]> git.ipfire.org Git - thirdparty/openssl.git/blob - crypto/x509/x509_lu.c
Allow NULL for some _free routines.
[thirdparty/openssl.git] / crypto / x509 / x509_lu.c
1 /*
2 * Copyright 1995-2017 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the OpenSSL license (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10 #include <stdio.h>
11 #include "internal/cryptlib.h"
12 #include "internal/refcount.h"
13 #include <openssl/x509.h>
14 #include "internal/x509_int.h"
15 #include <openssl/x509v3.h>
16 #include "x509_lcl.h"
17
18 X509_LOOKUP *X509_LOOKUP_new(X509_LOOKUP_METHOD *method)
19 {
20 X509_LOOKUP *ret;
21
22 ret = OPENSSL_zalloc(sizeof(*ret));
23 if (ret == NULL)
24 return NULL;
25
26 ret->method = method;
27 if ((method->new_item != NULL) && !method->new_item(ret)) {
28 OPENSSL_free(ret);
29 return NULL;
30 }
31 return ret;
32 }
33
34 void X509_LOOKUP_free(X509_LOOKUP *ctx)
35 {
36 if (ctx == NULL)
37 return;
38 if ((ctx->method != NULL) && (ctx->method->free != NULL))
39 (*ctx->method->free) (ctx);
40 OPENSSL_free(ctx);
41 }
42
43 int X509_STORE_lock(X509_STORE *s)
44 {
45 return CRYPTO_THREAD_write_lock(s->lock);
46 }
47
48 int X509_STORE_unlock(X509_STORE *s)
49 {
50 return CRYPTO_THREAD_unlock(s->lock);
51 }
52
53 int X509_LOOKUP_init(X509_LOOKUP *ctx)
54 {
55 if (ctx->method == NULL)
56 return 0;
57 if (ctx->method->init != NULL)
58 return ctx->method->init(ctx);
59 else
60 return 1;
61 }
62
63 int X509_LOOKUP_shutdown(X509_LOOKUP *ctx)
64 {
65 if (ctx->method == NULL)
66 return 0;
67 if (ctx->method->shutdown != NULL)
68 return ctx->method->shutdown(ctx);
69 else
70 return 1;
71 }
72
73 int X509_LOOKUP_ctrl(X509_LOOKUP *ctx, int cmd, const char *argc, long argl,
74 char **ret)
75 {
76 if (ctx->method == NULL)
77 return -1;
78 if (ctx->method->ctrl != NULL)
79 return ctx->method->ctrl(ctx, cmd, argc, argl, ret);
80 else
81 return 1;
82 }
83
84 int X509_LOOKUP_by_subject(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type,
85 X509_NAME *name, X509_OBJECT *ret)
86 {
87 if ((ctx->method == NULL) || (ctx->method->get_by_subject == NULL))
88 return 0;
89 if (ctx->skip)
90 return 0;
91 return ctx->method->get_by_subject(ctx, type, name, ret);
92 }
93
94 int X509_LOOKUP_by_issuer_serial(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type,
95 X509_NAME *name, ASN1_INTEGER *serial,
96 X509_OBJECT *ret)
97 {
98 if ((ctx->method == NULL) || (ctx->method->get_by_issuer_serial == NULL))
99 return 0;
100 return ctx->method->get_by_issuer_serial(ctx, type, name, serial, ret);
101 }
102
103 int X509_LOOKUP_by_fingerprint(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type,
104 const unsigned char *bytes, int len,
105 X509_OBJECT *ret)
106 {
107 if ((ctx->method == NULL) || (ctx->method->get_by_fingerprint == NULL))
108 return 0;
109 return ctx->method->get_by_fingerprint(ctx, type, bytes, len, ret);
110 }
111
112 int X509_LOOKUP_by_alias(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type,
