|  | /* | 
|  | * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved. | 
|  | * | 
|  | * Licensed under the OpenSSL license (the "License").  You may not use | 
|  | * this file except in compliance with the License.  You can obtain a copy | 
|  | * in the file LICENSE in the source distribution or at | 
|  | * https://www.openssl.org/source/license.html | 
|  | */ | 
|  |  | 
|  | #include <openssl/asn1.h> | 
|  | #include <openssl/cipher.h> | 
|  | #include <openssl/evp.h> | 
|  | #include <openssl/obj.h> | 
|  | #include <openssl/x509.h> | 
|  |  | 
|  | #include "internal.h" | 
|  |  | 
|  |  | 
|  | long X509_get_version(const X509 *x509) { | 
|  | // The default version is v1(0). | 
|  | if (x509->cert_info->version == NULL) { | 
|  | return X509_VERSION_1; | 
|  | } | 
|  | return ASN1_INTEGER_get(x509->cert_info->version); | 
|  | } | 
|  |  | 
|  | int X509_set_version(X509 *x, long version) { | 
|  | if (x == NULL) { | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | if (version < X509_VERSION_1 || version > X509_VERSION_3) { | 
|  | OPENSSL_PUT_ERROR(X509, X509_R_INVALID_VERSION); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | // v1(0) is default and is represented by omitting the version. | 
|  | if (version == X509_VERSION_1) { | 
|  | ASN1_INTEGER_free(x->cert_info->version); | 
|  | x->cert_info->version = NULL; | 
|  | return 1; | 
|  | } | 
|  |  | 
|  | if (x->cert_info->version == NULL) { | 
|  | x->cert_info->version = ASN1_INTEGER_new(); | 
|  | if (x->cert_info->version == NULL) { | 
|  | return 0; | 
|  | } | 
|  | } | 
|  | return ASN1_INTEGER_set_int64(x->cert_info->version, version); | 
|  | } | 
|  |  | 
|  | int X509_set_serialNumber(X509 *x, const ASN1_INTEGER *serial) { | 
|  | if (serial->type != V_ASN1_INTEGER && serial->type != V_ASN1_NEG_INTEGER) { | 
|  | OPENSSL_PUT_ERROR(ASN1, ASN1_R_WRONG_TYPE); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | ASN1_INTEGER *in; | 
|  | if (x == NULL) { | 
|  | return 0; | 
|  | } | 
|  | in = x->cert_info->serialNumber; | 
|  | if (in != serial) { | 
|  | in = ASN1_INTEGER_dup(serial); | 
|  | if (in != NULL) { | 
|  | ASN1_INTEGER_free(x->cert_info->serialNumber); | 
|  | x->cert_info->serialNumber = in; | 
|  | } | 
|  | } | 
|  | return in != NULL; | 
|  | } | 
|  |  | 
|  | int X509_set_issuer_name(X509 *x, X509_NAME *name) { | 
|  | if ((x == NULL) || (x->cert_info == NULL)) { | 
|  | return 0; | 
|  | } | 
|  | return (X509_NAME_set(&x->cert_info->issuer, name)); | 
|  | } | 
|  |  | 
|  | int X509_set_subject_name(X509 *x, X509_NAME *name) { | 
|  | if ((x == NULL) || (x->cert_info == NULL)) { | 
|  | return 0; | 
|  | } | 
|  | return (X509_NAME_set(&x->cert_info->subject, name)); | 
|  | } | 
|  |  | 
|  | int X509_set1_notBefore(X509 *x, const ASN1_TIME *tm) { | 
|  | ASN1_TIME *in; | 
|  |  | 
|  | if ((x == NULL) || (x->cert_info->validity == NULL)) { | 
|  | return 0; | 
|  | } | 
|  | in = x->cert_info->validity->notBefore; | 
|  | if (in != tm) { | 
|  | in = ASN1_STRING_dup(tm); | 
|  | if (in != NULL) { | 
|  | ASN1_TIME_free(x->cert_info->validity->notBefore); | 
|  | x->cert_info->validity->notBefore = in; | 
|  | } | 
|  | } | 
|  | return in != NULL; | 
|  | } | 
|  |  | 
|  | int X509_set_notBefore(X509 *x, const ASN1_TIME *tm) { | 
