844 lines
28 KiB
Rust
844 lines
28 KiB
Rust
|
|
//! TLS configuration and types
|
||
|
|
//!
|
||
|
|
//! A `Client` will use transport layer security (TLS) by default to connect to
|
||
|
|
//! HTTPS destinations.
|
||
|
|
//!
|
||
|
|
//! # Backends
|
||
|
|
//!
|
||
|
|
//! reqwest supports several TLS backends, enabled with Cargo features.
|
||
|
|
//!
|
||
|
|
//! ## default-tls
|
||
|
|
//!
|
||
|
|
//! reqwest will pick a TLS backend by default. This is true when the
|
||
|
|
//! `default-tls` feature is enabled.
|
||
|
|
//!
|
||
|
|
//! While it currently uses `native-tls`, the feature set is designed to only
|
||
|
|
//! enable configuration that is shared among available backends. This allows
|
||
|
|
//! reqwest to change the default to `rustls` (or another) at some point in the
|
||
|
|
//! future.
|
||
|
|
//!
|
||
|
|
//! <div class="warning">This feature is enabled by default, and takes
|
||
|
|
//! precedence if any other crate enables it. This is true even if you declare
|
||
|
|
//! `features = []`. You must set `default-features = false` instead.</div>
|
||
|
|
//!
|
||
|
|
//! Since Cargo features are additive, other crates in your dependency tree can
|
||
|
|
//! cause the default backend to be enabled. If you wish to ensure your
|
||
|
|
//! `Client` uses a specific backend, call the appropriate builder methods
|
||
|
|
//! (such as [`use_rustls_tls()`][]).
|
||
|
|
//!
|
||
|
|
//! [`use_rustls_tls()`]: crate::ClientBuilder::use_rustls_tls()
|
||
|
|
//!
|
||
|
|
//! ## native-tls
|
||
|
|
//!
|
||
|
|
//! This backend uses the [native-tls][] crate. That will try to use the system
|
||
|
|
//! TLS on Windows and Mac, and OpenSSL on Linux targets.
|
||
|
|
//!
|
||
|
|
//! Enabling the feature explicitly allows for `native-tls`-specific
|
||
|
|
//! configuration options.
|
||
|
|
//!
|
||
|
|
//! [native-tls]: https://crates.io/crates/native-tls
|
||
|
|
//!
|
||
|
|
//! ## rustls-tls
|
||
|
|
//!
|
||
|
|
//! This backend uses the [rustls][] crate, a TLS library written in Rust.
|
||
|
|
//!
|
||
|
|
//! [rustls]: https://crates.io/crates/rustls
|
||
|
|
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
use rustls::{
|
||
|
|
client::danger::HandshakeSignatureValid, client::danger::ServerCertVerified,
|
||
|
|
client::danger::ServerCertVerifier, crypto::WebPkiSupportedAlgorithms,
|
||
|
|
server::ParsedCertificate, DigitallySignedStruct, Error as TLSError, RootCertStore,
|
||
|
|
SignatureScheme,
|
||
|
|
};
|
||
|
|
use rustls_pki_types::pem::PemObject;
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
use rustls_pki_types::{ServerName, UnixTime};
|
||
|
|
use std::{
|
||
|
|
fmt,
|
||
|
|
io::{BufRead, BufReader},
|
||
|
|
};
|
||
|
|
|
||
|
|
/// Represents a X509 certificate revocation list.
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
pub struct CertificateRevocationList {
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
inner: rustls_pki_types::CertificateRevocationListDer<'static>,
|
||
|
|
}
|
||
|
|
|
||
|
|
/// Represents a server X509 certificate.
|
||
|
|
#[derive(Clone)]
|
||
|
|
pub struct Certificate {
|
||
|
|
#[cfg(feature = "default-tls")]
|
||
|
|
native: native_tls_crate::Certificate,
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
original: Cert,
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
#[derive(Clone)]
|
||
|
|
enum Cert {
|
||
|
|
Der(Vec<u8>),
|
||
|
|
Pem(Vec<u8>),
|
||
|
|
}
|
||
|
|
|
||
|
|
/// Represents a private key and X509 cert as a client certificate.
