VirtualBox

source: vbox/trunk/src/libs/openssl-3.3.2/test/helpers/pkcs12.c@ 108358

最後變更 在這個檔案從108358是 108206,由 vboxsync 提交於 5 週 前

openssl-3.3.2: Exported all files to OSE and removed .scm-settings ​bugref:10757

  • 屬性 svn:eol-style 設為 native
  • 屬性 svn:keywords 設為 Author Date Id Revision
檔案大小: 19.2 KB
 
1/*
2 * Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10#include <stdio.h>
11#include <string.h>
12#include <stdlib.h>
13
14#include "internal/nelem.h"
15
16#include <openssl/pkcs12.h>
17#include <openssl/x509.h>
18#include <openssl/x509v3.h>
19#include <openssl/pem.h>
20
21#include "../testutil.h"
22#include "pkcs12.h" /* from the same directory */
23
24/* Set this to > 0 write test data to file */
25static int write_files = 0;
26
27static int legacy = 0;
28
29static OSSL_LIB_CTX *test_ctx = NULL;
30static const char *test_propq = NULL;
31
32/* -------------------------------------------------------------------------
33 * Local function declarations
34 */
35
36static int add_attributes(PKCS12_SAFEBAG *bag, const PKCS12_ATTR *attrs);
37
38static void generate_p12(PKCS12_BUILDER *pb, const PKCS12_ENC *mac);
39static int write_p12(PKCS12 *p12, const char *outfile);
40
41static PKCS12 *from_bio_p12(BIO *bio, const PKCS12_ENC *mac);
42static PKCS12 *read_p12(const char *infile, const PKCS12_ENC *mac);
43static int check_p12_mac(PKCS12 *p12, const PKCS12_ENC *mac);
44static int check_asn1_string(const ASN1_TYPE *av, const char *txt);
45static int check_attrs(const STACK_OF(X509_ATTRIBUTE) *bag_attrs, const PKCS12_ATTR *attrs);
46
47
48/* --------------------------------------------------------------------------
49 * Global settings
50 */
51
52void PKCS12_helper_set_write_files(int enable)
53{
54 write_files = enable;
55}
56
57void PKCS12_helper_set_legacy(int enable)
58{
59 legacy = enable;
60}
61
62void PKCS12_helper_set_libctx(OSSL_LIB_CTX *libctx)
63{
64 test_ctx = libctx;
65}
66
67void PKCS12_helper_set_propq(const char *propq)
68{
69 test_propq = propq;
70}
71
72
73/* --------------------------------------------------------------------------
74 * Test data load functions
75 */
76
77static X509 *load_cert_asn1(const unsigned char *bytes, int len)
78{
79 X509 *cert = NULL;
80
81 cert = d2i_X509(NULL, &bytes, len);
82 if (!TEST_ptr(cert))
83 goto err;
84err:
85 return cert;
86}
87
88static EVP_PKEY *load_pkey_asn1(const unsigned char *bytes, int len)
89{
90 EVP_PKEY *pkey = NULL;
91
92 pkey = d2i_AutoPrivateKey(NULL, &bytes, len);
93 if (!TEST_ptr(pkey))
94 goto err;
95err:
96 return pkey;
97}
98
99/* -------------------------------------------------------------------------
100 * PKCS12 builder
101 */
102
103PKCS12_BUILDER *new_pkcs12_builder(const char *filename)
104{
