src/context.c

Sat, 17 Dec 2011 10:30:58 -0800

author
Paul Aurich <paul@darkrain42.org>
date
Sat, 17 Dec 2011 10:30:58 -0800
changeset 45
5be249c0ae71
parent 43
708d39695790
permissions
-rw-r--r--

context: Add no_compression for OpenSSL 0.9.8 as well

Since OpenSSL 0.9.8 doesn't have SSL_OP_NO_COMPRESSION, this is
implemented by simplying NULLing out the SSL_CTX->comp_methods stack.

0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
1 /*--------------------------------------------------------------------------
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
2 * LuaSec 0.4
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
3 * Copyright (C) 2006-2009 Bruno Silvestre
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
4 *
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
5 *--------------------------------------------------------------------------*/
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
6
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
7 #include <string.h>
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
8 #include <openssl/ssl.h>
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
9 #include <openssl/err.h>
41
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
10 #include <openssl/x509.h>
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
11 #include <openssl/x509v3.h>
0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
12
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
13 #include <lua.h>
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
14 #include <lauxlib.h>
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
15
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
16 #include "context.h"
41
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
17 #include "ssl.h"
0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
18
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
19 struct ssl_option_s {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
20 const char *name;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
21 unsigned long code;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
22 };
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
23 typedef struct ssl_option_s ssl_option_t;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
24
38
4ecd7b0e67ea Clean up the ex_data callers
Paul Aurich <paul@darkrain42.org>
parents: 36
diff changeset
25 /* index into the SSL storage where the context is.
4ecd7b0e67ea Clean up the ex_data callers
Paul Aurich <paul@darkrain42.org>
parents: 36
diff changeset
26 * see SSL_CTX_get_ex_data().
4ecd7b0e67ea Clean up the ex_data callers
Paul Aurich <paul@darkrain42.org>
parents: 36
diff changeset
27 */
4ecd7b0e67ea Clean up the ex_data callers
Paul Aurich <paul@darkrain42.org>
parents: 36
diff changeset
28 static int luasec_sslctx_idx = -1;
34
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
29
28
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
30 /* The export DH key */
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
31 static DH *dh_512 = NULL;
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
32 /* The larger key (builtin is 2048, caller may specify larger) */
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
33 static DH *dh_larger = NULL;
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
34
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
35 /* Generated via "openssl dhparam -2 -noout -C 512 2>/dev/null" */
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
36 static unsigned char dh512_p[] = {
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
37 0xE4,0x3F,0x75,0x82,0xAD,0x0B,0x28,0xC7,0xEF,0xCE,0xBC,0x3B,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
38 0x14,0xBB,0xA6,0xF4,0xA2,0xE9,0xA6,0x59,0xCF,0x97,0x1C,0x86,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
39 0x43,0x3B,0x92,0x4A,0x6B,0x15,0x4B,0x0C,0xAC,0x8F,0xFA,0x43,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
40 0xE2,0xA8,0xC3,0x3B,0x7B,0x51,0x1B,0x46,0x21,0xBF,0x8C,0x06,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
41 0x6C,0xB1,0x49,0x75,0xC7,0xAC,0x47,0x1D,0x9D,0x64,0xD5,0x99,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
42 0x33,0x86,0xAD,0xEB,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
43 };
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
44
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
45 /* Generated via "openssl dhparam -2 -noout -C 2048 2>/dev/null" */
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
46 static unsigned char dh2048_p[] = {
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
47 0x9B,0xF4,0xC5,0x57,0x81,0x8F,0xCF,0x31,0x78,0x95,0x04,0xCD,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
48 0xEA,0xCC,0x30,0xEA,0xF7,0xCA,0x76,0xC8,0x8F,0x91,0xEA,0x0E,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
49 0x44,0x8D,0xE2,0x63,0x19,0x3B,0x4D,0x04,0xC8,0x7D,0x0D,0xFF,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
50 0x3D,0x52,0x76,0x02,0xF3,0xCA,0x1C,0x44,0xAF,0x0E,0xA9,0x59,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
51 0x02,0x40,0x75,0xD6,0xED,0x35,0x4D,0x11,0x5B,0x2B,0x73,0x23,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
52 0xE5,0x53,0x0B,0x1F,0xB0,0x47,0xC4,0x7F,0x95,0x5D,0xB0,0xD5,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
53 0xF3,0xD3,0xAB,0x5F,0x28,0x2B,0xEC,0x2C,0x15,0x0B,0x1B,0x0C,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
54 0xD4,0xBE,0x24,0x2F,0xC5,0x07,0x3C,0xE4,0xC5,0xE6,0x16,0x42,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
55 0x4C,0x31,0x04,0xBB,0x80,0x96,0xFF,0x64,0x50,0xA4,0xA5,0xB5,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
56 0xF5,0x3A,0xBA,0x57,0xE4,0xE6,0xC2,0x23,0x0A,0xB6,0x27,0xC4,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
57 0x06,0x01,0x1E,0x98,0x20,0x09,0xC8,0xB7,0x90,0x09,0x86,0x06,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
58 0xAA,0x85,0xE7,0x02,0xC8,0xC6,0xD9,0x1D,0xAB,0x17,0xEE,0x78,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
59 0x73,0x78,0x88,0x7F,0xA7,0xF2,0x34,0xA7,0xDD,0x02,0x16,0x36,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
60 0x0D,0x77,0x16,0x3E,0x95,0xAE,0x02,0xEE,0x36,0x37,0xD5,0x61,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
61 0x5D,0xFE,0xC6,0x0B,0xDF,0xCE,0xB9,0x26,0x31,0x6F,0x34,0x92,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
62 0xBB,0xBB,0x91,0x29,0x77,0x62,0x1D,0x75,0xA0,0x51,0x8D,0x31,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
63 0x4C,0x64,0x4E,0xBF,0xDC,0xE8,0x67,0x17,0x90,0x6A,0x80,0xE9,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
64 0xD7,0xD8,0x56,0x4E,0x85,0x21,0x9C,0xFB,0xE6,0x1B,0xD8,0x05,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
65 0xFD,0x13,0x77,0x00,0x96,0x2D,0x0C,0x2A,0x95,0x1A,0x08,0x82,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
66 0x2E,0xB3,0xE2,0xFC,0xE8,0xA6,0xF1,0x16,0x37,0x57,0x82,0xD6,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
67 0xF5,0xAB,0xA9,0x43,0x8F,0x33,0xB0,0x57,0x38,0x6E,0x61,0xD4,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
68 0xDD,0xE0,0x1C,0xCB,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
69 };
0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
70
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
71 static ssl_option_t ssl_options[] = {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
72 /* OpenSSL 0.9.7 and 0.9.8 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
73 {"all", SSL_OP_ALL},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
