2207 lines
74 KiB
C
2207 lines
74 KiB
C
/**
|
|
* Copyright (c) 2021 OceanBase
|
|
* OceanBase CE is licensed under Mulan PubL v2.
|
|
* You can use this software according to the terms and conditions of the Mulan PubL v2.
|
|
* You may obtain a copy of Mulan PubL v2 at:
|
|
* http://license.coscl.org.cn/MulanPubL-2.0
|
|
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
|
|
* EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
|
|
* MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
|
|
* See the Mulan PubL v2 for more details.
|
|
*/
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
#include <pthread.h>
|
|
#include "io/easy_ssl.h"
|
|
#include "io/easy_log.h"
|
|
#include "io/easy_connection.h"
|
|
#include "io/easy_negotiation.h"
|
|
#include "openssl/crypto.h"
|
|
#include "openssl/ssl.h"
|
|
|
|
int easy_ssl_connection_index = -1;
|
|
easy_atomic_t *easy_ssl_lock_cs = NULL;
|
|
extern __thread easy_baseth_t *easy_baseth_self;
|
|
extern char *easy_connection_str(easy_connection_t *c);
|
|
static void easy_ssl_info_callback(const SSL *s, int where, int ret);
|
|
static int easy_ssl_handshake(easy_connection_t *c);
|
|
static void easy_ssl_connection_handshake_handler(easy_connection_t *c);
|
|
static void easy_ssl_handshake_handler(struct ev_loop *loop, ev_io *w, int revents);
|
|
static void easy_ssl_clear_error();
|
|
static void easy_ssl_error(int level, char *fmt, ...);
|
|
static ssize_t easy_ssl_read(easy_connection_t *c, char *buf, size_t size, int *pending);
|
|
static ssize_t easy_ssl_write(easy_connection_t *c, easy_list_t *l);
|
|
static void easy_ssl_connection_error(easy_connection_t *c, int sslerr, int err, char *text);
|
|
static int easy_ssl_server_create(easy_ssl_t *ssl, easy_ssl_ctx_t *ss);
|
|
static int easy_ssl_parse_set_value(easy_ssl_ctx_t *ss, char *key, char *value);
|
|
static int easy_ssl_ctx_create(easy_ssl_ctx_t *ssl);
|
|
static int easy_ssl_ctx_create_for_mysql(easy_ssl_ctx_t *ssl, const int is_babassl);//compat for mysql
|
|
static int easy_ssl_certificate(easy_ssl_ctx_t *ssl, const char *cert, const char *key);
|
|
static int easy_ssl_certificate_for_mysql(easy_ssl_ctx_t *ssl, const char *cert, const char *key);
|
|
static int easy_ssl_certificate_for_mysql_memory(easy_ssl_ctx_t *ssl, const char *cert, const char *key);
|
|
//static int easy_ssl_generate_rsa512_key(easy_ssl_ctx_t *ssl); //delete by yishen, babassl no need
|
|
static int easy_ssl_dhparam(easy_ssl_ctx_t *ssl, char *file);
|
|
static int easy_ssl_dhparam_mysql(easy_ssl_ctx_t *ssl);
|
|
static int easy_ssl_session_cache(easy_ssl_ctx_t *ssl, int session_cache, int timeout);
|
|
static int easy_ssl_client_certificate(easy_ssl_ctx_t *ssl, char *cert, int depth);
|
|
static int easy_ssl_client_certificate_for_mysql(easy_ssl_ctx_t *ssl, const char *cert, int depth);
|
|
static int easy_ssl_client_certificate_for_mysql_memory(easy_ssl_ctx_t *ssl, const char *cert);
|
|
static int easy_ssl_crl(easy_ssl_ctx_t *ssl, char *crl);
|
|
static int easy_ssl_handle_recv(easy_connection_t *c, ssize_t n);
|
|
static void easy_ssl_client_handshake_handler(easy_connection_t *c);
|
|
static int easy_ssl_ctx_server_cmp(const void *a, const void *b);
|
|
static int easy_ssl_pass_phrase_cb(char *buf, int size, int rwflag, void *conf);
|
|
//static void test_info_callback(const SSL *ssl,int type,int val);
|
|
|
|
const char tls_ciphers_list[]= "!aNULL:!eNULL:!EXPORT:!LOW:!MD5:!DES:!RC2:!RC4:!PSK:"
|
|
"!DHE-DSS-DES-CBC3-SHA:!DHE-RSA-DES-CBC3-SHA:"
|
|
"!ECDH-RSA-DES-CBC3-SHA:!ECDH-ECDSA-DES-CBC3-SHA:"
|
|
"!ECDHE-RSA-DES-CBC3-SHA:!ECDHE-ECDSA-DES-CBC3-SHA:"
|
|
"ECDHE-ECDSA-AES128-GCM-SHA256:"
|
|
"ECDHE-ECDSA-AES256-GCM-SHA384:"
|
|
"ECDHE-RSA-AES128-GCM-SHA256:"
|
|
"ECDHE-RSA-AES256-GCM-SHA384:"
|
|
"ECDHE-ECDSA-AES128-SHA256:"
|
|
"ECDHE-RSA-AES128-SHA256:"
|
|
"ECDHE-ECDSA-AES256-SHA384:"
|
|
"ECDHE-RSA-AES256-SHA384:"
|
|
"DHE-RSA-AES128-GCM-SHA256:"
|
|
"DHE-DSS-AES128-GCM-SHA256:"
|
|
"DHE-RSA-AES128-SHA256:"
|
|
"DHE-DSS-AES128-SHA256:"
|
|
"DHE-DSS-AES256-GCM-SHA384:"
|
|
"DHE-RSA-AES256-SHA256:"
|
|
"DHE-DSS-AES256-SHA256:"
|
|
"ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:"
|
|
"ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:"
|
|
"DHE-DSS-AES128-SHA:DHE-RSA-AES128-SHA:"
|
|
"TLS_DHE_DSS_WITH_AES_256_CBC_SHA:DHE-RSA-AES256-SHA:"
|
|
"AES128-GCM-SHA256:DH-DSS-AES128-GCM-SHA256:"
|
|
"ECDH-ECDSA-AES128-GCM-SHA256:AES256-GCM-SHA384:"
|
|
"DH-DSS-AES256-GCM-SHA384:ECDH-ECDSA-AES256-GCM-SHA384:"
|
|
"AES128-SHA256:DH-DSS-AES128-SHA256:ECDH-ECDSA-AES128-SHA256:AES256-SHA256:"
|
|
"DH-DSS-AES256-SHA256:ECDH-ECDSA-AES256-SHA384:AES128-SHA:"
|
|
"DH-DSS-AES128-SHA:ECDH-ECDSA-AES128-SHA:AES256-SHA:"
|
|
"DH-DSS-AES256-SHA:ECDH-ECDSA-AES256-SHA:DHE-RSA-AES256-GCM-SHA384:"
|
|
"DH-RSA-AES128-GCM-SHA256:ECDH-RSA-AES128-GCM-SHA256:DH-RSA-AES256-GCM-SHA384:"
|
|
"ECDH-RSA-AES256-GCM-SHA384:DH-RSA-AES128-SHA256:"
|
|
"ECDH-RSA-AES128-SHA256:DH-RSA-AES256-SHA256:"
|
|
"ECDH-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:"
|
|
"ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA:"
|
|
"ECDHE-ECDSA-AES256-SHA:DHE-DSS-AES128-SHA:DHE-RSA-AES128-SHA:"
|
|
"TLS_DHE_DSS_WITH_AES_256_CBC_SHA:DHE-RSA-AES256-SHA:"
|
|
"AES128-SHA:DH-DSS-AES128-SHA:ECDH-ECDSA-AES128-SHA:AES256-SHA:"
|
|
"DH-DSS-AES256-SHA:ECDH-ECDSA-AES256-SHA:DH-RSA-AES128-SHA:"
|
|
"ECDH-RSA-AES128-SHA:DH-RSA-AES256-SHA:ECDH-RSA-AES256-SHA:DES-CBC3-SHA";
|
|
const char baba_tls_ciphers_list[]= "!aNULL:!eNULL:!EXPORT:!LOW:!MD5:!DES:!RC2:!RC4:!PSK:"
|
|
"!DHE-DSS-DES-CBC3-SHA:!DHE-RSA-DES-CBC3-SHA:"
|
|
"!ECDH-RSA-DES-CBC3-SHA:!ECDH-ECDSA-DES-CBC3-SHA:"
|
|
"!ECDHE-RSA-DES-CBC3-SHA:!ECDHE-ECDSA-DES-CBC3-SHA:"
|
|
"ECC-SM2-WITH-SM4-SM3:ECDHE-SM2-WITH-SM4-SM3:"
|
|
"ECDHE-ECDSA-AES128-GCM-SHA256:"
|
|
"ECDHE-ECDSA-AES256-GCM-SHA384:"
|
|
"ECDHE-RSA-AES128-GCM-SHA256:"
|
|
"ECDHE-RSA-AES256-GCM-SHA384:"
|
|
"ECDHE-ECDSA-AES128-SHA256:"
|
|
"ECDHE-RSA-AES128-SHA256:"
|
|
"ECDHE-ECDSA-AES256-SHA384:"
|
|
"ECDHE-RSA-AES256-SHA384:"
|
|
"DHE-RSA-AES128-GCM-SHA256:"
|
|
"DHE-DSS-AES128-GCM-SHA256:"
|
|
"DHE-RSA-AES128-SHA256:"
|
|
"DHE-DSS-AES128-SHA256:"
|
|
"DHE-DSS-AES256-GCM-SHA384:"
|
|
"DHE-RSA-AES256-SHA256:"
|
|
"DHE-DSS-AES256-SHA256:"
|
|
"ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:"
|
|
"ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:"
|
|
"DHE-DSS-AES128-SHA:DHE-RSA-AES128-SHA:"
|
|
"TLS_DHE_DSS_WITH_AES_256_CBC_SHA:DHE-RSA-AES256-SHA:"
|
|
"AES128-GCM-SHA256:DH-DSS-AES128-GCM-SHA256:"
|
|
"ECDH-ECDSA-AES128-GCM-SHA256:AES256-GCM-SHA384:"
|
|
"DH-DSS-AES256-GCM-SHA384:ECDH-ECDSA-AES256-GCM-SHA384:"
|
|
"AES128-SHA256:DH-DSS-AES128-SHA256:ECDH-ECDSA-AES128-SHA256:AES256-SHA256:"
|
|
"DH-DSS-AES256-SHA256:ECDH-ECDSA-AES256-SHA384:AES128-SHA:"
|
|
"DH-DSS-AES128-SHA:ECDH-ECDSA-AES128-SHA:AES256-SHA:"
|
|
"DH-DSS-AES256-SHA:ECDH-ECDSA-AES256-SHA:DHE-RSA-AES256-GCM-SHA384:"
|
|
"DH-RSA-AES128-GCM-SHA256:ECDH-RSA-AES128-GCM-SHA256:DH-RSA-AES256-GCM-SHA384:"
|
|
"ECDH-RSA-AES256-GCM-SHA384:DH-RSA-AES128-SHA256:"
|
|
"ECDH-RSA-AES128-SHA256:DH-RSA-AES256-SHA256:"
|
|
"ECDH-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:"
|
|
"ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA:"
|
|
"ECDHE-ECDSA-AES256-SHA:DHE-DSS-AES128-SHA:DHE-RSA-AES128-SHA:"
|
|
"TLS_DHE_DSS_WITH_AES_256_CBC_SHA:DHE-RSA-AES256-SHA:"
|
|
"AES128-SHA:DH-DSS-AES128-SHA:ECDH-ECDSA-AES128-SHA:AES256-SHA:"
|
|
"DH-DSS-AES256-SHA:ECDH-ECDSA-AES256-SHA:DH-RSA-AES128-SHA:"
|
|
"ECDH-RSA-AES128-SHA:DH-RSA-AES256-SHA:ECDH-RSA-AES256-SHA:DES-CBC3-SHA";
|
|
const uint64_t tls_protocols = (SSL_OP_NO_SSLv2
|
|
| SSL_OP_NO_SSLv3);
|
|
|
|
static unsigned long id_function(void)
|
|
{
|
|
return ((unsigned long) pthread_self());
|
|
}
|
|
|
|
static void locking_function(int mode, int type, const char *file, int line)
|
|
{
|
|
if (mode & CRYPTO_LOCK) {
|
|
easy_spin_lock(&easy_ssl_lock_cs[type]);
|
|
} else {
|
|
easy_spin_unlock(&easy_ssl_lock_cs[type]);
|
|
}
|
|
}
|
|
|
|
int easy_ssl_init()
|
|
{
|
|
if (easy_ssl_connection_index == -1) {
|
|
SSL_library_init();
|
|
SSL_load_error_strings();
|
|
ENGINE_load_builtin_engines();
|
|
OpenSSL_add_all_algorithms();
|
|
|
|
easy_ssl_connection_index = SSL_get_ex_new_index(0, NULL, NULL, NULL, NULL);
|
|
|
|
if (easy_ssl_connection_index == -1) {
|
|
easy_error_log("SSL_get_ex_new_index() failed");
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
int num = CRYPTO_num_locks();
|
|
easy_ssl_lock_cs = (easy_atomic_t *)easy_malloc(num * sizeof(easy_atomic_t));
|
|
memset((char *)easy_ssl_lock_cs, 0, num * sizeof(easy_atomic_t));
|
|
#if OPENSSL_API_COMPAT < 0x10000000L
|
|
CRYPTO_set_id_callback(id_function);
|
|
CRYPTO_set_locking_callback(locking_function);
|
|
#endif
|
|
}
|
|
|
|
return EASY_OK;
|
|
}
|
|
|
|
/**
|
|
* cleanup
|
|
*/
|
|
int easy_ssl_cleanup()
|
|
{
|
|
ENGINE_cleanup();
|
|
EVP_cleanup();
|
|
CRYPTO_cleanup_all_ex_data();
|
|
//ERR_remove_state(0); //delete by yishen, openssl 1.1.1 not supported
|
|
ERR_free_strings();
|
|
//SSL_COMP_free();
|
|
//sk_SSL_COMP_free (SSL_COMP_get_compression_methods());
|
|
//CRYPTO_mem_leaks_fp(stderr);
|
|
easy_free((char *)easy_ssl_lock_cs);
|
|
|
|
return EASY_OK;
|
|
}
|
|
|
|
/**
|
|
* 建立ssl connection
|
|
*/
|
|
int easy_ssl_connection_create(easy_ssl_ctx_t *ssl, easy_connection_t *c)
|
|
{
|
|
easy_ssl_connection_t *sc;
|
|
// easy_info_log("easy_ssl_connection_create '%s' start, %d, %p\n", easy_connection_str(c));
|
|
|
|
sc = easy_pool_calloc(c->pool, sizeof(easy_ssl_connection_t));
|
|
|
|
if (sc == NULL) {
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
sc->connection = SSL_new(ssl->ctx);
|
|
|
|
