| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574 |
- /*
- * libwebsockets - small server side websockets and web server implementation
- *
- * Copyright (C) 2010 - 2019 Andy Green <[email protected]>
- *
- * Permission is hereby granted, free of charge, to any person obtaining a copy
- * of this software and associated documentation files (the "Software"), to
- * deal in the Software without restriction, including without limitation the
- * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
- * sell copies of the Software, and to permit persons to whom the Software is
- * furnished to do so, subject to the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in
- * all copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
- * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
- * IN THE SOFTWARE.
- */
- #include "private-lib-core.h"
- #include "private-lib-tls-openssl.h"
- #include <errno.h>
- int openssl_websocket_private_data_index,
- openssl_SSL_CTX_private_data_index;
- /*
- * Care: many openssl apis return 1 for success. These are translated to the
- * lws convention of 0 for success.
- */
- int lws_openssl_describe_cipher(struct lws *wsi)
- {
- #if !defined(LWS_WITH_NO_LOGS) && !defined(USE_WOLFSSL)
- int np = -1;
- SSL *s = wsi->tls.ssl;
- SSL_get_cipher_bits(s, &np);
- lwsl_info("%s: wsi %p: %s, %s, %d bits, %s\n", __func__, wsi,
- SSL_get_cipher_name(s), SSL_get_cipher(s), np,
- SSL_get_cipher_version(s));
- #endif
- return 0;
- }
- int lws_ssl_get_error(struct lws *wsi, int n)
- {
- int m;
- if (!wsi->tls.ssl)
- return 99;
- m = SSL_get_error(wsi->tls.ssl, n);
- lwsl_debug("%s: %p %d -> %d (errno %d)\n", __func__, wsi->tls.ssl, n, m,
- errno);
- if (m == SSL_ERROR_SSL)
- lws_tls_err_describe_clear();
- // assert (errno != 9);
- return m;
- }
- #if defined(LWS_WITH_SERVER)
- static int
- lws_context_init_ssl_pem_passwd_cb(char *buf, int size, int rwflag,
- void *userdata)
- {
- struct lws_context_creation_info * info =
- (struct lws_context_creation_info *)userdata;
- strncpy(buf, info->ssl_private_key_password, size);
- buf[size - 1] = '\0';
- return (int)strlen(buf);
- }
- #endif
- #if defined(LWS_WITH_CLIENT)
- static int
- lws_context_init_ssl_pem_passwd_client_cb(char *buf, int size, int rwflag,
- void *userdata)
- {
- struct lws_context_creation_info * info =
- (struct lws_context_creation_info *)userdata;
- const char *p = info->ssl_private_key_password;
- if (info->client_ssl_private_key_password)
- p = info->client_ssl_private_key_password;
- strncpy(buf, p, size);
- buf[size - 1] = '\0';
- return (int)strlen(buf);
- }
- #endif
- void
- lws_ssl_bind_passphrase(SSL_CTX *ssl_ctx, int is_client,
- const struct lws_context_creation_info *info)
- {
- if (
- #if defined(LWS_WITH_SERVER)
- !info->ssl_private_key_password
- #endif
- #if defined(LWS_WITH_SERVER) && defined(LWS_WITH_CLIENT)
- &&
- #endif
- #if defined(LWS_WITH_CLIENT)
- !info->client_ssl_private_key_password
- #endif
- )
- return;
- /*
- * password provided, set ssl callback and user data
- * for checking password which will be trigered during
- * SSL_CTX_use_PrivateKey_file function
- */
- SSL_CTX_set_default_passwd_cb_userdata(ssl_ctx, (void *)info);
- SSL_CTX_set_default_passwd_cb(ssl_ctx, is_client ?
