|  | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 
|  | * All rights reserved. | 
|  | * | 
|  | * This package is an SSL implementation written | 
|  | * by Eric Young (eay@cryptsoft.com). | 
|  | * The implementation was written so as to conform with Netscapes SSL. | 
|  | * | 
|  | * This library is free for commercial and non-commercial use as long as | 
|  | * the following conditions are aheared to.  The following conditions | 
|  | * apply to all code found in this distribution, be it the RC4, RSA, | 
|  | * lhash, DES, etc., code; not just the SSL code.  The SSL documentation | 
|  | * included with this distribution is covered by the same copyright terms | 
|  | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | 
|  | * | 
|  | * Copyright remains Eric Young's, and as such any Copyright notices in | 
|  | * the code are not to be removed. | 
|  | * If this package is used in a product, Eric Young should be given attribution | 
|  | * as the author of the parts of the library used. | 
|  | * This can be in the form of a textual message at program startup or | 
|  | * in documentation (online or textual) provided with the package. | 
|  | * | 
|  | * Redistribution and use in source and binary forms, with or without | 
|  | * modification, are permitted provided that the following conditions | 
|  | * are met: | 
|  | * 1. Redistributions of source code must retain the copyright | 
|  | *    notice, this list of conditions and the following disclaimer. | 
|  | * 2. Redistributions in binary form must reproduce the above copyright | 
|  | *    notice, this list of conditions and the following disclaimer in the | 
|  | *    documentation and/or other materials provided with the distribution. | 
|  | * 3. All advertising materials mentioning features or use of this software | 
|  | *    must display the following acknowledgement: | 
|  | *    "This product includes cryptographic software written by | 
|  | *     Eric Young (eay@cryptsoft.com)" | 
|  | *    The word 'cryptographic' can be left out if the rouines from the library | 
|  | *    being used are not cryptographic related :-). | 
|  | * 4. If you include any Windows specific code (or a derivative thereof) from | 
|  | *    the apps directory (application code) you must include an acknowledgement: | 
|  | *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | 
|  | * | 
|  | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | 
|  | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 
|  | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 
|  | * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | 
|  | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | 
|  | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | 
|  | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | 
|  | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | 
|  | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 
|  | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 
|  | * SUCH DAMAGE. | 
|  | * | 
|  | * The licence and distribution terms for any publically available version or | 
|  | * derivative of this code cannot be changed.  i.e. this code cannot simply be | 
|  | * copied and put under another distribution licence | 
|  | * [including the GNU Public Licence.] | 
