Merge branch 'release-v0.6.4' into release
This commit is contained in:
commit
114e8a5a58
|
|
@ -6,10 +6,14 @@ rust:
|
||||||
os:
|
os:
|
||||||
- osx
|
- osx
|
||||||
- linux
|
- linux
|
||||||
|
env:
|
||||||
|
global:
|
||||||
|
- FEATURES="tlsv1_2 tlsv1_1 dtlsv1 dtlsv1_2 sslv2 aes_xts npn alpn"
|
||||||
before_install:
|
before_install:
|
||||||
- (test $TRAVIS_OS_NAME == "osx" || ./openssl/test/build.sh)
|
- (test $TRAVIS_OS_NAME == "osx" || ./openssl/test/build.sh)
|
||||||
before_script:
|
before_script:
|
||||||
- ./openssl/test/test.sh
|
- ./openssl/test/test.sh
|
||||||
script:
|
script:
|
||||||
- (cd openssl && LD_LIBRARY_PATH=/usr/lib:$LD_LIBRARY_PATH cargo test)
|
- (test $TRAVIS_OS_NAME != "osx" || (cd openssl && cargo test))
|
||||||
- (test $TRAVIS_OS_NAME == "osx" || (cd openssl && LD_LIBRARY_PATH=/usr/lib:$LD_LIBRARY_PATH cargo test --features "$FEATURES"))
|
- (test $TRAVIS_OS_NAME == "osx" || (cd openssl && OPENSSL_LIB_DIR=/usr/lib OPENSSL_INCLUDE_DIR=/usr/include LD_LIBRARY_PATH=/usr/lib:$LD_LIBRARY_PATH cargo test))
|
||||||
|
- (test $TRAVIS_OS_NAME == "osx" || (cd openssl && OPENSSL_LIB_DIR=/usr/lib OPENSSL_INCLUDE_DIR=/usr/include LD_LIBRARY_PATH=/usr/lib:$LD_LIBRARY_PATH cargo test --features "$FEATURES"))
|
||||||
|
|
|
||||||
|
|
@ -2,7 +2,7 @@
|
||||||
|
|
||||||
[](https://travis-ci.org/sfackler/rust-openssl)
|
[](https://travis-ci.org/sfackler/rust-openssl)
|
||||||
|
|
||||||
[Documentation](https://sfackler.github.io/rust-openssl/doc/v0.6.3/openssl).
|
[Documentation](https://sfackler.github.io/rust-openssl/doc/v0.6.4/openssl).
|
||||||
|
|
||||||
## Building
|
## Building
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,12 +1,12 @@
|
||||||
[package]
|
[package]
|
||||||
name = "openssl-sys"
|
name = "openssl-sys"
|
||||||
version = "0.6.3"
|
version = "0.6.4"
|
||||||
authors = ["Alex Crichton <alex@alexcrichton.com>",
|
authors = ["Alex Crichton <alex@alexcrichton.com>",
|
||||||
"Steven Fackler <sfackler@gmail.com>"]
|
"Steven Fackler <sfackler@gmail.com>"]
|
||||||
license = "MIT"
|
license = "MIT"
|
||||||
description = "FFI bindings to OpenSSL"
|
description = "FFI bindings to OpenSSL"
|
||||||
repository = "https://github.com/sfackler/rust-openssl"
|
repository = "https://github.com/sfackler/rust-openssl"
|
||||||
documentation = "https://sfackler.github.io/rust-openssl/doc/v0.6.3/openssl_sys"
|
documentation = "https://sfackler.github.io/rust-openssl/doc/v0.6.4/openssl_sys"
|
||||||
|
|
||||||
links = "openssl"
|
links = "openssl"
|
||||||
build = "build.rs"
|
build = "build.rs"
|
||||||
|
|
@ -19,6 +19,7 @@ dtlsv1_2 = []
|
||||||
sslv2 = []
|
sslv2 = []
|
||||||
aes_xts = []
|
aes_xts = []
|
||||||
npn = []
|
npn = []
|
||||||
|
alpn = []
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
libc = "0.1"
|
libc = "0.1"
|
||||||
|
|
|
||||||
|
|
@ -14,13 +14,16 @@ fn main() {
|
||||||
let include_dir = env::var("OPENSSL_INCLUDE_DIR").ok();
|
let include_dir = env::var("OPENSSL_INCLUDE_DIR").ok();
|
||||||
|
|
||||||
if lib_dir.is_none() && include_dir.is_none() {
|
if lib_dir.is_none() && include_dir.is_none() {
|
||||||
|
// rustc doesn't seem to work with pkg-config's output in mingw64
|
||||||
|
if !target.contains("windows") {
|
||||||
if let Ok(info) = pkg_config::find_library("openssl") {
|
if let Ok(info) = pkg_config::find_library("openssl") {
|
||||||
build_old_openssl_shim(&info.include_paths);
|
build_openssl_shim(&info.include_paths);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
}
|
||||||
if let Some(mingw_paths) = get_mingw_in_path() {
|
if let Some(mingw_paths) = get_mingw_in_path() {
|
||||||
for path in mingw_paths {
|
for path in mingw_paths {
|
||||||
println!("cargo:rustc-flags=-L native={}", path);
|
println!("cargo:rustc-link-search=native={}", path);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
@ -46,11 +49,12 @@ fn main() {
|
||||||
};
|
};
|
||||||
|
|
||||||
if let Some(lib_dir) = lib_dir {
|
if let Some(lib_dir) = lib_dir {
|
||||||
println!("cargo:rustc-flags=-L native={}", lib_dir);
|
println!("cargo:rustc-link-search=native={}", lib_dir);
|
||||||
}
|
}
|
||||||
|
|
||||||
let libs_arg = libs.iter().fold(String::new(), |args, lib| args + &format!(" -l {0}={1}", mode, lib));
|
for lib in libs {
|
||||||
println!("cargo:rustc-flags={0}", libs_arg);
|
println!("cargo:rustc-link-lib={}={}", mode, lib);
|
||||||
|
}
|
||||||
|
|
||||||
let mut include_dirs = vec![];
|
let mut include_dirs = vec![];
|
||||||
|
|
||||||
|
|
@ -58,18 +62,18 @@ fn main() {
|
||||||
include_dirs.push(PathBuf::from(&include_dir));
|
include_dirs.push(PathBuf::from(&include_dir));
|
||||||
}
|
}
|
||||||
|
|
||||||
build_old_openssl_shim(&include_dirs);
|
build_openssl_shim(&include_dirs);
|
||||||
}
|
}
|
||||||
|
|
||||||
fn build_old_openssl_shim(include_paths: &[PathBuf]) {
|
fn build_openssl_shim(include_paths: &[PathBuf]) {
|
||||||
let mut config = gcc::Config::new();
|
let mut config = gcc::Config::new();
|
||||||
|
|
||||||
for path in include_paths {
|
for path in include_paths {
|
||||||
config.include(path);
|
config.include(path);
|
||||||
}
|
}
|
||||||
|
|
||||||
config.file("src/old_openssl_shim.c")
|
config.file("src/openssl_shim.c")
|
||||||
.compile("libold_openssl_shim.a");
|
.compile("libopenssl_shim.a");
|
||||||
}
|
}
|
||||||
|
|
||||||
fn get_mingw_in_path() -> Option<Vec<String>> {
|
fn get_mingw_in_path() -> Option<Vec<String>> {
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,6 @@
|
||||||
#![allow(non_camel_case_types, non_upper_case_globals, non_snake_case)]
|
#![allow(non_camel_case_types, non_upper_case_globals, non_snake_case)]
|
||||||
#![allow(dead_code)]
|
#![allow(dead_code)]
|
||||||
#![doc(html_root_url="https://sfackler.github.io/rust-openssl/doc/v0.6.3")]
|
#![doc(html_root_url="https://sfackler.github.io/rust-openssl/doc/v0.6.4")]
|
||||||
|
|
||||||
extern crate libc;
|
extern crate libc;
|
||||||
|
|
||||||
|
|
@ -9,7 +9,6 @@ extern crate libressl_pnacl_sys;
|
||||||
|
|
||||||
use libc::{c_void, c_int, c_char, c_ulong, c_long, c_uint, c_uchar, size_t};
|
use libc::{c_void, c_int, c_char, c_ulong, c_long, c_uint, c_uchar, size_t};
|
||||||
use std::mem;
|
use std::mem;
|
||||||
use std::ptr;
|
|
||||||
use std::sync::{Mutex, MutexGuard};
|
use std::sync::{Mutex, MutexGuard};
|
||||||
use std::sync::{Once, ONCE_INIT};
|
use std::sync::{Once, ONCE_INIT};
|
||||||
|
|
||||||
|
|
@ -263,35 +262,6 @@ pub fn init() {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Functions converted from macros
|
|
||||||
pub unsafe fn BIO_eof(b: *mut BIO) -> bool {
|
|
||||||
BIO_ctrl(b, BIO_CTRL_EOF, 0, ptr::null_mut()) == 1
|
|
||||||
}
|
|
||||||
|
|
||||||
pub unsafe fn SSL_CTX_set_options(ssl: *mut SSL_CTX, op: c_long) -> c_long {
|
|
||||||
SSL_CTX_ctrl(ssl, SSL_CTRL_OPTIONS, op, ptr::null_mut())
|
|
||||||
}
|
|
||||||
|
|
||||||
pub unsafe fn BIO_set_mem_eof_return(b: *mut BIO, v: c_int) {
|
|
||||||
BIO_ctrl(b, BIO_C_SET_BUF_MEM_EOF_RETURN, v as c_long, ptr::null_mut());
|
|
||||||
}
|
|
||||||
|
|
||||||
pub unsafe fn SSL_CTX_get_options(ssl: *mut SSL_CTX) -> c_long {
|
|
||||||
SSL_CTX_ctrl(ssl, SSL_CTRL_OPTIONS, 0, ptr::null_mut())
|
|
||||||
}
|
|
||||||
|
|
||||||
pub unsafe fn SSL_CTX_clear_options(ssl: *mut SSL_CTX, op: c_long) -> c_long {
|
|
||||||
SSL_CTX_ctrl(ssl, SSL_CTRL_CLEAR_OPTIONS, (op), ptr::null_mut())
|
|
||||||
}
|
|
||||||
|
|
||||||
pub unsafe fn SSL_CTX_add_extra_chain_cert(ssl: *mut SSL_CTX, cert: *mut X509) -> c_long {
|
|
||||||
SSL_CTX_ctrl(ssl, SSL_CTRL_EXTRA_CHAIN_CERT, 0, cert)
|
|
||||||
}
|
|
||||||
|
|
||||||
pub unsafe fn SSL_CTX_set_read_ahead(ctx: *mut SSL_CTX, m: c_long) -> c_long {
|
|
||||||
SSL_CTX_ctrl(ctx, SSL_CTRL_SET_READ_AHEAD, m, ptr::null_mut())
|
|
||||||
}
|
|
||||||
|
|
||||||
// True functions
|
// True functions
|
||||||
extern "C" {
|
extern "C" {
|
||||||
pub fn ASN1_INTEGER_set(dest: *mut ASN1_INTEGER, value: c_long) -> c_int;
|
pub fn ASN1_INTEGER_set(dest: *mut ASN1_INTEGER, value: c_long) -> c_int;
|
||||||
|
|
@ -301,6 +271,7 @@ extern "C" {
|
||||||
pub fn BIO_ctrl(b: *mut BIO, cmd: c_int, larg: c_long, parg: *mut c_void) -> c_long;
|
pub fn BIO_ctrl(b: *mut BIO, cmd: c_int, larg: c_long, parg: *mut c_void) -> c_long;
|
||||||
pub fn BIO_free_all(b: *mut BIO);
|
pub fn BIO_free_all(b: *mut BIO);
|
||||||
pub fn BIO_new(type_: *const BIO_METHOD) -> *mut BIO;
|
pub fn BIO_new(type_: *const BIO_METHOD) -> *mut BIO;
|
||||||
|
pub fn BIO_new_socket(sock: c_int, close_flag: c_int) -> *mut BIO;
|
||||||
pub fn BIO_read(b: *mut BIO, buf: *mut c_void, len: c_int) -> c_int;
|
pub fn BIO_read(b: *mut BIO, buf: *mut c_void, len: c_int) -> c_int;
|
||||||
pub fn BIO_write(b: *mut BIO, buf: *const c_void, len: c_int) -> c_int;
|
pub fn BIO_write(b: *mut BIO, buf: *const c_void, len: c_int) -> c_int;
|
||||||
pub fn BIO_s_mem() -> *const BIO_METHOD;
|
pub fn BIO_s_mem() -> *const BIO_METHOD;
|
||||||
|
|
@ -445,10 +416,20 @@ extern "C" {
|
||||||
pub fn HMAC_CTX_copy(dst: *mut HMAC_CTX, src: *const HMAC_CTX) -> c_int;
|
pub fn HMAC_CTX_copy(dst: *mut HMAC_CTX, src: *const HMAC_CTX) -> c_int;
|
||||||
|
|
||||||
// Pre-1.0 versions of these didn't return anything, so the shims bridge that gap
|
// Pre-1.0 versions of these didn't return anything, so the shims bridge that gap
|
||||||
|
#[cfg_attr(not(target_os = "nacl"), link_name = "HMAC_Init_ex_shim")]
|
||||||
|
pub fn HMAC_Init_ex(ctx: *mut HMAC_CTX, key: *const u8, keylen: c_int, md: *const EVP_MD, imple: *const ENGINE) -> c_int;
|
||||||
|
#[cfg_attr(not(target_os = "nacl"), link_name = "HMAC_Final_shim")]
|
||||||
|
pub fn HMAC_Final(ctx: *mut HMAC_CTX, output: *mut u8, len: *mut c_uint) -> c_int;
|
||||||
|
#[cfg_attr(not(target_os = "nacl"), link_name = "HMAC_Update_shim")]
|
||||||
|
pub fn HMAC_Update(ctx: *mut HMAC_CTX, input: *const u8, len: c_uint) -> c_int;
|
||||||
|
|
||||||
|
/// Deprecated - use the non "_shim" version
|
||||||
#[cfg_attr(target_os = "nacl", link_name = "HMAC_Init_ex")]
|
#[cfg_attr(target_os = "nacl", link_name = "HMAC_Init_ex")]
|
||||||
pub fn HMAC_Init_ex_shim(ctx: *mut HMAC_CTX, key: *const u8, keylen: c_int, md: *const EVP_MD, imple: *const ENGINE) -> c_int;
|
pub fn HMAC_Init_ex_shim(ctx: *mut HMAC_CTX, key: *const u8, keylen: c_int, md: *const EVP_MD, imple: *const ENGINE) -> c_int;
