]> git.ipfire.org Git - thirdparty/openssl.git/blob - crypto/x509/x509_lu.c
Update copyright year
[thirdparty/openssl.git] / crypto / x509 / x509_lu.c
1 /*
2 * Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10 #include <stdio.h>
11 #include "internal/cryptlib.h"
12 #include "internal/refcount.h"
13 #include <openssl/x509.h>
14 #include "crypto/x509.h"
15 #include <openssl/x509v3.h>
16 #include "x509_local.h"
17
18 X509_LOOKUP *X509_LOOKUP_new(X509_LOOKUP_METHOD *method)
19 {
20 X509_LOOKUP *ret = OPENSSL_zalloc(sizeof(*ret));
21
22 if (ret == NULL) {
23 X509err(X509_F_X509_LOOKUP_NEW, ERR_R_MALLOC_FAILURE);
24 return NULL;
25 }
26
27 ret->method = method;
28 if (method->new_item != NULL && method->new_item(ret) == 0) {
29 OPENSSL_free(ret);
30 return NULL;
31 }
32 return ret;
33 }
34
35 void X509_LOOKUP_free(X509_LOOKUP *ctx)
36 {
37 if (ctx == NULL)
38 return;
39 if ((ctx->method != NULL) && (ctx->method->free != NULL))
40 (*ctx->method->free) (ctx);
41 OPENSSL_free(ctx);
42 }
43
44 int X509_STORE_lock(X509_STORE *s)
45 {
46 return CRYPTO_THREAD_write_lock(s->lock);
47 }
48
49 int X509_STORE_unlock(X509_STORE *s)
50 {
51 return CRYPTO_THREAD_unlock(s->lock);
52 }
53
54 int X509_LOOKUP_init(X509_LOOKUP *ctx)
55 {
56 if (ctx->method == NULL)
57 return 0;
58 if (ctx->method->init != NULL)
59 return ctx->method->init(ctx);
60 else
61 return 1;
62 }
63
64 int X509_LOOKUP_shutdown(X509_LOOKUP *ctx)
65 {
66 if (ctx->method == NULL)
67 return 0;
68 if (ctx->method->shutdown != NULL)
69 return ctx->method->shutdown(ctx);
70 else
71 return 1;
72 }
73
74 int X509_LOOKUP_ctrl(X509_LOOKUP *ctx, int cmd, const char *argc, long argl,
75 char **ret)
76 {
77 if (ctx->method == NULL)
78 return -1;
79 if (ctx->method->ctrl != NULL)
80 return ctx->method->ctrl(ctx, cmd, argc, argl, ret);
81 else
82 return 1;
83 }
84
85 int X509_LOOKUP_by_subject(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type,
86 const X509_NAME *name, X509_OBJECT *ret)
87 {
88 if ((ctx->method == NULL) || (ctx->method->get_by_subject == NULL))
89 return 0;
90 if (ctx->skip)
91 return 0;
92 return ctx->method->get_by_subject(ctx, type, name, ret);
93 }
94
95 int X509_LOOKUP_by_issuer_serial(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type,
96 const X509_NAME *name,
97 const ASN1_INTEGER *serial,
98 X509_OBJECT *ret)
99 {
100 if ((ctx->method == NULL) || (ctx->method->get_by_issuer_serial == NULL))
101 return 0;
102 return ctx->method->get_by_issuer_serial(ctx, type, name, serial, ret);
103 }
104
105 int X509_LOOKUP_by_fingerprint(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type,
106 const unsigned char *bytes, int len,
107 X509_OBJECT *ret)
108 {
109 if ((ctx->method == NULL) || (ctx->method->get_by_fingerprint == NULL))
110 return 0;
111 return ctx->method->get_by_fingerprint(ctx, type, bytes, len, ret);
112 }
113
114 int X509_LOOKUP_by_alias(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type,
