xref: /openbsd-src/lib/libcrypto/asn1/t_x509.c (revision 50b7afb2c2c0993b0894d4e34bf857cb13ed9c80)
1 /* $OpenBSD: t_x509.c,v 1.25 2014/07/12 16:33:25 miod Exp $ */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  *
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  *
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  *
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  *
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  *
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 
59 #include <stdio.h>
60 
61 #include <openssl/opensslconf.h>
62 
63 #include <openssl/bn.h>
64 #include <openssl/buffer.h>
65 #include <openssl/err.h>
66 #include <openssl/objects.h>
67 #include <openssl/x509.h>
68 #include <openssl/x509v3.h>
69 
70 #ifndef OPENSSL_NO_DSA
71 #include <openssl/dsa.h>
72 #endif
73 #ifndef OPENSSL_NO_EC
74 #include <openssl/ec.h>
75 #endif
76 #ifndef OPENSSL_NO_RSA
77 #include <openssl/rsa.h>
78 #endif
79 
80 #include "asn1_locl.h"
81 
82 int
83 X509_print_fp(FILE *fp, X509 *x)
84 {
85 	return X509_print_ex_fp(fp, x, XN_FLAG_COMPAT, X509_FLAG_COMPAT);
86 }
87 
88 int
89 X509_print_ex_fp(FILE *fp, X509 *x, unsigned long nmflag, unsigned long cflag)
90 {
91 	BIO *b;
92 	int ret;
93 
94 	if ((b = BIO_new(BIO_s_file())) == NULL) {
95 		X509err(X509_F_X509_PRINT_EX_FP, ERR_R_BUF_LIB);
96 		return (0);
97 	}
98 	BIO_set_fp(b, fp, BIO_NOCLOSE);
99 	ret = X509_print_ex(b, x, nmflag, cflag);
100 	BIO_free(b);
101 	return (ret);
102 }
103 
104 int
105 X509_print(BIO *bp, X509 *x)
106 {
107 	return X509_print_ex(bp, x, XN_FLAG_COMPAT, X509_FLAG_COMPAT);
108 }
109 
110 int
111 X509_print_ex(BIO *bp, X509 *x, unsigned long nmflags, unsigned long cflag)
112 {
113 	long l;
114 	int ret = 0, i;
115 	char *m = NULL, mlch = ' ';
116 	int nmindent = 0;
117 	X509_CINF *ci;
118 	ASN1_INTEGER *bs;
119 	EVP_PKEY *pkey = NULL;
120 	const char *neg;
121 
122 	if ((nmflags & XN_FLAG_SEP_MASK) == XN_FLAG_SEP_MULTILINE) {
123 		mlch = '\n';
124 		nmindent = 12;
125 	}
126 
127 	if (nmflags == X509_FLAG_COMPAT)
128 		nmindent = 16;
129 
130 	ci = x->cert_info;
131 	if (!(cflag & X509_FLAG_NO_HEADER)) {
132 		if (BIO_write(bp, "Certificate:\n", 13) <= 0)
133 			goto err;
134 		if (BIO_write(bp, "    Data:\n", 10) <= 0)
135 			goto err;
136 	}
137 	if (!(cflag & X509_FLAG_NO_VERSION)) {
138 		l = X509_get_version(x);
139 		if (BIO_printf(bp, "%8sVersion: %lu (0x%lx)\n",
140 		    "", l + 1, l) <= 0)
141 			goto err;
142 	}
143 	if (!(cflag & X509_FLAG_NO_SERIAL)) {
144 		if (BIO_write(bp, "        Serial Number:", 22) <= 0)
145 			goto err;
146 
147 		bs = X509_get_serialNumber(x);
148 		if (bs->length <= (int)sizeof(long)) {
149 			l = ASN1_INTEGER_get(bs);
150 			if (bs->type == V_ASN1_NEG_INTEGER) {
151 				l = -l;
152 				neg = "-";
153 			} else
154 				neg = "";
155 			if (BIO_printf(bp, " %s%lu (%s0x%lx)\n",
156 			    neg, l, neg, l) <= 0)
157 				goto err;
158 		} else {
159 			neg = (bs->type == V_ASN1_NEG_INTEGER) ?
