+
+#ifndef OPENSSL_NO_TLSEXT
+/* authz_validate returns true iff authz is well formed, i.e. that it meets the
+ * wire format as documented in the CERT_PKEY structure and that there are no
+ * duplicate entries. */
+static char authz_validate(const unsigned char *authz, size_t length)
+ {
+ unsigned char types_seen_bitmap[32];
+
+ if (!authz)
+ return 1;
+
+ memset(types_seen_bitmap, 0, sizeof(types_seen_bitmap));
+
+ for (;;)
+ {
+ unsigned char type, byte, bit;
+ unsigned short len;
+
+ if (!length)
+ return 1;
+
+ type = *(authz++);
+ length--;
+
+ byte = type / 8;
+ bit = type & 7;
+ if (types_seen_bitmap[byte] & (1 << bit))
+ return 0;
+ types_seen_bitmap[byte] |= (1 << bit);
+
+ if (length < 2)
+ return 0;
+ len = ((unsigned short) authz[0]) << 8 |
+ ((unsigned short) authz[1]);
+ authz += 2;
+ length -= 2;
+
+ if (length < len)
+ return 0;
+
+ authz += len;
+ length -= len;
+ }
+ }
+
+static int ssl_set_authz(CERT *c, unsigned char *authz, size_t authz_length)
+ {
+ CERT_PKEY *current_key = c->key;
+ if (current_key == NULL)
+ return 0;
+ if (!authz_validate(authz, authz_length))
+ {
+ SSLerr(SSL_F_SSL_SET_AUTHZ,SSL_R_INVALID_AUTHZ_DATA);
+ return(0);
+ }
+ current_key->authz = OPENSSL_realloc(current_key->authz, authz_length);
+ current_key->authz_length = authz_length;
+ memcpy(current_key->authz, authz, authz_length);
+ return 1;
+ }
+
+int SSL_CTX_use_authz(SSL_CTX *ctx, unsigned char *authz,
+ size_t authz_length)
+ {
+ if (authz == NULL)
+ {
+ SSLerr(SSL_F_SSL_CTX_USE_AUTHZ,ERR_R_PASSED_NULL_PARAMETER);
+ return 0;
+ }
+ if (!ssl_cert_inst(&ctx->cert))
+ {
+ SSLerr(SSL_F_SSL_CTX_USE_AUTHZ,ERR_R_MALLOC_FAILURE);
+ return 0;
+ }
+ return ssl_set_authz(ctx->cert, authz, authz_length);
+ }
+
+int SSL_use_authz(SSL *ssl, unsigned char *authz, size_t authz_length)
+ {
+ if (authz == NULL)
+ {
+ SSLerr(SSL_F_SSL_USE_AUTHZ,ERR_R_PASSED_NULL_PARAMETER);
+ return 0;
+ }
+ if (!ssl_cert_inst(&ssl->cert))
+ {
+ SSLerr(SSL_F_SSL_USE_AUTHZ,ERR_R_MALLOC_FAILURE);
+ return 0;
+ }
+ return ssl_set_authz(ssl->cert, authz, authz_length);
+ }
+#endif /* OPENSSL_NO_TLSEXT */