Home | History | Annotate | Download | only in x509
      1 /* crypto/x509/x509_lu.c */
      2 /* Copyright (C) 1995-1998 Eric Young (eay (at) cryptsoft.com)
      3  * All rights reserved.
      4  *
      5  * This package is an SSL implementation written
      6  * by Eric Young (eay (at) cryptsoft.com).
      7  * The implementation was written so as to conform with Netscapes SSL.
      8  *
      9  * This library is free for commercial and non-commercial use as long as
     10  * the following conditions are aheared to.  The following conditions
     11  * apply to all code found in this distribution, be it the RC4, RSA,
     12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
     13  * included with this distribution is covered by the same copyright terms
     14  * except that the holder is Tim Hudson (tjh (at) cryptsoft.com).
     15  *
     16  * Copyright remains Eric Young's, and as such any Copyright notices in
     17  * the code are not to be removed.
     18  * If this package is used in a product, Eric Young should be given attribution
     19  * as the author of the parts of the library used.
     20  * This can be in the form of a textual message at program startup or
     21  * in documentation (online or textual) provided with the package.
     22  *
     23  * Redistribution and use in source and binary forms, with or without
     24  * modification, are permitted provided that the following conditions
     25  * are met:
     26  * 1. Redistributions of source code must retain the copyright
     27  *    notice, this list of conditions and the following disclaimer.
     28  * 2. Redistributions in binary form must reproduce the above copyright
     29  *    notice, this list of conditions and the following disclaimer in the
     30  *    documentation and/or other materials provided with the distribution.
     31  * 3. All advertising materials mentioning features or use of this software
     32  *    must display the following acknowledgement:
     33  *    "This product includes cryptographic software written by
     34  *     Eric Young (eay (at) cryptsoft.com)"
     35  *    The word 'cryptographic' can be left out if the rouines from the library
     36  *    being used are not cryptographic related :-).
     37  * 4. If you include any Windows specific code (or a derivative thereof) from
     38  *    the apps directory (application code) you must include an acknowledgement:
     39  *    "This product includes software written by Tim Hudson (tjh (at) cryptsoft.com)"
     40  *
     41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
     42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
     45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     51  * SUCH DAMAGE.
     52  *
     53  * The licence and distribution terms for any publically available version or
     54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
     55  * copied and put under another distribution licence
     56  * [including the GNU Public Licence.] */
     57 
     58 #include <string.h>
     59 
     60 #include <openssl/err.h>
     61 #include <openssl/mem.h>
     62 #include <openssl/thread.h>
     63 #include <openssl/x509.h>
     64 #include <openssl/x509v3.h>
     65 
     66 #include "../internal.h"
     67 
     68 X509_LOOKUP *X509_LOOKUP_new(X509_LOOKUP_METHOD *method)
     69 {
     70     X509_LOOKUP *ret;
     71 
     72     ret = (X509_LOOKUP *)OPENSSL_malloc(sizeof(X509_LOOKUP));
     73     if (ret == NULL)
     74         return NULL;
     75 
     76     ret->init = 0;
     77     ret->skip = 0;
     78     ret->method = method;
     79     ret->method_data = NULL;
     80     ret->store_ctx = NULL;
     81     if ((method->new_item != NULL) && !method->new_item(ret)) {
