OpenSSL::SSL::SSLSocket
class OpenSSL::SSL::SSLSocket
Parent:ObjectIncluded modules:OpenSSL::Buffering, OpenSSL::SSL::SocketForwarder
Attributes
contextR
The SSLContext object used in this connection.
ioR
The underlying IO object.
sync_closeRW
Whether to close the underlying socket as well, when the SSL/TLS connection is shut down. This defaults to false
.
to_ioR
The underlying IO object.
Public Class Methods
new(io) → aSSLSocket Show source
new(io, ctx) → aSSLSocket
Creates a new SSL socket from io
which must be a real IO object (not an IO-like object that responds to read/write).
If ctx
is provided the SSL Sockets initial params will be taken from the context.
The OpenSSL::Buffering module provides additional IO methods.
This method will freeze the SSLContext if one is provided; however, session management is still allowed in the frozen SSLContext.
static VALUE
ossl_ssl_initialize(int argc, VALUE *argv, VALUE self)
{
VALUE io, v_ctx, verify_cb;
SSL *ssl;
SSL_CTX *ctx;
TypedData_Get_Struct(self, SSL, &ossl_ssl_type, ssl
if (ssl)
ossl_raise(eSSLError, "SSL already initialized"
if (rb_scan_args(argc, argv, "11", &io, &v_ctx) == 1)
v_ctx = rb_funcall(cSSLContext, rb_intern("new"), 0
GetSSLCTX(v_ctx, ctx
rb_ivar_set(self, id_i_context, v_ctx
ossl_sslctx_setup(v_ctx
if (rb_respond_to(io, rb_intern("nonblock=")))
rb_funcall(io, rb_intern("nonblock="), 1, Qtrue
rb_ivar_set(self, id_i_io, io
ssl = SSL_new(ctx
if (!ssl)
ossl_raise(eSSLError, NULL
RTYPEDDATA_DATA(self) = ssl;
SSL_set_ex_data(ssl, ossl_ssl_ex_ptr_idx, (void *)self
SSL_set_info_callback(ssl, ssl_info_cb
verify_cb = rb_attr_get(v_ctx, id_i_verify_callback
SSL_set_ex_data(ssl, ossl_ssl_ex_vcb_idx, (void *)verify_cb
rb_call_super(0, NULL
return self;
}
Public Instance Methods
accept → self Show source
Waits for a SSL/TLS client to initiate a handshake. The handshake may be started after unencrypted data has been sent over the socket.
static VALUE
ossl_ssl_accept(VALUE self)
{
ossl_ssl_setup(self
return ossl_start_ssl(self, SSL_accept, "SSL_accept", Qfalse
}
accept_nonblock(options) → self Show source
Initiates the SSL/TLS handshake as a server in non-blocking manner.
# emulates blocking accept
begin
ssl.accept_nonblock
rescue IO::WaitReadable
IO.select([s2])
retry
rescue IO::WaitWritable
IO.select(nil, [s2])
retry
end
By specifying a keyword argument exception
to false
, you can indicate that #accept_nonblock should not raise an IO::WaitReadable or IO::WaitWritable exception
, but return the symbol :wait_readable
or :wait_writable
instead.
static VALUE
ossl_ssl_accept_nonblock(int argc, VALUE *argv, VALUE self)
{
VALUE opts;
rb_scan_args(argc, argv, "0:", &opts
ossl_ssl_setup(self
return ossl_start_ssl(self, SSL_accept, "SSL_accept", opts
}
alpn_protocol → String | nil Show source
Returns the ALPN protocol string that was finally selected by the server during the handshake.
static VALUE
ossl_ssl_alpn_protocol(VALUE self)
{
SSL *ssl;
const unsigned char *out;
unsigned int outlen;
GetSSL(self, ssl
SSL_get0_alpn_selected(ssl, &out, &outlen
if (!outlen)
return Qnil;
else
return rb_str_new((const char *) out, outlen
}
cert → cert or nil Show source
The X509 certificate for this socket endpoint.
static VALUE
ossl_ssl_get_cert(VALUE self)
{
SSL *ssl;
X509 *cert = NULL;
GetSSL(self, ssl
/*
* Is this OpenSSL bug? Should add a ref?
