openssl.nim 38 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912
  1. #
  2. #
  3. # Nim's Runtime Library
  4. # (c) Copyright 2015 Andreas Rumpf
  5. #
  6. # See the file "copying.txt", included in this
  7. # distribution, for details about the copyright.
  8. #
  9. ## OpenSSL wrapper. Supports OpenSSL >= 1.1.0 dynamically (as default) or statically linked
  10. ## using `--dynlibOverride:ssl`.
  11. ##
  12. ## `-d:sslVersion=1.2.3` can be used to force an SSL version.
  13. ## This version must be included in the library name.
  14. ## `-d:useOpenssl3` may be set for OpenSSL 3 instead.
  15. ##
  16. ## There is also limited support for OpenSSL 1.0.x which may require `-d:openssl10`.
  17. ##
  18. ## Build and test examples:
  19. ##
  20. ## .. code-block::
  21. ## ./bin/nim c -d:ssl -p:. -r tests/stdlib/tssl.nim
  22. ## ./bin/nim c -d:ssl --threads:on -p:. -r tests/stdlib/thttpclient_ssl.nim
  23. ## ./bin/nim c -d:ssl -p:. -r tests/untestable/tssl.nim
  24. ## ./bin/nim c -d:ssl -p:. --dynlibOverride:ssl --passl:-lcrypto --passl:-lssl -r tests/untestable/tssl.nim
  25. ## ./bin/nim r --putenv:NIM_TESTAMENT_REMOTE_NETWORKING:1 -d:ssl -p:testament/lib --threads:on tests/untestable/thttpclient_ssl_remotenetwork.nim
  26. # https://www.feistyduck.com/library/openssl-cookbook/online/ch-testing-with-openssl.html
  27. #
  28. from strutils import startsWith
  29. when defined(nimPreviewSlimSystem):
  30. import std/syncio
  31. when defined(nimHasStyleChecks):
  32. {.push styleChecks: off.}
  33. const useWinVersion = defined(windows) or defined(nimdoc)
  34. # To force openSSL version use -d:sslVersion=1.2.3
  35. # See: #10281, #10230
  36. # General issue:
  37. # Other dynamic libraries (like libpg) load different openSSL version then what nim loads.
  38. # Having two different openSSL loaded version causes a crash.
  39. # Use this compile time define to force the openSSL version that your other dynamic libraries want.
  40. const sslVersion {.strdefine.}: string = ""
  41. const useOpenssl3* {.booldefine.} = sslVersion.startsWith('3')
  42. when sslVersion != "":
  43. when defined(macosx):
  44. const
  45. DLLSSLName* = "libssl." & sslVersion & ".dylib"
  46. DLLUtilName* = "libcrypto." & sslVersion & ".dylib"
  47. from posix import SocketHandle
  48. elif defined(windows):
  49. const
  50. DLLSSLName* = "libssl-" & sslVersion & ".dll"
  51. DLLUtilName* = "libcrypto-" & sslVersion & ".dll"
  52. from winlean import SocketHandle
  53. else:
  54. const
  55. DLLSSLName* = "libssl.so." & sslVersion
  56. DLLUtilName* = "libcrypto.so." & sslVersion
  57. from posix import SocketHandle
  58. elif useWinVersion:
  59. when defined(openssl10) or defined(nimOldDlls):
  60. when defined(cpu64):
  61. const
  62. DLLSSLName* = "(ssleay32|ssleay64).dll"
  63. DLLUtilName* = "(libeay32|libeay64).dll"
  64. else:
  65. const
  66. DLLSSLName* = "ssleay32.dll"
  67. DLLUtilName* = "libeay32.dll"
  68. elif defined(cpu64):
  69. const
  70. DLLSSLName* = "(libssl-1_1-x64|ssleay64|libssl64).dll"
  71. DLLUtilName* = "(libcrypto-1_1-x64|libeay64).dll"
  72. else:
  73. const
  74. DLLSSLName* = "(libssl-1_1|ssleay32|libssl32).dll"
  75. DLLUtilName* = "(libcrypto-1_1|libeay32).dll"
  76. from winlean import SocketHandle
  77. else:
  78. # same list of versions but ordered differently?
  79. when defined(osx):
  80. const versions = "(.3|.1.1|.38|.39|.41|.43|.44|.45|.46|.47|.48|.10|.1.0.2|.1.0.1|.1.0.0|.0.9.9|.0.9.8|)"
  81. else:
  82. const versions = "(.3|.1.1|.1.0.2|.1.0.1|.1.0.0|.0.9.9|.0.9.8|.48|.47|.46|.45|.44|.43|.41|.39|.38|.10|)"
  83. when defined(macosx):
  84. const
  85. DLLSSLName* = "libssl" & versions & ".dylib"
  86. DLLUtilName* = "libcrypto" & versions & ".dylib"
  87. elif defined(genode):
  88. const
  89. DLLSSLName* = "libssl.lib.so"
  90. DLLUtilName* = "libcrypto.lib.so"
  91. else:
  92. const
  93. DLLSSLName* = "libssl.so" & versions
  94. DLLUtilName* = "libcrypto.so" & versions
  95. from posix import SocketHandle
  96. import dynlib
  97. {.pragma: lcrypto, cdecl, dynlib: DLLUtilName, importc.}
  98. {.pragma: lssl, cdecl, dynlib: DLLSSLName, importc.}
  99. type
  100. SslStruct {.final, pure.} = object
  101. SslPtr* = ptr SslStruct
  102. PSslPtr* = ptr SslPtr
  103. SslCtx* = SslPtr
  104. PSSL_METHOD* = SslPtr
  105. PSTACK* = SslPtr
  106. PX509* = SslPtr
  107. PX509_NAME* = SslPtr
  108. PBIO_METHOD* = SslPtr
  109. BIO* = SslPtr
  110. EVP_PKEY* = SslPtr
  111. PRSA* = SslPtr
  112. PASN1_UTCTIME* = SslPtr
  113. PASN1_cInt* = SslPtr
  114. PPasswdCb* = SslPtr
  115. EVP_MD* = SslPtr
  116. EVP_MD_CTX* = SslPtr
  117. EVP_PKEY_CTX* = SslPtr
  118. ENGINE* = SslPtr
  119. PFunction* = proc () {.cdecl.}
  120. DES_cblock* = array[0..7, int8]
  121. PDES_cblock* = ptr DES_cblock
  122. des_ks_struct*{.final.} = object
  123. ks*: DES_cblock
  124. weak_key*: cint
  125. des_key_schedule* = array[1..16, des_ks_struct]
  126. pem_password_cb* = proc(buf: cstring, size, rwflag: cint, userdata: pointer): cint {.cdecl.}
  127. PaddingType* = enum
  128. RSA_PKCS1_PADDING = 1.cint,
  129. RSA_SSLV23_PADDING = 2.cint,
  130. RSA_NO_PADDING = 3.cint,
  131. RSA_PKCS1_OAEP_PADDING = 4.cint,
  132. RSA_X931_PADDING = 5.cint,
  133. RSA_PKCS1_PSS_PADDING = 6.cint
  134. const
  135. SSL_SENT_SHUTDOWN* = 1
  136. SSL_RECEIVED_SHUTDOWN* = 2
  137. EVP_MAX_MD_SIZE* = 16 + 20
  138. SSL_ERROR_NONE* = 0
  139. SSL_ERROR_SSL* = 1
  140. SSL_ERROR_WANT_READ* = 2
  141. SSL_ERROR_WANT_WRITE* = 3
  142. SSL_ERROR_WANT_X509_LOOKUP* = 4
  143. SSL_ERROR_SYSCALL* = 5 #look at error stack/return value/errno
