1*1c60b9acSAndroid Build Coastguard Worker /*
2*1c60b9acSAndroid Build Coastguard Worker * libwebsockets - small server side websockets and web server implementation
3*1c60b9acSAndroid Build Coastguard Worker *
4*1c60b9acSAndroid Build Coastguard Worker * Copyright (C) 2010 - 2019 Andy Green <[email protected]>
5*1c60b9acSAndroid Build Coastguard Worker *
6*1c60b9acSAndroid Build Coastguard Worker * Permission is hereby granted, free of charge, to any person obtaining a copy
7*1c60b9acSAndroid Build Coastguard Worker * of this software and associated documentation files (the "Software"), to
8*1c60b9acSAndroid Build Coastguard Worker * deal in the Software without restriction, including without limitation the
9*1c60b9acSAndroid Build Coastguard Worker * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
10*1c60b9acSAndroid Build Coastguard Worker * sell copies of the Software, and to permit persons to whom the Software is
11*1c60b9acSAndroid Build Coastguard Worker * furnished to do so, subject to the following conditions:
12*1c60b9acSAndroid Build Coastguard Worker *
13*1c60b9acSAndroid Build Coastguard Worker * The above copyright notice and this permission notice shall be included in
14*1c60b9acSAndroid Build Coastguard Worker * all copies or substantial portions of the Software.
15*1c60b9acSAndroid Build Coastguard Worker *
16*1c60b9acSAndroid Build Coastguard Worker * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17*1c60b9acSAndroid Build Coastguard Worker * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18*1c60b9acSAndroid Build Coastguard Worker * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
19*1c60b9acSAndroid Build Coastguard Worker * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20*1c60b9acSAndroid Build Coastguard Worker * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
21*1c60b9acSAndroid Build Coastguard Worker * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
22*1c60b9acSAndroid Build Coastguard Worker * IN THE SOFTWARE.
23*1c60b9acSAndroid Build Coastguard Worker */
24*1c60b9acSAndroid Build Coastguard Worker
25*1c60b9acSAndroid Build Coastguard Worker #include "private-lib-core.h"
26*1c60b9acSAndroid Build Coastguard Worker
27*1c60b9acSAndroid Build Coastguard Worker #if defined(LWS_WITH_SERVER)
28*1c60b9acSAndroid Build Coastguard Worker
29*1c60b9acSAndroid Build Coastguard Worker static void
lws_sul_tls_cb(lws_sorted_usec_list_t * sul)30*1c60b9acSAndroid Build Coastguard Worker lws_sul_tls_cb(lws_sorted_usec_list_t *sul)
31*1c60b9acSAndroid Build Coastguard Worker {
32*1c60b9acSAndroid Build Coastguard Worker struct lws_context_per_thread *pt = lws_container_of(sul,
33*1c60b9acSAndroid Build Coastguard Worker struct lws_context_per_thread, sul_tls);
34*1c60b9acSAndroid Build Coastguard Worker
35*1c60b9acSAndroid Build Coastguard Worker lws_tls_check_all_cert_lifetimes(pt->context);
36*1c60b9acSAndroid Build Coastguard Worker
37*1c60b9acSAndroid Build Coastguard Worker __lws_sul_insert_us(&pt->pt_sul_owner[LWSSULLI_MISS_IF_SUSPENDED],
38*1c60b9acSAndroid Build Coastguard Worker &pt->sul_tls,
39*1c60b9acSAndroid Build Coastguard Worker (lws_usec_t)24 * 3600 * LWS_US_PER_SEC);
40*1c60b9acSAndroid Build Coastguard Worker }
41*1c60b9acSAndroid Build Coastguard Worker
42*1c60b9acSAndroid Build Coastguard Worker int
lws_context_init_server_ssl(const struct lws_context_creation_info * info,struct lws_vhost * vhost)43*1c60b9acSAndroid Build Coastguard Worker lws_context_init_server_ssl(const struct lws_context_creation_info *info,
