diff options
Diffstat (limited to 'src/lib/libcrypto/x509/x509_cmp.c')
| -rw-r--r-- | src/lib/libcrypto/x509/x509_cmp.c | 231 |
1 files changed, 128 insertions, 103 deletions
diff --git a/src/lib/libcrypto/x509/x509_cmp.c b/src/lib/libcrypto/x509/x509_cmp.c index 87c4596414..b6b3423e3f 100644 --- a/src/lib/libcrypto/x509/x509_cmp.c +++ b/src/lib/libcrypto/x509/x509_cmp.c | |||
| @@ -5,21 +5,21 @@ | |||
| 5 | * This package is an SSL implementation written | 5 | * This package is an SSL implementation written |
| 6 | * by Eric Young (eay@cryptsoft.com). | 6 | * by Eric Young (eay@cryptsoft.com). |
| 7 | * The implementation was written so as to conform with Netscapes SSL. | 7 | * The implementation was written so as to conform with Netscapes SSL. |
| 8 | * | 8 | * |
| 9 | * This library is free for commercial and non-commercial use as long as | 9 | * This library is free for commercial and non-commercial use as long as |
| 10 | * the following conditions are aheared to. The following conditions | 10 | * the following conditions are aheared to. The following conditions |
| 11 | * apply to all code found in this distribution, be it the RC4, RSA, | 11 | * apply to all code found in this distribution, be it the RC4, RSA, |
| 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | 12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
| 13 | * included with this distribution is covered by the same copyright terms | 13 | * included with this distribution is covered by the same copyright terms |
| 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
| 15 | * | 15 | * |
| 16 | * Copyright remains Eric Young's, and as such any Copyright notices in | 16 | * Copyright remains Eric Young's, and as such any Copyright notices in |
| 17 | * the code are not to be removed. | 17 | * the code are not to be removed. |
| 18 | * If this package is used in a product, Eric Young should be given attribution | 18 | * If this package is used in a product, Eric Young should be given attribution |
| 19 | * as the author of the parts of the library used. | 19 | * as the author of the parts of the library used. |
| 20 | * This can be in the form of a textual message at program startup or | 20 | * This can be in the form of a textual message at program startup or |
| 21 | * in documentation (online or textual) provided with the package. | 21 | * in documentation (online or textual) provided with the package. |
| 22 | * | 22 | * |
| 23 | * Redistribution and use in source and binary forms, with or without | 23 | * Redistribution and use in source and binary forms, with or without |
| 24 | * modification, are permitted provided that the following conditions | 24 | * modification, are permitted provided that the following conditions |
| 25 | * are met: | 25 | * are met: |
| @@ -34,10 +34,10 @@ | |||
| 34 | * Eric Young (eay@cryptsoft.com)" | 34 | * Eric Young (eay@cryptsoft.com)" |