  144. SSL_ERROR_ZERO_RETURN* = 6
  145. SSL_ERROR_WANT_CONNECT* = 7
  146. SSL_ERROR_WANT_ACCEPT* = 8
  147. SSL_CTRL_NEED_TMP_RSA* = 1
  148. SSL_CTRL_SET_TMP_RSA* = 2
  149. SSL_CTRL_SET_TMP_DH* = 3
  150. SSL_CTRL_SET_TMP_ECDH* = 4
  151. SSL_CTRL_SET_TMP_RSA_CB* = 5
  152. SSL_CTRL_SET_TMP_DH_CB* = 6
  153. SSL_CTRL_SET_TMP_ECDH_CB* = 7
  154. SSL_CTRL_GET_SESSION_REUSED* = 8
  155. SSL_CTRL_GET_CLIENT_CERT_REQUEST* = 9
  156. SSL_CTRL_GET_NUM_RENEGOTIATIONS* = 10
  157. SSL_CTRL_CLEAR_NUM_RENEGOTIATIONS* = 11
  158. SSL_CTRL_GET_TOTAL_RENEGOTIATIONS* = 12
  159. SSL_CTRL_GET_FLAGS* = 13
  160. SSL_CTRL_EXTRA_CHAIN_CERT* = 14
  161. SSL_CTRL_SET_MSG_CALLBACK* = 15
  162. SSL_CTRL_SET_MSG_CALLBACK_ARG* = 16 # only applies to datagram connections
  163. SSL_CTRL_SET_MTU* = 17 # Stats
  164. SSL_CTRL_SESS_NUMBER* = 20
  165. SSL_CTRL_SESS_CONNECT* = 21
  166. SSL_CTRL_SESS_CONNECT_GOOD* = 22
  167. SSL_CTRL_SESS_CONNECT_RENEGOTIATE* = 23
  168. SSL_CTRL_SESS_ACCEPT* = 24
  169. SSL_CTRL_SESS_ACCEPT_GOOD* = 25
  170. SSL_CTRL_SESS_ACCEPT_RENEGOTIATE* = 26
  171. SSL_CTRL_SESS_HIT* = 27
  172. SSL_CTRL_SESS_CB_HIT* = 28
  173. SSL_CTRL_SESS_MISSES* = 29
  174. SSL_CTRL_SESS_TIMEOUTS* = 30
  175. SSL_CTRL_SESS_CACHE_FULL* = 31
  176. SSL_CTRL_OPTIONS* = 32
  177. SSL_CTRL_MODE* = 33
  178. SSL_CTRL_GET_READ_AHEAD* = 40
  179. SSL_CTRL_SET_READ_AHEAD* = 41
  180. SSL_CTRL_SET_SESS_CACHE_SIZE* = 42
  181. SSL_CTRL_GET_SESS_CACHE_SIZE* = 43
  182. SSL_CTRL_SET_SESS_CACHE_MODE* = 44
  183. SSL_CTRL_GET_SESS_CACHE_MODE* = 45
  184. SSL_CTRL_GET_MAX_CERT_LIST* = 50
  185. SSL_CTRL_SET_MAX_CERT_LIST* = 51 #* Allow SSL_write(..., n) to return r with 0 < r < n (i.e. report success
  186. # * when just a single record has been written): *
  187. SSL_CTRL_SET_TLSEXT_SERVERNAME_CB = 53
  188. SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG = 54
  189. SSL_CTRL_SET_TLSEXT_HOSTNAME = 55
  190. SSL_CTRL_SET_ECDH_AUTO* = 94
  191. TLSEXT_NAMETYPE_host_name* = 0
  192. SSL_TLSEXT_ERR_OK* = 0
  193. SSL_TLSEXT_ERR_ALERT_WARNING* = 1
  194. SSL_TLSEXT_ERR_ALERT_FATAL* = 2
  195. SSL_TLSEXT_ERR_NOACK* = 3
  196. SSL_MODE_ENABLE_PARTIAL_WRITE* = 1 #* Make it possible to retry SSL_write() with changed buffer location
  197. # * (buffer contents must stay the same!); this is not the default to avoid
  198. # * the misconception that non-blocking SSL_write() behaves like
  199. # * non-blocking write(): *
  200. SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER* = 2 #* Never bother the application with retries if the transport
  201. # * is blocking: *
  202. SSL_MODE_AUTO_RETRY* = 4 #* Don't attempt to automatically build certificate chain *
  203. SSL_MODE_NO_AUTO_CHAIN* = 8
  204. SSL_OP_NO_SSLv2* = 0x01000000
  205. SSL_OP_NO_SSLv3* = 0x02000000
  206. SSL_OP_NO_TLSv1* = 0x04000000
  207. SSL_OP_NO_TLSv1_1* = 0x08000000
  208. SSL_OP_ALL* = 0x000FFFFF
  209. SSL_VERIFY_NONE* = 0x00000000
  210. SSL_VERIFY_PEER* = 0x00000001
  211. SSL_ST_CONNECT* = 0x1000
  212. SSL_ST_ACCEPT* = 0x2000
  213. SSL_ST_INIT* = SSL_ST_CONNECT or SSL_ST_ACCEPT
  214. OPENSSL_DES_DECRYPT* = 0
  215. OPENSSL_DES_ENCRYPT* = 1
  216. X509_V_OK* = 0
  217. X509_V_ILLEGAL* = 1
  218. X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT* = 2
  219. X509_V_ERR_UNABLE_TO_GET_CRL* = 3
  220. X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE* = 4
  221. X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE* = 5
  222. X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY* = 6
  223. X509_V_ERR_CERT_SIGNATURE_FAILURE* = 7
  224. X509_V_ERR_CRL_SIGNATURE_FAILURE* = 8
  225. X509_V_ERR_CERT_NOT_YET_VALID* = 9
  226. X509_V_ERR_CERT_HAS_EXPIRED* = 10
  227. X509_V_ERR_CRL_NOT_YET_VALID* = 11
  228. X509_V_ERR_CRL_HAS_EXPIRED* = 12
  229. X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD* = 13
  230. X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD* = 14
  231. X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD* = 15
  232. X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD* = 16
  233. X509_V_ERR_OUT_OF_MEM* = 17
  234. X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT* = 18
  235. X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN* = 19
  236. X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY* = 20
  237. X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE* = 21
  238. X509_V_ERR_CERT_CHAIN_TOO_LONG* = 22
  239. X509_V_ERR_CERT_REVOKED* = 23
  240. X509_V_ERR_INVALID_CA* = 24
  241. X509_V_ERR_PATH_LENGTH_EXCEEDED* = 25
  242. X509_V_ERR_INVALID_PURPOSE* = 26
  243. X509_V_ERR_CERT_UNTRUSTED* = 27
  244. X509_V_ERR_CERT_REJECTED* = 28 #These are 'informational' when looking for issuer cert
  245. X509_V_ERR_SUBJECT_ISSUER_MISMATCH* = 29
  246. X509_V_ERR_AKID_SKID_MISMATCH* = 30
  247. X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH* = 31
  248. X509_V_ERR_KEYUSAGE_NO_CERTSIGN* = 32
  249. X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER* = 33
  250. X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION* = 34 #The application is not happy
  251. X509_V_ERR_APPLICATION_VERIFICATION* = 50
  252. SSL_FILETYPE_ASN1* = 2
  253. SSL_FILETYPE_PEM* = 1
  254. EVP_PKEY_RSA* = 6 # libssl.dll
  255. BIO_C_SET_CONNECT = 100
  256. BIO_C_DO_STATE_MACHINE = 101
  257. BIO_C_GET_SSL = 110
  258. proc TLSv1_method*(): PSSL_METHOD{.cdecl, dynlib: DLLSSLName, importc.}
  259. # TLS_method(), TLS_server_method(), TLS_client_method() are introduced in 1.1.0
  260. # and support SSLv3, TLSv1, TLSv1.1 and TLSv1.2
  261. # SSLv23_method(), SSLv23_server_method(), SSLv23_client_method() are removed in 1.1.0
