mirror of
https://github.com/godotengine/godot.git
synced 2024-11-26 14:13:10 +00:00
fa33e0f62d
License is LGPLv2.1 + static linking exception, version is 2.4.1
977 lines
23 KiB
C
977 lines
23 KiB
C
/*
|
|
* libwebsockets - small server side websockets and web server implementation
|
|
*
|
|
* Copyright (C) 2010-2017 Andy Green <andy@warmcat.com>
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation:
|
|
* version 2.1 of the License.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
|
|
* MA 02110-1301 USA
|
|
*/
|
|
|
|
#include "private-libwebsockets.h"
|
|
|
|
/* workaround for mingw */
|
|
#if !defined(ECONNABORTED)
|
|
#define ECONNABORTED 103
|
|
#endif
|
|
|
|
int lws_alloc_vfs_file(struct lws_context *context, const char *filename, uint8_t **buf,
|
|
lws_filepos_t *amount)
|
|
{
|
|
lws_filepos_t len;
|
|
lws_fop_flags_t flags = LWS_O_RDONLY;
|
|
lws_fop_fd_t fops_fd = lws_vfs_file_open(
|
|
lws_get_fops(context), filename, &flags);
|
|
int ret = 1;
|
|
|
|
if (!fops_fd)
|
|
return 1;
|
|
|
|
len = lws_vfs_get_length(fops_fd);
|
|
|
|
*buf = lws_malloc((size_t)len, "lws_alloc_vfs_file");
|
|
if (!*buf)
|
|
goto bail;
|
|
|
|
if (lws_vfs_file_read(fops_fd, amount, *buf, len))
|
|
goto bail;
|
|
|
|
ret = 0;
|
|
bail:
|
|
lws_vfs_file_close(&fops_fd);
|
|
|
|
return ret;
|
|
}
|
|
|
|
#if defined(LWS_WITH_MBEDTLS)
|
|
#if defined(LWS_WITH_ESP32)
|
|
int alloc_file(struct lws_context *context, const char *filename, uint8_t **buf,
|
|
lws_filepos_t *amount)
|
|
{
|
|
nvs_handle nvh;
|
|
size_t s;
|
|
int n = 0;
|
|
|
|
ESP_ERROR_CHECK(nvs_open("lws-station", NVS_READWRITE, &nvh));
|
|
if (nvs_get_blob(nvh, filename, NULL, &s) != ESP_OK) {
|
|
n = 1;
|
|
goto bail;
|
|
}
|
|
*buf = lws_malloc(s, "alloc_file");
|
|
if (!*buf) {
|
|
n = 2;
|
|
goto bail;
|
|
}
|
|
if (nvs_get_blob(nvh, filename, (char *)*buf, &s) != ESP_OK) {
|
|
lws_free(*buf);
|
|
n = 1;
|
|
goto bail;
|
|
}
|
|
|
|
*amount = s;
|
|
|
|
bail:
|
|
nvs_close(nvh);
|
|
|
|
return n;
|
|
}
|
|
#else
|
|
int alloc_file(struct lws_context *context, const char *filename, uint8_t **buf,
|
|
lws_filepos_t *amount)
|
|
{
|
|
FILE *f;
|
|
size_t s;
|
|
int n = 0;
|
|
|
|
f = fopen(filename, "rb");
|
|
if (f == NULL) {
|
|
n = 1;
|
|
goto bail;
|
|
}
|
|
|
|
if (fseek(f, 0, SEEK_END) != 0) {
|
|
n = 1;
|
|
goto bail;
|
|
}
|
|
|
|
s = ftell(f);
|
|
if (s == -1) {
|
|
n = 1;
|
|
goto bail;
|
|
}
|
|
|
|
if (fseek(f, 0, SEEK_SET) != 0) {
|
|
n = 1;
|
|
goto bail;
|
|
}
|
|
|
|
*buf = lws_malloc(s, "alloc_file");
|
|
if (!*buf) {
|
|
n = 2;
|
|
goto bail;
|
|
}
|
|
|
|
if (fread(*buf, s, 1, f) != 1) {
|
|
lws_free(*buf);
|
|
n = 1;
|
|
goto bail;
|
|
}
|
|
|
|
*amount = s;
|
|
|
|
bail:
|
|
if (f)
|
|
fclose(f);
|
|
|
|
return n;
|
|
|
|
}
|
|
#endif
|
|
int alloc_pem_to_der_file(struct lws_context *context, const char *filename, uint8_t **buf,
|
|
lws_filepos_t *amount)
|
|
{
|
|
uint8_t *pem, *p, *q, *end;
|
|
lws_filepos_t len;
|
|
int n;
|
|
|
|
n = alloc_file(context, filename, &pem, &len);
|
|
if (n)
|
|
return n;
|
|
|
|
/* trim the first line */
|
|
|
|
p = pem;
|
|
end = p + len;
|
|
if (strncmp((char *)p, "-----", 5))
|
|
goto bail;
|
|
p += 5;
|
|
while (p < end && *p != '\n' && *p != '-')
