diff options
| author | Wojtek Kosior <wk@koszkonutek-tmp.pl.eu.org> | 2021-04-30 00:33:56 +0200 | 
|---|---|---|
| committer | Wojtek Kosior <wk@koszkonutek-tmp.pl.eu.org> | 2021-04-30 00:33:56 +0200 | 
| commit | aa4d426b4d3527d7e166df1a05058c9a4a0f6683 (patch) | |
| tree | 4ff17ce8b89a2321b9d0ed4bcfc37c447bcb6820 /vmime-master/src/vmime/security/cert/gnutls | |
| download | smtps-and-pop3s-console-program-master.tar.gz smtps-and-pop3s-console-program-master.zip | |
Diffstat (limited to 'vmime-master/src/vmime/security/cert/gnutls')
| -rw-r--r-- | vmime-master/src/vmime/security/cert/gnutls/X509Certificate_GnuTLS.cpp | 395 | ||||
| -rw-r--r-- | vmime-master/src/vmime/security/cert/gnutls/X509Certificate_GnuTLS.hpp | 96 | 
2 files changed, 491 insertions, 0 deletions
| diff --git a/vmime-master/src/vmime/security/cert/gnutls/X509Certificate_GnuTLS.cpp b/vmime-master/src/vmime/security/cert/gnutls/X509Certificate_GnuTLS.cpp new file mode 100644 index 0000000..3dfa1c6 --- /dev/null +++ b/vmime-master/src/vmime/security/cert/gnutls/X509Certificate_GnuTLS.cpp @@ -0,0 +1,395 @@ +// +// VMime library (http://www.vmime.org) +// Copyright (C) 2002 Vincent Richard <vincent@vmime.org> +// +// This program is free software; you can redistribute it and/or +// modify it under the terms of the GNU General Public License as +// published by the Free Software Foundation; either version 3 of +// the License, or (at your option) any later version. +// +// This program is distributed in the hope that it will be useful, +// but WITHOUT ANY WARRANTY; without even the implied warranty of +// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU +// General Public License for more details. +// +// You should have received a copy of the GNU General Public License along +// with this program; if not, write to the Free Software Foundation, Inc., +// 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. +// +// Linking this library statically or dynamically with other modules is making +// a combined work based on this library.  Thus, the terms and conditions of +// the GNU General Public License cover the whole combination. +// + +#include "vmime/config.hpp" + + +#if VMIME_HAVE_MESSAGING_FEATURES && VMIME_HAVE_TLS_SUPPORT && VMIME_TLS_SUPPORT_LIB_IS_GNUTLS + + +#include <gnutls/gnutls.h> +#include <gnutls/x509.h> + +#include <ctime> + +#include "vmime/security/cert/gnutls/X509Certificate_GnuTLS.hpp" + +#include "vmime/utility/outputStreamByteArrayAdapter.hpp" + + +namespace vmime { +namespace security { +namespace cert { + + +#ifndef VMIME_BUILDING_DOC + +struct GnuTLSX509CertificateInternalData { + +	GnuTLSX509CertificateInternalData() { + +		gnutls_x509_crt_init(&cert); +	} + +	~GnuTLSX509CertificateInternalData() { + +		gnutls_x509_crt_deinit(cert); +	} + +	void swap(gnutls_x509_crt_t to) { +		gnutls_x509_crt_deinit(cert); +		cert = to; +	} + + +	gnutls_x509_crt_t cert; +}; + +#endif // VMIME_BUILDING_DOC + + +X509Certificate_GnuTLS::X509Certificate_GnuTLS() +	: m_data(new GnuTLSX509CertificateInternalData) { + +} + + +X509Certificate_GnuTLS::X509Certificate_GnuTLS(const X509Certificate&) +	: X509Certificate(), m_data(NULL) { + +	// Not used +} + + +X509Certificate_GnuTLS::~X509Certificate_GnuTLS() { + +	delete m_data; +} + + +void* X509Certificate_GnuTLS::getInternalData() { + +	