diff options
author | William Ahern <william@25thandClement.com> | 2015-12-18 13:55:26 +0800 |
---|---|---|
committer | William Ahern <william@25thandClement.com> | 2015-12-18 13:55:26 +0800 |
commit | 08acf63d7cc806c61c44b1cfdc125bbdcd0a8018 (patch) | |
tree | 85641054d1f7e5866880fa20b24c458cfc82eb65 /src | |
parent | 67187d3b796abef2836e2425c0c28f1bb48e5233 (diff) | |
parent | fcd7076005e7e81e37e31df9e5b712214cead2c6 (diff) | |
download | luaossl-08acf63d7cc806c61c44b1cfdc125bbdcd0a8018.tar.gz luaossl-08acf63d7cc806c61c44b1cfdc125bbdcd0a8018.tar.bz2 luaossl-08acf63d7cc806c61c44b1cfdc125bbdcd0a8018.zip |
Merge branch '36-private-key-inspection' of git://github.com/daurnimator/luaossl into daurnimator-36-private-key-inspection
Diffstat (limited to 'src')
-rw-r--r-- | src/openssl.c | 117 |
1 files changed, 117 insertions, 0 deletions
diff --git a/src/openssl.c b/src/openssl.c index 01bf2c8..c3f8bbb 100644 --- a/src/openssl.c +++ b/src/openssl.c @@ -1558,6 +1558,16 @@ static BIGNUM *bn_push(lua_State *L) { } /* bn_push() */ +static BIGNUM *bn_dup(lua_State *L, const BIGNUM *src) { + BIGNUM **ud = prepsimple(L, BIGNUM_CLASS); + + if (!(*ud = BN_dup(src))) + auxL_error(L, auxL_EOPENSSL, "bignum.new"); + + return *ud; +} /* bn_dup() */ + + #define checkbig_(a, b, c, ...) checkbig((a), (b), (c)) #define checkbig(...) checkbig_(__VA_ARGS__, &(_Bool){ 0 }, 0) @@ -2498,6 +2508,112 @@ static int pk_toPEM(lua_State *L) { } /* pk_toPEM() */ +static int pk_getParameters(lua_State *L) { + EVP_PKEY *key = checksimple(L, 1, PKEY_CLASS); + _Bool public_only = lua_toboolean(L, 2); + + void *tmp; + const EC_GROUP *group; + const EC_POINT *public_key; + + if (!(tmp = EVP_PKEY_get0(key))) + return auxL_error(L, auxL_EOPENSSL, "pkey:getParameters"); + + lua_newtable(L); + + switch (EVP_PKEY_base_id(key)) { + case EVP_PKEY_RSA: + /* RSA public modulus n */ + if (!bn_dup(L, ((RSA*)tmp)->n)) + return auxL_error(L, auxL_EOPENSSL, "pkey:getParameters"); + lua_setfield(L, -2, "n"); + + /* RSA public exponent e */ + if (!bn_dup(L, ((RSA*)tmp)->e)) + return auxL_error(L, auxL_EOPENSSL, "pkey:getParameters"); + lua_setfield(L, -2, "e"); + + if (public_only) break; + + /* RSA secret exponent d */ + if (!bn_dup(L, ((RSA*)tmp)->d)) + return auxL_error(L, auxL_EOPENSSL, "pkey:getParameters"); + lua_setfield(L, -2, "d"); + + /* RSA secret prime p */ + if (!bn_dup(L, ((RSA*)tmp)->p)) + return auxL_error(L, auxL_EOPENSSL, "pkey:getParameters"); + lua_setfield(L, -2, "p"); + + /* RSA secret prime q with p < q */ + if (!bn_dup(L, ((RSA*)tmp)->q)) + return auxL_error(L, auxL_EOPENSSL, "pkey:getParameters"); + lua_setfield(L, -2, "q"); + + /* exponent1 */ + if (!bn_dup(L, ((RSA*)tmp)->dmp1)) + return auxL_error(L, auxL_EOPENSSL, "pkey:getParameters"); + lua_setfield(L, -2, "dmp1"); + + /* exponent2 */ + if (!bn_dup(L, ((RSA*)tmp)->dmq1)) + return auxL_error(L, auxL_EOPENSSL, "pkey:getParameters"); + lua_setfield(L, -2, "dmq1"); + + /* coefficient */ + if (!bn_dup(L, ((RSA*)tmp)->iqmp)) + return auxL_error(L, auxL_EOPENSSL, "pkey:getParameters"); + lua_setfield(L, -2, "iqmp"); + + break; + case EVP_PKEY_DH: + /* prime */ + if (!bn_dup(L, ((DH*)tmp)->p)) + return auxL_error(L, auxL_EOPENSSL, "pkey:getParameters"); + lua_setfield(L, -2, "p"); + + /* generator */ + if (!bn_dup(L, ((DH*)tmp)->g)) + return auxL_error(L, auxL_EOPENSSL, "pkey:getParameters"); + lua_setfield(L, -2, "g"); + + /* pub_key */ + if (!bn_dup(L, ((DH*)tmp)->pub_key)) + return auxL_error(L, auxL_EOPENSSL, "pkey:getParameters"); + lua_setfield(L, -2, "pub_key"); + + if (public_only) break; + + /* priv_key */ + if (!bn_dup(L, ((DH*)tmp)->priv_key)) + return auxL_error(L, auxL_EOPENSSL, "pkey:getParameters"); + lua_setfield(L, -2, "priv_key"); + + break; + case EVP_PKEY_EC: + /* pub_key */ + if (!(group = EC_KEY_get0_group(tmp)) || !(public_key = EC_KEY_get0_public_key(tmp))) + return auxL_error(L, auxL_EOPENSSL, "pkey:getParameters"); + if (!bn_dup(L, EC_POINT_point2bn(group, public_key, EC_KEY_get_conv_form(tmp), NULL, getctx(L)))) + return auxL_error(L, auxL_EOPENSSL, "pkey:getParameters"); + lua_setfield(L, -2, "pub_key"); + + if (public_only) break; + + /* priv_key */ + if (!bn_dup(L, EC_KEY_get0_private_key(tmp))) + return auxL_error(L, auxL_EOPENSSL, "pkey:getParameters"); + lua_setfield(L, -2, "priv_key"); + + break; + default: + return luaL_error(L, "%d: unsupported EVP base type", EVP_PKEY_base_id(key)); + } /* switch() */ + + return 1; +} + + static int pk__tostring(lua_State *L) { EVP_PKEY *key = checksimple(L, 1, PKEY_CLASS); int type = optencoding(L, 2, "pem", X509_PEM|X509_DER); @@ -2543,6 +2659,7 @@ static const luaL_Reg pk_methods[] = { { "sign", &pk_sign }, { "verify", &pk_verify }, { "toPEM", &pk_toPEM }, + { "getParameters", &pk_getParameters }, { NULL, NULL }, }; |