if (sc->connection == NULL) {
|
|
easy_error_log("SSL_new() failed");
|
|
return EASY_ERROR;
|
|
}
|
|
SSL_clear(sc->connection);
|
|
if (SSL_set_fd(sc->connection, c->fd) == 0) {
|
|
easy_error_log("SSL_set_fd() failed");
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
if (c->type == EASY_TYPE_CLIENT) {
|
|
SSL_set_connect_state(sc->connection);
|
|
} else {
|
|
SSL_set_accept_state(sc->connection);
|
|
}
|
|
|
|
if (SSL_set_ex_data(sc->connection, easy_ssl_connection_index, c) == 0) {
|
|
easy_error_log("SSL_set_ex_data() failed");
|
|
return EASY_ERROR;
|
|
}
|
|
SSL_set_options(sc->connection, c->tls_version_option);
|
|
sc->session_reuse = ssl->conf.session_reuse;
|
|
c->sc = sc;
|
|
|
|
//调试代码, 这里踩过坑, 注释下, 用到再开启
|
|
// SSL *tmp_ssl = sc->connection;
|
|
// SSL_set_info_callback(tmp_ssl, test_info_callback);
|
|
// easy_debug_log("easy_ssl_connection_create: options=%ld, version=%d, type=%d, state=%d, rwstate=%d, in_handshake=%d, rstate=%d, init_num=%d, verify_mode=%d, error=%d, error_code=%d" ,
|
|
// tmp_ssl->options, tmp_ssl->version, tmp_ssl->type, tmp_ssl->state, tmp_ssl->rwstate, tmp_ssl->in_handshake, tmp_ssl->rstate, tmp_ssl->init_num, tmp_ssl->verify_mode, tmp_ssl->error, tmp_ssl->error_code);
|
|
|
|
return EASY_OK;
|
|
}
|
|
|
|
int easy_ssl_connection_destroy(easy_connection_t *c)
|
|
{
|
|
if (c->sc) {
|
|
int n, mode;
|
|
|
|
mode = SSL_RECEIVED_SHUTDOWN | SSL_SENT_SHUTDOWN;
|
|
SSL_set_shutdown(c->sc->connection, mode);
|
|
easy_ssl_clear_error();
|
|
n = SSL_shutdown(c->sc->connection);
|
|
|
|
if (n != 1 && ERR_peek_error()) {
|
|
SSL_get_error(c->sc->connection, n);
|
|
}
|
|
|
|
SSL_free(c->sc->connection);
|
|
|
|
c->sc = NULL;
|
|
}
|
|
|
|
return EASY_OK;
|
|
}
|
|
|
|
/**
|
|
* 握手
|
|
*/
|
|
void easy_ssl_connection_handshake(struct ev_loop *loop, ev_io *w, int revents)
|
|
{
|
|
easy_connection_t *c;
|
|
int n, rc;
|
|
char buf[1];
|
|
|
|
c = (easy_connection_t *)w->data;
|
|
assert(c->fd == w->fd);
|
|
|
|
easy_debug_log("easy_ssl_connection_handshake: %s", easy_connection_str(c));
|
|
|
|
n = recv(c->fd, (char *) buf, 1, MSG_PEEK);
|
|
|
|
if (n <= 0) {
|
|
easy_debug_log("%s n: %d, error: %s(%d)\n", easy_connection_str(c), n, strerror(errno), errno);
|
|
c->conn_has_error = (n < 0 ? 1 : 0);
|
|
goto error_exit;
|
|
}
|
|
|
|
if (!((buf[0] & 0x80) || (buf[0] == 0x16)))
|
|
goto error_exit;
|
|
|
|
easy_debug_log("ssl handshake: 0x%02Xd", buf[0]);
|
|
|
|
rc = easy_ssl_handshake(c);
|
|
|
|
if (rc == EASY_ERROR) {
|
|
goto error_exit;
|
|
} else if (rc == EASY_AGAIN) {
|
|
c->sc->handler = easy_ssl_connection_handshake_handler;
|
|
} else {
|
|
easy_ssl_connection_handshake_handler(c);
|
|
}
|
|
|
|
return;
|
|
error_exit:
|
|
EASY_CONNECTION_DESTROY(c, "ssl_handshake");
|
|
}
|
|
|
|
/**
|
|
* client握手
|
|
*/
|
|
int easy_ssl_client_do_handshake(easy_connection_t *c)
|
|
{
|
|
int rc;
|
|
uint64_t key;
|
|
easy_ssl_ctx_t *ctx;
|
|
char *servername;
|
|
easy_ssl_ctx_server_t *cs = NULL;
|
|
easy_ssl_t *ssl = NULL;
|
|
int ret = EASY_OK;
|
|
servername = c->client->server_name;
|
|
// easy_info_log("easy_ssl_client_do_handshake %s\n", easy_connection_str(c));
|
|
|
|
if (EASY_OK != easy_spinrwlock_rdlock(&(easy_baseth_self->eio->ssl_rwlock_))) {
|
|
easy_error_log("easy_spinrwlock_rdlock failed %s, ref_cnt %ld, wait_write %ld\n",
|
|
easy_connection_str(c),
|
|
easy_baseth_self->eio->ssl_rwlock_.ref_cnt,
|
|
easy_baseth_self->eio->ssl_rwlock_.wait_write);
|
|
return EASY_ERROR;
|
|
} else {
|
|
int need_return = 0;
|
|
ssl = easy_baseth_self->eio->ssl;
|
|
ctx = ssl->client_ctx;
|
|
|
|
if (servername) {
|
|
key = easy_hash_code(servername, strlen(servername), 3);
|
|
cs = (easy_ssl_ctx_server_t *)easy_hash_find_ex(ssl->client_map, key, easy_ssl_ctx_server_cmp, servername);
|
|
|
|
if (cs) {
|
|
ctx = cs->ss;
|
|
}
|
|
}
|
|
|
|
if (easy_ssl_connection_create(ctx, c) != EASY_OK) {
|
|
easy_error_log("easy_ssl_connection_create\n");
|
|
need_return = 1;
|
|
}
|
|
|
|
if (EASY_OK != easy_spinrwlock_unlock(&(easy_baseth_self->eio->ssl_rwlock_))) {
|
|
easy_error_log("easy_spinrwlock_unlock failed %s, ref_cnt %ld, wait_write %ld\n",
|
|
easy_connection_str(c),
|
|
easy_baseth_self->eio->ssl_rwlock_.ref_cnt,
|
|
easy_baseth_self->eio->ssl_rwlock_.wait_write);
|
|
need_return = 1;
|
|
}
|
|
if (need_return) {
|
|
return EASY_ERROR;
|
|
}
|
|
}
|
|
|
|
// reuse
|
|
if (c->sc->session_reuse && c->client->ssl_session) {
|
|
if (SSL_set_session(c->sc->connection, c->client->ssl_session) == 0) {
|
|
easy_error_log("SSL_set_session() failed");
|
|
return EASY_ERROR;
|
|
}
|
|
}
|
|
|
|
if (EASY_TYPE_CLIENT == c->type && c->client->is_ssl) {
|
|
if (0 == c->is_negotiated) {
|
|
if (EASY_OK == (ret = easy_send_negotiate_message(c))) {
|
|
c->is_negotiated = 1;
|
|
} else {
|
|
easy_info_log("ssl: send easy negotiation msg failed!(%s), retry!", easy_connection_str(c));
|
|
}
|
|
}
|
|
}
|
|
// handshake
|
|
rc = easy_ssl_handshake(c);
|
|
|
|
if (rc == EASY_ERROR) {
|
|
easy_error_log("easy_ssl_handshake() failed");
|
|
return EASY_ERROR;
|
|
} else if (rc == EASY_AGAIN) {
|
|
c->sc->handler = easy_ssl_client_handshake_handler;
|
|
} else {
|
|
easy_ssl_client_handshake_handler(c);
|
|
}
|
|
|
|
return EASY_OK;
|
|
}
|
|
void easy_ssl_client_handshake(struct ev_loop *loop, ev_io *w, int revents)
|
|
{
|
|
easy_connection_t *c;
|
|
|
|
c = (easy_connection_t *)w->data;
|
|
|
|
if (easy_ssl_client_do_handshake(c) != EASY_OK) {
|
|
easy_error_log("easy_ssl_client_handshake failed");
|
|
EASY_CONNECTION_DESTROY(c, "ssl_client_handshake");
|
|
}
|
|
}
|
|
///////////////////////////////////////////////////////////////////////////////////////////////////
|
|
/**
|
|
* ssl info callback
|
|
*/
|
|
static void easy_ssl_info_callback(const SSL *s, int where, int ret)
|
|
{
|
|
easy_connection_t *c;
|
|
|
|
if (where & SSL_CB_HANDSHAKE_START) {
|
|
c = easy_ssl_get_connection(s);
|
|
|
|
if (c->sc->handshaked) {
|
|
c->sc->renegotiation = 1;
|
|
}
|
|
}
|
|
}
|
|
|
|
//void test_info_callback(const SSL *ssl,int type,int val)
|
|
//{
|
|
// easy_debug_log("test_info_callback: type=%d, val=%d, options=%ld, version=%d, type=%d, state=%d, rwstate=%d, in_handshake=%d, rstate=%d, init_num=%d, verify_mode=%d, error=%d, error_code=%d, packet_length=%d",
|
|
// type, val, ssl->options, ssl->version, ssl->type, ssl->state, ssl->rwstate, ssl->in_handshake, ssl->rstate, ssl->init_num, ssl->verify_mode, ssl->error, ssl->error_code, ssl->packet_length);
|
|
// if (ssl->packet_length > 0 && NULL != ssl->packet) {
|
|
// easy_debug_log("test_info_callback: p=%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d", ssl->packet[0], ssl->packet[1], ssl->packet[2], ssl->packet[3], ssl->packet[4], ssl->packet[5], ssl->packet[6], ssl->packet[7], ssl->packet[8], ssl->packet[9], ssl->packet[10]);
|
|
// }
|
|
//}
|
|
|
|
|
|
/**
|
|
* easy_ssl_handshake
|
|
*/
|
|
static int easy_ssl_handshake(easy_connection_t *c)
|
|
{
|
|
int n, sslerr, err;
|
|
|
|
easy_ssl_clear_error();
|
|
|
|
n = SSL_do_handshake(c->sc->connection);
|
|
// SSL *ssl = c->sc->connection;
|
|
// easy_debug_log("SSL_do_handshake: %d, options=%ld, version=%d, type=%d, state=%d, rwstate=%d, in_handshake=%d, rstate=%d, init_num=%d, "
|
|
// "verify_mode=%d, error=%d, error_code=%d, packet_length=%d, p=%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d, %s",
|
|
// n, ssl->options, ssl->version, ssl->type, ssl->state, ssl->rwstate, ssl->in_handshake, ssl->rstate, ssl->init_num, ssl->verify_mode, ssl->error, ssl->error_code,
|
|
// ssl->packet_length,
|
|
// ssl->packet[0], ssl->packet[1], ssl->packet[2], ssl->packet[3], ssl->packet[4], ssl->packet[5], ssl->packet[6],
|
|
// ssl->packet[7], ssl->packet[8], ssl->packet[9], ssl->packet[10],
|
|
// easy_connection_str(c));
|
|
|
|
if (n == 1) {
|
|
ev_io_start(c->loop, &c->read_watcher);
|
|
ev_io_start(c->loop, &c->write_watcher);
|
|
c->sc->handshaked = 1;
|
|
c->read = easy_ssl_read;
|
|
c->write = easy_ssl_write;
|
|
|
|
// if (c->sc->connection->s3) {
|
|
// c->sc->connection->s3->flags |= SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS;
|
|
// } delete by yishen, openssl 1.1.1 no need
|
|
|
|
return EASY_OK;
|
|
}
|
|
|
|
sslerr = SSL_get_error(c->sc->connection, n);
|
|
easy_debug_log("SSL_get_error: %d %s errno=%d", sslerr, easy_connection_str(c), errno);
|
|
|
|
if (sslerr == SSL_ERROR_WANT_READ) {
|
|
ev_set_cb(&c->read_watcher, easy_ssl_handshake_handler);
|
|
ev_set_cb(&c->write_watcher, easy_ssl_handshake_handler);
|
|
ev_io_start(c->loop, &c->read_watcher);
|
|
ev_io_stop(c->loop, &c->write_watcher);
|
|
|
|
return EASY_AGAIN;
|
|
}
|
|
|
|
if (sslerr == SSL_ERROR_WANT_WRITE) {
|
|
ev_set_cb(&c->read_watcher, easy_ssl_handshake_handler);
|
|
ev_set_cb(&c->write_watcher, easy_ssl_handshake_handler);
|
|
ev_io_start(c->loop, &c->write_watcher);
|
|
ev_io_stop(c->loop, &c->read_watcher);
|
|
|
|
return EASY_AGAIN;
|
|
}
|
|
|
|
err = (sslerr == SSL_ERROR_SYSCALL) ? errno : 0;
|
|
|
|
if (sslerr == SSL_ERROR_ZERO_RETURN || ERR_peek_error() == 0) {
|
|
easy_error_log("peer closed connection in SSL handshake");
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
easy_ssl_connection_error(c, sslerr, err, "SSL_do_handshake() failed");
|
|
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
/**
|
|
* clear error
|
|
*/
|
|
static void easy_ssl_clear_error()
|
|
{
|
|
while (ERR_peek_error()) {
|
|
easy_ssl_error(EASY_LOG_INFO, "ignoring stale global SSL error");
|
|
}
|
|
|
|
ERR_clear_error();
|
|
}
|
|
|
|
/**
|
|
* print ssl error
|
|
*/
|
|
#define EASY_MAX_CONF_ERRSTR 1024
|
|
static void easy_ssl_error(int level, char *fmt, ...)
