1 /* crypto/x509/x509_lu.c */ 2 /* Copyright (C) 1995-1998 Eric Young (eay (at) cryptsoft.com) 3 * All rights reserved. 4 * 5 * This package is an SSL implementation written 6 * by Eric Young (eay (at) cryptsoft.com). 7 * The implementation was written so as to conform with Netscapes SSL. 8 * 9 * This library is free for commercial and non-commercial use as long as 10 * the following conditions are aheared to. The following conditions 11 * apply to all code found in this distribution, be it the RC4, RSA, 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 13 * included with this distribution is covered by the same copyright terms 14 * except that the holder is Tim Hudson (tjh (at) cryptsoft.com). 15 * 16 * Copyright remains Eric Young's, and as such any Copyright notices in 17 * the code are not to be removed. 18 * If this package is used in a product, Eric Young should be given attribution 19 * as the author of the parts of the library used. 20 * This can be in the form of a textual message at program startup or 21 * in documentation (online or textual) provided with the package. 22 * 23 * Redistribution and use in source and binary forms, with or without 24 * modification, are permitted provided that the following conditions 25 * are met: 26 * 1. Redistributions of source code must retain the copyright 27 * notice, this list of conditions and the following disclaimer. 28 * 2. Redistributions in binary form must reproduce the above copyright 29 * notice, this list of conditions and the following disclaimer in the 30 * documentation and/or other materials provided with the distribution. 31 * 3. All advertising materials mentioning features or use of this software 32 * must display the following acknowledgement: 33 * "This product includes cryptographic software written by 34 * Eric Young (eay (at) cryptsoft.com)" 35 * The word 'cryptographic' can be left out if the rouines from the library 36 * being used are not cryptographic related :-). 37 * 4. If you include any Windows specific code (or a derivative thereof) from 38 * the apps directory (application code) you must include an acknowledgement: 39 * "This product includes software written by Tim Hudson (tjh (at) cryptsoft.com)" 40 * 41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 51 * SUCH DAMAGE. 52 * 53 * The licence and distribution terms for any publically available version or 54 * derivative of this code cannot be changed. i.e. this code cannot simply be 55 * copied and put under another distribution licence 56 * [including the GNU Public Licence.] */ 57 58 #include <string.h> 59 60 #include <openssl/err.h> 61 #include <openssl/mem.h> 62 #include <openssl/thread.h> 63 #include <openssl/x509.h> 64 #include <openssl/x509v3.h> 65 66 #include "../internal.h" 