74 {"cipher_server_preference", SSL_OP_CIPHER_SERVER_PREFERENCE},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
75 {"dont_insert_empty_fragments", SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
76 {"ephemeral_rsa", SSL_OP_EPHEMERAL_RSA},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
77 {"netscape_ca_dn_bug", SSL_OP_NETSCAPE_CA_DN_BUG},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
78 {"netscape_challenge_bug", SSL_OP_NETSCAPE_CHALLENGE_BUG},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
79 {"microsoft_big_sslv3_buffer", SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
80 {"microsoft_sess_id_bug", SSL_OP_MICROSOFT_SESS_ID_BUG},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
81 {"msie_sslv2_rsa_padding", SSL_OP_MSIE_SSLV2_RSA_PADDING},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
82 {"netscape_demo_cipher_change_bug", SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
83 {"netscape_reuse_cipher_change_bug", SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
84 {"no_session_resumption_on_renegotiation",
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
85 SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
86 {"no_sslv2", SSL_OP_NO_SSLv2},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
87 {"no_sslv3", SSL_OP_NO_SSLv3},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
88 {"no_tlsv1", SSL_OP_NO_TLSv1},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
89 {"pkcs1_check_1", SSL_OP_PKCS1_CHECK_1},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
90 {"pkcs1_check_2", SSL_OP_PKCS1_CHECK_2},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
91 {"single_dh_use", SSL_OP_SINGLE_DH_USE},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
92 {"ssleay_080_client_dh_bug", SSL_OP_SSLEAY_080_CLIENT_DH_BUG},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
93 {"sslref2_reuse_cert_type_bug", SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
94 {"tls_block_padding_bug", SSL_OP_TLS_BLOCK_PADDING_BUG},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
95 {"tls_d5_bug", SSL_OP_TLS_D5_BUG},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
96 {"tls_rollback_bug", SSL_OP_TLS_ROLLBACK_BUG},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
97 /* OpenSSL 0.9.8 only */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
98 #if OPENSSL_VERSION_NUMBER > 0x00908000L
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
99 {"cookie_exchange", SSL_OP_COOKIE_EXCHANGE},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
100 {"no_query_mtu", SSL_OP_NO_QUERY_MTU},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
101 {"single_ecdh_use", SSL_OP_SINGLE_ECDH_USE},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
102 #endif
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
103 /* OpenSSL 0.9.8f and above */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
104 #if defined(SSL_OP_NO_TICKET)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
105 {"no_ticket", SSL_OP_NO_TICKET},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
106 #endif
1
5f89e535765a context.c: Add no_compression option for when supported
Matthew Wild <mwild1@gmail.com>
parents: 0
diff changeset
107 #if defined(SSL_OP_NO_COMPRESSION)
5f89e535765a context.c: Add no_compression option for when supported
Matthew Wild <mwild1@gmail.com>
parents: 0
diff changeset
108 {"no_compression", SSL_OP_NO_COMPRESSION},
5f89e535765a context.c: Add no_compression option for when supported
Matthew Wild <mwild1@gmail.com>
parents: 0
diff changeset
109 #endif
0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
110 {NULL, 0L}
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
111 };
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
112
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
113 /*--------------------------- Auxiliary Functions ----------------------------*/
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
114
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
115 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
116 * Return the context.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
117 */
34
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
118 p_context checkctx(lua_State *L, int idx)
0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
119 {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
120 return (p_context)luaL_checkudata(L, idx, "SSL:Context");
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
121 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
122
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
123 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
124 * Prepare the SSL options flag.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
125 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
126 static int set_option_flag(const char *opt, unsigned long *flag)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
127 {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
128 ssl_option_t *p;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
129 for (p = ssl_options; p->name; p++) {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
130 if (!strcmp(opt, p->name)) {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
131 *flag |= p->code;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
132 return 1;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
133 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
134 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
135 return 0;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
136 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
137
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
138 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
139 * Find the protocol.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
140 */
43
708d39695790 context: Clean up some warnings
Paul Aurich <paul@darkrain42.org>
parents: 42
diff changeset
141 static const SSL_METHOD* str2method(const char *method)
0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
142 {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
143 if (!strcmp(method, "sslv3")) return SSLv3_method();
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
144 if (!strcmp(method, "tlsv1")) return TLSv1_method();
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
145 if (!strcmp(method, "sslv23")) return SSLv23_method();
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
146 return NULL;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
147 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
148
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
149 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
150 * Prepare the SSL handshake verify flag.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
151 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
152 static int set_verify_flag(const char *str, int *flag)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
153 {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
154 if (!strcmp(str, "none")) {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
155 *flag |= SSL_VERIFY_NONE;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
156 return 1;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
157 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
158 if (!strcmp(str, "peer")) {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
159 *flag |= SSL_VERIFY_PEER;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
