SSL Add-on framework for BlueSocket in Swift using the Swift Package Manager. Works on macOS and Linux.
- SSLService: Adds SSL support to BlueSocket. Pure Swift.
- Swift Open Source
swift-DEVELOPMENT-SNAPSHOT-2016-08-04-a
toolchain (Minimum REQUIRED for latest release)
- macOS 10.11.6 (El Capitan) or higher
- Xcode Version 8.0 beta 4 (8S188o) or higher using the above toolchain (Recommended)
- OpenSSL: openssl-1.0.2g or higher. Available via
brew install openssl
.
- Ubuntu 15.10 (or 14.04 but only tested on 15.10)
- The Swift Open Source toolchain listed above
- OpenSSL is provided by the distribution
- BlueSocket v0.7.0 or higher
- OpenSSL-OSX v0.2.4 or higher for macOS
- OpenSSL v0.2.0 or higher for Linux
Note: See Package.swift
for details.
To build SSLService
from the command line on macOS (assuming OpenSSL installed using brew
):
% cd <path-to-clone>
% swift build -Xcc -I/usr/local/opt/openssl/include
To build SSLService
from the command line on Linux:
% cd <path-to-clone>
% swift build
The first you need to do is import both the Socket
and SSLService
frameworks. This is done by the following:
import Socket
import SSLService
Both clients and server require at a minimum the following configuration items:
- CA Certficate (either
caCertificateFile
orcaCertificateDirPath
) - Application certificate (
certificateFilePath
) - Private Key file (
keyFilePath
)
or
- Certificate Chain File (
chainFilePath
)
or, if using self-signed
certificates:
- Application certificate (
certificateFilePath
) - Private Key file (
keyFilePath
)
BlueSSLService provides three ways to create a Configuration
. These are:
init(withCACertificatePath caCertificateFilePath: String?, usingCertificateFile certificateFilePath: String?, withKeyFile keyFilePath: String? = nil, usingSelfSignedCerts selfSigned: Bool = true)
- This API allows you to create a configuration using a self containedCertificate Authority (CA)
file. The second parameter is the path to theCertificate
file to be used by application to establish the connection. The next parameter is the path to thePrivate Key
file used by application corresponding to thePublic Key
in theCertificate
. If you're usingself-signed certificates
, set the last parameter to true.init(withCACertificateDirectory caCertificateDirPath: String?, usingCertificateFile certificateFilePath: String?, withKeyFile keyFilePath: String? = nil, usingSelfSignedCerts selfSigned: Bool = true)
- This API allows you to create a configuration using a directory ofCertificate Authority (CA)
files. TheseCA
certificates must be hashed using theCertificate Tool
provided byOpenSSL
. The following parameters are identical to the previous API.init(withChainFilePath chainFilePath: String? = nil, usingSelfSignedCerts selfSigned: Bool = true)
- This API allow you to create a configuration using singleCertificate Chain File
(see note 2 below). Set the last parameter to true if the certificates areself-signed
, otherwise set it to false.
Note 1: All Certificate
and Private Key
files must be PEM
format.
Note 2: If using a certificate chain file, the certificates must be in PEM
format and must be sorted starting with the subject's certificate (actual client or server certificate), followed by intermediate CA
certificates if applicable, and ending at the highest level (root) CA
.
Note 3: For the first two versions of the API, if your Private key
is included in your certificate file, you can omit this parameter and the API will use the same file name as specified for the certificate file.
Note 4: If you desire to customize the cipher suite used, you can do so by setting the cipherSuite
member after creating the configuration. The default value if not changed is set to ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL
. See the example below.
The following illustrates creating a configuration using the second form of the API above using a self-signed certificate file as the key file and not supplying a certificate chain file. It also illustrates setting the cipher suite to ALL
from the default:
import SSLService
...
let myCertPath = "/opt/myApp/config/myCertificate.pem"
let myKeyPath = "/opt/myApp/config/myKeyFile.pem"
let myConfig = SSLService.Configuration(withCACertificateDirectory: nil, usingCertificateFile: myCertPath, withKeyFile: myKeyFile)
myConfig.cipherSuite = "ALL"
...
Note: This example takes advantage of the default
parameters available on the SSLService.Configuration.init
function.
The following API is used to create the SSLService
:
init?(usingConfiguration config: Configuration) throws
- This will create an instance of theSSLService
using a previously createdConfiguration
.
Once the SSLService
is created, it can applied to a previously created Socket
instance that's just been created. This needs to be done before using the Socket
. The following code snippet illustrates how to do this. Note: Exception handling omitted for brevity.
import Socket
import SSLService
...
// Create the configuration...
let myCertPath = "/opt/myApp/config/myCertificate.pem"
let myKeyPath = "/opt/myApp/config/myKeyFile.pem"
let myConfig = SSLService.Configuration(withCACertificateDirectory: nil, usingCertificateFile: myCertPath, withKeyFile: myKeyFile)
// Create the socket...
var socket = try Socket.create()
guard let socket = socket else {
fatalError("Could not create socket.")
}
// Create and attach the SSLService to the socket...
// - Note: if you're going to be using the same
// configuration over and over, it'd be
// better to create it in the beginning
// as `let` constant.
socket.delegate = try SSLService(usingConfiguration: myConfig)
// Start listening...
try socket.listen(on: 1337)
The example above creates a SSL server
socket. Replacing the socket.listen
function with a socket.connect
would result in an SSL client
being created as illustrated below:
// Connect to the server...
try socket.connect(to: "someplace.org", port: 1337)
SSLService
handles all the negotiation and setup for the secure transfer of data. The determining factor for whether or not a Socket
is setup as a server or client Socket
is API which is used to initiate a connection. listen()
will cause the Socket
to be setup as a server socket. Calling connect()
results a client setup.