summaryrefslogtreecommitdiff
path: root/src/certificate.cc
diff options
context:
space:
mode:
authorCarl Hetherington <cth@carlh.net>2015-07-30 00:48:43 +0100
committerCarl Hetherington <cth@carlh.net>2015-07-30 00:48:43 +0100
commit0f09e4f7335fb125273aa3d1dc397797a2eba1dd (patch)
tree7bdbbcecde8c6337c86286302610c93d348a0a9a /src/certificate.cc
parent5a2aaaa015d092beb787eae50731d2f7fc6cbb7f (diff)
Rename certificates.{cc,h} -> certificate.{cc,h}.
Diffstat (limited to 'src/certificate.cc')
-rw-r--r--src/certificate.cc318
1 files changed, 318 insertions, 0 deletions
diff --git a/src/certificate.cc b/src/certificate.cc
new file mode 100644
index 00000000..fcc7b0ae
--- /dev/null
+++ b/src/certificate.cc
@@ -0,0 +1,318 @@
+/*
+ Copyright (C) 2012-2014 Carl Hetherington <cth@carlh.net>
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 2 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program; if not, write to the Free Software
+ Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+
+*/
+
+/** @file src/certificates.cc
+ * @brief Certificate and CertificateChain classes.
+ */
+
+#include "KM_util.h"
+#include "certificate.h"
+#include "compose.hpp"
+#include "exceptions.h"
+#include "util.h"
+#include "dcp_assert.h"
+#include <libxml++/nodes/element.h>
+#include <openssl/x509.h>
+#include <openssl/ssl.h>
+#include <openssl/asn1.h>
+#include <openssl/err.h>
+#include <boost/algorithm/string.hpp>
+#include <cerrno>
+#include <algorithm>
+
+using std::list;
+using std::string;
+using std::ostream;
+using namespace dcp;
+
+/** @param c X509 certificate, which this object will take ownership of */
+Certificate::Certificate (X509* c)
+ : _certificate (c)
+ , _public_key (0)
+{
+
+}
+
+/** Load an X509 certificate from a string.
+ * @param cert String to read from.
+ */
+Certificate::Certificate (string cert)
+ : _certificate (0)
+ , _public_key (0)
+{
+ read_string (cert);
+}
+
+/** Copy constructor.
+ * @param other Certificate to copy.
+ */
+Certificate::Certificate (Certificate const & other)
+ : _certificate (0)
+ , _public_key (0)
+{
+ read_string (other.certificate (true));
+}
+
+/** Read a certificate from a string.
+ * @param cert String to read.
+ */
+void
+Certificate::read_string (string cert)
+{
+ BIO* bio = BIO_new_mem_buf (const_cast<char *> (cert.c_str ()), -1);
+ if (!bio) {
+ throw MiscError ("could not create memory BIO");
+ }
+
+ _certificate = PEM_read_bio_X509 (bio, 0, 0, 0);
+ if (!_certificate) {
+ throw MiscError ("could not read X509 certificate from memory BIO");
+ }
+
+ BIO_free (bio);
+}
+
+/** Destructor */
+Certificate::~Certificate ()
+{
+ X509_free (_certificate);
+ RSA_free (_public_key);
+}
+
+/** operator= for Certificate.
+ * @param other Certificate to read from.
+ */
+Certificate &
+Certificate::operator= (Certificate const & other)
+{
+ if (this == &other) {
+ return *this;
+ }
+
+ X509_free (_certificate);
+ _certificate = 0;
+ RSA_free (_public_key);
+ _public_key = 0;
+
+ read_string (other.certificate (true));
+
+ return *this;
+}
+
+/** Return the certificate as a string.
+ * @param with_begin_end true to include the -----BEGIN CERTIFICATE--- / -----END CERTIFICATE----- markers.
+ * @return Certificate string.