160 return 1;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
161 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
162 if (!strcmp(str, "client_once")) {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
163 *flag |= SSL_VERIFY_CLIENT_ONCE;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
164 return 1;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
165 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
166 if (!strcmp(str, "fail_if_no_peer_cert")) {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
167 *flag |= SSL_VERIFY_FAIL_IF_NO_PEER_CERT;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
168 return 1;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
169 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
170 return 0;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
171 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
172
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
173 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
174 * Password callback for reading the private key.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
175 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
176 static int passwd_cb(char *buf, int size, int flag, void *udata)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
177 {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
178 lua_State *L = (lua_State*)udata;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
179 switch (lua_type(L, 3)) {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
180 case LUA_TFUNCTION:
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
181 lua_pushvalue(L, 3);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
182 lua_call(L, 0, 1);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
183 if (lua_type(L, -1) != LUA_TSTRING)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
184 return 0;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
185 /* fallback */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
186 case LUA_TSTRING:
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
187 strncpy(buf, lua_tostring(L, -1), size);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
188 buf[size-1] = '\0';
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
189 return (int)strlen(buf);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
190 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
191 return 0;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
192 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
193
28
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
194 static DH *get_dh(const unsigned char *p, int len)
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
195 {
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
196 DH *dh = NULL;
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
197 static unsigned char g[] = { 0x02 };
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
198
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
199 if ((dh = DH_new()) == NULL) return NULL;
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
200 dh->p = BN_bin2bn(p, len, NULL);
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
201 dh->g = BN_bin2bn(g, sizeof(g), NULL);
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
202 if (dh->p == NULL || dh->g == NULL) {
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
203 DH_free(dh);
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
204 return NULL;
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
205 }
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
206
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
207 return dh;
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
208 }
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
209
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
210 /**
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
211 * DH parameter callback
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
212 */
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
213 static DH *dh_param_cb(SSL *ssl, int is_export, int keylength)
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
214 {
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
215 /* Logic in postfix and dovecot, but we're using a 2048-bit group... */
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
216 if (is_export && keylength == 512) {
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
217 if (dh_512 == NULL) { dh_512 = get_dh(dh512_p, sizeof(dh512_p)); }
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
218 return dh_512;
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
219 } else {
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
220 if (dh_larger == NULL) { dh_larger = get_dh(dh2048_p, sizeof(dh2048_p)); }
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
221 return dh_larger;
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
222 }
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
223 }
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
224
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
225
0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
226 /*------------------------------ Lua Functions -------------------------------*/
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
227
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
228 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
229 * Create a SSL context.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
230 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
231 static int create(lua_State *L)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
232 {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
233 p_context ctx;
43
708d39695790 context: Clean up some warnings
Paul Aurich <paul@darkrain42.org>
parents: 42
diff changeset
234 const SSL_METHOD *method;
0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
235
38
4ecd7b0e67ea Clean up the ex_data callers
Paul Aurich <paul@darkrain42.org>
parents: 36
diff changeset
236 if (luasec_sslctx_idx == -1) {
4ecd7b0e67ea Clean up the ex_data callers
Paul Aurich <paul@darkrain42.org>
parents: 36
diff changeset
237 luasec_sslctx_idx = SSL_CTX_get_ex_new_index(0, "luasec sslctx context", NULL, NULL, NULL);
4ecd7b0e67ea Clean up the ex_data callers
Paul Aurich <paul@darkrain42.org>
parents: 36
diff changeset
238 if (luasec_sslctx_idx == -1) {
4ecd7b0e67ea Clean up the ex_data callers
Paul Aurich <paul@darkrain42.org>
parents: 36
diff changeset
239 lua_pushnil(L);
4ecd7b0e67ea Clean up the ex_data callers
Paul Aurich <paul@darkrain42.org>
parents: 36
diff changeset
240 lua_pushstring(L, "error creating luasec SSL index");
4ecd7b0e67ea Clean up the ex_data callers
Paul Aurich <paul@darkrain42.org>
parents: 36
diff changeset
241 return 2;
4ecd7b0e67ea Clean up the ex_data callers
Paul Aurich <paul@darkrain42.org>
parents: 36
diff changeset
242 }
4ecd7b0e67ea Clean up the ex_data callers
Paul Aurich <paul@darkrain42.org>
parents: 36
diff changeset
243 }
0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
244 method = str2method(luaL_checkstring(L, 1));
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
245 if (!method) {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
246 lua_pushnil(L);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
247 lua_pushstring(L, "invalid protocol");
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
248 return 2;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
