ssl.c 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782
  1. #define HL_NAME(n) ssl_##n
  2. #define _WINSOCKAPI_
  3. #include <hl.h>
  4. #ifdef HL_WIN
  5. #include <winsock2.h>
  6. #include <wincrypt.h>
  7. #else
  8. #include <sys/socket.h>
  9. #include <strings.h>
  10. #include <errno.h>
  11. typedef int SOCKET;
  12. #endif
  13. #include <stdio.h>
  14. #include <string.h>
  15. #ifdef HL_MAC
  16. #include <Security/Security.h>
  17. #endif
  18. #define SOCKET_ERROR (-1)
  19. #define NRETRYS 20
  20. #include "mbedtls/platform.h"
  21. #include "mbedtls/error.h"
  22. #include "mbedtls/entropy.h"
  23. #include "mbedtls/ctr_drbg.h"
  24. #include "mbedtls/md.h"
  25. #include "mbedtls/pk.h"
  26. #include "mbedtls/oid.h"
  27. #include "mbedtls/x509_crt.h"
  28. #include "mbedtls/ssl.h"
  29. #ifdef HL_CONSOLE
  30. mbedtls_x509_crt *hl_init_cert_chain();
  31. #endif
  32. #if defined(HL_WIN) || defined(HL_MAC) || defined(HL_IOS) || defined(HL_TVOS)
  33. # define MSG_NOSIGNAL 0
  34. #endif
  35. // Duplicate from socket.c
  36. typedef struct _hl_socket {
  37. SOCKET sock;
  38. } hl_socket;
  39. typedef struct _hl_ssl_cert hl_ssl_cert;
  40. struct _hl_ssl_cert {
  41. void(*finalize)(hl_ssl_cert *);
  42. mbedtls_x509_crt *c;
  43. };
  44. typedef struct _hl_ssl_pkey hl_ssl_pkey;
  45. struct _hl_ssl_pkey {
  46. void(*finalize)(hl_ssl_pkey *);
  47. mbedtls_pk_context *k;
  48. };
  49. #define _SOCK _ABSTRACT(hl_socket)
  50. #define TSSL _ABSTRACT(mbedtls_ssl_context)
  51. #define TCONF _ABSTRACT(mbedtls_ssl_config)
  52. #define TCERT _ABSTRACT(hl_ssl_cert)
  53. #define TPKEY _ABSTRACT(hl_ssl_pkey)
  54. static bool ssl_init_done = false;
  55. static mbedtls_entropy_context entropy;
  56. static mbedtls_ctr_drbg_context ctr_drbg;
  57. static bool is_ssl_blocking( int r ) {
  58. return r == MBEDTLS_ERR_SSL_WANT_READ || r == MBEDTLS_ERR_SSL_WANT_WRITE;
  59. }
  60. static int ssl_block_error( int r ) {
  61. return is_ssl_blocking(r) ? -1 : -2;
  62. }
  63. static void cert_finalize(hl_ssl_cert *c) {
  64. mbedtls_x509_crt_free(c->c);
  65. free(c->c);
  66. c->c = NULL;
  67. }
  68. static void pkey_finalize(hl_ssl_pkey *k) {
  69. mbedtls_pk_free(k->k);
  70. free(k->k);
  71. k->k = NULL;
  72. }
  73. static int ssl_error(int ret) {
  74. char buf[128];
  75. uchar buf16[128];
  76. mbedtls_strerror(ret, buf, sizeof(buf));
  77. hl_from_utf8(buf16, (int)strlen(buf), buf);
  78. hl_error("%s",buf16);
  79. return ret;
  80. }
  81. HL_PRIM mbedtls_ssl_context *HL_NAME(ssl_new)(mbedtls_ssl_config *config) {
  82. int ret;
  83. mbedtls_ssl_context *ssl;
  84. ssl = (mbedtls_ssl_context *)hl_gc_alloc_noptr(sizeof(mbedtls_ssl_context));
  85. mbedtls_ssl_init(ssl);
  86. if ((ret = mbedtls_ssl_setup(ssl, config)) != 0) {
  87. mbedtls_ssl_free(ssl);
  88. ssl_error(ret);
  89. return NULL;
  90. }
  91. return ssl;
  92. }
  93. HL_PRIM void HL_NAME(ssl_close)(mbedtls_ssl_context *ssl) {
  94. mbedtls_ssl_free(ssl);
  95. }
  96. HL_PRIM int HL_NAME(ssl_handshake)(mbedtls_ssl_context *ssl) {
  97. int r;
  98. r = mbedtls_ssl_handshake(ssl);
  99. if( is_ssl_blocking(r) )
  100. return -1;
