|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#include "curl_setup.h" |
|
|
|
|
|
#ifdef USE_RUSTLS |
|
|
|
|
|
#include "curl_printf.h" |
|
|
|
|
|
#include <errno.h> |
|
|
#include <rustls.h> |
|
|
|
|
|
#include "inet_pton.h" |
|
|
#include "urldata.h" |
|
|
#include "sendf.h" |
|
|
#include "vtls.h" |
|
|
#include "vtls_int.h" |
|
|
#include "rustls.h" |
|
|
#include "select.h" |
|
|
#include "strerror.h" |
|
|
#include "multiif.h" |
|
|
#include "connect.h" |
|
|
#include "cipher_suite.h" |
|
|
#include "rand.h" |
|
|
|
|
|
struct rustls_ssl_backend_data |
|
|
{ |
|
|
const struct rustls_client_config *config; |
|
|
struct rustls_connection *conn; |
|
|
size_t plain_out_buffered; |
|
|
BIT(data_in_pending); |
|
|
BIT(sent_shutdown); |
|
|
}; |
|
|
|
|
|
|
|
|
static CURLcode map_error(rustls_result r) |
|
|
{ |
|
|
if(rustls_result_is_cert_error(r)) { |
|
|
return CURLE_PEER_FAILED_VERIFICATION; |
|
|
} |
|
|
switch(r) { |
|
|
case RUSTLS_RESULT_OK: |
|
|
return CURLE_OK; |
|
|
case RUSTLS_RESULT_NULL_PARAMETER: |
|
|
return CURLE_BAD_FUNCTION_ARGUMENT; |
|
|
default: |
|
|
return CURLE_RECV_ERROR; |
|
|
} |
|
|
} |
|
|
|
|
|
static bool |
|
|
cr_data_pending(struct Curl_cfilter *cf, const struct Curl_easy *data) |
|
|
{ |
|
|
struct ssl_connect_data *ctx = cf->ctx; |
|
|
struct rustls_ssl_backend_data *backend; |
|
|
|
|
|
(void)data; |
|
|
DEBUGASSERT(ctx && ctx->backend); |
|
|
backend = (struct rustls_ssl_backend_data *)ctx->backend; |
|
|
return backend->data_in_pending; |
|
|
} |
|
|
|
|
|
struct io_ctx { |
|
|
struct Curl_cfilter *cf; |
|
|
struct Curl_easy *data; |
|
|
}; |
|
|
|
|
|
static int |
|
|
read_cb(void *userdata, uint8_t *buf, uintptr_t len, uintptr_t *out_n) |
|
|
{ |
|
|
struct io_ctx *io_ctx = userdata; |
|
|
struct ssl_connect_data *const connssl = io_ctx->cf->ctx; |
|
|
CURLcode result; |
|
|
int ret = 0; |
|
|
ssize_t nread = Curl_conn_cf_recv(io_ctx->cf->next, io_ctx->data, |
|
|
(char *)buf, len, &result); |
|
|
if(nread < 0) { |
|
|
nread = 0; |
|
|
if(CURLE_AGAIN == result) |
|
|
ret = EAGAIN; |
|
|
else |
|
|
ret = EINVAL; |
|
|
} |
|
|
else if(nread == 0) |
|
|
connssl->peer_closed = TRUE; |
|
|
*out_n = (uintptr_t)nread; |
|
|
CURL_TRC_CF(io_ctx->data, io_ctx->cf, "cf->next recv(len=%zu) -> %zd, %d", |
|
|
len, nread, result); |
|
|
return ret; |
|
|
} |
|
|
|
|
|
static int |
|
|
write_cb(void *userdata, const uint8_t *buf, uintptr_t len, uintptr_t *out_n) |
|
|
{ |
|
|
struct io_ctx *io_ctx = userdata; |
|
|
CURLcode result; |
|
|
int ret = 0; |
|
|
ssize_t nwritten = Curl_conn_cf_send(io_ctx->cf->next, io_ctx->data, |
|
|
(const char *)buf, len, FALSE, |
|
|
&result); |
|
|
if(nwritten < 0) { |
|
|
nwritten = 0; |
|
|
if(CURLE_AGAIN == result) |
|
|
ret = EAGAIN; |
|
|
else |
|
|
ret = EINVAL; |
|
|
} |
|
|
*out_n = (uintptr_t)nwritten; |
|
|
CURL_TRC_CF(io_ctx->data, io_ctx->cf, "cf->next send(len=%zu) -> %zd, %d", |
|
|
len, nwritten, result); |
|
|
return ret; |
|
|
} |
|
|
|
|
|
static ssize_t tls_recv_more(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data, CURLcode *err) |
|
|
{ |
|
|
struct ssl_connect_data *const connssl = cf->ctx; |
|
|
struct rustls_ssl_backend_data *const backend = |
|
|
(struct rustls_ssl_backend_data *)connssl->backend; |
|
|
struct io_ctx io_ctx; |
|
|
size_t tls_bytes_read = 0; |
|
|
rustls_io_result io_error; |
|
|
rustls_result rresult = 0; |
|
|
|
|
|
io_ctx.cf = cf; |
|
|
io_ctx.data = data; |
|
|
io_error = rustls_connection_read_tls(backend->conn, read_cb, &io_ctx, |
|
|
&tls_bytes_read); |
|
|
if(io_error == EAGAIN || io_error == EWOULDBLOCK) { |
|
|
*err = CURLE_AGAIN; |
|
|
return -1; |
|
|
} |
|
|
else if(io_error) { |
|
|
char buffer[STRERROR_LEN]; |
|
|
failf(data, "reading from socket: %s", |
|
|
Curl_strerror(io_error, buffer, sizeof(buffer))); |
|
|
*err = CURLE_RECV_ERROR; |
|
|
return -1; |
|
|
} |
|
|
|
|
|
