Skip to content

Commit 83d8959

Browse files
authored
Merge pull request #1 from perl-net-saml2/openssl-updates
Updates for OpenSSL version differences and a few bug fixes
2 parents f4b7c6f + b34afb7 commit 83d8959

10 files changed

+370
-87
lines changed

Changes

+21
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,26 @@
11
Revision history for Perl extension Crypt::OpenSSL::PKCS10.
22

3+
0.21 Sun 06 Aug 11:04:29 AM ADT 2023
4+
5+
- First release with new maintainer TIMLEGGE
6+
- The following commits were added to 0.20 (27c5490 Initial commit)
7+
- 61f9315 Increment Version for upcoming release
8+
- 002eac3 Update repo in META files
9+
- fcd0063 Add cpanfile, better README.md and remove default XS module generated README
10+
- bc9707b Fixes #111030 - Memory leak in parse_name
11+
- fc7103f Support multiple openssl versions without deprecated warnings
12+
- 998ffa5 Fixes 120727 Error in synopsis
13+
- f4b7c6f Remove exec bit from files
14+
- 08276f2 Add some githoub actions to test builds
15+
- 27e4d6e Sample fixes for Makefile.PL for solaris
16+
- bf4c941 Another SvPV returns char * not unsigned char *
17+
- 01414b7 Update to a newer ppport.h
18+
- 1553f36 add_ext and add_ext_raw requires STACK_OF(X509_EXTENSION) not STACK_OF(X509_REQUEST)
19+
- 84bf9ab X509_NAME_add_entry_by_txt second parameter is const char
20+
- 35e1db5 Possible fix for solaris compiler token error
21+
- bf7cae7 SvPV returns char pointer not unsigned char pointer
22+
- 27c5490 Initial commit
23+
324
0.20 Mon Jul 17 12:26:03 PM PDT 2023
425
- Fix #148807 (thanks Michal Josef Špaček)
526

MANIFEST

+8-7
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,13 @@
11
Changes
2-
typemap
2+
cpanfile
33
Makefile.PL
4-
MANIFEST
4+
MANIFEST This list of files
5+
META.json
6+
META.yml
7+
PKCS10.pm
58
PKCS10.xs
69
ppport.h
7-
README
8-
t/Mytest.t
10+
README.md
911
t/CSR.csr
10-
PKCS10.pm
11-
META.yml Module meta-data (added by MakeMaker)
12-
META.json Module JSON meta-data (added by MakeMaker)
12+
t/Mytest.t
13+
typemap

META.json

+5
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,11 @@
4646
"bugtracker" : {
4747
"web" : "https://rt.cpan.org/Public/Dist/Display.html?Name=Crypt-OpenSSL-PKCS10"
4848
},
49+
"repository" : {
50+
"type" : "git",
51+
"url" : "[email protected]:perl-net-saml2/perl-Crypt-OpenSSL-PKCS10.git",
52+
"web" : "https://github.com/perl-net-saml2/perl-Crypt-OpenSSL-PKCS10"
53+
},
4954
"homepage" : "https://metacpan.org/pod/Crypt::OpenSSL::PKCS10",
5055
"license" : [
5156
"http://dev.perl.org/licenses/"

META.yml

+1
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,7 @@ requires:
2525
Crypt::OpenSSL::RSA: '0'
2626
resources:
2727
bugtracker: https://rt.cpan.org/Public/Dist/Display.html?Name=Crypt-OpenSSL-PKCS10
28+
repository: [email protected]:perl-net-saml2/perl-Crypt-OpenSSL-PKCS10.git
2829
homepage: https://metacpan.org/pod/Crypt::OpenSSL::PKCS10
2930
license: http://dev.perl.org/licenses/
3031
version: '0.20'

Makefile.PL

+3-1
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,9 @@ print "Installed OpenSSL: $major.$minor.$patch\n";
1313
$args{INC} = openssl_inc_paths();
1414
$args{LIBS} = [openssl_lib_paths() . ' -lssl -lcrypto'];
1515

16-
my $cc_option_flags = $major ge 3 ? ' -DOPENSSL_API_COMPAT=30000' : ' -DOPENSSL_API_COMPAT=10100';
16+
my $cc_option_flags;
17+
#my $cc_option_flags = $major ge 3 ? ' -DOPENSSL_API_COMPAT=30000' : ' -DOPENSSL_API_COMPAT=10100';
18+
#my $cc_option_flags = $major ge 3 ? ' -DOPENSSL_API_COMPAT=10100' : ' -DOPENSSL_API_COMPAT=10100';
1719

