You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

733 line
18 KiB

  1. /* crypto/x509/x509_lu.c */
  2. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  3. * All rights reserved.
  4. *
  5. * This package is an SSL implementation written
  6. * by Eric Young (eay@cryptsoft.com).
  7. * The implementation was written so as to conform with Netscapes SSL.
  8. *
  9. * This library is free for commercial and non-commercial use as long as
  10. * the following conditions are aheared to. The following conditions
  11. * apply to all code found in this distribution, be it the RC4, RSA,
  12. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  13. * included with this distribution is covered by the same copyright terms
  14. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  15. *
  16. * Copyright remains Eric Young's, and as such any Copyright notices in
  17. * the code are not to be removed.
  18. * If this package is used in a product, Eric Young should be given attribution
  19. * as the author of the parts of the library used.
  20. * This can be in the form of a textual message at program startup or
  21. * in documentation (online or textual) provided with the package.
  22. *
  23. * Redistribution and use in source and binary forms, with or without
  24. * modification, are permitted provided that the following conditions
  25. * are met:
  26. * 1. Redistributions of source code must retain the copyright
  27. * notice, this list of conditions and the following disclaimer.
  28. * 2. Redistributions in binary form must reproduce the above copyright
  29. * notice, this list of conditions and the following disclaimer in the
  30. * documentation and/or other materials provided with the distribution.
  31. * 3. All advertising materials mentioning features or use of this software
  32. * must display the following acknowledgement:
  33. * "This product includes cryptographic software written by
  34. * Eric Young (eay@cryptsoft.com)"
  35. * The word 'cryptographic' can be left out if the rouines from the library
  36. * being used are not cryptographic related :-).
  37. * 4. If you include any Windows specific code (or a derivative thereof) from
  38. * the apps directory (application code) you must include an acknowledgement:
  39. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  40. *
  41. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  42. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  43. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  44. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  45. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  46. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  47. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  48. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  49. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  50. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  51. * SUCH DAMAGE.
  52. *
  53. * The licence and distribution terms for any publically available version or