| 35 | * The word 'cryptographic' can be left out if the rouines from the library | 35 | * The word 'cryptographic' can be left out if the rouines from the library |
| 36 | * being used are not cryptographic related :-). | 36 | * being used are not cryptographic related :-). |
| 37 | * 4. If you include any Windows specific code (or a derivative thereof) from | 37 | * 4. If you include any Windows specific code (or a derivative thereof) from |
| 38 | * the apps directory (application code) you must include an acknowledgement: | 38 | * the apps directory (application code) you must include an acknowledgement: |
| 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
| 40 | * | 40 | * |
| 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
| 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| @@ -49,7 +49,7 @@ | |||
| 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 51 | * SUCH DAMAGE. | 51 | * SUCH DAMAGE. |
| 52 | * | 52 | * |
| 53 | * The licence and distribution terms for any publically available version or | 53 | * The licence and distribution terms for any publically available version or |
| 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | 54 | * derivative of this code cannot be changed. i.e. this code cannot simply be |
| 55 | * copied and put under another distribution licence | 55 | * copied and put under another distribution licence |
| @@ -64,105 +64,121 @@ | |||
| 64 | #include <openssl/x509.h> | 64 | #include <openssl/x509.h> |
| 65 | #include <openssl/x509v3.h> | 65 | #include <openssl/x509v3.h> |
| 66 | 66 | ||
| 67 | int X509_issuer_and_serial_cmp(const X509 *a, const X509 *b) | 67 | int |
| 68 | X509_issuer_and_serial_cmp(const X509 *a, const X509 *b) | ||
| 68 | { | 69 | { |
| 69 | int i; | 70 | int i; |
| 70 | X509_CINF *ai,*bi; | 71 | X509_CINF *ai, *bi; |
| 71 | 72 | ||
| 72 | ai=a->cert_info; | 73 | ai = a->cert_info; |
| 73 | bi=b->cert_info; | 74 | bi = b->cert_info; |
| 74 | i=M_ASN1_INTEGER_cmp(ai->serialNumber,bi->serialNumber); | 75 | i = M_ASN1_INTEGER_cmp(ai->serialNumber, bi->serialNumber); |
| 75 | if (i) return(i); | 76 | if (i) |
| 76 | return(X509_NAME_cmp(ai->issuer,bi->issuer)); | 77 | return (i); |
| 78 | return (X509_NAME_cmp(ai->issuer, bi->issuer)); | ||
| 77 | } | 79 | } |
| 78 | 80 | ||
| 79 | #ifndef OPENSSL_NO_MD5 | 81 | #ifndef OPENSSL_NO_MD5 |
| 80 | unsigned long X509_issuer_and_serial_hash(X509 *a) | 82 | unsigned long |
| 83 | X509_issuer_and_serial_hash(X509 *a) | ||
| 81 | { | 84 | { |
| 82 | unsigned long ret=0; | 85 | unsigned long ret = 0; |
| 83 | EVP_MD_CTX ctx; | 86 | EVP_MD_CTX ctx; |
| 84 | unsigned char md[16]; | 87 | unsigned char md[16]; |
| 85 | char *f; | 88 | char *f; |
| 86 | 89 | ||
| 87 | EVP_MD_CTX_init(&ctx); | 90 | EVP_MD_CTX_init(&ctx); |
| 88 | f=X509_NAME_oneline(a->cert_info->issuer,NULL,0); | 91 | f = X509_NAME_oneline(a->cert_info->issuer, NULL, 0); |
