mirror of
https://gitea.invidious.io/iv-org/litespeed-quic.git
synced 2024-08-15 00:53:43 +00:00
04f8f447b2
- [FEATURE] IETF Client 0-RTT support. - [BUGFIX] Do not schedule MTU probe on first tick. - [BUGFIX] Parsing DATAGRAM frame. - [BUGFIX] If push promise fails, do not invoke hset destructor. - [BUGFIX] Client: When connections are IDed by port number, check DCID. Fixes issue #176. - Revert the 2.22.1 lsquic_is_valid_hs_packet change. All that was necessary is a change to the way we call it in lsquic_engine. No change to the function itself is required.
201 lines
5 KiB
C
201 lines
5 KiB
C
/* Copyright (c) 2017 - 2020 LiteSpeed Technologies Inc. See LICENSE. */
|
|
#include <errno.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <sys/queue.h>
|
|
|
|
#include <openssl/pem.h>
|
|
#include <openssl/x509.h>
|
|
#include <openssl/ssl.h>
|
|
|
|
#include "lsquic_types.h"
|
|
#include "lsquic.h"
|
|
#include "../src/liblsquic/lsquic_logger.h"
|
|
#include "../src/liblsquic/lsquic_hash.h"
|
|
|
|
#include "test_cert.h"
|
|
|
|
|
|
static char s_alpn[0x100];
|
|
|
|
int
|
|
add_alpn (const char *alpn)
|
|
{
|
|
size_t alpn_len, all_len;
|
|
|
|
alpn_len = strlen(alpn);
|
|
if (alpn_len > 255)
|
|
return -1;
|
|
|
|
all_len = strlen(s_alpn);
|
|
if (all_len + 1 + alpn_len + 1 > sizeof(s_alpn))
|
|
return -1;
|
|
|
|
s_alpn[all_len] = alpn_len;
|
|
memcpy(&s_alpn[all_len + 1], alpn, alpn_len);
|
|
s_alpn[all_len + 1 + alpn_len] = '\0';
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int
|
|
select_alpn (SSL *ssl, const unsigned char **out, unsigned char *outlen,
|
|
const unsigned char *in, unsigned int inlen, void *arg)
|
|
{
|
|
int r;
|
|
|
|
r = SSL_select_next_proto((unsigned char **) out, outlen, in, inlen,
|
|
(unsigned char *) s_alpn, strlen(s_alpn));
|
|
if (r == OPENSSL_NPN_NEGOTIATED)
|
|
return SSL_TLSEXT_ERR_OK;
|
|
else
|
|
{
|
|
LSQ_WARN("no supported protocol can be selected from %.*s",
|
|
(int) inlen, (char *) in);
|
|
return SSL_TLSEXT_ERR_ALERT_FATAL;
|
|
}
|
|
}
|
|
|
|
|
|
|
|
int
|
|
load_cert (struct lsquic_hash *certs, const char *optarg)
|
|
{
|
|
int rv = -1;
|
|
char *sni, *cert_file, *key_file;
|
|
struct server_cert *cert = NULL;
|
|
EVP_PKEY *pkey = NULL;
|
|
FILE *f = NULL;
|
|
|
|
sni = strdup(optarg);
|
|
cert_file = strchr(sni, ',');
|
|
if (!cert_file)
|
|
goto end;
|
|
*cert_file = '\0';
|
|
++cert_file;
|
|
key_file = strchr(cert_file, ',');
|
|
if (!key_file)
|
|
goto end;
|
|
*key_file = '\0';
|
|
++key_file;
|
|
|
|
cert = calloc(1, sizeof(*cert));
|
|
cert->ce_sni = strdup(sni);
|
|
|
|
cert->ce_ssl_ctx = SSL_CTX_new(TLS_method());
|
|
if (!cert->ce_ssl_ctx)
|
|
{
|
|
LSQ_ERROR("SSL_CTX_new failed");
|
|
goto end;
|
|
}
|
|