105 PKCS12_BUILDER *pb = OPENSSL_malloc(sizeof(PKCS12_BUILDER));
106 if (!TEST_ptr(pb))
107 return NULL;
108
109 pb->filename = filename;
110 pb->success = 1;
111 return pb;
112}
113
114int end_pkcs12_builder(PKCS12_BUILDER *pb)
115{
116 int result = pb->success;
117
118 OPENSSL_free(pb);
119 return result;
120}
121
122
123void start_pkcs12(PKCS12_BUILDER *pb)
124{
125 pb->safes = NULL;
126}
127
128
129void end_pkcs12(PKCS12_BUILDER *pb)
130{
131 if (!pb->success)
132 return;
133 generate_p12(pb, NULL);
134}
135
136
137void end_pkcs12_with_mac(PKCS12_BUILDER *pb, const PKCS12_ENC *mac)
138{
139 if (!pb->success)
140 return;
141 generate_p12(pb, mac);
142}
143
144
145/* Generate the PKCS12 encoding and write to memory bio */
146static void generate_p12(PKCS12_BUILDER *pb, const PKCS12_ENC *mac)
147{
148 PKCS12 *p12;
149 EVP_MD *md = NULL;
150
151 if (!pb->success)
152 return;
153
154 pb->p12bio = BIO_new(BIO_s_mem());
155 if (!TEST_ptr(pb->p12bio)) {
156 pb->success = 0;
157 return;
158 }
159 if (legacy)
160 p12 = PKCS12_add_safes(pb->safes, 0);
161 else
162 p12 = PKCS12_add_safes_ex(pb->safes, 0, test_ctx, test_propq);
163 if (!TEST_ptr(p12)) {
164 pb->success = 0;
165 goto err;
166 }
167 sk_PKCS7_pop_free(pb->safes, PKCS7_free);
168
169 if (mac != NULL) {
170 if (legacy)
171 md = (EVP_MD *)EVP_get_digestbynid(mac->nid);
172 else
173 md = EVP_MD_fetch(test_ctx, OBJ_nid2sn(mac->nid), test_propq);
174
175 if (!TEST_true(PKCS12_set_mac(p12, mac->pass, strlen(mac->pass),
176 NULL, 0, mac->iter, md))) {
177 pb->success = 0;
178 goto err;
179 }
180 }
181 i2d_PKCS12_bio(pb->p12bio, p12);
182
183 /* Can write to file here for debug */
184 if (write_files)
185 write_p12(p12, pb->filename);
186err:
187 if (!legacy && md != NULL)
188 EVP_MD_free(md);
189 PKCS12_free(p12);
190}
191
192
193static int write_p12(PKCS12 *p12, const char *outfile)
194{
195 int ret = 0;
196 BIO *out = BIO_new_file(outfile, "w");
197
198 if (out == NULL)
199 goto err;
200
201 if (!TEST_int_eq(i2d_PKCS12_bio(out, p12), 1))
202 goto err;
203 ret = 1;
204err:
205 BIO_free(out);
206 return ret;
207}
208
209static PKCS12 *from_bio_p12(BIO *bio, const PKCS12_ENC *mac)
210{
211 PKCS12 *p12 = NULL;
212
213 /* Supply a p12 with library context/propq to the d2i decoder*/
214 if (!legacy) {
215 p12 = PKCS12_init_ex(NID_pkcs7_data, test_ctx, test_propq);
216 if (!TEST_ptr(p12))
217 goto err;
218 }
219 p12 = d2i_PKCS12_bio(bio, &p12);
220 BIO_free(bio);
221 if (!TEST_ptr(p12))
222 goto err;
223 if (mac == NULL) {
224 if (!TEST_false(PKCS12_mac_present(p12)))
225 goto err;
226 } else {
227 if (!check_p12_mac(p12, mac))
228 goto err;
229 }
230 return p12;
231err:
232 PKCS12_free(p12);
233 return NULL;
234}
235
236
