-
Notifications
You must be signed in to change notification settings - Fork 1.1k
/
https.go
49 lines (39 loc) · 1.46 KB
/
https.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
package certs
/*
Sliver Implant Framework
Copyright (C) 2019 Bishop Fox
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <https://www.gnu.org/licenses/>.
*/
import (
"crypto/rand"
"crypto/rsa"
)
const (
// HTTPSCA - Directory containing operator certificates
HTTPSCA = "https"
)
// HTTPSGenerateRSACertificate - Generate a server certificate signed with a given CA
func HTTPSGenerateRSACertificate(host string) ([]byte, []byte, error) {
certsLog.Debugf("Generating TLS certificate (RSA) for '%s' ...", host)
var privateKey interface{}
var err error
// Generate private key
privateKey, err = rsa.GenerateKey(rand.Reader, RSAKeySize)
if err != nil {
certsLog.Fatalf("Failed to generate private key %s", err)
return nil, nil, err
}
subject := randomSubject(host)
cert, key := generateCertificate(HTTPSCA, (*subject), false, false, privateKey)
err = saveCertificate(HTTPSCA, RSAKey, host, cert, key)
return cert, key, err
}