00001
00002
00003
00004
00005
00006
00007
00008
00009
00010
00011 #include "ossl.h"
00012 #include <stdarg.h>
00013
00014
00015
00016
00017 int
00018 string2hex(const unsigned char *buf, int buf_len, char **hexbuf, int *hexbuf_len)
00019 {
00020 static const char hex[]="0123456789abcdef";
00021 int i, len = 2 * buf_len;
00022
00023 if (buf_len < 0 || len < buf_len) {
00024 return -1;
00025 }
00026 if (!hexbuf) {
00027 if (hexbuf_len) {
00028 *hexbuf_len = len;
00029 }
00030 return len;
00031 }
00032 if (!(*hexbuf = OPENSSL_malloc(len + 1))) {
00033 return -1;
00034 }
00035 for (i = 0; i < buf_len; i++) {
00036 (*hexbuf)[2 * i] = hex[((unsigned char)buf[i]) >> 4];
00037 (*hexbuf)[2 * i + 1] = hex[buf[i] & 0x0f];
00038 }
00039 (*hexbuf)[2 * i] = '\0';
00040
00041 if (hexbuf_len) {
00042 *hexbuf_len = len;
00043 }
00044 return len;
00045 }
00046
00047
00048
00049
00050 #define OSSL_IMPL_ARY2SK(name, type, expected_class, dup) \
00051 STACK_OF(type) * \
00052 ossl_##name##_ary2sk0(VALUE ary) \
00053 { \
00054 STACK_OF(type) *sk; \
00055 VALUE val; \
00056 type *x; \
00057 int i; \
00058 \
00059 Check_Type(ary, T_ARRAY); \
00060 sk = sk_##type##_new_null(); \
00061 if (!sk) ossl_raise(eOSSLError, NULL); \
00062 \
00063 for (i = 0; i < RARRAY_LEN(ary); i++) { \
00064 val = rb_ary_entry(ary, i); \
00065 if (!rb_obj_is_kind_of(val, expected_class)) { \
00066 sk_##type##_pop_free(sk, type##_free); \
00067 ossl_raise(eOSSLError, "object in array not" \
00068 " of class ##type##"); \
00069 } \
00070 x = dup(val); \
00071 sk_##type##_push(sk, x); \
00072 } \
00073 return sk; \
00074 } \
00075 \
00076 STACK_OF(type) * \
00077 ossl_protect_##name##_ary2sk(VALUE ary, int *status) \
00078 { \
00079 return (STACK_OF(type)*)rb_protect( \
00080 (VALUE(*)_((VALUE)))ossl_##name##_ary2sk0, \
00081 ary, \
00082 status); \
00083 } \
00084 \
00085 STACK_OF(type) * \
00086 ossl_##name##_ary2sk(VALUE ary) \
00087 { \
00088 STACK_OF(type) *sk; \
00089 int status = 0; \
00090 \
00091 sk = ossl_protect_##name##_ary2sk(ary, &status); \
00092 if (status) rb_jump_tag(status); \
00093 \
00094 return sk; \
00095 }
00096 OSSL_IMPL_ARY2SK(x509, X509, cX509Cert, DupX509CertPtr)
00097
00098 #define OSSL_IMPL_SK2ARY(name, type) \
00099 VALUE \
00100 ossl_##name##_sk2ary(STACK_OF(type) *sk) \
00101 { \
00102 type *t; \
00103 int i, num; \
00104 VALUE ary; \
00105 \
00106 if (!sk) { \
00107 OSSL_Debug("empty sk!"); \
00108 return Qnil; \
00109 } \
00110 num = sk_##type##_num(sk); \
00111 if (num < 0) { \
00112 OSSL_Debug("items in sk < -1???"); \
00113 return rb_ary_new(); \
00114 } \
00115 ary = rb_ary_new2(num); \
00116 \
00117 for (i=0; i<num; i++) { \
00118 t = sk_##type##_value(sk, i); \
00119 rb_ary_push(ary, ossl_##name##_new(t)); \
00120 } \
