 15b2094079
			
		
	
	15b2094079
	
	
	
		
			
			This adds support for using a Heimdal-specific PKIX extension to derive a maximum Kerberos ticket lifetime from a client's PKINIT certificate: - a `--pkinit-max-life` to the `hxtool ca` command - `hx509_ca_tbs_set_pkinit_max_life()` - `hx509_cert_get_pkinit_max_life()` - `HX509_CA_TEMPLATE_PKINIT_MAX_LIFE` There are two extensions. One is an EKU, which if present means that the maximum ticket lifetime should be derived from the notAfter minus notBefore. The other is a certificate extension whose value is a maximum ticket lifetime in seconds. The latter is preferred.
		
			
				
	
	
		
			1058 lines
		
	
	
		
			23 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			1058 lines
		
	
	
		
			23 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 2005 - 2007 Kungliga Tekniska Högskolan
 | |
|  * (Royal Institute of Technology, Stockholm, Sweden). 
 | |
|  * All rights reserved. 
 | |
|  *
 | |
|  * Redistribution and use in source and binary forms, with or without 
 | |
|  * modification, are permitted provided that the following conditions 
 | |
|  * are met: 
 | |
|  *
 | |
|  * 1. Redistributions of source code must retain the above copyright 
 | |
|  *    notice, this list of conditions and the following disclaimer. 
 | |
|  *
 | |
|  * 2. Redistributions in binary form must reproduce the above copyright 
 | |
|  *    notice, this list of conditions and the following disclaimer in the 
 | |
|  *    documentation and/or other materials provided with the distribution. 
 | |
|  *
 | |
|  * 3. Neither the name of the Institute nor the names of its contributors 
 | |
|  *    may be used to endorse or promote products derived from this software 
 | |
|  *    without specific prior written permission. 
 | |
|  *
 | |
|  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 
 | |
|  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 
 | |
|  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 
 | |
|  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 
 | |
|  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 
 | |
|  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 
 | |
|  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 
 | |
|  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 
 | |
|  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 
 | |
|  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 
 | |
|  * SUCH DAMAGE. 
 | |
|  */
 | |
| /* $Id$ */
 | |
| 
 | |
| command = {
 | |
| 	name = "list-oids"
 | |
| 	help = "List known OIDs"
 | |
| 	function = "hxtool_list_oids"
 | |
| 	min_args="0"
 | |
| 	max_args="0"
 | |
| }
 | |
| command = {
 | |
| 	name = "cms-create-sd"
 | |
| 	name = "cms-sign"
 | |
| 	option = {
 | |
| 		long = "certificate"
 | |
| 		short = "c"
 | |
| 		type = "strings"
 | |
| 		argument = "certificate-store"
 | |
| 		help = "certificate stores to pull certificates from"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "signer"
 | |
| 		short = "s"
 | |
| 		type = "string"
 | |
| 		argument = "signer-friendly-name"
 | |
| 		help = "certificate to sign with"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "anchors"
 | |
| 		type = "strings"
 | |
| 		argument = "certificate-store"
 | |
| 		help = "trust anchors"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "pool"
 | |
| 		type = "strings"
 | |
| 		argument = "certificate-pool"
 | |
| 		help = "certificate store to pull certificates from"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "pass"
 | |
| 		type = "strings"
 | |
| 		argument = "password"
 | |
| 		help = "password, prompter, or environment"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "peer-alg"
 | |
| 		type = "strings"
 | |
| 		argument = "oid"
 | |
| 		help = "oid that the peer support"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "content-type"
 | |
| 		type = "string"
 | |
| 		argument = "oid"
 | |
| 		help = "content type oid"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "content-info"
 | |
| 		type = "flag"
 | |
| 		help = "wrapped out-data in a ContentInfo"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "pem"
 | |
| 		type = "flag"
 | |
| 		help = "wrap out-data in PEM armor"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "detached-signature"
