2022-05-06 00:06:38 +08:00
|
|
|
/*
|
|
|
|
* MkCert.cpp
|
|
|
|
*
|
|
|
|
* This source file is part of the FoundationDB open source project
|
|
|
|
*
|
|
|
|
* Copyright 2013-2022 Apple Inc. and the FoundationDB project authors
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "flow/Arena.h"
|
|
|
|
#include "flow/IRandom.h"
|
|
|
|
#include "flow/MkCert.h"
|
2022-05-11 17:46:08 +08:00
|
|
|
#include "flow/ScopeExit.h"
|
2022-05-06 00:06:38 +08:00
|
|
|
|
|
|
|
#include <limits>
|
|
|
|
#include <memory>
|
|
|
|
#include <string>
|
2022-05-11 21:32:46 +08:00
|
|
|
#include <cstring>
|
2022-05-12 00:36:58 +08:00
|
|
|
#include <openssl/bio.h>
|
2022-05-06 00:06:38 +08:00
|
|
|
#include <openssl/ec.h>
|
|
|
|
#include <openssl/err.h>
|
|
|
|
#include <openssl/evp.h>
|
2022-05-12 00:36:58 +08:00
|
|
|
#include <openssl/objects.h>
|
2022-05-06 00:06:38 +08:00
|
|
|
#include <openssl/pem.h>
|
|
|
|
#include <openssl/x509.h>
|
|
|
|
#include <openssl/x509v3.h>
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
2022-05-11 22:12:45 +08:00
|
|
|
[[noreturn]] void traceAndThrow(const char* condition, int line) {
|
2022-05-11 21:32:46 +08:00
|
|
|
auto te = TraceEvent(SevWarnAlways, "MkCertOrKeyError");
|
2022-05-11 22:12:45 +08:00
|
|
|
te.suppressFor(10).detail("Line", line).detail("Condition", condition);
|
2022-05-06 00:06:38 +08:00
|
|
|
if (auto err = ::ERR_get_error()) {
|
|
|
|
char buf[256]{
|
|
|
|
0,
|
|
|
|
};
|
|
|
|
::ERR_error_string_n(err, buf, sizeof(buf));
|
2022-05-11 01:54:12 +08:00
|
|
|
te.detail("OpenSSLError", static_cast<const char*>(buf));
|
2022-05-06 00:06:38 +08:00
|
|
|
}
|
|
|
|
throw tls_error();
|
|
|
|
}
|
|
|
|
|
|
|
|
} // anonymous namespace
|
|
|
|
|
2022-05-07 01:10:42 +08:00
|
|
|
#define OSSL_ASSERT(condition) \
|
|
|
|
do { \
|
|
|
|
if (!(condition)) \
|
2022-05-11 22:30:20 +08:00
|
|
|
traceAndThrow(#condition, __LINE__); \
|
2022-05-06 00:06:38 +08:00
|
|
|
} while (false)
|
|
|
|
|
|
|
|
namespace mkcert {
|
|
|
|
|
|
|
|
// Helper functions working with OpenSSL native types
|
|
|
|
std::shared_ptr<X509> readX509CertPem(StringRef x509CertPem);
|
|
|
|
std::shared_ptr<EVP_PKEY> readPrivateKeyPem(StringRef privateKeyPem);
|
|
|
|
std::shared_ptr<EVP_PKEY> readPrivateKeyPem(StringRef privateKeyPem);
|
|
|
|
std::shared_ptr<EVP_PKEY> makeEllipticCurveKeyPairNative();
|
|
|
|
StringRef writeX509CertPem(Arena& arena, const std::shared_ptr<X509>& nativeCert);
|
|
|
|
StringRef writePrivateKeyPem(Arena& arena, const std::shared_ptr<EVP_PKEY>& nativePrivateKey);
|
|
|
|
|
|
|
|
struct CertAndKeyNative {
|
|
|
|
std::shared_ptr<X509> cert;
|
|
|
|
std::shared_ptr<EVP_PKEY> privateKey;
|
|
|
|
