diff options
Diffstat (limited to 'src/lib/libcrypto/x509/x509_vfy.c')
-rw-r--r-- | src/lib/libcrypto/x509/x509_vfy.c | 491 |
1 files changed, 298 insertions, 193 deletions
diff --git a/src/lib/libcrypto/x509/x509_vfy.c b/src/lib/libcrypto/x509/x509_vfy.c index 3ddb2303d3..0f4110cc64 100644 --- a/src/lib/libcrypto/x509/x509_vfy.c +++ b/src/lib/libcrypto/x509/x509_vfy.c | |||
@@ -71,6 +71,8 @@ | |||
71 | #include <openssl/objects.h> | 71 | #include <openssl/objects.h> |
72 | 72 | ||
73 | static int null_callback(int ok,X509_STORE_CTX *e); | 73 | static int null_callback(int ok,X509_STORE_CTX *e); |
74 | static int check_issued(X509_STORE_CTX *ctx, X509 *x, X509 *issuer); | ||
75 | static X509 *find_issuer(X509_STORE_CTX *ctx, STACK_OF(X509) *sk, X509 *x); | ||
74 | static int check_chain_purpose(X509_STORE_CTX *ctx); | 76 | static int check_chain_purpose(X509_STORE_CTX *ctx); |
75 | static int check_trust(X509_STORE_CTX *ctx); | 77 | static int check_trust(X509_STORE_CTX *ctx); |
76 | static int internal_verify(X509_STORE_CTX *ctx); | 78 | static int internal_verify(X509_STORE_CTX *ctx); |
@@ -85,13 +87,13 @@ static STACK *x509_store_method=NULL; | |||
85 | 87 | ||
86 | static int null_callback(int ok, X509_STORE_CTX *e) | 88 | static int null_callback(int ok, X509_STORE_CTX *e) |
87 | { | 89 | { |
88 | return(ok); | 90 | return ok; |
89 | } | 91 | } |
90 | 92 | ||
91 | #if 0 | 93 | #if 0 |
92 | static int x509_subject_cmp(X509 **a, X509 **b) | 94 | static int x509_subject_cmp(X509 **a, X509 **b) |
93 | { | 95 | { |
94 | return(X509_subject_name_cmp(*a,*b)); | 96 | return X509_subject_name_cmp(*a,*b); |
95 | } | 97 | } |
96 | #endif | 98 | #endif |
97 | 99 | ||
@@ -99,7 +101,6 @@ int X509_verify_cert(X509_STORE_CTX *ctx) | |||
99 | { | 101 | { |
100 | X509 *x,*xtmp,*chain_ss=NULL; | 102 | X509 *x,*xtmp,*chain_ss=NULL; |
101 | X509_NAME *xn; | 103 | X509_NAME *xn; |
102 | X509_OBJECT obj; | ||
103 | int depth,i,ok=0; | 104 | int depth,i,ok=0; |
104 | int num; | 105 | int num; |
105 | int (*cb)(); | 106 | int (*cb)(); |
@@ -108,10 +109,10 @@ int X509_verify_cert(X509_STORE_CTX *ctx) | |||
108 | if (ctx->cert == NULL) | 109 | if (ctx->cert == NULL) |
109 | { | 110 | { |
110 | X509err(X509_F_X509_VERIFY_CERT,X509_R_NO_CERT_SET_FOR_US_TO_VERIFY); | 111 | X509err(X509_F_X509_VERIFY_CERT,X509_R_NO_CERT_SET_FOR_US_TO_VERIFY); |
111 | return(-1); | 112 | return -1; |
112 | } | 113 | } |
113 | 114 | ||
114 | cb=ctx->ctx->verify_cb; | 115 | cb=ctx->verify_cb; |
115 | if (cb == NULL) cb=null_callback; | 116 | if (cb == NULL) cb=null_callback; |
116 | 117 | ||
117 | /* first we make sure the chain we are going to build is | 118 | /* first we make sure the chain we are going to build is |
@@ -152,13 +153,12 @@ int X509_verify_cert(X509_STORE_CTX *ctx) | |||
152 | 153 | ||
153 | /* If we are self signed, we break */ | 154 | /* If we are self signed, we break */ |
154 | xn=X509_get_issuer_name(x); | 155 | xn=X509_get_issuer_name(x); |
155 | if (X509_NAME_cmp(X509_get_subject_name(x),xn) == 0) | 156 | if (ctx->check_issued(ctx, x,x)) break; |
156 | break; | ||
157 | 157 | ||
158 | /* If we were passed a cert chain, use it first */ | 158 | /* If we were passed a cert chain, use it first */ |
159 | if (ctx->untrusted != NULL) | 159 | if (ctx->untrusted != NULL) |
160 | { | 160 | { |
161 | xtmp=X509_find_by_subject(sktmp,xn); | 161 | xtmp=find_issuer(ctx, sktmp,x); |
162 | if (xtmp != NULL) | 162 | if (xtmp != NULL) |
163 | { | 163 | { |
164 | if (!sk_X509_push(ctx->chain,xtmp)) | 164 | if (!sk_X509_push(ctx->chain,xtmp)) |
@@ -183,11 +183,14 @@ int X509_verify_cert(X509_STORE_CTX *ctx) | |||
183 | * certificates. We now need to add at least one trusted one, | 183 | * certificates. We now need to add at least one trusted one, |
184 | * if possible, otherwise we complain. */ | 184 | * if possible, otherwise we complain. */ |
185 | 185 | ||
186 | /* Examine last certificate in chain and see if it | ||
187 | * is self signed. | ||
188 | */ | ||
189 | |||
186 | i=sk_X509_num(ctx->chain); | 190 | i=sk_X509_num(ctx->chain); |
187 | x=sk_X509_value(ctx->chain,i-1); | 191 | x=sk_X509_value(ctx->chain,i-1); |
188 | xn = X509_get_subject_name(x); | 192 | xn = X509_get_subject_name(x); |
189 | if (X509_NAME_cmp(xn,X509_get_issuer_name(x)) | 193 | if (ctx->check_issued(ctx, x, x)) |
190 | == 0) | ||
191 | { | 194 | { |
