1 /* $OpenBSD: ts_req_utils.c,v 1.9 2023/07/07 19:37:54 beck Exp $ */ 2 /* Written by Zoltan Glozik (zglozik@stones.com) for the OpenSSL 3 * project 2002. 4 */ 5 /* ==================================================================== 6 * Copyright (c) 2006 The OpenSSL Project. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in 17 * the documentation and/or other materials provided with the 18 * distribution. 19 * 20 * 3. All advertising materials mentioning features or use of this 21 * software must display the following acknowledgment: 22 * "This product includes software developed by the OpenSSL Project 23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" 24 * 25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 26 * endorse or promote products derived from this software without 27 * prior written permission. For written permission, please contact 28 * licensing@OpenSSL.org. 29 * 30 * 5. Products derived from this software may not be called "OpenSSL" 31 * nor may "OpenSSL" appear in their names without prior written 32 * permission of the OpenSSL Project. 33 * 34 * 6. Redistributions of any form whatsoever must retain the following 35 * acknowledgment: 36 * "This product includes software developed by the OpenSSL Project 37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" 38 * 39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 50 * OF THE POSSIBILITY OF SUCH DAMAGE. 51 * ==================================================================== 52 * 53 * This product includes cryptographic software written by Eric Young 54 * (eay@cryptsoft.com). This product includes software written by Tim 55 * Hudson (tjh@cryptsoft.com). 56 * 57 */ 58 59 #include <stdio.h> 60 61 #include <openssl/err.h> 62 #include <openssl/objects.h> 63 #include <openssl/ts.h> 64 #include <openssl/x509v3.h> 65 66 #include "ts_local.h" 67 68 int 69 TS_REQ_set_version(TS_REQ *a, long version) 70 { 71 return ASN1_INTEGER_set(a->version, version); 72 } 73 LCRYPTO_ALIAS(TS_REQ_set_version); 74 75 long 76 TS_REQ_get_version(const TS_REQ *a) 77 { 78 return ASN1_INTEGER_get(a->version); 79 } 80 LCRYPTO_ALIAS(TS_REQ_get_version); 81 82 int 83 TS_REQ_set_msg_imprint(TS_REQ *a, TS_MSG_IMPRINT *msg_imprint) 84 { 85 TS_MSG_IMPRINT *new_msg_imprint; 86 87 if (a->msg_imprint == msg_imprint) 88 return 1; 89 new_msg_imprint = TS_MSG_IMPRINT_dup(msg_imprint); 90 if (new_msg_imprint == NULL) { 91 TSerror(ERR_R_MALLOC_FAILURE); 92 return 0; 93 } 94 TS_MSG_IMPRINT_free(a->msg_imprint); 95 a->msg_imprint = new_msg_imprint; 96 return 1; 97 } 98 LCRYPTO_ALIAS(TS_REQ_set_msg_imprint); 99 100 TS_MSG_IMPRINT * 101 TS_REQ_get_msg_imprint(TS_REQ *a) 102 { 103 return a->msg_imprint; 104 } 105 LCRYPTO_ALIAS(TS_REQ_get_msg_imprint); 106 107 int 108 TS_MSG_IMPRINT_set_algo(TS_MSG_IMPRINT *a, X509_ALGOR *alg) 109 { 110 X509_ALGOR *new_alg; 111 112 if (a->hash_algo == alg) 113 return 1; 114 new_alg = X509_ALGOR_dup(alg); 115 if (new_alg == NULL) { 116 TSerror(ERR_R_MALLOC_FAILURE); 117 return 0; 118 } 119 X509_ALGOR_free(a->hash_algo); 120 a->hash_algo = new_alg; 121 return 1; 122 } 123 LCRYPTO_ALIAS(TS_MSG_IMPRINT_set_algo); 124 125 X509_ALGOR * 126 TS_MSG_IMPRINT_get_algo(TS_MSG_IMPRINT *a) 127 { 128 return a->hash_algo; 129 } 130 LCRYPTO_ALIAS(TS_MSG_IMPRINT_get_algo); 131 132 int 133 TS_MSG_IMPRINT_set_msg(TS_MSG_IMPRINT *a, unsigned char *d, int len) 134 { 135 return