| 89 | if (!EVP_DigestInit_ex(&ctx, EVP_md5(), NULL)) | 92 | if (!EVP_DigestInit_ex(&ctx, EVP_md5(), NULL)) |
| 90 | goto err; | 93 | goto err; |
| 91 | if (!EVP_DigestUpdate(&ctx,(unsigned char *)f,strlen(f))) | 94 | if (!EVP_DigestUpdate(&ctx, (unsigned char *)f, strlen(f))) |
| 92 | goto err; | 95 | goto err; |
| 93 | free(f); | 96 | free(f); |
| 94 | if(!EVP_DigestUpdate(&ctx,(unsigned char *)a->cert_info->serialNumber->data, | 97 | if (!EVP_DigestUpdate(&ctx, |
| 95 | (unsigned long)a->cert_info->serialNumber->length)) | 98 | (unsigned char *)a->cert_info->serialNumber->data, |
| 99 | (unsigned long)a->cert_info->serialNumber->length)) | ||
| 96 | goto err; | 100 | goto err; |
| 97 | if (!EVP_DigestFinal_ex(&ctx,&(md[0]),NULL)) | 101 | if (!EVP_DigestFinal_ex(&ctx, &(md[0]), NULL)) |
| 98 | goto err; | 102 | goto err; |
| 99 | ret=( ((unsigned long)md[0] )|((unsigned long)md[1]<<8L)| | 103 | ret = (((unsigned long)md[0]) | ((unsigned long)md[1] << 8L) | |
| 100 | ((unsigned long)md[2]<<16L)|((unsigned long)md[3]<<24L) | 104 | ((unsigned long)md[2] << 16L) | ((unsigned long)md[3] << 24L)) & |
| 101 | )&0xffffffffL; | 105 | 0xffffffffL; |
| 102 | err: | 106 | |
| 107 | err: | ||
| 103 | EVP_MD_CTX_cleanup(&ctx); | 108 | EVP_MD_CTX_cleanup(&ctx); |
| 104 | return(ret); | 109 | return (ret); |
| 105 | } | 110 | } |
| 106 | #endif | 111 | #endif |
| 107 | 112 | ||
| 108 | int X509_issuer_name_cmp(const X509 *a, const X509 *b) | 113 | int |
| 114 | X509_issuer_name_cmp(const X509 *a, const X509 *b) | ||
| 109 | { | 115 | { |
| 110 | return(X509_NAME_cmp(a->cert_info->issuer,b->cert_info->issuer)); | 116 | return (X509_NAME_cmp(a->cert_info->issuer, b->cert_info->issuer)); |
| 111 | } | 117 | } |
| 112 | 118 | ||
| 113 | int X509_subject_name_cmp(const X509 *a, const X509 *b) | 119 | int |
| 120 | X509_subject_name_cmp(const X509 *a, const X509 *b) | ||
| 114 | { | 121 | { |
| 115 | return(X509_NAME_cmp(a->cert_info->subject,b->cert_info->subject)); | 122 | return (X509_NAME_cmp(a->cert_info->subject, b->cert_info->subject)); |
| 116 | } | 123 | } |
| 117 | 124 | ||
| 118 | int X509_CRL_cmp(const X509_CRL *a, const X509_CRL *b) | 125 | int |
| 126 | X509_CRL_cmp(const X509_CRL *a, const X509_CRL *b) | ||
| 119 | { | 127 | { |
| 120 | return(X509_NAME_cmp(a->crl->issuer,b->crl->issuer)); | 128 | return (X509_NAME_cmp(a->crl->issuer, b->crl->issuer)); |
| 121 | } | 129 | } |
| 122 | 130 | ||
| 123 | #ifndef OPENSSL_NO_SHA | 131 | #ifndef OPENSSL_NO_SHA |
| 124 | int X509_CRL_match(const X509_CRL *a, const X509_CRL *b) | 132 | int |
| 133 | X509_CRL_match(const X509_CRL *a, const X509_CRL *b) | ||
| 125 | { | 134 | { |
| 126 | return memcmp(a->sha1_hash, b->sha1_hash, 20); | 135 | return memcmp(a->sha1_hash, b->sha1_hash, 20); |
| 127 | } | 136 | } |
| 128 | #endif | 137 | #endif |
| 129 | 138 | ||
| 130 | X509_NAME *X509_get_issuer_name(X509 *a) | 139 | X509_NAME * |