249 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
250 ctx = (p_context) lua_newuserdata(L, sizeof(t_context));
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
251 if (!ctx) {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
252 lua_pushnil(L);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
253 lua_pushstring(L, "error creating context");
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
254 return 2;
41
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
255 }
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
256 ctx->L = L;
0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
257 ctx->context = SSL_CTX_new(method);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
258 if (!ctx->context) {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
259 lua_pushnil(L);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
260 lua_pushstring(L, "error creating context");
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
261 return 2;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
262 }
34
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
263 ctx->verify_flags = LUASEC_VERIFY_FLAGS_NONE;
0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
264 ctx->mode = MD_CTX_INVALID;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
265 /* No session support */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
266 SSL_CTX_set_session_cache_mode(ctx->context, SSL_SESS_CACHE_OFF);
28
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
267 /*
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
268 * Support ephemeral diffie-hellman key exchange. This is only needed
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
269 * for server mode, but clearer to put it here rather than set_mode.
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
270 */
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
271 SSL_CTX_set_tmp_dh_callback(ctx->context, dh_param_cb);
42
b6271d3bae0b context: Support ECDH cipher suites, where applicable
Paul Aurich <paul@darkrain42.org>
parents: 41
diff changeset
272 #if defined(SSL_CTX_set_tmp_ecdh)
b6271d3bae0b context: Support ECDH cipher suites, where applicable
Paul Aurich <paul@darkrain42.org>
parents: 41
diff changeset
273 /*
b6271d3bae0b context: Support ECDH cipher suites, where applicable
Paul Aurich <paul@darkrain42.org>
parents: 41
diff changeset
274 * Support ECDH parameters. This uses the 384 bit prime field from
b6271d3bae0b context: Support ECDH cipher suites, where applicable
Paul Aurich <paul@darkrain42.org>
parents: 41
diff changeset
275 * NIST.
b6271d3bae0b context: Support ECDH cipher suites, where applicable
Paul Aurich <paul@darkrain42.org>
parents: 41
diff changeset
276 */
b6271d3bae0b context: Support ECDH cipher suites, where applicable
Paul Aurich <paul@darkrain42.org>
parents: 41
diff changeset
277 SSL_CTX_set_tmp_ecdh(ctx->context, EC_KEY_new_by_curve_name(NID_secp384r1));
b6271d3bae0b context: Support ECDH cipher suites, where applicable
Paul Aurich <paul@darkrain42.org>
parents: 41
diff changeset
278 #endif
b6271d3bae0b context: Support ECDH cipher suites, where applicable
Paul Aurich <paul@darkrain42.org>
parents: 41
diff changeset
279
38
4ecd7b0e67ea Clean up the ex_data callers
Paul Aurich <paul@darkrain42.org>
parents: 36
diff changeset
280 SSL_CTX_set_ex_data(ctx->context, luasec_sslctx_idx, ctx);
4ecd7b0e67ea Clean up the ex_data callers
Paul Aurich <paul@darkrain42.org>
parents: 36
diff changeset
281
0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
282 luaL_getmetatable(L, "SSL:Context");
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
283 lua_setmetatable(L, -2);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
284 return 1;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
285 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
286
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
287 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
288 * Load the trusting certificates.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
289 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
290 static int load_locations(lua_State *L)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
291 {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
292 SSL_CTX *ctx = ctx_getcontext(L, 1);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
293 const char *cafile = luaL_optstring(L, 2, NULL);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
294 const char *capath = luaL_optstring(L, 3, NULL);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
295 if (SSL_CTX_load_verify_locations(ctx, cafile, capath) != 1) {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
296 lua_pushboolean(L, 0);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
297 lua_pushfstring(L, "error loading CA locations (%s)",
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
298 ERR_reason_error_string(ERR_get_error()));
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
299 return 2;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
300 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
301 lua_pushboolean(L, 1);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
302 return 1;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
303 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
304
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
305 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
306 * Load the certificate file.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
307 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
308 static int load_cert(lua_State *L)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
309 {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
310 SSL_CTX *ctx = ctx_getcontext(L, 1);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
311 const char *filename = luaL_checkstring(L, 2);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
312 if (SSL_CTX_use_certificate_chain_file(ctx, filename) != 1) {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
313 lua_pushboolean(L, 0);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
314 lua_pushfstring(L, "error loading certificate (%s)",
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
315 ERR_reason_error_string(ERR_get_error()));
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
316 return 2;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
317 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
318 lua_pushboolean(L, 1);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
319 return 1;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
320 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
321
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
322 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
323 * Load the key file -- only in PEM format.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
324 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
325 static int load_key(lua_State *L)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
326 {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
327 int ret = 1;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
328 SSL_CTX *ctx = ctx_getcontext(L, 1);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
329 const char *filename = luaL_checkstring(L, 2);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
330 switch (lua_type(L, 3)) {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
331 case LUA_TSTRING:
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
