ssl.c 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776
  1. #define HL_NAME(n) ssl_##n
  2. #include <hl.h>
  3. #ifdef HL_WIN
  4. #undef _GUID
  5. #include <winsock2.h>
  6. #include <wincrypt.h>
  7. #else
  8. #include <sys/socket.h>
  9. #include <strings.h>
  10. #include <errno.h>
  11. typedef int SOCKET;
  12. #endif
  13. #include <stdio.h>
  14. #include <string.h>
  15. #ifdef HL_MAC
  16. #include <Security/Security.h>
  17. #endif
  18. #define SOCKET_ERROR (-1)
  19. #define NRETRYS 20
  20. #include "mbedtls/platform.h"
  21. #include "mbedtls/error.h"
  22. #include "mbedtls/entropy.h"
  23. #include "mbedtls/ctr_drbg.h"
  24. #include "mbedtls/md.h"
  25. #include "mbedtls/pk.h"
  26. #include "mbedtls/oid.h"
  27. #include "mbedtls/x509_crt.h"
  28. #include "mbedtls/ssl.h"
  29. #ifdef MBEDTLS_PSA_CRYPTO_C
  30. #include <psa/crypto.h>
  31. #endif
  32. #ifdef HL_CONSOLE
  33. mbedtls_x509_crt *hl_init_cert_chain();
  34. #endif
  35. #ifndef MSG_NOSIGNAL
  36. # define MSG_NOSIGNAL 0
  37. #endif
  38. // Duplicate from socket.c
  39. typedef struct _hl_socket {
  40. SOCKET sock;
  41. } hl_socket;
  42. typedef struct _hl_ssl_cert hl_ssl_cert;
  43. struct _hl_ssl_cert {
  44. void(*finalize)(hl_ssl_cert *);
  45. mbedtls_x509_crt *c;
  46. };
  47. typedef struct _hl_ssl_pkey hl_ssl_pkey;
  48. struct _hl_ssl_pkey {
  49. void(*finalize)(hl_ssl_pkey *);
  50. mbedtls_pk_context *k;
  51. };
  52. #define _SOCK _ABSTRACT(hl_socket)
  53. #define TSSL _ABSTRACT(mbedtls_ssl_context)
  54. #define TCONF _ABSTRACT(mbedtls_ssl_config)
  55. #define TCERT _ABSTRACT(hl_ssl_cert)
  56. #define TPKEY _ABSTRACT(hl_ssl_pkey)
  57. static bool ssl_init_done = false;
  58. static mbedtls_entropy_context entropy;
  59. static mbedtls_ctr_drbg_context ctr_drbg;
  60. static bool is_ssl_blocking( int r ) {
  61. return r == MBEDTLS_ERR_SSL_WANT_READ || r == MBEDTLS_ERR_SSL_WANT_WRITE;
  62. }
  63. static int ssl_block_error( int r ) {
  64. return is_ssl_blocking(r) ? -1 : -2;
  65. }
  66. static void cert_finalize(hl_ssl_cert *c) {
  67. mbedtls_x509_crt_free(c->c);
  68. free(c->c);
  69. c->c = NULL;
  70. }
  71. static void pkey_finalize(hl_ssl_pkey *k) {
  72. mbedtls_pk_free(k->k);
  73. free(k->k);
  74. k->k = NULL;
  75. }
  76. static int ssl_error(int ret) {
  77. char buf[128];
  78. uchar buf16[128];
  79. mbedtls_strerror(ret, buf, sizeof(buf));
  80. hl_from_utf8(buf16, (int)strlen(buf), buf);
  81. hl_error("%s",buf16);
  82. return ret;
  83. }
  84. HL_PRIM mbedtls_ssl_context *HL_NAME(ssl_new)(mbedtls_ssl_config *config) {
  85. int ret;
  86. mbedtls_ssl_context *ssl;
  87. ssl = (mbedtls_ssl_context *)hl_gc_alloc_noptr(sizeof(mbedtls_ssl_context));
  88. mbedtls_ssl_init(ssl);
  89. if ((ret = mbedtls_ssl_setup(ssl, config)) != 0) {
  90. mbedtls_ssl_free(ssl);
  91. ssl_error(ret);
  92. return NULL;
  93. }
  94. return ssl;
  95. }
  96. HL_PRIM void HL_NAME(ssl_close)(mbedtls_ssl_context *ssl) {
  97. mbedtls_ssl_free(ssl);
  98. }
  99. HL_PRIM int HL_NAME(ssl_handshake)(mbedtls_ssl_context *ssl) {
  100. int r;