44*1c60b9acSAndroid Build Coastguard Worker struct lws_vhost *vhost)
45*1c60b9acSAndroid Build Coastguard Worker {
46*1c60b9acSAndroid Build Coastguard Worker struct lws_context *context = vhost->context;
47*1c60b9acSAndroid Build Coastguard Worker lws_fakewsi_def_plwsa(&vhost->context->pt[0]);
48*1c60b9acSAndroid Build Coastguard Worker
49*1c60b9acSAndroid Build Coastguard Worker lws_fakewsi_prep_plwsa_ctx(vhost->context);
50*1c60b9acSAndroid Build Coastguard Worker
51*1c60b9acSAndroid Build Coastguard Worker if (!lws_check_opt(info->options,
52*1c60b9acSAndroid Build Coastguard Worker LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT)) {
53*1c60b9acSAndroid Build Coastguard Worker vhost->tls.use_ssl = 0;
54*1c60b9acSAndroid Build Coastguard Worker
55*1c60b9acSAndroid Build Coastguard Worker return 0;
56*1c60b9acSAndroid Build Coastguard Worker }
57*1c60b9acSAndroid Build Coastguard Worker
58*1c60b9acSAndroid Build Coastguard Worker /*
59*1c60b9acSAndroid Build Coastguard Worker * If he is giving a server cert, take it as a sign he wants to use
60*1c60b9acSAndroid Build Coastguard Worker * it on this vhost. User code can leave the cert filepath NULL and
61*1c60b9acSAndroid Build Coastguard Worker * set the LWS_SERVER_OPTION_CREATE_VHOST_SSL_CTX option itself, in
62*1c60b9acSAndroid Build Coastguard Worker * which case he's expected to set up the cert himself at
63*1c60b9acSAndroid Build Coastguard Worker * LWS_CALLBACK_OPENSSL_LOAD_EXTRA_SERVER_VERIFY_CERTS, which
64*1c60b9acSAndroid Build Coastguard Worker * provides the vhost SSL_CTX * in the user parameter.
65*1c60b9acSAndroid Build Coastguard Worker */
66*1c60b9acSAndroid Build Coastguard Worker if (info->ssl_cert_filepath || info->server_ssl_cert_mem)
67*1c60b9acSAndroid Build Coastguard Worker vhost->options |= LWS_SERVER_OPTION_CREATE_VHOST_SSL_CTX;
68*1c60b9acSAndroid Build Coastguard Worker
69*1c60b9acSAndroid Build Coastguard Worker if (info->port != CONTEXT_PORT_NO_LISTEN) {
70*1c60b9acSAndroid Build Coastguard Worker
71*1c60b9acSAndroid Build Coastguard Worker vhost->tls.use_ssl = lws_check_opt(vhost->options,
72*1c60b9acSAndroid Build Coastguard Worker LWS_SERVER_OPTION_CREATE_VHOST_SSL_CTX);
73*1c60b9acSAndroid Build Coastguard Worker
74*1c60b9acSAndroid Build Coastguard Worker if (vhost->tls.use_ssl && info->ssl_cipher_list)
75*1c60b9acSAndroid Build Coastguard Worker lwsl_notice(" SSL ciphers: '%s'\n",
76*1c60b9acSAndroid Build Coastguard Worker info->ssl_cipher_list);
77*1c60b9acSAndroid Build Coastguard Worker
78*1c60b9acSAndroid Build Coastguard Worker lwsl_notice(" Vhost '%s' using %sTLS mode\n",
79*1c60b9acSAndroid Build Coastguard Worker vhost->name, vhost->tls.use_ssl ? "" : "non-");
80*1c60b9acSAndroid Build Coastguard Worker }
81*1c60b9acSAndroid Build Coastguard Worker
82*1c60b9acSAndroid Build Coastguard Worker /*
83*1c60b9acSAndroid Build Coastguard Worker * give him a fake wsi with context + vhost set, so he can use
84*1c60b9acSAndroid Build Coastguard Worker * lws_get_context() in the callback
85*1c60b9acSAndroid Build Coastguard Worker */
86*1c60b9acSAndroid Build Coastguard Worker plwsa->vhost = vhost; /* not a real bound wsi */
87*1c60b9acSAndroid Build Coastguard Worker
88*1c60b9acSAndroid Build Coastguard Worker /*
89*1c60b9acSAndroid Build Coastguard Worker * as a server, if we are requiring clients to identify themselves
90*1c60b9acSAndroid Build Coastguard Worker * then set the backend up for it
91*1c60b9acSAndroid Build Coastguard Worker */
