/*<copyright>
* <year>1999-2008</year>
* <holder>Ericsson AB, All Rights Reserved</holder>
*</copyright>
*<legalnotice>
* The contents of this file are subject to the Erlang Public License,
* Version 1.1, (the "License"); you may not use this file except in
* compliance with the License. You should have received a copy of the
* Erlang Public License along with this software. If not, it can be
* retrieved online at http://www.erlang.org/.
*
* Software distributed under the License is distributed on an "AS IS"
* basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See
* the License for the specific language governing rights and limitations
* under the License.
*
* The Initial Developer of the Original Code is Ericsson AB.
*</legalnotice>
*/
/*
* Purpose: Adaptions for the OpenSSL package.
*
* This file implements the functions defined in esock_ssl.h for
* the OpenSSL package.
*
* The following holds true for non-blockling I/O:
*
* Function Return values
* -------- -------------
* SSL_accept() success: 1, failure: =<0
* SSL_connect() success: 1, failure: =<0
* SSL_read() success: >0, eof: 0, failure: <0
* SSL_write() success: > 0, failure: =<0
* SSL_shutdown() success: 1, not finished: 0
*
* If the return value of any of the above functions is `ret' and the
* ssl connection is `ssl', the call
*
* ssl_error = SSL_get_error(ssl, ret);
*
* returns one of the following eight values:
*
* SSL_ERROR_NONE ret > 0
* SSL_ERROR_ZERO_RETURN ret = 0
* SSL_ERROR_WANT_READ ret < 0 and ssl wants to read
* SSL_ERROR_WANT_WRITE ret < 0 and ssl wants to write
* SSL_ERROR_SYSCALL ret < 0 or ret = 0
* SSL_ERROR_SSL if there was an ssl internal error
* SSL_ERROR_WANT_X509_LOOKUP ret < 0 and ssl wants x509 lookup
* SSL_ERROR_WANT_CONNECT ret < 0 and ssl wants connect
*
* It is the case that SSL_read() sometimes returns -1, even when the
* underlying file descriptor is ready for reading.
*
* Also, sometimes we may have SSL_ERROR_SSL in SSL_accept() and SSL_connect()
* when a retry should be done.
*
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <errno.h>
#ifndef __WIN32__
# include <fcntl.h>
# include <unistd.h>
#endif
#include "esock.h"
#include "esock_ssl.h"
#include "debuglog.h"
#include "esock_utils.h"
#include "esock_posix_str.h"
#include <openssl/crypto.h>
#include <openssl/ssl.h>
#include <openssl/err.h>
#include <openssl/rand.h>
int ephemeral_rsa = 0;
int ephemeral_dh = 0; /* XXX Not used yet */
int protocol_version = 0;
char *esock_ssl_errstr = "";
#define FLAGSBUFSIZE 512
#define X509BUFSIZE 256
#define DEFAULT_VERIFY_DEPTH 1
#define SET_WANT(cp, ssl_error) \
switch((ssl_error)) { \
case SSL_ERROR_WANT_READ: \
(cp)->ssl_want = ESOCK_SSL_WANT_READ; \
break; \
case SSL_ERROR_WANT_WRITE: \
(cp)->ssl_want = ESOCK_SSL_WANT_WRITE; \
break; \
default: \
(cp)->ssl_want = 0; \
break; \
}
#define RESET_ERRSTR() \
esock_ssl_errstr = "";
#define MAYBE_SET_ERRSTR(s) \
if (!esock_ssl_errstr[0]) \
esock_ssl_errstr = (s);
typedef struct {
int code;
char *text;
} err_entry;
typedef struct {
SSL_CTX *ctx;
char *passwd;
int verify_depth;
} callback_data;
static char *ssl_error_str(int error);
static void end_ssl_call(int ret, Connection *cp, int ssl_error);
static void check_shutdown(Connection *cp);
static int set_ssl_parameters(Connection *cp, SSL_CTX *ctx);
static int verify_callback(int ok, X509_STORE_CTX *ctx);
static int passwd_callback(char *buf, int num, int rwflag, void *userdata);
static void info_callback(const SSL *ssl, int where, int ret);
static void callback_data_free(void *parent, void *ptr,
CRYPTO_EX_DATA *ad,
int idx, long arg1, void *argp);
static RSA *tmp_rsa_callback(SSL *ssl, int is_export, int keylen);
static void restrict_protocols(SSL_CTX *ctx);
static err_entry errs[] = {
{SSL_ERROR_NONE, "SSL_ERROR_NONE"},
{SSL_ERROR_ZERO_RETURN, "SSL_ERROR_ZERO_RETURN"},
{SSL_ERROR_WANT_READ, "SSL_ERROR_WANT_READ"},
{SSL_ERROR_WANT_WRITE, "SSL_ERROR_WANT_WRITE"},
{SSL_ERROR_SYSCALL, "SSL_ERROR_SYSCALL"},
{SSL_ERROR_SSL, "SSL_ERROR_SSL"},
{SSL_ERROR_WANT_X509_LOOKUP, "SSL_ERROR_WANT_X509_LOOKUP"},
{SSL_ERROR_WANT_CONNECT, "SSL_ERROR_WANT_CONNECT"}
};
static SSL_METHOD *method; /* for listen and connect init */
static char x509_buf[X509BUFSIZE]; /* for verify_callback */
static int callback_data_index = -1; /* for ctx ex_data */
static unsigned char randvec[1024]; /* XXX */
#if defined(__WIN32__) || OPEN_MAX > 256
# define FOPEN_WORKAROUND(var, expr) var = (expr)
# define VOID_FOPEN_WORKAROUND(expr) expr
#else
/*
* This is an ugly workaround. On Solaris, fopen() will return NULL if
* it gets a file descriptor > 255. To avoid that, we'll make sure that
* there is always one low-numbered file descriptor available when
* fopen() is called.