00121 return ary; \
00122 }
00123 OSSL_IMPL_SK2ARY(x509, X509)
00124 OSSL_IMPL_SK2ARY(x509crl, X509_CRL)
00125 OSSL_IMPL_SK2ARY(x509name, X509_NAME)
00126
00127 static VALUE
00128 ossl_str_new(int size)
00129 {
00130 return rb_str_new(0, size);
00131 }
00132
00133 VALUE
00134 ossl_buf2str(char *buf, int len)
00135 {
00136 VALUE str;
00137 int status = 0;
00138
00139 str = rb_protect((VALUE(*)_((VALUE)))ossl_str_new, len, &status);
00140 if(!NIL_P(str)) memcpy(RSTRING_PTR(str), buf, len);
00141 OPENSSL_free(buf);
00142 if(status) rb_jump_tag(status);
00143
00144 return str;
00145 }
00146
00147
00148
00149
00150 static VALUE
00151 ossl_pem_passwd_cb0(VALUE flag)
00152 {
00153 VALUE pass;
00154
00155 pass = rb_yield(flag);
00156 SafeStringValue(pass);
00157
00158 return pass;
00159 }
00160
00161 int
00162 ossl_pem_passwd_cb(char *buf, int max_len, int flag, void *pwd)
00163 {
00164 int len, status = 0;
00165 VALUE rflag, pass;
00166
00167 if (pwd || !rb_block_given_p())
00168 return PEM_def_callback(buf, max_len, flag, pwd);
00169
00170 while (1) {
00171
00172
00173
00174
00175
00176 rflag = flag ? Qtrue : Qfalse;
00177 pass = rb_protect(ossl_pem_passwd_cb0, rflag, &status);
00178 if (status) {
00179
00180 rb_set_errinfo(Qnil);
00181 return -1;
00182 }
00183 len = RSTRING_LENINT(pass);
00184 if (len < 4) {
00185 rb_warning("password must be longer than 4 bytes");
00186 continue;
00187 }
00188 if (len > max_len) {
00189 rb_warning("password must be shorter then %d bytes", max_len-1);
00190 continue;
00191 }
00192 memcpy(buf, RSTRING_PTR(pass), len);
00193 break;
00194 }
00195 return len;
00196 }
00197
00198
00199
00200
00201 int ossl_verify_cb_idx;
00202
00203 VALUE
00204 ossl_call_verify_cb_proc(struct ossl_verify_cb_args *args)
00205 {
00206 return rb_funcall(args->proc, rb_intern("call"), 2,
00207 args->preverify_ok, args->store_ctx);
00208 }
00209
00210 int
00211 ossl_verify_cb(int ok, X509_STORE_CTX *ctx)
00212 {
00213 VALUE proc, rctx, ret;
00214 struct ossl_verify_cb_args args;
00215 int state = 0;
00216
00217 proc = (VALUE)X509_STORE_CTX_get_ex_data(ctx, ossl_verify_cb_idx);
00218 if ((void*)proc == 0)
00219 proc = (VALUE)X509_STORE_get_ex_data(ctx->ctx, ossl_verify_cb_idx);
00220 if ((void*)proc == 0)
00221 return ok;
00222 if (!NIL_P(proc)) {
00223 ret = Qfalse;
00224 rctx = rb_protect((VALUE(*)(VALUE))ossl_x509stctx_new,
00225 (VALUE)ctx, &state);
00226 if (state) {
00227 rb_set_errinfo(Qnil);
00228 rb_warn("StoreContext initialization failure");
00229 }
00230 else {
00231 args.proc = proc;
00232 args.preverify_ok = ok ? Qtrue : Qfalse;
00233 args.store_ctx = rctx;
00234 ret = rb_protect((VALUE(*)(VALUE))ossl_call_verify_cb_proc, (VALUE)&args, &state);
00235 if (state) {
00236 rb_set_errinfo(Qnil);
