r509 0.9.2 → 0.10.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (177) hide show
  1. checksums.yaml +7 -0
  2. checksums.yaml.gz.sig +0 -0
  3. data.tar.gz.sig +2 -0
  4. data/CONTRIBUTING.mdown +21 -0
  5. data/LICENSE +13 -0
  6. data/README.mdown +548 -0
  7. data/Rakefile +5 -0
  8. data/bin/r509 +16 -17
  9. data/doc/R509.html +42 -26
  10. data/doc/R509/ASN1.html +22 -16
  11. data/doc/R509/ASN1/GeneralName.html +180 -173
  12. data/doc/R509/ASN1/GeneralNames.html +390 -62
  13. data/doc/R509/CRL.html +9 -7
  14. data/doc/R509/CRL/Administrator.html +208 -623
  15. data/doc/R509/CRL/FileReaderWriter.html +856 -0
  16. data/doc/R509/CRL/ReaderWriter.html +524 -0
  17. data/doc/R509/CRL/SignedList.html +29 -42
  18. data/doc/R509/CSR.html +248 -333
  19. data/doc/R509/Cert.html +364 -491
  20. data/doc/R509/Cert/Extensions.html +134 -43
  21. data/doc/R509/Cert/Extensions/AuthorityInfoAccess.html +335 -65
  22. data/doc/R509/Cert/Extensions/AuthorityKeyIdentifier.html +201 -102
  23. data/doc/R509/Cert/Extensions/BasicConstraints.html +297 -68
  24. data/doc/R509/Cert/Extensions/CRLDistributionPoints.html +690 -77
  25. data/doc/R509/Cert/Extensions/CertificatePolicies.html +293 -43
  26. data/doc/R509/Cert/Extensions/ExtendedKeyUsage.html +321 -173
  27. data/doc/R509/Cert/Extensions/GeneralNamesMixin.html +656 -0
  28. data/doc/R509/Cert/Extensions/InhibitAnyPolicy.html +270 -42
  29. data/doc/R509/Cert/Extensions/KeyUsage.html +334 -184
  30. data/doc/R509/Cert/Extensions/NameConstraints.html +363 -93
  31. data/doc/R509/{ASN1 → Cert/Extensions}/NoticeReference.html +209 -48
  32. data/doc/R509/Cert/Extensions/OCSPNoCheck.html +244 -17
  33. data/doc/R509/Cert/Extensions/PolicyConstraints.html +322 -71
  34. data/doc/R509/{ASN1 → Cert/Extensions}/PolicyInformation.html +204 -43
  35. data/doc/R509/{ASN1 → Cert/Extensions}/PolicyQualifiers.html +205 -48
  36. data/doc/R509/Cert/Extensions/SubjectAlternativeName.html +348 -143
  37. data/doc/R509/Cert/Extensions/SubjectKeyIdentifier.html +165 -13
  38. data/doc/R509/{ASN1 → Cert/Extensions}/UserNotice.html +204 -43
  39. data/doc/R509/Cert/Extensions/ValidationMixin.html +120 -0
  40. data/doc/R509/CertificateAuthority.html +9 -7
  41. data/doc/R509/CertificateAuthority/OptionsBuilder.html +475 -0
  42. data/doc/R509/CertificateAuthority/Signer.html +149 -198
  43. data/doc/R509/Config.html +10 -8
  44. data/doc/R509/Config/CAConfig.html +708 -625
  45. data/doc/R509/Config/CAConfigPool.html +179 -31
  46. data/doc/R509/Config/CertProfile.html +1544 -0
  47. data/doc/R509/Config/SubjectItemPolicy.html +437 -99
  48. data/doc/R509/Engine.html +14 -28
  49. data/doc/R509/Helpers.html +1014 -0
  50. data/doc/R509/MessageDigest.html +73 -25
  51. data/doc/R509/NameSanitizer.html +39 -39
  52. data/doc/R509/OCSP.html +5 -5
  53. data/doc/R509/OCSP/Request.html +5 -5
  54. data/doc/R509/OCSP/Request/Nonce.html +5 -5
  55. data/doc/R509/OCSP/Response.html +7 -7
  56. data/doc/R509/OIDMapper.html +121 -6
  57. data/doc/R509/PrivateKey.html +226 -227
  58. data/doc/R509/R509Error.html +5 -5
  59. data/doc/R509/SPKI.html +244 -342
  60. data/doc/R509/Subject.html +241 -70
  61. data/doc/R509/Validity.html +5 -5
  62. data/doc/R509/Validity/Checker.html +5 -5
  63. data/doc/R509/Validity/DefaultChecker.html +5 -9
  64. data/doc/R509/Validity/DefaultWriter.html +5 -9
  65. data/doc/R509/Validity/Status.html +5 -5
  66. data/doc/R509/Validity/Writer.html +5 -5
  67. data/doc/_index.html +92 -30
  68. data/doc/class_list.html +2 -2
  69. data/doc/file.CONTRIBUTING.html +96 -0
  70. data/doc/file.LICENSE.html +87 -0
  71. data/doc/file.README.html +279 -389
  72. data/doc/file.YAML.html +243 -0
  73. data/doc/file.r509.html +298 -105
  74. data/doc/file_list.html +11 -2
  75. data/doc/frames.html +1 -1
  76. data/doc/index.html +279 -389
  77. data/doc/js/full_list.js +6 -1
  78. data/doc/method_list.html +869 -1139
  79. data/doc/top-level-namespace.html +103 -5
  80. data/lib/r509.rb +7 -2
  81. data/lib/r509/asn1.rb +97 -135
  82. data/lib/r509/cert.rb +17 -106
  83. data/lib/r509/cert/extensions.rb +13 -676
  84. data/lib/r509/cert/extensions/authority_info_access.rb +128 -0
  85. data/lib/r509/cert/extensions/authority_key_identifier.rb +100 -0
  86. data/lib/r509/cert/extensions/base.rb +142 -0
  87. data/lib/r509/cert/extensions/basic_constraints.rb +119 -0
  88. data/lib/r509/cert/extensions/certificate_policies.rb +262 -0
  89. data/lib/r509/cert/extensions/crl_distribution_points.rb +98 -0
  90. data/lib/r509/cert/extensions/extended_key_usage.rb +189 -0
  91. data/lib/r509/cert/extensions/inhibit_any_policy.rb +70 -0
  92. data/lib/r509/cert/extensions/key_usage.rb +209 -0
  93. data/lib/r509/cert/extensions/name_constraints.rb +179 -0
