fix warning
[openssl.git] / crypto / asn1 / t_x509.c
index 517290b961e836f534290fe842eab29028855e1b..edbb39a02f7a5749e183de368b5bf8f34b4226f1 100644 (file)
 #include "cryptlib.h"
 #include <openssl/buffer.h>
 #include <openssl/bn.h>
-#ifndef NO_RSA
+#ifndef OPENSSL_NO_RSA
 #include <openssl/rsa.h>
 #endif
-#ifndef NO_DSA
+#ifndef OPENSSL_NO_DSA
 #include <openssl/dsa.h>
 #endif
+#ifndef OPENSSL_NO_EC
+#include <openssl/ec.h>
+#endif
 #include <openssl/objects.h>
 #include <openssl/x509.h>
 #include <openssl/x509v3.h>
+#include "asn1_locl.h"
 
-#ifndef NO_FP_API
+#ifndef OPENSSL_NO_FP_API
 int X509_print_fp(FILE *fp, X509 *x)
+       {
+       return X509_print_ex_fp(fp, x, XN_FLAG_COMPAT, X509_FLAG_COMPAT);
+       }
+
+int X509_print_ex_fp(FILE *fp, X509 *x, unsigned long nmflag, unsigned long cflag)
         {
         BIO *b;
         int ret;
 
         if ((b=BIO_new(BIO_s_file())) == NULL)
                {
-               X509err(X509_F_X509_PRINT_FP,ERR_R_BUF_LIB);
+               X509err(X509_F_X509_PRINT_EX_FP,ERR_R_BUF_LIB);
                 return(0);
                }
         BIO_set_fp(b,fp,BIO_NOCLOSE);
-        ret=X509_print(b, x);
+        ret=X509_print_ex(b, x, nmflag, cflag);
         BIO_free(b);
         return(ret);
         }
 #endif
 
 int X509_print(BIO *bp, X509 *x)
+{
+       return X509_print_ex(bp, x, XN_FLAG_COMPAT, X509_FLAG_COMPAT);
+}
+
+int X509_print_ex(BIO *bp, X509 *x, unsigned long nmflags, unsigned long cflag)
        {
        long l;
-       int ret=0,i,j,n;
-       char *m=NULL,*s;
+       int ret=0,i;
+       char *m=NULL,mlch = ' ';
+       int nmindent = 0;
        X509_CINF *ci;
        ASN1_INTEGER *bs;
        EVP_PKEY *pkey=NULL;
        const char *neg;
-       X509_EXTENSION *ex;
-       ASN1_STRING *str=NULL;
+
+       if((nmflags & XN_FLAG_SEP_MASK) == XN_FLAG_SEP_MULTILINE) {
+                       mlch = '\n';
+                       nmindent = 12;
+       }
+
+       if(nmflags == X509_FLAG_COMPAT)
+               nmindent = 16;
 