  101. r = mbedtls_ssl_handshake(ssl);
  102. if( is_ssl_blocking(r) )
  103. return -1;
  104. if( r == MBEDTLS_ERR_SSL_CONN_EOF )
  105. return -2;
  106. if( r != 0 )
  107. return ssl_error(r);
  108. return 0;
  109. }
  110. static bool is_block_error() {
  111. #ifdef HL_WIN
  112. int err = WSAGetLastError();
  113. if (err == WSAEWOULDBLOCK || err == WSAEALREADY || err == WSAETIMEDOUT)
  114. #else
  115. if (errno == EAGAIN || errno == EWOULDBLOCK || errno == EINPROGRESS || errno == EALREADY)
  116. #endif
  117. return true;
  118. return false;
  119. }
  120. static int net_read(void *fd, unsigned char *buf, size_t len) {
  121. int r = recv((SOCKET)(int_val)fd, (char *)buf, (int)len, MSG_NOSIGNAL);
  122. if( r == SOCKET_ERROR && is_block_error() )
  123. return MBEDTLS_ERR_SSL_WANT_READ;
  124. return r;
  125. }
  126. static int net_write(void *fd, const unsigned char *buf, size_t len) {
  127. int r = send((SOCKET)(int_val)fd, (char *)buf, (int)len, MSG_NOSIGNAL);
  128. if( r == SOCKET_ERROR && is_block_error() )
  129. return MBEDTLS_ERR_SSL_WANT_WRITE;
  130. return r;
  131. }
  132. HL_PRIM void HL_NAME(ssl_set_socket)(mbedtls_ssl_context *ssl, hl_socket *socket) {
  133. mbedtls_ssl_set_bio(ssl, (void*)(int_val)socket->sock, net_write, net_read, NULL);
  134. }
  135. static int arr_read( void *arr, unsigned char *buf, size_t len ) {
  136. int r = ((int (*)(vdynamic*,unsigned char*,int))hl_aptr(arr,vclosure*)[1]->fun)( hl_aptr(arr,vdynamic*)[0], buf, (int)len );
  137. if( r == -2 ) return MBEDTLS_ERR_SSL_WANT_READ;
  138. return r;
  139. }
  140. static int arr_write( void *arr, const unsigned char *buf, size_t len ) {
  141. int r = ((int (*)(vdynamic*,const unsigned char*,int))hl_aptr(arr,vclosure*)[2]->fun)( hl_aptr(arr,vdynamic*)[0], buf, (int)len );
  142. if( r == -2 ) return MBEDTLS_ERR_SSL_WANT_WRITE;
  143. return r;
  144. }
  145. HL_PRIM void HL_NAME(ssl_set_bio)( mbedtls_ssl_context *ssl, varray *ctx ) {
  146. mbedtls_ssl_set_bio(ssl, ctx, arr_write, arr_read, NULL);
  147. }
  148. HL_PRIM void HL_NAME(ssl_set_hostname)(mbedtls_ssl_context *ssl, vbyte *hostname) {
  149. int ret;
  150. if ((ret = mbedtls_ssl_set_hostname(ssl, (char*)hostname)) != 0)
  151. ssl_error(ret);
  152. }
  153. HL_PRIM hl_ssl_cert *HL_NAME(ssl_get_peer_certificate)(mbedtls_ssl_context *ssl) {
  154. hl_ssl_cert *cert = (hl_ssl_cert*)hl_gc_alloc_noptr(sizeof(hl_ssl_cert));
  155. cert->c = (mbedtls_x509_crt*)mbedtls_ssl_get_peer_cert(ssl);
  156. return cert;
  157. }
  158. DEFINE_PRIM(TSSL, ssl_new, TCONF);
  159. DEFINE_PRIM(_VOID, ssl_close, TSSL);
  160. DEFINE_PRIM(_I32, ssl_handshake, TSSL);
  161. DEFINE_PRIM(_VOID, ssl_set_bio, TSSL _DYN);
  162. DEFINE_PRIM(_VOID, ssl_set_socket, TSSL _SOCK);
  163. DEFINE_PRIM(_VOID, ssl_set_hostname, TSSL _BYTES);
  164. DEFINE_PRIM(TCERT, ssl_get_peer_certificate, TSSL);
  165. HL_PRIM int HL_NAME(ssl_send_char)(mbedtls_ssl_context *ssl, int c) {
  166. unsigned char cc;
  167. int r;
  168. cc = (unsigned char)c;
  169. r = mbedtls_ssl_write(ssl, &cc, 1);
  170. if( r < 0 )
  171. return ssl_block_error(r);
