908
}
16909
16910
WOLFSSL_X509_ATTRIBUTE* wolfSSL_X509_ATTRIBUTE_new(void)
16911
{
16912
    WOLFSSL_X509_ATTRIBUTE* ret;
16913
    WOLFSSL_ENTER("wolfSSL_X509_ATTRIBUTE_new");
16914
    ret = (WOLFSSL_X509_ATTRIBUTE*)XMALLOC(sizeof(WOLFSSL_X509_ATTRIBUTE),
16915
            NULL, DYNAMIC_TYPE_OPENSSL);
16916
    if (!ret) {
16917
        WOLFSSL_MSG("malloc error");
16918
        return NULL;
16919
    }
16920
    XMEMSET(ret, 0, sizeof(WOLFSSL_X509_ATTRIBUTE));
16921
    ret->object = wolfSSL_ASN1_OBJECT_new();
16922
    ret->value = wolfSSL_ASN1_TYPE_new();
16923
    /* Don't allocate ret->set since WOLFSSL_ASN1_TYPE
16924
     * is not supported as a stack type */
16925
    if (!ret->object || !ret->value) {
16926
        WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new or wolfSSL_ASN1_TYPE_new error");
16927
        wolfSSL_X509_ATTRIBUTE_free(ret);
16928
        return NULL;
16929
    }
16930
    return ret;
16931
}
16932
16933
void wolfSSL_X509_ATTRIBUTE_free(WOLFSSL_X509_ATTRIBUTE* attr)
16934
{
16935
    WOLFSSL_ENTER("wolfSSL_X509_ATTRIBUTE_free");
16936
    if (attr) {
16937
        if (attr->object) {
16938
            wolfSSL_ASN1_OBJECT_free(attr->object);
16939
        }
16940
        if (attr->value) {
16941
            wolfSSL_ASN1_TYPE_free(attr->value);
16942
        }
16943
        if (attr->set) {
16944
            wolfSSL_sk_pop_free(attr->set, NULL);
16945
        }
16946
        XFREE(attr, NULL, DYNAMIC_TYPE_OPENSSL);
16947
    }
16948
}
16949
#endif /* (OPENSSL_ALL || OPENSSL_EXTRA) &&
16950
          (WOLFSSL_CERT_GEN || WOLFSSL_CERT_REQ) */
16951
16952
#if defined(WOLFSSL_ACERT) && \
16953
   (defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_EXTRA))
16954
16955
/* Allocate and return a new WOLFSSL_X509_ACERT struct pointer.
16956
 *
16957
 * @param [in]      heap        heap hint
16958
 *
16959
 * @return  pointer  on success
16960
 * @return  NULL     on error
16961
 * */
16962
WOLFSSL_X509_ACERT * wolfSSL_X509_ACERT_new_ex(void* heap)
16963
{
16964
    WOLFSSL_X509_ACERT * x509 = NULL;
16965
16966
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_new");
16967
16968
    x509 = (WOLFSSL_X509_ACERT*) XMALLOC(sizeof(WOLFSSL_X509_ACERT), heap,
16969
                                         DYNAMIC_TYPE_X509_ACERT);
16970
16971
    if (x509 != NULL) {
16972
        wolfSSL_X509_ACERT_init(x509, 1, heap);
16973
    }
16974
16975
    return x509;
16976
}
16977
16978
WOLFSSL_X509_ACERT * wolfSSL_X509_ACERT_new(void)
16979
{
16980
    return wolfSSL_X509_ACERT_new_ex(NULL);
16981
}
16982
16983
/* Initialize a WOLFSSL_X509_ACERT struct.
16984
 *
16985
 * If dynamic == 1, then the x509 pointer will be freed
16986
 * in wolfSSL_X509_ACERT_free.
