blob: 0b54c8dfaa390893da6e0ab51aaa39efe0d9a844 [file] [log] [blame]
/*
* x509.c
*
* Copyright (C) AB Strakt 2001, All rights reserved
* Copyright (C) Jean-Paul Calderone 2008, All rights reserved
*
* Certificate (X.509) handling code, mostly thin wrappers around OpenSSL.
* See the file RATIONALE for a short explanation of why this module was written.
*
* Reviewed 2001-07-23
*/
#include <Python.h>
#define crypto_MODULE
#include "crypto.h"
/*
* X.509 is a standard for digital certificates. See e.g. the OpenSSL homepage
* http://www.openssl.org/ for more information
*/
static char crypto_X509_get_version_doc[] = "\n\
Return version number of the certificate\n\
\n\
@return: Version number as a Python integer\n\
";
static PyObject *
crypto_X509_get_version(crypto_X509Obj *self, PyObject *args)
{
if (!PyArg_ParseTuple(args, ":get_version"))
return NULL;
return PyLong_FromLong((long)X509_get_version(self->x509));
}
static char crypto_X509_set_version_doc[] = "\n\
Set version number of the certificate\n\
\n\
@param version: The version number\n\
@return: None\n\
";
static PyObject *
crypto_X509_set_version(crypto_X509Obj *self, PyObject *args)
{
int version;
if (!PyArg_ParseTuple(args, "i:set_version", &version))
return NULL;
X509_set_version(self->x509, version);
Py_INCREF(Py_None);
return Py_None;
}
static char crypto_X509_get_serial_number_doc[] = "\n\
Return serial number of the certificate\n\
\n\
@return: Serial number as a Python integer\n\
";
static PyObject *
crypto_X509_get_serial_number(crypto_X509Obj *self, PyObject *args)
{
ASN1_INTEGER *asn1_i;
BIGNUM *bignum;
char *hex;
PyObject *res;
if (!PyArg_ParseTuple(args, ":get_serial_number"))
return NULL;
asn1_i = X509_get_serialNumber(self->x509);
bignum = ASN1_INTEGER_to_BN(asn1_i, NULL);
hex = BN_bn2hex(bignum);
res = PyLong_FromString(hex, NULL, 16);
BN_free(bignum);
free(hex);
return res;
}
static char crypto_X509_set_serial_number_doc[] = "\n\
Set serial number of the certificate\n\
\n\
@param serial: The serial number\n\
@return: None\n\
";
static PyObject *
crypto_X509_set_serial_number(crypto_X509Obj *self, PyObject *args)
{
long small_serial;
PyObject *serial = NULL;
PyObject *hex = NULL;
ASN1_INTEGER *asn1_i = NULL;
BIGNUM *bignum = NULL;
if (!PyArg_ParseTuple(args, "O:set_serial_number", &serial)) {
return NULL;
}
if (!PyOpenSSL_Integer_Check(serial)) {
PyErr_SetString(
PyExc_TypeError, "serial number must be integer");
goto err;
}
if ((hex = PyOpenSSL_LongToHex(serial)) == NULL) {
goto err;
}
#ifdef PY3
{
PyObject *hexbytes = PyUnicode_AsASCIIString(hex);
Py_DECREF(hex);
hex = hexbytes;
}
#endif
/**
* BN_hex2bn stores the result in &bignum. Unless it doesn't feel like
* it. If bignum is still NULL after this call, then the return value
* is actually the result. I hope. -exarkun
*/
/* +2 to skip the "0x" */
small_serial = BN_hex2bn(&bignum, PyBytes_AsString(hex) + 2);
Py_DECREF(hex);
hex = NULL;
if (bignum == NULL) {
if (ASN1_INTEGER_set(X509_get_serialNumber(self->x509), small_serial)) {
exception_from_error_queue(crypto_Error);
goto err;
}
} else {
asn1_i = BN_to_ASN1_INTEGER(bignum, NULL);
BN_free(bignum);
bignum = NULL;