|  | */ | 
|  | /* ==================================================================== | 
|  | * Copyright (c) 1998-2007 The OpenSSL Project.  All rights reserved. | 
|  | * | 
|  | * Redistribution and use in source and binary forms, with or without | 
|  | * modification, are permitted provided that the following conditions | 
|  | * are met: | 
|  | * | 
|  | * 1. Redistributions of source code must retain the above copyright | 
|  | *    notice, this list of conditions and the following disclaimer. | 
|  | * | 
|  | * 2. Redistributions in binary form must reproduce the above copyright | 
|  | *    notice, this list of conditions and the following disclaimer in | 
|  | *    the documentation and/or other materials provided with the | 
|  | *    distribution. | 
|  | * | 
|  | * 3. All advertising materials mentioning features or use of this | 
|  | *    software must display the following acknowledgment: | 
|  | *    "This product includes software developed by the OpenSSL Project | 
|  | *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)" | 
|  | * | 
|  | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | 
|  | *    endorse or promote products derived from this software without | 
|  | *    prior written permission. For written permission, please contact | 
|  | *    openssl-core@openssl.org. | 
|  | * | 
|  | * 5. Products derived from this software may not be called "OpenSSL" | 
|  | *    nor may "OpenSSL" appear in their names without prior written | 
|  | *    permission of the OpenSSL Project. | 
|  | * | 
|  | * 6. Redistributions of any form whatsoever must retain the following | 
|  | *    acknowledgment: | 
|  | *    "This product includes software developed by the OpenSSL Project | 
|  | *    for use in the OpenSSL Toolkit (http://www.openssl.org/)" | 
|  | * | 
|  | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | 
|  | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 
|  | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | 
|  | * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR | 
|  | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | 
|  | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | 
|  | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | 
|  | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | 
|  | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | 
|  | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | 
|  | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | 
|  | * OF THE POSSIBILITY OF SUCH DAMAGE. | 
|  | * ==================================================================== | 
|  | * | 
|  | * This product includes cryptographic software written by Eric Young | 
|  | * (eay@cryptsoft.com).  This product includes software written by Tim | 
|  | * Hudson (tjh@cryptsoft.com). | 
|  | * | 
|  | */ | 
|  |  | 
|  | #include <openssl/ssl.h> | 
|  |  | 
|  | #include <errno.h> | 
|  | #include <string.h> | 
|  |  | 
|  | #include <openssl/asn1.h> | 
|  | #include <openssl/bio.h> | 
|  | #include <openssl/err.h> | 
|  | #include <openssl/mem.h> | 
|  | #include <openssl/pem.h> | 
|  | #include <openssl/stack.h> | 
|  | #include <openssl/x509.h> | 
|  |  | 
|  | #include "internal.h" | 
|  |  | 
|  |  | 
|  | static int xname_cmp(const X509_NAME **a, const X509_NAME **b) { | 
