2022-06-27 08:27:57 +00:00
package utils
import (
"bytes"
"crypto/ecdsa"
"crypto/ed25519"
"crypto/elliptic"
"crypto/rand"
"crypto/rsa"
"crypto/tls"
"crypto/x509"
"crypto/x509/pkix"
"encoding/pem"
"errors"
"fmt"
2023-05-15 00:03:19 +00:00
"io"
2022-06-27 08:27:57 +00:00
"math/big"
"net"
"os"
"path/filepath"
"strings"
"time"
"github.com/authelia/authelia/v4/internal/configuration/schema"
"github.com/authelia/authelia/v4/internal/logging"
)
// PEMBlockType represent an enum of the existing PEM block types.
type PEMBlockType int
const (
// Certificate block type.
Certificate PEMBlockType = iota
// PrivateKey block type.
PrivateKey
)
// GenerateCertificate generate a certificate given a private key. RSA, Ed25519 and ECDSA are officially supported.
func GenerateCertificate ( privateKeyBuilder PrivateKeyBuilder , hosts [ ] string , validFrom time . Time , validFor time . Duration , isCA bool ) ( [ ] byte , [ ] byte , error ) {
privateKey , err := privateKeyBuilder . Build ( )
if err != nil {
return nil , nil , fmt . Errorf ( "unable to build private key: %w" , err )
}
notBefore := validFrom
notAfter := validFrom . Add ( validFor )
serialNumberLimit := new ( big . Int ) . Lsh ( big . NewInt ( 1 ) , 128 )
serialNumber , err := rand . Int ( rand . Reader , serialNumberLimit )
if err != nil {
return nil , nil , fmt . Errorf ( "failed to generate serial number: %v" , err )
}
template := x509 . Certificate {
SerialNumber : serialNumber ,
Subject : pkix . Name {
Organization : [ ] string { "Acme Co" } ,
} ,
NotBefore : notBefore ,
NotAfter : notAfter ,
KeyUsage : x509 . KeyUsageKeyEncipherment | x509 . KeyUsageDigitalSignature ,
ExtKeyUsage : [ ] x509 . ExtKeyUsage { x509 . ExtKeyUsageServerAuth , x509 . ExtKeyUsageClientAuth } ,
BasicConstraintsValid : true ,
}
for _ , h := range hosts {
if ip := net . ParseIP ( h ) ; ip != nil {
template . IPAddresses = append ( template . IPAddresses , ip )
} else {
template . DNSNames = append ( template . DNSNames , h )
}
}
if isCA {
template . IsCA = true
template . KeyUsage |= x509 . KeyUsageCertSign
}
certDERBytes , err := x509 . CreateCertificate ( rand . Reader , & template , & template , publicKey ( privateKey ) , privateKey )
if err != nil {
return nil , nil , fmt . Errorf ( "failed to create certificate: %v" , err )
}
certPEMBytes , err := ConvertDERToPEM ( certDERBytes , Certificate )
if err != nil {
return nil , nil , fmt . Errorf ( "failed to convert certificate in DER format into PEM: %v" , err )
}
keyDERBytes , err := x509 . MarshalPKCS8PrivateKey ( privateKey )
if err != nil {
return nil , nil , fmt . Errorf ( "failed to marshal private key: %v" , err )
}
keyPEMBytes , err := ConvertDERToPEM ( keyDERBytes , PrivateKey )
if err != nil {
return nil , nil , fmt . Errorf ( "faile to convert certificate in DER format into PEM: %v" , err )
}
return certPEMBytes , keyPEMBytes , nil
}
// ConvertDERToPEM convert certificate in DER format into PEM format.
