mirror of
https://github.com/samba-team/samba.git
synced 2025-01-07 17:18:11 +03:00
51569b3152
NOTE: THIS COMMIT WON'T COMPILE/WORK ON ITS OWN! BUG: https://bugzilla.samba.org/show_bug.cgi?id=14995 Signed-off-by: Joseph Sutton <josephsutton@catalyst.net.nz> Reviewed-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Andrew Bartlett <abartlet@samba.org>
179 lines
5.5 KiB
C
179 lines
5.5 KiB
C
#include "kdc_locl.h"
|
|
|
|
static int authorized_flag;
|
|
static int help_flag;
|
|
static char *lifetime_string;
|
|
static const char *app_string = "kdc";
|
|
static int version_flag;
|
|
|
|
struct getargs args[] = {
|
|
{ "authorized", 'A', arg_flag, &authorized_flag,
|
|
"Assume CSR is authorized", NULL },
|
|
{ "lifetime", 'l', arg_string, &lifetime_string,
|
|
"Certificate lifetime desired", "TIME" },
|
|
{ "help", 'h', arg_flag, &help_flag,
|
|
"Print usage message", NULL },
|
|
{ "app", 'a', arg_string, &app_string,
|
|
"Application name (kdc or bx509); default: kdc", "APPNAME" },
|
|
{ "version", 'v', arg_flag, &version_flag,
|
|
"Print version", NULL }
|
|
};
|
|
size_t num_args = sizeof(args) / sizeof(args[0]);
|
|
|
|
static int
|
|
usage(int e)
|
|
{
|
|
arg_printusage(args, num_args, NULL,
|
|
"PRINC PKCS10:/path/to/der/CSR [HX509-STORE]");
|
|
fprintf(stderr,
|
|
"\n\tTest kx509/bx509 online CA issuer functionality.\n"
|
|
"\n\tIf --authorized / -A not given, then authorizer plugins\n"
|
|
"\twill be invoked.\n"
|
|
"\n\tUse --app kdc to test the kx509 configuration.\n"
|
|
"\tUse --app bx509 to test the bx509 configuration.\n\n\t"
|
|
"Example: %s foo@TEST.H5L.SE PKCS10:/tmp/csr PEM-FILE:/tmp/cert\n",
|
|
getprogname());
|
|
exit(e);
|
|
return e;
|
|
}
|
|
|
|
static const char *sysplugin_dirs[] = {
|
|
#ifdef _WIN32
|
|
"$ORIGIN",
|
|
#else
|
|
"$ORIGIN/../lib/plugin/kdc",
|
|
#endif
|
|
#ifdef __APPLE__
|
|
LIBDIR "/plugin/kdc",
|
|
#endif
|
|
NULL
|
|
};
|
|
|
|
static void
|
|
load_plugins(krb5_context context)
|
|
{
|
|
const char * const *dirs = sysplugin_dirs;
|
|
#ifndef _WIN32
|
|
char **cfdirs;
|
|
|
|
cfdirs = krb5_config_get_strings(context, NULL, "kdc", "plugin_dir", NULL);
|
|
if (cfdirs)
|
|
dirs = (const char * const *)cfdirs;
|
|
#endif
|
|
|
|
_krb5_load_plugins(context, "kdc", (const char **)dirs);
|
|
|
|
#ifndef _WIN32
|
|
krb5_config_free_strings(cfdirs);
|
|
#endif
|
|
}
|
|
|
|
int
|
|
main(int argc, char **argv)
|
|
{
|
|
krb5_log_facility *logf = NULL;
|
|
krb5_error_code ret;
|
|
krb5_principal p = NULL;
|
|
krb5_context context;
|
|
krb5_times t;
|
|
hx509_request req = NULL;
|
|
hx509_certs store = NULL;
|
|
hx509_certs certs = NULL;
|
|
const char *argv0 = argv[0];
|
|
const char *out = "MEMORY:junk-it";
|
|
time_t req_life = 0;
|
|
int optidx = 0;
|
|
|
|
setprogname(argv[0]);
|
|
if (getarg(args, num_args, argc, argv, &optidx))
|
|
return usage(1);
|
|
if (help_flag)
