xmlsecurityengine/xmlseccrypto/src/xmlsecc_x509vfy.cpp
changeset 15 9b1f1fe06753
parent 0 e35f40988205
child 24 74f0b3eb154c
--- a/xmlsecurityengine/xmlseccrypto/src/xmlsecc_x509vfy.cpp	Tue Jan 26 13:19:26 2010 +0200
+++ b/xmlsecurityengine/xmlseccrypto/src/xmlsecc_x509vfy.cpp	Fri Apr 16 16:57:34 2010 +0300
@@ -86,14 +86,14 @@
     NULL,					/* void* reserved1; */
 };
 
-static int		xmlSecSymbianCryptoX509VerifyCrl			(X509_STORE* xst, 
-									 X509_CRL *crl );
+/*static int		xmlSecSymbianCryptoX509VerifyCrl			(X509_STORE* xst, 
+									 X509_CRL *crl );*/
 static X509*		xmlSecSymbianCryptoX509FindCert			(STACK_OF(X509) *certs,
 									 xmlChar *subjectName,
 									 xmlChar *issuerName, 
 									 xmlChar *issuerSerial,
 									 xmlChar *ski);
-static X509*		xmlSecSymbianCryptoX509FindNextChainCert		(STACK_OF(X509) *chain, 
+/*static X509*		xmlSecSymbianCryptoX509FindNextChainCert		(STACK_OF(X509) *chain, 
 		    							 X509 *cert);
 static int		xmlSecSymbianCryptoX509VerifyCertAgainstCrls		(STACK_OF(X509_CRL) *crls, 
 								         X509* cert);
@@ -109,7 +109,7 @@
 									 X509_NAME *b);
 static int 		xmlSecSymbianCryptoX509_NAME_cmp			(const X509_NAME *a, 
 									 const X509_NAME *b);
-/*
+
 static int 		xmlSecSymbianCryptoX509_NAME_ENTRY_cmp		(const X509_NAME_ENTRY **a, 
 									 const X509_NAME_ENTRY **b);
 */
@@ -178,12 +178,12 @@
 int 	
 xmlSecSymbianCryptoX509StoreKeyCertVerify(xmlSecKeyDataStorePtr store, X509* cert) {
     xmlSecSymbianCryptoX509StoreCtxPtr ctx;
-    X509* res = NULL;
-    X509 *err_cert = NULL;
-    char buf[256];
-    int err = 0, depth;
-    int i;
-    int ret;
+    
+    
+    
+    int err = 0;
+    
+    
 
     xmlSecAssert2(xmlSecKeyDataStoreCheckId(store, xmlSecSymbianCryptoX509StoreId), NULL);
     xmlSecAssert2(cert, NULL);
@@ -259,13 +259,13 @@
 xmlSecSymbianCryptoX509StoreVerify(xmlSecKeyDataStorePtr store, XMLSEC_STACK_OF_X509* certs,
 			     XMLSEC_STACK_OF_X509_CRL* crls, xmlSecKeyInfoCtx* keyInfoCtx) {
     xmlSecSymbianCryptoX509StoreCtxPtr ctx;
-    STACK_OF(X509)* certs2 = NULL;	
+    
     X509* res = NULL;
     X509* cert = NULL;
-    X509 *err_cert = NULL;
-    char buf[256];
-    int err = 0, depth;
-    int i;
+   
+    
+    int err = 0;
+
     int ret;
 
     xmlSecAssert2(xmlSecKeyDataStoreCheckId(store, xmlSecSymbianCryptoX509StoreId), NULL);
@@ -636,7 +636,7 @@
 
 static int
 xmlSecSymbianCryptoX509StoreInitialize(xmlSecKeyDataStorePtr store) {
-    const xmlChar* path;
+    
     
     xmlSecSymbianCryptoX509StoreCtxPtr ctx;
     xmlSecAssert2(xmlSecKeyDataStoreCheckId(store, xmlSecSymbianCryptoX509StoreId), -1);
@@ -751,7 +751,7 @@
  * Low-level x509 functions
  *
  *****************************************************************************/
-static int
+/*static int
 xmlSecSymbianCryptoX509VerifyCrl(X509_STORE* xst, X509_CRL *crl ) {
 