|
|
{
|
|
uint64_t n;
|
|
va_list args;
|
|
char *p, *last;
|
|
char errstr[EASY_MAX_CONF_ERRSTR];
|
|
|
|
va_start(args, fmt);
|
|
p = errstr + easy_vsnprintf(errstr, EASY_MAX_CONF_ERRSTR, fmt, args);
|
|
va_end(args);
|
|
last = errstr + EASY_MAX_CONF_ERRSTR;
|
|
|
|
for ( ;; ) {
|
|
n = ERR_get_error();
|
|
|
|
if (n == 0) {
|
|
break;
|
|
}
|
|
|
|
if (p >= last) {
|
|
continue;
|
|
}
|
|
|
|
*p++ = ' ';
|
|
|
|
ERR_error_string_n(n, (char *) p, last - p);
|
|
|
|
while (p < last && *p) {
|
|
p++;
|
|
}
|
|
}
|
|
|
|
static uint64_t hash_val = 0;
|
|
if (0 == hash_val) {
|
|
hash_val = easy_fnv_hash(__FILE__":"EASY_STRINGIZE(__LINE__));
|
|
}
|
|
easy_log_format(level, __FILE__, __LINE__, __FUNCTION__, hash_val, "%s", errstr);
|
|
}
|
|
|
|
/**
|
|
* easy_ssl_connection_error
|
|
*/
|
|
static void easy_ssl_connection_error(easy_connection_t *c, int sslerr, int err, char *text)
|
|
{
|
|
int n = 0;
|
|
int level = EASY_LOG_ERROR;
|
|
|
|
if (sslerr == SSL_ERROR_SYSCALL) {
|
|
|
|
if (err == ECONNRESET
|
|
|| err == EPIPE
|
|
|| err == ENOTCONN
|
|
|| err == ETIMEDOUT
|
|
|| err == ECONNREFUSED
|
|
|| err == ENETDOWN
|
|
|| err == ENETUNREACH
|
|
|| err == EHOSTDOWN
|
|
|| err == EHOSTUNREACH) {
|
|
level = EASY_LOG_INFO;
|
|
}
|
|
|
|
} else if (sslerr == SSL_ERROR_SSL) {
|
|
|
|
n = ERR_GET_REASON(ERR_peek_error());
|
|
|
|
/* handshake failures */
|
|
if (n == SSL_R_BLOCK_CIPHER_PAD_IS_WRONG /* 129 */
|
|
|| n == SSL_R_DIGEST_CHECK_FAILED /* 149 */
|
|
|| n == SSL_R_LENGTH_MISMATCH /* 159 */
|
|
// || n == SSL_R_NO_CIPHERS_PASSED delete by yishen, openssl 1.1.1 not supported /* 182 */
|
|
|| n == SSL_R_NO_CIPHERS_SPECIFIED /* 183 */
|
|
|| n == SSL_R_NO_SHARED_CIPHER /* 193 */
|
|
|| n == SSL_R_RECORD_LENGTH_MISMATCH /* 213 */
|
|
|| n == SSL_R_UNEXPECTED_MESSAGE /* 244 */
|
|
|| n == SSL_R_UNEXPECTED_RECORD /* 245 */
|
|
|| n == SSL_R_UNKNOWN_ALERT_TYPE /* 246 */
|
|
|| n == SSL_R_UNKNOWN_PROTOCOL /* 252 */
|
|
|| n == SSL_R_WRONG_VERSION_NUMBER /* 267 */
|
|
|| n == SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC /* 281 */
|
|
|| n == 1000 /* SSL_R_SSLV3_ALERT_CLOSE_NOTIFY */
|
|
|| n == SSL_R_SSLV3_ALERT_UNEXPECTED_MESSAGE /* 1010 */
|
|
|| n == SSL_R_SSLV3_ALERT_BAD_RECORD_MAC /* 1020 */
|
|
|| n == SSL_R_TLSV1_ALERT_DECRYPTION_FAILED /* 1021 */
|
|
|| n == SSL_R_TLSV1_ALERT_RECORD_OVERFLOW /* 1022 */
|
|
|| n == SSL_R_SSLV3_ALERT_DECOMPRESSION_FAILURE /* 1030 */
|
|
|| n == SSL_R_SSLV3_ALERT_HANDSHAKE_FAILURE /* 1040 */
|
|
|| n == SSL_R_SSLV3_ALERT_NO_CERTIFICATE /* 1041 */
|
|
|| n == SSL_R_SSLV3_ALERT_BAD_CERTIFICATE /* 1042 */
|
|
|| n == SSL_R_SSLV3_ALERT_UNSUPPORTED_CERTIFICATE /* 1043 */
|
|
|| n == SSL_R_SSLV3_ALERT_CERTIFICATE_REVOKED /* 1044 */
|
|
|| n == SSL_R_SSLV3_ALERT_CERTIFICATE_EXPIRED /* 1045 */
|
|
|| n == SSL_R_SSLV3_ALERT_CERTIFICATE_UNKNOWN /* 1046 */
|
|
|| n == SSL_R_SSLV3_ALERT_ILLEGAL_PARAMETER /* 1047 */
|
|
|| n == SSL_R_TLSV1_ALERT_UNKNOWN_CA /* 1048 */
|
|
|| n == SSL_R_TLSV1_ALERT_ACCESS_DENIED /* 1049 */
|
|
|| n == SSL_R_TLSV1_ALERT_DECODE_ERROR /* 1050 */
|
|
|| n == SSL_R_TLSV1_ALERT_DECRYPT_ERROR /* 1051 */
|
|
|| n == SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION /* 1060 */
|
|
|| n == SSL_R_TLSV1_ALERT_PROTOCOL_VERSION /* 1070 */
|
|
|| n == SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY /* 1071 */
|
|
|| n == SSL_R_TLSV1_ALERT_INTERNAL_ERROR /* 1080 */
|
|
|| n == SSL_R_TLSV1_ALERT_USER_CANCELLED /* 1090 */
|
|
|| n == SSL_R_TLSV1_ALERT_NO_RENEGOTIATION) { /* 1100 */
|
|
level = EASY_LOG_INFO;
|
|
}
|
|
}
|
|
easy_error_log("easy_ssl_connection_error: %s, sslerr=%d,err=%d,n=%d", easy_connection_str(c), sslerr, err, n );
|
|
|
|
easy_ssl_error(level, text);
|
|
}
|
|
|
|
static void easy_ssl_connection_handshake_handler(easy_connection_t *c)
|
|
{
|
|
if (c->sc->handshaked) {
|
|
ev_set_cb(&c->read_watcher, easy_connection_on_readable);
|
|
ev_set_cb(&c->write_watcher, easy_connection_on_writable);
|
|
}
|
|
}
|
|
|
|
static void easy_ssl_handshake_handler(struct ev_loop *loop, ev_io *w, int revents)
|
|
{
|
|
easy_connection_t *c;
|
|
int rc;
|
|
|
|
c = w->data;
|
|
easy_debug_log("easy_ssl_handshake_handler: %s", easy_connection_str(c));
|
|
rc = easy_ssl_handshake(c);
|
|
|
|
if (rc == EASY_AGAIN) {
|
|
return;
|
|
}
|
|
|
|
c->sc->handler(c);
|
|
|
|
if (rc == EASY_ERROR)
|
|
EASY_CONNECTION_DESTROY(c, "handshake_handler");
|
|
}
|
|
|
|
static ssize_t easy_ssl_read(easy_connection_t *c, char *buf, size_t size, int *pending)
|
|
{
|
|
ssize_t n, bytes;
|
|
|
|
if (c->sc->last == EASY_ERROR) {
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
if (c->sc->last == EASY_ABORT) {
|
|
return 0;
|
|
}
|
|
|
|
easy_ssl_clear_error();
|
|
|
|
bytes = 0;
|
|
// easy_info_log("easy_ssl_read %s, %d", easy_connection_str(c), size);
|
|
|
|
for ( ;; ) {
|
|
n = SSL_read(c->sc->connection, buf, size);
|
|
|
|
if (n > 0) {
|
|
bytes += n;
|
|
}
|
|
|
|
c->sc->last = easy_ssl_handle_recv(c, n);
|
|
|
|
if (c->sc->last == EASY_OK) {
|
|
size -= n;
|
|
|
|
if (size == 0) {
|
|
*pending = SSL_pending(c->sc->connection);
|
|
return bytes;
|
|
}
|
|
|
|
buf += n;
|
|
continue;
|
|
}
|
|
|
|
if (bytes) {
|
|
return bytes;
|
|
}
|
|
|
|
if (c->sc->last == EASY_ABORT) {
|
|
return 0;
|
|
} else if (c->sc->last == EASY_ERROR || c->sc->last == EASY_AGAIN) {
|
|
return c->sc->last;
|
|
}
|
|
}
|
|
|
|
return bytes;
|
|
}
|
|
|
|
static int easy_ssl_handle_recv(easy_connection_t *c, ssize_t n)
|
|
{
|
|
int sslerr;
|
|
int err;
|
|
|
|
if (c->sc->renegotiation) {
|
|
easy_error_log("SSL renegotiation disabled");
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
if (n > 0) {
|
|
return EASY_OK;
|
|
}
|
|
|
|
sslerr = SSL_get_error(c->sc->connection, n);
|
|
err = (sslerr == SSL_ERROR_SYSCALL) ? errno : 0;
|
|
easy_debug_log("SSL_get_error: %d %s errno=%d", sslerr, easy_connection_str(c), errno);
|
|
|
|
if (sslerr == SSL_ERROR_WANT_READ) {
|
|
return EASY_AGAIN;
|
|
}
|
|
|
|
if (sslerr == SSL_ERROR_WANT_WRITE) {
|
|
easy_error_log("peer started SSL renegotiation");
|
|
|
|
ev_set_cb(&c->read_watcher, easy_ssl_handshake_handler);
|
|
ev_set_cb(&c->write_watcher, easy_ssl_handshake_handler);
|
|
ev_io_start(c->loop, &c->write_watcher);
|
|
return EASY_AGAIN;
|
|
}
|
|
|
|
if (sslerr == SSL_ERROR_ZERO_RETURN || ERR_peek_error() == 0) {
|
|
easy_debug_log("peer shutdown SSL cleanly");
|
|
return EASY_ABORT;
|
|
}
|
|
|
|
easy_ssl_connection_error(c, sslerr, err, "SSL_read() failed");
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
static ssize_t easy_ssl_write(easy_connection_t *c, easy_list_t *l)
|
|
{
|
|
easy_buf_t *b, *b1;
|
|
ssize_t bytes, ret, size;
|
|
int sslerr;
|
|
|
|
// foreach
|
|
bytes = 0;
|
|
easy_list_for_each_entry_safe(b, b1, l, node) {
|
|
size = b->last - b->pos;
|
|
ret = SSL_write(c->sc->connection, b->pos, size);
|
|
|
|
if (ret <= 0) {
|
|
sslerr = SSL_get_error(c->sc->connection, ret);
|
|
|
|
if (sslerr == SSL_ERROR_WANT_WRITE || sslerr == SSL_ERROR_WANT_READ) {
|
|
return bytes;
|
|
} else {
|
|
return EASY_ERROR;
|
|
}
|
|
}
|
|
|
|
b->pos += ret;
|
|
bytes += ret;
|
|
|
|
if (ret < size)
|
|
break;
|
|
|
|
easy_buf_destroy(b);
|
|
}
|
|
return bytes;
|
|
}
|
|
|
|
|
|
///////////////////////////////////////////////////////////////////////////////////////////////////
|
|
// load ssl config file
|
|
easy_ssl_t *easy_ssl_config_load(char *filename)
|
|
{
|
|
FILE *fp = NULL;
|
|
easy_pool_t *pool = NULL;
|
|
easy_ssl_ctx_t *ss = NULL;
|
|
easy_ssl_t *ssl;
|
|
char buffer[1024], *p, *end, *value;
|
|
int status = 0;
|
|
int line = 0;
|
|
|
|
if ((fp = fopen(filename, "rb")) == NULL) {
|
|
easy_error_log("%s not open.", filename);
|
|
return NULL;
|
|
}
|
|
|
|
if ((pool = easy_pool_create(1024)) == NULL) {
|
|
goto error_exit;
|
|
}
|
|
|
|
if ((ssl = (easy_ssl_t *)easy_pool_calloc(pool, sizeof(easy_ssl_t))) == NULL) {
|
|
goto error_exit;
|
|
}
|
|
|
|
ssl->pool = pool;
|
|
ssl->server_map = easy_hash_create(pool, 128, offsetof(easy_ssl_ctx_server_t, node));
|
|
ssl->client_map = easy_hash_create(pool, 128, offsetof(easy_ssl_ctx_server_t, node));
|
|
easy_list_init(&ssl->server_list);
|
|
|
|
// 读入
|
|
while(fgets(buffer, 1024, fp)) {
|
|
line ++;
|
|
p = buffer;
|
|
|
|
while(*p && *p <= ' ') {
|
|
p ++;
|
|
continue;
|
|
}
|
|
|
|
if (*p == '\0' || *p == '#') continue;
|
|
|
|
// status
|
|
if (status == 0) {
|
|