        ci=x->cert_info;
-       if (BIO_write(bp,"Certificate:\n",13) <= 0) goto err;
-       if (BIO_write(bp,"    Data:\n",10) <= 0) goto err;
-       l=X509_get_version(x);
-       if (BIO_printf(bp,"%8sVersion: %lu (0x%lx)\n","",l+1,l) <= 0) goto err;
-       if (BIO_write(bp,"        Serial Number:",22) <= 0) goto err;
-
-       bs=X509_get_serialNumber(x);
-       if (bs->length <= 4)
+       if(!(cflag & X509_FLAG_NO_HEADER))
+               {
+               if (BIO_write(bp,"Certificate:\n",13) <= 0) goto err;
+               if (BIO_write(bp,"    Data:\n",10) <= 0) goto err;
+               }
+       if(!(cflag & X509_FLAG_NO_VERSION))
                {
-               l=ASN1_INTEGER_get(bs);
-               if (l < 0)
+               l=X509_get_version(x);
+               if (BIO_printf(bp,"%8sVersion: %lu (0x%lx)\n","",l+1,l) <= 0) goto err;
+               }
+       if(!(cflag & X509_FLAG_NO_SERIAL))
+               {
+
+               if (BIO_write(bp,"        Serial Number:",22) <= 0) goto err;
+
+               bs=X509_get_serialNumber(x);
+               if (bs->length <= (int)sizeof(long))
                        {
-                       l= -l;
-                       neg="-";
+                       l=ASN1_INTEGER_get(bs);
+                       if (bs->type == V_ASN1_NEG_INTEGER)
+                               {
+                               l= -l;
+                               neg="-";
+                               }
+                       else
+                               neg="";
+                       if (BIO_printf(bp," %s%lu (%s0x%lx)\n",neg,l,neg,l) <= 0)
+                               goto err;
                        }
                else
-                       neg="";
-               if (BIO_printf(bp," %s%lu (%s0x%lx)\n",neg,l,neg,l) <= 0)
+                       {
+                       neg=(bs->type == V_ASN1_NEG_INTEGER)?" (Negative)":"";
+                       if (BIO_printf(bp,"\n%12s%s","",neg) <= 0) goto err;
+
+                       for (i=0; i<bs->length; i++)
+                               {
+                               if (BIO_printf(bp,"%02x%c",bs->data[i],
+                                       ((i+1 == bs->length)?'\n':':')) <= 0)
+                                       goto err;
+                               }
+                       }
+
+               }
+
+       if(!(cflag & X509_FLAG_NO_SIGNAME))
+               {
+               if(X509_signature_print(bp, x->sig_alg, NULL) <= 0)
+                       goto err;
+#if 0
+               if (BIO_printf(bp,"%8sSignature Algorithm: ","") <= 0) 
                        goto err;
+               if (i2a_ASN1_OBJECT(bp, ci->signature->algorithm) <= 0)
+                       goto err;
+               if (BIO_puts(bp, "\n") <= 0)
+                       goto err;
+#endif
                }
-       else
+
+       if(!(cflag & X509_FLAG_NO_ISSUER))
+               {
+               if (BIO_printf(bp,"        Issuer:%c",mlch) <= 0) goto err;
+               if (X509_NAME_print_ex(bp,X509_get_issuer_name(x),nmindent, nmflags) < 0) goto err;
+               if (BIO_write(bp,"\n",1) <= 0) goto err;
+               }
+       if(!(cflag & X509_FLAG_NO_VALIDITY))
                {
-               neg=(bs->type == V_ASN1_NEG_INTEGER)?" (Negative)":"";
-               if (BIO_printf(bp,"\n%12s%s","",neg) <= 0) goto err;
+               if (BIO_write(bp,"        Validity\n",17) <= 0) goto err;
+               if (BIO_write(bp,"            Not Before: ",24) <= 0) goto err;
+               if (!ASN1_TIME_print(bp,X509_get_notBefore(x))) goto err;
+               if (BIO_write(bp,"\n            Not After : ",25) <= 0) goto err;
+               if (!ASN1_TIME_print(bp,X509_get_notAfter(x))) goto err;
+               if (BIO_write(bp,"\n",1) <= 0) goto err;
+               }
+       if(!(cflag & X509_FLAG_NO_SUBJECT))
+               {
+               if (BIO_printf(bp,"        Subject:%c",mlch) <= 0) goto err;
+               if (X509_NAME_print_ex(bp,X509_get_subject_name(x),nmindent, nmflags) < 0) goto err;
+               if (BIO_write(bp,"\n",1) <= 0) goto err;
+               }
+       if(!(cflag & X509_FLAG_NO_PUBKEY))
+               {
+               if (BIO_write(bp,"        Subject Public Key Info:\n",33) <= 0)
+                       goto err;
+               if (BIO_printf(bp,"%12sPublic Key Algorithm: ","") <= 0)
+                       goto err;
+               if (i2a_ASN1_OBJECT(bp, ci->key->algor->algorithm) <= 0)
+                       goto err;
+               if (BIO_puts(bp, "\n") <= 0)
+                       goto err;
 