- #if defined(LWS_WITH_CLIENT)
- lws_context_init_ssl_pem_passwd_client_cb:
- #else
- NULL:
- #endif
- #if defined(LWS_WITH_SERVER)
- lws_context_init_ssl_pem_passwd_cb
- #else
- NULL
- #endif
- );
- }
- #if defined(LWS_WITH_CLIENT)
- static void
- lws_ssl_destroy_client_ctx(struct lws_vhost *vhost)
- {
- struct lws_tls_client_reuse *tcr;
- if (vhost->tls.user_supplied_ssl_ctx || !vhost->tls.ssl_client_ctx)
- return;
- tcr = SSL_CTX_get_ex_data(vhost->tls.ssl_client_ctx,
- openssl_SSL_CTX_private_data_index);
- if (!tcr || --tcr->refcount)
- return;
- SSL_CTX_free(vhost->tls.ssl_client_ctx);
- vhost->tls.ssl_client_ctx = NULL;
- vhost->context->tls.count_client_contexts--;
- lws_dll2_remove(&tcr->cc_list);
- lws_free(tcr);
- }
- #endif
- void
- lws_ssl_destroy(struct lws_vhost *vhost)
- {
- if (!lws_check_opt(vhost->context->options,
- LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT))
- return;
- if (vhost->tls.ssl_ctx)
- SSL_CTX_free(vhost->tls.ssl_ctx);
- #if defined(LWS_WITH_CLIENT)
- lws_ssl_destroy_client_ctx(vhost);
- #endif
- // after 1.1.0 no need
- #if (OPENSSL_VERSION_NUMBER < 0x10100000)
- // <= 1.0.1f = old api, 1.0.1g+ = new api
- #if (OPENSSL_VERSION_NUMBER <= 0x1000106f) || defined(USE_WOLFSSL)
- ERR_remove_state(0);
- #else
- #if OPENSSL_VERSION_NUMBER >= 0x1010005f && \
- !defined(LIBRESSL_VERSION_NUMBER) && \
- !defined(OPENSSL_IS_BORINGSSL)
- ERR_remove_thread_state();
- #else
- ERR_remove_thread_state(NULL);
- #endif
- #endif
- /* not needed after 1.1.0 */
- #if (OPENSSL_VERSION_NUMBER >= 0x10002000) && \
- (OPENSSL_VERSION_NUMBER <= 0x10100000)
- SSL_COMP_free_compression_methods();
- #endif
- ERR_free_strings();
- EVP_cleanup();
- CRYPTO_cleanup_all_ex_data();
- #endif
- }
- int
- lws_ssl_capable_read(struct lws *wsi, unsigned char *buf, int len)
- {
- struct lws_context *context = wsi->a.context;
- struct lws_context_per_thread *pt = &context->pt[(int)wsi->tsi];
- int n = 0, m;
- if (!wsi->tls.ssl)
- return lws_ssl_capable_read_no_ssl(wsi, buf, len);
- lws_stats_bump(pt, LWSSTATS_C_API_READ, 1);
- errno = 0;
- ERR_clear_error();
- n = SSL_read(wsi->tls.ssl, buf, len);
- #if defined(LWS_PLAT_FREERTOS)
- if (!n && errno == LWS_ENOTCONN) {
- lwsl_debug("%p: SSL_read ENOTCONN\n", wsi);
- return LWS_SSL_CAPABLE_ERROR;
- }
- #endif
- #if defined(LWS_WITH_STATS)
- if (!wsi->seen_rx && wsi->accept_start_us) {
- lws_stats_bump(pt, LWSSTATS_US_SSL_RX_DELAY_AVG,
- lws_now_usecs() -
- wsi->accept_start_us);
- lws_stats_bump(pt, LWSSTATS_C_SSL_CONNS_HAD_RX, 1);
- wsi->seen_rx = 1;
- }
- #endif
- lwsl_debug("%p: SSL_read says %d\n", wsi, n);
- /* manpage: returning 0 means connection shut down
- *
- * 2018-09-10: https://github.com/openssl/openssl/issues/1903
- *
- * So, in summary, if you get a 0 or -1 return from SSL_read() /
- * SSL_write(), you should call SSL_get_error():
- *
- * - If you get back SSL_ERROR_RETURN_ZERO then you know the connection
- * has been cleanly shutdown by the peer. To fully close the
- * connection you may choose to call SSL_shutdown() to send a
- * close_notify back.
