adjust wc_i2d_PKCS12 API
This commit is contained in:
parent
dea4f2fb1a
commit
487e66394e
@ -19007,7 +19007,7 @@ int wolfSSL_i2d_PKCS12_bio(WOLFSSL_BIO *bio, WC_PKCS12 *pkcs12)
|
||||
word32 certSz = 0;
|
||||
byte *certDer = NULL;
|
||||
|
||||
certSz = wc_i2d_PKCS12(pkcs12, &certDer);
|
||||
certSz = wc_i2d_PKCS12(pkcs12, &certDer, NULL);
|
||||
if ((certSz > 0) && (certDer != NULL)) {
|
||||
if (wolfSSL_BIO_write(bio, certDer, certSz) == (int)certSz) {
|
||||
ret = SSL_SUCCESS;
|
||||
|
51
tests/api.c
51
tests/api.c
@ -285,6 +285,9 @@
|
||||
#ifdef HAVE_CURVE25519
|
||||
#include <wolfssl/wolfcrypt/curve25519.h>
|
||||
#endif
|
||||
#ifdef HAVE_PKCS12
|
||||
#include <wolfssl/wolfcrypt/pkcs12.h>
|
||||
#endif
|
||||
|
||||
#if (defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL) || defined(OPENSSL_ALL))
|
||||
#include <wolfssl/openssl/ssl.h>
|
||||
@ -17700,6 +17703,52 @@ static void test_PKCS7_signed_enveloped(void)
|
||||
#endif
|
||||
}
|
||||
|
||||
static void test_wc_i2d_PKCS12(void)
|
||||
{
|
||||
#if !defined(NO_ASN) && !defined(NO_PWDBASED) && defined(HAVE_PKCS12) \
|
||||
&& !defined(NO_FILESYSTEM) && !defined(NO_RSA) \
|
||||
&& !defined(NO_AES) && !defined(NO_DES3)
|
||||
WC_PKCS12* pkcs12 = NULL;
|
||||
unsigned char der[FOURK_BUF * 2];
|
||||
unsigned char* pt;
|
||||
int derSz;
|
||||
unsigned char out[FOURK_BUF * 2];
|
||||
int outSz = FOURK_BUF * 2;
|
||||
|
||||
const char p12_f[] = "./certs/test-servercert.p12";
|
||||
XFILE f;
|
||||
|
||||
printf(testingFmt, "wc_i2d_PKCS12");
|
||||
|
||||
AssertNotNull(f = XFOPEN(p12_f, "rb"));
|
||||
derSz = XFREAD(der, 1, sizeof(der), f);
|
||||
AssertIntGT(derSz, 0);
|
||||
XFCLOSE(f);
|
||||
|
||||
AssertNotNull(pkcs12 = wc_PKCS12_new());
|
||||
AssertIntEQ(wc_d2i_PKCS12(der, derSz, pkcs12), 0);
|
||||
AssertIntEQ(wc_i2d_PKCS12(pkcs12, NULL, &outSz), LENGTH_ONLY_E);
|
||||
AssertIntEQ(outSz, derSz);
|
||||
|
||||
outSz = derSz - 1;
|
||||
pt = out;
|
||||
AssertIntLE(wc_i2d_PKCS12(pkcs12, &pt, &outSz), 0);
|
||||
|
||||
outSz = derSz;
|
||||
AssertIntEQ(wc_i2d_PKCS12(pkcs12, &pt, &outSz), derSz);
|
||||
AssertIntEQ((pt == out), 0);
|
||||
|
||||
pt = NULL;
|
||||
AssertIntEQ(wc_i2d_PKCS12(pkcs12, &pt, NULL), derSz);
|
||||
XFREE(pt, NULL, DYNAMIC_TYPE_PKCS);
|
||||
wc_PKCS12_free(pkcs12);
|
||||
|
||||
printf(resultFmt, passed);
|
||||
|
||||
#endif
|
||||
}
|
||||
|
||||
|
||||
/* Testing wc_SignatureGetSize() for signature type ECC */
|
||||
static int test_wc_SignatureGetSize_ecc(void)
|
||||
{
|
||||
@ -25892,6 +25941,8 @@ void ApiTest(void)
|
||||
test_wc_PKCS7_BER();
|
||||
test_PKCS7_signed_enveloped();
|
||||
|
||||
test_wc_i2d_PKCS12();
|
||||
|
||||
test_wolfSSL_CTX_LoadCRL();
|
||||
|
||||
AssertIntEQ(test_ForceZero(), 0);
|
||||
|
@ -674,19 +674,23 @@ int wc_d2i_PKCS12(const byte* der, word32 derSz, WC_PKCS12* pkcs12)
|
||||
* pkcs12 : non-null pkcs12 pointer
|
||||
* der : pointer-pointer to der buffer. If NULL space will be
|
||||
* allocated for der, which must be freed by application.