*/
static int reserved_fd; /* Reserve a low-numbered file descriptor */
# define USE_FOPEN_WORKAROUND 1
# define FOPEN_WORKAROUND(var, expr) \
do { \
close(reserved_fd); \
var = (expr); \
reserved_fd = open("/dev/null", O_RDONLY); \
} while (0)
# define VOID_FOPEN_WORKAROUND(expr) \
do { \
close(reserved_fd); \
expr; \
reserved_fd = open("/dev/null", O_RDONLY); \
} while (0)
#endif
esock_version *esock_ssl_version(void)
{
static esock_version vsn;
vsn.compile_version = OPENSSL_VERSION_TEXT;
vsn.lib_version = SSLeay_version(SSLEAY_VERSION);
return &vsn;
}
char *esock_ssl_ciphers(void)
{
SSL_CTX *ctx;
SSL *ssl;
char *ciphers;
const char *cp;
int i = 0, used = 0, len, incr = 1024;
if (!(ctx = SSL_CTX_new(method)))
return NULL;
restrict_protocols(ctx);
if (!(ssl = SSL_new(ctx))) {
SSL_CTX_free(ctx);
return NULL;
}
ciphers = esock_malloc(incr);
len = incr;
*ciphers = '\0';
while (1) {
if (!(cp = SSL_get_cipher_list(ssl, i)))
break;
if (i > 0) {
if (used == len) {
len += incr;
ciphers = esock_realloc(ciphers, len);
}
strcat(ciphers, ":");
used++;
}
if (strlen(cp) + used >= len) {
len += incr;
ciphers = esock_realloc(ciphers, len);
}
strcat(ciphers, cp);
used += strlen(cp);
i++;
}
SSL_free(ssl);
SSL_CTX_free(ctx);
return ciphers;
}
void esock_ssl_seed(void *buf, int len)
{
RAND_seed(buf, len);
/* XXX Maybe we should call RAND_status() and check if we have got
* enough randomness.
*/
}
int esock_ssl_init(void)
{
method = SSLv23_method(); /* SSLv2, SSLv3 and TLSv1, may be restricted
in listen and connect */
SSL_load_error_strings();
SSL_library_init();
esock_ssl_seed(randvec, sizeof(randvec));
callback_data_index = SSL_CTX_get_ex_new_index(0, "callback_data",
NULL, NULL,
callback_data_free);
#ifdef USE_FOPEN_WORKAROUND
reserved_fd = open("/dev/null", O_RDONLY);
DEBUGF(("init: reserved_fd=%d\r\n", reserved_fd));
#endif
return 0;
}
void esock_ssl_finish(void)
{
/* Nothing */
}
void esock_ssl_free(Connection *cp)
{
SSL *ssl = cp->opaque;
SSL_CTX *ctx;
if (ssl) {
ctx = SSL_get_SSL_CTX(ssl);
SSL_free(ssl);
if (cp->origin != ORIG_ACCEPT)
SSL_CTX_free(ctx);
cp->opaque = NULL;
}
}
/*
* Print SSL specific errors.
*/
void esock_ssl_print_errors_fp(FILE *fp)
{
ERR_print_errors_fp(fp);
}
int esock_ssl_accept_init(Connection *cp, void *listenssl)
{
SSL_CTX *listenctx;
SSL *ssl;
RESET_ERRSTR();
MAYBE_SET_ERRSTR("esslacceptinit");
if(!listenssl) {
DEBUGF(("esock_ssl_accept_init: listenssl null\n"));
return -1;
}
if (!(listenctx = SSL_get_SSL_CTX(listenssl))) {
DEBUGF(("esock_ssl_accept_init: SSL_get_SSL_CTX\n"));
return -1;
}
if (!(ssl = cp->opaque = SSL_new(listenctx))) {
DEBUGF(("esock_ssl_accept_init: SSL_new(listenctx)\n"));
return -1;
}
SSL_set_fd(ssl, cp->fd);
return 0;
}
int esock_ssl_connect_init(Connection *cp)
{
SSL_CTX *ctx;
SSL *ssl;
RESET_ERRSTR();
MAYBE_SET_ERRSTR("esslconnectinit");
if (!(ctx = SSL_CTX_new(method)))
return -1;
if (set_ssl_parameters(cp, ctx) < 0) {
SSL_CTX_free(ctx);
return -1;
}
restrict_protocols(ctx);
if (!(ssl = cp->opaque = SSL_new(ctx))) {
SSL_CTX_free(ctx);
return -1;
}
SSL_set_fd(ssl, cp->fd);
return 0;
}
int esock_ssl_listen_init(Connection *cp)
{
SSL_CTX *ctx;
SSL *ssl;
RESET_ERRSTR();
MAYBE_SET_ERRSTR("essllisteninit");
if (!(ctx = SSL_CTX_new(method)))
return -1;
if (set_ssl_parameters(cp, ctx) < 0) {
SSL_CTX_free(ctx);
return -1;
}
restrict_protocols(ctx);
/* The allocation of ctx is for setting ssl parameters, so that
* accepts can inherit them. We allocate ssl to be able to
* refer to it via cp->opaque, but will not be used otherwise.