bool valid() const noexcept { return cert && privateKey; }
|
|
|
|
// self-signed cert case
|
|
|
|
bool null() const noexcept { return !cert && !privateKey; }
|
|
|
|
using SelfType = CertAndKeyNative;
|
|
|
|
using PemType = CertAndKeyRef;
|
|
|
|
|
|
|
|
static SelfType fromPem(PemType certAndKey) {
|
|
|
|
auto ret = SelfType{};
|
|
|
|
if (certAndKey.empty())
|
|
|
|
return ret;
|
|
|
|
auto [certPem, keyPem] = certAndKey;
|
|
|
|
// either both set or both unset
|
|
|
|
ASSERT(!certPem.empty() && !keyPem.empty());
|
|
|
|
ret.cert = readX509CertPem(certPem);
|
|
|
|
ret.privateKey = readPrivateKeyPem(keyPem);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
PemType toPem(Arena& arena) {
|
|
|
|
auto ret = PemType{};
|
2022-05-07 01:10:42 +08:00
|
|
|
if (null())
|
|
|
|
return ret;
|
2022-05-06 00:06:38 +08:00
|
|
|
ASSERT(valid());
|
|
|
|
ret.certPem = writeX509CertPem(arena, cert);
|
|
|
|
ret.privateKeyPem = writePrivateKeyPem(arena, privateKey);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
CertAndKeyNative makeCertNative(CertSpecRef spec, CertAndKeyNative issuer);
|
|
|
|
|
|
|
|
void printCert(FILE* out, StringRef certPem) {
|
|
|
|
auto x = readX509CertPem(certPem);
|
|
|
|
OSSL_ASSERT(0 < ::X509_print_fp(out, x.get()));
|
|
|
|
}
|
|
|
|
|
|
|
|
void printPrivateKey(FILE* out, StringRef privateKeyPem) {
|
|
|
|
auto key = readPrivateKeyPem(privateKeyPem);
|
|
|
|
auto bio = ::BIO_new_fp(out, BIO_NOCLOSE);
|
|
|
|
OSSL_ASSERT(bio);
|
2022-05-11 17:46:08 +08:00
|
|
|
auto bioGuard = ScopeExit([bio]() { ::BIO_free(bio); });
|
2022-05-06 00:06:38 +08:00
|
|
|
OSSL_ASSERT(0 < ::EVP_PKEY_print_private(bio, key.get(), 0, nullptr));
|
|
|
|
}
|
|
|
|
|
|
|
|
std::shared_ptr<EVP_PKEY> makeEllipticCurveKeyPairNative() {
|
|
|
|
auto params = std::add_pointer_t<EVP_PKEY>();
|
|
|
|
{
|
|
|
|
auto pctx = ::EVP_PKEY_CTX_new_id(EVP_PKEY_EC, nullptr);
|
|
|
|
OSSL_ASSERT(pctx);
|
2022-05-11 17:46:08 +08:00
|
|
|
auto ctxGuard = ScopeExit([pctx]() { ::EVP_PKEY_CTX_free(pctx); });
|
2022-05-06 00:06:38 +08:00
|
|
|
OSSL_ASSERT(0 < ::EVP_PKEY_paramgen_init(pctx));
|
|
|
|
OSSL_ASSERT(0 < ::EVP_PKEY_CTX_set_ec_paramgen_curve_nid(pctx, NID_X9_62_prime256v1));
|
|
|
|
OSSL_ASSERT(0 < ::EVP_PKEY_paramgen(pctx, ¶ms));
|
|
|
|
OSSL_ASSERT(params);
|
|
|
|
}
|
2022-05-11 17:46:08 +08:00
|
|
|
auto paramsGuard = ScopeExit([params]() { ::EVP_PKEY_free(params); });
|
2022-05-06 00:06:38 +08:00
|
|
|
// keygen
|
|
|
|
auto kctx = ::EVP_PKEY_CTX_new(params, nullptr);
|
|
|
|
OSSL_ASSERT(kctx);
|
2022-05-11 17:46:08 +08:00
|
|
|
auto kctxGuard = ScopeExit([kctx]() { ::EVP_PKEY_CTX_free(kctx); });
|
2022-05-06 00:06:38 +08:00
|
|
|
auto key = std::add_pointer_t<EVP_PKEY>();
