xref: /aosp_15_r20/external/libwebsockets/lib/tls/mbedtls/mbedtls-server.c (revision 1c60b9aca93fdbc9b5f19b2d2194c91294b22281)
1*1c60b9acSAndroid Build Coastguard Worker /*
2*1c60b9acSAndroid Build Coastguard Worker  * libwebsockets - small server side websockets and web server implementation
3*1c60b9acSAndroid Build Coastguard Worker  *
4*1c60b9acSAndroid Build Coastguard Worker  * Copyright (C) 2010 - 2019 Andy Green <[email protected]>
5*1c60b9acSAndroid Build Coastguard Worker  *
6*1c60b9acSAndroid Build Coastguard Worker  * Permission is hereby granted, free of charge, to any person obtaining a copy
7*1c60b9acSAndroid Build Coastguard Worker  * of this software and associated documentation files (the "Software"), to
8*1c60b9acSAndroid Build Coastguard Worker  * deal in the Software without restriction, including without limitation the
9*1c60b9acSAndroid Build Coastguard Worker  * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
10*1c60b9acSAndroid Build Coastguard Worker  * sell copies of the Software, and to permit persons to whom the Software is
11*1c60b9acSAndroid Build Coastguard Worker  * furnished to do so, subject to the following conditions:
12*1c60b9acSAndroid Build Coastguard Worker  *
13*1c60b9acSAndroid Build Coastguard Worker  * The above copyright notice and this permission notice shall be included in
14*1c60b9acSAndroid Build Coastguard Worker  * all copies or substantial portions of the Software.
15*1c60b9acSAndroid Build Coastguard Worker  *
16*1c60b9acSAndroid Build Coastguard Worker  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17*1c60b9acSAndroid Build Coastguard Worker  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18*1c60b9acSAndroid Build Coastguard Worker  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
19*1c60b9acSAndroid Build Coastguard Worker  * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20*1c60b9acSAndroid Build Coastguard Worker  * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
21*1c60b9acSAndroid Build Coastguard Worker  * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
22*1c60b9acSAndroid Build Coastguard Worker  * IN THE SOFTWARE.
23*1c60b9acSAndroid Build Coastguard Worker  */
24*1c60b9acSAndroid Build Coastguard Worker 
25*1c60b9acSAndroid Build Coastguard Worker #include "private-lib-core.h"
26*1c60b9acSAndroid Build Coastguard Worker #include <mbedtls/x509_csr.h>
27*1c60b9acSAndroid Build Coastguard Worker #include <errno.h>
28*1c60b9acSAndroid Build Coastguard Worker 
29*1c60b9acSAndroid Build Coastguard Worker int
lws_tls_server_client_cert_verify_config(struct lws_vhost * vh)30*1c60b9acSAndroid Build Coastguard Worker lws_tls_server_client_cert_verify_config(struct lws_vhost *vh)
31*1c60b9acSAndroid Build Coastguard Worker {
32*1c60b9acSAndroid Build Coastguard Worker 	int verify_options = SSL_VERIFY_PEER;
33*1c60b9acSAndroid Build Coastguard Worker 
34*1c60b9acSAndroid Build Coastguard Worker 	/* as a server, are we requiring clients to identify themselves? */
35*1c60b9acSAndroid Build Coastguard Worker 	if (!lws_check_opt(vh->options,
36*1c60b9acSAndroid Build Coastguard Worker 			  LWS_SERVER_OPTION_REQUIRE_VALID_OPENSSL_CLIENT_CERT)) {
37*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("no client cert required\n");
38*1c60b9acSAndroid Build Coastguard Worker 		return 0;
39*1c60b9acSAndroid Build Coastguard Worker 	}
40*1c60b9acSAndroid Build Coastguard Worker 
41*1c60b9acSAndroid Build Coastguard Worker 	if (!lws_check_opt(vh->options, LWS_SERVER_OPTION_PEER_CERT_NOT_REQUIRED))
42*1c60b9acSAndroid Build Coastguard Worker 		verify_options = SSL_VERIFY_FAIL_IF_NO_PEER_CERT;
43*1c60b9acSAndroid Build Coastguard Worker 
44*1c60b9acSAndroid Build Coastguard Worker 	lwsl_notice("%s: vh %s requires client cert %d\n", __func__, vh->name,
45*1c60b9acSAndroid Build Coastguard Worker 		    verify_options);
46*1c60b9acSAndroid Build Coastguard Worker 
47*1c60b9acSAndroid Build Coastguard Worker 	SSL_CTX_set_verify(vh->tls.ssl_ctx, verify_options, NULL);
48*1c60b9acSAndroid Build Coastguard Worker 
49*1c60b9acSAndroid Build Coastguard Worker 	return 0;
50*1c60b9acSAndroid Build Coastguard Worker }
51*1c60b9acSAndroid Build Coastguard Worker 
52*1c60b9acSAndroid Build Coastguard Worker static int
lws_mbedtls_sni_cb(void * arg,mbedtls_ssl_context * mbedtls_ctx,const unsigned char * servername,size_t len)53*1c60b9acSAndroid Build Coastguard Worker lws_mbedtls_sni_cb(void *arg, mbedtls_ssl_context *mbedtls_ctx,
54*1c60b9acSAndroid Build Coastguard Worker 		   const unsigned char *servername, size_t len)
55*1c60b9acSAndroid Build Coastguard Worker {
56*1c60b9acSAndroid Build Coastguard Worker 	SSL *ssl = SSL_SSL_from_mbedtls_ssl_context(mbedtls_ctx);
57*1c60b9acSAndroid Build Coastguard Worker 	struct lws_context *context = (struct lws_context *)arg;
58*1c60b9acSAndroid Build Coastguard Worker 	struct lws_vhost *vhost, *vh;
59*1c60b9acSAndroid Build Coastguard Worker 
60*1c60b9acSAndroid Build Coastguard Worker 	lwsl_notice("%s: %s\n", __func__, servername);
61*1c60b9acSAndroid Build Coastguard Worker 
62*1c60b9acSAndroid Build Coastguard Worker 	/*
63*1c60b9acSAndroid Build Coastguard Worker 	 * We can only get ssl accepted connections by using a vhost's ssl_ctx
64*1c60b9acSAndroid Build Coastguard Worker 	 * find out which listening one took us and only match vhosts on the
65*1c60b9acSAndroid Build Coastguard Worker 	 * same port.
