-
Notifications
You must be signed in to change notification settings - Fork 3
/
convert_from_tlsa.go
82 lines (66 loc) · 2.59 KB
/
convert_from_tlsa.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
// Copyright 2018-2019 Jeremy Rand.
// This file is part of safetlsa.
//
// safetlsa is free software: you can redistribute it and/or
// modify it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// safetlsa is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with safetlsa. If not, see
// <https://www.gnu.org/licenses/>.
package safetlsa
import (
"crypto/x509"
"encoding/hex"
"fmt"
"strings"
"github.com/miekg/dns"
"github.com/namecoin/ncdns/certdehydrate"
)
func GetCertFromTLSA(domain string, tlsa *dns.TLSA, parentDERBytes []byte, parentPrivateKey interface{}) ([]byte, error) {
// CA not in user's trust store; public key; not hashed
if tlsa.Usage == 2 && tlsa.Selector == 1 && tlsa.MatchingType == 0 {
domain = strings.TrimSuffix(domain, " Domain AIA Parent CA")
publicKeyBytes, err := hex.DecodeString(tlsa.Certificate)
if err != nil {
return nil, fmt.Errorf("Error decoding public key from hex: %s", err)
}
// Generate domain CA
domainCA, err := GenerateDomainCA(domain, publicKeyBytes, parentDERBytes, parentPrivateKey)
if err != nil {
return nil, fmt.Errorf("Error generating domain CA: %s", err)
}
return domainCA, nil
}
// End entity cert not in user's trust store; full certificate; not hashed
if tlsa.Usage == 3 && tlsa.Selector == 0 && tlsa.MatchingType == 0 {
untrustedCertBytes, err := hex.DecodeString(tlsa.Certificate)
if err != nil {
return nil, fmt.Errorf("Error decoding certificate from hex: %s", err)
}
untrustedCert, err := x509.ParseCertificate(untrustedCertBytes)
if err != nil {
return nil, fmt.Errorf("Error parsing certificate: %s", err)
}
dehydratedCert, err := certdehydrate.DehydrateCert(untrustedCert)
if err != nil {
return nil, fmt.Errorf("Error dehydrating certificate: %s", err)
}
rehydratedCertTemplate, err := certdehydrate.RehydrateCert(dehydratedCert)
if err != nil {
return nil, fmt.Errorf("Error rehydrating certificate: %s", err)
}
rehydratedCertBytes, err := certdehydrate.FillRehydratedCertTemplate(*rehydratedCertTemplate, domain)
if err != nil {
return nil, fmt.Errorf("Error filling rehydrated certificate template: %s", err)
}
return rehydratedCertBytes, nil
}
return nil, fmt.Errorf("Unsupported TLSA parameters")
}