bearssl.c 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874
  1. /***************************************************************************
  2. * _ _ ____ _
  3. * Project ___| | | | _ \| |
  4. * / __| | | | |_) | |
  5. * | (__| |_| | _ <| |___
  6. * \___|\___/|_| \_\_____|
  7. *
  8. * Copyright (C) 2019, Michael Forney, <mforney@mforney.org>
  9. *
  10. * This software is licensed as described in the file COPYING, which
  11. * you should have received as part of this distribution. The terms
  12. * are also available at https://curl.haxx.se/docs/copyright.html.
  13. *
  14. * You may opt to use, copy, modify, merge, publish, distribute and/or sell
  15. * copies of the Software, and permit persons to whom the Software is
  16. * furnished to do so, under the terms of the COPYING file.
  17. *
  18. * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
  19. * KIND, either express or implied.
  20. *
  21. ***************************************************************************/
  22. #include "curl_setup.h"
  23. #ifdef USE_BEARSSL
  24. #include <bearssl.h>
  25. #include "bearssl.h"
  26. #include "urldata.h"
  27. #include "sendf.h"
  28. #include "inet_pton.h"
  29. #include "vtls.h"
  30. #include "connect.h"
  31. #include "select.h"
  32. #include "multiif.h"
  33. #include "curl_printf.h"
  34. #include "curl_memory.h"
  35. struct x509_context {
  36. const br_x509_class *vtable;
  37. br_x509_minimal_context minimal;
  38. bool verifyhost;
  39. bool verifypeer;
  40. };
  41. struct ssl_backend_data {
  42. br_ssl_client_context ctx;
  43. struct x509_context x509;
  44. unsigned char buf[BR_SSL_BUFSIZE_BIDI];
  45. br_x509_trust_anchor *anchors;
  46. size_t anchors_len;
  47. const char *protocols[2];
  48. /* SSL client context is active */
  49. bool active;
  50. };
  51. #define BACKEND connssl->backend
  52. struct cafile_parser {
  53. CURLcode err;
  54. bool in_cert;
  55. br_x509_decoder_context xc;
  56. /* array of trust anchors loaded from CAfile */
  57. br_x509_trust_anchor *anchors;
  58. size_t anchors_len;
  59. /* buffer for DN data */
  60. unsigned char dn[1024];
  61. size_t dn_len;
  62. };
  63. static void append_dn(void *ctx, const void *buf, size_t len)
  64. {
  65. struct cafile_parser *ca = ctx;
  66. if(ca->err != CURLE_OK || !ca->in_cert)
  67. return;
  68. if(sizeof(ca->dn) - ca->dn_len < len) {
  69. ca->err = CURLE_FAILED_INIT;
  70. return;
  71. }
  72. memcpy(ca->dn + ca->dn_len, buf, len);
  73. ca->dn_len += len;
  74. }
  75. static void x509_push(void *ctx, const void *buf, size_t len)
  76. {
  77. struct cafile_parser *ca = ctx;
  78. if(ca->in_cert)
  79. br_x509_decoder_push(&ca->xc, buf, len);
  80. }
  81. static CURLcode load_cafile(const char *path, br_x509_trust_anchor **anchors,
  82. size_t *anchors_len)
  83. {
  84. struct cafile_parser ca;
  85. br_pem_decoder_context pc;
  86. br_x509_trust_anchor *ta;
  87. size_t ta_size;
  88. br_x509_trust_anchor *new_anchors;
  89. size_t new_anchors_len;
  90. br_x509_pkey *pkey;
  91. FILE *fp;
  92. unsigned char buf[BUFSIZ], *p;
  93. const char *name;
  94. size_t n, i, pushed;