160 			    " (Negative)" : "";
161 			if (BIO_printf(bp, "\n%12s%s", "", neg) <= 0)
162 				goto err;
163 			for (i = 0; i < bs->length; i++) {
164 				if (BIO_printf(bp, "%02x%c", bs->data[i],
165 				    ((i + 1 == bs->length) ? '\n' : ':')) <= 0)
166 					goto err;
167 			}
168 		}
169 
170 	}
171 
172 	if (!(cflag & X509_FLAG_NO_SIGNAME)) {
173 		if (X509_signature_print(bp, x->sig_alg, NULL) <= 0)
174 			goto err;
175 #if 0
176 		if (BIO_printf(bp, "%8sSignature Algorithm: ", "") <= 0)
177 			goto err;
178 		if (i2a_ASN1_OBJECT(bp, ci->signature->algorithm) <= 0)
179 			goto err;
180 		if (BIO_puts(bp, "\n") <= 0)
181 			goto err;
182 #endif
183 	}
184 
185 	if (!(cflag & X509_FLAG_NO_ISSUER)) {
186 		if (BIO_printf(bp, "        Issuer:%c", mlch) <= 0)
187 			goto err;
188 		if (X509_NAME_print_ex(bp, X509_get_issuer_name(x),
189 		    nmindent, nmflags) < 0)
190 			goto err;
191 		if (BIO_write(bp, "\n", 1) <= 0)
192 			goto err;
193 	}
194 	if (!(cflag & X509_FLAG_NO_VALIDITY)) {
195 		if (BIO_write(bp, "        Validity\n", 17) <= 0)
196 			goto err;
197 		if (BIO_write(bp, "            Not Before: ", 24) <= 0)
198 			goto err;
199 		if (!ASN1_TIME_print(bp, X509_get_notBefore(x)))
200 			goto err;
201 		if (BIO_write(bp, "\n            Not After : ", 25) <= 0)
202 			goto err;
203 		if (!ASN1_TIME_print(bp, X509_get_notAfter(x)))
204 			goto err;
205 		if (BIO_write(bp, "\n", 1) <= 0)
206 			goto err;
207 	}
208 	if (!(cflag & X509_FLAG_NO_SUBJECT)) {
209 		if (BIO_printf(bp, "        Subject:%c", mlch) <= 0)
210 			goto err;
211 		if (X509_NAME_print_ex(bp, X509_get_subject_name(x),
212 		    nmindent, nmflags) < 0)
213 			goto err;
214 		if (BIO_write(bp, "\n", 1) <= 0)
215 			goto err;
216 	}
217 	if (!(cflag & X509_FLAG_NO_PUBKEY)) {
218 		if (BIO_write(bp, "        Subject Public Key Info:\n",
219 		    33) <= 0)
220 			goto err;
221 		if (BIO_printf(bp, "%12sPublic Key Algorithm: ", "") <= 0)
222 			goto err;
223 		if (i2a_ASN1_OBJECT(bp, ci->key->algor->algorithm) <= 0)
224 			goto err;
225 		if (BIO_puts(bp, "\n") <= 0)
226 			goto err;
227 
228 		pkey = X509_get_pubkey(x);
229 		if (pkey == NULL) {
230 			BIO_printf(bp, "%12sUnable to load Public Key\n", "");
231 			ERR_print_errors(bp);
232 		} else {
233 			EVP_PKEY_print_public(bp, pkey, 16, NULL);
234 			EVP_PKEY_free(pkey);
235 		}
236 	}
237 
238 	if (!(cflag & X509_FLAG_NO_EXTENSIONS))
239 		X509V3_extensions_print(bp, "X509v3 extensions",
240 		    ci->extensions, cflag, 8);
241 
242 	if (!(cflag & X509_FLAG_NO_SIGDUMP)) {
243 		if (X509_signature_print(bp, x->sig_alg, x->signature) <= 0)
244 			goto err;
245 	}
246 	if (!(cflag & X509_FLAG_NO_AUX)) {
247 		if (!X509_CERT_AUX_print(bp, x->aux, 0))
248 			goto err;
249 	}
250 	ret = 1;
251 
252 err:
253 	free(m);
254 	return (ret);
255 }
256 
257 int X509_ocspid_print (BIO *bp, X509 *x)
258 {
259 	unsigned char *der = NULL;
260 	unsigned char *dertmp;
261 	int derlen;
262 	int i;
263 	unsigned char SHA1md[SHA_DIGEST_LENGTH];
264 
265 	/* display the hash of the subject as it would appear
266 	   in OCSP requests */
267 	if (BIO_printf(bp, "        Subject OCSP hash: ") <= 0)
268 		goto err;
269 	derlen = i2d_X509_NAME(x->cert_info->subject, NULL);
270 	if ((der = dertmp = malloc(derlen)) == NULL)
271 		goto err;
272 	i2d_X509_NAME(x->cert_info->subject, &dertmp);
273 
274 	if (!EVP_Digest(der, derlen, SHA1md, NULL, EVP_sha1(), NULL))
275 		goto err;
276 	for (i = 0; i < SHA_DIGEST_LENGTH; i++) {
277 		if (BIO_printf(bp, "%02X", SHA1md[i]) <= 0)
278 			goto err;
279 	}
280 	free (der);
281 	der = NULL;
282 
283 	/* display the hash of the public key as it would appear
284 	   in OCSP requests */
285 	if (BIO_printf(bp, "\n        Public key OCSP hash: ") <= 0)
286 		goto err;
287 
288 	if (!EVP_Digest(x->cert_info->key->public_key->data,
289 	    x->cert_info->key->public_key->length,
290 	    SHA1md, NULL, EVP_sha1(), NULL))
291 		goto err;
292 	for (i = 0; i < SHA_DIGEST_LENGTH; i++) {
293 		if (BIO_printf(bp, "%02X", SHA1md[i]) <= 0)
294 			goto err;
295 	}
296 	BIO_printf(bp, "\n");
297 
298 	return (1);
299 
300 err:
301 	free(der);
302 	return (0);
303 }
304 
305 int
306 X509_signature_dump(BIO *bp, const ASN1_STRING *sig, int indent)
307 {
308 	const unsigned char *s;
309 	int i, n;
310 
311 	n = sig->length;
312 	s = sig->data;
313 	for (i = 0; i < n; i++) {
314 		if ((i % 18) == 0) {
315 			if (BIO_write(bp, "\n", 1) <= 0)
316 				return 0;
317 			if (BIO_indent(bp, indent, indent) <= 0)
318 				return 0;
319 		}
320 		if (BIO_printf(bp, "%02x%s", s[i],
321 		    ((i + 1) == n) ? "" : ":") <= 0)
322 			return 0;
323 	}
324 	if (BIO_write(bp, "\n", 1) != 1)
325 		return 0;
326 
327 	return 1;
328 }
329 
330 int
331 X509_signature_print(BIO *bp, X509_ALGOR *sigalg, ASN1_STRING *sig)
332 {
333 	int sig_nid;
334 	if (BIO_puts(bp, "    Signature Algorithm: ") <= 0)
335 		return 0;
336 	if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0)
337 		return 0;
338 
339 	sig_nid = OBJ_obj2nid(sigalg->algorithm);
340 	if (sig_nid != NID_undef) {
341 		int pkey_nid, dig_nid;
342 		const EVP_PKEY_ASN1_METHOD *ameth;
343 		if (OBJ_find_sigid_algs(sig_nid, &dig_nid, &pkey_nid)) {
344 			ameth = EVP_PKEY_asn1_find(NULL, pkey_nid);
345 			if (ameth && ameth->sig_print)
346 				return ameth->sig_print(bp, sigalg, sig, 9, 0);
347 		}
348 	}
349 	if (sig)
350 		return X509_signature_dump(bp, sig, 9);
351 	else if (BIO_puts(bp, "\n") <= 0)
352 		return 0;
353 	return 1;
354 }
355 
356 int
357 ASN1_STRING_print(BIO *bp, const ASN1_STRING *v)
358 {
359 	int i, n;
360 	char buf[80];
361 	const char *p;
362 
363 	if (v == NULL)
364 		return (0);
365 	n = 0;
366 	p = (const char *)v->data;
367 	for (i = 0; i < v->length; i++) {
368 		if ((p[i] > '~') || ((p[i] < ' ') &&
369 		    (p[i] != '\n') && (p[i] != '\r')))
370 			buf[n] = '.';
371 		else
372 			buf[n] = p[i];
373 		n++;
374 		if (n >= 80) {
375 			if (BIO_write(bp, buf, n) <= 0)
376 				return (0);
377 			n = 0;
378 		}
379 	}
380 	if (n > 0)
381 		if (BIO_write(bp, buf, n) <= 0)
382 			return (0);
383 	return (1);
384 }
385 
386 int
387 ASN1_TIME_print(BIO *bp, const ASN1_TIME *tm)
388 {
389 	if (tm->type == V_ASN1_UTCTIME)
390 		return ASN1_UTCTIME_print(bp, tm);
391 	if (tm->type == V_ASN1_GENERALIZEDTIME)
392 		return ASN1_GENERALIZEDTIME_print(bp, tm);
393 	BIO_write(bp, "Bad time value", 14);
394 	return (0);
395 }
396 
397 static const char *mon[12] = {
398 	"Jan", "Feb", "Mar", "Apr", "May", "Jun",
399 	"Jul", "Aug", "Sep", "Oct", "Nov", "Dec"
400 };
401 
402 int
403 ASN1_GENERALIZEDTIME_print(BIO *bp, const ASN1_GENERALIZEDTIME *tm)
404 {
405 	char *v;
406 	int gmt = 0;
407 	int i;
408 	int y = 0, M = 0, d = 0, h = 0, m = 0, s = 0;
409 	char *f = NULL;
410 	int f_len = 0;
411 
412 	i = tm->length;
413 	v = (char *)tm->data;
414 
415 	if (i < 12)
416 		goto err;
417 	if (v[i-1] == 'Z')
418 		gmt = 1;
419 	for (i = 0; i < 12; i++)
420 		if ((v[i] > '9') || (v[i] < '0'))
421 			goto err;
422 	y = (v[0] - '0') * 1000 + (v[1] - '0') * 100 +
423 	    (v[2] - '0') * 10 + (v[3] - '0');
424 	M = (v[4] - '0') * 10 + (v[5] - '0');
425 	if ((M > 12) || (M < 1))
426 		goto err;
427 	d = (v[6] - '0') * 10 + (v[7] - '0');
428 	h = (v[8] - '0') * 10 + (v[9] - '0');
429 	m = (v[10] - '0') * 10 + (v[11] - '0');
430 	if (tm->length >= 14 &&
431 	    (v[12] >= '0') && (v[12] <= '9') &&
432 	    (v[13] >= '0') && (v[13] <= '9')) {
433 		s =  (v[12] - '0') * 10 + (v[13] - '0');
434 		/* Check for fractions of seconds. */
435 		if (tm->length >= 15 && v[14] == '.') {
436 			int l = tm->length;
437 			f = &v[14];	/* The decimal point. */
438 			f_len = 1;
439 			while (14 + f_len < l && f[f_len] >= '0' &&
440 			    f[f_len] <= '9')
441 				++f_len;
442 		}
443 	}
444 
445 	if (BIO_printf(bp, "%s %2d %02d:%02d:%02d%.*s %d%s",
446 	    mon[M - 1], d, h, m, s, f_len, f, y, (gmt) ? " GMT" : "") <= 0)
447 		return (0);
448 	else
449 		return (1);
450 
451 err:
452 	BIO_write(bp, "Bad time value", 14);
453 	return (0);
454 }
455 
456 int
457 ASN1_UTCTIME_print(BIO *bp, const ASN1_UTCTIME *tm)
458 {
459 	const char *v;
460 	int gmt = 0;
461 	int i;
462 	int y = 0, M = 0, d = 0, h = 0, m = 0, s = 0;
463 
464 	i = tm->length;
465 	v = (const char *)tm->data;
466 
467 	if (i < 10)
468 		goto err;
469 	if (v[i-1] == 'Z')
470 		gmt = 1;
471 	for (i = 0; i < 10; i++)
472 		if ((v[i] > '9') || (v[i] < '0'))
473 			goto err;
474 	y = (v[0] - '0') * 10 + (v[1] - '0');
475 	if (y < 50)
476 		y += 100;
477 	M = (v[2] - '0') * 10 + (v[3] - '0');
478 	if ((M > 12) || (M < 1))
479 		goto err;
480 	d = (v[4] - '0') * 10 + (v[5] - '0');
481 	h = (v[6] - '0') * 10 + (v[7] - '0');
482 	m = (v[8] - '0') * 10 + (v[9] - '0');
483 	if (tm->length >=12 &&
484 	    (v[10] >= '0') && (v[10] <= '9') &&
485 	    (v[11] >= '0') && (v[11] <= '9'))
486 		s = (v[10] - '0') * 10 + (v[11] - '0');
487 
488 	if (BIO_printf(bp, "%s %2d %02d:%02d:%02d %d%s",
489 	    mon[M - 1], d, h, m, s, y + 1900, (gmt) ? " GMT" : "") <= 0)
490 		return (0);
491 	else
492 		return (1);
493 
494 err:
495 	BIO_write(bp, "Bad time value", 14);
496 	return (0);
497 }
498 
499 int
500 X509_NAME_print(BIO *bp, X509_NAME *name, int obase)
501 {
502 	char *s, *c, *b;
503 	int ret = 0, l, i;
504 
505 	l = 80 - 2 - obase;
506 
507 	b = X509_NAME_oneline(name, NULL, 0);
508 	if (b == NULL)
509 		return 0;
510 	if (*b == '\0') {
511 		free(b);
512 		return 1;
513 	}
514 	s = b + 1; /* skip the first slash */
515 
516 	c = s;
517 	for (;;) {
518 		if (((*s == '/') &&
519 		    ((s[1] >= 'A') && (s[1] <= 'Z') &&
520 		    ((s[2] == '=') || ((s[2] >= 'A') && (s[2] <= 'Z') &&
521 		    (s[3] == '='))))) || (*s == '\0')) {
522 			i = s - c;
523 			if (BIO_write(bp, c, i) != i)
524 				goto err;
525 			c = s + 1;	/* skip following slash */
526 			if (*s != '\0') {
527 				if (BIO_write(bp, ", ", 2) != 2)
528 					goto err;
529 			}
530 			l--;
531 		}
532 		if (*s == '\0')
533 			break;
534 		s++;
535 		l--;
536 	}
537 
538 	ret = 1;
539 	if (0) {
540 err:
541 		X509err(X509_F_X509_NAME_PRINT, ERR_R_BUF_LIB);
542 	}
543 	free(b);
544 	return (ret);
545 }
546