67 68 X509_LOOKUP *X509_LOOKUP_new(X509_LOOKUP_METHOD *method) 69 { 70 X509_LOOKUP *ret; 71 72 ret = (X509_LOOKUP *)OPENSSL_malloc(sizeof(X509_LOOKUP)); 73 if (ret == NULL) 74 return NULL; 75 76 ret->init = 0; 77 ret->skip = 0; 78 ret->method = method; 79 ret->method_data = NULL; 80 ret->store_ctx = NULL; 81 if ((method->new_item != NULL) && !method->new_item(ret)) { 82 OPENSSL_free(ret); 83 return NULL; 84 } 85 return ret; 86 } 87 88 void X509_LOOKUP_free(X509_LOOKUP *ctx) 89 { 90 if (ctx == NULL) 91 return; 92 if ((ctx->method != NULL) && (ctx->method->free != NULL)) 93 (*ctx->method->free) (ctx); 94 OPENSSL_free(ctx); 95 } 96 97 int X509_LOOKUP_init(X509_LOOKUP *ctx) 98 { 99 if (ctx->method == NULL) 100 return 0; 101 if (ctx->method->init != NULL) 102 return ctx->method->init(ctx); 103 else 104 return 1; 105 } 106 107 int X509_LOOKUP_shutdown(X509_LOOKUP *ctx) 108 { 109 if (ctx->method == NULL) 110 return 0; 111 if (ctx->method->shutdown != NULL) 112 return ctx->method->shutdown(ctx); 113 else 114 return 1; 115 } 116 117 int X509_LOOKUP_ctrl(X509_LOOKUP *ctx, int cmd, const char *argc, long argl, 118 char **ret) 119 { 120 if (ctx->method == NULL) 121 return -1; 122 if (ctx->method->ctrl != NULL) 123 return ctx->method->ctrl(ctx, cmd, argc, argl, ret); 124 else 125 return 1; 126 } 127 128 int X509_LOOKUP_by_subject(X509_LOOKUP *ctx, int type, X509_NAME *name, 129 X509_OBJECT *ret) 130 { 131 if ((ctx->method == NULL) || (ctx->method->get_by_subject == NULL)) 132 return 0; 133 if (ctx->skip) 134 return 0; 135 return ctx->method->get_by_subject(ctx, type, name, ret) > 0; 136 } 137 138 int X509_LOOKUP_by_issuer_serial(X509_LOOKUP *ctx, int type, X509_NAME *name, 139 ASN1_INTEGER *serial, X509_OBJECT *ret) 140 { 141 if ((ctx->method == NULL) || (ctx->method->get_by_issuer_serial == NULL)) 142 return 0; 143 return ctx->method->get_by_issuer_serial(ctx, type, name, serial, ret) > 0; 144 } 145 146 int X509_LOOKUP_by_fingerprint(X509_LOOKUP *ctx, int type, 147 unsigned char *bytes, int len, 148 X509_OBJECT *ret) 149 { 150 if ((ctx->method == NULL) || (ctx->method->get_by_fingerprint == NULL)) 151 return 0; 152 return ctx->method->get_by_fingerprint(ctx, type, bytes, len, ret) > 0; 153 } 154 155 int X509_LOOKUP_by_alias(X509_LOOKUP *ctx, int type, char *str, int len, 156 X509_OBJECT *ret) 157 { 158 if ((ctx->method == NULL) || (ctx->method->get_by_alias == NULL)) 159 return 0; 160 return ctx->method->get_by_alias(ctx, type, str, len, ret) > 0; 161 } 162 163 static int x509_object_cmp(const X509_OBJECT **a, const X509_OBJECT **b) 164 { 165 int ret; 166 167 ret = ((*a)->type - (*b)->type); 168 if (ret) 169 return ret; 170 switch ((*a)->type) { 171 case X509_LU_X509: 172 ret = X509_subject_name_cmp((*a)->data.x509, (*b)->data.x509); 