*/
if (!(ssl = cp->opaque = SSL_new(ctx))) {
SSL_CTX_free(ctx);
return -1;
}
/* Set callback for temporary ephemeral RSA key generation.
* Note: for servers only. */
SSL_CTX_set_tmp_rsa_callback(ctx, tmp_rsa_callback);
return 0;
}
/*
* esock_ssl_accept(Connection *cp)
*
*/
int esock_ssl_accept(Connection *cp)
{
int ret, ssl_error;
SSL *ssl = cp->opaque;
RESET_ERRSTR();
DEBUGF(("esock_ssl_accept: calling SSL_accept fd = %d\n"
" state before: %s\n", cp->fd, SSL_state_string(ssl)));
ret = SSL_accept(ssl);
DEBUGF((" sock_errno %d errno %d \n", sock_errno(), errno));
ssl_error = SSL_get_error(ssl, ret);
DEBUGF((" SSL_accept = %d\n"
" ssl_error: %s\n"
" state after: %s\n",
ret, ssl_error_str(ssl_error), SSL_state_string(ssl)));
DEBUGF((" ret %d os error %s\n", ret, strerror(errno)));
if (ret > 0)
return ret;
else if (ret == 0) {
const char* f; int l; unsigned int e;
while ((e = ERR_get_error_line(&f, &l))) {
DEBUGF((" error %s:%d %s\n", f, l, ssl_error_str(e)));
}
/* permanent accept error */
sock_set_errno(ERRNO_NONE);
MAYBE_SET_ERRSTR("esslaccept");
return -1;
}
end_ssl_call(ret, cp, ssl_error);
return ret;
}
/*
* esock_ssl_connect(Connection *cp)
*
*/
int esock_ssl_connect(Connection *cp)
{
int ret, ssl_error;
SSL *ssl = cp->opaque;
RESET_ERRSTR();
DEBUGF(("esock_ssl_connect: calling SSL_connect fd = %d\n"
" state before: %s\n", cp->fd, SSL_state_string(ssl)));
ret = SSL_connect(ssl);
ssl_error = SSL_get_error(ssl, ret);
DEBUGF((" SSL_connect() = %d\n"
" ssl_error: %s\n"
" state after: %s\n",
ret, ssl_error_str(ssl_error), SSL_state_string(ssl)));
if (ret > 0)
return ret;
else if (ret == 0) {
/* permanent connect error */
sock_set_errno(ERRNO_NONE);
MAYBE_SET_ERRSTR("esslconnect");
return -1;
}
end_ssl_call(ret, cp, ssl_error);
return ret;
}
int esock_ssl_session_reused(Connection *cp)
{
SSL *ssl = cp->opaque;
return SSL_session_reused(ssl);
}
/* esock_ssl_read(Connection *cp, char *buf, int len)
*
* Read at most `len' chars into `buf'. Returns number of chars
* read ( > 0), or 0 at EOF, or -1 on error. Sets cp->eof, cp->bp if
* appropriate.
*/
int esock_ssl_read(Connection *cp, char *buf, int len)
{
int ret, ssl_error;
SSL *ssl = cp->opaque;
RESET_ERRSTR();
DEBUGF(("esock_ssl_read: calling SSL_read fd = %d\n"
" state before: %s\n", cp->fd, SSL_state_string(ssl)));
ret = SSL_read(ssl, buf, len);
ssl_error = SSL_get_error(ssl, ret);
DEBUGF((" SSL_read = %d\n"
" ssl_error: %s\n"
" state after: %s\n",
ret, ssl_error_str(ssl_error), SSL_state_string(ssl)));
if (ssl_error == SSL_ERROR_NONE) {
DEBUGMSGF(("message (hex) : [%3.*a]\n", ret, buf));
DEBUGMSGF(("message (char): [%3.*b]\n", ret, buf));
}
if (ret > 0)
return ret;
if (ret == 0) {
check_shutdown(cp);
return ret;
}
end_ssl_call(ret, cp, ssl_error);
return ret;
}
/*
* esock_ssl_write(Connection *cp, char *buf, int len)
*
* Writes at most `len' chars from `buf'. Returns number of chars
* written, or -1 on error.
