line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
package POE::Filter::SSL; |
2
|
|
|
|
|
|
|
|
3
|
1
|
|
|
1
|
|
52131
|
use strict; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
23
|
|
4
|
1
|
|
|
1
|
|
561
|
use Net::SSLeay; |
|
1
|
|
|
|
|
11223
|
|
|
1
|
|
|
|
|
42
|
|
5
|
1
|
|
|
1
|
|
443
|
use POE qw (Filter::HTTPD Filter::Stackable Wheel::ReadWrite); |
|
1
|
|
|
|
|
28905
|
|
|
1
|
|
|
|
|
5
|
|
6
|
1
|
|
|
1
|
|
95022
|
use Scalar::Util qw(blessed); |
|
1
|
|
|
|
|
3
|
|
|
1
|
|
|
|
|
47
|
|
7
|
1
|
|
|
1
|
|
12
|
use Carp qw(carp confess); |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
37
|
|
8
|
1
|
|
|
1
|
|
5
|
use POE; |
|
1
|
|
|
|
|
1
|
|
|
1
|
|
|
|
|
6
|
|
9
|
|
|
|
|
|
|
|
10
|
1
|
|
|
1
|
|
265
|
use vars qw($VERSION); |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
131
|
|
11
|
|
|
|
|
|
|
$VERSION = '0.41'; |
12
|
|
|
|
|
|
|
sub DOSENDBACK () { 1 } |
13
|
|
|
|
|
|
|
|
14
|
|
|
|
|
|
|
our $globalinfos = {}; |
15
|
|
|
|
|
|
|
|
16
|
0
|
|
|
|
|
|
BEGIN { |
17
|
1
|
|
|
1
|
|
7
|
our $HANDSHAKE = 19; |
18
|
1
|
|
|
|
|
1
|
our $EVENT_FLUSHED = 20; |
19
|
1
|
|
|
|
|
2
|
our $EVENT_INPUT = 21; |
20
|
1
|
|
|
|
|
2
|
eval { |
21
|
1
|
|
|
|
|
4
|
require Net::SSLeay; |
22
|
1
|
|
|
|
|
1233
|
Net::SSLeay->import( 1.30 ); |
23
|
|
|
|
|
|
|
}; |
24
|
1
|
|
|
|
|
1355
|
Net::SSLeay::load_error_strings(); |
25
|
1
|
|
|
|
|
77
|
Net::SSLeay::SSLeay_add_ssl_algorithms(); |
26
|
1
|
|
|
|
|
8
|
Net::SSLeay::randomize(); |
27
|
|
|
|
|
|
|
|
28
|
1
|
|
|
1
|
|
7
|
no warnings 'redefine'; |
|
1
|
|
|
|
|
2
|
|
|
1
|
|
|
|
|
780
|
|
29
|
1
|
|
|
|
|
723
|
my $old_new = \&POE::Wheel::ReadWrite::new; |
30
|
|
|
|
|
|
|
*POE::Wheel::ReadWrite::new = sub { |
31
|
0
|
|
|
0
|
|
0
|
my $class = shift; |
32
|
0
|
|
|
|
|
0
|
my %arg = @_; |
33
|
0
|
|
|
|
|
0
|
my $self = $old_new->($class,%arg); |
34
|
0
|
|
|
|
|
0
|
my $unique_id = $self->[POE::Wheel::ReadWrite::UNIQUE_ID]; |
35
|
0
|
|
|
|
|
0
|
$self->[$EVENT_INPUT] = $self->[POE::Wheel::ReadWrite::EVENT_INPUT]; |
36
|
0
|
|
|
|
|
0
|
$self->[POE::Wheel::ReadWrite::EVENT_INPUT] = ref($self) . "($unique_id) -> ssl handshake"; |
37
|
0
|
|
|
|
|
0
|
my $flushed_event = \$self->[POE::Wheel::ReadWrite::EVENT_FLUSHED]; |
38
|
0
|
|
|
|
|
0
|
my $temp_flushed_event = \$self->[$EVENT_FLUSHED]; |
39
|
0
|
|
|
|
|
0
|
my $temp_event_input = \$self->[$EVENT_INPUT]; |
40
|
0
|
|
|
|
|
0
|
my $filter_output = \$self->[POE::Wheel::ReadWrite::FILTER_OUTPUT]; |
41
|
0
|
|
|
|
|
0
|
my $driver = \$self->[POE::Wheel::ReadWrite::DRIVER_BOTH]; |
42
|
0
|
|
|
|
|
0
|
my $handle_output = \$self->[POE::Wheel::ReadWrite::HANDLE_OUTPUT]; |
43
|
|
|
|
|
|
|
$poe_kernel->state( |
44
|
|
|
|
|
|
|
$self->[$HANDSHAKE] = ref($self) . "($unique_id) -> ssl handshake", |
45
|
|
|
|
|
|
|
sub { |
46
|
0
|
0
|
|
0
|
|
0
|
if (checkForDoSendback($_[ARG0])) { |
47
|
0
|
0
|
|
|
|
0
|
unless (defined($$temp_flushed_event)) { |
48
|
0
|
|
|
|
|
0
|
$$temp_flushed_event = $$flushed_event; |
49
|
0
|
|
|
|
|
0
|
$$flushed_event = undef; |
50
|
|
|
|
|
|
|
} |
51
|
0
|
|
|
|
|
0
|
$$driver->put($$filter_output->put([$_[ARG0]])); |
52
|
0
|
|
|
|
|
0
|
$poe_kernel->select_resume_write($$handle_output); |
53
|
|
|
|
|
|
|
} else { |
54
|
0
|
|
|
|
|
0
|
$poe_kernel->call($_[SESSION], $$temp_event_input, $_[ARG0], $_[ARG1]); |
55
|
|
|
|
|
|
|
} |
56
|
|
|
|
|
|
|
} |
57
|
0
|
|
|
|
|
0
|
); |
58
|
0
|
|
|
|
|
0
|
return $self; |
59
|
1
|
|
|
|
|
7
|
}; |
60
|
1
|
|
|
|
|
2
|
my $old_rw_put = \&POE::Wheel::ReadWrite::put; |
61
|
|
|
|
|
|
|
*POE::Wheel::ReadWrite::put = sub { |
62
|
0
|
|
|
0
|
|
0
|
my $self = shift; |
63
|
0
|
|
|
|
|
0
|
my $unique_id = $self->[POE::Wheel::ReadWrite::UNIQUE_ID()]; |
64
|
0
|
0
|
|
|
|
0
|
if (defined($self->[$EVENT_FLUSHED])) { |
65
|
0
|
|
|
|
|
0
|
$self->[POE::Wheel::ReadWrite::EVENT_FLUSHED] = $self->[$EVENT_FLUSHED]; |
66
|
0
|
|
|
|
|
0
|
$self->[$EVENT_FLUSHED] = undef; |
67
|
|
|
|
|
|
|
} |
68
|
0
|
|
|
|
|
0
|
$old_rw_put->($self, @_); |
69
|
1
|
|
|
|
|
4
|
}; |
70
|
1
|
|
|
|
|
1
|
my $old_destroy = \&POE::Wheel::ReadWrite::DESTROY; |
71
|
|
|
|
|
|
|
*POE::Wheel::ReadWrite::DESTROY = sub { |
72
|
0
|
|
|
0
|
|
0
|
my $self = shift; |
73
|
0
|
0
|
|
|
|
0
|
if ($self->[$HANDSHAKE]) { |
74
|
0
|
|
|
|
|
0
|
$poe_kernel->state($self->[$HANDSHAKE]); |
