Merge pull request #5736 from akallabeth/makecert_cleanups
Cleaned up code for makecert.
This commit is contained in:
commit
d7e510016a
@ -107,7 +107,8 @@ static WCHAR* drive_file_combine_fullpath(const WCHAR* base_path, const WCHAR* p
|
||||
}
|
||||
|
||||
CopyMemory(fullpath, base_path, base_path_length);
|
||||
CopyMemory((char*)fullpath + base_path_length, path, PathLength);
|
||||
if (path)
|
||||
CopyMemory((char*)fullpath + base_path_length, path, PathLength);
|
||||
drive_file_fix_path(fullpath);
|
||||
return fullpath;
|
||||
}
|
||||
|
@ -879,7 +879,7 @@ static UINT drive_register_drive_path(PDEVICE_SERVICE_ENTRY_POINTS pEntryPoints,
|
||||
{
|
||||
size_t i, length;
|
||||
DRIVE_DEVICE* drive;
|
||||
UINT error;
|
||||
UINT error = ERROR_INTERNAL_ERROR;
|
||||
|
||||
if (!pEntryPoints || !name || !path)
|
||||
{
|
||||
|
@ -3278,7 +3278,7 @@ BOOL freerdp_client_load_addins(rdpChannels* channels, rdpSettings* settings)
|
||||
const char* drive = tok;
|
||||
char* start = strtok(tok, "(");
|
||||
char* end = strtok(NULL, ")");
|
||||
if (end)
|
||||
if (start && end)
|
||||
name = end;
|
||||
|
||||
if (freerdp_path_valid(name, NULL) && freerdp_path_valid(drive, NULL))
|
||||
|
@ -21,6 +21,7 @@
|
||||
|
||||
#include <winpr/crt.h>
|
||||
#include <winpr/path.h>
|
||||
#include <winpr/file.h>
|
||||
#include <winpr/cmdline.h>
|
||||
#include <winpr/sysinfo.h>
|
||||
#include <winpr/crypto.h>
|
||||
@ -66,150 +67,58 @@ struct _MAKECERT_CONTEXT
|
||||
int duration_months;
|
||||
};
|
||||
|
||||
static COMMAND_LINE_ARGUMENT_A args[] = {
|
||||
/* Custom Options */
|
||||
static char* makecert_read_str(BIO* bio, size_t* pOffset)
|
||||
{
|
||||
int status = -1;
|
||||
size_t offset = 0;
|
||||
size_t length = 0;
|
||||
char* x509_str = NULL;
|
||||
|
||||
{ "rdp", COMMAND_LINE_VALUE_FLAG, NULL, NULL, NULL, -1, NULL,
|
||||
"Unsupported - Generate certificate with required options for RDP usage." },
|
||||
{ "silent", COMMAND_LINE_VALUE_FLAG, NULL, NULL, NULL, -1, NULL,
|
||||
"Silently generate certificate without verbose output." },
|
||||
{ "live", COMMAND_LINE_VALUE_FLAG, NULL, NULL, NULL, -1, NULL,
|
||||
"Generate certificate live in memory when used as a library." },
|
||||
{ "format", COMMAND_LINE_VALUE_REQUIRED, "<crt|pem|pfx>", NULL, NULL, -1, NULL,
|
||||
"Specify certificate file format" },
|
||||
{ "path", COMMAND_LINE_VALUE_REQUIRED, "<path>", NULL, NULL, -1, NULL,
|
||||
"Specify certificate file output path" },
|
||||
{ "p", COMMAND_LINE_VALUE_REQUIRED, "<password>", NULL, NULL, -1, NULL,
|
||||
"Specify certificate export password" },
|
||||
while (offset >= length)
|
||||
{
|
||||
size_t new_len;
|
||||
char* new_str;
|
||||
new_len = length * 2;
|
||||
if (new_len == 0)
|
||||
new_len = 2048;
|
||||
new_str = (char*)realloc(x509_str, new_len);
|
||||
|
||||
/* Basic Options */
|
||||
if (!new_str || (new_len > INT_MAX))
|
||||
{
|
||||
status = -1;
|
||||
break;
|
||||
}
|
||||
|
||||
{ "n", COMMAND_LINE_VALUE_REQUIRED, "<name>", NULL, NULL, -1, NULL,
|
||||
"Specifies the subject's certificate name. This name must conform to the X.500 standard. "
|
||||
"The simplest method is to specify the name in double quotes, preceded by CN=; for example, "
|
||||
"-n \"CN=myName\"." },
|
||||
{ "pe", COMMAND_LINE_VALUE_FLAG, NULL, NULL, NULL, -1, NULL,
|
||||
"Unsupported - Marks the generated private key as exportable. This allows the private key to "
|
||||
"be included in the certificate." },
|
||||
{ "sk", COMMAND_LINE_VALUE_REQUIRED, "<keyname>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the subject's key container location, which contains the private "
|
||||
"key. "
|
||||
"If a key container does not exist, it will be created." },
|
||||
{ "sr", COMMAND_LINE_VALUE_REQUIRED, "<location>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the subject's certificate store location. location can be either "
|
||||
"currentuser (the default) or localmachine." },
|
||||
{ "ss", COMMAND_LINE_VALUE_REQUIRED, "<store>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the subject's certificate store name that stores the output "
|
||||
"certificate." },
|
||||
{ "#", COMMAND_LINE_VALUE_REQUIRED, "<number>", NULL, NULL, -1, NULL,
|
||||
"Specifies a serial number from 1 to 2,147,483,647. The default is a unique value generated "
