| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566 |
- // Copyright (C) 2017. See AUTHORS.
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package openssl
- // #include "shim.h"
- import "C"
- import (
- "errors"
- "fmt"
- "io/ioutil"
- "os"
- "runtime"
- "sync"
- "time"
- "unsafe"
- "github.com/spacemonkeygo/spacelog"
- )
- var (
- ssl_ctx_idx = C.X_SSL_CTX_new_index()
- logger = spacelog.GetLogger()
- )
- type Ctx struct {
- ctx *C.SSL_CTX
- cert *Certificate
- chain []*Certificate
- key PrivateKey
- verify_cb VerifyCallback
- sni_cb TLSExtServernameCallback
- ticket_store_mu sync.Mutex
- ticket_store *TicketStore
- }
- //export get_ssl_ctx_idx
- func get_ssl_ctx_idx() C.int {
- return ssl_ctx_idx
- }
- func newCtx(method *C.SSL_METHOD) (*Ctx, error) {
- runtime.LockOSThread()
- defer runtime.UnlockOSThread()
- ctx := C.SSL_CTX_new(method)
- if ctx == nil {
- return nil, errorFromErrorQueue()
- }
- c := &Ctx{ctx: ctx}
- C.SSL_CTX_set_ex_data(ctx, get_ssl_ctx_idx(), unsafe.Pointer(c))
- runtime.SetFinalizer(c, func(c *Ctx) {
- C.SSL_CTX_free(c.ctx)
- })
- return c, nil
- }
- type SSLVersion int
- const (
- SSLv3 SSLVersion = 0x02 // Vulnerable to "POODLE" attack.
- TLSv1 SSLVersion = 0x03
- TLSv1_1 SSLVersion = 0x04
- TLSv1_2 SSLVersion = 0x05
- // Make sure to disable SSLv2 and SSLv3 if you use this. SSLv3 is vulnerable
- // to the "POODLE" attack, and SSLv2 is what, just don't even.
- AnyVersion SSLVersion = 0x06
- )
- // NewCtxWithVersion creates an SSL context that is specific to the provided
- // SSL version. See http://www.openssl.org/docs/ssl/SSL_CTX_new.html for more.
- func NewCtxWithVersion(version SSLVersion) (*Ctx, error) {
- var method *C.SSL_METHOD
- switch version {
- case SSLv3:
- method = C.X_SSLv3_method()
- case TLSv1:
- method = C.X_TLSv1_method()
- case TLSv1_1:
- method = C.X_TLSv1_1_method()
- case TLSv1_2:
- method = C.X_TLSv1_2_method()
- case AnyVersion:
- method = C.X_SSLv23_method()
- }
- if method == nil {
- return nil, errors.New("unknown ssl/tls version")
- }
- return newCtx(method)
- }
- // NewCtx creates a context that supports any TLS version 1.0 and newer.
- func NewCtx() (*Ctx, error) {
- c, err := NewCtxWithVersion(AnyVersion)
- if err == nil {
- c.SetOptions(NoSSLv2 | NoSSLv3)
- }
- return c, err
- }
- // NewCtxFromFiles calls NewCtx, loads the provided files, and configures the
- // context to use them.
- func NewCtxFromFiles(cert_file string, key_file string) (*Ctx, error) {
- ctx, err := NewCtx()
- if err != nil {
- return nil, err
- }
- cert_bytes, err := ioutil.ReadFile(cert_file)
- if err != nil {
- return nil, err
- }
- certs := SplitPEM(cert_bytes)
- if len(certs) == 0 {
- return nil, fmt.Errorf("No PEM certificate found in '%s'", cert_file)
- }
- first, certs := certs[0], certs[1:]
- cert, err := LoadCertificateFromPEM(first)
- if err != nil {
- return nil, err
- }
- err = ctx.UseCertificate(cert)
- if err != nil {
- return nil, err
- }
- for _, pem := range certs {
- cert, err := LoadCertificateFromPEM(pem)
- if err != nil {
- return nil, err
- }
- err = ctx.AddChainCertificate(cert)
- if err != nil {
- return nil, err
- }
- }
- key_bytes, err := ioutil.ReadFile(key_file)
- if err != nil {
- return nil, err
- }
- key, err := LoadPrivateKeyFromPEM(key_bytes)
- if err != nil {
- return nil, err
- }
- err = ctx.UsePrivateKey(key)
- if err != nil {
- return nil, err
- }
- return ctx, nil
- }
- // EllipticCurve repesents the ASN.1 OID of an elliptic curve.
