diff options
| author | Steven Fackler <[email protected]> | 2016-02-10 09:36:44 -0800 |
|---|---|---|
| committer | Steven Fackler <[email protected]> | 2016-02-10 09:36:44 -0800 |
| commit | 7540471ce0b4c25ba151655d43b58bd42171c511 (patch) | |
| tree | a08ec37e8e43c72d9e0a25c4584c5728c69a74f1 /openssl/src/crypto/rsa.rs | |
| parent | Merge branch 'release-v0.7.5' into release (diff) | |
| parent | Release v0.7.6 (diff) | |
| download | rust-openssl-0.7.6.tar.xz rust-openssl-0.7.6.zip | |
Merge branch 'release-v0.7.6' into releasev0.7.6
Diffstat (limited to 'openssl/src/crypto/rsa.rs')
| -rw-r--r-- | openssl/src/crypto/rsa.rs | 93 |
1 files changed, 93 insertions, 0 deletions
diff --git a/openssl/src/crypto/rsa.rs b/openssl/src/crypto/rsa.rs new file mode 100644 index 00000000..ee0d9ec4 --- /dev/null +++ b/openssl/src/crypto/rsa.rs @@ -0,0 +1,93 @@ +use ffi; +use std::fmt; +use ssl::error::{SslError, StreamError}; +use std::ptr; +use std::io::{self, Read}; + +use bn::BigNum; +use bio::MemBio; + +pub struct RSA(*mut ffi::RSA); + +impl Drop for RSA { + fn drop(&mut self) { + unsafe { + ffi::RSA_free(self.0); + } + } +} + +impl RSA { + /// Reads an RSA private key from PEM formatted data. + pub fn private_key_from_pem<R>(reader: &mut R) -> Result<RSA, SslError> + where R: Read + { + let mut mem_bio = try!(MemBio::new()); + try!(io::copy(reader, &mut mem_bio).map_err(StreamError)); + + unsafe { + let rsa = try_ssl_null!(ffi::PEM_read_bio_RSAPrivateKey(mem_bio.get_handle(), + ptr::null_mut(), + None, + ptr::null_mut())); + Ok(RSA(rsa)) + } + } + + /// Reads an RSA public key from PEM formatted data. + pub fn public_key_from_pem<R>(reader: &mut R) -> Result<RSA, SslError> + where R: Read + { + let mut mem_bio = try!(MemBio::new()); + try!(io::copy(reader, &mut mem_bio).map_err(StreamError)); + + unsafe { + let rsa = try_ssl_null!(ffi::PEM_read_bio_RSA_PUBKEY(mem_bio.get_handle(), + ptr::null_mut(), + None, + ptr::null_mut())); + Ok(RSA(rsa)) + } + } + + pub fn as_ptr(&self) -> *mut ffi::RSA { + self.0 + } + + // The following getters are unsafe, since BigNum::new_from_ffi fails upon null pointers + pub fn n(&self) -> Result<BigNum, SslError> { + unsafe { + BigNum::new_from_ffi((*self.0).n) + } + } + + pub fn d(&self) -> Result<BigNum, SslError> { + unsafe { + BigNum::new_from_ffi((*self.0).d) + } + } + + pub fn e(&self) -> Result<BigNum, SslError> { + unsafe { + BigNum::new_from_ffi((*self.0).e) + } + } + + pub fn p(&self) -> Result<BigNum, SslError> { + unsafe { + BigNum::new_from_ffi((*self.0).p) + } + } + + pub fn q(&self) -> Result<BigNum, SslError> { + unsafe { + BigNum::new_from_ffi((*self.0).q) + } + } +} + +impl fmt::Debug for RSA { + fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { + write!(f, "RSA") + } +} |