|
||||
"by Makecert.exe." },
|
||||
{ "$", COMMAND_LINE_VALUE_REQUIRED, "<authority>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the signing authority of the certificate, which must be set to "
|
||||
"either commercial "
|
||||
"(for certificates used by commercial software publishers) or individual (for certificates "
|
||||
"used by individual software publishers)." },
|
||||
length = new_len;
|
||||
x509_str = new_str;
|
||||
status = BIO_read(bio, &x509_str[offset], (int)length - 1);
|
||||
|
||||
/* Extended Options */
|
||||
if (status < 0)
|
||||
break;
|
||||
|
||||
{ "a", COMMAND_LINE_VALUE_REQUIRED, "<algorithm>", NULL, NULL, -1, NULL,
|
||||
"Specifies the signature algorithm. algorithm must be md5, sha1, sha256 (the default), "
|
||||
"sha384, or sha512." },
|
||||
{ "b", COMMAND_LINE_VALUE_REQUIRED, "<mm/dd/yyyy>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the start of the validity period. Defaults to the current date." },
|
||||
{ "crl", COMMAND_LINE_VALUE_FLAG, NULL, NULL, NULL, -1, NULL,
|
||||
"Unsupported - Generates a certificate relocation list (CRL) instead of a certificate." },
|
||||
{ "cy", COMMAND_LINE_VALUE_REQUIRED, "<certType>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the certificate type. Valid values are end for end-entity and "
|
||||
"authority for certification authority." },
|
||||
{ "e", COMMAND_LINE_VALUE_REQUIRED, "<mm/dd/yyyy>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the end of the validity period. Defaults to 12/31/2039 11:59:59 "
|
||||
"GMT." },
|
||||
{ "eku", COMMAND_LINE_VALUE_REQUIRED, "<oid[,oid…]>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Inserts a list of comma-separated, enhanced key usage object identifiers "
|
||||
"(OIDs) into the certificate." },
|
||||
{ "h", COMMAND_LINE_VALUE_REQUIRED, "<number>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the maximum height of the tree below this certificate." },
|
||||
{ "ic", COMMAND_LINE_VALUE_REQUIRED, "<file>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the issuer's certificate file." },
|
||||
{ "ik", COMMAND_LINE_VALUE_REQUIRED, "<keyName>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the issuer's key container name." },
|
||||
{ "iky", COMMAND_LINE_VALUE_REQUIRED, "<keyType>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the issuer's key type, which must be one of the following: "
|
||||
"signature (which indicates that the key is used for a digital signature), "
|
||||
"exchange (which indicates that the key is used for key encryption and key exchange), "
|
||||
"or an integer that represents a provider type. "
|
||||
"By default, you can pass 1 for an exchange key or 2 for a signature key." },
|
||||
{ "in", COMMAND_LINE_VALUE_REQUIRED, "<name>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the issuer's certificate common name." },
|
||||
{ "ip", COMMAND_LINE_VALUE_REQUIRED, "<provider>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the issuer's CryptoAPI provider name. For information about the "
|
||||
"CryptoAPI provider name, see the –sp option." },
|
||||
{ "ir", COMMAND_LINE_VALUE_REQUIRED, "<location>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the location of the issuer's certificate store. location can be "
|
||||
"either currentuser (the default) or localmachine." },
|
||||
{ "is", COMMAND_LINE_VALUE_REQUIRED, "<store>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the issuer's certificate store name." },
|
||||
{ "iv", COMMAND_LINE_VALUE_REQUIRED, "<pvkFile>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the issuer's .pvk private key file." },
|
||||
{ "iy", COMMAND_LINE_VALUE_REQUIRED, "<type>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the issuer's CryptoAPI provider type. For information about the "
|
||||
"CryptoAPI provider type, see the –sy option." },
|
||||
{ "l", COMMAND_LINE_VALUE_REQUIRED, "<link>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Links to policy information (for example, to a URL)." },
|
||||
{ "len", COMMAND_LINE_VALUE_REQUIRED, "<number>", NULL, NULL, -1, NULL,
|
||||
"Specifies the generated key length, in bits." },
|
||||
{ "m", COMMAND_LINE_VALUE_REQUIRED, "<number>", NULL, NULL, -1, NULL,
|
||||