  94. data/lib/r509/cert/extensions/ocsp_no_check.rb +56 -0
  95. data/lib/r509/cert/extensions/policy_constraints.rb +122 -0
  96. data/lib/r509/cert/extensions/subject_alternative_name.rb +88 -0
  97. data/lib/r509/cert/extensions/subject_key_identifier.rb +56 -0
  98. data/lib/r509/cert/extensions/validation_mixin.rb +42 -0
  99. data/lib/r509/certificate_authority/options_builder.rb +142 -0
  100. data/lib/r509/certificate_authority/signer.rb +189 -0
  101. data/lib/r509/config.rb +3 -600
  102. data/lib/r509/config/ca_config.rb +414 -0
  103. data/lib/r509/config/cert_profile.rb +110 -0
  104. data/lib/r509/config/subject_item_policy.rb +118 -0
  105. data/lib/r509/crl/administrator.rb +169 -0
  106. data/lib/r509/crl/reader_writer.rb +109 -0
  107. data/lib/r509/crl/signed_list.rb +135 -0
  108. data/lib/r509/csr.rb +35 -116
  109. data/lib/r509/engine.rb +21 -11
  110. data/lib/r509/helpers.rb +110 -0
  111. data/lib/r509/io_helpers.rb +18 -13
  112. data/lib/r509/message_digest.rb +13 -3
  113. data/lib/r509/oid_mapper.rb +14 -0
  114. data/lib/r509/private_key.rb +74 -50
  115. data/lib/r509/spki.rb +50 -113
  116. data/lib/r509/subject.rb +24 -2
  117. data/lib/r509/trollop.rb +788 -0
  118. data/lib/r509/version.rb +1 -1
  119. data/r509.yaml +289 -96
  120. data/spec/asn1_spec.rb +171 -98
  121. data/spec/cert/extensions/authority_info_access_spec.rb +247 -0
  122. data/spec/cert/extensions/authority_key_identifier_spec.rb +85 -0
  123. data/spec/cert/extensions/base_spec.rb +172 -0
  124. data/spec/cert/extensions/basic_constraints_spec.rb +185 -0
  125. data/spec/cert/extensions/certificate_policies_spec.rb +288 -0
  126. data/spec/cert/extensions/crl_distribution_points_spec.rb +149 -0
  127. data/spec/cert/extensions/extended_key_usage_spec.rb +174 -0
  128. data/spec/cert/extensions/inhibit_any_policy_spec.rb +92 -0
  129. data/spec/cert/extensions/key_usage_spec.rb +172 -0
  130. data/spec/cert/extensions/name_constraints_spec.rb +335 -0
  131. data/spec/cert/extensions/ocsp_no_check_spec.rb +76 -0
  132. data/spec/cert/extensions/policy_constraints_spec.rb +155 -0
  133. data/spec/cert/extensions/subject_alternative_name_spec.rb +354 -0
  134. data/spec/cert/extensions/subject_key_identifier_spec.rb +64 -0
  135. data/spec/cert_spec.rb +11 -9
  136. data/spec/certificate_authority/options_builder_spec.rb +307 -0
  137. data/spec/certificate_authority/signer_spec.rb +278 -0
  138. data/spec/config/ca_config_spec.rb +405 -0
  139. data/spec/config/cert_profile_spec.rb +88 -0
  140. data/spec/config/subject_item_policy_spec.rb +81 -0
  141. data/spec/crl/administrator_spec.rb +199 -0
  142. data/spec/crl/reader_writer_spec.rb +97 -0
  143. data/spec/crl/signed_list_spec.rb +84 -0
  144. data/spec/csr_spec.rb +43 -36
  145. data/spec/engine_spec.rb +51 -0
  146. data/spec/fixtures.rb +40 -40
  147. data/spec/fixtures/cert1.pem +1 -1
  148. data/spec/fixtures/config_pool_test_minimal.yaml +11 -15
  149. data/spec/fixtures/config_test.yaml +96 -59
  150. data/spec/fixtures/config_test_dsa.yaml +29 -35
  151. data/spec/fixtures/config_test_ec.yaml +29 -35
  152. data/spec/fixtures/config_test_engine_key.yaml +7 -7
  153. data/spec/fixtures/config_test_engine_no_key_name.yaml +6 -6
  154. data/spec/fixtures/config_test_minimal.yaml +3 -5
  155. data/spec/fixtures/config_test_password.yaml +4 -6
  156. data/spec/fixtures/config_test_various.yaml +147 -137
  157. data/spec/fixtures/crl_list_file.txt +1 -1
  158. data/spec/fixtures/test_ca_crl.cer +20 -0
  159. data/spec/fixtures/test_ca_crl.key +28 -0
  160. data/spec/fixtures/test_ca_crl.p12 +0 -0
  161. data/spec/message_digest_spec.rb +6 -0
  162. data/spec/oid_mapper_spec.rb +11 -0
  163. data/spec/private_key_spec.rb +19 -18
  164. data/spec/spec_helper.rb +10 -6
  165. data/spec/spki_spec.rb +38 -19
  166. data/spec/subject_spec.rb +16 -0
  167. metadata +108 -59
  168. metadata.gz.sig +0 -0
  169. data/README.md +0 -638
  170. data/doc/R509/Config/CAProfile.html +0 -1015
  171. data/doc/R509/IOHelpers.html +0 -564
  172. data/lib/r509/certificate_authority.rb +0 -407
  173. data/lib/r509/crl.rb +0 -351
  174. data/spec/cert/extensions_spec.rb +0 -1095
  175. data/spec/certificate_authority_spec.rb +0 -681
  176. data/spec/config_spec.rb +0 -562
  177. data/spec/crl_spec.rb +0 -226
@@ -3,13 +3,23 @@ require 'openssl'
3
3
  module R509
4
4
  #MessageDigest allows you to specify MDs in a more friendly fashion
5
5
  class MessageDigest
6
+ # a list of message digests that this class understands
7
+ KNOWN_MDS = ['SHA1','SHA224','SHA256','SHA384','SHA512','DSS1','MD5']
8
+
9
+ # this constant defines the default message digest if it is not supplied
10
+ # or an invalid digest is passed
11
+ DEFAULT_MD = 'SHA1'
12
+
6
13
  attr_reader :name, :digest
7
14
 