237/* For use with existing files */
238static PKCS12 *read_p12(const char *infile, const PKCS12_ENC *mac)
239{
240 PKCS12 *p12 = NULL;
241 BIO *in = BIO_new_file(infile, "r");
242
243 if (in == NULL)
244 goto err;
245 p12 = d2i_PKCS12_bio(in, NULL);
246 BIO_free(in);
247 if (!TEST_ptr(p12))
248 goto err;
249 if (mac == NULL) {
250 if (!TEST_false(PKCS12_mac_present(p12)))
251 goto err;
252 } else {
253 if (!check_p12_mac(p12, mac))
254 goto err;
255 }
256 return p12;
257err:
258 PKCS12_free(p12);
259 return NULL;
260}
261
262static int check_p12_mac(PKCS12 *p12, const PKCS12_ENC *mac)
263{
264 return TEST_true(PKCS12_mac_present(p12))
265 && TEST_true(PKCS12_verify_mac(p12, mac->pass, strlen(mac->pass)));
266}
267
268
269/* -------------------------------------------------------------------------
270 * PKCS7 content info builder
271 */
272
273void start_contentinfo(PKCS12_BUILDER *pb)
274{
275 pb->bags = NULL;
276}
277
278
279void end_contentinfo(PKCS12_BUILDER *pb)
280{
281 if (pb->success && pb->bags != NULL) {
282 if (!TEST_true(PKCS12_add_safe(&pb->safes, pb->bags, -1, 0, NULL)))
283 pb->success = 0;
284 }
285 sk_PKCS12_SAFEBAG_pop_free(pb->bags, PKCS12_SAFEBAG_free);
286 pb->bags = NULL;
287}
288
289
290void end_contentinfo_encrypted(PKCS12_BUILDER *pb, const PKCS12_ENC *enc)
291{
292 if (pb->success && pb->bags != NULL) {
293 if (legacy) {
294 if (!TEST_true(PKCS12_add_safe(&pb->safes, pb->bags, enc->nid,
295 enc->iter, enc->pass)))
296 pb->success = 0;
297 } else {
298 if (!TEST_true(PKCS12_add_safe_ex(&pb->safes, pb->bags, enc->nid,
299 enc->iter, enc->pass, test_ctx,
300 test_propq)))
301 pb->success = 0;
302 }
303 }
304 sk_PKCS12_SAFEBAG_pop_free(pb->bags, PKCS12_SAFEBAG_free);
305 pb->bags = NULL;
306}
307
308
309static STACK_OF(PKCS12_SAFEBAG) *decode_contentinfo(STACK_OF(PKCS7) *safes, int idx, const PKCS12_ENC *enc)
310{
311 STACK_OF(PKCS12_SAFEBAG) *bags = NULL;
312 int bagnid;
313 PKCS7 *p7 = sk_PKCS7_value(safes, idx);
314
315 if (!TEST_ptr(p7))
316 goto err;
317
318 bagnid = OBJ_obj2nid(p7->type);
319 if (enc) {
320 if (!TEST_int_eq(bagnid, NID_pkcs7_encrypted))
321 goto err;
322 bags = PKCS12_unpack_p7encdata(p7, enc->pass, strlen(enc->pass));
323 } else {
324 if (!TEST_int_eq(bagnid, NID_pkcs7_data))
325 goto err;
326 bags = PKCS12_unpack_p7data(p7);
327 }
328 if (!TEST_ptr(bags))
329 goto err;
330
331 return bags;
332err:
333 return NULL;
334}
335
336
337/* -------------------------------------------------------------------------
338 * PKCS12 safeBag/attribute builder
339 */
340
341static int add_attributes(PKCS12_SAFEBAG *bag, const PKCS12_ATTR *attr)
342{
343 int ret = 0;
344 int attr_nid;
345 const PKCS12_ATTR *p_attr = attr;
346 STACK_OF(X509_ATTRIBUTE)* attrs = NULL;
