2 * Copyright (c) 2002,2011-2012,2014-2015 Apple Inc. All Rights Reserved.
4 * The contents of this file constitute Original Code as defined in and are
5 * subject to the Apple Public Source License Version 1.2 (the 'License').
6 * You may not use this file except in compliance with the License. Please obtain
7 * a copy of the License at http://www.apple.com/publicsource and read it before
10 * This Original Code and all software distributed under the License are
11 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS
12 * OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, INCLUDING WITHOUT
13 * LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
14 * PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. Please see the License for the
15 * specific language governing rights and limitations under the License.
20 * TPCrlInfo.h - TP's private CRL and CRL group
24 #include "TPCrlInfo.h"
25 #include "tpdebugging.h"
26 #include "certGroupUtils.h"
27 #include "tpCrlVerify.h"
28 #include "tpPolicies.h"
30 #include <Security/cssmapi.h>
31 #include <Security/x509defs.h>
32 #include <Security/oidscert.h>
33 #include <Security/oidscrl.h>
34 #include <security_cdsa_utilities/cssmerrors.h>
35 #include <string.h> /* for memcmp */
36 #include <Security/cssmapple.h>
39 * Replacement for CSSM_CL_CrlGetFirstCachedFieldValue for use with
40 * TPCrlItemInfo's generic getFirstCachedField mechanism.
42 static CSSM_RETURN
tpGetFirstCachedFieldValue (CSSM_CL_HANDLE CLHandle
,
43 CSSM_HANDLE CrlHandle
,
44 const CSSM_OID
*CrlField
,
45 CSSM_HANDLE_PTR ResultsHandle
,
46 uint32
*NumberOfMatchedFields
,
49 return CSSM_CL_CrlGetFirstCachedFieldValue(CLHandle
,
51 NULL
, // const CSSM_DATA *CrlRecordIndex,
54 NumberOfMatchedFields
,
58 static const TPClItemCalls tpCrlClCalls
=
60 tpGetFirstCachedFieldValue
,
61 CSSM_CL_CrlAbortQuery
,
63 CSSM_CL_CrlAbortCache
,
65 &CSSMOID_X509V1CRLThisUpdate
,
66 &CSSMOID_X509V1CRLNextUpdate
,
67 CSSMERR_TP_INVALID_CRL_POINTER
,
68 CSSMERR_APPLETP_CRL_EXPIRED
,
69 CSSMERR_APPLETP_CRL_NOT_VALID_YET
74 * No default constructor - this is the only way.
75 * This caches the cert and fetches subjectName and issuerName
76 * to ensure the incoming certData is well-constructed.
79 CSSM_CL_HANDLE clHand
,
80 CSSM_CSP_HANDLE cspHand
,
81 const CSSM_DATA
*crlData
,
82 TPItemCopy copyCrlData
, // true: we copy, we free
83 // false - caller owns
84 const char *verifyTime
) // = NULL
86 : TPClItemInfo(clHand
, cspHand
, tpCrlClCalls
, crlData
,
87 copyCrlData
, verifyTime
),
89 mFromWhere(CFW_Nowhere
),
91 mCrlFieldToFree(NULL
),
92 mVerifyState(CVS_Unknown
),
93 mVerifyError(CSSMERR_TP_INTERNAL_ERROR
)
100 /* fetch parsed CRL */
101 crtn
= fetchField(&CSSMOID_X509V2CRLSignedCrlCStruct
, &mCrlFieldToFree
);
105 CssmError::throwMe(crtn
);
107 if(mCrlFieldToFree
->Length
!= sizeof(CSSM_X509_SIGNED_CRL
)) {
108 tpErrorLog("fetchField(SignedCrlCStruct) length error\n");
110 CssmError::throwMe(CSSMERR_TP_INTERNAL_ERROR
);
112 mX509Crl
= (CSSM_X509_SIGNED_CRL
*)mCrlFieldToFree
->Data
;
113 /* any other other commonly used fields? */
116 TPCrlInfo::~TPCrlInfo()
121 void TPCrlInfo::releaseResources()
123 if(mCrlFieldToFree
) {
124 freeField(&CSSMOID_X509V2CRLSignedCrlCStruct
, mCrlFieldToFree
);
125 mCrlFieldToFree
= NULL
;
128 Allocator::standard().free(mUri
.Data
);
132 TPClItemInfo::releaseResources();
135 void TPCrlInfo::uri(const CSSM_DATA
&uri
)
137 tpCopyCssmData(Allocator::standard(), &uri
, &mUri
);
141 * List of extensions we understand and can accept as critical.