115 const char *str, int len, X509_OBJECT *ret)
116 {
117 if ((ctx->method == NULL) || (ctx->method->get_by_alias == NULL))
118 return 0;
119 return ctx->method->get_by_alias(ctx, type, str, len, ret);
120 }
121
122 int X509_LOOKUP_set_method_data(X509_LOOKUP *ctx, void *data)
123 {
124 ctx->method_data = data;
125 return 1;
126 }
127
128 void *X509_LOOKUP_get_method_data(const X509_LOOKUP *ctx)
129 {
130 return ctx->method_data;
131 }
132
133 X509_STORE *X509_LOOKUP_get_store(const X509_LOOKUP *ctx)
134 {
135 return ctx->store_ctx;
136 }
137
138
139 static int x509_object_cmp(const X509_OBJECT *const *a,
140 const X509_OBJECT *const *b)
141 {
142 int ret;
143
144 ret = ((*a)->type - (*b)->type);
145 if (ret)
146 return ret;
147 switch ((*a)->type) {
148 case X509_LU_X509:
149 ret = X509_subject_name_cmp((*a)->data.x509, (*b)->data.x509);
150 break;
151 case X509_LU_CRL:
152 ret = X509_CRL_cmp((*a)->data.crl, (*b)->data.crl);
153 break;
154 case X509_LU_NONE:
155 /* abort(); */
156 return 0;
157 }
158 return ret;
159 }
160
161 X509_STORE *X509_STORE_new(void)
162 {
163 X509_STORE *ret = OPENSSL_zalloc(sizeof(*ret));
164
165 if (ret == NULL) {
166 X509err(X509_F_X509_STORE_NEW, ERR_R_MALLOC_FAILURE);
167 return NULL;
168 }
169 if ((ret->objs = sk_X509_OBJECT_new(x509_object_cmp)) == NULL) {
170 X509err(X509_F_X509_STORE_NEW, ERR_R_MALLOC_FAILURE);
171 goto err;
172 }
173 ret->cache = 1;
174 if ((ret->get_cert_methods = sk_X509_LOOKUP_new_null()) == NULL) {
175 X509err(X509_F_X509_STORE_NEW, ERR_R_MALLOC_FAILURE);
176 goto err;
177 }
178
179 if ((ret->param = X509_VERIFY_PARAM_new()) == NULL) {
180 X509err(X509_F_X509_STORE_NEW, ERR_R_MALLOC_FAILURE);
181 goto err;
182 }
183 if (!CRYPTO_new_ex_data(CRYPTO_EX_INDEX_X509_STORE, ret, &ret->ex_data)) {
184 X509err(X509_F_X509_STORE_NEW, ERR_R_MALLOC_FAILURE);
185 goto err;
186 }
187
188 ret->lock = CRYPTO_THREAD_lock_new();
189 if (ret->lock == NULL) {
190 X509err(X509_F_X509_STORE_NEW, ERR_R_MALLOC_FAILURE);
191 goto err;
192 }
193
194 ret->references = 1;
195 return ret;
196
197 err:
198 X509_VERIFY_PARAM_free(ret->param);
199 sk_X509_OBJECT_free(ret->objs);
200 sk_X509_LOOKUP_free(ret->get_cert_methods);
201 OPENSSL_free(ret);
202 return NULL;
203 }
204
205 void X509_STORE_free(X509_STORE *vfy)
206 {
207 int i;
208 STACK_OF(X509_LOOKUP) *sk;
209 X509_LOOKUP *lu;
210
211 if (vfy == NULL)
212 return;
213 CRYPTO_DOWN_REF(&vfy->references, &i, vfy->lock);
214 REF_PRINT_COUNT("X509_STORE", vfy);
215 if (i > 0)
216 return;
217 REF_ASSERT_ISNT(i < 0);
218
219 sk = vfy->get_cert_methods;
220 for (i = 0; i < sk_X509_LOOKUP_num(sk); i++) {
221 lu = sk_X509_LOOKUP_value(sk, i);
222 X509_LOOKUP_shutdown(lu);
223 X509_LOOKUP_free(lu);
224 }
225 sk_X509_LOOKUP_free(sk);
226 sk_X509_OBJECT_pop_free(vfy->objs, X509_OBJECT_free);
227
228 CRYPTO_free_ex_data(CRYPTO_EX_INDEX_X509_STORE, vfy, &vfy->ex_data);
