123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316 |
- /*
- * Copyright (C)2005-2019 Haxe Foundation
- *
- * Permission is hereby granted, free of charge, to any person obtaining a
- * copy of this software and associated documentation files (the "Software"),
- * to deal in the Software without restriction, including without limitation
- * the rights to use, copy, modify, merge, publish, distribute, sublicense,
- * and/or sell copies of the Software, and to permit persons to whom the
- * Software is furnished to do so, subject to the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in
- * all copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
- * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
- * DEALINGS IN THE SOFTWARE.
- */
- package sys.ssl;
- private typedef SocketHandle = Dynamic;
- private typedef CTX = Dynamic;
- private typedef SSL = Dynamic;
- private class SocketInput extends haxe.io.Input {
- @:allow(sys.ssl.Socket) private var __s:Socket;
- public function new(s:Socket) {
- this.__s = s;
- }
- public override function readByte() {
- return try {
- __s.handshake();
- ssl_recv_char(@:privateAccess __s.ssl);
- } catch (e:Dynamic) {
- if (e == "Blocking")
- throw haxe.io.Error.Blocked;
- else if (__s == null)
- throw haxe.io.Error.Custom(e);
- else
- throw new haxe.io.Eof();
- }
- }
- public override function readBytes(buf:haxe.io.Bytes, pos:Int, len:Int):Int {
- var r:Int;
- if (__s == null)
- throw "Invalid handle";
- try {
- __s.handshake();
- r = ssl_recv(@:privateAccess __s.ssl, buf.getData(), pos, len);
- } catch (e:Dynamic) {
- if (e == "Blocking")
- throw haxe.io.Error.Blocked;
- else
- throw haxe.io.Error.Custom(e);
- }
- if (r == 0)
- throw new haxe.io.Eof();
- return r;
- }
- public override function close() {
- super.close();
- if (__s != null)
- __s.close();
- }
- private static var ssl_recv = neko.Lib.loadLazy("ssl", "ssl_recv", 4);
- private static var ssl_recv_char = neko.Lib.loadLazy("ssl", "ssl_recv_char", 1);
- }
- private class SocketOutput extends haxe.io.Output {
- @:allow(sys.ssl.Socket) private var __s:Socket;
- public function new(s:Socket) {
- this.__s = s;
- }
- public override function writeByte(c:Int) {
- if (__s == null)
- throw "Invalid handle";
- try {
- __s.handshake();
- ssl_send_char(@:privateAccess __s.ssl, c);
- } catch (e:Dynamic) {
- if (e == "Blocking")
- throw haxe.io.Error.Blocked;
- else
- throw haxe.io.Error.Custom(e);
- }
- }
- public override function writeBytes(buf:haxe.io.Bytes, pos:Int, len:Int):Int {
- return try {
- __s.handshake();
- ssl_send(@:privateAccess __s.ssl, buf.getData(), pos, len);
- } catch (e:Dynamic) {
- if (e == "Blocking")
- throw haxe.io.Error.Blocked;
- else
- throw haxe.io.Error.Custom(e);
- }
- }
- public override function close() {
- super.close();
- if (__s != null)
- __s.close();
- }
- private static var ssl_send_char = neko.Lib.loadLazy("ssl", "ssl_send_char", 2);
- private static var ssl_send = neko.Lib.loadLazy("ssl", "ssl_send", 4);
- }
- @:coreApi
- class Socket extends sys.net.Socket {
- public static var DEFAULT_VERIFY_CERT:Null<Bool> = true;
- public static var DEFAULT_CA:Null<Certificate>;
- private var ctx:CTX;
- private var ssl:SSL;
- public var verifyCert:Null<Bool>;
- private var caCert:Null<Certificate>;
- private var hostname:String;
- private var ownCert:Null<Certificate>;
- private var ownKey:Null<Key>;
- private var altSNIContexts:Null<Array<{match:String->Bool, key:Key, cert:Certificate}>>;
- private var sniCallback:Dynamic;
- private var handshakeDone:Bool;
- private override function init():Void {
- __s = socket_new(false);
- input = new SocketInput(this);
- output = new SocketOutput(this);
- if (DEFAULT_VERIFY_CERT && DEFAULT_CA == null) {
- try {
- DEFAULT_CA = Certificate.loadDefaults();
- } catch (e:Dynamic) {}
- }
- verifyCert = DEFAULT_VERIFY_CERT;
- caCert = DEFAULT_CA;
- }
- public override function connect(host:sys.net.Host, port:Int):Void {
- try {
- ctx = buildSSLContext(false);
- ssl = ssl_new(ctx);
- ssl_set_socket(ssl, __s);
- handshakeDone = false;
- if (hostname == null)
- hostname = host.host;
- if (hostname != null)
- ssl_set_hostname(ssl, untyped hostname.__s);
- socket_connect(__s, host.ip, port);
- handshake();
- } catch (s:String) {
- if (s == "std@socket_connect")
- throw "Failed to connect on " + host.host + ":" + port;
- else
