2018-08-15 14:41:42 +02:00
|
|
|
//
|
2021-01-01 13:57:46 +01:00
|
|
|
// Copyright Aliaksei Levin (levlam@telegram.org), Arseny Smirnov (arseny30@gmail.com) 2014-2021
|
2018-08-15 14:41:42 +02:00
|
|
|
//
|
|
|
|
// Distributed under the Boost Software License, Version 1.0. (See accompanying
|
|
|
|
// file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt)
|
|
|
|
//
|
|
|
|
#include "td/net/SslStream.h"
|
|
|
|
|
2019-06-28 13:03:06 +02:00
|
|
|
#if !TD_EMSCRIPTEN
|
2019-02-12 22:26:36 +01:00
|
|
|
#include "td/utils/common.h"
|
2020-06-06 20:31:47 +02:00
|
|
|
#include "td/utils/crypto.h"
|
2018-08-15 14:41:42 +02:00
|
|
|
#include "td/utils/logging.h"
|
2018-08-16 00:06:53 +02:00
|
|
|
#include "td/utils/misc.h"
|
2020-05-16 16:50:58 +02:00
|
|
|
#include "td/utils/port/IPAddress.h"
|
2018-08-15 22:05:06 +02:00
|
|
|
#include "td/utils/port/wstring_convert.h"
|
2018-08-15 15:29:46 +02:00
|
|
|
#include "td/utils/Status.h"
|
2018-08-15 14:41:42 +02:00
|
|
|
#include "td/utils/Time.h"
|
|
|
|
|
|
|
|
#include <openssl/err.h>
|
|
|
|
#include <openssl/evp.h>
|
|
|
|
#include <openssl/ssl.h>
|
2018-08-15 22:05:06 +02:00
|
|
|
#include <openssl/x509.h>
|
2018-08-15 14:41:42 +02:00
|
|
|
#include <openssl/x509v3.h>
|
|
|
|
|
2018-08-16 00:06:53 +02:00
|
|
|
#include <cstring>
|
2018-08-15 14:41:42 +02:00
|
|
|
#include <map>
|
2020-07-05 01:57:36 +02:00
|
|
|
#include <memory>
|
2018-08-15 14:41:42 +02:00
|
|
|
#include <mutex>
|
|
|
|
|
2018-08-15 22:05:06 +02:00
|
|
|
#if TD_PORT_WINDOWS
|
|
|
|
#include <wincrypt.h>
|
|
|
|
#endif
|
|
|
|
|
2018-08-15 14:41:42 +02:00
|
|
|
namespace td {
|
|
|
|
|
|
|
|
namespace detail {
|
|
|
|
namespace {
|
|
|
|
#if OPENSSL_VERSION_NUMBER < 0x10100000L
|
2018-08-15 15:29:46 +02:00
|
|
|
void *BIO_get_data(BIO *b) {
|
2018-08-15 14:41:42 +02:00
|
|
|
return b->ptr;
|
|
|
|
}
|
2018-08-15 15:29:46 +02:00
|
|
|
void BIO_set_data(BIO *b, void *ptr) {
|
2018-08-15 14:41:42 +02:00
|
|
|
b->ptr = ptr;
|
|
|
|
}
|
2018-08-15 15:29:46 +02:00
|
|
|
void BIO_set_init(BIO *b, int init) {
|
2018-08-15 14:41:42 +02:00
|
|
|
b->init = init;
|
|
|
|
}
|
|
|
|
|
|
|
|
int BIO_get_new_index() {
|
|
|
|
return 0;
|
|
|
|
}
|
2018-08-15 15:29:46 +02:00
|
|
|
BIO_METHOD *BIO_meth_new(int type, const char *name) {
|
2018-08-15 14:41:42 +02:00
|
|
|
auto res = new BIO_METHOD();
|
2018-08-16 00:06:53 +02:00
|
|
|
std::memset(res, 0, sizeof(*res));
|
2018-08-15 14:41:42 +02:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2018-08-15 15:29:46 +02:00
|
|
|
int BIO_meth_set_write(BIO_METHOD *biom, int (*bwrite)(BIO *, const char *, int)) {
|
2018-08-15 14:41:42 +02:00
|
|
|
biom->bwrite = bwrite;
|
|
|
|
return 1;
|
|
|
|
}
|
2018-08-15 15:29:46 +02:00
|
|
|
int BIO_meth_set_read(BIO_METHOD *biom, int (*bread)(BIO *, char *, int)) {
|
2018-08-15 14:41:42 +02:00
|
|
|
biom->bread = bread;
|
|
|
|
return 1;
|
|
|
|
}
|
2018-08-15 15:29:46 +02:00
|
|
|
int BIO_meth_set_ctrl(BIO_METHOD *biom, long (*ctrl)(BIO *, int, long, void *)) {
|
2018-08-15 14:41:42 +02:00
|
|
|
biom->ctrl = ctrl;
|
|
|
|
return 1;
|
|
|
|
}
|
2018-08-15 15:29:46 +02:00
|
|
|
int BIO_meth_set_create(BIO_METHOD *biom, int (*create)(BIO *)) {
|
2018-08-15 14:41:42 +02:00
|
|
|
biom->create = create;
|
|
|
|
return 1;
|
|
|
|
}
|
2018-08-15 15:29:46 +02:00