return &m_data->cert; +} + + +// static +shared_ptr <X509Certificate> X509Certificate::import( +	utility::inputStream& is +) { + +	byteArray bytes; +	byte_t chunk[4096]; + +	while (!is.eof()) { +		const size_t len = is.read(chunk, sizeof(chunk)); +		bytes.insert(bytes.end(), chunk, chunk + len); +	} + +	return import(&bytes[0], bytes.size()); +} + + +// static +shared_ptr <X509Certificate> X509Certificate::import( +	const byte_t* data, +	const size_t length +) { + +	gnutls_datum_t buffer; +	buffer.data = const_cast <byte_t*>(data); +	buffer.size = static_cast <unsigned int>(length); + +	// Try DER format +	shared_ptr <X509Certificate_GnuTLS> derCert = make_shared <X509Certificate_GnuTLS>(); + +	if (gnutls_x509_crt_import(derCert->m_data->cert, &buffer, GNUTLS_X509_FMT_DER) >= 0) { +		return derCert; +	} + +	// Try PEM format +	shared_ptr <X509Certificate_GnuTLS> pemCert = make_shared <X509Certificate_GnuTLS>(); + +	if (gnutls_x509_crt_import(pemCert->m_data->cert, &buffer, GNUTLS_X509_FMT_PEM) >= 0) { +		return pemCert; +	} + +	return null; +} + + +// static +void X509Certificate::import( +	utility::inputStream& is, +	std::vector <shared_ptr <X509Certificate> >& certs +) { + +	byteArray bytes; +	byte_t chunk[4096]; + +	while (!is.eof()) { +		const size_t len = is.read(chunk, sizeof(chunk)); +		bytes.insert(bytes.end(), chunk, chunk + len); +	} + +	import(&bytes[0], bytes.size(), certs); +} + + +// static +void X509Certificate::import( +	const byte_t* data, +	const size_t length, +	std::vector <shared_ptr <X509Certificate> >& certs +) { + +	gnutls_datum_t buffer; +	buffer.data = const_cast <byte_t*>(data); +	buffer.size = static_cast <unsigned int>(length); + +	unsigned int size = 1024; +	gnutls_x509_crt_t x509[1024]; + +	// Try DER format +	if (gnutls_x509_crt_list_import(x509, &size, &buffer, GNUTLS_X509_FMT_DER, 0) < 0) { + +		// Try PEM format +		if (gnutls_x509_crt_list_import(x509, &size, &buffer, GNUTLS_X509_FMT_PEM, 0) < 0) { +			return; +		} +	} + +	for (unsigned int i = 0 ; i < size ; i += 1) { + +		auto c = make_shared <X509Certificate_GnuTLS>(); +		c->m_data->swap(x509[i]); +		certs.push_back(c); +	} +} + + +void X509Certificate_GnuTLS::write( +	utility::outputStream& os, +	const Format format +) const { + +	size_t dataSize = 0; +	gnutls_x509_crt_fmt_t fmt = GNUTLS_X509_FMT_DER; + +	switch (format) { +		case FORMAT_DER: fmt = GNUTLS_X509_FMT_DER; break; +		case FORMAT_PEM: fmt = GNUTLS_X509_FMT_PEM; break; +	} + +	gnutls_x509_crt_export(m_data->cert, fmt, NULL, &dataSize); + +	std::vector <byte_t> data(dataSize); + +	gnutls_x509_crt_export(m_data->cert, fmt, &data[0], &dataSize); + +	os.write(reinterpret_cast <byte_t*>(&data[0]), dataSize); +} + + +const byteArray X509Certificate_GnuTLS::getSerialNumber() const { + +	char serial[64]; +	size_t serialSize = sizeof(serial); + +	gnutls_x509_crt_get_serial(m_data->cert, serial, &serialSize); + +	return byteArray(serial, serial + serialSize); +} + + +bool X509Certificate_GnuTLS::checkIssuer(const shared_ptr <const X509Certificate>& issuer_) const { + +	shared_ptr <const X509Certificate_GnuTLS> issuer = +		dynamicCast <const X509Certificate_GnuTLS>(issuer_); + +	return gnutls_x509_crt_check_issuer(m_data->cert, issuer->m_data->cert) >= 1; +} + + +bool