00237 rb_warn("exception in verify_callback is ignored");
00238 }
00239 ossl_x509stctx_clear_ptr(rctx);
00240 }
00241 if (ret == Qtrue) {
00242 X509_STORE_CTX_set_error(ctx, X509_V_OK);
00243 ok = 1;
00244 }
00245 else{
00246 if (X509_STORE_CTX_get_error(ctx) == X509_V_OK) {
00247 X509_STORE_CTX_set_error(ctx, X509_V_ERR_CERT_REJECTED);
00248 }
00249 ok = 0;
00250 }
00251 }
00252
00253 return ok;
00254 }
00255
00256
00257
00258
00259 VALUE mOSSL;
00260
00261
00262
00263
00264 VALUE eOSSLError;
00265
00266
00267
00268
00269 ID ossl_s_to_der;
00270
00271 VALUE
00272 ossl_to_der(VALUE obj)
00273 {
00274 VALUE tmp;
00275
00276 tmp = rb_funcall(obj, ossl_s_to_der, 0);
00277 StringValue(tmp);
00278
00279 return tmp;
00280 }
00281
00282 VALUE
00283 ossl_to_der_if_possible(VALUE obj)
00284 {
00285 if(rb_respond_to(obj, ossl_s_to_der))
00286 return ossl_to_der(obj);
00287 return obj;
00288 }
00289
00290
00291
00292
00293 static VALUE
00294 ossl_make_error(VALUE exc, const char *fmt, va_list args)
00295 {
00296 VALUE str = Qnil;
00297 const char *msg;
00298 long e;
00299
00300 #ifdef HAVE_ERR_PEEK_LAST_ERROR
00301 e = ERR_peek_last_error();
00302 #else
00303 e = ERR_peek_error();
00304 #endif
00305 if (fmt) {
00306 str = rb_vsprintf(fmt, args);
00307 }
00308 if (e) {
00309 if (dOSSL == Qtrue)
00310 msg = ERR_error_string(e, NULL);
00311 else
00312 msg = ERR_reason_error_string(e);
00313 if (NIL_P(str)) {
00314 if (msg) str = rb_str_new_cstr(msg);
00315 }
00316 else {
00317 if (RSTRING_LEN(str)) rb_str_cat2(str, ": ");
00318 rb_str_cat2(str, msg ? msg : "(null)");
00319 }
00320 }
00321 if (dOSSL == Qtrue){
00322 while ((e = ERR_get_error()) != 0){
00323 rb_warn("error on stack: %s", ERR_error_string(e, NULL));
00324 }
00325 }
00326 ERR_clear_error();
00327
00328 if (NIL_P(str)) str = rb_str_new(0, 0);
00329 return rb_exc_new3(exc, str);
00330 }
00331
00332 void
00333 ossl_raise(VALUE exc, const char *fmt, ...)
00334 {
00335 va_list args;
00336 VALUE err;
00337 va_start(args, fmt);
00338 err = ossl_make_error(exc, fmt, args);
00339 va_end(args);
00340 rb_exc_raise(err);
00341 }
00342
00343 VALUE
00344 ossl_exc_new(VALUE exc, const char *fmt, ...)
00345 {
00346 va_list args;
00347 VALUE err;
00348 va_start(args, fmt);
00349 err = ossl_make_error(exc, fmt, args);
00350 va_end(args);
00351 return err;
00352 }
00353
00354
00355
00356
00357
00358
00359
00360
00361
00362 VALUE
00363 ossl_get_errors()
00364 {
00365 VALUE ary;
00366 long e;
00367
00368 ary = rb_ary_new();
00369 while ((e = ERR_get_error()) != 0){
00370 rb_ary_push(ary, rb_str_new2(ERR_error_string(e, NULL)));
00371 }
00372
00373 return ary;
00374 }
00375
00376
00377
00378
00379 VALUE dOSSL;
00380
00381 #if !defined(HAVE_VA_ARGS_MACRO)
00382 void
00383 ossl_debug(const char *fmt, ...)
