summaryrefslogtreecommitdiffhomepage
path: root/libs/lucid
diff options
context:
space:
mode:
authorSteven Barth <steven@midlink.org>2009-06-07 11:38:23 +0000
committerSteven Barth <steven@midlink.org>2009-06-07 11:38:23 +0000
commita261caf40b85450df34635cdbd2216e168f81014 (patch)
tree6817631632b152206cafba8dbed764d3e5352a18 /libs/lucid
parentc766f9750f8d0ff1aa6e40da4df3f3e4faba8eb5 (diff)
LuCId: PX5G integration
Diffstat (limited to 'libs/lucid')
-rw-r--r--libs/lucid/luasrc/lucid/tcpserver.lua45
1 files changed, 41 insertions, 4 deletions
diff --git a/libs/lucid/luasrc/lucid/tcpserver.lua b/libs/lucid/luasrc/lucid/tcpserver.lua
index 60fad8b2f..584da2298 100644
--- a/libs/lucid/luasrc/lucid/tcpserver.lua
+++ b/libs/lucid/luasrc/lucid/tcpserver.lua
@@ -13,11 +13,13 @@ $Id$
]]
local os = require "os"
+local fs = require "nixio.fs"
local nixio = require "nixio"
local lucid = require "luci.lucid"
local ipairs, type, require, setmetatable = ipairs, type, require, setmetatable
local pairs, print, tostring, unpack = pairs, print, tostring, unpack
+local pcall = pcall
module "luci.lucid.tcpserver"
@@ -170,22 +172,57 @@ function prepare_socket(family, host, port, opts, backlog)
end
function prepare_tls(tlskey)
- local tls = nixio.tls("server")
+ local tls
if tlskey and cursor:get(UCINAME, tlskey) then
- local xtype = cursor:get(UCINAME, tlskey, "type")
+ tls = nixio.tls("server")
+
+ local make = cursor:get(UCINAME, tlskey, "generate") == "1"
+ local key = cursor:get(UCINAME, tlskey, "key")
+ local xtype = make and "asn1" or cursor:get(UCINAME, tlskey, "type")
local cert = cursor:get(UCINAME, tlskey, "cert")
+ local ciphers = cursor:get(UCINAME, tlskey, "ciphers")
+
+ if make and (not fs.access(key) or not fs.access(cert)) then
+ local CN = cursor:get(UCINAME, tlskey, "CN")
+ local O = cursor:get(UCINAME, tlskey, "O")
+ local bits = 2048
+
+ local data = {
+ CN = CN or nixio.uname().nodename,
+ O = not O and "LuCId Keymaster" or #O > 0 and O
+ }
+
+ local stat, px5g = pcall(require, "px5g")
+ if not stat then
+ return nixio.syslog("err", "Unable to load PX5G Keymaster")
+ end
+
+ nixio.syslog("info", "PX5G: Generating " .. bits .. "b private key")
+ local rk = px5g.genkey(bits)
+ local keyfile = nixio.open(key, "w", 600)
+ if not rk or not keyfile or not keyfile:writeall(rk:asn1()) then
+ return nixio.syslog("err", "Unable to generate private key")
+ end
+ keyfile:close()
+
+ nixio.syslog("info", "PX5G: Generating self-signed certificate")
+ if not fs.writefile(cert, rk:create_selfsigned(data,
+ os.time(), os.time() + 3600 * 24 * 366 * 15)) then
+ return nixio.syslog("err", "Unable to generate certificate")
+ end
+ end
+
if cert then
if not tls:set_cert(cert, xtype) then
nixio.syslog("err", "Unable to load certificate: " .. cert)
end
end
- local key = cursor:get(UCINAME, tlskey, "key")
if key then
if not tls:set_key(key, xtype) then
nixio.syslog("err", "Unable to load private key: " .. key)
end
end
- local ciphers = cursor:get(UCINAME, tlskey, "ciphers")
+
if ciphers then
if type(ciphers) == "table" then
ciphers = table.concat(ciphers, ":")