diff options
Diffstat (limited to '')
-rw-r--r-- | src/lib/libcrypto/asn1/a_time_tm.c | 607 |
1 files changed, 0 insertions, 607 deletions
diff --git a/src/lib/libcrypto/asn1/a_time_tm.c b/src/lib/libcrypto/asn1/a_time_tm.c deleted file mode 100644 index a1f329be96..0000000000 --- a/src/lib/libcrypto/asn1/a_time_tm.c +++ /dev/null | |||
@@ -1,607 +0,0 @@ | |||
1 | /* $OpenBSD: a_time_tm.c,v 1.42 2024/05/03 18:33:27 tb Exp $ */ | ||
2 | /* | ||
3 | * Copyright (c) 2015 Bob Beck <beck@openbsd.org> | ||
4 | * | ||
5 | * Permission to use, copy, modify, and distribute this software for any | ||
6 | * purpose with or without fee is hereby granted, provided that the above | ||
7 | * copyright notice and this permission notice appear in all copies. | ||
8 | * | ||
9 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
10 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
11 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
12 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
13 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
14 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
15 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
16 | */ | ||
17 | |||
18 | #include <ctype.h> | ||
19 | #include <limits.h> | ||
20 | #include <stdio.h> | ||
21 | #include <string.h> | ||
22 | #include <time.h> | ||
23 | |||
24 | #include <openssl/asn1t.h> | ||
25 | #include <openssl/err.h> | ||
26 | |||
27 | #include "bytestring.h" | ||
28 | #include "asn1_local.h" | ||
29 | |||
30 | #define RFC5280 0 | ||
31 | #define GENTIME_LENGTH 15 | ||
32 | #define UTCTIME_LENGTH 13 | ||
33 | |||
34 | int | ||
35 | ASN1_time_tm_cmp(struct tm *tm1, struct tm *tm2) | ||
36 | { | ||
37 | if (tm1->tm_year < tm2->tm_year) | ||
38 | return -1; | ||
39 | if (tm1->tm_year > tm2->tm_year) | ||
40 | return 1; | ||
41 | if (tm1->tm_mon < tm2->tm_mon) | ||
42 | return -1; | ||
43 | if (tm1->tm_mon > tm2->tm_mon) | ||
44 | return 1; | ||
45 | if (tm1->tm_mday < tm2->tm_mday) | ||
46 | return -1; | ||
47 | if (tm1->tm_mday > tm2->tm_mday) | ||
48 | return 1; | ||
49 | if (tm1->tm_hour < tm2->tm_hour) | ||
50 | return -1; | ||
51 | if (tm1->tm_hour > tm2->tm_hour) | ||
52 | return 1; | ||
53 | if (tm1->tm_min < tm2->tm_min) | ||
54 | return -1; | ||
55 | if (tm1->tm_min > tm2->tm_min) | ||
56 | return 1; | ||
57 | if (tm1->tm_sec < tm2->tm_sec) | ||
58 | return -1; | ||
59 | if (tm1->tm_sec > tm2->tm_sec) | ||
60 | return 1; | ||
61 | return 0; | ||
62 | } | ||
63 | |||
64 | int | ||
65 | ASN1_time_tm_clamp_notafter(struct tm *tm) | ||
66 | { | ||
67 | #ifdef SMALL_TIME_T | ||
68 | struct tm broken_os_epoch_tm; | ||
69 | time_t broken_os_epoch_time = INT_MAX; | ||
70 | |||
71 | if (!asn1_time_time_t_to_tm(&broken_os_epoch_time, &broken_os_epoch_tm)) | ||
72 | return 0; | ||
73 | |||
