godot/thirdparty/openssl/crypto/store/str_lib.c

1773 lines
54 KiB
C

/* crypto/store/str_lib.c */
/*
* Written by Richard Levitte (richard@levitte.org) for the OpenSSL project
* 2003.
*/
/* ====================================================================
* Copyright (c) 2003 The OpenSSL Project. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
* 3. All advertising materials mentioning features or use of this
* software must display the following acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
*
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
* endorse or promote products derived from this software without
* prior written permission. For written permission, please contact
* openssl-core@openssl.org.
*
* 5. Products derived from this software may not be called "OpenSSL"
* nor may "OpenSSL" appear in their names without prior written
* permission of the OpenSSL Project.
*
* 6. Redistributions of any form whatsoever must retain the following
* acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
*
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
* OF THE POSSIBILITY OF SUCH DAMAGE.
* ====================================================================
*
* This product includes cryptographic software written by Eric Young
* (eay@cryptsoft.com). This product includes software written by Tim
* Hudson (tjh@cryptsoft.com).
*
*/
#include <string.h>
#include <openssl/bn.h>
#include <openssl/err.h>
#ifndef OPENSSL_NO_ENGINE
# include <openssl/engine.h>
#endif
#include <openssl/sha.h>
#include <openssl/x509.h>
#include "str_locl.h"
const char *const STORE_object_type_string[STORE_OBJECT_TYPE_NUM + 1] = {
0,
"X.509 Certificate",
"X.509 CRL",
"Private Key",
"Public Key",
"Number",
"Arbitrary Data"
};
const int STORE_param_sizes[STORE_PARAM_TYPE_NUM + 1] = {
0,
sizeof(int), /* EVP_TYPE */
sizeof(size_t), /* BITS */
-1, /* KEY_PARAMETERS */
0 /* KEY_NO_PARAMETERS */
};
const int STORE_attr_sizes[STORE_ATTR_TYPE_NUM + 1] = {
0,
-1, /* FRIENDLYNAME: C string */
SHA_DIGEST_LENGTH, /* KEYID: SHA1 digest, 160 bits */
SHA_DIGEST_LENGTH, /* ISSUERKEYID: SHA1 digest, 160 bits */
SHA_DIGEST_LENGTH, /* SUBJECTKEYID: SHA1 digest, 160 bits */
SHA_DIGEST_LENGTH, /* ISSUERSERIALHASH: SHA1 digest, 160 bits */
sizeof(X509_NAME *), /* ISSUER: X509_NAME * */
sizeof(BIGNUM *), /* SERIAL: BIGNUM * */
sizeof(X509_NAME *), /* SUBJECT: X509_NAME * */
SHA_DIGEST_LENGTH, /* CERTHASH: SHA1 digest, 160 bits */
-1, /* EMAIL: C string */
-1, /* FILENAME: C string */
};
STORE *STORE_new_method(const STORE_METHOD *method)
{
STORE *ret;
if (method == NULL) {
STOREerr(STORE_F_STORE_NEW_METHOD, ERR_R_PASSED_NULL_PARAMETER);
return NULL;
}
ret = (STORE *)OPENSSL_malloc(sizeof(STORE));
if (ret == NULL) {
STOREerr(STORE_F_STORE_NEW_METHOD, ERR_R_MALLOC_FAILURE);
return NULL;
}
ret->meth = method;
CRYPTO_new_ex_data(CRYPTO_EX_INDEX_STORE, ret, &ret->ex_data);
if (ret->meth->init && !ret->meth->init(ret)) {
STORE_free(ret);
ret = NULL;
}
return ret;
}
STORE *STORE_new_engine(ENGINE *engine)
{
STORE *ret = NULL;
ENGINE *e = engine;
const STORE_METHOD *meth = 0;
#ifdef OPENSSL_NO_ENGINE
e = NULL;
#else
if (engine) {
if (!ENGINE_init(engine)) {
STOREerr(STORE_F_STORE_NEW_ENGINE, ERR_R_ENGINE_LIB);
return NULL;
}
e = engine;
} else {
STOREerr(STORE_F_STORE_NEW_ENGINE, ERR_R_PASSED_NULL_PARAMETER);
return NULL;
}
if (e) {
meth = ENGINE_get_STORE(e);
if (!meth) {
STOREerr(STORE_F_STORE_NEW_ENGINE, ERR_R_ENGINE_LIB);
ENGINE_finish(e);
return NULL;
}
}
#endif
ret = STORE_new_method(meth);
if (ret == NULL) {
STOREerr(STORE_F_STORE_NEW_ENGINE, ERR_R_STORE_LIB);
return NULL;
}
ret->engine = e;
return (ret);
}
void STORE_free(STORE *store)
{
if (store == NULL)
return;
if (store->meth->clean)
store->meth->clean(store);
CRYPTO_free_ex_data(CRYPTO_EX_INDEX_STORE, store, &store->ex_data);
OPENSSL_free(store);
}
int STORE_ctrl(STORE *store, int cmd, long i, void *p, void (*f) (void))
{
if (store == NULL) {
STOREerr(STORE_F_STORE_CTRL, ERR_R_PASSED_NULL_PARAMETER);
return 0;
}
if (store->meth->ctrl)
return store->meth->ctrl(store, cmd, i, p, f);
STOREerr(STORE_F_STORE_CTRL, STORE_R_NO_CONTROL_FUNCTION);
return 0;
}
int STORE_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func,
CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func)
{
return CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_STORE, argl, argp,
new_func, dup_func, free_func);
}
int STORE_set_ex_data(STORE *r, int idx, void *arg)
{
return (CRYPTO_set_ex_data(&r->ex_data, idx, arg));
}
void *STORE_get_ex_data(STORE *r, int idx)
{
return (CRYPTO_get_ex_data(&r->ex_data, idx));
}
const STORE_METHOD *STORE_get_method(STORE *store)
{
return store->meth;
}
const STORE_METHOD *STORE_set_method(STORE *store, const STORE_METHOD *meth)
{
store->meth = meth;
return store->meth;
}
/* API helpers */
#define check_store(s,fncode,fnname,fnerrcode) \
do \
{ \
if ((s) == NULL || (s)->meth == NULL) \
{ \
STOREerr((fncode), ERR_R_PASSED_NULL_PARAMETER); \
return 0; \
} \
if ((s)->meth->fnname == NULL) \
{ \
STOREerr((fncode), (fnerrcode)); \
return 0; \
} \
} \
while(0)
/* API functions */