|
|
p++;
|
|
|
|
if (*p != '-')
|
|
goto bail;
|
|
|
|
while (p < end && *p != '\n')
|
|
p++;
|
|
|
|
if (p >= end)
|
|
goto bail;
|
|
|
|
p++;
|
|
|
|
/* trim the last line */
|
|
|
|
q = end - 2;
|
|
|
|
while (q > pem && *q != '\n')
|
|
q--;
|
|
|
|
if (*q != '\n')
|
|
goto bail;
|
|
|
|
*q = '\0';
|
|
|
|
*amount = lws_b64_decode_string((char *)p, (char *)pem, len);
|
|
*buf = pem;
|
|
|
|
return 0;
|
|
|
|
bail:
|
|
lws_free(pem);
|
|
|
|
return 4;
|
|
}
|
|
#endif
|
|
|
|
int openssl_websocket_private_data_index,
|
|
openssl_SSL_CTX_private_data_index;
|
|
|
|
int lws_ssl_get_error(struct lws *wsi, int n)
|
|
{
|
|
int m;
|
|
|
|
if (!wsi->ssl)
|
|
return 99;
|
|
|
|
m = SSL_get_error(wsi->ssl, n);
|
|
lwsl_debug("%s: %p %d -> %d\n", __func__, wsi->ssl, n, m);
|
|
|
|
return m;
|
|
}
|
|
|
|
/* Copies a string describing the code returned by lws_ssl_get_error(),
|
|
* which may also contain system error information in the case of SSL_ERROR_SYSCALL,
|
|
* into buf up to len.
|
|
* Returns a pointer to buf.
|
|
*
|
|
* Note: the lws_ssl_get_error() code is *not* an error code that can be passed
|
|
* to ERR_error_string(),
|
|
*
|
|
* ret is the return value originally passed to lws_ssl_get_error(), needed to disambiguate
|
|
* SYS_ERROR_SYSCALL.
|
|
*
|
|
* See man page for SSL_get_error().
|
|
*
|
|
* Not thread safe, uses strerror()
|
|
*/
|
|
char* lws_ssl_get_error_string(int status, int ret, char *buf, size_t len) {
|
|
switch (status) {
|
|
case SSL_ERROR_NONE: return strncpy(buf, "SSL_ERROR_NONE", len);
|
|
case SSL_ERROR_ZERO_RETURN: return strncpy(buf, "SSL_ERROR_ZERO_RETURN", len);
|
|
case SSL_ERROR_WANT_READ: return strncpy(buf, "SSL_ERROR_WANT_READ", len);
|
|
case SSL_ERROR_WANT_WRITE: return strncpy(buf, "SSL_ERROR_WANT_WRITE", len);
|
|
case SSL_ERROR_WANT_CONNECT: return strncpy(buf, "SSL_ERROR_WANT_CONNECT", len);
|
|
case SSL_ERROR_WANT_ACCEPT: return strncpy(buf, "SSL_ERROR_WANT_ACCEPT", len);
|
|
case SSL_ERROR_WANT_X509_LOOKUP: return strncpy(buf, "SSL_ERROR_WANT_X509_LOOKUP", len);
|
|
case SSL_ERROR_SYSCALL:
|
|
switch (ret) {
|
|
case 0:
|
|
lws_snprintf(buf, len, "SSL_ERROR_SYSCALL: EOF");
|
|
return buf;
|
|
case -1:
|
|
#ifndef LWS_PLAT_OPTEE
|
|
lws_snprintf(buf, len, "SSL_ERROR_SYSCALL: %s", strerror(errno));
|
|
#else
|
|
lws_snprintf(buf, len, "SSL_ERROR_SYSCALL: %d", errno);
|
|
#endif
|
|
return buf;
|
|
default:
|
|
return strncpy(buf, "SSL_ERROR_SYSCALL", len);
|
|
}
|
|
case SSL_ERROR_SSL: return "SSL_ERROR_SSL";
|
|
default: return "SSL_ERROR_UNKNOWN";
|
|
}
|
|
}
|
|
|
|
void
|
|
lws_ssl_elaborate_error(void)
|
|
{
|
|
#if defined(LWS_WITH_MBEDTLS)
|
|
#else
|
|
char buf[256];
|
|
u_long err;
|
|
|
|
while ((err = ERR_get_error()) != 0) {
|
|
ERR_error_string_n(err, buf, sizeof(buf));
|
|
lwsl_info("*** %s\n", buf);
|
|
}
|
|
#endif
|
|
}
|
|
|
|
#if !defined(LWS_WITH_MBEDTLS)
|
|
|
|
static int
|
|
lws_context_init_ssl_pem_passwd_cb(char * buf, int size, int rwflag, void *userdata)
|
|
{
|
|
struct lws_context_creation_info * info =
|
|
(struct lws_context_creation_info *)userdata;
|
|
|
|
strncpy(buf, info->ssl_private_key_password, size);
|
|
buf[size - 1] = '\0';
|
|
|
|
return strlen(buf);
|
|
}
|
|
|
|