1820
if ($Config::Config{cc} =~ /gcc/i) {
1921
$cc_option_flags .= $ENV{AUTHOR_TESTING} ? ' -Wall -Werror' : ' -Wall';

PKCS10.pm

+13-2
Original file line numberDiff line numberDiff line change
@@ -30,13 +30,22 @@ our @EXPORT_OK = ( @{ $EXPORT_TAGS{'all'} } );
3030

3131
#);
3232

33-
our $VERSION = '0.20';
33+
our $VERSION = '0.21';
3434

3535
require XSLoader;
3636
XSLoader::load('Crypt::OpenSSL::PKCS10', $VERSION);
3737

3838
# Preloaded methods go here.
3939

40+
sub new_from_rsa {
41+
my $self = shift;
42+
my $rsa = shift;
43+
44+
my $priv = $rsa->get_private_key_string();
45+
$self->_new_from_rsa($rsa, $priv);
46+
47+
}
48+
4049
1;
4150
__END__
4251
@@ -46,7 +55,7 @@ Crypt::OpenSSL::PKCS10 - Perl extension to OpenSSL's PKCS10 API.
4655
4756
=head1 SYNOPSIS
4857
49-
use Crypt::OpenSSL::PKCS10::PKCS10 qw( :const );
58+
use Crypt::OpenSSL::PKCS10 qw( :const );
5059
5160
my $req = Crypt::OpenSSL::PKCS10->new;
5261
$req->set_subject("/C=RO/O=UTI/OU=ssi");
@@ -86,6 +95,8 @@ Create a new Crypt::OpenSSL::PKCS10 object by using key information from a Crypt
8695
my $rsa = Crypt::OpenSSL::RSA->generate_key(512);
8796
my $req = Crypt::OpenSSL::PKCS10->new_from_rsa($rsa);
8897
98+
OpenSSL 3.0 has deprecated the RSA object which Crypt::OpenSSL::RSA creates. new_from_rsa() is now a perl sub which obtains the private key as a string that is also passed to the _new_from_rsa() XS function.
99+
89100
=item new_from_file( $filename )
90101
91102
Create a new Crypt::OpenSSL::PKCS10 object by reading the request and key information from a PEM formatted file. Here is an example:

PKCS10.xs

+81-37
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
#include <openssl/pem.h>
1010
#include <openssl/x509v3.h>
1111
#include <openssl/err.h>
12+
#include <openssl/rand.h>
1213

1314
#include "ppport.h"
1415

@@ -36,7 +37,7 @@ typedef struct
3637
} Crypt__OpenSSL__RSA;
3738

3839
#define PACKAGE_NAME "Crypt::OpenSSL::PKCS10"
39-
#define PACKAGE_CROAK(p_message) croak("%s:%d: %s", (p_message))
40+
#define PACKAGE_CROAK(p_message) croak("%s", (p_message))
4041
#define CHECK_NEW(p_var, p_size, p_type) \
4142
if (New(0, p_var, p_size, p_type) == NULL) \
4243
{ PACKAGE_CROAK("unable to alloc buffer"); }
@@ -63,7 +64,7 @@ X509_NAME *parse_name(char *subject, long chtype, int multirdn)
6364

6465
X509_NAME *n = NULL;
6566

66-
if (!buf || !ne_types || !ne_values)
67+
if (!buf || !ne_types || !ne_values || !mval)
6768
{
6869
croak("malloc error\n");
6970
goto error;
@@ -172,6 +173,8 @@ X509_NAME *parse_name(char *subject, long chtype, int multirdn)
172173
OPENSSL_free(ne_types);
173174
if (buf)
174175
OPENSSL_free(buf);
176+
if (mval)
177+
OPENSSL_free(mval);
175178
return NULL;
176179
}
177180

@@ -227,20 +230,23 @@ SV* make_pkcs10_obj(SV* p_proto, X509_REQ* p_req, EVP_PKEY* p_pk, STACK_OF(X509_
227230
}
228231