75
|
0
|
|
|
|
|
0
|
$self->[$HANDSHAKE] = undef; |
76
|
|
|
|
|
|
|
} |
77
|
0
|
|
|
|
|
0
|
return $old_destroy->($self, @_); |
78
|
1
|
|
|
|
|
3
|
}; |
79
|
1
|
|
|
|
|
1
|
my $old_get_one = \&POE::Filter::Stackable::get_one; |
80
|
|
|
|
|
|
|
*POE::Filter::Stackable::get_one = sub { |
81
|
0
|
|
|
0
|
|
0
|
my ($self) = @_; |
82
|
0
|
|
|
|
|
0
|
my $return = [ ]; |
83
|
0
|
|
|
|
|
0
|
while (!@$return) { |
84
|
0
|
|
|
|
|
0
|
my $exchanged = 0; |
85
|
0
|
|
|
|
|
0
|
foreach my $filter (@{$self->[POE::Filter::Stackable::FILTERS]}) { |
|
0
|
|
|
|
|
0
|
|
86
|
|
|
|
|
|
|
# If we have something to input to the next filter, do that. |
87
|
0
|
0
|
|
|
|
0
|
if (@$return) { |
88
|
0
|
|
|
|
|
0
|
$filter->get_one_start($return); |
89
|
0
|
|
|
|
|
0
|
$exchanged++; |
90
|
|
|
|
|
|
|
} |
91
|
|
|
|
|
|
|
# Get what we can from the current filter. |
92
|
0
|
|
|
|
|
0
|
$return = $filter->get_one(); |
93
|
|
|
|
|
|
|
# This is the only inserted line: |
94
|
0
|
0
|
0
|
|
|
0
|
return $return if (checkForDoSendback($return) && ($return->[0] eq $filter)); |
95
|
|
|
|
|
|
|
} |
96
|
0
|
0
|
|
|
|
0
|
last unless $exchanged; |
97
|
|
|
|
|
|
|
} |
98
|
0
|
|
|
|
|
0
|
return $return; |
99
|
1
|
|
|
|
|
5
|
}; |
100
|
1
|
|
|
|
|
1
|
my $old_get_one_start = \&POE::Filter::Stackable::get_one_start; |
101
|
|
|
|
|
|
|
*POE::Filter::Stackable::get_one_start = sub { |
102
|
0
|
|
|
0
|
|
0
|
my $self = shift; |
103
|
0
|
0
|
|
|
|
0
|
(exists($self->[POE::Filter::Stackable::FILTERS]->[0])) ? $old_get_one_start->($self, @_) : [] |
104
|
1
|
|
|
|
|
3
|
}; |
105
|
1
|
|
|
|
|
1
|
my $old_put = \&POE::Filter::Stackable::put; |
106
|
|
|
|
|
|
|
*POE::Filter::Stackable::put = sub { |
107
|
0
|
|
|
0
|
|
|
my $self = shift; |
108
|
0
|
|
|
|
|
|
my $data = shift; |
109
|
0
|
|
|
|
|
|
my $found = 0; |
110
|
0
|
0
|
|
|
|
|
if (checkForDoSendback($data)) { |
111
|
0
|
|
|
|
|
|
foreach my $filter (@{$self->[POE::Filter::Stackable::FILTERS]}) { |
|
0
|
|
|
|
|
|
|
112
|
0
|
0
|
|
|
|
|
if ($data->[0] eq $filter) { |
113
|
0
|
|
|
|
|
|
$found++; |
114
|
0
|
|
|
|
|
|
last; |
115
|
|
|
|
|
|
|
} |
116
|
|
|
|
|
|
|
} |
117
|
|
|
|
|
|
|
} |
118
|
0
|
0
|
|
|
|
|
if ($found) { |
119
|
0
|
|
|
|
|
|
my $ok = 0; |
120
|
0
|
|
|
|
|
|
foreach my $filter (reverse @{$self->[POE::Filter::Stackable::FILTERS]}) { |
|
0
|
|
|
|
|
|
|
121
|
0
|
0
|
0
|
|
|
|
next unless ($ok || (($filter eq $data->[0]) && checkForDoSendback($data))); |
|
|
|
0
|
|
|
|
|
122
|
0
|
|
|
|
|
|
$ok++; |
123
|
0
|
|
|
|
|
|
$data = $filter->put($data); |
124
|
0
|
0
|
|
|
|
|
last unless @$data; |
125
|
|
|
|
|
|
|
} |
126
|
0
|
|
|
|
|
|
$data; |
127
|
|
|
|
|
|
|
} else { |
128
|
0
|
|
|
|
|
|
$old_put->($self, $data, @_); |
129
|
|
|
|
|
|
|
} |
130
|
1
|
|
|
|
|
3295
|
}; |
131
|
1
|
|
|
1
|
|
7
|
use warnings 'redefine'; |
|
1
|
|
|
|
|
1
|
|
|
1
|
|
|
|
|
47
|
|
132
|
|
|
|
|
|
|
} |
133
|
|
|
|
|
|
|
|
134
|
|
|
|
|
|
|
require XSLoader; |
135
|
|
|
|
|
|
|
XSLoader::load('POE::Filter::SSL', $VERSION); |
136
|
|
|
|
|
|
|
|
137
|
|
|
|
|
|
|
sub checkForDoSendback { |
138
|
0
|
|
|
0
|
1
|
|
my $chunks = shift; |
139
|
0
|
0
|
0
|
|
|
|
$chunks = $chunks->[0] if ((ref($chunks) eq "ARRAY") && |
140
|
|
|
|
|
|
|
(scalar(@$chunks))); |
141
|
0
|
0
|
0
|
|
|
|
return 1 if (blessed($chunks) && |
|
|
|
0
|
|
|
|
|
142
|
|
|
|
|
|
|
($chunks->can("DOSENDBACK")) && |
143
|
|
|
|
|
|
|
($chunks->DOSENDBACK())); |
144
|
0
|
|
|
|
|
|
return 0; |
145
|
|
|
|
|
|
|
} |
146
|
|
|
|
|
|
|
|
147
|
|
|
|
|
|
|
sub PEMdataToX509 { |
148
|
0
|
|
|
0
|
1
|
|
my $unblessed = shift; |
149
|
0
|
|
|
|
|
|
my $x509 = shift; |
150
|
0
|
|
|
|
|
|
my $bio = dataToBio($unblessed, $x509); |
151
|
0
|
|
|
|
|
|
my $x509result = undef; |
152
|
0
|
0
|
|
|
|
|
die "Error using x509: ".Net::SSLeay::ERR_error_string(Net::SSLeay::ERR_get_error()) |
153
|
|
|
|
|
|
|
unless ($x509result = Net::SSLeay::PEM_read_bio_X509($bio)); |
154
|
0
|
|
|
|
|
|
Net::SSLeay::BIO_free($bio); |
155
|
0
|
|
|
|
|
|
return $x509result; |
156
|
|
|
|
|
|
|
} |
157
|
|
|
|
|
|
|
|
158
|
|
|
|
|
|
|
sub PEMdataToEVP_PKEY { |
159
|
0
|
|
|
0
|
1
|
|
my $unblessed = shift; |
160
|
0
|
|
|
|
|
|
my $crt = shift; |
161
|
0
|
|
|
|
|
|
my $bio = dataToBio($unblessed, $crt); |
162
|
0
|
|
|
|
|
|
my $evp_pkey = undef; |
163
|
0
|
