summaryrefslogtreecommitdiffstats
path: root/crypto
diff options
context:
space:
mode:
authorDamian Hobson-Garcia <dhobsong@igel.co.jp>2023-06-30 17:44:29 -0400
committerMatt Caswell <matt@openssl.org>2024-04-24 14:05:35 +0100
commit6b167313f422b8744c1f4edc8688f7e6923a3a73 (patch)
treeb211c26e6c2e8a332ae97aea0e40cb82e158735d /crypto
parent9e1a8b5ecce7bcf706f48805f2999bbc3d4ef09a (diff)
Attribute certificate printing functions
Add functions to print an attribute certificate. Several attribute value types defined by the RFC 5755 specification are multi-field values (i.e ASN1_SEQUENCE rather than an ASN1_STRING or similar format). Currently those values are printed using `ASN1_item_print`. A more user-friendly output mechanism (maybe similar to the i2r_ functions used for X509 extensions) could be added in future. Reviewed-by: Tomas Mraz <tomas@openssl.org> Reviewed-by: Neil Horman <nhorman@openssl.org> (Merged from https://github.com/openssl/openssl/pull/15857)
Diffstat (limited to 'crypto')
-rw-r--r--crypto/x509/build.info2
-rw-r--r--crypto/x509/t_acert.c285
2 files changed, 286 insertions, 1 deletions
diff --git a/crypto/x509/build.info b/crypto/x509/build.info
index b580d2b4f8..873a9838b5 100644
--- a/crypto/x509/build.info
+++ b/crypto/x509/build.info
@@ -16,7 +16,7 @@ SOURCE[../../libcrypto]=\
pcy_cache.c pcy_node.c pcy_data.c pcy_map.c pcy_tree.c pcy_lib.c \
v3_asid.c v3_addr.c v3_tlsf.c v3_admis.c v3_no_rev_avail.c \
v3_soa_id.c v3_no_ass.c v3_group_ac.c v3_single_use.c v3_ind_iss.c \
- x509_acert.c x509aset.c
+ x509_acert.c x509aset.c t_acert.c
IF[{- !$disabled{'deprecated-3.0'} -}]
SOURCE[../../libcrypto]=x509type.c
diff --git a/crypto/x509/t_acert.c b/crypto/x509/t_acert.c
new file mode 100644
index 0000000000..0b5ab31311
--- /dev/null
+++ b/crypto/x509/t_acert.c
@@ -0,0 +1,285 @@
+/*
+ * Copyright 2021 The OpenSSL Project Authors. All Rights Reserved.
+ *
+ * Licensed under the Apache License 2.0 (the "License"). You may not use
+ * this file except in compliance with the License. You can obtain a copy
+ * in the file LICENSE in the source distribution or at
+ * https://www.openssl.org/source/license.html
+ */
+
+#include <stdio.h>
+#include "internal/cryptlib.h"
+#include <openssl/buffer.h>
+#include <openssl/bn.h>
+#include <openssl/objects.h>
+#include <openssl/x509_acert.h>
+
+static int print_attribute(BIO *bp, X509_ATTRIBUTE *a)
+{
+ ASN1_OBJECT *aobj;
+ int i, j, count;
+ int ret = 0;
+
+ aobj = X509_ATTRIBUTE_get0_object(a);
+ if (BIO_printf(bp, "%12s", "") <= 0)
+ goto err;
+
+ if ((j = i2a_ASN1_OBJECT(bp, aobj)) <= 0)
+ goto err;
+
+ count = X509_ATTRIBUTE_count(a);
+ if (count == 0) {
+ ERR_raise(ERR_LIB_X509, X509_R_INVALID_ATTRIBUTES);
+ goto err;
+ }
+
+ if (j < 25 && (BIO_printf(bp, "%*s", 25 - j, " ") <= 0))
+ goto err;
+
+ if (BIO_puts(bp, ":") <= 0)
+ goto err;
+
+ for (i = 0; i < count; i++) {
+ ASN1_TYPE *at;
+ int type;
+ ASN1_BIT_STRING *bs;
+
+ at = X509_ATTRIBUTE_get0_type(a, i);
+ type = at->type;
+
+ switch (type) {
+ case V_ASN1_PRINTABLESTRING:
+ case V_ASN1_T61STRING:
+ case V_ASN1_NUMERICSTRING:
+ case V_ASN1_UTF8STRING:
+ case V_ASN1_IA5STRING:
+ bs = at->value.asn1_string;
+ if (BIO_write(bp, (char *)bs->data, bs->length) != bs->length)
+ goto err;
+ if (BIO_puts(bp, "\n") <= 0)
+ goto err;
+ break;
+ case V_ASN1_SEQUENCE:
+ if (BIO_puts(bp, "\n") <= 0)
+ goto err;
+ ASN1_parse_dump(bp, at->value.sequence->data,
+ at->value.sequence->length, i, 1);
+ break;
+ default:
+ if (BIO_printf(bp, "unable to print attribute of type 0x%X\n",
+ type) < 0)
+ goto err;
+ break;
+ }
+ }
+ ret = 1;
+err:
+ return ret;
+}
+
+int X509_ACERT_print_ex(BIO *bp, X509_ACERT *x, unsigned long nmflags,
+ unsigned long cflag)
+{
+ int i;
+ char mlch = ' ';
+
+ if ((nmflags & XN_FLAG_SEP_MASK) == XN_FLAG_SEP_MULTILINE) {
+ mlch = '\n';
+ }
+
+ if ((cflag & X509_FLAG_NO_HEADER) == 0) {
+ if (BIO_printf(bp, "Attribute Certificate:\n") <= 0)
+ goto err;
+ if (BIO_printf(bp, "%4sData:\n", "") <= 0)
+ goto err;
+ }
+
+ if ((cflag & X509_FLAG_NO_VERSION) == 0) {
+ long l;
+
+ l = X509_ACERT_get_version(x);
+ if (l == X509_ACERT_VERSION_2) {
+ if (BIO_printf(bp, "%8sVersion: %ld (0x%lx)\n", "", l + 1,
+ (unsigned long)l) <= 0)
+ goto err;
+ } else {
+ if (BIO_printf(bp, "%8sVersion: Unknown (%ld)\n", "", l) <= 0)
+ goto err;
+ }
+ }
+
+ if ((cflag & X509_FLAG_NO_SERIAL) == 0) {
+ const ASN1_INTEGER *serial;
+
+ serial = X509_ACERT_get0_serialNumber(x);
+
+ if (BIO_printf(bp, "%8sSerial Number: ", "") <= 0)
+ goto err;
+
+ if (i2a_ASN1_INTEGER(bp, serial) <= 0)
+ goto err;
+
+ if (BIO_write(bp, "\n", 1) <= 0)
+ goto err;
+ }
+
+ if ((cflag & X509_FLAG_NO_SUBJECT) == 0) {
+ const GENERAL_NAMES *holderEntities;
+ const OSSL_ISSUER_SERIAL *holder_bcid;
+ const X509_NAME *holderIssuer = NULL;
+
+ if (BIO_printf(bp, "%8sHolder:\n", "") <= 0)
+ goto err;
+
+ holderEntities = X509_ACERT_get0_holder_entityName(x);
+ if (holderEntities != NULL) {
+ for (i = 0; i < sk_GENERAL_NAME_num(holderEntities); i++) {
+ GENERAL_NAME *entity;
+
+ entity = sk_GENERAL_NAME_value(holderEntities, i);
+
+ if (BIO_printf(bp, "%12sName:%c", "", mlch) <= 0)
+ goto err;
+ if (GENERAL_NAME_print(bp, entity) <= 0)
+ goto err;
+ if (BIO_write(bp, "\n", 1) <= 0)
+ goto err;
+ }
+ }
+
+ if ((holder_bcid = X509_ACERT_get0_holder_baseCertId(x)) != NULL)
+ holderIssuer = OSSL_ISSUER_SERIAL_get0_issuer(holder_bcid);
+
+ if (holderIssuer != NULL) {
+ const ASN1_INTEGER *holder_serial;
+ const ASN1_BIT_STRING *iuid;
+
+ if (BIO_printf(bp, "%12sIssuer:%c", "", mlch) <= 0)
+ goto err;
+
+ if (X509_NAME_print_ex(bp, holderIssuer, 0, nmflags) <= 0)
+ goto err;
+
+ if (BIO_write(bp, "\n", 1) <= 0)
+ goto err;
+
+ if (BIO_printf(bp, "%12sSerial: ", "") <= 0)
+ goto err;
+
+ holder_serial = OSSL_ISSUER_SERIAL_get0_serial(holder_bcid);
+
+ if (i2a_ASN1_INTEGER(bp, holder_serial) <= 0)
+ goto err;
+
+ iuid = OSSL_ISSUER_SERIAL_get0_issuerUID(holder_bcid);
+ if (iuid != NULL) {
+ if (BIO_printf(bp, "%12sIssuer UID: ", "") <= 0)
+ goto err;
+ if (X509_signature_dump(bp, iuid, 24) <= 0)
+ goto err;
+ }
+ if (BIO_write(bp, "\n", 1) <= 0)
+ goto err;
+ }
+ }
+
+ if ((cflag & X509_FLAG_NO_ISSUER) == 0) {
+ const X509_NAME *issuer;
+
+ if (BIO_printf(bp, "%8sIssuer:%c", "", mlch) <= 0)
+ goto err;
+ issuer = X509_ACERT_get0_issuerName(x);
+ if (issuer) {
+ if (X509_NAME_print_ex(bp, issuer, 0, nmflags) < 0)
+ goto err;
+ } else {
+ if (BIO_printf(bp, "Unsupported Issuer Type") <= 0)
+ goto err;
+ }
+ if (BIO_write(bp, "\n", 1) <= 0)
+ goto err;
+ }
+
+ if ((cflag & X509_FLAG_NO_VALIDITY) == 0) {
+ if (BIO_printf(bp, "%8sValidity\n", "") <= 0)
+ goto err;
+ if (BIO_printf(bp, "%12sNot Before: ", "") <= 0)
+ goto err;
+ if (ASN1_GENERALIZEDTIME_print(bp, X509_ACERT_get0_notBefore(x)) == 0)
+ goto err;
+ if (BIO_printf(bp, "\n%12sNot After : ", "") <= 0)
+ goto err;
+ if (ASN1_GENERALIZEDTIME_print(bp, X509_ACERT_get0_notAfter(x)) == 0)
+ goto err;
+ if (BIO_write(bp, "\n", 1) <= 0)
+ goto err;
+ }
+
+ if ((cflag & X509_FLAG_NO_ATTRIBUTES) == 0) {
+ if (BIO_printf(bp, "%8sAttributes:\n", "") <= 0)
+ goto err;
+
+ if (X509_ACERT_get_attr_count(x) == 0) {
+ if (BIO_printf(bp, "%12s(none)\n", "") <= 0)
+ goto err;
+ } else {
+ for (i = 0; i < X509_ACERT_get_attr_count(x); i++) {
+ if (print_attribute(bp, X509_ACERT_get_attr(x, i)) == 0)
+ goto err;
+ }
+ }
+ }
+
+ if ((cflag & X509_FLAG_NO_EXTENSIONS) == 0) {
+ const STACK_OF(X509_EXTENSION) *exts;
+
+ exts = X509_ACERT_get0_extensions(x);
+ if (exts != NULL) {
+ if (BIO_printf(bp, "%8sExtensions:\n", "") <= 0)
+ goto err;
+ for (i = 0; i < sk_X509_EXTENSION_num(exts); i++) {
+ ASN1_OBJECT *obj;
+ X509_EXTENSION *ex;
+ int critical;
+
+ ex = sk_X509_EXTENSION_value(exts, i);
+ if (BIO_printf(bp, "%12s", "") <= 0)
+ goto err;
+ obj = X509_EXTENSION_get_object(ex);
+ if (i2a_ASN1_OBJECT(bp, obj) <= 0)
+ goto err;
+ critical = X509_EXTENSION_get_critical(ex);
+ if (BIO_printf(bp, ": %s\n", critical ? "critical" : "") <= 0)
+ goto err;
+ if (X509V3_EXT_print(bp, ex, cflag, 20) <= 0) {
+ if (BIO_printf(bp, "%16s", "") <= 0)
+ goto err;
+ if (ASN1_STRING_print(bp, X509_EXTENSION_get_data(ex)) <= 0)
+ goto err;
+ }
+ if (BIO_write(bp, "\n", 1) <= 0)
+ goto err;
+ }
+ }
+ }
+
+ if ((cflag & X509_FLAG_NO_SIGDUMP) == 0) {
+ const X509_ALGOR *sig_alg;
+ const ASN1_BIT_STRING *sig;
+
+ X509_ACERT_get0_signature(x, &sig, &sig_alg);
+ if (X509_signature_print(bp, sig_alg, sig) <= 0)
+ return 0;
+ }
+
+ return 1;
+
+err:
+ ERR_raise(ERR_LIB_X509, ERR_R_BUF_LIB);
+ return 0;
+}
+
+int X509_ACERT_print(BIO *bp, X509_ACERT *x)
+{
+ return X509_ACERT_print_ex(bp, x, XN_FLAG_COMPAT, X509_FLAG_COMPAT);
+}