bearssl.c 27 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923
  1. /***************************************************************************
  2. * _ _ ____ _
  3. * Project ___| | | | _ \| |
  4. * / __| | | | |_) | |
  5. * | (__| |_| | _ <| |___
  6. * \___|\___/|_| \_\_____|
  7. *
  8. * Copyright (C) 2019 - 2021, Michael Forney, <[email protected]>
  9. *
  10. * This software is licensed as described in the file COPYING, which
  11. * you should have received as part of this distribution. The terms
  12. * are also available at https://curl.se/docs/copyright.html.
  13. *
  14. * You may opt to use, copy, modify, merge, publish, distribute and/or sell
  15. * copies of the Software, and permit persons to whom the Software is
  16. * furnished to do so, under the terms of the COPYING file.
  17. *
  18. * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
  19. * KIND, either express or implied.
  20. *
  21. ***************************************************************************/
  22. #include "curl_setup.h"
  23. #ifdef USE_BEARSSL
  24. #include <bearssl.h>
  25. #include "bearssl.h"
  26. #include "urldata.h"
  27. #include "sendf.h"
  28. #include "inet_pton.h"
  29. #include "vtls.h"
  30. #include "connect.h"
  31. #include "select.h"
  32. #include "multiif.h"
  33. #include "curl_printf.h"
  34. #include "curl_memory.h"
  35. struct x509_context {
  36. const br_x509_class *vtable;
  37. br_x509_minimal_context minimal;
  38. bool verifyhost;
  39. bool verifypeer;
  40. };
  41. struct ssl_backend_data {
  42. br_ssl_client_context ctx;
  43. struct x509_context x509;
  44. unsigned char buf[BR_SSL_BUFSIZE_BIDI];
  45. br_x509_trust_anchor *anchors;
  46. size_t anchors_len;
  47. const char *protocols[2];
  48. /* SSL client context is active */
  49. bool active;
  50. /* size of pending write, yet to be flushed */
  51. size_t pending_write;
  52. };
  53. struct cafile_parser {
  54. CURLcode err;
  55. bool in_cert;
  56. br_x509_decoder_context xc;
  57. /* array of trust anchors loaded from CAfile */
  58. br_x509_trust_anchor *anchors;
  59. size_t anchors_len;
  60. /* buffer for DN data */
  61. unsigned char dn[1024];
  62. size_t dn_len;
  63. };
  64. #define CAFILE_SOURCE_PATH 1
  65. #define CAFILE_SOURCE_BLOB 2
  66. struct cafile_source {
  67. const int type;
  68. const char * const data;
  69. const size_t len;
  70. };
  71. static void append_dn(void *ctx, const void *buf, size_t len)
  72. {
  73. struct cafile_parser *ca = ctx;
  74. if(ca->err != CURLE_OK || !ca->in_cert)
  75. return;
  76. if(sizeof(ca->dn) - ca->dn_len < len) {
  77. ca->err = CURLE_FAILED_INIT;
  78. return;
  79. }
  80. memcpy(ca->dn + ca->dn_len, buf, len);
  81. ca->dn_len += len;
  82. }
  83. static void x509_push(void *ctx, const void *buf, size_t len)
  84. {
  85. struct cafile_parser *ca = ctx;
  86. if(ca->in_cert)
  87. br_x509_decoder_push(&ca->xc, buf, len);
  88. }
  89. static CURLcode load_cafile(struct cafile_source *source,
  90. br_x509_trust_anchor **anchors,
  91. size_t *anchors_len)
  92. {
  93. struct cafile_parser ca;
  94. br_pem_decoder_context pc;
  95. br_x509_trust_anchor *ta;
  96. size_t ta_size;
  97. br_x509_trust_anchor *new_anchors;
  98. size_t new_anchors_len;
  99. br_x509_pkey *pkey;