"Specifies the duration, in months, of the certificate validity period." },
|
||||
{ "y", COMMAND_LINE_VALUE_REQUIRED, "<number>", NULL, NULL, -1, NULL,
|
||||
"Specifies the duration, in years, of the certificate validity period." },
|
||||
{ "nscp", COMMAND_LINE_VALUE_FLAG, NULL, NULL, NULL, -1, NULL,
|
||||
"Unsupported - Includes the Netscape client-authorization extension." },
|
||||
{ "r", COMMAND_LINE_VALUE_FLAG, NULL, NULL, NULL, -1, NULL,
|
||||
"Unsupported - Creates a self-signed certificate." },
|
||||
{ "sc", COMMAND_LINE_VALUE_REQUIRED, "<file>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the subject's certificate file." },
|
||||
{ "sky", COMMAND_LINE_VALUE_REQUIRED, "<keyType>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the subject's key type, which must be one of the following: "
|
||||
"signature (which indicates that the key is used for a digital signature), "
|
||||
"exchange (which indicates that the key is used for key encryption and key exchange), "
|
||||
"or an integer that represents a provider type. "
|
||||
"By default, you can pass 1 for an exchange key or 2 for a signature key." },
|
||||
{ "sp", COMMAND_LINE_VALUE_REQUIRED, "<provider>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the subject's CryptoAPI provider name, which must be defined in the "
|
||||
"registry subkeys of "
|
||||
"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Cryptography\\Defaults\\Provider. If both –sp and "
|
||||
"–sy are present, "
|
||||
"the type of the CryptoAPI provider must correspond to the Type value of the provider's "
|
||||
"subkey." },
|
||||
{ "sv", COMMAND_LINE_VALUE_REQUIRED, "<pvkFile>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the subject's .pvk private key file. The file is created if none "
|
||||
"exists." },
|
||||
{ "sy", COMMAND_LINE_VALUE_REQUIRED, "<type>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the subject's CryptoAPI provider type, which must be defined in the "
|
||||
"registry subkeys of "
|
||||
"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Cryptography\\Defaults\\Provider Types. If both "
|
||||
"–sy and –sp are present, "
|
||||
"the name of the CryptoAPI provider must correspond to the Name value of the provider type "
|
||||
"subkey." },
|
||||
{ "tbs", COMMAND_LINE_VALUE_REQUIRED, "<file>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the certificate or CRL file to be signed." },
|
||||
offset += (size_t)status;
|
||||
}
|
||||
|
||||
/* Help */
|
||||
if (status < 0)
|
||||
{
|
||||
free(x509_str);
|
||||
if (pOffset)
|
||||
*pOffset = 0;
|
||||
return NULL;
|
||||
}
|
||||
|
||||
{ "?", COMMAND_LINE_VALUE_FLAG | COMMAND_LINE_PRINT_HELP, NULL, NULL, NULL, -1, "help",
|
||||
"print help" },
|
||||
{ "!", COMMAND_LINE_VALUE_FLAG | COMMAND_LINE_PRINT_HELP, NULL, NULL, NULL, -1, "help-ext",
|
||||
"print extended help" },
|
||||
{ NULL, 0, NULL, NULL, NULL, -1, NULL, NULL }
|
||||
};
|
||||
x509_str[offset] = '\0';
|
||||
if (pOffset)
|
||||
*pOffset = offset + 1;
|
||||
return x509_str;
|
||||
}
|
||||
|
||||
static int makecert_print_command_line_help(int argc, char** argv)
|
||||
static int makecert_print_command_line_help(COMMAND_LINE_ARGUMENT_A* args, int argc, char** argv)
|
||||
{
|
||||
char* str;
|
||||
COMMAND_LINE_ARGUMENT_A* arg;
|
||||
|
||||
if (!argv)
|
||||
if (!argv || (argc < 1))
|
||||
return -1;
|
||||
|
||||
printf("Usage: %s [options] [output file]\n", argv[0]);
|
||||
@ -262,8 +171,7 @@ static int x509_add_ext(X509* cert, int nid, char* value)
|
||||
if (!cert || !value)
|
||||
return 0;
|
||||
|
||||
X509V3_set_ctx_nodb(&ctx);
|
||||
X509V3_set_ctx(&ctx, cert, cert, NULL, NULL, 0);
|
||||
X509V3_set_ctx_nodb(&ctx) X509V3_set_ctx(&ctx, cert, cert, NULL, NULL, 0);
|
||||
ext = X509V3_EXT_conf_nid(NULL, &ctx, nid, value);
|
||||
|
||||
if (!ext)
|
||||
@ -275,7 +183,7 @@ static int x509_add_ext(X509* cert, int nid, char* value)
|
||||
}
|
||||
#endif
|
||||
|
||||
static char* x509_name_parse(char* name, char* txt, int* length)
|
||||
static char* x509_name_parse(char* name, char* txt, size_t* length)
|
||||
{
|
||||
char* p;
|
||||
char* entry;
|
||||
@ -294,7 +202,7 @@ static char* x509_name_parse(char* name, char* txt, int* length)
|
||||
if (!p)
|
||||
*length = strlen(entry);
|
||||
else
|