void
|
|
lws_ssl_bind_passphrase(SSL_CTX *ssl_ctx, struct lws_context_creation_info *info)
|
|
{
|
|
if (!info->ssl_private_key_password)
|
|
return;
|
|
/*
|
|
* password provided, set ssl callback and user data
|
|
* for checking password which will be trigered during
|
|
* SSL_CTX_use_PrivateKey_file function
|
|
*/
|
|
SSL_CTX_set_default_passwd_cb_userdata(ssl_ctx, (void *)info);
|
|
SSL_CTX_set_default_passwd_cb(ssl_ctx, lws_context_init_ssl_pem_passwd_cb);
|
|
}
|
|
#endif
|
|
|
|
int
|
|
lws_context_init_ssl_library(struct lws_context_creation_info *info)
|
|
{
|
|
#ifdef USE_WOLFSSL
|
|
#ifdef USE_OLD_CYASSL
|
|
lwsl_info(" Compiled with CyaSSL support\n");
|
|
#else
|
|
lwsl_info(" Compiled with wolfSSL support\n");
|
|
#endif
|
|
#else
|
|
#if defined(LWS_WITH_BORINGSSL)
|
|
lwsl_info(" Compiled with BoringSSL support\n");
|
|
#else
|
|
#if defined(LWS_WITH_MBEDTLS)
|
|
lwsl_info(" Compiled with MbedTLS support\n");
|
|
#else
|
|
lwsl_info(" Compiled with OpenSSL support\n");
|
|
#endif
|
|
#endif
|
|
#endif
|
|
if (!lws_check_opt(info->options, LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT)) {
|
|
lwsl_info(" SSL disabled: no LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT\n");
|
|
return 0;
|
|
}
|
|
|
|
/* basic openssl init */
|
|
|
|
lwsl_info("Doing SSL library init\n");
|
|
|
|
#if !defined(LWS_WITH_MBEDTLS)
|
|
SSL_library_init();
|
|
OpenSSL_add_all_algorithms();
|
|
SSL_load_error_strings();
|
|
|
|
openssl_websocket_private_data_index =
|
|
SSL_get_ex_new_index(0, "lws", NULL, NULL, NULL);
|
|
|
|
openssl_SSL_CTX_private_data_index = SSL_CTX_get_ex_new_index(0,
|
|
NULL, NULL, NULL, NULL);
|
|
#endif
|
|
|
|
return 0;
|
|
}
|
|
|
|
LWS_VISIBLE void
|
|
lws_ssl_destroy(struct lws_vhost *vhost)
|
|
{
|
|
if (!lws_check_opt(vhost->context->options,
|
|
LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT))
|
|
return;
|
|
|
|
if (vhost->ssl_ctx)
|
|
SSL_CTX_free(vhost->ssl_ctx);
|
|
if (!vhost->user_supplied_ssl_ctx && vhost->ssl_client_ctx)
|
|
SSL_CTX_free(vhost->ssl_client_ctx);
|
|
|
|
#if defined(LWS_WITH_MBEDTLS)
|
|
if (vhost->x509_client_CA)
|
|
X509_free(vhost->x509_client_CA);
|
|
#else
|
|
// after 1.1.0 no need
|
|
#if (OPENSSL_VERSION_NUMBER < 0x10100000)
|
|
// <= 1.0.1f = old api, 1.0.1g+ = new api
|
|
#if (OPENSSL_VERSION_NUMBER <= 0x1000106f) || defined(USE_WOLFSSL)
|
|
ERR_remove_state(0);
|
|
#else
|
|
#if OPENSSL_VERSION_NUMBER >= 0x1010005f && \
|
|
!defined(LIBRESSL_VERSION_NUMBER) && \
|
|
!defined(OPENSSL_IS_BORINGSSL)
|
|
ERR_remove_thread_state();
|
|
#else
|
|
ERR_remove_thread_state(NULL);
|
|
#endif
|
|
#endif
|
|
// after 1.1.0 no need
|
|
#if (OPENSSL_VERSION_NUMBER >= 0x10002000) && (OPENSSL_VERSION_NUMBER <= 0x10100000)
|
|
SSL_COMP_free_compression_methods();
|
|
#endif
|
|
ERR_free_strings();
|
|
EVP_cleanup();
|
|
CRYPTO_cleanup_all_ex_data();
|
|
#endif
|
|
#endif
|
|
}
|
|
|
|
int
|
|
lws_ssl_anybody_has_buffered_read_tsi(struct lws_context *context, int tsi)
|
|
{
|
|
struct lws_context_per_thread *pt = &context->pt[tsi];
|
|
struct lws *wsi, *wsi_next;
|
|
|
|
wsi = pt->pending_read_list;
|
|
while (wsi) {
|
|
wsi_next = wsi->pending_read_list_next;
|
|
pt->fds[wsi->position_in_fds_table].revents |=
