xref: /aosp_15_r20/external/libwebsockets/lib/tls/openssl/openssl-server.c (revision 1c60b9aca93fdbc9b5f19b2d2194c91294b22281)
1*1c60b9acSAndroid Build Coastguard Worker /*
2*1c60b9acSAndroid Build Coastguard Worker  * libwebsockets - small server side websockets and web server implementation
3*1c60b9acSAndroid Build Coastguard Worker  *
4*1c60b9acSAndroid Build Coastguard Worker  * Copyright (C) 2010 - 2019 Andy Green <[email protected]>
5*1c60b9acSAndroid Build Coastguard Worker  *
6*1c60b9acSAndroid Build Coastguard Worker  * Permission is hereby granted, free of charge, to any person obtaining a copy
7*1c60b9acSAndroid Build Coastguard Worker  * of this software and associated documentation files (the "Software"), to
8*1c60b9acSAndroid Build Coastguard Worker  * deal in the Software without restriction, including without limitation the
9*1c60b9acSAndroid Build Coastguard Worker  * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
10*1c60b9acSAndroid Build Coastguard Worker  * sell copies of the Software, and to permit persons to whom the Software is
11*1c60b9acSAndroid Build Coastguard Worker  * furnished to do so, subject to the following conditions:
12*1c60b9acSAndroid Build Coastguard Worker  *
13*1c60b9acSAndroid Build Coastguard Worker  * The above copyright notice and this permission notice shall be included in
14*1c60b9acSAndroid Build Coastguard Worker  * all copies or substantial portions of the Software.
15*1c60b9acSAndroid Build Coastguard Worker  *
16*1c60b9acSAndroid Build Coastguard Worker  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17*1c60b9acSAndroid Build Coastguard Worker  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18*1c60b9acSAndroid Build Coastguard Worker  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
19*1c60b9acSAndroid Build Coastguard Worker  * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20*1c60b9acSAndroid Build Coastguard Worker  * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
21*1c60b9acSAndroid Build Coastguard Worker  * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
22*1c60b9acSAndroid Build Coastguard Worker  * IN THE SOFTWARE.
23*1c60b9acSAndroid Build Coastguard Worker  */
24*1c60b9acSAndroid Build Coastguard Worker 
25*1c60b9acSAndroid Build Coastguard Worker #include "private-lib-core.h"
26*1c60b9acSAndroid Build Coastguard Worker 
27*1c60b9acSAndroid Build Coastguard Worker /*
28*1c60b9acSAndroid Build Coastguard Worker  * Care: many openssl apis return 1 for success.  These are translated to the
29*1c60b9acSAndroid Build Coastguard Worker  * lws convention of 0 for success.
30*1c60b9acSAndroid Build Coastguard Worker  */
31*1c60b9acSAndroid Build Coastguard Worker 
32*1c60b9acSAndroid Build Coastguard Worker extern int openssl_websocket_private_data_index,
33*1c60b9acSAndroid Build Coastguard Worker 	   openssl_SSL_CTX_private_data_index;
34*1c60b9acSAndroid Build Coastguard Worker 
35*1c60b9acSAndroid Build Coastguard Worker int lws_openssl_describe_cipher(struct lws *wsi);
36*1c60b9acSAndroid Build Coastguard Worker 
37*1c60b9acSAndroid Build Coastguard Worker static int
OpenSSL_verify_callback(int preverify_ok,X509_STORE_CTX * x509_ctx)38*1c60b9acSAndroid Build Coastguard Worker OpenSSL_verify_callback(int preverify_ok, X509_STORE_CTX *x509_ctx)
39*1c60b9acSAndroid Build Coastguard Worker {
40*1c60b9acSAndroid Build Coastguard Worker 	SSL *ssl;
41*1c60b9acSAndroid Build Coastguard Worker 	int n;
42*1c60b9acSAndroid Build Coastguard Worker 	struct lws *wsi;
43*1c60b9acSAndroid Build Coastguard Worker 	union lws_tls_cert_info_results ir;
44*1c60b9acSAndroid Build Coastguard Worker 	X509 *topcert = X509_STORE_CTX_get_current_cert(x509_ctx);
45*1c60b9acSAndroid Build Coastguard Worker 
46*1c60b9acSAndroid Build Coastguard Worker 	ssl = X509_STORE_CTX_get_ex_data(x509_ctx,
47*1c60b9acSAndroid Build Coastguard Worker 		SSL_get_ex_data_X509_STORE_CTX_idx());
48*1c60b9acSAndroid Build Coastguard Worker 
49*1c60b9acSAndroid Build Coastguard Worker 	/*
50*1c60b9acSAndroid Build Coastguard Worker 	 * !!! nasty openssl requires the index to come as a library-scope
51*1c60b9acSAndroid Build Coastguard Worker 	 * static
52*1c60b9acSAndroid Build Coastguard Worker 	 */
53*1c60b9acSAndroid Build Coastguard Worker 	wsi = SSL_get_ex_data(ssl, openssl_websocket_private_data_index);
54*1c60b9acSAndroid Build Coastguard Worker 
55*1c60b9acSAndroid Build Coastguard Worker 	n = lws_tls_openssl_cert_info(topcert, LWS_TLS_CERT_INFO_COMMON_NAME,
56*1c60b9acSAndroid Build Coastguard Worker 				      &ir, sizeof(ir.ns.name));
57*1c60b9acSAndroid Build Coastguard Worker 	if (!n)
58*1c60b9acSAndroid Build Coastguard Worker 		lwsl_info("%s: client cert CN '%s'\n", __func__, ir.ns.name);
59*1c60b9acSAndroid Build Coastguard Worker 	else
60*1c60b9acSAndroid Build Coastguard Worker 		lwsl_info("%s: couldn't get client cert CN\n", __func__);
61*1c60b9acSAndroid Build Coastguard Worker 
62*1c60b9acSAndroid Build Coastguard Worker 	n = wsi->a.vhost->protocols[0].callback(wsi,
63*1c60b9acSAndroid Build Coastguard Worker 			LWS_CALLBACK_OPENSSL_PERFORM_CLIENT_CERT_VERIFICATION,
64*1c60b9acSAndroid Build Coastguard Worker 					   x509_ctx, ssl, (unsigned int)preverify_ok);
65*1c60b9acSAndroid Build Coastguard Worker 
66*1c60b9acSAndroid Build Coastguard Worker 	/* convert return code from 0 = OK to 1 = OK */
67*1c60b9acSAndroid Build Coastguard Worker 	return !n;
68*1c60b9acSAndroid Build Coastguard Worker }
69*1c60b9acSAndroid Build Coastguard Worker 
70*1c60b9acSAndroid Build Coastguard Worker int
lws_tls_server_client_cert_verify_config(struct lws_vhost * vh)71*1c60b9acSAndroid Build Coastguard Worker lws_tls_server_client_cert_verify_config(struct lws_vhost *vh)
72*1c60b9acSAndroid Build Coastguard Worker {
73*1c60b9acSAndroid Build Coastguard Worker 	int verify_options = SSL_VERIFY_PEER;
74*1c60b9acSAndroid Build Coastguard Worker 
75*1c60b9acSAndroid Build Coastguard Worker 	/* as a server, are we requiring clients to identify themselves? */
76*1c60b9acSAndroid Build Coastguard Worker 
77*1c60b9acSAndroid Build Coastguard Worker 	if (!lws_check_opt(vh->options,
78*1c60b9acSAndroid Build Coastguard Worker 			  LWS_SERVER_OPTION_REQUIRE_VALID_OPENSSL_CLIENT_CERT))
79*1c60b9acSAndroid Build Coastguard Worker 		return 0;
80*1c60b9acSAndroid Build Coastguard Worker 
81*1c60b9acSAndroid Build Coastguard Worker 	if (!lws_check_opt(vh->options,
82*1c60b9acSAndroid Build Coastguard Worker 			   LWS_SERVER_OPTION_PEER_CERT_NOT_REQUIRED))
83*1c60b9acSAndroid Build Coastguard Worker 		verify_options |= SSL_VERIFY_FAIL_IF_NO_PEER_CERT;
84*1c60b9acSAndroid Build Coastguard Worker 
85*1c60b9acSAndroid Build Coastguard Worker 	SSL_CTX_set_session_id_context(vh->tls.ssl_ctx, (uint8_t *)vh->context,
86*1c60b9acSAndroid Build Coastguard Worker 				       sizeof(void *));
87*1c60b9acSAndroid Build Coastguard Worker 
88*1c60b9acSAndroid Build Coastguard Worker 	/* absolutely require the client cert */
89*1c60b9acSAndroid Build Coastguard Worker 	SSL_CTX_set_verify(vh->tls.ssl_ctx, verify_options,
90*1c60b9acSAndroid Build Coastguard Worker 			   OpenSSL_verify_callback);
91*1c60b9acSAndroid Build Coastguard Worker 
92*1c60b9acSAndroid Build Coastguard Worker 	return 0;
93*1c60b9acSAndroid Build Coastguard Worker }
94*1c60b9acSAndroid Build Coastguard Worker 
95*1c60b9acSAndroid Build Coastguard Worker #if defined(SSL_TLSEXT_ERR_NOACK) && !defined(OPENSSL_NO_TLSEXT)
96*1c60b9acSAndroid Build Coastguard Worker static int
lws_ssl_server_name_cb(SSL * ssl,int * ad,void * arg)97*1c60b9acSAndroid Build Coastguard Worker lws_ssl_server_name_cb(SSL *ssl, int *ad, void *arg)
98*1c60b9acSAndroid Build Coastguard Worker {
99*1c60b9acSAndroid Build Coastguard Worker 	struct lws_context *context = (struct lws_context *)arg;
100*1c60b9acSAndroid Build Coastguard Worker 	struct lws_vhost *vhost, *vh;
101*1c60b9acSAndroid Build Coastguard Worker 	const char *servername;
102*1c60b9acSAndroid Build Coastguard Worker 
103*1c60b9acSAndroid Build Coastguard Worker 	if (!ssl)
104*1c60b9acSAndroid Build Coastguard Worker 		return SSL_TLSEXT_ERR_NOACK;
105*1c60b9acSAndroid Build Coastguard Worker 
106*1c60b9acSAndroid Build Coastguard Worker 	/*
107*1c60b9acSAndroid Build Coastguard Worker 	 * We can only get ssl accepted connections by using a vhost's ssl_ctx
108*1c60b9acSAndroid Build Coastguard Worker 	 * find out which listening one took us and only match vhosts on the
109*1c60b9acSAndroid Build Coastguard Worker 	 * same port.
110*1c60b9acSAndroid Build Coastguard Worker 	 */
111*1c60b9acSAndroid Build Coastguard Worker 	vh = context->vhost_list;
112*1c60b9acSAndroid Build Coastguard Worker 	while (vh) {
113*1c60b9acSAndroid Build Coastguard Worker 		if (!vh->being_destroyed &&
114*1c60b9acSAndroid Build Coastguard Worker 		    vh->tls.ssl_ctx == SSL_get_SSL_CTX(ssl))
115*1c60b9acSAndroid Build Coastguard Worker 			break;
116*1c60b9acSAndroid Build Coastguard Worker 		vh = vh->vhost_next;
117*1c60b9acSAndroid Build Coastguard Worker 	}
118*1c60b9acSAndroid Build Coastguard Worker 
119*1c60b9acSAndroid Build Coastguard Worker 	if (!vh) {
120*1c60b9acSAndroid Build Coastguard Worker 		assert(vh); /* can't match the incoming vh? */
121*1c60b9acSAndroid Build Coastguard Worker 		return SSL_TLSEXT_ERR_OK;
122*1c60b9acSAndroid Build Coastguard Worker 	}
123*1c60b9acSAndroid Build Coastguard Worker 
124*1c60b9acSAndroid Build Coastguard Worker 	servername = SSL_get_servername(ssl, TLSEXT_NAMETYPE_host_name);
125*1c60b9acSAndroid Build Coastguard Worker 	if (!servername) {
126*1c60b9acSAndroid Build Coastguard Worker 		/* the client doesn't know what hostname it wants */
127*1c60b9acSAndroid Build Coastguard Worker 		lwsl_info("SNI: Unknown ServerName\n");
128*1c60b9acSAndroid Build Coastguard Worker 
129*1c60b9acSAndroid Build Coastguard Worker 		return SSL_TLSEXT_ERR_OK;
130*1c60b9acSAndroid Build Coastguard Worker 	}
131*1c60b9acSAndroid Build Coastguard Worker 
132*1c60b9acSAndroid Build Coastguard Worker 	vhost = lws_select_vhost(context, vh->listen_port, servername);
133*1c60b9acSAndroid Build Coastguard Worker 	if (!vhost) {
134*1c60b9acSAndroid Build Coastguard Worker 		lwsl_info("SNI: none: %s:%d\n", servername, vh->listen_port);
135*1c60b9acSAndroid Build Coastguard Worker 
136*1c60b9acSAndroid Build Coastguard Worker 		return SSL_TLSEXT_ERR_OK;
137*1c60b9acSAndroid Build Coastguard Worker 	}
138*1c60b9acSAndroid Build Coastguard Worker 
139*1c60b9acSAndroid Build Coastguard Worker 	lwsl_info("SNI: Found: %s:%d\n", servername, vh->listen_port);
140*1c60b9acSAndroid Build Coastguard Worker 
141*1c60b9acSAndroid Build Coastguard Worker 	/* select the ssl ctx from the selected vhost for this conn */
142*1c60b9acSAndroid Build Coastguard Worker 	SSL_set_SSL_CTX(ssl, vhost->tls.ssl_ctx);
143*1c60b9acSAndroid Build Coastguard Worker 
144*1c60b9acSAndroid Build Coastguard Worker 	return SSL_TLSEXT_ERR_OK;
145*1c60b9acSAndroid Build Coastguard Worker }
146*1c60b9acSAndroid Build Coastguard Worker #endif
147*1c60b9acSAndroid Build Coastguard Worker 
148*1c60b9acSAndroid Build Coastguard Worker /*
149*1c60b9acSAndroid Build Coastguard Worker  * this may now get called after the vhost creation, when certs become
150*1c60b9acSAndroid Build Coastguard Worker  * available.
