zig_example 0.3.2 → 0.3.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
 - data/ext/mkmf.rb +5 -2
 - data/lib/zig_example/version.rb +1 -1
 - metadata +3 -56
 - data/ext/openssl/openssl_missing.c +0 -40
 - data/ext/openssl/openssl_missing.h +0 -238
 - data/ext/openssl/ossl.c +0 -1295
 - data/ext/openssl/ossl.h +0 -201
 - data/ext/openssl/ossl_asn1.c +0 -1891
 - data/ext/openssl/ossl_asn1.h +0 -62
 - data/ext/openssl/ossl_bio.c +0 -42
 - data/ext/openssl/ossl_bio.h +0 -16
 - data/ext/openssl/ossl_bn.c +0 -1344
 - data/ext/openssl/ossl_bn.h +0 -26
 - data/ext/openssl/ossl_cipher.c +0 -1074
 - data/ext/openssl/ossl_cipher.h +0 -20
 - data/ext/openssl/ossl_config.c +0 -460
 - data/ext/openssl/ossl_config.h +0 -16
 - data/ext/openssl/ossl_digest.c +0 -425
 - data/ext/openssl/ossl_digest.h +0 -20
 - data/ext/openssl/ossl_engine.c +0 -568
 - data/ext/openssl/ossl_engine.h +0 -19
 - data/ext/openssl/ossl_hmac.c +0 -310
 - data/ext/openssl/ossl_hmac.h +0 -18
 - data/ext/openssl/ossl_kdf.c +0 -311
 - data/ext/openssl/ossl_kdf.h +0 -6
 - data/ext/openssl/ossl_ns_spki.c +0 -405
 - data/ext/openssl/ossl_ns_spki.h +0 -19
 - data/ext/openssl/ossl_ocsp.c +0 -1965
 - data/ext/openssl/ossl_ocsp.h +0 -23
 - data/ext/openssl/ossl_pkcs12.c +0 -275
 - data/ext/openssl/ossl_pkcs12.h +0 -13
 - data/ext/openssl/ossl_pkcs7.c +0 -1081
 - data/ext/openssl/ossl_pkcs7.h +0 -36
 - data/ext/openssl/ossl_pkey.c +0 -1624
 - data/ext/openssl/ossl_pkey.h +0 -204
 - data/ext/openssl/ossl_pkey_dh.c +0 -440
 - data/ext/openssl/ossl_pkey_dsa.c +0 -359
 - data/ext/openssl/ossl_pkey_ec.c +0 -1655
 - data/ext/openssl/ossl_pkey_rsa.c +0 -579
 - data/ext/openssl/ossl_rand.c +0 -200
 - data/ext/openssl/ossl_rand.h +0 -18
 - data/ext/openssl/ossl_ssl.c +0 -3142
 - data/ext/openssl/ossl_ssl.h +0 -36
 - data/ext/openssl/ossl_ssl_session.c +0 -331
 - data/ext/openssl/ossl_ts.c +0 -1539
 - data/ext/openssl/ossl_ts.h +0 -16
 - data/ext/openssl/ossl_x509.c +0 -256
 - data/ext/openssl/ossl_x509.h +0 -115
 - data/ext/openssl/ossl_x509attr.c +0 -324
 - data/ext/openssl/ossl_x509cert.c +0 -1002
 - data/ext/openssl/ossl_x509crl.c +0 -545
 - data/ext/openssl/ossl_x509ext.c +0 -490
 - data/ext/openssl/ossl_x509name.c +0 -597
 - data/ext/openssl/ossl_x509req.c +0 -444
 - data/ext/openssl/ossl_x509revoked.c +0 -300
 - data/ext/openssl/ossl_x509store.c +0 -986
 
    
        data/ext/openssl/ossl_x509cert.c
    DELETED
    
    | 
         @@ -1,1002 +0,0 @@ 
     | 
|
| 
       1 
     | 
    
         
            -
            /*
         
     | 
| 
       2 
     | 
    
         
            -
             * 'OpenSSL for Ruby' project
         
     | 
| 
       3 
     | 
    
         
            -
             * Copyright (C) 2001-2002  Michal Rokos <m.rokos@sh.cvut.cz>
         
     | 
| 
       4 
     | 
    
         
            -
             * All rights reserved.
         
     | 
| 
       5 
     | 
    
         
            -
             */
         
     | 
| 
       6 
     | 
    
         
            -
            /*
         
     | 
| 
       7 
     | 
    
         
            -
             * This program is licensed under the same licence as Ruby.
         
     | 
| 
       8 
     | 
    
         
            -
             * (See the file 'LICENCE'.)
         
     | 
| 
       9 
     | 
    
         
            -
             */
         
     | 
| 
       10 
     | 
    
         
            -
            #include "ossl.h"
         
     | 
| 
       11 
     | 
    
         
            -
             
     | 
| 
       12 
     | 
    
         
            -
            #define NewX509(klass) \
         
     | 
| 
       13 
     | 
    
         
            -
                TypedData_Wrap_Struct((klass), &ossl_x509_type, 0)
         
     | 
| 
       14 
     | 
    
         
            -
            #define SetX509(obj, x509) do { \
         
     | 
| 
       15 
     | 
    
         
            -
                if (!(x509)) { \
         
     | 
| 
       16 
     | 
    
         
            -
            	ossl_raise(rb_eRuntimeError, "CERT wasn't initialized!"); \
         
     | 
| 
       17 
     | 
    
         
            -
                } \
         
     | 
| 
       18 
     | 
    
         
            -
                RTYPEDDATA_DATA(obj) = (x509); \
         
     | 
| 
       19 
     | 
    
         
            -
            } while (0)
         
     | 
| 
       20 
     | 
    
         
            -
            #define GetX509(obj, x509) do { \
         
     | 
| 
       21 
     | 
    
         
            -
                TypedData_Get_Struct((obj), X509, &ossl_x509_type, (x509)); \
         
     | 
| 
       22 
     | 
    
         
            -
                if (!(x509)) { \
         
     | 
| 
       23 
     | 
    
         
            -
            	ossl_raise(rb_eRuntimeError, "CERT wasn't initialized!"); \
         
     | 
| 
       24 
     | 
    
         
            -
                } \
         
     | 
| 
       25 
     | 
    
         
            -
            } while (0)
         
     | 
| 
       26 
     | 
    
         
            -
             
     | 
| 
       27 
     | 
    
         
            -
            /*
         
     | 
| 
       28 
     | 
    
         
            -
             * Classes
         
     | 
| 
       29 
     | 
    
         
            -
             */
         
     | 
| 
       30 
     | 
    
         
            -
            VALUE cX509Cert;
         
     | 
| 
       31 
     | 
    
         
            -
            VALUE eX509CertError;
         
     | 
| 
       32 
     | 
    
         
            -
             
     | 
| 
       33 
     | 
    
         
            -
            static void
         
     | 
| 
       34 
     | 
    
         
            -
            ossl_x509_free(void *ptr)
         
     | 
| 
       35 
     | 
    
         
            -
            {
         
     | 
| 
       36 
     | 
    
         
            -
                X509_free(ptr);
         
     | 
| 
       37 
     | 
    
         
            -
            }
         
     | 
| 
       38 
     | 
    
         
            -
             
     | 
| 
       39 
     | 
    
         
            -
            static const rb_data_type_t ossl_x509_type = {
         
     | 
| 
       40 
     | 
    
         
            -
                "OpenSSL/X509",
         
     | 
| 
       41 
     | 
    
         
            -
                {
         
     | 
| 
       42 
     | 
    
         
            -
            	0, ossl_x509_free,
         
     | 
| 
       43 
     | 
    
         
            -
                },
         
     | 
| 
       44 
     | 
    
         
            -
                0, 0, RUBY_TYPED_FREE_IMMEDIATELY,
         
     | 
| 
       45 
     | 
    
         
            -
            };
         
     | 
| 
       46 
     | 
    
         
            -
             
     | 
| 
       47 
     | 
    
         
            -
            /*
         
     | 
| 
       48 
     | 
    
         
            -
             * Public
         
     | 
| 
       49 
     | 
    
         
            -
             */
         
     | 
| 
       50 
     | 
    
         
            -
            VALUE
         
     | 
| 
       51 
     | 
    
         
            -
            ossl_x509_new(X509 *x509)
         
     | 
| 
       52 
     | 
    
         
            -
            {
         
     | 
| 
       53 
     | 
    
         
            -
                X509 *new;
         
     | 
| 
       54 
     | 
    
         
            -
                VALUE obj;
         
     | 
| 
       55 
     | 
    
         
            -
             
     | 
| 
       56 
     | 
    
         
            -
                obj = NewX509(cX509Cert);
         
     | 
| 
       57 
     | 
    
         
            -
                if (!x509) {
         
     | 
| 
       58 
     | 
    
         
            -
            	new = X509_new();
         
     | 
| 
       59 
     | 
    
         
            -
                } else {
         
     | 
| 
       60 
     | 
    
         
            -
            	new = X509_dup(x509);
         
     | 
| 
       61 
     | 
    
         
            -
                }
         
     | 
| 
       62 
     | 
    
         
            -
                if (!new) {
         
     | 
| 
       63 
     | 
    
         
            -
            	ossl_raise(eX509CertError, NULL);
         
     | 
| 
       64 
     | 
    
         
            -
                }
         
     | 
| 
       65 
     | 
    
         
            -
                SetX509(obj, new);
         
     | 
| 
       66 
     | 
    
         
            -
             
     | 
| 
       67 
     | 
    
         
            -
                return obj;
         
     | 
| 
       68 
     | 
    
         
            -
            }
         
     | 
| 
       69 
     | 
    
         
            -
             
     | 
| 
       70 
     | 
    
         
            -
            X509 *
         
     | 
| 
       71 
     | 
    
         
            -
            GetX509CertPtr(VALUE obj)
         
     | 
| 
       72 
     | 
    
         
            -
            {
         
     | 
| 
       73 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       74 
     | 
    
         
            -
             
     | 
| 
       75 
     | 
    
         
            -
                GetX509(obj, x509);
         
     | 
| 
       76 
     | 
    
         
            -
             
     | 
| 
       77 
     | 
    
         
            -
                return x509;
         
     | 
| 
       78 
     | 
    
         
            -
            }
         
     | 
| 
       79 
     | 
    
         
            -
             
     | 
| 
       80 
     | 
    
         
            -
            X509 *
         
     | 
| 
       81 
     | 
    
         
            -
            DupX509CertPtr(VALUE obj)
         
     | 
| 
       82 
     | 
    
         
            -
            {
         
     | 
| 
       83 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       84 
     | 
    
