forked from LeenkxTeam/LNXSDK
Update Files
This commit is contained in:
150
Kha/Tools/macos/std/neko/_std/sys/ssl/Certificate.hx
Normal file
150
Kha/Tools/macos/std/neko/_std/sys/ssl/Certificate.hx
Normal file
@ -0,0 +1,150 @@
|
||||
/*
|
||||
* Copyright (C)2005-2019 Haxe Foundation
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person obtaining a
|
||||
* copy of this software and associated documentation files (the "Software"),
|
||||
* to deal in the Software without restriction, including without limitation
|
||||
* the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
||||
* and/or sell copies of the Software, and to permit persons to whom the
|
||||
* Software is furnished to do so, subject to the following conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be included in
|
||||
* all copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||
* FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
|
||||
* DEALINGS IN THE SOFTWARE.
|
||||
*/
|
||||
|
||||
package sys.ssl;
|
||||
|
||||
@:coreApi
|
||||
class Certificate {
|
||||
var __h:Null<Certificate>;
|
||||
var __x:Dynamic;
|
||||
|
||||
@:allow(sys.ssl.Socket)
|
||||
function new(x:Dynamic, ?h:Certificate) {
|
||||
__x = x;
|
||||
__h = h;
|
||||
}
|
||||
|
||||
public static function loadFile(file:String):Certificate {
|
||||
return new Certificate(cert_load_file(untyped file.__s));
|
||||
}
|
||||
|
||||
public static function loadPath(path:String):Certificate {
|
||||
return new Certificate(cert_load_path(untyped path.__s));
|
||||
}
|
||||
|
||||
public static function fromString(str:String):Certificate {
|
||||
return new Certificate(cert_add_pem(null, untyped str.__s));
|
||||
}
|
||||
|
||||
public static function loadDefaults():Certificate {
|
||||
var x = cert_load_defaults();
|
||||
if (x != null)
|
||||
return new Certificate(x);
|
||||
|
||||
var defPaths = null;
|
||||
switch (Sys.systemName()) {
|
||||
case "Linux":
|
||||
defPaths = [
|
||||
"/etc/ssl/certs/ca-certificates.crt", // Debian/Ubuntu/Gentoo etc.
|
||||
"/etc/pki/tls/certs/ca-bundle.crt", // Fedora/RHEL
|
||||
"/etc/ssl/ca-bundle.pem", // OpenSUSE
|
||||
"/etc/pki/tls/cacert.pem", // OpenELEC
|
||||
"/etc/ssl/certs", // SLES10/SLES11
|
||||
"/system/etc/security/cacerts" // Android
|
||||
];
|
||||
case "BSD":
|
||||
defPaths = [
|
||||
"/usr/local/share/certs/ca-root-nss.crt", // FreeBSD/DragonFly
|
||||
"/etc/ssl/cert.pem", // OpenBSD
|
||||
"/etc/openssl/certs/ca-certificates.crt", // NetBSD
|
||||
];
|
||||
case "Android":
|
||||
defPaths = ["/system/etc/security/cacerts"];
|
||||
default:
|
||||
}
|
||||
if (defPaths != null) {
|
||||
for (path in defPaths) {
|
||||
if (sys.FileSystem.exists(path)) {
|
||||
if (sys.FileSystem.isDirectory(path))
|
||||
return loadPath(path);
|
||||
else
|
||||
return loadFile(path);
|
||||
}
|
||||
}
|
||||
}
|
||||
return null;
|
||||
}
|
||||
|
||||
public var commonName(get, null):Null<String>;
|
||||
public var altNames(get, null):Array<String>;
|
||||
public var notBefore(get, null):Date;
|
||||
public var notAfter(get, null):Date;
|
||||
|
||||
function get_commonName():Null<String> {
|
||||
return subject("CN");
|
||||
}
|
||||
|
||||
function get_altNames():Array<String> {