*/
int esock_ssl_write(Connection *cp, char *buf, int len)
{
int ret, ssl_error;
SSL *ssl = cp->opaque;
RESET_ERRSTR();
DEBUGF(("esock_ssl_write: calling SSL_write fd = %d\n"
" state before: %s\n", cp->fd, SSL_state_string(ssl)));
ret = SSL_write(ssl, buf, len);
ssl_error = SSL_get_error(ssl, ret);
DEBUGF((" SSL_write = %d\n"
" ssl_error: %s\n"
" state after: %s\n",
ret, ssl_error_str(ssl_error), SSL_state_string(ssl)));
if (ssl_error == SSL_ERROR_NONE) {
DEBUGMSGF(("message (hex) : [%3.*a]\n", ret, buf));
DEBUGMSGF(("message (char): [%3.*b]\n", ret, buf));
}
if (ret > 0)
return ret;
if (ret == 0) {
check_shutdown(cp);
return ret;
}
end_ssl_call(ret, cp, ssl_error);
return ret;
}
int esock_ssl_shutdown(Connection *cp)
{
int ret, ssl_error;
SSL *ssl = cp->opaque;
RESET_ERRSTR();
DEBUGF(("esock_ssl_shutdown: calling SSL_shutdown fd = %d\n"
" state before: %s\n", cp->fd, SSL_state_string(ssl)));
ret = SSL_shutdown(ssl);
ssl_error = SSL_get_error(ssl, ret);
DEBUGF((" SSL_shutdown = %d\n"
" ssl_error: %s\n"
" state after: %s\n",
ret, ssl_error_str(ssl_error), SSL_state_string(ssl)));
if (ret >= 0) {
check_shutdown(cp);
return ret;
}
end_ssl_call(ret, cp, ssl_error);
return ret;
}
/* Returns total number of bytes in DER encoded cert pointed to by
* *buf, which is allocated by this function, unless return < 0.
* XXX X509_free ??
*/
int esock_ssl_getpeercert(Connection *cp, unsigned char **buf)
{
int len;
SSL *ssl = cp->opaque;
X509 *x509;
unsigned char *tmp;
RESET_ERRSTR();
if((x509 = SSL_get_peer_certificate(ssl)) == NULL) {
MAYBE_SET_ERRSTR("enopeercert"); /* XXX doc */
return -1;
}
if ((len = i2d_X509(x509, NULL)) <= 0) {
MAYBE_SET_ERRSTR("epeercert");
return -1;
}
tmp = *buf = esock_malloc(len);
/* We must use a temporary value here, since i2d_X509(X509 *x,
* unsigned char **out) increments *out.
*/
if (i2d_X509(x509, &tmp) < 0) {
esock_free(tmp);
MAYBE_SET_ERRSTR("epeercert");
return -1;
}
return len;
}
/* Returns total number of bytes in chain of certs. Each cert begins
* with a 4-bytes length. The last cert is ended with 4-bytes of
* zeros. The result is returned in *buf, which is allocated unless
* the return value is < 0.
* XXX X509_free ? sk_X509_free ?
* XXX X509_free is reference counting.
*/
int esock_ssl_getpeercertchain(Connection *cp, unsigned char **buf)
{
SSL *ssl = cp->opaque;
STACK_OF(X509) *x509_stack;
X509 *x509;
int num, i, totlen, pos, *der_len;
unsigned char *vbuf;
RESET_ERRSTR();
if((x509_stack = SSL_get_peer_cert_chain(ssl)) == NULL) {
MAYBE_SET_ERRSTR("enopeercertchain"); /* XXX doc */
return -1;
}
num = sk_X509_num(x509_stack);
der_len = esock_malloc(num * sizeof(int));
totlen = 0;
for (i = 0; i < num; i++) {
x509 = sk_X509_value(x509_stack, i);
totlen += 4;
if ((der_len[i] = i2d_X509(x509, NULL)) < 0) {
MAYBE_SET_ERRSTR("epeercertchain");
esock_free(der_len);
return -1;
}
totlen += der_len[i];
}
totlen += 4;
vbuf = *buf = esock_malloc(totlen);
pos = 0;
for (i = 0; i < num; i++) {
x509 = sk_X509_value(x509_stack, i);
PUT_INT32(der_len[i], vbuf);
vbuf += 4;
/* Note: i2d_X509 increments vbuf */
if (i2d_X509(x509, &vbuf) < 0) {
MAYBE_SET_ERRSTR("epeercertchain");
esock_free(*buf);
esock_free(der_len);
return -1;
}
}
esock_free(der_len);
return totlen;
}
int esock_ssl_getprotocol_version(Connection *cp, char **buf)
{
SSL *ssl = cp->opaque;
RESET_ERRSTR();
if (!ssl) {
MAYBE_SET_ERRSTR("enoent");
return -1;
}
*buf = (char *) SSL_get_version(ssl);
return 0;
}
int esock_ssl_getcipher(Connection *cp, char **buf)
{
SSL *ssl = cp->opaque;
RESET_ERRSTR();
if (!ssl) {
MAYBE_SET_ERRSTR("enoent");
return -1;
}
*buf = (char *) SSL_get_cipher(ssl);
return 0;
}
/* Local functions */
static char *ssl_error_str(int ssl_error)
{
int i;
static char buf[128];
for (i = 0; i < sizeof(errs)/sizeof(err_entry); i ++) {
if (ssl_error == errs[i].code)
return errs[i].text;
}
sprintf(buf, "esock_openssl: SSL_error unknown: %d", ssl_error);
return buf;
}
void end_ssl_call(int ret, Connection *cp, int ssl_error)
{
SET_WANT(cp, ssl_error);
switch (ssl_error) {
case SSL_ERROR_SYSCALL:
/* Typically sock_errno() is equal to ERRNO_BLOCK */
MAYBE_SET_ERRSTR(esock_posix_str(sock_errno()));
break;
case SSL_ERROR_SSL:
sock_set_errno(ERRNO_NONE);
MAYBE_SET_ERRSTR("esslerrssl");
break;
case SSL_ERROR_WANT_X509_LOOKUP:
SSLDEBUGF();
sock_set_errno(ERRNO_NONE);
MAYBE_SET_ERRSTR("ex509lookup");
break;
case SSL_ERROR_WANT_CONNECT:
SSLDEBUGF();
sock_set_errno(ERRNO_NONE);
MAYBE_SET_ERRSTR("ewantconnect");
break;
default:
break;
}
}
void check_shutdown(Connection *cp)
{
int sd_mode;
SSL *ssl = cp->opaque;
sd_mode = SSL_get_shutdown(ssl);
if (sd_mode & SSL_RECEIVED_SHUTDOWN)
cp->eof = 1;
if (sd_mode & SSL_SENT_SHUTDOWN) {
DEBUGF(("check_shutdown SSL_SENT_SHUTDOWN\n"));
cp->bp = 1;
}
}
/*
* set_ssl_parameters
*
* Set ssl parameters from connection structure. Only called for
* listen and connect.