  172. return 1;
  173. }
  174. HL_PRIM int HL_NAME(ssl_send)(mbedtls_ssl_context *ssl, vbyte *buf, int pos, int len) {
  175. int r = mbedtls_ssl_write(ssl, (const unsigned char *)buf + pos, len);
  176. if( r < 0 )
  177. return ssl_block_error(r);
  178. return r;
  179. }
  180. HL_PRIM int HL_NAME(ssl_recv_char)(mbedtls_ssl_context *ssl) {
  181. unsigned char c;
  182. int ret = mbedtls_ssl_read(ssl, &c, 1);
  183. if( ret != 1 )
  184. return ssl_block_error(ret);
  185. return c;
  186. }
  187. HL_PRIM int HL_NAME(ssl_recv)(mbedtls_ssl_context *ssl, vbyte *buf, int pos, int len) {
  188. int ret = mbedtls_ssl_read(ssl, (unsigned char*)buf+pos, len);
  189. if( ret == MBEDTLS_ERR_SSL_PEER_CLOSE_NOTIFY )
  190. return 0;
  191. if( ret < 0 )
  192. return ssl_block_error(ret);
  193. return ret;
  194. }
  195. DEFINE_PRIM(_I32, ssl_send_char, TSSL _I32);
  196. DEFINE_PRIM(_I32, ssl_send, TSSL _BYTES _I32 _I32);
  197. DEFINE_PRIM(_I32, ssl_recv_char, TSSL);
  198. DEFINE_PRIM(_I32, ssl_recv, TSSL _BYTES _I32 _I32);
  199. HL_PRIM mbedtls_ssl_config *HL_NAME(conf_new)(bool server) {
  200. int ret;
  201. mbedtls_ssl_config *conf;
  202. conf = (mbedtls_ssl_config *)hl_gc_alloc_noptr(sizeof(mbedtls_ssl_config));
  203. mbedtls_ssl_config_init(conf);
  204. if ((ret = mbedtls_ssl_config_defaults(conf, server ? MBEDTLS_SSL_IS_SERVER : MBEDTLS_SSL_IS_CLIENT,
  205. MBEDTLS_SSL_TRANSPORT_STREAM, 0)) != 0) {
  206. mbedtls_ssl_config_free(conf);
  207. ssl_error(ret);
  208. return NULL;
  209. }
  210. mbedtls_ssl_conf_rng(conf, mbedtls_ctr_drbg_random, &ctr_drbg);
  211. return conf;
  212. }
  213. HL_PRIM void HL_NAME(conf_close)(mbedtls_ssl_config *conf) {
  214. mbedtls_ssl_config_free(conf);
  215. }
  216. HL_PRIM void HL_NAME(conf_set_ca)(mbedtls_ssl_config *conf, hl_ssl_cert *cert) {
  217. mbedtls_ssl_conf_ca_chain(conf, cert->c, NULL);
  218. }
  219. HL_PRIM void HL_NAME(conf_set_verify)(mbedtls_ssl_config *conf, int mode) {
  220. if (mode == 2)
  221. mbedtls_ssl_conf_authmode(conf, MBEDTLS_SSL_VERIFY_OPTIONAL);
  222. else if (mode == 1)
  223. mbedtls_ssl_conf_authmode(conf, MBEDTLS_SSL_VERIFY_REQUIRED);
  224. else
  225. mbedtls_ssl_conf_authmode(conf, MBEDTLS_SSL_VERIFY_NONE);
  226. }
  227. HL_PRIM void HL_NAME(conf_set_cert)(mbedtls_ssl_config *conf, hl_ssl_cert *cert, hl_ssl_pkey *key) {
  228. int r;
  229. if ((r = mbedtls_ssl_conf_own_cert(conf, cert->c, key->k)) != 0)
  230. ssl_error(r);
  231. }
  232. typedef struct {
  233. hl_type *t;
  234. hl_ssl_cert *cert;
  235. hl_ssl_pkey *key;
  236. } sni_callb_ret;
  237. static int sni_callback(void *arg, mbedtls_ssl_context *ctx, const unsigned char *name, size_t len) {
  238. if (name && arg) {
  239. vclosure *c = (vclosure*)arg;
  240. sni_callb_ret *ret;
  241. if( c->hasValue )
  242. ret = ((sni_callb_ret*(*)(void*, vbyte*))c->fun)(c->value, (vbyte*)name);
  243. else
  244. ret = ((sni_callb_ret*(*)(vbyte*))c->fun)((vbyte*)name);
  245. if (ret && ret->cert && ret->key) {
  246. return mbedtls_ssl_set_hs_own_cert(ctx, ret->cert->c, ret->key->k);
  247. }
  248. }
  249. return -1;
