Author: kaushalye
Date: Wed Mar 28 02:43:46 2007
New Revision: 523250
URL: http://svn.apache.org/viewvc?view=rev&rev=523250
Log:
Formatting code in openssl wrappers in OMXMLSecurity
Modified:
webservices/rampart/trunk/c/src/omxmlsec/openssl/cipher_ctx.c
webservices/rampart/trunk/c/src/omxmlsec/openssl/cipher_property.c
webservices/rampart/trunk/c/src/omxmlsec/openssl/crypt.c
webservices/rampart/trunk/c/src/omxmlsec/openssl/digest.c
webservices/rampart/trunk/c/src/omxmlsec/openssl/pem.c
webservices/rampart/trunk/c/src/omxmlsec/openssl/pkcs12.c
webservices/rampart/trunk/c/src/omxmlsec/openssl/pkey.c
webservices/rampart/trunk/c/src/omxmlsec/openssl/rsa.c
webservices/rampart/trunk/c/src/omxmlsec/openssl/sign.c
webservices/rampart/trunk/c/src/omxmlsec/openssl/util.c
webservices/rampart/trunk/c/src/omxmlsec/openssl/x509.c
Modified: webservices/rampart/trunk/c/src/omxmlsec/openssl/cipher_ctx.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/omxmlsec/openssl/cipher_ctx.c?view=diff&rev=523250&r1=523249&r2=523250
==============================================================================
--- webservices/rampart/trunk/c/src/omxmlsec/openssl/cipher_ctx.c (original)
+++ webservices/rampart/trunk/c/src/omxmlsec/openssl/cipher_ctx.c Wed Mar 28
02:43:46 2007
@@ -61,7 +61,7 @@
/* public functions*/
axis2_status_t AXIS2_CALL
openssl_cipher_ctx_free(openssl_cipher_ctx_t *ctx,
- const axis2_env_t *env
+ const axis2_env_t *env
)
{
AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
@@ -86,7 +86,7 @@
const EVP_CIPHER* AXIS2_CALL
openssl_cipher_ctx_get_cipher(openssl_cipher_ctx_t *ctx,
- const axis2_env_t *env)
+ const axis2_env_t *env)
{
AXIS2_ENV_CHECK(env, NULL);
@@ -95,7 +95,7 @@
oxs_key_t *AXIS2_CALL
openssl_cipher_ctx_get_key(openssl_cipher_ctx_t *ctx,
- const axis2_env_t *env
+ const axis2_env_t *env
)
{
AXIS2_ENV_CHECK(env, NULL);
@@ -105,7 +105,7 @@
axis2_char_t *AXIS2_CALL
openssl_cipher_ctx_get_iv(openssl_cipher_ctx_t *ctx,
- const axis2_env_t *env
+ const axis2_env_t *env
)
{
AXIS2_ENV_CHECK(env, NULL);
@@ -115,7 +115,7 @@
axis2_char_t *AXIS2_CALL
openssl_cipher_ctx_get_pad(openssl_cipher_ctx_t *ctx,
- const axis2_env_t *env
+ const axis2_env_t *env
)
{
AXIS2_ENV_CHECK(env, NULL);
@@ -125,8 +125,8 @@
axis2_status_t AXIS2_CALL
openssl_cipher_ctx_set_cipher(openssl_cipher_ctx_t *ctx,
- const axis2_env_t *env,
- const EVP_CIPHER *cipher
+ const axis2_env_t *env,
+ const EVP_CIPHER *cipher
)
{
AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
@@ -143,8 +143,8 @@
axis2_status_t AXIS2_CALL
openssl_cipher_ctx_set_key(openssl_cipher_ctx_t *ctx,
- const axis2_env_t *env,
- oxs_key_t *key
+ const axis2_env_t *env,
+ oxs_key_t *key
)
{
AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
@@ -162,8 +162,8 @@
axis2_status_t AXIS2_CALL
openssl_cipher_ctx_set_iv(openssl_cipher_ctx_t *ctx,
- const axis2_env_t *env,
- axis2_char_t *iv
+ const axis2_env_t *env,
+ axis2_char_t *iv
)
{
AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
@@ -182,8 +182,8 @@
axis2_status_t AXIS2_CALL
openssl_cipher_ctx_set_pad(openssl_cipher_ctx_t *ctx,
- const axis2_env_t *env,
- axis2_char_t *pad
+ const axis2_env_t *env,
+ axis2_char_t *pad
)
{
AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
Modified: webservices/rampart/trunk/c/src/omxmlsec/openssl/cipher_property.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/omxmlsec/openssl/cipher_property.c?view=diff&rev=523250&r1=523249&r2=523250
==============================================================================
--- webservices/rampart/trunk/c/src/omxmlsec/openssl/cipher_property.c
(original)
+++ webservices/rampart/trunk/c/src/omxmlsec/openssl/cipher_property.c Wed Mar
28 02:43:46 2007
@@ -25,7 +25,7 @@
struct openssl_cipher_property_t
-{
+{
EVP_CIPHER *cipher;
axis2_char_t *name;
axis2_char_t *url;
Modified: webservices/rampart/trunk/c/src/omxmlsec/openssl/crypt.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/omxmlsec/openssl/crypt.c?view=diff&rev=523250&r1=523249&r2=523250
