/* * Copyright (C) 2010 Martin Willi * Copyright (C) 2010 revosec AG * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; either version 2 of the License, or (at your * option) any later version. See . * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * for more details. */ #include "pki.h" #include #include #include #include /** * Print public key information */ static void print_pubkey(public_key_t *key) { chunk_t chunk; printf("pubkey: %N %d bits\n", key_type_names, key->get_type(key), key->get_keysize(key) * 8); if (key->get_fingerprint(key, KEYID_PUBKEY_INFO_SHA1, &chunk)) { printf("keyid: %#B\n", &chunk); } if (key->get_fingerprint(key, KEYID_PUBKEY_SHA1, &chunk)) { printf("subjkey: %#B\n", &chunk); } } /** * Print private key information */ static void print_key(private_key_t *key) { public_key_t *public; public = key->get_public_key(key); if (public) { printf("private key with:\n"); print_pubkey(public); public->destroy(public); } else { printf("extracting public from private key failed\n"); } } /** * Print X509 specific certificate information */ static void print_x509(x509_t *x509) { enumerator_t *enumerator; identification_t *id; traffic_selector_t *block; chunk_t chunk; bool first; char *uri; int len; x509_flag_t flags; chunk = x509->get_serial(x509); printf("serial: %#B\n", &chunk); first = TRUE; enumerator = x509->create_subjectAltName_enumerator(x509); while (enumerator->enumerate(enumerator, &id)) { if (first) { printf("altNames: "); first = FALSE; } else { printf(", "); } printf("%Y", id); } if (!first) { printf("\n"); } enumerator->destroy(enumerator); flags = x509->get_flags(x509); printf("flags: "); if (flags & X509_CA) { printf("CA "); } if (flags & X509_AA) { printf("AA "); } if (flags & X509_OCSP_SIGNER) { printf("OCSP "); } if (flags & X509_AA) { printf("AA "); } if (flags & X509_SERVER_AUTH) { printf("serverAuth "); } if (flags & X509_CLIENT_AUTH) { printf("clientAuth "); } if (flags & X509_SELF_SIGNED) { printf("self-signed "); } printf("\n"); first = TRUE; enumerator = x509->create_crl_uri_enumerator(x509); while (enumerator->enumerate(enumerator, &uri)) { if (first) { printf("CRL URIs: %s\n", uri); first = FALSE; } else { printf(" %s\n", uri); } } enumerator->destroy(enumerator); first = TRUE; enumerator = x509->create_ocsp_uri_enumerator(x509); while (enumerator->enumerate(enumerator, &uri)) { if (first) { printf("OCSP URIs: %s\n", uri); first = FALSE; } else { printf(" %s\n", uri); } } enumerator->destroy(enumerator); len = x509->get_pathLenConstraint(x509); if (len != X509_NO_PATH_LEN_CONSTRAINT) { printf("pathlen: %d\n", len); } chunk = x509->get_authKeyIdentifier(x509); if (chunk.ptr) { printf("authkeyId: %#B\n", &chunk); } chunk = x509->get_subjectKeyIdentifier(x509); if (chunk.ptr) { printf("subjkeyId: %#B\n", &chunk); } if (x509->get_flags(x509) & X509_IP_ADDR_BLOCKS) { first = TRUE; printf("addresses: "); enumerator = x509->create_ipAddrBlock_enumerator(x509); while (enumerator->enumerate(enumerator, &block)) { if (first) { first = FALSE; } else { printf(", "); } printf("%R", block); } enumerator->destroy(enumerator); printf("\n"); } } /** * Print certificate information */ static void print_cert(certificate_t *cert) { time_t now, notAfter, notBefore; public_key_t *key; now = time(NULL); printf("cert: %N\n", certificate_type_names, cert->get_type(cert)); printf("subject: \"%Y\"\n", cert->get_subject(cert)); printf("issuer: \"%Y\"\n", cert->get_issuer(cert)); cert->get_validity(cert, &now, ¬Before, ¬After); printf("validity: not before %T, ", ¬Before, FALSE); if (now < notBefore) { printf("not valid yet (valid in %V)\n", &now, ¬Before); } else { printf("ok\n"); } printf(" not after %T, ", ¬After, FALSE); if (now > notAfter) { printf("expired (%V ago)\n", &now, ¬After); } else { printf("ok (expires in %V)\n", &now, ¬After); } switch (cert->get_type(cert)) { case CERT_X509: print_x509((x509_t*)cert); break; default: printf("parsing certificate subtype %N not implemented\n", certificate_type_names, cert->get_type(cert)); break; } key = cert->get_public_key(cert); if (key) { print_pubkey(key); key->destroy(key); } else { printf("unable to extract public key\n"); } } /** * Print a credential in a human readable form */ static int print() { credential_type_t type = CRED_CERTIFICATE; int subtype = CERT_X509; void *cred; char *arg, *file = NULL; while (TRUE) { switch (command_getopt(&arg)) { case 'h': return command_usage(NULL); case 't': if (streq(arg, "x509")) { type = CRED_CERTIFICATE; subtype = CERT_X509; } else if (streq(arg, "pub")) { type = CRED_PUBLIC_KEY; subtype = KEY_ANY; } else if (streq(arg, "rsa-priv")) { type = CRED_PRIVATE_KEY; subtype = KEY_RSA; } else if (streq(arg, "ecdsa-priv")) { type = CRED_PRIVATE_KEY; subtype = KEY_ECDSA; } else { return command_usage( "invalid input type"); } continue; case 'i': file = arg; continue; case EOF: break; default: return command_usage("invalid --print option"); } break; } if (file) { cred = lib->creds->create(lib->creds, type, subtype, BUILD_FROM_FILE, file, BUILD_END); } else { cred = lib->creds->create(lib->creds, type, subtype, BUILD_FROM_FD, 0, BUILD_END); } if (!cred) { fprintf(stderr, "parsing input failed\n"); return 1; } if (type == CRED_CERTIFICATE) { certificate_t *cert = (certificate_t*)cred; print_cert(cert); cert->destroy(cert); } if (type == CRED_PUBLIC_KEY) { public_key_t *key = (public_key_t*)cred; print_pubkey(key); key->destroy(key); } if (type == CRED_PRIVATE_KEY) { private_key_t *key = (private_key_t*)cred; print_key(key); key->destroy(key); } return 0; } /** * Register the command. */ static void __attribute__ ((constructor))reg() { command_register((command_t) { print, 'a', "print", "print a credential in a human readable form", {"[--in file] [--type rsa-priv|ecdsa-priv|pub|x509]"}, { {"help", 'h', 0, "show usage information"}, {"in", 'i', 1, "input file, default: stdin"}, {"type", 't', 1, "type of credential, default: x509"}, } }); }