  54. * derivative of this code cannot be changed. i.e. this code cannot simply be
  55. * copied and put under another distribution licence
  56. * [including the GNU Public Licence.] */
  57. #include <string.h>
  58. #include <openssl/err.h>
  59. #include <openssl/lhash.h>
  60. #include <openssl/mem.h>
  61. #include <openssl/thread.h>
  62. #include <openssl/x509.h>
  63. #include <openssl/x509v3.h>
  64. #include "../internal.h"
  65. X509_LOOKUP *X509_LOOKUP_new(X509_LOOKUP_METHOD *method)
  66. {
  67. X509_LOOKUP *ret;
  68. ret=(X509_LOOKUP *)OPENSSL_malloc(sizeof(X509_LOOKUP));
  69. if (ret == NULL) return NULL;
  70. ret->init=0;
  71. ret->skip=0;
  72. ret->method=method;
  73. ret->method_data=NULL;
  74. ret->store_ctx=NULL;
  75. if ((method->new_item != NULL) && !method->new_item(ret))
  76. {
  77. OPENSSL_free(ret);
  78. return NULL;
  79. }
  80. return ret;
  81. }
  82. void X509_LOOKUP_free(X509_LOOKUP *ctx)
  83. {
  84. if (ctx == NULL) return;
  85. if ( (ctx->method != NULL) &&
  86. (ctx->method->free != NULL))
  87. (*ctx->method->free)(ctx);
  88. OPENSSL_free(ctx);
  89. }
  90. int X509_LOOKUP_init(X509_LOOKUP *ctx)
  91. {
  92. if (ctx->method == NULL) return 0;
  93. if (ctx->method->init != NULL)
  94. return ctx->method->init(ctx);
  95. else
  96. return 1;
  97. }
  98. int X509_LOOKUP_shutdown(X509_LOOKUP *ctx)
  99. {
  100. if (ctx->method == NULL) return 0;
  101. if (ctx->method->shutdown != NULL)
  102. return ctx->method->shutdown(ctx);
  103. else
  104. return 1;
  105. }
  106. int X509_LOOKUP_ctrl(X509_LOOKUP *ctx, int cmd, const char *argc, long argl,
  107. char **ret)
  108. {
  109. if (ctx->method == NULL) return -1;
  110. if (ctx->method->ctrl != NULL)
  111. return ctx->method->ctrl(ctx,cmd,argc,argl,ret);
  112. else
  113. return 1;
  114. }
  115. int X509_LOOKUP_by_subject(X509_LOOKUP *ctx, int type, X509_NAME *name,
  116. X509_OBJECT *ret)
  117. {
  118. if ((ctx->method == NULL) || (ctx->method->get_by_subject == NULL))
  119. return X509_LU_FAIL;
  120. if (ctx->skip) return 0;
  121. return ctx->method->get_by_subject(ctx,type,name,ret);
  122. }
  123. int X509_LOOKUP_by_issuer_serial(X509_LOOKUP *ctx, int type, X509_NAME *name,
  124. ASN1_INTEGER *serial, X509_OBJECT *ret)
  125. {
  126. if ((ctx->method == NULL) ||
  127. (ctx->method->get_by_issuer_serial == NULL))
  128. return X509_LU_FAIL;
  129. return ctx->method->get_by_issuer_serial(ctx,type,name,serial,ret);
  130. }
  131. int X509_LOOKUP_by_fingerprint(X509_LOOKUP *ctx, int type,
  132. unsigned char *bytes, int len, X509_OBJECT *ret)
  133. {
  134. if ((ctx->method == NULL) || (ctx->method->get_by_fingerprint == NULL))
  135. return X509_LU_FAIL;
  136. return ctx->method->get_by_fingerprint(ctx,type,bytes,len,ret);
  137. }
  138. int X509_LOOKUP_by_alias(X509_LOOKUP *ctx, int type, char *str, int len,
  139. X509_OBJECT *ret)
  140. {
  141. if ((ctx->method == NULL) || (ctx->method->get_by_alias == NULL))