66*1c60b9acSAndroid Build Coastguard Worker 	 */
67*1c60b9acSAndroid Build Coastguard Worker 	vh = context->vhost_list;
68*1c60b9acSAndroid Build Coastguard Worker 	while (vh) {
69*1c60b9acSAndroid Build Coastguard Worker 		if (!vh->being_destroyed &&
70*1c60b9acSAndroid Build Coastguard Worker 		    vh->tls.ssl_ctx == SSL_get_SSL_CTX(ssl))
71*1c60b9acSAndroid Build Coastguard Worker 			break;
72*1c60b9acSAndroid Build Coastguard Worker 		vh = vh->vhost_next;
73*1c60b9acSAndroid Build Coastguard Worker 	}
74*1c60b9acSAndroid Build Coastguard Worker 
75*1c60b9acSAndroid Build Coastguard Worker 	if (!vh) {
76*1c60b9acSAndroid Build Coastguard Worker 		assert(vh); /* can't match the incoming vh? */
77*1c60b9acSAndroid Build Coastguard Worker 		return 0;
78*1c60b9acSAndroid Build Coastguard Worker 	}
79*1c60b9acSAndroid Build Coastguard Worker 
80*1c60b9acSAndroid Build Coastguard Worker 	vhost = lws_select_vhost(context, vh->listen_port,
81*1c60b9acSAndroid Build Coastguard Worker 				 (const char *)servername);
82*1c60b9acSAndroid Build Coastguard Worker 	if (!vhost) {
83*1c60b9acSAndroid Build Coastguard Worker 		lwsl_info("SNI: none: %s:%d\n", servername, vh->listen_port);
84*1c60b9acSAndroid Build Coastguard Worker 
85*1c60b9acSAndroid Build Coastguard Worker 		return 0;
86*1c60b9acSAndroid Build Coastguard Worker 	}
87*1c60b9acSAndroid Build Coastguard Worker 
88*1c60b9acSAndroid Build Coastguard Worker 	lwsl_info("SNI: Found: %s:%d at vhost '%s'\n", servername,
89*1c60b9acSAndroid Build Coastguard Worker 					vh->listen_port, vhost->name);
90*1c60b9acSAndroid Build Coastguard Worker 
91*1c60b9acSAndroid Build Coastguard Worker 	if (!vhost->tls.ssl_ctx) {
92*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("%s: vhost %s matches SNI but no valid cert\n",
93*1c60b9acSAndroid Build Coastguard Worker 				__func__, vh->name);
94*1c60b9acSAndroid Build Coastguard Worker 
95*1c60b9acSAndroid Build Coastguard Worker 		return 1;
96*1c60b9acSAndroid Build Coastguard Worker 	}
97*1c60b9acSAndroid Build Coastguard Worker 
98*1c60b9acSAndroid Build Coastguard Worker 	/* select the ssl ctx from the selected vhost for this conn */
99*1c60b9acSAndroid Build Coastguard Worker 	SSL_set_SSL_CTX(ssl, vhost->tls.ssl_ctx);
100*1c60b9acSAndroid Build Coastguard Worker 
101*1c60b9acSAndroid Build Coastguard Worker 	return 0;
102*1c60b9acSAndroid Build Coastguard Worker }
103*1c60b9acSAndroid Build Coastguard Worker 
104*1c60b9acSAndroid Build Coastguard Worker int
lws_tls_server_certs_load(struct lws_vhost * vhost,struct lws * wsi,const char * cert,const char * private_key,const char * mem_cert,size_t mem_cert_len,const char * mem_privkey,size_t mem_privkey_len)105*1c60b9acSAndroid Build Coastguard Worker lws_tls_server_certs_load(struct lws_vhost *vhost, struct lws *wsi,
106*1c60b9acSAndroid Build Coastguard Worker 			  const char *cert, const char *private_key,
107*1c60b9acSAndroid Build Coastguard Worker 			  const char *mem_cert, size_t mem_cert_len,
108*1c60b9acSAndroid Build Coastguard Worker 			  const char *mem_privkey, size_t mem_privkey_len)
109*1c60b9acSAndroid Build Coastguard Worker {
110*1c60b9acSAndroid Build Coastguard Worker 	lws_filepos_t flen;
111*1c60b9acSAndroid Build Coastguard Worker 	uint8_t *p = NULL;
112*1c60b9acSAndroid Build Coastguard Worker 	long err;
113*1c60b9acSAndroid Build Coastguard Worker 	int n;
114*1c60b9acSAndroid Build Coastguard Worker 
115*1c60b9acSAndroid Build Coastguard Worker 	if ((!cert || !private_key) && (!mem_cert || !mem_privkey)) {
116*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("%s: no usable input\n", __func__);
117*1c60b9acSAndroid Build Coastguard Worker 		return 0;
118*1c60b9acSAndroid Build Coastguard Worker 	}
119*1c60b9acSAndroid Build Coastguard Worker 
120*1c60b9acSAndroid Build Coastguard Worker 	n = (int)lws_tls_generic_cert_checks(vhost, cert, private_key);
121*1c60b9acSAndroid Build Coastguard Worker 
122*1c60b9acSAndroid Build Coastguard Worker 	if (n == LWS_TLS_EXTANT_NO && (!mem_cert || !mem_privkey))
123*1c60b9acSAndroid Build Coastguard Worker 		return 0;
124*1c60b9acSAndroid Build Coastguard Worker 
125*1c60b9acSAndroid Build Coastguard Worker 	/*
126*1c60b9acSAndroid Build Coastguard Worker 	 * we can't read the root-privs files.  But if mem_cert is provided,
127*1c60b9acSAndroid Build Coastguard Worker 	 * we should use that.
128*1c60b9acSAndroid Build Coastguard Worker 	 */
129*1c60b9acSAndroid Build Coastguard Worker 	if (n == LWS_TLS_EXTANT_NO)
130*1c60b9acSAndroid Build Coastguard Worker 		n = LWS_TLS_EXTANT_ALTERNATIVE;
131*1c60b9acSAndroid Build Coastguard Worker 
132*1c60b9acSAndroid Build Coastguard Worker 	if (n == LWS_TLS_EXTANT_ALTERNATIVE && (!mem_cert || !mem_privkey))
133*1c60b9acSAndroid Build Coastguard Worker 		return 1; /* no alternative */
134*1c60b9acSAndroid Build Coastguard Worker 
135*1c60b9acSAndroid Build Coastguard Worker 	if (n == LWS_TLS_EXTANT_ALTERNATIVE) {
136*1c60b9acSAndroid Build Coastguard Worker 		/*
137*1c60b9acSAndroid Build Coastguard Worker 		 * Although we have prepared update certs, we no longer have
138*1c60b9acSAndroid Build Coastguard Worker 		 * the rights to read our own cert + key we saved.
139*1c60b9acSAndroid Build Coastguard Worker 		 *
140*1c60b9acSAndroid Build Coastguard Worker 		 * If we were passed copies in memory buffers, use those
141*1c60b9acSAndroid Build Coastguard Worker 		 * instead.
142*1c60b9acSAndroid Build Coastguard Worker 		 *
143*1c60b9acSAndroid Build Coastguard Worker 		 * The passed memory-buffer cert image is in DER, and the
144*1c60b9acSAndroid Build Coastguard Worker 		 * memory-buffer private key image is PEM.
145*1c60b9acSAndroid Build Coastguard Worker 		 */
146*1c60b9acSAndroid Build Coastguard Worker 		cert = NULL;
147*1c60b9acSAndroid Build Coastguard Worker 		private_key = NULL;
148*1c60b9acSAndroid Build Coastguard Worker 	}
149*1c60b9acSAndroid Build Coastguard Worker 	if (lws_tls_alloc_pem_to_der_file(vhost->context, cert, mem_cert,
150*1c60b9acSAndroid Build Coastguard Worker 					  mem_cert_len, &p, &flen)) {
151*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("couldn't find cert file %s\n", cert);
152*1c60b9acSAndroid Build Coastguard Worker 
153*1c60b9acSAndroid Build Coastguard Worker 		return 1;
154*1c60b9acSAndroid Build Coastguard Worker 	}
155*1c60b9acSAndroid Build Coastguard Worker 
156*1c60b9acSAndroid Build Coastguard Worker 	err = SSL_CTX_use_certificate_ASN1(vhost->tls.ssl_ctx, (int)flen, p);
157*1c60b9acSAndroid Build Coastguard Worker 	lws_free_set_NULL(p);
158*1c60b9acSAndroid Build Coastguard Worker 	if (!err) {
159*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("Problem loading cert\n");
160*1c60b9acSAndroid Build Coastguard Worker 		return 1;
161*1c60b9acSAndroid Build Coastguard Worker 	}
162*1c60b9acSAndroid Build Coastguard Worker 
163*1c60b9acSAndroid Build Coastguard Worker 	if (lws_tls_alloc_pem_to_der_file(vhost->context, private_key,
164*1c60b9acSAndroid Build Coastguard Worker 					  (char *)mem_privkey, mem_privkey_len,
