123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127 |
- /*
- * Copyright 2016-2020 The OpenSSL Project Authors. All Rights Reserved.
- *
- * Licensed under the Apache License 2.0 (the "License"). You may not use
- * this file except in compliance with the License. You can obtain a copy
- * in the file LICENSE in the source distribution or at
- * https://www.openssl.org/source/license.html
- */
- #ifdef OPENSSL_NO_CT
- # error "CT is disabled"
- #endif
- #include <openssl/asn1.h>
- #include <openssl/bio.h>
- #include "ct_local.h"
- static void SCT_signature_algorithms_print(const SCT *sct, BIO *out)
- {
- int nid = SCT_get_signature_nid(sct);
- if (nid == NID_undef)
- BIO_printf(out, "%02X%02X", sct->hash_alg, sct->sig_alg);
- else
- BIO_printf(out, "%s", OBJ_nid2ln(nid));
- }
- static void timestamp_print(uint64_t timestamp, BIO *out)
- {
- ASN1_GENERALIZEDTIME *gen = ASN1_GENERALIZEDTIME_new();
- char genstr[20];
- if (gen == NULL)
- return;
- ASN1_GENERALIZEDTIME_adj(gen, (time_t)0,
- (int)(timestamp / 86400000),
- (timestamp % 86400000) / 1000);
- /*
- * Note GeneralizedTime from ASN1_GENERALIZETIME_adj is always 15
- * characters long with a final Z. Update it with fractional seconds.
- */
- BIO_snprintf(genstr, sizeof(genstr), "%.14s.%03dZ",
- ASN1_STRING_get0_data(gen), (unsigned int)(timestamp % 1000));
- if (ASN1_GENERALIZEDTIME_set_string(gen, genstr))
- ASN1_GENERALIZEDTIME_print(out, gen);
- ASN1_GENERALIZEDTIME_free(gen);
- }
- const char *SCT_validation_status_string(const SCT *sct)
- {
- switch (SCT_get_validation_status(sct)) {
- case SCT_VALIDATION_STATUS_NOT_SET:
- return "not set";
- case SCT_VALIDATION_STATUS_UNKNOWN_VERSION:
- return "unknown version";
- case SCT_VALIDATION_STATUS_UNKNOWN_LOG:
- return "unknown log";
- case SCT_VALIDATION_STATUS_UNVERIFIED:
- return "unverified";
- case SCT_VALIDATION_STATUS_INVALID:
- return "invalid";
- case SCT_VALIDATION_STATUS_VALID:
- return "valid";
- }
- return "unknown status";
- }
- void SCT_print(const SCT *sct, BIO *out, int indent,
- const CTLOG_STORE *log_store)
- {
- const CTLOG *log = NULL;
- if (log_store != NULL) {
- log = CTLOG_STORE_get0_log_by_id(log_store, sct->log_id,
- sct->log_id_len);
- }
- BIO_printf(out, "%*sSigned Certificate Timestamp:", indent, "");
- BIO_printf(out, "\n%*sVersion : ", indent + 4, "");
- if (sct->version != SCT_VERSION_V1) {
- BIO_printf(out, "unknown\n%*s", indent + 16, "");
- BIO_hex_string(out, indent + 16, 16, sct->sct, sct->sct_len);
- return;
- }
- BIO_printf(out, "v1 (0x0)");
- if (log != NULL) {
- BIO_printf(out, "\n%*sLog : %s", indent + 4, "",
- CTLOG_get0_name(log));
- }
- BIO_printf(out, "\n%*sLog ID : ", indent + 4, "");
- BIO_hex_string(out, indent + 16, 16, sct->log_id, sct->log_id_len);
- BIO_printf(out, "\n%*sTimestamp : ", indent + 4, "");
- timestamp_print(sct->timestamp, out);
- BIO_printf(out, "\n%*sExtensions: ", indent + 4, "");
- if (sct->ext_len == 0)
- BIO_printf(out, "none");
- else
- BIO_hex_string(out, indent + 16, 16, sct->ext, sct->ext_len);
- BIO_printf(out, "\n%*sSignature : ", indent + 4, "");
- SCT_signature_algorithms_print(sct, out);
- BIO_printf(out, "\n%*s ", indent + 4, "");
- BIO_hex_string(out, indent + 16, 16, sct->sig, sct->sig_len);
- }
- void SCT_LIST_print(const STACK_OF(SCT) *sct_list, BIO *out, int indent,
- const char *separator, const CTLOG_STORE *log_store)
- {
- int sct_count = sk_SCT_num(sct_list);
- int i;
- for (i = 0; i < sct_count; ++i) {
- SCT *sct = sk_SCT_value(sct_list, i);
- SCT_print(sct, out, indent, log_store);
- if (i < sk_SCT_num(sct_list) - 1)
- BIO_printf(out, "%s", separator);
- }
- }
|