16987
 *
16988
 * @param [in]      x509        x509 acert pointer
16989
 * @param [in]      dynamic     dynamic mem flag
16990
 * @param [in]      heap        heap hint
16991
 *
16992
 * @return  void
16993
 * */
16994
void wolfSSL_X509_ACERT_init(WOLFSSL_X509_ACERT * x509, int dynamic, void* heap)
16995
{
16996
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_init");
16997
16998
    if (x509 == NULL) {
16999
        WOLFSSL_MSG("error: InitX509Acert: null parameter");
17000
        return;
17001
    }
17002
17003
    XMEMSET(x509, 0, sizeof(*x509));
17004
17005
    x509->heap = heap;
17006
    x509->dynamic = dynamic;
17007
}
17008
17009
/* Free a WOLFSSL_X509_ACERT struct and its sub-fields.
17010
 *
17011
 * If this ACERT was initialized with dynamic == 1, then
17012
 * the x509 pointer itself will be freed as well.
17013
 *
17014
 * @param [in]      x509        x509 acert pointer
17015
 *
17016
 * @return  void
17017
 * */
17018
void wolfSSL_X509_ACERT_free(WOLFSSL_X509_ACERT * x509)
17019
{
17020
    int    dynamic = 0;
17021
    void * heap = NULL;
17022
17023
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_free");
17024
17025
    if (x509 == NULL) {
17026
        WOLFSSL_MSG("error: wolfSSL_X509_ACERT_free: null parameter");
17027
        return;
17028
    }
17029
17030
    dynamic = x509->dynamic;
17031
    heap = x509->heap;
17032
17033
    /* Free holder and att cert issuer structures. */
17034
    if (x509->holderIssuerName) {
17035
        FreeAltNames(x509->holderIssuerName, heap);
17036
        x509->holderIssuerName = NULL;
17037
    }
17038
17039
    if (x509->holderEntityName) {
17040
        FreeAltNames(x509->holderEntityName, heap);
17041
        x509->holderEntityName = NULL;
17042
    }
17043
17044
    if (x509->AttCertIssuerName) {
17045
        FreeAltNames(x509->AttCertIssuerName, heap);
17046
        x509->AttCertIssuerName = NULL;
17047
    }
17048
17049
    if (x509->rawAttr != NULL) {
17050
        XFREE(x509->rawAttr, heap, DYNAMIC_TYPE_X509_EXT);
17051
        x509->rawAttr = NULL;
17052
        x509->rawAttrLen = 0;
17053
    }
17054
17055
    /* Free derCert source and signature buffer. */
17056
    FreeDer(&x509->derCert);
17057
17058
    if (x509->sig.buffer != NULL) {
17059
        XFREE(x509->sig.buffer, heap, DYNAMIC_TYPE_SIGNATURE);
17060
        x509->sig.buffer = NULL;
17061
    }
17062
17063
    /* Finally memset and free x509 acert structure. */
17064
    XMEMSET(x509, 0, sizeof(*x509));
17065
17066
    if (dynamic == 1) {
17067
        XFREE(x509, heap, DYNAMIC_TYPE_X509_ACERT);
17068
    }
17069
17070
    return;
17071
}
17072
17073
#if defined(OPENSSL_EXTRA)
17074
long wolfSSL_X509_ACERT_get_version(const WOLFSSL_X509_ACERT* x509)
17075
{
17076
    int version = 0;
17077
17078
    if (x509 == NULL) {
17079
        return 0L;
17080
    }
17081
17082
    version = x509->version;
17083
17084
    return version != 0 ? (long)version - 1L : 0L;
17085
}
17086
#endif /* OPENSSL_EXTRA */
17087
17088
int wolfSSL_X509_ACERT_version(WOLFSSL_X509_ACERT* x509)
17089
{
17090
    if (x509 == NULL) {
17091
        return 0;
17092
    }
17093
17094
    return x509->version;
17095
}
17096
17097
/* Retrieve the serial number from an ACERT.