| 140 | X509_get_issuer_name(X509 *a) | ||
| 131 | { | 141 | { |
| 132 | return(a->cert_info->issuer); | 142 | return (a->cert_info->issuer); |
| 133 | } | 143 | } |
| 134 | 144 | ||
| 135 | unsigned long X509_issuer_name_hash(X509 *x) | 145 | unsigned long |
| 146 | X509_issuer_name_hash(X509 *x) | ||
| 136 | { | 147 | { |
| 137 | return(X509_NAME_hash(x->cert_info->issuer)); | 148 | return (X509_NAME_hash(x->cert_info->issuer)); |
| 138 | } | 149 | } |
| 139 | 150 | ||
| 140 | #ifndef OPENSSL_NO_MD5 | 151 | #ifndef OPENSSL_NO_MD5 |
| 141 | unsigned long X509_issuer_name_hash_old(X509 *x) | 152 | unsigned long |
| 153 | X509_issuer_name_hash_old(X509 *x) | ||
| 142 | { | 154 | { |
| 143 | return(X509_NAME_hash_old(x->cert_info->issuer)); | 155 | return (X509_NAME_hash_old(x->cert_info->issuer)); |
| 144 | } | 156 | } |
| 145 | #endif | 157 | #endif |
| 146 | 158 | ||
| 147 | X509_NAME *X509_get_subject_name(X509 *a) | 159 | X509_NAME * |
| 160 | X509_get_subject_name(X509 *a) | ||
| 148 | { | 161 | { |
| 149 | return(a->cert_info->subject); | 162 | return (a->cert_info->subject); |
| 150 | } | 163 | } |
| 151 | 164 | ||
| 152 | ASN1_INTEGER *X509_get_serialNumber(X509 *a) | 165 | ASN1_INTEGER * |
| 166 | X509_get_serialNumber(X509 *a) | ||
| 153 | { | 167 | { |
| 154 | return(a->cert_info->serialNumber); | 168 | return (a->cert_info->serialNumber); |
| 155 | } | 169 | } |
| 156 | 170 | ||
| 157 | unsigned long X509_subject_name_hash(X509 *x) | 171 | unsigned long |
| 172 | X509_subject_name_hash(X509 *x) | ||
| 158 | { | 173 | { |
| 159 | return(X509_NAME_hash(x->cert_info->subject)); | 174 | return (X509_NAME_hash(x->cert_info->subject)); |
| 160 | } | 175 | } |
| 161 | 176 | ||
| 162 | #ifndef OPENSSL_NO_MD5 | 177 | #ifndef OPENSSL_NO_MD5 |
| 163 | unsigned long X509_subject_name_hash_old(X509 *x) | 178 | unsigned long |
| 179 | X509_subject_name_hash_old(X509 *x) | ||
| 164 | { | 180 | { |
| 165 | return(X509_NAME_hash_old(x->cert_info->subject)); | 181 | return (X509_NAME_hash_old(x->cert_info->subject)); |
| 166 | } | 182 | } |
| 167 | #endif | 183 | #endif |
| 168 | 184 | ||
| @@ -176,7 +192,8 @@ unsigned long X509_subject_name_hash_old(X509 *x) | |||
| 176 | * where the "depth-first" constification tree has to halt | 192 | * where the "depth-first" constification tree has to halt |
| 177 | * with an evil cast. | 193 | * with an evil cast. |
| 178 | */ | 194 | */ |
| 179 | int X509_cmp(const X509 *a, const X509 *b) | 195 | int |
| 196 | X509_cmp(const X509 *a, const X509 *b) | ||
| 180 | { | 197 | { |
| 181 | /* ensure hash is valid */ | 198 | /* ensure hash is valid */ |
| 182 | X509_check_purpose((X509 *)a, -1, 0); | 199 | X509_check_purpose((X509 *)a, -1, 0); |
| @@ -186,49 +203,44 @@ int X509_cmp(const X509 *a, const X509 *b) | |||
| 186 | } | 203 | } |
| 187 | #endif | 204 | #endif |
| 188 | 205 | ||
| 189 | 206 | int | |
