Make sure that a cert with extensions gets version number 2 (v3)
authorRichard Levitte <levitte@openssl.org>
Tue, 26 Sep 2017 08:46:10 +0000 (10:46 +0200)
committerRichard Levitte <levitte@openssl.org>
Tue, 26 Sep 2017 08:47:43 +0000 (10:47 +0200)
Fixes #4419

Reviewed-by: Tim Hudson <tjh@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/4420)

apps/ca.c

index 976f6bb5f00c8416d4a383e00219fb64e72cb2fa..3bcbcbb678c2f7916521dec9e254f248cf863111 100644 (file)
--- a/apps/ca.c
+++ b/apps/ca.c
@@ -1735,7 +1735,6 @@ static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509,
     /* Lets add the extensions, if there are any */
     if (ext_sect) {
         X509V3_CTX ctx;
-        X509_set_version(ret, 2);
 
         /* Initialize the context structure */
         if (selfsign)
@@ -1790,6 +1789,15 @@ static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509,
         goto end;
     }
 
+    {
+        const STACK_OF(X509_EXTENSION) *exts = X509_get0_extensions(ret);
+
+        if (exts != NULL && sk_X509_EXTENSION_num(exts) > 0)
+            /* Make it an X509 v3 certificate. */
+            if (!X509_set_version(ret, 2))
+                goto end;
+    }
+
     /* Set the right value for the noemailDN option */
     if (email_dn == 0) {
         if (!X509_set_subject_name(ret, dn_subject))