通过OpenSSL解析X509证书基本项

转载自:https://blog.csdn.net/yyfzy/article/details/46798965

    在之前的文章“通过OpenSSL解码X509证书文件”里,讲述了如何使用OpenSSL将证书文件解码,得到证书上下文结构体X509的方法。下面我们接着讲述如何通过证书上下文结构体X509,获得想要的证书项。本文先讲述如何获取证书的基本项,后面还有文章介绍如何获取证书的扩展项。

       下面的代码,都是假定已经通过解码证书文件、得到了证书上下文结构体X509。至于如何使用OpenSSL解码证书文件、得到证书上下文结构体X509,请阅读之前的文章。

        首先,我们看看关于证书结构体X509定义:

  1. struct x509_st
  2. {
  3. X509_CINF *cert_info;
  4. X509_ALGOR *sig_alg;
  5. ASN1_BIT_STRING *signature;
  6. int valid;
  7. int references;
  8. char *name;
  9. CRYPTO_EX_DATA ex_data;
  10. /* These contain copies of various extension values */
  11. long ex_pathlen;
  12. long ex_pcpathlen;
  13. unsigned long ex_flags;
  14. unsigned long ex_kusage;
  15. unsigned long ex_xkusage;
  16. unsigned long ex_nscert;
  17. ASN1_OCTET_STRING *skid;
  18. AUTHORITY_KEYID *akid;
  19. X509_POLICY_CACHE *policy_cache;
  20. STACK_OF(DIST_POINT) *crldp;
  21. STACK_OF(GENERAL_NAME) *altname;
  22. NAME_CONSTRAINTS *nc;
  23. #ifndef OPENSSL_NO_RFC3779
  24. STACK_OF(IPAddressFamily) *rfc3779_addr;
  25. struct ASIdentifiers_st *rfc3779_asid;
  26. #endif
  27. #ifndef OPENSSL_NO_SHA
  28. unsigned char sha1_hash[SHA_DIGEST_LENGTH];
  29. #endif
  30. X509_CERT_AUX *aux;
  31. } /* X509 */;
  32. typedef struct x509_cinf_st
  33. {
  34. ASN1_INTEGER *version; /* [ 0 ] default of v1 */
  35. ASN1_INTEGER *serialNumber;
  36. X509_ALGOR *signature;
  37. X509_NAME *issuer;
  38. X509_VAL *validity;
  39. X509_NAME *subject;
  40. X509_PUBKEY *key;
  41. ASN1_BIT_STRING *issuerUID; /* [ 1 ] optional in v2 */
  42. ASN1_BIT_STRING *subjectUID; /* [ 2 ] optional in v2 */
  43. STACK_OF(X509_EXTENSION) *extensions; /* [ 3 ] optional in v3 */
  44. ASN1_ENCODING enc;
  45. } X509_CINF;
      我们想要获取的证书基本项,有些就直接存在于这两个结构体中。
一、版本号

      通过解码证书文件,得到证书结构体m_pX509之后,可以通过函数X509_get_version()获取证书的版本。具体代码如下:

  1. int ver = X509_get_version(m_pX509);
  2. switch(ver)
  3. {
  4. case 0: //V1
  5. //...
  6. break;
  7. case 1: //V2
  8. //...
  9. break;
  10. case 2: //V3
  11. //...
  12. break;
  13. default:
  14. //Error!
  15. break;
  16. }
需要注意的是,0代表V1;1代表V2;2代表V3。目前绝大多数证书都是V3版本。

二、序列号

      同样,有了m_pX509之后,调用函数X509_get_serialNumber()即可获得证书的序列号。只是该函数返回的是ASN1_INTEGER类型,需要转换后才能是我们平常看到的十六进制表示的序列号。具体实现函数如下:

  1. ULONG COpenSSLCertificate::get_SN(LPSTR lptcSN, ULONG *pulLen)
  2. {
  3. ULONG ulRet = CERT_ERR_OK;
  4. ASN1_INTEGER *asn1_i = NULL;
  5. BIGNUM *bignum = NULL;
  6. char *serial = NULL;
  7. if (!m_pX509)
  8. {
  9. return CERT_ERR_INVILIDCALL;
  10. }
  11. if (!pulLen)
  12. {
  13. return CERT_ERR_INVALIDPARAM;
  14. }
  15. asn1_i = X509_get_serialNumber(m_pX509);
  16. bignum = ASN1_INTEGER_to_BN(asn1_i, NULL);
  17. if (bignum == NULL)
  18. {
  19. ulRet = CERT_ERR_FAILED;
  20. goto FREE_MEMORY;
  21. }
  22. serial = BN_bn2hex(bignum);
  23. if (serial == NULL)
  24. {
  25. ulRet = CERT_ERR_FAILED;
  26. goto FREE_MEMORY;
  27. }
  28. BN_free(bignum);
  29. if (!lptcSN)
  30. {
  31. *pulLen = strlen(serial) + 1;
  32. ulRet = CERT_ERR_OK;
  33. goto FREE_MEMORY;
  34. }
  35. if (*pulLen < strlen(serial) + 1)
  36. {
  37. ulRet = CERT_ERR_BUFFER_TOO_SMALL;
  38. goto FREE_MEMORY;
  39. }
  40. strcpy_s(lptcSN, *pulLen, serial);
  41. *pulLen = strlen(serial);
  42. FREE_MEMORY:
  43. OPENSSL_free(serial);
  44. return ulRet;
  45. }

三、公钥算法(证书算法)

      要想获取证书公钥算法,需要先调用函数X509_get_pubkey()得到公钥属性结构体,然后通过type字段来判断公钥的算法类型。具体实现函数如下:

  1. ULONG COpenSSLCertificate::get_KeyType(ULONG* pulType)
  2. {
  3. EVP_PKEY *pk = NULL;
  4. stack_st_X509* chain = NULL;
  5. X509_EXTENSION *pex = NULL;
  6. if (!m_pX509)
  7. {
  8. return CERT_ERR_INVILIDCALL;
  9. }
  10. if (!pulType)
  11. {
  12. return CERT_ERR_INVALIDPARAM;
  13. }
  14. pk = X509_get_pubkey(m_pX509);
  15. if (!pk)
  16. {
  17. return CERT_ERR_FAILED;
  18. }
  19. if (EVP_PKEY_RSA == pk->type)
  20. {
  21. *pulType = CERT_KEY_ALG_RSA;
  22. }
  23. else if (EVP_PKEY_EC == pk->type)
  24. {
  25. *pulType = CERT_KEY_ALG_ECC;
  26. }
  27. else if (EVP_PKEY_DSA == pk->type)
  28. {
  29. *pulType = CERT_KEY_ALG_DSA;
  30. }
  31. else if (EVP_PKEY_DH == pk->type)
  32. {
  33. *pulType = CERT_KEY_ALG_DH;
  34. }
  35. else
  36. {
  37. return CERT_KEY_ALG_UNKNOWN;
  38. }
  39. return CERT_ERR_OK;
  40. }
目前常见的证书算法为RSA和ECC,ECC在国内又成为SM2。SM2是国家密码管理局基于椭圆算法(ECC)制定的国内非对称算法标准。

四、证书用途

      证书从用途来分,分为“签名证书”和“加密证书”两大类。“签名证书”的公钥用来验证签名,而“加密证书”的公钥则用来加密数据。我们可以通过调用X509中的ex_kusage字段来判断证书的用途,具体函数实现如下:

  1. ULONG COpenSSLCertificate::get_KeyUsage(ULONG* lpUsage)
  2. {
  3. ULONG lKeyUsage = 0;
  4. if (!m_pX509)
  5. {
  6. return CERT_ERR_INVILIDCALL;
  7. }
  8. if (!lpUsage)
  9. {
  10. return CERT_ERR_INVALIDPARAM;
  11. }
  12. *lpUsage = CERT_USAGE_UNKNOWN;
  13. //X509_check_ca() MUST be called!
  14. X509_check_ca(m_pX509);
  15. lKeyUsage = m_pX509->ex_kusage;
  16. if ((lKeyUsage & KU_DATA_ENCIPHERMENT) == KU_DATA_ENCIPHERMENT)
  17. {
  18. *lpUsage = CERT_USAGE_EXCH;<span style= "white-space:pre"> </span> //加密证书
  19. }
  20. else if ((lKeyUsage & KU_DIGITAL_SIGNATURE) == KU_DIGITAL_SIGNATURE)
  21. {
  22. *lpUsage = CERT_USAGE_SIGN;<span style= "white-space:pre"> </span> //签名证书
  23. }
  24. return CERT_ERR_OK;
  25. }

五、签名算法

      证书的签名算法,是指证书用来签名时使用的算法(包含HASH算法)。签名算法用结构体X509中sig_alg字段来表示,可以通过sig_alg的子字段algorithm返回签名算法对象,从而得到签名算法的Oid。首先,签名算法的Oid常见得定义如下:

  1. /* Certificate siganture alg */
  2. #define CERT_SIGNATURE_ALG_RSA_RSA "1.2.840.113549.1.1.1"
  3. #define CERT_SIGNATURE_ALG_MD2RSA "1.2.840.113549.1.1.2"
  4. #define CERT_SIGNATURE_ALG_MD4RSA "1.2.840.113549.1.1.3"
  5. #define CERT_SIGNATURE_ALG_MD5RSA "1.2.840.113549.1.1.4"
  6. #define CERT_SIGNATURE_ALG_SHA1RSA "1.2.840.113549.1.1.5"
  7. #define CERT_SIGNATURE_ALG_SM3SM2 "1.2.156.10197.1.501"

      获取签名算法Oid的具体实现函数如下:

  1. ULONG COpenSSLCertificate::get_SignatureAlgOid(LPSTR lpscOid, ULONG *pulLen)
  2. {
  3. char oid[ 128] = { 0};
  4. ASN1_OBJECT* salg = NULL;
  5. if (!m_pX509)
  6. {
  7. return CERT_ERR_INVILIDCALL;
  8. }
  9. if (!pulLen)
  10. {
  11. return CERT_ERR_INVALIDPARAM;
  12. }
  13. salg = m_pX509->sig_alg->algorithm;
  14. OBJ_obj2txt(oid, 128, salg, 1);
  15. if (!lpscOid)
  16. {
  17. *pulLen = strlen(oid) + 1;
  18. return CERT_ERR_OK;
  19. }
  20. if (*pulLen < strlen(oid) + 1)
  21. {
  22. return CERT_ERR_BUFFER_TOO_SMALL;
  23. }
  24. strcpy_s(lpscOid, *pulLen, oid);
  25. *pulLen = strlen(oid) + 1;
  26. return CERT_ERR_OK;
  27. }
由于Windows对SM2/SM3算法还没有定义,所以对于ECC(SM2)证书,Windows直接显示签名算法的Oid:“1.2.156.10197.1.501”,如下图所示:

六、颁发者

      关于颁发者,我们可以通过调用函数X509_get_issuer_name()获取属性。不过该函数返回的是X509_NAME类型,需要调用函数X509_NAME_get_text_by_NID()将其转化为ASCII字符形式。具体通过下面函数实现:

  1. ULONG COpenSSLCertificate::get_Issuer(LPSTR lpValue, ULONG *pulLen)
  2. {
  3. int nNameLen = 512;
  4. CHAR csCommonName[ 512] = { 0};
  5. X509_NAME *pCommonName = NULL;
  6. if (!m_pX509)
  7. {
  8. return CERT_ERR_INVILIDCALL;
  9. }
  10. if (!pulLen)
  11. {
  12. return CERT_ERR_INVALIDPARAM;
  13. }
  14. pCommonName = X509_get_issuer_name(m_pX509);
  15. if (!pCommonName)
  16. {
  17. return CERT_ERR_FAILED;
  18. }
  19. nNameLen = X509_NAME_get_text_by_NID(pCommonName, NID_commonName, csCommonName, nNameLen);
  20. if ( -1 == nNameLen)
  21. {
  22. return CERT_ERR_FAILED;
  23. };
  24. if (!lpValue)
  25. {
  26. *pulLen = nNameLen + 1;
  27. return CERT_ERR_OK;
  28. }
  29. if (*pulLen < (ULONG)nNameLen + 1)
  30. {
  31. return CERT_ERR_BUFFER_TOO_SMALL;
  32. }
  33. strcpy_s(lpValue, *pulLen, csCommonName);
  34. *pulLen = nNameLen;
  35. return CERT_ERR_OK;
  36. }

七、使用者

      关于证书使用者,我们可以通过调用函数X509_get_subject_name)获取属性。同样,该函数返回的是X509_NAME类型,需要调用函数X509_NAME_get_text_by_NID()将其转化为ASCII字符形式。具体通过下面函数实现:

  1. ULONG COpenSSLCertificate::get_SubjectName(LPSTR lpValue, ULONG *pulLen)
  2. {
  3. int iLen = 0;
  4. int iSubNameLen = 0;
  5. CHAR csSubName[ 1024] = { 0};
  6. CHAR csBuf[ 256] = { 0};
  7. X509_NAME *pSubName = NULL;
  8. if (!m_pX509)
  9. {
  10. return CERT_ERR_INVILIDCALL;
  11. }
  12. if (!pulLen)
  13. {
  14. return CERT_ERR_INVALIDPARAM;
  15. }
  16. pSubName = X509_get_subject_name(m_pX509);
  17. if (!pSubName)
  18. {
  19. return CERT_ERR_FAILED;
  20. }
  21. ZeroMemory(csBuf, 256);
  22. iLen = X509_NAME_get_text_by_NID(pSubName, NID_countryName, csBuf, 256);
  23. if (iLen > 0)
  24. {
  25. strcat_s(csSubName, 1024, "C=");
  26. strcat_s(csSubName, 1024, csBuf);
  27. strcat_s(csSubName, 1024, ", ");
  28. }
  29. ZeroMemory(csBuf, 256);
  30. iLen = X509_NAME_get_text_by_NID(pSubName, NID_organizationName, csBuf, 256);
  31. if (iLen > 0)
  32. {
  33. strcat_s(csSubName, 1024, "O=");
  34. strcat_s(csSubName, 1024, csBuf);
  35. strcat_s(csSubName, 1024, ", ");
  36. }
  37. ZeroMemory(csBuf, 256);
  38. iLen = X509_NAME_get_text_by_NID(pSubName, NID_organizationalUnitName, csBuf, 256);
  39. if (iLen > 0)
  40. {
  41. strcat_s(csSubName, 1024, "OU=");
  42. strcat_s(csSubName, 1024, csBuf);
  43. strcat_s(csSubName, 1024, ", ");
  44. }
  45. ZeroMemory(csBuf, 256);
  46. iLen = X509_NAME_get_text_by_NID(pSubName, NID_commonName, csBuf, 256);
  47. if (iLen > 0)
  48. {
  49. strcat_s(csSubName, 1024, "CN=");
  50. strcat_s(csSubName, 1024, csBuf);
  51. }
  52. if (!lpValue)
  53. {
  54. *pulLen = strlen(csSubName) + 1;
  55. return CERT_ERR_OK;
  56. }
  57. if (*pulLen < strlen(csSubName) + 1)
  58. {
  59. return CERT_ERR_BUFFER_TOO_SMALL;
  60. }
  61. strcpy_s(lpValue, *pulLen, csSubName);
  62. *pulLen = strlen(csSubName);
  63. return CERT_ERR_OK;
  64. }

八、有效期限

      要获取证书的有效期属性,需要通过调用函数X509_get_notBefore()和X509_get_notAfter()来实现。而且这两个函数返回的时间是time_t类型,需要转化为SYSTEMTIME类型。具体实现函数如下:

  1. ULONG COpenSSLCertificate::get_ValidDate(SYSTEMTIME *ptmStart, SYSTEMTIME *ptmEnd)
  2. {
  3. int err = 0;
  4. ASN1_TIME *start = NULL;
  5. ASN1_TIME *end = NULL;
  6. time_t ttStart = { 0};
  7. time_t ttEnd = { 0};
  8. LONGLONG nLLStart = 0;
  9. LONGLONG nLLEnd = 0;
  10. FILETIME ftStart = { 0};
  11. FILETIME ftEnd = { 0};
  12. if (!m_pX509)
  13. {
  14. return CERT_ERR_INVALIDPARAM;
  15. }
  16. start = X509_get_notBefore(m_pX509);
  17. end = X509_get_notAfter(m_pX509);
  18. ttStart = ASN1_TIME_get(start, &err);
  19. ttEnd = ASN1_TIME_get(end, &err);
  20. nLLStart = Int32x32To64(ttStart, 10000000) + 116444736000000000;
  21. nLLEnd = Int32x32To64(ttEnd, 10000000) + 116444736000000000;
  22. ftStart.dwLowDateTime = (DWORD)nLLStart;
  23. ftStart.dwHighDateTime = (DWORD)(nLLStart >> 32);
  24. ftEnd.dwLowDateTime = (DWORD)nLLEnd;
  25. ftEnd.dwHighDateTime = (DWORD)(nLLEnd >> 32);
  26. FileTimeToSystemTime(&ftStart, ptmStart);
  27. FileTimeToSystemTime(&ftEnd, ptmEnd);
  28. return 0;
  29. }

      至此,X509证书的基本项通过OpenSLL均已解析完毕!如需获取证书的扩展项或者公钥等数据,请关注后续博文。


猜你喜欢

转载自blog.csdn.net/ayang1986/article/details/81025611