rresult = rustls_connection_process_new_packets(backend->conn); |
|
|
if(rresult != RUSTLS_RESULT_OK) { |
|
|
char errorbuf[255]; |
|
|
size_t errorlen; |
|
|
rustls_error(rresult, errorbuf, sizeof(errorbuf), &errorlen); |
|
|
failf(data, "rustls_connection_process_new_packets: %.*s", |
|
|
(int)errorlen, errorbuf); |
|
|
*err = map_error(rresult); |
|
|
return -1; |
|
|
} |
|
|
|
|
|
backend->data_in_pending = TRUE; |
|
|
*err = CURLE_OK; |
|
|
return (ssize_t)tls_bytes_read; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static ssize_t |
|
|
cr_recv(struct Curl_cfilter *cf, struct Curl_easy *data, |
|
|
char *plainbuf, size_t plainlen, CURLcode *err) |
|
|
{ |
|
|
struct ssl_connect_data *const connssl = cf->ctx; |
|
|
struct rustls_ssl_backend_data *const backend = |
|
|
(struct rustls_ssl_backend_data *)connssl->backend; |
|
|
struct rustls_connection *rconn = NULL; |
|
|
size_t n = 0; |
|
|
size_t plain_bytes_copied = 0; |
|
|
rustls_result rresult = 0; |
|
|
ssize_t nread; |
|
|
bool eof = FALSE; |
|
|
|
|
|
DEBUGASSERT(backend); |
|
|
rconn = backend->conn; |
|
|
|
|
|
while(plain_bytes_copied < plainlen) { |
|
|
if(!backend->data_in_pending) { |
|
|
if(tls_recv_more(cf, data, err) < 0) { |
|
|
if(*err != CURLE_AGAIN) { |
|
|
nread = -1; |
|
|
goto out; |
|
|
} |
|
|
break; |
|
|
} |
|
|
} |
|
|
|
|
|
rresult = rustls_connection_read(rconn, |
|
|
(uint8_t *)plainbuf + plain_bytes_copied, |
|
|
plainlen - plain_bytes_copied, |
|
|
&n); |
|
|
if(rresult == RUSTLS_RESULT_PLAINTEXT_EMPTY) { |
|
|
backend->data_in_pending = FALSE; |
|
|
} |
|
|
else if(rresult == RUSTLS_RESULT_UNEXPECTED_EOF) { |
|
|
failf(data, "rustls: peer closed TCP connection " |
|
|
"without first closing TLS connection"); |
|
|
*err = CURLE_RECV_ERROR; |
|
|
nread = -1; |
|
|
goto out; |
|
|
} |
|
|
else if(rresult != RUSTLS_RESULT_OK) { |
|
|
|
|
|
char errorbuf[255]; |
|
|
size_t errorlen; |
|
|
rustls_error(rresult, errorbuf, sizeof(errorbuf), &errorlen); |
|
|
failf(data, "rustls_connection_read: %.*s", (int)errorlen, errorbuf); |
|
|
*err = CURLE_RECV_ERROR; |
|
|
nread = -1; |
|
|
goto out; |
|
|
} |
|
|
else if(n == 0) { |
|
|
|
|
|
|
|
|
|
|
|
eof = TRUE; |
|
|
break; |
|
|
} |
|
|
else { |
|
|
plain_bytes_copied += n; |
|
|
} |
|
|
} |
|
|
|
|
|
if(plain_bytes_copied) { |
|
|
*err = CURLE_OK; |
|
|
nread = (ssize_t)plain_bytes_copied; |
|
|
} |
|
|
else if(eof) { |
|
|
*err = CURLE_OK; |
|
|
nread = 0; |
|
|
} |
|
|
else { |
|
|
*err = CURLE_AGAIN; |
|
|
nread = -1; |
|
|
} |
|
|
|
|
|
out: |
|
|
CURL_TRC_CF(data, cf, "cf_recv(len=%zu) -> %zd, %d", |
|
|
plainlen, nread, *err); |
|
|
return nread; |
|
|
} |
|
|
|
|
|
static CURLcode cr_flush_out(struct Curl_cfilter *cf, struct Curl_easy *data, |
|
|
struct rustls_connection *rconn) |
|
|
{ |
|
|
struct io_ctx io_ctx; |
|
|
rustls_io_result io_error; |
|
|
size_t tlswritten = 0; |
|
|
size_t tlswritten_total = 0; |
|
|
CURLcode result = CURLE_OK; |
|
|
|
|
|
io_ctx.cf = cf; |
|
|
io_ctx.data = data; |
|
|
|
|
|
while(rustls_connection_wants_write(rconn)) { |
|
|
io_error = rustls_connection_write_tls(rconn, write_cb, &io_ctx, |
|
|
&tlswritten); |
|
|
if(io_error == EAGAIN || io_error == EWOULDBLOCK) { |
|
|
CURL_TRC_CF(data, cf, "cf_send: EAGAIN after %zu bytes", |
|
|
tlswritten_total); |
|
|
return CURLE_AGAIN; |
|
|
} |
|
|
else if(io_error) { |
|
|
char buffer[STRERROR_LEN]; |
|
|
failf(data, "writing to socket: %s", |
|
|
Curl_strerror(io_error, buffer, sizeof(buffer))); |
|
|
return CURLE_SEND_ERROR; |
|
|
} |
|
|
if(tlswritten == 0) { |
|
|
failf(data, "EOF in swrite"); |
|
|
return CURLE_SEND_ERROR; |
|
|
} |
|
|
CURL_TRC_CF(data, cf, "cf_send: wrote %zu TLS bytes", tlswritten); |
|
|
tlswritten_total += tlswritten; |
|
|
} |
|
|
return result; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static ssize_t |
|
|
cr_send(struct Curl_cfilter *cf, struct Curl_easy *data, |
|
|
const void *plainbuf, size_t plainlen, CURLcode *err) |