|
|
|
|
OSSL_ASSERT(0 < ::EVP_PKEY_keygen_init(kctx));
|
|
|
|
OSSL_ASSERT(0 < ::EVP_PKEY_keygen(kctx, &key));
|
|
|
|
OSSL_ASSERT(key);
|
|
|
|
return std::shared_ptr<EVP_PKEY>(key, &::EVP_PKEY_free);
|
|
|
|
}
|
|
|
|
|
|
|
|
std::shared_ptr<X509> readX509CertPem(StringRef x509CertPem) {
|
|
|
|
ASSERT(!x509CertPem.empty());
|
|
|
|
auto bio_mem = ::BIO_new_mem_buf(x509CertPem.begin(), x509CertPem.size());
|
|
|
|
OSSL_ASSERT(bio_mem);
|
2022-05-11 17:46:08 +08:00
|
|
|
auto bioGuard = ScopeExit([bio_mem]() { ::BIO_free(bio_mem); });
|
2022-05-06 00:06:38 +08:00
|
|
|
auto ret = ::PEM_read_bio_X509(bio_mem, nullptr, nullptr, nullptr);
|
|
|
|
OSSL_ASSERT(ret);
|
|
|
|
return std::shared_ptr<X509>(ret, &::X509_free);
|
|
|
|
}
|
|
|
|
|
|
|
|
std::shared_ptr<EVP_PKEY> readPrivateKeyPem(StringRef privateKeyPem) {
|
|
|
|
ASSERT(!privateKeyPem.empty());
|
|
|
|
auto bio_mem = ::BIO_new_mem_buf(privateKeyPem.begin(), privateKeyPem.size());
|
|
|
|
OSSL_ASSERT(bio_mem);
|
2022-05-11 17:46:08 +08:00
|
|
|
auto bioGuard = ScopeExit([bio_mem]() { ::BIO_free(bio_mem); });
|
2022-05-06 00:06:38 +08:00
|
|
|
auto ret = ::PEM_read_bio_PrivateKey(bio_mem, nullptr, nullptr, nullptr);
|
|
|
|
OSSL_ASSERT(ret);
|
|
|
|
return std::shared_ptr<EVP_PKEY>(ret, &::EVP_PKEY_free);
|
|
|
|
}
|
|
|
|
|
|
|
|
StringRef writeX509CertPem(Arena& arena, const std::shared_ptr<X509>& nativeCert) {
|
2022-05-12 00:36:58 +08:00
|
|
|
auto mem = ::BIO_new(::BIO_s_mem());
|
2022-05-06 00:06:38 +08:00
|
|
|
OSSL_ASSERT(mem);
|
2022-05-11 17:46:08 +08:00
|
|
|
auto memGuard = ScopeExit([mem]() { ::BIO_free(mem); });
|
2022-05-06 00:06:38 +08:00
|
|
|
OSSL_ASSERT(::PEM_write_bio_X509(mem, nativeCert.get()));
|
|
|
|
auto bioBuf = std::add_pointer_t<char>{};
|
|
|
|
auto const len = ::BIO_get_mem_data(mem, &bioBuf);
|
|
|
|
ASSERT_GT(len, 0);
|
|
|
|
auto buf = new (arena) uint8_t[len];
|
|
|
|
::memcpy(buf, bioBuf, len);
|
|
|
|
return StringRef(buf, static_cast<int>(len));
|
|
|
|
}
|
|
|
|
|
|
|
|
StringRef writePrivateKeyPem(Arena& arena, const std::shared_ptr<EVP_PKEY>& nativePrivateKey) {
|
2022-05-12 00:36:58 +08:00
|
|
|
auto mem = ::BIO_new(::BIO_s_mem());
|
2022-05-06 00:06:38 +08:00
|
|
|
OSSL_ASSERT(mem);
|
2022-05-11 17:46:08 +08:00
|
|
|
auto memGuard = ScopeExit([mem]() { ::BIO_free(mem); });
|
2022-05-06 00:06:38 +08:00
|
|
|
OSSL_ASSERT(::PEM_write_bio_PrivateKey(mem, nativePrivateKey.get(), nullptr, nullptr, 0, 0, nullptr));
|
|
|
|
auto bioBuf = std::add_pointer_t<char>{};
|
|
|
|
auto const len = ::BIO_get_mem_data(mem, &bioBuf);
|
|
|
|
ASSERT_GT(len, 0);
|
|
|
|
auto buf = new (arena) uint8_t[len];
|
|
|
|
::memcpy(buf, bioBuf, len);