143 static const CSSM_OID
*const TPGoodCrlExtens
[] =
146 /* Note NOT CSSMOID_DeltaCrlIndicator! That's fatal */
149 &CSSMOID_IssuingDistributionPoint
,
150 &CSSMOID_HoldInstructionCode
,
151 &CSSMOID_InvalidityDate
,
152 &CSSMOID_AuthorityKeyIdentifier
,
153 &CSSMOID_SubjectAltName
,
154 &CSSMOID_IssuerAltName
157 #define NUM_KNOWN_EXTENS (sizeof(TPGoodCrlExtens) / sizeof(CSSM_OID_PTR))
160 * Do our best to understand all the entries in a CSSM_X509_EXTENSIONS,
161 * which may be per-CRL or per-entry.
163 * For now, we just ensure that for every critical extension,
164 * we actually understand it and can deal it.
166 CSSM_RETURN
TPCrlInfo::parseExtensions(
167 TPVerifyContext
&vfyCtx
,
169 uint32 entryIndex
, // if isPerEntry
170 const CSSM_X509_EXTENSIONS
&extens
,
171 TPCertInfo
*forCert
, // optional
172 bool &isIndirectCrl
) // RETURNED
174 isIndirectCrl
= false;
175 for(uint32 dex
=0; dex
<extens
.numberOfExtensions
; dex
++) {
176 CSSM_X509_EXTENSION_PTR exten
= &extens
.extensions
[dex
];
177 if(exten
->critical
) {
178 /* critical: is it in our list of understood extensions? */
180 for(i
=0; i
<NUM_KNOWN_EXTENS
; i
++) {
181 if(tpCompareOids(&exten
->extnId
, TPGoodCrlExtens
[i
])) {
182 /* we're cool with this one */
186 if(i
== NUM_KNOWN_EXTENS
) {
187 tpCrlDebug("parseExtensions: Unknown Critical Extension\n");
188 return CSSMERR_APPLETP_UNKNOWN_CRL_EXTEN
;
192 /* Specific extension handling. */
193 if(tpCompareOids(&exten
->extnId
,
194 &CSSMOID_IssuingDistributionPoint
)) {
196 * If this assertion fails, we're out of sync with the CL
198 assert(exten
->format
== CSSM_X509_DATAFORMAT_PARSED
);
199 CE_IssuingDistributionPoint
*idp
=
200 (CE_IssuingDistributionPoint
*)
201 exten
->value
.parsedValue
;
204 * Snag indirectCrl flag for caller in any case
206 if(idp
->indirectCrlPresent
&& idp
->indirectCrl
) {
207 isIndirectCrl
= true;
209 if(forCert
!= NULL
) {
210 /* If no target cert, i.e., we're just verifying a CRL,
211 * skip the remaining IDP checks. */
213 /* verify onlyCACerts/onlyUserCerts */
215 if(forCert
->isLeaf() &&
216 !(vfyCtx
.actionFlags
& CSSM_TP_ACTION_LEAF_IS_CA
)) {
222 if((idp
->onlyUserCertsPresent
) && (idp
->onlyUserCerts
)) {
224 tpCrlDebug("parseExtensions: onlyUserCerts, "
226 return CSSMERR_APPLETP_IDP_FAIL
;
229 if((idp
->onlyCACertsPresent
) && (idp
->onlyCACerts
)) {
231 tpCrlDebug("parseExtensions: onlyCACerts, leaf\n");
232 return CSSMERR_APPLETP_IDP_FAIL
;
236 /* Verify DistributionPointName matches cRLDistributionPoints
239 if(idp
->distPointName
) {
240 CSSM_DATA_PTR certDistPoints
;
241 CSSM_RETURN crtn
= forCert
->fetchField(&CSSMOID_CrlDistributionPoints
, &certDistPoints
);
245 case CSSMERR_CL_NO_FIELD_VALUES
:
250 if (certDistPoints
->Length
!= sizeof(CSSM_X509_EXTENSION
)) {
251 forCert
->freeField(&CSSMOID_CrlDistributionPoints
, certDistPoints
);
252 return CSSMERR_TP_UNKNOWN_FORMAT
;
254 CSSM_X509_EXTENSION
*cssmExt
= (CSSM_X509_EXTENSION
*)certDistPoints
->Data
;
255 if (cssmExt
== NULL
) {
256 forCert
->freeField(&CSSMOID_CrlDistributionPoints
, certDistPoints
);
257 return CSSMERR_TP_UNKNOWN_FORMAT
