| // Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved. | 
 | // | 
 | // Licensed under the Apache License, Version 2.0 (the "License"); | 
 | // you may not use this file except in compliance with the License. | 
 | // You may obtain a copy of the License at | 
 | // | 
 | //     https://www.apache.org/licenses/LICENSE-2.0 | 
 | // | 
 | // Unless required by applicable law or agreed to in writing, software | 
 | // distributed under the License is distributed on an "AS IS" BASIS, | 
 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
 | // See the License for the specific language governing permissions and | 
 | // limitations under the License. | 
 |  | 
 | #include <stdio.h> | 
 |  | 
 | #include <openssl/asn1t.h> | 
 | #include <openssl/x509.h> | 
 |  | 
 | #include "internal.h" | 
 |  | 
 |  | 
 | // X509_REQ_INFO is handled in an unusual way to get round invalid encodings. | 
 | // Some broken certificate requests don't encode the attributes field if it | 
 | // is empty. This is in violation of PKCS#10 but we need to tolerate it. We | 
 | // do this by making the attributes field OPTIONAL then using the callback to | 
 | // initialise it to an empty STACK. This means that the field will be | 
 | // correctly encoded unless we NULL out the field. | 
 |  | 
 | static int rinf_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, | 
 |                    void *exarg) { | 
 |   X509_REQ_INFO *rinf = (X509_REQ_INFO *)*pval; | 
 |  | 
 |   if (operation == ASN1_OP_NEW_POST) { | 
 |     rinf->attributes = sk_X509_ATTRIBUTE_new_null(); | 
 |     if (!rinf->attributes) { | 
 |       return 0; | 
 |     } | 
 |   } | 
 |  | 
 |   if (operation == ASN1_OP_D2I_POST) { | 
 |     // The only defined CSR version is v1(0). For compatibility, we also accept | 
 |     // a hypothetical v3(2). Although not defined, older versions of certbot | 
 |     // use it. See https://github.com/certbot/certbot/pull/9334. | 
 |     long version = ASN1_INTEGER_get(rinf->version); | 
 |     if (version != X509_REQ_VERSION_1 && version != 2) { | 
 |       OPENSSL_PUT_ERROR(X509, X509_R_INVALID_VERSION); | 
 |       return 0; | 
 |     } | 
 |   } | 
 |  | 
 |   return 1; | 
 | } | 
 |  | 
 | ASN1_SEQUENCE_enc(X509_REQ_INFO, enc, rinf_cb) = { | 
 |     ASN1_SIMPLE(X509_REQ_INFO, version, ASN1_INTEGER), | 
 |     ASN1_SIMPLE(X509_REQ_INFO, subject, X509_NAME), | 
 |     ASN1_SIMPLE(X509_REQ_INFO, pubkey, X509_PUBKEY), | 
 |     // This isn't really OPTIONAL but it gets around invalid encodings. | 
 |     ASN1_IMP_SET_OF_OPT(X509_REQ_INFO, attributes, X509_ATTRIBUTE, 0), | 
 | } ASN1_SEQUENCE_END_enc(X509_REQ_INFO, X509_REQ_INFO) | 
 |  | 
 | IMPLEMENT_ASN1_FUNCTIONS(X509_REQ_INFO) | 
 |  | 
 | ASN1_SEQUENCE(X509_REQ) = { | 
 |     ASN1_SIMPLE(X509_REQ, req_info, X509_REQ_INFO), | 
 |     ASN1_SIMPLE(X509_REQ, sig_alg, X509_ALGOR), | 
 |     ASN1_SIMPLE(X509_REQ, signature, ASN1_BIT_STRING), | 
 | } ASN1_SEQUENCE_END(X509_REQ) | 
 |  | 
 | IMPLEMENT_ASN1_FUNCTIONS(X509_REQ) | 
 |  | 
 | IMPLEMENT_ASN1_DUP_FUNCTION(X509_REQ) |