0
|
|
|
|
|
die "Error using cacrt: ".Net::SSLeay::ERR_error_string(Net::SSLeay::ERR_get_error()) |
164
|
|
|
|
|
|
|
unless ($evp_pkey = Net::SSLeay::PEM_read_bio_PrivateKey($bio)); |
165
|
0
|
|
|
|
|
|
Net::SSLeay::BIO_free($bio); |
166
|
0
|
|
|
|
|
|
return $evp_pkey; |
167
|
|
|
|
|
|
|
} |
168
|
|
|
|
|
|
|
|
169
|
|
|
|
|
|
|
sub CTX_add_client_CA { |
170
|
0
|
|
|
0
|
1
|
|
my $unblessed = shift; |
171
|
0
|
|
|
|
|
|
my $ctx = shift; |
172
|
0
|
|
|
|
|
|
my $x509 = shift; |
173
|
0
|
|
|
|
|
|
my $err = Net::SSLeay::X509_STORE_add_cert(Net::SSLeay::CTX_get_cert_store($ctx), PEMdataToX509($unblessed, $x509)); |
174
|
0
|
0
|
0
|
|
|
|
die "Error using cacrt: ".Net::SSLeay::ERR_error_string(Net::SSLeay::ERR_get_error()) |
175
|
|
|
|
|
|
|
if ($err && ($err != 1)); |
176
|
0
|
|
|
|
|
|
$err = Net::SSLeay::CTX_add_client_CA($ctx, PEMdataToX509($unblessed, $x509)); |
177
|
0
|
0
|
0
|
|
|
|
die "Error using cacrt: ".Net::SSLeay::ERR_error_string(Net::SSLeay::ERR_get_error()) |
178
|
|
|
|
|
|
|
if ($err && ($err != 1)); |
179
|
|
|
|
|
|
|
} |
180
|
|
|
|
|
|
|
|
181
|
|
|
|
|
|
|
sub dataToBio { |
182
|
0
|
|
|
0
|
1
|
|
my $unblessed = shift; |
183
|
0
|
|
|
|
|
|
my $data = shift; |
184
|
0
|
|
|
|
|
|
my $bio = Net::SSLeay::BIO_new(Net::SSLeay::BIO_s_mem()); |
185
|
0
|
|
|
|
|
|
my $sent = Net::SSLeay::BIO_write($bio, $data); |
186
|
|
|
|
|
|
|
print "Wrote ".$sent." of ".length($data)." bytes.\n" |
187
|
0
|
0
|
|
|
|
|
if $unblessed->{debug}; |
188
|
0
|
0
|
|
|
|
|
die "Cannot write to bio!" |
189
|
|
|
|
|
|
|
if (($sent) != length($data)); |
190
|
0
|
|
|
|
|
|
return $bio; |
191
|
|
|
|
|
|
|
} |
192
|
|
|
|
|
|
|
|
193
|
|
|
|
|
|
|
sub new { |
194
|
0
|
|
|
0
|
1
|
|
my $type = shift; |
195
|
|
|
|
|
|
|
|
196
|
0
|
|
|
|
|
|
my $params = {@_}; |
197
|
0
|
|
|
|
|
|
my $self = bless({}, $type); |
198
|
|
|
|
|
|
|
|
199
|
0
|
|
|
|
|
|
$self->{unblessed} = {}; |
200
|
0
|
|
|
|
|
|
$self->{buffer} = ''; |
201
|
0
|
|
0
|
|
|
|
$self->{unblessed}->{debug} = $params->{debug} || 0; |
202
|
|
|
|
|
|
|
$self->{cacrl} = $params->{cacrl} |
203
|
0
|
0
|
|
|
|
|
if $self->{cacrl}; |
204
|
0
|
|
0
|
|
|
|
$self->{client} = $params->{client} || 0; |
205
|
0
|
|
|
|
|
|
$self->{errorhandler} = $params->{errorhandler}; |
206
|
0
|
|
|
|
|
|
$self->{params} = $params; |
207
|
|
|
|
|
|
|
|
208
|
|
|
|
|
|
|
$self->{context} = |
209
|
|
|
|
|
|
|
($params->{tls} || $params->{tls1_2}) ? |
210
|
|
|
|
|
|
|
($params->{tls1_2} ? |
211
|
0
|
0
|
0
|
|
|
|
Net::SSLeay::CTX_tlsv1_2_new() : |
|
|
0
|
|
|
|
|
|
212
|
|
|
|
|
|
|
Net::SSLeay::CTX_tlsv1_new()) : |
213
|
|
|
|
|
|
|
Net::SSLeay::CTX_new(); |
214
|
|
|
|
|
|
|
|
215
|
|
|
|
|
|
|
Net::SSLeay::CTX_set_options($self->{context}, 0x00400000) # SSL_OP_CIPHER_SERVER_PREFERENCE # Beim Apache: SSLHonorCipherOrder |
216
|
0
|
0
|
0
|
|
|
|
if ((!$self->{client}) && (!$params->{"nohonor"})); |
217
|
|
|
|
|
|
|
|
218
|
0
|
|
|
|
|
|
my $err = undef; |
219
|
0
|
0
|
|
|
|
|
if ($params->{chain}) { |
220
|
0
|
|
|
|
|
|
$err = Net::SSLeay::CTX_use_certificate_chain_file($self->{context}, $params->{chain}); |
221
|
0
|
0
|
0
|
|
|
|
die "Error using chain: ".Net::SSLeay::ERR_error_string(Net::SSLeay::ERR_get_error()) |
222
|
|
|
|
|
|
|
if ($err && ($err != 1)); |
223
|
|
|
|
|
|
|
} |
224
|
0
|
0
|
0
|
|
|
|
if ($params->{keymem} || $params->{key}) { |
225
|
0
|
0
|
|
|
|
|
if ($params->{keymem}) { |
226
|
0
|
|
|
|
|
|
$err = Net::SSLeay::CTX_use_PrivateKey($self->{context}, PEMdataToEVP_PKEY($self->{unblessed}, $params->{keymem})); |
227
|
|
|
|
|
|
|
print "Loaded keymem(".length($params->{keymem})." Bytes) with result ".$err."\n" |
228
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
229
|
|
|
|
|
|
|
} else { |
230
|
0
|
|
|
|
|
|
$err = Net::SSLeay::CTX_use_PrivateKey_file($self->{context}, $params->{key}, &Net::SSLeay::FILETYPE_PEM); |
231
|
|
|
|
|
|
|
print "Loaded key from file ".$params->{key}." with result ".$err."\n" |
232
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
233
|
|
|
|
|
|
|
} |
234
|
0
|
0
|
0
|
|
|
|
die "Error using keymem: ".Net::SSLeay::ERR_error_string(Net::SSLeay::ERR_get_error()) |
235
|
|
|
|
|
|
|
if ($err && ($err != 1)); |
236
|
|
|
|
|
|
|
} |
237
|
0
|
0
|
0
|
|
|
|
if ($params->{crtmem} || $params->{crt}) { |
238
|
0
|
0
|
|
|
|
|
