mirror of
https://github.com/libp2p/go-openssl.git
synced 2024-12-26 23:40:07 +08:00
053d794fe5
[katamari commit: 66d3bf715795d3696ca37003fba5dba1af7ffacf]
115 lines
3.5 KiB
Go
115 lines
3.5 KiB
Go
// Copyright (C) 2014 Space Monkey, Inc.
|
|
|
|
package openssl
|
|
|
|
/*
|
|
#cgo pkg-config: openssl
|
|
#include <openssl/ssl.h>
|
|
#include <openssl/conf.h>
|
|
#include <openssl/x509.h>
|
|
|
|
#ifndef X509_CHECK_FLAG_ALWAYS_CHECK_SUBJECT
|
|
#define X509_CHECK_FLAG_ALWAYS_CHECK_SUBJECT 0x1
|
|
#define X509_CHECK_FLAG_NO_WILDCARDS 0x2
|
|
|
|
extern int X509_check_host(X509 *x, const unsigned char *chk, size_t chklen,
|
|
unsigned int flags);
|
|
extern int X509_check_email(X509 *x, const unsigned char *chk, size_t chklen,
|
|
unsigned int flags);
|
|
extern int X509_check_ip(X509 *x, const unsigned char *chk, size_t chklen,
|
|
unsigned int flags);
|
|
#endif
|
|
*/
|
|
import "C"
|
|
|
|
import (
|
|
"errors"
|
|
"net"
|
|
"unsafe"
|
|
)
|
|
|
|
var (
|
|
ValidationError = errors.New("Host validation error")
|
|
)
|
|
|
|
type CheckFlags int
|
|
|
|
const (
|
|
AlwaysCheckSubject CheckFlags = C.X509_CHECK_FLAG_ALWAYS_CHECK_SUBJECT
|
|
NoWildcards CheckFlags = C.X509_CHECK_FLAG_NO_WILDCARDS
|
|
)
|
|
|
|
// CheckHost checks that the X509 certificate is signed for the provided
|
|
// host name. See http://www.openssl.org/docs/crypto/X509_check_host.html for
|
|
// more. Note that CheckHost does not check the IP field. See VerifyHostname.
|
|
// Specifically returns ValidationError if the Certificate didn't match but
|
|
// there was no internal error.
|
|
func (c *Certificate) CheckHost(host string, flags CheckFlags) error {
|
|
chost := unsafe.Pointer(C.CString(host))
|
|
defer C.free(chost)
|
|
rv := C.X509_check_host(c.x, (*C.uchar)(chost), C.size_t(len(host)),
|
|
C.uint(flags))
|
|
if rv > 0 {
|
|
return nil
|
|
}
|
|
if rv == 0 {
|
|
return ValidationError
|
|
}
|
|
return errors.New("hostname validation had an internal failure")
|
|
}
|
|
|
|
// CheckEmail checks that the X509 certificate is signed for the provided
|
|
// email address. See http://www.openssl.org/docs/crypto/X509_check_host.html
|
|
// for more.
|
|
// Specifically returns ValidationError if the Certificate didn't match but
|
|
// there was no internal error.
|
|
func (c *Certificate) CheckEmail(email string, flags CheckFlags) error {
|
|
cemail := unsafe.Pointer(C.CString(email))
|
|
defer C.free(cemail)
|
|
rv := C.X509_check_email(c.x, (*C.uchar)(cemail), C.size_t(len(email)),
|
|
C.uint(flags))
|
|
if rv > 0 {
|
|
return nil
|
|
}
|
|
if rv == 0 {
|
|
return ValidationError
|
|
}
|
|
return errors.New("email validation had an internal failure")
|
|
}
|
|
|
|
// CheckIP checks that the X509 certificate is signed for the provided
|
|
// IP address. See http://www.openssl.org/docs/crypto/X509_check_host.html
|
|
// for more.
|
|
// Specifically returns ValidationError if the Certificate didn't match but
|
|
// there was no internal error.
|
|
func (c *Certificate) CheckIP(ip net.IP, flags CheckFlags) error {
|
|
cip := unsafe.Pointer(&ip[0])
|
|
rv := C.X509_check_ip(c.x, (*C.uchar)(cip), C.size_t(len(ip)),
|
|
C.uint(flags))
|
|
if rv > 0 {
|
|
return nil
|
|
}
|
|
if rv == 0 {
|
|
return ValidationError
|
|
}
|
|
return errors.New("ip validation had an internal failure")
|
|
}
|
|
|
|
// VerifyHostname is a combination of CheckHost and CheckIP. If the provided
|
|
// hostname looks like an IP address, it will be checked as an IP address,
|
|
// otherwise it will be checked as a hostname.
|
|
// Specifically returns ValidationError if the Certificate didn't match but
|
|
// there was no internal error.
|
|
func (c *Certificate) VerifyHostname(host string) error {
|
|
var ip net.IP
|
|
if len(host) >= 3 && host[0] == '[' && host[len(host)-1] == ']' {
|
|
ip = net.ParseIP(host[1 : len(host)-1])
|
|
} else {
|
|
ip = net.ParseIP(host)
|
|
}
|
|
if ip != nil {
|
|
return c.CheckIP(ip, 0)
|
|
}
|
|
return c.CheckHost(host, 0)
|
|
}
|