|
||||
* derSz : size of buffer passed in when der is not NULL. NULL arg disables
|
||||
* sanity checks on buffer read/writes. Max size gets set to derSz when
|
||||
* the "der" buffer passed in is NULL and LENGTH_ONLY_E is returned.
|
||||
* return size of DER on success and negative on failure.
|
||||
*/
|
||||
int wc_i2d_PKCS12(WC_PKCS12* pkcs12, byte** der)
|
||||
int wc_i2d_PKCS12(WC_PKCS12* pkcs12, byte** der, int* derSz)
|
||||
{
|
||||
int ret = 0;
|
||||
word32 seqSz, verSz, totalSz = 0, idx = 0, sdBufSz = 0;
|
||||
word32 seqSz, verSz = 0, totalSz = 0, idx = 0, sdBufSz = 0;
|
||||
byte *buf = NULL;
|
||||
byte ver[MAX_VERSION_SZ];
|
||||
byte seq[MAX_SEQ_SZ];
|
||||
byte *sdBuf = NULL;
|
||||
|
||||
if ((pkcs12 == NULL) || (pkcs12->safe == NULL) || (der == NULL)) {
|
||||
ret = BAD_FUNC_ARG;
|
||||
if ((pkcs12 == NULL) || (pkcs12->safe == NULL) ||
|
||||
(der == NULL && derSz == NULL)) {
|
||||
return BAD_FUNC_ARG;
|
||||
}
|
||||
|
||||
/* Create the MAC portion */
|
||||
@ -761,12 +765,22 @@ int wc_i2d_PKCS12(WC_PKCS12* pkcs12, byte** der)
|
||||
|
||||
totalSz += 4; /* Seq */
|
||||
|
||||
verSz = SetMyVersion(WC_PKCS12_VERSION_DEFAULT, ver, FALSE);
|
||||
ret = SetMyVersion(WC_PKCS12_VERSION_DEFAULT, ver, FALSE);
|
||||
if (ret > 0) {
|
||||
verSz = (word32)ret;
|
||||
ret = 0; /* value larger than 0 is success */
|
||||
totalSz += verSz;
|
||||
|
||||
seqSz = SetSequence(totalSz, seq);
|
||||
totalSz += seqSz;
|
||||
|
||||
/* check if getting length only */
|
||||
if (der == NULL && derSz != NULL) {
|
||||
*derSz = totalSz;
|
||||
XFREE(sdBuf, pkcs12->heap, DYNAMIC_TYPE_PKCS);
|
||||
return LENGTH_ONLY_E;
|
||||
}
|
||||
|
||||
if (*der == NULL) {
|
||||
/* Allocate if requested */
|
||||
buf = (byte*)XMALLOC(totalSz, NULL, DYNAMIC_TYPE_PKCS);
|
||||
@ -776,6 +790,15 @@ int wc_i2d_PKCS12(WC_PKCS12* pkcs12, byte** der)
|
||||
}
|
||||
else {
|
||||
buf = *der;
|
||||
|
||||
/* sanity check on buffer size if passed in */
|
||||
if (derSz != NULL) {
|
||||
if (*derSz < (int)totalSz) {
|
||||
WOLFSSL_MSG("Buffer passed in is too small");
|
||||
ret = BUFFER_E;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@ -799,7 +822,7 @@ int wc_i2d_PKCS12(WC_PKCS12* pkcs12, byte** der)
|
||||
idx += sizeof(WC_PKCS12_DATA_OID);
|
||||
|
||||
/* Element */
|
||||
buf[idx++] = 0xA0;
|
||||
buf[idx++] = ASN_CONSTRUCTED | ASN_CONTEXT_SPECIFIC;
|
||||
idx += SetLength(totalSz - sdBufSz - idx - 3, &buf[idx]);
|
||||
|
||||
/* Octet string */
|
||||
|
@ -49,7 +49,7 @@ enum {
|
||||
WOLFSSL_API WC_PKCS12* wc_PKCS12_new(void);
|
||||
WOLFSSL_API void wc_PKCS12_free(WC_PKCS12* pkcs12);
|
||||
WOLFSSL_API int wc_d2i_PKCS12(const byte* der, word32 derSz, WC_PKCS12* pkcs12);
|
||||
WOLFSSL_API int wc_i2d_PKCS12(WC_PKCS12* pkcs12, byte** der);
|
||||
WOLFSSL_API int wc_i2d_PKCS12(WC_PKCS12* pkcs12, byte** der, int* derSz);
|
||||
WOLFSSL_API int wc_PKCS12_parse(WC_PKCS12* pkcs12, const char* psw,
|
||||
byte** pkey, word32* pkeySz, byte** cert, word32* certSz,
|
||||
WC_DerCertList** ca);
|
||||
|
Loading…
Reference in New Issue
Block a user