2017-10-18 09:41:44 +08:00
|
|
|
/*
|
|
|
|
* libwebsockets - mbedTLS-specific lws apis
|
|
|
|
*
|
|
|
|
* Copyright (C) 2010-2017 Andy Green <andy@warmcat.com>
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation:
|
|
|
|
* version 2.1 of the License.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
|
|
|
|
* MA 02110-1301 USA
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "private-libwebsockets.h"
|
2017-10-26 09:54:25 +08:00
|
|
|
#include <mbedtls/oid.h>
|
2017-10-18 09:41:44 +08:00
|
|
|
|
|
|
|
void
|
|
|
|
lws_ssl_elaborate_error(void)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
lws_context_init_ssl_library(struct lws_context_creation_info *info)
|
|
|
|
{
|
|
|
|
lwsl_info(" Compiled with MbedTLS support\n");
|
|
|
|
|
|
|
|
if (!lws_check_opt(info->options, LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT))
|
|
|
|
lwsl_info(" SSL disabled: no LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT\n");
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
LWS_VISIBLE void
|
|
|
|
lws_ssl_destroy(struct lws_vhost *vhost)
|
|
|
|
{
|
|
|
|
if (!lws_check_opt(vhost->context->options,
|
|
|
|
LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT))
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (vhost->ssl_ctx)
|
|
|
|
SSL_CTX_free(vhost->ssl_ctx);
|
|
|
|
if (!vhost->user_supplied_ssl_ctx && vhost->ssl_client_ctx)
|
|
|
|
SSL_CTX_free(vhost->ssl_client_ctx);
|
|
|
|
|
|
|
|
if (vhost->x509_client_CA)
|
|
|
|
X509_free(vhost->x509_client_CA);
|
|
|
|
}
|
|
|
|
|
|
|
|
LWS_VISIBLE int
|
|
|
|
lws_ssl_capable_read(struct lws *wsi, unsigned char *buf, int len)
|
|
|
|
{
|
|
|
|
struct lws_context *context = wsi->context;
|
|
|
|
struct lws_context_per_thread *pt = &context->pt[(int)wsi->tsi];
|
|
|
|
int n = 0, m;
|
|
|
|
|
|
|
|
if (!wsi->ssl)
|
|
|
|
return lws_ssl_capable_read_no_ssl(wsi, buf, len);
|
|
|
|
|
|
|
|
lws_stats_atomic_bump(context, pt, LWSSTATS_C_API_READ, 1);
|
|
|
|
|
|
|
|
errno = 0;
|
|
|
|
n = SSL_read(wsi->ssl, buf, len);
|
|
|
|
#if defined(LWS_WITH_ESP32)
|
|
|
|
if (!n && errno == ENOTCONN) {
|
|
|
|
lwsl_debug("%p: SSL_read ENOTCONN\n", wsi);
|
|
|
|
return LWS_SSL_CAPABLE_ERROR;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
#if defined(LWS_WITH_STATS)
|
|
|
|
if (!wsi->seen_rx) {
|
|
|
|
lws_stats_atomic_bump(wsi->context, pt,
|
|
|
|
LWSSTATS_MS_SSL_RX_DELAY,
|
|
|
|
time_in_microseconds() - wsi->accept_start_us);
|
|
|
|
lws_stats_atomic_bump(wsi->context, pt,
|
|
|
|
LWSSTATS_C_SSL_CONNS_HAD_RX, 1);
|
|
|
|
wsi->seen_rx = 1;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
lwsl_debug("%p: SSL_read says %d\n", wsi, n);
|
|
|
|
/* manpage: returning 0 means connection shut down */
|
|
|
|
if (!n) {
|
|
|
|
wsi->socket_is_permanently_unusable = 1;
|
|
|
|
|
|
|
|
