|
44 | 44 | #define WOLFSSL_JNI_CRL_GEN_ENABLED |
45 | 45 | #endif |
46 | 46 |
|
| 47 | +#if defined(HAVE_CRL) && defined(OPENSSL_EXTRA) |
| 48 | +#define WOLFSSL_JNI_CRL_DECODE_ENABLED |
| 49 | +#endif |
| 50 | + |
47 | 51 | JNIEXPORT jlong JNICALL Java_com_wolfssl_WolfSSLCRL_X509_1CRL_1new |
48 | 52 | (JNIEnv* jenv, jclass jcl) |
49 | 53 | { |
@@ -847,3 +851,273 @@ JNIEXPORT jbyteArray JNICALL Java_com_wolfssl_WolfSSLCRL_X509_1CRL_1get_1signatu |
847 | 851 | return NULL; |
848 | 852 | #endif |
849 | 853 | } |
| 854 | + |
| 855 | +JNIEXPORT jlong JNICALL Java_com_wolfssl_WolfSSLCRL_X509_1CRL_1load_1buffer |
| 856 | + (JNIEnv* jenv, jclass jcl, jbyteArray buf, jint format) |
| 857 | +{ |
| 858 | +#if defined(WOLFSSL_JNI_CRL_DECODE_ENABLED) |
| 859 | + WOLFSSL_X509_CRL* crl = NULL; |
| 860 | + byte* bufPtr = NULL; |
| 861 | + int bufSz = 0; |
| 862 | + (void)jcl; |
| 863 | + |
| 864 | + if (jenv == NULL || buf == NULL) { |
| 865 | + return 0; |
| 866 | + } |
| 867 | + |
| 868 | + bufPtr = (byte*)(*jenv)->GetByteArrayElements( |
| 869 | + jenv, buf, NULL); |
| 870 | + bufSz = (*jenv)->GetArrayLength(jenv, buf); |
| 871 | + |
| 872 | + if (bufPtr == NULL || bufSz <= 0) { |
| 873 | + if (bufPtr != NULL) { |
| 874 | + (*jenv)->ReleaseByteArrayElements( |
| 875 | + jenv, buf, (jbyte*)bufPtr, JNI_ABORT); |
| 876 | + } |
| 877 | + return 0; |
| 878 | + } |
| 879 | + |
| 880 | + if ((int)format == WOLFSSL_FILETYPE_PEM) { |
| 881 | + /* PEM format: use BIO to decode */ |
| 882 | + WOLFSSL_BIO* bio = wolfSSL_BIO_new_mem_buf( |
| 883 | + bufPtr, bufSz); |
| 884 | + if (bio != NULL) { |
| 885 | + crl = wolfSSL_PEM_read_bio_X509_CRL( |
| 886 | + bio, NULL, NULL, NULL); |
| 887 | + wolfSSL_BIO_free(bio); |
| 888 | + } |
| 889 | + } |
| 890 | + else { |
| 891 | + /* DER format: decode directly */ |
| 892 | + crl = wolfSSL_d2i_X509_CRL( |
| 893 | + NULL, (const unsigned char*)bufPtr, bufSz); |
| 894 | + } |
| 895 | + |
| 896 | + (*jenv)->ReleaseByteArrayElements( |
| 897 | + jenv, buf, (jbyte*)bufPtr, JNI_ABORT); |
| 898 | + |
| 899 | + return (jlong)(uintptr_t)crl; |
| 900 | +#else |
| 901 | + (void)jenv; |
| 902 | + (void)jcl; |
| 903 | + (void)buf; |
| 904 | + (void)format; |
| 905 | + return 0; |
| 906 | +#endif |
| 907 | +} |
| 908 | + |
| 909 | +JNIEXPORT jlong JNICALL Java_com_wolfssl_WolfSSLCRL_X509_1CRL_1load_1file |
| 910 | + (JNIEnv* jenv, jclass jcl, jstring path, jint format) |
| 911 | +{ |
| 912 | +#if defined(WOLFSSL_JNI_CRL_DECODE_ENABLED) && \ |
| 913 | + !defined(NO_FILESYSTEM) |
| 914 | + WOLFSSL_X509_CRL* crl = NULL; |
| 915 | + const char* cPath = NULL; |
| 916 | + XFILE fp = XBADFILE; |
| 917 | + (void)jcl; |
| 918 | + |
| 919 | + if (jenv == NULL || path == NULL) { |
| 920 | + return 0; |
| 921 | + } |
| 922 | + |
| 923 | + cPath = (*jenv)->GetStringUTFChars(jenv, path, NULL); |
| 924 | + if (cPath == NULL) { |
| 925 | + return 0; |
| 926 | + } |
| 927 | + |
| 928 | + fp = XFOPEN(cPath, "rb"); |
| 929 | + if (fp == XBADFILE) { |
| 930 | + (*jenv)->ReleaseStringUTFChars(jenv, path, cPath); |
| 931 | + return 0; |
| 932 | + } |
| 933 | + |
| 934 | + if ((int)format == WOLFSSL_FILETYPE_PEM) { |
| 935 | + crl = wolfSSL_PEM_read_X509_CRL( |
