Tolerate a SEQUENCE in DN components.
[openssl.git] / crypto / asn1 / t_x509.c
index e804635be2b07309545a0056493bea00ccdc0a54..3d25335e547117008c92ce59e3676c691284abbc 100644 (file)
 
 #include <stdio.h>
 #include "cryptlib.h"
-#include "buffer.h"
-#include "bn.h"
-#ifndef NO_RSA
-#include "rsa.h"
+#include <openssl/buffer.h>
+#include <openssl/bn.h>
+#ifndef OPENSSL_NO_RSA
+#include <openssl/rsa.h>
 #endif
-#ifndef NO_DSA
-#include "dsa.h"
+#ifndef OPENSSL_NO_DSA
+#include <openssl/dsa.h>
 #endif
-#include "objects.h"
-#include "x509.h"
-#include "x509v3.h"
+#ifndef OPENSSL_NO_EC
+#include <openssl/ec.h>
+#endif
+#include <openssl/objects.h>
+#include <openssl/x509.h>
+#include <openssl/x509v3.h>
 
-#ifndef NO_FP_API
+#ifndef OPENSSL_NO_FP_API
 int X509_print_fp(FILE *fp, X509 *x)
+       {
+       return X509_print_ex_fp(fp, x, XN_FLAG_COMPAT, X509_FLAG_COMPAT);
+       }
+
+int X509_print_ex_fp(FILE *fp, X509 *x, unsigned long nmflag, unsigned long cflag)
         {
         BIO *b;
         int ret;
 
         if ((b=BIO_new(BIO_s_file())) == NULL)
                {
-               X509err(X509_F_X509_PRINT_FP,ERR_R_BUF_LIB);
+               X509err(X509_F_X509_PRINT_EX_FP,ERR_R_BUF_LIB);
                 return(0);
                }
         BIO_set_fp(b,fp,BIO_NOCLOSE);
-        ret=X509_print(b, x);
+        ret=X509_print_ex(b, x, nmflag, cflag);
         BIO_free(b);
         return(ret);
         }
 #endif
 
 int X509_print(BIO *bp, X509 *x)
+{
+       return X509_print_ex(bp, x, XN_FLAG_COMPAT, X509_FLAG_COMPAT);
+}
+
+int X509_print_ex(BIO *bp, X509 *x, unsigned long nmflags, unsigned long cflag)
        {
        long l;
-       int ret=0,i,j,n;
-       char *m=NULL,*s;
+       int ret=0,i;
+       char *m=NULL,mlch = ' ';
+       int nmindent = 0;
        X509_CINF *ci;
        ASN1_INTEGER *bs;
        EVP_PKEY *pkey=NULL;
        const char *neg;
-       X509_EXTENSION *ex;
        ASN1_STRING *str=NULL;
 
+       if((nmflags & XN_FLAG_SEP_MASK) == XN_FLAG_SEP_MULTILINE) {
+                       mlch = '\n';
+                       nmindent = 12;
+       }
+
+       if(nmflags == X509_FLAG_COMPAT)
+               nmindent = 16;
+
        ci=x->cert_info;
-       if (BIO_write(bp,"Certificate:\n",13) <= 0) goto err;
-       if (BIO_write(bp,"    Data:\n",10) <= 0) goto err;
-       l=X509_get_version(x);
-       if (BIO_printf(bp,"%8sVersion: %lu (0x%lx)\n","",l+1,l) <= 0) goto err;
-       if (BIO_write(bp,"        Serial Number:",22) <= 0) goto err;
-
-       bs=X509_get_serialNumber(x);
-       if (bs->length <= 4)
+       if(!(cflag & X509_FLAG_NO_HEADER))
                {
-               l=ASN1_INTEGER_get(bs);
-               if (l < 0)
-                       {
-                       l= -l;
-                       neg="-";
-                       }
-               else
-                       neg="";
-               if (BIO_printf(bp," %s%lu (%s0x%lx)\n",neg,l,neg,l) <= 0)
-                       goto err;
+               if (BIO_write(bp,"Certificate:\n",13) <= 0) goto err;
+               if (BIO_write(bp,"    Data:\n",10) <= 0) goto err;
                }
-       else
+       if(!(cflag & X509_FLAG_NO_VERSION))
+               {
+               l=X509_get_version(x);
+               if (BIO_printf(bp,"%8sVersion: %lu (0x%lx)\n","",l+1,l) <= 0) goto err;
+               }
+       if(!(cflag & X509_FLAG_NO_SERIAL))
                {
-               neg=(bs->type == V_ASN1_NEG_INTEGER)?" (Negative)":"";
-               if (BIO_printf(bp,"\n%12s%s","",neg) <= 0) goto err;
 