192 | /* we have a self signed certificate */ | 195 | /* we have a self signed certificate */ |
193 | if (sk_X509_num(ctx->chain) == 1) | 196 | if (sk_X509_num(ctx->chain) == 1) |
@@ -196,13 +199,13 @@ int X509_verify_cert(X509_STORE_CTX *ctx) | |||
196 | * we can find it in the store. We must have an exact | 199 | * we can find it in the store. We must have an exact |
197 | * match to avoid possible impersonation. | 200 | * match to avoid possible impersonation. |
198 | */ | 201 | */ |
199 | ok=X509_STORE_get_by_subject(ctx,X509_LU_X509,xn,&obj); | 202 | ok = ctx->get_issuer(&xtmp, ctx, x); |
200 | if ((ok != X509_LU_X509) || X509_cmp(x, obj.data.x509)) | 203 | if ((ok <= 0) || X509_cmp(x, xtmp)) |
201 | { | 204 | { |
202 | ctx->error=X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT; | 205 | ctx->error=X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT; |
203 | ctx->current_cert=x; | 206 | ctx->current_cert=x; |
204 | ctx->error_depth=i-1; | 207 | ctx->error_depth=i-1; |
205 | if(ok == X509_LU_X509) X509_OBJECT_free_contents(&obj); | 208 | if (ok == 1) X509_free(xtmp); |
206 | ok=cb(0,ctx); | 209 | ok=cb(0,ctx); |
207 | if (!ok) goto end; | 210 | if (!ok) goto end; |
208 | } | 211 | } |
@@ -212,14 +215,14 @@ int X509_verify_cert(X509_STORE_CTX *ctx) | |||
212 | * so we get any trust settings. | 215 | * so we get any trust settings. |
213 | */ | 216 | */ |
214 | X509_free(x); | 217 | X509_free(x); |
215 | x = obj.data.x509; | 218 | x = xtmp; |
216 | sk_X509_set(ctx->chain, i - 1, x); | 219 | sk_X509_set(ctx->chain, i - 1, x); |
217 | ctx->last_untrusted=0; | 220 | ctx->last_untrusted=0; |
218 | } | 221 | } |
219 | } | 222 | } |
220 | else | 223 | else |
221 | { | 224 | { |
222 | /* worry more about this one elsewhere */ | 225 | /* extract and save self signed certificate for later use */ |
223 | chain_ss=sk_X509_pop(ctx->chain); | 226 | chain_ss=sk_X509_pop(ctx->chain); |
224 | ctx->last_untrusted--; | 227 | ctx->last_untrusted--; |
225 | num--; | 228 | num--; |
@@ -235,41 +238,30 @@ int X509_verify_cert(X509_STORE_CTX *ctx) | |||
235 | 238 | ||
236 | /* If we are self signed, we break */ | 239 | /* If we are self signed, we break */ |
237 | xn=X509_get_issuer_name(x); | 240 | xn=X509_get_issuer_name(x); |
238 | if (X509_NAME_cmp(X509_get_subject_name(x),xn) == 0) | 241 | if (ctx->check_issued(ctx,x,x)) break; |
239 | break; | ||
240 | 242 | ||
241 | ok=X509_STORE_get_by_subject(ctx,X509_LU_X509,xn,&obj); | 243 | ok = ctx->get_issuer(&xtmp, ctx, x); |
242 | if (ok != X509_LU_X509) | 244 | |
243 | { | 245 | if (ok < 0) return ok; |
244 | if (ok == X509_LU_RETRY) | 246 | if (ok == 0) break; |
245 | { | 247 | |
246 | X509_OBJECT_free_contents(&obj); | 248 | x = xtmp; |
247 | X509err(X509_F_X509_VERIFY_CERT,X509_R_SHOULD_RETRY); | 249 | if (!sk_X509_push(ctx->chain,x)) |
248 | return(ok); | ||
249 | } | ||
250 | else if (ok != X509_LU_FAIL) | ||
251 | { | ||
252 | X509_OBJECT_free_contents(&obj); | ||
253 | /* not good :-(, break anyway */ | ||
254 | return(ok); | ||
255 | } | ||
256 | break; | ||
257 | } | ||
258 | x=obj.data.x509; | ||
259 | if (!sk_X509_push(ctx->chain,obj.data.x509)) | ||
260 | { | 250 | { |
261 | X509_OBJECT_free_contents(&obj); | 251 | X509_free(xtmp); |
262 | X509err(X509_F_X509_VERIFY_CERT,ERR_R_MALLOC_FAILURE); | 252 | X509err(X509_F_X509_VERIFY_CERT,ERR_R_MALLOC_FAILURE); |
263 | return(0); | 253 | return 0; |
264 | } | 254 | } |
265 | num++; | 255 | num++; |
266 | } | 256 | } |
267 | 257 | ||
268 | /* we now have our chain, lets check it... */ | 258 | /* we now have our chain, lets check it... */ |
269 | xn=X509_get_issuer_name(x); | 259 | xn=X509_get_issuer_name(x); |
270 | if (X509_NAME_cmp(X509_get_subject_name(x),xn) != 0) | 260 | |
261 | /* Is last certificate looked up self signed? */ | ||
262 | if (!ctx->check_issued(ctx,x,x)) | ||
271 | { | 263 | { |
272 | if ((chain_ss == NULL) || (X509_NAME_cmp(X509_get_subject_name(chain_ss),xn) != 0)) | 264 | if ((chain_ss == NULL) || !ctx->check_issued(ctx, x, chain_ss)) |
273 | { | 265 | { |
274 | if (ctx->last_untrusted >= num) | 266 | if (ctx->last_untrusted >= num) |
275 | ctx->error=X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY; | 267 | ctx->error=X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY; |
@@ -294,22 +286,22 @@ int X509_verify_cert(X509_STORE_CTX *ctx) | |||
294 | } | 286 | } |
295 | 287 | ||