  95. fp = fopen(path, "rb");
  96. if(!fp)
  97. return CURLE_SSL_CACERT_BADFILE;
  98. ca.err = CURLE_OK;
  99. ca.in_cert = FALSE;
  100. ca.anchors = NULL;
  101. ca.anchors_len = 0;
  102. br_pem_decoder_init(&pc);
  103. br_pem_decoder_setdest(&pc, x509_push, &ca);
  104. for(;;) {
  105. n = fread(buf, 1, sizeof(buf), fp);
  106. if(n == 0)
  107. break;
  108. p = buf;
  109. while(n) {
  110. pushed = br_pem_decoder_push(&pc, p, n);
  111. if(ca.err)
  112. goto fail;
  113. p += pushed;
  114. n -= pushed;
  115. switch(br_pem_decoder_event(&pc)) {
  116. case 0:
  117. break;
  118. case BR_PEM_BEGIN_OBJ:
  119. name = br_pem_decoder_name(&pc);
  120. if(strcmp(name, "CERTIFICATE") && strcmp(name, "X509 CERTIFICATE"))
  121. break;
  122. br_x509_decoder_init(&ca.xc, append_dn, &ca);
  123. if(ca.anchors_len == SIZE_MAX / sizeof(ca.anchors[0])) {
  124. ca.err = CURLE_OUT_OF_MEMORY;
  125. goto fail;
  126. }
  127. new_anchors_len = ca.anchors_len + 1;
  128. new_anchors = realloc(ca.anchors,
  129. new_anchors_len * sizeof(ca.anchors[0]));
  130. if(!new_anchors) {
  131. ca.err = CURLE_OUT_OF_MEMORY;
  132. goto fail;
  133. }
  134. ca.anchors = new_anchors;
  135. ca.anchors_len = new_anchors_len;
  136. ca.in_cert = TRUE;
  137. ca.dn_len = 0;
  138. ta = &ca.anchors[ca.anchors_len - 1];
  139. ta->dn.data = NULL;
  140. break;
  141. case BR_PEM_END_OBJ:
  142. if(!ca.in_cert)
  143. break;
  144. ca.in_cert = FALSE;
  145. if(br_x509_decoder_last_error(&ca.xc)) {
  146. ca.err = CURLE_SSL_CACERT_BADFILE;
  147. goto fail;
  148. }
  149. ta->flags = 0;
  150. if(br_x509_decoder_isCA(&ca.xc))
  151. ta->flags |= BR_X509_TA_CA;
  152. pkey = br_x509_decoder_get_pkey(&ca.xc);
  153. if(!pkey) {
  154. ca.err = CURLE_SSL_CACERT_BADFILE;
  155. goto fail;
  156. }
  157. ta->pkey = *pkey;
  158. /* calculate space needed for trust anchor data */
  159. ta_size = ca.dn_len;
  160. switch(pkey->key_type) {
  161. case BR_KEYTYPE_RSA:
  162. ta_size += pkey->key.rsa.nlen + pkey->key.rsa.elen;
  163. break;
  164. case BR_KEYTYPE_EC:
  165. ta_size += pkey->key.ec.qlen;
  166. break;
  167. default:
  168. ca.err = CURLE_FAILED_INIT;
  169. goto fail;
  170. }
  171. /* fill in trust anchor DN and public key data */
  172. ta->dn.data = malloc(ta_size);
  173. if(!ta->dn.data) {
  174. ca.err = CURLE_OUT_OF_MEMORY;
  175. goto fail;
  176. }
  177. memcpy(ta->dn.data, ca.dn, ca.dn_len);
  178. ta->dn.len = ca.dn_len;
  179. switch(pkey->key_type) {
  180. case BR_KEYTYPE_RSA:
  181. ta->pkey.key.rsa.n = ta->dn.data + ta->dn.len;
  182. memcpy(ta->pkey.key.rsa.n, pkey->key.rsa.n, pkey->key.rsa.nlen);
  183. ta->pkey.key.rsa.e = ta->pkey.key.rsa.n + ta->pkey.key.rsa.nlen;
  184. memcpy(ta->pkey.key.rsa.e, pkey->key.rsa.e, pkey->key.rsa.elen);
  185. break;
  186. case BR_KEYTYPE_EC:
  187. ta->pkey.key.ec.q = ta->dn.data + ta->dn.len;
  188. memcpy(ta->pkey.key.ec.q, pkey->key.ec.q, pkey->key.ec.qlen);
  189. break;
  190. }
  191. break;
  192. default:
  193. ca.err = CURLE_SSL_CACERT_BADFILE;
  194. goto fail;
  195. }
  196. }
  197. }
  198. if(ferror(fp))
  199. ca.err = CURLE_READ_ERROR;
  200. fail:
  201. fclose(fp);
