1/* $OpenBSD: ts_req_utils.c,v 1.9 2023/07/07 19:37:54 beck Exp $ */ 2/* Written by Zoltan Glozik (zglozik@stones.com) for the OpenSSL 3 * project 2002. 4 */ 5/* ==================================================================== 6 * Copyright (c) 2006 The OpenSSL Project. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in 17 * the documentation and/or other materials provided with the 18 * distribution. 19 * 20 * 3. All advertising materials mentioning features or use of this 21 * software must display the following acknowledgment: 22 * "This product includes software developed by the OpenSSL Project 23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" 24 * 25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 26 * endorse or promote products derived from this software without 27 * prior written permission. For written permission, please contact 28 * licensing@OpenSSL.org. 29 * 30 * 5. Products derived from this software may not be called "OpenSSL" 31 * nor may "OpenSSL" appear in their names without prior written 32 * permission of the OpenSSL Project. 33 * 34 * 6. Redistributions of any form whatsoever must retain the following 35 * acknowledgment: 36 * "This product includes software developed by the OpenSSL Project 37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" 38 * 39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 50 * OF THE POSSIBILITY OF SUCH DAMAGE. 51 * ==================================================================== 52 * 53 * This product includes cryptographic software written by Eric Young 54 * (eay@cryptsoft.com). This product includes software written by Tim 55 * Hudson (tjh@cryptsoft.com). 56 * 57 */ 58 59#include <stdio.h> 60 61#include <openssl/err.h> 62#include <openssl/objects.h> 63#include <openssl/ts.h> 64#include <openssl/x509v3.h> 65 66#include "ts_local.h" 67 68int 69TS_REQ_set_version(TS_REQ *a, long version) 70{ 71 return ASN1_INTEGER_set(a->version, version); 72} 73LCRYPTO_ALIAS(TS_REQ_set_version); 74 75long 76TS_REQ_get_version(const TS_REQ *a) 77{ 78 return ASN1_INTEGER_get(a->version); 79} 80LCRYPTO_ALIAS(TS_REQ_get_version); 81 82int 83TS_REQ_set_msg_imprint(TS_REQ *a, TS_MSG_IMPRINT *msg_imprint) 84{ 85 TS_MSG_IMPRINT *new_msg_imprint; 86 87 if (a->msg_imprint == msg_imprint) 88 return 1; 89 new_msg_imprint = TS_MSG_IMPRINT_dup(msg_imprint); 90 if (new_msg_imprint == NULL) { 91 TSerror(ERR_R_MALLOC_FAILURE); 92 return 0; 93 } 94 TS_MSG_IMPRINT_free(a->msg_imprint); 95 a->msg_imprint = new_msg_imprint; 96 return 1; 97} 98LCRYPTO_ALIAS(TS_REQ_set_msg_imprint); 99 100TS_MSG_IMPRINT * 101TS_REQ_get_msg_imprint(TS_REQ *a) 102{ 103 return a->msg_imprint; 104} 105LCRYPTO_ALIAS(TS_REQ_get_msg_imprint); 106 107int 108TS_MSG_IMPRINT_set_algo(TS_MSG_IMPRINT *a, X509_ALGOR *alg) 109{ 110 X509_ALGOR *new_alg; 111 112 if (a->hash_algo == alg) 113 return 1; 114 new_alg = X509_ALGOR_dup(alg); 115 if (new_alg == NULL) { 116 TSerror(ERR_R_MALLOC_FAILURE); 117 return 0; 118 } 119 X509_ALGOR_free(a->hash_algo); 120 a->hash_algo = new_alg; 121 return 1; 122} 123LCRYPTO_ALIAS(TS_MSG_IMPRINT_set_algo); 124 125X509_ALGOR * 126TS_MSG_IMPRINT_get_algo(TS_MSG_IMPRINT *a) 127{ 128 return a->hash_algo; 129} 130LCRYPTO_ALIAS(TS_MSG_IMPRINT_get_algo); 131 132int 133TS_MSG_IMPRINT_set_msg(TS_MSG_IMPRINT *a, unsigned char *d, int len) 134{ 