296 | /* We have the chain complete: now we need to check its purpose */ | 288 | /* We have the chain complete: now we need to check its purpose */ |
297 | if(ctx->purpose > 0) ok = check_chain_purpose(ctx); | 289 | if (ctx->purpose > 0) ok = check_chain_purpose(ctx); |
298 | 290 | ||
299 | if(!ok) goto end; | 291 | if (!ok) goto end; |
300 | 292 | ||
301 | /* The chain extensions are OK: check trust */ | 293 | /* The chain extensions are OK: check trust */ |
302 | 294 | ||
303 | if(ctx->trust > 0) ok = check_trust(ctx); | 295 | if (ctx->trust > 0) ok = check_trust(ctx); |
304 | 296 | ||
305 | if(!ok) goto end; | 297 | if (!ok) goto end; |
306 | 298 | ||
307 | /* We may as well copy down any DSA parameters that are required */ | 299 | /* We may as well copy down any DSA parameters that are required */ |
308 | X509_get_pubkey_parameters(NULL,ctx->chain); | 300 | X509_get_pubkey_parameters(NULL,ctx->chain); |
309 | 301 | ||
310 | /* At this point, we have a chain and just need to verify it */ | 302 | /* At this point, we have a chain and just need to verify it */ |
311 | if (ctx->ctx->verify != NULL) | 303 | if (ctx->verify != NULL) |
312 | ok=ctx->ctx->verify(ctx); | 304 | ok=ctx->verify(ctx); |
313 | else | 305 | else |
314 | ok=internal_verify(ctx); | 306 | ok=internal_verify(ctx); |
315 | if (0) | 307 | if (0) |
@@ -319,9 +311,61 @@ end: | |||
319 | } | 311 | } |
320 | if (sktmp != NULL) sk_X509_free(sktmp); | 312 | if (sktmp != NULL) sk_X509_free(sktmp); |
321 | if (chain_ss != NULL) X509_free(chain_ss); | 313 | if (chain_ss != NULL) X509_free(chain_ss); |
322 | return(ok); | 314 | return ok; |
323 | } | 315 | } |
324 | 316 | ||
317 | |||
318 | /* Given a STACK_OF(X509) find the issuer of cert (if any) | ||
319 | */ | ||
320 | |||
321 | static X509 *find_issuer(X509_STORE_CTX *ctx, STACK_OF(X509) *sk, X509 *x) | ||
322 | { | ||
323 | int i; | ||
324 | X509 *issuer; | ||
325 | for (i = 0; i < sk_X509_num(sk); i++) | ||
326 | { | ||
327 | issuer = sk_X509_value(sk, i); | ||
328 | if (ctx->check_issued(ctx, x, issuer)) | ||
329 | return issuer; | ||
330 | } | ||
331 | return NULL; | ||
332 | } | ||
333 | |||
334 | /* Given a possible certificate and issuer check them */ | ||
335 | |||
336 | static int check_issued(X509_STORE_CTX *ctx, X509 *x, X509 *issuer) | ||
337 | { | ||
338 | int ret; | ||
339 | ret = X509_check_issued(issuer, x); | ||
340 | if (ret == X509_V_OK) | ||
341 | return 1; | ||
342 | /* If we haven't asked for issuer errors don't set ctx */ | ||
343 | if (!(ctx->flags & X509_V_FLAG_CB_ISSUER_CHECK)) | ||
344 | return 0; | ||
345 | |||
346 | ctx->error = ret; | ||
347 | ctx->current_cert = x; | ||
348 | ctx->current_issuer = issuer; | ||
349 | if (ctx->verify_cb) | ||
350 | return ctx->verify_cb(0, ctx); | ||
351 | return 0; | ||
352 | } | ||
353 | |||
354 | /* Alternative lookup method: look from a STACK stored in other_ctx */ | ||
355 | |||
356 | static int get_issuer_sk(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) | ||
357 | { | ||
358 | *issuer = find_issuer(ctx, ctx->other_ctx, x); | ||
359 | if (*issuer) | ||
360 | { | ||
361 | CRYPTO_add(&(*issuer)->references,1,CRYPTO_LOCK_X509); | ||
362 | return 1; | ||
363 | } | ||
364 | else | ||
365 | return 0; | ||
366 | } | ||
367 | |||
368 | |||
325 | /* Check a certificate chains extensions for consistency | 369 | /* Check a certificate chains extensions for consistency |
326 | * with the supplied purpose | 370 | * with the supplied purpose |
327 | */ | 371 | */ |
@@ -334,32 +378,37 @@ static int check_chain_purpose(X509_STORE_CTX *ctx) | |||
334 | int i, ok=0; | 378 | int i, ok=0; |
335 | X509 *x; | 379 | X509 *x; |
336 | int (*cb)(); | 380 | int (*cb)(); |
337 | cb=ctx->ctx->verify_cb; | 381 | cb=ctx->verify_cb; |
338 | if (cb == NULL) cb=null_callback; | 382 | if (cb == NULL) cb=null_callback; |
339 | /* Check all untrusted certificates */ | 383 | /* Check all untrusted certificates */ |
340 | for(i = 0; i < ctx->last_untrusted; i++) { | 384 | for (i = 0; i < ctx->last_untrusted; i++) |
385 | { | ||
341 | x = sk_X509_value(ctx->chain, i); | 386 | x = sk_X509_value(ctx->chain, i); |
342 | if(!X509_check_purpose(x, ctx->purpose, i)) { | 387 | if (!X509_check_purpose(x, ctx->purpose, i)) |
343 | if(i) ctx->error = X509_V_ERR_INVALID_CA; | 388 | { |
344 | else ctx->error = X509_V_ERR_INVALID_PURPOSE; | 389 | if (i) |
390 | ctx->error = X509_V_ERR_INVALID_CA; | ||