- // see https://www.openssl.org/docs/apps/ecparam.html for a list of implemented curves.
- type EllipticCurve int
- const (
- // P-256: X9.62/SECG curve over a 256 bit prime field
- Prime256v1 EllipticCurve = C.NID_X9_62_prime256v1
- // P-384: NIST/SECG curve over a 384 bit prime field
- Secp384r1 EllipticCurve = C.NID_secp384r1
- )
- // SetEllipticCurve sets the elliptic curve used by the SSL context to
- // enable an ECDH cipher suite to be selected during the handshake.
- func (c *Ctx) SetEllipticCurve(curve EllipticCurve) error {
- runtime.LockOSThread()
- defer runtime.UnlockOSThread()
- k := C.EC_KEY_new_by_curve_name(C.int(curve))
- if k == nil {
- return errors.New("Unknown curve")
- }
- defer C.EC_KEY_free(k)
- if int(C.X_SSL_CTX_set_tmp_ecdh(c.ctx, k)) != 1 {
- return errorFromErrorQueue()
- }
- return nil
- }
- // UseCertificate configures the context to present the given certificate to
- // peers.
- func (c *Ctx) UseCertificate(cert *Certificate) error {
- runtime.LockOSThread()
- defer runtime.UnlockOSThread()
- c.cert = cert
- if int(C.SSL_CTX_use_certificate(c.ctx, cert.x)) != 1 {
- return errorFromErrorQueue()
- }
- return nil
- }
- // AddChainCertificate adds a certificate to the chain presented in the
- // handshake.
- func (c *Ctx) AddChainCertificate(cert *Certificate) error {
- runtime.LockOSThread()
- defer runtime.UnlockOSThread()
- c.chain = append(c.chain, cert)
- if int(C.X_SSL_CTX_add_extra_chain_cert(c.ctx, cert.x)) != 1 {
- return errorFromErrorQueue()
- }
- // OpenSSL takes ownership via SSL_CTX_add_extra_chain_cert
- runtime.SetFinalizer(cert, nil)
- return nil
- }
- // UsePrivateKey configures the context to use the given private key for SSL
- // handshakes.
- func (c *Ctx) UsePrivateKey(key PrivateKey) error {
- runtime.LockOSThread()
- defer runtime.UnlockOSThread()
- c.key = key
- if int(C.SSL_CTX_use_PrivateKey(c.ctx, key.evpPKey())) != 1 {
- return errorFromErrorQueue()
- }
- return nil
- }
- type CertificateStore struct {
- store *C.X509_STORE
- // for GC
- ctx *Ctx
- certs []*Certificate
- }
- // Allocate a new, empty CertificateStore
- func NewCertificateStore() (*CertificateStore, error) {
- s := C.X509_STORE_new()
- if s == nil {
- return nil, errors.New("failed to allocate X509_STORE")
- }
- store := &CertificateStore{store: s}
- runtime.SetFinalizer(store, func(s *CertificateStore) {
- C.X509_STORE_free(s.store)
- })
- return store, nil
- }
- // Parse a chained PEM file, loading all certificates into the Store.
- func (s *CertificateStore) LoadCertificatesFromPEM(data []byte) error {
- pems := SplitPEM(data)
- for _, pem := range pems {
- cert, err := LoadCertificateFromPEM(pem)
- if err != nil {
- return err
- }
- err = s.AddCertificate(cert)
- if err != nil {
- return err
- }
- }
- return nil
- }
- // GetCertificateStore returns the context's certificate store that will be
- // used for peer validation.