8
15
  # @param [String,OpenSSL::Digest] arg
9
- def initialize(arg)
16
+ def initialize(arg=nil)
10
17
  if arg.kind_of?(String)
11
18
  @name = arg.downcase
12
19
  @digest = translate_name_to_digest
20
+ elsif arg.nil?
21
+ @name = DEFAULT_MD
22
+ @digest = translate_name_to_digest
13
23
  else
14
24
  @digest = arg
15
25
  @name = translate_digest_to_name
@@ -29,8 +39,8 @@ module R509
29
39
  when 'md5' then OpenSSL::Digest::MD5.new
30
40
  when 'dss1' then OpenSSL::Digest::DSS1.new
31
41
  else
32
- @name = "sha1"
33
- OpenSSL::Digest::SHA1.new
42
+ @name = DEFAULT_MD.downcase
43
+ translate_name_to_digest
34
44
  end
35
45
  end
36
46
 
@@ -28,5 +28,19 @@ module R509
28
28
  end
29
29
  nil
30
30
  end
31
+
32
+ # Load YAML and register OIDs
33
+ # @param [String] name Name of the config within the file
34
+ # @param [String] yaml_data YAML data to load
35
+ # @example
36
+ # custom_oids:
37
+ # - :oid: 1.4.3.2.1.2.3.4.4.4.5
38
+ # :short_name: testOIDName
39
+ # - :oid: 1.4.3.2.1.2.5.4.4.4.5
40
+ # :short_name: anotherOIDName
41
+ def self.register_from_yaml(name, yaml_data)
42
+ conf = YAML.load(yaml_data)
43
+ self.batch_register(conf[name])
44
+ end
31
45
  end
32
46
  end
@@ -7,9 +7,19 @@ module R509
7
7
  class PrivateKey
8
8
  include R509::IOHelpers
9
9
 