|
||||
var l:Dynamic = cert_get_altnames(__x);
|
||||
var a = new Array<String>();
|
||||
while (l != null) {
|
||||
a.push(new String(l[0]));
|
||||
l = l[1];
|
||||
}
|
||||
return a;
|
||||
}
|
||||
|
||||
public function subject(field:String):Null<String> {
|
||||
var s = cert_get_subject(__x, untyped field.__s);
|
||||
return s == null ? null : new String(cast s);
|
||||
}
|
||||
|
||||
public function issuer(field:String):Null<String> {
|
||||
var s = cert_get_issuer(__x, untyped field.__s);
|
||||
return s == null ? null : new String(cast s);
|
||||
}
|
||||
|
||||
function get_notBefore():Date {
|
||||
var a = cert_get_notbefore(__x);
|
||||
return new Date(a[0], a[1] - 1, a[2], a[3], a[4], a[5]);
|
||||
}
|
||||
|
||||
function get_notAfter():Date {
|
||||
var a = cert_get_notafter(__x);
|
||||
return new Date(a[0], a[1] - 1, a[2], a[3], a[4], a[5]);
|
||||
}
|
||||
|
||||
public function next():Null<Certificate> {
|
||||
var n = cert_get_next(__x);
|
||||
return n == null ? null : new Certificate(n, __h == null ? this : __h);
|
||||
}
|
||||
|
||||
public function add(pem:String):Void {
|
||||
cert_add_pem(__x, untyped pem.__s);
|
||||
}
|
||||
|
||||
public function addDER(der:haxe.io.Bytes):Void {
|
||||
cert_add_der(__x, der.getData());
|
||||
}
|
||||
|
||||
private static var cert_load_defaults = neko.Lib.loadLazy("ssl", "cert_load_defaults", 0);
|
||||
private static var cert_load_file = neko.Lib.loadLazy("ssl", "cert_load_file", 1);
|
||||
private static var cert_load_path = neko.Lib.loadLazy("ssl", "cert_load_path", 1);
|
||||
private static var cert_get_subject = neko.Lib.loadLazy("ssl", "cert_get_subject", 2);
|
||||
private static var cert_get_issuer = neko.Lib.loadLazy("ssl", "cert_get_issuer", 2);
|
||||
private static var cert_get_altnames = neko.Lib.loadLazy("ssl", "cert_get_altnames", 1);
|
||||
private static var cert_get_notbefore = neko.Lib.loadLazy("ssl", "cert_get_notbefore", 1);
|
||||
private static var cert_get_notafter = neko.Lib.loadLazy("ssl", "cert_get_notafter", 1);
|
||||
private static var cert_get_next = neko.Lib.loadLazy("ssl", "cert_get_next", 1);
|
||||
private static var cert_add_pem = neko.Lib.loadLazy("ssl", "cert_add_pem", 2);
|
||||
private static var cert_add_der = neko.Lib.loadLazy("ssl", "cert_add_der", 2);
|
||||
}
|
42
Kha/Tools/macos/std/neko/_std/sys/ssl/Digest.hx
Normal file
42
Kha/Tools/macos/std/neko/_std/sys/ssl/Digest.hx
Normal file
@ -0,0 +1,42 @@
|
||||
/*
|
||||
* Copyright (C)2005-2019 Haxe Foundation
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person obtaining a
|
||||
* copy of this software and associated documentation files (the "Software"),
|
||||
* to deal in the Software without restriction, including without limitation
|
||||
* the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
||||
* and/or sell copies of the Software, and to permit persons to whom the
|
||||
* Software is furnished to do so, subject to the following conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be included in
|
||||
* all copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||
* FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
|
||||
* DEALINGS IN THE SOFTWARE.