  100. FILE *fp = 0;
  101. unsigned char buf[BUFSIZ];
  102. const unsigned char *p;
  103. const char *name;
  104. size_t n, i, pushed;
  105. DEBUGASSERT(source->type == CAFILE_SOURCE_PATH
  106. || source->type == CAFILE_SOURCE_BLOB);
  107. if(source->type == CAFILE_SOURCE_PATH) {
  108. fp = fopen(source->data, "rb");
  109. if(!fp)
  110. return CURLE_SSL_CACERT_BADFILE;
  111. }
  112. if(source->type == CAFILE_SOURCE_BLOB && source->len > (size_t)INT_MAX)
  113. return CURLE_SSL_CACERT_BADFILE;
  114. ca.err = CURLE_OK;
  115. ca.in_cert = FALSE;
  116. ca.anchors = NULL;
  117. ca.anchors_len = 0;
  118. br_pem_decoder_init(&pc);
  119. br_pem_decoder_setdest(&pc, x509_push, &ca);
  120. do {
  121. if(source->type == CAFILE_SOURCE_PATH) {
  122. n = fread(buf, 1, sizeof(buf), fp);
  123. if(n == 0)
  124. break;
  125. p = buf;
  126. }
  127. else if(source->type == CAFILE_SOURCE_BLOB) {
  128. n = source->len;
  129. p = (unsigned char *) source->data;
  130. }
  131. while(n) {
  132. pushed = br_pem_decoder_push(&pc, p, n);
  133. if(ca.err)
  134. goto fail;
  135. p += pushed;
  136. n -= pushed;
  137. switch(br_pem_decoder_event(&pc)) {
  138. case 0:
  139. break;
  140. case BR_PEM_BEGIN_OBJ:
  141. name = br_pem_decoder_name(&pc);
  142. if(strcmp(name, "CERTIFICATE") && strcmp(name, "X509 CERTIFICATE"))
  143. break;
  144. br_x509_decoder_init(&ca.xc, append_dn, &ca);
  145. if(ca.anchors_len == SIZE_MAX / sizeof(ca.anchors[0])) {
  146. ca.err = CURLE_OUT_OF_MEMORY;
  147. goto fail;
  148. }
  149. new_anchors_len = ca.anchors_len + 1;
  150. new_anchors = realloc(ca.anchors,
  151. new_anchors_len * sizeof(ca.anchors[0]));
  152. if(!new_anchors) {
  153. ca.err = CURLE_OUT_OF_MEMORY;
  154. goto fail;
  155. }
  156. ca.anchors = new_anchors;
  157. ca.anchors_len = new_anchors_len;
  158. ca.in_cert = TRUE;
  159. ca.dn_len = 0;
  160. ta = &ca.anchors[ca.anchors_len - 1];
  161. ta->dn.data = NULL;
  162. break;
  163. case BR_PEM_END_OBJ:
  164. if(!ca.in_cert)
  165. break;
  166. ca.in_cert = FALSE;
  167. if(br_x509_decoder_last_error(&ca.xc)) {
  168. ca.err = CURLE_SSL_CACERT_BADFILE;
  169. goto fail;
  170. }
  171. ta->flags = 0;
  172. if(br_x509_decoder_isCA(&ca.xc))
  173. ta->flags |= BR_X509_TA_CA;
  174. pkey = br_x509_decoder_get_pkey(&ca.xc);
  175. if(!pkey) {
  176. ca.err = CURLE_SSL_CACERT_BADFILE;
  177. goto fail;
  178. }
  179. ta->pkey = *pkey;
  180. /* calculate space needed for trust anchor data */
  181. ta_size = ca.dn_len;
  182. switch(pkey->key_type) {
  183. case BR_KEYTYPE_RSA:
  184. ta_size += pkey->key.rsa.nlen + pkey->key.rsa.elen;
  185. break;
  186. case BR_KEYTYPE_EC:
  187. ta_size += pkey->key.ec.qlen;
  188. break;
  189. default:
  190. ca.err = CURLE_FAILED_INIT;
  191. goto fail;
  192. }
  193. /* fill in trust anchor DN and public key data */
  194. ta->dn.data = malloc(ta_size);
  195. if(!ta->dn.data) {
  196. ca.err = CURLE_OUT_OF_MEMORY;
  197. goto fail;
  198. }
  199. memcpy(ta->dn.data, ca.dn, ca.dn_len);
  200. ta->dn.len = ca.dn_len;
  201. switch(pkey->key_type) {
  202. case BR_KEYTYPE_RSA:
  203. ta->pkey.key.rsa.n = ta->dn.data + ta->dn.len;
  204. memcpy(ta->pkey.key.rsa.n, pkey->key.rsa.n, pkey->key.rsa.nlen);
  205. ta->pkey.key.rsa.e = ta->pkey.key.rsa.n + ta->pkey.key.rsa.nlen;