-               for (i=0; i<bs->length; i++)
+               if (BIO_write(bp,"        Serial Number:",22) <= 0) goto err;
+
+               bs=X509_get_serialNumber(x);
+               if (bs->length <= 4)
                        {
-                       if (BIO_printf(bp,"%02x%c",bs->data[i],
-                               ((i+1 == bs->length)?'\n':':')) <= 0)
+                       l=ASN1_INTEGER_get(bs);
+                       if (l < 0)
+                               {
+                               l= -l;
+                               neg="-";
+                               }
+                       else
+                               neg="";
+                       if (BIO_printf(bp," %s%lu (%s0x%lx)\n",neg,l,neg,l) <= 0)
                                goto err;
                        }
-               }
+               else
+                       {
+                       neg=(bs->type == V_ASN1_NEG_INTEGER)?" (Negative)":"";
+                       if (BIO_printf(bp,"\n%12s%s","",neg) <= 0) goto err;
 
-       i=OBJ_obj2nid(ci->signature->algorithm);
-       if (BIO_printf(bp,"%8sSignature Algorithm: %s\n","",
-               (i == NID_undef)?"UNKNOWN":OBJ_nid2ln(i)) <= 0)
-               goto err;
+                       for (i=0; i<bs->length; i++)
+                               {
+                               if (BIO_printf(bp,"%02x%c",bs->data[i],
+                                       ((i+1 == bs->length)?'\n':':')) <= 0)
+                                       goto err;
+                               }
+                       }
 
-       if (BIO_write(bp,"        Issuer: ",16) <= 0) goto err;
-       if (!X509_NAME_print(bp,X509_get_issuer_name(x),16)) goto err;
-       if (BIO_write(bp,"\n        Validity\n",18) <= 0) goto err;
-       if (BIO_write(bp,"            Not Before: ",24) <= 0) goto err;
-       if (!ASN1_TIME_print(bp,X509_get_notBefore(x))) goto err;
-       if (BIO_write(bp,"\n            Not After : ",25) <= 0) goto err;
-       if (!ASN1_TIME_print(bp,X509_get_notAfter(x))) goto err;
-       if (BIO_write(bp,"\n        Subject: ",18) <= 0) goto err;
-       if (!X509_NAME_print(bp,X509_get_subject_name(x),16)) goto err;
-       if (BIO_write(bp,"\n        Subject Public Key Info:\n",34) <= 0)
-               goto err;
-       i=OBJ_obj2nid(ci->key->algor->algorithm);
-       if (BIO_printf(bp,"%12sPublic Key Algorithm: %s\n","",
-               (i == NID_undef)?"UNKNOWN":OBJ_nid2ln(i)) <= 0) goto err;
+               }
 