     82         OPENSSL_free(ret);
     83         return NULL;
     84     }
     85     return ret;
     86 }
     87 
     88 void X509_LOOKUP_free(X509_LOOKUP *ctx)
     89 {
     90     if (ctx == NULL)
     91         return;
     92     if ((ctx->method != NULL) && (ctx->method->free != NULL))
     93         (*ctx->method->free) (ctx);
     94     OPENSSL_free(ctx);
     95 }
     96 
     97 int X509_LOOKUP_init(X509_LOOKUP *ctx)
     98 {
     99     if (ctx->method == NULL)
    100         return 0;
    101     if (ctx->method->init != NULL)
    102         return ctx->method->init(ctx);
    103     else
    104         return 1;
    105 }
    106 
    107 int X509_LOOKUP_shutdown(X509_LOOKUP *ctx)
    108 {
    109     if (ctx->method == NULL)
    110         return 0;
    111     if (ctx->method->shutdown != NULL)
    112         return ctx->method->shutdown(ctx);
    113     else
    114         return 1;
    115 }
    116 
    117 int X509_LOOKUP_ctrl(X509_LOOKUP *ctx, int cmd, const char *argc, long argl,
    118                      char **ret)
    119 {
    120     if (ctx->method == NULL)
    121         return -1;
    122     if (ctx->method->ctrl != NULL)
    123         return ctx->method->ctrl(ctx, cmd, argc, argl, ret);
    124     else
    125         return 1;
    126 }
    127 
    128 int X509_LOOKUP_by_subject(X509_LOOKUP *ctx, int type, X509_NAME *name,
    129                            X509_OBJECT *ret)
    130 {
    131     if ((ctx->method == NULL) || (ctx->method->get_by_subject == NULL))
    132         return 0;
    133     if (ctx->skip)
    134         return 0;
    135     return ctx->method->get_by_subject(ctx, type, name, ret) > 0;
    136 }
    137 
    138 int X509_LOOKUP_by_issuer_serial(X509_LOOKUP *ctx, int type, X509_NAME *name,
    139                                  ASN1_INTEGER *serial, X509_OBJECT *ret)
    140 {
    141     if ((ctx->method == NULL) || (ctx->method->get_by_issuer_serial == NULL))
    142         return 0;
    143     return ctx->method->get_by_issuer_serial(ctx, type, name, serial, ret) > 0;
    144 }
    145 
    146 int X509_LOOKUP_by_fingerprint(X509_LOOKUP *ctx, int type,
    147                                unsigned char *bytes, int len,
    148                                X509_OBJECT *ret)
    149 {
    150     if ((ctx->method == NULL) || (ctx->method->get_by_fingerprint == NULL))
    151         return 0;
    152     return ctx->method->get_by_fingerprint(ctx, type, bytes, len, ret) > 0;
    153 }
    154 
    155 int X509_LOOKUP_by_alias(X509_LOOKUP *ctx, int type, char *str, int len,
    156                          X509_OBJECT *ret)
    157 {
    158     if ((ctx->method == NULL) || (ctx->method->get_by_alias == NULL))
    159         return 0;
    160     return ctx->method->get_by_alias(ctx, type, str, len, ret) > 0;
    161 }
    162 
    163 static int x509_object_cmp(const X509_OBJECT **a, const X509_OBJECT **b)
    164 {
    165     int ret;
    166 
    167     ret = ((*a)->type - (*b)->type);
    168     if (ret)
    169         return ret;
    170     switch ((*a)->type) {
    171     case X509_LU_X509:
    172         ret = X509_subject_name_cmp((*a)->data.x509, (*b)->data.x509);
    173         break;
    174     case X509_LU_CRL:
    175         ret = X509_CRL_cmp((*a)->data.crl, (*b)->data.crl);
    176         break;
    177     default:
    178         /* abort(); */
    179         return 0;
    180     }
    181     return ret;
    182 }
    183 
    184 X509_STORE *X509_STORE_new(void)
    185 {
    186     X509_STORE *ret;
    187 
    188     if ((ret = (X509_STORE *)OPENSSL_malloc(sizeof(X509_STORE))) == NULL)
    189         return NULL;
