|
6 | 6 | # |
7 | 7 | # SSL module with m2crypto backend for HSM support. |
8 | 8 |
|
9 | | -from M2Crypto import Engine, m2, SSL |
| 9 | +import sys |
| 10 | +import ssl |
10 | 11 |
|
11 | | -CERT_NONE = SSL.verify_none |
12 | | -CERT_REQUIRED = SSL.verify_peer |
13 | | - |
14 | | -_key = None |
15 | | -_cert = None |
| 12 | +pkcs11 = None |
16 | 13 |
|
17 | 14 | # Default engine and provider. |
18 | 15 | _ENGINE_PATH = "/usr/lib/engines-3/libpkcs11.so" |
19 | 16 | _MODULE_PATH = "/usr/lib/softhsm/libsofthsm2.so" |
20 | 17 |
|
21 | 18 |
|
22 | | -def init(pin, certfile, keyfile, engine_path, module_path): |
23 | | - global _key, _cert |
24 | | - Engine.load_dynamic_engine("pkcs11", engine_path) |
25 | | - pkcs11 = Engine.Engine("pkcs11") |
26 | | - pkcs11.ctrl_cmd_string("MODULE_PATH", module_path) |
27 | | - pkcs11.ctrl_cmd_string("PIN", pin) |
28 | | - pkcs11.init() |
29 | | - _key = pkcs11.load_private_key(keyfile) |
30 | | - _cert = pkcs11.load_certificate(certfile) |
31 | | - |
32 | | - |
33 | 19 | def wrap_socket( |
34 | | - sock_in, |
35 | | - pin=None, |
36 | | - certfile=None, |
37 | | - keyfile=None, |
38 | | - ca_certs=None, |
39 | | - cert_reqs=CERT_NONE, |
40 | | - ciphers=None, |
41 | | - engine_path=_ENGINE_PATH, |
42 | | - module_path=_MODULE_PATH, |
| 20 | + sock, |
| 21 | + ssl_params={}, |
43 | 22 | ): |
44 | | - if certfile is None or keyfile is None: |
45 | | - # Fallback to Python's SSL |
46 | | - import ssl |
47 | | - return ssl.wrap_socket(sock_in) |
| 23 | + if any(k not in ssl_params for k in ("keyfile", "certfile", "pin")): |
| 24 | + # Use Micro/CPython's SSL |
| 25 | + if sys.implementation.name == "micropython": |
| 26 | + # Load key, cert and CA from DER files, and pass them as binary blobs. |
| 27 | + mpargs = {"keyfile": "key", "certfile": "cert", "ca_certs": "cadata"} |
| 28 | + for k, v in mpargs.items(): |
| 29 | + if k in ssl_params and "der" in ssl_params[k]: |
| 30 | + with open(ssl_params.pop(k), "rb") as f: |
| 31 | + ssl_params[v] = f.read() |
| 32 | + return ssl.wrap_socket(sock, **ssl_params) |
| 33 | + |
| 34 | + # Use M2Crypto to load key and cert from HSM. |
| 35 | + from M2Crypto import m2, SSL, Engine |
48 | 36 |
|
49 | | - if _key is None or _cert is None: |
50 | | - init(pin, certfile, keyfile, engine_path, module_path) |
| 37 | + global pkcs11 |
| 38 | + if pkcs11 is None: |
| 39 | + pkcs11 = Engine.load_dynamic_engine( |
| 40 | + "pkcs11", ssl_params.get("engine_path", _ENGINE_PATH) |
| 41 | + ) |
| 42 | + pkcs11.ctrl_cmd_string( |
| 43 | + "MODULE_PATH", ssl_params.get("module_path", _MODULE_PATH) |
| 44 | + ) |
| 45 | + pkcs11.ctrl_cmd_string("PIN", ssl_params["pin"]) |
| 46 | + pkcs11.init() |
51 | 47 |
|
52 | | - # Create SSL context |
| 48 | + # Create and configure SSL context |
53 | 49 | ctx = SSL.Context("tls") |
54 | 50 | ctx.set_default_verify_paths() |
55 | 51 | ctx.set_allow_unknown_ca(False) |
56 | 52 |
|
| 53 | + ciphers = ssl_params.get("ciphers", None) |
57 | 54 | if ciphers is not None: |
58 | 55 | ctx.set_cipher_list(ciphers) |
59 | 56 |
|
60 | | - if ca_certs is not None and cert_reqs is not CERT_NONE: |
| 57 | + ca_certs = ssl_params.get("ca_certs", None) |
| 58 | + if ca_certs is not None: |
61 | 59 | if ctx.load_verify_locations(ca_certs) != 1: |
62 | 60 | raise Exception("Failed to load CA certs") |
63 | | - ctx.set_verify(SSL.verify_peer, depth=9) |
| 61 | + |
| 62 | + cert_reqs = ssl_params.get("cert_reqs", ssl.CERT_NONE) |
| 63 | + if cert_reqs == ssl.CERT_NONE: |
| 64 | + cert_reqs = SSL.verify_none |
| 65 | + else: |
| 66 | + cert_reqs = SSL.verify_peer |
| 67 | + ctx.set_verify(cert_reqs, depth=9) |
64 | 68 |
|
65 | 69 | # Set key/cert |
66 | | - m2.ssl_ctx_use_x509(ctx.ctx, _cert.x509) |
67 | | - m2.ssl_ctx_use_pkey_privkey(ctx.ctx, _key.pkey) |
| 70 | + key = pkcs11.load_private_key(ssl_params["keyfile"]) |
| 71 | + m2.ssl_ctx_use_pkey_privkey(ctx.ctx, key.pkey) |
| 72 | + |
| 73 | + cert = pkcs11.load_certificate(ssl_params["certfile"]) |
| 74 | + m2.ssl_ctx_use_x509(ctx.ctx, cert.x509) |
| 75 | + |
68 | 76 | SSL.Connection.postConnectionCheck = None |
69 | | - return SSL.Connection(ctx, sock=sock_in) |
| 77 | + return SSL.Connection(ctx, sock=sock) |
0 commit comments