173 break; 174 case X509_LU_CRL: 175 ret = X509_CRL_cmp((*a)->data.crl, (*b)->data.crl); 176 break; 177 default: 178 /* abort(); */ 179 return 0; 180 } 181 return ret; 182 } 183 184 X509_STORE *X509_STORE_new(void) 185 { 186 X509_STORE *ret; 187 188 if ((ret = (X509_STORE *)OPENSSL_malloc(sizeof(X509_STORE))) == NULL) 189 return NULL; 190 OPENSSL_memset(ret, 0, sizeof(*ret)); 191 CRYPTO_MUTEX_init(&ret->objs_lock); 192 ret->objs = sk_X509_OBJECT_new(x509_object_cmp); 193 if (ret->objs == NULL) 194 goto err; 195 ret->cache = 1; 196 ret->get_cert_methods = sk_X509_LOOKUP_new_null(); 197 if (ret->get_cert_methods == NULL) 198 goto err; 199 ret->param = X509_VERIFY_PARAM_new(); 200 if (ret->param == NULL) 201 goto err; 202 203 ret->references = 1; 204 return ret; 205 err: 206 if (ret) { 207 CRYPTO_MUTEX_cleanup(&ret->objs_lock); 208 if (ret->param) 209 X509_VERIFY_PARAM_free(ret->param); 210 if (ret->get_cert_methods) 211 sk_X509_LOOKUP_free(ret->get_cert_methods); 212 if (ret->objs) 213 sk_X509_OBJECT_free(ret->objs); 214 OPENSSL_free(ret); 215 } 216 return NULL; 217 } 218 219 int X509_STORE_up_ref(X509_STORE *store) 220 { 221 CRYPTO_refcount_inc(&store->references); 222 return 1; 223 } 224 225 static void cleanup(X509_OBJECT *a) 226 { 227 if (a == NULL) { 228 return; 229 } 230 if (a->type == X509_LU_X509) { 231 X509_free(a->data.x509); 232 } else if (a->type == X509_LU_CRL) { 233 X509_CRL_free(a->data.crl); 234 } else { 235 /* abort(); */ 236 } 237 238 OPENSSL_free(a); 239 } 240 241 void X509_STORE_free(X509_STORE *vfy) 242 { 243 size_t j; 244 STACK_OF(X509_LOOKUP) *sk; 245 X509_LOOKUP *lu; 246 247 if (vfy == NULL) 248 return; 249 250 if (!CRYPTO_refcount_dec_and_test_zero(&vfy->references)) { 251 return; 252 } 253 254 CRYPTO_MUTEX_cleanup(&vfy->objs_lock); 255 256 sk = vfy->get_cert_methods; 257 for (j = 0; j < sk_X509_LOOKUP_num(sk); j++) { 258 lu = sk_X509_LOOKUP_value(sk, j); 259 X509_LOOKUP_shutdown(lu); 260 X509_LOOKUP_free(lu); 261 } 262 sk_X509_LOOKUP_free(sk); 263 sk_X509_OBJECT_pop_free(vfy->objs, cleanup); 264 265 if (vfy->param) 266 X509_VERIFY_PARAM_free(vfy->param); 267 OPENSSL_free(vfy); 268 } 269 270 X509_LOOKUP *X509_STORE_add_lookup(X509_STORE *v, X509_LOOKUP_METHOD *m) 271 { 272 size_t i; 273 STACK_OF(X509_LOOKUP) *sk; 274 X509_LOOKUP *lu; 275 276 sk = v->get_cert_methods; 277 for (i = 0; i < sk_X509_LOOKUP_num(sk); i++) { 278 lu = sk_X509_LOOKUP_value(sk, i); 279 if (m == lu->method) { 280 return lu; 281 } 282 } 283 /* a new one */ 284 lu = X509_LOOKUP_new(m); 285 if (lu == NULL) 286 return NULL; 287 else { 288 lu->store_ctx = v; 289 if (sk_X509_LOOKUP_push(v->get_cert_methods, lu)) 290 return lu; 291 else { 292 X509_LOOKUP_free(lu); 293 return NULL; 294 } 295 } 296 } 297 298 int