  142. return X509_LU_FAIL;
  143. return ctx->method->get_by_alias(ctx,type,str,len,ret);
  144. }
  145. static int x509_object_cmp(const X509_OBJECT **a, const X509_OBJECT **b)
  146. {
  147. int ret;
  148. ret=((*a)->type - (*b)->type);
  149. if (ret) return ret;
  150. switch ((*a)->type)
  151. {
  152. case X509_LU_X509:
  153. ret=X509_subject_name_cmp((*a)->data.x509,(*b)->data.x509);
  154. break;
  155. case X509_LU_CRL:
  156. ret=X509_CRL_cmp((*a)->data.crl,(*b)->data.crl);
  157. break;
  158. default:
  159. /* abort(); */
  160. return 0;
  161. }
  162. return ret;
  163. }
  164. X509_STORE *X509_STORE_new(void)
  165. {
  166. X509_STORE *ret;
  167. if ((ret=(X509_STORE *)OPENSSL_malloc(sizeof(X509_STORE))) == NULL)
  168. return NULL;
  169. memset(ret, 0, sizeof(*ret));
  170. ret->objs = sk_X509_OBJECT_new(x509_object_cmp);
  171. CRYPTO_MUTEX_init(&ret->objs_lock);
  172. ret->cache = 1;
  173. ret->get_cert_methods = sk_X509_LOOKUP_new_null();
  174. if ((ret->param = X509_VERIFY_PARAM_new()) == NULL)
  175. goto err;
  176. ret->references = 1;
  177. return ret;
  178. err:
  179. if (ret)
  180. {
  181. if (ret->param)
  182. X509_VERIFY_PARAM_free(ret->param);
  183. if (ret->get_cert_methods)
  184. sk_X509_LOOKUP_free(ret->get_cert_methods);
  185. if (ret->objs)
  186. sk_X509_OBJECT_free(ret->objs);
  187. OPENSSL_free(ret);
  188. }
  189. return NULL;
  190. }
  191. static void cleanup(X509_OBJECT *a)
  192. {
  193. if (a->type == X509_LU_X509)
  194. {
  195. X509_free(a->data.x509);
  196. }
  197. else if (a->type == X509_LU_CRL)
  198. {
  199. X509_CRL_free(a->data.crl);
  200. }
  201. else
  202. {
  203. /* abort(); */
  204. }
  205. OPENSSL_free(a);
  206. }
  207. void X509_STORE_free(X509_STORE *vfy)
  208. {
  209. size_t j;
  210. STACK_OF(X509_LOOKUP) *sk;
  211. X509_LOOKUP *lu;
  212. if (vfy == NULL)
  213. return;
  214. if (!CRYPTO_refcount_dec_and_test_zero(&vfy->references)) {
  215. return;
  216. }
  217. CRYPTO_MUTEX_cleanup(&vfy->objs_lock);
  218. sk=vfy->get_cert_methods;
  219. for (j=0; j<sk_X509_LOOKUP_num(sk); j++)
  220. {
  221. lu=sk_X509_LOOKUP_value(sk,j);
  222. X509_LOOKUP_shutdown(lu);
  223. X509_LOOKUP_free(lu);
  224. }
  225. sk_X509_LOOKUP_free(sk);
  226. sk_X509_OBJECT_pop_free(vfy->objs, cleanup);
  227. if (vfy->param)
  228. X509_VERIFY_PARAM_free(vfy->param);
  229. OPENSSL_free(vfy);
  230. }
  231. X509_LOOKUP *X509_STORE_add_lookup(X509_STORE *v, X509_LOOKUP_METHOD *m)
  232. {
  233. size_t i;
  234. STACK_OF(X509_LOOKUP) *sk;
  235. X509_LOOKUP *lu;
  236. sk=v->get_cert_methods;
  237. for (i=0; i<sk_X509_LOOKUP_num(sk); i++)
  238. {
  239. lu=sk_X509_LOOKUP_value(sk,i);
  240. if (m == lu->method)
  241. {
  242. return lu;
  243. }
  244. }
  245. /* a new one */
  246. lu=X509_LOOKUP_new(m);
  247. if (lu == NULL)
  248. return NULL;
  249. else
  250. {
  251. lu->store_ctx=v;
  252. if (sk_X509_LOOKUP_push(v->get_cert_methods,lu))
  253. return lu;