|
||||
*/
|
||||
|
||||
package sys.ssl;
|
||||
|
||||
@:coreApi
|
||||
class Digest {
|
||||
public static function make(data:haxe.io.Bytes, alg:DigestAlgorithm):haxe.io.Bytes {
|
||||
return haxe.io.Bytes.ofData(dgst_make(data.getData(), untyped alg.__s));
|
||||
}
|
||||
|
||||
public static function sign(data:haxe.io.Bytes, privKey:Key, alg:DigestAlgorithm):haxe.io.Bytes {
|
||||
return haxe.io.Bytes.ofData(dgst_sign(data.getData(), @:privateAccess privKey.__k, untyped alg.__s));
|
||||
}
|
||||
|
||||
public static function verify(data:haxe.io.Bytes, signature:haxe.io.Bytes, pubKey:Key, alg:DigestAlgorithm):Bool {
|
||||
return dgst_verify(data.getData(), signature.getData(), @:privateAccess pubKey.__k, untyped alg.__s);
|
||||
}
|
||||
|
||||
private static var dgst_make = neko.Lib.loadLazy("ssl", "dgst_make", 2);
|
||||
private static var dgst_sign = neko.Lib.loadLazy("ssl", "dgst_sign", 3);
|
||||
private static var dgst_verify = neko.Lib.loadLazy("ssl", "dgst_verify", 4);
|
||||
}
|
54
Kha/Tools/macos/std/neko/_std/sys/ssl/Key.hx
Normal file
54
Kha/Tools/macos/std/neko/_std/sys/ssl/Key.hx
Normal file
@ -0,0 +1,54 @@
|
||||
/*
|
||||
* Copyright (C)2005-2019 Haxe Foundation
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person obtaining a
|
||||
* copy of this software and associated documentation files (the "Software"),
|
||||
* to deal in the Software without restriction, including without limitation
|
||||
* the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
||||
* and/or sell copies of the Software, and to permit persons to whom the
|
||||
* Software is furnished to do so, subject to the following conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be included in
|
||||
* all copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||
* FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
|
||||
* DEALINGS IN THE SOFTWARE.
|
||||
*/
|
||||
|
||||
package sys.ssl;
|
||||
|
||||
private typedef PKEY = Dynamic;
|
||||
|
||||
@:coreApi
|
||||
class Key {
|
||||
private var __k:PKEY;
|
||||
|
||||
private function new(k:PKEY) {
|
||||
__k = k;
|
||||
}
|
||||
|
||||
public static function loadFile(file:String, ?isPublic:Bool, ?pass:String):Key {
|
||||
var data = sys.io.File.getBytes(file);
|
||||
var str = neko.Lib.stringReference(data);
|
||||
if (str.indexOf("-----BEGIN ") >= 0)
|
||||
return readPEM(str, isPublic == true, pass);
|
||||
else
|
||||
return readDER(data, isPublic == true);
|
||||
}
|
||||
|
||||
public static function readPEM(data:String, isPublic:Bool, ?pass:String):Key {
|
||||
return new Key(key_from_pem(untyped data.__s, isPublic, pass == null ? null : untyped pass.__s));
|
||||
}
|
||||
|
||||
public static function readDER(data:haxe.io.Bytes, isPublic:Bool):Key {
|
||||
return new Key(key_from_der(data.getData(), isPublic));
|
||||
}
|
||||
|
||||
private static var key_from_pem = neko.Lib.loadLazy("ssl", "key_from_pem", 3);
|
||||
private static var key_from_der = neko.Lib.loadLazy("ssl", "key_from_der", 2);
|
||||
}
|
316
Kha/Tools/macos/std/neko/_std/sys/ssl/Socket.hx
Normal file
316
Kha/Tools/macos/std/neko/_std/sys/ssl/Socket.hx
Normal file
@ -0,0 +1,316 @@
|
||||
/*
|
||||
* Copyright (C)2005-2019 Haxe Foundation
|
||||
*
|
||||
* Permission is hereby granted, free of charge, to any person obtaining a
|
||||
* copy of this software and associated documentation files (the "Software"),
|
||||
* to deal in the Software without restriction, including without limitation
|
||||
* the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
||||
* and/or sell copies of the Software, and to permit persons to whom the
|
||||
* Software is furnished to do so, subject to the following conditions:
|
||||
*
|
||||
* The above copyright notice and this permission notice shall be included in
|
||||
* all copies or substantial portions of the Software.
|
||||
*
|
||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
||||
* FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
|
||||
* DEALINGS IN THE SOFTWARE.