92*1c60b9acSAndroid Build Coastguard Worker if (lws_check_opt(info->options,
93*1c60b9acSAndroid Build Coastguard Worker LWS_SERVER_OPTION_ALLOW_NON_SSL_ON_SSL_PORT))
94*1c60b9acSAndroid Build Coastguard Worker /* Normally SSL listener rejects non-ssl, optionally allow */
95*1c60b9acSAndroid Build Coastguard Worker vhost->tls.allow_non_ssl_on_ssl_port = 1;
96*1c60b9acSAndroid Build Coastguard Worker
97*1c60b9acSAndroid Build Coastguard Worker /*
98*1c60b9acSAndroid Build Coastguard Worker * give user code a chance to load certs into the server
99*1c60b9acSAndroid Build Coastguard Worker * allowing it to verify incoming client certs
100*1c60b9acSAndroid Build Coastguard Worker */
101*1c60b9acSAndroid Build Coastguard Worker if (vhost->tls.use_ssl) {
102*1c60b9acSAndroid Build Coastguard Worker if (lws_tls_server_vhost_backend_init(info, vhost, (struct lws *)plwsa))
103*1c60b9acSAndroid Build Coastguard Worker return -1;
104*1c60b9acSAndroid Build Coastguard Worker
105*1c60b9acSAndroid Build Coastguard Worker lws_tls_server_client_cert_verify_config(vhost);
106*1c60b9acSAndroid Build Coastguard Worker
107*1c60b9acSAndroid Build Coastguard Worker if (vhost->protocols[0].callback((struct lws *)plwsa,
108*1c60b9acSAndroid Build Coastguard Worker LWS_CALLBACK_OPENSSL_LOAD_EXTRA_SERVER_VERIFY_CERTS,
109*1c60b9acSAndroid Build Coastguard Worker vhost->tls.ssl_ctx, vhost, 0))
110*1c60b9acSAndroid Build Coastguard Worker return -1;
111*1c60b9acSAndroid Build Coastguard Worker }
112*1c60b9acSAndroid Build Coastguard Worker
113*1c60b9acSAndroid Build Coastguard Worker if (vhost->tls.use_ssl)
114*1c60b9acSAndroid Build Coastguard Worker lws_context_init_alpn(vhost);
115*1c60b9acSAndroid Build Coastguard Worker
116*1c60b9acSAndroid Build Coastguard Worker /* check certs once a day */
117*1c60b9acSAndroid Build Coastguard Worker
118*1c60b9acSAndroid Build Coastguard Worker context->pt[0].sul_tls.cb = lws_sul_tls_cb;
119*1c60b9acSAndroid Build Coastguard Worker __lws_sul_insert_us(&context->pt[0].pt_sul_owner[LWSSULLI_MISS_IF_SUSPENDED],
120*1c60b9acSAndroid Build Coastguard Worker &context->pt[0].sul_tls,
121*1c60b9acSAndroid Build Coastguard Worker (lws_usec_t)24 * 3600 * LWS_US_PER_SEC);
122*1c60b9acSAndroid Build Coastguard Worker
123*1c60b9acSAndroid Build Coastguard Worker return 0;
124*1c60b9acSAndroid Build Coastguard Worker }
125*1c60b9acSAndroid Build Coastguard Worker #endif
126*1c60b9acSAndroid Build Coastguard Worker
127*1c60b9acSAndroid Build Coastguard Worker int
lws_server_socket_service_ssl(struct lws * wsi,lws_sockfd_type accept_fd,char from_pollin)128*1c60b9acSAndroid Build Coastguard Worker lws_server_socket_service_ssl(struct lws *wsi, lws_sockfd_type accept_fd, char from_pollin)
129*1c60b9acSAndroid Build Coastguard Worker {
130*1c60b9acSAndroid Build Coastguard Worker struct lws_context *context = wsi->a.context;
131*1c60b9acSAndroid Build Coastguard Worker struct lws_context_per_thread *pt = &context->pt[(int)wsi->tsi];
132*1c60b9acSAndroid Build Coastguard Worker struct lws_vhost *vh;
133*1c60b9acSAndroid Build Coastguard Worker ssize_t s;
134*1c60b9acSAndroid Build Coastguard Worker int n;
135*1c60b9acSAndroid Build Coastguard Worker
136*1c60b9acSAndroid Build Coastguard Worker if (!LWS_SSL_ENABLED(wsi->a.vhost))
137*1c60b9acSAndroid Build Coastguard Worker return 0;
138*1c60b9acSAndroid Build Coastguard Worker
139*1c60b9acSAndroid Build Coastguard Worker switch (lwsi_state(wsi)) {
140*1c60b9acSAndroid Build Coastguard Worker case LRS_SSL_INIT:
141*1c60b9acSAndroid Build Coastguard Worker
142*1c60b9acSAndroid Build Coastguard Worker if (wsi->tls.ssl)
143*1c60b9acSAndroid Build Coastguard Worker lwsl_err("%s: leaking ssl\n", __func__);
144*1c60b9acSAndroid Build Coastguard Worker if (accept_fd == LWS_SOCK_INVALID)
145*1c60b9acSAndroid Build Coastguard Worker assert(0);
146*1c60b9acSAndroid Build Coastguard Worker
147*1c60b9acSAndroid Build Coastguard Worker if (lws_tls_restrict_borrow(wsi)) {
148*1c60b9acSAndroid Build Coastguard Worker lwsl_err("%s: failed on ssl restriction\n", __func__);
149*1c60b9acSAndroid Build Coastguard Worker return 1;
150*1c60b9acSAndroid Build Coastguard Worker }
151*1c60b9acSAndroid Build Coastguard Worker
152*1c60b9acSAndroid Build Coastguard Worker if (lws_tls_server_new_nonblocking(wsi, accept_fd)) {
153*1c60b9acSAndroid Build Coastguard Worker lwsl_err("%s: failed on lws_tls_server_new_nonblocking\n", __func__);
154*1c60b9acSAndroid Build Coastguard Worker if (accept_fd != LWS_SOCK_INVALID)
155*1c60b9acSAndroid Build Coastguard Worker compatible_close(accept_fd);
156*1c60b9acSAndroid Build Coastguard Worker lws_tls_restrict_return(wsi);
157*1c60b9acSAndroid Build Coastguard Worker goto fail;
158*1c60b9acSAndroid Build Coastguard Worker }
159*1c60b9acSAndroid Build Coastguard Worker
160*1c60b9acSAndroid Build Coastguard Worker /*
161*1c60b9acSAndroid Build Coastguard Worker * we are not accepted yet, but we need to enter ourselves
162*1c60b9acSAndroid Build Coastguard Worker * as a live connection. That way we can retry when more
163*1c60b9acSAndroid Build Coastguard Worker * pieces come if we're not sorted yet
164*1c60b9acSAndroid Build Coastguard Worker */
165*1c60b9acSAndroid Build Coastguard Worker lwsi_set_state(wsi, LRS_SSL_ACK_PENDING);
166*1c60b9acSAndroid Build Coastguard Worker
167*1c60b9acSAndroid Build Coastguard Worker lws_pt_lock(pt, __func__);
168*1c60b9acSAndroid Build Coastguard Worker if (__insert_wsi_socket_into_fds(context, wsi)) {
169*1c60b9acSAndroid Build Coastguard Worker lwsl_err("%s: failed to insert into fds\n", __func__);
170*1c60b9acSAndroid Build Coastguard Worker goto fail;
171*1c60b9acSAndroid Build Coastguard Worker }
172*1c60b9acSAndroid Build Coastguard Worker lws_pt_unlock(pt);
173*1c60b9acSAndroid Build Coastguard Worker
174*1c60b9acSAndroid Build Coastguard Worker lws_set_timeout(wsi, PENDING_TIMEOUT_SSL_ACCEPT,
175*1c60b9acSAndroid Build Coastguard Worker (int)context->timeout_secs);
176*1c60b9acSAndroid Build Coastguard Worker
177*1c60b9acSAndroid Build Coastguard Worker lwsl_debug("inserted SSL accept into fds, trying SSL_accept\n");
178*1c60b9acSAndroid Build Coastguard Worker
179*1c60b9acSAndroid Build Coastguard Worker /* fallthru */
180*1c60b9acSAndroid Build Coastguard Worker
181*1c60b9acSAndroid Build Coastguard Worker case LRS_SSL_ACK_PENDING:
182*1c60b9acSAndroid Build Coastguard Worker
183*1c60b9acSAndroid Build Coastguard Worker if (lws_change_pollfd(wsi, LWS_POLLOUT, 0)) {
184*1c60b9acSAndroid Build Coastguard Worker lwsl_err("%s: lws_change_pollfd failed\n", __func__);
185*1c60b9acSAndroid Build Coastguard Worker goto fail;
186*1c60b9acSAndroid Build Coastguard Worker }
187*1c60b9acSAndroid Build Coastguard Worker
188*1c60b9acSAndroid Build Coastguard Worker if (wsi->a.vhost->tls.allow_non_ssl_on_ssl_port && !wsi->skip_fallback) {
189*1c60b9acSAndroid Build Coastguard Worker /*
190*1c60b9acSAndroid Build Coastguard Worker * We came here by POLLIN, so there is supposed to be
191*1c60b9acSAndroid Build Coastguard Worker * something to read...