  262. const useStaticLink = compileOption("dynlibOverride", "ssl") or defined(noOpenSSLHacks)
  263. when useStaticLink:
  264. # Static linking
  265. when defined(openssl10):
  266. proc SSL_library_init*(): cint {.cdecl, dynlib: DLLSSLName, importc, discardable.}
  267. proc SSL_load_error_strings*() {.cdecl, dynlib: DLLSSLName, importc.}
  268. proc SSLv23_method*(): PSSL_METHOD {.cdecl, dynlib: DLLSSLName, importc.}
  269. proc SSLeay(): culong {.cdecl, dynlib: DLLUtilName, importc.}
  270. proc getOpenSSLVersion*(): culong =
  271. SSLeay()
  272. proc ERR_load_BIO_strings*() {.cdecl, dynlib: DLLUtilName, importc.}
  273. else:
  274. proc OPENSSL_init_ssl*(opts: uint64, settings: uint8): cint {.cdecl, dynlib: DLLSSLName, importc, discardable.}
  275. proc SSL_library_init*(): cint {.discardable.} =
  276. ## Initialize SSL using OPENSSL_init_ssl for OpenSSL >= 1.1.0
  277. return OPENSSL_init_ssl(0.uint64, 0.uint8)
  278. proc TLS_method*(): PSSL_METHOD {.cdecl, dynlib: DLLSSLName, importc.}
  279. proc SSLv23_method*(): PSSL_METHOD =
  280. TLS_method()
  281. proc OpenSSL_version_num(): culong {.cdecl, dynlib: DLLUtilName, importc.}
  282. proc getOpenSSLVersion*(): culong =
  283. ## Return OpenSSL version as unsigned long
  284. OpenSSL_version_num()
  285. proc SSL_load_error_strings*() =
  286. ## Removed from OpenSSL 1.1.0
  287. # This proc prevents breaking existing code calling SslLoadErrorStrings
  288. # Static linking against OpenSSL < 1.1.0 is not supported
  289. discard
  290. proc ERR_load_BIO_strings*() =
  291. discard
  292. when defined(libressl) or defined(openssl10):
  293. proc SSL_state(ssl: SslPtr): cint {.cdecl, dynlib: DLLSSLName, importc.}
  294. proc SSL_in_init*(ssl: SslPtr): cint {.inline.} =
  295. SSL_state(ssl) and SSL_ST_INIT
  296. else:
  297. proc SSL_in_init*(ssl: SslPtr): cint {.cdecl, dynlib: DLLSSLName, importc.}
  298. proc SSL_CTX_set_ciphersuites*(ctx: SslCtx, str: cstring): cint {.cdecl, dynlib: DLLSSLName, importc.}
  299. template OpenSSL_add_all_algorithms*() = discard
  300. proc SSLv23_client_method*(): PSSL_METHOD {.cdecl, dynlib: DLLSSLName, importc.}
  301. proc SSLv2_method*(): PSSL_METHOD {.cdecl, dynlib: DLLSSLName, importc.}
  302. proc SSLv3_method*(): PSSL_METHOD {.cdecl, dynlib: DLLSSLName, importc.}
  303. proc CRYPTO_set_mem_functions(a,b,c: pointer){.cdecl, dynlib: DLLUtilName, importc.}
  304. else:
  305. # Here we're trying to stay compatible between openssl versions. Some
  306. # symbols are loaded dynamically and we don't use them if not found.
  307. proc thisModule(): LibHandle {.inline.} =
  308. var thisMod {.global.}: LibHandle
  309. if thisMod.isNil: thisMod = loadLib()
  310. result = thisMod
  311. proc sslModule(): LibHandle {.inline, raises: [LibraryError], tags:[RootEffect].} =
  312. var sslMod {.global.}: LibHandle
  313. try:
  314. if sslMod.isNil: sslMod = loadLibPattern(DLLSSLName)
  315. except:
  316. raise newException(LibraryError, "Could not load SSL using " & DLLSSLName)
  317. result = sslMod
  318. proc utilModule(): LibHandle {.inline.} =
  319. var utilMod {.global.}: LibHandle
  320. if utilMod.isNil: utilMod = loadLibPattern(DLLUtilName)
  321. result = utilMod
  322. proc symNullable(dll: LibHandle, name: string, alternativeName = ""): pointer =
  323. # Load from DLL.
  324. if not dll.isNil:
  325. result = symAddr(dll, name)
  326. if result.isNil and alternativeName.len > 0:
  327. result = symAddr(dll, alternativeName)
  328. # Attempt to load from current exe.
  329. if result.isNil:
  330. let thisDynlib = thisModule()
  331. if thisDynlib.isNil: return nil
  332. result = symAddr(thisDynlib, name)
  333. if result.isNil and alternativeName.len > 0:
  334. result = symAddr(thisDynlib, alternativeName)
  335. proc sslSymNullable(name: string, alternativeName = ""): pointer {.raises: [LibraryError], tags:[RootEffect].} =
  336. sslModule().symNullable(name, alternativeName)
  337. proc sslSymThrows(name: string, alternativeName = ""): pointer {.raises: [LibraryError].} =
  338. result = sslSymNullable(name, alternativeName)
  339. if result.isNil: raiseInvalidLibrary(name)
  340. proc utilSymNullable(name: string, alternativeName = ""): pointer =
  341. utilModule().symNullable(name, alternativeName)
  342. proc loadPSSLMethod(method1, method2: string): PSSL_METHOD {.raises: [LibraryError], tags:[RootEffect].} =
  343. ## Load <method1> from OpenSSL if available, otherwise <method2>
  344. ##
  345. let methodSym = sslSymNullable(method1, method2)
  346. if methodSym.isNil:
  347. raise newException(LibraryError, "Could not load " & method1 & " nor " & method2)
  348. let method2Proc = cast[proc(): PSSL_METHOD {.cdecl, gcsafe, raises: [].}](methodSym)
  349. return method2Proc()
  350. proc CRYPTO_set_mem_functions(a,b,c: pointer) =
  351. let theProc = cast[proc(a,b,c: pointer) {.cdecl.}](utilModule().symNullable("CRYPTO_set_mem_functions"))
  352. if not theProc.isNil: theProc(a, b, c)
  353. proc SSL_library_init*(): cint {.discardable.} =
  354. ## Initialize SSL using OPENSSL_init_ssl for OpenSSL >= 1.1.0 otherwise
  355. ## SSL_library_init
  356. let newInitSym = sslSymNullable("OPENSSL_init_ssl")
  357. if not newInitSym.isNil:
  358. let newInitProc =
  359. cast[proc(opts: uint64, settings: uint8): cint {.cdecl.}](newInitSym)
  360. return newInitProc(0, 0)
  361. let olderProc = cast[proc(): cint {.cdecl.}](sslSymThrows("SSL_library_init"))
  362. if not olderProc.isNil: result = olderProc()
  363. proc SSL_load_error_strings*() =
  364. # TODO: Are we ignoring this on purpose? SSL GitHub CI fails otherwise.