|
|
|
int BIO_meth_set_destroy(BIO_METHOD *biom, int (*destroy)(BIO *)) {
|
2018-08-15 14:41:42 +02:00
|
|
|
biom->destroy = destroy;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2018-08-15 15:29:46 +02:00
|
|
|
int strm_create(BIO *b) {
|
2018-08-15 14:41:42 +02:00
|
|
|
BIO_set_init(b, 1);
|
|
|
|
return 1;
|
|
|
|
}
|
2018-08-15 22:05:06 +02:00
|
|
|
|
2018-08-15 15:29:46 +02:00
|
|
|
int strm_destroy(BIO *b) {
|
2018-08-15 14:41:42 +02:00
|
|
|
return 1;
|
|
|
|
}
|
2018-08-15 22:05:06 +02:00
|
|
|
|
2018-08-15 15:29:46 +02:00
|
|
|
int strm_read(BIO *b, char *buf, int len);
|
2018-08-15 22:05:06 +02:00
|
|
|
|
2018-08-15 15:29:46 +02:00
|
|
|
int strm_write(BIO *b, const char *buf, int len);
|
2018-08-15 14:41:42 +02:00
|
|
|
|
2018-08-15 15:29:46 +02:00
|
|
|
long strm_ctrl(BIO *b, int cmd, long num, void *ptr) {
|
2018-08-15 14:41:42 +02:00
|
|
|
switch (cmd) {
|
|
|
|
case BIO_CTRL_FLUSH:
|
|
|
|
return 1;
|
|
|
|
case BIO_CTRL_PUSH:
|
|
|
|
return 0;
|
|
|
|
case BIO_CTRL_POP:
|
|
|
|
return 0;
|
|
|
|
default:
|
|
|
|
LOG(FATAL) << b << " " << cmd << " " << num << " " << ptr;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2018-08-15 15:29:46 +02:00
|
|
|
BIO_METHOD *BIO_s_sslstream() {
|
|
|
|
static BIO_METHOD *result = [] {
|
|
|
|
BIO_METHOD *res = BIO_meth_new(BIO_get_new_index(), "td::SslStream helper bio");
|
2018-08-15 14:41:42 +02:00
|
|
|
BIO_meth_set_write(res, strm_write);
|
|
|
|
BIO_meth_set_read(res, strm_read);
|
|
|
|
BIO_meth_set_create(res, strm_create);
|
|
|
|
BIO_meth_set_destroy(res, strm_destroy);
|
|
|
|
BIO_meth_set_ctrl(res, strm_ctrl);
|
|
|
|
return res;
|
|
|
|
}();
|
2018-08-15 15:29:46 +02:00
|
|
|
return result;
|
2018-08-15 14:41:42 +02:00
|
|
|
}
|
2018-08-15 22:05:06 +02:00
|
|
|
|
2018-08-15 15:29:46 +02:00
|
|
|
int verify_callback(int preverify_ok, X509_STORE_CTX *ctx) {
|
2018-08-15 14:41:42 +02:00
|
|
|
if (!preverify_ok) {
|
|
|
|
char buf[256];
|
|
|
|
X509_NAME_oneline(X509_get_subject_name(X509_STORE_CTX_get_current_cert(ctx)), buf, 256);
|
|
|
|
|
|
|
|
int err = X509_STORE_CTX_get_error(ctx);
|
|
|
|
auto warning = PSTRING() << "verify error:num=" << err << ":" << X509_verify_cert_error_string(err)
|
2020-09-02 16:10:10 +02:00
|
|
|
<< ":depth=" << X509_STORE_CTX_get_error_depth(ctx) << ":" << Slice(buf, std::strlen(buf));
|
2018-08-15 14:41:42 +02:00
|
|
|
double now = Time::now();
|
|
|
|
|
|
|
|
static std::mutex warning_mutex;
|
|
|
|
{
|
|
|
|
std::lock_guard<std::mutex> lock(warning_mutex);
|
|
|
|
static std::map<std::string, double> next_warning_time;
|
2018-08-15 15:29:46 +02:00
|
|
|
double &next = next_warning_time[warning];
|
2018-08-15 14:41:42 +02:00
|
|
|
if (next <= now) {
|
|
|
|
next = now + 300; // one warning per 5 minutes
|
|
|
|
LOG(WARNING) << warning;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return preverify_ok;
|
|
|
|
}
|
|
|
|
|
2020-07-05 01:57:36 +02:00
|
|
|
using SslCtx = std::shared_ptr<SSL_CTX>;
|
2020-07-02 17:01:23 +02:00
|
|
|
|
|
|
|
struct SslHandleDeleter {
|
|
|
|
void operator()(SSL *ssl_handle) {
|
2020-07-05 01:57:36 +02:00
|
|
|
if (SSL_is_init_finished(ssl_handle)) {
|
|
|
|
clear_openssl_errors("Before SSL_shutdown");
|
|
|
|
SSL_set_quiet_shutdown(ssl_handle, 1);
|
|
|
|
SSL_shutdown(ssl_handle);
|
|
|
|