==============================================================================
--- webservices/rampart/trunk/c/src/omxmlsec/openssl/crypt.c (original)
+++ webservices/rampart/trunk/c/src/omxmlsec/openssl/crypt.c Wed Mar 28
02:43:46 2007
@@ -28,14 +28,14 @@
AXIS2_EXTERN int AXIS2_CALL
openssl_bc_crypt(const axis2_env_t *env,
- openssl_cipher_ctx_t *oc_ctx,
- oxs_buffer_t *input_buf,
- oxs_buffer_t *output_buf,
- int encrypt)
+ openssl_cipher_ctx_t *oc_ctx,
+ oxs_buffer_t *input_buf,
+ oxs_buffer_t *output_buf,
+ int encrypt)
{
EVP_CIPHER_CTX ctx ;
oxs_key_t *okey = NULL;
-
+
unsigned char iv[EVP_MAX_IV_LENGTH];
unsigned char key[EVP_MAX_KEY_LENGTH];
int ret =0, iv_length =0, block_length =0;
@@ -80,11 +80,11 @@
unsigned char *out_buf = NULL;
int in_size =0, out_size =0, fixed=0, out_length = 0;
- if (0 == oxs_buffer_get_size(input_buf, env)) {
- last = 1;
+ if (0 == oxs_buffer_get_size(input_buf, env)) {
+ last = 1;
break; /*Quit loop if NO DATA!!! */
}
-
+
/*If the amnt of data available is greater than the buffer size, we
limit it to buffer size */
if(oxs_buffer_get_size(input_buf, env) > BUFSIZE){
in_size = BUFSIZE;
@@ -93,12 +93,12 @@
}
out_size = oxs_buffer_get_size(output_buf, env);
-
+
/*Set the output buffer size*/
status = oxs_buffer_set_max_size(output_buf, env, out_size + in_size +
block_length);
out_buf = oxs_buffer_get_data(output_buf, env) + out_size;
/*position to write*/
-
+
#ifndef OXS_OPENSSL_096
/*If decrypt, we copy the final data to the out_buf of size
block_length*/
if(!ctx.encrypt) {
@@ -106,15 +106,15 @@
memcpy(out_buf, ctx.final, block_length);
out_buf += block_length;
fixed = 1;
- }else {
- fixed = 0;
- }
+ }else {
+ fixed = 0;
}
+ }
#endif
- /* encrypt or decrypt */
- ret = EVP_CipherUpdate(&ctx, out_buf, &out_length,
oxs_buffer_get_data(input_buf, env), in_size);
+ /* encrypt or decrypt */
+ ret = EVP_CipherUpdate(&ctx, out_buf, &out_length,
oxs_buffer_get_data(input_buf, env), in_size);
-#ifndef OXS_OPENSSL_096
+#ifndef OXS_OPENSSL_096
/*If decrypt, we copy data from the out_buf to the ctx.final*/
if(!ctx.encrypt) {
if (block_length > 1 && !ctx.buf_len) {
@@ -130,7 +130,7 @@
}
#endif
/* set correct output buffer size */
- status = oxs_buffer_set_size(output_buf, env, out_size + out_length);
+ status = oxs_buffer_set_size(output_buf, env, out_size + out_length);
if(AXIS2_FAILURE == status){
return -1;
}
@@ -139,7 +139,7 @@
if(AXIS2_FAILURE == status){
return -1;
}
-
+
}/*End of for loop*/
/********************************Finalize*****************************************************/
@@ -149,7 +149,7 @@
unsigned char pad[EVP_MAX_BLOCK_LENGTH];
unsigned char *out_buf = NULL;
int out_size = 0, out_length = 0, out_length2 = 0;
-
+
out_size = oxs_buffer_get_size(output_buf, env);
status = oxs_buffer_set_max_size(output_buf, env, out_size + 2 *
block_length);
out_buf = oxs_buffer_get_data(output_buf, env) + out_size;/*position
to write*/
@@ -166,7 +166,7 @@
ret = EVP_CipherUpdate(&ctx, out_buf, &out_length, pad,
pad_length);
out_buf += out_length;
}
-#endif
+#endif
/* finalize */
ret = EVP_CipherFinal(&ctx, out_buf, &out_length2);
#ifndef OXS_OPENSSL_096
@@ -183,13 +183,13 @@
#endif
/* set correct output buffer size */
status = oxs_buffer_set_size(output_buf, env, out_size + out_length +
out_length2);
-
+
EVP_CIPHER_CTX_cleanup(&ctx);
/*return the length of the outputbuf*/
return out_size + out_length + out_length2;
}else{
return -1;
}
-
+
}
Modified: webservices/rampart/trunk/c/src/omxmlsec/openssl/digest.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/omxmlsec/openssl/digest.c?view=diff&rev=523250&r1=523249&r2=523250
==============================================================================
--- webservices/rampart/trunk/c/src/omxmlsec/openssl/digest.c (original)
+++ webservices/rampart/trunk/c/src/omxmlsec/openssl/digest.c Wed Mar 28
02:43:46 2007