332 case LUA_TFUNCTION:
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
333 SSL_CTX_set_default_passwd_cb(ctx, passwd_cb);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
334 SSL_CTX_set_default_passwd_cb_userdata(ctx, L);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
335 /* fallback */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
336 case LUA_TNIL:
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
337 if (SSL_CTX_use_PrivateKey_file(ctx, filename, SSL_FILETYPE_PEM) == 1)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
338 lua_pushboolean(L, 1);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
339 else {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
340 ret = 2;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
341 lua_pushboolean(L, 0);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
342 lua_pushfstring(L, "error loading private key (%s)",
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
343 ERR_reason_error_string(ERR_get_error()));
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
344 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
345 SSL_CTX_set_default_passwd_cb(ctx, NULL);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
346 SSL_CTX_set_default_passwd_cb_userdata(ctx, NULL);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
347 break;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
348 default:
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
349 lua_pushstring(L, "invalid callback value");
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
350 lua_error(L);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
351 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
352 return ret;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
353 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
354
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
355 /**
28
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
356 * Load a DH params files. This is a global LuaSec thing.
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
357 */
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
358 static int load_dhparams(lua_State *L)
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
359 {
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
360 const char *filename = luaL_checkstring(L, 1);
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
361 FILE *paramfile;
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
362 DH *dh;
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
363
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
364 paramfile = fopen(filename, "r");
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
365 if (!paramfile) {
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
366 lua_pushboolean(L, 0);
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
367 lua_pushfstring(L, "error reading dh param file %s: %s", filename,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
368 strerror(errno));
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
369 return 2;
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
370 }
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
371
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
372 dh = PEM_read_DHparams(paramfile, NULL, NULL, NULL);
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
373 fclose(paramfile);
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
374 if (!dh) {
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
375 lua_pushboolean(L, 0);
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
376 lua_pushfstring(L, "error loading dh param file %s: %s", filename,
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
377 ERR_reason_error_string(ERR_get_error()));
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
378 return 2;
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
379 }
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
380
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
381 if (dh_larger)
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
382 DH_free(dh_larger);
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
383
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
384 dh_larger = dh;
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
385
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
386 lua_pushboolean(L, 1);
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
387 return 1;
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
388 }
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
389
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
390 /**
0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
391 * Set the cipher list.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
392 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
393 static int set_cipher(lua_State *L)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
394 {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
395 SSL_CTX *ctx = ctx_getcontext(L, 1);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
396 const char *list = luaL_checkstring(L, 2);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
397 if (SSL_CTX_set_cipher_list(ctx, list) != 1) {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
398 lua_pushboolean(L, 0);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
399 lua_pushfstring(L, "error setting cipher list (%s)",
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
400 ERR_reason_error_string(ERR_get_error()));
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
401 return 2;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
402 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
403 lua_pushboolean(L, 1);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
404 return 1;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
405 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
406
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
407 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
408 * Set the depth for certificate checking.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
409 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
410 static int set_depth(lua_State *L)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
411 {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
412 SSL_CTX *ctx = ctx_getcontext(L, 1);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
413 SSL_CTX_set_verify_depth(ctx, luaL_checkint(L, 2));
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
414 lua_pushboolean(L, 1);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
415 return 1;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
416 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
417
41
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
418 static void
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
419 luasec_push_cert_error(lua_State *L, int ref, int depth, int err)
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
420 {
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
421 int created = 0;
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
422
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
423 lua_rawgeti(L, LUA_REGISTRYINDEX, ref);
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
424 lua_rawgeti(L, -1, depth + 1);
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
425 if (!lua_istable(L, -1)) {
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
426 /* If the table doesn't exist, create it */