return LWS_SSL_CAPABLE_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (n < 0) {
|
|
|
|
m = SSL_get_error(wsi->ssl, n);
|
|
|
|
lwsl_debug("%p: ssl err %d errno %d\n", wsi, m, errno);
|
|
|
|
if (m == SSL_ERROR_ZERO_RETURN ||
|
|
|
|
m == SSL_ERROR_SYSCALL)
|
|
|
|
return LWS_SSL_CAPABLE_ERROR;
|
|
|
|
|
2017-11-08 20:27:11 +08:00
|
|
|
if (m == SSL_ERROR_WANT_READ || SSL_want_read(wsi->ssl)) {
|
2017-10-18 09:41:44 +08:00
|
|
|
lwsl_debug("%s: WANT_READ\n", __func__);
|
|
|
|
lwsl_debug("%p: LWS_SSL_CAPABLE_MORE_SERVICE\n", wsi);
|
|
|
|
return LWS_SSL_CAPABLE_MORE_SERVICE;
|
|
|
|
}
|
2017-11-08 20:27:11 +08:00
|
|
|
if (m == SSL_ERROR_WANT_WRITE || SSL_want_write(wsi->ssl)) {
|
2017-10-18 09:41:44 +08:00
|
|
|
lwsl_debug("%s: WANT_WRITE\n", __func__);
|
|
|
|
lwsl_debug("%p: LWS_SSL_CAPABLE_MORE_SERVICE\n", wsi);
|
|
|
|
return LWS_SSL_CAPABLE_MORE_SERVICE;
|
|
|
|
}
|
|
|
|
wsi->socket_is_permanently_unusable = 1;
|
|
|
|
|
|
|
|
return LWS_SSL_CAPABLE_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
lws_stats_atomic_bump(context, pt, LWSSTATS_B_READ, n);
|
|
|
|
|
|
|
|
if (wsi->vhost)
|
|
|
|
wsi->vhost->conn_stats.rx += n;
|
|
|
|
|
|
|
|
lws_restart_ws_ping_pong_timer(wsi);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* if it was our buffer that limited what we read,
|
|
|
|
* check if SSL has additional data pending inside SSL buffers.
|
|
|
|
*
|
|
|
|
* Because these won't signal at the network layer with POLLIN
|
|
|
|
* and if we don't realize, this data will sit there forever
|
|
|
|
*/
|
|
|
|
if (n != len)
|
|
|
|
goto bail;
|
|
|
|
if (!wsi->ssl)
|
|
|
|
goto bail;
|
|
|
|
|
|
|
|
if (!SSL_pending(wsi->ssl))
|
|
|
|
goto bail;
|
|
|
|
|
|
|
|
if (wsi->pending_read_list_next)
|
|
|
|
return n;
|
|
|
|
if (wsi->pending_read_list_prev)
|
|
|
|
return n;
|
|
|
|
if (pt->pending_read_list == wsi)
|
|
|
|
return n;
|
|
|
|
|
|
|
|
/* add us to the linked list of guys with pending ssl */
|
|
|
|
if (pt->pending_read_list)
|
|
|
|
pt->pending_read_list->pending_read_list_prev = wsi;
|
|
|
|
|
|
|
|
wsi->pending_read_list_next = pt->pending_read_list;
|
|
|
|
wsi->pending_read_list_prev = NULL;
|
|
|
|
pt->pending_read_list = wsi;
|
|
|
|
|
|
|
|
return n;
|
|
|
|
bail:
|
|
|
|
lws_ssl_remove_wsi_from_buffered_list(wsi);
|
|
|
|
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
LWS_VISIBLE int
|
|
|
|
lws_ssl_pending(struct lws *wsi)
|
|
|
|
{
|
|
|
|
if (!wsi->ssl)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return SSL_pending(wsi->ssl);
|
|
|
|
}
|
|
|
|
|
|
|
|
LWS_VISIBLE int
|
|
|
|
lws_ssl_capable_write(struct lws *wsi, unsigned char *buf, int len)
|
|
|
|
{
|
|
|
|
int n, m;
|
|
|
|
|
|
|
|
if (!wsi->ssl)
|
|
|
|
return lws_ssl_capable_write_no_ssl(wsi, buf, len);
|
|
|
|
|
|
|
|
n = SSL_write(wsi->ssl, buf, len);
|
|
|
|
if (n > 0)
|
|
|
|
return n;