| 190 | int X509_NAME_cmp(const X509_NAME *a, const X509_NAME *b) | 207 | X509_NAME_cmp(const X509_NAME *a, const X509_NAME *b) |
| 191 | { | 208 | { |
| 192 | int ret; | 209 | int ret; |
| 193 | 210 | ||
| 194 | /* Ensure canonical encoding is present and up to date */ | 211 | /* Ensure canonical encoding is present and up to date */ |
| 195 | |||
| 196 | if (!a->canon_enc || a->modified) { | 212 | if (!a->canon_enc || a->modified) { |
| 197 | ret = i2d_X509_NAME((X509_NAME *)a, NULL); | 213 | ret = i2d_X509_NAME((X509_NAME *)a, NULL); |
| 198 | if (ret < 0) | 214 | if (ret < 0) |
| 199 | return -2; | 215 | return -2; |
| 200 | } | 216 | } |
| 201 | |||
| 202 | if (!b->canon_enc || b->modified) { | 217 | if (!b->canon_enc || b->modified) { |
| 203 | ret = i2d_X509_NAME((X509_NAME *)b, NULL); | 218 | ret = i2d_X509_NAME((X509_NAME *)b, NULL); |
| 204 | if (ret < 0) | 219 | if (ret < 0) |
| 205 | return -2; | 220 | return -2; |
| 206 | } | 221 | } |
| 207 | |||
| 208 | ret = a->canon_enclen - b->canon_enclen; | 222 | ret = a->canon_enclen - b->canon_enclen; |
| 209 | |||
| 210 | if (ret) | 223 | if (ret) |
| 211 | return ret; | 224 | return ret; |
| 212 | |||
| 213 | return memcmp(a->canon_enc, b->canon_enc, a->canon_enclen); | 225 | return memcmp(a->canon_enc, b->canon_enc, a->canon_enclen); |
| 214 | |||
| 215 | } | 226 | } |
| 216 | 227 | ||
| 217 | unsigned long X509_NAME_hash(X509_NAME *x) | 228 | unsigned long |
| 229 | X509_NAME_hash(X509_NAME *x) | ||
| 218 | { | 230 | { |
| 219 | unsigned long ret=0; | 231 | unsigned long ret = 0; |
| 220 | unsigned char md[SHA_DIGEST_LENGTH]; | 232 | unsigned char md[SHA_DIGEST_LENGTH]; |
| 221 | 233 | ||
| 222 | /* Make sure X509_NAME structure contains valid cached encoding */ | 234 | /* Make sure X509_NAME structure contains valid cached encoding */ |
| 223 | i2d_X509_NAME(x,NULL); | 235 | i2d_X509_NAME(x, NULL); |
| 224 | if (!EVP_Digest(x->canon_enc, x->canon_enclen, md, NULL, EVP_sha1(), | 236 | if (!EVP_Digest(x->canon_enc, x->canon_enclen, md, NULL, EVP_sha1(), |
| 225 | NULL)) | 237 | NULL)) |
| 226 | return 0; | 238 | return 0; |
| 227 | 239 | ||
| 228 | ret=( ((unsigned long)md[0] )|((unsigned long)md[1]<<8L)| | 240 | ret = (((unsigned long)md[0]) | ((unsigned long)md[1] << 8L) | |
| 229 | ((unsigned long)md[2]<<16L)|((unsigned long)md[3]<<24L) | 241 | ((unsigned long)md[2] << 16L) | ((unsigned long)md[3] << 24L)) & |
| 230 | )&0xffffffffL; | 242 | 0xffffffffL; |
| 231 | return(ret); | 243 | return (ret); |
| 232 | } | 244 | } |
| 233 | 245 | ||
| 234 | 246 | ||
| @@ -236,82 +248,92 @@ unsigned long X509_NAME_hash(X509_NAME *x) | |||
| 236 | /* I now DER encode the name and hash it. Since I cache the DER encoding, | 248 | /* I now DER encode the name and hash it. Since I cache the DER encoding, |
| 237 | * this is reasonably efficient. */ | 249 | * this is reasonably efficient. */ |
| 238 | 250 | ||
