| The ASN.1 Routines. |
| |
| ASN.1 is a specification for how to encode structured 'data' in binary form. |
| The approach I have take to the manipulation of structures and their encoding |
| into ASN.1 is as follows. |
| |
| For each distinct structure there are 4 function of the following form |
| TYPE *TYPE_new(void); |
| void TYPE_free(TYPE *); |
| TYPE *d2i_TYPE(TYPE **a,unsigned char **pp,long length); |
| long i2d_TYPE(TYPE *a,unsigned char **pp); /* CHECK RETURN VALUE */ |
| |
| where TYPE is the type of the 'object'. The TYPE that have these functions |
| can be in one of 2 forms, either the internal C malloc()ed data structure |
| or in the DER (a variant of ASN.1 encoding) binary encoding which is just |
| an array of unsigned bytes. The 'i2d' functions converts from the internal |
| form to the DER form and the 'd2i' functions convert from the DER form to |
| the internal form. |
| |
| The 'new' function returns a malloc()ed version of the structure with all |
| substructures either created or left as NULL pointers. For 'optional' |
| fields, they are normally left as NULL to indicate no value. For variable |
| size sub structures (often 'SET OF' or 'SEQUENCE OF' in ASN.1 syntax) the |
| STACK data type is used to hold the values. Have a read of stack.doc |
| and have a look at the relevant header files to see what I mean. If there |
| is an error while malloc()ing the structure, NULL is returned. |
| |
| The 'free' function will free() all the sub components of a particular |
| structure. If any of those sub components have been 'removed', replace |
| them with NULL pointers, the 'free' functions are tolerant of NULL fields. |
| |
| The 'd2i' function copies a binary representation into a C structure. It |
| operates as follows. 'a' is a pointer to a pointer to |
| the structure to populate, 'pp' is a pointer to a pointer to where the DER |
| byte string is located and 'length' is the length of the '*pp' data. |
| If there are no errors, a pointer to the populated structure is returned. |
| If there is an error, NULL is returned. Errors can occur because of |
| malloc() failures but normally they will be due to syntax errors in the DER |
| encoded data being parsed. It is also an error if there was an |
| attempt to read more that 'length' bytes from '*p'. If |
| everything works correctly, the value in '*p' is updated |
| to point at the location just beyond where the DER |
| structure was read from. In this way, chained calls to 'd2i' type |
| functions can be made, with the pointer into the 'data' array being |
| 'walked' along the input byte array. |
| Depending on the value passed for 'a', different things will be done. If |
| 'a' is NULL, a new structure will be malloc()ed and returned. If '*a' is |
| NULL, a new structure will be malloc()ed and put into '*a' and returned. |
| If '*a' is not NULL, the structure in '*a' will be populated, or in the |
| case of an error, free()ed and then returned. |
| Having these semantics means that a structure |
| can call a 'd2i' function to populate a field and if the field is currently |
| NULL, the structure will be created. |
| |
| The 'i2d' function type is used to copy a C structure to a byte array. |
| The parameter 'a' is the structure to convert and '*p' is where to put it. |
| As for the 'd2i' type structure, 'p' is updated to point after the last |
| byte written. If p is NULL, no data is written. The function also returns |
| the number of bytes written. Where this becomes useful is that if the |
| function is called with a NULL 'p' value, the length is returned. This can |
