diff options
| author | jsing <> | 2014-04-20 16:10:10 +0000 |
|---|---|---|
| committer | jsing <> | 2014-04-20 16:10:10 +0000 |
| commit | 8aa5cc9e2555b404cda4a86d2d7eb2b208430f46 (patch) | |
| tree | 0f2bd825121fc0e3357fbeb2dd62261b82250398 /src/lib/libcrypto/x509/x509_trs.c | |
| parent | 837f29e8dc024eb12e6553a87d298bfcf9d08daf (diff) | |
| download | openbsd-8aa5cc9e2555b404cda4a86d2d7eb2b208430f46.tar.gz openbsd-8aa5cc9e2555b404cda4a86d2d7eb2b208430f46.tar.bz2 openbsd-8aa5cc9e2555b404cda4a86d2d7eb2b208430f46.zip | |
KNF.
Diffstat (limited to 'src/lib/libcrypto/x509/x509_trs.c')
| -rw-r--r-- | src/lib/libcrypto/x509/x509_trs.c | 167 |
1 files changed, 101 insertions, 66 deletions
diff --git a/src/lib/libcrypto/x509/x509_trs.c b/src/lib/libcrypto/x509/x509_trs.c index bdda53ec6b..90fd128591 100644 --- a/src/lib/libcrypto/x509/x509_trs.c +++ b/src/lib/libcrypto/x509/x509_trs.c | |||
| @@ -10,7 +10,7 @@ | |||
| 10 | * are met: | 10 | * are met: |
| 11 | * | 11 | * |
| 12 | * 1. Redistributions of source code must retain the above copyright | 12 | * 1. Redistributions of source code must retain the above copyright |
| 13 | * notice, this list of conditions and the following disclaimer. | 13 | * notice, this list of conditions and the following disclaimer. |
| 14 | * | 14 | * |
| 15 | * 2. Redistributions in binary form must reproduce the above copyright | 15 | * 2. Redistributions in binary form must reproduce the above copyright |
| 16 | * notice, this list of conditions and the following disclaimer in | 16 | * notice, this list of conditions and the following disclaimer in |
| @@ -61,8 +61,7 @@ | |||
| 61 | #include <openssl/x509v3.h> | 61 | #include <openssl/x509v3.h> |
| 62 | 62 | ||
| 63 | 63 | ||
| 64 | static int tr_cmp(const X509_TRUST * const *a, | 64 | static int tr_cmp(const X509_TRUST * const *a, const X509_TRUST * const *b); |
| 65 | const X509_TRUST * const *b); | ||
| 66 | static void trtable_free(X509_TRUST *p); | 65 | static void trtable_free(X509_TRUST *p); |
| 67 | 66 | ||
| 68 | static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags); | 67 | static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags); |
| @@ -78,14 +77,14 @@ static int (*default_trust)(int id, X509 *x, int flags) = obj_trust; | |||
| 78 | */ | 77 | */ |
| 79 | 78 | ||
| 80 | static X509_TRUST trstandard[] = { | 79 | static X509_TRUST trstandard[] = { |
| 81 | {X509_TRUST_COMPAT, 0, trust_compat, "compatible", 0, NULL}, | 80 | {X509_TRUST_COMPAT, 0, trust_compat, "compatible", 0, NULL}, |
| 82 | {X509_TRUST_SSL_CLIENT, 0, trust_1oidany, "SSL Client", NID_client_auth, NULL}, | 81 | {X509_TRUST_SSL_CLIENT, 0, trust_1oidany, "SSL Client", NID_client_auth, NULL}, |
