1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268
|
//
// Copyright (c) SAS Institute Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
package certloader
import (
"bytes"
"crypto"
"crypto/ecdsa"
"crypto/rsa"
"crypto/tls"
"crypto/x509"
"encoding/pem"
"errors"
"fmt"
"io/ioutil"
"golang.org/x/crypto/openpgp"
"golang.org/x/crypto/openpgp/packet"
"github.com/sassoftware/relic/v7/lib/pkcs7"
"github.com/sassoftware/relic/v7/lib/pkcs9"
"github.com/sassoftware/relic/v7/lib/x509tools"
)
const asn1Magic = 0x30 // weak but good enough?
var pkcs7SignedData = []byte{0x06, 0x09, 0x2A, 0x86, 0x48, 0x86, 0xF7, 0x0D, 0x01, 0x07, 0x02}
// A bundle of X509 certificate chain and/or PGP certificate, with optional private key
type Certificate struct {
Leaf *x509.Certificate
Certificates []*x509.Certificate
PgpKey *openpgp.Entity
PrivateKey crypto.PrivateKey
Timestamper pkcs9.Timestamper
KeyName string
}
// Return the X509 certificates in the chain up to, but not including, the root CA certificate
func (s *Certificate) Chain() []*x509.Certificate {
var chain []*x509.Certificate
if s.Leaf != nil {
// ensure leaf comes first
chain = append(chain, s.Leaf)
}
for i, cert := range s.Certificates {
if i > 0 && bytes.Equal(cert.RawIssuer, cert.RawSubject) {
// omit root CA
continue
} else if cert == s.Leaf {
// already in list
continue
}
chain = append(chain, cert)
}
return chain
}
// Return the certificate that issued the leaf certificate
func (s *Certificate) Issuer() *x509.Certificate {
if s.Leaf == nil {
return nil
}
for _, cert := range s.Certificates {
if bytes.Equal(cert.RawSubject, s.Leaf.RawIssuer) {
return cert
}
}
return nil
}
// Return the private key in the form of a crypto.Signer
func (s *Certificate) Signer() crypto.Signer {
if s.PrivateKey == nil {
return nil
}
return s.PrivateKey.(crypto.Signer)
}
// Return a tls.Certificate structure containing the X509 certificate chain and
// private key
func (s *Certificate) TLS() tls.Certificate {
var raw [][]byte
for _, cert := range s.Certificates {
raw = append(raw, cert.Raw)
}
return tls.Certificate{Leaf: s.Leaf, Certificate: raw, PrivateKey: s.PrivateKey}
}
// Parse a private key from a DER block
// See crypto/tls.parsePrivateKey
func parsePrivateKey(der []byte) (crypto.PrivateKey, error) {
if key, err := x509.ParsePKCS1PrivateKey(der); err == nil {
return key, nil
}
if key, err := x509.ParsePKCS8PrivateKey(der); err == nil {
switch key := key.(type) {
case *rsa.PrivateKey, *ecdsa.PrivateKey:
return key, nil
default:
return nil, errors.New("tls: found unknown private key type in PKCS#8 wrapping")
}
}
if key, err := x509.ParseECPrivateKey(der); err == nil {
return key, nil
}
return nil, errors.New("tls: failed to parse private key")
}
// Parse a list of certificates, PEM or DER, X509 or PKCS#7
func parseCertificates(pemData []byte) (*Certificate, error) {
if len(pemData) >= 1 && pemData[0] == asn1Magic {
// already in DER form
return parseCertificatesDer(pemData)
}
var certs []*x509.Certificate
for {
var block *pem.Block
block, pemData = pem.Decode(pemData)
if block == nil {
break
} else if block.Type == "CERTIFICATE" || block.Type == "PKCS7" {
newcerts, err := parseCertificatesDer(block.Bytes)
if err != nil {
return nil, err
}
certs = append(certs, newcerts.Certificates...)
}
}
if len(certs) == 0 {
return nil, ErrNoCerts
}
return &Certificate{Leaf: certs[0], Certificates: certs}, nil
}
// Parse certificates from DER
func parseCertificatesDer(der []byte) (*Certificate, error) {
var certs []*x509.Certificate
if bytes.Contains(der[:32], pkcs7SignedData) {
psd, err := pkcs7.Unmarshal(der)
if err != nil {
return nil, err
}
certs, err = psd.Content.Certificates.Parse()
if err != nil {
return nil, err
}
} else {
var err error
certs, err = x509.ParseCertificates(der)
if err != nil {
return nil, err
}
}
if len(certs) == 0 {
return nil, ErrNoCerts
}
return &Certificate{Leaf: certs[0], Certificates: certs}, nil
}
// ParseX509Certificates parses a blob in PEM or DER, X509 or PKCS#7 format and returns a list of certificates
func ParseX509Certificates(blob []byte) ([]*x509.Certificate, error) {
cert, err := parseCertificates(blob)
if err != nil {
return nil, err
}
return cert.Certificates, nil
}
// Load a X509 private key and certificate
func LoadX509KeyPair(certFile, keyFile string) (*Certificate, error) {
keyblob, err := ioutil.ReadFile(keyFile)
if err != nil {
return nil, err
}
certblob, err := ioutil.ReadFile(certFile)
if err != nil {
return nil, err
}
key, err := ParseAnyPrivateKey(keyblob, nil)
if err != nil {
return nil, err
}
cert, err := parseCertificates(certblob)
if err != nil {
return nil, err
}
if !x509tools.SameKey(cert.Leaf.PublicKey, key) {
return nil, errors.New("Private key does not match certificate")
}
cert.PrivateKey = key
return cert, nil
}
// Load X509 and/or PGP certificates from named paths and return a Certificate
// structure together with the given private key
func LoadTokenCertificates(key crypto.PrivateKey, x509cert, pgpcert string, x509contents []byte) (*Certificate, error) {
var cert *Certificate
var err error
switch {
case x509cert != "":
// load X509 cert from file
x509contents, err = ioutil.ReadFile(x509cert)
if err != nil {
return nil, err
}
fallthrough
case len(x509contents) != 0:
// load X509 cert from blob
cert, err = parseCertificates(x509contents)
if err != nil {
return nil, err
}
if !x509tools.SameKey(key, cert.Leaf.PublicKey) {
return nil, errors.New("certificate does not match key in token")
}
cert.PrivateKey = key
default:
cert = &Certificate{PrivateKey: key}
}
if pgpcert != "" {
blob, err := ioutil.ReadFile(pgpcert)
if err != nil {
return nil, err
}
keyring, err := parsePGP(blob)
if err != nil {
return nil, err
}
if len(keyring) != 1 {
return nil, fmt.Errorf("expected exactly 1 entity in pgp certificate %s", pgpcert)
}
entity := keyring[0]
priv := &packet.PrivateKey{
PublicKey: *entity.PrimaryKey,
Encrypted: false,
PrivateKey: key,
}
if !x509tools.SameKey(key, priv.PublicKey.PublicKey) {
return nil, errors.New("certificate does not match key in token")
}
entity.PrivateKey = priv
cert.PgpKey = entity
}
return cert, nil
}
type errNoCerts struct{}
func (errNoCerts) Error() string {
return "failed to find any certificates in PEM file"
}
var ErrNoCerts = errNoCerts{}
|