@@ -26,8 +26,8 @@
AXIS2_EXTERN axis2_char_t *AXIS2_CALL
openssl_sha1(const axis2_env_t *env,
- axis2_char_t *input,
- int length)
+ axis2_char_t *input,
+ int length)
{
SHA_CTX c ;
unsigned char md[SHA_DIGEST_LENGTH];
@@ -50,13 +50,13 @@
int length)
{
MD5_CTX ctx;
- unsigned char md[MD5_DIGEST_LENGTH];
+ unsigned char md[MD5_DIGEST_LENGTH];
axis2_char_t* encoded_str = NULL;
-
+
MD5_Init(&ctx);
MD5_Update(&ctx, (unsigned char*)input,length);
- MD5_Final(md, &ctx);
-
+ MD5_Final(md, &ctx);
+
encoded_str = AXIS2_MALLOC(env->allocator, MD5_DIGEST_LENGTH);
axis2_base64_encode(encoded_str, (char*)md, MD5_DIGEST_LENGTH);
Modified: webservices/rampart/trunk/c/src/omxmlsec/openssl/pem.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/omxmlsec/openssl/pem.c?view=diff&rev=523250&r1=523249&r2=523250
==============================================================================
--- webservices/rampart/trunk/c/src/omxmlsec/openssl/pem.c (original)
+++ webservices/rampart/trunk/c/src/omxmlsec/openssl/pem.c Wed Mar 28 02:43:46
2007
@@ -30,10 +30,10 @@
AXIS2_EXTERN axis2_status_t AXIS2_CALL
openssl_pem_buf_read_pkey(const axis2_env_t *env,
- axis2_char_t *b64_encoded_buf,
- axis2_char_t *password,
- openssl_pem_pkey_type_t type,
- EVP_PKEY **pkey)
+ axis2_char_t *b64_encoded_buf,
+ axis2_char_t *password,
+ openssl_pem_pkey_type_t type,
+ EVP_PKEY **pkey)
{
unsigned char *buff = NULL;
BIO *bio = NULL;
@@ -51,13 +51,13 @@
ilen = axis2_strlen(b64_encoded_buf);
EVP_DecodeInit(&ctx);
EVP_DecodeUpdate(&ctx, (unsigned char*)buff, &len,
- (unsigned char*)b64_encoded_buf, ilen);
+ (unsigned char*)b64_encoded_buf, ilen);
EVP_DecodeFinal(&ctx, (unsigned char*)buff, &ret);
ret += len;
if ((bio = BIO_new_mem_buf(buff, ilen)) == NULL)
{
oxs_error(env, ERROR_LOCATION, OXS_ERROR_DEFAULT,
- "BIO memeory allocation failure");
+ "BIO memeory allocation failure");
return AXIS2_FAILURE;
}
/*Load*/
@@ -66,7 +66,7 @@
}else{
*pkey = d2i_PrivateKey_bio(bio, NULL);
}
-
+
/*Free*/
BIO_free(bio);
bio = NULL;
@@ -75,7 +75,7 @@
if(!*pkey){
oxs_error(env, ERROR_LOCATION, OXS_ERROR_DEFAULT,
- "private key is NULL");
+ "private key is NULL");
return AXIS2_FAILURE;
}
return AXIS2_SUCCESS;
@@ -83,19 +83,19 @@
AXIS2_EXTERN axis2_status_t AXIS2_CALL
openssl_pem_read_pkey(const axis2_env_t *env,
- axis2_char_t *filename,
- axis2_char_t *password,
- openssl_pem_pkey_type_t type,
- EVP_PKEY **pkey)
+ axis2_char_t *filename,
+ axis2_char_t *password,
+ openssl_pem_pkey_type_t type,
+ EVP_PKEY **pkey)
{
BIO *bio;
- int ret;
+ int ret;
bio = BIO_new_file(filename, "r");
if(type == OPENSSL_PEM_PKEY_TYPE_PRIVATE_KEY){
*pkey = PEM_read_bio_PrivateKey(bio, NULL, 0 , password);
- }else if(type == OPENSSL_PEM_PKEY_TYPE_PUBLIC_KEY){
+ }else if(type == OPENSSL_PEM_PKEY_TYPE_PUBLIC_KEY){
*pkey = PEM_read_bio_PUBKEY(bio, NULL, 0 , password);
}else{/*Type unknown*/
/*Try to read the prv key first*/
Modified: webservices/rampart/trunk/c/src/omxmlsec/openssl/pkcs12.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/omxmlsec/openssl/pkcs12.c?view=diff&rev=523250&r1=523249&r2=523250
==============================================================================
--- webservices/rampart/trunk/c/src/omxmlsec/openssl/pkcs12.c (original)
+++ webservices/rampart/trunk/c/src/omxmlsec/openssl/pkcs12.c Wed Mar 28
02:43:46 2007
@@ -28,8 +28,8 @@
AXIS2_EXTERN axis2_status_t AXIS2_CALL
openssl_pkcs12_load(const axis2_env_t *env,
- axis2_char_t *filename,
- PKCS12 **p12)
+ axis2_char_t *filename,
+ PKCS12 **p12)
{
FILE *fp = NULL;
@@ -53,11 +53,11 @@
AXIS2_EXTERN axis2_status_t AXIS2_CALL
openssl_pkcs12_parse(const axis2_env_t *env,
- axis2_char_t *password ,
- PKCS12 *p12,
- EVP_PKEY **prvkey,
- X509 **cert,
- STACK_OF(X509) **ca)
+ axis2_char_t *password ,
+ PKCS12 *p12,
+ EVP_PKEY **prvkey,
+ X509 **cert,
+ STACK_OF(X509) **ca)
{
/*Parse the pkcs store*/
if (!PKCS12_parse(p12, password, prvkey, cert, ca)) {
@@ -70,7 +70,7 @@