* TODO: Ask for.
*/
cert = SSL_get_certificate(ssl /* NO DUPs => DON'T FREE. */
if (!cert) {
return Qnil;
}
return ossl_x509_new(cert
}
cipher → name, version, bits, alg_bits()
The cipher being used for the current connection
static VALUE
ossl_ssl_get_cipher(VALUE self)
{
SSL *ssl;
SSL_CIPHER *cipher;
GetSSL(self, ssl
cipher = (SSL_CIPHER *)SSL_get_current_cipher(ssl
return ossl_ssl_cipher_to_ary(cipher
}
client_ca → x509name, ...()
Returns the list of client CAs. Please note that in contrast to OpenSSL::SSL::SSLContext#client_ca no array of X509::Certificate is returned but X509::Name instances of the CA's subject distinguished name.
In server mode, returns the list set by OpenSSL::SSL::SSLContext#client_ca. In client mode, returns the list of client CAs sent from the server.
static VALUE
ossl_ssl_get_client_ca_list(VALUE self)
{
SSL *ssl;
STACK_OF(X509_NAME) *ca;
GetSSL(self, ssl
ca = SSL_get_client_CA_list(ssl
return ossl_x509name_sk2ary(ca
}
connect → self Show source
Initiates an SSL/TLS handshake with a server. The handshake may be started after unencrypted data has been sent over the socket.
static VALUE
ossl_ssl_connect(VALUE self)
{
ossl_ssl_setup(self
return ossl_start_ssl(self, SSL_connect, "SSL_connect", Qfalse
}
connect_nonblock(options) → self Show source
Initiates the SSL/TLS handshake as a client in non-blocking manner.
# emulates blocking connect
begin
ssl.connect_nonblock
rescue IO::WaitReadable
IO.select([s2])
retry
rescue IO::WaitWritable
IO.select(nil, [s2])
retry
end
By specifying a keyword argument exception
to false
, you can indicate that #connect_nonblock should not raise an IO::WaitReadable or IO::WaitWritable exception
, but return the symbol :wait_readable
or :wait_writable
instead.
static VALUE
ossl_ssl_connect_nonblock(int argc, VALUE *argv, VALUE self)
{
VALUE opts;
rb_scan_args(argc, argv, "0:", &opts
ossl_ssl_setup(self
return ossl_start_ssl(self, SSL_connect, "SSL_connect", opts
}
hostname = hostname → hostname Show source
Sets the server hostname used for SNI. This needs to be set before #connect.
static VALUE
ossl_ssl_set_hostname(VALUE self, VALUE arg)
{
SSL *ssl;
char *hostname = NULL;
GetSSL(self, ssl
if (!NIL_P(arg))
hostname = StringValueCStr(arg
if (!SSL_set_tlsext_host_name(ssl, hostname))
ossl_raise(eSSLError, NULL
/* for SSLSocket#hostname */
rb_ivar_set(self, id_i_hostname, arg
return arg;
}
npn_protocol → String | nil Show source
Returns the protocol string that was finally selected by the client during the handshake.
static VALUE
ossl_ssl_npn_protocol(VALUE self)
{
SSL *ssl;
const unsigned char *out;
unsigned int outlen;
GetSSL(self, ssl
SSL_get0_next_proto_negotiated(ssl, &out, &outlen
if (!outlen)
return Qnil;
else
return rb_str_new((const char *) out, outlen
}
peer_cert → cert or nil Show source
The X509 certificate for this socket's peer.
static VALUE
ossl_ssl_get_peer_cert(VALUE self)
{
SSL *ssl;
X509 *cert = NULL;
VALUE obj;
GetSSL(self, ssl
cert = SSL_get_peer_certificate(ssl /* Adds a ref => Safe to FREE. */
if (!cert) {
return Qnil;
}
obj = ossl_x509_new(cert
X509_free(cert
return obj;
}
peer_cert_chain → cert, ... or nil Show source
The X509 certificate chain for this socket's peer.
