Provided by: tcllib_1.21+dfsg-1_all bug

NAME

       pki - Implementation of the public key cipher

SYNOPSIS

       package require Tcl  8.5

       package require pki  ?0.10?

       ::pki::encrypt ?-binary? ?-hex? ?-pad? ?-nopad? ?-priv? ?-pub? ?--? input key

       ::pki::decrypt ?-binary? ?-hex? ?-unpad? ?-nounpad? ?-priv? ?-pub? ?--? input key

       ::pki::sign input key ?algo?

       ::pki::verify signedmessage plaintext key ?algo?

       ::pki::key key ?password? ?encodePem?

       ::pki::pkcs::parse_key key ?password?

       ::pki::x509::parse_cert cert

       ::pki::rsa::generate bitlength ?exponent?

       ::pki::x509::verify_cert cert trustedcerts ?intermediatecerts?

       ::pki::x509::validate_cert    cert    ?-sign_message    dn_of_signer?    ?-encrypt_message
       dn_of_signer? ?-sign_cert dn_to_be_signed ca_depth? ?-ssl dn?

       ::pki::pkcs::create_csr keylist namelist ?encodePem? ?algo?

       ::pki::pkcs::parse_csr csr

       ::pki::x509::create_cert  signreqlist  cakeylist  serial_number  notBefore  notAfter  isCA
       extensions ?encodePem? ?algo?

_________________________________________________________________________________________________

DESCRIPTION

COMMANDS

       ::pki::encrypt ?-binary? ?-hex? ?-pad? ?-nopad? ?-priv? ?-pub? ?--? input key
              Encrypt a message using PKI (probably RSA).

              Requires the caller to specify either -priv to encrypt with the private key or -pub
              to encrypt with the public key.  The default option is to pad and  return  in  hex.
              One of -pub or -priv must be specified.

              The  -hex option causes the data to be returned in encoded as a hexidecimal string,
              while the -binary option causes the data to be returned as  a  binary  string.   If
              they are specified multiple times, the last one specified is used.

              The  -pad  option causes the data to be padded per PKCS#1 prior to being encrypted.
              The -nopad inhibits this behaviour.  If they are specified multiple times, the last
              one specified is used.

              The input to encrypt is specified as input.

              The  key  parameter,  holding  the  key  to  use,  is  a  return  value from either
              ::pki::pkcs::parse_key, ::pki::x509::parse_cert, or ::pki::rsa::generate.

              Mapping to OpenSSL's openssl application:

              [1]    "openssl rsautl -encrypt" == "::pki::encrypt -binary -pub"

              [2]    "openssl rsautl -sign"    == "::pki::encrypt -binary -priv"

       ::pki::decrypt ?-binary? ?-hex? ?-unpad? ?-nounpad? ?-priv? ?-pub? ?--? input key
              Decrypt a message using PKI (probably RSA). See ::pki::encrypt for option handling.

              Mapping to OpenSSL's openssl application:

              [1]    "openssl rsautl -decrypt" == "::pki::decrypt -binary -priv"

              [2]    "openssl rsautl -verify"  == "::pki::decrypt -binary -pub"

       ::pki::sign input key ?algo?
              Digitally sign message input using the private key.

              If algo is ommited "sha1" is assumed.  Possible  values  for  algo  include  "md5",
              "sha1", "sha256", and "raw". Specifying "raw" for algo will inhibit the building of
              an ASN.1 structure to encode which hashing algorithm  was  chosen.   Attention:  In
              this case the corresponding pkgi::verify must be called with algorithm information.
              Conversely, specifying a non-"raw" algorithm  here  means  that  the  corresponding
              pkgi::verify invokation has to be made without algorithm information.

              The input should be the plain text, hashing will be performed on it.

              The key should include the private key.

       ::pki::verify signedmessage plaintext key ?algo?
              Verify a digital signature using a public key.  Returns true or false.

              Attention:  The  algorithm  information algo has to be specified if and only if the
              pki::sign which generated the signedmessage was called with algorithm  "raw".  This
              inhibited  the  building  of  the  ASN.1  structure  encoding  the  chosen  hashing
              algorithm. Conversely, if a proper algorithm was specified during signing then  you
              must not specify an algorithm here.

       ::pki::key key ?password? ?encodePem?
              Convert  a key structure into a serialized PEM (default) or DER encoded private key
              suitable for other applications.  For RSA keys this means PKCS#1.

       ::pki::pkcs::parse_key key ?password?
              Convert a PKCS#1 private key into a usable key, i.e.  one  which  can  be  used  as
              argument for ::pki::encrypt, ::pki::decrypt, ::pki::sign, and ::pki::verify.