- *
- * - If you get back SSL_ERROR_SSL then some kind of internal or
- * protocol error has occurred. More details will be on the SSL error
- * queue. You can also call SSL_get_shutdown(). If this indicates a
- * state of SSL_RECEIVED_SHUTDOWN then you know a fatal alert has
- * been received from the peer (if it had been a close_notify then
- * SSL_get_error() would have returned SSL_ERROR_RETURN_ZERO).
- * SSL_ERROR_SSL is considered fatal - you should not call
- * SSL_shutdown() in this case.
- *
- * - If you get back SSL_ERROR_SYSCALL then some kind of fatal (i.e.
- * non-retryable) error has occurred in a system call.
- */
- if (n <= 0) {
- m = lws_ssl_get_error(wsi, n);
- lwsl_debug("%p: ssl err %d errno %d\n", wsi, m, errno);
- if (m == SSL_ERROR_ZERO_RETURN) /* cleanly shut down */
- return LWS_SSL_CAPABLE_ERROR;
- /* hm not retryable.. could be 0 size pkt or error */
- if (m == SSL_ERROR_SSL || m == SSL_ERROR_SYSCALL ||
- errno == LWS_ENOTCONN) {
- /* unclean, eg closed conn */
- wsi->socket_is_permanently_unusable = 1;
- return LWS_SSL_CAPABLE_ERROR;
- }
- /* retryable? */
- if (SSL_want_read(wsi->tls.ssl)) {
- lwsl_debug("%s: WANT_READ\n", __func__);
- lwsl_debug("%p: LWS_SSL_CAPABLE_MORE_SERVICE\n", wsi);
- return LWS_SSL_CAPABLE_MORE_SERVICE;
- }
- if (SSL_want_write(wsi->tls.ssl)) {
- lwsl_debug("%s: WANT_WRITE\n", __func__);
- lwsl_debug("%p: LWS_SSL_CAPABLE_MORE_SERVICE\n", wsi);
- return LWS_SSL_CAPABLE_MORE_SERVICE;
- }
- /* keep on trucking it seems */
- }
- #if 0
- /*
- * If using openssl type tls library, this is the earliest point for all
- * paths to dump what was received as decrypted data from the tls tunnel
- */
- lwsl_notice("%s: len %d\n", __func__, n);
- lwsl_hexdump_notice(buf, n);
- #endif
- lws_stats_bump(pt, LWSSTATS_B_READ, n);
- #if defined(LWS_WITH_SERVER_STATUS)
- if (wsi->a.vhost)
- wsi->a.vhost->conn_stats.rx += n;
- #endif
- #if defined(LWS_WITH_DETAILED_LATENCY)
- if (context->detailed_latency_cb) {
- wsi->detlat.req_size = len;
- wsi->detlat.acc_size = n;
- wsi->detlat.type = LDLT_READ;
- wsi->detlat.latencies[LAT_DUR_PROXY_RX_TO_ONWARD_TX] =
- lws_now_usecs() - pt->ust_left_poll;
- wsi->detlat.latencies[LAT_DUR_USERCB] = 0;
- lws_det_lat_cb(wsi->a.context, &wsi->detlat);
- }
- #endif
- /*
- * if it was our buffer that limited what we read,
- * check if SSL has additional data pending inside SSL buffers.
- *
- * Because these won't signal at the network layer with POLLIN
- * and if we don't realize, this data will sit there forever
- */
- if (n != len)
- goto bail;
- if (!wsi->tls.ssl)
- goto bail;
- if (SSL_pending(wsi->tls.ssl)) {
- if (lws_dll2_is_detached(&wsi->tls.dll_pending_tls))
- lws_dll2_add_head(&wsi->tls.dll_pending_tls,
- &pt->tls.dll_pending_tls_owner);
- } else
- __lws_ssl_remove_wsi_from_buffered_list(wsi);
- return n;
- bail:
- lws_ssl_remove_wsi_from_buffered_list(wsi);
- return n;
- }
- int
- lws_ssl_pending(struct lws *wsi)
- {
- if (!wsi->tls.ssl)
- return 0;
- return SSL_pending(wsi->tls.ssl);
- }
- int
- lws_ssl_capable_write(struct lws *wsi, unsigned char *buf, int len)
- {
- int n, m;
- #if 0
- /*
- * If using OpenSSL type tls library, this is the last point for all
- * paths before sending data into the tls tunnel, where you can dump it
- * and see what is being sent.