|
||
|
|
#[derive(Clone)]
|
||
|
|
pub struct Identity {
|
||
|
|
#[cfg_attr(not(any(feature = "native-tls", feature = "__rustls")), allow(unused))]
|
||
|
|
inner: ClientCert,
|
||
|
|
}
|
||
|
|
|
||
|
|
enum ClientCert {
|
||
|
|
#[cfg(feature = "native-tls")]
|
||
|
|
Pkcs12(native_tls_crate::Identity),
|
||
|
|
#[cfg(feature = "native-tls")]
|
||
|
|
Pkcs8(native_tls_crate::Identity),
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
Pem {
|
||
|
|
key: rustls_pki_types::PrivateKeyDer<'static>,
|
||
|
|
certs: Vec<rustls_pki_types::CertificateDer<'static>>,
|
||
|
|
},
|
||
|
|
}
|
||
|
|
|
||
|
|
impl Clone for ClientCert {
|
||
|
|
fn clone(&self) -> Self {
|
||
|
|
match self {
|
||
|
|
#[cfg(feature = "native-tls")]
|
||
|
|
Self::Pkcs8(i) => Self::Pkcs8(i.clone()),
|
||
|
|
#[cfg(feature = "native-tls")]
|
||
|
|
Self::Pkcs12(i) => Self::Pkcs12(i.clone()),
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
ClientCert::Pem { key, certs } => ClientCert::Pem {
|
||
|
|
key: key.clone_key(),
|
||
|
|
certs: certs.clone(),
|
||
|
|
},
|
||
|
|
#[cfg_attr(
|
||
|
|
any(feature = "native-tls", feature = "__rustls"),
|
||
|
|
allow(unreachable_patterns)
|
||
|
|
)]
|
||
|
|
_ => unreachable!(),
|
||
|
|
}
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
impl Certificate {
|
||
|
|
/// Create a `Certificate` from a binary DER encoded certificate
|
||
|
|
///
|
||
|
|
/// # Examples
|
||
|
|
///
|
||
|
|
/// ```
|
||
|
|
/// # use std::fs::File;
|
||
|
|
/// # use std::io::Read;
|
||
|
|
/// # fn cert() -> Result<(), Box<dyn std::error::Error>> {
|
||
|
|
/// let mut buf = Vec::new();
|
||
|
|
/// File::open("my_cert.der")?
|
||
|
|
/// .read_to_end(&mut buf)?;
|
||
|
|
/// let cert = reqwest::Certificate::from_der(&buf)?;
|
||
|
|
/// # drop(cert);
|
||
|
|
/// # Ok(())
|
||
|
|
/// # }
|
||
|
|
/// ```
|
||
|
|
pub fn from_der(der: &[u8]) -> crate::Result<Certificate> {
|
||
|
|
Ok(Certificate {
|
||
|
|
#[cfg(feature = "default-tls")]
|
||
|
|
native: native_tls_crate::Certificate::from_der(der).map_err(crate::error::builder)?,
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
original: Cert::Der(der.to_owned()),
|
||
|
|
})
|
||
|
|
}
|
||
|
|
|
||
|
|
/// Create a `Certificate` from a PEM encoded certificate
|
||
|
|
///
|
||
|
|
/// # Examples
|
||
|
|
///
|
||
|
|
/// ```
|
||
|
|
/// # use std::fs::File;
|
||
|
|
/// # use std::io::Read;
|
||
|
|
/// # fn cert() -> Result<(), Box<dyn std::error::Error>> {
|
||
|
|
/// let mut buf = Vec::new();
|
||
|
|
/// File::open("my_cert.pem")?
|
||
|
|
/// .read_to_end(&mut buf)?;
|
||
|
|
/// let cert = reqwest::Certificate::from_pem(&buf)?;
|
||
|
|
/// # drop(cert);
|
||
|
|
/// # Ok(())
|
||
|
|
/// # }
|
||
|
|
/// ```
|
||
|
|
pub fn from_pem(pem: &[u8]) -> crate::Result<Certificate> {
|
||
|
|
Ok(Certificate {
|
||
|
|
#[cfg(feature = "default-tls")]
|
||
|
|
native: native_tls_crate::Certificate::from_pem(pem).map_err(crate::error::builder)?,
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
original: Cert::Pem(pem.to_owned()),
|
||
|
|
})
|
||
|
|
}
|
||
|
|
|
||
|
|
/// Create a collection of `Certificate`s from a PEM encoded certificate bundle.
|
||
|
|
/// Example byte sources may be `.crt`, `.cer` or `.pem` files.
|
||
|
|
///
|
||
|
|
/// # Examples
|
||
|
|
///
|
||
|
|
/// ```
|
||
|
|
/// # use std::fs::File;
|
||
|
|
/// # use std::io::Read;
|
||
|
|
/// # fn cert() -> Result<(), Box<dyn std::error::Error>> {
|
||
|
|
/// let mut buf = Vec::new();
|
||
|
|
/// File::open("ca-bundle.crt")?
|
||
|
|
/// .read_to_end(&mut buf)?;
|
||
|
|
/// let certs = reqwest::Certificate::from_pem_bundle(&buf)?;
|
||
|
|
/// # drop(certs);
|
||
|
|
/// # Ok(())
|
||
|
|
/// # }
|
||
|
|
/// ```
|
||
|
|
pub fn from_pem_bundle(pem_bundle: &[u8]) -> crate::Result<Vec<Certificate>> {
|
||
|
|
let mut reader = BufReader::new(pem_bundle);
|
||
|
|
|
||
|
|
Self::read_pem_certs(&mut reader)?