229 X509_VERIFY_PARAM_free(vfy->param);
230 CRYPTO_THREAD_lock_free(vfy->lock);
231 OPENSSL_free(vfy);
232 }
233
234 int X509_STORE_up_ref(X509_STORE *vfy)
235 {
236 int i;
237
238 if (CRYPTO_UP_REF(&vfy->references, &i, vfy->lock) <= 0)
239 return 0;
240
241 REF_PRINT_COUNT("X509_STORE", vfy);
242 REF_ASSERT_ISNT(i < 2);
243 return ((i > 1) ? 1 : 0);
244 }
245
246 X509_LOOKUP *X509_STORE_add_lookup(X509_STORE *v, X509_LOOKUP_METHOD *m)
247 {
248 int i;
249 STACK_OF(X509_LOOKUP) *sk;
250 X509_LOOKUP *lu;
251
252 sk = v->get_cert_methods;
253 for (i = 0; i < sk_X509_LOOKUP_num(sk); i++) {
254 lu = sk_X509_LOOKUP_value(sk, i);
255 if (m == lu->method) {
256 return lu;
257 }
258 }
259 /* a new one */
260 lu = X509_LOOKUP_new(m);
261 if (lu == NULL) {
262 X509err(X509_F_X509_STORE_ADD_LOOKUP, ERR_R_MALLOC_FAILURE);
263 return NULL;
264 }
265
266 lu->store_ctx = v;
267 if (sk_X509_LOOKUP_push(v->get_cert_methods, lu))
268 return lu;
269 /* malloc failed */
270 X509err(X509_F_X509_STORE_ADD_LOOKUP, ERR_R_MALLOC_FAILURE);
271 X509_LOOKUP_free(lu);
272 return NULL;
273 }
274
275 X509_OBJECT *X509_STORE_CTX_get_obj_by_subject(X509_STORE_CTX *vs,
276 X509_LOOKUP_TYPE type,
277 const X509_NAME *name)
278 {
279 X509_OBJECT *ret = X509_OBJECT_new();
280
281 if (ret == NULL)
282 return NULL;
283 if (!X509_STORE_CTX_get_by_subject(vs, type, name, ret)) {
284 X509_OBJECT_free(ret);
285 return NULL;
286 }
287 return ret;
288 }
289
290 int X509_STORE_CTX_get_by_subject(const X509_STORE_CTX *vs,
291 X509_LOOKUP_TYPE type,
292 const X509_NAME *name, X509_OBJECT *ret)
293 {
294 X509_STORE *store = vs->store;
295 X509_LOOKUP *lu;
296 X509_OBJECT stmp, *tmp;
297 int i, j;
298
299 if (store == NULL)
300 return 0;
301
302 stmp.type = X509_LU_NONE;
303 stmp.data.ptr = NULL;
304
305
306 X509_STORE_lock(store);
307 tmp = X509_OBJECT_retrieve_by_subject(store->objs, type, name);
308 X509_STORE_unlock(store);
309
310 if (tmp == NULL || type == X509_LU_CRL) {
311 for (i = 0; i < sk_X509_LOOKUP_num(store->get_cert_methods); i++) {
312 lu = sk_X509_LOOKUP_value(store->get_cert_methods, i);
313 j = X509_LOOKUP_by_subject(lu, type, name, &stmp);
314 if (j) {
315 tmp = &stmp;
316 break;
317 }
318 }
319 if (tmp == NULL)
320 return 0;
321 }
322
323 if (!X509_OBJECT_up_ref_count(tmp))
324 return 0;
325
326 ret->type = tmp->type;
327 ret->data.ptr = tmp->data.ptr;
328
329 return 1;
330 }
331
332 static int x509_store_add(X509_STORE *store, void *x, int crl) {
333 X509_OBJECT *obj;
334 int ret = 0, added = 0;
335
336 if (x == NULL)
337 return 0;
338 obj = X509_OBJECT_new();
339 if (obj == NULL)
340 return 0;
341
342 if (crl) {
343 obj->type = X509_LU_CRL;
344 obj->data.crl = (X509_CRL *)x;
345 } else {
346 obj->type = X509_LU_X509;
347 obj->data.x509 = (X509 *)x;
348 }
349 if (!X509_OBJECT_up_ref_count(obj)) {
350 obj->type = X509_LU_NONE;
351 X509_OBJECT_free(obj);
352 return 0;
353 }
354
355 X509_STORE_lock(store);
