import (
"crypto"
+ "crypto/ecdsa"
"crypto/ed25519"
+ "crypto/elliptic"
"crypto/rand"
"crypto/x509"
"crypto/x509/pkix"
"time"
)
-type Keypair struct {
+type X509Keypair struct {
cert *x509.Certificate
prv crypto.PrivateKey
}
var (
- hostCerts = make(map[string]*Keypair)
+ hostCerts = make(map[string]*X509Keypair)
hostCertsM sync.Mutex
Serial *big.Int
+ X509Algo string
)
func init() {
}
}
-func newKeypair(
+func NewKeypair(ai string) (pub, prv any) {
+ switch ai {
+ case "ecdsa":
+ prvEcdsa, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
+ if err != nil {
+ log.Fatalln(err)
+ }
+ prv = prvEcdsa
+ pub = prvEcdsa.Public()
+ case "eddsa":
+ var err error
+ pub, prv, err = ed25519.GenerateKey(rand.Reader)
+ if err != nil {
+ log.Fatalln(err)
+ }
+ default:
+ log.Fatalln("unknown algorithm specified")
+ }
+ return
+}
+
+func newX509Keypair(
host string,
caCert *x509.Certificate,
caPrv crypto.PrivateKey,
-) *Keypair {
- pub, prv, err := ed25519.GenerateKey(rand.Reader)
- if err != nil {
- log.Fatalln(err)
- }
+) *X509Keypair {
+ pub, prv := NewKeypair(X509Algo)
notBefore := time.Now()
notAfter := notBefore.Add(24 * time.Hour)
Serial = Serial.Add(Serial, big.NewInt(1))
if err != nil {
log.Fatalln(err)
}
- return &Keypair{cert, prv}
+ return &X509Keypair{cert, prv}
}