74 | if (ASN1_time_tm_cmp(tm, &broken_os_epoch_tm) == 1) | ||
75 | memcpy(tm, &broken_os_epoch_tm, sizeof(*tm)); | ||
76 | #endif | ||
77 | return 1; | ||
78 | } | ||
79 | |||
80 | /* Convert time to GeneralizedTime, X.690, 11.7. */ | ||
81 | static int | ||
82 | tm_to_gentime(struct tm *tm, ASN1_TIME *atime) | ||
83 | { | ||
84 | char *time_str = NULL; | ||
85 | |||
86 | if (tm->tm_year < -1900 || tm->tm_year > 9999 - 1900) { | ||
87 | ASN1error(ASN1_R_ILLEGAL_TIME_VALUE); | ||
88 | return 0; | ||
89 | } | ||
90 | |||
91 | if (asprintf(&time_str, "%04u%02u%02u%02u%02u%02uZ", tm->tm_year + 1900, | ||
92 | tm->tm_mon + 1, tm->tm_mday, tm->tm_hour, tm->tm_min, | ||
93 | tm->tm_sec) == -1) { | ||
94 | ASN1error(ERR_R_MALLOC_FAILURE); | ||
95 | return 0; | ||
96 | } | ||
97 | |||
98 | free(atime->data); | ||
99 | atime->data = time_str; | ||
100 | atime->length = GENTIME_LENGTH; | ||
101 | atime->type = V_ASN1_GENERALIZEDTIME; | ||
102 | |||
103 | return 1; | ||
104 | } | ||
105 | |||
106 | /* Convert time to UTCTime, X.690, 11.8. */ | ||
107 | static int | ||
108 | tm_to_utctime(struct tm *tm, ASN1_TIME *atime) | ||
109 | { | ||
110 | char *time_str = NULL; | ||
111 | |||
112 | if (tm->tm_year >= 150 || tm->tm_year < 50) { | ||
113 | ASN1error(ASN1_R_ILLEGAL_TIME_VALUE); | ||
114 | return 0; | ||
115 | } | ||
116 | |||
117 | if (asprintf(&time_str, "%02u%02u%02u%02u%02u%02uZ", | ||
118 | tm->tm_year % 100, tm->tm_mon + 1, tm->tm_mday, | ||
119 | tm->tm_hour, tm->tm_min, tm->tm_sec) == -1) { | ||
120 | ASN1error(ERR_R_MALLOC_FAILURE); | ||
121 | return 0; | ||
122 | } | ||
123 | |||
124 | free(atime->data); | ||
125 | atime->data = time_str; | ||
126 | atime->length = UTCTIME_LENGTH; | ||
127 | atime->type = V_ASN1_UTCTIME; | ||
128 | |||
129 | return 1; | ||
130 | } | ||
131 | |||
132 | static int | ||
133 | tm_to_rfc5280_time(struct tm *tm, ASN1_TIME *atime) | ||
134 | { | ||
135 | if (tm->tm_year >= 50 && tm->tm_year < 150) | ||
136 | return tm_to_utctime(tm, atime); | ||
137 | |||
138 | return tm_to_gentime(tm, atime); | ||
139 | } | ||
140 | |||
141 | |||
142 | static int | ||
143 | cbs_get_two_digit_value(CBS *cbs, int *out) | ||
144 | { | ||
145 | uint8_t first_digit, second_digit; | ||
146 | |||
147 | if (!CBS_get_u8(cbs, &first_digit)) | ||
148 | return 0; | ||
149 | if (!isdigit(first_digit)) | ||
150 | return 0; | ||
151 | if (!CBS_get_u8(cbs, &second_digit)) | ||
152 | return 0; | ||
153 | if (!isdigit(second_digit)) | ||
154 | return 0; | ||
155 | |||
156 | *out = (first_digit - '0') * 10 + (second_digit - '0'); | ||
157 | |||
158 | return 1; | ||
159 | } | ||
160 | |||
161 | static int | ||
162 | is_valid_day(int year, int month, int day) | ||
163 | { | ||
164 | if (day < 1) | ||
165 | return 0; | ||
166 | switch (month) { | ||
167 | case 1: | ||
168 | case 3: | ||
169 | case 5: | ||
