]> git.ipfire.org Git - thirdparty/openssl.git/blame - apps/CA.pl.in
Fix bugs in bug-fix to x509/by_dir.c.
[thirdparty/openssl.git] / apps / CA.pl.in
CommitLineData
8f3e97ba 1#!/usr/local/bin/perl
2#
3# CA - wrapper around ca to make it easier to use ... basically ca requires
4# some setup stuff to be done before you can use it and this makes
5# things easier between now and when Eric is convinced to fix it :-)
6#
7# CA -newca ... will setup the right stuff
d199858e 8# CA -newreq[-nodes] ... will generate a certificate request
8f3e97ba 9# CA -sign ... will sign the generated request and output
10#
11# At the end of that grab newreq.pem and newcert.pem (one has the key
12# and the other the certificate) and cat them together and that is what
13# you want/need ... I'll make even this a little cleaner later.
14#
15#
16# 12-Jan-96 tjh Added more things ... including CA -signcert which
17# converts a certificate to a request and then signs it.
18# 10-Jan-96 eay Fixed a few more bugs and added the SSLEAY_CONFIG
19# environment variable so this can be driven from
20# a script.
21# 25-Jul-96 eay Cleaned up filenames some more.
22# 11-Jun-96 eay Fixed a few filename missmatches.
23# 03-May-96 eay Modified to use 'ssleay cmd' instead of 'cmd'.
24# 18-Apr-96 tjh Original hacking
25#
26# Tim Hudson
27# tjh@cryptsoft.com
28#
29
30# 27-Apr-98 snh Translation into perl, fix existing CA bug.
31#
32#
33# Steve Henson
34# shenson@bigfoot.com
35
c142bdf7 36# default openssl.cnf file has setup as per the following
8f3e97ba 37# demoCA ... where everything is stored
38
62d27939
AP
39my $openssl;
40if(defined $ENV{OPENSSL}) {
41 $openssl = $ENV{OPENSSL};
42} else {
43 $openssl = "openssl";
44 $ENV{OPENSSL} = $openssl;
45}
46
ec6a40e2 47$SSLEAY_CONFIG=$ENV{"SSLEAY_CONFIG"};
16b1b035
RL
48$DAYS="-days 365"; # 1 year
49$CADAYS="-days 1095"; # 3 years
62d27939
AP
50$REQ="$openssl req $SSLEAY_CONFIG";
51$CA="$openssl ca $SSLEAY_CONFIG";
52$VERIFY="$openssl verify";
53$X509="$openssl x509";
54$PKCS12="$openssl pkcs12";
8f3e97ba 55
56$CATOP="./demoCA";
57$CAKEY="cakey.pem";
16b1b035 58$CAREQ="careq.pem";
8f3e97ba 59$CACERT="cacert.pem";
60
61$DIRMODE = 0777;
62
63$RET = 0;
64
65foreach (@ARGV) {
66 if ( /^(-\?|-h|-help)$/ ) {
d199858e 67 print STDERR "usage: CA -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify\n";
8f3e97ba 68 exit 0;
69 } elsif (/^-newcert$/) {
70 # create a certificate
71 system ("$REQ -new -x509 -keyout newreq.pem -out newreq.pem $DAYS");
72 $RET=$?;
73 print "Certificate (and private key) is in newreq.pem\n"
74 } elsif (/^-newreq$/) {
75 # create a certificate request
76 system ("$REQ -new -keyout newreq.pem -out newreq.pem $DAYS");
77 $RET=$?;
78 print "Request (and private key) is in newreq.pem\n";
d199858e
BM
79 } elsif (/^-newreq-nodes$/) {
80 # create a certificate request
81 system ("$REQ -new -nodes -keyout newreq.pem -out newreq.pem $DAYS");
82 $RET=$?;
83 print "Request (and private key) is in newreq.pem\n";
8f3e97ba 84 } elsif (/^-newca$/) {
657e60fa 85 # if explicitly asked for or it doesn't exist then setup the
8f3e97ba 86 # directory structure that Eric likes to manage things
87 $NEW="1";
da70ff71 88 if ( "$NEW" || ! -f "${CATOP}/serial" ) {
8f3e97ba 89 # create the directory hierarchy
90 mkdir $CATOP, $DIRMODE;
91 mkdir "${CATOP}/certs", $DIRMODE;
92 mkdir "${CATOP}/crl", $DIRMODE ;
93 mkdir "${CATOP}/newcerts", $DIRMODE;
94 mkdir "${CATOP}/private", $DIRMODE;
8f3e97ba 95 open OUT, ">${CATOP}/index.txt";
96 close OUT;
97 }
98 if ( ! -f "${CATOP}/private/$CAKEY" ) {
99 print "CA certificate filename (or enter to create)\n";
100 $FILE = <STDIN>;
101
102 chop $FILE;
103
104 # ask user for existing CA certificate
105 if ($FILE) {
106 cp_pem($FILE,"${CATOP}/private/$CAKEY", "PRIVATE");
107 cp_pem($FILE,"${CATOP}/$CACERT", "CERTIFICATE");
108 $RET=$?;
109 } else {
110 print "Making CA certificate ...\n";
16b1b035
RL
111 system ("$REQ -new -keyout " .