347 X509_ATTRIBUTE *x509_attr = NULL;
348
349 if (attr == NULL)
350 return 1;
351
352 while (p_attr->oid != NULL) {
353 TEST_info("Adding attribute %s = %s", p_attr->oid, p_attr->value);
354 attr_nid = OBJ_txt2nid(p_attr->oid);
355
356 if (attr_nid == NID_friendlyName) {
357 if (!TEST_true(PKCS12_add_friendlyname(bag, p_attr->value, -1)))
358 goto err;
359 } else if (attr_nid == NID_localKeyID) {
360 if (!TEST_true(PKCS12_add_localkeyid(bag, (unsigned char *)p_attr->value,
361 strlen(p_attr->value))))
362 goto err;
363 } else if (attr_nid == NID_oracle_jdk_trustedkeyusage) {
364 attrs = (STACK_OF(X509_ATTRIBUTE)*)PKCS12_SAFEBAG_get0_attrs(bag);
365 x509_attr = X509_ATTRIBUTE_create(attr_nid, V_ASN1_OBJECT, OBJ_txt2obj(p_attr->value, 0));
366 X509at_add1_attr(&attrs, x509_attr);
367 PKCS12_SAFEBAG_set0_attrs(bag, attrs);
368 X509_ATTRIBUTE_free(x509_attr);
369 } else {
370 /* Custom attribute values limited to ASCII in these tests */
371 if (!TEST_true(PKCS12_add1_attr_by_txt(bag, p_attr->oid, MBSTRING_ASC,
372 (unsigned char *)p_attr->value,
373 strlen(p_attr->value))))
374 goto err;
375 }
376 p_attr++;
377 }
378 ret = 1;
379err:
380 return ret;
381}
382
383void add_certbag(PKCS12_BUILDER *pb, const unsigned char *bytes, int len,
384 const PKCS12_ATTR *attrs)
385{
386 PKCS12_SAFEBAG *bag = NULL;
387 X509 *cert = NULL;
388 char *name;
389
390 if (!pb->success)
391 return;
392
393 cert = load_cert_asn1(bytes, len);
394 if (!TEST_ptr(cert)) {
395 pb->success = 0;
396 return;
397 }
398
399 name = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0);
400 TEST_info("Adding certificate <%s>", name);
401 OPENSSL_free(name);
402
403 bag = PKCS12_add_cert(&pb->bags, cert);
404 if (!TEST_ptr(bag)) {
405 pb->success = 0;
406 goto err;
407 }
408
409 if (!TEST_true(add_attributes(bag, attrs))) {
410 pb->success = 0;
411 goto err;
412 }
413err:
414 X509_free(cert);
415}
416
417void add_keybag(PKCS12_BUILDER *pb, const unsigned char *bytes, int len,
418 const PKCS12_ATTR *attrs, const PKCS12_ENC *enc)
419{
420 PKCS12_SAFEBAG *bag = NULL;
421 EVP_PKEY *pkey = NULL;
422
423 if (!pb->success)
424 return;
425
426 TEST_info("Adding key");
427
428 pkey = load_pkey_asn1(bytes, len);
429 if (!TEST_ptr(pkey)) {
430 pb->success = 0;
431 return;
432 }
433
434 if (legacy)
435 bag = PKCS12_add_key(&pb->bags, pkey, 0 /*keytype*/, enc->iter, enc->nid, enc->pass);
436 else
437 bag = PKCS12_add_key_ex(&pb->bags, pkey, 0 /*keytype*/, enc->iter, enc->nid, enc->pass,
438 test_ctx, test_propq);
439 if (!TEST_ptr(bag)) {
440 pb->success = 0;
441 goto err;
442 }
443 if (!add_attributes(bag, attrs))
444 pb->success = 0;
445err:
446 EVP_PKEY_free(pkey);
447}
448
449void add_secretbag(PKCS12_BUILDER *pb, int secret_nid, const char *secret,