         
            -
             
     | 
| 
       85 
     | 
    
         
            -
                GetX509(obj, x509);
         
     | 
| 
       86 
     | 
    
         
            -
             
     | 
| 
       87 
     | 
    
         
            -
                X509_up_ref(x509);
         
     | 
| 
       88 
     | 
    
         
            -
             
     | 
| 
       89 
     | 
    
         
            -
                return x509;
         
     | 
| 
       90 
     | 
    
         
            -
            }
         
     | 
| 
       91 
     | 
    
         
            -
             
     | 
| 
       92 
     | 
    
         
            -
            /*
         
     | 
| 
       93 
     | 
    
         
            -
             * Private
         
     | 
| 
       94 
     | 
    
         
            -
             */
         
     | 
| 
       95 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       96 
     | 
    
         
            -
            ossl_x509_alloc(VALUE klass)
         
     | 
| 
       97 
     | 
    
         
            -
            {
         
     | 
| 
       98 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       99 
     | 
    
         
            -
                VALUE obj;
         
     | 
| 
       100 
     | 
    
         
            -
             
     | 
| 
       101 
     | 
    
         
            -
                obj = NewX509(klass);
         
     | 
| 
       102 
     | 
    
         
            -
                x509 = X509_new();
         
     | 
| 
       103 
     | 
    
         
            -
                if (!x509) ossl_raise(eX509CertError, NULL);
         
     | 
| 
       104 
     | 
    
         
            -
                SetX509(obj, x509);
         
     | 
| 
       105 
     | 
    
         
            -
             
     | 
| 
       106 
     | 
    
         
            -
                return obj;
         
     | 
| 
       107 
     | 
    
         
            -
            }
         
     | 
| 
       108 
     | 
    
         
            -
             
     | 
| 
       109 
     | 
    
         
            -
            /*
         
     | 
| 
       110 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       111 
     | 
    
         
            -
             *    Certificate.new => cert
         
     | 
| 
       112 
     | 
    
         
            -
             *    Certificate.new(string) => cert
         
     | 
| 
       113 
     | 
    
         
            -
             */
         
     | 
| 
       114 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       115 
     | 
    
         
            -
            ossl_x509_initialize(int argc, VALUE *argv, VALUE self)
         
     | 
| 
       116 
     | 
    
         
            -
            {
         
     | 
| 
       117 
     | 
    
         
            -
                BIO *in;
         
     | 
| 
       118 
     | 
    
         
            -
                X509 *x509, *x509_orig = RTYPEDDATA_DATA(self);
         
     | 
| 
       119 
     | 
    
         
            -
                VALUE arg;
         
     | 
| 
       120 
     | 
    
         
            -
             
     | 
| 
       121 
     | 
    
         
            -
                rb_check_frozen(self);
         
     | 
| 
       122 
     | 
    
         
            -
                if (rb_scan_args(argc, argv, "01", &arg) == 0) {
         
     | 
| 
       123 
     | 
    
         
            -
            	/* create just empty X509Cert */
         
     | 
| 
       124 
     | 
    
         
            -
            	return self;
         
     | 
| 
       125 
     | 
    
         
            -
                }
         
     | 
| 
       126 
     | 
    
         
            -
                arg = ossl_to_der_if_possible(arg);
         
     | 
| 
       127 
     | 
    
         
            -
                in = ossl_obj2bio(&arg);
         
     | 
| 
       128 
     | 
    
         
            -
                x509 = d2i_X509_bio(in, NULL);
         
     | 
| 
       129 
     | 
    
         
            -
                if (!x509) {
         
     | 
| 
       130 
     | 
    
         
            -
                    OSSL_BIO_reset(in);
         
     | 
| 
       131 
     | 
    
         
            -
                    x509 = PEM_read_bio_X509(in, NULL, NULL, NULL);
         
     | 
| 
       132 
     | 
    
         
            -
                }
         
     | 
| 
       133 
     | 
    
         
            -
                BIO_free(in);
         
     | 
| 
       134 
     | 
    
         
            -
                if (!x509)
         
     | 
| 
       135 
     | 
    
         
            -
                    ossl_raise(eX509CertError, "PEM_read_bio_X509");
         
     | 
| 
       136 
     | 
    
         
            -
             
     | 
| 
       137 
     | 
    
         
            -
                RTYPEDDATA_DATA(self) = x509;
         
     | 
| 
       138 
     | 
    
         
            -
                X509_free(x509_orig);
         
     | 
| 
       139 
     | 
    
         
            -
             
     | 
| 
       140 
     | 
    
         
            -
                return self;
         
     | 
| 
       141 
     | 
    
         
            -
            }
         
     | 
| 
       142 
     | 
    
         
            -
             
     | 
| 
       143 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       144 
     | 
    
         
            -
            ossl_x509_copy(VALUE self, VALUE other)
         
     | 
| 
       145 
     | 
    
         
            -
            {
         
     | 
| 
       146 
     | 
    
         
            -
                X509 *a, *b, *x509;
         
     | 
| 
       147 
     | 
    
         
            -
             
     | 
| 
       148 
     | 
    
         
            -
                rb_check_frozen(self);
         
     | 
| 
       149 
     | 
    
         
            -
                if (self == other) return self;
         
     | 
| 
       150 
     | 
    
         
            -
             
     | 
| 
       151 
     | 
    
         
            -
                GetX509(self, a);
         
     | 
| 
       152 
     | 
    
         
            -
                GetX509(other, b);
         
     | 
| 
       153 
     | 
    
         
            -
             
     | 
| 
       154 
     | 
    
         
            -
                x509 = X509_dup(b);
         
     | 
| 
       155 
     | 
    
         
            -
                if (!x509) ossl_raise(eX509CertError, NULL);
         
     | 
| 
       156 
     | 
    
         
            -
             
     | 
| 
       157 
     | 
    
         
            -
                DATA_PTR(self) = x509;
         
     | 
| 
       158 
     | 
    
         
            -
                X509_free(a);
         
     | 
| 
       159 
     | 
    
         
            -
             
     | 
| 
       160 
     | 
    
         
            -
                return self;
         
     | 
| 
       161 
     | 
    
         
            -
            }
         
     | 
| 
       162 
     | 
    
         
            -
             
     | 
| 
       163 
     | 
    
         
            -
            /*
         
     | 
| 
       164 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       165 
     | 
    
         
            -
             *    cert.to_der => string
         
     | 
| 
       166 
     | 
    
         
            -
             */
         
     | 
| 
       167 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       168 
     | 
    
         
            -
            ossl_x509_to_der(VALUE self)
         
     | 
| 
       169 
     | 
    
         
            -
            {
         
     | 
| 
       170 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       171 
     | 
    
         
            -
                VALUE str;
         
     | 
| 
       172 
     | 
    
         
            -
                long len;
         
     | 
| 
       173 
     | 
    
         
            -
                unsigned char *p;
         
     | 
| 
       174 
     | 
    
         
            -
             
     | 
| 
       175 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       176 
     | 
    
         
            -
                if ((len = i2d_X509(x509, NULL)) <= 0)
         
     | 
| 
       177 
     | 
    
         
            -
            	ossl_raise(eX509CertError, NULL);
         
     | 
| 
       178 
     | 
    
         
            -
                str = rb_str_new(0, len);
         
     | 
| 
       179 
     | 
    
         
            -
                p = (unsigned char *)RSTRING_PTR(str);
         
     | 
| 
       180 
     | 
    
         
            -
                if (i2d_X509(x509, &p) <= 0)
         
     | 
| 
       181 
     | 
    
         
            -
            	ossl_raise(eX509CertError, NULL);
         
     | 
| 
       182 
     | 
    
         
            -
                ossl_str_adjust(str, p);
         
     | 
| 
       183 
     | 
    
         
            -
             
     | 
| 
       184 
     | 
    
         
            -
                return str;
         
     | 
| 
       185 
     | 
    
         
            -
            }
         
     | 
| 
       186 
     | 
    
         
            -
             
     | 
| 
       187 
     | 
    
         
            -
            /*
         
     | 
| 
       188 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       189 
     | 
    
         
            -
             *    cert.to_pem => string
         
     | 
| 
       190 
     | 
    
         
            -
             */
         
     | 
| 
       191 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       192 
     | 
    
         
            -
            ossl_x509_to_pem(VALUE self)
         
     | 
| 
       193 
     | 
    
         
            -
            {
         
     | 
| 
       194 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       195 
     | 
    
         
            -
                BIO *out;
         
     | 
| 
       196 
     | 
    
         
            -
                VALUE str;
         
     | 
| 
       197 
     | 
    
         
            -
             
     | 
| 
       198 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       199 
     | 
    
         
            -
                out = BIO_new(BIO_s_mem());
         
     | 
| 
       200 
     | 
    
         
            -
                if (!out) ossl_raise(eX509CertError, NULL);
         
     | 
| 
       201 
     | 
    
         
            -
             
     | 
| 
       202 
     | 
    
         
            -
                if (!PEM_write_bio_X509(out, x509)) {
         
     | 
| 
       203 
     | 
    
         
            -
            	BIO_free(out);
         
     | 
| 
       204 
     | 
    
         
            -
            	ossl_raise(eX509CertError, NULL);
         
     | 
| 
       205 
     | 
    
         
            -
                }
         
     | 
| 
       206 
     | 
    
         
            -
                str = ossl_membio2str(out);
         
     | 
| 
       207 
     | 
    
         
            -
             
     | 
| 
       208 
     | 
    
         
            -
                return str;
         
     | 
| 
       209 
     | 
    
         
            -
            }
         
     | 
| 
       210 
     | 
    
         
            -
             
     | 
| 
       211 
     | 
    
         
            -
            /*
         
     | 
| 
       212 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       213 
     | 
    
         
            -
             *    cert.to_text => string
         
     | 
| 
       214 
     | 
    
         
            -
             */
         
     | 
| 
       215 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       216 
     | 
    
         
            -
            ossl_x509_to_text(VALUE self)
         
     | 
| 
       217 
     | 
    
         
            -
            {
         
     | 
| 
       218 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       219 
     | 
    
         
            -
                BIO *out;
         
     | 
| 
       220 
     | 
    
         
            -
                VALUE str;
         
     | 
| 
       221 
     | 
    
         
            -
             
     | 
| 
       222 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       223 
     | 
    