SSL_CTX_set_min_proto_version(cert->ce_ssl_ctx, TLS1_3_VERSION);
|
|
SSL_CTX_set_max_proto_version(cert->ce_ssl_ctx, TLS1_3_VERSION);
|
|
SSL_CTX_set_default_verify_paths(cert->ce_ssl_ctx);
|
|
SSL_CTX_set_alpn_select_cb(cert->ce_ssl_ctx, select_alpn, NULL);
|
|
{
|
|
const char *const s = getenv("LSQUIC_ENABLE_EARLY_DATA");
|
|
if (!s || atoi(s))
|
|
SSL_CTX_set_early_data_enabled(cert->ce_ssl_ctx, 1); /* XXX */
|
|
}
|
|
if (1 != SSL_CTX_use_certificate_chain_file(cert->ce_ssl_ctx, cert_file))
|
|
{
|
|
LSQ_ERROR("SSL_CTX_use_certificate_chain_file failed: %s", cert_file);
|
|
goto end;
|
|
}
|
|
|
|
if (strstr(key_file, ".pkcs8"))
|
|
{
|
|
f = fopen(key_file, "r");
|
|
if (!f)
|
|
{
|
|
LSQ_ERROR("fopen(%s) failed: %s", cert_file, strerror(errno));
|
|
goto end;
|
|
}
|
|
pkey = d2i_PrivateKey_fp(f, NULL);
|
|
fclose(f);
|
|
f = NULL;
|
|
if (!pkey)
|
|
{
|
|
LSQ_ERROR("Reading private key from %s failed", key_file);
|
|
goto end;
|
|
}
|
|
if (!SSL_CTX_use_PrivateKey(cert->ce_ssl_ctx, pkey))
|
|
{
|
|
LSQ_ERROR("SSL_CTX_use_PrivateKey failed");
|
|
goto end;
|
|
}
|
|
}
|
|
else if (1 != SSL_CTX_use_PrivateKey_file(cert->ce_ssl_ctx, key_file,
|
|
SSL_FILETYPE_PEM))
|
|
{
|
|
LSQ_ERROR("SSL_CTX_use_PrivateKey_file failed");
|
|
goto end;
|
|
}
|
|
|
|
const int was = SSL_CTX_set_session_cache_mode(cert->ce_ssl_ctx, 1);
|
|
LSQ_DEBUG("set SSL session cache mode to 1 (was: %d)", was);
|
|
|
|
if (lsquic_hash_insert(certs, cert->ce_sni, strlen(cert->ce_sni), cert,
|
|
&cert->ce_hash_el))
|
|
rv = 0;
|
|
else
|
|
LSQ_WARN("cannot insert cert for %s into hash table", cert->ce_sni);
|
|
|
|
end:
|
|
free(sni);
|
|
if (rv != 0)
|
|
{ /* Error: free cert and its components */
|
|
if (cert)
|
|
{
|
|
free(cert->ce_sni);
|
|
free(cert);
|
|
}
|
|
}
|
|
return rv;
|
|
}
|
|
|
|
struct ssl_ctx_st *
|
|
lookup_cert (void *cert_lu_ctx, const struct sockaddr *sa_UNUSED,
|
|
const char *sni)
|
|
{
|
|
struct lsquic_hash_elem *el;
|
|
struct server_cert *server_cert;
|
|
|
|
if (!cert_lu_ctx)
|
|
return NULL;
|
|
|
|
if (sni)
|
|
el = lsquic_hash_find(cert_lu_ctx, sni, strlen(sni));
|
|
else
|
|
{
|
|
LSQ_INFO("SNI is not set");
|
|
el = lsquic_hash_first(cert_lu_ctx);
|
|
}
|
|
|
|
if (el)
|
|
{
|
|
server_cert = lsquic_hashelem_getdata(el);
|
|
if (server_cert)
|
|
return server_cert->ce_ssl_ctx;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
|
|
void
|
|
delete_certs (struct lsquic_hash *certs)
|
|
{
|
|
struct lsquic_hash_elem *el;
|
|
struct server_cert *cert;
|
|
|
|
for (el = lsquic_hash_first(certs); el; el = lsquic_hash_next(certs))
|
|
{
|
|
cert = lsquic_hashelem_getdata(el);
|
|
SSL_CTX_free(cert->ce_ssl_ctx);
|
|
free(cert->ce_sni);
|
|
free(cert);
|
|
}
|
|
lsquic_hash_destroy(certs);
|
|
}
|