450 const PKCS12_ATTR *attrs)
451{
452 PKCS12_SAFEBAG *bag = NULL;
453
454 if (!pb->success)
455 return;
456
457 TEST_info("Adding secret <%s>", secret);
458
459 bag = PKCS12_add_secret(&pb->bags, secret_nid, (const unsigned char *)secret, strlen(secret));
460 if (!TEST_ptr(bag)) {
461 pb->success = 0;
462 return;
463 }
464 if (!add_attributes(bag, attrs))
465 pb->success = 0;
466}
467
468
469/* -------------------------------------------------------------------------
470 * PKCS12 structure checking
471 */
472
473static int check_asn1_string(const ASN1_TYPE *av, const char *txt)
474{
475 int ret = 0;
476 char *value = NULL;
477
478 if (!TEST_ptr(av))
479 goto err;
480
481 switch (av->type) {
482 case V_ASN1_BMPSTRING:
483 value = OPENSSL_uni2asc(av->value.bmpstring->data,
484 av->value.bmpstring->length);
485 if (!TEST_str_eq(txt, (char *)value))
486 goto err;
487 break;
488
489 case V_ASN1_UTF8STRING:
490 if (!TEST_mem_eq(txt, strlen(txt), (char *)av->value.utf8string->data,
491 av->value.utf8string->length))
492 goto err;
493 break;
494
495 case V_ASN1_OCTET_STRING:
496 if (!TEST_mem_eq(txt, strlen(txt),
497 (char *)av->value.octet_string->data,
498 av->value.octet_string->length))
499 goto err;
500 break;
501
502 default:
503 /* Tests do not support other attribute types currently */
504 goto err;
505 }
506 ret = 1;
507err:
508 OPENSSL_free(value);
509 return ret;
510}
511
512static int check_attrs(const STACK_OF(X509_ATTRIBUTE) *bag_attrs, const PKCS12_ATTR *attrs)
513{
514 int ret = 0;
515 X509_ATTRIBUTE *attr;
516 ASN1_TYPE *av;
517 int i, j;
518 char attr_txt[100];
519
520 for (i = 0; i < sk_X509_ATTRIBUTE_num(bag_attrs); i++) {
521 const PKCS12_ATTR *p_attr = attrs;
522 ASN1_OBJECT *attr_obj;
523
524 attr = sk_X509_ATTRIBUTE_value(bag_attrs, i);
525 attr_obj = X509_ATTRIBUTE_get0_object(attr);
526 OBJ_obj2txt(attr_txt, 100, attr_obj, 0);
527
528 while (p_attr->oid != NULL) {
529 /* Find a matching attribute type */
530 if (strcmp(p_attr->oid, attr_txt) == 0) {
531 if (!TEST_int_eq(X509_ATTRIBUTE_count(attr), 1))
532 goto err;
533
534 for (j = 0; j < X509_ATTRIBUTE_count(attr); j++)
535 {
536 av = X509_ATTRIBUTE_get0_type(attr, j);
537 if (!TEST_true(check_asn1_string(av, p_attr->value)))
538 goto err;
539 }
540 break;
541 }
542 p_attr++;
543 }
544 }
545 ret = 1;
546err:
547 return ret;
548}
549
550void check_certbag(PKCS12_BUILDER *pb, const unsigned char *bytes, int len,
551 const PKCS12_ATTR *attrs)
552{
553 X509 *x509 = NULL;
554 X509 *ref_x509 = NULL;
555 const PKCS12_SAFEBAG *bag;
556
557 if (!pb->success)
558 return;
559
560 bag = sk_PKCS12_SAFEBAG_value(pb->bags, pb->bag_idx++);
561 if (!TEST_ptr(bag)) {
562 pb->success = 0;