  250. }
  251. HL_PRIM void HL_NAME(conf_set_servername_callback)(mbedtls_ssl_config *conf, vclosure *cb) {
  252. mbedtls_ssl_conf_sni(conf, sni_callback, (void *)cb);
  253. }
  254. DEFINE_PRIM(TCONF, conf_new, _BOOL);
  255. DEFINE_PRIM(_VOID, conf_close, TCONF);
  256. DEFINE_PRIM(_VOID, conf_set_ca, TCONF TCERT);
  257. DEFINE_PRIM(_VOID, conf_set_verify, TCONF _I32);
  258. DEFINE_PRIM(_VOID, conf_set_cert, TCONF TCERT TPKEY);
  259. DEFINE_PRIM(_VOID, conf_set_servername_callback, TCONF _FUN(_OBJ(TCERT TPKEY), _BYTES));
  260. HL_PRIM hl_ssl_cert *HL_NAME(cert_load_file)(vbyte *file) {
  261. #ifdef HL_CONSOLE
  262. return NULL;
  263. #else
  264. int r;
  265. hl_ssl_cert *cert;
  266. mbedtls_x509_crt *x = (mbedtls_x509_crt*)malloc(sizeof(mbedtls_x509_crt));
  267. mbedtls_x509_crt_init(x);
  268. if ((r = mbedtls_x509_crt_parse_file(x, (char*)file)) != 0) {
  269. mbedtls_x509_crt_free(x);
  270. free(x);
  271. ssl_error(r);
  272. return NULL;
  273. }
  274. cert = (hl_ssl_cert*)hl_gc_alloc_finalizer(sizeof(hl_ssl_cert));
  275. cert->c = x;
  276. cert->finalize = cert_finalize;
  277. return cert;
  278. #endif
  279. }
  280. HL_PRIM hl_ssl_cert *HL_NAME(cert_load_path)(vbyte *path) {
  281. #ifdef HL_CONSOLE
  282. return NULL;
  283. #else
  284. int r;
  285. hl_ssl_cert *cert;
  286. mbedtls_x509_crt *x = (mbedtls_x509_crt*)malloc(sizeof(mbedtls_x509_crt));
  287. mbedtls_x509_crt_init(x);
  288. if ((r = mbedtls_x509_crt_parse_path(x, (char*)path)) != 0) {
  289. mbedtls_x509_crt_free(x);
  290. free(x);
  291. ssl_error(r);
  292. return NULL;
  293. }
  294. cert = (hl_ssl_cert*)hl_gc_alloc_finalizer(sizeof(hl_ssl_cert));
  295. cert->c = x;
  296. cert->finalize = cert_finalize;
  297. return cert;
  298. #endif
  299. }
  300. HL_PRIM hl_ssl_cert *HL_NAME(cert_load_defaults)() {
  301. hl_ssl_cert *v = NULL;
  302. mbedtls_x509_crt *chain = NULL;
  303. #if defined(HL_WIN)
  304. HCERTSTORE store;
  305. PCCERT_CONTEXT cert;
  306. if (store = CertOpenSystemStore(0, (LPCWSTR)L"Root")) {
  307. cert = NULL;
  308. while (cert = CertEnumCertificatesInStore(store, cert)) {
  309. if (chain == NULL) {
  310. chain = (mbedtls_x509_crt*)malloc(sizeof(mbedtls_x509_crt));
  311. mbedtls_x509_crt_init(chain);
  312. }
  313. mbedtls_x509_crt_parse_der(chain, (unsigned char *)cert->pbCertEncoded, cert->cbCertEncoded);
  314. }
  315. CertCloseStore(store, 0);
  316. }
  317. #elif defined(HL_MAC)
  318. CFArrayRef certs;
  319. // Load keychain
  320. if (SecTrustCopyAnchorCertificates(&certs) != errSecSuccess)
  321. return NULL;
  322. CFIndex count = CFArrayGetCount(certs);
  323. for(CFIndex i = 0; i < count; i++) {
  324. SecCertificateRef item = (SecCertificateRef)CFArrayGetValueAtIndex(certs, i);
  325. CFDataRef data = SecCertificateCopyData(item);
  326. if(data) {
  327. if (chain == NULL) {
  328. chain = (mbedtls_x509_crt*)malloc(sizeof(mbedtls_x509_crt));
  329. mbedtls_x509_crt_init(chain);
  330. }
  331. mbedtls_x509_crt_parse_der(chain, (unsigned char *)CFDataGetBytePtr(data), CFDataGetLength(data));
  332. CFRelease(data);
  333. }
