/* $Id: x509-file.cpp 76553 2019-01-01 01:45:53Z vboxsync $ */ /** @file * IPRT - Crypto - X.509, File related APIs. */ /* * Copyright (C) 2006-2019 Oracle Corporation * * This file is part of VirtualBox Open Source Edition (OSE), as * available from http://www.virtualbox.org. This file is free software; * you can redistribute it and/or modify it under the terms of the GNU * General Public License (GPL) as published by the Free Software * Foundation, in version 2 as it comes in the "COPYING" file of the * VirtualBox OSE distribution. VirtualBox OSE is distributed in the * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind. * * The contents of this file may alternatively be used under the terms * of the Common Development and Distribution License Version 1.0 * (CDDL) only, as it comes in the "COPYING.CDDL" file of the * VirtualBox OSE distribution, in which case the provisions of the * CDDL are applicable instead of those of the GPL. * * You may elect to license modified versions of this file under the * terms and conditions of either the GPL or the CDDL or both. */ /********************************************************************************************************************************* * Header Files * *********************************************************************************************************************************/ #include "internal/iprt.h" #include #include #include #include #include /********************************************************************************************************************************* * Global Variables * *********************************************************************************************************************************/ static RTCRPEMMARKERWORD const g_aWords_Certificate[] = { { RT_STR_TUPLE("CERTIFICATE") } }; /** X509 Certificate markers. */ RT_DECL_DATA_CONST(RTCRPEMMARKER const) g_aRTCrX509CertificateMarkers[] = { { g_aWords_Certificate, RT_ELEMENTS(g_aWords_Certificate) } }; /** Number of entries in g_aRTCrX509CertificateMarkers. */ RT_DECL_DATA_CONST(uint32_t const) g_cRTCrX509CertificateMarkers = RT_ELEMENTS(g_aRTCrX509CertificateMarkers); RTDECL(int) RTCrX509Certificate_ReadFromFile(PRTCRX509CERTIFICATE pCertificate, const char *pszFilename, uint32_t fFlags, PCRTASN1ALLOCATORVTABLE pAllocator, PRTERRINFO pErrInfo) { AssertReturn(!(fFlags & ~RTCRX509CERT_READ_F_PEM_ONLY), VERR_INVALID_FLAGS); PCRTCRPEMSECTION pSectionHead; int rc = RTCrPemReadFile(pszFilename, fFlags & RTCRX509CERT_READ_F_PEM_ONLY ? RTCRPEMREADFILE_F_ONLY_PEM : 0, g_aRTCrX509CertificateMarkers, g_cRTCrX509CertificateMarkers, &pSectionHead, pErrInfo); if (RT_SUCCESS(rc)) { if (pSectionHead) { RTCRX509CERTIFICATE TmpCert; RTASN1CURSORPRIMARY PrimaryCursor; RTAsn1CursorInitPrimary(&PrimaryCursor, pSectionHead->pbData, (uint32_t)RT_MIN(pSectionHead->cbData, UINT32_MAX), pErrInfo, pAllocator, RTASN1CURSOR_FLAGS_DER, RTPathFilename(pszFilename)); rc = RTCrX509Certificate_DecodeAsn1(&PrimaryCursor.Cursor, 0, &TmpCert, "Cert"); if (RT_SUCCESS(rc)) { rc = RTCrX509Certificate_CheckSanity(&TmpCert, 0, pErrInfo, "Cert"); if (RT_SUCCESS(rc)) { rc = RTCrX509Certificate_Clone(pCertificate, &TmpCert, pAllocator); if (RT_SUCCESS(rc)) { if (pSectionHead->pNext || PrimaryCursor.Cursor.cbLeft) rc = VINF_ASN1_MORE_DATA; } } RTCrX509Certificate_Delete(&TmpCert); } RTCrPemFreeSections(pSectionHead); } else rc = rc != VINF_SUCCESS ? -rc : VERR_INTERNAL_ERROR_2; } return rc; } RTDECL(int) RTCrX509Certificate_ReadFromBuffer(PRTCRX509CERTIFICATE pCertificate, const void *pvBuf, size_t cbBuf, uint32_t fFlags, PCRTASN1ALLOCATORVTABLE pAllocator, PRTERRINFO pErrInfo, const char *pszErrorTag) { AssertReturn(!(fFlags & ~RTCRX509CERT_READ_F_PEM_ONLY), VERR_INVALID_FLAGS); PCRTCRPEMSECTION pSectionHead; int rc = RTCrPemParseContent(pvBuf, cbBuf, fFlags & RTCRX509CERT_READ_F_PEM_ONLY ? RTCRPEMREADFILE_F_ONLY_PEM : 0, g_aRTCrX509CertificateMarkers, g_cRTCrX509CertificateMarkers, &pSectionHead, pErrInfo); if (RT_SUCCESS(rc)) { if (pSectionHead) { RTCRX509CERTIFICATE TmpCert; RTASN1CURSORPRIMARY PrimaryCursor; RTAsn1CursorInitPrimary(&PrimaryCursor, pSectionHead->pbData, (uint32_t)RT_MIN(pSectionHead->cbData, UINT32_MAX), pErrInfo, pAllocator, RTASN1CURSOR_FLAGS_DER, pszErrorTag); rc = RTCrX509Certificate_DecodeAsn1(&PrimaryCursor.Cursor, 0, &TmpCert, "Cert"); if (RT_SUCCESS(rc)) { rc = RTCrX509Certificate_CheckSanity(&TmpCert, 0, pErrInfo, "Cert"); if (RT_SUCCESS(rc)) { rc = RTCrX509Certificate_Clone(pCertificate, &TmpCert, pAllocator); if (RT_SUCCESS(rc)) { if (pSectionHead->pNext || PrimaryCursor.Cursor.cbLeft) rc = VINF_ASN1_MORE_DATA; } } RTCrX509Certificate_Delete(&TmpCert); } RTCrPemFreeSections(pSectionHead); } else rc = rc != VINF_SUCCESS ? -rc : VERR_INTERNAL_ERROR_2; } return rc; } #if 0 RTDECL(int) RTCrX509Certificates_ReadFromFile(const char *pszFilename, uint32_t fFlags, PRTCRX509CERTIFICATES pCertificates, PRTERRINFO pErrInfo) { AssertReturn(!(fFlags & ~RTCRX509CERT_READ_F_PEM_ONLY), VERR_INVALID_FLAGS); PCRTCRPEMSECTION pSectionHead; int rc = RTCrPemReadFile(pszFilename, fFlags & RTCRX509CERT_READ_F_PEM_ONLY ? RTCRPEMREADFILE_F_ONLY_PEM : 0, g_aRTCrX509CertificateMarkers, g_cRTCrX509CertificateMarkers, &pSectionHead, pErrInfo); if (RT_SUCCESS(rc)) { pCertificates->Allocation PCRTCRPEMSECTION pCurSec = pSectionHead; while (pCurSec) { pCurSec = pCurSec->pNext; } RTCrPemFreeSections(pSectionHead); } return rc; } #endif