zig_example 0.3.0 → 0.3.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/ext/mkmf.rb +2734 -0
- data/ext/openssl/openssl_missing.c +40 -0
- data/ext/openssl/openssl_missing.h +238 -0
- data/ext/openssl/ossl.c +1295 -0
- data/ext/openssl/ossl.h +201 -0
- data/ext/openssl/ossl_asn1.c +1891 -0
- data/ext/openssl/ossl_asn1.h +62 -0
- data/ext/openssl/ossl_bio.c +42 -0
- data/ext/openssl/ossl_bio.h +16 -0
- data/ext/openssl/ossl_bn.c +1344 -0
- data/ext/openssl/ossl_bn.h +26 -0
- data/ext/openssl/ossl_cipher.c +1074 -0
- data/ext/openssl/ossl_cipher.h +20 -0
- data/ext/openssl/ossl_config.c +460 -0
- data/ext/openssl/ossl_config.h +16 -0
- data/ext/openssl/ossl_digest.c +425 -0
- data/ext/openssl/ossl_digest.h +20 -0
- data/ext/openssl/ossl_engine.c +568 -0
- data/ext/openssl/ossl_engine.h +19 -0
- data/ext/openssl/ossl_hmac.c +310 -0
- data/ext/openssl/ossl_hmac.h +18 -0
- data/ext/openssl/ossl_kdf.c +311 -0
- data/ext/openssl/ossl_kdf.h +6 -0
- data/ext/openssl/ossl_ns_spki.c +405 -0
- data/ext/openssl/ossl_ns_spki.h +19 -0
- data/ext/openssl/ossl_ocsp.c +1965 -0
- data/ext/openssl/ossl_ocsp.h +23 -0
- data/ext/openssl/ossl_pkcs12.c +275 -0
- data/ext/openssl/ossl_pkcs12.h +13 -0
- data/ext/openssl/ossl_pkcs7.c +1081 -0
- data/ext/openssl/ossl_pkcs7.h +36 -0
- data/ext/openssl/ossl_pkey.c +1624 -0
- data/ext/openssl/ossl_pkey.h +204 -0
- data/ext/openssl/ossl_pkey_dh.c +440 -0
- data/ext/openssl/ossl_pkey_dsa.c +359 -0
- data/ext/openssl/ossl_pkey_ec.c +1655 -0
- data/ext/openssl/ossl_pkey_rsa.c +579 -0
- data/ext/openssl/ossl_rand.c +200 -0
- data/ext/openssl/ossl_rand.h +18 -0
- data/ext/openssl/ossl_ssl.c +3142 -0
- data/ext/openssl/ossl_ssl.h +36 -0
- data/ext/openssl/ossl_ssl_session.c +331 -0
- data/ext/openssl/ossl_ts.c +1539 -0
- data/ext/openssl/ossl_ts.h +16 -0
- data/ext/openssl/ossl_x509.c +256 -0
- data/ext/openssl/ossl_x509.h +115 -0
- data/ext/openssl/ossl_x509attr.c +324 -0
- data/ext/openssl/ossl_x509cert.c +1002 -0
- data/ext/openssl/ossl_x509crl.c +545 -0
- data/ext/openssl/ossl_x509ext.c +490 -0
- data/ext/openssl/ossl_x509name.c +597 -0
- data/ext/openssl/ossl_x509req.c +444 -0
- data/ext/openssl/ossl_x509revoked.c +300 -0
- data/ext/openssl/ossl_x509store.c +986 -0
- data/ext/zigrb_100doors/build.zig +0 -12
- data/ext/zigrb_100doors/extconf.rb +2 -19
- data/ext/zigrb_ackermann/build.zig +0 -12
- data/ext/zigrb_ackermann/extconf.rb +2 -19
- data/ext/zigrb_lucas_lehmer/build.zig +0 -12
- data/ext/zigrb_lucas_lehmer/extconf.rb +2 -19
- data/lib/zig_example/version.rb +1 -1
- metadata +56 -2
@@ -0,0 +1,3142 @@
|
|
1
|
+
/*
|
2
|
+
* 'OpenSSL for Ruby' project
|
3
|
+
* Copyright (C) 2000-2002 GOTOU Yuuzou <gotoyuzo@notwork.org>
|
4
|
+
* Copyright (C) 2001-2002 Michal Rokos <m.rokos@sh.cvut.cz>
|
5
|
+
* Copyright (C) 2001-2007 Technorama Ltd. <oss-ruby@technorama.net>
|
6
|
+
* All rights reserved.
|
7
|
+
*/
|
8
|
+
/*
|
9
|
+
* This program is licensed under the same licence as Ruby.
|
10
|
+
* (See the file 'LICENCE'.)
|
11
|
+
*/
|
12
|
+
#include "ossl.h"
|
13
|
+
|
14
|
+
#ifndef OPENSSL_NO_SOCK
|
15
|
+
#define numberof(ary) (int)(sizeof(ary)/sizeof((ary)[0]))
|
16
|
+
|
17
|
+
#if !defined(OPENSSL_NO_NEXTPROTONEG) && !OSSL_IS_LIBRESSL
|
18
|
+
# define OSSL_USE_NEXTPROTONEG
|
19
|
+
#endif
|
20
|
+
|
21
|
+
#if !defined(TLS1_3_VERSION) && \
|
22
|
+
OSSL_LIBRESSL_PREREQ(3, 2, 0) && !OSSL_LIBRESSL_PREREQ(3, 4, 0)
|
23
|
+
# define TLS1_3_VERSION 0x0304
|
24
|
+
#endif
|
25
|
+
|
26
|
+
#ifdef _WIN32
|
27
|
+
# define TO_SOCKET(s) _get_osfhandle(s)
|
28
|
+
#else
|
29
|
+
# define TO_SOCKET(s) (s)
|
30
|
+
#endif
|
31
|
+
|
32
|
+
#define GetSSLCTX(obj, ctx) do { \
|
33
|
+
TypedData_Get_Struct((obj), SSL_CTX, &ossl_sslctx_type, (ctx)); \
|
34
|
+
} while (0)
|
35
|
+
|
36
|
+
VALUE mSSL;
|
37
|
+
static VALUE eSSLError;
|
38
|
+
VALUE cSSLContext;
|
39
|
+
VALUE cSSLSocket;
|
40
|
+
|
41
|
+
static VALUE eSSLErrorWaitReadable;
|
42
|
+
static VALUE eSSLErrorWaitWritable;
|
43
|
+
|
44
|
+
static ID id_call, ID_callback_state, id_tmp_dh_callback,
|
45
|
+
id_npn_protocols_encoded, id_each;
|
46
|
+
static VALUE sym_exception, sym_wait_readable, sym_wait_writable;
|
47
|
+
|
48
|
+
static ID id_i_cert_store, id_i_ca_file, id_i_ca_path, id_i_verify_mode,
|
49
|
+
id_i_verify_depth, id_i_verify_callback, id_i_client_ca,
|
50
|
+
id_i_renegotiation_cb, id_i_cert, id_i_key, id_i_extra_chain_cert,
|
51
|
+
id_i_client_cert_cb, id_i_timeout,
|
52
|
+
id_i_session_id_context, id_i_session_get_cb, id_i_session_new_cb,
|
53
|
+
id_i_session_remove_cb, id_i_npn_select_cb, id_i_npn_protocols,
|
54
|
+
id_i_alpn_select_cb, id_i_alpn_protocols, id_i_servername_cb,
|
55
|
+
id_i_verify_hostname, id_i_keylog_cb;
|
56
|
+
static ID id_i_io, id_i_context, id_i_hostname;
|
57
|
+
|
58
|
+
static int ossl_ssl_ex_vcb_idx;
|
59
|
+
static int ossl_ssl_ex_ptr_idx;
|
60
|
+
static int ossl_sslctx_ex_ptr_idx;
|
61
|
+
|
62
|
+
static void
|
63
|
+
ossl_sslctx_mark(void *ptr)
|
64
|
+
{
|
65
|
+
SSL_CTX *ctx = ptr;
|
66
|
+
rb_gc_mark((VALUE)SSL_CTX_get_ex_data(ctx, ossl_sslctx_ex_ptr_idx));
|
67
|
+
}
|
68
|
+
|
69
|
+
static void
|
70
|
+
ossl_sslctx_free(void *ptr)
|
71
|
+
{
|
72
|
+
SSL_CTX_free(ptr);
|
73
|
+
}
|
74
|
+
|
75
|
+
static const rb_data_type_t ossl_sslctx_type = {
|
76
|
+
"OpenSSL/SSL/CTX",
|
77
|
+
{
|
78
|
+
ossl_sslctx_mark, ossl_sslctx_free,
|
79
|
+
},
|
80
|
+
0, 0, RUBY_TYPED_FREE_IMMEDIATELY,
|
81
|
+
};
|
82
|
+
|
83
|
+
static VALUE
|
84
|
+
ossl_sslctx_s_alloc(VALUE klass)
|
85
|
+
{
|
86
|
+
SSL_CTX *ctx;
|
87
|
+
long mode = 0 |
|
88
|
+
SSL_MODE_ENABLE_PARTIAL_WRITE |
|
89
|
+
SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER |
|
90
|
+
SSL_MODE_RELEASE_BUFFERS;
|
91
|
+
VALUE obj;
|
92
|
+
|
93
|
+
obj = TypedData_Wrap_Struct(klass, &ossl_sslctx_type, 0);
|
94
|
+
#if OPENSSL_VERSION_NUMBER >= 0x10100000 || defined(LIBRESSL_VERSION_NUMBER)
|
95
|
+
ctx = SSL_CTX_new(TLS_method());
|
96
|
+
#else
|
97
|
+
ctx = SSL_CTX_new(SSLv23_method());
|
98
|
+
#endif
|
99
|
+
if (!ctx) {
|
100
|
+
ossl_raise(eSSLError, "SSL_CTX_new");
|
101
|
+
}
|
102
|
+
SSL_CTX_set_mode(ctx, mode);
|
103
|
+
RTYPEDDATA_DATA(obj) = ctx;
|
104
|
+
SSL_CTX_set_ex_data(ctx, ossl_sslctx_ex_ptr_idx, (void *)obj);
|
105
|
+
|
106
|
+
#if !defined(OPENSSL_NO_EC) && OPENSSL_VERSION_NUMBER < 0x10100000 && \
|
107
|
+
!defined(LIBRESSL_VERSION_NUMBER)
|
108
|
+
/* We use SSL_CTX_set1_curves_list() to specify the curve used in ECDH. It
|
109
|
+
* allows to specify multiple curve names and OpenSSL will select
|
110
|
+
* automatically from them. In OpenSSL 1.0.2, the automatic selection has to
|
111
|
+
* be enabled explicitly. OpenSSL 1.1.0 and LibreSSL 2.6.1 removed the knob
|
112
|
+
* and it is always enabled. To uniform the behavior, we enable the
|
113
|
+
* automatic selection also in 1.0.2. Users can still disable ECDH by
|
114
|
+
* removing ECDH cipher suites by SSLContext#ciphers=. */
|
115
|
+
if (!SSL_CTX_set_ecdh_auto(ctx, 1))
|
116
|
+
ossl_raise(eSSLError, "SSL_CTX_set_ecdh_auto");
|
117
|
+
#endif
|
118
|
+
|
119
|
+
return obj;
|
120
|
+
}
|
121
|
+
|
122
|
+
static int
|
123
|
+
parse_proto_version(VALUE str)
|
124
|
+
{
|
125
|
+
int i;
|
126
|
+
static const struct {
|
127
|
+
const char *name;
|
128
|
+
int version;
|
129
|
+
} map[] = {
|
130
|
+
{ "SSL2", SSL2_VERSION },
|
131
|
+
{ "SSL3", SSL3_VERSION },
|
132
|
+
{ "TLS1", TLS1_VERSION },
|
133
|
+
{ "TLS1_1", TLS1_1_VERSION },
|
134
|
+
{ "TLS1_2", TLS1_2_VERSION },
|
135
|
+
#ifdef TLS1_3_VERSION
|
136
|
+
{ "TLS1_3", TLS1_3_VERSION },
|
137
|
+
#endif
|
138
|
+
};
|
139
|
+
|
140
|
+
if (NIL_P(str))
|
141
|
+
return 0;
|
142
|
+
if (RB_INTEGER_TYPE_P(str))
|
143
|
+
return NUM2INT(str);
|
144
|
+
|
145
|
+
if (SYMBOL_P(str))
|
146
|
+
str = rb_sym2str(str);
|
147
|
+
StringValue(str);
|
148
|
+
for (i = 0; i < numberof(map); i++)
|
149
|
+
if (!strncmp(map[i].name, RSTRING_PTR(str), RSTRING_LEN(str)))
|
150
|
+
return map[i].version;
|
151
|
+
rb_raise(rb_eArgError, "unrecognized version %+"PRIsVALUE, str);
|
152
|
+
}
|
153
|
+
|
154
|
+
/*
|
155
|
+
* call-seq:
|
156
|
+
* ctx.set_minmax_proto_version(min, max) -> nil
|
157
|
+
*
|
158
|
+
* Sets the minimum and maximum supported protocol versions. See #min_version=
|
159
|
+
* and #max_version=.
|
160
|
+
*/
|
161
|
+
static VALUE
|
162
|
+
ossl_sslctx_set_minmax_proto_version(VALUE self, VALUE min_v, VALUE max_v)
|
163
|
+
{
|
164
|
+
SSL_CTX *ctx;
|
165
|
+
int min, max;
|
166
|
+
|
167
|
+
GetSSLCTX(self, ctx);
|
168
|
+
min = parse_proto_version(min_v);
|
169
|
+
max = parse_proto_version(max_v);
|
170
|
+
|
171
|
+
#ifdef HAVE_SSL_CTX_SET_MIN_PROTO_VERSION
|
172
|
+
if (!SSL_CTX_set_min_proto_version(ctx, min))
|
173
|
+
ossl_raise(eSSLError, "SSL_CTX_set_min_proto_version");
|
174
|
+
if (!SSL_CTX_set_max_proto_version(ctx, max))
|
175
|
+
ossl_raise(eSSLError, "SSL_CTX_set_max_proto_version");
|
176
|
+
#else
|
177
|
+
{
|
178
|
+
unsigned long sum = 0, opts = 0;
|
179
|
+
int i;
|
180
|
+
static const struct {
|
181
|
+
int ver;
|
182
|
+
unsigned long opts;
|
183
|
+
} options_map[] = {
|
184
|
+
{ SSL2_VERSION, SSL_OP_NO_SSLv2 },
|
185
|
+
{ SSL3_VERSION, SSL_OP_NO_SSLv3 },
|
186
|
+
{ TLS1_VERSION, SSL_OP_NO_TLSv1 },
|
187
|
+
{ TLS1_1_VERSION, SSL_OP_NO_TLSv1_1 },
|
188
|
+
{ TLS1_2_VERSION, SSL_OP_NO_TLSv1_2 },
|
189
|
+
# if defined(TLS1_3_VERSION)
|
190
|
+
{ TLS1_3_VERSION, SSL_OP_NO_TLSv1_3 },
|
191
|
+
# endif
|
192
|
+
};
|
193
|
+
|
194
|
+
for (i = 0; i < numberof(options_map); i++) {
|
195
|
+
sum |= options_map[i].opts;
|
196
|
+
if ((min && min > options_map[i].ver) ||
|
197
|
+
(max && max < options_map[i].ver)) {
|
198
|
+
opts |= options_map[i].opts;
|
199
|
+
}
|
200
|
+
}
|
201
|
+
SSL_CTX_clear_options(ctx, sum);
|
202
|
+
SSL_CTX_set_options(ctx, opts);
|
203
|
+
}
|
204
|
+
#endif
|
205
|
+
|
206
|
+
return Qnil;
|
207
|
+
}
|
208
|
+
|
209
|
+
static VALUE
|
210
|
+
ossl_call_client_cert_cb(VALUE obj)
|
211
|
+
{
|
212
|
+
VALUE ctx_obj, cb, ary, cert, key;
|
213
|
+
|
214
|
+
ctx_obj = rb_attr_get(obj, id_i_context);
|
215
|
+
cb = rb_attr_get(ctx_obj, id_i_client_cert_cb);
|
216
|
+
if (NIL_P(cb))
|
217
|
+
return Qnil;
|
218
|
+
|
219
|
+
ary = rb_funcallv(cb, id_call, 1, &obj);
|
220
|
+
Check_Type(ary, T_ARRAY);
|
221
|
+
GetX509CertPtr(cert = rb_ary_entry(ary, 0));
|
222
|
+
GetPrivPKeyPtr(key = rb_ary_entry(ary, 1));
|
223
|
+
|
224
|
+
return rb_ary_new3(2, cert, key);
|
225
|
+
}
|
226
|
+
|
227
|
+
static int
|
228
|
+
ossl_client_cert_cb(SSL *ssl, X509 **x509, EVP_PKEY **pkey)
|
229
|
+
{
|
230
|
+
VALUE obj, ret;
|
231
|
+
|
232
|
+
obj = (VALUE)SSL_get_ex_data(ssl, ossl_ssl_ex_ptr_idx);
|
233
|
+
ret = rb_protect(ossl_call_client_cert_cb, obj, NULL);
|
234
|
+
if (NIL_P(ret))
|
235
|
+
return 0;
|
236
|
+
|
237
|
+
*x509 = DupX509CertPtr(RARRAY_AREF(ret, 0));
|
238
|
+
*pkey = DupPKeyPtr(RARRAY_AREF(ret, 1));
|
239
|
+
|
240
|
+
return 1;
|
241
|
+
}
|
242
|
+
|
243
|
+
#if !defined(OPENSSL_NO_DH)
|
244
|
+
struct tmp_dh_callback_args {
|
245
|
+
VALUE ssl_obj;
|
246
|
+
ID id;
|
247
|
+
int type;
|
248
|
+
int is_export;
|
249
|
+
int keylength;
|
250
|
+
};
|
251
|
+
|
252
|
+
static VALUE
|
253
|
+
ossl_call_tmp_dh_callback(VALUE arg)
|
254
|
+
{
|
255
|
+
struct tmp_dh_callback_args *args = (struct tmp_dh_callback_args *)arg;
|
256
|
+
VALUE cb, dh;
|
257
|
+
EVP_PKEY *pkey;
|
258
|
+
|
259
|
+
cb = rb_funcall(args->ssl_obj, args->id, 0);
|
260
|
+
if (NIL_P(cb))
|
261
|
+
return (VALUE)NULL;
|
262
|
+
dh = rb_funcall(cb, id_call, 3, args->ssl_obj, INT2NUM(args->is_export),
|
263
|
+
INT2NUM(args->keylength));
|
264
|
+
pkey = GetPKeyPtr(dh);
|
265
|
+
if (EVP_PKEY_base_id(pkey) != args->type)
|
266
|
+
return (VALUE)NULL;
|
267
|
+
|
268
|
+
return (VALUE)pkey;
|
269
|
+
}
|
270
|
+
#endif
|
271
|
+
|
272
|
+
#if !defined(OPENSSL_NO_DH)
|
273
|
+
static DH *
|
274
|
+
ossl_tmp_dh_callback(SSL *ssl, int is_export, int keylength)
|
275
|
+
{
|
276
|
+
VALUE rb_ssl;
|
277
|
+
EVP_PKEY *pkey;
|
278
|
+
struct tmp_dh_callback_args args;
|
279
|
+
int state;
|
280
|
+
|
281
|
+
rb_ssl = (VALUE)SSL_get_ex_data(ssl, ossl_ssl_ex_ptr_idx);
|
282
|
+
args.ssl_obj = rb_ssl;
|
283
|
+
args.id = id_tmp_dh_callback;
|
284
|
+
args.is_export = is_export;
|
285
|
+
args.keylength = keylength;
|
286
|
+
args.type = EVP_PKEY_DH;
|
287
|
+
|
288
|
+
pkey = (EVP_PKEY *)rb_protect(ossl_call_tmp_dh_callback,
|
289
|
+
(VALUE)&args, &state);
|
290
|
+
if (state) {
|
291
|
+
rb_ivar_set(rb_ssl, ID_callback_state, INT2NUM(state));
|
292
|
+
return NULL;
|
293
|
+
}
|
294
|
+
if (!pkey)
|
295
|
+
return NULL;
|
296
|
+
|
297
|
+
return (DH *)EVP_PKEY_get0_DH(pkey);
|
298
|
+
}
|
299
|
+
#endif /* OPENSSL_NO_DH */
|
300
|
+
|
301
|
+
static VALUE
|
302
|
+
call_verify_certificate_identity(VALUE ctx_v)
|
303
|
+
{
|
304
|
+
X509_STORE_CTX *ctx = (X509_STORE_CTX *)ctx_v;
|
305
|
+
SSL *ssl;
|
306
|
+
VALUE ssl_obj, hostname, cert_obj;
|
307
|
+
|
308
|
+
ssl = X509_STORE_CTX_get_ex_data(ctx, SSL_get_ex_data_X509_STORE_CTX_idx());
|
309
|
+
ssl_obj = (VALUE)SSL_get_ex_data(ssl, ossl_ssl_ex_ptr_idx);
|
310
|
+
hostname = rb_attr_get(ssl_obj, id_i_hostname);
|
311
|
+
|
312
|
+
if (!RTEST(hostname)) {
|
313
|
+
rb_warning("verify_hostname requires hostname to be set");
|
314
|
+
return Qtrue;
|
315
|
+
}
|
316
|
+
|
317
|
+
cert_obj = ossl_x509_new(X509_STORE_CTX_get_current_cert(ctx));
|
318
|
+
return rb_funcall(mSSL, rb_intern("verify_certificate_identity"), 2,
|
319
|
+
cert_obj, hostname);
|
320
|
+
}
|
321
|
+
|
322
|
+
static int
|
323
|
+
ossl_ssl_verify_callback(int preverify_ok, X509_STORE_CTX *ctx)
|
324
|
+
{
|
325
|
+
VALUE cb, ssl_obj, sslctx_obj, verify_hostname, ret;
|
326
|
+
SSL *ssl;
|
327
|
+
int status;
|
328
|
+
|
329
|
+
ssl = X509_STORE_CTX_get_ex_data(ctx, SSL_get_ex_data_X509_STORE_CTX_idx());
|
330
|
+
cb = (VALUE)SSL_get_ex_data(ssl, ossl_ssl_ex_vcb_idx);
|
331
|
+
ssl_obj = (VALUE)SSL_get_ex_data(ssl, ossl_ssl_ex_ptr_idx);
|
332
|
+
sslctx_obj = rb_attr_get(ssl_obj, id_i_context);
|
333
|
+
verify_hostname = rb_attr_get(sslctx_obj, id_i_verify_hostname);
|
334
|
+
|
335
|
+
if (preverify_ok && RTEST(verify_hostname) && !SSL_is_server(ssl) &&
|
336
|
+
!X509_STORE_CTX_get_error_depth(ctx)) {
|
337
|
+
ret = rb_protect(call_verify_certificate_identity, (VALUE)ctx, &status);
|
338
|
+
if (status) {
|
339
|
+
rb_ivar_set(ssl_obj, ID_callback_state, INT2NUM(status));
|
340
|
+
return 0;
|
341
|
+
}
|
342
|
+
if (ret != Qtrue) {
|
343
|
+
preverify_ok = 0;
|
344
|
+
#if defined(X509_V_ERR_HOSTNAME_MISMATCH)
|
345
|
+
X509_STORE_CTX_set_error(ctx, X509_V_ERR_HOSTNAME_MISMATCH);
|
346
|
+
#else
|
347
|
+
X509_STORE_CTX_set_error(ctx, X509_V_ERR_CERT_REJECTED);
|
348
|
+
#endif
|
349
|
+
}
|
350
|
+
}
|
351
|
+
|
352
|
+
return ossl_verify_cb_call(cb, preverify_ok, ctx);
|
353
|
+
}
|
354
|
+
|
355
|
+
static VALUE
|
356
|
+
ossl_call_session_get_cb(VALUE ary)
|
357
|
+
{
|
358
|
+
VALUE ssl_obj, cb;
|
359
|
+
|
360
|
+
Check_Type(ary, T_ARRAY);
|
361
|
+
ssl_obj = rb_ary_entry(ary, 0);
|
362
|
+
|
363
|
+
cb = rb_funcall(ssl_obj, rb_intern("session_get_cb"), 0);
|
364
|
+
if (NIL_P(cb)) return Qnil;
|
365
|
+
|
366
|
+
return rb_funcallv(cb, id_call, 1, &ary);
|
367
|
+
}
|
368
|
+
|
369
|
+
static SSL_SESSION *
|
370
|
+
#if defined(LIBRESSL_VERSION_NUMBER) || OPENSSL_VERSION_NUMBER >= 0x10100000
|
371
|
+
ossl_sslctx_session_get_cb(SSL *ssl, const unsigned char *buf, int len, int *copy)
|
372
|
+
#else
|
373
|
+
ossl_sslctx_session_get_cb(SSL *ssl, unsigned char *buf, int len, int *copy)
|
374
|
+
#endif
|
375
|
+
{
|
376
|
+
VALUE ary, ssl_obj, ret_obj;
|
377
|
+
SSL_SESSION *sess;
|
378
|
+
int state = 0;
|
379
|
+
|
380
|
+
OSSL_Debug("SSL SESSION get callback entered");
|
381
|
+
ssl_obj = (VALUE)SSL_get_ex_data(ssl, ossl_ssl_ex_ptr_idx);
|
382
|
+
ary = rb_ary_new2(2);
|
383
|
+
rb_ary_push(ary, ssl_obj);
|
384
|
+
rb_ary_push(ary, rb_str_new((const char *)buf, len));
|
385
|
+
|
386
|
+
ret_obj = rb_protect(ossl_call_session_get_cb, ary, &state);
|
387
|
+
if (state) {
|
388
|
+
rb_ivar_set(ssl_obj, ID_callback_state, INT2NUM(state));
|
389
|
+
return NULL;
|
390
|
+
}
|
391
|
+
if (!rb_obj_is_instance_of(ret_obj, cSSLSession))
|
392
|
+
return NULL;
|
393
|
+
|
394
|
+
GetSSLSession(ret_obj, sess);
|
395
|
+
*copy = 1;
|
396
|
+
|
397
|
+
return sess;
|
398
|
+
}
|
399
|
+
|
400
|
+
static VALUE
|
401
|
+
ossl_call_session_new_cb(VALUE ary)
|
402
|
+
{
|
403
|
+
VALUE ssl_obj, cb;
|
404
|
+
|
405
|
+
Check_Type(ary, T_ARRAY);
|
406
|
+
ssl_obj = rb_ary_entry(ary, 0);
|
407
|
+
|
408
|
+
cb = rb_funcall(ssl_obj, rb_intern("session_new_cb"), 0);
|
409
|
+
if (NIL_P(cb)) return Qnil;
|
410
|
+
|
411
|
+
return rb_funcallv(cb, id_call, 1, &ary);
|
412
|
+
}
|
413
|
+
|
414
|
+
/* return 1 normal. return 0 removes the session */
|
415
|
+
static int
|
416
|
+
ossl_sslctx_session_new_cb(SSL *ssl, SSL_SESSION *sess)
|
417
|
+
{
|
418
|
+
VALUE ary, ssl_obj, sess_obj;
|
419
|
+
int state = 0;
|
420
|
+
|
421
|
+
OSSL_Debug("SSL SESSION new callback entered");
|
422
|
+
|
423
|
+
ssl_obj = (VALUE)SSL_get_ex_data(ssl, ossl_ssl_ex_ptr_idx);
|
424
|
+
sess_obj = rb_obj_alloc(cSSLSession);
|
425
|
+
SSL_SESSION_up_ref(sess);
|
426
|
+
DATA_PTR(sess_obj) = sess;
|
427
|
+
|
428
|
+
ary = rb_ary_new2(2);
|
429
|
+
rb_ary_push(ary, ssl_obj);
|
430
|
+
rb_ary_push(ary, sess_obj);
|
431
|
+
|
432
|
+
rb_protect(ossl_call_session_new_cb, ary, &state);
|
433
|
+
if (state) {
|
434
|
+
rb_ivar_set(ssl_obj, ID_callback_state, INT2NUM(state));
|
435
|
+
}
|
436
|
+
|
437
|
+
/*
|
438
|
+
* return 0 which means to OpenSSL that the session is still
|
439
|
+
* valid (since we created Ruby Session object) and was not freed by us
|
440
|
+
* with SSL_SESSION_free(). Call SSLContext#remove_session(sess) in
|
441
|
+
* session_get_cb block if you don't want OpenSSL to cache the session
|
442
|
+
* internally.