|
||
|
|
.iter()
|
||
|
|
.map(|cert_vec| Certificate::from_der(cert_vec))
|
||
|
|
.collect::<crate::Result<Vec<Certificate>>>()
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(feature = "default-tls")]
|
||
|
|
pub(crate) fn add_to_native_tls(self, tls: &mut native_tls_crate::TlsConnectorBuilder) {
|
||
|
|
tls.add_root_certificate(self.native);
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
pub(crate) fn add_to_rustls(
|
||
|
|
self,
|
||
|
|
root_cert_store: &mut rustls::RootCertStore,
|
||
|
|
) -> crate::Result<()> {
|
||
|
|
use std::io::Cursor;
|
||
|
|
|
||
|
|
match self.original {
|
||
|
|
Cert::Der(buf) => root_cert_store
|
||
|
|
.add(buf.into())
|
||
|
|
.map_err(crate::error::builder)?,
|
||
|
|
Cert::Pem(buf) => {
|
||
|
|
let mut reader = Cursor::new(buf);
|
||
|
|
let certs = Self::read_pem_certs(&mut reader)?;
|
||
|
|
for c in certs {
|
||
|
|
root_cert_store
|
||
|
|
.add(c.into())
|
||
|
|
.map_err(crate::error::builder)?;
|
||
|
|
}
|
||
|
|
}
|
||
|
|
}
|
||
|
|
Ok(())
|
||
|
|
}
|
||
|
|
|
||
|
|
fn read_pem_certs(reader: &mut impl BufRead) -> crate::Result<Vec<Vec<u8>>> {
|
||
|
|
rustls_pki_types::CertificateDer::pem_reader_iter(reader)
|
||
|
|
.map(|result| match result {
|
||
|
|
Ok(cert) => Ok(cert.as_ref().to_vec()),
|
||
|
|
Err(_) => Err(crate::error::builder("invalid certificate encoding")),
|
||
|
|
})
|
||
|
|
.collect()
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
impl Identity {
|
||
|
|
/// Parses a DER-formatted PKCS #12 archive, using the specified password to decrypt the key.
|
||
|
|
///
|
||
|
|
/// The archive should contain a leaf certificate and its private key, as well any intermediate
|
||
|
|
/// certificates that allow clients to build a chain to a trusted root.
|
||
|
|
/// The chain certificates should be in order from the leaf certificate towards the root.
|
||
|
|
///
|
||
|
|
/// PKCS #12 archives typically have the file extension `.p12` or `.pfx`, and can be created
|
||
|
|
/// with the OpenSSL `pkcs12` tool:
|
||
|
|
///
|
||
|
|
/// ```bash
|
||
|
|
/// openssl pkcs12 -export -out identity.pfx -inkey key.pem -in cert.pem -certfile chain_certs.pem
|
||
|
|
/// ```
|
||
|
|
///
|
||
|
|
/// # Examples
|
||
|
|
///
|
||
|
|
/// ```
|
||
|
|
/// # use std::fs::File;
|
||
|
|
/// # use std::io::Read;
|
||
|
|
/// # fn pkcs12() -> Result<(), Box<dyn std::error::Error>> {
|
||
|
|
/// let mut buf = Vec::new();
|
||
|
|
/// File::open("my-ident.pfx")?
|
||
|
|
/// .read_to_end(&mut buf)?;
|
||
|
|
/// let pkcs12 = reqwest::Identity::from_pkcs12_der(&buf, "my-privkey-password")?;
|
||
|
|
/// # drop(pkcs12);
|
||
|
|
/// # Ok(())
|
||
|
|
/// # }
|
||
|
|
/// ```
|
||
|
|
///
|
||
|
|
/// # Optional
|
||
|
|
///
|
||
|
|
/// This requires the `native-tls` Cargo feature enabled.
|
||
|
|
#[cfg(feature = "native-tls")]
|
||
|
|
pub fn from_pkcs12_der(der: &[u8], password: &str) -> crate::Result<Identity> {
|
||
|
|
Ok(Identity {
|
||
|
|
inner: ClientCert::Pkcs12(
|
||
|
|
native_tls_crate::Identity::from_pkcs12(der, password)
|
||
|
|
.map_err(crate::error::builder)?,
|
||
|
|
),
|
||
|
|
})
|
||
|
|
}
|
||
|
|
|
||
|
|
/// Parses a chain of PEM encoded X509 certificates, with the leaf certificate first.
|
||
|
|
/// `key` is a PEM encoded PKCS #8 formatted private key for the leaf certificate.
|
||
|
|
///
|
||
|
|
/// The certificate chain should contain any intermediate certificates that should be sent to
|
||
|
|
/// clients to allow them to build a chain to a trusted root.
|
||
|
|
///
|
||
|
|
/// A certificate chain here means a series of PEM encoded certificates concatenated together.
|
||
|
|
///
|
||
|
|
/// # Examples
|
||
|
|
///
|
||
|
|
/// ```
|
||
|
|
/// # use std::fs;
|
||
|
|
/// # fn pkcs8() -> Result<(), Box<dyn std::error::Error>> {
|
||
|
|
/// let cert = fs::read("client.pem")?;
|
||
|
|
/// let key = fs::read("key.pem")?;
|
||
|
|
/// let pkcs8 = reqwest::Identity::from_pkcs8_pem(&cert, &key)?;
|
||
|
|
/// # drop(pkcs8);
|
||
|
|
/// # Ok(())
|
||
|
|
/// # }
|
||
|
|
/// ```
|
||
|
|
///
|
||
|
|
/// # Optional
|
||
|
|
///
|
||
|
|
/// This requires the `native-tls` Cargo feature enabled.
|
||
|
|
#[cfg(feature = "native-tls")]
|
||
|
|
pub fn from_pkcs8_pem(pem: &[u8], key: &[u8]) -> crate::Result<Identity> {
|
||
|
|
Ok(Identity {
|
||
|
|
inner: ClientCert::Pkcs8(
|
||
|
|
native_tls_crate::Identity::from_pkcs8(pem, key).map_err(crate::error::builder)?,
|
||
|
|
),
|
||
|
|
})
|
||
|
|
}
|
||
|
|
|
||
|
|
/// Parses PEM encoded private key and certificate.
