2008-01-28 16:37:16 -05:00
/* source: xio-openssl.c */
2014-02-03 15:08:21 -05:00
/* Copyright Gerhard Rieger */
2008-01-27 07:00:08 -05:00
/* Published under the GNU General Public License V.2, see file COPYING */
/* this file contains the implementation of the openssl addresses */
# include "xiosysincludes.h"
# if WITH_OPENSSL /* make this address configure dependend */
2015-01-12 17:34:47 -05:00
# include <openssl/conf.h>
# include <openssl/x509v3.h>
2008-01-27 07:00:08 -05:00
# include "xioopen.h"
# include "xio-fd.h"
# include "xio-socket.h" /* _xioopen_connect() */
# include "xio-listen.h"
# include "xio-ipapp.h"
# include "xio-openssl.h"
/* the openssl library requires a file descriptor for external communications.
so our best effort is to provide any possible kind of un * x file descriptor
( not only tcp , but also pipes , stdin , files . . . )
for tcp we want to provide support for socks and proxy .
read and write functions must use the openssl crypt versions .
but currently only plain tcp4 is implemented .
*/
/* Linux: "man 3 ssl" */
/* generate a simple openssl server for testing:
1 ) generate a private key
openssl genrsa - out server . key 1024
2 ) generate a self signed cert
openssl req - new - key server . key - x509 - days 3653 - out server . crt
enter fields . . .
3 ) generate the pem file
cat server . key server . crt > server . pem
openssl s_server ( listens on 4433 / tcp )
*/
/* static declaration of ssl's open function */
static int xioopen_openssl_connect ( int argc , const char * argv [ ] , struct opt * opts ,
int xioflags , xiofile_t * fd , unsigned groups ,
int dummy1 , int dummy2 , int dummy3 ) ;
/* static declaration of ssl's open function */
static int xioopen_openssl_listen ( int argc , const char * argv [ ] , struct opt * opts ,
int xioflags , xiofile_t * fd , unsigned groups ,
int dummy1 , int dummy2 , int dummy3 ) ;
static int openssl_SSL_ERROR_SSL ( int level , const char * funcname ) ;
2015-01-12 17:34:47 -05:00
static int openssl_handle_peer_certificate ( struct single * xfd ,
const char * peername ,
bool opt_ver ,
2008-01-27 07:00:08 -05:00
int level ) ;
static int xioSSL_set_fd ( struct single * xfd , int level ) ;
2015-01-12 17:34:47 -05:00
static int xioSSL_connect ( struct single * xfd , const char * opt_commonname , bool opt_ver , int level ) ;
static int openssl_delete_cert_info ( void ) ;
2008-01-27 07:00:08 -05:00
/* description record for ssl connect */
const struct addrdesc addr_openssl = {
" openssl " , /* keyword for selecting this address type in xioopen calls
( canonical or main name ) */
3 , /* data flow directions this address supports on API layer:
1. . read , 2. . write , 3. . both */
xioopen_openssl_connect , /* a function pointer used to "open" these addresses.*/
GROUP_FD | GROUP_SOCKET | GROUP_SOCK_IP4 | GROUP_SOCK_IP6 | GROUP_IP_TCP | GROUP_CHILD | GROUP_OPENSSL | GROUP_RETRY , /* bitwise OR of address groups this address belongs to.
You might have to specify a new group in xioopts . h */
0 , /* an integer passed to xioopen_openssl; makes it possible to
use the same xioopen_openssl function for slightly different
address types . */
0 , /* like previous argument */
0 /* like previous arguments, but pointer type.
No trailing comma or semicolon ! */
HELP ( " :<host>:<port> " ) /* a text displayed from xio help function.
No trailing comma or semicolon !
only generates this text if WITH_HELP is ! = 0 */
} ;
# if WITH_LISTEN
/* description record for ssl listen */
const struct addrdesc addr_openssl_listen = {
" openssl-listen " , /* keyword for selecting this address type in xioopen calls
( canonical or main name ) */
3 , /* data flow directions this address supports on API layer:
1. . read , 2. . write , 3. . both */
xioopen_openssl_listen , /* a function pointer used to "open" these addresses.*/
GROUP_FD | GROUP_SOCKET | GROUP_SOCK_IP4 | GROUP_SOCK_IP6 | GROUP_IP_TCP | GROUP_LISTEN | GROUP_CHILD | GROUP_RANGE | GROUP_OPENSSL | GROUP_RETRY , /* bitwise OR of address groups this address belongs to.
You might have to specify a new group in xioopts . h */
0 , /* an integer passed to xioopen_openssl_listen; makes it possible to
use the same xioopen_openssl_listen function for slightly different
address types . */
0 , /* like previous argument */
0 /* like previous arguments, but pointer type.
No trailing comma or semicolon ! */
HELP ( " :<port> " ) /* a text displayed from xio help function.
No trailing comma or semicolon !
only generates this text if WITH_HELP is ! = 0 */
} ;
# endif /* WITH_LISTEN */
/* both client and server */
const struct optdesc opt_openssl_cipherlist = { " openssl-cipherlist " , " ciphers " , OPT_OPENSSL_CIPHERLIST , GROUP_OPENSSL , PH_SPEC , TYPE_STRING , OFUNC_SPEC } ;
const struct optdesc opt_openssl_method = { " openssl-method " , " method " , OPT_OPENSSL_METHOD , GROUP_OPENSSL , PH_SPEC , TYPE_STRING , OFUNC_SPEC } ;
const struct optdesc opt_openssl_verify = { " openssl-verify " , " verify " , OPT_OPENSSL_VERIFY , GROUP_OPENSSL , PH_SPEC , TYPE_BOOL , OFUNC_SPEC } ;
const struct optdesc opt_openssl_certificate = { " openssl-certificate " , " cert " , OPT_OPENSSL_CERTIFICATE , GROUP_OPENSSL , PH_SPEC , TYPE_FILENAME , OFUNC_SPEC } ;
const struct optdesc opt_openssl_key = { " openssl-key " , " key " , OPT_OPENSSL_KEY , GROUP_OPENSSL , PH_SPEC , TYPE_FILENAME , OFUNC_SPEC } ;
const struct optdesc opt_openssl_dhparam = { " openssl-dhparam " , " dh " , OPT_OPENSSL_DHPARAM , GROUP_OPENSSL , PH_SPEC , TYPE_FILENAME , OFUNC_SPEC } ;
const struct optdesc opt_openssl_cafile = { " openssl-cafile " , " cafile " , OPT_OPENSSL_CAFILE , GROUP_OPENSSL , PH_SPEC , TYPE_FILENAME , OFUNC_SPEC } ;
const struct optdesc opt_openssl_capath = { " openssl-capath " , " capath " , OPT_OPENSSL_CAPATH , GROUP_OPENSSL , PH_SPEC , TYPE_FILENAME , OFUNC_SPEC } ;
const struct optdesc opt_openssl_egd = { " openssl-egd " , " egd " , OPT_OPENSSL_EGD , GROUP_OPENSSL , PH_SPEC , TYPE_FILENAME , OFUNC_SPEC } ;
const struct optdesc opt_openssl_pseudo = { " openssl-pseudo " , " pseudo " , OPT_OPENSSL_PSEUDO , GROUP_OPENSSL , PH_SPEC , TYPE_BOOL , OFUNC_SPEC } ;
2011-11-26 08:27:02 -05:00
# if OPENSSL_VERSION_NUMBER >= 0x00908000L
const struct optdesc opt_openssl_compress = { " openssl-compress " , " compress " , OPT_OPENSSL_COMPRESS , GROUP_OPENSSL , PH_SPEC , TYPE_STRING , OFUNC_SPEC } ;
# endif
2008-01-27 07:00:08 -05:00
# if WITH_FIPS
const struct optdesc opt_openssl_fips = { " openssl-fips " , " fips " , OPT_OPENSSL_FIPS , GROUP_OPENSSL , PH_SPEC , TYPE_BOOL , OFUNC_SPEC } ;
# endif
2015-01-12 17:34:47 -05:00
const struct optdesc opt_openssl_commonname = { " openssl-commonname " , " cn " , OPT_OPENSSL_COMMONNAME , GROUP_OPENSSL , PH_SPEC , TYPE_STRING , OFUNC_SPEC } ;
2008-01-27 07:00:08 -05:00
/* If FIPS is compiled in, we need to track if the user asked for FIPS mode.
* On forks , the FIPS mode must be reset by a disable , then enable since
* FIPS tracks the process ID that initializes things .