||||
*length = p - entry;
|
||||
*length = (size_t)(p - entry);
|
||||
|
||||
return entry;
|
||||
}
|
||||
@ -359,7 +267,8 @@ static int command_line_pre_filter(MAKECERT_CONTEXT* context, int index, int arg
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int makecert_context_parse_arguments(MAKECERT_CONTEXT* context, int argc, char** argv)
|
||||
static int makecert_context_parse_arguments(MAKECERT_CONTEXT* context,
|
||||
COMMAND_LINE_ARGUMENT_A* args, int argc, char** argv)
|
||||
{
|
||||
int status;
|
||||
DWORD flags;
|
||||
@ -380,7 +289,7 @@ static int makecert_context_parse_arguments(MAKECERT_CONTEXT* context, int argc,
|
||||
|
||||
if (status & COMMAND_LINE_STATUS_PRINT_HELP)
|
||||
{
|
||||
makecert_print_command_line_help(argc, argv);
|
||||
makecert_print_command_line_help(args, argc, argv);
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -470,7 +379,7 @@ static int makecert_context_parse_arguments(MAKECERT_CONTEXT* context, int argc,
|
||||
if ((errno != 0) || (val < 0) || (val > INT32_MAX))
|
||||
return -1;
|
||||
|
||||
context->duration_years = strtol(arg->Value, NULL, 0);
|
||||
context->duration_years = (int)val;
|
||||
}
|
||||
CommandLineSwitchCase(arg, "m")
|
||||
{
|
||||
@ -484,7 +393,7 @@ static int makecert_context_parse_arguments(MAKECERT_CONTEXT* context, int argc,
|
||||
if ((errno != 0) || (val < 1) || (val > 12))
|
||||
return -1;
|
||||
|
||||
context->duration_months = val;
|
||||
context->duration_months = (int)val;
|
||||
}
|
||||
CommandLineSwitchDefault(arg)
|
||||
{
|
||||
@ -517,14 +426,14 @@ int makecert_context_output_certificate_file(MAKECERT_CONTEXT* context, char* pa
|
||||
#ifdef WITH_OPENSSL
|
||||
FILE* fp = NULL;
|
||||
int status;
|
||||
int length;
|
||||
int offset;
|
||||
size_t length;
|
||||
size_t offset;
|
||||
char* filename = NULL;
|
||||
char* fullpath = NULL;
|
||||
char* ext;
|
||||
int ret = -1;
|
||||
BIO* bio = NULL;
|
||||
BYTE* x509_str = NULL;
|
||||
char* x509_str = NULL;
|
||||
|
||||
if (!context || !path)
|
||||
return -1;
|
||||
@ -606,46 +515,11 @@ int makecert_context_output_certificate_file(MAKECERT_CONTEXT* context, char* pa
|
||||
if (status != 1)
|
||||
goto out_fail;
|
||||
|
||||
offset = 0;
|
||||
length = 2048;
|
||||
x509_str = (BYTE*)malloc(length);
|
||||
x509_str = makecert_read_str(bio, &offset);
|
||||
|
||||
if (!x509_str)
|
||||
goto out_fail;
|
||||
|
||||
status = BIO_read(bio, x509_str, length);
|
||||
|
||||
if (status < 0)
|
||||
goto out_fail;
|
||||
|
||||
offset += status;
|
||||
|
||||
while (offset >= length)
|
||||
{
|
||||
int new_len;
|
||||
BYTE* new_str;
|
||||
new_len = length * 2;
|
||||
new_str = (BYTE*)realloc(x509_str, new_len);
|
||||
|
||||
if (!new_str)
|
||||
{
|
||||
status = -1;
|
||||
break;
|
||||
}
|
||||
|
||||
length = new_len;
|
||||
x509_str = new_str;
|
||||
status = BIO_read(bio, &x509_str[offset], length);
|
||||
|
||||
if (status < 0)
|
||||
break;
|
||||
|
||||
offset += status;
|
||||
}
|
||||
|
||||
if (status < 0)
|
||||
goto out_fail;
|
||||
|
||||
length = offset;
|
||||
|
||||
if (fwrite((void*)x509_str, length, 1, fp) != 1)
|
||||
@ -661,49 +535,14 @@ int makecert_context_output_certificate_file(MAKECERT_CONTEXT* context, char* pa
|
||||
if (!PEM_write_bio_X509(bio, context->x509))
|
||||
goto out_fail;
|
||||
|
||||
offset = 0;
|
||||
length = 2048;
|
||||
x509_str = (BYTE*)malloc(length);
|
||||
x509_str = makecert_read_str(bio, &offset);
|
||||
|
||||
if (!x509_str)
|
||||
goto out_fail;
|
||||
|
||||
status = BIO_read(bio, x509_str, length);
|
||||
|
||||
if (status < 0)
|
||||
goto out_fail;
|
||||
|
||||
offset += status;
|
||||
|
||||
while (offset >= length)
|
||||
{
|
||||
int new_len;
|
||||
BYTE* new_str;
|
||||
new_len = length * 2;
|
||||
new_str = (BYTE*)realloc(x509_str, new_len);
|
||||
|
||||
if (!new_str)
|
||||
{
|
||||
status = -1;
|
||||
break;
|
||||
}
|
||||
|
||||
length = new_len;
|
||||
x509_str = new_str;
|
||||
status = BIO_read(bio, &x509_str[offset], length);
|
||||
|
||||
if (status < 0)
|
||||
break;
|
||||
|
||||
offset += status;
|
||||
}
|
||||
|
||||
if (status < 0)
|
||||
goto out_fail;
|
||||
|
||||
length = offset;
|
||||
|
||||
if (fwrite((void*)x509_str, length, 1, fp) != 1)
|
||||
if (fwrite(x509_str, length, 1, fp) != 1)