X509 *STORE_get_certificate(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
STORE_OBJECT *object;
X509 *x;
check_store(s, STORE_F_STORE_GET_CERTIFICATE,
get_object, STORE_R_NO_GET_OBJECT_FUNCTION);
object = s->meth->get_object(s, STORE_OBJECT_TYPE_X509_CERTIFICATE,
attributes, parameters);
if (!object || !object->data.x509.certificate) {
STOREerr(STORE_F_STORE_GET_CERTIFICATE,
STORE_R_FAILED_GETTING_CERTIFICATE);
return 0;
}
CRYPTO_add(&object->data.x509.certificate->references, 1,
CRYPTO_LOCK_X509);
#ifdef REF_PRINT
REF_PRINT("X509", data);
#endif
x = object->data.x509.certificate;
STORE_OBJECT_free(object);
return x;
}
int STORE_store_certificate(STORE *s, X509 *data, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
STORE_OBJECT *object;
int i;
check_store(s, STORE_F_STORE_CERTIFICATE,
store_object, STORE_R_NO_STORE_OBJECT_FUNCTION);
object = STORE_OBJECT_new();
if (!object) {
STOREerr(STORE_F_STORE_STORE_CERTIFICATE, ERR_R_MALLOC_FAILURE);
return 0;
}
CRYPTO_add(&data->references, 1, CRYPTO_LOCK_X509);
#ifdef REF_PRINT
REF_PRINT("X509", data);
#endif
object->data.x509.certificate = data;
i = s->meth->store_object(s, STORE_OBJECT_TYPE_X509_CERTIFICATE,
object, attributes, parameters);
STORE_OBJECT_free(object);
if (!i) {
STOREerr(STORE_F_STORE_STORE_CERTIFICATE,
STORE_R_FAILED_STORING_CERTIFICATE);
return 0;
}
return 1;
}
int STORE_modify_certificate(STORE *s, OPENSSL_ITEM search_attributes[],
OPENSSL_ITEM add_attributes[],
OPENSSL_ITEM modify_attributes[],
OPENSSL_ITEM delete_attributes[],
OPENSSL_ITEM parameters[])
{
check_store(s, STORE_F_STORE_MODIFY_CERTIFICATE,
modify_object, STORE_R_NO_MODIFY_OBJECT_FUNCTION);
if (!s->meth->modify_object(s, STORE_OBJECT_TYPE_X509_CERTIFICATE,
search_attributes, add_attributes,
modify_attributes, delete_attributes,
parameters)) {
STOREerr(STORE_F_STORE_MODIFY_CERTIFICATE,
STORE_R_FAILED_MODIFYING_CERTIFICATE);
return 0;
}
return 1;
}
int STORE_revoke_certificate(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
check_store(s, STORE_F_STORE_REVOKE_CERTIFICATE,
revoke_object, STORE_R_NO_REVOKE_OBJECT_FUNCTION);
if (!s->meth->revoke_object(s, STORE_OBJECT_TYPE_X509_CERTIFICATE,
attributes, parameters)) {
STOREerr(STORE_F_STORE_REVOKE_CERTIFICATE,
STORE_R_FAILED_REVOKING_CERTIFICATE);
return 0;
}
return 1;
}
int STORE_delete_certificate(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
check_store(s, STORE_F_STORE_DELETE_CERTIFICATE,
delete_object, STORE_R_NO_DELETE_OBJECT_FUNCTION);
if (!s->meth->delete_object(s, STORE_OBJECT_TYPE_X509_CERTIFICATE,
attributes, parameters)) {
STOREerr(STORE_F_STORE_DELETE_CERTIFICATE,
STORE_R_FAILED_DELETING_CERTIFICATE);
return 0;
}
return 1;
}
void *STORE_list_certificate_start(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
void *handle;
check_store(s, STORE_F_STORE_LIST_CERTIFICATE_START,
list_object_start, STORE_R_NO_LIST_OBJECT_START_FUNCTION);
handle = s->meth->list_object_start(s,
STORE_OBJECT_TYPE_X509_CERTIFICATE,
attributes, parameters);
if (!handle) {
STOREerr(STORE_F_STORE_LIST_CERTIFICATE_START,
STORE_R_FAILED_LISTING_CERTIFICATES);
return 0;
}
return handle;
}
X509 *STORE_list_certificate_next(STORE *s, void *handle)
{
STORE_OBJECT *object;
X509 *x;
check_store(s, STORE_F_STORE_LIST_CERTIFICATE_NEXT,
list_object_next, STORE_R_NO_LIST_OBJECT_NEXT_FUNCTION);
object = s->meth->list_object_next(s, handle);
if (!object || !object->data.x509.certificate) {
STOREerr(STORE_F_STORE_LIST_CERTIFICATE_NEXT,
STORE_R_FAILED_LISTING_CERTIFICATES);
return 0;
}
CRYPTO_add(&object->data.x509.certificate->references, 1,
CRYPTO_LOCK_X509);
#ifdef REF_PRINT
REF_PRINT("X509", data);
#endif
x = object->data.x509.certificate;
STORE_OBJECT_free(object);
return x;
}
int STORE_list_certificate_end(STORE *s, void *handle)
{
check_store(s, STORE_F_STORE_LIST_CERTIFICATE_END,
list_object_end, STORE_R_NO_LIST_OBJECT_END_FUNCTION);
if (!s->meth->list_object_end(s, handle)) {
STOREerr(STORE_F_STORE_LIST_CERTIFICATE_END,
STORE_R_FAILED_LISTING_CERTIFICATES);
return 0;
}
return 1;
}
int STORE_list_certificate_endp(STORE *s, void *handle)
{
check_store(s, STORE_F_STORE_LIST_CERTIFICATE_ENDP,
list_object_endp, STORE_R_NO_LIST_OBJECT_ENDP_FUNCTION);
if (!s->meth->list_object_endp(s, handle)) {
STOREerr(STORE_F_STORE_LIST_CERTIFICATE_ENDP,
STORE_R_FAILED_LISTING_CERTIFICATES);
return 0;
}
return 1;
}
EVP_PKEY *STORE_generate_key(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
STORE_OBJECT *object;
EVP_PKEY *pkey;
check_store(s, STORE_F_STORE_GENERATE_KEY,
generate_object, STORE_R_NO_GENERATE_OBJECT_FUNCTION);
object = s->meth->generate_object(s, STORE_OBJECT_TYPE_PRIVATE_KEY,
attributes, parameters);
if (!object || !object->data.key) {
STOREerr(STORE_F_STORE_GENERATE_KEY, STORE_R_FAILED_GENERATING_KEY);
return 0;
}
CRYPTO_add(&object->data.key->references, 1, CRYPTO_LOCK_EVP_PKEY);
#ifdef REF_PRINT
REF_PRINT("EVP_PKEY", data);
#endif
pkey = object->data.key;
STORE_OBJECT_free(object);
return pkey;
}
EVP_PKEY *STORE_get_private_key(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
STORE_OBJECT *object;
EVP_PKEY *pkey;
check_store(s, STORE_F_STORE_GET_PRIVATE_KEY,