165*1c60b9acSAndroid Build Coastguard Worker 					  &p, &flen)) {
166*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("couldn't find private key\n");
167*1c60b9acSAndroid Build Coastguard Worker 
168*1c60b9acSAndroid Build Coastguard Worker 		return 1;
169*1c60b9acSAndroid Build Coastguard Worker 	}
170*1c60b9acSAndroid Build Coastguard Worker 
171*1c60b9acSAndroid Build Coastguard Worker 	err = SSL_CTX_use_PrivateKey_ASN1(0, vhost->tls.ssl_ctx, p, (long)flen);
172*1c60b9acSAndroid Build Coastguard Worker 	lws_free_set_NULL(p);
173*1c60b9acSAndroid Build Coastguard Worker 	if (!err) {
174*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("Problem loading key\n");
175*1c60b9acSAndroid Build Coastguard Worker 
176*1c60b9acSAndroid Build Coastguard Worker 		return 1;
177*1c60b9acSAndroid Build Coastguard Worker 	}
178*1c60b9acSAndroid Build Coastguard Worker 
179*1c60b9acSAndroid Build Coastguard Worker 	vhost->tls.skipped_certs = 0;
180*1c60b9acSAndroid Build Coastguard Worker 
181*1c60b9acSAndroid Build Coastguard Worker 	return 0;
182*1c60b9acSAndroid Build Coastguard Worker }
183*1c60b9acSAndroid Build Coastguard Worker 
184*1c60b9acSAndroid Build Coastguard Worker int
lws_tls_server_vhost_backend_init(const struct lws_context_creation_info * info,struct lws_vhost * vhost,struct lws * wsi)185*1c60b9acSAndroid Build Coastguard Worker lws_tls_server_vhost_backend_init(const struct lws_context_creation_info *info,
186*1c60b9acSAndroid Build Coastguard Worker 				  struct lws_vhost *vhost, struct lws *wsi)
187*1c60b9acSAndroid Build Coastguard Worker {
188*1c60b9acSAndroid Build Coastguard Worker 	const SSL_METHOD *method = TLS_server_method();
189*1c60b9acSAndroid Build Coastguard Worker 	uint8_t *p;
190*1c60b9acSAndroid Build Coastguard Worker 	lws_filepos_t flen;
191*1c60b9acSAndroid Build Coastguard Worker 	int n;
192*1c60b9acSAndroid Build Coastguard Worker 
193*1c60b9acSAndroid Build Coastguard Worker 	vhost->tls.ssl_ctx = SSL_CTX_new(method, &vhost->context->mcdc);	/* create context */
194*1c60b9acSAndroid Build Coastguard Worker 	if (!vhost->tls.ssl_ctx) {
195*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("problem creating ssl context\n");
196*1c60b9acSAndroid Build Coastguard Worker 		return 1;
197*1c60b9acSAndroid Build Coastguard Worker 	}
198*1c60b9acSAndroid Build Coastguard Worker 
199*1c60b9acSAndroid Build Coastguard Worker 	if (!vhost->tls.use_ssl ||
200*1c60b9acSAndroid Build Coastguard Worker 	    (!info->ssl_cert_filepath && !info->server_ssl_cert_mem))
201*1c60b9acSAndroid Build Coastguard Worker 		return 0;
202*1c60b9acSAndroid Build Coastguard Worker 
203*1c60b9acSAndroid Build Coastguard Worker 	if (info->ssl_ca_filepath) {
204*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("%s: vh %s: loading CA filepath %s\n", __func__,
205*1c60b9acSAndroid Build Coastguard Worker 			    vhost->name, info->ssl_ca_filepath);
206*1c60b9acSAndroid Build Coastguard Worker 		if (lws_tls_alloc_pem_to_der_file(vhost->context,
207*1c60b9acSAndroid Build Coastguard Worker 				info->ssl_ca_filepath, NULL, 0, &p, &flen)) {
208*1c60b9acSAndroid Build Coastguard Worker 			lwsl_err("couldn't find client CA file %s\n",
209*1c60b9acSAndroid Build Coastguard Worker 					info->ssl_ca_filepath);
210*1c60b9acSAndroid Build Coastguard Worker 
211*1c60b9acSAndroid Build Coastguard Worker 			return 1;
212*1c60b9acSAndroid Build Coastguard Worker 		}
213*1c60b9acSAndroid Build Coastguard Worker 
214*1c60b9acSAndroid Build Coastguard Worker 		if (SSL_CTX_add_client_CA_ASN1(vhost->tls.ssl_ctx, (int)flen, p) != 1) {
215*1c60b9acSAndroid Build Coastguard Worker 			lwsl_err("%s: SSL_CTX_add_client_CA_ASN1 unhappy\n",
216*1c60b9acSAndroid Build Coastguard Worker 				 __func__);
217*1c60b9acSAndroid Build Coastguard Worker 			free(p);
218*1c60b9acSAndroid Build Coastguard Worker 			return 1;
219*1c60b9acSAndroid Build Coastguard Worker 		}
220*1c60b9acSAndroid Build Coastguard Worker 		free(p);
221*1c60b9acSAndroid Build Coastguard Worker 	} else {
222*1c60b9acSAndroid Build Coastguard Worker 		if (info->server_ssl_ca_mem && info->server_ssl_ca_mem_len &&
223*1c60b9acSAndroid Build Coastguard Worker 		    SSL_CTX_add_client_CA_ASN1(vhost->tls.ssl_ctx,
224*1c60b9acSAndroid Build Coastguard Worker 					       (int)info->server_ssl_ca_mem_len,
225*1c60b9acSAndroid Build Coastguard Worker 					       info->server_ssl_ca_mem) != 1) {
226*1c60b9acSAndroid Build Coastguard Worker 			lwsl_err("%s: mem SSL_CTX_add_client_CA_ASN1 unhappy\n",
227*1c60b9acSAndroid Build Coastguard Worker 				 __func__);
228*1c60b9acSAndroid Build Coastguard Worker 			return 1;
229*1c60b9acSAndroid Build Coastguard Worker 		}
230*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("%s: vh %s: mem CA OK\n", __func__, vhost->name);
231*1c60b9acSAndroid Build Coastguard Worker 	}
232*1c60b9acSAndroid Build Coastguard Worker 
233*1c60b9acSAndroid Build Coastguard Worker 	n = lws_tls_server_certs_load(vhost, wsi, info->ssl_cert_filepath,
234*1c60b9acSAndroid Build Coastguard Worker 				      info->ssl_private_key_filepath,
235*1c60b9acSAndroid Build Coastguard Worker 				      info->server_ssl_cert_mem,
236*1c60b9acSAndroid Build Coastguard Worker 				      info->server_ssl_cert_mem_len,
237*1c60b9acSAndroid Build Coastguard Worker 				      info->server_ssl_private_key_mem,
238*1c60b9acSAndroid Build Coastguard Worker 				      info->server_ssl_private_key_mem_len);
239*1c60b9acSAndroid Build Coastguard Worker 	if (n)
240*1c60b9acSAndroid Build Coastguard Worker 		return n;
241*1c60b9acSAndroid Build Coastguard Worker 
242*1c60b9acSAndroid Build Coastguard Worker 	return 0;
243*1c60b9acSAndroid Build Coastguard Worker }
244*1c60b9acSAndroid Build Coastguard Worker 
245*1c60b9acSAndroid Build Coastguard Worker int
lws_tls_server_new_nonblocking(struct lws * wsi,lws_sockfd_type accept_fd)246*1c60b9acSAndroid Build Coastguard Worker lws_tls_server_new_nonblocking(struct lws *wsi, lws_sockfd_type accept_fd)
247*1c60b9acSAndroid Build Coastguard Worker {
248*1c60b9acSAndroid Build Coastguard Worker 	errno = 0;
249*1c60b9acSAndroid Build Coastguard Worker 	wsi->tls.ssl = SSL_new(wsi->a.vhost->tls.ssl_ctx);
250*1c60b9acSAndroid Build Coastguard Worker 	if (wsi->tls.ssl == NULL) {
251*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("SSL_new failed: errno %d\n", errno);
252*1c60b9acSAndroid Build Coastguard Worker 
253*1c60b9acSAndroid Build Coastguard Worker 		lws_tls_err_describe_clear();
254*1c60b9acSAndroid Build Coastguard Worker 		return 1;
255*1c60b9acSAndroid Build Coastguard Worker 	}
256*1c60b9acSAndroid Build Coastguard Worker 
257*1c60b9acSAndroid Build Coastguard Worker 	SSL_set_fd(wsi->tls.ssl, (int)accept_fd);
258*1c60b9acSAndroid Build Coastguard Worker 
259*1c60b9acSAndroid Build Coastguard Worker 	if (wsi->a.vhost->tls.ssl_info_event_mask)
260*1c60b9acSAndroid Build Coastguard Worker 		SSL_set_info_callback(wsi->tls.ssl, lws_ssl_info_callback);
261*1c60b9acSAndroid Build Coastguard Worker 