|
||
|
|
///
|
||
|
|
/// The input should contain a PEM encoded private key
|
||
|
|
/// and at least one PEM encoded certificate.
|
||
|
|
///
|
||
|
|
/// Note: The private key must be in RSA, SEC1 Elliptic Curve or PKCS#8 format.
|
||
|
|
///
|
||
|
|
/// # Examples
|
||
|
|
///
|
||
|
|
/// ```
|
||
|
|
/// # use std::fs::File;
|
||
|
|
/// # use std::io::Read;
|
||
|
|
/// # fn pem() -> Result<(), Box<dyn std::error::Error>> {
|
||
|
|
/// let mut buf = Vec::new();
|
||
|
|
/// File::open("my-ident.pem")?
|
||
|
|
/// .read_to_end(&mut buf)?;
|
||
|
|
/// let id = reqwest::Identity::from_pem(&buf)?;
|
||
|
|
/// # drop(id);
|
||
|
|
/// # Ok(())
|
||
|
|
/// # }
|
||
|
|
/// ```
|
||
|
|
///
|
||
|
|
/// # Optional
|
||
|
|
///
|
||
|
|
/// This requires the `rustls-tls(-...)` Cargo feature enabled.
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
pub fn from_pem(buf: &[u8]) -> crate::Result<Identity> {
|
||
|
|
use rustls_pki_types::{pem::SectionKind, PrivateKeyDer};
|
||
|
|
use std::io::Cursor;
|
||
|
|
|
||
|
|
let (key, certs) = {
|
||
|
|
let mut pem = Cursor::new(buf);
|
||
|
|
let mut sk = Vec::<rustls_pki_types::PrivateKeyDer>::new();
|
||
|
|
let mut certs = Vec::<rustls_pki_types::CertificateDer>::new();
|
||
|
|
|
||
|
|
while let Some((kind, data)) =
|
||
|
|
rustls_pki_types::pem::from_buf(&mut pem).map_err(|_| {
|
||
|
|
crate::error::builder(TLSError::General(String::from(
|
||
|
|
"Invalid identity PEM file",
|
||
|
|
)))
|
||
|
|
})?
|
||
|
|
{
|
||
|
|
match kind {
|
||
|
|
SectionKind::Certificate => certs.push(data.into()),
|
||
|
|
SectionKind::PrivateKey => sk.push(PrivateKeyDer::Pkcs8(data.into())),
|
||
|
|
SectionKind::RsaPrivateKey => sk.push(PrivateKeyDer::Pkcs1(data.into())),
|
||
|
|
SectionKind::EcPrivateKey => sk.push(PrivateKeyDer::Sec1(data.into())),
|
||
|
|
_ => {
|
||
|
|
return Err(crate::error::builder(TLSError::General(String::from(
|
||
|
|
"No valid certificate was found",
|
||
|
|
))))
|
||
|
|
}
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
if let (Some(sk), false) = (sk.pop(), certs.is_empty()) {
|
||
|
|
(sk, certs)
|
||
|
|
} else {
|
||
|
|
return Err(crate::error::builder(TLSError::General(String::from(
|
||
|
|
"private key or certificate not found",
|
||
|
|
))));
|
||
|
|
}
|
||
|
|
};
|
||
|
|
|
||
|
|
Ok(Identity {
|
||
|
|
inner: ClientCert::Pem { key, certs },
|
||
|
|
})
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(feature = "native-tls")]
|
||
|
|
pub(crate) fn add_to_native_tls(
|
||
|
|
self,
|
||
|
|
tls: &mut native_tls_crate::TlsConnectorBuilder,
|
||
|
|
) -> crate::Result<()> {
|
||
|
|
match self.inner {
|
||
|
|
ClientCert::Pkcs12(id) | ClientCert::Pkcs8(id) => {
|
||
|
|
tls.identity(id);
|
||
|
|
Ok(())
|
||
|
|
}
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
ClientCert::Pem { .. } => Err(crate::error::builder("incompatible TLS identity type")),
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
pub(crate) fn add_to_rustls(
|
||
|
|
self,
|
||
|
|
config_builder: rustls::ConfigBuilder<
|
||
|
|
rustls::ClientConfig,
|
||
|
|
// Not sure here
|
||
|
|
rustls::client::WantsClientCert,
|
||
|
|
>,
|
||
|
|
) -> crate::Result<rustls::ClientConfig> {
|
||
|
|
match self.inner {
|
||
|
|
ClientCert::Pem { key, certs } => config_builder
|
||
|
|
.with_client_auth_cert(certs, key)
|
||
|
|
.map_err(crate::error::builder),
|
||
|
|
#[cfg(feature = "native-tls")]
|
||
|
|
ClientCert::Pkcs12(..) | ClientCert::Pkcs8(..) => {
|
||
|
|
Err(crate::error::builder("incompatible TLS identity type"))
|
||
|
|
}
|
||
|
|
}
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
impl CertificateRevocationList {
|
||
|
|
/// Parses a PEM encoded CRL.