         
            -
             
     | 
| 
       224 
     | 
    
         
            -
                out = BIO_new(BIO_s_mem());
         
     | 
| 
       225 
     | 
    
         
            -
                if (!out) ossl_raise(eX509CertError, NULL);
         
     | 
| 
       226 
     | 
    
         
            -
             
     | 
| 
       227 
     | 
    
         
            -
                if (!X509_print(out, x509)) {
         
     | 
| 
       228 
     | 
    
         
            -
            	BIO_free(out);
         
     | 
| 
       229 
     | 
    
         
            -
            	ossl_raise(eX509CertError, NULL);
         
     | 
| 
       230 
     | 
    
         
            -
                }
         
     | 
| 
       231 
     | 
    
         
            -
                str = ossl_membio2str(out);
         
     | 
| 
       232 
     | 
    
         
            -
             
     | 
| 
       233 
     | 
    
         
            -
                return str;
         
     | 
| 
       234 
     | 
    
         
            -
            }
         
     | 
| 
       235 
     | 
    
         
            -
             
     | 
| 
       236 
     | 
    
         
            -
            #if 0
         
     | 
| 
       237 
     | 
    
         
            -
            /*
         
     | 
| 
       238 
     | 
    
         
            -
             * Makes from X509 X509_REQuest
         
     | 
| 
       239 
     | 
    
         
            -
             */
         
     | 
| 
       240 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       241 
     | 
    
         
            -
            ossl_x509_to_req(VALUE self)
         
     | 
| 
       242 
     | 
    
         
            -
            {
         
     | 
| 
       243 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       244 
     | 
    
         
            -
                X509_REQ *req;
         
     | 
| 
       245 
     | 
    
         
            -
                VALUE obj;
         
     | 
| 
       246 
     | 
    
         
            -
             
     | 
| 
       247 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       248 
     | 
    
         
            -
                if (!(req = X509_to_X509_REQ(x509, NULL, EVP_md5()))) {
         
     | 
| 
       249 
     | 
    
         
            -
            	ossl_raise(eX509CertError, NULL);
         
     | 
| 
       250 
     | 
    
         
            -
                }
         
     | 
| 
       251 
     | 
    
         
            -
                obj = ossl_x509req_new(req);
         
     | 
| 
       252 
     | 
    
         
            -
                X509_REQ_free(req);
         
     | 
| 
       253 
     | 
    
         
            -
             
     | 
| 
       254 
     | 
    
         
            -
                return obj;
         
     | 
| 
       255 
     | 
    
         
            -
            }
         
     | 
| 
       256 
     | 
    
         
            -
            #endif
         
     | 
| 
       257 
     | 
    
         
            -
             
     | 
| 
       258 
     | 
    
         
            -
            /*
         
     | 
| 
       259 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       260 
     | 
    
         
            -
             *    cert.version => integer
         
     | 
| 
       261 
     | 
    
         
            -
             */
         
     | 
| 
       262 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       263 
     | 
    
         
            -
            ossl_x509_get_version(VALUE self)
         
     | 
| 
       264 
     | 
    
         
            -
            {
         
     | 
| 
       265 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       266 
     | 
    
         
            -
             
     | 
| 
       267 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       268 
     | 
    
         
            -
             
     | 
| 
       269 
     | 
    
         
            -
                return LONG2NUM(X509_get_version(x509));
         
     | 
| 
       270 
     | 
    
         
            -
            }
         
     | 
| 
       271 
     | 
    
         
            -
             
     | 
| 
       272 
     | 
    
         
            -
            /*
         
     | 
| 
       273 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       274 
     | 
    
         
            -
             *    cert.version = integer => integer
         
     | 
| 
       275 
     | 
    
         
            -
             */
         
     | 
| 
       276 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       277 
     | 
    
         
            -
            ossl_x509_set_version(VALUE self, VALUE version)
         
     | 
| 
       278 
     | 
    
         
            -
            {
         
     | 
| 
       279 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       280 
     | 
    
         
            -
                long ver;
         
     | 
| 
       281 
     | 
    
         
            -
             
     | 
| 
       282 
     | 
    
         
            -
                if ((ver = NUM2LONG(version)) < 0) {
         
     | 
| 
       283 
     | 
    
         
            -
            	ossl_raise(eX509CertError, "version must be >= 0!");
         
     | 
| 
       284 
     | 
    
         
            -
                }
         
     | 
| 
       285 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       286 
     | 
    
         
            -
                if (!X509_set_version(x509, ver)) {
         
     | 
| 
       287 
     | 
    
         
            -
            	ossl_raise(eX509CertError, NULL);
         
     | 
| 
       288 
     | 
    
         
            -
                }
         
     | 
| 
       289 
     | 
    
         
            -
             
     | 
| 
       290 
     | 
    
         
            -
                return version;
         
     | 
| 
       291 
     | 
    
         
            -
            }
         
     | 
| 
       292 
     | 
    
         
            -
             
     | 
| 
       293 
     | 
    
         
            -
            /*
         
     | 
| 
       294 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       295 
     | 
    
         
            -
             *    cert.serial => integer
         
     | 
| 
       296 
     | 
    
         
            -
             */
         
     | 
| 
       297 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       298 
     | 
    
         
            -
            ossl_x509_get_serial(VALUE self)
         
     | 
| 
       299 
     | 
    
         
            -
            {
         
     | 
| 
       300 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       301 
     | 
    
         
            -
             
     | 
| 
       302 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       303 
     | 
    
         
            -
             
     | 
| 
       304 
     | 
    
         
            -
                return asn1integer_to_num(X509_get_serialNumber(x509));
         
     | 
| 
       305 
     | 
    
         
            -
            }
         
     | 
| 
       306 
     | 
    
         
            -
             
     | 
| 
       307 
     | 
    
         
            -
            /*
         
     | 
| 
       308 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       309 
     | 
    
         
            -
             *    cert.serial = integer => integer
         
     | 
| 
       310 
     | 
    
         
            -
             */
         
     | 
| 
       311 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       312 
     | 
    
         
            -
            ossl_x509_set_serial(VALUE self, VALUE num)
         
     | 
| 
       313 
     | 
    
         
            -
            {
         
     | 
| 
       314 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       315 
     | 
    
         
            -
             
     | 
| 
       316 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       317 
     | 
    
         
            -
                X509_set_serialNumber(x509, num_to_asn1integer(num, X509_get_serialNumber(x509)));
         
     | 
| 
       318 
     | 
    
         
            -
             
     | 
| 
       319 
     | 
    
         
            -
                return num;
         
     | 
| 
       320 
     | 
    
         
            -
            }
         
     | 
| 
       321 
     | 
    
         
            -
             
     | 
| 
       322 
     | 
    
         
            -
            /*
         
     | 
| 
       323 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       324 
     | 
    
         
            -
             *    cert.signature_algorithm => string
         
     | 
| 
       325 
     | 
    
         
            -
             */
         
     | 
| 
       326 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       327 
     | 
    
         
            -
            ossl_x509_get_signature_algorithm(VALUE self)
         
     | 
| 
       328 
     | 
    
         
            -
            {
         
     | 
| 
       329 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       330 
     | 
    
         
            -
                BIO *out;
         
     | 
| 
       331 
     | 
    
         
            -
                VALUE str;
         
     | 
| 
       332 
     | 
    
         
            -
             
     | 
| 
       333 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       334 
     | 
    
         
            -
                out = BIO_new(BIO_s_mem());
         
     | 
| 
       335 
     | 
    
         
            -
                if (!out) ossl_raise(eX509CertError, NULL);
         
     | 
| 
       336 
     | 
    
         
            -
             
     | 
| 
       337 
     | 
    
         
            -
                if (!i2a_ASN1_OBJECT(out, X509_get0_tbs_sigalg(x509)->algorithm)) {
         
     | 
| 
       338 
     | 
    
         
            -
            	BIO_free(out);
         
     | 
| 
       339 
     | 
    
         
            -
            	ossl_raise(eX509CertError, NULL);
         
     | 
| 
       340 
     | 
    
         
            -
                }
         
     | 
| 
       341 
     | 
    
         
            -
                str = ossl_membio2str(out);
         
     | 
| 
       342 
     | 
    
         
            -
             
     | 
| 
       343 
     | 
    
         
            -
                return str;
         
     | 
| 
       344 
     | 
    
         
            -
            }
         
     | 
| 
       345 
     | 
    
         
            -
             
     | 
| 
       346 
     | 
    
         
            -
            /*
         
     | 
| 
       347 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       348 
     | 
    
         
            -
             *    cert.subject => name
         
     | 
| 
       349 
     | 
    
         
            -
             */
         
     | 
| 
       350 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       351 
     | 
    
         
            -
            ossl_x509_get_subject(VALUE self)
         
     | 
| 
       352 
     | 
    
         
            -
            {
         
     | 
| 
       353 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       354 
     | 
    
         
            -
                X509_NAME *name;
         
     | 
| 
       355 
     | 
    
         
            -
             
     | 
| 
       356 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       357 
     | 
    
         
            -
                if (!(name = X509_get_subject_name(x509))) { /* NO DUP - don't free! */
         
     | 
| 
       358 
     | 
    
         
            -
            	ossl_raise(eX509CertError, NULL);
         
     | 
| 
       359 
     | 
    
         
            -
                }
         
     | 
| 
       360 
     | 
    
         
            -
             
     | 
| 
       361 
     | 
    
         
            -
                return ossl_x509name_new(name);
         
     | 
| 
       362 
     | 
    
         
            -
            }
         
     | 
| 
       363 
     | 
    
         
            -
             
     | 
| 
       364 
     | 
    
         
            -
            /*
         
     | 
| 
       365 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       366 
     | 
    
         
            -
             *    cert.subject = name => name
         
     | 
| 
       367 
     | 
    
         
            -
             */
         
     | 
| 
       368 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       369 
     | 
    
         
            -
            ossl_x509_set_subject(VALUE self, VALUE subject)
         
     | 
| 
       370 
     | 
    
         
            -
            {
         
     | 
| 
       371 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       372 
     | 
    
         
            -
             
     | 
| 
       373 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       374 
     | 
    
         
            -
                if (!X509_set_subject_name(x509, GetX509NamePtr(subject))) { /* DUPs name */
         
     | 
| 
       375 
     | 
    
         
            -
            	ossl_raise(eX509CertError, NULL);
         
     | 
| 
       376 
     | 
    
         
            -
                }
         
     | 
| 
       377 
     | 
    
         
            -
             
     | 
| 
       378 
     | 
    
         
            -
                return subject;
         
     | 
| 
       379 
     | 
    
         
            -
            }
         
     | 
| 
       380 
     | 
    
         
            -
             
     | 
| 
       381 
     | 
    
         
            -
            /*
         
     | 
| 
       382 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       383 
     | 
    
         
            -
             *    cert.issuer => name
         
     | 
| 
       384 
     | 
    
         
            -
             */
         
     | 
| 
       385 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       386 
     | 
    
         
            -
            ossl_x509_get_issuer(VALUE self)
         
     | 
| 
       387 
     | 
    
         
            -
            {
         
     | 
| 
       388 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       389 
     | 
    