clear_openssl_errors("After SSL_shutdown");
|
2018-08-15 14:41:42 +02:00
|
|
|
}
|
2020-07-02 17:01:23 +02:00
|
|
|
SSL_free(ssl_handle);
|
2018-08-15 14:41:42 +02:00
|
|
|
}
|
2020-07-02 17:01:23 +02:00
|
|
|
};
|
2018-08-15 14:41:42 +02:00
|
|
|
|
2020-07-02 17:01:23 +02:00
|
|
|
using SslHandle = std::unique_ptr<SSL, SslHandleDeleter>;
|
|
|
|
|
2020-07-05 01:57:36 +02:00
|
|
|
Result<SslCtx> do_create_ssl_ctx(CSlice cert_file, SslStream::VerifyPeer verify_peer) {
|
2020-07-02 17:01:23 +02:00
|
|
|
auto ssl_method =
|
2018-08-15 14:41:42 +02:00
|
|
|
#if OPENSSL_VERSION_NUMBER >= 0x10100000L
|
2020-07-02 17:01:23 +02:00
|
|
|
TLS_client_method();
|
2018-08-15 14:41:42 +02:00
|
|
|
#else
|
2020-07-02 17:01:23 +02:00
|
|
|
SSLv23_client_method();
|
2018-08-15 14:41:42 +02:00
|
|
|
#endif
|
2020-07-02 17:01:23 +02:00
|
|
|
if (ssl_method == nullptr) {
|
|
|
|
return create_openssl_error(-6, "Failed to create an SSL client method");
|
|
|
|
}
|
2020-07-05 01:57:36 +02:00
|
|
|
auto ssl_ctx = SSL_CTX_new(ssl_method);
|
|
|
|
if (!ssl_ctx) {
|
2020-07-02 17:01:23 +02:00
|
|
|
return create_openssl_error(-7, "Failed to create an SSL context");
|
|
|
|
}
|
2020-07-05 01:57:36 +02:00
|
|
|
auto ssl_ctx_ptr = SslCtx(ssl_ctx, SSL_CTX_free);
|
2020-07-02 17:01:23 +02:00
|
|
|
long options = 0;
|
2018-08-15 14:41:42 +02:00
|
|
|
#ifdef SSL_OP_NO_SSLv2
|
2020-07-02 17:01:23 +02:00
|
|
|
options |= SSL_OP_NO_SSLv2;
|
2018-08-15 14:41:42 +02:00
|
|
|
#endif
|
|
|
|
#ifdef SSL_OP_NO_SSLv3
|
2020-07-02 17:01:23 +02:00
|
|
|
options |= SSL_OP_NO_SSLv3;
|
2018-08-15 14:41:42 +02:00
|
|
|
#endif
|
2020-07-02 17:01:23 +02:00
|
|
|
SSL_CTX_set_options(ssl_ctx, options);
|
2020-05-16 19:08:44 +02:00
|
|
|
#if OPENSSL_VERSION_NUMBER >= 0x10100000L
|
2020-07-02 17:01:23 +02:00
|
|
|
SSL_CTX_set_min_proto_version(ssl_ctx, TLS1_VERSION);
|
2020-05-16 19:08:44 +02:00
|
|
|
#endif
|
2020-07-02 17:01:23 +02:00
|
|
|
SSL_CTX_set_mode(ssl_ctx, SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER | SSL_MODE_ENABLE_PARTIAL_WRITE);
|
2018-08-15 14:41:42 +02:00
|
|
|
|
2020-07-02 17:01:23 +02:00
|
|
|
if (cert_file.empty()) {
|
2018-08-15 22:05:06 +02:00
|
|
|
#if TD_PORT_WINDOWS
|
2020-07-02 17:01:23 +02:00
|
|
|
LOG(DEBUG) << "Begin to load system store";
|
|
|
|
auto flags = CERT_STORE_OPEN_EXISTING_FLAG | CERT_STORE_READONLY_FLAG | CERT_SYSTEM_STORE_CURRENT_USER;
|
|
|
|
HCERTSTORE system_store =
|
|
|
|
CertOpenStore(CERT_STORE_PROV_SYSTEM_W, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, HCRYPTPROV_LEGACY(), flags,
|
|
|
|
static_cast<const void *>(to_wstring("ROOT").ok().c_str()));
|
|
|
|
|
|
|
|
if (system_store) {
|
|
|
|
X509_STORE *store = X509_STORE_new();
|
|
|
|
|
|
|
|
for (PCCERT_CONTEXT cert_context = CertEnumCertificatesInStore(system_store, nullptr); cert_context != nullptr;
|
|
|
|
cert_context = CertEnumCertificatesInStore(system_store, cert_context)) {
|
|
|
|
const unsigned char *in = cert_context->pbCertEncoded;
|
|
|
|
X509 *x509 = d2i_X509(nullptr, &in, static_cast<long>(cert_context->cbCertEncoded));
|
|
|
|
if (x509 != nullptr) {
|
|
|
|
if (X509_STORE_add_cert(store, x509) != 1) {
|
|
|
|
auto error_code = ERR_peek_error();
|
|
|
|
auto error = create_openssl_error(-20, "Failed to add certificate");
|
|
|
|
if (ERR_GET_REASON(error_code) != X509_R_CERT_ALREADY_IN_HASH_TABLE) {