get_object, STORE_R_NO_GET_OBJECT_FUNCTION);
object = s->meth->get_object(s, STORE_OBJECT_TYPE_PRIVATE_KEY,
attributes, parameters);
if (!object || !object->data.key || !object->data.key) {
STOREerr(STORE_F_STORE_GET_PRIVATE_KEY, STORE_R_FAILED_GETTING_KEY);
return 0;
}
CRYPTO_add(&object->data.key->references, 1, CRYPTO_LOCK_EVP_PKEY);
#ifdef REF_PRINT
REF_PRINT("EVP_PKEY", data);
#endif
pkey = object->data.key;
STORE_OBJECT_free(object);
return pkey;
}
int STORE_store_private_key(STORE *s, EVP_PKEY *data,
OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
STORE_OBJECT *object;
int i;
check_store(s, STORE_F_STORE_STORE_PRIVATE_KEY,
store_object, STORE_R_NO_STORE_OBJECT_FUNCTION);
object = STORE_OBJECT_new();
if (!object) {
STOREerr(STORE_F_STORE_STORE_PRIVATE_KEY, ERR_R_MALLOC_FAILURE);
return 0;
}
object->data.key = EVP_PKEY_new();
if (!object->data.key) {
STOREerr(STORE_F_STORE_STORE_PRIVATE_KEY, ERR_R_MALLOC_FAILURE);
return 0;
}
CRYPTO_add(&data->references, 1, CRYPTO_LOCK_EVP_PKEY);
#ifdef REF_PRINT
REF_PRINT("EVP_PKEY", data);
#endif
object->data.key = data;
i = s->meth->store_object(s, STORE_OBJECT_TYPE_PRIVATE_KEY, object,
attributes, parameters);
STORE_OBJECT_free(object);
if (!i) {
STOREerr(STORE_F_STORE_STORE_PRIVATE_KEY, STORE_R_FAILED_STORING_KEY);
return 0;
}
return i;
}
int STORE_modify_private_key(STORE *s, OPENSSL_ITEM search_attributes[],
OPENSSL_ITEM add_attributes[],
OPENSSL_ITEM modify_attributes[],
OPENSSL_ITEM delete_attributes[],
OPENSSL_ITEM parameters[])
{
check_store(s, STORE_F_STORE_MODIFY_PRIVATE_KEY,
modify_object, STORE_R_NO_MODIFY_OBJECT_FUNCTION);
if (!s->meth->modify_object(s, STORE_OBJECT_TYPE_PRIVATE_KEY,
search_attributes, add_attributes,
modify_attributes, delete_attributes,
parameters)) {
STOREerr(STORE_F_STORE_MODIFY_PRIVATE_KEY,
STORE_R_FAILED_MODIFYING_PRIVATE_KEY);
return 0;
}
return 1;
}
int STORE_revoke_private_key(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
int i;
check_store(s, STORE_F_STORE_REVOKE_PRIVATE_KEY,
revoke_object, STORE_R_NO_REVOKE_OBJECT_FUNCTION);
i = s->meth->revoke_object(s, STORE_OBJECT_TYPE_PRIVATE_KEY,
attributes, parameters);
if (!i) {
STOREerr(STORE_F_STORE_REVOKE_PRIVATE_KEY,
STORE_R_FAILED_REVOKING_KEY);
return 0;
}
return i;
}
int STORE_delete_private_key(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
check_store(s, STORE_F_STORE_DELETE_PRIVATE_KEY,
delete_object, STORE_R_NO_DELETE_OBJECT_FUNCTION);
if (!s->meth->delete_object(s, STORE_OBJECT_TYPE_PRIVATE_KEY,
attributes, parameters)) {
STOREerr(STORE_F_STORE_DELETE_PRIVATE_KEY,
STORE_R_FAILED_DELETING_KEY);
return 0;
}
return 1;
}
void *STORE_list_private_key_start(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
void *handle;
check_store(s, STORE_F_STORE_LIST_PRIVATE_KEY_START,
list_object_start, STORE_R_NO_LIST_OBJECT_START_FUNCTION);
handle = s->meth->list_object_start(s, STORE_OBJECT_TYPE_PRIVATE_KEY,
attributes, parameters);
if (!handle) {
STOREerr(STORE_F_STORE_LIST_PRIVATE_KEY_START,
STORE_R_FAILED_LISTING_KEYS);
return 0;
}
return handle;
}
EVP_PKEY *STORE_list_private_key_next(STORE *s, void *handle)
{
STORE_OBJECT *object;
EVP_PKEY *pkey;
check_store(s, STORE_F_STORE_LIST_PRIVATE_KEY_NEXT,
list_object_next, STORE_R_NO_LIST_OBJECT_NEXT_FUNCTION);
object = s->meth->list_object_next(s, handle);
if (!object || !object->data.key || !object->data.key) {
STOREerr(STORE_F_STORE_LIST_PRIVATE_KEY_NEXT,
STORE_R_FAILED_LISTING_KEYS);
return 0;
}
CRYPTO_add(&object->data.key->references, 1, CRYPTO_LOCK_EVP_PKEY);
#ifdef REF_PRINT
REF_PRINT("EVP_PKEY", data);
#endif
pkey = object->data.key;
STORE_OBJECT_free(object);
return pkey;
}
int STORE_list_private_key_end(STORE *s, void *handle)
{
check_store(s, STORE_F_STORE_LIST_PRIVATE_KEY_END,
list_object_end, STORE_R_NO_LIST_OBJECT_END_FUNCTION);
if (!s->meth->list_object_end(s, handle)) {
STOREerr(STORE_F_STORE_LIST_PRIVATE_KEY_END,
STORE_R_FAILED_LISTING_KEYS);
return 0;
}
return 1;
}
int STORE_list_private_key_endp(STORE *s, void *handle)
{
check_store(s, STORE_F_STORE_LIST_PRIVATE_KEY_ENDP,
list_object_endp, STORE_R_NO_LIST_OBJECT_ENDP_FUNCTION);
if (!s->meth->list_object_endp(s, handle)) {
STOREerr(STORE_F_STORE_LIST_PRIVATE_KEY_ENDP,
STORE_R_FAILED_LISTING_KEYS);
return 0;
}
return 1;
}
EVP_PKEY *STORE_get_public_key(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
STORE_OBJECT *object;
EVP_PKEY *pkey;
check_store(s, STORE_F_STORE_GET_PUBLIC_KEY,
get_object, STORE_R_NO_GET_OBJECT_FUNCTION);
object = s->meth->get_object(s, STORE_OBJECT_TYPE_PUBLIC_KEY,
attributes, parameters);
if (!object || !object->data.key || !object->data.key) {
STOREerr(STORE_F_STORE_GET_PUBLIC_KEY, STORE_R_FAILED_GETTING_KEY);
return 0;
}
CRYPTO_add(&object->data.key->references, 1, CRYPTO_LOCK_EVP_PKEY);
#ifdef REF_PRINT
REF_PRINT("EVP_PKEY", data);
#endif
pkey = object->data.key;
STORE_OBJECT_free(object);
return pkey;
}
int STORE_store_public_key(STORE *s, EVP_PKEY *data,
OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
STORE_OBJECT *object;
int i;
check_store(s, STORE_F_STORE_STORE_PUBLIC_KEY,
