]>
Commit | Line | Data |
---|---|---|
8f3e97ba | 1 | #!/usr/local/bin/perl |
2 | # | |
3 | # CA - wrapper around ca to make it easier to use ... basically ca requires | |
4 | # some setup stuff to be done before you can use it and this makes | |
5 | # things easier between now and when Eric is convinced to fix it :-) | |
6 | # | |
7 | # CA -newca ... will setup the right stuff | |
d199858e | 8 | # CA -newreq[-nodes] ... will generate a certificate request |
8f3e97ba | 9 | # CA -sign ... will sign the generated request and output |
10 | # | |
11 | # At the end of that grab newreq.pem and newcert.pem (one has the key | |
12 | # and the other the certificate) and cat them together and that is what | |
13 | # you want/need ... I'll make even this a little cleaner later. | |
14 | # | |
15 | # | |
16 | # 12-Jan-96 tjh Added more things ... including CA -signcert which | |
17 | # converts a certificate to a request and then signs it. | |
18 | # 10-Jan-96 eay Fixed a few more bugs and added the SSLEAY_CONFIG | |
19 | # environment variable so this can be driven from | |
20 | # a script. | |
21 | # 25-Jul-96 eay Cleaned up filenames some more. | |
22 | # 11-Jun-96 eay Fixed a few filename missmatches. | |
23 | # 03-May-96 eay Modified to use 'ssleay cmd' instead of 'cmd'. | |
24 | # 18-Apr-96 tjh Original hacking | |
25 | # | |
26 | # Tim Hudson | |
27 | # tjh@cryptsoft.com | |
28 | # | |
29 | ||
30 | # 27-Apr-98 snh Translation into perl, fix existing CA bug. | |
31 | # | |
32 | # | |
33 | # Steve Henson | |
34 | # shenson@bigfoot.com | |
35 | ||
c142bdf7 | 36 | # default openssl.cnf file has setup as per the following |
8f3e97ba | 37 | # demoCA ... where everything is stored |
38 | ||
62d27939 AP |
39 | my $openssl; |
40 | if(defined $ENV{OPENSSL}) { | |
41 | $openssl = $ENV{OPENSSL}; | |
42 | } else { | |
43 | $openssl = "openssl"; | |
44 | $ENV{OPENSSL} = $openssl; | |
45 | } | |
46 | ||
ec6a40e2 | 47 | $SSLEAY_CONFIG=$ENV{"SSLEAY_CONFIG"}; |
16b1b035 RL |
48 | $DAYS="-days 365"; # 1 year |
49 | $CADAYS="-days 1095"; # 3 years | |
62d27939 AP |
50 | $REQ="$openssl req $SSLEAY_CONFIG"; |
51 | $CA="$openssl ca $SSLEAY_CONFIG"; | |
52 | $VERIFY="$openssl verify"; | |
53 | $X509="$openssl x509"; | |
54 | $PKCS12="$openssl pkcs12"; | |
8f3e97ba | 55 | |
56 | $CATOP="./demoCA"; | |
57 | $CAKEY="cakey.pem"; | |
16b1b035 | 58 | $CAREQ="careq.pem"; |
8f3e97ba | 59 | $CACERT="cacert.pem"; |
60 | ||
61 | $DIRMODE = 0777; | |
62 | ||
63 | $RET = 0; | |
64 | ||
65 | foreach (@ARGV) { | |
66 | if ( /^(-\?|-h|-help)$/ ) { | |
d199858e | 67 | print STDERR "usage: CA -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify\n"; |
8f3e97ba | 68 | exit 0; |
69 | } elsif (/^-newcert$/) { | |
70 | # create a certificate | |
71 | system ("$REQ -new -x509 -keyout newreq.pem -out newreq.pem $DAYS"); | |
72 | $RET=$?; | |
73 | print "Certificate (and private key) is in newreq.pem\n" | |
74 | } elsif (/^-newreq$/) { | |
75 | # create a certificate request | |
76 | system ("$REQ -new -keyout newreq.pem -out newreq.pem $DAYS"); | |
77 | $RET=$?; | |
78 | print "Request (and private key) is in newreq.pem\n"; | |
d199858e BM |
79 | } elsif (/^-newreq-nodes$/) { |
80 | # create a certificate request | |
81 | system ("$REQ -new -nodes -keyout newreq.pem -out newreq.pem $DAYS"); | |
82 | $RET=$?; | |
83 | print "Request (and private key) is in newreq.pem\n"; | |
8f3e97ba | 84 | } elsif (/^-newca$/) { |
657e60fa | 85 | # if explicitly asked for or it doesn't exist then setup the |
8f3e97ba | 86 | # directory structure that Eric likes to manage things |