170 | case 7: | ||
171 | case 8: | ||
172 | case 10: | ||
173 | case 12: | ||
174 | return day <= 31; | ||
175 | case 4: | ||
176 | case 6: | ||
177 | case 9: | ||
178 | case 11: | ||
179 | return day <= 30; | ||
180 | case 2: | ||
181 | if ((year % 4 == 0 && year % 100 != 0) || year % 400 == 0) | ||
182 | return day <= 29; | ||
183 | else | ||
184 | return day <= 28; | ||
185 | default: | ||
186 | return 0; | ||
187 | } | ||
188 | } | ||
189 | |||
190 | /* | ||
191 | * asn1_time_parse_cbs returns one if |cbs| is a valid DER-encoded, ASN.1 Time | ||
192 | * body within the limitations imposed by RFC 5280, or zero otherwise. The time | ||
193 | * is expected to parse as a Generalized Time if is_gentime is true, and as a | ||
194 | * UTC Time otherwise. If |out_tm| is non-NULL, |*out_tm| will be zeroed, and | ||
195 | * then set to the corresponding time in UTC. This function does not compute | ||
196 | * |out_tm->tm_wday| or |out_tm->tm_yday|. |cbs| is not consumed. | ||
197 | */ | ||
198 | int | ||
199 | asn1_time_parse_cbs(const CBS *cbs, int is_gentime, struct tm *out_tm) | ||
200 | { | ||
201 | int year, month, day, hour, min, sec, val; | ||
202 | CBS copy; | ||
203 | uint8_t tz; | ||
204 | |||
205 | CBS_dup(cbs, ©); | ||
206 | |||
207 | if (is_gentime) { | ||
208 | if (!cbs_get_two_digit_value(©, &val)) | ||
209 | return 0; | ||
210 | year = val * 100; | ||
211 | if (!cbs_get_two_digit_value(©, &val)) | ||
212 | return 0; | ||
213 | year += val; | ||
214 | } else { | ||
215 | year = 1900; | ||
216 | if (!cbs_get_two_digit_value(©, &val)) | ||
217 | return 0; | ||
218 | year += val; | ||
219 | if (year < 1950) | ||
220 | year += 100; | ||
221 | if (year >= 2050) | ||
222 | return 0; /* A Generalized time must be used. */ | ||
223 | } | ||
224 | |||
225 | if (!cbs_get_two_digit_value(©, &month)) | ||
226 | return 0; | ||
227 | if (month < 1 || month > 12) | ||
228 | return 0; /* Reject invalid months. */ | ||
229 | |||
230 | if (!cbs_get_two_digit_value(©, &day)) | ||
231 | return 0; | ||
232 | if (!is_valid_day(year, month, day)) | ||
233 | return 0; /* Reject invalid days. */ | ||
234 | |||
235 | if (!cbs_get_two_digit_value(©, &hour)) | ||
236 | return 0; | ||
237 | if (hour > 23) | ||
238 | return 0; /* Reject invalid hours. */ | ||
239 | |||
240 | if (!cbs_get_two_digit_value(©, &min)) | ||
241 | return 0; | ||
242 | if (min > 59) | ||
243 | return 0; /* Reject invalid minutes. */ | ||
244 | |||
245 | if (!cbs_get_two_digit_value(©, &sec)) | ||
246 | return 0; | ||
247 | if (sec > 59) | ||
248 | return 0; /* Reject invalid seconds. Leap seconds are invalid. */ | ||
249 | |||
250 | if (!CBS_get_u8(©, &tz)) | ||
251 | return 0; | ||
252 | if (tz != 'Z') | ||
253 | return 0; /* Reject anything but Z on the end. */ | ||
254 | |||
255 | if (CBS_len(©) != 0) | ||