| then be used to malloc() an array of bytes and then the same function can |
| be recalled passing the malloced array to be written to. e.g. |
| |
| int len; |
| unsigned char *bytes,*p; |
| len=i2d_X509(x,NULL); /* get the size of the ASN1 encoding of 'x' */ |
| if ((bytes=(unsigned char *)malloc(len)) == NULL) |
| goto err; |
| p=bytes; |
| i2d_X509(x,&p); |
| |
| Please note that a new variable, 'p' was passed to i2d_X509. After the |
| call to i2d_X509 p has been incremented by len bytes. |
| |
| Now the reason for this functional organisation is that it allows nested |
| structures to be built up by calling these functions as required. There |
| are various macros used to help write the general 'i2d', 'd2i', 'new' and |
| 'free' functions. They are discussed in another file and would only be |
| used by some-one wanting to add new structures to the library. As you |
| might be able to guess, the process of writing ASN.1 files can be a bit CPU |
| expensive for complex structures. I'm willing to live with this since the |
| simpler library code make my life easier and hopefully most programs using |
| these routines will have their execution profiles dominated by cipher or |
| message digest routines. |
| What follows is a list of 'TYPE' values and the corresponding ASN.1 |
| structure and where it is used. |
| |
| TYPE ASN.1 |
| ASN1_INTEGER INTEGER |
| ASN1_BIT_STRING BIT STRING |
| ASN1_OCTET_STRING OCTET STRING |
| ASN1_OBJECT OBJECT IDENTIFIER |
| ASN1_PRINTABLESTRING PrintableString |
| ASN1_T61STRING T61String |
| ASN1_IA5STRING IA5String |
| ASN1_UTCTIME UTCTime |
| ASN1_TYPE Any of the above mentioned types plus SEQUENCE and SET |
| |
| Most of the above mentioned types are actualled stored in the |
| ASN1_BIT_STRING type and macros are used to differentiate between them. |
| The 3 types used are |
| |
| typedef struct asn1_object_st |
| { |
| /* both null if a dynamic ASN1_OBJECT, one is |
| * defined if a 'static' ASN1_OBJECT */ |
| char *sn,*ln; |
| int nid; |
| int length; |
| unsigned char *data; |
| } ASN1_OBJECT; |
| This is used to store ASN1 OBJECTS. Read 'objects.doc' for details ono |
| routines to manipulate this structure. 'sn' and 'ln' are used to hold text |
| strings that represent the object (short name and long or lower case name). |
| These are used by the 'OBJ' library. 'nid' is a number used by the OBJ |
| library to uniquely identify objects. The ASN1 routines will populate the |
| 'length' and 'data' fields which will contain the bit string representing |
| the object. |
| |
| typedef struct asn1_bit_string_st |
| { |
| int length; |
| int type; |
| unsigned char *data; |
| } ASN1_BIT_STRING; |
| This structure is used to hold all the other base ASN1 types except for |
| ASN1_UTCTIME (which is really just a 'char *'). Length is the number of |
| bytes held in data and type is the ASN1 type of the object (there is a list |
| in asn1.h). |
| |
| typedef struct asn1_type_st |
| { |
| int type; |
| union { |
| char *ptr; |
| ASN1_INTEGER * integer; |
| ASN1_BIT_STRING * bit_string; |
| ASN1_OCTET_STRING * octet_string; |
| ASN1_OBJECT * object; |
| ASN1_PRINTABLESTRING * printablestring; |
| ASN1_T61STRING * t61string; |
| ASN1_IA5STRING * ia5string; |
| ASN1_UTCTIME * utctime; |
| ASN1_BIT_STRING * set; |
| ASN1_BIT_STRING * sequence; |
| } value; |
| } ASN1_TYPE; |
| This structure is used in a few places when 'any' type of object can be |
| expected. |
| |
| X509 Certificate |
| X509_CINF CertificateInfo |
| X509_ALGOR AlgorithmIdentifier |
| X509_NAME Name |
| X509_NAME_ENTRY A single sub component of the name. |
| X509_VAL Validity |