func ConvertDERToPEM ( der [ ] byte , blockType PEMBlockType ) ( [ ] byte , error ) {
var buf bytes . Buffer
var blockTypeStr string
switch blockType {
case Certificate :
blockTypeStr = "CERTIFICATE"
case PrivateKey :
blockTypeStr = "PRIVATE KEY"
default :
return nil , fmt . Errorf ( "unknown PEM block type %d" , blockType )
}
if err := pem . Encode ( & buf , & pem . Block { Type : blockTypeStr , Bytes : der } ) ; err != nil {
return nil , fmt . Errorf ( "failed to encode DER data into PEM: %v" , err )
}
return buf . Bytes ( ) , nil
}
2022-10-05 05:05:23 +00:00
func publicKey ( privateKey any ) any {
2022-06-27 08:27:57 +00:00
switch k := privateKey . ( type ) {
case * rsa . PrivateKey :
return & k . PublicKey
case * ecdsa . PrivateKey :
return & k . PublicKey
case ed25519 . PrivateKey :
return k . Public ( ) . ( ed25519 . PublicKey )
default :
return nil
}
}
// PrivateKeyBuilder interface for a private key builder.
type PrivateKeyBuilder interface {
2022-10-05 05:05:23 +00:00
Build ( ) ( any , error )
2022-06-27 08:27:57 +00:00
}
// RSAKeyBuilder builder of RSA private key.
type RSAKeyBuilder struct {
keySizeInBits int
}
// WithKeySize configure the key size to use with RSA.
func ( rkb RSAKeyBuilder ) WithKeySize ( bits int ) RSAKeyBuilder {
rkb . keySizeInBits = bits
return rkb
}
// Build a RSA private key.
2022-10-05 05:05:23 +00:00
func ( rkb RSAKeyBuilder ) Build ( ) ( any , error ) {
2022-06-27 08:27:57 +00:00
return rsa . GenerateKey ( rand . Reader , rkb . keySizeInBits )
}
// Ed25519KeyBuilder builder of Ed25519 private key.
type Ed25519KeyBuilder struct { }
// Build an Ed25519 private key.
2022-10-05 05:05:23 +00:00
func ( ekb Ed25519KeyBuilder ) Build ( ) ( any , error ) {
2022-06-27 08:27:57 +00:00
_ , priv , err := ed25519 . GenerateKey ( rand . Reader )
return priv , err
}
// ECDSAKeyBuilder builder of ECDSA private key.
type ECDSAKeyBuilder struct {
curve elliptic . Curve
}
// WithCurve configure the curve to use for the ECDSA private key.
func ( ekb ECDSAKeyBuilder ) WithCurve ( curve elliptic . Curve ) ECDSAKeyBuilder {
ekb . curve = curve
return ekb
}
// Build an ECDSA private key.
2022-10-05 05:05:23 +00:00
func ( ekb ECDSAKeyBuilder ) Build ( ) ( any , error ) {
2022-06-27 08:27:57 +00:00
return ecdsa . GenerateKey ( ekb . curve , rand . Reader )
}
// ParseX509FromPEM parses PEM bytes and returns a PKCS key.
2022-10-02 02:07:40 +00:00
func ParseX509FromPEM ( data [ ] byte ) ( key any , err error ) {
2022-06-27 08:27:57 +00:00
block , _ := pem . Decode ( data )
if block == nil {
return nil , errors . New ( "failed to parse PEM block containing the key" )
}
2023-05-15 00:03:19 +00:00
return ParsePEMBlock ( block )
}
// ParseX509FromPEMRecursive allows returning the appropriate key type given some PEM encoded input.
// For Keys this is a single value of one of *rsa.PrivateKey, *rsa.PublicKey, *ecdsa.PrivateKey, *ecdsa.PublicKey,
// ed25519.PrivateKey, or ed25519.PublicKey. For certificates this is
// either a *X509.Certificate, or a []*X509.Certificate.
func ParseX509FromPEMRecursive ( data [ ] byte ) ( decoded any , err error ) {
var (
block * pem . Block
multi bool
certificates [ ] * x509 . Certificate
)
for i := 0 ; true ; i ++ {
block , data = pem . Decode ( data )
n := len ( data )
switch {
case block == nil :
return nil , fmt . Errorf ( "failed to parse PEM blocks: data does not appear to be PEM encoded" )
case multi || n != 0 :
switch block . Type {
case BlockTypeCertificate :
var certificate * x509 . Certificate
if certificate , err = x509 . ParseCertificate ( block . Bytes ) ; err != nil {
return nil , fmt . Errorf ( "failed to parse PEM blocks: data contains multiple blocks but #%d had an error during parsing: %w" , i , err )
}
certificates = append ( certificates , certificate )
default :
return nil , fmt . Errorf ( "failed to parse PEM blocks: data contains multiple blocks but #%d has a '%s' block type and should have a '%s' block type" , i , block . Type , BlockTypeCertificate )
}
multi = true
default :
if decoded , err = ParsePEMBlock ( block ) ; err != nil {
return nil , err
}
}
if n == 0 {
break
}
}
switch {
case multi :
return certificates , nil
default :
return decoded , nil
}
}
// ParsePEMBlock parses a single PEM block into the relevant X509 data struct.