  202. if(ca.err == CURLE_OK) {
  203. *anchors = ca.anchors;
  204. *anchors_len = ca.anchors_len;
  205. }
  206. else {
  207. for(i = 0; i < ca.anchors_len; ++i)
  208. free(ca.anchors[i].dn.data);
  209. free(ca.anchors);
  210. }
  211. return ca.err;
  212. }
  213. static void x509_start_chain(const br_x509_class **ctx,
  214. const char *server_name)
  215. {
  216. struct x509_context *x509 = (struct x509_context *)ctx;
  217. if(!x509->verifyhost)
  218. server_name = NULL;
  219. x509->minimal.vtable->start_chain(&x509->minimal.vtable, server_name);
  220. }
  221. static void x509_start_cert(const br_x509_class **ctx, uint32_t length)
  222. {
  223. struct x509_context *x509 = (struct x509_context *)ctx;
  224. x509->minimal.vtable->start_cert(&x509->minimal.vtable, length);
  225. }
  226. static void x509_append(const br_x509_class **ctx, const unsigned char *buf,
  227. size_t len)
  228. {
  229. struct x509_context *x509 = (struct x509_context *)ctx;
  230. x509->minimal.vtable->append(&x509->minimal.vtable, buf, len);
  231. }
  232. static void x509_end_cert(const br_x509_class **ctx)
  233. {
  234. struct x509_context *x509 = (struct x509_context *)ctx;
  235. x509->minimal.vtable->end_cert(&x509->minimal.vtable);
  236. }
  237. static unsigned x509_end_chain(const br_x509_class **ctx)
  238. {
  239. struct x509_context *x509 = (struct x509_context *)ctx;
  240. unsigned err;
  241. err = x509->minimal.vtable->end_chain(&x509->minimal.vtable);
  242. if(err && !x509->verifypeer) {
  243. /* ignore any X.509 errors */
  244. err = BR_ERR_OK;
  245. }
  246. return err;
  247. }
  248. static const br_x509_pkey *x509_get_pkey(const br_x509_class *const *ctx,
  249. unsigned *usages)
  250. {
  251. struct x509_context *x509 = (struct x509_context *)ctx;
  252. return x509->minimal.vtable->get_pkey(&x509->minimal.vtable, usages);
  253. }
  254. static const br_x509_class x509_vtable = {
  255. sizeof(struct x509_context),
  256. x509_start_chain,
  257. x509_start_cert,
  258. x509_append,
  259. x509_end_cert,
  260. x509_end_chain,
  261. x509_get_pkey
  262. };
  263. static CURLcode bearssl_connect_step1(struct connectdata *conn, int sockindex)
  264. {
  265. struct Curl_easy *data = conn->data;
  266. struct ssl_connect_data *connssl = &conn->ssl[sockindex];
  267. const char * const ssl_cafile = SSL_CONN_CONFIG(CAfile);
  268. const char *hostname = SSL_IS_PROXY() ? conn->http_proxy.host.name :
  269. conn->host.name;
  270. const bool verifypeer = SSL_CONN_CONFIG(verifypeer);
  271. const bool verifyhost = SSL_CONN_CONFIG(verifyhost);
  272. CURLcode ret;
  273. unsigned version_min, version_max;
  274. #ifdef ENABLE_IPV6
  275. struct in6_addr addr;
  276. #else
  277. struct in_addr addr;
  278. #endif
  279. switch(SSL_CONN_CONFIG(version)) {
  280. case CURL_SSLVERSION_SSLv2:
  281. failf(data, "BearSSL does not support SSLv2");
  282. return CURLE_SSL_CONNECT_ERROR;
  283. case CURL_SSLVERSION_SSLv3:
  284. failf(data, "BearSSL does not support SSLv3");
  285. return CURLE_SSL_CONNECT_ERROR;
  286. case CURL_SSLVERSION_TLSv1_0:
  287. version_min = BR_TLS10;
  288. version_max = BR_TLS10;