| 83 | {X509_TRUST_SSL_SERVER, 0, trust_1oidany, "SSL Server", NID_server_auth, NULL}, | 82 | {X509_TRUST_SSL_SERVER, 0, trust_1oidany, "SSL Server", NID_server_auth, NULL}, |
| 84 | {X509_TRUST_EMAIL, 0, trust_1oidany, "S/MIME email", NID_email_protect, NULL}, | 83 | {X509_TRUST_EMAIL, 0, trust_1oidany, "S/MIME email", NID_email_protect, NULL}, |
| 85 | {X509_TRUST_OBJECT_SIGN, 0, trust_1oidany, "Object Signer", NID_code_sign, NULL}, | 84 | {X509_TRUST_OBJECT_SIGN, 0, trust_1oidany, "Object Signer", NID_code_sign, NULL}, |
| 86 | {X509_TRUST_OCSP_SIGN, 0, trust_1oid, "OCSP responder", NID_OCSP_sign, NULL}, | 85 | {X509_TRUST_OCSP_SIGN, 0, trust_1oid, "OCSP responder", NID_OCSP_sign, NULL}, |
| 87 | {X509_TRUST_OCSP_REQUEST, 0, trust_1oid, "OCSP request", NID_ad_OCSP, NULL}, | 86 | {X509_TRUST_OCSP_REQUEST, 0, trust_1oid, "OCSP request", NID_ad_OCSP, NULL}, |
| 88 | {X509_TRUST_TSA, 0, trust_1oidany, "TSA server", NID_time_stamp, NULL} | 87 | {X509_TRUST_TSA, 0, trust_1oidany, "TSA server", NID_time_stamp, NULL} |
| 89 | }; | 88 | }; |
| 90 | 89 | ||
| 91 | #define X509_TRUST_COUNT (sizeof(trstandard)/sizeof(X509_TRUST)) | 90 | #define X509_TRUST_COUNT (sizeof(trstandard)/sizeof(X509_TRUST)) |
| @@ -94,61 +93,76 @@ IMPLEMENT_STACK_OF(X509_TRUST) | |||
| 94 | 93 | ||
| 95 | static STACK_OF(X509_TRUST) *trtable = NULL; | 94 | static STACK_OF(X509_TRUST) *trtable = NULL; |
| 96 | 95 | ||
| 97 | static int tr_cmp(const X509_TRUST * const *a, | 96 | static int |
| 98 | const X509_TRUST * const *b) | 97 | tr_cmp(const X509_TRUST * const *a, const X509_TRUST * const *b) |
| 99 | { | 98 | { |
| 100 | return (*a)->trust - (*b)->trust; | 99 | return (*a)->trust - (*b)->trust; |
| 101 | } | 100 | } |
| 102 | 101 | ||
| 103 | int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int) | 102 | int |
| 103 | (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int) | ||
| 104 | { | 104 | { |
| 105 | int (*oldtrust)(int , X509 *, int); | 105 | int (*oldtrust)(int , X509 *, int); |
| 106 | |||
| 106 | oldtrust = default_trust; | 107 | oldtrust = default_trust; |
| 107 | default_trust = trust; | 108 | default_trust = trust; |
| 108 | return oldtrust; | 109 | return oldtrust; |
| 109 | } | 110 | } |
| 110 | 111 | ||
| 111 | 112 | int | |
| 112 | int X509_check_trust(X509 *x, int id, int flags) | 113 | X509_check_trust(X509 *x, int id, int flags) |
| 113 | { | 114 | { |
| 114 | X509_TRUST *pt; | 115 | X509_TRUST *pt; |
| 115 | int idx; | 116 | int idx; |
| 116 | if(id == -1) return 1; | 117 | |
| 118 | if (id == -1) | ||
| 119 | return 1; | ||
| 117 | idx = X509_TRUST_get_by_id(id); | 120 | idx = X509_TRUST_get_by_id(id); |
| 118 | if(idx == -1) return default_trust(id, x, flags); | 121 | if (idx == -1) |
| 122 | return default_trust(id, x, flags); | ||