|
|
|
|
LOG(ERROR) << error;
|
|
|
|
} else {
|
|
|
|
LOG(INFO) << error;
|
2018-08-15 22:05:06 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-02 17:01:23 +02:00
|
|
|
X509_free(x509);
|
2018-08-29 15:07:34 +02:00
|
|
|
} else {
|
2020-07-02 17:01:23 +02:00
|
|
|
LOG(ERROR) << create_openssl_error(-21, "Failed to load X509 certificate");
|
2018-08-29 15:07:34 +02:00
|
|
|
}
|
|
|
|
}
|
2020-07-02 17:01:23 +02:00
|
|
|
|
|
|
|
CertCloseStore(system_store, 0);
|
|
|
|
|
|
|
|
SSL_CTX_set_cert_store(ssl_ctx, store);
|
|
|
|
LOG(DEBUG) << "End to load system store";
|
2018-08-15 14:41:42 +02:00
|
|
|
} else {
|
2020-07-02 17:01:23 +02:00
|
|
|
LOG(ERROR) << create_openssl_error(-22, "Failed to open system certificate store");
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
if (SSL_CTX_set_default_verify_paths(ssl_ctx) == 0) {
|
|
|
|
auto error = create_openssl_error(-8, "Failed to load default verify paths");
|
2020-07-05 01:57:36 +02:00
|
|
|
if (verify_peer == SslStream::VerifyPeer::On) {
|
2020-07-14 02:42:50 +02:00
|
|
|
return std::move(error);
|
2020-07-02 17:01:23 +02:00
|
|
|
} else {
|
|
|
|
LOG(ERROR) << error;
|
2018-08-15 14:41:42 +02:00
|
|
|
}
|
|
|
|
}
|
2020-07-02 17:01:23 +02:00
|
|
|
#endif
|
|
|
|
} else {
|
|
|
|
if (SSL_CTX_load_verify_locations(ssl_ctx, cert_file.c_str(), nullptr) == 0) {
|
|
|
|
return create_openssl_error(-8, "Failed to set custom certificate file");
|
|
|
|
}
|
|
|
|
}
|
2018-08-15 14:41:42 +02:00
|
|
|
|
2020-07-05 01:57:36 +02:00
|
|
|
if (verify_peer == SslStream::VerifyPeer::On) {
|
2020-07-02 17:01:23 +02:00
|
|
|
SSL_CTX_set_verify(ssl_ctx, SSL_VERIFY_PEER, verify_callback);
|
2018-08-15 14:41:42 +02:00
|
|
|
|
2020-07-05 01:57:36 +02:00
|
|
|
constexpr int DEFAULT_VERIFY_DEPTH = 10;
|
|
|
|
SSL_CTX_set_verify_depth(ssl_ctx, DEFAULT_VERIFY_DEPTH);
|
2020-07-02 17:01:23 +02:00
|
|
|
} else {
|
|
|
|
SSL_CTX_set_verify(ssl_ctx, SSL_VERIFY_NONE, nullptr);
|
|
|
|
}
|
2018-08-15 14:41:42 +02:00
|
|
|
|
2020-07-02 17:01:23 +02:00
|
|
|
string cipher_list;
|
|
|
|
if (SSL_CTX_set_cipher_list(ssl_ctx, cipher_list.empty() ? "DEFAULT" : cipher_list.c_str()) == 0) {
|
|
|
|
return create_openssl_error(-9, PSLICE() << "Failed to set cipher list \"" << cipher_list << '"');
|
|
|
|
}
|
|
|
|
|
2020-07-05 01:57:36 +02:00
|
|
|
return std::move(ssl_ctx_ptr);
|
2020-07-02 17:01:23 +02:00
|
|
|
}
|
|
|
|
|
2020-07-05 01:57:36 +02:00
|
|
|
Result<SslCtx> get_default_ssl_ctx() {
|
|
|
|
static auto ctx = do_create_ssl_ctx("", SslStream::VerifyPeer::On);
|
|
|
|
if (ctx.is_error()) {
|
|
|
|
return ctx.error().clone();
|
2020-07-02 17:01:23 +02:00
|
|
|
}
|
2020-07-05 01:57:36 +02:00
|
|
|
|
|
|
|
return ctx.ok();
|
2020-07-02 17:01:23 +02:00
|
|
|
}
|
|
|
|
|
2020-07-05 01:57:36 +02:00
|
|
|
Result<SslCtx> get_default_unverified_ssl_ctx() {
|
|
|
|
static auto ctx = do_create_ssl_ctx("", SslStream::VerifyPeer::Off);
|
2020-07-02 17:01:23 +02:00
|
|
|
if (ctx.is_error()) {
|
|
|
|
return ctx.error().clone();
|
|
|
|
}
|
|
|
|
|
2020-07-05 01:57:36 +02:00
|
|
|
return ctx.ok();
|
2020-07-02 17:01:23 +02:00
|
|
|
}
|
|
|
|
|
2020-07-05 01:57:36 +02:00
|
|
|
Result<SslCtx> create_ssl_ctx(CSlice cert_file, SslStream::VerifyPeer verify_peer) {
|
|
|
|
if (cert_file.empty()) {
|
|
|