  289. break;
  290. case CURL_SSLVERSION_TLSv1_1:
  291. version_min = BR_TLS11;
  292. version_max = BR_TLS11;
  293. break;
  294. case CURL_SSLVERSION_TLSv1_2:
  295. version_min = BR_TLS12;
  296. version_max = BR_TLS12;
  297. break;
  298. case CURL_SSLVERSION_DEFAULT:
  299. case CURL_SSLVERSION_TLSv1:
  300. version_min = BR_TLS10;
  301. version_max = BR_TLS12;
  302. break;
  303. default:
  304. failf(data, "BearSSL: unknown CURLOPT_SSLVERSION");
  305. return CURLE_SSL_CONNECT_ERROR;
  306. }
  307. if(ssl_cafile) {
  308. ret = load_cafile(ssl_cafile, &BACKEND->anchors, &BACKEND->anchors_len);
  309. if(ret != CURLE_OK) {
  310. if(verifypeer) {
  311. failf(data, "error setting certificate verify locations:\n"
  312. " CAfile: %s\n", ssl_cafile);
  313. return ret;
  314. }
  315. infof(data, "error setting certificate verify locations,"
  316. " continuing anyway:\n");
  317. }
  318. }
  319. /* initialize SSL context */
  320. br_ssl_client_init_full(&BACKEND->ctx, &BACKEND->x509.minimal,
  321. BACKEND->anchors, BACKEND->anchors_len);
  322. br_ssl_engine_set_versions(&BACKEND->ctx.eng, version_min, version_max);
  323. br_ssl_engine_set_buffer(&BACKEND->ctx.eng, BACKEND->buf,
  324. sizeof(BACKEND->buf), 1);
  325. /* initialize X.509 context */
  326. BACKEND->x509.vtable = &x509_vtable;
  327. BACKEND->x509.verifypeer = verifypeer;
  328. BACKEND->x509.verifyhost = verifyhost;
  329. br_ssl_engine_set_x509(&BACKEND->ctx.eng, &BACKEND->x509.vtable);
  330. if(SSL_SET_OPTION(primary.sessionid)) {
  331. void *session;
  332. Curl_ssl_sessionid_lock(conn);
  333. if(!Curl_ssl_getsessionid(conn, &session, NULL, sockindex)) {
  334. br_ssl_engine_set_session_parameters(&BACKEND->ctx.eng, session);
  335. infof(data, "BearSSL: re-using session ID\n");
  336. }
  337. Curl_ssl_sessionid_unlock(conn);
  338. }
  339. if(conn->bits.tls_enable_alpn) {
  340. int cur = 0;
  341. /* NOTE: when adding more protocols here, increase the size of the
  342. * protocols array in `struct ssl_backend_data`.
  343. */
  344. #ifdef USE_NGHTTP2
  345. if(data->set.httpversion >= CURL_HTTP_VERSION_2 &&
  346. (!SSL_IS_PROXY() || !conn->bits.tunnel_proxy)) {
  347. BACKEND->protocols[cur++] = NGHTTP2_PROTO_VERSION_ID;
  348. infof(data, "ALPN, offering %s\n", NGHTTP2_PROTO_VERSION_ID);
  349. }
  350. #endif
  351. BACKEND->protocols[cur++] = ALPN_HTTP_1_1;
  352. infof(data, "ALPN, offering %s\n", ALPN_HTTP_1_1);
  353. br_ssl_engine_set_protocol_names(&BACKEND->ctx.eng,
  354. BACKEND->protocols, cur);
  355. }
  356. if((1 == Curl_inet_pton(AF_INET, hostname, &addr))
  357. #ifdef ENABLE_IPV6
  358. || (1 == Curl_inet_pton(AF_INET6, hostname, &addr))
  359. #endif
  360. ) {
  361. if(verifyhost) {
  362. failf(data, "BearSSL: "
  363. "host verification of IP address is not supported");
  364. return CURLE_PEER_FAILED_VERIFICATION;
  365. }
  366. hostname = NULL;
  367. }
  368. if(!br_ssl_client_reset(&BACKEND->ctx, hostname, 0))
  369. return CURLE_FAILED_INIT;
  370. BACKEND->active = TRUE;
  371. connssl->connecting_state = ssl_connect_2;
  372. return CURLE_OK;
  373. }