|
|
return usage(0);
|
|
if (version_flag) {
|
|
print_version(argv[0]);
|
|
return 0;
|
|
}
|
|
|
|
argc -= optidx;
|
|
argv += optidx;
|
|
|
|
if (argc < 3 || argc > 4)
|
|
usage(1);
|
|
|
|
if ((errno = krb5_init_context(&context)))
|
|
err(1, "Could not initialize krb5_context");
|
|
if ((ret = krb5_initlog(context, argv0, &logf)) ||
|
|
(ret = krb5_addlog_dest(context, logf, "0-5/STDERR")))
|
|
krb5_err(context, 1, ret, "Could not set up logging to stderr");
|
|
load_plugins(context);
|
|
if ((ret = krb5_parse_name(context, argv[0], &p)))
|
|
krb5_err(context, 1, ret, "Could not parse principal %s", argv[0]);
|
|
if ((ret = hx509_request_parse(context->hx509ctx, argv[1], &req)))
|
|
krb5_err(context, 1, ret, "Could not parse PKCS#10 CSR from %s", argv[1]);
|
|
|
|
if (authorized_flag) {
|
|
KeyUsage ku = int2KeyUsage(0);
|
|
size_t i;
|
|
char *s;
|
|
|
|
/* Mark all the things authorized */
|
|
ku.digitalSignature = 1;
|
|
hx509_request_authorize_ku(req, ku);
|
|
|
|
for (i = 0; ret == 0; i++) {
|
|
ret = hx509_request_get_eku(req, i, &s);
|
|
free(s); s = NULL;
|
|
if (ret == 0)
|
|
hx509_request_authorize_eku(req, i);
|
|
}
|
|
if (ret == HX509_NO_ITEM)
|
|
ret = 0;
|
|
|
|
for (i = 0; ret == 0; i++) {
|
|
hx509_san_type san_type;
|
|
|
|
ret = hx509_request_get_san(req, i, &san_type, &s);
|
|
free(s); s = NULL;
|
|
if (ret == 0)
|
|
hx509_request_authorize_san(req, i);
|
|
}
|
|
if (ret && ret != HX509_NO_ITEM)
|
|
krb5_err(context, 1, ret,
|
|
"Failed to mark requested extensions authorized");
|
|
} else if ((ret = kdc_authorize_csr(context, app_string, req, p))) {
|
|
krb5_err(context, 1, ret,
|
|
"Requested certificate extensions rejected by policy");
|
|
}
|
|
|
|
memset(&t, 0, sizeof(t));
|
|
t.starttime = time(NULL);
|
|
t.endtime = t.starttime + 3600;
|
|
req_life = lifetime_string ? parse_time(lifetime_string, "day") : 0;
|
|
if ((ret = kdc_issue_certificate(context, app_string, logf, req, p, &t,
|
|
req_life, 1, &certs)))
|
|
krb5_err(context, 1, ret, "Certificate issuance failed");
|
|
|
|
if (argv[2])
|
|
out = argv[2];
|
|
|
|
if ((ret = hx509_certs_init(context->hx509ctx, out, HX509_CERTS_CREATE,
|
|
NULL, &store)) ||
|
|
(ret = hx509_certs_merge(context->hx509ctx, store, certs)) ||
|
|
(ret = hx509_certs_store(context->hx509ctx, store, 0, NULL)))
|
|
/*
|
|
* If the store is a MEMORY store, say, we're really not being asked to
|
|
* store -- we're just testing the online CA functionality without
|
|
* wanting to inspect the result.
|
|
*/
|
|
if (ret != HX509_UNSUPPORTED_OPERATION)
|
|
krb5_err(context, 1, ret,
|
|
"Could not store certificate and chain in %s", out);
|
|
_krb5_unload_plugins(context, "kdc");
|
|
krb5_free_principal(context, p);
|
|
krb5_free_context(context);
|
|
hx509_request_free(&req);
|
|
hx509_certs_free(&store);
|
|
hx509_certs_free(&certs);
|
|
return 0;
|
|
}
|