| 936 | + fp, NULL, NULL, NULL); |
| 937 | + } |
| 938 | + else { |
| 939 | + crl = wolfSSL_d2i_X509_CRL_fp(fp, NULL); |
| 940 | + } |
| 941 | + |
| 942 | + XFCLOSE(fp); |
| 943 | + (*jenv)->ReleaseStringUTFChars(jenv, path, cPath); |
| 944 | + |
| 945 | + return (jlong)(uintptr_t)crl; |
| 946 | +#else |
| 947 | + (void)jenv; |
| 948 | + (void)jcl; |
| 949 | + (void)path; |
| 950 | + (void)format; |
| 951 | + return 0; |
| 952 | +#endif |
| 953 | +} |
| 954 | + |
| 955 | +JNIEXPORT jstring JNICALL Java_com_wolfssl_WolfSSLCRL_X509_1CRL_1get_1issuer_1name_1string |
| 956 | + (JNIEnv* jenv, jclass jcl, jlong crlPtr) |
| 957 | +{ |
| 958 | +#if defined(WOLFSSL_JNI_CRL_DECODE_ENABLED) |
| 959 | + WOLFSSL_X509_CRL* crl = |
| 960 | + (WOLFSSL_X509_CRL*)(uintptr_t)crlPtr; |
| 961 | + WOLFSSL_X509_NAME* name = NULL; |
| 962 | + char* nameStr = NULL; |
| 963 | + jstring ret = NULL; |
| 964 | + (void)jcl; |
| 965 | + |
| 966 | + if (jenv == NULL || crl == NULL) { |
| 967 | + return NULL; |
| 968 | + } |
| 969 | + |
| 970 | + name = wolfSSL_X509_CRL_get_issuer_name(crl); |
| 971 | + if (name != NULL) { |
| 972 | + nameStr = wolfSSL_X509_NAME_oneline(name, NULL, 0); |
| 973 | + if (nameStr == NULL) { |
| 974 | + return NULL; |
| 975 | + } |
| 976 | + ret = (*jenv)->NewStringUTF(jenv, nameStr); |
| 977 | + XFREE(nameStr, NULL, DYNAMIC_TYPE_OPENSSL); |
| 978 | + return ret; |
| 979 | + } |
| 980 | + return NULL; |
| 981 | +#else |
| 982 | + (void)jenv; |
| 983 | + (void)jcl; |
| 984 | + (void)crlPtr; |
| 985 | + return NULL; |
| 986 | +#endif |
| 987 | +} |
| 988 | + |
| 989 | +JNIEXPORT jint JNICALL Java_com_wolfssl_WolfSSLCRL_X509_1CRL_1get_1signature_1type |
| 990 | + (JNIEnv* jenv, jclass jcl, jlong crlPtr) |
| 991 | +{ |
| 992 | +#if defined(WOLFSSL_JNI_CRL_DECODE_ENABLED) |
| 993 | + WOLFSSL_X509_CRL* crl = |
| 994 | + (WOLFSSL_X509_CRL*)(uintptr_t)crlPtr; |
| 995 | + (void)jcl; |
| 996 | + |
| 997 | + if (jenv == NULL || crl == NULL) { |
| 998 | + return 0; |
| 999 | + } |
| 1000 | + |
| 1001 | + return (jint)wolfSSL_X509_CRL_get_signature_type(crl); |
| 1002 | +#else |
| 1003 | + (void)jenv; |
| 1004 | + (void)jcl; |
| 1005 | + (void)crlPtr; |
| 1006 | + return 0; |
| 1007 | +#endif |
| 1008 | +} |
| 1009 | + |
| 1010 | +JNIEXPORT jint JNICALL Java_com_wolfssl_WolfSSLCRL_X509_1CRL_1get_1signature_1nid |
| 1011 | + (JNIEnv* jenv, jclass jcl, jlong crlPtr) |
| 1012 | +{ |
| 1013 | +#if defined(WOLFSSL_JNI_CRL_DECODE_ENABLED) |
| 1014 | + WOLFSSL_X509_CRL* crl = |
| 1015 | + (WOLFSSL_X509_CRL*)(uintptr_t)crlPtr; |
| 1016 | + (void)jcl; |
| 1017 | + |
| 1018 | + if (jenv == NULL || crl == NULL) { |
| 1019 | + return 0; |
| 1020 | + } |
| 1021 | + |
| 1022 | + return (jint)wolfSSL_X509_CRL_get_signature_nid(crl); |
| 1023 | +#else |
| 1024 | + (void)jenv; |
| 1025 | + (void)jcl; |
| 1026 | + (void)crlPtr; |
| 1027 | + return 0; |
| 1028 | +#endif |
| 1029 | +} |
| 1030 | + |
| 1031 | +/* TODO: wolfSSL_X509_CRL_verify() is currently a stub in wolfSSL |
| 1032 | + * (src/x509.c, guarded by NO_WOLFSSL_STUB) and always returns 0. |
| 1033 | + * This JNI wrapper is provided for API completeness and will work |
| 1034 | + * correctly once the native implementation is completed. */ |
