| // Copyright 1999-2016 The OpenSSL Project Authors. All Rights Reserved. | 
 | // | 
 | // Licensed under the Apache License, Version 2.0 (the "License"); | 
 | // you may not use this file except in compliance with the License. | 
 | // You may obtain a copy of the License at | 
 | // | 
 | //     https://www.apache.org/licenses/LICENSE-2.0 | 
 | // | 
 | // Unless required by applicable law or agreed to in writing, software | 
 | // distributed under the License is distributed on an "AS IS" BASIS, | 
 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
 | // See the License for the specific language governing permissions and | 
 | // limitations under the License. | 
 |  | 
 | #include <assert.h> | 
 |  | 
 | #include <openssl/asn1.h> | 
 | #include <openssl/err.h> | 
 | #include <openssl/mem.h> | 
 | #include <openssl/obj.h> | 
 | #include <openssl/x509.h> | 
 |  | 
 |  | 
 | int X509_CRL_print_fp(FILE *fp, X509_CRL *x) { | 
 |   BIO *b = BIO_new_fp(fp, BIO_NOCLOSE); | 
 |   if (b == NULL) { | 
 |     OPENSSL_PUT_ERROR(X509, ERR_R_BUF_LIB); | 
 |     return 0; | 
 |   } | 
 |   int ret = X509_CRL_print(b, x); | 
 |   BIO_free(b); | 
 |   return ret; | 
 | } | 
 |  | 
 | int X509_CRL_print(BIO *out, X509_CRL *x) { | 
 |   long version = X509_CRL_get_version(x); | 
 |   assert(X509_CRL_VERSION_1 <= version && version <= X509_CRL_VERSION_2); | 
 |   const X509_ALGOR *sig_alg; | 
 |   const ASN1_BIT_STRING *signature; | 
 |   X509_CRL_get0_signature(x, &signature, &sig_alg); | 
 |   if (BIO_printf(out, "Certificate Revocation List (CRL):\n") <= 0 || | 
 |       BIO_printf(out, "%8sVersion %ld (0x%lx)\n", "", version + 1, | 
 |                  (unsigned long)version) <= 0 || | 
 |       // Note this and the other |X509_signature_print| call both print the | 
 |       // outer signature algorithm, rather than printing the inner and outer | 
 |       // ones separately. This matches OpenSSL, though it was probably a bug. | 
 |       !X509_signature_print(out, sig_alg, NULL)) { | 
 |     return 0; | 
 |   } | 
 |  | 
 |   char *issuer = X509_NAME_oneline(X509_CRL_get_issuer(x), NULL, 0); | 
 |   int ok = issuer != NULL && BIO_printf(out, "%8sIssuer: %s\n", "", issuer) > 0; | 
 |   OPENSSL_free(issuer); | 
 |   if (!ok) { | 
 |     return 0; | 
 |   } | 
 |  | 
 |   if (BIO_printf(out, "%8sLast Update: ", "") <= 0 || | 
 |       !ASN1_TIME_print(out, X509_CRL_get0_lastUpdate(x)) || | 
 |       BIO_printf(out, "\n%8sNext Update: ", "") <= 0) { | 
 |     return 0; | 
 |   } | 
 |   if (X509_CRL_get0_nextUpdate(x)) { | 
 |     if (!ASN1_TIME_print(out, X509_CRL_get0_nextUpdate(x))) { | 
 |       return 0; | 
 |     } | 
 |   } else { | 
 |     if (BIO_printf(out, "NONE") <= 0) { | 
 |       return 0; | 
 |     } | 
 |   } | 
 |  | 
 |   if (BIO_printf(out, "\n") <= 0 || | 
 |       !X509V3_extensions_print(out, "CRL extensions", | 
 |                                X509_CRL_get0_extensions(x), 0, 8)) { | 
 |     return 0; | 
 |   } | 
 |  | 
 |   const STACK_OF(X509_REVOKED) *rev = X509_CRL_get_REVOKED(x); | 
 |   if (sk_X509_REVOKED_num(rev) > 0) { | 
 |     if (BIO_printf(out, "Revoked Certificates:\n") <= 0) { | 
 |       return 0; | 
 |     } | 
 |   } else { | 
 |     if (BIO_printf(out, "No Revoked Certificates.\n") <= 0) { | 
 |       return 0; | 
 |     } | 
 |   } | 
 |  | 
 |   for (size_t i = 0; i < sk_X509_REVOKED_num(rev); i++) { | 
 |     const X509_REVOKED *r = sk_X509_REVOKED_value(rev, i); | 
 |     if (BIO_printf(out, "    Serial Number: ") <= 0 || | 
 |         i2a_ASN1_INTEGER(out, X509_REVOKED_get0_serialNumber(r)) <= 0 || | 
 |         BIO_printf(out, "\n        Revocation Date: ") <= 0 || | 
 |         !ASN1_TIME_print(out, X509_REVOKED_get0_revocationDate(r)) || | 
 |         BIO_printf(out, "\n") <= 0 || | 
 |         !X509V3_extensions_print(out, "CRL entry extensions", | 
 |                                  X509_REVOKED_get0_extensions(r), 0, 8)) { | 
 |     } | 
 |   } | 
 |  | 
 |   return X509_signature_print(out, sig_alg, signature); | 
 | } |