|
if (verify_peer == SslStream::VerifyPeer::On) {
|
|
|
|
return get_default_ssl_ctx();
|
|
|
|
} else {
|
|
|
|
return get_default_unverified_ssl_ctx();
|
|
|
|
}
|
2020-07-02 17:01:23 +02:00
|
|
|
}
|
|
|
|
return do_create_ssl_ctx(cert_file, verify_peer);
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace
|
2018-08-15 14:41:42 +02:00
|
|
|
|
2020-07-02 17:01:23 +02:00
|
|
|
class SslStreamImpl {
|
|
|
|
public:
|
2020-09-14 02:58:57 +02:00
|
|
|
Status init(CSlice host, CSlice cert_file, SslStream::VerifyPeer verify_peer, bool check_ip_address_as_host) {
|
2020-07-02 17:01:23 +02:00
|
|
|
static bool init_openssl = [] {
|
|
|
|
#if OPENSSL_VERSION_NUMBER >= 0x10100000L
|
|
|
|
return OPENSSL_init_ssl(0, nullptr) != 0;
|
|
|
|
#else
|
|
|
|
OpenSSL_add_all_algorithms();
|
|
|
|
SSL_load_error_strings();
|
|
|
|
return OpenSSL_add_ssl_algorithms() != 0;
|
|
|
|
#endif
|
|
|
|
}();
|
|
|
|
CHECK(init_openssl);
|
|
|
|
|
|
|
|
clear_openssl_errors("Before SslFd::init");
|
|
|
|
|
|
|
|
TRY_RESULT(ssl_ctx, create_ssl_ctx(cert_file, verify_peer));
|
|
|
|
|
|
|
|
auto ssl_handle = SslHandle(SSL_new(ssl_ctx.get()));
|
|
|
|
if (!ssl_handle) {
|
2018-08-15 14:41:42 +02:00
|
|
|
return create_openssl_error(-13, "Failed to create an SSL handle");
|
|
|
|
}
|
|
|
|
|
2020-05-16 16:50:58 +02:00
|
|
|
auto r_ip_address = IPAddress::get_ip_address(host);
|
|
|
|
|
2018-08-15 14:41:42 +02:00
|
|
|
#if OPENSSL_VERSION_NUMBER >= 0x10002000L
|
2020-07-02 17:01:23 +02:00
|
|
|
X509_VERIFY_PARAM *param = SSL_get0_param(ssl_handle.get());
|
2018-08-15 14:41:42 +02:00
|
|
|
X509_VERIFY_PARAM_set_hostflags(param, 0);
|
2020-09-14 02:58:57 +02:00
|
|
|
if (r_ip_address.is_ok() && !check_ip_address_as_host) {
|
2020-05-16 21:53:19 +02:00
|
|
|
LOG(DEBUG) << "Set verification IP address to " << r_ip_address.ok().get_ip_str();
|
2020-05-16 17:43:49 +02:00
|
|
|
X509_VERIFY_PARAM_set1_ip_asc(param, r_ip_address.ok().get_ip_str().c_str());
|
|
|
|
} else {
|
2020-05-16 21:53:19 +02:00
|
|
|
LOG(DEBUG) << "Set verification host to " << host;
|
2020-05-16 17:43:49 +02:00
|
|
|
X509_VERIFY_PARAM_set1_host(param, host.c_str(), 0);
|
|
|
|
}
|
2018-08-15 14:41:42 +02:00
|
|
|
#else
|
|
|
|
#warning DANGEROUS! HTTPS HOST WILL NOT BE CHECKED. INSTALL OPENSSL >= 1.0.2 OR IMPLEMENT HTTPS HOST CHECK MANUALLY
|
|
|
|
#endif
|
|
|
|
|
2018-08-15 15:29:46 +02:00
|
|
|
auto *bio = BIO_new(BIO_s_sslstream());
|
2018-08-16 00:06:53 +02:00
|
|
|
BIO_set_data(bio, static_cast<void *>(this));
|
2020-07-02 17:01:23 +02:00
|
|
|
SSL_set_bio(ssl_handle.get(), bio, bio);
|
2018-08-15 14:41:42 +02:00
|
|
|
|
|
|
|
#if OPENSSL_VERSION_NUMBER >= 0x0090806fL && !defined(OPENSSL_NO_TLSEXT)
|
2020-05-16 16:50:58 +02:00
|
|
|
if (r_ip_address.is_error()) { // IP address must not be send as SNI
|
2020-05-16 21:53:19 +02:00
|
|
|
LOG(DEBUG) << "Set SNI host name to " << host;
|
2020-05-16 16:50:58 +02:00
|
|
|
auto host_str = host.str();
|
2020-07-02 17:01:23 +02:00
|
|
|
SSL_set_tlsext_host_name(ssl_handle.get(), MutableCSlice(host_str).begin());
|
2020-05-16 16:50:58 +02:00
|
|
|
}
|
2018-08-15 14:41:42 +02:00
|
|
|
#endif
|
2020-07-02 17:01:23 +02:00
|
|
|
SSL_set_connect_state(ssl_handle.get());
|
2018-08-15 14:41:42 +02:00
|
|
|
|
2020-07-02 17:01:23 +02:00
|
|
|
ssl_handle_ = std::move(ssl_handle);