151*1c60b9acSAndroid Build Coastguard Worker  */
152*1c60b9acSAndroid Build Coastguard Worker int
lws_tls_server_certs_load(struct lws_vhost * vhost,struct lws * wsi,const char * cert,const char * private_key,const char * mem_cert,size_t mem_cert_len,const char * mem_privkey,size_t mem_privkey_len)153*1c60b9acSAndroid Build Coastguard Worker lws_tls_server_certs_load(struct lws_vhost *vhost, struct lws *wsi,
154*1c60b9acSAndroid Build Coastguard Worker 			  const char *cert, const char *private_key,
155*1c60b9acSAndroid Build Coastguard Worker 			  const char *mem_cert, size_t mem_cert_len,
156*1c60b9acSAndroid Build Coastguard Worker 			  const char *mem_privkey, size_t mem_privkey_len)
157*1c60b9acSAndroid Build Coastguard Worker {
158*1c60b9acSAndroid Build Coastguard Worker #if !defined(OPENSSL_NO_EC) && defined(LWS_HAVE_EC_KEY_new_by_curve_name) && \
159*1c60b9acSAndroid Build Coastguard Worker     ((OPENSSL_VERSION_NUMBER < 0x30000000l) || \
160*1c60b9acSAndroid Build Coastguard Worker      defined(LWS_SUPPRESS_DEPRECATED_API_WARNINGS))
161*1c60b9acSAndroid Build Coastguard Worker 	const char *ecdh_curve = "prime256v1";
162*1c60b9acSAndroid Build Coastguard Worker #if !defined(LWS_WITH_BORINGSSL) && defined(LWS_HAVE_SSL_EXTRA_CHAIN_CERTS)
163*1c60b9acSAndroid Build Coastguard Worker 	STACK_OF(X509) *extra_certs = NULL;
164*1c60b9acSAndroid Build Coastguard Worker #endif
165*1c60b9acSAndroid Build Coastguard Worker 	EC_KEY *ecdh, *EC_key = NULL;
166*1c60b9acSAndroid Build Coastguard Worker 	EVP_PKEY *pkey;
167*1c60b9acSAndroid Build Coastguard Worker 	X509 *x = NULL;
168*1c60b9acSAndroid Build Coastguard Worker 	int ecdh_nid;
169*1c60b9acSAndroid Build Coastguard Worker 	int KeyType;
170*1c60b9acSAndroid Build Coastguard Worker #endif
171*1c60b9acSAndroid Build Coastguard Worker 	unsigned long error;
172*1c60b9acSAndroid Build Coastguard Worker 	lws_filepos_t flen;
173*1c60b9acSAndroid Build Coastguard Worker 	uint8_t *p;
174*1c60b9acSAndroid Build Coastguard Worker #if OPENSSL_VERSION_NUMBER >= 0x10100000L
175*1c60b9acSAndroid Build Coastguard Worker 	int ret;
176*1c60b9acSAndroid Build Coastguard Worker #endif
177*1c60b9acSAndroid Build Coastguard Worker 	int n = (int)lws_tls_generic_cert_checks(vhost, cert, private_key), m;
178*1c60b9acSAndroid Build Coastguard Worker 
179*1c60b9acSAndroid Build Coastguard Worker 	if (!cert && !private_key)
180*1c60b9acSAndroid Build Coastguard Worker 		n = LWS_TLS_EXTANT_ALTERNATIVE;
181*1c60b9acSAndroid Build Coastguard Worker 
182*1c60b9acSAndroid Build Coastguard Worker 	if (n == LWS_TLS_EXTANT_NO && (!mem_cert || !mem_privkey))
183*1c60b9acSAndroid Build Coastguard Worker 		return 0;
184*1c60b9acSAndroid Build Coastguard Worker 	if (n == LWS_TLS_EXTANT_NO)
185*1c60b9acSAndroid Build Coastguard Worker 		n = LWS_TLS_EXTANT_ALTERNATIVE;
186*1c60b9acSAndroid Build Coastguard Worker 
187*1c60b9acSAndroid Build Coastguard Worker 	if (n == LWS_TLS_EXTANT_ALTERNATIVE && (!mem_cert || !mem_privkey))
188*1c60b9acSAndroid Build Coastguard Worker 		return 1; /* no alternative */
189*1c60b9acSAndroid Build Coastguard Worker 
190*1c60b9acSAndroid Build Coastguard Worker 	if (n == LWS_TLS_EXTANT_ALTERNATIVE) {
191*1c60b9acSAndroid Build Coastguard Worker 
192*1c60b9acSAndroid Build Coastguard Worker #if OPENSSL_VERSION_NUMBER >= 0x10100000L
193*1c60b9acSAndroid Build Coastguard Worker 
194*1c60b9acSAndroid Build Coastguard Worker 		/*
195*1c60b9acSAndroid Build Coastguard Worker 		 * Although we have prepared update certs, we no longer have
196*1c60b9acSAndroid Build Coastguard Worker 		 * the rights to read our own cert + key we saved.
197*1c60b9acSAndroid Build Coastguard Worker 		 *
198*1c60b9acSAndroid Build Coastguard Worker 		 * If we were passed copies in memory buffers, use those
199*1c60b9acSAndroid Build Coastguard Worker 		 * in favour of the filepaths we normally want.
200*1c60b9acSAndroid Build Coastguard Worker 		 */
201*1c60b9acSAndroid Build Coastguard Worker 		cert = NULL;
202*1c60b9acSAndroid Build Coastguard Worker 		private_key = NULL;
203*1c60b9acSAndroid Build Coastguard Worker 	}
204*1c60b9acSAndroid Build Coastguard Worker 
205*1c60b9acSAndroid Build Coastguard Worker 	/*
206*1c60b9acSAndroid Build Coastguard Worker 	 * use the multi-cert interface for backwards compatibility in the
207*1c60b9acSAndroid Build Coastguard Worker 	 * both simple files case
208*1c60b9acSAndroid Build Coastguard Worker 	 */
209*1c60b9acSAndroid Build Coastguard Worker 
210*1c60b9acSAndroid Build Coastguard Worker 	if (n != LWS_TLS_EXTANT_ALTERNATIVE && cert) {
211*1c60b9acSAndroid Build Coastguard Worker 
212*1c60b9acSAndroid Build Coastguard Worker 		/* set the local certificate from CertFile */
213*1c60b9acSAndroid Build Coastguard Worker 		m = SSL_CTX_use_certificate_chain_file(vhost->tls.ssl_ctx, cert);
214*1c60b9acSAndroid Build Coastguard Worker 		if (m != 1) {
215*1c60b9acSAndroid Build Coastguard Worker 			const char *s;
216*1c60b9acSAndroid Build Coastguard Worker 			error = ERR_get_error();
217*1c60b9acSAndroid Build Coastguard Worker 
218*1c60b9acSAndroid Build Coastguard Worker 			s = ERR_error_string(
219*1c60b9acSAndroid Build Coastguard Worker #if defined(LWS_WITH_BORINGSSL)
220*1c60b9acSAndroid Build Coastguard Worker 				(uint32_t)
221*1c60b9acSAndroid Build Coastguard Worker #endif
222*1c60b9acSAndroid Build Coastguard Worker 					error,
223*1c60b9acSAndroid Build Coastguard Worker 				       (char *)vhost->context->pt[0].serv_buf);
224*1c60b9acSAndroid Build Coastguard Worker 
225*1c60b9acSAndroid Build Coastguard Worker 			lwsl_err("problem getting cert '%s' %lu: %s\n",
226*1c60b9acSAndroid Build Coastguard Worker 				 cert, error, s);
227*1c60b9acSAndroid Build Coastguard Worker 
228*1c60b9acSAndroid Build Coastguard Worker 			return 1;
229*1c60b9acSAndroid Build Coastguard Worker 		}
230*1c60b9acSAndroid Build Coastguard Worker 
231*1c60b9acSAndroid Build Coastguard Worker 		if (private_key) {
232*1c60b9acSAndroid Build Coastguard Worker 			/* set the private key from KeyFile */
233*1c60b9acSAndroid Build Coastguard Worker 			if (SSL_CTX_use_PrivateKey_file(vhost->tls.ssl_ctx, private_key,
234*1c60b9acSAndroid Build Coastguard Worker 							SSL_FILETYPE_PEM) != 1) {
235*1c60b9acSAndroid Build Coastguard Worker 				const char *s;
236*1c60b9acSAndroid Build Coastguard Worker 				error = ERR_get_error();
237*1c60b9acSAndroid Build Coastguard Worker 				s = ERR_error_string(
238*1c60b9acSAndroid Build Coastguard Worker 	#if defined(LWS_WITH_BORINGSSL)
239*1c60b9acSAndroid Build Coastguard Worker 					(uint32_t)
240*1c60b9acSAndroid Build Coastguard Worker 	#endif
241*1c60b9acSAndroid Build Coastguard Worker 						error,
242*1c60b9acSAndroid Build Coastguard Worker 					       (char *)vhost->context->pt[0].serv_buf);
243*1c60b9acSAndroid Build Coastguard Worker 				lwsl_err("ssl problem getting key '%s' %lu: %s\n",
244*1c60b9acSAndroid Build Coastguard Worker 					 private_key, error, s);
245*1c60b9acSAndroid Build Coastguard Worker 				return 1;
246*1c60b9acSAndroid Build Coastguard Worker 			}
247*1c60b9acSAndroid Build Coastguard Worker 		} else {
248*1c60b9acSAndroid Build Coastguard Worker 			if (vhost->protocols[0].callback(wsi,
249*1c60b9acSAndroid Build Coastguard Worker 				      LWS_CALLBACK_OPENSSL_CONTEXT_REQUIRES_PRIVATE_KEY,
250*1c60b9acSAndroid Build Coastguard Worker 							 vhost->tls.ssl_ctx, NULL, 0)) {
251*1c60b9acSAndroid Build Coastguard Worker 				lwsl_err("ssl private key not set\n");
252*1c60b9acSAndroid Build Coastguard Worker 
253*1c60b9acSAndroid Build Coastguard Worker 				return 1;
254*1c60b9acSAndroid Build Coastguard Worker 			}
255*1c60b9acSAndroid Build Coastguard Worker 		}
256*1c60b9acSAndroid Build Coastguard Worker 
257*1c60b9acSAndroid Build Coastguard Worker 		return 0;
258*1c60b9acSAndroid Build Coastguard Worker 	}
259*1c60b9acSAndroid Build Coastguard Worker 
260*1c60b9acSAndroid Build Coastguard Worker 	/* otherwise allow for DER or PEM, file or memory image */
261*1c60b9acSAndroid Build Coastguard Worker 
262*1c60b9acSAndroid Build Coastguard Worker 	if (lws_tls_alloc_pem_to_der_file(vhost->context, cert, mem_cert,
263*1c60b9acSAndroid Build Coastguard Worker 					  mem_cert_len, &p, &flen)) {
264*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("%s: couldn't read cert file\n", __func__);
265*1c60b9acSAndroid Build Coastguard Worker 
266*1c60b9acSAndroid Build Coastguard Worker 		return 1;
267*1c60b9acSAndroid Build Coastguard Worker 	}
268*1c60b9acSAndroid Build Coastguard Worker 
269*1c60b9acSAndroid Build Coastguard Worker #if !defined(USE_WOLFSSL)
270*1c60b9acSAndroid Build Coastguard Worker 	ret = SSL_CTX_use_certificate_ASN1(vhost->tls.ssl_ctx,
271*1c60b9acSAndroid Build Coastguard Worker #if defined(LWS_WITH_BORINGSSL)
272*1c60b9acSAndroid Build Coastguard Worker 				(size_t)
273*1c60b9acSAndroid Build Coastguard Worker #else
274*1c60b9acSAndroid Build Coastguard Worker 				(int)
275*1c60b9acSAndroid Build Coastguard Worker #endif
276*1c60b9acSAndroid Build Coastguard Worker 				flen, p);
277*1c60b9acSAndroid Build Coastguard Worker #else
278*1c60b9acSAndroid Build Coastguard Worker 	ret = wolfSSL_CTX_use_certificate_buffer(vhost->tls.ssl_ctx,
279*1c60b9acSAndroid Build Coastguard Worker 						 (uint8_t *)p, (int)flen,
280*1c60b9acSAndroid Build Coastguard Worker 						 WOLFSSL_FILETYPE_ASN1);
281*1c60b9acSAndroid Build Coastguard Worker #endif
282*1c60b9acSAndroid Build Coastguard Worker 	lws_free_set_NULL(p);
283*1c60b9acSAndroid Build Coastguard Worker 	if (ret != 1) {
