Socket.hx 8.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316
  1. /*
  2. * Copyright (C)2005-2019 Haxe Foundation
  3. *
  4. * Permission is hereby granted, free of charge, to any person obtaining a
  5. * copy of this software and associated documentation files (the "Software"),
  6. * to deal in the Software without restriction, including without limitation
  7. * the rights to use, copy, modify, merge, publish, distribute, sublicense,
  8. * and/or sell copies of the Software, and to permit persons to whom the
  9. * Software is furnished to do so, subject to the following conditions:
  10. *
  11. * The above copyright notice and this permission notice shall be included in
  12. * all copies or substantial portions of the Software.
  13. *
  14. * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  15. * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  16. * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  17. * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  18. * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
  19. * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
  20. * DEALINGS IN THE SOFTWARE.
  21. */
  22. package sys.ssl;
  23. private typedef SocketHandle = Dynamic;
  24. private typedef CTX = Dynamic;
  25. private typedef SSL = Dynamic;
  26. private class SocketInput extends haxe.io.Input {
  27. @:allow(sys.ssl.Socket) private var __s:Socket;
  28. public function new(s:Socket) {
  29. this.__s = s;
  30. }
  31. public override function readByte() {
  32. return try {
  33. __s.handshake();
  34. ssl_recv_char(@:privateAccess __s.ssl);
  35. } catch (e:Dynamic) {
  36. if (e == "Blocking")
  37. throw haxe.io.Error.Blocked;
  38. else if (__s == null)
  39. throw haxe.io.Error.Custom(e);
  40. else
  41. throw new haxe.io.Eof();
  42. }
  43. }
  44. public override function readBytes(buf:haxe.io.Bytes, pos:Int, len:Int):Int {
  45. var r:Int;
  46. if (__s == null)
  47. throw "Invalid handle";
  48. try {
  49. __s.handshake();
  50. r = ssl_recv(@:privateAccess __s.ssl, buf.getData(), pos, len);
  51. } catch (e:Dynamic) {
  52. if (e == "Blocking")
  53. throw haxe.io.Error.Blocked;
  54. else
  55. throw haxe.io.Error.Custom(e);
  56. }
  57. if (r == 0)
  58. throw new haxe.io.Eof();
  59. return r;
  60. }
  61. public override function close() {
  62. super.close();
  63. if (__s != null)
  64. __s.close();
  65. }
  66. private static var ssl_recv = neko.Lib.loadLazy("ssl", "ssl_recv", 4);
  67. private static var ssl_recv_char = neko.Lib.loadLazy("ssl", "ssl_recv_char", 1);
  68. }
  69. private class SocketOutput extends haxe.io.Output {
  70. @:allow(sys.ssl.Socket) private var __s:Socket;
  71. public function new(s:Socket) {
  72. this.__s = s;
  73. }
  74. public override function writeByte(c:Int) {
  75. if (__s == null)
  76. throw "Invalid handle";
  77. try {
  78. __s.handshake();
  79. ssl_send_char(@:privateAccess __s.ssl, c);
  80. } catch (e:Dynamic) {
  81. if (e == "Blocking")
  82. throw haxe.io.Error.Blocked;
  83. else
  84. throw haxe.io.Error.Custom(e);
  85. }
  86. }
  87. public override function writeBytes(buf:haxe.io.Bytes, pos:Int, len:Int):Int {
  88. return try {
  89. __s.handshake();
  90. ssl_send(@:privateAccess __s.ssl, buf.getData(), pos, len);
  91. } catch (e:Dynamic) {
  92. if (e == "Blocking")
  93. throw haxe.io.Error.Blocked;
  94. else
  95. throw haxe.io.Error.Custom(e);