func ParsePEMBlock ( block * pem . Block ) ( key any , err error ) {
if block == nil {
return nil , errors . New ( "failed to parse PEM block as it was empty" )
}
2022-06-27 08:27:57 +00:00
switch block . Type {
case BlockTypeRSAPrivateKey :
2023-05-15 00:03:19 +00:00
return x509 . ParsePKCS1PrivateKey ( block . Bytes )
2022-06-27 08:27:57 +00:00
case BlockTypeECDSAPrivateKey :
2023-05-15 00:03:19 +00:00
return x509 . ParseECPrivateKey ( block . Bytes )
2022-06-27 08:27:57 +00:00
case BlockTypePKCS8PrivateKey :
2023-05-15 00:03:19 +00:00
return x509 . ParsePKCS8PrivateKey ( block . Bytes )
2022-06-27 08:27:57 +00:00
case BlockTypeRSAPublicKey :
2023-05-15 00:03:19 +00:00
return x509 . ParsePKCS1PublicKey ( block . Bytes )
2022-06-27 08:27:57 +00:00
case BlockTypePKIXPublicKey :
2023-05-15 00:03:19 +00:00
return x509 . ParsePKIXPublicKey ( block . Bytes )
2022-06-27 08:27:57 +00:00
case BlockTypeCertificate :
2023-05-15 00:03:19 +00:00
return x509 . ParseCertificate ( block . Bytes )
case BlockTypeCertificateRequest :
return x509 . ParseCertificateRequest ( block . Bytes )
case BlockTypeX509CRL :
return x509 . ParseRevocationList ( block . Bytes )
2022-06-27 08:27:57 +00:00
default :
2023-05-15 00:03:19 +00:00
switch {
case strings . Contains ( block . Type , "PRIVATE KEY" ) :
return x509 . ParsePKCS8PrivateKey ( block . Bytes )
case strings . Contains ( block . Type , "PUBLIC KEY" ) :
return x509 . ParsePKIXPublicKey ( block . Bytes )
default :
return nil , fmt . Errorf ( "unknown block type: %s" , block . Type )
}
2022-06-27 08:27:57 +00:00
}
}
// CastX509AsCertificate converts an interface to an *x509.Certificate.
2022-10-05 05:05:23 +00:00
func CastX509AsCertificate ( c any ) ( certificate * x509 . Certificate , ok bool ) {
2022-06-27 08:27:57 +00:00
switch t := c . ( type ) {
case x509 . Certificate :
return & t , true
case * x509 . Certificate :
return t , true
default :
return nil , false
}
}
// IsX509PrivateKey returns true if the provided interface is an rsa.PrivateKey, ecdsa.PrivateKey, or ed25519.PrivateKey.
2022-10-05 05:05:23 +00:00
func IsX509PrivateKey ( i any ) bool {
2022-06-27 08:27:57 +00:00
switch i . ( type ) {
case rsa . PrivateKey , * rsa . PrivateKey , ecdsa . PrivateKey , * ecdsa . PrivateKey , ed25519 . PrivateKey , * ed25519 . PrivateKey :
return true
default :
return false
}
}
// NewTLSConfig generates a tls.Config from a schema.TLSConfig and a x509.CertPool.