262*1c60b9acSAndroid Build Coastguard Worker 	SSL_set_sni_callback(wsi->tls.ssl, lws_mbedtls_sni_cb, wsi->a.context);
263*1c60b9acSAndroid Build Coastguard Worker 
264*1c60b9acSAndroid Build Coastguard Worker 	return 0;
265*1c60b9acSAndroid Build Coastguard Worker }
266*1c60b9acSAndroid Build Coastguard Worker 
267*1c60b9acSAndroid Build Coastguard Worker #if defined(LWS_AMAZON_RTOS)
268*1c60b9acSAndroid Build Coastguard Worker enum lws_ssl_capable_status
269*1c60b9acSAndroid Build Coastguard Worker #else
270*1c60b9acSAndroid Build Coastguard Worker int
271*1c60b9acSAndroid Build Coastguard Worker #endif
lws_tls_server_abort_connection(struct lws * wsi)272*1c60b9acSAndroid Build Coastguard Worker lws_tls_server_abort_connection(struct lws *wsi)
273*1c60b9acSAndroid Build Coastguard Worker {
274*1c60b9acSAndroid Build Coastguard Worker 	if (wsi->tls.use_ssl)
275*1c60b9acSAndroid Build Coastguard Worker 		__lws_tls_shutdown(wsi);
276*1c60b9acSAndroid Build Coastguard Worker 
277*1c60b9acSAndroid Build Coastguard Worker 	SSL_free(wsi->tls.ssl);
278*1c60b9acSAndroid Build Coastguard Worker 
279*1c60b9acSAndroid Build Coastguard Worker 	return 0;
280*1c60b9acSAndroid Build Coastguard Worker }
281*1c60b9acSAndroid Build Coastguard Worker 
282*1c60b9acSAndroid Build Coastguard Worker enum lws_ssl_capable_status
lws_tls_server_accept(struct lws * wsi)283*1c60b9acSAndroid Build Coastguard Worker lws_tls_server_accept(struct lws *wsi)
284*1c60b9acSAndroid Build Coastguard Worker {
285*1c60b9acSAndroid Build Coastguard Worker 	union lws_tls_cert_info_results ir;
286*1c60b9acSAndroid Build Coastguard Worker 	int m, n;
287*1c60b9acSAndroid Build Coastguard Worker 
288*1c60b9acSAndroid Build Coastguard Worker 	n = SSL_accept(wsi->tls.ssl);
289*1c60b9acSAndroid Build Coastguard Worker 
290*1c60b9acSAndroid Build Coastguard Worker 	wsi->skip_fallback = 1;
291*1c60b9acSAndroid Build Coastguard Worker 	if (n == 1) {
292*1c60b9acSAndroid Build Coastguard Worker 
293*1c60b9acSAndroid Build Coastguard Worker 		if (strstr(wsi->a.vhost->name, ".invalid")) {
294*1c60b9acSAndroid Build Coastguard Worker 			lwsl_notice("%s: vhost has .invalid, "
295*1c60b9acSAndroid Build Coastguard Worker 				    "rejecting accept\n", __func__);
296*1c60b9acSAndroid Build Coastguard Worker 
297*1c60b9acSAndroid Build Coastguard Worker 			return LWS_SSL_CAPABLE_ERROR;
298*1c60b9acSAndroid Build Coastguard Worker 		}
299*1c60b9acSAndroid Build Coastguard Worker 
300*1c60b9acSAndroid Build Coastguard Worker 		n = lws_tls_peer_cert_info(wsi, LWS_TLS_CERT_INFO_COMMON_NAME,
301*1c60b9acSAndroid Build Coastguard Worker 					   &ir, sizeof(ir.ns.name));
302*1c60b9acSAndroid Build Coastguard Worker 		if (!n)
303*1c60b9acSAndroid Build Coastguard Worker 			lwsl_notice("%s: client cert CN '%s'\n",
304*1c60b9acSAndroid Build Coastguard Worker 				    __func__, ir.ns.name);
305*1c60b9acSAndroid Build Coastguard Worker 		else
306*1c60b9acSAndroid Build Coastguard Worker 			lwsl_info("%s: couldn't get client cert CN\n",
307*1c60b9acSAndroid Build Coastguard Worker 				  __func__);
308*1c60b9acSAndroid Build Coastguard Worker 		return LWS_SSL_CAPABLE_DONE;
309*1c60b9acSAndroid Build Coastguard Worker 	}
310*1c60b9acSAndroid Build Coastguard Worker 
311*1c60b9acSAndroid Build Coastguard Worker 	m = SSL_get_error(wsi->tls.ssl, n);
312*1c60b9acSAndroid Build Coastguard Worker 	lwsl_debug("%s: %s: accept SSL_get_error %d errno %d\n", __func__,
313*1c60b9acSAndroid Build Coastguard Worker 		    lws_wsi_tag(wsi), m, errno);
314*1c60b9acSAndroid Build Coastguard Worker 
315*1c60b9acSAndroid Build Coastguard Worker 	// mbedtls wrapper only
316*1c60b9acSAndroid Build Coastguard Worker 	if (m == SSL_ERROR_SYSCALL && errno == 11)
317*1c60b9acSAndroid Build Coastguard Worker 		return LWS_SSL_CAPABLE_MORE_SERVICE_READ;
318*1c60b9acSAndroid Build Coastguard Worker 
319*1c60b9acSAndroid Build Coastguard Worker #if defined(__APPLE__)
320*1c60b9acSAndroid Build Coastguard Worker 	if (m == SSL_ERROR_SYSCALL && errno == 35)
321*1c60b9acSAndroid Build Coastguard Worker 		return LWS_SSL_CAPABLE_MORE_SERVICE_READ;
322*1c60b9acSAndroid Build Coastguard Worker #endif
323*1c60b9acSAndroid Build Coastguard Worker 
324*1c60b9acSAndroid Build Coastguard Worker #if defined(WIN32)
325*1c60b9acSAndroid Build Coastguard Worker 	if (m == SSL_ERROR_SYSCALL && errno == 0)
326*1c60b9acSAndroid Build Coastguard Worker 		return LWS_SSL_CAPABLE_MORE_SERVICE_READ;
327*1c60b9acSAndroid Build Coastguard Worker #endif
328*1c60b9acSAndroid Build Coastguard Worker 
329*1c60b9acSAndroid Build Coastguard Worker 	if (m == SSL_ERROR_SYSCALL || m == SSL_ERROR_SSL)
330*1c60b9acSAndroid Build Coastguard Worker 		return LWS_SSL_CAPABLE_ERROR;
331*1c60b9acSAndroid Build Coastguard Worker 
332*1c60b9acSAndroid Build Coastguard Worker 	if (m == SSL_ERROR_WANT_READ || SSL_want_read(wsi->tls.ssl)) {
333*1c60b9acSAndroid Build Coastguard Worker 		if (lws_change_pollfd(wsi, 0, LWS_POLLIN)) {
334*1c60b9acSAndroid Build Coastguard Worker 			lwsl_info("%s: WANT_READ change_pollfd failed\n",
335*1c60b9acSAndroid Build Coastguard Worker 				  __func__);
336*1c60b9acSAndroid Build Coastguard Worker 			return LWS_SSL_CAPABLE_ERROR;
337*1c60b9acSAndroid Build Coastguard Worker 		}
338*1c60b9acSAndroid Build Coastguard Worker 
339*1c60b9acSAndroid Build Coastguard Worker 		lwsl_info("SSL_ERROR_WANT_READ\n");
340*1c60b9acSAndroid Build Coastguard Worker 		return LWS_SSL_CAPABLE_MORE_SERVICE_READ;
341*1c60b9acSAndroid Build Coastguard Worker 	}
342*1c60b9acSAndroid Build Coastguard Worker 	if (m == SSL_ERROR_WANT_WRITE || SSL_want_write(wsi->tls.ssl)) {
343*1c60b9acSAndroid Build Coastguard Worker 		lwsl_debug("%s: WANT_WRITE\n", __func__);
344*1c60b9acSAndroid Build Coastguard Worker 
345*1c60b9acSAndroid Build Coastguard Worker 		if (lws_change_pollfd(wsi, 0, LWS_POLLOUT)) {
346*1c60b9acSAndroid Build Coastguard Worker 			lwsl_info("%s: WANT_WRITE change_pollfd failed\n",
347*1c60b9acSAndroid Build Coastguard Worker 				  __func__);
348*1c60b9acSAndroid Build Coastguard Worker 			return LWS_SSL_CAPABLE_ERROR;
349*1c60b9acSAndroid Build Coastguard Worker 		}
350*1c60b9acSAndroid Build Coastguard Worker 		return LWS_SSL_CAPABLE_MORE_SERVICE_WRITE;
351*1c60b9acSAndroid Build Coastguard Worker 	}
352*1c60b9acSAndroid Build Coastguard Worker 
353*1c60b9acSAndroid Build Coastguard Worker 	return LWS_SSL_CAPABLE_ERROR;
354*1c60b9acSAndroid Build Coastguard Worker }
355*1c60b9acSAndroid Build Coastguard Worker 
356*1c60b9acSAndroid Build Coastguard Worker #if defined(LWS_WITH_ACME)
357*1c60b9acSAndroid Build Coastguard Worker /*
358*1c60b9acSAndroid Build Coastguard Worker  * mbedtls doesn't support SAN for cert creation.  So we use a known-good
359*1c60b9acSAndroid Build Coastguard Worker  * tls-sni-01 cert from OpenSSL that worked on Let's Encrypt, and just replace
360*1c60b9acSAndroid Build Coastguard Worker  * the pubkey n part and the signature part.
361*1c60b9acSAndroid Build Coastguard Worker  *
362*1c60b9acSAndroid Build Coastguard Worker  * This will need redoing for tls-sni-02...