| X509_PUBKEY SubjectPublicKeyInfo |
| The above mentioned types are declared in x509.h. They are all quite |
| straight forward except for the X509_NAME/X509_NAME_ENTRY pair. |
| A X509_NAME is a STACK (see stack.doc) of X509_NAME_ENTRY's. |
| typedef struct X509_name_entry_st |
| { |
| ASN1_OBJECT *object; |
| ASN1_BIT_STRING *value; |
| int set; |
| int size; /* temp variable */ |
| } X509_NAME_ENTRY; |
| The size is a temporary variable used by i2d_NAME and set is the set number |
| for the particular NAME_ENTRY. A X509_NAME is encoded as a sequence of |
| sequence of sets. Normally each set contains only a single item. |
| Sometimes it contains more. Normally throughout this library there will be |
| only one item per set. The set field contains the 'set' that this entry is |
| a member of. So if you have just created a X509_NAME structure and |
| populated it with X509_NAME_ENTRYs, you should then traverse the X509_NAME |
| (which is just a STACK) and set the 'set/' field to incrementing numbers. |
| For more details on why this is done, read the ASN.1 spec for Distinguished |
| Names. |
| |
| X509_REQ CertificateRequest |
| X509_REQ_INFO CertificateRequestInfo |
| These are used to hold certificate requests. |
| |
| X509_CRL CertificateRevocationList |
| These are used to hold a certificate revocation list |
| |
| RSAPrivateKey PrivateKeyInfo |
| RSAPublicKey PublicKeyInfo |
| Both these 'function groups' operate on 'RSA' structures (see rsa.doc). |
| The difference is that the RSAPublicKey operations only manipulate the m |
| and e fields in the RSA structure. |
| |
| DSAPrivateKey DSS private key |
| DSAPublicKey DSS public key |
| Both these 'function groups' operate on 'DSS' structures (see dsa.doc). |
| The difference is that the RSAPublicKey operations only manipulate the |
| XXX fields in the DSA structure. |
| |
| DHparams DHParameter |
| This is used to hold the p and g value for The Diffie-Hellman operation. |
| The function deal with the 'DH' strucure (see dh.doc). |
| |
| Now all of these function types can be used with several other functions to give |
| quite useful set of general manipulation routines. Normally one would |
| not uses these functions directly but use them via macros. |
| |
| char *ASN1_dup(int (*i2d)(),char *(*d2i)(),char *x); |
| 'x' is the input structure case to a 'char *', 'i2d' is the 'i2d_TYPE' |
| function for the type that 'x' is and d2i is the 'd2i_TYPE' function for the |
| type that 'x' is. As is obvious from the parameters, this function |
| duplicates the strucutre by transforming it into the DER form and then |
| re-loading it into a new strucutre and returning the new strucutre. This |
| is obviously a bit cpu intensive but when faced with a complex dynamic |
| structure this is the simplest programming approach. There are macros for |
| duplicating the major data types but is simple to add extras. |
| |
| char *ASN1_d2i_fp(char *(*new)(),char *(*d2i)(),FILE *fp,unsigned char **x); |
| 'x' is a pointer to a pointer of the 'desired type'. new and d2i are the |
| corresponding 'TYPE_new' and 'd2i_TYPE' functions for the type and 'fp' is |
| an open file pointer to read from. This function reads from 'fp' as much |
| data as it can and then uses 'd2i' to parse the bytes to load and return |
| the parsed strucutre in 'x' (if it was non-NULL) and to actually return the |
| strucutre. The behavior of 'x' is as per all the other d2i functions. |
| |
| char *ASN1_d2i_bio(char *(*new)(),char *(*d2i)(),BIO *fp,unsigned char **x); |
| The 'BIO' is the new IO type being used in SSLeay (see bio.doc). This |
