1 /* $OpenBSD: t_x509.c,v 1.27 2017/01/29 17:49:22 beck Exp $ */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
61 #include <openssl/opensslconf.h>
63 #include <openssl/bn.h>
64 #include <openssl/buffer.h>
65 #include <openssl/err.h>
66 #include <openssl/objects.h>
67 #include <openssl/x509.h>
68 #include <openssl/x509v3.h>
70 #ifndef OPENSSL_NO_DSA
71 #include <openssl/dsa.h>
74 #include <openssl/ec.h>
76 #ifndef OPENSSL_NO_RSA
77 #include <openssl/rsa.h>
80 #include "asn1_locl.h"
83 X509_print_fp(FILE *fp
, X509
*x
)
85 return X509_print_ex_fp(fp
, x
, XN_FLAG_COMPAT
, X509_FLAG_COMPAT
);
89 X509_print_ex_fp(FILE *fp
, X509
*x
, unsigned long nmflag
, unsigned long cflag
)
94 if ((b
= BIO_new(BIO_s_file())) == NULL
) {
95 X509error(ERR_R_BUF_LIB
);
98 BIO_set_fp(b
, fp
, BIO_NOCLOSE
);
99 ret
= X509_print_ex(b
, x
, nmflag
, cflag
);
105 X509_print(BIO
*bp
, X509
*x
)
107 return X509_print_ex(bp
, x
, XN_FLAG_COMPAT
, X509_FLAG_COMPAT
);
111 X509_print_ex(BIO
*bp
, X509
*x
, unsigned long nmflags
, unsigned long cflag
)
115 char *m
= NULL
, mlch
= ' ';
119 EVP_PKEY
*pkey
= NULL
;
122 if ((nmflags
& XN_FLAG_SEP_MASK
) == XN_FLAG_SEP_MULTILINE
) {
127 if (nmflags
== X509_FLAG_COMPAT
)
131 if (!(cflag
& X509_FLAG_NO_HEADER
)) {
132 if (BIO_write(bp
, "Certificate:\n", 13) <= 0)
134 if (BIO_write(bp
, " Data:\n", 10) <= 0)
137 if (!(cflag
& X509_FLAG_NO_VERSION
)) {
138 l
= X509_get_version(x
);
139 if (BIO_printf(bp
, "%8sVersion: %lu (0x%lx)\n",
143 if (!(cflag
& X509_FLAG_NO_SERIAL
)) {
144 if (BIO_write(bp
, " Serial Number:", 22) <= 0)
147 bs
= X509_get_serialNumber(x
);
148 if (bs
->length
<= (int)sizeof(long)) {
149 l
= ASN1_INTEGER_get(bs
);
150 if (bs
->type
== V_ASN1_NEG_INTEGER
) {
155 if (BIO_printf(bp
, " %s%lu (%s0x%lx)\n",
156 neg
, l
, neg
, l
) <= 0)
159 neg
= (bs
->type
== V_ASN1_NEG_INTEGER
) ?
161 if (BIO_printf(bp
, "\n%12s%s", "", neg
) <= 0)
163 for (i
= 0; i
< bs
->length
; i
++) {
164 if (BIO_printf(bp
, "%02x%c", bs
->data
[i
],
165 ((i
+ 1 == bs
->length
) ? '\n' : ':')) <= 0)
172 if (!(cflag
& X509_FLAG_NO_SIGNAME
)) {
173 if (X509_signature_print(bp
, x
->sig_alg
, NULL
) <= 0)
177 if (!(cflag
& X509_FLAG_NO_ISSUER
)) {
178 if (BIO_printf(bp
, " Issuer:%c", mlch
) <= 0)
180 if (X509_NAME_print_ex(bp
, X509_get_issuer_name(x
),
181 nmindent
, nmflags
) < 0)
183 if (BIO_write(bp
, "\n", 1) <= 0)
186 if (!(cflag
& X509_FLAG_NO_VALIDITY
)) {
187 if (BIO_write(bp
, " Validity\n", 17) <= 0)
189 if (BIO_write(bp
, " Not Before: ", 24) <= 0)
191 if (!ASN1_TIME_print(bp
, X509_get_notBefore(x
)))
193 if (BIO_write(bp
, "\n Not After : ", 25) <= 0)
195 if (!ASN1_TIME_print(bp
, X509_get_notAfter(x
)))
197 if (BIO_write(bp
, "\n", 1) <= 0)
200 if (!(cflag
& X509_FLAG_NO_SUBJECT
)) {
201 if (BIO_printf(bp
, " Subject:%c", mlch
) <= 0)
203 if (X509_NAME_print_ex(bp
, X509_get_subject_name(x
),
