
JSON-like printing of ASN.1 parsed values. Status: - Not X.697 (JER) compliant, not even close. - String escaping isn't JSON-compliant. - It's not printing the names of CHOICE types. - It's not printing the names of open type choices (i.e., IOS object names) And yet it's quite useful already. It prints all the weird things in EK certs for example. Here's what it outputs for the EK cert we use in check-gen.c: { "_type": "Certificate", "tbsCertificate": { "_type": "TBSCertificate", "_save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version": "2", "serialNumber": "6A0597BA71D7E6D3AC0EDC9EDC95A15B998DE40A", "signature": { "_type": "AlgorithmIdentifier", "algorithm": "1.2.840.113549.1.1.11", "parameters": "0500" }, "issuer": { "_choice": "rdnSequence", "value": [ [ { "_type": "AttributeTypeAndValue", "type": "2.5.4.6", "value": { "_choice": "printableString", "value": "CH" } } ], [ { "_type": "AttributeTypeAndValue", "type": "2.5.4.10", "value": { "_choice": "printableString", "value": "STMicroelectronics NV" } } ], [ { "_type": "AttributeTypeAndValue", "type": "2.5.4.3", "value": { "_choice": "printableString", "value": "STM TPM EK Intermediate CA 05" } } ] ] }, "validity": { "_type": "Validity", "notBefore": { "_choice": "utcTime", "value": "2018-12-14T00:00:00Z" }, "notAfter": { "_choice": "utcTime", "value": "2028-12-14T00:00:00Z" } }, "subject": { "_choice": "rdnSequence", "value": [] }, "subjectPublicKeyInfo": { "_type": "SubjectPublicKeyInfo", "algorithm": { "_type": "AlgorithmIdentifier", "algorithm": "1.2.840.113549.1.1.1", "parameters": "0500" }, "subjectPublicKey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}, "issuerUniqueID": null, "subjectUniqueID": null, "extensions": [ { "_type": "Extension", "extnID": "2.5.29.35", "critical": false, "extnValue": "301680141ADB994AB58BE57A0CC9B900E7851E1A43C08660", "_extnValue": { "_type": "AuthorityKeyIdentifier", "keyIdentifier": "1ADB994AB58BE57A0CC9B900E7851E1A43C08660", "authorityCertIssuer": null, "authorityCertSerialNumber": null } }, { "_type": "Extension", "extnID": "2.5.29.32", "critical": false, "extnValue": "303930370604551D2000302F302D06082B060105050702011621687474703A2F2F7777772E73742E636F6D2F54504D2F7265706F7369746F72792F", "_extnValue": [ { "_type": "PolicyInformation", "policyIdentifier": "2.5.29.32.0", "policyQualifiers": [ { "_type": "PolicyQualifierInfo", "policyQualifierId": "1.3.6.1.5.5.7.2.1", "qualifier": "1621687474703A2F2F7777772E73742E636F6D2F54504D2F7265706F7369746F72792F" } ] } ] }, { "_type": "Extension", "extnID": "2.5.29.17", "critical": true, "extnValue": "304DA44B304931163014060567810502010C0B69643A353335343444323031173015060567810502020C0C53543333485450484148433031163014060567810502030C0B69643A3030343930303038", "_extnValue": [ { "_choice": "directoryName", "value": { "_choice": "rdnSequence", "value": [ [ { "_type": "AttributeTypeAndValue", "type": "2.23.133.2.1", "value": { "_choice": "utf8String", "value": "id:53544D20" } } ], [ { "_type": "AttributeTypeAndValue", "type": "2.23.133.2.2", "value": { "_choice": "utf8String", "value": "ST33HTPHAHC0" } } ], [ { "_type": "AttributeTypeAndValue", "type": "2.23.133.2.3", "value": { "_choice": "utf8String", "value": "id:00490008" } } ] ] } } ] }, { "_type": "Extension", "extnID": "2.5.29.9", "critical": false, "extnValue": "305E301706056781050210310E300C0C03322E300201000202008A304306056781050212313A30380201000101FFA0030A0101A1030A0100A2030A0100A310300E1603332E310A01040A01020101FFA40F300D16053134302D320A0102010100", "_extnValue": [ { "_type": "AttributeSet", "type": "2.23.133.2.16", "values": [ "300C0C03322E300201000202008A" ], "_values": [ { "_type": "TPMSpecification", "family": "2.0", "level": "0", "revision": "138" } ] }, { "_type": "AttributeSet", "type": "2.23.133.2.18", "values": [ "30380201000101FFA0030A0101A1030A0100A2030A0100A310300E1603332E310A01040A01020101FFA40F300D16053134302D320A0102010100" ], "_values": [ { "_type": "TPMSecurityAssertions", "version": "0", "fieldUpgradable": true, "ekGenerationType": "655617", "ekGenerationLocation": "655616", "ekCertificateGenerationLocation": "655616", "ccInfo": { "_type": "CommonCriteriaMeasures", "version": "3.1", "assurancelevel": "4", "evaluationStatus": "2", "plus": true, "strengthOfFunction": null, "profileOid": null, "profileUri": null, "targetOid": null, "targetUri": null }, "fipsLevel": { "_type": "FIPSLevel", "version": "140-2", "level": "2", "plus": false }, "iso9000Certified": false, "iso9000Uri": null } ] } ] }, { "_type": "Extension", "extnID": "2.5.29.15", "critical": true, "extnValue": "03020520", "_extnValue": [ "keyEncipherment" ] }, { "_type": "Extension", "extnID": "2.5.29.19", "critical": true, "extnValue": "3000", "_extnValue": { "_type": "BasicConstraints", "cA": false, "pathLenConstraint": null } }, { "_type": "Extension", "extnID": "2.5.29.37", "critical": false, "extnValue": "300706056781050801", "_extnValue": [ "2.23.133.8.1" ] }, { "_type": "Extension", "extnID": "1.3.6.1.5.5.7.1.1", "critical": false, "extnValue": "303C303A06082B06010505073002862E687474703A2F2F7365637572652E676C6F62616C7369676E2E636F6D2F73746D74706D656B696E7430352E637274", "_extnValue": [ { "_type": "AccessDescription", "accessMethod": "1.3.6.1.5.5.7.48.2", "accessLocation": { "_choice": "uniformResourceIdentifier", "value": "http://secure.globalsign.com/stmtpmekint05.crt" } } ] } ] }, "signatureAlgorithm": { "_type": "AlgorithmIdentifier", "algorithm": "1.2.840.113549.1.1.11", "parameters": "0500" }, "signatureValue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}
228 lines
5.6 KiB
C
228 lines
5.6 KiB
C
/*
|
|
* Copyright (c) 2021 Kungliga Tekniska Högskolan
|
|
* (Royal Institute of Technology, Stockholm, Sweden).
|
|
* All rights reserved.
|
|
*
|
|
* Portions Copyright (c) 2009 Apple Inc. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
*
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* 3. Neither the name of the Institute nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
#include "der_locl.h"
|
|
#include "hex.h"
|
|
|
|
RCSID("$Id$");
|
|
|
|
char *
|
|
der_print_general_string(const heim_general_string *str, int flags)
|
|
{
|
|
return strdup(*str);
|
|
}
|
|
|
|
char *
|
|
der_print_boolean(const int *i, int flags)
|
|
{
|
|
return *i ? strdup("true") : strdup("false");
|
|
}
|
|
|
|
char *
|
|
der_print_integer(const int *i, int flags)
|
|
{
|
|
char *s = NULL;
|
|
|
|
if (asprintf(&s, "%d", *i) == -1 || s == NULL)
|
|
return NULL;
|
|
return s;
|
|
}
|
|
|
|
char *
|
|
der_print_integer64(const int64_t *i, int flags)
|
|
{
|
|
char *s = NULL;
|
|
|
|
if (asprintf(&s, "%lld", (long long)*i) == -1 || s == NULL)
|
|
return NULL;
|
|
return s;
|
|
}
|
|
|
|
char *
|
|
der_print_unsigned(const unsigned *u, int flags)
|
|
{
|
|
char *s = NULL;
|
|
|
|
if (asprintf(&s, "%u", *u) == -1 || s == NULL)