|
||||
goto out_fail;
|
||||
|
||||
free(x509_str);
|
||||
@ -723,43 +562,8 @@ int makecert_context_output_certificate_file(MAKECERT_CONTEXT* context, char* pa
|
||||
if (status < 0)
|
||||
goto out_fail;
|
||||
|
||||
offset = 0;
|
||||
length = 2048;
|
||||
|
||||
if (!(x509_str = (BYTE*)malloc(length)))
|
||||
goto out_fail;
|
||||
|
||||
status = BIO_read(bio, x509_str, length);
|
||||
|
||||
if (status < 0)
|
||||
goto out_fail;
|
||||
|
||||
offset += status;
|
||||
|
||||
while (offset >= length)
|
||||
{
|
||||
int new_len;
|
||||
BYTE* new_str;
|
||||
new_len = length * 2;
|
||||
new_str = (BYTE*)realloc(x509_str, new_len);
|
||||
|
||||
if (!new_str)
|
||||
{
|
||||
status = -1;
|
||||
break;
|
||||
}
|
||||
|
||||
length = new_len;
|
||||
x509_str = new_str;
|
||||
status = BIO_read(bio, &x509_str[offset], length);
|
||||
|
||||
if (status < 0)
|
||||
break;
|
||||
|
||||
offset += status;
|
||||
}
|
||||
|
||||
if (status < 0)
|
||||
x509_str = makecert_read_str(bio, &offset);
|
||||
if (x509_str)
|
||||
goto out_fail;
|
||||
|
||||
length = offset;
|
||||
@ -790,14 +594,13 @@ int makecert_context_output_private_key_file(MAKECERT_CONTEXT* context, char* pa
|
||||
{
|
||||
#ifdef WITH_OPENSSL
|
||||
FILE* fp = NULL;
|
||||
int status;
|
||||
int length;
|
||||
int offset;
|
||||
size_t length;
|
||||
size_t offset;
|
||||
char* filename = NULL;
|
||||
char* fullpath = NULL;
|
||||
int ret = -1;
|
||||
BIO* bio = NULL;
|
||||
BYTE* x509_str = NULL;
|
||||
char* x509_str = NULL;
|
||||
|
||||
if (!context->crtFormat)
|
||||
return 1;
|
||||
@ -842,46 +645,11 @@ int makecert_context_output_private_key_file(MAKECERT_CONTEXT* context, char* pa
|
||||
if (!PEM_write_bio_PrivateKey(bio, context->pkey, NULL, NULL, 0, NULL, NULL))
|
||||
goto out_fail;
|
||||
|
||||
offset = 0;
|
||||
length = 2048;
|
||||
x509_str = (BYTE*)malloc(length);
|
||||
x509_str = makecert_read_str(bio, &offset);
|
||||
|
||||
if (!x509_str)
|
||||
goto out_fail;
|
||||
|
||||
status = BIO_read(bio, x509_str, length);
|
||||
|
||||
if (status < 0)
|
||||
goto out_fail;
|
||||
|
||||
offset += status;
|
||||
|
||||
while (offset >= length)
|
||||
{
|
||||
int new_len;
|
||||
BYTE* new_str;
|
||||
new_len = length * 2;
|
||||
new_str = (BYTE*)realloc(x509_str, new_len);
|
||||
|
||||
if (!new_str)
|
||||
{
|
||||
status = -1;
|
||||
break;
|
||||
}
|
||||
|
||||
length = new_len;
|
||||
x509_str = new_str;
|
||||
status = BIO_read(bio, &x509_str[offset], length);
|
||||
|
||||
if (status < 0)
|
||||
break;
|
||||
|
||||
offset += status;
|
||||
}
|
||||
|
||||
if (status < 0)
|
||||
goto out_fail;
|
||||
|
||||
length = offset;
|
||||
|
||||
if (fwrite((void*)x509_str, length, 1, fp) != 1)
|
||||
@ -905,16 +673,166 @@ out_fail:
|
||||
|
||||
int makecert_context_process(MAKECERT_CONTEXT* context, int argc, char** argv)
|
||||
{
|
||||
COMMAND_LINE_ARGUMENT_A args[] = {
|
||||
/* Custom Options */
|
||||
|
||||
{ "rdp", COMMAND_LINE_VALUE_FLAG, NULL, NULL, NULL, -1, NULL,
|
||||
"Unsupported - Generate certificate with required options for RDP usage." },
|
||||
{ "silent", COMMAND_LINE_VALUE_FLAG, NULL, NULL, NULL, -1, NULL,
|
||||
"Silently generate certificate without verbose output." },
|
||||
{ "live", COMMAND_LINE_VALUE_FLAG, NULL, NULL, NULL, -1, NULL,
|
||||
"Generate certificate live in memory when used as a library." },
|
||||
{ "format", COMMAND_LINE_VALUE_REQUIRED, "<crt|pem|pfx>", NULL, NULL, -1, NULL,
|
||||
"Specify certificate file format" },
|
||||
{ "path", COMMAND_LINE_VALUE_REQUIRED, "<path>", NULL, NULL, -1, NULL,
|
||||
"Specify certificate file output path" },
|
||||
{ "p", COMMAND_LINE_VALUE_REQUIRED, "<password>", NULL, NULL, -1, NULL,
|
||||
"Specify certificate export password" },
|
||||
|
||||
/* Basic Options */
|
||||
|
||||
{ "n", COMMAND_LINE_VALUE_REQUIRED, "<name>", NULL, NULL, -1, NULL,
|
||||
"Specifies the subject's certificate name. This name must conform to the X.500 standard. "
|
||||
"The simplest method is to specify the name in double quotes, preceded by CN=; for "
|
||||
"example, "
|
||||
"-n \"CN=myName\"." },
|
||||
{ "pe", COMMAND_LINE_VALUE_FLAG, NULL, NULL, NULL, -1, NULL,
|
||||
"Unsupported - Marks the generated private key as exportable. This allows the private "
|
||||