|  | return X509_set1_notBefore(x, tm); | 
|  | } | 
|  |  | 
|  | const ASN1_TIME *X509_get0_notBefore(const X509 *x) { | 
|  | return x->cert_info->validity->notBefore; | 
|  | } | 
|  |  | 
|  | ASN1_TIME *X509_getm_notBefore(X509 *x) { | 
|  | // Note this function takes a const |X509| pointer in OpenSSL. We require | 
|  | // non-const as this allows mutating |x|. If it comes up for compatibility, | 
|  | // we can relax this. | 
|  | return x->cert_info->validity->notBefore; | 
|  | } | 
|  |  | 
|  | ASN1_TIME *X509_get_notBefore(const X509 *x509) { | 
|  | // In OpenSSL, this function is an alias for |X509_getm_notBefore|, but our | 
|  | // |X509_getm_notBefore| is const-correct. |X509_get_notBefore| was | 
|  | // originally a macro, so it needs to capture both get0 and getm use cases. | 
|  | return x509->cert_info->validity->notBefore; | 
|  | } | 
|  |  | 
|  | int X509_set1_notAfter(X509 *x, const ASN1_TIME *tm) { | 
|  | ASN1_TIME *in; | 
|  |  | 
|  | if ((x == NULL) || (x->cert_info->validity == NULL)) { | 
|  | return 0; | 
|  | } | 
|  | in = x->cert_info->validity->notAfter; | 
|  | if (in != tm) { | 
|  | in = ASN1_STRING_dup(tm); | 
|  | if (in != NULL) { | 
|  | ASN1_TIME_free(x->cert_info->validity->notAfter); | 
|  | x->cert_info->validity->notAfter = in; | 
|  | } | 
|  | } | 
|  | return in != NULL; | 
|  | } | 
|  |  | 
|  | int X509_set_notAfter(X509 *x, const ASN1_TIME *tm) { | 
|  | return X509_set1_notAfter(x, tm); | 
|  | } | 
|  |  | 
|  | const ASN1_TIME *X509_get0_notAfter(const X509 *x) { | 
|  | return x->cert_info->validity->notAfter; | 
|  | } | 
|  |  | 
|  | ASN1_TIME *X509_getm_notAfter(X509 *x) { | 
|  | // Note this function takes a const |X509| pointer in OpenSSL. We require | 
|  | // non-const as this allows mutating |x|. If it comes up for compatibility, | 
|  | // we can relax this. | 
|  | return x->cert_info->validity->notAfter; | 
|  | } | 
|  |  | 
|  | ASN1_TIME *X509_get_notAfter(const X509 *x509) { | 
|  | // In OpenSSL, this function is an alias for |X509_getm_notAfter|, but our | 
|  | // |X509_getm_notAfter| is const-correct. |X509_get_notAfter| was | 
|  | // originally a macro, so it needs to capture both get0 and getm use cases. | 
|  | return x509->cert_info->validity->notAfter; | 
|  | } | 
|  |  | 
|  | void X509_get0_uids(const X509 *x509, const ASN1_BIT_STRING **out_issuer_uid, | 
|  | const ASN1_BIT_STRING **out_subject_uid) { | 
|  | if (out_issuer_uid != NULL) { | 
|  | *out_issuer_uid = x509->cert_info->issuerUID; | 
|  | } | 
|  | if (out_subject_uid != NULL) { | 
|  | *out_subject_uid = x509->cert_info->subjectUID; | 
|  | } | 
|  | } | 
|  |  | 
|  | int X509_set_pubkey(X509 *x, EVP_PKEY *pkey) { | 
|  | if ((x == NULL) || (x->cert_info == NULL)) { | 
|  | return 0; | 
|  | } | 
|  | return (X509_PUBKEY_set(&(x->cert_info->key), pkey)); | 
|  | } | 
|  |  | 
|  | const STACK_OF(X509_EXTENSION) *X509_get0_extensions(const X509 *x) { | 
|  | return x->cert_info->extensions; | 
|  | } | 
|  |  | 
|  | const X509_ALGOR *X509_get0_tbs_sigalg(const X509 *x) { | 
|  | return x->cert_info->signature; | 
|  | } | 
|  |  | 
|  | X509_PUBKEY *X509_get_X509_PUBKEY(const X509 *x509) { | 
|  | return x509->cert_info->key; | 
|  | } |