256 | return 0; /* Reject invalid lengths. */ | ||
257 | |||
258 | if (out_tm != NULL) { | ||
259 | memset(out_tm, 0, sizeof(*out_tm)); | ||
260 | /* Fill in the tm fields corresponding to what we validated. */ | ||
261 | out_tm->tm_year = year - 1900; | ||
262 | out_tm->tm_mon = month - 1; | ||
263 | out_tm->tm_mday = day; | ||
264 | out_tm->tm_hour = hour; | ||
265 | out_tm->tm_min = min; | ||
266 | out_tm->tm_sec = sec; | ||
267 | } | ||
268 | |||
269 | return 1; | ||
270 | } | ||
271 | |||
272 | /* | ||
273 | * Parse an RFC 5280 format ASN.1 time string. | ||
274 | * | ||
275 | * mode must be: | ||
276 | * 0 if we expect to parse a time as specified in RFC 5280 for an X509 object. | ||
277 | * V_ASN1_UTCTIME if we wish to parse an RFC5280 format UTC time. | ||
278 | * V_ASN1_GENERALIZEDTIME if we wish to parse an RFC5280 format Generalized time. | ||
279 | * | ||
280 | * Returns: | ||
281 | * -1 if the string was invalid. | ||
282 | * V_ASN1_UTCTIME if the string validated as a UTC time string. | ||
283 | * V_ASN1_GENERALIZEDTIME if the string validated as a Generalized time string. | ||
284 | * | ||
285 | * Fills in *tm with the corresponding time if tm is non NULL. | ||
286 | */ | ||
287 | int | ||
288 | ASN1_time_parse(const char *bytes, size_t len, struct tm *tm, int mode) | ||
289 | { | ||
290 | int type = 0; | ||
291 | CBS cbs; | ||
292 | |||
293 | if (bytes == NULL) | ||
294 | return -1; | ||
295 | |||
296 | CBS_init(&cbs, bytes, len); | ||
297 | |||
298 | if (CBS_len(&cbs) == UTCTIME_LENGTH) | ||
299 | type = V_ASN1_UTCTIME; | ||
300 | if (CBS_len(&cbs) == GENTIME_LENGTH) | ||
301 | type = V_ASN1_GENERALIZEDTIME; | ||
302 | if (asn1_time_parse_cbs(&cbs, type == V_ASN1_GENERALIZEDTIME, tm)) { | ||
303 | if (mode != 0 && mode != type) | ||
304 | return -1; | ||
305 | return type; | ||
306 | } | ||
307 | |||
308 | return -1; | ||
309 | } | ||
310 | |||
311 | /* | ||
312 | * ASN1_TIME generic functions. | ||
313 | */ | ||
314 | |||
315 | static int | ||
316 | ASN1_TIME_set_string_internal(ASN1_TIME *s, const char *str, int mode) | ||
317 | { | ||
318 | struct tm tm; | ||
319 | |||
320 | if (ASN1_time_parse(str, strlen(str), &tm, mode) == -1) | ||
321 | return 0; | ||
322 | |||
323 | /* Only check str's format, as documented. */ | ||
324 | if (s == NULL) | ||
325 | return 1; | ||
326 | |||
327 | switch (mode) { | ||
328 | case V_ASN1_UTCTIME: | ||
329 | return tm_to_utctime(&tm, s); | ||
330 | case V_ASN1_GENERALIZEDTIME: | ||
331 | return tm_to_gentime(&tm, s); | ||
332 | case RFC5280: | ||
333 | return tm_to_rfc5280_time(&tm, s); | ||
334 | default: | ||
335 | return 0; | ||
336 | } | ||
337 | } | ||
338 | |||
339 | static ASN1_TIME * | ||
340 | ASN1_TIME_adj_internal(ASN1_TIME *s, time_t t, int offset_day, long offset_sec, | ||
341 | int mode) | ||
342 | { | ||
