/src/openssl/crypto/x509/t_x509.c
Line  | Count  | Source  | 
1  |  | /*  | 
2  |  |  * Copyright 1995-2025 The OpenSSL Project Authors. All Rights Reserved.  | 
3  |  |  *  | 
4  |  |  * Licensed under the Apache License 2.0 (the "License").  You may not use  | 
5  |  |  * this file except in compliance with the License.  You can obtain a copy  | 
6  |  |  * in the file LICENSE in the source distribution or at  | 
7  |  |  * https://www.openssl.org/source/license.html  | 
8  |  |  */  | 
9  |  |  | 
10  |  | /*  | 
11  |  |  * because of EVP_PKEY_asn1_find deprecation  | 
12  |  |  */  | 
13  |  | #define OPENSSL_SUPPRESS_DEPRECATED  | 
14  |  |  | 
15  |  | #include <stdio.h>  | 
16  |  | #include "internal/cryptlib.h"  | 
17  |  | #include <openssl/buffer.h>  | 
18  |  | #include <openssl/bn.h>  | 
19  |  | #include <openssl/objects.h>  | 
20  |  | #include <openssl/x509.h>  | 
21  |  | #include <openssl/x509v3.h>  | 
22  |  | #include "crypto/asn1.h"  | 
23  |  | #include "crypto/x509.h"  | 
24  |  |  | 
25  |  | void OSSL_STACK_OF_X509_free(STACK_OF(X509) *certs)  | 
26  | 0  | { | 
27  | 0  |     sk_X509_pop_free(certs, X509_free);  | 
28  | 0  | }  | 
29  |  |  | 
30  |  | #ifndef OPENSSL_NO_STDIO  | 
31  |  | int X509_print_fp(FILE *fp, X509 *x)  | 
32  | 0  | { | 
33  | 0  |     return X509_print_ex_fp(fp, x, XN_FLAG_COMPAT, X509_FLAG_COMPAT);  | 
34  | 0  | }  | 
35  |  |  | 
36  |  | int X509_print_ex_fp(FILE *fp, X509 *x, unsigned long nmflag, unsigned long cflag)  | 
37  | 0  | { | 
38  | 0  |     BIO *b;  | 
39  | 0  |     int ret;  | 
40  |  | 
  | 
41  | 0  |     if ((b = BIO_new(BIO_s_file())) == NULL) { | 
42  | 0  |         ERR_raise(ERR_LIB_X509, ERR_R_BUF_LIB);  | 
43  | 0  |         return 0;  | 
44  | 0  |     }  | 
45  | 0  |     BIO_set_fp(b, fp, BIO_NOCLOSE);  | 
46  | 0  |     ret = X509_print_ex(b, x, nmflag, cflag);  | 
47  | 0  |     BIO_free(b);  | 
48  | 0  |     return ret;  | 
49  | 0  | }  | 
50  |  | #endif  | 
51  |  |  | 
52  |  | int X509_print(BIO *bp, const X509 *x)  | 
53  | 0  | { | 
54  | 0  |     return X509_print_ex(bp, x, XN_FLAG_COMPAT, X509_FLAG_COMPAT);  | 
55  | 0  | }  | 
56  |  |  | 
57  |  | int X509_print_ex(BIO *bp, const X509 *x, unsigned long nmflags, unsigned long cflag)  | 
58  | 0  | { | 
59  | 0  |     long l;  | 
60  | 0  |     int ret = 0;  | 
61  | 0  |     char mlch = ' ';  | 
62  | 0  |     int nmindent = 0, printok = 0;  | 
63  | 0  |     EVP_PKEY *pkey = NULL;  | 
64  |  | 
  | 
65  | 0  |     if ((nmflags & XN_FLAG_SEP_MASK) == XN_FLAG_SEP_MULTILINE) { | 
66  | 0  |         mlch = '\n';  | 
67  | 0  |         nmindent = 12;  | 
68  | 0  |     }  | 
69  |  | 
  | 
70  | 0  |     if (nmflags == XN_FLAG_COMPAT)  | 
71  | 0  |         printok = 1;  | 
72  |  | 
  | 
73  | 0  |     if (!(cflag & X509_FLAG_NO_HEADER)) { | 
74  | 0  |         if (BIO_write(bp, "Certificate:\n", 13) <= 0)  | 
75  | 0  |             goto err;  | 
76  | 0  |         if (BIO_write(bp, "    Data:\n", 10) <= 0)  | 
77  | 0  |             goto err;  | 
78  | 0  |     }  | 
79  | 0  |     if (!(cflag & X509_FLAG_NO_VERSION)) { | 
80  | 0  |         l = X509_get_version(x);  | 
81  | 0  |         if (l >= X509_VERSION_1 && l <= X509_VERSION_3) { | 