391 | else | ||
392 | ctx->error = X509_V_ERR_INVALID_PURPOSE; | ||
345 | ctx->error_depth = i; | 393 | ctx->error_depth = i; |
346 | ctx->current_cert = x; | 394 | ctx->current_cert = x; |
347 | ok=cb(0,ctx); | 395 | ok=cb(0,ctx); |
348 | if(!ok) goto end; | 396 | if (!ok) goto end; |
349 | } | 397 | } |
350 | /* Check pathlen */ | 398 | /* Check pathlen */ |
351 | if((i > 1) && (x->ex_pathlen != -1) | 399 | if ((i > 1) && (x->ex_pathlen != -1) |
352 | && (i > (x->ex_pathlen + 1))) { | 400 | && (i > (x->ex_pathlen + 1))) |
401 | { | ||
353 | ctx->error = X509_V_ERR_PATH_LENGTH_EXCEEDED; | 402 | ctx->error = X509_V_ERR_PATH_LENGTH_EXCEEDED; |
354 | ctx->error_depth = i; | 403 | ctx->error_depth = i; |
355 | ctx->current_cert = x; | 404 | ctx->current_cert = x; |
356 | ok=cb(0,ctx); | 405 | ok=cb(0,ctx); |
357 | if(!ok) goto end; | 406 | if (!ok) goto end; |
407 | } | ||
358 | } | 408 | } |
359 | } | ||
360 | ok = 1; | 409 | ok = 1; |
361 | end: | 410 | end: |
362 | return(ok); | 411 | return ok; |
363 | #endif | 412 | #endif |
364 | } | 413 | } |
365 | 414 | ||
@@ -371,19 +420,22 @@ static int check_trust(X509_STORE_CTX *ctx) | |||
371 | int i, ok; | 420 | int i, ok; |
372 | X509 *x; | 421 | X509 *x; |
373 | int (*cb)(); | 422 | int (*cb)(); |
374 | cb=ctx->ctx->verify_cb; | 423 | cb=ctx->verify_cb; |
375 | if (cb == NULL) cb=null_callback; | 424 | if (cb == NULL) cb=null_callback; |
376 | /* For now just check the last certificate in the chain */ | 425 | /* For now just check the last certificate in the chain */ |
377 | i = sk_X509_num(ctx->chain) - 1; | 426 | i = sk_X509_num(ctx->chain) - 1; |
378 | x = sk_X509_value(ctx->chain, i); | 427 | x = sk_X509_value(ctx->chain, i); |
379 | ok = X509_check_trust(x, ctx->trust, 0); | 428 | ok = X509_check_trust(x, ctx->trust, 0); |
380 | if(ok == X509_TRUST_TRUSTED) return 1; | 429 | if (ok == X509_TRUST_TRUSTED) |
430 | return 1; | ||
381 | ctx->error_depth = sk_X509_num(ctx->chain) - 1; | 431 | ctx->error_depth = sk_X509_num(ctx->chain) - 1; |
382 | ctx->current_cert = x; | 432 | ctx->current_cert = x; |
383 | if(ok == X509_TRUST_REJECTED) ctx->error = X509_V_ERR_CERT_REJECTED; | 433 | if (ok == X509_TRUST_REJECTED) |
384 | else ctx->error = X509_V_ERR_CERT_UNTRUSTED; | 434 | ctx->error = X509_V_ERR_CERT_REJECTED; |
435 | else | ||
436 | ctx->error = X509_V_ERR_CERT_UNTRUSTED; | ||
385 | ok = cb(0, ctx); | 437 | ok = cb(0, ctx); |
386 | return(ok); | 438 | return ok; |
387 | #endif | 439 | #endif |
388 | } | 440 | } |
389 | 441 | ||
@@ -392,17 +444,21 @@ static int internal_verify(X509_STORE_CTX *ctx) | |||
392 | int i,ok=0,n; | 444 | int i,ok=0,n; |
393 | X509 *xs,*xi; | 445 | X509 *xs,*xi; |
394 | EVP_PKEY *pkey=NULL; | 446 | EVP_PKEY *pkey=NULL; |
447 | time_t *ptime; | ||
395 | int (*cb)(); | 448 | int (*cb)(); |
396 | 449 | ||
397 | cb=ctx->ctx->verify_cb; | 450 | cb=ctx->verify_cb; |
398 | if (cb == NULL) cb=null_callback; | 451 | if (cb == NULL) cb=null_callback; |
399 | 452 | ||
400 | n=sk_X509_num(ctx->chain); | 453 | n=sk_X509_num(ctx->chain); |
401 | ctx->error_depth=n-1; | 454 | ctx->error_depth=n-1; |
402 | n--; | 455 | n--; |
403 | xi=sk_X509_value(ctx->chain,n); | 456 | xi=sk_X509_value(ctx->chain,n); |
404 | if (X509_NAME_cmp(X509_get_subject_name(xi), | 457 | if (ctx->flags & X509_V_FLAG_USE_CHECK_TIME) |
405 | X509_get_issuer_name(xi)) == 0) | 458 | ptime = &ctx->check_time; |
459 | else | ||
460 | ptime = NULL; | ||
461 | if (ctx->check_issued(ctx, xi, xi)) | ||
406 | xs=xi; | 462 | xs=xi; |
407 | else | 463 | else |
408 | { | 464 | { |
@@ -448,7 +504,7 @@ static int internal_verify(X509_STORE_CTX *ctx) | |||
448 | EVP_PKEY_free(pkey); | 504 | EVP_PKEY_free(pkey); |
449 | pkey=NULL; | 505 | pkey=NULL; |
450 | 506 | ||
451 | i=X509_cmp_current_time(X509_get_notBefore(xs)); | 507 | i=X509_cmp_time(X509_get_notBefore(xs), ptime); |
452 | if (i == 0) | 508 | if (i == 0) |
453 | { | 509 | { |
454 | ctx->error=X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD; | 510 | ctx->error=X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD; |
@@ -466,7 +522,7 @@ static int internal_verify(X509_STORE_CTX *ctx) | |||
466 | xs->valid=1; | 522 | xs->valid=1; |
467 | } | 523 | } |
468 | 524 | ||
469 | i=X509_cmp_current_time(X509_get_notAfter(xs)); | 525 | i=X509_cmp_time(X509_get_notAfter(xs), ptime); |
470 | if (i == 0) | 526 | if (i == 0) |
471 | { | 527 | { |