343 | ASN1_TIME *atime = s; | ||
344 | struct tm tm; | ||
345 | |||
346 | if (!asn1_time_time_t_to_tm(&t, &tm)) | ||
347 | goto err; | ||
348 | |||
349 | if (offset_day != 0 || offset_sec != 0) { | ||
350 | if (!OPENSSL_gmtime_adj(&tm, offset_day, offset_sec)) | ||
351 | goto err; | ||
352 | } | ||
353 | |||
354 | if (atime == NULL) | ||
355 | atime = ASN1_TIME_new(); | ||
356 | if (atime == NULL) | ||
357 | goto err; | ||
358 | |||
359 | switch (mode) { | ||
360 | case V_ASN1_UTCTIME: | ||
361 | if (!tm_to_utctime(&tm, atime)) | ||
362 | goto err; | ||
363 | break; | ||
364 | case V_ASN1_GENERALIZEDTIME: | ||
365 | if (!tm_to_gentime(&tm, atime)) | ||
366 | goto err; | ||
367 | break; | ||
368 | case RFC5280: | ||
369 | if (!tm_to_rfc5280_time(&tm, atime)) | ||
370 | goto err; | ||
371 | break; | ||
372 | default: | ||
373 | goto err; | ||
374 | } | ||
375 | |||
376 | return atime; | ||
377 | |||
378 | err: | ||
379 | if (atime != s) | ||
380 | ASN1_TIME_free(atime); | ||
381 | |||
382 | return NULL; | ||
383 | } | ||
384 | |||
385 | ASN1_TIME * | ||
386 | ASN1_TIME_set(ASN1_TIME *s, time_t t) | ||
387 | { | ||
388 | return ASN1_TIME_adj(s, t, 0, 0); | ||
389 | } | ||
390 | LCRYPTO_ALIAS(ASN1_TIME_set); | ||
391 | |||
392 | ASN1_TIME * | ||
393 | ASN1_TIME_adj(ASN1_TIME *s, time_t t, int offset_day, long offset_sec) | ||
394 | { | ||
395 | return ASN1_TIME_adj_internal(s, t, offset_day, offset_sec, RFC5280); | ||
396 | } | ||
397 | LCRYPTO_ALIAS(ASN1_TIME_adj); | ||
398 | |||
399 | int | ||
400 | ASN1_TIME_check(const ASN1_TIME *t) | ||
401 | { | ||
402 | if (t->type != V_ASN1_GENERALIZEDTIME && t->type != V_ASN1_UTCTIME) | ||
403 | return 0; | ||
404 | return t->type == ASN1_time_parse(t->data, t->length, NULL, t->type); | ||
405 | } | ||
406 | LCRYPTO_ALIAS(ASN1_TIME_check); | ||
407 | |||
408 | ASN1_GENERALIZEDTIME * | ||
409 | ASN1_TIME_to_generalizedtime(const ASN1_TIME *t, ASN1_GENERALIZEDTIME **out) | ||
410 | { | ||
411 | ASN1_GENERALIZEDTIME *agt = NULL; | ||
412 | struct tm tm; | ||
413 | |||
414 | if (t->type != V_ASN1_GENERALIZEDTIME && t->type != V_ASN1_UTCTIME) | ||
415 | goto err; | ||
416 | |||
417 | if (t->type != ASN1_time_parse(t->data, t->length, &tm, t->type)) | ||
418 | goto err; | ||
419 | |||
420 | if (out == NULL || (agt = *out) == NULL) | ||
421 | agt = ASN1_TIME_new(); | ||
422 | if (agt == NULL) | ||
423 | goto err; | ||
424 | |||
425 | if (!tm_to_gentime(&tm, agt)) | ||
426 | goto err; | ||
427 | |||
428 | if (out != NULL) | ||
429 | *out = agt; | ||
430 | |||
431 | return agt; | ||
432 | |||
433 | err: | ||
434 | if (out == NULL || *out != agt) | ||
435 | ASN1_TIME_free(agt); | ||
436 | |||
437 | return NULL; | ||
438 | } | ||
439 | LCRYPTO_ALIAS(ASN1_TIME_to_generalizedtime); | ||
440 | |||
441 | int | ||
442 | ASN1_TIME_set_string(ASN1_TIME *s, const char *str) | ||