X509_STORE_get_by_subject(X509_STORE_CTX *vs, int type, X509_NAME *name, 299 X509_OBJECT *ret) 300 { 301 X509_STORE *ctx = vs->ctx; 302 X509_LOOKUP *lu; 303 X509_OBJECT stmp, *tmp; 304 int i; 305 306 CRYPTO_MUTEX_lock_write(&ctx->objs_lock); 307 tmp = X509_OBJECT_retrieve_by_subject(ctx->objs, type, name); 308 CRYPTO_MUTEX_unlock_write(&ctx->objs_lock); 309 310 if (tmp == NULL || type == X509_LU_CRL) { 311 for (i = 0; i < (int)sk_X509_LOOKUP_num(ctx->get_cert_methods); i++) { 312 lu = sk_X509_LOOKUP_value(ctx->get_cert_methods, i); 313 if (X509_LOOKUP_by_subject(lu, type, name, &stmp)) { 314 tmp = &stmp; 315 break; 316 } 317 } 318 if (tmp == NULL) 319 return 0; 320 } 321 322 /* 323 * if (ret->data.ptr != NULL) X509_OBJECT_free_contents(ret); 324 */ 325 326 ret->type = tmp->type; 327 ret->data.ptr = tmp->data.ptr; 328 329 X509_OBJECT_up_ref_count(ret); 330 331 return 1; 332 } 333 334 int X509_STORE_add_cert(X509_STORE *ctx, X509 *x) 335 { 336 X509_OBJECT *obj; 337 int ret = 1; 338 339 if (x == NULL) 340 return 0; 341 obj = (X509_OBJECT *)OPENSSL_malloc(sizeof(X509_OBJECT)); 342 if (obj == NULL) { 343 OPENSSL_PUT_ERROR(X509, ERR_R_MALLOC_FAILURE); 344 return 0; 345 } 346 obj->type = X509_LU_X509; 347 obj->data.x509 = x; 348 349 CRYPTO_MUTEX_lock_write(&ctx->objs_lock); 350 351 X509_OBJECT_up_ref_count(obj); 352 353 if (X509_OBJECT_retrieve_match(ctx->objs, obj)) { 354 X509_OBJECT_free_contents(obj); 355 OPENSSL_free(obj); 356 OPENSSL_PUT_ERROR(X509, X509_R_CERT_ALREADY_IN_HASH_TABLE); 357 ret = 0; 358 } else if (!sk_X509_OBJECT_push(ctx->objs, obj)) { 359 X509_OBJECT_free_contents(obj); 360 OPENSSL_free(obj); 361 OPENSSL_PUT_ERROR(X509, ERR_R_MALLOC_FAILURE); 362 ret = 0; 363 } 364 365 CRYPTO_MUTEX_unlock_write(&ctx->objs_lock); 366 367 return ret; 368 } 369 370 int X509_STORE_add_crl(X509_STORE *ctx, X509_CRL *x) 371 { 372 X509_OBJECT *obj; 373 int ret = 1; 374 375 if (x == NULL) 376 return 0; 377 obj = (X509_OBJECT *)OPENSSL_malloc(sizeof(X509_OBJECT)); 378 if (obj == NULL) { 379 OPENSSL_PUT_ERROR(X509, ERR_R_MALLOC_FAILURE); 380 return 0; 381 } 382 obj->type = X509_LU_CRL; 383 obj->data.crl = x; 384 385 CRYPTO_MUTEX_lock_write(&ctx->objs_lock); 386 387 X509_OBJECT_up_ref_count(obj); 388 389 if (X509_OBJECT_retrieve_match(ctx->objs, obj)) { 390 X509_OBJECT_free_contents(obj); 391 OPENSSL_free(obj); 392 OPENSSL_PUT_ERROR(X509, X509_R_CERT_ALREADY_IN_HASH_TABLE); 393 ret = 0; 394 } else if (!sk_X509_OBJECT_push(ctx->objs, obj)) { 395 X509_OBJECT_free_contents(obj); 396 OPENSSL_free(obj); 397 OPENSSL_PUT_ERROR(X509, ERR_R_MALLOC_FAILURE); 398 ret = 0; 399 } 400 401 CRYPTO_MUTEX_unlock_write(&ctx->objs_lock); 402 403 return ret; 404 } 405 406 void X509_STORE_set0_additional_untrusted(X509_STORE *ctx, 407 STACK_OF(X509) *untrusted) { 