|
||||||
|
/// Deprecated - use the non "_shim" version
|
||||||
#[cfg_attr(target_os = "nacl", link_name = "HMAC_Final")]
|
#[cfg_attr(target_os = "nacl", link_name = "HMAC_Final")]
|
||||||
pub fn HMAC_Final_shim(ctx: *mut HMAC_CTX, output: *mut u8, len: *mut c_uint) -> c_int;
|
pub fn HMAC_Final_shim(ctx: *mut HMAC_CTX, output: *mut u8, len: *mut c_uint) -> c_int;
|
||||||
|
/// Deprecated - use the non "_shim" version
|
||||||
#[cfg_attr(target_os = "nacl", link_name = "HMAC_Update")]
|
#[cfg_attr(target_os = "nacl", link_name = "HMAC_Update")]
|
||||||
pub fn HMAC_Update_shim(ctx: *mut HMAC_CTX, input: *const u8, len: c_uint) -> c_int;
|
pub fn HMAC_Update_shim(ctx: *mut HMAC_CTX, input: *const u8, len: c_uint) -> c_int;
|
||||||
|
|
||||||
|
|
@ -566,13 +547,31 @@ extern "C" {
|
||||||
inlen: c_uint,
|
inlen: c_uint,
|
||||||
arg: *mut c_void) -> c_int,
|
arg: *mut c_void) -> c_int,
|
||||||
arg: *mut c_void);
|
arg: *mut c_void);
|
||||||
#[cfg(feature = "npn")]
|
#[cfg(any(feature = "alpn", feature = "npn"))]
|
||||||
pub fn SSL_select_next_proto(out: *mut *mut c_uchar, outlen: *mut c_uchar,
|
pub fn SSL_select_next_proto(out: *mut *mut c_uchar, outlen: *mut c_uchar,
|
||||||
inbuf: *const c_uchar, inlen: c_uint,
|
inbuf: *const c_uchar, inlen: c_uint,
|
||||||
client: *const c_uchar, client_len: c_uint) -> c_int;
|
client: *const c_uchar, client_len: c_uint) -> c_int;
|
||||||
#[cfg(feature = "npn")]
|
#[cfg(feature = "npn")]
|
||||||
pub fn SSL_get0_next_proto_negotiated(s: *const SSL, data: *mut *const c_uchar, len: *mut c_uint);
|
pub fn SSL_get0_next_proto_negotiated(s: *const SSL, data: *mut *const c_uchar, len: *mut c_uint);
|
||||||
|
|
||||||
|
#[cfg(feature = "alpn")]
|
||||||
|
pub fn SSL_CTX_set_alpn_protos(s: *mut SSL_CTX, data: *const c_uchar, len: c_uint) -> c_int;
|
||||||
|
|
||||||
|
#[cfg(feature = "alpn")]
|
||||||
|
pub fn SSL_set_alpn_protos(s: *mut SSL, data: *const c_uchar, len: c_uint) -> c_int;
|
||||||
|
|
||||||
|
#[cfg(feature = "alpn")]
|
||||||
|
pub fn SSL_CTX_set_alpn_select_cb(ssl: *mut SSL_CTX,
|
||||||
|
cb: extern "C" fn(ssl: *mut SSL,
|
||||||
|
out: *mut *mut c_uchar,
|
||||||
|
outlen: *mut c_uchar,
|
||||||
|
inbuf: *const c_uchar,
|
||||||
|
inlen: c_uint,
|
||||||
|
arg: *mut c_void) -> c_int,
|
||||||
|
arg: *mut c_void);
|
||||||
|
#[cfg(feature = "alpn")]
|
||||||
|
pub fn SSL_get0_alpn_selected(s: *const SSL, data: *mut *const c_uchar, len: *mut c_uint);
|
||||||
|
|
||||||
pub fn X509_add_ext(x: *mut X509, ext: *mut X509_EXTENSION, loc: c_int) -> c_int;
|
pub fn X509_add_ext(x: *mut X509, ext: *mut X509_EXTENSION, loc: c_int) -> c_int;
|
||||||
pub fn X509_digest(x: *mut X509, digest: *const EVP_MD, buf: *mut c_char, len: *mut c_uint) -> c_int;
|
pub fn X509_digest(x: *mut X509, digest: *const EVP_MD, buf: *mut c_char, len: *mut c_uint) -> c_int;
|
||||||
pub fn X509_free(x: *mut X509);
|
pub fn X509_free(x: *mut X509);
|
||||||
|
|
@ -610,6 +609,24 @@ extern "C" {
|
||||||
pub fn d2i_RSA_PUBKEY(k: *const *mut RSA, buf: *const *const u8, len: c_uint) -> *mut RSA;
|
pub fn d2i_RSA_PUBKEY(k: *const *mut RSA, buf: *const *const u8, len: c_uint) -> *mut RSA;
|
||||||
pub fn i2d_RSAPrivateKey(k: *mut RSA, buf: *const *mut u8) -> c_int;
|
pub fn i2d_RSAPrivateKey(k: *mut RSA, buf: *const *mut u8) -> c_int;
|
||||||
pub fn d2i_RSAPrivateKey(k: *const *mut RSA, buf: *const *const u8, len: c_uint) -> *mut RSA;
|
pub fn d2i_RSAPrivateKey(k: *const *mut RSA, buf: *const *const u8, len: c_uint) -> *mut RSA;
|
||||||
|
|
||||||
|
// These functions are defined in OpenSSL as macros, so we shim them
|
||||||
|
#[link_name = "BIO_eof_shim"]
|
||||||
|
pub fn BIO_eof(b: *mut BIO) -> c_int;
|
||||||
|
#[link_name = "BIO_set_mem_eof_return_shim"]
|
||||||
|
pub fn BIO_set_mem_eof_return(b: *mut BIO, v: c_int);
|
||||||
|
#[link_name = "SSL_CTX_set_options_shim"]
|
||||||
|
pub fn SSL_CTX_set_options(ctx: *mut SSL_CTX, options: c_long) -> c_long;
|
||||||
|
#[link_name = "SSL_CTX_get_options_shim"]
|
||||||
|
pub fn SSL_CTX_get_options(ctx: *mut SSL_CTX) -> c_long;
|
||||||
|
#[link_name = "SSL_CTX_clear_options_shim"]
|
||||||
|
pub fn SSL_CTX_clear_options(ctx: *mut SSL_CTX, options: c_long) -> c_long;
|
||||||
|
#[link_name = "SSL_CTX_add_extra_chain_cert_shim"]
|
||||||
|
pub fn SSL_CTX_add_extra_chain_cert(ctx: *mut SSL_CTX, x509: *mut X509) -> c_long;
|
||||||
|
#[link_name = "SSL_CTX_set_read_ahead_shim"]
|
||||||
|
pub fn SSL_CTX_set_read_ahead(ctx: *mut SSL_CTX, m: c_long) -> c_long;
|
||||||
|
#[link_name = "SSL_set_tlsext_host_name_shim"]
|
||||||
|
pub fn SSL_set_tlsext_host_name(s: *mut SSL, name: *const c_char) -> c_long;
|
||||||
}
|
}
|
||||||
|
|
||||||
pub mod probe;
|
pub mod probe;
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,5 @@
|
||||||
#include <openssl/hmac.h>
|
#include <openssl/hmac.h>
|
||||||
|
#include <openssl/ssl.h>
|
||||||
|
|
||||||
#if OPENSSL_VERSION_NUMBER < 0x1000000L
|
#if OPENSSL_VERSION_NUMBER < 0x1000000L
|
||||||
// Copied from openssl crypto/hmac/hmac.c
|
// Copied from openssl crypto/hmac/hmac.c
|
||||||
|
|
@ -47,3 +48,37 @@ int HMAC_Final_shim(HMAC_CTX *ctx, unsigned char *md, unsigned int *len) {
|
||||||
return HMAC_Final(ctx, md, len);
|
return HMAC_Final(ctx, md, len);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
// shims for OpenSSL macros
|
||||||
|
|
||||||
|
int BIO_eof_shim(BIO *b) {
|
||||||
|
return BIO_eof(b);
|
||||||
|
}
|
||||||
|
|
||||||
|
void BIO_set_mem_eof_return_shim(BIO *b, int v) {
|
||||||
|
BIO_set_mem_eof_return(b, v);
|
||||||
|
}
|
||||||
|
|
||||||
|
long SSL_CTX_set_options_shim(SSL_CTX *ctx, long options) {
|
||||||
|
return SSL_CTX_set_options(ctx, options);
|
||||||
|
}
|
||||||
|
|
||||||
|
long SSL_CTX_get_options_shim(SSL_CTX *ctx) {
|
||||||
|
return SSL_CTX_get_options(ctx);
|
||||||
|
}
|
||||||
|
|
||||||
|
long SSL_CTX_clear_options_shim(SSL_CTX *ctx, long options) {
|
||||||
|
return SSL_CTX_clear_options(ctx, options);
|
||||||
|
}
|
||||||
|
|
||||||
|
long SSL_CTX_add_extra_chain_cert_shim(SSL_CTX *ctx, X509 *x509) {
|
||||||
|
return SSL_CTX_add_extra_chain_cert(ctx, x509);
|
||||||
|
}
|
||||||
|
|
||||||
|
long SSL_CTX_set_read_ahead_shim(SSL_CTX *ctx, long m) {
|
||||||
|
return SSL_CTX_set_read_ahead(ctx, m);
|
||||||
|
}
|
||||||
|
|
||||||
|
long SSL_set_tlsext_host_name_shim(SSL *s, char *name) {
|
||||||
|
return SSL_set_tlsext_host_name(s, name);
|
||||||
|
}
|
||||||
|
|
@ -1,11 +1,11 @@
|
||||||
[package]
|
[package]
|
||||||
name = "openssl"
|
name = "openssl"
|
||||||
version = "0.6.3"
|
version = "0.6.4"
|
||||||
authors = ["Steven Fackler <sfackler@gmail.com>"]
|
authors = ["Steven Fackler <sfackler@gmail.com>"]
|
||||||
license = "Apache-2.0"
|
license = "Apache-2.0"
|
||||||
description = "OpenSSL bindings"
|
description = "OpenSSL bindings"
|
||||||
repository = "https://github.com/sfackler/rust-openssl"
|
repository = "https://github.com/sfackler/rust-openssl"
|
||||||
documentation = "https://sfackler.github.io/rust-openssl/doc/v0.6.3/openssl"
|
documentation = "https://sfackler.github.io/rust-openssl/doc/v0.6.4/openssl"
|
||||||
readme = "../README.md"
|
readme = "../README.md"
|
||||||
keywords = ["crypto", "tls", "ssl", "dtls"]
|
keywords = ["crypto", "tls", "ssl", "dtls"]
|
||||||
|
|
||||||
|
|
@ -17,13 +17,14 @@ dtlsv1_2 = ["openssl-sys/dtlsv1_2"]
|
||||||
sslv2 = ["openssl-sys/sslv2"]
|
sslv2 = ["openssl-sys/sslv2"]
|
||||||
aes_xts = ["openssl-sys/aes_xts"]
|
aes_xts = ["openssl-sys/aes_xts"]
|
||||||
npn = ["openssl-sys/npn"]
|
npn = ["openssl-sys/npn"]
|
||||||
|
alpn = ["openssl-sys/alpn"]
|
||||||
|
|
||||||
[dependencies.openssl-sys]
|
[dependencies.openssl-sys]
|
||||||
path = "../openssl-sys"
|
path = "../openssl-sys"
|
||||||
version = "0.6.3"
|
version = "0.6.4"
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
bitflags = "0.2"
|
bitflags = ">= 0.2, < 0.4"
|
||||||
lazy_static = "0.1"
|
lazy_static = "0.1"
|
||||||
libc = "0.1"
|
libc = "0.1"
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -73,11 +73,10 @@ impl Read for MemBio {
|
||||||
|
|
||||||
if ret <= 0 {
|
if ret <= 0 {
|
||||||
let is_eof = unsafe { ffi::BIO_eof(self.bio) };
|
let is_eof = unsafe { ffi::BIO_eof(self.bio) };
|
||||||
if is_eof {
|
if is_eof != 0 {
|
||||||
Ok(0)
|
Ok(0)
|
||||||
} else {
|
} else {
|
||||||
Err(io::Error::new(io::ErrorKind::Other,
|
Err(io::Error::new(io::ErrorKind::Other, SslError::get()))
|
||||||
SslError::get()))
|
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
Ok(ret as usize)
|
Ok(ret as usize)
|
||||||
|
|
@ -93,8 +92,7 @@ impl Write for MemBio {
|
||||||
};
|
};
|
||||||
|
|
||||||
if ret < 0 {
|
if ret < 0 {
|
||||||
Err(io::Error::new(io::ErrorKind::Other,
|
Err(io::Error::new(io::ErrorKind::Other, SslError::get()))
|
||||||
SslError::get()))
|
|
||||||
} else {
|
} else {
|
||||||
Ok(ret as usize)
|
Ok(ret as usize)
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -88,7 +88,7 @@ impl HMAC {
|
||||||
#[inline]
|
#[inline]
|
||||||
fn init_once(&mut self, md: *const ffi::EVP_MD, key: &[u8]) {
|
fn init_once(&mut self, md: *const ffi::EVP_MD, key: &[u8]) {
|
||||||
unsafe {
|
unsafe {
|
||||||
let r = ffi::HMAC_Init_ex_shim(&mut self.ctx,
|
let r = ffi::HMAC_Init_ex(&mut self.ctx,
|
||||||
key.as_ptr(), key.len() as c_int,
|
key.as_ptr(), key.len() as c_int,
|
||||||
md, 0 as *const _);
|
md, 0 as *const _);
|
||||||
assert_eq!(r, 1);
|
assert_eq!(r, 1);
|
||||||
|
|
@ -106,7 +106,7 @@ impl HMAC {
|
||||||
// If the key and/or md is not supplied it's reused from the last time
|
// If the key and/or md is not supplied it's reused from the last time
|
||||||
// avoiding redundant initializations
|
// avoiding redundant initializations
|
||||||
unsafe {
|
unsafe {
|
||||||
let r = ffi::HMAC_Init_ex_shim(&mut self.ctx,
|
let r = ffi::HMAC_Init_ex(&mut self.ctx,
|
||||||
0 as *const _, 0,
|
0 as *const _, 0,
|
||||||
0 as *const _, 0 as *const _);
|
0 as *const _, 0 as *const _);
|
||||||
assert_eq!(r, 1);
|
assert_eq!(r, 1);
|
||||||
|
|
@ -120,7 +120,7 @@ impl HMAC {
|
||||||
self.init();
|
self.init();
|
||||||
}
|
}
|
||||||
unsafe {
|
unsafe {
|
||||||
let r = ffi::HMAC_Update_shim(&mut self.ctx, data.as_ptr(), data.len() as c_uint);
|
