2015-12-11 03:13:57 +08:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
|
|
|
X509v3_get_ext_count, X509v3_get_ext, X509v3_get_ext_by_NID,
|
|
|
|
X509v3_get_ext_by_OBJ, X509v3_get_ext_by_critical, X509v3_delete_ext,
|
2016-06-21 19:03:34 +08:00
|
|
|
X509v3_add_ext, X509_get_ext_count, X509_get_ext,
|
2015-12-11 03:13:57 +08:00
|
|
|
X509_get_ext_by_NID, X509_get_ext_by_OBJ, X509_get_ext_by_critical,
|
|
|
|
X509_delete_ext, X509_add_ext, X509_CRL_get_ext_count, X509_CRL_get_ext,
|
|
|
|
X509_CRL_get_ext_by_NID, X509_CRL_get_ext_by_OBJ, X509_CRL_get_ext_by_critical,
|
|
|
|
X509_CRL_delete_ext, X509_CRL_add_ext, X509_REVOKED_get_ext_count,
|
|
|
|
X509_REVOKED_get_ext, X509_REVOKED_get_ext_by_NID, X509_REVOKED_get_ext_by_OBJ,
|
|
|
|
X509_REVOKED_get_ext_by_critical, X509_REVOKED_delete_ext,
|
2016-06-06 12:43:05 +08:00
|
|
|
X509_REVOKED_add_ext - extension stack utility functions
|
2015-12-11 03:13:57 +08:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/x509.h>
|
|
|
|
|
|
|
|
int X509v3_get_ext_count(const STACK_OF(X509_EXTENSION) *x);
|
|
|
|
X509_EXTENSION *X509v3_get_ext(const STACK_OF(X509_EXTENSION) *x, int loc);
|
|
|
|
|
|
|
|
int X509v3_get_ext_by_NID(const STACK_OF(X509_EXTENSION) *x,
|
|
|
|
int nid, int lastpos);
|
|
|
|
int X509v3_get_ext_by_OBJ(const STACK_OF(X509_EXTENSION) *x,
|
2016-08-01 01:38:09 +08:00
|
|
|
const ASN1_OBJECT *obj, int lastpos);
|
2015-12-11 03:13:57 +08:00
|
|
|
int X509v3_get_ext_by_critical(const STACK_OF(X509_EXTENSION) *x,
|
|
|
|
int crit, int lastpos);
|
|
|
|
X509_EXTENSION *X509v3_delete_ext(STACK_OF(X509_EXTENSION) *x, int loc);
|
|
|
|
STACK_OF(X509_EXTENSION) *X509v3_add_ext(STACK_OF(X509_EXTENSION) **x,
|
|
|
|
X509_EXTENSION *ex, int loc);
|
|
|
|
|
2016-07-10 06:37:58 +08:00
|
|
|
int X509_get_ext_count(const X509 *x);
|
2016-07-10 06:59:23 +08:00
|
|
|
X509_EXTENSION *X509_get_ext(const X509 *x, int loc);
|
2016-07-10 06:37:58 +08:00
|
|
|
int X509_get_ext_by_NID(const X509 *x, int nid, int lastpos);
|
2016-08-01 01:38:09 +08:00
|
|
|
int X509_get_ext_by_OBJ(const X509 *x, const ASN1_OBJECT *obj, int lastpos);
|
2016-07-10 06:37:58 +08:00
|
|
|
int X509_get_ext_by_critical(const X509 *x, int crit, int lastpos);
|
2015-12-11 03:13:57 +08:00
|
|
|
X509_EXTENSION *X509_delete_ext(X509 *x, int loc);
|
|
|
|
int X509_add_ext(X509 *x, X509_EXTENSION *ex, int loc);
|
|
|
|
|
2016-07-10 06:37:58 +08:00
|
|
|
int X509_CRL_get_ext_count(const X509_CRL *x);
|
2016-07-10 06:59:23 +08:00
|
|
|
X509_EXTENSION *X509_CRL_get_ext(const X509_CRL *x, int loc);
|
2016-07-10 06:37:58 +08:00
|
|
|
int X509_CRL_get_ext_by_NID(const X509_CRL *x, int nid, int lastpos);
|
2022-07-13 16:55:06 +08:00
|
|
|
int X509_CRL_get_ext_by_OBJ(const X509_CRL *x, const ASN1_OBJECT *obj,
|
|
|
|
int lastpos);
|
2016-07-10 06:37:58 +08:00
|
|
|
int X509_CRL_get_ext_by_critical(const X509_CRL *x, int crit, int lastpos);
|
2015-12-11 03:13:57 +08:00
|
|
|
X509_EXTENSION *X509_CRL_delete_ext(X509_CRL *x, int loc);
|
|
|
|
int X509_CRL_add_ext(X509_CRL *x, X509_EXTENSION *ex, int loc);