|  | return X509_NAME_cmp(*a, *b); | 
|  | } | 
|  |  | 
|  | // TODO(davidben): Is there any reason this doesn't call | 
|  | // |SSL_add_file_cert_subjects_to_stack|? | 
|  | STACK_OF(X509_NAME) *SSL_load_client_CA_file(const char *file) { | 
|  | BIO *in; | 
|  | X509 *x = NULL; | 
|  | X509_NAME *xn = NULL; | 
|  | STACK_OF(X509_NAME) *ret = NULL, *sk; | 
|  |  | 
|  | sk = sk_X509_NAME_new(xname_cmp); | 
|  | in = BIO_new(BIO_s_file()); | 
|  |  | 
|  | if (sk == NULL || in == NULL) { | 
|  | OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); | 
|  | goto err; | 
|  | } | 
|  |  | 
|  | if (!BIO_read_filename(in, file)) { | 
|  | goto err; | 
|  | } | 
|  |  | 
|  | for (;;) { | 
|  | if (PEM_read_bio_X509(in, &x, NULL, NULL) == NULL) { | 
|  | break; | 
|  | } | 
|  | if (ret == NULL) { | 
|  | ret = sk_X509_NAME_new_null(); | 
|  | if (ret == NULL) { | 
|  | OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); | 
|  | goto err; | 
|  | } | 
|  | } | 
|  | xn = X509_get_subject_name(x); | 
|  | if (xn == NULL) { | 
|  | goto err; | 
|  | } | 
|  |  | 
|  | // Check for duplicates. | 
|  | sk_X509_NAME_sort(sk); | 
|  | if (sk_X509_NAME_find(sk, NULL, xn)) { | 
|  | continue; | 
|  | } | 
|  |  | 
|  | xn = X509_NAME_dup(xn); | 
|  | if (xn == NULL || | 
|  | !sk_X509_NAME_push(sk /* non-owning */, xn) || | 
|  | !sk_X509_NAME_push(ret /* owning */, xn)) { | 
|  | X509_NAME_free(xn); | 
|  | goto err; | 
|  | } | 
|  | } | 
|  |  | 
|  | if (0) { | 
|  | err: | 
|  | sk_X509_NAME_pop_free(ret, X509_NAME_free); | 
|  | ret = NULL; | 
|  | } | 
|  |  | 
|  | sk_X509_NAME_free(sk); | 
|  | BIO_free(in); | 
|  | X509_free(x); | 
|  | if (ret != NULL) { | 
|  | ERR_clear_error(); | 
|  | } | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | int SSL_add_file_cert_subjects_to_stack(STACK_OF(X509_NAME) *stack, | 
|  | const char *file) { | 
|  | BIO *in; | 
|  | X509 *x = NULL; | 
|  | X509_NAME *xn = NULL; | 
|  | int ret = 0; | 
|  | int (*oldcmp)(const X509_NAME **a, const X509_NAME **b); | 
|  |  | 
|  | oldcmp = sk_X509_NAME_set_cmp_func(stack, xname_cmp); | 
|  | in = BIO_new(BIO_s_file()); | 
|  |  | 
|  | if (in == NULL) { | 
|  | OPENSSL_PUT_ERROR(SSL, ERR_R_MALLOC_FAILURE); | 
|  | goto err; | 
|  | } | 
|  |  | 
|  | if (!BIO_read_filename(in, file)) { | 
|  | goto err; | 
|  | } | 
|  |  | 
|  | for (;;) { | 
|  | if (PEM_read_bio_X509(in, &x, NULL, NULL) == NULL) { | 
|  | break; | 
|  | } | 
|  | xn = X509_get_subject_name(x); | 
|  | if (xn == NULL) { | 
|  | goto err; | 
|  | } | 
|  |  | 
|  | // Check for duplicates. | 
|  | sk_X509_NAME_sort(stack); | 
|  | if (sk_X509_NAME_find(stack, NULL, xn)) { | 
|  | continue; | 
|  | } | 
|  |  | 
|  | xn = X509_NAME_dup(xn); | 
|  | if (xn == NULL || | 
|  | !sk_X509_NAME_push(stack, xn)) { | 
|  | X509_NAME_free(xn); | 
|  | goto err; | 
|  | } | 
|  | } | 
|  |  | 
|  | ERR_clear_error(); | 
|  | ret = 1; | 
|  |  | 
|  | err: | 
|  | BIO_free(in); | 
|  | X509_free(x); | 
|  |  | 
|  | (void) sk_X509_NAME_set_cmp_func(stack, oldcmp); | 
|  |  | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | int SSL_use_certificate_file(SSL *ssl, const char *file, int type) { | 
|  | int reason_code; | 
|  | BIO *in; | 
|  | int ret = 0; | 
|  | X509 *x = NULL; | 