*
* Note: The -cacertdir option is not documented.
*/
static int set_ssl_parameters(Connection *cp, SSL_CTX *ctx)
{
char *cacertfile = NULL, *cacertdir = NULL, *certfile = NULL;
char *keyfile = NULL, *ciphers = NULL, *password = NULL;
int verify = 0, verify_depth = DEFAULT_VERIFY_DEPTH, verify_mode;
int i, argc;
char **argv;
callback_data *cb_data;
RESET_ERRSTR();
argc = esock_build_argv(cp->flags, &argv);
DEBUGF(("Argv:\n"));
for (i = 0; i < argc; i++) {
DEBUGF(("%d: %s\n", i, argv[i]));
}
for (i = 0; i < argc; i++) {
if (strcmp(argv[i], "-verify") == 0) {
verify = atoi(argv[++i]);
} else if (strcmp(argv[i], "-depth") == 0) {
verify_depth = atoi(argv[++i]);
} else if (strcmp(argv[i], "-log") == 0) {
/* XXX ignored: logging per connection not supported */
i++;
} else if (strcmp(argv[i], "-certfile") == 0) {
certfile = argv[++i];
} else if (strcmp(argv[i], "-keyfile") == 0) {
keyfile = argv[++i];
} else if (strcmp(argv[i], "-password") == 0) {
password = argv[++i];
} else if (strcmp(argv[i], "-cacertfile") == 0) {
cacertfile = argv[++i];
} else if (strcmp(argv[i], "-cacertdir") == 0) {
cacertdir = argv[++i];
} else if (strcmp(argv[i], "-d") == 0) {
/* XXX ignored: debug per connection not supported */
i++;
} else if (strcmp(argv[i], "-ciphers") == 0) {
ciphers = argv[++i];
} else {
/* XXX Error: now ignored */
}
}
DEBUGF(("set_ssl_parameters: all arguments read\n"));
if (cp->origin == ORIG_LISTEN && !certfile) {
DEBUGF(("ERROR: Server must have certificate\n"));
MAYBE_SET_ERRSTR("enoservercert");
goto err_end;
}
/* Define callback data */
/* XXX Check for NULL */
cb_data = esock_malloc(sizeof(callback_data));
cb_data->ctx = ctx;
if (password) {
cb_data->passwd = esock_malloc(strlen(password) + 1);
strcpy(cb_data->passwd, password);
} else
cb_data->passwd = NULL;
cb_data->verify_depth = verify_depth;
SSL_CTX_set_ex_data(ctx, callback_data_index, cb_data);
/* password callback */
SSL_CTX_set_default_passwd_cb(ctx, passwd_callback);
SSL_CTX_set_default_passwd_cb_userdata(ctx, cb_data);
/* Set location for "trusted" certificates */
if (cacertfile || cacertdir) {
int res;
DEBUGF(("set_ssl_parameters: SSL_CTX_load_verify_locations\n"));
FOPEN_WORKAROUND(res, SSL_CTX_load_verify_locations(ctx, cacertfile,
cacertdir));
if (!res) {
DEBUGF(("ERROR: Cannot load verify locations\n"));
MAYBE_SET_ERRSTR("ecacertfile");
goto err_end;
}
} else {
int res;
DEBUGF(("set_ssl_parameters: SSL_CTX_set_default_verify_paths\n"));
FOPEN_WORKAROUND(res, SSL_CTX_set_default_verify_paths(ctx));
if (!res) {
DEBUGF(("ERROR: Cannot set default verify paths\n"));
MAYBE_SET_ERRSTR("ecacertfile");
goto err_end;
}
}
/* For a server the following sets the list of CA distinguished
* names that it sends to its client when it requests the
* certificate from the client.
* XXX The names of certs in cacertdir ignored.
