2019-08-06 05:54:47 +02:00
|
|
|
// Copyright (c) 2019 Alexander Medvednikov. All rights reserved.
|
|
|
|
// Use of this source code is governed by an MIT license
|
|
|
|
// that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
module http
|
|
|
|
|
|
|
|
import strings
|
|
|
|
|
2019-08-13 08:56:18 +02:00
|
|
|
// On linux, prefer a localy build openssl, because it is
|
|
|
|
// much more likely for it to be newer, than the system
|
|
|
|
// openssl from libssl-dev. If there is no local openssl,
|
|
|
|
// the next flag is harmless, since it will still use the
|
|
|
|
// (older) system openssl.
|
|
|
|
#flag linux -I/usr/local/include/openssl -L/usr/local/lib
|
|
|
|
|
2019-08-07 14:08:59 +02:00
|
|
|
#flag windows -I @VROOT/thirdparty/openssl/include
|
2019-08-07 14:16:10 +02:00
|
|
|
#flag darwin -I @VROOT/thirdparty/openssl/include
|
2019-08-09 12:52:14 +02:00
|
|
|
#flag -l ssl -l crypto
|
2019-08-06 19:07:02 +02:00
|
|
|
// MacPorts
|
|
|
|
#flag darwin -L/opt/local/lib
|
2019-08-08 00:53:23 +02:00
|
|
|
// Brew
|
|
|
|
#flag darwin -L/usr/local/opt/openssl/lib
|
|
|
|
|
2019-08-06 05:54:47 +02:00
|
|
|
#include <openssl/ssl.h>
|
|
|
|
|
|
|
|
struct C.SSL {
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2019-08-06 13:57:58 +02:00
|
|
|
fn init_module() {
|
2019-08-06 16:35:41 +02:00
|
|
|
$if mac {
|
|
|
|
C.SSL_library_init()
|
|
|
|
}
|
2019-08-07 03:57:47 +02:00
|
|
|
$if linux {
|
|
|
|
C.SSL_library_init()
|
|
|
|
}
|
2019-08-06 13:57:58 +02:00
|
|
|
//C.SSL_load_error_strings()
|
|
|
|
//C.OPENSSL_config(0)
|
2019-08-06 05:54:47 +02:00
|
|
|
}
|
|
|
|
|
2019-08-10 10:05:59 +02:00
|
|
|
fn ssl_do(method, host_name, path string) Response {
|
2019-08-06 16:35:41 +02:00
|
|
|
//ssl_method := C.SSLv23_method()
|
|
|
|
ssl_method := C.TLSv1_2_method()
|
2019-08-06 05:54:47 +02:00
|
|
|
if isnil(method) {
|
|
|
|
}
|
|
|
|
ctx := C.SSL_CTX_new(ssl_method)
|
|
|
|
if isnil(ctx) {
|
|
|
|
}
|
|
|
|
C.SSL_CTX_set_verify_depth(ctx, 4)
|
|
|
|
flags := C.SSL_OP_NO_SSLv2 | C.SSL_OP_NO_SSLv3 | C.SSL_OP_NO_COMPRESSION
|
|
|
|
C.SSL_CTX_set_options(ctx, flags)
|
|
|
|
mut res := C.SSL_CTX_load_verify_locations(ctx, 'random-org-chain.pem', 0)
|
|
|
|
if res != 1 {
|
|
|
|
}
|
|
|
|
web := C.BIO_new_ssl_connect(ctx)
|
|
|
|
if isnil(ctx) {
|
|
|
|
}
|
|
|
|
addr := host_name + ':443'
|
|
|
|
res = C.BIO_set_conn_hostname(web, addr.str)
|
|
|
|
if res != 1 {
|
|
|
|
}
|
|
|
|
ssl := &C.SSL{!}
|
|
|
|
C.BIO_get_ssl(web, &ssl)
|
|
|
|
if isnil(ssl) {
|
|
|
|
}
|
|
|
|
preferred_ciphers := 'HIGH:!aNULL:!kRSA:!PSK:!SRP:!MD5:!RC4'
|
|
|
|
res = C.SSL_set_cipher_list(ssl, preferred_ciphers.str)
|
|
|
|
if res != 1 {
|
|
|
|
}
|
|
|
|
res = C.SSL_set_tlsext_host_name(ssl, host_name.str)
|
|
|
|
res = C.BIO_do_connect(web)
|
|
|
|
res = C.BIO_do_handshake(web)
|
|
|
|
cert := C.SSL_get_peer_certificate(ssl)
|
|
|
|
res = C.SSL_get_verify_result(ssl)
|
2019-08-10 10:05:59 +02:00
|
|
|
///////
|
|
|
|
s := build_request_headers('', method, host_name, path)
|
2019-08-06 05:54:47 +02:00
|
|
|
C.BIO_puts(web, s.str)
|
|
|
|
mut sb := strings.new_builder(100)
|
|
|
|
for {
|
|
|
|
buff := [1536]byte
|
|
|
|
len := int(C.BIO_read(web, buff, 1536) )
|
|
|
|
if len > 0 {
|
|
|
|
sb.write(tos(buff, len))
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !isnil(web) {
|
|
|
|
C.BIO_free_all(web)
|
|
|
|
}
|
|
|
|
if !isnil(ctx) {
|
|
|
|
C.SSL_CTX_free(ctx)
|
2019-08-10 10:05:59 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return parse_response(sb.str() )
|
2019-08-06 05:54:47 +02:00
|
|
|
}
|