  254. else
  255. {
  256. X509_LOOKUP_free(lu);
  257. return NULL;
  258. }
  259. }
  260. }
  261. int X509_STORE_get_by_subject(X509_STORE_CTX *vs, int type, X509_NAME *name,
  262. X509_OBJECT *ret)
  263. {
  264. X509_STORE *ctx=vs->ctx;
  265. X509_LOOKUP *lu;
  266. X509_OBJECT stmp,*tmp;
  267. int i,j;
  268. CRYPTO_MUTEX_lock_write(&ctx->objs_lock);
  269. tmp=X509_OBJECT_retrieve_by_subject(ctx->objs,type,name);
  270. CRYPTO_MUTEX_unlock(&ctx->objs_lock);
  271. if (tmp == NULL || type == X509_LU_CRL)
  272. {
  273. for (i=vs->current_method; i<(int)sk_X509_LOOKUP_num(ctx->get_cert_methods); i++)
  274. {
  275. lu=sk_X509_LOOKUP_value(ctx->get_cert_methods,i);
  276. j=X509_LOOKUP_by_subject(lu,type,name,&stmp);
  277. if (j < 0)
  278. {
  279. vs->current_method=j;
  280. return j;
  281. }
  282. else if (j)
  283. {
  284. tmp= &stmp;
  285. break;
  286. }
  287. }
  288. vs->current_method=0;
  289. if (tmp == NULL)
  290. return 0;
  291. }
  292. /* if (ret->data.ptr != NULL)
  293. X509_OBJECT_free_contents(ret); */
  294. ret->type=tmp->type;
  295. ret->data.ptr=tmp->data.ptr;
  296. X509_OBJECT_up_ref_count(ret);
  297. return 1;
  298. }
  299. int X509_STORE_add_cert(X509_STORE *ctx, X509 *x)
  300. {
  301. X509_OBJECT *obj;
  302. int ret=1;
  303. if (x == NULL) return 0;
  304. obj=(X509_OBJECT *)OPENSSL_malloc(sizeof(X509_OBJECT));
  305. if (obj == NULL)
  306. {
  307. OPENSSL_PUT_ERROR(X509, X509_STORE_add_cert, ERR_R_MALLOC_FAILURE);
  308. return 0;
  309. }
  310. obj->type=X509_LU_X509;
  311. obj->data.x509=x;
  312. CRYPTO_MUTEX_lock_write(&ctx->objs_lock);
  313. X509_OBJECT_up_ref_count(obj);
  314. if (X509_OBJECT_retrieve_match(ctx->objs, obj))
  315. {
  316. X509_OBJECT_free_contents(obj);
  317. OPENSSL_free(obj);
  318. OPENSSL_PUT_ERROR(X509, X509_STORE_add_cert, X509_R_CERT_ALREADY_IN_HASH_TABLE);
  319. ret=0;
  320. }
  321. else sk_X509_OBJECT_push(ctx->objs, obj);
  322. CRYPTO_MUTEX_unlock(&ctx->objs_lock);
  323. return ret;
  324. }
  325. int X509_STORE_add_crl(X509_STORE *ctx, X509_CRL *x)
  326. {
  327. X509_OBJECT *obj;
  328. int ret=1;
  329. if (x == NULL) return 0;
  330. obj=(X509_OBJECT *)OPENSSL_malloc(sizeof(X509_OBJECT));
  331. if (obj == NULL)
  332. {
  333. OPENSSL_PUT_ERROR(X509, X509_STORE_add_crl, ERR_R_MALLOC_FAILURE);
  334. return 0;
  335. }
  336. obj->type=X509_LU_CRL;
  337. obj->data.crl=x;
  338. CRYPTO_MUTEX_lock_write(&ctx->objs_lock);
  339. X509_OBJECT_up_ref_count(obj);
  340. if (X509_OBJECT_retrieve_match(ctx->objs, obj))
  341. {
  342. X509_OBJECT_free_contents(obj);
  343. OPENSSL_free(obj);
  344. OPENSSL_PUT_ERROR(X509, X509_STORE_add_crl, X509_R_CERT_ALREADY_IN_HASH_TABLE);
  345. ret=0;
  346. }
  347. else sk_X509_OBJECT_push(ctx->objs, obj);
  348. CRYPTO_MUTEX_unlock(&ctx->objs_lock);
  349. return ret;
  350. }
  351. void X509_OBJECT_up_ref_count(X509_OBJECT *a)
  352. {
  353. switch (a->type)
  354. {
  355. case X509_LU_X509:
  356. X509_up_ref(a->data.x509);