static VALUE
ossl_ssl_get_peer_cert_chain(VALUE self)
{
SSL *ssl;
STACK_OF(X509) *chain;
X509 *cert;
VALUE ary;
int i, num;
GetSSL(self, ssl
chain = SSL_get_peer_cert_chain(ssl
if(!chain) return Qnil;
num = sk_X509_num(chain
ary = rb_ary_new2(num
for (i = 0; i < num; i++){
cert = sk_X509_value(chain, i
rb_ary_push(ary, ossl_x509_new(cert)
}
return ary;
}
pending → Integer Show source
The number of bytes that are immediately available for reading.
static VALUE
ossl_ssl_pending(VALUE self)
{
SSL *ssl;
GetSSL(self, ssl
return INT2NUM(SSL_pending(ssl)
}
post_connection_check(hostname) → true Show source
Perform hostname verification following RFC 6125.
This method MUST be called after calling connect to ensure that the hostname of a remote peer has been verified.
# File ext/openssl/lib/openssl/ssl.rb, line 279
def post_connection_check(hostname)
if peer_cert.nil?
msg = "Peer verification enabled, but no certificate received."
if using_anon_cipher?
msg += " Anonymous cipher suite #{cipher[0]} was negotiated. " "Anonymous suites must be disabled to use peer verification."
end
raise SSLError, msg
end
unless OpenSSL::SSL.verify_certificate_identity(peer_cert, hostname)
raise SSLError, "hostname \"#{hostname}\" does not match the server certificate"
end
return true
end
session → aSession Show source
Returns the SSLSession object currently used, or nil if the session is not established.
# File ext/openssl/lib/openssl/ssl.rb, line 300
def session
SSL::Session.new(self)
rescue SSL::Session::SessionError
nil
end
session = session → session Show source
Sets the Session to be used when the connection is established.
static VALUE
ossl_ssl_set_session(VALUE self, VALUE arg1)
{
SSL *ssl;
SSL_SESSION *sess;
GetSSL(self, ssl
SafeGetSSLSession(arg1, sess
if (SSL_set_session(ssl, sess) != 1)
ossl_raise(eSSLError, "SSL_set_session"
return arg1;
}
session_reused? → true | false Show source
Returns true if a reused session was negotiated during the handshake.
static VALUE
ossl_ssl_session_reused(VALUE self)
{
SSL *ssl;
GetSSL(self, ssl
return SSL_session_reused(ssl) ? Qtrue : Qfalse;
}
ssl_version → String Show source
Returns a String representing the SSL/TLS version that was negotiated for the connection, for example “TLSv1.2”.
static VALUE
ossl_ssl_get_version(VALUE self)
{
SSL *ssl;
GetSSL(self, ssl
return rb_str_new2(SSL_get_version(ssl)
}
state → string Show source
A description of the current connection state. This is for diagnostic purposes only.
static VALUE
ossl_ssl_get_state(VALUE self)
{
SSL *ssl;
VALUE ret;
GetSSL(self, ssl
ret = rb_str_new2(SSL_state_string(ssl)
if (ruby_verbose) {
rb_str_cat2(ret, ": "
rb_str_cat2(ret, SSL_state_string_long(ssl)
}
return ret;
}
sysclose → nil Show source
Sends “close notify” to the peer and tries to shut down the SSL connection gracefully.
If #sync_close is set to true
, the underlying IO is also closed.
