Ruby 2.4
OpenSSL

OpenSSL::X509::Certificate

class OpenSSL::X509::Certificate

父类:Object

实施RFC 5280中规定的X.509证书。提供对证书属性的访问,并允许从字符串中读取证书,但也支持从头开始创建新证书。

从文件中读取证书

证书能够处理以OpenSSL的PEM格式编码的DER编码证书和证书。

raw = File.read "cert.cer" # DER- or PEM-encoded certificate = OpenSSL::X509::Certificate.new raw

将证书保存到文件

证书可以用DER格式编码

cert = ... File.open("cert.cer", "wb") { |f| f.print cert.to_der }

或以PEM格式

cert = ... File.open("cert.pem", "wb") { |f| f.print cert.to_pem }

X.509证书与私钥/公钥对(通常是RSA,DSA或ECC密钥)相关联(另请参阅OpenSSL :: PKey :: RSA,OpenSSL :: PKey :: DSA和OpenSSL :: PKey :: EC),公钥本身存储在证书中,可以以OpenSSL :: PKey的形式访问。证书通常用于将某种形式的身份与密钥对相关联,例如,通过HTTP服务页面的Web服务器使用证书向用户进行身份验证。

公钥基础设施(PKI)模型依赖颁发这些证书的可信证书颁发机构(“根CA”),因此最终用户需要将其信任基础放在选定的少数几个权威人士身上,这些权威人员再次为下属CA颁发证书终端用户。

OpenSSL :: X509模块提供了设置独立PKI的工具,类似于'openssl'命令行工具用于在私有PKI中颁发证书的场景。

创建根CA证书和最终实体证书

首先,我们需要创建一个“自签名”根证书。为此,我们需要首先生成密钥。请注意,选择“1”作为序列号被视为真正证书的安全缺陷。安全选择是两位字节范围内的整数,理想情况下不是顺序但安全的随机数字,这里省略步骤以保持示例简洁。

root_key = OpenSSL::PKey::RSA.new 2048 # the CA's public/private key root_ca = OpenSSL::X509::Certificate.new root_ca.version = 2 # cf. RFC 5280 - to make it a "v3" certificate root_ca.serial = 1 root_ca.subject = OpenSSL::X509::Name.parse "/DC=org/DC=ruby-lang/CN=Ruby CA" root_ca.issuer = root_ca.subject # root CA's are "self-signed" root_ca.public_key = root_key.public_key root_ca.not_before = Time.now root_ca.not_after = root_ca.not_before + 2 * 365 * 24 * 60 * 60 # 2 years validity ef = OpenSSL::X509::ExtensionFactory.new ef.subject_certificate = root_ca ef.issuer_certificate = root_ca root_ca.add_extension(ef.create_extension("basicConstraints","CA:TRUE",true)) root_ca.add_extension(ef.create_extension("keyUsage","keyCertSign, cRLSign", true)) root_ca.add_extension(ef.create_extension("subjectKeyIdentifier","hash",false)) root_ca.add_extension(ef.create_extension("authorityKeyIdentifier","keyid:always",false)) root_ca.sign(root_key, OpenSSL::Digest::SHA256.new)

下一步是使用根CA证书创建最终实体证书。

key = OpenSSL::PKey::RSA.new 2048 cert = OpenSSL::X509::Certificate.new cert.version = 2 cert.serial = 2 cert.subject = OpenSSL::X509::Name.parse "/DC=org/DC=ruby-lang/CN=Ruby certificate" cert.issuer = root_ca.subject # root CA is the issuer cert.public_key = key.public_key cert.not_before = Time.now cert.not_after = cert.not_before + 1 * 365 * 24 * 60 * 60 # 1 years validity ef = OpenSSL::X509::ExtensionFactory.new ef.subject_certificate = cert ef.issuer_certificate = root_ca cert.add_extension(ef.create_extension("keyUsage","digitalSignature", true)) cert.add_extension(ef.create_extension("subjectKeyIdentifier","hash",false)) cert.sign(root_key, OpenSSL::Digest::SHA256.new)

公共类方法

new → cert 显示源

new(string) → cert

static VALUE ossl_x509_initialize(int argc, VALUE *argv, VALUE self) { BIO *in; X509 *x509, *x = DATA_PTR(self VALUE arg; if (rb_scan_args(argc, argv, "01", &arg) == 0) { /* create just empty X509Cert */ return self; } arg = ossl_to_der_if_possible(arg in = ossl_obj2bio(arg x509 = PEM_read_bio_X509(in, &x, NULL, NULL DATA_PTR(self) = x; if (!x509) { OSSL_BIO_reset(in x509 = d2i_X509_bio(in, &x DATA_PTR(self) = x; } BIO_free(in if (!x509) ossl_raise(eX509CertError, NULL return self; }