|
|
|
|
|
|
|
|
m = SSL_get_error(wsi->ssl, n);
|
|
|
|
if (m != SSL_ERROR_SYSCALL) {
|
|
|
|
if (m == SSL_ERROR_WANT_READ || SSL_want_read(wsi->ssl)) {
|
|
|
|
lwsl_notice("%s: want read\n", __func__);
|
|
|
|
|
|
|
|
return LWS_SSL_CAPABLE_MORE_SERVICE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (m == SSL_ERROR_WANT_WRITE || SSL_want_write(wsi->ssl)) {
|
|
|
|
lws_set_blocking_send(wsi);
|
|
|
|
lwsl_notice("%s: want write\n", __func__);
|
|
|
|
|
|
|
|
return LWS_SSL_CAPABLE_MORE_SERVICE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
lwsl_debug("%s failed: %d\n",__func__, m);
|
|
|
|
wsi->socket_is_permanently_unusable = 1;
|
|
|
|
|
|
|
|
return LWS_SSL_CAPABLE_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
int openssl_SSL_CTX_private_data_index;
|
|
|
|
|
|
|
|
void
|
|
|
|
lws_ssl_info_callback(const SSL *ssl, int where, int ret)
|
|
|
|
{
|
|
|
|
struct lws *wsi;
|
|
|
|
struct lws_context *context;
|
|
|
|
struct lws_ssl_info si;
|
|
|
|
|
|
|
|
context = (struct lws_context *)SSL_CTX_get_ex_data(
|
|
|
|
SSL_get_SSL_CTX(ssl),
|
|
|
|
openssl_SSL_CTX_private_data_index);
|
|
|
|
if (!context)
|
|
|
|
return;
|
|
|
|
wsi = wsi_from_fd(context, SSL_get_fd(ssl));
|
|
|
|
if (!wsi)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (!(where & wsi->vhost->ssl_info_event_mask))
|
|
|
|
return;
|
|
|
|
|
|
|
|
si.where = where;
|
|
|
|
si.ret = ret;
|
|
|
|
|
|
|
|
if (user_callback_handle_rxflow(wsi->protocol->callback,
|
|
|
|
wsi, LWS_CALLBACK_SSL_INFO,
|
|
|
|
wsi->user_space, &si, 0))
|
|
|
|
lws_set_timeout(wsi, PENDING_TIMEOUT_KILLED_BY_SSL_INFO, -1);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
LWS_VISIBLE int
|
|
|
|
lws_ssl_close(struct lws *wsi)
|
|
|
|
{
|
|
|
|
lws_sockfd_type n;
|
|
|
|
|
|
|
|
if (!wsi->ssl)
|
|
|
|
return 0; /* not handled */
|
|
|
|
|
|
|
|
#if defined (LWS_HAVE_SSL_SET_INFO_CALLBACK)
|
|
|
|
/* kill ssl callbacks, becausse we will remove the fd from the
|
|
|
|
* table linking it to the wsi
|
|
|
|
*/
|
|
|
|
if (wsi->vhost->ssl_info_event_mask)
|
|
|
|
SSL_set_info_callback(wsi->ssl, NULL);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
n = SSL_get_fd(wsi->ssl);
|
|
|
|
if (!wsi->socket_is_permanently_unusable)
|
|
|
|
SSL_shutdown(wsi->ssl);
|
|
|
|
compatible_close(n);
|
|
|
|
SSL_free(wsi->ssl);
|
|
|
|
wsi->ssl = NULL;
|
|
|
|
|
2017-11-26 09:22:42 +08:00
|
|
|
if (!(wsi->mode & LWSCM_FLAG_IMPLIES_CALLBACK_CLOSED_CLIENT_HTTP) &&
|
|
|
|
wsi->context->simultaneous_ssl_restriction &&
|
2017-10-18 09:41:44 +08:00
|
|
|
wsi->context->simultaneous_ssl-- ==
|
|
|
|
wsi->context->simultaneous_ssl_restriction)
|
|
|
|
/* we made space and can do an accept */
|
|
|
|
lws_gate_accepts(wsi->context, 1);
|
2017-11-26 09:22:42 +08:00
|
|
|
|
|
|
|
//lwsl_notice("%s: ssl restr %d, simul %d\n", __func__,