|
||||
*/
|
||||
|
||||
package sys.ssl;
|
||||
|
||||
private typedef SocketHandle = Dynamic;
|
||||
private typedef CTX = Dynamic;
|
||||
private typedef SSL = Dynamic;
|
||||
|
||||
private class SocketInput extends haxe.io.Input {
|
||||
@:allow(sys.ssl.Socket) private var __s:Socket;
|
||||
|
||||
public function new(s:Socket) {
|
||||
this.__s = s;
|
||||
}
|
||||
|
||||
public override function readByte() {
|
||||
return try {
|
||||
__s.handshake();
|
||||
ssl_recv_char(@:privateAccess __s.ssl);
|
||||
} catch (e:Dynamic) {
|
||||
if (e == "Blocking")
|
||||
throw haxe.io.Error.Blocked;
|
||||
else if (__s == null)
|
||||
throw haxe.io.Error.Custom(e);
|
||||
else
|
||||
throw new haxe.io.Eof();
|
||||
}
|
||||
}
|
||||
|
||||
public override function readBytes(buf:haxe.io.Bytes, pos:Int, len:Int):Int {
|
||||
var r:Int;
|
||||
if (__s == null)
|
||||
throw "Invalid handle";
|
||||
try {
|
||||
__s.handshake();
|
||||
r = ssl_recv(@:privateAccess __s.ssl, buf.getData(), pos, len);
|
||||
} catch (e:Dynamic) {
|
||||
if (e == "Blocking")
|
||||
throw haxe.io.Error.Blocked;
|
||||
else
|
||||
throw haxe.io.Error.Custom(e);
|
||||
}
|
||||
if (r == 0)
|
||||
throw new haxe.io.Eof();
|
||||
return r;
|
||||
}
|
||||
|
||||
public override function close() {
|
||||
super.close();
|
||||
if (__s != null)
|
||||
__s.close();
|
||||
}
|
||||
|
||||
private static var ssl_recv = neko.Lib.loadLazy("ssl", "ssl_recv", 4);
|
||||
private static var ssl_recv_char = neko.Lib.loadLazy("ssl", "ssl_recv_char", 1);
|
||||
}
|
||||
|
||||
private class SocketOutput extends haxe.io.Output {
|
||||
@:allow(sys.ssl.Socket) private var __s:Socket;
|
||||
|
||||
public function new(s:Socket) {
|
||||
this.__s = s;
|
||||
}
|
||||
|
||||
public override function writeByte(c:Int) {
|
||||
if (__s == null)
|
||||
throw "Invalid handle";
|
||||
try {
|
||||
__s.handshake();
|
||||
ssl_send_char(@:privateAccess __s.ssl, c);
|
||||
} catch (e:Dynamic) {
|
||||
if (e == "Blocking")
|
||||
throw haxe.io.Error.Blocked;
|
||||
else
|
||||
throw haxe.io.Error.Custom(e);
|
||||
}
|
||||
}
|
||||
|
||||
public override function writeBytes(buf:haxe.io.Bytes, pos:Int, len:Int):Int {
|
||||
return try {
|
||||
__s.handshake();
|
||||
ssl_send(@:privateAccess __s.ssl, buf.getData(), pos, len);
|
||||
} catch (e:Dynamic) {
|
||||
if (e == "Blocking")
|
||||
throw haxe.io.Error.Blocked;
|
||||
else
|
||||
throw haxe.io.Error.Custom(e);
|
||||
}
|
||||
}
|
||||
|
||||
public override function close() {
|
||||
super.close();
|
||||
if (__s != null)
|
||||
__s.close();
|
||||
}
|
||||
|
||||
private static var ssl_send_char = neko.Lib.loadLazy("ssl", "ssl_send_char", 2);
|
||||
private static var ssl_send = neko.Lib.loadLazy("ssl", "ssl_send", 4);
|
||||
}
|
||||
|
||||
@:coreApi
|
||||
class Socket extends sys.net.Socket {
|
||||
public static var DEFAULT_VERIFY_CERT:Null<Bool> = true;
|
||||
|
||||
public static var DEFAULT_CA:Null<Certificate>;
|
||||
|
||||
private var ctx:CTX;
|
||||
private var ssl:SSL;
|
||||
|
||||
public var verifyCert:Null<Bool>;
|
||||
|
||||
private var caCert:Null<Certificate>;
|
||||
private var hostname:String;
|
||||
|
||||