end = strchr(p, '{');
|
|
|
|
if (end) {
|
|
*end = '\0';
|
|
status = 1;
|
|
ss = easy_pool_calloc(pool, sizeof(easy_ssl_ctx_t));
|
|
|
|
if (ss == NULL) {
|
|
goto error_exit;
|
|
}
|
|
|
|
ss->pool = pool;
|
|
ss->conf.session_timeout = 300;
|
|
ss->conf.verify_depth = 1;
|
|
ss->conf.file = filename;
|
|
ss->conf.line = line;
|
|
ss->type = (strncmp(p, "client", 6) == 0 ? 1 : 0);
|
|
}
|
|
} else {
|
|
end = strchr(p, '}');
|
|
|
|
if (end) {
|
|
*end = '\0';
|
|
status = 0;
|
|
|
|
if (easy_ssl_server_create(ssl, ss) == EASY_ERROR) {
|
|
goto error_exit;
|
|
}
|
|
}
|
|
|
|
end = strrchr(p, ';');
|
|
|
|
if (!end) {
|
|
if (status == 0) continue;
|
|
|
|
easy_error_log("Line %d at %s Error", line, filename);
|
|
goto error_exit;
|
|
}
|
|
|
|
*end = '\0';
|
|
value = strchr(p, ' ');
|
|
|
|
if (!value) {
|
|
easy_error_log("Line %d at %s Error", line, filename);
|
|
goto error_exit;
|
|
}
|
|
|
|
*value ++ = '\0';
|
|
|
|
while(*value && *value <= ' ') {
|
|
value ++;
|
|
continue;
|
|
}
|
|
|
|
if (easy_ssl_parse_set_value(ss, p, value) == EASY_ERROR) {
|
|
easy_error_log("key: %s Line %d at %s Error", p, line, filename);
|
|
goto error_exit;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (status != 0) {
|
|
easy_error_log("Line %d at %s Error", line, filename);
|
|
goto error_exit;
|
|
}
|
|
|
|
// client default
|
|
if (ssl->client_ctx == NULL) {
|
|
ss = easy_pool_calloc(pool, sizeof(easy_ssl_ctx_t));
|
|
|
|
if (ss == NULL) {
|
|
goto error_exit;
|
|
}
|
|
|
|
ss->pool = pool;
|
|
ss->type = 1;
|
|
|
|
if (easy_ssl_server_create(ssl, ss) == EASY_ERROR) {
|
|
goto error_exit;
|
|
}
|
|
|
|
ssl->client_ctx = ss;
|
|
}
|
|
|
|
fclose(fp);
|
|
return ssl;
|
|
error_exit:
|
|
|
|
if (fp) fclose(fp);
|
|
|
|
if (pool) easy_pool_destroy(pool);
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static EVP_PKEY* easy_ssl_read_sm_pkey(const char *key) {
|
|
BIO *bio = NULL;
|
|
EVP_PKEY *ret = NULL;
|
|
if (NULL == (bio = BIO_new_mem_buf((void *)key, strlen(key)))) {
|
|
easy_info_log("BIO_new_mem_buf failed");
|
|
} else if (NULL == (ret = PEM_read_bio_PrivateKey(bio, NULL, NULL, NULL))) {
|
|
easy_info_log("PEM_read_bio_PrivateKey failed");
|
|
}
|
|
if (NULL != bio) {
|
|
BIO_free(bio);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static X509* easy_ssl_get_sm_cert(const char *cert) {
|
|
BIO *bio = NULL;
|
|
X509 *ret = NULL;
|
|
if (NULL == (bio = BIO_new_mem_buf((void*)cert, -1))) {
|
|
easy_info_log("BIO_new_mem_buf failed");
|
|
} else if (NULL == (ret = PEM_read_bio_X509(bio, NULL, NULL, NULL))) {
|
|
easy_info_log("PEM_read_bio_X509 failed");
|
|
}
|
|
if (NULL != bio) {
|
|
BIO_free(bio);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
easy_ssl_ctx_t *easy_ssl_ctx_load(easy_pool_t *pool, const char *ssl_ca,
|
|
const char *ssl_cert, const char *ssl_key,
|
|
const char *ssl_enc_cert, const char *ssl_enc_key,
|
|
const int is_from_file, const int is_babassl,
|
|
const int is_server)
|
|
{
|
|
/*
|
|
//debug for bkmi
|
|
char ssl_ca2[2048] = {0};
|
|
char ssl_key2[2048] = {0};
|
|
char ssl_cert2[4096] = {0};
|
|
long lSize = 0;
|
|
FILE *fp_ca = fopen("wallet/ca.pem", "r");;
|
|
FILE *fp_key = fopen("wallet/server-key.pem", "r");;
|
|
FILE *fp_cert = fopen("wallet/server-cert.pem", "r");;
|
|
|
|
#define REAL_ALL(FP, BUFF) \
|
|
fseek(FP,0,SEEK_END);\
|
|
lSize = ftell(FP);\
|
|
rewind(FP); \
|
|
fread(BUFF,sizeof(char),lSize,FP);\
|
|
|
|
REAL_ALL(fp_ca, ssl_ca2);
|
|
REAL_ALL(fp_key, ssl_key2);
|
|
REAL_ALL(fp_cert, ssl_cert2);
|
|
*/
|
|
|
|
easy_ssl_ctx_t *ss = NULL;
|
|
EVP_PKEY *pkey = NULL;
|
|
X509 *x509 = NULL;
|
|
|
|
if (!ssl_ca || 0 == strlen(ssl_ca)) {
|
|
easy_info_log("no ssl_certificate");
|
|
goto error_exit;
|
|
}
|
|
|
|
if (!ssl_cert || 0 == strlen(ssl_cert)) {
|
|
easy_info_log("no ssl_certificate_key");
|
|
goto error_exit;
|
|
}
|
|
|
|
if (!ssl_key || 0 == strlen(ssl_key)) {
|
|
easy_info_log("no ssl_client_certificate");
|
|
goto error_exit;
|
|
}
|
|
|
|
#ifdef OB_USE_BABASSL
|
|
if (is_babassl) {
|
|
if (!ssl_enc_cert || 0 == strlen(ssl_enc_cert)) {
|
|
easy_info_log("sm scene, no ssl_enc_cert");
|
|
goto error_exit;
|
|
}
|
|
if (!ssl_enc_key || 0 == strlen(ssl_enc_key)) {
|
|
easy_info_log("sm scene, no ssl_enc_key");
|
|
goto error_exit;
|
|
}
|
|
}
|
|
#endif
|
|
|
|
if ((ss = (easy_ssl_ctx_t *)easy_pool_calloc(pool, sizeof(easy_ssl_ctx_t))) == NULL) {
|
|
easy_error_log("easy_pool_calloc easy_ssl_ctx_t failed, size=%u", sizeof(easy_ssl_ctx_t));
|
|
goto error_exit;
|
|
}
|
|
|
|
ss->pool = pool;
|
|
ss->type = (is_server ? EASY_TYPE_SERVER : EASY_TYPE_CLIENT);
|
|
ss->conf.session_timeout = 300;
|
|
ss->conf.session_cache = EASY_SSL_SCACHE_OFF;
|
|
ss->conf.protocols = tls_protocols;
|
|
|
|
if (easy_ssl_init() != EASY_OK) {
|
|
easy_error_log("easy_ssl_init failed");
|
|
goto error_exit;
|
|
}
|
|
|
|
// 建立ctx
|
|
if (easy_ssl_ctx_create_for_mysql(ss, is_babassl) != EASY_OK) {
|
|
easy_error_log("easy_ssl_ctx_create_for_mysql failed");
|
|
goto error_exit;
|
|
}
|
|
|
|
if (SSL_CTX_set_cipher_list(ss->ctx, (is_babassl ? baba_tls_ciphers_list : tls_ciphers_list)) <= 0) {
|
|
easy_error_log("SSL_CTX_set_cipher_list(%d, %V) failed", is_babassl, tls_ciphers_list);
|
|
goto error_exit;
|
|
}
|
|
|
|
if (is_from_file) {
|
|
#ifdef OB_USE_BABASSL
|
|
if (is_babassl) {
|
|
if (!SSL_CTX_use_sign_PrivateKey_file(ss->ctx, ssl_key,
|
|
SSL_FILETYPE_PEM)) {
|
|
easy_info_log("SSL_CTX_use_sign_PrivateKey_file failed!");
|
|
goto error_exit;
|
|
}
|
|
|
|
if (!SSL_CTX_use_sign_certificate_file(ss->ctx, ssl_cert,
|
|
SSL_FILETYPE_PEM)) {
|
|
easy_info_log("SSL_CTX_use_sign_certificate_file failed!");
|
|
goto error_exit;
|
|
}
|
|
|
|
if (!SSL_CTX_use_enc_PrivateKey_file(ss->ctx, ssl_enc_key,
|
|
SSL_FILETYPE_PEM)) {
|
|
easy_info_log("SSL_CTX_use_enc_PrivateKey_file failed!");
|
|
goto error_exit;
|
|
}
|
|
|
|
if (!SSL_CTX_use_enc_certificate_file(ss->ctx, ssl_enc_cert,
|
|
SSL_FILETYPE_PEM)) {
|
|
easy_info_log("SSL_CTX_use_enc_certificate_file failed!");
|
|
goto error_exit;
|
|
}
|
|
}
|
|
#endif
|
|
if(!is_babassl) {
|
|
if (easy_ssl_client_certificate_for_mysql(ss, ssl_ca, 1) != EASY_OK) {
|
|
easy_error_log("easy_ssl_client_certificate_for_mysql failed, client_certificate=%s", ssl_ca);
|
|
goto error_exit;
|
|
}
|
|
|
|
if (easy_ssl_certificate_for_mysql(ss, ssl_cert, ssl_key) != EASY_OK) {
|
|
easy_error_log("easy_ssl_certificate_for_mysql failed, certificate=%s, "
|
|
"certificate_key=%s", ssl_cert, ssl_key);
|
|
goto error_exit;
|
|
}
|
|
}
|
|
} else {
|
|
#ifdef OB_USE_BABASSL
|
|
if (is_babassl) {
|
|
if (NULL == (pkey = easy_ssl_read_sm_pkey(ssl_key))) {
|
|
goto error_exit;
|
|
}
|
|
if (!SSL_CTX_use_sign_PrivateKey(ss->ctx, pkey)) {
|
|
easy_info_log("SSL_CTX_use_sign_PrivateKey failed!");
|
|
goto error_exit;
|
|
}
|
|
|
|
if (NULL == (x509 = easy_ssl_get_sm_cert(ssl_cert))) {
|
|
goto error_exit;
|
|
}
|
|
if (!SSL_CTX_use_sign_certificate(ss->ctx, x509)) {
|
|
easy_info_log("SSL_CTX_use_sign_certificate failed");
|
|
goto error_exit;
|
|
}
|
|
|
|
if (NULL == (pkey = easy_ssl_read_sm_pkey(ssl_enc_key))) {
|
|
goto error_exit;
|
|
}
|
|
if (!SSL_CTX_use_enc_PrivateKey(ss->ctx, pkey)) {
|
|
easy_info_log("SSL_CTX_use_enc_PrivateKey failed!");
|
|
goto error_exit;
|
|
}
|
|
|
|
if (NULL == (x509 = easy_ssl_get_sm_cert(ssl_enc_cert))) {
|
|
goto error_exit;
|
|
}
|
|
|
|
if (!SSL_CTX_use_enc_certificate(ss->ctx, x509)) {
|
|
easy_info_log("SSL_CTX_use_enc_certificate failed");
|
|
goto error_exit;
|
|
}
|
|
}
|
|
#endif
|
|
if (!is_babassl) {
|
|
if (easy_ssl_client_certificate_for_mysql_memory(ss, ssl_ca) != EASY_OK) {
|
|
easy_error_log("easy_ssl_client_certificate_for_mysql_memory failed, client_certificate=%s", ssl_ca);
|
|
goto error_exit;
|
|
}
|
|
|
|
if (easy_ssl_certificate_for_mysql_memory(ss, ssl_cert, ssl_key) != EASY_OK) {
|
|
easy_error_log("easy_ssl_certificate_for_mysql_memory failed, certificate=%s, "
|
|
"certificate_key=%s", ssl_cert, ssl_key);
|
|
goto error_exit;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!is_babassl) {
|
|
if (SSL_CTX_check_private_key(ss->ctx) <= 0) {
|
|
easy_error_log("SSL error: SSL_INITERR_NOMATCH, %s\n", ERR_error_string(ERR_get_error(), NULL));
|
|
goto error_exit;
|
|
}
|
|
}
|
|
|
|
if (easy_ssl_dhparam_mysql(ss) != EASY_OK) {
|
|
easy_error_log("SSL error: easy_ssl_dhparam");
|
|
goto error_exit;
|
|
}