|  |  | 
|  | in = BIO_new(BIO_s_file()); | 
|  | if (in == NULL) { | 
|  | OPENSSL_PUT_ERROR(SSL, ERR_R_BUF_LIB); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | if (BIO_read_filename(in, file) <= 0) { | 
|  | OPENSSL_PUT_ERROR(SSL, ERR_R_SYS_LIB); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | if (type == SSL_FILETYPE_ASN1) { | 
|  | reason_code = ERR_R_ASN1_LIB; | 
|  | x = d2i_X509_bio(in, NULL); | 
|  | } else if (type == SSL_FILETYPE_PEM) { | 
|  | reason_code = ERR_R_PEM_LIB; | 
|  | x = PEM_read_bio_X509(in, NULL, ssl->ctx->default_passwd_callback, | 
|  | ssl->ctx->default_passwd_callback_userdata); | 
|  | } else { | 
|  | OPENSSL_PUT_ERROR(SSL, SSL_R_BAD_SSL_FILETYPE); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | if (x == NULL) { | 
|  | OPENSSL_PUT_ERROR(SSL, reason_code); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | ret = SSL_use_certificate(ssl, x); | 
|  |  | 
|  | end: | 
|  | X509_free(x); | 
|  | BIO_free(in); | 
|  |  | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | int SSL_use_RSAPrivateKey_file(SSL *ssl, const char *file, int type) { | 
|  | int reason_code, ret = 0; | 
|  | BIO *in; | 
|  | RSA *rsa = NULL; | 
|  |  | 
|  | in = BIO_new(BIO_s_file()); | 
|  | if (in == NULL) { | 
|  | OPENSSL_PUT_ERROR(SSL, ERR_R_BUF_LIB); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | if (BIO_read_filename(in, file) <= 0) { | 
|  | OPENSSL_PUT_ERROR(SSL, ERR_R_SYS_LIB); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | if (type == SSL_FILETYPE_ASN1) { | 
|  | reason_code = ERR_R_ASN1_LIB; | 
|  | rsa = d2i_RSAPrivateKey_bio(in, NULL); | 
|  | } else if (type == SSL_FILETYPE_PEM) { | 
|  | reason_code = ERR_R_PEM_LIB; | 
|  | rsa = | 
|  | PEM_read_bio_RSAPrivateKey(in, NULL, ssl->ctx->default_passwd_callback, | 
|  | ssl->ctx->default_passwd_callback_userdata); | 
|  | } else { | 
|  | OPENSSL_PUT_ERROR(SSL, SSL_R_BAD_SSL_FILETYPE); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | if (rsa == NULL) { | 
|  | OPENSSL_PUT_ERROR(SSL, reason_code); | 
|  | goto end; | 
|  | } | 
|  | ret = SSL_use_RSAPrivateKey(ssl, rsa); | 
|  | RSA_free(rsa); | 
|  |  | 
|  | end: | 
|  | BIO_free(in); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | int SSL_use_PrivateKey_file(SSL *ssl, const char *file, int type) { | 
|  | int reason_code, ret = 0; | 
|  | BIO *in; | 
|  | EVP_PKEY *pkey = NULL; | 
|  |  | 
|  | in = BIO_new(BIO_s_file()); | 
|  | if (in == NULL) { | 
|  | OPENSSL_PUT_ERROR(SSL, ERR_R_BUF_LIB); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | if (BIO_read_filename(in, file) <= 0) { | 
|  | OPENSSL_PUT_ERROR(SSL, ERR_R_SYS_LIB); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | if (type == SSL_FILETYPE_PEM) { | 
|  | reason_code = ERR_R_PEM_LIB; | 
|  | pkey = PEM_read_bio_PrivateKey(in, NULL, ssl->ctx->default_passwd_callback, | 
|  | ssl->ctx->default_passwd_callback_userdata); | 
|  | } else if (type == SSL_FILETYPE_ASN1) { | 
|  | reason_code = ERR_R_ASN1_LIB; | 
|  | pkey = d2i_PrivateKey_bio(in, NULL); | 
|  | } else { | 
|  | OPENSSL_PUT_ERROR(SSL, SSL_R_BAD_SSL_FILETYPE); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | if (pkey == NULL) { | 
|  | OPENSSL_PUT_ERROR(SSL, reason_code); | 
|  | goto end; | 
|  | } | 
|  | ret = SSL_use_PrivateKey(ssl, pkey); | 
