1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000 1.2 +++ b/security/nss/lib/ssl/sslsock.c Wed Dec 31 06:09:35 2014 +0100 1.3 @@ -0,0 +1,2992 @@ 1.4 +/* 1.5 + * vtables (and methods that call through them) for the 4 types of 1.6 + * SSLSockets supported. Only one type is still supported. 1.7 + * Various other functions. 1.8 + * 1.9 + * This Source Code Form is subject to the terms of the Mozilla Public 1.10 + * License, v. 2.0. If a copy of the MPL was not distributed with this 1.11 + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ 1.12 +#include "seccomon.h" 1.13 +#include "cert.h" 1.14 +#include "keyhi.h" 1.15 +#include "ssl.h" 1.16 +#include "sslimpl.h" 1.17 +#include "sslproto.h" 1.18 +#include "nspr.h" 1.19 +#include "private/pprio.h" 1.20 +#ifndef NO_PKCS11_BYPASS 1.21 +#include "blapi.h" 1.22 +#endif 1.23 +#include "nss.h" 1.24 + 1.25 +#define SET_ERROR_CODE /* reminder */ 1.26 + 1.27 +static const sslSocketOps ssl_default_ops = { /* No SSL. */ 1.28 + ssl_DefConnect, 1.29 + NULL, 1.30 + ssl_DefBind, 1.31 + ssl_DefListen, 1.32 + ssl_DefShutdown, 1.33 + ssl_DefClose, 1.34 + ssl_DefRecv, 1.35 + ssl_DefSend, 1.36 + ssl_DefRead, 1.37 + ssl_DefWrite, 1.38 + ssl_DefGetpeername, 1.39 + ssl_DefGetsockname 1.40 +}; 1.41 + 1.42 +static const sslSocketOps ssl_secure_ops = { /* SSL. */ 1.43 + ssl_SecureConnect, 1.44 + NULL, 1.45 + ssl_DefBind, 1.46 + ssl_DefListen, 1.47 + ssl_SecureShutdown, 1.48 + ssl_SecureClose, 1.49 + ssl_SecureRecv, 1.50 + ssl_SecureSend, 1.51 + ssl_SecureRead, 1.52 + ssl_SecureWrite, 1.53 + ssl_DefGetpeername, 1.54 + ssl_DefGetsockname 1.55 +}; 1.56 + 1.57 +/* 1.58 +** default settings for socket enables 1.59 +*/ 1.60 +static sslOptions ssl_defaults = { 1.61 + { siBuffer, NULL, 0 }, /* nextProtoNego */ 1.62 + PR_TRUE, /* useSecurity */ 1.63 + PR_FALSE, /* useSocks */ 1.64 + PR_FALSE, /* requestCertificate */ 1.65 + 2, /* requireCertificate */ 1.66 + PR_FALSE, /* handshakeAsClient */ 1.67 + PR_FALSE, /* handshakeAsServer */ 1.68 + PR_FALSE, /* enableSSL2 */ /* now defaults to off in NSS 3.13 */ 1.69 + PR_FALSE, /* unusedBit9 */ 1.70 + PR_FALSE, /* unusedBit10 */ 1.71 + PR_FALSE, /* noCache */ 1.72 + PR_FALSE, /* fdx */ 1.73 + PR_FALSE, /* v2CompatibleHello */ /* now defaults to off in NSS 3.13 */ 1.74 + PR_TRUE, /* detectRollBack */ 1.75 + PR_FALSE, /* noStepDown */ 1.76 + PR_FALSE, /* bypassPKCS11 */ 1.77 + PR_FALSE, /* noLocks */ 1.78 + PR_FALSE, /* enableSessionTickets */ 1.79 + PR_FALSE, /* enableDeflate */ 1.80 + 2, /* enableRenegotiation (default: requires extension) */ 1.81 + PR_FALSE, /* requireSafeNegotiation */ 1.82 + PR_FALSE, /* enableFalseStart */ 1.83 + PR_TRUE, /* cbcRandomIV */ 1.84 + PR_FALSE, /* enableOCSPStapling */ 1.85 + PR_TRUE, /* enableNPN */ 1.86 + PR_FALSE, /* enableALPN */ 1.87 + PR_FALSE, /* dummy */ 1.88 + PR_FALSE /* enableFallbackSCSV */ 1.89 +}; 1.90 + 1.91 +/* 1.92 + * default range of enabled SSL/TLS protocols 1.93 + */ 1.94 +static SSLVersionRange versions_defaults_stream = { 1.95 + SSL_LIBRARY_VERSION_3_0, 1.96 + SSL_LIBRARY_VERSION_TLS_1_0 1.97 +}; 1.98 + 1.99 +static SSLVersionRange versions_defaults_datagram = { 1.100 + SSL_LIBRARY_VERSION_TLS_1_1, 1.101 + SSL_LIBRARY_VERSION_TLS_1_1 1.102 +}; 1.103 + 1.104 +#define VERSIONS_DEFAULTS(variant) \ 1.105 + (variant == ssl_variant_stream ? &versions_defaults_stream : \ 1.106 + &versions_defaults_datagram) 1.107 + 1.108 +sslSessionIDLookupFunc ssl_sid_lookup; 1.109 +sslSessionIDCacheFunc ssl_sid_cache; 1.110 +sslSessionIDUncacheFunc ssl_sid_uncache; 1.111 + 1.112 +static PRBool ssl_inited = PR_FALSE; 1.113 +static PRDescIdentity ssl_layer_id; 1.114 + 1.115 +PRBool locksEverDisabled; /* implicitly PR_FALSE */ 1.116 +PRBool ssl_force_locks; /* implicitly PR_FALSE */ 1.117 +int ssl_lock_readers = 1; /* default true. */ 1.118 +char ssl_debug; 1.119 +char ssl_trace; 1.120 +FILE * ssl_trace_iob; 1.121 +FILE * ssl_keylog_iob; 1.122 +char lockStatus[] = "Locks are ENABLED. "; 1.123 +#define LOCKSTATUS_OFFSET 10 /* offset of ENABLED */ 1.124 + 1.125 +/* SRTP_NULL_HMAC_SHA1_80 and SRTP_NULL_HMAC_SHA1_32 are not implemented. */ 1.126 +static const PRUint16 srtpCiphers[] = { 1.127 + SRTP_AES128_CM_HMAC_SHA1_80, 1.128 + SRTP_AES128_CM_HMAC_SHA1_32, 1.129 + 0 1.130 +}; 1.131 + 1.132 +/* forward declarations. */ 1.133 +static sslSocket *ssl_NewSocket(PRBool makeLocks, SSLProtocolVariant variant); 1.134 +static SECStatus ssl_MakeLocks(sslSocket *ss); 1.135 +static void ssl_SetDefaultsFromEnvironment(void); 1.136 +static PRStatus ssl_PushIOLayer(sslSocket *ns, PRFileDesc *stack, 1.137 + PRDescIdentity id); 1.138 + 1.139 +/************************************************************************/ 1.140 + 1.141 +/* 1.142 +** Lookup a socket structure from a file descriptor. 1.143 +** Only functions called through the PRIOMethods table should use this. 1.144 +** Other app-callable functions should use ssl_FindSocket. 1.145 +*/ 1.146 +static sslSocket * 1.147 +ssl_GetPrivate(PRFileDesc *fd) 1.148 +{ 1.149 + sslSocket *ss; 1.150 + 1.151 + PORT_Assert(fd != NULL); 1.152 + PORT_Assert(fd->methods->file_type == PR_DESC_LAYERED); 1.153 + PORT_Assert(fd->identity == ssl_layer_id); 1.154 + 1.155 + if (fd->methods->file_type != PR_DESC_LAYERED || 1.156 + fd->identity != ssl_layer_id) { 1.157 + PORT_SetError(PR_BAD_DESCRIPTOR_ERROR); 1.158 + return NULL; 1.159 + } 1.160 + 1.161 + ss = (sslSocket *)fd->secret; 1.162 + /* Set ss->fd lazily. We can't rely on the value of ss->fd set by 1.163 + * ssl_PushIOLayer because another PR_PushIOLayer call will switch the 1.164 + * contents of the PRFileDesc pointed by ss->fd and the new layer. 1.165 + * See bug 807250. 