|
|
{ |
|
|
struct ssl_connect_data *const connssl = cf->ctx; |
|
|
struct rustls_ssl_backend_data *const backend = |
|
|
(struct rustls_ssl_backend_data *)connssl->backend; |
|
|
struct rustls_connection *rconn = NULL; |
|
|
size_t plainwritten = 0; |
|
|
rustls_result rresult; |
|
|
char errorbuf[256]; |
|
|
size_t errorlen; |
|
|
const unsigned char *buf = plainbuf; |
|
|
size_t blen = plainlen; |
|
|
ssize_t nwritten = 0; |
|
|
|
|
|
DEBUGASSERT(backend); |
|
|
rconn = backend->conn; |
|
|
DEBUGASSERT(rconn); |
|
|
|
|
|
CURL_TRC_CF(data, cf, "cf_send(len=%zu)", plainlen); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if(backend->plain_out_buffered) { |
|
|
*err = cr_flush_out(cf, data, rconn); |
|
|
CURL_TRC_CF(data, cf, "cf_send: flushing %zu previously added bytes -> %d", |
|
|
backend->plain_out_buffered, *err); |
|
|
if(*err) |
|
|
return -1; |
|
|
if(blen > backend->plain_out_buffered) { |
|
|
blen -= backend->plain_out_buffered; |
|
|
buf += backend->plain_out_buffered; |
|
|
} |
|
|
else |
|
|
blen = 0; |
|
|
nwritten += (ssize_t)backend->plain_out_buffered; |
|
|
backend->plain_out_buffered = 0; |
|
|
} |
|
|
|
|
|
if(blen > 0) { |
|
|
CURL_TRC_CF(data, cf, "cf_send: adding %zu plain bytes to Rustls", blen); |
|
|
rresult = rustls_connection_write(rconn, buf, blen, &plainwritten); |
|
|
if(rresult != RUSTLS_RESULT_OK) { |
|
|
rustls_error(rresult, errorbuf, sizeof(errorbuf), &errorlen); |
|
|
failf(data, "rustls_connection_write: %.*s", (int)errorlen, errorbuf); |
|
|
*err = CURLE_WRITE_ERROR; |
|
|
return -1; |
|
|
} |
|
|
else if(plainwritten == 0) { |
|
|
failf(data, "rustls_connection_write: EOF"); |
|
|
*err = CURLE_WRITE_ERROR; |
|
|
return -1; |
|
|
} |
|
|
} |
|
|
|
|
|
*err = cr_flush_out(cf, data, rconn); |
|
|
if(*err) { |
|
|
if(CURLE_AGAIN == *err) { |
|
|
|
|
|
|
|
|
CURL_TRC_CF(data, cf, "cf_send: EAGAIN, remember we added %zu plain" |
|
|
" bytes already to Rustls", blen); |
|
|
backend->plain_out_buffered = plainwritten; |
|
|
if(nwritten) { |
|
|
*err = CURLE_OK; |
|
|
return (ssize_t)nwritten; |
|
|
} |
|
|
} |
|
|
return -1; |
|
|
} |
|
|
else |
|
|
nwritten += (ssize_t)plainwritten; |
|
|
|
|
|
CURL_TRC_CF(data, cf, "cf_send(len=%zu) -> %d, %zd", |
|
|
plainlen, *err, nwritten); |
|
|
return nwritten; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
static uint32_t |
|
|
cr_verify_none(void *userdata UNUSED_PARAM, |
|
|
const rustls_verify_server_cert_params *params UNUSED_PARAM) |
|
|
{ |
|
|
return RUSTLS_RESULT_OK; |
|
|
} |
|
|
|
|
|
static int |
|
|
read_file_into(const char *filename, |
|
|
struct dynbuf *out) |
|
|
{ |
|
|
FILE *f = fopen(filename, FOPEN_READTEXT); |
|
|
if(!f) { |
|
|
return 0; |
|
|
} |
|
|
|
|
|
while(!feof(f)) { |
|
|
uint8_t buf[256]; |
|
|
size_t rr = fread(buf, 1, sizeof(buf), f); |
|
|
if(rr == 0 || |
|
|
CURLE_OK != Curl_dyn_addn(out, buf, rr)) { |
|
|
fclose(f); |
|
|
return 0; |
|
|
} |
|
|
} |
|
|
|
|
|
return fclose(f) == 0; |
|
|
} |
|
|
|
|
|
static void |
|
|
cr_get_selected_ciphers(struct Curl_easy *data, |
|
|
const char *ciphers12, |
|
|
const char *ciphers13, |
|
|
const struct rustls_supported_ciphersuite **selected, |
|
|
size_t *selected_size) |
|
|
{ |
|
|
size_t supported_len = *selected_size; |
|
|
size_t default_len = rustls_default_crypto_provider_ciphersuites_len(); |
|
|
const struct rustls_supported_ciphersuite *entry; |
|
|
const char *ciphers = ciphers12; |
|
|
size_t count = 0, default13_count = 0, i, j; |
|
|
const char *ptr, *end; |
|
|
|
|
|
DEBUGASSERT(default_len <= supported_len); |
|
|
|
|
|
if(!ciphers13) { |
|
|
|
|
|
for(j = 0; j < default_len; j++) { |
|
|
entry = rustls_default_crypto_provider_ciphersuites_get(j); |
|
|
if(rustls_supported_ciphersuite_protocol_version(entry) != |
|
|
RUSTLS_TLS_VERSION_TLSV1_3) |
|
|
continue; |
|
|
|
|
|
selected[count++] = entry; |
|
|
} |
|
|
|
|
|
default13_count = count; |
|
|
|