store_object, STORE_R_NO_STORE_OBJECT_FUNCTION);
object = STORE_OBJECT_new();
if (!object) {
STOREerr(STORE_F_STORE_STORE_PUBLIC_KEY, ERR_R_MALLOC_FAILURE);
return 0;
}
object->data.key = EVP_PKEY_new();
if (!object->data.key) {
STOREerr(STORE_F_STORE_STORE_PUBLIC_KEY, ERR_R_MALLOC_FAILURE);
return 0;
}
CRYPTO_add(&data->references, 1, CRYPTO_LOCK_EVP_PKEY);
#ifdef REF_PRINT
REF_PRINT("EVP_PKEY", data);
#endif
object->data.key = data;
i = s->meth->store_object(s, STORE_OBJECT_TYPE_PUBLIC_KEY, object,
attributes, parameters);
STORE_OBJECT_free(object);
if (!i) {
STOREerr(STORE_F_STORE_STORE_PUBLIC_KEY, STORE_R_FAILED_STORING_KEY);
return 0;
}
return i;
}
int STORE_modify_public_key(STORE *s, OPENSSL_ITEM search_attributes[],
OPENSSL_ITEM add_attributes[],
OPENSSL_ITEM modify_attributes[],
OPENSSL_ITEM delete_attributes[],
OPENSSL_ITEM parameters[])
{
check_store(s, STORE_F_STORE_MODIFY_PUBLIC_KEY,
modify_object, STORE_R_NO_MODIFY_OBJECT_FUNCTION);
if (!s->meth->modify_object(s, STORE_OBJECT_TYPE_PUBLIC_KEY,
search_attributes, add_attributes,
modify_attributes, delete_attributes,
parameters)) {
STOREerr(STORE_F_STORE_MODIFY_PUBLIC_KEY,
STORE_R_FAILED_MODIFYING_PUBLIC_KEY);
return 0;
}
return 1;
}
int STORE_revoke_public_key(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
int i;
check_store(s, STORE_F_STORE_REVOKE_PUBLIC_KEY,
revoke_object, STORE_R_NO_REVOKE_OBJECT_FUNCTION);
i = s->meth->revoke_object(s, STORE_OBJECT_TYPE_PUBLIC_KEY,
attributes, parameters);
if (!i) {
STOREerr(STORE_F_STORE_REVOKE_PUBLIC_KEY,
STORE_R_FAILED_REVOKING_KEY);
return 0;
}
return i;
}
int STORE_delete_public_key(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
check_store(s, STORE_F_STORE_DELETE_PUBLIC_KEY,
delete_object, STORE_R_NO_DELETE_OBJECT_FUNCTION);
if (!s->meth->delete_object(s, STORE_OBJECT_TYPE_PUBLIC_KEY,
attributes, parameters)) {
STOREerr(STORE_F_STORE_DELETE_PUBLIC_KEY,
STORE_R_FAILED_DELETING_KEY);
return 0;
}
return 1;
}
void *STORE_list_public_key_start(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
void *handle;
check_store(s, STORE_F_STORE_LIST_PUBLIC_KEY_START,
list_object_start, STORE_R_NO_LIST_OBJECT_START_FUNCTION);
handle = s->meth->list_object_start(s, STORE_OBJECT_TYPE_PUBLIC_KEY,
attributes, parameters);
if (!handle) {
STOREerr(STORE_F_STORE_LIST_PUBLIC_KEY_START,
STORE_R_FAILED_LISTING_KEYS);
return 0;
}
return handle;
}
EVP_PKEY *STORE_list_public_key_next(STORE *s, void *handle)
{
STORE_OBJECT *object;
EVP_PKEY *pkey;
check_store(s, STORE_F_STORE_LIST_PUBLIC_KEY_NEXT,
list_object_next, STORE_R_NO_LIST_OBJECT_NEXT_FUNCTION);
object = s->meth->list_object_next(s, handle);
if (!object || !object->data.key || !object->data.key) {
STOREerr(STORE_F_STORE_LIST_PUBLIC_KEY_NEXT,
STORE_R_FAILED_LISTING_KEYS);
return 0;
}
CRYPTO_add(&object->data.key->references, 1, CRYPTO_LOCK_EVP_PKEY);
#ifdef REF_PRINT
REF_PRINT("EVP_PKEY", data);
#endif
pkey = object->data.key;
STORE_OBJECT_free(object);
return pkey;
}
int STORE_list_public_key_end(STORE *s, void *handle)
{
check_store(s, STORE_F_STORE_LIST_PUBLIC_KEY_END,
list_object_end, STORE_R_NO_LIST_OBJECT_END_FUNCTION);
if (!s->meth->list_object_end(s, handle)) {
STOREerr(STORE_F_STORE_LIST_PUBLIC_KEY_END,
STORE_R_FAILED_LISTING_KEYS);
return 0;
}
return 1;
}
int STORE_list_public_key_endp(STORE *s, void *handle)
{
check_store(s, STORE_F_STORE_LIST_PUBLIC_KEY_ENDP,
list_object_endp, STORE_R_NO_LIST_OBJECT_ENDP_FUNCTION);
if (!s->meth->list_object_endp(s, handle)) {
STOREerr(STORE_F_STORE_LIST_PUBLIC_KEY_ENDP,
STORE_R_FAILED_LISTING_KEYS);
return 0;
}
return 1;
}
X509_CRL *STORE_generate_crl(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
STORE_OBJECT *object;
X509_CRL *crl;
check_store(s, STORE_F_STORE_GENERATE_CRL,
generate_object, STORE_R_NO_GENERATE_CRL_FUNCTION);
object = s->meth->generate_object(s, STORE_OBJECT_TYPE_X509_CRL,
attributes, parameters);
if (!object || !object->data.crl) {
STOREerr(STORE_F_STORE_GENERATE_CRL, STORE_R_FAILED_GENERATING_CRL);
return 0;
}
CRYPTO_add(&object->data.crl->references, 1, CRYPTO_LOCK_X509_CRL);
#ifdef REF_PRINT
REF_PRINT("X509_CRL", data);
#endif
crl = object->data.crl;
STORE_OBJECT_free(object);
return crl;
}
X509_CRL *STORE_get_crl(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
STORE_OBJECT *object;
X509_CRL *crl;
check_store(s, STORE_F_STORE_GET_CRL,
get_object, STORE_R_NO_GET_OBJECT_FUNCTION);
object = s->meth->get_object(s, STORE_OBJECT_TYPE_X509_CRL,
attributes, parameters);
if (!object || !object->data.crl) {
STOREerr(STORE_F_STORE_GET_CRL, STORE_R_FAILED_GETTING_KEY);
return 0;
}
CRYPTO_add(&object->data.crl->references, 1, CRYPTO_LOCK_X509_CRL);
#ifdef REF_PRINT
REF_PRINT("X509_CRL", data);
#endif
crl = object->data.crl;
STORE_OBJECT_free(object);
return crl;
}
int STORE_store_crl(STORE *s, X509_CRL *data, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
STORE_OBJECT *object;
int i;
check_store(s, STORE_F_STORE_STORE_CRL,
store_object, STORE_R_NO_STORE_OBJECT_FUNCTION);
object = STORE_OBJECT_new();
if (!object) {
STOREerr(STORE_F_STORE_STORE_CRL, ERR_R_MALLOC_FAILURE);
return 0;
}