  357. break;
  358. case X509_LU_CRL:
  359. CRYPTO_refcount_inc(&a->data.crl->references);
  360. break;
  361. }
  362. }
  363. void X509_OBJECT_free_contents(X509_OBJECT *a)
  364. {
  365. switch (a->type)
  366. {
  367. case X509_LU_X509:
  368. X509_free(a->data.x509);
  369. break;
  370. case X509_LU_CRL:
  371. X509_CRL_free(a->data.crl);
  372. break;
  373. }
  374. }
  375. static int x509_object_idx_cnt(STACK_OF(X509_OBJECT) *h, int type,
  376. X509_NAME *name, int *pnmatch)
  377. {
  378. X509_OBJECT stmp;
  379. X509 x509_s;
  380. X509_CINF cinf_s;
  381. X509_CRL crl_s;
  382. X509_CRL_INFO crl_info_s;
  383. size_t idx;
  384. stmp.type=type;
  385. switch (type)
  386. {
  387. case X509_LU_X509:
  388. stmp.data.x509= &x509_s;
  389. x509_s.cert_info= &cinf_s;
  390. cinf_s.subject=name;
  391. break;
  392. case X509_LU_CRL:
  393. stmp.data.crl= &crl_s;
  394. crl_s.crl= &crl_info_s;
  395. crl_info_s.issuer=name;
  396. break;
  397. default:
  398. /* abort(); */
  399. return -1;
  400. }
  401. idx = -1;
  402. if (sk_X509_OBJECT_find(h, &idx, &stmp) && pnmatch)
  403. {
  404. int tidx;
  405. const X509_OBJECT *tobj, *pstmp;
  406. *pnmatch = 1;
  407. pstmp = &stmp;
  408. for (tidx = idx + 1; tidx < (int)sk_X509_OBJECT_num(h); tidx++)
  409. {
  410. tobj = sk_X509_OBJECT_value(h, tidx);
  411. if (x509_object_cmp(&tobj, &pstmp))
  412. break;
  413. (*pnmatch)++;
  414. }
  415. }
  416. return idx;
  417. }
  418. int X509_OBJECT_idx_by_subject(STACK_OF(X509_OBJECT) *h, int type,
  419. X509_NAME *name)
  420. {
  421. return x509_object_idx_cnt(h, type, name, NULL);
  422. }
  423. X509_OBJECT *X509_OBJECT_retrieve_by_subject(STACK_OF(X509_OBJECT) *h, int type,
  424. X509_NAME *name)
  425. {
  426. int idx;
  427. idx = X509_OBJECT_idx_by_subject(h, type, name);
  428. if (idx==-1) return NULL;
  429. return sk_X509_OBJECT_value(h, idx);
  430. }
  431. STACK_OF(X509)* X509_STORE_get1_certs(X509_STORE_CTX *ctx, X509_NAME *nm)
  432. {
  433. int i, idx, cnt;
  434. STACK_OF(X509) *sk;
  435. X509 *x;
  436. X509_OBJECT *obj;
  437. sk = sk_X509_new_null();
  438. CRYPTO_MUTEX_lock_write(&ctx->ctx->objs_lock);
  439. idx = x509_object_idx_cnt(ctx->ctx->objs, X509_LU_X509, nm, &cnt);
  440. if (idx < 0)
  441. {
  442. /* Nothing found in cache: do lookup to possibly add new
  443. * objects to cache
  444. */
  445. X509_OBJECT xobj;
  446. CRYPTO_MUTEX_unlock(&ctx->ctx->objs_lock);
  447. if (!X509_STORE_get_by_subject(ctx, X509_LU_X509, nm, &xobj))
  448. {
  449. sk_X509_free(sk);
  450. return NULL;
  451. }
  452. X509_OBJECT_free_contents(&xobj);
  453. CRYPTO_MUTEX_lock_write(&ctx->ctx->objs_lock);
  454. idx = x509_object_idx_cnt(ctx->ctx->objs,X509_LU_X509,nm, &cnt);
  455. if (idx < 0)
  456. {
  457. CRYPTO_MUTEX_unlock(&ctx->ctx->objs_lock);
  458. sk_X509_free(sk);
  459. return NULL;
  460. }
  461. }
  462. for (i = 0; i < cnt; i++, idx++)
  463. {
  464. obj = sk_X509_OBJECT_value(ctx->ctx->objs, idx);