+ */
+string
+Certificate::certificate (bool with_begin_end) const
+{
+ DCP_ASSERT (_certificate);
+
+ BIO* bio = BIO_new (BIO_s_mem ());
+ if (!bio) {
+ throw MiscError ("could not create memory BIO");
+ }
+
+ PEM_write_bio_X509 (bio, _certificate);
+
+ string s;
+ char* data;
+ long int const data_length = BIO_get_mem_data (bio, &data);
+ for (long int i = 0; i < data_length; ++i) {
+ s += data[i];
+ }
+
+ BIO_free (bio);
+
+ if (!with_begin_end) {
+ boost::replace_all (s, "-----BEGIN CERTIFICATE-----\n", "");
+ boost::replace_all (s, "\n-----END CERTIFICATE-----\n", "");
+ }
+
+ return s;
+}
+
+/** @return Certificate's issuer, in the form
+ * dnqualifier=&lt;dnQualififer&gt;,CN=&lt;commonName&gt;,OU=&lt;organizationalUnitName&gt,O=&lt;organizationName&gt;
+ * and with + signs escaped to \+
+ */
+string
+Certificate::issuer () const
+{
+ DCP_ASSERT (_certificate);
+ return name_for_xml (X509_get_issuer_name (_certificate));
+}
+
+string
+Certificate::asn_to_utf8 (ASN1_STRING* s)
+{
+ unsigned char* buf = 0;
+ ASN1_STRING_to_UTF8 (&buf, s);
+ string const u (reinterpret_cast<char *> (buf));
+ OPENSSL_free (buf);
+ return u;
+}
+
+string
+Certificate::get_name_part (X509_NAME* n, int nid)
+{
+ int p = -1;
+ p = X509_NAME_get_index_by_NID (n, nid, p);
+ DCP_ASSERT (p != -1);
+ return asn_to_utf8 (X509_NAME_ENTRY_get_data (X509_NAME_get_entry (n, p)));
+}
+
+string
+Certificate::name_for_xml (X509_NAME* name)
+{
+ assert (name);
+
+ BIO* bio = BIO_new (BIO_s_mem ());
+ if (!bio) {
+ throw MiscError ("could not create memory BIO");
+ }
+
+ X509_NAME_print_ex (bio, name, 0, XN_FLAG_RFC2253);
+ int n = BIO_pending (bio);
+ char* result = new char[n + 1];
+ n = BIO_read (bio, result, n);
+ result[n] = '\0';
+
+ BIO_free (bio);
+
+ string s = result;
+ delete[] result;
+
+ return s;
+}
+
+string
+Certificate::subject () const
+{
+ DCP_ASSERT (_certificate);
+
+ return name_for_xml (X509_get_subject_name (_certificate));
+}
+
+string
+Certificate::subject_common_name () const
+{
+ DCP_ASSERT (_certificate);
+
+ return get_name_part (X509_get_subject_name (_certificate), NID_commonName);
+}
+
+string
+Certificate::subject_organization_name () const
+{
+ DCP_ASSERT (_certificate);
+
+ return get_name_part (X509_get_subject_name (_certificate), NID_organizationName);
+}
+
+string
+Certificate::subject_organizational_unit_name () const
+{
+ DCP_ASSERT (_certificate);
+
+ return get_name_part (X509_get_subject_name (_certificate), NID_organizationalUnitName);
+}
+
+string
+Certificate::serial () const
+{
+ DCP_ASSERT (_certificate);
+
+ ASN1_INTEGER* s = X509_get_serialNumber (_certificate);
+ DCP_ASSERT (s);
+
+ BIGNUM* b = ASN1_INTEGER_to_BN (s, 0);
+ char* c = BN_bn2dec (b);
+ BN_free (b);
+
+ string st (c);
+ OPENSSL_free (c);
+
+ return st;
+}
+
+string
+Certificate::thumbprint () const
+{
+ DCP_ASSERT (_certificate);
+
+ uint8_t buffer[8192];
+ uint8_t* p = buffer;
+ i2d_X509_CINF (_certificate->cert_info, &p);
+ unsigned int const length = p - buffer;
+ if (length > sizeof (buffer)) {
+ throw MiscError ("buffer too small to generate thumbprint");
+ }
+
+ SHA_CTX sha;
+ SHA1_Init (&sha);
+ SHA1_Update (&sha, buffer, length);
+ uint8_t digest[20];
+ SHA1_Final (digest, &sha);
+
+ char digest_base64[64];
+ return Kumu::base64encode (digest, 20, digest_base64, 64);
+}
+
+/** @return RSA public key from this Certificate. Caller must not free the returned value. */
+RSA *
+Certificate::public_key () const
+{
+ DCP_ASSERT (_certificate);
+
+ if (_public_key) {
+ return _public_key;
+ }
+
+ EVP_PKEY* key = X509_get_pubkey (_certificate);
+ if (!key) {
+ throw MiscError ("could not get public key from certificate");
+ }
+
+ _public_key = EVP_PKEY_get1_RSA (key);
+ if (!_public_key) {
+ throw MiscError (String::compose ("could not get RSA public key (%1)", ERR_error_string (ERR_get_error(), 0)));
+ }
+
+ return _public_key;
+}
+
+bool
+dcp::operator== (Certificate const & a, Certificate const & b)
+{
+ return a.certificate() == b.certificate();
+}
+
+bool
+dcp::operator< (Certificate const & a, Certificate const & b)
+{
+ return a.certificate() < b.certificate();
+}
+
+ostream&
+dcp::operator<< (ostream& s, Certificate const & c)
+{
+ s << c.certificate();
+ return s;
+}