|
|
pt->fds[wsi->position_in_fds_table].events & LWS_POLLIN;
|
|
if (pt->fds[wsi->position_in_fds_table].revents & LWS_POLLIN)
|
|
return 1;
|
|
|
|
wsi = wsi_next;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
LWS_VISIBLE void
|
|
lws_ssl_remove_wsi_from_buffered_list(struct lws *wsi)
|
|
{
|
|
struct lws_context *context = wsi->context;
|
|
struct lws_context_per_thread *pt = &context->pt[(int)wsi->tsi];
|
|
|
|
if (!wsi->pending_read_list_prev &&
|
|
!wsi->pending_read_list_next &&
|
|
pt->pending_read_list != wsi)
|
|
/* we are not on the list */
|
|
return;
|
|
|
|
/* point previous guy's next to our next */
|
|
if (!wsi->pending_read_list_prev)
|
|
pt->pending_read_list = wsi->pending_read_list_next;
|
|
else
|
|
wsi->pending_read_list_prev->pending_read_list_next =
|
|
wsi->pending_read_list_next;
|
|
|
|
/* point next guy's previous to our previous */
|
|
if (wsi->pending_read_list_next)
|
|
wsi->pending_read_list_next->pending_read_list_prev =
|
|
wsi->pending_read_list_prev;
|
|
|
|
wsi->pending_read_list_prev = NULL;
|
|
wsi->pending_read_list_next = NULL;
|
|
}
|
|
|
|
LWS_VISIBLE int
|
|
lws_ssl_capable_read(struct lws *wsi, unsigned char *buf, int len)
|
|
{
|
|
struct lws_context *context = wsi->context;
|
|
struct lws_context_per_thread *pt = &context->pt[(int)wsi->tsi];
|
|
int n = 0, m;
|
|
|
|
if (!wsi->ssl)
|
|
return lws_ssl_capable_read_no_ssl(wsi, buf, len);
|
|
|
|
lws_stats_atomic_bump(context, pt, LWSSTATS_C_API_READ, 1);
|
|
|
|
errno = 0;
|
|
n = SSL_read(wsi->ssl, buf, len);
|
|
#if defined(LWS_WITH_ESP32)
|
|
if (!n && errno == ENOTCONN) {
|
|
lwsl_debug("%p: SSL_read ENOTCONN\n", wsi);
|
|
return LWS_SSL_CAPABLE_ERROR;
|
|
}
|
|
#endif
|
|
#if defined(LWS_WITH_STATS)
|
|
if (!wsi->seen_rx) {
|
|
lws_stats_atomic_bump(wsi->context, pt, LWSSTATS_MS_SSL_RX_DELAY,
|
|
time_in_microseconds() - wsi->accept_start_us);
|
|
lws_stats_atomic_bump(wsi->context, pt, LWSSTATS_C_SSL_CONNS_HAD_RX, 1);
|
|
wsi->seen_rx = 1;
|
|
}
|
|
#endif
|
|
|
|
|
|
lwsl_debug("%p: SSL_read says %d\n", wsi, n);
|
|
/* manpage: returning 0 means connection shut down */
|
|
if (!n) {
|
|
wsi->socket_is_permanently_unusable = 1;
|
|
|
|
return LWS_SSL_CAPABLE_ERROR;
|
|
}
|
|
|
|
if (n < 0) {
|
|
m = lws_ssl_get_error(wsi, n);
|
|
lwsl_debug("%p: ssl err %d errno %d\n", wsi, m, errno);
|
|
if (m == SSL_ERROR_ZERO_RETURN ||
|
|
m == SSL_ERROR_SYSCALL)
|
|
return LWS_SSL_CAPABLE_ERROR;
|
|
|
|
if (SSL_want_read(wsi->ssl)) {
|
|
lwsl_debug("%s: WANT_READ\n", __func__);
|
|
lwsl_debug("%p: LWS_SSL_CAPABLE_MORE_SERVICE\n", wsi);
|
|
return LWS_SSL_CAPABLE_MORE_SERVICE;
|
|
}
|
|
if (SSL_want_write(wsi->ssl)) {
|
|
lwsl_debug("%s: WANT_WRITE\n", __func__);
|
|
lwsl_debug("%p: LWS_SSL_CAPABLE_MORE_SERVICE\n", wsi);
|
|
return LWS_SSL_CAPABLE_MORE_SERVICE;
|
|
}
|
|
wsi->socket_is_permanently_unusable = 1;
|
|
|
|
return LWS_SSL_CAPABLE_ERROR;
|
|
}
|
|
|
|
lws_stats_atomic_bump(context, pt, LWSSTATS_B_READ, n);
|
|
|
|
if (wsi->vhost)
|
|
wsi->vhost->conn_stats.rx += n;
|
|
|
|
lws_restart_ws_ping_pong_timer(wsi);
|
|
|
|
/*
|
|
* if it was our buffer that limited what we read,
|
|
* check if SSL has additional data pending inside SSL buffers.