|
2018-08-15 14:41:42 +02:00
|
|
|
|
|
|
|
return Status::OK();
|
|
|
|
}
|
|
|
|
|
2018-08-15 15:29:46 +02:00
|
|
|
ByteFlowInterface &read_byte_flow() {
|
2018-08-15 14:41:42 +02:00
|
|
|
return read_flow_;
|
|
|
|
}
|
2018-08-15 15:29:46 +02:00
|
|
|
ByteFlowInterface &write_byte_flow() {
|
2018-08-15 14:41:42 +02:00
|
|
|
return write_flow_;
|
|
|
|
}
|
|
|
|
size_t flow_read(MutableSlice slice) {
|
|
|
|
return read_flow_.read(slice);
|
|
|
|
}
|
|
|
|
size_t flow_write(Slice slice) {
|
|
|
|
return write_flow_.write(slice);
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
2020-07-02 17:01:23 +02:00
|
|
|
SslHandle ssl_handle_;
|
2018-08-15 14:41:42 +02:00
|
|
|
|
|
|
|
friend class SslReadByteFlow;
|
|
|
|
friend class SslWriteByteFlow;
|
|
|
|
|
|
|
|
Result<size_t> write(Slice slice) {
|
2020-06-06 20:31:47 +02:00
|
|
|
clear_openssl_errors("Before SslFd::write");
|
2020-07-02 17:01:23 +02:00
|
|
|
auto size = SSL_write(ssl_handle_.get(), slice.data(), static_cast<int>(slice.size()));
|
2018-08-15 14:41:42 +02:00
|
|
|
if (size <= 0) {
|
|
|
|
return process_ssl_error(size);
|
|
|
|
}
|
|
|
|
return size;
|
|
|
|
}
|
|
|
|
|
|
|
|
Result<size_t> read(MutableSlice slice) {
|
2020-06-06 20:31:47 +02:00
|
|
|
clear_openssl_errors("Before SslFd::read");
|
2020-07-02 17:01:23 +02:00
|
|
|
auto size = SSL_read(ssl_handle_.get(), slice.data(), static_cast<int>(slice.size()));
|
2018-08-15 14:41:42 +02:00
|
|
|
if (size <= 0) {
|
|
|
|
return process_ssl_error(size);
|
|
|
|
}
|
|
|
|
return size;
|
|
|
|
}
|
|
|
|
|
|
|
|
class SslReadByteFlow : public ByteFlowBase {
|
|
|
|
public:
|
2018-08-16 00:06:53 +02:00
|
|
|
explicit SslReadByteFlow(SslStreamImpl *stream) : stream_(stream) {
|
2018-08-15 14:41:42 +02:00
|
|
|
}
|
2020-07-22 20:52:00 +02:00
|
|
|
bool loop() override {
|
|
|
|
auto to_read = output_.prepare_append();
|
|
|
|
auto r_size = stream_->read(to_read);
|
|
|
|
if (r_size.is_error()) {
|
|
|
|
finish(r_size.move_as_error());
|
|
|
|
return false;
|
2018-08-15 14:41:42 +02:00
|
|
|
}
|
2020-07-22 20:52:00 +02:00
|
|
|
auto size = r_size.move_as_ok();
|
|
|
|
if (size == 0) {
|
|
|
|
return false;
|
2018-08-15 14:41:42 +02:00
|
|
|
}
|
2020-07-22 20:52:00 +02:00
|
|
|
output_.confirm_append(size);
|
|
|
|
return true;
|
2018-08-15 14:41:42 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
size_t read(MutableSlice data) {
|
2018-08-16 00:06:53 +02:00
|
|
|
return input_->advance(min(data.size(), input_->size()), data);
|
2018-08-15 14:41:42 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
2018-08-15 15:29:46 +02:00
|
|
|
SslStreamImpl *stream_;
|
2018-08-15 14:41:42 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
class SslWriteByteFlow : public ByteFlowBase {
|
|
|
|
public:
|
2018-08-16 00:06:53 +02:00
|
|
|
explicit SslWriteByteFlow(SslStreamImpl *stream) : stream_(stream) {
|
2018-08-15 14:41:42 +02:00
|
|
|
}
|
2020-07-22 20:52:00 +02:00
|
|
|
bool loop() override {
|
|
|
|
auto to_write = input_->prepare_read();
|
|
|
|
auto r_size = stream_->write(to_write);
|
|
|
|
if (r_size.is_error()) {
|
|
|
|
finish(r_size.move_as_error());
|
|
|
|
return false;
|
2018-08-15 14:41:42 +02:00
|
|
|
}
|
2020-07-22 20:52:00 +02:00
|
|
|
auto size = r_size.move_as_ok();
|
|
|
|
if (size == 0) {
|
|
|
|
