| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109 |
- /*
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package template
- import (
- "bytes"
- "crypto/x509"
- "encoding/pem"
- "fmt"
- "golang.org/x/crypto/pkcs12"
- )
- func pkcs12keyPass(pass, input string) (string, error) {
- blocks, err := pkcs12.ToPEM([]byte(input), pass)
- if err != nil {
- return "", fmt.Errorf(errDecodePKCS12WithPass, err)
- }
- var pemData []byte
- for _, block := range blocks {
- // remove bag attributes like localKeyID, friendlyName
- block.Headers = nil
- if block.Type == pemTypeCertificate {
- continue
- }
- key, err := parsePrivateKey(block.Bytes)
- if err != nil {
- return "", err
- }
- // we use pkcs8 because it supports more key types (ecdsa, ed25519), not just RSA
- block.Bytes, err = x509.MarshalPKCS8PrivateKey(key)
- if err != nil {
- return "", err
- }
- // report error if encode fails
- var buf bytes.Buffer
- if err := pem.Encode(&buf, block); err != nil {
- return "", err
- }
- pemData = append(pemData, buf.Bytes()...)
- }
- return string(pemData), nil
- }
- func parsePrivateKey(block []byte) (interface{}, error) {
- if k, err := x509.ParsePKCS1PrivateKey(block); err == nil {
- return k, nil
- }
- if k, err := x509.ParsePKCS8PrivateKey(block); err == nil {
- return k, nil
- }
- if k, err := x509.ParseECPrivateKey(block); err == nil {
- return k, nil
- }
- return nil, fmt.Errorf(errParsePrivKey)
- }
- func pkcs12key(input string) (string, error) {
- return pkcs12keyPass("", input)
- }
- func pkcs12certPass(pass, input string) (string, error) {
- blocks, err := pkcs12.ToPEM([]byte(input), pass)
- if err != nil {
- return "", fmt.Errorf(errDecodeCertWithPass, err)
- }
- var pemData []byte
- for _, block := range blocks {
- if block.Type != pemTypeCertificate {
- continue
- }
- // remove bag attributes like localKeyID, friendlyName
- block.Headers = nil
- // report error if encode fails
- var buf bytes.Buffer
- if err := pem.Encode(&buf, block); err != nil {
- return "", err
- }
- pemData = append(pemData, buf.Bytes()...)
- }
- // try to order certificate chain. If it fails we return
- // the unordered raw pem data.
- // This fails if multiple leaf or disjunct certs are provided.
- ordered, err := fetchCertChains(pemData)
- if err != nil {
- return string(pemData), nil
- }
- return string(ordered), nil
- }
- func pkcs12cert(input string) (string, error) {
- return pkcs12certPass("", input)
- }
|