CRYPTO_add(&data->references, 1, CRYPTO_LOCK_X509_CRL);
#ifdef REF_PRINT
REF_PRINT("X509_CRL", data);
#endif
object->data.crl = data;
i = s->meth->store_object(s, STORE_OBJECT_TYPE_X509_CRL, object,
attributes, parameters);
STORE_OBJECT_free(object);
if (!i) {
STOREerr(STORE_F_STORE_STORE_CRL, STORE_R_FAILED_STORING_KEY);
return 0;
}
return i;
}
int STORE_modify_crl(STORE *s, OPENSSL_ITEM search_attributes[],
OPENSSL_ITEM add_attributes[],
OPENSSL_ITEM modify_attributes[],
OPENSSL_ITEM delete_attributes[],
OPENSSL_ITEM parameters[])
{
check_store(s, STORE_F_STORE_MODIFY_CRL,
modify_object, STORE_R_NO_MODIFY_OBJECT_FUNCTION);
if (!s->meth->modify_object(s, STORE_OBJECT_TYPE_X509_CRL,
search_attributes, add_attributes,
modify_attributes, delete_attributes,
parameters)) {
STOREerr(STORE_F_STORE_MODIFY_CRL, STORE_R_FAILED_MODIFYING_CRL);
return 0;
}
return 1;
}
int STORE_delete_crl(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
check_store(s, STORE_F_STORE_DELETE_CRL,
delete_object, STORE_R_NO_DELETE_OBJECT_FUNCTION);
if (!s->meth->delete_object(s, STORE_OBJECT_TYPE_X509_CRL,
attributes, parameters)) {
STOREerr(STORE_F_STORE_DELETE_CRL, STORE_R_FAILED_DELETING_KEY);
return 0;
}
return 1;
}
void *STORE_list_crl_start(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
void *handle;
check_store(s, STORE_F_STORE_LIST_CRL_START,
list_object_start, STORE_R_NO_LIST_OBJECT_START_FUNCTION);
handle = s->meth->list_object_start(s, STORE_OBJECT_TYPE_X509_CRL,
attributes, parameters);
if (!handle) {
STOREerr(STORE_F_STORE_LIST_CRL_START, STORE_R_FAILED_LISTING_KEYS);
return 0;
}
return handle;
}
X509_CRL *STORE_list_crl_next(STORE *s, void *handle)
{
STORE_OBJECT *object;
X509_CRL *crl;
check_store(s, STORE_F_STORE_LIST_CRL_NEXT,
list_object_next, STORE_R_NO_LIST_OBJECT_NEXT_FUNCTION);
object = s->meth->list_object_next(s, handle);
if (!object || !object->data.crl) {
STOREerr(STORE_F_STORE_LIST_CRL_NEXT, STORE_R_FAILED_LISTING_KEYS);
return 0;
}
CRYPTO_add(&object->data.crl->references, 1, CRYPTO_LOCK_X509_CRL);
#ifdef REF_PRINT
REF_PRINT("X509_CRL", data);
#endif
crl = object->data.crl;
STORE_OBJECT_free(object);
return crl;
}
int STORE_list_crl_end(STORE *s, void *handle)
{
check_store(s, STORE_F_STORE_LIST_CRL_END,
list_object_end, STORE_R_NO_LIST_OBJECT_END_FUNCTION);
if (!s->meth->list_object_end(s, handle)) {
STOREerr(STORE_F_STORE_LIST_CRL_END, STORE_R_FAILED_LISTING_KEYS);
return 0;
}
return 1;
}
int STORE_list_crl_endp(STORE *s, void *handle)
{
check_store(s, STORE_F_STORE_LIST_CRL_ENDP,
list_object_endp, STORE_R_NO_LIST_OBJECT_ENDP_FUNCTION);
if (!s->meth->list_object_endp(s, handle)) {
STOREerr(STORE_F_STORE_LIST_CRL_ENDP, STORE_R_FAILED_LISTING_KEYS);
return 0;
}
return 1;
}
int STORE_store_number(STORE *s, BIGNUM *data, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
STORE_OBJECT *object;
int i;
check_store(s, STORE_F_STORE_STORE_NUMBER,
store_object, STORE_R_NO_STORE_OBJECT_NUMBER_FUNCTION);
object = STORE_OBJECT_new();
if (!object) {
STOREerr(STORE_F_STORE_STORE_NUMBER, ERR_R_MALLOC_FAILURE);
return 0;
}
object->data.number = data;
i = s->meth->store_object(s, STORE_OBJECT_TYPE_NUMBER, object,
attributes, parameters);
STORE_OBJECT_free(object);
if (!i) {
STOREerr(STORE_F_STORE_STORE_NUMBER, STORE_R_FAILED_STORING_NUMBER);
return 0;
}
return 1;
}
int STORE_modify_number(STORE *s, OPENSSL_ITEM search_attributes[],
OPENSSL_ITEM add_attributes[],
OPENSSL_ITEM modify_attributes[],
OPENSSL_ITEM delete_attributes[],
OPENSSL_ITEM parameters[])
{
check_store(s, STORE_F_STORE_MODIFY_NUMBER,
modify_object, STORE_R_NO_MODIFY_OBJECT_FUNCTION);
if (!s->meth->modify_object(s, STORE_OBJECT_TYPE_NUMBER,
search_attributes, add_attributes,
modify_attributes, delete_attributes,
parameters)) {
STOREerr(STORE_F_STORE_MODIFY_NUMBER,
STORE_R_FAILED_MODIFYING_NUMBER);
return 0;
}
return 1;
}
BIGNUM *STORE_get_number(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
STORE_OBJECT *object;
BIGNUM *n;
check_store(s, STORE_F_STORE_GET_NUMBER,
get_object, STORE_R_NO_GET_OBJECT_NUMBER_FUNCTION);
object = s->meth->get_object(s, STORE_OBJECT_TYPE_NUMBER, attributes,
parameters);
if (!object || !object->data.number) {
STOREerr(STORE_F_STORE_GET_NUMBER, STORE_R_FAILED_GETTING_NUMBER);
return 0;
}
n = object->data.number;
object->data.number = NULL;
STORE_OBJECT_free(object);
return n;
}
int STORE_delete_number(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
check_store(s, STORE_F_STORE_DELETE_NUMBER,
delete_object, STORE_R_NO_DELETE_NUMBER_FUNCTION);
if (!s->meth->delete_object(s, STORE_OBJECT_TYPE_NUMBER, attributes,
parameters)) {
STOREerr(STORE_F_STORE_DELETE_NUMBER, STORE_R_FAILED_DELETING_NUMBER);
return 0;
}
return 1;
}
int STORE_store_arbitrary(STORE *s, BUF_MEM *data, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
STORE_OBJECT *object;
int i;
check_store(s, STORE_F_STORE_STORE_ARBITRARY,
store_object, STORE_R_NO_STORE_OBJECT_ARBITRARY_FUNCTION);
object = STORE_OBJECT_new();
if (!object) {
STOREerr(STORE_F_STORE_STORE_ARBITRARY, ERR_R_MALLOC_FAILURE);
return 0;
}
object->data.arbitrary = data;
i = s->meth->store_object(s, STORE_OBJECT_TYPE_ARBITRARY, object,