135 return ASN1_OCTET_STRING_set(a->hashed_msg, d, len); 136} 137LCRYPTO_ALIAS(TS_MSG_IMPRINT_set_msg); 138 139ASN1_OCTET_STRING * 140TS_MSG_IMPRINT_get_msg(TS_MSG_IMPRINT *a) 141{ 142 return a->hashed_msg; 143} 144LCRYPTO_ALIAS(TS_MSG_IMPRINT_get_msg); 145 146int 147TS_REQ_set_policy_id(TS_REQ *a, const ASN1_OBJECT *policy) 148{ 149 ASN1_OBJECT *new_policy; 150 151 if (a->policy_id == policy) 152 return 1; 153 new_policy = OBJ_dup(policy); 154 if (new_policy == NULL) { 155 TSerror(ERR_R_MALLOC_FAILURE); 156 return 0; 157 } 158 ASN1_OBJECT_free(a->policy_id); 159 a->policy_id = new_policy; 160 return 1; 161} 162LCRYPTO_ALIAS(TS_REQ_set_policy_id); 163 164ASN1_OBJECT * 165TS_REQ_get_policy_id(TS_REQ *a) 166{ 167 return a->policy_id; 168} 169LCRYPTO_ALIAS(TS_REQ_get_policy_id); 170 171int 172TS_REQ_set_nonce(TS_REQ *a, const ASN1_INTEGER *nonce) 173{ 174 ASN1_INTEGER *new_nonce; 175 176 if (a->nonce == nonce) 177 return 1; 178 new_nonce = ASN1_INTEGER_dup(nonce); 179 if (new_nonce == NULL) { 180 TSerror(ERR_R_MALLOC_FAILURE); 181 return 0; 182 } 183 ASN1_INTEGER_free(a->nonce); 184 a->nonce = new_nonce; 185 return 1; 186} 187LCRYPTO_ALIAS(TS_REQ_set_nonce); 188 189const ASN1_INTEGER * 190TS_REQ_get_nonce(const TS_REQ *a) 191{ 192 return a->nonce; 193} 194LCRYPTO_ALIAS(TS_REQ_get_nonce); 195 196int 197TS_REQ_set_cert_req(TS_REQ *a, int cert_req) 198{ 199 a->cert_req = cert_req ? 0xFF : 0x00; 200 return 1; 201} 202LCRYPTO_ALIAS(TS_REQ_set_cert_req); 203 204int 205TS_REQ_get_cert_req(const TS_REQ *a) 206{ 207 return a->cert_req ? 1 : 0; 208} 209LCRYPTO_ALIAS(TS_REQ_get_cert_req); 210 211STACK_OF(X509_EXTENSION) *TS_REQ_get_exts(TS_REQ *a) 212{ 213 return a->extensions; 214} 215LCRYPTO_ALIAS(TS_REQ_get_exts); 216 217void 218TS_REQ_ext_free(TS_REQ *a) 219{ 220 if (!a) 221 return; 222 sk_X509_EXTENSION_pop_free(a->extensions, X509_EXTENSION_free); 223 a->extensions = NULL; 224} 225LCRYPTO_ALIAS(TS_REQ_ext_free); 226 227int 228TS_REQ_get_ext_count(TS_REQ *a) 229{ 230 return X509v3_get_ext_count(a->extensions); 231} 232LCRYPTO_ALIAS(TS_REQ_get_ext_count); 233 234int 235TS_REQ_get_ext_by_NID(TS_REQ *a, int nid, int lastpos) 236{ 237 return X509v3_get_ext_by_NID(a->extensions, nid, lastpos); 238} 239LCRYPTO_ALIAS(TS_REQ_get_ext_by_NID); 240 241int 242TS_REQ_get_ext_by_OBJ(TS_REQ *a, const ASN1_OBJECT *obj, int lastpos) 243{ 244 return X509v3_get_ext_by_OBJ(a->extensions, obj, lastpos); 245} 246LCRYPTO_ALIAS(TS_REQ_get_ext_by_OBJ); 247 248int 249TS_REQ_get_ext_by_critical(TS_REQ *a, int crit, int lastpos) 250{ 251 return X509v3_get_ext_by_critical(a->extensions, crit, lastpos); 252} 253LCRYPTO_ALIAS(TS_REQ_get_ext_by_critical); 254 255X509_EXTENSION * 256TS_REQ_get_ext(TS_REQ *a, int loc) 257{ 258 return X509v3_get_ext(a->extensions, loc); 259} 260LCRYPTO_ALIAS(TS_REQ_get_ext); 261 262X509_EXTENSION * 263TS_REQ_delete_ext(TS_REQ *a, int loc) 264{ 265 return X509v3_delete_ext(a->extensions, loc); 266} 267LCRYPTO_ALIAS(TS_REQ_delete_ext); 268 269int 270TS_REQ_add_ext(TS_REQ *a, X509_EXTENSION *ex, int loc) 271{ 272 return X509v3_add_ext(&a->extensions, ex, loc) != NULL; 273} 274LCRYPTO_ALIAS(TS_REQ_add_ext); 275 276void * 277TS_REQ_get_ext_d2i(TS_REQ *a, int nid, int *crit, int *idx) 278{ 279 return X509V3_get_d2i(a->extensions, nid, crit, idx); 280} 281LCRYPTO_ALIAS(TS_REQ_get_ext_d2i); 282