NAME
OpenCA::OpenSSL - Perl Crypto Extention to OpenSSL
SYNOPSIS
use OpenCA::OpenSSL;
DESCRIPTION
This Perl Module implements an interface to the openssl backend program. It actually uses the openssl command and it is not fully integrated as PERL/C mixture.
Passing parameters to functions should be very simple as them have no particular order and have, often, self-explaining name. Each parameter should be passed to the function like this:
... ( NAME=>VALUE, NAME=>VALUE, ... );
FUNCTIONS
sub new () - Creates a new Class instance.
This functions creates a new instance of the class. It accepts
only one parameter: the path to the backend command (openssl).
This is due because if it cannot find the openssl command it
will return an uninitialized class (default value is /usr/bin/
openssl which may not fit many distributions/OSs)
EXAMPLE:
my $openssl->new OpenCA::OpenSSL( $path );
sub setParams () - Set internal module variables.
This function can handle the internal module data such as the
backend path or the tmp dir. Accepted parameters are:
SHELL - Path to the openssl command.
CONFIG - Path to the openssl config file.
TMPDIR - Temporary files directory.
STDERR - Where to redirect the STDERR file.
(*) - Optional parameters;
EXAMPLE:
$openssl->setParams( SHELL=>'/usr/local/ssl/bin/openssl',
CONFIG=>$ca/stuff/openssl.cnf,
TMPDIR=>'/tmp',
STDERR=>'/dev/null' );
sub errno () - Get last command errno value.
This functions returns last operation's errno value. Non
zero value means there has been an error.
EXAMPLE:
print $openssl->errno;
sub errval () - Get last command errval value.
This functions returns last operation's errval value. This
value usually has a brief error description.
EXAMPLE:
print $openssl->errval;
sub genKey () - Generate a private Key.
This functions let you generate a new private key. Accepted
parameters are:
BITS - key lengh in bits(*);
OUTFILE - Output file name(*);
ALGORITHM - Encryption Algorithm to be used(*);
PASSWD - Password to be used when encrypting(*);
(*) - Optional parameters;
EXAMPLE:
my $key = $openssl->genKey( BITS=>1024 );
sub genReq () - Generate a new Request.
This function generate a new certificate request. Accepted
parameters are:
OUTFILE - Output file(*);
KEYFILE - File containing the key;
PASSWD - Password to decript key (if needed) (*);
DN - Subject list (as required by openssl, see
the openssl.cnf doc on policy);
SUBJECT - DN string (use this instead of passing separate
attributes list)(*);
(*) - Optional parameters;
EXAMPLE:
my $req = $openssl->genReq( KEYFILE=>"00_key.pem",
DN => [ "madwolf@openca.org","Max","","","" ] );
my $req = $openssl->genReq( KEYFILE=>"00_key.pem",
SUBJECT => "CN=Madwolf, O=OpenCA, C=IT" );
sub genCert () - Generate a certificate from a request.
This function let you generate a new certificate starting
from the request file. It is used for self-signed certificate
as it simply converts the request into a x509 structure.
Accepted parameters are:
OUTFILE - Output file(*);
KEYFILE - File containing the private key;
REQFILE - Request File;
PASSWD - Password to decrypt private key(*);
DAYS - Validity days(*);
(*) - Optional parameters;
EXAMPLE:
$cert = $openssl->genCert( KEYFILE=>"priv_key.pem",
REQFILE=>"req.pem",
DAYS=>"720" );
sub crl2pkcs7 () - Convert a crl and/or certs into pkcs7 structure.
This function converts certificates (optional) and a crl
(also optional) into a pkcs7 structure. It is used to build
strucutures to load certificates/crls into some browsers.
Accepted parameters are:
DATA - PEM|DER formatted CRL(*);
INFORM - Input crl format (DER|PEM) (*);
OUTFORM - Output pkcs7 structure format (DER|PEM) (*);
INFILE - Input crl file (*);
OUTFILE - Output pkcs7 file (*);
CERTSLIST - List of files containing certificates to
be added to the pkcs7 structure (*);
(*) - Optional parameters;
EXAMPLE:
$pkcs7 = $openssl->crl2pkcs7( DATA=>$crl->getPEM(),
CERTSLIST=>[ "cert1.pem", "cert2.pem" ]);
sub dataConvert () - Convert data to different format.
This functions will convert data you pass to another format. Ir
requires you to provide with the data's type and IN/OUT format.