  334. }
  335. CFRelease(certs);
  336. #elif defined(HL_CONSOLE)
  337. chain = hl_init_cert_chain();
  338. #endif
  339. if (chain != NULL) {
  340. v = (hl_ssl_cert*)hl_gc_alloc_finalizer(sizeof(hl_ssl_cert));
  341. v->c = chain;
  342. v->finalize = cert_finalize;
  343. }
  344. return v;
  345. }
  346. static vbyte *asn1_buf_to_string(mbedtls_asn1_buf *dat) {
  347. unsigned int i, c;
  348. hl_buffer *buf = hl_alloc_buffer();
  349. for (i = 0; i < dat->len; i++) {
  350. c = dat->p[i];
  351. if (c < 32 || c == 127 || (c > 128 && c < 160))
  352. hl_buffer_char(buf, '?');
  353. else
  354. hl_buffer_char(buf, c);
  355. }
  356. return (vbyte*)hl_buffer_content(buf,NULL);
  357. }
  358. HL_PRIM vbyte *HL_NAME(cert_get_subject)(hl_ssl_cert *cert, vbyte *objname) {
  359. mbedtls_x509_name *obj;
  360. int r;
  361. const char *oname, *rname;
  362. obj = &cert->c->subject;
  363. if (obj == NULL)
  364. hl_error("Invalid subject");
  365. rname = (char*)objname;
  366. while (obj != NULL) {
  367. r = mbedtls_oid_get_attr_short_name(&obj->oid, &oname);
  368. if (r == 0 && strcmp(oname, rname) == 0)
  369. return asn1_buf_to_string(&obj->val);
  370. obj = obj->next;
  371. }
  372. return NULL;
  373. }
  374. HL_PRIM vbyte *HL_NAME(cert_get_issuer)(hl_ssl_cert *cert, vbyte *objname) {
  375. mbedtls_x509_name *obj;
  376. int r;
  377. const char *oname, *rname;
  378. obj = &cert->c->issuer;
  379. if (obj == NULL)
  380. hl_error("Invalid issuer");
  381. rname = (char*)objname;
  382. while (obj != NULL) {
  383. r = mbedtls_oid_get_attr_short_name(&obj->oid, &oname);
  384. if (r == 0 && strcmp(oname, rname) == 0)
  385. return asn1_buf_to_string(&obj->val);
  386. obj = obj->next;
  387. }
  388. return NULL;
  389. }
  390. HL_PRIM varray *HL_NAME(cert_get_altnames)(hl_ssl_cert *cert) {
  391. mbedtls_asn1_sequence *cur;
  392. int count = 0;
  393. int pos = 0;
  394. varray *a = NULL;
  395. vbyte **current = NULL;
  396. mbedtls_x509_crt *crt = cert->c;
  397. #if MBEDTLS_VERSION_MAJOR >= 3
  398. if (mbedtls_x509_crt_has_ext_type(crt, MBEDTLS_X509_EXT_SUBJECT_ALT_NAME)) {
  399. #else
  400. if (crt->ext_types & MBEDTLS_X509_EXT_SUBJECT_ALT_NAME) {
  401. #endif
  402. cur = &crt->subject_alt_names;
  403. while (cur != NULL) {
  404. if (pos == count) {
  405. int ncount = count == 0 ? 16 : count * 2;
  406. varray *narr = hl_alloc_array(&hlt_bytes, ncount);
  407. vbyte **ncur = hl_aptr(narr, vbyte*);
  408. memcpy(ncur, current, count * sizeof(void*));
  409. current = ncur;
  410. a = narr;
  411. count = ncount;
  412. }
  413. current[pos++] = asn1_buf_to_string(&cur->buf);
  414. cur = cur->next;
  415. }
  416. }
  417. if (a == NULL) a = hl_alloc_array(&hlt_bytes, 0);
  418. a->size = pos;
  419. return a;
  420. }
  421. static varray *x509_time_to_array(mbedtls_x509_time *t) {
  422. varray *a = NULL;
  423. int *p;
  424. if (!t)
  425. hl_error("Invalid x509 time");
  426. a = hl_alloc_array(&hlt_i32, 6);
  427. p = hl_aptr(a, int);
  428. p[0] = t->year;
  429. p[1] = t->mon;
  430. p[2] = t->day;
  431. p[3] = t->hour;
