Loading crypto/x509/x509_lcl.h +2 −0 Original line number Diff line number Diff line Loading @@ -68,3 +68,5 @@ struct X509_VERIFY_PARAM_ID_st unsigned char *ip; /* If not NULL IP address to match */ size_t iplen; /* Length of IP address */ }; int x509_check_cert_time(X509_STORE_CTX *ctx, X509 *x, int quiet); crypto/x509/x509_lu.c +18 −4 Original line number Diff line number Diff line Loading @@ -61,6 +61,7 @@ #include <openssl/lhash.h> #include <openssl/x509.h> #include <openssl/x509v3.h> #include "x509_lcl.h" X509_LOOKUP *X509_LOOKUP_new(X509_LOOKUP_METHOD *method) { Loading Loading @@ -639,6 +640,7 @@ int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) X509_NAME *xn; X509_OBJECT obj, *pobj; int i, ok, idx, ret; *issuer = NULL; xn=X509_get_issuer_name(x); ok=X509_STORE_get_by_subject(ctx,X509_LU_X509,xn,&obj); if (ok != X509_LU_X509) Loading @@ -659,10 +661,13 @@ int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) } /* If certificate matches all OK */ if (ctx->check_issued(ctx, x, obj.data.x509)) { if (x509_check_cert_time(ctx, obj.data.x509, 1)) { *issuer = obj.data.x509; return 1; } } X509_OBJECT_free_contents(&obj); /* Else find index of first cert accepted by 'check_issued' */ Loading @@ -683,13 +688,22 @@ int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) if (ctx->check_issued(ctx, x, pobj->data.x509)) { *issuer = pobj->data.x509; X509_OBJECT_up_ref_count(pobj); ret = 1; /* * If times check, exit with match, * otherwise keep looking. Leave last * match in issuer so we return nearest * match if no certificate time is OK. */ if (x509_check_cert_time(ctx, *issuer, 1)) break; } } } CRYPTO_w_unlock(CRYPTO_LOCK_X509_STORE); if (*issuer) CRYPTO_add(&(*issuer)->references,1,CRYPTO_LOCK_X509); return ret; } Loading crypto/x509/x509_vfy.c +17 −5 Original line number Diff line number Diff line Loading @@ -469,14 +469,18 @@ end: static X509 *find_issuer(X509_STORE_CTX *ctx, STACK_OF(X509) *sk, X509 *x) { int i; X509 *issuer; X509 *issuer, *rv = NULL;; for (i = 0; i < sk_X509_num(sk); i++) { issuer = sk_X509_value(sk, i); if (ctx->check_issued(ctx, x, issuer)) return issuer; { rv = issuer; if (x509_check_cert_time(ctx, rv, 1)) break; } return NULL; } return rv; } /* Given a possible certificate and issuer check them */ Loading Loading @@ -1694,7 +1698,7 @@ static int check_policy(X509_STORE_CTX *ctx) return 1; } static int check_cert_time(X509_STORE_CTX *ctx, X509 *x) int x509_check_cert_time(X509_STORE_CTX *ctx, X509 *x, int quiet) { time_t *ptime; int i; Loading @@ -1707,6 +1711,8 @@ static int check_cert_time(X509_STORE_CTX *ctx, X509 *x) i=X509_cmp_time(X509_get_notBefore(x), ptime); if (i == 0) { if (quiet) return 0; ctx->error=X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD; ctx->current_cert=x; if (!ctx->verify_cb(0, ctx)) Loading @@ -1715,6 +1721,8 @@ static int check_cert_time(X509_STORE_CTX *ctx, X509 *x) if (i > 0) { if (quiet) return 0; ctx->error=X509_V_ERR_CERT_NOT_YET_VALID; ctx->current_cert=x; if (!ctx->verify_cb(0, ctx)) Loading @@ -1724,6 +1732,8 @@ static int check_cert_time(X509_STORE_CTX *ctx, X509 *x) i=X509_cmp_time(X509_get_notAfter(x), ptime); if (i == 0) { if (quiet) return 0; ctx->error=X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD; ctx->current_cert=x; if (!ctx->verify_cb(0, ctx)) Loading @@ -1732,6 +1742,8 @@ static int check_cert_time(X509_STORE_CTX *ctx, X509 *x) if (i < 0) { if (quiet) return 0; ctx->error=X509_V_ERR_CERT_HAS_EXPIRED; ctx->current_cert=x; if (!ctx->verify_cb(0, ctx)) Loading Loading @@ -1815,7 +1827,7 @@ static int internal_verify(X509_STORE_CTX *ctx) xs->valid = 1; check_cert: ok = check_cert_time(ctx, xs); ok = x509_check_cert_time(ctx, xs, 0); if (!ok) goto end; Loading Loading