192*1c60b9acSAndroid Build Coastguard Worker */
193*1c60b9acSAndroid Build Coastguard Worker
194*1c60b9acSAndroid Build Coastguard Worker s = recv(wsi->desc.sockfd, (char *)pt->serv_buf,
195*1c60b9acSAndroid Build Coastguard Worker context->pt_serv_buf_size, MSG_PEEK);
196*1c60b9acSAndroid Build Coastguard Worker /*
197*1c60b9acSAndroid Build Coastguard Worker * We have LWS_SERVER_OPTION_ALLOW_NON_SSL_ON_SSL_PORT..
198*1c60b9acSAndroid Build Coastguard Worker * this just means don't hang up on him because of no
199*1c60b9acSAndroid Build Coastguard Worker * tls hello... what happens next is driven by
200*1c60b9acSAndroid Build Coastguard Worker * additional option flags:
201*1c60b9acSAndroid Build Coastguard Worker *
202*1c60b9acSAndroid Build Coastguard Worker * none: fail the connection
203*1c60b9acSAndroid Build Coastguard Worker *
204*1c60b9acSAndroid Build Coastguard Worker * LWS_SERVER_OPTION_REDIRECT_HTTP_TO_HTTPS:
205*1c60b9acSAndroid Build Coastguard Worker * Destroy the TLS, issue a redirect using plaintext
206*1c60b9acSAndroid Build Coastguard Worker * http (this may not be accepted by a client that
207*1c60b9acSAndroid Build Coastguard Worker * has visited the site before and received an STS
208*1c60b9acSAndroid Build Coastguard Worker * header).
209*1c60b9acSAndroid Build Coastguard Worker *
210*1c60b9acSAndroid Build Coastguard Worker * LWS_SERVER_OPTION_ALLOW_HTTP_ON_HTTPS_LISTENER:
211*1c60b9acSAndroid Build Coastguard Worker * Destroy the TLS, continue and serve normally
212*1c60b9acSAndroid Build Coastguard Worker * using http
213*1c60b9acSAndroid Build Coastguard Worker *
214*1c60b9acSAndroid Build Coastguard Worker * LWS_SERVER_OPTION_FALLBACK_TO_APPLY_LISTEN_ACCEPT_CONFIG:
215*1c60b9acSAndroid Build Coastguard Worker * Destroy the TLS, apply whatever role and protocol
216*1c60b9acSAndroid Build Coastguard Worker * were told in the vhost info struct
217*1c60b9acSAndroid Build Coastguard Worker * .listen_accept_role / .listen_accept_protocol and
218*1c60b9acSAndroid Build Coastguard Worker * continue with that
219*1c60b9acSAndroid Build Coastguard Worker */
220*1c60b9acSAndroid Build Coastguard Worker
221*1c60b9acSAndroid Build Coastguard Worker if (s >= 1 && pt->serv_buf[0] >= ' ') {
222*1c60b9acSAndroid Build Coastguard Worker /*
223*1c60b9acSAndroid Build Coastguard Worker * TLS content-type for Handshake is 0x16, and
224*1c60b9acSAndroid Build Coastguard Worker * for ChangeCipherSpec Record, it's 0x14
225*1c60b9acSAndroid Build Coastguard Worker *
226*1c60b9acSAndroid Build Coastguard Worker * A non-ssl session will start with the HTTP
227*1c60b9acSAndroid Build Coastguard Worker * method in ASCII. If we see it's not a legit
228*1c60b9acSAndroid Build Coastguard Worker * SSL handshake kill the SSL for this
229*1c60b9acSAndroid Build Coastguard Worker * connection and try to handle as a HTTP
230*1c60b9acSAndroid Build Coastguard Worker * connection upgrade directly.