363*1c60b9acSAndroid Build Coastguard Worker  */
364*1c60b9acSAndroid Build Coastguard Worker 
365*1c60b9acSAndroid Build Coastguard Worker static uint8_t ss_cert_leadin[] = {
366*1c60b9acSAndroid Build Coastguard Worker 	0x30, 0x82,
367*1c60b9acSAndroid Build Coastguard Worker 	  0x05, 0x56, /* total length: LEN1 (+2 / +3) (correct for 513 + 512)*/
368*1c60b9acSAndroid Build Coastguard Worker 
369*1c60b9acSAndroid Build Coastguard Worker 	0x30, 0x82, /* length: LEN2  (+6 / +7) (correct for 513) */
370*1c60b9acSAndroid Build Coastguard Worker 		0x03, 0x3e,
371*1c60b9acSAndroid Build Coastguard Worker 
372*1c60b9acSAndroid Build Coastguard Worker 	/* addition: v3 cert (+5 bytes)*/
373*1c60b9acSAndroid Build Coastguard Worker 	0xa0, 0x03,
374*1c60b9acSAndroid Build Coastguard Worker 		0x02, 0x01, 0x02,
375*1c60b9acSAndroid Build Coastguard Worker 
376*1c60b9acSAndroid Build Coastguard Worker 	0x02, 0x01, 0x01,
377*1c60b9acSAndroid Build Coastguard Worker 	0x30, 0x0d, 0x06, 0x09, 0x2a,
378*1c60b9acSAndroid Build Coastguard Worker 	0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05, 0x00, 0x30, 0x3f,
379*1c60b9acSAndroid Build Coastguard Worker 	0x31, 0x0b, 0x30, 0x09, 0x06, 0x03, 0x55, 0x04, 0x06, 0x13, 0x02, 0x47,
380*1c60b9acSAndroid Build Coastguard Worker 	0x42, 0x31, 0x14, 0x30, 0x12, 0x06, 0x03, 0x55, 0x04, 0x0a, 0x0c, 0x0b,
381*1c60b9acSAndroid Build Coastguard Worker 	0x73, 0x6f, 0x6d, 0x65, 0x63, 0x6f, 0x6d, 0x70, 0x61, 0x6e, 0x79, 0x31,
382*1c60b9acSAndroid Build Coastguard Worker 	0x1a, 0x30, 0x18, 0x06, 0x03, 0x55, 0x04, 0x03, 0x0c, 0x11, 0x74, 0x65,
383*1c60b9acSAndroid Build Coastguard Worker 	0x6d, 0x70, 0x2e, 0x61, 0x63, 0x6d, 0x65, 0x2e, 0x69, 0x6e, 0x76, 0x61,
384*1c60b9acSAndroid Build Coastguard Worker 	0x6c, 0x69, 0x64, 0x30, 0x1e, 0x17, 0x0d,
385*1c60b9acSAndroid Build Coastguard Worker 
386*1c60b9acSAndroid Build Coastguard Worker 	/* from 2017-10-29 ... */
387*1c60b9acSAndroid Build Coastguard Worker 	0x31, 0x37, 0x31, 0x30, 0x32, 0x39, 0x31, 0x31, 0x34, 0x39, 0x34, 0x35,
388*1c60b9acSAndroid Build Coastguard Worker 	0x5a, 0x17, 0x0d,
389*1c60b9acSAndroid Build Coastguard Worker 
390*1c60b9acSAndroid Build Coastguard Worker 	/* thru 2049-10-29 we immediately discard the private key, no worries */
391*1c60b9acSAndroid Build Coastguard Worker 	0x34, 0x39, 0x31, 0x30, 0x32, 0x39, 0x31, 0x32, 0x34, 0x39, 0x34, 0x35,
392*1c60b9acSAndroid Build Coastguard Worker 	0x5a,
393*1c60b9acSAndroid Build Coastguard Worker 
394*1c60b9acSAndroid Build Coastguard Worker 	0x30, 0x3f, 0x31, 0x0b, 0x30, 0x09, 0x06, 0x03, 0x55, 0x04, 0x06, 0x13,
395*1c60b9acSAndroid Build Coastguard Worker 	0x02, 0x47, 0x42, 0x31, 0x14, 0x30, 0x12, 0x06, 0x03, 0x55, 0x04, 0x0a,
396*1c60b9acSAndroid Build Coastguard Worker 	0x0c, 0x0b, 0x73, 0x6f, 0x6d, 0x65, 0x63, 0x6f, 0x6d, 0x70, 0x61, 0x6e,
397*1c60b9acSAndroid Build Coastguard Worker 	0x79, 0x31, 0x1a, 0x30, 0x18, 0x06, 0x03, 0x55, 0x04, 0x03, 0x0c, 0x11,
398*1c60b9acSAndroid Build Coastguard Worker 	0x74, 0x65, 0x6d, 0x70, 0x2e, 0x61, 0x63, 0x6d, 0x65, 0x2e, 0x69, 0x6e,
399*1c60b9acSAndroid Build Coastguard Worker 	0x76, 0x61, 0x6c, 0x69, 0x64, 0x30,
400*1c60b9acSAndroid Build Coastguard Worker 
401*1c60b9acSAndroid Build Coastguard Worker 	0x82,
402*1c60b9acSAndroid Build Coastguard Worker 		0x02, 0x22, /* LEN3 (+C3 / C4) */
403*1c60b9acSAndroid Build Coastguard Worker 	0x30, 0x0d, 0x06,
404*1c60b9acSAndroid Build Coastguard Worker 	0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x01, 0x05, 0x00,
405*1c60b9acSAndroid Build Coastguard Worker 	0x03,
406*1c60b9acSAndroid Build Coastguard Worker 
407*1c60b9acSAndroid Build Coastguard Worker 	0x82,
408*1c60b9acSAndroid Build Coastguard Worker 		0x02, 0x0f, /* LEN4 (+D6 / D7) */
409*1c60b9acSAndroid Build Coastguard Worker 
410*1c60b9acSAndroid Build Coastguard Worker 	0x00, 0x30, 0x82,
411*1c60b9acSAndroid Build Coastguard Worker 
412*1c60b9acSAndroid Build Coastguard Worker 		0x02, 0x0a, /* LEN5 (+ DB / DC) */
413*1c60b9acSAndroid Build Coastguard Worker 
414*1c60b9acSAndroid Build Coastguard Worker 	0x02, 0x82,
415*1c60b9acSAndroid Build Coastguard Worker 
416*1c60b9acSAndroid Build Coastguard Worker 	//0x02, 0x01, /* length of n in bytes (including leading 00 if any) */
417*1c60b9acSAndroid Build Coastguard Worker 	},
418*1c60b9acSAndroid Build Coastguard Worker 
419*1c60b9acSAndroid Build Coastguard Worker 	/* 1 + (keybits / 8) bytes N */
420*1c60b9acSAndroid Build Coastguard Worker 
421*1c60b9acSAndroid Build Coastguard Worker 	ss_cert_san_leadin[] = {
422*1c60b9acSAndroid Build Coastguard Worker 		/* e - fixed */
423*1c60b9acSAndroid Build Coastguard Worker 		0x02, 0x03, 0x01, 0x00, 0x01,
424*1c60b9acSAndroid Build Coastguard Worker 
425*1c60b9acSAndroid Build Coastguard Worker 		0xa3, 0x5d, 0x30, 0x5b, 0x30, 0x59, 0x06, 0x03, 0x55, 0x1d,
426*1c60b9acSAndroid Build Coastguard Worker 		0x11, 0x04, 0x52, 0x30, 0x50, /* <-- SAN length + 2 */
427*1c60b9acSAndroid Build Coastguard Worker 
428*1c60b9acSAndroid Build Coastguard Worker 		0x82, 0x4e, /* <-- SAN length */
429*1c60b9acSAndroid Build Coastguard Worker 	},
430*1c60b9acSAndroid Build Coastguard Worker 
431*1c60b9acSAndroid Build Coastguard Worker 	/* 78 bytes of SAN (tls-sni-01)
432*1c60b9acSAndroid Build Coastguard Worker 	0x61, 0x64, 0x34, 0x31, 0x61, 0x66, 0x62, 0x65, 0x30, 0x63, 0x61, 0x34,
433*1c60b9acSAndroid Build Coastguard Worker 	0x36, 0x34, 0x32, 0x66, 0x30, 0x61, 0x34, 0x34, 0x39, 0x64, 0x39, 0x63,
434*1c60b9acSAndroid Build Coastguard Worker 	0x61, 0x37, 0x36, 0x65, 0x62, 0x61, 0x61, 0x62, 0x2e, 0x32, 0x38, 0x39,
435*1c60b9acSAndroid Build Coastguard Worker 	0x34, 0x64, 0x34, 0x31, 0x36, 0x63, 0x39, 0x38, 0x33, 0x66, 0x31, 0x32,
436*1c60b9acSAndroid Build Coastguard Worker 	0x65, 0x64, 0x37, 0x33, 0x31, 0x61, 0x33, 0x30, 0x66, 0x35, 0x63, 0x34,
437*1c60b9acSAndroid Build Coastguard Worker 	0x34, 0x37, 0x37, 0x66, 0x65, 0x2e, 0x61, 0x63, 0x6d, 0x65, 0x2e, 0x69,
438*1c60b9acSAndroid Build Coastguard Worker 	0x6e, 0x76, 0x61, 0x6c, 0x69, 0x64, */
439*1c60b9acSAndroid Build Coastguard Worker 
440*1c60b9acSAndroid Build Coastguard Worker 	/* end of LEN2 area */
441*1c60b9acSAndroid Build Coastguard Worker 
442*1c60b9acSAndroid Build Coastguard Worker 	ss_cert_sig_leadin[] = {