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
427 created = 1;
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
428 lua_pop(L, 1);
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
429 lua_newtable(L);
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
430 }
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
431
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
432 lua_pushstring(L, X509_verify_cert_error_string(err));
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
433 lua_rawseti(L, -2, lua_objlen(L, -2)+1);
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
434
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
435 if (created) {
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
436 lua_rawseti(L, -2, depth + 1);
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
437 lua_pop(L, 1);
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
438 } else
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
439 lua_pop(L, 2);
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
440 }
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
441
30
36ed99e1ce1e ssl.core, context: Add ability to verify and continue, retrieve verification result
Paul Aurich <paul@darkrain42.org>
parents: 28
diff changeset
442 int verify_cb(int preverify_ok, X509_STORE_CTX *x509_ctx)
36ed99e1ce1e ssl.core, context: Add ability to verify and continue, retrieve verification result
Paul Aurich <paul@darkrain42.org>
parents: 28
diff changeset
443 {
38
4ecd7b0e67ea Clean up the ex_data callers
Paul Aurich <paul@darkrain42.org>
parents: 36
diff changeset
444 SSL_CTX *context;
34
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
445 SSL *ssl;
38
4ecd7b0e67ea Clean up the ex_data callers
Paul Aurich <paul@darkrain42.org>
parents: 36
diff changeset
446 p_context l_ctx;
41
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
447 p_ssl l_ssl;
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
448 int err, depth;
34
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
449
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
450 /* Short-circuit optimization */
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
451 if (preverify_ok)
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
452 return 1;
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
453
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
454 ssl = X509_STORE_CTX_get_ex_data(x509_ctx, SSL_get_ex_data_X509_STORE_CTX_idx());
38
4ecd7b0e67ea Clean up the ex_data callers
Paul Aurich <paul@darkrain42.org>
parents: 36
diff changeset
455 context = ssl->ctx;
41
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
456 l_ssl = SSL_get_ex_data(ssl, luasec_ssl_idx);
38
4ecd7b0e67ea Clean up the ex_data callers
Paul Aurich <paul@darkrain42.org>
parents: 36
diff changeset
457 l_ctx = SSL_CTX_get_ex_data(context, luasec_sslctx_idx);
34
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
458
41
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
459 err = X509_STORE_CTX_get_error(x509_ctx);
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
460 depth = X509_STORE_CTX_get_error_depth(x509_ctx);
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
461
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
462 if (err != X509_V_OK) {
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
463 if (l_ssl->t_cert_errors == LUA_NOREF) {
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
464 lua_newtable(l_ctx->L);
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
465 l_ssl->t_cert_errors = luaL_ref(l_ctx->L, LUA_REGISTRYINDEX);
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
466 }
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
467
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
468 luasec_push_cert_error(l_ctx->L, l_ssl->t_cert_errors, depth, err);
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
469 }
34
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
470
41
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
471 return (l_ctx->verify_flags & LUASEC_VERIFY_FLAGS_ALWAYS_CONTINUE ? 1 : preverify_ok);
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
472 }
34
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
473
41
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
474 static int luasec_verify(X509_STORE_CTX *x509_ctx, void *ptr)
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
475 {
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
476 p_context ctx = ptr;
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
477
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
478 if (ctx->verify_flags & LUASEC_VERIFY_FLAGS_IGNORE_PURPOSE) {
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
479 X509_VERIFY_PARAM *param = X509_STORE_CTX_get0_param(x509_ctx);
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
480 if (param) {
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
481 X509_VERIFY_PARAM_set_purpose(param, X509_PURPOSE_SSL_SERVER);
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
482 X509_VERIFY_PARAM_set_trust(param, X509_TRUST_SSL_SERVER);
34
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
483 }
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
484 }
41
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
485
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
486 return X509_verify_cert(x509_ctx);
30
36ed99e1ce1e ssl.core, context: Add ability to verify and continue, retrieve verification result
Paul Aurich <paul@darkrain42.org>
parents: 28
diff changeset
487 }
36ed99e1ce1e ssl.core, context: Add ability to verify and continue, retrieve verification result
Paul Aurich <paul@darkrain42.org>
parents: 28
diff changeset
488
0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
489 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
490 * Set the handshake verify options.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
491 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
492 static int set_verify(lua_State *L)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
493 {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
494 int i;
36
96f23601ce7a context.c: Add crl_check and crl_check_chain verify options
Matthew Wild <mwild1@gmail.com>
parents: 34
diff changeset
495 int flag = 0, vflag = 0;
34
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
496 p_context ctx = checkctx(L, 1);
0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
497 int max = lua_gettop(L);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
498 /* any flag? */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
499 if (max > 1) {
34
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
500 ctx->verify_flags = LUASEC_VERIFY_FLAGS_NONE;
0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
501 for (i = 2; i <= max; i++) {
30
36ed99e1ce1e ssl.core, context: Add ability to verify and continue, retrieve verification result
Paul Aurich <paul@darkrain42.org>
parents: 28
diff changeset
502 const char *s = luaL_checkstring(L, i);
36ed99e1ce1e ssl.core, context: Add ability to verify and continue, retrieve verification result
Paul Aurich <paul@darkrain42.org>
parents: 28
diff changeset
503 if (!strcmp(s, "continue")) {
34
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
504 ctx->verify_flags |= LUASEC_VERIFY_FLAGS_ALWAYS_CONTINUE;
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
505 } else if (!strcmp(s, "ignore_purpose")) {
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