|
|
|
|
// wsi->context->simultaneous_ssl_restriction,
|
|
|
|
// wsi->context->simultaneous_ssl);
|
2017-10-18 09:41:44 +08:00
|
|
|
#if defined(LWS_WITH_STATS)
|
|
|
|
wsi->context->updated = 1;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return 1; /* handled */
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
lws_ssl_SSL_CTX_destroy(struct lws_vhost *vhost)
|
|
|
|
{
|
|
|
|
if (vhost->ssl_ctx)
|
|
|
|
SSL_CTX_free(vhost->ssl_ctx);
|
|
|
|
|
|
|
|
if (!vhost->user_supplied_ssl_ctx && vhost->ssl_client_ctx)
|
|
|
|
SSL_CTX_free(vhost->ssl_client_ctx);
|
2017-11-14 11:25:54 +08:00
|
|
|
#if defined(LWS_WITH_ACME)
|
2017-10-28 11:33:34 +08:00
|
|
|
lws_tls_acme_sni_cert_destroy(vhost);
|
2017-11-14 11:25:54 +08:00
|
|
|
#endif
|
2017-10-18 09:41:44 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
lws_ssl_context_destroy(struct lws_context *context)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
lws_tls_ctx *
|
|
|
|
lws_tls_ctx_from_wsi(struct lws *wsi)
|
|
|
|
{
|
|
|
|
return SSL_get_SSL_CTX(wsi->ssl);
|
|
|
|
}
|
|
|
|
|
|
|
|
enum lws_ssl_capable_status
|
|
|
|
lws_tls_shutdown(struct lws *wsi)
|
|
|
|
{
|
|
|
|
int n = SSL_shutdown(wsi->ssl);
|
|
|
|
|
|
|
|
lwsl_debug("SSL_shutdown=%d for fd %d\n", n, wsi->desc.sockfd);
|
|
|
|
|
|
|
|
switch (n) {
|
|
|
|
case 1: /* successful completion */
|
|
|
|
n = shutdown(wsi->desc.sockfd, SHUT_WR);
|
|
|
|
return LWS_SSL_CAPABLE_DONE;
|
|
|
|
|
|
|
|
case 0: /* needs a retry */
|
|
|
|
lws_change_pollfd(wsi, 0, LWS_POLLIN);
|
|
|
|
return LWS_SSL_CAPABLE_MORE_SERVICE;
|
|
|
|
|
|
|
|
default: /* fatal error, or WANT */
|
|
|
|
n = SSL_get_error(wsi->ssl, n);
|
|
|
|
if (n != SSL_ERROR_SYSCALL && n != SSL_ERROR_SSL) {
|
|
|
|
if (SSL_want_read(wsi->ssl)) {
|
|
|
|
lwsl_debug("(wants read)\n");
|
|
|
|
lws_change_pollfd(wsi, 0, LWS_POLLIN);
|
|
|
|
return LWS_SSL_CAPABLE_MORE_SERVICE_READ;
|
|
|
|
}
|
|
|
|
if (SSL_want_write(wsi->ssl)) {
|
|
|
|
lwsl_debug("(wants write)\n");
|
|
|
|
lws_change_pollfd(wsi, 0, LWS_POLLOUT);
|
|
|
|
return LWS_SSL_CAPABLE_MORE_SERVICE_WRITE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return LWS_SSL_CAPABLE_ERROR;
|
|
|
|
}
|
|
|
|
}
|
2017-10-26 09:54:25 +08:00
|
|
|
|
|
|
|
static time_t
|
|
|
|
lws_tls_mbedtls_time_to_unix(mbedtls_x509_time *xtime)
|
|
|
|
{
|
|
|
|
struct tm t;
|
|
|
|
|
|
|
|
if (!xtime || !xtime->year || xtime->year < 0)
|
|
|
|
return (time_t)(long long)-1;
|
|
|
|
|
|
|
|
memset(&t, 0, sizeof(t));
|
|
|
|
|
|
|
|
t.tm_year = xtime->year - 1900;
|
|
|
|
t.tm_mon = xtime->mon - 1; /* mbedtls months are 1+, tm are 0+ */
|
|
|
|
t.tm_mday = xtime->day - 1; /* mbedtls days are 1+, tm are 0+ */
|
|
|
|
t.tm_hour = xtime->hour;
|
|
|
|
t.tm_min = xtime->min;
|
|
|
|
t.tm_sec = xtime->sec;
|
|
|
|
t.tm_isdst = -1;
|
|
|
|
|
|
|
|