112 "${CATOP}/private/$CAKEY -out ${CATOP}/$CAREQ");
64674bcc
DSH
113 system ("$CA -create_serial " .
114 "-out ${CATOP}/$CACERT $CADAYS -batch " .
16b1b035
RL
115 "-keyfile ${CATOP}/private/$CAKEY -selfsign " .
116 "-infiles ${CATOP}/$CAREQ ");
8f3e97ba 117 $RET=$?;
118 }
119 }
90644dd7
DSH
120 } elsif (/^-pkcs12$/) {
121 my $cname = $ARGV[1];
122 $cname = "My Certificate" unless defined $cname;
123 system ("$PKCS12 -in newcert.pem -inkey newreq.pem " .
124 "-certfile ${CATOP}/$CACERT -out newcert.p12 " .
125 "-export -name \"$cname\"");
126 $RET=$?;
127 exit $RET;
8f3e97ba 128 } elsif (/^-xsign$/) {
129 system ("$CA -policy policy_anything -infiles newreq.pem");
130 $RET=$?;
131 } elsif (/^(-sign|-signreq)$/) {
132 system ("$CA -policy policy_anything -out newcert.pem " .
133 "-infiles newreq.pem");
134 $RET=$?;
135 print "Signed certificate is in newcert.pem\n";
d428bf8c
DSH
136 } elsif (/^(-signCA)$/) {
137 system ("$CA -policy policy_anything -out newcert.pem " .
138 "-extensions v3_ca -infiles newreq.pem");
139 $RET=$?;
140 print "Signed CA certificate is in newcert.pem\n";
8f3e97ba 141 } elsif (/^-signcert$/) {
142 system ("$X509 -x509toreq -in newreq.pem -signkey newreq.pem " .
143 "-out tmp.pem");
144 system ("$CA -policy policy_anything -out newcert.pem " .
145 "-infiles tmp.pem");
146 $RET = $?;
147 print "Signed certificate is in newcert.pem\n";
148 } elsif (/^-verify$/) {
149 if (shift) {
150 foreach $j (@ARGV) {
151 system ("$VERIFY -CAfile $CATOP/$CACERT $j");
152 $RET=$? if ($? != 0);
153 }
154 exit $RET;
155 } else {
156 system ("$VERIFY -CAfile $CATOP/$CACERT newcert.pem");
157 $RET=$?;
158 exit 0;
159 }
160 } else {
161 print STDERR "Unknown arg $_\n";
d199858e 162 print STDERR "usage: CA -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify\n";
8f3e97ba 163 exit 1;
164 }
165}
166
167exit $RET;
168
169sub cp_pem {
170my ($infile, $outfile, $bound) = @_;
171open IN, $infile;
172open OUT, ">$outfile";
173my $flag = 0;
174while (<IN>) {
175 $flag = 1 if (/^-----BEGIN.*$bound/) ;
176 print OUT $_ if ($flag);
177 if (/^-----END.*$bound/) {
178 close IN;
179 close OUT;
180 return;
181 }
182}
183}
184