|
443
|
+
*/
|
444
|
+
return 0;
|
445
|
+
}
|
446
|
+
|
447
|
+
#if OPENSSL_VERSION_NUMBER >= 0x10101000 && !defined(LIBRESSL_VERSION_NUMBER)
|
448
|
+
/*
|
449
|
+
* It is only compatible with OpenSSL >= 1.1.1. Even if LibreSSL implements
|
450
|
+
* SSL_CTX_set_keylog_callback() from v3.4.2, it does nothing (see
|
451
|
+
* https://github.com/libressl-portable/openbsd/commit/648d39f0f035835d0653342d139883b9661e9cb6).
|
452
|
+
*/
|
453
|
+
|
454
|
+
struct ossl_call_keylog_cb_args {
|
455
|
+
VALUE ssl_obj;
|
456
|
+
const char * line;
|
457
|
+
};
|
458
|
+
|
459
|
+
static VALUE
|
460
|
+
ossl_call_keylog_cb(VALUE args_v)
|
461
|
+
{
|
462
|
+
VALUE sslctx_obj, cb, line_v;
|
463
|
+
struct ossl_call_keylog_cb_args *args = (struct ossl_call_keylog_cb_args *) args_v;
|
464
|
+
|
465
|
+
sslctx_obj = rb_attr_get(args->ssl_obj, id_i_context);
|
466
|
+
|
467
|
+
cb = rb_attr_get(sslctx_obj, id_i_keylog_cb);
|
468
|
+
if (NIL_P(cb)) return Qnil;
|
469
|
+
|
470
|
+
line_v = rb_str_new_cstr(args->line);
|
471
|
+
|
472
|
+
return rb_funcall(cb, id_call, 2, args->ssl_obj, line_v);
|
473
|
+
}
|
474
|
+
|
475
|
+
static void
|
476
|
+
ossl_sslctx_keylog_cb(const SSL *ssl, const char *line)
|
477
|
+
{
|
478
|
+
VALUE ssl_obj;
|
479
|
+
struct ossl_call_keylog_cb_args args;
|
480
|
+
int state = 0;
|
481
|
+
|
482
|
+
OSSL_Debug("SSL keylog callback entered");
|
483
|
+
|
484
|
+
ssl_obj = (VALUE)SSL_get_ex_data(ssl, ossl_ssl_ex_ptr_idx);
|
485
|
+
args.ssl_obj = ssl_obj;
|
486
|
+
args.line = line;
|
487
|
+
|
488
|
+
rb_protect(ossl_call_keylog_cb, (VALUE)&args, &state);
|
489
|
+
if (state) {
|
490
|
+
rb_ivar_set(ssl_obj, ID_callback_state, INT2NUM(state));
|
491
|
+
}
|
492
|
+
}
|
493
|
+
#endif
|
494
|
+
|
495
|
+
static VALUE
|
496
|
+
ossl_call_session_remove_cb(VALUE ary)
|
497
|
+
{
|
498
|
+
VALUE sslctx_obj, cb;
|
499
|
+
|
500
|
+
Check_Type(ary, T_ARRAY);
|
501
|
+
sslctx_obj = rb_ary_entry(ary, 0);
|
502
|
+
|
503
|
+
cb = rb_attr_get(sslctx_obj, id_i_session_remove_cb);
|
504
|
+
if (NIL_P(cb)) return Qnil;
|
505
|
+
|
506
|
+
return rb_funcallv(cb, id_call, 1, &ary);
|
507
|
+
}
|
508
|
+
|
509
|
+
static void
|
510
|
+
ossl_sslctx_session_remove_cb(SSL_CTX *ctx, SSL_SESSION *sess)
|
511
|
+
{
|
512
|
+
VALUE ary, sslctx_obj, sess_obj;
|
513
|
+
int state = 0;
|
514
|
+
|
515
|
+
/*
|
516
|
+
* This callback is also called for all sessions in the internal store
|
517
|
+
* when SSL_CTX_free() is called.
|
518
|
+
*/
|
519
|
+
if (rb_during_gc())
|
520
|
+
return;
|
521
|
+
|
522
|
+
OSSL_Debug("SSL SESSION remove callback entered");
|
523
|
+
|
524
|
+
sslctx_obj = (VALUE)SSL_CTX_get_ex_data(ctx, ossl_sslctx_ex_ptr_idx);
|
525
|
+
sess_obj = rb_obj_alloc(cSSLSession);
|
526
|
+
SSL_SESSION_up_ref(sess);
|
527
|
+
DATA_PTR(sess_obj) = sess;
|
528
|
+
|
529
|
+
ary = rb_ary_new2(2);
|
530
|
+
rb_ary_push(ary, sslctx_obj);
|
531
|
+
rb_ary_push(ary, sess_obj);
|
532
|
+
|
533
|
+
rb_protect(ossl_call_session_remove_cb, ary, &state);
|
534
|
+
if (state) {
|
535
|
+
/*
|
536
|
+
the SSL_CTX is frozen, nowhere to save state.
|
537
|
+
there is no common accessor method to check it either.
|
538
|
+
rb_ivar_set(sslctx_obj, ID_callback_state, INT2NUM(state));
|
539
|
+
*/
|
540
|
+
}
|
541
|
+
}
|
542
|
+
|
543
|
+
static VALUE
|
544
|
+
ossl_sslctx_add_extra_chain_cert_i(RB_BLOCK_CALL_FUNC_ARGLIST(i, arg))
|
545
|
+
{
|
546
|
+
X509 *x509;
|
547
|
+
SSL_CTX *ctx;
|
548
|
+
|
549
|
+
GetSSLCTX(arg, ctx);
|
550
|
+
x509 = DupX509CertPtr(i);
|
551
|
+
if(!SSL_CTX_add_extra_chain_cert(ctx, x509)){
|
552
|
+
ossl_raise(eSSLError, NULL);
|
553
|
+
}
|
554
|
+
|
555
|
+
return i;
|
556
|
+
}
|
557
|
+
|
558
|
+
static VALUE ossl_sslctx_setup(VALUE self);
|
559
|
+
|
560
|
+
static VALUE
|
561
|
+
ossl_call_servername_cb(VALUE ary)
|
562
|
+
{
|
563
|
+
VALUE ssl_obj, sslctx_obj, cb, ret_obj;
|
564
|
+
|
565
|
+
Check_Type(ary, T_ARRAY);
|
566
|
+
ssl_obj = rb_ary_entry(ary, 0);
|
567
|
+
|
568
|
+
sslctx_obj = rb_attr_get(ssl_obj, id_i_context);
|
569
|
+
cb = rb_attr_get(sslctx_obj, id_i_servername_cb);
|
570
|
+
if (NIL_P(cb)) return Qnil;
|
571
|
+
|
572
|
+
ret_obj = rb_funcallv(cb, id_call, 1, &ary);
|
573
|
+
if (rb_obj_is_kind_of(ret_obj, cSSLContext)) {
|
574
|
+
SSL *ssl;
|
575
|
+
SSL_CTX *ctx2;
|
576
|
+
|
577
|
+
ossl_sslctx_setup(ret_obj);
|
578
|
+
GetSSL(ssl_obj, ssl);
|
579
|
+
GetSSLCTX(ret_obj, ctx2);
|
580
|
+
SSL_set_SSL_CTX(ssl, ctx2);
|
581
|
+
rb_ivar_set(ssl_obj, id_i_context, ret_obj);
|
582
|
+
} else if (!NIL_P(ret_obj)) {
|
583
|
+
ossl_raise(rb_eArgError, "servername_cb must return an "
|
584
|
+
"OpenSSL::SSL::SSLContext object or nil");
|
585
|
+
}
|
586
|
+
|
587
|
+
return ret_obj;
|
588
|
+
}
|
589
|
+
|
590
|
+
static int
|
591
|
+
ssl_servername_cb(SSL *ssl, int *ad, void *arg)
|
592
|
+
{
|
593
|
+
VALUE ary, ssl_obj;
|
594
|
+
int state = 0;
|
595
|
+
const char *servername = SSL_get_servername(ssl, TLSEXT_NAMETYPE_host_name);
|
596
|
+
|
597
|
+
if (!servername)
|
598
|
+
return SSL_TLSEXT_ERR_OK;
|
599
|
+
|
600
|
+
ssl_obj = (VALUE)SSL_get_ex_data(ssl, ossl_ssl_ex_ptr_idx);
|
601
|
+
ary = rb_ary_new2(2);
|
602
|
+
rb_ary_push(ary, ssl_obj);
|
603
|
+
rb_ary_push(ary, rb_str_new2(servername));
|
604
|
+
|
605
|
+
rb_protect(ossl_call_servername_cb, ary, &state);
|
606
|
+
if (state) {
|
607
|
+
rb_ivar_set(ssl_obj, ID_callback_state, INT2NUM(state));
|
608
|
+
return SSL_TLSEXT_ERR_ALERT_FATAL;
|
609
|
+
}
|
610
|
+
|
611
|
+
return SSL_TLSEXT_ERR_OK;
|
612
|
+
}
|
613
|
+
|
614
|
+
static void
|
615
|
+
ssl_renegotiation_cb(const SSL *ssl)
|
616
|
+
{
|
617
|
+
VALUE ssl_obj, sslctx_obj, cb;
|
618
|
+
|
619
|
+
ssl_obj = (VALUE)SSL_get_ex_data(ssl, ossl_ssl_ex_ptr_idx);
|
620
|
+
sslctx_obj = rb_attr_get(ssl_obj, id_i_context);
|
621
|
+
cb = rb_attr_get(sslctx_obj, id_i_renegotiation_cb);
|
622
|
+
if (NIL_P(cb)) return;
|
623
|
+
|
624
|
+
rb_funcallv(cb, id_call, 1, &ssl_obj);
|
625
|
+
}
|
626
|
+
|
627
|
+
static VALUE
|
628
|
+
ssl_npn_encode_protocol_i(RB_BLOCK_CALL_FUNC_ARGLIST(cur, encoded))
|
629
|
+
{
|
630
|
+
int len = RSTRING_LENINT(cur);
|
631
|
+
char len_byte;
|
632
|
+
if (len < 1 || len > 255)
|
633
|
+
ossl_raise(eSSLError, "Advertised protocol must have length 1..255");
|
634
|
+
/* Encode the length byte */
|
635
|
+
len_byte = len;
|
636
|
+
rb_str_buf_cat(encoded, &len_byte, 1);
|
637
|
+
rb_str_buf_cat(encoded, RSTRING_PTR(cur), len);
|
638
|
+
return Qnil;
|
639
|
+
}
|
640
|
+
|
641
|
+
static VALUE
|
642
|
+
ssl_encode_npn_protocols(VALUE protocols)
|
643
|
+
{
|
644
|
+
VALUE encoded = rb_str_new(NULL, 0);
|
645
|
+
rb_block_call(protocols, id_each, 0, 0, ssl_npn_encode_protocol_i, encoded);
|
646
|
+
return encoded;
|
647
|
+
}
|
648
|
+
|
649
|
+
struct npn_select_cb_common_args {
|
650
|
+
VALUE cb;
|
651
|
+
const unsigned char *in;
|
652
|
+
unsigned inlen;
|
653
|
+
};
|
654
|
+
|
655
|
+
static VALUE
|
656
|
+
npn_select_cb_common_i(VALUE tmp)
|
657
|
+
{
|
658
|
+
struct npn_select_cb_common_args *args = (void *)tmp;
|
659
|
+
const unsigned char *in = args->in, *in_end = in + args->inlen;
|
660
|
+
unsigned char l;
|
661
|
+
long len;
|
662
|
+
VALUE selected, protocols = rb_ary_new();
|
663
|
+
|
664
|
+
/* assume OpenSSL verifies this format */
|
665
|
+
/* The format is len_1|proto_1|...|len_n|proto_n */
|
666
|
+
while (in < in_end) {
|
667
|
+
l = *in++;
|
668
|
+
rb_ary_push(protocols, rb_str_new((const char *)in, l));
|
669
|
+
in += l;
|
670
|
+
}
|
671
|
+
|
672
|
+
selected = rb_funcallv(args->cb, id_call, 1, &protocols);
|
673
|
+
StringValue(selected);
|
674
|
+
len = RSTRING_LEN(selected);
|
675
|
+
if (len < 1 || len >= 256) {
|
676
|
+
ossl_raise(eSSLError, "Selected protocol name must have length 1..255");
|
677
|
+
}
|
678
|
+
|
679
|
+
return selected;
|
680
|
+
}
|
681
|
+
|
682
|
+
static int
|
683
|
+
ssl_npn_select_cb_common(SSL *ssl, VALUE cb, const unsigned char **out,
|
684
|
+
unsigned char *outlen, const unsigned char *in,
|
685
|
+
unsigned int inlen)
|
686
|
+
{
|
687
|
+
VALUE selected;
|
688
|
+
int status;
|
689
|
+
struct npn_select_cb_common_args args;
|
690
|
+
|
691
|
+
args.cb = cb;
|
692
|
+
args.in = in;
|
693
|
+
args.inlen = inlen;
|
694
|
+
|
695
|
+
selected = rb_protect(npn_select_cb_common_i, (VALUE)&args, &status);
|
696
|
+
if (status) {
|
697
|
+
VALUE ssl_obj = (VALUE)SSL_get_ex_data(ssl, ossl_ssl_ex_ptr_idx);
|
698
|
+
|
699
|
+
rb_ivar_set(ssl_obj, ID_callback_state, INT2NUM(status));
|
700
|
+
return SSL_TLSEXT_ERR_ALERT_FATAL;
|
701
|
+
}
|
702
|
+
|
703
|
+
*out = (unsigned char *)RSTRING_PTR(selected);
|
704
|
+
*outlen = (unsigned char)RSTRING_LEN(selected);
|
705
|
+
|
706
|
+
return SSL_TLSEXT_ERR_OK;
|
707
|
+
}
|
708
|
+
|
709
|
+
#ifdef OSSL_USE_NEXTPROTONEG
|
710
|
+
static int
|
711
|
+
ssl_npn_advertise_cb(SSL *ssl, const unsigned char **out, unsigned int *outlen,
|
712
|
+
void *arg)
|
713
|
+
{
|
714
|
+
VALUE protocols = rb_attr_get((VALUE)arg, id_npn_protocols_encoded);
|
715
|
+
|
716
|
+
*out = (const unsigned char *) RSTRING_PTR(protocols);
|
717
|
+
*outlen = RSTRING_LENINT(protocols);
|
718
|
+
|
719
|
+
return SSL_TLSEXT_ERR_OK;
|
720
|
+
}
|
721
|
+
|
722
|
+
static int
|
723
|
+
ssl_npn_select_cb(SSL *ssl, unsigned char **out, unsigned char *outlen,
|
724
|
+
const unsigned char *in, unsigned int inlen, void *arg)
|
725
|
+
{
|
726
|
+
VALUE sslctx_obj, cb;
|
727
|
+
|
728
|
+
sslctx_obj = (VALUE) arg;
|
729
|
+
cb = rb_attr_get(sslctx_obj, id_i_npn_select_cb);
|
730
|
+
|
731
|
+
return ssl_npn_select_cb_common(ssl, cb, (const unsigned char **)out,
|
732
|
+
outlen, in, inlen);
|
733
|
+
}
|
734
|
+
#endif
|
735
|
+
|
736
|
+
static int
|
737
|
+
ssl_alpn_select_cb(SSL *ssl, const unsigned char **out, unsigned char *outlen,
|
738
|
+
const unsigned char *in, unsigned int inlen, void *arg)
|
739
|
+
{
|
740
|
+
VALUE sslctx_obj, cb;
|
741
|
+
|
742
|
+
sslctx_obj = (VALUE) arg;
|
743
|
+
cb = rb_attr_get(sslctx_obj, id_i_alpn_select_cb);
|
744
|
+
|
745
|
+
return ssl_npn_select_cb_common(ssl, cb, out, outlen, in, inlen);
|
746
|
+
}
|
747
|
+
|
748
|
+
/* This function may serve as the entry point to support further callbacks. */
|
749
|
+
static void
|
750
|
+
ssl_info_cb(const SSL *ssl, int where, int val)
|
751
|
+
{
|
752
|
+
int is_server = SSL_is_server((SSL *)ssl);
|
753
|
+
|
754
|
+
if (is_server && where & SSL_CB_HANDSHAKE_START) {
|
755
|
+
ssl_renegotiation_cb(ssl);
|
756
|
+
}
|
757
|
+
}
|
758
|
+
|
759
|
+
/*
|
760
|
+
* Gets various OpenSSL options.
|
761
|
+
*/
|
762
|
+
static VALUE
|
763
|
+
ossl_sslctx_get_options(VALUE self)
|
764
|
+
{
|
765
|
+
SSL_CTX *ctx;
|
766
|
+
GetSSLCTX(self, ctx);
|
767
|
+
/*
|
768
|
+
* Do explicit cast because SSL_CTX_get_options() returned (signed) long in
|
769
|
+
* OpenSSL before 1.1.0.
|
770
|
+
*/
|
771
|
+
return ULONG2NUM((unsigned long)SSL_CTX_get_options(ctx));
|
772
|
+
}
|
773
|
+
|
774
|
+
/*
|
775
|
+
* Sets various OpenSSL options.