356 if (X509_OBJECT_retrieve_match(store->objs, obj)) {
357 ret = 1;
358 } else {
359 added = sk_X509_OBJECT_push(store->objs, obj);
360 ret = added != 0;
361 }
362 X509_STORE_unlock(store);
363
364 if (added == 0) /* obj not pushed */
365 X509_OBJECT_free(obj);
366
367 return ret;
368 }
369
370 int X509_STORE_add_cert(X509_STORE *ctx, X509 *x)
371 {
372 if (!x509_store_add(ctx, x, 0)) {
373 X509err(X509_F_X509_STORE_ADD_CERT, ERR_R_MALLOC_FAILURE);
374 return 0;
375 }
376 return 1;
377 }
378
379 int X509_STORE_add_crl(X509_STORE *ctx, X509_CRL *x)
380 {
381 if (!x509_store_add(ctx, x, 1)) {
382 X509err(X509_F_X509_STORE_ADD_CRL, ERR_R_MALLOC_FAILURE);
383 return 0;
384 }
385 return 1;
386 }
387
388 int X509_OBJECT_up_ref_count(X509_OBJECT *a)
389 {
390 switch (a->type) {
391 case X509_LU_NONE:
392 break;
393 case X509_LU_X509:
394 return X509_up_ref(a->data.x509);
395 case X509_LU_CRL:
396 return X509_CRL_up_ref(a->data.crl);
397 }
398 return 1;
399 }
400
401 X509 *X509_OBJECT_get0_X509(const X509_OBJECT *a)
402 {
403 if (a == NULL || a->type != X509_LU_X509)
404 return NULL;
405 return a->data.x509;
406 }
407
408 X509_CRL *X509_OBJECT_get0_X509_CRL(const X509_OBJECT *a)
409 {
410 if (a == NULL || a->type != X509_LU_CRL)
411 return NULL;
412 return a->data.crl;
413 }
414
415 X509_LOOKUP_TYPE X509_OBJECT_get_type(const X509_OBJECT *a)
416 {
417 return a->type;
418 }
419
420 X509_OBJECT *X509_OBJECT_new(void)
421 {
422 X509_OBJECT *ret = OPENSSL_zalloc(sizeof(*ret));
423
424 if (ret == NULL) {
425 X509err(X509_F_X509_OBJECT_NEW, ERR_R_MALLOC_FAILURE);
426 return NULL;
427 }
428 ret->type = X509_LU_NONE;
429 return ret;
430 }
431
432 static void x509_object_free_internal(X509_OBJECT *a)
433 {
434 if (a == NULL)
435 return;
436 switch (a->type) {
437 case X509_LU_NONE:
438 break;
439 case X509_LU_X509:
440 X509_free(a->data.x509);
441 break;
442 case X509_LU_CRL:
443 X509_CRL_free(a->data.crl);
444 break;
445 }
446 }
447
448 int X509_OBJECT_set1_X509(X509_OBJECT *a, X509 *obj)
449 {
450 if (a == NULL || !X509_up_ref(obj))
451 return 0;
452
453 x509_object_free_internal(a);
454 a->type = X509_LU_X509;
455 a->data.x509 = obj;
456 return 1;
457 }
458
459 int X509_OBJECT_set1_X509_CRL(X509_OBJECT *a, X509_CRL *obj)
460 {
461 if (a == NULL || !X509_CRL_up_ref(obj))
462 return 0;
463
464 x509_object_free_internal(a);
465 a->type = X509_LU_CRL;
466 a->data.crl = obj;
467 return 1;
468 }
469
470 void X509_OBJECT_free(X509_OBJECT *a)
471 {
472 x509_object_free_internal(a);
473 OPENSSL_free(a);
474 }
475
476 static int x509_object_idx_cnt(STACK_OF(X509_OBJECT) *h, X509_LOOKUP_TYPE type,
477 const X509_NAME *name, int *pnmatch)
478 {
479 X509_OBJECT stmp;
480 X509 x509_s;
481 X509_CRL crl_s;
482 int idx;
483
484 stmp.type = type;
485 switch (type) {
486 case X509_LU_X509:
487 stmp.data.x509 = &x509_s;
488 x509_s.cert_info.subject = (X509_NAME *)name; /* won't modify it */
489 break;