408 ctx->additional_untrusted = untrusted; 409 } 410 411 int X509_OBJECT_up_ref_count(X509_OBJECT *a) 412 { 413 switch (a->type) { 414 case X509_LU_X509: 415 X509_up_ref(a->data.x509); 416 break; 417 case X509_LU_CRL: 418 X509_CRL_up_ref(a->data.crl); 419 break; 420 } 421 return 1; 422 } 423 424 void X509_OBJECT_free_contents(X509_OBJECT *a) 425 { 426 switch (a->type) { 427 case X509_LU_X509: 428 X509_free(a->data.x509); 429 break; 430 case X509_LU_CRL: 431 X509_CRL_free(a->data.crl); 432 break; 433 } 434 } 435 436 int X509_OBJECT_get_type(const X509_OBJECT *a) 437 { 438 return a->type; 439 } 440 441 X509 *X509_OBJECT_get0_X509(const X509_OBJECT *a) 442 { 443 if (a == NULL || a->type != X509_LU_X509) { 444 return NULL; 445 } 446 return a->data.x509; 447 } 448 449 static int x509_object_idx_cnt(STACK_OF(X509_OBJECT) *h, int type, 450 X509_NAME *name, int *pnmatch) 451 { 452 X509_OBJECT stmp; 453 X509 x509_s; 454 X509_CINF cinf_s; 455 X509_CRL crl_s; 456 X509_CRL_INFO crl_info_s; 457 458 stmp.type = type; 459 switch (type) { 460 case X509_LU_X509: 461 stmp.data.x509 = &x509_s; 462 x509_s.cert_info = &cinf_s; 463 cinf_s.subject = name; 464 break; 465 case X509_LU_CRL: 466 stmp.data.crl = &crl_s; 467 crl_s.crl = &crl_info_s; 468 crl_info_s.issuer = name; 469 break; 470 default: 471 /* abort(); */ 472 return -1; 473 } 474 475 size_t idx; 476 sk_X509_OBJECT_sort(h); 477 if (!sk_X509_OBJECT_find(h, &idx, &stmp)) 478 return -1; 479 480 if (pnmatch != NULL) { 481 int tidx; 482 const X509_OBJECT *tobj, *pstmp; 483 *pnmatch = 1; 484 pstmp = &stmp; 485 for (tidx = idx + 1; tidx < (int)sk_X509_OBJECT_num(h); tidx++) { 486 tobj = sk_X509_OBJECT_value(h, tidx); 487 if (x509_object_cmp(&tobj, &pstmp)) 488 break; 489 (*pnmatch)++; 490 } 491 } 492 493 return idx; 494 } 495 496 int X509_OBJECT_idx_by_subject(STACK_OF(X509_OBJECT) *h, int type, 497 X509_NAME *name) 498 { 499 return x509_object_idx_cnt(h, type, name, NULL); 500 } 501 502 X509_OBJECT *X509_OBJECT_retrieve_by_subject(STACK_OF(X509_OBJECT) *h, 503 int type, X509_NAME *name) 504 { 505 int idx; 506 idx = X509_OBJECT_idx_by_subject(h, type, name); 507 if (idx == -1) 508 return NULL; 509 return sk_X509_OBJECT_value(h, idx); 510 } 511 512 STACK_OF(X509_OBJECT) *X509_STORE_get0_objects(X509_STORE *st) 513 { 514 return st->objs; 515 } 516 517 STACK_OF (X509) * X509_STORE_get1_certs(X509_STORE_CTX *ctx, X509_NAME *nm) 518 { 519 int i, idx, cnt; 520 STACK_OF(X509) *sk; 521 X509 *x; 522 X509_OBJECT *obj; 523 sk = sk_X509_new_null(); 524 if (sk == NULL) 525 return NULL; 526 CRYPTO_MUTEX_lock_write(&ctx->ctx->objs_lock); 527 idx = x509_object_idx_cnt(ctx->ctx->objs, X509_LU_X509, nm, &cnt); 528 if (idx < 0) { 529 /* 530 * Nothing found in cache: do lookup to possibly add new