|
||
|
|
///
|
||
|
|
/// # Examples
|
||
|
|
///
|
||
|
|
/// ```
|
||
|
|
/// # use std::fs::File;
|
||
|
|
/// # use std::io::Read;
|
||
|
|
/// # fn crl() -> Result<(), Box<dyn std::error::Error>> {
|
||
|
|
/// let mut buf = Vec::new();
|
||
|
|
/// File::open("my_crl.pem")?
|
||
|
|
/// .read_to_end(&mut buf)?;
|
||
|
|
/// let crl = reqwest::tls::CertificateRevocationList::from_pem(&buf)?;
|
||
|
|
/// # drop(crl);
|
||
|
|
/// # Ok(())
|
||
|
|
/// # }
|
||
|
|
/// ```
|
||
|
|
///
|
||
|
|
/// # Optional
|
||
|
|
///
|
||
|
|
/// This requires the `rustls-tls(-...)` Cargo feature enabled.
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
pub fn from_pem(pem: &[u8]) -> crate::Result<CertificateRevocationList> {
|
||
|
|
Ok(CertificateRevocationList {
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
inner: rustls_pki_types::CertificateRevocationListDer::from(pem.to_vec()),
|
||
|
|
})
|
||
|
|
}
|
||
|
|
|
||
|
|
/// Creates a collection of `CertificateRevocationList`s from a PEM encoded CRL bundle.
|
||
|
|
/// Example byte sources may be `.crl` or `.pem` files.
|
||
|
|
///
|
||
|
|
/// # Examples
|
||
|
|
///
|
||
|
|
/// ```
|
||
|
|
/// # use std::fs::File;
|
||
|
|
/// # use std::io::Read;
|
||
|
|
/// # fn crls() -> Result<(), Box<dyn std::error::Error>> {
|
||
|
|
/// let mut buf = Vec::new();
|
||
|
|
/// File::open("crl-bundle.crl")?
|
||
|
|
/// .read_to_end(&mut buf)?;
|
||
|
|
/// let crls = reqwest::tls::CertificateRevocationList::from_pem_bundle(&buf)?;
|
||
|
|
/// # drop(crls);
|
||
|
|
/// # Ok(())
|
||
|
|
/// # }
|
||
|
|
/// ```
|
||
|
|
///
|
||
|
|
/// # Optional
|
||
|
|
///
|
||
|
|
/// This requires the `rustls-tls(-...)` Cargo feature enabled.
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
pub fn from_pem_bundle(pem_bundle: &[u8]) -> crate::Result<Vec<CertificateRevocationList>> {
|
||
|
|
rustls_pki_types::CertificateRevocationListDer::pem_slice_iter(pem_bundle)
|
||
|
|
.map(|result| match result {
|
||
|
|
Ok(crl) => Ok(CertificateRevocationList { inner: crl }),
|
||
|
|
Err(_) => Err(crate::error::builder("invalid crl encoding")),
|
||
|
|
})
|
||
|
|
.collect::<crate::Result<Vec<CertificateRevocationList>>>()
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
pub(crate) fn as_rustls_crl<'a>(&self) -> rustls_pki_types::CertificateRevocationListDer<'a> {
|
||
|
|
self.inner.clone()
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
impl fmt::Debug for Certificate {
|
||
|
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
||
|
|
f.debug_struct("Certificate").finish()
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
impl fmt::Debug for Identity {
|
||
|
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
||
|
|
f.debug_struct("Identity").finish()
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
impl fmt::Debug for CertificateRevocationList {
|
||
|
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
||
|
|
f.debug_struct("CertificateRevocationList").finish()
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
/// A TLS protocol version.
|
||
|
|
#[derive(Debug, Clone, Copy, PartialEq, Eq, PartialOrd, Ord)]
|
||
|
|
pub struct Version(InnerVersion);
|
||
|
|
|
||
|
|
#[derive(Debug, Clone, Copy, PartialEq, Eq, PartialOrd, Ord)]
|
||
|
|
#[non_exhaustive]
|
||
|
|
enum InnerVersion {
|
||
|
|
Tls1_0,
|
||
|
|
Tls1_1,
|
||
|
|
Tls1_2,
|
||
|
|
Tls1_3,
|
||
|
|
}
|
||
|
|
|
||
|
|
// These could perhaps be From/TryFrom implementations, but those would be
|
||
|
|
// part of the public API so let's be careful
|
||
|
|
impl Version {
|
||
|
|
/// Version 1.0 of the TLS protocol.
|
||
|
|
pub const TLS_1_0: Version = Version(InnerVersion::Tls1_0);
|
||
|
|
/// Version 1.1 of the TLS protocol.
|
||
|
|
pub const TLS_1_1: Version = Version(InnerVersion::Tls1_1);
|
||
|
|
/// Version 1.2 of the TLS protocol.
|
||
|
|
pub const TLS_1_2: Version = Version(InnerVersion::Tls1_2);
|
||
|
|
/// Version 1.3 of the TLS protocol.