  374. static CURLcode bearssl_connect_step2(struct connectdata *conn, int sockindex)
  375. {
  376. struct Curl_easy *data = conn->data;
  377. struct ssl_connect_data *connssl = &conn->ssl[sockindex];
  378. curl_socket_t sockfd = conn->sock[sockindex];
  379. unsigned state;
  380. unsigned char *buf;
  381. size_t len;
  382. ssize_t ret;
  383. int err;
  384. for(;;) {
  385. state = br_ssl_engine_current_state(&BACKEND->ctx.eng);
  386. if(state & BR_SSL_CLOSED) {
  387. err = br_ssl_engine_last_error(&BACKEND->ctx.eng);
  388. switch(err) {
  389. case BR_ERR_X509_EXPIRED:
  390. failf(data, "SSL: X.509 verification: "
  391. "certificate is expired or not yet valid");
  392. return CURLE_PEER_FAILED_VERIFICATION;
  393. case BR_ERR_X509_BAD_SERVER_NAME:
  394. failf(data, "SSL: X.509 verification: "
  395. "expected server name was not found in the chain");
  396. return CURLE_PEER_FAILED_VERIFICATION;
  397. case BR_ERR_X509_NOT_TRUSTED:
  398. failf(data, "SSL: X.509 verification: "
  399. "chain could not be linked to a trust anchor");
  400. return CURLE_PEER_FAILED_VERIFICATION;
  401. }
  402. /* X.509 errors are documented to have the range 32..63 */
  403. if(err >= 32 && err < 64)
  404. return CURLE_PEER_FAILED_VERIFICATION;
  405. return CURLE_SSL_CONNECT_ERROR;
  406. }
  407. if(state & (BR_SSL_SENDAPP | BR_SSL_RECVAPP)) {
  408. connssl->connecting_state = ssl_connect_3;
  409. return CURLE_OK;
  410. }
  411. if(state & BR_SSL_SENDREC) {
  412. buf = br_ssl_engine_sendrec_buf(&BACKEND->ctx.eng, &len);
  413. ret = swrite(sockfd, buf, len);
  414. if(ret == -1) {
  415. if(SOCKERRNO == EAGAIN || SOCKERRNO == EWOULDBLOCK) {
  416. connssl->connecting_state = ssl_connect_2_writing;
  417. return CURLE_OK;
  418. }
  419. return CURLE_SEND_ERROR;
  420. }
  421. br_ssl_engine_sendrec_ack(&BACKEND->ctx.eng, ret);
  422. }
  423. else if(state & BR_SSL_RECVREC) {
  424. buf = br_ssl_engine_recvrec_buf(&BACKEND->ctx.eng, &len);
  425. ret = sread(sockfd, buf, len);
  426. if(ret == -1) {
  427. if(SOCKERRNO == EAGAIN || SOCKERRNO == EWOULDBLOCK) {
  428. connssl->connecting_state = ssl_connect_2_reading;
  429. return CURLE_OK;
  430. }
  431. return CURLE_READ_ERROR;
  432. }
  433. if(ret == 0)
  434. return CURLE_SSL_CONNECT_ERROR;
  435. br_ssl_engine_recvrec_ack(&BACKEND->ctx.eng, ret);
  436. }
  437. }
  438. }
  439. static CURLcode bearssl_connect_step3(struct connectdata *conn, int sockindex)
  440. {
  441. struct Curl_easy *data = conn->data;
  442. struct ssl_connect_data *connssl = &conn->ssl[sockindex];
  443. CURLcode ret;
  444. DEBUGASSERT(ssl_connect_3 == connssl->connecting_state);
  445. if(conn->bits.tls_enable_alpn) {
  446. const char *protocol;
  447. protocol = br_ssl_engine_get_selected_protocol(&BACKEND->ctx.eng);
  448. if(protocol) {
  449. infof(data, "ALPN, server accepted to use %s\n", protocol);
  450. #ifdef USE_NGHTTP2
  451. if(!strcmp(protocol, NGHTTP2_PROTO_VERSION_ID))
  452. conn->negnpn = CURL_HTTP_VERSION_2;
  453. else
  454. #endif
  455. if(!strcmp(protocol, ALPN_HTTP_1_1))
  456. conn->negnpn = CURL_HTTP_VERSION_1_1;
  457. else
  458. infof(data, "ALPN, unrecognized protocol %s\n", protocol);
