3 changed files with 150 additions and 53 deletions
@ -0,0 +1,110 @@
@@ -0,0 +1,110 @@
|
||||
/* |
||||
* TLS helpers for Go based on crypto/tls package. |
||||
* |
||||
* Copyright (C) 2014 struktur AG. All rights reserved. |
||||
* Copyright 2011 The Go Authors. All rights reserved. |
||||
* |
||||
* Redistribution and use in source and binary forms, with or without |
||||
* modification, are permitted provided that the following conditions are |
||||
* met: |
||||
* |
||||
* * Redistributions of source code must retain the above copyright |
||||
* notice, this list of conditions and the following disclaimer. |
||||
* * Redistributions in binary form must reproduce the above |
||||
* copyright notice, this list of conditions and the following disclaimer |
||||
* in the documentation and/or other materials provided with the |
||||
* distribution. |
||||
* * Neither the name of Google Inc. nor the names of its |
||||
* contributors may be used to endorse or promote products derived from |
||||
* this software without specific prior written permission. |
||||
* |
||||
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
||||
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
||||
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
||||
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
||||
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
||||
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
||||
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
||||
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
||||
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
||||
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
||||
* |
||||
*/ |
||||
|
||||
package main |
||||
|
||||
import ( |
||||
"crypto" |
||||
"crypto/ecdsa" |
||||
"crypto/rsa" |
||||
"crypto/tls" |
||||
"crypto/x509" |
||||
"encoding/pem" |
||||
"errors" |
||||
"io/ioutil" |
||||
"strings" |
||||
) |
||||
|
||||
func loadX509PrivateKey(keyFile string) (privateKey crypto.PrivateKey, err error) { |
||||
keyPEMBlock, err := ioutil.ReadFile(keyFile) |
||||
if err != nil { |
||||
return |
||||
} |
||||
var keyDERBlock *pem.Block |
||||
for { |
||||
keyDERBlock, keyPEMBlock = pem.Decode(keyPEMBlock) |
||||
if keyDERBlock == nil { |
||||
err = errors.New("failed to parse key PEM data") |
||||
return |
||||
} |
||||
if keyDERBlock.Type == "PRIVATE KEY" || strings.HasSuffix(keyDERBlock.Type, " PRIVATE KEY") { |
||||
break |
||||
} |
||||
} |
||||
privateKey, err = parsePrivateKey(keyDERBlock.Bytes) |
||||
return |
||||
} |
||||
|
||||
func loadX509Certificate(certFile string) (cert tls.Certificate, err error) { |
||||
certPEMBlock, err := ioutil.ReadFile(certFile) |
||||
if err != nil { |
||||
return |
||||
} |
||||
var certDERBlock *pem.Block |
||||
for { |
||||
certDERBlock, certPEMBlock = pem.Decode(certPEMBlock) |
||||
if certDERBlock == nil { |
||||
break |
||||
} |
||||
if certDERBlock.Type == "CERTIFICATE" { |
||||
cert.Certificate = append(cert.Certificate, certDERBlock.Bytes) |
||||
} |
||||
} |
||||
|
||||
if len(cert.Certificate) == 0 { |
||||
err = errors.New("failed to parse certificate PEM data") |
||||
} |
||||
return |
||||
} |
||||
|
||||
// Attempt to parse the given private key DER block. OpenSSL 0.9.8 generates
|
||||
// PKCS#1 private keys by default, while OpenSSL 1.0.0 generates PKCS#8 keys.
|
||||
// OpenSSL ecparam generates SEC1 EC private keys for ECDSA. We try all three.
|
||||
func parsePrivateKey(der []byte) (crypto.PrivateKey, error) { |
||||
if key, err := x509.ParsePKCS1PrivateKey(der); err == nil { |
||||
return key, nil |
||||
} |
||||
if key, err := x509.ParsePKCS8PrivateKey(der); err == nil { |
||||
switch key := key.(type) { |
||||
case *rsa.PrivateKey, *ecdsa.PrivateKey: |
||||
return key, nil |
||||
default: |
||||
return nil, errors.New("found unknown private key type in PKCS#8 wrapping") |
||||
} |
||||
} |
||||
if key, err := x509.ParseECPrivateKey(der); err == nil { |
||||
return key, nil |
||||
} |
||||
return nil, errors.New("failed to parse private key") |
||||
} |
Loading…
Reference in new issue