1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
|
/**
* @file x509.h
*
* @brief Interface of x509_t.
*
*/
/*
* Copyright (C) 2006 Martin Willi, Andreas Steffen
* Hochschule fuer Technik Rapperswil
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the
* Free Software Foundation; either version 2 of the License, or (at your
* option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
*/
#ifndef X509_H_
#define X509_H_
typedef struct x509_t x509_t;
#include <library.h>
#include <crypto/rsa/rsa_public_key.h>
#include <crypto/certinfo.h>
#include <utils/identification.h>
#include <utils/iterator.h>
/* authority flags */
#define AUTH_NONE 0x00 /* no authorities */
#define AUTH_CA 0x01 /* certification authority */
#define AUTH_AA 0x02 /* authorization authority */
#define AUTH_OCSP 0x04 /* ocsp signing authority */
/**
* @brief X.509 certificate.
*
* @b Constructors:
* - x509_create_from_chunk()
* - x509_create_from_file()
*
* @todo more code cleanup needed!
* @todo fix unimplemented functions...
* @todo handle memory management
*
* @ingroup transforms
*/
struct x509_t {
/**
* @brief Set trusted public key life.
*
* @param this calling object
* @param until time until public key is trusted
*/
void (*set_until) (x509_t *this, time_t until);
/**
* @brief Get trusted public key life.
*
* @param this calling object
* @return time until public key is trusted
*/
time_t (*get_until) (const x509_t *this);
/**
* @brief Set the certificate status
*
* @param this calling object
* @param status certificate status
*/
void (*set_status) (x509_t *this, cert_status_t status);
/**
* @brief Get the certificate status
*
* @param this calling object
* @return certificate status
*/
cert_status_t (*get_status) (const x509_t *this);
/**
* @brief Add authority flags
*
* @param this calling object
* @param flag flags to be added
*/
void (*add_authority_flags) (x509_t *this, u_int flags);
/**
* @brief Get authority flags
*
* @param this calling object
* @return authority flags
*/
u_int (*get_authority_flags) (x509_t *this);
/**
* @brief Check a specific authority flag
*
* @param this calling object
* @param flag flag to be checked
* @return TRUE if flag is present
*/
bool (*has_authority_flag) (x509_t *this, u_int flag);
/**
* @brief Get the DER-encoded X.509 certificate body
*
* @param this calling object
* @return DER-encoded X.509 certificate
*/
chunk_t (*get_certificate) (const x509_t *this);
/**
* @brief Get the RSA public key from the certificate.
*
* @param this calling object
* @return public_key
*/
rsa_public_key_t *(*get_public_key) (const x509_t *this);
/**
* @brief Get serial number from the certificate.
*
* @param this calling object
* @return serialNumber
*/
chunk_t (*get_serialNumber) (const x509_t *this);
/**
* @brief Get subjectKeyID from the certificate.
*
* @param this calling object
* @return subjectKeyID
*/
chunk_t (*get_subjectKeyID) (const x509_t *this);
/**
* @brief Get keyid from the certificate's public key.
*
* @param this calling object
* @return keyid
*/
chunk_t (*get_keyid) (const x509_t *this);
/**
* @brief Get the certificate issuer's ID.
*
* The resulting ID is always a identification_t
* of type ID_DER_ASN1_DN.
*
* @param this calling object
* @return issuers ID
*/
identification_t *(*get_issuer) (const x509_t *this);
/**
* @brief Get the subjectDistinguisheName.
*
* The resulting ID is always a identification_t
* of type ID_DER_ASN1_DN.
*
* @param this calling object
* @return subjects ID
*/
identification_t *(*get_subject) (const x509_t *this);
/**
* @brief Create an iterator for the crlDistributionPoints.
*
* @param this calling object
* @return iterator for crlDistributionPoints
*/
iterator_t *(*create_crluri_iterator) (const x509_t *this);
/**
* @brief Create an iterator for the ocspAccessLocations.
*
* @param this calling object
* @return iterator for ocspAccessLocations
*/
iterator_t *(*create_ocspuri_iterator) (const x509_t *this);
/**
* @brief Check if a certificate is trustworthy
*
* @param this calling object
* @param signer signer's RSA public key
*/
bool (*verify) (const x509_t *this, const rsa_public_key_t *signer);
/**
* @brief Compare two certificates.
*
* Comparison is done via the certificates signature.
*
* @param this first cert for compare
* @param other second cert for compare
* @return TRUE if signature is equal
*/
bool (*equals) (const x509_t *this, const x509_t *that);
/**
* @brief Checks if the certificate contains a subjectAltName equal to id.
*
* @param this certificate being examined
* @param id id which is being compared to the subjectAltNames
* @return TRUE if a match is found
*/
bool (*equals_subjectAltName) (const x509_t *this, identification_t *id);
/**
* @brief Checks if the subject of the other cert is the issuer of this cert.
*
* @param this certificate
* @param issuer potential issuer certificate
* @return TRUE if issuer is found
*/
bool (*is_issuer) (const x509_t *this, const x509_t *issuer);
/**
* @brief Checks the validity interval of the certificate
*
* @param this certificate being examined
* @param until until = min(until, notAfter)
* @return NULL if the certificate is valid
*/
err_t (*is_valid) (const x509_t *this, time_t *until);
/**
* @brief Returns the CA basic constraints flag
*
* @param this certificate being examined
* @return TRUE if the CA flag is set
*/
bool (*is_ca) (const x509_t *this);
/**
* @brief Returns the OCSPSigner extended key usage flag
*
* @param this certificate being examined
* @return TRUE if the OCSPSigner flag is set
*/
bool (*is_ocsp_signer) (const x509_t *this);
/**
* @brief Checks if the certificate is self-signed (subject equals issuer)
*
* @param this certificate being examined
* @return TRUE if self-signed
*/
bool (*is_self_signed) (const x509_t *this);
/**
* @brief Destroys the certificate.
*
* @param this certificate to destroy
*/
void (*destroy) (x509_t *this);
};
/**
* @brief Read a x509 certificate from a DER encoded blob.
*
* @param chunk chunk containing DER encoded data
* @return created x509_t certificate, or NULL if invlid.
*
* @ingroup transforms
*/
x509_t *x509_create_from_chunk(chunk_t chunk, u_int level);
/**
* @brief Read a x509 certificate from a DER encoded file.
*
* @param filename file containing DER encoded data
* @param label label describing kind of certificate
* @return created x509_t certificate, or NULL if invalid.
*
* @ingroup transforms
*/
x509_t *x509_create_from_file(const char *filename, const char *label);
#endif /* X509_H_ */
|