443*1c60b9acSAndroid Build Coastguard Worker 		/* it's saying that the signature is SHA256 + RSA */
444*1c60b9acSAndroid Build Coastguard Worker 		0x30, 0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d,
445*1c60b9acSAndroid Build Coastguard Worker 		0x01, 0x01, 0x0b, 0x05, 0x00, 0x03,
446*1c60b9acSAndroid Build Coastguard Worker 
447*1c60b9acSAndroid Build Coastguard Worker 		0x82,
448*1c60b9acSAndroid Build Coastguard Worker 			0x02, 0x01,
449*1c60b9acSAndroid Build Coastguard Worker 		0x00,
450*1c60b9acSAndroid Build Coastguard Worker 	};
451*1c60b9acSAndroid Build Coastguard Worker 
452*1c60b9acSAndroid Build Coastguard Worker 	/* (keybits / 8) bytes signature to end of LEN1 area */
453*1c60b9acSAndroid Build Coastguard Worker 
454*1c60b9acSAndroid Build Coastguard Worker #define SAN_A_LENGTH 78
455*1c60b9acSAndroid Build Coastguard Worker 
456*1c60b9acSAndroid Build Coastguard Worker int
lws_tls_acme_sni_cert_create(struct lws_vhost * vhost,const char * san_a,const char * san_b)457*1c60b9acSAndroid Build Coastguard Worker lws_tls_acme_sni_cert_create(struct lws_vhost *vhost, const char *san_a,
458*1c60b9acSAndroid Build Coastguard Worker 			     const char *san_b)
459*1c60b9acSAndroid Build Coastguard Worker {
460*1c60b9acSAndroid Build Coastguard Worker 	int buflen = 0x560;
461*1c60b9acSAndroid Build Coastguard Worker 	uint8_t *buf = lws_malloc((unsigned int)buflen, "tmp cert buf"), *p = buf, *pkey_asn1;
462*1c60b9acSAndroid Build Coastguard Worker 	struct lws_genrsa_ctx ctx;
463*1c60b9acSAndroid Build Coastguard Worker 	struct lws_gencrypto_keyelem el[LWS_GENCRYPTO_RSA_KEYEL_COUNT];
464*1c60b9acSAndroid Build Coastguard Worker 	uint8_t digest[32];
465*1c60b9acSAndroid Build Coastguard Worker 	struct lws_genhash_ctx hash_ctx;
466*1c60b9acSAndroid Build Coastguard Worker 	int pkey_asn1_len = 3 * 1024;
467*1c60b9acSAndroid Build Coastguard Worker 	int n, m, keybits = lws_plat_recommended_rsa_bits(), adj;
468*1c60b9acSAndroid Build Coastguard Worker 
469*1c60b9acSAndroid Build Coastguard Worker 	if (!buf)
470*1c60b9acSAndroid Build Coastguard Worker 		return 1;
471*1c60b9acSAndroid Build Coastguard Worker 
472*1c60b9acSAndroid Build Coastguard Worker 	n = lws_genrsa_new_keypair(vhost->context, &ctx, LGRSAM_PKCS1_1_5,
473*1c60b9acSAndroid Build Coastguard Worker 				   &el[0], keybits);
474*1c60b9acSAndroid Build Coastguard Worker 	if (n < 0) {
475*1c60b9acSAndroid Build Coastguard Worker 		lws_genrsa_destroy_elements(&el[0]);
476*1c60b9acSAndroid Build Coastguard Worker 		goto bail1;
477*1c60b9acSAndroid Build Coastguard Worker 	}
478*1c60b9acSAndroid Build Coastguard Worker 
479*1c60b9acSAndroid Build Coastguard Worker 	n = sizeof(ss_cert_leadin);
480*1c60b9acSAndroid Build Coastguard Worker 	memcpy(p, ss_cert_leadin, (unsigned int)n);
481*1c60b9acSAndroid Build Coastguard Worker 	p += n;
482*1c60b9acSAndroid Build Coastguard Worker 
483*1c60b9acSAndroid Build Coastguard Worker 	adj = (0x0556 - 0x401) + (keybits / 4) + 1;
484*1c60b9acSAndroid Build Coastguard Worker 	buf[2] = (uint8_t)(adj >> 8);
485*1c60b9acSAndroid Build Coastguard Worker 	buf[3] = (uint8_t)(adj & 0xff);
486*1c60b9acSAndroid Build Coastguard Worker 
487*1c60b9acSAndroid Build Coastguard Worker 	adj = (0x033e - 0x201) + (keybits / 8) + 1;
488*1c60b9acSAndroid Build Coastguard Worker 	buf[6] = (uint8_t)(adj >> 8);
489*1c60b9acSAndroid Build Coastguard Worker 	buf[7] = (uint8_t)(adj & 0xff);
490*1c60b9acSAndroid Build Coastguard Worker 
491*1c60b9acSAndroid Build Coastguard Worker 	adj = (0x0222 - 0x201) + (keybits / 8) + 1;
492*1c60b9acSAndroid Build Coastguard Worker 	buf[0xc3] = (uint8_t)(adj >> 8);
493*1c60b9acSAndroid Build Coastguard Worker 	buf[0xc4] = (uint8_t)(adj & 0xff);
494*1c60b9acSAndroid Build Coastguard Worker 
495*1c60b9acSAndroid Build Coastguard Worker 	adj = (0x020f - 0x201) + (keybits / 8) + 1;
496*1c60b9acSAndroid Build Coastguard Worker 	buf[0xd6] = (uint8_t)(adj >> 8);
497*1c60b9acSAndroid Build Coastguard Worker 	buf[0xd7] = (uint8_t)(adj & 0xff);
498*1c60b9acSAndroid Build Coastguard Worker 
499*1c60b9acSAndroid Build Coastguard Worker 	adj = (0x020a - 0x201) + (keybits / 8) + 1;
500*1c60b9acSAndroid Build Coastguard Worker 	buf[0xdb] = (uint8_t)(adj >> 8);
501*1c60b9acSAndroid Build Coastguard Worker 	buf[0xdc] = (uint8_t)(adj & 0xff);
502*1c60b9acSAndroid Build Coastguard Worker 
503*1c60b9acSAndroid Build Coastguard Worker 	*p++ = (uint8_t)(((keybits / 8) + 1) >> 8);
504*1c60b9acSAndroid Build Coastguard Worker 	*p++ = (uint8_t)(((keybits / 8) + 1) & 0xff);
505*1c60b9acSAndroid Build Coastguard Worker 
506*1c60b9acSAndroid Build Coastguard Worker 	/* we need to drop 1 + (keybits / 8) bytes of n in here, 00 + key */
507*1c60b9acSAndroid Build Coastguard Worker 
508*1c60b9acSAndroid Build Coastguard Worker 	*p++ = 0x00;
509*1c60b9acSAndroid Build Coastguard Worker 	memcpy(p, el[LWS_GENCRYPTO_RSA_KEYEL_N].buf, el[LWS_GENCRYPTO_RSA_KEYEL_N].len);
510*1c60b9acSAndroid Build Coastguard Worker 	p += el[LWS_GENCRYPTO_RSA_KEYEL_N].len;
511*1c60b9acSAndroid Build Coastguard Worker 
512*1c60b9acSAndroid Build Coastguard Worker 	memcpy(p, ss_cert_san_leadin, sizeof(ss_cert_san_leadin));
513*1c60b9acSAndroid Build Coastguard Worker 	p += sizeof(ss_cert_san_leadin);
514*1c60b9acSAndroid Build Coastguard Worker 
515*1c60b9acSAndroid Build Coastguard Worker 	/* drop in 78 bytes of san_a */
516*1c60b9acSAndroid Build Coastguard Worker 
517*1c60b9acSAndroid Build Coastguard Worker 	memcpy(p, san_a, SAN_A_LENGTH);
518*1c60b9acSAndroid Build Coastguard Worker 	p += SAN_A_LENGTH;
519*1c60b9acSAndroid Build Coastguard Worker 	memcpy(p, ss_cert_sig_leadin, sizeof(ss_cert_sig_leadin));
520*1c60b9acSAndroid Build Coastguard Worker 
521*1c60b9acSAndroid Build Coastguard Worker 	p[17] = (uint8_t)(((keybits / 8) + 1) >> 8);
522*1c60b9acSAndroid Build Coastguard Worker 	p[18] = (uint8_t)(((keybits / 8) + 1) & 0xff);
523*1c60b9acSAndroid Build Coastguard Worker 
524*1c60b9acSAndroid Build Coastguard Worker 	p += sizeof(ss_cert_sig_leadin);
525*1c60b9acSAndroid Build Coastguard Worker 
526*1c60b9acSAndroid Build Coastguard Worker 	/* hash the cert plaintext */
527*1c60b9acSAndroid Build Coastguard Worker 
