mirror of
https://github.com/codex-storage/nim-websock.git
synced 2025-01-23 08:59:28 +00:00
6b76bd8261
* Update http to use chronos http. * Implement TLS in websocket. * Add webscoket TLS test. * Minor nit. * Add TLS test file. * Update http to use chronos http. (#6) * Update http to use chronos http. * Add stream.nim file. * Address comments. * Fix CI failure. * Minor change. * Address comments. * Fix windows CI failing test. * minor cleanup * spacess * more idiomatic connect * use stew/base10 Co-authored-by: Dmitriy Ryajov <dryajov@gmail.com> * Implement TLS in websocket. * Minor nit. * merge master * wip * Update http to use chronos http. (#6) * Update http to use chronos http. * Add stream.nim file. * Address comments. * Fix CI failure. * Minor change. * Address comments. * Fix windows CI failing test. * minor cleanup * spacess * more idiomatic connect * use stew/base10 Co-authored-by: Dmitriy Ryajov <dryajov@gmail.com> * Update http to use chronos http. * Implement TLS in websocket. * Minor nit. * Update http to use chronos http. (#6) * Update http to use chronos http. * Add stream.nim file. * Address comments. * Fix CI failure. * Minor change. * Address comments. * Fix windows CI failing test. * minor cleanup * spacess * more idiomatic connect * use stew/base10 Co-authored-by: Dmitriy Ryajov <dryajov@gmail.com> * Implement TLS in websocket. * Minor nit. * add testing keys * wip * fix test * wip * remove eth dep and add skipdirs * fix package structure * fix deps * check nim version * Fix CI failure. * Don't call `ws.stream.closeWait()` * always close both ends to complete the sequence * misc * don't fail on close * Fix windows CI. * fix linux x86 builds * use consistent connect pattern * move keys to better place * return dumbResponse * small cleanup Co-authored-by: Dmitriy Ryajov <dryajov@gmail.com>
41 lines
1.3 KiB
Nim
41 lines
1.3 KiB
Nim
import bearssl
|
|
export bearssl
|
|
|
|
## Random helpers: similar as in stdlib, but with BrHmacDrbgContext rng
|
|
const randMax = 18_446_744_073_709_551_615'u64
|
|
|
|
proc newRng*(): ref BrHmacDrbgContext =
|
|
# You should only create one instance of the RNG per application / library
|
|
# Ref is used so that it can be shared between components
|
|
# TODO consider moving to bearssl
|
|
var seeder = brPrngSeederSystem(nil)
|
|
if seeder == nil:
|
|
return nil
|
|
|
|
var rng = (ref BrHmacDrbgContext)()
|
|
brHmacDrbgInit(addr rng[], addr sha256Vtable, nil, 0)
|
|
if seeder(addr rng.vtable) == 0:
|
|
return nil
|
|
rng
|
|
|
|
proc rand*(rng: var BrHmacDrbgContext, max: Natural): int =
|
|
if max == 0: return 0
|
|
var x: uint64
|
|
while true:
|
|
brHmacDrbgGenerate(addr rng, addr x, csize_t(sizeof(x)))
|
|
if x < randMax - (randMax mod (uint64(max) + 1'u64)): # against modulo bias
|
|
return int(x mod (uint64(max) + 1'u64))
|
|
|
|
proc genMaskKey*(rng: ref BrHmacDrbgContext): array[4, char] =
|
|
## Generates a random key of 4 random chars.
|
|
proc r(): char = char(rand(rng[], 255))
|
|
return [r(), r(), r(), r()]
|
|
|
|
proc genWebSecKey*(rng: ref BrHmacDrbgContext): seq[byte] =
|
|
var key = newSeq[byte](16)
|
|
proc r(): byte = byte(rand(rng[], 255))
|
|
## Generates a random key of 16 random chars.
|
|
for i in 0..15:
|
|
key.add(r())
|
|
return key
|