// // VMime library (http://www.vmime.org) // Copyright (C) 2002 Vincent Richard <vincent@vmime.org> // // This program is free software; you can redistribute it and/or // modify it under the terms of the GNU General Public License as // published by the Free Software Foundation; either version 3 of // the License, or (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU // General Public License for more details. // // You should have received a copy of the GNU General Public License along // with this program; if not, write to the Free Software Foundation, Inc., // 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. // // Linking this library statically or dynamically with other modules is making // a combined work based on this library. Thus, the terms and conditions of // the GNU General Public License cover the whole combination. // #ifndef VMIME_SECURITY_CERT_X509CERTIFICATE_HPP_INCLUDED #define VMIME_SECURITY_CERT_X509CERTIFICATE_HPP_INCLUDED #include "vmime/config.hpp" #if VMIME_HAVE_MESSAGING_FEATURES && VMIME_HAVE_TLS_SUPPORT #include "vmime/security/cert/certificate.hpp" #include "vmime/utility/stream.hpp" #include "vmime/base.hpp" #include "vmime/types.hpp" #include "vmime/dateTime.hpp" namespace vmime { namespace security { namespace cert { /** Identity certificate based on X.509 standard. */ class VMIME_EXPORT X509Certificate : public certificate { public: ~X509Certificate(); /** Supported encodings for X.509 certificates. */ enum Format { FORMAT_DER, /**< DER encoding */ FORMAT_PEM /**< PEM encoding */ }; /** Supported digest algorithms (used for fingerprint). */ enum DigestAlgorithm { DIGEST_MD5, /**< MD5 digest */ DIGEST_SHA1 /**< SHA1 digest */ }; /** Imports a DER or PEM encoded X.509 certificate. * * @param is input stream to read data from * @return a X.509 certificate, or NULL if the given data does not * represent a valid certificate */ static shared_ptr <X509Certificate> import(utility::inputStream& is); /** Imports a DER or PEM encoded X.509 certificate. * * @param data points to raw data * @param length size of data * @return a X.509 certificate, or NULL if the given data does not * represent a valid certificate */ static shared_ptr <X509Certificate> import(const byte_t* data, const size_t length); /** Import sveral DER or PEM encoded X.509 certificates. * * @param is input stream to read data from * @param certs the resulting list of certificates */ static void import( utility::inputStream& is, std::vector <shared_ptr <X509Certificate> >& certs ); /** Import several DER or PEM encoded X.509 certificates. * * @param data points to raw data * @param length size of data * @param certs the resulting list of certificates */ static void import( const byte_t* data, const size_t length, std::vector <shared_ptr <X509Certificate> >& certs ); /** Exports this X.509 certificate to the specified format. * * @param os output stream into which write data * @param format output format */ virtual void write(utility::outputStream& os, const Format format) const = 0; /** Returns the X.509 certificate's serial number. This is obtained * by the X.509 Certificate 'serialNumber' field. Serial is not * always a 32 or 64bit number. Some CAs use large serial numbers, * thus it may be wise to handle it as something opaque. * * @return serial number of this certificate */ virtual const byteArray getSerialNumber() const = 0; /** Returns the distinguished name of the issuer of this certificate. * Eg. "C=US,O=VeriSign\, Inc.,OU=Class 1 Public Primary Certification Authority" * * @return distinguished name of the certificate issuer, as a string */ virtual const string getIssuerString() const = 0; /** Checks if this certificate has the given issuer. * * @param issuer certificate of a possible issuer * @return true if this certificate was issued by the given issuer, * false otherwise */ virtual bool checkIssuer(const shared_ptr <const X509Certificate>& issuer) const = 0; /** Verifies this certificate against a given trusted one. * * @param caCert a certificate that is considered to be trusted one * @return true if the verification succeeded, false otherwise */ virtual bool verify(const shared_ptr <const X509Certificate>& caCert) const = 0; /** Verify certificate's subject name against the given hostname. * * @param hostname DNS name of the server * @param nonMatchingNames if not NULL, will contain the names that do * not match the identities in the certificate * @return true if the match is successful, false otherwise */ virtual bool verifyHostName( const string& hostname, std::vector <std::string>* nonMatchingNames = NULL ) const = 0; /** Gets the expiration date of this certificate. This is the date * at which this certificate will not be valid anymore. * * @return expiration date of this certificate */ virtual const datetime getExpirationDate() const = 0; /** Gets the activation date of this certificate. This is the date * at which this certificate will be valid. * * @return activation date of this certificate */ virtual const datetime getActivationDate() const = 0; /** Returns the fingerprint of this certificate. * * @return the fingerprint of this certificate */ virtual const byteArray getFingerprint(const DigestAlgorithm algo) const = 0; /** Checks that the certificate is currently valid. For the certificate * to be valid, the current date and time must be in the validity period * specified in the certificate. * * @throw certificateExpiredException if the certificate has expired * @throw certificateNotYetValidException if the certificate is not yet valid */ virtual void checkValidity(); }; } // cert } // security } // vmime #endif // VMIME_HAVE_MESSAGING_FEATURES && VMIME_HAVE_TLS_SUPPORT #endif // VMIME_SECURITY_CERT_X509CERTIFICATE_HPP_INCLUDED