|
||
|
|
pub const TLS_1_3: Version = Version(InnerVersion::Tls1_3);
|
||
|
|
|
||
|
|
#[cfg(feature = "default-tls")]
|
||
|
|
pub(crate) fn to_native_tls(self) -> Option<native_tls_crate::Protocol> {
|
||
|
|
match self.0 {
|
||
|
|
InnerVersion::Tls1_0 => Some(native_tls_crate::Protocol::Tlsv10),
|
||
|
|
InnerVersion::Tls1_1 => Some(native_tls_crate::Protocol::Tlsv11),
|
||
|
|
InnerVersion::Tls1_2 => Some(native_tls_crate::Protocol::Tlsv12),
|
||
|
|
InnerVersion::Tls1_3 => None,
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
pub(crate) fn from_rustls(version: rustls::ProtocolVersion) -> Option<Self> {
|
||
|
|
match version {
|
||
|
|
rustls::ProtocolVersion::SSLv2 => None,
|
||
|
|
rustls::ProtocolVersion::SSLv3 => None,
|
||
|
|
rustls::ProtocolVersion::TLSv1_0 => Some(Self(InnerVersion::Tls1_0)),
|
||
|
|
rustls::ProtocolVersion::TLSv1_1 => Some(Self(InnerVersion::Tls1_1)),
|
||
|
|
rustls::ProtocolVersion::TLSv1_2 => Some(Self(InnerVersion::Tls1_2)),
|
||
|
|
rustls::ProtocolVersion::TLSv1_3 => Some(Self(InnerVersion::Tls1_3)),
|
||
|
|
_ => None,
|
||
|
|
}
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
pub(crate) enum TlsBackend {
|
||
|
|
// This is the default and HTTP/3 feature does not use it so suppress it.
|
||
|
|
#[allow(dead_code)]
|
||
|
|
#[cfg(feature = "default-tls")]
|
||
|
|
Default,
|
||
|
|
#[cfg(feature = "native-tls")]
|
||
|
|
BuiltNativeTls(native_tls_crate::TlsConnector),
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
Rustls,
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
BuiltRustls(rustls::ClientConfig),
|
||
|
|
#[cfg(any(feature = "native-tls", feature = "__rustls",))]
|
||
|
|
UnknownPreconfigured,
|
||
|
|
}
|
||
|
|
|
||
|
|
impl fmt::Debug for TlsBackend {
|
||
|
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
||
|
|
match self {
|
||
|
|
#[cfg(feature = "default-tls")]
|
||
|
|
TlsBackend::Default => write!(f, "Default"),
|
||
|
|
#[cfg(feature = "native-tls")]
|
||
|
|
TlsBackend::BuiltNativeTls(_) => write!(f, "BuiltNativeTls"),
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
TlsBackend::Rustls => write!(f, "Rustls"),
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
TlsBackend::BuiltRustls(_) => write!(f, "BuiltRustls"),
|
||
|
|
#[cfg(any(feature = "native-tls", feature = "__rustls",))]
|
||
|
|
TlsBackend::UnknownPreconfigured => write!(f, "UnknownPreconfigured"),
|
||
|
|
}
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
#[allow(clippy::derivable_impls)]
|
||
|
|
impl Default for TlsBackend {
|
||
|
|
fn default() -> TlsBackend {
|
||
|
|
#[cfg(all(feature = "default-tls", not(feature = "http3")))]
|
||
|
|
{
|
||
|
|
TlsBackend::Default
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(any(
|
||
|
|
all(feature = "__rustls", not(feature = "default-tls")),
|
||
|
|
feature = "http3"
|
||
|
|
))]
|
||
|
|
{
|
||
|
|
TlsBackend::Rustls
|
||
|
|
}
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
#[derive(Debug)]
|
||
|
|
pub(crate) struct NoVerifier;
|
||
|
|
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
impl ServerCertVerifier for NoVerifier {
|
||
|
|
fn verify_server_cert(
|
||
|
|
&self,
|
||
|
|
_end_entity: &rustls_pki_types::CertificateDer,
|
||
|
|
_intermediates: &[rustls_pki_types::CertificateDer],
|
||
|
|
_server_name: &ServerName,
|
||
|
|
_ocsp_response: &[u8],
|
||
|
|
_now: UnixTime,
|
||
|
|
) -> Result<ServerCertVerified, TLSError> {
|
||
|
|
Ok(ServerCertVerified::assertion())
|
||
|
|
}
|
||
|
|
|
||
|
|
fn verify_tls12_signature(
|
||
|
|
&self,
|
||
|
|
_message: &[u8],
|
||
|
|
_cert: &rustls_pki_types::CertificateDer,
|
||
|
|
_dss: &DigitallySignedStruct,
|