472 | ctx->error=X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD; | 528 | ctx->error=X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD; |
@@ -499,13 +555,18 @@ static int internal_verify(X509_STORE_CTX *ctx) | |||
499 | } | 555 | } |
500 | ok=1; | 556 | ok=1; |
501 | end: | 557 | end: |
502 | return(ok); | 558 | return ok; |
503 | } | 559 | } |
504 | 560 | ||
505 | int X509_cmp_current_time(ASN1_UTCTIME *ctm) | 561 | int X509_cmp_current_time(ASN1_TIME *ctm) |
562 | { | ||
563 | return X509_cmp_time(ctm, NULL); | ||
564 | } | ||
565 | |||
566 | int X509_cmp_time(ASN1_TIME *ctm, time_t *cmp_time) | ||
506 | { | 567 | { |
507 | char *str; | 568 | char *str; |
508 | ASN1_UTCTIME atm; | 569 | ASN1_TIME atm; |
509 | time_t offset; | 570 | time_t offset; |
510 | char buff1[24],buff2[24],*p; | 571 | char buff1[24],buff2[24],*p; |
511 | int i,j; | 572 | int i,j; |
@@ -513,14 +574,35 @@ int X509_cmp_current_time(ASN1_UTCTIME *ctm) | |||
513 | p=buff1; | 574 | p=buff1; |
514 | i=ctm->length; | 575 | i=ctm->length; |
515 | str=(char *)ctm->data; | 576 | str=(char *)ctm->data; |
516 | if ((i < 11) || (i > 17)) return(0); | 577 | if (ctm->type == V_ASN1_UTCTIME) |
517 | memcpy(p,str,10); | 578 | { |
518 | p+=10; | 579 | if ((i < 11) || (i > 17)) return 0; |
519 | str+=10; | 580 | memcpy(p,str,10); |
581 | p+=10; | ||
582 | str+=10; | ||
583 | } | ||
584 | else | ||
585 | { | ||
586 | if (i < 13) return 0; | ||
587 | memcpy(p,str,12); | ||
588 | p+=12; | ||
589 | str+=12; | ||
590 | } | ||
520 | 591 | ||
521 | if ((*str == 'Z') || (*str == '-') || (*str == '+')) | 592 | if ((*str == 'Z') || (*str == '-') || (*str == '+')) |
522 | { *(p++)='0'; *(p++)='0'; } | 593 | { *(p++)='0'; *(p++)='0'; } |
523 | else { *(p++)= *(str++); *(p++)= *(str++); } | 594 | else |
595 | { | ||
596 | *(p++)= *(str++); | ||
597 | *(p++)= *(str++); | ||
598 | /* Skip any fractional seconds... */ | ||
599 | if (*str == '.') | ||
600 | { | ||
601 | str++; | ||
602 | while ((*str >= '0') && (*str <= '9')) str++; | ||
603 | } | ||
604 | |||
605 | } | ||
524 | *(p++)='Z'; | 606 | *(p++)='Z'; |
525 | *(p++)='\0'; | 607 | *(p++)='\0'; |
526 | 608 | ||
@@ -529,39 +611,51 @@ int X509_cmp_current_time(ASN1_UTCTIME *ctm) | |||
529 | else | 611 | else |
530 | { | 612 | { |
531 | if ((*str != '+') && (str[5] != '-')) | 613 | if ((*str != '+') && (str[5] != '-')) |
532 | return(0); | 614 | return 0; |
533 | offset=((str[1]-'0')*10+(str[2]-'0'))*60; | 615 | offset=((str[1]-'0')*10+(str[2]-'0'))*60; |
534 | offset+=(str[3]-'0')*10+(str[4]-'0'); | 616 | offset+=(str[3]-'0')*10+(str[4]-'0'); |
535 | if (*str == '-') | 617 | if (*str == '-') |
536 | offset= -offset; | 618 | offset= -offset; |
537 | } | 619 | } |
538 | atm.type=V_ASN1_UTCTIME; | 620 | atm.type=ctm->type; |
539 | atm.length=sizeof(buff2); | 621 | atm.length=sizeof(buff2); |
540 | atm.data=(unsigned char *)buff2; | 622 | atm.data=(unsigned char *)buff2; |
541 | 623 | ||
542 | X509_gmtime_adj(&atm,-offset*60); | 624 | X509_time_adj(&atm,-offset*60, cmp_time); |
543 | 625 | ||
544 | i=(buff1[0]-'0')*10+(buff1[1]-'0'); | 626 | if (ctm->type == V_ASN1_UTCTIME) |
545 | if (i < 50) i+=100; /* cf. RFC 2459 */ | 627 | { |
546 | j=(buff2[0]-'0')*10+(buff2[1]-'0'); | 628 | i=(buff1[0]-'0')*10+(buff1[1]-'0'); |
547 | if (j < 50) j+=100; | 629 | if (i < 50) i+=100; /* cf. RFC 2459 */ |
630 | j=(buff2[0]-'0')*10+(buff2[1]-'0'); | ||
631 | if (j < 50) j+=100; | ||
548 | 632 | ||
549 | if (i < j) return (-1); | 633 | if (i < j) return -1; |
550 | if (i > j) return (1); | 634 | if (i > j) return 1; |
635 | } | ||
551 | i=strcmp(buff1,buff2); | 636 | i=strcmp(buff1,buff2); |
552 | if (i == 0) /* wait a second then return younger :-) */ | 637 | if (i == 0) /* wait a second then return younger :-) */ |
553 | return(-1); | 638 | return -1; |
554 | else | 639 | else |
555 | return(i); | 640 | return i; |
556 | } | 641 | } |
557 | 642 | ||
558 | ASN1_UTCTIME *X509_gmtime_adj(ASN1_UTCTIME *s, long adj) | 643 | ASN1_TIME *X509_gmtime_adj(ASN1_TIME *s, long adj) |
644 | { | ||
645 | return X509_time_adj(s, adj, NULL); | ||
646 | } | ||
647 | |||
648 | ASN1_TIME *X509_time_adj(ASN1_TIME *s, long adj, time_t *in_tm) | ||
559 | { | 649 | { |
560 | time_t t; | 650 | time_t t; |
561 | 651 | ||
562 | time(&t); | 652 | if (in_tm) t = *in_tm; |
653 | else time(&t); | ||
654 | |||
563 | t+=adj; | 655 | t+=adj; |