       ::pki::x509::parse_cert cert
              Convert  an X.509 certificate to a usable (public) key. The returned dictionary can
              be used as argument for ::pki:encrypt, ::pki::decrypt, and ::pki::verify.  The cert
              argument  can  be  either  PEM  or  DER  encoded.  In addition to the public keying
              information, the dictionary contains  the  following  keys  containing  certificate
              content as defined in RFC5280 [https://www.rfc-editor.org/rfc/rfc5280#section-4.1]:

              •      subject holds the name of the subject from the certificate.

              •      issuer holds the name of the issuing CA.

              •      serial_number holds the serial number of the certificate.

              •      notBefore holds the starting date for certificate validity.

              •      notAfter holds the ending date for certificate validity.

              •      version holds the X.509 version format.

              •      extensions  holds  a  dictionary  containing  the extensions included in the
                     certificate (see below).

              The dictionary holds additional entries related to keying. These are  intended  for
              use of the above-mentioned commands for cryptographic operations.

              The  extensions key in the returned dictionary holds a nested dictionary whose keys
              correspond  to  the  names  (with  same  exact  case)  in  Certificate   Extensions
              [https://www.rfc-editor.org/rfc/rfc5280#section-4.2] in RFC5280. The format of each
              value is also based on the  ASN.1  structures  defined  there.   See  the  Examples
              [#section3] for an illustration.

       ::pki::rsa::generate bitlength ?exponent?
              Generate  a  new  RSA  key  pair,  the  parts  of which can be used as argument for
              ::pki::encrypt, ::pki::decrypt, ::pki::sign, and ::pki::verify.

              The bitlength argument is the length of the public key modulus.

              The exponent argument should generally not be specified unless you really know what
              you are doing.

       ::pki::x509::verify_cert cert trustedcerts ?intermediatecerts?
              Verify  that  a  trust  can  be found between the certificate specified in the cert
              argument and one of the certificates specified in the list of certificates  in  the
              trustedcerts argument.  (Eventually the chain can be through untrusted certificates
              listed in the intermediatecerts argument, but  this  is  currently  unimplemented).
              The  certificates  specified  in  the cert and trustedcerts option should be parsed
              (from ::pki::x509::parse_cert).

       ::pki::x509::validate_cert    cert    ?-sign_message    dn_of_signer?    ?-encrypt_message
       dn_of_signer? ?-sign_cert dn_to_be_signed ca_depth? ?-ssl dn?
              Validate  that  a  certificate  is  valid to be used in some capacity.  If multiple
              options are specified they must all be met for this procedure to return "true".

              Currently,  only  the  -sign_cert  option  is  functional.    Its   arguments   are
              dn_to_be_signed  and  ca_depth.   The dn_to_be_signed is the distinguished from the
              subject of a certificate to verify that  the  certificate  specified  in  the  cert
              argument  can  sign.   The ca_depth argument is used to indicate at which depth the
              verification should be done at.  Some certificates are limited to how far down  the
              chain they can be used to verify a given certificate.

       ::pki::pkcs::create_csr keylist namelist ?encodePem? ?algo?
              Generate  a  certificate  signing  request from a key pair specified in the keylist
              argument.

              The namelist argument is a list of "name" followed by "value" pairs to encoding  as
              the requested distinguished name in the CSR.

              The  encodePem  option specifies whether or not the result should be PEM encoded or
              DER encoded.  A "true" value results in the result being  PEM  encoded,  while  any
              other  value  9results  in  the  the result being DER encoded.  DER encoding is the
              default.

              The algo argument specifies the hashing  algorithm  we  should  use  to  sign  this
              certificate  signing  request  with.  The default is "sha1".  Other possible values
              include "md5" and "sha256".

       ::pki::pkcs::parse_csr csr
              Parse a Certificate Signing Request. The csr argument can  be  either  PEM  or  DER
              encoded. The command returns a dictionary that includes the following keys:

              •      subject - contains the subject name from the CSR.

              •      type  -  contains  the  public  key  algorithm  name.  Currently only rsa is
                     supported.

              •      extensionRequest  -  contains  a  dictionary  with  the  contents   of   the
                     extensionRequest      [https://datatracker.ietf.org/doc/html/rfc2986#page-5]
                     information in the CSR.  This  has  the  same  form  as  described  for  the
                     extensions dictionary in the documentation for parse_cert.

              There  may  be  other keys in the dictionary related to the public key algorithm in
              use.

       ::pki::x509::create_cert  signreqlist  cakeylist  serial_number  notBefore  notAfter  isCA
       extensions ?encodePem? ?algo?
              Sign    a    signing    request    (usually    from    ::pki::pkcs::create_csr   or
              ::pki::pkcs::parse_csr) with a Certificate Authority (CA) certificate.

              The signreqlist argument should be the parsed signing request.

              The cakeylist argument should be the parsed CA certificate.

              The serial_number argument should be a serial number  unique  to  this  certificate
              from this certificate authority.

