Socket.hx 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206
  1. package sys.ssl;
  2. import haxe.io.Bytes;
  3. import eval.vm.NativeSocket;
  4. import mbedtls.Config;
  5. import mbedtls.Ssl;
  6. private class SocketInput extends haxe.io.Input {
  7. @:allow(sys.ssl.Socket) private var socket:Socket;
  8. var readBuf:Bytes;
  9. public function new(s:Socket) {
  10. this.socket = s;
  11. readBuf = Bytes.alloc(1);
  12. }
  13. public override function readByte() {
  14. socket.handshake();
  15. var r = @:privateAccess socket.ssl.read(readBuf, 0, 1);
  16. if (r == -1)
  17. throw haxe.io.Error.Blocked;
  18. else if (r < 0)
  19. throw new haxe.io.Eof();
  20. return readBuf.get(0);
  21. }
  22. public override function readBytes(buf:haxe.io.Bytes, pos:Int, len:Int):Int {
  23. if (pos < 0 || len < 0 || ((pos + len) : UInt) > (buf.length : UInt))
  24. throw haxe.io.Error.OutsideBounds;
  25. socket.handshake();
  26. var r = @:privateAccess socket.ssl.read(buf, pos, len);
  27. if (r == -1)
  28. throw haxe.io.Error.Blocked;
  29. else if (r <= 0)
  30. throw new haxe.io.Eof();
  31. return r;
  32. }
  33. public override function close() {
  34. super.close();
  35. if (socket != null)
  36. socket.close();
  37. }
  38. }
  39. private class SocketOutput extends haxe.io.Output {
  40. @:allow(sys.ssl.Socket) private var socket:Socket;
  41. var writeBuf:Bytes;
  42. public function new(s:Socket) {
  43. this.socket = s;
  44. writeBuf = Bytes.alloc(1);
  45. }
  46. public override function writeByte(c:Int) {
  47. socket.handshake();
  48. writeBuf.set(0, c);
  49. var r = @:privateAccess socket.ssl.write(writeBuf, 0, 1);
  50. if (r == -1)
  51. throw haxe.io.Error.Blocked;
  52. else if (r < 0)
  53. throw new haxe.io.Eof();
  54. }
  55. public override function writeBytes(buf:haxe.io.Bytes, pos:Int, len:Int):Int {
  56. if (pos < 0 || len < 0 || ((pos + len) : UInt) > (buf.length : UInt))
  57. throw haxe.io.Error.OutsideBounds;
  58. socket.handshake();
  59. var r = @:privateAccess socket.ssl.write(buf, pos, len);
  60. if (r == -1)
  61. throw haxe.io.Error.Blocked;
  62. else if (r < 0)
  63. throw new haxe.io.Eof();
  64. return r;
  65. }
  66. public override function close() {
  67. super.close();
  68. if (socket != null)
  69. socket.close();
  70. }
  71. }
  72. @:coreApi
  73. class Socket extends sys.net.Socket {
  74. public static var DEFAULT_VERIFY_CERT:Null<Bool> = true;
  75. public static var DEFAULT_CA:Null<Certificate>;
  76. private var conf:Config;
  77. private var ssl:Ssl;
  78. public var verifyCert:Null<Bool>;
  79. private var caCert:Null<Certificate>;
  80. private var hostname:String;
  81. private var handshakeDone:Bool;
  82. private var isBlocking:Bool = true;
  83. override function init(socket:NativeSocket):Void {
  84. this.socket = socket;
  85. input = new SocketInput(this);
  86. output = new SocketOutput(this);
  87. if (DEFAULT_VERIFY_CERT && DEFAULT_CA == null) {
  88. DEFAULT_CA = Certificate.loadDefaults();
  89. }
  90. verifyCert = DEFAULT_VERIFY_CERT;
  91. caCert = DEFAULT_CA;
  92. }
  93. public override function connect(host:sys.net.Host, port:Int):Void {
  94. conf = buildConfig(false);
  95. ssl = new Ssl();
  96. ssl.setup(conf);
  97. Mbedtls.setSocket(ssl, socket);
  98. handshakeDone = false;
  99. if (hostname == null)
  100. hostname = host.host;
  101. if (hostname != null)
  102. ssl.set_hostname(hostname);
  103. socket.connect(host.ip, port);
  104. if (isBlocking)
  105. handshake();
  106. }
  107. public function handshake():Void {
  108. if (!handshakeDone) {
  109. var r = ssl.handshake();
  110. if (r == 0)
  111. handshakeDone = true;
  112. else if (r == -1)
  113. throw haxe.io.Error.Blocked;
  114. else
  115. throw mbedtls.Error.strerror(r);
  116. }
  117. }
  118. override function setBlocking(b:Bool):Void {
  119. super.setBlocking(b);
  120. isBlocking = b;
  121. }
  122. public function setCA(cert:Certificate):Void {
  123. caCert = cert;
  124. }
  125. public function setHostname(name:String):Void {
  126. hostname = name;
  127. }
  128. public override function close():Void {
  129. super.close();
  130. var input:SocketInput = cast input;
  131. var output:SocketOutput = cast output;
  132. @:privateAccess input.socket = output.socket = null;
  133. input.close();
  134. output.close();
  135. }
  136. public override function bind(host:sys.net.Host, port:Int):Void {
  137. conf = buildConfig(true);
  138. socket.bind(host.ip, port);
  139. }
  140. public override function accept():Socket {
  141. var c = socket.accept();
  142. var cssl = new Ssl();
  143. cssl.setup(conf);
  144. Mbedtls.setSocket(cssl, c);
  145. var s = Type.createEmptyInstance(sys.ssl.Socket);
  146. s.socket = c;
  147. s.ssl = cssl;
  148. s.input = new SocketInput(s);
  149. s.output = new SocketOutput(s);
  150. s.handshakeDone = false;
  151. return s;
  152. }
  153. public function addSNICertificate(cbServernameMatch:String->Bool, cert:Certificate, key:Key):Void {
  154. throw new haxe.exceptions.NotImplementedException();
  155. }
  156. public function peerCertificate():Certificate {
  157. return @:privateAccess new Certificate(ssl.get_peer_cert());
  158. }
  159. public function setCertificate(cert:Certificate, key:Key):Void {
  160. throw new haxe.exceptions.NotImplementedException();
  161. }
  162. private function buildConfig(server:Bool):Config {
  163. var conf = new Config();
  164. conf.defaults(server ? SSL_IS_SERVER : SSL_IS_CLIENT, SSL_TRANSPORT_STREAM, SSL_PRESET_DEFAULT);
  165. conf.rng(Mbedtls.getDefaultCtrDrbg());
  166. if (caCert != null) {
  167. conf.ca_chain(@:privateAccess caCert.getNative());
  168. }
  169. conf.authmode(if (verifyCert) SSL_VERIFY_REQUIRED else if (verifyCert == null) SSL_VERIFY_OPTIONAL else SSL_VERIFY_NONE);
  170. return conf;
  171. }
  172. }