;
259 CE_CRLDistPointsSyntax
*dps
= (CE_CRLDistPointsSyntax
*)cssmExt
->value
.parsedValue
;
261 forCert
->freeField(&CSSMOID_CrlDistributionPoints
, certDistPoints
);
262 return CSSMERR_TP_UNKNOWN_FORMAT
;
264 if (!dps
->numDistPoints
) {
265 /* no distribution points in the cert extension */
266 forCert
->freeField(&CSSMOID_CrlDistributionPoints
, certDistPoints
);
270 /* Loop over the cRLDistributionPoints in the cert. */
271 CSSM_BOOL sameType
= CSSM_FALSE
;
272 CSSM_BOOL found
= CSSM_FALSE
;
273 for (unsigned dex
=0; dex
<dps
->numDistPoints
; dex
++) {
274 CE_CRLDistributionPoint
*dp
= &dps
->distPoints
[dex
];
275 if (dp
->distPointName
== NULL
) {
278 if (idp
->distPointName
->nameType
!= dp
->distPointName
->nameType
) {
279 /* Not the same name type; move on. */
282 sameType
= CSSM_TRUE
;
283 switch (dp
->distPointName
->nameType
) {
284 case CE_CDNT_NameRelativeToCrlIssuer
: {
286 /* RDN code below is not tested, so we won't use it.
287 * Defaulting to prior behavior of accepting without testing.
290 tpErrorLog("parseExtensions: "
291 "CE_CDNT_NameRelativeToCrlIssuer not implemented\n");
294 /* relativeName is a RDN sequence */
295 CSSM_X509_RDN_PTR idpName
= idp
->distPointName
->dpn
.rdn
;
296 CSSM_X509_RDN_PTR certName
= dp
->distPointName
->dpn
.rdn
;
297 if (idpName
== NULL
|| certName
== NULL
|| idpName
->numberOfPairs
!= certName
->numberOfPairs
) {
298 /* They don't have the same number of attribute/value pairs; move on. */
302 for (nDex
=0; nDex
<idpName
->numberOfPairs
; nDex
++) {
303 CSSM_X509_TYPE_VALUE_PAIR_PTR iPair
= idpName
->AttributeTypeAndValue
;
304 CSSM_X509_TYPE_VALUE_PAIR_PTR cPair
= certName
->AttributeTypeAndValue
;
305 if (!tpCompareCssmData(&iPair
->type
, &cPair
->type
) ||
306 !tpCompareCssmData(&iPair
->value
, &cPair
->value
)) {
310 if (nDex
==idpName
->numberOfPairs
) {
311 /* All the pairs matched. */
315 case CE_CDNT_FullName
: {
316 /* fullName is a GeneralNames sequence */
317 CE_GeneralNames
*idpNames
= idp
->distPointName
->dpn
.fullName
;
318 CE_GeneralNames
*certNames
= dp
->distPointName
->dpn
.fullName
;
319 if (idpNames
== NULL
|| certNames
== NULL
|| idpNames
->numNames
!= certNames
->numNames
) {
320 /* They don't have the same number of names; move on. */
324 for (nDex
=0; nDex
<idpNames
->numNames
; nDex
++) {
325 CE_GeneralName
*idpName
= &idpNames
->generalName
[nDex
];
326 CE_GeneralName
*certName
= &certNames
->generalName
[nDex
];
327 if ((idpName
->nameType
!= certName
->nameType
) ||
328 (!tpCompareCssmData(&idpName
->name
, &certName
->name
))) {
332 if (nDex
==idpNames
->numNames
) {
333 /* All the names matched. */
339 forCert
->freeField(&CSSMOID_CrlDistributionPoints
, certDistPoints
);
340 return CSSMERR_TP_UNKNOWN_FORMAT
;
344 break; /* out of loop over crlDistribtionPoints in cert. */
347 forCert
->freeField(&CSSMOID_CrlDistributionPoints
, certDistPoints
);
348 if(sameType
&& !found
) {
349 return CSSMERR_APPLETP_IDP_FAIL
;
351 } /* distPointName check */
353 } /* have target cert */
360 * The heavyweight "perform full verification of this CRL" op.
