3 changed files with 150 additions and 53 deletions
@ -0,0 +1,110 @@ |
|||||||
|
/* |
||||||
|
* TLS helpers for Go based on crypto/tls package. |
||||||
|
* |
||||||
|
* Copyright (C) 2014 struktur AG. All rights reserved. |
||||||
|
* Copyright 2011 The Go Authors. All rights reserved. |
||||||
|
* |
||||||
|
* Redistribution and use in source and binary forms, with or without |
||||||
|
* modification, are permitted provided that the following conditions are |
||||||
|
* met: |
||||||
|
* |
||||||
|
* * Redistributions of source code must retain the above copyright |
||||||
|
* notice, this list of conditions and the following disclaimer. |
||||||
|
* * Redistributions in binary form must reproduce the above |
||||||
|
* copyright notice, this list of conditions and the following disclaimer |
||||||
|
* in the documentation and/or other materials provided with the |
||||||
|
* distribution. |
||||||
|
* * Neither the name of Google Inc. nor the names of its |
||||||
|
* contributors may be used to endorse or promote products derived from |
||||||
|
* this software without specific prior written permission. |
||||||
|
* |
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
||||||
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
||||||
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
||||||
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
||||||
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
||||||
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
||||||
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
||||||
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
||||||
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
||||||
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
||||||
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
||||||
|
* |
||||||
|
*/ |
||||||
|
|
||||||
|
package main |
||||||
|
|
||||||
|
import ( |
||||||
|
"crypto" |
||||||
|
"crypto/ecdsa" |
||||||
|
"crypto/rsa" |
||||||
|
"crypto/tls" |
||||||
|
"crypto/x509" |
||||||
|
"encoding/pem" |
||||||
|
"errors" |
||||||
|
"io/ioutil" |
||||||
|
"strings" |
||||||
|
) |
||||||
|
|
||||||
|
func loadX509PrivateKey(keyFile string) (privateKey crypto.PrivateKey, err error) { |
||||||
|
keyPEMBlock, err := ioutil.ReadFile(keyFile) |
||||||
|
if err != nil { |
||||||
|
return |
||||||
|
} |
||||||
|
var keyDERBlock *pem.Block |
||||||
|
for { |
||||||
|
keyDERBlock, keyPEMBlock = pem.Decode(keyPEMBlock) |
||||||
|
if keyDERBlock == nil { |
||||||
|
err = errors.New("failed to parse key PEM data") |
||||||
|
return |
||||||
|
} |
||||||
|
if keyDERBlock.Type == "PRIVATE KEY" || strings.HasSuffix(keyDERBlock.Type, " PRIVATE KEY") { |
||||||
|
break |
||||||
|
} |
||||||
|
} |
||||||
|
privateKey, err = parsePrivateKey(keyDERBlock.Bytes) |
||||||
|
return |
||||||
|
} |
||||||
|
|
||||||
|
func loadX509Certificate(certFile string) (cert tls.Certificate, err error) { |
||||||
|
certPEMBlock, err := ioutil.ReadFile(certFile) |
||||||
|
if err != nil { |
||||||
|
return |
||||||
|
} |
||||||
|
var certDERBlock *pem.Block |
||||||
|
for { |
||||||
|
certDERBlock, certPEMBlock = pem.Decode(certPEMBlock) |
||||||
|
if certDERBlock == nil { |
||||||
|
break |
||||||
|
} |
||||||
|
if certDERBlock.Type == "CERTIFICATE" { |
||||||
|
cert.Certificate = append(cert.Certificate, certDERBlock.Bytes) |
||||||
|
} |
||||||
|
} |
||||||
|
|
||||||
|
if len(cert.Certificate) == 0 { |
||||||
|
err = errors.New("failed to parse certificate PEM data") |
||||||
|
} |
||||||
|
return |
||||||
|
} |
||||||
|
|
||||||
|
// Attempt to parse the given private key DER block. OpenSSL 0.9.8 generates
|
||||||
|
// PKCS#1 private keys by default, while OpenSSL 1.0.0 generates PKCS#8 keys.
|
||||||
|
// OpenSSL ecparam generates SEC1 EC private keys for ECDSA. We try all three.
|
||||||
|
func parsePrivateKey(der []byte) (crypto.PrivateKey, error) { |
||||||
|
if key, err := x509.ParsePKCS1PrivateKey(der); err == nil { |
||||||
|
return key, nil |
||||||
|
} |
||||||
|
if key, err := x509.ParsePKCS8PrivateKey(der); err == nil { |
||||||
|
switch key := key.(type) { |
||||||
|
case *rsa.PrivateKey, *ecdsa.PrivateKey: |
||||||
|
return key, nil |
||||||
|
default: |
||||||
|
return nil, errors.New("found unknown private key type in PKCS#8 wrapping") |
||||||
|
} |
||||||
|
} |
||||||
|
if key, err := x509.ParseECPrivateKey(der); err == nil { |
||||||
|
return key, nil |
||||||
|
} |
||||||
|
return nil, errors.New("failed to parse private key") |
||||||
|
} |
||||||
Loading…
Reference in new issue