  101. if( r == MBEDTLS_ERR_SSL_CONN_EOF )
  102. return -2;
  103. if( r != 0 )
  104. return ssl_error(r);
  105. return 0;
  106. }
  107. static bool is_block_error() {
  108. #ifdef HL_WIN
  109. int err = WSAGetLastError();
  110. if (err == WSAEWOULDBLOCK || err == WSAEALREADY || err == WSAETIMEDOUT)
  111. #else
  112. if (errno == EAGAIN || errno == EWOULDBLOCK || errno == EINPROGRESS || errno == EALREADY)
  113. #endif
  114. return true;
  115. return false;
  116. }
  117. static int net_read(void *fd, unsigned char *buf, size_t len) {
  118. int r = recv((SOCKET)(int_val)fd, (char *)buf, (int)len, MSG_NOSIGNAL);
  119. if( r == SOCKET_ERROR && is_block_error() )
  120. return MBEDTLS_ERR_SSL_WANT_READ;
  121. return r;
  122. }
  123. static int net_write(void *fd, const unsigned char *buf, size_t len) {
  124. int r = send((SOCKET)(int_val)fd, (char *)buf, (int)len, MSG_NOSIGNAL);
  125. if( r == SOCKET_ERROR && is_block_error() )
  126. return MBEDTLS_ERR_SSL_WANT_WRITE;
  127. return r;
  128. }
  129. HL_PRIM void HL_NAME(ssl_set_socket)(mbedtls_ssl_context *ssl, hl_socket *socket) {
  130. mbedtls_ssl_set_bio(ssl, (void*)(int_val)socket->sock, net_write, net_read, NULL);
  131. }
  132. static int arr_read( void *arr, unsigned char *buf, size_t len ) {
  133. int r = ((int (*)(vdynamic*,unsigned char*,int))hl_aptr(arr,vclosure*)[1]->fun)( hl_aptr(arr,vdynamic*)[0], buf, (int)len );
  134. if( r == -2 ) return MBEDTLS_ERR_SSL_WANT_READ;
  135. return r;
  136. }
  137. static int arr_write( void *arr, const unsigned char *buf, size_t len ) {
  138. int r = ((int (*)(vdynamic*,const unsigned char*,int))hl_aptr(arr,vclosure*)[2]->fun)( hl_aptr(arr,vdynamic*)[0], buf, (int)len );
  139. if( r == -2 ) return MBEDTLS_ERR_SSL_WANT_WRITE;
  140. return r;
  141. }
  142. HL_PRIM void HL_NAME(ssl_set_bio)( mbedtls_ssl_context *ssl, varray *ctx ) {
  143. mbedtls_ssl_set_bio(ssl, ctx, arr_write, arr_read, NULL);
  144. }
  145. HL_PRIM void HL_NAME(ssl_set_hostname)(mbedtls_ssl_context *ssl, vbyte *hostname) {
  146. int ret;
  147. if ((ret = mbedtls_ssl_set_hostname(ssl, (char*)hostname)) != 0)
  148. ssl_error(ret);
  149. }
  150. HL_PRIM hl_ssl_cert *HL_NAME(ssl_get_peer_certificate)(mbedtls_ssl_context *ssl) {
  151. hl_ssl_cert *cert = (hl_ssl_cert*)hl_gc_alloc_noptr(sizeof(hl_ssl_cert));
  152. cert->c = (mbedtls_x509_crt*)mbedtls_ssl_get_peer_cert(ssl);
  153. return cert;
  154. }
  155. DEFINE_PRIM(TSSL, ssl_new, TCONF);
  156. DEFINE_PRIM(_VOID, ssl_close, TSSL);
  157. DEFINE_PRIM(_I32, ssl_handshake, TSSL);
  158. DEFINE_PRIM(_VOID, ssl_set_bio, TSSL _DYN);
  159. DEFINE_PRIM(_VOID, ssl_set_socket, TSSL _SOCK);
  160. DEFINE_PRIM(_VOID, ssl_set_hostname, TSSL _BYTES);
  161. DEFINE_PRIM(TCERT, ssl_get_peer_certificate, TSSL);
  162. HL_PRIM int HL_NAME(ssl_send_char)(mbedtls_ssl_context *ssl, int c) {
  163. unsigned char cc;
  164. int r;
  165. cc = (unsigned char)c;
  166. r = mbedtls_ssl_write(ssl, &cc, 1);
  167. if( r < 0 )
  168. return ssl_block_error(r);
  169. return 1;
  170. }
  171. HL_PRIM int HL_NAME(ssl_send)(mbedtls_ssl_context *ssl, vbyte *buf, int pos, int len) {
  172. int r = mbedtls_ssl_write(ssl, (const unsigned char *)buf + pos, len);