*/
if (cp->origin == ORIG_LISTEN && cacertfile) {
DEBUGF(("set_ssl_parameters: SSL_CTX_set_client_CA_list\n"));
VOID_FOPEN_WORKAROUND(SSL_CTX_set_client_CA_list(ctx,
SSL_load_client_CA_file(cacertfile)));
if (!SSL_CTX_get_client_CA_list(ctx)) {
DEBUGF(("ERROR: Cannot set client CA list\n"));
MAYBE_SET_ERRSTR("ecacertfile");
goto err_end;
}
}
/* Use certificate file if key file has not been set. */
if (!keyfile)
keyfile = certfile;
if (certfile) {
int res;
DEBUGF(("set_ssl_parameters: SSL_CTX_use_certificate_file\n"));
FOPEN_WORKAROUND(res, SSL_CTX_use_certificate_file(ctx, certfile,
SSL_FILETYPE_PEM));
if (res <= 0) {
DEBUGF(("ERROR: Cannot set certificate file\n"));
MAYBE_SET_ERRSTR("ecertfile");
goto err_end;
}
}
if (keyfile) {
int res;
DEBUGF(("set_ssl_parameters: SSL_CTX_use_PrivateKey_file\n"));
FOPEN_WORKAROUND(res, SSL_CTX_use_PrivateKey_file(ctx, keyfile,
SSL_FILETYPE_PEM));
if (res <= 0) {
DEBUGF(("ERROR: Cannot set private key file\n"));
MAYBE_SET_ERRSTR("ekeyfile");
goto err_end;
}
}
if(certfile && keyfile) {
DEBUGF(("set_ssl_parameters: SSL_CTX_check_private_key\n"));
if (!SSL_CTX_check_private_key(ctx)) {
DEBUGF(("ERROR: Private key does not match the certificate\n"));
MAYBE_SET_ERRSTR("ekeymismatch");
goto err_end;
}
}
/* Ciphers */
if (ciphers) {
DEBUGF(("set_ssl_parameters: SSL_CTX_set_cipher_list\n"));
if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
DEBUGF(("ERROR: Cannot set cipher list\n"));
MAYBE_SET_ERRSTR("ecipher");
goto err_end;
}
}
/* Verify depth */
DEBUGF(("set_ssl_parameters: SSL_CTX_set_verify_depth (depth = %d)\n",
verify_depth));
SSL_CTX_set_verify_depth(ctx, verify_depth);
/* Verify mode and callback */
/* XXX Why precisely these modes? */
switch (verify) {
case 0:
verify_mode = SSL_VERIFY_NONE;
break;
case 1:
verify_mode = SSL_VERIFY_PEER|SSL_VERIFY_CLIENT_ONCE;
break;
case 2:
verify_mode = SSL_VERIFY_PEER|SSL_VERIFY_CLIENT_ONCE|
SSL_VERIFY_FAIL_IF_NO_PEER_CERT;
break;
default:
verify_mode = SSL_VERIFY_NONE;
}
DEBUGF(("set_ssl_parameters: SSL_CTX_set_verify (verify = %d)\n",
verify));
SSL_CTX_set_verify(ctx, verify_mode, verify_callback);
/* Session id context. Should be an option really. */
if (cp->origin == ORIG_LISTEN) {
unsigned char *sid = "Erlang/OTP/ssl";
SSL_CTX_set_session_id_context(ctx, sid, strlen(sid));
}
/* info callback */
if (debug)
SSL_CTX_set_info_callback(ctx, info_callback);
DEBUGF(("set_ssl_parameters: done\n"));
/* Free arg list */
for (i = 0; argv[i]; i++)
esock_free(argv[i]);
esock_free(argv);
return 0;
err_end:
DEBUGF(("set_ssl_parameters: error\n"));
/* Free arg list */
for (i = 0; argv[i]; i++)
esock_free(argv[i]);
esock_free(argv);
return -1;
}
/* Call back functions */
static int verify_callback(int ok, X509_STORE_CTX *x509_ctx)
{
X509 *cert;
int cert_err, depth;
SSL *ssl;
SSL_CTX *ctx;
callback_data *cb_data;
cert = X509_STORE_CTX_get_current_cert(x509_ctx);
cert_err = X509_STORE_CTX_get_error(x509_ctx);
depth = X509_STORE_CTX_get_error_depth(x509_ctx);
ssl = X509_STORE_CTX_get_ex_data(x509_ctx,
SSL_get_ex_data_X509_STORE_CTX_idx());
ctx = SSL_get_SSL_CTX(ssl);
cb_data = SSL_CTX_get_ex_data(ctx, callback_data_index);
X509_NAME_oneline(X509_get_subject_name(cert), x509_buf, sizeof(x509_buf));
DEBUGF((" +vfy: depth = %d\n", depth));
DEBUGF((" subject = %s\n", x509_buf));
X509_NAME_oneline(X509_get_issuer_name(cert), x509_buf, sizeof(x509_buf));
DEBUGF((" issuer = %s\n", x509_buf));
if (!ok) {
DEBUGF((" +vfy: error = %d [%s]\n", cert_err,
X509_verify_cert_error_string(cert_err)));
if (depth >= cb_data->verify_depth)
ok = 1;
}
switch (cert_err) {
case X509_V_OK:
case X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT:
ok = 1;
break;
case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT:
case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY:
MAYBE_SET_ERRSTR("enoissuercert");
break;
case X509_V_ERR_CERT_HAS_EXPIRED:
MAYBE_SET_ERRSTR("epeercertexpired");
break;
case X509_V_ERR_CERT_NOT_YET_VALID:
case X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD:
case X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD:
MAYBE_SET_ERRSTR("epeercertinvalid");
break;
case X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN:
MAYBE_SET_ERRSTR("eselfsignedcert");
break;
case X509_V_ERR_CERT_CHAIN_TOO_LONG:
MAYBE_SET_ERRSTR("echaintoolong");
break;
default:
MAYBE_SET_ERRSTR("epeercert");
break;
}
DEBUGF((" +vfy: return = %d\n",ok));
return ok;
}
static int passwd_callback(char *buf, int num, int rwflag, void *userdata)
{
callback_data *cb_data = userdata;
int len;
if (cb_data && cb_data->passwd) {
DEBUGF((" +passwd: %s\n", cb_data->passwd));
strncpy(buf, cb_data->passwd, num);
len = strlen(cb_data->passwd);
return len;
}
DEBUGF((" +passwd: ERROR: No password set.\n"));
return 0;
}
static void info_callback(const SSL *ssl, int where, int ret)
{
char *str;
if (where & SSL_CB_LOOP) {
DEBUGF((" info: %s\n",SSL_state_string_long(ssl)));
} else if (where & SSL_CB_ALERT) {
str = (where & SSL_CB_READ) ? "read" : "write";
DEBUGF((" info: SSL3 alert %s:%s:%s\n", str,
SSL_alert_type_string_long(ret),
SSL_alert_desc_string_long(ret)));
} else if (where & SSL_CB_EXIT) {
if (ret == 0) {
DEBUGF((" info: failed in %s\n", SSL_state_string_long(ssl)));
} else if (ret < 0) {
DEBUGF((" info: error in %s\n", SSL_state_string_long(ssl)));
}
}
}
/* This function is called whenever an SSL_CTX *ctx structure is
* freed.