361 * Must verify to an anchor cert in tpVerifyContext or via
362 * Trust Settings if so enabled.
363 * Intermediate certs can come from signerCerts or dBList.
365 CSSM_RETURN
TPCrlInfo::verifyWithContext(
366 TPVerifyContext
&tpVerifyContext
,
367 TPCertInfo
*forCert
, // optional
371 * Step 1: this CRL must be current. Caller might have re-evaluated
372 * expired/notValidYet since our construction via calculateCurrent().
375 return CSSMERR_APPLETP_CRL_EXPIRED
;
377 if(isNotValidYet()) {
378 return CSSMERR_APPLETP_CRL_NOT_VALID_YET
;
381 /* subsequent verify state is cached */
382 switch(mVerifyState
) {
390 tpErrorLog("verifyWithContext: bad verifyState\n");
391 return CSSMERR_TP_INTERNAL_ERROR
;
395 * Step 2: parse & understand all critical CRL extensions.
399 crtn
= parseExtensions(tpVerifyContext
,
402 mX509Crl
->tbsCertList
.extensions
,
406 mVerifyState
= CVS_Bad
;
407 if(!forCert
|| forCert
->addStatusCode(crtn
)) {
412 CSSM_X509_REVOKED_CERT_LIST_PTR revoked
=
413 mX509Crl
->tbsCertList
.revokedCertificates
;
414 if(revoked
!= NULL
) {
415 for(uint32 dex
=0; dex
<revoked
->numberOfRevokedCertEntries
; dex
++) {
416 bool dummyIsIndirect
; // can't be set here
417 crtn
= parseExtensions(tpVerifyContext
,
420 revoked
->revokedCertEntry
[dex
].extensions
,
424 if(!forCert
|| forCert
->addStatusCode(crtn
)) {
425 mVerifyState
= CVS_Bad
;
433 * Step 3: obtain a fully verified cert chain which verifies this CRL.
435 CSSM_BOOL verifiedToRoot
;
436 CSSM_BOOL verifiedToAnchor
;
437 CSSM_BOOL verifiedViaTrustSetting
;
439 TPCertGroup
outCertGroup(tpVerifyContext
.alloc
,
440 TGO_Caller
); // CRLs owned by inCertGroup
442 /* set up for disposal of TPCertInfos created by
443 * CertGroupConstructPriv */
444 TPCertGroup
certsToBeFreed(tpVerifyContext
.alloc
, TGO_Group
);
446 if(tpVerifyContext
.signerCerts
) {
447 /* start from scratch with this group */
448 tpVerifyContext
.signerCerts
->setAllUnused();
450 crtn
= outCertGroup
.buildCertGroup(
451 *this, // subject item
452 tpVerifyContext
.signerCerts
, // inCertGroup, optional
453 tpVerifyContext
.dbList
, // optional
454 tpVerifyContext
.clHand
,
455 tpVerifyContext
.cspHand
,
456 tpVerifyContext
.verifyTime
,
457 tpVerifyContext
.numAnchorCerts
,
458 tpVerifyContext
.anchorCerts
,
460 &tpVerifyContext
.gatheredCerts
,
461 CSSM_FALSE
, // subjectIsInGroup
462 tpVerifyContext
.actionFlags
,
463 tpVerifyContext
.policyOid
,
464 tpVerifyContext
.policyStr
,
465 tpVerifyContext
.policyStrLen
,
466 kSecTrustSettingsKeyUseSignRevocation
,
469 verifiedViaTrustSetting
);
470 /* subsequent errors to errOut: */
473 tpCrlDebug("TPCrlInfo::verifyWithContext buildCertGroup failure "
474 "index %u", index());
475 if(!forCert
|| forCert
->addStatusCode(crtn
)) {
479 if (verifiedToRoot
&& (tpVerifyContext
.actionFlags
& CSSM_TP_ACTION_IMPLICIT_ANCHORS
))
480 verifiedToAnchor
= CSSM_TRUE
;
481 if(!verifiedToAnchor
&& !verifiedViaTrustSetting
) {
484 /* verified to root which is not an anchor */
485 tpCrlDebug("TPCrlInfo::verifyWithContext root, no anchor, "