* If FIPS is not compiled in , no tracking variable is needed
* and we make the reset code compile out . This keeps the
* rest of the code below free of FIPS related # ifs
*/
# if WITH_FIPS
static bool xio_openssl_fips = false ;
int xio_reset_fips_mode ( void ) {
if ( xio_openssl_fips ) {
if ( ! sycFIPS_mode_set ( 0 ) | | ! sycFIPS_mode_set ( 1 ) ) {
ERR_load_crypto_strings ( ) ;
ERR_print_errors ( BIO_new_fp ( stderr , BIO_NOCLOSE ) ) ;
Error ( " Failed to reset OpenSSL FIPS mode " ) ;
xio_openssl_fips = false ;
return - 1 ;
}
}
return 0 ;
}
# else
# define xio_reset_fips_mode() 0
# endif
2011-11-26 08:27:02 -05:00
static void openssl_conn_loginfo ( SSL * ssl ) {
Notice1 ( " SSL connection using %s " , SSL_get_cipher ( ssl ) ) ;
# if OPENSSL_VERSION_NUMBER >= 0x00908000L
{
const COMP_METHOD * comp , * expansion ;
comp = sycSSL_get_current_compression ( ssl ) ;
expansion = sycSSL_get_current_expansion ( ssl ) ;
Notice1 ( " SSL connection compression \" %s \" " ,
comp ? sycSSL_COMP_get_name ( comp ) : " none " ) ;
Notice1 ( " SSL connection expansion \" %s \" " ,
expansion ? sycSSL_COMP_get_name ( expansion ) : " none " ) ;
}
# endif
}
2008-01-27 07:00:08 -05:00
/* the open function for OpenSSL client */
static int
xioopen_openssl_connect ( int argc ,
const char * argv [ ] , /* the arguments in the address string */
struct opt * opts ,
int xioflags , /* is the open meant for reading (0),
writing ( 1 ) , or both ( 2 ) ? */
xiofile_t * xxfd , /* a xio file descriptor structure,
already allocated */
unsigned groups , /* the matching address groups... */
int dummy1 , /* first transparent integer value from
addr_openssl */
int dummy2 , /* second transparent integer value from
addr_openssl */
int dummy3 ) /* transparent pointer value from
addr_openssl */
{
struct single * xfd = & xxfd - > stream ;
struct opt * opts0 = NULL ;
const char * hostname , * portname ;
int pf = PF_UNSPEC ;
int ipproto = IPPROTO_TCP ;
int socktype = SOCK_STREAM ;
bool dofork = false ;
union sockaddr_union us_sa , * us = & us_sa ;
union sockaddr_union them_sa , * them = & them_sa ;
socklen_t uslen = sizeof ( us_sa ) ;
socklen_t themlen = sizeof ( them_sa ) ;
bool needbind = false ;
bool lowport = false ;
int level ;
SSL_CTX * ctx ;
bool opt_ver = true ; /* verify peer certificate */
char * opt_cert = NULL ; /* file name of client certificate */
2015-01-12 17:34:47 -05:00
const char * opt_commonname = NULL ; /* for checking peer certificate */
2008-01-27 07:00:08 -05:00
int result ;
if ( ! ( xioflags & XIO_MAYCONVERT ) ) {
Error ( " address with data processing not allowed here " ) ;
return STAT_NORETRY ;
}
xfd - > flags | = XIO_DOESCONVERT ;
if ( argc ! = 3 ) {
Error1 ( " %s: 2 parameters required " , argv [ 0 ] ) ;
return STAT_NORETRY ;
}
hostname = argv [ 1 ] ;
portname = argv [ 2 ] ;
2015-01-12 17:34:47 -05:00
if ( hostname [ 0 ] = = ' \0 ' ) {
/* we catch this explicitely because empty commonname (peername) disables
commonName check of peer certificate */
Error1 ( " %s: empty host name " , argv [ 0 ] ) ;
return STAT_NORETRY ;
}
2008-01-27 07:00:08 -05:00
xfd - > howtoend = END_SHUTDOWN ;
if ( applyopts_single ( xfd , opts , PH_INIT ) < 0 ) return - 1 ;
applyopts ( - 1 , opts , PH_INIT ) ;
retropt_bool ( opts , OPT_FORK , & dofork ) ;
retropt_string ( opts , OPT_OPENSSL_CERTIFICATE , & opt_cert ) ;
2015-01-12 17:34:47 -05:00
retropt_string ( opts , OPT_OPENSSL_COMMONNAME , ( char * * ) & opt_commonname ) ;
if ( opt_commonname = = NULL ) {
opt_commonname = hostname ;
}
2008-01-27 07:00:08 -05:00
result =
_xioopen_openssl_prepare ( opts , xfd , false , & opt_ver , opt_cert , & ctx ) ;
if ( result ! = STAT_OK ) return STAT_NORETRY ;
result =
_xioopen_ipapp_prepare ( opts , & opts0 , hostname , portname , & pf , ipproto ,
xfd - > para . socket . ip . res_opts [ 1 ] ,
xfd - > para . socket . ip . res_opts [ 0 ] ,
them , & themlen , us , & uslen ,
2008-09-20 17:47:06 -04:00
& needbind , & lowport , socktype ) ;
2008-01-27 07:00:08 -05:00
if ( result ! = STAT_OK ) return STAT_NORETRY ;
if ( xioopts . logopt = = ' m ' ) {
Info ( " starting connect loop, switching to syslog " ) ;
diag_set ( ' y ' , xioopts . syslogfac ) ; xioopts . logopt = ' y ' ;
} else {
Info ( " starting connect loop " ) ;
}
do { /* loop over failed connect and SSL handshake attempts */
# if WITH_RETRY
if ( xfd - > forever | | xfd - > retry ) {
level = E_INFO ;
} else
# endif /* WITH_RETRY */
level = E_ERROR ;
/* this cannot fork because we retrieved fork option above */
result =
_xioopen_connect ( xfd ,
2014-02-03 15:08:21 -05:00
needbind ? ( struct sockaddr * ) us : NULL , uslen ,
2008-01-27 07:00:08 -05:00
( struct sockaddr * ) them , themlen ,
opts , pf , socktype , ipproto , lowport , level ) ;
switch ( result ) {
case STAT_OK : break ;
# if WITH_RETRY
case STAT_RETRYLATER :
case STAT_RETRYNOW :
if ( xfd - > forever | | xfd - > retry ) {
dropopts ( opts , PH_ALL ) ; opts = copyopts ( opts0 , GROUP_ALL ) ;
if ( result = = STAT_RETRYLATER ) {
Nanosleep ( & xfd - > intervall , NULL ) ;
}
- - xfd - > retry ;
continue ;
}
return STAT_NORETRY ;
# endif /* WITH_RETRY */
default :
return result ;
}
/*! isn't this too early? */
if ( ( result = _xio_openlate ( xfd , opts ) ) < 0 ) {
return result ;
}
2015-01-12 17:34:47 -05:00
result = _xioopen_openssl_connect ( xfd , opt_ver , opt_commonname , ctx , level ) ;
2008-01-27 07:00:08 -05:00
switch ( result ) {
case STAT_OK : break ;
# if WITH_RETRY
case STAT_RETRYLATER :
case STAT_RETRYNOW :
if ( xfd - > forever | | xfd - > retry ) {
Close ( xfd - > fd ) ;
dropopts ( opts , PH_ALL ) ; opts = copyopts ( opts0 , GROUP_ALL ) ;
if ( result = = STAT_RETRYLATER ) {
Nanosleep ( & xfd - > intervall , NULL ) ;
}
- - xfd - > retry ;
continue ;
}
# endif /* WITH_RETRY */
default : return STAT_NORETRY ;
}
2008-02-01 17:15:14 -05:00
if ( dofork ) {
xiosetchilddied ( ) ; /* set SIGCHLD handler */
}
2008-01-27 07:00:08 -05:00
# if WITH_RETRY
if ( dofork ) {
pid_t pid ;
2008-09-22 16:17:55 -04:00
int level = E_ERROR ;
if ( xfd - > forever | | xfd - > retry ) {
level = E_WARN ;
}
while ( ( pid = xio_fork ( false , level ) ) < 0 ) {
if ( xfd - > forever | | - - xfd - > retry ) {
Nanosleep ( & xfd - > intervall , NULL ) ; continue ;
2008-01-27 07:00:08 -05:00
}
return STAT_RETRYLATER ;
}
2008-09-22 16:17:55 -04:00
if ( pid = = 0 ) { /* child process */
xfd - > forever = false ; xfd - > retry = 0 ;
2008-01-27 07:00:08 -05:00
break ;
}
2008-09-22 16:17:55 -04:00
2008-01-27 07:00:08 -05:00
/* parent process */
Close ( xfd - > fd ) ;
sycSSL_free ( xfd - > para . openssl . ssl ) ;
xfd - > para . openssl . ssl = NULL ;
/* with and without retry */
Nanosleep ( & xfd - > intervall , NULL ) ;
dropopts ( opts , PH_ALL ) ; opts = copyopts ( opts0 , GROUP_ALL ) ;
continue ; /* with next socket() bind() connect() */
}
# endif /* WITH_RETRY */
break ;
} while ( true ) ; /* drop out on success */
2011-11-26 08:27:02 -05:00
openssl_conn_loginfo ( xfd - > para . openssl . ssl ) ;
2008-01-27 07:00:08 -05:00
/* fill in the fd structure */
return STAT_OK ;
}
/* this function is typically called within the OpenSSL client fork/retry loop.
