2012-09-26 21:00:13 -05:00
|
|
|
% Rust Foreign Function Interface Tutorial
|
|
|
|
|
|
|
|
# Introduction
|
2012-09-05 13:20:04 -05:00
|
|
|
|
2012-10-09 18:46:16 -05:00
|
|
|
Because Rust is a systems programming language, one of its goals is to
|
2012-09-05 13:20:04 -05:00
|
|
|
interoperate well with C code.
|
|
|
|
|
2012-10-09 18:46:16 -05:00
|
|
|
We'll start with an example, which is a bit bigger than usual. We'll
|
|
|
|
go over it one piece at a time. This is a program that uses OpenSSL's
|
|
|
|
`SHA1` function to compute the hash of its first command-line
|
|
|
|
argument, which it then converts to a hexadecimal string and prints to
|
|
|
|
standard output. If you have the OpenSSL libraries installed, it
|
|
|
|
should compile and run without any extra effort.
|
2012-09-05 13:20:04 -05:00
|
|
|
|
|
|
|
~~~~ {.xfail-test}
|
2012-09-05 14:39:16 -05:00
|
|
|
extern mod std;
|
|
|
|
use libc::c_uint;
|
2012-09-05 13:20:04 -05:00
|
|
|
|
|
|
|
extern mod crypto {
|
|
|
|
fn SHA1(src: *u8, sz: c_uint, out: *u8) -> *u8;
|
|
|
|
}
|
|
|
|
|
|
|
|
fn as_hex(data: ~[u8]) -> ~str {
|
|
|
|
let mut acc = ~"";
|
2012-12-23 01:58:27 -06:00
|
|
|
for data.each |&byte| { acc += fmt!("%02x", byte as uint); }
|
2012-09-05 13:20:04 -05:00
|
|
|
return acc;
|
|
|
|
}
|
|
|
|
|
|
|
|
fn sha1(data: ~str) -> ~str unsafe {
|
|
|
|
let bytes = str::to_bytes(data);
|
2012-09-15 20:06:20 -05:00
|
|
|
let hash = crypto::SHA1(vec::raw::to_ptr(bytes),
|
2012-09-05 13:20:04 -05:00
|
|
|
vec::len(bytes) as c_uint, ptr::null());
|
2012-10-11 21:44:48 -05:00
|
|
|
return as_hex(vec::from_buf(hash, 20));
|
2012-09-05 13:20:04 -05:00
|
|
|
}
|
|
|
|
|
2012-12-23 01:58:27 -06:00
|
|
|
fn main() {
|
|
|
|
io::println(sha1(core::os::args()[1]));
|
2012-09-05 13:20:04 -05:00
|
|
|
}
|
|
|
|
~~~~
|
|
|
|
|
2012-09-26 21:00:13 -05:00
|
|
|
# Foreign modules
|
2012-09-05 13:20:04 -05:00
|
|
|
|
2012-10-09 18:46:16 -05:00
|
|
|
Before we can call the `SHA1` function defined in the OpenSSL library, we have
|
|
|
|
to declare it. That is what this part of the program does:
|
2012-09-05 13:20:04 -05:00
|
|
|
|
|
|
|
~~~~ {.xfail-test}
|
|
|
|
extern mod crypto {
|
2012-10-09 18:46:16 -05:00
|
|
|
fn SHA1(src: *u8, sz: uint, out: *u8) -> *u8; }
|
2012-09-05 13:20:04 -05:00
|
|
|
~~~~
|
|
|
|
|
2012-10-09 18:46:16 -05:00
|
|
|
An `extern` module declaration containing function signatures introduces the
|
|
|
|
functions listed as _foreign functions_. Foreign functions differ from regular
|
|
|
|
Rust functions in that they are implemented in some other language (usually C)
|
|
|
|
and called through Rust's foreign function interface (FFI). An extern module
|
|
|
|
like this is called a foreign module, and implicitly tells the compiler to
|
|
|
|
link with a library that contains the listed foreign functions, and has the
|
|
|
|
same name as the module.