486 "index %u", index());
487 crtn
= CSSMERR_APPLETP_CRL_INVALID_ANCHOR_CERT
;
490 /* partial chain, no root, not verifiable by anchor */
491 tpCrlDebug("TPCrlInfo::verifyWithContext no root, no anchor, "
492 "index %u", index());
493 crtn
= CSSMERR_APPLETP_CRL_NOT_TRUSTED
;
495 if(!forCert
|| forCert
->addStatusCode(crtn
)) {
496 mVerifyState
= CVS_Bad
;
502 * Step 4: policy verification on the returned cert group
503 * We need to (temporarily) assert the "leaf cert is a CA" flag
506 outCertGroup
.certAtIndex(0)->isLeaf(true);
507 crtn
= tp_policyVerify(kCrlPolicy
,
508 tpVerifyContext
.alloc
,
509 tpVerifyContext
.clHand
,
510 tpVerifyContext
.cspHand
,
513 verifiedViaTrustSetting
,
514 tpVerifyContext
.actionFlags
| CSSM_TP_ACTION_LEAF_IS_CA
,
516 NULL
); // policyOpts, not currently used
518 tpCrlDebug(" ...verifyWithContext policy FAILURE CRL %u",
520 if(!forCert
|| forCert
->addStatusCode(CSSMERR_APPLETP_CRL_POLICY_FAIL
)) {
521 mVerifyState
= CVS_Bad
;
527 * Step 5: recursively perform CRL verification on the certs
528 * gathered to verify this CRL.
529 * Only performed if this CRL is an indirect CRL or the caller
530 * explicitly told us to do this (i.e., caller is verifying a
531 * CRL, not a cert chain).
533 if(isIndirectCrl
|| doCrlVerify
) {
534 tpCrlDebug("verifyWithContext recursing to "
535 "tpVerifyCertGroupWithCrls");
536 crtn
= tpVerifyCertGroupWithCrls(tpVerifyContext
,
539 tpCrlDebug(" ...verifyWithContext CRL reverify FAILURE CRL %u",
541 if(!forCert
|| forCert
->addStatusCode(crtn
)) {
542 mVerifyState
= CVS_Bad
;
548 tpCrlDebug(" ...verifyWithContext CRL %u SUCCESS", index());
549 mVerifyState
= CVS_Good
;
551 /* we own these, we free the DB records */
552 certsToBeFreed
.freeDbRecords();
557 * Wrapper for verifyWithContext for use when evaluating a CRL
558 * "now" instead of at the time in TPVerifyContext.verifyTime.
559 * In this case, on entry, TPVerifyContext.verifyTime is the
560 * time at which a cert is being evaluated.
562 CSSM_RETURN
TPCrlInfo::verifyWithContextNow(
563 TPVerifyContext
&tpVerifyContext
,
564 TPCertInfo
*forCert
, // optional
567 CSSM_TIMESTRING ctxTime
= tpVerifyContext
.verifyTime
;
568 CSSM_RETURN crtn
= verifyWithContext(tpVerifyContext
, forCert
, doCrlVerify
);
569 tpVerifyContext
.verifyTime
= ctxTime
;
574 * Do I have the same issuer as the specified subject cert? Returns
577 bool TPCrlInfo::hasSameIssuer(
578 const TPCertInfo
&subject
)
580 assert(subject
.issuerName() != NULL
);
581 if(tpCompareCssmData(issuerName(), subject
.issuerName())) {
590 * Determine if specified cert has been revoked as of the
591 * provided time; a NULL timestring indicates "now".
593 * Assumes current CRL is verified good and that issuer names of
594 * the cert and CRL match.
596 * This duplicates similar logic in the CL, but to avoid re-parsing
597 * the subject cert (which we have parsed and cached), we just do it
600 * Possible errors are
601 * CSSMERR_TP_CERT_REVOKED
602 * CSSMERR_TP_CERT_SUSPENDED
605 * Error status is added to subjectCert.