xfd must be of type DATA_OPENSSL , and its fd must be set with a valid file
descriptor . this function then performs all SSL related step to make a valid
SSL connection from an FD and a CTX . */
int _xioopen_openssl_connect ( struct single * xfd ,
bool opt_ver ,
2015-01-12 17:34:47 -05:00
const char * opt_commonname ,
2008-01-27 07:00:08 -05:00
SSL_CTX * ctx ,
int level ) {
SSL * ssl ;
unsigned long err ;
int result ;
/* create a SSL object */
if ( ( ssl = sycSSL_new ( ctx ) ) = = NULL ) {
if ( ERR_peek_error ( ) = = 0 ) Msg ( level , " SSL_new() failed " ) ;
while ( err = ERR_get_error ( ) ) {
Msg1 ( level , " SSL_new(): %s " , ERR_error_string ( err , NULL ) ) ;
}
/*Error("SSL_new()");*/
return STAT_RETRYLATER ;
}
xfd - > para . openssl . ssl = ssl ;
result = xioSSL_set_fd ( xfd , level ) ;
if ( result ! = STAT_OK ) {
sycSSL_free ( xfd - > para . openssl . ssl ) ;
xfd - > para . openssl . ssl = NULL ;
return result ;
}
2015-01-12 17:34:47 -05:00
result = xioSSL_connect ( xfd , opt_commonname , opt_ver , level ) ;
2008-01-27 07:00:08 -05:00
if ( result ! = STAT_OK ) {
sycSSL_free ( xfd - > para . openssl . ssl ) ;
xfd - > para . openssl . ssl = NULL ;
return result ;
}
2015-01-12 17:34:47 -05:00
result = openssl_handle_peer_certificate ( xfd , opt_commonname ,
opt_ver , level ) ;
2008-01-27 07:00:08 -05:00
if ( result ! = STAT_OK ) {
sycSSL_free ( xfd - > para . openssl . ssl ) ;
xfd - > para . openssl . ssl = NULL ;
return result ;
}
return STAT_OK ;
}
# if WITH_LISTEN
static int
xioopen_openssl_listen ( int argc ,
const char * argv [ ] , /* the arguments in the address string */
struct opt * opts ,
int xioflags , /* is the open meant for reading (0),
writing ( 1 ) , or both ( 2 ) ? */
xiofile_t * xxfd , /* a xio file descriptor structure,
already allocated */
unsigned groups , /* the matching address groups... */
int dummy1 , /* first transparent integer value from
addr_openssl */
int dummy2 , /* second transparent integer value from
addr_openssl */
int dummy3 ) /* transparent pointer value from
addr_openssl */
{
struct single * xfd = & xxfd - > stream ;
const char * portname ;
struct opt * opts0 = NULL ;
union sockaddr_union us_sa , * us = & us_sa ;
socklen_t uslen = sizeof ( us_sa ) ;
int pf ;
int socktype = SOCK_STREAM ;
int ipproto = IPPROTO_TCP ;
/*! lowport? */
int level ;
SSL_CTX * ctx ;
bool opt_ver = true ; /* verify peer certificate - changed with 1.6.0 */
char * opt_cert = NULL ; /* file name of server certificate */
2015-01-12 17:34:47 -05:00
const char * opt_commonname = NULL ; /* for checking peer certificate */
2008-01-27 07:00:08 -05:00
int result ;
if ( ! ( xioflags & XIO_MAYCONVERT ) ) {
Error ( " address with data processing not allowed here " ) ;
return STAT_NORETRY ;
}
xfd - > flags | = XIO_DOESCONVERT ;
if ( argc ! = 2 ) {
Error1 ( " %s: 1 parameter required " , argv [ 0 ] ) ;
return STAT_NORETRY ;
}
# if WITH_IP4 && WITH_IP6
pf = xioopts . default_ip = = ' 6 ' ? PF_INET6 : PF_INET ;
# elif WITH_IP6
pf = PF_INET6 ;
# else
pf = PF_INET ;
# endif
portname = argv [ 1 ] ;
xfd - > howtoend = END_SHUTDOWN ;
if ( applyopts_single ( xfd , opts , PH_INIT ) < 0 ) return - 1 ;
applyopts ( - 1 , opts , PH_INIT ) ;
retropt_string ( opts , OPT_OPENSSL_CERTIFICATE , & opt_cert ) ;
if ( opt_cert = = NULL ) {
Warn ( " no certificate given; consider option \" cert \" " ) ;
}
2015-01-12 17:34:47 -05:00
retropt_string ( opts , OPT_OPENSSL_COMMONNAME , ( char * * ) & opt_commonname ) ;
2008-01-27 07:00:08 -05:00
applyopts ( - 1 , opts , PH_EARLY ) ;
result =
_xioopen_openssl_prepare ( opts , xfd , true , & opt_ver , opt_cert , & ctx ) ;
if ( result ! = STAT_OK ) return STAT_NORETRY ;
if ( _xioopen_ipapp_listen_prepare ( opts , & opts0 , portname , & pf , ipproto ,
xfd - > para . socket . ip . res_opts [ 1 ] ,
xfd - > para . socket . ip . res_opts [ 0 ] ,
2008-09-20 17:47:06 -04:00
us , & uslen , socktype )
2008-01-27 07:00:08 -05:00
! = STAT_OK ) {
return STAT_NORETRY ;
}
xfd - > addr = & addr_openssl_listen ;
xfd - > dtype = XIODATA_OPENSSL ;
while ( true ) { /* loop over failed attempts */
# if WITH_RETRY
if ( xfd - > forever | | xfd - > retry ) {
level = E_INFO ;
} else
# endif /* WITH_RETRY */
level = E_ERROR ;
/* tcp listen; this can fork() for us; it only returns on error or on
successful establishment of tcp connection */
result = _xioopen_listen ( xfd , xioflags ,
( struct sockaddr * ) us , uslen ,
opts , pf , socktype , IPPROTO_TCP ,
# if WITH_RETRY
( xfd - > retry | | xfd - > forever ) ? E_INFO : E_ERROR
# else
E_ERROR
# endif /* WITH_RETRY */
) ;
/*! not sure if we should try again on retry/forever */
switch ( result ) {
case STAT_OK : break ;
# if WITH_RETRY
case STAT_RETRYLATER :
case STAT_RETRYNOW :
if ( xfd - > forever | | xfd - > retry ) {
dropopts ( opts , PH_ALL ) ; opts = copyopts ( opts0 , GROUP_ALL ) ;
if ( result = = STAT_RETRYLATER ) {
Nanosleep ( & xfd - > intervall , NULL ) ;
}
dropopts ( opts , PH_ALL ) ; opts = copyopts ( opts0 , GROUP_ALL ) ;
- - xfd - > retry ;
continue ;
}
return STAT_NORETRY ;
# endif /* WITH_RETRY */
default :
return result ;
}
2015-01-12 17:34:47 -05:00
result = _xioopen_openssl_listen ( xfd , opt_ver , opt_commonname , ctx , level ) ;
2008-01-27 07:00:08 -05:00
switch ( result ) {
case STAT_OK : break ;
# if WITH_RETRY
case STAT_RETRYLATER :
case STAT_RETRYNOW :
if ( xfd - > forever | | xfd - > retry ) {
dropopts ( opts , PH_ALL ) ; opts = copyopts ( opts0 , GROUP_ALL ) ;
if ( result = = STAT_RETRYLATER ) {
Nanosleep ( & xfd - > intervall , NULL ) ;
}
dropopts ( opts , PH_ALL ) ; opts = copyopts ( opts0 , GROUP_ALL ) ;
- - xfd - > retry ;
continue ;
}
return STAT_NORETRY ;
# endif /* WITH_RETRY */
default :
return result ;
}
2011-11-26 08:27:02 -05:00
openssl_conn_loginfo ( xfd - > para . openssl . ssl ) ;
2008-01-27 07:00:08 -05:00
break ;
} /* drop out on success */
/* fill in the fd structure */
return STAT_OK ;
}
int _xioopen_openssl_listen ( struct single * xfd ,
bool opt_ver ,
2015-01-12 17:34:47 -05:00
const char * opt_commonname ,
2008-01-27 07:00:08 -05:00
SSL_CTX * ctx ,
int level ) {
char error_string [ 120 ] ;
unsigned long err ;
int errint , ret ;
/* create an SSL object */
if ( ( xfd - > para . openssl . ssl = sycSSL_new ( ctx ) ) = = NULL ) {
if ( ERR_peek_error ( ) = = 0 ) Msg ( level , " SSL_new() failed " ) ;
while ( err = ERR_get_error ( ) ) {
Msg1 ( level , " SSL_new(): %s " , ERR_error_string ( err , NULL ) ) ;
}
/*Error("SSL_new()");*/
return STAT_NORETRY ;
}
/* assign the network connection to the SSL object */
if ( sycSSL_set_fd ( xfd - > para . openssl . ssl , xfd - > fd ) < = 0 ) {
if ( ERR_peek_error ( ) = = 0 ) Msg ( level , " SSL_set_fd() failed " ) ;
while ( err = ERR_get_error ( ) ) {
Msg2 ( level , " SSL_set_fd(, %d): %s " ,
xfd - > fd , ERR_error_string ( err , NULL ) ) ;
}
}
# if WITH_DEBUG
{
int i = 0 ;
const char * ciphers = NULL ;
Debug ( " available ciphers: " ) ;
do {
ciphers = SSL_get_cipher_list ( xfd - > para . openssl . ssl , i ) ;
if ( ciphers = = NULL ) break ;
Debug2 ( " CIPHERS pri=%d: %s " , i , ciphers ) ;
+ + i ;
} while ( 1 ) ;
}
# endif /* WITH_DEBUG */
/* connect via SSL by performing handshake */
if ( ( ret = sycSSL_accept ( xfd - > para . openssl . ssl ) ) < = 0 ) {
/*if (ERR_peek_error() == 0) Msg(level, "SSL_accept() failed");*/
errint = SSL_get_error ( xfd - > para . openssl . ssl , ret ) ;
switch ( errint ) {
case SSL_ERROR_NONE :
Msg ( level , " ok " ) ; break ;
case SSL_ERROR_ZERO_RETURN :
Msg ( level , " connection closed (wrong version number?) " ) ; break ;
case SSL_ERROR_WANT_READ : case SSL_ERROR_WANT_WRITE :
case SSL_ERROR_WANT_CONNECT :
case SSL_ERROR_WANT_X509_LOOKUP :
Msg ( level , " nonblocking operation did not complete " ) ; break ; /*!*/
case SSL_ERROR_SYSCALL :
if ( ERR_peek_error ( ) = = 0 ) {
if ( ret = = 0 ) {
Msg ( level , " SSL_accept(): socket closed by peer " ) ;
} else if ( ret = = - 1 ) {
Msg1 ( level , " SSL_accept(): %s " , strerror ( errno ) ) ;
}
} else {
Msg ( level , " I/O error " ) ; /*!*/
while ( err = ERR_get_error ( ) ) {
ERR_error_string_n ( err , error_string , sizeof ( error_string ) ) ;
Msg4 ( level , " SSL_accept(): %s / %s / %s / %s " , error_string ,
ERR_lib_error_string ( err ) , ERR_func_error_string ( err ) ,
ERR_reason_error_string ( err ) ) ;
}
2015-01-12 17:11:26 -05:00
/* Msg1(level, "SSL_accept(): %s", ERR_error_string(e, buf));*/
2008-01-27 07:00:08 -05:00
}
break ;
case SSL_ERROR_SSL :
/*ERR_print_errors_fp(stderr);*/
openssl_SSL_ERROR_SSL ( level , " SSL_accept " ) ;
break ;
default :
Msg ( level , " unknown error " ) ;
}
return STAT_RETRYLATER ;
}
2015-01-12 17:34:47 -05:00
if ( openssl_handle_peer_certificate ( xfd , opt_commonname , opt_ver , E_ERROR /*!*/ ) < 0 ) {
2008-01-27 07:00:08 -05:00
return STAT_NORETRY ;
}
return STAT_OK ;
}
# endif /* WITH_LISTEN */
2011-11-26 08:27:02 -05:00
# if OPENSSL_VERSION_NUMBER >= 0x00908000L
/* In OpenSSL 0.9.7 compression methods could be added using
* SSL_COMP_add_compression_method ( 3 ) , but the implemntation is not compatible
* with the standard ( RFC3749 ) .