490 case X509_LU_CRL:
491 stmp.data.crl = &crl_s;
492 crl_s.crl.issuer = (X509_NAME *)name; /* won't modify it */
493 break;
494 case X509_LU_NONE:
495 /* abort(); */
496 return -1;
497 }
498
499 idx = sk_X509_OBJECT_find(h, &stmp);
500 if (idx >= 0 && pnmatch) {
501 int tidx;
502 const X509_OBJECT *tobj, *pstmp;
503 *pnmatch = 1;
504 pstmp = &stmp;
505 for (tidx = idx + 1; tidx < sk_X509_OBJECT_num(h); tidx++) {
506 tobj = sk_X509_OBJECT_value(h, tidx);
507 if (x509_object_cmp(&tobj, &pstmp))
508 break;
509 (*pnmatch)++;
510 }
511 }
512 return idx;
513 }
514
515 int X509_OBJECT_idx_by_subject(STACK_OF(X509_OBJECT) *h, X509_LOOKUP_TYPE type,
516 const X509_NAME *name)
517 {
518 return x509_object_idx_cnt(h, type, name, NULL);
519 }
520
521 X509_OBJECT *X509_OBJECT_retrieve_by_subject(STACK_OF(X509_OBJECT) *h,
522 X509_LOOKUP_TYPE type,
523 const X509_NAME *name)
524 {
525 int idx;
526 idx = X509_OBJECT_idx_by_subject(h, type, name);
527 if (idx == -1)
528 return NULL;
529 return sk_X509_OBJECT_value(h, idx);
530 }
531
532 STACK_OF(X509_OBJECT) *X509_STORE_get0_objects(const X509_STORE *v)
533 {
534 return v->objs;
535 }
536
537 /* TODO param type could be constified as change to lock is intermittent */
538 STACK_OF(X509) *X509_STORE_get1_all_certs(X509_STORE *store)
539 {
540 STACK_OF(X509) *sk;
541 STACK_OF(X509_OBJECT) *objs;
542 int i;
543
544 if (store == NULL) {
545 X509err(0, ERR_R_PASSED_NULL_PARAMETER);
546 return NULL;
547 }
548 if ((sk = sk_X509_new_null()) == NULL)
549 return NULL;
550 X509_STORE_lock(store);
551 objs = X509_STORE_get0_objects(store);
552 for (i = 0; i < sk_X509_OBJECT_num(objs); i++) {
553 X509 *cert = X509_OBJECT_get0_X509(sk_X509_OBJECT_value(objs, i));
554
555 if (cert != NULL) {
556 if (!X509_up_ref(cert))
557 goto err;
558 if (!sk_X509_push(sk, cert)) {
559 X509_free(cert);
560 goto err;
561 }
562 }
563 }
564 X509_STORE_unlock(store);
565 return sk;
566
567 err:
568 X509_STORE_unlock(store);
569 sk_X509_pop_free(sk, X509_free);
570 return NULL;
571 }
572
573 STACK_OF(X509) *X509_STORE_CTX_get1_certs(X509_STORE_CTX *ctx,
574 const X509_NAME *nm)
575 {
576 int i, idx, cnt;
577 STACK_OF(X509) *sk = NULL;
578 X509 *x;
579 X509_OBJECT *obj;
580 X509_STORE *store = ctx->store;
581
582 if (store == NULL)
583 return NULL;
584
585 X509_STORE_lock(store);
586 idx = x509_object_idx_cnt(store->objs, X509_LU_X509, nm, &cnt);
587 if (idx < 0) {
588 /*
589 * Nothing found in cache: do lookup to possibly add new objects to
590 * cache
591 */
592 X509_OBJECT *xobj = X509_OBJECT_new();
593
594 X509_STORE_unlock(store);
595
596 if (xobj == NULL)
597 return NULL;
598 if (!X509_STORE_CTX_get_by_subject(ctx, X509_LU_X509, nm, xobj)) {
599 X509_OBJECT_free(xobj);
600 return NULL;
601 }
602 X509_OBJECT_free(xobj);
603 X509_STORE_lock(store);
604 idx = x509_object_idx_cnt(store->objs, X509_LU_X509, nm, &cnt);
605 if (idx < 0) {
606 X509_STORE_unlock(store);