607 CSSM_RETURN
TPCrlInfo::isCertRevoked(
608 TPCertInfo
&subjectCert
,
609 CSSM_TIMESTRING verifyTime
)
611 assert(mVerifyState
== CVS_Good
);
612 CSSM_X509_TBS_CERTLIST_PTR tbs
= &mX509Crl
->tbsCertList
;
614 /* trivial case - empty CRL */
615 if((tbs
->revokedCertificates
== NULL
) ||
616 (tbs
->revokedCertificates
->numberOfRevokedCertEntries
== 0)) {
617 tpCrlDebug(" isCertRevoked: empty CRL at index %u", index());
621 /* is subject cert's serial number in this CRL? */
622 CSSM_DATA_PTR subjSerial
= NULL
;
624 crtn
= subjectCert
.fetchField(&CSSMOID_X509V1SerialNumber
, &subjSerial
);
626 /* should never happen */
627 tpErrorLog("TPCrlInfo:isCertRevoked: error fetching serial number\n");
628 if(subjectCert
.addStatusCode(crtn
)) {
632 /* allowed error - can't proceed; punt with success */
636 /* subsequent errors to errOut: */
638 uint32 numEntries
= tbs
->revokedCertificates
->numberOfRevokedCertEntries
;
639 CSSM_X509_REVOKED_CERT_ENTRY_PTR entries
=
640 tbs
->revokedCertificates
->revokedCertEntry
;
642 CFDateRef cfRevokedTime
= NULL
;
643 CFDateRef cfVerifyTime
= NULL
;
645 for(uint32 dex
=0; dex
<numEntries
; dex
++) {
646 CSSM_X509_REVOKED_CERT_ENTRY_PTR entry
= &entries
[dex
];
647 if(tpCompareCssmData(subjSerial
, &entry
->certificateSerialNumber
)) {
649 * It's in there. Compare revocation time in the CRL to
650 * our caller-specified verifyTime.
652 CSSM_X509_TIME_PTR xTime
= &entry
->revocationDate
;
654 rtn
= timeStringToCfDate((char *)xTime
->time
.Data
, (unsigned)xTime
->time
.Length
,
657 tpErrorLog("fetchNotBeforeAfter: malformed revocationDate\n");
660 if(verifyTime
!= NULL
) {
661 rtn
= timeStringToCfDate((char *)verifyTime
, (unsigned)strlen(verifyTime
),
665 /* verify right now */
666 cfVerifyTime
= CFDateCreate(NULL
, CFAbsoluteTimeGetCurrent());
668 if((rtn
== 0) && cfVerifyTime
!= NULL
) {
669 CFComparisonResult res
= CFDateCompare(cfVerifyTime
, cfRevokedTime
, NULL
);
670 if(res
== kCFCompareLessThan
) {
671 /* cfVerifyTime < cfRevokedTime; I guess this one's OK */
672 tpCrlDebug(" isCertRevoked: cert %u NOT YET REVOKED by CRL %u",
673 subjectCert
.index(), index());
680 * REQUIRED TBD: parse the entry's extensions, specifically to
681 * get a reason. This will entail a bunch of new TP/cert specific
683 * For now, just flag it revoked.
685 crtn
= CSSMERR_TP_CERT_REVOKED
;
686 subjectCert
.crlReason(1);
687 tpCrlDebug(" isCertRevoked: cert %u REVOKED by CRL %u",
688 subjectCert
.index(), index());
693 subjectCert
.freeField(&CSSMOID_X509V1SerialNumber
, subjSerial
);
694 if(crtn
&& !subjectCert
.addStatusCode(crtn
)) {
698 CFRelease(cfRevokedTime
);
701 CFRelease(cfVerifyTime
);
710 /* build empty group */
711 TPCrlGroup::TPCrlGroup(
713 TPGroupOwner whoOwns
) :
720 /* nothing for now */
724 * Construct from unordered, untrusted CSSM_CRLGROUP. Resulting
725 * TPCrlInfos are more or less in the same order as the incoming
726 * CRLs, though incoming CRLs are discarded if they don't parse.
727 * No verification of any sort is performed.
729 TPCrlGroup::TPCrlGroup(
730 const CSSM_CRLGROUP
*cssmCrlGroup
, // optional
731 CSSM_CL_HANDLE clHand
,
732 CSSM_CSP_HANDLE cspHand
,
734 const char *verifyTime
, // may be NULL
735 TPGroupOwner whoOwns
) :
742 /* verify input args */
743 if((cssmCrlGroup
== NULL
) || (cssmCrlGroup
->NumberOfCrls
== 0)) {
746 if(cspHand
== CSSM_INVALID_HANDLE
) {
747 CssmError::throwMe(CSSMERR_TP_INVALID_CSP_HANDLE
);
749 if(clHand
== CSSM_INVALID_HANDLE
) {
750 CssmError::throwMe(CSSMERR_TP_INVALID_CL_HANDLE
);
752 if(cssmCrlGroup
->CrlGroupType
!= CSSM_CRLGROUP_DATA
) {
753 CssmError::throwMe(CSSMERR_TP_INVALID_CERTGROUP
);
755 switch(cssmCrlGroup
->CrlType
) {
756 case CSSM_CRL_TYPE_X_509v1
:
757 case CSSM_CRL_TYPE_X_509v2
:
760 CssmError::throwMe(CSSMERR_TP_UNKNOWN_FORMAT
);
762 switch(cssmCrlGroup
->CrlEncoding
) {
763 case CSSM_CRL_ENCODING_BER
:
764 case CSSM_CRL_ENCODING_DER
:
767 CssmError::throwMe(CSSMERR_TP_UNKNOWN_FORMAT
);
771 * Add remaining input certs to mCrlInfo.