     EVP_PKEY *pkey;
@@ -794,6 +794,7 @@
 #endif		//XMLSEC_FUTURE_SUPPORT    
     return((ret == 1) ? 1 : 0);
 }
+*/
 
 /**
  * xmlSecSymbianCryptoX509FindCert:
@@ -802,8 +803,8 @@
 xmlSecSymbianCryptoX509FindCert(STACK_OF(X509) *certs, xmlChar *subjectName,
 			xmlChar *issuerName, xmlChar *issuerSerial,
 			xmlChar *ski) {
-    X509 *cert = NULL;
-    int i;
+
+    
 
     xmlSecAssert2(certs, NULL);
 #ifdef XMLSEC_FUTURE_SUPPORT    
@@ -940,14 +941,15 @@
 /** 
  * xmlSecSymbianCryptoX509FindNextChainCert:
  */
+ /*
 static X509*
 xmlSecSymbianCryptoX509FindNextChainCert(STACK_OF(X509) *chain, X509 *cert) {
-    unsigned long certSubjHash;
-    int i;
+ 
+  
 
     xmlSecAssert2(chain, NULL);
     xmlSecAssert2(cert, NULL);
-/*    
+ 
     certSubjHash = X509_subject_name_hash(cert);
     for(i = 0; i < sk_X509_num(chain); ++i) {
 	if((sk_X509_value(chain, i) != cert) && 
@@ -956,17 +958,18 @@
 	    return(sk_X509_value(chain, i));
 	}
     }
-*/    
+  
     return(NULL);
 }
-
+*/
 /**
  * xmlSecSymbianCryptoX509VerifyCertAgainstCrls:
  */
+ /*
 static int
 xmlSecSymbianCryptoX509VerifyCertAgainstCrls(STACK_OF(X509_CRL) *crls, X509* cert) {
-    X509_NAME *issuer;
-    X509_CRL *crl = NULL;
+   
+   
 #ifdef XMLSEC_FUTURE_SUPPORT    
     X509_REVOKED *revoked;
     int i, n;
@@ -975,10 +978,10 @@
     xmlSecAssert2(crls, -1);
     xmlSecAssert2(cert, -1);
     
-    /*
+    
      * Try to retrieve a CRL corresponding to the issuer of
      * the current certificate 
-     */    
+      
     n = sk_X509_CRL_num(crls);
     for(i = 0; i < n; i++) {
 	crl = sk_X509_CRL_value(crls, i);     
@@ -988,22 +991,22 @@
 	}
     }
     if((i >= n) || (!crl)){
-	/* no crls for this issuer */
+	// no crls for this issuer 
 	return(1);
     }
 
-    /* 
-     * Check date of CRL to make sure it's not expired 
-     */
+    
+     // Check date of CRL to make sure it's not expired 
+     
     ret = X509_cmp_current_time(X509_CRL_get_nextUpdate(crl));
     if (ret == 0) {
-	/* crl expired */
+	//crl expired 
 	return(1);
     }
     
-    /* 
-     * Check if the current certificate is revoked by this CRL
-     */
+     
+     // Check if the current certificate is revoked by this CRL
+     
     n = sk_num(X509_CRL_get_REVOKED(crl));
     for (i = 0; i < n; i++) {
         revoked = (X509_REVOKED *)sk_value(X509_CRL_get_REVOKED(crl), i);
@@ -1019,16 +1022,18 @@
 #endif		//XMLSEC_FUTURE_SUPPORT    
     return(1);    
 }
+*/
 