  459. Curl_multiuse_state(conn, conn->negnpn == CURL_HTTP_VERSION_2 ?
  460. BUNDLE_MULTIPLEX : BUNDLE_NO_MULTIUSE);
  461. }
  462. else
  463. infof(data, "ALPN, server did not agree to a protocol\n");
  464. }
  465. if(SSL_SET_OPTION(primary.sessionid)) {
  466. bool incache;
  467. void *oldsession;
  468. br_ssl_session_parameters *session;
  469. session = malloc(sizeof(*session));
  470. if(!session)
  471. return CURLE_OUT_OF_MEMORY;
  472. br_ssl_engine_get_session_parameters(&BACKEND->ctx.eng, session);
  473. Curl_ssl_sessionid_lock(conn);
  474. incache = !(Curl_ssl_getsessionid(conn, &oldsession, NULL, sockindex));
  475. if(incache)
  476. Curl_ssl_delsessionid(conn, oldsession);
  477. ret = Curl_ssl_addsessionid(conn, session, 0, sockindex);
  478. Curl_ssl_sessionid_unlock(conn);
  479. if(ret) {
  480. free(session);
  481. return CURLE_OUT_OF_MEMORY;
  482. }
  483. }
  484. connssl->connecting_state = ssl_connect_done;
  485. return CURLE_OK;
  486. }
  487. static ssize_t bearssl_send(struct connectdata *conn, int sockindex,
  488. const void *buf, size_t len, CURLcode *err)
  489. {
  490. struct ssl_connect_data *connssl = &conn->ssl[sockindex];
  491. unsigned state;
  492. unsigned char *rec, *app;
  493. size_t reclen, applen;
  494. ssize_t ret;
  495. applen = 0;
  496. for(;;) {
  497. state = br_ssl_engine_current_state(&BACKEND->ctx.eng);
  498. if(state & BR_SSL_SENDREC) {
  499. rec = br_ssl_engine_sendrec_buf(&BACKEND->ctx.eng, &reclen);
  500. ret = swrite(conn->sock[sockindex], rec, reclen);
  501. if(ret == -1) {
  502. if(SOCKERRNO == EAGAIN || SOCKERRNO == EWOULDBLOCK)
  503. *err = CURLE_AGAIN;
  504. else
  505. *err = CURLE_SEND_ERROR;
  506. return -1;
  507. }
  508. br_ssl_engine_sendrec_ack(&BACKEND->ctx.eng, ret);
  509. }
  510. else if(state & BR_SSL_SENDAPP && applen == 0) {
  511. app = br_ssl_engine_sendapp_buf(&BACKEND->ctx.eng, &applen);
  512. if(applen > len)
  513. applen = len;
  514. memcpy(app, buf, applen);
  515. br_ssl_engine_sendapp_ack(&BACKEND->ctx.eng, applen);
  516. br_ssl_engine_flush(&BACKEND->ctx.eng, 0);
  517. }
  518. else if(state & BR_SSL_CLOSED || applen == 0) {
  519. *err = CURLE_SEND_ERROR;
  520. return -1;
  521. }
  522. else
  523. break;
  524. }
  525. return applen;
  526. }
  527. static ssize_t bearssl_recv(struct connectdata *conn, int sockindex,
  528. char *buf, size_t len, CURLcode *err)
  529. {
  530. struct ssl_connect_data *connssl = &conn->ssl[sockindex];
  531. unsigned state;
  532. unsigned char *rec, *app;
  533. size_t reclen, applen;
  534. ssize_t ret;
  535. for(;;) {
  536. state = br_ssl_engine_current_state(&BACKEND->ctx.eng);
  537. if(state & BR_SSL_RECVREC) {
  538. rec = br_ssl_engine_recvrec_buf(&BACKEND->ctx.eng, &reclen);
  539. ret = sread(conn->sock[sockindex], rec, reclen);
  540. if(ret == -1 && (SOCKERRNO == EAGAIN || SOCKERRNO == EWOULDBLOCK)) {
  541. *err = CURLE_AGAIN;
  542. return -1;
  543. }
  544. if(ret <= 0) {
  545. *err = CURLE_RECV_ERROR;
  546. return -1;
  547. }
  548. br_ssl_engine_recvrec_ack(&BACKEND->ctx.eng, ret);
  549. }
  550. else if(state & BR_SSL_RECVAPP) {
  551. app = br_ssl_engine_recvapp_buf(&BACKEND->ctx.eng, &applen);
  552. if(applen > len)
  553. applen = len;
  554. memcpy(buf, app, applen);
  555. br_ssl_engine_recvapp_ack(&BACKEND->ctx.eng, applen);
  556. break;
  557. }
  558. else {
  559. *err = CURLE_RECV_ERROR;
  560. return -1;
  561. }
  562. }
  563. return applen;
  564. }
  565. static CURLcode bearssl_connect_common(struct connectdata *conn,
  566. int sockindex,