if (asn1_i == NULL) {
exception_from_error_queue(crypto_Error);
goto err;
}
if (!X509_set_serialNumber(self->x509, asn1_i)) {
exception_from_error_queue(crypto_Error);
goto err;
}
ASN1_INTEGER_free(asn1_i);
asn1_i = NULL;
}
Py_INCREF(Py_None);
return Py_None;
err:
if (hex) {
Py_DECREF(hex);
}
if (bignum) {
BN_free(bignum);
}
if (asn1_i) {
ASN1_INTEGER_free(asn1_i);
}
return NULL;
}
static char crypto_X509_get_issuer_doc[] = "\n\
Create an X509Name object for the issuer of the certificate\n\
\n\
@return: An X509Name object\n\
";
static PyObject *
crypto_X509_get_issuer(crypto_X509Obj *self, PyObject *args)
{
crypto_X509NameObj *pyname;
X509_NAME *name;
if (!PyArg_ParseTuple(args, ":get_issuer"))
return NULL;
name = X509_get_issuer_name(self->x509);
pyname = crypto_X509Name_New(name, 0);
if (pyname != NULL)
{
pyname->parent_cert = (PyObject *)self;
Py_INCREF(self);
}
return (PyObject *)pyname;
}
static char crypto_X509_set_issuer_doc[] = "\n\
Set the issuer of the certificate\n\
\n\
@param issuer: The issuer name\n\
@type issuer: L{X509Name}\n\
@return: None\n\
";
static PyObject *
crypto_X509_set_issuer(crypto_X509Obj *self, PyObject *args)
{
crypto_X509NameObj *issuer;
if (!PyArg_ParseTuple(args, "O!:set_issuer", &crypto_X509Name_Type,
&issuer))
return NULL;
if (!X509_set_issuer_name(self->x509, issuer->x509_name))
{
exception_from_error_queue(crypto_Error);
return NULL;
}
Py_INCREF(Py_None);
return Py_None;
}
static char crypto_X509_get_subject_doc[] = "\n\
Create an X509Name object for the subject of the certificate\n\
\n\
@return: An X509Name object\n\
";
static PyObject *
crypto_X509_get_subject(crypto_X509Obj *self, PyObject *args)
{
crypto_X509NameObj *pyname;
X509_NAME *name;
if (!PyArg_ParseTuple(args, ":get_subject"))
return NULL;
name = X509_get_subject_name(self->x509);
pyname = crypto_X509Name_New(name, 0);
if (pyname != NULL)
{
pyname->parent_cert = (PyObject *)self;
Py_INCREF(self);
}
return (PyObject *)pyname;
}
static char crypto_X509_set_subject_doc[] = "\n\
Set the subject of the certificate\n\
\n\
@param subject: The subject name\n\
@type subject: L{X509Name}\n\
@return: None\n\
";
static PyObject *
crypto_X509_set_subject(crypto_X509Obj *self, PyObject *args)
{
crypto_X509NameObj *subject;
if (!PyArg_ParseTuple(args, "O!:set_subject", &crypto_X509Name_Type,
&subject))
return NULL;
if (!X509_set_subject_name(self->x509, subject->x509_name))
{
exception_from_error_queue(crypto_Error);
return NULL;
}
Py_INCREF(Py_None);
return Py_None;
}
static char crypto_X509_get_pubkey_doc[] = "\n\
Get the public key of the certificate\n\
\n\
@return: The public key\n\
";
static PyObject *
crypto_X509_get_pubkey(crypto_X509Obj *self, PyObject *args)
{
crypto_PKeyObj *crypto_PKey_New(EVP_PKEY *, int);
EVP_PKEY *pkey;
crypto_PKeyObj *py_pkey;
if (!PyArg_ParseTuple(args, ":get_pubkey"))
return NULL;
if ((pkey = X509_get_pubkey(self->x509)) == NULL)
{
exception_from_error_queue(crypto_Error);
return NULL;
}
py_pkey = crypto_PKey_New(pkey, 1);
if (py_pkey != NULL) {
py_pkey->only_public = 1;
}
return (PyObject *)py_pkey;
}
static char crypto_X509_set_pubkey_doc[] = "\n\