2022-11-24 09:32:57 +00:00
func NewTLSConfig ( config * schema . TLSConfig , rootCAs * x509 . CertPool ) ( tlsConfig * tls . Config ) {
2022-10-21 08:41:33 +00:00
var certificates [ ] tls . Certificate
2022-11-24 09:32:57 +00:00
if config . PrivateKey != nil && config . CertificateChain . HasCertificates ( ) {
2022-10-21 08:41:33 +00:00
certificates = [ ] tls . Certificate {
{
Certificate : config . CertificateChain . CertificatesRaw ( ) ,
Leaf : config . CertificateChain . Leaf ( ) ,
PrivateKey : config . PrivateKey ,
} ,
}
2022-06-27 08:27:57 +00:00
}
return & tls . Config {
ServerName : config . ServerName ,
InsecureSkipVerify : config . SkipVerify , //nolint:gosec // Informed choice by user. Off by default.
2022-10-21 08:41:33 +00:00
MinVersion : config . MinimumVersion . MinVersion ( ) ,
2022-11-24 09:32:57 +00:00
MaxVersion : config . MaximumVersion . MaxVersion ( ) ,
RootCAs : rootCAs ,
2022-10-21 08:41:33 +00:00
Certificates : certificates ,
2022-06-27 08:27:57 +00:00
}
}
// NewX509CertPool generates a x509.CertPool from the system PKI and the directory specified.
func NewX509CertPool ( directory string ) ( certPool * x509 . CertPool , warnings [ ] error , errors [ ] error ) {
2023-01-12 10:57:44 +00:00
var err error
if certPool , err = x509 . SystemCertPool ( ) ; err != nil {
2022-06-27 08:27:57 +00:00
warnings = append ( warnings , fmt . Errorf ( "could not load system certificate pool which may result in untrusted certificate issues: %v" , err ) )
certPool = x509 . NewCertPool ( )
}
2023-01-12 10:57:44 +00:00
log := logging . Logger ( )
2022-06-27 08:27:57 +00:00
2023-01-12 10:57:44 +00:00
log . Tracef ( "Starting scan of directory %s for certificates" , directory )
2022-06-27 08:27:57 +00:00
2023-01-12 10:57:44 +00:00
if directory == "" {
return certPool , warnings , errors
}
var entries [ ] os . DirEntry
if entries , err = os . ReadDir ( directory ) ; err != nil {
errors = append ( errors , fmt . Errorf ( "could not read certificates from directory %v" , err ) )
return certPool , warnings , errors
}
for _ , entry := range entries {
nameLower := strings . ToLower ( entry . Name ( ) )
if ! entry . IsDir ( ) && ( strings . HasSuffix ( nameLower , ".cer" ) || strings . HasSuffix ( nameLower , ".crt" ) || strings . HasSuffix ( nameLower , ".pem" ) ) {
certPath := filepath . Join ( directory , entry . Name ( ) )
2022-06-27 08:27:57 +00:00
2023-01-12 10:57:44 +00:00
log . Tracef ( "Found possible cert %s, attempting to add it to the pool" , certPath )
2022-06-27 08:27:57 +00:00
2023-01-12 10:57:44 +00:00
var data [ ] byte
2022-06-27 08:27:57 +00:00
2023-01-12 10:57:44 +00:00
if data , err = os . ReadFile ( certPath ) ; err != nil {
errors = append ( errors , fmt . Errorf ( "could not read certificate %v" , err ) )
} else if ok := certPool . AppendCertsFromPEM ( data ) ; ! ok {
errors = append ( errors , fmt . Errorf ( "could not import certificate %s" , entry . Name ( ) ) )
2022-06-27 08:27:57 +00:00
}
}
}
2023-01-12 10:57:44 +00:00
log . Tracef ( "Finished scan of directory %s for certificates" , directory )
2022-06-27 08:27:57 +00:00
return certPool , warnings , errors
}
2023-05-15 00:03:19 +00:00
// WriteCertificateBytesAsPEMToPath writes a certificate/csr to a file in the PEM format.
func WriteCertificateBytesAsPEMToPath ( path string , csr bool , certs ... [ ] byte ) ( err error ) {
var out * os . File
if out , err = os . OpenFile ( path , os . O_WRONLY | os . O_CREATE | os . O_TRUNC , 0600 ) ; err != nil {
return err
}
if err = WriteCertificateBytesAsPEMToWriter ( out , csr , certs ... ) ; err != nil {
_ = out . Close ( )
return err
}
return nil
}
// WriteCertificateBytesAsPEMToWriter writes a certificate/csr to a io.Writer in the PEM format.
