xref: /openbsd-src/lib/libcrypto/asn1/t_req.c (revision cf5de1f602bfe31a1de0d5bcba280f0bf0a50ae2)
1 /* crypto/asn1/t_req.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  *
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  *
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  *
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  *
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  *
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 
59 #include <stdio.h>
60 #include "cryptlib.h"
61 #include <openssl/buffer.h>
62 #include <openssl/bn.h>
63 #include <openssl/objects.h>
64 #include <openssl/x509.h>
65 #include <openssl/x509v3.h>
66 
67 #ifndef OPENSSL_NO_FP_API
68 int X509_REQ_print_fp(FILE *fp, X509_REQ *x)
69         {
70         BIO *b;
71         int ret;
72 
73         if ((b=BIO_new(BIO_s_file())) == NULL)
74 		{
75 		X509err(X509_F_X509_REQ_PRINT_FP,ERR_R_BUF_LIB);
76                 return(0);
77 		}
78         BIO_set_fp(b,fp,BIO_NOCLOSE);
79         ret=X509_REQ_print(b, x);
80         BIO_free(b);
81         return(ret);
82         }
83 #endif
84 
85 int X509_REQ_print_ex(BIO *bp, X509_REQ *x, unsigned long nmflags, unsigned long cflag)
86 	{
87 	unsigned long l;
88 	int i;
89 	const char *neg;
90 	X509_REQ_INFO *ri;
91 	EVP_PKEY *pkey;
92 	STACK_OF(X509_ATTRIBUTE) *sk;
93 	STACK_OF(X509_EXTENSION) *exts;
94 	char str[128];
95 	char mlch = ' ';
96 	int nmindent = 0;
97 
98 	if((nmflags & XN_FLAG_SEP_MASK) == XN_FLAG_SEP_MULTILINE) {
99 		mlch = '\n';
100 		nmindent = 12;
101 	}
102 
103 	if(nmflags == X509_FLAG_COMPAT)
104 		nmindent = 16;
105 
106 
107 	ri=x->req_info;
108 	if(!(cflag & X509_FLAG_NO_HEADER))
109 		{
110 		if (BIO_write(bp,"Certificate Request:\n",21) <= 0) goto err;
111 		if (BIO_write(bp,"    Data:\n",10) <= 0) goto err;
112 		}
113 	if(!(cflag & X509_FLAG_NO_VERSION))
114 		{
115 		neg=(ri->version->type == V_ASN1_NEG_INTEGER)?"-":"";
116 		l=0;
117 		for (i=0; i<ri->version->length; i++)
118 			{ l<<=8; l+=ri->version->data[i]; }
119 		sprintf(str,"%8sVersion: %s%lu (%s0x%lx)\n","",neg,l,neg,l);
120 		if (BIO_puts(bp,str) <= 0) goto err;
121 		}
122         if(!(cflag & X509_FLAG_NO_SUBJECT))
123                 {
124                 if (BIO_printf(bp,"        Subject:%c",mlch) <= 0) goto err;
125                 if (X509_NAME_print_ex(bp,ri->subject,nmindent, nmflags) < 0) goto err;
126                 if (BIO_write(bp,"\n",1) <= 0) goto err;
127                 }
128 	if(!(cflag & X509_FLAG_NO_PUBKEY))
129 		{
130 		if (BIO_write(bp,"        Subject Public Key Info:\n",33) <= 0)
131 			goto err;
132 		if (BIO_printf(bp,"%12sPublic Key Algorithm: ","") <= 0)
133 			goto err;
134 		if (i2a_ASN1_OBJECT(bp, ri->pubkey->algor->algorithm) <= 0)
135 			goto err;
136 		if (BIO_puts(bp, "\n") <= 0)
137 			goto err;
138 
139 		pkey=X509_REQ_get_pubkey(x);
140 		if (pkey == NULL)
141 			{
142 			BIO_printf(bp,"%12sUnable to load Public Key\n","");
143 			ERR_print_errors(bp);
144 			}
145 		else
146 #ifndef OPENSSL_NO_RSA
147 		if (pkey->type == EVP_PKEY_RSA)
148 			{
149 			BIO_printf(bp,"%12sRSA Public Key: (%d bit)\n","",
150 			BN_num_bits(pkey->pkey.rsa->n));
151 			RSA_print(bp,pkey->pkey.rsa,16);
152 			}
153 		else
154 #endif
155 #ifndef OPENSSL_NO_DSA