         
            -
                X509_NAME *name;
         
     | 
| 
       390 
     | 
    
         
            -
             
     | 
| 
       391 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       392 
     | 
    
         
            -
                if(!(name = X509_get_issuer_name(x509))) { /* NO DUP - don't free! */
         
     | 
| 
       393 
     | 
    
         
            -
            	ossl_raise(eX509CertError, NULL);
         
     | 
| 
       394 
     | 
    
         
            -
                }
         
     | 
| 
       395 
     | 
    
         
            -
             
     | 
| 
       396 
     | 
    
         
            -
                return ossl_x509name_new(name);
         
     | 
| 
       397 
     | 
    
         
            -
            }
         
     | 
| 
       398 
     | 
    
         
            -
             
     | 
| 
       399 
     | 
    
         
            -
            /*
         
     | 
| 
       400 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       401 
     | 
    
         
            -
             *    cert.issuer = name => name
         
     | 
| 
       402 
     | 
    
         
            -
             */
         
     | 
| 
       403 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       404 
     | 
    
         
            -
            ossl_x509_set_issuer(VALUE self, VALUE issuer)
         
     | 
| 
       405 
     | 
    
         
            -
            {
         
     | 
| 
       406 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       407 
     | 
    
         
            -
             
     | 
| 
       408 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       409 
     | 
    
         
            -
                if (!X509_set_issuer_name(x509, GetX509NamePtr(issuer))) { /* DUPs name */
         
     | 
| 
       410 
     | 
    
         
            -
            	ossl_raise(eX509CertError, NULL);
         
     | 
| 
       411 
     | 
    
         
            -
                }
         
     | 
| 
       412 
     | 
    
         
            -
             
     | 
| 
       413 
     | 
    
         
            -
                return issuer;
         
     | 
| 
       414 
     | 
    
         
            -
            }
         
     | 
| 
       415 
     | 
    
         
            -
             
     | 
| 
       416 
     | 
    
         
            -
            /*
         
     | 
| 
       417 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       418 
     | 
    
         
            -
             *    cert.not_before => time
         
     | 
| 
       419 
     | 
    
         
            -
             */
         
     | 
| 
       420 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       421 
     | 
    
         
            -
            ossl_x509_get_not_before(VALUE self)
         
     | 
| 
       422 
     | 
    
         
            -
            {
         
     | 
| 
       423 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       424 
     | 
    
         
            -
                const ASN1_TIME *asn1time;
         
     | 
| 
       425 
     | 
    
         
            -
             
     | 
| 
       426 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       427 
     | 
    
         
            -
                if (!(asn1time = X509_get0_notBefore(x509))) {
         
     | 
| 
       428 
     | 
    
         
            -
            	ossl_raise(eX509CertError, NULL);
         
     | 
| 
       429 
     | 
    
         
            -
                }
         
     | 
| 
       430 
     | 
    
         
            -
             
     | 
| 
       431 
     | 
    
         
            -
                return asn1time_to_time(asn1time);
         
     | 
| 
       432 
     | 
    
         
            -
            }
         
     | 
| 
       433 
     | 
    
         
            -
             
     | 
| 
       434 
     | 
    
         
            -
            /*
         
     | 
| 
       435 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       436 
     | 
    
         
            -
             *    cert.not_before = time => time
         
     | 
| 
       437 
     | 
    
         
            -
             */
         
     | 
| 
       438 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       439 
     | 
    
         
            -
            ossl_x509_set_not_before(VALUE self, VALUE time)
         
     | 
| 
       440 
     | 
    
         
            -
            {
         
     | 
| 
       441 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       442 
     | 
    
         
            -
                ASN1_TIME *asn1time;
         
     | 
| 
       443 
     | 
    
         
            -
             
     | 
| 
       444 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       445 
     | 
    
         
            -
                asn1time = ossl_x509_time_adjust(NULL, time);
         
     | 
| 
       446 
     | 
    
         
            -
                if (!X509_set1_notBefore(x509, asn1time)) {
         
     | 
| 
       447 
     | 
    
         
            -
            	ASN1_TIME_free(asn1time);
         
     | 
| 
       448 
     | 
    
         
            -
            	ossl_raise(eX509CertError, "X509_set_notBefore");
         
     | 
| 
       449 
     | 
    
         
            -
                }
         
     | 
| 
       450 
     | 
    
         
            -
                ASN1_TIME_free(asn1time);
         
     | 
| 
       451 
     | 
    
         
            -
             
     | 
| 
       452 
     | 
    
         
            -
                return time;
         
     | 
| 
       453 
     | 
    
         
            -
            }
         
     | 
| 
       454 
     | 
    
         
            -
             
     | 
| 
       455 
     | 
    
         
            -
            /*
         
     | 
| 
       456 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       457 
     | 
    
         
            -
             *    cert.not_after => time
         
     | 
| 
       458 
     | 
    
         
            -
             */
         
     | 
| 
       459 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       460 
     | 
    
         
            -
            ossl_x509_get_not_after(VALUE self)
         
     | 
| 
       461 
     | 
    
         
            -
            {
         
     | 
| 
       462 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       463 
     | 
    
         
            -
                const ASN1_TIME *asn1time;
         
     | 
| 
       464 
     | 
    
         
            -
             
     | 
| 
       465 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       466 
     | 
    
         
            -
                if (!(asn1time = X509_get0_notAfter(x509))) {
         
     | 
| 
       467 
     | 
    
         
            -
            	ossl_raise(eX509CertError, NULL);
         
     | 
| 
       468 
     | 
    
         
            -
                }
         
     | 
| 
       469 
     | 
    
         
            -
             
     | 
| 
       470 
     | 
    
         
            -
                return asn1time_to_time(asn1time);
         
     | 
| 
       471 
     | 
    
         
            -
            }
         
     | 
| 
       472 
     | 
    
         
            -
             
     | 
| 
       473 
     | 
    
         
            -
            /*
         
     | 
| 
       474 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       475 
     | 
    
         
            -
             *    cert.not_after = time => time
         
     | 
| 
       476 
     | 
    
         
            -
             */
         
     | 
| 
       477 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       478 
     | 
    
         
            -
            ossl_x509_set_not_after(VALUE self, VALUE time)
         
     | 
| 
       479 
     | 
    
         
            -
            {
         
     | 
| 
       480 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       481 
     | 
    
         
            -
                ASN1_TIME *asn1time;
         
     | 
| 
       482 
     | 
    
         
            -
             
     | 
| 
       483 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       484 
     | 
    
         
            -
                asn1time = ossl_x509_time_adjust(NULL, time);
         
     | 
| 
       485 
     | 
    
         
            -
                if (!X509_set1_notAfter(x509, asn1time)) {
         
     | 
| 
       486 
     | 
    
         
            -
            	ASN1_TIME_free(asn1time);
         
     | 
| 
       487 
     | 
    
         
            -
            	ossl_raise(eX509CertError, "X509_set_notAfter");
         
     | 
| 
       488 
     | 
    
         
            -
                }
         
     | 
| 
       489 
     | 
    
         
            -
                ASN1_TIME_free(asn1time);
         
     | 
| 
       490 
     | 
    
         
            -
             
     | 
| 
       491 
     | 
    
         
            -
                return time;
         
     | 
| 
       492 
     | 
    
         
            -
            }
         
     | 
| 
       493 
     | 
    
         
            -
             
     | 
| 
       494 
     | 
    
         
            -
            /*
         
     | 
| 
       495 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       496 
     | 
    
         
            -
             *    cert.public_key => key
         
     | 
| 
       497 
     | 
    
         
            -
             */
         
     | 
| 
       498 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       499 
     | 
    
         
            -
            ossl_x509_get_public_key(VALUE self)
         
     | 
| 
       500 
     | 
    
         
            -
            {
         
     | 
| 
       501 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       502 
     | 
    
         
            -
                EVP_PKEY *pkey;
         
     | 
| 
       503 
     | 
    
         
            -
             
     | 
| 
       504 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       505 
     | 
    
         
            -
                if (!(pkey = X509_get_pubkey(x509))) { /* adds an reference */
         
     | 
| 
       506 
     | 
    
         
            -
            	ossl_raise(eX509CertError, NULL);
         
     | 
| 
       507 
     | 
    
         
            -
                }
         
     | 
| 
       508 
     | 
    
         
            -
             
     | 
| 
       509 
     | 
    
         
            -
                return ossl_pkey_new(pkey); /* NO DUP - OK */
         
     | 
| 
       510 
     | 
    
         
            -
            }
         
     | 
| 
       511 
     | 
    
         
            -
             
     | 
| 
       512 
     | 
    
         
            -
            /*
         
     | 
| 
       513 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       514 
     | 
    
         
            -
             *    cert.public_key = key
         
     | 
| 
       515 
     | 
    
         
            -
             */
         
     | 
| 
       516 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       517 
     | 
    
         
            -
            ossl_x509_set_public_key(VALUE self, VALUE key)
         
     | 
| 
       518 
     | 
    
         
            -
            {
         
     | 
| 
       519 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       520 
     | 
    
         
            -
                EVP_PKEY *pkey;
         
     | 
| 
       521 
     | 
    
         
            -
             
     | 
| 
       522 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       523 
     | 
    
         
            -
                pkey = GetPKeyPtr(key);
         
     | 
| 
       524 
     | 
    
         
            -
                ossl_pkey_check_public_key(pkey);
         
     | 
| 
       525 
     | 
    
         
            -
                if (!X509_set_pubkey(x509, pkey))
         
     | 
| 
       526 
     | 
    
         
            -
            	ossl_raise(eX509CertError, "X509_set_pubkey");
         
     | 
| 
       527 
     | 
    
         
            -
                return key;
         
     | 
| 
       528 
     | 
    
         
            -
            }
         
     | 
| 
       529 
     | 
    
         
            -
             
     | 
| 
       530 
     | 
    
         
            -
            /*
         
     | 
| 
       531 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       532 
     | 
    
         
            -
             *    cert.sign(key, digest) => self
         
     | 
| 
       533 
     | 
    
         
            -
             */
         
     | 
| 
       534 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       535 
     | 
    
         
            -
            ossl_x509_sign(VALUE self, VALUE key, VALUE digest)
         
     | 
| 
       536 
     | 
    
         
            -
            {
         
     | 
| 
       537 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       538 
     | 
    
         
            -
                EVP_PKEY *pkey;
         
     | 
| 
       539 
     | 
    
         
            -
                const EVP_MD *md;
         
     | 
| 
       540 
     | 
    
         
            -
             
     | 
| 
       541 
     | 
    
         
            -
                pkey = GetPrivPKeyPtr(key); /* NO NEED TO DUP */
         
     | 
| 
       542 
     | 
    
         
            -
                md = ossl_evp_get_digestbyname(digest);
         
     | 
| 
       543 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       544 
     | 
    