|
|
if(!ciphers) |
|
|
ciphers = ""; |
|
|
} |
|
|
else |
|
|
ciphers = ciphers13; |
|
|
|
|
|
add_ciphers: |
|
|
for(ptr = ciphers; ptr[0] != '\0' && count < supported_len; ptr = end) { |
|
|
uint16_t id = Curl_cipher_suite_walk_str(&ptr, &end); |
|
|
|
|
|
|
|
|
if(id) { |
|
|
for(i = 0; i < supported_len; i++) { |
|
|
entry = rustls_default_crypto_provider_ciphersuites_get(i); |
|
|
if(rustls_supported_ciphersuite_get_suite(entry) == id) |
|
|
break; |
|
|
} |
|
|
if(i == supported_len) |
|
|
id = 0; |
|
|
} |
|
|
if(!id) { |
|
|
if(ptr[0] != '\0') |
|
|
infof(data, "rustls: unknown cipher in list: \"%.*s\"", |
|
|
(int) (end - ptr), ptr); |
|
|
continue; |
|
|
} |
|
|
|
|
|
|
|
|
for(i = 0; i < count && selected[i] != entry; i++); |
|
|
if(i < count) { |
|
|
if(i >= default13_count) |
|
|
infof(data, "rustls: duplicate cipher in list: \"%.*s\"", |
|
|
(int) (end - ptr), ptr); |
|
|
continue; |
|
|
} |
|
|
|
|
|
selected[count++] = entry; |
|
|
} |
|
|
|
|
|
if(ciphers == ciphers13 && ciphers12) { |
|
|
ciphers = ciphers12; |
|
|
goto add_ciphers; |
|
|
} |
|
|
|
|
|
if(!ciphers12) { |
|
|
|
|
|
for(j = 0; j < default_len; j++) { |
|
|
entry = rustls_default_crypto_provider_ciphersuites_get(j); |
|
|
if(rustls_supported_ciphersuite_protocol_version(entry) == |
|
|
RUSTLS_TLS_VERSION_TLSV1_3) |
|
|
continue; |
|
|
|
|
|
|
|
|
for(i = 0; i < count && selected[i] != entry; i++); |
|
|
if(i < count) |
|
|
continue; |
|
|
|
|
|
selected[count++] = entry; |
|
|
} |
|
|
} |
|
|
|
|
|
*selected_size = count; |
|
|
} |
|
|
|
|
|
static CURLcode |
|
|
cr_init_backend(struct Curl_cfilter *cf, struct Curl_easy *data, |
|
|
struct rustls_ssl_backend_data *const backend) |
|
|
{ |
|
|
struct ssl_connect_data *connssl = cf->ctx; |
|
|
struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf); |
|
|
struct rustls_crypto_provider_builder *custom_provider_builder = NULL; |
|
|
const struct rustls_crypto_provider *custom_provider = NULL; |
|
|
struct rustls_connection *rconn = NULL; |
|
|
struct rustls_client_config_builder *config_builder = NULL; |
|
|
const struct rustls_root_cert_store *roots = NULL; |
|
|
struct rustls_root_cert_store_builder *roots_builder = NULL; |
|
|
struct rustls_web_pki_server_cert_verifier_builder *verifier_builder = NULL; |
|
|
struct rustls_server_cert_verifier *server_cert_verifier = NULL; |
|
|
const struct curl_blob *ca_info_blob = conn_config->ca_info_blob; |
|
|
const char * const ssl_cafile = |
|
|
|
|
|
(ca_info_blob ? NULL : conn_config->CAfile); |
|
|
const bool verifypeer = conn_config->verifypeer; |
|
|
char errorbuf[256]; |
|
|
size_t errorlen; |
|
|
rustls_result result; |
|
|
|
|
|
DEBUGASSERT(backend); |
|
|
rconn = backend->conn; |
|
|
|
|
|
{ |
|
|
uint16_t tls_versions[2] = { |
|
|
RUSTLS_TLS_VERSION_TLSV1_2, |
|
|
RUSTLS_TLS_VERSION_TLSV1_3, |
|
|
}; |
|
|
size_t tls_versions_len = 2; |
|
|
const struct rustls_supported_ciphersuite **cipher_suites; |
|
|
size_t cipher_suites_len = |
|
|
rustls_default_crypto_provider_ciphersuites_len(); |
|
|
|
|
|
switch(conn_config->version) { |
|
|
case CURL_SSLVERSION_DEFAULT: |
|
|
case CURL_SSLVERSION_TLSv1: |
|
|
case CURL_SSLVERSION_TLSv1_0: |
|
|
case CURL_SSLVERSION_TLSv1_1: |
|
|
case CURL_SSLVERSION_TLSv1_2: |
|
|
break; |
|
|
case CURL_SSLVERSION_TLSv1_3: |
|
|
tls_versions[0] = RUSTLS_TLS_VERSION_TLSV1_3; |
|
|
tls_versions_len = 1; |
|
|
break; |
|
|
default: |
|
|
failf(data, "rustls: unsupported minimum TLS version value"); |
|
|
return CURLE_BAD_FUNCTION_ARGUMENT; |
|
|
} |
|
|
|
|
|
switch(conn_config->version_max) { |
|
|
case CURL_SSLVERSION_MAX_DEFAULT: |
|
|
case CURL_SSLVERSION_MAX_NONE: |
|
|
case CURL_SSLVERSION_MAX_TLSv1_3: |
|
|
break; |
|
|
case CURL_SSLVERSION_MAX_TLSv1_2: |
|
|
if(tls_versions[0] == RUSTLS_TLS_VERSION_TLSV1_2) { |
|
|
tls_versions_len = 1; |
|
|
break; |
|
|
} |
|
|
FALLTHROUGH(); |
|
|
case CURL_SSLVERSION_MAX_TLSv1_1: |
|
|