|
776
|
+
*/
|
777
|
+
static VALUE
|
778
|
+
ossl_sslctx_set_options(VALUE self, VALUE options)
|
779
|
+
{
|
780
|
+
SSL_CTX *ctx;
|
781
|
+
|
782
|
+
rb_check_frozen(self);
|
783
|
+
GetSSLCTX(self, ctx);
|
784
|
+
|
785
|
+
SSL_CTX_clear_options(ctx, SSL_CTX_get_options(ctx));
|
786
|
+
|
787
|
+
if (NIL_P(options)) {
|
788
|
+
SSL_CTX_set_options(ctx, SSL_OP_ALL);
|
789
|
+
} else {
|
790
|
+
SSL_CTX_set_options(ctx, NUM2ULONG(options));
|
791
|
+
}
|
792
|
+
|
793
|
+
return self;
|
794
|
+
}
|
795
|
+
|
796
|
+
/*
|
797
|
+
* call-seq:
|
798
|
+
* ctx.setup => Qtrue # first time
|
799
|
+
* ctx.setup => nil # thereafter
|
800
|
+
*
|
801
|
+
* This method is called automatically when a new SSLSocket is created.
|
802
|
+
* However, it is not thread-safe and must be called before creating
|
803
|
+
* SSLSocket objects in a multi-threaded program.
|
804
|
+
*/
|
805
|
+
static VALUE
|
806
|
+
ossl_sslctx_setup(VALUE self)
|
807
|
+
{
|
808
|
+
SSL_CTX *ctx;
|
809
|
+
X509 *cert = NULL, *client_ca = NULL;
|
810
|
+
EVP_PKEY *key = NULL;
|
811
|
+
char *ca_path = NULL, *ca_file = NULL;
|
812
|
+
int verify_mode;
|
813
|
+
long i;
|
814
|
+
VALUE val;
|
815
|
+
|
816
|
+
if(OBJ_FROZEN(self)) return Qnil;
|
817
|
+
GetSSLCTX(self, ctx);
|
818
|
+
|
819
|
+
#if !defined(OPENSSL_NO_DH)
|
820
|
+
SSL_CTX_set_tmp_dh_callback(ctx, ossl_tmp_dh_callback);
|
821
|
+
#endif
|
822
|
+
|
823
|
+
#ifdef HAVE_SSL_CTX_SET_POST_HANDSHAKE_AUTH
|
824
|
+
SSL_CTX_set_post_handshake_auth(ctx, 1);
|
825
|
+
#endif
|
826
|
+
|
827
|
+
val = rb_attr_get(self, id_i_cert_store);
|
828
|
+
if (!NIL_P(val)) {
|
829
|
+
X509_STORE *store = GetX509StorePtr(val); /* NO NEED TO DUP */
|
830
|
+
SSL_CTX_set_cert_store(ctx, store);
|
831
|
+
X509_STORE_up_ref(store);
|
832
|
+
}
|
833
|
+
|
834
|
+
val = rb_attr_get(self, id_i_extra_chain_cert);
|
835
|
+
if(!NIL_P(val)){
|
836
|
+
rb_block_call(val, rb_intern("each"), 0, 0, ossl_sslctx_add_extra_chain_cert_i, self);
|
837
|
+
}
|
838
|
+
|
839
|
+
/* private key may be bundled in certificate file. */
|
840
|
+
val = rb_attr_get(self, id_i_cert);
|
841
|
+
cert = NIL_P(val) ? NULL : GetX509CertPtr(val); /* NO DUP NEEDED */
|
842
|
+
val = rb_attr_get(self, id_i_key);
|
843
|
+
key = NIL_P(val) ? NULL : GetPrivPKeyPtr(val); /* NO DUP NEEDED */
|
844
|
+
if (cert && key) {
|
845
|
+
if (!SSL_CTX_use_certificate(ctx, cert)) {
|
846
|
+
/* Adds a ref => Safe to FREE */
|
847
|
+
ossl_raise(eSSLError, "SSL_CTX_use_certificate");
|
848
|
+
}
|
849
|
+
if (!SSL_CTX_use_PrivateKey(ctx, key)) {
|
850
|
+
/* Adds a ref => Safe to FREE */
|
851
|
+
ossl_raise(eSSLError, "SSL_CTX_use_PrivateKey");
|
852
|
+
}
|
853
|
+
if (!SSL_CTX_check_private_key(ctx)) {
|
854
|
+
ossl_raise(eSSLError, "SSL_CTX_check_private_key");
|
855
|
+
}
|
856
|
+
}
|
857
|
+
|
858
|
+
val = rb_attr_get(self, id_i_client_ca);
|
859
|
+
if(!NIL_P(val)){
|
860
|
+
if (RB_TYPE_P(val, T_ARRAY)) {
|
861
|
+
for(i = 0; i < RARRAY_LEN(val); i++){
|
862
|
+
client_ca = GetX509CertPtr(RARRAY_AREF(val, i));
|
863
|
+
if (!SSL_CTX_add_client_CA(ctx, client_ca)){
|
864
|
+
/* Copies X509_NAME => FREE it. */
|
865
|
+
ossl_raise(eSSLError, "SSL_CTX_add_client_CA");
|
866
|
+
}
|
867
|
+
}
|
868
|
+
}
|
869
|
+
else{
|
870
|
+
client_ca = GetX509CertPtr(val); /* NO DUP NEEDED. */
|
871
|
+
if (!SSL_CTX_add_client_CA(ctx, client_ca)){
|
872
|
+
/* Copies X509_NAME => FREE it. */
|
873
|
+
ossl_raise(eSSLError, "SSL_CTX_add_client_CA");
|
874
|
+
}
|
875
|
+
}
|
876
|
+
}
|
877
|
+
|
878
|
+
val = rb_attr_get(self, id_i_ca_file);
|
879
|
+
ca_file = NIL_P(val) ? NULL : StringValueCStr(val);
|
880
|
+
val = rb_attr_get(self, id_i_ca_path);
|
881
|
+
ca_path = NIL_P(val) ? NULL : StringValueCStr(val);
|
882
|
+
#ifdef HAVE_SSL_CTX_LOAD_VERIFY_FILE
|
883
|
+
if (ca_file && !SSL_CTX_load_verify_file(ctx, ca_file))
|
884
|
+
ossl_raise(eSSLError, "SSL_CTX_load_verify_file");
|
885
|
+
if (ca_path && !SSL_CTX_load_verify_dir(ctx, ca_path))
|
886
|
+
ossl_raise(eSSLError, "SSL_CTX_load_verify_dir");
|
887
|
+
#else
|
888
|
+
if(ca_file || ca_path){
|
889
|
+
if (!SSL_CTX_load_verify_locations(ctx, ca_file, ca_path))
|
890
|
+
rb_warning("can't set verify locations");
|
891
|
+
}
|
892
|
+
#endif
|
893
|
+
|
894
|
+
val = rb_attr_get(self, id_i_verify_mode);
|
895
|
+
verify_mode = NIL_P(val) ? SSL_VERIFY_NONE : NUM2INT(val);
|
896
|
+
SSL_CTX_set_verify(ctx, verify_mode, ossl_ssl_verify_callback);
|
897
|
+
if (RTEST(rb_attr_get(self, id_i_client_cert_cb)))
|
898
|
+
SSL_CTX_set_client_cert_cb(ctx, ossl_client_cert_cb);
|
899
|
+
|
900
|
+
val = rb_attr_get(self, id_i_timeout);
|
901
|
+
if(!NIL_P(val)) SSL_CTX_set_timeout(ctx, NUM2LONG(val));
|
902
|
+
|
903
|
+
val = rb_attr_get(self, id_i_verify_depth);
|
904
|
+
if(!NIL_P(val)) SSL_CTX_set_verify_depth(ctx, NUM2INT(val));
|
905
|
+
|
906
|
+
#ifdef OSSL_USE_NEXTPROTONEG
|
907
|
+
val = rb_attr_get(self, id_i_npn_protocols);
|
908
|
+
if (!NIL_P(val)) {
|
909
|
+
VALUE encoded = ssl_encode_npn_protocols(val);
|
910
|
+
rb_ivar_set(self, id_npn_protocols_encoded, encoded);
|
911
|
+
SSL_CTX_set_next_protos_advertised_cb(ctx, ssl_npn_advertise_cb, (void *)self);
|
912
|
+
OSSL_Debug("SSL NPN advertise callback added");
|
913
|
+
}
|
914
|
+
if (RTEST(rb_attr_get(self, id_i_npn_select_cb))) {
|
915
|
+
SSL_CTX_set_next_proto_select_cb(ctx, ssl_npn_select_cb, (void *) self);
|
916
|
+
OSSL_Debug("SSL NPN select callback added");
|
917
|
+
}
|
918
|
+
#endif
|
919
|
+
|
920
|
+
val = rb_attr_get(self, id_i_alpn_protocols);
|
921
|
+
if (!NIL_P(val)) {
|
922
|
+
VALUE rprotos = ssl_encode_npn_protocols(val);
|
923
|
+
|
924
|
+
/* returns 0 on success */
|
925
|
+
if (SSL_CTX_set_alpn_protos(ctx, (unsigned char *)RSTRING_PTR(rprotos),
|
926
|
+
RSTRING_LENINT(rprotos)))
|
927
|
+
ossl_raise(eSSLError, "SSL_CTX_set_alpn_protos");
|
928
|
+
OSSL_Debug("SSL ALPN values added");
|
929
|
+
}
|
930
|
+
if (RTEST(rb_attr_get(self, id_i_alpn_select_cb))) {
|
931
|
+
SSL_CTX_set_alpn_select_cb(ctx, ssl_alpn_select_cb, (void *) self);
|
932
|
+
OSSL_Debug("SSL ALPN select callback added");
|
933
|
+
}
|
934
|
+
|
935
|
+
rb_obj_freeze(self);
|
936
|
+
|
937
|
+
val = rb_attr_get(self, id_i_session_id_context);
|
938
|
+
if (!NIL_P(val)){
|
939
|
+
StringValue(val);
|
940
|
+
if (!SSL_CTX_set_session_id_context(ctx, (unsigned char *)RSTRING_PTR(val),
|
941
|
+
RSTRING_LENINT(val))){
|
942
|
+
ossl_raise(eSSLError, "SSL_CTX_set_session_id_context");
|
943
|
+
}
|
944
|
+
}
|
945
|
+
|
946
|
+
if (RTEST(rb_attr_get(self, id_i_session_get_cb))) {
|
947
|
+
SSL_CTX_sess_set_get_cb(ctx, ossl_sslctx_session_get_cb);
|
948
|
+
OSSL_Debug("SSL SESSION get callback added");
|
949
|
+
}
|
950
|
+
if (RTEST(rb_attr_get(self, id_i_session_new_cb))) {
|
951
|
+
SSL_CTX_sess_set_new_cb(ctx, ossl_sslctx_session_new_cb);
|
952
|
+
OSSL_Debug("SSL SESSION new callback added");
|
953
|
+
}
|
954
|
+
if (RTEST(rb_attr_get(self, id_i_session_remove_cb))) {
|
955
|
+
SSL_CTX_sess_set_remove_cb(ctx, ossl_sslctx_session_remove_cb);
|
956
|
+
OSSL_Debug("SSL SESSION remove callback added");
|
957
|
+
}
|
958
|
+
|
959
|
+
val = rb_attr_get(self, id_i_servername_cb);
|
960
|
+
if (!NIL_P(val)) {
|
961
|
+
SSL_CTX_set_tlsext_servername_callback(ctx, ssl_servername_cb);
|
962
|
+
OSSL_Debug("SSL TLSEXT servername callback added");
|
963
|
+
}
|
964
|
+
|
965
|
+
#if OPENSSL_VERSION_NUMBER >= 0x10101000 && !defined(LIBRESSL_VERSION_NUMBER)
|
966
|
+
/*
|
967
|
+
* It is only compatible with OpenSSL >= 1.1.1. Even if LibreSSL implements
|
968
|
+
* SSL_CTX_set_keylog_callback() from v3.4.2, it does nothing (see
|
969
|
+
* https://github.com/libressl-portable/openbsd/commit/648d39f0f035835d0653342d139883b9661e9cb6).
|
970
|
+
*/
|
971
|
+
if (RTEST(rb_attr_get(self, id_i_keylog_cb))) {
|
972
|
+
SSL_CTX_set_keylog_callback(ctx, ossl_sslctx_keylog_cb);
|
973
|
+
OSSL_Debug("SSL keylog callback added");
|
974
|
+
}
|
975
|
+
#endif
|
976
|
+
|
977
|
+
return Qtrue;
|
978
|
+
}
|
979
|
+
|
980
|
+
static VALUE
|
981
|
+
ossl_ssl_cipher_to_ary(const SSL_CIPHER *cipher)
|
982
|
+
{
|
983
|
+
VALUE ary;
|
984
|
+
int bits, alg_bits;
|
985
|
+
|
986
|
+
ary = rb_ary_new2(4);
|
987
|
+
rb_ary_push(ary, rb_str_new2(SSL_CIPHER_get_name(cipher)));
|
988
|
+
rb_ary_push(ary, rb_str_new2(SSL_CIPHER_get_version(cipher)));
|
989
|
+
bits = SSL_CIPHER_get_bits(cipher, &alg_bits);
|
990
|
+
rb_ary_push(ary, INT2NUM(bits));
|
991
|
+
rb_ary_push(ary, INT2NUM(alg_bits));
|
992
|
+
|
993
|
+
return ary;
|
994
|
+
}
|
995
|
+
|
996
|
+
/*
|
997
|
+
* call-seq:
|
998
|
+
* ctx.ciphers => [[name, version, bits, alg_bits], ...]
|
999
|
+
*
|
1000
|
+
* The list of cipher suites configured for this context.
|
1001
|
+
*/
|
1002
|
+
static VALUE
|
1003
|
+
ossl_sslctx_get_ciphers(VALUE self)
|
1004
|
+
{
|
1005
|
+
SSL_CTX *ctx;
|
1006
|
+
STACK_OF(SSL_CIPHER) *ciphers;
|
1007
|
+
const SSL_CIPHER *cipher;
|
1008
|
+
VALUE ary;
|
1009
|
+
int i, num;
|
1010
|
+
|
1011
|
+
GetSSLCTX(self, ctx);
|
1012
|
+
ciphers = SSL_CTX_get_ciphers(ctx);
|
1013
|
+
if (!ciphers)
|
1014
|
+
return rb_ary_new();
|
1015
|
+
|
1016
|
+
num = sk_SSL_CIPHER_num(ciphers);
|
1017
|
+
ary = rb_ary_new2(num);
|
1018
|
+
for(i = 0; i < num; i++){
|
1019
|
+
cipher = sk_SSL_CIPHER_value(ciphers, i);
|
1020
|
+
rb_ary_push(ary, ossl_ssl_cipher_to_ary(cipher));
|
1021
|
+
}
|
1022
|
+
return ary;
|
1023
|
+
}
|
1024
|
+
|
1025
|
+
static VALUE
|
1026
|
+
build_cipher_string(VALUE v)
|
1027
|
+
{
|
1028
|
+
VALUE str, elem;
|
1029
|
+
int i;
|
1030
|
+
|
1031
|
+
if (RB_TYPE_P(v, T_ARRAY)) {
|
1032
|
+
str = rb_str_new(0, 0);
|
1033
|
+
for (i = 0; i < RARRAY_LEN(v); i++) {
|
1034
|
+
elem = rb_ary_entry(v, i);
|
1035
|
+
if (RB_TYPE_P(elem, T_ARRAY)) elem = rb_ary_entry(elem, 0);
|
1036
|
+
elem = rb_String(elem);
|
1037
|
+
rb_str_append(str, elem);
|
1038
|
+
if (i < RARRAY_LEN(v)-1) rb_str_cat2(str, ":");
|
1039
|
+
}
|
1040
|
+
} else {
|
1041
|
+
str = v;
|
1042
|
+
StringValue(str);
|
1043
|
+
}
|
1044
|
+
|
1045
|
+
return str;
|
1046
|
+
}
|
1047
|
+
|
1048
|
+
/*
|
1049
|
+
* call-seq:
|
1050
|
+
* ctx.ciphers = "cipher1:cipher2:..."
|
1051
|
+
* ctx.ciphers = [name, ...]
|
1052
|
+
* ctx.ciphers = [[name, version, bits, alg_bits], ...]
|
1053
|
+
*
|
1054
|
+
* Sets the list of available cipher suites for this context. Note in a server
|
1055
|
+
* context some ciphers require the appropriate certificates. For example, an
|
1056
|
+
* RSA cipher suite can only be chosen when an RSA certificate is available.
|
1057
|
+
*/
|
1058
|
+
static VALUE
|
1059
|
+
ossl_sslctx_set_ciphers(VALUE self, VALUE v)
|
1060
|
+
{
|
1061
|
+
SSL_CTX *ctx;
|
1062
|
+
VALUE str;
|
1063
|
+
|
1064
|
+
rb_check_frozen(self);
|
1065
|
+
if (NIL_P(v))
|
1066
|
+
return v;
|
1067
|
+
|
1068
|
+
str = build_cipher_string(v);
|
1069
|
+
|
1070
|
+
GetSSLCTX(self, ctx);
|
1071
|
+
if (!SSL_CTX_set_cipher_list(ctx, StringValueCStr(str)))
|
1072
|
+
ossl_raise(eSSLError, "SSL_CTX_set_cipher_list");
|
1073
|
+
|
1074
|
+
return v;
|
1075
|
+
}
|
1076
|
+
|
1077
|
+
#ifdef HAVE_SSL_CTX_SET_CIPHERSUITES
|
1078
|
+
/*
|
1079
|
+
* call-seq:
|
1080
|
+
* ctx.ciphersuites = "cipher1:cipher2:..."
|
1081
|
+
* ctx.ciphersuites = [name, ...]
|
1082
|
+
* ctx.ciphersuites = [[name, version, bits, alg_bits], ...]
|
1083
|
+
*
|
1084
|
+
* Sets the list of available TLSv1.3 cipher suites for this context.
|
1085
|
+
*/
|
1086
|
+
static VALUE
|
1087
|
+
ossl_sslctx_set_ciphersuites(VALUE self, VALUE v)
|
1088
|
+
{
|
1089
|
+
SSL_CTX *ctx;
|
1090
|
+
VALUE str;
|
1091
|
+
|
1092
|
+
rb_check_frozen(self);
|
1093
|
+
if (NIL_P(v))
|
1094
|
+
return v;
|
1095
|
+
|
1096
|
+
str = build_cipher_string(v);
|
1097
|
+
|
1098
|
+
GetSSLCTX(self, ctx);
|
1099
|
+
if (!SSL_CTX_set_ciphersuites(ctx, StringValueCStr(str)))
|
1100
|
+
ossl_raise(eSSLError, "SSL_CTX_set_ciphersuites");
|
1101
|
+
|
1102
|
+
return v;
|
1103
|
+
}
|
1104
|
+
#endif
|
1105
|
+
|
1106
|
+
#ifndef OPENSSL_NO_DH
|
1107
|
+
/*
|
1108
|
+
* call-seq:
|
1109
|
+
* ctx.tmp_dh = pkey
|
1110
|
+
*
|
1111
|
+
* Sets DH parameters used for ephemeral DH key exchange. This is relevant for
|
1112
|
+
* servers only.
|
1113
|
+
*
|
1114
|
+
* +pkey+ is an instance of OpenSSL::PKey::DH. Note that key components
|
1115
|
+
* contained in the key object, if any, are ignored. The server will always
|
1116
|
+
* generate a new key pair for each handshake.
|
1117
|
+
*
|
1118
|
+
* Added in version 3.0. See also the man page SSL_set0_tmp_dh_pkey(3).
|
1119
|
+
*
|
1120
|
+
* Example:
|
1121
|
+
* ctx = OpenSSL::SSL::SSLContext.new
|
1122
|
+
* ctx.tmp_dh = OpenSSL::DH.generate(2048)
|
1123
|
+
* svr = OpenSSL::SSL::SSLServer.new(tcp_svr, ctx)
|
1124
|
+
* Thread.new { svr.accept }
|
1125
|
+
*/
|
1126
|
+
static VALUE
|
1127
|
+
ossl_sslctx_set_tmp_dh(VALUE self, VALUE arg)
|
1128
|
+
{
|
1129
|
+
SSL_CTX *ctx;
|
1130
|
+
EVP_PKEY *pkey;
|
1131
|
+
|
1132
|
+
rb_check_frozen(self);
|
1133
|
+
GetSSLCTX(self, ctx);
|
1134
|
+
pkey = GetPKeyPtr(arg);
|
1135
|
+
|
1136
|
+
if (EVP_PKEY_base_id(pkey) != EVP_PKEY_DH)
|
1137
|
+
rb_raise(eSSLError, "invalid pkey type %s (expected DH)",
|
1138
|
+
OBJ_nid2sn(EVP_PKEY_base_id(pkey)));
|
1139
|
+
#ifdef HAVE_SSL_SET0_TMP_DH_PKEY
|
1140
|
+
if (!SSL_CTX_set0_tmp_dh_pkey(ctx, pkey))
|
1141
|
+
ossl_raise(eSSLError, "SSL_CTX_set0_tmp_dh_pkey");
|
1142
|
+
EVP_PKEY_up_ref(pkey);
|
1143
|
+
#else
|
1144
|
+
if (!SSL_CTX_set_tmp_dh(ctx, EVP_PKEY_get0_DH(pkey)))
|
1145
|
+
ossl_raise(eSSLError, "SSL_CTX_set_tmp_dh");
|
1146
|
+
#endif
|
1147
|
+
|
1148
|
+
return arg;
|
1149
|
+
}
|
1150
|
+
#endif
|
1151
|
+
|
1152
|
+
#if !defined(OPENSSL_NO_EC)
|
1153
|
+
/*
|
1154
|
+
* call-seq:
|
1155
|
+
* ctx.ecdh_curves = curve_list -> curve_list
|
1156
|
+
*
|
1157
|
+
* Sets the list of "supported elliptic curves" for this context.
|
1158
|
+
*
|
1159
|
+
* For a TLS client, the list is directly used in the Supported Elliptic Curves
|
1160
|
+
* Extension. For a server, the list is used by OpenSSL to determine the set of
|
1161
|
+
* shared curves. OpenSSL will pick the most appropriate one from it.