607 return NULL;
608 }
609 }
610
611 sk = sk_X509_new_null();
612 for (i = 0; i < cnt; i++, idx++) {
613 obj = sk_X509_OBJECT_value(store->objs, idx);
614 x = obj->data.x509;
615 if (!X509_up_ref(x)) {
616 X509_STORE_unlock(store);
617 sk_X509_pop_free(sk, X509_free);
618 return NULL;
619 }
620 if (!sk_X509_push(sk, x)) {
621 X509_STORE_unlock(store);
622 X509_free(x);
623 sk_X509_pop_free(sk, X509_free);
624 return NULL;
625 }
626 }
627 X509_STORE_unlock(store);
628 return sk;
629 }
630
631 STACK_OF(X509_CRL) *X509_STORE_CTX_get1_crls(const X509_STORE_CTX *ctx,
632 const X509_NAME *nm)
633 {
634 int i, idx, cnt;
635 STACK_OF(X509_CRL) *sk = sk_X509_CRL_new_null();
636 X509_CRL *x;
637 X509_OBJECT *obj, *xobj = X509_OBJECT_new();
638 X509_STORE *store = ctx->store;
639
640 /* Always do lookup to possibly add new CRLs to cache */
641 if (sk == NULL
642 || xobj == NULL
643 || store == NULL
644 || !X509_STORE_CTX_get_by_subject(ctx, X509_LU_CRL, nm, xobj)) {
645 X509_OBJECT_free(xobj);
646 sk_X509_CRL_free(sk);
647 return NULL;
648 }
649 X509_OBJECT_free(xobj);
650 X509_STORE_lock(store);
651 idx = x509_object_idx_cnt(store->objs, X509_LU_CRL, nm, &cnt);
652 if (idx < 0) {
653 X509_STORE_unlock(store);
654 sk_X509_CRL_free(sk);
655 return NULL;
656 }
657
658 for (i = 0; i < cnt; i++, idx++) {
659 obj = sk_X509_OBJECT_value(store->objs, idx);
660 x = obj->data.crl;
661 if (!X509_CRL_up_ref(x)) {
662 X509_STORE_unlock(store);
663 sk_X509_CRL_pop_free(sk, X509_CRL_free);
664 return NULL;
665 }
666 if (!sk_X509_CRL_push(sk, x)) {
667 X509_STORE_unlock(store);
668 X509_CRL_free(x);
669 sk_X509_CRL_pop_free(sk, X509_CRL_free);
670 return NULL;
671 }
672 }
673 X509_STORE_unlock(store);
674 return sk;
675 }
676
677 X509_OBJECT *X509_OBJECT_retrieve_match(STACK_OF(X509_OBJECT) *h,
678 X509_OBJECT *x)
679 {
680 int idx, i, num;
681 X509_OBJECT *obj;
682
683 idx = sk_X509_OBJECT_find(h, x);
684 if (idx < 0)
685 return NULL;
686 if ((x->type != X509_LU_X509) && (x->type != X509_LU_CRL))
687 return sk_X509_OBJECT_value(h, idx);
688 for (i = idx, num = sk_X509_OBJECT_num(h); i < num; i++) {
689 obj = sk_X509_OBJECT_value(h, i);
690 if (x509_object_cmp((const X509_OBJECT **)&obj,
691 (const X509_OBJECT **)&x))
692 return NULL;
693 if (x->type == X509_LU_X509) {
694 if (!X509_cmp(obj->data.x509, x->data.x509))
695 return obj;
696 } else if (x->type == X509_LU_CRL) {
697 if (!X509_CRL_match(obj->data.crl, x->data.crl))
698 return obj;
699 } else
700 return obj;
701 }
702 return NULL;
703 }
704
705 /*-
706 * Try to get issuer certificate from store. Due to limitations
707 * of the API this can only retrieve a single certificate matching
708 * a given subject name. However it will fill the cache with all
709 * matching certificates, so we can examine the cache for all
710 * matches.
711 *
712 * Return values are:
713 * 1 lookup successful.
714 * 0 certificate not found.
715 * -1 some other error.