|
|
|
|
if (easy_ssl_session_cache(ss, ss->conf.session_cache, ss->conf.session_timeout) != EASY_OK) {
|
|
easy_error_log("SSL error: easy_ssl_session_cache");
|
|
goto error_exit;
|
|
}
|
|
|
|
/* Set max number of cached sessions, returns the previous size */
|
|
// SSL_CTX_sess_set_cache_size(ss->ctx, 128);
|
|
|
|
return ss;
|
|
|
|
error_exit:
|
|
// fclose(fp_ca);
|
|
// fclose(fp_key);
|
|
// fclose(fp_cert);
|
|
X509_free(x509);
|
|
EVP_PKEY_free(pkey);
|
|
|
|
return NULL;
|
|
}
|
|
|
|
int easy_ssl_ob_config_load(easy_io_t *eio, const char *ssl_ca,
|
|
const char *ssl_cert, const char *ssl_key,
|
|
const char *ssl_enc_cert, const char *ssl_enc_key,
|
|
const int is_from_file, const int is_babassl,
|
|
const int used_for_rpc)
|
|
{
|
|
int ret = EASY_OK;
|
|
easy_pool_t *pool = NULL;
|
|
easy_pool_t *ssl_pool = NULL;
|
|
easy_ssl_ctx_t *ctx_server = NULL;
|
|
easy_ssl_ctx_t *ctx_client = NULL;
|
|
if (eio == NULL) {
|
|
ret = EASY_ERROR;
|
|
easy_warn_log("easy_io is null failed");
|
|
} else if ((pool = easy_pool_create(1024)) == NULL) {
|
|
ret = EASY_ERROR;
|
|
easy_error_log("easy_pool_create failed");
|
|
} else if ((ctx_server = easy_ssl_ctx_load(pool, ssl_ca, ssl_cert, ssl_key, ssl_enc_cert, ssl_enc_key, is_from_file, is_babassl, 1)) == NULL) {
|
|
ret = EASY_ERROR;
|
|
easy_error_log("easy_ssl_ctx_load easy_ssl_t failed");
|
|
} else if (used_for_rpc
|
|
&& (ctx_client = easy_ssl_ctx_load(pool, ssl_ca, ssl_cert, ssl_key, ssl_enc_cert, ssl_enc_key, is_from_file, is_babassl, 0)) == NULL) {
|
|
ret = EASY_ERROR;
|
|
easy_error_log("easy_ssl_ctx_load easy_ssl_t failed");
|
|
} else if (eio->ssl == NULL) {
|
|
//first load
|
|
easy_ssl_t *tmp_ssl = NULL;
|
|
if ((ssl_pool = easy_pool_create(256)) == NULL) {
|
|
ret = EASY_ERROR;
|
|
easy_error_log("easy_pool_create failed");
|
|
} else if ((tmp_ssl = (easy_ssl_t *)easy_pool_calloc(ssl_pool, sizeof(easy_ssl_t))) == NULL) {
|
|
ret = EASY_ERROR;
|
|
easy_error_log("easy_pool_calloc easy_ssl_t failed, size=%u", sizeof(easy_ssl_t));
|
|
} else {
|
|
tmp_ssl->pool = pool;
|
|
tmp_ssl->server_map = easy_hash_create(pool, 128, offsetof(easy_ssl_ctx_server_t, node));
|
|
tmp_ssl->client_map = (used_for_rpc ? easy_hash_create(pool, 128, offsetof(easy_ssl_ctx_server_t, node)) : NULL);
|
|
tmp_ssl->server_ctx = ctx_server;
|
|
tmp_ssl->client_ctx = ctx_client;
|
|
|
|
easy_list_init(&tmp_ssl->server_list);
|
|
easy_list_add_tail(&ctx_server->list_node, &tmp_ssl->server_list);
|
|
if (used_for_rpc) {
|
|
easy_list_add_tail(&ctx_client->list_node, &tmp_ssl->server_list);
|
|
}
|
|
eio->ssl = tmp_ssl;
|
|
easy_info_log("ssl create succ %p\n",eio->ssl);
|
|
}
|
|
} else {
|
|
if (EASY_OK != easy_spinrwlock_wrlock(&eio->ssl_rwlock_)) {
|
|
ret = EASY_ERROR;
|
|
easy_error_log("easy_spinrwlock_wrlock failed, ref_cnt %ld, wait_write %ld\n",
|
|
eio->ssl_rwlock_.ref_cnt, eio->ssl_rwlock_.wait_write);
|
|
} else {
|
|
easy_pool_t *old_pool = eio->ssl->pool;
|
|
eio->ssl->pool = pool;
|
|
pool = old_pool;
|
|
memset(&eio->ssl->server_list, 0, sizeof(eio->ssl->server_list));
|
|
easy_list_init(&eio->ssl->server_list);
|
|
|
|
SSL_CTX_free(eio->ssl->server_ctx->ctx);
|
|
eio->ssl->server_map = easy_hash_create(eio->ssl->pool, 128, offsetof(easy_ssl_ctx_server_t, node));
|
|
eio->ssl->server_ctx = ctx_server;
|
|
easy_list_add_tail(&ctx_server->list_node, &eio->ssl->server_list);
|
|
|
|
if (used_for_rpc) {
|
|
SSL_CTX_free(eio->ssl->client_ctx->ctx);
|
|
eio->ssl->client_map = easy_hash_create(eio->ssl->pool, 128, offsetof(easy_ssl_ctx_server_t, node));
|
|
eio->ssl->client_ctx = ctx_client;
|
|
easy_list_add_tail(&ctx_client->list_node, &eio->ssl->server_list);
|
|
}
|
|
|
|
if (EASY_OK != easy_spinrwlock_unlock(&eio->ssl_rwlock_)) {
|
|
ret = EASY_ERROR;
|
|
easy_error_log("easy_spinrwlock_unlock failed, ref_cnt %ld, wait_write %ld\n",
|
|
eio->ssl_rwlock_.ref_cnt, eio->ssl_rwlock_.wait_write);
|
|
}
|
|
easy_info_log("ssl update succ %p\n",eio->ssl);
|
|
if (pool != NULL) {
|
|
easy_pool_destroy(pool);
|
|
pool = NULL;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (ret != EASY_OK) {
|
|
if (pool != NULL) {
|
|
easy_pool_destroy(pool);
|
|
}
|
|
if (ssl_pool != NULL) {
|
|
easy_pool_destroy(ssl_pool);
|
|
}
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
int easy_ssl_ob_config_check(const char *ssl_ca,
|
|
const char *ssl_cert, const char *ssl_key,
|
|
const char *ssl_enc_cert, const char *ssl_enc_key,
|
|
const int is_from_file, const int is_babassl,
|
|
const int used_for_rpc)
|
|
{
|
|
int ret = EASY_OK;
|
|
easy_pool_t *pool = NULL;
|
|
easy_ssl_ctx_t *ctx_server = NULL;
|
|
easy_ssl_ctx_t *ctx_client = NULL;
|
|
if ((pool = easy_pool_create(1024)) == NULL) {
|
|
ret = EASY_ERROR;
|
|
easy_error_log("easy_pool_create failed");
|
|
} else if ((ctx_server = easy_ssl_ctx_load(pool, ssl_ca, ssl_cert, ssl_key, ssl_enc_cert, ssl_enc_key, is_from_file, is_babassl, 1)) == NULL) {
|
|
ret = EASY_ERROR;
|
|
easy_error_log("easy_ssl_ctx_load easy_ssl_t failed");
|
|
} else if ((ctx_client = easy_ssl_ctx_load(pool, ssl_ca, ssl_cert, ssl_key, ssl_enc_cert, ssl_enc_key, is_from_file, is_babassl, 0)) == NULL) {
|
|
ret = EASY_ERROR;
|
|
easy_error_log("easy_ssl_ctx_load easy_ssl_t failed");
|
|
} else {
|
|
if (NULL != ctx_server->ctx) {
|
|
SSL_CTX_free(ctx_server->ctx);
|
|
}
|
|
if (NULL != ctx_client->ctx) {
|
|
SSL_CTX_free(ctx_client->ctx);
|
|
}
|
|
}
|
|
|
|
if (pool != NULL) {
|
|
easy_pool_destroy(pool);
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
int easy_ssl_config_destroy(easy_ssl_t *ssl)
|
|
{
|
|
easy_ssl_ctx_t *ss;
|
|
|
|
if (ssl) {
|
|
easy_list_for_each_entry(ss, &ssl->server_list, list_node) {
|
|
easy_debug_log("destroy ssl->ctx: %p", ss->ctx);
|
|
SSL_CTX_free(ss->ctx);
|
|
}
|
|
easy_pool_destroy(ssl->pool);
|
|
}
|
|
|
|
return EASY_OK;
|
|
}
|
|
|
|
static int easy_ssl_parse_set_value(easy_ssl_ctx_t *ss, char *key, char *value)
|
|
{
|
|
if (*key == '\0' || *value == '\0')
|
|
return EASY_ERROR;
|
|
|
|
if (strcmp(key, "ssl_certificate") == 0) {
|
|
ss->conf.certificate = easy_pool_strdup(ss->pool, value);
|
|
} else if (strcmp(key, "ssl_certificate_key") == 0) {
|
|
ss->conf.certificate_key = easy_pool_strdup(ss->pool, value);
|
|
} else if (strcmp(key, "ssl_dhparam") == 0) {
|
|
ss->conf.dhparam = easy_pool_strdup(ss->pool, value);
|
|
} else if (strcmp(key, "ssl_client_certificate") == 0) {
|
|
ss->conf.client_certificate = easy_pool_strdup(ss->pool, value);
|
|
} else if (strcmp(key, "ssl_crl") == 0) {
|
|
ss->conf.crl = easy_pool_strdup(ss->pool, value);
|
|
} else if (strcmp(key, "ssl_pass_phrase_dialog") == 0) {
|
|
ss->conf.pass_phrase_dialog = easy_pool_strdup(ss->pool, value);
|
|
} else if (strcmp(key, "ssl_ciphers") == 0) {
|
|
ss->conf.ciphers = easy_pool_strdup(ss->pool, value);
|
|
} else if (strcmp(key, "server_name") == 0) {
|
|
ss->conf.server_name = easy_pool_strdup(ss->pool, value);
|
|
} else if (strcmp(key, "ssl_prefer_server_ciphers") == 0) {
|
|
if (strcasecmp(value, "on") == 0) {
|
|
ss->conf.prefer_server_ciphers = 1;
|
|
} else if (strcasecmp(value, "off") == 0) {
|
|
ss->conf.prefer_server_ciphers = 0;
|
|
} else {
|
|
return EASY_ERROR;
|
|
}
|
|
} else if (strcmp(key, "ssl_verify") == 0) {
|
|
ss->conf.verify = strtol(value, (char **)NULL, 10);
|
|
} else if (strcmp(key, "ssl_verify_depth") == 0) {
|
|
ss->conf.verify_depth = strtol(value, (char **)NULL, 10);
|
|
} else if (strcmp(key, "ssl_session_timeout") == 0) {
|
|
ss->conf.session_timeout = strtol(value, (char **)NULL, 10);
|
|
} else if (strcmp(key, "ssl_session_cache") == 0) {
|
|
if (strcasecmp(value, "off") == 0) {
|
|
ss->conf.session_cache = EASY_SSL_SCACHE_OFF;
|
|
} else if (strcasecmp(value, "builtin") == 0) {
|
|
ss->conf.session_cache = EASY_SSL_SCACHE_BUILTIN;
|
|
} else {
|
|
return EASY_ERROR;
|
|
}
|
|
} else if (strcmp(key, "ssl_protocols") == 0) {
|
|
ss->conf.protocols = 0;
|
|
|
|
if (strstr(value, "SSLv2") == NULL) {
|
|
ss->conf.protocols |= SSL_OP_NO_SSLv2;
|
|
} else if (strstr(value, "SSLv3") == NULL) {
|
|
ss->conf.protocols |= SSL_OP_NO_SSLv3;
|
|
} else if (strstr(value, "TLSv1") == NULL) {
|
|
ss->conf.protocols |= SSL_OP_NO_TLSv1;
|
|
}
|
|
} else if (strcmp(key, "ssl_session_reuse") == 0) {
|
|
ss->conf.session_reuse = (strcasecmp(value, "on") == 0 ? 1 : 0);
|
|
} else {
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
