aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSteven Fackler <[email protected]>2015-09-01 00:10:03 -0400
committerSteven Fackler <[email protected]>2015-09-01 00:10:03 -0400
commite28b73e1f61c40f40a26dcd30a2b18eca16eaa9b (patch)
treeafe2b8a61370546e8c8953f2837adf7d1407fcdf
parentMerge branch 'release' (diff)
parentAdd support for set_tmp_dh() and RFC5114 DH parameters for forward secrecy. (diff)
downloadrust-openssl-e28b73e1f61c40f40a26dcd30a2b18eca16eaa9b.tar.xz
rust-openssl-e28b73e1f61c40f40a26dcd30a2b18eca16eaa9b.zip
Merge pull request #259 from jedisct1/dh
Add support for DHE for forward secrecy
-rw-r--r--openssl-sys/Cargo.toml1
-rw-r--r--openssl-sys/src/lib.rs14
-rw-r--r--openssl-sys/src/openssl_shim.c18
-rw-r--r--openssl/Cargo.toml1
-rw-r--r--openssl/src/bn/mod.rs4
-rw-r--r--openssl/src/dh/mod.rs97
-rw-r--r--openssl/src/lib.rs1
-rw-r--r--openssl/src/ssl/mod.rs7
8 files changed, 141 insertions, 2 deletions
diff --git a/openssl-sys/Cargo.toml b/openssl-sys/Cargo.toml
index 437f7fb6..0e78b0ea 100644
--- a/openssl-sys/Cargo.toml
+++ b/openssl-sys/Cargo.toml
@@ -21,6 +21,7 @@ aes_xts = []
aes_ctr = []
npn = []
alpn = []
+rfc5114 = []
[dependencies]
libc = "0.1"
diff --git a/openssl-sys/src/lib.rs b/openssl-sys/src/lib.rs
index 0e0ef8a5..9b5fd744 100644
--- a/openssl-sys/src/lib.rs
+++ b/openssl-sys/src/lib.rs
@@ -20,6 +20,7 @@ pub type BIO_METHOD = c_void;
pub type BN_CTX = c_void;
pub type COMP_METHOD = c_void;
pub type CRYPTO_EX_DATA = c_void;
+pub type DH = c_void;
pub type ENGINE = c_void;
pub type EVP_CIPHER = c_void;
pub type EVP_CIPHER_CTX = c_void;
@@ -380,6 +381,17 @@ extern "C" {
pub fn CRYPTO_memcmp(a: *const c_void, b: *const c_void,
len: size_t) -> c_int;
+ pub fn DH_free(dh: *mut DH);
+
+ #[cfg(feature = "rfc5114")]
+ pub fn DH_get_1024_160() -> *mut DH;
+ #[cfg(feature = "rfc5114")]
+ pub fn DH_get_2048_224() -> *mut DH;
+ #[cfg(feature = "rfc5114")]
+ pub fn DH_get_2048_256() -> *mut DH;
+
+ pub fn DH_new_from_params(p: *mut BIGNUM, g: *mut BIGNUM, q: *mut BIGNUM) -> *mut DH;
+
pub fn ERR_get_error() -> c_ulong;
pub fn ERR_lib_error_string(err: c_ulong) -> *const c_char;
@@ -664,6 +676,8 @@ extern "C" {
pub fn SSL_CTX_set_read_ahead(ctx: *mut SSL_CTX, m: c_long) -> c_long;
#[link_name = "SSL_set_tlsext_host_name_shim"]
pub fn SSL_set_tlsext_host_name(s: *mut SSL, name: *const c_char) -> c_long;
+ #[link_name = "SSL_CTX_set_tmp_dh_shim"]
+ pub fn SSL_CTX_set_tmp_dh(s: *mut SSL, dh: *const DH) -> c_long;
#[link_name = "X509_get_extensions_shim"]
pub fn X509_get_extensions(x: *mut X509) -> *mut stack_st_X509_EXTENSION;