         
            -
                if (!X509_sign(x509, pkey, md)) {
         
     | 
| 
       545 
     | 
    
         
            -
            	ossl_raise(eX509CertError, NULL);
         
     | 
| 
       546 
     | 
    
         
            -
                }
         
     | 
| 
       547 
     | 
    
         
            -
             
     | 
| 
       548 
     | 
    
         
            -
                return self;
         
     | 
| 
       549 
     | 
    
         
            -
            }
         
     | 
| 
       550 
     | 
    
         
            -
             
     | 
| 
       551 
     | 
    
         
            -
            /*
         
     | 
| 
       552 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       553 
     | 
    
         
            -
             *    cert.verify(key) => true | false
         
     | 
| 
       554 
     | 
    
         
            -
             *
         
     | 
| 
       555 
     | 
    
         
            -
             * Verifies the signature of the certificate, with the public key _key_. _key_
         
     | 
| 
       556 
     | 
    
         
            -
             * must be an instance of OpenSSL::PKey.
         
     | 
| 
       557 
     | 
    
         
            -
             */
         
     | 
| 
       558 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       559 
     | 
    
         
            -
            ossl_x509_verify(VALUE self, VALUE key)
         
     | 
| 
       560 
     | 
    
         
            -
            {
         
     | 
| 
       561 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       562 
     | 
    
         
            -
                EVP_PKEY *pkey;
         
     | 
| 
       563 
     | 
    
         
            -
             
     | 
| 
       564 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       565 
     | 
    
         
            -
                pkey = GetPKeyPtr(key);
         
     | 
| 
       566 
     | 
    
         
            -
                ossl_pkey_check_public_key(pkey);
         
     | 
| 
       567 
     | 
    
         
            -
                switch (X509_verify(x509, pkey)) {
         
     | 
| 
       568 
     | 
    
         
            -
                  case 1:
         
     | 
| 
       569 
     | 
    
         
            -
            	return Qtrue;
         
     | 
| 
       570 
     | 
    
         
            -
                  case 0:
         
     | 
| 
       571 
     | 
    
         
            -
            	ossl_clear_error();
         
     | 
| 
       572 
     | 
    
         
            -
            	return Qfalse;
         
     | 
| 
       573 
     | 
    
         
            -
                  default:
         
     | 
| 
       574 
     | 
    
         
            -
            	ossl_raise(eX509CertError, NULL);
         
     | 
| 
       575 
     | 
    
         
            -
                }
         
     | 
| 
       576 
     | 
    
         
            -
            }
         
     | 
| 
       577 
     | 
    
         
            -
             
     | 
| 
       578 
     | 
    
         
            -
            /*
         
     | 
| 
       579 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       580 
     | 
    
         
            -
             *    cert.check_private_key(key) -> true | false
         
     | 
| 
       581 
     | 
    
         
            -
             *
         
     | 
| 
       582 
     | 
    
         
            -
             * Returns +true+ if _key_ is the corresponding private key to the Subject
         
     | 
| 
       583 
     | 
    
         
            -
             * Public Key Information, +false+ otherwise.
         
     | 
| 
       584 
     | 
    
         
            -
             */
         
     | 
| 
       585 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       586 
     | 
    
         
            -
            ossl_x509_check_private_key(VALUE self, VALUE key)
         
     | 
| 
       587 
     | 
    
         
            -
            {
         
     | 
| 
       588 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       589 
     | 
    
         
            -
                EVP_PKEY *pkey;
         
     | 
| 
       590 
     | 
    
         
            -
             
     | 
| 
       591 
     | 
    
         
            -
                /* not needed private key, but should be */
         
     | 
| 
       592 
     | 
    
         
            -
                pkey = GetPrivPKeyPtr(key); /* NO NEED TO DUP */
         
     | 
| 
       593 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       594 
     | 
    
         
            -
                if (!X509_check_private_key(x509, pkey)) {
         
     | 
| 
       595 
     | 
    
         
            -
            	ossl_clear_error();
         
     | 
| 
       596 
     | 
    
         
            -
            	return Qfalse;
         
     | 
| 
       597 
     | 
    
         
            -
                }
         
     | 
| 
       598 
     | 
    
         
            -
             
     | 
| 
       599 
     | 
    
         
            -
                return Qtrue;
         
     | 
| 
       600 
     | 
    
         
            -
            }
         
     | 
| 
       601 
     | 
    
         
            -
             
     | 
| 
       602 
     | 
    
         
            -
            /*
         
     | 
| 
       603 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       604 
     | 
    
         
            -
             *    cert.extensions => [extension...]
         
     | 
| 
       605 
     | 
    
         
            -
             */
         
     | 
| 
       606 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       607 
     | 
    
         
            -
            ossl_x509_get_extensions(VALUE self)
         
     | 
| 
       608 
     | 
    
         
            -
            {
         
     | 
| 
       609 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       610 
     | 
    
         
            -
                int count, i;
         
     | 
| 
       611 
     | 
    
         
            -
                X509_EXTENSION *ext;
         
     | 
| 
       612 
     | 
    
         
            -
                VALUE ary;
         
     | 
| 
       613 
     | 
    
         
            -
             
     | 
| 
       614 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       615 
     | 
    
         
            -
                count = X509_get_ext_count(x509);
         
     | 
| 
       616 
     | 
    
         
            -
                if (count < 0) {
         
     | 
| 
       617 
     | 
    
         
            -
            	return rb_ary_new();
         
     | 
| 
       618 
     | 
    
         
            -
                }
         
     | 
| 
       619 
     | 
    
         
            -
                ary = rb_ary_new2(count);
         
     | 
| 
       620 
     | 
    
         
            -
                for (i=0; i<count; i++) {
         
     | 
| 
       621 
     | 
    
         
            -
            	ext = X509_get_ext(x509, i); /* NO DUP - don't free! */
         
     | 
| 
       622 
     | 
    
         
            -
            	rb_ary_push(ary, ossl_x509ext_new(ext));
         
     | 
| 
       623 
     | 
    
         
            -
                }
         
     | 
| 
       624 
     | 
    
         
            -
             
     | 
| 
       625 
     | 
    
         
            -
                return ary;
         
     | 
| 
       626 
     | 
    
         
            -
            }
         
     | 
| 
       627 
     | 
    
         
            -
             
     | 
| 
       628 
     | 
    
         
            -
            /*
         
     | 
| 
       629 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       630 
     | 
    
         
            -
             *    cert.extensions = [ext...] => [ext...]
         
     | 
| 
       631 
     | 
    
         
            -
             */
         
     | 
| 
       632 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       633 
     | 
    
         
            -
            ossl_x509_set_extensions(VALUE self, VALUE ary)
         
     | 
| 
       634 
     | 
    
         
            -
            {
         
     | 
| 
       635 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       636 
     | 
    
         
            -
                X509_EXTENSION *ext;
         
     | 
| 
       637 
     | 
    
         
            -
                long i;
         
     | 
| 
       638 
     | 
    
         
            -
             
     | 
| 
       639 
     | 
    
         
            -
                Check_Type(ary, T_ARRAY);
         
     | 
| 
       640 
     | 
    
         
            -
                /* All ary's members should be X509Extension */
         
     | 
| 
       641 
     | 
    
         
            -
                for (i=0; i<RARRAY_LEN(ary); i++) {
         
     | 
| 
       642 
     | 
    
         
            -
            	OSSL_Check_Kind(RARRAY_AREF(ary, i), cX509Ext);
         
     | 
| 
       643 
     | 
    
         
            -
                }
         
     | 
| 
       644 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       645 
     | 
    
         
            -
                for (i = X509_get_ext_count(x509); i > 0; i--)
         
     | 
| 
       646 
     | 
    
         
            -
                    X509_EXTENSION_free(X509_delete_ext(x509, 0));
         
     | 
| 
       647 
     | 
    
         
            -
                for (i=0; i<RARRAY_LEN(ary); i++) {
         
     | 
| 
       648 
     | 
    
         
            -
            	ext = GetX509ExtPtr(RARRAY_AREF(ary, i));
         
     | 
| 
       649 
     | 
    
         
            -
            	if (!X509_add_ext(x509, ext, -1)) { /* DUPs ext */
         
     | 
| 
       650 
     | 
    
         
            -
            	    ossl_raise(eX509CertError, "X509_add_ext");
         
     | 
| 
       651 
     | 
    
         
            -
            	}
         
     | 
| 
       652 
     | 
    
         
            -
                }
         
     | 
| 
       653 
     | 
    
         
            -
             
     | 
| 
       654 
     | 
    
         
            -
                return ary;
         
     | 
| 
       655 
     | 
    
         
            -
            }
         
     | 
| 
       656 
     | 
    
         
            -
             
     | 
| 
       657 
     | 
    
         
            -
            /*
         
     | 
| 
       658 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       659 
     | 
    
         
            -
             *    cert.add_extension(extension) => extension
         
     | 
| 
       660 
     | 
    
         
            -
             */
         
     | 
| 
       661 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       662 
     | 
    
         
            -
            ossl_x509_add_extension(VALUE self, VALUE extension)
         
     | 
| 
       663 
     | 
    
         
            -
            {
         
     | 
| 
       664 
     | 
    
         
            -
                X509 *x509;
         
     | 
| 
       665 
     | 
    
         
            -
                X509_EXTENSION *ext;
         
     | 
| 
       666 
     | 
    
         
            -
             
     | 
| 
       667 
     | 
    
         
            -
                GetX509(self, x509);
         
     | 
| 
       668 
     | 
    
         
            -
                ext = GetX509ExtPtr(extension);
         
     | 
| 
       669 
     | 
    
         
            -
                if (!X509_add_ext(x509, ext, -1)) { /* DUPs ext - FREE it */
         
     | 
| 
       670 
     | 
    
         
            -
            	ossl_raise(eX509CertError, NULL);
         
     | 
| 
       671 
     | 
    
         
            -
                }
         
     | 
| 
       672 
     | 
    
         
            -
             
     | 
| 
       673 
     | 
    
         
            -
                return extension;
         
     | 
| 
       674 
     | 
    
         
            -
            }
         
     | 
| 
       675 
     | 
    
         
            -
             
     | 
| 
       676 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       677 
     | 
    