156 		if (pkey->type == EVP_PKEY_DSA)
157 			{
158 			BIO_printf(bp,"%12sDSA Public Key:\n","");
159 			DSA_print(bp,pkey->pkey.dsa,16);
160 			}
161 		else
162 #endif
163 			BIO_printf(bp,"%12sUnknown Public Key:\n","");
164 
165 		EVP_PKEY_free(pkey);
166 		}
167 
168 	if(!(cflag & X509_FLAG_NO_ATTRIBUTES))
169 		{
170 		/* may not be */
171 		sprintf(str,"%8sAttributes:\n","");
172 		if (BIO_puts(bp,str) <= 0) goto err;
173 
174 		sk=x->req_info->attributes;
175 		if (sk_X509_ATTRIBUTE_num(sk) == 0)
176 			{
177 			sprintf(str,"%12sa0:00\n","");
178 			if (BIO_puts(bp,str) <= 0) goto err;
179 			}
180 		else
181 			{
182 			for (i=0; i<sk_X509_ATTRIBUTE_num(sk); i++)
183 				{
184 				ASN1_TYPE *at;
185 				X509_ATTRIBUTE *a;
186 				ASN1_BIT_STRING *bs=NULL;
187 				ASN1_TYPE *t;
188 				int j,type=0,count=1,ii=0;
189 
190 				a=sk_X509_ATTRIBUTE_value(sk,i);
191 				if(X509_REQ_extension_nid(OBJ_obj2nid(a->object)))
192 									continue;
193 				sprintf(str,"%12s","");
194 				if (BIO_puts(bp,str) <= 0) goto err;
195 				if ((j=i2a_ASN1_OBJECT(bp,a->object)) > 0)
196 				{
197 				if (a->single)
198 					{
199 					t=a->value.single;
200 					type=t->type;
201 					bs=t->value.bit_string;
202 					}
203 				else
204 					{
205 					ii=0;
206 					count=sk_ASN1_TYPE_num(a->value.set);
207 get_next:
208 					at=sk_ASN1_TYPE_value(a->value.set,ii);
209 					type=at->type;
210 					bs=at->value.asn1_string;
211 					}
212 				}
213 				for (j=25-j; j>0; j--)
214 					if (BIO_write(bp," ",1) != 1) goto err;
215 				if (BIO_puts(bp,":") <= 0) goto err;
216 				if (	(type == V_ASN1_PRINTABLESTRING) ||
217 					(type == V_ASN1_T61STRING) ||
218 					(type == V_ASN1_IA5STRING))
219 					{
220 					if (BIO_write(bp,(char *)bs->data,bs->length)
221 						!= bs->length)
222 						goto err;
223 					BIO_puts(bp,"\n");
224 					}
225 				else
226 					{
227 					BIO_puts(bp,"unable to print attribute\n");
228 					}
229 				if (++ii < count) goto get_next;
230 				}
231 			}
232 		}
233 	if(!(cflag & X509_FLAG_NO_ATTRIBUTES))
234 		{
235 		exts = X509_REQ_get_extensions(x);
236 		if(exts)
237 			{
238 			BIO_printf(bp,"%8sRequested Extensions:\n","");
239 			for (i=0; i<sk_X509_EXTENSION_num(exts); i++)
240 				{
241 				ASN1_OBJECT *obj;
242 				X509_EXTENSION *ex;
243 				int j;
244 				ex=sk_X509_EXTENSION_value(exts, i);
245 				if (BIO_printf(bp,"%12s","") <= 0) goto err;
246 				obj=X509_EXTENSION_get_object(ex);
247 				i2a_ASN1_OBJECT(bp,obj);
248 				j=X509_EXTENSION_get_critical(ex);
249 				if (BIO_printf(bp,": %s\n",j?"critical":"","") <= 0)
250 					goto err;
251 				if(!X509V3_EXT_print(bp, ex, 0, 16))
252 					{
253 					BIO_printf(bp, "%16s", "");
254 					M_ASN1_OCTET_STRING_print(bp,ex->value);
255 					}
256 				if (BIO_write(bp,"\n",1) <= 0) goto err;
257 				}
258 			sk_X509_EXTENSION_pop_free(exts, X509_EXTENSION_free);
259 			}
260 		}
261 
262 	if(!(cflag & X509_FLAG_NO_SIGDUMP))
263 		{
264 		if(!X509_signature_print(bp, x->sig_alg, x->signature)) goto err;
265 		}
266 
267 	return(1);
268 err:
269 	X509err(X509_F_X509_REQ_PRINT,ERR_R_BUF_LIB);
270 	return(0);
271 	}
272 
273 int X509_REQ_print(BIO *bp, X509_REQ *x)
274 	{
275 	return X509_REQ_print_ex(bp, x, XN_FLAG_COMPAT, X509_FLAG_COMPAT);
276 	}
277