char *nussl_ssl_readable_dname(const nussl_ssl_dname * name) { int n, flag = 0; nussl_buffer *dump = nussl_buffer_create(); const ASN1_OBJECT *const cname = OBJ_nid2obj(NID_commonName), *const email = OBJ_nid2obj(NID_pkcs9_emailAddress); for (n = X509_NAME_entry_count(name->dn); n > 0; n--) { X509_NAME_ENTRY *ent = X509_NAME_get_entry(name->dn, n - 1); /* Skip commonName or emailAddress except if there is no other * attribute in dname. */ if ((OBJ_cmp(ent->object, cname) && OBJ_cmp(ent->object, email)) || (!flag && n == 1)) { if (flag++) nussl_buffer_append(dump, ", ", 2); if (append_dirstring(dump, ent->value)) nussl_buffer_czappend(dump, "???"); } } return nussl_buffer_finish(dump); }
static int openssl_xname_entry_count(lua_State*L) { X509_NAME* xn = CHECK_OBJECT(1, X509_NAME, "openssl.x509_name"); int len = X509_NAME_entry_count(xn); lua_pushinteger(L, len); return 1; };
static PyObject * get_subject (certificate_x509 *self, PyObject *args) { if (!PyArg_ParseTuple (args, "")) { return NULL; } X509_NAME *name = X509_get_subject_name (self->x509); int entries = X509_NAME_entry_count (name); int i; PyObject *dict = PyDict_New (); for (i = 0; i < entries; i++) { X509_NAME_ENTRY *entry = X509_NAME_get_entry (name, i); ASN1_OBJECT *obj = X509_NAME_ENTRY_get_object (entry); ASN1_STRING *data = X509_NAME_ENTRY_get_data (entry); PyObject *key = PyString_FromString (OBJ_nid2sn (OBJ_obj2nid (obj))); PyObject *value = PyString_FromString ((const char *) ASN1_STRING_data (data)); PyDict_SetItem (dict, key, value); Py_DECREF (key); Py_DECREF (value); } return dict; }
/* * Given a X509_NAME object and a name identifier, set the corresponding * attribute to the given string. Used by the setattr function. * * Arguments: name - The X509_NAME object * nid - The name identifier * value - The string to set * Returns: 0 for success, -1 on failure */ static int set_name_by_nid(X509_NAME *name, int nid, char *utf8string) { X509_NAME_ENTRY *ne; int i, entry_count, temp_nid; /* If there's an old entry for this NID, remove it */ entry_count = X509_NAME_entry_count(name); for (i = 0; i < entry_count; i++) { ne = X509_NAME_get_entry(name, i); temp_nid = OBJ_obj2nid(X509_NAME_ENTRY_get_object(ne)); if (temp_nid == nid) { ne = X509_NAME_delete_entry(name, i); X509_NAME_ENTRY_free(ne); break; } } /* Add the new entry */ if (!X509_NAME_add_entry_by_NID(name, nid, MBSTRING_UTF8, (unsigned char *)utf8string, -1, -1, 0)) { exception_from_error_queue(crypto_Error); return -1; } return 0; }
/* * Equivalent of X509_NAME_oneline that respects encoding * * This function converts X509_NAME structure to the text variable * converting all textual data into current database encoding. * * Parameter: X509_NAME *name X509_NAME structure to be converted * * Returns: text datum which contains string representation of * X509_NAME */ static Datum X509_NAME_to_text(X509_NAME *name) { BIO *membuf = BIO_new(BIO_s_mem()); int i, nid, count = X509_NAME_entry_count(name); X509_NAME_ENTRY *e; ASN1_STRING *v; const char *field_name; size_t size; char nullterm; char *sp; char *dp; text *result; if (membuf == NULL) ereport(ERROR, (errcode(ERRCODE_OUT_OF_MEMORY), errmsg("could not create OpenSSL BIO structure"))); (void) BIO_set_close(membuf, BIO_CLOSE); for (i = 0; i < count; i++) { e = X509_NAME_get_entry(name, i); nid = OBJ_obj2nid(X509_NAME_ENTRY_get_object(e)); if (nid == NID_undef) ereport(ERROR, (errcode(ERRCODE_INVALID_PARAMETER_VALUE), errmsg("could not get NID for ASN1_OBJECT object"))); v = X509_NAME_ENTRY_get_data(e); field_name = OBJ_nid2sn(nid); if (field_name == NULL) field_name = OBJ_nid2ln(nid); if (field_name == NULL) ereport(ERROR, (errcode(ERRCODE_INVALID_PARAMETER_VALUE), errmsg("could not convert NID %d to an ASN1_OBJECT structure", nid))); BIO_printf(membuf, "/%s=", field_name); ASN1_STRING_print_ex(membuf, v, ((ASN1_STRFLGS_RFC2253 & ~ASN1_STRFLGS_ESC_MSB) | ASN1_STRFLGS_UTF8_CONVERT)); } /* ensure null termination of the BIO's content */ nullterm = '\0'; BIO_write(membuf, &nullterm, 1); size = BIO_get_mem_data(membuf, &sp); dp = pg_any_to_server(sp, size - 1, PG_UTF8); result = cstring_to_text(dp); if (dp != sp) pfree(dp); if (BIO_free(membuf) != 1) elog(ERROR, "could not free OpenSSL BIO structure"); PG_RETURN_TEXT_P(result); }
/** * Obtém a codificação da requisição. * @return número correspondente à codificação. */ int getReqCodification() { X509_NAME* name = X509_get_subject_name(certBuilder->getX509()); for (int i = 0; i < X509_NAME_entry_count(name); i++) { X509_NAME_ENTRY* entry = X509_NAME_get_entry(name, i); if (OBJ_obj2nid(entry->object) != NID_countryName) { return entry->value->type; } } return -1; }
/** * Testa se a codificação do certificado está de acordo com o esperado. * @param expectedCodification codificação esperada. * @param cert certificado exportado. */ void testStringCodificaton(int expectedCodification, Certificate* cert) { X509_NAME* after = X509_get_subject_name(cert->getX509()); for (int i = 0; i < X509_NAME_entry_count(after); i++) { X509_NAME_ENTRY* entry = X509_NAME_get_entry(after, i); if (OBJ_obj2nid(entry->object) != NID_countryName) { int codification = entry->value->type; ASSERT_EQ(expectedCodification, codification); } } }
/* * Equivalent of X509_NAME_oneline that respects encoding * * This function converts X509_NAME structure to the text variable * converting all textual data into current database encoding. * * Parameter: X509_NAME *name X509_NAME structure to be converted * * Returns: text datum which contains string representation of * X509_NAME */ Datum X509_NAME_to_text(X509_NAME *name) { BIO *membuf = BIO_new(BIO_s_mem()); int i, nid, count = X509_NAME_entry_count(name); X509_NAME_ENTRY *e; ASN1_STRING *v; const char *field_name; size_t size, outlen; char *sp; char *dp; text *result; (void) BIO_set_close(membuf, BIO_CLOSE); for (i = 0; i < count; i++) { e = X509_NAME_get_entry(name, i); nid = OBJ_obj2nid(X509_NAME_ENTRY_get_object(e)); v = X509_NAME_ENTRY_get_data(e); field_name = OBJ_nid2sn(nid); if (!field_name) field_name = OBJ_nid2ln(nid); BIO_printf(membuf, "/%s=", field_name); ASN1_STRING_print_ex(membuf, v, ((ASN1_STRFLGS_RFC2253 & ~ASN1_STRFLGS_ESC_MSB) | ASN1_STRFLGS_UTF8_CONVERT)); } i = 0; BIO_write(membuf, &i, 1); size = BIO_get_mem_data(membuf, &sp); dp = (char *) pg_do_encoding_conversion((unsigned char *) sp, size - 1, PG_UTF8, GetDatabaseEncoding()); BIO_free(membuf); outlen = strlen(dp); result = palloc(VARHDRSZ + outlen); memcpy(VARDATA(result), dp, outlen); /* * pg_do_encoding_conversion has annoying habit of returning source * pointer */ if (dp != sp) pfree(dp); VARATT_SIZEP(result) = outlen + VARHDRSZ; PG_RETURN_TEXT_P(result); }