506 ctx->verify_flags |= LUASEC_VERIFY_FLAGS_IGNORE_PURPOSE;
36
96f23601ce7a context.c: Add crl_check and crl_check_chain verify options
Matthew Wild <mwild1@gmail.com>
parents: 34
diff changeset
507 } else if (!strcmp(s, "crl_check")) {
96f23601ce7a context.c: Add crl_check and crl_check_chain verify options
Matthew Wild <mwild1@gmail.com>
parents: 34
diff changeset
508 vflag |= X509_V_FLAG_CRL_CHECK;
96f23601ce7a context.c: Add crl_check and crl_check_chain verify options
Matthew Wild <mwild1@gmail.com>
parents: 34
diff changeset
509 } else if (!strcmp(s, "crl_check_chain")) {
96f23601ce7a context.c: Add crl_check and crl_check_chain verify options
Matthew Wild <mwild1@gmail.com>
parents: 34
diff changeset
510 vflag |= X509_V_FLAG_CRL_CHECK_ALL;
30
36ed99e1ce1e ssl.core, context: Add ability to verify and continue, retrieve verification result
Paul Aurich <paul@darkrain42.org>
parents: 28
diff changeset
511 } else if (!set_verify_flag(s, &flag)) {
0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
512 lua_pushboolean(L, 0);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
513 lua_pushstring(L, "invalid verify option");
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
514 return 2;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
515 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
516 }
34
510432315106 verify: Flag to ignore 'invalid purpose' errors on end cert
Paul Aurich <paul@darkrain42.org>
parents: 30
diff changeset
517 SSL_CTX_set_verify(ctx->context, flag, ctx->verify_flags ? verify_cb : NULL);
41
e26f1f91118a Fix the verification function so it doesn't pass for everyone on invalid purpose errors.
Paul Aurich <paul@darkrain42.org>
parents: 38
diff changeset
518 SSL_CTX_set_cert_verify_callback(ctx->context, luasec_verify, ctx);
36
96f23601ce7a context.c: Add crl_check and crl_check_chain verify options
Matthew Wild <mwild1@gmail.com>
parents: 34
diff changeset
519 if(vflag)
96f23601ce7a context.c: Add crl_check and crl_check_chain verify options
Matthew Wild <mwild1@gmail.com>
parents: 34
diff changeset
520 {
96f23601ce7a context.c: Add crl_check and crl_check_chain verify options
Matthew Wild <mwild1@gmail.com>
parents: 34
diff changeset
521 X509_STORE *store = SSL_CTX_get_cert_store(ctx->context);
96f23601ce7a context.c: Add crl_check and crl_check_chain verify options
Matthew Wild <mwild1@gmail.com>
parents: 34
diff changeset
522 X509_STORE_set_flags(store, vflag);
96f23601ce7a context.c: Add crl_check and crl_check_chain verify options
Matthew Wild <mwild1@gmail.com>
parents: 34
diff changeset
523 }
0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
524 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
525 lua_pushboolean(L, 1);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
526 return 1;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
527 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
528
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
529 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
530 * Set the protocol options.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
531 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
532 static int set_options(lua_State *L)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
533 {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
534 int i;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
535 unsigned long flag = 0L;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
536 SSL_CTX *ctx = ctx_getcontext(L, 1);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
537 int max = lua_gettop(L);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
538 /* any option? */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
539 if (max > 1) {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
540 for (i = 2; i <= max; i++) {
45
5be249c0ae71 context: Add no_compression for OpenSSL 0.9.8 as well
Paul Aurich <paul@darkrain42.org>
parents: 43
diff changeset
541 #if !defined(SSL_OP_NO_COMPRESSION)
5be249c0ae71 context: Add no_compression for OpenSSL 0.9.8 as well
Paul Aurich <paul@darkrain42.org>
parents: 43
diff changeset
542 /* Manually disable compression if built against an older
5be249c0ae71 context: Add no_compression for OpenSSL 0.9.8 as well
Paul Aurich <paul@darkrain42.org>
parents: 43
diff changeset
543 * OpenSSL which doesn't have SSL_OP_NO_COMPRESSION
5be249c0ae71 context: Add no_compression for OpenSSL 0.9.8 as well
Paul Aurich <paul@darkrain42.org>
parents: 43
diff changeset
544 */
5be249c0ae71 context: Add no_compression for OpenSSL 0.9.8 as well
Paul Aurich <paul@darkrain42.org>
parents: 43
diff changeset
545 if (!strcmp(luaL_checkstring(L, i), "no_compression")) {
5be249c0ae71 context: Add no_compression for OpenSSL 0.9.8 as well
Paul Aurich <paul@darkrain42.org>
parents: 43
diff changeset
546 ctx->comp_methods = NULL;
5be249c0ae71 context: Add no_compression for OpenSSL 0.9.8 as well
Paul Aurich <paul@darkrain42.org>
parents: 43
diff changeset
547 } else
5be249c0ae71 context: Add no_compression for OpenSSL 0.9.8 as well
Paul Aurich <paul@darkrain42.org>
parents: 43
diff changeset
548 #endif
0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
549 if (!set_option_flag(luaL_checkstring(L, i), &flag)) {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
550 lua_pushboolean(L, 0);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
551 lua_pushstring(L, "invalid option");
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
552 return 2;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
553 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
554 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
555 SSL_CTX_set_options(ctx, flag);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
556 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
557 lua_pushboolean(L, 1);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
558 return 1;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
559 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
560
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
561 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
562 * Set the context mode.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
563 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
564 static int set_mode(lua_State *L)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
565 {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
566 p_context ctx = checkctx(L, 1);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
567 const char *str = luaL_checkstring(L, 2);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
568 if (!strcmp("server", str)) {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
569 ctx->mode = MD_CTX_SERVER;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
570 lua_pushboolean(L, 1);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
571 return 1;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
572 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
573 if(!strcmp("client", str)) {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
574 ctx->mode = MD_CTX_CLIENT;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
575 lua_pushboolean(L, 1);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
576 return 1;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
577 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
578 lua_pushboolean(L, 0);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
579 lua_pushstring(L, "invalid mode");
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