-               for (i=0; i<bs->length; i++)
+               pkey=X509_get_pubkey(x);
+               if (pkey == NULL)
                        {
-                       if (BIO_printf(bp,"%02x%c",bs->data[i],
-                               ((i+1 == bs->length)?'\n':':')) <= 0)
-                               goto err;
+                       BIO_printf(bp,"%12sUnable to load Public Key\n","");
+                       ERR_print_errors(bp);
+                       }
+               else
+                       {
+                       EVP_PKEY_print_public(bp, pkey, 16, NULL);
+                       EVP_PKEY_free(pkey);
                        }
                }
 
-       i=OBJ_obj2nid(ci->signature->algorithm);
-       if (BIO_printf(bp,"%8sSignature Algorithm: %s\n","",
-               (i == NID_undef)?"UNKNOWN":OBJ_nid2ln(i)) <= 0)
-               goto err;
-
-       if (BIO_write(bp,"        Issuer: ",16) <= 0) goto err;
-       if (!X509_NAME_print(bp,X509_get_issuer_name(x),16)) goto err;
-       if (BIO_write(bp,"\n        Validity\n",18) <= 0) goto err;
-       if (BIO_write(bp,"            Not Before: ",24) <= 0) goto err;
-       if (!ASN1_TIME_print(bp,X509_get_notBefore(x))) goto err;
-       if (BIO_write(bp,"\n            Not After : ",25) <= 0) goto err;
-       if (!ASN1_TIME_print(bp,X509_get_notAfter(x))) goto err;
-       if (BIO_write(bp,"\n        Subject: ",18) <= 0) goto err;
-       if (!X509_NAME_print(bp,X509_get_subject_name(x),16)) goto err;
-       if (BIO_write(bp,"\n        Subject Public Key Info:\n",34) <= 0)
-               goto err;
-       i=OBJ_obj2nid(ci->key->algor->algorithm);
-       if (BIO_printf(bp,"%12sPublic Key Algorithm: %s\n","",
-               (i == NID_undef)?"UNKNOWN":OBJ_nid2ln(i)) <= 0) goto err;
+       if (!(cflag & X509_FLAG_NO_EXTENSIONS))
+               X509V3_extensions_print(bp, "X509v3 extensions",
+                                       ci->extensions, cflag, 8);
 
-       pkey=X509_get_pubkey(x);
-       if (pkey == NULL)
+       if(!(cflag & X509_FLAG_NO_SIGDUMP))
                {
-               BIO_printf(bp,"%12sUnable to load Public Key\n","");
+               if(X509_signature_print(bp, x->sig_alg, x->signature) <= 0) goto err;
                }
-       else
-#ifndef NO_RSA
-       if (pkey->type == EVP_PKEY_RSA)
+       if(!(cflag & X509_FLAG_NO_AUX))
                {
-               BIO_printf(bp,"%12sRSA Public Key: (%d bit)\n","",
-               BN_num_bits(pkey->pkey.rsa->n));
-               RSA_print(bp,pkey->pkey.rsa,16);
+               if (!X509_CERT_AUX_print(bp, x->aux, 0)) goto err;
                }
-       else
-#endif
-#ifndef NO_DSA
-       if (pkey->type == EVP_PKEY_DSA)
+       ret=1;
+err:
+       if (m != NULL) OPENSSL_free(m);
+       return(ret);
+       }
+
+int X509_ocspid_print (BIO *bp, X509 *x)
+       {
+       unsigned char *der=NULL ;
+       unsigned char *dertmp;
+       int derlen;
+       int i;
+       unsigned char SHA1md[SHA_DIGEST_LENGTH];
+
+       /* display the hash of the subject as it would appear
+          in OCSP requests */
+       if (BIO_printf(bp,"        Subject OCSP hash: ") <= 0)
+               goto err;
+       derlen = i2d_X509_NAME(x->cert_info->subject, NULL);
+       if ((der = dertmp = (unsigned char *)OPENSSL_malloc (derlen)) == NULL)
+               goto err;
+       i2d_X509_NAME(x->cert_info->subject, &dertmp);
+
+       if (!EVP_Digest(der, derlen, SHA1md, NULL, EVP_sha1(), NULL))
+               goto err;
+       for (i=0; i < SHA_DIGEST_LENGTH; i++)
                {
-               BIO_printf(bp,"%12sDSA Public Key:\n","");
-               DSA_print(bp,pkey->pkey.dsa,16);
+               if (BIO_printf(bp,"%02X",SHA1md[i]) <= 0) goto err;
                }
-       else
-#endif
-               BIO_printf(bp,"%12sUnknown Public Key:\n","");
+       OPENSSL_free (der);
+       der=NULL;
 