284*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("%s: Problem loading cert\n", __func__);
285*1c60b9acSAndroid Build Coastguard Worker 
286*1c60b9acSAndroid Build Coastguard Worker 		return 1;
287*1c60b9acSAndroid Build Coastguard Worker 	}
288*1c60b9acSAndroid Build Coastguard Worker 
289*1c60b9acSAndroid Build Coastguard Worker 	if (lws_tls_alloc_pem_to_der_file(vhost->context, private_key,
290*1c60b9acSAndroid Build Coastguard Worker 					  mem_privkey, mem_privkey_len,
291*1c60b9acSAndroid Build Coastguard Worker 					  &p, &flen)) {
292*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("unable to convert memory privkey\n");
293*1c60b9acSAndroid Build Coastguard Worker 
294*1c60b9acSAndroid Build Coastguard Worker 		return 1;
295*1c60b9acSAndroid Build Coastguard Worker 	}
296*1c60b9acSAndroid Build Coastguard Worker 
297*1c60b9acSAndroid Build Coastguard Worker #if !defined(USE_WOLFSSL)
298*1c60b9acSAndroid Build Coastguard Worker 	ret = SSL_CTX_use_PrivateKey_ASN1(EVP_PKEY_RSA, vhost->tls.ssl_ctx, p,
299*1c60b9acSAndroid Build Coastguard Worker #if defined(LWS_WITH_BORINGSSL)
300*1c60b9acSAndroid Build Coastguard Worker 			(size_t)
301*1c60b9acSAndroid Build Coastguard Worker #else
302*1c60b9acSAndroid Build Coastguard Worker 					  (long)(long long)
303*1c60b9acSAndroid Build Coastguard Worker #endif
304*1c60b9acSAndroid Build Coastguard Worker 					  flen);
305*1c60b9acSAndroid Build Coastguard Worker 	if (ret != 1) {
306*1c60b9acSAndroid Build Coastguard Worker 		ret = SSL_CTX_use_PrivateKey_ASN1(EVP_PKEY_EC,
307*1c60b9acSAndroid Build Coastguard Worker 						  vhost->tls.ssl_ctx, p,
308*1c60b9acSAndroid Build Coastguard Worker #if defined(LWS_WITH_BORINGSSL)
309*1c60b9acSAndroid Build Coastguard Worker 			(size_t)
310*1c60b9acSAndroid Build Coastguard Worker #else
311*1c60b9acSAndroid Build Coastguard Worker 					  (long)(long long)
312*1c60b9acSAndroid Build Coastguard Worker #endif
313*1c60b9acSAndroid Build Coastguard Worker 						  flen);
314*1c60b9acSAndroid Build Coastguard Worker 	}
315*1c60b9acSAndroid Build Coastguard Worker #else
316*1c60b9acSAndroid Build Coastguard Worker 	ret = wolfSSL_CTX_use_PrivateKey_buffer(vhost->tls.ssl_ctx, p, flen,
317*1c60b9acSAndroid Build Coastguard Worker 						WOLFSSL_FILETYPE_ASN1);
318*1c60b9acSAndroid Build Coastguard Worker #endif
319*1c60b9acSAndroid Build Coastguard Worker 	lws_free_set_NULL(p);
320*1c60b9acSAndroid Build Coastguard Worker 	if (ret != 1)  {
321*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("unable to use memory privkey\n");
322*1c60b9acSAndroid Build Coastguard Worker 
323*1c60b9acSAndroid Build Coastguard Worker 		return 1;
324*1c60b9acSAndroid Build Coastguard Worker 	}
325*1c60b9acSAndroid Build Coastguard Worker 
326*1c60b9acSAndroid Build Coastguard Worker #else
327*1c60b9acSAndroid Build Coastguard Worker 		/*
328*1c60b9acSAndroid Build Coastguard Worker 		 * Although we have prepared update certs, we no longer have
329*1c60b9acSAndroid Build Coastguard Worker 		 * the rights to read our own cert + key we saved.
330*1c60b9acSAndroid Build Coastguard Worker 		 *
331*1c60b9acSAndroid Build Coastguard Worker 		 * If we were passed copies in memory buffers, use those
332*1c60b9acSAndroid Build Coastguard Worker 		 * instead.
333*1c60b9acSAndroid Build Coastguard Worker 		 *
334*1c60b9acSAndroid Build Coastguard Worker 		 * The passed memory-buffer cert image is in DER, and the
335*1c60b9acSAndroid Build Coastguard Worker 		 * memory-buffer private key image is PEM.
336*1c60b9acSAndroid Build Coastguard Worker 		 */
337*1c60b9acSAndroid Build Coastguard Worker #ifndef USE_WOLFSSL
338*1c60b9acSAndroid Build Coastguard Worker 		if (lws_tls_alloc_pem_to_der_file(vhost->context, cert, mem_cert,
339*1c60b9acSAndroid Build Coastguard Worker 						  mem_cert_len, &p, &flen)) {
340*1c60b9acSAndroid Build Coastguard Worker 			lwsl_err("%s: couldn't convert pem to der\n", __func__);
341*1c60b9acSAndroid Build Coastguard Worker 			return 1;
342*1c60b9acSAndroid Build Coastguard Worker 		}
343*1c60b9acSAndroid Build Coastguard Worker 		if (SSL_CTX_use_certificate_ASN1(vhost->tls.ssl_ctx,
344*1c60b9acSAndroid Build Coastguard Worker 						 (int)flen,
345*1c60b9acSAndroid Build Coastguard Worker 						 (uint8_t *)p) != 1) {
346*1c60b9acSAndroid Build Coastguard Worker #else
347*1c60b9acSAndroid Build Coastguard Worker 		if (wolfSSL_CTX_use_certificate_buffer(vhost->tls.ssl_ctx,
348*1c60b9acSAndroid Build Coastguard Worker 						 (uint8_t *)mem_cert,
349*1c60b9acSAndroid Build Coastguard Worker 						 (int)mem_cert_len,
350*1c60b9acSAndroid Build Coastguard Worker 						 WOLFSSL_FILETYPE_ASN1) != 1) {
351*1c60b9acSAndroid Build Coastguard Worker 
352*1c60b9acSAndroid Build Coastguard Worker #endif
353*1c60b9acSAndroid Build Coastguard Worker 			lwsl_err("Problem loading update cert\n");
354*1c60b9acSAndroid Build Coastguard Worker 
355*1c60b9acSAndroid Build Coastguard Worker 			return 1;
356*1c60b9acSAndroid Build Coastguard Worker 		}
357*1c60b9acSAndroid Build Coastguard Worker 
358*1c60b9acSAndroid Build Coastguard Worker 		if (lws_tls_alloc_pem_to_der_file(vhost->context, NULL,
359*1c60b9acSAndroid Build Coastguard Worker 						  mem_privkey, mem_privkey_len,
360*1c60b9acSAndroid Build Coastguard Worker 						  &p, &flen)) {
361*1c60b9acSAndroid Build Coastguard Worker 			lwsl_notice("unable to convert memory privkey\n");
362*1c60b9acSAndroid Build Coastguard Worker 
363*1c60b9acSAndroid Build Coastguard Worker 			return 1;
364*1c60b9acSAndroid Build Coastguard Worker 		}
365*1c60b9acSAndroid Build Coastguard Worker #ifndef USE_WOLFSSL
366*1c60b9acSAndroid Build Coastguard Worker 		if (SSL_CTX_use_PrivateKey_ASN1(EVP_PKEY_RSA,
367*1c60b9acSAndroid Build Coastguard Worker 						vhost->tls.ssl_ctx, p,
368*1c60b9acSAndroid Build Coastguard Worker 						(long)(long long)flen) != 1) {
369*1c60b9acSAndroid Build Coastguard Worker #else
370*1c60b9acSAndroid Build Coastguard Worker 		if (wolfSSL_CTX_use_PrivateKey_buffer(vhost->tls.ssl_ctx, p,
371*1c60b9acSAndroid Build Coastguard Worker 					    (long)flen, WOLFSSL_FILETYPE_ASN1) != 1) {
372*1c60b9acSAndroid Build Coastguard Worker #endif
373*1c60b9acSAndroid Build Coastguard Worker 			lwsl_notice("unable to use memory privkey\n");
374*1c60b9acSAndroid Build Coastguard Worker 
375*1c60b9acSAndroid Build Coastguard Worker 			return 1;
376*1c60b9acSAndroid Build Coastguard Worker 		}
377*1c60b9acSAndroid Build Coastguard Worker 
378*1c60b9acSAndroid Build Coastguard Worker 		goto check_key;
379*1c60b9acSAndroid Build Coastguard Worker 	}
380*1c60b9acSAndroid Build Coastguard Worker 
381*1c60b9acSAndroid Build Coastguard Worker 	/* set the local certificate from CertFile */
382*1c60b9acSAndroid Build Coastguard Worker 	m = SSL_CTX_use_certificate_chain_file(vhost->tls.ssl_ctx, cert);
383*1c60b9acSAndroid Build Coastguard Worker 	if (m != 1) {
384*1c60b9acSAndroid Build Coastguard Worker 		error = ERR_get_error();
385*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("problem getting cert '%s' %lu: %s\n",
386*1c60b9acSAndroid Build Coastguard Worker 			 cert, error, ERR_error_string(error,
387*1c60b9acSAndroid Build Coastguard Worker 			       (char *)vhost->context->pt[0].serv_buf));
388*1c60b9acSAndroid Build Coastguard Worker 
389*1c60b9acSAndroid Build Coastguard Worker 		return 1;
390*1c60b9acSAndroid Build Coastguard Worker 	}
391*1c60b9acSAndroid Build Coastguard Worker 
392*1c60b9acSAndroid Build Coastguard Worker 	if (n != LWS_TLS_EXTANT_ALTERNATIVE && private_key) {
393*1c60b9acSAndroid Build Coastguard Worker 		/* set the private key from KeyFile */
394*1c60b9acSAndroid Build Coastguard Worker 		if (SSL_CTX_use_PrivateKey_file(vhost->tls.ssl_ctx, private_key,
395*1c60b9acSAndroid Build Coastguard Worker 					        SSL_FILETYPE_PEM) != 1) {
396*1c60b9acSAndroid Build Coastguard Worker 			error = ERR_get_error();
397*1c60b9acSAndroid Build Coastguard Worker 			lwsl_err("ssl problem getting key '%s' %lu: %s\n",
398*1c60b9acSAndroid Build Coastguard Worker 				 private_key, error,
399*1c60b9acSAndroid Build Coastguard Worker 				 ERR_error_string(error,
400*1c60b9acSAndroid Build Coastguard Worker 				      (char *)vhost->context->pt[0].serv_buf));
401*1c60b9acSAndroid Build Coastguard Worker 			return 1;
402*1c60b9acSAndroid Build Coastguard Worker 		}
403*1c60b9acSAndroid Build Coastguard Worker 	} else {
404*1c60b9acSAndroid Build Coastguard Worker 		if (vhost->protocols[0].callback(wsi,
405*1c60b9acSAndroid Build Coastguard Worker 			      LWS_CALLBACK_OPENSSL_CONTEXT_REQUIRES_PRIVATE_KEY,
406*1c60b9acSAndroid Build Coastguard Worker 						 vhost->tls.ssl_ctx, NULL, 0)) {
407*1c60b9acSAndroid Build Coastguard Worker 			lwsl_err("ssl private key not set\n");
408*1c60b9acSAndroid Build Coastguard Worker 
409*1c60b9acSAndroid Build Coastguard Worker 			return 1;
410*1c60b9acSAndroid Build Coastguard Worker 		}
411*1c60b9acSAndroid Build Coastguard Worker 	}
412*1c60b9acSAndroid Build Coastguard Worker 
413*1c60b9acSAndroid Build Coastguard Worker check_key:
414*1c60b9acSAndroid Build Coastguard Worker #endif
415*1c60b9acSAndroid Build Coastguard Worker 
416*1c60b9acSAndroid Build Coastguard Worker 	/* verify private key */
417*1c60b9acSAndroid Build Coastguard Worker 	if (!SSL_CTX_check_private_key(vhost->tls.ssl_ctx)) {
418*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("Private SSL key doesn't match cert\n");
419*1c60b9acSAndroid Build Coastguard Worker 
420*1c60b9acSAndroid Build Coastguard Worker 		return 1;
