2 Copyright (C) 2012-2015 Carl Hetherington <cth@carlh.net>
4 This program is free software; you can redistribute it and/or modify
5 it under the terms of the GNU General Public License as published by
6 the Free Software Foundation; either version 2 of the License, or
7 (at your option) any later version.
9 This program is distributed in the hope that it will be useful,
10 but WITHOUT ANY WARRANTY; without even the implied warranty of
11 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 GNU General Public License for more details.
14 You should have received a copy of the GNU General Public License
15 along with this program; if not, write to the Free Software
16 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
20 /** @file src/certificate.cc
21 * @brief Certificate class.
25 #include "certificate.h"
26 #include "compose.hpp"
27 #include "exceptions.h"
29 #include "dcp_assert.h"
30 #include <libxml++/nodes/element.h>
31 #include <openssl/x509.h>
32 #include <openssl/ssl.h>
33 #include <openssl/asn1.h>
34 #include <openssl/err.h>
35 #include <boost/algorithm/string.hpp>
44 using std::stringstream;
47 static string const begin_certificate = "-----BEGIN CERTIFICATE-----";
48 static string const end_certificate = "-----END CERTIFICATE-----";
50 /** @param c X509 certificate, which this object will take ownership of */
51 Certificate::Certificate (X509* c)
59 /** Load an X509 certificate from a string.
60 * @param cert String to read from.
62 Certificate::Certificate (string cert)
66 _extra_data = read_string (cert);
70 * @param other Certificate to copy.
72 Certificate::Certificate (Certificate const & other)
75 , _extra_data (other._extra_data)
77 if (other._certificate) {
78 read_string (other.certificate (true));
82 /** Read a certificate from a string.
83 * @param cert String to read.
84 * @return true if there is extra stuff after the end of the certificate, false if not.
87 Certificate::read_string (string cert)
89 /* Reformat cert so that it has line breaks every 64 characters.
90 See http://comments.gmane.org/gmane.comp.encryption.openssl.user/55593
93 stringstream s (cert);
99 boost::algorithm::trim (line);
100 } while (s.good() && line != begin_certificate);
102 if (line != begin_certificate) {
103 throw MiscError ("missing BEGIN line in certificate");
106 /* The base64 data */
107 bool got_end = false;
109 while (getline (s, line)) {
110 boost::algorithm::trim (line);
111 if (line == end_certificate) {
119 throw MiscError ("missing END line in certificate");
122 /* Make up the fixed version */
124 string fixed = begin_certificate + "\n";
125 while (!base64.empty ()) {
126 size_t const t = min (size_t(64), base64.length());
127 fixed += base64.substr (0, t) + "\n";
128 base64 = base64.substr (t, base64.length() - t);
131 fixed += end_certificate;
133 BIO* bio = BIO_new_mem_buf (const_cast<char *> (fixed.c_str ()), -1);
135 throw MiscError ("could not create memory BIO");
138 _certificate = PEM_read_bio_X509 (bio, 0, 0, 0);
140 throw MiscError ("could not read X509 certificate from memory BIO");
145 /* See if there are any non-blank lines after the certificate that we read */
147 while (s.good() && line.empty()) {
150 return (s.good() && !line.empty());
154 Certificate::~Certificate ()
156 X509_free (_certificate);
157 RSA_free (_public_key);
160 /** operator= for Certificate.
161 * @param other Certificate to read from.
164 Certificate::operator= (Certificate const & other)
166 if (this == &other) {
170 X509_free (_certificate);
172 RSA_free (_public_key);
174 _extra_data = other._extra_data;
176 read_string (other.certificate (true));
181 /** Return the certificate as a string.
182 * @param with_begin_end true to include the -----BEGIN CERTIFICATE--- / -----END CERTIFICATE----- markers.
183 * @return Certificate string.
