]>
git.ipfire.org Git - thirdparty/openssl.git/blob - crypto/x509/t_x509.c
1 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
4 * This package is an SSL implementation written
5 * by Eric Young (eay@cryptsoft.com).
6 * The implementation was written so as to conform with Netscapes SSL.
8 * This library is free for commercial and non-commercial use as long as
9 * the following conditions are aheared to. The following conditions
10 * apply to all code found in this distribution, be it the RC4, RSA,
11 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
12 * included with this distribution is covered by the same copyright terms
13 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 * Copyright remains Eric Young's, and as such any Copyright notices in
16 * the code are not to be removed.
17 * If this package is used in a product, Eric Young should be given attribution
18 * as the author of the parts of the library used.
19 * This can be in the form of a textual message at program startup or
20 * in documentation (online or textual) provided with the package.
22 * Redistribution and use in source and binary forms, with or without
23 * modification, are permitted provided that the following conditions
25 * 1. Redistributions of source code must retain the copyright
26 * notice, this list of conditions and the following disclaimer.
27 * 2. Redistributions in binary form must reproduce the above copyright
28 * notice, this list of conditions and the following disclaimer in the
29 * documentation and/or other materials provided with the distribution.
30 * 3. All advertising materials mentioning features or use of this software
31 * must display the following acknowledgement:
32 * "This product includes cryptographic software written by
33 * Eric Young (eay@cryptsoft.com)"
34 * The word 'cryptographic' can be left out if the rouines from the library
35 * being used are not cryptographic related :-).
36 * 4. If you include any Windows specific code (or a derivative thereof) from
37 * the apps directory (application code) you must include an acknowledgement:
38 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
41 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
43 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
44 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
45 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
46 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
48 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
49 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
52 * The licence and distribution terms for any publically available version or
53 * derivative of this code cannot be changed. i.e. this code cannot simply be
54 * copied and put under another distribution licence
55 * [including the GNU Public Licence.]
59 #include "internal/cryptlib.h"
60 #include <openssl/buffer.h>
61 #include <openssl/bn.h>
62 #include <openssl/objects.h>
63 #include <openssl/x509.h>
64 #include <openssl/x509v3.h>
65 #include "internal/asn1_int.h"
67 #ifndef OPENSSL_NO_STDIO
68 int X509_print_fp(FILE *fp
, X509
*x
)
70 return X509_print_ex_fp(fp
, x
, XN_FLAG_COMPAT
, X509_FLAG_COMPAT
);
73 int X509_print_ex_fp(FILE *fp
, X509
*x
, unsigned long nmflag
,
79 if ((b
= BIO_new(BIO_s_file())) == NULL
) {
80 X509err(X509_F_X509_PRINT_EX_FP
, ERR_R_BUF_LIB
);
83 BIO_set_fp(b
, fp