82  | 0  |             if (BIO_printf(bp, "%8sVersion: %ld (0x%lx)\n", "", l + 1, (unsigned long)l) <= 0)  | 
83  | 0  |                 goto err;  | 
84  | 0  |         } else { | 
85  | 0  |             if (BIO_printf(bp, "%8sVersion: Unknown (%ld)\n", "", l) <= 0)  | 
86  | 0  |                 goto err;  | 
87  | 0  |         }  | 
88  | 0  |     }  | 
89  | 0  |     if (!(cflag & X509_FLAG_NO_SERIAL)) { | 
90  | 0  |         const ASN1_INTEGER *bs = X509_get0_serialNumber(x);  | 
91  |  | 
  | 
92  | 0  |         if (BIO_write(bp, "        Serial Number:", 22) <= 0)  | 
93  | 0  |             goto err;  | 
94  | 0  |         if (ossl_serial_number_print(bp, bs, 12) != 0)  | 
95  | 0  |             goto err;  | 
96  | 0  |         if (BIO_puts(bp, "\n") <= 0)  | 
97  | 0  |             goto err;  | 
98  | 0  |     }  | 
99  |  |  | 
100  | 0  |     if (!(cflag & X509_FLAG_NO_SIGNAME)) { | 
101  | 0  |         const X509_ALGOR *tsig_alg = X509_get0_tbs_sigalg(x);  | 
102  |  | 
  | 
103  | 0  |         if (BIO_puts(bp, "    ") <= 0)  | 
104  | 0  |             goto err;  | 
105  | 0  |         if (X509_signature_print(bp, tsig_alg, NULL) <= 0)  | 
106  | 0  |             goto err;  | 
107  | 0  |     }  | 
108  |  |  | 
109  | 0  |     if (!(cflag & X509_FLAG_NO_ISSUER)) { | 
110  | 0  |         if (BIO_printf(bp, "        Issuer:%c", mlch) <= 0)  | 
111  | 0  |             goto err;  | 
112  | 0  |         if (X509_NAME_print_ex(bp, X509_get_issuer_name(x), nmindent, nmflags)  | 
113  | 0  |             < printok)  | 
114  | 0  |             goto err;  | 
115  | 0  |         if (BIO_write(bp, "\n", 1) <= 0)  | 
116  | 0  |             goto err;  | 
117  | 0  |     }  | 
118  | 0  |     if (!(cflag & X509_FLAG_NO_VALIDITY)) { | 
119  | 0  |         if (BIO_write(bp, "        Validity\n", 17) <= 0)  | 
120  | 0  |             goto err;  | 
121  | 0  |         if (BIO_write(bp, "            Not Before: ", 24) <= 0)  | 
122  | 0  |             goto err;  | 
123  | 0  |         if (ossl_asn1_time_print_ex(bp, X509_get0_notBefore(x), ASN1_DTFLGS_RFC822) == 0)  | 
124  | 0  |             goto err;  | 
125  | 0  |         if (BIO_write(bp, "\n            Not After : ", 25) <= 0)  | 
126  | 0  |             goto err;  | 
127  | 0  |         if (ossl_asn1_time_print_ex(bp, X509_get0_notAfter(x), ASN1_DTFLGS_RFC822) == 0)  | 
128  | 0  |             goto err;  | 
129  | 0  |         if (BIO_write(bp, "\n", 1) <= 0)  | 
130  | 0  |             goto err;  | 
131  | 0  |     }  | 
132  | 0  |     if (!(cflag & X509_FLAG_NO_SUBJECT)) { | 
133  | 0  |         if (BIO_printf(bp, "        Subject:%c", mlch) <= 0)  | 
134  | 0  |             goto err;  | 
135  | 0  |         if (X509_NAME_print_ex  | 
136  | 0  |             (bp, X509_get_subject_name(x), nmindent, nmflags) < printok)  | 
137  | 0  |             goto err;  | 
138  | 0  |         if (BIO_write(bp, "\n", 1) <= 0)  | 
139  | 0  |             goto err;  | 
140  | 0  |     }  | 
141  | 0  |     if (!(cflag & X509_FLAG_NO_PUBKEY)) { | 
142  | 0  |         X509_PUBKEY *xpkey = X509_get_X509_PUBKEY(x);  | 
143  | 0  |         ASN1_OBJECT *xpoid;  | 
144  | 0  |         X509_PUBKEY_get0_param(&xpoid, NULL, NULL, NULL, xpkey);  | 
145  | 0  |         if (BIO_write(bp, "        Subject Public Key Info:\n", 33) <= 0)  | 