 | |
| 		type = "flag"
 | |
| 		help = "create a detached signature"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "signer"
 | |
| 		type = "-flag"
 | |
| 		help = "do not sign"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "id-by-name"
 | |
| 		type = "flag"
 | |
| 		help = "use subject name for CMS Identifier"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "embedded-certs"
 | |
| 		type = "-flag"
 | |
| 		help = "don't embed certificates"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "embed-leaf-only"
 | |
| 		type = "flag"
 | |
| 		help = "only embed leaf certificate"
 | |
| 	}
 | |
| 	min_args="1"
 | |
| 	max_args="2"
 | |
| 	argument="in-file out-file"
 | |
| 	help = "Wrap a file within a SignedData object"
 | |
| }
 | |
| command = {
 | |
| 	name = "cms-verify-sd"
 | |
| 	option = {
 | |
| 		long = "anchors"
 | |
| 		short = "D"
 | |
| 		type = "strings"
 | |
| 		argument = "certificate-store"
 | |
| 		help = "trust anchors"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "certificate"
 | |
| 		short = "c"
 | |
| 		type = "strings"
 | |
| 		argument = "certificate-store"
 | |
| 		help = "certificate store to pull certificates from"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "pass"
 | |
| 		type = "strings"
 | |
| 		argument = "password"
 | |
| 		help = "password, prompter, or environment"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "missing-revoke"
 | |
| 		type = "flag"
 | |
| 		help = "missing CRL/OCSP is ok"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "content-info"
 | |
| 		type = "flag"
 | |
| 		help = "unwrap in-data that's in a ContentInfo"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "pem"
 | |
| 		type = "flag"
 | |
| 		help = "unwrap in-data from PEM armor"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "signer-allowed"
 | |
| 		type = "-flag"
 | |
| 		help = "allow no signer"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "allow-wrong-oid"
 | |
| 		type = "flag"
 | |
| 		help = "allow wrong oid flag"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "signed-content"
 | |
| 		type = "string"
 | |
| 		help = "file containing content"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "oid-sym"
 | |
| 		type = "flag"
 | |
| 		help = "show symbolic name for OID"
 | |
| 	}
 | |
| 	min_args="1"
 | |
| 	max_args="2"
 | |
| 	argument="in-file [out-file]"
 | |
| 	help = "Verify a file within a SignedData object"
 | |
| }
 | |
| command = {
 | |
| 	name = "cms-unenvelope"
 | |
| 	option = {
 | |
| 		long = "certificate"
 | |
| 		short = "c"
 | |
| 		type = "strings"
 | |
| 		argument = "certificate-store"
 | |
| 		help = "certificate used to decrypt the data"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "pass"
 | |
| 		type = "strings"
 | |
| 		argument = "password"
 | |
| 		help = "password, prompter, or environment"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "content-info"
 | |
| 		type = "flag"
 | |
| 		help = "wrapped out-data in a ContentInfo"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "allow-weak-crypto"
 | |
| 		type = "flag"
 | |
| 		help = "allow weak crypto"
 | |
| 	}
 | |
| 	min_args="2"
 | |
| 	argument="in-file out-file"
 | |
| 	help = "Unenvelope a file containing a EnvelopedData object"
 | |
| }
 | |
| command = {
 | |
| 	name = "cms-envelope"
 | |
| 	function = "cms_create_enveloped"
 | |
| 	option = {
 | |
| 		long = "certificate"
 | |
| 		short = "c"
 | |
| 		type = "strings"
 | |
| 		argument = "certificate-store"
 | |
| 		help = "certificates used to receive the data"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "pass"
 | |
| 		type = "strings"
 | |
| 		argument = "password"
 | |
| 		help = "password, prompter, or environment"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "encryption-type"
 | |
| 		type = "string"
 | |
| 		argument = "enctype"
 | |
| 		help = "enctype"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "content-type"
 | |
| 		type = "string"
 | |
| 		argument = "oid"
 | |
| 		help = "content type oid"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "content-info"
 | |
| 		type = "flag"
 | |
| 		help = "wrapped out-data in a ContentInfo"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "allow-weak-crypto"