- func (c *Ctx) GetCertificateStore() *CertificateStore {
- // we don't need to dealloc the cert store pointer here, because it points
- // to a ctx internal. so we do need to keep the ctx around
- return &CertificateStore{
- store: C.SSL_CTX_get_cert_store(c.ctx),
- ctx: c}
- }
- // AddCertificate marks the provided Certificate as a trusted certificate in
- // the given CertificateStore.
- func (s *CertificateStore) AddCertificate(cert *Certificate) error {
- runtime.LockOSThread()
- defer runtime.UnlockOSThread()
- s.certs = append(s.certs, cert)
- if int(C.X509_STORE_add_cert(s.store, cert.x)) != 1 {
- return errorFromErrorQueue()
- }
- return nil
- }
- type CertificateStoreCtx struct {
- ctx *C.X509_STORE_CTX
- ssl_ctx *Ctx
- }
- func (self *CertificateStoreCtx) VerifyResult() VerifyResult {
- return VerifyResult(C.X509_STORE_CTX_get_error(self.ctx))
- }
- func (self *CertificateStoreCtx) Err() error {
- code := C.X509_STORE_CTX_get_error(self.ctx)
- if code == C.X509_V_OK {
- return nil
- }
- return fmt.Errorf("openssl: %s",
- C.GoString(C.X509_verify_cert_error_string(C.long(code))))
- }
- func (self *CertificateStoreCtx) Depth() int {
- return int(C.X509_STORE_CTX_get_error_depth(self.ctx))
- }
- // the certicate returned is only valid for the lifetime of the underlying
- // X509_STORE_CTX
- func (self *CertificateStoreCtx) GetCurrentCert() *Certificate {
- x509 := C.X509_STORE_CTX_get_current_cert(self.ctx)
- if x509 == nil {
- return nil
- }
- // add a ref
- if 1 != C.X_X509_add_ref(x509) {
- return nil
- }
- cert := &Certificate{
- x: x509,
- }
- runtime.SetFinalizer(cert, func(cert *Certificate) {
- C.X509_free(cert.x)
- })
- return cert
- }
- // LoadVerifyLocations tells the context to trust all certificate authorities
- // provided in either the ca_file or the ca_path.
- // See http://www.openssl.org/docs/ssl/SSL_CTX_load_verify_locations.html for
- // more.
- func (c *Ctx) LoadVerifyLocations(ca_file string, ca_path string) error {
- runtime.LockOSThread()
- defer runtime.UnlockOSThread()
- var c_ca_file, c_ca_path *C.char
- if ca_file != "" {
- c_ca_file = C.CString(ca_file)
- defer C.free(unsafe.Pointer(c_ca_file))
- }
- if ca_path != "" {
- c_ca_path = C.CString(ca_path)
- defer C.free(unsafe.Pointer(c_ca_path))
- }
- if C.SSL_CTX_load_verify_locations(c.ctx, c_ca_file, c_ca_path) != 1 {
- return errorFromErrorQueue()
- }
- return nil
- }
- type Options int
- const (
- // NoCompression is only valid if you are using OpenSSL 1.0.1 or newer
- NoCompression Options = C.SSL_OP_NO_COMPRESSION
- NoSSLv2 Options = C.SSL_OP_NO_SSLv2
- NoSSLv3 Options = C.SSL_OP_NO_SSLv3
- NoTLSv1 Options = C.SSL_OP_NO_TLSv1
- CipherServerPreference Options = C.SSL_OP_CIPHER_SERVER_PREFERENCE
- NoSessionResumptionOrRenegotiation Options = C.SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION
- NoTicket Options = C.SSL_OP_NO_TICKET
- )
- // SetOptions sets context options. See
- // http://www.openssl.org/docs/ssl/SSL_CTX_set_options.html
- func (c *Ctx) SetOptions(options Options) Options {
- return Options(C.X_SSL_CTX_set_options(
- c.ctx, C.long(options)))
- }
- func (c *Ctx) ClearOptions(options Options) Options {
- return Options(C.X_SSL_CTX_clear_options(
- c.ctx, C.long(options)))
- }
- // GetOptions returns context options. See
- // https://www.openssl.org/docs/ssl/SSL_CTX_set_options.html
- func (c *Ctx) GetOptions() Options {
- return Options(C.X_SSL_CTX_get_options(c.ctx))
- }
- type Modes int
- const (
- // ReleaseBuffers is only valid if you are using OpenSSL 1.0.1 or newer
- ReleaseBuffers Modes = C.SSL_MODE_RELEASE_BUFFERS
- )
- // SetMode sets context modes. See