return EASY_OK;
|
|
}
|
|
|
|
/**
|
|
* 对ctx_server的比较
|
|
*/
|
|
static int easy_ssl_ctx_server_cmp(const void *a, const void *b)
|
|
{
|
|
easy_ssl_ctx_server_t *cs = (easy_ssl_ctx_server_t *) b;
|
|
return strcmp(cs->server_name, (const char *)a);
|
|
}
|
|
|
|
#ifdef SSL_CTRL_SET_TLSEXT_HOSTNAME
|
|
int easy_ssl_servername(SSL *ssl_conn, int *ad, void *arg)
|
|
{
|
|
const char *servername;
|
|
size_t len;
|
|
char *p, host[128];
|
|
easy_ssl_ctx_server_t *cs;
|
|
easy_ssl_t *ssl = easy_baseth_self->eio->ssl;
|
|
|
|
servername = SSL_get_servername(ssl_conn, TLSEXT_NAMETYPE_host_name);
|
|
|
|
if (ssl == NULL || servername == NULL) {
|
|
return SSL_TLSEXT_ERR_NOACK;
|
|
}
|
|
|
|
if ((len = strlen(servername)) == 0) {
|
|
return SSL_TLSEXT_ERR_NOACK;
|
|
}
|
|
|
|
if ((p = strchr(servername, ':')) != NULL) {
|
|
len = p - servername;
|
|
}
|
|
|
|
len = easy_min(127, len);
|
|
|
|
if (len <= 0) {
|
|
return SSL_TLSEXT_ERR_NOACK;
|
|
}
|
|
|
|
memcpy(host, servername, len);
|
|
host[len] = '\0';
|
|
uint64_t key = easy_hash_code(host, len, 3);
|
|
cs = (easy_ssl_ctx_server_t *)easy_hash_find_ex(ssl->server_map, key, easy_ssl_ctx_server_cmp, host);
|
|
|
|
if (cs == NULL) {
|
|
return SSL_TLSEXT_ERR_NOACK;
|
|
}
|
|
|
|
SSL_set_SSL_CTX(ssl_conn, cs->ss->ctx);
|
|
|
|
return SSL_TLSEXT_ERR_OK;
|
|
}
|
|
#endif
|
|
|
|
/**
|
|
* 初始化server ctx, 并加入hash_map中
|
|
*/
|
|
static int easy_ssl_server_create(easy_ssl_t *ssl, easy_ssl_ctx_t *ss)
|
|
{
|
|
|
|
if (ss->type) {
|
|
// 建立ctx
|
|
if (easy_ssl_ctx_create(ss) != EASY_OK) {
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
if (ss->conf.certificate) {
|
|
char *key = ss->conf.certificate_key ? ss->conf.certificate_key : ss->conf.certificate;
|
|
|
|
if (easy_ssl_certificate(ss, ss->conf.certificate, key) != EASY_OK) {
|
|
return EASY_ERROR;
|
|
}
|
|
}
|
|
|
|
if (!ssl->client_ctx) ssl->client_ctx = ss;
|
|
} else {
|
|
if (!ss->conf.certificate) {
|
|
easy_error_log("no \"ssl_certificate\" is defined in %s:%d", ss->conf.file, ss->conf.line);
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
if (!ss->conf.certificate_key) {
|
|
easy_error_log("no \"ssl_certificate_key\" is defined in %s:%d", ss->conf.file, ss->conf.line);
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
if (!ss->conf.server_name) {
|
|
easy_error_log("no \"server_name\" is defined in %s:%d", ss->conf.file, ss->conf.line);
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
// 建立ctx
|
|
if (easy_ssl_ctx_create(ss) != EASY_OK) {
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
#ifdef SSL_CTRL_SET_TLSEXT_HOSTNAME
|
|
|
|
if (SSL_CTX_set_tlsext_servername_callback(ss->ctx, easy_ssl_servername) == 0) {
|
|
easy_warn_log("SNI is not available");
|
|
}
|
|
|
|
#endif
|
|
|
|
if (easy_ssl_certificate(ss, ss->conf.certificate, ss->conf.certificate_key) != EASY_OK) {
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
if (SSL_CTX_set_cipher_list(ss->ctx, (const char *) ss->conf.ciphers) == 0) {
|
|
easy_error_log("SSL_CTX_set_cipher_list(\"%V\") failed", ss->conf.ciphers);
|
|
}
|
|
|
|
if (ss->conf.verify) {
|
|
if (!ss->conf.client_certificate ) {
|
|
easy_error_log("no ssl_client_certificate for ssl_client_verify");
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
if (easy_ssl_client_certificate(ss, ss->conf.client_certificate, ss->conf.verify_depth) != EASY_OK) {
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
if (easy_ssl_crl(ss, ss->conf.crl) != EASY_OK) {
|
|
return EASY_ERROR;
|
|
}
|
|
}
|
|
|
|
if (ss->conf.prefer_server_ciphers) {
|
|
SSL_CTX_set_options(ss->ctx, SSL_OP_CIPHER_SERVER_PREFERENCE);
|
|
}
|
|
|
|
/* no need this func in babassl, delete by yishen
|
|
if (easy_ssl_generate_rsa512_key(ss) != EASY_OK) {
|
|
return EASY_ERROR;
|
|
}
|
|
*/
|
|
if (easy_ssl_dhparam(ss, ss->conf.dhparam) != EASY_OK) {
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
if (easy_ssl_session_cache(ss, ss->conf.session_cache, ss->conf.session_timeout) != EASY_OK) {
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
// add
|
|
if (ssl->server_ctx == NULL) ssl->server_ctx = ss;
|
|
}
|
|
|
|
easy_ssl_ctx_server_t *cs;
|
|
char *p, *q;
|
|
uint64_t key;
|
|
|
|
p = ss->conf.server_name;
|
|
|
|
while(p && *p) {
|
|
if ((q = strchr(p, ' ')) != NULL)
|
|
* q = '\0';
|
|
|
|
key = easy_hash_code(p, strlen(p), 3);
|
|
|
|
if (ss->type) {
|
|
cs = (easy_ssl_ctx_server_t *)easy_hash_find_ex(ssl->client_map, key, easy_ssl_ctx_server_cmp, p);
|
|
} else {
|
|
cs = (easy_ssl_ctx_server_t *)easy_hash_find_ex(ssl->server_map, key, easy_ssl_ctx_server_cmp, p);
|
|
}
|
|
|
|
if (cs == NULL) {
|
|
cs = (easy_ssl_ctx_server_t *)easy_pool_calloc(ssl->pool, sizeof(easy_ssl_ctx_server_t));
|
|
cs->server_name = p;
|
|
cs->ss = ss;
|
|
|
|
if (ss->type) {
|
|
easy_hash_add(ssl->client_map, key, &cs->node);
|
|
} else {
|
|
easy_hash_add(ssl->server_map, key, &cs->node);
|
|
}
|
|
}
|
|
|
|
p = q;
|
|
}
|
|
|
|
easy_list_add_tail(&ss->list_node, &ssl->server_list);
|
|
|
|
return EASY_OK;
|
|
}
|
|
|
|
/**
|
|
* create ssl ctx
|
|
*/
|
|
static int easy_ssl_ctx_create(easy_ssl_ctx_t *ssl)
|
|
{
|
|
ssl->ctx = SSL_CTX_new(SSLv23_server_method());
|
|
easy_debug_log("create ssl->ctx: %p", ssl->ctx);
|
|
if (ssl->ctx == NULL) {
|
|
easy_error_log("SSL_CTX_new() failed");
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
/* client side options */
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_MICROSOFT_SESS_ID_BUG);
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_NETSCAPE_CHALLENGE_BUG);
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG);
|
|
|
|
/* server side options */
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG);
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER);
|
|
#if OPENSSL_VERSION_NUMBER >= 0x10101000L
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_NO_TLSv1_3);
|
|
#endif
|
|
/* this option allow a potential SSL 2.0 rollback (CAN-2005-2969) */
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_MSIE_SSLV2_RSA_PADDING);
|
|
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_SSLEAY_080_CLIENT_DH_BUG);
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_TLS_D5_BUG);
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_TLS_BLOCK_PADDING_BUG);
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS);
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_SINGLE_DH_USE);
|
|
|
|
if (ssl->conf.protocols) SSL_CTX_set_options(ssl->ctx, ssl->conf.protocols);
|
|
|
|
SSL_CTX_set_read_ahead(ssl->ctx, 1);
|
|
SSL_CTX_set_info_callback(ssl->ctx, easy_ssl_info_callback);
|
|
|
|
return EASY_OK;
|
|
}
|
|
|
|
static int easy_ssl_ctx_create_for_mysql(easy_ssl_ctx_t *ssl, int is_babassl)
|
|
{
|
|
#ifdef OB_USE_BABASSL
|
|
if (is_babassl) {
|
|
ssl->ctx = SSL_CTX_new(NTLS_method());
|
|
if (NULL != ssl->ctx) {
|
|
SSL_CTX_enable_ntls(ssl->ctx);
|
|
}
|
|
} else {
|
|
ssl->ctx = SSL_CTX_new(SSLv23_method());
|
|
}
|
|
#else
|
|
(void)is_babassl;
|
|
ssl->ctx = SSL_CTX_new(SSLv23_method());
|
|
#endif
|
|
|
|
if (ssl->ctx == NULL) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "SSL_CTX_new() failed");
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
/* client side options */
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_MICROSOFT_SESS_ID_BUG);
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_NETSCAPE_CHALLENGE_BUG);
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG);
|
|
|
|
/* server side options */
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG);
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER);
|
|
|
|
/* this option allow a potential SSL 2.0 rollback (CAN-2005-2969) */
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_MSIE_SSLV2_RSA_PADDING);
|
|
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_SSLEAY_080_CLIENT_DH_BUG);
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_TLS_D5_BUG);
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_TLS_BLOCK_PADDING_BUG);
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS);
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_SINGLE_DH_USE);
|
|
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_NO_COMPRESSION); /* OpenSSL >= 1.0 only */
|
|
SSL_CTX_set_options(ssl->ctx, SSL_OP_CIPHER_SERVER_PREFERENCE);
|
|
|
|
if (ssl->conf.protocols)
|
|
SSL_CTX_set_options(ssl->ctx, ssl->conf.protocols);
|
|
|
|
// Explicitly load ECC ciphers, required on el7.