|
2012-09-05 13:20:04 -05:00
|
|
|
|
2012-10-09 18:46:16 -05:00
|
|
|
In this case, the Rust compiler changes the name `crypto` to a shared library
|
|
|
|
name in a platform-specific way (`libcrypto.so` on Linux, for example),
|
|
|
|
searches for the shared library with that name, and links the library into the
|
|
|
|
program. If you want the module to have a different name from the actual
|
|
|
|
library, you can use the `"link_name"` attribute, like:
|
2012-09-05 13:20:04 -05:00
|
|
|
|
|
|
|
~~~~ {.xfail-test}
|
|
|
|
#[link_name = "crypto"]
|
|
|
|
extern mod something {
|
|
|
|
fn SHA1(src: *u8, sz: uint, out: *u8) -> *u8;
|
|
|
|
}
|
|
|
|
~~~~
|
|
|
|
|
2012-09-26 21:00:13 -05:00
|
|
|
# Foreign calling conventions
|
2012-09-05 13:20:04 -05:00
|
|
|
|
2012-10-09 18:46:16 -05:00
|
|
|
Most foreign code is C code, which usually uses the `cdecl` calling
|
2012-09-05 13:20:04 -05:00
|
|
|
convention, so that is what Rust uses by default when calling foreign
|
|
|
|
functions. Some foreign functions, most notably the Windows API, use other
|
2012-10-09 18:46:16 -05:00
|
|
|
calling conventions. Rust provides the `"abi"` attribute as a way to hint to
|
|
|
|
the compiler which calling convention to use:
|
2012-09-05 13:20:04 -05:00
|
|
|
|
|
|
|
~~~~
|
|
|
|
#[cfg(target_os = "win32")]
|
|
|
|
#[abi = "stdcall"]
|
|
|
|
extern mod kernel32 {
|
|
|
|
fn SetEnvironmentVariableA(n: *u8, v: *u8) -> int;
|
|
|
|
}
|
|
|
|
~~~~
|
|
|
|
|
2012-10-09 18:46:16 -05:00
|
|
|
The `"abi"` attribute applies to a foreign module (it cannot be applied
|
2012-09-05 13:20:04 -05:00
|
|
|
to a single function within a module), and must be either `"cdecl"`
|
2012-10-09 18:46:16 -05:00
|
|
|
or `"stdcall"`. We may extend the compiler in the future to support other
|
|
|
|
calling conventions.
|
2012-09-05 13:20:04 -05:00
|
|
|
|
2012-09-26 21:00:13 -05:00
|
|
|
# Unsafe pointers
|
2012-09-05 13:20:04 -05:00
|
|
|
|
2012-10-09 18:46:16 -05:00
|
|
|
The foreign `SHA1` function takes three arguments, and returns a pointer.
|
2012-09-05 13:20:04 -05:00
|
|
|
|
|
|
|
~~~~ {.xfail-test}
|
|
|
|
# extern mod crypto {
|
|
|
|
fn SHA1(src: *u8, sz: libc::c_uint, out: *u8) -> *u8;
|
|
|
|
# }
|
|
|
|
~~~~
|
|
|
|
|
|
|
|
When declaring the argument types to a foreign function, the Rust
|
|
|
|
compiler has no way to check whether your declaration is correct, so
|
|
|
|
you have to be careful. If you get the number or types of the
|
2012-10-09 18:46:16 -05:00
|
|
|
arguments wrong, you're likely to cause a segmentation fault. Or,
|
2012-09-05 13:20:04 -05:00
|
|
|
probably even worse, your code will work on one platform, but break on
|
|
|
|
another.
|
|
|
|
|
2012-10-09 18:46:16 -05:00
|
|
|
In this case, we declare that `SHA1` takes two `unsigned char*`
|
|
|
|
arguments and one `unsigned long`. The Rust equivalents are `*u8`
|
2012-09-05 13:20:04 -05:00
|
|
|
unsafe pointers and an `uint` (which, like `unsigned long`, is a
|
|
|
|
machine-word-sized type).
|
|
|
|
|
2012-10-09 18:46:16 -05:00
|
|
|
The standard library provides various functions to create unsafe pointers,
|
|
|
|
such as those in `core::cast`. Most of these functions have `unsafe` in their
|
|
|
|
name. You can dereference an unsafe pointer with the `*` operator, but use
|
|
|
|
caution: unlike Rust's other pointer types, unsafe pointers are completely
|
|
|
|
unmanaged, so they might point at invalid memory, or be null pointers.
|
2012-09-05 13:20:04 -05:00
|
|
|
|
2012-09-26 21:00:13 -05:00
|
|
|
# Unsafe blocks
|
2012-09-05 13:20:04 -05:00
|
|
|
|
|
|
|
The `sha1` function is the most obscure part of the program.
