1 /* Copyright (C) 1995-1998 Eric Young ([email protected])
2 * All rights reserved.
3 *
4 * This package is an SSL implementation written
5 * by Eric Young ([email protected]).
6 * The implementation was written so as to conform with Netscapes SSL.
7 *
8 * This library is free for commercial and non-commercial use as long as
9 * the following conditions are aheared to. The following conditions
10 * apply to all code found in this distribution, be it the RC4, RSA,
11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
12 * included with this distribution is covered by the same copyright terms
13 * except that the holder is Tim Hudson ([email protected]).
14 *
15 * Copyright remains Eric Young's, and as such any Copyright notices in
16 * the code are not to be removed.
17 * If this package is used in a product, Eric Young should be given attribution
18 * as the author of the parts of the library used.
19 * This can be in the form of a textual message at program startup or
20 * in documentation (online or textual) provided with the package.
21 *
22 * Redistribution and use in source and binary forms, with or without
23 * modification, are permitted provided that the following conditions
24 * are met:
25 * 1. Redistributions of source code must retain the copyright
26 * notice, this list of conditions and the following disclaimer.
27 * 2. Redistributions in binary form must reproduce the above copyright
28 * notice, this list of conditions and the following disclaimer in the
29 * documentation and/or other materials provided with the distribution.
30 * 3. All advertising materials mentioning features or use of this software
31 * must display the following acknowledgement:
32 * "This product includes cryptographic software written by
33 * Eric Young ([email protected])"
34 * The word 'cryptographic' can be left out if the rouines from the library
35 * being used are not cryptographic related :-).
36 * 4. If you include any Windows specific code (or a derivative thereof) from
37 * the apps directory (application code) you must include an acknowledgement:
38 * "This product includes software written by Tim Hudson ([email protected])"
39 *
40 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
41 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
43 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
44 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
45 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
46 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
49 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
50 * SUCH DAMAGE.
51 *
52 * The licence and distribution terms for any publically available version or
53 * derivative of this code cannot be changed. i.e. this code cannot simply be
54 * copied and put under another distribution licence
55 * [including the GNU Public Licence.] */
56
57 #include <openssl/asn1.h>
58 #include <openssl/cipher.h>
59 #include <openssl/evp.h>
60 #include <openssl/obj.h>
61 #include <openssl/x509.h>
62
63 #include "internal.h"
64
65
X509_get_version(const X509 * x509)66 long X509_get_version(const X509 *x509) {
67 // The default version is v1(0).
68 if (x509->cert_info->version == NULL) {
69 return X509_VERSION_1;
70 }
71 return ASN1_INTEGER_get(x509->cert_info->version);
72 }
73
X509_set_version(X509 * x,long version)74 int X509_set_version(X509 *x, long version) {
75 if (x == NULL) {
76 return 0;
77 }
78
79 if (version < X509_VERSION_1 || version > X509_VERSION_3) {
80 OPENSSL_PUT_ERROR(X509, X509_R_INVALID_VERSION);
81 return 0;
82 }
83
84 // v1(0) is default and is represented by omitting the version.
85 if (version == X509_VERSION_1) {
86 ASN1_INTEGER_free(x->cert_info->version);
87 x->cert_info->version = NULL;
88 return 1;
89 }
90
91 if (x->cert_info->version == NULL) {
92 x->cert_info->version = ASN1_INTEGER_new();
93 if (x->cert_info->version == NULL) {
94 return 0;
95 }
96 }
97 return ASN1_INTEGER_set_int64(x->cert_info->version, version);
98 }
99
X509_set_serialNumber(X509 * x,const ASN1_INTEGER * serial)100 int X509_set_serialNumber(X509 *x, const ASN1_INTEGER *serial) {
101 if (serial->type != V_ASN1_INTEGER && serial->type != V_ASN1_NEG_INTEGER) {
102 OPENSSL_PUT_ERROR(ASN1, ASN1_R_WRONG_TYPE);
103 return 0;
104 }
105
106 ASN1_INTEGER *in;
107 if (x == NULL) {
108 return 0;
109 }
110 in = x->cert_info->serialNumber;
111 if (in != serial) {
112 in = ASN1_INTEGER_dup(serial);
113 if (in != NULL) {
114 ASN1_INTEGER_free(x->cert_info->serialNumber);
115 x->cert_info->serialNumber = in;
116 }
117 }
118 return in != NULL;
119 }
120
X509_set_issuer_name(X509 * x,X509_NAME * name)121 int X509_set_issuer_name(X509 *x, X509_NAME *name) {
122 if ((x == NULL) || (x->cert_info == NULL)) {
123 return 0;
124 }
125 return (X509_NAME_set(&x->cert_info->issuer, name));
126 }
127
X509_set_subject_name(X509 * x,X509_NAME * name)128 int X509_set_subject_name(X509 *x, X509_NAME *name) {
129 if ((x == NULL) || (x->cert_info == NULL)) {
130 return 0;
131 }
132 return (X509_NAME_set(&x->cert_info->subject, name));
133 }
134
X509_set1_notBefore(X509 * x,const ASN1_TIME * tm)135 int X509_set1_notBefore(X509 *x, const ASN1_TIME *tm) {
136 ASN1_TIME *in;
137
138 if ((x == NULL) || (x->cert_info->validity == NULL)) {
139 return 0;
140 }
141 in = x->cert_info->validity->notBefore;
142 if (in != tm) {
143 in = ASN1_STRING_dup(tm);
144 if (in != NULL) {
145 ASN1_TIME_free(x->cert_info->validity->notBefore);
146 x->cert_info->validity->notBefore = in;
147 }
148 }
149 return in != NULL;
150 }
151
X509_set_notBefore(X509 * x,const ASN1_TIME * tm)152 int X509_set_notBefore(X509 *x, const ASN1_TIME *tm) {
153 return X509_set1_notBefore(x, tm);
154 }
155
X509_get0_notBefore(const X509 * x)156 const ASN1_TIME *X509_get0_notBefore(const X509 *x) {
157 return x->cert_info->validity->notBefore;
158 }
159
X509_getm_notBefore(X509 * x)160 ASN1_TIME *X509_getm_notBefore(X509 *x) {
161 // Note this function takes a const |X509| pointer in OpenSSL. We require
162 // non-const as this allows mutating |x|. If it comes up for compatibility,
163 // we can relax this.