|
|
|
|
|
2016-07-10 06:37:58 +08:00
|
|
|
int X509_REVOKED_get_ext_count(const X509_REVOKED *x);
|
2016-07-10 06:59:23 +08:00
|
|
|
X509_EXTENSION *X509_REVOKED_get_ext(const X509_REVOKED *x, int loc);
|
2016-07-10 06:37:58 +08:00
|
|
|
int X509_REVOKED_get_ext_by_NID(const X509_REVOKED *x, int nid, int lastpos);
|
2016-08-01 01:38:09 +08:00
|
|
|
int X509_REVOKED_get_ext_by_OBJ(const X509_REVOKED *x, const ASN1_OBJECT *obj,
|
2017-01-21 02:58:49 +08:00
|
|
|
int lastpos);
|
2016-07-10 06:37:58 +08:00
|
|
|
int X509_REVOKED_get_ext_by_critical(const X509_REVOKED *x, int crit, int lastpos);
|
2015-12-11 03:13:57 +08:00
|
|
|
X509_EXTENSION *X509_REVOKED_delete_ext(X509_REVOKED *x, int loc);
|
|
|
|
int X509_REVOKED_add_ext(X509_REVOKED *x, X509_EXTENSION *ex, int loc);
|
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
2022-07-13 16:55:06 +08:00
|
|
|
X509v3_get_ext_count() retrieves the number of extensions in I<x>.
|
2015-12-11 03:13:57 +08:00
|
|
|
|
2022-07-13 16:55:06 +08:00
|
|
|
X509v3_get_ext() retrieves extension I<loc> from I<x>. The index I<loc>
|
|
|
|
can take any value from 0 to X509_get_ext_count(I<x>) - 1. The returned
|
|
|
|
extension is an internal pointer which B<MUST NOT> be freed by the
|
2015-12-11 03:13:57 +08:00
|
|
|
application.
|
|
|
|
|
|
|
|
X509v3_get_ext_by_NID() and X509v3_get_ext_by_OBJ() look for an extension
|
2022-07-13 16:55:06 +08:00
|
|
|
with I<nid> or I<obj> from extension STACK I<x>. The search starts from the
|
|
|
|
extension after I<lastpos> or from the beginning if I<lastpos> is -1. If
|
|
|
|
the extension is found, its index is returned, otherwise -1 is returned.
|
2015-12-11 03:13:57 +08:00
|
|
|
|
|
|
|
X509v3_get_ext_by_critical() is similar to X509v3_get_ext_by_NID() except it
|
2022-07-13 16:55:06 +08:00
|
|
|
looks for an extension of criticality I<crit>. A zero value for I<crit>
|
|
|
|
looks for a non-critical extension. A nonzero value looks for a critical
|
2015-12-11 03:13:57 +08:00
|
|
|
extension.
|
|
|
|
|
2022-07-13 16:55:06 +08:00
|
|
|
X509v3_delete_ext() deletes the extension with index I<loc> from I<x>.
|
2021-01-09 06:18:19 +08:00
|
|
|
The deleted extension is returned and must be freed by the caller.
|
2022-07-13 16:55:06 +08:00
|
|
|
If I<loc> is an invalid index value, NULL is returned.
|
2015-12-11 03:13:57 +08:00
|
|
|
|
2022-07-13 16:55:06 +08:00
|
|
|
X509v3_add_ext() adds extension I<ex> to STACK I<*x> at position I<loc>. If
|
|
|
|
I<loc> is -1, the new extension is added to the end. If I<*x> is NULL,
|
|
|
|
a new STACK will be allocated. The passed extension I<ex> is duplicated
|
2015-12-11 03:13:57 +08:00
|
|
|
internally so it must be freed after use.
|
|
|
|
|
|
|
|
X509_get_ext_count(), X509_get_ext(), X509_get_ext_by_NID(),
|
|
|
|
X509_get_ext_by_OBJ(), X509_get_ext_by_critical(), X509_delete_ext()
|
2022-07-13 16:55:06 +08:00
|
|
|
and X509_add_ext() operate on the extensions of certificate I<x>. They are
|
2015-12-11 03:13:57 +08:00
|
|
|
otherwise identical to the X509v3 functions.