  432. p[4] = t->min;
  433. p[5] = t->sec;
  434. return a;
  435. }
  436. HL_PRIM varray *HL_NAME(cert_get_notbefore)(hl_ssl_cert *cert) {
  437. return x509_time_to_array(&cert->c->valid_from);
  438. }
  439. HL_PRIM varray *HL_NAME(cert_get_notafter)(hl_ssl_cert *cert) {
  440. return x509_time_to_array(&cert->c->valid_to);
  441. }
  442. HL_PRIM hl_ssl_cert *HL_NAME(cert_get_next)(hl_ssl_cert *cert) {
  443. hl_ssl_cert *ncert;
  444. if (cert->c->next == NULL)
  445. return NULL;
  446. ncert = (hl_ssl_cert*)hl_gc_alloc_noptr(sizeof(hl_ssl_cert));
  447. ncert->c = cert->c->next;
  448. return ncert;
  449. }
  450. HL_PRIM hl_ssl_cert *HL_NAME(cert_add_pem)(hl_ssl_cert *cert, vbyte *data) {
  451. mbedtls_x509_crt *crt;
  452. int r, len;
  453. unsigned char *buf;
  454. if (cert != NULL)
  455. crt = cert->c;
  456. else{
  457. crt = (mbedtls_x509_crt*)malloc(sizeof(mbedtls_x509_crt));
  458. mbedtls_x509_crt_init(crt);
  459. }
  460. len = (int)strlen((char*)data) + 1;
  461. buf = (unsigned char *)malloc(len);
  462. memcpy(buf, (char*)data, len - 1);
  463. buf[len - 1] = '\0';
  464. r = mbedtls_x509_crt_parse(crt, buf, len);
  465. free(buf);
  466. if (r < 0) {
  467. if (cert == NULL) {
  468. mbedtls_x509_crt_free(crt);
  469. free(crt);
  470. }
  471. ssl_error(r);
  472. return NULL;
  473. }
  474. if (cert == NULL) {
  475. cert = (hl_ssl_cert*)hl_gc_alloc_finalizer(sizeof(hl_ssl_cert));
  476. cert->c = crt;
  477. cert->finalize = cert_finalize;
  478. }
  479. return cert;
  480. }
  481. HL_PRIM hl_ssl_cert *HL_NAME(cert_add_der)(hl_ssl_cert *cert, vbyte *data, int len) {
  482. mbedtls_x509_crt *crt;
  483. int r;
  484. if (cert != NULL)
  485. crt = cert->c;
  486. else {
  487. crt = (mbedtls_x509_crt*)malloc(sizeof(mbedtls_x509_crt));
  488. mbedtls_x509_crt_init(crt);
  489. }
  490. if ((r = mbedtls_x509_crt_parse_der(crt, (const unsigned char*)data, len)) < 0) {
  491. if (cert == NULL) {
  492. mbedtls_x509_crt_free(crt);
  493. free(crt);
  494. }
  495. ssl_error(r);
  496. return NULL;
  497. }
  498. if (cert == NULL) {
  499. cert = (hl_ssl_cert*)hl_gc_alloc_finalizer(sizeof(hl_ssl_cert));
  500. cert->c = crt;
  501. cert->finalize = cert_finalize;
  502. }
  503. return cert;
  504. }
  505. DEFINE_PRIM(TCERT, cert_load_defaults, _NO_ARG);
  506. DEFINE_PRIM(TCERT, cert_load_file, _BYTES);
  507. DEFINE_PRIM(TCERT, cert_load_path, _BYTES);
  508. DEFINE_PRIM(_BYTES, cert_get_subject, TCERT _BYTES);
  509. DEFINE_PRIM(_BYTES, cert_get_issuer, TCERT _BYTES);
  510. DEFINE_PRIM(_ARR, cert_get_altnames, TCERT);
  511. DEFINE_PRIM(_ARR, cert_get_notbefore, TCERT);
  512. DEFINE_PRIM(_ARR, cert_get_notafter, TCERT);
  513. DEFINE_PRIM(TCERT, cert_get_next, TCERT);
  514. DEFINE_PRIM(TCERT, cert_add_pem, TCERT _BYTES);
  515. DEFINE_PRIM(TCERT, cert_add_der, TCERT _BYTES _I32);
  516. HL_PRIM hl_ssl_pkey *HL_NAME(key_from_der)(vbyte *data, int len, bool pub) {
  517. int r;
  518. hl_ssl_pkey *key;
  519. mbedtls_pk_context *pk = (mbedtls_pk_context *)malloc(sizeof(mbedtls_pk_context));
  520. mbedtls_pk_init(pk);
  521. if (pub)