421*1c60b9acSAndroid Build Coastguard Worker 	}
422*1c60b9acSAndroid Build Coastguard Worker 
423*1c60b9acSAndroid Build Coastguard Worker 
424*1c60b9acSAndroid Build Coastguard Worker #if !defined(OPENSSL_NO_EC) && defined(LWS_HAVE_EC_KEY_new_by_curve_name) && \
425*1c60b9acSAndroid Build Coastguard Worker     ((OPENSSL_VERSION_NUMBER < 0x30000000l) || \
426*1c60b9acSAndroid Build Coastguard Worker      defined(LWS_SUPPRESS_DEPRECATED_API_WARNINGS))
427*1c60b9acSAndroid Build Coastguard Worker 	if (vhost->tls.ecdh_curve[0])
428*1c60b9acSAndroid Build Coastguard Worker 		ecdh_curve = vhost->tls.ecdh_curve;
429*1c60b9acSAndroid Build Coastguard Worker 
430*1c60b9acSAndroid Build Coastguard Worker 	ecdh_nid = OBJ_sn2nid(ecdh_curve);
431*1c60b9acSAndroid Build Coastguard Worker 	if (NID_undef == ecdh_nid) {
432*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("SSL: Unknown curve name '%s'", ecdh_curve);
433*1c60b9acSAndroid Build Coastguard Worker 		return 1;
434*1c60b9acSAndroid Build Coastguard Worker 	}
435*1c60b9acSAndroid Build Coastguard Worker 
436*1c60b9acSAndroid Build Coastguard Worker 	ecdh = EC_KEY_new_by_curve_name(ecdh_nid);
437*1c60b9acSAndroid Build Coastguard Worker 	if (NULL == ecdh) {
438*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("SSL: Unable to create curve '%s'", ecdh_curve);
439*1c60b9acSAndroid Build Coastguard Worker 		return 1;
440*1c60b9acSAndroid Build Coastguard Worker 	}
441*1c60b9acSAndroid Build Coastguard Worker 	SSL_CTX_set_tmp_ecdh(vhost->tls.ssl_ctx, ecdh);
442*1c60b9acSAndroid Build Coastguard Worker 	EC_KEY_free(ecdh);
443*1c60b9acSAndroid Build Coastguard Worker 
444*1c60b9acSAndroid Build Coastguard Worker 	SSL_CTX_set_options(vhost->tls.ssl_ctx, SSL_OP_SINGLE_ECDH_USE);
445*1c60b9acSAndroid Build Coastguard Worker 
446*1c60b9acSAndroid Build Coastguard Worker 	lwsl_notice(" SSL ECDH curve '%s'\n", ecdh_curve);
447*1c60b9acSAndroid Build Coastguard Worker 
448*1c60b9acSAndroid Build Coastguard Worker 	if (lws_check_opt(vhost->context->options, LWS_SERVER_OPTION_SSL_ECDH))
449*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice(" Using ECDH certificate support\n");
450*1c60b9acSAndroid Build Coastguard Worker 
451*1c60b9acSAndroid Build Coastguard Worker 	/* Get X509 certificate from ssl context */
452*1c60b9acSAndroid Build Coastguard Worker #if !defined(LWS_WITH_BORINGSSL)
453*1c60b9acSAndroid Build Coastguard Worker #if !defined(LWS_HAVE_SSL_EXTRA_CHAIN_CERTS)
454*1c60b9acSAndroid Build Coastguard Worker 	x = sk_X509_value(vhost->tls.ssl_ctx->extra_certs, 0);
455*1c60b9acSAndroid Build Coastguard Worker #else
456*1c60b9acSAndroid Build Coastguard Worker 	SSL_CTX_get_extra_chain_certs_only(vhost->tls.ssl_ctx, &extra_certs);
457*1c60b9acSAndroid Build Coastguard Worker 	if (extra_certs)
458*1c60b9acSAndroid Build Coastguard Worker 		x = sk_X509_value(extra_certs, 0);
459*1c60b9acSAndroid Build Coastguard Worker 	else
460*1c60b9acSAndroid Build Coastguard Worker 		lwsl_info("%s: no extra certs\n", __func__);
461*1c60b9acSAndroid Build Coastguard Worker #endif
462*1c60b9acSAndroid Build Coastguard Worker 	if (!x) {
463*1c60b9acSAndroid Build Coastguard Worker 		//lwsl_err("%s: x is NULL\n", __func__);
464*1c60b9acSAndroid Build Coastguard Worker 		goto post_ecdh;
465*1c60b9acSAndroid Build Coastguard Worker 	}
466*1c60b9acSAndroid Build Coastguard Worker #else
467*1c60b9acSAndroid Build Coastguard Worker 	return 0;
468*1c60b9acSAndroid Build Coastguard Worker #endif /* !boringssl */
469*1c60b9acSAndroid Build Coastguard Worker 
470*1c60b9acSAndroid Build Coastguard Worker 	/* Get the public key from certificate */
471*1c60b9acSAndroid Build Coastguard Worker 	pkey = X509_get_pubkey(x);
472*1c60b9acSAndroid Build Coastguard Worker 	if (!pkey) {
473*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("%s: pkey is NULL\n", __func__);
474*1c60b9acSAndroid Build Coastguard Worker 
475*1c60b9acSAndroid Build Coastguard Worker 		return 1;
476*1c60b9acSAndroid Build Coastguard Worker 	}
477*1c60b9acSAndroid Build Coastguard Worker 	/* Get the key type */
478*1c60b9acSAndroid Build Coastguard Worker 	KeyType = EVP_PKEY_type(EVP_PKEY_id(pkey));
479*1c60b9acSAndroid Build Coastguard Worker 
480*1c60b9acSAndroid Build Coastguard Worker 	if (EVP_PKEY_EC != KeyType) {
481*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("Key type is not EC\n");
482*1c60b9acSAndroid Build Coastguard Worker 		return 0;
483*1c60b9acSAndroid Build Coastguard Worker 	}
484*1c60b9acSAndroid Build Coastguard Worker 	/* Get the key */
485*1c60b9acSAndroid Build Coastguard Worker 	EC_key = EVP_PKEY_get1_EC_KEY(pkey);
486*1c60b9acSAndroid Build Coastguard Worker 	/* Set ECDH parameter */
487*1c60b9acSAndroid Build Coastguard Worker 	if (!EC_key) {
488*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("%s: ECDH key is NULL \n", __func__);
489*1c60b9acSAndroid Build Coastguard Worker 		return 1;
490*1c60b9acSAndroid Build Coastguard Worker 	}
491*1c60b9acSAndroid Build Coastguard Worker 	SSL_CTX_set_tmp_ecdh(vhost->tls.ssl_ctx, EC_key);
492*1c60b9acSAndroid Build Coastguard Worker 
493*1c60b9acSAndroid Build Coastguard Worker 	EC_KEY_free(EC_key);
494*1c60b9acSAndroid Build Coastguard Worker 
495*1c60b9acSAndroid Build Coastguard Worker #if !defined(OPENSSL_NO_EC) && !defined(LWS_WITH_BORINGSSL)
496*1c60b9acSAndroid Build Coastguard Worker post_ecdh:
497*1c60b9acSAndroid Build Coastguard Worker #endif
498*1c60b9acSAndroid Build Coastguard Worker 	vhost->tls.skipped_certs = 0;
499*1c60b9acSAndroid Build Coastguard Worker #else
500*1c60b9acSAndroid Build Coastguard Worker 	lwsl_notice(" OpenSSL doesn't support ECDH\n");
501*1c60b9acSAndroid Build Coastguard Worker #endif
502*1c60b9acSAndroid Build Coastguard Worker 
503*1c60b9acSAndroid Build Coastguard Worker 	return 0;
504*1c60b9acSAndroid Build Coastguard Worker }
505*1c60b9acSAndroid Build Coastguard Worker 
506*1c60b9acSAndroid Build Coastguard Worker int
507*1c60b9acSAndroid Build Coastguard Worker lws_tls_server_vhost_backend_init(const struct lws_context_creation_info *info,
508*1c60b9acSAndroid Build Coastguard Worker 				  struct lws_vhost *vhost, struct lws *wsi)
509*1c60b9acSAndroid Build Coastguard Worker {
510*1c60b9acSAndroid Build Coastguard Worker 	unsigned long error;
511*1c60b9acSAndroid Build Coastguard Worker 	SSL_METHOD *method = (SSL_METHOD *)SSLv23_server_method();
512*1c60b9acSAndroid Build Coastguard Worker 
513*1c60b9acSAndroid Build Coastguard Worker 	if (!method) {
514*1c60b9acSAndroid Build Coastguard Worker 		const char *s;
515*1c60b9acSAndroid Build Coastguard Worker 		error = ERR_get_error();
516*1c60b9acSAndroid Build Coastguard Worker 		s = ERR_error_string(
517*1c60b9acSAndroid Build Coastguard Worker #if defined(LWS_WITH_BORINGSSL)
518*1c60b9acSAndroid Build Coastguard Worker 			(uint32_t)
519*1c60b9acSAndroid Build Coastguard Worker #endif
520*1c60b9acSAndroid Build Coastguard Worker 				error,
521*1c60b9acSAndroid Build Coastguard Worker 			       (char *)vhost->context->pt[0].serv_buf);
522*1c60b9acSAndroid Build Coastguard Worker 
523*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("problem creating ssl method %lu: %s\n",
524*1c60b9acSAndroid Build Coastguard Worker 				error, s);
525*1c60b9acSAndroid Build Coastguard Worker 		return 1;
526*1c60b9acSAndroid Build Coastguard Worker 	}
527*1c60b9acSAndroid Build Coastguard Worker 	vhost->tls.ssl_ctx = SSL_CTX_new(method);	/* create context */
528*1c60b9acSAndroid Build Coastguard Worker 	if (!vhost->tls.ssl_ctx) {
529*1c60b9acSAndroid Build Coastguard Worker 		const char *s;
530*1c60b9acSAndroid Build Coastguard Worker 
531*1c60b9acSAndroid Build Coastguard Worker 		error = ERR_get_error();
532*1c60b9acSAndroid Build Coastguard Worker 		s = ERR_error_string(
533*1c60b9acSAndroid Build Coastguard Worker #if defined(LWS_WITH_BORINGSSL)
534*1c60b9acSAndroid Build Coastguard Worker 			(uint32_t)
535*1c60b9acSAndroid Build Coastguard Worker #endif
536*1c60b9acSAndroid Build Coastguard Worker 				error,
537*1c60b9acSAndroid Build Coastguard Worker 			       (char *)vhost->context->pt[0].serv_buf);
538*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("problem creating ssl context %lu: %s\n",
539*1c60b9acSAndroid Build Coastguard Worker 				error, s);
540*1c60b9acSAndroid Build Coastguard Worker 		return 1;
541*1c60b9acSAndroid Build Coastguard Worker 	}
542*1c60b9acSAndroid Build Coastguard Worker 
543*1c60b9acSAndroid Build Coastguard Worker 	SSL_CTX_set_ex_data(vhost->tls.ssl_ctx,
544*1c60b9acSAndroid Build Coastguard Worker 			    openssl_SSL_CTX_private_data_index,
545*1c60b9acSAndroid Build Coastguard Worker 			    (char *)vhost->context);
546*1c60b9acSAndroid Build Coastguard Worker 	/* Disable SSLv2 and SSLv3 */
547*1c60b9acSAndroid Build Coastguard Worker 	SSL_CTX_set_options(vhost->tls.ssl_ctx, SSL_OP_NO_SSLv2 |
548*1c60b9acSAndroid Build Coastguard Worker 						SSL_OP_NO_SSLv3);
549*1c60b9acSAndroid Build Coastguard Worker #ifdef SSL_OP_NO_COMPRESSION
550*1c60b9acSAndroid Build Coastguard Worker 	SSL_CTX_set_options(vhost->tls.ssl_ctx, SSL_OP_NO_COMPRESSION);
551*1c60b9acSAndroid Build Coastguard Worker #endif
552*1c60b9acSAndroid Build Coastguard Worker 	SSL_CTX_set_options(vhost->tls.ssl_ctx, SSL_OP_SINGLE_DH_USE);
553*1c60b9acSAndroid Build Coastguard Worker 	SSL_CTX_set_options(vhost->tls.ssl_ctx, SSL_OP_CIPHER_SERVER_PREFERENCE);
554*1c60b9acSAndroid Build Coastguard Worker 
555*1c60b9acSAndroid Build Coastguard Worker 	if (info->ssl_cipher_list)
556*1c60b9acSAndroid Build Coastguard Worker 		SSL_CTX_set_cipher_list(vhost->tls.ssl_ctx, info->ssl_cipher_list);