| 119 | pt = X509_TRUST_get0(idx); | 123 | pt = X509_TRUST_get0(idx); |
| 120 | return pt->check_trust(pt, x, flags); | 124 | return pt->check_trust(pt, x, flags); |
| 121 | } | 125 | } |
| 122 | 126 | ||
| 123 | int X509_TRUST_get_count(void) | 127 | int |
| 128 | X509_TRUST_get_count(void) | ||
| 124 | { | 129 | { |
| 125 | if(!trtable) return X509_TRUST_COUNT; | 130 | if (!trtable) |
| 131 | return X509_TRUST_COUNT; | ||
| 126 | return sk_X509_TRUST_num(trtable) + X509_TRUST_COUNT; | 132 | return sk_X509_TRUST_num(trtable) + X509_TRUST_COUNT; |
| 127 | } | 133 | } |
| 128 | 134 | ||
| 129 | X509_TRUST * X509_TRUST_get0(int idx) | 135 | X509_TRUST * |
| 136 | X509_TRUST_get0(int idx) | ||
| 130 | { | 137 | { |
| 131 | if(idx < 0) return NULL; | 138 | if (idx < 0) |
| 132 | if(idx < (int)X509_TRUST_COUNT) return trstandard + idx; | 139 | return NULL; |
| 140 | if (idx < (int)X509_TRUST_COUNT) | ||
| 141 | return trstandard + idx; | ||
| 133 | return sk_X509_TRUST_value(trtable, idx - X509_TRUST_COUNT); | 142 | return sk_X509_TRUST_value(trtable, idx - X509_TRUST_COUNT); |
| 134 | } | 143 | } |
| 135 | 144 | ||
| 136 | int X509_TRUST_get_by_id(int id) | 145 | int |
| 146 | X509_TRUST_get_by_id(int id) | ||
| 137 | { | 147 | { |
| 138 | X509_TRUST tmp; | 148 | X509_TRUST tmp; |
| 139 | int idx; | 149 | int idx; |
| 140 | if((id >= X509_TRUST_MIN) && (id <= X509_TRUST_MAX)) | 150 | |
| 141 | return id - X509_TRUST_MIN; | 151 | if ((id >= X509_TRUST_MIN) && (id <= X509_TRUST_MAX)) |
| 152 | return id - X509_TRUST_MIN; | ||
| 142 | tmp.trust = id; | 153 | tmp.trust = id; |
| 143 | if(!trtable) return -1; | 154 | if (!trtable) |
| 155 | return -1; | ||
| 144 | idx = sk_X509_TRUST_find(trtable, &tmp); | 156 | idx = sk_X509_TRUST_find(trtable, &tmp); |
| 145 | if(idx == -1) return -1; | 157 | if (idx == -1) |
| 158 | return -1; | ||
| 146 | return idx + X509_TRUST_COUNT; | 159 | return idx + X509_TRUST_COUNT; |
| 147 | } | 160 | } |
| 148 | 161 | ||
| 149 | int X509_TRUST_set(int *t, int trust) | 162 | int |
| 163 | X509_TRUST_set(int *t, int trust) | ||
| 150 | { | 164 | { |
| 151 | if(X509_TRUST_get_by_id(trust) == -1) { | 165 | if (X509_TRUST_get_by_id(trust) == -1) { |
| 152 | X509err(X509_F_X509_TRUST_SET, X509_R_INVALID_TRUST); | 166 | X509err(X509_F_X509_TRUST_SET, X509_R_INVALID_TRUST); |
| 153 | return 0; | 167 | return 0; |
| 154 | } | 168 | } |
| @@ -156,11 +170,13 @@ int X509_TRUST_set(int *t, int trust) | |||
| 156 | return 1; | 170 | return 1; |
| 157 | } | 171 | } |
| 158 | 172 | ||
| 159 | int X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int), | 173 | int |
| 160 | char *name, int arg1, void *arg2) | 174 | X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int), |
| 175 | char *name, int arg1, void *arg2) | ||
| 161 | { | 176 | { |