 | |
| 		type = "flag"
 | |
| 		help = "allow weak crypto"
 | |
| 	}
 | |
| 	min_args="2"
 | |
| 	argument="in-file out-file"
 | |
| 	help = "Envelope a file containing a EnvelopedData object"
 | |
| }
 | |
| command = {
 | |
| 	name = "verify"
 | |
| 	function = "pcert_verify"
 | |
| 	option = {
 | |
| 		long = "pass"
 | |
| 		type = "strings"
 | |
| 		argument = "password"
 | |
| 		help = "password, prompter, or environment"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "allow-proxy-certificate"
 | |
| 		type = "flag"
 | |
| 		help = "allow proxy certificates"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "missing-revoke"
 | |
| 		type = "flag"
 | |
| 		help = "missing CRL/OCSP is ok"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "time"
 | |
| 		type = "string"
 | |
| 		help = "time when to validate the chain"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "verbose"
 | |
| 		short = "v"
 | |
| 		type = "flag"
 | |
| 		help = "verbose logging"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "max-depth"
 | |
| 		type = "integer"
 | |
| 		help = "maximum search length of certificate trust anchor"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "hostname"
 | |
| 		type = "string"
 | |
| 		help = "match hostname to certificate"
 | |
| 	}
 | |
| 	argument = "cert:foo chain:cert1 chain:cert2 anchor:anchor1 anchor:anchor2"
 | |
| 	help = "Verify certificate chain"
 | |
| }
 | |
| command = {
 | |
| 	name = "print"
 | |
| 	function = "pcert_print"
 | |
| 	option = {
 | |
| 		long = "pass"
 | |
| 		type = "strings"
 | |
| 		argument = "password"
 | |
| 		help = "password, prompter, or environment"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "content"
 | |
| 		type = "flag"
 | |
| 		help = "print the content of the certificates"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "raw-json"
 | |
| 		type = "flag"
 | |
| 		help = "print the DER content of the certificates as JSON"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "never-fail"
 | |
| 		type = "flag"
 | |
| 		help = "never fail with an error code"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "info"
 | |
| 		type = "flag"
 | |
| 		help = "print the information about the certificate store"
 | |
| 	}
 | |
| 	min_args="1"
 | |
| 	argument="certificate ..."
 | |
| 	help = "Print certificates"
 | |
| }
 | |
| command = {
 | |
| 	name = "validate"
 | |
| 	function = "pcert_validate"
 | |
| 	option = {
 | |
| 		long = "pass"
 | |
| 		type = "strings"
 | |
| 		argument = "password"
 | |
| 		help = "password, prompter, or environment"
 | |
| 	}
 | |
| 	min_args="1"
 | |
| 	argument="certificate ..."
 | |
| 	help = "Validate content of certificates"
 | |
| }
 | |
| command = {
 | |
| 	name = "certificate-copy"
 | |
| 	name = "cc"
 | |
| 	option = {
 | |
| 		long = "in-pass"
 | |
| 		type = "strings"
 | |
| 		argument = "password"
 | |
| 		help = "password, prompter, or environment"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "out-pass"
 | |
| 		type = "string"
 | |
| 		argument = "password"
 | |
| 		help = "password, prompter, or environment"
 | |
| 	}
 | |
| 	min_args="2"
 | |
| 	argument="in-certificates-1 ... out-certificate"
 | |
| 	help = "Copy in certificates stores into out certificate store"
 | |
| }
 | |
| command = {
 | |
| 	name = "ocsp-fetch"
 | |
| 	option = {
 | |
| 		long = "pass"
 | |
| 		type = "strings"
 | |
| 		argument = "password"
 | |
| 		help = "password, prompter, or environment"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "sign"
 | |
| 		type = "string"
 | |
| 		argument = "certificate"
 | |
| 		help = "certificate use to sign the request"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "url-path"
 | |
| 		type = "string"
 | |
| 		argument = "url"
 | |
| 		help = "part after host in url to put in the request"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "nonce"
 | |
| 		type = "-flag"
 | |
| 		default = "1"
 | |
| 		help = "don't include nonce in request"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "pool"
 | |
| 		type = "strings"
 | |
| 		argument = "certificate-store"
 | |
| 		help = "pool to find parent certificate in"
 | |
| 	}
 | |
| 	min_args="2"
 | |
| 	argument="outfile certs ..."