|
1162
|
+
*
|
1163
|
+
* === Example
|
1164
|
+
* ctx1 = OpenSSL::SSL::SSLContext.new
|
1165
|
+
* ctx1.ecdh_curves = "X25519:P-256:P-224"
|
1166
|
+
* svr = OpenSSL::SSL::SSLServer.new(tcp_svr, ctx1)
|
1167
|
+
* Thread.new { svr.accept }
|
1168
|
+
*
|
1169
|
+
* ctx2 = OpenSSL::SSL::SSLContext.new
|
1170
|
+
* ctx2.ecdh_curves = "P-256"
|
1171
|
+
* cli = OpenSSL::SSL::SSLSocket.new(tcp_sock, ctx2)
|
1172
|
+
* cli.connect
|
1173
|
+
*
|
1174
|
+
* p cli.tmp_key.group.curve_name
|
1175
|
+
* # => "prime256v1" (is an alias for NIST P-256)
|
1176
|
+
*/
|
1177
|
+
static VALUE
|
1178
|
+
ossl_sslctx_set_ecdh_curves(VALUE self, VALUE arg)
|
1179
|
+
{
|
1180
|
+
SSL_CTX *ctx;
|
1181
|
+
|
1182
|
+
rb_check_frozen(self);
|
1183
|
+
GetSSLCTX(self, ctx);
|
1184
|
+
StringValueCStr(arg);
|
1185
|
+
|
1186
|
+
if (!SSL_CTX_set1_curves_list(ctx, RSTRING_PTR(arg)))
|
1187
|
+
ossl_raise(eSSLError, NULL);
|
1188
|
+
return arg;
|
1189
|
+
}
|
1190
|
+
#else
|
1191
|
+
#define ossl_sslctx_set_ecdh_curves rb_f_notimplement
|
1192
|
+
#endif
|
1193
|
+
|
1194
|
+
/*
|
1195
|
+
* call-seq:
|
1196
|
+
* ctx.security_level -> Integer
|
1197
|
+
*
|
1198
|
+
* Returns the security level for the context.
|
1199
|
+
*
|
1200
|
+
* See also OpenSSL::SSL::SSLContext#security_level=.
|
1201
|
+
*/
|
1202
|
+
static VALUE
|
1203
|
+
ossl_sslctx_get_security_level(VALUE self)
|
1204
|
+
{
|
1205
|
+
SSL_CTX *ctx;
|
1206
|
+
|
1207
|
+
GetSSLCTX(self, ctx);
|
1208
|
+
|
1209
|
+
#if defined(HAVE_SSL_CTX_GET_SECURITY_LEVEL)
|
1210
|
+
return INT2NUM(SSL_CTX_get_security_level(ctx));
|
1211
|
+
#else
|
1212
|
+
(void)ctx;
|
1213
|
+
return INT2FIX(0);
|
1214
|
+
#endif
|
1215
|
+
}
|
1216
|
+
|
1217
|
+
/*
|
1218
|
+
* call-seq:
|
1219
|
+
* ctx.security_level = integer
|
1220
|
+
*
|
1221
|
+
* Sets the security level for the context. OpenSSL limits parameters according
|
1222
|
+
* to the level. The "parameters" include: ciphersuites, curves, key sizes,
|
1223
|
+
* certificate signature algorithms, protocol version and so on. For example,
|
1224
|
+
* level 1 rejects parameters offering below 80 bits of security, such as
|
1225
|
+
* ciphersuites using MD5 for the MAC or RSA keys shorter than 1024 bits.
|
1226
|
+
*
|
1227
|
+
* Note that attempts to set such parameters with insufficient security are
|
1228
|
+
* also blocked. You need to lower the level first.
|
1229
|
+
*
|
1230
|
+
* This feature is not supported in OpenSSL < 1.1.0, and setting the level to
|
1231
|
+
* other than 0 will raise NotImplementedError. Level 0 means everything is
|
1232
|
+
* permitted, the same behavior as previous versions of OpenSSL.
|
1233
|
+
*
|
1234
|
+
* See the manpage of SSL_CTX_set_security_level(3) for details.
|
1235
|
+
*/
|
1236
|
+
static VALUE
|
1237
|
+
ossl_sslctx_set_security_level(VALUE self, VALUE value)
|
1238
|
+
{
|
1239
|
+
SSL_CTX *ctx;
|
1240
|
+
|
1241
|
+
rb_check_frozen(self);
|
1242
|
+
GetSSLCTX(self, ctx);
|
1243
|
+
|
1244
|
+
#if defined(HAVE_SSL_CTX_GET_SECURITY_LEVEL)
|
1245
|
+
SSL_CTX_set_security_level(ctx, NUM2INT(value));
|
1246
|
+
#else
|
1247
|
+
(void)ctx;
|
1248
|
+
if (NUM2INT(value) != 0)
|
1249
|
+
ossl_raise(rb_eNotImpError, "setting security level to other than 0 is "
|
1250
|
+
"not supported in this version of OpenSSL");
|
1251
|
+
#endif
|
1252
|
+
|
1253
|
+
return value;
|
1254
|
+
}
|
1255
|
+
|
1256
|
+
#ifdef SSL_MODE_SEND_FALLBACK_SCSV
|
1257
|
+
/*
|
1258
|
+
* call-seq:
|
1259
|
+
* ctx.enable_fallback_scsv() => nil
|
1260
|
+
*
|
1261
|
+
* Activate TLS_FALLBACK_SCSV for this context.
|
1262
|
+
* See RFC 7507.
|
1263
|
+
*/
|
1264
|
+
static VALUE
|
1265
|
+
ossl_sslctx_enable_fallback_scsv(VALUE self)
|
1266
|
+
{
|
1267
|
+
SSL_CTX *ctx;
|
1268
|
+
|
1269
|
+
GetSSLCTX(self, ctx);
|
1270
|
+
SSL_CTX_set_mode(ctx, SSL_MODE_SEND_FALLBACK_SCSV);
|
1271
|
+
|
1272
|
+
return Qnil;
|
1273
|
+
}
|
1274
|
+
#endif
|
1275
|
+
|
1276
|
+
/*
|
1277
|
+
* call-seq:
|
1278
|
+
* ctx.add_certificate(certificate, pkey [, extra_certs]) -> self
|
1279
|
+
*
|
1280
|
+
* Adds a certificate to the context. _pkey_ must be a corresponding private
|
1281
|
+
* key with _certificate_.
|
1282
|
+
*
|
1283
|
+
* Multiple certificates with different public key type can be added by
|
1284
|
+
* repeated calls of this method, and OpenSSL will choose the most appropriate
|
1285
|
+
* certificate during the handshake.
|
1286
|
+
*
|
1287
|
+
* #cert=, #key=, and #extra_chain_cert= are old accessor methods for setting
|
1288
|
+
* certificate and internally call this method.
|
1289
|
+
*
|
1290
|
+
* === Parameters
|
1291
|
+
* _certificate_::
|
1292
|
+
* A certificate. An instance of OpenSSL::X509::Certificate.
|
1293
|
+
* _pkey_::
|
1294
|
+
* The private key for _certificate_. An instance of OpenSSL::PKey::PKey.
|
1295
|
+
* _extra_certs_::
|
1296
|
+
* Optional. An array of OpenSSL::X509::Certificate. When sending a
|
1297
|
+
* certificate chain, the certificates specified by this are sent following
|
1298
|
+
* _certificate_, in the order in the array.
|
1299
|
+
*
|
1300
|
+
* === Example
|
1301
|
+
* rsa_cert = OpenSSL::X509::Certificate.new(...)
|
1302
|
+
* rsa_pkey = OpenSSL::PKey.read(...)
|
1303
|
+
* ca_intermediate_cert = OpenSSL::X509::Certificate.new(...)
|
1304
|
+
* ctx.add_certificate(rsa_cert, rsa_pkey, [ca_intermediate_cert])
|
1305
|
+
*
|
1306
|
+
* ecdsa_cert = ...
|
1307
|
+
* ecdsa_pkey = ...
|
1308
|
+
* another_ca_cert = ...
|
1309
|
+
* ctx.add_certificate(ecdsa_cert, ecdsa_pkey, [another_ca_cert])
|
1310
|
+
*/
|
1311
|
+
static VALUE
|
1312
|
+
ossl_sslctx_add_certificate(int argc, VALUE *argv, VALUE self)
|
1313
|
+
{
|
1314
|
+
VALUE cert, key, extra_chain_ary;
|
1315
|
+
SSL_CTX *ctx;
|
1316
|
+
X509 *x509;
|
1317
|
+
STACK_OF(X509) *extra_chain = NULL;
|
1318
|
+
EVP_PKEY *pkey, *pub_pkey;
|
1319
|
+
|
1320
|
+
GetSSLCTX(self, ctx);
|
1321
|
+
rb_scan_args(argc, argv, "21", &cert, &key, &extra_chain_ary);
|
1322
|
+
rb_check_frozen(self);
|
1323
|
+
x509 = GetX509CertPtr(cert);
|
1324
|
+
pkey = GetPrivPKeyPtr(key);
|
1325
|
+
|
1326
|
+
/*
|
1327
|
+
* The reference counter is bumped, and decremented immediately.
|
1328
|
+
* X509_get0_pubkey() is only available in OpenSSL >= 1.1.0.
|
1329
|
+
*/
|
1330
|
+
pub_pkey = X509_get_pubkey(x509);
|
1331
|
+
EVP_PKEY_free(pub_pkey);
|
1332
|
+
if (!pub_pkey)
|
1333
|
+
rb_raise(rb_eArgError, "certificate does not contain public key");
|
1334
|
+
if (EVP_PKEY_eq(pub_pkey, pkey) != 1)
|
1335
|
+
rb_raise(rb_eArgError, "public key mismatch");
|
1336
|
+
|
1337
|
+
if (argc >= 3)
|
1338
|
+
extra_chain = ossl_x509_ary2sk(extra_chain_ary);
|
1339
|
+
|
1340
|
+
if (!SSL_CTX_use_certificate(ctx, x509)) {
|
1341
|
+
sk_X509_pop_free(extra_chain, X509_free);
|
1342
|
+
ossl_raise(eSSLError, "SSL_CTX_use_certificate");
|
1343
|
+
}
|
1344
|
+
if (!SSL_CTX_use_PrivateKey(ctx, pkey)) {
|
1345
|
+
sk_X509_pop_free(extra_chain, X509_free);
|
1346
|
+
ossl_raise(eSSLError, "SSL_CTX_use_PrivateKey");
|
1347
|
+
}
|
1348
|
+
if (extra_chain && !SSL_CTX_set0_chain(ctx, extra_chain)) {
|
1349
|
+
sk_X509_pop_free(extra_chain, X509_free);
|
1350
|
+
ossl_raise(eSSLError, "SSL_CTX_set0_chain");
|
1351
|
+
}
|
1352
|
+
return self;
|
1353
|
+
}
|
1354
|
+
|
1355
|
+
/*
|
1356
|
+
* call-seq:
|
1357
|
+
* ctx.session_add(session) -> true | false
|
1358
|
+
*
|
1359
|
+
* Adds _session_ to the session cache.
|
1360
|
+
*/
|
1361
|
+
static VALUE
|
1362
|
+
ossl_sslctx_session_add(VALUE self, VALUE arg)
|
1363
|
+
{
|
1364
|
+
SSL_CTX *ctx;
|
1365
|
+
SSL_SESSION *sess;
|
1366
|
+
|
1367
|
+
GetSSLCTX(self, ctx);
|
1368
|
+
GetSSLSession(arg, sess);
|
1369
|
+
|
1370
|
+
return SSL_CTX_add_session(ctx, sess) == 1 ? Qtrue : Qfalse;
|
1371
|
+
}
|
1372
|
+
|
1373
|
+
/*
|
1374
|
+
* call-seq:
|
1375
|
+
* ctx.session_remove(session) -> true | false
|
1376
|
+
*
|
1377
|
+
* Removes _session_ from the session cache.
|
1378
|
+
*/
|
1379
|
+
static VALUE
|
1380
|
+
ossl_sslctx_session_remove(VALUE self, VALUE arg)
|
1381
|
+
{
|
1382
|
+
SSL_CTX *ctx;
|
1383
|
+
SSL_SESSION *sess;
|
1384
|
+
|
1385
|
+
GetSSLCTX(self, ctx);
|
1386
|
+
GetSSLSession(arg, sess);
|
1387
|
+
|
1388
|
+
return SSL_CTX_remove_session(ctx, sess) == 1 ? Qtrue : Qfalse;
|
1389
|
+
}
|
1390
|
+
|
1391
|
+
/*
|
1392
|
+
* call-seq:
|
1393
|
+
* ctx.session_cache_mode -> Integer
|
1394
|
+
*
|
1395
|
+
* The current session cache mode.
|
1396
|
+
*/
|
1397
|
+
static VALUE
|
1398
|
+
ossl_sslctx_get_session_cache_mode(VALUE self)
|
1399
|
+
{
|
1400
|
+
SSL_CTX *ctx;
|
1401
|
+
|
1402
|
+
GetSSLCTX(self, ctx);
|
1403
|
+
|
1404
|
+
return LONG2NUM(SSL_CTX_get_session_cache_mode(ctx));
|
1405
|
+
}
|
1406
|
+
|
1407
|
+
/*
|
1408
|
+
* call-seq:
|
1409
|
+
* ctx.session_cache_mode=(integer) -> Integer
|
1410
|
+
*
|
1411
|
+
* Sets the SSL session cache mode. Bitwise-or together the desired
|
1412
|
+
* SESSION_CACHE_* constants to set. See SSL_CTX_set_session_cache_mode(3) for
|
1413
|
+
* details.
|
1414
|
+
*/
|
1415
|
+
static VALUE
|
1416
|
+
ossl_sslctx_set_session_cache_mode(VALUE self, VALUE arg)
|
1417
|
+
{
|
1418
|
+
SSL_CTX *ctx;
|
1419
|
+
|
1420
|
+
GetSSLCTX(self, ctx);
|
1421
|
+
|
1422
|
+
SSL_CTX_set_session_cache_mode(ctx, NUM2LONG(arg));
|
1423
|
+
|
1424
|
+
return arg;
|
1425
|
+
}
|
1426
|
+
|
1427
|
+
/*
|
1428
|
+
* call-seq:
|
1429
|
+
* ctx.session_cache_size -> Integer
|
1430
|
+
*
|
1431
|
+
* Returns the current session cache size. Zero is used to represent an
|
1432
|
+
* unlimited cache size.
|
1433
|
+
*/
|
1434
|
+
static VALUE
|
1435
|
+
ossl_sslctx_get_session_cache_size(VALUE self)
|
1436
|
+
{
|
1437
|
+
SSL_CTX *ctx;
|
1438
|
+
|
1439
|
+
GetSSLCTX(self, ctx);
|
1440
|
+
|
1441
|
+
return LONG2NUM(SSL_CTX_sess_get_cache_size(ctx));
|
1442
|
+
}
|
1443
|
+
|
1444
|
+
/*
|
1445
|
+
* call-seq:
|
1446
|
+
* ctx.session_cache_size=(integer) -> Integer
|
1447
|
+
*
|
1448
|
+
* Sets the session cache size. Returns the previously valid session cache
|
1449
|
+
* size. Zero is used to represent an unlimited session cache size.
|
1450
|
+
*/
|
1451
|
+
static VALUE
|
1452
|
+
ossl_sslctx_set_session_cache_size(VALUE self, VALUE arg)
|
1453
|
+
{
|
1454
|
+
SSL_CTX *ctx;
|
1455
|
+
|
1456
|
+
GetSSLCTX(self, ctx);
|
1457
|
+
|
1458
|
+
SSL_CTX_sess_set_cache_size(ctx, NUM2LONG(arg));
|
1459
|
+
|
1460
|
+
return arg;
|
1461
|
+
}
|
1462
|
+
|
1463
|
+
/*
|
1464
|
+
* call-seq:
|
1465
|
+
* ctx.session_cache_stats -> Hash
|
1466
|
+
*
|
1467
|
+
* Returns a Hash containing the following keys:
|
1468
|
+
*
|
1469
|
+
* :accept:: Number of started SSL/TLS handshakes in server mode
|
1470
|
+
* :accept_good:: Number of established SSL/TLS sessions in server mode
|
1471
|
+
* :accept_renegotiate:: Number of start renegotiations in server mode
|
1472
|
+
* :cache_full:: Number of sessions that were removed due to cache overflow
|
1473
|
+
* :cache_hits:: Number of successfully reused connections
|
1474
|
+
* :cache_misses:: Number of sessions proposed by clients that were not found
|
1475
|
+
* in the cache
|
1476
|
+
* :cache_num:: Number of sessions in the internal session cache
|
1477
|
+
* :cb_hits:: Number of sessions retrieved from the external cache in server
|
1478
|
+
* mode
|
1479
|
+
* :connect:: Number of started SSL/TLS handshakes in client mode
|
1480
|
+
* :connect_good:: Number of established SSL/TLS sessions in client mode
|
1481
|
+
* :connect_renegotiate:: Number of start renegotiations in client mode
|
1482
|
+
* :timeouts:: Number of sessions proposed by clients that were found in the
|
1483
|
+
* cache but had expired due to timeouts
|
1484
|
+
*/
|
1485
|
+
static VALUE
|
1486
|
+
ossl_sslctx_get_session_cache_stats(VALUE self)
|
1487
|
+
{
|
1488
|
+
SSL_CTX *ctx;
|
1489
|
+
VALUE hash;
|
1490
|
+
|
1491
|
+
GetSSLCTX(self, ctx);
|
1492
|
+
|
1493
|
+
hash = rb_hash_new();
|
1494
|
+
rb_hash_aset(hash, ID2SYM(rb_intern("cache_num")), LONG2NUM(SSL_CTX_sess_number(ctx)));
|
1495
|
+
rb_hash_aset(hash, ID2SYM(rb_intern("connect")), LONG2NUM(SSL_CTX_sess_connect(ctx)));
|
1496
|
+
rb_hash_aset(hash, ID2SYM(rb_intern("connect_good")), LONG2NUM(SSL_CTX_sess_connect_good(ctx)));
|
1497
|
+
rb_hash_aset(hash, ID2SYM(rb_intern("connect_renegotiate")), LONG2NUM(SSL_CTX_sess_connect_renegotiate(ctx)));
|
1498
|
+
rb_hash_aset(hash, ID2SYM(rb_intern("accept")), LONG2NUM(SSL_CTX_sess_accept(ctx)));
|
1499
|
+
rb_hash_aset(hash, ID2SYM(rb_intern("accept_good")), LONG2NUM(SSL_CTX_sess_accept_good(ctx)));
|
1500
|
+
rb_hash_aset(hash, ID2SYM(rb_intern("accept_renegotiate")), LONG2NUM(SSL_CTX_sess_accept_renegotiate(ctx)));
|
1501
|
+
rb_hash_aset(hash, ID2SYM(rb_intern("cache_hits")), LONG2NUM(SSL_CTX_sess_hits(ctx)));
|
1502
|
+
rb_hash_aset(hash, ID2SYM(rb_intern("cb_hits")), LONG2NUM(SSL_CTX_sess_cb_hits(ctx)));
|
1503
|
+
rb_hash_aset(hash, ID2SYM(rb_intern("cache_misses")), LONG2NUM(SSL_CTX_sess_misses(ctx)));
|
1504
|
+
rb_hash_aset(hash, ID2SYM(rb_intern("cache_full")), LONG2NUM(SSL_CTX_sess_cache_full(ctx)));
|
1505
|
+
rb_hash_aset(hash, ID2SYM(rb_intern("timeouts")), LONG2NUM(SSL_CTX_sess_timeouts(ctx)));
|
1506
|
+
|
1507
|
+
return hash;
|
1508
|
+
}
|
1509
|
+
|
1510
|
+
|
1511
|
+
/*
|
1512
|
+
* call-seq:
|
1513
|
+
* ctx.flush_sessions(time) -> self
|
1514
|
+
*
|
1515
|
+
* Removes sessions in the internal cache that have expired at _time_.
|
1516
|
+
*/
|
1517
|
+
static VALUE
|
1518
|
+
ossl_sslctx_flush_sessions(int argc, VALUE *argv, VALUE self)
|
1519
|
+
{
|
1520
|
+
VALUE arg1;
|
1521
|
+
SSL_CTX *ctx;
|
1522
|
+
time_t tm = 0;
|
1523
|
+
|
1524
|
+
rb_scan_args(argc, argv, "01", &arg1);
|
1525
|
+
|
1526
|
+
GetSSLCTX(self, ctx);
|
1527
|
+
|
1528
|
+
if (NIL_P(arg1)) {
|
1529
|
+
tm = time(0);
|
1530
|
+
} else if (rb_obj_is_instance_of(arg1, rb_cTime)) {
|
1531
|
+
tm = NUM2LONG(rb_funcall(arg1, rb_intern("to_i"), 0));
|
1532
|
+
} else {
|
1533
|
+
ossl_raise(rb_eArgError, "arg must be Time or nil");
|
1534
|
+
}
|
1535
|
+
|
1536
|
+
SSL_CTX_flush_sessions(ctx, (long)tm);
|
1537
|
+
|
1538
|
+
return self;
|
1539
|
+
}
|
1540
|
+
|
1541
|
+
/*
|
1542
|
+
* SSLSocket class
|
1543
|
+
*/
|
1544
|
+
static inline int
|
1545
|
+
ssl_started(SSL *ssl)
|
1546
|
+
{
|
1547
|
+
/* BIO is created through ossl_ssl_setup(), called by #connect or #accept */
|
1548
|
+
return SSL_get_rbio(ssl) != NULL;
|
1549
|
+
}
|
1550
|
+
|
1551
|
+
static void
|
1552
|
+
ossl_ssl_mark(void *ptr)
|
1553
|
+
{
|
1554
|
+
SSL *ssl = ptr;
|
1555
|
+
rb_gc_mark((VALUE)SSL_get_ex_data(ssl, ossl_ssl_ex_ptr_idx));
|
1556
|
+
rb_gc_mark((VALUE)SSL_get_ex_data(ssl, ossl_ssl_ex_vcb_idx));
|
1557
|
+
}
|
1558
|
+
|
1559
|
+
static void
|
1560
|
+
ossl_ssl_free(void *ssl)
|
1561
|
+
{
|
1562
|
+
SSL_free(ssl);
|
1563
|
+
}
|
1564
|
+
|
1565
|
+
const rb_data_type_t ossl_ssl_type = {
|
1566
|
+
"OpenSSL/SSL",
|
1567
|
+
{
|
1568
|
+
ossl_ssl_mark, ossl_ssl_free,
|
1569
|
+
},
|
1570
|
+
0, 0, RUBY_TYPED_FREE_IMMEDIATELY,
|
1571
|
+
};
|
1572
|
+
|
1573
|
+
static VALUE
|
1574
|
+
ossl_ssl_s_alloc(VALUE klass)
|
1575
|
+
{
|
1576
|
+
return TypedData_Wrap_Struct(klass, &ossl_ssl_type, NULL);
|
1577
|
+
}
|
1578
|
+
|
1579
|
+
static VALUE
|
1580
|
+
peer_ip_address(VALUE self)
|
1581
|
+
{
|
1582
|
+
VALUE remote_address = rb_funcall(rb_attr_get(self, id_i_io), rb_intern("remote_address"), 0);
|
1583
|
+
|
1584
|
+
return rb_funcall(remote_address, rb_intern("inspect_sockaddr"), 0);
|
1585
|
+
}
|
1586
|
+
|
1587
|
+
static VALUE
|
1588
|
+
fallback_peer_ip_address(VALUE self, VALUE args)
|
1589
|
+
{
|
1590
|
+
return rb_str_new_cstr("(null)");
|
1591
|
+
}
|
1592
|
+
|
1593
|
+
static VALUE
|
1594
|
+
peeraddr_ip_str(VALUE self)
|
1595
|
+
{
|
1596
|
+
VALUE rb_mErrno = rb_const_get(rb_cObject, rb_intern("Errno"));
|
1597
|
+
VALUE rb_eSystemCallError = rb_const_get(rb_mErrno, rb_intern("SystemCallError"));
|
1598
|
+
|
1599
|
+
return rb_rescue2(peer_ip_address, self, fallback_peer_ip_address, (VALUE)0, rb_eSystemCallError, NULL);
|
1600
|
+
}
|
1601
|
+
|
1602
|
+
/*
|
1603
|
+
* call-seq:
|
1604
|
+
* SSLSocket.new(io) => aSSLSocket
|
1605
|
+
* SSLSocket.new(io, ctx) => aSSLSocket
|
1606
|
+
*
|
1607
|
+
* Creates a new SSL socket from _io_ which must be a real IO object (not an
|
1608
|
+
* IO-like object that responds to read/write).