| 239 | unsigned long X509_NAME_hash_old(X509_NAME *x) | 251 | unsigned long |
| 252 | X509_NAME_hash_old(X509_NAME *x) | ||
| 240 | { | 253 | { |
| 241 | EVP_MD_CTX md_ctx; | 254 | EVP_MD_CTX md_ctx; |
| 242 | unsigned long ret=0; | 255 | unsigned long ret = 0; |
| 243 | unsigned char md[16]; | 256 | unsigned char md[16]; |
| 244 | 257 | ||
| 245 | /* Make sure X509_NAME structure contains valid cached encoding */ | 258 | /* Make sure X509_NAME structure contains valid cached encoding */ |
| 246 | i2d_X509_NAME(x,NULL); | 259 | i2d_X509_NAME(x, NULL); |
| 247 | EVP_MD_CTX_init(&md_ctx); | 260 | EVP_MD_CTX_init(&md_ctx); |
| 248 | EVP_MD_CTX_set_flags(&md_ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW); | 261 | EVP_MD_CTX_set_flags(&md_ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW); |
| 249 | if (EVP_DigestInit_ex(&md_ctx, EVP_md5(), NULL) | 262 | if (EVP_DigestInit_ex(&md_ctx, EVP_md5(), NULL) && |
| 250 | && EVP_DigestUpdate(&md_ctx, x->bytes->data, x->bytes->length) | 263 | EVP_DigestUpdate(&md_ctx, x->bytes->data, x->bytes->length) && |
| 251 | && EVP_DigestFinal_ex(&md_ctx,md,NULL)) | 264 | EVP_DigestFinal_ex(&md_ctx, md, NULL)) |
| 252 | ret=(((unsigned long)md[0] )|((unsigned long)md[1]<<8L)| | 265 | ret = (((unsigned long)md[0]) | |
| 253 | ((unsigned long)md[2]<<16L)|((unsigned long)md[3]<<24L) | 266 | ((unsigned long)md[1] << 8L) | |
| 254 | )&0xffffffffL; | 267 | ((unsigned long)md[2] << 16L) | |
| 268 | ((unsigned long)md[3] << 24L)) & | ||
| 269 | 0xffffffffL; | ||
| 255 | EVP_MD_CTX_cleanup(&md_ctx); | 270 | EVP_MD_CTX_cleanup(&md_ctx); |
| 256 | 271 | ||
| 257 | return(ret); | 272 | return (ret); |
| 258 | } | 273 | } |
| 259 | #endif | 274 | #endif |
| 260 | 275 | ||
| 261 | /* Search a stack of X509 for a match */ | 276 | /* Search a stack of X509 for a match */ |
| 262 | X509 *X509_find_by_issuer_and_serial(STACK_OF(X509) *sk, X509_NAME *name, | 277 | X509 * |
| 263 | ASN1_INTEGER *serial) | 278 | X509_find_by_issuer_and_serial(STACK_OF(X509) *sk, X509_NAME *name, |
| 279 | ASN1_INTEGER *serial) | ||
| 264 | { | 280 | { |
| 265 | int i; | 281 | int i; |
| 266 | X509_CINF cinf; | 282 | X509_CINF cinf; |
| 267 | X509 x,*x509=NULL; | 283 | X509 x, *x509 = NULL; |
| 268 | 284 | ||
| 269 | if(!sk) return NULL; | 285 | if (!sk) |
| 286 | return NULL; | ||
| 270 | 287 | ||
| 271 | x.cert_info= &cinf; | 288 | x.cert_info = &cinf; |
| 272 | cinf.serialNumber=serial; | 289 | cinf.serialNumber = serial; |
| 273 | cinf.issuer=name; | 290 | cinf.issuer = name; |
| 274 | 291 | ||
| 275 | for (i=0; i<sk_X509_num(sk); i++) { | 292 | for (i = 0; i < sk_X509_num(sk); i++) { |
| 276 | x509=sk_X509_value(sk,i); | 293 | x509 = sk_X509_value(sk, i); |
| 277 | if (X509_issuer_and_serial_cmp(x509,&x) == 0) | 294 | if (X509_issuer_and_serial_cmp(x509, &x) == 0) |
| 278 | return(x509); | 295 | return (x509); |
| 279 | } | 296 | } |
| 280 | return(NULL); | 297 | return (NULL); |