557*1c60b9acSAndroid Build Coastguard Worker 
558*1c60b9acSAndroid Build Coastguard Worker #if defined(LWS_HAVE_SSL_CTX_set_ciphersuites)
559*1c60b9acSAndroid Build Coastguard Worker 	if (info->tls1_3_plus_cipher_list)
560*1c60b9acSAndroid Build Coastguard Worker 		SSL_CTX_set_ciphersuites(vhost->tls.ssl_ctx,
561*1c60b9acSAndroid Build Coastguard Worker 					 info->tls1_3_plus_cipher_list);
562*1c60b9acSAndroid Build Coastguard Worker #endif
563*1c60b9acSAndroid Build Coastguard Worker 
564*1c60b9acSAndroid Build Coastguard Worker #if !defined(OPENSSL_NO_TLSEXT)
565*1c60b9acSAndroid Build Coastguard Worker 	SSL_CTX_set_tlsext_servername_callback(vhost->tls.ssl_ctx,
566*1c60b9acSAndroid Build Coastguard Worker 					       lws_ssl_server_name_cb);
567*1c60b9acSAndroid Build Coastguard Worker 	SSL_CTX_set_tlsext_servername_arg(vhost->tls.ssl_ctx, vhost->context);
568*1c60b9acSAndroid Build Coastguard Worker #endif
569*1c60b9acSAndroid Build Coastguard Worker 
570*1c60b9acSAndroid Build Coastguard Worker 	if (info->ssl_ca_filepath &&
571*1c60b9acSAndroid Build Coastguard Worker #if defined(LWS_HAVE_SSL_CTX_load_verify_file)
572*1c60b9acSAndroid Build Coastguard Worker 	    !SSL_CTX_load_verify_file(vhost->tls.ssl_ctx,
573*1c60b9acSAndroid Build Coastguard Worker 				      info->ssl_ca_filepath)) {
574*1c60b9acSAndroid Build Coastguard Worker #else
575*1c60b9acSAndroid Build Coastguard Worker 	    !SSL_CTX_load_verify_locations(vhost->tls.ssl_ctx,
576*1c60b9acSAndroid Build Coastguard Worker 					   info->ssl_ca_filepath, NULL)) {
577*1c60b9acSAndroid Build Coastguard Worker #endif
578*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("%s: SSL_CTX_load_verify_locations unhappy\n",
579*1c60b9acSAndroid Build Coastguard Worker 			 __func__);
580*1c60b9acSAndroid Build Coastguard Worker 	}
581*1c60b9acSAndroid Build Coastguard Worker 
582*1c60b9acSAndroid Build Coastguard Worker 	if (info->ssl_options_set)
583*1c60b9acSAndroid Build Coastguard Worker 		SSL_CTX_set_options(vhost->tls.ssl_ctx,
584*1c60b9acSAndroid Build Coastguard Worker #if defined(USE_WOLFSSL)
585*1c60b9acSAndroid Build Coastguard Worker 				(long)
586*1c60b9acSAndroid Build Coastguard Worker #else
587*1c60b9acSAndroid Build Coastguard Worker #if defined(LWS_WITH_BORINGSSL)
588*1c60b9acSAndroid Build Coastguard Worker 				(uint32_t)
589*1c60b9acSAndroid Build Coastguard Worker #else
590*1c60b9acSAndroid Build Coastguard Worker #if (OPENSSL_VERSION_NUMBER >= 0x10003000l) && !defined(LIBRESSL_VERSION_NUMBER) /* not documented by openssl */
591*1c60b9acSAndroid Build Coastguard Worker 				    (unsigned long)
592*1c60b9acSAndroid Build Coastguard Worker #else
593*1c60b9acSAndroid Build Coastguard Worker 				    (long)
594*1c60b9acSAndroid Build Coastguard Worker #endif
595*1c60b9acSAndroid Build Coastguard Worker #endif
596*1c60b9acSAndroid Build Coastguard Worker #endif
597*1c60b9acSAndroid Build Coastguard Worker 				info->ssl_options_set);
598*1c60b9acSAndroid Build Coastguard Worker 
599*1c60b9acSAndroid Build Coastguard Worker /* SSL_clear_options introduced in 0.9.8m */
600*1c60b9acSAndroid Build Coastguard Worker #if (OPENSSL_VERSION_NUMBER >= 0x009080df) && !defined(USE_WOLFSSL)
601*1c60b9acSAndroid Build Coastguard Worker 	if (info->ssl_options_clear)
602*1c60b9acSAndroid Build Coastguard Worker 		SSL_CTX_clear_options(vhost->tls.ssl_ctx,
603*1c60b9acSAndroid Build Coastguard Worker #if defined(LWS_WITH_BORINGSSL)
604*1c60b9acSAndroid Build Coastguard Worker 				(uint32_t)
605*1c60b9acSAndroid Build Coastguard Worker #else
606*1c60b9acSAndroid Build Coastguard Worker #if (OPENSSL_VERSION_NUMBER >= 0x10003000l)  && !defined(LIBRESSL_VERSION_NUMBER)/* not documented by openssl */
607*1c60b9acSAndroid Build Coastguard Worker 				    (unsigned long)
608*1c60b9acSAndroid Build Coastguard Worker #else
609*1c60b9acSAndroid Build Coastguard Worker 				    (long)
610*1c60b9acSAndroid Build Coastguard Worker #endif
611*1c60b9acSAndroid Build Coastguard Worker #endif
612*1c60b9acSAndroid Build Coastguard Worker 				      info->ssl_options_clear);
613*1c60b9acSAndroid Build Coastguard Worker #endif
614*1c60b9acSAndroid Build Coastguard Worker 
615*1c60b9acSAndroid Build Coastguard Worker 	lwsl_info(" SSL options 0x%lX\n",
616*1c60b9acSAndroid Build Coastguard Worker 			(unsigned long)SSL_CTX_get_options(vhost->tls.ssl_ctx));
617*1c60b9acSAndroid Build Coastguard Worker 	if (!vhost->tls.use_ssl ||
618*1c60b9acSAndroid Build Coastguard Worker 	    (!info->ssl_cert_filepath && !info->server_ssl_cert_mem))
619*1c60b9acSAndroid Build Coastguard Worker 		return 0;
620*1c60b9acSAndroid Build Coastguard Worker 
621*1c60b9acSAndroid Build Coastguard Worker 	lws_ssl_bind_passphrase(vhost->tls.ssl_ctx, 0, info);
622*1c60b9acSAndroid Build Coastguard Worker 
623*1c60b9acSAndroid Build Coastguard Worker 	return lws_tls_server_certs_load(vhost, wsi, info->ssl_cert_filepath,
624*1c60b9acSAndroid Build Coastguard Worker 					 info->ssl_private_key_filepath,
625*1c60b9acSAndroid Build Coastguard Worker 					 info->server_ssl_cert_mem,
626*1c60b9acSAndroid Build Coastguard Worker 					 info->server_ssl_cert_mem_len,
627*1c60b9acSAndroid Build Coastguard Worker 					 info->server_ssl_private_key_mem,
628*1c60b9acSAndroid Build Coastguard Worker 					 info->server_ssl_private_key_mem_len);
629*1c60b9acSAndroid Build Coastguard Worker }
630*1c60b9acSAndroid Build Coastguard Worker 
631*1c60b9acSAndroid Build Coastguard Worker int
632*1c60b9acSAndroid Build Coastguard Worker lws_tls_server_new_nonblocking(struct lws *wsi, lws_sockfd_type accept_fd)
633*1c60b9acSAndroid Build Coastguard Worker {
634*1c60b9acSAndroid Build Coastguard Worker #if !defined(USE_WOLFSSL)
635*1c60b9acSAndroid Build Coastguard Worker 	BIO *bio;
636*1c60b9acSAndroid Build Coastguard Worker #endif
637*1c60b9acSAndroid Build Coastguard Worker 
638*1c60b9acSAndroid Build Coastguard Worker 	errno = 0;
639*1c60b9acSAndroid Build Coastguard Worker 	ERR_clear_error();
640*1c60b9acSAndroid Build Coastguard Worker 	wsi->tls.ssl = SSL_new(wsi->a.vhost->tls.ssl_ctx);
641*1c60b9acSAndroid Build Coastguard Worker 	if (wsi->tls.ssl == NULL) {
642*1c60b9acSAndroid Build Coastguard Worker 		lwsl_err("SSL_new failed: %d (errno %d)\n",
643*1c60b9acSAndroid Build Coastguard Worker 			 lws_ssl_get_error(wsi, 0), errno);
644*1c60b9acSAndroid Build Coastguard Worker 
645*1c60b9acSAndroid Build Coastguard Worker 		lws_tls_err_describe_clear();
646*1c60b9acSAndroid Build Coastguard Worker 		return 1;
647*1c60b9acSAndroid Build Coastguard Worker 	}
648*1c60b9acSAndroid Build Coastguard Worker 
649*1c60b9acSAndroid Build Coastguard Worker 	SSL_set_ex_data(wsi->tls.ssl, openssl_websocket_private_data_index, wsi);
650*1c60b9acSAndroid Build Coastguard Worker 	SSL_set_fd(wsi->tls.ssl, (int)(lws_intptr_t)accept_fd);
651*1c60b9acSAndroid Build Coastguard Worker 
652*1c60b9acSAndroid Build Coastguard Worker #ifdef USE_WOLFSSL
653*1c60b9acSAndroid Build Coastguard Worker #ifdef USE_OLD_CYASSL
654*1c60b9acSAndroid Build Coastguard Worker 	CyaSSL_set_using_nonblock(wsi->tls.ssl, 1);
655*1c60b9acSAndroid Build Coastguard Worker #else
656*1c60b9acSAndroid Build Coastguard Worker 	wolfSSL_set_using_nonblock(wsi->tls.ssl, 1);
657*1c60b9acSAndroid Build Coastguard Worker #endif
658*1c60b9acSAndroid Build Coastguard Worker #else
659*1c60b9acSAndroid Build Coastguard Worker 
660*1c60b9acSAndroid Build Coastguard Worker 	SSL_set_mode(wsi->tls.ssl, SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER |
661*1c60b9acSAndroid Build Coastguard Worker 				   SSL_MODE_RELEASE_BUFFERS);
662*1c60b9acSAndroid Build Coastguard Worker 	bio = SSL_get_rbio(wsi->tls.ssl);
663*1c60b9acSAndroid Build Coastguard Worker 	if (bio)
664*1c60b9acSAndroid Build Coastguard Worker 		BIO_set_nbio(bio, 1); /* nonblocking */
665*1c60b9acSAndroid Build Coastguard Worker 	else
666*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("NULL rbio\n");
667*1c60b9acSAndroid Build Coastguard Worker 	bio = SSL_get_wbio(wsi->tls.ssl);
668*1c60b9acSAndroid Build Coastguard Worker 	if (bio)
669*1c60b9acSAndroid Build Coastguard Worker 		BIO_set_nbio(bio, 1); /* nonblocking */
670*1c60b9acSAndroid Build Coastguard Worker 	else
671*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("NULL rbio\n");
672*1c60b9acSAndroid Build Coastguard Worker #endif
673*1c60b9acSAndroid Build Coastguard Worker 
674*1c60b9acSAndroid Build Coastguard Worker #if defined (LWS_HAVE_SSL_SET_INFO_CALLBACK)
675*1c60b9acSAndroid Build Coastguard Worker 		if (wsi->a.vhost->tls.ssl_info_event_mask)
676*1c60b9acSAndroid Build Coastguard Worker 			SSL_set_info_callback(wsi->tls.ssl, lws_ssl_info_callback);
677*1c60b9acSAndroid Build Coastguard Worker #endif
678*1c60b9acSAndroid Build Coastguard Worker 
679*1c60b9acSAndroid Build Coastguard Worker 	return 0;
680*1c60b9acSAndroid Build Coastguard Worker }
681*1c60b9acSAndroid Build Coastguard Worker 
682*1c60b9acSAndroid Build Coastguard Worker int
683*1c60b9acSAndroid Build Coastguard Worker lws_tls_server_abort_connection(struct lws *wsi)
684*1c60b9acSAndroid Build Coastguard Worker {
685*1c60b9acSAndroid Build Coastguard Worker 	if (wsi->tls.use_ssl)
686*1c60b9acSAndroid Build Coastguard Worker 		SSL_shutdown(wsi->tls.ssl);
687*1c60b9acSAndroid Build Coastguard Worker 	SSL_free(wsi->tls.ssl);
688*1c60b9acSAndroid Build Coastguard Worker 
689*1c60b9acSAndroid Build Coastguard Worker 	return 0;
690*1c60b9acSAndroid Build Coastguard Worker }
691*1c60b9acSAndroid Build Coastguard Worker 