*/
static void callback_data_free(void *parent, void *ptr, CRYPTO_EX_DATA *ad,
int idx, long arg1, void *argp)
{
callback_data *cb_data = ptr;
if (cb_data) {
if (cb_data->passwd)
esock_free(cb_data->passwd);
esock_free(cb_data);
}
}
static RSA *tmp_rsa_callback(SSL *ssl, int is_export, int keylen)
{
static RSA *rsa512 = NULL;
static RSA *rsa1024 = NULL;
switch (keylen) {
case 512:
if (!rsa512)
rsa512 = RSA_generate_key(keylen, RSA_F4, NULL, NULL);
return rsa512;
break;
case 1024:
if (!rsa1024)
rsa1024 = RSA_generate_key(keylen, RSA_F4, NULL, NULL);
return rsa1024;
break;
default:
if (rsa1024)
return rsa1024;
if (rsa512)
return rsa512;
rsa512 = RSA_generate_key(keylen, RSA_F4, NULL, NULL);
return rsa512;
}
}
/* Restrict protocols (SSLv2, SSLv3, TLSv1) */
static void restrict_protocols(SSL_CTX *ctx)
{
long options = 0;
if (protocol_version) {
if ((protocol_version & ESOCK_SSLv2) == 0)
options |= SSL_OP_NO_SSLv2;
if ((protocol_version & ESOCK_SSLv3) == 0)
options |= SSL_OP_NO_SSLv3;
if ((protocol_version & ESOCK_TLSv1) == 0)
options |= SSL_OP_NO_TLSv1;
SSL_CTX_set_options(ctx, options);
}
}
static unsigned char randvec [] = {
181, 177, 237, 240, 107, 24, 43, 148,
105, 4, 248, 13, 199, 255, 23, 58,
71, 181, 57, 151, 156, 25, 165, 7,
73, 80, 80, 231, 70, 110, 96, 162,
24, 205, 178, 178, 67, 122, 210, 180,
92, 6, 156, 182, 84, 159, 85, 6,
175, 66, 165, 167, 137, 34, 179, 237,
77, 90, 87, 185, 21, 106, 92, 115,
137, 65, 233, 42, 164, 153, 208, 133,
160, 172, 129, 202, 46, 220, 98, 66,
115, 66, 46, 28, 226, 200, 140, 145,
207, 194, 58, 71, 56, 203, 113, 34,
221, 116, 63, 114, 188, 210, 45, 238,
200, 123, 35, 150, 2, 78, 160, 22,
226, 167, 162, 10, 182, 75, 109, 97,
86, 252, 93, 125, 117, 214, 220, 37,
105, 160, 56, 158, 97, 57, 22, 14,
73, 169, 111, 190, 222, 176, 14, 82,
111, 42, 87, 90, 136, 236, 22, 209,
156, 207, 40, 251, 88, 141, 51, 211,
31, 158, 153, 91, 119, 83, 255, 60,
55, 94, 5, 115, 119, 210, 224, 185,
163, 163, 5, 3, 197, 106, 110, 206,
109, 132, 50, 190, 177, 133, 175, 129,
225, 161, 156, 244, 77, 150, 99, 38,
17, 111, 46, 230, 152, 64, 50, 164,
19, 78, 3, 164, 169, 175, 104, 97,
103, 158, 91, 168, 186, 191, 73, 88,
118, 112, 41, 188, 219, 0, 198, 209,
206, 7, 5, 169, 127, 180, 80, 74,
124, 4, 4, 108, 197, 67, 204, 29,
101, 95, 174, 147, 64, 163, 89, 160,
10, 5, 56, 134, 209, 69, 209, 55,
214, 136, 45, 212, 113, 85, 159, 133,
141, 249, 75, 40, 175, 91, 142, 13,
179, 179, 51, 0, 136, 63, 148, 175,
103, 162, 8, 214, 4, 24, 59, 71,
9, 185, 48, 127, 159, 165, 8, 8,
135, 151, 92, 214, 132, 151, 204, 169,
24, 112, 229, 59, 236, 81, 238, 64,
150, 196, 97, 213, 140, 159, 20, 24,
79, 210, 191, 53, 130, 33, 157, 87,
16, 180, 175, 217, 56, 123, 115, 196,
130, 6, 155, 37, 220, 80, 232, 129,
240, 57, 199, 249, 196, 152, 28, 111,
124, 192, 59, 46, 29, 21, 178, 51,
156, 17, 248, 61, 254, 80, 201, 131,
203, 59, 227, 191, 71, 121, 134, 181,
55, 79, 130, 225, 246, 36, 179, 224,