113 const char *str, int len, X509_OBJECT *ret)
114 {
115 if ((ctx->method == NULL) || (ctx->method->get_by_alias == NULL))
116 return 0;
117 return ctx->method->get_by_alias(ctx, type, str, len, ret);
118 }
119
120 static int x509_object_cmp(const X509_OBJECT *const *a,
121 const X509_OBJECT *const *b)
122 {
123 int ret;
124
125 ret = ((*a)->type - (*b)->type);
126 if (ret)
127 return ret;
128 switch ((*a)->type) {
129 case X509_LU_X509:
130 ret = X509_subject_name_cmp((*a)->data.x509, (*b)->data.x509);
131 break;
132 case X509_LU_CRL:
133 ret = X509_CRL_cmp((*a)->data.crl, (*b)->data.crl);
134 break;
135 case X509_LU_NONE:
136 /* abort(); */
137 return 0;
138 }
139 return ret;
140 }
141
142 X509_STORE *X509_STORE_new(void)
143 {
144 X509_STORE *ret;
145
146 if ((ret = OPENSSL_zalloc(sizeof(*ret))) == NULL)
147 return NULL;
148 if ((ret->objs = sk_X509_OBJECT_new(x509_object_cmp)) == NULL)
149 goto err;
150 ret->cache = 1;
151 if ((ret->get_cert_methods = sk_X509_LOOKUP_new_null()) == NULL)
152 goto err;
153
154 if ((ret->param = X509_VERIFY_PARAM_new()) == NULL)
155 goto err;
156
157 if (!CRYPTO_new_ex_data(CRYPTO_EX_INDEX_X509_STORE, ret, &ret->ex_data))
158 goto err;
159
160 ret->lock = CRYPTO_THREAD_lock_new();
161 if (ret->lock == NULL)
162 goto err;
163
164 ret->references = 1;
165 return ret;
166
167 err:
168 X509_VERIFY_PARAM_free(ret->param);
169 sk_X509_OBJECT_free(ret->objs);
170 sk_X509_LOOKUP_free(ret->get_cert_methods);
171 OPENSSL_free(ret);
172 return NULL;
173 }
174
175 void X509_STORE_free(X509_STORE *vfy)
176 {
177 int i;
178 STACK_OF(X509_LOOKUP) *sk;
179 X509_LOOKUP *lu;
180
181 if (vfy == NULL)
182 return;
183 CRYPTO_DOWN_REF(&vfy->references, &i, vfy->lock);
184 REF_PRINT_COUNT("X509_STORE", vfy);
185 if (i > 0)
186 return;
187 REF_ASSERT_ISNT(i < 0);
188
189 sk = vfy->get_cert_methods;
190 for (i = 0; i < sk_X509_LOOKUP_num(sk); i++) {
191 lu = sk_X509_LOOKUP_value(sk, i);
192 X509_LOOKUP_shutdown(lu);
193 X509_LOOKUP_free(lu);
194 }
195 sk_X509_LOOKUP_free(sk);
196 sk_X509_OBJECT_pop_free(vfy->objs, X509_OBJECT_free);
197
198 CRYPTO_free_ex_data(CRYPTO_EX_INDEX_X509_STORE, vfy, &vfy->ex_data);
199 X509_VERIFY_PARAM_free(vfy->param);
200 CRYPTO_THREAD_lock_free(vfy->lock);
201 OPENSSL_free(vfy);
202 }
203
204 int X509_STORE_up_ref(X509_STORE *vfy)
205 {
206 int i;
207
208 if (CRYPTO_UP_REF(&vfy->references, &i, vfy->lock) <= 0)
209 return 0;
210
211 REF_PRINT_COUNT("X509_STORE", a);
212 REF_ASSERT_ISNT(i < 2);
213 return ((i > 1) ? 1 : 0);
214 }
215
216 X509_LOOKUP *X509_STORE_add_lookup(X509_STORE *v, X509_LOOKUP_METHOD *m)
217 {
218 int i;
219 STACK_OF(X509_LOOKUP) *sk;
220 X509_LOOKUP *lu;
221
222 sk = v->get_cert_methods;
223 for (i = 0; i < sk_X509_LOOKUP_num(sk); i++) {
224 lu = sk_X509_LOOKUP_value(sk, i);
225 if (m == lu->method) {
226 return lu;
227 }
228 }
229 /* a new one */
230 lu = X509_LOOKUP_new(m);
231 if (lu == NULL)