773 TPCrlInfo
*crlInfo
= NULL
;
774 for(unsigned crlDex
=0; crlDex
<cssmCrlGroup
->NumberOfCrls
; crlDex
++) {
776 crlInfo
= new TPCrlInfo(clHand
,
778 &cssmCrlGroup
->GroupCrlList
.CrlList
[crlDex
],
779 TIC_NoCopy
, // don't copy data
783 /* just ignore this CRL */
786 crlInfo
->index(crlDex
);
792 * Deletes all TPCrlInfo's if appropriate.
794 TPCrlGroup::~TPCrlGroup()
796 if(mWhoOwns
== TGO_Group
) {
798 for(i
=0; i
<mNumCrls
; i
++) {
802 mAlloc
.free(mCrlInfo
);
805 /* add/remove/access TPTCrlInfo's. */
807 * NOTE: I am aware that most folks would just use an array<> here, but
808 * gdb is so lame that it doesn't even let one examine the contents
809 * of an array<> (or just about anything else in the STL). I prefer
810 * debuggability over saving a few lines of trivial code.
812 void TPCrlGroup::appendCrl(
815 if(mNumCrls
== mSizeofCrlInfo
) {
816 if(mSizeofCrlInfo
== 0) {
817 /* appending to empty array */
823 mCrlInfo
= (TPCrlInfo
**)mAlloc
.realloc(mCrlInfo
,
824 mSizeofCrlInfo
* sizeof(TPCrlInfo
*));
826 mCrlInfo
[mNumCrls
++] = &crlInfo
;
829 TPCrlInfo
*TPCrlGroup::crlAtIndex(
832 if(index
> (mNumCrls
- 1)) {
833 CssmError::throwMe(CSSMERR_TP_INTERNAL_ERROR
);
835 return mCrlInfo
[index
];
838 TPCrlInfo
&TPCrlGroup::removeCrlAtIndex(
839 unsigned index
) // doesn't delete the cert, just
840 // removes it from our list
842 if(index
> (mNumCrls
- 1)) {
843 CssmError::throwMe(CSSMERR_TP_INTERNAL_ERROR
);
845 TPCrlInfo
&rtn
= *mCrlInfo
[index
];
847 /* removed requested element and compact remaining array */
849 for(i
=index
; i
<(mNumCrls
- 1); i
++) {
850 mCrlInfo
[i
] = mCrlInfo
[i
+1];
856 void TPCrlGroup::removeCrl(
859 for(unsigned dex
=0; dex
<mNumCrls
; dex
++) {
860 if(mCrlInfo
[dex
] == &crlInfo
) {
861 removeCrlAtIndex(dex
);
865 tpErrorLog("TPCrlGroup::removeCrl: CRL NOT FOUND\n");
869 TPCrlInfo
*TPCrlGroup::firstCrl()
872 /* the caller really should not do this... */
873 CssmError::throwMe(CSSMERR_TP_INTERNAL_ERROR
);
880 TPCrlInfo
*TPCrlGroup::lastCrl()
883 /* the caller really should not do this... */
884 CssmError::throwMe(CSSMERR_TP_INTERNAL_ERROR
);
887 return mCrlInfo
[mNumCrls
- 1];
892 * Find a CRL whose issuer matches specified subject cert.
893 * Returned CRL has not necessarily been verified.
895 TPCrlInfo
*TPCrlGroup::findCrlForCert(
898 for(unsigned dex
=0; dex
<mNumCrls
; dex
++) {
899 TPCrlInfo
*crl
= mCrlInfo
[dex
];
900 if(crl
->hasSameIssuer(subject
)) {