"key to "
|
||||
"be included in the certificate." },
|
||||
{ "sk", COMMAND_LINE_VALUE_REQUIRED, "<keyname>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the subject's key container location, which contains the "
|
||||
"private "
|
||||
"key. "
|
||||
"If a key container does not exist, it will be created." },
|
||||
{ "sr", COMMAND_LINE_VALUE_REQUIRED, "<location>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the subject's certificate store location. location can be "
|
||||
"either "
|
||||
"currentuser (the default) or localmachine." },
|
||||
{ "ss", COMMAND_LINE_VALUE_REQUIRED, "<store>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the subject's certificate store name that stores the output "
|
||||
"certificate." },
|
||||
{ "#", COMMAND_LINE_VALUE_REQUIRED, "<number>", NULL, NULL, -1, NULL,
|
||||
"Specifies a serial number from 1 to 2,147,483,647. The default is a unique value "
|
||||
"generated "
|
||||
"by Makecert.exe." },
|
||||
{ "$", COMMAND_LINE_VALUE_REQUIRED, "<authority>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the signing authority of the certificate, which must be set to "
|
||||
"either commercial "
|
||||
"(for certificates used by commercial software publishers) or individual (for "
|
||||
"certificates "
|
||||
"used by individual software publishers)." },
|
||||
|
||||
/* Extended Options */
|
||||
|
||||
{ "a", COMMAND_LINE_VALUE_REQUIRED, "<algorithm>", NULL, NULL, -1, NULL,
|
||||
"Specifies the signature algorithm. algorithm must be md5, sha1, sha256 (the default), "
|
||||
"sha384, or sha512." },
|
||||
{ "b", COMMAND_LINE_VALUE_REQUIRED, "<mm/dd/yyyy>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the start of the validity period. Defaults to the current "
|
||||
"date." },
|
||||
{ "crl", COMMAND_LINE_VALUE_FLAG, NULL, NULL, NULL, -1, NULL,
|
||||
"Unsupported - Generates a certificate relocation list (CRL) instead of a certificate." },
|
||||
{ "cy", COMMAND_LINE_VALUE_REQUIRED, "<certType>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the certificate type. Valid values are end for end-entity and "
|
||||
"authority for certification authority." },
|
||||
{ "e", COMMAND_LINE_VALUE_REQUIRED, "<mm/dd/yyyy>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the end of the validity period. Defaults to 12/31/2039 11:59:59 "
|
||||
"GMT." },
|
||||
{ "eku", COMMAND_LINE_VALUE_REQUIRED, "<oid[,oid…]>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Inserts a list of comma-separated, enhanced key usage object identifiers "
|
||||
"(OIDs) into the certificate." },
|
||||
{ "h", COMMAND_LINE_VALUE_REQUIRED, "<number>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the maximum height of the tree below this certificate." },
|
||||
{ "ic", COMMAND_LINE_VALUE_REQUIRED, "<file>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the issuer's certificate file." },
|
||||
{ "ik", COMMAND_LINE_VALUE_REQUIRED, "<keyName>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the issuer's key container name." },
|
||||
{ "iky", COMMAND_LINE_VALUE_REQUIRED, "<keyType>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the issuer's key type, which must be one of the following: "
|
||||
"signature (which indicates that the key is used for a digital signature), "
|
||||
"exchange (which indicates that the key is used for key encryption and key exchange), "
|
||||
"or an integer that represents a provider type. "
|
||||
"By default, you can pass 1 for an exchange key or 2 for a signature key." },
|
||||
{ "in", COMMAND_LINE_VALUE_REQUIRED, "<name>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the issuer's certificate common name." },
|
||||
{ "ip", COMMAND_LINE_VALUE_REQUIRED, "<provider>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the issuer's CryptoAPI provider name. For information about the "
|
||||
"CryptoAPI provider name, see the –sp option." },
|
||||
{ "ir", COMMAND_LINE_VALUE_REQUIRED, "<location>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the location of the issuer's certificate store. location can be "
|
||||
"either currentuser (the default) or localmachine." },
|
||||
{ "is", COMMAND_LINE_VALUE_REQUIRED, "<store>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the issuer's certificate store name." },
|
||||