AXIS2_EXTERN axis2_status_t AXIS2_CALL
openssl_pkcs12_free(const axis2_env_t *env,
- PKCS12 *p12)
+ PKCS12 *p12)
{
PKCS12_free(p12);
Modified: webservices/rampart/trunk/c/src/omxmlsec/openssl/pkey.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/omxmlsec/openssl/pkey.c?view=diff&rev=523250&r1=523249&r2=523250
==============================================================================
--- webservices/rampart/trunk/c/src/omxmlsec/openssl/pkey.c (original)
+++ webservices/rampart/trunk/c/src/omxmlsec/openssl/pkey.c Wed Mar 28 02:43:46
2007
@@ -188,7 +188,7 @@
{
/*If there is no key by now its an error*/
oxs_error(env, ERROR_LOCATION, OXS_ERROR_ENCRYPT_FAILED,
- "Cannot load key from %s", filename);
+ "Cannot load key from %s", filename);
return AXIS2_FAILURE;
}
Modified: webservices/rampart/trunk/c/src/omxmlsec/openssl/rsa.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/omxmlsec/openssl/rsa.c?view=diff&rev=523250&r1=523249&r2=523250
==============================================================================
--- webservices/rampart/trunk/c/src/omxmlsec/openssl/rsa.c (original)
+++ webservices/rampart/trunk/c/src/omxmlsec/openssl/rsa.c Wed Mar 28 02:43:46
2007
@@ -59,15 +59,15 @@
encrypted = AXIS2_MALLOC(env->allocator, RSA_size(key->pkey.rsa));
ret = RSA_public_encrypt(oxs_buffer_get_size(in, env),
- oxs_buffer_get_data(in, env),
- encrypted,
- key->pkey.rsa ,
- pad);
-
+ oxs_buffer_get_data(in, env),
+ encrypted,
+ key->pkey.rsa ,
+ pad);
+
if (ret < 0)
{
oxs_error(env, ERROR_LOCATION, OXS_ERROR_OPENSSL_FUNC_FAILED,
- "RSA encryption failed");
+ "RSA encryption failed");
return (-1);
}
oxs_buffer_populate(out, env, encrypted, ret);
@@ -87,7 +87,7 @@
EVP_PKEY *key = NULL;
int pad = RSA_PKCS1_PADDING;
- AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
+ AXIS2_ENV_CHECK(env, AXIS2_FAILURE);
key = (EVP_PKEY *)openssl_pkey_get_key(pkey, env);
if(0 == axis2_strcmp(padding, OPENSSL_RSA_PKCS1_OAEP_PADDING ) ){
@@ -98,20 +98,20 @@
decrypted = AXIS2_MALLOC(env->allocator, RSA_size(key->pkey.rsa));
ret = RSA_public_decrypt(oxs_buffer_get_size(in, env),
- oxs_buffer_get_data(in, env),
- decrypted,
- key->pkey.rsa ,
- pad);
-
+ oxs_buffer_get_data(in, env),
+ decrypted,
+ key->pkey.rsa ,
+ pad);
+
if (ret < 0)
{
oxs_error(env, ERROR_LOCATION, OXS_ERROR_OPENSSL_FUNC_FAILED,
- "PUBKEY decrypt (signature verification) failed");
+ "PUBKEY decrypt (signature verification) failed");
return (-1);
}
oxs_buffer_populate(out, env, decrypted, ret);
return ret;
- }
+}
int AXIS2_CALL
@@ -140,15 +140,15 @@
decrypted = AXIS2_MALLOC(env->allocator, RSA_size(key->pkey.rsa));
ret = RSA_private_decrypt(RSA_size(key->pkey.rsa),
- oxs_buffer_get_data(in, env),
- decrypted,
- key->pkey.rsa,
- pad);
-
+ oxs_buffer_get_data(in, env),
+ decrypted,
+ key->pkey.rsa,
+ pad);
+
if (ret < 0)
{
oxs_error(env, ERROR_LOCATION, OXS_ERROR_OPENSSL_FUNC_FAILED,
- "RSA decryption failed");
+ "RSA decryption failed");
return (-1);
}
oxs_buffer_populate(out, env, decrypted, ret);
@@ -182,15 +182,15 @@
encrypted = AXIS2_MALLOC(env->allocator, RSA_size(key->pkey.rsa));
ret = RSA_private_encrypt(RSA_size(key->pkey.rsa),
- oxs_buffer_get_data(in, env),
- encrypted,
- key->pkey.rsa,
- pad);
+ oxs_buffer_get_data(in, env),
+ encrypted,
+ key->pkey.rsa,
+ pad);
if (ret < 0)
{
oxs_error(env, ERROR_LOCATION, OXS_ERROR_OPENSSL_FUNC_FAILED,
- "RSA private encryption(Signing) failed. Error
code %d: %s",ERR_get_error(), ERR_reason_error_string(ERR_get_error()));
+ "RSA private encryption(Signing) failed. Error code %d:
%s",ERR_get_error(), ERR_reason_error_string(ERR_get_error()));
return (-1);
}
oxs_buffer_populate(out, env, encrypted, ret);
Modified: webservices/rampart/trunk/c/src/omxmlsec/openssl/sign.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/omxmlsec/openssl/sign.c?view=diff&rev=523250&r1=523249&r2=523250
==============================================================================