int verify_subject(X509* cert, SpiceOpenSSLVerify* verify) { X509_NAME *cert_subject = NULL; int ret; int in_entries; if (!cert) { SPICE_DEBUG("warning: no cert!"); return 0; } cert_subject = X509_get_subject_name(cert); if (!cert_subject) { SPICE_DEBUG("warning: reading certificate subject failed"); return 0; } if (!verify->in_subject) { verify->in_subject = subject_to_x509_name(verify->subject, &in_entries); if (!verify->in_subject) { SPICE_DEBUG("warning: no in_subject!"); return 0; } } /* Note: this check is redundant with the pre-condition in X509_NAME_cmp */ if (X509_NAME_entry_count(cert_subject) != in_entries) { SPICE_DEBUG("subject mismatch: #entries cert=%d, input=%d", X509_NAME_entry_count(cert_subject), in_entries); return 0; } ret = X509_NAME_cmp(cert_subject, verify->in_subject); if (ret == 0) SPICE_DEBUG("subjects match"); else SPICE_DEBUG("subjects mismatch"); return !ret; }
IoObject *IoCertificate_nameToObject(IoObject *self, X509_NAME *xname) { IoObject *map = IoObject_new(IoObject_state(self)); int i; for(i = 0; i < X509_NAME_entry_count(xname); i++) { X509_NAME_ENTRY *entry = X509_NAME_get_entry(xname, i); const char *key = (const char *)OBJ_nid2ln(OBJ_obj2nid(X509_NAME_ENTRY_get_object(entry))); const char *value = (const char *)ASN1_STRING_data(X509_NAME_ENTRY_get_data(entry)); IoObject_setSlot_to_(map, IOSYMBOL(key), IoSeq_newWithCString_(IoObject_state(self), value)); } return map; }
/*** return x509_name as table @function info @tparam[opt=false] boolean asobject table key will use asn1_object or short name of asn1_object @treturn table names @see new */ static int openssl_xname_info(lua_State*L) { X509_NAME* name = CHECK_OBJECT(1, X509_NAME, "openssl.x509_name"); int obj = lua_isnoneornil(L, 2) ? 0 : lua_toboolean(L, 2); int i, n; lua_newtable(L); for (i = 0, n = X509_NAME_entry_count(name); i < n; i++) { X509_NAME_ENTRY* entry = X509_NAME_get_entry(name, i); openssl_push_xname_entry(L, entry, obj); lua_rawseti(L, -2, i + 1); } return 1; };
static int openssl_xname_info(lua_State*L) { X509_NAME* name = CHECK_OBJECT(1, X509_NAME, "openssl.x509_name"); int i; int n_entries = X509_NAME_entry_count(name); lua_newtable(L); for (i = 0; i < n_entries; i++) { X509_NAME_ENTRY* entry = X509_NAME_get_entry(name, i); openssl_push_xname_entry(L, entry); lua_rawseti(L, -2, i + 1); } return 1; };