*/
static int openssl_setup_compression ( SSL_CTX * ctx , char * method )
{
STACK_OF ( SSL_COMP ) * comp_methods ;
assert ( method ) ;
/* Getting the stack of compression methods has the intended side-effect of
* initializing the SSL library ' s compression part .
*/
comp_methods = SSL_COMP_get_compression_methods ( ) ;
if ( ! comp_methods ) {
Info ( " OpenSSL built without compression support " ) ;
return STAT_OK ;
}
if ( strcasecmp ( method , " auto " ) = = 0 ) {
Info ( " Using default OpenSSL compression " ) ;
return STAT_OK ;
}
if ( strcasecmp ( method , " none " ) = = 0 ) {
/* Disable compression */
# ifdef SSL_OP_NO_COMPRESSION
Info ( " Disabling OpenSSL compression " ) ;
SSL_CTX_set_options ( ctx , SSL_OP_NO_COMPRESSION ) ;
# else
/* SSL_OP_NO_COMPRESSION was only introduced in OpenSSL 0.9.9 (released
* as 1.0 .0 ) . Removing all compression methods is a work - around for
* earlier versions of OpenSSL , but it affects all SSL connections .
*/
Info ( " Disabling OpenSSL compression globally " ) ;
sk_SSL_COMP_zero ( comp_methods ) ;
# endif
return STAT_OK ;
}
/* zlib compression in OpenSSL before version 0.9.8e-beta1 uses the libc's
* default malloc / free instead of the ones passed to OpenSSL . Should socat
* ever use custom malloc / free functions for OpenSSL , this must be taken
* into consideration . See OpenSSL bug # 1468.
*/
Error1 ( " openssl-compress= \" %s \" : unknown compression method " , method ) ;
return STAT_NORETRY ;
}
# endif
2008-01-27 07:00:08 -05:00
int
_xioopen_openssl_prepare ( struct opt * opts ,
struct single * xfd , /* a xio file descriptor
structure , already allocated
*/
bool server , /* SSL client: false */
bool * opt_ver ,
const char * opt_cert ,
SSL_CTX * * ctx )
{
bool opt_fips = false ;
2015-01-23 12:38:06 -05:00
const SSL_METHOD * method = NULL ;
2008-01-27 07:00:08 -05:00
char * me_str = NULL ; /* method string */
2014-11-23 07:48:05 -05:00
char * ci_str = " HIGH:-NULL:-PSK:-aNULL " ; /* cipher string */
2008-01-27 07:00:08 -05:00
char * opt_key = NULL ; /* file name of client private key */
char * opt_dhparam = NULL ; /* file name of DH params */
char * opt_cafile = NULL ; /* certificate authority file */
char * opt_capath = NULL ; /* certificate authority directory */
char * opt_egd = NULL ; /* entropy gathering daemon socket path */
2011-11-26 08:27:02 -05:00
# if OPENSSL_VERSION_NUMBER >= 0x00908000L
char * opt_compress = NULL ; /* compression method */
# endif
2008-01-27 07:00:08 -05:00
bool opt_pseudo = false ; /* use pseudo entropy if nothing else */
unsigned long err ;
int result ;
xfd - > addr = & addr_openssl ;
xfd - > dtype = XIODATA_OPENSSL ;
retropt_bool ( opts , OPT_OPENSSL_FIPS , & opt_fips ) ;
retropt_string ( opts , OPT_OPENSSL_METHOD , & me_str ) ;
retropt_string ( opts , OPT_OPENSSL_CIPHERLIST , & ci_str ) ;
retropt_bool ( opts , OPT_OPENSSL_VERIFY , opt_ver ) ;
retropt_string ( opts , OPT_OPENSSL_CAFILE , & opt_cafile ) ;
retropt_string ( opts , OPT_OPENSSL_CAPATH , & opt_capath ) ;
retropt_string ( opts , OPT_OPENSSL_KEY , & opt_key ) ;
retropt_string ( opts , OPT_OPENSSL_DHPARAM , & opt_dhparam ) ;
retropt_string ( opts , OPT_OPENSSL_EGD , & opt_egd ) ;
retropt_bool ( opts , OPT_OPENSSL_PSEUDO , & opt_pseudo ) ;
2011-11-26 08:27:02 -05:00
# if OPENSSL_VERSION_NUMBER >= 0x00908000L
retropt_string ( opts , OPT_OPENSSL_COMPRESS , & opt_compress ) ;
# endif
2008-01-27 07:00:08 -05:00
# if WITH_FIPS
if ( opt_fips ) {
if ( ! sycFIPS_mode_set ( 1 ) ) {
ERR_load_crypto_strings ( ) ;
ERR_print_errors ( BIO_new_fp ( stderr , BIO_NOCLOSE ) ) ;
Error ( " Failed to set FIPS mode " ) ;
} else {
xio_openssl_fips = true ;
}
}
# endif
2015-01-12 17:34:47 -05:00
openssl_delete_cert_info ( ) ;
2008-01-27 07:00:08 -05:00
OpenSSL_add_all_algorithms ( ) ;
OpenSSL_add_all_ciphers ( ) ;
OpenSSL_add_all_digests ( ) ;
sycSSL_load_error_strings ( ) ;
/* OpenSSL preparation */
sycSSL_library_init ( ) ;
/*! actions_to_seed_PRNG();*/
if ( ! server ) {
2015-01-23 12:38:06 -05:00
if ( me_str ! = NULL ) {
if ( false ) {
; /* for canonical reasons */
2011-12-04 09:14:34 -05:00
# if HAVE_SSLv2_client_method
2015-01-23 12:38:06 -05:00
} else if ( ! strcasecmp ( me_str , " SSL2 " ) ) {
2008-01-27 07:00:08 -05:00
method = sycSSLv2_client_method ( ) ;
2011-12-04 09:14:34 -05:00
# endif
2015-01-23 12:38:06 -05:00
# if HAVE_SSLv3_client_method
} else if ( ! strcasecmp ( me_str , " SSL3 " ) ) {
2008-01-27 07:00:08 -05:00
method = sycSSLv3_client_method ( ) ;
2015-01-23 12:38:06 -05:00
# endif
# if HAVE_SSLv23_client_method
} else if ( ! strcasecmp ( me_str , " SSL23 " ) ) {
2008-01-27 07:00:08 -05:00
method = sycSSLv23_client_method ( ) ;
2015-01-23 12:38:06 -05:00
# endif
# if HAVE_TLSv1_client_method
} else if ( ! strcasecmp ( me_str , " TLS1 " ) | | ! strcasecmp ( me_str , " TLS1.0 " ) ) {
2008-01-27 07:00:08 -05:00
method = sycTLSv1_client_method ( ) ;
2015-01-23 12:38:06 -05:00
# endif
# if HAVE_TLSv1_1_client_method
} else if ( ! strcasecmp ( me_str , " TLS1.1 " ) ) {
method = sycTLSv1_1_client_method ( ) ;
# endif
# if HAVE_TLSv1_2_client_method
} else if ( ! strcasecmp ( me_str , " TLS1.2 " ) ) {
method = sycTLSv1_2_client_method ( ) ;
# endif
# if HAVE_DTLSv1_client_method
} else if ( ! strcasecmp ( me_str , " DTLS " ) | | ! strcasecmp ( me_str , " DTLS1 " ) ) {
method = sycDTLSv1_client_method ( ) ;
# endif
2008-01-27 07:00:08 -05:00
} else {
2015-01-23 12:38:06 -05:00
Error1 ( " openssl-method= \" %s \" : method unknown or not provided by library " , me_str ) ;
2008-01-27 07:00:08 -05:00
}
} else {
2015-01-23 12:38:06 -05:00
# if HAVE_TLSv1_2_client_method
method = sycTLSv1_2_client_method ( ) ;
# elif HAVE_TLSv1_1_client_method
method = sycTLSv1_1_client_method ( ) ;
# elif HAVE_TLSv1_client_method
method = sycTLSv1_client_method ( ) ;
# elif HAVE_SSLv3_client_method
method = sycSSLv3_client_method ( ) ;
# elif HAVE_SSLv23_client_method
2011-12-04 09:14:34 -05:00
method = sycSSLv23_client_method ( ) ;
2015-01-23 12:38:06 -05:00
# elif HAVE_SSLv2_client_method
method = sycSSLv2_client_method ( ) ;
# else
# error "OpenSSL does not seem to provide client methods"
# endif
2008-01-27 07:00:08 -05:00
}
} else /* server */ {
if ( me_str ! = 0 ) {
2015-01-23 12:38:06 -05:00
if ( false ) {
; /* for canonical reasons */
2011-12-04 09:14:34 -05:00
# if HAVE_SSLv2_server_method
2015-01-23 12:38:06 -05:00
} else if ( ! strcasecmp ( me_str , " SSL2 " ) ) {
2008-01-27 07:00:08 -05:00
method = sycSSLv2_server_method ( ) ;
2011-12-04 09:14:34 -05:00
# endif
2015-01-23 12:38:06 -05:00
# if HAVE_SSLv3_server_method
} else if ( ! strcasecmp ( me_str , " SSL3 " ) ) {
2008-01-27 07:00:08 -05:00
method = sycSSLv3_server_method ( ) ;
2015-01-23 12:38:06 -05:00
# endif
# if HAVE_SSLv23_server_method
} else if ( ! strcasecmp ( me_str , " SSL23 " ) ) {