  365. let theProc = cast[proc() {.cdecl.}](sslSymNullable("SSL_load_error_strings"))
  366. if not theProc.isNil: theProc()
  367. proc ERR_load_BIO_strings*() =
  368. let theProc = cast[proc() {.cdecl.}](utilModule().symNullable("ERR_load_BIO_strings"))
  369. if not theProc.isNil: theProc()
  370. proc SSLv23_client_method*(): PSSL_METHOD =
  371. loadPSSLMethod("SSLv23_client_method", "TLS_client_method")
  372. proc SSLv23_method*(): PSSL_METHOD =
  373. loadPSSLMethod("SSLv23_method", "TLS_method")
  374. proc SSLv2_method*(): PSSL_METHOD =
  375. loadPSSLMethod("SSLv2_method", "TLS_method")
  376. proc SSLv3_method*(): PSSL_METHOD =
  377. loadPSSLMethod("SSLv3_method", "TLS_method")
  378. proc TLS_method*(): PSSL_METHOD =
  379. loadPSSLMethod("TLS_method", "SSLv23_method")
  380. proc TLS_client_method*(): PSSL_METHOD =
  381. loadPSSLMethod("TLS_client_method", "SSLv23_client_method")
  382. proc TLS_server_method*(): PSSL_METHOD =
  383. loadPSSLMethod("TLS_server_method", "SSLv23_server_method")
  384. proc OpenSSL_add_all_algorithms*() =
  385. # TODO: Are we ignoring this on purpose? SSL GitHub CI fails otherwise.
  386. let theProc = cast[proc() {.cdecl.}](sslSymNullable("OPENSSL_add_all_algorithms_conf"))
  387. if not theProc.isNil: theProc()
  388. proc getOpenSSLVersion*(): culong =
  389. ## Return OpenSSL version as unsigned long or 0 if not available
  390. let theProc = cast[proc(): culong {.cdecl, gcsafe.}](utilSymNullable("OpenSSL_version_num", "SSLeay"))
  391. result =
  392. if theProc.isNil: 0.culong
  393. else: theProc()
  394. proc SSL_in_init*(ssl: SslPtr): cint =
  395. # A compatibility wrapper for `SSL_in_init()` for OpenSSL 1.0, 1.1 and LibreSSL
  396. const MainProc = "SSL_in_init"
  397. let
  398. theProc {.global.} = cast[proc(ssl: SslPtr): cint {.cdecl, gcsafe.}](sslSymNullable(MainProc))
  399. # Fallback
  400. sslState {.global.} = cast[proc(ssl: SslPtr): cint {.cdecl, gcsafe.}](sslSymNullable("SSL_state"))
  401. if not theProc.isNil:
  402. result = theProc(ssl)
  403. elif not sslState.isNil:
  404. result = sslState(ssl) and SSL_ST_INIT
  405. else:
  406. raiseInvalidLibrary MainProc
  407. proc SSL_CTX_set_ciphersuites*(ctx: SslCtx, str: cstring): cint =
  408. var theProc {.global.}: proc(ctx: SslCtx, str: cstring) {.cdecl, gcsafe.}
  409. if theProc.isNil:
  410. theProc = cast[typeof(theProc)](sslSymThrows("SSL_CTX_set_ciphersuites"))
  411. theProc(ctx, str)
  412. proc SSL_new*(context: SslCtx): SslPtr{.cdecl, dynlib: DLLSSLName, importc.}
  413. proc SSL_free*(ssl: SslPtr){.cdecl, dynlib: DLLSSLName, importc.}
  414. proc SSL_get_SSL_CTX*(ssl: SslPtr): SslCtx {.cdecl, dynlib: DLLSSLName, importc.}
  415. proc SSL_set_SSL_CTX*(ssl: SslPtr, ctx: SslCtx): SslCtx {.cdecl, dynlib: DLLSSLName, importc.}
  416. proc SSL_CTX_set_session_id_context*(context: SslCtx, sid_ctx: string, sid_ctx_len: int){.cdecl, dynlib: DLLSSLName, importc.}
  417. proc SSL_get0_verified_chain*(ssl: SslPtr): PSTACK {.cdecl, dynlib: DLLSSLName,
  418. importc.}
  419. proc SSL_CTX_new*(meth: PSSL_METHOD): SslCtx{.cdecl,
  420. dynlib: DLLSSLName, importc.}
  421. proc SSL_CTX_load_verify_locations*(ctx: SslCtx, CAfile: cstring,
  422. CApath: cstring): cint{.cdecl, dynlib: DLLSSLName, importc.}
  423. proc SSL_CTX_free*(arg0: SslCtx){.cdecl, dynlib: DLLSSLName, importc.}
  424. proc SSL_CTX_set_verify*(s: SslCtx, mode: int, cb: proc (a: int, b: pointer): int {.cdecl.}){.cdecl, dynlib: DLLSSLName, importc.}
  425. proc SSL_get_verify_result*(ssl: SslPtr): int{.cdecl,
  426. dynlib: DLLSSLName, importc.}
  427. proc SSL_CTX_set_cipher_list*(s: SslCtx, ciphers: cstring): cint{.cdecl, dynlib: DLLSSLName, importc.}
  428. proc SSL_CTX_use_certificate_file*(ctx: SslCtx, filename: cstring, typ: cint): cint{.
  429. stdcall, dynlib: DLLSSLName, importc.}
  430. proc SSL_CTX_use_certificate_chain_file*(ctx: SslCtx, filename: cstring): cint{.
