1/* crypto/asn1/t_x509.c */ 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 3 * All rights reserved. 4 * 5 * This package is an SSL implementation written 6 * by Eric Young (eay@cryptsoft.com). 7 * The implementation was written so as to conform with Netscapes SSL. 8 * 9 * This library is free for commercial and non-commercial use as long as 10 * the following conditions are aheared to. The following conditions 11 * apply to all code found in this distribution, be it the RC4, RSA, 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 13 * included with this distribution is covered by the same copyright terms 14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). 15 * 16 * Copyright remains Eric Young's, and as such any Copyright notices in 17 * the code are not to be removed. 18 * If this package is used in a product, Eric Young should be given attribution 19 * as the author of the parts of the library used. 20 * This can be in the form of a textual message at program startup or 21 * in documentation (online or textual) provided with the package. 22 * 23 * Redistribution and use in source and binary forms, with or without 24 * modification, are permitted provided that the following conditions 25 * are met: 26 * 1. Redistributions of source code must retain the copyright 27 * notice, this list of conditions and the following disclaimer. 28 * 2. Redistributions in binary form must reproduce the above copyright 29 * notice, this list of conditions and the following disclaimer in the 30 * documentation and/or other materials provided with the distribution. 31 * 3. All advertising materials mentioning features or use of this software 32 * must display the following acknowledgement: 33 * "This product includes cryptographic software written by 34 * Eric Young (eay@cryptsoft.com)" 35 * The word 'cryptographic' can be left out if the rouines from the library 36 * being used are not cryptographic related :-). 37 * 4. If you include any Windows specific code (or a derivative thereof) from 38 * the apps directory (application code) you must include an acknowledgement: 39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 40 * 41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 51 * SUCH DAMAGE. 52 * 53 * The licence and distribution terms for any publically available version or 54 * derivative of this code cannot be changed. i.e. this code cannot simply be 55 * copied and put under another distribution licence 56 * [including the GNU Public Licence.] 57 */ 58 59#include <stdio.h> 60#include "cryptlib.h" 61#include <openssl/buffer.h> 62#include <openssl/bn.h> 63#ifndef OPENSSL_NO_RSA 64#include <openssl/rsa.h> 65#endif 66#ifndef OPENSSL_NO_DSA 67#include <openssl/dsa.h> 68#endif 69#include <openssl/objects.h> 70#include <openssl/x509.h> 71#include <openssl/x509v3.h> 72 73#ifndef OPENSSL_NO_FP_API 74int X509_print_fp(FILE *fp, X509 *x) 75 { 76 return X509_print_ex_fp(fp, x, XN_FLAG_COMPAT, X509_FLAG_COMPAT); 77 } 78 79int X509_print_ex_fp(FILE *fp, X509 *x, unsigned long nmflag, unsigned long cflag) 80 { 81 BIO *b; 82 int ret; 83 84 if ((b=BIO_new(BIO_s_file())) == NULL) 85 { 86 X509err(X509_F_X509_PRINT_FP,ERR_R_BUF_LIB); 87 return(0); 88 } 89 BIO_set_fp(b,fp,BIO_NOCLOSE); 90 ret=X509_print_ex(b, x, nmflag, cflag); 91 BIO_free(b); 92 