| 162 | int idx; | 177 | int idx; |
| 163 | X509_TRUST *trtmp; | 178 | X509_TRUST *trtmp; |
| 179 | |||
| 164 | /* This is set according to what we change: application can't set it */ | 180 | /* This is set according to what we change: application can't set it */ |
| 165 | flags &= ~X509_TRUST_DYNAMIC; | 181 | flags &= ~X509_TRUST_DYNAMIC; |
| 166 | /* This will always be set for application modified trust entries */ | 182 | /* This will always be set for application modified trust entries */ |
| @@ -168,9 +184,9 @@ int X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int), | |||
| 168 | /* Get existing entry if any */ | 184 | /* Get existing entry if any */ |
| 169 | idx = X509_TRUST_get_by_id(id); | 185 | idx = X509_TRUST_get_by_id(id); |
| 170 | /* Need a new entry */ | 186 | /* Need a new entry */ |
| 171 | if(idx == -1) { | 187 | if (idx == -1) { |
| 172 | if(!(trtmp = malloc(sizeof(X509_TRUST)))) { | 188 | if (!(trtmp = malloc(sizeof(X509_TRUST)))) { |
| 173 | X509err(X509_F_X509_TRUST_ADD,ERR_R_MALLOC_FAILURE); | 189 | X509err(X509_F_X509_TRUST_ADD, ERR_R_MALLOC_FAILURE); |
| 174 | return 0; | 190 | return 0; |
| 175 | } | 191 | } |
| 176 | trtmp->flags = X509_TRUST_DYNAMIC; | 192 | trtmp->flags = X509_TRUST_DYNAMIC; |
| @@ -178,10 +194,11 @@ int X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int), | |||
| 178 | trtmp = X509_TRUST_get0(idx); | 194 | trtmp = X509_TRUST_get0(idx); |
| 179 | 195 | ||
| 180 | /* free existing name if dynamic */ | 196 | /* free existing name if dynamic */ |
| 181 | if(trtmp->flags & X509_TRUST_DYNAMIC_NAME) free(trtmp->name); | 197 | if (trtmp->flags & X509_TRUST_DYNAMIC_NAME) |
| 198 | free(trtmp->name); | ||
| 182 | /* dup supplied name */ | 199 | /* dup supplied name */ |
| 183 | if(!(trtmp->name = BUF_strdup(name))) { | 200 | if (!(trtmp->name = BUF_strdup(name))) { |
| 184 | X509err(X509_F_X509_TRUST_ADD,ERR_R_MALLOC_FAILURE); | 201 | X509err(X509_F_X509_TRUST_ADD, ERR_R_MALLOC_FAILURE); |
| 185 | return 0; | 202 | return 0; |
| 186 | } | 203 | } |
| 187 | /* Keep the dynamic flag of existing entry */ | 204 | /* Keep the dynamic flag of existing entry */ |
| @@ -195,22 +212,24 @@ int X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int), | |||
| 195 | trtmp->arg2 = arg2; | 212 | trtmp->arg2 = arg2; |
| 196 | 213 | ||
| 197 | /* If its a new entry manage the dynamic table */ | 214 | /* If its a new entry manage the dynamic table */ |
| 198 | if(idx == -1) { | 215 | if (idx == -1) { |
| 199 | if(!trtable && !(trtable = sk_X509_TRUST_new(tr_cmp))) { | 216 | if (!trtable && !(trtable = sk_X509_TRUST_new(tr_cmp))) { |
| 200 | X509err(X509_F_X509_TRUST_ADD,ERR_R_MALLOC_FAILURE); | 217 | X509err(X509_F_X509_TRUST_ADD, ERR_R_MALLOC_FAILURE); |
| 201 | return 0; | 218 | return 0; |