2008-01-27 07:00:08 -05:00
method = sycSSLv23_server_method ( ) ;
2015-01-23 12:38:06 -05:00
# endif
# if HAVE_TLSv1_server_method
} else if ( ! strcasecmp ( me_str , " TLS1 " ) | | ! strcasecmp ( me_str , " TLS1.0 " ) ) {
2008-01-27 07:00:08 -05:00
method = sycTLSv1_server_method ( ) ;
2015-01-23 12:38:06 -05:00
# endif
# if HAVE_TLSv1_1_server_method
} else if ( ! strcasecmp ( me_str , " TLS1.1 " ) ) {
method = sycTLSv1_1_server_method ( ) ;
# endif
# if HAVE_TLSv1_2_server_method
} else if ( ! strcasecmp ( me_str , " TLS1.2 " ) ) {
method = sycTLSv1_2_server_method ( ) ;
# endif
# if HAVE_DTLSv1_server_method
} else if ( ! strcasecmp ( me_str , " DTLS " ) | | ! strcasecmp ( me_str , " DTLS1 " ) ) {
method = sycDTLSv1_server_method ( ) ;
# endif
2008-01-27 07:00:08 -05:00
} else {
2015-01-23 12:38:06 -05:00
Error1 ( " openssl-method= \" %s \" : method unknown or not provided by library " , me_str ) ;
2008-01-27 07:00:08 -05:00
}
} else {
2015-01-23 12:38:06 -05:00
# if HAVE_TLSv1_2_server_method
method = sycTLSv1_2_server_method ( ) ;
# elif HAVE_TLSv1_1_server_method
method = sycTLSv1_1_server_method ( ) ;
# elif HAVE_TLSv1_server_method
method = sycTLSv1_1_method ( ) ;
# elif HAVE_SSLv3_server_method
method = sycSSLv3_server_method ( ) ;
# elif HAVE_SSLv23_server_method
2011-12-04 09:14:34 -05:00
method = sycSSLv23_server_method ( ) ;
2015-01-23 12:38:06 -05:00
# elif HAVE_SSLv2_server_method
method = sycSSLv2_server_method ( ) ;
# else
# error "OpenSSL does not seem to provide client methods"
# endif
2008-01-27 07:00:08 -05:00
}
}
if ( opt_egd ) {
sycRAND_egd ( opt_egd ) ;
}
if ( opt_pseudo ) {
long int randdata ;
/* initialize libc random from actual microseconds */
struct timeval tv ;
struct timezone tz ;
tz . tz_minuteswest = 0 ;
tz . tz_dsttime = 0 ;
if ( ( result = Gettimeofday ( & tv , & tz ) ) < 0 ) {
Warn2 ( " gettimeofday(%p, {0,0}): %s " , & tv , strerror ( errno ) ) ;
}
srandom ( tv . tv_sec * 1000000 + tv . tv_usec ) ;
while ( ! RAND_status ( ) ) {
randdata = random ( ) ;
Debug2 ( " RAND_seed(0x{%lx}, " F_Zu " ) " ,
randdata , sizeof ( randdata ) ) ;
RAND_seed ( & randdata , sizeof ( randdata ) ) ;
}
}
if ( ( * ctx = sycSSL_CTX_new ( method ) ) = = NULL ) {
if ( ERR_peek_error ( ) = = 0 ) Error ( " SSL_CTX_new() " ) ;
while ( err = ERR_get_error ( ) ) {
Error1 ( " SSL_CTX_new(): %s " , ERR_error_string ( err , NULL ) ) ;
}
/*ERR_clear_error;*/
return STAT_RETRYLATER ;
}
2011-11-22 04:42:38 -05:00
{
2015-01-04 10:38:36 -05:00
static unsigned char dh1024_p [ ] = {
0xCC , 0x17 , 0xF2 , 0xDC , 0x96 , 0xDF , 0x59 , 0xA4 , 0x46 , 0xC5 , 0x3E , 0x0E ,
0xB8 , 0x26 , 0x55 , 0x0C , 0xE3 , 0x88 , 0xC1 , 0xCE , 0xA7 , 0xBC , 0xB3 , 0xBF ,
0x16 , 0x94 , 0xD8 , 0xA9 , 0x45 , 0xA2 , 0xCE , 0xA9 , 0x5B , 0x22 , 0x25 , 0x5F ,
0x92 , 0x59 , 0x94 , 0x1C , 0x22 , 0xBF , 0xCB , 0xC8 , 0xC8 , 0x57 , 0xCB , 0xBF ,
0xBC , 0x0E , 0xE8 , 0x40 , 0xF9 , 0x87 , 0x03 , 0xBF , 0x60 , 0x9B , 0x08 , 0xC6 ,
0x8E , 0x99 , 0xC6 , 0x05 , 0xFC , 0x00 , 0xD6 , 0x6D , 0x90 , 0xA8 , 0xF5 , 0xF8 ,
0xD3 , 0x8D , 0x43 , 0xC8 , 0x8F , 0x7A , 0xBD , 0xBB , 0x28 , 0xAC , 0x04 , 0x69 ,
0x4A , 0x0B , 0x86 , 0x73 , 0x37 , 0xF0 , 0x6D , 0x4F , 0x04 , 0xF6 , 0xF5 , 0xAF ,
0xBF , 0xAB , 0x8E , 0xCE , 0x75 , 0x53 , 0x4D , 0x7F , 0x7D , 0x17 , 0x78 , 0x0E ,
0x12 , 0x46 , 0x4A , 0xAF , 0x95 , 0x99 , 0xEF , 0xBC , 0xA6 , 0xC5 , 0x41 , 0x77 ,
0x43 , 0x7A , 0xB9 , 0xEC , 0x8E , 0x07 , 0x3C , 0x6D ,
2011-11-22 04:42:38 -05:00
} ;
2015-01-04 10:38:36 -05:00
static unsigned char dh1024_g [ ] = {
2011-11-22 04:42:38 -05:00
0x02 ,
} ;
DH * dh ;
unsigned long err ;
if ( ( dh = DH_new ( ) ) = = NULL ) {
while ( err = ERR_get_error ( ) ) {
Warn1 ( " DH_new(): %s " ,
ERR_error_string ( err , NULL ) ) ;
}
Error ( " DH_new() failed " ) ;
} else {
2015-01-04 10:38:36 -05:00
dh - > p = BN_bin2bn ( dh1024_p , sizeof ( dh1024_p ) , NULL ) ;
dh - > g = BN_bin2bn ( dh1024_g , sizeof ( dh1024_g ) , NULL ) ;
2011-11-22 04:42:38 -05:00
if ( ( dh - > p = = NULL ) | | ( dh - > g = = NULL ) ) {
while ( err = ERR_get_error ( ) ) {
Warn1 ( " BN_bin2bn(): %s " ,
ERR_error_string ( err , NULL ) ) ;
}
Error ( " BN_bin2bn() failed " ) ;
} else {
2015-01-23 12:38:06 -05:00
if ( sycSSL_CTX_set_tmp_dh ( * ctx , dh ) < = 0 ) {
2011-11-22 04:42:38 -05:00
while ( err = ERR_get_error ( ) ) {
2011-12-04 14:51:31 -05:00
Warn3 ( " SSL_CTX_set_tmp_dh(%p, %p): %s " , * ctx , dh ,
2011-11-22 04:42:38 -05:00
ERR_error_string ( err , NULL ) ) ;
}
Error2 ( " SSL_CTX_set_tmp_dh(%p, %p) failed " , * ctx , dh ) ;
}
/*! OPENSSL_free(dh->p,g)? doc does not tell so */
}
DH_free ( dh ) ;
}
}
2011-11-26 08:27:02 -05:00
# if OPENSSL_VERSION_NUMBER >= 0x00908000L
if ( opt_compress ) {
int result ;
result = openssl_setup_compression ( * ctx , opt_compress ) ;
if ( result ! = STAT_OK ) {
return result ;
}
}
# endif
2008-01-27 07:00:08 -05:00
if ( opt_cafile ! = NULL | | opt_capath ! = NULL ) {
if ( sycSSL_CTX_load_verify_locations ( * ctx , opt_cafile , opt_capath ) ! = 1 ) {
int result ;
if ( ( result =
openssl_SSL_ERROR_SSL ( E_ERROR , " SSL_CTX_load_verify_locations " ) )
! = STAT_OK ) {
/*! free ctx */
return STAT_RETRYLATER ;
}
}
2014-04-03 06:57:43 -04:00
# ifdef HAVE_SSL_CTX_set_default_verify_paths
} else {
SSL_CTX_set_default_verify_paths ( * ctx ) ;
# endif
2008-01-27 07:00:08 -05:00
}
if ( opt_cert ) {
BIO * bio ;
DH * dh ;
if ( sycSSL_CTX_use_certificate_chain_file ( * ctx , opt_cert ) < = 0 ) {
/*! trace functions */
/*0 ERR_print_errors_fp(stderr);*/
if ( ERR_peek_error ( ) = = 0 )
Error2 ( " SSL_CTX_use_certificate_file(%p, \" %s \" , SSL_FILETYPE_PEM) failed " ,
* ctx , opt_cert ) ;
while ( err = ERR_get_error ( ) ) {
Error1 ( " SSL_CTX_use_certificate_file(): %s " ,
ERR_error_string ( err , NULL ) ) ;
}
return STAT_RETRYLATER ;
}
if ( sycSSL_CTX_use_PrivateKey_file ( * ctx , opt_key ? opt_key : opt_cert , SSL_FILETYPE_PEM ) < = 0 ) {
/*ERR_print_errors_fp(stderr);*/
openssl_SSL_ERROR_SSL ( E_ERROR /*!*/ , " SSL_CTX_use_PrivateKey_file " ) ;
return STAT_RETRYLATER ;
}
if ( opt_dhparam = = NULL ) {
opt_dhparam = ( char * ) opt_cert ;
}
if ( ( bio = sycBIO_new_file ( opt_dhparam , " r " ) ) = = NULL ) {
Warn2 ( " BIO_new_file( \" %s \" , \" r \" ): %s " ,
opt_dhparam , strerror ( errno ) ) ;
} else {
if ( ( dh = sycPEM_read_bio_DHparams ( bio , NULL , NULL , NULL ) ) = = NULL ) {
Info1 ( " PEM_read_bio_DHparams(%p, NULL, NULL, NULL): error " , bio ) ;
} else {
BIO_free ( bio ) ;
2015-01-23 12:38:06 -05:00
if ( sycSSL_CTX_set_tmp_dh ( * ctx , dh ) < = 0 ) {
while ( err = ERR_get_error ( ) ) {
Warn3 ( " SSL_CTX_set_tmp_dh(%p, %p): %s " , * ctx , dh ,
ERR_error_string ( err , NULL ) ) ;
}
Error2 ( " SSL_CTX_set_tmp_dh(%p, %p): error " , * ctx , dh ) ;
2008-01-27 07:00:08 -05:00
}
}
}
}
/* set pre ssl-connect options */
/* SSL_CIPHERS */
if ( ci_str ! = NULL ) {