if ($params->{crtmem}) { |
239
|
0
|
|
|
|
|
|
my $crt = PEMdataToX509($self->{unblessed}, $params->{crtmem}); |
240
|
0
|
|
|
|
|
|
$err = Net::SSLeay::CTX_use_certificate($self->{context}, $crt); |
241
|
|
|
|
|
|
|
print "Loaded crtmem(".length($params->{crtmem})." Bytes/".$crt.") with result ".$err."\n" |
242
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
243
|
|
|
|
|
|
|
} else { |
244
|
|
|
|
|
|
|
# TODO:XXX:FIXME: Errorchecking! |
245
|
0
|
|
|
|
|
|
$err = Net::SSLeay::CTX_use_certificate_file($self->{context}, $params->{crt}, &Net::SSLeay::FILETYPE_PEM); |
246
|
|
|
|
|
|
|
print "Loaded crt from file ".$params->{crt}." with result ".$err."\n" |
247
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
248
|
|
|
|
|
|
|
} |
249
|
0
|
0
|
0
|
|
|
|
die "Error using crtmem: ".Net::SSLeay::ERR_error_string(Net::SSLeay::ERR_get_error()) |
250
|
|
|
|
|
|
|
if ($err && ($err != 1)); |
251
|
|
|
|
|
|
|
} |
252
|
|
|
|
|
|
|
|
253
|
0
|
|
|
|
|
|
$err = undef; |
254
|
0
|
0
|
0
|
|
|
|
if ($params->{cacrt}|| |
255
|
|
|
|
|
|
|
$params->{cacrtmem}) { |
256
|
0
|
0
|
|
|
|
|
if ($params->{cacrtmem}) { |
257
|
0
|
0
|
|
|
|
|
if (ref($params->{cacrtmem}) eq "ARRAY") { |
258
|
0
|
|
|
|
|
|
foreach my $curcert (@{$params->{cacrtmem}}) { |
|
0
|
|
|
|
|
|
|
259
|
0
|
|
|
|
|
|
$err = CTX_add_client_CA($self->{unblessed}, $self->{context}, $curcert); |
260
|
|
|
|
|
|
|
last |
261
|
0
|
0
|
|
|
|
|
unless $err; |
262
|
|
|
|
|
|
|
} |
263
|
|
|
|
|
|
|
} else { |
264
|
0
|
|
|
|
|
|
$err = CTX_add_client_CA($self->{unblessed}, $self->{context}, $params->{cacrtmem}); |
265
|
|
|
|
|
|
|
print "Loaded cacrtmem(".length($params->{cacrtmem})." Bytes) with result ".$err."\n" |
266
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
267
|
|
|
|
|
|
|
} |
268
|
|
|
|
|
|
|
} else { |
269
|
0
|
|
|
|
|
|
$err = Net::SSLeay::CTX_load_verify_locations($self->{context}, $params->{cacrt}, ''); |
270
|
|
|
|
|
|
|
print "Loaded cacrt from file ".$params->{cacrt}." with result ".$err."\n" |
271
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
272
|
0
|
0
|
0
|
|
|
|
$err = Net::SSLeay::CTX_set_client_CA_list($self->{context}, Net::SSLeay::load_client_CA_file($params->{cacrt})) |
273
|
|
|
|
|
|
|
unless ($err && ($err == 1)); |
274
|
|
|
|
|
|
|
print "Set client cacrt from file ".$params->{cacrt}." with result ".$err."\n" |
275
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
276
|
|
|
|
|
|
|
} |
277
|
0
|
0
|
0
|
|
|
|
$err = Net::SSLeay::CTX_set_verify_depth($self->{context}, $params->{caverifydepth} || 5) |
|
|
|
0
|
|
|
|
|
278
|
|
|
|
|
|
|
unless ($err && ($err == 1)); |
279
|
|
|
|
|
|
|
} |
280
|
0
|
0
|
0
|
|
|
|
die "Error using cacrt: ".Net::SSLeay::ERR_error_string(Net::SSLeay::ERR_get_error()) |
281
|
|
|
|
|
|
|
if ($err && ($err != 1)); |
282
|
|
|
|
|
|
|
|
283
|
0
|
|
|
|
|
|
$err = undef; |
284
|
|
|
|
|
|
|
$err = Net::SSLeay::CTX_set_cipher_list($self->{context}, $params->{cipher}) |
285
|
0
|
0
|
|
|
|
|
if ($params->{cipher}); |
286
|
0
|
0
|
0
|
|
|
|
die "Error setting cipher: ".Net::SSLeay::ERR_error_string(ERR_get_error()) |
287
|
|
|
|
|
|
|
if ($err && ($err != 1)); |
288
|
|
|
|
|
|
|
|
289
|
0
|
|
|
|
|
|
$err = undef; |
290
|
0
|
0
|
|
|
|
|
$self->{rbio} = Net::SSLeay::BIO_new(Net::SSLeay::BIO_s_mem()) |
291
|
|
|
|
|
|
|
or die("Error creating r BIO: ".Net::SSLeay::ERR_error_string(Net::SSLeay::ERR_get_error())); |
292
|
0
|
0
|
|
|
|
|
$self->{wbio} = Net::SSLeay::BIO_new(Net::SSLeay::BIO_s_mem()) |
293
|
|
|
|
|
|
|
or die("Error creating w BIO: ".Net::SSLeay::ERR_error_string(Net::SSLeay::ERR_get_error())); |
294
|
0
|
|
|
|
|
|
$self->{ssl} = Net::SSLeay::new($self->{context}); |
295
|
0
|
|
|
|
|
|
$globalinfos->{int($self->{ssl})} = $self->{unblessed}; |
296
|
0
|
|
|
|
|
|
$err = Net::SSLeay::set_bio($self->{ssl}, $self->{rbio}, $self->{wbio}); |
297
|
0
|
0
|
0
|
|
|
|
die "Error setting r/w BIOs: ".Net::SSLeay::ERR_error_string(Net::SSLeay::ERR_get_error()) |
298
|
|
|
|
|
|
|
if ($err && ($err != 1)); |
299
|
|
|
|
|
|
|
|
300
|
0
|
0
|
0
|
|
|
|
if ($params->{dhcert} || |
301
|
|
|
|
|
|
|
$params->{dhcertmem}) { |
302
|
0
|
|
|
|
|
|
my $dhbio = undef; |
303
|
0
|
0
|
|
|
|
|
if ($params->{dhcertmem}) { |
304
|
0
|
|
|
|
|
|
$dhbio = dataToBio($self->{unblessed}, $params->{dhcertmem}); |
305
|