--- webservices/rampart/trunk/c/src/omxmlsec/openssl/sign.c (original)
+++ webservices/rampart/trunk/c/src/omxmlsec/openssl/sign.c Wed Mar 28 02:43:46
2007
@@ -34,9 +34,9 @@
AXIS2_EXTERN int AXIS2_CALL
openssl_sig_sign(const axis2_env_t *env,
- openssl_pkey_t *prvkey,
- oxs_buffer_t *input_buf,
- oxs_buffer_t *output_buf)
+ openssl_pkey_t *prvkey,
+ oxs_buffer_t *input_buf,
+ oxs_buffer_t *output_buf)
{
unsigned char sig_buf[4096]; /*Enough for the signature*/
unsigned int sig_len;
@@ -48,7 +48,7 @@
/*open_pkey = oxs_sign_ctx_get_private_key(sign_ctx, env);*/
pkey = openssl_pkey_get_key(prvkey, env);
if(!pkey){
- oxs_error(env, ERROR_LOCATION, OXS_ERROR_SIGN_FAILED,"Cannot load the
private key" );
+ oxs_error(env, ERROR_LOCATION, OXS_ERROR_SIGN_FAILED,"Cannot load the
private key" );
}
/*TODO: Set the digest according to the signature method*/
@@ -59,15 +59,15 @@
/*Sign init*/
ret = EVP_SignInit(&md_ctx, digest);
- AXIS2_LOG_INFO(env->log, "[openssl][sig] Signing content %s",
oxs_buffer_get_data(input_buf, env) );
+ AXIS2_LOG_INFO(env->log, "[openssl][sig] Signing content %s",
oxs_buffer_get_data(input_buf, env) );
EVP_SignUpdate (&md_ctx, oxs_buffer_get_data(input_buf, env),
oxs_buffer_get_size(input_buf, env));
sig_len = sizeof(sig_buf);
err = EVP_SignFinal (&md_ctx,
- sig_buf,
- &sig_len,
- pkey);
- if (err != 1) {
- ERR_print_errors_fp (stderr);
+ sig_buf,
+ &sig_len,
+ pkey);
+ if (err != 1) {
+ ERR_print_errors_fp (stderr);
}
/*Fill the output buffer*/
oxs_buffer_populate(output_buf, env, sig_buf, sig_len);
@@ -77,9 +77,9 @@
AXIS2_EXTERN axis2_status_t AXIS2_CALL
openssl_sig_verify(const axis2_env_t *env,
- openssl_pkey_t *pubkey,
- oxs_buffer_t *input_buf,
- oxs_buffer_t *sig_buf)
+ openssl_pkey_t *pubkey,
+ oxs_buffer_t *input_buf,
+ oxs_buffer_t *sig_buf)
{
axis2_status_t status = AXIS2_FAILURE;
const EVP_MD* digest;
@@ -92,19 +92,19 @@
open_pubkey = oxs_x509_cert_get_public_key(cert, env);*/
pkey = openssl_pkey_get_key(pubkey, env);
if(!pkey){
- oxs_error(env, ERROR_LOCATION,
OXS_ERROR_SIG_VERIFICATION_FAILED,"Cannot load the public key" );
+ oxs_error(env, ERROR_LOCATION,
OXS_ERROR_SIG_VERIFICATION_FAILED,"Cannot load the public key" );
}
/*TODO Set the digest according to the signature method*/
digest = EVP_sha1();
/*Init MD Ctx*/
EVP_MD_CTX_init(&md_ctx);
-
+
/*Intialize verification*/
ret = EVP_VerifyInit(&md_ctx, digest);
if(ret != 1) {
/*Error*/
- oxs_error(env, ERROR_LOCATION,
OXS_ERROR_SIG_VERIFICATION_FAILED,"EVP_VerifyInit failed" );
+ oxs_error(env, ERROR_LOCATION,
OXS_ERROR_SIG_VERIFICATION_FAILED,"EVP_VerifyInit failed" );
return AXIS2_FAILURE;
}
ret = EVP_VerifyUpdate(&md_ctx, oxs_buffer_get_data(input_buf, env),
oxs_buffer_get_size(input_buf, env));
@@ -113,10 +113,10 @@
oxs_error(env, ERROR_LOCATION,
OXS_ERROR_SIG_VERIFICATION_FAILED,"EVP_VerifyUpdate failed" );
return AXIS2_FAILURE;
}
-
- ret = EVP_VerifyFinal(&md_ctx, oxs_buffer_get_data(sig_buf, env),
- oxs_buffer_get_size(sig_buf, env),
- pkey);
+
+ ret = EVP_VerifyFinal(&md_ctx, oxs_buffer_get_data(sig_buf, env),
+ oxs_buffer_get_size(sig_buf, env),
+ pkey);
if(ret == 0){
/*Error. Signature verification FAILED */
oxs_error(env, ERROR_LOCATION,
OXS_ERROR_SIG_VERIFICATION_FAILED,"Signature verification FAILED." );
@@ -126,12 +126,12 @@
oxs_error(env, ERROR_LOCATION,
OXS_ERROR_SIG_VERIFICATION_FAILED,"Error occured while verifying the
signature." );
status = AXIS2_FAILURE;
}else{
- /*SUCCESS. Det ar bra :-)*/
+ /*SUCCESS. Det ar bra :-)*/
AXIS2_LOG_INFO(env->log, "[openssl][sig] Signature verification
SUCCESS " );
status = AXIS2_SUCCESS;
}
- return status;
-
+ return status;
+
}
Modified: webservices/rampart/trunk/c/src/omxmlsec/openssl/util.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/omxmlsec/openssl/util.c?view=diff&rev=523250&r1=523249&r2=523250
==============================================================================
--- webservices/rampart/trunk/c/src/omxmlsec/openssl/util.c (original)