  206. memcpy(ta->pkey.key.rsa.e, pkey->key.rsa.e, pkey->key.rsa.elen);
  207. break;
  208. case BR_KEYTYPE_EC:
  209. ta->pkey.key.ec.q = ta->dn.data + ta->dn.len;
  210. memcpy(ta->pkey.key.ec.q, pkey->key.ec.q, pkey->key.ec.qlen);
  211. break;
  212. }
  213. break;
  214. default:
  215. ca.err = CURLE_SSL_CACERT_BADFILE;
  216. goto fail;
  217. }
  218. }
  219. } while(source->type != CAFILE_SOURCE_BLOB);
  220. if(fp && ferror(fp))
  221. ca.err = CURLE_READ_ERROR;
  222. fail:
  223. if(fp)
  224. fclose(fp);
  225. if(ca.err == CURLE_OK) {
  226. *anchors = ca.anchors;
  227. *anchors_len = ca.anchors_len;
  228. }
  229. else {
  230. for(i = 0; i < ca.anchors_len; ++i)
  231. free(ca.anchors[i].dn.data);
  232. free(ca.anchors);
  233. }
  234. return ca.err;
  235. }
  236. static void x509_start_chain(const br_x509_class **ctx,
  237. const char *server_name)
  238. {
  239. struct x509_context *x509 = (struct x509_context *)ctx;
  240. if(!x509->verifyhost)
  241. server_name = NULL;
  242. x509->minimal.vtable->start_chain(&x509->minimal.vtable, server_name);
  243. }
  244. static void x509_start_cert(const br_x509_class **ctx, uint32_t length)
  245. {
  246. struct x509_context *x509 = (struct x509_context *)ctx;
  247. x509->minimal.vtable->start_cert(&x509->minimal.vtable, length);
  248. }
  249. static void x509_append(const br_x509_class **ctx, const unsigned char *buf,
  250. size_t len)
  251. {
  252. struct x509_context *x509 = (struct x509_context *)ctx;
  253. x509->minimal.vtable->append(&x509->minimal.vtable, buf, len);
  254. }
  255. static void x509_end_cert(const br_x509_class **ctx)
  256. {
  257. struct x509_context *x509 = (struct x509_context *)ctx;
  258. x509->minimal.vtable->end_cert(&x509->minimal.vtable);
  259. }
  260. static unsigned x509_end_chain(const br_x509_class **ctx)
  261. {
  262. struct x509_context *x509 = (struct x509_context *)ctx;
  263. unsigned err;
  264. err = x509->minimal.vtable->end_chain(&x509->minimal.vtable);
  265. if(err && !x509->verifypeer) {
  266. /* ignore any X.509 errors */
  267. err = BR_ERR_OK;
  268. }
  269. return err;
  270. }
  271. static const br_x509_pkey *x509_get_pkey(const br_x509_class *const *ctx,
  272. unsigned *usages)
  273. {
  274. struct x509_context *x509 = (struct x509_context *)ctx;
  275. return x509->minimal.vtable->get_pkey(&x509->minimal.vtable, usages);
  276. }
  277. static const br_x509_class x509_vtable = {
  278. sizeof(struct x509_context),
  279. x509_start_chain,
  280. x509_start_cert,
  281. x509_append,
  282. x509_end_cert,
  283. x509_end_chain,
  284. x509_get_pkey
  285. };
  286. static CURLcode bearssl_connect_step1(struct Curl_easy *data,
  287. struct connectdata *conn, int sockindex)
  288. {
  289. struct ssl_connect_data *connssl = &conn->ssl[sockindex];
  290. struct ssl_backend_data *backend = connssl->backend;
  291. const struct curl_blob *ca_info_blob = SSL_CONN_CONFIG(ca_info_blob);
  292. const char * const ssl_cafile =
  293. /* CURLOPT_CAINFO_BLOB overrides CURLOPT_CAINFO */
  294. (ca_info_blob ? NULL : SSL_CONN_CONFIG(CAfile));
  295. const char *hostname = SSL_HOST_NAME();
  296. const bool verifypeer = SSL_CONN_CONFIG(verifypeer);
  297. const bool verifyhost = SSL_CONN_CONFIG(verifyhost);