-       EVP_PKEY_free(pkey);
+       /* display the hash of the public key as it would appear
+          in OCSP requests */
+       if (BIO_printf(bp,"\n        Public key OCSP hash: ") <= 0)
+               goto err;
 
-       n=X509_get_ext_count(x);
-       if (n > 0)
+       if (!EVP_Digest(x->cert_info->key->public_key->data,
+                       x->cert_info->key->public_key->length,
+                       SHA1md, NULL, EVP_sha1(), NULL))
+               goto err;
+       for (i=0; i < SHA_DIGEST_LENGTH; i++)
                {
-               BIO_printf(bp,"%8sX509v3 extensions:\n","");
-               for (i=0; i<n; i++)
-                       {
-#if 0
-                       int data_type,pack_type;
-#endif
-                       ASN1_OBJECT *obj;
-
-                       ex=X509_get_ext(x,i);
-                       if (BIO_printf(bp,"%12s","") <= 0) goto err;
-                       obj=X509_EXTENSION_get_object(ex);
-                       i2a_ASN1_OBJECT(bp,obj);
-                       j=X509_EXTENSION_get_critical(ex);
-                       if (BIO_printf(bp,": %s\n",j?"critical":"","") <= 0)
-                               goto err;
-                       if(!X509V3_EXT_print(bp, ex, 0, 16))
-                               {
-                               BIO_printf(bp, "%16s", "");
-                               ASN1_OCTET_STRING_print(bp,ex->value);
-                               }
-                       if (BIO_write(bp,"\n",1) <= 0) goto err;
-                       }
+               if (BIO_printf(bp,"%02X",SHA1md[i]) <= 0)
+                       goto err;
                }
+       BIO_printf(bp,"\n");
 
-       i=OBJ_obj2nid(x->sig_alg->algorithm);
-       if (BIO_printf(bp,"%4sSignature Algorithm: %s","",
-               (i == NID_undef)?"UNKNOWN":OBJ_nid2ln(i)) <= 0) goto err;
+       return (1);
+err:
+       if (der != NULL) OPENSSL_free(der);
+       return(0);
+       }
 
-       n=x->signature->length;
-       s=(char *)x->signature->data;
+int X509_signature_dump(BIO *bp, const ASN1_STRING *sig, int indent)
+{
+       const unsigned char *s;
+       int i, n;
+
+       n=sig->length;
+       s=sig->data;
        for (i=0; i<n; i++)
                {
                if ((i%18) == 0)
-                       if (BIO_write(bp,"\n        ",9) <= 0) goto err;
-               if (BIO_printf(bp,"%02x%s",(unsigned char)s[i],
-                       ((i+1) == n)?"":":") <= 0) goto err;
+                       {
+                       if (BIO_write(bp,"\n",1) <= 0) return 0;
+                       if (BIO_indent(bp, indent, indent) <= 0) return 0;
+                       }
+                       if (BIO_printf(bp,"%02x%s",s[i],
+                               ((i+1) == n)?"":":") <= 0) return 0;
                }
-       if (BIO_write(bp,"\n",1) != 1) goto err;
-       ret=1;
-err:
-       if (str != NULL) ASN1_STRING_free(str);
-       if (m != NULL) Free((char *)m);
-       return(ret);
-       }
+       if (BIO_write(bp,"\n",1) != 1) return 0;
+
+       return 1;
+}
+
+int X509_signature_print(BIO *bp, X509_ALGOR *sigalg, ASN1_STRING *sig)
+{
+       int sig_nid;
+       if (BIO_puts(bp,"    Signature Algorithm: ") <= 0) return 0;
+       if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0) return 0;
 