}
diff --git a/openssl-sys/src/openssl_shim.c b/openssl-sys/src/openssl_shim.c
index f0622d2d..ce0ee692 100644
--- a/openssl-sys/src/openssl_shim.c
+++ b/openssl-sys/src/openssl_shim.c
@@ -1,5 +1,7 @@
#include <openssl/hmac.h>
#include <openssl/ssl.h>
+#include <openssl/dh.h>
+#include <openssl/bn.h>
#if OPENSSL_VERSION_NUMBER < 0x1000000L
// Copied from openssl crypto/hmac/hmac.c
@@ -79,6 +81,22 @@ long SSL_CTX_set_read_ahead_shim(SSL_CTX *ctx, long m) {
return SSL_CTX_set_read_ahead(ctx, m);
}
+long SSL_CTX_set_tmp_dh_shim(SSL_CTX *ctx, DH *dh) {
+ return SSL_CTX_set_tmp_dh(ctx, dh);
+}
+
+DH *DH_new_from_params(BIGNUM *p, BIGNUM *g, BIGNUM *q) {
+ DH *dh;
+
+ if ((dh = DH_new()) == NULL) {
+ return NULL;
+ }
+ dh->p = p;
+ dh->g = g;
+ dh->q = q;
+ return dh;
+}
+
long SSL_set_tlsext_host_name_shim(SSL *s, char *name) {
return SSL_set_tlsext_host_name(s, name);
}
diff --git a/openssl/Cargo.toml b/openssl/Cargo.toml
index b8bc357d..9d16ccd6 100644
--- a/openssl/Cargo.toml
+++ b/openssl/Cargo.toml
@@ -19,6 +19,7 @@ aes_xts = ["openssl-sys/aes_xts"]
aes_ctr = ["openssl-sys/aes_ctr"]
npn = ["openssl-sys/npn"]
alpn = ["openssl-sys/alpn"]
+rfc5114 = ["openssl-sys/rfc5114"]
[dependencies.openssl-sys]
path = "../openssl-sys"
diff --git a/openssl/src/bn/mod.rs b/openssl/src/bn/mod.rs
index ccf28337..3c973438 100644
--- a/openssl/src/bn/mod.rs
+++ b/openssl/src/bn/mod.rs
@@ -397,12 +397,12 @@ impl BigNum {
(self.num_bits() + 7) / 8
}
- unsafe fn raw(&self) -> *mut ffi::BIGNUM {
+ pub unsafe fn raw(&self) -> *mut ffi::BIGNUM {
let BigNum(n) = *self;
n
}
- unsafe fn raw_ptr(&self) -> *const *mut ffi::BIGNUM {
+ pub unsafe fn raw_ptr(&self) -> *const *mut ffi::BIGNUM {
let BigNum(ref n) = *self;
n
}
diff --git a/openssl/src/dh/mod.rs b/openssl/src/dh/mod.rs
new file mode 100644
index 00000000..cbf9d3ab
--- /dev/null
+++ b/openssl/src/dh/mod.rs
@@ -0,0 +1,97 @@
+use ffi;
+use ssl::error::SslError;
+use bn::BigNum;
+use std::mem;
+use std::ptr;
+
+pub struct DH(*mut ffi::DH);
+
+impl DH {
+ pub fn from_params(p: BigNum, g: BigNum, q: BigNum) -> Result<DH, SslError> {
+ let dh = unsafe { ffi::DH_new_from_params(p.raw(), g.raw(), q.raw()) };
+ if dh == ptr::null_mut() {
+ return Err(SslError::get());
+ }
+ mem::forget(p);
+ mem::forget(g);
+ mem::forget(q);
+ Ok(DH(dh))
+ }
+
+ #[cfg(feature = "rfc5114")]
+ pub fn get_1024_160() -> Result<DH, SslError> {
+ let dh = unsafe { ffi::DH_get_1024_160() };
+ if dh == ptr::null_mut() {
+ return Err(SslError::get());
+ }
+ Ok(DH(dh))
+ }
+
+ #[cfg(feature = "rfc5114")]