let r = ffi::HMAC_Update(&mut self.ctx, data.as_ptr(), data.len() as c_uint);
|
||||||
assert_eq!(r, 1);
|
assert_eq!(r, 1);
|
||||||
}
|
}
|
||||||
self.state = Updated;
|
self.state = Updated;
|
||||||
|
|
@ -135,7 +135,7 @@ impl HMAC {
|
||||||
let mut res: Vec<u8> = repeat(0).take(md_len).collect();
|
let mut res: Vec<u8> = repeat(0).take(md_len).collect();
|
||||||
unsafe {
|
unsafe {
|
||||||
let mut len = 0;
|
let mut len = 0;
|
||||||
let r = ffi::HMAC_Final_shim(&mut self.ctx, res.as_mut_ptr(), &mut len);
|
let r = ffi::HMAC_Final(&mut self.ctx, res.as_mut_ptr(), &mut len);
|
||||||
self.state = Finalized;
|
self.state = Finalized;
|
||||||
assert_eq!(len as usize, md_len);
|
assert_eq!(len as usize, md_len);
|
||||||
assert_eq!(r, 1);
|
assert_eq!(r, 1);
|
||||||
|
|
@ -181,7 +181,7 @@ impl Drop for HMAC {
|
||||||
if self.state != Finalized {
|
if self.state != Finalized {
|
||||||
let mut buf: Vec<u8> = repeat(0).take(self.type_.md_len()).collect();
|
let mut buf: Vec<u8> = repeat(0).take(self.type_.md_len()).collect();
|
||||||
let mut len = 0;
|
let mut len = 0;
|
||||||
ffi::HMAC_Final_shim(&mut self.ctx, buf.as_mut_ptr(), &mut len);
|
ffi::HMAC_Final(&mut self.ctx, buf.as_mut_ptr(), &mut len);
|
||||||
}
|
}
|
||||||
ffi::HMAC_CTX_cleanup(&mut self.ctx);
|
ffi::HMAC_CTX_cleanup(&mut self.ctx);
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
#![doc(html_root_url="https://sfackler.github.io/rust-openssl/doc/v0.6.3")]
|
#![doc(html_root_url="https://sfackler.github.io/rust-openssl/doc/v0.6.4")]
|
||||||
|
|
||||||
#[macro_use]
|
#[macro_use]
|
||||||
extern crate bitflags;
|
extern crate bitflags;
|
||||||
|
|
|
||||||
|
|
@ -37,6 +37,7 @@ pub enum Nid {
|
||||||
DES_EDE,
|
DES_EDE,
|
||||||
DES_EDE3,
|
DES_EDE3,
|
||||||
IDEA_CBC,
|
IDEA_CBC,
|
||||||
|
IDEA_CFB,
|
||||||
IDEA_ECB,
|
IDEA_ECB,
|
||||||
RC2_CBC,
|
RC2_CBC,
|
||||||
RC2_ECB,
|
RC2_ECB,
|
||||||
|
|
@ -55,6 +56,7 @@ pub enum Nid {
|
||||||
MessageDigest,
|
MessageDigest,
|
||||||
SigningTime,
|
SigningTime,
|
||||||
CounterSignature,
|
CounterSignature,
|
||||||
|
ChallengePassword,
|
||||||
UnstructuredAddress,
|
UnstructuredAddress,
|
||||||
ExtendedCertificateAttributes,
|
ExtendedCertificateAttributes,
|
||||||
Netscape,
|
Netscape,
|
||||||
|
|
@ -93,6 +95,7 @@ pub enum Nid {
|
||||||
AuthorityKeyIdentifier,
|
AuthorityKeyIdentifier,
|
||||||
BF_CBC,
|
BF_CBC,
|
||||||
BF_ECB,
|
BF_ECB,
|
||||||
|
BF_CFB,
|
||||||
BF_OFB,
|
BF_OFB,
|
||||||
MDC2,
|
MDC2,
|
||||||
RSA_MDC2,
|
RSA_MDC2,
|
||||||
|
|
@ -117,7 +120,8 @@ pub enum Nid {
|
||||||
RSA_SHA1_2,
|
RSA_SHA1_2,
|
||||||
DSA,
|
DSA,
|
||||||
RIPEMD160,
|
RIPEMD160,
|
||||||
RSA_RIPEMD160,
|
/* 118 missing */
|
||||||
|
RSA_RIPEMD160=119,
|
||||||
RC5_CBC,
|
RC5_CBC,
|
||||||
RC5_ECB,
|
RC5_ECB,
|
||||||
RC5_CFB,
|
RC5_CFB,
|
||||||
|
|
@ -142,7 +146,6 @@ pub enum Nid {
|
||||||
CRLReason,
|
CRLReason,
|
||||||
InvalidityDate,
|
InvalidityDate,
|
||||||
SXNetID,
|
SXNetID,
|
||||||
Pkcs12,
|
|
||||||
PBE_SHA1_RC4_128,
|
PBE_SHA1_RC4_128,
|
||||||
PBE_SHA1_RC4_40,
|
PBE_SHA1_RC4_40,
|
||||||
PBE_SHA1_3DES,
|
PBE_SHA1_3DES,
|
||||||
|
|
|
||||||
|
|
@ -13,9 +13,9 @@ use std::sync::{Once, ONCE_INIT, Arc, Mutex};
|
||||||
use std::ops::{Deref, DerefMut};
|
use std::ops::{Deref, DerefMut};
|
||||||
use std::cmp;
|
use std::cmp;
|
||||||
use std::any::Any;
|
use std::any::Any;
|
||||||
#[cfg(feature = "npn")]
|
#[cfg(any(feature = "npn", feature = "alpn"))]
|
||||||
use libc::{c_uchar, c_uint};
|
use libc::{c_uchar, c_uint};
|
||||||
#[cfg(feature = "npn")]
|
#[cfg(any(feature = "npn", feature = "alpn"))]
|
||||||
use std::slice;
|
use std::slice;
|
||||||
|
|
||||||
use bio::{MemBio};
|
use bio::{MemBio};
|
||||||
|
|
@ -170,49 +170,37 @@ lazy_static! {
|
||||||
// Registers a destructor for the data which will be called
|
// Registers a destructor for the data which will be called
|
||||||
// when context is freed
|
// when context is freed
|
||||||
fn get_verify_data_idx<T: Any + 'static>() -> c_int {
|
fn get_verify_data_idx<T: Any + 'static>() -> c_int {
|
||||||
|
*INDEXES.lock().unwrap().entry(TypeId::of::<T>()).or_insert_with(|| {
|
||||||
|
get_new_idx::<T>()
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
#[cfg(feature = "npn")]
|
||||||
|
lazy_static! {
|
||||||
|
static ref NPN_PROTOS_IDX: c_int = get_new_idx::<Vec<u8>>();
|
||||||
|
}
|
||||||
|
#[cfg(feature = "alpn")]
|
||||||
|
lazy_static! {
|
||||||
|
static ref ALPN_PROTOS_IDX: c_int = get_new_idx::<Vec<u8>>();
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Determine a new index to use for SSL CTX ex data.
|
||||||
|
/// Registers a destruct for the data which will be called by openssl when the context is freed.
|
||||||
|
fn get_new_idx<T>() -> c_int {
|
||||||
extern fn free_data_box<T>(_parent: *mut c_void, ptr: *mut c_void,
|
extern fn free_data_box<T>(_parent: *mut c_void, ptr: *mut c_void,
|
||||||
_ad: *mut ffi::CRYPTO_EX_DATA, _idx: c_int,
|
_ad: *mut ffi::CRYPTO_EX_DATA, _idx: c_int,
|
||||||
_argl: c_long, _argp: *mut c_void) {
|
_argl: c_long, _argp: *mut c_void) {
|
||||||
if ptr != 0 as *mut _ {
|
if !ptr.is_null() {
|
||||||
let _: Box<T> = unsafe { mem::transmute(ptr) };
|
let _: Box<T> = unsafe { mem::transmute(ptr) };
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
*INDEXES.lock().unwrap().entry(TypeId::of::<T>()).or_insert_with(|| {
|
|
||||||
unsafe {
|
unsafe {
|
||||||
let f: ffi::CRYPTO_EX_free = free_data_box::<T>;
|
let f: ffi::CRYPTO_EX_free = free_data_box::<T>;
|
||||||
let idx = ffi::SSL_CTX_get_ex_new_index(0, ptr::null(), None, None, Some(f));
|
|
||||||
assert!(idx >= 0);
|
|
||||||
idx
|
|
||||||
}
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Creates a static index for the list of NPN protocols.
|
|
||||||
/// Registers a destructor for the data which will be called
|
|
||||||
/// when the context is freed.
|
|
||||||
#[cfg(feature = "npn")]
|
|
||||||
fn get_npn_protos_idx() -> c_int {
|
|
||||||
static mut NPN_PROTOS_IDX: c_int = -1;
|
|
||||||
static mut INIT: Once = ONCE_INIT;
|
|
||||||
|
|
||||||
extern fn free_data_box(_parent: *mut c_void, ptr: *mut c_void,
|
|
||||||
_ad: *mut ffi::CRYPTO_EX_DATA, _idx: c_int,
|
|
||||||
_argl: c_long, _argp: *mut c_void) {
|
|
||||||
if !ptr.is_null() {
|
|
||||||
let _: Box<Vec<u8>> = unsafe { mem::transmute(ptr) };
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe {
|
|
||||||
INIT.call_once(|| {
|
|
||||||
let f: ffi::CRYPTO_EX_free = free_data_box;
|
|
||||||
let idx = ffi::SSL_CTX_get_ex_new_index(0, ptr::null(), None,
|
let idx = ffi::SSL_CTX_get_ex_new_index(0, ptr::null(), None,
|
||||||
None, Some(f));
|
None, Some(f));
|
||||||
assert!(idx >= 0);
|
assert!(idx >= 0);
|
||||||
NPN_PROTOS_IDX = idx;
|
idx
|
||||||
});
|
|
||||||
NPN_PROTOS_IDX
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -264,6 +252,26 @@ extern fn raw_verify_with_data<T>(preverify_ok: c_int,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[cfg(any(feature = "npn", feature = "alpn"))]
|
||||||
|
unsafe fn select_proto_using(ssl: *mut ffi::SSL,
|
||||||
|
out: *mut *mut c_uchar, outlen: *mut c_uchar,
|
||||||
|
inbuf: *const c_uchar, inlen: c_uint,
|
||||||
|
ex_data: c_int) -> c_int {
|
||||||
|
|
||||||
|
// First, get the list of protocols (that the client should support) saved in the context
|
||||||
|
// extra data.
|
||||||
|
let ssl_ctx = ffi::SSL_get_SSL_CTX(ssl);
|
||||||
|
let protocols = ffi::SSL_CTX_get_ex_data(ssl_ctx, ex_data);
|
||||||
|
let protocols: &Vec<u8> = mem::transmute(protocols);
|
||||||
|
// Prepare the client list parameters to be passed to the OpenSSL function...
|
||||||
|
let client = protocols.as_ptr();
|
||||||
|
let client_len = protocols.len() as c_uint;
|
||||||
|
// Finally, let OpenSSL find a protocol to be used, by matching the given server and
|
||||||
|
// client lists.
|
||||||
|
ffi::SSL_select_next_proto(out, outlen, inbuf, inlen, client, client_len);
|
||||||
|
ffi::SSL_TLSEXT_ERR_OK
|
||||||
|
}
|
||||||
|
|
||||||
/// The function is given as the callback to `SSL_CTX_set_next_proto_select_cb`.
|
/// The function is given as the callback to `SSL_CTX_set_next_proto_select_cb`.
|
||||||
///
|
///
|
||||||
/// It chooses the protocol that the client wishes to use, out of the given list of protocols
|
/// It chooses the protocol that the client wishes to use, out of the given list of protocols
|
||||||
|
|
@ -276,20 +284,18 @@ extern fn raw_next_proto_select_cb(ssl: *mut ffi::SSL,
|
||||||
inbuf: *const c_uchar, inlen: c_uint,
|
inbuf: *const c_uchar, inlen: c_uint,
|
||||||
_arg: *mut c_void) -> c_int {
|
_arg: *mut c_void) -> c_int {
|
||||||
unsafe {
|
unsafe {
|
||||||
// First, get the list of protocols (that the client should support) saved in the context
|
select_proto_using(ssl, out, outlen, inbuf, inlen, *NPN_PROTOS_IDX)
|
||||||
// extra data.
|
}
|
||||||
let ssl_ctx = ffi::SSL_get_SSL_CTX(ssl);
|
|
||||||
let protocols = ffi::SSL_CTX_get_ex_data(ssl_ctx, get_npn_protos_idx());
|
|
||||||
let protocols: &Vec<u8> = mem::transmute(protocols);
|
|
||||||
// Prepare the client list parameters to be passed to the OpenSSL function...
|
|
||||||
let client = protocols.as_ptr();
|
|
||||||
let client_len = protocols.len() as c_uint;
|
|
||||||
// Finally, let OpenSSL find a protocol to be used, by matching the given server and
|
|
||||||
// client lists.
|
|
||||||
ffi::SSL_select_next_proto(out, outlen, inbuf, inlen, client, client_len);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
ffi::SSL_TLSEXT_ERR_OK
|
#[cfg(feature = "alpn")]
|
||||||
|
extern fn raw_alpn_select_cb(ssl: *mut ffi::SSL,
|
||||||
|
out: *mut *mut c_uchar, outlen: *mut c_uchar,
|
||||||
|
inbuf: *const c_uchar, inlen: c_uint,
|
||||||
|
_arg: *mut c_void) -> c_int {
|
||||||
|
unsafe {
|
||||||
|
select_proto_using(ssl, out, outlen, inbuf, inlen, *ALPN_PROTOS_IDX)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/// The function is given as the callback to `SSL_CTX_set_next_protos_advertised_cb`.
|
/// The function is given as the callback to `SSL_CTX_set_next_protos_advertised_cb`.
|
||||||
|
|
@ -306,7 +312,7 @@ extern fn raw_next_protos_advertise_cb(ssl: *mut ffi::SSL,
|
||||||
unsafe {
|
unsafe {
|
||||||
// First, get the list of (supported) protocols saved in the context extra data.