ASN1_OCTET_STRING_set(a->hashed_msg, d, len); 136 } 137 LCRYPTO_ALIAS(TS_MSG_IMPRINT_set_msg); 138 139 ASN1_OCTET_STRING * 140 TS_MSG_IMPRINT_get_msg(TS_MSG_IMPRINT *a) 141 { 142 return a->hashed_msg; 143 } 144 LCRYPTO_ALIAS(TS_MSG_IMPRINT_get_msg); 145 146 int 147 TS_REQ_set_policy_id(TS_REQ *a, const ASN1_OBJECT *policy) 148 { 149 ASN1_OBJECT *new_policy; 150 151 if (a->policy_id == policy) 152 return 1; 153 new_policy = OBJ_dup(policy); 154 if (new_policy == NULL) { 155 TSerror(ERR_R_MALLOC_FAILURE); 156 return 0; 157 } 158 ASN1_OBJECT_free(a->policy_id); 159 a->policy_id = new_policy; 160 return 1; 161 } 162 LCRYPTO_ALIAS(TS_REQ_set_policy_id); 163 164 ASN1_OBJECT * 165 TS_REQ_get_policy_id(TS_REQ *a) 166 { 167 return a->policy_id; 168 } 169 LCRYPTO_ALIAS(TS_REQ_get_policy_id); 170 171 int 172 TS_REQ_set_nonce(TS_REQ *a, const ASN1_INTEGER *nonce) 173 { 174 ASN1_INTEGER *new_nonce; 175 176 if (a->nonce == nonce) 177 return 1; 178 new_nonce = ASN1_INTEGER_dup(nonce); 179 if (new_nonce == NULL) { 180 TSerror(ERR_R_MALLOC_FAILURE); 181 return 0; 182 } 183 ASN1_INTEGER_free(a->nonce); 184 a->nonce = new_nonce; 185 return 1; 186 } 187 LCRYPTO_ALIAS(TS_REQ_set_nonce); 188 189 const ASN1_INTEGER * 190 TS_REQ_get_nonce(const TS_REQ *a) 191 { 192 return a->nonce; 193 } 194 LCRYPTO_ALIAS(TS_REQ_get_nonce); 195 196 int 197 TS_REQ_set_cert_req(TS_REQ *a, int cert_req) 198 { 199 a->cert_req = cert_req ? 0xFF : 0x00; 200 return 1; 201 } 202 LCRYPTO_ALIAS(TS_REQ_set_cert_req); 203 204 int 205 TS_REQ_get_cert_req(const TS_REQ *a) 206 { 207 return a->cert_req ? 1 : 0; 208 } 209 LCRYPTO_ALIAS(TS_REQ_get_cert_req); 210 211 STACK_OF(X509_EXTENSION) *TS_REQ_get_exts(TS_REQ *a) 212 { 213 return a->extensions; 214 } 215 LCRYPTO_ALIAS(TS_REQ_get_exts); 216 217 void 218 TS_REQ_ext_free(TS_REQ *a) 219 { 220 if (!a) 221 return; 222 sk_X509_EXTENSION_pop_free(a->extensions, X509_EXTENSION_free); 223 a->extensions = NULL; 224 } 225 LCRYPTO_ALIAS(TS_REQ_ext_free); 226 227 int 228 TS_REQ_get_ext_count(TS_REQ *a) 229 { 230 return X509v3_get_ext_count(a->extensions); 231 } 232 LCRYPTO_ALIAS(TS_REQ_get_ext_count); 233 234 int 235 TS_REQ_get_ext_by_NID(TS_REQ *a, int nid, int lastpos) 236 { 237 return X509v3_get_ext_by_NID(a->extensions, nid, lastpos); 238 } 239 LCRYPTO_ALIAS(TS_REQ_get_ext_by_NID); 240 241 int 242 TS_REQ_get_ext_by_OBJ(TS_REQ *a, const ASN1_OBJECT *obj, int lastpos) 243 { 244 return X509v3_get_ext_by_OBJ(a->extensions, obj, lastpos); 245 } 246 LCRYPTO_ALIAS(TS_REQ_get_ext_by_OBJ); 247 248 int 249 TS_REQ_get_ext_by_critical(TS_REQ *a, int crit, int lastpos) 250 { 251 return X509v3_get_ext_by_critical(a->extensions, crit, lastpos); 252 } 253 LCRYPTO_ALIAS(TS_REQ_get_ext_by_critical); 254 255 X509_EXTENSION * 256 TS_REQ_get_ext(TS_REQ *a, int loc) 257 { 258 return X509v3_get_ext(a->extensions, loc); 259 } 260 LCRYPTO_ALIAS(TS_REQ_get_ext); 261 262 X509_EXTENSION * 263 TS_REQ_delete_ext(TS_REQ *a, int loc) 264 { 265 return X509v3_delete_ext(a->extensions, loc); 266 } 267 LCRYPTO_ALIAS(TS_REQ_delete_ext); 268 269 int 270 TS_REQ_add_ext(TS_REQ *a, X509_EXTENSION *ex, int loc) 271 { 272 return X509v3_add_ext(&a->extensions, ex, loc) != NULL; 273 } 274 LCRYPTO_ALIAS(TS_REQ_add_ext); 275 276 void * 277 TS_REQ_get_ext_d2i(TS_REQ *a, int nid, int *crit, int *idx) 278 { 279 return X509V3_get_d2i(a->extensions, nid, crit, idx); 280 } 281 LCRYPTO_ALIAS(TS_REQ_get_ext_d2i); 282