Accepted parameters are:
DATA - Data to be processed;
INFILE - Data file to be processed (one of DATA and
INFILE are required and exclusive);
KEYFILE - file with the priv. key (* PEM to PKCS12 only).
Not needed if key is presented in DATA or INFILE too.
DATATYPE - Data type ( CRL | CERTIFICATE | REQUEST );
OUTFORM - Output format (PEM|DER|NET|TXT)(*);
INFORM - Input format (PEM|DER|NET|TXT)(*);
OUTFILE - Output file(*);
PASSWD - priv. key password (* PKCS12 to PEM only)
omitting the PASSWD leads into an unencrypted priv. key
ALGO - des,des3 or idea. Default is des3 encryption for priv. key
P12PASSWD - PKCS12 export password (* only needed for PKCS12)
NOKEYS - extract only the certificate (* PKCS12 to PEM only)
No need for the PASSWD parameter with this option.
CACERT - CA-certificate to add if OUTFORM is PKCS#12
(*) - Optional parameters;
EXAMPLES:
# PEM file to TXT format
print $openssl->dataConvert( INFILE=>"crl.pem",
OUTFORM=>"TXT" );
# PEM file to PKCS12 format, priv key will be des3 encrypted
print $openssl->dataConvert( INFILE=>"crl.pem",
DATATYPE=>'CERTIFICATE',
OUTFORM=>"PKCS12",
PASSWD=>$pem_pass,
P12PASSWD=>$export_pass );
# PKCS12 data to PEM formated certificate (no key)
print $openssl->dataConvert( DATA=>$pkcs12_cert,
DATATYPE=>'CERTIFICATE',
INFORM=>"PKCS12",
NOKEYS=>1,
P12PASSWD=>$export_pass );
sub issueCert () - Issue a certificate.
This function should be used when you have a CA certificate and
a request (either DER|PEM|SPKAC) and want to issue the certificate.
Parameters used will override the configuration values (remember
to set to appropriate value the CONFIG with the setParams func).
Accepted parameters are:
REQDATA - Request;
REQFILE - File containing the request (one of
REQDATA, REQFILE or REQFILES are required);
REQFILES - An array ref to an array of files that
contain the request.
OUTDIR - What directory to put the files from
REQFILES. (This is required iff
you use REQFILES.)
INFORM - Input format (PEM|DER|NET|SPKAC)(*);
PRESERVE_DN - Preserve DN order (Y|N)(*);
CA_NAME - CA sub section to be used (take a
look at the OpenSSL docs for adding
support of multiple CAs to the conf
file)(*);
CAKEY - CA key file;
CACERT - CA certificate file;
DAYS - Days the certificate will be valid(*);
START_DATE - Starting validity date (YYMMDDHHMMSSZ)(*);
END_DATE - Ending validity date (YYMMDDHHMMSSZ)(*);
PASSWD - Password to decrypt priv. CA key(*);
EXTS - Extentions to be used (configuration
section of the openssl.cnf file)(*);
REQTYPE - Request type (NETSCAPE|MSIE)(*);
(*) - Optional parameters;
EXAMPLE:
$openssl->issueCert( REQFILE=>"myreq",
INFORM=>SPKAC,
PRESERVE_DN=>Y,
CAKEY=>$ca/private/cakey.pem,
CACERT=>$ca/cacert.pem,
PASSWD=>$passwd,
REQTYPE=>NETSCAPE );
sub revoke () - Revoke a certificate.
This function is used to revoke a certificate. Accepted parameters
are:
CAKEY - CA private key file(*);
CACERT - CA certificate file(*);
PASSWD - Password to decrypt priv. CA key(*);
INFILE - Input PEM formatted certificate filename(*);
(*) - Optional parameters;
EXAMPLE:
if( not $openssl->revoke( INFILE=>$certFile ) ) {
print "Error while revoking certificate!";
}
sub issueCrl () - Issue a CRL.
This function is used to issue a CRL. Accepted parameters
are:
CAKEY - CA private key file;
CACERT - CA certificate file;
PASSWD - Password to decrypt priv. CA key(*);
DAYS - Days the CRL will be valid for(*);
EXTS - Extentions to be added ( see the openssl.cnf
pages for more help on this )(*);
EXTFILE - Extensions file to be used (*);
OUTFILE - Output file(*);
OUTFORM - Output format (PEM|DER|NET|TXT)(*);
(*) - Optional parameters;
EXAMPLE:
print $openssl->issueCrl( CAKEY=>"$ca/private/cakey.pem",
CACERT=>"$ca/cacert.pem",
DAYS=>7,
OUTFORM=>TXT );
sub SPKAC () - Get SPKAC infos.
