diff options
| author | Carl Hetherington <cth@carlh.net> | 2015-07-30 00:48:43 +0100 |
|---|---|---|
| committer | Carl Hetherington <cth@carlh.net> | 2015-07-30 00:48:43 +0100 |
| commit | 0f09e4f7335fb125273aa3d1dc397797a2eba1dd (patch) | |
| tree | 7bdbbcecde8c6337c86286302610c93d348a0a9a /src/certificate.cc | |
| parent | 5a2aaaa015d092beb787eae50731d2f7fc6cbb7f (diff) | |
Rename certificates.{cc,h} -> certificate.{cc,h}.
Diffstat (limited to 'src/certificate.cc')
| -rw-r--r-- | src/certificate.cc | 318 |
1 files changed, 318 insertions, 0 deletions
diff --git a/src/certificate.cc b/src/certificate.cc new file mode 100644 index 00000000..fcc7b0ae --- /dev/null +++ b/src/certificate.cc @@ -0,0 +1,318 @@ +/* + Copyright (C) 2012-2014 Carl Hetherington <cth@carlh.net> + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. + +*/ + +/** @file src/certificates.cc + * @brief Certificate and CertificateChain classes. + */ + +#include "KM_util.h" +#include "certificate.h" +#include "compose.hpp" +#include "exceptions.h" +#include "util.h" +#include "dcp_assert.h" +#include <libxml++/nodes/element.h> +#include <openssl/x509.h> +#include <openssl/ssl.h> +#include <openssl/asn1.h> +#include <openssl/err.h> +#include <boost/algorithm/string.hpp> +#include <cerrno> +#include <algorithm> + +using std::list; +using std::string; +using std::ostream; +using namespace dcp; + +/** @param c X509 certificate, which this object will take ownership of */ +Certificate::Certificate (X509* c) + : _certificate (c) + , _public_key (0) +{ + +} + +/** Load an X509 certificate from a string. + * @param cert String to read from. + */ +Certificate::Certificate (string cert) + : _certificate (0) + , _public_key (0) +{ + read_string (cert); +} + +/** Copy constructor. + * @param other Certificate to copy. + */ +Certificate::Certificate (Certificate const & other) + : _certificate (0) + , _public_key (0) +{ + read_string (other.certificate (true)); +} + +/** Read a certificate from a string. + * @param cert String to read. + */ +void +Certificate::read_string (string cert) +{ + BIO* bio = BIO_new_mem_buf (const_cast<char *> (cert.c_str ()), -1); + if (!bio) { + throw MiscError ("could not create memory BIO"); + } + + _certificate = PEM_read_bio_X509 (bio, 0, 0, 0); + if (!_certificate) { + throw MiscError ("could not read X509 certificate from memory BIO"); + } + + BIO_free (bio); +} + +/** Destructor */ +Certificate::~Certificate () +{ + X509_free (_certificate); + RSA_free (_public_key); +} + +/** operator= for Certificate. + * @param other Certificate to read from. + */ +Certificate & +Certificate::operator= (Certificate const & other) +{ + if (this == &other) { + return *this; + } + + X509_free (_certificate); + _certificate = 0; + RSA_free (_public_key); + _public_key = 0; + + read_string (other.certificate (true)); + + return *this; +} + +/** Return the certificate as a string. + * @param with_begin_end true to include the -----BEGIN CERTIFICATE--- / -----END CERTIFICATE----- markers. + * @return Certificate string. + */ +string +Certificate::certificate (bool with_begin_end) const +{ + DCP_ASSERT (_certificate); + + BIO* bio = BIO_new (BIO_s_mem ()); + if (!bio) { + throw MiscError ("could not create memory BIO"); + } + + PEM_write_bio_X509 (bio, _certificate); + + string s; + char* data; + long int const data_length = BIO_get_mem_data (bio, &data); + for (long int i = 0; i < data_length; ++i) { + s += data[i]; + } + + BIO_free (bio); + + if (!with_begin_end) { + boost::replace_all (s, "-----BEGIN CERTIFICATE-----\n", ""); + boost::replace_all (s, "\n-----END CERTIFICATE-----\n", ""); + } + + return