|
|
|
|
|
|
} else { |
306
|
|
|
|
|
|
|
die "Cannot open dhcert file!" |
307
|
0
|
0
|
0
|
|
|
|
unless ((-s $params->{dhcert}) && ($dhbio = Net::SSLeay::BIO_new_file($params->{dhcert}, "r"))); |
308
|
|
|
|
|
|
|
} |
309
|
|
|
|
|
|
|
# TODO:XXX:FIXME: Errorchecking! |
310
|
0
|
|
|
|
|
|
my $dhret = Net::SSLeay::PEM_read_bio_DHparams($dhbio); |
311
|
|
|
|
|
|
|
print "Loaded dhcert with result ".$err."\n" |
312
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
313
|
0
|
|
|
|
|
|
Net::SSLeay::BIO_free($dhbio); |
314
|
|
|
|
|
|
|
die "Couldn't set DH parameters!" |
315
|
0
|
0
|
|
|
|
|
if (POE_FILTER_SSL_set_tmp_dh($self->{ssl}, $dhret) < 0); |
316
|
|
|
|
|
|
|
print "Set dhcert params with result ".$err."\n" |
317
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
318
|
|
|
|
|
|
|
#die "Couldn't set CTX DH parameters!" |
319
|
|
|
|
|
|
|
# if (POE_FILTER_SSL_CTX_set_tmp_dh($self->{context}, $dhret) < 0); |
320
|
|
|
|
|
|
|
# TODO:XXX:FIXME: Errorchecking! |
321
|
0
|
|
|
|
|
|
my $rsa = Net::SSLeay::RSA_generate_key(2048, 73); |
322
|
|
|
|
|
|
|
#die "Couldn't set RSA key!" |
323
|
|
|
|
|
|
|
# if (!Net::SSLeay::set_tmp_rsa($self->{ssl}, $rsa)); |
324
|
|
|
|
|
|
|
die "Couldn't set RSA key!" |
325
|
0
|
0
|
|
|
|
|
if (!POE_FILTER_SSL_CTX_set_tmp_rsa($self->{context}, $rsa)); |
326
|
|
|
|
|
|
|
print "Set dhrsa with result ".$err."\n" |
327
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
328
|
0
|
|
|
|
|
|
Net::SSLeay::RSA_free($rsa); |
329
|
|
|
|
|
|
|
} |
330
|
0
|
|
|
|
|
|
my $orfilter = 0; |
331
|
|
|
|
|
|
|
$orfilter |= &Net::SSLeay::VERIFY_PEER | |
332
|
|
|
|
|
|
|
&Net::SSLeay::VERIFY_CLIENT_ONCE |
333
|
0
|
0
|
|
|
|
|
if $params->{clientcert}; |
334
|
|
|
|
|
|
|
$orfilter |= &Net::SSLeay::VERIFY_FAIL_IF_NO_PEER_CERT |
335
|
|
|
|
|
|
|
if $params->{clientcert} && |
336
|
0
|
0
|
0
|
|
|
|
$params->{blockbadclientcert}; |
337
|
|
|
|
|
|
|
# TODO:XXX:FIXME: Errorchecking! |
338
|
|
|
|
|
|
|
#Net::SSLeay::CTX_set_verify($self->{context}, $orfilter, \&VERIFY); |
339
|
0
|
|
|
|
|
|
Net::SSLeay::set_verify($self->{ssl}, $orfilter, \&VERIFY); |
340
|
|
|
|
|
|
|
print "Set verify ".($params->{blockbadclientcert} ? "FORCE" : "")." ".$orfilter."\n" |
341
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
|
|
0
|
|
|
|
|
|
342
|
0
|
0
|
|
|
|
|
if ($params->{sni}) { |
343
|
0
|
|
|
|
|
|
my $err = Net::SSLeay::set_tlsext_host_name($self->{ssl}, $params->{sni}); |
344
|
|
|
|
|
|
|
print "Set sni with result ".$err."\n" |
345
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
346
|
0
|
0
|
0
|
|
|
|
die "Error setting sni:".Net::SSLeay::ERR_error_string(Net::SSLeay::ERR_get_error()) |
347
|
|
|
|
|
|
|
if ($err && ($err != 1)); |
348
|
|
|
|
|
|
|
} |
349
|
|
|
|
|
|
|
$self->{unblessed}->{ignoreVerifyErrors} = $params->{ignoreVerifyErrors} |
350
|
|
|
|
|
|
|
if ($params->{ignoreVerifyErrors} && |
351
|
0
|
0
|
0
|
|
|
|
(ref($params->{ignoreVerifyErrors}) eq "ARRAY")); |
352
|
|
|
|
|
|
|
|
353
|
0
|
|
|
|
|
|
$self |
354
|
|
|
|
|
|
|
} |
355
|
|
|
|
|
|
|
|
356
|
|
|
|
|
|
|
sub VERIFY { |
357
|
0
|
|
|
0
|
1
|
|
my ($ok, $x509_store_ctx) = @_; |
358
|
0
|
|
|
|
|
|
my $ssl = Net::SSLeay::X509_STORE_CTX_get_ex_data($x509_store_ctx, POE_FILTER_SSL_get_ex_data_X509_STORE_CTX_idx()); |
359
|
0
|
|
0
|
|
|
|
my $unblessed = $globalinfos->{int($ssl)} || die; |
360
|
|
|
|
|
|
|
print "VERIFY ".$ok |
361
|
0
|
0
|
|
|
|
|
if $unblessed->{debug}; |
362
|
0
|
|
|
|
|
|
my $errcode = Net::SSLeay::X509_STORE_CTX_get_error($x509_store_ctx); |
363
|
0
|
0
|
0
|
|
|
|
if ($unblessed->{ignoreVerifyErrors} && |
|
|
|
0
|
|
|
|
|
364
|
0
|
|
|
|
|
|
(ref($unblessed->{ignoreVerifyErrors}) eq "ARRAY") && (scalar(grep { $errcode == $_ } |
365
|
0
|
|
|
|
|
|
@{$unblessed->{ignoreVerifyErrors}}))) { |
366
|
0
|
|
|
|
|
|
$ok = 1; |
367
|
|
|
|
|
|
|
print " -> ".$ok." (Ignoring error ".$errcode.")" |
368
|
0
|
0
|
|
|
|
|
if $unblessed->{debug}; |
369
|
|
|
|
|
|
|
} |
370
|
|
|
|
|
|
|
print "\n" |
371
|
0
|
0
|
|
|
|
|
if $unblessed->{debug}; |
372
|
|
|
|
|
|
|
$unblessed->{ok} = $ok ? 1 : 2 |
373
|
|
|
|
|
|
|
if (!defined($unblessed->{ok}) || |
374
|
0
|
0
|
0
|
|
|
|
($unblessed->{ok} != 2)); |
|
|
0
|
|
|
|
|
|
375
|
0
|
|
|
|
|
|
$unblessed->{chaincount}++; |
376
|
|
|
|
|
|
|
# TODO:XXX:FIXME: Chainlength check |
377