|
// First, get the list of (supported) protocols saved in the context extra data.
|
||||||
let ssl_ctx = ffi::SSL_get_SSL_CTX(ssl);
|
let ssl_ctx = ffi::SSL_get_SSL_CTX(ssl);
|
||||||
let protocols = ffi::SSL_CTX_get_ex_data(ssl_ctx, get_npn_protos_idx());
|
let protocols = ffi::SSL_CTX_get_ex_data(ssl_ctx, *NPN_PROTOS_IDX);
|
||||||
if protocols.is_null() {
|
if protocols.is_null() {
|
||||||
*out = b"".as_ptr();
|
*out = b"".as_ptr();
|
||||||
*outlen = 0;
|
*outlen = 0;
|
||||||
|
|
@ -322,6 +328,24 @@ extern fn raw_next_protos_advertise_cb(ssl: *mut ffi::SSL,
|
||||||
ffi::SSL_TLSEXT_ERR_OK
|
ffi::SSL_TLSEXT_ERR_OK
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Convert a set of byte slices into a series of byte strings encoded for SSL. Encoding is a byte
|
||||||
|
/// containing the length followed by the string.
|
||||||
|
#[cfg(any(feature = "npn", feature = "alpn"))]
|
||||||
|
fn ssl_encode_byte_strings(strings: &[&[u8]]) -> Vec<u8>
|
||||||
|
{
|
||||||
|
let mut enc = Vec::new();
|
||||||
|
for string in strings {
|
||||||
|
let len = string.len() as u8;
|
||||||
|
if len as usize != string.len() {
|
||||||
|
// If the item does not fit, discard it
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
enc.push(len);
|
||||||
|
enc.extend(string[..len as usize].to_vec());
|
||||||
|
}
|
||||||
|
enc
|
||||||
|
}
|
||||||
|
|
||||||
/// The signature of functions that can be used to manually verify certificates
|
/// The signature of functions that can be used to manually verify certificates
|
||||||
pub type VerifyCallback = fn(preverify_ok: bool,
|
pub type VerifyCallback = fn(preverify_ok: bool,
|
||||||
x509_ctx: &X509StoreContext) -> bool;
|
x509_ctx: &X509StoreContext) -> bool;
|
||||||
|
|
@ -495,7 +519,7 @@ impl SslContext {
|
||||||
pub fn set_cipher_list(&mut self, cipher_list: &str) -> Result<(),SslError> {
|
pub fn set_cipher_list(&mut self, cipher_list: &str) -> Result<(),SslError> {
|
||||||
wrap_ssl_result(
|
wrap_ssl_result(
|
||||||
unsafe {
|
unsafe {
|
||||||
let cipher_list = CString::new(cipher_list.as_bytes()).unwrap();
|
let cipher_list = CString::new(cipher_list).unwrap();
|
||||||
ffi::SSL_CTX_set_cipher_list(self.ctx, cipher_list.as_ptr())
|
ffi::SSL_CTX_set_cipher_list(self.ctx, cipher_list.as_ptr())
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
@ -531,19 +555,12 @@ impl SslContext {
|
||||||
pub fn set_npn_protocols(&mut self, protocols: &[&[u8]]) {
|
pub fn set_npn_protocols(&mut self, protocols: &[&[u8]]) {
|
||||||
// Firstly, convert the list of protocols to a byte-array that can be passed to OpenSSL
|
// Firstly, convert the list of protocols to a byte-array that can be passed to OpenSSL
|
||||||
// APIs -- a list of length-prefixed strings.
|
// APIs -- a list of length-prefixed strings.
|
||||||
let mut npn_protocols = Vec::new();
|
let protocols: Box<Vec<u8>> = Box::new(ssl_encode_byte_strings(protocols));
|
||||||
for protocol in protocols {
|
|
||||||
let len = protocol.len() as u8;
|
|
||||||
npn_protocols.push(len);
|
|
||||||
// If the length is greater than the max `u8`, this truncates the protocol name.
|
|
||||||
npn_protocols.extend(protocol[..len as usize].to_vec());
|
|
||||||
}
|
|
||||||
let protocols: Box<Vec<u8>> = Box::new(npn_protocols);
|
|
||||||
|
|
||||||
unsafe {
|
unsafe {
|
||||||
// Attach the protocol list to the OpenSSL context structure,
|
// Attach the protocol list to the OpenSSL context structure,
|
||||||
// so that we can refer to it within the callback.
|
// so that we can refer to it within the callback.
|
||||||
ffi::SSL_CTX_set_ex_data(self.ctx, get_npn_protos_idx(),
|
ffi::SSL_CTX_set_ex_data(self.ctx, *NPN_PROTOS_IDX,
|
||||||
mem::transmute(protocols));
|
mem::transmute(protocols));
|
||||||
// Now register the callback that performs the default protocol
|
// Now register the callback that performs the default protocol
|
||||||
// matching based on the client-supported list of protocols that
|
// matching based on the client-supported list of protocols that
|
||||||
|
|
@ -554,6 +571,35 @@ impl SslContext {
|
||||||
ffi::SSL_CTX_set_next_protos_advertised_cb(self.ctx, raw_next_protos_advertise_cb, ptr::null_mut());
|
ffi::SSL_CTX_set_next_protos_advertised_cb(self.ctx, raw_next_protos_advertise_cb, ptr::null_mut());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Set the protocols to be used during ALPN (application layer protocol negotiation).
|
||||||
|
/// If this is a server, these are the protocols we report to the client.
|
||||||
|
/// If this is a client, these are the protocols we try to match with those reported by the
|
||||||
|
/// server.
|
||||||
|
///
|
||||||
|
/// Note that ordering of the protocols controls the priority with which they are chosen.
|
||||||
|
///
|
||||||
|
/// This method needs the `alpn` feature.
|
||||||
|
#[cfg(feature = "alpn")]
|
||||||
|
pub fn set_alpn_protocols(&mut self, protocols: &[&[u8]]) {
|
||||||
|
let protocols: Box<Vec<u8>> = Box::new(ssl_encode_byte_strings(protocols));
|
||||||
|
unsafe {
|
||||||
|
// Set the context's internal protocol list for use if we are a server
|
||||||
|
ffi::SSL_CTX_set_alpn_protos(self.ctx, protocols.as_ptr(), protocols.len() as c_uint);
|
||||||
|
|
||||||
|
// Rather than use the argument to the callback to contain our data, store it in the
|
||||||
|
// ssl ctx's ex_data so that we can configure a function to free it later. In the
|
||||||
|
// future, it might make sense to pull this into our internal struct Ssl instead of
|
||||||
|
// leaning on openssl and using function pointers.
|
||||||
|
ffi::SSL_CTX_set_ex_data(self.ctx, *ALPN_PROTOS_IDX,
|
||||||
|
mem::transmute(protocols));
|
||||||
|
|
||||||
|
// Now register the callback that performs the default protocol
|
||||||
|
// matching based on the client-supported list of protocols that
|
||||||
|
// has been saved.
|
||||||
|
ffi::SSL_CTX_set_alpn_select_cb(self.ctx, raw_alpn_select_cb, ptr::null_mut());
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
#[allow(dead_code)]
|
#[allow(dead_code)]
|
||||||
|
|
@ -603,11 +649,6 @@ impl Ssl {
|
||||||
return Err(SslError::get());
|
return Err(SslError::get());
|
||||||
}
|
}
|
||||||
let ssl = Ssl { ssl: ssl };
|
let ssl = Ssl { ssl: ssl };
|
||||||
|
|
||||||
let rbio = try!(MemBio::new());
|
|
||||||
let wbio = try!(MemBio::new());
|
|
||||||
|
|
||||||
unsafe { ffi::SSL_set_bio(ssl.ssl, rbio.unwrap(), wbio.unwrap()) }
|
|
||||||
Ok(ssl)
|
Ok(ssl)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -655,16 +696,8 @@ impl Ssl {
|
||||||
|
|
||||||
/// Set the host name to be used with SNI (Server Name Indication).
|
/// Set the host name to be used with SNI (Server Name Indication).
|
||||||
pub fn set_hostname(&self, hostname: &str) -> Result<(), SslError> {
|
pub fn set_hostname(&self, hostname: &str) -> Result<(), SslError> {
|
||||||
let ret = unsafe {
|
let cstr = CString::new(hostname).unwrap();
|
||||||
// This is defined as a macro:
|
let ret = unsafe { ffi::SSL_set_tlsext_host_name(self.ssl, cstr.as_ptr()) };
|
||||||
// #define SSL_set_tlsext_host_name(s,name) \
|
|
||||||
// SSL_ctrl(s,SSL_CTRL_SET_TLSEXT_HOSTNAME,TLSEXT_NAMETYPE_host_name,(char *)name)
|
|
||||||
|
|
||||||
let hostname = CString::new(hostname.as_bytes()).unwrap();
|
|
||||||
ffi::SSL_ctrl(self.ssl, ffi::SSL_CTRL_SET_TLSEXT_HOSTNAME,
|
|
||||||
ffi::TLSEXT_NAMETYPE_host_name,
|
|
||||||
hostname.as_ptr() as *mut c_void)
|
|
||||||
};
|
|
||||||
|
|
||||||
// For this case, 0 indicates failure.
|
// For this case, 0 indicates failure.
|
||||||
if ret == 0 {
|
if ret == 0 {
|
||||||
|
|
@ -708,6 +741,29 @@ impl Ssl {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Returns the protocol selected by performing ALPN, if any.
|
||||||
|
///
|
||||||
|
/// The protocol's name is returned is an opaque sequence of bytes. It is up to the client
|
||||||
|
/// to interpret it.
|
||||||
|
///
|
||||||
|
/// This method needs the `alpn` feature.
|
||||||
|
#[cfg(feature = "alpn")]
|
||||||
|
pub fn get_selected_alpn_protocol(&self) -> Option<&[u8]> {
|
||||||
|
unsafe {
|
||||||
|
let mut data: *const c_uchar = ptr::null();
|
||||||
|
let mut len: c_uint = 0;
|
||||||
|
// Get the negotiated protocol from the SSL instance.
|
||||||
|
// `data` will point at a `c_uchar` array; `len` will contain the length of this array.
|
||||||
|
ffi::SSL_get0_alpn_selected(self.ssl, &mut data, &mut len);
|
||||||
|
|
||||||
|
if data.is_null() {
|
||||||
|
None
|
||||||
|
} else {
|
||||||
|
Some(slice::from_raw_parts(data, len as usize))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
/// pending() takes into account only bytes from the TLS/SSL record that is currently being processed (if any).
|
/// pending() takes into account only bytes from the TLS/SSL record that is currently being processed (if any).
|
||||||
pub fn pending(&self) -> usize {
|
pub fn pending(&self) -> usize {
|
||||||
unsafe {
|
unsafe {
|
||||||
|
|
@ -747,98 +803,63 @@ make_LibSslError! {
|
||||||
ErrorWantAccept = SSL_ERROR_WANT_ACCEPT
|
ErrorWantAccept = SSL_ERROR_WANT_ACCEPT
|
||||||
}
|
}
|
||||||
|
|
||||||
/// A stream wrapper which handles SSL encryption for an underlying stream.
|
struct IndirectStream<S> {
|
||||||
#[derive(Clone)]
|
|
||||||
pub struct SslStream<S> {
|
|
||||||
stream: S,
|
stream: S,
|
||||||
ssl: Arc<Ssl>,
|
ssl: Arc<Ssl>,
|
||||||
buf: Vec<u8>
|
// Max TLS record size is 16k
|
||||||
|
buf: Box<[u8; 16 * 1024]>,
|
||||||
}
|
}
|
||||||
|
|
||||||
impl SslStream<net::TcpStream> {
|
impl<S: Clone> Clone for IndirectStream<S> {
|
||||||
/// Create a new independently owned handle to the underlying socket.
|
fn clone(&self) -> IndirectStream<S> {
|
||||||
pub fn try_clone(&self) -> io::Result<SslStream<net::TcpStream>> {
|
IndirectStream {
|
||||||
Ok(SslStream {
|
stream: self.stream.clone(),
|
||||||
|
ssl: self.ssl.clone(),
|
||||||
|
buf: Box::new(*self.buf)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl IndirectStream<net::TcpStream> {
|
||||||
|
fn try_clone(&self) -> io::Result<IndirectStream<net::TcpStream>> {
|
||||||
|
Ok(IndirectStream {
|
||||||
stream: try!(self.stream.try_clone()),
|
stream: try!(self.stream.try_clone()),
|
||||||
ssl: self.ssl.clone(),
|
ssl: self.ssl.clone(),
|
||||||
buf: self.buf.clone(),
|
buf: Box::new(*self.buf)
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl<S> fmt::Debug for SslStream<S> where S: fmt::Debug {
|
impl<S: Read+Write> IndirectStream<S> {
|
||||||
fn fmt(&self, fmt: &mut fmt::Formatter) -> fmt::Result {
|
fn new_base<T: IntoSsl>(ssl: T, stream: S) -> Result<IndirectStream<S>, SslError> {
|
||||||
write!(fmt, "SslStream {{ stream: {:?}, ssl: {:?} }}", self.stream, self.ssl)
|
let ssl = try!(ssl.into_ssl());
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
impl<S: Read+Write> SslStream<S> {
|
let rbio = try!(MemBio::new());
|
||||||
fn new_base(ssl:Ssl, stream: S) -> SslStream<S> {
|
let wbio = try!(MemBio::new());
|
||||||
SslStream {
|
|
||||||
|
unsafe { ffi::SSL_set_bio(ssl.ssl, rbio.unwrap(), wbio.unwrap()) }
|
||||||
|
|
||||||
|
Ok(IndirectStream {
|
||||||
stream: stream,
|
stream: stream,
|
||||||
ssl: Arc::new(ssl),
|
ssl: Arc::new(ssl),
|
||||||
// Maximum TLS record size is 16k
|
buf: Box::new([0; 16 * 1024]),
|
||||||
// We're just using this as a buffer, so there's no reason to pay
|
})
|
||||||
// to memset it
|
|
||||||
buf: {
|
|
||||||
const CAP: usize = 16 * 1024;
|
|
||||||
let mut v = Vec::with_capacity(CAP);
|
|
||||||
unsafe { v.set_len(CAP); }
|
|
||||||
v
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn new_server_from(ssl: Ssl, stream: S) -> Result<SslStream<S>, SslError> {
|
fn connect<T: IntoSsl>(ssl: T, stream: S) -> Result<IndirectStream<S>, SslError> {
|
||||||
let mut ssl = SslStream::new_base(ssl, stream);
|
let mut ssl = try!(IndirectStream::new_base(ssl, stream));
|
||||||
ssl.in_retry_wrapper(|ssl| { ssl.accept() }).and(Ok(ssl))
|
try!(ssl.in_retry_wrapper(|ssl| ssl.connect()));
|
||||||
|
Ok(ssl)
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Attempts to create a new SSL stream from a given `Ssl` instance.