| 281 | } | 298 | } |
| 282 | 299 | ||
| 283 | X509 *X509_find_by_subject(STACK_OF(X509) *sk, X509_NAME *name) | 300 | X509 * |
| 301 | X509_find_by_subject(STACK_OF(X509) *sk, X509_NAME *name) | ||
| 284 | { | 302 | { |
| 285 | X509 *x509; | 303 | X509 *x509; |
| 286 | int i; | 304 | int i; |
| 287 | 305 | ||
| 288 | for (i=0; i<sk_X509_num(sk); i++) { | 306 | for (i = 0; i < sk_X509_num(sk); i++) { |
| 289 | x509=sk_X509_value(sk,i); | 307 | x509 = sk_X509_value(sk, i); |
| 290 | if (X509_NAME_cmp(X509_get_subject_name(x509),name) == 0) | 308 | if (X509_NAME_cmp(X509_get_subject_name(x509), name) == 0) |
| 291 | return(x509); | 309 | return (x509); |
| 292 | } | 310 | } |
| 293 | return(NULL); | 311 | return (NULL); |
| 294 | } | 312 | } |
| 295 | 313 | ||
| 296 | EVP_PKEY *X509_get_pubkey(X509 *x) | 314 | EVP_PKEY * |
| 315 | X509_get_pubkey(X509 *x) | ||
| 297 | { | 316 | { |
| 298 | if ((x == NULL) || (x->cert_info == NULL)) | 317 | if ((x == NULL) || (x->cert_info == NULL)) |
| 299 | return(NULL); | 318 | return (NULL); |
| 300 | return(X509_PUBKEY_get(x->cert_info->key)); | 319 | return (X509_PUBKEY_get(x->cert_info->key)); |
| 301 | } | 320 | } |
| 302 | 321 | ||
| 303 | ASN1_BIT_STRING *X509_get0_pubkey_bitstr(const X509 *x) | 322 | ASN1_BIT_STRING * |
| 323 | X509_get0_pubkey_bitstr(const X509 *x) | ||
| 304 | { | 324 | { |
| 305 | if(!x) return NULL; | 325 | if (!x) |
| 326 | return NULL; | ||
| 306 | return x->cert_info->key->public_key; | 327 | return x->cert_info->key->public_key; |
| 307 | } | 328 | } |
| 308 | 329 | ||
| 309 | int X509_check_private_key(X509 *x, EVP_PKEY *k) | 330 | int |
| 331 | X509_check_private_key(X509 *x, EVP_PKEY *k) | ||
| 310 | { | 332 | { |
| 311 | EVP_PKEY *xk; | 333 | EVP_PKEY *xk; |
| 312 | int ret; | 334 | int ret; |
| 313 | 335 | ||
| 314 | xk=X509_get_pubkey(x); | 336 | xk = X509_get_pubkey(x); |
| 315 | 337 | ||
| 316 | if (xk) | 338 | if (xk) |
| 317 | ret = EVP_PKEY_cmp(xk, k); | 339 | ret = EVP_PKEY_cmp(xk, k); |
| @@ -322,13 +344,16 @@ int X509_check_private_key(X509 *x, EVP_PKEY *k) | |||
| 322 | case 1: | 344 | case 1: |
| 323 | break; | 345 | break; |
| 324 | case 0: | 346 | case 0: |
| 325 | X509err(X509_F_X509_CHECK_PRIVATE_KEY,X509_R_KEY_VALUES_MISMATCH); | 347 | X509err(X509_F_X509_CHECK_PRIVATE_KEY, |
| 348 | X509_R_KEY_VALUES_MISMATCH); | ||
| 326 | break; | 349 | break; |
| 327 | case -1: | 350 | case -1: |
| 328 | X509err(X509_F_X509_CHECK_PRIVATE_KEY,X509_R_KEY_TYPE_MISMATCH); | 351 | X509err(X509_F_X509_CHECK_PRIVATE_KEY, |
| 352 | X509_R_KEY_TYPE_MISMATCH); | ||
| 329 | break; | 353 | break; |
| 330 | case -2: | 354 | case -2: |
| 331 | X509err(X509_F_X509_CHECK_PRIVATE_KEY,X509_R_UNKNOWN_KEY_TYPE); | 355 | X509err(X509_F_X509_CHECK_PRIVATE_KEY, |
| 356 | X509_R_UNKNOWN_KEY_TYPE); | ||
| 332 | } | 357 | } |
| 333 | if (xk) | 358 | if (xk) |
| 334 | EVP_PKEY_free(xk); | 359 | EVP_PKEY_free(xk); |
