mirror of
https://github.com/CloverHackyColor/CloverBootloader.git
synced 2024-12-04 13:23:26 +01:00
128 lines
3.9 KiB
C
128 lines
3.9 KiB
C
/*
|
|
* Copyright 2016-2020 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#ifdef OPENSSL_NO_CT
|
|
# error "CT is disabled"
|
|
#endif
|
|
|
|
#include <openssl/asn1.h>
|
|
#include <openssl/bio.h>
|
|
|
|
#include "ct_local.h"
|
|
|
|
static void SCT_signature_algorithms_print(const SCT *sct, BIO *out)
|
|
{
|
|
int nid = SCT_get_signature_nid(sct);
|
|
|
|
if (nid == NID_undef)
|
|
BIO_printf(out, "%02X%02X", sct->hash_alg, sct->sig_alg);
|
|
else
|
|
BIO_printf(out, "%s", OBJ_nid2ln(nid));
|
|
}
|
|
|
|
static void timestamp_print(uint64_t timestamp, BIO *out)
|
|
{
|
|
ASN1_GENERALIZEDTIME *gen = ASN1_GENERALIZEDTIME_new();
|
|
char genstr[20];
|
|
|
|
if (gen == NULL)
|
|
return;
|
|
ASN1_GENERALIZEDTIME_adj(gen, (time_t)0,
|
|
(int)(timestamp / 86400000),
|
|
(timestamp % 86400000) / 1000);
|
|
/*
|
|
* Note GeneralizedTime from ASN1_GENERALIZETIME_adj is always 15
|
|
* characters long with a final Z. Update it with fractional seconds.
|
|
*/
|
|
BIO_snprintf(genstr, sizeof(genstr), "%.14s.%03dZ",
|
|
ASN1_STRING_get0_data(gen), (unsigned int)(timestamp % 1000));
|
|
if (ASN1_GENERALIZEDTIME_set_string(gen, genstr))
|
|
ASN1_GENERALIZEDTIME_print(out, gen);
|
|
ASN1_GENERALIZEDTIME_free(gen);
|
|
}
|
|
|
|
const char *SCT_validation_status_string(const SCT *sct)
|
|
{
|
|
|
|
switch (SCT_get_validation_status(sct)) {
|
|
case SCT_VALIDATION_STATUS_NOT_SET:
|
|
return "not set";
|
|
case SCT_VALIDATION_STATUS_UNKNOWN_VERSION:
|
|
return "unknown version";
|
|
case SCT_VALIDATION_STATUS_UNKNOWN_LOG:
|
|
return "unknown log";
|
|
case SCT_VALIDATION_STATUS_UNVERIFIED:
|
|
return "unverified";
|
|
case SCT_VALIDATION_STATUS_INVALID:
|
|
return "invalid";
|
|
case SCT_VALIDATION_STATUS_VALID:
|
|
return "valid";
|
|
}
|
|
return "unknown status";
|
|
}
|
|
|
|
void SCT_print(const SCT *sct, BIO *out, int indent,
|
|
const CTLOG_STORE *log_store)
|
|
{
|
|
const CTLOG *log = NULL;
|
|
|
|
if (log_store != NULL) {
|
|
log = CTLOG_STORE_get0_log_by_id(log_store, sct->log_id,
|
|
sct->log_id_len);
|
|
}
|
|
|
|
BIO_printf(out, "%*sSigned Certificate Timestamp:", indent, "");
|
|
BIO_printf(out, "\n%*sVersion : ", indent + 4, "");
|
|
|
|
if (sct->version != SCT_VERSION_V1) {
|
|
BIO_printf(out, "unknown\n%*s", indent + 16, "");
|
|
BIO_hex_string(out, indent + 16, 16, sct->sct, sct->sct_len);
|
|
return;
|
|
}
|
|
|
|
BIO_printf(out, "v1 (0x0)");
|
|
|
|
if (log != NULL) {
|
|
BIO_printf(out, "\n%*sLog : %s", indent + 4, "",
|
|
CTLOG_get0_name(log));
|
|
}
|
|
|
|
BIO_printf(out, "\n%*sLog ID : ", indent + 4, "");
|
|
BIO_hex_string(out, indent + 16, 16, sct->log_id, sct->log_id_len);
|
|
|
|
BIO_printf(out, "\n%*sTimestamp : ", indent + 4, "");
|
|
timestamp_print(sct->timestamp, out);
|
|
|
|
BIO_printf(out, "\n%*sExtensions: ", indent + 4, "");
|
|
if (sct->ext_len == 0)
|
|
BIO_printf(out, "none");
|
|
else
|
|
BIO_hex_string(out, indent + 16, 16, sct->ext, sct->ext_len);
|
|
|
|
BIO_printf(out, "\n%*sSignature : ", indent + 4, "");
|
|
SCT_signature_algorithms_print(sct, out);
|
|
BIO_printf(out, "\n%*s ", indent + 4, "");
|
|
BIO_hex_string(out, indent + 16, 16, sct->sig, sct->sig_len);
|
|
}
|
|
|
|
void SCT_LIST_print(const STACK_OF(SCT) *sct_list, BIO *out, int indent,
|
|
const char *separator, const CTLOG_STORE *log_store)
|
|
{
|
|
int sct_count = sk_SCT_num(sct_list);
|
|
int i;
|
|
|
|
for (i = 0; i < sct_count; ++i) {
|
|
SCT *sct = sk_SCT_value(sct_list, i);
|
|
|
|
SCT_print(sct, out, indent, log_store);
|
|
if (i < sk_SCT_num(sct_list) - 1)
|
|
BIO_printf(out, "%s", separator);
|
|
}
|
|
}
|