LIEF: Library to Instrument Executable Formats Version 0.15.1
Loading...
Searching...
No Matches
x509.hpp
Go to the documentation of this file.
1/* Copyright 2017 - 2024 R. Thomas
2 * Copyright 2017 - 2024 Quarkslab
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16#ifndef LIEF_PE_X509_H
17#define LIEF_PE_X509_H
18#include <array>
19#include <memory>
20#include <vector>
21
22#include "LIEF/Object.hpp"
23#include "LIEF/visibility.h"
24
25#include "LIEF/PE/enums.hpp"
26
28
29#include "LIEF/enums.hpp"
30
31struct mbedtls_x509_crt;
32
33namespace LIEF {
34namespace PE {
35
36class Parser;
37class SignatureParser;
38class Signature;
39
40class RsaInfo;
41
43class LIEF_API x509 : public Object {
44
45 friend class Parser;
46 friend class SignatureParser;
47 friend class Signature;
48
49 public:
51 using date_t = std::array<int32_t, 6>;
52
53 using certificates_t = std::vector<x509>;
54
56 static certificates_t parse(const std::string& path);
57
59 static certificates_t parse(const std::vector<uint8_t>& content);
60
62 static bool check_time(const date_t& before, const date_t& after);
63
65 static bool time_is_past(const date_t& to);
66
68 static bool time_is_future(const date_t& from);
69
71 enum class KEY_TYPES : uint32_t {
72 NONE = 0,
73 RSA,
74 ECKEY,
75 ECKEY_DH,
76 ECDSA,
77 RSA_ALT,
78 RSASSA_PSS,
79 };
80
84 enum class VERIFICATION_FLAGS : uint32_t {
85 OK = 0,
86 BADCERT_EXPIRED = 1 << 0,
87 BADCERT_REVOKED = 1 << 1,
88 BADCERT_CN_MISMATCH = 1 << 2,
89 BADCERT_NOT_TRUSTED = 1 << 3,
90 BADCRL_NOT_TRUSTED = 1 << 4,
91 BADCRL_EXPIRED = 1 << 5,
92 BADCERT_MISSING = 1 << 6,
93 BADCERT_SKIP_VERIFY = 1 << 7,
94 BADCERT_OTHER = 1 << 8,
95 BADCERT_FUTURE = 1 << 9,
96 BADCRL_FUTURE = 1 << 10,
97 BADCERT_KEY_USAGE = 1 << 11,
98 BADCERT_EXT_KEY_USAGE = 1 << 12,
99 BADCERT_NS_CERT_TYPE = 1 << 13,
100 BADCERT_BAD_MD = 1 << 14,
101 BADCERT_BAD_PK = 1 << 15,
102 BADCERT_BAD_KEY = 1 << 16,
103 BADCRL_BAD_MD = 1 << 17,
104 BADCRL_BAD_PK = 1 << 18,
105 BADCRL_BAD_KEY = 1 << 19,
106 };
107
109 enum class KEY_USAGE : uint32_t {
110 DIGITAL_SIGNATURE = 0,
111 NON_REPUDIATION,
112 KEY_ENCIPHERMENT,
113 DATA_ENCIPHERMENT,
114 KEY_AGREEMENT,
115 KEY_CERT_SIGN,
116 CRL_SIGN,
117 ENCIPHER_ONLY,
118 DECIPHER_ONLY,
119 };
120
121 x509(mbedtls_x509_crt* ca);
122 x509(const x509& other);
124 void swap(x509& other);
125
127 uint32_t version() const;
128
130 std::vector<uint8_t> serial_number() const;
131
134
137
140
142 std::string issuer() const;
143
145 std::string subject() const;
146
149 bool check_signature(const std::vector<uint8_t>& hash,
150 const std::vector<uint8_t>& signature, ALGORITHMS digest) const;
151
153 std::vector<uint8_t> raw() const;
154
157
160 std::unique_ptr<RsaInfo> rsa_info() const;
161
164
166 VERIFICATION_FLAGS is_trusted_by(const std::vector<x509>& ca) const;
167
169 std::vector<oid_t> certificate_policies() const;
170
172 std::vector<KEY_USAGE> key_usage() const;
173
175 std::vector<oid_t> ext_key_usage() const;
176
177 bool is_ca() const;
178
180 std::vector<uint8_t> signature() const;
181
182 void accept(Visitor& visitor) const override;
183
184 ~x509() override;
185
186 LIEF_API friend std::ostream& operator<<(std::ostream& os, const x509& x509_cert);
187
188 private:
189 x509();
190 mbedtls_x509_crt* x509_cert_ = nullptr;
191
192};
193
194}
195}
196
198
199#endif
Definition Object.hpp:25
Main interface to parse PE binaries. In particular the static functions: Parser::parse should be used...
Definition PE/Parser.hpp:47
Definition SignatureParser.hpp:37
Main interface for the PKCS #7 signature scheme.
Definition Signature.hpp:39
Interface over a x509 certificate.
Definition x509.hpp:43
std::string issuer() const
Issuer informations.
void swap(x509 &other)
date_t valid_from() const
Start time of certificate validity.
KEY_USAGE
Key usage as defined in RFC #5280 - section-4.2.1.3
Definition x509.hpp:109
std::vector< uint8_t > serial_number() const
Unique id for certificate issued by a specific CA.
std::vector< uint8_t > raw() const
The raw x509 bytes (DER encoded)
static certificates_t parse(const std::string &path)
Parse x509 certificate(s) from file path.
std::vector< uint8_t > signature() const
The signature of the certificate.
VERIFICATION_FLAGS verify(const x509 &ca) const
Verify that this certificate has been used to trust the given certificate.
std::unique_ptr< RsaInfo > rsa_info() const
If the underlying public-key scheme is RSA, return the RSA information. Otherwise,...
void accept(Visitor &visitor) const override
x509 & operator=(x509 other)
std::string subject() const
Subject informations.
std::vector< KEY_USAGE > key_usage() const
Purpose of the key contained in the certificate.
static bool time_is_past(const date_t &to)
True if the given time is in the past according to the clock's system.
static bool check_time(const date_t &before, const date_t &after)
Return True if before is before than after. False otherwise.
std::vector< x509 > certificates_t
Definition x509.hpp:53
oid_t signature_algorithm() const
Signature algorithm (OID)
bool is_ca() const
KEY_TYPES key_type() const
Return the underlying public-key scheme.
std::array< int32_t, 6 > date_t
Tuple (Year, Month, Day, Hour, Minute, Second)
Definition x509.hpp:51
~x509() override
x509(mbedtls_x509_crt *ca)
uint32_t version() const
X.509 version. (1=v1, 2=v2, 3=v3)
bool check_signature(const std::vector< uint8_t > &hash, const std::vector< uint8_t > &signature, ALGORITHMS digest) const
Try to decrypt the given signature and check if it matches the given hash according to the hash algor...
VERIFICATION_FLAGS is_trusted_by(const std::vector< x509 > &ca) const
Verify that this certificate is trusted by the given CA list.
VERIFICATION_FLAGS
Mirror of mbedtls's X509 Verify codes: MBEDTLS_X509_XX.
Definition x509.hpp:84
x509(const x509 &other)
KEY_TYPES
Public key scheme.
Definition x509.hpp:71
static bool time_is_future(const date_t &from)
True if the given time is in the future according to the clock's system.
std::vector< oid_t > ext_key_usage() const
Indicates one or more purposes for which the certified public key may be used (OID types)
static certificates_t parse(const std::vector< uint8_t > &content)
Parse x509 certificate(s) from raw blob.
std::vector< oid_t > certificate_policies() const
Policy information terms as OID (see RFC #5280)
date_t valid_to() const
End time of certificate validity.
friend std::ostream & operator<<(std::ostream &os, const x509 &x509_cert)
Definition Visitor.hpp:224
#define ENABLE_BITMASK_OPERATORS(X)
Definition enums.hpp:24
ALGORITHMS
Cryptography algorithms.
Definition PE/enums.hpp:686
std::string oid_t
Definition PE/signature/types.hpp:23
LIEF namespace.
Definition Abstract/Binary.hpp:32
#define LIEF_API
Definition visibility.h:41