+ pub fn get_2048_224() -> Result<DH, SslError> {
+ let dh = unsafe { ffi::DH_get_2048_224() };
+ if dh == ptr::null_mut() {
+ return Err(SslError::get());
+ }
+ Ok(DH(dh))
+ }
+
+ #[cfg(feature = "rfc5114")]
+ pub fn get_2048_256() -> Result<DH, SslError> {
+ let dh = unsafe { ffi::DH_get_2048_256() };
+ if dh == ptr::null_mut() {
+ return Err(SslError::get());
+ }
+ Ok(DH(dh))
+ }
+
+ pub unsafe fn raw(&self) -> *mut ffi::DH {
+ let DH(n) = *self;
+ n
+ }
+
+ pub unsafe fn raw_ptr(&self) -> *const *mut ffi::DH {
+ let DH(ref n) = *self;
+ n
+ }
+}
+
+impl Drop for DH {
+ fn drop(&mut self) {
+ unsafe {
+ if !self.raw().is_null() {
+ ffi::DH_free(self.raw())
+ }
+ }
+ }
+}
+
+#[cfg(test)]
+mod tests {
+ use super::DH;
+ use bn::BigNum;
+ use ssl::SslContext;
+ use ssl::SslMethod::Sslv23;
+
+ #[test]
+ #[cfg(feature = "rfc5114")]
+ fn test_dh_rfc5114() {
+ let ctx = SslContext::new(Sslv23).unwrap();
+ let dh1 = DH::get_1024_160().unwrap();
+ ctx.set_tmp_dh(dh1).unwrap();
+ let dh2 = DH::get_2048_224().unwrap();
+ ctx.set_tmp_dh(dh2).unwrap();
+ let dh3 = DH::get_2048_256().unwrap();
+ ctx.set_tmp_dh(dh3).unwrap();
+ }
+
+ #[test]
+ fn test_dh() {
+ let ctx = SslContext::new(Sslv23).unwrap();
+ let p = BigNum::from_hex_str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unwrap();
+ let g = BigNum::from_hex_str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unwrap();
+ let q = BigNum::from_hex_str("8CF83642A709A097B447997640129DA299B1A47D1EB3750BA308B0FE64F5FBD3").unwrap();
+ let dh = DH::from_params(p, g, q).unwrap();
+ ctx.set_tmp_dh(dh).unwrap();
+ }
+}
diff --git a/openssl/src/lib.rs b/openssl/src/lib.rs
index 17e625b9..cc74726f 100644
--- a/openssl/src/lib.rs
+++ b/openssl/src/lib.rs
@@ -20,6 +20,7 @@ pub mod asn1;
pub mod bn;
pub mod bio;
pub mod crypto;
+pub mod dh;
pub mod ssl;
pub mod x509;
pub mod nid;
diff --git a/openssl/src/ssl/mod.rs b/openssl/src/ssl/mod.rs
index 35180d3a..ee2e1f9f 100644
--- a/openssl/src/ssl/mod.rs
+++ b/openssl/src/ssl/mod.rs
@@ -21,6 +21,7 @@ use std::slice;
use bio::{MemBio};
use ffi;
+use dh::DH;
use ssl::error::{SslError, SslSessionClosed, StreamError, OpenSslErrors};
use x509::{X509StoreContext, X509FileType, X509};
use crypto::pkey::PKey;
@@ -492,6 +493,12 @@ impl SslContext {
}
}
+ pub fn set_tmp_dh(&self, dh: DH) -> Result<(),SslError> {
+ wrap_ssl_result(unsafe {
+ ffi::SSL_CTX_set_tmp_dh(self.ctx, dh.raw()) as i32
+ })
+ }
+
#[allow(non_snake_case)]
/// Specifies the file that contains trusted CA certificates.
pub fn set_CA_file<P: AsRef<Path>>(&mut self, file: P) -> Result<(),SslError> {