{ "iv", COMMAND_LINE_VALUE_REQUIRED, "<pvkFile>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the issuer's .pvk private key file." },
|
||||
{ "iy", COMMAND_LINE_VALUE_REQUIRED, "<type>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the issuer's CryptoAPI provider type. For information about the "
|
||||
"CryptoAPI provider type, see the –sy option." },
|
||||
{ "l", COMMAND_LINE_VALUE_REQUIRED, "<link>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Links to policy information (for example, to a URL)." },
|
||||
{ "len", COMMAND_LINE_VALUE_REQUIRED, "<number>", NULL, NULL, -1, NULL,
|
||||
"Specifies the generated key length, in bits." },
|
||||
{ "m", COMMAND_LINE_VALUE_REQUIRED, "<number>", NULL, NULL, -1, NULL,
|
||||
"Specifies the duration, in months, of the certificate validity period." },
|
||||
{ "y", COMMAND_LINE_VALUE_REQUIRED, "<number>", NULL, NULL, -1, NULL,
|
||||
"Specifies the duration, in years, of the certificate validity period." },
|
||||
{ "nscp", COMMAND_LINE_VALUE_FLAG, NULL, NULL, NULL, -1, NULL,
|
||||
"Unsupported - Includes the Netscape client-authorization extension." },
|
||||
{ "r", COMMAND_LINE_VALUE_FLAG, NULL, NULL, NULL, -1, NULL,
|
||||
"Unsupported - Creates a self-signed certificate." },
|
||||
{ "sc", COMMAND_LINE_VALUE_REQUIRED, "<file>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the subject's certificate file." },
|
||||
{ "sky", COMMAND_LINE_VALUE_REQUIRED, "<keyType>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the subject's key type, which must be one of the following: "
|
||||
"signature (which indicates that the key is used for a digital signature), "
|
||||
"exchange (which indicates that the key is used for key encryption and key exchange), "
|
||||
"or an integer that represents a provider type. "
|
||||
"By default, you can pass 1 for an exchange key or 2 for a signature key." },
|
||||
{ "sp", COMMAND_LINE_VALUE_REQUIRED, "<provider>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the subject's CryptoAPI provider name, which must be defined in "
|
||||
"the "
|
||||
"registry subkeys of "
|
||||
"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Cryptography\\Defaults\\Provider. If both –sp "
|
||||
"and "
|
||||
"–sy are present, "
|
||||
"the type of the CryptoAPI provider must correspond to the Type value of the provider's "
|
||||
"subkey." },
|
||||
{ "sv", COMMAND_LINE_VALUE_REQUIRED, "<pvkFile>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the subject's .pvk private key file. The file is created if "
|
||||
"none "
|
||||
"exists." },
|
||||
{ "sy", COMMAND_LINE_VALUE_REQUIRED, "<type>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the subject's CryptoAPI provider type, which must be defined in "
|
||||
"the "
|
||||
"registry subkeys of "
|
||||
"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Cryptography\\Defaults\\Provider Types. If "
|
||||
"both "
|
||||
"–sy and –sp are present, "
|
||||
"the name of the CryptoAPI provider must correspond to the Name value of the provider "
|
||||
"type "
|
||||
"subkey." },
|
||||
{ "tbs", COMMAND_LINE_VALUE_REQUIRED, "<file>", NULL, NULL, -1, NULL,
|
||||
"Unsupported - Specifies the certificate or CRL file to be signed." },
|
||||
|
||||
/* Help */
|
||||
|
||||
{ "?", COMMAND_LINE_VALUE_FLAG | COMMAND_LINE_PRINT_HELP, NULL, NULL, NULL, -1, "help",
|
||||
"print help" },
|
||||
{ "!", COMMAND_LINE_VALUE_FLAG | COMMAND_LINE_PRINT_HELP, NULL, NULL, NULL, -1, "help-ext",
|
||||
"print extended help" },
|
||||
{ NULL, 0, NULL, NULL, NULL, -1, NULL, NULL }
|
||||
};
|
||||
#ifdef WITH_OPENSSL
|
||||
int length;
|
||||
size_t length;
|
||||
char* entry;
|
||||
unsigned long key_length;
|
||||
int key_length;
|
||||
long serial = 0;
|
||||
X509_NAME* name = NULL;
|
||||
const EVP_MD* md = NULL;
|
||||
COMMAND_LINE_ARGUMENT_A* arg;
|
||||
int ret;
|
||||
ret = makecert_context_parse_arguments(context, argc, argv);
|
||||
ret = makecert_context_parse_arguments(context, args, argc, argv);
|
||||
|
||||
if (ret < 1)
|
||||
{
|
||||
@ -961,10 +879,11 @@ int makecert_context_process(MAKECERT_CONTEXT* context, int argc, char** argv)
|
||||
|
||||
if (arg->Flags & COMMAND_LINE_VALUE_PRESENT)
|
||||
{
|
||||
key_length = strtoul(arg->Value, NULL, 0);
|
||||