|
|
// delete by yishen, babassl8.1.2
|
|
/*#if defined(SSL_CTX_set_ecdh_auto)
|
|
SSL_CTX_set_ecdh_auto(ssl->ctx, 1);
|
|
#else
|
|
EC_KEY *ecdh = EC_KEY_new_by_curve_name(NID_secp384r1);
|
|
if (!ecdh) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "EC_KEY_new_by_curve_name failed");
|
|
return EASY_ERROR;
|
|
}
|
|
SSL_CTX_set_tmp_ecdh(ssl->ctx, ecdh);
|
|
EC_KEY_free(ecdh);
|
|
#endif
|
|
*/
|
|
SSL_CTX_set_read_ahead(ssl->ctx, 1);
|
|
SSL_CTX_set_info_callback(ssl->ctx, easy_ssl_info_callback);
|
|
|
|
return EASY_OK;
|
|
}
|
|
|
|
static int easy_ssl_certificate(easy_ssl_ctx_t *ssl, const char *cert, const char *key)
|
|
{
|
|
if (ssl->type) { //client
|
|
//cert --public key
|
|
if (SSL_CTX_use_certificate_file(ssl->ctx, cert, SSL_FILETYPE_PEM) <= 0) {
|
|
easy_error_log("SSL_CTX_use_certificate_file(\"%s\") failed", cert);
|
|
return EASY_ERROR;
|
|
}
|
|
} else {
|
|
if (SSL_CTX_use_certificate_chain_file(ssl->ctx, cert) <= 0) {
|
|
easy_error_log("SSL_CTX_use_certificate_chain_file(\"%s\") failed", cert);
|
|
return EASY_ERROR;
|
|
}
|
|
}
|
|
|
|
easy_ssl_pass_phrase_dialog_t dialog;
|
|
memset(&dialog, 0, sizeof(dialog));
|
|
dialog.type = ssl->conf.pass_phrase_dialog;
|
|
dialog.server_name = ssl->conf.server_name;
|
|
SSL_CTX_set_default_passwd_cb_userdata(ssl->ctx, &dialog);
|
|
SSL_CTX_set_default_passwd_cb(ssl->ctx, easy_ssl_pass_phrase_cb);
|
|
|
|
if (SSL_CTX_use_PrivateKey_file(ssl->ctx, key, SSL_FILETYPE_PEM) <= 0) {
|
|
easy_error_log("SSL_CTX_use_PrivateKey_file(\"%s\") failed", key);
|
|
return EASY_ERROR;
|
|
}
|
|
return EASY_OK;
|
|
}
|
|
|
|
static int easy_ssl_certificate_for_mysql(easy_ssl_ctx_t *ssl, const char *cert, const char *key)
|
|
{
|
|
if (SSL_CTX_use_certificate_chain_file(ssl->ctx, cert) <= 0) {
|
|
easy_error_log("SSL_CTX_use_certificate_chain_file(\"%s\") failed", cert);
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
easy_ssl_pass_phrase_dialog_t dialog;
|
|
memset(&dialog, 0, sizeof(dialog));
|
|
dialog.type = ssl->conf.pass_phrase_dialog;
|
|
dialog.server_name = ssl->conf.server_name;
|
|
SSL_CTX_set_default_passwd_cb_userdata(ssl->ctx, &dialog);
|
|
SSL_CTX_set_default_passwd_cb(ssl->ctx, easy_ssl_pass_phrase_cb);
|
|
|
|
if (SSL_CTX_use_PrivateKey_file(ssl->ctx, key, SSL_FILETYPE_PEM) <= 0) {
|
|
easy_error_log("SSL_CTX_use_PrivateKey_file(\"%s\") failed", key);
|
|
return EASY_ERROR;
|
|
}
|
|
return EASY_OK;
|
|
}
|
|
|
|
static int easy_ssl_certificate_for_mysql_memory(easy_ssl_ctx_t *ssl, const char *cert, const char *key)
|
|
{
|
|
(void)cert;
|
|
//cert
|
|
BIO *cbio = BIO_new_mem_buf((void*)cert, -1);
|
|
int i;
|
|
|
|
STACK_OF(X509_INFO) *inf = PEM_X509_INFO_read_bio(cbio, NULL, NULL, NULL);
|
|
int is_first = 1;
|
|
for (i = 0; i < sk_X509_INFO_num(inf); i++) {
|
|
X509_INFO *itmp = sk_X509_INFO_value(inf, i);
|
|
if (itmp->x509) {
|
|
if (is_first) {
|
|
is_first = 0;
|
|
if (SSL_CTX_use_certificate(ssl->ctx, itmp->x509) <= 0) {
|
|
easy_error_log("SSL_CTX_use_certificate(\"%s\") failed", cert);
|
|
sk_X509_INFO_pop_free(inf, X509_INFO_free); //cleanup
|
|
return EASY_ERROR;
|
|
} else {
|
|
/* Get ready to store intermediate certs, if any. */
|
|
// SSL_CTX_clear_chain_certs(ssl->ctx);
|
|
}
|
|
} else {
|
|
if (SSL_CTX_add_extra_chain_cert(ssl->ctx, itmp->x509) <= 0) {
|
|
easy_error_log("SSL_CTX_add_extra_chain_cert(\"%s\") failed", cert);
|
|
sk_X509_INFO_pop_free(inf, X509_INFO_free); //cleanup
|
|
return EASY_ERROR;
|
|
} else {
|
|
/*
|
|
* Above function doesn't increment cert reference count. NULL the info
|
|
* reference to it in order to prevent it from being freed during cleanup.
|
|
*/
|
|
itmp->x509 = NULL;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
sk_X509_INFO_pop_free(inf, X509_INFO_free); //cleanup
|
|
|
|
|
|
RSA *rsa = NULL;
|
|
cbio = BIO_new_mem_buf((void*)key, -1);
|
|
if (NULL == (rsa = PEM_read_bio_RSAPrivateKey(cbio, NULL, 0, NULL))) {
|
|
easy_error_log("PEM_read_bio_RSAPrivateKey(\"%s\") failed", key);
|
|
return EASY_ERROR;
|
|
} else if (SSL_CTX_use_RSAPrivateKey(ssl->ctx, rsa) <= 0) {
|
|
RSA_free(rsa);
|
|
easy_error_log("SSL_CTX_use_RSAPrivateKey(\"%s\") failed", key);
|
|
return EASY_ERROR;
|
|
}
|
|
return EASY_OK;
|
|
}
|
|
|
|
/* delete by yishen , babassl no need
|
|
static int easy_ssl_generate_rsa512_key(easy_ssl_ctx_t *ssl)
|
|
{
|
|
int ret = 1;
|
|
RSA *key;
|
|
if (SSL_CTX_need_tmp_RSA(ssl->ctx) == 0) {
|
|
return EASY_OK;
|
|
}
|
|
BIGNUM *e = BN_new();
|
|
if (NULL == e) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "RSA_generate_key(512) BN new failed");
|
|
return EASY_ERROR;
|
|
}
|
|
ret = BN_set_word(e, RSA_F4);
|
|
if (ret != 1) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "RSA_generate_key(512) set word failed");
|
|
return EASY_ERROR;
|
|
}
|
|
ret = RSA_generate_key_ex(key, 512, e, NULL);
|
|
if (ret != 1) {
|
|
if (key) {
|
|
RSA_free(key);
|
|
BN_free(e);
|
|
}
|
|
easy_ssl_error(EASY_LOG_ERROR, "RSA_generate_key(512) failed");
|
|
return EASY_ERROR;
|
|
}
|
|
if (key) {
|
|
// SSL_CTX_set_tmp_rsa(ssl->ctx, key); delete by yishen, openssl 1.1.1 no need
|
|
|
|
RSA_free(key);
|
|
BN_free(e);
|
|
return EASY_OK;
|
|
}
|
|
|
|
easy_ssl_error(EASY_LOG_ERROR, "RSA_generate_key(512) failed");
|
|
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
*/
|
|
static int easy_ssl_dhparam(easy_ssl_ctx_t *ssl, char *file)
|
|
{
|
|
DH *dh;
|
|
BIO *bio;
|
|
|
|
static unsigned char dh1024_p[] = {
|
|
0xBB, 0xBC, 0x2D, 0xCA, 0xD8, 0x46, 0x74, 0x90, 0x7C, 0x43, 0xFC, 0xF5,
|
|
0x80, 0xE9, 0xCF, 0xDB, 0xD9, 0x58, 0xA3, 0xF5, 0x68, 0xB4, 0x2D, 0x4B,
|
|
0x08, 0xEE, 0xD4, 0xEB, 0x0F, 0xB3, 0x50, 0x4C, 0x6C, 0x03, 0x02, 0x76,
|
|
0xE7, 0x10, 0x80, 0x0C, 0x5C, 0xCB, 0xBA, 0xA8, 0x92, 0x26, 0x14, 0xC5,
|
|
0xBE, 0xEC, 0xA5, 0x65, 0xA5, 0xFD, 0xF1, 0xD2, 0x87, 0xA2, 0xBC, 0x04,
|
|
0x9B, 0xE6, 0x77, 0x80, 0x60, 0xE9, 0x1A, 0x92, 0xA7, 0x57, 0xE3, 0x04,
|
|
0x8F, 0x68, 0xB0, 0x76, 0xF7, 0xD3, 0x6C, 0xC8, 0xF2, 0x9B, 0xA5, 0xDF,
|
|
0x81, 0xDC, 0x2C, 0xA7, 0x25, 0xEC, 0xE6, 0x62, 0x70, 0xCC, 0x9A, 0x50,
|
|
0x35, 0xD8, 0xCE, 0xCE, 0xEF, 0x9E, 0xA0, 0x27, 0x4A, 0x63, 0xAB, 0x1E,
|
|
0x58, 0xFA, 0xFD, 0x49, 0x88, 0xD0, 0xF6, 0x5D, 0x14, 0x67, 0x57, 0xDA,
|
|
0x07, 0x1D, 0xF0, 0x45, 0xCF, 0xE1, 0x6B, 0x9B
|
|
};
|
|
|
|
static unsigned char dh1024_g[] = { 0x02 };
|
|
|
|
if (!file) {
|
|
|
|
dh = DH_new();
|
|
|
|
if (dh == NULL) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "DH_new() failed");
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
if (1 != DH_set0_pqg(dh, BN_bin2bn(dh1024_p, sizeof(dh1024_p), NULL), NULL, NULL)) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "BN_bin2bn() failed");
|
|
DH_free(dh);
|
|
return EASY_ERROR;
|
|
}
|
|
if (1 != DH_set0_pqg(dh, NULL, NULL, BN_bin2bn(dh1024_g, sizeof(dh1024_g), NULL))) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "BN_bin2bn() failed");
|
|
DH_free(dh);
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
SSL_CTX_set_tmp_dh(ssl->ctx, dh);
|
|
|
|
DH_free(dh);
|
|
|
|
return EASY_OK;
|
|
}
|
|
|
|
bio = BIO_new_file(file, "r");
|
|
|
|
if (bio == NULL) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "BIO_new_file(\"%s\") failed", file);
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
dh = PEM_read_bio_DHparams(bio, NULL, NULL, NULL);
|
|
|
|
if (dh == NULL) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "PEM_read_bio_DHparams(\"%s\") failed", file);
|
|
BIO_free(bio);
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
SSL_CTX_set_tmp_dh(ssl->ctx, dh);
|
|
|
|
DH_free(dh);
|
|
BIO_free(bio);
|
|
|
|
return EASY_OK;
|
|
}
|
|
|
|
static int easy_ssl_dhparam_mysql(easy_ssl_ctx_t *ssl)
|
|
{
|
|
DH *dh;
|
|
|
|
static unsigned char dh2048_p[]=
|
|
{
|
|
0x8A, 0x5D, 0xFA, 0xC0, 0x66, 0x76, 0x4E, 0x61, 0xFA, 0xCA, 0xC0, 0x37,
|
|
0x57, 0x5C, 0x6D, 0x3F, 0x83, 0x0A, 0xA1, 0xF5, 0xF1, 0xE6, 0x7F, 0x3C,
|
|
0xC6, 0xAF, 0xDA, 0x8B, 0x26, 0xE6, 0x1A, 0x74, 0x5E, 0x64, 0xCB, 0xE2,
|
|
0x08, 0xF1, 0x09, 0xE3, 0xAF, 0xBB, 0x54, 0x29, 0x2D, 0x97, 0xF4, 0x59,
|
|
0xE6, 0x26, 0x83, 0x1F, 0x55, 0xCD, 0x1B, 0x57, 0x55, 0x42, 0x6C, 0xE7,
|
|
0xB7, 0xDA, 0x6E, 0xD8, 0x6D, 0xEE, 0xB1, 0x4F, 0xA4, 0xD7, 0xF5, 0x41,
|
|
0xE1, 0xB4, 0x0B, 0xE1, 0x98, 0x16, 0xE2, 0xED, 0x16, 0xCF, 0x18, 0x7D,
|
|
0x3F, 0x25, 0xC3, 0x82, 0x59, 0xBD, 0xF4, 0x8F, 0x57, 0xCA, 0x3E, 0x19,
|
|
0xE4, 0xF5, 0x44, 0xE0, 0xCC, 0x80, 0xB3, 0x10, 0x91, 0x18, 0x0D, 0x64,
|
|
0x59, 0x0A, 0x43, 0xF7, 0xFC, 0xCA, 0x01, 0xE8, 0x14, 0x04, 0xF2, 0xCD,
|
|
0xA9, 0x2A, 0x3C, 0xF3, 0xA5, 0x2A, 0x83, 0xD8, 0x66, 0x9F, 0xC9, 0x2C,
|
|
0xC9, 0x4F, 0x44, 0x05, 0x5E, 0x5E, 0x00, 0x47, 0x22, 0x0A, 0xE6, 0xB0,
|
|
0x87, 0xA5, 0x74, 0x3B, 0xE4, 0xA3, 0xFC, 0x2D, 0xDC, 0x49, 0xF2, 0xE1,
|
|
0x80, 0x0D, 0x06, 0x71, 0x7A, 0x77, 0x3A, 0xA9, 0x66, 0x70, 0x3B, 0xBA,
|
|
0x8D, 0x2E, 0x60, 0x5A, 0x39, 0xF7, 0x2D, 0xD3, 0xF5, 0x53, 0x47, 0x6E,
|
|
0x57, 0x13, 0x01, 0x87, 0xF9, 0xDE, 0x4D, 0x20, 0x92, 0xBE, 0xD7, 0x1E,
|
|
0xE0, 0x20, 0x0C, 0x60, 0xC8, 0xCA, 0x35, 0x58, 0x7D, 0x3F, 0x59, 0xEE,
|
|
0xFB, 0x67, 0x7D, 0x64, 0x7D, 0x8E, 0x77, 0x6C, 0x61, 0x44, 0x8A, 0x8C,
|
|
0x4D, 0xF0, 0x12, 0xD4, 0xA4, 0xEA, 0x17, 0x75, 0x66, 0x49, 0x6C, 0xCF,
|
|