  96. }
  97. }
  98. public override function close() {
  99. super.close();
  100. if (__s != null)
  101. __s.close();
  102. }
  103. private static var ssl_send_char = neko.Lib.loadLazy("ssl", "ssl_send_char", 2);
  104. private static var ssl_send = neko.Lib.loadLazy("ssl", "ssl_send", 4);
  105. }
  106. @:coreApi
  107. class Socket extends sys.net.Socket {
  108. public static var DEFAULT_VERIFY_CERT:Null<Bool> = true;
  109. public static var DEFAULT_CA:Null<Certificate>;
  110. private var ctx:CTX;
  111. private var ssl:SSL;
  112. public var verifyCert:Null<Bool>;
  113. private var caCert:Null<Certificate>;
  114. private var hostname:String;
  115. private var ownCert:Null<Certificate>;
  116. private var ownKey:Null<Key>;
  117. private var altSNIContexts:Null<Array<{match:String->Bool, key:Key, cert:Certificate}>>;
  118. private var sniCallback:Dynamic;
  119. private var handshakeDone:Bool;
  120. private override function init():Void {
  121. __s = socket_new(false);
  122. input = new SocketInput(this);
  123. output = new SocketOutput(this);
  124. if (DEFAULT_VERIFY_CERT && DEFAULT_CA == null) {
  125. try {
  126. DEFAULT_CA = Certificate.loadDefaults();
  127. } catch (e:Dynamic) {}
  128. }
  129. verifyCert = DEFAULT_VERIFY_CERT;
  130. caCert = DEFAULT_CA;
  131. }
  132. public override function connect(host:sys.net.Host, port:Int):Void {
  133. try {
  134. ctx = buildSSLContext(false);
  135. ssl = ssl_new(ctx);
  136. ssl_set_socket(ssl, __s);
  137. handshakeDone = false;
  138. if (hostname == null)
  139. hostname = host.host;
  140. if (hostname != null)
  141. ssl_set_hostname(ssl, untyped hostname.__s);
  142. socket_connect(__s, host.ip, port);
  143. handshake();
  144. } catch (s:String) {
  145. if (s == "std@socket_connect")
  146. throw "Failed to connect on " + host.host + ":" + port;
  147. else
  148. neko.Lib.rethrow(s);
  149. } catch (e:Dynamic) {
  150. neko.Lib.rethrow(e);
  151. }
  152. }
  153. public function handshake():Void {
  154. if (!handshakeDone) {
  155. try {
  156. ssl_handshake(ssl);
  157. handshakeDone = true;
  158. } catch (e:Dynamic) {
  159. if (e == "Blocking")
  160. throw haxe.io.Error.Blocked;
  161. else
  162. neko.Lib.rethrow(e);
  163. }
  164. }
  165. }
  166. public function setCA(cert:Certificate):Void {
  167. caCert = cert;
  168. }
  169. public function setHostname(name:String):Void {
  170. hostname = name;
  171. }
  172. public function setCertificate(cert:Certificate, key:Key):Void {
  173. ownCert = cert;
  174. ownKey = key;
  175. }
  176. public override function read():String {
  177. handshake();
  178. var b = ssl_read(ssl);
  179. if (b == null)
  180. return "";
  181. return new String(cast b);
  182. }
  183. public override function write(content:String):Void {
  184. handshake();
  185. ssl_write(ssl, untyped content.__s);
  186. }
  187. public override function close():Void {
  188. if (ssl != null)
  189. ssl_close(ssl);
  190. if (ctx != null)
  191. conf_close(ctx);
  192. if (altSNIContexts != null)
  193. sniCallback = null;
  194. socket_close(__s);
  195. var input:SocketInput = cast input;
  196. var output:SocketOutput = cast output;
  197. @:privateAccess input.__s = output.__s = null;
  198. input.close();
  199. output.close();
  200. }
  201. public function addSNICertificate(cbServernameMatch:String->Bool, cert:Certificate, key:Key):Void {
