diff options
author | Rob Austein <sra@hactrn.net> | 2008-07-15 17:38:45 +0000 |
---|---|---|
committer | Rob Austein <sra@hactrn.net> | 2008-07-15 17:38:45 +0000 |
commit | 8f8a7ea81035f9230c2b27588cb1548279d938b8 (patch) | |
tree | e1dc812ab16793b7f5f36c4b4fb5f18197625de2 /rpkid/cross_certify.py | |
parent | 9d7bc8e2696d4616b5c73fe6f88d2e0c5dc9e545 (diff) |
Rename a couple of scripts whose names confuse Doxygen. Clean some of
the old test code out of rpkid/ to make real code easier to find.
svn path=/rpkid/Doxyfile; revision=1995
Diffstat (limited to 'rpkid/cross_certify.py')
-rw-r--r-- | rpkid/cross_certify.py | 108 |
1 files changed, 108 insertions, 0 deletions
diff --git a/rpkid/cross_certify.py b/rpkid/cross_certify.py new file mode 100644 index 00000000..88c5718f --- /dev/null +++ b/rpkid/cross_certify.py @@ -0,0 +1,108 @@ +""" +Cross-certification tool to issue a new certificate based on an old +one that was issued by somebody else. The point of the exercise is to +end up with a valid certificate in our own BPKI which has the same +subject name and subject public key as the one we're replacing. + +Much of this code lifted from rpki.x509.X509.issue(), but this is a +sufficiently different purpose that it's probably not worth +refactoring. + +Usage: python cross_certify.py { -i | --in } input_cert + { -c | --ca } issuing_cert + { -k | --key } issuing_cert_key + { -s | --serial } serial_filename + [ { -h | --help } ] + [ { -o | --out } filename (default: stdout) ] + [ { -l | --lifetime } timedelta (default: 30 days) ] + +$Id$ + +Copyright (C) 2007--2008 American Registry for Internet Numbers ("ARIN") + +Permission to use, copy, modify, and distribute this software for any +purpose with or without fee is hereby granted, provided that the above +copyright notice and this permission notice appear in all copies. + +THE SOFTWARE IS PROVIDED "AS IS" AND ARIN DISCLAIMS ALL WARRANTIES WITH +REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY +AND FITNESS. IN NO EVENT SHALL ARIN BE LIABLE FOR ANY SPECIAL, DIRECT, +INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM +LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE +OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR +PERFORMANCE OF THIS SOFTWARE. +""" + +import os, time, getopt, sys, POW +import rpki.x509, rpki.sundial + +os.environ["TZ"] = "UTC" +time.tzset() + +def usage(code): + print __doc__ + sys.exit(code) + +output = None +lifetime = rpki.sundial.timedelta(days = 30) + +opts,argv = getopt.getopt(sys.argv[1:], "h?i:o:c:k:s:l:", + ["help", "in=", "out=", "ca=", "key=", "serial=", "lifetime="]) +for o,a in opts: + if o in ("-h", "--help", "-?"): + usage(0) + elif o in ("-i", "--in"): + child = rpki.x509.X509(Auto_file = a) + elif o in ("-o", "--out"): + output = a + elif o in ("-c", "--ca"): + parent = rpki.x509.X509(Auto_file = a) + elif o in ("-k", "--key"): + keypair = rpki.x509.RSA(Auto_file = a) + elif o in ("-s", "--serial"): + serial_file = a + elif o in ("-l", "--lifetime"): + lifetime = rpki.sundial.timedelta.parse(a) +if argv: + usage(1) + +now = rpki.sundial.now() +notAfter = now + lifetime + +try: + f = open(serial_file, "r") + serial = f.read() + f.close() + serial = int(serial.splitlines()[0], 16) +except IOError: + serial = 1 + +x = POW.pkix.Certificate() +x.setVersion(2) +x.setSerial(serial) +x.setIssuer(parent.get_POWpkix().getSubject()) +x.setSubject(child.get_POWpkix().getSubject()) +x.setNotBefore(now.toASN1tuple()) +x.setNotAfter(notAfter.toASN1tuple()) +x.tbs.subjectPublicKeyInfo.set(child.get_POWpkix().tbs.subjectPublicKeyInfo.get()) +x.setExtensions(((rpki.oids.name2oid["subjectKeyIdentifier"], False, + child.get_SKI()), + (rpki.oids.name2oid["authorityKeyIdentifier"], False, + (parent.get_SKI(), (), None)), + (rpki.oids.name2oid["basicConstraints"], True, + (1, 0)))) +x.sign(keypair.get_POW(), POW.SHA256_DIGEST) + +cert = rpki.x509.X509(POWpkix = x) + +f = open(serial_file, "w") +f.write("%02x\n" % (serial + 1)) +f.close() + +if output is None: + print cert.get_PEM() +else: + f = open(output, "w") + f.write(cert.get_PEM()) + f.close() + |