attributes, parameters);
STORE_OBJECT_free(object);
if (!i) {
STOREerr(STORE_F_STORE_STORE_ARBITRARY,
STORE_R_FAILED_STORING_ARBITRARY);
return 0;
}
return 1;
}
int STORE_modify_arbitrary(STORE *s, OPENSSL_ITEM search_attributes[],
OPENSSL_ITEM add_attributes[],
OPENSSL_ITEM modify_attributes[],
OPENSSL_ITEM delete_attributes[],
OPENSSL_ITEM parameters[])
{
check_store(s, STORE_F_STORE_MODIFY_ARBITRARY,
modify_object, STORE_R_NO_MODIFY_OBJECT_FUNCTION);
if (!s->meth->modify_object(s, STORE_OBJECT_TYPE_ARBITRARY,
search_attributes, add_attributes,
modify_attributes, delete_attributes,
parameters)) {
STOREerr(STORE_F_STORE_MODIFY_ARBITRARY,
STORE_R_FAILED_MODIFYING_ARBITRARY);
return 0;
}
return 1;
}
BUF_MEM *STORE_get_arbitrary(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
STORE_OBJECT *object;
BUF_MEM *b;
check_store(s, STORE_F_STORE_GET_ARBITRARY,
get_object, STORE_R_NO_GET_OBJECT_ARBITRARY_FUNCTION);
object = s->meth->get_object(s, STORE_OBJECT_TYPE_ARBITRARY,
attributes, parameters);
if (!object || !object->data.arbitrary) {
STOREerr(STORE_F_STORE_GET_ARBITRARY,
STORE_R_FAILED_GETTING_ARBITRARY);
return 0;
}
b = object->data.arbitrary;
object->data.arbitrary = NULL;
STORE_OBJECT_free(object);
return b;
}
int STORE_delete_arbitrary(STORE *s, OPENSSL_ITEM attributes[],
OPENSSL_ITEM parameters[])
{
check_store(s, STORE_F_STORE_DELETE_ARBITRARY,
delete_object, STORE_R_NO_DELETE_ARBITRARY_FUNCTION);
if (!s->meth->delete_object(s, STORE_OBJECT_TYPE_ARBITRARY, attributes,
parameters)) {
STOREerr(STORE_F_STORE_DELETE_ARBITRARY,
STORE_R_FAILED_DELETING_ARBITRARY);
return 0;
}
return 1;
}
STORE_OBJECT *STORE_OBJECT_new(void)
{
STORE_OBJECT *object = OPENSSL_malloc(sizeof(STORE_OBJECT));
if (object)
memset(object, 0, sizeof(STORE_OBJECT));
return object;
}
void STORE_OBJECT_free(STORE_OBJECT *data)
{
if (!data)
return;
switch (data->type) {
case STORE_OBJECT_TYPE_X509_CERTIFICATE:
X509_free(data->data.x509.certificate);
break;
case STORE_OBJECT_TYPE_X509_CRL:
X509_CRL_free(data->data.crl);
break;
case STORE_OBJECT_TYPE_PRIVATE_KEY:
case STORE_OBJECT_TYPE_PUBLIC_KEY:
EVP_PKEY_free(data->data.key);
break;
case STORE_OBJECT_TYPE_NUMBER:
BN_free(data->data.number);
break;
case STORE_OBJECT_TYPE_ARBITRARY:
BUF_MEM_free(data->data.arbitrary);
break;
}
OPENSSL_free(data);
}
IMPLEMENT_STACK_OF(STORE_OBJECT*)
struct STORE_attr_info_st {
unsigned char set[(STORE_ATTR_TYPE_NUM + 8) / 8];
union {
char *cstring;
unsigned char *sha1string;
X509_NAME *dn;
BIGNUM *number;
void *any;
} values[STORE_ATTR_TYPE_NUM + 1];
size_t value_sizes[STORE_ATTR_TYPE_NUM + 1];
};
#define ATTR_IS_SET(a,i) ((i) > 0 && (i) < STORE_ATTR_TYPE_NUM \
&& ((a)->set[(i) / 8] & (1 << ((i) % 8))))
#define SET_ATTRBIT(a,i) ((a)->set[(i) / 8] |= (1 << ((i) % 8)))
#define CLEAR_ATTRBIT(a,i) ((a)->set[(i) / 8] &= ~(1 << ((i) % 8)))
STORE_ATTR_INFO *STORE_ATTR_INFO_new(void)
{
return (STORE_ATTR_INFO *)OPENSSL_malloc(sizeof(STORE_ATTR_INFO));
}
static void STORE_ATTR_INFO_attr_free(STORE_ATTR_INFO *attrs,
STORE_ATTR_TYPES code)
{
if (ATTR_IS_SET(attrs, code)) {
switch (code) {
case STORE_ATTR_FRIENDLYNAME:
case STORE_ATTR_EMAIL:
case STORE_ATTR_FILENAME:
STORE_ATTR_INFO_modify_cstr(attrs, code, NULL, 0);
break;
case STORE_ATTR_KEYID:
case STORE_ATTR_ISSUERKEYID:
case STORE_ATTR_SUBJECTKEYID:
case STORE_ATTR_ISSUERSERIALHASH:
case STORE_ATTR_CERTHASH:
STORE_ATTR_INFO_modify_sha1str(attrs, code, NULL, 0);
break;
case STORE_ATTR_ISSUER:
case STORE_ATTR_SUBJECT:
STORE_ATTR_INFO_modify_dn(attrs, code, NULL);
break;
case STORE_ATTR_SERIAL:
STORE_ATTR_INFO_modify_number(attrs, code, NULL);
break;
default:
break;
}
}
}
int STORE_ATTR_INFO_free(STORE_ATTR_INFO *attrs)
{
if (attrs) {
STORE_ATTR_TYPES i;
for (i = 0; i++ < STORE_ATTR_TYPE_NUM;)
STORE_ATTR_INFO_attr_free(attrs, i);
OPENSSL_free(attrs);
}
return 1;
}
char *STORE_ATTR_INFO_get0_cstr(STORE_ATTR_INFO *attrs, STORE_ATTR_TYPES code)
{
if (!attrs) {
STOREerr(STORE_F_STORE_ATTR_INFO_GET0_CSTR,
ERR_R_PASSED_NULL_PARAMETER);
return NULL;
}
if (ATTR_IS_SET(attrs, code))
return attrs->values[code].cstring;
STOREerr(STORE_F_STORE_ATTR_INFO_GET0_CSTR, STORE_R_NO_VALUE);
return NULL;
}
unsigned char *STORE_ATTR_INFO_get0_sha1str(STORE_ATTR_INFO *attrs,
STORE_ATTR_TYPES code)
{
if (!attrs) {
STOREerr(STORE_F_STORE_ATTR_INFO_GET0_SHA1STR,
ERR_R_PASSED_NULL_PARAMETER);
return NULL;
}
if (ATTR_IS_SET(attrs, code))
return attrs->values[code].sha1string;
STOREerr(STORE_F_STORE_ATTR_INFO_GET0_SHA1STR, STORE_R_NO_VALUE);
return NULL;
}
X509_NAME *STORE_ATTR_INFO_get0_dn(STORE_ATTR_INFO *attrs,
STORE_ATTR_TYPES code)
{
if (!attrs) {
STOREerr(STORE_F_STORE_ATTR_INFO_GET0_DN,
ERR_R_PASSED_NULL_PARAMETER);
return NULL;
}
if (ATTR_IS_SET(attrs, code))
return attrs->values[code].dn;
STOREerr(STORE_F_STORE_ATTR_INFO_GET0_DN, STORE_R_NO_VALUE);
return NULL;
}
BIGNUM *STORE_ATTR_INFO_get0_number(STORE_ATTR_INFO *attrs,
STORE_ATTR_TYPES code)
{
if (!attrs) {
STOREerr(STORE_F_STORE_ATTR_INFO_GET0_NUMBER,
ERR_R_PASSED_NULL_PARAMETER);
return NULL;
}
if (ATTR_IS_SET(attrs, code))
return attrs->values[code].number;
