1/* $OpenBSD: ts_req_utils.c,v 1.9 2023/07/07 19:37:54 beck Exp $ */
2/* Written by Zoltan Glozik (zglozik@stones.com) for the OpenSSL
3 * project 2002.
4 */
5/* ====================================================================
6 * Copyright (c) 2006 The OpenSSL Project.  All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 *
12 * 1. Redistributions of source code must retain the above copyright
13 *    notice, this list of conditions and the following disclaimer.
14 *
15 * 2. Redistributions in binary form must reproduce the above copyright
16 *    notice, this list of conditions and the following disclaimer in
17 *    the documentation and/or other materials provided with the
18 *    distribution.
19 *
20 * 3. All advertising materials mentioning features or use of this
21 *    software must display the following acknowledgment:
22 *    "This product includes software developed by the OpenSSL Project
23 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24 *
25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26 *    endorse or promote products derived from this software without
27 *    prior written permission. For written permission, please contact
28 *    licensing@OpenSSL.org.
29 *
30 * 5. Products derived from this software may not be called "OpenSSL"
31 *    nor may "OpenSSL" appear in their names without prior written
32 *    permission of the OpenSSL Project.
33 *
34 * 6. Redistributions of any form whatsoever must retain the following
35 *    acknowledgment:
36 *    "This product includes software developed by the OpenSSL Project
37 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38 *
39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50 * OF THE POSSIBILITY OF SUCH DAMAGE.
51 * ====================================================================
52 *
53 * This product includes cryptographic software written by Eric Young
54 * (eay@cryptsoft.com).  This product includes software written by Tim
55 * Hudson (tjh@cryptsoft.com).
56 *
57 */
58
59#include <stdio.h>
60
61#include <openssl/err.h>
62#include <openssl/objects.h>
63#include <openssl/ts.h>
64#include <openssl/x509v3.h>
65
66#include "ts_local.h"
67
68int
69TS_REQ_set_version(TS_REQ *a, long version)
70{
71	return ASN1_INTEGER_set(a->version, version);
72}
73LCRYPTO_ALIAS(TS_REQ_set_version);
74
75long
76TS_REQ_get_version(const TS_REQ *a)
77{
78	return ASN1_INTEGER_get(a->version);
79}
80LCRYPTO_ALIAS(TS_REQ_get_version);
81
82int
83TS_REQ_set_msg_imprint(TS_REQ *a, TS_MSG_IMPRINT *msg_imprint)
84{
85	TS_MSG_IMPRINT *new_msg_imprint;
86
87	if (a->msg_imprint == msg_imprint)
88		return 1;
89	new_msg_imprint = TS_MSG_IMPRINT_dup(msg_imprint);
90	if (new_msg_imprint == NULL) {
91		TSerror(ERR_R_MALLOC_FAILURE);
92		return 0;
93	}
94	TS_MSG_IMPRINT_free(a->msg_imprint);
95	a->msg_imprint = new_msg_imprint;
96	return 1;
97}
98LCRYPTO_ALIAS(TS_REQ_set_msg_imprint);
99
100TS_MSG_IMPRINT *
101TS_REQ_get_msg_imprint(TS_REQ *a)
102{
103	return a->msg_imprint;
104}
105LCRYPTO_ALIAS(TS_REQ_get_msg_imprint);
106
107int
108TS_MSG_IMPRINT_set_algo(TS_MSG_IMPRINT *a, X509_ALGOR *alg)
109{
110	X509_ALGOR *new_alg;
111
112	if (a->hash_algo == alg)
113		return 1;
114	new_alg = X509_ALGOR_dup(alg);
115	if (new_alg == NULL) {
116		TSerror(ERR_R_MALLOC_FAILURE);
117		return 0;
118	}
119	X509_ALGOR_free(a->hash_algo);
120	a->hash_algo = new_alg;
121	return 1;
122}
123LCRYPTO_ALIAS(TS_MSG_IMPRINT_set_algo);
124
125X509_ALGOR *
126TS_MSG_IMPRINT_get_algo(TS_MSG_IMPRINT *a)
127{