| 202 | } | 219 | } |
| 203 | if (!sk_X509_TRUST_push(trtable, trtmp)) { | 220 | if (!sk_X509_TRUST_push(trtable, trtmp)) { |
| 204 | X509err(X509_F_X509_TRUST_ADD,ERR_R_MALLOC_FAILURE); | 221 | X509err(X509_F_X509_TRUST_ADD, ERR_R_MALLOC_FAILURE); |
| 205 | return 0; | 222 | return 0; |
| 206 | } | 223 | } |
| 207 | } | 224 | } |
| 208 | return 1; | 225 | return 1; |
| 209 | } | 226 | } |
| 210 | 227 | ||
| 211 | static void trtable_free(X509_TRUST *p) | 228 | static void |
| 229 | trtable_free(X509_TRUST *p) | ||
| 212 | { | 230 | { |
| 213 | if(!p) return; | 231 | if (!p) |
| 232 | return; | ||
| 214 | if (p->flags & X509_TRUST_DYNAMIC) { | 233 | if (p->flags & X509_TRUST_DYNAMIC) { |
| 215 | if (p->flags & X509_TRUST_DYNAMIC_NAME) | 234 | if (p->flags & X509_TRUST_DYNAMIC_NAME) |
| 216 | free(p->name); | 235 | free(p->name); |
| @@ -218,32 +237,39 @@ static void trtable_free(X509_TRUST *p) | |||
| 218 | } | 237 | } |
| 219 | } | 238 | } |
| 220 | 239 | ||
| 221 | void X509_TRUST_cleanup(void) | 240 | void |
| 241 | X509_TRUST_cleanup(void) | ||
| 222 | { | 242 | { |
| 223 | unsigned int i; | 243 | unsigned int i; |
| 224 | for(i = 0; i < X509_TRUST_COUNT; i++) trtable_free(trstandard + i); | 244 | |
| 245 | for(i = 0; i < X509_TRUST_COUNT; i++) | ||
| 246 | trtable_free(trstandard + i); | ||
| 225 | sk_X509_TRUST_pop_free(trtable, trtable_free); | 247 | sk_X509_TRUST_pop_free(trtable, trtable_free); |
| 226 | trtable = NULL; | 248 | trtable = NULL; |
| 227 | } | 249 | } |
| 228 | 250 | ||
| 229 | int X509_TRUST_get_flags(X509_TRUST *xp) | 251 | int |
| 252 | X509_TRUST_get_flags(X509_TRUST *xp) | ||
| 230 | { | 253 | { |
| 231 | return xp->flags; | 254 | return xp->flags; |
| 232 | } | 255 | } |
| 233 | 256 | ||
| 234 | char *X509_TRUST_get0_name(X509_TRUST *xp) | 257 | char * |
| 258 | X509_TRUST_get0_name(X509_TRUST *xp) | ||
| 235 | { | 259 | { |
| 236 | return xp->name; | 260 | return xp->name; |
| 237 | } | 261 | } |
| 238 | 262 | ||
| 239 | int X509_TRUST_get_trust(X509_TRUST *xp) | 263 | int |
| 264 | X509_TRUST_get_trust(X509_TRUST *xp) | ||
| 240 | { | 265 | { |
| 241 | return xp->trust; | 266 | return xp->trust; |
| 242 | } | 267 | } |
| 243 | 268 | ||
| 244 | static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags) | 269 | static int |
| 270 | trust_1oidany(X509_TRUST *trust, X509 *x, int flags) | ||
| 245 | { | 271 | { |
| 246 | if(x->aux && (x->aux->trust || x->aux->reject)) | 272 | if (x->aux && (x->aux->trust || x->aux->reject)) |
| 247 | return obj_trust(trust->arg1, x, flags); | 273 | return obj_trust(trust->arg1, x, flags); |
| 248 | /* we don't have any trust settings: for compatibility | 274 | /* we don't have any trust settings: for compatibility |
