1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
use std::fs::File;
use std::io;
use std::io::Read;
use std::path::Path;
use openssl::pkcs12::*;
use openssl::ssl::{SslAcceptor, SslMethod, SslOptions};
pub use openssl::pkcs12::ParsedPkcs12;
pub use tokio_openssl::SslAcceptorExt;
pub fn read_cert(path: &Path, password: Option<&str>) -> Result<ParsedPkcs12, String> {
let mut file = File::open(&path)
.map_err(|e| format!("error opening pkcs12 cert file: {:?}: {}", path, e))?;
let mut key_bytes = vec![];
file.read_to_end(&mut key_bytes)
.map_err(|e| format!("could not read pkcs12 key from: {:?}: {}", path, e))?;
let pkcs12 = Pkcs12::from_der(&key_bytes)
.map_err(|e| format!("badly formated pkcs12 key from: {:?}: {}", path, e))?;
pkcs12
.parse(password.unwrap_or(""))
.map_err(|e| format!("failed to open pkcs12 from: {:?}: {}", path, e))
}
pub fn new_acceptor(pkcs12: &ParsedPkcs12) -> io::Result<SslAcceptor> {
let mut builder = SslAcceptor::mozilla_modern(SslMethod::tls())?;
builder.set_private_key(&pkcs12.pkey)?;
builder.set_certificate(&pkcs12.cert)?;
if let Some(ref chain) = pkcs12.chain {
for cert in chain {
builder.add_extra_chain_cert(cert.to_owned())?;
}
}
{
let ssl_context_bldr = &mut builder;
ssl_context_bldr.set_options(
SslOptions::NO_SSLV2 | SslOptions::NO_SSLV3 | SslOptions::NO_TLSV1
| SslOptions::NO_TLSV1_1,
);
}
Ok(builder.build())
}