              The notBefore and notAfter arguments should contain the time before and after which
              (respectively) the certificate should be considered invalid.  The  time  should  be
              encoded  as  something clock format will accept (i.e., the results of clock seconds
              and clock add).

              The isCA argument is a boolean  argument  describing  whether  or  not  the  signed
              certificate  should  be  a  a  CA  certificate.   If  specified as true the "id-ce-
              basicConstraints" extension is added with the arguments of "critical"  being  true,
              "allowCA" being true, and caDepth being -1 (infinite).

              The extensions argument is a list of extensions and their parameters that should be
              encoded into the created certificate.   Currently only one extension is  understood
              ("id-ce-basicConstraints").   It  accepts three arguments critical allowCA caDepth.
              The critical argument to this extension (and any  extension)  whether  or  not  the
              validator  should  reject  the certificate as invalid if it does not understand the
              extension (if set to "true") or should ignore the extension (if  set  to  "false").
              The allowCA argument is used to specify as a boolean value whether or not we can be
              used a certificate  authority  (CA).   The  caDepth  argument  indicates  how  many
              children  CAs  can  be children of this CA in a depth-wise fashion.  A value of "0"
              for the caDepth argument means that this CA cannot sign a CA certificate  and  have
              the result be valid.  A value of "-1" indicates infinite depth.

EXAMPLES

       The example below retrieves a certificate from www.example.com using the TLS extension and
       dumps its content.

                  % set so [tls::socket www.example.com 443]
                  sock00000229EB84E710
                  % tls::handshake $so
                  1
                  % set status [tls::status $so]
                  ...output not shown...
                  % set cert_pem [dict get $status certificate]
                  ...output not shown...
                  % set cert [::pki::x509::parse_cert $cert_pem]
                  ...output not shown...
                  % dict get $cert subject
                  C=US, ST=California, L=Los Angeles, O=Internet Corporation for Assigned Names and Numbers, CN=www.example.org
                  % dict get $cert issuer
                  C=US, O=DigiCert Inc, CN=DigiCert TLS RSA SHA256 2020 CA1
                  % clock format [dict get $cert notAfter]
                  Sun Dec 26 05:29:59 +0530 2021
                  % set extensions [dict get $cert extensions]
                  ...output not shown...
                  % dict keys $extensions
                  authorityKeyIdentifier subjectKeyIdentifier subjectAltName keyUsage extKeyUsage cRLDistributionPoints certificatePolicies authorityInfoAccess id-ce-basicConstraints basicConstraints 1.3.6.1.4.1.11129.2.4.2
                  dict get $extensions basicConstraints
                  1 {0 -1}
                  % dict get $extensions keyUsage
                  1 {5 digitalSignature keyEncipherment}
                  % dict get $extensions extKeyUsage
                  0 {serverAuth clientAuth}
                  % dict get $extensions subjectAltName
                  0 {dNSName www.example.org dNSName example.com dNSName example.edu dNSName example.net dNSName example.org dNSName www.example.com dNSName www.example.edu dNSName www.example.net}
                  % dict get $extensions basicConstraints
                  1 {0 -1}
                  % dict get $extensions keyUsage
                  1 {5 digitalSignature keyEncipherment}
                  % dict get $extensions extKeyUsage
                  0 {serverAuth clientAuth}

REFERENCES

       [1]    Internet X.509 Public Key Infrastructure  Certificate  and  Certificate  Revocation
              List (CRL) Profile [https://www.rfc-editor.org/rfc/rfc5280]

       [2]    New   ASN.1   Modules   for  the  Public  Key  Infrastructure  Using  X.509  (PKIX)
              [https://www.rfc-editor.org/rfc/rfc5912]

       [3]    PKCS   #10:   Certification   Request   Syntax   Specification    [https://www.rfc-
              editor.org/rfc/rfc2986]

AUTHORS

       Roy Keene, Ashok P. Nadkarni

BUGS, IDEAS, FEEDBACK

       This  document,  and  the  package  it  describes, will undoubtedly contain bugs and other
       problems.   Please  report  such  in   the   category   rsa   of   the   Tcllib   Trackers
       [http://core.tcl.tk/tcllib/reportlist].  Please also report any ideas for enhancements you
       may have for either package and/or documentation.

       When proposing code changes, please provide unified diffs, i.e the output of diff -u.

       Note further that attachments are strongly preferred over inlined patches. Attachments can
       be  made  by going to the Edit form of the ticket immediately after its creation, and then
       using the left-most button in the secondary navigation bar.

SEE ALSO

       aes(3tcl), blowfish(3tcl), des(3tcl), md5(3tcl), sha1(3tcl)

KEYWORDS

       cipher, data integrity, encryption, public key cipher, rsa, security

CATEGORY

       Hashes, checksums, and encryption

COPYRIGHT

       Copyright (c) 2010, 2011, 2012, 2013, 2021 Roy Keene, Andreas Kupries, Ashok P. Nadkarni