|
|
|
|
|
|
|
|
X509_CRL_get_ext_count(), X509_CRL_get_ext(), X509_CRL_get_ext_by_NID(),
|
|
|
|
X509_CRL_get_ext_by_OBJ(), X509_CRL_get_ext_by_critical(),
|
|
|
|
X509_CRL_delete_ext() and X509_CRL_add_ext() operate on the extensions of
|
2022-07-13 16:55:06 +08:00
|
|
|
CRL I<x>. They are otherwise identical to the X509v3 functions.
|
2015-12-11 03:13:57 +08:00
|
|
|
|
|
|
|
X509_REVOKED_get_ext_count(), X509_REVOKED_get_ext(),
|
|
|
|
X509_REVOKED_get_ext_by_NID(), X509_REVOKED_get_ext_by_OBJ(),
|
|
|
|
X509_REVOKED_get_ext_by_critical(), X509_REVOKED_delete_ext() and
|
2022-07-13 16:55:06 +08:00
|
|
|
X509_REVOKED_add_ext() operate on the extensions of CRL entry I<x>.
|
|
|
|
They are otherwise identical to the X509v3 functions.
|
2015-12-11 03:13:57 +08:00
|
|
|
|
|
|
|
=head1 NOTES
|
|
|
|
|
2022-07-13 16:55:06 +08:00
|
|
|
These functions are used to examine stacks of extensions directly.
|
|
|
|
Applications that want to parse or encode and add an extension should
|
|
|
|
use the extension encode and decode functions instead, such as
|
2015-12-11 03:13:57 +08:00
|
|
|
X509_add1_ext_i2d() and X509_get_ext_d2i().
|
|
|
|
|
2022-07-13 16:55:06 +08:00
|
|
|
For X509v3_get_ext_by_NID(), X509v3_get_ext_by_OBJ(),
|
|
|
|
X509v3_get_ext_by_critical() and its variants, a zero index return value
|
|
|
|
is not an error since extension STACK I<x> indices start from zero.
|
|
|
|
These search functions start from the extension B<after> the I<lastpos> parameter
|
|
|
|
so it should initially be set to -1. If it is set to zero, the initial extension
|
|
|
|
will not be checked.
|
2021-01-09 06:18:19 +08:00
|
|
|
|
|
|
|
X509v3_delete_ext() and its variants are a bit counter-intuitive
|
|
|
|
because these functions do not free the extension they delete.
|
2022-07-13 16:55:06 +08:00
|
|
|
They return an B<X509_EXTENSION> object which must be explicitly freed
|
|
|
|
using X509_EXTENSION_free().
|
2021-01-09 06:18:19 +08:00
|
|
|
|
2015-12-11 03:13:57 +08:00
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
|
|
|
X509v3_get_ext_count() returns the extension count.
|
|
|
|
|
2018-06-12 23:51:53 +08:00
|
|
|
X509v3_get_ext(), X509v3_delete_ext() and X509_delete_ext() return an
|
2022-07-13 16:55:06 +08:00
|
|
|
B<X509_EXTENSION> structure or NULL if an error occurs.
|
2015-12-11 03:13:57 +08:00
|
|
|
|
2022-07-13 16:55:06 +08:00
|
|
|
X509v3_get_ext_by_NID(), X509v3_get_ext_by_OBJ() and
|
|
|
|
X509v3_get_ext_by_critical() return the extension index or -1 if an
|
2015-12-11 03:13:57 +08:00
|
|
|
error occurs.
|
|
|
|
|
2022-07-13 16:55:06 +08:00
|
|
|
X509v3_add_ext() returns a STACK of extensions or NULL on error.
|
2015-12-11 03:13:57 +08:00
|
|
|
|
2018-06-12 23:51:53 +08:00
|
|
|
X509_add_ext() returns 1 on success and 0 on error.
|
|
|
|
|
2015-12-11 03:13:57 +08:00
|
|
|
=head1 SEE ALSO
|
|
|
|
|
|
|
|
L<X509V3_get_d2i(3)>
|
2016-05-18 22:16:40 +08:00
|
|
|
|
2016-05-18 23:44:05 +08:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2022-05-03 18:52:38 +08:00
|
|
|
Copyright 2015-2022 The OpenSSL Project Authors. All Rights Reserved.
|
2016-05-18 23:44:05 +08:00
|
|
|
|
2018-12-06 21:04:44 +08:00
|
|
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 23:44:05 +08:00
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|