case CURL_SSLVERSION_MAX_TLSv1_0: |
|
|
default: |
|
|
failf(data, "rustls: unsupported maximum TLS version value"); |
|
|
return CURLE_BAD_FUNCTION_ARGUMENT; |
|
|
} |
|
|
|
|
|
cipher_suites = malloc(sizeof(cipher_suites) * (cipher_suites_len)); |
|
|
if(!cipher_suites) |
|
|
return CURLE_OUT_OF_MEMORY; |
|
|
|
|
|
cr_get_selected_ciphers(data, |
|
|
conn_config->cipher_list, |
|
|
conn_config->cipher_list13, |
|
|
cipher_suites, &cipher_suites_len); |
|
|
if(cipher_suites_len == 0) { |
|
|
failf(data, "rustls: no supported cipher in list"); |
|
|
free(cipher_suites); |
|
|
return CURLE_SSL_CIPHER; |
|
|
} |
|
|
|
|
|
result = rustls_crypto_provider_builder_new_from_default( |
|
|
&custom_provider_builder); |
|
|
if(result != RUSTLS_RESULT_OK) { |
|
|
failf(data, |
|
|
"rustls: failed to create crypto provider builder from default"); |
|
|
return CURLE_SSL_CIPHER; |
|
|
} |
|
|
|
|
|
result = |
|
|
rustls_crypto_provider_builder_set_cipher_suites( |
|
|
custom_provider_builder, |
|
|
cipher_suites, |
|
|
cipher_suites_len); |
|
|
if(result != RUSTLS_RESULT_OK) { |
|
|
failf(data, |
|
|
"rustls: failed to set ciphersuites for crypto provider builder"); |
|
|
rustls_crypto_provider_builder_free(custom_provider_builder); |
|
|
return CURLE_SSL_CIPHER; |
|
|
} |
|
|
|
|
|
result = rustls_crypto_provider_builder_build( |
|
|
custom_provider_builder, &custom_provider); |
|
|
if(result != RUSTLS_RESULT_OK) { |
|
|
failf(data, "rustls: failed to build custom crypto provider"); |
|
|
rustls_crypto_provider_builder_free(custom_provider_builder); |
|
|
return CURLE_SSL_CIPHER; |
|
|
} |
|
|
|
|
|
result = rustls_client_config_builder_new_custom(custom_provider, |
|
|
tls_versions, |
|
|
tls_versions_len, |
|
|
&config_builder); |
|
|
free(cipher_suites); |
|
|
if(result != RUSTLS_RESULT_OK) { |
|
|
failf(data, "rustls: failed to create client config"); |
|
|
return CURLE_SSL_CIPHER; |
|
|
} |
|
|
} |
|
|
|
|
|
rustls_crypto_provider_builder_free(custom_provider_builder); |
|
|
rustls_crypto_provider_free(custom_provider); |
|
|
|
|
|
if(connssl->alpn) { |
|
|
struct alpn_proto_buf proto; |
|
|
rustls_slice_bytes alpn[ALPN_ENTRIES_MAX]; |
|
|
size_t i; |
|
|
|
|
|
for(i = 0; i < connssl->alpn->count; ++i) { |
|
|
alpn[i].data = (const uint8_t *)connssl->alpn->entries[i]; |
|
|
alpn[i].len = strlen(connssl->alpn->entries[i]); |
|
|
} |
|
|
rustls_client_config_builder_set_alpn_protocols(config_builder, alpn, |
|
|
connssl->alpn->count); |
|
|
Curl_alpn_to_proto_str(&proto, connssl->alpn); |
|
|
infof(data, VTLS_INFOF_ALPN_OFFER_1STR, proto.data); |
|
|
} |
|
|
if(!verifypeer) { |
|
|
rustls_client_config_builder_dangerous_set_certificate_verifier( |
|
|
config_builder, cr_verify_none); |
|
|
} |
|
|
else if(ca_info_blob || ssl_cafile) { |
|
|
roots_builder = rustls_root_cert_store_builder_new(); |
|
|
|
|
|
if(ca_info_blob) { |
|
|
|
|
|
result = rustls_root_cert_store_builder_add_pem(roots_builder, |
|
|
ca_info_blob->data, |
|
|
ca_info_blob->len, |
|
|
verifypeer); |
|
|
if(result != RUSTLS_RESULT_OK) { |
|
|
failf(data, "rustls: failed to parse trusted certificates from blob"); |
|
|
rustls_root_cert_store_builder_free(roots_builder); |
|
|
rustls_client_config_builder_free(config_builder); |
|
|
return CURLE_SSL_CACERT_BADFILE; |
|
|
} |
|
|
} |
|
|
else if(ssl_cafile) { |
|
|
|
|
|
result = rustls_root_cert_store_builder_load_roots_from_file( |
|
|
roots_builder, ssl_cafile, verifypeer); |
|
|
if(result != RUSTLS_RESULT_OK) { |
|
|
failf(data, "rustls: failed to load trusted certificates"); |
|
|
rustls_root_cert_store_builder_free(roots_builder); |
|
|
rustls_client_config_builder_free(config_builder); |
|
|
return CURLE_SSL_CACERT_BADFILE; |
|
|
} |
|
|
} |
|
|
|
|
|
result = rustls_root_cert_store_builder_build(roots_builder, &roots); |
|
|
rustls_root_cert_store_builder_free(roots_builder); |
|
|
if(result != RUSTLS_RESULT_OK) { |
|
|