|  | EVP_PKEY_free(pkey); | 
|  |  | 
|  | end: | 
|  | BIO_free(in); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | int SSL_CTX_use_certificate_file(SSL_CTX *ctx, const char *file, int type) { | 
|  | int reason_code; | 
|  | BIO *in; | 
|  | int ret = 0; | 
|  | X509 *x = NULL; | 
|  |  | 
|  | in = BIO_new(BIO_s_file()); | 
|  | if (in == NULL) { | 
|  | OPENSSL_PUT_ERROR(SSL, ERR_R_BUF_LIB); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | if (BIO_read_filename(in, file) <= 0) { | 
|  | OPENSSL_PUT_ERROR(SSL, ERR_R_SYS_LIB); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | if (type == SSL_FILETYPE_ASN1) { | 
|  | reason_code = ERR_R_ASN1_LIB; | 
|  | x = d2i_X509_bio(in, NULL); | 
|  | } else if (type == SSL_FILETYPE_PEM) { | 
|  | reason_code = ERR_R_PEM_LIB; | 
|  | x = PEM_read_bio_X509(in, NULL, ctx->default_passwd_callback, | 
|  | ctx->default_passwd_callback_userdata); | 
|  | } else { | 
|  | OPENSSL_PUT_ERROR(SSL, SSL_R_BAD_SSL_FILETYPE); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | if (x == NULL) { | 
|  | OPENSSL_PUT_ERROR(SSL, reason_code); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | ret = SSL_CTX_use_certificate(ctx, x); | 
|  |  | 
|  | end: | 
|  | X509_free(x); | 
|  | BIO_free(in); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | int SSL_CTX_use_RSAPrivateKey_file(SSL_CTX *ctx, const char *file, int type) { | 
|  | int reason_code, ret = 0; | 
|  | BIO *in; | 
|  | RSA *rsa = NULL; | 
|  |  | 
|  | in = BIO_new(BIO_s_file()); | 
|  | if (in == NULL) { | 
|  | OPENSSL_PUT_ERROR(SSL, ERR_R_BUF_LIB); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | if (BIO_read_filename(in, file) <= 0) { | 
|  | OPENSSL_PUT_ERROR(SSL, ERR_R_SYS_LIB); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | if (type == SSL_FILETYPE_ASN1) { | 
|  | reason_code = ERR_R_ASN1_LIB; | 
|  | rsa = d2i_RSAPrivateKey_bio(in, NULL); | 
|  | } else if (type == SSL_FILETYPE_PEM) { | 
|  | reason_code = ERR_R_PEM_LIB; | 
|  | rsa = PEM_read_bio_RSAPrivateKey(in, NULL, ctx->default_passwd_callback, | 
|  | ctx->default_passwd_callback_userdata); | 
|  | } else { | 
|  | OPENSSL_PUT_ERROR(SSL, SSL_R_BAD_SSL_FILETYPE); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | if (rsa == NULL) { | 
|  | OPENSSL_PUT_ERROR(SSL, reason_code); | 
|  | goto end; | 
|  | } | 
|  | ret = SSL_CTX_use_RSAPrivateKey(ctx, rsa); | 
|  | RSA_free(rsa); | 
|  |  | 
|  | end: | 
|  | BIO_free(in); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | int SSL_CTX_use_PrivateKey_file(SSL_CTX *ctx, const char *file, int type) { | 
|  | int reason_code, ret = 0; | 
|  | BIO *in; | 
|  | EVP_PKEY *pkey = NULL; | 
|  |  | 
|  | in = BIO_new(BIO_s_file()); | 
|  | if (in == NULL) { | 
|  | OPENSSL_PUT_ERROR(SSL, ERR_R_BUF_LIB); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | if (BIO_read_filename(in, file) <= 0) { | 
|  | OPENSSL_PUT_ERROR(SSL, ERR_R_SYS_LIB); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | if (type == SSL_FILETYPE_PEM) { | 
|  | reason_code = ERR_R_PEM_LIB; | 
|  | pkey = PEM_read_bio_PrivateKey(in, NULL, ctx->default_passwd_callback, | 
|  | ctx->default_passwd_callback_userdata); | 
|  | } else if (type == SSL_FILETYPE_ASN1) { | 
|  | reason_code = ERR_R_ASN1_LIB; | 