return false;
|
2018-08-15 14:41:42 +02:00
|
|
|
}
|
2020-07-22 20:52:00 +02:00
|
|
|
input_->confirm_read(size);
|
|
|
|
return true;
|
2018-08-15 14:41:42 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
size_t write(Slice data) {
|
|
|
|
output_.append(data);
|
|
|
|
return data.size();
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
2018-08-15 15:29:46 +02:00
|
|
|
SslStreamImpl *stream_;
|
2018-08-15 14:41:42 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
SslReadByteFlow read_flow_{this};
|
|
|
|
SslWriteByteFlow write_flow_{this};
|
|
|
|
|
|
|
|
Result<size_t> process_ssl_error(int ret) {
|
2018-08-15 15:29:46 +02:00
|
|
|
auto os_error = OS_ERROR("SSL_ERROR_SYSCALL");
|
2020-07-02 17:01:23 +02:00
|
|
|
int error = SSL_get_error(ssl_handle_.get(), ret);
|
2018-08-15 14:41:42 +02:00
|
|
|
switch (error) {
|
|
|
|
case SSL_ERROR_NONE:
|
|
|
|
LOG(ERROR) << "SSL_get_error returned no error";
|
|
|
|
return 0;
|
|
|
|
case SSL_ERROR_ZERO_RETURN:
|
2020-05-16 19:26:21 +02:00
|
|
|
LOG(DEBUG) << "SSL_ZERO_RETURN";
|
2018-08-15 14:41:42 +02:00
|
|
|
return 0;
|
|
|
|
case SSL_ERROR_WANT_READ:
|
2020-05-16 19:26:21 +02:00
|
|
|
LOG(DEBUG) << "SSL_WANT_READ";
|
2018-08-15 14:41:42 +02:00
|
|
|
return 0;
|
|
|
|
case SSL_ERROR_WANT_WRITE:
|
2020-05-16 19:26:21 +02:00
|
|
|
LOG(DEBUG) << "SSL_WANT_WRITE";
|
2018-08-15 14:41:42 +02:00
|
|
|
return 0;
|
|
|
|
case SSL_ERROR_WANT_CONNECT:
|
|
|
|
case SSL_ERROR_WANT_ACCEPT:
|
|
|
|
case SSL_ERROR_WANT_X509_LOOKUP:
|
2020-05-16 19:26:21 +02:00
|
|
|
LOG(DEBUG) << "SSL: CONNECT ACCEPT LOOKUP";
|
2018-08-15 14:41:42 +02:00
|
|
|
return 0;
|
|
|
|
case SSL_ERROR_SYSCALL:
|
|
|
|
if (ERR_peek_error() == 0) {
|
2018-08-15 15:29:46 +02:00
|
|
|
if (os_error.code() != 0) {
|
2020-05-16 19:26:21 +02:00
|
|
|
LOG(DEBUG) << "SSL_ERROR_SYSCALL";
|
2018-08-15 15:29:46 +02:00
|
|
|
return std::move(os_error);
|
2018-08-15 14:41:42 +02:00
|
|
|
} else {
|
2020-05-16 19:26:21 +02:00
|
|
|
LOG(DEBUG) << "SSL_SYSCALL";
|
2018-08-15 14:41:42 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
2020-12-16 14:04:27 +01:00
|
|
|
/* fallthrough */
|
2018-08-15 14:41:42 +02:00
|
|
|
default:
|
|
|
|
LOG(DEBUG) << "SSL_ERROR Default";
|
|
|
|
return create_openssl_error(1, "SSL error ");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
namespace {
|
2018-08-15 15:29:46 +02:00
|
|
|
int strm_read(BIO *b, char *buf, int len) {
|
2018-08-16 00:06:53 +02:00
|
|
|
auto *stream = static_cast<SslStreamImpl *>(BIO_get_data(b));
|
|
|
|
CHECK(stream != nullptr);
|
2018-08-15 14:41:42 +02:00
|
|
|
BIO_clear_retry_flags(b);
|
2020-05-19 14:11:21 +02:00
|
|
|
CHECK(buf != nullptr);
|
2018-08-15 14:41:42 +02:00
|
|
|
int res = narrow_cast<int>(stream->flow_read(MutableSlice(buf, len)));
|
|
|
|
if (res == 0) {
|
|
|
|
BIO_set_retry_read(b);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return res;
|
|
|
|
}
|
2018-08-15 15:29:46 +02:00
|
|
|
int strm_write(BIO *b, const char *buf, int len) {
|
2018-08-16 00:06:53 +02:00
|
|
|
auto *stream = static_cast<SslStreamImpl *>(BIO_get_data(b));
|
|
|
|
CHECK(stream != nullptr);
|
2018-08-15 14:41:42 +02:00
|
|
|
BIO_clear_retry_flags(b);
|
2020-05-19 14:11:21 +02:00
|
|
|
CHECK(buf != nullptr);
|
2018-08-15 14:41:42 +02:00
|
|
|
return narrow_cast<int>(stream->flow_write(Slice(buf, len)));