00384 {
00385 va_list args;
00386
00387 if (dOSSL == Qtrue) {
00388 fprintf(stderr, "OSSL_DEBUG: ");
00389 va_start(args, fmt);
00390 vfprintf(stderr, fmt, args);
00391 va_end(args);
00392 fprintf(stderr, " [CONTEXT N/A]\n");
00393 }
00394 }
00395 #endif
00396
00397
00398
00399
00400
00401 static VALUE
00402 ossl_debug_get(VALUE self)
00403 {
00404 return dOSSL;
00405 }
00406
00407
00408
00409
00410
00411
00412
00413
00414 static VALUE
00415 ossl_debug_set(VALUE self, VALUE val)
00416 {
00417 VALUE old = dOSSL;
00418 dOSSL = val;
00419
00420 if (old != dOSSL) {
00421 if (dOSSL == Qtrue) {
00422 CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
00423 fprintf(stderr, "OSSL_DEBUG: IS NOW ON!\n");
00424 } else if (old == Qtrue) {
00425 CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_OFF);
00426 fprintf(stderr, "OSSL_DEBUG: IS NOW OFF!\n");
00427 }
00428 }
00429 return val;
00430 }
00431
00432
00433
00434
00435
00436
00437
00438
00439
00440
00441
00442
00443
00444
00445 static VALUE
00446 ossl_fips_mode_set(VALUE self, VALUE enabled)
00447 {
00448
00449 #ifdef HAVE_OPENSSL_FIPS
00450 if (RTEST(enabled)) {
00451 int mode = FIPS_mode();
00452 if(!mode && !FIPS_mode_set(1))
00453 ossl_raise(eOSSLError, "Turning on FIPS mode failed");
00454 } else {
00455 if(!FIPS_mode_set(0))
00456 ossl_raise(eOSSLError, "Turning off FIPS mode failed");
00457 }
00458 return enabled;
00459 #else
00460 if (RTEST(enabled))
00461 ossl_raise(eOSSLError, "This version of OpenSSL does not support FIPS mode");
00462 return enabled;
00463 #endif
00464 }
00465
00469 #include "../../thread_native.h"
00470 static rb_nativethread_lock_t *ossl_locks;
00471
00472 static void
00473 ossl_lock_unlock(int mode, rb_nativethread_lock_t *lock)
00474 {
00475 if (mode & CRYPTO_LOCK) {
00476 rb_nativethread_lock_lock(lock);
00477 } else {
00478 rb_nativethread_lock_unlock(lock);
00479 }
00480 }
00481
00482 static void
00483 ossl_lock_callback(int mode, int type, const char *file, int line)
00484 {
00485 ossl_lock_unlock(mode, &ossl_locks[type]);
00486 }
00487
00488 struct CRYPTO_dynlock_value {
00489 rb_nativethread_lock_t lock;
00490 };
00491
00492 static struct CRYPTO_dynlock_value *
00493 ossl_dyn_create_callback(const char *file, int line)
00494 {
00495 struct CRYPTO_dynlock_value *dynlock = (struct CRYPTO_dynlock_value *)OPENSSL_malloc((int)sizeof(struct CRYPTO_dynlock_value));
00496 rb_nativethread_lock_initialize(&dynlock->lock);
00497 return dynlock;
00498 }
00499
00500 static void
00501 ossl_dyn_lock_callback(int mode, struct CRYPTO_dynlock_value *l, const char *file, int line)
00502 {
00503 ossl_lock_unlock(mode, &l->lock);
00504 }
00505
00506 static void
00507 ossl_dyn_destroy_callback(struct CRYPTO_dynlock_value *l, const char *file, int line)
00508 {
00509 rb_nativethread_lock_destroy(&l->lock);
00510 OPENSSL_free(l);
00511 }
00512
00513 #ifdef HAVE_CRYPTO_THREADID_PTR
00514 static void ossl_threadid_func(CRYPTO_THREADID *id)
00515 {
00516
00517 CRYPTO_THREADID_set_pointer(id, (void *)rb_nativethread_self());
00518 }
00519 #else
00520 static unsigned long ossl_thread_id(void)
00521 {
00522
00523 return (unsigned long)rb_nativethread_self();
00524 }
00525 #endif
00526
00527 static void Init_ossl_locks(void)
00528 {
00529 int i;