146  | 0  |             goto err;  | 
147  | 0  |         if (BIO_printf(bp, "%12sPublic Key Algorithm: ", "") <= 0)  | 
148  | 0  |             goto err;  | 
149  | 0  |         if (i2a_ASN1_OBJECT(bp, xpoid) <= 0)  | 
150  | 0  |             goto err;  | 
151  | 0  |         if (BIO_puts(bp, "\n") <= 0)  | 
152  | 0  |             goto err;  | 
153  |  |  | 
154  | 0  |         pkey = X509_get0_pubkey(x);  | 
155  | 0  |         if (pkey == NULL) { | 
156  | 0  |             BIO_printf(bp, "%12sUnable to load Public Key\n", "");  | 
157  | 0  |             ERR_print_errors(bp);  | 
158  | 0  |         } else { | 
159  | 0  |             EVP_PKEY_print_public(bp, pkey, 16, NULL);  | 
160  | 0  |         }  | 
161  | 0  |     }  | 
162  |  |  | 
163  | 0  |     if (!(cflag & X509_FLAG_NO_IDS)) { | 
164  | 0  |         const ASN1_BIT_STRING *iuid, *suid;  | 
165  | 0  |         X509_get0_uids(x, &iuid, &suid);  | 
166  | 0  |         if (iuid != NULL) { | 
167  | 0  |             if (BIO_printf(bp, "%8sIssuer Unique ID: ", "") <= 0)  | 
168  | 0  |                 goto err;  | 
169  | 0  |             if (!X509_signature_dump(bp, iuid, 12))  | 
170  | 0  |                 goto err;  | 
171  | 0  |         }  | 
172  | 0  |         if (suid != NULL) { | 
173  | 0  |             if (BIO_printf(bp, "%8sSubject Unique ID: ", "") <= 0)  | 
174  | 0  |                 goto err;  | 
175  | 0  |             if (!X509_signature_dump(bp, suid, 12))  | 
176  | 0  |                 goto err;  | 
177  | 0  |         }  | 
178  | 0  |     }  | 
179  |  |  | 
180  | 0  |     if (!(cflag & X509_FLAG_NO_EXTENSIONS)  | 
181  | 0  |         && !X509V3_extensions_print(bp, "X509v3 extensions",  | 
182  | 0  |                                     X509_get0_extensions(x), cflag, 8))  | 
183  | 0  |         goto err;  | 
184  |  |  | 
185  | 0  |     if (!(cflag & X509_FLAG_NO_SIGDUMP)) { | 
186  | 0  |         const X509_ALGOR *sig_alg;  | 
187  | 0  |         const ASN1_BIT_STRING *sig;  | 
188  | 0  |         X509_get0_signature(&sig, &sig_alg, x);  | 
189  | 0  |         if (X509_signature_print(bp, sig_alg, sig) <= 0)  | 
190  | 0  |             goto err;  | 
191  | 0  |     }  | 
192  | 0  |     if (!(cflag & X509_FLAG_NO_AUX)) { | 
193  | 0  |         if (!X509_aux_print(bp, x, 0))  | 
194  | 0  |             goto err;  | 
195  | 0  |     }  | 
196  | 0  |     ret = 1;  | 
197  | 0  |  err:  | 
198  | 0  |     return ret;  | 
199  | 0  | }  | 
200  |  |  | 
201  |  | int X509_ocspid_print(BIO *bp, const X509 *x)  | 
202  | 0  | { | 
203  | 0  |     unsigned char *der = NULL;  | 
204  | 0  |     unsigned char *dertmp;  | 
205  | 0  |     int derlen;  | 
206  | 0  |     int i;  | 
207  | 0  |     unsigned char SHA1md[SHA_DIGEST_LENGTH];  | 
208  | 0  |     ASN1_BIT_STRING *keybstr;  | 
209  | 0  |     const X509_NAME *subj;  | 
210  | 0  |     EVP_MD *md = NULL;  | 
211  |  | 
  | 
212  | 0  |     if (x == NULL || bp == NULL)  | 
213  | 0  |         return 0;  | 
214  |  |     /*  | 
215  |  |      * display the hash of the subject as it would appear in OCSP requests  | 
216  |  |      */  | 
217  | 0  |     if (BIO_printf(bp, "        Subject OCSP hash: ") <= 0)  | 
218  | 0  |         goto err;  | 
219  | 0  |     subj = X509_get_subject_name(x);  | 