10
- # @option opts [Symbol] :type :rsa/:dsa/:ec
11
- # @option opts [String] :curve_name ("secp384r1") Only used if :type is :ec
12
- # @option opts [Integer] :bit_strength (2048) Only used if :type is :rsa or :dsa.
10
+ # a list of key types
11
+ KNOWN_TYPES = ["RSA","DSA","EC"]
12
+ # the default type
13
+ DEFAULT_TYPE = "RSA"
14
+ # default bit length for DSA/RSA
15
+ DEFAULT_STRENGTH = 2048
16
+ # default curve name for EC
17
+ DEFAULT_CURVE = "secp384r1"
18
+
19
+ # @option opts [Symbol] :type Defaults to R509::PrivateKey::DEFAULT_TYPE. Allows R509::PrivateKey::KNOWN_TYPES.
20
+ # @option opts [String] :curve_name ("secp384r1") Only used if :type is EC
21
+ # @option opts [Integer] :bit_length (2048) Only used if :type is RSA or DSA
22
+ # @option opts [Integer] :bit_strength (2048) Deprecated, identical to bit_length.
13
23
  # @option opts [String] :password
14
24
  # @option opts [String,OpenSSL::PKey::RSA,OpenSSL::PKey::DSA,OpenSSL::PKey::EC] :key
15
25
  # @option opts [OpenSSL::Engine] :engine
@@ -18,53 +28,12 @@ module R509
18
28
  if not opts.kind_of?(Hash)
19
29
  raise ArgumentError, 'Must provide a hash of options'
20
30
  end
21
-
22
- if opts.has_key?(:engine) and opts.has_key?(:key)
23
- raise ArgumentError, 'You can\'t pass both :key and :engine'
24
- elsif opts.has_key?(:key_name) and not opts.has_key?(:engine)
25
- raise ArgumentError, 'When providing a :key_name you MUST provide an :engine'
26
- elsif opts.has_key?(:engine) and not opts.has_key?(:key_name)
27
- raise ArgumentError, 'When providing an :engine you MUST provide a :key_name'
28
- elsif opts.has_key?(:engine) and opts.has_key?(:key_name)
29
- if not opts[:engine].kind_of?(OpenSSL::Engine)
30
- raise ArgumentError, 'When providing an engine, it must be of type OpenSSL::Engine'
31
- end
32
- @engine = opts[:engine]
33
- @key_name = opts[:key_name]
34
- end
31
+ validate_engine(opts)
35
32
 