  431. stdcall, dynlib: DLLSSLName, importc.}
  432. proc SSL_CTX_use_PrivateKey_file*(ctx: SslCtx,
  433. filename: cstring, typ: cint): cint{.cdecl, dynlib: DLLSSLName, importc.}
  434. proc SSL_CTX_check_private_key*(ctx: SslCtx): cint{.cdecl, dynlib: DLLSSLName,
  435. importc.}
  436. proc SSL_CTX_get_ex_new_index*(argl: clong, argp: pointer, new_func: pointer, dup_func: pointer, free_func: pointer): cint {.cdecl, dynlib: DLLSSLName, importc.}
  437. proc SSL_CTX_set_ex_data*(ssl: SslCtx, idx: cint, arg: pointer): cint {.cdecl, dynlib: DLLSSLName, importc.}
  438. proc SSL_CTX_get_ex_data*(ssl: SslCtx, idx: cint): pointer {.cdecl, dynlib: DLLSSLName, importc.}
  439. proc SSL_set_fd*(ssl: SslPtr, fd: SocketHandle): cint{.cdecl, dynlib: DLLSSLName, importc.}
  440. proc SSL_shutdown*(ssl: SslPtr): cint{.cdecl, dynlib: DLLSSLName, importc.}
  441. proc SSL_set_shutdown*(ssl: SslPtr, mode: cint) {.cdecl, dynlib: DLLSSLName, importc: "SSL_set_shutdown".}
  442. proc SSL_get_shutdown*(ssl: SslPtr): cint {.cdecl, dynlib: DLLSSLName, importc: "SSL_get_shutdown".}
  443. proc SSL_connect*(ssl: SslPtr): cint{.cdecl, dynlib: DLLSSLName, importc.}
  444. proc SSL_read*(ssl: SslPtr, buf: pointer, num: int): cint{.cdecl, dynlib: DLLSSLName, importc.}
  445. proc SSL_write*(ssl: SslPtr, buf: cstring, num: int): cint{.cdecl, dynlib: DLLSSLName, importc.}
  446. proc SSL_get_error*(s: SslPtr, ret_code: cint): cint{.cdecl, dynlib: DLLSSLName, importc.}
  447. proc SSL_accept*(ssl: SslPtr): cint{.cdecl, dynlib: DLLSSLName, importc.}
  448. proc SSL_pending*(ssl: SslPtr): cint{.cdecl, dynlib: DLLSSLName, importc.}
  449. proc BIO_new_mem_buf*(data: pointer, len: cint): BIO{.cdecl,
  450. dynlib: DLLUtilName, importc.}
  451. proc BIO_new_ssl_connect*(ctx: SslCtx): BIO{.cdecl,
  452. dynlib: DLLSSLName, importc.}
  453. proc BIO_ctrl*(bio: BIO, cmd: cint, larg: int, arg: cstring): int{.cdecl,
  454. dynlib: DLLUtilName, importc.}
  455. proc BIO_get_ssl*(bio: BIO, ssl: ptr SslPtr): int =
  456. return BIO_ctrl(bio, BIO_C_GET_SSL, 0, cast[cstring](ssl))
  457. proc BIO_set_conn_hostname*(bio: BIO, name: cstring): int =
  458. return BIO_ctrl(bio, BIO_C_SET_CONNECT, 0, name)
  459. proc BIO_do_handshake*(bio: BIO): int =
  460. return BIO_ctrl(bio, BIO_C_DO_STATE_MACHINE, 0, nil)
  461. proc BIO_do_connect*(bio: BIO): int =
  462. return BIO_do_handshake(bio)
  463. when not defined(nimfix):
  464. proc BIO_read*(b: BIO, data: cstring, length: cint): cint{.cdecl,
  465. dynlib: DLLUtilName, importc.}
  466. proc BIO_write*(b: BIO, data: cstring, length: cint): cint{.cdecl,
  467. dynlib: DLLUtilName, importc.}
  468. proc BIO_free*(b: BIO): cint{.cdecl, dynlib: DLLUtilName, importc.}
  469. proc ERR_print_errors_fp*(fp: File){.cdecl, dynlib: DLLUtilName, importc.}
  470. proc ERR_error_string*(e: culong, buf: cstring): cstring{.cdecl,
  471. dynlib: DLLUtilName, importc.}
  472. proc ERR_get_error*(): culong{.cdecl, dynlib: DLLUtilName, importc.}
  473. proc ERR_peek_last_error*(): culong{.cdecl, dynlib: DLLUtilName, importc.}
  474. proc OPENSSL_config*(configName: cstring){.cdecl, dynlib: DLLUtilName, importc.}
  475. proc OPENSSL_sk_num*(stack: PSTACK): int {.cdecl, dynlib: DLLSSLName, importc.}
  476. proc OPENSSL_sk_value*(stack: PSTACK, index: int): pointer {.cdecl,
  477. dynlib: DLLSSLName, importc.}
  478. proc d2i_X509*(px: ptr PX509, i: ptr ptr uint8, len: cint): PX509 {.cdecl,
  479. dynlib: DLLUtilName, importc.}
  480. proc i2d_X509*(cert: PX509; o: ptr ptr uint8): cint {.cdecl,
  481. dynlib: DLLUtilName, importc.}
  482. proc d2i_X509*(b: string): PX509 =
  483. ## decode DER/BER bytestring into X.509 certificate struct
  484. var bb = b.cstring
  485. let i = cast[ptr ptr uint8](addr bb)
  486. let ret = d2i_X509(addr result, i, b.len.cint)
  487. if ret.isNil:
  488. raise newException(Exception, "X.509 certificate decoding failed")
  489. proc i2d_X509*(cert: PX509): string =
  490. ## encode `cert` to DER string
  491. let encoded_length = i2d_X509(cert, nil)
  492. result = newString(encoded_length)
  493. var q = result.cstring
  494. let o = cast[ptr ptr uint8](addr q)
  495. let length = i2d_X509(cert, o)
  496. if length.int <= 0:
  497. raise newException(Exception, "X.509 certificate encoding failed")
  498. const
  499. useNimsAlloc = not defined(nimNoAllocForSSL) and not defined(gcDestructors)
  500. when not useWinVersion and not defined(macosx) and not defined(android) and useNimsAlloc:
  501. proc allocWrapper(size: int): pointer {.cdecl.} = allocShared(size)
  502. proc reallocWrapper(p: pointer; newSize: int): pointer {.cdecl.} =
  503. if p == nil:
  504. if newSize > 0: result = allocShared(newSize)
  505. elif newSize == 0: deallocShared(p)
  506. else: result = reallocShared(p, newSize)
  507. proc deallocWrapper(p: pointer) {.cdecl.} =
  508. if p != nil: deallocShared(p)
  509. proc CRYPTO_malloc_init*() =
  510. CRYPTO_set_mem_functions(allocWrapper, reallocWrapper, deallocWrapper)
  511. else:
  512. proc CRYPTO_malloc_init*() =
  513. discard
  514. proc SSL_CTX_ctrl*(ctx: SslCtx, cmd: cint, larg: clong, parg: pointer): clong{.
  515. cdecl, dynlib: DLLSSLName, importc.}
  516. proc SSL_CTX_callback_ctrl(ctx: SslCtx, typ: cint, fp: PFunction): int{.
  517. cdecl, dynlib: DLLSSLName, importc.}
  518. proc SSLCTXSetMode*(ctx: SslCtx, mode: int): int =
  519. result = SSL_CTX_ctrl(ctx, SSL_CTRL_MODE, clong mode, nil)
  520. proc SSL_ctrl*(ssl: SslPtr, cmd: cint, larg: int, parg: pointer): int{.
  521. cdecl, dynlib: DLLSSLName, importc.}
  522. proc SSL_set_tlsext_host_name*(ssl: SslPtr, name: cstring): int =
  523. ## Set the SNI server name extension to be used in a client hello.
  524. ## Returns 1 if SNI was set, 0 if current SSL configuration doesn't support SNI.