+++ webservices/rampart/trunk/c/src/omxmlsec/openssl/util.c Wed Mar 28 02:43:46
2007
@@ -37,14 +37,14 @@
if (ret < 0)
{
oxs_error(env, ERROR_LOCATION,
- OXS_ERROR_DEFAULT, "RAND_bytes failed %d", size);
+ OXS_ERROR_DEFAULT, "RAND_bytes failed %d", size);
return AXIS2_FAILURE;
}
/*Encoding make it easier to handle random data*/
-#if 0
+#if 0
int encodedlen;
axis2_char_t *encoded_str = NULL;
-
+
encodedlen = axis2_base64_encode_len(size);
encoded_str = AXIS2_MALLOC(env->allocator, encodedlen);
ret = axis2_base64_encode(encoded_str, (const char *)temp_buffer, size);
@@ -70,7 +70,7 @@
if (!cprop)
{
oxs_error(env, ERROR_LOCATION, OXS_ERROR_INVALID_DATA,
- "openssl_cipher_property is NULL");
+ "openssl_cipher_property is NULL");
return AXIS2_FAILURE;
@@ -80,7 +80,7 @@
if (!cipher_name)
{
oxs_error(env, ERROR_LOCATION, OXS_ERROR_INVALID_DATA,
- "openssl_cipher_property name is NULL");
+ "openssl_cipher_property name is NULL");
return AXIS2_FAILURE;
@@ -90,7 +90,7 @@
if (!cipher)
{
oxs_error(env, ERROR_LOCATION, OXS_ERROR_INVALID_DATA,
- "openssl_get_evp_cipher_by_name failed");
+ "openssl_get_evp_cipher_by_name failed");
return AXIS2_FAILURE;
}
Modified: webservices/rampart/trunk/c/src/omxmlsec/openssl/x509.c
URL:
http://svn.apache.org/viewvc/webservices/rampart/trunk/c/src/omxmlsec/openssl/x509.c?view=diff&rev=523250&r1=523249&r2=523250
==============================================================================
--- webservices/rampart/trunk/c/src/omxmlsec/openssl/x509.c (original)
+++ webservices/rampart/trunk/c/src/omxmlsec/openssl/x509.c Wed Mar 28 02:43:46
2007
@@ -32,8 +32,8 @@
/*Usefull when we have BinarySecurityTokn*/
AXIS2_EXTERN axis2_status_t AXIS2_CALL
openssl_x509_load_from_buffer(const axis2_env_t *env,
- axis2_char_t *b64_encoded_buf,
- X509 **cert)
+ axis2_char_t *b64_encoded_buf,
+ X509 **cert)
{
unsigned char *buff = NULL;
BIO *mem = NULL;
@@ -54,13 +54,13 @@
else
{
oxs_error(env, ERROR_LOCATION, OXS_ERROR_DECRYPT_FAILED,
- "New line removed buffer creation failed.");
- return AXIS2_FAILURE;
+ "New line removed buffer creation failed.");
+ return AXIS2_FAILURE;
}
/*First we need to base64 decode*/
-/* EVP_ENCODE_CTX ctx;*/
-/* int len = 0;*/
-/* int ret = 0;*/
+ /* EVP_ENCODE_CTX ctx;*/
+ /* int len = 0;*/
+ /* int ret = 0;*/
decode_len = axis2_base64_decode_len(formatted_buf );
buff = AXIS2_MALLOC(env->allocator, decode_len);
@@ -71,16 +71,16 @@
if (decoded_len < 0)
{
oxs_error(env, ERROR_LOCATION, OXS_ERROR_DECRYPT_FAILED,
- "axis2_base64_decode_binary failed");
- return AXIS2_FAILURE;
+ "axis2_base64_decode_binary failed");
+ return AXIS2_FAILURE;
}
-
-/* EVP_DecodeInit(&ctx);
- EVP_DecodeUpdate(&ctx, (unsigned char*)buff, &len,
- (unsigned char*)b64_encoded_buf, ilen);
- EVP_DecodeFinal(&ctx, (unsigned char*)buff, &ret);
- ret += len;
-*/
+
+ /* EVP_DecodeInit(&ctx);
+ EVP_DecodeUpdate(&ctx, (unsigned char*)buff, &len,
+ (unsigned char*)b64_encoded_buf, ilen);
+ EVP_DecodeFinal(&ctx, (unsigned char*)buff, &ret);
+ ret += len;
+ */
if ((mem = BIO_new_mem_buf(buff, ilen)) == NULL)
{
/*oxs_error(env, ERROR_LOCATION, OXS_ERROR_DEFAULT,
@@ -100,15 +100,15 @@
"Certificate is NULL");*/
return AXIS2_FAILURE;
}
-
- return AXIS2_SUCCESS;
+
+ return AXIS2_SUCCESS;
}
AXIS2_EXTERN axis2_status_t AXIS2_CALL
openssl_x509_load_from_pem(const axis2_env_t *env,
- axis2_char_t *filename,
- X509 **cert)
+ axis2_char_t *filename,
+ X509 **cert)
{
BIO *in;
@@ -124,9 +124,9 @@
{
return AXIS2_FAILURE;
}
-
+
if (-1 == BIO_reset(in) ){
- return AXIS2_FAILURE;
+ return AXIS2_FAILURE;
}
if (-1 == BIO_free(in) ){
@@ -138,11 +138,11 @@
AXIS2_EXTERN axis2_status_t AXIS2_CALL
openssl_x509_load_from_pkcs12(const axis2_env_t *env,
- axis2_char_t *filename,
- axis2_char_t *password,
- X509 **cert,
- EVP_PKEY **pkey,
- STACK_OF(X509) **ca)
+ axis2_char_t *filename,
+ axis2_char_t *password,
+ X509 **cert,
+ EVP_PKEY **pkey,