private var ownCert:Null<Certificate>;
|
||||
private var ownKey:Null<Key>;
|
||||
private var altSNIContexts:Null<Array<{match:String->Bool, key:Key, cert:Certificate}>>;
|
||||
private var sniCallback:Dynamic;
|
||||
private var handshakeDone:Bool;
|
||||
|
||||
private override function init():Void {
|
||||
__s = socket_new(false);
|
||||
input = new SocketInput(this);
|
||||
output = new SocketOutput(this);
|
||||
if (DEFAULT_VERIFY_CERT && DEFAULT_CA == null) {
|
||||
try {
|
||||
DEFAULT_CA = Certificate.loadDefaults();
|
||||
} catch (e:Dynamic) {}
|
||||
}
|
||||
verifyCert = DEFAULT_VERIFY_CERT;
|
||||
caCert = DEFAULT_CA;
|
||||
}
|
||||
|
||||
public override function connect(host:sys.net.Host, port:Int):Void {
|
||||
try {
|
||||
ctx = buildSSLContext(false);
|
||||
ssl = ssl_new(ctx);
|
||||
ssl_set_socket(ssl, __s);
|
||||
handshakeDone = false;
|
||||
if (hostname == null)
|
||||
hostname = host.host;
|
||||
if (hostname != null)
|
||||
ssl_set_hostname(ssl, untyped hostname.__s);
|
||||
socket_connect(__s, host.ip, port);
|
||||
handshake();
|
||||
} catch (s:String) {
|
||||
if (s == "std@socket_connect")
|
||||
throw "Failed to connect on " + host.host + ":" + port;
|
||||
else
|
||||
neko.Lib.rethrow(s);
|
||||
} catch (e:Dynamic) {
|
||||
neko.Lib.rethrow(e);
|
||||
}
|
||||
}
|
||||
|
||||
public function handshake():Void {
|
||||
if (!handshakeDone) {
|
||||
try {
|
||||
ssl_handshake(ssl);
|
||||
handshakeDone = true;
|
||||
} catch (e:Dynamic) {
|
||||
if (e == "Blocking")
|
||||
throw haxe.io.Error.Blocked;
|
||||
else
|
||||
neko.Lib.rethrow(e);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
public function setCA(cert:Certificate):Void {
|
||||
caCert = cert;
|
||||
}
|
||||
|
||||
public function setHostname(name:String):Void {
|
||||
hostname = name;
|
||||
}
|
||||
|
||||
public function setCertificate(cert:Certificate, key:Key):Void {
|
||||
ownCert = cert;
|
||||
ownKey = key;
|
||||
}
|
||||
|
||||
public override function read():String {
|
||||
handshake();
|
||||
var b = ssl_read(ssl);
|
||||
if (b == null)
|
||||
return "";
|
||||
return new String(cast b);
|
||||
}
|
||||
|
||||
public override function write(content:String):Void {
|
||||
handshake();
|
||||
ssl_write(ssl, untyped content.__s);
|
||||
}
|
||||
|
||||
public override function close():Void {
|
||||
if (ssl != null)
|
||||
ssl_close(ssl);
|
||||
if (ctx != null)
|
||||
conf_close(ctx);
|
||||
if (altSNIContexts != null)
|
||||
sniCallback = null;
|
||||
socket_close(__s);
|
||||
var input:SocketInput = cast input;
|
||||
var output:SocketOutput = cast output;
|
||||
@:privateAccess input.__s = output.__s = null;
|
||||
input.close();
|
||||
output.close();
|
||||
}
|
||||
|
||||
public function addSNICertificate(cbServernameMatch:String->Bool, cert:Certificate, key:Key):Void {
|
||||
if (altSNIContexts == null)
|
||||
altSNIContexts = [];
|
||||
altSNIContexts.push({match: cbServernameMatch, cert: cert, key: key});
|
||||
}
|
||||
|
||||
public override function bind(host:sys.net.Host, port:Int):Void {
|
||||
ctx = buildSSLContext(true);
|
||||
|
||||
socket_bind(__s, host.ip, port);
|
||||
}
|
||||
|
||||
public override function accept():Socket {