if ( sycSSL_CTX_set_cipher_list ( * ctx , ci_str ) < = 0 ) {
if ( ERR_peek_error ( ) = = 0 )
Error1 ( " SSL_set_cipher_list(, \" %s \" ) failed " , ci_str ) ;
while ( err = ERR_get_error ( ) ) {
Error2 ( " SSL_set_cipher_list(, \" %s \" ): %s " ,
ci_str , ERR_error_string ( err , NULL ) ) ;
}
/*Error("SSL_new()");*/
return STAT_RETRYLATER ;
}
}
if ( * opt_ver ) {
sycSSL_CTX_set_verify ( * ctx ,
SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT ,
NULL ) ;
} else {
sycSSL_CTX_set_verify ( * ctx ,
SSL_VERIFY_NONE ,
NULL ) ;
}
return STAT_OK ;
}
/* analyses an OpenSSL error condition, prints the appropriate messages with
severity ' level ' and returns one of STAT_OK , STAT_RETRYLATER , or
STAT_NORETRY */
static int openssl_SSL_ERROR_SSL ( int level , const char * funcname ) {
unsigned long e ;
char buf [ 120 ] ; /* this value demanded by "man ERR_error_string" */
2015-01-12 17:34:47 -05:00
int stat = STAT_OK ;
while ( e = ERR_get_error ( ) ) {
Debug1 ( " ERR_get_error(): %lx " , e ) ;
if ( e = = ( ( ERR_LIB_RAND < < 24 ) |
( RAND_F_SSLEAY_RAND_BYTES < < 12 ) |
( RAND_R_PRNG_NOT_SEEDED ) ) /*0x24064064*/ ) {
Error ( " too few entropy; use options \" egd \" or \" pseudo \" " ) ;
stat = STAT_NORETRY ;
} else {
Msg2 ( level , " %s(): %s " , funcname , ERR_error_string ( e , buf ) ) ;
stat = level = = E_ERROR ? STAT_NORETRY : STAT_RETRYLATER ;
}
2008-01-27 07:00:08 -05:00
}
2015-01-12 17:34:47 -05:00
return stat ;
2008-01-27 07:00:08 -05:00
}
static const char * openssl_verify_messages [ ] = {
/* 0 */ " ok " ,
/* 1 */ NULL ,
/* 2 */ " unable to get issuer certificate " ,
/* 3 */ " unable to get certificate CRL " ,
/* 4 */ " unable to decrypt certificate's signature " ,
/* 5 */ " unable to decrypt CRL's signature " ,
/* 6 */ " unable to decode issuer public key " ,
/* 7 */ " certificate signature failure " ,
/* 8 */ " CRL signature failure " ,
/* 9 */ " certificate is not yet valid " ,
/* 10 */ " certificate has expired " ,
/* 11 */ " CRL is not yet valid " ,
/* 12 */ " CRL has expired " ,
/* 13 */ " format error in certificate's notBefore field " ,
/* 14 */ " format error in certificate's notAfter field " ,
/* 15 */ " format error in CRL's lastUpdate field " ,
/* 16 */ " format error in CRL's nextUpdate field " ,
/* 17 */ " out of memory " ,
/* 18 */ " self signed certificate " ,
/* 19 */ " self signed certificate in certificate chain " ,
/* 20 */ " unable to get local issuer certificate " ,
/* 21 */ " unable to verify the first certificate " ,
/* 22 */ " certificate chain too long " ,
/* 23 */ " certificate revoked " ,
/* 24 */ " invalid CA certificate " ,
/* 25 */ " path length constraint exceeded " ,
/* 26 */ " unsupported certificate purpose " ,
/* 27 */ " certificate not trusted " ,
/* 28 */ " certificate rejected " ,
/* 29 */ " subject issuer mismatch " ,
/* 30 */ " authority and subject key identifier mismatch " ,
/* 31 */ " authority and issuer serial number mismatch " ,
/* 32 */ " key usage does not include certificate signing " ,
/* 33 */ NULL ,
/* 34 */ NULL ,
/* 35 */ NULL ,
/* 36 */ NULL ,
/* 37 */ NULL ,
/* 38 */ NULL ,
/* 39 */ NULL ,
/* 40 */ NULL ,
/* 41 */ NULL ,
/* 42 */ NULL ,
/* 43 */ NULL ,
/* 44 */ NULL ,
/* 45 */ NULL ,
/* 46 */ NULL ,
/* 47 */ NULL ,
/* 48 */ NULL ,
/* 49 */ NULL ,
/* 50 */ " application verification failure " ,
} ;
2015-01-12 17:34:47 -05:00
/* delete all environment variables whose name begins with SOCAT_OPENSSL_
resp . < progname > _OPENSSL_ */
static int openssl_delete_cert_info ( void ) {
# define XIO_ENVNAMELEN 256
const char * progname ;
char envprefix [ XIO_ENVNAMELEN ] ;
char envname [ XIO_ENVNAMELEN ] ;
size_t i , l ;
const char * * entry ;
progname = diag_get_string ( ' p ' ) ;
envprefix [ 0 ] = ' \0 ' ; strncat ( envprefix , progname , XIO_ENVNAMELEN - 1 ) ;
l = strlen ( envprefix ) ;
for ( i = 0 ; i < l ; + + i ) envprefix [ i ] = toupper ( envprefix [ i ] ) ;
strncat ( envprefix + l , " _OPENSSL_ " , XIO_ENVNAMELEN - l - 1 ) ;
2015-01-18 11:43:13 -05:00
# if HAVE_VAR_ENVIRON
2015-01-12 17:34:47 -05:00
entry = ( const char * * ) environ ;
while ( * entry ! = NULL ) {
if ( ! strncmp ( * entry , envprefix , strlen ( envprefix ) ) ) {
const char * eq = strchr ( * entry , ' = ' ) ;
if ( eq = = NULL ) eq = * entry + strlen ( * entry ) ;
envname [ 0 ] = ' \0 ' ; strncat ( envname , * entry , eq - * entry ) ;
Unsetenv ( envname ) ;
} else {
+ + entry ;
2015-01-12 17:11:26 -05:00
}
2015-01-12 17:34:47 -05:00
}
2015-01-18 11:43:13 -05:00
# endif /* HAVE_VAR_ENVIRON */
2015-01-12 17:34:47 -05:00
return 0 ;
}
/* read in the "name" information (from field "issuer" or "subject") and
create environment variable with complete info , eg :
SOCAT_OPENSSL_X509_SUBJECT */
static int openssl_setenv_cert_name ( const char * field , X509_NAME * name ) {
BIO * bio = BIO_new ( BIO_s_mem ( ) ) ;
char * buf = NULL , * str ;
size_t len ;
X509_NAME_print_ex ( bio , name , 0 , XN_FLAG_ONELINE & ~ ASN1_STRFLGS_ESC_MSB ) ; /* rc not documented */
len = BIO_get_mem_data ( bio , & buf ) ;
if ( ( str = Malloc ( len + 1 ) ) = = NULL ) {
2015-01-12 17:11:26 -05:00
BIO_free ( bio ) ;
2015-01-12 17:34:47 -05:00
return - 1 ;
2015-01-12 17:11:26 -05:00
}
2015-01-12 17:34:47 -05:00
str [ len ] = ' \0 ' ;
Info2 ( " SSL peer cert %s: \" %s \" " , field , buf ) ;
xiosetenv2 ( " OPENSSL_X509 " , field , buf , 1 , NULL ) ;
free ( str ) ;
BIO_free ( bio ) ;
return 0 ;
}
/* read in the "name" information (from field "issuer" or "subject") and
create environment variables with the fields , eg :
SOCAT_OPENSSL_X509_COMMONNAME
*/
static int openssl_setenv_cert_fields ( const char * field , X509_NAME * name ) {
int n , i ;
2015-01-12 17:11:26 -05:00
n = X509_NAME_entry_count ( name ) ;
2015-01-12 17:34:47 -05:00
/* extract fields of cert name */
2015-01-12 17:11:26 -05:00
for ( i = 0 ; i < n ; + + i ) {
X509_NAME_ENTRY * entry ;
ASN1_OBJECT * obj ;
2015-01-12 17:34:47 -05:00
ASN1_STRING * data ;
unsigned char * text ;
2015-01-12 17:11:26 -05:00
int nid ;
entry = X509_NAME_get_entry ( name , i ) ;
obj = X509_NAME_ENTRY_get_object ( entry ) ;
2015-01-12 17:34:47 -05:00
data = X509_NAME_ENTRY_get_data ( entry ) ;
2015-01-12 17:11:26 -05:00
nid = OBJ_obj2nid ( obj ) ;
2015-01-12 17:34:47 -05:00
text = ASN1_STRING_data ( data ) ;
Debug3 ( " SSL peer cert %s entry: %s= \" %s \" " , ( field [ 0 ] ? field : " subject " ) , OBJ_nid2ln ( nid ) , text ) ;
if ( field ! = NULL & & field [ 0 ] ! = ' \0 ' ) {
xiosetenv3 ( " OPENSSL_X509 " , field , OBJ_nid2ln ( nid ) , ( const char * ) text , 2 , " // " ) ;
} else {
xiosetenv2 ( " OPENSSL_X509 " , OBJ_nid2ln ( nid ) , ( const char * ) text , 2 , " // " ) ;
}
2015-01-12 17:11:26 -05:00
}
return 0 ;
}
2015-01-12 17:34:47 -05:00
/* compares the peername used/provided by the client to cn as extracted from
the peer certificate .