/* * Save X509 fields to environment, using the naming convention: * * X509_{cert_depth}_{name}={value} */ void x509_setenv (struct env_set *es, int cert_depth, openvpn_x509_cert_t *peer_cert) { int i, n; int fn_nid; ASN1_OBJECT *fn; ASN1_STRING *val; X509_NAME_ENTRY *ent; const char *objbuf; unsigned char *buf; char *name_expand; size_t name_expand_size; X509_NAME *x509 = X509_get_subject_name (peer_cert); n = X509_NAME_entry_count (x509); for (i = 0; i < n; ++i) { ent = X509_NAME_get_entry (x509, i); if (!ent) continue; fn = X509_NAME_ENTRY_get_object (ent); if (!fn) continue; val = X509_NAME_ENTRY_get_data (ent); if (!val) continue; fn_nid = OBJ_obj2nid (fn); if (fn_nid == NID_undef) continue; objbuf = OBJ_nid2sn (fn_nid); if (!objbuf) continue; buf = (unsigned char *)1; /* bug in OpenSSL 0.9.6b ASN1_STRING_to_UTF8 requires this workaround */ if (ASN1_STRING_to_UTF8 (&buf, val) <= 0) continue; name_expand_size = 64 + strlen (objbuf); name_expand = (char *) malloc (name_expand_size); check_malloc_return (name_expand); openvpn_snprintf (name_expand, name_expand_size, "X509_%d_%s", cert_depth, objbuf); string_mod (name_expand, CC_PRINT, CC_CRLF, '_'); string_mod ((char*)buf, CC_PRINT, CC_CRLF, '_'); setenv_str (es, name_expand, (char*)buf); free (name_expand); OPENSSL_free (buf); } }
/* * Equivalent of X509_NAME_oneline that respects encoding * * This function converts X509_NAME structure to the text variable * converting all textual data into current database encoding. * * Parameter: X509_NAME *name X509_NAME structure to be converted * * Returns: text datum which contains string representation of * X509_NAME */ datum_t X509_NAME_to_text(X509_NAME *name) { BIO *membuf = BIO_new(BIO_s_mem()); int i, nid, count = X509_NAME_entry_count(name); X509_NAME_ENTRY *e; ASN1_STRING *v; const char *field_name; size_t size; char nullterm; char *sp; char *dp; text *result; (void) BIO_set_close(membuf, BIO_CLOSE); for (i = 0; i < count; i++) { e = X509_NAME_get_entry(name, i); nid = OBJ_obj2nid(X509_NAME_ENTRY_get_object(e)); v = X509_NAME_ENTRY_get_data(e); field_name = OBJ_nid2sn(nid); if (!field_name) field_name = OBJ_nid2ln(nid); BIO_printf(membuf, "/%s=", field_name); ASN1_STRING_print_ex(membuf, v, ((ASN1_STRFLGS_RFC2253 & ~ASN1_STRFLGS_ESC_MSB) | ASN1_STRFLGS_UTF8_CONVERT)); } /* ensure null termination of the BIO's content */ nullterm = '\0'; BIO_write(membuf, &nullterm, 1); size = BIO_get_mem_data(membuf, &sp); dp = (char *) pg_do_encoding_conversion((unsigned char *) sp, size - 1, PG_UTF8, get_db_encoding()); result = cstring_to_text(dp); if (dp != sp) pfree(dp); BIO_free(membuf); RET_TEXT_P(result); }
//int EstEID_loadCertEntries(EstEID_Map cert, char *prefix, X509_NAME *x509Name) { int EstEID_loadCertEntries(EstEID_Map cert, char *prefix, struct X509_name_st *x509Name) { // todo: error handling of all openssl functions unsigned int count = X509_NAME_entry_count(x509Name); for (unsigned int i = 0; i < count; i++) { X509_NAME_ENTRY *entry = X509_NAME_get_entry(x509Name, i); char name[1024]; strcpy(name, prefix); OBJ_obj2txt(name + strlen(prefix), sizeof(name) - strlen(prefix), entry->object, 0); char *value; ASN1_STRING_to_UTF8((unsigned char **)&value, entry->value); EstEID_mapPutNoAlloc(cert, strdup(name), value); } return SUCCESS; }
static void CheckDN(X509_NAME *dn) { for (int i = 0; i < X509_NAME_entry_count(dn); i++) { X509_NAME_ENTRY *ne = X509_NAME_get_entry(dn, i); ASN1_STRING *data = X509_NAME_ENTRY_get_data(ne); if (data->type != V_ASN1_SEQUENCE) { CheckNameEntryValid(ne); } else { /* TODO: It's a sequence, we should go over it's members */ SetInfo(INF_STRING_NOT_CHECKED); } } }
static char *ssl_var_lookup_ssl_cert_dn(apr_pool_t *p, X509_NAME *xsname, const char *var) { const char *ptr; char *result; X509_NAME_ENTRY *xsne; int i, j, n, idx = 0, raw = 0; apr_size_t varlen; ptr = ap_strrchr_c(var, '_'); if (ptr && ptr > var && strcmp(ptr + 1, "RAW") == 0) { var = apr_pstrmemdup(p, var, ptr - var); raw = 1; } /* if an _N suffix is used, find the Nth attribute of given name */ ptr = ap_strchr_c(var, '_'); if (ptr != NULL && strspn(ptr + 1, "0123456789") == strlen(ptr + 1)) { idx = atoi(ptr + 1); varlen = ptr - var; } else { varlen = strlen(var); } result = NULL; for (i = 0; ssl_var_lookup_ssl_cert_dn_rec[i].name != NULL; i++) { if (strEQn(var, ssl_var_lookup_ssl_cert_dn_rec[i].name, varlen) && strlen(ssl_var_lookup_ssl_cert_dn_rec[i].name) == varlen) { for (j = 0; j < X509_NAME_entry_count(xsname); j++) { xsne = X509_NAME_get_entry(xsname, j); n =OBJ_obj2nid((ASN1_OBJECT *)X509_NAME_ENTRY_get_object(xsne)); if (n == ssl_var_lookup_ssl_cert_dn_rec[i].nid && idx-- == 0) { result = modssl_X509_NAME_ENTRY_to_string(p, xsne, raw); break; } } break; } } return result; }
/* * Convert an X509 subject name to a cstring. * */ static char * X509_NAME_to_cstring(X509_NAME *name) { BIO *membuf = BIO_new(BIO_s_mem()); int i, nid, count = X509_NAME_entry_count(name); X509_NAME_ENTRY *e; ASN1_STRING *v; const char *field_name; size_t size; char nullterm; char *sp; char *dp; char *result; (void) BIO_set_close(membuf, BIO_CLOSE); for (i = 0; i < count; i++) { e = X509_NAME_get_entry(name, i); nid = OBJ_obj2nid(X509_NAME_ENTRY_get_object(e)); v = X509_NAME_ENTRY_get_data(e); field_name = OBJ_nid2sn(nid); if (!field_name) field_name = OBJ_nid2ln(nid); BIO_printf(membuf, "/%s=", field_name); ASN1_STRING_print_ex(membuf, v, ((ASN1_STRFLGS_RFC2253 & ~ASN1_STRFLGS_ESC_MSB) | ASN1_STRFLGS_UTF8_CONVERT)); } /* ensure null termination of the BIO's content */ nullterm = '\0'; BIO_write(membuf, &nullterm, 1); size = BIO_get_mem_data(membuf, &sp); dp = pg_any_to_server(sp, size - 1, PG_UTF8); result = pstrdup(dp); if (dp != sp) pfree(dp); BIO_free(membuf); return result; }
static PyObject * crypto_X509Name_get_components(crypto_X509NameObj *self, PyObject *args) { int n, i; X509_NAME *name = self->x509_name; PyObject *list; if (!PyArg_ParseTuple(args, ":get_components")) return NULL; n = X509_NAME_entry_count(name); list = PyList_New(n); for (i = 0; i < n; i++) { X509_NAME_ENTRY *ent; ASN1_OBJECT *fname; ASN1_STRING *fval; int nid; int l; unsigned char *str; PyObject *tuple; ent = X509_NAME_get_entry(name, i); fname = X509_NAME_ENTRY_get_object(ent); fval = X509_NAME_ENTRY_get_data(ent); l = ASN1_STRING_length(fval); str = ASN1_STRING_data(fval); nid = OBJ_obj2nid(fname); /* printf("fname is %s len=%d str=%s\n", OBJ_nid2sn(nid), l, str); */ tuple = PyTuple_New(2); PyTuple_SetItem(tuple, 0, PyBytes_FromString(OBJ_nid2sn(nid))); PyTuple_SetItem(tuple, 1, PyBytes_FromStringAndSize((char *)str, l)); PyList_SetItem(list, i, tuple); } return list; }
static char *__apn_ssl_cert_entry_string(X509_NAME *name) { char subject_entry_buffer[__APN_X509_ENTRY_BUF_SIZE] = {0}; int entry_count = X509_NAME_entry_count(name); for (int i = 0; i < entry_count; i++) { X509_NAME_ENTRY *entry = X509_NAME_get_entry(name, i); ASN1_OBJECT *entry_object = X509_NAME_ENTRY_get_object(entry); const char *entry_name = OBJ_nid2sn(OBJ_obj2nid(entry_object)); const unsigned char *entry_value = ASN1_STRING_data(X509_NAME_ENTRY_get_data(entry)); apn_strcat(subject_entry_buffer, entry_name, __APN_X509_ENTRY_BUF_SIZE, strlen(entry_name)); apn_strcat(subject_entry_buffer, "=", __APN_X509_ENTRY_BUF_SIZE, 1); apn_strcat(subject_entry_buffer, (const char *)entry_value, __APN_X509_ENTRY_BUF_SIZE, strlen((const char *)entry_value)); if(i + 1 < entry_count) { apn_strcat(subject_entry_buffer, ", ", __APN_X509_ENTRY_BUF_SIZE, 2); } } return apn_strndup(subject_entry_buffer, strlen(subject_entry_buffer)); }
MONO_API int mono_btls_x509_name_get_entry_oid (MonoBtlsX509Name *name, int index, char *buffer, int size) { X509_NAME_ENTRY *entry; ASN1_OBJECT *obj; if (index >= X509_NAME_entry_count (name->name)) return 0; entry = X509_NAME_get_entry (name->name, index); if (!entry) return 0; obj = X509_NAME_ENTRY_get_object (entry); if (!obj) return 0; return OBJ_obj2txt (buffer, size, obj, 1); }
MONO_API MonoBtlsX509NameEntryType mono_btls_x509_name_get_entry_type (MonoBtlsX509Name *name, int index) { X509_NAME_ENTRY *entry; ASN1_OBJECT *obj; if (index >= X509_NAME_entry_count (name->name)) return -1; entry = X509_NAME_get_entry (name->name, index); if (!entry) return -1; obj = X509_NAME_ENTRY_get_object (entry); if (!obj) return -1; return nid2mono (OBJ_obj2nid (obj)); }
// generate an LLSD from a certificate name (issuer or subject name). // the name will be strings indexed by the 'long form' LLSD cert_name_from_X509_NAME(X509_NAME* name) { LLSD result = LLSD::emptyMap(); int name_entries = X509_NAME_entry_count(name); for (int entry_index=0; entry_index < name_entries; entry_index++) { char buffer[32]; X509_NAME_ENTRY *entry = X509_NAME_get_entry(name, entry_index); std::string name_value = std::string((const char*)M_ASN1_STRING_data(X509_NAME_ENTRY_get_data(entry)), M_ASN1_STRING_length(X509_NAME_ENTRY_get_data(entry))); ASN1_OBJECT* name_obj = X509_NAME_ENTRY_get_object(entry); OBJ_obj2txt(buffer, sizeof(buffer), name_obj, 0); std::string obj_buffer_str = std::string(buffer); result[obj_buffer_str] = name_value; } return result; }
static void openssl_setenv_X509_add_entries(liVRequest *vr, X509 *x509, const gchar *prefix, guint prefix_len) { guint i, j; GString *k = vr->wrk->tmp_str; X509_NAME *xn = X509_get_subject_name(x509); X509_NAME_ENTRY *xe; const char * xobjsn; g_string_truncate(k, 0); g_string_append_len(k, prefix, prefix_len); for (i = 0, j = X509_NAME_entry_count(xn); i < j; ++i) { if (!(xe = X509_NAME_get_entry(xn, i)) || !(xobjsn = OBJ_nid2sn(OBJ_obj2nid((ASN1_OBJECT*)X509_NAME_ENTRY_get_object(xe))))) continue; g_string_truncate(k, prefix_len); g_string_append(k, xobjsn); li_environment_set(&vr->env, GSTR_LEN(k), (const gchar *)xe->value->data, xe->value->length); } }
MONO_API int mono_btls_x509_name_get_entry_oid_data (MonoBtlsX509Name *name, int index, const void **data) { X509_NAME_ENTRY *entry; ASN1_OBJECT *obj; if (index >= X509_NAME_entry_count (name->name)) return -1; entry = X509_NAME_get_entry (name->name, index); if (!entry) return -1; obj = X509_NAME_ENTRY_get_object (entry); if (!obj) return -1; *data = obj->data; return obj->length; }
static int GetCommonNameFromCertificate__(X509 *cert, char *name, size_t len) { X509_NAME *subject; X509_NAME_ENTRY *entry; int count, i; if ((subject = X509_get_subject_name(cert)) == NULL) return -1; count = X509_NAME_entry_count(subject); for (i = 0; i < count; i++){ if ((entry = X509_NAME_get_entry(subject, i)) == NULL) break; if (OBJ_obj2nid(entry->object) != NID_commonName) continue; if (name != NULL && len > 0) snprintf(name, len, "%s", entry->value->data); return entry->value->length; } return -1; }
void output_X509_NAME(X509_NAME *name, gf_io_t pc) { int i, c; char buf[256]; c = X509_NAME_entry_count(name); for(i=c-1; i>=0; i--){ X509_NAME_ENTRY *e; e = X509_NAME_get_entry(name,i); if(!e) continue; X509_NAME_get_text_by_OBJ(name, e->object, buf, sizeof(buf)); gf_puts(buf, pc); gf_puts(NEWLINE, pc); } }
static void x509_print_info (X509 *x509crt) { int i, n; int fn_nid; ASN1_OBJECT *fn; ASN1_STRING *val; X509_NAME *x509_name; X509_NAME_ENTRY *ent; const char *objbuf; unsigned char *buf; x509_name = X509_get_subject_name (x509crt); n = X509_NAME_entry_count (x509_name); for (i = 0; i < n; ++i) { ent = X509_NAME_get_entry (x509_name, i); if (!ent) continue; fn = X509_NAME_ENTRY_get_object (ent); if (!fn) continue; val = X509_NAME_ENTRY_get_data (ent); if (!val) continue; fn_nid = OBJ_obj2nid (fn); if (fn_nid == NID_undef) continue; objbuf = OBJ_nid2sn (fn_nid); if (!objbuf) continue; buf = (unsigned char *)1; /* bug in OpenSSL 0.9.6b ASN1_STRING_to_UTF8 requires this workaround */ if (ASN1_STRING_to_UTF8 (&buf, val) <= 0) continue; printf("X509 %s: %s\n", objbuf, (char *)buf); OPENSSL_free (buf); } }
/** * Retrive the general names from the object. */ static int push_x509_name(lua_State* L, X509_NAME *name) { int i; int n_entries; ASN1_OBJECT *object; X509_NAME_ENTRY *entry; lua_newtable(L); n_entries = X509_NAME_entry_count(name); for (i = 0; i < n_entries; i++) { entry = X509_NAME_get_entry(name, i); object = X509_NAME_ENTRY_get_object(entry); lua_newtable(L); push_asn1_objname(L, object, 1); lua_setfield(L, -2, "oid"); push_asn1_objname(L, object, 0); lua_setfield(L, -2, "name"); push_asn1_string(L, X509_NAME_ENTRY_get_data(entry)); lua_setfield(L, -2, "value"); lua_rawseti(L, -2, i+1); } return 1; }
MONO_API int mono_btls_x509_name_get_entry_value (MonoBtlsX509Name *name, int index, int *tag, unsigned char **str) { X509_NAME_ENTRY *entry; ASN1_STRING *data; *str = NULL; *tag = 0; if (index >= X509_NAME_entry_count (name->name)) return 0; entry = X509_NAME_get_entry (name->name, index); if (!entry) return 0; data = X509_NAME_ENTRY_get_data (entry); if (!data) return 0; *tag = data->type; return ASN1_STRING_to_UTF8 (str, data); }