36
33
  if opts.has_key?(:key)
37
- password = opts[:password] || nil
38
- #OpenSSL::PKey.read solves this begin/rescue garbage but is only
39
- #available to Ruby 1.9.3+ and may not solve the EC portion
40
- begin
41
- @key = OpenSSL::PKey::RSA.new(opts[:key],password)
42
- rescue OpenSSL::PKey::RSAError
43
- begin
44
- @key = OpenSSL::PKey::DSA.new(opts[:key],password)
45
- rescue
46
- begin
47
- @key = OpenSSL::PKey::EC.new(opts[:key],password)
48
- rescue
49
- raise R509::R509Error, "Failed to load private key. Invalid key or incorrect password."
50
- end
51
- end
52
- end
34
+ validate_key(opts)
53
35
  else
54
- bit_strength = opts[:bit_strength] || 2048
55
- type = opts[:type] || :rsa
56
- case type
57
- when :rsa
58
- @key = OpenSSL::PKey::RSA.new(bit_strength)
59
- when :dsa
60
- @key = OpenSSL::PKey::DSA.new(bit_strength)
61
- when :ec
62
- curve_name = opts[:curve_name] || "secp384r1"
63
- @key = OpenSSL::PKey::EC.new(curve_name)
64
- @key.generate_key
65
- else
66
- raise ArgumentError, 'Must provide :rsa, :dsa , or :ec as type when key or engine is nil'
67
- end
36
+ generate_key(opts)
68
37
  end
69
38
  end
70
39
 
@@ -77,18 +46,19 @@ module R509
77
46
  end
78
47
 
79
48
 
80
- # Returns the bit strength of the key
49
+ # Returns the bit length of the key
81
50
  #
82
51
  # @return [Integer]
83
- def bit_strength
52
+ def bit_length
84
53
  if self.rsa?
85
54
  return self.public_key.n.num_bits
86
55
  elsif self.dsa?
87
56
  return self.public_key.p.num_bits
88
57
  elsif self.ec?
89
- raise R509::R509Error, 'Bit strength is not available for EC at this time.'
58
+ raise R509::R509Error, 'Bit length is not available for EC at this time.'
90
59
  end
91
60
  end
61
+ alias :bit_strength :bit_length
92
62
 