func WriteCertificateBytesAsPEMToWriter ( wr io . Writer , csr bool , certs ... [ ] byte ) ( err error ) {
2022-06-27 08:27:57 +00:00
blockType := BlockTypeCertificate
if csr {
blockType = BlockTypeCertificateRequest
}
2023-02-17 03:29:07 +00:00
blocks := make ( [ ] * pem . Block , len ( certs ) )
for i , cert := range certs {
blocks [ i ] = & pem . Block { Type : blockType , Bytes : cert }
}
2023-05-15 00:03:19 +00:00
return WritePEMBlocksToWriter ( wr , blocks ... )
2023-02-17 03:29:07 +00:00
}
2023-05-15 00:03:19 +00:00
// WritePEMBlocksToPath writes a set of *pem.Blocks to a file.
func WritePEMBlocksToPath ( path string , blocks ... * pem . Block ) ( err error ) {
2023-02-17 03:29:07 +00:00
var out * os . File
if out , err = os . OpenFile ( path , os . O_WRONLY | os . O_CREATE | os . O_TRUNC , 0600 ) ; err != nil {
return err
}
2023-05-15 00:03:19 +00:00
if err = WritePEMBlocksToWriter ( out , blocks ... ) ; err != nil {
_ = out . Close ( )
return err
}
2022-06-27 08:27:57 +00:00
2023-05-15 00:03:19 +00:00
return out . Close ( )
}
func WritePEMBlocksToWriter ( wr io . Writer , blocks ... * pem . Block ) ( err error ) {
for _ , block := range blocks {
if err = pem . Encode ( wr , block ) ; err != nil {
2023-02-11 03:11:40 +00:00
return err
}
2022-06-27 08:27:57 +00:00
}
2023-05-15 00:03:19 +00:00
return nil
2022-06-27 08:27:57 +00:00
}
// WriteKeyToPEM writes a key that can be encoded as a PEM to a file in the PEM format.
2022-10-05 05:05:23 +00:00
func WriteKeyToPEM ( key any , path string , pkcs8 bool ) ( err error ) {
2023-02-17 03:29:07 +00:00
block , err := PEMBlockFromX509Key ( key , pkcs8 )
2022-06-27 08:27:57 +00:00
if err != nil {
return err
}
2023-05-15 00:03:19 +00:00
return WritePEMBlocksToPath ( path , block )
2022-06-27 08:27:57 +00:00
}
// PEMBlockFromX509Key turns a PublicKey or PrivateKey into a pem.Block.
2022-10-05 05:05:23 +00:00
func PEMBlockFromX509Key ( key any , pkcs8 bool ) ( pemBlock * pem . Block , err error ) {
2022-06-27 08:27:57 +00:00
var (
data [ ] byte
blockType string
)
switch k := key . ( type ) {
case * rsa . PrivateKey :
if pkcs8 {
blockType = BlockTypePKCS8PrivateKey
data , err = x509 . MarshalPKCS8PrivateKey ( key )
break
}
blockType = BlockTypeRSAPrivateKey
data = x509 . MarshalPKCS1PrivateKey ( k )
case * ecdsa . PrivateKey :
if pkcs8 {
blockType = BlockTypePKCS8PrivateKey
data , err = x509 . MarshalPKCS8PrivateKey ( key )
break
}
blockType = BlockTypeECDSAPrivateKey
data , err = x509 . MarshalECPrivateKey ( k )
case ed25519 . PrivateKey :
blockType = BlockTypePKCS8PrivateKey
data , err = x509 . MarshalPKCS8PrivateKey ( k )
case * rsa . PublicKey :
if pkcs8 {
blockType = BlockTypePKIXPublicKey
data , err = x509 . MarshalPKIXPublicKey ( key )
break
}
blockType = BlockTypeRSAPublicKey
data = x509 . MarshalPKCS1PublicKey ( k )
case * ecdsa . PublicKey , ed25519 . PublicKey :
blockType = BlockTypePKIXPublicKey
data , err = x509 . MarshalPKIXPublicKey ( k )
default :
err = fmt . Errorf ( "failed to match key type: %T" , k )
}
if err != nil {
return nil , fmt . Errorf ( "failed to marshal key: %w" , err )
}
return & pem . Block {
Type : blockType ,
Bytes : data ,
} , nil
}
// KeySigAlgorithmFromString returns a x509.PublicKeyAlgorithm and x509.SignatureAlgorithm given a keyAlgorithm and signatureAlgorithm string.
