202 lines
		
	
	
		
			5.3 KiB
		
	
	
	
		
			Rust
		
	
	
	
	
	
			
		
		
	
	
			202 lines
		
	
	
		
			5.3 KiB
		
	
	
	
		
			Rust
		
	
	
	
	
	
| use std::fmt;
 | |
| #[cfg(feature = "rustls-tls")]
 | |
| use rustls::{TLSError, ServerCertVerifier, RootCertStore, ServerCertVerified};
 | |
| #[cfg(feature = "rustls-tls")]
 | |
| use tokio_rustls::webpki::DNSNameRef;
 | |
| 
 | |
| /// Represent an X509 certificate.
 | |
| pub struct Certificate {
 | |
|     pub(crate) inner: inner::Certificate
 | |
| }
 | |
| 
 | |
| /// Represent a private key and X509 cert as a client certificate.
 | |
| pub struct Identity {
 | |
|     pub(crate) inner: inner::Identity
 | |
| }
 | |
| 
 | |
| pub(crate) mod inner {
 | |
|     pub(crate) enum Certificate {
 | |
|         Der(Vec<u8>),
 | |
|         Pem(Vec<u8>)
 | |
|     }
 | |
| 
 | |
|     pub(crate) enum Identity {
 | |
|         #[cfg(feature = "default-tls")]
 | |
|         Pkcs12(Vec<u8>, String),
 | |
|         #[cfg(feature = "rustls-tls")]
 | |
|         Pem(Vec<u8>),
 | |
|     }
 | |
| }
 | |
| 
 | |
| impl Certificate {
 | |
|     /// Create a `Certificate` from a binary DER encoded certificate
 | |
|     ///
 | |
|     /// # Examples
 | |
|     ///
 | |
|     /// ```
 | |
|     /// # use std::fs::File;
 | |
|     /// # use std::io::Read;
 | |
|     /// # fn cert() -> Result<(), Box<std::error::Error>> {
 | |
|     /// let mut buf = Vec::new();
 | |
|     /// File::open("my_cert.der")?
 | |
|     ///     .read_to_end(&mut buf)?;
 | |
|     /// let cert = reqwest::Certificate::from_der(&buf)?;
 | |
|     /// # drop(cert);
 | |
|     /// # Ok(())
 | |
|     /// # }
 | |
|     /// ```
 | |
|     ///
 | |
|     /// # Errors
 | |
|     ///
 | |
|     /// It never returns error.
 | |
|     pub fn from_der(der: &[u8]) -> ::Result<Certificate> {
 | |
|         Ok(Certificate {
 | |
|             inner: inner::Certificate::Der(der.to_owned())
 | |
|         })
 | |
|     }
 | |
| 
 | |
| 
 | |
|     /// Create a `Certificate` from a PEM encoded certificate
 | |
|     ///
 | |
|     /// # Examples
 | |
|     ///
 | |
|     /// ```
 | |
|     /// # use std::fs::File;
 | |
|     /// # use std::io::Read;
 | |
|     /// # fn cert() -> Result<(), Box<std::error::Error>> {
 | |
|     /// let mut buf = Vec::new();
 | |
|     /// File::open("my_cert.pem")?
 | |
|     ///     .read_to_end(&mut buf)?;
 | |
|     /// let cert = reqwest::Certificate::from_pem(&buf)?;
 | |
|     /// # drop(cert);
 | |
|     /// # Ok(())
 | |
|     /// # }
 | |
|     /// ```
 | |
|     ///
 | |
|     /// # Errors
 | |
|     ///
 | |
|     /// It never returns error.
 | |
|     pub fn from_pem(der: &[u8]) -> ::Result<Certificate> {
 | |
|         Ok(Certificate {
 | |
|             inner: inner::Certificate::Pem(der.to_owned())
 | |
|         })
 | |
|     }
 | |
| }
 | |
| 
 | |
| impl Identity {
 | |
|     /// Parses a DER-formatted PKCS #12 archive, using the specified password to decrypt the key.
 | |
|     ///
 | |
|     /// The archive should contain a leaf certificate and its private key, as well any intermediate
 | |
|     /// certificates that allow clients to build a chain to a trusted root.
 | |
|     /// The chain certificates should be in order from the leaf certificate towards the root.
 | |
|     ///
 | |
|     /// PKCS #12 archives typically have the file extension `.p12` or `.pfx`, and can be created
 | |
|     /// with the OpenSSL `pkcs12` tool:
 | |
|     ///
 | |
|     /// ```bash
 | |