|
|
|
|
return StringRef(buf, static_cast<int>(len));
|
|
|
|
}
|
|
|
|
|
|
|
|
KeyPairRef KeyPairRef::make(Arena& arena) {
|
|
|
|
auto keypair = makeEllipticCurveKeyPairNative();
|
|
|
|
auto ret = KeyPairRef{};
|
|
|
|
{
|
|
|
|
auto len = 0;
|
|
|
|
len = ::i2d_PrivateKey(keypair.get(), nullptr);
|
|
|
|
ASSERT_LT(0, len);
|
|
|
|
auto buf = new (arena) uint8_t[len];
|
|
|
|
auto out = std::add_pointer_t<uint8_t>(buf);
|
|
|
|
len = ::i2d_PrivateKey(keypair.get(), &out);
|
|
|
|
ret.privateKeyDer = StringRef(buf, len);
|
|
|
|
}
|
|
|
|
{
|
|
|
|
auto len = 0;
|
|
|
|
len = ::i2d_PUBKEY(keypair.get(), nullptr);
|
|
|
|
ASSERT_LT(0, len);
|
|
|
|
auto buf = new (arena) uint8_t[len];
|
|
|
|
auto out = std::add_pointer_t<uint8_t>(buf);
|
|
|
|
len = ::i2d_PUBKEY(keypair.get(), &out);
|
|
|
|
ret.publicKeyDer = StringRef(buf, len);
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
CertAndKeyNative makeCertNative(CertSpecRef spec, CertAndKeyNative issuer) {
|
|
|
|
// issuer key/cert must be both set or both null (self-signed case)
|
|
|
|
ASSERT(issuer.valid() || issuer.null());
|
|
|
|
|
|
|
|
auto const isSelfSigned = issuer.null();
|
|
|
|
auto nativeKeyPair = makeEllipticCurveKeyPairNative();
|
|
|
|
auto newX = ::X509_new();
|
|
|
|
OSSL_ASSERT(newX);
|
2022-05-11 17:46:08 +08:00
|
|
|
auto x509Guard = ScopeExit([&newX]() {
|
2022-05-07 01:10:42 +08:00
|
|
|
if (newX)
|
|
|
|
::X509_free(newX);
|
|
|
|
});
|
2022-05-06 00:06:38 +08:00
|
|
|
auto smartX = std::shared_ptr<X509>(newX, &::X509_free);
|
|
|
|
newX = nullptr;
|
|
|
|
auto x = smartX.get();
|
2022-05-07 01:10:42 +08:00
|
|
|
OSSL_ASSERT(0 < ::X509_set_version(x, 2 /*X509_VERSION_3*/));
|
2022-05-06 00:06:38 +08:00
|
|
|
auto serialPtr = ::X509_get_serialNumber(x);
|
|
|
|
OSSL_ASSERT(serialPtr);
|
|
|
|
OSSL_ASSERT(0 < ::ASN1_INTEGER_set(serialPtr, spec.serialNumber));
|
|
|
|
auto notBefore = ::X509_getm_notBefore(x);
|
|
|
|
OSSL_ASSERT(notBefore);
|
|
|
|
OSSL_ASSERT(::X509_gmtime_adj(notBefore, spec.offsetNotBefore));
|
|
|
|
auto notAfter = ::X509_getm_notAfter(x);
|
|
|
|
OSSL_ASSERT(notAfter);
|
|
|
|
OSSL_ASSERT(::X509_gmtime_adj(notAfter, spec.offsetNotAfter));
|
|
|
|
OSSL_ASSERT(0 < ::X509_set_pubkey(x, nativeKeyPair.get()));
|
|
|
|
auto subjectName = ::X509_get_subject_name(x);
|
|
|
|
OSSL_ASSERT(subjectName);
|
|
|
|
for (const auto& entry : spec.subjectName) {
|
|
|
|
// field names are expected to null-terminate
|
|
|
|
auto fieldName = entry.field.toString();
|
2022-05-07 01:10:42 +08:00
|
|
|
OSSL_ASSERT(0 <
|
|
|
|
::X509_NAME_add_entry_by_txt(
|
|
|
|
subjectName, fieldName.c_str(), MBSTRING_ASC, entry.bytes.begin(), entry.bytes.size(), -1, 0));
|