0x14, 0x28, 0xC6, 0x9A, 0x3C, 0x71, 0xFD, 0xB8, 0x3A, 0x6C, 0xE3, 0xA3,
|
|
0xA6, 0x06, 0x5A, 0xA6, 0xF0, 0x7A, 0x00, 0x15, 0xA5, 0x5A, 0x64, 0x66,
|
|
0x00, 0x05, 0x85, 0xB7,
|
|
};
|
|
|
|
static unsigned char dh2048_g[]={
|
|
0x05,
|
|
};
|
|
|
|
dh = DH_new();
|
|
|
|
if (dh == NULL) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "DH_new() failed");
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
BIGNUM *p= BN_bin2bn(dh2048_p, sizeof(dh2048_p), NULL);
|
|
BIGNUM *g= BN_bin2bn(dh2048_g, sizeof(dh2048_g), NULL);
|
|
|
|
if (!p || !g
|
|
#if OPENSSL_VERSION_NUMBER >= 0x10100000L
|
|
|| !DH_set0_pqg(dh, p, NULL, g)
|
|
#endif /* OPENSSL_VERSION_NUMBER >= 0x10100000L */
|
|
) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "BN_bin2bn() failed");
|
|
DH_free(dh);
|
|
return EASY_ERROR;
|
|
}
|
|
#if OPENSSL_VERSION_NUMBER < 0x10100000L
|
|
dh->p= p;
|
|
dh->g= g;
|
|
#endif /* OPENSSL_VERSION_NUMBER < 0x10100000L */
|
|
|
|
if (SSL_CTX_set_tmp_dh(ssl->ctx, dh) == 0) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "SSL_CTX_set_tmp_dh failed");
|
|
DH_free(dh);
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
DH_free(dh);
|
|
return EASY_OK;
|
|
}
|
|
|
|
static int easy_ssl_session_cache(easy_ssl_ctx_t *ssl, int session_cache, int timeout)
|
|
{
|
|
if (session_cache == EASY_SSL_SCACHE_OFF) {
|
|
SSL_CTX_set_session_cache_mode(ssl->ctx, SSL_SESS_CACHE_OFF);
|
|
} else {
|
|
//SSL_CTX_set_session_id_context(ssl->ctx, sess_ctx->data, sess_ctx->len);
|
|
SSL_CTX_set_session_cache_mode(ssl->ctx, SSL_SESS_CACHE_SERVER);
|
|
SSL_CTX_set_timeout(ssl->ctx, (long) timeout);
|
|
}
|
|
|
|
return EASY_OK;
|
|
}
|
|
|
|
static int easy_ssl_verify_callback(int ok, X509_STORE_CTX *x509_store)
|
|
{
|
|
return 1;
|
|
}
|
|
|
|
static int easy_ssl_client_certificate(easy_ssl_ctx_t *ssl, char *cert, int depth)
|
|
{
|
|
STACK_OF(X509_NAME) *list;
|
|
|
|
SSL_CTX_set_verify(ssl->ctx, SSL_VERIFY_PEER, easy_ssl_verify_callback);
|
|
|
|
SSL_CTX_set_verify_depth(ssl->ctx, depth);
|
|
|
|
if (!cert) {
|
|
return EASY_OK;
|
|
}
|
|
//ca file
|
|
if (SSL_CTX_load_verify_locations(ssl->ctx, cert, NULL) == 0) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "SSL_CTX_load_verify_locations(\"%s\") failed", cert);
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
if ((list = SSL_load_client_CA_file(cert)) == NULL) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "SSL_load_client_CA_file(\"%s\") failed", cert);
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
ERR_clear_error();
|
|
|
|
SSL_CTX_set_client_CA_list(ssl->ctx, list);
|
|
|
|
return EASY_OK;
|
|
}
|
|
|
|
static int easy_ssl_client_certificate_for_mysql(easy_ssl_ctx_t *ssl, const char *cert, int depth)
|
|
{
|
|
(void)(depth);
|
|
STACK_OF(X509_NAME) *list;
|
|
|
|
SSL_CTX_set_verify(ssl->ctx, SSL_VERIFY_PEER | SSL_VERIFY_CLIENT_ONCE, NULL);
|
|
|
|
//ca file
|
|
if (SSL_CTX_load_verify_locations(ssl->ctx, cert, NULL) == 0) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "SSL_CTX_load_verify_locations(\"%s\") failed", cert);
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
if ((list = SSL_load_client_CA_file(cert)) == NULL) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "SSL_load_client_CA_file(\"%s\") failed", cert);
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
ERR_clear_error();
|
|
|
|
SSL_CTX_set_client_CA_list(ssl->ctx, list);
|
|
return EASY_OK;
|
|
}
|
|
|
|
static int easy_ssl_client_certificate_for_mysql_memory(easy_ssl_ctx_t *ssl, const char *cert)
|
|
{
|
|
STACK_OF(X509_INFO) *chain = NULL;
|
|
STACK_OF(X509_NAME) *name_chain = NULL;
|
|
X509_STORE *ca_store = NULL;
|
|
X509_INFO *x509_info = NULL;
|
|
X509_NAME *subject = NULL;
|
|
int i = 0;
|
|
|
|
SSL_CTX_set_verify(ssl->ctx, SSL_VERIFY_PEER | SSL_VERIFY_CLIENT_ONCE, NULL);
|
|
BIO *cbio = NULL;
|
|
if (NULL == (cbio = BIO_new_mem_buf((void*)cert, -1))) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "BIO_new_mem_buf(\"%s\") failed", cert);
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
if (NULL == (chain = PEM_X509_INFO_read_bio(cbio, NULL, NULL, NULL))) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "PEM_X509_INFO_read_bio(\"%s\") failed", cert);
|
|
goto failed;
|
|
}
|
|
|
|
if (NULL == (ca_store = X509_STORE_new())) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "X509_STORE_new(\"%s\") failed", cert);
|
|
goto failed;
|
|
}
|
|
|
|
if (NULL == (name_chain = sk_X509_NAME_new_null())) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "sk_X509_NAME_new_null(\"%s\") failed", cert);
|
|
goto failed;
|
|
}
|
|
|
|
for (i = 0; i < sk_X509_INFO_num(chain); i++) {
|
|
x509_info = sk_X509_INFO_value(chain, i);
|
|
|
|
if (NULL == x509_info) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "sk_X509_value(\"%s\"), i:%d, is null", cert, i);
|
|
goto failed;
|
|
}
|
|
|
|
if (NULL == (subject = X509_NAME_dup(X509_get_subject_name(x509_info->x509)))) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "X509_NAME_dup(\"%s\"), i:%d, failed", cert, i);
|
|
goto failed;
|
|
}
|
|
|
|
if (!sk_X509_NAME_push(name_chain, subject)) {
|
|
easy_ssl_error(EASY_LOG_ERROR,"sk_X509_NAME_push (\"%s\"), i=%d, failed", cert, i);
|
|
X509_NAME_free(subject);
|
|
goto failed;
|
|
}
|
|
|
|
if (0 == X509_STORE_add_cert(ca_store, x509_info->x509)) {
|
|
easy_ssl_error(EASY_LOG_ERROR,"X509_STORE_add_cert (\"%s\") i=%d, failed", cert, i);
|
|
goto failed;
|
|
}
|
|
}
|
|
|
|
SSL_CTX_set_cert_store(ssl->ctx, ca_store);
|
|
SSL_CTX_set_client_CA_list(ssl->ctx, name_chain);
|
|
BIO_free(cbio);
|
|
sk_X509_INFO_pop_free(chain, X509_INFO_free);
|
|
return EASY_OK;
|
|
|
|
failed:
|
|
BIO_free(cbio);
|
|
sk_X509_INFO_pop_free(chain, X509_INFO_free);
|
|
sk_X509_NAME_free(name_chain);
|
|
X509_STORE_free(ca_store);
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
static int easy_ssl_crl(easy_ssl_ctx_t *ssl, char *crl)
|
|
{
|
|
X509_STORE *store;
|
|
X509_LOOKUP *lookup;
|
|
|
|
if (!crl) {
|
|
return EASY_OK;
|
|
}
|
|
|
|
store = SSL_CTX_get_cert_store(ssl->ctx);
|
|
|
|
if (store == NULL) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "SSL_CTX_get_cert_store() failed");
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file());
|
|
|
|
if (lookup == NULL) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "X509_STORE_add_lookup() failed");
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
if (X509_LOOKUP_load_file(lookup, crl, X509_FILETYPE_PEM) == 0) {
|
|
easy_ssl_error(EASY_LOG_ERROR, "X509_LOOKUP_load_file(\"%s\") failed", crl);
|
|
return EASY_ERROR;
|
|
}
|
|
|
|
X509_STORE_set_flags(store, X509_V_FLAG_CRL_CHECK | X509_V_FLAG_CRL_CHECK_ALL);
|
|
|
|
return EASY_OK;
|
|
}
|
|
|
|
static void easy_ssl_client_handshake_handler(easy_connection_t *c)
|
|
{
|
|
SSL_SESSION *old_ssl_session, *ssl_session;
|
|
|
|
if (c->sc->handshaked) {
|
|
ev_set_cb(&c->read_watcher, easy_connection_on_readable);
|
|
ev_set_cb(&c->write_watcher, easy_connection_on_writable);
|
|
|
|
if (c->sc->session_reuse) {
|
|
ssl_session = SSL_get1_session(c->sc->connection);
|
|
|
|
if (ssl_session == NULL) {
|
|
return;
|
|
}
|
|
|
|
old_ssl_session = c->client->ssl_session;
|
|
c->client->ssl_session = ssl_session;
|
|
|
|
if (old_ssl_session) {
|
|
SSL_SESSION_free(old_ssl_session);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
static int easy_ssl_pass_phrase_cb(char *buf, int size, int rwflag, void *conf)
|
|
{
|
|
easy_ssl_pass_phrase_dialog_t *dialog;
|
|
int len = -1;
|
|
|
|
dialog = (easy_ssl_pass_phrase_dialog_t *)conf;
|
|
buf[0] = '\0';
|
|
|
|
if (dialog->type == NULL || strncmp(dialog->type, "builtin", 7) == 0) {
|
|
easy_error_log("Server %s", dialog->server_name);
|
|
|
|
while ((len = strlen(buf)) == 0) {
|
|
fprintf(stderr, "Enter pass phrase:");
|
|
|
|
if ((len = EVP_read_pw_string(buf, size, "", 0)) != 0) {
|
|
return -1;
|
|
}
|
|
}
|
|
} else if (strncmp(dialog->type, "exec:", 5) == 0) {
|
|
FILE *fp;
|
|
char *p, cmd[256];
|
|
|
|
snprintf(cmd, 256, "%s '%s'", dialog->type + 5, dialog->server_name);
|
|
|
|
if ((fp = popen(cmd, "r")) == NULL)
|
|
return -1;
|
|
|
|
if (fgets(buf, size, fp)) {
|
|
p = buf + strlen(buf);
|
|
|
|
while(p > buf && *(p - 1) == '\n') p --;
|
|
|
|
*p = '\0';
|
|
len = p - buf;
|
|
}
|
|
|
|
pclose(fp);
|
|
} else if (strncmp(dialog->type, "text:", 5) == 0) {
|
|
len = lnprintf(buf, size, "%s", dialog->type + 5);
|
|
}
|
|
|
|
return len;
|
|
}
|
|
|
|
int easy_ssl_client_authenticate(easy_ssl_t *ssl, SSL *conn, const void *host, int len)
|
|
{
|
|
uint64_t key = easy_hash_code(host, len, 3);
|
|
easy_ssl_ctx_server_t *cs = (easy_ssl_ctx_server_t *)easy_hash_find_ex(ssl->server_map, key, easy_ssl_ctx_server_cmp, host);
|
|
|
|
if (cs && cs->ss->conf.verify) {
|
|
long rc = SSL_get_verify_result(conn);
|
|
|
|
if (rc != X509_V_OK) {
|
|
easy_error_log("client SSL certificate verify error: (%l:%s)",
|
|
rc, X509_verify_cert_error_string(rc));
|
|
return 0;
|
|
}
|
|
|
|
if (cs->ss->conf.verify == 1) {
|
|
X509 *cert = SSL_get_peer_certificate(conn);
|
|
|
|
if (cert == NULL) {
|
|
easy_error_log("client sent no required SSL certificate");
|
|
return 0;
|
|
}
|
|
|
|
X509_free(cert);
|
|
}
|
|
}
|
|
|
|
return 1;
|
|
}
|