  173. if( r < 0 )
  174. return ssl_block_error(r);
  175. return r;
  176. }
  177. HL_PRIM int HL_NAME(ssl_recv_char)(mbedtls_ssl_context *ssl) {
  178. unsigned char c;
  179. int ret = mbedtls_ssl_read(ssl, &c, 1);
  180. if( ret != 1 )
  181. return ssl_block_error(ret);
  182. return c;
  183. }
  184. HL_PRIM int HL_NAME(ssl_recv)(mbedtls_ssl_context *ssl, vbyte *buf, int pos, int len) {
  185. int ret = mbedtls_ssl_read(ssl, (unsigned char*)buf+pos, len);
  186. if( ret == MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY )
  187. return 0;
  188. if( ret < 0 )
  189. return ssl_block_error(ret);
  190. return ret;
  191. }
  192. DEFINE_PRIM(_I32, ssl_send_char, TSSL _I32);
  193. DEFINE_PRIM(_I32, ssl_send, TSSL _BYTES _I32 _I32);
  194. DEFINE_PRIM(_I32, ssl_recv_char, TSSL);
  195. DEFINE_PRIM(_I32, ssl_recv, TSSL _BYTES _I32 _I32);
  196. HL_PRIM mbedtls_ssl_config *HL_NAME(conf_new)(bool server) {
  197. int ret;
  198. mbedtls_ssl_config *conf;
  199. conf = (mbedtls_ssl_config *)hl_gc_alloc_noptr(sizeof(mbedtls_ssl_config));
  200. mbedtls_ssl_config_init(conf);
  201. if ((ret = mbedtls_ssl_config_defaults(conf, server ? MBEDTLS_SSL_IS_SERVER : MBEDTLS_SSL_IS_CLIENT,
  202. MBEDTLS_SSL_TRANSPORT_STREAM, 0)) != 0) {
  203. mbedtls_ssl_config_free(conf);
  204. ssl_error(ret);
  205. return NULL;
  206. }
  207. mbedtls_ssl_conf_rng(conf, mbedtls_ctr_drbg_random, &ctr_drbg);
  208. return conf;
  209. }
  210. HL_PRIM void HL_NAME(conf_close)(mbedtls_ssl_config *conf) {
  211. mbedtls_ssl_config_free(conf);
  212. }
  213. HL_PRIM void HL_NAME(conf_set_ca)(mbedtls_ssl_config *conf, hl_ssl_cert *cert) {
  214. mbedtls_ssl_conf_ca_chain(conf, cert->c, NULL);
  215. }
  216. HL_PRIM void HL_NAME(conf_set_verify)(mbedtls_ssl_config *conf, int mode) {
  217. if (mode == 2)
  218. mbedtls_ssl_conf_authmode(conf, MBEDTLS_SSL_VERIFY_OPTIONAL);
  219. else if (mode == 1)
  220. mbedtls_ssl_conf_authmode(conf, MBEDTLS_SSL_VERIFY_REQUIRED);
  221. else
  222. mbedtls_ssl_conf_authmode(conf, MBEDTLS_SSL_VERIFY_NONE);
  223. }
  224. HL_PRIM void HL_NAME(conf_set_cert)(mbedtls_ssl_config *conf, hl_ssl_cert *cert, hl_ssl_pkey *key) {
  225. int r;
  226. if ((r = mbedtls_ssl_conf_own_cert(conf, cert->c, key->k)) != 0)
  227. ssl_error(r);
  228. }
  229. typedef struct {
  230. hl_type *t;
  231. hl_ssl_cert *cert;
  232. hl_ssl_pkey *key;
  233. } sni_callb_ret;
  234. static int sni_callback(void *arg, mbedtls_ssl_context *ctx, const unsigned char *name, size_t len) {
  235. if (name && arg) {
  236. vclosure *c = (vclosure*)arg;
  237. sni_callb_ret *ret;
  238. if( c->hasValue )
  239. ret = ((sni_callb_ret*(*)(void*, vbyte*))c->fun)(c->value, (vbyte*)name);
  240. else
  241. ret = ((sni_callb_ret*(*)(vbyte*))c->fun)((vbyte*)name);
  242. if (ret && ret->cert && ret->key) {
  243. return mbedtls_ssl_set_hs_own_cert(ctx, ret->cert->c, ret->key->k);
  244. }
  245. }
  246. return -1;
  247. }
  248. HL_PRIM void HL_NAME(conf_set_servername_callback)(mbedtls_ssl_config *conf, vclosure *cb) {
  249. mbedtls_ssl_conf_sni(conf, sni_callback, (void *)cb);
  250. }
  251. DEFINE_PRIM(TCONF, conf_new, _BOOL);