|     /// openssl pkcs12 -export -out identity.pfx -inkey key.pem -in cert.pem -certfile chain_certs.pem
 | |
|     /// ```
 | |
|     ///
 | |
|     /// # Examples
 | |
|     ///
 | |
|     /// ```
 | |
|     /// # use std::fs::File;
 | |
|     /// # use std::io::Read;
 | |
|     /// # fn pkcs12() -> Result<(), Box<std::error::Error>> {
 | |
|     /// let mut buf = Vec::new();
 | |
|     /// File::open("my-ident.pfx")?
 | |
|     ///     .read_to_end(&mut buf)?;
 | |
|     /// let pkcs12 = reqwest::Identity::from_pkcs12_der(&buf, "my-privkey-password")?;
 | |
|     /// # drop(pkcs12);
 | |
|     /// # Ok(())
 | |
|     /// # }
 | |
|     /// ```
 | |
|     ///
 | |
|     /// # Errors
 | |
|     ///
 | |
|     /// It never returns error.
 | |
|     #[cfg(feature = "default-tls")]
 | |
|     pub fn from_pkcs12_der(der: &[u8], password: &str) -> ::Result<Identity> {
 | |
|         Ok(Identity {
 | |
|             inner: inner::Identity::Pkcs12(der.to_owned(), password.to_owned())
 | |
|         })
 | |
|     }
 | |
| 
 | |
|     /// Parses PEM encoded private key and certificate.
 | |
|     ///
 | |
|     /// The input should contain a PEM encoded private key
 | |
|     /// and at least one PEM encoded certificate.
 | |
|     ///
 | |
|     /// # Examples
 | |
|     ///
 | |
|     /// ```
 | |
|     /// # use std::fs::File;
 | |
|     /// # use std::io::Read;
 | |
|     /// # fn pem() -> Result<(), Box<std::error::Error>> {
 | |
|     /// let mut buf = Vec::new();
 | |
|     /// File::open("my-ident.pem")?
 | |
|     ///     .read_to_end(&mut buf)?;
 | |
|     /// let id = reqwest::Identity::from_pem(&buf)?;
 | |
|     /// # drop(id);
 | |
|     /// # Ok(())
 | |
|     /// # }
 | |
|     /// ```
 | |
|     ///
 | |
|     /// # Errors
 | |
|     ///
 | |
|     /// It never returns error.
 | |
|     #[cfg(feature = "rustls-tls")]
 | |
|     pub fn from_pem(pem: &[u8]) -> ::Result<Identity> {
 | |
|         Ok(Identity {
 | |
|             inner: inner::Identity::Pem(pem.to_owned())
 | |
|         })
 | |
|     }
 | |
| }
 | |
| 
 | |
| impl fmt::Debug for Certificate {
 | |
|     fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
 | |
|         f.debug_struct("Certificate")
 | |
|             .finish()
 | |
|     }
 | |
| }
 | |
| 
 | |
| impl fmt::Debug for Identity {
 | |
|     fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
 | |
|         f.debug_struct("Identity")
 | |
|             .finish()
 | |
|     }
 | |
| }
 | |
| 
 | |
| pub(crate) enum TLSBackend {
 | |
|     #[cfg(feature = "default-tls")]
 | |
|     Default,
 | |
|     #[cfg(feature = "rustls-tls")]
 | |
|     Rustls
 | |
| }
 | |
| 
 | |
| impl Default for TLSBackend {
 | |
|     fn default() -> TLSBackend {
 | |
|         #[cfg(feature = "default-tls")]
 | |
|         { TLSBackend::Default }
 | |
| 
 | |
|         #[cfg(all(feature = "rustls-tls", not(feature = "default-tls")))]
 | |
|         { TLSBackend::Rustls }
 | |
|     }
 | |
| }
 | |
| 
 | |
| #[cfg(feature = "rustls-tls")]
 | |
| pub(crate) struct NoVerifier;
 | |
| 
 | |
| #[cfg(feature = "rustls-tls")]
 | |
| impl ServerCertVerifier for NoVerifier {
 | |
|     fn verify_server_cert(
 | |
|         &self,
 | |
|         _roots: &RootCertStore,
 | |
|         _presented_certs: &[rustls::Certificate],
 | |
|         _dns_name: DNSNameRef,
 | |
|         _ocsp_response: &[u8]
 | |
|     ) -> Result<ServerCertVerified, TLSError> {
 | |
|         Ok(ServerCertVerified::assertion())
 | |
|     }
 | |
| }
 |