зеркало из https://github.com/mozilla/gecko-dev.git
201 строка
6.6 KiB
C
201 строка
6.6 KiB
C
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
/*
|
|
* Pretty-print some well-known BER or DER encoded data (e.g. certificates,
|
|
* keys, pkcs7)
|
|
*/
|
|
|
|
#include "secutil.h"
|
|
|
|
#if defined(__sun) && !defined(SVR4)
|
|
extern int fprintf(FILE *, char *, ...);
|
|
#endif
|
|
|
|
#include "plgetopt.h"
|
|
|
|
#include "pk11func.h"
|
|
#include "nspr.h"
|
|
#include "nss.h"
|
|
|
|
static void
|
|
Usage(char *progName)
|
|
{
|
|
fprintf(stderr,
|
|
"Usage: %s [-t type] [-a] [-i input] [-o output] [-w] [-u]\n",
|
|
progName);
|
|
fprintf(stderr, "Pretty prints a file containing ASN.1 data in DER or ascii format.\n");
|
|
fprintf(stderr, "%-14s Specify input and display type:", "-t type");
|
|
#ifdef HAVE_EPV_TEMPLATE
|
|
fprintf(stderr, " %s (sk),", SEC_CT_PRIVATE_KEY);
|
|
#endif
|
|
fprintf(stderr, "\n");
|
|
fprintf(stderr, "%-14s %s (pk), %s (c), %s (cr),\n", "", SEC_CT_PUBLIC_KEY,
|
|
SEC_CT_CERTIFICATE, SEC_CT_CERTIFICATE_REQUEST);
|
|
fprintf(stderr, "%-14s %s (ci), %s (p7), %s or %s (n).\n", "", SEC_CT_CERTIFICATE_ID,
|
|
SEC_CT_PKCS7, SEC_CT_CRL, SEC_CT_NAME);
|
|
fprintf(stderr, "%-14s (Use either the long type name or the shortcut.)\n", "");
|
|
fprintf(stderr, "%-14s Input is in ascii encoded form (RFC1113)\n",
|
|
"-a");
|
|
fprintf(stderr, "%-14s Define an input file to use (default is stdin)\n",
|
|
"-i input");
|
|
fprintf(stderr, "%-14s Define an output file to use (default is stdout)\n",
|
|
"-o output");
|
|
fprintf(stderr, "%-14s Don't wrap long output lines\n",
|
|
"-w");
|
|
fprintf(stderr, "%-14s Use UTF-8 (default is to show non-ascii as .)\n",
|
|
"-u");
|
|
exit(-1);
|
|
}
|
|
|
|
int
|
|
main(int argc, char **argv)
|
|
{
|
|
int rv, ascii;
|
|
char *progName;
|
|
FILE *outFile;
|
|
PRFileDesc *inFile;
|
|
SECItem der, data;
|
|
char *typeTag;
|
|
PLOptState *optstate;
|
|
PRBool wrap = PR_TRUE;
|
|
|
|
progName = strrchr(argv[0], '/');
|
|
progName = progName ? progName + 1 : argv[0];
|
|
|
|
ascii = 0;
|
|
inFile = 0;
|
|
outFile = 0;
|
|
typeTag = 0;
|
|
optstate = PL_CreateOptState(argc, argv, "at:i:o:uw");
|
|
while (PL_GetNextOpt(optstate) == PL_OPT_OK) {
|
|
switch (optstate->option) {
|
|
case '?':
|
|
Usage(progName);
|
|
break;
|
|
|
|
case 'a':
|
|
ascii = 1;
|
|
break;
|
|
|
|
case 'i':
|
|
inFile = PR_Open(optstate->value, PR_RDONLY, 0);
|
|
if (!inFile) {
|
|
fprintf(stderr, "%s: unable to open \"%s\" for reading\n",
|
|
progName, optstate->value);
|
|
PORT_Free(typeTag);
|
|
PL_DestroyOptState(optstate);
|
|
return -1;
|
|
}
|
|
break;
|
|
|
|
case 'o':
|
|
outFile = fopen(optstate->value, "w");
|
|
if (!outFile) {
|
|
fprintf(stderr, "%s: unable to open \"%s\" for writing\n",
|
|
progName, optstate->value);
|
|
PORT_Free(typeTag);
|
|
PL_DestroyOptState(optstate);
|
|
return -1;
|
|
}
|
|
break;
|
|
|
|
case 't':
|
|
typeTag = strdup(optstate->value);
|
|
break;
|
|
|
|