232 return NULL;
233 else {
234 lu->store_ctx = v;
235 if (sk_X509_LOOKUP_push(v->get_cert_methods, lu))
236 return lu;
237 else {
238 X509_LOOKUP_free(lu);
239 return NULL;
240 }
241 }
242 }
243
244 X509_OBJECT *X509_STORE_CTX_get_obj_by_subject(X509_STORE_CTX *vs,
245 X509_LOOKUP_TYPE type,
246 X509_NAME *name)
247 {
248 X509_OBJECT *ret = X509_OBJECT_new();
249
250 if (ret == NULL)
251 return NULL;
252 if (!X509_STORE_CTX_get_by_subject(vs, type, name, ret)) {
253 X509_OBJECT_free(ret);
254 return NULL;
255 }
256 return ret;
257 }
258
259 int X509_STORE_CTX_get_by_subject(X509_STORE_CTX *vs, X509_LOOKUP_TYPE type,
260 X509_NAME *name, X509_OBJECT *ret)
261 {
262 X509_STORE *ctx = vs->ctx;
263 X509_LOOKUP *lu;
264 X509_OBJECT stmp, *tmp;
265 int i, j;
266
267 CRYPTO_THREAD_write_lock(ctx->lock);
268 tmp = X509_OBJECT_retrieve_by_subject(ctx->objs, type, name);
269 CRYPTO_THREAD_unlock(ctx->lock);
270
271 if (tmp == NULL || type == X509_LU_CRL) {
272 for (i = 0; i < sk_X509_LOOKUP_num(ctx->get_cert_methods); i++) {
273 lu = sk_X509_LOOKUP_value(ctx->get_cert_methods, i);
274 j = X509_LOOKUP_by_subject(lu, type, name, &stmp);
275 if (j) {
276 tmp = &stmp;
277 break;
278 }
279 }
280 if (tmp == NULL)
281 return 0;
282 }
283
284 ret->type = tmp->type;
285 ret->data.ptr = tmp->data.ptr;
286
287 X509_OBJECT_up_ref_count(ret);
288
289 return 1;
290 }
291
292 static int x509_store_add(X509_STORE *ctx, void *x, int crl) {
293 X509_OBJECT *obj;
294 int ret = 0, added = 0;
295
296 if (x == NULL)
297 return 0;
298 obj = X509_OBJECT_new();
299 if (obj == NULL)
300 return 0;
301
302 if (crl) {
303 obj->type = X509_LU_CRL;
304 obj->data.crl = (X509_CRL *)x;
305 } else {
306 obj->type = X509_LU_X509;
307 obj->data.x509 = (X509 *)x;
308 }
309 X509_OBJECT_up_ref_count(obj);
310
311 CRYPTO_THREAD_write_lock(ctx->lock);
312
313 if (X509_OBJECT_retrieve_match(ctx->objs, obj)) {
314 ret = 1;
315 } else {
316 added = sk_X509_OBJECT_push(ctx->objs, obj);
317 ret = added != 0;
318 }
319
320 CRYPTO_THREAD_unlock(ctx->lock);
321
322 if (added == 0) /* obj not pushed */
323 X509_OBJECT_free(obj);
324
325 return ret;
326 }
327
328 int X509_STORE_add_cert(X509_STORE *ctx, X509 *x)
329 {
330 if (!x509_store_add(ctx, x, 0)) {
331 X509err(X509_F_X509_STORE_ADD_CERT, ERR_R_MALLOC_FAILURE);
332 return 0;
333 }
334 return 1;
335 }
336
337 int X509_STORE_add_crl(X509_STORE *ctx, X509_CRL *x)
338 {
339 if (!x509_store_add(ctx, x, 1)) {
340 X509err(X509_F_X509_STORE_ADD_CRL, ERR_R_MALLOC_FAILURE);
341 return 0;
342 }
343 return 1;
344 }
345
346 int X509_OBJECT_up_ref_count(X509_OBJECT *a)
347 {
348 switch (a->type) {
349 case X509_LU_NONE:
350 break;
351 case X509_LU_X509:
352 return X509_up_ref(a->data.x509);
353 case X509_LU_CRL:
354 return X509_CRL_up_ref(a->data.crl);
355 }
356 return 1;
357 }
358
359 X509 *X509_OBJECT_get0_X509(const X509_OBJECT *a)
360 {
361 if (a == NULL || a->type != X509_LU_X509)
362 return NULL;