  525. result = SSL_ctrl(ssl, SSL_CTRL_SET_TLSEXT_HOSTNAME, TLSEXT_NAMETYPE_host_name, name)
  526. proc SSL_get_servername*(ssl: SslPtr, typ: cint = TLSEXT_NAMETYPE_host_name): cstring {.cdecl, dynlib: DLLSSLName, importc.}
  527. ## Retrieve the server name requested in the client hello. This can be used
  528. ## in the callback set in `SSL_CTX_set_tlsext_servername_callback` to
  529. ## implement virtual hosting. May return `nil`.
  530. proc SSL_CTX_set_tlsext_servername_callback*(ctx: SslCtx, cb: proc(ssl: SslPtr, cb_id: int, arg: pointer): int {.cdecl.}): int =
  531. ## Set the callback to be used on listening SSL connections when the client hello is received.
  532. ##
  533. ## The callback should return one of:
  534. ## * SSL_TLSEXT_ERR_OK
  535. ## * SSL_TLSEXT_ERR_ALERT_WARNING
  536. ## * SSL_TLSEXT_ERR_ALERT_FATAL
  537. ## * SSL_TLSEXT_ERR_NOACK
  538. result = SSL_CTX_callback_ctrl(ctx, SSL_CTRL_SET_TLSEXT_SERVERNAME_CB, cast[PFunction](cb))
  539. proc SSL_CTX_set_tlsext_servername_arg*(ctx: SslCtx, arg: pointer): int =
  540. ## Set the pointer to be used in the callback registered to `SSL_CTX_set_tlsext_servername_callback`.
  541. result = SSL_CTX_ctrl(ctx, SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG, 0, arg)
  542. type
  543. PskClientCallback* = proc (ssl: SslPtr;
  544. hint: cstring; identity: cstring; max_identity_len: cuint; psk: ptr uint8;
  545. max_psk_len: cuint): cuint {.cdecl.}
  546. PskServerCallback* = proc (ssl: SslPtr;
  547. identity: cstring; psk: ptr uint8; max_psk_len: cint): cuint {.cdecl.}
  548. proc SSL_CTX_set_psk_client_callback*(ctx: SslCtx; callback: PskClientCallback) {.cdecl, dynlib: DLLSSLName, importc.}
  549. ## Set callback called when OpenSSL needs PSK (for client).
  550. proc SSL_CTX_set_psk_server_callback*(ctx: SslCtx; callback: PskServerCallback) {.cdecl, dynlib: DLLSSLName, importc.}
  551. ## Set callback called when OpenSSL needs PSK (for server).
  552. proc SSL_CTX_use_psk_identity_hint*(ctx: SslCtx; hint: cstring): cint {.cdecl, dynlib: DLLSSLName, importc.}
  553. ## Set PSK identity hint to use.
  554. proc SSL_get_psk_identity*(ssl: SslPtr): cstring {.cdecl, dynlib: DLLSSLName, importc.}
  555. ## Get PSK identity.
  556. proc SSL_CTX_set_ecdh_auto*(ctx: SslCtx, onoff: cint): cint {.inline.} =
  557. ## Set automatic curve selection.
  558. ##
  559. ## On OpenSSL >= 1.1.0 this is on by default and cannot be disabled.
  560. if getOpenSSLVersion() < 0x010100000 or getOpenSSLVersion() == 0x020000000:
  561. result = cint SSL_CTX_ctrl(ctx, SSL_CTRL_SET_ECDH_AUTO, onoff, nil)
  562. else:
  563. result = 1
  564. proc bioNew*(b: PBIO_METHOD): BIO{.cdecl, dynlib: DLLUtilName, importc: "BIO_new".}
  565. proc bioFreeAll*(b: BIO){.cdecl, dynlib: DLLUtilName, importc: "BIO_free_all".}
  566. proc bioSMem*(): PBIO_METHOD{.cdecl, dynlib: DLLUtilName, importc: "BIO_s_mem".}
  567. proc bioCtrlPending*(b: BIO): cint{.cdecl, dynlib: DLLUtilName, importc: "BIO_ctrl_pending".}
  568. proc bioRead*(b: BIO, Buf: cstring, length: cint): cint{.cdecl,
  569. dynlib: DLLUtilName, importc: "BIO_read".}
  570. proc bioWrite*(b: BIO, Buf: cstring, length: cint): cint{.cdecl,
  571. dynlib: DLLUtilName, importc: "BIO_write".}
  572. proc sslSetConnectState*(s: SslPtr) {.cdecl,
  573. dynlib: DLLSSLName, importc: "SSL_set_connect_state".}
  574. proc sslSetAcceptState*(s: SslPtr) {.cdecl,
  575. dynlib: DLLSSLName, importc: "SSL_set_accept_state".}
  576. proc sslRead*(ssl: SslPtr, buf: cstring, num: cint): cint{.cdecl,
  577. dynlib: DLLSSLName, importc: "SSL_read".}
  578. proc sslPeek*(ssl: SslPtr, buf: cstring, num: cint): cint{.cdecl,
  579. dynlib: DLLSSLName, importc: "SSL_peek".}
  580. proc sslWrite*(ssl: SslPtr, buf: cstring, num: cint): cint{.cdecl,
  581. dynlib: DLLSSLName, importc: "SSL_write".}
  582. proc sslSetBio*(ssl: SslPtr, rbio, wbio: BIO) {.cdecl,
  583. dynlib: DLLSSLName, importc: "SSL_set_bio".}
  584. proc sslDoHandshake*(ssl: SslPtr): cint {.cdecl,
  585. dynlib: DLLSSLName, importc: "SSL_do_handshake".}
  586. proc ErrClearError*(){.cdecl, dynlib: DLLUtilName, importc: "ERR_clear_error".}
  587. proc ErrFreeStrings*(){.cdecl, dynlib: DLLUtilName, importc: "ERR_free_strings".}
  588. proc ErrRemoveState*(pid: cint){.cdecl, dynlib: DLLUtilName, importc: "ERR_remove_state".}
  589. proc PEM_read_bio_RSA_PUBKEY*(bp: BIO, x: ptr PRSA, pw: pem_password_cb, u: pointer): PRSA {.cdecl,
  590. dynlib: DLLUtilName, importc.}
  591. proc PEM_read_RSA_PUBKEY*(fp: pointer; x: ptr PRSA; cb: pem_password_cb, u: pointer): PRSA {.cdecl,
  592. dynlib: DLLUtilName, importc.}
  593. proc RSA_verify*(kind: cint, origMsg: pointer, origMsgLen: cuint, signature: pointer,
  594. signatureLen: cuint, rsa: PRSA): cint {.cdecl, dynlib: DLLUtilName, importc.}
  595. proc PEM_read_RSAPrivateKey*(fp: pointer; x: ptr PRSA; cb: pem_password_cb, u: pointer): PRSA {.cdecl,
  596. dynlib: DLLUtilName, importc.}
  597. proc PEM_read_RSAPublicKey*(fp: pointer; x: ptr PRSA; cb: pem_password_cb, u: pointer): PRSA {.cdecl,
  598. dynlib: DLLUtilName, importc.}