         
            -
            ossl_x509_inspect(VALUE self)
         
     | 
| 
       678 
     | 
    
         
            -
            {
         
     | 
| 
       679 
     | 
    
         
            -
                return rb_sprintf("#<%"PRIsVALUE": subject=%+"PRIsVALUE", "
         
     | 
| 
       680 
     | 
    
         
            -
            		      "issuer=%+"PRIsVALUE", serial=%+"PRIsVALUE", "
         
     | 
| 
       681 
     | 
    
         
            -
            		      "not_before=%+"PRIsVALUE", not_after=%+"PRIsVALUE">",
         
     | 
| 
       682 
     | 
    
         
            -
            		      rb_obj_class(self),
         
     | 
| 
       683 
     | 
    
         
            -
            		      ossl_x509_get_subject(self),
         
     | 
| 
       684 
     | 
    
         
            -
            		      ossl_x509_get_issuer(self),
         
     | 
| 
       685 
     | 
    
         
            -
            		      ossl_x509_get_serial(self),
         
     | 
| 
       686 
     | 
    
         
            -
            		      ossl_x509_get_not_before(self),
         
     | 
| 
       687 
     | 
    
         
            -
            		      ossl_x509_get_not_after(self));
         
     | 
| 
       688 
     | 
    
         
            -
            }
         
     | 
| 
       689 
     | 
    
         
            -
             
     | 
| 
       690 
     | 
    
         
            -
            /*
         
     | 
| 
       691 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       692 
     | 
    
         
            -
             *    cert1 == cert2 -> true | false
         
     | 
| 
       693 
     | 
    
         
            -
             *
         
     | 
| 
       694 
     | 
    
         
            -
             * Compares the two certificates. Note that this takes into account all fields,
         
     | 
| 
       695 
     | 
    
         
            -
             * not just the issuer name and the serial number.
         
     | 
| 
       696 
     | 
    
         
            -
             */
         
     | 
| 
       697 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       698 
     | 
    
         
            -
            ossl_x509_eq(VALUE self, VALUE other)
         
     | 
| 
       699 
     | 
    
         
            -
            {
         
     | 
| 
       700 
     | 
    
         
            -
                X509 *a, *b;
         
     | 
| 
       701 
     | 
    
         
            -
             
     | 
| 
       702 
     | 
    
         
            -
                GetX509(self, a);
         
     | 
| 
       703 
     | 
    
         
            -
                if (!rb_obj_is_kind_of(other, cX509Cert))
         
     | 
| 
       704 
     | 
    
         
            -
            	return Qfalse;
         
     | 
| 
       705 
     | 
    
         
            -
                GetX509(other, b);
         
     | 
| 
       706 
     | 
    
         
            -
             
     | 
| 
       707 
     | 
    
         
            -
                return !X509_cmp(a, b) ? Qtrue : Qfalse;
         
     | 
| 
       708 
     | 
    
         
            -
            }
         
     | 
| 
       709 
     | 
    
         
            -
             
     | 
| 
       710 
     | 
    
         
            -
            struct load_chained_certificates_arguments {
         
     | 
| 
       711 
     | 
    
         
            -
                VALUE certificates;
         
     | 
| 
       712 
     | 
    
         
            -
                X509 *certificate;
         
     | 
| 
       713 
     | 
    
         
            -
            };
         
     | 
| 
       714 
     | 
    
         
            -
             
     | 
| 
       715 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       716 
     | 
    
         
            -
            load_chained_certificates_append_push(VALUE _arguments) {
         
     | 
| 
       717 
     | 
    
         
            -
                struct load_chained_certificates_arguments *arguments = (struct load_chained_certificates_arguments*)_arguments;
         
     | 
| 
       718 
     | 
    
         
            -
             
     | 
| 
       719 
     | 
    
         
            -
                if (arguments->certificates == Qnil) {
         
     | 
| 
       720 
     | 
    
         
            -
                    arguments->certificates = rb_ary_new();
         
     | 
| 
       721 
     | 
    
         
            -
                }
         
     | 
| 
       722 
     | 
    
         
            -
             
     | 
| 
       723 
     | 
    
         
            -
                rb_ary_push(arguments->certificates, ossl_x509_new(arguments->certificate));
         
     | 
| 
       724 
     | 
    
         
            -
             
     | 
| 
       725 
     | 
    
         
            -
                return Qnil;
         
     | 
| 
       726 
     | 
    
         
            -
            }
         
     | 
| 
       727 
     | 
    
         
            -
             
     | 
| 
       728 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       729 
     | 
    
         
            -
            load_chained_certificate_append_ensure(VALUE _arguments) {
         
     | 
| 
       730 
     | 
    
         
            -
                struct load_chained_certificates_arguments *arguments = (struct load_chained_certificates_arguments*)_arguments;
         
     | 
| 
       731 
     | 
    
         
            -
             
     | 
| 
       732 
     | 
    
         
            -
                X509_free(arguments->certificate);
         
     | 
| 
       733 
     | 
    
         
            -
             
     | 
| 
       734 
     | 
    
         
            -
                return Qnil;
         
     | 
| 
       735 
     | 
    
         
            -
            }
         
     | 
| 
       736 
     | 
    
         
            -
             
     | 
| 
       737 
     | 
    
         
            -
            inline static VALUE
         
     | 
| 
       738 
     | 
    
         
            -
            load_chained_certificates_append(VALUE certificates, X509 *certificate) {
         
     | 
| 
       739 
     | 
    
         
            -
                struct load_chained_certificates_arguments arguments;
         
     | 
| 
       740 
     | 
    
         
            -
                arguments.certificates = certificates;
         
     | 
| 
       741 
     | 
    
         
            -
                arguments.certificate = certificate;
         
     | 
| 
       742 
     | 
    
         
            -
             
     | 
| 
       743 
     | 
    
         
            -
                rb_ensure(load_chained_certificates_append_push, (VALUE)&arguments, load_chained_certificate_append_ensure, (VALUE)&arguments);
         
     | 
| 
       744 
     | 
    
         
            -
             
     | 
| 
       745 
     | 
    
         
            -
                return arguments.certificates;
         
     | 
| 
       746 
     | 
    
         
            -
            }
         
     | 
| 
       747 
     | 
    
         
            -
             
     | 
| 
       748 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       749 
     | 
    
         
            -
            load_chained_certificates_PEM(BIO *in) {
         
     | 
| 
       750 
     | 
    
         
            -
                VALUE certificates = Qnil;
         
     | 
| 
       751 
     | 
    
         
            -
                X509 *certificate = PEM_read_bio_X509(in, NULL, NULL, NULL);
         
     | 
| 
       752 
     | 
    
         
            -
             
     | 
| 
       753 
     | 
    
         
            -
                /* If we cannot read even one certificate: */
         
     | 
| 
       754 
     | 
    
         
            -
                if (certificate == NULL) {
         
     | 
| 
       755 
     | 
    
         
            -
                    /* If we cannot read one certificate because we could not read the PEM encoding: */
         
     | 
| 
       756 
     | 
    
         
            -
                    if (ERR_GET_REASON(ERR_peek_last_error()) == PEM_R_NO_START_LINE) {
         
     | 
| 
       757 
     | 
    
         
            -
                        ossl_clear_error();
         
     | 
| 
       758 
     | 
    
         
            -
                    }
         
     | 
| 
       759 
     | 
    
         
            -
             
     | 
| 
       760 
     | 
    
         
            -
                    if (ERR_peek_last_error())
         
     | 
| 
       761 
     | 
    
         
            -
                        ossl_raise(eX509CertError, NULL);
         
     | 
| 
       762 
     | 
    
         
            -
                    else
         
     | 
| 
       763 
     | 
    
         
            -
                        return Qnil;
         
     | 
| 
       764 
     | 
    
         
            -
                }
         
     | 
| 
       765 
     | 
    
         
            -
             
     | 
| 
       766 
     | 
    
         
            -
                certificates = load_chained_certificates_append(Qnil, certificate);
         
     | 
| 
       767 
     | 
    
         
            -
             
     | 
| 
       768 
     | 
    
         
            -
                while ((certificate = PEM_read_bio_X509(in, NULL, NULL, NULL))) {
         
     | 
| 
       769 
     | 
    
         
            -
                  load_chained_certificates_append(certificates, certificate);
         
     | 
| 
       770 
     | 
    
         
            -
                }
         
     | 
| 
       771 
     | 
    
         
            -
             
     | 
| 
       772 
     | 
    
         
            -
                /* We tried to read one more certificate but could not read start line: */
         
     | 
| 
       773 
     | 
    
         
            -
                if (ERR_GET_REASON(ERR_peek_last_error()) == PEM_R_NO_START_LINE) {
         
     | 
| 
       774 
     | 
    
         
            -
                    /* This is not an error, it means we are finished: */
         
     | 
| 
       775 
     | 
    
         
            -
                    ossl_clear_error();
         
     | 
| 
       776 
     | 
    
         
            -
             
     | 
| 
       777 
     | 
    
         
            -
                    return certificates;
         
     | 
| 
       778 
     | 
    
         
            -
                }
         
     | 
| 
       779 
     | 
    
         
            -
             
     | 
| 
       780 
     | 
    
         
            -
                /* Alternatively, if we reached the end of the file and there was no error: */
         
     | 
| 
       781 
     | 
    
         
            -
                if (BIO_eof(in) && !ERR_peek_last_error()) {
         
     | 
| 
       782 
     | 
    
         
            -
                    return certificates;
         
     | 
| 
       783 
     | 
    
         
            -
                } else {
         
     | 
| 
       784 
     | 
    
         
            -
                    /* Otherwise, we tried to read a certificate but failed somewhere: */
         
     | 
| 
       785 
     | 
    
         
            -
                    ossl_raise(eX509CertError, NULL);
         
     | 
| 
       786 
     | 
    
         
            -
                }
         
     | 
| 
       787 
     | 
    
         
            -
            }
         
     | 
| 
       788 
     | 
    
         
            -
             
     | 
| 
       789 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       790 
     | 
    
         
            -
            load_chained_certificates_DER(BIO *in) {
         
     | 
| 
       791 
     | 
    
         
            -
                X509 *certificate = d2i_X509_bio(in, NULL);
         
     | 
| 
       792 
     | 
    
         
            -
             
     | 
| 
       793 
     | 
    
         
            -
                /* If we cannot read one certificate: */
         
     | 
| 
       794 
     | 
    
         
            -
                if (certificate == NULL) {
         
     | 
| 
       795 
     | 
    
         
            -
                    /* Ignore error. We could not load. */
         
     | 
| 
       796 
     | 
    
         
            -
                    ossl_clear_error();
         
     | 
| 
       797 
     | 
    
         
            -
             
     | 
| 
       798 
     | 
    
         
            -
                    return Qnil;
         
     | 
| 
       799 
     | 
    
         
            -
                }
         
     | 
| 
       800 
     | 
    
         
            -
             
     | 
| 
       801 
     | 
    
         
            -
                return load_chained_certificates_append(Qnil, certificate);
         
     | 
| 
       802 
     | 
    
         
            -
            }
         
     | 
| 
       803 
     | 
    
         
            -
             
     | 
| 
       804 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       805 
     | 
    
