]>
git.ipfire.org Git - thirdparty/openssl.git/blob - crypto/ts/ts_req_utils.c
2 * Copyright 2006-2020 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
11 #include "internal/cryptlib.h"
12 #include <openssl/objects.h>
13 #include <openssl/x509v3.h>
14 #include <openssl/ts.h>
17 int TS_REQ_set_version(TS_REQ
*a
, long version
)
19 return ASN1_INTEGER_set(a
->version
, version
);
22 long TS_REQ_get_version(const TS_REQ
*a
)
24 return ASN1_INTEGER_get(a
->version
);
27 int TS_REQ_set_msg_imprint(TS_REQ
*a
, TS_MSG_IMPRINT
*msg_imprint
)
29 TS_MSG_IMPRINT
*new_msg_imprint
;
31 if (a
->msg_imprint
== msg_imprint
)
33 new_msg_imprint
= TS_MSG_IMPRINT_dup(msg_imprint
);
34 if (new_msg_imprint
== NULL
) {
35 ERR_raise(ERR_LIB_TS
, ERR_R_MALLOC_FAILURE
);
38 TS_MSG_IMPRINT_free(a
->msg_imprint
);
39 a
->msg_imprint
= new_msg_imprint
;
43 TS_MSG_IMPRINT
*TS_REQ_get_msg_imprint(TS_REQ
*a
)
45 return a
->msg_imprint
;
48 int TS_MSG_IMPRINT_set_algo(TS_MSG_IMPRINT
*a
, X509_ALGOR
*alg
)
52 if (a
->hash_algo
== alg
)
54 new_alg
= X509_ALGOR_dup(alg
);
55 if (new_alg
== NULL
) {
56 ERR_raise(ERR_LIB_TS
, ERR_R_MALLOC_FAILURE
);
59 X509_ALGOR_free(a
->hash_algo
);
60 a
->hash_algo
= new_alg
;
64 X509_ALGOR
*TS_MSG_IMPRINT_get_algo(TS_MSG_IMPRINT
*a
)
69 int TS_MSG_IMPRINT_set_msg(TS_MSG_IMPRINT
*a
, unsigned char *d
, int len
)
71 return ASN1_OCTET_STRING_set(a
->hashed_msg
, d
, len
);
74 ASN1_OCTET_STRING
*TS_MSG_IMPRINT_get_msg(TS_MSG_IMPRINT
*a
)
79 int TS_REQ_set_policy_id(TS_REQ
*a
, const ASN1_OBJECT
*policy
)
81 ASN1_OBJECT
*new_policy
;
83 if (a
->policy_id
== policy
)
85 new_policy
= OBJ_dup(policy
);
86 if (new_policy
== NULL
) {
87 ERR_raise(ERR_LIB_TS
, ERR_R_MALLOC_FAILURE
);
90 ASN1_OBJECT_free(a
->policy_id
);
91 a
->policy_id
= new_policy
;
95 ASN1_OBJECT
*TS_REQ_get_policy_id(TS_REQ
*a
)
100 int TS_REQ_set_nonce(TS_REQ
*a
, const ASN1_INTEGER
*nonce
)
102 ASN1_INTEGER
*new_nonce
;
104 if (a
->nonce
== nonce
)
106 new_nonce
= ASN1_INTEGER_dup(nonce
);
107 if (new_nonce
== NULL
) {
108 ERR_raise(ERR_LIB_TS
, ERR_R_MALLOC_FAILURE
);
111 ASN1_INTEGER_free(a
->nonce
);
112 a
->nonce
= new_nonce
;
116 const ASN1_INTEGER
*TS_REQ_get_nonce(const TS_REQ
*a
)
121 int TS_REQ_set_cert_req(TS_REQ
*a
, int cert_req
)
123 a
->cert_req
= cert_req
? 0xFF : 0x00;
127 int TS_REQ_get_cert_req(const TS_REQ
*a
)
129 return a
->cert_req
? 1 : 0;
132 STACK_OF(X509_EXTENSION
) *TS_REQ_get_exts(TS_REQ
*a
)
134 return a
->extensions
;
137 void TS_REQ_ext_free(TS_REQ
*a
)
141 sk_X509_EXTENSION_pop_free(a
->extensions
, X509_EXTENSION_free
);
142 a
->extensions
= NULL
;
145 int TS_REQ_get_ext_count(TS_REQ
*a
)
147 return X509v3_get_ext_count(a
->extensions
);
150 int TS_REQ_get_ext_by_NID(TS_REQ
*a
, int nid
, int lastpos
)
152 return X509v3_get_ext_by_NID(a
->extensions
, nid
, lastpos
);
155 int TS_REQ_get_ext_by_OBJ(TS_REQ
*a
, const ASN1_OBJECT
*obj
, int lastpos
)
157 return X509v3_get_ext_by_OBJ(a
->extensions
, obj
, lastpos
);
160 int TS_REQ_get_ext_by_critical(TS_REQ
*a
, int crit
, int lastpos
)
162 return X509v3_get_ext_by_critical(a
->extensions
, crit
, lastpos
);
165 X509_EXTENSION
*TS_REQ_get_ext(TS_REQ
*a
, int loc
)
167 return X509v3_get_ext(a
->extensions
, loc
);
170 X509_EXTENSION
*TS_REQ_delete_ext(TS_REQ
*a
, int loc
)
172 return X509v3_delete_ext(a
->extensions
, loc
);
175 int TS_REQ_add_ext(TS_REQ
*a
, X509_EXTENSION
*ex
, int loc
)
177 return X509v3_add_ext(&a
->extensions
, ex
, loc
) != NULL
;
180 void *TS_REQ_get_ext_d2i(TS_REQ
*a
, int nid
, int *crit
, int *idx
)
182 return X509V3_get_d2i(a
->extensions
, nid
, crit
, idx
);