func KeySigAlgorithmFromString ( keyAlgorithm , signatureAlgorithm string ) ( keyAlg x509 . PublicKeyAlgorithm , sigAlg x509 . SignatureAlgorithm ) {
keyAlg = PublicKeyAlgorithmFromString ( keyAlgorithm )
if keyAlg == x509 . UnknownPublicKeyAlgorithm {
return x509 . UnknownPublicKeyAlgorithm , x509 . UnknownSignatureAlgorithm
}
switch keyAlg {
case x509 . RSA :
return keyAlg , RSASignatureAlgorithmFromString ( signatureAlgorithm )
case x509 . ECDSA :
return keyAlg , ECDSASignatureAlgorithmFromString ( signatureAlgorithm )
case x509 . Ed25519 :
return keyAlg , x509 . PureEd25519
default :
return keyAlg , x509 . UnknownSignatureAlgorithm
}
}
// PublicKeyAlgorithmFromString returns a x509.PublicKeyAlgorithm given an appropriate string.
func PublicKeyAlgorithmFromString ( algorithm string ) ( alg x509 . PublicKeyAlgorithm ) {
switch strings . ToUpper ( algorithm ) {
case KeyAlgorithmRSA :
return x509 . RSA
case KeyAlgorithmECDSA :
return x509 . ECDSA
case KeyAlgorithmEd25519 :
return x509 . Ed25519
default :
return x509 . UnknownPublicKeyAlgorithm
}
}
// RSASignatureAlgorithmFromString returns a x509.SignatureAlgorithm for the RSA x509.PublicKeyAlgorithm given an
// algorithm string.
func RSASignatureAlgorithmFromString ( algorithm string ) ( alg x509 . SignatureAlgorithm ) {
switch strings . ToUpper ( algorithm ) {
case HashAlgorithmSHA1 :
return x509 . SHA1WithRSA
case HashAlgorithmSHA256 :
return x509 . SHA256WithRSA
case HashAlgorithmSHA384 :
return x509 . SHA384WithRSA
case HashAlgorithmSHA512 :
return x509 . SHA512WithRSA
default :
return x509 . UnknownSignatureAlgorithm
}
}
// ECDSASignatureAlgorithmFromString returns a x509.SignatureAlgorithm for the ECDSA x509.PublicKeyAlgorithm given an
// algorithm string.
func ECDSASignatureAlgorithmFromString ( algorithm string ) ( alg x509 . SignatureAlgorithm ) {
switch strings . ToUpper ( algorithm ) {
case HashAlgorithmSHA1 :
return x509 . ECDSAWithSHA1
case HashAlgorithmSHA256 :
return x509 . ECDSAWithSHA256
case HashAlgorithmSHA384 :
return x509 . ECDSAWithSHA384
case HashAlgorithmSHA512 :
return x509 . ECDSAWithSHA512
default :
return x509 . UnknownSignatureAlgorithm
}
}
// EllipticCurveFromString turns a string into an elliptic.Curve.
func EllipticCurveFromString ( curveString string ) ( curve elliptic . Curve ) {
switch strings . ToUpper ( curveString ) {
case EllipticCurveAltP224 , EllipticCurveP224 :
return elliptic . P224 ( )
case EllipticCurveAltP256 , EllipticCurveP256 :
return elliptic . P256 ( )
case EllipticCurveAltP384 , EllipticCurveP384 :
return elliptic . P384 ( )
case EllipticCurveAltP521 , EllipticCurveP521 :
return elliptic . P521 ( )
default :
return nil
}
}
// PublicKeyFromPrivateKey returns a PublicKey when provided with a PrivateKey.