objects to 531 * cache 532 */ 533 X509_OBJECT xobj; 534 CRYPTO_MUTEX_unlock_write(&ctx->ctx->objs_lock); 535 if (!X509_STORE_get_by_subject(ctx, X509_LU_X509, nm, &xobj)) { 536 sk_X509_free(sk); 537 return NULL; 538 } 539 X509_OBJECT_free_contents(&xobj); 540 CRYPTO_MUTEX_lock_write(&ctx->ctx->objs_lock); 541 idx = x509_object_idx_cnt(ctx->ctx->objs, X509_LU_X509, nm, &cnt); 542 if (idx < 0) { 543 CRYPTO_MUTEX_unlock_write(&ctx->ctx->objs_lock); 544 sk_X509_free(sk); 545 return NULL; 546 } 547 } 548 for (i = 0; i < cnt; i++, idx++) { 549 obj = sk_X509_OBJECT_value(ctx->ctx->objs, idx); 550 x = obj->data.x509; 551 if (!sk_X509_push(sk, x)) { 552 CRYPTO_MUTEX_unlock_write(&ctx->ctx->objs_lock); 553 sk_X509_pop_free(sk, X509_free); 554 return NULL; 555 } 556 X509_up_ref(x); 557 } 558 CRYPTO_MUTEX_unlock_write(&ctx->ctx->objs_lock); 559 return sk; 560 561 } 562 563 STACK_OF (X509_CRL) * X509_STORE_get1_crls(X509_STORE_CTX *ctx, X509_NAME *nm) 564 { 565 int i, idx, cnt; 566 STACK_OF(X509_CRL) *sk; 567 X509_CRL *x; 568 X509_OBJECT *obj, xobj; 569 sk = sk_X509_CRL_new_null(); 570 if (sk == NULL) 571 return NULL; 572 573 /* Always do lookup to possibly add new CRLs to cache. */ 574 if (!X509_STORE_get_by_subject(ctx, X509_LU_CRL, nm, &xobj)) { 575 sk_X509_CRL_free(sk); 576 return NULL; 577 } 578 X509_OBJECT_free_contents(&xobj); 579 CRYPTO_MUTEX_lock_write(&ctx->ctx->objs_lock); 580 idx = x509_object_idx_cnt(ctx->ctx->objs, X509_LU_CRL, nm, &cnt); 581 if (idx < 0) { 582 CRYPTO_MUTEX_unlock_write(&ctx->ctx->objs_lock); 583 sk_X509_CRL_free(sk); 584 return NULL; 585 } 586 587 for (i = 0; i < cnt; i++, idx++) { 588 obj = sk_X509_OBJECT_value(ctx->ctx->objs, idx); 589 x = obj->data.crl; 590 X509_CRL_up_ref(x); 591 if (!sk_X509_CRL_push(sk, x)) { 592 CRYPTO_MUTEX_unlock_write(&ctx->ctx->objs_lock); 593 X509_CRL_free(x); 594 sk_X509_CRL_pop_free(sk, X509_CRL_free); 595 return NULL; 596 } 597 } 598 CRYPTO_MUTEX_unlock_write(&ctx->ctx->objs_lock); 599 return sk; 600 } 601 602 X509_OBJECT *X509_OBJECT_retrieve_match(STACK_OF(X509_OBJECT) *h, 603 X509_OBJECT *x) 604 { 605 size_t idx, i; 606 X509_OBJECT *obj; 607 608 sk_X509_OBJECT_sort(h); 609 if (!sk_X509_OBJECT_find(h, &idx, x)) { 610 return NULL; 611 } 612 if ((x->type != X509_LU_X509) && (x->type != X509_LU_CRL)) 613 return sk_X509_OBJECT_value(h, idx); 614 for (i = idx; i < sk_X509_OBJECT_num(h); i++) { 615 obj = sk_X509_OBJECT_value(h, i); 616 if (x509_object_cmp 617 ((const X509_OBJECT **)&obj, (const X509_OBJECT **)&x)) 618 return NULL; 619 if (x->type == X509_LU_X509) { 620 if (!X509_cmp(obj->data.x509, x->data.x509)) 621 return obj; 622 } else if (x->type == X509_LU_CRL) { 623 if (!X509_CRL_match(obj->data.crl, x->data.crl)) 624 return obj; 625 } else 626 return obj; 627 } 628 return NULL; 629 } 630 631 /* 632 * Try to get issuer certificate from store. Due to limitations of the API 633 * this can only retrieve a single certificate matching a given subject name. 634 * However it will fill the cache with all matching certificates, so we can 635 * examine the cache for all matches. Return values are: 1 lookup 636 * successful. 