204 nmindent
, nmflags
) < 0)
206 if (BIO_write(bp
, "\n", 1) <= 0)
209 if (!(cflag
& X509_FLAG_NO_PUBKEY
)) {
210 if (BIO_write(bp
, " Subject Public Key Info:\n",
213 if (BIO_printf(bp
, "%12sPublic Key Algorithm: ", "") <= 0)
215 if (i2a_ASN1_OBJECT(bp
, ci
->key
->algor
->algorithm
) <= 0)
217 if (BIO_puts(bp
, "\n") <= 0)
220 pkey
= X509_get_pubkey(x
);
222 BIO_printf(bp
, "%12sUnable to load Public Key\n", "");
223 ERR_print_errors(bp
);
225 EVP_PKEY_print_public(bp
, pkey
, 16, NULL
);
230 if (!(cflag
& X509_FLAG_NO_EXTENSIONS
))
231 X509V3_extensions_print(bp
, "X509v3 extensions",
232 ci
->extensions
, cflag
, 8);
234 if (!(cflag
& X509_FLAG_NO_SIGDUMP
)) {
235 if (X509_signature_print(bp
, x
->sig_alg
, x
->signature
) <= 0)
238 if (!(cflag
& X509_FLAG_NO_AUX
)) {
239 if (!X509_CERT_AUX_print(bp
, x
->aux
, 0))
249 int X509_ocspid_print (BIO
*bp
, X509
*x
)
251 unsigned char *der
= NULL
;
252 unsigned char *dertmp
;
255 unsigned char SHA1md
[SHA_DIGEST_LENGTH
];
257 /* display the hash of the subject as it would appear
259 if (BIO_printf(bp
, " Subject OCSP hash: ") <= 0)
261 derlen
= i2d_X509_NAME(x
->cert_info
->subject
, NULL
);
262 if ((der
= dertmp
= malloc(derlen
)) == NULL
)
264 i2d_X509_NAME(x
->cert_info
->subject
, &dertmp
);
266 if (!EVP_Digest(der
, derlen
, SHA1md
, NULL
, EVP_sha1(), NULL
))
268 for (i
= 0; i
< SHA_DIGEST_LENGTH
; i
++) {
269 if (BIO_printf(bp
, "%02X", SHA1md
[i
]) <= 0)
275 /* display the hash of the public key as it would appear
277 if (BIO_printf(bp
, "\n Public key OCSP hash: ") <= 0)
280 if (!EVP_Digest(x
->cert_info
->key
->public_key
->data
,
281 x
->cert_info
->key
->public_key
->length
,
282 SHA1md
, NULL
, EVP_sha1(), NULL
))
284 for (i
= 0; i
< SHA_DIGEST_LENGTH
; i
++) {
285 if (BIO_printf(bp
, "%02X", SHA1md
[i
]) <= 0)
288 BIO_printf(bp
, "\n");
298 X509_signature_dump(BIO
*bp
, const ASN1_STRING
*sig
, int indent
)
300 const unsigned char *s
;
305 for (i
= 0; i
< n
; i
++) {
307 if (BIO_write(bp
, "\n", 1) <= 0)
309 if (BIO_indent(bp
, indent
, indent
) <= 0)
312 if (BIO_printf(bp
, "%02x%s", s
[i
],
313 ((i
+ 1) == n
) ? "" : ":") <= 0)
316 if (BIO_write(bp
, "\n", 1) != 1)
323 X509_signature_print(BIO
*bp
, X509_ALGOR
*sigalg
, ASN1_STRING
*sig
)
326 if (BIO_puts(bp
, " Signature Algorithm: ") <= 0)
328 if (i2a_ASN1_OBJECT(bp
, sigalg
->algorithm
) <= 0)
331 sig_nid
= OBJ_obj2nid(sigalg
->algorithm
);
332 if (sig_nid
!= NID_undef
) {
333 int pkey_nid
, dig_nid
;
334 const EVP_PKEY_ASN1_METHOD
*ameth
;
335 if (OBJ_find_sigid_algs(sig_nid
, &dig_nid
, &pkey_nid
)) {
336 ameth
= EVP_PKEY_asn1_find(NULL
, pkey_nid
);
337 if (ameth
&& ameth
->sig_print
)
338 return ameth
->sig_print(bp
, sigalg
, sig
, 9, 0);
342 return X509_signature_dump(bp
, sig
, 9);
343 else if (BIO_puts(bp
, "\n") <= 0)
349 ASN1_STRING_print(BIO
*bp
, const ASN1_STRING
*v
)
358 p
= (const char *)v