|
|
|
|
|
|
|
#X509_STORE_CTX_set_error($x509_store_ctx, X509_V_ERR_CERT_CHAIN_TOO_LONG) |
378
|
|
|
|
|
|
|
# if (X509_STORE_CTX_get_error_depth(ctx) > uuu); |
379
|
|
|
|
|
|
|
# TODO:XXX:FIXME: No globalconfig |
380
|
|
|
|
|
|
|
# ssl = X509_STORE_CTX_get_ex_data(ctx, SSL_get_ex_data_X509_STORE_CTX_idx()); |
381
|
|
|
|
|
|
|
# mydata = SSL_get_ex_data(ssl, mydata_index); |
382
|
|
|
|
|
|
|
#push(@{$unblessed->{ssls}}, int($x509_store_ctx)); |
383
|
0
|
0
|
|
|
|
|
if (my $x = Net::SSLeay::X509_STORE_CTX_get_current_cert($x509_store_ctx)) { |
384
|
0
|
|
|
|
|
|
push(@{$unblessed->{chain}},[Net::SSLeay::X509_NAME_oneline(Net::SSLeay::X509_get_subject_name($x)), |
|
0
|
|
|
|
|
|
|
385
|
|
|
|
|
|
|
Net::SSLeay::X509_NAME_oneline(Net::SSLeay::X509_get_issuer_name($x)), |
386
|
|
|
|
|
|
|
POE_FILTER_X509_get_serialNumber($x), |
387
|
|
|
|
|
|
|
$errcode]); |
388
|
|
|
|
|
|
|
} |
389
|
0
|
|
|
|
|
|
Net::SSLeay::X509_STORE_CTX_set_error($x509_store_ctx, 0); |
390
|
0
|
|
|
|
|
|
return 1; # $ok; # 1=accept cert, 0=reject |
391
|
|
|
|
|
|
|
} |
392
|
|
|
|
|
|
|
|
393
|
|
|
|
|
|
|
sub clone { |
394
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
395
|
0
|
|
|
|
|
|
return POE::Filter::SSL->new(%{$self->{params}}); |
|
0
|
|
|
|
|
|
|
396
|
|
|
|
|
|
|
} |
397
|
|
|
|
|
|
|
|
398
|
|
|
|
|
|
|
sub get_one_start { |
399
|
0
|
|
|
0
|
1
|
|
my ($self, $data) = @_; |
400
|
|
|
|
|
|
|
print "GETONESTART: NETWORK -> SSL -> POE: ".$self->hexdump(join("", @$data))."\n" |
401
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
402
|
0
|
0
|
|
|
|
|
$self->writeToSSLBIO(join("", @$data), $self->{accepted} ? 0 : 1); |
403
|
0
|
|
|
|
|
|
[] |
404
|
|
|
|
|
|
|
} |
405
|
|
|
|
|
|
|
|
406
|
|
|
|
|
|
|
sub get_one { |
407
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
408
|
|
|
|
|
|
|
print "GETONE: BEGIN\n" |
409
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
410
|
0
|
|
|
|
|
|
my @return = (); |
411
|
0
|
0
|
0
|
|
|
|
push(@return, $self) if ($self->doSSL() || $self->{buffer}); |
412
|
0
|
|
|
|
|
|
my $data = Net::SSLeay::read($self->{ssl}); |
413
|
0
|
0
|
|
|
|
|
push(@return, $data) |
414
|
|
|
|
|
|
|
if $data; |
415
|
|
|
|
|
|
|
print "GETONE: END: ".scalar(@return)."\n" |
416
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
417
|
0
|
|
|
|
|
|
[@return] |
418
|
|
|
|
|
|
|
} |
419
|
|
|
|
|
|
|
|
420
|
|
|
|
|
|
|
sub get { |
421
|
0
|
|
|
0
|
1
|
|
my ($self, $chunks) = @_; |
422
|
|
|
|
|
|
|
print "GET: BEGIN\n" |
423
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
424
|
0
|
|
|
|
|
|
my @return = (); |
425
|
|
|
|
|
|
|
#print "GET:\n" |
426
|
|
|
|
|
|
|
# if $self->{unblessed}->{debug}; |
427
|
0
|
0
|
0
|
|
|
|
push(@return, $self) if ($self->doSSL() || $self->{buffer}); |
428
|
0
|
|
|
|
|
|
foreach my $data (@$chunks) { |
429
|
|
|
|
|
|
|
print "GET: NETWORK -> SSL -> POE: ".join("", @$data)."\n" |
430
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
431
|
0
|
|
|
|
|
|
$self->writeToSSLBIO(join("", @$data)); |
432
|
0
|
|
|
|
|
|
my $data = Net::SSLeay::read($self->{ssl}); |
433
|
|
|
|
|
|
|
print "GET: Read ".length($data)." bytes.\n" |
434
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
435
|
0
|
|
|
|
|
|
push(@return, $data); |
436
|
|
|
|
|
|
|
} |
437
|
0
|
|
|
|
|
|
[@return] |
438
|
|
|
|
|
|
|
} |
439
|
|
|
|
|
|
|
|
440
|
|
|
|
|
|
|
sub put { |
441
|
0
|
|
|
0
|
1
|
|
my ($self, $chunks) = @_; |
442
|
|
|
|
|
|
|
print "PUT: BEGIN\n" |
443
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
444
|
0
|
|
|
|
|
|
my @return = (); |
445
|
0
|
|
|
|
|
|
$self->doSSL(); |
446
|
0
|
0
|
|
|
|
|
if ($self->{accepted}) { |
447
|
0
|
0
|
|
|
|
|
if (defined($self->{sendbuf})) { |
448
|
0
|
|
|
|
|
|
foreach my $cdata (@{$self->{sendbuf}}) { |
|
0
|
|
|
|
|
|
|
449
|
0
|
|
|
|
|
|
$self->writeToSSL($cdata); |
450
|
|
|
|
|
|
|
} |
451
|
0
|
|
|
|
|
|
delete($self->{sendbuf}); |
452
|
|
|
|
|
|
|
} |
453
|
|
|
|
|
|
|
} |
454
|
0
|
|
|
|
|
|
foreach my $data (@$chunks) { |
455
|
0
|
0
|
|
|
|
|
next if (ref($data) eq "POE::Filter::SSL"); |
456
|
|
|
|
|
|
|
print "PUT: POE -> SSL -> NETWORK: ".$self->hexdump($data)."\r\n" |
457
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
458
|
0
|
0
|
|
|
|
|
if ($self->{accepted}) { |
459
|
0
|
|
|
|
|
|
$self->writeToSSL($data); |
