|
1 | 1 | local OPENSSL_30 = require("resty.openssl.version").OPENSSL_30
|
| 2 | +local err = require("resty.openssl.err") |
2 | 3 | local C = require("ffi").C
|
3 | 4 |
|
4 | 5 |
|
5 | 6 | local _M = {
|
6 | 7 | _VERSION = '0.6.11',
|
7 |
| - bn = require("resty.openssl.bn"), |
8 |
| - cipher = require("resty.openssl.cipher"), |
9 |
| - digest = require("resty.openssl.digest"), |
10 |
| - hmac = require("resty.openssl.hmac"), |
11 |
| - kdf = require("resty.openssl.kdf"), |
12 |
| - pkey = require("resty.openssl.pkey"), |
13 |
| - objects = require("resty.openssl.objects"), |
14 |
| - rand = require("resty.openssl.rand"), |
15 |
| - version = require("resty.openssl.version"), |
16 |
| - x509 = require("resty.openssl.x509"), |
17 |
| - altname = require("resty.openssl.x509.altname"), |
18 |
| - chain = require("resty.openssl.x509.chain"), |
19 |
| - csr = require("resty.openssl.x509.csr"), |
20 |
| - crl = require("resty.openssl.x509.crl"), |
21 |
| - extension = require("resty.openssl.x509.extension"), |
22 |
| - extensions = require("resty.openssl.x509.extensions"), |
23 |
| - name = require("resty.openssl.x509.name"), |
24 |
| - revoked = require("resty.openssl.x509.revoked"), |
25 |
| - store = require("resty.openssl.x509.store"), |
26 |
| - pkcs12 = require("resty.openssl.pkcs12"), |
27 | 8 | }
|
28 | 9 |
|
29 |
| -if OPENSSL_30 then |
30 |
| - _M.provider = require("resty.openssl.provider") |
31 |
| -end |
| 10 | +function _M.load_modules() |
| 11 | + _M.bn = require("resty.openssl.bn") |
| 12 | + _M.cipher = require("resty.openssl.cipher") |
| 13 | + _M.digest = require("resty.openssl.digest") |
| 14 | + _M.hmac = require("resty.openssl.hmac") |
| 15 | + _M.kdf = require("resty.openssl.kdf") |
| 16 | + _M.pkey = require("resty.openssl.pkey") |
| 17 | + _M.objects = require("resty.openssl.objects") |
| 18 | + _M.rand = require("resty.openssl.rand") |
| 19 | + _M.version = require("resty.openssl.version") |
| 20 | + _M.x509 = require("resty.openssl.x509") |
| 21 | + _M.altname = require("resty.openssl.x509.altname") |
| 22 | + _M.chain = require("resty.openssl.x509.chain") |
| 23 | + _M.csr = require("resty.openssl.x509.csr") |
| 24 | + _M.crl = require("resty.openssl.x509.crl") |
| 25 | + _M.extension = require("resty.openssl.x509.extension") |
| 26 | + _M.extensions = require("resty.openssl.x509.extensions") |
| 27 | + _M.name = require("resty.openssl.x509.name") |
| 28 | + _M.revoked = require("resty.openssl.x509.revoked") |
| 29 | + _M.store = require("resty.openssl.x509.store") |
| 30 | + _M.pkcs12 = require("resty.openssl.pkcs12") |
| 31 | + _M.ssl = require("resty.openssl.ssl") |
| 32 | + _M.ssl_ctx = require("resty.openssl.ssl_ctx") |
| 33 | + |
| 34 | + if OPENSSL_30 then |
| 35 | + _M.provider = require("resty.openssl.provider") |
| 36 | + end |
32 | 37 |
|
33 |
| -_M.bignum = _M.bn |
| 38 | + _M.bignum = _M.bn |
| 39 | +end |
34 | 40 |
|
35 | 41 | function _M.luaossl_compat()
|
| 42 | + _M.load_modules() |
| 43 | + |
36 | 44 | _M.csr.setSubject = _M.csr.set_subject_name
|
37 | 45 | _M.csr.setPublicKey = _M.csr.set_pubkey
|
38 | 46 |
|
@@ -181,38 +189,6 @@ function _M.luaossl_compat()
|
181 | 189 | end
|
182 | 190 | end
|
183 | 191 |
|
184 |
| --- we made a typo sometime, this is going to be removed in next major release |
185 |
| -_M.luaossl_compact = _M.luaossl_compat |
186 |
| - |
187 |
| -local resty_hmac_compat_patched = false |
188 |
| -function _M.resty_hmac_compat() |
189 |
| - if resty_hmac_compat_patched then |
190 |
| - return |
191 |
| - end |
192 |
| - if _M.version.OPENSSL_10 then |
193 |
| - error("use resty_hmac_compat in OpenSSL 1.0 is not supported") |
194 |
| - end |
195 |
| - |
196 |
| - require("resty.openssl.include.evp") |
197 |
| - require("ffi").cdef [[ |
198 |
| - // originally named evp_cipher_ctx_st in evp.lua |
199 |
| - struct evp_md_ctx_st { |
200 |
| - const EVP_MD *digest; |
201 |
| - ENGINE *engine; /* functional reference if 'digest' is |
202 |
| - * ENGINE-provided */ |
203 |
| - unsigned long flags; |
204 |
| - void *md_data; |
205 |
| - /* Public key context for sign/verify */ |
206 |
| - EVP_PKEY_CTX *pctx; |
207 |
| - /* Update function: usually copied from EVP_MD */ |
208 |
| - int (*update) (EVP_MD_CTX *ctx, const void *data, size_t count); |
209 |
| - }/* EVP_MD_CTX */ ; |
210 |
| - ]] |
211 |
| - resty_hmac_compat_patched = true |
212 |
| -end |
213 |
| - |
214 |
| -local err = require("resty.openssl.err") |
215 |
| - |
216 | 192 | function _M.set_fips_mode(enable)
|
217 | 193 | if not not enable == _M.get_fips_mode() then
|
218 | 194 | return true
|
|
0 commit comments