| 249 | * we return trusted if it is self signed | 275 | * we return trusted if it is self signed |
| @@ -251,38 +277,47 @@ static int trust_1oidany(X509_TRUST *trust, X509 *x, int flags) | |||
| 251 | return trust_compat(trust, x, flags); | 277 | return trust_compat(trust, x, flags); |
| 252 | } | 278 | } |
| 253 | 279 | ||
| 254 | static int trust_1oid(X509_TRUST *trust, X509 *x, int flags) | 280 | static int |
| 281 | trust_1oid(X509_TRUST *trust, X509 *x, int flags) | ||
| 255 | { | 282 | { |
| 256 | if(x->aux) return obj_trust(trust->arg1, x, flags); | 283 | if (x->aux) |
| 284 | return obj_trust(trust->arg1, x, flags); | ||
| 257 | return X509_TRUST_UNTRUSTED; | 285 | return X509_TRUST_UNTRUSTED; |
| 258 | } | 286 | } |
| 259 | 287 | ||
| 260 | static int trust_compat(X509_TRUST *trust, X509 *x, int flags) | 288 | static int |
| 289 | trust_compat(X509_TRUST *trust, X509 *x, int flags) | ||
| 261 | { | 290 | { |
| 262 | X509_check_purpose(x, -1, 0); | 291 | X509_check_purpose(x, -1, 0); |
| 263 | if(x->ex_flags & EXFLAG_SS) return X509_TRUST_TRUSTED; | 292 | if (x->ex_flags & EXFLAG_SS) |
| 264 | else return X509_TRUST_UNTRUSTED; | 293 | return X509_TRUST_TRUSTED; |
| 294 | else | ||
| 295 | return X509_TRUST_UNTRUSTED; | ||
| 265 | } | 296 | } |
| 266 | 297 | ||
| 267 | static int obj_trust(int id, X509 *x, int flags) | 298 | static int |
| 299 | obj_trust(int id, X509 *x, int flags) | ||
| 268 | { | 300 | { |
| 269 | ASN1_OBJECT *obj; | 301 | ASN1_OBJECT *obj; |
| 270 | int i; | 302 | int i; |
| 271 | X509_CERT_AUX *ax; | 303 | X509_CERT_AUX *ax; |
| 304 | |||
| 272 | ax = x->aux; | 305 | ax = x->aux; |
| 273 | if(!ax) return X509_TRUST_UNTRUSTED; | 306 | if (!ax) |
| 274 | if(ax->reject) { | 307 | return X509_TRUST_UNTRUSTED; |
| 275 | for(i = 0; i < sk_ASN1_OBJECT_num(ax->reject); i++) { | 308 | if (ax->reject) { |
| 309 | for (i = 0; i < sk_ASN1_OBJECT_num(ax->reject); i++) { | ||
| 276 | obj = sk_ASN1_OBJECT_value(ax->reject, i); | 310 | obj = sk_ASN1_OBJECT_value(ax->reject, i); |
| 277 | if(OBJ_obj2nid(obj) == id) return X509_TRUST_REJECTED; | 311 | if (OBJ_obj2nid(obj) == id) |
| 312 | return X509_TRUST_REJECTED; | ||
| 278 | } | 313 | } |
| 279 | } | 314 | } |
| 280 | if(ax->trust) { | 315 | if (ax->trust) { |
| 281 | for(i = 0; i < sk_ASN1_OBJECT_num(ax->trust); i++) { | 316 | for (i = 0; i < sk_ASN1_OBJECT_num(ax->trust); i++) { |
| 282 | obj = sk_ASN1_OBJECT_value(ax->trust, i); | 317 | obj = sk_ASN1_OBJECT_value(ax->trust, i); |
| 283 | if(OBJ_obj2nid(obj) == id) return X509_TRUST_TRUSTED; | 318 | if (OBJ_obj2nid(obj) == id) |
| 319 | return X509_TRUST_TRUSTED; | ||
| 284 | } | 320 | } |
| 285 | } | 321 | } |
| 286 | return X509_TRUST_UNTRUSTED; | 322 | return X509_TRUST_UNTRUSTED; |
| 287 | } | 323 | } |
| 288 | |||