  252. DEFINE_PRIM(_VOID, conf_close, TCONF);
  253. DEFINE_PRIM(_VOID, conf_set_ca, TCONF TCERT);
  254. DEFINE_PRIM(_VOID, conf_set_verify, TCONF _I32);
  255. DEFINE_PRIM(_VOID, conf_set_cert, TCONF TCERT TPKEY);
  256. DEFINE_PRIM(_VOID, conf_set_servername_callback, TCONF _FUN(_OBJ(TCERT TPKEY), _BYTES));
  257. HL_PRIM hl_ssl_cert *HL_NAME(cert_load_file)(vbyte *file) {
  258. #ifdef HL_CONSOLE
  259. return NULL;
  260. #else
  261. int r;
  262. hl_ssl_cert *cert;
  263. mbedtls_x509_crt *x = (mbedtls_x509_crt*)malloc(sizeof(mbedtls_x509_crt));
  264. mbedtls_x509_crt_init(x);
  265. if ((r = mbedtls_x509_crt_parse_file(x, (char*)file)) != 0) {
  266. mbedtls_x509_crt_free(x);
  267. free(x);
  268. ssl_error(r);
  269. return NULL;
  270. }
  271. cert = (hl_ssl_cert*)hl_gc_alloc_finalizer(sizeof(hl_ssl_cert));
  272. cert->c = x;
  273. cert->finalize = cert_finalize;
  274. return cert;
  275. #endif
  276. }
  277. HL_PRIM hl_ssl_cert *HL_NAME(cert_load_path)(vbyte *path) {
  278. #ifdef HL_CONSOLE
  279. return NULL;
  280. #else
  281. int r;
  282. hl_ssl_cert *cert;
  283. mbedtls_x509_crt *x = (mbedtls_x509_crt*)malloc(sizeof(mbedtls_x509_crt));
  284. mbedtls_x509_crt_init(x);
  285. if ((r = mbedtls_x509_crt_parse_path(x, (char*)path)) != 0) {
  286. mbedtls_x509_crt_free(x);
  287. free(x);
  288. ssl_error(r);
  289. return NULL;
  290. }
  291. cert = (hl_ssl_cert*)hl_gc_alloc_finalizer(sizeof(hl_ssl_cert));
  292. cert->c = x;
  293. cert->finalize = cert_finalize;
  294. return cert;
  295. #endif
  296. }
  297. HL_PRIM hl_ssl_cert *HL_NAME(cert_load_defaults)() {
  298. hl_ssl_cert *v = NULL;
  299. mbedtls_x509_crt *chain = NULL;
  300. #if defined(HL_WIN)
  301. HCERTSTORE store;
  302. PCCERT_CONTEXT cert;
  303. if (store = CertOpenSystemStore(0, (LPCWSTR)L"Root")) {
  304. cert = NULL;
  305. while (cert = CertEnumCertificatesInStore(store, cert)) {
  306. if (chain == NULL) {
  307. chain = (mbedtls_x509_crt*)malloc(sizeof(mbedtls_x509_crt));
  308. mbedtls_x509_crt_init(chain);
  309. }
  310. mbedtls_x509_crt_parse_der(chain, (unsigned char *)cert->pbCertEncoded, cert->cbCertEncoded);
  311. }
  312. CertCloseStore(store, 0);
  313. }
  314. #elif defined(HL_MAC)
  315. CFMutableDictionaryRef search;
  316. CFArrayRef result;
  317. SecKeychainRef keychain;
  318. SecCertificateRef item;
  319. CFDataRef dat;
  320. // Load keychain
  321. if (SecKeychainOpen("/System/Library/Keychains/SystemRootCertificates.keychain", &keychain) != errSecSuccess)
  322. return NULL;
  323. // Search for certificates
  324. search = CFDictionaryCreateMutable(NULL, 0, NULL, NULL);
  325. CFDictionarySetValue(search, kSecClass, kSecClassCertificate);
  326. CFDictionarySetValue(search, kSecMatchLimit, kSecMatchLimitAll);
  327. CFDictionarySetValue(search, kSecReturnRef, kCFBooleanTrue);
  328. CFDictionarySetValue(search, kSecMatchSearchList, CFArrayCreate(NULL, (const void **)&keychain, 1, NULL));
  329. if (SecItemCopyMatching(search, (CFTypeRef *)&result) == errSecSuccess) {
  330. CFIndex n = CFArrayGetCount(result);
  331. for (CFIndex i = 0; i < n; i++) {
  332. item = (SecCertificateRef)CFArrayGetValueAtIndex(result, i);