528*1c60b9acSAndroid Build Coastguard Worker 	if (lws_genhash_init(&hash_ctx, LWS_GENHASH_TYPE_SHA256))
529*1c60b9acSAndroid Build Coastguard Worker 		goto bail2;
530*1c60b9acSAndroid Build Coastguard Worker 
531*1c60b9acSAndroid Build Coastguard Worker 	if (lws_genhash_update(&hash_ctx, buf, lws_ptr_diff_size_t(p, buf))) {
532*1c60b9acSAndroid Build Coastguard Worker 		lws_genhash_destroy(&hash_ctx, NULL);
533*1c60b9acSAndroid Build Coastguard Worker 
534*1c60b9acSAndroid Build Coastguard Worker 		goto bail2;
535*1c60b9acSAndroid Build Coastguard Worker 	}
536*1c60b9acSAndroid Build Coastguard Worker 	if (lws_genhash_destroy(&hash_ctx, digest))
537*1c60b9acSAndroid Build Coastguard Worker 		goto bail2;
538*1c60b9acSAndroid Build Coastguard Worker 
539*1c60b9acSAndroid Build Coastguard Worker 	/* sign the hash */
540*1c60b9acSAndroid Build Coastguard Worker 
541*1c60b9acSAndroid Build Coastguard Worker 	n = lws_genrsa_hash_sign(&ctx, digest, LWS_GENHASH_TYPE_SHA256, p,
542*1c60b9acSAndroid Build Coastguard Worker 				 (size_t)((size_t)buflen - lws_ptr_diff_size_t(p, buf)));
543*1c60b9acSAndroid Build Coastguard Worker 	if (n < 0)
544*1c60b9acSAndroid Build Coastguard Worker 		goto bail2;
545*1c60b9acSAndroid Build Coastguard Worker 	p += n;
546*1c60b9acSAndroid Build Coastguard Worker 
547*1c60b9acSAndroid Build Coastguard Worker 	pkey_asn1 = lws_malloc((unsigned int)pkey_asn1_len, "mbed crt tmp");
548*1c60b9acSAndroid Build Coastguard Worker 	if (!pkey_asn1)
549*1c60b9acSAndroid Build Coastguard Worker 		goto bail2;
550*1c60b9acSAndroid Build Coastguard Worker 
551*1c60b9acSAndroid Build Coastguard Worker 	m = lws_genrsa_render_pkey_asn1(&ctx, 1, pkey_asn1, (size_t)pkey_asn1_len);
552*1c60b9acSAndroid Build Coastguard Worker 	if (m < 0) {
553*1c60b9acSAndroid Build Coastguard Worker 		lws_free(pkey_asn1);
554*1c60b9acSAndroid Build Coastguard Worker 		goto bail2;
555*1c60b9acSAndroid Build Coastguard Worker 	}
556*1c60b9acSAndroid Build Coastguard Worker 
557*1c60b9acSAndroid Build Coastguard Worker //	lwsl_hexdump_level(LLL_DEBUG, buf, lws_ptr_diff(p, buf));
558*1c60b9acSAndroid Build Coastguard Worker 	n = SSL_CTX_use_certificate_ASN1(vhost->tls.ssl_ctx,
559*1c60b9acSAndroid Build Coastguard Worker 				 lws_ptr_diff(p, buf), buf);
560*1c60b9acSAndroid Build Coastguard Worker 	if (n != 1) {
561*1c60b9acSAndroid Build Coastguard Worker 		lws_free(pkey_asn1);
562*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("%s: generated cert failed to load 0x%x\n",
563*1c60b9acSAndroid Build Coastguard Worker 				__func__, -n);
564*1c60b9acSAndroid Build Coastguard Worker 	} else {
565*1c60b9acSAndroid Build Coastguard Worker 		//lwsl_debug("private key\n");
566*1c60b9acSAndroid Build Coastguard Worker 		//lwsl_hexdump_level(LLL_DEBUG, pkey_asn1, n);
567*1c60b9acSAndroid Build Coastguard Worker 
568*1c60b9acSAndroid Build Coastguard Worker 		/* and to use our generated private key */
569*1c60b9acSAndroid Build Coastguard Worker 		n = SSL_CTX_use_PrivateKey_ASN1(0, vhost->tls.ssl_ctx,
570*1c60b9acSAndroid Build Coastguard Worker 						pkey_asn1, m);
571*1c60b9acSAndroid Build Coastguard Worker 		lws_free(pkey_asn1);
572*1c60b9acSAndroid Build Coastguard Worker 		if (n != 1) {
573*1c60b9acSAndroid Build Coastguard Worker 			lwsl_err("%s: SSL_CTX_use_PrivateKey_ASN1 failed\n",
574*1c60b9acSAndroid Build Coastguard Worker 				    __func__);
575*1c60b9acSAndroid Build Coastguard Worker 		}
576*1c60b9acSAndroid Build Coastguard Worker 	}
577*1c60b9acSAndroid Build Coastguard Worker 
578*1c60b9acSAndroid Build Coastguard Worker 	lws_genrsa_destroy(&ctx);
579*1c60b9acSAndroid Build Coastguard Worker 	lws_genrsa_destroy_elements(&el[0]);
580*1c60b9acSAndroid Build Coastguard Worker 
581*1c60b9acSAndroid Build Coastguard Worker 	lws_free(buf);
582*1c60b9acSAndroid Build Coastguard Worker 
583*1c60b9acSAndroid Build Coastguard Worker 	return n != 1;
584*1c60b9acSAndroid Build Coastguard Worker 
585*1c60b9acSAndroid Build Coastguard Worker bail2:
586*1c60b9acSAndroid Build Coastguard Worker 	lws_genrsa_destroy(&ctx);
587*1c60b9acSAndroid Build Coastguard Worker 	lws_genrsa_destroy_elements(&el[0]);
588*1c60b9acSAndroid Build Coastguard Worker bail1:
589*1c60b9acSAndroid Build Coastguard Worker 	lws_free(buf);
590*1c60b9acSAndroid Build Coastguard Worker 
591*1c60b9acSAndroid Build Coastguard Worker 	return -1;
592*1c60b9acSAndroid Build Coastguard Worker }
593*1c60b9acSAndroid Build Coastguard Worker 
594*1c60b9acSAndroid Build Coastguard Worker void
lws_tls_acme_sni_cert_destroy(struct lws_vhost * vhost)595*1c60b9acSAndroid Build Coastguard Worker lws_tls_acme_sni_cert_destroy(struct lws_vhost *vhost)
596*1c60b9acSAndroid Build Coastguard Worker {
597*1c60b9acSAndroid Build Coastguard Worker }
598*1c60b9acSAndroid Build Coastguard Worker 
599*1c60b9acSAndroid Build Coastguard Worker #if defined(LWS_WITH_JOSE)
600*1c60b9acSAndroid Build Coastguard Worker static int
_rngf(void * context,unsigned char * buf,size_t len)601*1c60b9acSAndroid Build Coastguard Worker _rngf(void *context, unsigned char *buf, size_t len)
602*1c60b9acSAndroid Build Coastguard Worker {
603*1c60b9acSAndroid Build Coastguard Worker 	if ((size_t)lws_get_random(context, buf, len) == len)
604*1c60b9acSAndroid Build Coastguard Worker 		return 0;
605*1c60b9acSAndroid Build Coastguard Worker 
606*1c60b9acSAndroid Build Coastguard Worker 	return -1;
607*1c60b9acSAndroid Build Coastguard Worker }
608*1c60b9acSAndroid Build Coastguard Worker 
609*1c60b9acSAndroid Build Coastguard Worker static const char *x5[] = { "C", "ST", "L", "O", "CN" };
610*1c60b9acSAndroid Build Coastguard Worker 
611*1c60b9acSAndroid Build Coastguard Worker /*
612*1c60b9acSAndroid Build Coastguard Worker  * CSR is output formatted as b64url(DER)
613*1c60b9acSAndroid Build Coastguard Worker  * Private key is output as a PEM in memory
614*1c60b9acSAndroid Build Coastguard Worker  */
615*1c60b9acSAndroid Build Coastguard Worker int
lws_tls_acme_sni_csr_create(struct lws_context * context,const char * elements[],uint8_t * dcsr,size_t csr_len,char ** privkey_pem,size_t * privkey_len)616*1c60b9acSAndroid Build Coastguard Worker lws_tls_acme_sni_csr_create(struct lws_context *context, const char *elements[],
617*1c60b9acSAndroid Build Coastguard Worker 			    uint8_t *dcsr, size_t csr_len, char **privkey_pem,