- // http://www.openssl.org/docs/ssl/SSL_CTX_set_mode.html
- func (c *Ctx) SetMode(modes Modes) Modes {
- return Modes(C.X_SSL_CTX_set_mode(c.ctx, C.long(modes)))
- }
- // GetMode returns context modes. See
- // http://www.openssl.org/docs/ssl/SSL_CTX_set_mode.html
- func (c *Ctx) GetMode() Modes {
- return Modes(C.X_SSL_CTX_get_mode(c.ctx))
- }
- type VerifyOptions int
- const (
- VerifyNone VerifyOptions = C.SSL_VERIFY_NONE
- VerifyPeer VerifyOptions = C.SSL_VERIFY_PEER
- VerifyFailIfNoPeerCert VerifyOptions = C.SSL_VERIFY_FAIL_IF_NO_PEER_CERT
- VerifyClientOnce VerifyOptions = C.SSL_VERIFY_CLIENT_ONCE
- )
- type VerifyCallback func(ok bool, store *CertificateStoreCtx) bool
- //export go_ssl_ctx_verify_cb_thunk
- func go_ssl_ctx_verify_cb_thunk(p unsafe.Pointer, ok C.int, ctx *C.X509_STORE_CTX) C.int {
- defer func() {
- if err := recover(); err != nil {
- logger.Critf("openssl: verify callback panic'd: %v", err)
- os.Exit(1)
- }
- }()
- verify_cb := (*Ctx)(p).verify_cb
- // set up defaults just in case verify_cb is nil
- if verify_cb != nil {
- store := &CertificateStoreCtx{ctx: ctx}
- if verify_cb(ok == 1, store) {
- ok = 1
- } else {
- ok = 0
- }
- }
- return ok
- }
- // SetVerify controls peer verification settings. See
- // http://www.openssl.org/docs/ssl/SSL_CTX_set_verify.html
- func (c *Ctx) SetVerify(options VerifyOptions, verify_cb VerifyCallback) {
- c.verify_cb = verify_cb
- if verify_cb != nil {
- C.SSL_CTX_set_verify(c.ctx, C.int(options), (*[0]byte)(C.X_SSL_CTX_verify_cb))
- } else {
- C.SSL_CTX_set_verify(c.ctx, C.int(options), nil)
- }
- }
- func (c *Ctx) SetVerifyMode(options VerifyOptions) {
- c.SetVerify(options, c.verify_cb)
- }
- func (c *Ctx) SetVerifyCallback(verify_cb VerifyCallback) {
- c.SetVerify(c.VerifyMode(), verify_cb)
- }
- func (c *Ctx) GetVerifyCallback() VerifyCallback {
- return c.verify_cb
- }
- func (c *Ctx) VerifyMode() VerifyOptions {
- return VerifyOptions(C.SSL_CTX_get_verify_mode(c.ctx))
- }
- // SetVerifyDepth controls how many certificates deep the certificate
- // verification logic is willing to follow a certificate chain. See
- // https://www.openssl.org/docs/ssl/SSL_CTX_set_verify.html
- func (c *Ctx) SetVerifyDepth(depth int) {
- C.SSL_CTX_set_verify_depth(c.ctx, C.int(depth))
- }
- // GetVerifyDepth controls how many certificates deep the certificate
- // verification logic is willing to follow a certificate chain. See
- // https://www.openssl.org/docs/ssl/SSL_CTX_set_verify.html
- func (c *Ctx) GetVerifyDepth() int {
- return int(C.SSL_CTX_get_verify_depth(c.ctx))
- }
- type TLSExtServernameCallback func(ssl *SSL) SSLTLSExtErr
- // SetTLSExtServernameCallback sets callback function for Server Name Indication
- // (SNI) rfc6066 (http://tools.ietf.org/html/rfc6066). See
- // http://stackoverflow.com/questions/22373332/serving-multiple-domains-in-one-box-with-sni
- func (c *Ctx) SetTLSExtServernameCallback(sni_cb TLSExtServernameCallback) {
- c.sni_cb = sni_cb
- C.X_SSL_CTX_set_tlsext_servername_callback(c.ctx, (*[0]byte)(C.sni_cb))
- }
- func (c *Ctx) SetSessionId(session_id []byte) error {
- runtime.LockOSThread()
- defer runtime.UnlockOSThread()
- var ptr *C.uchar
- if len(session_id) > 0 {
- ptr = (*C.uchar)(unsafe.Pointer(&session_id[0]))
- }
- if int(C.SSL_CTX_set_session_id_context(c.ctx, ptr,
- C.uint(len(session_id)))) == 0 {
- return errorFromErrorQueue()
- }
- return nil
- }
- // SetCipherList sets the list of available ciphers. The format of the list is
- // described at http://www.openssl.org/docs/apps/ciphers.html, but see
- // http://www.openssl.org/docs/ssl/SSL_CTX_set_cipher_list.html for more.