-       pkey=X509_get_pubkey(x);
-       if (pkey == NULL)
+       if(!(cflag & X509_FLAG_NO_SIGNAME))
                {
-               BIO_printf(bp,"%12sUnable to load Public Key\n","");
+               if (BIO_printf(bp,"%8sSignature Algorithm: ","") <= 0) 
+                       goto err;
+               if (i2a_ASN1_OBJECT(bp, ci->signature->algorithm) <= 0)
+                       goto err;
+               if (BIO_puts(bp, "\n") <= 0)
+                       goto err;
                }
-       else
-#ifndef NO_RSA
-       if (pkey->type == EVP_PKEY_RSA)
+
+       if(!(cflag & X509_FLAG_NO_ISSUER))
                {
-               BIO_printf(bp,"%12sRSA Public Key: (%d bit)\n","",
-               BN_num_bits(pkey->pkey.rsa->n));
-               RSA_print(bp,pkey->pkey.rsa,16);
+               if (BIO_printf(bp,"        Issuer:%c",mlch) <= 0) goto err;
+               if (X509_NAME_print_ex(bp,X509_get_issuer_name(x),nmindent, nmflags) < 0) goto err;
+               if (BIO_write(bp,"\n",1) <= 0) goto err;
                }
-       else
-#endif
-#ifndef NO_DSA
-       if (pkey->type == EVP_PKEY_DSA)
+       if(!(cflag & X509_FLAG_NO_VALIDITY))
                {
-               BIO_printf(bp,"%12sDSA Public Key:\n","");
-               DSA_print(bp,pkey->pkey.dsa,16);
+               if (BIO_write(bp,"        Validity\n",17) <= 0) goto err;
+               if (BIO_write(bp,"            Not Before: ",24) <= 0) goto err;
+               if (!ASN1_TIME_print(bp,X509_get_notBefore(x))) goto err;
+               if (BIO_write(bp,"\n            Not After : ",25) <= 0) goto err;
+               if (!ASN1_TIME_print(bp,X509_get_notAfter(x))) goto err;
+               if (BIO_write(bp,"\n",1) <= 0) goto err;
                }
-       else
-#endif
-               BIO_printf(bp,"%12sUnknown Public Key:\n","");
-
-       EVP_PKEY_free(pkey);
-
-       n=X509_get_ext_count(x);
-       if (n > 0)
+       if(!(cflag & X509_FLAG_NO_SUBJECT))
                {
-               BIO_printf(bp,"%8sX509v3 extensions:\n","");
-               for (i=0; i<n; i++)
+               if (BIO_printf(bp,"        Subject:%c",mlch) <= 0) goto err;
+               if (X509_NAME_print_ex(bp,X509_get_subject_name(x),nmindent, nmflags) < 0) goto err;
+               if (BIO_write(bp,"\n",1) <= 0) goto err;
+               }
+       if(!(cflag & X509_FLAG_NO_PUBKEY))
+               {
+               if (BIO_write(bp,"        Subject Public Key Info:\n",33) <= 0)
+                       goto err;
+               if (BIO_printf(bp,"%12sPublic Key Algorithm: ","") <= 0)
+                       goto err;
+               if (i2a_ASN1_OBJECT(bp, ci->key->algor->algorithm) <= 0)
+                       goto err;
+               if (BIO_puts(bp, "\n") <= 0)
+                       goto err;
+
+               pkey=X509_get_pubkey(x);
+               if (pkey == NULL)
                        {
-#if 0
-                       int data_type,pack_type;
+                       BIO_printf(bp,"%12sUnable to load Public Key\n","");
+                       ERR_print_errors(bp);
+                       }
+               else
+#ifndef OPENSSL_NO_RSA
+               if (pkey->type == EVP_PKEY_RSA)
+                       {
+                       BIO_printf(bp,"%12sRSA Public Key: (%d bit)\n","",
+                       BN_num_bits(pkey->pkey.rsa->n));
+                       RSA_print(bp,pkey->pkey.rsa,16);
+                       }
+               else
 #endif
-                       ASN1_OBJECT *obj;
-
-                       ex=X509_get_ext(x,i);
-                       if (BIO_printf(bp,"%12s","") <= 0) goto err;
-                       obj=X509_EXTENSION_get_object(ex);
-                       i2a_ASN1_OBJECT(bp,obj);
-                       j=X509_EXTENSION_get_critical(ex);
-                       if (BIO_printf(bp,": %s\n",j?"critical":"","") <= 0)
-                               goto err;
-                       if(!X509V3_EXT_print(bp, ex, 0, 16))
-                               {
-                               BIO_printf(bp, "%16s", "");
-                               ASN1_OCTET_STRING_print(bp,ex->value);
-                               }
-                       if (BIO_write(bp,"\n",1) <= 0) goto err;
+#ifndef OPENSSL_NO_DSA
+               if (pkey->type == EVP_PKEY_DSA)
+                       {
+                       BIO_printf(bp,"%12sDSA Public Key:\n","");
+                       DSA_print(bp,pkey->pkey.dsa,16);
+                       }
+               else
+#endif
+#ifndef OPENSSL_NO_EC
+               if (pkey->type == EVP_PKEY_EC)
+                       {
+                       BIO_printf(bp, "%12sEC Public Key:\n","");
+                       EC_KEY_print(bp, pkey->pkey.ec, 16);
                        }
+               else
+#endif
+                       BIO_printf(bp,"%12sUnknown Public Key:\n","");
+
+               EVP_PKEY_free(pkey);
                }
 