229232
/* stolen from OpenSSL.xs */
230-
long bio_write_cb(struct bio_st *bm, int m, const char *ptr, int l, long x, long y) {
231-
233+
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
234+
long bio_write_cb(struct bio_st *bm, int m, const char *ptr, size_t len, int l, long x, int y, size_t *processed) {
235+
#else
236+
long bio_write_cb(struct bio_st *bm, int m, const char *ptr, int len, long x, long y) {
237+
#endif
232238
if (m == BIO_CB_WRITE) {
233239
SV *sv = (SV *) BIO_get_callback_arg(bm);
234-
sv_catpvn(sv, ptr, l);
240+
sv_catpvn(sv, ptr, len);
235241
}
236242

237243
if (m == BIO_CB_PUTS) {
238244
SV *sv = (SV *) BIO_get_callback_arg(bm);
239-
l = strlen(ptr);
240-
sv_catpvn(sv, ptr, l);
245+
len = strlen(ptr);
246+
sv_catpvn(sv, ptr, len);
241247
}
242248

243-
return l;
249+
return len;
244250
}
245251

246252
static BIO* sv_bio_create(void) {
@@ -250,7 +256,11 @@ static BIO* sv_bio_create(void) {
250256
/* create an in-memory BIO abstraction and callbacks */
251257
BIO *bio = BIO_new(BIO_s_mem());
252258

259+
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
260+
BIO_set_callback_ex(bio, bio_write_cb);
261+
#else
253262
BIO_set_callback(bio, bio_write_cb);
263+
#endif
254264
BIO_set_callback_arg(bio, (void *)sv);
255265

256266
return bio;
@@ -339,25 +349,48 @@ new(class, keylen = 1024)
339349
PREINIT:
340350
X509_REQ *x;
341351
EVP_PKEY *pk;
342-
RSA *rsa = NULL;
343-
352+
char *classname = SvPVutf8_nolen(class);
353+
344354
CODE:
345355
//CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
346-
347-
if ((pk=EVP_PKEY_new()) == NULL)
348-
croak ("%s - can't create PKEY", class);
356+
if (!RAND_status())
357+
printf("Warning: generating random key material may take a long time\n"
358+
"if the system has a poor entropy source\n");
349359

350360
if ((x=X509_REQ_new()) == NULL)
351-
croak ("%s - can't create req", class);
361+
croak ("%s - can't create req", classname);
362+
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
363+
pk = EVP_RSA_gen(keylen);
364+
#elif OPENSSL_VERSION_NUMBER <= 0x10000000L
365+
RSA *rsa;
366+
if ((pk=EVP_PKEY_new()) == NULL)
367+
croak ("%s - can't create PKEY", classname);
352368

353369
rsa=RSA_generate_key(keylen, RSA_F4, NULL, NULL);
354370
if (!EVP_PKEY_assign_RSA(pk,rsa))
355-
croak ("%s - EVP_PKEY_assign_RSA", class);
356-
371+
croak ("%s - EVP_PKEY_assign_RSA", classname);
372+
#else
373+
RSA *rsa = RSA_new();
374+
BIGNUM *bne = BN_new();
375+
if (bne == NULL)
376+
croak ("%s - BN_new failed", classname);
377+
378+
if (BN_set_word(bne, RSA_F4) != 1)
379+
croak ("%s - BN_set_word failed", classname);
380+
381+
if ((pk=EVP_PKEY_new()) == NULL)
382+
croak ("%s - can't create PKEY", classname);
383+
384+
if (!RSA_generate_key_ex(rsa, keylen, bne, NULL))
385+
croak ("%s - RSA_generate_key_ex failed", classname);
386+
387+
if (!EVP_PKEY_assign_RSA(pk,rsa))
388+
croak ("%s - EVP_PKEY_assign_RSA", classname);
389+
#endif
357390
X509_REQ_set_pubkey(x,pk);
358391
X509_REQ_set_version(x,0L);
359392
if (!X509_REQ_sign(x,pk,EVP_sha256()))
360-
croak ("%s - X509_REQ_sign", class);
393+
croak ("%s - X509_REQ_sign failed", classname);
361394

362395
RETVAL = make_pkcs10_obj(class, x, pk, NULL, NULL);
363396

@@ -382,32 +415,43 @@ DESTROY(pkcs10)
382415
BIO_free(bio_err);*/
383416

384417
SV*
385-
new_from_rsa(class, p_rsa)
418+
_new_from_rsa(class, p_rsa, priv)
386419
SV *class
387420
SV *p_rsa
421+
SV *priv
388422

389423
PREINIT:
390424
Crypt__OpenSSL__RSA *rsa;
425+
char *keyString;
426+
STRLEN keylen;
427+
BIO *bio;
391428
X509_REQ *x;
392429
EVP_PKEY *pk;
430+
char *classname = SvPVutf8_nolen(class);
393431