- */
- lwsl_notice("%s: len %d\n", __func__, len);
- lwsl_hexdump_notice(buf, len);
- #endif
- if (!wsi->tls.ssl)
- return lws_ssl_capable_write_no_ssl(wsi, buf, len);
- errno = 0;
- ERR_clear_error();
- n = SSL_write(wsi->tls.ssl, buf, len);
- if (n > 0)
- return n;
- m = lws_ssl_get_error(wsi, n);
- if (m != SSL_ERROR_SYSCALL) {
- if (m == SSL_ERROR_WANT_READ || SSL_want_read(wsi->tls.ssl)) {
- lwsl_notice("%s: want read\n", __func__);
- return LWS_SSL_CAPABLE_MORE_SERVICE;
- }
- if (m == SSL_ERROR_WANT_WRITE || SSL_want_write(wsi->tls.ssl)) {
- lws_set_blocking_send(wsi);
- lwsl_debug("%s: want write\n", __func__);
- return LWS_SSL_CAPABLE_MORE_SERVICE;
- }
- }
- lwsl_debug("%s failed: %s\n",__func__, ERR_error_string(m, NULL));
- lws_tls_err_describe_clear();
- wsi->socket_is_permanently_unusable = 1;
- return LWS_SSL_CAPABLE_ERROR;
- }
- void
- lws_ssl_info_callback(const SSL *ssl, int where, int ret)
- {
- struct lws *wsi;
- struct lws_context *context;
- struct lws_ssl_info si;
- int fd;
- #ifndef USE_WOLFSSL
- context = (struct lws_context *)SSL_CTX_get_ex_data(
- SSL_get_SSL_CTX(ssl),
- openssl_SSL_CTX_private_data_index);
- #else
- context = (struct lws_context *)SSL_CTX_get_ex_data(
- SSL_get_SSL_CTX((SSL*) ssl),
- openssl_SSL_CTX_private_data_index);
- #endif
- if (!context)
- return;
- fd = SSL_get_fd(ssl);
- if (fd < 0 || (fd - lws_plat_socket_offset()) < 0)
- return;
- wsi = wsi_from_fd(context, fd);
- if (!wsi)
- return;
- if (!(where & wsi->a.vhost->tls.ssl_info_event_mask))
- return;
- si.where = where;
- si.ret = ret;
- if (user_callback_handle_rxflow(wsi->a.protocol->callback,
- wsi, LWS_CALLBACK_SSL_INFO,
- wsi->user_space, &si, 0))
- lws_set_timeout(wsi, PENDING_TIMEOUT_KILLED_BY_SSL_INFO, -1);
- }
- int
- lws_ssl_close(struct lws *wsi)
- {
- lws_sockfd_type n;
- if (!wsi->tls.ssl)
- return 0; /* not handled */
- #if defined (LWS_HAVE_SSL_SET_INFO_CALLBACK)
- /* kill ssl callbacks, because we will remove the fd from the
- * table linking it to the wsi
- */
- if (wsi->a.vhost->tls.ssl_info_event_mask)
- SSL_set_info_callback(wsi->tls.ssl, NULL);
- #endif
- n = SSL_get_fd(wsi->tls.ssl);
- if (!wsi->socket_is_permanently_unusable)
- SSL_shutdown(wsi->tls.ssl);
- compatible_close(n);
- SSL_free(wsi->tls.ssl);
- wsi->tls.ssl = NULL;
- lws_tls_restrict_return(wsi->a.context);
- // lwsl_notice("%s: ssl restr %d, simul %d\n", __func__,
- // wsi->a.context->simultaneous_ssl_restriction,