  298. CURLcode ret;
  299. unsigned version_min, version_max;
  300. #ifdef ENABLE_IPV6
  301. struct in6_addr addr;
  302. #else
  303. struct in_addr addr;
  304. #endif
  305. switch(SSL_CONN_CONFIG(version)) {
  306. case CURL_SSLVERSION_SSLv2:
  307. failf(data, "BearSSL does not support SSLv2");
  308. return CURLE_SSL_CONNECT_ERROR;
  309. case CURL_SSLVERSION_SSLv3:
  310. failf(data, "BearSSL does not support SSLv3");
  311. return CURLE_SSL_CONNECT_ERROR;
  312. case CURL_SSLVERSION_TLSv1_0:
  313. version_min = BR_TLS10;
  314. version_max = BR_TLS10;
  315. break;
  316. case CURL_SSLVERSION_TLSv1_1:
  317. version_min = BR_TLS11;
  318. version_max = BR_TLS11;
  319. break;
  320. case CURL_SSLVERSION_TLSv1_2:
  321. version_min = BR_TLS12;
  322. version_max = BR_TLS12;
  323. break;
  324. case CURL_SSLVERSION_DEFAULT:
  325. case CURL_SSLVERSION_TLSv1:
  326. version_min = BR_TLS10;
  327. version_max = BR_TLS12;
  328. break;
  329. default:
  330. failf(data, "BearSSL: unknown CURLOPT_SSLVERSION");
  331. return CURLE_SSL_CONNECT_ERROR;
  332. }
  333. if(ca_info_blob) {
  334. struct cafile_source source = {
  335. CAFILE_SOURCE_BLOB,
  336. ca_info_blob->data,
  337. ca_info_blob->len,
  338. };
  339. ret = load_cafile(&source, &backend->anchors, &backend->anchors_len);
  340. if(ret != CURLE_OK) {
  341. if(verifypeer) {
  342. failf(data, "error importing CA certificate blob");
  343. return ret;
  344. }
  345. /* Only warn if no certificate verification is required. */
  346. infof(data, "error importing CA certificate blob, continuing anyway");
  347. }
  348. }
  349. if(ssl_cafile) {
  350. struct cafile_source source = {
  351. CAFILE_SOURCE_PATH,
  352. ssl_cafile,
  353. 0,
  354. };
  355. ret = load_cafile(&source, &backend->anchors, &backend->anchors_len);
  356. if(ret != CURLE_OK) {
  357. if(verifypeer) {
  358. failf(data, "error setting certificate verify locations."
  359. " CAfile: %s", ssl_cafile);
  360. return ret;
  361. }
  362. infof(data, "error setting certificate verify locations,"
  363. " continuing anyway:");
  364. }
  365. }
  366. /* initialize SSL context */
  367. br_ssl_client_init_full(&backend->ctx, &backend->x509.minimal,
  368. backend->anchors, backend->anchors_len);
  369. br_ssl_engine_set_versions(&backend->ctx.eng, version_min, version_max);
  370. br_ssl_engine_set_buffer(&backend->ctx.eng, backend->buf,
  371. sizeof(backend->buf), 1);
  372. /* initialize X.509 context */
  373. backend->x509.vtable = &x509_vtable;
  374. backend->x509.verifypeer = verifypeer;
  375. backend->x509.verifyhost = verifyhost;
  376. br_ssl_engine_set_x509(&backend->ctx.eng, &backend->x509.vtable);
  377. if(SSL_SET_OPTION(primary.sessionid)) {
  378. void *session;
  379. Curl_ssl_sessionid_lock(data);
  380. if(!Curl_ssl_getsessionid(data, conn, SSL_IS_PROXY() ? TRUE : FALSE,
  381. &session, NULL, sockindex)) {
  382. br_ssl_engine_set_session_parameters(&backend->ctx.eng, session);
  383. infof(data, "BearSSL: re-using session ID");
  384. }
  385. Curl_ssl_sessionid_unlock(data);
  386. }
  387. if(conn->bits.tls_enable_alpn) {
  388. int cur = 0;
  389. /* NOTE: when adding more protocols here, increase the size of the
  390. * protocols array in `struct ssl_backend_data`.
