Ignore the serial number for now and just do the rest.
authorRichard J. Moore <rich@kde.org>
Sat, 30 Jul 2016 17:36:16 +0000 (18:36 +0100)
committerRich Salz <rsalz@openssl.org>
Sat, 30 Jul 2016 19:19:24 +0000 (15:19 -0400)
Reviewed-by: Stephen Henson <steve@openssl.org>
Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/1367)

apps/ca.c
crypto/ocsp/ocsp_lib.c
crypto/x509/x509_cmp.c
include/openssl/ocsp.h
include/openssl/x509.h

index 3cad05d68d63dcd982bce73471025b8a10d077e0..376c8a553b85bc624e7953fd1fe79f6f07bac5d3 100644 (file)
--- a/apps/ca.c
+++ b/apps/ca.c
@@ -980,14 +980,14 @@ end_of_options:
         if (verbose)
             BIO_printf(bio_err, "writing new certificates\n");
         for (i = 0; i < sk_X509_num(cert_sk); i++) {
-            const ASN1_INTEGER *serialNumber = X509_get_serialNumber(x);
+            ASN1_INTEGER *serialNumber = X509_get_serialNumber(x);
             int k;
             char *n;
 
             x = sk_X509_value(cert_sk, i);
 
             j = ASN1_STRING_length(serialNumber);
-            p = (const char *)ASN1_STRING_data((ASN1_INTEGER *)serialNumber);
+            p = (const char *)ASN1_STRING_data(serialNumber);
 
             if (strlen(outdir) >= (size_t)(j ? BSIZE - j * 2 - 6 : BSIZE - 8)) {
                 BIO_printf(bio_err, "certificate file name too long\n");
@@ -1685,7 +1685,7 @@ static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509,
         goto end;
 #endif
 
-    if (BN_to_ASN1_INTEGER(serial, (ASN1_INTEGER *)X509_get_serialNumber(ret)) == NULL)
+    if (BN_to_ASN1_INTEGER(serial, X509_get_serialNumber(ret)) == NULL)
         goto end;
     if (selfsign) {
         if (!X509_set_issuer_name(ret, subject))
index e850b4c01cb02284aaedfa7c35540868d455aa77..5ff2f318b3b4052dbece9b2dba8639af2c57255c 100644 (file)
@@ -22,7 +22,7 @@
 OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, X509 *subject, X509 *issuer)
 {
     X509_NAME *iname;
-    const ASN1_INTEGER *serial;
+    ASN1_INTEGER *serial;
     ASN1_BIT_STRING *ikey;
     if (!dgst)
         dgst = EVP_sha1();
@@ -40,7 +40,7 @@ OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, X509 *subject, X509 *issuer)
 OCSP_CERTID *OCSP_cert_id_new(const EVP_MD *dgst,
                               X509_NAME *issuerName,
                               ASN1_BIT_STRING *issuerKey,
-                              const ASN1_INTEGER *serialNumber)
+                              ASN1_INTEGER *serialNumber)
 {
     int nid;
     unsigned int i;
index dffc8e241b1a8d2b63feed53a1fde496a084b9dd..a33fd4779d919b73a7cf2f32c5765a5723953174 100644 (file)
@@ -102,7 +102,7 @@ X509_NAME *X509_get_subject_name(const X509 *a)
     return (a->cert_info.subject);
 }
 
-const ASN1_INTEGER *X509_get_serialNumber(const X509 *a)
+ASN1_INTEGER *X509_get_serialNumber(X509 *a)
 {
     return &a->cert_info.serialNumber;
 }
index ecf3a2d7656b3d0a8d2795ae1e2cb8da9838035e..a468a5233e2ebd423cfece747a2c574ae74e06c2 100644 (file)
@@ -187,7 +187,7 @@ OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, X509 *subject, X509 *issuer);
 OCSP_CERTID *OCSP_cert_id_new(const EVP_MD *dgst,
                               X509_NAME *issuerName,
                               ASN1_BIT_STRING *issuerKey,
-                              const ASN1_INTEGER *serialNumber);
+                              ASN1_INTEGER *serialNumber);
 
 OCSP_ONEREQ *OCSP_request_add0_id(OCSP_REQUEST *req, OCSP_CERTID *cid);
 
index c2623f6df6826c0ebfde60925057d45c210e4ef3..e68d4b366cfe754472b4f96a926ea42647ce95e0 100644 (file)
@@ -612,7 +612,7 @@ int ASN1_item_sign_ctx(const ASN1_ITEM *it, X509_ALGOR *algor1,
 long X509_get_version(const X509 *x);
 int X509_set_version(X509 *x, long version);
 int X509_set_serialNumber(X509 *x, ASN1_INTEGER *serial);
-const ASN1_INTEGER *X509_get_serialNumber(const X509 *x);
+ASN1_INTEGER *X509_get_serialNumber(X509 *x);
 int X509_set_issuer_name(X509 *x, X509_NAME *name);
 X509_NAME *X509_get_issuer_name(const X509 *a);
 int X509_set_subject_name(X509 *x, X509_NAME *name);