460
|
|
|
|
|
|
|
} else { |
461
|
0
|
0
|
|
|
|
|
push(@{$self->{sendbuf}}, $data) |
|
0
|
|
|
|
|
|
|
462
|
|
|
|
|
|
|
if ($data); |
463
|
|
|
|
|
|
|
} |
464
|
|
|
|
|
|
|
} |
465
|
|
|
|
|
|
|
push(@return, $self->{buffer}) |
466
|
0
|
0
|
|
|
|
|
if $self->{buffer}; |
467
|
0
|
|
|
|
|
|
$self->{buffer} = ''; |
468
|
0
|
|
|
|
|
|
[@return] |
469
|
|
|
|
|
|
|
} |
470
|
|
|
|
|
|
|
|
471
|
|
|
|
|
|
|
sub writeToSSL { |
472
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
473
|
0
|
|
|
|
|
|
my $data = shift; |
474
|
0
|
0
|
|
|
|
|
if ((my $sent = Net::SSLeay::write($self->{ssl}, $data)) != length($data)) { |
475
|
0
|
|
|
|
|
|
my $err2 = Net::SSLeay::get_error($self->{ssl}, $sent); |
476
|
|
|
|
|
|
|
#die("PUT: Not all data given to SSL(".$err2."): ".$sent." != ".length($data)) if ($sent); |
477
|
|
|
|
|
|
|
} |
478
|
0
|
|
|
|
|
|
$self->doSSL(); |
479
|
|
|
|
|
|
|
} |
480
|
|
|
|
|
|
|
|
481
|
|
|
|
|
|
|
sub writeToSSLBIO { |
482
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
483
|
0
|
|
|
|
|
|
my $data = shift; |
484
|
0
|
|
|
|
|
|
my $nodoSSL = shift; |
485
|
0
|
0
|
|
|
|
|
if ((my $sent = Net::SSLeay::BIO_write($self->{rbio}, $data)) != length($data)) { |
486
|
0
|
|
|
|
|
|
my $err2 = Net::SSLeay::get_error($self->{ssl}, $sent); |
487
|
|
|
|
|
|
|
#die("GET: Not all data given to BIO SSL(".$err2."): ".$sent." != ".length($data)) if ($sent); |
488
|
|
|
|
|
|
|
} |
489
|
0
|
0
|
|
|
|
|
$self->doSSL() unless $nodoSSL; |
490
|
|
|
|
|
|
|
} |
491
|
|
|
|
|
|
|
|
492
|
|
|
|
|
|
|
sub get_pending { |
493
|
0
|
|
|
0
|
1
|
|
return undef; |
494
|
|
|
|
|
|
|
} |
495
|
|
|
|
|
|
|
|
496
|
|
|
|
|
|
|
sub doSSL { |
497
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
498
|
0
|
|
|
|
|
|
my $ret = 0; |
499
|
|
|
|
|
|
|
print "SSLing..." |
500
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
501
|
0
|
0
|
|
|
|
|
unless ($self->{accepted}) { |
502
|
|
|
|
|
|
|
my $err = $self->{client} ? |
503
|
|
|
|
|
|
|
Net::SSLeay::connect($self->{ssl}) : |
504
|
0
|
0
|
|
|
|
|
Net::SSLeay::accept($self->{ssl}); |
505
|
0
|
0
|
|
|
|
|
if ($err == 1) { |
506
|
0
|
|
|
|
|
|
$self->{accepted}++; |
507
|
0
|
|
|
|
|
|
$ret++; |
508
|
|
|
|
|
|
|
} else { |
509
|
0
|
|
|
|
|
|
my $errtext = $!; |
510
|
0
|
|
|
|
|
|
my $err2 = Net::SSLeay::get_error($self->{ssl}, $err); |
511
|
0
|
0
|
|
|
|
|
unless ($err2 == Net::SSLeay::ERROR_WANT_READ()) { |
512
|
0
|
0
|
|
|
|
|
my $tmp = "POE::Filter::SSL: ".($self->{client} ? "connect" : "accept").": "; |
513
|
0
|
|
|
|
|
|
my $err3 = undef; |
514
|
0
|
0
|
|
|
|
|
if ($err3 = Net::SSLeay::ERR_get_error()) { |
515
|
0
|
|
|
|
|
|
$tmp .= Net::SSLeay::ERR_error_string($err3)."(".$err3.", ".$err2.")"; |
516
|
|
|
|
|
|
|
} else { |
517
|
0
|
|
|
|
|
|
$tmp .= "No error (return=".$err2.")"; |
518
|
|
|
|
|
|
|
} |
519
|
0
|
0
|
|
|
|
|
if (defined($self->{errorhandler})) { |
520
|
0
|
0
|
|
|
|
|
if (ref($self->{errorhandler}) eq "CODE") { |
|
|
0
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
521
|
|
|
|
|
|
|
$self->{errorhandler}($self, { |
522
|
|
|
|
|
|
|
ssl => $self->{ssl}, |
523
|
0
|
|
|
|
|
|
msg => $tmp, |
524
|
|
|
|
|
|
|
ret => $err, |
525
|
|
|
|
|
|
|
get_error => $err2, |
526
|
|
|
|
|
|
|
error => $err3, |
527
|
|
|
|
|
|
|
}); |
528
|
|
|
|
|
|
|
} elsif(lc($self->{errorhandler}) eq "ignore") { |
529
|
|
|
|
|
|
|
} elsif(lc($self->{errorhandler}) eq "carp") { |
530
|
0
|
|
|
|
|
|
carp($tmp); |
531
|
|
|
|
|
|
|
} elsif(lc($self->{errorhandler}) eq "confess") { |
532
|
0
|
|
|
|
|
|
confess($tmp); |
533
|
|
|
|
|
|
|
} elsif(lc($self->{errorhandler}) eq "carponetime") { |
534
|
|
|
|
|
|
|
carp($tmp) |
535
|
0
|
0
|
0
|
|
|
|
unless $self->{errorstat}->{$err||"-"}->{$err2||"-"}->{$err3||"-"}++; |
|
|
|
0
|
|
|
|
|
|
|
|
0
|
|
|
|
|
536
|
|
|
|
|
|
|
} |
537
|
|
|
|
|
|
|
} else { |
538
|
0
|
|
|
|
|
|
carp($tmp); |
539
|
|
|
|
|
|
|
} |
540
|
|
|
|
|
|
|
$ret++ |
541
|
0
|
0
|
|
|
|
|
unless $self->{accepted}++; |
542
|
|
|
|
|
|
|
} |
543
|
|
|
|
|
|
|
} |
544
|
|
|
|
|
|
|
} |
545
|
0
|
|
|
|
|
|
while (my $data = Net::SSLeay::BIO_read($self->{wbio})) { |
546
|
0
|
|
|
|
|
|
$self->{buffer} .= $data; |
547
|
|
|
|
|
|
|
} |
548
|
|
|
|
|
|
|
print $ret."\n" |
549
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
550
|
0
|
|
|
|
|
|