|
|
*
|
|
* Because these won't signal at the network layer with POLLIN
|
|
* and if we don't realize, this data will sit there forever
|
|
*/
|
|
if (n != len)
|
|
goto bail;
|
|
if (!wsi->ssl)
|
|
goto bail;
|
|
|
|
if (!SSL_pending(wsi->ssl))
|
|
goto bail;
|
|
|
|
if (wsi->pending_read_list_next)
|
|
return n;
|
|
if (wsi->pending_read_list_prev)
|
|
return n;
|
|
if (pt->pending_read_list == wsi)
|
|
return n;
|
|
|
|
/* add us to the linked list of guys with pending ssl */
|
|
if (pt->pending_read_list)
|
|
pt->pending_read_list->pending_read_list_prev = wsi;
|
|
|
|
wsi->pending_read_list_next = pt->pending_read_list;
|
|
wsi->pending_read_list_prev = NULL;
|
|
pt->pending_read_list = wsi;
|
|
|
|
return n;
|
|
bail:
|
|
lws_ssl_remove_wsi_from_buffered_list(wsi);
|
|
|
|
return n;
|
|
}
|
|
|
|
LWS_VISIBLE int
|
|
lws_ssl_pending(struct lws *wsi)
|
|
{
|
|
if (!wsi->ssl)
|
|
return 0;
|
|
|
|
return SSL_pending(wsi->ssl);
|
|
}
|
|
|
|
LWS_VISIBLE int
|
|
lws_ssl_capable_write(struct lws *wsi, unsigned char *buf, int len)
|
|
{
|
|
int n, m;
|
|
|
|
if (!wsi->ssl)
|
|
return lws_ssl_capable_write_no_ssl(wsi, buf, len);
|
|
|
|
n = SSL_write(wsi->ssl, buf, len);
|
|
if (n > 0)
|
|
return n;
|
|
|
|
m = lws_ssl_get_error(wsi, n);
|
|
if (m != SSL_ERROR_SYSCALL) {
|
|
|
|
if (SSL_want_read(wsi->ssl)) {
|
|
lwsl_notice("%s: want read\n", __func__);
|
|
|
|
return LWS_SSL_CAPABLE_MORE_SERVICE;
|
|
}
|
|
|
|
if (SSL_want_write(wsi->ssl)) {
|
|
lws_set_blocking_send(wsi);
|
|
|
|
lwsl_notice("%s: want write\n", __func__);
|
|
|
|
return LWS_SSL_CAPABLE_MORE_SERVICE;
|
|
}
|
|
}
|
|
|
|
lwsl_debug("%s failed: %s\n",__func__, ERR_error_string(m, NULL));
|
|
lws_ssl_elaborate_error();
|
|
|
|
wsi->socket_is_permanently_unusable = 1;
|
|
|
|
return LWS_SSL_CAPABLE_ERROR;
|
|
}
|
|
|
|
static int
|
|
lws_gate_accepts(struct lws_context *context, int on)
|
|
{
|
|
struct lws_vhost *v = context->vhost_list;
|
|
|
|
lwsl_info("gating accepts %d\n", on);
|
|
context->ssl_gate_accepts = !on;
|
|
#if defined(LWS_WITH_STATS)
|
|
context->updated = 1;
|
|
#endif
|
|
|
|
while (v) {
|
|
if (v->use_ssl && v->lserv_wsi) /* gate ability to accept incoming connections */
|
|
if (lws_change_pollfd(v->lserv_wsi, (LWS_POLLIN) * !on,
|
|
(LWS_POLLIN) * on))
|
|
lwsl_info("Unable to set accept POLLIN %d\n", on);
|
|
|
|
v = v->vhost_next;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
void
|
|
lws_ssl_info_callback(const SSL *ssl, int where, int ret)
|
|
{
|
|
struct lws *wsi;
|
|
struct lws_context *context;
|
|
struct lws_ssl_info si;
|
|
|
|
context = (struct lws_context *)SSL_CTX_get_ex_data(
|
|
SSL_get_SSL_CTX(ssl),
|
|
openssl_SSL_CTX_private_data_index);
|
|
if (!context)
|
|
return;
|
|
wsi = wsi_from_fd(context, SSL_get_fd(ssl));
|
|
if (!wsi)
|
|
return;
|
|
|
|
if (!(where & wsi->vhost->ssl_info_event_mask))
|
|
return;
|
|
|
|
si.where = where;
|
|
si.ret = ret;
|
|
|
|
if (user_callback_handle_rxflow(wsi->protocol->callback,
|
|
wsi, LWS_CALLBACK_SSL_INFO,
|
|
wsi->user_space, &si, 0))
|
|
lws_set_timeout(wsi, PENDING_TIMEOUT_KILLED_BY_SSL_INFO, -1);
|
|
}
|
|
|
|
|
|
LWS_VISIBLE int
|
|
lws_ssl_close(struct lws *wsi)