|
fn accept<T: IntoSsl>(ssl: T, stream: S) -> Result<IndirectStream<S>, SslError> {
|
||||||
pub fn new_from(ssl: Ssl, stream: S) -> Result<SslStream<S>, SslError> {
|
let mut ssl = try!(IndirectStream::new_base(ssl, stream));
|
||||||
let mut ssl = SslStream::new_base(ssl, stream);
|
try!(ssl.in_retry_wrapper(|ssl| ssl.accept()));
|
||||||
ssl.in_retry_wrapper(|ssl| { ssl.connect() }).and(Ok(ssl))
|
Ok(ssl)
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Creates a new SSL stream
|
fn in_retry_wrapper<F>(&mut self, mut blk: F) -> Result<c_int, SslError>
|
||||||
pub fn new(ctx: &SslContext, stream: S) -> Result<SslStream<S>, SslError> {
|
where F: FnMut(&Ssl) -> c_int {
|
||||||
let ssl = try!(Ssl::new(ctx));
|
|
||||||
SslStream::new_from(ssl, stream)
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Creates a new SSL server stream
|
|
||||||
pub fn new_server(ctx: &SslContext, stream: S) -> Result<SslStream<S>, SslError> {
|
|
||||||
let ssl = try!(Ssl::new(ctx));
|
|
||||||
SslStream::new_server_from(ssl, stream)
|
|
||||||
}
|
|
||||||
|
|
||||||
#[doc(hidden)]
|
|
||||||
pub fn get_inner(&mut self) -> &mut S {
|
|
||||||
self.get_mut()
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Returns a reference to the underlying stream.
|
|
||||||
pub fn get_ref(&self) -> &S {
|
|
||||||
&self.stream
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Return the certificate of the peer
|
|
||||||
pub fn get_peer_certificate(&self) -> Option<X509> {
|
|
||||||
self.ssl.get_peer_certificate()
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Returns a mutable reference to the underlying stream.
|
|
||||||
///
|
|
||||||
/// ## Warning
|
|
||||||
///
|
|
||||||
/// It is inadvisable to read from or write to the underlying stream as it
|
|
||||||
/// will most likely desynchronize the SSL session.
|
|
||||||
pub fn get_mut(&mut self) -> &mut S {
|
|
||||||
&mut self.stream
|
|
||||||
}
|
|
||||||
|
|
||||||
fn in_retry_wrapper<F>(&mut self, mut blk: F)
|
|
||||||
-> Result<c_int, SslError> where F: FnMut(&Ssl) -> c_int {
|
|
||||||
loop {
|
loop {
|
||||||
let ret = blk(&self.ssl);
|
let ret = blk(&self.ssl);
|
||||||
if ret > 0 {
|
if ret > 0 {
|
||||||
|
|
@ -868,12 +889,339 @@ impl<S: Read+Write> SslStream<S> {
|
||||||
fn write_through(&mut self) -> io::Result<()> {
|
fn write_through(&mut self) -> io::Result<()> {
|
||||||
io::copy(&mut *self.ssl.get_wbio(), &mut self.stream).map(|_| ())
|
io::copy(&mut *self.ssl.get_wbio(), &mut self.stream).map(|_| ())
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<S: Read+Write> Read for IndirectStream<S> {
|
||||||
|
fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
|
||||||
|
match self.in_retry_wrapper(|ssl| { ssl.read(buf) }) {
|
||||||
|
Ok(len) => Ok(len as usize),
|
||||||
|
Err(SslSessionClosed) => Ok(0),
|
||||||
|
Err(StreamError(e)) => Err(e),
|
||||||
|
Err(e @ OpenSslErrors(_)) => {
|
||||||
|
Err(io::Error::new(io::ErrorKind::Other, e))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<S: Read+Write> Write for IndirectStream<S> {
|
||||||
|
fn write(&mut self, buf: &[u8]) -> io::Result<usize> {
|
||||||
|
let count = match self.in_retry_wrapper(|ssl| ssl.write(buf)) {
|
||||||
|
Ok(len) => len as usize,
|
||||||
|
Err(SslSessionClosed) => 0,
|
||||||
|
Err(StreamError(e)) => return Err(e),
|
||||||
|
Err(e @ OpenSslErrors(_)) => return Err(io::Error::new(io::ErrorKind::Other, e)),
|
||||||
|
};
|
||||||
|
try!(self.write_through());
|
||||||
|
Ok(count)
|
||||||
|
}
|
||||||
|
|
||||||
|
fn flush(&mut self) -> io::Result<()> {
|
||||||
|
try!(self.write_through());
|
||||||
|
self.stream.flush()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Clone)]
|
||||||
|
struct DirectStream<S> {
|
||||||
|
stream: S,
|
||||||
|
ssl: Arc<Ssl>,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl DirectStream<net::TcpStream> {
|
||||||
|
fn try_clone(&self) -> io::Result<DirectStream<net::TcpStream>> {
|
||||||
|
Ok(DirectStream {
|
||||||
|
stream: try!(self.stream.try_clone()),
|
||||||
|
ssl: self.ssl.clone(),
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<S> DirectStream<S> {
|
||||||
|
fn new_base(ssl: Ssl, stream: S, sock: c_int) -> Result<DirectStream<S>, SslError> {
|
||||||
|
unsafe {
|
||||||
|
let bio = ffi::BIO_new_socket(sock, 0);
|
||||||
|
if bio == ptr::null_mut() {
|
||||||
|
return Err(SslError::get());
|
||||||
|
}
|
||||||
|
ffi::SSL_set_bio(ssl.ssl, bio, bio);
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(DirectStream {
|
||||||
|
stream: stream,
|
||||||
|
ssl: Arc::new(ssl),
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
fn connect(ssl: Ssl, stream: S, sock: c_int) -> Result<DirectStream<S>, SslError> {
|
||||||
|
let ssl = try!(DirectStream::new_base(ssl, stream, sock));
|
||||||
|
let ret = ssl.ssl.connect();
|
||||||
|
if ret > 0 {
|
||||||
|
Ok(ssl)
|
||||||
|
} else {
|
||||||
|
Err(ssl.make_error(ret))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn accept(ssl: Ssl, stream: S, sock: c_int) -> Result<DirectStream<S>, SslError> {
|
||||||
|
let ssl = try!(DirectStream::new_base(ssl, stream, sock));
|
||||||
|
let ret = ssl.ssl.accept();
|
||||||
|
if ret > 0 {
|
||||||
|
Ok(ssl)
|
||||||
|
} else {
|
||||||
|
Err(ssl.make_error(ret))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn make_error(&self, ret: c_int) -> SslError {
|
||||||
|
match self.ssl.get_error(ret) {
|
||||||
|
LibSslError::ErrorSsl => SslError::get(),
|
||||||
|
LibSslError::ErrorSyscall => {
|
||||||
|
let err = SslError::get();
|
||||||
|
let count = match err {
|
||||||
|
SslError::OpenSslErrors(ref v) => v.len(),
|
||||||
|
_ => unreachable!(),
|
||||||
|
};
|
||||||
|
if count == 0 {
|
||||||
|
if ret == 0 {
|
||||||
|
SslError::StreamError(io::Error::new(io::ErrorKind::ConnectionAborted,
|
||||||
|
"unexpected EOF observed"))
|
||||||
|
} else {
|
||||||
|
SslError::StreamError(io::Error::last_os_error())
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
err => panic!("unexpected error {:?} with ret {}", err, ret),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<S> Read for DirectStream<S> {
|
||||||
|
fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
|
||||||
|
let ret = self.ssl.read(buf);
|
||||||
|
if ret >= 0 {
|
||||||
|
return Ok(ret as usize);
|
||||||
|
}
|
||||||
|
|
||||||
|
match self.make_error(ret) {
|
||||||
|
SslError::StreamError(e) => Err(e),
|
||||||
|
e => Err(io::Error::new(io::ErrorKind::Other, e)),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<S: Write> Write for DirectStream<S> {
|
||||||
|
fn write(&mut self, buf: &[u8]) -> io::Result<usize> {
|
||||||
|
let ret = self.ssl.write(buf);
|
||||||
|
if ret > 0 {
|
||||||
|
return Ok(ret as usize);
|
||||||
|
}
|
||||||
|
|
||||||
|
match self.make_error(ret) {
|
||||||
|
SslError::StreamError(e) => Err(e),
|
||||||
|
e => Err(io::Error::new(io::ErrorKind::Other, e)),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn flush(&mut self) -> io::Result<()> {
|
||||||
|
self.stream.flush()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#[derive(Clone)]
|
||||||
|
enum StreamKind<S> {
|
||||||
|
Indirect(IndirectStream<S>),
|
||||||
|
Direct(DirectStream<S>),
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<S> StreamKind<S> {
|
||||||
|
fn stream(&self) -> &S {
|
||||||
|
match *self {
|
||||||
|
StreamKind::Indirect(ref s) => &s.stream,
|
||||||
|
StreamKind::Direct(ref s) => &s.stream,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn mut_stream(&mut self) -> &mut S {
|
||||||
|
match *self {
|
||||||
|
StreamKind::Indirect(ref mut s) => &mut s.stream,
|
||||||
|
StreamKind::Direct(ref mut s) => &mut s.stream,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fn ssl(&self) -> &Ssl {
|
||||||
|
match *self {
|
||||||
|
StreamKind::Indirect(ref s) => &s.ssl,
|
||||||
|
StreamKind::Direct(ref s) => &s.ssl,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/// A stream wrapper which handles SSL encryption for an underlying stream.
|
||||||
|
#[derive(Clone)]
|
||||||
|
pub struct SslStream<S> {
|
||||||
|
kind: StreamKind<S>,
|
||||||
|
}
|
||||||
|
|
||||||
|
impl SslStream<net::TcpStream> {
|
||||||
|
/// Create a new independently owned handle to the underlying socket.
|
||||||
|
pub fn try_clone(&self) -> io::Result<SslStream<net::TcpStream>> {
|
||||||
|
let kind = match self.kind {
|
||||||
|
StreamKind::Indirect(ref s) => StreamKind::Indirect(try!(s.try_clone())),
|
||||||
|
StreamKind::Direct(ref s) => StreamKind::Direct(try!(s.try_clone()))
|
||||||
|
};
|
||||||
|
Ok(SslStream {
|
||||||
|
kind: kind
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<S> fmt::Debug for SslStream<S> where S: fmt::Debug {
|
||||||
|
fn fmt(&self, fmt: &mut fmt::Formatter) -> fmt::Result {
|
||||||
|
write!(fmt, "SslStream {{ stream: {:?}, ssl: {:?} }}", self.kind.stream(), self.kind.ssl())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#[cfg(unix)]
|
||||||
|
impl<S: Read+Write+::std::os::unix::io::AsRawFd> SslStream<S> {
|
||||||
|
/// Creates an SSL/TLS client operating over the provided stream.
|
||||||
|
///
|
||||||
|
/// Streams passed to this method must implement `AsRawFd` on Unixy
|
||||||
|
/// platforms and `AsRawSocket` on Windows. Use `connect_generic` for
|
||||||
|
/// streams that do not.
|
||||||
|
pub fn connect<T: IntoSsl>(ssl: T, stream: S) -> Result<SslStream<S>, SslError> {
|
||||||
|
let ssl = try!(ssl.into_ssl());
|
||||||
|
let fd = stream.as_raw_fd() as c_int;
|
||||||
|
let stream = try!(DirectStream::connect(ssl, stream, fd));
|
||||||
|
Ok(SslStream {
|
||||||
|
kind: StreamKind::Direct(stream)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Creates an SSL/TLS server operating over the provided stream.
|
||||||
|
///
|
||||||
|
/// Streams passed to this method must implement `AsRawFd` on Unixy
|
||||||
|
/// platforms and `AsRawSocket` on Windows. Use `accept_generic` for
|
||||||
|
/// streams that do not.
|
||||||
|
pub fn accept<T: IntoSsl>(ssl: T, stream: S) -> Result<SslStream<S>, SslError> {
|
||||||
|
let ssl = try!(ssl.into_ssl());
|
||||||
|
let fd = stream.as_raw_fd() as c_int;
|
||||||
|
let stream = try!(DirectStream::accept(ssl, stream, fd));
|
||||||
|
Ok(SslStream {
|
||||||
|
kind: StreamKind::Direct(stream)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#[cfg(windows)]
|
||||||
|
impl<S: Read+Write+::std::os::windows::io::AsRawSocket> SslStream<S> {
|
||||||
|
/// Creates an SSL/TLS client operating over the provided stream.
|
||||||
|
///
|
||||||
|
/// Streams passed to this method must implement `AsRawFd` on Unixy
|
||||||
|
/// platforms and `AsRawSocket` on Windows. Use `connect_generic` for
|
||||||
|
/// streams that do not.
|
||||||
|
pub fn connect<T: IntoSsl>(ssl: T, stream: S) -> Result<SslStream<S>, SslError> {
|
||||||
|
let ssl = try!(ssl.into_ssl());
|
||||||
|
let fd = stream.as_raw_socket() as c_int;
|
||||||
|
let stream = try!(DirectStream::connect(ssl, stream, fd));
|
||||||
|
Ok(SslStream {
|
||||||
|
kind: StreamKind::Direct(stream)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Creates an SSL/TLS server operating over the provided stream.
|
||||||
|
///
|
||||||
|
/// Streams passed to this method must implement `AsRawFd` on Unixy
|
||||||
|
/// platforms and `AsRawSocket` on Windows. Use `accept_generic` for
|
||||||
|
/// streams that do not.
|
||||||
|
pub fn accept<T: IntoSsl>(ssl: T, stream: S) -> Result<SslStream<S>, SslError> {
|
||||||
|
let ssl = try!(ssl.into_ssl());
|
||||||
|
let fd = stream.as_raw_socket() as c_int;
|
||||||
|
let stream = try!(DirectStream::accept(ssl, stream, fd));
|
||||||
|
Ok(SslStream {
|
||||||
|
kind: StreamKind::Direct(stream)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<S: Read+Write> SslStream<S> {
|
||||||
|
/// Creates an SSL/TLS client operating over the provided stream.
|
||||||
|
///
|
||||||
|
/// `SslStream`s returned by this method will be less efficient than ones
|
||||||
|
/// returned by `connect`, so this method should only be used for streams
|
||||||
|
/// that do not implement `AsRawFd` and `AsRawSocket`.
