/*
* Copyright (C) 2011-2012 Free Software Foundation, Inc.
*
* Author: Nikos Mavrogiannopoulos
*
* This file is part of GnuTLS.
*
* The GnuTLS is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public License
* as published by the Free Software Foundation; either version 2.1 of
* the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with this program. If not, see
*
*/
#include "gnutls_int.h"
#include "errors.h"
#include
#include
#include
#include "x509/x509_int.h"
#include
/**
* gnutls_pcert_import_x509:
* @pcert: The pcert structure
* @crt: The certificate to be imported
* @flags: zero for now
*
* This convenience function will import the given certificate to a
* #gnutls_pcert_st structure. The structure must be deinitialized
* afterwards using gnutls_pcert_deinit();
*
* Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a
* negative error value.
*
* Since: 3.0
**/
int gnutls_pcert_import_x509(gnutls_pcert_st * pcert,
gnutls_x509_crt_t crt, unsigned int flags)
{
int ret;
memset(pcert, 0, sizeof(*pcert));
pcert->type = GNUTLS_CRT_X509;
pcert->cert.data = NULL;
ret =
gnutls_x509_crt_export2(crt, GNUTLS_X509_FMT_DER,
&pcert->cert);
if (ret < 0) {
ret = gnutls_assert_val(ret);
goto cleanup;
}
ret = gnutls_pubkey_init(&pcert->pubkey);
if (ret < 0) {
ret = gnutls_assert_val(ret);
goto cleanup;
}
ret = gnutls_pubkey_import_x509(pcert->pubkey, crt, 0);
if (ret < 0) {
gnutls_pubkey_deinit(pcert->pubkey);
pcert->pubkey = NULL;
ret = gnutls_assert_val(ret);
goto cleanup;
}
return 0;
cleanup:
_gnutls_free_datum(&pcert->cert);
return ret;
}
/**
* gnutls_pcert_import_x509_list:
* @pcert_list: The structures to store the certificates; must not contain initialized #gnutls_pcert_st structures.
* @crt: The certificates to be imported
* @ncrt: The number of certificates in @crt; will be updated if necessary
* @flags: zero or %GNUTLS_X509_CRT_LIST_SORT
*
* This convenience function will import the given certificates to an
* already allocated set of #gnutls_pcert_st structures. The structures must
* be deinitialized afterwards using gnutls_pcert_deinit(). @pcert_list
* should contain space for at least @ncrt elements.
*
* In the case %GNUTLS_X509_CRT_LIST_SORT is specified and that
* function cannot sort the list, %GNUTLS_E_CERTIFICATE_LIST_UNSORTED
* will be returned. Currently sorting can fail if the list size
* exceeds an internal constraint (16).
*
* Returns: On success, %GNUTLS_E_SUCCESS (0) is returned, otherwise a
* negative error value.
*
* Since: 3.4.0
**/
int gnutls_pcert_import_x509_list(gnutls_pcert_st * pcert_list,
gnutls_x509_crt_t *crt, unsigned *ncrt,
unsigned int flags)
{
int ret;
unsigned i;
unsigned current = 0;
gnutls_x509_crt_t sorted[DEFAULT_MAX_VERIFY_DEPTH];
gnutls_x509_crt_t *s;
s = crt;
if (flags & GNUTLS_X509_CRT_LIST_SORT && *ncrt > 1) {
if (*ncrt > DEFAULT_MAX_VERIFY_DEPTH) {
ret = _gnutls_check_if_sorted(crt, *ncrt);
if (ret < 0) {
gnutls_assert();
return GNUTLS_E_CERTIFICATE_LIST_UNSORTED;
}
} else {
s = _gnutls_sort_clist(sorted, crt, ncrt, NULL);
if (s == crt) {
gnutls_assert();
return GNUTLS_E_UNIMPLEMENTED_FEATURE;
}
}
}
for (i=0;i<*ncrt;i++) {
ret = gnutls_pcert_import_x509(&pcert_list[i], s[i], 0);
if (ret < 0) {
current = i;
goto cleanup;
}
}
return 0;
cleanup:
for (i=0;i= 0) ret = ret2;
}
if (ret < 0) {
gnutls_assert();
goto cleanup;
}
} else { /* file */
ret = gnutls_load_file(file, &data);
if (ret < 0)
return gnutls_assert_val(ret);
ret = gnutls_x509_crt_list_import2(&crts, &crts_size, &data, format, flags|GNUTLS_X509_CRT_LIST_SORT);
if (ret < 0) {
gnutls_assert();
goto cleanup;
}
}
if (crts_size > *pcert_list_size) {
gnutls_assert();
ret = GNUTLS_E_SHORT_MEMORY_BUFFER;
goto cleanup;
}
ret = gnutls_pcert_import_x509_list(pcert_list, crts, &crts_size, flags);
if (ret < 0) {
gnutls_assert();
goto cleanup;
}
*pcert_list_size = crts_size;
ret = 0;
cleanup:
for (i=0;itype != GNUTLS_CRT_X509) {
gnutls_assert();
return GNUTLS_E_INVALID_REQUEST;
}
ret = gnutls_x509_crt_init(crt);
if (ret < 0)
return gnutls_assert_val(ret);
ret = gnutls_x509_crt_import(*crt, &pcert->cert, GNUTLS_X509_FMT_DER);
if (ret < 0) {
gnutls_x509_crt_deinit(*crt);
*crt = NULL;
return gnutls_assert_val(ret);
}
return 0;
}
/**
* gnutls_pcert_deinit:
* @pcert: The structure to be deinitialized
*
* This function will deinitialize a pcert structure.
*
* Since: 3.0
**/
void gnutls_pcert_deinit(gnutls_pcert_st * pcert)
{
if (pcert->pubkey)
gnutls_pubkey_deinit(pcert->pubkey);
pcert->pubkey = NULL;
_gnutls_free_datum(&pcert->cert);
}
/* Converts the first certificate for the cert_auth_info structure
* to a pcert.
*/
int
_gnutls_get_auth_info_pcert(gnutls_pcert_st * pcert,
gnutls_certificate_type_t type,
cert_auth_info_t info)
{
switch (type) {
case GNUTLS_CRT_X509:
return gnutls_pcert_import_x509_raw(pcert,
&info->
raw_certificate_list
[0],
GNUTLS_X509_FMT_DER,
GNUTLS_PCERT_NO_CERT);
default:
gnutls_assert();
return GNUTLS_E_INTERNAL_ERROR;
}
}