17098
 *
17099
 * @param [in]       x509    the x509 attribute certificate
17100
 * @param [in, out]  buf     the serial number buffer pointer
17101
 * @param [in, out]  bufSz   the serial number buffer size pointer
17102
 *
17103
 * buf may be null, but bufSz is required. On success, sets
17104
 * bufSz pointer to signature length, and copies signature
17105
 * to buf if provided.
17106
 *
17107
 * Returns  WWOLFSSL_FATAL_ERROR if bufSz is null or too small.
17108
 * Returns  WOLFSSL_SUCCESS on success.
17109
 */
17110
int wolfSSL_X509_ACERT_get_serial_number(WOLFSSL_X509_ACERT* x509,
17111
                                         byte* buf, int* bufSz)
17112
{
17113
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_get_serial_number");
17114
17115
    if (x509 == NULL || bufSz == NULL) {
17116
        WOLFSSL_MSG("error: null argument passed in");
17117
        return BAD_FUNC_ARG;
17118
    }
17119
17120
    if (buf != NULL) {
17121
        if (*bufSz < x509->serialSz) {
17122
            WOLFSSL_MSG("error: serial buffer too small");
17123
            return BUFFER_E;
17124
        }
17125
17126
        XMEMCPY(buf, x509->serial, x509->serialSz);
17127
    }
17128
17129
    *bufSz = x509->serialSz;
17130
17131
    return WOLFSSL_SUCCESS;
17132
}
17133
17134
/* Sets buf pointer and len to raw Attribute buffer and buffer len
17135
 * in X509 struct.
17136
 *
17137
 * Returns WOLFSSL_SUCCESS on success.
17138
 * Returns BAD_FUNC_ARG if input pointers are null.
17139
 * */
17140
int wolfSSL_X509_ACERT_get_attr_buf(const WOLFSSL_X509_ACERT* x509,
17141
                                                const byte ** rawAttr,
17142
                                                word32 * rawAttrLen)
17143
{
17144
    if (x509 == NULL || rawAttr == NULL || rawAttrLen == NULL) {
17145
        return BAD_FUNC_ARG;
17146
    }
17147
17148
    *rawAttr = x509->rawAttr;
17149
    *rawAttrLen = x509->rawAttrLen;
17150
17151
    return WOLFSSL_SUCCESS;
17152
}
17153
17154
#ifndef NO_WOLFSSL_STUB
17155
int wolfSSL_X509_ACERT_sign(WOLFSSL_X509_ACERT * x509,
17156
                                        WOLFSSL_EVP_PKEY * pkey,
17157
                                        const WOLFSSL_EVP_MD * md)
17158
{
17159
    WOLFSSL_STUB("X509_ACERT_sign");
17160
    (void) x509;
17161
    (void) pkey;
17162
    (void) md;
17163
    return WOLFSSL_NOT_IMPLEMENTED;
17164
}
17165
#endif /* NO_WOLFSSL_STUB */
17166
17167
/* Helper function for ACERT_verify.
17168
 *
17169
 * @param [in]       x509    the x509 attribute certificate
17170
 * @param [in, out]  outSz   the x509 der length
17171
 *
17172
 * @return  der buffer on success
17173
 * @return  NULL on error
17174
 * */
17175
static const byte* acert_get_der(WOLFSSL_X509_ACERT * x509, int* outSz)
17176
{
17177
    if (x509 == NULL || x509->derCert == NULL || outSz == NULL) {
17178
        return NULL;
17179
    }
17180
17181
    *outSz = (int)x509->derCert->length;
17182
    return x509->derCert->buffer;
17183
}
17184
17185
/* Given an X509_ACERT and EVP_PKEY, verify the acert's signature.
17186
 *
17187
 * @param [in]    x509    the x509 attribute certificate
17188
 * @param [in]    pkey    the evp_pkey
17189
 *
17190
 * @return  WOLFSSL_SUCCESS on verify success
17191
 * @return  < 0 on error
17192
 * */
17193
int wolfSSL_X509_ACERT_verify(WOLFSSL_X509_ACERT* x509, WOLFSSL_EVP_PKEY* pkey)
17194
{
17195
    int          ret = 0;
17196
    const byte * der = NULL;
17197
    int          derSz = 0;
17198
    int          pkey_type;
17199
17200
    if (x509 == NULL || pkey == NULL) {
17201
        WOLFSSL_MSG("error: wolfSSL_X509_ACERT_verify: bad arg");
17202
        return WOLFSSL_FATAL_ERROR;
17203
    }
17204
17205
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_verify");
17206
17207
    der = acert_get_der(x509, &derSz);
17208
17209
    if (der == NULL || derSz <= 0) {
17210
        WOLFSSL_MSG("error: wolfSSL_X509_ACERT_verify: get der failed");
17211
        return WOLFSSL_FATAL_ERROR;
17212
    }
17213
17214
    switch (pkey->type) {
17215
    case WC_EVP_PKEY_RSA:
17216
        pkey_type = RSAk;
17217
        break;
17218
17219
    case WC_EVP_PKEY_EC:
17220
        pkey_type = ECDSAk;
17221
        break;
17222
17223
    case WC_EVP_PKEY_DSA:
17224
        pkey_type = DSAk;
17225
        break;
17226
17227
    default:
17228
        WOLFSSL_MSG("error: wolfSSL_X509_ACERT_verify: unknown pkey type");
17229
        return WOLFSSL_FATAL_ERROR;
17230
    }
17231
17232
17233
    ret = VerifyX509Acert(der, (word32)derSz,
17234
                          (const byte *)pkey->pkey.ptr, pkey->pkey_sz,
17235
                          pkey_type, x509->heap);
17236
17237
    return ret == 0 ? WOLFSSL_SUCCESS : WOLFSSL_FAILURE;
17238
}
17239
17240
/* Loads an x509 attribute certificate from buffer, and returns
17241
 * pointer to new WOLFSSL_X509_ACERT struct on success.
17242
 *
17243
 * @param [in]  buf    The acert buffer to load.
17244
 * @param [in]  sz     The size of the buffer.
17245
 * @param [in]  format The format of the buffer data.
17246
 * @param [in]  heap   Dynamic memory allocation hint.
17247
 *
17248
 * @return  pointer to WOLFSSL_X509_ACERT on success.
17249
 * @return  NULL on error.
17250
 * */
17251
WOLFSSL_X509_ACERT * wolfSSL_X509_ACERT_load_certificate_buffer_ex(
17252
    const unsigned char* buf, int sz, int format, void * heap)
17253
{
17254
    int                  ret = 0;
17255
    WOLFSSL_X509_ACERT * x509 = NULL;
17256
    DerBuffer *          der = NULL;
17257
    WC_DECLARE_VAR(acert, DecodedAcert, 1, 0);
17258
17259
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_load_certificate_buffer");
17260
17261
    if (format == WOLFSSL_FILETYPE_PEM) {
17262
    #ifdef WOLFSSL_PEM_TO_DER
17263
        ret = PemToDer(buf, sz, ACERT_TYPE, &der, heap, NULL, NULL);
17264
17265
        if (ret != 0 || der == NULL || der->buffer == NULL) {
17266
            WOLFSSL_ERROR(ret);
17267
17268
            if (der != NULL) {
17269
                FreeDer(&der);
17270
            }
17271
17272
            return NULL;
17273
        }
17274
    #else
17275
        WOLFSSL_ERROR(NOT_COMPILED_IN);
17276
        return NULL;
17277
    #endif
17278
    }
17279
    else {
17280
        ret = AllocDer(&der, (word32)sz, ACERT_TYPE, heap);
17281
17282
        if (ret != 0 || der == NULL || der->buffer == NULL) {
17283
            WOLFSSL_ERROR(ret);
17284
            return NULL;
17285
        }
17286
17287
        XMEMCPY(der->buffer, buf, sz);
17288
    }
17289
17290
    #ifdef WOLFSSL_SMALL_STACK
17291
    acert = (DecodedAcert*)XMALLOC(sizeof(DecodedAcert), heap,
17292
                                   DYNAMIC_TYPE_DCERT);
17293
    if (acert == NULL) {
17294
        WOLFSSL_ERROR(MEMORY_ERROR);
17295
        FreeDer(&der);
17296
        return NULL;
17297
    }
17298
    #endif
17299
17300
    InitDecodedAcert(acert, der->buffer, der->length, heap);
17301
17302
    ret = ParseX509Acert(acert, VERIFY_SKIP_DATE);
17303
17304
    if (ret == 0) {
17305
        x509 = wolfSSL_X509_ACERT_new_ex(heap);
17306
17307
        if (x509 != NULL) {
17308
            ret = CopyDecodedAcertToX509(x509, acert);
17309
17310
            if (ret != 0) {
17311
                wolfSSL_X509_ACERT_free(x509);
17312
                x509 = NULL;
17313
            }
17314
        }
17315
        else {
17316
            ret = MEMORY_ERROR;
17317
        }
17318
    }
17319
17320
    FreeDecodedAcert(acert);
17321
17322
    WC_FREE_VAR_EX(acert, heap, DYNAMIC_TYPE_DCERT);
17323
17324
    FreeDer(&der);
17325
17326
    if (ret != 0) {
17327
        WOLFSSL_ERROR(ret);
17328
    }
17329
17330
    return x509;
17331
}
17332
17333
WOLFSSL_X509_ACERT * wolfSSL_X509_ACERT_load_certificate_buffer(
17334
    const unsigned char* buf, int sz, int format)
17335
{
17336
    return wolfSSL_X509_ACERT_load_certificate_buffer_ex(buf, sz, format, NULL);
17337
}
17338
17339
/* Retrieve the signature from an ACERT.
17340
 *
17341
 * @param [in]       x509    the x509 attribute certificate
17342
 * @param [in, out]  buf     the signature buffer pointer
17343
 * @param [in, out]  bufSz   the signature buffer size pointer
17344
 *
17345
 * buf may be null, but bufSz is required. On success, sets
17346
 * bufSz pointer to signature length, and copies signature
17347
 * to buf if provided.
17348
 *
17349
 * Returns  WWOLFSSL_FATAL_ERROR if bufSz is null or too small.
17350
 * Returns  WOLFSSL_SUCCESS on success.
17351
 */
17352
int wolfSSL_X509_ACERT_get_signature(WOLFSSL_X509_ACERT* x509,
17353
                                     unsigned char* buf, int* bufSz)
17354
{
17355
    WOLFSSL_ENTER("wolfSSL_X509_ACERT_get_signature");
17356
17357
    if (x509 == NULL || bufSz == NULL) {
17358
        return WOLFSSL_FATAL_ERROR;
17359
    }
17360
17361
    /* If buf array is provided, it must be long enough. */
17362
    if (buf != NULL && *bufSz < (int)x509->sig.length) {
17363
        return WOLFSSL_FATAL_ERROR;
17364
    }
17365
17366
    if (buf != NULL) {
17367
        /* Copy in buffer if provided. */
17368
        XMEMCPY(buf, x509->sig.buffer, x509->sig.length);
17369
    }
17370
17371
    *bufSz = (int)x509->sig.length;
17372
17373
    return WOLFSSL_SUCCESS;
17374
}
17375
#endif /* WOLFSSL_ACERT && (OPENSSL_EXTRA_X509_SMALL || OPENSSL_EXTRA) */
17376
17377
#endif /* !NO_CERTS */
17378
17379
#endif /* !WOLFCRYPT_ONLY */
17380
17381
#endif /* WOLFSSL_X509_INCLUDED */