char *file = NULL, *dn = NULL, *hex = NULL, *cacert = NULL, *cakey = NULL;
char *error = NULL;
identification_t *id = NULL;
- linked_list_t *san, *cdps;
+ linked_list_t *san, *cdps, *ocsp;
int lifetime = 1080;
chunk_t serial = chunk_empty;
chunk_t encoding = chunk_empty;
options = options_create();
san = linked_list_create();
cdps = linked_list_create();
+ ocsp = linked_list_create();
while (TRUE)
{
case 'k':
cakey = optarg;
continue;
- case 'u':
- cdps->insert_last(cdps, optarg);
- continue;
case 'd':
dn = optarg;
continue;
case 'b':
flags |= X509_CA;
continue;
+ case 'u':
+ cdps->insert_last(cdps, optarg);
+ continue;
+ case 'o':
+ ocsp->insert_last(ocsp, optarg);
+ continue;
case EOF:
break;
default:
BUILD_NOT_BEFORE_TIME, not_before, BUILD_DIGEST_ALG, digest,
BUILD_NOT_AFTER_TIME, not_after, BUILD_SERIAL, serial,
BUILD_SUBJECT_ALTNAMES, san, BUILD_X509_FLAG, flags,
- BUILD_CRL_DISTRIBUTION_POINTS, cdps, BUILD_END);
+ BUILD_CRL_DISTRIBUTION_POINTS, cdps,
+ BUILD_OCSP_ACCESS_LOCATIONS, ocsp, BUILD_END);
if (!cert)
{
error = "generating certificate failed";
DESTROY_IF(private);
san->destroy_offset(san, offsetof(identification_t, destroy));
cdps->destroy(cdps);
+ ocsp->destroy(ocsp);
options->destroy(options);
free(encoding.ptr);
free(serial.ptr);
usage:
san->destroy_offset(san, offsetof(identification_t, destroy));
cdps->destroy(cdps);
+ ocsp->destroy(ocsp);
options->destroy(options);
return command_usage(error);
}
issue, 'i', "issue",
"issue a certificate using a CA certificate and key",
{"[--in file] [--type pub|pkcs10]",
- " --cacert file --cakey file [--cdp uri]+",
- " --dn subject-dn [--san subjectAltName]+",
- "[--lifetime days] [--serial hex] [--ca]",
+ " --cacert file --cakey file --dn subject-dn [--san subjectAltName]+",
+ "[--lifetime days] [--serial hex] [--ca] [--crl uri]+ [--ocsp URI]+",
"[--digest md5|sha1|sha224|sha256|sha384|sha512]",
"[--options file]"},
{
{"type", 't', 1, "type of input, default: pub"},
{"cacert", 'c', 1, "CA certificate file"},
{"cakey", 'k', 1, "CA private key file"},
- {"cdp", 'u', 1, "CRL distribution point URI to include"},
{"dn", 'd', 1, "distinguished name to include as subject"},
{"san", 'a', 1, "subjectAltName to include in certificate"},
{"lifetime",'l', 1, "days the certificate is valid, default: 1080"},
{"serial", 's', 1, "serial number in hex, default: random"},
{"ca", 'b', 0, "include CA basicConstraint, default: no"},
+ {"crl", 'u', 1, "CRL distribution point URI to include"},
+ {"ocsp", 'o', 1, "OCSP AuthoritiyInfoAccess URI to incude"},
{"digest", 'g', 1, "digest for signature creation, default: sha1"},
{"options", '+', 1, "read command line options from file"},
}
public_key_t *public = NULL;
char *file = NULL, *dn = NULL, *hex = NULL, *error = NULL;
identification_t *id = NULL;
- linked_list_t *san;
+ linked_list_t *san, *ocsp;
int lifetime = 1080;
chunk_t serial = chunk_empty;
chunk_t encoding = chunk_empty;
options = options_create();
san = linked_list_create();
+ ocsp = linked_list_create();
while (TRUE)
{
case 's':
hex = optarg;
continue;
- case 'c':
+ case 'b':
flags |= X509_CA;
continue;
+ case 'o':
+ ocsp->insert_last(ocsp, optarg);
+ continue;
case EOF:
break;
default:
BUILD_SUBJECT, id, BUILD_NOT_BEFORE_TIME, not_before,
BUILD_NOT_AFTER_TIME, not_after, BUILD_SERIAL, serial,
BUILD_DIGEST_ALG, digest, BUILD_X509_FLAG, flags,
- BUILD_SUBJECT_ALTNAMES, san, BUILD_END);
+ BUILD_SUBJECT_ALTNAMES, san,
+ BUILD_OCSP_ACCESS_LOCATIONS, ocsp, BUILD_END);
if (!cert)
{
error = "generating certificate failed";
DESTROY_IF(public);
DESTROY_IF(private);
san->destroy_offset(san, offsetof(identification_t, destroy));
+ ocsp->destroy(ocsp);
options->destroy(options);
free(encoding.ptr);
free(serial.ptr);
usage:
san->destroy_offset(san, offsetof(identification_t, destroy));
+ ocsp->destroy(ocsp);
options->destroy(options);
return command_usage(error);
}
"create a self signed certificate",
{"[--in file] [--type rsa|ecdsa]",
" --dn distinguished-name [--san subjectAltName]+",
- "[--lifetime days] [--serial hex] [--ca]",
+ "[--lifetime days] [--serial hex] [--ca] [--ocsp URI]+",
"[--digest md5|sha1|sha224|sha256|sha384|sha512]",
"[--options file]"},
{
{"lifetime",'l', 1, "days the certificate is valid, default: 1080"},
{"serial", 's', 1, "serial number in hex, default: random"},
{"ca", 'b', 0, "include CA basicConstraint, default: no"},
+ {"ocsp", 'o', 1, "OCSP AuthoritiyInfoAccess URI to incude"},
{"digest", 'g', 1, "digest for signature creation, default: sha1"},
{"options", '+', 1, "read command line options from file"},
}