|
|
{
|
|
lws_sockfd_type n;
|
|
|
|
if (!wsi->ssl)
|
|
return 0; /* not handled */
|
|
|
|
#if defined (LWS_HAVE_SSL_SET_INFO_CALLBACK)
|
|
/* kill ssl callbacks, becausse we will remove the fd from the
|
|
* table linking it to the wsi
|
|
*/
|
|
if (wsi->vhost->ssl_info_event_mask)
|
|
SSL_set_info_callback(wsi->ssl, NULL);
|
|
#endif
|
|
|
|
n = SSL_get_fd(wsi->ssl);
|
|
if (!wsi->socket_is_permanently_unusable)
|
|
SSL_shutdown(wsi->ssl);
|
|
compatible_close(n);
|
|
SSL_free(wsi->ssl);
|
|
wsi->ssl = NULL;
|
|
|
|
if (wsi->context->simultaneous_ssl_restriction &&
|
|
wsi->context->simultaneous_ssl-- ==
|
|
wsi->context->simultaneous_ssl_restriction)
|
|
/* we made space and can do an accept */
|
|
lws_gate_accepts(wsi->context, 1);
|
|
#if defined(LWS_WITH_STATS)
|
|
wsi->context->updated = 1;
|
|
#endif
|
|
|
|
return 1; /* handled */
|
|
}
|
|
|
|
/* leave all wsi close processing to the caller */
|
|
|
|
LWS_VISIBLE int
|
|
lws_server_socket_service_ssl(struct lws *wsi, lws_sockfd_type accept_fd)
|
|
{
|
|
struct lws_context *context = wsi->context;
|
|
struct lws_vhost *vh;
|
|
struct lws_context_per_thread *pt = &context->pt[(int)wsi->tsi];
|
|
int n, m;
|
|
#if !defined(USE_WOLFSSL) && !defined(LWS_WITH_MBEDTLS)
|
|
BIO *bio;
|
|
#endif
|
|
char buf[256];
|
|
|
|
(void)buf;
|
|
|
|
if (!LWS_SSL_ENABLED(wsi->vhost))
|
|
return 0;
|
|
|
|
switch (wsi->mode) {
|
|
case LWSCM_SSL_INIT:
|
|
case LWSCM_SSL_INIT_RAW:
|
|
if (wsi->ssl)
|
|
lwsl_err("%s: leaking ssl\n", __func__);
|
|
if (accept_fd == LWS_SOCK_INVALID)
|
|
assert(0);
|
|
if (context->simultaneous_ssl_restriction &&
|
|
context->simultaneous_ssl >= context->simultaneous_ssl_restriction) {
|
|
lwsl_notice("unable to deal with SSL connection\n");
|
|
return 1;
|
|
}
|
|
errno = 0;
|
|
wsi->ssl = SSL_new(wsi->vhost->ssl_ctx);
|
|
if (wsi->ssl == NULL) {
|
|
lwsl_err("SSL_new failed: %d (errno %d)\n",
|
|
lws_ssl_get_error(wsi, 0), errno);
|
|
|
|
lws_ssl_elaborate_error();
|
|
if (accept_fd != LWS_SOCK_INVALID)
|
|
compatible_close(accept_fd);
|
|
goto fail;
|
|
}
|
|
#if defined (LWS_HAVE_SSL_SET_INFO_CALLBACK)
|
|
if (wsi->vhost->ssl_info_event_mask)
|
|
SSL_set_info_callback(wsi->ssl, lws_ssl_info_callback);
|
|
#endif
|
|
if (context->simultaneous_ssl_restriction &&
|
|
++context->simultaneous_ssl == context->simultaneous_ssl_restriction)
|
|
/* that was the last allowed SSL connection */
|
|
lws_gate_accepts(context, 0);
|
|
#if defined(LWS_WITH_STATS)
|
|
context->updated = 1;
|
|
#endif
|
|
|
|
#if !defined(LWS_WITH_MBEDTLS)
|
|
SSL_set_ex_data(wsi->ssl,
|
|
openssl_websocket_private_data_index, wsi);
|
|
#endif
|
|
SSL_set_fd(wsi->ssl, accept_fd);
|
|
|
|
#ifdef USE_WOLFSSL
|
|
#ifdef USE_OLD_CYASSL
|
|
CyaSSL_set_using_nonblock(wsi->ssl, 1);
|
|
#else
|
|
wolfSSL_set_using_nonblock(wsi->ssl, 1);
|
|
#endif
|
|
#else
|
|
#if defined(LWS_WITH_MBEDTLS)
|
|
lws_plat_set_socket_options(wsi->vhost, accept_fd);
|
|
#else
|
|
SSL_set_mode(wsi->ssl, SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER);
|
|
bio = SSL_get_rbio(wsi->ssl);
|
|
if (bio)
|
|
BIO_set_nbio(bio, 1); /* nonblocking */
|
|
else
|
|
lwsl_notice("NULL rbio\n");