  333. // Get certificate in DER format
  334. dat = SecCertificateCopyData(item);
  335. if (dat) {
  336. if (chain == NULL) {
  337. chain = (mbedtls_x509_crt*)malloc(sizeof(mbedtls_x509_crt));
  338. mbedtls_x509_crt_init(chain);
  339. }
  340. mbedtls_x509_crt_parse_der(chain, (unsigned char *)CFDataGetBytePtr(dat), CFDataGetLength(dat));
  341. CFRelease(dat);
  342. }
  343. }
  344. }
  345. CFRelease(keychain);
  346. #elif defined(HL_CONSOLE)
  347. chain = hl_init_cert_chain();
  348. #endif
  349. if (chain != NULL) {
  350. v = (hl_ssl_cert*)hl_gc_alloc_finalizer(sizeof(hl_ssl_cert));
  351. v->c = chain;
  352. v->finalize = cert_finalize;
  353. }
  354. return v;
  355. }
  356. static vbyte *asn1_buf_to_string(mbedtls_asn1_buf *dat) {
  357. unsigned int i, c;
  358. hl_buffer *buf = hl_alloc_buffer();
  359. for (i = 0; i < dat->len; i++) {
  360. c = dat->p[i];
  361. if (c < 32 || c == 127 || (c > 128 && c < 160))
  362. hl_buffer_char(buf, '?');
  363. else
  364. hl_buffer_char(buf, c);
  365. }
  366. return (vbyte*)hl_buffer_content(buf,NULL);
  367. }
  368. HL_PRIM vbyte *HL_NAME(cert_get_subject)(hl_ssl_cert *cert, vbyte *objname) {
  369. mbedtls_x509_name *obj;
  370. int r;
  371. const char *oname, *rname;
  372. obj = &cert->c->subject;
  373. if (obj == NULL)
  374. hl_error("Invalid subject");
  375. rname = (char*)objname;
  376. while (obj != NULL) {
  377. r = mbedtls_oid_get_attr_short_name(&obj->oid, &oname);
  378. if (r == 0 && strcmp(oname, rname) == 0)
  379. return asn1_buf_to_string(&obj->val);
  380. obj = obj->next;
  381. }
  382. return NULL;
  383. }
  384. HL_PRIM vbyte *HL_NAME(cert_get_issuer)(hl_ssl_cert *cert, vbyte *objname) {
  385. mbedtls_x509_name *obj;
  386. int r;
  387. const char *oname, *rname;
  388. obj = &cert->c->issuer;
  389. if (obj == NULL)
  390. hl_error("Invalid issuer");
  391. rname = (char*)objname;
  392. while (obj != NULL) {
  393. r = mbedtls_oid_get_attr_short_name(&obj->oid, &oname);
  394. if (r == 0 && strcmp(oname, rname) == 0)
  395. return asn1_buf_to_string(&obj->val);
  396. obj = obj->next;
  397. }
  398. return NULL;
  399. }
  400. HL_PRIM varray *HL_NAME(cert_get_altnames)(hl_ssl_cert *cert) {
  401. mbedtls_asn1_sequence *cur;
  402. int count = 0;
  403. int pos = 0;
  404. varray *a = NULL;
  405. vbyte **current = NULL;
  406. mbedtls_x509_crt *crt = cert->c;
  407. #if MBEDTLS_VERSION_MAJOR >= 3
  408. if (mbedtls_x509_crt_has_ext_type(crt, MBEDTLS_X509_EXT_SUBJECT_ALT_NAME)) {
  409. #else
  410. if (crt->ext_types & MBEDTLS_X509_EXT_SUBJECT_ALT_NAME) {
  411. #endif
  412. cur = &crt->subject_alt_names;
  413. while (cur != NULL) {
  414. if (pos == count) {
  415. int ncount = count == 0 ? 16 : count * 2;
  416. varray *narr = hl_alloc_array(&hlt_bytes, ncount);
  417. vbyte **ncur = hl_aptr(narr, vbyte*);
  418. memcpy(ncur, current, count * sizeof(void*));
  419. current = ncur;
  420. a = narr;
  421. count = ncount;
  422. }
  423. current[pos++] = asn1_buf_to_string(&cur->buf);
  424. cur = cur->next;
  425. }
  426. }
  427. if (a == NULL) a = hl_alloc_array(&hlt_bytes, 0);
  428. a->size = pos;
  429. return a;
  430. }