564 | return(ASN1_UTCTIME_set(s,t)); | 656 | if (!s) return ASN1_TIME_set(s, t); |
657 | if (s->type == V_ASN1_UTCTIME) return ASN1_UTCTIME_set(s,t); | ||
658 | return ASN1_GENERALIZEDTIME_set(s, t); | ||
565 | } | 659 | } |
566 | 660 | ||
567 | int X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) | 661 | int X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) |
@@ -569,7 +663,7 @@ int X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) | |||
569 | EVP_PKEY *ktmp=NULL,*ktmp2; | 663 | EVP_PKEY *ktmp=NULL,*ktmp2; |
570 | int i,j; | 664 | int i,j; |
571 | 665 | ||
572 | if ((pkey != NULL) && !EVP_PKEY_missing_parameters(pkey)) return(1); | 666 | if ((pkey != NULL) && !EVP_PKEY_missing_parameters(pkey)) return 1; |
573 | 667 | ||
574 | for (i=0; i<sk_X509_num(chain); i++) | 668 | for (i=0; i<sk_X509_num(chain); i++) |
575 | { | 669 | { |
@@ -577,7 +671,7 @@ int X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) | |||
577 | if (ktmp == NULL) | 671 | if (ktmp == NULL) |
578 | { | 672 | { |
579 | X509err(X509_F_X509_GET_PUBKEY_PARAMETERS,X509_R_UNABLE_TO_GET_CERTS_PUBLIC_KEY); | 673 | X509err(X509_F_X509_GET_PUBKEY_PARAMETERS,X509_R_UNABLE_TO_GET_CERTS_PUBLIC_KEY); |
580 | return(0); | 674 | return 0; |
581 | } | 675 | } |
582 | if (!EVP_PKEY_missing_parameters(ktmp)) | 676 | if (!EVP_PKEY_missing_parameters(ktmp)) |
583 | break; | 677 | break; |
@@ -590,7 +684,7 @@ int X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) | |||
590 | if (ktmp == NULL) | 684 | if (ktmp == NULL) |
591 | { | 685 | { |
592 | X509err(X509_F_X509_GET_PUBKEY_PARAMETERS,X509_R_UNABLE_TO_FIND_PARAMETERS_IN_CHAIN); | 686 | X509err(X509_F_X509_GET_PUBKEY_PARAMETERS,X509_R_UNABLE_TO_FIND_PARAMETERS_IN_CHAIN); |
593 | return(0); | 687 | return 0; |
594 | } | 688 | } |
595 | 689 | ||
596 | /* first, populate the other certs */ | 690 | /* first, populate the other certs */ |
@@ -603,101 +697,31 @@ int X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain) | |||
603 | 697 | ||
604 | if (pkey != NULL) EVP_PKEY_copy_parameters(pkey,ktmp); | 698 | if (pkey != NULL) EVP_PKEY_copy_parameters(pkey,ktmp); |
605 | EVP_PKEY_free(ktmp); | 699 | EVP_PKEY_free(ktmp); |
606 | return(1); | 700 | return 1; |
607 | } | ||
608 | |||
609 | int X509_STORE_add_cert(X509_STORE *ctx, X509 *x) | ||
610 | { | ||
611 | X509_OBJECT *obj,*r; | ||
612 | int ret=1; | ||
613 | |||
614 | if (x == NULL) return(0); | ||
615 | obj=(X509_OBJECT *)Malloc(sizeof(X509_OBJECT)); | ||
616 | if (obj == NULL) | ||
617 | { | ||
618 | X509err(X509_F_X509_STORE_ADD_CERT,ERR_R_MALLOC_FAILURE); | ||
619 | return(0); | ||
620 | } | ||
621 | obj->type=X509_LU_X509; | ||
622 | obj->data.x509=x; | ||
623 | |||
624 | CRYPTO_w_lock(CRYPTO_LOCK_X509_STORE); | ||
625 | |||
626 | X509_OBJECT_up_ref_count(obj); | ||
627 | |||
628 | r=(X509_OBJECT *)lh_insert(ctx->certs,obj); | ||
629 | if (r != NULL) | ||
630 | { /* oops, put it back */ | ||
631 | lh_delete(ctx->certs,obj); | ||
632 | X509_OBJECT_free_contents(obj); | ||
633 | Free(obj); | ||
634 | lh_insert(ctx->certs,r); | ||
635 | X509err(X509_F_X509_STORE_ADD_CERT,X509_R_CERT_ALREADY_IN_HASH_TABLE); | ||
636 | ret=0; | ||
637 | } | ||
638 | |||
639 | CRYPTO_w_unlock(CRYPTO_LOCK_X509_STORE); | ||
640 | |||
641 | return(ret); | ||
642 | } | ||
643 | |||
644 | int X509_STORE_add_crl(X509_STORE *ctx, X509_CRL *x) | ||
645 | { | ||
646 | X509_OBJECT *obj,*r; | ||
647 | int ret=1; | ||
648 | |||
649 | if (x == NULL) return(0); | ||
650 | obj=(X509_OBJECT *)Malloc(sizeof(X509_OBJECT)); | ||
651 | if (obj == NULL) | ||
652 | { | ||
653 | X509err(X509_F_X509_STORE_ADD_CRL,ERR_R_MALLOC_FAILURE); | ||
654 | return(0); | ||
655 | } | ||
656 | obj->type=X509_LU_CRL; | ||
657 | obj->data.crl=x; | ||
658 | |||
659 | CRYPTO_w_lock(CRYPTO_LOCK_X509_STORE); | ||
660 | |||
661 | X509_OBJECT_up_ref_count(obj); | ||
662 | |||
663 | r=(X509_OBJECT *)lh_insert(ctx->certs,obj); | ||
664 | if (r != NULL) | ||
665 | { /* oops, put it back */ | ||
666 | lh_delete(ctx->certs,obj); | ||
667 | X509_OBJECT_free_contents(obj); | ||
668 | Free(obj); | ||
669 | lh_insert(ctx->certs,r); | ||
670 | X509err(X509_F_X509_STORE_ADD_CRL,X509_R_CERT_ALREADY_IN_HASH_TABLE); | ||
671 | ret=0; | ||
672 | } | ||
673 | |||
674 | CRYPTO_w_unlock(CRYPTO_LOCK_X509_STORE); | ||
675 | |||
676 | return(ret); | ||
677 | } | 701 | } |
678 | 702 | ||