failf(data, "rustls: failed to build trusted root certificate store"); |
|
|
rustls_client_config_builder_free(config_builder); |
|
|
return CURLE_SSL_CACERT_BADFILE; |
|
|
} |
|
|
|
|
|
verifier_builder = rustls_web_pki_server_cert_verifier_builder_new(roots); |
|
|
rustls_root_cert_store_free(roots); |
|
|
|
|
|
if(conn_config->CRLfile) { |
|
|
struct dynbuf crl_contents; |
|
|
Curl_dyn_init(&crl_contents, SIZE_MAX); |
|
|
if(!read_file_into(conn_config->CRLfile, &crl_contents)) { |
|
|
failf(data, "rustls: failed to read revocation list file"); |
|
|
Curl_dyn_free(&crl_contents); |
|
|
rustls_web_pki_server_cert_verifier_builder_free(verifier_builder); |
|
|
return CURLE_SSL_CRL_BADFILE; |
|
|
} |
|
|
|
|
|
result = rustls_web_pki_server_cert_verifier_builder_add_crl( |
|
|
verifier_builder, |
|
|
Curl_dyn_uptr(&crl_contents), |
|
|
Curl_dyn_len(&crl_contents)); |
|
|
Curl_dyn_free(&crl_contents); |
|
|
if(result != RUSTLS_RESULT_OK) { |
|
|
failf(data, "rustls: failed to parse revocation list"); |
|
|
rustls_web_pki_server_cert_verifier_builder_free(verifier_builder); |
|
|
return CURLE_SSL_CRL_BADFILE; |
|
|
} |
|
|
} |
|
|
|
|
|
result = rustls_web_pki_server_cert_verifier_builder_build( |
|
|
verifier_builder, &server_cert_verifier); |
|
|
rustls_web_pki_server_cert_verifier_builder_free(verifier_builder); |
|
|
if(result != RUSTLS_RESULT_OK) { |
|
|
failf(data, "rustls: failed to build certificate verifier"); |
|
|
rustls_server_cert_verifier_free(server_cert_verifier); |
|
|
rustls_client_config_builder_free(config_builder); |
|
|
return CURLE_SSL_CACERT_BADFILE; |
|
|
} |
|
|
|
|
|
rustls_client_config_builder_set_server_verifier(config_builder, |
|
|
server_cert_verifier); |
|
|
rustls_server_cert_verifier_free(server_cert_verifier); |
|
|
} |
|
|
|
|
|
result = rustls_client_config_builder_build( |
|
|
config_builder, |
|
|
&backend->config); |
|
|
if(result != RUSTLS_RESULT_OK) { |
|
|
failf(data, "rustls: failed to build client config"); |
|
|
rustls_client_config_free(backend->config); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
|
|
|
DEBUGASSERT(rconn == NULL); |
|
|
result = rustls_client_connection_new(backend->config, |
|
|
connssl->peer.hostname, &rconn); |
|
|
if(result != RUSTLS_RESULT_OK) { |
|
|
rustls_error(result, errorbuf, sizeof(errorbuf), &errorlen); |
|
|
failf(data, "rustls_client_connection_new: %.*s", (int)errorlen, errorbuf); |
|
|
return CURLE_COULDNT_CONNECT; |
|
|
} |
|
|
DEBUGASSERT(rconn); |
|
|
rustls_connection_set_userdata(rconn, backend); |
|
|
backend->conn = rconn; |
|
|
return CURLE_OK; |
|
|
} |
|
|
|
|
|
static void |
|
|
cr_set_negotiated_alpn(struct Curl_cfilter *cf, struct Curl_easy *data, |
|
|
const struct rustls_connection *rconn) |
|
|
{ |
|
|
struct ssl_connect_data *const connssl = cf->ctx; |
|
|
const uint8_t *protocol = NULL; |
|
|
size_t len = 0; |
|
|
|
|
|
rustls_connection_get_alpn_protocol(rconn, &protocol, &len); |
|
|
Curl_alpn_set_negotiated(cf, data, connssl, protocol, len); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static CURLcode |
|
|
cr_connect_common(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data, |
|
|
bool blocking, |
|
|
bool *done) |
|
|
{ |
|
|
struct ssl_connect_data *const connssl = cf->ctx; |
|
|
curl_socket_t sockfd = Curl_conn_cf_get_socket(cf, data); |
|
|
struct rustls_ssl_backend_data *const backend = |
|
|
(struct rustls_ssl_backend_data *)connssl->backend; |
|
|
struct rustls_connection *rconn = NULL; |
|
|
CURLcode tmperr = CURLE_OK; |
|
|
int result; |
|
|
int what; |
|
|
bool wants_read; |
|
|
bool wants_write; |
|
|
curl_socket_t writefd; |
|
|
curl_socket_t readfd; |
|
|
timediff_t timeout_ms; |
|
|
timediff_t socket_check_timeout; |
|
|
|
|
|
DEBUGASSERT(backend); |
|
|
|
|
|
CURL_TRC_CF(data, cf, "cr_connect_common, state=%d", connssl->state); |
|
|
*done = FALSE; |
|
|
if(!backend->conn) { |
|
|
result = cr_init_backend(cf, data, |
|
|
(struct rustls_ssl_backend_data *)connssl->backend); |
|
|
CURL_TRC_CF(data, cf, "cr_connect_common, init backend -> %d", result); |
|
|
if(result != CURLE_OK) { |
|
|
return result; |
|
|
} |
|
|
connssl->state = ssl_connection_negotiating; |
|
|
} |
|
|
|
|
|
rconn = backend->conn; |
|
|
|
|
|
|
|
|
for(;;) { |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
connssl->io_need = CURL_SSL_IO_NEED_NONE; |
|
|
if(!rustls_connection_is_handshaking(rconn)) { |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
cr_set_negotiated_alpn(cf, data, rconn); |
|
|
cr_send(cf, data, NULL, 0, &tmperr); |
|
|
if(tmperr == CURLE_AGAIN) { |
|
|
connssl->io_need = CURL_SSL_IO_NEED_SEND; |
|
|
return CURLE_OK; |
|
|
} |
|
|
else if(tmperr != CURLE_OK) { |
|
|
return tmperr; |
|
|
} |
|
|
|
|
|
{ |
|
|
uint16_t proto = rustls_connection_get_protocol_version(rconn); |
|
|
uint16_t cipher = rustls_connection_get_negotiated_ciphersuite(rconn); |
|
|
char buf[64] = ""; |
|
|
const char *ver = "TLS version unknown"; |
|
|
if(proto == RUSTLS_TLS_VERSION_TLSV1_3) |
|
|
ver = "TLSv1.3"; |
|
|
if(proto == RUSTLS_TLS_VERSION_TLSV1_2) |
|
|
ver = "TLSv1.2"; |
|
|
Curl_cipher_suite_get_str(cipher, buf, sizeof(buf), TRUE); |
|
|
infof(data, "rustls: handshake complete, %s, cipher: %s", |
|
|
ver, buf); |
|
|
} |
|
|
connssl->state = ssl_connection_complete; |
|
|
*done = TRUE; |
|
|
return CURLE_OK; |
|
|
} |
|
|
|
|
|
connssl->connecting_state = ssl_connect_2; |
|
|
wants_read = rustls_connection_wants_read(rconn); |
|
|
wants_write = rustls_connection_wants_write(rconn) || |
|
|
backend->plain_out_buffered; |
|
|
DEBUGASSERT(wants_read || wants_write); |
|
|
writefd = wants_write ? sockfd : CURL_SOCKET_BAD; |
|
|
readfd = wants_read ? sockfd : CURL_SOCKET_BAD; |
|
|
|
|
|
|
|
|
timeout_ms = Curl_timeleft(data, NULL, TRUE); |
|
|
|
|
|
if(timeout_ms < 0) { |
|
|
|
|
|
failf(data, "rustls: operation timed out before socket check"); |
|
|
return CURLE_OPERATION_TIMEDOUT; |
|
|
} |
|
|
|
|
|
socket_check_timeout = blocking ? timeout_ms : 0; |
|
|
|
|
|
what = Curl_socket_check(readfd, CURL_SOCKET_BAD, writefd, |
|
|
socket_check_timeout); |
|
|
if(what < 0) { |
|
|
|
|
|
failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
if(blocking && 0 == what) { |
|
|
failf(data, "rustls: connection timeout after %" FMT_TIMEDIFF_T " ms", |
|
|
socket_check_timeout); |
|
|
return CURLE_OPERATION_TIMEDOUT; |
|
|
} |
|
|
if(0 == what) { |
|
|
CURL_TRC_CF(data, cf, "Curl_socket_check: %s would block", |
|
|
wants_read && wants_write ? "writing and reading" : |
|
|
wants_write ? "writing" : "reading"); |
|
|
if(wants_write) |
|
|
connssl->io_need |= CURL_SSL_IO_NEED_SEND; |
|
|
if(wants_read) |
|
|
connssl->io_need |= CURL_SSL_IO_NEED_RECV; |
|
|
return CURLE_OK; |
|
|
} |
|
|
|
|
|
|
|
|
if(wants_write) { |
|
|
CURL_TRC_CF(data, cf, "rustls_connection wants us to write_tls."); |
|
|
cr_send(cf, data, NULL, 0, &tmperr); |
|
|
if(tmperr == CURLE_AGAIN) { |
|
|
CURL_TRC_CF(data, cf, "writing would block"); |
|
|
|
|
|
} |
|
|
else if(tmperr != CURLE_OK) { |
|
|
return tmperr; |
|
|
} |
|
|
} |
|
|
|
|
|
if(wants_read) { |
|
|
CURL_TRC_CF(data, cf, "rustls_connection wants us to read_tls."); |
|
|
if(tls_recv_more(cf, data, &tmperr) < 0) { |
|
|
if(tmperr == CURLE_AGAIN) { |
|
|
CURL_TRC_CF(data, cf, "reading would block"); |
|
|
|
|
|
} |
|
|
else if(tmperr == CURLE_RECV_ERROR) { |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
else { |
|
|
return tmperr; |
|
|
} |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
DEBUGASSERT(FALSE); |
|
|
} |
|
|
|
|
|
static CURLcode |
|
|
cr_connect_nonblocking(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data, bool *done) |
|
|
{ |
|
|
return cr_connect_common(cf, data, false, done); |
|
|
} |
|
|
|
|
|
static CURLcode |
|
|
cr_connect_blocking(struct Curl_cfilter *cf, struct Curl_easy *data) |
|
|
{ |
|
|
bool done; |
|
|
return cr_connect_common(cf, data, true, &done); |
|
|
} |
|
|
|
|
|
static void * |
|
|
cr_get_internals(struct ssl_connect_data *connssl, |
|
|
CURLINFO info UNUSED_PARAM) |
|
|
{ |
|
|
struct rustls_ssl_backend_data *backend = |
|
|
(struct rustls_ssl_backend_data *)connssl->backend; |
|
|
DEBUGASSERT(backend); |
|
|
return &backend->conn; |
|
|
} |
|
|
|
|
|
static CURLcode |
|
|
cr_shutdown(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data, |
|
|
bool send_shutdown, bool *done) |
|
|
{ |
|
|
struct ssl_connect_data *connssl = cf->ctx; |
|
|
struct rustls_ssl_backend_data *backend = |
|
|
(struct rustls_ssl_backend_data *)connssl->backend; |
|
|
CURLcode result = CURLE_OK; |
|
|
ssize_t nwritten, nread; |
|
|
char buf[1024]; |
|
|
size_t i; |
|
|
|
|
|
DEBUGASSERT(backend); |
|
|
if(!backend->conn || cf->shutdown) { |
|
|
*done = TRUE; |
|
|
goto out; |
|
|
} |
|
|
|
|
|
connssl->io_need = CURL_SSL_IO_NEED_NONE; |
|
|
*done = FALSE; |
|
|
|
|
|
if(!backend->sent_shutdown) { |
|
|
|
|
|
backend->sent_shutdown = TRUE; |
|
|
if(send_shutdown) { |
|
|
rustls_connection_send_close_notify(backend->conn); |
|
|
} |
|
|
} |
|
|
|
|
|
nwritten = cr_send(cf, data, NULL, 0, &result); |
|
|
if(nwritten < 0) { |
|
|
if(result == CURLE_AGAIN) { |
|
|
connssl->io_need = CURL_SSL_IO_NEED_SEND; |
|
|
result = CURLE_OK; |
|
|
goto out; |
|
|
} |
|
|
DEBUGASSERT(result); |
|
|
CURL_TRC_CF(data, cf, "shutdown send failed: %d", result); |
|
|
goto out; |
|
|
} |
|
|
|
|
|
for(i = 0; i < 10; ++i) { |
|
|
nread = cr_recv(cf, data, buf, (int)sizeof(buf), &result); |
|
|
if(nread <= 0) |
|
|
break; |
|
|
} |
|
|
|
|
|
if(nread > 0) { |
|
|
|
|
|
} |
|
|
else if(nread == 0) { |
|
|
|
|
|
*done = TRUE; |
|
|
} |
|
|
else if(result == CURLE_AGAIN) { |
|
|
connssl->io_need = CURL_SSL_IO_NEED_RECV; |
|
|
result = CURLE_OK; |
|
|
} |
|
|
else { |
|
|
DEBUGASSERT(result); |
|
|
CURL_TRC_CF(data, cf, "shutdown, error: %d", result); |
|
|
} |
|
|
|
|
|
out: |
|
|
cf->shutdown = (result || *done); |
|
|
return result; |
|
|
} |
|
|
|
|
|
static void |
|
|
cr_close(struct Curl_cfilter *cf, struct Curl_easy *data) |
|
|
{ |
|
|
struct ssl_connect_data *connssl = cf->ctx; |
|
|
struct rustls_ssl_backend_data *backend = |
|
|
(struct rustls_ssl_backend_data *)connssl->backend; |
|
|
|
|
|
(void)data; |
|
|
DEBUGASSERT(backend); |
|
|
if(backend->conn) { |
|
|
rustls_connection_free(backend->conn); |
|
|
backend->conn = NULL; |
|
|
} |
|
|
if(backend->config) { |
|
|
rustls_client_config_free(backend->config); |
|
|
backend->config = NULL; |
|
|
} |
|
|
} |
|
|
|
|
|
static size_t cr_version(char *buffer, size_t size) |
|
|
{ |
|
|
struct rustls_str ver = rustls_version(); |
|
|
return msnprintf(buffer, size, "%.*s", (int)ver.len, ver.data); |
|
|
} |
|
|
|
|
|
static CURLcode |
|
|
cr_random(struct Curl_easy *data, unsigned char *entropy, size_t length) |
|
|
{ |
|
|
rustls_result rresult = 0; |
|
|
(void)data; |
|
|
rresult = |
|
|
rustls_default_crypto_provider_random(entropy, length); |
|
|
return map_error(rresult); |
|
|
} |
|
|
|
|
|
const struct Curl_ssl Curl_ssl_rustls = { |
|
|
{ CURLSSLBACKEND_RUSTLS, "rustls" }, |
|
|
SSLSUPP_CAINFO_BLOB | |
|
|
SSLSUPP_HTTPS_PROXY | |
|
|
SSLSUPP_CIPHER_LIST | |
|
|
SSLSUPP_TLS13_CIPHERSUITES, |
|
|
sizeof(struct rustls_ssl_backend_data), |
|
|
|
|
|
Curl_none_init, |
|
|
Curl_none_cleanup, |
|
|
cr_version, |
|
|
Curl_none_check_cxn, |
|
|
cr_shutdown, |
|
|
cr_data_pending, |
|
|
cr_random, |
|
|
Curl_none_cert_status_request, |
|
|
cr_connect_blocking, |
|
|
cr_connect_nonblocking, |
|
|
Curl_ssl_adjust_pollset, |
|
|
cr_get_internals, |
|
|
cr_close, |
|
|
Curl_none_close_all, |
|
|
Curl_none_set_engine, |
|
|
Curl_none_set_engine_default, |
|
|
Curl_none_engines_list, |
|
|
Curl_none_false_start, |
|
|
NULL, |
|
|
NULL, |
|
|
NULL, |
|
|
cr_recv, |
|
|
cr_send, |
|
|
NULL, |
|
|
}; |
|
|
|
|
|
#endif |
|
|
|