-       i=OBJ_obj2nid(x->sig_alg->algorithm);
-       if (BIO_printf(bp,"%4sSignature Algorithm: %s","",
-               (i == NID_undef)?"UNKNOWN":OBJ_nid2ln(i)) <= 0) goto err;
+       if (!(cflag & X509_FLAG_NO_EXTENSIONS))
+               X509V3_extensions_print(bp, "X509v3 extensions",
+                                       ci->extensions, cflag, 8);
 
-       n=x->signature->length;
-       s=(char *)x->signature->data;
-       for (i=0; i<n; i++)
+       if(!(cflag & X509_FLAG_NO_SIGDUMP))
                {
-               if ((i%18) == 0)
-                       if (BIO_write(bp,"\n        ",9) <= 0) goto err;
-               if (BIO_printf(bp,"%02x%s",(unsigned char)s[i],
-                       ((i+1) == n)?"":":") <= 0) goto err;
+               if(X509_signature_print(bp, x->sig_alg, x->signature) <= 0) goto err;
+               }
+       if(!(cflag & X509_FLAG_NO_AUX))
+               {
+               if (!X509_CERT_AUX_print(bp, x->aux, 0)) goto err;
                }
-       if (BIO_write(bp,"\n",1) != 1) goto err;
        ret=1;
 err:
        if (str != NULL) ASN1_STRING_free(str);
-       if (m != NULL) Free((char *)m);
+       if (m != NULL) OPENSSL_free(m);
        return(ret);
        }
 
+int X509_ocspid_print (BIO *bp, X509 *x)
+       {
+       unsigned char *der=NULL ;
+       unsigned char *dertmp;
+       int derlen;
+       int i;
+       unsigned char SHA1md[SHA_DIGEST_LENGTH];
+
+       /* display the hash of the subject as it would appear
+          in OCSP requests */
+       if (BIO_printf(bp,"        Subject OCSP hash: ") <= 0)
+               goto err;
+       derlen = i2d_X509_NAME(x->cert_info->subject, NULL);
+       if ((der = dertmp = (unsigned char *)OPENSSL_malloc (derlen)) == NULL)
+               goto err;
+       i2d_X509_NAME(x->cert_info->subject, &dertmp);
+
+       EVP_Digest(der, derlen, SHA1md, NULL, EVP_sha1(), NULL);
+       for (i=0; i < SHA_DIGEST_LENGTH; i++)
+               {
+               if (BIO_printf(bp,"%02X",SHA1md[i]) <= 0) goto err;
+               }
+       OPENSSL_free (der);
+       der=NULL;
+
+       /* display the hash of the public key as it would appear
+          in OCSP requests */
+       if (BIO_printf(bp,"\n        Public key OCSP hash: ") <= 0)
+               goto err;
+
+       EVP_Digest(x->cert_info->key->public_key->data,
+               x->cert_info->key->public_key->length, SHA1md, NULL, EVP_sha1(), NULL);
+       for (i=0; i < SHA_DIGEST_LENGTH; i++)
+               {
+               if (BIO_printf(bp,"%02X",SHA1md[i]) <= 0)
+                       goto err;
+               }
+       BIO_printf(bp,"\n");
+
+       return (1);
+err:
+       if (der != NULL) OPENSSL_free(der);
+       return(0);
+       }
+
+int X509_signature_print(BIO *bp, X509_ALGOR *sigalg, ASN1_STRING *sig)
+{
+       unsigned char *s;
+       int i, n;
+       if (BIO_puts(bp,"    Signature Algorithm: ") <= 0) return 0;
+       if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0) return 0;
+
+       n=sig->length;
+       s=sig->data;
+       for (i=0; i<n; i++)
+               {
+               if ((i%18) == 0)
+                       if (BIO_write(bp,"\n        ",9) <= 0) return 0;
+                       if (BIO_printf(bp,"%02x%s",s[i],
+                               ((i+1) == n)?"":":") <= 0) return 0;
+               }
+       if (BIO_write(bp,"\n",1) != 1) return 0;
+       return 1;
+}
+
 int ASN1_STRING_print(BIO *bp, ASN1_STRING *v)
        {
        int i,n;
@@ -279,6 +379,8 @@ int ASN1_GENERALIZEDTIME_print(BIO *bp, ASN1_GENERALIZEDTIME *tm)
        int gmt=0;
        int i;
        int y=0,M=0,d=0,h=0,m=0,s=0;
+       char *f = NULL;
+       int f_len = 0;
 