0 certificate not found. -1 some other error. 637 */ 638 int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) 639 { 640 X509_NAME *xn; 641 X509_OBJECT obj, *pobj; 642 int idx, ret; 643 size_t i; 644 xn = X509_get_issuer_name(x); 645 if (!X509_STORE_get_by_subject(ctx, X509_LU_X509, xn, &obj)) 646 return 0; 647 /* If certificate matches all OK */ 648 if (ctx->check_issued(ctx, x, obj.data.x509)) { 649 *issuer = obj.data.x509; 650 return 1; 651 } 652 X509_OBJECT_free_contents(&obj); 653 654 /* Else find index of first cert accepted by 'check_issued' */ 655 ret = 0; 656 CRYPTO_MUTEX_lock_write(&ctx->ctx->objs_lock); 657 idx = X509_OBJECT_idx_by_subject(ctx->ctx->objs, X509_LU_X509, xn); 658 if (idx != -1) { /* should be true as we've had at least one 659 * match */ 660 /* Look through all matching certs for suitable issuer */ 661 for (i = idx; i < sk_X509_OBJECT_num(ctx->ctx->objs); i++) { 662 pobj = sk_X509_OBJECT_value(ctx->ctx->objs, i); 663 /* See if we've run past the matches */ 664 if (pobj->type != X509_LU_X509) 665 break; 666 if (X509_NAME_cmp(xn, X509_get_subject_name(pobj->data.x509))) 667 break; 668 if (ctx->check_issued(ctx, x, pobj->data.x509)) { 669 *issuer = pobj->data.x509; 670 X509_OBJECT_up_ref_count(pobj); 671 ret = 1; 672 break; 673 } 674 } 675 } 676 CRYPTO_MUTEX_unlock_write(&ctx->ctx->objs_lock); 677 return ret; 678 } 679 680 int X509_STORE_set_flags(X509_STORE *ctx, unsigned long flags) 681 { 682 return X509_VERIFY_PARAM_set_flags(ctx->param, flags); 683 } 684 685 int X509_STORE_set_depth(X509_STORE *ctx, int depth) 686 { 687 X509_VERIFY_PARAM_set_depth(ctx->param, depth); 688 return 1; 689 } 690 691 int X509_STORE_set_purpose(X509_STORE *ctx, int purpose) 692 { 693 return X509_VERIFY_PARAM_set_purpose(ctx->param, purpose); 694 } 695 696 int X509_STORE_set_trust(X509_STORE *ctx, int trust) 697 { 698 return X509_VERIFY_PARAM_set_trust(ctx->param, trust); 699 } 700 701 int X509_STORE_set1_param(X509_STORE *ctx, X509_VERIFY_PARAM *param) 702 { 703 return X509_VERIFY_PARAM_set1(ctx->param, param); 704 } 705 706 X509_VERIFY_PARAM *X509_STORE_get0_param(X509_STORE *ctx) 707 { 708 return ctx->param; 709 } 710 711 void X509_STORE_set_verify(X509_STORE *ctx, X509_STORE_CTX_verify_fn verify) 712 { 713 ctx->verify = verify; 714 } 715 716 X509_STORE_CTX_verify_fn X509_STORE_get_verify(X509_STORE *ctx) 717 { 718 return ctx->verify; 719 } 720 721 void