  522. r = mbedtls_pk_parse_public_key(pk, (const unsigned char*)data, len);
  523. else
  524. #if MBEDTLS_VERSION_MAJOR >= 3
  525. r = mbedtls_pk_parse_key(pk, (const unsigned char*)data, len, NULL, 0, mbedtls_ctr_drbg_random, &ctr_drbg);
  526. #else
  527. r = mbedtls_pk_parse_key(pk, (const unsigned char*)data, len, NULL, 0);
  528. #endif
  529. if (r != 0) {
  530. mbedtls_pk_free(pk);
  531. free(pk);
  532. ssl_error(r);
  533. return NULL;
  534. }
  535. key = (hl_ssl_pkey*)hl_gc_alloc_finalizer(sizeof(hl_ssl_pkey));
  536. key->k = pk;
  537. key->finalize = pkey_finalize;
  538. return key;
  539. }
  540. HL_PRIM hl_ssl_pkey *HL_NAME(key_from_pem)(vbyte *data, bool pub, vbyte *pass) {
  541. int r, len;
  542. hl_ssl_pkey *key;
  543. unsigned char *buf;
  544. mbedtls_pk_context *pk = (mbedtls_pk_context *)malloc(sizeof(mbedtls_pk_context));
  545. mbedtls_pk_init(pk);
  546. len = (int)strlen((char*)data) + 1;
  547. buf = (unsigned char *)malloc(len);
  548. memcpy(buf, (char*)data, len - 1);
  549. buf[len - 1] = '\0';
  550. if (pub)
  551. r = mbedtls_pk_parse_public_key(pk, buf, len);
  552. #if MBEDTLS_VERSION_MAJOR >= 3
  553. else if (pass == NULL)
  554. r = mbedtls_pk_parse_key(pk, buf, len, NULL, 0, mbedtls_ctr_drbg_random, &ctr_drbg);
  555. else
  556. r = mbedtls_pk_parse_key(pk, buf, len, (const unsigned char*)pass, strlen((char*)pass), mbedtls_ctr_drbg_random, &ctr_drbg);
  557. #else
  558. else if (pass == NULL)
  559. r = mbedtls_pk_parse_key(pk, buf, len, NULL, 0);
  560. else
  561. r = mbedtls_pk_parse_key(pk, buf, len, (const unsigned char*)pass, strlen((char*)pass));
  562. #endif
  563. free(buf);
  564. if (r != 0) {
  565. mbedtls_pk_free(pk);
  566. free(pk);
  567. ssl_error(r);
  568. return NULL;
  569. }
  570. key = (hl_ssl_pkey*)hl_gc_alloc_finalizer(sizeof(hl_ssl_pkey));
  571. key->k = pk;
  572. key->finalize = pkey_finalize;
  573. return key;
  574. }
  575. DEFINE_PRIM(TPKEY, key_from_der, _BYTES _I32 _BOOL);
  576. DEFINE_PRIM(TPKEY, key_from_pem, _BYTES _BOOL _BYTES);
  577. HL_PRIM vbyte *HL_NAME(dgst_make)(vbyte *data, int len, vbyte *alg, int *size) {
  578. const mbedtls_md_info_t *md;
  579. int mdlen, r = -1;
  580. vbyte *out;
  581. md = mbedtls_md_info_from_string((char*)alg);
  582. if (md == NULL) {
  583. hl_error("Invalid hash algorithm");
  584. return NULL;
  585. }
  586. mdlen = mbedtls_md_get_size(md);
  587. *size = mdlen;
  588. out = hl_gc_alloc_noptr(mdlen);
  589. if ((r = mbedtls_md(md, (const unsigned char *)data, len, out)) != 0){
  590. ssl_error(r);
  591. return NULL;
  592. }
  593. return out;
  594. }
  595. HL_PRIM vbyte *HL_NAME(dgst_sign)(vbyte *data, int len, hl_ssl_pkey *key, vbyte *alg, int *size) {
  596. const mbedtls_md_info_t *md;
  597. int r = -1;
  598. vbyte *out;
  599. unsigned char hash[MBEDTLS_MD_MAX_SIZE];
  600. size_t ssize = size ? *size : 0;
  601. md = mbedtls_md_info_from_string((char*)alg);
  602. if (md == NULL) {
  603. hl_error("Invalid hash algorithm");
  604. return NULL;
  605. }
  606. if ((r = mbedtls_md(md, (unsigned char *)data, len, hash)) != 0){