return $ret; |
551
|
|
|
|
|
|
|
} |
552
|
|
|
|
|
|
|
|
553
|
|
|
|
|
|
|
sub getCipher { |
554
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
555
|
0
|
|
|
|
|
|
return Net::SSLeay::get_cipher($self->{ssl}); |
556
|
|
|
|
|
|
|
} |
557
|
|
|
|
|
|
|
|
558
|
|
|
|
|
|
|
sub clientCertExists { |
559
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
560
|
0
|
|
0
|
|
|
|
return ((ref($self->{unblessed}->{chain}) eq "ARRAY") && ($self->{unblessed}->{chaincount})); |
561
|
|
|
|
|
|
|
} |
562
|
|
|
|
|
|
|
|
563
|
|
|
|
|
|
|
sub clientCertValid { |
564
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
565
|
0
|
|
|
|
|
|
my $valid = 1; |
566
|
0
|
0
|
|
|
|
|
if (defined($self->{cacrl})) { |
567
|
0
|
0
|
|
|
|
|
$valid = $self->clientCertNotOnCRL($self->{cacrl}) ? 1 : 0; |
568
|
|
|
|
|
|
|
} |
569
|
0
|
0
|
0
|
|
|
|
return $self->clientCertExists() ? (($self->{unblessed}->{ok} ne "2") && scalar(@{$self->{unblessed}->{chain}}) && $valid) : undef; |
570
|
|
|
|
|
|
|
} |
571
|
|
|
|
|
|
|
|
572
|
|
|
|
|
|
|
sub clientCertIds { |
573
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
574
|
0
|
0
|
|
|
|
|
return $self->clientCertExists ? @{$self->{unblessed}->{chain}} : undef; |
|
0
|
|
|
|
|
|
|
575
|
|
|
|
|
|
|
} |
576
|
|
|
|
|
|
|
|
577
|
|
|
|
|
|
|
sub clientCertNotOnCRL { |
578
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
579
|
0
|
|
|
|
|
|
my $crlfilename = shift; |
580
|
0
|
|
|
|
|
|
my @certids = $self->clientCertIds(); |
581
|
0
|
0
|
|
|
|
|
if (scalar(@certids)) { |
582
|
0
|
|
|
|
|
|
my $found = 0; |
583
|
0
|
|
|
|
|
|
my $badcrls = 0; |
584
|
0
|
|
|
|
|
|
my $jump = 0; |
585
|
|
|
|
|
|
|
print("----- SSL Infos BEGIN ---------------"."\n") |
586
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
587
|
0
|
|
|
|
|
|
foreach (@{$self->{unblessed}->{chain}}) { |
|
0
|
|
|
|
|
|
|
588
|
0
|
|
|
|
|
|
my $crlstatus = POE_FILTER_verify_serial_against_crl_file($crlfilename, $_->[2]); |
589
|
0
|
0
|
|
|
|
|
$badcrls++ if $crlstatus; |
590
|
0
|
0
|
|
|
|
|
$crlstatus = $crlstatus ? "INVALID (".($crlstatus !~ m,^CRL:, ? $self->hexdump($crlstatus) : $crlstatus).")" : "VALID"; |
|
|
0
|
|
|
|
|
|
591
|
0
|
|
|
|
|
|
my $t = (" " x $jump++); |
592
|
0
|
0
|
|
|
|
|
if (ref($_) eq "ARRAY") { |
593
|
0
|
0
|
|
|
|
|
if ($self->{unblessed}->{debug}){ |
594
|
0
|
0
|
|
|
|
|
print(" ".$t." |---[ Subcertificate ]---\n") if $t; |
595
|
0
|
|
|
|
|
|
print(" ".$t." | Subject Name: ".$_->[0]."\n"); |
596
|
0
|
|
|
|
|
|
print(" ".$t." | Issuer Name : ".$_->[1]."\n"); |
597
|
0
|
|
|
|
|
|
print(" ".$t." | Serial : ".$self->hexdump($_->[2])."\n"); |
598
|
0
|
|
|
|
|
|
print(" ".$t." | CRL Status : ".$crlstatus."\n"); |
599
|
|
|
|
|
|
|
} |
600
|
|
|
|
|
|
|
} else { |
601
|
|
|
|
|
|
|
print(" NOCERTINFOS!"."\n") |
602
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
603
|
0
|
|
|
|
|
|
return 0; |
604
|
|
|
|
|
|
|
} |
605
|
|
|
|
|
|
|
} |
606
|
|
|
|
|
|
|
print("----- SSL Infos END -----------------"."\n") |
607
|
0
|
0
|
|
|
|
|
if $self->{unblessed}->{debug}; |
608
|
0
|
0
|
|
|
|
|
return 1 unless $badcrls; |
609
|
|
|
|
|
|
|
} |
610
|
0
|
|
|
|
|
|
return 0; |
611
|
|
|
|
|
|
|
} |
612
|
|
|
|
|
|
|
|
613
|
|
|
|
|
|
|
sub handshakeDone { |
614
|
0
|
|
|
0
|
1
|
|
my $self = shift; |
615
|
0
|
|
|
|
|
|
my $params = {@_}; |
616
|
0
|
|
0
|
|
|
|
return ($self->{accepted} && (($params->{ignorebuf}) || ((!$self->{sendbuf}) && (!$self->{buffer})))) || 0; |
617
|
|
|
|
|
|
|
} |
618
|
|
|
|
|
|
|
|
619
|
|
|
|
|
|
|
sub DESTROY { |
620
|
0
|
|
|
0
|
|
|
my $self = shift; |
621
|
|
|
|
|
|
|
#print "DESTROY: ".int($self->{ssl})."\n"; |
622
|
0
|
|
|
|
|
|
delete $globalinfos->{int($self->{ssl})}; |
623
|
|
|
|
|
|
|
Net::SSLeay::free($self->{ssl}) |
624
|
0
|
0
|
|
|
|
|
if $self->{ssl}; |
625
|
|
|
|
|
|
|
Net::SSLeay::CTX_free($self->{context}) |
626
|
0
|
0
|
|
|
|
|
if $self->{context}; |
627
|
|
|
|
|
|
|
#Net::SSLeay::BIO_free($self->{bio}) # CTX_free automatically frees BIO!!! |
628
|
|
|
|
|
|
|
# if $self->{bio}; |
629
|
|
|
|
|
|
|
} |
630
|
|
|
|
|
|
|
|
631
|
0
|
|
|
0
|
1
|
|
sub hexdump { my $self = shift; join ':', map { sprintf "%02X", $_ } unpack "C*", $_[0]; } |
|
0
|
|
|
|
|
|
|
|
0
|
|
|
|
|
|
|
632
|
|
|
|
|
|
|
|
633
|
|
|
|
|
|
|
1; |
634
|
|
|
|
|
|
|
|
635
|
|
|
|
|
|
|
__END__ |