679 | int X509_STORE_CTX_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, | 703 | int X509_STORE_CTX_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, |
680 | CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func) | 704 | CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func) |
681 | { | 705 | { |
682 | x509_store_ctx_num++; | 706 | x509_store_ctx_num++; |
683 | return(CRYPTO_get_ex_new_index(x509_store_ctx_num-1, | 707 | return CRYPTO_get_ex_new_index(x509_store_ctx_num-1, |
684 | &x509_store_ctx_method, | 708 | &x509_store_ctx_method, |
685 | argl,argp,new_func,dup_func,free_func)); | 709 | argl,argp,new_func,dup_func,free_func); |
686 | } | 710 | } |
687 | 711 | ||
688 | int X509_STORE_CTX_set_ex_data(X509_STORE_CTX *ctx, int idx, void *data) | 712 | int X509_STORE_CTX_set_ex_data(X509_STORE_CTX *ctx, int idx, void *data) |
689 | { | 713 | { |
690 | return(CRYPTO_set_ex_data(&ctx->ex_data,idx,data)); | 714 | return CRYPTO_set_ex_data(&ctx->ex_data,idx,data); |
691 | } | 715 | } |
692 | 716 | ||
693 | void *X509_STORE_CTX_get_ex_data(X509_STORE_CTX *ctx, int idx) | 717 | void *X509_STORE_CTX_get_ex_data(X509_STORE_CTX *ctx, int idx) |
694 | { | 718 | { |
695 | return(CRYPTO_get_ex_data(&ctx->ex_data,idx)); | 719 | return CRYPTO_get_ex_data(&ctx->ex_data,idx); |
696 | } | 720 | } |
697 | 721 | ||
698 | int X509_STORE_CTX_get_error(X509_STORE_CTX *ctx) | 722 | int X509_STORE_CTX_get_error(X509_STORE_CTX *ctx) |
699 | { | 723 | { |
700 | return(ctx->error); | 724 | return ctx->error; |
701 | } | 725 | } |
702 | 726 | ||
703 | void X509_STORE_CTX_set_error(X509_STORE_CTX *ctx, int err) | 727 | void X509_STORE_CTX_set_error(X509_STORE_CTX *ctx, int err) |
@@ -707,17 +731,17 @@ void X509_STORE_CTX_set_error(X509_STORE_CTX *ctx, int err) | |||
707 | 731 | ||
708 | int X509_STORE_CTX_get_error_depth(X509_STORE_CTX *ctx) | 732 | int X509_STORE_CTX_get_error_depth(X509_STORE_CTX *ctx) |
709 | { | 733 | { |
710 | return(ctx->error_depth); | 734 | return ctx->error_depth; |
711 | } | 735 | } |
712 | 736 | ||
713 | X509 *X509_STORE_CTX_get_current_cert(X509_STORE_CTX *ctx) | 737 | X509 *X509_STORE_CTX_get_current_cert(X509_STORE_CTX *ctx) |
714 | { | 738 | { |
715 | return(ctx->current_cert); | 739 | return ctx->current_cert; |
716 | } | 740 | } |
717 | 741 | ||
718 | STACK_OF(X509) *X509_STORE_CTX_get_chain(X509_STORE_CTX *ctx) | 742 | STACK_OF(X509) *X509_STORE_CTX_get_chain(X509_STORE_CTX *ctx) |
719 | { | 743 | { |
720 | return(ctx->chain); | 744 | return ctx->chain; |
721 | } | 745 | } |
722 | 746 | ||
723 | STACK_OF(X509) *X509_STORE_CTX_get1_chain(X509_STORE_CTX *ctx) | 747 | STACK_OF(X509) *X509_STORE_CTX_get1_chain(X509_STORE_CTX *ctx) |
@@ -725,12 +749,13 @@ STACK_OF(X509) *X509_STORE_CTX_get1_chain(X509_STORE_CTX *ctx) | |||
725 | int i; | 749 | int i; |
726 | X509 *x; | 750 | X509 *x; |
727 | STACK_OF(X509) *chain; | 751 | STACK_OF(X509) *chain; |
728 | if(!ctx->chain || !(chain = sk_X509_dup(ctx->chain))) return NULL; | 752 | if (!ctx->chain || !(chain = sk_X509_dup(ctx->chain))) return NULL; |
729 | for(i = 0; i < sk_X509_num(chain); i++) { | 753 | for (i = 0; i < sk_X509_num(chain); i++) |
754 | { | ||
730 | x = sk_X509_value(chain, i); | 755 | x = sk_X509_value(chain, i); |
731 | CRYPTO_add(&x->references, 1, CRYPTO_LOCK_X509); | 756 | CRYPTO_add(&x->references, 1, CRYPTO_LOCK_X509); |
732 | } | 757 | } |
733 | return(chain); | 758 | return chain; |
734 | } | 759 | } |
735 | 760 | ||
736 | void X509_STORE_CTX_set_cert(X509_STORE_CTX *ctx, X509 *x) | 761 | void X509_STORE_CTX_set_cert(X509_STORE_CTX *ctx, X509 *x) |
@@ -768,43 +793,123 @@ int X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, | |||
768 | { | 793 | { |
769 | int idx; | 794 | int idx; |
770 | /* If purpose not set use default */ | 795 | /* If purpose not set use default */ |
771 | if(!purpose) purpose = def_purpose; | 796 | if (!purpose) purpose = def_purpose; |
772 | /* If we have a purpose then check it is valid */ | 797 | /* If we have a purpose then check it is valid */ |
773 | if(purpose) { | 798 | if (purpose) |
799 | { | ||
774 | X509_PURPOSE *ptmp; | 800 | X509_PURPOSE *ptmp; |
775 | idx = X509_PURPOSE_get_by_id(purpose); | 801 | idx = X509_PURPOSE_get_by_id(purpose); |
776 | if(idx == -1) { | 802 | if (idx == -1) |
803 | { | ||
777 | X509err(X509_F_X509_STORE_CTX_PURPOSE_INHERIT, | 804 | X509err(X509_F_X509_STORE_CTX_PURPOSE_INHERIT, |
778 | X509_R_UNKNOWN_PURPOSE_ID); | 805 | X509_R_UNKNOWN_PURPOSE_ID); |
779 | return 0; | 806 | return 0; |
780 | } | 807 | } |
781 | ptmp = X509_PURPOSE_get0(idx); | 808 | ptmp = X509_PURPOSE_get0(idx); |
782 | if(ptmp->trust == X509_TRUST_DEFAULT) { | 809 | if (ptmp->trust == X509_TRUST_DEFAULT) |
810 | { | ||
783 | idx = X509_PURPOSE_get_by_id(def_purpose); | 811 | idx = X509_PURPOSE_get_by_id(def_purpose); |
784 | if(idx == -1) { | 812 | if (idx == -1) |
813 | { | ||
785 | X509err(X509_F_X509_STORE_CTX_PURPOSE_INHERIT, | 814 | X509err(X509_F_X509_STORE_CTX_PURPOSE_INHERIT, |
786 | X509_R_UNKNOWN_PURPOSE_ID); | 815 | X509_R_UNKNOWN_PURPOSE_ID); |
787 | return 0; | 816 | return 0; |
788 | } | 817 | } |
789 | ptmp = X509_PURPOSE_get0(idx); | 818 | ptmp = X509_PURPOSE_get0(idx); |
790 | } | 819 | } |
791 | /* If trust not set then get from purpose default */ | 820 | /* If trust not set then get from purpose default */ |
792 | if(!trust) trust = ptmp->trust; | 821 | if (!trust) trust = ptmp->trust; |
793 | } | 822 | } |
794 | if(trust) { | 823 | if (trust) |
824 | { | ||
795 | idx = X509_TRUST_get_by_id(trust); | 825 | idx = X509_TRUST_get_by_id(trust); |
796 | if(idx == -1) { | 826 | if (idx == -1) |
827 | { | ||
797 | X509err(X509_F_X509_STORE_CTX_PURPOSE_INHERIT, | 828 | X509err(X509_F_X509_STORE_CTX_PURPOSE_INHERIT, |
798 | X509_R_UNKNOWN_TRUST_ID); | 829 | X509_R_UNKNOWN_TRUST_ID); |
799 | return 0; | 830 | return 0; |
831 | } | ||
800 | } | 832 | } |
801 | } | ||
802 | 833 | ||
803 | if(purpose) ctx->purpose = purpose; | 834 | if (purpose) ctx->purpose = purpose; |
804 | if(trust) ctx->trust = trust; | 835 | if (trust) ctx->trust = trust; |
805 | return 1; | 836 | return 1; |
806 | } | 837 | } |
807 | 838 | ||
839 | X509_STORE_CTX *X509_STORE_CTX_new(void) | ||
840 | { | ||
841 | X509_STORE_CTX *ctx; | ||
842 | ctx = (X509_STORE_CTX *)OPENSSL_malloc(sizeof(X509_STORE_CTX)); | ||
843 | if (ctx) memset(ctx, 0, sizeof(X509_STORE_CTX)); | ||
844 | return ctx; | ||
845 | } | ||
846 | |||
847 | void X509_STORE_CTX_free(X509_STORE_CTX *ctx) | ||
848 | { | ||
849 | X509_STORE_CTX_cleanup(ctx); | ||
850 | OPENSSL_free(ctx); | ||
851 | } | ||
852 | |||
853 | void X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, X509 *x509, | ||
854 | STACK_OF(X509) *chain) | ||
855 | { | ||
856 | ctx->ctx=store; | ||
857 | ctx->current_method=0; | ||
858 | ctx->cert=x509; | ||
859 | ctx->untrusted=chain; | ||
860 | ctx->last_untrusted=0; | ||
861 | ctx->purpose=0; | ||
862 | ctx->trust=0; | ||
863 | ctx->check_time=0; | ||
864 | ctx->flags=0; | ||
865 | ctx->other_ctx=NULL; | ||
866 | ctx->valid=0; | ||
867 | ctx->chain=NULL; | ||
868 | ctx->depth=9; | ||
869 | ctx->error=0; | ||
870 | ctx->error_depth=0; | ||
871 | ctx->current_cert=NULL; | ||
872 | ctx->current_issuer=NULL; | ||
873 | ctx->check_issued = check_issued; | ||
874 | ctx->get_issuer = X509_STORE_CTX_get1_issuer; | ||
875 | ctx->verify_cb = store->verify_cb; | ||
876 | ctx->verify = store->verify; | ||
877 | ctx->cleanup = 0; | ||
878 | memset(&(ctx->ex_data),0,sizeof(CRYPTO_EX_DATA)); | ||
879 | } | ||
880 | |||
881 | /* Set alternative lookup method: just a STACK of trusted certificates. | ||
882 | * This avoids X509_STORE nastiness where it isn't needed. | ||
883 | */ | ||
884 | |||
885 | void X509_STORE_CTX_trusted_stack(X509_STORE_CTX *ctx, STACK_OF(X509) *sk) | ||
886 | { | ||
887 | ctx->other_ctx = sk; | ||
888 | ctx->get_issuer = get_issuer_sk; | ||
889 | } | ||
890 | |||
891 | void X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx) | ||
892 | { | ||
893 | if (ctx->cleanup) ctx->cleanup(ctx); | ||
894 | if (ctx->chain != NULL) | ||
895 | { | ||
896 | sk_X509_pop_free(ctx->chain,X509_free); | ||
897 | ctx->chain=NULL; | ||
898 | } | ||
899 | CRYPTO_free_ex_data(x509_store_ctx_method,ctx,&(ctx->ex_data)); | ||
900 | memset(&ctx->ex_data,0,sizeof(CRYPTO_EX_DATA)); | ||
901 | } | ||
902 | |||
903 | void X509_STORE_CTX_set_flags(X509_STORE_CTX *ctx, long flags) | ||
904 | { | ||
905 | ctx->flags |= flags; | ||
906 | } | ||
907 | |||
908 | void X509_STORE_CTX_set_time(X509_STORE_CTX *ctx, long flags, time_t t) | ||
909 | { | ||
910 | ctx->check_time = t; | ||
911 | ctx->flags |= X509_V_FLAG_USE_CHECK_TIME; | ||
912 | } | ||
808 | 913 | ||
809 | IMPLEMENT_STACK_OF(X509) | 914 | IMPLEMENT_STACK_OF(X509) |
810 | IMPLEMENT_ASN1_SET_OF(X509) | 915 | IMPLEMENT_ASN1_SET_OF(X509) |