  607. ssl_error(r);
  608. return NULL;
  609. }
  610. #if MBEDTLS_VERSION_MAJOR >= 3
  611. out = hl_gc_alloc_noptr(MBEDTLS_PK_SIGNATURE_MAX_SIZE);
  612. if ((r = mbedtls_pk_sign(key->k, mbedtls_md_get_type(md), hash, mbedtls_md_get_size(md), out, MBEDTLS_PK_SIGNATURE_MAX_SIZE, (size ? &ssize : NULL), mbedtls_ctr_drbg_random, &ctr_drbg)) != 0) {
  613. #else
  614. out = hl_gc_alloc_noptr(MBEDTLS_MPI_MAX_SIZE);
  615. if ((r = mbedtls_pk_sign(key->k, mbedtls_md_get_type(md), hash, 0, out, (size ? &ssize : NULL), mbedtls_ctr_drbg_random, &ctr_drbg)) != 0){
  616. #endif
  617. ssl_error(r);
  618. return NULL;
  619. }
  620. if( size ) *size = (int)ssize;
  621. return out;
  622. }
  623. HL_PRIM bool HL_NAME(dgst_verify)(vbyte *data, int dlen, vbyte *sign, int slen, hl_ssl_pkey *key, vbyte *alg) {
  624. const mbedtls_md_info_t *md;
  625. int r = -1;
  626. unsigned char hash[MBEDTLS_MD_MAX_SIZE];
  627. md = mbedtls_md_info_from_string((char*)alg);
  628. if (md == NULL) {
  629. hl_error("Invalid hash algorithm");
  630. return false;
  631. }
  632. if ((r = mbedtls_md(md, (const unsigned char *)data, dlen, hash)) != 0)
  633. return ssl_error(r);
  634. if ((r = mbedtls_pk_verify(key->k, mbedtls_md_get_type(md), hash, 0, (unsigned char *)sign, slen)) != 0)
  635. return false;
  636. return true;
  637. }
  638. DEFINE_PRIM(_BYTES, dgst_make, _BYTES _I32 _BYTES _REF(_I32));
  639. DEFINE_PRIM(_BYTES, dgst_sign, _BYTES _I32 TPKEY _BYTES _REF(_I32));
  640. DEFINE_PRIM(_BOOL, dgst_verify, _BYTES _I32 _BYTES _I32 TPKEY _BYTES);
  641. #if _MSC_VER
  642. static void threading_mutex_init_alt(mbedtls_threading_mutex_t *mutex) {
  643. if (mutex == NULL)
  644. return;
  645. InitializeCriticalSection(&mutex->cs);
  646. mutex->is_valid = 1;
  647. }
  648. static void threading_mutex_free_alt(mbedtls_threading_mutex_t *mutex) {
  649. if (mutex == NULL || !mutex->is_valid)
  650. return;
  651. DeleteCriticalSection(&mutex->cs);
  652. mutex->is_valid = 0;
  653. }
  654. static int threading_mutex_lock_alt(mbedtls_threading_mutex_t *mutex) {
  655. if (mutex == NULL || !mutex->is_valid)
  656. return(MBEDTLS_ERR_THREADING_BAD_INPUT_DATA);
  657. EnterCriticalSection(&mutex->cs);
  658. return(0);
  659. }
  660. static int threading_mutex_unlock_alt(mbedtls_threading_mutex_t *mutex) {
  661. if (mutex == NULL || !mutex->is_valid)
  662. return(MBEDTLS_ERR_THREADING_BAD_INPUT_DATA);
  663. LeaveCriticalSection(&mutex->cs);
  664. return(0);
  665. }
  666. #endif
  667. HL_PRIM void HL_NAME(ssl_init)() {
  668. if (ssl_init_done)
  669. return;
  670. ssl_init_done = true;
  671. #if _MSC_VER
  672. mbedtls_threading_set_alt(threading_mutex_init_alt, threading_mutex_free_alt,
  673. threading_mutex_lock_alt, threading_mutex_unlock_alt);
  674. #endif
  675. // Init RNG
  676. mbedtls_entropy_init(&entropy);
  677. mbedtls_ctr_drbg_init(&ctr_drbg);
  678. mbedtls_ctr_drbg_seed(&ctr_drbg, mbedtls_entropy_func, &entropy, NULL, 0);
  679. #ifdef MBEDTLS_PSA_CRYPTO_C
  680. psa_crypto_init();
  681. #endif
  682. }
  683. DEFINE_PRIM(_VOID, ssl_init, _NO_ARG);