  567. bool nonblocking,
  568. bool *done)
  569. {
  570. CURLcode ret;
  571. struct Curl_easy *data = conn->data;
  572. struct ssl_connect_data *connssl = &conn->ssl[sockindex];
  573. curl_socket_t sockfd = conn->sock[sockindex];
  574. time_t timeout_ms;
  575. int what;
  576. /* check if the connection has already been established */
  577. if(ssl_connection_complete == connssl->state) {
  578. *done = TRUE;
  579. return CURLE_OK;
  580. }
  581. if(ssl_connect_1 == connssl->connecting_state) {
  582. ret = bearssl_connect_step1(conn, sockindex);
  583. if(ret)
  584. return ret;
  585. }
  586. while(ssl_connect_2 == connssl->connecting_state ||
  587. ssl_connect_2_reading == connssl->connecting_state ||
  588. ssl_connect_2_writing == connssl->connecting_state) {
  589. /* check allowed time left */
  590. timeout_ms = Curl_timeleft(data, NULL, TRUE);
  591. if(timeout_ms < 0) {
  592. /* no need to continue if time already is up */
  593. failf(data, "SSL connection timeout");
  594. return CURLE_OPERATION_TIMEDOUT;
  595. }
  596. /* if ssl is expecting something, check if it's available. */
  597. if(ssl_connect_2_reading == connssl->connecting_state ||
  598. ssl_connect_2_writing == connssl->connecting_state) {
  599. curl_socket_t writefd = ssl_connect_2_writing ==
  600. connssl->connecting_state?sockfd:CURL_SOCKET_BAD;
  601. curl_socket_t readfd = ssl_connect_2_reading ==
  602. connssl->connecting_state?sockfd:CURL_SOCKET_BAD;
  603. what = Curl_socket_check(readfd, CURL_SOCKET_BAD, writefd,
  604. nonblocking?0:timeout_ms);
  605. if(what < 0) {
  606. /* fatal error */
  607. failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO);
  608. return CURLE_SSL_CONNECT_ERROR;
  609. }
  610. else if(0 == what) {
  611. if(nonblocking) {
  612. *done = FALSE;
  613. return CURLE_OK;
  614. }
  615. else {
  616. /* timeout */
  617. failf(data, "SSL connection timeout");
  618. return CURLE_OPERATION_TIMEDOUT;
  619. }
  620. }
  621. /* socket is readable or writable */
  622. }
  623. /* Run transaction, and return to the caller if it failed or if this
  624. * connection is done nonblocking and this loop would execute again. This
  625. * permits the owner of a multi handle to abort a connection attempt
  626. * before step2 has completed while ensuring that a client using select()
  627. * or epoll() will always have a valid fdset to wait on.
  628. */
  629. ret = bearssl_connect_step2(conn, sockindex);
  630. if(ret || (nonblocking &&
  631. (ssl_connect_2 == connssl->connecting_state ||
  632. ssl_connect_2_reading == connssl->connecting_state ||
  633. ssl_connect_2_writing == connssl->connecting_state)))
  634. return ret;
  635. }
  636. if(ssl_connect_3 == connssl->connecting_state) {
  637. ret = bearssl_connect_step3(conn, sockindex);
  638. if(ret)
  639. return ret;
  640. }
  641. if(ssl_connect_done == connssl->connecting_state) {
  642. connssl->state = ssl_connection_complete;
  643. conn->recv[sockindex] = bearssl_recv;
  644. conn->send[sockindex] = bearssl_send;
  645. *done = TRUE;
  646. }
  647. else
  648. *done = FALSE;
  649. /* Reset our connect state machine */
  650. connssl->connecting_state = ssl_connect_1;
  651. return CURLE_OK;
  652. }
  653. static size_t Curl_bearssl_version(char *buffer, size_t size)
  654. {
  655. return msnprintf(buffer, size, "BearSSL");
  656. }
  657. static bool Curl_bearssl_data_pending(const struct connectdata *conn,
  658. int connindex)
  659. {
  660. const struct ssl_connect_data *connssl = &conn->ssl[connindex];