|
|
return NULL;
|
|
return s;
|
|
}
|
|
|
|
char *
|
|
der_print_unsigned64(const uint64_t *u, int flags)
|
|
{
|
|
char *s = NULL;
|
|
|
|
if (asprintf(&s, "%llu", (long long)*u) == -1 || s == NULL)
|
|
return NULL;
|
|
return s;
|
|
}
|
|
|
|
char *
|
|
der_print_generalized_time(const time_t *t, int flags)
|
|
{
|
|
struct tm tms;
|
|
char str[sizeof("1970-01-01T00:00:00Z")];
|
|
|
|
#ifdef WIN32
|
|
if (strftime(str, sizeof(str), "%Y-%m-%dT%H:%M:%SZ", gmtime_s(&tms, t)) == 0)
|
|
return NULL;
|
|
#else
|
|
if (strftime(str, sizeof(str), "%Y-%m-%dT%H:%M:%SZ", gmtime_r(t, &tms)) == 0)
|
|
return NULL;
|
|
#endif
|
|
return strdup(str);
|
|
}
|
|
|
|
char *
|
|
der_print_utctime(const time_t *t, int flags)
|
|
{
|
|
struct tm tms;
|
|
char str[sizeof("1970-01-01T00:00:00Z")];
|
|
|
|
#ifdef WIN32
|
|
if (strftime(str, sizeof(str), "%Y-%m-%dT%H:%M:%SZ", gmtime_s(&tms, t)) == 0)
|
|
return NULL;
|
|
#else
|
|
if (strftime(str, sizeof(str), "%Y-%m-%dT%H:%M:%SZ", gmtime_r(t, &tms)) == 0)
|
|
return NULL;
|
|
#endif
|
|
return strdup(str);
|
|
}
|
|
|
|
|
|
char *
|
|
der_print_utf8string(const heim_utf8_string *str, int flags)
|
|
{
|
|
return strdup(*str);
|
|
}
|
|
|
|
char *
|
|
der_print_printable_string(const heim_printable_string *str, int flags)
|
|
{
|
|
return strndup(str->data, str->length);
|
|
}
|
|
|
|
char *
|
|
der_print_ia5_string(const heim_ia5_string *str, int flags)
|
|
{
|
|
return strndup(str->data, str->length);
|
|
}
|
|
|
|
char *
|
|
der_print_bmp_string(const heim_bmp_string *k, int flags)
|
|
{
|
|
return strdup("<BMPString-not-supported>");
|
|
}
|
|
|
|
char *
|
|
der_print_universal_string(const heim_universal_string *k, int flags)
|
|
{
|
|
return strdup("<UniversalString-not-supported>");
|
|
}
|
|
|
|
char *
|
|
der_print_visible_string(const heim_visible_string *str, int flags)
|
|
{
|
|
return strdup(*str);
|
|
}
|
|
|
|
char *
|
|
der_print_octet_string(const heim_octet_string *k, int flags)
|
|
{
|
|
char *s = NULL;
|
|
|
|
(void) hex_encode(k->data, k->length, &s);
|
|
return s;
|
|
}
|
|
|
|
char *
|
|
der_print_heim_integer(const heim_integer *k, int flags)
|
|
{
|
|
char *s = NULL;
|
|
|
|
(void) der_print_hex_heim_integer(k, &s);
|
|
return s;
|
|
}
|
|
|
|
char *
|
|
der_print_oid(const heim_oid *k, int flags)
|
|
{
|
|
struct rk_strpool *r = NULL;
|
|
const char *sym = NULL;
|
|
char *s = NULL;
|
|
size_t i;
|
|
|
|
(void) der_print_heim_oid(k, '.', &s);
|
|
|
|
if (!s)
|
|
return NULL;
|
|
r = rk_strpoolprintf(r, "{\"_type\":\"OBJECT IDENTIFIER\","
|
|
"\"oid\":\"%s\","
|
|
"\"components\":[",
|
|
s);
|
|
free(s);
|
|
for (i = 0; i < k->length; i++)
|
|
r = rk_strpoolprintf(r, "%s%u", i ? "," : "", k->components[i]);
|
|
if (r)
|
|
r = rk_strpoolprintf(r, "]");
|
|
(void) der_find_heim_oid_by_oid(k, &sym);
|
|
if (sym && r) {
|
|
if ((s = strdup(sym))) {
|
|
for (i = 0; s[i]; i++)
|
|
if (s[i] == '_')
|
|
s[i] = '-';
|
|
}
|
|
r = rk_strpoolprintf(r, ",\"name\":\"%s\"", s ? s : sym);
|
|
free(s);
|
|
}
|
|
if (r)
|
|
r = rk_strpoolprintf(r, "}");
|
|
return rk_strpoolcollect(r);
|
|
}
|
|
|
|
char *
|
|
der_print_bit_string(const heim_bit_string *k, int flags)
|
|
{
|
|
char *s2 = NULL;
|
|
char *s = NULL;
|
|
|
|
(void) hex_encode(k->data, k->length / 8, &s);
|
|
if (asprintf(&s2, "%llu:%s", (unsigned long long)k->length, s) == -1 || !s2)
|
|
return NULL;
|
|
free(s);
|
|
return s2;
|
|
}
|