| function is the same as ASN1_d2i_fp() except for the BIO argument. |
| ASN1_d2i_fp() actually calls this function. |
| |
| int ASN1_i2d_fp(int (*i2d)(),FILE *out,unsigned char *x); |
| 'x' is converted to bytes by 'i2d' and then written to 'out'. ASN1_i2d_fp |
| and ASN1_d2i_fp are not really symetric since ASN1_i2d_fp will read all |
| available data from the file pointer before parsing a single item while |
| ASN1_i2d_fp can be used to write a sequence of data objects. To read a |
| series of objects from a file I would sugest loading the file into a buffer |
| and calling the relevent 'd2i' functions. |
| |
| char *ASN1_d2i_bio(char *(*new)(),char *(*d2i)(),BIO *fp,unsigned char **x); |
| This function is the same as ASN1_i2d_fp() except for the BIO argument. |
| ASN1_i2d_fp() actually calls this function. |
| |
| char * PEM_ASN1_read(char *(*d2i)(),char *name,FILE *fp,char **x,int (*cb)()); |
| This function will read the next PEM encoded (base64) object of the same |
| type as 'x' (loaded by the d2i function). 'name' is the name that is in |
| the '-----BEGIN name-----' that designates the start of that object type. |
| If the data is encrypted, 'cb' will be called to prompt for a password. If |
| it is NULL a default function will be used to prompt from the password. |
| 'x' is delt with as per the standard 'd2i' function interface. This |
| function can be used to read a series of objects from a file. While any |
| data type can be encrypted (see PEM_ASN1_write) only RSA private keys tend |
| to be encrypted. |
| |
| char * PEM_ASN1_read_bio(char *(*d2i)(),char *name,BIO *fp, |
| char **x,int (*cb)()); |
| Same as PEM_ASN1_read() except using a BIO. This is called by |
| PEM_ASN1_read(). |
| |
| int PEM_ASN1_write(int (*i2d)(),char *name,FILE *fp,char *x,EVP_CIPHER *enc, |
| unsigned char *kstr,int klen,int (*callback)()); |
| |
| int PEM_ASN1_write_bio(int (*i2d)(),char *name,BIO *fp, |
| char *x,EVP_CIPHER *enc,unsigned char *kstr,int klen, |
| int (*callback)()); |
| |
| int ASN1_sign(int (*i2d)(), X509_ALGOR *algor1, X509_ALGOR *algor2, |
| ASN1_BIT_STRING *signature, char *data, RSA *rsa, EVP_MD *type); |
| int ASN1_verify(int (*i2d)(), X509_ALGOR *algor1, |
| ASN1_BIT_STRING *signature,char *data, RSA *rsa); |
| |
| int ASN1_BIT_STRING_cmp(ASN1_BIT_STRING *a, ASN1_BIT_STRING *b); |
| ASN1_BIT_STRING *ASN1_BIT_STRING_type_new(int type ); |
| |
| int ASN1_UTCTIME_check(ASN1_UTCTIME *a); |
| void ASN1_UTCTIME_print(BIO *fp,ASN1_UTCTIME *a); |
| ASN1_UTCTIME *ASN1_UTCTIME_dup(ASN1_UTCTIME *a); |
| |
| ASN1_BIT_STRING *d2i_asn1_print_type(ASN1_BIT_STRING **a,unsigned char **pp, |
| long length,int type); |
| |
| int i2d_ASN1_SET(STACK *a, unsigned char **pp, |
| int (*func)(), int ex_tag, int ex_class); |
| STACK * d2i_ASN1_SET(STACK **a, unsigned char **pp, long length, |
| char *(*func)(), int ex_tag, int ex_class); |
| |
| int i2a_ASN1_OBJECT(BIO *bp,ASN1_OBJECT *object); |
| int i2a_ASN1_INTEGER(BIO *bp, ASN1_INTEGER *a); |
| int a2i_ASN1_INTEGER(BIO *bp,ASN1_INTEGER *bs,char *buf,int size); |
| |
| int ASN1_INTEGER_set(ASN1_INTEGER *a, long v); |
| long ASN1_INTEGER_get(ASN1_INTEGER *a); |
| ASN1_INTEGER *BN_to_ASN1_INTEGER(BIGNUM *bn, ASN1_INTEGER *ai); |
| BIGNUM *ASN1_INTEGER_to_BN(ASN1_INTEGER *ai,BIGNUM *bn); |
| |
| /* given a string, return the correct type. Max is the maximum number |
| * of bytes to parse. It stops parsing when 'max' bytes have been |
| * processed or a '\0' is hit */ |
| int ASN1_PRINTABLE_type(unsigned char *s,int max); |
| |
| void ASN1_parse(BIO *fp,unsigned char *pp,long len); |
| |
| int i2d_ASN1_bytes(ASN1_BIT_STRING *a, unsigned char **pp, int tag, int class); |