|
1609
|
+
*
|
1610
|
+
* If _ctx_ is provided the SSL Sockets initial params will be taken from
|
1611
|
+
* the context.
|
1612
|
+
*
|
1613
|
+
* The OpenSSL::Buffering module provides additional IO methods.
|
1614
|
+
*
|
1615
|
+
* This method will freeze the SSLContext if one is provided;
|
1616
|
+
* however, session management is still allowed in the frozen SSLContext.
|
1617
|
+
*/
|
1618
|
+
static VALUE
|
1619
|
+
ossl_ssl_initialize(int argc, VALUE *argv, VALUE self)
|
1620
|
+
{
|
1621
|
+
VALUE io, v_ctx, verify_cb;
|
1622
|
+
SSL *ssl;
|
1623
|
+
SSL_CTX *ctx;
|
1624
|
+
|
1625
|
+
TypedData_Get_Struct(self, SSL, &ossl_ssl_type, ssl);
|
1626
|
+
if (ssl)
|
1627
|
+
ossl_raise(eSSLError, "SSL already initialized");
|
1628
|
+
|
1629
|
+
if (rb_scan_args(argc, argv, "11", &io, &v_ctx) == 1)
|
1630
|
+
v_ctx = rb_funcall(cSSLContext, rb_intern("new"), 0);
|
1631
|
+
|
1632
|
+
GetSSLCTX(v_ctx, ctx);
|
1633
|
+
rb_ivar_set(self, id_i_context, v_ctx);
|
1634
|
+
ossl_sslctx_setup(v_ctx);
|
1635
|
+
|
1636
|
+
if (rb_respond_to(io, rb_intern("nonblock=")))
|
1637
|
+
rb_funcall(io, rb_intern("nonblock="), 1, Qtrue);
|
1638
|
+
Check_Type(io, T_FILE);
|
1639
|
+
rb_ivar_set(self, id_i_io, io);
|
1640
|
+
|
1641
|
+
ssl = SSL_new(ctx);
|
1642
|
+
if (!ssl)
|
1643
|
+
ossl_raise(eSSLError, NULL);
|
1644
|
+
RTYPEDDATA_DATA(self) = ssl;
|
1645
|
+
|
1646
|
+
SSL_set_ex_data(ssl, ossl_ssl_ex_ptr_idx, (void *)self);
|
1647
|
+
SSL_set_info_callback(ssl, ssl_info_cb);
|
1648
|
+
verify_cb = rb_attr_get(v_ctx, id_i_verify_callback);
|
1649
|
+
SSL_set_ex_data(ssl, ossl_ssl_ex_vcb_idx, (void *)verify_cb);
|
1650
|
+
|
1651
|
+
rb_call_super(0, NULL);
|
1652
|
+
|
1653
|
+
return self;
|
1654
|
+
}
|
1655
|
+
|
1656
|
+
static VALUE
|
1657
|
+
ossl_ssl_setup(VALUE self)
|
1658
|
+
{
|
1659
|
+
VALUE io;
|
1660
|
+
SSL *ssl;
|
1661
|
+
rb_io_t *fptr;
|
1662
|
+
|
1663
|
+
GetSSL(self, ssl);
|
1664
|
+
if (ssl_started(ssl))
|
1665
|
+
return Qtrue;
|
1666
|
+
|
1667
|
+
io = rb_attr_get(self, id_i_io);
|
1668
|
+
GetOpenFile(io, fptr);
|
1669
|
+
rb_io_check_readable(fptr);
|
1670
|
+
rb_io_check_writable(fptr);
|
1671
|
+
if (!SSL_set_fd(ssl, TO_SOCKET(fptr->fd)))
|
1672
|
+
ossl_raise(eSSLError, "SSL_set_fd");
|
1673
|
+
|
1674
|
+
return Qtrue;
|
1675
|
+
}
|
1676
|
+
|
1677
|
+
#ifdef _WIN32
|
1678
|
+
#define ssl_get_error(ssl, ret) (errno = rb_w32_map_errno(WSAGetLastError()), SSL_get_error((ssl), (ret)))
|
1679
|
+
#else
|
1680
|
+
#define ssl_get_error(ssl, ret) SSL_get_error((ssl), (ret))
|
1681
|
+
#endif
|
1682
|
+
|
1683
|
+
static void
|
1684
|
+
write_would_block(int nonblock)
|
1685
|
+
{
|
1686
|
+
if (nonblock)
|
1687
|
+
ossl_raise(eSSLErrorWaitWritable, "write would block");
|
1688
|
+
}
|
1689
|
+
|
1690
|
+
static void
|
1691
|
+
read_would_block(int nonblock)
|
1692
|
+
{
|
1693
|
+
if (nonblock)
|
1694
|
+
ossl_raise(eSSLErrorWaitReadable, "read would block");
|
1695
|
+
}
|
1696
|
+
|
1697
|
+
static int
|
1698
|
+
no_exception_p(VALUE opts)
|
1699
|
+
{
|
1700
|
+
if (RB_TYPE_P(opts, T_HASH) &&
|
1701
|
+
rb_hash_lookup2(opts, sym_exception, Qundef) == Qfalse)
|
1702
|
+
return 1;
|
1703
|
+
return 0;
|
1704
|
+
}
|
1705
|
+
|
1706
|
+
// Provided by Ruby 3.2.0 and later in order to support the default IO#timeout.
|
1707
|
+
#ifndef RUBY_IO_TIMEOUT_DEFAULT
|
1708
|
+
#define RUBY_IO_TIMEOUT_DEFAULT Qnil
|
1709
|
+
#endif
|
1710
|
+
|
1711
|
+
static void
|
1712
|
+
io_wait_writable(rb_io_t *fptr)
|
1713
|
+
{
|
1714
|
+
#ifdef HAVE_RB_IO_MAYBE_WAIT
|
1715
|
+
rb_io_maybe_wait_writable(errno, fptr->self, RUBY_IO_TIMEOUT_DEFAULT);
|
1716
|
+
#else
|
1717
|
+
rb_io_wait_writable(fptr->fd);
|
1718
|
+
#endif
|
1719
|
+
}
|
1720
|
+
|
1721
|
+
static void
|
1722
|
+
io_wait_readable(rb_io_t *fptr)
|
1723
|
+
{
|
1724
|
+
#ifdef HAVE_RB_IO_MAYBE_WAIT
|
1725
|
+
rb_io_maybe_wait_readable(errno, fptr->self, RUBY_IO_TIMEOUT_DEFAULT);
|
1726
|
+
#else
|
1727
|
+
rb_io_wait_readable(fptr->fd);
|
1728
|
+
#endif
|
1729
|
+
}
|
1730
|
+
|
1731
|
+
static VALUE
|
1732
|
+
ossl_start_ssl(VALUE self, int (*func)(SSL *), const char *funcname, VALUE opts)
|
1733
|
+
{
|
1734
|
+
SSL *ssl;
|
1735
|
+
rb_io_t *fptr;
|
1736
|
+
int ret, ret2;
|
1737
|
+
VALUE cb_state;
|
1738
|
+
int nonblock = opts != Qfalse;
|
1739
|
+
#if defined(SSL_R_CERTIFICATE_VERIFY_FAILED)
|
1740
|
+
unsigned long err;
|
1741
|
+
#endif
|
1742
|
+
|
1743
|
+
rb_ivar_set(self, ID_callback_state, Qnil);
|
1744
|
+
|
1745
|
+
GetSSL(self, ssl);
|
1746
|
+
|
1747
|
+
GetOpenFile(rb_attr_get(self, id_i_io), fptr);
|
1748
|
+
for(;;){
|
1749
|
+
ret = func(ssl);
|
1750
|
+
|
1751
|
+
cb_state = rb_attr_get(self, ID_callback_state);
|
1752
|
+
if (!NIL_P(cb_state)) {
|
1753
|
+
/* must cleanup OpenSSL error stack before re-raising */
|
1754
|
+
ossl_clear_error();
|
1755
|
+
rb_jump_tag(NUM2INT(cb_state));
|
1756
|
+
}
|
1757
|
+
|
1758
|
+
if (ret > 0)
|
1759
|
+
break;
|
1760
|
+
|
1761
|
+
switch((ret2 = ssl_get_error(ssl, ret))){
|
1762
|
+
case SSL_ERROR_WANT_WRITE:
|
1763
|
+
if (no_exception_p(opts)) { return sym_wait_writable; }
|
1764
|
+
write_would_block(nonblock);
|
1765
|
+
io_wait_writable(fptr);
|
1766
|
+
continue;
|
1767
|
+
case SSL_ERROR_WANT_READ:
|
1768
|
+
if (no_exception_p(opts)) { return sym_wait_readable; }
|
1769
|
+
read_would_block(nonblock);
|
1770
|
+
io_wait_readable(fptr);
|
1771
|
+
continue;
|
1772
|
+
case SSL_ERROR_SYSCALL:
|
1773
|
+
#ifdef __APPLE__
|
1774
|
+
/* See ossl_ssl_write_internal() */
|
1775
|
+
if (errno == EPROTOTYPE)
|
1776
|
+
continue;
|
1777
|
+
#endif
|
1778
|
+
if (errno) rb_sys_fail(funcname);
|
1779
|
+
ossl_raise(eSSLError, "%s SYSCALL returned=%d errno=%d peeraddr=%"PRIsVALUE" state=%s",
|
1780
|
+
funcname, ret2, errno, peeraddr_ip_str(self), SSL_state_string_long(ssl));
|
1781
|
+
|
1782
|
+
#if defined(SSL_R_CERTIFICATE_VERIFY_FAILED)
|
1783
|
+
case SSL_ERROR_SSL:
|
1784
|
+
err = ERR_peek_last_error();
|
1785
|
+
if (ERR_GET_LIB(err) == ERR_LIB_SSL &&
|
1786
|
+
ERR_GET_REASON(err) == SSL_R_CERTIFICATE_VERIFY_FAILED) {
|
1787
|
+
const char *err_msg = ERR_reason_error_string(err),
|
1788
|
+
*verify_msg = X509_verify_cert_error_string(SSL_get_verify_result(ssl));
|
1789
|
+
if (!err_msg)
|
1790
|
+
err_msg = "(null)";
|
1791
|
+
if (!verify_msg)
|
1792
|
+
verify_msg = "(null)";
|
1793
|
+
ossl_clear_error(); /* let ossl_raise() not append message */
|
1794
|
+
ossl_raise(eSSLError, "%s returned=%d errno=%d peeraddr=%"PRIsVALUE" state=%s: %s (%s)",
|
1795
|
+
funcname, ret2, errno, peeraddr_ip_str(self), SSL_state_string_long(ssl),
|
1796
|
+
err_msg, verify_msg);
|
1797
|
+
}
|
1798
|
+
#endif
|
1799
|
+
/* fallthrough */
|
1800
|
+
default:
|
1801
|
+
ossl_raise(eSSLError, "%s returned=%d errno=%d peeraddr=%"PRIsVALUE" state=%s",
|
1802
|
+
funcname, ret2, errno, peeraddr_ip_str(self), SSL_state_string_long(ssl));
|
1803
|
+
}
|
1804
|
+
}
|
1805
|
+
|
1806
|
+
return self;
|
1807
|
+
}
|
1808
|
+
|
1809
|
+
/*
|
1810
|
+
* call-seq:
|
1811
|
+
* ssl.connect => self
|
1812
|
+
*
|
1813
|
+
* Initiates an SSL/TLS handshake with a server.
|
1814
|
+
*/
|
1815
|
+
static VALUE
|
1816
|
+
ossl_ssl_connect(VALUE self)
|
1817
|
+
{
|
1818
|
+
ossl_ssl_setup(self);
|
1819
|
+
|
1820
|
+
return ossl_start_ssl(self, SSL_connect, "SSL_connect", Qfalse);
|
1821
|
+
}
|
1822
|
+
|
1823
|
+
/*
|
1824
|
+
* call-seq:
|
1825
|
+
* ssl.connect_nonblock([options]) => self
|
1826
|
+
*
|
1827
|
+
* Initiates the SSL/TLS handshake as a client in non-blocking manner.
|
1828
|
+
*
|
1829
|
+
* # emulates blocking connect
|
1830
|
+
* begin
|
1831
|
+
* ssl.connect_nonblock
|
1832
|
+
* rescue IO::WaitReadable
|
1833
|
+
* IO.select([s2])
|
1834
|
+
* retry
|
1835
|
+
* rescue IO::WaitWritable
|
1836
|
+
* IO.select(nil, [s2])
|
1837
|
+
* retry
|
1838
|
+
* end
|
1839
|
+
*
|
1840
|
+
* By specifying a keyword argument _exception_ to +false+, you can indicate
|
1841
|
+
* that connect_nonblock should not raise an IO::WaitReadable or
|
1842
|
+
* IO::WaitWritable exception, but return the symbol +:wait_readable+ or
|
1843
|
+
* +:wait_writable+ instead.
|
1844
|
+
*/
|
1845
|
+
static VALUE
|
1846
|
+
ossl_ssl_connect_nonblock(int argc, VALUE *argv, VALUE self)
|
1847
|
+
{
|
1848
|
+
VALUE opts;
|
1849
|
+
rb_scan_args(argc, argv, "0:", &opts);
|
1850
|
+
|
1851
|
+
ossl_ssl_setup(self);
|
1852
|
+
|
1853
|
+
return ossl_start_ssl(self, SSL_connect, "SSL_connect", opts);
|
1854
|
+
}
|
1855
|
+
|
1856
|
+
/*
|
1857
|
+
* call-seq:
|
1858
|
+
* ssl.accept => self
|
1859
|
+
*
|
1860
|
+
* Waits for a SSL/TLS client to initiate a handshake.
|
1861
|
+
*/
|
1862
|
+
static VALUE
|
1863
|
+
ossl_ssl_accept(VALUE self)
|
1864
|
+
{
|
1865
|
+
ossl_ssl_setup(self);
|
1866
|
+
|
1867
|
+
return ossl_start_ssl(self, SSL_accept, "SSL_accept", Qfalse);
|
1868
|
+
}
|
1869
|
+
|
1870
|
+
/*
|
1871
|
+
* call-seq:
|
1872
|
+
* ssl.accept_nonblock([options]) => self
|
1873
|
+
*
|
1874
|
+
* Initiates the SSL/TLS handshake as a server in non-blocking manner.
|
1875
|
+
*
|
1876
|
+
* # emulates blocking accept
|
1877
|
+
* begin
|
1878
|
+
* ssl.accept_nonblock
|
1879
|
+
* rescue IO::WaitReadable
|
1880
|
+
* IO.select([s2])
|
1881
|
+
* retry
|
1882
|
+
* rescue IO::WaitWritable
|
1883
|
+
* IO.select(nil, [s2])
|
1884
|
+
* retry
|
1885
|
+
* end
|
1886
|
+
*
|
1887
|
+
* By specifying a keyword argument _exception_ to +false+, you can indicate
|
1888
|
+
* that accept_nonblock should not raise an IO::WaitReadable or
|
1889
|
+
* IO::WaitWritable exception, but return the symbol +:wait_readable+ or
|
1890
|
+
* +:wait_writable+ instead.
|
1891
|
+
*/
|
1892
|
+
static VALUE
|
1893
|
+
ossl_ssl_accept_nonblock(int argc, VALUE *argv, VALUE self)
|
1894
|
+
{
|
1895
|
+
VALUE opts;
|
1896
|
+
|
1897
|
+
rb_scan_args(argc, argv, "0:", &opts);
|
1898
|
+
ossl_ssl_setup(self);
|
1899
|
+
|
1900
|
+
return ossl_start_ssl(self, SSL_accept, "SSL_accept", opts);
|
1901
|
+
}
|
1902
|
+
|
1903
|
+
static VALUE
|
1904
|
+
ossl_ssl_read_internal(int argc, VALUE *argv, VALUE self, int nonblock)
|
1905
|
+
{
|
1906
|
+
SSL *ssl;
|
1907
|
+
int ilen;
|
1908
|
+
VALUE len, str;
|
1909
|
+
rb_io_t *fptr;
|
1910
|
+
VALUE io, opts = Qnil;
|
1911
|
+
|
1912
|
+
if (nonblock) {
|
1913
|
+
rb_scan_args(argc, argv, "11:", &len, &str, &opts);
|
1914
|
+
} else {
|
1915
|
+
rb_scan_args(argc, argv, "11", &len, &str);
|
1916
|
+
}
|
1917
|
+
GetSSL(self, ssl);
|
1918
|
+
if (!ssl_started(ssl))
|
1919
|
+
rb_raise(eSSLError, "SSL session is not started yet");
|
1920
|
+
|
1921
|
+
ilen = NUM2INT(len);
|
1922
|
+
if (NIL_P(str))
|
1923
|
+
str = rb_str_new(0, ilen);
|
1924
|
+
else {
|
1925
|
+
StringValue(str);
|
1926
|
+
if (RSTRING_LEN(str) >= ilen)
|
1927
|
+
rb_str_modify(str);
|
1928
|
+
else
|
1929
|
+
rb_str_modify_expand(str, ilen - RSTRING_LEN(str));
|
1930
|
+
}
|
1931
|
+
rb_str_set_len(str, 0);
|
1932
|
+
if (ilen == 0)
|
1933
|
+
return str;
|
1934
|
+
|
1935
|
+
io = rb_attr_get(self, id_i_io);
|
1936
|
+
GetOpenFile(io, fptr);
|
1937
|
+
|
1938
|
+
rb_str_locktmp(str);
|
1939
|
+
for (;;) {
|
1940
|
+
int nread = SSL_read(ssl, RSTRING_PTR(str), ilen);
|
1941
|
+
switch (ssl_get_error(ssl, nread)) {
|
1942
|
+
case SSL_ERROR_NONE:
|
1943
|
+
rb_str_unlocktmp(str);
|
1944
|
+
rb_str_set_len(str, nread);
|
1945
|
+
return str;
|
1946
|
+
case SSL_ERROR_ZERO_RETURN:
|
1947
|
+
rb_str_unlocktmp(str);
|
1948
|
+
if (no_exception_p(opts)) { return Qnil; }
|
1949
|
+
rb_eof_error();
|
1950
|
+
case SSL_ERROR_WANT_WRITE:
|
1951
|
+
if (nonblock) {
|
1952
|
+
rb_str_unlocktmp(str);
|
1953
|
+
if (no_exception_p(opts)) { return sym_wait_writable; }
|
1954
|
+
write_would_block(nonblock);
|
1955
|
+
}
|
1956
|
+
io_wait_writable(fptr);
|
1957
|
+
continue;
|
1958
|
+
case SSL_ERROR_WANT_READ:
|
1959
|
+
if (nonblock) {
|
1960
|
+
rb_str_unlocktmp(str);
|
1961
|
+
if (no_exception_p(opts)) { return sym_wait_readable; }
|
1962
|
+
read_would_block(nonblock);
|
1963
|
+
}
|
1964
|
+
io_wait_readable(fptr);
|
1965
|
+
continue;
|
1966
|
+
case SSL_ERROR_SYSCALL:
|
1967
|
+
if (!ERR_peek_error()) {
|
1968
|
+
rb_str_unlocktmp(str);
|
1969
|
+
if (errno)
|
1970
|
+
rb_sys_fail(0);
|
1971
|
+
else {
|
1972
|
+
/*
|
1973
|
+
* The underlying BIO returned 0. This is actually a
|
1974
|
+
* protocol error. But unfortunately, not all
|
1975
|
+
* implementations cleanly shutdown the TLS connection
|
1976
|
+
* but just shutdown/close the TCP connection. So report
|
1977
|
+
* EOF for now...
|
1978
|
+
*/
|
1979
|
+
if (no_exception_p(opts)) { return Qnil; }
|
1980
|
+
rb_eof_error();
|
1981
|
+
}
|
1982
|
+
}
|
1983
|
+
/* fall through */
|
1984
|
+
default:
|
1985
|
+
rb_str_unlocktmp(str);
|
1986
|
+
ossl_raise(eSSLError, "SSL_read");
|
1987
|
+
}
|
1988
|
+
}
|
1989
|
+
}
|
1990
|
+
|
1991
|
+
/*
|
1992
|
+
* call-seq:
|
1993
|
+
* ssl.sysread(length) => string
|
1994
|
+
* ssl.sysread(length, buffer) => buffer
|
1995
|
+
*
|
1996
|
+
* Reads _length_ bytes from the SSL connection. If a pre-allocated _buffer_
|
1997
|
+
* is provided the data will be written into it.
|
1998
|
+
*/
|
1999
|
+
static VALUE
|
2000
|
+
ossl_ssl_read(int argc, VALUE *argv, VALUE self)
|
2001
|
+
{
|
2002
|
+
return ossl_ssl_read_internal(argc, argv, self, 0);
|
2003
|
+
}
|
2004
|
+
|
2005
|
+
/*
|
2006
|
+
* call-seq:
|
2007
|
+
* ssl.sysread_nonblock(length) => string
|
2008
|
+
* ssl.sysread_nonblock(length, buffer) => buffer
|
2009
|
+
* ssl.sysread_nonblock(length[, buffer [, opts]) => buffer
|
2010
|
+
*
|
2011
|
+
* A non-blocking version of #sysread. Raises an SSLError if reading would
|
2012
|
+
* block. If "exception: false" is passed, this method returns a symbol of
|
2013
|
+
* :wait_readable, :wait_writable, or nil, rather than raising an exception.
|
2014
|
+
*
|
2015
|
+
* Reads _length_ bytes from the SSL connection. If a pre-allocated _buffer_
|
2016
|
+
* is provided the data will be written into it.