crypto/x509/x509_lcl.h +2 −0 Original line number Diff line number Diff line Loading @@ -68,3 +68,5 @@ struct X509_VERIFY_PARAM_ID_st unsigned char *ip; /* If not NULL IP address to match */ size_t iplen; /* Length of IP address */ }; int x509_check_cert_time(X509_STORE_CTX *ctx, X509 *x, int quiet);
crypto/x509/x509_lu.c +18 −4 Original line number Diff line number Diff line Loading @@ -61,6 +61,7 @@ #include <openssl/lhash.h> #include <openssl/x509.h> #include <openssl/x509v3.h> #include "x509_lcl.h" X509_LOOKUP *X509_LOOKUP_new(X509_LOOKUP_METHOD *method) { Loading Loading @@ -639,6 +640,7 @@ int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) X509_NAME *xn; X509_OBJECT obj, *pobj; int i, ok, idx, ret; *issuer = NULL; xn=X509_get_issuer_name(x); ok=X509_STORE_get_by_subject(ctx,X509_LU_X509,xn,&obj); if (ok != X509_LU_X509) Loading @@ -659,10 +661,13 @@ int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) } /* If certificate matches all OK */ if (ctx->check_issued(ctx, x, obj.data.x509)) { if (x509_check_cert_time(ctx, obj.data.x509, 1)) { *issuer = obj.data.x509; return 1; } } X509_OBJECT_free_contents(&obj); /* Else find index of first cert accepted by 'check_issued' */ Loading @@ -683,13 +688,22 @@ int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x) if (ctx->check_issued(ctx, x, pobj->data.x509)) { *issuer = pobj->data.x509; X509_OBJECT_up_ref_count(pobj); ret = 1; /* * If times check, exit with match, * otherwise keep looking. Leave last * match in issuer so we return nearest * match if no certificate time is OK. */ if (x509_check_cert_time(ctx, *issuer, 1)) break; } } } CRYPTO_w_unlock(CRYPTO_LOCK_X509_STORE); if (*issuer) CRYPTO_add(&(*issuer)->references,1,CRYPTO_LOCK_X509); return ret; } Loading
crypto/x509/x509_vfy.c +17 −5 Original line number Diff line number Diff line Loading @@ -469,14 +469,18 @@ end: static X509 *find_issuer(X509_STORE_CTX *ctx, STACK_OF(X509) *sk, X509 *x) { int i; X509 *issuer; X509 *issuer, *rv = NULL;; for (i = 0; i < sk_X509_num(sk); i++) { issuer = sk_X509_value(sk, i); if (ctx->check_issued(ctx, x, issuer)) return issuer; { rv = issuer; if (x509_check_cert_time(ctx, rv, 1)) break; } return NULL; } return rv; } /* Given a possible certificate and issuer check them */ Loading Loading @@ -1694,7 +1698,7 @@ static int check_policy(X509_STORE_CTX *ctx) return 1; } static int check_cert_time(X509_STORE_CTX *ctx, X509 *x) int x509_check_cert_time(X509_STORE_CTX *ctx, X509 *x, int quiet) { time_t *ptime; int i; Loading @@ -1707,6 +1711,8 @@ static int check_cert_time(X509_STORE_CTX *ctx, X509 *x) i=X509_cmp_time(X509_get_notBefore(x), ptime); if (i == 0) { if (quiet) return 0; ctx->error=X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD; ctx->current_cert=x; if (!ctx->verify_cb(0, ctx)) Loading @@ -1715,6 +1721,8 @@ static int check_cert_time(X509_STORE_CTX *ctx, X509 *x) if (i > 0) { if (quiet) return 0; ctx->error=X509_V_ERR_CERT_NOT_YET_VALID; ctx->current_cert=x; if (!ctx->verify_cb(0, ctx)) Loading @@ -1724,6 +1732,8 @@ static int check_cert_time(X509_STORE_CTX *ctx, X509 *x) i=X509_cmp_time(X509_get_notAfter(x), ptime); if (i == 0) { if (quiet) return 0; ctx->error=X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD; ctx->current_cert=x; if (!ctx->verify_cb(0, ctx)) Loading @@ -1732,6 +1742,8 @@ static int check_cert_time(X509_STORE_CTX *ctx, X509 *x) if (i < 0) { if (quiet) return 0; ctx->error=X509_V_ERR_CERT_HAS_EXPIRED; ctx->current_cert=x; if (!ctx->verify_cb(0, ctx)) Loading Loading @@ -1815,7 +1827,7 @@ static int internal_verify(X509_STORE_CTX *ctx) xs->valid = 1; check_cert: ok = check_cert_time(ctx, xs); ok = x509_check_cert_time(ctx, xs, 0); if (!ok) goto end; Loading