2022-10-05 05:05:23 +00:00
func PublicKeyFromPrivateKey ( privateKey any ) ( publicKey any ) {
2022-06-27 08:27:57 +00:00
switch k := privateKey . ( type ) {
case * rsa . PrivateKey :
return & k . PublicKey
case * ecdsa . PrivateKey :
return & k . PublicKey
case ed25519 . PrivateKey :
return k . Public ( ) . ( ed25519 . PublicKey )
default :
return nil
}
}
// X509ParseKeyUsage parses a list of key usages. If provided with an empty list returns a default of Key Encipherment
// and Digital Signature unless ca is true in which case it returns Cert Sign.
func X509ParseKeyUsage ( keyUsages [ ] string , ca bool ) ( keyUsage x509 . KeyUsage ) {
if len ( keyUsages ) == 0 {
keyUsage = x509 . KeyUsageKeyEncipherment | x509 . KeyUsageDigitalSignature
if ca {
keyUsage |= x509 . KeyUsageCertSign
}
return keyUsage
}
for _ , keyUsageString := range keyUsages {
switch strings . ToLower ( keyUsageString ) {
case "digitalsignature" , "digital_signature" :
keyUsage |= x509 . KeyUsageDigitalSignature
case "keyencipherment" , "key_encipherment" :
keyUsage |= x509 . KeyUsageKeyEncipherment
case "dataencipherment" , "data_encipherment" :
keyUsage |= x509 . KeyUsageDataEncipherment
case "keyagreement" , "key_agreement" :
keyUsage |= x509 . KeyUsageKeyAgreement
case "certsign" , "cert_sign" , "certificatesign" , "certificate_sign" :
keyUsage |= x509 . KeyUsageCertSign
case "crlsign" , "crl_sign" :
keyUsage |= x509 . KeyUsageCRLSign
case "encipheronly" , "encipher_only" :
keyUsage |= x509 . KeyUsageEncipherOnly
case "decipheronly" , "decipher_only" :
keyUsage |= x509 . KeyUsageDecipherOnly
}
}
return keyUsage
}
// X509ParseExtendedKeyUsage parses a list of extended key usages. If provided with an empty list returns a default of
// Server Auth unless ca is true in which case it returns a default of Any.
func X509ParseExtendedKeyUsage ( extKeyUsages [ ] string , ca bool ) ( extKeyUsage [ ] x509 . ExtKeyUsage ) {
if len ( extKeyUsages ) == 0 {
if ca {
2023-02-11 03:11:40 +00:00
extKeyUsage = [ ] x509 . ExtKeyUsage { }
2022-06-27 08:27:57 +00:00
} else {
extKeyUsage = [ ] x509 . ExtKeyUsage { x509 . ExtKeyUsageServerAuth }
}
return extKeyUsage
}
loop :
for _ , extKeyUsageString := range extKeyUsages {
switch strings . ToLower ( extKeyUsageString ) {
case "any" :
extKeyUsage = [ ] x509 . ExtKeyUsage { x509 . ExtKeyUsageAny }
break loop
case "serverauth" , "server_auth" :
extKeyUsage = append ( extKeyUsage , x509 . ExtKeyUsageServerAuth )
case "clientauth" , "client_auth" :
extKeyUsage = append ( extKeyUsage , x509 . ExtKeyUsageClientAuth )
case "codesigning" , "code_signing" :
extKeyUsage = append ( extKeyUsage , x509 . ExtKeyUsageCodeSigning )
case "emailprotection" , "email_protection" :
extKeyUsage = append ( extKeyUsage , x509 . ExtKeyUsageEmailProtection )
case "ipsecendsystem" , "ipsec_endsystem" , "ipsec_end_system" :
extKeyUsage = append ( extKeyUsage , x509 . ExtKeyUsageIPSECEndSystem )
case "ipsectunnel" , "ipsec_tunnel" :
extKeyUsage = append ( extKeyUsage , x509 . ExtKeyUsageIPSECTunnel )
case "ipsecuser" , "ipsec_user" :
extKeyUsage = append ( extKeyUsage , x509 . ExtKeyUsageIPSECUser )
case "ocspsigning" , "ocsp_signing" :
extKeyUsage = append ( extKeyUsage , x509 . ExtKeyUsageOCSPSigning )
}
}
return extKeyUsage
}