 | |
| 	help = "Fetch OCSP responses for the following certs"
 | |
| }
 | |
| command = {
 | |
| 	option = {
 | |
| 		long = "ocsp-file"
 | |
| 		type = "string"
 | |
| 		help = "OCSP file"
 | |
| 	}
 | |
| 	name = "ocsp-verify"
 | |
| 	min_args="1"
 | |
| 	argument="certificates ..."
 | |
| 	help = "Check that certificates are in OCSP file and valid"
 | |
| }
 | |
| command = {
 | |
| 	name = "ocsp-print"
 | |
| 	option = {
 | |
| 		long = "verbose"
 | |
| 		type = "flag"
 | |
| 		help = "verbose"
 | |
| 	}
 | |
| 	min_args="1"
 | |
| 	argument="ocsp-response-file ..."
 | |
| 	help = "Print the OCSP responses"
 | |
| }
 | |
| command = {
 | |
| 	name = "revoke-print"
 | |
| 	option = {
 | |
| 		long = "verbose"
 | |
| 		type = "flag"
 | |
| 		help = "verbose"
 | |
| 	}
 | |
| 	min_args="1"
 | |
| 	argument="ocsp/crl files"
 | |
| 	help = "Print the OCSP/CRL files"
 | |
| }
 | |
| command = {
 | |
| 	name = "generate-key"
 | |
| 	option = {
 | |
| 		long = "type"
 | |
| 		type = "string"
 | |
| 		help = "keytype"
 | |
| 	}
 | |
| 	option = {
 | |
| 	        long = "key-bits"
 | |
| 		type = "integer"
 | |
| 		help = "number of bits in the generated key";
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "verbose"
 | |
| 		type = "flag"
 | |
| 		help = "verbose status"
 | |
| 	}
 | |
| 	min_args="1"
 | |
| 	max_args="1"
 | |
| 	argument="output-file"
 | |
| 	help = "Generate a private key"
 | |
| }
 | |
| command = {
 | |
| 	name = "request-create"
 | |
| 	option = {
 | |
| 		long = "subject"
 | |
| 		type = "string"
 | |
| 		help = "Subject DN"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "eku"
 | |
| 		type = "strings"
 | |
| 		argument = "oid-string"
 | |
| 		help = "Add Extended Key Usage OID"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "email"
 | |
| 		type = "strings"
 | |
| 		help = "Email address in SubjectAltName"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "jid"
 | |
| 		type = "strings"
 | |
| 		help = "XMPP (Jabber) address in SubjectAltName"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "dnsname"
 | |
| 		type = "strings"
 | |
| 		help = "Hostname or domainname in SubjectAltName"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "kerberos"
 | |
| 		type = "strings"
 | |
| 		help = "Kerberos principal name as SubjectAltName"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "ms-kerberos"
 | |
| 		type = "strings"
 | |
| 		help = "Kerberos principal name as SubjectAltName (Microsoft variant)"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "registered"
 | |
| 		type = "strings"
 | |
| 		help = "Registered object ID as SubjectAltName"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "dn"
 | |
| 		type = "strings"
 | |
| 		help = "Directory name as SubjectAltName"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "type"
 | |
| 		type = "string"
 | |
| 		help = "Type of request CRMF or PKCS10, defaults to PKCS10"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "key"
 | |
| 		type = "string"
 | |
| 		help = "Key-pair"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "generate-key"
 | |
| 		type = "string"
 | |
| 		help = "keytype"
 | |
| 	}
 | |
| 	option = {
 | |
| 	        long = "key-bits"
 | |
| 		type = "integer"
 | |
| 		help = "number of bits in the generated key";
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "verbose"
 | |
| 		type = "flag"
 | |
| 		help = "verbose status"
 | |
| 	}
 | |
| 	min_args="1"
 | |
| 	max_args="1"
 | |
| 	argument="output-file"
 | |
| 	help = "Create a CRMF or PKCS10 request"
 | |
| }
 | |
| command = {
 | |
| 	name = "request-print"
 | |
| 	option = {
 | |
| 		long = "verbose"
 | |
| 		type = "flag"
 | |
| 		help = "verbose printing"
 | |
| 	}
 | |
| 	min_args="1"
 | |
| 	argument="requests ..."