189, 243, 200, 75, 73, 41, 251, 41,
71, 251, 78, 146, 99, 101, 104, 69,
18, 122, 65, 24, 232, 84, 246, 242,
209, 18, 241, 114, 3, 65, 177, 99,
49, 99, 215, 59, 9, 175, 195, 11,
25, 46, 43, 120, 109, 179, 159, 250,
239, 246, 135, 78, 2, 238, 214, 237,
64, 170, 50, 44, 68, 67, 111, 232,
225, 230, 224, 124, 76, 32, 52, 158,
151, 54, 184, 135, 122, 66, 211, 215,
121, 90, 124, 158, 55, 73, 116, 137,
240, 15, 38, 31, 183, 86, 93, 49,
148, 184, 125, 250, 155, 216, 84, 246,
27, 172, 141, 54, 80, 158, 227, 254,
189, 164, 238, 229, 68, 26, 231, 11,
198, 222, 15, 141, 98, 8, 124, 219,
60, 125, 170, 213, 114, 24, 189, 65,
80, 186, 71, 126, 223, 153, 20, 141,
110, 73, 173, 218, 214, 63, 205, 177,
132, 115, 184, 28, 122, 232, 210, 72,
237, 41, 93, 17, 152, 95, 242, 138,
79, 98, 47, 197, 36, 17, 137, 230,
15, 73, 193, 1, 181, 123, 0, 186,
185, 135, 142, 200, 139, 78, 57, 145,
191, 32, 98, 250, 113, 188, 71, 32,
205, 81, 219, 99, 60, 87, 42, 95,
249, 252, 121, 125, 246, 230, 74, 162,
73, 59, 179, 142, 178, 47, 163, 161,
236, 14, 123, 219, 18, 6, 102, 140,
215, 210, 76, 9, 119, 147, 252, 63,
13, 51, 161, 172, 180, 116, 212, 129,
116, 237, 38, 64, 213, 222, 35, 14,
183, 237, 78, 204, 250, 250, 5, 41,
142, 5, 207, 154, 65, 183, 108, 82,
1, 43, 149, 233, 89, 195, 25, 233,
4, 34, 19, 122, 16, 58, 121, 5,
118, 168, 22, 213, 49, 226, 163, 169,
21, 78, 179, 232, 125, 216, 198, 147,
245, 196, 199, 138, 185, 167, 179, 82,
175, 53, 6, 162, 5, 141, 180, 212,
95, 201, 234, 169, 111, 175, 138, 197,
177, 246, 154, 41, 185, 201, 134, 187,
88, 99, 231, 23, 190, 36, 72, 174,
244, 185, 205, 50, 230, 226, 210, 119,
175, 107, 109, 244, 12, 122, 84, 51,
146, 95, 68, 74, 76, 212, 221, 103,
244, 71, 63, 133, 149, 233, 48, 3,
176, 168, 6, 98, 88, 226, 120, 190,
205, 249, 38, 157, 205, 148, 250, 203,
147, 62, 195, 229, 219, 109, 177, 119,
120, 43, 165, 99, 253, 210, 180, 32,
227, 180, 174, 64, 156, 139, 251, 53,
205, 132, 210, 208, 3, 199, 115, 64,
59, 27, 249, 164, 224, 191, 124, 241,
142, 10, 19, 120, 227, 46, 174, 231,
48, 65, 41, 56, 51, 38, 185, 95,
250, 182, 100, 40, 196, 124, 173, 119,
162, 148, 170, 34, 51, 68, 175, 60,
242, 201, 225, 34, 146, 157, 159, 0,
144, 148, 82, 72, 149, 53, 201, 10,
248, 206, 154, 126, 33, 153, 56, 48,
5, 90, 194, 22, 251, 173, 211, 202,
203, 253, 112, 147, 188, 200, 142, 206,
206, 175, 233, 76, 93, 104, 125, 41,
64, 145, 202, 53, 130, 251, 23, 90,
28, 199, 13, 128, 185, 154, 53, 194,
195, 55, 80, 56, 151, 216, 195, 138,
7, 170, 143, 236, 74, 141, 229, 174,
32, 165, 131, 68, 174, 104, 35, 143,
183, 41, 80, 191, 120, 79, 166, 240,
123, 55, 60, 2, 128, 56, 4, 199,
122, 85, 90, 76, 246, 29, 13, 6,
126, 229, 14, 203, 244, 73, 121, 42,
169, 35, 44, 202, 18, 69, 153, 120,
141, 77, 124, 191, 215, 18, 115, 187,
108, 246, 135, 151, 225, 192, 50, 89,
128, 45, 39, 253, 149, 234, 203, 84,
51, 174, 15, 237, 17, 57, 76, 81,
39, 107, 40, 36, 22, 52, 92, 39};