580 return 1;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
581 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
582
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
583 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
584 * Return a pointer to SSL_CTX structure.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
585 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
586 static int raw_ctx(lua_State *L)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
587 {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
588 p_context ctx = checkctx(L, 1);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
589 lua_pushlightuserdata(L, (void*)ctx->context);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
590 return 1;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
591 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
592
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
593 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
594 * Package functions
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
595 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
596 static luaL_Reg funcs[] = {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
597 {"create", create},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
598 {"locations", load_locations},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
599 {"loadcert", load_cert},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
600 {"loadkey", load_key},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
601 {"setcipher", set_cipher},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
602 {"setdepth", set_depth},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
603 {"setverify", set_verify},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
604 {"setoptions", set_options},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
605 {"setmode", set_mode},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
606 {"rawcontext", raw_ctx},
28
8c61b29d87ec context: support for diffie-hellman key exchange
Paul Aurich <paul@darkrain42.org>
parents: 1
diff changeset
607 {"loaddhparams", load_dhparams},
0
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
608 {NULL, NULL}
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
609 };
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
610
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
611 /*-------------------------------- Metamethods -------------------------------*/
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
612
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
613 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
614 * Collect SSL context -- GC metamethod.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
615 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
616 static int meth_destroy(lua_State *L)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
617 {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
618 p_context ctx = checkctx(L, 1);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
619 if (ctx->context) {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
620 SSL_CTX_free(ctx->context);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
621 ctx->context = NULL;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
622 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
623 return 0;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
624 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
625
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
626 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
627 * Object information -- tostring metamethod.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
628 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
629 static int meth_tostring(lua_State *L)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
630 {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
631 p_context ctx = checkctx(L, 1);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
632 lua_pushfstring(L, "SSL context: %p", ctx);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
633 return 1;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
634 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
635
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
636 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
637 * Context metamethods.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
638 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
639 static luaL_Reg meta[] = {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
640 {"__gc", meth_destroy},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
641 {"__tostring", meth_tostring},
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
642 {NULL, NULL}
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
643 };
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
644
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
645
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
646 /*----------------------------- Public Functions ---------------------------*/
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
647
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
648 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
649 * Retrieve the SSL context from the Lua stack.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
650 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
651 SSL_CTX* ctx_getcontext(lua_State *L, int idx)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
652 {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
653 p_context ctx = checkctx(L, idx);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
654 return ctx->context;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
655 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
656
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
657 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
658 * Retrieve the mode from the context in the Lua stack.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
659 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
660 char ctx_getmode(lua_State *L, int idx)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
661 {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
662 p_context ctx = checkctx(L, idx);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
663 return ctx->mode;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
664 }
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
665
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
666 /*------------------------------ Initialization ------------------------------*/
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
667
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
668 /**
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
669 * Registre the module.
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
670 */
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
671 int luaopen_ssl_context(lua_State *L)
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
672 {
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
673 luaL_newmetatable(L, "SSL:Context");
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
674 luaL_register(L, NULL, meta);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
675 luaL_register(L, "ssl.context", funcs);
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
676 return 1;
f7d2d78eb424 Initial commit (LuaSec 0.4)
Matthew Wild <mwild1@gmail.com>
parents:
diff changeset
677 }

mercurial