1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
|
# $Id$
"""CMS routines.
For the moment these just call the OpenSSL CLI tool, which is slow,
requires disk I/O, and likes PEM format. Fix this later.
"""
import os, rpki.x509, rpki.exceptions, lxml.etree
debug = True
# openssl smime -sign -nodetach -outform DER -signer biz-certs/Alice-EE.cer
# -certfile biz-certs/Alice-CA.cer -inkey biz-certs/Alice-EE.key
# -in THING -out THING.der
def sign(plaintext, keypair, certs):
"""Sign plaintext as CMS with specified key and bag of certificates.
We have to sort the certificates into the correct order before the
OpenSSL CLI tool will accept them. rpki.x509 handles that for us.
"""
certs.chainsort()
signer_filename = "cms.tmp.signer.pem"
certfile_filename = "cms.tmp.certfile.pem"
plaintext_filename = "cms.tmp.plaintext"
f = open(signer_filename, "w")
f.write(certs[0].get_PEM())
f.close()
f = open(certfile_filename, "w")
for cert in certs[1:]:
f.write(cert.get_PEM())
f.close()
f = open(plaintext_filename, "w")
f.write(plaintext)
f.close()
i,o = os.popen2(("openssl", "smime", "-sign", "-nodetach", "-outform", "DER", "-binary",
"-signer", signer_filename,
"-certfile", certfile_filename, "-inkey", "/dev/stdin", "-in", plaintext_filename))
i.write(keypair.get_PEM())
i.close()
cms = o.read()
o.close()
os.unlink(signer_filename)
os.unlink(certfile_filename)
os.unlink(plaintext_filename)
return cms
# openssl smime -verify -inform DER -in THING.der -CAfile biz-certs/Alice-Root.cer
def verify(cms, ta):
"""Verify the signature of a chunk of CMS.
Returns the plaintext on success. If OpenSSL CLI tool reports
anything other than successful verification, we raise an exception.
"""
ta_filename = "cms.tmp.ta.pem"
f = open(ta_filename, "w")
f.write(ta.get_PEM())
f.close()
i,o,e = os.popen3(("openssl", "smime", "-verify", "-inform", "DER", "-binary", "-CAfile", ta_filename))
i.write(cms)
i.close()
plaintext = o.read()
o.close()
status = e.read()
e.close()
os.unlink(ta_filename)
if status == "Verification successful\n":
return plaintext
else:
if debug:
print "CMS verification failed, dumping inputs:"
print
print "TA:"
dumpasn1(ta.get_DER())
print
print "CMS:"
dumpasn1(cms)
raise rpki.exceptions.CMSVerificationFailed, "CMS verification failed with status %s" % status
def xml_verify(cms, ta):
"""Composite routine to verify CMS-wrapped XML."""
val = lxml.etree.fromstring(verify(cms, ta))
return val
def xml_sign(elt, key, certs, encoding = "us-ascii"):
"""Composite routine to sign CMS-wrapped XML."""
val = sign(lxml.etree.tostring(elt, pretty_print = True, encoding = encoding, xml_declaration = True),
key, certs)
return val
def dumpasn1(thing):
"""Prettyprint an ASN.1 DER object using cryptlib dumpasn1 tool.
Use a temporary file rather than popen4() because dumpasn1 uses
seek() when decoding ASN.1 content nested in OCTET STRING values.
"""
fn = "dumpasn1.tmp"
try:
f = open(fn, "w")
f.write(thing)
f.close()
f = os.popen("dumpasn1 2>&1 -a " + fn)
print "\n".join(x for x in f.read().splitlines() if x.startswith(" "))
f.close()
finally:
os.unlink(fn)
|