 | |
| 	help = "Print requests"
 | |
| }
 | |
| command = {
 | |
| 	name = "query"
 | |
| 	option = {
 | |
| 		long = "exact"
 | |
| 		type = "flag"
 | |
| 		help = "exact match"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "private-key"
 | |
| 		type = "flag"
 | |
| 		help = "search for private key"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "friendlyname"
 | |
| 		type = "string"
 | |
| 		argument = "name"
 | |
| 		help = "match on friendly name"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "eku"
 | |
| 		type = "string"
 | |
| 		argument = "oid-string"
 | |
| 		help = "match on EKU"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "expr"
 | |
| 		type = "string"
 | |
| 		argument = "expression"
 | |
| 		help = "match on expression"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "keyEncipherment"
 | |
| 		type = "flag"
 | |
| 		help = "match keyEncipherment certificates"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "digitalSignature"
 | |
| 		type = "flag"
 | |
| 		help = "match digitalSignature certificates"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "print"
 | |
| 		type = "flag"
 | |
| 		help = "print matches"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "pass"
 | |
| 		type = "strings"
 | |
| 		argument = "password"
 | |
| 		help = "password, prompter, or environment"
 | |
| 	}
 | |
| 	min_args="1"
 | |
| 	argument="certificates ..."
 | |
| 	help = "Query the certificates for a match"
 | |
| }
 | |
| command = {
 | |
| 	name = "info"
 | |
| }
 | |
| command = {
 | |
| 	name = "random-data"
 | |
| 	min_args="1"
 | |
| 	argument="bytes"
 | |
| 	help = "Generates random bytes and prints them to standard output"
 | |
| }
 | |
| command = {
 | |
| 	option = {
 | |
| 		long = "type"
 | |
| 		type = "string"
 | |
| 		help = "type of CMS algorithm"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "oid-syms"
 | |
| 		type = "flag"
 | |
| 		help = "show symbolic names for OIDs"
 | |
| 	}
 | |
| 	name = "crypto-available"
 | |
| 	min_args="0"
 | |
| 	help = "Print available CMS crypto types"
 | |
| }
 | |
| command = {
 | |
| 	option = {
 | |
| 		long = "type"
 | |
| 		type = "string"
 | |
| 		help = "type of CMS algorithm"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "certificate"
 | |
| 		type = "string"
 | |
| 		help = "source certificate limiting the choices"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "peer-cmstype"
 | |
| 		type = "strings"
 | |
| 		help = "peer limiting cmstypes"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "oid-sym"
 | |
| 		type = "flag"
 | |
| 		help = "show symbolic name for OID"
 | |
| 	}
 | |
| 	name = "crypto-select"
 | |
| 	min_args="0"
 | |
| 	help = "Print selected CMS type"
 | |
| }
 | |
| command = {
 | |
| 	option = {
 | |
| 		long = "decode"
 | |
| 		short = "d"
 | |
| 		type = "flag"
 | |
| 		help = "decode instead of encode"
 | |
| 	}
 | |
| 	name = "hex"
 | |
| 	function = "hxtool_hex"
 | |
| 	min_args="0"
 | |
| 	help = "Encode input to hex"
 | |
| }
 | |
| command = {
 | |
| 	option = {
 | |
| 		long = "issue-ca"
 | |
| 		type = "flag"
 | |
| 		help = "Issue a CA certificate"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "issue-proxy"
 | |
| 		type = "flag"
 | |
| 		help = "Issue a proxy certificate"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "domain-controller"
 | |
| 		type = "flag"
 | |
| 		help = "Issue a MS domaincontroller certificate"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "subject"
 | |
| 		type = "string"
 | |
| 		help = "Subject of issued certificate"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "ca-certificate"
 | |
| 		type = "string"
 | |
| 		help = "Issuing CA certificate"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "self-signed"
 | |
| 		type = "flag"
 | |
| 		help = "Issuing a self-signed certificate"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "ca-private-key"
 | |
| 		type = "string"
 | |
| 		help = "Private key for self-signed certificate"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "certificate"
 | |
| 		type = "string"
 | |
| 		help = "Issued certificate"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "type"
 | |
| 		type = "strings"
 | |
