summaryrefslogtreecommitdiffstats
path: root/third_party/heimdal/kdc/test_kdc_ca.c
diff options
context:
space:
mode:
Diffstat (limited to 'third_party/heimdal/kdc/test_kdc_ca.c')
-rw-r--r--third_party/heimdal/kdc/test_kdc_ca.c178
1 files changed, 178 insertions, 0 deletions
diff --git a/third_party/heimdal/kdc/test_kdc_ca.c b/third_party/heimdal/kdc/test_kdc_ca.c
new file mode 100644
index 0000000..4d80c96
--- /dev/null
+++ b/third_party/heimdal/kdc/test_kdc_ca.c
@@ -0,0 +1,178 @@
+#include "kdc_locl.h"
+
+static int authorized_flag;
+static int help_flag;
+static char *lifetime_string;
+static const char *app_string = "kdc";
+static int version_flag;
+
+struct getargs args[] = {
+ { "authorized", 'A', arg_flag, &authorized_flag,
+ "Assume CSR is authorized", NULL },
+ { "lifetime", 'l', arg_string, &lifetime_string,
+ "Certificate lifetime desired", "TIME" },
+ { "help", 'h', arg_flag, &help_flag,
+ "Print usage message", NULL },
+ { "app", 'a', arg_string, &app_string,
+ "Application name (kdc or bx509); default: kdc", "APPNAME" },
+ { "version", 'v', arg_flag, &version_flag,
+ "Print version", NULL }
+};
+size_t num_args = sizeof(args) / sizeof(args[0]);
+
+static int
+usage(int e)
+{
+ arg_printusage(args, num_args, NULL,
+ "PRINC PKCS10:/path/to/der/CSR [HX509-STORE]");
+ fprintf(stderr,
+ "\n\tTest kx509/bx509 online CA issuer functionality.\n"
+ "\n\tIf --authorized / -A not given, then authorizer plugins\n"
+ "\twill be invoked.\n"
+ "\n\tUse --app kdc to test the kx509 configuration.\n"
+ "\tUse --app bx509 to test the bx509 configuration.\n\n\t"
+ "Example: %s foo@TEST.H5L.SE PKCS10:/tmp/csr PEM-FILE:/tmp/cert\n",
+ getprogname());
+ exit(e);
+ return e;
+}
+
+static const char *sysplugin_dirs[] = {
+#ifdef _WIN32
+ "$ORIGIN",
+#else
+ "$ORIGIN/../lib/plugin/kdc",
+#endif
+#ifdef __APPLE__
+ LIBDIR "/plugin/kdc",
+#endif
+ NULL
+};
+
+static void
+load_plugins(krb5_context context)
+{
+ const char * const *dirs = sysplugin_dirs;
+#ifndef _WIN32
+ char **cfdirs;
+
+ cfdirs = krb5_config_get_strings(context, NULL, "kdc", "plugin_dir", NULL);
+ if (cfdirs)
+ dirs = (const char * const *)cfdirs;
+#endif
+
+ _krb5_load_plugins(context, "kdc", (const char **)dirs);
+
+#ifndef _WIN32
+ krb5_config_free_strings(cfdirs);
+#endif
+}
+
+int
+main(int argc, char **argv)
+{
+ krb5_log_facility *logf = NULL;
+ krb5_error_code ret;
+ krb5_principal p = NULL;
+ krb5_context context;
+ krb5_times t;
+ hx509_request req = NULL;
+ hx509_certs store = NULL;
+ hx509_certs certs = NULL;
+ const char *argv0 = argv[0];
+ const char *out = "MEMORY:junk-it";
+ time_t req_life = 0;
+ int optidx = 0;
+
+ setprogname(argv[0]);
+ if (getarg(args, num_args, argc, argv, &optidx))
+ return usage(1);
+ if (help_flag)
+ return usage(0);
+ if (version_flag) {
+ print_version(argv[0]);
+ return 0;
+ }
+
+ argc -= optidx;
+ argv += optidx;
+
+ if (argc < 3 || argc > 4)
+ usage(1);
+
+ if ((errno = krb5_init_context(&context)))
+ err(1, "Could not initialize krb5_context");
+ if ((ret = krb5_initlog(context, argv0, &logf)) ||
+ (ret = krb5_addlog_dest(context, logf, "0-5/STDERR")))
+ krb5_err(context, 1, ret, "Could not set up logging to stderr");
+ load_plugins(context);
+ if ((ret = krb5_parse_name(context, argv[0], &p)))
+ krb5_err(context, 1, ret, "Could not parse principal %s", argv[0]);
+ if ((ret = hx509_request_parse(context->hx509ctx, argv[1], &req)))
+ krb5_err(context, 1, ret, "Could not parse PKCS#10 CSR from %s", argv[1]);
+
+ if (authorized_flag) {
+ KeyUsage ku = int2KeyUsage(0);
+ size_t i;
+ char *s;
+
+ /* Mark all the things authorized */
+ ku.digitalSignature = 1;
+ hx509_request_authorize_ku(req, ku);
+
+ for (i = 0; ret == 0; i++) {
+ ret = hx509_request_get_eku(req, i, &s);
+ free(s); s = NULL;
+ if (ret == 0)
+ hx509_request_authorize_eku(req, i);
+ }
+ if (ret == HX509_NO_ITEM)
+ ret = 0;
+
+ for (i = 0; ret == 0; i++) {
+ hx509_san_type san_type;
+
+ ret = hx509_request_get_san(req, i, &san_type, &s);
+ free(s); s = NULL;
+ if (ret == 0)
+ hx509_request_authorize_san(req, i);
+ }
+ if (ret && ret != HX509_NO_ITEM)
+ krb5_err(context, 1, ret,
+ "Failed to mark requested extensions authorized");
+ } else if ((ret = kdc_authorize_csr(context, app_string, req, p))) {
+ krb5_err(context, 1, ret,
+ "Requested certificate extensions rejected by policy");
+ }
+
+ memset(&t, 0, sizeof(t));
+ t.starttime = time(NULL);
+ t.endtime = t.starttime + 3600;
+ req_life = lifetime_string ? parse_time(lifetime_string, "day") : 0;
+ if ((ret = kdc_issue_certificate(context, app_string, logf, req, p, &t,
+ req_life, 1, &certs)))
+ krb5_err(context, 1, ret, "Certificate issuance failed");
+
+ if (argv[2])
+ out = argv[2];
+
+ if ((ret = hx509_certs_init(context->hx509ctx, out, HX509_CERTS_CREATE,
+ NULL, &store)) ||
+ (ret = hx509_certs_merge(context->hx509ctx, store, certs)) ||
+ (ret = hx509_certs_store(context->hx509ctx, store, 0, NULL)))
+ /*
+ * If the store is a MEMORY store, say, we're really not being asked to
+ * store -- we're just testing the online CA functionality without
+ * wanting to inspect the result.
+ */
+ if (ret != HX509_UNSUPPORTED_OPERATION)
+ krb5_err(context, 1, ret,
+ "Could not store certificate and chain in %s", out);
+ _krb5_unload_plugins(context, "kdc");
+ krb5_free_principal(context, p);
+ krb5_free_context(context);
+ hx509_request_free(&req);
+ hx509_certs_free(&store);
+ hx509_certs_free(&certs);
+ return 0;
+}