         
            -
            load_chained_certificates(VALUE _io) {
         
     | 
| 
       806 
     | 
    
         
            -
                BIO *in = (BIO*)_io;
         
     | 
| 
       807 
     | 
    
         
            -
                VALUE certificates = Qnil;
         
     | 
| 
       808 
     | 
    
         
            -
             
     | 
| 
       809 
     | 
    
         
            -
                /*
         
     | 
| 
       810 
     | 
    
         
            -
                  DER is a binary format and it may contain octets within it that look like
         
     | 
| 
       811 
     | 
    
         
            -
                  PEM encoded certificates. So we need to check DER first.
         
     | 
| 
       812 
     | 
    
         
            -
                */
         
     | 
| 
       813 
     | 
    
         
            -
                certificates = load_chained_certificates_DER(in);
         
     | 
| 
       814 
     | 
    
         
            -
             
     | 
| 
       815 
     | 
    
         
            -
                if (certificates != Qnil)
         
     | 
| 
       816 
     | 
    
         
            -
                    return certificates;
         
     | 
| 
       817 
     | 
    
         
            -
             
     | 
| 
       818 
     | 
    
         
            -
                OSSL_BIO_reset(in);
         
     | 
| 
       819 
     | 
    
         
            -
             
     | 
| 
       820 
     | 
    
         
            -
                certificates = load_chained_certificates_PEM(in);
         
     | 
| 
       821 
     | 
    
         
            -
             
     | 
| 
       822 
     | 
    
         
            -
                if (certificates != Qnil)
         
     | 
| 
       823 
     | 
    
         
            -
                    return certificates;
         
     | 
| 
       824 
     | 
    
         
            -
             
     | 
| 
       825 
     | 
    
         
            -
                /* Otherwise we couldn't read the output correctly so fail: */
         
     | 
| 
       826 
     | 
    
         
            -
                ossl_raise(eX509CertError, "Could not detect format of certificate data!");
         
     | 
| 
       827 
     | 
    
         
            -
            }
         
     | 
| 
       828 
     | 
    
         
            -
             
     | 
| 
       829 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       830 
     | 
    
         
            -
            load_chained_certificates_ensure(VALUE _io) {
         
     | 
| 
       831 
     | 
    
         
            -
                BIO *in = (BIO*)_io;
         
     | 
| 
       832 
     | 
    
         
            -
             
     | 
| 
       833 
     | 
    
         
            -
                BIO_free(in);
         
     | 
| 
       834 
     | 
    
         
            -
             
     | 
| 
       835 
     | 
    
         
            -
                return Qnil;
         
     | 
| 
       836 
     | 
    
         
            -
            }
         
     | 
| 
       837 
     | 
    
         
            -
             
     | 
| 
       838 
     | 
    
         
            -
            /*
         
     | 
| 
       839 
     | 
    
         
            -
             * call-seq:
         
     | 
| 
       840 
     | 
    
         
            -
             *    OpenSSL::X509::Certificate.load(string) -> [certs...]
         
     | 
| 
       841 
     | 
    
         
            -
             *    OpenSSL::X509::Certificate.load(file) -> [certs...]
         
     | 
| 
       842 
     | 
    
         
            -
             *
         
     | 
| 
       843 
     | 
    
         
            -
             * Read the chained certificates from the given input. Supports both PEM
         
     | 
| 
       844 
     | 
    
         
            -
             * and DER encoded certificates.
         
     | 
| 
       845 
     | 
    
         
            -
             *
         
     | 
| 
       846 
     | 
    
         
            -
             * PEM is a text format and supports more than one certificate.
         
     | 
| 
       847 
     | 
    
         
            -
             *
         
     | 
| 
       848 
     | 
    
         
            -
             * DER is a binary format and only supports one certificate.
         
     | 
| 
       849 
     | 
    
         
            -
             *
         
     | 
| 
       850 
     | 
    
         
            -
             * If the file is empty, or contains only unrelated data, an
         
     | 
| 
       851 
     | 
    
         
            -
             * +OpenSSL::X509::CertificateError+ exception will be raised.
         
     | 
| 
       852 
     | 
    
         
            -
             */
         
     | 
| 
       853 
     | 
    
         
            -
            static VALUE
         
     | 
| 
       854 
     | 
    
         
            -
            ossl_x509_load(VALUE klass, VALUE buffer)
         
     | 
| 
       855 
     | 
    
         
            -
            {
         
     | 
| 
       856 
     | 
    
         
            -
                BIO *in = ossl_obj2bio(&buffer);
         
     | 
| 
       857 
     | 
    
         
            -
             
     | 
| 
       858 
     | 
    
         
            -
                return rb_ensure(load_chained_certificates, (VALUE)in, load_chained_certificates_ensure, (VALUE)in);
         
     | 
| 
       859 
     | 
    
         
            -
            }
         
     | 
| 
       860 
     | 
    
         
            -
             
     | 
| 
       861 
     | 
    
         
            -
            /*
         
     | 
| 
       862 
     | 
    
         
            -
             * INIT
         
     | 
| 
       863 
     | 
    
         
            -
             */
         
     | 
| 
       864 
     | 
    
         
            -
            void
         
     | 
| 
       865 
     | 
    
         
            -
            Init_ossl_x509cert(void)
         
     | 
| 
       866 
     | 
    
         
            -
            {
         
     | 
| 
       867 
     | 
    
         
            -
            #if 0
         
     | 
| 
       868 
     | 
    
         
            -
                mOSSL = rb_define_module("OpenSSL");
         
     | 
| 
       869 
     | 
    
         
            -
                eOSSLError = rb_define_class_under(mOSSL, "OpenSSLError", rb_eStandardError);
         
     | 
| 
       870 
     | 
    
         
            -
                mX509 = rb_define_module_under(mOSSL, "X509");
         
     | 
| 
       871 
     | 
    
         
            -
            #endif
         
     | 
| 
       872 
     | 
    
         
            -
             
     | 
| 
       873 
     | 
    
         
            -
                eX509CertError = rb_define_class_under(mX509, "CertificateError", eOSSLError);
         
     | 
| 
       874 
     | 
    
         
            -
             
     | 
| 
       875 
     | 
    
         
            -
                /* Document-class: OpenSSL::X509::Certificate
         
     | 
| 
       876 
     | 
    
         
            -
                 *
         
     | 
| 
       877 
     | 
    
         
            -
                 * Implementation of an X.509 certificate as specified in RFC 5280.
         
     | 
| 
       878 
     | 
    
         
            -
                 * Provides access to a certificate's attributes and allows certificates
         
     | 
| 
       879 
     | 
    
         
            -
                 * to be read from a string, but also supports the creation of new
         
     | 
| 
       880 
     | 
    
         
            -
                 * certificates from scratch.
         
     | 
| 
       881 
     | 
    
         
            -
                 *
         
     | 
| 
       882 
     | 
    
         
            -
                 * === Reading a certificate from a file
         
     | 
| 
       883 
     | 
    
         
            -
                 *
         
     | 
| 
       884 
     | 
    
         
            -
                 * Certificate is capable of handling DER-encoded certificates and
         
     | 
| 
       885 
     | 
    
         
            -
                 * certificates encoded in OpenSSL's PEM format.
         
     | 
| 
       886 
     | 
    
         
            -
                 *
         
     | 
| 
       887 
     | 
    
         
            -
                 *   raw = File.binread "cert.cer" # DER- or PEM-encoded
         
     | 
| 
       888 
     | 
    
         
            -
                 *   certificate = OpenSSL::X509::Certificate.new raw
         
     | 
| 
       889 
     | 
    
         
            -
                 *
         
     | 
| 
       890 
     | 
    
         
            -
                 * === Saving a certificate to a file
         
     | 
| 
       891 
     | 
    
         
            -
                 *
         
     | 
| 
       892 
     | 
    
         
            -
                 * A certificate may be encoded in DER format
         
     | 
| 
       893 
     | 
    
         
            -
                 *
         
     | 
| 
       894 
     | 
    
         
            -
                 *   cert = ...
         
     | 
| 
       895 
     | 
    
         
            -
                 *   File.open("cert.cer", "wb") { |f| f.print cert.to_der }
         
     | 
| 
       896 
     | 
    
         
            -
                 *
         
     | 
| 
       897 
     | 
    
         
            -
                 * or in PEM format
         
     | 
| 
       898 
     | 
    
         
            -
                 *
         
     | 
| 
       899 
     | 
    
         
            -
                 *   cert = ...
         
     | 
| 
       900 
     | 
    
         
            -
                 *   File.open("cert.pem", "wb") { |f| f.print cert.to_pem }
         
     | 
| 
       901 
     | 
    
         
            -
                 *
         
     | 
| 
       902 
     | 
    
         
            -
                 * X.509 certificates are associated with a private/public key pair,
         
     | 
| 
       903 
     | 
    
         
            -
                 * typically a RSA, DSA or ECC key (see also OpenSSL::PKey::RSA,
         
     | 
| 
       904 
     | 
    
         
            -
                 * OpenSSL::PKey::DSA and OpenSSL::PKey::EC), the public key itself is
         
     | 
| 
       905 
     | 
    
         
            -
                 * stored within the certificate and can be accessed in form of an
         
     | 
| 
       906 
     | 
    
         
            -
                 * OpenSSL::PKey. Certificates are typically used to be able to associate
         
     | 
| 
       907 
     | 
    
         
            -
                 * some form of identity with a key pair, for example web servers serving
         
     | 
| 
       908 
     | 
    
         
            -
                 * pages over HTTPs use certificates to authenticate themselves to the user.
         
     | 
| 
       909 
     | 
    
         
            -
                 *
         
     | 
| 
       910 
     | 
    
         
            -
                 * The public key infrastructure (PKI) model relies on trusted certificate
         
     | 
| 
       911 
     | 
    
         
            -
                 * authorities ("root CAs") that issue these certificates, so that end
         
     | 
| 
       912 
     | 
    
         
            -
                 * users need to base their trust just on a selected few authorities
         
     | 
| 
       913 
     | 
    
         
            -
                 * that themselves again vouch for subordinate CAs issuing their
         
     | 
| 
       914 
     | 
    
         
            -
                 * certificates to end users.
         
     | 
| 
       915 
     | 
    
         
            -
                 *
         
     | 
| 
       916 
     | 
    
         
            -
                 * The OpenSSL::X509 module provides the tools to set up an independent
         
     | 
| 
       917 
     | 
    
         
            -
                 * PKI, similar to scenarios where the 'openssl' command line tool is
         
     | 
| 
       918 
     | 
    
         
            -
                 * used for issuing certificates in a private PKI.
         