    190     OPENSSL_memset(ret, 0, sizeof(*ret));
    191     CRYPTO_MUTEX_init(&ret->objs_lock);
    192     ret->objs = sk_X509_OBJECT_new(x509_object_cmp);
    193     if (ret->objs == NULL)
    194         goto err;
    195     ret->cache = 1;
    196     ret->get_cert_methods = sk_X509_LOOKUP_new_null();
    197     if (ret->get_cert_methods == NULL)
    198         goto err;
    199     ret->param = X509_VERIFY_PARAM_new();
    200     if (ret->param == NULL)
    201         goto err;
    202 
    203     ret->references = 1;
    204     return ret;
    205  err:
    206     if (ret) {
    207         CRYPTO_MUTEX_cleanup(&ret->objs_lock);
    208         if (ret->param)
    209             X509_VERIFY_PARAM_free(ret->param);
    210         if (ret->get_cert_methods)
    211             sk_X509_LOOKUP_free(ret->get_cert_methods);
    212         if (ret->objs)
    213             sk_X509_OBJECT_free(ret->objs);
    214         OPENSSL_free(ret);
    215     }
    216     return NULL;
    217 }
    218 
    219 int X509_STORE_up_ref(X509_STORE *store)
    220 {
    221     CRYPTO_refcount_inc(&store->references);
    222     return 1;
    223 }
    224 
    225 static void cleanup(X509_OBJECT *a)
    226 {
    227     if (a == NULL) {
    228         return;
    229     }
    230     if (a->type == X509_LU_X509) {
    231         X509_free(a->data.x509);
    232     } else if (a->type == X509_LU_CRL) {
    233         X509_CRL_free(a->data.crl);
    234     } else {
    235         /* abort(); */
    236     }
    237 
    238     OPENSSL_free(a);
    239 }
    240 
    241 void X509_STORE_free(X509_STORE *vfy)
    242 {
    243     size_t j;
    244     STACK_OF(X509_LOOKUP) *sk;
    245     X509_LOOKUP *lu;
    246 
    247     if (vfy == NULL)
    248         return;
    249 
    250     if (!CRYPTO_refcount_dec_and_test_zero(&vfy->references)) {
    251         return;
    252     }
    253 
    254     CRYPTO_MUTEX_cleanup(&vfy->objs_lock);
    255 
    256     sk = vfy->get_cert_methods;
    257     for (j = 0; j < sk_X509_LOOKUP_num(sk); j++) {
    258         lu = sk_X509_LOOKUP_value(sk, j);
    259         X509_LOOKUP_shutdown(lu);
    260         X509_LOOKUP_free(lu);
    261     }
    262     sk_X509_LOOKUP_free(sk);
    263     sk_X509_OBJECT_pop_free(vfy->objs, cleanup);
    264 
    265     if (vfy->param)
    266         X509_VERIFY_PARAM_free(vfy->param);
    267     OPENSSL_free(vfy);
    268 }
    269 
    270 X509_LOOKUP *X509_STORE_add_lookup(X509_STORE *v, X509_LOOKUP_METHOD *m)
    271 {
    272     size_t i;
    273     STACK_OF(X509_LOOKUP) *sk;
    274     X509_LOOKUP *lu;
    275 
    276     sk = v->get_cert_methods;
    277     for (i = 0; i < sk_X509_LOOKUP_num(sk); i++) {
    278         lu = sk_X509_LOOKUP_value(sk, i);
    279         if (m == lu->method) {
    280             return lu;
    281         }
    282     }
    283     /* a new one */
    284     lu = X509_LOOKUP_new(m);
    285     if (lu == NULL)
    286         return NULL;
    287     else {
    288         lu->store_ctx = v;
    289         if (sk_X509_LOOKUP_push(v->get_cert_methods, lu))
    290             return lu;
    291         else {
    292             X509_LOOKUP_free(lu);
    293             return NULL;
    294         }
    295     }
    296 }
    297 
    298 int X509_STORE_get_by_subject(X509_STORE_CTX *vs, int type, X509_NAME *name,
    299                               X509_OBJECT *ret)
    300 {
    301     X509_STORE *ctx = vs->ctx;
    302     X509_LOOKUP *lu;
    303     X509_OBJECT stmp, *tmp;
    304     int i;
    305 
    306     CRYPTO_MUTEX_lock_write(&ctx->objs_lock);
    307     tmp = X509_OBJECT_retrieve_by_subject(ctx->objs, type, name);