  202. if (altSNIContexts == null)
  203. altSNIContexts = [];
  204. altSNIContexts.push({match: cbServernameMatch, cert: cert, key: key});
  205. }
  206. public override function bind(host:sys.net.Host, port:Int):Void {
  207. ctx = buildSSLContext(true);
  208. socket_bind(__s, host.ip, port);
  209. }
  210. public override function accept():Socket {
  211. var c = socket_accept(__s);
  212. var ssl = ssl_new(ctx);
  213. ssl_set_socket(ssl, c);
  214. var s = Type.createEmptyInstance(sys.ssl.Socket);
  215. s.__s = c;
  216. s.ssl = ssl;
  217. s.input = new SocketInput(s);
  218. s.output = new SocketOutput(s);
  219. s.handshakeDone = false;
  220. return s;
  221. }
  222. public function peerCertificate():sys.ssl.Certificate {
  223. var x = ssl_get_peer_certificate(ssl);
  224. return x == null ? null : new sys.ssl.Certificate(x);
  225. }
  226. private function buildSSLContext(server:Bool):CTX {
  227. var ctx:CTX = conf_new(server);
  228. if (ownCert != null && ownKey != null)
  229. conf_set_cert(ctx, @:privateAccess ownCert.__x, @:privateAccess ownKey.__k);
  230. if (altSNIContexts != null) {
  231. sniCallback = function(servername) {
  232. var servername = new String(cast servername);
  233. for (c in altSNIContexts) {
  234. if (c.match(servername))
  235. return @:privateAccess {
  236. key:c.key.__k, cert:c.cert.__x
  237. };
  238. }
  239. if (ownKey != null && ownCert != null)
  240. return @:privateAccess {
  241. key:ownKey.__k, cert:ownCert.__x
  242. };
  243. return null;
  244. }
  245. conf_set_servername_callback(ctx, sniCallback);
  246. }
  247. if (caCert != null)
  248. conf_set_ca(ctx, caCert == null ? null : @:privateAccess caCert.__x);
  249. conf_set_verify(ctx, verifyCert);
  250. return ctx;
  251. }
  252. private static var ssl_new = neko.Lib.loadLazy("ssl", "ssl_new", 1);
  253. private static var ssl_close = neko.Lib.loadLazy("ssl", "ssl_close", 1);
  254. private static var ssl_handshake = neko.Lib.loadLazy("ssl", "ssl_handshake", 1);
  255. private static var ssl_set_socket = neko.Lib.loadLazy("ssl", "ssl_set_socket", 2);
  256. private static var ssl_set_hostname = neko.Lib.loadLazy("ssl", "ssl_set_hostname", 2);
  257. private static var ssl_get_peer_certificate = neko.Lib.loadLazy("ssl", "ssl_get_peer_certificate", 1);
  258. private static var ssl_read = neko.Lib.loadLazy("ssl", "ssl_read", 1);
  259. private static var ssl_write = neko.Lib.loadLazy("ssl", "ssl_write", 2);
  260. private static var conf_new = neko.Lib.loadLazy("ssl", "conf_new", 1);
  261. private static var conf_close = neko.Lib.loadLazy("ssl", "conf_close", 1);
  262. private static var conf_set_ca = neko.Lib.loadLazy("ssl", "conf_set_ca", 2);
  263. private static var conf_set_verify = neko.Lib.loadLazy("ssl", "conf_set_verify", 2);
  264. private static var conf_set_cert = neko.Lib.loadLazy("ssl", "conf_set_cert", 3);
  265. private static var conf_set_servername_callback = neko.Lib.loadLazy("ssl", "conf_set_servername_callback", 2);
  266. private static var socket_new = neko.Lib.load("std", "socket_new", 1);
  267. private static var socket_close = neko.Lib.load("std", "socket_close", 1);
  268. private static var socket_connect = neko.Lib.load("std", "socket_connect", 3);
  269. private static var socket_bind = neko.Lib.load("std", "socket_bind", 3);
  270. private static var socket_accept = neko.Lib.load("std", "socket_accept", 1);
  271. }