87 | $NEW="1"; | |
da70ff71 | 88 | if ( "$NEW" || ! -f "${CATOP}/serial" ) { |
8f3e97ba | 89 | # create the directory hierarchy |
90 | mkdir $CATOP, $DIRMODE; | |
91 | mkdir "${CATOP}/certs", $DIRMODE; | |
92 | mkdir "${CATOP}/crl", $DIRMODE ; | |
93 | mkdir "${CATOP}/newcerts", $DIRMODE; | |
94 | mkdir "${CATOP}/private", $DIRMODE; | |
8f3e97ba | 95 | open OUT, ">${CATOP}/index.txt"; |
96 | close OUT; | |
97 | } | |
98 | if ( ! -f "${CATOP}/private/$CAKEY" ) { | |
99 | print "CA certificate filename (or enter to create)\n"; | |
100 | $FILE = <STDIN>; | |
101 | ||
102 | chop $FILE; | |
103 | ||
104 | # ask user for existing CA certificate | |
105 | if ($FILE) { | |
106 | cp_pem($FILE,"${CATOP}/private/$CAKEY", "PRIVATE"); | |
107 | cp_pem($FILE,"${CATOP}/$CACERT", "CERTIFICATE"); | |
108 | $RET=$?; | |
109 | } else { | |
110 | print "Making CA certificate ...\n"; | |
16b1b035 RL |
111 | system ("$REQ -new -keyout " . |
112 | "${CATOP}/private/$CAKEY -out ${CATOP}/$CAREQ"); | |
64674bcc DSH |
113 | system ("$CA -create_serial " . |
114 | "-out ${CATOP}/$CACERT $CADAYS -batch " . | |
16b1b035 RL |
115 | "-keyfile ${CATOP}/private/$CAKEY -selfsign " . |
116 | "-infiles ${CATOP}/$CAREQ "); | |
8f3e97ba | 117 | $RET=$?; |
118 | } | |
119 | } | |
90644dd7 DSH |
120 | } elsif (/^-pkcs12$/) { |
121 | my $cname = $ARGV[1]; | |
122 | $cname = "My Certificate" unless defined $cname; | |
123 | system ("$PKCS12 -in newcert.pem -inkey newreq.pem " . | |
124 | "-certfile ${CATOP}/$CACERT -out newcert.p12 " . | |
125 | "-export -name \"$cname\""); | |
126 | $RET=$?; | |
127 | exit $RET; | |
8f3e97ba | 128 | } elsif (/^-xsign$/) { |
129 | system ("$CA -policy policy_anything -infiles newreq.pem"); | |
130 | $RET=$?; | |
131 | } elsif (/^(-sign|-signreq)$/) { | |
132 | system ("$CA -policy policy_anything -out newcert.pem " . | |
133 | "-infiles newreq.pem"); | |
134 | $RET=$?; | |
135 | print "Signed certificate is in newcert.pem\n"; | |
d428bf8c DSH |
136 | } elsif (/^(-signCA)$/) { |
137 | system ("$CA -policy policy_anything -out newcert.pem " . | |
138 | "-extensions v3_ca -infiles newreq.pem"); | |
139 | $RET=$?; | |
140 | print "Signed CA certificate is in newcert.pem\n"; | |
8f3e97ba | 141 | } elsif (/^-signcert$/) { |
142 | system ("$X509 -x509toreq -in newreq.pem -signkey newreq.pem " . | |
143 | "-out tmp.pem"); | |
144 | system ("$CA -policy policy_anything -out newcert.pem " . | |
145 | "-infiles tmp.pem"); | |
146 | $RET = $?; | |
147 | print "Signed certificate is in newcert.pem\n"; | |
148 | } elsif (/^-verify$/) { | |
149 | if (shift) { | |
150 | foreach $j (@ARGV) { | |
151 | system ("$VERIFY -CAfile $CATOP/$CACERT $j"); | |
152 | $RET=$? if ($? != 0); | |
153 | } | |
154 | exit $RET; | |
155 | } else { | |
156 | system ("$VERIFY -CAfile $CATOP/$CACERT newcert.pem"); | |
157 | $RET=$?; | |
158 | exit 0; | |
159 | } | |
160 | } else { | |
161 | print STDERR "Unknown arg $_\n"; | |
d199858e | 162 | print STDERR "usage: CA -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify\n"; |
8f3e97ba | 163 | exit 1; |
164 | } | |
165 | } | |
166 | ||
167 | exit $RET; | |
168 | ||
169 | sub cp_pem { | |
170 | my ($infile, $outfile, $bound) = @_; | |
171 | open IN, $infile; | |
172 | open OUT, ">$outfile"; | |
173 | my $flag = 0; | |
174 | while (<IN>) { | |
175 | $flag = 1 if (/^-----BEGIN.*$bound/) ; | |
176 | print OUT $_ if ($flag); | |
177 | if (/^-----END.*$bound/) { | |
178 | close IN; | |
179 | close OUT; | |
180 | return; | |
181 | } | |
182 | } | |
183 | } | |
184 |