|  | pkey = d2i_PrivateKey_bio(in, NULL); | 
|  | } else { | 
|  | OPENSSL_PUT_ERROR(SSL, SSL_R_BAD_SSL_FILETYPE); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | if (pkey == NULL) { | 
|  | OPENSSL_PUT_ERROR(SSL, reason_code); | 
|  | goto end; | 
|  | } | 
|  | ret = SSL_CTX_use_PrivateKey(ctx, pkey); | 
|  | EVP_PKEY_free(pkey); | 
|  |  | 
|  | end: | 
|  | BIO_free(in); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | // Read a file that contains our certificate in "PEM" format, possibly followed | 
|  | // by a sequence of CA certificates that should be sent to the peer in the | 
|  | // Certificate message. | 
|  | int SSL_CTX_use_certificate_chain_file(SSL_CTX *ctx, const char *file) { | 
|  | BIO *in; | 
|  | int ret = 0; | 
|  | X509 *x = NULL; | 
|  |  | 
|  | ERR_clear_error();  // clear error stack for SSL_CTX_use_certificate() | 
|  |  | 
|  | in = BIO_new(BIO_s_file()); | 
|  | if (in == NULL) { | 
|  | OPENSSL_PUT_ERROR(SSL, ERR_R_BUF_LIB); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | if (BIO_read_filename(in, file) <= 0) { | 
|  | OPENSSL_PUT_ERROR(SSL, ERR_R_SYS_LIB); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | x = PEM_read_bio_X509_AUX(in, NULL, ctx->default_passwd_callback, | 
|  | ctx->default_passwd_callback_userdata); | 
|  | if (x == NULL) { | 
|  | OPENSSL_PUT_ERROR(SSL, ERR_R_PEM_LIB); | 
|  | goto end; | 
|  | } | 
|  |  | 
|  | ret = SSL_CTX_use_certificate(ctx, x); | 
|  |  | 
|  | if (ERR_peek_error() != 0) { | 
|  | ret = 0;  // Key/certificate mismatch doesn't imply ret==0 ... | 
|  | } | 
|  |  | 
|  | if (ret) { | 
|  | // If we could set up our certificate, now proceed to the CA | 
|  | // certificates. | 
|  | X509 *ca; | 
|  | int r; | 
|  | uint32_t err; | 
|  |  | 
|  | SSL_CTX_clear_chain_certs(ctx); | 
|  |  | 
|  | while ((ca = PEM_read_bio_X509(in, NULL, ctx->default_passwd_callback, | 
|  | ctx->default_passwd_callback_userdata)) != | 
|  | NULL) { | 
|  | r = SSL_CTX_add0_chain_cert(ctx, ca); | 
|  | if (!r) { | 
|  | X509_free(ca); | 
|  | ret = 0; | 
|  | goto end; | 
|  | } | 
|  | // Note that we must not free r if it was successfully added to the chain | 
|  | // (while we must free the main certificate, since its reference count is | 
|  | // increased by SSL_CTX_use_certificate). | 
|  | } | 
|  |  | 
|  | // When the while loop ends, it's usually just EOF. | 
|  | err = ERR_peek_last_error(); | 
|  | if (ERR_GET_LIB(err) == ERR_LIB_PEM && | 
|  | ERR_GET_REASON(err) == PEM_R_NO_START_LINE) { | 
|  | ERR_clear_error(); | 
|  | } else { | 
|  | ret = 0;  // some real error | 
|  | } | 
|  | } | 
|  |  | 
|  | end: | 
|  | X509_free(x); | 
|  | BIO_free(in); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | void SSL_CTX_set_default_passwd_cb(SSL_CTX *ctx, pem_password_cb *cb) { | 
|  | ctx->default_passwd_callback = cb; | 
|  | } | 
|  |  | 
|  | pem_password_cb *SSL_CTX_get_default_passwd_cb(const SSL_CTX *ctx) { | 
|  | return ctx->default_passwd_callback; | 
|  | } | 
|  |  | 
|  | void SSL_CTX_set_default_passwd_cb_userdata(SSL_CTX *ctx, void *data) { | 
|  | ctx->default_passwd_callback_userdata = data; | 
|  | } | 
|  |  | 
|  | void *SSL_CTX_get_default_passwd_cb_userdata(const SSL_CTX *ctx) { | 
|  | return ctx->default_passwd_callback_userdata; | 
|  | } |