Set the public key of the certificate\n\
\n\
@param pkey: The public key\n\
@return: None\n\
";
static PyObject *
crypto_X509_set_pubkey(crypto_X509Obj *self, PyObject *args)
{
crypto_PKeyObj *pkey;
if (!PyArg_ParseTuple(args, "O!:set_pubkey", &crypto_PKey_Type, &pkey))
return NULL;
if (!X509_set_pubkey(self->x509, pkey->pkey))
{
exception_from_error_queue(crypto_Error);
return NULL;
}
Py_INCREF(Py_None);
return Py_None;
}
PyObject*
_set_asn1_time(char *format, ASN1_TIME* timestamp, PyObject *args)
{
char *when;
if (!PyArg_ParseTuple(args, format, &when))
return NULL;
if (ASN1_GENERALIZEDTIME_set_string(timestamp, when) == 0) {
ASN1_GENERALIZEDTIME dummy;
dummy.type = V_ASN1_GENERALIZEDTIME;
dummy.length = strlen(when);
dummy.data = (unsigned char *)when;
if (!ASN1_GENERALIZEDTIME_check(&dummy)) {
PyErr_SetString(PyExc_ValueError, "Invalid string");
} else {
PyErr_SetString(PyExc_RuntimeError, "Unknown ASN1_GENERALIZEDTIME_set_string failure");
}
return NULL;
}
Py_INCREF(Py_None);
return Py_None;
}
static char crypto_X509_set_notBefore_doc[] = "\n\
Set the time stamp for when the certificate starts being valid\n\
\n\
@param when: A string giving the timestamp, in the format:\n\
\n\
YYYYMMDDhhmmssZ\n\
YYYYMMDDhhmmss+hhmm\n\
YYYYMMDDhhmmss-hhmm\n\
\n\
@return: None\n\
";
static PyObject*
crypto_X509_set_notBefore(crypto_X509Obj *self, PyObject *args)
{
return _set_asn1_time(
"s:set_notBefore", X509_get_notBefore(self->x509), args);
}
static char crypto_X509_set_notAfter_doc[] = "\n\
Set the time stamp for when the certificate stops being valid\n\
\n\
@param when: A string giving the timestamp, in the format:\n\
\n\
YYYYMMDDhhmmssZ\n\
YYYYMMDDhhmmss+hhmm\n\
YYYYMMDDhhmmss-hhmm\n\
\n\
@return: None\n\
";
static PyObject*
crypto_X509_set_notAfter(crypto_X509Obj *self, PyObject *args)
{
return _set_asn1_time(
"s:set_notAfter", X509_get_notAfter(self->x509), args);
}
PyObject*
_get_asn1_time(char *format, ASN1_TIME* timestamp, PyObject *args)
{
ASN1_GENERALIZEDTIME *gt_timestamp = NULL;
PyObject *py_timestamp = NULL;
if (!PyArg_ParseTuple(args, format)) {
return NULL;
}
/*
* http://www.columbia.edu/~ariel/ssleay/asn1-time.html
*/
/*
* There must be a way to do this without touching timestamp->data
* directly. -exarkun
*/
if (timestamp->length == 0) {
Py_INCREF(Py_None);
return Py_None;
} else if (timestamp->type == V_ASN1_GENERALIZEDTIME) {
return PyBytes_FromString((char *)timestamp->data);
} else {
ASN1_TIME_to_generalizedtime(timestamp, &gt_timestamp);
if (gt_timestamp == NULL) {
exception_from_error_queue(crypto_Error);
return NULL;
} else {
py_timestamp = PyBytes_FromString((char *)gt_timestamp->data);
ASN1_GENERALIZEDTIME_free(gt_timestamp);
return py_timestamp;
}
}
}
static char crypto_X509_get_notBefore_doc[] = "\n\
Retrieve the time stamp for when the certificate starts being valid\n\
\n\
@return: A string giving the timestamp, in the format:\n\
\n\
YYYYMMDDhhmmssZ\n\
YYYYMMDDhhmmss+hhmm\n\
YYYYMMDDhhmmss-hhmm\n\
or None if there is no value set.\n\
";
static PyObject*
crypto_X509_get_notBefore(crypto_X509Obj *self, PyObject *args)
{
/*
* X509_get_notBefore returns a borrowed reference.
