95f53f919909f5b1d05e5a4419463d1f22ebc4c3
[strongswan.git] / src / libstrongswan / plugins / pubkey / pubkey_cert.c
1 /*
2 * Copyright (C) 2008 Martin Willi
3 * Hochschule fuer Technik Rapperswil
4 *
5 * This program is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License as published by the
7 * Free Software Foundation; either version 2 of the License, or (at your
8 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
9 *
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
12 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
13 * for more details.
14 */
15
16 #include "pubkey_cert.h"
17
18 #include <time.h>
19
20 #include <utils/debug.h>
21
22 typedef struct private_pubkey_cert_t private_pubkey_cert_t;
23
24 /**
25 * private data of pubkey_cert
26 */
27 struct private_pubkey_cert_t {
28
29 /**
30 * public functions
31 */
32 pubkey_cert_t public;
33
34 /**
35 * wrapped public key
36 */
37 public_key_t *key;
38
39 /**
40 * dummy issuer id, ID_ANY
41 */
42 identification_t *issuer;
43
44 /**
45 * subject, ID_KEY_ID of the public key
46 */
47 identification_t *subject;
48
49 /**
50 * key inception time
51 */
52 time_t notBefore;
53
54 /**
55 * key expiration time
56 */
57 time_t notAfter;
58
59 /**
60 * reference count
61 */
62 refcount_t ref;
63 };
64
65 METHOD(certificate_t, get_type, certificate_type_t,
66 private_pubkey_cert_t *this)
67 {
68 return CERT_TRUSTED_PUBKEY;
69 }
70
71 METHOD(certificate_t, get_subject, identification_t*,
72 private_pubkey_cert_t *this)
73 {
74 return this->subject;
75 }
76
77 METHOD(certificate_t, get_issuer, identification_t*,
78 private_pubkey_cert_t *this)
79 {
80 return this->issuer;
81 }
82
83 METHOD(certificate_t, has_subject, id_match_t,
84 private_pubkey_cert_t *this, identification_t *subject)
85 {
86 if (subject->get_type(subject) == ID_KEY_ID)
87 {
88 cred_encoding_type_t type;
89 chunk_t fingerprint;
90
91 for (type = 0; type < CRED_ENCODING_MAX; type++)
92 {
93 if (this->key->get_fingerprint(this->key, type, &fingerprint) &&
94 chunk_equals(fingerprint, subject->get_encoding(subject)))
95 {
96 return ID_MATCH_PERFECT;
97 }
98 }
99 }
100
101 return this->subject->matches(this->subject, subject);
102 }
103
104 METHOD(certificate_t, has_issuer, id_match_t,
105 private_pubkey_cert_t *this, identification_t *issuer)
106 {
107 return ID_MATCH_NONE;
108 }
109
110 METHOD(certificate_t, equals, bool,
111 private_pubkey_cert_t *this, certificate_t *other)
112 {
113 public_key_t *other_key;
114
115 other_key = other->get_public_key(other);
116 if (other_key)
117 {
118 if (public_key_equals(this->key, other_key))
119 {
120 other_key->destroy(other_key);
121 return TRUE;
122 }
123 other_key->destroy(other_key);
124 }
125 return FALSE;
126 }
127
128 METHOD(certificate_t, issued_by, bool,
129 private_pubkey_cert_t *this, certificate_t *issuer,
130 signature_scheme_t *scheme)
131 {
132 if (scheme)
133 {
134 *scheme = SIGN_UNKNOWN;
135 }
136 return equals(this, issuer);
137 }
138
139 METHOD(certificate_t, get_public_key, public_key_t*,
140 private_pubkey_cert_t *this)
141 {
142 this->key->get_ref(this->key);
143 return this->key;
144 }
145
146 METHOD(certificate_t, get_validity, bool,
147 private_pubkey_cert_t *this, time_t *when, time_t *not_before,
148 time_t *not_after)
149 {
150 time_t t = when ? *when : time(NULL);
151
152 if (not_before)
153 {
154 *not_before = this->notBefore;
155 }
156 if (not_after)
157 {
158 *not_after = this->notAfter;
159 }
160 return ((this->notBefore == UNDEFINED_TIME || t >= this->notBefore) &&
161 (this->notAfter == UNDEFINED_TIME || t <= this->notAfter));
162 }
163
164 METHOD(certificate_t, get_encoding, bool,
165 private_pubkey_cert_t *this, cred_encoding_type_t type, chunk_t *encoding)
166 {
167 return this->key->get_encoding(this->key, type, encoding);
168 }
169
170 METHOD(certificate_t, get_ref, certificate_t*,
171 private_pubkey_cert_t *this)
172 {
173 ref_get(&this->ref);
174 return &this->public.interface;
175 }
176
177 METHOD(certificate_t, destroy, void,
178 private_pubkey_cert_t *this)
179 {
180 if (ref_put(&this->ref))
181 {
182 this->subject->destroy(this->subject);
183 this->issuer->destroy(this->issuer);
184 this->key->destroy(this->key);
185 free(this);
186 }
187 }
188
189 /*
190 * see header file
191 */
192 static pubkey_cert_t *pubkey_cert_create(public_key_t *key,
193 time_t notBefore, time_t notAfter,
194 identification_t *subject)
195 {
196 private_pubkey_cert_t *this;
197 chunk_t fingerprint;
198
199 INIT(this,
200 .public = {
201 .interface = {
202 .get_type = _get_type,
203 .get_subject = _get_subject,
204 .get_issuer = _get_issuer,
205 .has_subject = _has_subject,
206 .has_issuer = _has_issuer,
207 .issued_by = _issued_by,
208 .get_public_key = _get_public_key,
209 .get_validity = _get_validity,
210 .get_encoding = _get_encoding,
211 .equals = _equals,
212 .get_ref = _get_ref,
213 .destroy = _destroy,
214 },
215 },
216 .ref = 1,
217 .key = key,
218 .notBefore = notBefore,
219 .notAfter = notAfter,
220 .issuer = identification_create_from_encoding(ID_ANY, chunk_empty),
221 );
222
223 if (subject)
224 {
225 this->subject = subject->clone(subject);
226 }
227 else if (key->get_fingerprint(key, KEYID_PUBKEY_INFO_SHA1, &fingerprint))
228 {
229 this->subject = identification_create_from_encoding(ID_KEY_ID, fingerprint);
230 }
231 else
232 {
233 this->subject = identification_create_from_encoding(ID_ANY, chunk_empty);
234 }
235
236 return &this->public;
237 }
238
239 /**
240 * See header.
241 */
242 pubkey_cert_t *pubkey_cert_wrap(certificate_type_t type, va_list args)
243 {
244 public_key_t *key = NULL;
245 chunk_t blob = chunk_empty;
246 identification_t *subject = NULL;
247 time_t notBefore = UNDEFINED_TIME, notAfter = UNDEFINED_TIME;
248
249 while (TRUE)
250 {
251 switch (va_arg(args, builder_part_t))
252 {
253 case BUILD_BLOB_ASN1_DER:
254 blob = va_arg(args, chunk_t);
255 continue;
256 case BUILD_PUBLIC_KEY:
257 key = va_arg(args, public_key_t*);
258 continue;
259 case BUILD_NOT_BEFORE_TIME:
260 notBefore = va_arg(args, time_t);
261 continue;
262 case BUILD_NOT_AFTER_TIME:
263 notAfter = va_arg(args, time_t);
264 continue;
265 case BUILD_SUBJECT:
266 subject = va_arg(args, identification_t*);
267 continue;
268 case BUILD_END:
269 break;
270 default:
271 return NULL;
272 }
273 break;
274 }
275 if (key)
276 {
277 key->get_ref(key);
278 }
279 else if (blob.ptr)
280 {
281 key = lib->creds->create(lib->creds, CRED_PUBLIC_KEY, KEY_ANY,
282 BUILD_BLOB_ASN1_DER, blob, BUILD_END);
283 }
284 if (key)
285 {
286 return pubkey_cert_create(key, notBefore, notAfter, subject);
287 }
288 return NULL;
289 }
290