716 */
717 int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x)
718 {
719 const X509_NAME *xn;
720 X509_OBJECT *obj = X509_OBJECT_new(), *pobj = NULL;
721 X509_STORE *store = ctx->store;
722 int i, ok, idx, ret;
723
724 if (obj == NULL)
725 return -1;
726 *issuer = NULL;
727 xn = X509_get_issuer_name(x);
728 ok = X509_STORE_CTX_get_by_subject(ctx, X509_LU_X509, xn, obj);
729 if (ok != 1) {
730 X509_OBJECT_free(obj);
731 return 0;
732 }
733 /* If certificate matches all OK */
734 if (ctx->check_issued(ctx, x, obj->data.x509)) {
735 if (x509_check_cert_time(ctx, obj->data.x509, -1)) {
736 *issuer = obj->data.x509;
737 if (!X509_up_ref(*issuer)) {
738 *issuer = NULL;
739 ok = -1;
740 }
741 X509_OBJECT_free(obj);
742 return ok;
743 }
744 }
745 X509_OBJECT_free(obj);
746
747 if (store == NULL)
748 return 0;
749
750 /* Else find index of first cert accepted by 'check_issued' */
751 ret = 0;
752 X509_STORE_lock(store);
753 idx = X509_OBJECT_idx_by_subject(store->objs, X509_LU_X509, xn);
754 if (idx != -1) { /* should be true as we've had at least one
755 * match */
756 /* Look through all matching certs for suitable issuer */
757 for (i = idx; i < sk_X509_OBJECT_num(store->objs); i++) {
758 pobj = sk_X509_OBJECT_value(store->objs, i);
759 /* See if we've run past the matches */
760 if (pobj->type != X509_LU_X509)
761 break;
762 if (X509_NAME_cmp(xn, X509_get_subject_name(pobj->data.x509)))
763 break;
764 if (ctx->check_issued(ctx, x, pobj->data.x509)) {
765 *issuer = pobj->data.x509;
766 ret = 1;
767 /*
768 * If times check, exit with match,
769 * otherwise keep looking. Leave last
770 * match in issuer so we return nearest
771 * match if no certificate time is OK.
772 */
773
774 if (x509_check_cert_time(ctx, *issuer, -1))
775 break;
776 }
777 }
778 }
779 if (*issuer && !X509_up_ref(*issuer)) {
780 *issuer = NULL;
781 ret = -1;
782 }
783 X509_STORE_unlock(store);
784 return ret;
785 }
786
787 int X509_STORE_set_flags(X509_STORE *ctx, unsigned long flags)
788 {
789 return X509_VERIFY_PARAM_set_flags(ctx->param, flags);
790 }
791
792 int X509_STORE_set_depth(X509_STORE *ctx, int depth)
793 {
794 X509_VERIFY_PARAM_set_depth(ctx->param, depth);
795 return 1;
796 }
797
798 int X509_STORE_set_purpose(X509_STORE *ctx, int purpose)
799 {
800 return X509_VERIFY_PARAM_set_purpose(ctx->param, purpose);
801 }
802
803 int X509_STORE_set_trust(X509_STORE *ctx, int trust)
804 {
805 return X509_VERIFY_PARAM_set_trust(ctx->param, trust);
806 }
807
808 int X509_STORE_set1_param(X509_STORE *ctx, const X509_VERIFY_PARAM *param)
809 {
810 return X509_VERIFY_PARAM_set1(ctx->param, param);
811 }
812
813 X509_VERIFY_PARAM *X509_STORE_get0_param(const X509_STORE *ctx)
814 {
815 return ctx->param;
816 }
817
818 void X509_STORE_set_verify(X509_STORE *ctx, X509_STORE_CTX_verify_fn verify)
819 {
820 ctx->verify = verify;
821 }
822
823 X509_STORE_CTX_verify_fn X509_STORE_get_verify(const X509_STORE *ctx)
824 {
825 return ctx->verify;
826 }
827
828 void X509_STORE_set_verify_cb(X509_STORE *ctx,
829 X509_STORE_CTX_verify_cb verify_cb)
830 {
831 ctx->verify_cb = verify_cb;
832 }
833
834 X509_STORE_CTX_verify_cb X509_STORE_get_verify_cb(const X509_STORE *ctx)
835 {