# File ext/openssl/lib/openssl/ssl.rb, line 266
def sysclose
return if closed?
stop
io.close if sync_close
end
sysread(length) → string Show source
sysread(length, buffer) → buffer
Reads length
bytes from the SSL connection. If a pre-allocated buffer
is provided the data will be written into it.
static VALUE
ossl_ssl_read(int argc, VALUE *argv, VALUE self)
{
return ossl_ssl_read_internal(argc, argv, self, 0
}
syswrite(string) → Integer Show source
Writes string
to the SSL connection.
static VALUE
ossl_ssl_write(VALUE self, VALUE str)
{
return ossl_ssl_write_internal(self, str, Qfalse
}
tmp_key → PKey or nil Show source
Returns the ephemeral key used in case of forward secrecy cipher.
static VALUE
ossl_ssl_tmp_key(VALUE self)
{
SSL *ssl;
EVP_PKEY *key;
GetSSL(self, ssl
if (!SSL_get_server_tmp_key(ssl, &key))
return Qnil;
return ossl_pkey_new(key
}
verify_result → Integer Show source
Returns the result of the peer certificates verification. See verify(1) for error values and descriptions.
If no peer certificate was presented X509_V_OK is returned.
static VALUE
ossl_ssl_get_verify_result(VALUE self)
{
SSL *ssl;
GetSSL(self, ssl
return INT2NUM(SSL_get_verify_result(ssl)
}
Private Instance Methods
client_cert_cb() Show source
# File ext/openssl/lib/openssl/ssl.rb, line 314
def client_cert_cb
@context.client_cert_cb
end
session_get_cb() Show source
# File ext/openssl/lib/openssl/ssl.rb, line 330
def session_get_cb
@context.session_get_cb
end
session_new_cb() Show source
# File ext/openssl/lib/openssl/ssl.rb, line 326
def session_new_cb
@context.session_new_cb
end
stop → nil Show source
Sends “close notify” to the peer and tries to shut down the SSL connection gracefully.
static VALUE
ossl_ssl_stop(VALUE self)
{
SSL *ssl;
int ret;
GetSSL(self, ssl
if (!ssl_started(ssl))
return Qnil;
ret = SSL_shutdown(ssl
if (ret == 1) /* Have already received close_notify */
return Qnil;
if (ret == 0) /* Sent close_notify, but we don't wait for reply */
return Qnil;
/*
* XXX: Something happened. Possibly it failed because the underlying socket
* is not writable/readable, since it is in non-blocking mode. We should do
* some proper error handling using SSL_get_error() and maybe retry, but we
* can't block here. Give up for now.
*/
ossl_clear_error(
return Qnil;
}
sysread_nonblock(length) → string Show source
sysread_nonblock(length, buffer) → buffer
sysread_nonblock(length[, buffer , opts) → buffer
A non-blocking version of sysread. Raises an SSLError if reading would block. If “exception: false” is passed, this method returns a symbol of :wait_readable, :wait_writable, or nil, rather than raising an exception.
Reads length
bytes from the SSL connection. If a pre-allocated buffer
is provided the data will be written into it.
static VALUE
ossl_ssl_read_nonblock(int argc, VALUE *argv, VALUE self)
{
return ossl_ssl_read_internal(argc, argv, self, 1
}
syswrite_nonblock(string) → Integer Show source
Writes string
to the SSL connection in a non-blocking manner. Raises an SSLError if writing would block.
static VALUE
ossl_ssl_write_nonblock(int argc, VALUE *argv, VALUE self)
{
VALUE str, opts;
rb_scan_args(argc, argv, "1:", &str, &opts
return ossl_ssl_write_internal(self, str, opts
}
tmp_dh_callback() Show source
# File ext/openssl/lib/openssl/ssl.rb, line 318
def tmp_dh_callback
@context.tmp_dh_callback || OpenSSL::PKey::DEFAULT_TMP_DH_CALLBACK
end
tmp_ecdh_callback() Show source
# File ext/openssl/lib/openssl/ssl.rb, line 322
def tmp_ecdh_callback
@context.tmp_ecdh_callback
end
using_anon_cipher?() Show source
# File ext/openssl/lib/openssl/ssl.rb, line 308
def using_anon_cipher?
ctx = OpenSSL::SSL::SSLContext.new
ctx.ciphers = "aNULL"
ctx.ciphers.include?(cipher)
end
Ruby Core © 1993–2017 Yukihiro Matsumoto
Licensed under the Ruby License.
Ruby Standard Library © contributors
Licensed under their own licenses.