X509Certificate_GnuTLS::verify(const shared_ptr <const X509Certificate>& caCert_) const { + +	shared_ptr <const X509Certificate_GnuTLS> caCert = +		dynamicCast <const X509Certificate_GnuTLS>(caCert_); + +	unsigned int verify = 0; + +	const int res = gnutls_x509_crt_verify( +		m_data->cert, &(caCert->m_data->cert), 1, +		GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT, +		&verify +	); + +	return res == 0 && verify == 0; +} + + +bool X509Certificate_GnuTLS::verifyHostName( +	const string& hostname, +	std::vector <std::string>* nonMatchingNames +) const { + +	if (gnutls_x509_crt_check_hostname(m_data->cert, hostname.c_str()) != 0) { +		return true; +	} + +	if (nonMatchingNames) { + +		const int MAX_CN = 256; +		const char* OID_X520_COMMON_NAME = "2.5.4.3"; + +		char dnsName[MAX_CN]; +		size_t dnsNameLength; + +		dnsNameLength = sizeof(dnsName); + +		if (gnutls_x509_crt_get_dn_by_oid(m_data->cert, OID_X520_COMMON_NAME, 0, 0, dnsName, &dnsNameLength) >= 0) { +			nonMatchingNames->push_back(dnsName); +		} + +		for (int i = 0, ret = 0 ; ret >= 0 ; ++i) { + +			dnsNameLength = sizeof(dnsName); +			ret = gnutls_x509_crt_get_subject_alt_name(m_data->cert, i, dnsName, &dnsNameLength, NULL); + +			if (ret == GNUTLS_SAN_DNSNAME) { +				nonMatchingNames->push_back(dnsName); +			} +		} +	} + +	return false; +} + + +const datetime X509Certificate_GnuTLS::getActivationDate() const { + +	const time_t t = gnutls_x509_crt_get_activation_time(m_data->cert); +	return datetime(t); +} + + +const datetime X509Certificate_GnuTLS::getExpirationDate() const { + +	const time_t t = gnutls_x509_crt_get_expiration_time(m_data->cert); +	return datetime(t); +} + + +const byteArray X509Certificate_GnuTLS::getFingerprint(const DigestAlgorithm algo) const { + +	gnutls_digest_algorithm_t galgo; + +	switch (algo) { + +		case DIGEST_MD5: + +			galgo = GNUTLS_DIG_MD5; +			break; + +		default: +		case DIGEST_SHA1: + +			galgo = GNUTLS_DIG_SHA; +			break; +	} + +	size_t bufferSize = 0; +	gnutls_x509_crt_get_fingerprint(m_data->cert, galgo, NULL, &bufferSize); + +	std::vector <byte_t> buffer(bufferSize); + +	if (gnutls_x509_crt_get_fingerprint(m_data->cert, galgo, &buffer[0], &bufferSize) == 0) { + +		byteArray res; +		res.insert(res.end(), &buffer[0], &buffer[0] + bufferSize); + +		return res; +	} + +	return byteArray(); +} + + +const byteArray X509Certificate_GnuTLS::getEncoded() const { + +	byteArray bytes; +	utility::outputStreamByteArrayAdapter os(bytes); + +	write(os, FORMAT_DER); + +	return bytes; +} + + +const string X509Certificate_GnuTLS::getIssuerString() const { + +	char buffer[4096]; +	size_t bufferSize = sizeof(buffer); + +	if (gnutls_x509_crt_get_issuer_dn(m_data->cert, buffer, &bufferSize) != GNUTLS_E_SUCCESS) { +		return ""; +	} + +	return buffer; +} + + +const string X509Certificate_GnuTLS::getType() const { + +	return "X.509"; +} + + +int X509Certificate_GnuTLS::getVersion() const { + +	return gnutls_x509_crt_get_version(m_data->cert); +} + + +bool X509Certificate_GnuTLS::equals(const shared_ptr <const certificate>& other) const { + +	shared_ptr <const X509Certificate_GnuTLS> otherX509 = +		dynamicCast <const X509Certificate_GnuTLS>(other); + +	if (!otherX509) { +		return false; +	} + +	const byteArray fp1 = getFingerprint(DIGEST_MD5); +	const byteArray