220  | 0  |     derlen = i2d_X509_NAME(subj, NULL);  | 
221  | 0  |     if (derlen <= 0)  | 
222  | 0  |         goto err;  | 
223  | 0  |     if ((der = dertmp = OPENSSL_malloc(derlen)) == NULL)  | 
224  | 0  |         goto err;  | 
225  | 0  |     if (i2d_X509_NAME(subj, &dertmp) < 0)  | 
226  | 0  |         goto err;  | 
227  |  |  | 
228  | 0  |     md = EVP_MD_fetch(x->libctx, SN_sha1, x->propq);  | 
229  | 0  |     if (md == NULL)  | 
230  | 0  |         goto err;  | 
231  | 0  |     if (!EVP_Digest(der, derlen, SHA1md, NULL, md, NULL))  | 
232  | 0  |         goto err;  | 
233  | 0  |     for (i = 0; i < SHA_DIGEST_LENGTH; i++) { | 
234  | 0  |         if (BIO_printf(bp, "%02X", SHA1md[i]) <= 0)  | 
235  | 0  |             goto err;  | 
236  | 0  |     }  | 
237  | 0  |     OPENSSL_free(der);  | 
238  | 0  |     der = NULL;  | 
239  |  |  | 
240  |  |     /*  | 
241  |  |      * display the hash of the public key as it would appear in OCSP requests  | 
242  |  |      */  | 
243  | 0  |     if (BIO_printf(bp, "\n        Public key OCSP hash: ") <= 0)  | 
244  | 0  |         goto err;  | 
245  |  |  | 
246  | 0  |     keybstr = X509_get0_pubkey_bitstr(x);  | 
247  |  | 
  | 
248  | 0  |     if (keybstr == NULL)  | 
249  | 0  |         goto err;  | 
250  |  |  | 
251  | 0  |     if (!EVP_Digest(ASN1_STRING_get0_data(keybstr),  | 
252  | 0  |                     ASN1_STRING_length(keybstr), SHA1md, NULL, md, NULL))  | 
253  | 0  |         goto err;  | 
254  | 0  |     for (i = 0; i < SHA_DIGEST_LENGTH; i++) { | 
255  | 0  |         if (BIO_printf(bp, "%02X", SHA1md[i]) <= 0)  | 
256  | 0  |             goto err;  | 
257  | 0  |     }  | 
258  | 0  |     BIO_printf(bp, "\n");  | 
259  | 0  |     EVP_MD_free(md);  | 
260  |  | 
  | 
261  | 0  |     return 1;  | 
262  | 0  |  err:  | 
263  | 0  |     OPENSSL_free(der);  | 
264  | 0  |     EVP_MD_free(md);  | 
265  | 0  |     return 0;  | 
266  | 0  | }  | 
267  |  |  | 
268  |  | int X509_signature_dump(BIO *bp, const ASN1_STRING *sig, int indent)  | 
269  | 0  | { | 
270  | 0  |     const unsigned char *s;  | 
271  | 0  |     int i, n;  | 
272  |  | 
  | 
273  | 0  |     n = sig->length;  | 
274  | 0  |     s = sig->data;  | 
275  | 0  |     for (i = 0; i < n; i++) { | 
276  | 0  |         if ((i % 18) == 0) { | 
277  | 0  |             if (i > 0 && BIO_write(bp, "\n", 1) <= 0)  | 
278  | 0  |                 return 0;  | 
279  | 0  |             if (BIO_indent(bp, indent, indent) <= 0)  | 
280  | 0  |                 return 0;  | 
281  | 0  |         }  | 
282  | 0  |         if (BIO_printf(bp, "%02x%s", s[i], ((i + 1) == n) ? "" : ":") <= 0)  | 
283  | 0  |             return 0;  | 
284  | 0  |     }  | 
285  | 0  |     if (BIO_write(bp, "\n", 1) != 1)  | 
286  | 0  |         return 0;  | 
287  |  |  | 
288  | 0  |     return 1;  | 
289  | 0  | }  | 
290  |  |  | 
291  |  | int X509_signature_print(BIO *bp, const X509_ALGOR *sigalg,  | 
292  |  |                          const ASN1_STRING *sig)  | 
293  | 0  | { | 
294  | 0  | #ifndef OPENSSL_NO_DEPRECATED_3_6  | 
295  | 0  |     int sig_nid;  | 
296  | 0  | #endif  | 
297  | 0  |     int indent = 4;  | 
298  | 0  |     if (BIO_printf(bp, "%*sSignature Algorithm: ", indent, "") <= 0)  | 
299  | 0  |         return 0;  | 