||
|
|
) -> Result<HandshakeSignatureValid, TLSError> {
|
||
|
|
Ok(HandshakeSignatureValid::assertion())
|
||
|
|
}
|
||
|
|
|
||
|
|
fn verify_tls13_signature(
|
||
|
|
&self,
|
||
|
|
_message: &[u8],
|
||
|
|
_cert: &rustls_pki_types::CertificateDer,
|
||
|
|
_dss: &DigitallySignedStruct,
|
||
|
|
) -> Result<HandshakeSignatureValid, TLSError> {
|
||
|
|
Ok(HandshakeSignatureValid::assertion())
|
||
|
|
}
|
||
|
|
|
||
|
|
fn supported_verify_schemes(&self) -> Vec<SignatureScheme> {
|
||
|
|
vec![
|
||
|
|
SignatureScheme::RSA_PKCS1_SHA1,
|
||
|
|
SignatureScheme::ECDSA_SHA1_Legacy,
|
||
|
|
SignatureScheme::RSA_PKCS1_SHA256,
|
||
|
|
SignatureScheme::ECDSA_NISTP256_SHA256,
|
||
|
|
SignatureScheme::RSA_PKCS1_SHA384,
|
||
|
|
SignatureScheme::ECDSA_NISTP384_SHA384,
|
||
|
|
SignatureScheme::RSA_PKCS1_SHA512,
|
||
|
|
SignatureScheme::ECDSA_NISTP521_SHA512,
|
||
|
|
SignatureScheme::RSA_PSS_SHA256,
|
||
|
|
SignatureScheme::RSA_PSS_SHA384,
|
||
|
|
SignatureScheme::RSA_PSS_SHA512,
|
||
|
|
SignatureScheme::ED25519,
|
||
|
|
SignatureScheme::ED448,
|
||
|
|
]
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
#[derive(Debug)]
|
||
|
|
pub(crate) struct IgnoreHostname {
|
||
|
|
roots: RootCertStore,
|
||
|
|
signature_algorithms: WebPkiSupportedAlgorithms,
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
impl IgnoreHostname {
|
||
|
|
pub(crate) fn new(
|
||
|
|
roots: RootCertStore,
|
||
|
|
signature_algorithms: WebPkiSupportedAlgorithms,
|
||
|
|
) -> Self {
|
||
|
|
Self {
|
||
|
|
roots,
|
||
|
|
signature_algorithms,
|
||
|
|
}
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
impl ServerCertVerifier for IgnoreHostname {
|
||
|
|
fn verify_server_cert(
|
||
|
|
&self,
|
||
|
|
end_entity: &rustls_pki_types::CertificateDer<'_>,
|
||
|
|
intermediates: &[rustls_pki_types::CertificateDer<'_>],
|
||
|
|
_server_name: &ServerName<'_>,
|
||
|
|
_ocsp_response: &[u8],
|
||
|
|
now: UnixTime,
|
||
|
|
) -> Result<ServerCertVerified, TLSError> {
|
||
|
|
let cert = ParsedCertificate::try_from(end_entity)?;
|
||
|
|
|
||
|
|
rustls::client::verify_server_cert_signed_by_trust_anchor(
|
||
|
|
&cert,
|
||
|
|
&self.roots,
|
||
|
|
intermediates,
|
||
|
|
now,
|
||
|
|
self.signature_algorithms.all,
|
||
|
|
)?;
|
||
|
|
Ok(ServerCertVerified::assertion())
|
||
|
|
}
|
||
|
|
|
||
|
|
fn verify_tls12_signature(
|
||
|
|
&self,
|
||
|
|
message: &[u8],
|
||
|
|
cert: &rustls_pki_types::CertificateDer<'_>,
|
||
|
|
dss: &DigitallySignedStruct,
|
||
|
|
) -> Result<HandshakeSignatureValid, TLSError> {
|
||
|
|
rustls::crypto::verify_tls12_signature(message, cert, dss, &self.signature_algorithms)
|
||
|
|
}
|
||
|
|
|
||
|
|
fn verify_tls13_signature(
|
||
|
|
&self,
|
||
|
|
message: &[u8],
|
||
|
|
cert: &rustls_pki_types::CertificateDer<'_>,
|
||
|
|
dss: &DigitallySignedStruct,
|
||
|
|
) -> Result<HandshakeSignatureValid, TLSError> {
|
||
|
|
rustls::crypto::verify_tls13_signature(message, cert, dss, &self.signature_algorithms)
|
||
|
|
}
|
||
|
|
|
||
|
|
fn supported_verify_schemes(&self) -> Vec<SignatureScheme> {
|
||
|
|
self.signature_algorithms.supported_schemes()
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
/// Hyper extension carrying extra TLS layer information.
|
||
|
|
/// Made available to clients on responses when `tls_info` is set.
|
||
|
|
#[derive(Clone)]
|
||
|
|
pub struct TlsInfo {
|
||
|
|
pub(crate) peer_certificate: Option<Vec<u8>>,
|
||
|
|
}
|
||
|
|
|
||
|
|
impl TlsInfo {
|
||
|
|
/// Get the DER encoded leaf certificate of the peer.
|
||
|
|
pub fn peer_certificate(&self) -> Option<&[u8]> {
|
||
|
|
self.peer_certificate.as_ref().map(|der| &der[..])