    308     CRYPTO_MUTEX_unlock_write(&ctx->objs_lock);
    309 
    310     if (tmp == NULL || type == X509_LU_CRL) {
    311         for (i = 0; i < (int)sk_X509_LOOKUP_num(ctx->get_cert_methods); i++) {
    312             lu = sk_X509_LOOKUP_value(ctx->get_cert_methods, i);
    313             if (X509_LOOKUP_by_subject(lu, type, name, &stmp)) {
    314                 tmp = &stmp;
    315                 break;
    316             }
    317         }
    318         if (tmp == NULL)
    319             return 0;
    320     }
    321 
    322     /*
    323      * if (ret->data.ptr != NULL) X509_OBJECT_free_contents(ret);
    324      */
    325 
    326     ret->type = tmp->type;
    327     ret->data.ptr = tmp->data.ptr;
    328 
    329     X509_OBJECT_up_ref_count(ret);
    330 
    331     return 1;
    332 }
    333 
    334 int X509_STORE_add_cert(X509_STORE *ctx, X509 *x)
    335 {
    336     X509_OBJECT *obj;
    337     int ret = 1;
    338 
    339     if (x == NULL)
    340         return 0;
    341     obj = (X509_OBJECT *)OPENSSL_malloc(sizeof(X509_OBJECT));
    342     if (obj == NULL) {
    343         OPENSSL_PUT_ERROR(X509, ERR_R_MALLOC_FAILURE);
    344         return 0;
    345     }
    346     obj->type = X509_LU_X509;
    347     obj->data.x509 = x;
    348 
    349     CRYPTO_MUTEX_lock_write(&ctx->objs_lock);
    350 
    351     X509_OBJECT_up_ref_count(obj);
    352 
    353     if (X509_OBJECT_retrieve_match(ctx->objs, obj)) {
    354         X509_OBJECT_free_contents(obj);
    355         OPENSSL_free(obj);
    356         OPENSSL_PUT_ERROR(X509, X509_R_CERT_ALREADY_IN_HASH_TABLE);
    357         ret = 0;
    358     } else if (!sk_X509_OBJECT_push(ctx->objs, obj)) {
    359         X509_OBJECT_free_contents(obj);
    360         OPENSSL_free(obj);
    361         OPENSSL_PUT_ERROR(X509, ERR_R_MALLOC_FAILURE);
    362         ret = 0;
    363     }
    364 
    365     CRYPTO_MUTEX_unlock_write(&ctx->objs_lock);
    366 
    367     return ret;
    368 }
    369 
    370 int X509_STORE_add_crl(X509_STORE *ctx, X509_CRL *x)
    371 {
    372     X509_OBJECT *obj;
    373     int ret = 1;
    374 
    375     if (x == NULL)
    376         return 0;
    377     obj = (X509_OBJECT *)OPENSSL_malloc(sizeof(X509_OBJECT));
    378     if (obj == NULL) {
    379         OPENSSL_PUT_ERROR(X509, ERR_R_MALLOC_FAILURE);
    380         return 0;
    381     }
    382     obj->type = X509_LU_CRL;
    383     obj->data.crl = x;
    384 
    385     CRYPTO_MUTEX_lock_write(&ctx->objs_lock);
    386 
    387     X509_OBJECT_up_ref_count(obj);
    388 
    389     if (X509_OBJECT_retrieve_match(ctx->objs, obj)) {
    390         X509_OBJECT_free_contents(obj);
    391         OPENSSL_free(obj);
    392         OPENSSL_PUT_ERROR(X509, X509_R_CERT_ALREADY_IN_HASH_TABLE);
    393         ret = 0;
    394     } else if (!sk_X509_OBJECT_push(ctx->objs, obj)) {
    395         X509_OBJECT_free_contents(obj);
    396         OPENSSL_free(obj);
    397         OPENSSL_PUT_ERROR(X509, ERR_R_MALLOC_FAILURE);
    398         ret = 0;
    399     }
    400 
    401     CRYPTO_MUTEX_unlock_write(&ctx->objs_lock);
    402 
    403     return ret;
    404 }
    405 
    406 void X509_STORE_set0_additional_untrusted(X509_STORE *ctx,
    407                                           STACK_OF(X509) *untrusted) {
    408   ctx->additional_untrusted = untrusted;
    409 }
    410 
    411 int X509_OBJECT_up_ref_count(X509_OBJECT *a)
    412 {
    413     switch (a->type) {
    414     case X509_LU_X509:
    415         X509_up_ref(a->data.x509);
    416         break;
    417     case X509_LU_CRL:
    418         X509_CRL_up_ref(a->data.crl);
    419         break;
    420     }
    421     return 1;