|
2017
|
+
*/
|
2018
|
+
static VALUE
|
2019
|
+
ossl_ssl_read_nonblock(int argc, VALUE *argv, VALUE self)
|
2020
|
+
{
|
2021
|
+
return ossl_ssl_read_internal(argc, argv, self, 1);
|
2022
|
+
}
|
2023
|
+
|
2024
|
+
static VALUE
|
2025
|
+
ossl_ssl_write_internal(VALUE self, VALUE str, VALUE opts)
|
2026
|
+
{
|
2027
|
+
SSL *ssl;
|
2028
|
+
rb_io_t *fptr;
|
2029
|
+
int num, nonblock = opts != Qfalse;
|
2030
|
+
VALUE tmp, io;
|
2031
|
+
|
2032
|
+
GetSSL(self, ssl);
|
2033
|
+
if (!ssl_started(ssl))
|
2034
|
+
rb_raise(eSSLError, "SSL session is not started yet");
|
2035
|
+
|
2036
|
+
tmp = rb_str_new_frozen(StringValue(str));
|
2037
|
+
io = rb_attr_get(self, id_i_io);
|
2038
|
+
GetOpenFile(io, fptr);
|
2039
|
+
|
2040
|
+
/* SSL_write(3ssl) manpage states num == 0 is undefined */
|
2041
|
+
num = RSTRING_LENINT(tmp);
|
2042
|
+
if (num == 0)
|
2043
|
+
return INT2FIX(0);
|
2044
|
+
|
2045
|
+
for (;;) {
|
2046
|
+
int nwritten = SSL_write(ssl, RSTRING_PTR(tmp), num);
|
2047
|
+
switch (ssl_get_error(ssl, nwritten)) {
|
2048
|
+
case SSL_ERROR_NONE:
|
2049
|
+
return INT2NUM(nwritten);
|
2050
|
+
case SSL_ERROR_WANT_WRITE:
|
2051
|
+
if (no_exception_p(opts)) { return sym_wait_writable; }
|
2052
|
+
write_would_block(nonblock);
|
2053
|
+
io_wait_writable(fptr);
|
2054
|
+
continue;
|
2055
|
+
case SSL_ERROR_WANT_READ:
|
2056
|
+
if (no_exception_p(opts)) { return sym_wait_readable; }
|
2057
|
+
read_would_block(nonblock);
|
2058
|
+
io_wait_readable(fptr);
|
2059
|
+
continue;
|
2060
|
+
case SSL_ERROR_SYSCALL:
|
2061
|
+
#ifdef __APPLE__
|
2062
|
+
/*
|
2063
|
+
* It appears that send syscall can return EPROTOTYPE if the
|
2064
|
+
* socket is being torn down. Retry to get a proper errno to
|
2065
|
+
* make the error handling in line with the socket library.
|
2066
|
+
* [Bug #14713] https://bugs.ruby-lang.org/issues/14713
|
2067
|
+
*/
|
2068
|
+
if (errno == EPROTOTYPE)
|
2069
|
+
continue;
|
2070
|
+
#endif
|
2071
|
+
if (errno) rb_sys_fail(0);
|
2072
|
+
/* fallthrough */
|
2073
|
+
default:
|
2074
|
+
ossl_raise(eSSLError, "SSL_write");
|
2075
|
+
}
|
2076
|
+
}
|
2077
|
+
}
|
2078
|
+
|
2079
|
+
/*
|
2080
|
+
* call-seq:
|
2081
|
+
* ssl.syswrite(string) => Integer
|
2082
|
+
*
|
2083
|
+
* Writes _string_ to the SSL connection.
|
2084
|
+
*/
|
2085
|
+
static VALUE
|
2086
|
+
ossl_ssl_write(VALUE self, VALUE str)
|
2087
|
+
{
|
2088
|
+
return ossl_ssl_write_internal(self, str, Qfalse);
|
2089
|
+
}
|
2090
|
+
|
2091
|
+
/*
|
2092
|
+
* call-seq:
|
2093
|
+
* ssl.syswrite_nonblock(string) => Integer
|
2094
|
+
*
|
2095
|
+
* Writes _string_ to the SSL connection in a non-blocking manner. Raises an
|
2096
|
+
* SSLError if writing would block.
|
2097
|
+
*/
|
2098
|
+
static VALUE
|
2099
|
+
ossl_ssl_write_nonblock(int argc, VALUE *argv, VALUE self)
|
2100
|
+
{
|
2101
|
+
VALUE str, opts;
|
2102
|
+
|
2103
|
+
rb_scan_args(argc, argv, "1:", &str, &opts);
|
2104
|
+
|
2105
|
+
return ossl_ssl_write_internal(self, str, opts);
|
2106
|
+
}
|
2107
|
+
|
2108
|
+
/*
|
2109
|
+
* call-seq:
|
2110
|
+
* ssl.stop => nil
|
2111
|
+
*
|
2112
|
+
* Sends "close notify" to the peer and tries to shut down the SSL connection
|
2113
|
+
* gracefully.
|
2114
|
+
*/
|
2115
|
+
static VALUE
|
2116
|
+
ossl_ssl_stop(VALUE self)
|
2117
|
+
{
|
2118
|
+
SSL *ssl;
|
2119
|
+
int ret;
|
2120
|
+
|
2121
|
+
GetSSL(self, ssl);
|
2122
|
+
if (!ssl_started(ssl))
|
2123
|
+
return Qnil;
|
2124
|
+
ret = SSL_shutdown(ssl);
|
2125
|
+
if (ret == 1) /* Have already received close_notify */
|
2126
|
+
return Qnil;
|
2127
|
+
if (ret == 0) /* Sent close_notify, but we don't wait for reply */
|
2128
|
+
return Qnil;
|
2129
|
+
|
2130
|
+
/*
|
2131
|
+
* XXX: Something happened. Possibly it failed because the underlying socket
|
2132
|
+
* is not writable/readable, since it is in non-blocking mode. We should do
|
2133
|
+
* some proper error handling using SSL_get_error() and maybe retry, but we
|
2134
|
+
* can't block here. Give up for now.
|
2135
|
+
*/
|
2136
|
+
ossl_clear_error();
|
2137
|
+
return Qnil;
|
2138
|
+
}
|
2139
|
+
|
2140
|
+
/*
|
2141
|
+
* call-seq:
|
2142
|
+
* ssl.cert => cert or nil
|
2143
|
+
*
|
2144
|
+
* The X509 certificate for this socket endpoint.
|
2145
|
+
*/
|
2146
|
+
static VALUE
|
2147
|
+
ossl_ssl_get_cert(VALUE self)
|
2148
|
+
{
|
2149
|
+
SSL *ssl;
|
2150
|
+
X509 *cert = NULL;
|
2151
|
+
|
2152
|
+
GetSSL(self, ssl);
|
2153
|
+
|
2154
|
+
/*
|
2155
|
+
* Is this OpenSSL bug? Should add a ref?
|
2156
|
+
* TODO: Ask for.
|
2157
|
+
*/
|
2158
|
+
cert = SSL_get_certificate(ssl); /* NO DUPs => DON'T FREE. */
|
2159
|
+
|
2160
|
+
if (!cert) {
|
2161
|
+
return Qnil;
|
2162
|
+
}
|
2163
|
+
return ossl_x509_new(cert);
|
2164
|
+
}
|
2165
|
+
|
2166
|
+
/*
|
2167
|
+
* call-seq:
|
2168
|
+
* ssl.peer_cert => cert or nil
|
2169
|
+
*
|
2170
|
+
* The X509 certificate for this socket's peer.
|
2171
|
+
*/
|
2172
|
+
static VALUE
|
2173
|
+
ossl_ssl_get_peer_cert(VALUE self)
|
2174
|
+
{
|
2175
|
+
SSL *ssl;
|
2176
|
+
X509 *cert = NULL;
|
2177
|
+
VALUE obj;
|
2178
|
+
|
2179
|
+
GetSSL(self, ssl);
|
2180
|
+
|
2181
|
+
cert = SSL_get_peer_certificate(ssl); /* Adds a ref => Safe to FREE. */
|
2182
|
+
|
2183
|
+
if (!cert) {
|
2184
|
+
return Qnil;
|
2185
|
+
}
|
2186
|
+
obj = ossl_x509_new(cert);
|
2187
|
+
X509_free(cert);
|
2188
|
+
|
2189
|
+
return obj;
|
2190
|
+
}
|
2191
|
+
|
2192
|
+
/*
|
2193
|
+
* call-seq:
|
2194
|
+
* ssl.peer_cert_chain => [cert, ...] or nil
|
2195
|
+
*
|
2196
|
+
* The X509 certificate chain for this socket's peer.
|
2197
|
+
*/
|
2198
|
+
static VALUE
|
2199
|
+
ossl_ssl_get_peer_cert_chain(VALUE self)
|
2200
|
+
{
|
2201
|
+
SSL *ssl;
|
2202
|
+
STACK_OF(X509) *chain;
|
2203
|
+
X509 *cert;
|
2204
|
+
VALUE ary;
|
2205
|
+
int i, num;
|
2206
|
+
|
2207
|
+
GetSSL(self, ssl);
|
2208
|
+
|
2209
|
+
chain = SSL_get_peer_cert_chain(ssl);
|
2210
|
+
if(!chain) return Qnil;
|
2211
|
+
num = sk_X509_num(chain);
|
2212
|
+
ary = rb_ary_new2(num);
|
2213
|
+
for (i = 0; i < num; i++){
|
2214
|
+
cert = sk_X509_value(chain, i);
|
2215
|
+
rb_ary_push(ary, ossl_x509_new(cert));
|
2216
|
+
}
|
2217
|
+
|
2218
|
+
return ary;
|
2219
|
+
}
|
2220
|
+
|
2221
|
+
/*
|
2222
|
+
* call-seq:
|
2223
|
+
* ssl.ssl_version => String
|
2224
|
+
*
|
2225
|
+
* Returns a String representing the SSL/TLS version that was negotiated
|
2226
|
+
* for the connection, for example "TLSv1.2".
|
2227
|
+
*/
|
2228
|
+
static VALUE
|
2229
|
+
ossl_ssl_get_version(VALUE self)
|
2230
|
+
{
|
2231
|
+
SSL *ssl;
|
2232
|
+
|
2233
|
+
GetSSL(self, ssl);
|
2234
|
+
|
2235
|
+
return rb_str_new2(SSL_get_version(ssl));
|
2236
|
+
}
|
2237
|
+
|
2238
|
+
/*
|
2239
|
+
* call-seq:
|
2240
|
+
* ssl.cipher -> nil or [name, version, bits, alg_bits]
|
2241
|
+
*
|
2242
|
+
* Returns the cipher suite actually used in the current session, or nil if
|
2243
|
+
* no session has been established.
|
2244
|
+
*/
|
2245
|
+
static VALUE
|
2246
|
+
ossl_ssl_get_cipher(VALUE self)
|
2247
|
+
{
|
2248
|
+
SSL *ssl;
|
2249
|
+
const SSL_CIPHER *cipher;
|
2250
|
+
|
2251
|
+
GetSSL(self, ssl);
|
2252
|
+
cipher = SSL_get_current_cipher(ssl);
|
2253
|
+
return cipher ? ossl_ssl_cipher_to_ary(cipher) : Qnil;
|
2254
|
+
}
|
2255
|
+
|
2256
|
+
/*
|
2257
|
+
* call-seq:
|
2258
|
+
* ssl.state => string
|
2259
|
+
*
|
2260
|
+
* A description of the current connection state. This is for diagnostic
|
2261
|
+
* purposes only.
|
2262
|
+
*/
|
2263
|
+
static VALUE
|
2264
|
+
ossl_ssl_get_state(VALUE self)
|
2265
|
+
{
|
2266
|
+
SSL *ssl;
|
2267
|
+
VALUE ret;
|
2268
|
+
|
2269
|
+
GetSSL(self, ssl);
|
2270
|
+
|
2271
|
+
ret = rb_str_new2(SSL_state_string(ssl));
|
2272
|
+
if (ruby_verbose) {
|
2273
|
+
rb_str_cat2(ret, ": ");
|
2274
|
+
rb_str_cat2(ret, SSL_state_string_long(ssl));
|
2275
|
+
}
|
2276
|
+
return ret;
|
2277
|
+
}
|
2278
|
+
|
2279
|
+
/*
|
2280
|
+
* call-seq:
|
2281
|
+
* ssl.pending => Integer
|
2282
|
+
*
|
2283
|
+
* The number of bytes that are immediately available for reading.
|
2284
|
+
*/
|
2285
|
+
static VALUE
|
2286
|
+
ossl_ssl_pending(VALUE self)
|
2287
|
+
{
|
2288
|
+
SSL *ssl;
|
2289
|
+
|
2290
|
+
GetSSL(self, ssl);
|
2291
|
+
|
2292
|
+
return INT2NUM(SSL_pending(ssl));
|
2293
|
+
}
|
2294
|
+
|
2295
|
+
/*
|
2296
|
+
* call-seq:
|
2297
|
+
* ssl.session_reused? -> true | false
|
2298
|
+
*
|
2299
|
+
* Returns +true+ if a reused session was negotiated during the handshake.
|
2300
|
+
*/
|
2301
|
+
static VALUE
|
2302
|
+
ossl_ssl_session_reused(VALUE self)
|
2303
|
+
{
|
2304
|
+
SSL *ssl;
|
2305
|
+
|
2306
|
+
GetSSL(self, ssl);
|
2307
|
+
|
2308
|
+
return SSL_session_reused(ssl) ? Qtrue : Qfalse;
|
2309
|
+
}
|
2310
|
+
|
2311
|
+
/*
|
2312
|
+
* call-seq:
|
2313
|
+
* ssl.session = session -> session
|
2314
|
+
*
|
2315
|
+
* Sets the Session to be used when the connection is established.
|
2316
|
+
*/
|
2317
|
+
static VALUE
|
2318
|
+
ossl_ssl_set_session(VALUE self, VALUE arg1)
|
2319
|
+
{
|
2320
|
+
SSL *ssl;
|
2321
|
+
SSL_SESSION *sess;
|
2322
|
+
|
2323
|
+
GetSSL(self, ssl);
|
2324
|
+
GetSSLSession(arg1, sess);
|
2325
|
+
|
2326
|
+
if (SSL_set_session(ssl, sess) != 1)
|
2327
|
+
ossl_raise(eSSLError, "SSL_set_session");
|
2328
|
+
|
2329
|
+
return arg1;
|
2330
|
+
}
|
2331
|
+
|
2332
|
+
/*
|
2333
|
+
* call-seq:
|
2334
|
+
* ssl.hostname = hostname -> hostname
|
2335
|
+
*
|
2336
|
+
* Sets the server hostname used for SNI. This needs to be set before
|
2337
|
+
* SSLSocket#connect.
|
2338
|
+
*/
|
2339
|
+
static VALUE
|
2340
|
+
ossl_ssl_set_hostname(VALUE self, VALUE arg)
|
2341
|
+
{
|
2342
|
+
SSL *ssl;
|
2343
|
+
char *hostname = NULL;
|
2344
|
+
|
2345
|
+
GetSSL(self, ssl);
|
2346
|
+
|
2347
|
+
if (!NIL_P(arg))
|
2348
|
+
hostname = StringValueCStr(arg);
|
2349
|
+
|
2350
|
+
if (!SSL_set_tlsext_host_name(ssl, hostname))
|
2351
|
+
ossl_raise(eSSLError, NULL);
|
2352
|
+
|
2353
|
+
/* for SSLSocket#hostname */
|
2354
|
+
rb_ivar_set(self, id_i_hostname, arg);
|
2355
|
+
|
2356
|
+
return arg;
|
2357
|
+
}
|
2358
|
+
|
2359
|
+
/*
|
2360
|
+
* call-seq:
|
2361
|
+
* ssl.verify_result => Integer
|
2362
|
+
*
|
2363
|
+
* Returns the result of the peer certificates verification. See verify(1)
|
2364
|
+
* for error values and descriptions.
|
2365
|
+
*
|
2366
|
+
* If no peer certificate was presented X509_V_OK is returned.
|
2367
|
+
*/
|
2368
|
+
static VALUE
|
2369
|
+
ossl_ssl_get_verify_result(VALUE self)
|
2370
|
+
{
|
2371
|
+
SSL *ssl;
|
2372
|
+
|
2373
|
+
GetSSL(self, ssl);
|
2374
|
+
|
2375
|
+
return LONG2NUM(SSL_get_verify_result(ssl));
|
2376
|
+
}
|
2377
|
+
|
2378
|
+
/*
|
2379
|
+
* call-seq:
|
2380
|
+
* ssl.finished_message => "finished message"
|
2381
|
+
*
|
2382
|
+
* Returns the last *Finished* message sent
|
2383
|
+
*
|
2384
|
+
*/
|
2385
|
+
static VALUE
|
2386
|
+
ossl_ssl_get_finished(VALUE self)
|
2387
|
+
{
|
2388
|
+
SSL *ssl;
|
2389
|
+
char sizer[1], *buf;
|
2390
|
+
size_t len;
|
2391
|
+
|
2392
|
+
GetSSL(self, ssl);
|
2393
|
+
|
2394
|
+
len = SSL_get_finished(ssl, sizer, 0);
|
2395
|
+
if (len == 0)
|
2396
|
+
return Qnil;
|
2397
|
+
|
2398
|
+
buf = ALLOCA_N(char, len);
|
2399
|
+
SSL_get_finished(ssl, buf, len);
|
2400
|
+
return rb_str_new(buf, len);
|
2401
|
+
}
|
2402
|
+
|
2403
|
+
/*
|
2404
|
+
* call-seq:
|
2405
|
+
* ssl.peer_finished_message => "peer finished message"
|
2406
|
+
*
|
2407
|
+
* Returns the last *Finished* message received
|
2408
|
+
*
|
2409
|
+
*/
|
2410
|
+
static VALUE
|
2411
|
+
ossl_ssl_get_peer_finished(VALUE self)
|
2412
|
+
{
|
2413
|
+
SSL *ssl;
|
2414
|
+
char sizer[1], *buf;
|
2415
|
+
size_t len;
|
2416
|
+
|
2417
|
+
GetSSL(self, ssl);
|
2418
|
+
|
2419
|
+
len = SSL_get_peer_finished(ssl, sizer, 0);
|
2420
|
+
if (len == 0)
|
2421
|
+
return Qnil;
|
2422
|
+
|
2423
|
+
buf = ALLOCA_N(char, len);
|
2424
|
+
SSL_get_peer_finished(ssl, buf, len);
|
2425
|
+
return rb_str_new(buf, len);
|
2426
|
+
}
|
2427
|
+
|
2428
|
+
/*
|
2429
|
+
* call-seq:
|
2430
|
+
* ssl.client_ca => [x509name, ...]
|
2431
|
+
*
|
2432
|
+
* Returns the list of client CAs. Please note that in contrast to
|
2433
|
+
* SSLContext#client_ca= no array of X509::Certificate is returned but
|
2434
|
+
* X509::Name instances of the CA's subject distinguished name.
|
2435
|
+
*
|
2436
|
+
* In server mode, returns the list set by SSLContext#client_ca=.
|
2437
|
+
* In client mode, returns the list of client CAs sent from the server.
|
2438
|
+
*/
|
2439
|
+
static VALUE
|
2440
|
+
ossl_ssl_get_client_ca_list(VALUE self)
|
2441
|
+
{
|
2442
|
+
SSL *ssl;
|
2443
|
+
STACK_OF(X509_NAME) *ca;
|
2444
|
+
|
2445
|
+
GetSSL(self, ssl);
|
2446
|
+
|
2447
|
+
ca = SSL_get_client_CA_list(ssl);
|
2448
|
+
return ossl_x509name_sk2ary(ca);
|
2449
|
+
}
|
2450
|
+
|
2451
|
+
# ifdef OSSL_USE_NEXTPROTONEG
|
2452
|
+
/*
|
2453
|
+
* call-seq:
|
2454
|
+
* ssl.npn_protocol => String | nil
|
2455
|
+
*
|
2456
|
+
* Returns the protocol string that was finally selected by the client
|
2457
|
+
* during the handshake.
|
2458
|
+
*/
|
2459
|
+
static VALUE
|
2460
|
+
ossl_ssl_npn_protocol(VALUE self)
|
2461
|
+
{
|
2462
|
+
SSL *ssl;
|
2463
|
+
const unsigned char *out;
|
2464
|
+
unsigned int outlen;
|
2465
|
+
|
2466
|
+
GetSSL(self, ssl);
|
2467
|
+
|
2468
|
+
SSL_get0_next_proto_negotiated(ssl, &out, &outlen);
|
2469
|
+
if (!outlen)
|
2470
|
+
return Qnil;
|
2471
|
+
else
|
2472
|
+
return rb_str_new((const char *) out, outlen);
|
2473
|
+
}
|
2474
|
+
# endif
|
2475
|
+
|
2476
|
+
/*
|
2477
|
+
* call-seq:
|
2478
|
+
* ssl.alpn_protocol => String | nil
|
2479
|
+
*
|
2480
|
+
* Returns the ALPN protocol string that was finally selected by the server
|
2481
|
+
* during the handshake.
|
2482
|
+
*/
|
2483
|
+
static VALUE
|
2484
|
+
ossl_ssl_alpn_protocol(VALUE self)
|
2485
|
+
{
|
2486
|
+
SSL *ssl;
|
2487
|
+
const unsigned char *out;
|
2488
|
+
unsigned int outlen;
|
2489
|
+
|
2490
|
+
GetSSL(self, ssl);
|
2491
|
+
|
2492
|
+
SSL_get0_alpn_selected(ssl, &out, &outlen);
|
2493
|
+
if (!outlen)
|
2494
|
+
return Qnil;
|
2495
|
+
else
|
2496
|
+
return rb_str_new((const char *) out, outlen);
|
2497
|
+
}
|
2498
|
+
|
2499
|
+
/*
|
2500
|
+
* call-seq:
|
2501
|
+
* session.export_keying_material(label, length) -> String
|
2502
|
+
*
|
2503
|
+
* Enables use of shared session key material in accordance with RFC 5705.
|
2504
|
+
*/
|
2505
|
+
static VALUE
|
2506
|
+
ossl_ssl_export_keying_material(int argc, VALUE *argv, VALUE self)
|
2507
|
+
{
|
2508
|
+
SSL *ssl;
|
2509
|
+
VALUE str;
|
2510
|
+
VALUE label;
|
2511
|
+
VALUE length;
|
2512
|
+
VALUE context;
|
2513
|
+
unsigned char *p;
|
2514
|
+
size_t len;
|
2515
|
+
int use_ctx = 0;
|
2516
|
+
unsigned char *ctx = NULL;
|
2517
|
+
size_t ctx_len = 0;
|
2518
|
+
int ret;
|
2519
|
+
|
2520
|
+
rb_scan_args(argc, argv, "21", &label, &length, &context);
|
2521
|
+
StringValue(label);
|
2522
|
+
|
2523
|
+
GetSSL(self, ssl);
|
2524
|
+
|
2525
|
+
len = (size_t)NUM2LONG(length);
|
2526
|
+
str = rb_str_new(0, len);
|
2527
|
+
p = (unsigned char *)RSTRING_PTR(str);
|
2528
|
+
if (!NIL_P(context)) {
|
2529
|
+
use_ctx = 1;
|
2530
|
+
StringValue(context);
|
2531
|
+
ctx = (unsigned char *)RSTRING_PTR(context);
|
2532
|
+
ctx_len = RSTRING_LEN(context);
|
2533
|
+
}
|
2534
|
+
ret = SSL_export_keying_material(ssl, p, len, (char *)RSTRING_PTR(label),
|
2535
|
+
RSTRING_LENINT(label), ctx, ctx_len, use_ctx);
|
2536
|
+
if (ret == 0 || ret == -1) {
|
2537
|
+
ossl_raise(eSSLError, "SSL_export_keying_material");
|
2538
|
+
}
|
2539
|
+
return str;
|
2540
|
+
}
|
2541
|
+
|
2542
|
+
/*
|
2543
|
+
* call-seq:
|
2544
|
+
* ssl.tmp_key => PKey or nil
|
2545
|
+
*
|
2546
|
+
* Returns the ephemeral key used in case of forward secrecy cipher.
|
2547
|
+
*/
|
2548
|
+
static VALUE
|
2549
|
+
ossl_ssl_tmp_key(VALUE self)
|
2550
|
+
{
|
2551
|
+
SSL *ssl;
|
2552
|
+
EVP_PKEY *key;
|
2553
|
+
|
2554
|
+
GetSSL(self, ssl);
|
2555
|
+
if (!SSL_get_server_tmp_key(ssl, &key))
|
2556
|
+
return Qnil;
|
2557
|
+
return ossl_pkey_new(key);
|
2558
|
+
}
|
2559
|
+
#endif /* !defined(OPENSSL_NO_SOCK) */
|
2560
|
+
|
2561
|
+
void
|
2562
|
+
Init_ossl_ssl(void)
|
2563
|
+
{
|
2564
|
+
#if 0
|
2565
|
+
mOSSL = rb_define_module("OpenSSL");
|
2566
|
+
eOSSLError = rb_define_class_under(mOSSL, "OpenSSLError", rb_eStandardError);
|
2567
|
+
rb_mWaitReadable = rb_define_module_under(rb_cIO, "WaitReadable");
|
2568
|
+
rb_mWaitWritable = rb_define_module_under(rb_cIO, "WaitWritable");
|
2569
|
+
#endif
|
2570
|
+
|
2571
|
+
#ifndef OPENSSL_NO_SOCK
|
2572
|
+
id_call = rb_intern_const("call");
|
2573
|
+
ID_callback_state = rb_intern_const("callback_state");
|
2574
|
+
|
2575
|
+
ossl_ssl_ex_vcb_idx = SSL_get_ex_new_index(0, (void *)"ossl_ssl_ex_vcb_idx", 0, 0, 0);
|
2576
|
+
if (ossl_ssl_ex_vcb_idx < 0)
|
2577
|
+
ossl_raise(rb_eRuntimeError, "SSL_get_ex_new_index");
|
2578
|
+
ossl_ssl_ex_ptr_idx = SSL_get_ex_new_index(0, (void *)"ossl_ssl_ex_ptr_idx", 0, 0, 0);
|
2579
|
+
if (ossl_ssl_ex_ptr_idx < 0)
|
2580
|
+
ossl_raise(rb_eRuntimeError, "SSL_get_ex_new_index");
|
2581
|
+
ossl_sslctx_ex_ptr_idx = SSL_CTX_get_ex_new_index(0, (void *)"ossl_sslctx_ex_ptr_idx", 0, 0, 0);
|
2582
|
+
if (ossl_sslctx_ex_ptr_idx < 0)
|
2583
|
+
ossl_raise(rb_eRuntimeError, "SSL_CTX_get_ex_new_index");
|
2584
|
+
|
2585
|
+
/* Document-module: OpenSSL::SSL
|
2586
|
+
*
|
2587
|
+
* Use SSLContext to set up the parameters for a TLS (former SSL)
|
2588
|
+
* connection. Both client and server TLS connections are supported,
|
2589
|
+
* SSLSocket and SSLServer may be used in conjunction with an instance
|
2590
|
+
* of SSLContext to set up connections.
|
2591
|
+
*/
|
2592
|
+
mSSL = rb_define_module_under(mOSSL, "SSL");
|
2593
|
+
|
2594
|
+
/* Document-class: OpenSSL::SSL::SSLError
|
2595
|
+
*
|
2596
|
+
* Generic error class raised by SSLSocket and SSLContext.
|
2597
|
+
*/
|
2598
|
+
eSSLError = rb_define_class_under(mSSL, "SSLError", eOSSLError);
|
2599
|
+
eSSLErrorWaitReadable = rb_define_class_under(mSSL, "SSLErrorWaitReadable", eSSLError);
|
2600
|
+
rb_include_module(eSSLErrorWaitReadable, rb_mWaitReadable);
|
2601
|
+
eSSLErrorWaitWritable = rb_define_class_under(mSSL, "SSLErrorWaitWritable", eSSLError);
|
2602
|
+
rb_include_module(eSSLErrorWaitWritable, rb_mWaitWritable);
|
2603
|
+
|
2604
|
+
Init_ossl_ssl_session();
|
2605
|
+
|
2606
|
+
/* Document-class: OpenSSL::SSL::SSLContext
|
2607
|
+
*
|
2608
|
+
* An SSLContext is used to set various options regarding certificates,
|
2609
|
+
* algorithms, verification, session caching, etc. The SSLContext is
|
2610
|
+
* used to create an SSLSocket.
|
2611
|
+
*
|
2612
|
+
* All attributes must be set before creating an SSLSocket as the
|
2613
|
+
* SSLContext will be frozen afterward.
|
2614
|
+
*/
|
2615
|
+
cSSLContext = rb_define_class_under(mSSL, "SSLContext", rb_cObject);
|
2616
|
+
rb_define_alloc_func(cSSLContext, ossl_sslctx_s_alloc);
|
2617
|
+
rb_undef_method(cSSLContext, "initialize_copy");
|
2618
|
+
|
2619
|
+
/*
|
2620
|
+
* Context certificate
|
2621
|
+
*
|
2622
|
+
* The _cert_, _key_, and _extra_chain_cert_ attributes are deprecated.
|
2623
|
+
* It is recommended to use #add_certificate instead.
|
2624
|
+
*/
|
2625
|
+
rb_attr(cSSLContext, rb_intern_const("cert"), 1, 1, Qfalse);
|
2626
|
+
|
2627
|
+
/*
|
2628
|
+
* Context private key
|
2629
|
+
*
|
2630
|
+
* The _cert_, _key_, and _extra_chain_cert_ attributes are deprecated.
|
2631
|
+
* It is recommended to use #add_certificate instead.
|
2632
|
+
*/
|
2633
|
+
rb_attr(cSSLContext, rb_intern_const("key"), 1, 1, Qfalse);
|
2634
|
+
|
2635
|
+
/*
|
2636
|
+
* A certificate or Array of certificates that will be sent to the client.
|
2637
|
+
*/
|
2638
|
+
rb_attr(cSSLContext, rb_intern_const("client_ca"), 1, 1, Qfalse);
|
2639
|
+
|
2640
|
+
/*
|
2641
|
+
* The path to a file containing a PEM-format CA certificate
|
2642
|
+
*/
|
2643
|
+
rb_attr(cSSLContext, rb_intern_const("ca_file"), 1, 1, Qfalse);
|
2644
|
+
|
2645
|
+
/*
|
2646
|
+
* The path to a directory containing CA certificates in PEM format.
|
2647
|
+
*
|
2648
|
+
* Files are looked up by subject's X509 name's hash value.
|
2649
|
+
*/
|
2650
|
+
rb_attr(cSSLContext, rb_intern_const("ca_path"), 1, 1, Qfalse);
|
2651
|
+
|
2652
|
+
/*
|
2653
|
+
* Maximum session lifetime in seconds.
|
2654
|
+
*/
|
2655
|
+
rb_attr(cSSLContext, rb_intern_const("timeout"), 1, 1, Qfalse);
|
2656
|
+
|
2657
|
+
/*
|
2658
|
+
* Session verification mode.
|
2659
|
+
*
|
2660
|
+
* Valid modes are VERIFY_NONE, VERIFY_PEER, VERIFY_CLIENT_ONCE,
|
2661
|
+
* VERIFY_FAIL_IF_NO_PEER_CERT and defined on OpenSSL::SSL
|
2662
|
+
*
|
2663
|
+
* The default mode is VERIFY_NONE, which does not perform any verification
|
2664
|
+
* at all.
|
2665
|
+
*
|
2666
|
+
* See SSL_CTX_set_verify(3) for details.
|
2667
|
+
*/
|
2668
|
+
rb_attr(cSSLContext, rb_intern_const("verify_mode"), 1, 1, Qfalse);
|
2669
|
+
|
2670
|
+
/*
|
2671
|
+
* Number of CA certificates to walk when verifying a certificate chain.
|
2672
|
+
*/
|
2673
|
+
rb_attr(cSSLContext, rb_intern_const("verify_depth"), 1, 1, Qfalse);
|
2674
|
+
|
2675
|
+
/*
|
2676
|
+
* A callback for additional certificate verification. The callback is
|
2677
|
+
* invoked for each certificate in the chain.
|
2678
|
+
*
|
2679
|
+
* The callback is invoked with two values. _preverify_ok_ indicates
|
2680
|
+
* indicates if the verification was passed (+true+) or not (+false+).
|
2681
|
+
* _store_context_ is an OpenSSL::X509::StoreContext containing the
|
2682
|
+
* context used for certificate verification.
|
2683
|
+
*
|
2684
|
+
* If the callback returns +false+, the chain verification is immediately
|
2685
|
+
* stopped and a bad_certificate alert is then sent.
|
2686
|
+
*/
|
2687
|
+
rb_attr(cSSLContext, rb_intern_const("verify_callback"), 1, 1, Qfalse);
|
2688
|
+
|
2689
|
+
/*
|
2690
|
+
* Whether to check the server certificate is valid for the hostname.
|
2691
|
+
*
|
2692
|
+
* In order to make this work, verify_mode must be set to VERIFY_PEER and
|
2693
|
+
* the server hostname must be given by OpenSSL::SSL::SSLSocket#hostname=.
|
2694
|
+
*/
|
2695
|
+
rb_attr(cSSLContext, rb_intern_const("verify_hostname"), 1, 1, Qfalse);
|
2696
|
+
|
2697
|
+
/*
|
2698
|
+
* An OpenSSL::X509::Store used for certificate verification.
|
2699
|
+
*/
|
2700
|
+
rb_attr(cSSLContext, rb_intern_const("cert_store"), 1, 1, Qfalse);
|
2701
|
+
|
2702
|
+
/*
|
2703
|
+
* An Array of extra X509 certificates to be added to the certificate
|
2704
|
+
* chain.
|
2705
|
+
*
|
2706
|
+
* The _cert_, _key_, and _extra_chain_cert_ attributes are deprecated.
|
2707
|
+
* It is recommended to use #add_certificate instead.
|
2708
|
+
*/
|
2709
|
+
rb_attr(cSSLContext, rb_intern_const("extra_chain_cert"), 1, 1, Qfalse);
|
2710
|
+
|
2711
|
+
/*
|
2712
|
+
* A callback invoked when a client certificate is requested by a server
|
2713
|
+
* and no certificate has been set.
|
2714
|
+
*
|
2715
|
+
* The callback is invoked with a Session and must return an Array
|
2716
|
+
* containing an OpenSSL::X509::Certificate and an OpenSSL::PKey. If any
|
2717
|
+
* other value is returned the handshake is suspended.
|
2718
|
+
*/
|
2719
|
+
rb_attr(cSSLContext, rb_intern_const("client_cert_cb"), 1, 1, Qfalse);
|
2720
|
+
|
2721
|
+
/*
|
2722
|
+
* Sets the context in which a session can be reused. This allows
|
2723
|
+
* sessions for multiple applications to be distinguished, for example, by
|
2724
|
+
* name.
|
2725
|
+
*/
|
2726
|
+
rb_attr(cSSLContext, rb_intern_const("session_id_context"), 1, 1, Qfalse);
|
2727
|
+
|
2728
|
+
/*
|
2729
|
+
* A callback invoked on a server when a session is proposed by the client
|
2730
|
+
* but the session could not be found in the server's internal cache.
|
2731
|
+
*
|
2732
|
+
* The callback is invoked with the SSLSocket and session id. The
|
2733
|
+
* callback may return a Session from an external cache.
|
2734
|
+
*/
|
2735
|
+
rb_attr(cSSLContext, rb_intern_const("session_get_cb"), 1, 1, Qfalse);
|
2736
|
+
|
2737
|
+
/*
|
2738
|
+
* A callback invoked when a new session was negotiated.
|
2739
|
+
*
|
2740
|
+
* The callback is invoked with an SSLSocket. If +false+ is returned the
|
2741
|
+
* session will be removed from the internal cache.
|
2742
|
+
*/
|
2743
|
+
rb_attr(cSSLContext, rb_intern_const("session_new_cb"), 1, 1, Qfalse);
|
2744
|
+
|
2745
|
+
/*
|
2746
|
+
* A callback invoked when a session is removed from the internal cache.
|
2747
|
+
*
|
2748
|
+
* The callback is invoked with an SSLContext and a Session.
|
2749
|
+
*
|
2750
|
+
* IMPORTANT NOTE: It is currently not possible to use this safely in a
|
2751
|
+
* multi-threaded application. The callback is called inside a global lock
|
2752
|
+
* and it can randomly cause deadlock on Ruby thread switching.
|
2753
|
+
*/
|
2754
|
+
rb_attr(cSSLContext, rb_intern_const("session_remove_cb"), 1, 1, Qfalse);
|
2755
|
+
|
2756
|
+
/*
|
2757
|
+
* A callback invoked whenever a new handshake is initiated on an
|
2758
|
+
* established connection. May be used to disable renegotiation entirely.
|
2759
|
+
*
|
2760
|
+
* The callback is invoked with the active SSLSocket. The callback's
|
2761
|
+
* return value is ignored. A normal return indicates "approval" of the
|
2762
|
+
* renegotiation and will continue the process. To forbid renegotiation
|
2763
|
+
* and to cancel the process, raise an exception within the callback.
|
2764
|
+
*
|
2765
|
+
* === Disable client renegotiation
|
2766
|
+
*
|
2767
|
+
* When running a server, it is often desirable to disable client
|
2768
|
+
* renegotiation entirely. You may use a callback as follows to implement
|
2769
|
+
* this feature:
|
2770
|
+
*
|
2771
|
+
* ctx.renegotiation_cb = lambda do |ssl|
|
2772
|
+
* raise RuntimeError, "Client renegotiation disabled"
|
2773
|
+
* end
|
2774
|
+
*/
|
2775
|
+
rb_attr(cSSLContext, rb_intern_const("renegotiation_cb"), 1, 1, Qfalse);
|
2776
|
+
#ifdef OSSL_USE_NEXTPROTONEG
|
2777
|
+
/*
|
2778
|
+
* An Enumerable of Strings. Each String represents a protocol to be
|
2779
|
+
* advertised as the list of supported protocols for Next Protocol
|
2780
|
+
* Negotiation. Supported in OpenSSL 1.0.1 and higher. Has no effect
|
2781
|
+
* on the client side. If not set explicitly, the NPN extension will
|
2782
|
+
* not be sent by the server in the handshake.
|
2783
|
+
*
|
2784
|
+
* === Example
|
2785
|
+
*
|
2786
|
+
* ctx.npn_protocols = ["http/1.1", "spdy/2"]
|
2787
|
+
*/
|
2788
|
+
rb_attr(cSSLContext, rb_intern_const("npn_protocols"), 1, 1, Qfalse);
|
2789
|
+
/*
|
2790
|
+
* A callback invoked on the client side when the client needs to select
|
2791
|
+
* a protocol from the list sent by the server. Supported in OpenSSL 1.0.1
|
2792
|
+
* and higher. The client MUST select a protocol of those advertised by
|
2793
|
+
* the server. If none is acceptable, raising an error in the callback
|
2794
|
+
* will cause the handshake to fail. Not setting this callback explicitly
|
2795
|
+
* means not supporting the NPN extension on the client - any protocols
|
2796
|
+
* advertised by the server will be ignored.
|
2797
|
+
*
|
2798
|
+
* === Example
|
2799
|
+
*
|
2800
|
+
* ctx.npn_select_cb = lambda do |protocols|
|
2801
|
+
* # inspect the protocols and select one
|
2802
|
+
* protocols.first
|
2803
|
+
* end
|
2804
|
+
*/
|
2805
|
+
rb_attr(cSSLContext, rb_intern_const("npn_select_cb"), 1, 1, Qfalse);
|
2806
|
+
#endif
|
2807
|
+
|
2808
|
+
/*
|
2809
|
+
* An Enumerable of Strings. Each String represents a protocol to be
|
2810
|
+
* advertised as the list of supported protocols for Application-Layer
|
2811
|
+
* Protocol Negotiation. Supported in OpenSSL 1.0.2 and higher. Has no
|
2812
|
+
* effect on the server side. If not set explicitly, the ALPN extension will
|
2813
|
+
* not be included in the handshake.
|
2814
|
+
*
|
2815
|
+
* === Example
|
2816
|
+
*
|
2817
|
+
* ctx.alpn_protocols = ["http/1.1", "spdy/2", "h2"]
|
2818
|
+
*/
|
2819
|
+
rb_attr(cSSLContext, rb_intern_const("alpn_protocols"), 1, 1, Qfalse);
|
2820
|
+
/*
|
2821
|
+
* A callback invoked on the server side when the server needs to select
|
2822
|
+
* a protocol from the list sent by the client. Supported in OpenSSL 1.0.2
|
2823
|
+
* and higher. The callback must return a protocol of those advertised by
|
2824
|
+
* the client. If none is acceptable, raising an error in the callback
|
2825
|
+
* will cause the handshake to fail. Not setting this callback explicitly
|
2826
|
+
* means not supporting the ALPN extension on the server - any protocols
|
2827
|
+
* advertised by the client will be ignored.
|
2828
|
+
*
|
2829
|
+
* === Example
|
2830
|
+
*
|
2831
|
+
* ctx.alpn_select_cb = lambda do |protocols|
|
2832
|
+
* # inspect the protocols and select one
|
2833
|
+
* protocols.first
|
2834
|
+
* end
|
2835
|
+
*/
|
2836
|
+
rb_attr(cSSLContext, rb_intern_const("alpn_select_cb"), 1, 1, Qfalse);
|
2837
|
+
|
2838
|
+
/*
|
2839
|
+
* A callback invoked when TLS key material is generated or received, in
|
2840
|
+
* order to allow applications to store this keying material for debugging
|
2841
|
+
* purposes.
|
2842
|
+
*
|
2843
|
+
* The callback is invoked with an SSLSocket and a string containing the
|
2844
|
+
* key material in the format used by NSS for its SSLKEYLOGFILE debugging
|
2845
|
+
* output.
|
2846
|
+
*
|
2847
|
+
* It is only compatible with OpenSSL >= 1.1.1. Even if LibreSSL implements
|
2848
|
+
* SSL_CTX_set_keylog_callback() from v3.4.2, it does nothing (see
|
2849
|
+
* https://github.com/libressl-portable/openbsd/commit/648d39f0f035835d0653342d139883b9661e9cb6).
|
2850
|
+
*
|
2851
|
+
* === Example
|
2852
|
+
*
|
2853
|
+
* context.keylog_cb = proc do |_sock, line|
|
2854
|
+
* File.open('ssl_keylog_file', "a") do |f|
|
2855
|
+
* f.write("#{line}\n")
|
2856
|
+
* end
|
2857
|
+
* end
|
2858
|
+
*/
|
2859
|
+
rb_attr(cSSLContext, rb_intern_const("keylog_cb"), 1, 1, Qfalse);
|
2860
|
+
|
2861
|
+
rb_define_alias(cSSLContext, "ssl_timeout", "timeout");
|
2862
|
+
rb_define_alias(cSSLContext, "ssl_timeout=", "timeout=");
|
2863
|
+
rb_define_private_method(cSSLContext, "set_minmax_proto_version",
|
2864
|
+
ossl_sslctx_set_minmax_proto_version, 2);
|
2865
|
+
rb_define_method(cSSLContext, "ciphers", ossl_sslctx_get_ciphers, 0);
|
2866
|
+
rb_define_method(cSSLContext, "ciphers=", ossl_sslctx_set_ciphers, 1);
|
2867
|
+
#ifdef HAVE_SSL_CTX_SET_CIPHERSUITES
|
2868
|
+
rb_define_method(cSSLContext, "ciphersuites=", ossl_sslctx_set_ciphersuites, 1);
|
2869
|
+
#endif
|
2870
|
+
#ifndef OPENSSL_NO_DH
|
2871
|
+
rb_define_method(cSSLContext, "tmp_dh=", ossl_sslctx_set_tmp_dh, 1);
|
2872
|
+
#endif
|
2873
|
+
rb_define_method(cSSLContext, "ecdh_curves=", ossl_sslctx_set_ecdh_curves, 1);
|
2874
|
+
rb_define_method(cSSLContext, "security_level", ossl_sslctx_get_security_level, 0);
|
2875
|
+
rb_define_method(cSSLContext, "security_level=", ossl_sslctx_set_security_level, 1);
|
2876
|
+
#ifdef SSL_MODE_SEND_FALLBACK_SCSV
|
2877
|
+
rb_define_method(cSSLContext, "enable_fallback_scsv", ossl_sslctx_enable_fallback_scsv, 0);
|
2878
|
+
#endif
|
2879
|
+
rb_define_method(cSSLContext, "add_certificate", ossl_sslctx_add_certificate, -1);
|
2880
|
+
|
2881
|
+
rb_define_method(cSSLContext, "setup", ossl_sslctx_setup, 0);
|
2882
|
+
rb_define_alias(cSSLContext, "freeze", "setup");
|
2883
|
+
|
2884
|
+
/*
|
2885
|
+
* No session caching for client or server
|
2886
|
+
*/
|
2887
|
+
rb_define_const(cSSLContext, "SESSION_CACHE_OFF", LONG2NUM(SSL_SESS_CACHE_OFF));
|
2888
|
+
|
2889
|
+
/*
|
2890
|
+
* Client sessions are added to the session cache
|
2891
|
+
*/
|
2892
|
+
rb_define_const(cSSLContext, "SESSION_CACHE_CLIENT", LONG2NUM(SSL_SESS_CACHE_CLIENT)); /* doesn't actually do anything in 0.9.8e */
|
2893
|
+
|
2894
|
+
/*
|
2895
|
+
* Server sessions are added to the session cache
|
2896
|
+
*/
|
2897
|
+
rb_define_const(cSSLContext, "SESSION_CACHE_SERVER", LONG2NUM(SSL_SESS_CACHE_SERVER));
|
2898
|
+
|
2899
|
+
/*
|
2900
|
+
* Both client and server sessions are added to the session cache
|
2901
|
+
*/
|
2902
|
+
rb_define_const(cSSLContext, "SESSION_CACHE_BOTH", LONG2NUM(SSL_SESS_CACHE_BOTH)); /* no different than CACHE_SERVER in 0.9.8e */
|
2903
|
+
|
2904
|
+
/*
|
2905
|
+
* Normally the session cache is checked for expired sessions every 255
|
2906
|
+
* connections. Since this may lead to a delay that cannot be controlled,
|
2907
|
+
* the automatic flushing may be disabled and #flush_sessions can be
|
2908
|
+
* called explicitly.