s; +} + +/** @return Certificate's issuer, in the form + * dnqualifier=<dnQualififer>,CN=<commonName>,OU=<organizationalUnitName>,O=<organizationName> + * and with + signs escaped to \+ + */ +string +Certificate::issuer () const +{ + DCP_ASSERT (_certificate); + return name_for_xml (X509_get_issuer_name (_certificate)); +} + +string +Certificate::asn_to_utf8 (ASN1_STRING* s) +{ + unsigned char* buf = 0; + ASN1_STRING_to_UTF8 (&buf, s); + string const u (reinterpret_cast<char *> (buf)); + OPENSSL_free (buf); + return u; +} + +string +Certificate::get_name_part (X509_NAME* n, int nid) +{ + int p = -1; + p = X509_NAME_get_index_by_NID (n, nid, p); + DCP_ASSERT (p != -1); + return asn_to_utf8 (X509_NAME_ENTRY_get_data (X509_NAME_get_entry (n, p))); +} + +string +Certificate::name_for_xml (X509_NAME* name) +{ + assert (name); + + BIO* bio = BIO_new (BIO_s_mem ()); + if (!bio) { + throw MiscError ("could not create memory BIO"); + } + + X509_NAME_print_ex (bio, name, 0, XN_FLAG_RFC2253); + int n = BIO_pending (bio); + char* result = new char[n + 1]; + n = BIO_read (bio, result, n); + result[n] = '\0'; + + BIO_free (bio); + + string s = result; + delete[] result; + + return s; +} + +string +Certificate::subject () const +{ + DCP_ASSERT (_certificate); + + return name_for_xml (X509_get_subject_name (_certificate)); +} + +string +Certificate::subject_common_name () const +{ + DCP_ASSERT (_certificate); + + return get_name_part (X509_get_subject_name (_certificate), NID_commonName); +} + +string +Certificate::subject_organization_name () const +{ + DCP_ASSERT (_certificate); + + return get_name_part (X509_get_subject_name (_certificate), NID_organizationName); +} + +string +Certificate::subject_organizational_unit_name () const +{ + DCP_ASSERT (_certificate); + + return get_name_part (X509_get_subject_name (_certificate), NID_organizationalUnitName); +} + +string +Certificate::serial () const +{ + DCP_ASSERT (_certificate); + + ASN1_INTEGER* s = X509_get_serialNumber (_certificate); + DCP_ASSERT (s); + + BIGNUM* b = ASN1_INTEGER_to_BN (s, 0); + char* c = BN_bn2dec (b); + BN_free (b); + + string st (c); + OPENSSL_free (c); + + return st; +} + +string +Certificate::thumbprint () const +{ + DCP_ASSERT (_certificate); + + uint8_t buffer[8192]; + uint8_t* p = buffer; + i2d_X509_CINF (_certificate->cert_info, &p); + unsigned int const length = p - buffer; + if (length > sizeof (buffer)) { + throw MiscError ("buffer too small to generate thumbprint"); + } + + SHA_CTX sha; + SHA1_Init (&sha); + SHA1_Update (&sha, buffer, length); + uint8_t digest[20]; + SHA1_Final (digest, &sha); + + char digest_base64[64]; + return Kumu::base64encode (digest, 20, digest_base64, 64); +} + +/** @return RSA public key from this Certificate. Caller must not free the returned value. */ +RSA * +Certificate::public_key () const +{ + DCP_ASSERT (_certificate); + + if (_public_key) { + return _public_key; + } + + EVP_PKEY* key = X509_get_pubkey (_certificate); + if (!key) { + throw MiscError ("could not get public key from certificate"); + } + + _public_key = EVP_PKEY_get1_RSA (key); + if (!_public_key) { + throw MiscError (String::compose ("could not get RSA public key (%1)", ERR_error_string (ERR_get_error(), 0))); + } + + return _public_key; +} + +bool +dcp::operator== (Certificate const & a, Certificate const & b) +{ + return a.certificate() == b.certificate(); +} + +bool +dcp::operator< (Certificate const & a, Certificate const & b) +{ + return a.certificate() < b.certificate(); +} + +ostream& +dcp::operator<< (ostream& s, Certificate const & c) +{ + s << c.certificate(); + return s; +} |