  431. static varray *x509_time_to_array(mbedtls_x509_time *t) {
  432. varray *a = NULL;
  433. int *p;
  434. if (!t)
  435. hl_error("Invalid x509 time");
  436. a = hl_alloc_array(&hlt_i32, 6);
  437. p = hl_aptr(a, int);
  438. p[0] = t->year;
  439. p[1] = t->mon;
  440. p[2] = t->day;
  441. p[3] = t->hour;
  442. p[4] = t->min;
  443. p[5] = t->sec;
  444. return a;
  445. }
  446. HL_PRIM varray *HL_NAME(cert_get_notbefore)(hl_ssl_cert *cert) {
  447. return x509_time_to_array(&cert->c->valid_from);
  448. }
  449. HL_PRIM varray *HL_NAME(cert_get_notafter)(hl_ssl_cert *cert) {
  450. return x509_time_to_array(&cert->c->valid_to);
  451. }
  452. HL_PRIM hl_ssl_cert *HL_NAME(cert_get_next)(hl_ssl_cert *cert) {
  453. hl_ssl_cert *ncert;
  454. if (cert->c->next == NULL)
  455. return NULL;
  456. ncert = (hl_ssl_cert*)hl_gc_alloc_noptr(sizeof(hl_ssl_cert));
  457. ncert->c = cert->c->next;
  458. return ncert;
  459. }
  460. HL_PRIM hl_ssl_cert *HL_NAME(cert_add_pem)(hl_ssl_cert *cert, vbyte *data) {
  461. mbedtls_x509_crt *crt;
  462. int r, len;
  463. unsigned char *buf;
  464. if (cert != NULL)
  465. crt = cert->c;
  466. else{
  467. crt = (mbedtls_x509_crt*)malloc(sizeof(mbedtls_x509_crt));
  468. mbedtls_x509_crt_init(crt);
  469. }
  470. len = (int)strlen((char*)data) + 1;
  471. buf = (unsigned char *)malloc(len);
  472. memcpy(buf, (char*)data, len - 1);
  473. buf[len - 1] = '\0';
  474. r = mbedtls_x509_crt_parse(crt, buf, len);
  475. free(buf);
  476. if (r < 0) {
  477. if (cert == NULL) {
  478. mbedtls_x509_crt_free(crt);
  479. free(crt);
  480. }
  481. ssl_error(r);
  482. return NULL;
  483. }
  484. if (cert == NULL) {
  485. cert = (hl_ssl_cert*)hl_gc_alloc_finalizer(sizeof(hl_ssl_cert));
  486. cert->c = crt;
  487. cert->finalize = cert_finalize;
  488. }
  489. return cert;
  490. }
  491. HL_PRIM hl_ssl_cert *HL_NAME(cert_add_der)(hl_ssl_cert *cert, vbyte *data, int len) {
  492. mbedtls_x509_crt *crt;
  493. int r;
  494. if (cert != NULL)
  495. crt = cert->c;
  496. else {
  497. crt = (mbedtls_x509_crt*)malloc(sizeof(mbedtls_x509_crt));
  498. mbedtls_x509_crt_init(crt);
  499. }
  500. if ((r = mbedtls_x509_crt_parse_der(crt, (const unsigned char*)data, len)) < 0) {
  501. if (cert == NULL) {
  502. mbedtls_x509_crt_free(crt);
  503. free(crt);
  504. }
  505. ssl_error(r);
  506. return NULL;
  507. }
  508. if (cert == NULL) {
  509. cert = (hl_ssl_cert*)hl_gc_alloc_finalizer(sizeof(hl_ssl_cert));
  510. cert->c = crt;
  511. cert->finalize = cert_finalize;
  512. }
  513. return cert;
  514. }
  515. DEFINE_PRIM(TCERT, cert_load_defaults, _NO_ARG);
  516. DEFINE_PRIM(TCERT, cert_load_file, _BYTES);
  517. DEFINE_PRIM(TCERT, cert_load_path, _BYTES);
  518. DEFINE_PRIM(_BYTES, cert_get_subject, TCERT _BYTES);
  519. DEFINE_PRIM(_BYTES, cert_get_issuer, TCERT _BYTES);
  520. DEFINE_PRIM(_ARR, cert_get_altnames, TCERT);
  521. DEFINE_PRIM(_ARR, cert_get_notbefore, TCERT);
  522. DEFINE_PRIM(_ARR, cert_get_notafter, TCERT);
  523. DEFINE_PRIM(TCERT, cert_get_next, TCERT);
  524. DEFINE_PRIM(TCERT, cert_add_pem, TCERT _BYTES);
  525. DEFINE_PRIM(TCERT, cert_add_der, TCERT _BYTES _I32);