This function returns a text containing all major info
about an spkac structure. Accepted parameters are:
SPKAC - spkac data ( SPKAC = .... ) (*);
INFILE - An spkac request file (*);
OUTFILE - Output file (*);
(*) - Optional parameters;
EXAMPLE:
print $openssl->SPKAC( SPKAC=>$data, OUTFILE=>$target );
sub pkcs7Certs () - Get PKCS7 structure certificate(s).
This function returns a PEM formatted (file or ret value)
contained in the pkcs7 structure. Accepted parameters are:
PKCS7 - pkcs7 data (*);
INFILE - A pkcs7 (signature?) file (*);
OUTFILE - Output file (*);
(*) - Optional parameters;
EXAMPLE:
print $openssl->pkcs7Cert( PKCS7=>$data, OUTFILE=>$target );
sub getDigest () - Get a message digest.
This function returns a message digest. Default digest
algorithm used is MD5. Accepted parameters are:
DATA - Data on which to perform digest;
ALGORITHM - Algorithm to be used(*);
(*) - Optional parameters;
EXAMPLE:
print $openssl->getDigest( DATA=>$data,
ALGORITHM=>sha1);
sub updateDB () - Updates the OpenSSL index.txt
This functions updates the index.txt file and returns the
output of the command in the form:
<SER>=Expired
Accepted parameters are:
CAKEY - CA private key file;
CACERT - CA certificate file;
PASSWD - Password to decrypt priv. CA key(*);
OUTFILE - Output file(*);
(*) - Optional parameters;
EXAMPLE:
$ret = $openssl->updateDB();
Exportable constants
CTX_TEST
EXFLAG_BCONS
EXFLAG_CA
EXFLAG_INVALID
EXFLAG_KUSAGE
EXFLAG_NSCERT
EXFLAG_SET
EXFLAG_SS
EXFLAG_V1
EXFLAG_XKUSAGE
GEN_DIRNAME
GEN_DNS
GEN_EDIPARTY
GEN_EMAIL
GEN_IPADD
GEN_OTHERNAME
GEN_RID
GEN_URI
GEN_X400
KU_CRL_SIGN
KU_DATA_ENCIPHERMENT
KU_DECIPHER_ONLY
KU_DIGITAL_SIGNATURE
KU_ENCIPHER_ONLY
KU_KEY_AGREEMENT
KU_KEY_CERT_SIGN
KU_KEY_ENCIPHERMENT
KU_NON_REPUDIATION
NS_OBJSIGN
NS_OBJSIGN_CA
NS_SMIME
NS_SMIME_CA
NS_SSL_CA
NS_SSL_CLIENT
NS_SSL_SERVER
X509V3_EXT_CTX_DEP
X509V3_EXT_DYNAMIC
X509V3_EXT_MULTILINE
X509V3_F_COPY_EMAIL
X509V3_F_COPY_ISSUER
X509V3_F_DO_EXT_CONF
X509V3_F_DO_EXT_I2D
X509V3_F_HEX_TO_STRING
X509V3_F_I2S_ASN1_ENUMERATED
X509V3_F_I2S_ASN1_INTEGER
X509V3_F_I2V_AUTHORITY_INFO_ACCESS
X509V3_F_NOTICE_SECTION
X509V3_F_NREF_NOS
X509V3_F_POLICY_SECTION
X509V3_F_R2I_CERTPOL
X509V3_F_S2I_ASN1_IA5STRING
X509V3_F_S2I_ASN1_INTEGER
X509V3_F_S2I_ASN1_OCTET_STRING
X509V3_F_S2I_ASN1_SKEY_ID
X509V3_F_S2I_S2I_SKEY_ID
X509V3_F_STRING_TO_HEX