  465. x = obj->data.x509;
  466. if (!sk_X509_push(sk, X509_up_ref(x)))
  467. {
  468. CRYPTO_MUTEX_unlock(&ctx->ctx->objs_lock);
  469. X509_free(x);
  470. sk_X509_pop_free(sk, X509_free);
  471. return NULL;
  472. }
  473. }
  474. CRYPTO_MUTEX_unlock(&ctx->ctx->objs_lock);
  475. return sk;
  476. }
  477. STACK_OF(X509_CRL)* X509_STORE_get1_crls(X509_STORE_CTX *ctx, X509_NAME *nm)
  478. {
  479. int i, idx, cnt;
  480. STACK_OF(X509_CRL) *sk;
  481. X509_CRL *x;
  482. X509_OBJECT *obj, xobj;
  483. sk = sk_X509_CRL_new_null();
  484. CRYPTO_MUTEX_lock_write(&ctx->ctx->objs_lock);
  485. /* Check cache first */
  486. idx = x509_object_idx_cnt(ctx->ctx->objs, X509_LU_CRL, nm, &cnt);
  487. /* Always do lookup to possibly add new CRLs to cache
  488. */
  489. CRYPTO_MUTEX_unlock(&ctx->ctx->objs_lock);
  490. if (!X509_STORE_get_by_subject(ctx, X509_LU_CRL, nm, &xobj))
  491. {
  492. sk_X509_CRL_free(sk);
  493. return NULL;
  494. }
  495. X509_OBJECT_free_contents(&xobj);
  496. CRYPTO_MUTEX_lock_write(&ctx->ctx->objs_lock);
  497. idx = x509_object_idx_cnt(ctx->ctx->objs,X509_LU_CRL, nm, &cnt);
  498. if (idx < 0)
  499. {
  500. CRYPTO_MUTEX_unlock(&ctx->ctx->objs_lock);
  501. sk_X509_CRL_free(sk);
  502. return NULL;
  503. }
  504. for (i = 0; i < cnt; i++, idx++)
  505. {
  506. obj = sk_X509_OBJECT_value(ctx->ctx->objs, idx);
  507. x = obj->data.crl;
  508. CRYPTO_refcount_inc(&x->references);
  509. if (!sk_X509_CRL_push(sk, x))
  510. {
  511. CRYPTO_MUTEX_unlock(&ctx->ctx->objs_lock);
  512. X509_CRL_free(x);
  513. sk_X509_CRL_pop_free(sk, X509_CRL_free);
  514. return NULL;
  515. }
  516. }
  517. CRYPTO_MUTEX_unlock(&ctx->ctx->objs_lock);
  518. return sk;
  519. }
  520. X509_OBJECT *X509_OBJECT_retrieve_match(STACK_OF(X509_OBJECT) *h, X509_OBJECT *x)
  521. {
  522. size_t idx, i;
  523. X509_OBJECT *obj;
  524. if (!sk_X509_OBJECT_find(h, &idx, x)) {
  525. return NULL;
  526. }
  527. if ((x->type != X509_LU_X509) && (x->type != X509_LU_CRL))
  528. return sk_X509_OBJECT_value(h, idx);
  529. for (i = idx; i < sk_X509_OBJECT_num(h); i++)
  530. {
  531. obj = sk_X509_OBJECT_value(h, i);
  532. if (x509_object_cmp((const X509_OBJECT **)&obj, (const X509_OBJECT **)&x))
  533. return NULL;
  534. if (x->type == X509_LU_X509)
  535. {
  536. if (!X509_cmp(obj->data.x509, x->data.x509))
  537. return obj;
  538. }
  539. else if (x->type == X509_LU_CRL)
  540. {
  541. if (!X509_CRL_match(obj->data.crl, x->data.crl))
  542. return obj;
  543. }
  544. else
  545. return obj;
  546. }
  547. return NULL;
  548. }
  549. /* Try to get issuer certificate from store. Due to limitations
  550. * of the API this can only retrieve a single certificate matching
  551. * a given subject name. However it will fill the cache with all
  552. * matching certificates, so we can examine the cache for all
  553. * matches.
  554. *
  555. * Return values are:
  556. * 1 lookup successful.
  557. * 0 certificate not found.
  558. * -1 some other error.
