/* Copyright (C) 2012-2015 Carl Hetherington This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ /** @file src/certificate.cc * @brief Certificate class. */ #include "KM_util.h" #include "certificate.h" #include "compose.hpp" #include "exceptions.h" #include "util.h" #include "dcp_assert.h" #include #include #include #include #include #include #include #include using std::list; using std::string; using std::ostream; using std::min; using std::stringstream; using namespace dcp; static string const begin_certificate = "-----BEGIN CERTIFICATE-----"; static string const end_certificate = "-----END CERTIFICATE-----"; /** @param c X509 certificate, which this object will take ownership of */ Certificate::Certificate (X509* c) : _certificate (c) , _public_key (0) { } /** Load an X509 certificate from a string. * @param cert String to read from. */ Certificate::Certificate (string cert) : _certificate (0) , _public_key (0) { read_string (cert); } /** Copy constructor. * @param other Certificate to copy. */ Certificate::Certificate (Certificate const & other) : _certificate (0) , _public_key (0) { if (other._certificate) { read_string (other.certificate (true)); } } /** Read a certificate from a string. * @param cert String to read. */ void Certificate::read_string (string cert) { /* Reformat cert so that it has line breaks every 64 characters. See http://comments.gmane.org/gmane.comp.encryption.openssl.user/55593 */ stringstream s (cert); string line; /* BEGIN */ getline (s, line); boost::algorithm::trim (line); if (line != begin_certificate) { throw MiscError ("missing BEGIN line in certificate"); } /* The base64 data */ bool got_end = false; string base64 = ""; while (getline (s, line)) { boost::algorithm::trim (line); if (line == end_certificate) { got_end = true; break; } base64 += line; } if (!got_end) { throw MiscError ("missing END line in certificate"); } /* Make up the fixed version */ string fixed = begin_certificate + "\n"; while (!base64.empty ()) { size_t const t = min (size_t(64), base64.length()); fixed += base64.substr (0, t) + "\n"; base64 = base64.substr (t, base64.length() - t); } fixed += end_certificate; BIO* bio = BIO_new_mem_buf (const_cast (fixed.c_str ()), -1); if (!bio) { throw MiscError ("could not create memory BIO"); } _certificate = PEM_read_bio_X509 (bio, 0, 0, 0); if (!_certificate) { throw MiscError ("could not read X509 certificate from memory BIO"); } BIO_free (bio); } /** Destructor */ Certificate::~Certificate () { X509_free (_certificate); RSA_free (_public_key); } /** operator= for Certificate. * @param other Certificate to read from. */ Certificate & Certificate::operator= (Certificate const & other) { if (this == &other) { return *this; } X509_free (_certificate); _certificate = 0; RSA_free (_public_key); _public_key = 0; read_string (other.certificate (true)); return *this; } /** Return the certificate as a string. * @param with_begin_end true to include the -----BEGIN CERTIFICATE--- / -----END CERTIFICATE----- markers. * @return Certificate string. */ string Certificate::certificate (bool with_begin_end) const { DCP_ASSERT (_certificate); BIO* bio = BIO_new (BIO_s_mem ()); if (!bio) { throw MiscError ("could not create memory BIO"); } PEM_write_bio_X509 (bio, _certificate); string s; char* data; long int const data_length = BIO_get_mem_data (bio, &data); for (long int i = 0; i < data_length; ++i) { s += data[i]; } BIO_free (bio); if (!with_begin_end) { boost::replace_all (s, begin_certificate + "\n", ""); boost::replace_all (s, "\n" + end_certificate + "\n", ""); } return s; } /** @return Certificate's issuer, in the form * dnqualifier=<dnQualififer>,CN=<commonName>,OU=<organizationalUnitName>,O=<organizationName> * and with + signs escaped to \+ */ string Certificate::issuer () const { DCP_ASSERT (_certificate); return name_for_xml (X509_get_issuer_name (_certificate)); } string Certificate::asn_to_utf8 (ASN1_STRING* s) { unsigned char* buf = 0; ASN1_STRING_to_UTF8 (&buf, s); string const u (reinterpret_cast (buf)); OPENSSL_free (buf); return u; } string Certificate::get_name_part (X509_NAME* n, int nid) { int p = -1; p = X509_NAME_get_index_by_NID (n, nid, p); if (p == -1) { return ""; } return asn_to_utf8 (X509_NAME_ENTRY_get_data (X509_NAME_get_entry (n, p))); } string Certificate::name_for_xml (X509_NAME* name) { assert (name); BIO* bio = BIO_new (BIO_s_mem ()); if (!bio) { throw MiscError ("could not create memory BIO"); } X509_NAME_print_ex (bio, name, 0, XN_FLAG_RFC2253); int n = BIO_pending (bio); char* result = new char[n + 1]; n = BIO_read (bio, result, n); result[n] = '\0'; BIO_free (bio); string s = result; delete[] result; return s; } string Certificate::subject () const { DCP_ASSERT (_certificate); return name_for_xml (X509_get_subject_name (_certificate)); } string Certificate::subject_common_name () const { DCP_ASSERT (_certificate); return get_name_part (X509_get_subject_name (_certificate), NID_commonName); } string Certificate::subject_organization_name () const { DCP_ASSERT (_certificate); return get_name_part (X509_get_subject_name (_certificate), NID_organizationName); } string Certificate::subject_organizational_unit_name () const { DCP_ASSERT (_certificate); return get_name_part (X509_get_subject_name (_certificate), NID_organizationalUnitName); } string Certificate::serial () const { DCP_ASSERT (_certificate); ASN1_INTEGER* s = X509_get_serialNumber (_certificate); DCP_ASSERT (s); BIGNUM* b = ASN1_INTEGER_to_BN (s, 0); char* c = BN_bn2dec (b); BN_free (b); string st (c); OPENSSL_free (c); return st; } string Certificate::thumbprint () const { DCP_ASSERT (_certificate); uint8_t buffer[8192]; uint8_t* p = buffer; i2d_X509_CINF (_certificate->cert_info, &p); unsigned int const length = p - buffer; if (length > sizeof (buffer)) { throw MiscError ("buffer too small to generate thumbprint"); } SHA_CTX sha; SHA1_Init (&sha); SHA1_Update (&sha, buffer, length); uint8_t digest[20]; SHA1_Final (digest, &sha); char digest_base64[64]; return Kumu::base64encode (digest, 20, digest_base64, 64); } /** @return RSA public key from this Certificate. Caller must not free the returned value. */ RSA * Certificate::public_key () const { DCP_ASSERT (_certificate); if (_public_key) { return _public_key; } EVP_PKEY* key = X509_get_pubkey (_certificate); if (!key) { throw MiscError ("could not get public key from certificate"); } _public_key = EVP_PKEY_get1_RSA (key); if (!_public_key) { throw MiscError (String::compose ("could not get RSA public key (%1)", ERR_error_string (ERR_get_error(), 0))); } return _public_key; } bool dcp::operator== (Certificate const & a, Certificate const & b) { return a.certificate() == b.certificate(); } bool dcp::operator< (Certificate const & a, Certificate const & b) { return a.certificate() < b.certificate(); } ostream& dcp::operator<< (ostream& s, Certificate const & c) { s << c.certificate(); return s; }