X509V3_F_SXNET_ADD_ASC
X509V3_F_SXNET_ADD_ID_INTEGER
X509V3_F_SXNET_ADD_ID_ULONG
X509V3_F_SXNET_GET_ID_ASC
X509V3_F_SXNET_GET_ID_ULONG
X509V3_F_V2I_ACCESS_DESCRIPTION
X509V3_F_V2I_ASN1_BIT_STRING
X509V3_F_V2I_AUTHORITY_KEYID
X509V3_F_V2I_BASIC_CONSTRAINTS
X509V3_F_V2I_CRLD
X509V3_F_V2I_EXT_KU
X509V3_F_V2I_GENERAL_NAME
X509V3_F_V2I_GENERAL_NAMES
X509V3_F_V3_GENERIC_EXTENSION
X509V3_F_X509V3_ADD_VALUE
X509V3_F_X509V3_EXT_ADD
X509V3_F_X509V3_EXT_ADD_ALIAS
X509V3_F_X509V3_EXT_CONF
X509V3_F_X509V3_EXT_I2D
X509V3_F_X509V3_GET_VALUE_BOOL
X509V3_F_X509V3_PARSE_LIST
X509V3_F_X509_PURPOSE_ADD
X509V3_R_BAD_IP_ADDRESS
X509V3_R_BAD_OBJECT
X509V3_R_BN_DEC2BN_ERROR
X509V3_R_BN_TO_ASN1_INTEGER_ERROR
X509V3_R_DUPLICATE_ZONE_ID
X509V3_R_ERROR_CONVERTING_ZONE
X509V3_R_ERROR_IN_EXTENSION
X509V3_R_EXPECTED_A_SECTION_NAME
X509V3_R_EXTENSION_NAME_ERROR
X509V3_R_EXTENSION_NOT_FOUND
X509V3_R_EXTENSION_SETTING_NOT_SUPPORTED
X509V3_R_EXTENSION_VALUE_ERROR
X509V3_R_ILLEGAL_HEX_DIGIT
X509V3_R_INVALID_BOOLEAN_STRING
X509V3_R_INVALID_EXTENSION_STRING
X509V3_R_INVALID_NAME
X509V3_R_INVALID_NULL_ARGUMENT
X509V3_R_INVALID_NULL_NAME
X509V3_R_INVALID_NULL_VALUE
X509V3_R_INVALID_NUMBER
X509V3_R_INVALID_NUMBERS
X509V3_R_INVALID_OBJECT_IDENTIFIER
X509V3_R_INVALID_OPTION
X509V3_R_INVALID_POLICY_IDENTIFIER
X509V3_R_INVALID_SECTION
X509V3_R_INVALID_SYNTAX
X509V3_R_ISSUER_DECODE_ERROR
X509V3_R_MISSING_VALUE
X509V3_R_NEED_ORGANIZATION_AND_NUMBERS
X509V3_R_NO_CONFIG_DATABASE
X509V3_R_NO_ISSUER_CERTIFICATE
X509V3_R_NO_ISSUER_DETAILS
X509V3_R_NO_POLICY_IDENTIFIER
X509V3_R_NO_PUBLIC_KEY
X509V3_R_NO_SUBJECT_DETAILS
X509V3_R_ODD_NUMBER_OF_DIGITS
X509V3_R_UNABLE_TO_GET_ISSUER_DETAILS
X509V3_R_UNABLE_TO_GET_ISSUER_KEYID
X509V3_R_UNKNOWN_BIT_STRING_ARGUMENT
X509V3_R_UNKNOWN_EXTENSION
X509V3_R_UNKNOWN_EXTENSION_NAME
X509V3_R_UNKNOWN_OPTION
X509V3_R_UNSUPPORTED_OPTION
X509V3_R_USER_TOO_LONG
X509_PURPOSE_ANY
X509_PURPOSE_CRL_SIGN
X509_PURPOSE_DYNAMIC
X509_PURPOSE_DYNAMIC_NAME
X509_PURPOSE_MAX
X509_PURPOSE_MIN
X509_PURPOSE_NS_SSL_SERVER
X509_PURPOSE_SMIME_ENCRYPT
X509_PURPOSE_SMIME_SIGN
X509_PURPOSE_SSL_CLIENT
X509_PURPOSE_SSL_SERVER
XKU_CODE_SIGN
XKU_SGC
XKU_SMIME
XKU_SSL_CLIENT
XKU_SSL_SERVER
AUTHOR
Massimiliano Pala <madwolf@openca.org> Julio Sanchez, <j_sanchez@localdomain>
SEE ALSO
OpenCA::X509, OpenCA::CRL, OpenCA::REQ, OpenCA::TRIStateCGI, OpenCA::Configuration