394432
CODE:
395-
//CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
396-
397-
if ((pk=EVP_PKEY_new()) == NULL)
398-
croak ("%s - can't create PKEY", class);
433+
434+
// Get the private key and save it in memory
435+
keyString = SvPV(priv, keylen);
436+
bio = BIO_new_mem_buf(keyString, keylen);
437+
if (bio == NULL) {
438+
croak ("Bio is null **** \n");
439+
}
440+
441+
// Create the PrivateKey as EVP_PKEY
442+
pk = PEM_read_bio_PrivateKey(bio, NULL, 0, NULL);
443+
if (pk == NULL) {
444+
croak("Failed operation error code %d\n", errno);
445+
}
399446

400447
if ((x=X509_REQ_new()) == NULL)
401-
croak ("%s - can't create req", class);
448+
croak ("%s - can't create req", classname);
402449

403450
rsa = (Crypt__OpenSSL__RSA *) SvIV(SvRV(p_rsa));
404-
if (!EVP_PKEY_assign_RSA(pk,rsa->rsa))
405-
croak ("%s - EVP_PKEY_assign_RSA", class);
406-
407451
X509_REQ_set_pubkey(x,pk);
408452
X509_REQ_set_version(x,0L);
409453
if (!X509_REQ_sign(x,pk,EVP_sha256()))
410-
croak ("%s - X509_REQ_sign", class);
454+
croak ("%s - X509_REQ_sign", classname);
411455

412456
RETVAL = make_pkcs10_obj(class, x, pk, NULL, &rsa->rsa);
413457

@@ -452,16 +496,12 @@ get_pem_pubkey(pkcs10)
452496

453497
type = EVP_PKEY_base_id(pkey);
454498
if (type == EVP_PKEY_RSA) {
455-
456-
# PEM_write_bio_RSAPublicKey(bio, EVP_PKEY_get0_RSA(pkey));
457-
PEM_write_bio_RSA_PUBKEY(bio, EVP_PKEY_get0_RSA(pkey));
458-
499+
PEM_write_bio_PUBKEY(bio, pkey);
459500
} else if (type == EVP_PKEY_DSA) {
460-
461-
PEM_write_bio_DSA_PUBKEY(bio, EVP_PKEY_get0_DSA(pkey));
501+
PEM_write_bio_PUBKEY(bio, pkey);
462502
#ifndef OPENSSL_NO_EC
463503
} else if ( type == EVP_PKEY_EC ) {
464-
PEM_write_bio_EC_PUBKEY(bio, EVP_PKEY_get0_EC_KEY(pkey));
504+
PEM_write_bio_PUBKEY(bio, pkey);
465505
#endif
466506
} else {
467507

@@ -562,7 +602,7 @@ get_pem_pk(pkcs10,...)
562602
/* get the certificate back out in a specified format. */
563603

564604
if(!PEM_write_bio_PrivateKey(bio,pkcs10->pk,NULL,NULL,0,NULL,NULL))
565-
croak ("%s - PEM_write_bio_PrivateKey", pkcs10->pk);
605+
croak ("%s - PEM_write_bio_PrivateKey", (char *) pkcs10->pk);
566606

567607
RETVAL = sv_bio_final(bio);
568608

@@ -686,7 +726,7 @@ add_ext_final(pkcs10)
686726
if(pkcs10->exts)
687727
sk_X509_EXTENSION_pop_free(pkcs10->exts, X509_EXTENSION_free);
688728
} else {
689-
RETVAL = NULL;
729+
RETVAL = 0;
690730
}
691731

692732
OUTPUT:
@@ -741,8 +781,12 @@ accessor(pkcs10)
741781
name = X509_REQ_get_subject_name(pkcs10->req);
742782
X509_NAME_print_ex(bio, name, 0, XN_FLAG_SEP_CPLUS_SPC);
743783
} else if (ix == 2 ) {
744-
key = X509_REQ_extract_key(pkcs10->req);
784+
key = X509_REQ_get_pubkey(pkcs10->req);
785+
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
786+
EVP_PKEY_print_public(bio, key, 0, NULL);
787+
#else
745788
RSA_print(bio, EVP_PKEY_get1_RSA(key), 0);
789+
#endif
746790
}
747791
}
748792

0 commit comments

Comments
 (0)