return mktime(&t);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
lws_tls_mbedtls_get_x509_name(mbedtls_x509_name *name,
|
|
|
|
union lws_tls_cert_info_results *buf, size_t len)
|
|
|
|
{
|
|
|
|
while (name) {
|
|
|
|
if (MBEDTLS_OID_CMP(MBEDTLS_OID_AT_CN, &name->oid)) {
|
|
|
|
name = name->next;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (len - 1 < name->val.len)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
memcpy(&buf->ns.name[0], name->val.p, name->val.len);
|
|
|
|
buf->ns.name[name->val.len] = '\0';
|
|
|
|
buf->ns.len = name->val.len;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
lws_tls_mbedtls_cert_info(mbedtls_x509_crt *x509, enum lws_tls_cert_info type,
|
|
|
|
union lws_tls_cert_info_results *buf, size_t len)
|
|
|
|
{
|
|
|
|
if (!x509)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
switch (type) {
|
|
|
|
case LWS_TLS_CERT_INFO_VALIDITY_FROM:
|
|
|
|
buf->time = lws_tls_mbedtls_time_to_unix(&x509->valid_from);
|
|
|
|
if (buf->time == (time_t)(long long)-1)
|
|
|
|
return -1;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case LWS_TLS_CERT_INFO_VALIDITY_TO:
|
|
|
|
buf->time = lws_tls_mbedtls_time_to_unix(&x509->valid_to);
|
|
|
|
if (buf->time == (time_t)(long long)-1)
|
|
|
|
return -1;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case LWS_TLS_CERT_INFO_COMMON_NAME:
|
|
|
|
return lws_tls_mbedtls_get_x509_name(&x509->subject, buf, len);
|
|
|
|
|
|
|
|
case LWS_TLS_CERT_INFO_ISSUER_NAME:
|
|
|
|
return lws_tls_mbedtls_get_x509_name(&x509->issuer, buf, len);
|
|
|
|
|
|
|
|
case LWS_TLS_CERT_INFO_USAGE:
|
|
|
|
buf->usage = x509->key_usage;
|
|
|
|
break;
|
2017-10-27 12:08:05 +02:00
|
|
|
default:
|
|
|
|
return -1;
|
2017-10-26 09:54:25 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
LWS_VISIBLE LWS_EXTERN int
|
|
|
|
lws_tls_vhost_cert_info(struct lws_vhost *vhost, enum lws_tls_cert_info type,
|
|
|
|
union lws_tls_cert_info_results *buf, size_t len)
|
|
|
|
{
|
|
|
|
mbedtls_x509_crt *x509 = ssl_ctx_get_mbedtls_x509_crt(vhost->ssl_ctx);
|
|
|
|
|
|
|
|
return lws_tls_mbedtls_cert_info(x509, type, buf, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
LWS_VISIBLE int
|
|
|
|
lws_tls_peer_cert_info(struct lws *wsi, enum lws_tls_cert_info type,
|
|
|
|
union lws_tls_cert_info_results *buf, size_t len)
|
|
|
|
{
|
|
|
|
mbedtls_x509_crt *x509 = ssl_get_peer_mbedtls_x509_crt(wsi->ssl);
|
|
|
|
|
2017-10-27 12:08:05 +02:00
|
|
|
if (!x509)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
switch (type) {
|
|
|
|
case LWS_TLS_CERT_INFO_VERIFIED:
|
|
|
|
buf->verified = SSL_get_verify_result(wsi->ssl) == X509_V_OK;
|
|
|
|
return 0;
|
|
|
|
default:
|
|
|
|
return lws_tls_mbedtls_cert_info(x509, type, buf, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
return -1;
|
2017-10-26 09:54:25 +08:00
|
|
|
}
|