+ STACK_OF(X509) **ca)
{
PKCS12 *p12 = NULL;
axis2_status_t status = AXIS2_FAILURE;
@@ -154,8 +154,8 @@
}
/*Parse*/
status = openssl_pkcs12_parse(env, password, p12, pkey,
- cert,
- ca);
+ cert,
+ ca);
if(AXIS2_FAILURE == status){
return AXIS2_FAILURE;
}
@@ -164,16 +164,16 @@
if(AXIS2_FAILURE == status){
return AXIS2_FAILURE;
}
-
+
return AXIS2_SUCCESS;
}
AXIS2_EXTERN axis2_status_t AXIS2_CALL
openssl_x509_load_certificate(const axis2_env_t *env,
- openssl_x509_format_t format,
- axis2_char_t *filename,
- axis2_char_t *password,
- X509 **cert)
+ openssl_x509_format_t format,
+ axis2_char_t *filename,
+ axis2_char_t *password,
+ X509 **cert)
{
axis2_status_t status = AXIS2_FAILURE;
@@ -181,19 +181,19 @@
/*Load from PEM*/
status = openssl_x509_load_from_pem(env, filename, cert);
if(AXIS2_FAILURE == status){
- return AXIS2_FAILURE;
+ return AXIS2_FAILURE;
}
}else if(OPENSSL_X509_FORMAT_PKCS12 == format){
/*Load from PKCS12*/
EVP_PKEY *pkey = NULL;
STACK_OF(X509) *ca = NULL;
- status = openssl_x509_load_from_pkcs12(env, filename, password, cert,
&pkey, &ca);
- if(AXIS2_FAILURE == status){
- return AXIS2_FAILURE;
- }
+ status = openssl_x509_load_from_pkcs12(env, filename, password, cert,
&pkey, &ca);
+ if(AXIS2_FAILURE == status){
+ return AXIS2_FAILURE;
+ }
}else if(OPENSSL_X509_FORMAT_DER == format){
/*Load from DER*/
-
+
}else{
/*Unspported*/
}
@@ -209,7 +209,7 @@
AXIS2_EXTERN axis2_char_t *AXIS2_CALL
openssl_x509_get_cert_data(const axis2_env_t *env,
- X509 *cert)
+ X509 *cert)
{
axis2_char_t *unformatted = NULL;
axis2_char_t *core_tail = NULL;
@@ -236,7 +236,7 @@
AXIS2_EXTERN int AXIS2_CALL
openssl_x509_get_serial(const axis2_env_t *env,
- X509 *cert)
+ X509 *cert)
{
axis2_char_t *serial = NULL;
int no = 0;
@@ -249,7 +249,7 @@
AXIS2_EXTERN unsigned long AXIS2_CALL
openssl_x509_get_subject_name_hash(const axis2_env_t *env,
- X509 *cert)
+ X509 *cert)
{
unsigned long l = 0;
l=X509_subject_name_hash(cert);
@@ -258,8 +258,8 @@
AXIS2_EXTERN axis2_status_t AXIS2_CALL
openssl_x509_get_pubkey(const axis2_env_t *env,
- X509 *cert,
- EVP_PKEY **pubkey)
+ X509 *cert,
+ EVP_PKEY **pubkey)
{
*pubkey = X509_get_pubkey(cert);
return AXIS2_SUCCESS;
@@ -267,7 +267,7 @@
AXIS2_EXTERN axis2_char_t *AXIS2_CALL
openssl_x509_get_subject_key_identifier(const axis2_env_t *env,
- X509 *cert)
+ X509 *cert)
{
X509_EXTENSION *ext;
ASN1_OCTET_STRING *keyId = NULL;
@@ -281,22 +281,22 @@
/*Get ext by ID*/
index = X509_get_ext_by_NID(cert, NID_subject_key_identifier, -1);
if (index < 0) {
- oxs_error(env, ERROR_LOCATION, OXS_ERROR_DEFAULT,
- "The extenension index of NID_subject_key_identifier is not
valid");
- return NULL;
+ oxs_error(env, ERROR_LOCATION, OXS_ERROR_DEFAULT,
+ "The extenension index of NID_subject_key_identifier is not
valid");
+ return NULL;
}
/*Get the extension*/
ext = X509_get_ext(cert, index);
if (ext == NULL) {
oxs_error(env, ERROR_LOCATION, OXS_ERROR_DEFAULT,
- "The extension for NID_subject_key_identifier is NULL");
+ "The extension for NID_subject_key_identifier is NULL");
return NULL;
}
/*Subject Key Identifier*/
keyId = (ASN1_OCTET_STRING *)X509V3_EXT_d2i(ext);
if (keyId == NULL) {
oxs_error(env, ERROR_LOCATION, OXS_ERROR_DEFAULT,
- "The SubjectKeyIdentifier is NULL");
+ "The SubjectKeyIdentifier is NULL");
return NULL;
}
memcpy(buf, keyId->data, keyId->length);
@@ -307,14 +307,14 @@
EVP_EncodeFinal(&ctx, (unsigned char*)(output+len), &ret);
ret += len;
- ski = axis2_strdup(output, env);
- return ski;
+ ski = axis2_strdup(output, env);
+ return ski;
}
AXIS2_EXTERN axis2_char_t *AXIS2_CALL
openssl_x509_get_info(const axis2_env_t *env,
- openssl_x509_info_type_t type,
- X509 *cert)
+ openssl_x509_info_type_t type,
+ X509 *cert)
{
BIO *out = NULL;
unsigned char *data= NULL;
@@ -325,9 +325,9 @@
if(OPENSSL_X509_INFO_SUBJECT==type){
X509_NAME_print_ex(out, X509_get_subject_name(cert), 0, 0);
}else if(OPENSSL_X509_INFO_ISSUER == type){
- X509_NAME_print_ex(out, X509_get_issuer_name(cert), 0, 0);