692*1c60b9acSAndroid Build Coastguard Worker enum lws_ssl_capable_status
693*1c60b9acSAndroid Build Coastguard Worker lws_tls_server_accept(struct lws *wsi)
694*1c60b9acSAndroid Build Coastguard Worker {
695*1c60b9acSAndroid Build Coastguard Worker 	struct lws_context_per_thread *pt = &wsi->a.context->pt[(int)wsi->tsi];
696*1c60b9acSAndroid Build Coastguard Worker 	union lws_tls_cert_info_results ir;
697*1c60b9acSAndroid Build Coastguard Worker 	int m, n;
698*1c60b9acSAndroid Build Coastguard Worker 
699*1c60b9acSAndroid Build Coastguard Worker 	errno = 0;
700*1c60b9acSAndroid Build Coastguard Worker 	ERR_clear_error();
701*1c60b9acSAndroid Build Coastguard Worker 	n = SSL_accept(wsi->tls.ssl);
702*1c60b9acSAndroid Build Coastguard Worker 
703*1c60b9acSAndroid Build Coastguard Worker 	wsi->skip_fallback = 1;
704*1c60b9acSAndroid Build Coastguard Worker 
705*1c60b9acSAndroid Build Coastguard Worker 	if (n == 1) {
706*1c60b9acSAndroid Build Coastguard Worker 		n = lws_tls_peer_cert_info(wsi, LWS_TLS_CERT_INFO_COMMON_NAME, &ir,
707*1c60b9acSAndroid Build Coastguard Worker 					   sizeof(ir.ns.name));
708*1c60b9acSAndroid Build Coastguard Worker 		if (!n)
709*1c60b9acSAndroid Build Coastguard Worker 			lwsl_notice("%s: client cert CN '%s'\n", __func__,
710*1c60b9acSAndroid Build Coastguard Worker 				    ir.ns.name);
711*1c60b9acSAndroid Build Coastguard Worker 		else
712*1c60b9acSAndroid Build Coastguard Worker 			lwsl_info("%s: no client cert CN\n", __func__);
713*1c60b9acSAndroid Build Coastguard Worker 
714*1c60b9acSAndroid Build Coastguard Worker 		lws_openssl_describe_cipher(wsi);
715*1c60b9acSAndroid Build Coastguard Worker 
716*1c60b9acSAndroid Build Coastguard Worker 		if (SSL_pending(wsi->tls.ssl) &&
717*1c60b9acSAndroid Build Coastguard Worker 		    lws_dll2_is_detached(&wsi->tls.dll_pending_tls))
718*1c60b9acSAndroid Build Coastguard Worker 			lws_dll2_add_head(&wsi->tls.dll_pending_tls,
719*1c60b9acSAndroid Build Coastguard Worker 					  &pt->tls.dll_pending_tls_owner);
720*1c60b9acSAndroid Build Coastguard Worker 
721*1c60b9acSAndroid Build Coastguard Worker 		return LWS_SSL_CAPABLE_DONE;
722*1c60b9acSAndroid Build Coastguard Worker 	}
723*1c60b9acSAndroid Build Coastguard Worker 
724*1c60b9acSAndroid Build Coastguard Worker 	m = lws_ssl_get_error(wsi, n);
725*1c60b9acSAndroid Build Coastguard Worker 	lws_tls_err_describe_clear();
726*1c60b9acSAndroid Build Coastguard Worker 
727*1c60b9acSAndroid Build Coastguard Worker 	if (m == SSL_ERROR_SYSCALL || m == SSL_ERROR_SSL)
728*1c60b9acSAndroid Build Coastguard Worker 		return LWS_SSL_CAPABLE_ERROR;
729*1c60b9acSAndroid Build Coastguard Worker 
730*1c60b9acSAndroid Build Coastguard Worker 	if (m == SSL_ERROR_WANT_READ ||
731*1c60b9acSAndroid Build Coastguard Worker 	    (m != SSL_ERROR_ZERO_RETURN && SSL_want_read(wsi->tls.ssl))) {
732*1c60b9acSAndroid Build Coastguard Worker 		if (lws_change_pollfd(wsi, 0, LWS_POLLIN)) {
733*1c60b9acSAndroid Build Coastguard Worker 			lwsl_info("%s: WANT_READ change_pollfd failed\n",
734*1c60b9acSAndroid Build Coastguard Worker 				  __func__);
735*1c60b9acSAndroid Build Coastguard Worker 			return LWS_SSL_CAPABLE_ERROR;
736*1c60b9acSAndroid Build Coastguard Worker 		}
737*1c60b9acSAndroid Build Coastguard Worker 
738*1c60b9acSAndroid Build Coastguard Worker 		lwsl_info("SSL_ERROR_WANT_READ: m %d\n", m);
739*1c60b9acSAndroid Build Coastguard Worker 		return LWS_SSL_CAPABLE_MORE_SERVICE_READ;
740*1c60b9acSAndroid Build Coastguard Worker 	}
741*1c60b9acSAndroid Build Coastguard Worker 	if (m == SSL_ERROR_WANT_WRITE || SSL_want_write(wsi->tls.ssl)) {
742*1c60b9acSAndroid Build Coastguard Worker 		lwsl_debug("%s: WANT_WRITE\n", __func__);
743*1c60b9acSAndroid Build Coastguard Worker 
744*1c60b9acSAndroid Build Coastguard Worker 		if (lws_change_pollfd(wsi, 0, LWS_POLLOUT)) {
745*1c60b9acSAndroid Build Coastguard Worker 			lwsl_info("%s: WANT_WRITE change_pollfd failed\n",
746*1c60b9acSAndroid Build Coastguard Worker 				  __func__);
747*1c60b9acSAndroid Build Coastguard Worker 			return LWS_SSL_CAPABLE_ERROR;
748*1c60b9acSAndroid Build Coastguard Worker 		}
749*1c60b9acSAndroid Build Coastguard Worker 		return LWS_SSL_CAPABLE_MORE_SERVICE_WRITE;
750*1c60b9acSAndroid Build Coastguard Worker 	}
751*1c60b9acSAndroid Build Coastguard Worker 
752*1c60b9acSAndroid Build Coastguard Worker 	return LWS_SSL_CAPABLE_ERROR;
753*1c60b9acSAndroid Build Coastguard Worker }
754*1c60b9acSAndroid Build Coastguard Worker 
755*1c60b9acSAndroid Build Coastguard Worker #if defined(LWS_WITH_ACME)
756*1c60b9acSAndroid Build Coastguard Worker static int
757*1c60b9acSAndroid Build Coastguard Worker lws_tls_openssl_rsa_new_key(RSA **rsa, int bits)
758*1c60b9acSAndroid Build Coastguard Worker {
759*1c60b9acSAndroid Build Coastguard Worker 	BIGNUM *bn = BN_new();
760*1c60b9acSAndroid Build Coastguard Worker 	int n;
761*1c60b9acSAndroid Build Coastguard Worker 
762*1c60b9acSAndroid Build Coastguard Worker 	if (!bn)
763*1c60b9acSAndroid Build Coastguard Worker 		return 1;
764*1c60b9acSAndroid Build Coastguard Worker 
765*1c60b9acSAndroid Build Coastguard Worker 	if (BN_set_word(bn, RSA_F4) != 1) {
766*1c60b9acSAndroid Build Coastguard Worker 		BN_free(bn);
767*1c60b9acSAndroid Build Coastguard Worker 		return 1;
768*1c60b9acSAndroid Build Coastguard Worker 	}
769*1c60b9acSAndroid Build Coastguard Worker 
770*1c60b9acSAndroid Build Coastguard Worker 	*rsa = RSA_new();
771*1c60b9acSAndroid Build Coastguard Worker 	if (!*rsa) {
772*1c60b9acSAndroid Build Coastguard Worker 		BN_free(bn);
773*1c60b9acSAndroid Build Coastguard Worker 		return 1;
774*1c60b9acSAndroid Build Coastguard Worker 	}
775*1c60b9acSAndroid Build Coastguard Worker 
776*1c60b9acSAndroid Build Coastguard Worker 	n = RSA_generate_key_ex(*rsa, bits, bn, NULL);
777*1c60b9acSAndroid Build Coastguard Worker 	BN_free(bn);
778*1c60b9acSAndroid Build Coastguard Worker 	if (n == 1)
779*1c60b9acSAndroid Build Coastguard Worker 		return 0;
780*1c60b9acSAndroid Build Coastguard Worker 
781*1c60b9acSAndroid Build Coastguard Worker 	RSA_free(*rsa);
782*1c60b9acSAndroid Build Coastguard Worker 	*rsa = NULL;
783*1c60b9acSAndroid Build Coastguard Worker 
784*1c60b9acSAndroid Build Coastguard Worker 	return 1;
785*1c60b9acSAndroid Build Coastguard Worker }
786*1c60b9acSAndroid Build Coastguard Worker 
787*1c60b9acSAndroid Build Coastguard Worker struct lws_tls_ss_pieces {
788*1c60b9acSAndroid Build Coastguard Worker 	X509 *x509;
789*1c60b9acSAndroid Build Coastguard Worker 	EVP_PKEY *pkey;
790*1c60b9acSAndroid Build Coastguard Worker 	RSA *rsa;
791*1c60b9acSAndroid Build Coastguard Worker };
792*1c60b9acSAndroid Build Coastguard Worker 
793*1c60b9acSAndroid Build Coastguard Worker int
794*1c60b9acSAndroid Build Coastguard Worker lws_tls_acme_sni_cert_create(struct lws_vhost *vhost, const char *san_a,
795*1c60b9acSAndroid Build Coastguard Worker 			     const char *san_b)
796*1c60b9acSAndroid Build Coastguard Worker {
797*1c60b9acSAndroid Build Coastguard Worker 	GENERAL_NAMES *gens = sk_GENERAL_NAME_new_null();
798*1c60b9acSAndroid Build Coastguard Worker 	GENERAL_NAME *gen = NULL;
799*1c60b9acSAndroid Build Coastguard Worker 	ASN1_IA5STRING *ia5 = NULL;
800*1c60b9acSAndroid Build Coastguard Worker 	X509_NAME *name;
801*1c60b9acSAndroid Build Coastguard Worker 
802*1c60b9acSAndroid Build Coastguard Worker 	if (!gens)
803*1c60b9acSAndroid Build Coastguard Worker 		return 1;
804*1c60b9acSAndroid Build Coastguard Worker 
805*1c60b9acSAndroid Build Coastguard Worker 	vhost->tls.ss = lws_zalloc(sizeof(*vhost->tls.ss), "sni cert");
806*1c60b9acSAndroid Build Coastguard Worker 	if (!vhost->tls.ss) {
807*1c60b9acSAndroid Build Coastguard Worker 		GENERAL_NAMES_free(gens);
808*1c60b9acSAndroid Build Coastguard Worker 		return 1;
809*1c60b9acSAndroid Build Coastguard Worker 	}
810*1c60b9acSAndroid Build Coastguard Worker 
811*1c60b9acSAndroid Build Coastguard Worker 	vhost->tls.ss->x509 = X509_new();
812*1c60b9acSAndroid Build Coastguard Worker 	if (!vhost->tls.ss->x509)
813*1c60b9acSAndroid Build Coastguard Worker 		goto bail;
814*1c60b9acSAndroid Build Coastguard Worker 
815*1c60b9acSAndroid Build Coastguard Worker 	ASN1_INTEGER_set(X509_get_serialNumber(vhost->tls.ss->x509), 1);
816*1c60b9acSAndroid Build Coastguard Worker 	X509_gmtime_adj(X509_get_notBefore(vhost->tls.ss->x509), 0);
817*1c60b9acSAndroid Build Coastguard Worker 	X509_gmtime_adj(X509_get_notAfter(vhost->tls.ss->x509), 3600);
818*1c60b9acSAndroid Build Coastguard Worker 
819*1c60b9acSAndroid Build Coastguard Worker 	vhost->tls.ss->pkey = EVP_PKEY_new();
820*1c60b9acSAndroid Build Coastguard Worker 	if (!vhost->tls.ss->pkey)
821*1c60b9acSAndroid Build Coastguard Worker 		goto bail0;
822*1c60b9acSAndroid Build Coastguard Worker 
823*1c60b9acSAndroid Build Coastguard Worker 	if (lws_tls_openssl_rsa_new_key(&vhost->tls.ss->rsa, 4096))
824*1c60b9acSAndroid Build Coastguard Worker 		goto bail1;
825*1c60b9acSAndroid Build Coastguard Worker 
826*1c60b9acSAndroid Build Coastguard Worker 	if (!EVP_PKEY_assign_RSA(vhost->tls.ss->pkey, vhost->tls.ss->rsa))
827*1c60b9acSAndroid Build Coastguard Worker 		goto bail2;
828*1c60b9acSAndroid Build Coastguard Worker 
829*1c60b9acSAndroid Build Coastguard Worker 	X509_set_pubkey(vhost->tls.ss->x509, vhost->tls.ss->pkey);
830*1c60b9acSAndroid Build Coastguard Worker 
831*1c60b9acSAndroid Build Coastguard Worker 	name = X509_get_subject_name(vhost->tls.ss->x509);
832*1c60b9acSAndroid Build Coastguard Worker 	X509_NAME_add_entry_by_txt(name, "C",  MBSTRING_ASC,