|
||||||
|
pub fn connect_generic<T: IntoSsl>(ssl: T, stream: S) -> Result<SslStream<S>, SslError> {
|
||||||
|
let stream = try!(IndirectStream::connect(ssl, stream));
|
||||||
|
Ok(SslStream {
|
||||||
|
kind: StreamKind::Indirect(stream)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Creates an SSL/TLS server operating over the provided stream.
|
||||||
|
///
|
||||||
|
/// `SslStream`s returned by this method will be less efficient than ones
|
||||||
|
/// returned by `accept`, so this method should only be used for streams
|
||||||
|
/// that do not implement `AsRawFd` and `AsRawSocket`.
|
||||||
|
pub fn accept_generic<T: IntoSsl>(ssl: T, stream: S) -> Result<SslStream<S>, SslError> {
|
||||||
|
let stream = try!(IndirectStream::accept(ssl, stream));
|
||||||
|
Ok(SslStream {
|
||||||
|
kind: StreamKind::Indirect(stream)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
/// # Deprecated
|
||||||
|
pub fn new_server(ssl: &SslContext, stream: S) -> Result<SslStream<S>, SslError> {
|
||||||
|
SslStream::accept_generic(ssl, stream)
|
||||||
|
}
|
||||||
|
|
||||||
|
/// # Deprecated
|
||||||
|
pub fn new_server_from(ssl: Ssl, stream: S) -> Result<SslStream<S>, SslError> {
|
||||||
|
SslStream::accept_generic(ssl, stream)
|
||||||
|
}
|
||||||
|
|
||||||
|
/// # Deprecated
|
||||||
|
pub fn new_from(ssl: Ssl, stream: S) -> Result<SslStream<S>, SslError> {
|
||||||
|
SslStream::connect_generic(ssl, stream)
|
||||||
|
}
|
||||||
|
|
||||||
|
/// # Deprecated
|
||||||
|
pub fn new(ctx: &SslContext, stream: S) -> Result<SslStream<S>, SslError> {
|
||||||
|
SslStream::connect_generic(ctx, stream)
|
||||||
|
}
|
||||||
|
|
||||||
|
/// # Deprecated
|
||||||
|
#[doc(hidden)]
|
||||||
|
pub fn get_inner(&mut self) -> &mut S {
|
||||||
|
self.get_mut()
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Returns a reference to the underlying stream.
|
||||||
|
pub fn get_ref(&self) -> &S {
|
||||||
|
self.kind.stream()
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Return the certificate of the peer
|
||||||
|
pub fn get_peer_certificate(&self) -> Option<X509> {
|
||||||
|
self.kind.ssl().get_peer_certificate()
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Returns a mutable reference to the underlying stream.
|
||||||
|
///
|
||||||
|
/// ## Warning
|
||||||
|
///
|
||||||
|
/// It is inadvisable to read from or write to the underlying stream as it
|
||||||
|
/// will most likely corrupt the SSL session.
|
||||||
|
pub fn get_mut(&mut self) -> &mut S {
|
||||||
|
self.kind.mut_stream()
|
||||||
|
}
|
||||||
|
|
||||||
/// Get the compression currently in use. The result will be
|
/// Get the compression currently in use. The result will be
|
||||||
/// either None, indicating no compression is in use, or a string
|
/// either None, indicating no compression is in use, or a string
|
||||||
/// with the compression name.
|
/// with the compression name.
|
||||||
pub fn get_compression(&self) -> Option<String> {
|
pub fn get_compression(&self) -> Option<String> {
|
||||||
let ptr = unsafe { ffi::SSL_get_current_compression(self.ssl.ssl) };
|
let ptr = unsafe { ffi::SSL_get_current_compression(self.kind.ssl().ssl) };
|
||||||
if ptr == ptr::null() {
|
if ptr == ptr::null() {
|
||||||
return None;
|
return None;
|
||||||
}
|
}
|
||||||
|
|
@ -894,43 +1242,64 @@ impl<S: Read+Write> SslStream<S> {
|
||||||
/// This method needs the `npn` feature.
|
/// This method needs the `npn` feature.
|
||||||
#[cfg(feature = "npn")]
|
#[cfg(feature = "npn")]
|
||||||
pub fn get_selected_npn_protocol(&self) -> Option<&[u8]> {
|
pub fn get_selected_npn_protocol(&self) -> Option<&[u8]> {
|
||||||
self.ssl.get_selected_npn_protocol()
|
self.kind.ssl().get_selected_npn_protocol()
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Returns the protocol selected by performing ALPN, if any.
|
||||||
|
///
|
||||||
|
/// The protocol's name is returned is an opaque sequence of bytes. It is up to the client
|
||||||
|
/// to interpret it.
|
||||||
|
///
|
||||||
|
/// This method needs the `alpn` feature.
|
||||||
|
#[cfg(feature = "alpn")]
|
||||||
|
pub fn get_selected_alpn_protocol(&self) -> Option<&[u8]> {
|
||||||
|
self.kind.ssl().get_selected_alpn_protocol()
|
||||||
}
|
}
|
||||||
|
|
||||||
/// pending() takes into account only bytes from the TLS/SSL record that is currently being processed (if any).
|
/// pending() takes into account only bytes from the TLS/SSL record that is currently being processed (if any).
|
||||||
pub fn pending(&self) -> usize {
|
pub fn pending(&self) -> usize {
|
||||||
self.ssl.pending()
|
self.kind.ssl().pending()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl<S: Read+Write> Read for SslStream<S> {
|
impl<S: Read+Write> Read for SslStream<S> {
|
||||||
fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
|
fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
|
||||||
match self.in_retry_wrapper(|ssl| { ssl.read(buf) }) {
|
match self.kind {
|
||||||
Ok(len) => Ok(len as usize),
|
StreamKind::Indirect(ref mut s) => s.read(buf),
|
||||||
Err(SslSessionClosed) => Ok(0),
|
StreamKind::Direct(ref mut s) => s.read(buf),
|
||||||
Err(StreamError(e)) => Err(e),
|
|
||||||
Err(e @ OpenSslErrors(_)) => {
|
|
||||||
Err(io::Error::new(io::ErrorKind::Other, e))
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
impl<S: Read+Write> Write for SslStream<S> {
|
impl<S: Read+Write> Write for SslStream<S> {
|
||||||
fn write(&mut self, buf: &[u8]) -> io::Result<usize> {
|
fn write(&mut self, buf: &[u8]) -> io::Result<usize> {
|
||||||
let count = match self.in_retry_wrapper(|ssl| ssl.write(buf)) {
|
match self.kind {
|
||||||
Ok(len) => len as usize,
|
StreamKind::Indirect(ref mut s) => s.write(buf),
|
||||||
Err(SslSessionClosed) => 0,
|
StreamKind::Direct(ref mut s) => s.write(buf),
|
||||||
Err(StreamError(e)) => return Err(e),
|
}
|
||||||
Err(e @ OpenSslErrors(_)) => return Err(io::Error::new(io::ErrorKind::Other, e)),
|
|
||||||
};
|
|
||||||
try!(self.write_through());
|
|
||||||
Ok(count)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
fn flush(&mut self) -> io::Result<()> {
|
fn flush(&mut self) -> io::Result<()> {
|
||||||
try!(self.write_through());
|
match self.kind {
|
||||||
self.stream.flush()
|
StreamKind::Indirect(ref mut s) => s.flush(),
|
||||||
|
StreamKind::Direct(ref mut s) => s.flush(),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
pub trait IntoSsl {
|
||||||
|
fn into_ssl(self) -> Result<Ssl, SslError>;
|
||||||
|
}
|
||||||
|
|
||||||
|
impl IntoSsl for Ssl {
|
||||||
|
fn into_ssl(self) -> Result<Ssl, SslError> {
|
||||||
|
Ok(self)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
impl<'a> IntoSsl for &'a SslContext {
|
||||||
|
fn into_ssl(self) -> Result<Ssl, SslError> {
|
||||||
|
Ssl::new(self)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -83,14 +83,14 @@ run_test!(new_ctx, |method, _| {
|
||||||
});
|
});
|
||||||
|
|
||||||
run_test!(new_sslstream, |method, stream| {
|
run_test!(new_sslstream, |method, stream| {
|
||||||
SslStream::new(&SslContext::new(method).unwrap(), stream).unwrap();
|
SslStream::connect_generic(&SslContext::new(method).unwrap(), stream).unwrap();
|
||||||
});
|
});
|
||||||
|
|
||||||
run_test!(verify_untrusted, |method, stream| {
|
run_test!(verify_untrusted, |method, stream| {
|
||||||
let mut ctx = SslContext::new(method).unwrap();
|
let mut ctx = SslContext::new(method).unwrap();
|
||||||
ctx.set_verify(SSL_VERIFY_PEER, None);
|
ctx.set_verify(SSL_VERIFY_PEER, None);
|
||||||
|
|
||||||
match SslStream::new(&ctx, stream) {
|
match SslStream::connect_generic(&ctx, stream) {
|
||||||
Ok(_) => panic!("expected failure"),
|
Ok(_) => panic!("expected failure"),
|
||||||
Err(err) => println!("error {:?}", err)
|
Err(err) => println!("error {:?}", err)
|
||||||
}
|
}
|
||||||
|
|
@ -104,7 +104,7 @@ run_test!(verify_trusted, |method, stream| {
|
||||||
Ok(_) => {}
|
Ok(_) => {}
|
||||||
Err(err) => panic!("Unexpected error {:?}", err)
|
Err(err) => panic!("Unexpected error {:?}", err)
|
||||||
}
|
}
|
||||||
match SslStream::new(&ctx, stream) {
|
match SslStream::connect_generic(&ctx, stream) {
|
||||||
Ok(_) => (),
|
Ok(_) => (),
|
||||||
Err(err) => panic!("Expected success, got {:?}", err)
|
Err(err) => panic!("Expected success, got {:?}", err)
|
||||||
}
|
}
|
||||||
|
|
@ -118,7 +118,7 @@ run_test!(verify_untrusted_callback_override_ok, |method, stream| {
|
||||||
let mut ctx = SslContext::new(method).unwrap();
|
let mut ctx = SslContext::new(method).unwrap();
|
||||||
ctx.set_verify(SSL_VERIFY_PEER, Some(callback as VerifyCallback));
|
ctx.set_verify(SSL_VERIFY_PEER, Some(callback as VerifyCallback));
|
||||||
|
|
||||||
match SslStream::new(&ctx, stream) {
|
match SslStream::connect_generic(&ctx, stream) {
|
||||||
Ok(_) => (),
|
Ok(_) => (),
|
||||||
Err(err) => panic!("Expected success, got {:?}", err)
|
Err(err) => panic!("Expected success, got {:?}", err)
|
||||||
}
|
}
|
||||||
|
|
@ -132,7 +132,7 @@ run_test!(verify_untrusted_callback_override_bad, |method, stream| {
|
||||||
let mut ctx = SslContext::new(method).unwrap();
|
let mut ctx = SslContext::new(method).unwrap();
|
||||||
ctx.set_verify(SSL_VERIFY_PEER, Some(callback as VerifyCallback));
|
ctx.set_verify(SSL_VERIFY_PEER, Some(callback as VerifyCallback));
|
||||||
|
|
||||||
assert!(SslStream::new(&ctx, stream).is_err());
|
assert!(SslStream::connect_generic(&ctx, stream).is_err());
|
||||||
});
|
});
|
||||||
|
|
||||||
run_test!(verify_trusted_callback_override_ok, |method, stream| {
|
run_test!(verify_trusted_callback_override_ok, |method, stream| {
|
||||||
|
|
@ -147,7 +147,7 @@ run_test!(verify_trusted_callback_override_ok, |method, stream| {
|
||||||
Ok(_) => {}
|
Ok(_) => {}
|
||||||
Err(err) => panic!("Unexpected error {:?}", err)
|
Err(err) => panic!("Unexpected error {:?}", err)
|
||||||
}
|
}
|
||||||
match SslStream::new(&ctx, stream) {
|
match SslStream::connect_generic(&ctx, stream) {
|
||||||
Ok(_) => (),
|
Ok(_) => (),
|
||||||
Err(err) => panic!("Expected success, got {:?}", err)
|
Err(err) => panic!("Expected success, got {:?}", err)
|
||||||
}
|
}
|
||||||
|
|
@ -165,7 +165,7 @@ run_test!(verify_trusted_callback_override_bad, |method, stream| {
|
||||||
Ok(_) => {}
|
Ok(_) => {}
|
||||||
Err(err) => panic!("Unexpected error {:?}", err)
|
Err(err) => panic!("Unexpected error {:?}", err)
|
||||||
}
|
}
|
||||||
assert!(SslStream::new(&ctx, stream).is_err());
|
assert!(SslStream::connect_generic(&ctx, stream).is_err());
|
||||||
});
|
});
|
||||||
|
|
||||||
run_test!(verify_callback_load_certs, |method, stream| {
|
run_test!(verify_callback_load_certs, |method, stream| {
|
||||||
|
|
@ -177,7 +177,7 @@ run_test!(verify_callback_load_certs, |method, stream| {
|
||||||
let mut ctx = SslContext::new(method).unwrap();
|
let mut ctx = SslContext::new(method).unwrap();
|
||||||
ctx.set_verify(SSL_VERIFY_PEER, Some(callback as VerifyCallback));
|
ctx.set_verify(SSL_VERIFY_PEER, Some(callback as VerifyCallback));
|
||||||
|
|
||||||
assert!(SslStream::new(&ctx, stream).is_ok());
|
assert!(SslStream::connect_generic(&ctx, stream).is_ok());
|
||||||
});
|
});
|
||||||
|
|
||||||
run_test!(verify_trusted_get_error_ok, |method, stream| {
|
run_test!(verify_trusted_get_error_ok, |method, stream| {
|
||||||
|
|
@ -193,7 +193,7 @@ run_test!(verify_trusted_get_error_ok, |method, stream| {
|
||||||
Ok(_) => {}
|
Ok(_) => {}
|
||||||
Err(err) => panic!("Unexpected error {:?}", err)
|
Err(err) => panic!("Unexpected error {:?}", err)
|
||||||
}
|
}
|
||||||
assert!(SslStream::new(&ctx, stream).is_ok());
|
assert!(SslStream::connect_generic(&ctx, stream).is_ok());