+ X509_NAME_print_ex(out, X509_get_issuer_name(cert), 0, 0);
}else if(OPENSSL_X509_INFO_VALID_FROM == type){
- ASN1_TIME_print(out, X509_get_notBefore(cert));
+ ASN1_TIME_print(out, X509_get_notBefore(cert));
}else if(OPENSSL_X509_INFO_VALID_TO == type){
ASN1_TIME_print(out, X509_get_notAfter(cert));
}else if(OPENSSL_X509_INFO_DATA_CERT == type){
@@ -339,7 +339,7 @@
const EVP_MD *digest = NULL;
unsigned char md[EVP_MAX_MD_SIZE];
unsigned int _n = 0;
-
+
digest = EVP_sha1();/*If we use EVP_md5(); here we can get the digest
from md5. */
if(X509_digest(cert,digest,md,&_n))
{
@@ -358,10 +358,10 @@
s=cert->signature->data;
for (i=0; i<n; i++)
{
- if ( ((i%18) == 0) && (i!=0) ) BIO_printf(out,"\n");
- BIO_printf(out,"%02x%s",s[i], (((i+1)%18) == 0)?"":":");
+ if ( ((i%18) == 0) && (i!=0) ) BIO_printf(out,"\n");
+ BIO_printf(out,"%02x%s",s[i], (((i+1)%18) == 0)?"":":");
}
-
+
}else if(OPENSSL_X509_INFO_VERSION == type){
long l = 0.0;
@@ -381,37 +381,37 @@
EVP_PKEY_free(pkey);
}
}else if(OPENSSL_X509_INFO_PUBKEY_ALGO == type){
- X509_CINF *ci = NULL;
+ X509_CINF *ci = NULL;
- ci = cert->cert_info;
- i2a_ASN1_OBJECT(out, ci->key->algor->algorithm);
+ ci = cert->cert_info;
+ i2a_ASN1_OBJECT(out, ci->key->algor->algorithm);
}
n = BIO_get_mem_data(out, &data);
result = axis2_strndup( data, n, env );
BIO_free(out);
out = NULL;
-
+
return result;
}
AXIS2_EXTERN void AXIS2_CALL
openssl_x509_print(const axis2_env_t *env,
- X509 *cert)
+ X509 *cert)
{
- printf("\n*************START PRINTING*****************\n");
- printf("OPENSSL_X509_INFO_SUBJECT : %s\n", openssl_x509_get_info(env,
OPENSSL_X509_INFO_SUBJECT,cert));
- printf("OPENSSL_X509_INFO_ISSUER : %s\n",
openssl_x509_get_info(env,OPENSSL_X509_INFO_ISSUER ,cert));
- printf("OPENSSL_X509_INFO_VALID_FROM : %s\n",
openssl_x509_get_info(env, OPENSSL_X509_INFO_VALID_FROM,cert));
- printf("OPENSSL_X509_INFO_VALID_TO : %s\n",
openssl_x509_get_info(env,OPENSSL_X509_INFO_VALID_TO ,cert));
- printf("OPENSSL_X509_INFO_FINGER : %s\n",
openssl_x509_get_info(env,OPENSSL_X509_INFO_FINGER ,cert));
- printf("OPENSSL_X509_INFO_SIGNATURE : %s\n",
openssl_x509_get_info(env, OPENSSL_X509_INFO_SIGNATURE,cert));
- printf("OPENSSL_X509_INFO_VERSION : %s\n",
openssl_x509_get_info(env,OPENSSL_X509_INFO_VERSION ,cert));
- printf("OPENSSL_X509_INFO_PUBKEY : %s\n",
openssl_x509_get_info(env,OPENSSL_X509_INFO_PUBKEY ,cert));
- printf("OPENSSL_X509_INFO_PUBKEY_ALGO : %s\n",
openssl_x509_get_info(env,OPENSSL_X509_INFO_PUBKEY_ALGO ,cert));
- printf("SERIAL : %u\n", openssl_x509_get_serial(env,cert));
- printf("PUBKEY : %s\n", openssl_x509_get_cert_data(env,cert));
+ printf("\n*************START PRINTING*****************\n");
+ printf("OPENSSL_X509_INFO_SUBJECT : %s\n", openssl_x509_get_info(env,
OPENSSL_X509_INFO_SUBJECT,cert));
+ printf("OPENSSL_X509_INFO_ISSUER : %s\n",
openssl_x509_get_info(env,OPENSSL_X509_INFO_ISSUER ,cert));
+ printf("OPENSSL_X509_INFO_VALID_FROM : %s\n", openssl_x509_get_info(env,
OPENSSL_X509_INFO_VALID_FROM,cert));
+ printf("OPENSSL_X509_INFO_VALID_TO : %s\n",
openssl_x509_get_info(env,OPENSSL_X509_INFO_VALID_TO ,cert));
+ printf("OPENSSL_X509_INFO_FINGER : %s\n",
openssl_x509_get_info(env,OPENSSL_X509_INFO_FINGER ,cert));
+ printf("OPENSSL_X509_INFO_SIGNATURE : %s\n", openssl_x509_get_info(env,
OPENSSL_X509_INFO_SIGNATURE,cert));
+ printf("OPENSSL_X509_INFO_VERSION : %s\n",
openssl_x509_get_info(env,OPENSSL_X509_INFO_VERSION ,cert));
+ printf("OPENSSL_X509_INFO_PUBKEY : %s\n",
openssl_x509_get_info(env,OPENSSL_X509_INFO_PUBKEY ,cert));
+ printf("OPENSSL_X509_INFO_PUBKEY_ALGO : %s\n",
openssl_x509_get_info(env,OPENSSL_X509_INFO_PUBKEY_ALGO ,cert));
+ printf("SERIAL : %u\n", openssl_x509_get_serial(env,cert));
+ printf("PUBKEY : %s\n", openssl_x509_get_cert_data(env,cert));
- printf("\n*************END PRINTING********************\n");
+ printf("\n*************END PRINTING********************\n");
}