    422 }
    423 
    424 void X509_OBJECT_free_contents(X509_OBJECT *a)
    425 {
    426     switch (a->type) {
    427     case X509_LU_X509:
    428         X509_free(a->data.x509);
    429         break;
    430     case X509_LU_CRL:
    431         X509_CRL_free(a->data.crl);
    432         break;
    433     }
    434 }
    435 
    436 int X509_OBJECT_get_type(const X509_OBJECT *a)
    437 {
    438     return a->type;
    439 }
    440 
    441 X509 *X509_OBJECT_get0_X509(const X509_OBJECT *a)
    442 {
    443     if (a == NULL || a->type != X509_LU_X509) {
    444         return NULL;
    445     }
    446     return a->data.x509;
    447 }
    448 
    449 static int x509_object_idx_cnt(STACK_OF(X509_OBJECT) *h, int type,
    450                                X509_NAME *name, int *pnmatch)
    451 {
    452     X509_OBJECT stmp;
    453     X509 x509_s;
    454     X509_CINF cinf_s;
    455     X509_CRL crl_s;
    456     X509_CRL_INFO crl_info_s;
    457 
    458     stmp.type = type;
    459     switch (type) {
    460     case X509_LU_X509:
    461         stmp.data.x509 = &x509_s;
    462         x509_s.cert_info = &cinf_s;
    463         cinf_s.subject = name;
    464         break;
    465     case X509_LU_CRL:
    466         stmp.data.crl = &crl_s;
    467         crl_s.crl = &crl_info_s;
    468         crl_info_s.issuer = name;
    469         break;
    470     default:
    471         /* abort(); */
    472         return -1;
    473     }
    474 
    475     size_t idx;
    476     sk_X509_OBJECT_sort(h);
    477     if (!sk_X509_OBJECT_find(h, &idx, &stmp))
    478         return -1;
    479 
    480     if (pnmatch != NULL) {
    481         int tidx;
    482         const X509_OBJECT *tobj, *pstmp;
    483         *pnmatch = 1;
    484         pstmp = &stmp;
    485         for (tidx = idx + 1; tidx < (int)sk_X509_OBJECT_num(h); tidx++) {
    486             tobj = sk_X509_OBJECT_value(h, tidx);
    487             if (x509_object_cmp(&tobj, &pstmp))
    488                 break;
    489             (*pnmatch)++;
    490         }
    491     }
    492 
    493     return idx;
    494 }
    495 
    496 int X509_OBJECT_idx_by_subject(STACK_OF(X509_OBJECT) *h, int type,
    497                                X509_NAME *name)
    498 {
    499     return x509_object_idx_cnt(h, type, name, NULL);
    500 }
    501 
    502 X509_OBJECT *X509_OBJECT_retrieve_by_subject(STACK_OF(X509_OBJECT) *h,
    503                                              int type, X509_NAME *name)
    504 {
    505     int idx;
    506     idx = X509_OBJECT_idx_by_subject(h, type, name);
    507     if (idx == -1)
    508         return NULL;
    509     return sk_X509_OBJECT_value(h, idx);
    510 }
    511 
    512 STACK_OF(X509_OBJECT) *X509_STORE_get0_objects(X509_STORE *st)
    513 {
    514     return st->objs;
    515 }
    516 
    517 STACK_OF (X509) * X509_STORE_get1_certs(X509_STORE_CTX *ctx, X509_NAME *nm)
    518 {
    519     int i, idx, cnt;
    520     STACK_OF(X509) *sk;
    521     X509 *x;
    522     X509_OBJECT *obj;
    523     sk = sk_X509_new_null();
    524     if (sk == NULL)
    525         return NULL;
    526     CRYPTO_MUTEX_lock_write(&ctx->ctx->objs_lock);
    527     idx = x509_object_idx_cnt(ctx->ctx->objs, X509_LU_X509, nm, &cnt);
    528     if (idx < 0) {
    529         /*
    530          * Nothing found in cache: do lookup to possibly add new objects to
    531          * cache
    532          */
    533         X509_OBJECT xobj;
    534         CRYPTO_MUTEX_unlock_write(&ctx->ctx->objs_lock);
    535         if (!X509_STORE_get_by_subject(ctx, X509_LU_X509, nm, &xobj)) {
    536             sk_X509_free(sk);
    537             return NULL;