93
63
  # Returns the short name of the elliptic curve used to generate the private key
94
64
  # if the key is EC. If not, raises an error.
@@ -224,5 +194,59 @@ module R509
224
194
  def ec?
225
195
  self.key.kind_of?(OpenSSL::PKey::EC)
226
196
  end
197
+
198
+ private
199
+
200
+ def validate_engine(opts)
201
+ if opts.has_key?(:engine) and opts.has_key?(:key)
202
+ raise ArgumentError, 'You can\'t pass both :key and :engine'
203
+ elsif opts.has_key?(:key_name) and not opts.has_key?(:engine)
204
+ raise ArgumentError, 'When providing a :key_name you MUST provide an :engine'
205
+ elsif opts.has_key?(:engine) and not opts.has_key?(:key_name)
206
+ raise ArgumentError, 'When providing an :engine you MUST provide a :key_name'
207
+ elsif opts.has_key?(:engine) and opts.has_key?(:key_name)
208
+ if not opts[:engine].kind_of?(OpenSSL::Engine)
209
+ raise ArgumentError, 'When providing an engine, it must be of type OpenSSL::Engine'
210
+ end
211
+ @engine = opts[:engine]
212
+ @key_name = opts[:key_name]
213
+ end
214
+ end
215
+
216
+ def validate_key(opts)
217
+ password = opts[:password] || nil
218
+ #OpenSSL::PKey.read solves this begin/rescue garbage but is only
219
+ #available to Ruby 1.9.3+ and may not solve the EC portion
220
+ begin
221
+ @key = OpenSSL::PKey::RSA.new(opts[:key],password)
222
+ rescue OpenSSL::PKey::RSAError
223
+ begin
224
+ @key = OpenSSL::PKey::DSA.new(opts[:key],password)
225
+ rescue
226
+ begin
227
+ @key = OpenSSL::PKey::EC.new(opts[:key],password)
228
+ rescue
229
+ raise R509::R509Error, "Failed to load private key. Invalid key or incorrect password."
230
+ end
231
+ end
232
+ end
233
+ end
234
+
235
+ def generate_key(opts)
236
+ bit_length = opts[:bit_length] || opts[:bit_strength] || DEFAULT_STRENGTH
237
+ type = opts[:type] || DEFAULT_TYPE
238
+ case type.upcase
239
+ when "RSA"
240
+ @key = OpenSSL::PKey::RSA.new(bit_length)
241
+ when "DSA"
242
+ @key = OpenSSL::PKey::DSA.new(bit_length)
243
+ when "EC"
244
+ curve_name = opts[:curve_name] || DEFAULT_CURVE
245
+ @key = OpenSSL::PKey::EC.new(curve_name)
246
+ @key.generate_key
247
+ else
248
+ raise ArgumentError, "Must provide #{KNOWN_TYPES.join(", ")} as type when key or engine is nil"
249
+ end
250
+ end
227
251
  end
228
252
  end
@@ -1,11 +1,13 @@
1
1
  require 'openssl'
2
2
  require 'r509/exceptions'
3
3
  require 'r509/io_helpers'
4
+ require 'r509/helpers'
4
5
 
5
6
  module R509
6
7
  # class for loading/generating SPKAC/SPKI requests (typically generated by the <keygen> tag
7
8
  class SPKI
8
9
  include R509::IOHelpers
10
+ include R509::Helpers
9
11
 
10
12
  attr_reader :spki, :key
11
13
  # @option opts [String,OpenSSL::Netscape::SPKI] :spki the spki you want to parse
@@ -18,45 +20,13 @@ module R509
18
20
  raise ArgumentError, 'Must provide either :spki or :key'
19
21
  end
20
22
 
21
- if opts.has_key?(:key)
22
- if opts[:key].kind_of?(R509::PrivateKey)
23
- @key = opts[:key]
24
- else
25
- @key = R509::PrivateKey.new(:key => opts[:key])
26
- end
27
- end
23
+ @key = load_private_key(opts)
24
+
28
25
  if opts.has_key?(:spki)
29
- spki = opts[:spki]
30
- # first let's try cleaning up the input a bit so OpenSSL is happy with it
31
- # OpenSSL hates SPKAC=
32
- spki.sub!("SPKAC=","")
33
- # it really hates newlines (Firefox loves 'em)
34
- # so let's normalize line endings
35
- spki.gsub!(/\r\n?/, "\n")
36
- # and nuke 'em
37
- spki.gsub!("\n", "")
38
- # ...and leading/trailing whitespace
39
- spki.strip!
40
- @spki = OpenSSL::Netscape::SPKI.new(spki)
41
- if not @key.nil? and not @spki.verify(@key.public_key) then
42
- raise R509Error, 'Key does not match SPKI.'
43
- end
44
- end
26
+ @spki = parse_spki(opts[:spki])
27
+ else
45
28
  # create the SPKI from the private key if it wasn't passed in
46
- if @spki.nil?
47
- @spki = OpenSSL::Netscape::SPKI.new
48
- @spki.public_key = @key.public_key
49
- if @key.dsa?
50
- #only DSS1 is acceptable for DSA signing in OpenSSL < 1.0
51
- #post-1.0 you can sign with anything, but let's be conservative
52
- #see: http://www.ruby-doc.org/stdlib-1.9.3/libdoc/openssl/rdoc/OpenSSL/PKey/DSA.html
53
- message_digest = R509::MessageDigest.new('dss1')
54
- elsif opts.has_key?(:message_digest)
55
- message_digest = R509::MessageDigest.new(opts[:message_digest])
56
- else
57
- message_digest = R509::MessageDigest.new('sha1')
58
- end
59
- @spki.sign(@key.key,message_digest.digest)
29
+ @spki = build_spki(opts[:message_digest])
60
30
  end
61
31
  end
62
32
 