836 return ctx->verify_cb;
837 }
838
839 void X509_STORE_set_get_issuer(X509_STORE *ctx,
840 X509_STORE_CTX_get_issuer_fn get_issuer)
841 {
842 ctx->get_issuer = get_issuer;
843 }
844
845 X509_STORE_CTX_get_issuer_fn X509_STORE_get_get_issuer(const X509_STORE *ctx)
846 {
847 return ctx->get_issuer;
848 }
849
850 void X509_STORE_set_check_issued(X509_STORE *ctx,
851 X509_STORE_CTX_check_issued_fn check_issued)
852 {
853 ctx->check_issued = check_issued;
854 }
855
856 X509_STORE_CTX_check_issued_fn X509_STORE_get_check_issued(const X509_STORE *ctx)
857 {
858 return ctx->check_issued;
859 }
860
861 void X509_STORE_set_check_revocation(X509_STORE *ctx,
862 X509_STORE_CTX_check_revocation_fn check_revocation)
863 {
864 ctx->check_revocation = check_revocation;
865 }
866
867 X509_STORE_CTX_check_revocation_fn X509_STORE_get_check_revocation(const X509_STORE *ctx)
868 {
869 return ctx->check_revocation;
870 }
871
872 void X509_STORE_set_get_crl(X509_STORE *ctx,
873 X509_STORE_CTX_get_crl_fn get_crl)
874 {
875 ctx->get_crl = get_crl;
876 }
877
878 X509_STORE_CTX_get_crl_fn X509_STORE_get_get_crl(const X509_STORE *ctx)
879 {
880 return ctx->get_crl;
881 }
882
883 void X509_STORE_set_check_crl(X509_STORE *ctx,
884 X509_STORE_CTX_check_crl_fn check_crl)
885 {
886 ctx->check_crl = check_crl;
887 }
888
889 X509_STORE_CTX_check_crl_fn X509_STORE_get_check_crl(const X509_STORE *ctx)
890 {
891 return ctx->check_crl;
892 }
893
894 void X509_STORE_set_cert_crl(X509_STORE *ctx,
895 X509_STORE_CTX_cert_crl_fn cert_crl)
896 {
897 ctx->cert_crl = cert_crl;
898 }
899
900 X509_STORE_CTX_cert_crl_fn X509_STORE_get_cert_crl(const X509_STORE *ctx)
901 {
902 return ctx->cert_crl;
903 }
904
905 void X509_STORE_set_check_policy(X509_STORE *ctx,
906 X509_STORE_CTX_check_policy_fn check_policy)
907 {
908 ctx->check_policy = check_policy;
909 }
910
911 X509_STORE_CTX_check_policy_fn X509_STORE_get_check_policy(const X509_STORE *ctx)
912 {
913 return ctx->check_policy;
914 }
915
916 void X509_STORE_set_lookup_certs(X509_STORE *ctx,
917 X509_STORE_CTX_lookup_certs_fn lookup_certs)
918 {
919 ctx->lookup_certs = lookup_certs;
920 }
921
922 X509_STORE_CTX_lookup_certs_fn X509_STORE_get_lookup_certs(const X509_STORE *ctx)
923 {
924 return ctx->lookup_certs;
925 }
926
927 void X509_STORE_set_lookup_crls(X509_STORE *ctx,
928 X509_STORE_CTX_lookup_crls_fn lookup_crls)
929 {
930 ctx->lookup_crls = lookup_crls;
931 }
932
933 X509_STORE_CTX_lookup_crls_fn X509_STORE_get_lookup_crls(const X509_STORE *ctx)
934 {
935 return ctx->lookup_crls;
936 }
937
938 void X509_STORE_set_cleanup(X509_STORE *ctx,
939 X509_STORE_CTX_cleanup_fn ctx_cleanup)
940 {
941 ctx->cleanup = ctx_cleanup;
942 }
943
944 X509_STORE_CTX_cleanup_fn X509_STORE_get_cleanup(const X509_STORE *ctx)
945 {
946 return ctx->cleanup;
947 }
948
949 int X509_STORE_set_ex_data(X509_STORE *ctx, int idx, void *data)
950 {
951 return CRYPTO_set_ex_data(&ctx->ex_data, idx, data);
952 }
953
954 void *X509_STORE_get_ex_data(const X509_STORE *ctx, int idx)
955 {
956 return CRYPTO_get_ex_data(&ctx->ex_data, idx);
957 }
958
959 X509_STORE *X509_STORE_CTX_get0_store(const X509_STORE_CTX *ctx)
960 {
961 return ctx->store;
962 }