2 * Copyright (c) 2002 - 2003
3 * NetGroup, Politecnico di Torino (Italy)
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the Politecnico di Torino nor the names of its
16 * contributors may be used to endorse or promote products derived from
17 * this software without specific prior written permission.
19 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
20 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
21 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
22 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
23 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
24 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
25 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
26 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
27 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
28 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
29 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
40 #include "portability.h"
44 static const char *ssl_keyfile
= ""; //!< file containing the private key in PEM format
45 static const char *ssl_certfile
= ""; //!< file containing the server's certificate in PEM format
46 static const char *ssl_rootfile
= ""; //!< file containing the list of CAs trusted by the client
47 // TODO: a way to set ssl_rootfile from the command line, or an envvar?
52 void ssl_set_certfile(const char *certfile
)
54 ssl_certfile
= certfile
;
57 void ssl_set_keyfile(const char *keyfile
)
59 ssl_keyfile
= keyfile
;
63 #pragma message("OPENSSL_VERSION_MAJOR is " _CRT_STRINGIZE(OPENSSL_VERSION_MAJOR))
66 #pragma message("OPENSSL_VERSION_MINOR is " _CRT_STRINGIZE(OPENSSL_VERSION_MINOR))
69 #pragma message("OPENSSL_VERSION_PATCH is " _CRT_STRINGIZE(OPENSSL_VERSION_PATCH))
72 #pragma message("OPENSSL_VERSION_PRE_RELEASE is " _CRT_STRINGIZE(OPENSSL_VERSION_PRE_RELEASE))
75 #pragma message("OPENSSL_VERSION_NUMBER is " _CRT_STRINGIZE(OPENSSL_VERSION_NUMBER))
78 int ssl_init_once(int is_server
, int enable_compression
, char *errbuf
, size_t errbuflen
)
80 static int inited
= 0;
84 * Avoid deprecated routines, even if they're still documented,
85 * as random versions of OpenSSL might not make them available.
86 * XXX - what's the minimum OpenSSL version we should support?
87 * And what about libressl?
89 #if defined(OPENSSL_VERSION_NUMBER) >= 0x10100000L
91 OPENSSL_init_ssl(0, NULL
);
92 OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS
| OPENSSL_INIT_LOAD_CRYPTO_STRINGS
, NULL
);
95 SSL_load_error_strings();
97 OpenSSL_add_ssl_algorithms();
98 if (enable_compression
)
99 SSL_COMP_get_compression_methods();
101 #if defined(OPENSSL_VERSION_NUMBER) >= 0x10100000L
103 SSL_METHOD
const *meth
=
104 is_server
? TLS_server_method() : TLS_client_method();
106 SSL_METHOD
const *meth
=
107 is_server
? SSLv23_server_method() : SSLv23_client_method();
109 ctx
= SSL_CTX_new(meth
);
112 snprintf(errbuf
, errbuflen
, "Cannot get a new SSL context: %s", ERR_error_string(ERR_get_error(), NULL
));
116 SSL_CTX_set_mode(ctx
, SSL_MODE_AUTO_RETRY
);
120 char const *certfile
= ssl_certfile
[0] ? ssl_certfile
: "cert.pem";
121 if (1 != SSL_CTX_use_certificate_file(ctx
, certfile
, SSL_FILETYPE_PEM
))
123 snprintf(errbuf
, errbuflen
, "Cannot read certificate file %s: %s", certfile
, ERR_error_string(ERR_get_error(), NULL
));
127 char const *keyfile
= ssl_keyfile
[0] ? ssl_keyfile
: "key.pem";
128 if (1 != SSL_CTX_use_PrivateKey_file(ctx
, keyfile
, SSL_FILETYPE_PEM
))
130 snprintf(errbuf
, errbuflen
, "Cannot read private key file %s: %s", keyfile
, ERR_error_string(ERR_get_error(), NULL
));
138 if (! SSL_CTX_load_verify_locations(ctx
, ssl_rootfile
, 0))
140 snprintf(errbuf
, errbuflen
, "Cannot read CA list from %s", ssl_rootfile
);
146 SSL_CTX_set_verify(ctx
, SSL_VERIFY_NONE
, NULL
);
151 if (! RAND_load_file(RANDOM
, 1024*1024))
153 snprintf(errbuf
, errbuflen
, "Cannot init random");
159 SSL_CTX_set_session_id_context(ctx
, (void *)&s_server_session_id_context
, sizeof(s_server_session_id_context
));
170 SSL
*ssl_promotion(int is_server
, SOCKET s
, char *errbuf
, size_t errbuflen
)
172 if (ssl_init_once(is_server
, 1, errbuf
, errbuflen
) < 0) {
176 SSL
*ssl
= SSL_new(ctx
); // TODO: also a DTLS context
177 SSL_set_fd(ssl
, (int)s
);
180 if (SSL_accept(ssl
) <= 0) {
181 snprintf(errbuf
, errbuflen
, "SSL_accept(): %s",
182 ERR_error_string(ERR_get_error(), NULL
));
186 if (SSL_connect(ssl
) <= 0) {
187 snprintf(errbuf
, errbuflen
, "SSL_connect(): %s",
188 ERR_error_string(ERR_get_error(), NULL
));
196 // Finish using an SSL handle; shut down the connection and free the
198 void ssl_finish(SSL
*ssl
)
201 // We won't be using this again, so we can just send the
202 // shutdown alert and free up the handle, and have our
203 // caller close the socket.
205 // XXX - presumably, if the connection is shut down on
206 // our side, either our peer won't have a problem sending
207 // their shutdown alert or will not treat such a problem
208 // as an error. If this causes errors to be reported,
209 // fix that as appropriate.
215 // Same return value as sock_send:
216 // 0 on OK, -1 on error but closed connection (-2).
217 int ssl_send(SSL
*ssl
, char const *buffer
, int size
, char *errbuf
, size_t errbuflen
)
219 int status
= SSL_write(ssl
, buffer
, size
);
222 // "SSL_write() will only return with success, when the complete contents (...) has been written."
227 int ssl_err
= SSL_get_error(ssl
, status
); // TODO: does it pop the error?
228 if (ssl_err
== SSL_ERROR_ZERO_RETURN
)
232 else if (ssl_err
== SSL_ERROR_SYSCALL
)
235 if (errno
== ECONNRESET
|| errno
== EPIPE
) return -2;
238 snprintf(errbuf
, errbuflen
, "SSL_write(): %s",
239 ERR_error_string(ERR_get_error(), NULL
));
244 // Returns the number of bytes read, or -1 on syserror, or -2 on SSL error.
245 int ssl_recv(SSL
*ssl
, char *buffer
, int size
, char *errbuf
, size_t errbuflen
)
247 int status
= SSL_read(ssl
, buffer
, size
);
250 int ssl_err
= SSL_get_error(ssl
, status
);
251 if (ssl_err
== SSL_ERROR_ZERO_RETURN
)
255 else if (ssl_err
== SSL_ERROR_SYSCALL
)
262 snprintf(errbuf
, errbuflen
, "SSL_read(): %s",
263 ERR_error_string(ERR_get_error(), NULL
));
273 #endif // HAVE_OPENSSL