| ASN1_BIT_STRING *d2i_ASN1_bytes(ASN1_OCTET_STRING **a, unsigned char **pp, |
| long length, int Ptag, int Pclass); |
| |
| /* PARSING */ |
| int asn1_Finish(ASN1_CTX *c); |
| |
| /* SPECIALS */ |
| int ASN1_get_object(unsigned char **pp, long *plength, int *ptag, |
| int *pclass, long omax); |
| int ASN1_check_infinite_end(unsigned char **p,long len); |
| void ASN1_put_object(unsigned char **pp, int constructed, int length, |
| int tag, int class); |
| int ASN1_object_size(int constructed, int length, int tag); |
| |
| X509 * X509_get_cert(CERTIFICATE_CTX *ctx,X509_NAME * name,X509 *tmp_x509); |
| int X509_add_cert(CERTIFICATE_CTX *ctx,X509 *); |
| |
| char * X509_cert_verify_error_string(int n); |
| int X509_add_cert_file(CERTIFICATE_CTX *c,char *file, int type); |
| char * X509_gmtime (char *s, long adj); |
| int X509_add_cert_dir (CERTIFICATE_CTX *c,char *dir, int type); |
| int X509_load_verify_locations (CERTIFICATE_CTX *ctx, |
| char *file_env, char *dir_env); |
| int X509_set_default_verify_paths(CERTIFICATE_CTX *cts); |
| X509 * X509_new_D2i_X509(int len, unsigned char *p); |
| char * X509_get_default_cert_area(void ); |
| char * X509_get_default_cert_dir(void ); |
| char * X509_get_default_cert_file(void ); |
| char * X509_get_default_cert_dir_env(void ); |
| char * X509_get_default_cert_file_env(void ); |
| char * X509_get_default_private_dir(void ); |
| X509_REQ *X509_X509_TO_req(X509 *x, RSA *rsa); |
| int X509_cert_verify(CERTIFICATE_CTX *ctx,X509 *xs, int (*cb)()); |
| |
| CERTIFICATE_CTX *CERTIFICATE_CTX_new(); |
| void CERTIFICATE_CTX_free(CERTIFICATE_CTX *c); |
| |
| void X509_NAME_print(BIO *fp, X509_NAME *name, int obase); |
| int X509_print_fp(FILE *fp,X509 *x); |
| int X509_print(BIO *fp,X509 *x); |
| |
| X509_INFO * X509_INFO_new(void); |
| void X509_INFO_free(X509_INFO *a); |
| |
| char * X509_NAME_oneline(X509_NAME *a); |
| |
| #define X509_verify(x,rsa) |
| #define X509_REQ_verify(x,rsa) |
| #define X509_CRL_verify(x,rsa) |
| |
| #define X509_sign(x,rsa,md) |
| #define X509_REQ_sign(x,rsa,md) |
| #define X509_CRL_sign(x,rsa,md) |
| |
| #define X509_dup(x509) |
| #define d2i_X509_fp(fp,x509) |
| #define i2d_X509_fp(fp,x509) |
| #define d2i_X509_bio(bp,x509) |
| #define i2d_X509_bio(bp,x509) |
| |
| #define X509_CRL_dup(crl) |
| #define d2i_X509_CRL_fp(fp,crl) |
| #define i2d_X509_CRL_fp(fp,crl) |
| #define d2i_X509_CRL_bio(bp,crl) |
| #define i2d_X509_CRL_bio(bp,crl) |
| |
| #define X509_REQ_dup(req) |
| #define d2i_X509_REQ_fp(fp,req) |
| #define i2d_X509_REQ_fp(fp,req) |
| #define d2i_X509_REQ_bio(bp,req) |
| #define i2d_X509_REQ_bio(bp,req) |
| |
| #define RSAPrivateKey_dup(rsa) |
| #define d2i_RSAPrivateKey_fp(fp,rsa) |
| #define i2d_RSAPrivateKey_fp(fp,rsa) |
| #define d2i_RSAPrivateKey_bio(bp,rsa) |
| #define i2d_RSAPrivateKey_bio(bp,rsa) |
| |
| #define X509_NAME_dup(xn) |
| #define X509_NAME_ENTRY_dup(ne) |
| |
| void X509_REQ_print_fp(FILE *fp,X509_REQ *req); |
| void X509_REQ_print(BIO *fp,X509_REQ *req); |
| |
| RSA *X509_REQ_extract_key(X509_REQ *req); |
| RSA *X509_extract_key(X509 *x509); |
| |
| int X509_issuer_and_serial_cmp(X509 *a, X509 *b); |
| unsigned long X509_issuer_and_serial_hash(X509 *a); |
| |
| X509_NAME * X509_get_issuer_name(X509 *a); |
| int X509_issuer_name_cmp(X509 *a, X509 *b); |
| unsigned long X509_issuer_name_hash(X509 *a); |
| |
| X509_NAME * X509_get_subject_name(X509 *a); |
| int X509_subject_name_cmp(X509 *a,X509 *b); |
| unsigned long X509_subject_name_hash(X509 *x); |
| |
| int X509_NAME_cmp (X509_NAME *a, X509_NAME *b); |
| unsigned long X509_NAME_hash(X509_NAME *x); |
| |