123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289 |
- package sys.ssl;
- private typedef SocketHandle = Dynamic;
- private typedef CTX = Dynamic;
- private typedef SSL = Dynamic;
- private class SocketInput extends haxe.io.Input {
- @:allow(sys.ssl.Socket) private var __s : Socket;
- public function new( s : Socket ) {
- this.__s = s;
- }
- public override function readByte() {
- return try {
- __s.handshake();
- ssl_recv_char( @:privateAccess __s.ssl );
- } catch( e : Dynamic ) {
- if( e == "Blocking" )
- throw haxe.io.Error.Blocked;
- else if( __s == null )
- throw haxe.io.Error.Custom(e);
- else
- throw new haxe.io.Eof();
- }
- }
- public override function readBytes( buf : haxe.io.Bytes, pos : Int, len : Int ) : Int {
- var r : Int;
- if( __s == null )
- throw "Invalid handle";
- try {
- __s.handshake();
- r = ssl_recv( @:privateAccess __s.ssl, buf.getData(), pos, len );
- } catch( e : Dynamic ) {
- if( e == "Blocking" )
- throw haxe.io.Error.Blocked;
- else
- throw haxe.io.Error.Custom(e);
- }
- if( r == 0 )
- throw new haxe.io.Eof();
- return r;
- }
- public override function close() {
- super.close();
- if( __s != null ) __s.close();
- }
- private static var ssl_recv = neko.Lib.loadLazy( "ssl", "ssl_recv", 4 );
- private static var ssl_recv_char = neko.Lib.loadLazy( "ssl", "ssl_recv_char", 1 );
- }
- private class SocketOutput extends haxe.io.Output {
- @:allow(sys.ssl.Socket) private var __s : Socket;
- public function new( s : Socket ) {
- this.__s = s;
- }
- public override function writeByte( c : Int ) {
- if( __s == null )
- throw "Invalid handle";
- try {
- __s.handshake();
- ssl_send_char( @:privateAccess __s.ssl, c);
- } catch( e : Dynamic ) {
- if( e == "Blocking" )
- throw haxe.io.Error.Blocked;
- else
- throw haxe.io.Error.Custom(e);
- }
- }
- public override function writeBytes( buf : haxe.io.Bytes, pos : Int, len : Int) : Int {
- return try {
- __s.handshake();
- ssl_send( @:privateAccess __s.ssl, buf.getData(), pos, len);
- } catch( e : Dynamic ) {
- if( e == "Blocking" )
- throw haxe.io.Error.Blocked;
- else
- throw haxe.io.Error.Custom(e);
- }
- }
- public override function close() {
- super.close();
- if( __s != null ) __s.close();
- }
- private static var ssl_send_char = neko.Lib.loadLazy( "ssl", "ssl_send_char", 2 );
- private static var ssl_send = neko.Lib.loadLazy( "ssl", "ssl_send", 4 );
- }
- @:coreApi
- class Socket extends sys.net.Socket {
-
- public static var DEFAULT_VERIFY_CERT : Null<Bool> = true;
- public static var DEFAULT_CA : Null<Certificate>;
-
- private var ctx : CTX;
- private var ssl : SSL;
-
- public var verifyCert : Null<Bool>;
- private var caCert : Null<Certificate>;
- private var hostname : String;
- private var ownCert : Null<Certificate>;
- private var ownKey : Null<Key>;
- private var altSNIContexts : Null<Array<{match: String->Bool, key: Key, cert: Certificate}>>;
- private var sniCallback : Dynamic;
- private var handshakeDone : Bool;
- private override function init() : Void {
- __s = socket_new( false );
- input = new SocketInput( this );
- output = new SocketOutput( this );
- if( DEFAULT_VERIFY_CERT && DEFAULT_CA == null ){
- try {
- DEFAULT_CA = Certificate.loadDefaults();
- }catch( e : Dynamic ){}
- }
- verifyCert = DEFAULT_VERIFY_CERT;
- caCert = DEFAULT_CA;
- }
- public override function connect(host : sys.net.Host, port : Int) : Void {
- try {
- ctx = buildSSLContext( false );
- ssl = ssl_new( ctx );
- ssl_set_socket( ssl, __s );
- handshakeDone = false;
- if( hostname == null )
- hostname = host.host;
- if( hostname != null )
- ssl_set_hostname( ssl, untyped hostname.__s );
- socket_connect( __s, host.ip, port );
- handshake();
- } catch( s : String ) {
- if( s == "std@socket_connect" )
- throw "Failed to connect on "+host.host+":"+port;
- else
- neko.Lib.rethrow(s);
- } catch( e : Dynamic ) {
- neko.Lib.rethrow(e);
- }
- }
- public function handshake() : Void {
- if( !handshakeDone ){
- try {
- ssl_handshake( ssl );
- handshakeDone = true;
- } catch( e : Dynamic ) {
- if( e == "Blocking" )
- throw haxe.io.Error.Blocked;
- else
- neko.Lib.rethrow( e );
- }
- }
- }
- public function setCA( cert : Certificate ) : Void {
- caCert = cert;
- }
- public function setHostname( name : String ) : Void {
- hostname = name;
- }
- public function setCertificate( cert : Certificate, key : Key ) : Void {
- ownCert = cert;
- ownKey = key;
- }
- public override function read() : String {
- handshake();
- var b = ssl_read( ssl );
- if( b == null )
- return "";
- return new String(cast b);
- }
- public override function write( content : String ) : Void {
- handshake();
- ssl_write( ssl, untyped content.__s );
- }
- public override function close() : Void {
- if( ssl != null ) ssl_close( ssl );
- if( ctx != null ) conf_close( ctx );
- if( altSNIContexts != null )
- sniCallback = null;
- socket_close( __s );
- var input : SocketInput = cast input;
- var output : SocketOutput = cast output;
- @:privateAccess input.__s = output.__s = null;
- input.close();
- output.close();
- }
- public function addSNICertificate( cbServernameMatch : String->Bool, cert : Certificate, key : Key ) : Void {
- if( altSNIContexts == null )
- altSNIContexts = [];
- altSNIContexts.push( {match: cbServernameMatch, cert: cert, key: key} );
- }
- public override function bind( host : sys.net.Host, port : Int ) : Void {
- ctx = buildSSLContext( true );
- socket_bind( __s, host.ip, port );
- }
- public override function accept() : Socket {
- var c = socket_accept( __s );
- var ssl = ssl_new( ctx );
- ssl_set_socket( ssl, c );
- var s = Type.createEmptyInstance( sys.ssl.Socket );
- s.__s = c;
- s.ssl = ssl;
- s.input = new SocketInput(s);
- s.output = new SocketOutput(s);
- s.handshakeDone = false;
- return s;
- }
- public function peerCertificate() : sys.ssl.Certificate {
- var x = ssl_get_peer_certificate( ssl );
- return x==null ? null : new sys.ssl.Certificate( x );
- }
- private function buildSSLContext( server : Bool ) : CTX {
- var ctx : CTX = conf_new( server );
- if( ownCert != null && ownKey != null )
- conf_set_cert( ctx, @:privateAccess ownCert.__x, @:privateAccess ownKey.__k );
- if ( altSNIContexts != null ) {
- sniCallback = function(servername) {
- var servername = new String(cast servername);
- for( c in altSNIContexts ){
- if( c.match(servername) )
- return @:privateAccess {key: c.key.__k, cert: c.cert.__x};
- }
- if( ownKey != null && ownCert != null )
- return @:privateAccess { key: ownKey.__k, cert: ownCert.__x };
- return null;
- }
- conf_set_servername_callback( ctx, sniCallback );
- }
- if ( caCert != null )
- conf_set_ca( ctx, caCert == null ? null : @:privateAccess caCert.__x );
- conf_set_verify( ctx, verifyCert );
-
- return ctx;
- }
-
- private static var ssl_new = neko.Lib.loadLazy( "ssl", "ssl_new", 1 );
- private static var ssl_close = neko.Lib.loadLazy( "ssl", "ssl_close", 1 );
- private static var ssl_handshake = neko.Lib.loadLazy( "ssl", "ssl_handshake", 1 );
- private static var ssl_set_socket = neko.Lib.loadLazy( "ssl", "ssl_set_socket", 2 );
- private static var ssl_set_hostname = neko.Lib.loadLazy( "ssl", "ssl_set_hostname", 2 );
- private static var ssl_get_peer_certificate = neko.Lib.loadLazy( "ssl", "ssl_get_peer_certificate", 1 );
- private static var ssl_read = neko.Lib.loadLazy( "ssl", "ssl_read", 1 );
- private static var ssl_write = neko.Lib.loadLazy( "ssl", "ssl_write", 2 );
- private static var conf_new = neko.Lib.loadLazy( "ssl", "conf_new", 1 );
- private static var conf_close = neko.Lib.loadLazy( "ssl", "conf_close", 1 );
- private static var conf_set_ca = neko.Lib.loadLazy( "ssl", "conf_set_ca", 2 );
- private static var conf_set_verify = neko.Lib.loadLazy( "ssl", "conf_set_verify", 2 );
- private static var conf_set_cert = neko.Lib.loadLazy( "ssl", "conf_set_cert", 3 );
- private static var conf_set_servername_callback = neko.Lib.loadLazy( "ssl", "conf_set_servername_callback", 2 );
- private static var socket_new = neko.Lib.load("std","socket_new",1);
- private static var socket_close = neko.Lib.load("std","socket_close",1);
- private static var socket_connect = neko.Lib.load("std","socket_connect",3);
- private static var socket_bind = neko.Lib.load("std","socket_bind",3);
- private static var socket_accept = neko.Lib.load("std","socket_accept",1);
- }
|