Skip to content

Commit 5b5faf0

Browse files
authored
Merge pull request #8844 from davidhorstmann-arm/restore-x509-functions-to-public
Restore some X509 functions to public headers
2 parents ca21b24 + ef950cc commit 5b5faf0

File tree

2 files changed

+142
-127
lines changed

2 files changed

+142
-127
lines changed

include/mbedtls/x509.h

+142
Original file line numberDiff line numberDiff line change
@@ -322,8 +322,150 @@ mbedtls_x509_san_list;
322322
*/
323323
int mbedtls_x509_dn_gets(char *buf, size_t size, const mbedtls_x509_name *dn);
324324

325+
/**
326+
* \brief Convert the certificate DN string \p name into
327+
* a linked list of mbedtls_x509_name (equivalent to
328+
* mbedtls_asn1_named_data).
329+
*
330+
* \note This function allocates a linked list, and places the head
331+
* pointer in \p head. This list must later be freed by a
332+
* call to mbedtls_asn1_free_named_data_list().
333+
*
334+
* \param[out] head Address in which to store the pointer to the head of the
335+
* allocated list of mbedtls_x509_name
336+
* \param[in] name The string representation of a DN to convert
337+
*
338+
* \return 0 on success, or a negative error code.
339+
*/
325340
int mbedtls_x509_string_to_names(mbedtls_asn1_named_data **head, const char *name);
326341

342+
/**
343+
* \brief Return the next relative DN in an X509 name.
344+
*
345+
* \note Intended use is to compare function result to dn->next
346+
* in order to detect boundaries of multi-valued RDNs.
347+
*
348+
* \param dn Current node in the X509 name
349+
*
350+
* \return Pointer to the first attribute-value pair of the
351+
* next RDN in sequence, or NULL if end is reached.
352+
*/
353+
static inline mbedtls_x509_name *mbedtls_x509_dn_get_next(
354+
mbedtls_x509_name *dn)
355+
{
356+
while (dn->MBEDTLS_PRIVATE(next_merged) && dn->next != NULL) {
357+
dn = dn->next;
358+
}
359+
return dn->next;
360+
}
361+
362+
/**
363+
* \brief Store the certificate serial in printable form into buf;
364+
* no more than size characters will be written.
365+
*
366+
* \param buf Buffer to write to
367+
* \param size Maximum size of buffer
368+
* \param serial The X509 serial to represent
369+
*
370+
* \return The length of the string written (not including the
371+
* terminated nul byte), or a negative error code.
372+
*/
373+
int mbedtls_x509_serial_gets(char *buf, size_t size, const mbedtls_x509_buf *serial);
374+
375+
/**
376+
* \brief Compare pair of mbedtls_x509_time.
377+
*
378+
* \param t1 mbedtls_x509_time to compare
379+
* \param t2 mbedtls_x509_time to compare
380+
*
381+
* \return < 0 if t1 is before t2
382+
* 0 if t1 equals t2
383+
* > 0 if t1 is after t2
384+
*/
385+
int mbedtls_x509_time_cmp(const mbedtls_x509_time *t1, const mbedtls_x509_time *t2);
386+
387+
#if defined(MBEDTLS_HAVE_TIME_DATE)
388+
/**
389+
* \brief Fill mbedtls_x509_time with provided mbedtls_time_t.
390+
*
391+
* \param tt mbedtls_time_t to convert
392+
* \param now mbedtls_x509_time to fill with converted mbedtls_time_t
393+
*
394+
* \return \c 0 on success
395+
* \return A non-zero return value on failure.