|
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
|
|
|
} // namespace detail
|
|
|
|
|
|
|
|
SslStream::SslStream() = default;
|
2018-08-15 15:29:46 +02:00
|
|
|
SslStream::SslStream(SslStream &&) = default;
|
|
|
|
SslStream &SslStream::operator=(SslStream &&) = default;
|
2018-08-15 14:41:42 +02:00
|
|
|
SslStream::~SslStream() = default;
|
|
|
|
|
2020-09-14 02:58:57 +02:00
|
|
|
Result<SslStream> SslStream::create(CSlice host, CSlice cert_file, VerifyPeer verify_peer,
|
|
|
|
bool use_ip_address_as_host) {
|
2018-09-27 03:19:03 +02:00
|
|
|
auto impl = make_unique<detail::SslStreamImpl>();
|
2020-09-14 02:58:57 +02:00
|
|
|
TRY_STATUS(impl->init(host, cert_file, verify_peer, use_ip_address_as_host));
|
2018-08-15 14:41:42 +02:00
|
|
|
return SslStream(std::move(impl));
|
|
|
|
}
|
2018-09-27 03:19:03 +02:00
|
|
|
SslStream::SslStream(unique_ptr<detail::SslStreamImpl> impl) : impl_(std::move(impl)) {
|
2018-08-15 14:41:42 +02:00
|
|
|
}
|
2018-08-15 15:29:46 +02:00
|
|
|
ByteFlowInterface &SslStream::read_byte_flow() {
|
2018-08-15 14:41:42 +02:00
|
|
|
return impl_->read_byte_flow();
|
|
|
|
}
|
2018-08-15 15:29:46 +02:00
|
|
|
ByteFlowInterface &SslStream::write_byte_flow() {
|
2018-08-15 14:41:42 +02:00
|
|
|
return impl_->write_byte_flow();
|
|
|
|
}
|
|
|
|
size_t SslStream::flow_read(MutableSlice slice) {
|
|
|
|
return impl_->flow_read(slice);
|
|
|
|
}
|
|
|
|
size_t SslStream::flow_write(Slice slice) {
|
|
|
|
return impl_->flow_write(slice);
|
|
|
|
}
|
2018-08-15 22:05:06 +02:00
|
|
|
|
2018-08-15 14:41:42 +02:00
|
|
|
} // namespace td
|
2019-07-22 06:01:51 +02:00
|
|
|
|
|
|
|
#else
|
|
|
|
|
2019-06-28 13:03:06 +02:00
|
|
|
namespace td {
|
2019-07-22 06:01:51 +02:00
|
|
|
|
2019-06-28 13:03:06 +02:00
|
|
|
namespace detail {
|
2019-07-22 06:01:51 +02:00
|
|
|
class SslStreamImpl {};
|
|
|
|
} // namespace detail
|
|
|
|
|
2019-06-28 13:03:06 +02:00
|
|
|
SslStream::SslStream() = default;
|
|
|
|
SslStream::SslStream(SslStream &&) = default;
|
|
|
|
SslStream &SslStream::operator=(SslStream &&) = default;
|
|
|
|
SslStream::~SslStream() = default;
|
|
|
|
|
2020-10-08 00:21:28 +02:00
|
|
|
Result<SslStream> SslStream::create(CSlice host, CSlice cert_file, VerifyPeer verify_peer,
|
|
|
|
bool check_ip_address_as_host) {
|
2019-06-28 13:03:06 +02:00
|
|
|
return Status::Error("Not supported in emscripten");
|
|
|
|
}
|
2019-07-22 06:01:51 +02:00
|
|
|
|
2019-06-28 13:03:06 +02:00
|
|
|
SslStream::SslStream(unique_ptr<detail::SslStreamImpl> impl) : impl_(std::move(impl)) {
|
|
|
|
}
|
2019-07-22 06:01:51 +02:00
|
|
|
|
2019-06-28 13:03:06 +02:00
|
|
|
ByteFlowInterface &SslStream::read_byte_flow() {
|
|
|
|
UNREACHABLE();
|
|
|
|
}
|
2019-07-22 06:01:51 +02:00
|
|
|
|
2019-06-28 13:03:06 +02:00
|
|
|
ByteFlowInterface &SslStream::write_byte_flow() {
|
|
|
|
UNREACHABLE();
|
|
|
|
}
|
2019-07-22 06:01:51 +02:00
|
|
|
|
2019-06-28 13:03:06 +02:00
|
|
|
size_t SslStream::flow_read(MutableSlice slice) {
|
|
|
|
UNREACHABLE();
|
|
|
|
}
|
2019-07-22 06:01:51 +02:00
|
|
|
|
2019-06-28 13:03:06 +02:00
|
|
|
size_t SslStream::flow_write(Slice slice) {
|
|
|
|
UNREACHABLE();
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace td
|
2019-07-22 06:01:51 +02:00
|
|
|
|
2019-06-28 13:03:06 +02:00
|
|
|
#endif
|