300  | 0  |     if (i2a_ASN1_OBJECT(bp, sigalg->algorithm) <= 0)  | 
301  | 0  |         return 0;  | 
302  |  |  | 
303  | 0  |     if (sig && BIO_printf(bp, "\n%*sSignature Value:", indent, "") <= 0)  | 
304  | 0  |         return 0;  | 
305  | 0  | #ifndef OPENSSL_NO_DEPRECATED_3_6  | 
306  | 0  |     sig_nid = OBJ_obj2nid(sigalg->algorithm);  | 
307  | 0  |     if (sig_nid != NID_undef) { | 
308  | 0  |         int pkey_nid, dig_nid;  | 
309  | 0  |         const EVP_PKEY_ASN1_METHOD *ameth;  | 
310  | 0  |         if (OBJ_find_sigid_algs(sig_nid, &dig_nid, &pkey_nid)) { | 
311  | 0  |             ameth = EVP_PKEY_asn1_find(NULL, pkey_nid);  | 
312  | 0  |             if (ameth && ameth->sig_print)  | 
313  | 0  |                 return ameth->sig_print(bp, sigalg, sig, indent + 4, 0);  | 
314  | 0  |         }  | 
315  | 0  |     }  | 
316  | 0  | #endif  | 
317  | 0  |     if (BIO_write(bp, "\n", 1) != 1)  | 
318  | 0  |         return 0;  | 
319  | 0  |     if (sig)  | 
320  | 0  |         return X509_signature_dump(bp, sig, indent + 4);  | 
321  | 0  |     return 1;  | 
322  | 0  | }  | 
323  |  |  | 
324  |  | int X509_aux_print(BIO *out, const X509 *x, int indent)  | 
325  | 0  | { | 
326  | 0  |     char oidstr[80], first;  | 
327  | 0  |     STACK_OF(ASN1_OBJECT) *trust, *reject;  | 
328  | 0  |     const unsigned char *alias, *keyid;  | 
329  | 0  |     int keyidlen;  | 
330  | 0  |     int i;  | 
331  | 0  |     if (X509_trusted(x) == 0)  | 
332  | 0  |         return 1;  | 
333  | 0  |     trust = X509_get0_trust_objects(x);  | 
334  | 0  |     reject = X509_get0_reject_objects(x);  | 
335  | 0  |     if (trust) { | 
336  | 0  |         first = 1;  | 
337  | 0  |         BIO_printf(out, "%*sTrusted Uses:\n%*s", indent, "", indent + 2, "");  | 
338  | 0  |         for (i = 0; i < sk_ASN1_OBJECT_num(trust); i++) { | 
339  | 0  |             if (!first)  | 
340  | 0  |                 BIO_puts(out, ", ");  | 
341  | 0  |             else  | 
342  | 0  |                 first = 0;  | 
343  | 0  |             OBJ_obj2txt(oidstr, sizeof(oidstr),  | 
344  | 0  |                         sk_ASN1_OBJECT_value(trust, i), 0);  | 
345  | 0  |             BIO_puts(out, oidstr);  | 
346  | 0  |         }  | 
347  | 0  |         BIO_puts(out, "\n");  | 
348  | 0  |     } else  | 
349  | 0  |         BIO_printf(out, "%*sNo Trusted Uses.\n", indent, "");  | 
350  | 0  |     if (reject) { | 
351  | 0  |         first = 1;  | 
352  | 0  |         BIO_printf(out, "%*sRejected Uses:\n%*s", indent, "", indent + 2, "");  | 
353  | 0  |         for (i = 0; i < sk_ASN1_OBJECT_num(reject); i++) { | 
354  | 0  |             if (!first)  | 
355  | 0  |                 BIO_puts(out, ", ");  | 
356  | 0  |             else  | 
357  | 0  |                 first = 0;  | 
358  | 0  |             OBJ_obj2txt(oidstr, sizeof(oidstr),  | 
359  | 0  |                         sk_ASN1_OBJECT_value(reject, i), 0);  | 
360  | 0  |             BIO_puts(out, oidstr);  | 
361  | 0  |         }  | 
362  | 0  |         BIO_puts(out, "\n");  | 
363  | 0  |     } else  | 
364  | 0  |         BIO_printf(out, "%*sNo Rejected Uses.\n", indent, "");  | 
365  | 0  |     alias = X509_alias_get0(x, &i);  | 
366  | 0  |     if (alias)  | 
367  | 0  |         BIO_printf(out, "%*sAlias: %.*s\n", indent, "", i, alias);  | 
368  | 0  |     keyid = X509_keyid_get0(x, &keyidlen);  | 
369  | 0  |     if (keyid) { | 
370  | 0  |         BIO_printf(out, "%*sKey Id: ", indent, "");  | 
371  | 0  |         for (i = 0; i < keyidlen; i++)  | 
372  | 0  |             BIO_printf(out, "%s%02X", i ? ":" : "", keyid[i]);  | 
373  | 0  |         BIO_write(out, "\n", 1);  | 
374  | 0  |     }  | 
375  | 0  |     return 1;  | 
376  | 0  | }  | 
377  |  |  | 
378  |  | /*  | 
379  |  |  * Helper functions for improving certificate verification error diagnostics  | 
380  |  |  */  | 
381  |  |  | 
382  |  | int ossl_x509_print_ex_brief(BIO *bio, X509 *cert, unsigned long neg_cflags)  | 
383  | 0  | { | 
384  | 0  |     unsigned long flags = ASN1_STRFLGS_RFC2253 | ASN1_STRFLGS_ESC_QUOTE |  | 
385  | 0  |         XN_FLAG_SEP_CPLUS_SPC | XN_FLAG_FN_SN;  | 
386  |  | 
  | 
387  | 0  |     if (cert == NULL)  | 
388  | 0  |         return BIO_printf(bio, "    (no certificate)\n") > 0;  | 
389  | 0  |     if (BIO_printf(bio, "    certificate\n") <= 0  | 
390  | 0  |             || !X509_print_ex(bio, cert, flags, ~X509_FLAG_NO_SUBJECT))  | 
391  | 0  |         return 0;  | 
392  | 0  |     if (X509_check_issued((X509 *)cert, cert) == X509_V_OK) { | 
393  | 0  |         if (BIO_printf(bio, "        self-issued\n") <= 0)  | 
394  | 0  |             return 0;  | 
395  | 0  |     } else { | 
396  | 0  |         if (BIO_printf(bio, " ") <= 0  | 
397  | 0  |             || !X509_print_ex(bio, cert, flags, ~X509_FLAG_NO_ISSUER))  | 
398  | 0  |             return 0;  | 
399  | 0  |     }  | 
400  | 0  |     if (!X509_print_ex(bio, cert, flags,  | 
401  | 0  |                        ~(X509_FLAG_NO_SERIAL | X509_FLAG_NO_VALIDITY)))  | 
402  | 0  |         return 0;  | 
403  | 0  |     if (X509_cmp_current_time(X509_get0_notBefore(cert)) > 0)  | 
404  | 0  |         if (BIO_printf(bio, "        not yet valid\n") <= 0)  | 
405  | 0  |             return 0;  | 
406  | 0  |     if (X509_cmp_current_time(X509_get0_notAfter(cert)) < 0)  | 
407  | 0  |         if (BIO_printf(bio, "        no more valid\n") <= 0)  | 
408  | 0  |             return 0;  | 
409  | 0  |     return X509_print_ex(bio, cert, flags,  | 
410  | 0  |                          ~neg_cflags & ~X509_FLAG_EXTENSIONS_ONLY_KID);  | 
411  | 0  | }  | 
412  |  |  | 
413  |  | static int print_certs(BIO *bio, const STACK_OF(X509) *certs)  | 
414  | 0  | { | 
415  | 0  |     int i;  | 
416  |  | 
  | 
417  | 0  |     if (certs == NULL || sk_X509_num(certs) <= 0)  | 
418  | 0  |         return BIO_printf(bio, "    (no certificates)\n") >= 0;  | 
419  |  |  | 
420  | 0  |     for (i = 0; i < sk_X509_num(certs); i++) { | 
421  | 0  |         X509 *cert = sk_X509_value(certs, i);  | 
422  |  | 
  | 
423  | 0  |         if (cert != NULL) { | 
424  | 0  |             if (!ossl_x509_print_ex_brief(bio, cert, 0))  | 
425  | 0  |                 return 0;  | 
426  | 0  |             if (!X509V3_extensions_print(bio, NULL,  | 
427  | 0  |                                          X509_get0_extensions(cert),  | 
428  | 0  |                                          X509_FLAG_EXTENSIONS_ONLY_KID, 8))  | 
429  | 0  |                 return 0;  | 
430  | 0  |             }  | 
431  | 0  |     }  | 
432  | 0  |     return 1;  | 
433  | 0  | }  | 
434  |  |  | 
435  |  | static int print_store_certs(BIO *bio, X509_STORE *store)  | 
436  | 0  | { | 
437  | 0  |     if (store != NULL) { | 
438  | 0  |         STACK_OF(X509) *certs = X509_STORE_get1_all_certs(store);  | 
439  | 0  |         int ret = print_certs(bio, certs);  | 
440  |  | 
  | 
441  | 0  |         OSSL_STACK_OF_X509_free(certs);  | 
442  | 0  |         return ret;  | 
443  | 0  |     } else { | 
444  | 0  |         return BIO_printf(bio, "    (no trusted store)\n") >= 0;  | 
445  | 0  |     }  | 
446  | 0  | }  | 
447  |  |  | 
448  |  | /* Extend the error queue with details on a failed cert verification */  | 
449  |  | int X509_STORE_CTX_print_verify_cb(int ok, X509_STORE_CTX *ctx)  | 
450  | 0  | { | 
451  | 0  |     if (ok == 0 && ctx != NULL) { | 
452  | 0  |         int cert_error = X509_STORE_CTX_get_error(ctx);  | 
453  | 0  |         BIO *bio = BIO_new(BIO_s_mem()); /* may be NULL */  | 
454  |  | 
  | 
455  | 0  |         if (bio == NULL)  | 
456  | 0  |             return 0;  | 
457  | 0  |         BIO_printf(bio, "%s at depth = %d error = %d (%s)\n",  | 
458  | 0  |                    X509_STORE_CTX_get0_parent_ctx(ctx) != NULL  | 
459  | 0  |                    ? "CRL path validation"  | 
460  | 0  |                    : "Certificate verification",  | 
461  | 0  |                    X509_STORE_CTX_get_error_depth(ctx),  | 
462  | 0  |                    cert_error, X509_verify_cert_error_string(cert_error));  | 
463  | 0  |         { | 
464  | 0  |             X509_STORE *ts = X509_STORE_CTX_get0_store(ctx);  | 
465  | 0  |             X509_VERIFY_PARAM *vpm = X509_STORE_get0_param(ts);  | 
466  | 0  |             char *str;  | 
467  | 0  |             int idx = 0;  | 
468  |  | 
  | 
469  | 0  |             switch (cert_error) { | 
470  | 0  |             case X509_V_ERR_HOSTNAME_MISMATCH:  | 
471  | 0  |                 BIO_printf(bio, "Expected hostname(s) = ");  | 
472  | 0  |                 while ((str = X509_VERIFY_PARAM_get0_host(vpm, idx++)) != NULL)  | 
473  | 0  |                     BIO_printf(bio, "%s%s", idx == 1 ? "" : ", ", str);  | 
474  | 0  |                 BIO_printf(bio, "\n");  | 
475  | 0  |                 break;  | 
476  | 0  |             case X509_V_ERR_EMAIL_MISMATCH:  | 
477  | 0  |                 str = X509_VERIFY_PARAM_get0_email(vpm);  | 
478  | 0  |                 if (str != NULL)  | 
479  | 0  |                     BIO_printf(bio, "Expected email address = %s\n", str);  | 
480  | 0  |                 break;  | 
481  | 0  |             case X509_V_ERR_IP_ADDRESS_MISMATCH:  | 
482  | 0  |                 str = X509_VERIFY_PARAM_get1_ip_asc(vpm);  | 
483  | 0  |                 if (str != NULL)  | 
484  | 0  |                     BIO_printf(bio, "Expected IP address = %s\n", str);  | 
485  | 0  |                 OPENSSL_free(str);  | 
486  | 0  |                 break;  | 
487  | 0  |             default:  | 
488  | 0  |                 break;  | 
489  | 0  |             }  | 
490  | 0  |         }  | 
491  |  |  | 
492  | 0  |         BIO_printf(bio, "Failure for:\n");  | 
493  | 0  |         ossl_x509_print_ex_brief(bio, X509_STORE_CTX_get_current_cert(ctx),  | 
494  | 0  |                                  X509_FLAG_NO_EXTENSIONS);  | 
495  | 0  |         if (cert_error == X509_V_ERR_CERT_UNTRUSTED  | 
496  | 0  |                 || cert_error == X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT  | 
497  | 0  |                 || cert_error == X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN  | 
498  | 0  |                 || cert_error == X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT  | 
499  | 0  |                 || cert_error == X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY  | 
500  | 0  |                 || cert_error == X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER  | 
501  | 0  |                 || cert_error == X509_V_ERR_STORE_LOOKUP) { | 
502  | 0  |             BIO_printf(bio, "Non-trusted certs:\n");  | 
503  | 0  |             print_certs(bio, X509_STORE_CTX_get0_untrusted(ctx));  | 
504  | 0  |             BIO_printf(bio, "Certs in trust store:\n");  | 
505  | 0  |             print_store_certs(bio, X509_STORE_CTX_get0_store(ctx));  | 
506  | 0  |         }  | 
507  | 0  |         ERR_raise(ERR_LIB_X509, X509_R_CERTIFICATE_VERIFICATION_FAILED);  | 
508  | 0  |         ERR_add_error_mem_bio("\n", bio); | 
509  | 0  |         BIO_free(bio);  | 
510  | 0  |     }  | 
511  |  |  | 
512  | 0  |     return ok;  | 
513  | 0  | }  | 
514  |  |  | 
515  |  | /*  | 
516  |  |  * Prints serial numbers in decimal and hexadecimal. The indent argument is only  | 
517  |  |  * used if the serial number is too large to fit in an int64_t.  | 
518  |  |  */  | 
519  |  | int ossl_serial_number_print(BIO *out, const ASN1_INTEGER *bs, int indent)  | 
520  | 0  | { | 
521  | 0  |     int i, ok;  | 
522  | 0  |     int64_t l;  | 
523  | 0  |     uint64_t ul;  | 
524  | 0  |     const char *neg;  | 
525  |  | 
  | 
526  | 0  |     if (bs->length == 0) { | 
527  | 0  |         if (BIO_puts(out, " (Empty)") <= 0)  | 
528  | 0  |             return -1;  | 
529  | 0  |         return 0;  | 
530  | 0  |     }  | 
531  |  |  | 
532  | 0  |     ERR_set_mark();  | 
533  | 0  |     ok = ASN1_INTEGER_get_int64(&l, bs);  | 
534  | 0  |     ERR_pop_to_mark();  | 
535  |  | 
  | 
536  | 0  |     if (ok) { /* Reading an int64_t succeeded: print decimal and hex. */ | 
537  | 0  |         if (bs->type == V_ASN1_NEG_INTEGER) { | 
538  | 0  |             ul = 0 - (uint64_t)l;  | 
539  | 0  |             neg = "-";  | 
540  | 0  |         } else { | 
541  | 0  |             ul = l;  | 
542  | 0  |             neg = "";  | 
543  | 0  |         }  | 
544  | 0  |         if (BIO_printf(out, " %s%ju (%s0x%jx)", neg, ul, neg, ul) <= 0)  | 
545  | 0  |             return -1;  | 
546  | 0  |     } else { /* Reading an int64_t failed: just print hex. */ | 
547  | 0  |         neg = (bs->type == V_ASN1_NEG_INTEGER) ? " (Negative)" : "";  | 
548  | 0  |         if (BIO_printf(out, "\n%*s%s", indent, "", neg) <= 0)  | 
549  | 0  |             return -1;  | 
550  |  |  | 
551  | 0  |         for (i = 0; i < bs->length - 1; i++) { | 
552  | 0  |             if (BIO_printf(out, "%02x%c", bs->data[i], ':') <= 0)  | 
553  | 0  |                 return -1;  | 
554  | 0  |         }  | 
555  | 0  |         if (BIO_printf(out, "%02x", bs->data[i]) <= 0)  | 
556  | 0  |             return -1;  | 
557  | 0  |     }  | 
558  | 0  |     return 0;  | 
559  | 0  | }  |