396+
*/
397+
int mbedtls_x509_time_gmtime(mbedtls_time_t tt, mbedtls_x509_time *now);
398+
#endif /* MBEDTLS_HAVE_TIME_DATE */
399+
400+
/**
401+
* \brief Check a given mbedtls_x509_time against the system time
402+
* and tell if it's in the past.
403+
*
404+
* \note Intended usage is "if( is_past( valid_to ) ) ERROR".
405+
* Hence the return value of 1 if on internal errors.
406+
*
407+
* \param to mbedtls_x509_time to check
408+
*
409+
* \return 1 if the given time is in the past or an error occurred,
410+
* 0 otherwise.
411+
*/
412+
int mbedtls_x509_time_is_past(const mbedtls_x509_time *to);
413+
414+
/**
415+
* \brief Check a given mbedtls_x509_time against the system time
416+
* and tell if it's in the future.
417+
*
418+
* \note Intended usage is "if( is_future( valid_from ) ) ERROR".
419+
* Hence the return value of 1 if on internal errors.
420+
*
421+
* \param from mbedtls_x509_time to check
422+
*
423+
* \return 1 if the given time is in the future or an error occurred,
424+
* 0 otherwise.
425+
*/
426+
int mbedtls_x509_time_is_future(const mbedtls_x509_time *from);
427+
428+
/**
429+
* \brief This function parses an item in the SubjectAlternativeNames
430+
* extension. Please note that this function might allocate
431+
* additional memory for a subject alternative name, thus
432+
* mbedtls_x509_free_subject_alt_name has to be called
433+
* to dispose of this additional memory afterwards.
434+
*
435+
* \param san_buf The buffer holding the raw data item of the subject
436+
* alternative name.
437+
* \param san The target structure to populate with the parsed presentation
438+
* of the subject alternative name encoded in \p san_buf.
439+
*
440+
* \note Supported GeneralName types, as defined in RFC 5280:
441+
* "rfc822Name", "dnsName", "directoryName",
442+
* "uniformResourceIdentifier" and "hardware_module_name"
443+
* of type "otherName", as defined in RFC 4108.
444+
*
445+
* \note This function should be called on a single raw data of
446+
* subject alternative name. For example, after successful
447+
* certificate parsing, one must iterate on every item in the
448+
* \c crt->subject_alt_names sequence, and pass it to
449+
* this function.
450+
*
451+
* \warning The target structure contains pointers to the raw data of the
452+
* parsed certificate, and its lifetime is restricted by the
453+
* lifetime of the certificate.
454+
*
455+
* \return \c 0 on success
456+
* \return #MBEDTLS_ERR_X509_FEATURE_UNAVAILABLE for an unsupported
457+
* SAN type.
458+
* \return Another negative value for any other failure.
459+
*/
460+
int mbedtls_x509_parse_subject_alt_name(const mbedtls_x509_buf *san_buf,
461+
mbedtls_x509_subject_alternative_name *san);
462+
/**
463+
* \brief Unallocate all data related to subject alternative name
464+
*
465+
* \param san SAN structure - extra memory owned by this structure will be freed
466+
*/
467+
void mbedtls_x509_free_subject_alt_name(mbedtls_x509_subject_alternative_name *san);
468+
327469
/**
328470
* \brief This function parses a CN string as an IP address.
329471
*