833*1c60b9acSAndroid Build Coastguard Worker 				   (unsigned char *)"GB",          -1, -1, 0);
834*1c60b9acSAndroid Build Coastguard Worker 	X509_NAME_add_entry_by_txt(name, "O",  MBSTRING_ASC,
835*1c60b9acSAndroid Build Coastguard Worker 				   (unsigned char *)"somecompany", -1, -1, 0);
836*1c60b9acSAndroid Build Coastguard Worker 	if (X509_NAME_add_entry_by_txt(name, "CN", MBSTRING_UTF8,
837*1c60b9acSAndroid Build Coastguard Worker 				   (unsigned char *)"temp.acme.invalid",
838*1c60b9acSAndroid Build Coastguard Worker 				   	   	   -1, -1, 0) != 1) {
839*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("failed to add CN\n");
840*1c60b9acSAndroid Build Coastguard Worker 		goto bail2;
841*1c60b9acSAndroid Build Coastguard Worker 	}
842*1c60b9acSAndroid Build Coastguard Worker 	X509_set_issuer_name(vhost->tls.ss->x509, name);
843*1c60b9acSAndroid Build Coastguard Worker 
844*1c60b9acSAndroid Build Coastguard Worker 	/* add the SAN payloads */
845*1c60b9acSAndroid Build Coastguard Worker 
846*1c60b9acSAndroid Build Coastguard Worker 	gen = GENERAL_NAME_new();
847*1c60b9acSAndroid Build Coastguard Worker 	ia5 = ASN1_IA5STRING_new();
848*1c60b9acSAndroid Build Coastguard Worker 	if (!ASN1_STRING_set(ia5, san_a, -1)) {
849*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("failed to set ia5\n");
850*1c60b9acSAndroid Build Coastguard Worker 		GENERAL_NAME_free(gen);
851*1c60b9acSAndroid Build Coastguard Worker 		goto bail2;
852*1c60b9acSAndroid Build Coastguard Worker 	}
853*1c60b9acSAndroid Build Coastguard Worker 	GENERAL_NAME_set0_value(gen, GEN_DNS, ia5);
854*1c60b9acSAndroid Build Coastguard Worker 	sk_GENERAL_NAME_push(gens, gen);
855*1c60b9acSAndroid Build Coastguard Worker 
856*1c60b9acSAndroid Build Coastguard Worker 	if (X509_add1_ext_i2d(vhost->tls.ss->x509, NID_subject_alt_name,
857*1c60b9acSAndroid Build Coastguard Worker 			    gens, 0, X509V3_ADD_APPEND) != 1)
858*1c60b9acSAndroid Build Coastguard Worker 		goto bail2;
859*1c60b9acSAndroid Build Coastguard Worker 
860*1c60b9acSAndroid Build Coastguard Worker 	GENERAL_NAMES_free(gens);
861*1c60b9acSAndroid Build Coastguard Worker 
862*1c60b9acSAndroid Build Coastguard Worker 	if (san_b && san_b[0]) {
863*1c60b9acSAndroid Build Coastguard Worker 		gens = sk_GENERAL_NAME_new_null();
864*1c60b9acSAndroid Build Coastguard Worker 		gen = GENERAL_NAME_new();
865*1c60b9acSAndroid Build Coastguard Worker 		ia5 = ASN1_IA5STRING_new();
866*1c60b9acSAndroid Build Coastguard Worker 		if (!ASN1_STRING_set(ia5, san_a, -1)) {
867*1c60b9acSAndroid Build Coastguard Worker 			lwsl_notice("failed to set ia5\n");
868*1c60b9acSAndroid Build Coastguard Worker 			GENERAL_NAME_free(gen);
869*1c60b9acSAndroid Build Coastguard Worker 			goto bail2;
870*1c60b9acSAndroid Build Coastguard Worker 		}
871*1c60b9acSAndroid Build Coastguard Worker 		GENERAL_NAME_set0_value(gen, GEN_DNS, ia5);
872*1c60b9acSAndroid Build Coastguard Worker 		sk_GENERAL_NAME_push(gens, gen);
873*1c60b9acSAndroid Build Coastguard Worker 
874*1c60b9acSAndroid Build Coastguard Worker 		if (X509_add1_ext_i2d(vhost->tls.ss->x509, NID_subject_alt_name,
875*1c60b9acSAndroid Build Coastguard Worker 				    gens, 0, X509V3_ADD_APPEND) != 1)
876*1c60b9acSAndroid Build Coastguard Worker 			goto bail2;
877*1c60b9acSAndroid Build Coastguard Worker 
878*1c60b9acSAndroid Build Coastguard Worker 		GENERAL_NAMES_free(gens);
879*1c60b9acSAndroid Build Coastguard Worker 	}
880*1c60b9acSAndroid Build Coastguard Worker 
881*1c60b9acSAndroid Build Coastguard Worker 	/* sign it with our private key */
882*1c60b9acSAndroid Build Coastguard Worker 	if (!X509_sign(vhost->tls.ss->x509, vhost->tls.ss->pkey, EVP_sha256()))
883*1c60b9acSAndroid Build Coastguard Worker 		goto bail2;
884*1c60b9acSAndroid Build Coastguard Worker 
885*1c60b9acSAndroid Build Coastguard Worker #if 0
886*1c60b9acSAndroid Build Coastguard Worker 	{/* useful to take a sample of a working cert for mbedtls to crib */
887*1c60b9acSAndroid Build Coastguard Worker 		FILE *fp = fopen("/tmp/acme-temp-cert", "w+");
888*1c60b9acSAndroid Build Coastguard Worker 
889*1c60b9acSAndroid Build Coastguard Worker 		i2d_X509_fp(fp, vhost->tls.ss->x509);
890*1c60b9acSAndroid Build Coastguard Worker 		fclose(fp);
891*1c60b9acSAndroid Build Coastguard Worker 	}
892*1c60b9acSAndroid Build Coastguard Worker #endif
893*1c60b9acSAndroid Build Coastguard Worker 
894*1c60b9acSAndroid Build Coastguard Worker 	/* tell the vhost to use our crafted certificate */
895*1c60b9acSAndroid Build Coastguard Worker 	SSL_CTX_use_certificate(vhost->tls.ssl_ctx, vhost->tls.ss->x509);
896*1c60b9acSAndroid Build Coastguard Worker 	/* and to use our generated private key */
897*1c60b9acSAndroid Build Coastguard Worker 	SSL_CTX_use_PrivateKey(vhost->tls.ssl_ctx, vhost->tls.ss->pkey);
898*1c60b9acSAndroid Build Coastguard Worker 
899*1c60b9acSAndroid Build Coastguard Worker 	return 0;
900*1c60b9acSAndroid Build Coastguard Worker 
901*1c60b9acSAndroid Build Coastguard Worker bail2:
902*1c60b9acSAndroid Build Coastguard Worker 	RSA_free(vhost->tls.ss->rsa);
903*1c60b9acSAndroid Build Coastguard Worker bail1:
904*1c60b9acSAndroid Build Coastguard Worker 	EVP_PKEY_free(vhost->tls.ss->pkey);
905*1c60b9acSAndroid Build Coastguard Worker bail0:
906*1c60b9acSAndroid Build Coastguard Worker 	X509_free(vhost->tls.ss->x509);
907*1c60b9acSAndroid Build Coastguard Worker bail:
908*1c60b9acSAndroid Build Coastguard Worker 	lws_free(vhost->tls.ss);
909*1c60b9acSAndroid Build Coastguard Worker 	GENERAL_NAMES_free(gens);
910*1c60b9acSAndroid Build Coastguard Worker 
911*1c60b9acSAndroid Build Coastguard Worker 	return 1;
912*1c60b9acSAndroid Build Coastguard Worker }
913*1c60b9acSAndroid Build Coastguard Worker 
914*1c60b9acSAndroid Build Coastguard Worker void
915*1c60b9acSAndroid Build Coastguard Worker lws_tls_acme_sni_cert_destroy(struct lws_vhost *vhost)
916*1c60b9acSAndroid Build Coastguard Worker {
917*1c60b9acSAndroid Build Coastguard Worker 	if (!vhost->tls.ss)
918*1c60b9acSAndroid Build Coastguard Worker 		return;
919*1c60b9acSAndroid Build Coastguard Worker 
920*1c60b9acSAndroid Build Coastguard Worker 	EVP_PKEY_free(vhost->tls.ss->pkey);
921*1c60b9acSAndroid Build Coastguard Worker 	X509_free(vhost->tls.ss->x509);
922*1c60b9acSAndroid Build Coastguard Worker 	lws_free_set_NULL(vhost->tls.ss);
923*1c60b9acSAndroid Build Coastguard Worker }
924*1c60b9acSAndroid Build Coastguard Worker 
925*1c60b9acSAndroid Build Coastguard Worker static int
926*1c60b9acSAndroid Build Coastguard Worker lws_tls_openssl_add_nid(X509_NAME *name, int nid, const char *value)
927*1c60b9acSAndroid Build Coastguard Worker {
928*1c60b9acSAndroid Build Coastguard Worker 	X509_NAME_ENTRY *e;
929*1c60b9acSAndroid Build Coastguard Worker 	int n;
930*1c60b9acSAndroid Build Coastguard Worker 
931*1c60b9acSAndroid Build Coastguard Worker 	if (!value || value[0] == '\0')
932*1c60b9acSAndroid Build Coastguard Worker 		value = "none";
933*1c60b9acSAndroid Build Coastguard Worker 
934*1c60b9acSAndroid Build Coastguard Worker 	e = X509_NAME_ENTRY_create_by_NID(NULL, nid, MBSTRING_ASC,
935*1c60b9acSAndroid Build Coastguard Worker 					  (unsigned char *)value, -1);
936*1c60b9acSAndroid Build Coastguard Worker 	if (!e)
937*1c60b9acSAndroid Build Coastguard Worker 		return 1;
938*1c60b9acSAndroid Build Coastguard Worker 	n = X509_NAME_add_entry(name, e, -1, 0);
939*1c60b9acSAndroid Build Coastguard Worker 	X509_NAME_ENTRY_free(e);
940*1c60b9acSAndroid Build Coastguard Worker 
941*1c60b9acSAndroid Build Coastguard Worker 	return n != 1;
942*1c60b9acSAndroid Build Coastguard Worker }
943*1c60b9acSAndroid Build Coastguard Worker 
944*1c60b9acSAndroid Build Coastguard Worker static int nid_list[] = {
945*1c60b9acSAndroid Build Coastguard Worker 	NID_countryName,		/* LWS_TLS_REQ_ELEMENT_COUNTRY */
946*1c60b9acSAndroid Build Coastguard Worker 	NID_stateOrProvinceName,	/* LWS_TLS_REQ_ELEMENT_STATE */
947*1c60b9acSAndroid Build Coastguard Worker 	NID_localityName,		/* LWS_TLS_REQ_ELEMENT_LOCALITY */
948*1c60b9acSAndroid Build Coastguard Worker 	NID_organizationName,		/* LWS_TLS_REQ_ELEMENT_ORGANIZATION */
949*1c60b9acSAndroid Build Coastguard Worker 	NID_commonName,			/* LWS_TLS_REQ_ELEMENT_COMMON_NAME */
950*1c60b9acSAndroid Build Coastguard Worker 	NID_subject_alt_name,		/* LWS_TLS_REQ_ELEMENT_SUBJECT_ALT_NAME */
951*1c60b9acSAndroid Build Coastguard Worker 	NID_pkcs9_emailAddress,		/* LWS_TLS_REQ_ELEMENT_EMAIL */
952*1c60b9acSAndroid Build Coastguard Worker };
953*1c60b9acSAndroid Build Coastguard Worker 
954*1c60b9acSAndroid Build Coastguard Worker int
955*1c60b9acSAndroid Build Coastguard Worker lws_tls_acme_sni_csr_create(struct lws_context *context, const char *elements[],
956*1c60b9acSAndroid Build Coastguard Worker 			    uint8_t *csr, size_t csr_len, char **privkey_pem,
957*1c60b9acSAndroid Build Coastguard Worker 			    size_t *privkey_len)
958*1c60b9acSAndroid Build Coastguard Worker {
959*1c60b9acSAndroid Build Coastguard Worker 	uint8_t *csr_in = csr;
960*1c60b9acSAndroid Build Coastguard Worker 	RSA *rsakey;
961*1c60b9acSAndroid Build Coastguard Worker 	X509_REQ *req;
962*1c60b9acSAndroid Build Coastguard Worker 	X509_NAME *subj;
963*1c60b9acSAndroid Build Coastguard Worker 	EVP_PKEY *pkey;
964*1c60b9acSAndroid Build Coastguard Worker 	char *p, *end;
965*1c60b9acSAndroid Build Coastguard Worker 	BIO *bio;
966*1c60b9acSAndroid Build Coastguard Worker 	long bio_len;
967*1c60b9acSAndroid Build Coastguard Worker 	int n, ret = -1;
968*1c60b9acSAndroid Build Coastguard Worker 
969*1c60b9acSAndroid Build Coastguard Worker 	if (lws_tls_openssl_rsa_new_key(&rsakey, 4096))