| 		help = "Types of certificate to issue (can be used more then once)"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "lifetime"
 | |
| 		type = "string"
 | |
| 		help = "Lifetime of certificate"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "signature-algorithm"
 | |
| 		type = "string"
 | |
| 		help = "Signature algorithm to use"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "serial-number"
 | |
| 		type = "string"
 | |
| 		help = "serial-number of certificate"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "path-length"
 | |
| 		default = "-1"
 | |
| 		type = "integer"
 | |
| 		help = "Maximum path length (CA and proxy certificates), -1 no limit"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "eku"
 | |
| 		type = "strings"
 | |
| 		argument = "oid-string"
 | |
| 		help = "Add Extended Key Usage OID"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "ku"
 | |
| 		type = "strings"
 | |
| 		help = "Key Usage (digitalSignature, keyEncipherment, dataEncipherment, keyAgreement, keyCertSign, cRLSign, encipherOnly, decipherOnly)"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "hostname"
 | |
| 		type = "strings"
 | |
| 		help = "DNS names this certificate is allowed to serve"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "dnssrv"
 | |
| 		type = "strings"
 | |
| 		help = "DNS SRV names this certificate is allowed to serve"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "email"
 | |
| 		type = "strings"
 | |
| 		help = "email addresses assigned to this certificate"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "pk-init-principal"
 | |
| 		type = "strings"
 | |
| 		help = "PK-INIT principal (for SAN)"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "ms-upn"
 | |
| 		type = "string"
 | |
| 		help = "Microsoft UPN (for SAN)"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "jid"
 | |
| 		type = "string"
 | |
| 		help = "XMPP jabber id (for SAN)"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "permanent-id"
 | |
| 		type = "string"
 | |
| 		help = "PermanentIdentifier ([oid]:[serial])"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "hardware-module-name"
 | |
| 		type = "string"
 | |
| 		help = "HardwareModuleName (oid:serial)"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "policy"
 | |
| 		type = "strings"
 | |
| 		help = "Certificate Policy OID and optional URI and/or notice (OID:URI<space>notice_text)"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "policy-mapping"
 | |
| 		type = "strings"
 | |
| 		help = "Certificate Policy mapping (OID:OID)"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "pkinit-max-life"
 | |
| 		type = "string"
 | |
| 		help = "maximum Kerberos ticket lifetime extension for PKINIT"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "req"
 | |
| 		type = "string"
 | |
| 		help = "certificate request"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "certificate-private-key"
 | |
| 		type = "string"
 | |
| 		help = "private-key"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "generate-key"
 | |
| 		type = "string"
 | |
| 		help = "keytype"
 | |
| 	}
 | |
| 	option = {
 | |
| 	        long = "key-bits"
 | |
| 		type = "integer"
 | |
| 		help = "number of bits in the generated key"
 | |
| 	}
 | |
| 	option = {
 | |
| 	        long = "crl-uri"
 | |
| 		type = "string"
 | |
| 		help = "URI to CRL"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "template-certificate"
 | |
| 		type = "string"
 | |
| 		help = "certificate"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "template-fields"
 | |
| 		type = "string"
 | |
| 		help = "flag"
 | |
| 	}
 | |
| 	name = "certificate-sign"
 | |
| 	name = "cert-sign"
 | |
| 	name = "issue-certificate"
 | |
| 	name = "ca"
 | |
| 	function = "hxtool_ca"
 | |
| 	min_args="0"
 | |
| 	help = "Issue a certificate"
 | |
| }
 | |
| command = {
 | |
| 	name = "test-crypto"
 | |
| 	option = {
 | |
| 		long = "pass"
 | |
| 		type = "strings"
 | |
| 		argument = "password"
 | |
| 		help = "password, prompter, or environment"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "verbose"
 | |
| 		type = "flag"
 | |
| 		help = "verbose printing"
 | |
| 	}
 | |
| 	min_args="1"
 | |
| 	argument="certificates..."