supports wildcard cn like * . domain which matches domain and
host . domain
returns true on match */
static bool openssl_check_name ( const char * cn , const char * peername ) {
const char * dotp ;
if ( peername = = NULL ) {
Info1 ( " commonName \" %s \" : no peername " , cn ) ;
return false ;
} else if ( peername [ 0 ] = = ' \0 ' ) {
Info1 ( " commonName \" %s \" : matched by empty peername " , cn ) ;
return true ;
}
if ( ! ( cn [ 0 ] = = ' * ' & & cn [ 1 ] = = ' . ' ) ) {
/* normal server name - this is simple */
Debug1 ( " commonName \" %s \" has no wildcard " , cn ) ;
if ( strcmp ( cn , peername ) = = 0 ) {
Debug2 ( " commonName \" %s \" matches peername \" %s \" " , cn , peername ) ;
return true ;
} else {
Info2 ( " commonName \" %s \" does not match peername \" %s \" " , cn , peername ) ;
return false ;
}
}
/* wildcard cert */
Debug1 ( " commonName \" %s \" is a wildcard name " , cn ) ;
/* case: just the base domain */
if ( strcmp ( cn + 2 , peername ) = = 0 ) {
Debug2 ( " wildcard commonName \" %s \" matches base domain \" %s \" " , cn , peername ) ;
return true ;
}
/* case: subdomain; only one level! */
dotp = strchr ( peername , ' . ' ) ;
if ( dotp = = NULL ) {
Info2 ( " peername \" %s \" is not a subdomain, thus is not matched by wildcard commonName \" %s \" " ,
peername , cn ) ;
return false ;
}
if ( strcmp ( cn + 1 , dotp ) ! = 0 ) {
Info2 ( " commonName \" %s \" does not match subdomain peername \" %s \" " , cn , peername ) ;
return false ;
}
Debug2 ( " commonName \" %s \" matches subdomain peername \" %s \" " , cn , peername ) ;
return true ;
}
/* retrieves the commonName field and compares it to the peername
returns true on match , false otherwise */
static bool openssl_check_peername ( X509_NAME * name , const char * peername ) {
int ind = - 1 ;
X509_NAME_ENTRY * entry ;
ASN1_STRING * data ;
unsigned char * text ;
ind = X509_NAME_get_index_by_NID ( name , NID_commonName , - 1 ) ;
if ( ind < 0 ) {
Info ( " no COMMONNAME field in peer certificate " ) ;
return false ;
}
entry = X509_NAME_get_entry ( name , ind ) ;
data = X509_NAME_ENTRY_get_data ( entry ) ;
text = ASN1_STRING_data ( data ) ;
return openssl_check_name ( ( const char * ) text , peername ) ;
}
/* retrieves certificate provided by peer, sets env vars containing
certificates field values , and checks peername if provided by
calling function */
/* parts of this code were copied from Gene Spaffords C/C++ Secure Programming at Etutorials.org:
http : //etutorials.org/Programming/secure+programming/Chapter+10.+Public+Key+Infrastructure/10.8+Adding+Hostname+Checking+to+Certificate+Verification/
The code examples in this tutorial do not seem to have explicit license restrictions .
*/
2008-01-27 07:00:08 -05:00
static int openssl_handle_peer_certificate ( struct single * xfd ,
2015-01-12 17:34:47 -05:00
const char * peername ,
2008-01-27 07:00:08 -05:00
bool opt_ver , int level ) {
X509 * peer_cert ;
2015-01-12 17:34:47 -05:00
X509_NAME * subjectname , * issuername ;
2015-01-12 17:11:26 -05:00
/*ASN1_TIME not_before, not_after;*/
2015-01-12 17:34:47 -05:00
int extcount , i , ok = 0 ;
2008-01-27 07:00:08 -05:00
int status ;
2015-01-12 17:34:47 -05:00
if ( ( peer_cert = SSL_get_peer_certificate ( xfd - > para . openssl . ssl ) ) = = NULL ) {
2008-01-27 07:00:08 -05:00
if ( opt_ver ) {
Msg ( level , " no peer certificate " ) ;
status = STAT_RETRYLATER ;
} else {
Notice ( " no peer certificate and no check " ) ;
status = STAT_OK ;
}
2015-01-12 17:34:47 -05:00
return status ;
}
/* verify peer certificate (trust, signature, validity dates) */
if ( opt_ver ) {
long verify_result ;
if ( ( verify_result = sycSSL_get_verify_result ( xfd - > para . openssl . ssl ) ) ! = X509_V_OK ) {
const char * message = NULL ;
if ( verify_result > = 0 & &
( size_t ) verify_result <
sizeof ( openssl_verify_messages ) / sizeof ( char * ) ) {
message = openssl_verify_messages [ verify_result ] ;
}
if ( message ) {
Msg1 ( level , " %s " , message ) ;
} else {
Msg1 ( level , " rejected peer certificate with error %ld " , verify_result ) ;
}
status = STAT_RETRYLATER ;
X509_free ( peer_cert ) ;
return STAT_RETRYLATER ;
}
Info ( " peer certificate is trusted " ) ;
}
/* set env vars from cert's subject and issuer values */
if ( ( subjectname = X509_get_subject_name ( peer_cert ) ) ! = NULL ) {
openssl_setenv_cert_name ( " subject " , subjectname ) ;
openssl_setenv_cert_fields ( " " , subjectname ) ;
/*! I'd like to provide dates too; see
http : //markmail.org/message/yi4vspp7aeu3xwtu#query:+page:1+mid:jhnl4wklif3pgzqf+state:results */
}
if ( ( issuername = X509_get_issuer_name ( peer_cert ) ) ! = NULL ) {
openssl_setenv_cert_name ( " issuer " , issuername ) ;
}
/* check peername against cert's subjectAltName DNS entries */
/* this code is based on example from Gerhard Gappmeier in
http : //openssl.6102.n7.nabble.com/How-to-extract-subjectAltName-td17236.html
*/
if ( ( extcount = X509_get_ext_count ( peer_cert ) ) > 0 ) {
for ( i = 0 ; ! ok & & i < extcount ; + + i ) {
const char * extstr ;
X509_EXTENSION * ext ;
const X509V3_EXT_METHOD * meth ;
ext = X509_get_ext ( peer_cert , i ) ;
extstr = OBJ_nid2sn ( OBJ_obj2nid ( X509_EXTENSION_get_object ( ext ) ) ) ;
if ( ! strcasecmp ( extstr , " subjectAltName " ) ) {
void * names ;
if ( ! ( meth = X509V3_EXT_get ( ext ) ) ) break ;
names = X509_get_ext_d2i ( peer_cert , NID_subject_alt_name , NULL , NULL ) ;
if ( names ) {
int numalts ;
int i ;
/* get amount of alternatives, RFC2459 claims there MUST be at least one, but we don't depend on it... */
numalts = sk_GENERAL_NAME_num ( names ) ;
/* loop through all alternatives */
for ( i = 0 ; ( i < numalts ) ; i + + ) {
/* get a handle to alternative name number i */
const GENERAL_NAME * pName = sk_GENERAL_NAME_value ( names , i ) ;
unsigned char * pBuffer ;
switch ( pName - > type ) {
case GEN_DNS :
ASN1_STRING_to_UTF8 ( & pBuffer ,
pName - > d . ia5 ) ;
xiosetenv ( " OPENSSL_X509V3_SUBJECTALTNAME_DNS " , ( char * ) pBuffer , 2 , " // " ) ;
if ( peername ! = NULL & &
openssl_check_name ( ( char * ) pBuffer , /*const char*/ peername ) ) {
ok = 1 ;
}
OPENSSL_free ( pBuffer ) ;
break ;
default : continue ;
}
}
}
}
}
2008-01-27 07:00:08 -05:00
}
2015-01-12 17:34:47 -05:00
if ( ! opt_ver ) {
Notice ( " option openssl-verify disabled, no check of certificate " ) ;
X509_free ( peer_cert ) ;
return STAT_OK ;
}
if ( peername = = NULL | | peername [ 0 ] = = ' \0 ' ) {
Notice ( " trusting certificate, no check of commonName " ) ;
X509_free ( peer_cert ) ;
return STAT_OK ;
}
if ( ok ) {
Notice ( " trusting certificate, commonName matches " ) ;
X509_free ( peer_cert ) ;
return STAT_OK ;
}
/* here: all envs set; opt_ver, cert verified, no subjAltName match -> check subject CN */
if ( ! openssl_check_peername ( /*X509_NAME*/ subjectname , /*const char*/ peername ) ) {
Error ( " certificate is valid but its commonName does not match hostname " ) ;
status = STAT_NORETRY ;
} else {
Notice ( " trusting certificate, commonName matches " ) ;
status = STAT_OK ;
}
2008-01-27 07:00:08 -05:00
X509_free ( peer_cert ) ;
return status ;
}
static int xioSSL_set_fd ( struct single * xfd , int level ) {
unsigned long err ;
/* assign a network connection to the SSL object */
if ( sycSSL_set_fd ( xfd - > para . openssl . ssl , xfd - > fd ) < = 0 ) {
Msg ( level , " SSL_set_fd() failed " ) ;
while ( err = ERR_get_error ( ) ) {
Msg2 ( level , " SSL_set_fd(, %d): %s " ,
xfd - > fd , ERR_error_string ( err , NULL ) ) ;
}
return STAT_RETRYLATER ;
}
return STAT_OK ;
}
/* ...
in case of an error condition , this function check forever and retry
options and ev . sleeps an interval . It returns NORETRY when the caller
should not retry for any reason . */
2015-01-12 17:34:47 -05:00
static int xioSSL_connect ( struct single * xfd , const char * opt_commonname ,
bool opt_ver , int level ) {
2008-01-27 07:00:08 -05:00
char error_string [ 120 ] ;
int errint , status , ret ;
unsigned long err ;
/* connect via SSL by performing handshake */
if ( ( ret = sycSSL_connect ( xfd - > para . openssl . ssl ) ) < = 0 ) {
/*if (ERR_peek_error() == 0) Msg(level, "SSL_connect() failed");*/
errint = SSL_get_error ( xfd - > para . openssl . ssl , ret ) ;
switch ( errint ) {
case SSL_ERROR_NONE :
/* this is not an error, but I dare not continue for security reasons*/
Msg ( level , " ok " ) ;
status = STAT_RETRYLATER ;
case SSL_ERROR_ZERO_RETURN :
Msg ( level , " connection closed (wrong version number?) " ) ;
status = STAT_RETRYLATER ;
break ;
case SSL_ERROR_WANT_READ :
case SSL_ERROR_WANT_WRITE :
case SSL_ERROR_WANT_CONNECT :
case SSL_ERROR_WANT_X509_LOOKUP :
Msg ( level , " nonblocking operation did not complete " ) ;
status = STAT_RETRYLATER ;
break ; /*!*/
case SSL_ERROR_SYSCALL :
if ( ERR_peek_error ( ) = = 0 ) {
if ( ret = = 0 ) {
Msg ( level , " SSL_connect(): socket closed by peer " ) ;
} else if ( ret = = - 1 ) {
Msg1 ( level , " SSL_connect(): %s " , strerror ( errno ) ) ;
}
} else {
Msg ( level , " I/O error " ) ; /*!*/
while ( err = ERR_get_error ( ) ) {
ERR_error_string_n ( err , error_string , sizeof ( error_string ) ) ;
Msg4 ( level , " SSL_connect(): %s / %s / %s / %s " , error_string ,
ERR_lib_error_string ( err ) , ERR_func_error_string ( err ) ,
ERR_reason_error_string ( err ) ) ;
}
}
status = STAT_RETRYLATER ;
break ;
case SSL_ERROR_SSL :
status = openssl_SSL_ERROR_SSL ( level , " SSL_connect " ) ;
2015-01-12 17:34:47 -05:00
if ( openssl_handle_peer_certificate ( xfd , opt_commonname , opt_ver , level /*!*/ ) < 0 ) {
2008-01-27 07:00:08 -05:00
return STAT_RETRYLATER ;
}
break ;
default :
Msg ( level , " unknown error " ) ;
status = STAT_RETRYLATER ;
break ;
}
return status ;
}
return STAT_OK ;
}
/* on result < 0: errno is set (at least to EIO) */
ssize_t xioread_openssl ( struct single * pipe , void * buff , size_t bufsiz ) {
unsigned long err ;
char error_string [ 120 ] ;
int _errno = EIO ; /* if we have no better idea about nature of error */
int errint , ret ;
ret = sycSSL_read ( pipe - > para . openssl . ssl , buff , bufsiz ) ;
if ( ret < 0 ) {
errint = SSL_get_error ( pipe - > para . openssl . ssl , ret ) ;
switch ( errint ) {
case SSL_ERROR_NONE :
/* this is not an error, but I dare not continue for security reasons*/
Error ( " ok " ) ;
2015-01-12 17:11:26 -05:00
break ;
2008-01-27 07:00:08 -05:00
case SSL_ERROR_ZERO_RETURN :
Error ( " connection closed by peer " ) ;
break ;
case SSL_ERROR_WANT_READ :
case SSL_ERROR_WANT_WRITE :
case SSL_ERROR_WANT_CONNECT :
case SSL_ERROR_WANT_X509_LOOKUP :
2010-01-09 07:35:24 -05:00
Info ( " nonblocking operation did not complete " ) ;
errno = EAGAIN ;
return - 1 ;
2008-01-27 07:00:08 -05:00
case SSL_ERROR_SYSCALL :
if ( ERR_peek_error ( ) = = 0 ) {
if ( ret = = 0 ) {
Error ( " SSL_read(): socket closed by peer " ) ;
} else if ( ret = = - 1 ) {
_errno = errno ;
Error1 ( " SSL_read(): %s " , strerror ( errno ) ) ;
}
} else {
Error ( " I/O error " ) ; /*!*/
while ( err = ERR_get_error ( ) ) {
ERR_error_string_n ( err , error_string , sizeof ( error_string ) ) ;
Error4 ( " SSL_read(): %s / %s / %s / %s " , error_string ,
ERR_lib_error_string ( err ) , ERR_func_error_string ( err ) ,
ERR_reason_error_string ( err ) ) ;
}
}
break ;
case SSL_ERROR_SSL :
openssl_SSL_ERROR_SSL ( E_ERROR , " SSL_connect " ) ;
break ;
default :
Error ( " unknown error " ) ;
break ;
}
errno = _errno ;
return - 1 ;
}
return ret ;
}
ssize_t xiopending_openssl ( struct single * pipe ) {
int bytes = sycSSL_pending ( pipe - > para . openssl . ssl ) ;
return bytes ;
}
/* on result < 0: errno is set (at least to EIO) */
ssize_t xiowrite_openssl ( struct single * pipe , const void * buff , size_t bufsiz ) {
unsigned long err ;
char error_string [ 120 ] ;
int _errno = EIO ; /* if we have no better idea about nature of error */
int errint , ret ;
ret = sycSSL_write ( pipe - > para . openssl . ssl , buff , bufsiz ) ;
if ( ret < 0 ) {
errint = SSL_get_error ( pipe - > para . openssl . ssl , ret ) ;
switch ( errint ) {
case SSL_ERROR_NONE :
/* this is not an error, but I dare not continue for security reasons*/
Error ( " ok " ) ;
case SSL_ERROR_ZERO_RETURN :
Error ( " connection closed by peer " ) ;
break ;
case SSL_ERROR_WANT_READ :
case SSL_ERROR_WANT_WRITE :
case SSL_ERROR_WANT_CONNECT :
case SSL_ERROR_WANT_X509_LOOKUP :
Error ( " nonblocking operation did not complete " ) ;
break ; /*!*/
case SSL_ERROR_SYSCALL :
if ( ERR_peek_error ( ) = = 0 ) {
if ( ret = = 0 ) {
Error ( " SSL_write(): socket closed by peer " ) ;
} else if ( ret = = - 1 ) {
_errno = errno ;
Error1 ( " SSL_write(): %s " , strerror ( errno ) ) ;
}
} else {
Error ( " I/O error " ) ; /*!*/
while ( err = ERR_get_error ( ) ) {
ERR_error_string_n ( err , error_string , sizeof ( error_string ) ) ;
Error4 ( " SSL_write(): %s / %s / %s / %s " , error_string ,
ERR_lib_error_string ( err ) , ERR_func_error_string ( err ) ,
ERR_reason_error_string ( err ) ) ;
}
}
break ;
case SSL_ERROR_SSL :
openssl_SSL_ERROR_SSL ( E_ERROR , " SSL_connect " ) ;
break ;
default :
Error ( " unknown error " ) ;
break ;
}
errno = _errno ;
return - 1 ;
}
return ret ;
}
# endif /* WITH_OPENSSL */