Files
cli/vendor/aws-lc-sys/aws-lc/crypto/x509/x509spki.c

131 lines
3.8 KiB
C

// Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project 1999.
// Copyright (c) 1999 The OpenSSL Project. All rights reserved.
// SPDX-License-Identifier: Apache-2.0
#include <string.h>
#include <openssl/base64.h>
#include <openssl/err.h>
#include <openssl/mem.h>
#include <openssl/x509.h>
#include "internal.h"
int NETSCAPE_SPKI_set_pubkey(NETSCAPE_SPKI *x, EVP_PKEY *pkey) {
if ((x == NULL) || (x->spkac == NULL)) {
return 0;
}
return (X509_PUBKEY_set(&(x->spkac->pubkey), pkey));
}
EVP_PKEY *NETSCAPE_SPKI_get_pubkey(const NETSCAPE_SPKI *x) {
if ((x == NULL) || (x->spkac == NULL)) {
return NULL;
}
return (X509_PUBKEY_get(x->spkac->pubkey));
}
// Load a Netscape SPKI from a base64 encoded string
NETSCAPE_SPKI *NETSCAPE_SPKI_b64_decode(const char *str, ossl_ssize_t len) {
unsigned char *spki_der;
const unsigned char *p;
size_t spki_len;
NETSCAPE_SPKI *spki;
if (!str || (str[0] == 0)) {
return NULL;
}
if (len <= 0) {
len = strlen(str);
}
if (!EVP_DecodedLength(&spki_len, len)) {
OPENSSL_PUT_ERROR(X509, X509_R_BASE64_DECODE_ERROR);
return NULL;
}
if (!(spki_der = OPENSSL_malloc(spki_len))) {
return NULL;
}
if (!EVP_DecodeBase64(spki_der, &spki_len, spki_len, (const uint8_t *)str,
len)) {
OPENSSL_PUT_ERROR(X509, X509_R_BASE64_DECODE_ERROR);
OPENSSL_free(spki_der);
return NULL;
}
p = spki_der;
spki = d2i_NETSCAPE_SPKI(NULL, &p, spki_len);
OPENSSL_free(spki_der);
return spki;
}
// Generate a base64 encoded string from an SPKI
char *NETSCAPE_SPKI_b64_encode(NETSCAPE_SPKI *spki) {
unsigned char *der_spki, *p;
char *b64_str;
size_t b64_len;
int der_len;
der_len = i2d_NETSCAPE_SPKI(spki, NULL);
if (!EVP_EncodedLength(&b64_len, der_len)) {
OPENSSL_PUT_ERROR(X509, ERR_R_OVERFLOW);
return NULL;
}
der_spki = OPENSSL_malloc(der_len);
if (der_spki == NULL) {
return NULL;
}
b64_str = OPENSSL_malloc(b64_len);
if (b64_str == NULL) {
OPENSSL_free(der_spki);
return NULL;
}
p = der_spki;
i2d_NETSCAPE_SPKI(spki, &p);
EVP_EncodeBlock((unsigned char *)b64_str, der_spki, der_len);
OPENSSL_free(der_spki);
return b64_str;
}
int NETSCAPE_SPKI_print(BIO *out, NETSCAPE_SPKI *spki) {
if (out == NULL || spki == NULL || spki->spkac == NULL ||
spki->spkac->pubkey == NULL || spki->sig_algor == NULL ||
spki->sig_algor->algorithm == NULL || spki->signature == NULL ||
spki->signature->data == NULL) {
OPENSSL_PUT_ERROR(X509, ERR_R_PASSED_NULL_PARAMETER);
return 0;
}
BIO_printf(out, "Netscape SPKI:\n");
// Print out public key algorithm and contents.
ASN1_OBJECT *spkioid;
X509_PUBKEY_get0_param(&spkioid, NULL, NULL, NULL, spki->spkac->pubkey);
int spkioid_nid = OBJ_obj2nid(spkioid);
BIO_printf(out, " Public Key Algorithm: %s\n",
(spkioid_nid == NID_undef) ? "UNKNOWN" : OBJ_nid2ln(spkioid_nid));
EVP_PKEY *pkey = X509_PUBKEY_get0(spki->spkac->pubkey);
if (pkey == NULL) {
BIO_printf(out, " Unable to load public key\n");
} else {
EVP_PKEY_print_public(out, pkey, 4, NULL);
}
ASN1_IA5STRING *chal = spki->spkac->challenge;
if (chal != NULL && chal->length != 0) {
BIO_printf(out, " Challenge String: %.*s\n", chal->length, chal->data);
}
// Print out signature algorithm and contents.
BIO_printf(out, " Signature Algorithm: %s",
(OBJ_obj2nid(spki->sig_algor->algorithm) == NID_undef)
? "UNKNOWN"
: OBJ_nid2ln(OBJ_obj2nid(spki->sig_algor->algorithm)));
for (int i = 0; i < spki->signature->length; i++) {
if ((i % 18) == 0) {
BIO_printf(out, "\n ");
}
BIO_printf(out, "%02x%s", (unsigned char)spki->signature->data[i],
((i + 1) == spki->signature->length) ? "" : ":");
}
BIO_write(out, "\n", 1);
return 1;
}