  391. */
  392. #ifdef USE_HTTP2
  393. if(data->state.httpwant >= CURL_HTTP_VERSION_2
  394. #ifndef CURL_DISABLE_PROXY
  395. && (!SSL_IS_PROXY() || !conn->bits.tunnel_proxy)
  396. #endif
  397. ) {
  398. backend->protocols[cur++] = ALPN_H2;
  399. infof(data, "ALPN, offering %s", ALPN_H2);
  400. }
  401. #endif
  402. backend->protocols[cur++] = ALPN_HTTP_1_1;
  403. infof(data, "ALPN, offering %s", ALPN_HTTP_1_1);
  404. br_ssl_engine_set_protocol_names(&backend->ctx.eng,
  405. backend->protocols, cur);
  406. }
  407. if((1 == Curl_inet_pton(AF_INET, hostname, &addr))
  408. #ifdef ENABLE_IPV6
  409. || (1 == Curl_inet_pton(AF_INET6, hostname, &addr))
  410. #endif
  411. ) {
  412. if(verifyhost) {
  413. failf(data, "BearSSL: "
  414. "host verification of IP address is not supported");
  415. return CURLE_PEER_FAILED_VERIFICATION;
  416. }
  417. hostname = NULL;
  418. }
  419. if(!br_ssl_client_reset(&backend->ctx, hostname, 0))
  420. return CURLE_FAILED_INIT;
  421. backend->active = TRUE;
  422. connssl->connecting_state = ssl_connect_2;
  423. return CURLE_OK;
  424. }
  425. static CURLcode bearssl_run_until(struct Curl_easy *data,
  426. struct connectdata *conn, int sockindex,
  427. unsigned target)
  428. {
  429. struct ssl_connect_data *connssl = &conn->ssl[sockindex];
  430. struct ssl_backend_data *backend = connssl->backend;
  431. curl_socket_t sockfd = conn->sock[sockindex];
  432. unsigned state;
  433. unsigned char *buf;
  434. size_t len;
  435. ssize_t ret;
  436. int err;
  437. for(;;) {
  438. state = br_ssl_engine_current_state(&backend->ctx.eng);
  439. if(state & BR_SSL_CLOSED) {
  440. err = br_ssl_engine_last_error(&backend->ctx.eng);
  441. switch(err) {
  442. case BR_ERR_OK:
  443. /* TLS close notify */
  444. if(connssl->state != ssl_connection_complete) {
  445. failf(data, "SSL: connection closed during handshake");
  446. return CURLE_SSL_CONNECT_ERROR;
  447. }
  448. return CURLE_OK;
  449. case BR_ERR_X509_EXPIRED:
  450. failf(data, "SSL: X.509 verification: "
  451. "certificate is expired or not yet valid");
  452. return CURLE_PEER_FAILED_VERIFICATION;
  453. case BR_ERR_X509_BAD_SERVER_NAME:
  454. failf(data, "SSL: X.509 verification: "
  455. "expected server name was not found in the chain");
  456. return CURLE_PEER_FAILED_VERIFICATION;
  457. case BR_ERR_X509_NOT_TRUSTED:
  458. failf(data, "SSL: X.509 verification: "
  459. "chain could not be linked to a trust anchor");
  460. return CURLE_PEER_FAILED_VERIFICATION;
  461. }
  462. /* X.509 errors are documented to have the range 32..63 */
  463. if(err >= 32 && err < 64)
  464. return CURLE_PEER_FAILED_VERIFICATION;
  465. return CURLE_SSL_CONNECT_ERROR;
  466. }
  467. if(state & target)
  468. return CURLE_OK;
  469. if(state & BR_SSL_SENDREC) {
  470. buf = br_ssl_engine_sendrec_buf(&backend->ctx.eng, &len);
  471. ret = swrite(sockfd, buf, len);
  472. if(ret == -1) {
  473. if(SOCKERRNO == EAGAIN || SOCKERRNO == EWOULDBLOCK) {
  474. if(connssl->state != ssl_connection_complete)
  475. connssl->connecting_state = ssl_connect_2_writing;
  476. return CURLE_AGAIN;
  477. }
  478. return CURLE_WRITE_ERROR;
  479. }
  480. br_ssl_engine_sendrec_ack(&backend->ctx.eng, ret);
  481. }
  482. else if(state & BR_SSL_RECVREC) {
  483. buf = br_ssl_engine_recvrec_buf(&backend->ctx.eng, &len);
  484. ret = sread(sockfd, buf, len);
  485. if(ret == 0) {
  486. failf(data, "SSL: EOF without close notify");
  487. return CURLE_READ_ERROR;
  488. }
  489. if(ret == -1) {
  490. if(SOCKERRNO == EAGAIN || SOCKERRNO == EWOULDBLOCK) {
  491. if(connssl->state != ssl_connection_complete)