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
impl std::fmt::Debug for TlsInfo {
|
||
|
|
fn fmt(&self, f: &mut std::fmt::Formatter) -> std::fmt::Result {
|
||
|
|
f.debug_struct("TlsInfo").finish()
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(test)]
|
||
|
|
mod tests {
|
||
|
|
use super::*;
|
||
|
|
|
||
|
|
#[cfg(feature = "default-tls")]
|
||
|
|
#[test]
|
||
|
|
fn certificate_from_der_invalid() {
|
||
|
|
Certificate::from_der(b"not der").unwrap_err();
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(feature = "default-tls")]
|
||
|
|
#[test]
|
||
|
|
fn certificate_from_pem_invalid() {
|
||
|
|
Certificate::from_pem(b"not pem").unwrap_err();
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(feature = "native-tls")]
|
||
|
|
#[test]
|
||
|
|
fn identity_from_pkcs12_der_invalid() {
|
||
|
|
Identity::from_pkcs12_der(b"not der", "nope").unwrap_err();
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(feature = "native-tls")]
|
||
|
|
#[test]
|
||
|
|
fn identity_from_pkcs8_pem_invalid() {
|
||
|
|
Identity::from_pkcs8_pem(b"not pem", b"not key").unwrap_err();
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
#[test]
|
||
|
|
fn identity_from_pem_invalid() {
|
||
|
|
Identity::from_pem(b"not pem").unwrap_err();
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
#[test]
|
||
|
|
fn identity_from_pem_pkcs1_key() {
|
||
|
|
let pem = b"-----BEGIN CERTIFICATE-----\n\
|
||
|
|
-----END CERTIFICATE-----\n\
|
||
|
|
-----BEGIN RSA PRIVATE KEY-----\n\
|
||
|
|
-----END RSA PRIVATE KEY-----\n";
|
||
|
|
|
||
|
|
Identity::from_pem(pem).unwrap();
|
||
|
|
}
|
||
|
|
|
||
|
|
#[test]
|
||
|
|
fn certificates_from_pem_bundle() {
|
||
|
|
const PEM_BUNDLE: &[u8] = b"
|
||
|
|
-----BEGIN CERTIFICATE-----
|
||
|
|
MIIBtjCCAVugAwIBAgITBmyf1XSXNmY/Owua2eiedgPySjAKBggqhkjOPQQDAjA5
|
||
|
|
MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g
|
||
|
|
Um9vdCBDQSAzMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG
|
||
|
|
A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg
|
||
|
|
Q0EgMzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABCmXp8ZBf8ANm+gBG1bG8lKl
|
||
|
|
ui2yEujSLtf6ycXYqm0fc4E7O5hrOXwzpcVOho6AF2hiRVd9RFgdszflZwjrZt6j
|
||
|
|
QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSr
|
||
|
|
ttvXBp43rDCGB5Fwx5zEGbF4wDAKBggqhkjOPQQDAgNJADBGAiEA4IWSoxe3jfkr
|
||
|
|
BqWTrBqYaGFy+uGh0PsceGCmQ5nFuMQCIQCcAu/xlJyzlvnrxir4tiz+OpAUFteM
|
||
|
|
YyRIHN8wfdVoOw==
|
||
|
|
-----END CERTIFICATE-----
|
||
|
|
|
||
|
|
-----BEGIN CERTIFICATE-----
|
||
|
|
MIIB8jCCAXigAwIBAgITBmyf18G7EEwpQ+Vxe3ssyBrBDjAKBggqhkjOPQQDAzA5
|
||
|
|
MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g
|
||
|
|
Um9vdCBDQSA0MB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG
|
||
|
|
A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg
|
||
|
|
Q0EgNDB2MBAGByqGSM49AgEGBSuBBAAiA2IABNKrijdPo1MN/sGKe0uoe0ZLY7Bi
|
||
|
|
9i0b2whxIdIA6GO9mif78DluXeo9pcmBqqNbIJhFXRbb/egQbeOc4OO9X4Ri83Bk
|
||
|
|
M6DLJC9wuoihKqB1+IGuYgbEgds5bimwHvouXKNCMEAwDwYDVR0TAQH/BAUwAwEB
|
||
|
|
/zAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0OBBYEFNPsxzplbszh2naaVvuc84ZtV+WB
|
||
|
|
MAoGCCqGSM49BAMDA2gAMGUCMDqLIfG9fhGt0O9Yli/W651+kI0rz2ZVwyzjKKlw
|
||
|
|
CkcO8DdZEv8tmZQoTipPNU0zWgIxAOp1AE47xDqUEpHJWEadIRNyp4iciuRMStuW
|
||
|
|
1KyLa2tJElMzrdfkviT8tQp21KW8EA==
|
||
|
|
-----END CERTIFICATE-----
|
||
|
|
";
|
||
|
|
|
||
|
|
assert!(Certificate::from_pem_bundle(PEM_BUNDLE).is_ok())
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
#[test]
|
||
|
|
fn crl_from_pem() {
|
||
|
|
let pem = b"-----BEGIN X509 CRL-----\n-----END X509 CRL-----\n";
|
||
|
|
|
||
|
|
CertificateRevocationList::from_pem(pem).unwrap();
|
||
|
|
}
|
||
|
|
|
||
|
|
#[cfg(feature = "__rustls")]
|
||
|
|
#[test]
|
||
|
|
fn crl_from_pem_bundle() {
|
||
|
|
let pem_bundle = std::fs::read("tests/support/crl.pem").unwrap();
|
||
|
|
|
||
|
|
let result = CertificateRevocationList::from_pem_bundle(&pem_bundle);
|
||
|
|
|
||
|
|
assert!(result.is_ok());
|
||
|
|
let result = result.unwrap();
|
||
|
|
assert_eq!(result.len(), 1);
|
||
|
|
}
|
||
|
|
}
|