*/
return _get_asn1_time(
":get_notBefore", X509_get_notBefore(self->x509), args);
}
static char crypto_X509_get_notAfter_doc[] = "\n\
Retrieve the time stamp for when the certificate stops being valid\n\
\n\
@return: A string giving the timestamp, in the format:\n\
\n\
YYYYMMDDhhmmssZ\n\
YYYYMMDDhhmmss+hhmm\n\
YYYYMMDDhhmmss-hhmm\n\
or None if there is no value set.\n\
";
static PyObject*
crypto_X509_get_notAfter(crypto_X509Obj *self, PyObject *args)
{
/*
* X509_get_notAfter returns a borrowed reference.
*/
return _get_asn1_time(
":get_notAfter", X509_get_notAfter(self->x509), args);
}
static char crypto_X509_gmtime_adj_notBefore_doc[] = "\n\
Change the timestamp for when the certificate starts being valid to the current\n\
time plus an offset.\n \
\n\
@param amount: The number of seconds by which to adjust the starting validity\n\
time.\n\
@return: None\n\
";
static PyObject *
crypto_X509_gmtime_adj_notBefore(crypto_X509Obj *self, PyObject *args)
{
long amount;
if (!PyArg_ParseTuple(args, "l:gmtime_adj_notBefore", &amount))
return NULL;
X509_gmtime_adj(X509_get_notBefore(self->x509), amount);
Py_INCREF(Py_None);
return Py_None;
}
static char crypto_X509_gmtime_adj_notAfter_doc[] = "\n\
Adjust the time stamp for when the certificate stops being valid\n\
\n\
@param amount: The number of seconds by which to adjust the ending validity\n\
time.\n\
@return: None\n\
";
static PyObject *
crypto_X509_gmtime_adj_notAfter(crypto_X509Obj *self, PyObject *args)
{
long amount;
if (!PyArg_ParseTuple(args, "l:gmtime_adj_notAfter", &amount))
return NULL;
X509_gmtime_adj(X509_get_notAfter(self->x509), amount);
Py_INCREF(Py_None);
return Py_None;
}
static char crypto_X509_sign_doc[] = "\n\
Sign the certificate using the supplied key and digest\n\
\n\
@param pkey: The key to sign with\n\
@param digest: The message digest to use\n\
@return: None\n\
";
static PyObject *
crypto_X509_sign(crypto_X509Obj *self, PyObject *args)
{
crypto_PKeyObj *pkey;
char *digest_name;
const EVP_MD *digest;
if (!PyArg_ParseTuple(args, "O!s:sign", &crypto_PKey_Type, &pkey,
&digest_name))
return NULL;
if (pkey->only_public) {
PyErr_SetString(PyExc_ValueError, "Key has only public part");
return NULL;
}
if (!pkey->initialized) {
PyErr_SetString(PyExc_ValueError, "Key is uninitialized");
return NULL;
}
if ((digest = EVP_get_digestbyname(digest_name)) == NULL)
{
PyErr_SetString(PyExc_ValueError, "No such digest method");
return NULL;
}
if (!X509_sign(self->x509, pkey->pkey, digest))
{
exception_from_error_queue(crypto_Error);
return NULL;
}
Py_INCREF(Py_None);
return Py_None;
}
static char crypto_X509_has_expired_doc[] = "\n\
Check whether the certificate has expired.\n\
\n\
@return: True if the certificate has expired, false otherwise\n\
";
static PyObject *
crypto_X509_has_expired(crypto_X509Obj *self, PyObject *args)
{
time_t tnow;
if (!PyArg_ParseTuple(args, ":has_expired"))
return NULL;
tnow = time(NULL);
if (ASN1_UTCTIME_cmp_time_t(X509_get_notAfter(self->x509), tnow) < 0)
return PyLong_FromLong(1L);
else
return PyLong_FromLong(0L);
}
static char crypto_X509_subject_name_hash_doc[] = "\n\
Return the hash of the X509 subject.\n\
\n\
@return: The hash of the subject\n\
";
static PyObject *
crypto_X509_subject_name_hash(crypto_X509Obj *self, PyObject *args)
{
if (!PyArg_ParseTuple(args, ":subject_name_hash"))
return NULL;
return PyLong_FromLong(X509_subject_name_hash(self->x509));
}
static char crypto_X509_digest_doc[] = "\n\
Return the digest of the X509 object.\n\
\n\
@return: The digest of the object\n\
";
static PyObject *
crypto_X509_digest(crypto_X509Obj *self, PyObject *args)
{
unsigned char fp[EVP_MAX_MD_SIZE];
char *tmp;
char *digest_name;
unsigned int len,i;
PyObject *ret;
const EVP_MD *digest;
if (!PyArg_ParseTuple(args, "s:digest", &digest_name))
return NULL;
if ((digest = EVP_get_digestbyname(digest_name)) == NULL)
{
PyErr_SetString(PyExc_ValueError, "No such digest method");
return NULL;
}
if (!X509_digest(self->x509,digest,fp,&len))
{
exception_from_error_queue(crypto_Error);
}
tmp = malloc(3*len+1);
memset(tmp, 0, 3*len+1);
for (i = 0; i < len; i++) {
sprintf(tmp+i*3,"%02X:",fp[i]);
}
tmp[3*len-1] = 0;
ret = PyBytes_FromStringAndSize(tmp,3*len-1);
free(tmp);
return ret;
}
static char crypto_X509_add_extensions_doc[] = "\n\
Add extensions to the certificate.\n\
\n\
@param extensions: a sequence of X509Extension objects\n\
@return: None\n\
";
static PyObject *
crypto_X509_add_extensions(crypto_X509Obj *self, PyObject *args)
{
PyObject *extensions, *seq;
crypto_X509ExtensionObj *ext;
int nr_of_extensions, i;
if (!PyArg_ParseTuple(args, "O:add_extensions", &extensions))
return NULL;
seq = PySequence_Fast(extensions, "Expected a sequence");
if (seq == NULL)
return NULL;
nr_of_extensions = PySequence_Fast_GET_SIZE(seq);
for (i = 0; i < nr_of_extensions; i++)
{
ext = (crypto_X509ExtensionObj *)PySequence_Fast_GET_ITEM(seq, i);
if (!crypto_X509Extension_Check(ext))
{
Py_DECREF(seq);
PyErr_SetString(PyExc_ValueError,
"One of the elements is not an X509Extension");
return NULL;
}
if (!X509_add_ext(self->x509, ext->x509_extension, -1))
{
Py_DECREF(seq);
exception_from_error_queue(crypto_Error);
return NULL;
}
}
Py_INCREF(Py_None);
return Py_None;
}
/*
* ADD_METHOD(name) expands to a correct PyMethodDef declaration
* { 'name', (PyCFunction)crypto_X509_name, METH_VARARGS }
* for convenience
*/
#define ADD_METHOD(name) \
{ #name, (PyCFunction)crypto_X509_##name, METH_VARARGS, crypto_X509_##name##_doc }
static PyMethodDef crypto_X509_methods[] =
{
ADD_METHOD(get_version),
ADD_METHOD(set_version),
ADD_METHOD(get_serial_number),
ADD_METHOD(set_serial_number),
ADD_METHOD(get_issuer),
ADD_METHOD(set_issuer),
ADD_METHOD(get_subject),
ADD_METHOD(set_subject),
ADD_METHOD(get_pubkey),
ADD_METHOD(set_pubkey),
ADD_METHOD(get_notBefore),
ADD_METHOD(set_notBefore),
ADD_METHOD(get_notAfter),
ADD_METHOD(set_notAfter),
ADD_METHOD(gmtime_adj_notBefore),
ADD_METHOD(gmtime_adj_notAfter),
ADD_METHOD(sign),
ADD_METHOD(has_expired),
ADD_METHOD(subject_name_hash),
ADD_METHOD(digest),
ADD_METHOD(add_extensions),
{ NULL, NULL }
};
#undef ADD_METHOD
/*
* Constructor for X509 objects, never called by Python code directly
*
* Arguments: cert - A "real" X509 certificate object
* dealloc - Boolean value to specify whether the destructor should
* free the "real" X509 object
* Returns: The newly created X509 object
*/
crypto_X509Obj *
crypto_X509_New(X509 *cert, int dealloc)
{
crypto_X509Obj *self;
self = PyObject_New(crypto_X509Obj, &crypto_X509_Type);
if (self == NULL)
return NULL;
self->x509 = cert;
self->dealloc = dealloc;
return self;
}
static char crypto_X509_doc[] = "\n\
X509() -> X509 instance\n\
\n\
Create a new X509 object.\n\
\n\
@returns: The X509 object\n\
";
static PyObject *
crypto_X509_new(PyTypeObject *subtype, PyObject *args, PyObject *kwargs)
{
if (!PyArg_ParseTuple(args, ":X509")) {
return NULL;
}
return (PyObject *)crypto_X509_New(X509_new(), 1);
}
/*
* Deallocate the memory used by the X509 object
*
* Arguments: self - The X509 object
* Returns: None
*/
static void
crypto_X509_dealloc(crypto_X509Obj *self)
{
/* Sometimes we don't have to dealloc the "real" X509 pointer ourselves */
if (self->dealloc)
X509_free(self->x509);
PyObject_Del(self);
}
PyTypeObject crypto_X509_Type = {
PyOpenSSL_HEAD_INIT(&PyType_Type, 0)
"X509",
sizeof(crypto_X509Obj),
0,
(destructor)crypto_X509_dealloc,
NULL, /* print */
NULL, /* getattr */
NULL, /* setattr */
NULL, /* compare */
NULL, /* repr */
NULL, /* as_number */
NULL, /* as_sequence */
NULL, /* as_mapping */
NULL, /* hash */
NULL, /* call */
NULL, /* str */
NULL, /* getattro */
NULL, /* setattro */
NULL, /* as_buffer */
Py_TPFLAGS_DEFAULT,
crypto_X509_doc, /* doc */
NULL, /* traverse */
NULL, /* clear */
NULL, /* tp_richcompare */
0, /* tp_weaklistoffset */
NULL, /* tp_iter */
NULL, /* tp_iternext */
crypto_X509_methods, /* tp_methods */
NULL, /* tp_members */
NULL, /* tp_getset */
NULL, /* tp_base */
NULL, /* tp_dict */
NULL, /* tp_descr_get */
NULL, /* tp_descr_set */
0, /* tp_dictoffset */
NULL, /* tp_init */
NULL, /* tp_alloc */
crypto_X509_new, /* tp_new */
};
/*
* Initialize the X509 part of the crypto sub module
*
* Arguments: module - The crypto module
* Returns: None
*/
int
init_crypto_x509(PyObject *module)
{
if (PyType_Ready(&crypto_X509_Type) < 0) {
return 0;
}
if (PyModule_AddObject(module, "X509", (PyObject *)&crypto_X509_Type) != 0) {
return 0;
}
if (PyModule_AddObject(module, "X509Type", (PyObject *)&crypto_X509_Type) != 0) {
return 0;
}
return 1;
}