-int ASN1_STRING_print(BIO *bp, ASN1_STRING *v)
+       sig_nid = OBJ_obj2nid(sigalg->algorithm);
+       if (sig_nid != NID_undef)
+               {
+               int pkey_nid, dig_nid;
+               const EVP_PKEY_ASN1_METHOD *ameth;
+               if (OBJ_find_sigid_algs(sig_nid, &dig_nid, &pkey_nid))
+                       {
+                       ameth = EVP_PKEY_asn1_find(NULL, pkey_nid);
+                       if (ameth && ameth->sig_print)
+                               return ameth->sig_print(bp, sigalg, sig, 9, 0);
+                       }
+               }
+       if (sig)
+               return X509_signature_dump(bp, sig, 9);
+       else if (BIO_puts(bp, "\n") <= 0)
+               return 0;
+       return 1;
+}
+
+int ASN1_STRING_print(BIO *bp, const ASN1_STRING *v)
        {
        int i,n;
-       char buf[80],*p;;
+       char buf[80];
+       const char *p;
 
        if (v == NULL) return(0);
        n=0;
-       p=(char *)v->data;
+       p=(const char *)v->data;
        for (i=0; i<v->length; i++)
                {
                if ((p[i] > '~') || ((p[i] < ' ') &&
@@ -258,7 +368,7 @@ int ASN1_STRING_print(BIO *bp, ASN1_STRING *v)
        return(1);
        }
 
-int ASN1_TIME_print(BIO *bp, ASN1_TIME *tm)
+int ASN1_TIME_print(BIO *bp, const ASN1_TIME *tm)
 {
        if(tm->type == V_ASN1_UTCTIME) return ASN1_UTCTIME_print(bp, tm);
        if(tm->type == V_ASN1_GENERALIZEDTIME)
@@ -273,12 +383,14 @@ static const char *mon[12]=
     "Jul","Aug","Sep","Oct","Nov","Dec"
     };
 
-int ASN1_GENERALIZEDTIME_print(BIO *bp, ASN1_GENERALIZEDTIME *tm)
+int ASN1_GENERALIZEDTIME_print(BIO *bp, const ASN1_GENERALIZEDTIME *tm)
        {
        char *v;
        int gmt=0;
        int i;
        int y=0,M=0,d=0,h=0,m=0,s=0;
+       char *f = NULL;
+       int f_len = 0;
 
        i=tm->length;
        v=(char *)tm->data;
@@ -293,12 +405,24 @@ int ASN1_GENERALIZEDTIME_print(BIO *bp, ASN1_GENERALIZEDTIME *tm)
        d= (v[6]-'0')*10+(v[7]-'0');
        h= (v[8]-'0')*10+(v[9]-'0');
        m=  (v[10]-'0')*10+(v[11]-'0');
-       if (    (v[12] >= '0') && (v[12] <= '9') &&
-               (v[13] >= '0') && (v[13] <= '9'))
+       if (tm->length >= 14 &&
+           (v[12] >= '0') && (v[12] <= '9') &&
+           (v[13] >= '0') && (v[13] <= '9'))
+               {
                s=  (v[12]-'0')*10+(v[13]-'0');
+               /* Check for fractions of seconds. */
+               if (tm->length >= 15 && v[14] == '.')
+                       {
+                       int l = tm->length;
+                       f = &v[14];     /* The decimal point. */
+                       f_len = 1;
+                       while (14 + f_len < l && f[f_len] >= '0' && f[f_len] <= '9')
+                               ++f_len;
+                       }
+               }
 