2022-05-06 00:06:38 +08:00
|
|
|
}
|
|
|
|
auto issuerName = ::X509_get_issuer_name(x);
|
|
|
|
OSSL_ASSERT(issuerName);
|
|
|
|
OSSL_ASSERT(::X509_set_issuer_name(x, (isSelfSigned ? subjectName : ::X509_get_subject_name(issuer.cert.get()))));
|
|
|
|
auto ctx = X509V3_CTX{};
|
|
|
|
X509V3_set_ctx_nodb(&ctx);
|
|
|
|
::X509V3_set_ctx(&ctx, (isSelfSigned ? x : issuer.cert.get()), x, nullptr, nullptr, 0);
|
|
|
|
for (const auto& entry : spec.extensions) {
|
|
|
|
// extension field names and values are expected to null-terminate
|
|
|
|
auto extName = entry.field.toString();
|
|
|
|
auto extValue = entry.bytes.toString();
|
2022-05-12 00:36:58 +08:00
|
|
|
auto extNid = ::OBJ_txt2nid(extName.c_str());
|
|
|
|
if (extNid == NID_undef) {
|
|
|
|
TraceEvent(SevWarnAlways, "MkCertInvalidExtName").suppressFor(10).detail("Name", extName);
|
|
|
|
throw tls_error();
|
|
|
|
}
|
2022-05-13 05:12:51 +08:00
|
|
|
#ifdef OPENSSL_IS_BORINGSSL
|
2022-05-16 17:58:42 +08:00
|
|
|
auto ext = ::X509V3_EXT_nconf_nid(nullptr, &ctx, extNid, const_cast<char*>(extValue.c_str()));
|
2022-05-13 05:12:51 +08:00
|
|
|
#else
|
2022-05-16 17:58:42 +08:00
|
|
|
auto ext = ::X509V3_EXT_nconf_nid(nullptr, &ctx, extNid, extValue.c_str());
|
2022-05-13 05:12:51 +08:00
|
|
|
#endif
|
2022-05-06 00:06:38 +08:00
|
|
|
OSSL_ASSERT(ext);
|
2022-05-11 17:46:08 +08:00
|
|
|
auto extGuard = ScopeExit([ext]() { ::X509_EXTENSION_free(ext); });
|
2022-05-06 00:06:38 +08:00
|
|
|
OSSL_ASSERT(::X509_add_ext(x, ext, -1));
|
|
|
|
}
|
|
|
|
OSSL_ASSERT(::X509_sign(x, (isSelfSigned ? nativeKeyPair.get() : issuer.privateKey.get()), ::EVP_sha256()));
|
|
|
|
auto ret = CertAndKeyNative{};
|
|
|
|
ret.cert = smartX;
|
|
|
|
ret.privateKey = nativeKeyPair;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
CertAndKeyRef CertAndKeyRef::make(Arena& arena, CertSpecRef spec, CertAndKeyRef issuerPem) {
|
|
|
|
auto issuer = CertAndKeyNative::fromPem(issuerPem);
|
|
|
|
auto newCertAndKey = makeCertNative(spec, issuer);
|
|
|
|
return newCertAndKey.toPem(arena);
|
|
|
|
}
|
|
|
|
|
|
|
|
CertSpecRef CertSpecRef::make(Arena& arena, CertKind kind) {
|
|
|
|
auto spec = CertSpecRef{};
|
|
|
|
spec.serialNumber = static_cast<long>(deterministicRandom()->randomInt64(0, 1e10));
|
|
|
|
spec.offsetNotBefore = 0; // now
|
|
|
|
spec.offsetNotAfter = 60 * 60 * 24 * 365; // 1 year from now
|
|
|
|
auto& subject = spec.subjectName;
|
2022-05-07 01:10:42 +08:00
|
|
|
subject.push_back(arena, { "countryName"_sr, "DE"_sr });
|
|
|
|
subject.push_back(arena, { "localityName"_sr, "Berlin"_sr });
|
|
|
|
subject.push_back(arena, { "organizationName"_sr, "FoundationDB"_sr });
|
|
|
|