 | |
| 	help = "Test crypto system related to the certificates"
 | |
| }
 | |
| command = {
 | |
| 	option = {
 | |
| 		long = "type"
 | |
| 		type = "integer"
 | |
| 		help = "type of statistics"
 | |
| 	}
 | |
| 	name = "statistic-print"
 | |
| 	min_args="0"
 | |
| 	help = "Print statistics"
 | |
| }
 | |
| command = {
 | |
| 	option = {
 | |
| 		long = "signer"
 | |
| 		type = "string"
 | |
| 		help = "signer certificate"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "pass"
 | |
| 		type = "strings"
 | |
| 		argument = "password"
 | |
| 		help = "password, prompter, or environment"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "crl-file"
 | |
| 		type = "string"
 | |
| 		help = "CRL output file"
 | |
| 	}
 | |
| 	option = {
 | |
| 		long = "lifetime"
 | |
| 		type = "string"
 | |
| 		help = "time the crl will be valid"
 | |
| 	}
 | |
| 	name = "crl-sign"
 | |
| 	min_args="0"
 | |
| 	argument="certificates..."
 | |
| 	help = "Create a CRL"
 | |
| }
 | |
| command = {
 | |
|         option = {
 | |
| 	        long = "verbose"
 | |
|                 short = "v"
 | |
| 		type = "flag"
 | |
|                 help = "verbose"
 | |
|         }
 | |
|         option = {
 | |
| 	        long = "end-entity"
 | |
| 		type = "flag"
 | |
|                 help = "check the first EE certificate in the store"
 | |
|         }
 | |
|         option = {
 | |
| 	        long = "ca"
 | |
| 		type = "flag"
 | |
|                 help = "check the first CA certificate in the store"
 | |
|         }
 | |
|         option = {
 | |
| 	        long = "cert-num"
 | |
| 		type = "integer"
 | |
|                 default = "-1"
 | |
|                 help = "check the nth certificate in the store"
 | |
|         }
 | |
|         option = {
 | |
| 		long = "expr"
 | |
| 		type = "string"
 | |
| 		argument = "expression"
 | |
| 		help = "test the first certificate matching expression"
 | |
|         }
 | |
|         option = {
 | |
|                 long = "has-email-san"
 | |
| 		short = "M"
 | |
|                 type = "strings"
 | |
|                 argument = "email-address"
 | |
|                 help = "check that cert has email SAN"
 | |
|         }
 | |
|         option = {
 | |
|                 long = "has-xmpp-san"
 | |
|                 type = "strings"
 | |
| 		short = "X"
 | |
|                 argument = "jabber address"
 | |
|                 help = "check that cert has XMPP SAN"
 | |
|         }
 | |
|         option = {
 | |
|                 long = "has-ms-upn-san"
 | |
| 		short = "U"
 | |
|                 type = "strings"
 | |
|                 argument = "UPN"
 | |
|                 help = "check that cert has UPN SAN"
 | |
|         }
 | |
|         option = {
 | |
|                 long = "has-dnsname-san"
 | |
| 		short = "D"
 | |
|                 type = "strings"
 | |
|                 argument = "domainname"
 | |
|                 help = "check that cert has domainname SAN"
 | |
|         }
 | |
|         option = {
 | |
|                 long = "has-pkinit-san"
 | |
| 		short = "P"
 | |
|                 type = "strings"
 | |
|                 argument = "Kerberos principal name"
 | |
|                 help = "check that cert has PKINIT SAN"
 | |
|         }
 | |
|         option = {
 | |
|                 long = "has-registeredID-san"
 | |
| 		short = "R"
 | |
|                 type = "strings"
 | |
|                 argument = "OID"
 | |
|                 help = "check that cert has registeredID SAN"
 | |
|         }
 | |
|         option = {
 | |