443 | { | ||
444 | return ASN1_TIME_set_string_internal(s, str, RFC5280); | ||
445 | } | ||
446 | LCRYPTO_ALIAS(ASN1_TIME_set_string); | ||
447 | |||
448 | static int | ||
449 | ASN1_TIME_cmp_time_t_internal(const ASN1_TIME *s, time_t t2, int mode) | ||
450 | { | ||
451 | struct tm tm1, tm2; | ||
452 | |||
453 | /* | ||
454 | * This function has never handled failure conditions properly | ||
455 | * The OpenSSL version used to simply follow NULL pointers on failure. | ||
456 | * BoringSSL and OpenSSL now make it return -2 on failure. | ||
457 | * | ||
458 | * The danger is that users of this function will not differentiate the | ||
459 | * -2 failure case from s < t2. Callers must be careful. Sadly this is | ||
460 | * one of those pervasive things from OpenSSL we must continue with. | ||
461 | */ | ||
462 | |||
463 | if (ASN1_time_parse(s->data, s->length, &tm1, mode) == -1) | ||
464 | return -2; | ||
465 | |||
466 | if (!asn1_time_time_t_to_tm(&t2, &tm2)) | ||
467 | return -2; | ||
468 | |||
469 | return ASN1_time_tm_cmp(&tm1, &tm2); | ||
470 | } | ||
471 | |||
472 | int | ||
473 | ASN1_TIME_compare(const ASN1_TIME *t1, const ASN1_TIME *t2) | ||
474 | { | ||
475 | struct tm tm1, tm2; | ||
476 | |||
477 | if (t1->type != V_ASN1_UTCTIME && t1->type != V_ASN1_GENERALIZEDTIME) | ||
478 | return -2; | ||
479 | |||
480 | if (t2->type != V_ASN1_UTCTIME && t2->type != V_ASN1_GENERALIZEDTIME) | ||
481 | return -2; | ||
482 | |||
483 | if (ASN1_time_parse(t1->data, t1->length, &tm1, t1->type) == -1) | ||
484 | return -2; | ||
485 | |||
486 | if (ASN1_time_parse(t2->data, t2->length, &tm2, t2->type) == -1) | ||
487 | return -2; | ||
488 | |||
489 | return ASN1_time_tm_cmp(&tm1, &tm2); | ||
490 | } | ||
491 | LCRYPTO_ALIAS(ASN1_TIME_compare); | ||
492 | |||
493 | int | ||
494 | ASN1_TIME_cmp_time_t(const ASN1_TIME *s, time_t t) | ||
495 | { | ||
496 | if (s->type == V_ASN1_UTCTIME) | ||
497 | return ASN1_TIME_cmp_time_t_internal(s, t, V_ASN1_UTCTIME); | ||
498 | if (s->type == V_ASN1_GENERALIZEDTIME) | ||
499 | return ASN1_TIME_cmp_time_t_internal(s, t, | ||
500 | V_ASN1_GENERALIZEDTIME); | ||
501 | return -2; | ||
502 | } | ||
503 | LCRYPTO_ALIAS(ASN1_TIME_cmp_time_t); | ||
504 | |||
505 | /* | ||
506 | * ASN1_UTCTIME wrappers | ||
507 | */ | ||
508 | |||
509 | int | ||
510 | ASN1_UTCTIME_check(const ASN1_UTCTIME *d) | ||
511 | { | ||
512 | if (d->type != V_ASN1_UTCTIME) | ||
513 | return 0; | ||
514 | return d->type == ASN1_time_parse(d->data, d->length, NULL, d->type); | ||
515 | } | ||
516 | LCRYPTO_ALIAS(ASN1_UTCTIME_check); | ||
517 | |||
518 | int | ||
519 | ASN1_UTCTIME_set_string(ASN1_UTCTIME *s, const char *str) | ||
520 | { | ||
521 | if (s != NULL && s->type != V_ASN1_UTCTIME) | ||
522 | return 0; | ||
523 | return ASN1_TIME_set_string_internal(s, str, V_ASN1_UTCTIME); | ||