563 return;
564 }
565 if (!check_attrs(PKCS12_SAFEBAG_get0_attrs(bag), attrs)
566 || !TEST_int_eq(PKCS12_SAFEBAG_get_nid(bag), NID_certBag)
567 || !TEST_int_eq(PKCS12_SAFEBAG_get_bag_nid(bag), NID_x509Certificate)) {
568 pb->success = 0;
569 return;
570 }
571 x509 = PKCS12_SAFEBAG_get1_cert(bag);
572 if (!TEST_ptr(x509)) {
573 pb->success = 0;
574 goto err;
575 }
576 ref_x509 = load_cert_asn1(bytes, len);
577 if (!TEST_false(X509_cmp(x509, ref_x509)))
578 pb->success = 0;
579err:
580 X509_free(x509);
581 X509_free(ref_x509);
582}
583
584void check_keybag(PKCS12_BUILDER *pb, const unsigned char *bytes, int len,
585 const PKCS12_ATTR *attrs, const PKCS12_ENC *enc)
586{
587 EVP_PKEY *pkey = NULL;
588 EVP_PKEY *ref_pkey = NULL;
589 PKCS8_PRIV_KEY_INFO *p8;
590 const PKCS8_PRIV_KEY_INFO *p8c;
591 const PKCS12_SAFEBAG *bag;
592
593 if (!pb->success)
594 return;
595
596 bag = sk_PKCS12_SAFEBAG_value(pb->bags, pb->bag_idx++);
597 if (!TEST_ptr(bag)) {
598 pb->success = 0;
599 return;
600 }
601
602 if (!check_attrs(PKCS12_SAFEBAG_get0_attrs(bag), attrs)) {
603 pb->success = 0;
604 return;
605 }
606
607 switch (PKCS12_SAFEBAG_get_nid(bag)) {
608 case NID_keyBag:
609 p8c = PKCS12_SAFEBAG_get0_p8inf(bag);
610 if (!TEST_ptr(pkey = EVP_PKCS82PKEY(p8c))) {
611 pb->success = 0;
612 goto err;
613 }
614 break;
615
616 case NID_pkcs8ShroudedKeyBag:
617 if (legacy)
618 p8 = PKCS12_decrypt_skey(bag, enc->pass, strlen(enc->pass));
619 else
620 p8 = PKCS12_decrypt_skey_ex(bag, enc->pass, strlen(enc->pass), test_ctx, test_propq);
621 if (!TEST_ptr(p8)) {
622 pb->success = 0;
623 goto err;
624 }
625 if (!TEST_ptr(pkey = EVP_PKCS82PKEY(p8))) {
626 PKCS8_PRIV_KEY_INFO_free(p8);
627 pb->success = 0;
628 goto err;
629 }
630 PKCS8_PRIV_KEY_INFO_free(p8);
631 break;
632
633 default:
634 pb->success = 0;
635 goto err;
636 }
637
638 /* PKEY compare returns 1 for match */
639 ref_pkey = load_pkey_asn1(bytes, len);
640 if (!TEST_true(EVP_PKEY_eq(pkey, ref_pkey)))
641 pb->success = 0;
642err:
643 EVP_PKEY_free(pkey);
644 EVP_PKEY_free(ref_pkey);
645}
646
647void check_secretbag(PKCS12_BUILDER *pb, int secret_nid, const char *secret, const PKCS12_ATTR *attrs)
648{
649 const PKCS12_SAFEBAG *bag;
650
651 if (!pb->success)
652 return;
653
654 bag = sk_PKCS12_SAFEBAG_value(pb->bags, pb->bag_idx++);
655 if (!TEST_ptr(bag)) {
656 pb->success = 0;
657 return;
658 }
659
660 if (!check_attrs(PKCS12_SAFEBAG_get0_attrs(bag), attrs)
661 || !TEST_int_eq(PKCS12_SAFEBAG_get_nid(bag), NID_secretBag)
662 || !TEST_int_eq(PKCS12_SAFEBAG_get_bag_nid(bag), secret_nid)
663 || !TEST_true(check_asn1_string(PKCS12_SAFEBAG_get0_bag_obj(bag), secret)))
664 pb->success = 0;
665}
666
667
668void start_check_pkcs12(PKCS12_BUILDER *pb)
669{