363 return a->data.x509;
364 }
365
366 X509_CRL *X509_OBJECT_get0_X509_CRL(X509_OBJECT *a)
367 {
368 if (a == NULL || a->type != X509_LU_CRL)
369 return NULL;
370 return a->data.crl;
371 }
372
373 X509_LOOKUP_TYPE X509_OBJECT_get_type(const X509_OBJECT *a)
374 {
375 return a->type;
376 }
377
378 X509_OBJECT *X509_OBJECT_new()
379 {
380 X509_OBJECT *ret = OPENSSL_zalloc(sizeof(*ret));
381
382 if (ret == NULL) {
383 X509err(X509_F_X509_OBJECT_NEW, ERR_R_MALLOC_FAILURE);
384 return NULL;
385 }
386 ret->type = X509_LU_NONE;
387 return ret;
388 }
389
390
391 void X509_OBJECT_free(X509_OBJECT *a)
392 {
393 if (a == NULL)
394 return;
395 switch (a->type) {
396 case X509_LU_NONE:
397 break;
398 case X509_LU_X509:
399 X509_free(a->data.x509);
400 break;
401 case X509_LU_CRL:
402 X509_CRL_free(a->data.crl);
403 break;
404 }
405 OPENSSL_free(a);
406 }
407
408 static int x509_object_idx_cnt(STACK_OF(X509_OBJECT) *h, X509_LOOKUP_TYPE type,
409 X509_NAME *name, int *pnmatch)
410 {
411 X509_OBJECT stmp;
412 X509 x509_s;
413 X509_CRL crl_s;
414 int idx;
415
416 stmp.type = type;
417 switch (type) {
418 case X509_LU_X509:
419 stmp.data.x509 = &x509_s;
420 x509_s.cert_info.subject = name;
421 break;
422 case X509_LU_CRL:
423 stmp.data.crl = &crl_s;
424 crl_s.crl.issuer = name;
425 break;
426 case X509_LU_NONE:
427 /* abort(); */
428 return -1;
429 }
430
431 idx = sk_X509_OBJECT_find(h, &stmp);
432 if (idx >= 0 && pnmatch) {
433 int tidx;
434 const X509_OBJECT *tobj, *pstmp;
435 *pnmatch = 1;
436 pstmp = &stmp;
437 for (tidx = idx + 1; tidx < sk_X509_OBJECT_num(h); tidx++) {
438 tobj = sk_X509_OBJECT_value(h, tidx);
439 if (x509_object_cmp(&tobj, &pstmp))
440 break;
441 (*pnmatch)++;
442 }
443 }
444 return idx;
445 }
446
447 int X509_OBJECT_idx_by_subject(STACK_OF(X509_OBJECT) *h, X509_LOOKUP_TYPE type,
448 X509_NAME *name)
449 {
450 return x509_object_idx_cnt(h, type, name, NULL);
451 }
452
453 X509_OBJECT *X509_OBJECT_retrieve_by_subject(STACK_OF(X509_OBJECT) *h,
454 X509_LOOKUP_TYPE type,
455 X509_NAME *name)
456 {
457 int idx;
458 idx = X509_OBJECT_idx_by_subject(h, type, name);
459 if (idx == -1)
460 return NULL;
461 return sk_X509_OBJECT_value(h, idx);
462 }
463
464 STACK_OF(X509_OBJECT) *X509_STORE_get0_objects(X509_STORE *v)
465 {
466 return v->objs;
467 }
468
469 STACK_OF(X509) *X509_STORE_CTX_get1_certs(X509_STORE_CTX *ctx, X509_NAME *nm)
470 {
471 int i, idx, cnt;
472 STACK_OF(X509) *sk = NULL;
473 X509 *x;
474 X509_OBJECT *obj;
475
476 CRYPTO_THREAD_write_lock(ctx->ctx->lock);
477 idx = x509_object_idx_cnt(ctx->ctx->objs, X509_LU_X509, nm, &cnt);
478 if (idx < 0) {
479 /*
480 * Nothing found in cache: do lookup to possibly add new objects to
481 * cache
482 */
483 X509_OBJECT *xobj = X509_OBJECT_new();
484
485 CRYPTO_THREAD_unlock(ctx->ctx->lock);
486 if (xobj == NULL)
487 return NULL;
488 if (!X509_STORE_CTX_get_by_subject(ctx, X509_LU_X509, nm, xobj)) {
489 X509_OBJECT_free(xobj);
490 return NULL;
491 }
492 X509_OBJECT_free(xobj);
493 CRYPTO_THREAD_write_lock(ctx->ctx->lock);
494 idx = x509_object_idx_cnt(ctx->ctx->objs, X509_LU_X509, nm, &cnt);
495 if (idx < 0) {
496 CRYPTO_THREAD_unlock(ctx->ctx->lock);
497 return NULL;
498 }
499 }
500
501 sk = sk_X509_new_null();
502 for (i = 0; i < cnt; i++, idx++) {
503 obj = sk_X509_OBJECT_value(ctx->ctx->objs, idx);
504 x = obj->data.x509;
505 X509_up_ref(x);
506 if (!sk_X509_push(sk, x)) {
507 CRYPTO_THREAD_unlock(ctx->ctx->lock);
508 X509_free(x);
509 sk_X509_pop_free(sk, X509_free);
510 return NULL;
511 }
512 }
513 CRYPTO_THREAD_unlock(ctx->ctx->lock);
514 return sk;
515 }
516
517 STACK_OF(X509_CRL) *X509_STORE_CTX_get1_crls(X509_STORE_CTX *ctx, X509_NAME *nm)
518 {
519 int i, idx, cnt;
520 STACK_OF(X509_CRL) *sk = sk_X509_CRL_new_null();
521 X509_CRL *x;
522 X509_OBJECT *obj, *xobj = X509_OBJECT_new();
523
524 /* Always do lookup to possibly add new CRLs to cache */
525 if (sk == NULL || xobj == NULL ||
526 !X509_STORE_CTX_get_by_subject(ctx, X509_LU_CRL, nm, xobj)) {
527 X509_OBJECT_free(xobj);
528 sk_X509_CRL_free(sk);
529 return NULL;
530 }
531 X509_OBJECT_free(xobj);
532 CRYPTO_THREAD_write_lock(ctx->ctx->lock);
533 idx = x509_object_idx_cnt(ctx->ctx->objs, X509_LU_CRL, nm, &cnt);
534 if (idx < 0) {
535 CRYPTO_THREAD_unlock(ctx->ctx->lock);
536 sk_X509_CRL_free(sk);
537 return NULL;
538 }
539
540 for (i = 0; i < cnt; i++, idx++) {
541 obj = sk_X509_OBJECT_value(ctx->ctx->objs, idx);
542 x = obj->data.crl;
543 X509_CRL_up_ref(x);
544 if (!sk_X509_CRL_push(sk, x)) {
545 CRYPTO_THREAD_unlock(ctx->ctx->lock);
546 X509_CRL_free(x);
547 sk_X509_CRL_pop_free(sk, X509_CRL_free);
548 return NULL;
549 }
550 }
551 CRYPTO_THREAD_unlock(ctx->ctx->lock);
552 return sk;
553 }
554
555 X509_OBJECT *X509_OBJECT_retrieve_match(STACK_OF(X509_OBJECT) *h,
556 X509_OBJECT *x)
557 {
558 int idx, i;
559 X509_OBJECT *obj;
560 idx = sk_X509_OBJECT_find(h, x);
561 if (idx == -1)
562 return NULL;
563 if ((x->type != X509_LU_X509) && (x->type != X509_LU_CRL))
564 return sk_X509_OBJECT_value(h, idx);
565 for (i = idx; i < sk_X509_OBJECT_num(h); i++) {
566 obj = sk_X509_OBJECT_value(h, i);
567 if (x509_object_cmp
568 ((const X509_OBJECT **)&obj, (const X509_OBJECT **)&x))
569 return NULL;
570 if (x->type == X509_LU_X509) {
571 if (!X509_cmp(obj->data.x509, x->data.x509))
572 return obj;
573 } else if (x->type == X509_LU_CRL) {
574 if (!X509_CRL_match(obj->data.crl, x->data.crl))
575 return obj;
576 } else
577 return obj;
578 }
579 return NULL;
580 }
581
582 /*-
583 * Try to get issuer certificate from store. Due to limitations
584 * of the API this can only retrieve a single certificate matching
585 * a given subject name. However it will fill the cache with all
586 * matching certificates, so we can examine the cache for all
587 * matches.
588 *
589 * Return values are:
590 * 1 lookup successful.
591 * 0 certificate not found.
592 * -1 some other error.
593 */
594 int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x)
595 {
596 X509_NAME *xn;
597 X509_OBJECT *obj = X509_OBJECT_new(), *pobj = NULL;
598 int i, ok, idx, ret;
599
600 if (obj == NULL)
601 return -1;
602 *issuer = NULL;
603 xn = X509_get_issuer_name(x);
604 ok = X509_STORE_CTX_get_by_subject(ctx, X509_LU_X509, xn, obj);
605 if (ok != 1) {
606 X509_OBJECT_free(obj);
607 return 0;
608 }
609 /* If certificate matches all OK */
610 if (ctx->check_issued(ctx, x, obj->data.x509)) {
611 if (x509_check_cert_time(ctx, obj->data.x509, -1)) {
612 *issuer = obj->data.x509;
613 X509_up_ref(*issuer);
614 X509_OBJECT_free(obj);
615 return 1;
616 }
617 }
618 X509_OBJECT_free(obj);
619
620 /* Else find index of first cert accepted by 'check_issued' */
621 ret = 0;
622 CRYPTO_THREAD_write_lock(ctx->ctx->lock);
623 idx = X509_OBJECT_idx_by_subject(ctx->ctx->objs, X509_LU_X509, xn);
624 if (idx != -1) { /* should be true as we've had at least one
625 * match */
626 /* Look through all matching certs for suitable issuer */
627 for (i = idx; i < sk_X509_OBJECT_num(ctx->ctx->objs); i++) {
628 pobj = sk_X509_OBJECT_value(ctx->ctx->objs, i);
629 /* See if we've run past the matches */
630 if (pobj->type != X509_LU_X509)
631 break;
632 if (X509_NAME_cmp(xn, X509_get_subject_name(pobj->data.x509)))
633 break;
634 if (ctx->check_issued(ctx, x, pobj->data.x509)) {
635 *issuer = pobj->data.x509;
636 ret = 1;
637 /*
638 * If times check, exit with match,
639 * otherwise keep looking. Leave last
640 * match in issuer so we return nearest
641 * match if no certificate time is OK.
642 */
643
644 if (x509_check_cert_time(ctx, *issuer, -1))
645 break;
646 }
647 }
648 }
649 CRYPTO_THREAD_unlock(ctx->ctx->lock);
650 if (*issuer)
651 X509_up_ref(*issuer);
652 return ret;
653 }
654
655 int X509_STORE_set_flags(X509_STORE *ctx, unsigned long flags)
656 {
657 return X509_VERIFY_PARAM_set_flags(ctx->param, flags);
658 }
659
660 int X509_STORE_set_depth(X509_STORE *ctx, int depth)
661 {
662 X509_VERIFY_PARAM_set_depth(ctx->param, depth);
663 return 1;
664 }
665
666 int X509_STORE_set_purpose(X509_STORE *ctx, int purpose)
667 {
668 return X509_VERIFY_PARAM_set_purpose(ctx->param, purpose);
669 }
670
671 int X509_STORE_set_trust(X509_STORE *ctx, int trust)
672 {
673 return X509_VERIFY_PARAM_set_trust(ctx->param, trust);
674 }
675
676 int X509_STORE_set1_param(X509_STORE *ctx, X509_VERIFY_PARAM *param)
677 {
678 return X509_VERIFY_PARAM_set1(ctx->param, param);
679 }
680
681 X509_VERIFY_PARAM *X509_STORE_get0_param(X509_STORE *ctx)
682 {
683 return ctx->param;
684 }
685
686 void X509_STORE_set_verify(X509_STORE *ctx, X509_STORE_CTX_verify_fn verify)
687 {
688 ctx->verify = verify;
689 }
690
691 X509_STORE_CTX_verify_fn X509_STORE_get_verify(X509_STORE *ctx)
692 {
693 return ctx->verify;
694 }
695
696 void X509_STORE_set_verify_cb(X509_STORE *ctx,
697 X509_STORE_CTX_verify_cb verify_cb)
698 {
699 ctx->verify_cb = verify_cb;
700 }
701
702 X509_STORE_CTX_verify_cb X509_STORE_get_verify_cb(X509_STORE *ctx)
703 {
704 return ctx->verify_cb;
705 }
706