->data
;
359 for (i
= 0; i
< v
->length
; i
++) {
360 if ((p
[i
] > '~') || ((p
[i
] < ' ') &&
361 (p
[i
] != '\n') && (p
[i
] != '\r')))
367 if (BIO_write(bp
, buf
, n
) <= 0)
373 if (BIO_write(bp
, buf
, n
) <= 0)
379 ASN1_TIME_print(BIO
*bp
, const ASN1_TIME
*tm
)
381 if (tm
->type
== V_ASN1_UTCTIME
)
382 return ASN1_UTCTIME_print(bp
, tm
);
383 if (tm
->type
== V_ASN1_GENERALIZEDTIME
)
384 return ASN1_GENERALIZEDTIME_print(bp
, tm
);
385 BIO_write(bp
, "Bad time value", 14);
389 static const char *mon
[12] = {
390 "Jan", "Feb", "Mar", "Apr", "May", "Jun",
391 "Jul", "Aug", "Sep", "Oct", "Nov", "Dec"
395 ASN1_GENERALIZEDTIME_print(BIO
*bp
, const ASN1_GENERALIZEDTIME
*tm
)
400 int y
= 0, M
= 0, d
= 0, h
= 0, m
= 0, s
= 0;
405 v
= (char *)tm
->data
;
411 for (i
= 0; i
< 12; i
++)
412 if ((v
[i
] > '9') || (v
[i
] < '0'))
414 y
= (v
[0] - '0') * 1000 + (v
[1] - '0') * 100 +
415 (v
[2] - '0') * 10 + (v
[3] - '0');
416 M
= (v
[4] - '0') * 10 + (v
[5] - '0');
417 if ((M
> 12) || (M
< 1))
419 d
= (v
[6] - '0') * 10 + (v
[7] - '0');
420 h
= (v
[8] - '0') * 10 + (v
[9] - '0');
421 m
= (v
[10] - '0') * 10 + (v
[11] - '0');
422 if (tm
->length
>= 14 &&
423 (v
[12] >= '0') && (v
[12] <= '9') &&
424 (v
[13] >= '0') && (v
[13] <= '9')) {
425 s
= (v
[12] - '0') * 10 + (v
[13] - '0');
426 /* Check for fractions of seconds. */
427 if (tm
->length
>= 15 && v
[14] == '.') {
429 f
= &v
[14]; /* The decimal point. */
431 while (14 + f_len
< l
&& f
[f_len
] >= '0' &&
437 if (BIO_printf(bp
, "%s %2d %02d:%02d:%02d%.*s %d%s",
438 mon
[M
- 1], d
, h
, m
, s
, f_len
, f
, y
, (gmt
) ? " GMT" : "") <= 0)
444 BIO_write(bp
, "Bad time value", 14);
449 ASN1_UTCTIME_print(BIO
*bp
, const ASN1_UTCTIME
*tm
)
454 int y
= 0, M
= 0, d
= 0, h
= 0, m
= 0, s
= 0;
457 v
= (const char *)tm
->data
;
463 for (i
= 0; i
< 10; i
++)
464 if ((v
[i
] > '9') || (v
[i
] < '0'))
466 y
= (v
[0] - '0') * 10 + (v
[1] - '0');
469 M
= (v
[2] - '0') * 10 + (v
[3] - '0');
470 if ((M
> 12) || (M
< 1))
472 d
= (v
[4] - '0') * 10 + (v
[5] - '0');
473 h
= (v
[6] - '0') * 10 + (v
[7] - '0');
474 m
= (v
[8] - '0') * 10 + (v
[9] - '0');
475 if (tm
->length
>=12 &&
476 (v
[10] >= '0') && (v
[10] <= '9') &&
477 (v
[11] >= '0') && (v
[11] <= '9'))
478 s
= (v
[10] - '0') * 10 + (v
[11] - '0');
480 if (BIO_printf(bp
, "%s %2d %02d:%02d:%02d %d%s",
481 mon
[M
- 1], d
, h
, m
, s
, y
+ 1900, (gmt
) ? " GMT" : "") <= 0)
487 BIO_write(bp
, "Bad time value", 14);
492 X509_NAME_print(BIO
*bp
, X509_NAME
*name
, int obase
)
499 b
= X509_NAME_oneline(name
, NULL
, 0);
506 s
= b
+ 1; /* skip the first slash */
511 ((s
[1] >= 'A') && (s
[1] <= 'Z') &&
512 ((s
[2] == '=') || ((s
[2] >= 'A') && (s
[2] <= 'Z') &&
513 (s
[3] == '='))))) || (*s
== '\0')) {
515 if (BIO_write(bp
, c
, i
) != i
)
517 c
= s
+ 1; /* skip following slash */
519 if (BIO_write(bp
, ", ", 2) != 2)
533 X509error(ERR_R_BUF_LIB
);