128	return a->hash_algo;
129}
130LCRYPTO_ALIAS(TS_MSG_IMPRINT_get_algo);
131
132int
133TS_MSG_IMPRINT_set_msg(TS_MSG_IMPRINT *a, unsigned char *d, int len)
134{
135	return ASN1_OCTET_STRING_set(a->hashed_msg, d, len);
136}
137LCRYPTO_ALIAS(TS_MSG_IMPRINT_set_msg);
138
139ASN1_OCTET_STRING *
140TS_MSG_IMPRINT_get_msg(TS_MSG_IMPRINT *a)
141{
142	return a->hashed_msg;
143}
144LCRYPTO_ALIAS(TS_MSG_IMPRINT_get_msg);
145
146int
147TS_REQ_set_policy_id(TS_REQ *a, const ASN1_OBJECT *policy)
148{
149	ASN1_OBJECT *new_policy;
150
151	if (a->policy_id == policy)
152		return 1;
153	new_policy = OBJ_dup(policy);
154	if (new_policy == NULL) {
155		TSerror(ERR_R_MALLOC_FAILURE);
156		return 0;
157	}
158	ASN1_OBJECT_free(a->policy_id);
159	a->policy_id = new_policy;
160	return 1;
161}
162LCRYPTO_ALIAS(TS_REQ_set_policy_id);
163
164ASN1_OBJECT *
165TS_REQ_get_policy_id(TS_REQ *a)
166{
167	return a->policy_id;
168}
169LCRYPTO_ALIAS(TS_REQ_get_policy_id);
170
171int
172TS_REQ_set_nonce(TS_REQ *a, const ASN1_INTEGER *nonce)
173{
174	ASN1_INTEGER *new_nonce;
175
176	if (a->nonce == nonce)
177		return 1;
178	new_nonce = ASN1_INTEGER_dup(nonce);
179	if (new_nonce == NULL) {
180		TSerror(ERR_R_MALLOC_FAILURE);
181		return 0;
182	}
183	ASN1_INTEGER_free(a->nonce);
184	a->nonce = new_nonce;
185	return 1;
186}
187LCRYPTO_ALIAS(TS_REQ_set_nonce);
188
189const ASN1_INTEGER *
190TS_REQ_get_nonce(const TS_REQ *a)
191{
192	return a->nonce;
193}
194LCRYPTO_ALIAS(TS_REQ_get_nonce);
195
196int
197TS_REQ_set_cert_req(TS_REQ *a, int cert_req)
198{
199	a->cert_req = cert_req ? 0xFF : 0x00;
200	return 1;
201}
202LCRYPTO_ALIAS(TS_REQ_set_cert_req);
203
204int
205TS_REQ_get_cert_req(const TS_REQ *a)
206{
207	return a->cert_req ? 1 : 0;
208}
209LCRYPTO_ALIAS(TS_REQ_get_cert_req);
210
211STACK_OF(X509_EXTENSION) *TS_REQ_get_exts(TS_REQ *a)
212{
213	return a->extensions;
214}
215LCRYPTO_ALIAS(TS_REQ_get_exts);
216
217void
218TS_REQ_ext_free(TS_REQ *a)
219{
220	if (!a)
221		return;
222	sk_X509_EXTENSION_pop_free(a->extensions, X509_EXTENSION_free);
223	a->extensions = NULL;
224}
225LCRYPTO_ALIAS(TS_REQ_ext_free);
226
227int
228TS_REQ_get_ext_count(TS_REQ *a)
229{
230	return X509v3_get_ext_count(a->extensions);
231}
232LCRYPTO_ALIAS(TS_REQ_get_ext_count);
233
234int
235TS_REQ_get_ext_by_NID(TS_REQ *a, int nid, int lastpos)
236{
237	return X509v3_get_ext_by_NID(a->extensions, nid, lastpos);
238}
239LCRYPTO_ALIAS(TS_REQ_get_ext_by_NID);
240
241int
242TS_REQ_get_ext_by_OBJ(TS_REQ *a, const ASN1_OBJECT *obj, int lastpos)
243{
244	return X509v3_get_ext_by_OBJ(a->extensions, obj, lastpos);
245}
246LCRYPTO_ALIAS(TS_REQ_get_ext_by_OBJ);
247
248int
249TS_REQ_get_ext_by_critical(TS_REQ *a, int crit, int lastpos)
250{
251	return X509v3_get_ext_by_critical(a->extensions, crit, lastpos);
252}
253LCRYPTO_ALIAS(TS_REQ_get_ext_by_critical);
254
255X509_EXTENSION *
256TS_REQ_get_ext(TS_REQ *a, int loc)
257{
258	return X509v3_get_ext(a->extensions, loc);
259}
260LCRYPTO_ALIAS(TS_REQ_get_ext);
261
262X509_EXTENSION *
263TS_REQ_delete_ext(TS_REQ *a, int loc)
264{
265	return X509v3_delete_ext(a->extensions, loc);
266}
267LCRYPTO_ALIAS(TS_REQ_delete_ext);
268
269int
270TS_REQ_add_ext(TS_REQ *a, X509_EXTENSION *ex, int loc)
271{
272	return X509v3_add_ext(&a->extensions, ex, loc) != NULL;
273}
274LCRYPTO_ALIAS(TS_REQ_add_ext);
275
276void *
277TS_REQ_get_ext_d2i(TS_REQ *a, int nid, int *crit, int *idx)
278{
279	return X509V3_get_d2i(a->extensions, nid, crit, idx);
280}
281LCRYPTO_ALIAS(TS_REQ_get_ext_d2i);
282