@@ -71,94 +41,61 @@ module R509
71
41
  @spki.verify(public_key)
72
42
  end
73
43
 
74
- # Converts the SPKI into the PEM format
75
- #
76
- # @return [String] the SPKI converted into PEM format.
77
- def to_pem
78
- @spki.to_pem
79
- end
80
-
81
44
  alias :to_s :to_pem
82
45
 
83
- # Converts the SPKI into the DER format
84
- #
85
- # @return [String] the SPKI converted into DER format.
86
- def to_der
87
- @spki.to_der
88
- end
89
-
90
- # Writes the SPKI into the PEM format
91
- #
92
- # @param [String, #write] filename_or_io Either a string of the path for
93
- # the file that you'd like to write, or an IO-like object.
94
- def write_pem(filename_or_io)
95
- write_data(filename_or_io, @spki.to_pem)
96
- end
97
-
98
- # Writes the SPKI into the DER format
46
+ # Returns the signature algorithm (e.g., RSA-SHA1, ecdsa-with-SHA256)
99
47
  #
100
- # @param [String, #write] filename_or_io Either a string of the path for
101
- # the file that you'd like to write, or an IO-like object.
102
- def write_der(filename_or_io)
103
- write_data(filename_or_io, @spki.to_der)
48
+ # @return [String] signature algorithm string
49
+ def signature_algorithm
50
+ data = OpenSSL::ASN1.decode(self.to_der)
51
+ return data.entries[1].value.entries[0].value
104
52
  end
105
53
 
106
- # Returns whether the public key is RSA
107
- #
108
- # @return [Boolean] true if the public key is RSA, false otherwise
109
- def rsa?
110
- @spki.public_key.kind_of?(OpenSSL::PKey::RSA)
111
- end
112
-
113
- # Returns whether the public key is DSA
114
- #
115
- # @return [Boolean] true if the public key is DSA, false otherwise
116
- def dsa?
117
- @spki.public_key.kind_of?(OpenSSL::PKey::DSA)
118
- end
119
-
120
- # Returns whether the public key is EC
121
- #
122
- # @return [Boolean] true if the public key is EC, false otherwise
123
- def ec?
124
- @spki.public_key.kind_of?(OpenSSL::PKey::EC)
125
- end
126
-
127
- # Returns the bit strength of the key used to create the SPKI
128
- # @return [Integer] the integer bit strength.
129
- def bit_strength
130
- if self.rsa?
131
- return @spki.public_key.n.num_bits
132
- elsif self.dsa?
133
- return @spki.public_key.p.num_bits
134
- elsif self.ec?
135
- raise R509::R509Error, 'Bit strength is not available for EC at this time.'
54
+ private
55
+
56
+ # Tries to clean and parse an inbound SPKI
57
+ # @param [String] spki string
58
+ # @return [OpenSSL::Netscape::SPKI] spki object
59
+ def parse_spki(spki)
60
+ # first let's try cleaning up the input a bit so OpenSSL is happy with it
61
+ # OpenSSL hates SPKAC=
62
+ spki.sub!("SPKAC=","")
63
+ # it really hates newlines (Firefox loves 'em)
64
+ # so let's normalize line endings
65
+ spki.gsub!(/\r\n?/, "\n")
66
+ # and nuke 'em
67
+ spki.gsub!("\n", "")
68
+ # ...and leading/trailing whitespace
69
+ spki.strip!
70
+ spki = OpenSSL::Netscape::SPKI.new(spki)
71
+ if not @key.nil? and not spki.verify(@key.public_key) then
72
+ raise R509Error, 'Key does not match SPKI.'
136
73
  end
74
+ return spki
137
75
  end
138
76
 
139
- # Returns the short name of the elliptic curve used to generate the public key
140
- # if the key is EC. If not, raises an error.
141
- #
142
- # @return [String] elliptic curve name
143
- def curve_name
144
- if self.ec?
145
- @spki.public_key.group.curve_name
77
+ # Tries to build an SPKI using an existing private key
78
+ # @param [String] md optional message digest
79
+ # @return [OpenSSL::Netscape::SPKI] spki object
80
+ def build_spki(md)
81
+ spki = OpenSSL::Netscape::SPKI.new
82
+ spki.public_key = @key.public_key
83
+ if @key.dsa?
84
+ #only DSS1 is acceptable for DSA signing in OpenSSL < 1.0
85
+ #post-1.0 you can sign with anything, but let's be conservative
86
+ #see: http://www.ruby-doc.org/stdlib-1.9.3/libdoc/openssl/rdoc/OpenSSL/PKey/DSA.html
87
+ message_digest = R509::MessageDigest.new('dss1')
146
88
  else
147
- raise R509::R509Error, 'Curve name is only available with EC SPKIs'
89
+ message_digest = R509::MessageDigest.new(md)
148
90
  end
91
+ spki.sign(@key.key,message_digest.digest)
92
+ return spki
149
93
  end
150
94
 
151
- # Returns key algorithm (RSA/DSA)
152
- #
153
- # @return [String] value of the key algorithm. RSA or DSA
154
- def key_algorithm
155
- if self.rsa?
156
- :rsa
157
- elsif self.dsa?
158
- :dsa
159
- elsif self.ec?
160
- :ec
161
- end
95
+ # Returns the proper instance variable
96
+ def internal_obj
97
+ @spki
162
98
  end
99
+
163
100
  end
164
101
  end
@@ -1,7 +1,7 @@
1
1
  require "openssl"
2
2
 
3
3
  module R509
4
- # subject class. Used for building OpenSSL::X509::Name objects in a sane fashion
4
+ # The primary subject class. Used for building subject DNs in a sane fashion.
5
5
  # @example
6
6
  # subject = R509::Subject.new
7
7
  # subject.CN= "test.test"
@@ -9,6 +9,8 @@ module R509
9
9
  # @example
10
10
  # subject = R509::Subject.new([['CN','test.test'],['O','r509 LLC']])
11
11
  # @example
12
+ # subject = R509::Subject.new(:CN => 'test.test', :O => 'r509 LLC')
13
+ # @example
12
14
  # # you can also use the friendly getter/setters with custom OIDs
13
15
  # R509::OIDMapper.register("1.2.3.4.5.6.7.8","COI","customOID")
14
16
  # subject = R509::Subject.new
@@ -18,10 +20,12 @@ module R509
18
20
  # # or
19
21
  # subject.custom_oid="test"
20
22
  class Subject
21
- # @param [Array, OpenSSL::X509::Name, R509::Subject, DER, nil] arg
23
+ # @param [Array, OpenSSL::X509::Name, R509::Subject, DER, Hash, nil] arg
22
24
  def initialize(arg=nil)
23
25
  if arg.kind_of?(Array)
24
26
  @array = arg
27
+ elsif arg.kind_of?(Hash)
28
+ @array = arg.map { |k,v| [k.to_s.upcase,v] }
25
29
  elsif arg.kind_of?(OpenSSL::X509::Name)
26
30
  sanitizer = R509::NameSanitizer.new
27
31
  @array = sanitizer.sanitize(arg)
@@ -97,6 +101,20 @@ module R509
97
101
  @array
98
102
  end
99
103
 
104
+ # @return [Hash]
105
+ def to_h
106
+ hash = {}
107
+ @array.each do |el|
108
+ hash[el[0].to_sym] = el[1]
109
+ end
110
+ hash
111
+ end
112
+
113
+ # @return [YAML]
114
+ def to_yaml
115
+ self.to_h.to_yaml
116
+ end
117
+
100
118
  # @private
101
119
  def respond_to?(method_sym, include_private = false)
102
120
  method_sym.to_s =~ /([^=]*)/
@@ -115,6 +133,10 @@ module R509
115
133
  # This code will also allow you to set subject items for custom oids
116
134
  # defined via R509::OIDMapper
117
135
  #
136
+ # @example
137
+ # subject = R509::Subject.new
138
+ # subject.CN = 'test' # method built via method missing.
139
+ #
118
140
  def method_missing(method_sym, *args, &block)
119
141
  if method_sym.to_s =~ /(.*)=$/
120
142
  sn = oid_check($1)