|
|
|
|
|
|
|
|
~~~~
|
2012-09-21 20:10:45 -05:00
|
|
|
# pub mod crypto {
|
|
|
|
# pub fn SHA1(src: *u8, sz: uint, out: *u8) -> *u8 { out }
|
|
|
|
# }
|
2012-09-05 13:20:04 -05:00
|
|
|
# fn as_hex(data: ~[u8]) -> ~str { ~"hi" }
|
|
|
|
fn sha1(data: ~str) -> ~str {
|
|
|
|
unsafe {
|
|
|
|
let bytes = str::to_bytes(data);
|
2012-09-15 20:06:20 -05:00
|
|
|
let hash = crypto::SHA1(vec::raw::to_ptr(bytes),
|
2012-09-05 13:20:04 -05:00
|
|
|
vec::len(bytes), ptr::null());
|
2012-10-11 21:44:48 -05:00
|
|
|
return as_hex(vec::from_buf(hash, 20));
|
2012-09-05 13:20:04 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
~~~~
|
|
|
|
|
2012-10-09 18:46:16 -05:00
|
|
|
First, what does the `unsafe` keyword at the top of the function
|
2012-09-05 13:20:04 -05:00
|
|
|
mean? `unsafe` is a block modifier—it declares the block following it
|
|
|
|
to be known to be unsafe.
|
|
|
|
|
|
|
|
Some operations, like dereferencing unsafe pointers or calling
|
|
|
|
functions that have been marked unsafe, are only allowed inside unsafe
|
|
|
|
blocks. With the `unsafe` keyword, you're telling the compiler 'I know
|
|
|
|
what I'm doing'. The main motivation for such an annotation is that
|
|
|
|
when you have a memory error (and you will, if you're using unsafe
|
|
|
|
constructs), you have some idea where to look—it will most likely be
|
|
|
|
caused by some unsafe code.
|
|
|
|
|
|
|
|
Unsafe blocks isolate unsafety. Unsafe functions, on the other hand,
|
|
|
|
advertise it to the world. An unsafe function is written like this:
|
|
|
|
|
|
|
|
~~~~
|
|
|
|
unsafe fn kaboom() { ~"I'm harmless!"; }
|
|
|
|
~~~~
|
|
|
|
|
2012-10-09 18:46:16 -05:00
|
|
|
This function can only be called from an `unsafe` block or another
|
|
|
|
`unsafe` function.
|
2012-09-05 13:20:04 -05:00
|
|
|
|
2012-09-26 21:00:13 -05:00
|
|
|
# Pointer fiddling
|
2012-09-05 13:20:04 -05:00
|
|
|
|
|
|
|
The standard library defines a number of helper functions for dealing
|
|
|
|
with unsafe data, casting between types, and generally subverting
|
|
|
|
Rust's safety mechanisms.
|
|
|
|
|
|
|
|
Let's look at our `sha1` function again.
|
|
|
|
|
|
|
|
~~~~
|
2012-09-21 20:10:45 -05:00
|
|
|
# pub mod crypto {
|
|
|
|
# pub fn SHA1(src: *u8, sz: uint, out: *u8) -> *u8 { out }
|
|
|
|
# }
|
2012-09-05 13:20:04 -05:00
|
|
|
# fn as_hex(data: ~[u8]) -> ~str { ~"hi" }
|
|
|
|
# fn x(data: ~str) -> ~str {
|
|
|
|
# unsafe {
|
|
|
|
let bytes = str::to_bytes(data);
|
2012-09-15 20:06:20 -05:00
|
|
|
let hash = crypto::SHA1(vec::raw::to_ptr(bytes),
|
2012-09-05 13:20:04 -05:00
|
|
|
vec::len(bytes), ptr::null());
|
2012-10-11 21:44:48 -05:00
|
|
|
return as_hex(vec::from_buf(hash, 20));
|
2012-09-05 13:20:04 -05:00
|
|
|
# }
|
|
|
|
# }
|
|
|
|
~~~~
|
|
|
|
|
2012-10-09 18:46:16 -05:00
|
|
|
The `str::to_bytes` function is perfectly safe: it converts a string to a
|
|
|
|
`~[u8]`. The program then feeds this byte array to `vec::raw::to_ptr`, which
|
2012-09-05 13:20:04 -05:00
|
|
|
returns an unsafe pointer to its contents.