186 Certificate::certificate (bool with_begin_end) const
188 DCP_ASSERT (_certificate);
190 BIO* bio = BIO_new (BIO_s_mem ());
192 throw MiscError ("could not create memory BIO");
195 PEM_write_bio_X509 (bio, _certificate);
199 long int const data_length = BIO_get_mem_data (bio, &data);
200 for (long int i = 0; i < data_length; ++i) {
206 if (!with_begin_end) {
207 boost::replace_all (s, begin_certificate + "\n", "");
208 boost::replace_all (s, "\n" + end_certificate + "\n", "");
214 /** @return Certificate's issuer, in the form
215 * dnqualifier=<dnQualififer>,CN=<commonName>,OU=<organizationalUnitName>,O=<organizationName>
216 * and with + signs escaped to \+
219 Certificate::issuer () const
221 DCP_ASSERT (_certificate);
222 return name_for_xml (X509_get_issuer_name (_certificate));
226 Certificate::asn_to_utf8 (ASN1_STRING* s)
228 unsigned char* buf = 0;
229 ASN1_STRING_to_UTF8 (&buf, s);
230 string const u (reinterpret_cast<char *> (buf));
236 Certificate::get_name_part (X509_NAME* n, int nid)
239 p = X509_NAME_get_index_by_NID (n, nid, p);
243 return asn_to_utf8 (X509_NAME_ENTRY_get_data (X509_NAME_get_entry (n, p)));
247 Certificate::name_for_xml (X509_NAME* name)
251 BIO* bio = BIO_new (BIO_s_mem ());
253 throw MiscError ("could not create memory BIO");
256 X509_NAME_print_ex (bio, name, 0, XN_FLAG_RFC2253);
257 int n = BIO_pending (bio);
258 char* result = new char[n + 1];
259 n = BIO_read (bio, result, n);
271 Certificate::subject () const
273 DCP_ASSERT (_certificate);
275 return name_for_xml (X509_get_subject_name (_certificate));
279 Certificate::subject_common_name () const
281 DCP_ASSERT (_certificate);
283 return get_name_part (X509_get_subject_name (_certificate), NID_commonName);
287 Certificate::subject_organization_name () const
289 DCP_ASSERT (_certificate);
291 return get_name_part (X509_get_subject_name (_certificate), NID_organizationName);
295 Certificate::subject_organizational_unit_name () const
297 DCP_ASSERT (_certificate);
299 return get_name_part (X509_get_subject_name (_certificate), NID_organizationalUnitName);
303 Certificate::serial () const
305 DCP_ASSERT (_certificate);
307 ASN1_INTEGER* s = X509_get_serialNumber (_certificate);
310 BIGNUM* b = ASN1_INTEGER_to_BN (s, 0);
311 char* c = BN_bn2dec (b);
321 Certificate::thumbprint () const
323 DCP_ASSERT (_certificate);
325 uint8_t buffer[8192];
327 i2d_X509_CINF (_certificate->cert_info, &p);
328 unsigned int const length = p - buffer;
329 if (length > sizeof (buffer)) {
330 throw MiscError ("buffer too small to generate thumbprint");
335 SHA1_Update (&sha, buffer, length);
337 SHA1_Final (digest, &sha);
339 char digest_base64[64];
340 return Kumu::base64encode (digest, 20, digest_base64, 64);
343 /** @return RSA public key from this Certificate. Caller must not free the returned value. */
345 Certificate::public_key () const
347 DCP_ASSERT (_certificate);
353 EVP_PKEY* key = X509_get_pubkey (_certificate);
355 throw MiscError ("could not get public key from certificate");
358 _public_key = EVP_PKEY_get1_RSA (key);
360 throw MiscError (String::compose ("could not get RSA public key (%1)", ERR_error_string (ERR_get_error(), 0)));
367 dcp::operator== (Certificate const & a, Certificate const & b)
369 return a.certificate() == b.certificate();
373 dcp::operator< (Certificate const & a, Certificate const & b)
375 return a.certificate() < b.certificate();
379 dcp::operator<< (ostream& s, Certificate const & c)
381 s << c.certificate();