, BIO_NOCLOSE
);
84 ret
= X509_print_ex(b
, x
, nmflag
, cflag
);
90 int X509_print(BIO
*bp
, X509
*x
)
92 return X509_print_ex(bp
, x
, XN_FLAG_COMPAT
, X509_FLAG_COMPAT
);
95 int X509_print_ex(BIO
*bp
, X509
*x
, unsigned long nmflags
,
100 char *m
= NULL
, mlch
= ' ';
103 EVP_PKEY
*pkey
= NULL
;
106 if ((nmflags
& XN_FLAG_SEP_MASK
) == XN_FLAG_SEP_MULTILINE
) {
111 if (nmflags
== X509_FLAG_COMPAT
)
114 if (!(cflag
& X509_FLAG_NO_HEADER
)) {
115 if (BIO_write(bp
, "Certificate:\n", 13) <= 0)
117 if (BIO_write(bp
, " Data:\n", 10) <= 0)
120 if (!(cflag
& X509_FLAG_NO_VERSION
)) {
121 l
= X509_get_version(x
);
122 if (BIO_printf(bp
, "%8sVersion: %lu (0x%lx)\n", "", l
+ 1, l
) <= 0)
125 if (!(cflag
& X509_FLAG_NO_SERIAL
)) {
127 if (BIO_write(bp
, " Serial Number:", 22) <= 0)
130 bs
= X509_get_serialNumber(x
);
131 if (bs
->length
<= (int)sizeof(long)) {
133 l
= ASN1_INTEGER_get(bs
);
139 if (bs
->type
== V_ASN1_NEG_INTEGER
) {
144 if (BIO_printf(bp
, " %s%lu (%s0x%lx)\n", neg
, l
, neg
, l
) <= 0)
147 neg
= (bs
->type
== V_ASN1_NEG_INTEGER
) ? " (Negative)" : "";
148 if (BIO_printf(bp
, "\n%12s%s", "", neg
) <= 0)
151 for (i
= 0; i
< bs
->length
; i
++) {
152 if (BIO_printf(bp
, "%02x%c", bs
->data
[i
],
153 ((i
+ 1 == bs
->length
) ? '\n' : ':')) <= 0)
160 if (!(cflag
& X509_FLAG_NO_SIGNAME
)) {
161 X509_ALGOR
*tsig_alg
= X509_get0_tbs_sigalg(x
);
162 if (X509_signature_print(bp
, tsig_alg
, NULL
) <= 0)
166 if (!(cflag
& X509_FLAG_NO_ISSUER
)) {
167 if (BIO_printf(bp
, " Issuer:%c", mlch
) <= 0)
169 if (X509_NAME_print_ex(bp
, X509_get_issuer_name(x
), nmindent
, nmflags
)
172 if (BIO_write(bp
, "\n", 1) <= 0)
175 if (!(cflag
& X509_FLAG_NO_VALIDITY
)) {
176 if (BIO_write(bp
, " Validity\n", 17) <= 0)
178 if (BIO_write(bp
, " Not Before: ", 24) <= 0)
180 if (!ASN1_TIME_print(bp
, X509_get_notBefore(x
)))
182 if (BIO_write(bp
, "\n Not After : ", 25) <= 0)
184 if (!ASN1_TIME_print(bp
, X509_get_notAfter(x
)))
186 if (BIO_write(bp
, "\n", 1) <= 0)
189 if (!(cflag
& X509_FLAG_NO_SUBJECT
)) {
190 if (BIO_printf(bp
, " Subject:%c", mlch
) <= 0)
192 if (X509_NAME_print_ex
193 (bp
, X509_get_subject_name(x
), nmindent
, nmflags
) < 0)
195 if (BIO_write(bp
, "\n", 1) <= 0)
198 if (!(cflag
& X509_FLAG_NO_PUBKEY
)) {
199 X509_PUBKEY
*xpkey
= X509_get_X509_PUBKEY(x
);
201 X509_PUBKEY_get0_param(&xpoid
, NULL
, NULL
, NULL
, xpkey
);
202 if (BIO_write(bp
, " Subject Public Key Info:\n", 33) <= 0)
204 if (BIO_printf(bp
, "%12sPublic Key Algorithm: ", "") <= 0)
206 if (i2a_ASN1_OBJECT(bp
, xpoid
) <= 0)
208 if (BIO_puts(bp
, "\n") <= 0)
211 pkey
= X509_get0_pubkey(x
);
213 BIO_printf(bp
, "%12sUnable to load Public Key\n", "");
214 ERR_print_errors(bp
);
216 EVP_PKEY_print_public(bp
, pkey
, 16, NULL
);
220 if (!(cflag
& X509_FLAG_NO_IDS
)) {
221 ASN1_BIT_STRING
*iuid
, *suid
;
222 X509_get0_uids(&iuid
, &suid
, x
);
224 if (BIO_printf(bp
, "%8sIssuer Unique ID: ", "") <= 0)
226 if (!X509_signature_dump(bp
, iuid
, 12))
230 if (BIO_printf(bp
, "%8sSubject Unique ID: ", "") <= 0)
232 if (!X509_signature_dump(bp
, suid
, 12))
237 if (!(cflag
& X509_FLAG_NO_EXTENSIONS
))
238 X509V3_extensions_print(bp
, "X509v3 extensions",
239 X509_get0_extensions(x
), cflag
, 8);
241 if (!(cflag
& X509_FLAG_NO_SIGDUMP
)) {
243 ASN1_BIT_STRING
*sig
;
244 X509_get0_signature(&sig
, &sig_alg
, x
);
245 if (X509_signature_print(bp
, sig_alg
