blob: 332c0a5b2c914271ae01df5790fb144ec5099d0e [file] [log] [blame] [edit]
// Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// https://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include <openssl/asn1.h>
#include <openssl/cipher.h>
#include <openssl/evp.h>
#include <openssl/obj.h>
#include <openssl/x509.h>
#include "internal.h"
long X509_get_version(const X509 *x509) {
// The default version is v1(0).
if (x509->cert_info->version == NULL) {
return X509_VERSION_1;
}
return ASN1_INTEGER_get(x509->cert_info->version);
}
int X509_set_version(X509 *x, long version) {
if (x == NULL) {
return 0;
}
if (version < X509_VERSION_1 || version > X509_VERSION_3) {
OPENSSL_PUT_ERROR(X509, X509_R_INVALID_VERSION);
return 0;
}
// v1(0) is default and is represented by omitting the version.
if (version == X509_VERSION_1) {
ASN1_INTEGER_free(x->cert_info->version);
x->cert_info->version = NULL;
return 1;
}
if (x->cert_info->version == NULL) {
x->cert_info->version = ASN1_INTEGER_new();
if (x->cert_info->version == NULL) {
return 0;
}
}
return ASN1_INTEGER_set_int64(x->cert_info->version, version);
}
int X509_set_serialNumber(X509 *x, const ASN1_INTEGER *serial) {
if (serial->type != V_ASN1_INTEGER && serial->type != V_ASN1_NEG_INTEGER) {
OPENSSL_PUT_ERROR(ASN1, ASN1_R_WRONG_TYPE);
return 0;
}
ASN1_INTEGER *in;
if (x == NULL) {
return 0;
}
in = x->cert_info->serialNumber;
if (in != serial) {
in = ASN1_INTEGER_dup(serial);
if (in != NULL) {
ASN1_INTEGER_free(x->cert_info->serialNumber);
x->cert_info->serialNumber = in;
}
}
return in != NULL;
}
int X509_set_issuer_name(X509 *x, X509_NAME *name) {
if ((x == NULL) || (x->cert_info == NULL)) {
return 0;
}
return (X509_NAME_set(&x->cert_info->issuer, name));
}
int X509_set_subject_name(X509 *x, X509_NAME *name) {
if ((x == NULL) || (x->cert_info == NULL)) {
return 0;
}
return (X509_NAME_set(&x->cert_info->subject, name));
}
int X509_set1_notBefore(X509 *x, const ASN1_TIME *tm) {
ASN1_TIME *in;
if ((x == NULL) || (x->cert_info->validity == NULL)) {
return 0;
}
in = x->cert_info->validity->notBefore;
if (in != tm) {
in = ASN1_STRING_dup(tm);
if (in != NULL) {
ASN1_TIME_free(x->cert_info->validity->notBefore);
x->cert_info->validity->notBefore = in;
}
}
return in != NULL;
}
int X509_set_notBefore(X509 *x, const ASN1_TIME *tm) {
return X509_set1_notBefore(x, tm);
}
const ASN1_TIME *X509_get0_notBefore(const X509 *x) {
return x->cert_info->validity->notBefore;
}
ASN1_TIME *X509_getm_notBefore(X509 *x) {
// Note this function takes a const |X509| pointer in OpenSSL. We require
// non-const as this allows mutating |x|. If it comes up for compatibility,
// we can relax this.
return x->cert_info->validity->notBefore;
}
ASN1_TIME *X509_get_notBefore(const X509 *x509) {
// In OpenSSL, this function is an alias for |X509_getm_notBefore|, but our
// |X509_getm_notBefore| is const-correct. |X509_get_notBefore| was
// originally a macro, so it needs to capture both get0 and getm use cases.
return x509->cert_info->validity->notBefore;
}
int X509_set1_notAfter(X509 *x, const ASN1_TIME *tm) {
ASN1_TIME *in;
if ((x == NULL) || (x->cert_info->validity == NULL)) {
return 0;
}
in = x->cert_info->validity->notAfter;
if (in != tm) {
in = ASN1_STRING_dup(tm);
if (in != NULL) {
ASN1_TIME_free(x->cert_info->validity->notAfter);
x->cert_info->validity->notAfter = in;
}
}
return in != NULL;
}
int X509_set_notAfter(X509 *x, const ASN1_TIME *tm) {
return X509_set1_notAfter(x, tm);
}
const ASN1_TIME *X509_get0_notAfter(const X509 *x) {
return x->cert_info->validity->notAfter;
}
ASN1_TIME *X509_getm_notAfter(X509 *x) {
// Note this function takes a const |X509| pointer in OpenSSL. We require
// non-const as this allows mutating |x|. If it comes up for compatibility,
// we can relax this.
return x->cert_info->validity->notAfter;
}
ASN1_TIME *X509_get_notAfter(const X509 *x509) {
// In OpenSSL, this function is an alias for |X509_getm_notAfter|, but our
// |X509_getm_notAfter| is const-correct. |X509_get_notAfter| was
// originally a macro, so it needs to capture both get0 and getm use cases.
return x509->cert_info->validity->notAfter;
}
void X509_get0_uids(const X509 *x509, const ASN1_BIT_STRING **out_issuer_uid,
const ASN1_BIT_STRING **out_subject_uid) {
if (out_issuer_uid != NULL) {
*out_issuer_uid = x509->cert_info->issuerUID;
}
if (out_subject_uid != NULL) {
*out_subject_uid = x509->cert_info->subjectUID;
}
}
int X509_set_pubkey(X509 *x, EVP_PKEY *pkey) {
if ((x == NULL) || (x->cert_info == NULL)) {
return 0;
}
return (X509_PUBKEY_set(&(x->cert_info->key), pkey));
}
const STACK_OF(X509_EXTENSION) *X509_get0_extensions(const X509 *x) {
return x->cert_info->extensions;
}
const X509_ALGOR *X509_get0_tbs_sigalg(const X509 *x) {
return x->cert_info->signature;
}
X509_PUBKEY *X509_get_X509_PUBKEY(const X509 *x509) {
return x509->cert_info->key;
}