|                 long = "has-eku"
 | |
| 		short = "E"
 | |
|                 type = "strings"
 | |
|                 argument = "OID"
 | |
|                 help = "check that cert has EKU"
 | |
|         }
 | |
|         option = {
 | |
|                 long = "has-ku"
 | |
|                 short = "K"
 | |
|                 type = "strings"
 | |
|                 argument = "key usage element"
 | |
|                 help = "check that cert has key usage"
 | |
|         }
 | |
|         option = {
 | |
|                 long = "exact"
 | |
|                 type = "flag"
 | |
|                 help = "check that cert has only given SANs/EKUs/KUs"
 | |
|         }
 | |
|         option = {
 | |
|                 long = "valid-now"
 | |
|                 short = "n"
 | |
|                 type = "flag"
 | |
|                 help = "check that current time is in certicate's validity period"
 | |
|         }
 | |
|         option = {
 | |
|                 long = "valid-at"
 | |
|                 type = "string"
 | |
|                 argument = "datetime"
 | |
|                 help = "check that the certificate is valid at given time"
 | |
|         }
 | |
|         option = {
 | |
|                 long = "not-after-eq"
 | |
|                 type = "string"
 | |
|                 argument = "datetime"
 | |
|                 help = "check that the certificate's notAfter is as given"
 | |
|         }
 | |
|         option = {
 | |
|                 long = "not-after-lt"
 | |
|                 type = "string"
 | |
|                 argument = "datetime"
 | |
|                 help = "check that the certificate's notAfter is before the given time"
 | |
|         }
 | |
|         option = {
 | |
|                 long = "not-after-gt"
 | |
|                 type = "string"
 | |
|                 argument = "datetime"
 | |
|                 help = "check that the certificate's notAfter is after the given time"
 | |
|         }
 | |
|         option = {
 | |
|                 long = "not-before-eq"
 | |
|                 type = "string"
 | |
|                 argument = "datetime"
 | |
|                 help = "check that the certificate's notBefore is as given"
 | |
|         }
 | |
|         option = {
 | |
|                 long = "not-before-lt"
 | |
|                 type = "string"
 | |
|                 argument = "datetime"
 | |
|                 help = "check that the certificate's notBefore is before the given time"
 | |
|         }
 | |
|         option = {
 | |
|                 long = "not-before-gt"
 | |
|                 type = "string"
 | |
|                 argument = "datetime"
 | |
|                 help = "check that the certificate's notBefore is after the given time"
 | |
|         }
 | |
|         option = {
 | |
|                 long = "has-private-key"
 | |
|                 type = "flag"
 | |
|                 help = "check that the certificate has a private key"
 | |
|         }
 | |
|         option = {
 | |
|                 long = "lacks-private-key"
 | |
|                 type = "flag"
 | |
|                 help = "check that the certificate does not have a private key"
 | |
|         }
 | |
|         name = "acert"
 | |
|         min_args = "1"
 | |
|         max_args = "1"
 | |
|         argument = "certificate-store"
 | |
|         help = "Assert certificate content"
 | |
| }
 | |
| command = {
 | |
| 	name = "help"
 | |
| 	name = "?"
 | |
| 	argument = "[command]"
 | |
| 	min_args = "0"
 | |
| 	max_args = "1"
 | |
| 	help = "Help! I need somebody"
 | |
| }
 |