pkcs12.go 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195
  1. /*
  2. Copyright © 2025 ESO Maintainer Team
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. https://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package template
  14. import (
  15. "bytes"
  16. "crypto/x509"
  17. "encoding/base64"
  18. "encoding/pem"
  19. "errors"
  20. "fmt"
  21. gopkcs12 "software.sslmate.com/src/go-pkcs12"
  22. )
  23. func pkcs12keyPass(pass, input string) (string, error) {
  24. privateKey, _, _, err := gopkcs12.DecodeChain([]byte(input), pass)
  25. if err != nil {
  26. return "", fmt.Errorf(errDecodePKCS12WithPass, err)
  27. }
  28. marshalPrivateKey, err := x509.MarshalPKCS8PrivateKey(privateKey)
  29. if err != nil {
  30. return "", err
  31. }
  32. var buf bytes.Buffer
  33. if err := pem.Encode(&buf, &pem.Block{
  34. Type: pemTypeKey,
  35. Bytes: marshalPrivateKey,
  36. }); err != nil {
  37. return "", err
  38. }
  39. return buf.String(), nil
  40. }
  41. func parsePrivateKey(block []byte) (any, error) {
  42. if k, err := x509.ParsePKCS1PrivateKey(block); err == nil {
  43. return k, nil
  44. }
  45. if k, err := x509.ParsePKCS8PrivateKey(block); err == nil {
  46. return k, nil
  47. }
  48. if k, err := x509.ParseECPrivateKey(block); err == nil {
  49. return k, nil
  50. }
  51. return nil, errors.New(errParsePrivKey)
  52. }
  53. func pkcs12key(input string) (string, error) {
  54. return pkcs12keyPass("", input)
  55. }
  56. func pkcs12certPass(pass, input string) (string, error) {
  57. _, certificate, caCerts, err := gopkcs12.DecodeChain([]byte(input), pass)
  58. if err != nil {
  59. return "", fmt.Errorf(errDecodeCertWithPass, err)
  60. }
  61. var pemData []byte
  62. var buf bytes.Buffer
  63. if err := pem.Encode(&buf, &pem.Block{
  64. Type: pemTypeCertificate,
  65. Bytes: certificate.Raw,
  66. }); err != nil {
  67. return "", err
  68. }
  69. pemData = append(pemData, buf.Bytes()...)
  70. for _, ca := range caCerts {
  71. var buf bytes.Buffer
  72. if err := pem.Encode(&buf, &pem.Block{
  73. Type: pemTypeCertificate,
  74. Bytes: ca.Raw,
  75. }); err != nil {
  76. return "", err
  77. }
  78. pemData = append(pemData, buf.Bytes()...)
  79. }
  80. // try to order certificate chain. If it fails we return
  81. // the unordered raw pem data.
  82. // This fails if multiple leaf or disjunct certs are provided.
  83. ordered, err := fetchCertChains(pemData)
  84. if err != nil {
  85. return string(pemData), nil
  86. }
  87. return string(ordered), nil
  88. }
  89. func pkcs12cert(input string) (string, error) {
  90. return pkcs12certPass("", input)
  91. }
  92. func pemToPkcs12(cert, key string) (string, error) {
  93. return pemToPkcs12Pass(cert, key, "")
  94. }
  95. func pemToPkcs12Pass(cert, key, pass string) (string, error) {
  96. certPem, _ := pem.Decode([]byte(cert))
  97. parsedCert, err := x509.ParseCertificate(certPem.Bytes)
  98. if err != nil {
  99. return "", err
  100. }
  101. return certsKeyToPkcs12(parsedCert, key, nil, pass)
  102. }
  103. func fullPemToPkcs12(cert, key string) (string, error) {
  104. return fullPemToPkcs12Pass(cert, key, "")
  105. }
  106. func fullPemToPkcs12Pass(cert, key, pass string) (string, error) {
  107. certPem, rest := pem.Decode([]byte(cert))
  108. parsedCert, err := x509.ParseCertificate(certPem.Bytes)
  109. if err != nil {
  110. return "", err
  111. }
  112. caCerts, err := parseCaCerts(rest)
  113. if err != nil {
  114. return "", err
  115. }
  116. return certsKeyToPkcs12(parsedCert, key, caCerts, pass)
  117. }
  118. func certsKeyToPkcs12(cert *x509.Certificate, key string, caCerts []*x509.Certificate, password string) (string, error) {
  119. keyPem, _ := pem.Decode([]byte(key))
  120. parsedKey, err := parsePrivateKey(keyPem.Bytes)
  121. if err != nil {
  122. return "", err
  123. }
  124. pfx, err := gopkcs12.Modern.Encode(parsedKey, cert, caCerts, password)
  125. if err != nil {
  126. return "", err
  127. }
  128. return base64.StdEncoding.EncodeToString(pfx), nil
  129. }
  130. func pemTruststoreToPKCS12(cert string) (string, error) {
  131. return pemTruststoreToPKCS12Pass(cert, "")
  132. }
  133. func pemTruststoreToPKCS12Pass(cert, password string) (string, error) {
  134. caCerts, err := parseCaCerts([]byte(cert))
  135. if err != nil {
  136. return "", err
  137. }
  138. pfx, err := gopkcs12.Modern.EncodeTrustStore(caCerts, password)
  139. if err != nil {
  140. return "", err
  141. }
  142. return base64.StdEncoding.EncodeToString(pfx), nil
  143. }
  144. func parseCaCerts(certs []byte) ([]*x509.Certificate, error) {
  145. caCerts := make([]*x509.Certificate, 0)
  146. rest := certs
  147. for len(rest) > 0 {
  148. caPem, restBytes := pem.Decode(rest)
  149. rest = restBytes
  150. caCert, err := x509.ParseCertificate(caPem.Bytes)
  151. if err != nil {
  152. return nil, err
  153. }
  154. caCerts = append(caCerts, caCert)
  155. }
  156. return caCerts, nil
  157. }