123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125 |
- // Copyright 2021 Tencent Inc. All rights reserved.
- package utils
- import (
- "crypto/rsa"
- "crypto/x509"
- "encoding/pem"
- "errors"
- "fmt"
- "io/ioutil"
- "time"
- )
- // LoadCertificate 通过证书的文本内容加载证书
- func LoadCertificate(certificateStr string) (certificate *x509.Certificate, err error) {
- block, _ := pem.Decode([]byte(certificateStr))
- if block == nil {
- return nil, fmt.Errorf("decode certificate err")
- }
- if block.Type != "CERTIFICATE" {
- return nil, fmt.Errorf("the kind of PEM should be CERTIFICATE")
- }
- certificate, err = x509.ParseCertificate(block.Bytes)
- if err != nil {
- return nil, fmt.Errorf("parse certificate err:%s", err.Error())
- }
- return certificate, nil
- }
- // LoadPrivateKey 通过私钥的文本内容加载私钥
- func LoadPrivateKey(privateKeyStr string) (privateKey *rsa.PrivateKey, err error) {
- block, _ := pem.Decode([]byte(privateKeyStr))
- if block == nil {
- return nil, fmt.Errorf("decode private key err")
- }
- if block.Type != "PRIVATE KEY" {
- return nil, fmt.Errorf("the kind of PEM should be PRVATE KEY")
- }
- key, err := x509.ParsePKCS8PrivateKey(block.Bytes)
- if err != nil {
- return nil, fmt.Errorf("parse private key err:%s", err.Error())
- }
- privateKey, ok := key.(*rsa.PrivateKey)
- if !ok {
- return nil, fmt.Errorf("not a RSA private key")
- }
- return privateKey, nil
- }
- // LoadPublicKey 通过公钥的文本内容加载公钥
- func LoadPublicKey(publicKeyStr string) (publicKey *rsa.PublicKey, err error) {
- block, _ := pem.Decode([]byte(publicKeyStr))
- if block == nil {
- return nil, errors.New("decode public key error")
- }
- if block.Type != "PUBLIC KEY" {
- return nil, fmt.Errorf("the kind of PEM should be PUBLIC KEY")
- }
- key, err := x509.ParsePKIXPublicKey(block.Bytes)
- if err != nil {
- return nil, fmt.Errorf("parse public key err:%s", err.Error())
- }
- publicKey, ok := key.(*rsa.PublicKey)
- if !ok {
- return nil, fmt.Errorf("%s is not rsa public key", publicKeyStr)
- }
- return publicKey, nil
- }
- // LoadCertificateWithPath 通过证书的文件路径加载证书
- func LoadCertificateWithPath(path string) (certificate *x509.Certificate, err error) {
- certificateBytes, err := ioutil.ReadFile(path)
- if err != nil {
- return nil, fmt.Errorf("read certificate pem file err:%s", err.Error())
- }
- return LoadCertificate(string(certificateBytes))
- }
- // LoadPrivateKeyWithPath 通过私钥的文件路径内容加载私钥
- func LoadPrivateKeyWithPath(path string) (privateKey *rsa.PrivateKey, err error) {
- privateKeyBytes, err := ioutil.ReadFile(path)
- if err != nil {
- return nil, fmt.Errorf("read private pem file err:%s", err.Error())
- }
- return LoadPrivateKey(string(privateKeyBytes))
- }
- // LoadPublicKeyWithPath 通过公钥的文件路径加载公钥
- func LoadPublicKeyWithPath(path string) (publicKey *rsa.PublicKey, err error) {
- publicKeyBytes, err := ioutil.ReadFile(path)
- if err != nil {
- return nil, fmt.Errorf("read certificate pem file err:%s", err.Error())
- }
- return LoadPublicKey(string(publicKeyBytes))
- }
- // GetCertificateSerialNumber 从证书中获取证书序列号
- func GetCertificateSerialNumber(certificate x509.Certificate) string {
- return fmt.Sprintf("%X", certificate.SerialNumber.Bytes())
- }
- // IsCertExpired 判定证书在特定时间是否过期
- //
- // Deprecated: 请使用 IsCertificateExpired
- func IsCertExpired(certificate x509.Certificate, now time.Time) bool {
- return now.After(certificate.NotAfter)
- }
- // IsCertificateExpired 判定证书在特定时间是否过期
- func IsCertificateExpired(certificate x509.Certificate, now time.Time) bool {
- return now.After(certificate.NotAfter)
- }
- // IsCertValid 判定证书在特定时间是否有效
- //
- // Deprecated: 请使用 IsCertificateValid
- func IsCertValid(certificate x509.Certificate, now time.Time) bool {
- return now.After(certificate.NotBefore) && now.Before(certificate.NotAfter)
- }
- // IsCertificateValid 判定证书在特定时间是否有效
- func IsCertificateValid(certificate x509.Certificate, now time.Time) bool {
- return now.After(certificate.NotBefore) && now.Before(certificate.NotAfter)
- }
|