- neko.Lib.rethrow(s);
- } catch (e:Dynamic) {
- neko.Lib.rethrow(e);
- }
- }
- public function handshake():Void {
- if (!handshakeDone) {
- try {
- ssl_handshake(ssl);
- handshakeDone = true;
- } catch (e:Dynamic) {
- if (e == "Blocking")
- throw haxe.io.Error.Blocked;
- else
- neko.Lib.rethrow(e);
- }
- }
- }
- public function setCA(cert:Certificate):Void {
- caCert = cert;
- }
- public function setHostname(name:String):Void {
- hostname = name;
- }
- public function setCertificate(cert:Certificate, key:Key):Void {
- ownCert = cert;
- ownKey = key;
- }
- public override function read():String {
- handshake();
- var b = ssl_read(ssl);
- if (b == null)
- return "";
- return new String(cast b);
- }
- public override function write(content:String):Void {
- handshake();
- ssl_write(ssl, untyped content.__s);
- }
- public override function close():Void {
- if (ssl != null)
- ssl_close(ssl);
- if (ctx != null)
- conf_close(ctx);
- if (altSNIContexts != null)
- sniCallback = null;
- socket_close(__s);
- var input:SocketInput = cast input;
- var output:SocketOutput = cast output;
- @:privateAccess input.__s = output.__s = null;
- input.close();
- output.close();
- }
- public function addSNICertificate(cbServernameMatch:String->Bool, cert:Certificate, key:Key):Void {
- if (altSNIContexts == null)
- altSNIContexts = [];
- altSNIContexts.push({match: cbServernameMatch, cert: cert, key: key});
- }
- public override function bind(host:sys.net.Host, port:Int):Void {
- ctx = buildSSLContext(true);
- socket_bind(__s, host.ip, port);
- }
- public override function accept():Socket {
- var c = socket_accept(__s);
- var ssl = ssl_new(ctx);
- ssl_set_socket(ssl, c);
- var s = Type.createEmptyInstance(sys.ssl.Socket);
- s.__s = c;
- s.ssl = ssl;
- s.input = new SocketInput(s);
- s.output = new SocketOutput(s);
- s.handshakeDone = false;
- return s;
- }
- public function peerCertificate():sys.ssl.Certificate {
- var x = ssl_get_peer_certificate(ssl);
- return x == null ? null : new sys.ssl.Certificate(x);
- }
- private function buildSSLContext(server:Bool):CTX {
- var ctx:CTX = conf_new(server);
- if (ownCert != null && ownKey != null)
- conf_set_cert(ctx, @:privateAccess ownCert.__x, @:privateAccess ownKey.__k);
- if (altSNIContexts != null) {
- sniCallback = function(servername) {
- var servername = new String(cast servername);
- for (c in altSNIContexts) {
- if (c.match(servername))
- return @:privateAccess {
- key:c.key.__k, cert:c.cert.__x
- };
- }
- if (ownKey != null && ownCert != null)
- return @:privateAccess {
- key:ownKey.__k, cert:ownCert.__x
- };
- return null;
- }
- conf_set_servername_callback(ctx, sniCallback);
- }
- if (caCert != null)
- conf_set_ca(ctx, caCert == null ? null : @:privateAccess caCert.__x);
- conf_set_verify(ctx, verifyCert);
- return ctx;
- }
- private static var ssl_new = neko.Lib.loadLazy("ssl", "ssl_new", 1);
- private static var ssl_close = neko.Lib.loadLazy("ssl", "ssl_close", 1);
- private static var ssl_handshake = neko.Lib.loadLazy("ssl", "ssl_handshake", 1);
- private static var ssl_set_socket = neko.Lib.loadLazy("ssl", "ssl_set_socket", 2);
- private static var ssl_set_hostname = neko.Lib.loadLazy("ssl", "ssl_set_hostname", 2);
- private static var ssl_get_peer_certificate = neko.Lib.loadLazy("ssl", "ssl_get_peer_certificate", 1);
- private static var ssl_read = neko.Lib.loadLazy("ssl", "ssl_read", 1);
- private static var ssl_write = neko.Lib.loadLazy("ssl", "ssl_write", 2);
- private static var conf_new = neko.Lib.loadLazy("ssl", "conf_new", 1);
- private static var conf_close = neko.Lib.loadLazy("ssl", "conf_close", 1);
- private static var conf_set_ca = neko.Lib.loadLazy("ssl", "conf_set_ca", 2);
- private static var conf_set_verify = neko.Lib.loadLazy("ssl", "conf_set_verify", 2);
- private static var conf_set_cert = neko.Lib.loadLazy("ssl", "conf_set_cert", 3);
- private static var conf_set_servername_callback = neko.Lib.loadLazy("ssl", "conf_set_servername_callback", 2);
- private static var socket_new = neko.Lib.load("std", "socket_new", 1);
- private static var socket_close = neko.Lib.load("std", "socket_close", 1);
- private static var socket_connect = neko.Lib.load("std", "socket_connect", 3);
- private static var socket_bind = neko.Lib.load("std", "socket_bind", 3);
- private static var socket_accept = neko.Lib.load("std", "socket_accept", 1);
- }
|