  599. proc PEM_read_bio_RSAPublicKey*(bp: BIO, x: ptr PRSA, cb: pem_password_cb, u: pointer): PRSA {.cdecl,
  600. dynlib: DLLUtilName, importc.}
  601. proc PEM_read_bio_RSAPrivateKey*(bp: BIO, x: ptr PRSA, cb: pem_password_cb, u: pointer): PRSA {.cdecl,
  602. dynlib: DLLUtilName, importc.}
  603. proc RSA_private_encrypt*(flen: cint, fr: ptr uint8, to: ptr uint8, rsa: PRSA, padding: PaddingType): cint {.cdecl,
  604. dynlib: DLLUtilName, importc.}
  605. proc RSA_public_encrypt*(flen: cint, fr: ptr uint8, to: ptr uint8, rsa: PRSA, padding: PaddingType): cint {.cdecl,
  606. dynlib: DLLUtilName, importc.}
  607. proc RSA_private_decrypt*(flen: cint, fr: ptr uint8, to: ptr uint8, rsa: PRSA, padding: PaddingType): cint {.cdecl,
  608. dynlib: DLLUtilName, importc.}
  609. proc RSA_public_decrypt*(flen: cint, fr: ptr uint8, to: ptr uint8, rsa: PRSA, padding: PaddingType): cint {.cdecl,
  610. dynlib: DLLUtilName, importc.}
  611. proc RSA_free*(rsa: PRSA) {.cdecl, dynlib: DLLUtilName, importc.}
  612. proc RSA_size*(rsa: PRSA): cint {.cdecl, dynlib: DLLUtilName, importc.}
  613. # sha types
  614. proc EVP_md_null*(): EVP_MD {.lcrypto.}
  615. proc EVP_md2*(): EVP_MD {.lcrypto.}
  616. proc EVP_md4*(): EVP_MD {.lcrypto.}
  617. proc EVP_md5*(): EVP_MD {.lcrypto.}
  618. proc EVP_sha*(): EVP_MD {.lcrypto.}
  619. proc EVP_sha1*(): EVP_MD {.lcrypto.}
  620. proc EVP_dss*(): EVP_MD {.lcrypto.}
  621. proc EVP_dss1*(): EVP_MD {.lcrypto.}
  622. proc EVP_ecdsa*(): EVP_MD {.lcrypto.}
  623. proc EVP_sha224*(): EVP_MD {.lcrypto.}
  624. proc EVP_sha256*(): EVP_MD {.lcrypto.}
  625. proc EVP_sha384*(): EVP_MD {.lcrypto.}
  626. proc EVP_sha512*(): EVP_MD {.lcrypto.}
  627. proc EVP_mdc2*(): EVP_MD {.lcrypto.}
  628. proc EVP_ripemd160*(): EVP_MD {.lcrypto.}
  629. proc EVP_whirlpool*(): EVP_MD {.lcrypto.}
  630. proc EVP_MD_size*(md: EVP_MD): cint {.lcrypto.}
  631. # hmac functions
  632. proc HMAC*(evp_md: EVP_MD; key: pointer; key_len: cint; d: cstring; n: csize_t; md: cstring; md_len: ptr cuint): cstring {.lcrypto.}
  633. # RSA key functions
  634. proc PEM_read_bio_PrivateKey*(bp: BIO, x: ptr EVP_PKEY, cb: pointer, u: pointer): EVP_PKEY {.lcrypto.}
  635. proc EVP_PKEY_free*(p: EVP_PKEY) {.lcrypto.}
  636. proc EVP_DigestSignInit*(ctx: EVP_MD_CTX, pctx: ptr EVP_PKEY_CTX, typ: EVP_MD, e: ENGINE, pkey: EVP_PKEY): cint {.lcrypto.}
  637. proc EVP_DigestInit_ex*(ctx: EVP_MD_CTX, typ: EVP_MD, engine: SslPtr = nil): cint {.lcrypto.}
  638. proc EVP_DigestUpdate*(ctx: EVP_MD_CTX, data: pointer, len: cuint): cint {.lcrypto.}
  639. proc EVP_DigestFinal_ex*(ctx: EVP_MD_CTX, buffer: pointer, size: ptr cuint): cint {.lcrypto.}
  640. proc EVP_DigestSignFinal*(ctx: EVP_MD_CTX, data: pointer, len: ptr csize_t): cint {.lcrypto.}
  641. proc EVP_PKEY_CTX_new*(pkey: EVP_PKEY, e: ENGINE): EVP_PKEY_CTX {.lcrypto.}
  642. proc EVP_PKEY_CTX_free*(pkeyCtx: EVP_PKEY_CTX) {.lcrypto.}
  643. proc EVP_PKEY_sign_init*(c: EVP_PKEY_CTX): cint {.lcrypto.}
  644. when defined(macosx) or defined(windows):
  645. proc EVP_MD_CTX_create*(): EVP_MD_CTX {.lcrypto.}
  646. proc EVP_MD_CTX_destroy*(ctx: EVP_MD_CTX) {.lcrypto.}
  647. proc EVP_MD_CTX_cleanup*(ctx: EVP_MD_CTX): cint {.lcrypto.}
  648. else:
  649. # some times you will need this instead:
  650. proc EVP_MD_CTX_create*(): EVP_MD_CTX {.cdecl, importc: "EVP_MD_CTX_new", dynlib: DLLUtilName.}
  651. proc EVP_MD_CTX_destroy*(ctx: EVP_MD_CTX) {.cdecl, importc: "EVP_MD_CTX_free", dynlib: DLLUtilName.}
  652. proc EVP_MD_CTX_cleanup*(ctx: EVP_MD_CTX): cint {.cdecl, importc: "EVP_MD_CTX_cleanup", dynlib: DLLUtilName.}
  653. # <openssl/md5.h>
  654. type
  655. MD5_LONG* = cuint
  656. const
  657. MD5_CBLOCK* = 64
  658. MD5_LBLOCK* = int(MD5_CBLOCK div 4)
  659. MD5_DIGEST_LENGTH* = 16
  660. type
  661. MD5_CTX* = object
  662. A,B,C,D,Nl,Nh: MD5_LONG
  663. data: array[MD5_LBLOCK, MD5_LONG]
  664. num: cuint
  665. {.push callconv:cdecl, dynlib:DLLUtilName.}
  666. proc md5_Init*(c: var MD5_CTX): cint{.importc: "MD5_Init".}
  667. proc md5_Update*(c: var MD5_CTX; data: pointer; len: csize_t): cint{.importc: "MD5_Update".}
  668. proc md5_Final*(md: cstring; c: var MD5_CTX): cint{.importc: "MD5_Final".}
  669. proc md5*(d: ptr uint8; n: csize_t; md: ptr uint8): ptr uint8{.importc: "MD5".}
  670. proc md5_Transform*(c: var MD5_CTX; b: ptr uint8){.importc: "MD5_Transform".}
  671. {.pop.}
  672. from strutils import toHex, toLowerAscii
  673. proc hexStr(buf: cstring): string =
  674. # turn md5s output into a nice hex str
  675. result = newStringOfCap(32)
  676. for i in 0 ..< 16:
  677. result.add toHex(buf[i].ord, 2).toLowerAscii
  678. proc md5_File*(file: string): string {.raises: [IOError,Exception].} =
  679. ## Generate MD5 hash for a file. Result is a 32 character
  680. # hex string with lowercase characters (like the output
  681. # of `md5sum`
  682. const
  683. sz = 512
  684. let f = open(file,fmRead)
  685. var
  686. buf: array[sz,char]
  687. ctx: MD5_CTX
  688. discard md5_Init(ctx)
  689. while (let bytes = f.readChars(buf); bytes > 0):
  690. discard md5_Update(ctx, buf[0].addr, cast[csize_t](bytes))