|
|
|
|
|
2012-10-09 18:46:16 -05:00
|
|
|
This pointer will become invalid at the end of the scope in which the vector
|
|
|
|
it points to (`bytes`) is valid, so you should be very careful how you use
|
|
|
|
it. In this case, the local variable `bytes` outlives the pointer, so we're
|
|
|
|
good.
|
2012-09-05 13:20:04 -05:00
|
|
|
|
|
|
|
Passing a null pointer as the third argument to `SHA1` makes it use a
|
|
|
|
static buffer, and thus save us the effort of allocating memory
|
2012-10-09 18:46:16 -05:00
|
|
|
ourselves. `ptr::null` is a generic function that, in this case, returns an
|
|
|
|
unsafe null pointer of type `*u8`. (Rust generics are awesome
|
|
|
|
like that: they can take the right form depending on the type that they
|
|
|
|
are expected to return.)
|
|
|
|
|
2012-10-11 21:44:48 -05:00
|
|
|
Finally, `vec::from_buf` builds up a new `~[u8]` from the
|
2012-10-09 18:46:16 -05:00
|
|
|
unsafe pointer that `SHA1` returned. SHA1 digests are always
|
|
|
|
twenty bytes long, so we can pass `20` for the length of the new
|
2012-09-05 13:20:04 -05:00
|
|
|
vector.
|
|
|
|
|
2012-09-26 21:00:13 -05:00
|
|
|
# Passing structures
|
2012-09-05 13:20:04 -05:00
|
|
|
|
|
|
|
C functions often take pointers to structs as arguments. Since Rust
|
2012-10-09 18:46:16 -05:00
|
|
|
`struct`s are binary-compatible with C structs, Rust programs can call
|
2012-09-05 13:20:04 -05:00
|
|
|
such functions directly.
|
|
|
|
|
|
|
|
This program uses the POSIX function `gettimeofday` to get a
|
|
|
|
microsecond-resolution timer.
|
|
|
|
|
|
|
|
~~~~
|
2012-09-05 14:39:16 -05:00
|
|
|
extern mod std;
|
|
|
|
use libc::c_ulonglong;
|
2012-09-05 13:20:04 -05:00
|
|
|
|
2012-09-26 18:41:14 -05:00
|
|
|
struct timeval {
|
|
|
|
mut tv_sec: c_ulonglong,
|
|
|
|
mut tv_usec: c_ulonglong
|
|
|
|
}
|
|
|
|
|
2012-09-05 13:20:04 -05:00
|
|
|
#[nolink]
|
|
|
|
extern mod lib_c {
|
|
|
|
fn gettimeofday(tv: *timeval, tz: *()) -> i32;
|
|
|
|
}
|
|
|
|
fn unix_time_in_microseconds() -> u64 unsafe {
|
2012-09-26 18:41:14 -05:00
|
|
|
let x = timeval {
|
|
|
|
mut tv_sec: 0 as c_ulonglong,
|
|
|
|
mut tv_usec: 0 as c_ulonglong
|
|
|
|
};
|
2012-10-01 14:47:02 -05:00
|
|
|
lib_c::gettimeofday(ptr::addr_of(&x), ptr::null());
|
2012-09-05 13:20:04 -05:00
|
|
|
return (x.tv_sec as u64) * 1000_000_u64 + (x.tv_usec as u64);
|
|
|
|
}
|
|
|
|
|
|
|
|
# fn main() { assert fmt!("%?", unix_time_in_microseconds()) != ~""; }
|
|
|
|
~~~~
|
|
|
|
|
|
|
|
The `#[nolink]` attribute indicates that there's no foreign library to
|
|
|
|
link in. The standard C library is already linked with Rust programs.
|
|
|
|
|
2012-10-09 18:46:16 -05:00
|
|
|
In C, a `timeval` is a struct with two 32-bit integer fields. Thus, we
|
|
|
|
define a `struct` type with the same contents, and declare
|
|
|
|
`gettimeofday` to take a pointer to such a `struct`.
|
2012-09-05 13:20:04 -05:00
|
|
|
|
2012-10-09 18:46:16 -05:00
|
|
|
This program does not use the second argument to `gettimeofday` (the time
|
|
|
|
zone), so the `extern mod` declaration for it simply declares this argument
|
|
|
|
to be a pointer to the unit type (written `()`). Since all null pointers have
|
|
|
|
the same representation regardless of their referent type, this is safe.
|
2012-09-05 13:20:04 -05:00
|
|
|
|