231*1c60b9acSAndroid Build Coastguard Worker */
232*1c60b9acSAndroid Build Coastguard Worker wsi->tls.use_ssl = 0;
233*1c60b9acSAndroid Build Coastguard Worker
234*1c60b9acSAndroid Build Coastguard Worker lws_tls_server_abort_connection(wsi);
235*1c60b9acSAndroid Build Coastguard Worker /*
236*1c60b9acSAndroid Build Coastguard Worker * care... this creates wsi with no ssl when ssl
237*1c60b9acSAndroid Build Coastguard Worker * is enabled and normally mandatory
238*1c60b9acSAndroid Build Coastguard Worker */
239*1c60b9acSAndroid Build Coastguard Worker wsi->tls.ssl = NULL;
240*1c60b9acSAndroid Build Coastguard Worker
241*1c60b9acSAndroid Build Coastguard Worker if (lws_check_opt(wsi->a.vhost->options,
242*1c60b9acSAndroid Build Coastguard Worker LWS_SERVER_OPTION_REDIRECT_HTTP_TO_HTTPS)) {
243*1c60b9acSAndroid Build Coastguard Worker lwsl_info("%s: redirecting from http "
244*1c60b9acSAndroid Build Coastguard Worker "to https\n", __func__);
245*1c60b9acSAndroid Build Coastguard Worker wsi->tls.redirect_to_https = 1;
246*1c60b9acSAndroid Build Coastguard Worker goto notls_accepted;
247*1c60b9acSAndroid Build Coastguard Worker }
248*1c60b9acSAndroid Build Coastguard Worker
249*1c60b9acSAndroid Build Coastguard Worker if (lws_check_opt(wsi->a.vhost->options,
250*1c60b9acSAndroid Build Coastguard Worker LWS_SERVER_OPTION_ALLOW_HTTP_ON_HTTPS_LISTENER)) {
251*1c60b9acSAndroid Build Coastguard Worker lwsl_info("%s: allowing unencrypted "
252*1c60b9acSAndroid Build Coastguard Worker "http service on tls port\n",
253*1c60b9acSAndroid Build Coastguard Worker __func__);
254*1c60b9acSAndroid Build Coastguard Worker goto notls_accepted;
255*1c60b9acSAndroid Build Coastguard Worker }
256*1c60b9acSAndroid Build Coastguard Worker
257*1c60b9acSAndroid Build Coastguard Worker if (lws_check_opt(wsi->a.vhost->options,
258*1c60b9acSAndroid Build Coastguard Worker LWS_SERVER_OPTION_FALLBACK_TO_APPLY_LISTEN_ACCEPT_CONFIG)) {
259*1c60b9acSAndroid Build Coastguard Worker if (lws_http_to_fallback(wsi, NULL, 0))
260*1c60b9acSAndroid Build Coastguard Worker goto fail;
261*1c60b9acSAndroid Build Coastguard Worker lwsl_info("%s: allowing non-tls "
262*1c60b9acSAndroid Build Coastguard Worker "fallback\n", __func__);
263*1c60b9acSAndroid Build Coastguard Worker goto notls_accepted;
264*1c60b9acSAndroid Build Coastguard Worker }
265*1c60b9acSAndroid Build Coastguard Worker
266*1c60b9acSAndroid Build Coastguard Worker lwsl_notice("%s: client did not send a valid "
267*1c60b9acSAndroid Build Coastguard Worker "tls hello (default vhost %s)\n",
268*1c60b9acSAndroid Build Coastguard Worker __func__, wsi->a.vhost->name);
269*1c60b9acSAndroid Build Coastguard Worker goto fail;
270*1c60b9acSAndroid Build Coastguard Worker }
271*1c60b9acSAndroid Build Coastguard Worker if (!s) {
272*1c60b9acSAndroid Build Coastguard Worker /*
273*1c60b9acSAndroid Build Coastguard Worker * POLLIN but nothing to read is supposed to
274*1c60b9acSAndroid Build Coastguard Worker * mean the connection is gone, we should
275*1c60b9acSAndroid Build Coastguard Worker * fail out...