subject.push_back(arena, { "commonName"_sr, kind.getCommonName("FDB Testing Services"_sr, arena) });
|
2022-05-06 00:06:38 +08:00
|
|
|
auto& ext = spec.extensions;
|
|
|
|
if (kind.isCA()) {
|
2022-05-07 01:10:42 +08:00
|
|
|
ext.push_back(arena, { "basicConstraints"_sr, "critical, CA:TRUE"_sr });
|
|
|
|
ext.push_back(arena, { "keyUsage"_sr, "critical, digitalSignature, keyCertSign, cRLSign"_sr });
|
2022-05-06 00:06:38 +08:00
|
|
|
} else {
|
2022-05-07 01:10:42 +08:00
|
|
|
ext.push_back(arena, { "basicConstraints"_sr, "critical, CA:FALSE"_sr });
|
|
|
|
ext.push_back(arena, { "keyUsage"_sr, "critical, digitalSignature, keyEncipherment"_sr });
|
|
|
|
ext.push_back(arena, { "extendedKeyUsage"_sr, "serverAuth, clientAuth"_sr });
|
2022-05-06 00:06:38 +08:00
|
|
|
}
|
2022-05-07 01:10:42 +08:00
|
|
|
ext.push_back(arena, { "subjectKeyIdentifier"_sr, "hash"_sr });
|
2022-05-06 00:06:38 +08:00
|
|
|
if (!kind.isRootCA())
|
2022-05-07 01:10:42 +08:00
|
|
|
ext.push_back(arena, { "authorityKeyIdentifier"_sr, "keyid, issuer"_sr });
|
2022-05-06 00:06:38 +08:00
|
|
|
return spec;
|
|
|
|
}
|
|
|
|
|
|
|
|
StringRef concatCertChain(Arena& arena, CertChainRef chain) {
|
|
|
|
auto len = 0;
|
|
|
|
for (const auto& entry : chain) {
|
|
|
|
len += entry.certPem.size();
|
|
|
|
}
|
2022-05-07 01:10:42 +08:00
|
|
|
if (len == 0)
|
|
|
|
return StringRef();
|
2022-05-06 00:06:38 +08:00
|
|
|
auto buf = new (arena) uint8_t[len];
|
|
|
|
auto offset = 0;
|
|
|
|
for (auto const& entry : chain) {
|
|
|
|
::memcpy(&buf[offset], entry.certPem.begin(), entry.certPem.size());
|
|
|
|
offset += entry.certPem.size();
|
|
|
|
}
|
|
|
|
UNSTOPPABLE_ASSERT(offset == len);
|
|
|
|
return StringRef(buf, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
CertChainRef makeCertChain(Arena& arena, VectorRef<CertSpecRef> specs, CertAndKeyRef rootAuthority) {
|
|
|
|
ASSERT_GT(specs.size(), 0);
|
|
|
|
// if rootAuthority is empty, use last element in specs to make root CA
|
|
|
|
auto const needRootCA = rootAuthority.empty();
|
|
|
|
if (needRootCA) {
|
|
|
|
int const chainLength = specs.size();
|
|
|
|
auto chain = new (arena) CertAndKeyRef[chainLength];
|
2022-05-07 01:10:42 +08:00
|
|
|
auto caNative = makeCertNative(specs.back(), CertAndKeyNative{} /* empty issuer == self-signed */);
|
|
|
|
chain[chainLength - 1] = caNative.toPem(arena);
|
2022-05-06 00:06:38 +08:00
|
|
|
for (auto i = chainLength - 2; i >= 0; i--) {
|
|
|
|
auto cnkNative = makeCertNative(specs[i], caNative);
|
|
|
|
chain[i] = cnkNative.toPem(arena);
|
|
|
|
caNative = cnkNative;
|
|
|
|
}
|
|
|
|
return CertChainRef(chain, chainLength);
|
|
|
|
} else {
|
|
|
|
int const chainLength = specs.size() + 1; /* account for deep-copied rootAuthority */