|
2909
|
+
*/
|
2910
|
+
rb_define_const(cSSLContext, "SESSION_CACHE_NO_AUTO_CLEAR", LONG2NUM(SSL_SESS_CACHE_NO_AUTO_CLEAR));
|
2911
|
+
|
2912
|
+
/*
|
2913
|
+
* Always perform external lookups of sessions even if they are in the
|
2914
|
+
* internal cache.
|
2915
|
+
*
|
2916
|
+
* This flag has no effect on clients
|
2917
|
+
*/
|
2918
|
+
rb_define_const(cSSLContext, "SESSION_CACHE_NO_INTERNAL_LOOKUP", LONG2NUM(SSL_SESS_CACHE_NO_INTERNAL_LOOKUP));
|
2919
|
+
|
2920
|
+
/*
|
2921
|
+
* Never automatically store sessions in the internal store.
|
2922
|
+
*/
|
2923
|
+
rb_define_const(cSSLContext, "SESSION_CACHE_NO_INTERNAL_STORE", LONG2NUM(SSL_SESS_CACHE_NO_INTERNAL_STORE));
|
2924
|
+
|
2925
|
+
/*
|
2926
|
+
* Enables both SESSION_CACHE_NO_INTERNAL_LOOKUP and
|
2927
|
+
* SESSION_CACHE_NO_INTERNAL_STORE.
|
2928
|
+
*/
|
2929
|
+
rb_define_const(cSSLContext, "SESSION_CACHE_NO_INTERNAL", LONG2NUM(SSL_SESS_CACHE_NO_INTERNAL));
|
2930
|
+
|
2931
|
+
rb_define_method(cSSLContext, "session_add", ossl_sslctx_session_add, 1);
|
2932
|
+
rb_define_method(cSSLContext, "session_remove", ossl_sslctx_session_remove, 1);
|
2933
|
+
rb_define_method(cSSLContext, "session_cache_mode", ossl_sslctx_get_session_cache_mode, 0);
|
2934
|
+
rb_define_method(cSSLContext, "session_cache_mode=", ossl_sslctx_set_session_cache_mode, 1);
|
2935
|
+
rb_define_method(cSSLContext, "session_cache_size", ossl_sslctx_get_session_cache_size, 0);
|
2936
|
+
rb_define_method(cSSLContext, "session_cache_size=", ossl_sslctx_set_session_cache_size, 1);
|
2937
|
+
rb_define_method(cSSLContext, "session_cache_stats", ossl_sslctx_get_session_cache_stats, 0);
|
2938
|
+
rb_define_method(cSSLContext, "flush_sessions", ossl_sslctx_flush_sessions, -1);
|
2939
|
+
rb_define_method(cSSLContext, "options", ossl_sslctx_get_options, 0);
|
2940
|
+
rb_define_method(cSSLContext, "options=", ossl_sslctx_set_options, 1);
|
2941
|
+
|
2942
|
+
/*
|
2943
|
+
* Document-class: OpenSSL::SSL::SSLSocket
|
2944
|
+
*/
|
2945
|
+
cSSLSocket = rb_define_class_under(mSSL, "SSLSocket", rb_cObject);
|
2946
|
+
rb_define_alloc_func(cSSLSocket, ossl_ssl_s_alloc);
|
2947
|
+
rb_define_method(cSSLSocket, "initialize", ossl_ssl_initialize, -1);
|
2948
|
+
rb_undef_method(cSSLSocket, "initialize_copy");
|
2949
|
+
rb_define_method(cSSLSocket, "connect", ossl_ssl_connect, 0);
|
2950
|
+
rb_define_method(cSSLSocket, "connect_nonblock", ossl_ssl_connect_nonblock, -1);
|
2951
|
+
rb_define_method(cSSLSocket, "accept", ossl_ssl_accept, 0);
|
2952
|
+
rb_define_method(cSSLSocket, "accept_nonblock", ossl_ssl_accept_nonblock, -1);
|
2953
|
+
rb_define_method(cSSLSocket, "sysread", ossl_ssl_read, -1);
|
2954
|
+
rb_define_private_method(cSSLSocket, "sysread_nonblock", ossl_ssl_read_nonblock, -1);
|
2955
|
+
rb_define_method(cSSLSocket, "syswrite", ossl_ssl_write, 1);
|
2956
|
+
rb_define_private_method(cSSLSocket, "syswrite_nonblock", ossl_ssl_write_nonblock, -1);
|
2957
|
+
rb_define_private_method(cSSLSocket, "stop", ossl_ssl_stop, 0);
|
2958
|
+
rb_define_method(cSSLSocket, "cert", ossl_ssl_get_cert, 0);
|
2959
|
+
rb_define_method(cSSLSocket, "peer_cert", ossl_ssl_get_peer_cert, 0);
|
2960
|
+
rb_define_method(cSSLSocket, "peer_cert_chain", ossl_ssl_get_peer_cert_chain, 0);
|
2961
|
+
rb_define_method(cSSLSocket, "ssl_version", ossl_ssl_get_version, 0);
|
2962
|
+
rb_define_method(cSSLSocket, "cipher", ossl_ssl_get_cipher, 0);
|
2963
|
+
rb_define_method(cSSLSocket, "state", ossl_ssl_get_state, 0);
|
2964
|
+
rb_define_method(cSSLSocket, "pending", ossl_ssl_pending, 0);
|
2965
|
+
rb_define_method(cSSLSocket, "session_reused?", ossl_ssl_session_reused, 0);
|
2966
|
+
/* implementation of OpenSSL::SSL::SSLSocket#session is in lib/openssl/ssl.rb */
|
2967
|
+
rb_define_method(cSSLSocket, "session=", ossl_ssl_set_session, 1);
|
2968
|
+
rb_define_method(cSSLSocket, "verify_result", ossl_ssl_get_verify_result, 0);
|
2969
|
+
rb_define_method(cSSLSocket, "client_ca", ossl_ssl_get_client_ca_list, 0);
|
2970
|
+
/* #hostname is defined in lib/openssl/ssl.rb */
|
2971
|
+
rb_define_method(cSSLSocket, "hostname=", ossl_ssl_set_hostname, 1);
|
2972
|
+
rb_define_method(cSSLSocket, "finished_message", ossl_ssl_get_finished, 0);
|
2973
|
+
rb_define_method(cSSLSocket, "peer_finished_message", ossl_ssl_get_peer_finished, 0);
|
2974
|
+
rb_define_method(cSSLSocket, "tmp_key", ossl_ssl_tmp_key, 0);
|
2975
|
+
rb_define_method(cSSLSocket, "alpn_protocol", ossl_ssl_alpn_protocol, 0);
|
2976
|
+
rb_define_method(cSSLSocket, "export_keying_material", ossl_ssl_export_keying_material, -1);
|
2977
|
+
# ifdef OSSL_USE_NEXTPROTONEG
|
2978
|
+
rb_define_method(cSSLSocket, "npn_protocol", ossl_ssl_npn_protocol, 0);
|
2979
|
+
# endif
|
2980
|
+
|
2981
|
+
rb_define_const(mSSL, "VERIFY_NONE", INT2NUM(SSL_VERIFY_NONE));
|
2982
|
+
rb_define_const(mSSL, "VERIFY_PEER", INT2NUM(SSL_VERIFY_PEER));
|
2983
|
+
rb_define_const(mSSL, "VERIFY_FAIL_IF_NO_PEER_CERT", INT2NUM(SSL_VERIFY_FAIL_IF_NO_PEER_CERT));
|
2984
|
+
rb_define_const(mSSL, "VERIFY_CLIENT_ONCE", INT2NUM(SSL_VERIFY_CLIENT_ONCE));
|
2985
|
+
|
2986
|
+
rb_define_const(mSSL, "OP_ALL", ULONG2NUM(SSL_OP_ALL));
|
2987
|
+
#ifdef SSL_OP_CLEANSE_PLAINTEXT /* OpenSSL 3.0 */
|
2988
|
+
rb_define_const(mSSL, "OP_CLEANSE_PLAINTEXT", ULONG2NUM(SSL_OP_CLEANSE_PLAINTEXT));
|
2989
|
+
#endif
|
2990
|
+
rb_define_const(mSSL, "OP_LEGACY_SERVER_CONNECT", ULONG2NUM(SSL_OP_LEGACY_SERVER_CONNECT));
|
2991
|
+
#ifdef SSL_OP_ENABLE_KTLS /* OpenSSL 3.0 */
|
2992
|
+
rb_define_const(mSSL, "OP_ENABLE_KTLS", ULONG2NUM(SSL_OP_ENABLE_KTLS));
|
2993
|
+
#endif
|
2994
|
+
rb_define_const(mSSL, "OP_TLSEXT_PADDING", ULONG2NUM(SSL_OP_TLSEXT_PADDING));
|
2995
|
+
rb_define_const(mSSL, "OP_SAFARI_ECDHE_ECDSA_BUG", ULONG2NUM(SSL_OP_SAFARI_ECDHE_ECDSA_BUG));
|
2996
|
+
#ifdef SSL_OP_IGNORE_UNEXPECTED_EOF /* OpenSSL 3.0 */
|
2997
|
+
rb_define_const(mSSL, "OP_IGNORE_UNEXPECTED_EOF", ULONG2NUM(SSL_OP_IGNORE_UNEXPECTED_EOF));
|
2998
|
+
#endif
|
2999
|
+
#ifdef SSL_OP_ALLOW_CLIENT_RENEGOTIATION /* OpenSSL 3.0 */
|
3000
|
+
rb_define_const(mSSL, "OP_ALLOW_CLIENT_RENEGOTIATION", ULONG2NUM(SSL_OP_ALLOW_CLIENT_RENEGOTIATION));
|
3001
|
+
#endif
|
3002
|
+
#ifdef SSL_OP_DISABLE_TLSEXT_CA_NAMES /* OpenSSL 3.0 */
|
3003
|
+
rb_define_const(mSSL, "OP_DISABLE_TLSEXT_CA_NAMES", ULONG2NUM(SSL_OP_DISABLE_TLSEXT_CA_NAMES));
|
3004
|
+
#endif
|
3005
|
+
#ifdef SSL_OP_ALLOW_NO_DHE_KEX /* OpenSSL 1.1.1 */
|
3006
|
+
rb_define_const(mSSL, "OP_ALLOW_NO_DHE_KEX", ULONG2NUM(SSL_OP_ALLOW_NO_DHE_KEX));
|
3007
|
+
#endif
|
3008
|
+
rb_define_const(mSSL, "OP_DONT_INSERT_EMPTY_FRAGMENTS", ULONG2NUM(SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS));
|
3009
|
+
rb_define_const(mSSL, "OP_NO_TICKET", ULONG2NUM(SSL_OP_NO_TICKET));
|
3010
|
+
rb_define_const(mSSL, "OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION", ULONG2NUM(SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION));
|
3011
|
+
rb_define_const(mSSL, "OP_NO_COMPRESSION", ULONG2NUM(SSL_OP_NO_COMPRESSION));
|
3012
|
+
rb_define_const(mSSL, "OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION", ULONG2NUM(SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION));
|
3013
|
+
#ifdef SSL_OP_NO_ENCRYPT_THEN_MAC /* OpenSSL 1.1.1 */
|
3014
|
+
rb_define_const(mSSL, "OP_NO_ENCRYPT_THEN_MAC", ULONG2NUM(SSL_OP_NO_ENCRYPT_THEN_MAC));
|
3015
|
+
#endif
|
3016
|
+
#ifdef SSL_OP_ENABLE_MIDDLEBOX_COMPAT /* OpenSSL 1.1.1 */
|
3017
|
+
rb_define_const(mSSL, "OP_ENABLE_MIDDLEBOX_COMPAT", ULONG2NUM(SSL_OP_ENABLE_MIDDLEBOX_COMPAT));
|
3018
|
+
#endif
|
3019
|
+
#ifdef SSL_OP_PRIORITIZE_CHACHA /* OpenSSL 1.1.1 */
|
3020
|
+
rb_define_const(mSSL, "OP_PRIORITIZE_CHACHA", ULONG2NUM(SSL_OP_PRIORITIZE_CHACHA));
|
3021
|
+
#endif
|
3022
|
+
#ifdef SSL_OP_NO_ANTI_REPLAY /* OpenSSL 1.1.1 */
|
3023
|
+
rb_define_const(mSSL, "OP_NO_ANTI_REPLAY", ULONG2NUM(SSL_OP_NO_ANTI_REPLAY));
|
3024
|
+
#endif
|
3025
|
+
rb_define_const(mSSL, "OP_NO_SSLv3", ULONG2NUM(SSL_OP_NO_SSLv3));
|
3026
|
+
rb_define_const(mSSL, "OP_NO_TLSv1", ULONG2NUM(SSL_OP_NO_TLSv1));
|
3027
|
+
rb_define_const(mSSL, "OP_NO_TLSv1_1", ULONG2NUM(SSL_OP_NO_TLSv1_1));
|
3028
|
+
rb_define_const(mSSL, "OP_NO_TLSv1_2", ULONG2NUM(SSL_OP_NO_TLSv1_2));
|
3029
|
+
#ifdef SSL_OP_NO_TLSv1_3 /* OpenSSL 1.1.1 */
|
3030
|
+
rb_define_const(mSSL, "OP_NO_TLSv1_3", ULONG2NUM(SSL_OP_NO_TLSv1_3));
|
3031
|
+
#endif
|
3032
|
+
rb_define_const(mSSL, "OP_CIPHER_SERVER_PREFERENCE", ULONG2NUM(SSL_OP_CIPHER_SERVER_PREFERENCE));
|
3033
|
+
rb_define_const(mSSL, "OP_TLS_ROLLBACK_BUG", ULONG2NUM(SSL_OP_TLS_ROLLBACK_BUG));
|
3034
|
+
#ifdef SSL_OP_NO_RENEGOTIATION /* OpenSSL 1.1.1 */
|
3035
|
+
rb_define_const(mSSL, "OP_NO_RENEGOTIATION", ULONG2NUM(SSL_OP_NO_RENEGOTIATION));
|
3036
|
+
#endif
|
3037
|
+
rb_define_const(mSSL, "OP_CRYPTOPRO_TLSEXT_BUG", ULONG2NUM(SSL_OP_CRYPTOPRO_TLSEXT_BUG));
|
3038
|
+
|
3039
|
+
/* SSL_OP_* flags for DTLS */
|
3040
|
+
#if 0
|
3041
|
+
rb_define_const(mSSL, "OP_NO_QUERY_MTU", ULONG2NUM(SSL_OP_NO_QUERY_MTU));
|
3042
|
+
rb_define_const(mSSL, "OP_COOKIE_EXCHANGE", ULONG2NUM(SSL_OP_COOKIE_EXCHANGE));
|
3043
|
+
rb_define_const(mSSL, "OP_CISCO_ANYCONNECT", ULONG2NUM(SSL_OP_CISCO_ANYCONNECT));
|
3044
|
+
#endif
|
3045
|
+
|
3046
|
+
/* Deprecated in OpenSSL 1.1.0. */
|
3047
|
+
rb_define_const(mSSL, "OP_MICROSOFT_SESS_ID_BUG", ULONG2NUM(SSL_OP_MICROSOFT_SESS_ID_BUG));
|
3048
|
+
/* Deprecated in OpenSSL 1.1.0. */
|
3049
|
+
rb_define_const(mSSL, "OP_NETSCAPE_CHALLENGE_BUG", ULONG2NUM(SSL_OP_NETSCAPE_CHALLENGE_BUG));
|
3050
|
+
/* Deprecated in OpenSSL 0.9.8q and 1.0.0c. */
|
3051
|
+
rb_define_const(mSSL, "OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG", ULONG2NUM(SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG));
|
3052
|
+
/* Deprecated in OpenSSL 1.0.1h and 1.0.2. */
|
3053
|
+
rb_define_const(mSSL, "OP_SSLREF2_REUSE_CERT_TYPE_BUG", ULONG2NUM(SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG));
|
3054
|
+
/* Deprecated in OpenSSL 1.1.0. */
|
3055
|
+
rb_define_const(mSSL, "OP_MICROSOFT_BIG_SSLV3_BUFFER", ULONG2NUM(SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER));
|
3056
|
+
/* Deprecated in OpenSSL 0.9.7h and 0.9.8b. */
|
3057
|
+
rb_define_const(mSSL, "OP_MSIE_SSLV2_RSA_PADDING", ULONG2NUM(SSL_OP_MSIE_SSLV2_RSA_PADDING));
|
3058
|
+
/* Deprecated in OpenSSL 1.1.0. */
|
3059
|
+
rb_define_const(mSSL, "OP_SSLEAY_080_CLIENT_DH_BUG", ULONG2NUM(SSL_OP_SSLEAY_080_CLIENT_DH_BUG));
|
3060
|
+
/* Deprecated in OpenSSL 1.1.0. */
|
3061
|
+
rb_define_const(mSSL, "OP_TLS_D5_BUG", ULONG2NUM(SSL_OP_TLS_D5_BUG));
|
3062
|
+
/* Deprecated in OpenSSL 1.1.0. */
|
3063
|
+
rb_define_const(mSSL, "OP_TLS_BLOCK_PADDING_BUG", ULONG2NUM(SSL_OP_TLS_BLOCK_PADDING_BUG));
|
3064
|
+
/* Deprecated in OpenSSL 1.1.0. */
|
3065
|
+
rb_define_const(mSSL, "OP_SINGLE_ECDH_USE", ULONG2NUM(SSL_OP_SINGLE_ECDH_USE));
|
3066
|
+
/* Deprecated in OpenSSL 1.1.0. */
|
3067
|
+
rb_define_const(mSSL, "OP_SINGLE_DH_USE", ULONG2NUM(SSL_OP_SINGLE_DH_USE));
|
3068
|
+
/* Deprecated in OpenSSL 1.0.1k and 1.0.2. */
|
3069
|
+
rb_define_const(mSSL, "OP_EPHEMERAL_RSA", ULONG2NUM(SSL_OP_EPHEMERAL_RSA));
|
3070
|
+
/* Deprecated in OpenSSL 1.1.0. */
|
3071
|
+
rb_define_const(mSSL, "OP_NO_SSLv2", ULONG2NUM(SSL_OP_NO_SSLv2));
|
3072
|
+
/* Deprecated in OpenSSL 1.0.1. */
|
3073
|
+
rb_define_const(mSSL, "OP_PKCS1_CHECK_1", ULONG2NUM(SSL_OP_PKCS1_CHECK_1));
|
3074
|
+
/* Deprecated in OpenSSL 1.0.1. */
|
3075
|
+
rb_define_const(mSSL, "OP_PKCS1_CHECK_2", ULONG2NUM(SSL_OP_PKCS1_CHECK_2));
|
3076
|
+
/* Deprecated in OpenSSL 1.1.0. */
|
3077
|
+
rb_define_const(mSSL, "OP_NETSCAPE_CA_DN_BUG", ULONG2NUM(SSL_OP_NETSCAPE_CA_DN_BUG));
|
3078
|
+
/* Deprecated in OpenSSL 1.1.0. */
|
3079
|
+
rb_define_const(mSSL, "OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG", ULONG2NUM(SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG));
|
3080
|
+
|
3081
|
+
|
3082
|
+
/*
|
3083
|
+
* SSL/TLS version constants. Used by SSLContext#min_version= and
|
3084
|
+
* #max_version=
|
3085
|
+
*/
|
3086
|
+
/* SSL 2.0 */
|
3087
|
+
rb_define_const(mSSL, "SSL2_VERSION", INT2NUM(SSL2_VERSION));
|
3088
|
+
/* SSL 3.0 */
|
3089
|
+
rb_define_const(mSSL, "SSL3_VERSION", INT2NUM(SSL3_VERSION));
|
3090
|
+
/* TLS 1.0 */
|
3091
|
+
rb_define_const(mSSL, "TLS1_VERSION", INT2NUM(TLS1_VERSION));
|
3092
|
+
/* TLS 1.1 */
|
3093
|
+
rb_define_const(mSSL, "TLS1_1_VERSION", INT2NUM(TLS1_1_VERSION));
|
3094
|
+
/* TLS 1.2 */
|
3095
|
+
rb_define_const(mSSL, "TLS1_2_VERSION", INT2NUM(TLS1_2_VERSION));
|
3096
|
+
#ifdef TLS1_3_VERSION /* OpenSSL 1.1.1 */
|
3097
|
+
/* TLS 1.3 */
|
3098
|
+
rb_define_const(mSSL, "TLS1_3_VERSION", INT2NUM(TLS1_3_VERSION));
|
3099
|
+
#endif
|
3100
|
+
|
3101
|
+
|
3102
|
+
sym_exception = ID2SYM(rb_intern_const("exception"));
|
3103
|
+
sym_wait_readable = ID2SYM(rb_intern_const("wait_readable"));
|
3104
|
+
sym_wait_writable = ID2SYM(rb_intern_const("wait_writable"));
|
3105
|
+
|
3106
|
+
id_tmp_dh_callback = rb_intern_const("tmp_dh_callback");
|
3107
|
+
id_npn_protocols_encoded = rb_intern_const("npn_protocols_encoded");
|
3108
|
+
id_each = rb_intern_const("each");
|
3109
|
+
|
3110
|
+
#define DefIVarID(name) do \
|
3111
|
+
id_i_##name = rb_intern_const("@"#name); while (0)
|
3112
|
+
|
3113
|
+
DefIVarID(cert_store);
|
3114
|
+
DefIVarID(ca_file);
|
3115
|
+
DefIVarID(ca_path);
|
3116
|
+
DefIVarID(verify_mode);
|
3117
|
+
DefIVarID(verify_depth);
|
3118
|
+
DefIVarID(verify_callback);
|
3119
|
+
DefIVarID(client_ca);
|
3120
|
+
DefIVarID(renegotiation_cb);
|
3121
|
+
DefIVarID(cert);
|
3122
|
+
DefIVarID(key);
|
3123
|
+
DefIVarID(extra_chain_cert);
|
3124
|
+
DefIVarID(client_cert_cb);
|
3125
|
+
DefIVarID(timeout);
|
3126
|
+
DefIVarID(session_id_context);
|
3127
|
+
DefIVarID(session_get_cb);
|
3128
|
+
DefIVarID(session_new_cb);
|
3129
|
+
DefIVarID(session_remove_cb);
|
3130
|
+
DefIVarID(npn_select_cb);
|
3131
|
+
DefIVarID(npn_protocols);
|
3132
|
+
DefIVarID(alpn_protocols);
|
3133
|
+
DefIVarID(alpn_select_cb);
|
3134
|
+
DefIVarID(servername_cb);
|
3135
|
+
DefIVarID(verify_hostname);
|
3136
|
+
DefIVarID(keylog_cb);
|
3137
|
+
|
3138
|
+
DefIVarID(io);
|
3139
|
+
DefIVarID(context);
|
3140
|
+
DefIVarID(hostname);
|
3141
|
+
#endif /* !defined(OPENSSL_NO_SOCK) */
|
3142
|
+
}
|