return(ret); 93 } 94#endif 95 96int X509_print(BIO *bp, X509 *x) 97{ 98 return X509_print_ex(bp, x, XN_FLAG_COMPAT, X509_FLAG_COMPAT); 99} 100 101int X509_print_ex(BIO *bp, X509 *x, unsigned long nmflags, unsigned long cflag) 102 { 103 long l; 104 int ret=0,i; 105 char *m=NULL,mlch = ' '; 106 int nmindent = 0; 107 X509_CINF *ci; 108 ASN1_INTEGER *bs; 109 EVP_PKEY *pkey=NULL; 110 const char *neg; 111 ASN1_STRING *str=NULL; 112 113 if((nmflags & XN_FLAG_SEP_MASK) == XN_FLAG_SEP_MULTILINE) { 114 mlch = '\n'; 115 nmindent = 12; 116 } 117 118 if(nmflags == X509_FLAG_COMPAT) 119 nmindent = 16; 120 121 ci=x->cert_info; 122 if(!(cflag & X509_FLAG_NO_HEADER)) 123 { 124 if (BIO_write(bp,"Certificate:\n",13) <= 0) goto err; 125 if (BIO_write(bp," Data:\n",10) <= 0) goto err; 126 } 127 if(!(cflag & X509_FLAG_NO_VERSION)) 128 { 129 l=X509_get_version(x); 130 if (BIO_printf(bp,"%8sVersion: %lu (0x%lx)\n","",l+1,l) <= 0) goto err; 131 } 132 if(!(cflag & X509_FLAG_NO_SERIAL)) 133 { 134 135 if (BIO_write(bp," Serial Number:",22) <= 0) goto err; 136 137 bs=X509_get_serialNumber(x); 138 if (bs->length <= 4) 139 { 140 l=ASN1_INTEGER_get(bs); 141 if (l < 0) 142 { 143 l= -l; 144 neg="-"; 145 } 146 else 147 neg=""; 148 if (BIO_printf(bp," %s%lu (%s0x%lx)\n",neg,l,neg,l) <= 0) 149 goto err; 150 } 151 else 152 { 153 neg=(bs->type == V_ASN1_NEG_INTEGER)?" (Negative)":""; 154 if (BIO_printf(bp,"\n%12s%s","",neg) <= 0) goto err; 155 156 for (i=0; i<bs->length; i++) 157 { 158 if (BIO_printf(bp,"%02x%c",bs->data[i], 159 ((i+1 == bs->length)?'\n':':')) <= 0) 160 goto err; 161 } 162 } 163 164 } 165 166 if(!(cflag & X509_FLAG_NO_SIGNAME)) 167 { 168 if (BIO_printf(bp,"%8sSignature Algorithm: ","") <= 0) 169 goto err; 170 if (i2a_ASN1_OBJECT(bp, ci->signature->algorithm) <= 0) 171 goto err; 172 if (BIO_puts(bp, "\n") <= 0) 173 goto err; 174 } 175 176 if(!(cflag & X509_FLAG_NO_ISSUER)) 177 { 178 if (BIO_printf(bp," Issuer:%c",mlch) <= 0) goto err; 179 if (X509_NAME_print_ex(bp,X509_get_issuer_name(x),nmindent, nmflags) < 0) goto err; 180 if (BIO_write(bp,"\n",1) <= 0) goto err; 181 } 182 if(!(cflag & X509_FLAG_NO_VALIDITY)) 183 { 184 if (BIO_write(bp," Validity\n",17) <= 0) goto err; 185 if (BIO_write(bp," Not Before: ",24) <= 0) goto err; 186 if (!ASN1_TIME_print(bp,X509_get_notBefore(x))) goto err; 187 if (BIO_write(bp,"\n Not After : ",25) <= 0) goto err; 188 if (!ASN1_TIME_print(bp,X509_get_notAfter(x))) goto err; 189 if (BIO_write(bp,"\n",1) <= 0) goto err; 190 } 191 if(!(cflag & X509_FLAG_NO_SUBJECT)) 192 { 193 if (BIO_printf(bp," Subject:%c",mlch) <= 0) goto err; 194 if (X509_NAME_print_ex(bp,X509_get_subject_name(x),nmindent, nmflags) < 0) goto err; 195 if (BIO_write(bp,"\n",1) <= 0) goto err; 196 } 197 if(!(cflag & X509_FLAG_NO_PUBKEY)) 198 { 199 if (BIO_write(bp," Subject Public Key Info:\n",33) <= 0) 200 goto err; 201 if (BIO_printf(bp,"%12sPublic Key Algorithm: ","") <= 0) 202 goto err; 203 if (i2a_ASN1_OBJECT(bp, ci->key->algor->algorithm) <= 0) 204 goto err; 205 if (BIO_puts(bp, "\n") <= 0) 206 goto err; 207 208 pkey=X509_get_pubkey(x); 209 if (pkey == NULL) 210 { 211 BIO_printf(bp,"%12sUnable to load Public Key\n",""); 212 ERR_print_errors(bp); 213 } 214 else 215#ifndef OPENSSL_NO_RSA 216 if (pkey->type == EVP_PKEY_RSA) 217 { 218 BIO_printf(bp,"%12sRSA Public Key: (%d bit)\n","", 219 BN_num_bits(pkey->pkey.rsa->n)); 220 RSA_print(bp,pkey->pkey.rsa,16); 221 } 222 else 223#endif 224#ifndef OPENSSL_NO_DSA 225 if (pkey->type == EVP_PKEY_DSA) 226 { 227 BIO_printf(bp,"%12sDSA Public Key:\n",""); 228 DSA_print(bp,pkey->pkey.dsa,16); 229 } 230 else 231#endif 232 BIO_printf(bp,"%12sUnknown Public Key:\n",""); 233 234 EVP_PKEY_free(pkey); 235 } 236 237 if (!