|
2022-05-07 01:10:42 +08:00
|
|
|
auto chain = new (arena) CertAndKeyRef[chainLength];
|
2022-05-06 00:06:38 +08:00
|
|
|
auto caNative = CertAndKeyNative::fromPem(rootAuthority);
|
2022-05-07 01:10:42 +08:00
|
|
|
chain[chainLength - 1] = rootAuthority.deepCopy(arena);
|
2022-05-06 00:06:38 +08:00
|
|
|
for (auto i = chainLength - 2; i >= 0; i--) {
|
|
|
|
auto cnkNative = makeCertNative(specs[i], caNative);
|
|
|
|
chain[i] = cnkNative.toPem(arena);
|
|
|
|
caNative = cnkNative;
|
|
|
|
}
|
|
|
|
return CertChainRef(chain, chainLength);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-05-09 19:39:29 +08:00
|
|
|
VectorRef<CertSpecRef> makeCertChainSpec(Arena& arena, unsigned length, ESide side) {
|
2022-05-07 01:10:42 +08:00
|
|
|
if (!length)
|
|
|
|
return {};
|
2022-05-09 19:39:29 +08:00
|
|
|
auto specs = new (arena) CertSpecRef[length];
|
2022-05-06 00:06:38 +08:00
|
|
|
auto const isServerSide = side == ESide::Server;
|
|
|
|
for (auto i = 0u; i < length; i++) {
|
|
|
|
auto kind = CertKind{};
|
|
|
|
if (i == 0u)
|
|
|
|
kind = isServerSide ? CertKind(Server{}) : CertKind(Client{});
|
|
|
|
else if (i == length - 1)
|
|
|
|
kind = isServerSide ? CertKind(ServerRootCA{}) : CertKind(ClientRootCA{});
|
|
|
|
else
|
2022-05-07 01:10:42 +08:00
|
|
|
kind = isServerSide ? CertKind(ServerIntermediateCA{ i }) : CertKind(ClientIntermediateCA{ i });
|
2022-05-09 19:39:29 +08:00
|
|
|
specs[i] = CertSpecRef::make(arena, kind);
|
2022-05-06 00:06:38 +08:00
|
|
|
}
|
2022-05-09 19:39:29 +08:00
|
|
|
return VectorRef<CertSpecRef>(specs, length);
|
|
|
|
}
|
|
|
|
|
|
|
|
CertChainRef makeCertChain(Arena& arena, unsigned length, ESide side) {
|
|
|
|
if (!length)
|
|
|
|
return {};
|
|
|
|
// temporary arena for writing up specs
|
|
|
|
auto tmpArena = Arena();
|
|
|
|
auto specs = makeCertChainSpec(tmpArena, length, side);
|
|
|
|
return makeCertChain(arena, specs, {} /*root*/);
|
2022-05-06 00:06:38 +08:00
|
|
|
}
|
|
|
|
|
2022-05-13 05:14:52 +08:00
|
|
|
StringRef CertKind::getCommonName(StringRef prefix, Arena& arena) const {
|
|
|
|
auto const side = std::string(isClientSide() ? " Client" : " Server");
|
|
|
|
if (isIntermediateCA()) {
|
|
|
|
auto const level = isClientSide() ? get<ClientIntermediateCA>().level : get<ServerIntermediateCA>().level;
|
|
|
|
return prefix.withSuffix(fmt::format("{} Intermediate {}", side, level), arena);
|
|
|
|
} else if (isRootCA()) {
|
|
|
|
return prefix.withSuffix(fmt::format("{} Root", side), arena);
|
|
|
|
} else {
|
|
|
|
return prefix.withSuffix(side, arena);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-05-06 00:06:38 +08:00
|
|
|
} // namespace mkcert
|