        i=tm->length;
        v=(char *)tm->data;
@@ -295,10 +397,21 @@ int ASN1_GENERALIZEDTIME_print(BIO *bp, ASN1_GENERALIZEDTIME *tm)
        m=  (v[10]-'0')*10+(v[11]-'0');
        if (    (v[12] >= '0') && (v[12] <= '9') &&
                (v[13] >= '0') && (v[13] <= '9'))
+               {
                s=  (v[12]-'0')*10+(v[13]-'0');
+               /* Check for fractions of seconds. */
+               if (v[14] == '.')
+                       {
+                       int l = tm->length;
+                       f = &v[14];     /* The decimal point. */
+                       f_len = 1;
+                       while (14 + f_len < l && f[f_len] >= '0' && f[f_len] <= '9')
+                               ++f_len;
+                       }
+               }
 
-       if (BIO_printf(bp,"%s %2d %02d:%02d:%02d %d%s",
-               mon[M-1],d,h,m,s,y,(gmt)?" GMT":"") <= 0)
+       if (BIO_printf(bp,"%s %2d %02d:%02d:%02d%.*s %d%s",
+               mon[M-1],d,h,m,s,f_len,f,y,(gmt)?" GMT":"") <= 0)
                return(0);
        else
                return(1);
@@ -344,19 +457,24 @@ err:
 
 int X509_NAME_print(BIO *bp, X509_NAME *name, int obase)
        {
-       char *s,*c;
+       char *s,*c,*b;
        int ret=0,l,ll,i,first=1;
-       char buf[256];
 
        ll=80-2-obase;
 
-       s=X509_NAME_oneline(name,buf,256);
+       b=s=X509_NAME_oneline(name,NULL,0);
+       if (!*s)
+               {
+               OPENSSL_free(b);
+               return 1;
+               }
        s++; /* skip the first slash */
 
        l=ll;
        c=s;
        for (;;)
                {
+#ifndef CHARSET_EBCDIC
                if (    ((*s == '/') &&
                                ((s[1] >= 'A') && (s[1] <= 'Z') && (
                                        (s[2] == '=') ||
@@ -364,6 +482,15 @@ int X509_NAME_print(BIO *bp, X509_NAME *name, int obase)
                                        (s[3] == '='))
                                 ))) ||
                        (*s == '\0'))
+#else
+               if (    ((*s == '/') &&
+                               (isupper(s[1]) && (
+                                       (s[2] == '=') ||
+                                       (isupper(s[2]) &&
+                                       (s[3] == '='))
+                                ))) ||
+                       (*s == '\0'))
+#endif
                        {
                        if ((l <= 0) && !first)
                                {
@@ -396,6 +523,7 @@ int X509_NAME_print(BIO *bp, X509_NAME *name, int obase)
 err:
                X509err(X509_F_X509_NAME_PRINT,ERR_R_BUF_LIB);
                }
+       OPENSSL_free(b);
        return(ret);
        }