fp2 = otherX509->getFingerprint(DIGEST_MD5); + +	return fp1 == fp2; +} + + +} // cert +} // security +} // vmime + + +#endif // VMIME_HAVE_MESSAGING_FEATURES && VMIME_HAVE_TLS_SUPPORT && VMIME_TLS_SUPPORT_LIB_IS_GNUTLS diff --git a/vmime-master/src/vmime/security/cert/gnutls/X509Certificate_GnuTLS.hpp b/vmime-master/src/vmime/security/cert/gnutls/X509Certificate_GnuTLS.hpp new file mode 100644 index 0000000..c7c6c48 --- /dev/null +++ b/vmime-master/src/vmime/security/cert/gnutls/X509Certificate_GnuTLS.hpp @@ -0,0 +1,96 @@ +// +// VMime library (http://www.vmime.org) +// Copyright (C) 2002 Vincent Richard <vincent@vmime.org> +// +// This program is free software; you can redistribute it and/or +// modify it under the terms of the GNU General Public License as +// published by the Free Software Foundation; either version 3 of +// the License, or (at your option) any later version. +// +// This program is distributed in the hope that it will be useful, +// but WITHOUT ANY WARRANTY; without even the implied warranty of +// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU +// General Public License for more details. +// +// You should have received a copy of the GNU General Public License along +// with this program; if not, write to the Free Software Foundation, Inc., +// 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. +// +// Linking this library statically or dynamically with other modules is making +// a combined work based on this library.  Thus, the terms and conditions of +// the GNU General Public License cover the whole combination. +// + +#ifndef VMIME_SECURITY_CERT_X509CERTIFICATE_GNUTLS_HPP_INCLUDED +#define VMIME_SECURITY_CERT_X509CERTIFICATE_GNUTLS_HPP_INCLUDED + + +#include "vmime/config.hpp" + + +#if VMIME_HAVE_MESSAGING_FEATURES && VMIME_HAVE_TLS_SUPPORT && VMIME_TLS_SUPPORT_LIB_IS_GNUTLS + + +#include "vmime/security/cert/X509Certificate.hpp" + + +namespace vmime { +namespace security { +namespace cert { + + +class X509Certificate_GnuTLS : public X509Certificate { + +	friend class X509Certificate; + +	X509Certificate_GnuTLS(const X509Certificate&); + +public: + +	X509Certificate_GnuTLS(); + +	~X509Certificate_GnuTLS(); + + +	void write(utility::outputStream& os, const Format format) const; + +	const byteArray getSerialNumber() const; + +	const string getIssuerString() const; +	bool checkIssuer(const shared_ptr <const X509Certificate>& issuer) const; + +	bool verify(const shared_ptr <const X509Certificate>& caCert) const; + +	bool verifyHostName( +		const string& hostname, +		std::vector <std::string>* nonMatchingNames = NULL +	) const; + +	const datetime getExpirationDate() const; +	const datetime getActivationDate() const; + +	const byteArray getFingerprint(const DigestAlgorithm algo) const; + + +	// Implementation of 'certificate' +	const byteArray getEncoded() const; +	const string getType() const; +	int getVersion() const; +	bool equals(const shared_ptr <const certificate>& other) const; +	void* getInternalData(); + +private: + +	struct GnuTLSX509CertificateInternalData* m_data; +}; + + +} // cert +} // security +} // vmime + + +#endif // VMIME_HAVE_MESSAGING_FEATURES && VMIME_HAVE_TLS_SUPPORT && VMIME_TLS_SUPPORT_LIB_IS_GNUTLS + +#endif // VMIME_SECURITY_CERT_X509CERTIFICATE_GNUTLS_HPP_INCLUDED + | 