164 return x->cert_info->validity->notBefore;
165 }
166
X509_get_notBefore(const X509 * x509)167 ASN1_TIME *X509_get_notBefore(const X509 *x509) {
168 // In OpenSSL, this function is an alias for |X509_getm_notBefore|, but our
169 // |X509_getm_notBefore| is const-correct. |X509_get_notBefore| was
170 // originally a macro, so it needs to capture both get0 and getm use cases.
171 return x509->cert_info->validity->notBefore;
172 }
173
X509_set1_notAfter(X509 * x,const ASN1_TIME * tm)174 int X509_set1_notAfter(X509 *x, const ASN1_TIME *tm) {
175 ASN1_TIME *in;
176
177 if ((x == NULL) || (x->cert_info->validity == NULL)) {
178 return 0;
179 }
180 in = x->cert_info->validity->notAfter;
181 if (in != tm) {
182 in = ASN1_STRING_dup(tm);
183 if (in != NULL) {
184 ASN1_TIME_free(x->cert_info->validity->notAfter);
185 x->cert_info->validity->notAfter = in;
186 }
187 }
188 return in != NULL;
189 }
190
X509_set_notAfter(X509 * x,const ASN1_TIME * tm)191 int X509_set_notAfter(X509 *x, const ASN1_TIME *tm) {
192 return X509_set1_notAfter(x, tm);
193 }
194
X509_get0_notAfter(const X509 * x)195 const ASN1_TIME *X509_get0_notAfter(const X509 *x) {
196 return x->cert_info->validity->notAfter;
197 }
198
X509_getm_notAfter(X509 * x)199 ASN1_TIME *X509_getm_notAfter(X509 *x) {
200 // Note this function takes a const |X509| pointer in OpenSSL. We require
201 // non-const as this allows mutating |x|. If it comes up for compatibility,
202 // we can relax this.
203 return x->cert_info->validity->notAfter;
204 }
205
X509_get_notAfter(const X509 * x509)206 ASN1_TIME *X509_get_notAfter(const X509 *x509) {
207 // In OpenSSL, this function is an alias for |X509_getm_notAfter|, but our
208 // |X509_getm_notAfter| is const-correct. |X509_get_notAfter| was
209 // originally a macro, so it needs to capture both get0 and getm use cases.
210 return x509->cert_info->validity->notAfter;
211 }
212
X509_get0_uids(const X509 * x509,const ASN1_BIT_STRING ** out_issuer_uid,const ASN1_BIT_STRING ** out_subject_uid)213 void X509_get0_uids(const X509 *x509, const ASN1_BIT_STRING **out_issuer_uid,
214 const ASN1_BIT_STRING **out_subject_uid) {
215 if (out_issuer_uid != NULL) {
216 *out_issuer_uid = x509->cert_info->issuerUID;
217 }
218 if (out_subject_uid != NULL) {
219 *out_subject_uid = x509->cert_info->subjectUID;
220 }
221 }
222
X509_set_pubkey(X509 * x,EVP_PKEY * pkey)223 int X509_set_pubkey(X509 *x, EVP_PKEY *pkey) {
224 if ((x == NULL) || (x->cert_info == NULL)) {
225 return 0;
226 }
227 return (X509_PUBKEY_set(&(x->cert_info->key), pkey));
228 }
229
STACK_OF(X509_EXTENSION)230 const STACK_OF(X509_EXTENSION) *X509_get0_extensions(const X509 *x) {
231 return x->cert_info->extensions;
232 }
233
X509_get0_tbs_sigalg(const X509 * x)234 const X509_ALGOR *X509_get0_tbs_sigalg(const X509 *x) {
235 return x->cert_info->signature;
236 }
237
X509_get_X509_PUBKEY(const X509 * x509)238 X509_PUBKEY *X509_get_X509_PUBKEY(const X509 *x509) {
239 return x509->cert_info->key;
240 }
241