case 'u':
|
|
SECU_EnableUtf8Display(PR_TRUE);
|
|
break;
|
|
|
|
case 'w':
|
|
wrap = PR_FALSE;
|
|
break;
|
|
}
|
|
}
|
|
PL_DestroyOptState(optstate);
|
|
if (!typeTag)
|
|
Usage(progName);
|
|
|
|
if (!inFile)
|
|
inFile = PR_STDIN;
|
|
if (!outFile)
|
|
outFile = stdout;
|
|
|
|
PR_Init(PR_SYSTEM_THREAD, PR_PRIORITY_NORMAL, 1);
|
|
rv = NSS_NoDB_Init(NULL);
|
|
if (rv != SECSuccess) {
|
|
fprintf(stderr, "%s: NSS_NoDB_Init failed (%s)\n",
|
|
progName, SECU_Strerror(PORT_GetError()));
|
|
exit(1);
|
|
}
|
|
SECU_RegisterDynamicOids();
|
|
|
|
rv = SECU_ReadDERFromFile(&der, inFile, ascii, PR_FALSE);
|
|
if (rv != SECSuccess) {
|
|
fprintf(stderr, "%s: SECU_ReadDERFromFile failed\n", progName);
|
|
exit(1);
|
|
}
|
|
|
|
/* Data is untyped, using the specified type */
|
|
data.data = der.data;
|
|
data.len = der.len;
|
|
|
|
SECU_EnableWrap(wrap);
|
|
|
|
/* Pretty print it */
|
|
if (PORT_Strcmp(typeTag, SEC_CT_CERTIFICATE) == 0 ||
|
|
PORT_Strcmp(typeTag, "c") == 0) {
|
|
rv = SECU_PrintSignedData(outFile, &data, "Certificate", 0,
|
|
(SECU_PPFunc)SECU_PrintCertificate);
|
|
} else if (PORT_Strcmp(typeTag, SEC_CT_CERTIFICATE_ID) == 0 ||
|
|
PORT_Strcmp(typeTag, "ci") == 0) {
|
|
rv = SECU_PrintSignedContent(outFile, &data, 0, 0,
|
|
SECU_PrintDumpDerIssuerAndSerial);
|
|
} else if (PORT_Strcmp(typeTag, SEC_CT_CERTIFICATE_REQUEST) == 0 ||
|
|
PORT_Strcmp(typeTag, "cr") == 0) {
|
|
rv = SECU_PrintSignedData(outFile, &data, "Certificate Request", 0,
|
|
SECU_PrintCertificateRequest);
|
|
} else if (PORT_Strcmp(typeTag, SEC_CT_CRL) == 0) {
|
|
rv = SECU_PrintSignedData(outFile, &data, "CRL", 0, SECU_PrintCrl);
|
|
#ifdef HAVE_EPV_TEMPLATE
|
|
} else if (PORT_Strcmp(typeTag, SEC_CT_PRIVATE_KEY) == 0 ||
|
|
PORT_Strcmp(typeTag, "sk") == 0) {
|
|
rv = SECU_PrintPrivateKey(outFile, &data, "Private Key", 0);
|
|
#endif
|
|
} else if (PORT_Strcmp(typeTag, SEC_CT_PUBLIC_KEY) == 0 ||
|
|
PORT_Strcmp(typeTag, "pk") == 0) {
|
|
rv = SECU_PrintSubjectPublicKeyInfo(outFile, &data, "Public Key", 0);
|
|
} else if (PORT_Strcmp(typeTag, SEC_CT_PKCS7) == 0 ||
|
|
PORT_Strcmp(typeTag, "p7") == 0) {
|
|
rv = SECU_PrintPKCS7ContentInfo(outFile, &data,
|
|
"PKCS #7 Content Info", 0);
|
|
} else if (PORT_Strcmp(typeTag, SEC_CT_NAME) == 0 ||
|
|
PORT_Strcmp(typeTag, "n") == 0) {
|
|
rv = SECU_PrintDERName(outFile, &data, "Name", 0);
|
|
} else {
|
|
fprintf(stderr, "%s: don't know how to print out '%s' files\n",
|
|
progName, typeTag);
|
|
SECU_PrintAny(outFile, &data, "File contains", 0);
|
|
return -1;
|
|
}
|
|
|
|
PORT_Free(typeTag);
|
|
|
|
if (inFile != PR_STDIN)
|
|
PR_Close(inFile);
|
|
PORT_Free(der.data);
|
|
if (rv) {
|
|
fprintf(stderr, "%s: problem converting data (%s)\n",
|
|
progName, SECU_Strerror(PORT_GetError()));
|
|
}
|
|
if (NSS_Shutdown() != SECSuccess) {
|
|
fprintf(stderr, "%s: NSS_Shutdown failed (%s)\n",
|
|
progName, SECU_Strerror(PORT_GetError()));
|
|
rv = SECFailure;
|
|
}
|
|
PR_Cleanup();
|
|
return rv;
|
|
}
|