  559. */
  560. int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x)
  561. {
  562. X509_NAME *xn;
  563. X509_OBJECT obj, *pobj;
  564. int ok, idx, ret;
  565. size_t i;
  566. xn=X509_get_issuer_name(x);
  567. ok=X509_STORE_get_by_subject(ctx,X509_LU_X509,xn,&obj);
  568. if (ok != X509_LU_X509)
  569. {
  570. if (ok == X509_LU_RETRY)
  571. {
  572. X509_OBJECT_free_contents(&obj);
  573. OPENSSL_PUT_ERROR(X509, X509_STORE_CTX_get1_issuer, X509_R_SHOULD_RETRY);
  574. return -1;
  575. }
  576. else if (ok != X509_LU_FAIL)
  577. {
  578. X509_OBJECT_free_contents(&obj);
  579. /* not good :-(, break anyway */
  580. return -1;
  581. }
  582. return 0;
  583. }
  584. /* If certificate matches all OK */
  585. if (ctx->check_issued(ctx, x, obj.data.x509))
  586. {
  587. *issuer = obj.data.x509;
  588. return 1;
  589. }
  590. X509_OBJECT_free_contents(&obj);
  591. /* Else find index of first cert accepted by 'check_issued' */
  592. ret = 0;
  593. CRYPTO_MUTEX_lock_write(&ctx->ctx->objs_lock);
  594. idx = X509_OBJECT_idx_by_subject(ctx->ctx->objs, X509_LU_X509, xn);
  595. if (idx != -1) /* should be true as we've had at least one match */
  596. {
  597. /* Look through all matching certs for suitable issuer */
  598. for (i = idx; i < sk_X509_OBJECT_num(ctx->ctx->objs); i++)
  599. {
  600. pobj = sk_X509_OBJECT_value(ctx->ctx->objs, i);
  601. /* See if we've run past the matches */
  602. if (pobj->type != X509_LU_X509)
  603. break;
  604. if (X509_NAME_cmp(xn, X509_get_subject_name(pobj->data.x509)))
  605. break;
  606. if (ctx->check_issued(ctx, x, pobj->data.x509))
  607. {
  608. *issuer = pobj->data.x509;
  609. X509_OBJECT_up_ref_count(pobj);
  610. ret = 1;
  611. break;
  612. }
  613. }
  614. }
  615. CRYPTO_MUTEX_unlock(&ctx->ctx->objs_lock);
  616. return ret;
  617. }
  618. int X509_STORE_set_flags(X509_STORE *ctx, unsigned long flags)
  619. {
  620. return X509_VERIFY_PARAM_set_flags(ctx->param, flags);
  621. }
  622. int X509_STORE_set_depth(X509_STORE *ctx, int depth)
  623. {
  624. X509_VERIFY_PARAM_set_depth(ctx->param, depth);
  625. return 1;
  626. }
  627. int X509_STORE_set_purpose(X509_STORE *ctx, int purpose)
  628. {
  629. return X509_VERIFY_PARAM_set_purpose(ctx->param, purpose);
  630. }
  631. int X509_STORE_set_trust(X509_STORE *ctx, int trust)
  632. {
  633. return X509_VERIFY_PARAM_set_trust(ctx->param, trust);
  634. }
  635. int X509_STORE_set1_param(X509_STORE *ctx, X509_VERIFY_PARAM *param)
  636. {
  637. return X509_VERIFY_PARAM_set1(ctx->param, param);
  638. }
  639. void X509_STORE_set_verify_cb(X509_STORE *ctx,
  640. int (*verify_cb)(int, X509_STORE_CTX *))
  641. {
  642. ctx->verify_cb = verify_cb;
  643. }
  644. void X509_STORE_set_lookup_crls_cb(X509_STORE *ctx,
  645. STACK_OF(X509_CRL)* (*cb)(X509_STORE_CTX *ctx, X509_NAME *nm))
  646. {
  647. ctx->lookup_crls = cb;
  648. }
  649. X509_STORE *X509_STORE_CTX_get0_store(X509_STORE_CTX *ctx)
  650. {
  651. return ctx->ctx;
  652. }