|
|
bio = SSL_get_wbio(wsi->ssl);
|
|
if (bio)
|
|
BIO_set_nbio(bio, 1); /* nonblocking */
|
|
else
|
|
lwsl_notice("NULL rbio\n");
|
|
#endif
|
|
#endif
|
|
|
|
/*
|
|
* we are not accepted yet, but we need to enter ourselves
|
|
* as a live connection. That way we can retry when more
|
|
* pieces come if we're not sorted yet
|
|
*/
|
|
|
|
if (wsi->mode == LWSCM_SSL_INIT)
|
|
wsi->mode = LWSCM_SSL_ACK_PENDING;
|
|
else
|
|
wsi->mode = LWSCM_SSL_ACK_PENDING_RAW;
|
|
|
|
if (insert_wsi_socket_into_fds(context, wsi)) {
|
|
lwsl_err("%s: failed to insert into fds\n", __func__);
|
|
goto fail;
|
|
}
|
|
|
|
lws_set_timeout(wsi, PENDING_TIMEOUT_SSL_ACCEPT,
|
|
context->timeout_secs);
|
|
|
|
lwsl_debug("inserted SSL accept into fds, trying SSL_accept\n");
|
|
|
|
/* fallthru */
|
|
|
|
case LWSCM_SSL_ACK_PENDING:
|
|
case LWSCM_SSL_ACK_PENDING_RAW:
|
|
if (lws_change_pollfd(wsi, LWS_POLLOUT, 0)) {
|
|
lwsl_err("%s: lws_change_pollfd failed\n", __func__);
|
|
goto fail;
|
|
}
|
|
|
|
lws_latency_pre(context, wsi);
|
|
|
|
if (wsi->vhost->allow_non_ssl_on_ssl_port) {
|
|
|
|
n = recv(wsi->desc.sockfd, (char *)pt->serv_buf,
|
|
context->pt_serv_buf_size, MSG_PEEK);
|
|
|
|
/*
|
|
* optionally allow non-SSL connect on SSL listening socket
|
|
* This is disabled by default, if enabled it goes around any
|
|
* SSL-level access control (eg, client-side certs) so leave
|
|
* it disabled unless you know it's not a problem for you
|
|
*/
|
|
|
|
if (n >= 1 && pt->serv_buf[0] >= ' ') {
|
|
/*
|
|
* TLS content-type for Handshake is 0x16, and
|
|
* for ChangeCipherSpec Record, it's 0x14
|
|
*
|
|
* A non-ssl session will start with the HTTP
|
|
* method in ASCII. If we see it's not a legit
|
|
* SSL handshake kill the SSL for this
|
|
* connection and try to handle as a HTTP
|
|
* connection upgrade directly.
|
|
*/
|
|
wsi->use_ssl = 0;
|
|
|
|
SSL_shutdown(wsi->ssl);
|
|
SSL_free(wsi->ssl);
|
|
wsi->ssl = NULL;
|
|
if (lws_check_opt(context->options,
|
|
LWS_SERVER_OPTION_REDIRECT_HTTP_TO_HTTPS))
|
|
wsi->redirect_to_https = 1;
|
|
goto accepted;
|
|
}
|
|
if (!n) /*
|
|
* connection is gone, or nothing to read
|
|
* if it's gone, we will timeout on
|
|
* PENDING_TIMEOUT_SSL_ACCEPT
|
|
*/
|
|
break;
|
|
if (n < 0 && (LWS_ERRNO == LWS_EAGAIN ||
|
|
LWS_ERRNO == LWS_EWOULDBLOCK)) {
|
|
/*
|
|
* well, we get no way to know ssl or not
|
|
* so go around again waiting for something
|
|
* to come and give us a hint, or timeout the
|
|
* connection.
|
|
*/
|
|
m = SSL_ERROR_WANT_READ;
|
|
goto go_again;
|
|
}
|
|
}
|
|
|
|
/* normal SSL connection processing path */
|
|
|
|
#if defined(LWS_WITH_STATS)
|
|
if (!wsi->accept_start_us)
|
|
wsi->accept_start_us = time_in_microseconds();
|
|
#endif
|
|
errno = 0;
|
|
lws_stats_atomic_bump(wsi->context, pt,
|
|
LWSSTATS_C_SSL_CONNECTIONS_ACCEPT_SPIN, 1);
|
|
n = SSL_accept(wsi->ssl);
|
|
lws_latency(context, wsi,
|
|
"SSL_accept LWSCM_SSL_ACK_PENDING\n", n, n == 1);
|
|
lwsl_info("SSL_accept says %d\n", n);
|
|
if (n == 1)
|
|
goto accepted;
|
|
|
|
m = lws_ssl_get_error(wsi, n);
|
|
|
|
#if defined(LWS_WITH_MBEDTLS)
|
|
if (m == SSL_ERROR_SYSCALL && errno == 11)
|
|