公共实例方法

add_extension(extension) → extension 显示源

static VALUE ossl_x509_add_extension(VALUE self, VALUE extension) { X509 *x509; X509_EXTENSION *ext; GetX509(self, x509 ext = GetX509ExtPtr(extension if (!X509_add_ext(x509, ext, -1)) { /* DUPs ext - FREE it */ ossl_raise(eX509CertError, NULL } return extension; }

check_private_key(key) 显示源

检查“密钥”是否为此证书的PRIV密钥

static VALUE ossl_x509_check_private_key(VALUE self, VALUE key) { X509 *x509; EVP_PKEY *pkey; /* not needed private key, but should be */ pkey = GetPrivPKeyPtr(key /* NO NEED TO DUP */ GetX509(self, x509 if (!X509_check_private_key(x509, pkey)) { ossl_clear_error( return Qfalse; } return Qtrue; }

extensions → extension...()

static VALUE ossl_x509_get_extensions(VALUE self) { X509 *x509; int count, i; X509_EXTENSION *ext; VALUE ary; GetX509(self, x509 count = X509_get_ext_count(x509 if (count < 0) { return rb_ary_new( } ary = rb_ary_new2(count for (i=0; i<count; i++) { ext = X509_get_ext(x509, i /* NO DUP - don't free! */ rb_ary_push(ary, ossl_x509ext_new(ext) } return ary; }

extensions = ext... → ext...()

static VALUE ossl_x509_set_extensions(VALUE self, VALUE ary) { X509 *x509; X509_EXTENSION *ext; long i; Check_Type(ary, T_ARRAY /* All ary's members should be X509Extension */ for (i=0; i<RARRAY_LEN(ary i++) { OSSL_Check_Kind(RARRAY_AREF(ary, i), cX509Ext } GetX509(self, x509 while ((ext = X509_delete_ext(x509, 0))) X509_EXTENSION_free(ext for (i=0; i<RARRAY_LEN(ary i++) { ext = GetX509ExtPtr(RARRAY_AREF(ary, i) if (!X509_add_ext(x509, ext, -1)) { /* DUPs ext */ ossl_raise(eX509CertError, NULL } } return ary; }

inspect() 显示源

static VALUE ossl_x509_inspect(VALUE self) { return rb_sprintf("#<%"PRIsVALUE": subject=%+"PRIsVALUE", " "issuer=%+"PRIsVALUE", serial=%+"PRIsVALUE", " "not_before=%+"PRIsVALUE", not_after=%+"PRIsVALUE">", rb_obj_class(self), ossl_x509_get_subject(self), ossl_x509_get_issuer(self), ossl_x509_get_serial(self), ossl_x509_get_not_before(self), ossl_x509_get_not_after(self) }

issuer → name 显示源

static VALUE ossl_x509_get_issuer(VALUE self) { X509 *x509; X509_NAME *name; GetX509(self, x509 if(!(name = X509_get_issuer_name(x509))) { /* NO DUP - don't free! */ ossl_raise(eX509CertError, NULL } return ossl_x509name_new(name }

issuer = name → name 显示源

static VALUE ossl_x509_set_issuer(VALUE self, VALUE issuer) { X509 *x509; GetX509(self, x509 if (!X509_set_issuer_name(x509, GetX509NamePtr(issuer))) { /* DUPs name */ ossl_raise(eX509CertError, NULL } return issuer; }

not_after → time 显示源

static VALUE ossl_x509_get_not_after(VALUE self) { X509 *x509; const ASN1_TIME *asn1time; GetX509(self, x509 if (!(asn1time = X509_get0_notAfter(x509))) { ossl_raise(eX509CertError, NULL } return asn1time_to_time(asn1time }

not_after = time → time 显示源

static VALUE ossl_x509_set_not_after(VALUE self, VALUE time) { X509 *x509; ASN1_TIME *asn1time; GetX509(self, x509 asn1time = ossl_x509_time_adjust(NULL, time if (!X509_set_notAfter(x509, asn1time)) { ASN1_TIME_free(asn1time ossl_raise(eX509CertError, "X509_set_notAfter" } ASN1_TIME_free(asn1time return time; }

not_before → time 显示源

static VALUE ossl_x509_get_not_before(VALUE self) { X509 *x509; const ASN1_TIME *asn1time; GetX509(self, x509 if (!(asn1time = X509_get0_notBefore(x509))) { ossl_raise(eX509CertError, NULL } return asn1time_to_time(asn1time }

not_before = time → time 显示源

static VALUE ossl_x509_set_not_before(VALUE self, VALUE time) { X509 *x509; ASN1_TIME *asn1time; GetX509(self, x509 asn1time = ossl_x509_time_adjust(NULL, time if (!X509_set_notBefore(x509, asn1time)) { ASN1_TIME_free(asn1time ossl_raise(eX509CertError, "X509_set_notBefore" } ASN1_TIME_free(asn1time return time; }

pretty_print(q) 显示源

# File ext/openssl/lib/openssl/x509.rb, line 163 def pretty_print(q) q.object_group(self) { q.breakable q.text 'subject='; q.pp self.subject; q.text ','; q.breakable q.text 'issuer='; q.pp self.issuer; q.text ','; q.breakable q.text 'serial='; q.pp self.serial; q.text ','; q.breakable q.text 'not_before='; q.pp self.not_before; q.text ','; q.breakable q.text 'not_after='; q.pp self.not_after } end