|
||||||
});
|
});
|
||||||
|
|
||||||
run_test!(verify_trusted_get_error_err, |method, stream| {
|
run_test!(verify_trusted_get_error_err, |method, stream| {
|
||||||
|
|
@ -205,7 +205,7 @@ run_test!(verify_trusted_get_error_err, |method, stream| {
|
||||||
let mut ctx = SslContext::new(method).unwrap();
|
let mut ctx = SslContext::new(method).unwrap();
|
||||||
ctx.set_verify(SSL_VERIFY_PEER, Some(callback as VerifyCallback));
|
ctx.set_verify(SSL_VERIFY_PEER, Some(callback as VerifyCallback));
|
||||||
|
|
||||||
assert!(SslStream::new(&ctx, stream).is_err());
|
assert!(SslStream::connect_generic(&ctx, stream).is_err());
|
||||||
});
|
});
|
||||||
|
|
||||||
run_test!(verify_callback_data, |method, stream| {
|
run_test!(verify_callback_data, |method, stream| {
|
||||||
|
|
@ -230,7 +230,7 @@ run_test!(verify_callback_data, |method, stream| {
|
||||||
ctx.set_verify_with_data(SSL_VERIFY_PEER, callback, node_id);
|
ctx.set_verify_with_data(SSL_VERIFY_PEER, callback, node_id);
|
||||||
ctx.set_verify_depth(1);
|
ctx.set_verify_depth(1);
|
||||||
|
|
||||||
match SslStream::new(&ctx, stream) {
|
match SslStream::connect_generic(&ctx, stream) {
|
||||||
Ok(_) => (),
|
Ok(_) => (),
|
||||||
Err(err) => panic!("Expected success, got {:?}", err)
|
Err(err) => panic!("Expected success, got {:?}", err)
|
||||||
}
|
}
|
||||||
|
|
@ -245,7 +245,7 @@ fn test_write_hits_stream() {
|
||||||
let guard = thread::spawn(move || {
|
let guard = thread::spawn(move || {
|
||||||
let ctx = SslContext::new(Sslv23).unwrap();
|
let ctx = SslContext::new(Sslv23).unwrap();
|
||||||
let stream = TcpStream::connect(addr).unwrap();
|
let stream = TcpStream::connect(addr).unwrap();
|
||||||
let mut stream = SslStream::new(&ctx, stream).unwrap();
|
let mut stream = SslStream::connect_generic(&ctx, stream).unwrap();
|
||||||
|
|
||||||
stream.write_all(b"hello").unwrap();
|
stream.write_all(b"hello").unwrap();
|
||||||
stream
|
stream
|
||||||
|
|
@ -256,7 +256,7 @@ fn test_write_hits_stream() {
|
||||||
ctx.set_certificate_file(&Path::new("test/cert.pem"), X509FileType::PEM).unwrap();
|
ctx.set_certificate_file(&Path::new("test/cert.pem"), X509FileType::PEM).unwrap();
|
||||||
ctx.set_private_key_file(&Path::new("test/key.pem"), X509FileType::PEM).unwrap();
|
ctx.set_private_key_file(&Path::new("test/key.pem"), X509FileType::PEM).unwrap();
|
||||||
let stream = listener.accept().unwrap().0;
|
let stream = listener.accept().unwrap().0;
|
||||||
let mut stream = SslStream::new_server(&ctx, stream).unwrap();
|
let mut stream = SslStream::accept(&ctx, stream).unwrap();
|
||||||
|
|
||||||
let mut buf = [0; 5];
|
let mut buf = [0; 5];
|
||||||
assert_eq!(5, stream.read(&mut buf).unwrap());
|
assert_eq!(5, stream.read(&mut buf).unwrap());
|
||||||
|
|
@ -310,7 +310,17 @@ run_test!(clear_ctx_options, |method, _| {
|
||||||
#[test]
|
#[test]
|
||||||
fn test_write() {
|
fn test_write() {
|
||||||
let stream = TcpStream::connect("127.0.0.1:15418").unwrap();
|
let stream = TcpStream::connect("127.0.0.1:15418").unwrap();
|
||||||
let mut stream = SslStream::new(&SslContext::new(Sslv23).unwrap(), stream).unwrap();
|
let mut stream = SslStream::connect_generic(&SslContext::new(Sslv23).unwrap(), stream).unwrap();
|
||||||
|
stream.write_all("hello".as_bytes()).unwrap();
|
||||||
|
stream.flush().unwrap();
|
||||||
|
stream.write_all(" there".as_bytes()).unwrap();
|
||||||
|
stream.flush().unwrap();
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn test_write_direct() {
|
||||||
|
let stream = TcpStream::connect("127.0.0.1:15418").unwrap();
|
||||||
|
let mut stream = SslStream::connect(&SslContext::new(Sslv23).unwrap(), stream).unwrap();
|
||||||
stream.write_all("hello".as_bytes()).unwrap();
|
stream.write_all("hello".as_bytes()).unwrap();
|
||||||
stream.flush().unwrap();
|
stream.flush().unwrap();
|
||||||
stream.write_all(" there".as_bytes()).unwrap();
|
stream.write_all(" there".as_bytes()).unwrap();
|
||||||
|
|
@ -318,8 +328,7 @@ fn test_write() {
|
||||||
}
|
}
|
||||||
|
|
||||||
run_test!(get_peer_certificate, |method, stream| {
|
run_test!(get_peer_certificate, |method, stream| {
|
||||||
//let stream = TcpStream::connect("127.0.0.1:15418").unwrap();
|
let stream = SslStream::connect_generic(&SslContext::new(method).unwrap(), stream).unwrap();
|
||||||
let stream = SslStream::new(&SslContext::new(method).unwrap(), stream).unwrap();
|
|
||||||
let cert = stream.get_peer_certificate().unwrap();
|
let cert = stream.get_peer_certificate().unwrap();
|
||||||
let fingerprint = cert.fingerprint(SHA256).unwrap();
|
let fingerprint = cert.fingerprint(SHA256).unwrap();
|
||||||
let node_hash_str = "db400bb62f1b1f29c3b8f323b8f7d9dea724fdcd67104ef549c772ae3749655b";
|
let node_hash_str = "db400bb62f1b1f29c3b8f323b8f7d9dea724fdcd67104ef549c772ae3749655b";
|
||||||
|
|
@ -333,7 +342,7 @@ fn test_write_dtlsv1() {
|
||||||
let sock = UdpSocket::bind("127.0.0.1:0").unwrap();
|
let sock = UdpSocket::bind("127.0.0.1:0").unwrap();
|
||||||
let stream = sock.connect("127.0.0.1:15410").unwrap();
|
let stream = sock.connect("127.0.0.1:15410").unwrap();
|
||||||
|
|
||||||
let mut stream = SslStream::new(&SslContext::new(Dtlsv1).unwrap(), stream).unwrap();
|
let mut stream = SslStream::connect_generic(&SslContext::new(Dtlsv1).unwrap(), stream).unwrap();
|
||||||
stream.write_all("hello".as_bytes()).unwrap();
|
stream.write_all("hello".as_bytes()).unwrap();
|
||||||
stream.flush().unwrap();
|
stream.flush().unwrap();
|
||||||
stream.write_all(" there".as_bytes()).unwrap();
|
stream.write_all(" there".as_bytes()).unwrap();
|
||||||
|
|
@ -343,17 +352,25 @@ fn test_write_dtlsv1() {
|
||||||
#[test]
|
#[test]
|
||||||
fn test_read() {
|
fn test_read() {
|
||||||
let tcp = TcpStream::connect("127.0.0.1:15418").unwrap();
|
let tcp = TcpStream::connect("127.0.0.1:15418").unwrap();
|
||||||
let mut stream = SslStream::new(&SslContext::new(Sslv23).unwrap(), tcp).unwrap();
|
let mut stream = SslStream::connect_generic(&SslContext::new(Sslv23).unwrap(), tcp).unwrap();
|
||||||
stream.write_all("GET /\r\n\r\n".as_bytes()).unwrap();
|
stream.write_all("GET /\r\n\r\n".as_bytes()).unwrap();
|
||||||
stream.flush().unwrap();
|
stream.flush().unwrap();
|
||||||
io::copy(&mut stream, &mut io::sink()).ok().expect("read error");
|
io::copy(&mut stream, &mut io::sink()).ok().expect("read error");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn test_read_direct() {
|
||||||
|
let tcp = TcpStream::connect("127.0.0.1:15418").unwrap();
|
||||||
|
let mut stream = SslStream::connect(&SslContext::new(Sslv23).unwrap(), tcp).unwrap();
|
||||||
|
stream.write_all("GET /\r\n\r\n".as_bytes()).unwrap();
|
||||||
|
stream.flush().unwrap();
|
||||||
|
io::copy(&mut stream, &mut io::sink()).ok().expect("read error");
|
||||||
|
}
|
||||||
|
|
||||||
#[test]
|
#[test]
|
||||||
fn test_pending() {
|
fn test_pending() {
|
||||||
let tcp = TcpStream::connect("127.0.0.1:15418").unwrap();
|
let tcp = TcpStream::connect("127.0.0.1:15418").unwrap();
|
||||||
let mut stream = SslStream::new(&SslContext::new(Sslv23).unwrap(), tcp).unwrap();
|
let mut stream = SslStream::connect_generic(&SslContext::new(Sslv23).unwrap(), tcp).unwrap();
|
||||||
stream.write_all("GET /\r\n\r\n".as_bytes()).unwrap();
|
stream.write_all("GET /\r\n\r\n".as_bytes()).unwrap();
|
||||||
stream.flush().unwrap();
|
stream.flush().unwrap();
|
||||||
|
|
||||||
|
|
@ -376,12 +393,12 @@ fn test_pending() {
|
||||||
/// Tests that connecting with the client using NPN, but the server not does not
|
/// Tests that connecting with the client using NPN, but the server not does not
|
||||||
/// break the existing connection behavior.
|
/// break the existing connection behavior.
|
||||||
#[test]
|
#[test]
|
||||||
#[cfg(feature = "npn")]
|
#[cfg(feature = "alpn")]
|
||||||
fn test_connect_with_unilateral_npn() {
|
fn test_connect_with_unilateral_alpn() {
|
||||||
let stream = TcpStream::connect("127.0.0.1:15418").unwrap();
|
let stream = TcpStream::connect("127.0.0.1:15418").unwrap();
|
||||||
let mut ctx = SslContext::new(Sslv23).unwrap();
|
let mut ctx = SslContext::new(Sslv23).unwrap();
|
||||||
ctx.set_verify(SSL_VERIFY_PEER, None);
|
ctx.set_verify(SSL_VERIFY_PEER, None);
|
||||||
ctx.set_npn_protocols(&[b"http/1.1", b"spdy/3.1"]);
|
ctx.set_alpn_protocols(&[b"http/1.1", b"spdy/3.1"]);
|
||||||
match ctx.set_CA_file(&Path::new("test/cert.pem")) {
|
match ctx.set_CA_file(&Path::new("test/cert.pem")) {
|
||||||
Ok(_) => {}
|
Ok(_) => {}
|
||||||
Err(err) => panic!("Unexpected error {:?}", err)
|
Err(err) => panic!("Unexpected error {:?}", err)
|
||||||
|
|
@ -392,9 +409,55 @@ fn test_connect_with_unilateral_npn() {
|
||||||
};
|
};
|
||||||
// Since the socket to which we connected is not configured to use NPN,
|
// Since the socket to which we connected is not configured to use NPN,
|
||||||
// there should be no selected protocol...
|
// there should be no selected protocol...
|
||||||
|
assert!(stream.get_selected_alpn_protocol().is_none());
|
||||||
|
}
|
||||||
|
|
||||||
|
/// Tests that connecting with the client using NPN, but the server not does not
|
||||||
|
/// break the existing connection behavior.
|
||||||
|
#[test]
|
||||||
|
#[cfg(feature = "npn")]
|
||||||
|
fn test_connect_with_unilateral_npn() {
|
||||||
|
let stream = TcpStream::connect("127.0.0.1:15418").unwrap();
|
||||||
|
let mut ctx = SslContext::new(Sslv23).unwrap();
|
||||||
|
ctx.set_verify(SSL_VERIFY_PEER, None);
|
||||||
|
ctx.set_npn_protocols(&[b"http/1.1", b"spdy/3.1"]);
|
||||||
|
match ctx.set_CA_file(&Path::new("test/cert.pem")) {
|
||||||
|
Ok(_) => {}
|
||||||
|
Err(err) => panic!("Unexpected error {:?}", err)
|
||||||
|
}
|
||||||
|
let stream = match SslStream::connect_generic(&ctx, stream) {
|
||||||
|
Ok(stream) => stream,
|
||||||
|
Err(err) => panic!("Expected success, got {:?}", err)
|
||||||
|
};
|
||||||
|
// Since the socket to which we connected is not configured to use NPN,
|
||||||
|
// there should be no selected protocol...
|
||||||
assert!(stream.get_selected_npn_protocol().is_none());
|
assert!(stream.get_selected_npn_protocol().is_none());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Tests that when both the client as well as the server use ALPN and their
|
||||||
|
/// lists of supported protocols have an overlap, the correct protocol is chosen.
|
||||||
|
#[test]
|
||||||
|
#[cfg(feature = "alpn")]
|
||||||
|
fn test_connect_with_alpn_successful_multiple_matching() {
|
||||||
|
// A different port than the other tests: an `openssl` process that has
|
||||||
|
// NPN enabled.
|
||||||
|
let stream = TcpStream::connect("127.0.0.1:15419").unwrap();
|
||||||
|
let mut ctx = SslContext::new(Sslv23).unwrap();
|
||||||
|
ctx.set_verify(SSL_VERIFY_PEER, None);
|
||||||
|
ctx.set_alpn_protocols(&[b"spdy/3.1", b"http/1.1"]);
|
||||||
|
match ctx.set_CA_file(&Path::new("test/cert.pem")) {
|
||||||
|
Ok(_) => {}
|
||||||
|
Err(err) => panic!("Unexpected error {:?}", err)
|
||||||
|
}
|
||||||
|
let stream = match SslStream::new(&ctx, stream) {
|
||||||
|
Ok(stream) => stream,
|
||||||
|
Err(err) => panic!("Expected success, got {:?}", err)
|
||||||
|
};
|
||||||
|
// The server prefers "http/1.1", so that is chosen, even though the client
|
||||||
|
// would prefer "spdy/3.1"
|
||||||
|
assert_eq!(b"http/1.1", stream.get_selected_alpn_protocol().unwrap());
|
||||||
|
}
|
||||||
|
|
||||||
/// Tests that when both the client as well as the server use NPN and their
|
/// Tests that when both the client as well as the server use NPN and their
|
||||||
/// lists of supported protocols have an overlap, the correct protocol is chosen.