-       if (BIO_printf(bp,"%s %2d %02d:%02d:%02d %d%s",
-               mon[M-1],d,h,m,s,y,(gmt)?" GMT":"") <= 0)
+       if (BIO_printf(bp,"%s %2d %02d:%02d:%02d%.*s %d%s",
+               mon[M-1],d,h,m,s,f_len,f,y,(gmt)?" GMT":"") <= 0)
                return(0);
        else
                return(1);
@@ -307,15 +431,15 @@ err:
        return(0);
        }
 
-int ASN1_UTCTIME_print(BIO *bp, ASN1_UTCTIME *tm)
+int ASN1_UTCTIME_print(BIO *bp, const ASN1_UTCTIME *tm)
        {
-       char *v;
+       const char *v;
        int gmt=0;
        int i;
        int y=0,M=0,d=0,h=0,m=0,s=0;
 
        i=tm->length;
-       v=(char *)tm->data;
+       v=(const char *)tm->data;
 
        if (i < 10) goto err;
        if (v[i-1] == 'Z') gmt=1;
@@ -328,8 +452,9 @@ int ASN1_UTCTIME_print(BIO *bp, ASN1_UTCTIME *tm)
        d= (v[4]-'0')*10+(v[5]-'0');
        h= (v[6]-'0')*10+(v[7]-'0');
        m=  (v[8]-'0')*10+(v[9]-'0');
-       if (    (v[10] >= '0') && (v[10] <= '9') &&
-               (v[11] >= '0') && (v[11] <= '9'))
+       if (tm->length >=12 &&
+           (v[10] >= '0') && (v[10] <= '9') &&
+           (v[11] >= '0') && (v[11] <= '9'))
                s=  (v[10]-'0')*10+(v[11]-'0');
 
        if (BIO_printf(bp,"%s %2d %02d:%02d:%02d %d%s",
@@ -344,19 +469,23 @@ err:
 
 int X509_NAME_print(BIO *bp, X509_NAME *name, int obase)
        {
-       char *s,*c;
-       int ret=0,l,ll,i,first=1;
-       char buf[256];
+       char *s,*c,*b;
+       int ret=0,l,i;
 
-       ll=80-2-obase;
+       l=80-2-obase;
 
-       s=X509_NAME_oneline(name,buf,256);
-       s++; /* skip the first slash */
+       b=X509_NAME_oneline(name,NULL,0);
+       if (!*b)
+               {
+               OPENSSL_free(b);
+               return 1;
+               }
+       s=b+1; /* skip the first slash */
 
-       l=ll;
        c=s;
        for (;;)
                {
+#ifndef CHARSET_EBCDIC
                if (    ((*s == '/') &&
                                ((s[1] >= 'A') && (s[1] <= 'Z') && (
                                        (s[2] == '=') ||
@@ -364,21 +493,19 @@ int X509_NAME_print(BIO *bp, X509_NAME *name, int obase)
                                        (s[3] == '='))
                                 ))) ||
                        (*s == '\0'))
+#else
+               if (    ((*s == '/') &&
+                               (isupper(s[1]) && (
+                                       (s[2] == '=') ||
+                                       (isupper(s[2]) &&
+                                       (s[3] == '='))
+                                ))) ||
+                       (*s == '\0'))
+#endif
                        {
-                       if ((l <= 0) && !first)
-                               {
-                               first=0;
-                               if (BIO_write(bp,"\n",1) != 1) goto err;
-                               for (i=0; i<obase; i++)
-                                       {
-                                       if (BIO_write(bp," ",1) != 1) goto err;
-                                       }
-                               l=ll;
-                               }
                        i=s-c;
                        if (BIO_write(bp,c,i) != i) goto err;
-                       c+=i;
-                       c++;
+                       c=s+1;  /* skip following slash */
                        if (*s != '\0')
                                {
                                if (BIO_write(bp,", ",2) != 2) goto err;
@@ -396,6 +523,6 @@ int X509_NAME_print(BIO *bp, X509_NAME *name, int obase)
 err:
                X509err(X509_F_X509_NAME_PRINT,ERR_R_BUF_LIB);
                }
+       OPENSSL_free(b);
        return(ret);
        }
-