public_key → key 显示源

static VALUE ossl_x509_get_public_key(VALUE self) { X509 *x509; EVP_PKEY *pkey; GetX509(self, x509 if (!(pkey = X509_get_pubkey(x509))) { /* adds an reference */ ossl_raise(eX509CertError, NULL } return ossl_pkey_new(pkey /* NO DUP - OK */ }

public_key = key → key 显示源

static VALUE ossl_x509_set_public_key(VALUE self, VALUE key) { X509 *x509; GetX509(self, x509 if (!X509_set_pubkey(x509, GetPKeyPtr(key))) { /* DUPs pkey */ ossl_raise(eX509CertError, NULL } return key; }

serial → integer 显示源

static VALUE ossl_x509_get_serial(VALUE self) { X509 *x509; GetX509(self, x509 return asn1integer_to_num(X509_get_serialNumber(x509) }

serial = integer → integer 显示源

static VALUE ossl_x509_set_serial(VALUE self, VALUE num) { X509 *x509; GetX509(self, x509 X509_set_serialNumber(x509, num_to_asn1integer(num, X509_get_serialNumber(x509)) return num; }

sign(key, digest) → self 显示源

static VALUE ossl_x509_sign(VALUE self, VALUE key, VALUE digest) { X509 *x509; EVP_PKEY *pkey; const EVP_MD *md; pkey = GetPrivPKeyPtr(key /* NO NEED TO DUP */ md = GetDigestPtr(digest GetX509(self, x509 if (!X509_sign(x509, pkey, md)) { ossl_raise(eX509CertError, NULL } return self; }

signature_algorithm → string 显示源

static VALUE ossl_x509_get_signature_algorithm(VALUE self) { X509 *x509; BIO *out; VALUE str; GetX509(self, x509 out = BIO_new(BIO_s_mem() if (!out) ossl_raise(eX509CertError, NULL if (!i2a_ASN1_OBJECT(out, X509_get0_tbs_sigalg(x509)->algorithm)) { BIO_free(out ossl_raise(eX509CertError, NULL } str = ossl_membio2str(out return str; }

subject → name 显示源

static VALUE ossl_x509_get_subject(VALUE self) { X509 *x509; X509_NAME *name; GetX509(self, x509 if (!(name = X509_get_subject_name(x509))) { /* NO DUP - don't free! */ ossl_raise(eX509CertError, NULL } return ossl_x509name_new(name }

subject = name → name 显示源

static VALUE ossl_x509_set_subject(VALUE self, VALUE subject) { X509 *x509; GetX509(self, x509 if (!X509_set_subject_name(x509, GetX509NamePtr(subject))) { /* DUPs name */ ossl_raise(eX509CertError, NULL } return subject; }

to_der → string 显示源

static VALUE ossl_x509_to_der(VALUE self) { X509 *x509; VALUE str; long len; unsigned char *p; GetX509(self, x509 if ((len = i2d_X509(x509, NULL)) <= 0) ossl_raise(eX509CertError, NULL str = rb_str_new(0, len p = (unsigned char *)RSTRING_PTR(str if (i2d_X509(x509, &p) <= 0) ossl_raise(eX509CertError, NULL ossl_str_adjust(str, p return str; }

to_pem → string 显示源

static VALUE ossl_x509_to_pem(VALUE self) { X509 *x509; BIO *out; VALUE str; GetX509(self, x509 out = BIO_new(BIO_s_mem() if (!out) ossl_raise(eX509CertError, NULL if (!PEM_write_bio_X509(out, x509)) { BIO_free(out ossl_raise(eX509CertError, NULL } str = ossl_membio2str(out return str; }

另外别名为:to_s

to_s()

别名为:to_pem

to_text → string 显示源

static VALUE ossl_x509_to_text(VALUE self) { X509 *x509; BIO *out; VALUE str; GetX509(self, x509 out = BIO_new(BIO_s_mem() if (!out) ossl_raise(eX509CertError, NULL if (!X509_print(out, x509)) { BIO_free(out ossl_raise(eX509CertError, NULL } str = ossl_membio2str(out return str; }

verify(key) → true | false 显示源

检查证书签名是用PRIVversion这个PUBLIC'key'

static VALUE ossl_x509_verify(VALUE self, VALUE key) { X509 *x509; EVP_PKEY *pkey; pkey = GetPKeyPtr(key /* NO NEED TO DUP */ GetX509(self, x509 switch (X509_verify(x509, pkey)) { case 1: return Qtrue; case 0: ossl_clear_error( return Qfalse; default: ossl_raise(eX509CertError, NULL } }

version → integer 显示源

static VALUE ossl_x509_get_version(VALUE self) { X509 *x509; GetX509(self, x509 return LONG2NUM(X509_get_version(x509) }

version = integer → integer 显示源

static VALUE ossl_x509_set_version(VALUE self, VALUE version) { X509 *x509; long ver; if ((ver = NUM2LONG(version)) < 0) { ossl_raise(eX509CertError, "version must be >= 0!" } GetX509(self, x509 if (!X509_set_version(x509, ver)) { ossl_raise(eX509CertError, NULL } return version; }