707 void X509_STORE_set_get_issuer(X509_STORE *ctx,
708 X509_STORE_CTX_get_issuer_fn get_issuer)
709 {
710 ctx->get_issuer = get_issuer;
711 }
712
713 X509_STORE_CTX_get_issuer_fn X509_STORE_get_get_issuer(X509_STORE *ctx)
714 {
715 return ctx->get_issuer;
716 }
717
718 void X509_STORE_set_check_issued(X509_STORE *ctx,
719 X509_STORE_CTX_check_issued_fn check_issued)
720 {
721 ctx->check_issued = check_issued;
722 }
723
724 X509_STORE_CTX_check_issued_fn X509_STORE_get_check_issued(X509_STORE *ctx)
725 {
726 return ctx->check_issued;
727 }
728
729 void X509_STORE_set_check_revocation(X509_STORE *ctx,
730 X509_STORE_CTX_check_revocation_fn check_revocation)
731 {
732 ctx->check_revocation = check_revocation;
733 }
734
735 X509_STORE_CTX_check_revocation_fn X509_STORE_get_check_revocation(X509_STORE *ctx)
736 {
737 return ctx->check_revocation;
738 }
739
740 void X509_STORE_set_get_crl(X509_STORE *ctx,
741 X509_STORE_CTX_get_crl_fn get_crl)
742 {
743 ctx->get_crl = get_crl;
744 }
745
746 X509_STORE_CTX_get_crl_fn X509_STORE_get_get_crl(X509_STORE *ctx)
747 {
748 return ctx->get_crl;
749 }
750
751 void X509_STORE_set_check_crl(X509_STORE *ctx,
752 X509_STORE_CTX_check_crl_fn check_crl)
753 {
754 ctx->check_crl = check_crl;
755 }
756
757 X509_STORE_CTX_check_crl_fn X509_STORE_get_check_crl(X509_STORE *ctx)
758 {
759 return ctx->check_crl;
760 }
761
762 void X509_STORE_set_cert_crl(X509_STORE *ctx,
763 X509_STORE_CTX_cert_crl_fn cert_crl)
764 {
765 ctx->cert_crl = cert_crl;
766 }
767
768 X509_STORE_CTX_cert_crl_fn X509_STORE_get_cert_crl(X509_STORE *ctx)
769 {
770 return ctx->cert_crl;
771 }
772
773 void X509_STORE_set_check_policy(X509_STORE *ctx,
774 X509_STORE_CTX_check_policy_fn check_policy)
775 {
776 ctx->check_policy = check_policy;
777 }
778
779 X509_STORE_CTX_check_policy_fn X509_STORE_get_check_policy(X509_STORE *ctx)
780 {
781 return ctx->check_policy;
782 }
783
784 void X509_STORE_set_lookup_certs(X509_STORE *ctx,
785 X509_STORE_CTX_lookup_certs_fn lookup_certs)
786 {
787 ctx->lookup_certs = lookup_certs;
788 }
789
790 X509_STORE_CTX_lookup_certs_fn X509_STORE_get_lookup_certs(X509_STORE *ctx)
791 {
792 return ctx->lookup_certs;
793 }
794
795 void X509_STORE_set_lookup_crls(X509_STORE *ctx,
796 X509_STORE_CTX_lookup_crls_fn lookup_crls)
797 {
798 ctx->lookup_crls = lookup_crls;
799 }
800
801 X509_STORE_CTX_lookup_crls_fn X509_STORE_get_lookup_crls(X509_STORE *ctx)
802 {
803 return ctx->lookup_crls;
804 }
805
806 void X509_STORE_set_cleanup(X509_STORE *ctx,
807 X509_STORE_CTX_cleanup_fn ctx_cleanup)
808 {
809 ctx->cleanup = ctx_cleanup;
810 }
811
812 X509_STORE_CTX_cleanup_fn X509_STORE_get_cleanup(X509_STORE *ctx)
813 {
814 return ctx->cleanup;
815 }
816
817 int X509_STORE_set_ex_data(X509_STORE *ctx, int idx, void *data)
818 {
819 return CRYPTO_set_ex_data(&ctx->ex_data, idx, data);
820 }
821
822 void *X509_STORE_get_ex_data(X509_STORE *ctx, int idx)
823 {
824 return CRYPTO_get_ex_data(&ctx->ex_data, idx);
825 }
826
827 X509_STORE *X509_STORE_CTX_get0_store(X509_STORE_CTX *ctx)
828 {
829 return ctx->ctx;
830 }