(cflag & X509_FLAG_NO_EXTENSIONS)) 238 X509V3_extensions_print(bp, "X509v3 extensions", 239 ci->extensions, cflag, 8); 240 241 if(!(cflag & X509_FLAG_NO_SIGDUMP)) 242 { 243 if(X509_signature_print(bp, x->sig_alg, x->signature) <= 0) goto err; 244 } 245 if(!(cflag & X509_FLAG_NO_AUX)) 246 { 247 if (!X509_CERT_AUX_print(bp, x->aux, 0)) goto err; 248 } 249 ret=1; 250err: 251 if (str != NULL) ASN1_STRING_free(str); 252 if (m != NULL) OPENSSL_free(m); 253 return(ret); 254 } 255 256int X509_ocspid_print (BIO *bp, X509 *x) 257 { 258 unsigned char *der=NULL ; 259 unsigned char *dertmp; 260 int derlen; 261 int i; 262 unsigned char SHA1md[SHA_DIGEST_LENGTH]; 263 264 /* display the hash of the subject as it would appear 265 in OCSP requests */ 266 if (BIO_printf(bp," Subject OCSP hash: ") <= 0) 267 goto err; 268 derlen = i2d_X509_NAME(x->cert_info->subject, NULL); 269 if ((der = dertmp = (unsigned char *)OPENSSL_malloc (derlen)) == NULL) 270 goto err; 271 i2d_X509_NAME(x->cert_info->subject, &dertmp); 272 273 EVP_Digest(der, derlen, SHA1md, NULL, EVP_sha1(), NULL); 274 for (i=0; i < SHA_DIGEST_LENGTH; i++) 275 { 276 if (BIO_printf(bp,"%02X",SHA1md[i]) <= 0) goto err; 277 } 278 OPENSSL_free (der); 279 der=NULL; 280 281 /* display the hash of the public key as it would appear 282 in OCSP requests */ 283 if (BIO_printf(bp,"\n Public key OCSP hash: ") <= 0) 284 goto err; 285 286 EVP_Digest(x->cert_info->key->public_key->data, 287 x->cert_info->key->public_key->length, SHA1md, NULL, EVP_sha1(), NULL); 288 for (i=0; i < SHA_DIGEST_LENGTH; i++) 289 { 290 if (BIO_printf(bp,"%02X",SHA1md[i]) <= 0) 291 goto err; 292 } 293 BIO_printf(bp,"\n"); 294 295 return (1); 296err: 297 if (der != NULL) OPENSSL_free(der); 298 return(0); 299 } 300 301int X509_signature_print(BIO *bp, X509_ALGOR *sigalg, ASN1_STRING *sig) 302{ 303 unsigned char *s; 304 int i, n; 305 if (BIO_puts(bp," Signature Algorithm: ") <= 0) return 0; 306 if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0) return 0; 307 308 n=sig->length; 309 s=sig->data; 310 for (i=0; i<n; i++) 311 { 312 if ((i%18) == 0) 313 if (BIO_write(bp,"\n ",9) <= 0) return 0; 314 if (BIO_printf(bp,"%02x%s",s[i], 315 ((i+1) == n)?"":":") <= 0) return 0; 316 } 317 if (BIO_write(bp,"\n",1) != 1) return 0; 318 return 1; 319} 320 321int ASN1_STRING_print(BIO *bp, ASN1_STRING *v) 322 { 323 int i,n; 324 char buf[80],*p;; 325 326 if (v == NULL) return(0); 327 n=0; 328 p=(char *)v->data; 329 for (i=0; i<v->length; i++) 330 { 331 if ((p[i] > '~') || ((p[i] < ' ') && 332 (p[i] != '\n') && (p[i] != '\r'))) 333 buf[n]='.'; 334 else 335 buf[n]=p[i]; 336 n++; 337 if (n >= 80) 338 { 339 if (BIO_write(bp,buf,n) <= 0) 340 return(0); 341 n=0; 342 } 343 } 344 if (n > 0) 345 if (BIO_write(bp,buf,n) <= 0) 346 return(0); 347 return(1); 348 } 349 350int ASN1_TIME_print(BIO *bp, ASN1_TIME *tm) 351{ 352 if(tm->type == V_ASN1_UTCTIME) return ASN1_UTCTIME_print(bp, tm); 353 if(tm->type == V_ASN1_GENERALIZEDTIME) 354 return ASN1_GENERALIZEDTIME_print(bp, tm); 355 BIO_write(bp,"Bad time value",14); 356 return(0); 357} 358 359static const char *mon[12]= 360 { 361 "Jan","Feb","Mar","Apr","May","Jun", 362 "Jul","Aug","Sep","Oct","Nov","Dec" 363 }; 364 365int ASN1_GENERALIZEDTIME_print(BIO *bp, ASN1_GENERALIZEDTIME *tm) 366 { 367 char *v; 368 int gmt=0; 369 int i; 370 int y=0,M=0,d=0,h=0,m=0,s=0; 371 372 i=tm->length; 373 v=(char *)tm->data; 374 375 if (i < 12) goto err; 376 if (v[i-1] == 'Z') gmt=1; 377 for (i=0; i<12; i++) 378 if ((v[i] > '9') || (v[i] < '0')) goto err; 379 y= (v[0]-'0')*1000+(v[1]-'0')*100 + (v[2]-'0')*10+(v[3]-'0'); 380 M= (v[4]-'0')*10+(v[5]-'0'); 381 if ((M > 12) || (M < 1)) goto err; 382 d= (v[6]-'0')*10+(v[7]-'0'); 383 h= (v[8]-'0')*10+(v[9]-'0'); 384 m= (v[10]-'0')*10+(v[11]-'0'); 385 if ( (v[12] >= '0') && (v[12] <= '9') && 386 (v[13] >= '0') && (v[13] <= '9')) 387 s= (v[12]-'0')*10+(v[13]-'0'); 388 389 if (BIO_printf(bp,"%s %2d %02d:%02d:%02d %d%s", 390 mon[M-1],d,h,m,s,y,(gmt)?" GMT":"") <= 0) 391 return(0); 392 else 393 return(1); 394err: 395 BIO_write(bp,"Bad time value",14); 396 return(0); 397 } 398 399int ASN1_UTCTIME_print(BIO *bp, ASN1_UTCTIME *tm) 400 { 401 char *v; 402 int gmt=0; 403 int i; 404 int y=0,M=0,d=0,h=0,m=0,s=0; 405 406 i=tm->length; 407 v=(char *)tm->data; 408 409 if (i < 10) goto err; 410 if (v[i-1] == 'Z') gmt=1; 411 for (i=0; i<10; i++) 412 if ((v[i] > '9') || (v[i] < '0')) goto err; 413 y= (v[0]-'0')*10+(v[1]-'0'); 414 if (y < 50) y+=100; 415 M= (v[2]-'0')*10+(v[3]-'0'); 416 if ((M > 12) || (M < 1)) goto err; 417 d= (v[4]-'0')*10+(v[5]-'0'); 418 h= (v[6]-'0')*10+(v[7]-'0'); 419 m= (v[8]-'0')*10+(v[9]-'0'); 420 if ( (v[10] >= '0') && (v[10] <= '9') && 421 (v[11] >= '0') && (v[11] <= '9')) 422 s= (v[10]-'0')*10+(v[11]-'0'); 423 424 if (BIO_printf(bp,"%s %2d %02d:%02d:%02d %d%s", 425 mon[M-1],d,h,m,s,y+1900,(gmt)?" GMT":"") <= 0) 426 return(0); 427 else 428 return(1); 429err: 430 BIO_write(bp,"Bad time value",14); 431 return(0); 432 } 433 434int X509_NAME_print(BIO *bp, X509_NAME *name, int obase) 435 { 436 char *s,*c,*b; 437 int ret=0,l,ll,i,first=1; 438 439 ll=80-2-obase; 440 441 b=s=X509_NAME_oneline(name,NULL,0); 442 if (!*s) 443 { 444 OPENSSL_free(b); 445 return 1; 446 } 447 s++; /* skip the first slash */ 448 449 l=ll; 450 c=s; 451 for (;;) 452 { 453#ifndef CHARSET_EBCDIC 454 if ( ((*s == '/') && 455 ((s[1] >= 'A') && (s[1] <= 'Z') && ( 456 (s[2] == '=') || 457 ((s[2] >= 'A') && (s[2] <= 'Z') && 458 (s[3] == '=')) 459 ))) || 460 (*s == '\0')) 461#else 462 if ( ((*s == '/') && 463 (isupper(s[1]) && ( 464 (s[2] == '=') || 465 (isupper(s[2]) && 466 (s[3] == '=')) 467 ))) || 468 (*s == '\0')) 469#endif 470 { 471 if ((l <= 0) && !first) 472 { 473 first=0; 474 if (BIO_write(bp,"\n",1) != 1) goto err; 475 for (i=0; i<obase; i++) 476 { 477 if (BIO_write(bp," ",1) != 1) goto err; 478 } 479 l=ll; 480 } 481 i=s-c; 482 if (BIO_write(bp,c,i) != i) goto err; 483 c+=i; 484 c++; 485 if (*s != '\0') 486 { 487 if (BIO_write(bp,", ",2) != 2) goto err; 488 } 489 l--; 490 } 491 if (*s == '\0') break; 492 s++; 493 l--; 494 } 495 496 ret=1; 497 if (0) 498 { 499err: 500 X509err(X509_F_X509_NAME_PRINT,ERR_R_BUF_LIB); 501 } 502 OPENSSL_free(b); 503 return(ret); 504 } 505 506