|
/// lists of supported protocols have an overlap, the correct protocol is chosen.
|
||||||
#[test]
|
#[test]
|
||||||
|
|
@ -410,7 +473,7 @@ fn test_connect_with_npn_successful_multiple_matching() {
|
||||||
Ok(_) => {}
|
Ok(_) => {}
|
||||||
Err(err) => panic!("Unexpected error {:?}", err)
|
Err(err) => panic!("Unexpected error {:?}", err)
|
||||||
}
|
}
|
||||||
let stream = match SslStream::new(&ctx, stream) {
|
let stream = match SslStream::connect_generic(&ctx, stream) {
|
||||||
Ok(stream) => stream,
|
Ok(stream) => stream,
|
||||||
Err(err) => panic!("Expected success, got {:?}", err)
|
Err(err) => panic!("Expected success, got {:?}", err)
|
||||||
};
|
};
|
||||||
|
|
@ -419,6 +482,32 @@ fn test_connect_with_npn_successful_multiple_matching() {
|
||||||
assert_eq!(b"http/1.1", stream.get_selected_npn_protocol().unwrap());
|
assert_eq!(b"http/1.1", stream.get_selected_npn_protocol().unwrap());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Tests that when both the client as well as the server use ALPN and their
|
||||||
|
/// lists of supported protocols have an overlap -- with only ONE protocol
|
||||||
|
/// being valid for both.
|
||||||
|
#[test]
|
||||||
|
#[cfg(feature = "alpn")]
|
||||||
|
fn test_connect_with_alpn_successful_single_match() {
|
||||||
|
// A different port than the other tests: an `openssl` process that has
|
||||||
|
// ALPN enabled.
|
||||||
|
let stream = TcpStream::connect("127.0.0.1:15419").unwrap();
|
||||||
|
let mut ctx = SslContext::new(Sslv23).unwrap();
|
||||||
|
ctx.set_verify(SSL_VERIFY_PEER, None);
|
||||||
|
ctx.set_alpn_protocols(&[b"spdy/3.1"]);
|
||||||
|
match ctx.set_CA_file(&Path::new("test/cert.pem")) {
|
||||||
|
Ok(_) => {}
|
||||||
|
Err(err) => panic!("Unexpected error {:?}", err)
|
||||||
|
}
|
||||||
|
let stream = match SslStream::new(&ctx, stream) {
|
||||||
|
Ok(stream) => stream,
|
||||||
|
Err(err) => panic!("Expected success, got {:?}", err)
|
||||||
|
};
|
||||||
|
// The client now only supports one of the server's protocols, so that one
|
||||||
|
// is used.
|
||||||
|
assert_eq!(b"spdy/3.1", stream.get_selected_alpn_protocol().unwrap());
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
/// Tests that when both the client as well as the server use NPN and their
|
/// Tests that when both the client as well as the server use NPN and their
|
||||||
/// lists of supported protocols have an overlap -- with only ONE protocol
|
/// lists of supported protocols have an overlap -- with only ONE protocol
|
||||||
/// being valid for both.
|
/// being valid for both.
|
||||||
|
|
@ -435,7 +524,7 @@ fn test_connect_with_npn_successful_single_match() {
|
||||||
Ok(_) => {}
|
Ok(_) => {}
|
||||||
Err(err) => panic!("Unexpected error {:?}", err)
|
Err(err) => panic!("Unexpected error {:?}", err)
|
||||||
}
|
}
|
||||||
let stream = match SslStream::new(&ctx, stream) {
|
let stream = match SslStream::connect_generic(&ctx, stream) {
|
||||||
Ok(stream) => stream,
|
Ok(stream) => stream,
|
||||||
Err(err) => panic!("Expected success, got {:?}", err)
|
Err(err) => panic!("Expected success, got {:?}", err)
|
||||||
};
|
};
|
||||||
|
|
@ -465,7 +554,7 @@ fn test_npn_server_advertise_multiple() {
|
||||||
// Have the listener wait on the connection in a different thread.
|
// Have the listener wait on the connection in a different thread.
|
||||||
thread::spawn(move || {
|
thread::spawn(move || {
|
||||||
let (stream, _) = listener.accept().unwrap();
|
let (stream, _) = listener.accept().unwrap();
|
||||||
let _ = SslStream::new_server(&listener_ctx, stream).unwrap();
|
let _ = SslStream::accept(&listener_ctx, stream).unwrap();
|
||||||
});
|
});
|
||||||
|
|
||||||
let mut ctx = SslContext::new(Sslv23).unwrap();
|
let mut ctx = SslContext::new(Sslv23).unwrap();
|
||||||
|
|
@ -477,7 +566,7 @@ fn test_npn_server_advertise_multiple() {
|
||||||
}
|
}
|
||||||
// Now connect to the socket and make sure the protocol negotiation works...
|
// Now connect to the socket and make sure the protocol negotiation works...
|
||||||
let stream = TcpStream::connect(localhost).unwrap();
|
let stream = TcpStream::connect(localhost).unwrap();
|
||||||
let stream = match SslStream::new(&ctx, stream) {
|
let stream = match SslStream::connect_generic(&ctx, stream) {
|
||||||
Ok(stream) => stream,
|
Ok(stream) => stream,
|
||||||
Err(err) => panic!("Expected success, got {:?}", err)
|
Err(err) => panic!("Expected success, got {:?}", err)
|
||||||
};
|
};
|
||||||
|
|
@ -485,6 +574,47 @@ fn test_npn_server_advertise_multiple() {
|
||||||
assert_eq!(b"spdy/3.1", stream.get_selected_npn_protocol().unwrap());
|
assert_eq!(b"spdy/3.1", stream.get_selected_npn_protocol().unwrap());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/// Tests that when the `SslStream` is created as a server stream, the protocols
|
||||||
|
/// are correctly advertised to the client.
|
||||||
|
#[test]
|
||||||
|
#[cfg(feature = "alpn")]
|
||||||
|
fn test_alpn_server_advertise_multiple() {
|
||||||
|
let localhost = "127.0.0.1:15421";
|
||||||
|
let listener = TcpListener::bind(localhost).unwrap();
|
||||||
|
// We create a different context instance for the server...
|
||||||
|
let listener_ctx = {
|
||||||
|
let mut ctx = SslContext::new(Sslv23).unwrap();
|
||||||
|
ctx.set_verify(SSL_VERIFY_PEER, None);
|
||||||
|
ctx.set_alpn_protocols(&[b"http/1.1", b"spdy/3.1"]);
|
||||||
|
assert!(ctx.set_certificate_file(
|
||||||
|
&Path::new("test/cert.pem"), X509FileType::PEM).is_ok());
|
||||||
|
ctx.set_private_key_file(
|
||||||
|
&Path::new("test/key.pem"), X509FileType::PEM).unwrap();
|
||||||
|
ctx
|
||||||
|
};
|
||||||
|
// Have the listener wait on the connection in a different thread.
|
||||||
|
thread::spawn(move || {
|
||||||
|
let (stream, _) = listener.accept().unwrap();
|
||||||
|
let _ = SslStream::accept(&listener_ctx, stream).unwrap();
|
||||||
|
});
|
||||||
|
|
||||||
|
let mut ctx = SslContext::new(Sslv23).unwrap();
|
||||||
|
ctx.set_verify(SSL_VERIFY_PEER, None);
|
||||||
|
ctx.set_alpn_protocols(&[b"spdy/3.1"]);
|
||||||
|
match ctx.set_CA_file(&Path::new("test/cert.pem")) {
|
||||||
|
Ok(_) => {}
|
||||||
|
Err(err) => panic!("Unexpected error {:?}", err)
|
||||||
|
}
|
||||||
|
// Now connect to the socket and make sure the protocol negotiation works...
|
||||||
|
let stream = TcpStream::connect(localhost).unwrap();
|
||||||
|
let stream = match SslStream::new(&ctx, stream) {
|
||||||
|
Ok(stream) => stream,
|
||||||
|
Err(err) => panic!("Expected success, got {:?}", err)
|
||||||
|
};
|
||||||
|
// SPDY is selected since that's the only thing the client supports.
|
||||||
|
assert_eq!(b"spdy/3.1", stream.get_selected_alpn_protocol().unwrap());
|
||||||
|
}
|
||||||
|
|
||||||
#[cfg(feature="dtlsv1")]
|
#[cfg(feature="dtlsv1")]
|
||||||
#[cfg(test)]
|
#[cfg(test)]
|
||||||
mod dtlsv1 {
|
mod dtlsv1 {
|
||||||
|
|
@ -514,7 +644,7 @@ fn test_read_dtlsv1() {
|
||||||
let server = udp::next_server();
|
let server = udp::next_server();
|
||||||
let stream = sock.connect(&server[..]).unwrap();
|
let stream = sock.connect(&server[..]).unwrap();
|
||||||
|
|
||||||
let mut stream = SslStream::new(&SslContext::new(Dtlsv1).unwrap(), stream).unwrap();
|
let mut stream = SslStream::connect_generic(&SslContext::new(Dtlsv1).unwrap(), stream).unwrap();
|
||||||
let mut buf = [0u8;100];
|
let mut buf = [0u8;100];
|
||||||
assert!(stream.read(&mut buf).is_ok());
|
assert!(stream.read(&mut buf).is_ok());
|
||||||
}
|
}
|
||||||
|
|
@ -523,5 +653,5 @@ fn test_read_dtlsv1() {
|
||||||
#[cfg(feature = "sslv2")]
|
#[cfg(feature = "sslv2")]
|
||||||
fn test_sslv2_connect_failure() {
|
fn test_sslv2_connect_failure() {
|
||||||
let tcp = TcpStream::connect("127.0.0.1:15420").unwrap();
|
let tcp = TcpStream::connect("127.0.0.1:15420").unwrap();
|
||||||
SslStream::new(&SslContext::new(Sslv2).unwrap(), tcp).err().unwrap();
|
SslStream::connect_generic(&SslContext::new(Sslv2).unwrap(), tcp).err().unwrap();
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -69,3 +69,32 @@ fn test_subject_read_cn() {
|
||||||
|
|
||||||
assert_eq!(&cn as &str, "test_cert")
|
assert_eq!(&cn as &str, "test_cert")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn test_nid_values() {
|
||||||
|
let cert_path = Path::new("test/nid_test_cert.pem");
|
||||||
|
let mut file = File::open(&cert_path)
|
||||||
|
.ok()
|
||||||
|
.expect("Failed to open `test/nid_test_cert.pem`");
|
||||||
|
|
||||||
|
let cert = X509::from_pem(&mut file).ok().expect("Failed to load PEM");
|
||||||
|
let subject = cert.subject_name();
|
||||||
|
|
||||||
|
let cn = match subject.text_by_nid(Nid::CN) {
|
||||||
|
Some(x) => x,
|
||||||
|
None => panic!("Failed to read CN from cert")
|
||||||
|
};
|
||||||
|
assert_eq!(&cn as &str, "example.com");
|
||||||
|
|
||||||
|
let email = match subject.text_by_nid(Nid::Email) {
|
||||||
|
Some(x) => x,
|
||||||
|
None => panic!("Failed to read subject email address from cert")
|
||||||
|
};
|
||||||
|
assert_eq!(&email as &str, "test@example.com");
|
||||||
|
|
||||||
|
let friendly = match subject.text_by_nid(Nid::FriendlyName) {
|
||||||
|
Some(x) => x,
|
||||||
|
None => panic!("Failed to read subject friendly name from cert")
|
||||||
|
};
|
||||||
|
assert_eq!(&friendly as &str, "Example");
|
||||||
|
}
|
||||||
|
|
|
||||||
|
|
@ -0,0 +1,12 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIB1DCCAX6gAwIBAgIJAMzXWZGWHleWMA0GCSqGSIb3DQEBCwUAMFYxHzAdBgkq
|
||||||
|
hkiG9w0BCQEWEHRlc3RAZXhhbXBsZS5jb20xFDASBgNVBAMMC2V4YW1wbGUuY29t
|
||||||
|
MR0wGwYJKoZIhvcNAQkUHg4ARQB4AGEAbQBwAGwAZTAeFw0xNTA3MDEwNjQ3NDRa
|
||||||
|
Fw0xNTA3MzEwNjQ3NDRaMFYxHzAdBgkqhkiG9w0BCQEWEHRlc3RAZXhhbXBsZS5j
|
||||||
|
b20xFDASBgNVBAMMC2V4YW1wbGUuY29tMR0wGwYJKoZIhvcNAQkUHg4ARQB4AGEA
|
||||||
|
bQBwAGwAZTBcMA0GCSqGSIb3DQEBAQUAA0sAMEgCQQCmejzp4+o35FD0hAnx2trL
|
||||||
|
08h07X5jZca9DgZH35hWXPh7fMucLt/IPXIRnz2zKEa/Mo6D2V/fx03Mqo0epid7
|
||||||
|
AgMBAAGjLzAtMB0GA1UdDgQWBBRQa57tXz3rZNRz+fTbo3w3jQJMBTAMBgNVHRME
|
||||||
|
BTADAQH/MA0GCSqGSIb3DQEBCwUAA0EAm0iY9cr+gvC+vcQIebdofpQ4GcDW8U6W
|
||||||
|
Bxs8ZXinLl69P0jYLum3+XITNFRiyQqcivaxdxthxDNOX7P+aKwkJA==
|
||||||
|
-----END CERTIFICATE-----
|
||||||
|
|
@ -4,7 +4,7 @@ cd $(dirname $0)
|
||||||
|
|
||||||
openssl s_server -accept 15418 -www -cert cert.pem -key key.pem >/dev/null 2>&1 &
|
openssl s_server -accept 15418 -www -cert cert.pem -key key.pem >/dev/null 2>&1 &
|
||||||
openssl s_server -accept 15419 -www -cert cert.pem -key key.pem \
|
openssl s_server -accept 15419 -www -cert cert.pem -key key.pem \
|
||||||
-nextprotoneg "http/1.1,spdy/3.1" >/dev/null 2>&1 &
|
-nextprotoneg "http/1.1,spdy/3.1" -alpn "http/1.1,spdy/3.1" >/dev/null 2>&1 &
|
||||||
openssl s_server -no_ssl2 -accept 15420 -www -cert cert.pem -key key.pem >/dev/null 2>&1 &
|
openssl s_server -no_ssl2 -accept 15420 -www -cert cert.pem -key key.pem >/dev/null 2>&1 &
|
||||||
|
|
||||||
if test "$TRAVIS_OS_NAME" == "osx"; then
|
if test "$TRAVIS_OS_NAME" == "osx"; then
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue