31
31
# define SERIAL_RAND_BITS 159
32
32
33
33
BIO * bio_err ;
34
- #if OPENSSL_API_COMPAT >= 30101
34
+ #if OPENSSL_API_COMPAT >= 30000
35
35
OSSL_LIB_CTX * libctx = NULL ;
36
36
static const char * propq = NULL ;
37
37
#endif
@@ -55,7 +55,11 @@ int rand_serial(BIGNUM *b, ASN1_INTEGER *ai)
55
55
if (btmp == NULL )
56
56
return 0 ;
57
57
58
+ #if OPENSSL_API_COMPAT < 10100
59
+ if (!BN_rand (btmp , SERIAL_RAND_BITS , 0 , 0 ))
60
+ #else
58
61
if (!BN_rand (btmp , SERIAL_RAND_BITS , BN_RAND_TOP_ANY , BN_RAND_BOTTOM_ANY ))
62
+ #endif
59
63
goto error ;
60
64
if (ai && !BN_to_ASN1_INTEGER (btmp , ai ))
61
65
goto error ;
@@ -74,24 +78,32 @@ int set_cert_times(X509 *x, const char *startdate, const char *enddate,
74
78
int days )
75
79
{
76
80
if (startdate == NULL || strcmp (startdate , "today" ) == 0 ) {
81
+ #if OPENSSL_API_COMPAT < 10100
82
+ if (X509_gmtime_adj (X509_get_notBefore (x ), 0 ) == NULL )
83
+ #else
77
84
if (X509_gmtime_adj (X509_getm_notBefore (x ), 0 ) == NULL )
85
+ #endif
78
86
return 0 ;
79
87
} else {
80
- #if OPENSSL_API_COMPAT >= 10101
81
- if (!ASN1_TIME_set_string_X509 ( X509_getm_notBefore (x ), startdate ))
88
+ #if OPENSSL_API_COMPAT < 10101
89
+ if (!ASN1_TIME_set_string ( X509_get_notBefore (x ), startdate ))
82
90
#else
83
- if (!ASN1_TIME_set_string (X509_getm_notBefore (x ), startdate ))
91
+ if (!ASN1_TIME_set_string_X509 (X509_getm_notBefore (x ), startdate ))
84
92
#endif
85
93
return 0 ;
86
94
}
87
95
if (enddate == NULL ) {
96
+ #if OPENSSL_API_COMPAT < 10100
97
+ if (X509_time_adj_ex (X509_get_notAfter (x ), days , 0 , NULL )
98
+ #else
88
99
if (X509_time_adj_ex (X509_getm_notAfter (x ), days , 0 , NULL )
100
+ #endif
89
101
== NULL )
90
102
return 0 ;
91
- #if OPENSSL_API_COMPAT >= 10101
92
- } else if (!ASN1_TIME_set_string_X509 ( X509_getm_notAfter (x ), enddate )) {
103
+ #if OPENSSL_API_COMPAT < 10101
104
+ } else if (!ASN1_TIME_set_string ( X509_get_notAfter (x ), enddate )) {
93
105
#else
94
- } else if (!ASN1_TIME_set_string (X509_getm_notAfter (x ), enddate )) {
106
+ } else if (!ASN1_TIME_set_string_X509 (X509_getm_notAfter (x ), enddate )) {
95
107
#endif
96
108
return 0 ;
97
109
}
@@ -140,7 +152,7 @@ int cert_matches_key(const X509 *cert, const EVP_PKEY *pkey)
140
152
int match ;
141
153
142
154
ERR_set_mark ();
143
- match = X509_check_private_key (cert , pkey );
155
+ match = X509_check_private_key (( X509 * ) cert , ( EVP_PKEY * ) pkey );
144
156
ERR_pop_to_mark ();
145
157
return match ;
146
158
}
@@ -175,7 +187,7 @@ int do_X509_REQ_verify(X509_REQ *x, EVP_PKEY *pkey, STACK_OF(OPENSSL_STRING) *vf
175
187
int rv = 0 ;
176
188
177
189
if (do_x509_req_init (x , vfyopts ) > 0 ){
178
- #if OPENSSL_API_COMPAT >= 30101
190
+ #if OPENSSL_API_COMPAT >= 30000
179
191
rv = X509_REQ_verify_ex (x , pkey , libctx , propq );
180
192
#else
181
193
rv = X509_REQ_verify (x , pkey );
@@ -449,7 +461,7 @@ IV set_digest(self, SV* digest)
449
461
#endif
450
462
if (digest != NULL ) {
451
463
digestname = (const char * ) SvPV (digest , digestname_length );
452
- //printf("Digest Name: %s\n", digestname);
464
+ // printf("Digest Name: %s\n", digestname);
453
465
md = (EVP_MD * )EVP_get_digestbyname (digestname );
454
466
}
455
467
@@ -458,7 +470,9 @@ IV set_digest(self, SV* digest)
458
470
RETVAL = 0 ;
459
471
else
460
472
RETVAL = 1 ;
461
- }
473
+ } else {
474
+ //printf("Can't change digets to %s\n", digestname);
475
+ }
462
476
463
477
OUTPUT :
464
478
@@ -617,13 +631,19 @@ SV * sign(self, request_SV, sigopts)
617
631
// Verify the CSR is properly signed
618
632
EVP_PKEY * pkey ;
619
633
if (csr != NULL ) {
634
+ #if OPENSSL_API_COMPAT < 10100
635
+ pkey = X509_REQ_get_pubkey (csr );
636
+ #else
620
637
pkey = X509_REQ_get0_pubkey (csr );
638
+ #endif
639
+ if (pkey == NULL )
640
+ croak ("Warning: unable to get public key from CSR\n" );
621
641
622
642
int ret = do_X509_REQ_verify (csr , pkey , NULL );
623
- if (pkey == NULL || ret < 0 )
624
- croak ("Warning: error while verifying CSR self-signature\n" );
625
643
if (ret == 0 )
626
644
croak ("Verification of CSR failed\n" );
645
+ if ( ret < 0 )
646
+ croak ("Warning: error while verifying CSR self-signature\n" );
627
647
}
628
648
else
629
649
croak ("Unable to properly parse the Certificate Signing Request\n" );
@@ -647,7 +667,11 @@ SV * sign(self, request_SV, sigopts)
647
667
croak ("X509_set_subject_name cannot set subject name\n" );
648
668
649
669
// Update the certificate with the CSR's public key
670
+ #if OPENSSL_API_COMPAT < 10100
671
+ if (!X509_set_pubkey (x , X509_REQ_get_pubkey (csr )))
672
+ #else
650
673
if (!X509_set_pubkey (x , X509_REQ_get0_pubkey (csr )))
674
+ #endif
651
675
croak ("X509_set_pubkey cannot set public key\n" );
652
676
653
677
// FIXME need to look at this
@@ -688,8 +712,10 @@ SV * sign(self, request_SV, sigopts)
688
712
X509V3_set_ctx (& ext_ctx , issuer_cert , x , NULL , NULL , X509V3_CTX_REPLACE );
689
713
if (!X509V3_set_issuer_pkey (& ext_ctx , private_key ))
690
714
croak ("X509V3_set_issuer_pkey cannot set issuer private key\n" );
691
- #else
715
+ #elseif OPENSSL_API_COMPAT >=10010
692
716
X509V3_set_ctx (& ext_ctx , issuer_cert , x , csr , NULL , X509V3_CTX_REPLACE );
717
+ #else
718
+ X509V3_set_ctx (& ext_ctx , issuer_cert , x , csr , NULL , 0 );
693
719
#endif
694
720
695
721
// Set the X509 version of the certificate
@@ -712,12 +738,17 @@ SV * sign(self, request_SV, sigopts)
712
738
}
713
739
if (md != NULL )
714
740
digestname = (const char * ) digestname ;
715
- else
716
- digestname = NULL ;
717
-
741
+ else {
742
+ digestname = NULL ;
743
+ printf ("Failed to set the digest md = Null\n" );
744
+ }
718
745
//printf ("DIGEST NAME = %s\n", digestname);
719
746
// Allocate and a new digest context for certificate signing
747
+ #if OPENSSL_API_COMPAT >= 10100
720
748
mctx = EVP_MD_CTX_new ();
749
+ #else
750
+ mctx = EVP_MD_CTX_create ();
751
+ #endif
721
752
722
753
// Sign the new certificate
723
754
#if OPENSSL_API_COMPAT >= 30101
0 commit comments