  492. connssl->connecting_state = ssl_connect_2_reading;
  493. return CURLE_AGAIN;
  494. }
  495. return CURLE_READ_ERROR;
  496. }
  497. br_ssl_engine_recvrec_ack(&backend->ctx.eng, ret);
  498. }
  499. }
  500. }
  501. static CURLcode bearssl_connect_step2(struct Curl_easy *data,
  502. struct connectdata *conn, int sockindex)
  503. {
  504. struct ssl_connect_data *connssl = &conn->ssl[sockindex];
  505. struct ssl_backend_data *backend = connssl->backend;
  506. CURLcode ret;
  507. ret = bearssl_run_until(data, conn, sockindex,
  508. BR_SSL_SENDAPP | BR_SSL_RECVAPP);
  509. if(ret == CURLE_AGAIN)
  510. return CURLE_OK;
  511. if(ret == CURLE_OK) {
  512. if(br_ssl_engine_current_state(&backend->ctx.eng) == BR_SSL_CLOSED) {
  513. failf(data, "SSL: connection closed during handshake");
  514. return CURLE_SSL_CONNECT_ERROR;
  515. }
  516. connssl->connecting_state = ssl_connect_3;
  517. }
  518. return ret;
  519. }
  520. static CURLcode bearssl_connect_step3(struct Curl_easy *data,
  521. struct connectdata *conn, int sockindex)
  522. {
  523. struct ssl_connect_data *connssl = &conn->ssl[sockindex];
  524. struct ssl_backend_data *backend = connssl->backend;
  525. CURLcode ret;
  526. DEBUGASSERT(ssl_connect_3 == connssl->connecting_state);
  527. if(conn->bits.tls_enable_alpn) {
  528. const char *protocol;
  529. protocol = br_ssl_engine_get_selected_protocol(&backend->ctx.eng);
  530. if(protocol) {
  531. infof(data, "ALPN, server accepted to use %s", protocol);
  532. #ifdef USE_HTTP2
  533. if(!strcmp(protocol, ALPN_H2))
  534. conn->negnpn = CURL_HTTP_VERSION_2;
  535. else
  536. #endif
  537. if(!strcmp(protocol, ALPN_HTTP_1_1))
  538. conn->negnpn = CURL_HTTP_VERSION_1_1;
  539. else
  540. infof(data, "ALPN, unrecognized protocol %s", protocol);
  541. Curl_multiuse_state(data, conn->negnpn == CURL_HTTP_VERSION_2 ?
  542. BUNDLE_MULTIPLEX : BUNDLE_NO_MULTIUSE);
  543. }
  544. else
  545. infof(data, "ALPN, server did not agree to a protocol");
  546. }
  547. if(SSL_SET_OPTION(primary.sessionid)) {
  548. bool incache;
  549. bool added = FALSE;
  550. void *oldsession;
  551. br_ssl_session_parameters *session;
  552. session = malloc(sizeof(*session));
  553. if(!session)
  554. return CURLE_OUT_OF_MEMORY;
  555. br_ssl_engine_get_session_parameters(&backend->ctx.eng, session);
  556. Curl_ssl_sessionid_lock(data);
  557. incache = !(Curl_ssl_getsessionid(data, conn,
  558. SSL_IS_PROXY() ? TRUE : FALSE,
  559. &oldsession, NULL, sockindex));
  560. if(incache)
  561. Curl_ssl_delsessionid(data, oldsession);
  562. ret = Curl_ssl_addsessionid(data, conn,
  563. SSL_IS_PROXY() ? TRUE : FALSE,
  564. session, 0, sockindex, &added);
  565. Curl_ssl_sessionid_unlock(data);
  566. if(!added)
  567. free(session);
  568. if(ret) {
  569. return CURLE_OUT_OF_MEMORY;
  570. }
  571. }
  572. connssl->connecting_state = ssl_connect_done;
  573. return CURLE_OK;
  574. }
  575. static ssize_t bearssl_send(struct Curl_easy *data, int sockindex,
  576. const void *buf, size_t len, CURLcode *err)
  577. {
  578. struct connectdata *conn = data->conn;
  579. struct ssl_connect_data *connssl = &conn->ssl[sockindex];
  580. struct ssl_backend_data *backend = connssl->backend;
  581. unsigned char *app;
  582. size_t applen;
  583. for(;;) {
  584. *err = bearssl_run_until(data, conn, sockindex, BR_SSL_SENDAPP);
  585. if (*err != CURLE_OK)
  586. return -1;
  587. app = br_ssl_engine_sendapp_buf(&backend->ctx.eng, &applen);
  588. if(!app) {
  589. failf(data, "SSL: connection closed during write");
  590. *err = CURLE_SEND_ERROR;
  591. return -1;
  592. }
  593. if(backend->pending_write) {
  594. applen = backend->pending_write;
  595. backend->pending_write = 0;
  596. return applen;
  597. }
  598. if(applen > len)
  599. applen = len;
  600. memcpy(app, buf, applen);
  601. br_ssl_engine_sendapp_ack(&backend->ctx.eng, applen);
  602. br_ssl_engine_flush(&backend->ctx.eng, 0);
  603. backend->pending_write = applen;
  604. }
  605. }
  606. static ssize_t bearssl_recv(struct Curl_easy *data, int sockindex,
  607. char *buf, size_t len, CURLcode *err)
  608. {
  609. struct connectdata *conn = data->conn;
  610. struct ssl_connect_data *connssl = &conn->ssl[sockindex];
  611. struct ssl_backend_data *backend = connssl->backend;
  612. unsigned char *app;
  613. size_t applen;
  614. *err = bearssl_run_until(data, conn, sockindex, BR_SSL_RECVAPP);
  615. if(*err != CURLE_OK)
  616. return -1;
  617. app = br_ssl_engine_recvapp_buf(&backend->ctx.eng, &applen);
  618. if(!app)
  619. return 0;
  620. if(applen > len)
  621. applen = len;
  622. memcpy(buf, app, applen);
  623. br_ssl_engine_recvapp_ack(&backend->ctx.eng, applen);
  624. return applen;
  625. }
  626. static CURLcode bearssl_connect_common(struct Curl_easy *data,
  627. struct connectdata *conn,
  628. int sockindex,
  629. bool nonblocking,
  630. bool *done)
  631. {
  632. CURLcode ret;
  633. struct ssl_connect_data *connssl = &conn->ssl[sockindex];
  634. curl_socket_t sockfd = conn->sock[sockindex];
  635. timediff_t timeout_ms;
  636. int what;
  637. /* check if the connection has already been established */
  638. if(ssl_connection_complete == connssl->state) {
  639. *done = TRUE;
  640. return CURLE_OK;
  641. }
  642. if(ssl_connect_1 == connssl->connecting_state) {
  643. ret = bearssl_connect_step1(data, conn, sockindex);
  644. if(ret)
  645. return ret;
  646. }
  647. while(ssl_connect_2 == connssl->connecting_state ||
  648. ssl_connect_2_reading == connssl->connecting_state ||
  649. ssl_connect_2_writing == connssl->connecting_state) {
  650. /* check allowed time left */
  651. timeout_ms = Curl_timeleft(data, NULL, TRUE);
  652. if(timeout_ms < 0) {
  653. /* no need to continue if time already is up */
  654. failf(data, "SSL connection timeout");
  655. return CURLE_OPERATION_TIMEDOUT;
  656. }
  657. /* if ssl is expecting something, check if it's available. */
  658. if(ssl_connect_2_reading == connssl->connecting_state ||
  659. ssl_connect_2_writing == connssl->connecting_state) {
  660. curl_socket_t writefd = ssl_connect_2_writing ==
  661. connssl->connecting_state?sockfd:CURL_SOCKET_BAD;
  662. curl_socket_t readfd = ssl_connect_2_reading ==
  663. connssl->connecting_state?sockfd:CURL_SOCKET_BAD;
  664. what = Curl_socket_check(readfd, CURL_SOCKET_BAD, writefd,
  665. nonblocking?0:timeout_ms);
  666. if(what < 0) {
  667. /* fatal error */
  668. failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO);
  669. return CURLE_SSL_CONNECT_ERROR;
  670. }
  671. else if(0 == what) {
  672. if(nonblocking) {
  673. *done = FALSE;
  674. return CURLE_OK;
  675. }
  676. else {
  677. /* timeout */
  678. failf(data, "SSL connection timeout");
  679. return CURLE_OPERATION_TIMEDOUT;
  680. }
  681. }
  682. /* socket is readable or writable */
  683. }
  684. /* Run transaction, and return to the caller if it failed or if this
  685. * connection is done nonblocking and this loop would execute again. This
  686. * permits the owner of a multi handle to abort a connection attempt
  687. * before step2 has completed while ensuring that a client using select()
  688. * or epoll() will always have a valid fdset to wait on.