     | 
| 
       919 
     | 
    
         
            -
                 *
         
     | 
| 
       920 
     | 
    
         
            -
                 * === Creating a root CA certificate and an end-entity certificate
         
     | 
| 
       921 
     | 
    
         
            -
                 *
         
     | 
| 
       922 
     | 
    
         
            -
                 * First, we need to create a "self-signed" root certificate. To do so,
         
     | 
| 
       923 
     | 
    
         
            -
                 * we need to generate a key first. Please note that the choice of "1"
         
     | 
| 
       924 
     | 
    
         
            -
                 * as a serial number is considered a security flaw for real certificates.
         
     | 
| 
       925 
     | 
    
         
            -
                 * Secure choices are integers in the two-digit byte range and ideally
         
     | 
| 
       926 
     | 
    
         
            -
                 * not sequential but secure random numbers, steps omitted here to keep
         
     | 
| 
       927 
     | 
    
         
            -
                 * the example concise.
         
     | 
| 
       928 
     | 
    
         
            -
                 *
         
     | 
| 
       929 
     | 
    
         
            -
                 *   root_key = OpenSSL::PKey::RSA.new 2048 # the CA's public/private key
         
     | 
| 
       930 
     | 
    
         
            -
                 *   root_ca = OpenSSL::X509::Certificate.new
         
     | 
| 
       931 
     | 
    
         
            -
                 *   root_ca.version = 2 # cf. RFC 5280 - to make it a "v3" certificate
         
     | 
| 
       932 
     | 
    
         
            -
                 *   root_ca.serial = 1
         
     | 
| 
       933 
     | 
    
         
            -
                 *   root_ca.subject = OpenSSL::X509::Name.parse "/DC=org/DC=ruby-lang/CN=Ruby CA"
         
     | 
| 
       934 
     | 
    
         
            -
                 *   root_ca.issuer = root_ca.subject # root CA's are "self-signed"
         
     | 
| 
       935 
     | 
    
         
            -
                 *   root_ca.public_key = root_key.public_key
         
     | 
| 
       936 
     | 
    
         
            -
                 *   root_ca.not_before = Time.now
         
     | 
| 
       937 
     | 
    
         
            -
                 *   root_ca.not_after = root_ca.not_before + 2 * 365 * 24 * 60 * 60 # 2 years validity
         
     | 
| 
       938 
     | 
    
         
            -
                 *   ef = OpenSSL::X509::ExtensionFactory.new
         
     | 
| 
       939 
     | 
    
         
            -
                 *   ef.subject_certificate = root_ca
         
     | 
| 
       940 
     | 
    
         
            -
                 *   ef.issuer_certificate = root_ca
         
     | 
| 
       941 
     | 
    
         
            -
                 *   root_ca.add_extension(ef.create_extension("basicConstraints","CA:TRUE",true))
         
     | 
| 
       942 
     | 
    
         
            -
                 *   root_ca.add_extension(ef.create_extension("keyUsage","keyCertSign, cRLSign", true))
         
     | 
| 
       943 
     | 
    
         
            -
                 *   root_ca.add_extension(ef.create_extension("subjectKeyIdentifier","hash",false))
         
     | 
| 
       944 
     | 
    
         
            -
                 *   root_ca.add_extension(ef.create_extension("authorityKeyIdentifier","keyid:always",false))
         
     | 
| 
       945 
     | 
    
         
            -
                 *   root_ca.sign(root_key, OpenSSL::Digest.new('SHA256'))
         
     | 
| 
       946 
     | 
    
         
            -
                 *
         
     | 
| 
       947 
     | 
    
         
            -
                 * The next step is to create the end-entity certificate using the root CA
         
     | 
| 
       948 
     | 
    
         
            -
                 * certificate.
         
     | 
| 
       949 
     | 
    
         
            -
                 *
         
     | 
| 
       950 
     | 
    
         
            -
                 *   key = OpenSSL::PKey::RSA.new 2048
         
     | 
| 
       951 
     | 
    
         
            -
                 *   cert = OpenSSL::X509::Certificate.new
         
     | 
| 
       952 
     | 
    
         
            -
                 *   cert.version = 2
         
     | 
| 
       953 
     | 
    
         
            -
                 *   cert.serial = 2
         
     | 
| 
       954 
     | 
    
         
            -
                 *   cert.subject = OpenSSL::X509::Name.parse "/DC=org/DC=ruby-lang/CN=Ruby certificate"
         
     | 
| 
       955 
     | 
    
         
            -
                 *   cert.issuer = root_ca.subject # root CA is the issuer
         
     | 
| 
       956 
     | 
    
         
            -
                 *   cert.public_key = key.public_key
         
     | 
| 
       957 
     | 
    
         
            -
                 *   cert.not_before = Time.now
         
     | 
| 
       958 
     | 
    
         
            -
                 *   cert.not_after = cert.not_before + 1 * 365 * 24 * 60 * 60 # 1 years validity
         
     | 
| 
       959 
     | 
    
         
            -
                 *   ef = OpenSSL::X509::ExtensionFactory.new
         
     | 
| 
       960 
     | 
    
         
            -
                 *   ef.subject_certificate = cert
         
     | 
| 
       961 
     | 
    
         
            -
                 *   ef.issuer_certificate = root_ca
         
     | 
| 
       962 
     | 
    
         
            -
                 *   cert.add_extension(ef.create_extension("keyUsage","digitalSignature", true))
         
     | 
| 
       963 
     | 
    
         
            -
                 *   cert.add_extension(ef.create_extension("subjectKeyIdentifier","hash",false))
         
     | 
| 
       964 
     | 
    
         
            -
                 *   cert.sign(root_key, OpenSSL::Digest.new('SHA256'))
         
     | 
| 
       965 
     | 
    
         
            -
                 *
         
     | 
| 
       966 
     | 
    
         
            -
                 */
         
     | 
| 
       967 
     | 
    
         
            -
                cX509Cert = rb_define_class_under(mX509, "Certificate", rb_cObject);
         
     | 
| 
       968 
     | 
    
         
            -
             
     | 
| 
       969 
     | 
    
         
            -
                rb_define_singleton_method(cX509Cert, "load", ossl_x509_load, 1);
         
     | 
| 
       970 
     | 
    
         
            -
             
     | 
| 
       971 
     | 
    
         
            -
                rb_define_alloc_func(cX509Cert, ossl_x509_alloc);
         
     | 
| 
       972 
     | 
    
         
            -
                rb_define_method(cX509Cert, "initialize", ossl_x509_initialize, -1);
         
     | 
| 
       973 
     | 
    
         
            -
                rb_define_method(cX509Cert, "initialize_copy", ossl_x509_copy, 1);
         
     | 
| 
       974 
     | 
    
         
            -
             
     | 
| 
       975 
     | 
    
         
            -
                rb_define_method(cX509Cert, "to_der", ossl_x509_to_der, 0);
         
     | 
| 
       976 
     | 
    
         
            -
                rb_define_method(cX509Cert, "to_pem", ossl_x509_to_pem, 0);
         
     | 
| 
       977 
     | 
    
         
            -
                rb_define_alias(cX509Cert, "to_s", "to_pem");
         
     | 
| 
       978 
     | 
    
         
            -
                rb_define_method(cX509Cert, "to_text", ossl_x509_to_text, 0);
         
     | 
| 
       979 
     | 
    
         
            -
                rb_define_method(cX509Cert, "version", ossl_x509_get_version, 0);
         
     | 
| 
       980 
     | 
    
         
            -
                rb_define_method(cX509Cert, "version=", ossl_x509_set_version, 1);
         
     | 
| 
       981 
     | 
    
         
            -
                rb_define_method(cX509Cert, "signature_algorithm", ossl_x509_get_signature_algorithm, 0);
         
     | 
| 
       982 
     | 
    
         
            -
                rb_define_method(cX509Cert, "serial", ossl_x509_get_serial, 0);
         
     | 
| 
       983 
     | 
    
         
            -
                rb_define_method(cX509Cert, "serial=", ossl_x509_set_serial, 1);
         
     | 
| 
       984 
     | 
    
         
            -
                rb_define_method(cX509Cert, "subject", ossl_x509_get_subject, 0);
         
     | 
| 
       985 
     | 
    
         
            -
                rb_define_method(cX509Cert, "subject=", ossl_x509_set_subject, 1);
         
     | 
| 
       986 
     | 
    
         
            -
                rb_define_method(cX509Cert, "issuer", ossl_x509_get_issuer, 0);
         
     | 
| 
       987 
     | 
    
         
            -
                rb_define_method(cX509Cert, "issuer=", ossl_x509_set_issuer, 1);
         
     | 
| 
       988 
     | 
    
         
            -
                rb_define_method(cX509Cert, "not_before", ossl_x509_get_not_before, 0);
         
     | 
| 
       989 
     | 
    
         
            -
                rb_define_method(cX509Cert, "not_before=", ossl_x509_set_not_before, 1);
         
     | 
| 
       990 
     | 
    
         
            -
                rb_define_method(cX509Cert, "not_after", ossl_x509_get_not_after, 0);
         
     | 
| 
       991 
     | 
    
         
            -
                rb_define_method(cX509Cert, "not_after=", ossl_x509_set_not_after, 1);
         
     | 
| 
       992 
     | 
    
         
            -
                rb_define_method(cX509Cert, "public_key", ossl_x509_get_public_key, 0);
         
     | 
| 
       993 
     | 
    
         
            -
                rb_define_method(cX509Cert, "public_key=", ossl_x509_set_public_key, 1);
         
     | 
| 
       994 
     | 
    
         
            -
                rb_define_method(cX509Cert, "sign", ossl_x509_sign, 2);
         
     | 
| 
       995 
     | 
    
         
            -
                rb_define_method(cX509Cert, "verify", ossl_x509_verify, 1);
         
     | 
| 
       996 
     | 
    
         
            -
                rb_define_method(cX509Cert, "check_private_key", ossl_x509_check_private_key, 1);
         
     | 
| 
       997 
     | 
    
         
            -
                rb_define_method(cX509Cert, "extensions", ossl_x509_get_extensions, 0);
         
     | 
| 
       998 
     | 
    
         
            -
                rb_define_method(cX509Cert, "extensions=", ossl_x509_set_extensions, 1);
         
     | 
| 
       999 
     | 
    
         
            -
                rb_define_method(cX509Cert, "add_extension", ossl_x509_add_extension, 1);
         
     | 
| 
       1000 
     | 
    
         
            -
                rb_define_method(cX509Cert, "inspect", ossl_x509_inspect, 0);
         
     | 
| 
       1001 
     | 
    
         
            -
                rb_define_method(cX509Cert, "==", ossl_x509_eq, 1);
         
     | 
| 
       1002 
     | 
    
         
            -
            }
         
     |