- // wsi->a.context->simultaneous_ssl);
- return 1; /* handled */
- }
- void
- lws_ssl_SSL_CTX_destroy(struct lws_vhost *vhost)
- {
- if (vhost->tls.ssl_ctx)
- SSL_CTX_free(vhost->tls.ssl_ctx);
- #if defined(LWS_WITH_CLIENT)
- lws_ssl_destroy_client_ctx(vhost);
- #endif
- #if defined(LWS_WITH_ACME)
- lws_tls_acme_sni_cert_destroy(vhost);
- #endif
- }
- void
- lws_ssl_context_destroy(struct lws_context *context)
- {
- // after 1.1.0 no need
- #if (OPENSSL_VERSION_NUMBER < 0x10100000)
- // <= 1.0.1f = old api, 1.0.1g+ = new api
- #if (OPENSSL_VERSION_NUMBER <= 0x1000106f) || defined(USE_WOLFSSL)
- ERR_remove_state(0);
- #else
- #if OPENSSL_VERSION_NUMBER >= 0x1010005f && \
- !defined(LIBRESSL_VERSION_NUMBER) && \
- !defined(OPENSSL_IS_BORINGSSL)
- ERR_remove_thread_state();
- #else
- ERR_remove_thread_state(NULL);
- #endif
- #endif
- // after 1.1.0 no need
- #if (OPENSSL_VERSION_NUMBER >= 0x10002000) && (OPENSSL_VERSION_NUMBER <= 0x10100000)
- SSL_COMP_free_compression_methods();
- #endif
- ERR_free_strings();
- EVP_cleanup();
- CRYPTO_cleanup_all_ex_data();
- #endif
- }
- lws_tls_ctx *
- lws_tls_ctx_from_wsi(struct lws *wsi)
- {
- if (!wsi->tls.ssl)
- return NULL;
- return SSL_get_SSL_CTX(wsi->tls.ssl);
- }
- enum lws_ssl_capable_status
- __lws_tls_shutdown(struct lws *wsi)
- {
- int n;
- errno = 0;
- ERR_clear_error();
- n = SSL_shutdown(wsi->tls.ssl);
- lwsl_debug("SSL_shutdown=%d for fd %d\n", n, wsi->desc.sockfd);
- switch (n) {
- case 1: /* successful completion */
- n = shutdown(wsi->desc.sockfd, SHUT_WR);
- return LWS_SSL_CAPABLE_DONE;
- case 0: /* needs a retry */
- __lws_change_pollfd(wsi, 0, LWS_POLLIN);
- return LWS_SSL_CAPABLE_MORE_SERVICE;
- default: /* fatal error, or WANT */
- n = SSL_get_error(wsi->tls.ssl, n);
- if (n != SSL_ERROR_SYSCALL && n != SSL_ERROR_SSL) {
- if (SSL_want_read(wsi->tls.ssl)) {
- lwsl_debug("(wants read)\n");
- __lws_change_pollfd(wsi, 0, LWS_POLLIN);
- return LWS_SSL_CAPABLE_MORE_SERVICE_READ;
- }
- if (SSL_want_write(wsi->tls.ssl)) {
- lwsl_debug("(wants write)\n");
- __lws_change_pollfd(wsi, 0, LWS_POLLOUT);
- return LWS_SSL_CAPABLE_MORE_SERVICE_WRITE;
- }
- }
- return LWS_SSL_CAPABLE_ERROR;
- }
- }
- static int
- tops_fake_POLLIN_for_buffered_openssl(struct lws_context_per_thread *pt)
- {
- return lws_tls_fake_POLLIN_for_buffered(pt);
- }
- const struct lws_tls_ops tls_ops_openssl = {
- /* fake_POLLIN_for_buffered */ tops_fake_POLLIN_for_buffered_openssl,
- };
|