  526. HL_PRIM hl_ssl_pkey *HL_NAME(key_from_der)(vbyte *data, int len, bool pub) {
  527. int r;
  528. hl_ssl_pkey *key;
  529. mbedtls_pk_context *pk = (mbedtls_pk_context *)malloc(sizeof(mbedtls_pk_context));
  530. mbedtls_pk_init(pk);
  531. if (pub)
  532. r = mbedtls_pk_parse_public_key(pk, (const unsigned char*)data, len);
  533. else
  534. #if MBEDTLS_VERSION_MAJOR >= 3
  535. r = mbedtls_pk_parse_key(pk, (const unsigned char*)data, len, NULL, 0, mbedtls_ctr_drbg_random, &ctr_drbg);
  536. #else
  537. r = mbedtls_pk_parse_key(pk, (const unsigned char*)data, len, NULL, 0);
  538. #endif
  539. if (r != 0) {
  540. mbedtls_pk_free(pk);
  541. free(pk);
  542. ssl_error(r);
  543. return NULL;
  544. }
  545. key = (hl_ssl_pkey*)hl_gc_alloc_finalizer(sizeof(hl_ssl_pkey));
  546. key->k = pk;
  547. key->finalize = pkey_finalize;
  548. return key;
  549. }
  550. HL_PRIM hl_ssl_pkey *HL_NAME(key_from_pem)(vbyte *data, bool pub, vbyte *pass) {
  551. int r, len;
  552. hl_ssl_pkey *key;
  553. unsigned char *buf;
  554. mbedtls_pk_context *pk = (mbedtls_pk_context *)malloc(sizeof(mbedtls_pk_context));
  555. mbedtls_pk_init(pk);
  556. len = (int)strlen((char*)data) + 1;
  557. buf = (unsigned char *)malloc(len);
  558. memcpy(buf, (char*)data, len - 1);
  559. buf[len - 1] = '\0';
  560. if (pub)
  561. r = mbedtls_pk_parse_public_key(pk, buf, len);
  562. #if MBEDTLS_VERSION_MAJOR >= 3
  563. else if (pass == NULL)
  564. r = mbedtls_pk_parse_key(pk, buf, len, NULL, 0, mbedtls_ctr_drbg_random, &ctr_drbg);
  565. else
  566. r = mbedtls_pk_parse_key(pk, buf, len, (const unsigned char*)pass, strlen((char*)pass), mbedtls_ctr_drbg_random, &ctr_drbg);
  567. #else
  568. else if (pass == NULL)
  569. r = mbedtls_pk_parse_key(pk, buf, len, NULL, 0);
  570. else
  571. r = mbedtls_pk_parse_key(pk, buf, len, (const unsigned char*)pass, strlen((char*)pass));
  572. #endif
  573. free(buf);
  574. if (r != 0) {
  575. mbedtls_pk_free(pk);
  576. free(pk);
  577. ssl_error(r);
  578. return NULL;
  579. }
  580. key = (hl_ssl_pkey*)hl_gc_alloc_finalizer(sizeof(hl_ssl_pkey));
  581. key->k = pk;
  582. key->finalize = pkey_finalize;
  583. return key;
  584. }
  585. DEFINE_PRIM(TPKEY, key_from_der, _BYTES _I32 _BOOL);
  586. DEFINE_PRIM(TPKEY, key_from_pem, _BYTES _BOOL _BYTES);
  587. HL_PRIM vbyte *HL_NAME(dgst_make)(vbyte *data, int len, vbyte *alg, int *size) {
  588. const mbedtls_md_info_t *md;
  589. int mdlen, r = -1;
  590. vbyte *out;
  591. md = mbedtls_md_info_from_string((char*)alg);
  592. if (md == NULL) {
  593. hl_error("Invalid hash algorithm");
  594. return NULL;
  595. }
  596. mdlen = mbedtls_md_get_size(md);
  597. *size = mdlen;
  598. out = hl_gc_alloc_noptr(mdlen);
  599. if ((r = mbedtls_md(md, (const unsigned char *)data, len, out)) != 0){
  600. ssl_error(r);
  601. return NULL;
  602. }
  603. return out;
  604. }
  605. HL_PRIM vbyte *HL_NAME(dgst_sign)(vbyte *data, int len, hl_ssl_pkey *key, vbyte *alg, int *size) {
  606. const mbedtls_md_info_t *md;
  607. int r = -1;
  608. vbyte *out;
  609. unsigned char hash[MBEDTLS_MD_MAX_SIZE];
  610. size_t ssize = size ? *size : 0;
  611. md = mbedtls_md_info_from_string((char*)alg);