STOREerr(STORE_F_STORE_ATTR_INFO_GET0_NUMBER, STORE_R_NO_VALUE);
return NULL;
}
int STORE_ATTR_INFO_set_cstr(STORE_ATTR_INFO *attrs, STORE_ATTR_TYPES code,
char *cstr, size_t cstr_size)
{
if (!attrs) {
STOREerr(STORE_F_STORE_ATTR_INFO_SET_CSTR,
ERR_R_PASSED_NULL_PARAMETER);
return 0;
}
if (!ATTR_IS_SET(attrs, code)) {
if ((attrs->values[code].cstring = BUF_strndup(cstr, cstr_size)))
return 1;
STOREerr(STORE_F_STORE_ATTR_INFO_SET_CSTR, ERR_R_MALLOC_FAILURE);
return 0;
}
STOREerr(STORE_F_STORE_ATTR_INFO_SET_CSTR, STORE_R_ALREADY_HAS_A_VALUE);
return 0;
}
int STORE_ATTR_INFO_set_sha1str(STORE_ATTR_INFO *attrs, STORE_ATTR_TYPES code,
unsigned char *sha1str, size_t sha1str_size)
{
if (!attrs) {
STOREerr(STORE_F_STORE_ATTR_INFO_SET_SHA1STR,
ERR_R_PASSED_NULL_PARAMETER);
return 0;
}
if (!ATTR_IS_SET(attrs, code)) {
if ((attrs->values[code].sha1string =
(unsigned char *)BUF_memdup(sha1str, sha1str_size)))
return 1;
STOREerr(STORE_F_STORE_ATTR_INFO_SET_SHA1STR, ERR_R_MALLOC_FAILURE);
return 0;
}
STOREerr(STORE_F_STORE_ATTR_INFO_SET_SHA1STR,
STORE_R_ALREADY_HAS_A_VALUE);
return 0;
}
int STORE_ATTR_INFO_set_dn(STORE_ATTR_INFO *attrs, STORE_ATTR_TYPES code,
X509_NAME *dn)
{
if (!attrs) {
STOREerr(STORE_F_STORE_ATTR_INFO_SET_DN, ERR_R_PASSED_NULL_PARAMETER);
return 0;
}
if (!ATTR_IS_SET(attrs, code)) {
if ((attrs->values[code].dn = X509_NAME_dup(dn)))
return 1;
STOREerr(STORE_F_STORE_ATTR_INFO_SET_DN, ERR_R_MALLOC_FAILURE);
return 0;
}
STOREerr(STORE_F_STORE_ATTR_INFO_SET_DN, STORE_R_ALREADY_HAS_A_VALUE);
return 0;
}
int STORE_ATTR_INFO_set_number(STORE_ATTR_INFO *attrs, STORE_ATTR_TYPES code,
BIGNUM *number)
{
if (!attrs) {
STOREerr(STORE_F_STORE_ATTR_INFO_SET_NUMBER,
ERR_R_PASSED_NULL_PARAMETER);
return 0;
}
if (!ATTR_IS_SET(attrs, code)) {
if ((attrs->values[code].number = BN_dup(number)))
return 1;
STOREerr(STORE_F_STORE_ATTR_INFO_SET_NUMBER, ERR_R_MALLOC_FAILURE);
return 0;
}
STOREerr(STORE_F_STORE_ATTR_INFO_SET_NUMBER, STORE_R_ALREADY_HAS_A_VALUE);
return 0;
}
int STORE_ATTR_INFO_modify_cstr(STORE_ATTR_INFO *attrs, STORE_ATTR_TYPES code,
char *cstr, size_t cstr_size)
{
if (!attrs) {
STOREerr(STORE_F_STORE_ATTR_INFO_MODIFY_CSTR,
ERR_R_PASSED_NULL_PARAMETER);
return 0;
}
if (ATTR_IS_SET(attrs, code)) {
OPENSSL_free(attrs->values[code].cstring);
attrs->values[code].cstring = NULL;
CLEAR_ATTRBIT(attrs, code);
}
return STORE_ATTR_INFO_set_cstr(attrs, code, cstr, cstr_size);
}
int STORE_ATTR_INFO_modify_sha1str(STORE_ATTR_INFO *attrs,
STORE_ATTR_TYPES code,
unsigned char *sha1str,
size_t sha1str_size)
{
if (!attrs) {
STOREerr(STORE_F_STORE_ATTR_INFO_MODIFY_SHA1STR,
ERR_R_PASSED_NULL_PARAMETER);
return 0;
}
if (ATTR_IS_SET(attrs, code)) {
OPENSSL_free(attrs->values[code].sha1string);
attrs->values[code].sha1string = NULL;
CLEAR_ATTRBIT(attrs, code);
}
return STORE_ATTR_INFO_set_sha1str(attrs, code, sha1str, sha1str_size);
}
int STORE_ATTR_INFO_modify_dn(STORE_ATTR_INFO *attrs, STORE_ATTR_TYPES code,
X509_NAME *dn)
{
if (!attrs) {
STOREerr(STORE_F_STORE_ATTR_INFO_MODIFY_DN,
ERR_R_PASSED_NULL_PARAMETER);
return 0;
}
if (ATTR_IS_SET(attrs, code)) {
OPENSSL_free(attrs->values[code].dn);
attrs->values[code].dn = NULL;
CLEAR_ATTRBIT(attrs, code);
}
return STORE_ATTR_INFO_set_dn(attrs, code, dn);
}
int STORE_ATTR_INFO_modify_number(STORE_ATTR_INFO *attrs,
STORE_ATTR_TYPES code, BIGNUM *number)
{
if (!attrs) {
STOREerr(STORE_F_STORE_ATTR_INFO_MODIFY_NUMBER,
ERR_R_PASSED_NULL_PARAMETER);
return 0;
}
if (ATTR_IS_SET(attrs, code)) {
OPENSSL_free(attrs->values[code].number);
attrs->values[code].number = NULL;
CLEAR_ATTRBIT(attrs, code);
}
return STORE_ATTR_INFO_set_number(attrs, code, number);
}
struct attr_list_ctx_st {
OPENSSL_ITEM *attributes;
};
void *STORE_parse_attrs_start(OPENSSL_ITEM *attributes)
{
if (attributes) {
struct attr_list_ctx_st *context = (struct attr_list_ctx_st *)
OPENSSL_malloc(sizeof(struct attr_list_ctx_st));
if (context)
context->attributes = attributes;
else
STOREerr(STORE_F_STORE_PARSE_ATTRS_START, ERR_R_MALLOC_FAILURE);
return context;
}
STOREerr(STORE_F_STORE_PARSE_ATTRS_START, ERR_R_PASSED_NULL_PARAMETER);
return 0;
}
STORE_ATTR_INFO *STORE_parse_attrs_next(void *handle)
{
struct attr_list_ctx_st *context = (struct attr_list_ctx_st *)handle;
if (context && context->attributes) {
STORE_ATTR_INFO *attrs = NULL;
while (context->attributes
&& context->attributes->code != STORE_ATTR_OR
&& context->attributes->code != STORE_ATTR_END) {
switch (context->attributes->code) {
case STORE_ATTR_FRIENDLYNAME:
case STORE_ATTR_EMAIL:
case STORE_ATTR_FILENAME:
if (!attrs)
attrs = STORE_ATTR_INFO_new();
if (attrs == NULL) {
STOREerr(STORE_F_STORE_PARSE_ATTRS_NEXT,
ERR_R_MALLOC_FAILURE);
goto err;
}
STORE_ATTR_INFO_set_cstr(attrs,
context->attributes->code,
context->attributes->value,
context->attributes->value_size);
break;
case STORE_ATTR_KEYID:
case STORE_ATTR_ISSUERKEYID:
case STORE_ATTR_SUBJECTKEYID:
case STORE_ATTR_ISSUERSERIALHASH:
case STORE_ATTR_CERTHASH:
if (!attrs)
attrs = STORE_ATTR_INFO_new();
if (attrs == NULL) {
STOREerr(STORE_F_STORE_PARSE_ATTRS_NEXT,
ERR_R_MALLOC_FAILURE);
goto err;
}
STORE_ATTR_INFO_set_sha1str(attrs,