 
 /**
  * xmlSecSymbianCryptoX509NameRead:
- */       
+ */  
+ /*     
 static X509_NAME *
 xmlSecSymbianCryptoX509NameRead(xmlSecByte *str, int len) {
-    xmlSecByte name[256];
-    xmlSecByte value[256];
-    int nameLen, valueLen;
+   
+    
+    
     X509_NAME *nm = NULL;
 
     xmlSecAssert2(str, NULL);
@@ -1045,7 +1050,7 @@
     }
     
     while(len > 0) {
-	/* skip spaces after comma or semicolon */
+	//skip spaces after comma or semicolon 
 	while((len > 0) && isspace(*str)) {
 	    ++str; --len;
 	}
@@ -1077,7 +1082,7 @@
 		    return(NULL);
     		}
 		
-		/* skip quote */
+		//skip quote 
 		if((len <= 0) || ((*str) != '\"')) {
 		    xmlSecError(XMLSEC_ERRORS_HERE,
 				NULL,
@@ -1090,7 +1095,7 @@
 		}
                 ++str; --len;
 
-		/* skip spaces before comma or semicolon */
+		//skip spaces before comma or semicolon 
 		while((len > 0) && isspace(*str)) {
 		    ++str; --len;
 		}
@@ -1109,7 +1114,7 @@
 		}
 		type = MBSTRING_ASC;
 	    } else if((*str) == '#') {
-		/* Not implemented currently */
+		//Not implemented currently
 		xmlSecError(XMLSEC_ERRORS_HERE,
 			    NULL,
 			    NULL,
@@ -1144,11 +1149,12 @@
     return(nm);
 }
 
-
+*/
 
 /**
  * xmlSecSymbianCryptoX509NameStringRead:
  */
+ /*
 static int 
 xmlSecSymbianCryptoX509NameStringRead(xmlSecByte **str, int *strLen, 
 			xmlSecByte *res, int resLen,
@@ -1204,11 +1210,13 @@
     (*str) = p;
     return((ingoreTrailingSpaces) ? nonSpace - res + 1 : q - res);
 }
+*/
 
+/*
 static
 int xmlSecSymbianCryptoX509_NAME_cmp(const X509_NAME *a, const X509_NAME *b) {
-    int i,ret;
-/*    
+  
+    
     const X509_NAME_ENTRY *na,*nb;
 
     xmlSecAssert2(a != NULL, -1);
@@ -1227,9 +1235,10 @@
 	    return(ret);
 	}
     }	
-*/
+
     return(0);
 }
+*/
 
 
 /** 
@@ -1238,6 +1247,7 @@
  * we have to sort X509_NAME entries to get correct results.
  * This is ugly but SymbianCrypto does not support it
  */
+ /*
 static int		
 xmlSecSymbianCryptoX509NamesCompare(X509_NAME *a, X509_NAME *b) {
     X509_NAME *a1 = NULL;
@@ -1266,22 +1276,22 @@
         return(1);
     }
         
-    /* sort both */
+    //sort both
     sk_X509_NAME_ENTRY_set_cmp_func(a1->entries, xmlSecSymbianCryptoX509_NAME_ENTRY_cmp);
     sk_X509_NAME_ENTRY_sort(a1->entries);
     sk_X509_NAME_ENTRY_set_cmp_func(b1->entries, xmlSecSymbianCryptoX509_NAME_ENTRY_cmp);
     sk_X509_NAME_ENTRY_sort(b1->entries);
 
-    /* actually compare */
+     //actually compare
     ret = xmlSecSymbianCryptoX509_NAME_cmp(a1, b1);
     
-    /* cleanup */
+    //cleanup
     X509_NAME_free(a1);
     X509_NAME_free(b1);
 #endif		//XMLSEC_FUTURE_SUPPORT    
     return(ret);
 }
-			
+		*/	
 
 /**
  * xmlSecSymbianCryptoX509_NAME_ENTRY_cmp: