File: OpenSSLCertificateFactory.cpp

package info (click to toggle)
swift-im 5.0~alpha2.145.g12d031cf8%2Bdfsg-5
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 27,240 kB
  • sloc: cpp: 134,640; python: 2,701; sh: 774; xml: 561; javascript: 69; makefile: 60
file content (57 lines) | stat: -rw-r--r-- 1,861 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
/*
 * Copyright (c) 2018 Isode Limited.
 * All rights reserved.
 * See the COPYING file for more information.
 */

#include <Swiften/TLS/OpenSSL/OpenSSLCertificateFactory.h>

#include <openssl/pem.h>
#include <openssl/err.h>
#include <limits>

namespace Swift {

OpenSSLCertificateFactory::OpenSSLCertificateFactory() {
}

OpenSSLCertificateFactory::~OpenSSLCertificateFactory() {
}

Certificate* OpenSSLCertificateFactory::createCertificateFromDER(const ByteArray& der) {
    return new OpenSSLCertificate(der);
}

std::vector<std::shared_ptr<Certificate>> OpenSSLCertificateFactory::createCertificateChain(const ByteArray& data) {
    std::vector<std::shared_ptr<Certificate>> certificateChain;

    if (data.size() > std::numeric_limits<int>::max()) {
        return certificateChain;
    }

    auto bio = std::shared_ptr<BIO>(BIO_new(BIO_s_mem()), BIO_free);
    BIO_write(bio.get(), vecptr(data), int(data.size()));

    // Attempt parsing data as PEM
    X509* openSSLCert = nullptr;
    auto x509certFromPEM = PEM_read_bio_X509(bio.get(), &openSSLCert, nullptr, nullptr);
    if (x509certFromPEM && openSSLCert) {
        std::shared_ptr<X509> x509Cert(openSSLCert, X509_free);
        certificateChain.emplace_back(std::make_shared<OpenSSLCertificate>(x509Cert));
        openSSLCert = nullptr;
        while ((x509certFromPEM = PEM_read_bio_X509(bio.get(), &openSSLCert, nullptr, nullptr)) != nullptr) {
            std::shared_ptr<X509> x509Cert(openSSLCert, X509_free);
            certificateChain.emplace_back(std::make_shared<OpenSSLCertificate>(x509Cert));
            openSSLCert = nullptr;
        }
    }

    // Clear any (expected) errors which resulted from PEM parsing
    // If we don't do this, any existing TLS context will detect these
    // spurious errors and fail to work
    ERR_clear_error();

    return certificateChain;
}

}