context->attributes->code,
context->attributes->value,
context->attributes->value_size);
break;
case STORE_ATTR_ISSUER:
case STORE_ATTR_SUBJECT:
if (!attrs)
attrs = STORE_ATTR_INFO_new();
if (attrs == NULL) {
STOREerr(STORE_F_STORE_PARSE_ATTRS_NEXT,
ERR_R_MALLOC_FAILURE);
goto err;
}
STORE_ATTR_INFO_modify_dn(attrs,
context->attributes->code,
context->attributes->value);
break;
case STORE_ATTR_SERIAL:
if (!attrs)
attrs = STORE_ATTR_INFO_new();
if (attrs == NULL) {
STOREerr(STORE_F_STORE_PARSE_ATTRS_NEXT,
ERR_R_MALLOC_FAILURE);
goto err;
}
STORE_ATTR_INFO_modify_number(attrs,
context->attributes->code,
context->attributes->value);
break;
}
context->attributes++;
}
if (context->attributes->code == STORE_ATTR_OR)
context->attributes++;
return attrs;
err:
while (context->attributes
&& context->attributes->code != STORE_ATTR_OR
&& context->attributes->code != STORE_ATTR_END)
context->attributes++;
if (context->attributes->code == STORE_ATTR_OR)
context->attributes++;
return NULL;
}
STOREerr(STORE_F_STORE_PARSE_ATTRS_NEXT, ERR_R_PASSED_NULL_PARAMETER);
return NULL;
}
int STORE_parse_attrs_end(void *handle)
{
struct attr_list_ctx_st *context = (struct attr_list_ctx_st *)handle;
if (context && context->attributes) {
#if 0
OPENSSL_ITEM *attributes = context->attributes;
#endif
OPENSSL_free(context);
return 1;
}
STOREerr(STORE_F_STORE_PARSE_ATTRS_END, ERR_R_PASSED_NULL_PARAMETER);
return 0;
}
int STORE_parse_attrs_endp(void *handle)
{
struct attr_list_ctx_st *context = (struct attr_list_ctx_st *)handle;
if (context && context->attributes) {
return context->attributes->code == STORE_ATTR_END;
}
STOREerr(STORE_F_STORE_PARSE_ATTRS_ENDP, ERR_R_PASSED_NULL_PARAMETER);
return 0;
}
static int attr_info_compare_compute_range(const unsigned char *abits,
const unsigned char *bbits,
unsigned int *alowp,
unsigned int *ahighp,
unsigned int *blowp,
unsigned int *bhighp)
{
unsigned int alow = (unsigned int)-1, ahigh = 0;
unsigned int blow = (unsigned int)-1, bhigh = 0;
int i, res = 0;
for (i = 0; i < (STORE_ATTR_TYPE_NUM + 8) / 8; i++, abits++, bbits++) {
if (res == 0) {
if (*abits < *bbits)
res = -1;
if (*abits > *bbits)
res = 1;
}
if (*abits) {
if (alow == (unsigned int)-1) {
alow = i * 8;
if (!(*abits & 0x01))
alow++;
if (!(*abits & 0x02))
alow++;
if (!(*abits & 0x04))
alow++;
if (!(*abits & 0x08))
alow++;
if (!(*abits & 0x10))
alow++;
if (!(*abits & 0x20))
alow++;
if (!(*abits & 0x40))
alow++;
}
ahigh = i * 8 + 7;
if (!(*abits & 0x80))
ahigh++;
if (!(*abits & 0x40))
ahigh++;
if (!(*abits & 0x20))
ahigh++;
if (!(*abits & 0x10))
ahigh++;
if (!(*abits & 0x08))
ahigh++;
if (!(*abits & 0x04))
ahigh++;
if (!(*abits & 0x02))
ahigh++;
}
if (*bbits) {
if (blow == (unsigned int)-1) {
blow = i * 8;
if (!(*bbits & 0x01))
blow++;
if (!(*bbits & 0x02))
blow++;
if (!(*bbits & 0x04))
blow++;
if (!(*bbits & 0x08))
blow++;
if (!(*bbits & 0x10))
blow++;
if (!(*bbits & 0x20))
blow++;
if (!(*bbits & 0x40))
blow++;
}
bhigh = i * 8 + 7;
if (!(*bbits & 0x80))
bhigh++;
if (!(*bbits & 0x40))
bhigh++;
if (!(*bbits & 0x20))
bhigh++;
if (!(*bbits & 0x10))
bhigh++;
if (!(*bbits & 0x08))
bhigh++;
if (!(*bbits & 0x04))
bhigh++;
if (!(*bbits & 0x02))
bhigh++;
}
}
if (ahigh + alow < bhigh + blow)
res = -1;
if (ahigh + alow > bhigh + blow)
res = 1;
if (alowp)
*alowp = alow;
if (ahighp)
*ahighp = ahigh;
if (blowp)
*blowp = blow;
if (bhighp)
*bhighp = bhigh;
return res;
}
int STORE_ATTR_INFO_compare(const STORE_ATTR_INFO *const *a,
const STORE_ATTR_INFO *const *b)
{
if (a == b)
return 0;
if (!a)
return -1;
if (!b)
return 1;
return attr_info_compare_compute_range((*a)->set, (*b)->set, 0, 0, 0, 0);
}
int STORE_ATTR_INFO_in_range(STORE_ATTR_INFO *a, STORE_ATTR_INFO *b)
{
unsigned int alow, ahigh, blow, bhigh;
if (a == b)
return 1;
if (!a)
return 0;
if (!b)
return 0;
attr_info_compare_compute_range(a->set, b->set,
&alow, &ahigh, &blow, &bhigh);
if (alow >= blow && ahigh <= bhigh)
return 1;
return 0;
}
int STORE_ATTR_INFO_in(STORE_ATTR_INFO *a, STORE_ATTR_INFO *b)
{
unsigned char *abits, *bbits;
int i;
if (a == b)
return 1;
if (!a)
return 0;
if (!b)
return 0;
abits = a->set;
bbits = b->set;
for (i = 0; i < (STORE_ATTR_TYPE_NUM + 8) / 8; i++, abits++, bbits++) {
if (*abits && (*bbits & *abits) != *abits)
return 0;
}
return 1;
}
int STORE_ATTR_INFO_in_ex(STORE_ATTR_INFO *a, STORE_ATTR_INFO *b)
{
STORE_ATTR_TYPES i;
if (a == b)
return 1;
if (!STORE_ATTR_INFO_in(a, b))
return 0;
for (i = 1; i < STORE_ATTR_TYPE_NUM; i++)
if (ATTR_IS_SET(a, i)) {
switch (i) {
case STORE_ATTR_FRIENDLYNAME:
case STORE_ATTR_EMAIL:
case STORE_ATTR_FILENAME:
if (strcmp(a->values[i].cstring, b->values[i].cstring))
return 0;
break;
case STORE_ATTR_KEYID:
case STORE_ATTR_ISSUERKEYID:
case STORE_ATTR_SUBJECTKEYID:
case STORE_ATTR_ISSUERSERIALHASH:
case STORE_ATTR_CERTHASH:
if (memcmp(a->values[i].sha1string,
b->values[i].sha1string, a->value_sizes[i]))
return 0;
break;
case STORE_ATTR_ISSUER:
case STORE_ATTR_SUBJECT:
if (X509_NAME_cmp(a->values[i].dn, b->values[i].dn))
return 0;
break;
case STORE_ATTR_SERIAL:
if (BN_cmp(a->values[i].number, b->values[i].number))
return 0;
break;
default:
break;
}
}
return 1;
}