summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/ct/ct_prn.c
blob: 3cd9b8e838b92f024a8e9885d799aa9de1bd5b66 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
/*
 * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved.
 *
 * Licensed under the OpenSSL license (the "License").  You may not use
 * this file except in compliance with the License.  You can obtain a copy
 * in the file LICENSE in the source distribution or at
 * https://www.openssl.org/source/license.html
 */

#ifdef OPENSSL_NO_CT
# error "CT is disabled"
#endif

#include <openssl/asn1.h>
#include <openssl/bio.h>

#include "ct_local.h"

static void
SCT_signature_algorithms_print(const SCT *sct, BIO *out)
{
	int nid = SCT_get_signature_nid(sct);

	if (nid == NID_undef)
		BIO_printf(out, "%02X%02X", sct->hash_alg, sct->sig_alg);
	else
		BIO_printf(out, "%s", OBJ_nid2ln(nid));
}

static void
timestamp_print(uint64_t timestamp, BIO *out)
{
	ASN1_GENERALIZEDTIME *gen = ASN1_GENERALIZEDTIME_new();
	char genstr[20];

	if (gen == NULL)
		return;
	ASN1_GENERALIZEDTIME_adj(gen, (time_t)0,(int)(timestamp / 86400000),
	    (timestamp % 86400000) / 1000);
	/*
	 * Note GeneralizedTime from ASN1_GENERALIZETIME_adj is always 15
	 * characters long with a final Z. Update it with fractional seconds.
	 */
	BIO_snprintf(genstr, sizeof(genstr), "%.14s.%03dZ",
	    ASN1_STRING_get0_data(gen), (unsigned int)(timestamp % 1000));
	if (ASN1_GENERALIZEDTIME_set_string(gen, genstr))
		ASN1_GENERALIZEDTIME_print(out, gen);
	ASN1_GENERALIZEDTIME_free(gen);
}

const char *
SCT_validation_status_string(const SCT *sct)
{
	switch (SCT_get_validation_status(sct)) {
	case SCT_VALIDATION_STATUS_NOT_SET:
		return "not set";
	case SCT_VALIDATION_STATUS_UNKNOWN_VERSION:
		return "unknown version";
	case SCT_VALIDATION_STATUS_UNKNOWN_LOG:
		return "unknown log";
	case SCT_VALIDATION_STATUS_UNVERIFIED:
		return "unverified";
	case SCT_VALIDATION_STATUS_INVALID:
		return "invalid";
	case SCT_VALIDATION_STATUS_VALID:
	    return "valid";
	}
	return "unknown status";
}

void
SCT_print(const SCT *sct, BIO *out, int indent, const CTLOG_STORE *log_store)
{
	const CTLOG *log = NULL;

	if (log_store != NULL) {
		log = CTLOG_STORE_get0_log_by_id(log_store, sct->log_id,
		    sct->log_id_len);
	}

	BIO_printf(out, "%*sSigned Certificate Timestamp:", indent, "");
	BIO_printf(out, "\n%*sVersion   : ", indent + 4, "");

	if (sct->version != SCT_VERSION_V1) {
		BIO_printf(out, "unknown\n%*s", indent + 16, "");
		BIO_hex_string(out, indent + 16, 16, sct->sct, sct->sct_len);
		return;
	}

	BIO_printf(out, "v1 (0x0)");

	if (log != NULL) {
		BIO_printf(out, "\n%*sLog       : %s", indent + 4, "",
		    CTLOG_get0_name(log));
	}

	BIO_printf(out, "\n%*sLog ID    : ", indent + 4, "");
	BIO_hex_string(out, indent + 16, 16, sct->log_id, sct->log_id_len);

	BIO_printf(out, "\n%*sTimestamp : ", indent + 4, "");
	timestamp_print(sct->timestamp, out);

	BIO_printf(out, "\n%*sExtensions: ", indent + 4, "");
	if (sct->ext_len == 0)
		BIO_printf(out, "none");
	else
		BIO_hex_string(out, indent + 16, 16, sct->ext, sct->ext_len);

	BIO_printf(out, "\n%*sSignature : ", indent + 4, "");
	SCT_signature_algorithms_print(sct, out);
	BIO_printf(out, "\n%*s            ", indent + 4, "");
	BIO_hex_string(out, indent + 16, 16, sct->sig, sct->sig_len);
}

void
SCT_LIST_print(const STACK_OF(SCT) *sct_list, BIO *out, int indent,
    const char *separator, const CTLOG_STORE *log_store)
{
	int sct_count = sk_SCT_num(sct_list);
	int i;

	for (i = 0; i < sct_count; ++i) {
		SCT *sct = sk_SCT_value(sct_list, i);

		SCT_print(sct, out, indent, log_store);
		if (i < sk_SCT_num(sct_list) - 1)
			BIO_printf(out, "%s", separator);
	}
}