|
||||
var c = socket_accept(__s);
|
||||
var ssl = ssl_new(ctx);
|
||||
ssl_set_socket(ssl, c);
|
||||
|
||||
var s = Type.createEmptyInstance(sys.ssl.Socket);
|
||||
s.__s = c;
|
||||
s.ssl = ssl;
|
||||
s.input = new SocketInput(s);
|
||||
s.output = new SocketOutput(s);
|
||||
s.handshakeDone = false;
|
||||
|
||||
return s;
|
||||
}
|
||||
|
||||
public function peerCertificate():sys.ssl.Certificate {
|
||||
var x = ssl_get_peer_certificate(ssl);
|
||||
return x == null ? null : new sys.ssl.Certificate(x);
|
||||
}
|
||||
|
||||
private function buildSSLContext(server:Bool):CTX {
|
||||
var ctx:CTX = conf_new(server);
|
||||
|
||||
if (ownCert != null && ownKey != null)
|
||||
conf_set_cert(ctx, @:privateAccess ownCert.__x, @:privateAccess ownKey.__k);
|
||||
|
||||
if (altSNIContexts != null) {
|
||||
sniCallback = function(servername) {
|
||||
var servername = new String(cast servername);
|
||||
for (c in altSNIContexts) {
|
||||
if (c.match(servername))
|
||||
return @:privateAccess {
|
||||
key:c.key.__k, cert:c.cert.__x
|
||||
};
|
||||
}
|
||||
if (ownKey != null && ownCert != null)
|
||||
return @:privateAccess {
|
||||
key:ownKey.__k, cert:ownCert.__x
|
||||
};
|
||||
return null;
|
||||
}
|
||||
conf_set_servername_callback(ctx, sniCallback);
|
||||
}
|
||||
|
||||
if (caCert != null)
|
||||
conf_set_ca(ctx, caCert == null ? null : @:privateAccess caCert.__x);
|
||||
conf_set_verify(ctx, verifyCert);
|
||||
|
||||
return ctx;
|
||||
}
|
||||
|
||||
private static var ssl_new = neko.Lib.loadLazy("ssl", "ssl_new", 1);
|
||||
private static var ssl_close = neko.Lib.loadLazy("ssl", "ssl_close", 1);
|
||||
private static var ssl_handshake = neko.Lib.loadLazy("ssl", "ssl_handshake", 1);
|
||||
private static var ssl_set_socket = neko.Lib.loadLazy("ssl", "ssl_set_socket", 2);
|
||||
private static var ssl_set_hostname = neko.Lib.loadLazy("ssl", "ssl_set_hostname", 2);
|
||||
private static var ssl_get_peer_certificate = neko.Lib.loadLazy("ssl", "ssl_get_peer_certificate", 1);
|
||||
|
||||
private static var ssl_read = neko.Lib.loadLazy("ssl", "ssl_read", 1);
|
||||
private static var ssl_write = neko.Lib.loadLazy("ssl", "ssl_write", 2);
|
||||
|
||||
private static var conf_new = neko.Lib.loadLazy("ssl", "conf_new", 1);
|
||||
private static var conf_close = neko.Lib.loadLazy("ssl", "conf_close", 1);
|
||||
private static var conf_set_ca = neko.Lib.loadLazy("ssl", "conf_set_ca", 2);
|
||||
private static var conf_set_verify = neko.Lib.loadLazy("ssl", "conf_set_verify", 2);
|
||||
private static var conf_set_cert = neko.Lib.loadLazy("ssl", "conf_set_cert", 3);
|
||||
private static var conf_set_servername_callback = neko.Lib.loadLazy("ssl", "conf_set_servername_callback", 2);
|
||||
|
||||
private static var socket_new = neko.Lib.load("std", "socket_new", 1);
|
||||
private static var socket_close = neko.Lib.load("std", "socket_close", 1);
|
||||
private static var socket_connect = neko.Lib.load("std", "socket_connect", 3);
|
||||
private static var socket_bind = neko.Lib.load("std", "socket_bind", 3);
|
||||
private static var socket_accept = neko.Lib.load("std", "socket_accept", 1);
|
||||
}
|
Reference in New Issue
Block a user