m = SSL_ERROR_WANT_READ;
|
|
#endif
|
|
if (m == SSL_ERROR_SYSCALL || m == SSL_ERROR_SSL)
|
|
goto failed;
|
|
|
|
go_again:
|
|
if (m == SSL_ERROR_WANT_READ || SSL_want_read(wsi->ssl)) {
|
|
if (lws_change_pollfd(wsi, 0, LWS_POLLIN)) {
|
|
lwsl_info("%s: WANT_READ change_pollfd failed\n", __func__);
|
|
goto fail;
|
|
}
|
|
|
|
lwsl_info("SSL_ERROR_WANT_READ\n");
|
|
break;
|
|
}
|
|
if (m == SSL_ERROR_WANT_WRITE || SSL_want_write(wsi->ssl)) {
|
|
lwsl_debug("%s: WANT_WRITE\n", __func__);
|
|
|
|
if (lws_change_pollfd(wsi, 0, LWS_POLLOUT)) {
|
|
lwsl_info("%s: WANT_WRITE change_pollfd failed\n", __func__);
|
|
goto fail;
|
|
}
|
|
|
|
break;
|
|
}
|
|
failed:
|
|
lws_stats_atomic_bump(wsi->context, pt,
|
|
LWSSTATS_C_SSL_CONNECTIONS_FAILED, 1);
|
|
lwsl_info("SSL_accept failed socket %u: %s\n", wsi->desc.sockfd,
|
|
lws_ssl_get_error_string(m, n, buf, sizeof(buf)));
|
|
lws_ssl_elaborate_error();
|
|
goto fail;
|
|
|
|
accepted:
|
|
lws_stats_atomic_bump(wsi->context, pt,
|
|
LWSSTATS_C_SSL_CONNECTIONS_ACCEPTED, 1);
|
|
#if defined(LWS_WITH_STATS)
|
|
lws_stats_atomic_bump(wsi->context, pt,
|
|
LWSSTATS_MS_SSL_CONNECTIONS_ACCEPTED_DELAY,
|
|
time_in_microseconds() - wsi->accept_start_us);
|
|
wsi->accept_start_us = time_in_microseconds();
|
|
#endif
|
|
|
|
/* adapt our vhost to match the SNI SSL_CTX that was chosen */
|
|
vh = context->vhost_list;
|
|
while (vh) {
|
|
if (!vh->being_destroyed &&
|
|
vh->ssl_ctx == SSL_get_SSL_CTX(wsi->ssl)) {
|
|
lwsl_info("setting wsi to vh %s\n", vh->name);
|
|
wsi->vhost = vh;
|
|
break;
|
|
}
|
|
vh = vh->vhost_next;
|
|
}
|
|
|
|
/* OK, we are accepted... give him some time to negotiate */
|
|
lws_set_timeout(wsi, PENDING_TIMEOUT_ESTABLISH_WITH_SERVER,
|
|
context->timeout_secs);
|
|
|
|
if (wsi->mode == LWSCM_SSL_ACK_PENDING_RAW)
|
|
wsi->mode = LWSCM_RAW;
|
|
else
|
|
wsi->mode = LWSCM_HTTP_SERVING;
|
|
#if defined(LWS_WITH_HTTP2)
|
|
if (lws_h2_configure_if_upgraded(wsi))
|
|
goto fail;
|
|
#endif
|
|
lwsl_debug("accepted new SSL conn\n");
|
|
break;
|
|
}
|
|
|
|
return 0;
|
|
|
|
fail:
|
|
return 1;
|
|
}
|
|
|
|
void
|
|
lws_ssl_SSL_CTX_destroy(struct lws_vhost *vhost)
|
|
{
|
|
if (vhost->ssl_ctx)
|
|
SSL_CTX_free(vhost->ssl_ctx);
|
|
|
|
if (!vhost->user_supplied_ssl_ctx && vhost->ssl_client_ctx)
|
|
SSL_CTX_free(vhost->ssl_client_ctx);
|
|
}
|
|
|
|
void
|
|
lws_ssl_context_destroy(struct lws_context *context)
|
|
{
|
|
|
|
#if !defined(LWS_WITH_MBEDTLS)
|
|
|
|
// after 1.1.0 no need
|
|
#if (OPENSSL_VERSION_NUMBER < 0x10100000)
|
|
// <= 1.0.1f = old api, 1.0.1g+ = new api
|
|
#if (OPENSSL_VERSION_NUMBER <= 0x1000106f) || defined(USE_WOLFSSL)
|
|
ERR_remove_state(0);
|
|
#else
|
|
#if OPENSSL_VERSION_NUMBER >= 0x1010005f && \
|
|
!defined(LIBRESSL_VERSION_NUMBER) && \
|
|
!defined(OPENSSL_IS_BORINGSSL)
|
|
ERR_remove_thread_state();
|
|
#else
|
|
ERR_remove_thread_state(NULL);
|
|
#endif
|
|
#endif
|
|
// after 1.1.0 no need
|
|
#if (OPENSSL_VERSION_NUMBER >= 0x10002000) && (OPENSSL_VERSION_NUMBER <= 0x10100000)
|
|
SSL_COMP_free_compression_methods();
|
|
#endif
|
|
ERR_free_strings();
|
|
EVP_cleanup();
|
|
CRYPTO_cleanup_all_ex_data();
|
|
#endif
|
|
#endif
|
|
}
|