, sig
) <= 0)
248 if (!(cflag
& X509_FLAG_NO_AUX
)) {
249 if (!X509_aux_print(bp
, x
, 0))
258 int X509_ocspid_print(BIO
*bp
, X509
*x
)
260 unsigned char *der
= NULL
;
261 unsigned char *dertmp
;
264 unsigned char SHA1md
[SHA_DIGEST_LENGTH
];
265 ASN1_BIT_STRING
*keybstr
;
269 * display the hash of the subject as it would appear in OCSP requests
271 if (BIO_printf(bp
, " Subject OCSP hash: ") <= 0)
273 subj
= X509_get_subject_name(x
);
274 derlen
= i2d_X509_NAME(subj
, NULL
);
275 if ((der
= dertmp
= OPENSSL_malloc(derlen
)) == NULL
)
277 i2d_X509_NAME(subj
, &dertmp
);
279 if (!EVP_Digest(der
, derlen
, SHA1md
, NULL
, EVP_sha1(), NULL
))
281 for (i
= 0; i
< SHA_DIGEST_LENGTH
; i
++) {
282 if (BIO_printf(bp
, "%02X", SHA1md
[i
]) <= 0)
289 * display the hash of the public key as it would appear in OCSP requests
291 if (BIO_printf(bp
, "\n Public key OCSP hash: ") <= 0)
294 keybstr
= X509_get0_pubkey_bitstr(x
);
299 if (!EVP_Digest(ASN1_STRING_data(keybstr
), ASN1_STRING_length(keybstr
),
300 SHA1md
, NULL
, EVP_sha1(), NULL
))
302 for (i
= 0; i
< SHA_DIGEST_LENGTH
; i
++) {
303 if (BIO_printf(bp
, "%02X", SHA1md
[i
]) <= 0)
306 BIO_printf(bp
, "\n");
314 int X509_signature_dump(BIO
*bp
, const ASN1_STRING
*sig
, int indent
)
316 const unsigned char *s
;
321 for (i
= 0; i
< n
; i
++) {
323 if (BIO_write(bp
, "\n", 1) <= 0)
325 if (BIO_indent(bp
, indent
, indent
) <= 0)
328 if (BIO_printf(bp
, "%02x%s", s
[i
], ((i
+ 1) == n
) ? "" : ":") <= 0)
331 if (BIO_write(bp
, "\n", 1) != 1)
337 int X509_signature_print(BIO
*bp
, X509_ALGOR
*sigalg
, ASN1_STRING
*sig
)
340 if (BIO_puts(bp
, " Signature Algorithm: ") <= 0)
342 if (i2a_ASN1_OBJECT(bp
, sigalg
->algorithm
) <= 0)
345 sig_nid
= OBJ_obj2nid(sigalg
->algorithm
);
346 if (sig_nid
!= NID_undef
) {
347 int pkey_nid
, dig_nid
;
348 const EVP_PKEY_ASN1_METHOD
*ameth
;
349 if (OBJ_find_sigid_algs(sig_nid
, &dig_nid
, &pkey_nid
)) {
350 ameth
= EVP_PKEY_asn1_find(NULL
, pkey_nid
);
351 if (ameth
&& ameth
->sig_print
)
352 return ameth
->sig_print(bp
, sigalg
, sig
, 9, 0);
356 return X509_signature_dump(bp
, sig
, 9);
357 else if (BIO_puts(bp
, "\n") <= 0)
362 int X509_aux_print(BIO
*out
, X509
*x
, int indent
)
364 char oidstr
[80], first
;
365 STACK_OF(ASN1_OBJECT
) *trust
, *reject
;
366 const unsigned char *alias
, *keyid
;
369 if (X509_trusted(x
) == 0)
371 trust
= X509_get0_trust_objects(x
);
372 reject
= X509_get0_reject_objects(x
);
375 BIO_printf(out
, "%*sTrusted Uses:\n%*s", indent
, "", indent
+ 2, "");
376 for (i
= 0; i
< sk_ASN1_OBJECT_num(trust
); i
++) {
381 OBJ_obj2txt(oidstr
, sizeof oidstr
,
382 sk_ASN1_OBJECT_value(trust
, i
), 0);
383 BIO_puts(out
, oidstr
);
387 BIO_printf(out
, "%*sNo Trusted Uses.\n", indent
, "");
390 BIO_printf(out
, "%*sRejected Uses:\n%*s", indent
, "", indent
+ 2, "");
391 for (i
= 0; i
< sk_ASN1_OBJECT_num(reject
); i
++) {
396 OBJ_obj2txt(oidstr
, sizeof oidstr
,
397 sk_ASN1_OBJECT_value(reject
, i
), 0);
398 BIO_puts(out
, oidstr
);
402 BIO_printf(out
, "%*sNo Rejected Uses.\n", indent
, "");
403 alias
= X509_alias_get0(x
, NULL
);
405 BIO_printf(out
, "%*sAlias: %s\n", indent
, "", alias
);
406 keyid
= X509_keyid_get0(x
, &keyidlen
);
408 BIO_printf(out
, "%*sKey Id: ", indent
, "");
409 for (i
= 0; i
< keyidlen
; i
++)
410 BIO_printf(out
, "%s%02X", i
? ":" : "", keyid
[i
]);
411 BIO_write(out
, "\n", 1);