00530 int num_locks = CRYPTO_num_locks();
00531
00532 if ((unsigned)num_locks >= INT_MAX / (int)sizeof(VALUE)) {
00533 rb_raise(rb_eRuntimeError, "CRYPTO_num_locks() is too big: %d", num_locks);
00534 }
00535 ossl_locks = (rb_nativethread_lock_t *) OPENSSL_malloc(num_locks * (int)sizeof(rb_nativethread_lock_t));
00536 if (!ossl_locks) {
00537 rb_raise(rb_eNoMemError, "CRYPTO_num_locks() is too big: %d", num_locks);
00538 }
00539 for (i = 0; i < num_locks; i++) {
00540 rb_nativethread_lock_initialize(&ossl_locks[i]);
00541 }
00542
00543 #ifdef HAVE_CRYPTO_THREADID_PTR
00544 CRYPTO_THREADID_set_callback(ossl_threadid_func);
00545 #else
00546 CRYPTO_set_id_callback(ossl_thread_id);
00547 #endif
00548 CRYPTO_set_locking_callback(ossl_lock_callback);
00549 CRYPTO_set_dynlock_create_callback(ossl_dyn_create_callback);
00550 CRYPTO_set_dynlock_lock_callback(ossl_dyn_lock_callback);
00551 CRYPTO_set_dynlock_destroy_callback(ossl_dyn_destroy_callback);
00552 }
00553
00554
00555
00556
00557
00558
00559
00560
00561
00562
00563
00564
00565
00566
00567
00568
00569
00570
00571
00572
00573
00574
00575
00576
00577
00578
00579
00580
00581
00582
00583
00584
00585
00586
00587
00588
00589
00590
00591
00592
00593
00594
00595
00596
00597
00598
00599
00600
00601
00602
00603
00604
00605
00606
00607
00608
00609
00610
00611
00612
00613
00614
00615
00616
00617
00618
00619
00620
00621
00622
00623
00624
00625
00626
00627
00628
00629
00630
00631
00632
00633
00634
00635
00636
00637
00638
00639
00640
00641
00642
00643
00644
00645
00646
00647
00648
00649
00650
00651
00652
00653
00654
00655
00656
00657
00658
00659
00660
00661
00662
00663
00664
00665
00666
00667
00668
00669
00670
00671
00672
00673
00674
00675
00676
00677
00678
00679
00680
00681
00682
00683
00684
00685
00686
00687
00688
00689
00690
00691
00692
00693
00694
00695
00696
00697
00698
00699
00700
00701
00702
00703
00704
00705
00706
00707
00708
00709
00710
00711
00712
00713
00714
00715
00716
00717
00718
00719
00720
00721
00722
00723
00724
00725
00726
00727
00728
00729
00730
00731
00732
00733
00734
00735
00736
00737
00738
00739
00740
00741
00742
00743
00744
00745
00746
00747
00748
00749
00750
00751
00752
00753
00754
00755
00756
00757
00758
00759
00760
00761
00762
00763
00764
00765
00766
00767
00768
00769
00770
00771
00772
00773
00774
00775
00776
00777
00778
00779
00780
00781
00782
00783
00784
00785
00786
00787
00788
00789
00790
00791
00792
00793
00794
00795
00796
00797
00798
00799
00800
00801
00802
00803
00804
00805
00806
00807
00808
00809
00810
00811
00812
00813
00814
00815
00816
00817
00818
00819
00820
00821
00822
00823
00824
00825
00826
00827
00828
00829
00830
00831
00832
00833
00834
00835
00836
00837
00838
00839
00840
00841
00842
00843
00844
00845
00846
00847
00848
00849
00850
00851
00852
00853
00854
00855
00856
00857
00858
00859
00860
00861
00862
00863
00864
00865
00866
00867
00868
00869
00870
00871
00872
00873
00874
00875
00876
00877
00878
00879
00880
00881
00882
00883
00884
00885
00886
00887
00888
00889
00890
00891
00892
00893
00894
00895
00896
00897
00898
00899
00900
00901
00902
00903
00904
00905
00906
00907
00908
00909
00910
00911
00912
00913
00914
00915
00916
00917
00918
00919
00920
00921
00922
00923
00924
00925
00926
00927
00928
00929
00930
00931
00932
00933
00934
00935
00936
00937
00938
00939
00940
00941
00942
00943
00944
00945
00946
00947
00948
00949
00950
00951
00952
00953
00954
00955
00956
00957
00958
00959
00960
00961
00962
00963
00964
00965
00966
00967
00968
00969
00970
00971
00972
00973
00974
00975
00976
00977
00978
00979
00980
00981
00982
00983
00984
00985
00986
00987
00988
00989
00990
00991
00992
00993
00994
00995
00996
00997
00998
00999
01000
01001
01002
01003
01004
01005
01006
01007
01008
01009
01010
01011
01012
01013
01014
01015
01016
01017
01018
01019
01020
01021
01022
01023
01024
01025
01026
01027
01028
01029
01030
01031
01032
01033
01034
01035 void
01036 Init_openssl()
01037 {
01038
01039
01040
01041 #if 0
01042 tzset();
01043 #endif
01044
01045
01046
01047
01048
01049
01050 OpenSSL_add_ssl_algorithms();
01051 OpenSSL_add_all_algorithms();
01052 ERR_load_crypto_strings();
01053 SSL_load_error_strings();
01054
01055
01056
01057
01058
01059 #if 0
01060 CONF_modules_unload(1);
01061 destroy_ui_method();
01062 EVP_cleanup();
01063 ENGINE_cleanup();
01064 CRYPTO_cleanup_all_ex_data();
01065 ERR_remove_state(0);
01066 ERR_free_strings();
01067 #endif
01068
01069
01070
01071
01072 mOSSL = rb_define_module("OpenSSL");
01073 rb_global_variable(&mOSSL);
01074
01075
01076
01077
01078 rb_define_const(mOSSL, "VERSION", rb_str_new2(OSSL_VERSION));
01079
01080
01081
01082
01083 rb_define_const(mOSSL, "OPENSSL_VERSION", rb_str_new2(OPENSSL_VERSION_TEXT));
01084
01085
01086
01087
01088 rb_define_const(mOSSL, "OPENSSL_LIBRARY_VERSION", rb_str_new2(SSLeay_version(SSLEAY_VERSION)));
01089
01090
01091
01092
01093
01094 rb_define_const(mOSSL, "OPENSSL_VERSION_NUMBER", INT2NUM(OPENSSL_VERSION_NUMBER));
01095
01096
01097
01098
01099 #ifdef HAVE_OPENSSL_FIPS
01100 rb_define_const(mOSSL, "OPENSSL_FIPS", Qtrue);
01101 #else
01102 rb_define_const(mOSSL, "OPENSSL_FIPS", Qfalse);
01103 #endif
01104 rb_define_module_function(mOSSL, "fips_mode=", ossl_fips_mode_set, 1);
01105
01106
01107
01108
01109
01110 eOSSLError = rb_define_class_under(mOSSL,"OpenSSLError",rb_eStandardError);
01111 rb_global_variable(&eOSSLError);
01112
01113
01114
01115
01116 if ((ossl_verify_cb_idx = X509_STORE_CTX_get_ex_new_index(0, (void *)"ossl_verify_cb_idx", 0, 0, 0)) < 0)
01117 ossl_raise(eOSSLError, "X509_STORE_CTX_get_ex_new_index");
01118
01119
01120
01121
01122 dOSSL = Qfalse;
01123 rb_global_variable(&dOSSL);
01124
01125 rb_define_module_function(mOSSL, "debug", ossl_debug_get, 0);
01126 rb_define_module_function(mOSSL, "debug=", ossl_debug_set, 1);
01127 rb_define_module_function(mOSSL, "errors", ossl_get_errors, 0);
01128
01129
01130
01131
01132 ossl_s_to_der = rb_intern("to_der");
01133
01134 Init_ossl_locks();
01135
01136
01137
01138
01139 Init_ossl_bn();
01140 Init_ossl_cipher();
01141 Init_ossl_config();
01142 Init_ossl_digest();
01143 Init_ossl_hmac();
01144 Init_ossl_ns_spki();
01145 Init_ossl_pkcs12();
01146 Init_ossl_pkcs7();
01147 Init_ossl_pkcs5();
01148 Init_ossl_pkey();
01149 Init_ossl_rand();
01150 Init_ossl_ssl();
01151 Init_ossl_x509();
01152 Init_ossl_ocsp();
01153 Init_ossl_engine();
01154 Init_ossl_asn1();
01155 }
01156
01157 #if defined(OSSL_DEBUG)
01158
01159
01160
01161 int
01162 main(int argc, char *argv[])
01163 {
01164 return 0;
01165 }
01166 #endif
01167
01168