524 | } | ||
525 | LCRYPTO_ALIAS(ASN1_UTCTIME_set_string); | ||
526 | |||
527 | ASN1_UTCTIME * | ||
528 | ASN1_UTCTIME_set(ASN1_UTCTIME *s, time_t t) | ||
529 | { | ||
530 | return ASN1_UTCTIME_adj(s, t, 0, 0); | ||
531 | } | ||
532 | LCRYPTO_ALIAS(ASN1_UTCTIME_set); | ||
533 | |||
534 | ASN1_UTCTIME * | ||
535 | ASN1_UTCTIME_adj(ASN1_UTCTIME *s, time_t t, int offset_day, long offset_sec) | ||
536 | { | ||
537 | return ASN1_TIME_adj_internal(s, t, offset_day, offset_sec, | ||
538 | V_ASN1_UTCTIME); | ||
539 | } | ||
540 | LCRYPTO_ALIAS(ASN1_UTCTIME_adj); | ||
541 | |||
542 | int | ||
543 | ASN1_UTCTIME_cmp_time_t(const ASN1_UTCTIME *s, time_t t) | ||
544 | { | ||
545 | if (s->type == V_ASN1_UTCTIME) | ||
546 | return ASN1_TIME_cmp_time_t_internal(s, t, V_ASN1_UTCTIME); | ||
547 | return -2; | ||
548 | } | ||
549 | LCRYPTO_ALIAS(ASN1_UTCTIME_cmp_time_t); | ||
550 | |||
551 | /* | ||
552 | * ASN1_GENERALIZEDTIME wrappers | ||
553 | */ | ||
554 | |||
555 | int | ||
556 | ASN1_GENERALIZEDTIME_check(const ASN1_GENERALIZEDTIME *d) | ||
557 | { | ||
558 | if (d->type != V_ASN1_GENERALIZEDTIME) | ||
559 | return 0; | ||
560 | return d->type == ASN1_time_parse(d->data, d->length, NULL, d->type); | ||
561 | } | ||
562 | LCRYPTO_ALIAS(ASN1_GENERALIZEDTIME_check); | ||
563 | |||
564 | int | ||
565 | ASN1_GENERALIZEDTIME_set_string(ASN1_GENERALIZEDTIME *s, const char *str) | ||
566 | { | ||
567 | if (s != NULL && s->type != V_ASN1_GENERALIZEDTIME) | ||
568 | return 0; | ||
569 | return ASN1_TIME_set_string_internal(s, str, V_ASN1_GENERALIZEDTIME); | ||
570 | } | ||
571 | LCRYPTO_ALIAS(ASN1_GENERALIZEDTIME_set_string); | ||
572 | |||
573 | ASN1_GENERALIZEDTIME * | ||
574 | ASN1_GENERALIZEDTIME_set(ASN1_GENERALIZEDTIME *s, time_t t) | ||
575 | { | ||
576 | return ASN1_GENERALIZEDTIME_adj(s, t, 0, 0); | ||
577 | } | ||
578 | LCRYPTO_ALIAS(ASN1_GENERALIZEDTIME_set); | ||
579 | |||
580 | ASN1_GENERALIZEDTIME * | ||
581 | ASN1_GENERALIZEDTIME_adj(ASN1_GENERALIZEDTIME *s, time_t t, int offset_day, | ||
582 | long offset_sec) | ||
583 | { | ||
584 | return ASN1_TIME_adj_internal(s, t, offset_day, offset_sec, | ||
585 | V_ASN1_GENERALIZEDTIME); | ||
586 | } | ||
587 | LCRYPTO_ALIAS(ASN1_GENERALIZEDTIME_adj); | ||
588 | |||
589 | int | ||
590 | ASN1_TIME_normalize(ASN1_TIME *t) | ||
591 | { | ||
592 | struct tm tm; | ||
593 | |||
594 | if (t == NULL) | ||
595 | return 0; | ||
596 | if (!ASN1_TIME_to_tm(t, &tm)) | ||
597 | return 0; | ||
598 | return tm_to_rfc5280_time(&tm, t); | ||
599 | } | ||
600 | LCRYPTO_ALIAS(ASN1_TIME_normalize); | ||
601 | |||
602 | int | ||
603 | ASN1_TIME_set_string_X509(ASN1_TIME *s, const char *str) | ||
604 | { | ||
605 | return ASN1_TIME_set_string_internal(s, str, RFC5280); | ||
606 | } | ||
607 | LCRYPTO_ALIAS(ASN1_TIME_set_string_X509); | ||