  661. return br_ssl_engine_current_state(&BACKEND->ctx.eng) & BR_SSL_RECVAPP;
  662. }
  663. static CURLcode Curl_bearssl_random(struct Curl_easy *data UNUSED_PARAM,
  664. unsigned char *entropy, size_t length)
  665. {
  666. static br_hmac_drbg_context ctx;
  667. static bool seeded = FALSE;
  668. if(!seeded) {
  669. br_prng_seeder seeder;
  670. br_hmac_drbg_init(&ctx, &br_sha256_vtable, NULL, 0);
  671. seeder = br_prng_seeder_system(NULL);
  672. if(!seeder || !seeder(&ctx.vtable))
  673. return CURLE_FAILED_INIT;
  674. seeded = TRUE;
  675. }
  676. br_hmac_drbg_generate(&ctx, entropy, length);
  677. return CURLE_OK;
  678. }
  679. static CURLcode Curl_bearssl_connect(struct connectdata *conn, int sockindex)
  680. {
  681. CURLcode ret;
  682. bool done = FALSE;
  683. ret = bearssl_connect_common(conn, sockindex, FALSE, &done);
  684. if(ret)
  685. return ret;
  686. DEBUGASSERT(done);
  687. return CURLE_OK;
  688. }
  689. static CURLcode Curl_bearssl_connect_nonblocking(struct connectdata *conn,
  690. int sockindex, bool *done)
  691. {
  692. return bearssl_connect_common(conn, sockindex, TRUE, done);
  693. }
  694. static void *Curl_bearssl_get_internals(struct ssl_connect_data *connssl,
  695. CURLINFO info UNUSED_PARAM)
  696. {
  697. return &BACKEND->ctx;
  698. }
  699. static void Curl_bearssl_close(struct connectdata *conn, int sockindex)
  700. {
  701. struct ssl_connect_data *connssl = &conn->ssl[sockindex];
  702. unsigned char *buf;
  703. size_t len, i;
  704. ssize_t ret;
  705. if(BACKEND->active) {
  706. br_ssl_engine_close(&BACKEND->ctx.eng);
  707. while(br_ssl_engine_current_state(&BACKEND->ctx.eng) & BR_SSL_SENDREC) {
  708. buf = br_ssl_engine_sendrec_buf(&BACKEND->ctx.eng, &len);
  709. ret = swrite(conn->sock[sockindex], buf, len);
  710. if(ret < 0)
  711. break;
  712. br_ssl_engine_sendrec_ack(&BACKEND->ctx.eng, ret);
  713. }
  714. }
  715. for(i = 0; i < BACKEND->anchors_len; ++i)
  716. free(BACKEND->anchors[i].dn.data);
  717. free(BACKEND->anchors);
  718. }
  719. static void Curl_bearssl_session_free(void *ptr)
  720. {
  721. free(ptr);
  722. }
  723. static CURLcode Curl_bearssl_md5sum(unsigned char *input,
  724. size_t inputlen,
  725. unsigned char *md5sum,
  726. size_t md5len UNUSED_PARAM)
  727. {
  728. br_md5_context ctx;
  729. br_md5_init(&ctx);
  730. br_md5_update(&ctx, input, inputlen);
  731. br_md5_out(&ctx, md5sum);
  732. return CURLE_OK;
  733. }
  734. static CURLcode Curl_bearssl_sha256sum(const unsigned char *input,
  735. size_t inputlen,
  736. unsigned char *sha256sum,
  737. size_t sha256len UNUSED_PARAM)
  738. {
  739. br_sha256_context ctx;
  740. br_sha256_init(&ctx);
  741. br_sha256_update(&ctx, input, inputlen);
  742. br_sha256_out(&ctx, sha256sum);
  743. return CURLE_OK;
  744. }
  745. const struct Curl_ssl Curl_ssl_bearssl = {
  746. { CURLSSLBACKEND_BEARSSL, "bearssl" },
  747. 0,
  748. sizeof(struct ssl_backend_data),
  749. Curl_none_init,
  750. Curl_none_cleanup,
  751. Curl_bearssl_version,
  752. Curl_none_check_cxn,
  753. Curl_none_shutdown,
  754. Curl_bearssl_data_pending,
  755. Curl_bearssl_random,
  756. Curl_none_cert_status_request,
  757. Curl_bearssl_connect,
  758. Curl_bearssl_connect_nonblocking,
  759. Curl_bearssl_get_internals,
  760. Curl_bearssl_close,
  761. Curl_none_close_all,
  762. Curl_bearssl_session_free,
  763. Curl_none_set_engine,
  764. Curl_none_set_engine_default,
  765. Curl_none_engines_list,
  766. Curl_none_false_start,
  767. Curl_bearssl_md5sum,
  768. Curl_bearssl_sha256sum
  769. };
  770. #endif /* USE_BEARSSL */