library/x509_internal.h

-127
Original file line numberDiff line numberDiff line change
@@ -21,133 +21,6 @@
2121
#include "mbedtls/rsa.h"
2222
#endif
2323

24-
/**
25-
* \brief Return the next relative DN in an X509 name.
26-
*
27-
* \note Intended use is to compare function result to dn->next
28-
* in order to detect boundaries of multi-valued RDNs.
29-
*
30-
* \param dn Current node in the X509 name
31-
*
32-
* \return Pointer to the first attribute-value pair of the
33-
* next RDN in sequence, or NULL if end is reached.
34-
*/
35-
static inline mbedtls_x509_name *mbedtls_x509_dn_get_next(
36-
mbedtls_x509_name *dn)
37-
{
38-
while (dn->MBEDTLS_PRIVATE(next_merged) && dn->next != NULL) {
39-
dn = dn->next;
40-
}
41-
return dn->next;
42-
}
43-
44-
/**
45-
* \brief Store the certificate serial in printable form into buf;
46-
* no more than size characters will be written.
47-
*
48-
* \param buf Buffer to write to
49-
* \param size Maximum size of buffer
50-
* \param serial The X509 serial to represent
51-
*
52-
* \return The length of the string written (not including the
53-
* terminated nul byte), or a negative error code.
54-
*/
55-
int mbedtls_x509_serial_gets(char *buf, size_t size, const mbedtls_x509_buf *serial);
56-
57-
/**
58-
* \brief Compare pair of mbedtls_x509_time.
59-
*
60-
* \param t1 mbedtls_x509_time to compare
61-
* \param t2 mbedtls_x509_time to compare
62-
*
63-
* \return < 0 if t1 is before t2
64-
* 0 if t1 equals t2
65-
* > 0 if t1 is after t2
66-
*/
67-
int mbedtls_x509_time_cmp(const mbedtls_x509_time *t1, const mbedtls_x509_time *t2);
68-
69-
#if defined(MBEDTLS_HAVE_TIME_DATE)
70-
/**
71-
* \brief Fill mbedtls_x509_time with provided mbedtls_time_t.
72-
*
73-
* \param tt mbedtls_time_t to convert
74-
* \param now mbedtls_x509_time to fill with converted mbedtls_time_t
75-
*
76-
* \return \c 0 on success
77-
* \return A non-zero return value on failure.
78-
*/
79-
int mbedtls_x509_time_gmtime(mbedtls_time_t tt, mbedtls_x509_time *now);
80-
#endif /* MBEDTLS_HAVE_TIME_DATE */
81-
82-
/**
83-
* \brief Check a given mbedtls_x509_time against the system time
84-
* and tell if it's in the past.
85-
*
86-
* \note Intended usage is "if( is_past( valid_to ) ) ERROR".
87-
* Hence the return value of 1 if on internal errors.
88-
*
89-
* \param to mbedtls_x509_time to check
90-
*
91-
* \return 1 if the given time is in the past or an error occurred,
92-
* 0 otherwise.
93-
*/
94-
int mbedtls_x509_time_is_past(const mbedtls_x509_time *to);
95-
96-
/**
97-
* \brief Check a given mbedtls_x509_time against the system time
98-
* and tell if it's in the future.
99-
*
100-
* \note Intended usage is "if( is_future( valid_from ) ) ERROR".
101-
* Hence the return value of 1 if on internal errors.
102-
*
103-
* \param from mbedtls_x509_time to check
104-
*
105-
* \return 1 if the given time is in the future or an error occurred,
106-
* 0 otherwise.
107-
*/
108-
int mbedtls_x509_time_is_future(const mbedtls_x509_time *from);
109-
110-
/**
111-
* \brief This function parses an item in the SubjectAlternativeNames
112-
* extension. Please note that this function might allocate
113-
* additional memory for a subject alternative name, thus
114-
* mbedtls_x509_free_subject_alt_name has to be called
115-
* to dispose of this additional memory afterwards.
116-
*
117-
* \param san_buf The buffer holding the raw data item of the subject
118-
* alternative name.
119-
* \param san The target structure to populate with the parsed presentation
120-
* of the subject alternative name encoded in \p san_buf.
121-
*
122-
* \note Supported GeneralName types, as defined in RFC 5280:
123-
* "rfc822Name", "dnsName", "directoryName",
124-
* "uniformResourceIdentifier" and "hardware_module_name"
125-
* of type "otherName", as defined in RFC 4108.
126-
*
127-
* \note This function should be called on a single raw data of
128-
* subject alternative name. For example, after successful
129-
* certificate parsing, one must iterate on every item in the
130-
* \c crt->subject_alt_names sequence, and pass it to
131-
* this function.
132-
*
133-
* \warning The target structure contains pointers to the raw data of the
134-
* parsed certificate, and its lifetime is restricted by the
135-
* lifetime of the certificate.
136-
*
137-
* \return \c 0 on success
138-
* \return #MBEDTLS_ERR_X509_FEATURE_UNAVAILABLE for an unsupported
139-
* SAN type.
140-
* \return Another negative value for any other failure.
141-
*/
142-
int mbedtls_x509_parse_subject_alt_name(const mbedtls_x509_buf *san_buf,
143-
mbedtls_x509_subject_alternative_name *san);
144-
/**
145-
* \brief Unallocate all data related to subject alternative name
146-
*
147-
* \param san SAN structure - extra memory owned by this structure will be freed
148-
*/
149-
void mbedtls_x509_free_subject_alt_name(mbedtls_x509_subject_alternative_name *san);
150-
15124
int mbedtls_x509_get_name(unsigned char **p, const unsigned char *end,
15225
mbedtls_x509_name *cur);
15326
int mbedtls_x509_get_alg_null(unsigned char **p, const unsigned char *end,

0 commit comments

Comments
 (0)