    538         }
    539         X509_OBJECT_free_contents(&xobj);
    540         CRYPTO_MUTEX_lock_write(&ctx->ctx->objs_lock);
    541         idx = x509_object_idx_cnt(ctx->ctx->objs, X509_LU_X509, nm, &cnt);
    542         if (idx < 0) {
    543             CRYPTO_MUTEX_unlock_write(&ctx->ctx->objs_lock);
    544             sk_X509_free(sk);
    545             return NULL;
    546         }
    547     }
    548     for (i = 0; i < cnt; i++, idx++) {
    549         obj = sk_X509_OBJECT_value(ctx->ctx->objs, idx);
    550         x = obj->data.x509;
    551         if (!sk_X509_push(sk, x)) {
    552             CRYPTO_MUTEX_unlock_write(&ctx->ctx->objs_lock);
    553             sk_X509_pop_free(sk, X509_free);
    554             return NULL;
    555         }
    556         X509_up_ref(x);
    557     }
    558     CRYPTO_MUTEX_unlock_write(&ctx->ctx->objs_lock);
    559     return sk;
    560 
    561 }
    562 
    563 STACK_OF (X509_CRL) * X509_STORE_get1_crls(X509_STORE_CTX *ctx, X509_NAME *nm)
    564 {
    565     int i, idx, cnt;
    566     STACK_OF(X509_CRL) *sk;
    567     X509_CRL *x;
    568     X509_OBJECT *obj, xobj;
    569     sk = sk_X509_CRL_new_null();
    570     if (sk == NULL)
    571         return NULL;
    572 
    573     /* Always do lookup to possibly add new CRLs to cache. */
    574     if (!X509_STORE_get_by_subject(ctx, X509_LU_CRL, nm, &xobj)) {
    575         sk_X509_CRL_free(sk);
    576         return NULL;
    577     }
    578     X509_OBJECT_free_contents(&xobj);
    579     CRYPTO_MUTEX_lock_write(&ctx->ctx->objs_lock);
    580     idx = x509_object_idx_cnt(ctx->ctx->objs, X509_LU_CRL, nm, &cnt);
    581     if (idx < 0) {
    582         CRYPTO_MUTEX_unlock_write(&ctx->ctx->objs_lock);
    583         sk_X509_CRL_free(sk);
    584         return NULL;
    585     }
    586 
    587     for (i = 0; i < cnt; i++, idx++) {
    588         obj = sk_X509_OBJECT_value(ctx->ctx->objs, idx);
    589         x = obj->data.crl;
    590         X509_CRL_up_ref(x);
    591         if (!sk_X509_CRL_push(sk, x)) {
    592             CRYPTO_MUTEX_unlock_write(&ctx->ctx->objs_lock);
    593             X509_CRL_free(x);
    594             sk_X509_CRL_pop_free(sk, X509_CRL_free);
    595             return NULL;
    596         }
    597     }
    598     CRYPTO_MUTEX_unlock_write(&ctx->ctx->objs_lock);
    599     return sk;
    600 }
    601 
    602 X509_OBJECT *X509_OBJECT_retrieve_match(STACK_OF(X509_OBJECT) *h,
    603                                         X509_OBJECT *x)
    604 {
    605     size_t idx, i;
    606     X509_OBJECT *obj;
    607 
    608     sk_X509_OBJECT_sort(h);
    609     if (!sk_X509_OBJECT_find(h, &idx, x)) {
    610         return NULL;
    611     }
    612     if ((x->type != X509_LU_X509) && (x->type != X509_LU_CRL))
    613         return sk_X509_OBJECT_value(h, idx);
    614     for (i = idx; i < sk_X509_OBJECT_num(h); i++) {
    615         obj = sk_X509_OBJECT_value(h, i);
    616         if (x509_object_cmp
    617             ((const X509_OBJECT **)&obj, (const X509_OBJECT **)&x))
    618             return NULL;
    619         if (x->type == X509_LU_X509) {
    620             if (!X509_cmp(obj->data.x509, x->data.x509))
    621                 return obj;
    622         } else if (x->type == X509_LU_CRL) {
    623             if (!X509_CRL_match(obj->data.crl, x->data.crl))
    624                 return obj;
    625         } else
    626             return obj;
    627     }
    628     return NULL;
    629 }
    630 
    631 /*
    632  * Try to get issuer certificate from store. Due to limitations of the API
    633  * this can only retrieve a single certificate matching a given subject name.
    634  * However it will fill the cache with all matching certificates, so we can
    635  * examine the cache for all matches. Return values are: 1 lookup
    636  * successful.  0 certificate not found. -1 some other error.
    637  */
    638 int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x)
    639 {
    640     X509_NAME *xn;
    641     X509_OBJECT obj, *pobj;
    642     int idx, ret;
    643     size_t i;
    644     xn = X509_get_issuer_name(x);
    645     if (!X509_STORE_get_by_subject(ctx, X509_LU_X509, xn, &obj))
    646         return 0;
    647     /* If certificate matches all OK */
    648     if (ctx->check_issued(ctx, x, obj.data.x509)) {
    649         *issuer = obj.data.x509;
    650         return 1;
    651     }
    652     X509_OBJECT_free_contents(&obj);
    653 
    654     /* Else find index of first cert accepted by 'check_issued' */
    655     ret = 0;
    656     CRYPTO_MUTEX_lock_write(&ctx->ctx->objs_lock);
    657     idx = X509_OBJECT_idx_by_subject(ctx->ctx->objs, X509_LU_X509, xn);
    658     if (idx != -1) {            /* should be true as we've had at least one
    659                                  * match */
    660         /* Look through all matching certs for suitable issuer */
    661         for (i = idx; i < sk_X509_OBJECT_num(ctx->ctx->objs); i++) {
    662             pobj = sk_X509_OBJECT_value(ctx->ctx->objs, i);
    663             /* See if we've run past the matches */
    664             if (pobj->type != X509_LU_X509)
    665                 break;
    666             if (X509_NAME_cmp(xn, X509_get_subject_name(pobj->data.x509)))
    667                 break;
    668             if (ctx->check_issued(ctx, x, pobj->data.x509)) {
    669                 *issuer = pobj->data.x509;
    670                 X509_OBJECT_up_ref_count(pobj);
    671                 ret = 1;
    672                 break;
    673             }
    674         }
    675     }
    676     CRYPTO_MUTEX_unlock_write(&ctx->ctx->objs_lock);
    677     return ret;
    678 }
    679 
    680 int X509_STORE_set_flags(X509_STORE *ctx, unsigned long flags)
    681 {
    682     return X509_VERIFY_PARAM_set_flags(ctx->param, flags);
    683 }
    684 
    685 int X509_STORE_set_depth(X509_STORE *ctx, int depth)
    686 {
    687     X509_VERIFY_PARAM_set_depth(ctx->param, depth);
    688     return 1;
    689 }
    690 
    691 int X509_STORE_set_purpose(X509_STORE *ctx, int purpose)
    692 {
    693     return X509_VERIFY_PARAM_set_purpose(ctx->param, purpose);
    694 }
    695 
    696 int X509_STORE_set_trust(X509_STORE *ctx, int trust)
    697 {
    698     return X509_VERIFY_PARAM_set_trust(ctx->param, trust);
    699 }
    700 
    701 int X509_STORE_set1_param(X509_STORE *ctx, X509_VERIFY_PARAM *param)
    702 {
    703     return X509_VERIFY_PARAM_set1(ctx->param, param);
    704 }
    705 
    706 X509_VERIFY_PARAM *X509_STORE_get0_param(X509_STORE *ctx)
    707 {
    708     return ctx->param;
    709 }
    710 
    711 void X509_STORE_set_verify(X509_STORE *ctx, X509_STORE_CTX_verify_fn verify)
    712 {
    713     ctx->verify = verify;
    714 }
    715 
    716 X509_STORE_CTX_verify_fn X509_STORE_get_verify(X509_STORE *ctx)
    717 {
    718     return ctx->verify;
    719 }
    720 
    721 void X509_STORE_set_verify_cb(X509_STORE *ctx,
    722                               X509_STORE_CTX_verify_cb verify_cb)
    723 {
    724     ctx->verify_cb = verify_cb;
    725 }
    726 
    727 X509_STORE_CTX_verify_cb X509_STORE_get_verify_cb(X509_STORE *ctx)
    728 {
    729     return ctx->verify_cb;
    730 }
    731 
    732 void X509_STORE_set_get_issuer(X509_STORE *ctx,
    733                                X509_STORE_CTX_get_issuer_fn get_issuer)
    734 {
    735     ctx->get_issuer = get_issuer;
    736 }
    737 
    738 X509_STORE_CTX_get_issuer_fn X509_STORE_get_get_issuer(X509_STORE *ctx)
    739 {
    740     return ctx->get_issuer;
    741 }
    742 
    743 void X509_STORE_set_check_issued(X509_STORE *ctx,
    744                                  X509_STORE_CTX_check_issued_fn check_issued)
    745 {
    746     ctx->check_issued = check_issued;
    747 }
    748 
    749 X509_STORE_CTX_check_issued_fn X509_STORE_get_check_issued(X509_STORE *ctx)
    750 {
    751     return ctx->check_issued;
    752 }
    753 
    754 void X509_STORE_set_check_revocation(X509_STORE *ctx,
    755                                      X509_STORE_CTX_check_revocation_fn check_revocation)
    756 {
    757     ctx->check_revocation = check_revocation;
    758 }
    759 
    760 X509_STORE_CTX_check_revocation_fn X509_STORE_get_check_revocation(X509_STORE *ctx)
    761 {
    762     return ctx->check_revocation;
    763 }
    764 
    765 void X509_STORE_set_get_crl(X509_STORE *ctx,
    766                             X509_STORE_CTX_get_crl_fn get_crl)
    767 {
    768     ctx->get_crl = get_crl;
    769 }
    770 
    771 X509_STORE_CTX_get_crl_fn X509_STORE_get_get_crl(X509_STORE *ctx)
    772 {
    773     return ctx->get_crl;
    774 }
    775 
    776 void X509_STORE_set_check_crl(X509_STORE *ctx,
    777                               X509_STORE_CTX_check_crl_fn check_crl)
    778 {
    779     ctx->check_crl = check_crl;
    780 }
    781 
    782 X509_STORE_CTX_check_crl_fn X509_STORE_get_check_crl(X509_STORE *ctx)
    783 {
    784     return ctx->check_crl;
    785 }
    786 
    787 void X509_STORE_set_cert_crl(X509_STORE *ctx,
    788                              X509_STORE_CTX_cert_crl_fn cert_crl)
    789 {
    790     ctx->cert_crl = cert_crl;
    791 }
    792 
    793 X509_STORE_CTX_cert_crl_fn X509_STORE_get_cert_crl(X509_STORE *ctx)
    794 {
    795     return ctx->cert_crl;
    796 }
    797 
    798 void X509_STORE_set_lookup_certs(X509_STORE *ctx,
    799                                  X509_STORE_CTX_lookup_certs_fn lookup_certs)
    800 {
    801     ctx->lookup_certs = lookup_certs;
    802 }
    803 
    804 X509_STORE_CTX_lookup_certs_fn X509_STORE_get_lookup_certs(X509_STORE *ctx)
    805 {
    806     return ctx->lookup_certs;
    807 }
    808 
    809 void X509_STORE_set_lookup_crls(X509_STORE *ctx,
    810                                 X509_STORE_CTX_lookup_crls_fn lookup_crls)
    811 {
    812     ctx->lookup_crls = lookup_crls;
    813 }
    814 
    815 X509_STORE_CTX_lookup_crls_fn X509_STORE_get_lookup_crls(X509_STORE *ctx)
    816 {
    817     return ctx->lookup_crls;
    818 }
    819 
    820 void X509_STORE_set_cleanup(X509_STORE *ctx,
    821                             X509_STORE_CTX_cleanup_fn ctx_cleanup)
    822 {
    823     ctx->cleanup = ctx_cleanup;
    824 }
    825 
    826 X509_STORE_CTX_cleanup_fn X509_STORE_get_cleanup(X509_STORE *ctx)
    827 {
    828     return ctx->cleanup;
    829 }
    830 
    831 X509_STORE *X509_STORE_CTX_get0_store(X509_STORE_CTX *ctx)
    832 {
    833     return ctx->ctx;
    834 }
    835