618*1c60b9acSAndroid Build Coastguard Worker 			    size_t *privkey_len)
619*1c60b9acSAndroid Build Coastguard Worker {
620*1c60b9acSAndroid Build Coastguard Worker 	mbedtls_x509write_csr csr;
621*1c60b9acSAndroid Build Coastguard Worker 	mbedtls_pk_context mpk;
622*1c60b9acSAndroid Build Coastguard Worker 	int buf_size = 4096, n;
623*1c60b9acSAndroid Build Coastguard Worker 	char subject[200], *p = subject, *end = p + sizeof(subject) - 1;
624*1c60b9acSAndroid Build Coastguard Worker 	uint8_t *buf = malloc((unsigned int)buf_size); /* malloc because given to user code */
625*1c60b9acSAndroid Build Coastguard Worker 
626*1c60b9acSAndroid Build Coastguard Worker 	if (!buf)
627*1c60b9acSAndroid Build Coastguard Worker 		return -1;
628*1c60b9acSAndroid Build Coastguard Worker 
629*1c60b9acSAndroid Build Coastguard Worker 	mbedtls_x509write_csr_init(&csr);
630*1c60b9acSAndroid Build Coastguard Worker 
631*1c60b9acSAndroid Build Coastguard Worker 	mbedtls_pk_init(&mpk);
632*1c60b9acSAndroid Build Coastguard Worker 	if (mbedtls_pk_setup(&mpk, mbedtls_pk_info_from_type(MBEDTLS_PK_RSA))) {
633*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("%s: pk_setup failed\n", __func__);
634*1c60b9acSAndroid Build Coastguard Worker 		goto fail;
635*1c60b9acSAndroid Build Coastguard Worker 	}
636*1c60b9acSAndroid Build Coastguard Worker 
637*1c60b9acSAndroid Build Coastguard Worker 	n = mbedtls_rsa_gen_key(mbedtls_pk_rsa(mpk), _rngf, context,
638*1c60b9acSAndroid Build Coastguard Worker 				(unsigned int)lws_plat_recommended_rsa_bits(), 65537);
639*1c60b9acSAndroid Build Coastguard Worker 	if (n) {
640*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("%s: failed to generate keys\n", __func__);
641*1c60b9acSAndroid Build Coastguard Worker 
642*1c60b9acSAndroid Build Coastguard Worker 		goto fail1;
643*1c60b9acSAndroid Build Coastguard Worker 	}
644*1c60b9acSAndroid Build Coastguard Worker 
645*1c60b9acSAndroid Build Coastguard Worker 	/* subject must be formatted like "C=TW,O=warmcat,CN=myserver" */
646*1c60b9acSAndroid Build Coastguard Worker 
647*1c60b9acSAndroid Build Coastguard Worker 	for (n = 0; n < (int)LWS_ARRAY_SIZE(x5); n++) {
648*1c60b9acSAndroid Build Coastguard Worker 		if (p != subject)
649*1c60b9acSAndroid Build Coastguard Worker 			*p++ = ',';
650*1c60b9acSAndroid Build Coastguard Worker 		if (elements[n])
651*1c60b9acSAndroid Build Coastguard Worker 			p += lws_snprintf(p, lws_ptr_diff_size_t(end, p), "%s=%s", x5[n],
652*1c60b9acSAndroid Build Coastguard Worker 					  elements[n]);
653*1c60b9acSAndroid Build Coastguard Worker 	}
654*1c60b9acSAndroid Build Coastguard Worker 
655*1c60b9acSAndroid Build Coastguard Worker 	if (mbedtls_x509write_csr_set_subject_name(&csr, subject))
656*1c60b9acSAndroid Build Coastguard Worker 		goto fail1;
657*1c60b9acSAndroid Build Coastguard Worker 
658*1c60b9acSAndroid Build Coastguard Worker 	mbedtls_x509write_csr_set_key(&csr, &mpk);
659*1c60b9acSAndroid Build Coastguard Worker 	mbedtls_x509write_csr_set_md_alg(&csr, MBEDTLS_MD_SHA256);
660*1c60b9acSAndroid Build Coastguard Worker 
661*1c60b9acSAndroid Build Coastguard Worker 	/*
662*1c60b9acSAndroid Build Coastguard Worker 	 * data is written at the end of the buffer! Use the
663*1c60b9acSAndroid Build Coastguard Worker 	 * return value to determine where you should start
664*1c60b9acSAndroid Build Coastguard Worker 	 * using the buffer
665*1c60b9acSAndroid Build Coastguard Worker 	 */
666*1c60b9acSAndroid Build Coastguard Worker 	n = mbedtls_x509write_csr_der(&csr, buf, (size_t)buf_size, _rngf, context);
667*1c60b9acSAndroid Build Coastguard Worker 	if (n < 0) {
668*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("%s: write csr der failed\n", __func__);
669*1c60b9acSAndroid Build Coastguard Worker 		goto fail1;
670*1c60b9acSAndroid Build Coastguard Worker 	}
671*1c60b9acSAndroid Build Coastguard Worker 
672*1c60b9acSAndroid Build Coastguard Worker 	/* we have it in DER, we need it in b64URL */
673*1c60b9acSAndroid Build Coastguard Worker 
674*1c60b9acSAndroid Build Coastguard Worker 	n = lws_jws_base64_enc((char *)(buf + buf_size) - n, (size_t)n,
675*1c60b9acSAndroid Build Coastguard Worker 			       (char *)dcsr, csr_len);
676*1c60b9acSAndroid Build Coastguard Worker 	if (n < 0)
677*1c60b9acSAndroid Build Coastguard Worker 		goto fail1;
678*1c60b9acSAndroid Build Coastguard Worker 
679*1c60b9acSAndroid Build Coastguard Worker 	/*
680*1c60b9acSAndroid Build Coastguard Worker 	 * okay, the CSR is done, last we need the private key in PEM
681*1c60b9acSAndroid Build Coastguard Worker 	 * re-use the DER CSR buf as the result buffer since we cn do it in
682*1c60b9acSAndroid Build Coastguard Worker 	 * one step
683*1c60b9acSAndroid Build Coastguard Worker 	 */
684*1c60b9acSAndroid Build Coastguard Worker 
685*1c60b9acSAndroid Build Coastguard Worker 	if (mbedtls_pk_write_key_pem(&mpk, buf, (size_t)buf_size)) {
686*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("write key pem failed\n");
687*1c60b9acSAndroid Build Coastguard Worker 		goto fail1;
688*1c60b9acSAndroid Build Coastguard Worker 	}
689*1c60b9acSAndroid Build Coastguard Worker 
690*1c60b9acSAndroid Build Coastguard Worker 	*privkey_pem = (char *)buf;
691*1c60b9acSAndroid Build Coastguard Worker 	*privkey_len = strlen((const char *)buf);
692*1c60b9acSAndroid Build Coastguard Worker 
693*1c60b9acSAndroid Build Coastguard Worker 	mbedtls_pk_free(&mpk);
694*1c60b9acSAndroid Build Coastguard Worker 	mbedtls_x509write_csr_free(&csr);
695*1c60b9acSAndroid Build Coastguard Worker 
696*1c60b9acSAndroid Build Coastguard Worker 	return n;
697*1c60b9acSAndroid Build Coastguard Worker 
698*1c60b9acSAndroid Build Coastguard Worker fail1:
699*1c60b9acSAndroid Build Coastguard Worker 	mbedtls_pk_free(&mpk);
700*1c60b9acSAndroid Build Coastguard Worker fail:
701*1c60b9acSAndroid Build Coastguard Worker 	mbedtls_x509write_csr_free(&csr);
702*1c60b9acSAndroid Build Coastguard Worker 	free(buf);
703*1c60b9acSAndroid Build Coastguard Worker 
704*1c60b9acSAndroid Build Coastguard Worker 	return -1;
705*1c60b9acSAndroid Build Coastguard Worker }
706*1c60b9acSAndroid Build Coastguard Worker #endif
707*1c60b9acSAndroid Build Coastguard Worker #endif
708