  612. if (md == NULL) {
  613. hl_error("Invalid hash algorithm");
  614. return NULL;
  615. }
  616. if ((r = mbedtls_md(md, (unsigned char *)data, len, hash)) != 0){
  617. ssl_error(r);
  618. return NULL;
  619. }
  620. #if MBEDTLS_VERSION_MAJOR >= 3
  621. out = hl_gc_alloc_noptr(MBEDTLS_PK_SIGNATURE_MAX_SIZE);
  622. if ((r = mbedtls_pk_sign(key->k, mbedtls_md_get_type(md), hash, mbedtls_md_get_size(md), out, MBEDTLS_PK_SIGNATURE_MAX_SIZE, (size ? &ssize : NULL), mbedtls_ctr_drbg_random, &ctr_drbg)) != 0) {
  623. #else
  624. out = hl_gc_alloc_noptr(MBEDTLS_MPI_MAX_SIZE);
  625. if ((r = mbedtls_pk_sign(key->k, mbedtls_md_get_type(md), hash, 0, out, (size ? &ssize : NULL), mbedtls_ctr_drbg_random, &ctr_drbg)) != 0){
  626. #endif
  627. ssl_error(r);
  628. return NULL;
  629. }
  630. if( size ) *size = (int)ssize;
  631. return out;
  632. }
  633. HL_PRIM bool HL_NAME(dgst_verify)(vbyte *data, int dlen, vbyte *sign, int slen, hl_ssl_pkey *key, vbyte *alg) {
  634. const mbedtls_md_info_t *md;
  635. int r = -1;
  636. unsigned char hash[MBEDTLS_MD_MAX_SIZE];
  637. md = mbedtls_md_info_from_string((char*)alg);
  638. if (md == NULL) {
  639. hl_error("Invalid hash algorithm");
  640. return false;
  641. }
  642. if ((r = mbedtls_md(md, (const unsigned char *)data, dlen, hash)) != 0)
  643. return ssl_error(r);
  644. if ((r = mbedtls_pk_verify(key->k, mbedtls_md_get_type(md), hash, 0, (unsigned char *)sign, slen)) != 0)
  645. return false;
  646. return true;
  647. }
  648. DEFINE_PRIM(_BYTES, dgst_make, _BYTES _I32 _BYTES _REF(_I32));
  649. DEFINE_PRIM(_BYTES, dgst_sign, _BYTES _I32 TPKEY _BYTES _REF(_I32));
  650. DEFINE_PRIM(_BOOL, dgst_verify, _BYTES _I32 _BYTES _I32 TPKEY _BYTES);
  651. #if _MSC_VER
  652. static void threading_mutex_init_alt(mbedtls_threading_mutex_t *mutex) {
  653. if (mutex == NULL)
  654. return;
  655. InitializeCriticalSection(&mutex->cs);
  656. mutex->is_valid = 1;
  657. }
  658. static void threading_mutex_free_alt(mbedtls_threading_mutex_t *mutex) {
  659. if (mutex == NULL || !mutex->is_valid)
  660. return;
  661. DeleteCriticalSection(&mutex->cs);
  662. mutex->is_valid = 0;
  663. }
  664. static int threading_mutex_lock_alt(mbedtls_threading_mutex_t *mutex) {
  665. if (mutex == NULL || !mutex->is_valid)
  666. return(MBEDTLS_ERR_THREADING_BAD_INPUT_DATA);
  667. EnterCriticalSection(&mutex->cs);
  668. return(0);
  669. }
  670. static int threading_mutex_unlock_alt(mbedtls_threading_mutex_t *mutex) {
  671. if (mutex == NULL || !mutex->is_valid)
  672. return(MBEDTLS_ERR_THREADING_BAD_INPUT_DATA);
  673. LeaveCriticalSection(&mutex->cs);
  674. return(0);
  675. }
  676. #endif
  677. HL_PRIM void HL_NAME(ssl_init)() {
  678. if (ssl_init_done)
  679. return;
  680. ssl_init_done = true;
  681. #if _MSC_VER
  682. mbedtls_threading_set_alt(threading_mutex_init_alt, threading_mutex_free_alt,
  683. threading_mutex_lock_alt, threading_mutex_unlock_alt);
  684. #endif
  685. // Init RNG
  686. mbedtls_entropy_init(&entropy);
  687. mbedtls_ctr_drbg_init(&ctr_drbg);
  688. mbedtls_ctr_drbg_seed(&ctr_drbg, mbedtls_entropy_func, &entropy, NULL, 0);
  689. }
  690. DEFINE_PRIM(_VOID, ssl_init, _NO_ARG);