  689. */
  690. ret = bearssl_connect_step2(data, conn, sockindex);
  691. if(ret || (nonblocking &&
  692. (ssl_connect_2 == connssl->connecting_state ||
  693. ssl_connect_2_reading == connssl->connecting_state ||
  694. ssl_connect_2_writing == connssl->connecting_state)))
  695. return ret;
  696. }
  697. if(ssl_connect_3 == connssl->connecting_state) {
  698. ret = bearssl_connect_step3(data, conn, sockindex);
  699. if(ret)
  700. return ret;
  701. }
  702. if(ssl_connect_done == connssl->connecting_state) {
  703. connssl->state = ssl_connection_complete;
  704. conn->recv[sockindex] = bearssl_recv;
  705. conn->send[sockindex] = bearssl_send;
  706. *done = TRUE;
  707. }
  708. else
  709. *done = FALSE;
  710. /* Reset our connect state machine */
  711. connssl->connecting_state = ssl_connect_1;
  712. return CURLE_OK;
  713. }
  714. static size_t bearssl_version(char *buffer, size_t size)
  715. {
  716. return msnprintf(buffer, size, "BearSSL");
  717. }
  718. static bool bearssl_data_pending(const struct connectdata *conn,
  719. int connindex)
  720. {
  721. const struct ssl_connect_data *connssl = &conn->ssl[connindex];
  722. struct ssl_backend_data *backend = connssl->backend;
  723. return br_ssl_engine_current_state(&backend->ctx.eng) & BR_SSL_RECVAPP;
  724. }
  725. static CURLcode bearssl_random(struct Curl_easy *data UNUSED_PARAM,
  726. unsigned char *entropy, size_t length)
  727. {
  728. static br_hmac_drbg_context ctx;
  729. static bool seeded = FALSE;
  730. if(!seeded) {
  731. br_prng_seeder seeder;
  732. br_hmac_drbg_init(&ctx, &br_sha256_vtable, NULL, 0);
  733. seeder = br_prng_seeder_system(NULL);
  734. if(!seeder || !seeder(&ctx.vtable))
  735. return CURLE_FAILED_INIT;
  736. seeded = TRUE;
  737. }
  738. br_hmac_drbg_generate(&ctx, entropy, length);
  739. return CURLE_OK;
  740. }
  741. static CURLcode bearssl_connect(struct Curl_easy *data,
  742. struct connectdata *conn, int sockindex)
  743. {
  744. CURLcode ret;
  745. bool done = FALSE;
  746. ret = bearssl_connect_common(data, conn, sockindex, FALSE, &done);
  747. if(ret)
  748. return ret;
  749. DEBUGASSERT(done);
  750. return CURLE_OK;
  751. }
  752. static CURLcode bearssl_connect_nonblocking(struct Curl_easy *data,
  753. struct connectdata *conn,
  754. int sockindex, bool *done)
  755. {
  756. return bearssl_connect_common(data, conn, sockindex, TRUE, done);
  757. }
  758. static void *bearssl_get_internals(struct ssl_connect_data *connssl,
  759. CURLINFO info UNUSED_PARAM)
  760. {
  761. struct ssl_backend_data *backend = connssl->backend;
  762. return &backend->ctx;
  763. }
  764. static void bearssl_close(struct Curl_easy *data,
  765. struct connectdata *conn, int sockindex)
  766. {
  767. struct ssl_connect_data *connssl = &conn->ssl[sockindex];
  768. struct ssl_backend_data *backend = connssl->backend;
  769. size_t i;
  770. if(backend->active) {
  771. br_ssl_engine_close(&backend->ctx.eng);
  772. (void)bearssl_run_until(data, conn, sockindex, BR_SSL_CLOSED);
  773. }
  774. for(i = 0; i < backend->anchors_len; ++i)
  775. free(backend->anchors[i].dn.data);
  776. free(backend->anchors);
  777. }
  778. static void bearssl_session_free(void *ptr)
  779. {
  780. free(ptr);
  781. }
  782. static CURLcode bearssl_sha256sum(const unsigned char *input,
  783. size_t inputlen,
  784. unsigned char *sha256sum,
  785. size_t sha256len UNUSED_PARAM)
  786. {
  787. br_sha256_context ctx;
  788. br_sha256_init(&ctx);
  789. br_sha256_update(&ctx, input, inputlen);
  790. br_sha256_out(&ctx, sha256sum);
  791. return CURLE_OK;
  792. }
  793. const struct Curl_ssl Curl_ssl_bearssl = {
  794. { CURLSSLBACKEND_BEARSSL, "bearssl" }, /* info */
  795. SSLSUPP_CAINFO_BLOB,
  796. sizeof(struct ssl_backend_data),
  797. Curl_none_init, /* init */
  798. Curl_none_cleanup, /* cleanup */
  799. bearssl_version, /* version */
  800. Curl_none_check_cxn, /* check_cxn */
  801. Curl_none_shutdown, /* shutdown */
  802. bearssl_data_pending, /* data_pending */
  803. bearssl_random, /* random */
  804. Curl_none_cert_status_request, /* cert_status_request */
  805. bearssl_connect, /* connect */
  806. bearssl_connect_nonblocking, /* connect_nonblocking */
  807. Curl_ssl_getsock, /* getsock */
  808. bearssl_get_internals, /* get_internals */
  809. bearssl_close, /* close_one */
  810. Curl_none_close_all, /* close_all */
  811. bearssl_session_free, /* session_free */
  812. Curl_none_set_engine, /* set_engine */
  813. Curl_none_set_engine_default, /* set_engine_default */
  814. Curl_none_engines_list, /* engines_list */
  815. Curl_none_false_start, /* false_start */
  816. bearssl_sha256sum, /* sha256sum */
  817. NULL, /* associate_connection */
  818. NULL /* disassociate_connection */
  819. };
  820. #endif /* USE_BEARSSL */