| 1035 | +JNIEXPORT jint JNICALL Java_com_wolfssl_WolfSSLCRL_X509_1CRL_1verify |
| 1036 | + (JNIEnv* jenv, jclass jcl, jlong crlPtr, jbyteArray pubKey, |
| 1037 | + jint pubKeySz) |
| 1038 | +{ |
| 1039 | +#if defined(WOLFSSL_JNI_CRL_DECODE_ENABLED) |
| 1040 | + WOLFSSL_X509_CRL* crl = |
| 1041 | + (WOLFSSL_X509_CRL*)(uintptr_t)crlPtr; |
| 1042 | + WOLFSSL_EVP_PKEY* pkey = NULL; |
| 1043 | + unsigned char* buf = NULL; |
| 1044 | +#if LIBWOLFSSL_VERSION_HEX >= 0x04004000 |
| 1045 | + const unsigned char* ptr = NULL; |
| 1046 | +#else |
| 1047 | + unsigned char* ptr = NULL; |
| 1048 | +#endif |
| 1049 | + int ret; |
| 1050 | + (void)jcl; |
| 1051 | + |
| 1052 | + if (jenv == NULL || crl == NULL || |
| 1053 | + pubKey == NULL || (int)pubKeySz < 0) { |
| 1054 | + return BAD_FUNC_ARG; |
| 1055 | + } |
| 1056 | + |
| 1057 | + buf = (unsigned char*)XMALLOC(pubKeySz, NULL, |
| 1058 | + DYNAMIC_TYPE_TMP_BUFFER); |
| 1059 | + if (buf == NULL) { |
| 1060 | + return MEMORY_E; |
| 1061 | + } |
| 1062 | + XMEMSET(buf, 0, pubKeySz); |
| 1063 | + |
| 1064 | + (*jenv)->GetByteArrayRegion(jenv, pubKey, 0, |
| 1065 | + pubKeySz, (jbyte*)buf); |
| 1066 | + if ((*jenv)->ExceptionOccurred(jenv)) { |
| 1067 | + (*jenv)->ExceptionDescribe(jenv); |
| 1068 | + (*jenv)->ExceptionClear(jenv); |
| 1069 | + XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
| 1070 | + return WOLFSSL_FAILURE; |
| 1071 | + } |
| 1072 | + ptr = buf; |
| 1073 | + |
| 1074 | + pkey = wolfSSL_d2i_PUBKEY(NULL, &ptr, |
| 1075 | + (int)pubKeySz); |
| 1076 | + if (pkey == NULL) { |
| 1077 | + XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
| 1078 | + return WOLFSSL_FAILURE; |
| 1079 | + } |
| 1080 | + |
| 1081 | + ret = wolfSSL_X509_CRL_verify(crl, pkey); |
| 1082 | + |
| 1083 | + wolfSSL_EVP_PKEY_free(pkey); |
| 1084 | + XFREE(buf, NULL, DYNAMIC_TYPE_TMP_BUFFER); |
| 1085 | + |
| 1086 | + return ret; |
| 1087 | +#else |
| 1088 | + (void)jenv; |
| 1089 | + (void)jcl; |
| 1090 | + (void)crlPtr; |
| 1091 | + (void)pubKey; |
| 1092 | + (void)pubKeySz; |
| 1093 | + return 0; |
| 1094 | +#endif |
| 1095 | +} |
| 1096 | + |
| 1097 | +/* TODO: wolfSSL_X509_CRL_get_REVOKED() is currently a stub in wolfSSL |
| 1098 | + * (src/x509.c, guarded by NO_WOLFSSL_STUB) and always returns NULL. |
| 1099 | + * This JNI wrapper is provided for API completeness and will work |
| 1100 | + * correctly once the native implementation is completed. */ |
| 1101 | +JNIEXPORT jlong JNICALL Java_com_wolfssl_WolfSSLCRL_X509_1CRL_1get_1REVOKED |
| 1102 | + (JNIEnv* jenv, jclass jcl, jlong crlPtr) |
| 1103 | +{ |
| 1104 | +#if defined(WOLFSSL_JNI_CRL_DECODE_ENABLED) |
| 1105 | + WOLFSSL_X509_CRL* crl = |
| 1106 | + (WOLFSSL_X509_CRL*)(uintptr_t)crlPtr; |
| 1107 | + WOLFSSL_X509_REVOKED* revoked = NULL; |
| 1108 | + (void)jcl; |
| 1109 | + |
| 1110 | + if (jenv == NULL || crl == NULL) { |
| 1111 | + return 0; |
| 1112 | + } |
| 1113 | + |
| 1114 | + revoked = wolfSSL_X509_CRL_get_REVOKED(crl); |
| 1115 | + |
| 1116 | + return (jlong)(uintptr_t)revoked; |
| 1117 | +#else |
| 1118 | + (void)jenv; |
| 1119 | + (void)jcl; |
| 1120 | + (void)crlPtr; |
| 1121 | + return 0; |
| 1122 | +#endif |
| 1123 | +} |
0 commit comments