-
Notifications
You must be signed in to change notification settings - Fork 153
/
match.go
108 lines (97 loc) · 3.06 KB
/
match.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
// Copyright 2021 Anapaya Systems
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package certs
import (
"bytes"
"crypto/x509"
"fmt"
"os"
"strings"
"github.com/spf13/cobra"
"github.com/scionproto/scion/pkg/private/serrors"
"github.com/scionproto/scion/pkg/scrypto/cppki"
"github.com/scionproto/scion/private/app/command"
"github.com/scionproto/scion/scion-pki/key"
)
func newMatchCmd(pather command.Pather) *cobra.Command {
cmd := &cobra.Command{
Use: "match",
Short: "Match the certificate with other trust objects",
}
joined := command.Join(pather, cmd)
cmd.AddCommand(
newMatchPrivateKey(joined),
)
return cmd
}
func newMatchPrivateKey(pather command.Pather) *cobra.Command {
var flags struct {
separator string
}
cmd := &cobra.Command{
Use: "private <certificate> <private-key> [<private-key> ...]",
Short: "Find the matching private keys for the certificate",
Long: `'private' finds all the matching private keys for the certificate.
If the file contains a certificate chain, only the keys authenticated by the first
certificate in the chain are considered.
The output contains all the private keys that are authenticated by the certificate.
`,
Example: fmt.Sprintf(` %[1]s private ISD1-ASff00_0_110.pem cp-as.key
%[1]s private ISD1-ASff00_0_110.pem *.key`,
pather.CommandPath(),
),
Args: cobra.MinimumNArgs(2),
RunE: func(cmd *cobra.Command, args []string) error {
cmd.SilenceUsage = true
certs, err := cppki.ReadPEMCerts(args[0])
if err != nil {
return serrors.WrapStr("parsing certificate", err, "file", args[0])
}
certKey, err := x509.MarshalPKIXPublicKey(certs[0].PublicKey)
if err != nil {
return serrors.WrapStr("packing the certificate public key", err)
}
var keys []string
for _, file := range args[1:] {
key, err := loadPackedPublicFromPrivate(file)
if err != nil {
fmt.Fprintf(os.Stderr, "WARN: ignoring %q: %s\n", file, err)
continue
}
if !bytes.Equal(certKey, key) {
continue
}
keys = append(keys, file)
}
if len(keys) == 0 {
return serrors.New("no matching private key found")
}
fmt.Println(strings.Join(keys, flags.separator))
return nil
},
}
cmd.Flags().StringVar(&flags.separator, "separator", "\n", "The separator between file names")
return cmd
}
func loadPackedPublicFromPrivate(file string) ([]byte, error) {
key, err := key.LoadPrivateKey(file)
if err != nil {
return nil, err
}
pub, err := x509.MarshalPKIXPublicKey(key.Public())
if err != nil {
return nil, serrors.WrapStr("packing the public key", err)
}
return pub, nil
}