  691. discard md5_Final(cast[cstring](buf[0].addr), ctx)
  692. f.close
  693. result = hexStr(cast[cstring](addr buf))
  694. proc md5_Str*(str: string): string =
  695. ## Generate MD5 hash for a string. Result is a 32 character
  696. ## hex string with lowercase characters
  697. var
  698. ctx: MD5_CTX
  699. res: array[MD5_DIGEST_LENGTH,char]
  700. input = str.cstring
  701. discard md5_Init(ctx)
  702. var i = 0
  703. while i < str.len:
  704. let L = min(str.len - i, 512)
  705. discard md5_Update(ctx, input[i].addr, cast[csize_t](L))
  706. i += L
  707. discard md5_Final(cast[cstring](addr res), ctx)
  708. result = hexStr(cast[cstring](addr res))
  709. when defined(nimHasStyleChecks):
  710. {.pop.}
  711. # Certificate validation
  712. # On old openSSL version some of these symbols are not available
  713. when not defined(nimDisableCertificateValidation) and not defined(windows):
  714. # SSL_get_peer_certificate removed in 3.0
  715. # SSL_get1_peer_certificate added in 3.0
  716. when useOpenssl3:
  717. proc SSL_get1_peer_certificate*(ssl: SslCtx): PX509 {.cdecl, dynlib: DLLSSLName, importc.}
  718. proc SSL_get_peer_certificate*(ssl: SslCtx): PX509 =
  719. SSL_get1_peer_certificate(ssl)
  720. elif useStaticLink:
  721. proc SSL_get_peer_certificate*(ssl: SslCtx): PX509 {.cdecl, dynlib: DLLSSLName, importc.}
  722. else:
  723. proc SSL_get_peer_certificate*(ssl: SslCtx): PX509 =
  724. let methodSym = sslSymNullable("SSL_get_peer_certificate", "SSL_get1_peer_certificate")
  725. if methodSym.isNil:
  726. raise newException(LibraryError, "Could not load SSL_get_peer_certificate or SSL_get1_peer_certificate")
  727. let method2Proc = cast[proc(ssl: SslCtx): PX509 {.cdecl, gcsafe, raises: [].}](methodSym)
  728. return method2Proc(ssl)
  729. proc X509_get_subject_name*(a: PX509): PX509_NAME{.cdecl, dynlib: DLLSSLName, importc.}
  730. proc X509_get_issuer_name*(a: PX509): PX509_NAME{.cdecl, dynlib: DLLUtilName, importc.}
  731. proc X509_NAME_oneline*(a: PX509_NAME, buf: cstring, size: cint): cstring {.
  732. cdecl, dynlib:DLLSSLName, importc.}
  733. proc X509_NAME_get_text_by_NID*(subject:cstring, NID: cint, buf: cstring, size: cint): cint{.
  734. cdecl, dynlib:DLLSSLName, importc.}
  735. proc X509_check_host*(cert: PX509, name: cstring, namelen: cint, flags:cuint, peername: cstring): cint {.cdecl, dynlib: DLLSSLName, importc.}
  736. proc X509_free*(cert: PX509) {.cdecl, dynlib: DLLSSLName, importc.}
  737. # Certificates store
  738. type PX509_STORE* = SslPtr
  739. type PX509_OBJECT* = SslPtr
  740. {.push callconv:cdecl, dynlib:DLLUtilName, importc.}
  741. proc X509_OBJECT_new*(): PX509_OBJECT
  742. proc X509_OBJECT_free*(a: PX509_OBJECT)
  743. proc X509_STORE_new*(): PX509_STORE
  744. proc X509_STORE_free*(v: PX509_STORE)
  745. proc X509_STORE_lock*(ctx: PX509_STORE): cint
  746. proc X509_STORE_unlock*(ctx: PX509_STORE): cint
  747. proc X509_STORE_up_ref*(v: PX509_STORE): cint
  748. proc X509_STORE_set_flags*(ctx: PX509_STORE; flags: culong): cint
  749. proc X509_STORE_set_purpose*(ctx: PX509_STORE; purpose: cint): cint
  750. proc X509_STORE_set_trust*(ctx: PX509_STORE; trust: cint): cint
  751. proc X509_STORE_add_cert*(ctx: PX509_STORE; x: PX509): cint
  752. {.pop.}
  753. when isMainModule:
  754. when defined(nimPreviewSlimSystem):
  755. import std/assertions
  756. # A simple certificate test
  757. let certbytes = readFile("certificate.der")
  758. let cert = d2i_X509(certbytes)
  759. let encoded = cert.i2d_X509()
  760. assert encoded == certbytes
  761. # Application Layer Protocol Negociation extension (TLS-ALPN, RFC7301)
  762. # Available in at least OpenSSL 1.1.1 and later, not sure if earlier
  763. # --Iced Quinn
  764. proc SSL_CTX_set_alpn_protos*(ctx: SslCtx; protos: cstring; protos_len: cuint): cint {.cdecl, dynlib: DLLSSLName, importc.}
  765. proc SSL_set_alpn_protos*(ssl: SslPtr; protos: cstring; protos_len: cuint): cint {.cdecl, dynlib: DLLSSLName, importc.}
  766. proc SSL_CTX_set_alpn_select_cb*(ctx: SslCtx; cb: proc(ssl: SslPtr; out_proto: ptr cstring; outlen: cstring; in_proto: cstring; inlen: cuint; arg: pointer): cint {.cdecl.}; arg: pointer): cint {.cdecl, dynlib: DLLSSLName, importc.}
  767. proc SSL_get0_alpn_selected*(ssl: SslPtr; data: ptr cstring; len: ptr cuint) {.cdecl, dynlib: DLLSSLName, importc.}
  768. proc SSL_CTX_set_next_protos_advertised_cb*(ctx: SslCtx; cb: proc(ssl: SslPtr; out_proto: ptr cstring; outlen: ptr cuint; arg: pointer): cint {.cdecl.}; arg: pointer) {.cdecl, dynlib: DLLSSLName, importc.}
  769. proc SSL_CTX_set_next_proto_select_cb*(ctx: SslCtx; cb: proc(s: SslPtr; out_proto: cstring; outlen: cstring; in_proto: cstring; inlen: cuint; arg: pointer): cint {.cdecl.}; arg: pointer) {.cdecl, dynlib: DLLSSLName, importc.}
  770. proc SSL_select_next_proto*(out_proto: ptr cstring; outlen: cstring; server: cstring; server_len: cuint; client: cstring; client_len: cuint): cint {.cdecl, dynlib: DLLSSLName, importc.}
  771. proc SSL_get0_next_proto_negotiated*(s: SslPtr; data: ptr cstring; len: ptr cuint) {.cdecl, dynlib: DLLSSLName, importc.}