- func (c *Ctx) SetCipherList(list string) error {
- runtime.LockOSThread()
- defer runtime.UnlockOSThread()
- clist := C.CString(list)
- defer C.free(unsafe.Pointer(clist))
- if int(C.SSL_CTX_set_cipher_list(c.ctx, clist)) == 0 {
- return errorFromErrorQueue()
- }
- return nil
- }
- type SessionCacheModes int
- const (
- SessionCacheOff SessionCacheModes = C.SSL_SESS_CACHE_OFF
- SessionCacheClient SessionCacheModes = C.SSL_SESS_CACHE_CLIENT
- SessionCacheServer SessionCacheModes = C.SSL_SESS_CACHE_SERVER
- SessionCacheBoth SessionCacheModes = C.SSL_SESS_CACHE_BOTH
- NoAutoClear SessionCacheModes = C.SSL_SESS_CACHE_NO_AUTO_CLEAR
- NoInternalLookup SessionCacheModes = C.SSL_SESS_CACHE_NO_INTERNAL_LOOKUP
- NoInternalStore SessionCacheModes = C.SSL_SESS_CACHE_NO_INTERNAL_STORE
- NoInternal SessionCacheModes = C.SSL_SESS_CACHE_NO_INTERNAL
- )
- // SetSessionCacheMode enables or disables session caching. See
- // http://www.openssl.org/docs/ssl/SSL_CTX_set_session_cache_mode.html
- func (c *Ctx) SetSessionCacheMode(modes SessionCacheModes) SessionCacheModes {
- return SessionCacheModes(
- C.X_SSL_CTX_set_session_cache_mode(c.ctx, C.long(modes)))
- }
- // Set session cache timeout. Returns previously set value.
- // See https://www.openssl.org/docs/ssl/SSL_CTX_set_timeout.html
- func (c *Ctx) SetTimeout(t time.Duration) time.Duration {
- prev := C.X_SSL_CTX_set_timeout(c.ctx, C.long(t/time.Second))
- return time.Duration(prev) * time.Second
- }
- // Get session cache timeout.
- // See https://www.openssl.org/docs/ssl/SSL_CTX_set_timeout.html
- func (c *Ctx) GetTimeout() time.Duration {
- return time.Duration(C.X_SSL_CTX_get_timeout(c.ctx)) * time.Second
- }
- // Set session cache size. Returns previously set value.
- // https://www.openssl.org/docs/ssl/SSL_CTX_sess_set_cache_size.html
- func (c *Ctx) SessSetCacheSize(t int) int {
- return int(C.X_SSL_CTX_sess_set_cache_size(c.ctx, C.long(t)))
- }
- // Get session cache size.
- // https://www.openssl.org/docs/ssl/SSL_CTX_sess_set_cache_size.html
- func (c *Ctx) SessGetCacheSize() int {
- return int(C.X_SSL_CTX_sess_get_cache_size(c.ctx))
- }
|