670 PKCS12 *p12;
671
672 if (!pb->success)
673 return;
674
675 p12 = from_bio_p12(pb->p12bio, NULL);
676 if (!TEST_ptr(p12)) {
677 pb->success = 0;
678 return;
679 }
680 pb->safes = PKCS12_unpack_authsafes(p12);
681 if (!TEST_ptr(pb->safes))
682 pb->success = 0;
683
684 pb->safe_idx = 0;
685 PKCS12_free(p12);
686}
687
688void start_check_pkcs12_with_mac(PKCS12_BUILDER *pb, const PKCS12_ENC *mac)
689{
690 PKCS12 *p12;
691
692 if (!pb->success)
693 return;
694
695 p12 = from_bio_p12(pb->p12bio, mac);
696 if (!TEST_ptr(p12)) {
697 pb->success = 0;
698 return;
699 }
700 pb->safes = PKCS12_unpack_authsafes(p12);
701 if (!TEST_ptr(pb->safes))
702 pb->success = 0;
703
704 pb->safe_idx = 0;
705 PKCS12_free(p12);
706}
707
708void start_check_pkcs12_file(PKCS12_BUILDER *pb)
709{
710 PKCS12 *p12;
711
712 if (!pb->success)
713 return;
714
715 p12 = read_p12(pb->filename, NULL);
716 if (!TEST_ptr(p12)) {
717 pb->success = 0;
718 return;
719 }
720 pb->safes = PKCS12_unpack_authsafes(p12);
721 if (!TEST_ptr(pb->safes))
722 pb->success = 0;
723
724 pb->safe_idx = 0;
725 PKCS12_free(p12);
726}
727
728void start_check_pkcs12_file_with_mac(PKCS12_BUILDER *pb, const PKCS12_ENC *mac)
729{
730 PKCS12 *p12;
731
732 if (!pb->success)
733 return;
734
735 p12 = read_p12(pb->filename, mac);
736 if (!TEST_ptr(p12)) {
737 pb->success = 0;
738 return;
739 }
740 pb->safes = PKCS12_unpack_authsafes(p12);
741 if (!TEST_ptr(pb->safes))
742 pb->success = 0;
743
744 pb->safe_idx = 0;
745 PKCS12_free(p12);
746}
747
748void end_check_pkcs12(PKCS12_BUILDER *pb)
749{
750 if (!pb->success)
751 return;
752
753 sk_PKCS7_pop_free(pb->safes, PKCS7_free);
754}
755
756
757void start_check_contentinfo(PKCS12_BUILDER *pb)
758{
759 if (!pb->success)
760 return;
761
762 pb->bag_idx = 0;
763 pb->bags = decode_contentinfo(pb->safes, pb->safe_idx++, NULL);
764 if (!TEST_ptr(pb->bags)) {
765 pb->success = 0;
766 return;
767 }
768 TEST_info("Decoding %d bags", sk_PKCS12_SAFEBAG_num(pb->bags));
769}
770
771void start_check_contentinfo_encrypted(PKCS12_BUILDER *pb, const PKCS12_ENC *enc)
772{
773 if (!pb->success)
774 return;
775
776 pb->bag_idx = 0;
777 pb->bags = decode_contentinfo(pb->safes, pb->safe_idx++, enc);
778 if (!TEST_ptr(pb->bags)) {
779 pb->success = 0;
780 return;
781 }
782 TEST_info("Decoding %d bags", sk_PKCS12_SAFEBAG_num(pb->bags));
783}
784
785
786void end_check_contentinfo(PKCS12_BUILDER *pb)
787{
788 if (!pb->success)
789 return;
790
791 if (!TEST_int_eq(sk_PKCS12_SAFEBAG_num(pb->bags), pb->bag_idx))
792 pb->success = 0;
793 sk_PKCS12_SAFEBAG_pop_free(pb->bags, PKCS12_SAFEBAG_free);
794 pb->bags = NULL;
795}
796
797
注意: 瀏覽 TracBrowser 來幫助您使用儲存庫瀏覽器

© 2025 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette