diff options
author | Damian Hobson-Garcia <dhobsong@igel.co.jp> | 2023-06-30 17:44:29 -0400 |
---|---|---|
committer | Matt Caswell <matt@openssl.org> | 2024-04-24 14:05:35 +0100 |
commit | 6b167313f422b8744c1f4edc8688f7e6923a3a73 (patch) | |
tree | b211c26e6c2e8a332ae97aea0e40cb82e158735d /crypto | |
parent | 9e1a8b5ecce7bcf706f48805f2999bbc3d4ef09a (diff) |
Attribute certificate printing functions
Add functions to print an attribute certificate. Several
attribute value types defined by the RFC 5755 specification
are multi-field values (i.e ASN1_SEQUENCE rather than an ASN1_STRING
or similar format). Currently those values are printed using
`ASN1_item_print`. A more user-friendly output mechanism (maybe
similar to the i2r_ functions used for X509 extensions) could be
added in future.
Reviewed-by: Tomas Mraz <tomas@openssl.org>
Reviewed-by: Neil Horman <nhorman@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/15857)
Diffstat (limited to 'crypto')
-rw-r--r-- | crypto/x509/build.info | 2 | ||||
-rw-r--r-- | crypto/x509/t_acert.c | 285 |
2 files changed, 286 insertions, 1 deletions
diff --git a/crypto/x509/build.info b/crypto/x509/build.info index b580d2b4f8..873a9838b5 100644 --- a/crypto/x509/build.info +++ b/crypto/x509/build.info @@ -16,7 +16,7 @@ SOURCE[../../libcrypto]=\ pcy_cache.c pcy_node.c pcy_data.c pcy_map.c pcy_tree.c pcy_lib.c \ v3_asid.c v3_addr.c v3_tlsf.c v3_admis.c v3_no_rev_avail.c \ v3_soa_id.c v3_no_ass.c v3_group_ac.c v3_single_use.c v3_ind_iss.c \ - x509_acert.c x509aset.c + x509_acert.c x509aset.c t_acert.c IF[{- !$disabled{'deprecated-3.0'} -}] SOURCE[../../libcrypto]=x509type.c diff --git a/crypto/x509/t_acert.c b/crypto/x509/t_acert.c new file mode 100644 index 0000000000..0b5ab31311 --- /dev/null +++ b/crypto/x509/t_acert.c @@ -0,0 +1,285 @@ +/* + * Copyright 2021 The OpenSSL Project Authors. All Rights Reserved. + * + * Licensed under the Apache License 2.0 (the "License"). You may not use + * this file except in compliance with the License. You can obtain a copy + * in the file LICENSE in the source distribution or at + * https://www.openssl.org/source/license.html + */ + +#include <stdio.h> +#include "internal/cryptlib.h" +#include <openssl/buffer.h> +#include <openssl/bn.h> +#include <openssl/objects.h> +#include <openssl/x509_acert.h> + +static int print_attribute(BIO *bp, X509_ATTRIBUTE *a) +{ + ASN1_OBJECT *aobj; + int i, j, count; + int ret = 0; + + aobj = X509_ATTRIBUTE_get0_object(a); + if (BIO_printf(bp, "%12s", "") <= 0) + goto err; + + if ((j = i2a_ASN1_OBJECT(bp, aobj)) <= 0) + goto err; + + count = X509_ATTRIBUTE_count(a); + if (count == 0) { + ERR_raise(ERR_LIB_X509, X509_R_INVALID_ATTRIBUTES); + goto err; + } + + if (j < 25 && (BIO_printf(bp, "%*s", 25 - j, " ") <= 0)) + goto err; + + if (BIO_puts(bp, ":") <= 0) + goto err; + + for (i = 0; i < count; i++) { + ASN1_TYPE *at; + int type; + ASN1_BIT_STRING *bs; + + at = X509_ATTRIBUTE_get0_type(a, i); + type = at->type; + + switch (type) { + case V_ASN1_PRINTABLESTRING: + case V_ASN1_T61STRING: + case V_ASN1_NUMERICSTRING: + case V_ASN1_UTF8STRING: + case V_ASN1_IA5STRING: + bs = at->value.asn1_string; + if (BIO_write(bp, (char *)bs->data, bs->length) != bs->length) + goto err; + if (BIO_puts(bp, "\n") <= 0) + goto err; + break; + case V_ASN1_SEQUENCE: + if (BIO_puts(bp, "\n") <= 0) + goto err; + ASN1_parse_dump(bp, at->value.sequence->data, + at->value.sequence->length, i, 1); + break; + default: + if (BIO_printf(bp, "unable to print attribute of type 0x%X\n", + type) < 0) + goto err; + break; + } + } + ret = 1; +err: + return ret; +} + +int X509_ACERT_print_ex(BIO *bp, X509_ACERT *x, unsigned long nmflags, + unsigned long cflag) +{ + int i; + char mlch = ' '; + + if ((nmflags & XN_FLAG_SEP_MASK) == XN_FLAG_SEP_MULTILINE) { + mlch = '\n'; + } + + if ((cflag & X509_FLAG_NO_HEADER) == 0) { + if (BIO_printf(bp, "Attribute Certificate:\n") <= 0) + goto err; + if (BIO_printf(bp, "%4sData:\n", "") <= 0) + goto err; + } + + if ((cflag & X509_FLAG_NO_VERSION) == 0) { + long l; + + l = X509_ACERT_get_version(x); + if (l == X509_ACERT_VERSION_2) { + if (BIO_printf(bp, "%8sVersion: %ld (0x%lx)\n", "", l + 1, + (unsigned long)l) <= 0) + goto err; + } else { + if (BIO_printf(bp, "%8sVersion: Unknown (%ld)\n", "", l) <= 0) + goto err; + } + } + + if ((cflag & X509_FLAG_NO_SERIAL) == 0) { + const ASN1_INTEGER *serial; + + serial = X509_ACERT_get0_serialNumber(x); + + if (BIO_printf(bp, "%8sSerial Number: ", "") <= 0) + goto err; + + if (i2a_ASN1_INTEGER(bp, serial) <= 0) + goto err; + + if (BIO_write(bp, "\n", 1) <= 0) + goto err; + } + + if ((cflag & X509_FLAG_NO_SUBJECT) == 0) { + const GENERAL_NAMES *holderEntities; + const OSSL_ISSUER_SERIAL *holder_bcid; + const X509_NAME *holderIssuer = NULL; + + if (BIO_printf(bp, "%8sHolder:\n", "") <= 0) + goto err; + + holderEntities = X509_ACERT_get0_holder_entityName(x); + if (holderEntities != NULL) { + for (i = 0; i < sk_GENERAL_NAME_num(holderEntities); i++) { + GENERAL_NAME *entity; + + entity = sk_GENERAL_NAME_value(holderEntities, i); + + if (BIO_printf(bp, "%12sName:%c", "", mlch) <= 0) + goto err; + if (GENERAL_NAME_print(bp, entity) <= 0) + goto err; + if (BIO_write(bp, "\n", 1) <= 0) + goto err; + } + } + + if ((holder_bcid = X509_ACERT_get0_holder_baseCertId(x)) != NULL) + holderIssuer = OSSL_ISSUER_SERIAL_get0_issuer(holder_bcid); + + if (holderIssuer != NULL) { + const ASN1_INTEGER *holder_serial; + const ASN1_BIT_STRING *iuid; + + if (BIO_printf(bp, "%12sIssuer:%c", "", mlch) <= 0) + goto err; + + if (X509_NAME_print_ex(bp, holderIssuer, 0, nmflags) <= 0) + goto err; + + if (BIO_write(bp, "\n", 1) <= 0) + goto err; + + if (BIO_printf(bp, "%12sSerial: ", "") <= 0) + goto err; + + holder_serial = OSSL_ISSUER_SERIAL_get0_serial(holder_bcid); + + if (i2a_ASN1_INTEGER(bp, holder_serial) <= 0) + goto err; + + iuid = OSSL_ISSUER_SERIAL_get0_issuerUID(holder_bcid); + if (iuid != NULL) { + if (BIO_printf(bp, "%12sIssuer UID: ", "") <= 0) + goto err; + if (X509_signature_dump(bp, iuid, 24) <= 0) + goto err; + } + if (BIO_write(bp, "\n", 1) <= 0) + goto err; + } + } + + if ((cflag & X509_FLAG_NO_ISSUER) == 0) { + const X509_NAME *issuer; + + if (BIO_printf(bp, "%8sIssuer:%c", "", mlch) <= 0) + goto err; + issuer = X509_ACERT_get0_issuerName(x); + if (issuer) { + if (X509_NAME_print_ex(bp, issuer, 0, nmflags) < 0) + goto err; + } else { + if (BIO_printf(bp, "Unsupported Issuer Type") <= 0) + goto err; + } + if (BIO_write(bp, "\n", 1) <= 0) + goto err; + } + + if ((cflag & X509_FLAG_NO_VALIDITY) == 0) { + if (BIO_printf(bp, "%8sValidity\n", "") <= 0) + goto err; + if (BIO_printf(bp, "%12sNot Before: ", "") <= 0) + goto err; + if (ASN1_GENERALIZEDTIME_print(bp, X509_ACERT_get0_notBefore(x)) == 0) + goto err; + if (BIO_printf(bp, "\n%12sNot After : ", "") <= 0) + goto err; + if (ASN1_GENERALIZEDTIME_print(bp, X509_ACERT_get0_notAfter(x)) == 0) + goto err; + if (BIO_write(bp, "\n", 1) <= 0) + goto err; + } + + if ((cflag & X509_FLAG_NO_ATTRIBUTES) == 0) { + if (BIO_printf(bp, "%8sAttributes:\n", "") <= 0) + goto err; + + if (X509_ACERT_get_attr_count(x) == 0) { + if (BIO_printf(bp, "%12s(none)\n", "") <= 0) + goto err; + } else { + for (i = 0; i < X509_ACERT_get_attr_count(x); i++) { + if (print_attribute(bp, X509_ACERT_get_attr(x, i)) == 0) + goto err; + } + } + } + + if ((cflag & X509_FLAG_NO_EXTENSIONS) == 0) { + const STACK_OF(X509_EXTENSION) *exts; + + exts = X509_ACERT_get0_extensions(x); + if (exts != NULL) { + if (BIO_printf(bp, "%8sExtensions:\n", "") <= 0) + goto err; + for (i = 0; i < sk_X509_EXTENSION_num(exts); i++) { + ASN1_OBJECT *obj; + X509_EXTENSION *ex; + int critical; + + ex = sk_X509_EXTENSION_value(exts, i); + if (BIO_printf(bp, "%12s", "") <= 0) + goto err; + obj = X509_EXTENSION_get_object(ex); + if (i2a_ASN1_OBJECT(bp, obj) <= 0) + goto err; + critical = X509_EXTENSION_get_critical(ex); + if (BIO_printf(bp, ": %s\n", critical ? "critical" : "") <= 0) + goto err; + if (X509V3_EXT_print(bp, ex, cflag, 20) <= 0) { + if (BIO_printf(bp, "%16s", "") <= 0) + goto err; + if (ASN1_STRING_print(bp, X509_EXTENSION_get_data(ex)) <= 0) + goto err; + } + if (BIO_write(bp, "\n", 1) <= 0) + goto err; + } + } + } + + if ((cflag & X509_FLAG_NO_SIGDUMP) == 0) { + const X509_ALGOR *sig_alg; + const ASN1_BIT_STRING *sig; + + X509_ACERT_get0_signature(x, &sig, &sig_alg); + if (X509_signature_print(bp, sig_alg, sig) <= 0) + return 0; + } + + return 1; + +err: + ERR_raise(ERR_LIB_X509, ERR_R_BUF_LIB); + return 0; +} + +int X509_ACERT_print(BIO *bp, X509_ACERT *x) +{ + return X509_ACERT_print_ex(bp, x, XN_FLAG_COMPAT, X509_FLAG_COMPAT); +} |