276*1c60b9acSAndroid Build Coastguard Worker *
277*1c60b9acSAndroid Build Coastguard Worker */
278*1c60b9acSAndroid Build Coastguard Worker lwsl_debug("%s: PEEKed 0 (from_pollin %d)\n",
279*1c60b9acSAndroid Build Coastguard Worker __func__, from_pollin);
280*1c60b9acSAndroid Build Coastguard Worker if (!from_pollin)
281*1c60b9acSAndroid Build Coastguard Worker /*
282*1c60b9acSAndroid Build Coastguard Worker * If this wasn't actually info from a
283*1c60b9acSAndroid Build Coastguard Worker * pollin let it go around again until
284*1c60b9acSAndroid Build Coastguard Worker * either data came or we still get told
285*1c60b9acSAndroid Build Coastguard Worker * zero length peek AND POLLIN
286*1c60b9acSAndroid Build Coastguard Worker */
287*1c60b9acSAndroid Build Coastguard Worker goto punt;
288*1c60b9acSAndroid Build Coastguard Worker
289*1c60b9acSAndroid Build Coastguard Worker /*
290*1c60b9acSAndroid Build Coastguard Worker * treat as remote closed
291*1c60b9acSAndroid Build Coastguard Worker */
292*1c60b9acSAndroid Build Coastguard Worker
293*1c60b9acSAndroid Build Coastguard Worker goto fail;
294*1c60b9acSAndroid Build Coastguard Worker }
295*1c60b9acSAndroid Build Coastguard Worker if (s < 0 && (LWS_ERRNO == LWS_EAGAIN ||
296*1c60b9acSAndroid Build Coastguard Worker LWS_ERRNO == LWS_EWOULDBLOCK)) {
297*1c60b9acSAndroid Build Coastguard Worker
298*1c60b9acSAndroid Build Coastguard Worker punt:
299*1c60b9acSAndroid Build Coastguard Worker /*
300*1c60b9acSAndroid Build Coastguard Worker * well, we get no way to know ssl or not
301*1c60b9acSAndroid Build Coastguard Worker * so go around again waiting for something
302*1c60b9acSAndroid Build Coastguard Worker * to come and give us a hint, or timeout the
303*1c60b9acSAndroid Build Coastguard Worker * connection.
304*1c60b9acSAndroid Build Coastguard Worker */
305*1c60b9acSAndroid Build Coastguard Worker if (lws_change_pollfd(wsi, 0, LWS_POLLIN)) {
306*1c60b9acSAndroid Build Coastguard Worker lwsl_err("%s: change_pollfd failed\n",
307*1c60b9acSAndroid Build Coastguard Worker __func__);
308*1c60b9acSAndroid Build Coastguard Worker return -1;
309*1c60b9acSAndroid Build Coastguard Worker }
310*1c60b9acSAndroid Build Coastguard Worker
311*1c60b9acSAndroid Build Coastguard Worker lwsl_info("SSL_ERROR_WANT_READ\n");
312*1c60b9acSAndroid Build Coastguard Worker return 0;
313*1c60b9acSAndroid Build Coastguard Worker }
314*1c60b9acSAndroid Build Coastguard Worker }
315*1c60b9acSAndroid Build Coastguard Worker
316*1c60b9acSAndroid Build Coastguard Worker /* normal SSL connection processing path */
317*1c60b9acSAndroid Build Coastguard Worker
318*1c60b9acSAndroid Build Coastguard Worker errno = 0;
319*1c60b9acSAndroid Build Coastguard Worker n = lws_tls_server_accept(wsi);
320*1c60b9acSAndroid Build Coastguard Worker lwsl_info("SSL_accept says %d\n", n);
321*1c60b9acSAndroid Build Coastguard Worker switch (n) {
322*1c60b9acSAndroid Build Coastguard Worker case LWS_SSL_CAPABLE_DONE:
323*1c60b9acSAndroid Build Coastguard Worker lws_tls_restrict_return_handshake(wsi);
324*1c60b9acSAndroid Build Coastguard Worker break;
325*1c60b9acSAndroid Build Coastguard Worker case LWS_SSL_CAPABLE_ERROR:
326*1c60b9acSAndroid Build Coastguard Worker lws_tls_restrict_return_handshake(wsi);
327*1c60b9acSAndroid Build Coastguard Worker lwsl_info("%s: SSL_accept failed socket %u: %d\n",
328*1c60b9acSAndroid Build Coastguard Worker __func__, wsi->desc.sockfd, n);
329*1c60b9acSAndroid Build Coastguard Worker wsi->socket_is_permanently_unusable = 1;
330*1c60b9acSAndroid Build Coastguard Worker goto fail;
331*1c60b9acSAndroid Build Coastguard Worker
332*1c60b9acSAndroid Build Coastguard Worker default: /* MORE_SERVICE */
333*1c60b9acSAndroid Build Coastguard Worker return 0;
334*1c60b9acSAndroid Build Coastguard Worker }
335*1c60b9acSAndroid Build Coastguard Worker
336*1c60b9acSAndroid Build Coastguard Worker /* adapt our vhost to match the SNI SSL_CTX that was chosen */
337*1c60b9acSAndroid Build Coastguard Worker vh = context->vhost_list;
338*1c60b9acSAndroid Build Coastguard Worker while (vh) {
339*1c60b9acSAndroid Build Coastguard Worker if (!vh->being_destroyed && wsi->tls.ssl &&
340*1c60b9acSAndroid Build Coastguard Worker vh->tls.ssl_ctx == lws_tls_ctx_from_wsi(wsi)) {
341*1c60b9acSAndroid Build Coastguard Worker lwsl_info("setting wsi to vh %s\n", vh->name);
342*1c60b9acSAndroid Build Coastguard Worker lws_vhost_bind_wsi(vh, wsi);
343*1c60b9acSAndroid Build Coastguard Worker break;
344*1c60b9acSAndroid Build Coastguard Worker }
345*1c60b9acSAndroid Build Coastguard Worker vh = vh->vhost_next;
346*1c60b9acSAndroid Build Coastguard Worker }
347*1c60b9acSAndroid Build Coastguard Worker
348*1c60b9acSAndroid Build Coastguard Worker /* OK, we are accepted... give him some time to negotiate */
349*1c60b9acSAndroid Build Coastguard Worker lws_set_timeout(wsi, PENDING_TIMEOUT_ESTABLISH_WITH_SERVER,
350*1c60b9acSAndroid Build Coastguard Worker (int)context->timeout_secs);
351*1c60b9acSAndroid Build Coastguard Worker
352*1c60b9acSAndroid Build Coastguard Worker lwsi_set_state(wsi, LRS_ESTABLISHED);
353*1c60b9acSAndroid Build Coastguard Worker if (lws_tls_server_conn_alpn(wsi)) {
354*1c60b9acSAndroid Build Coastguard Worker lwsl_warn("%s: fail on alpn\n", __func__);
355*1c60b9acSAndroid Build Coastguard Worker goto fail;
356*1c60b9acSAndroid Build Coastguard Worker }
357*1c60b9acSAndroid Build Coastguard Worker lwsl_debug("accepted new SSL conn\n");
358*1c60b9acSAndroid Build Coastguard Worker break;
359*1c60b9acSAndroid Build Coastguard Worker
360*1c60b9acSAndroid Build Coastguard Worker default:
361*1c60b9acSAndroid Build Coastguard Worker break;
362*1c60b9acSAndroid Build Coastguard Worker }
363*1c60b9acSAndroid Build Coastguard Worker
364*1c60b9acSAndroid Build Coastguard Worker return 0;
365*1c60b9acSAndroid Build Coastguard Worker
366*1c60b9acSAndroid Build Coastguard Worker notls_accepted:
367*1c60b9acSAndroid Build Coastguard Worker lwsi_set_state(wsi, LRS_ESTABLISHED);
368*1c60b9acSAndroid Build Coastguard Worker
369*1c60b9acSAndroid Build Coastguard Worker return 0;
370*1c60b9acSAndroid Build Coastguard Worker
371*1c60b9acSAndroid Build Coastguard Worker fail:
372*1c60b9acSAndroid Build Coastguard Worker return 1;
373*1c60b9acSAndroid Build Coastguard Worker }
374*1c60b9acSAndroid Build Coastguard Worker
375