unsigned long val = strtoul(arg->Value, NULL, 0);
|
||||
|
||||
if (errno != 0)
|
||||
if ((errno != 0) || (val > INT_MAX))
|
||||
return -1;
|
||||
key_length = (int)val;
|
||||
}
|
||||
|
||||
#if (OPENSSL_VERSION_NUMBER < 0x10100000L) || defined(LIBRESSL_VERSION_NUMBER)
|
||||
@ -1039,43 +958,43 @@ int makecert_context_process(MAKECERT_CONTEXT* context, int argc, char** argv)
|
||||
|
||||
if (entry)
|
||||
X509_NAME_add_entry_by_txt(name, "C", MBSTRING_UTF8, (const unsigned char*)entry,
|
||||
length, -1, 0);
|
||||
(int)length, -1, 0);
|
||||
|
||||
entry = x509_name_parse(arg->Value, "ST", &length);
|
||||
|
||||
if (entry)
|
||||
X509_NAME_add_entry_by_txt(name, "ST", MBSTRING_UTF8, (const unsigned char*)entry,
|
||||
length, -1, 0);
|
||||
(int)length, -1, 0);
|
||||
|
||||
entry = x509_name_parse(arg->Value, "L", &length);
|
||||
|
||||
if (entry)
|
||||
X509_NAME_add_entry_by_txt(name, "L", MBSTRING_UTF8, (const unsigned char*)entry,
|
||||
length, -1, 0);
|
||||
(int)length, -1, 0);
|
||||
|
||||
entry = x509_name_parse(arg->Value, "O", &length);
|
||||
|
||||
if (entry)
|
||||
X509_NAME_add_entry_by_txt(name, "O", MBSTRING_UTF8, (const unsigned char*)entry,
|
||||
length, -1, 0);
|
||||
(int)length, -1, 0);
|
||||
|
||||
entry = x509_name_parse(arg->Value, "OU", &length);
|
||||
|
||||
if (entry)
|
||||
X509_NAME_add_entry_by_txt(name, "OU", MBSTRING_UTF8, (const unsigned char*)entry,
|
||||
length, -1, 0);
|
||||
(int)length, -1, 0);
|
||||
|
||||
entry = context->common_name;
|
||||
length = strlen(entry);
|
||||
X509_NAME_add_entry_by_txt(name, "CN", MBSTRING_UTF8, (const unsigned char*)entry, length,
|
||||
-1, 0);
|
||||
X509_NAME_add_entry_by_txt(name, "CN", MBSTRING_UTF8, (const unsigned char*)entry,
|
||||
(int)length, -1, 0);
|
||||
}
|
||||
else
|
||||
{
|
||||
entry = context->common_name;
|
||||
length = strlen(entry);
|
||||
X509_NAME_add_entry_by_txt(name, "CN", MBSTRING_UTF8, (const unsigned char*)entry, length,
|
||||
-1, 0);
|
||||
X509_NAME_add_entry_by_txt(name, "CN", MBSTRING_UTF8, (const unsigned char*)entry,
|
||||
(int)length, -1, 0);
|
||||
}
|
||||
|
||||
X509_set_issuer_name(context->x509, name);
|
||||
@ -1108,9 +1027,7 @@ int makecert_context_process(MAKECERT_CONTEXT* context, int argc, char** argv)
|
||||
{
|
||||
BIO* bio;
|
||||
int status;
|
||||
int length;
|
||||
int offset;
|
||||
BYTE* x509_str;
|
||||
char* x509_str;
|
||||
bio = BIO_new(BIO_s_mem());
|
||||
|
||||
if (!bio)
|
||||
@ -1124,54 +1041,13 @@ int makecert_context_process(MAKECERT_CONTEXT* context, int argc, char** argv)
|
||||
return -1;
|
||||
}
|
||||
|
||||
offset = 0;
|
||||
length = 2048;
|
||||
|
||||
if (!(x509_str = (BYTE*)malloc(length + 1)))
|
||||
x509_str = makecert_read_str(bio, NULL);
|
||||
if (!x509_str)
|
||||
{
|
||||
BIO_free_all(bio);
|
||||
return -1;
|
||||
}
|
||||
|
||||
status = BIO_read(bio, x509_str, length);
|
||||
|
||||
if (status < 0)
|
||||
{
|
||||
BIO_free_all(bio);
|
||||
free(x509_str);
|
||||
return -1;
|
||||
}
|
||||
|
||||
offset += status;
|
||||
|
||||
while (offset >= length)
|
||||
{
|
||||
int new_len;
|
||||
BYTE* new_str;
|
||||
new_len = length * 2;
|
||||
new_str = (BYTE*)realloc(x509_str, new_len);
|
||||
|
||||
if (!new_str)
|
||||
{
|
||||
status = -1;
|
||||
break;
|
||||
}
|
||||
|
||||
x509_str = new_str;
|
||||
status = BIO_read(bio, &x509_str[offset], new_len);
|
||||
|
||||
if (status < 0)
|
||||
break;
|
||||
|
||||
length = length + new_len;
|
||||
offset += status;
|
||||
}
|
||||
|
||||
if (status < 0)
|
||||
return -1;
|
||||
|
||||
length = offset;
|
||||
x509_str[length] = '\0';
|
||||
printf("%s", x509_str);
|
||||
free(x509_str);
|
||||
BIO_free_all(bio);
|
||||
@ -1183,7 +1059,14 @@ int makecert_context_process(MAKECERT_CONTEXT* context, int argc, char** argv)
|
||||
|
||||
if (!context->live)
|
||||
{
|
||||
makecert_context_output_certificate_file(context, context->output_path);
|
||||
if (!PathFileExistsA(context->output_path))
|
||||
{
|
||||
if (!CreateDirectoryA(context->output_path, NULL))
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (makecert_context_output_certificate_file(context, context->output_path) != 1)
|
||||
return -1;
|
||||
|
||||
if (context->crtFormat)
|
||||
{
|
||||
|
Loading…
Reference in New Issue
Block a user