970*1c60b9acSAndroid Build Coastguard Worker 		return -1;
971*1c60b9acSAndroid Build Coastguard Worker 
972*1c60b9acSAndroid Build Coastguard Worker 	pkey = EVP_PKEY_new();
973*1c60b9acSAndroid Build Coastguard Worker 	if (!pkey)
974*1c60b9acSAndroid Build Coastguard Worker 		goto bail0;
975*1c60b9acSAndroid Build Coastguard Worker 	if (!EVP_PKEY_set1_RSA(pkey, rsakey))
976*1c60b9acSAndroid Build Coastguard Worker 		goto bail1;
977*1c60b9acSAndroid Build Coastguard Worker 
978*1c60b9acSAndroid Build Coastguard Worker 	req = X509_REQ_new();
979*1c60b9acSAndroid Build Coastguard Worker 	if (!req)
980*1c60b9acSAndroid Build Coastguard Worker 	        goto bail1;
981*1c60b9acSAndroid Build Coastguard Worker 
982*1c60b9acSAndroid Build Coastguard Worker 	X509_REQ_set_pubkey(req, pkey);
983*1c60b9acSAndroid Build Coastguard Worker 
984*1c60b9acSAndroid Build Coastguard Worker 	subj = X509_NAME_new();
985*1c60b9acSAndroid Build Coastguard Worker 	if (!subj)
986*1c60b9acSAndroid Build Coastguard Worker 		goto bail2;
987*1c60b9acSAndroid Build Coastguard Worker 
988*1c60b9acSAndroid Build Coastguard Worker 	for (n = 0; n < LWS_TLS_REQ_ELEMENT_COUNT; n++)
989*1c60b9acSAndroid Build Coastguard Worker 		if (elements[n] &&
990*1c60b9acSAndroid Build Coastguard Worker 			lws_tls_openssl_add_nid(subj, nid_list[n],
991*1c60b9acSAndroid Build Coastguard Worker 				elements[n])) {
992*1c60b9acSAndroid Build Coastguard Worker 				lwsl_notice("%s: failed to add element %d\n",
993*1c60b9acSAndroid Build Coastguard Worker 						__func__, n);
994*1c60b9acSAndroid Build Coastguard Worker 			goto bail3;
995*1c60b9acSAndroid Build Coastguard Worker 		}
996*1c60b9acSAndroid Build Coastguard Worker 
997*1c60b9acSAndroid Build Coastguard Worker 	if (X509_REQ_set_subject_name(req, subj) != 1)
998*1c60b9acSAndroid Build Coastguard Worker 		goto bail3;
999*1c60b9acSAndroid Build Coastguard Worker 
1000*1c60b9acSAndroid Build Coastguard Worker 	if (elements[LWS_TLS_REQ_ELEMENT_SUBJECT_ALT_NAME]) {
1001*1c60b9acSAndroid Build Coastguard Worker 		STACK_OF(X509_EXTENSION) *exts;
1002*1c60b9acSAndroid Build Coastguard Worker 		X509_EXTENSION *ext;
1003*1c60b9acSAndroid Build Coastguard Worker 		char san[256];
1004*1c60b9acSAndroid Build Coastguard Worker 
1005*1c60b9acSAndroid Build Coastguard Worker 		exts = sk_X509_EXTENSION_new_null();
1006*1c60b9acSAndroid Build Coastguard Worker 		if (!exts)
1007*1c60b9acSAndroid Build Coastguard Worker 			goto bail3;
1008*1c60b9acSAndroid Build Coastguard Worker 
1009*1c60b9acSAndroid Build Coastguard Worker 		lws_snprintf(san, sizeof(san), "DNS:%s,DNS:%s",
1010*1c60b9acSAndroid Build Coastguard Worker 				elements[LWS_TLS_REQ_ELEMENT_COMMON_NAME],
1011*1c60b9acSAndroid Build Coastguard Worker 				elements[LWS_TLS_REQ_ELEMENT_SUBJECT_ALT_NAME]);
1012*1c60b9acSAndroid Build Coastguard Worker 
1013*1c60b9acSAndroid Build Coastguard Worker 		ext = X509V3_EXT_conf_nid(NULL, NULL, NID_subject_alt_name,
1014*1c60b9acSAndroid Build Coastguard Worker 				san);
1015*1c60b9acSAndroid Build Coastguard Worker 		if (!ext) {
1016*1c60b9acSAndroid Build Coastguard Worker 			sk_X509_EXTENSION_pop_free(exts, X509_EXTENSION_free);
1017*1c60b9acSAndroid Build Coastguard Worker 			goto bail3;
1018*1c60b9acSAndroid Build Coastguard Worker 		}
1019*1c60b9acSAndroid Build Coastguard Worker 		sk_X509_EXTENSION_push(exts, ext);
1020*1c60b9acSAndroid Build Coastguard Worker 
1021*1c60b9acSAndroid Build Coastguard Worker 		if (!X509_REQ_add_extensions(req, exts)) {
1022*1c60b9acSAndroid Build Coastguard Worker 			sk_X509_EXTENSION_pop_free(exts, X509_EXTENSION_free);
1023*1c60b9acSAndroid Build Coastguard Worker 			goto bail3;
1024*1c60b9acSAndroid Build Coastguard Worker 		}
1025*1c60b9acSAndroid Build Coastguard Worker 		sk_X509_EXTENSION_pop_free(exts, X509_EXTENSION_free);
1026*1c60b9acSAndroid Build Coastguard Worker 	}
1027*1c60b9acSAndroid Build Coastguard Worker 
1028*1c60b9acSAndroid Build Coastguard Worker 	if (!X509_REQ_sign(req, pkey, EVP_sha256()))
1029*1c60b9acSAndroid Build Coastguard Worker 		goto bail3;
1030*1c60b9acSAndroid Build Coastguard Worker 
1031*1c60b9acSAndroid Build Coastguard Worker 	/*
1032*1c60b9acSAndroid Build Coastguard Worker 	 * issue the CSR as PEM to a BIO, and translate to b64urlenc without
1033*1c60b9acSAndroid Build Coastguard Worker 	 * headers, trailers, or whitespace
1034*1c60b9acSAndroid Build Coastguard Worker 	 */
1035*1c60b9acSAndroid Build Coastguard Worker 
1036*1c60b9acSAndroid Build Coastguard Worker 	bio = BIO_new(BIO_s_mem());
1037*1c60b9acSAndroid Build Coastguard Worker 	if (!bio)
1038*1c60b9acSAndroid Build Coastguard Worker 		goto bail3;
1039*1c60b9acSAndroid Build Coastguard Worker 
1040*1c60b9acSAndroid Build Coastguard Worker 	if (PEM_write_bio_X509_REQ(bio, req) != 1) {
1041*1c60b9acSAndroid Build Coastguard Worker 		BIO_free(bio);
1042*1c60b9acSAndroid Build Coastguard Worker 		goto bail3;
1043*1c60b9acSAndroid Build Coastguard Worker 	}
1044*1c60b9acSAndroid Build Coastguard Worker 
1045*1c60b9acSAndroid Build Coastguard Worker 	bio_len = BIO_get_mem_data(bio, &p);
1046*1c60b9acSAndroid Build Coastguard Worker 	end = p + bio_len;
1047*1c60b9acSAndroid Build Coastguard Worker 
1048*1c60b9acSAndroid Build Coastguard Worker 	/* strip the header line */
1049*1c60b9acSAndroid Build Coastguard Worker 	while (p < end && *p != '\n')
1050*1c60b9acSAndroid Build Coastguard Worker 		p++;
1051*1c60b9acSAndroid Build Coastguard Worker 
1052*1c60b9acSAndroid Build Coastguard Worker 	while (p < end && csr_len) {
1053*1c60b9acSAndroid Build Coastguard Worker 		if (*p == '\n') {
1054*1c60b9acSAndroid Build Coastguard Worker 			p++;
1055*1c60b9acSAndroid Build Coastguard Worker 			continue;
1056*1c60b9acSAndroid Build Coastguard Worker 		}
1057*1c60b9acSAndroid Build Coastguard Worker 
1058*1c60b9acSAndroid Build Coastguard Worker 		if (*p == '-')
1059*1c60b9acSAndroid Build Coastguard Worker 			break;
1060*1c60b9acSAndroid Build Coastguard Worker 
1061*1c60b9acSAndroid Build Coastguard Worker 		if (*p == '+')
1062*1c60b9acSAndroid Build Coastguard Worker 			*csr++ = '-';
1063*1c60b9acSAndroid Build Coastguard Worker 		else
1064*1c60b9acSAndroid Build Coastguard Worker 			if (*p == '/')
1065*1c60b9acSAndroid Build Coastguard Worker 				*csr++ = '_';
1066*1c60b9acSAndroid Build Coastguard Worker 			else
1067*1c60b9acSAndroid Build Coastguard Worker 				*csr++ = (uint8_t)*p;
1068*1c60b9acSAndroid Build Coastguard Worker 		p++;
1069*1c60b9acSAndroid Build Coastguard Worker 		csr_len--;
1070*1c60b9acSAndroid Build Coastguard Worker 	}
1071*1c60b9acSAndroid Build Coastguard Worker 	BIO_free(bio);
1072*1c60b9acSAndroid Build Coastguard Worker 	if (!csr_len) {
1073*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("%s: need %ld for CSR\n", __func__, bio_len);
1074*1c60b9acSAndroid Build Coastguard Worker 		goto bail3;
1075*1c60b9acSAndroid Build Coastguard Worker 	}
1076*1c60b9acSAndroid Build Coastguard Worker 
1077*1c60b9acSAndroid Build Coastguard Worker 	/*
1078*1c60b9acSAndroid Build Coastguard Worker 	 * Also return the private key as a PEM in memory
1079*1c60b9acSAndroid Build Coastguard Worker 	 * (platform may not have a filesystem)
1080*1c60b9acSAndroid Build Coastguard Worker 	 */
1081*1c60b9acSAndroid Build Coastguard Worker 	bio = BIO_new(BIO_s_mem());
1082*1c60b9acSAndroid Build Coastguard Worker 	if (!bio)
1083*1c60b9acSAndroid Build Coastguard Worker 		goto bail3;
1084*1c60b9acSAndroid Build Coastguard Worker 
1085*1c60b9acSAndroid Build Coastguard Worker 	if (PEM_write_bio_PrivateKey(bio, pkey, NULL, NULL, 0, 0, NULL) != 1) {
1086*1c60b9acSAndroid Build Coastguard Worker 		BIO_free(bio);
1087*1c60b9acSAndroid Build Coastguard Worker 		goto bail3;
1088*1c60b9acSAndroid Build Coastguard Worker 	}
1089*1c60b9acSAndroid Build Coastguard Worker 	bio_len = BIO_get_mem_data(bio, &p);
1090*1c60b9acSAndroid Build Coastguard Worker 	*privkey_pem = malloc((unsigned long)bio_len); /* malloc so user code can own / free */
1091*1c60b9acSAndroid Build Coastguard Worker 	*privkey_len = (size_t)bio_len;
1092*1c60b9acSAndroid Build Coastguard Worker 	if (!*privkey_pem) {
1093*1c60b9acSAndroid Build Coastguard Worker 		lwsl_notice("%s: need %ld for private key\n", __func__,
1094*1c60b9acSAndroid Build Coastguard Worker 			    bio_len);
1095*1c60b9acSAndroid Build Coastguard Worker 		BIO_free(bio);
1096*1c60b9acSAndroid Build Coastguard Worker 		goto bail3;
1097*1c60b9acSAndroid Build Coastguard Worker 	}
1098*1c60b9acSAndroid Build Coastguard Worker 	memcpy(*privkey_pem, p, (unsigned int)(int)(long long)bio_len);
1099*1c60b9acSAndroid Build Coastguard Worker 	BIO_free(bio);
1100*1c60b9acSAndroid Build Coastguard Worker 
1101*1c60b9acSAndroid Build Coastguard Worker 	ret = lws_ptr_diff(csr, csr_in);
1102*1c60b9acSAndroid Build Coastguard Worker 
1103*1c60b9acSAndroid Build Coastguard Worker bail3:
1104*1c60b9acSAndroid Build Coastguard Worker 	X509_NAME_free(subj);
1105*1c60b9acSAndroid Build Coastguard Worker bail2:
1106*1c60b9acSAndroid Build Coastguard Worker 	X509_REQ_free(req);
1107*1c60b9acSAndroid Build Coastguard Worker bail1:
1108*1c60b9acSAndroid Build Coastguard Worker 	EVP_PKEY_free(pkey);
1109*1c60b9acSAndroid Build Coastguard Worker bail0:
1110*1c60b9acSAndroid Build Coastguard Worker 	RSA_free(rsakey);
1111*1c60b9acSAndroid Build Coastguard Worker 
1112*1c60b9acSAndroid Build Coastguard Worker 	return ret;
1113*1c60b9acSAndroid Build Coastguard Worker }
1114*1c60b9acSAndroid Build Coastguard Worker #endif
1115