X509_STORE_set_verify_cb(X509_STORE *ctx, 722 X509_STORE_CTX_verify_cb verify_cb) 723 { 724 ctx->verify_cb = verify_cb; 725 } 726 727 X509_STORE_CTX_verify_cb X509_STORE_get_verify_cb(X509_STORE *ctx) 728 { 729 return ctx->verify_cb; 730 } 731 732 void X509_STORE_set_get_issuer(X509_STORE *ctx, 733 X509_STORE_CTX_get_issuer_fn get_issuer) 734 { 735 ctx->get_issuer = get_issuer; 736 } 737 738 X509_STORE_CTX_get_issuer_fn X509_STORE_get_get_issuer(X509_STORE *ctx) 739 { 740 return ctx->get_issuer; 741 } 742 743 void X509_STORE_set_check_issued(X509_STORE *ctx, 744 X509_STORE_CTX_check_issued_fn check_issued) 745 { 746 ctx->check_issued = check_issued; 747 } 748 749 X509_STORE_CTX_check_issued_fn X509_STORE_get_check_issued(X509_STORE *ctx) 750 { 751 return ctx->check_issued; 752 } 753 754 void X509_STORE_set_check_revocation(X509_STORE *ctx, 755 X509_STORE_CTX_check_revocation_fn check_revocation) 756 { 757 ctx->check_revocation = check_revocation; 758 } 759 760 X509_STORE_CTX_check_revocation_fn X509_STORE_get_check_revocation(X509_STORE *ctx) 761 { 762 return ctx->check_revocation; 763 } 764 765 void X509_STORE_set_get_crl(X509_STORE *ctx, 766 X509_STORE_CTX_get_crl_fn get_crl) 767 { 768 ctx->get_crl = get_crl; 769 } 770 771 X509_STORE_CTX_get_crl_fn X509_STORE_get_get_crl(X509_STORE *ctx) 772 { 773 return ctx->get_crl; 774 } 775 776 void X509_STORE_set_check_crl(X509_STORE *ctx, 777 X509_STORE_CTX_check_crl_fn check_crl) 778 { 779 ctx->check_crl = check_crl; 780 } 781 782 X509_STORE_CTX_check_crl_fn X509_STORE_get_check_crl(X509_STORE *ctx) 783 { 784 return ctx->check_crl; 785 } 786 787 void X509_STORE_set_cert_crl(X509_STORE *ctx, 788 X509_STORE_CTX_cert_crl_fn cert_crl) 789 { 790 ctx->cert_crl = cert_crl; 791 } 792 793 X509_STORE_CTX_cert_crl_fn X509_STORE_get_cert_crl(X509_STORE *ctx) 794 { 795 return ctx->cert_crl; 796 } 797 798 void X509_STORE_set_lookup_certs(X509_STORE *ctx, 799 X509_STORE_CTX_lookup_certs_fn lookup_certs) 800 { 801 ctx->lookup_certs = lookup_certs; 802 } 803 804 X509_STORE_CTX_lookup_certs_fn X509_STORE_get_lookup_certs(X509_STORE *ctx) 805 { 806 return ctx->lookup_certs; 807 } 808 809 void X509_STORE_set_lookup_crls(X509_STORE *ctx, 810 X509_STORE_CTX_lookup_crls_fn lookup_crls) 811 { 812 ctx->lookup_crls = lookup_crls; 813 } 814 815 X509_STORE_CTX_lookup_crls_fn X509_STORE_get_lookup_crls(X509_STORE *ctx) 816 { 817 return ctx->lookup_crls; 818 } 819 820 void X509_STORE_set_cleanup(X509_STORE *ctx, 821 X509_STORE_CTX_cleanup_fn ctx_cleanup) 822 { 823 ctx->cleanup = ctx_cleanup; 824 } 825 826 X509_STORE_CTX_cleanup_fn X509_STORE_get_cleanup(X509_STORE *ctx) 827 { 828 return ctx->cleanup; 829 } 830 831 X509_STORE *X509_STORE_CTX_get0_store(X509_STORE_CTX *ctx) 832 { 833 return ctx->ctx; 834 } 835