我正在使用Windows证书编写带有OpenSSL的gSoap客户端。我有一个PEM证书和一个PEM私钥。当我将它们组合成一个文件并将其提供给gSoap时,它可以正常工作:
soap_ssl_client_context( &soap,
SOAP_SSL_DEFAULT,
"certkey.pem", /* required only when client must authenticate to server */
NULL, /* password to read the key file (not used with GNUTLS) */
NULL, /* cacert file to store trusted certificates */
NULL, /* capath to directory with trusted certificates */
NULL /* if randfile!=NULL: use a file with random data to seed randomness */
)
但是,当我将证书安装到Windows存储中并通过X509_STORE_add_cert从那里加载它时,它不起作用。我的猜测是我必须以某种方式使用私钥,但我不知道该以哪种方式使用。我该怎么办?
答案 0 :(得分:1)
您正确的需要加载私钥,并且X509_STORE_add_cert不正确。如果要将证书用于服务器或客户端,则需要使用SSL_CTX_use_xxx或SSL_use_xxx作为证书和证书的私钥,将证书设置为ssl上下文。
例如
SSL_CTX_use_certificate_chain_file(ctx, "cert.pem");
SSL_CTX_use_PrivateKey_file(ctx, "cert.pem", SSL_FILETYPE_PEM);
以上假设“ cert.pem”同时包含证书链和私钥。
更新:
我假设“ Windows存储”是指“ Windows证书存储”。 在Windows证书存储区中使用证书的主要问题是私钥的使用。如果私钥标记为“不可导出”,则只能使用Windows Crypto API“使用”私钥。因此,如果您希望使用带有存储在Windows证书存储区中的私钥的证书,则需要将证书(足够容易)“导出”,并将私钥导出到openssl x509和rsa对象中以在SSL_CTX_xxx函数中使用。我发现导出私钥的最佳方法是使用NCryptExportKey和BCRYPT_RSAFULLPRIVATE_BLOB blob类型,然后使用BCRYPT_RSAKEY_BLOB将RSA手动分解为openssl RSA_setxxx结构功能。
RSA* extract_private_key(const PCCERT_CONTEXT context)
{
HCRYPTPROV_OR_NCRYPT_KEY_HANDLE key_handle;
DWORD key_spec = 0;
BOOL free_key;
if (!CryptAcquireCertificatePrivateKey(context, CRYPT_ACQUIRE_ONLY_NCRYPT_KEY_FLAG | CRYPT_ACQUIRE_SILENT_FLAG, nullptr, &key_handle, &key_spec, &free_key))
{
return nullptr;
}
RSA* rsa = nullptr;
DWORD length = 0;
if(SUCCEEDED(NCryptExportKey(key_handle, NULL, BCRYPT_RSAFULLPRIVATE_BLOB, nullptr, nullptr, 0, &length, 0)))
{
auto data = std::make_unique<BYTE[]>(length);
if(SUCCEEDED(NCryptExportKey(key_handle, NULL, BCRYPT_RSAFULLPRIVATE_BLOB, nullptr, data.get(), length, &length, 0)))
{
// https://docs.microsoft.com/en-us/windows/desktop/api/bcrypt/ns-bcrypt-_bcrypt_rsakey_blob
auto const blob = reinterpret_cast<BCRYPT_RSAKEY_BLOB*>(data.get());
if(blob->Magic == BCRYPT_RSAFULLPRIVATE_MAGIC)
{
rsa = RSA_new();
// n is the modulus common to both public and private key
auto const n = BN_bin2bn(data.get() + sizeof(BCRYPT_RSAKEY_BLOB) + blob->cbPublicExp, blob->cbModulus, nullptr);
// e is the public exponent
auto const e = BN_bin2bn(data.get() + sizeof(BCRYPT_RSAKEY_BLOB), blob->cbPublicExp, nullptr);
// d is the private exponent
auto const d = BN_bin2bn(data.get() + sizeof(BCRYPT_RSAKEY_BLOB) + blob->cbPublicExp + blob->cbModulus + blob->cbPrime1 + blob->cbPrime2 + blob->cbPrime1 + blob->cbPrime2 + blob->cbPrime1, blob->cbModulus, nullptr);
RSA_set0_key(rsa, n, e, d);
// p and q are the first and second factor of n
auto const p = BN_bin2bn(data.get() + sizeof(BCRYPT_RSAKEY_BLOB) + blob->cbPublicExp + blob->cbModulus, blob->cbPrime1, nullptr);
auto const q = BN_bin2bn(data.get() + sizeof(BCRYPT_RSAKEY_BLOB) + blob->cbPublicExp + blob->cbModulus + blob->cbPrime1, blob->cbPrime2, nullptr);
RSA_set0_factors(rsa, p, q);
// dmp1, dmq1 and iqmp are the exponents and coefficient for CRT calculations
auto const dmp1 = BN_bin2bn(data.get() + sizeof(BCRYPT_RSAKEY_BLOB) + blob->cbPublicExp + blob->cbModulus + blob->cbPrime1 + blob->cbPrime2, blob->cbPrime1, nullptr);
auto const dmq1 = BN_bin2bn(data.get() + sizeof(BCRYPT_RSAKEY_BLOB) + blob->cbPublicExp + blob->cbModulus + blob->cbPrime1 + blob->cbPrime2 + blob->cbPrime1, blob->cbPrime2, nullptr);
auto const iqmp = BN_bin2bn(data.get() + sizeof(BCRYPT_RSAKEY_BLOB) + blob->cbPublicExp + blob->cbModulus + blob->cbPrime1 + blob->cbPrime2 + blob->cbPrime1 + blob->cbPrime2, blob->cbPrime1, nullptr);
RSA_set0_crt_params(rsa, dmp1, dmq1, iqmp);
}
}
}
if(free_key)
{
NCryptFreeObject(key_handle);
}
return rsa;
}
bool set_ctx_certificate_and_private_key(SSL_CTX* ctx, const PCCERT_CONTEXT context)
{
auto const x509 = d2i_X509(nullptr, const_cast<const unsigned char **>(&context->pbCertEncoded), context->cbCertEncoded);
if (!x509)
{
return false;
}
if(!SSL_CTX_use_certificate(ctx, x509))
{
X509_free(x509);
return false;
}
X509_free(x509);
auto const rsa = extract_private_key(context);
if (!rsa)
{
return false;
}
auto const success = SSL_CTX_use_RSAPrivateKey(ctx, rsa) == 1;
RSA_free(rsa);
return success;
}