1.166 + */ 1.167 + ss->fd = fd; 1.168 + return ss; 1.169 +} 1.170 + 1.171 +/* This function tries to find the SSL layer in the stack. 1.172 + * It searches for the first SSL layer at or below the argument fd, 1.173 + * and failing that, it searches for the nearest SSL layer above the 1.174 + * argument fd. It returns the private sslSocket from the found layer. 1.175 + */ 1.176 +sslSocket * 1.177 +ssl_FindSocket(PRFileDesc *fd) 1.178 +{ 1.179 + PRFileDesc *layer; 1.180 + sslSocket *ss; 1.181 + 1.182 + PORT_Assert(fd != NULL); 1.183 + PORT_Assert(ssl_layer_id != 0); 1.184 + 1.185 + layer = PR_GetIdentitiesLayer(fd, ssl_layer_id); 1.186 + if (layer == NULL) { 1.187 + PORT_SetError(PR_BAD_DESCRIPTOR_ERROR); 1.188 + return NULL; 1.189 + } 1.190 + 1.191 + ss = (sslSocket *)layer->secret; 1.192 + /* Set ss->fd lazily. We can't rely on the value of ss->fd set by 1.193 + * ssl_PushIOLayer because another PR_PushIOLayer call will switch the 1.194 + * contents of the PRFileDesc pointed by ss->fd and the new layer. 1.195 + * See bug 807250. 1.196 + */ 1.197 + ss->fd = layer; 1.198 + return ss; 1.199 +} 1.200 + 1.201 +static sslSocket * 1.202 +ssl_DupSocket(sslSocket *os) 1.203 +{ 1.204 + sslSocket *ss; 1.205 + SECStatus rv; 1.206 + 1.207 + ss = ssl_NewSocket((PRBool)(!os->opt.noLocks), os->protocolVariant); 1.208 + if (ss) { 1.209 + ss->opt = os->opt; 1.210 + ss->opt.useSocks = PR_FALSE; 1.211 + ss->vrange = os->vrange; 1.212 + 1.213 + ss->peerID = !os->peerID ? NULL : PORT_Strdup(os->peerID); 1.214 + ss->url = !os->url ? NULL : PORT_Strdup(os->url); 1.215 + 1.216 + ss->ops = os->ops; 1.217 + ss->rTimeout = os->rTimeout; 1.218 + ss->wTimeout = os->wTimeout; 1.219 + ss->cTimeout = os->cTimeout; 1.220 + ss->dbHandle = os->dbHandle; 1.221 + 1.222 + /* copy ssl2&3 policy & prefs, even if it's not selected (yet) */ 1.223 + ss->allowedByPolicy = os->allowedByPolicy; 1.224 + ss->maybeAllowedByPolicy= os->maybeAllowedByPolicy; 1.225 + ss->chosenPreference = os->chosenPreference; 1.226 + PORT_Memcpy(ss->cipherSuites, os->cipherSuites, sizeof os->cipherSuites); 1.227 + PORT_Memcpy(ss->ssl3.dtlsSRTPCiphers, os->ssl3.dtlsSRTPCiphers, 1.228 + sizeof(PRUint16) * os->ssl3.dtlsSRTPCipherCount); 1.229 + ss->ssl3.dtlsSRTPCipherCount = os->ssl3.dtlsSRTPCipherCount; 1.230 + 1.231 + if (os->cipherSpecs) { 1.232 + ss->cipherSpecs = (unsigned char*)PORT_Alloc(os->sizeCipherSpecs); 1.233 + if (ss->cipherSpecs) 1.234 + PORT_Memcpy(ss->cipherSpecs, os->cipherSpecs, 1.235 + os->sizeCipherSpecs); 1.236 + ss->sizeCipherSpecs = os->sizeCipherSpecs; 1.237 + ss->preferredCipher = os->preferredCipher; 1.238 + } else { 1.239 + ss->cipherSpecs = NULL; /* produced lazily */ 1.240 + ss->sizeCipherSpecs = 0; 1.241 + ss->preferredCipher = NULL; 1.242 + } 1.243 + if (ss->opt.useSecurity) { 1.244 + /* This int should be SSLKEAType, but CC on Irix complains, 1.245 + * during the for loop. 1.246 + */ 1.247 + int i; 1.248 + sslServerCerts * oc = os->serverCerts; 1.249 + sslServerCerts * sc = ss->serverCerts; 1.250 + 1.251 + for (i=kt_null; i < kt_kea_size; i++, oc++, sc++) { 1.252 + if (oc->serverCert && oc->serverCertChain) { 1.253 + sc->serverCert = CERT_DupCertificate(oc->serverCert); 1.254 + sc->serverCertChain = CERT_DupCertList(oc->serverCertChain); 1.255 + if (!sc->serverCertChain) 1.256 + goto loser; 1.257 + } else { 1.258 + sc->serverCert = NULL; 1.259 + sc->serverCertChain = NULL; 1.260 + } 1.261 + sc->serverKeyPair = oc->serverKeyPair ? 1.262 + ssl3_GetKeyPairRef(oc->serverKeyPair) : NULL; 1.263 + if (oc->serverKeyPair && !sc->serverKeyPair) 1.264 + goto loser; 1.265 + sc->serverKeyBits = oc->serverKeyBits; 1.266 + ss->certStatusArray[i] = !os->certStatusArray[i] ? NULL : 1.267 + SECITEM_DupArray(NULL, os->certStatusArray[i]); 1.268 + } 1.269 + ss->stepDownKeyPair = !os->stepDownKeyPair ? NULL : 1.270 + ssl3_GetKeyPairRef(os->stepDownKeyPair); 1.271 + ss->ephemeralECDHKeyPair = !os->ephemeralECDHKeyPair ? NULL : 1.272 + ssl3_GetKeyPairRef(os->ephemeralECDHKeyPair); 1.273 +/* 1.274 + * XXX the preceding CERT_ and SECKEY_ functions can fail and return NULL. 1.275 + * XXX We should detect this, and not just march on with NULL pointers. 1.276 + */ 1.277 + ss->authCertificate = os->authCertificate; 1.278 + ss->authCertificateArg = os->authCertificateArg; 1.279 + ss->getClientAuthData = os->getClientAuthData; 1.280 + ss->getClientAuthDataArg = os->getClientAuthDataArg; 1.281 + ss->sniSocketConfig = os->sniSocketConfig; 1.282 + ss->sniSocketConfigArg = os->sniSocketConfigArg; 1.283 + ss->handleBadCert = os->handleBadCert; 1.284 + ss->badCertArg = os->badCertArg; 1.285 + ss->handshakeCallback = os->handshakeCallback; 1.286 + ss->handshakeCallbackData = os->handshakeCallbackData; 1.287 + ss->canFalseStartCallback = os->canFalseStartCallback; 1.288 + ss->canFalseStartCallbackData = os->canFalseStartCallbackData; 1.289 + ss->pkcs11PinArg = os->pkcs11PinArg; 1.290 + 1.291 + /* Create security data */ 1.292 + rv = ssl_CopySecurityInfo(ss, os); 1.293 + if (rv != SECSuccess) { 1.294 + goto loser; 1.295 + } 1.296 + } 1.297 + } 1.298 + return ss; 1.299 + 1.300 +loser: 1.301 + ssl_FreeSocket(ss); 1.302 + return NULL; 1.303 +} 1.304 + 1.305 +static void 1.306 +ssl_DestroyLocks(sslSocket *ss) 1.307 +{ 1.308 + /* Destroy locks. */ 1.309 + if (ss->firstHandshakeLock) { 1.310 + PZ_DestroyMonitor(ss->firstHandshakeLock); 1.311 + ss->firstHandshakeLock = NULL; 1.312 + } 1.313 + if (ss->ssl3HandshakeLock) { 1.314 + PZ_DestroyMonitor(ss->ssl3HandshakeLock); 1.315 + ss->ssl3HandshakeLock = NULL; 1.316 + } 1.317 + if (ss->specLock) { 1.318 + NSSRWLock_Destroy(ss->specLock); 1.319 + ss->specLock = NULL; 1.320 + } 1.321 + 1.322 + if (ss->recvLock) { 1.323 + PZ_DestroyLock(ss->recvLock); 1.324 + ss->recvLock = NULL; 1.325 + } 1.326 + if (ss->sendLock) { 1.327 + PZ_DestroyLock(ss->sendLock); 1.328 + ss->sendLock = NULL; 1.329 + } 1.330 + if (ss->xmitBufLock) { 1.331 + PZ_DestroyMonitor(ss->xmitBufLock); 1.332 + ss->xmitBufLock = NULL; 1.333 + } 1.334 + if (ss->recvBufLock) { 1.335 + PZ_DestroyMonitor(ss->recvBufLock); 1.336 + ss->recvBufLock = NULL; 1.337 + } 1.338 +} 1.339 + 1.340 +/* Caller holds any relevant locks */ 1.341 +static void 1.342 +ssl_DestroySocketContents(sslSocket *ss) 1.343 +{ 1.344 + /* "i" should be of type SSLKEAType, but CC on IRIX complains during 1.345 + * the for loop. 1.346 + */ 1.347 + int i; 1.348 + 1.349 + /* Free up socket */ 1.350 + ssl_DestroySecurityInfo(&ss->sec); 1.351 + 1.352 + ssl3_DestroySSL3Info(ss); 1.353 + 1.354 + PORT_Free(ss->saveBuf.buf); 1.355 + PORT_Free(ss->pendingBuf.buf); 1.356 + ssl_DestroyGather(&ss->gs); 1.357 + 1.358 + if (ss->peerID != NULL) 1.359 + PORT_Free(ss->peerID); 1.360 + if (ss->url != NULL) 1.361 + PORT_Free((void *)ss->url); /* CONST */ 1.362 + if (ss->cipherSpecs) { 1.363 + PORT_Free(ss->cipherSpecs); 1.364 + ss->cipherSpecs = NULL; 1.365 + ss->sizeCipherSpecs = 0; 1.366 + } 1.367 + 1.368 + /* Clean up server configuration */ 1.369 + for (i=kt_null; i < kt_kea_size; i++) { 1.370 + sslServerCerts * sc = ss->serverCerts + i; 1.371 + if (sc->serverCert != NULL) 1.372 + CERT_DestroyCertificate(sc->serverCert); 1.373 + if (sc->serverCertChain != NULL) 1.374 + CERT_DestroyCertificateList(sc->serverCertChain); 1.375 + if (sc->serverKeyPair != NULL) 1.376 + ssl3_FreeKeyPair(sc->serverKeyPair); 1.377 + if (ss->certStatusArray[i] != NULL) { 1.378 + SECITEM_FreeArray(ss->certStatusArray[i], PR_TRUE); 1.379 + ss->certStatusArray[i] = NULL; 1.380 + } 1.381 + } 1.382 + if (ss->stepDownKeyPair) { 1.383 + ssl3_FreeKeyPair(ss->stepDownKeyPair); 1.384 + ss->stepDownKeyPair = NULL; 1.385 + } 1.386 + if (ss->ephemeralECDHKeyPair) { 1.387 + ssl3_FreeKeyPair(ss->ephemeralECDHKeyPair); 1.388 + ss->ephemeralECDHKeyPair = NULL; 1.389 + } 1.390 + SECITEM_FreeItem(&ss->opt.nextProtoNego, PR_FALSE); 1.391 + PORT_Assert(!ss->xtnData.sniNameArr); 1.392 + if (ss->xtnData.sniNameArr) { 1.393 + PORT_Free(ss->xtnData.sniNameArr); 1.394 + ss->xtnData.sniNameArr = NULL; 1.395 + } 1.396 +} 1.397 + 1.398 +/* 1.399 + * free an sslSocket struct, and all the stuff that hangs off of it 1.400 + */ 1.401 +void 1.402 +ssl_FreeSocket(sslSocket *ss) 1.403 +{ 1.404 +/* Get every lock you can imagine! 1.405 +** Caller already holds these: 1.406 +** SSL_LOCK_READER(ss); 1.407 +** SSL_LOCK_WRITER(ss); 1.408 +*/ 1.409 + ssl_Get1stHandshakeLock(ss); 1.410 + ssl_GetRecvBufLock(ss); 1.411 + ssl_GetSSL3HandshakeLock(ss); 1.412 + ssl_GetXmitBufLock(ss); 1.413 + ssl_GetSpecWriteLock(ss); 1.414 + 1.415 + ssl_DestroySocketContents(ss); 1.416 + 1.417 + /* Release all the locks acquired above. */ 1.418 + SSL_UNLOCK_READER(ss); 1.419 + SSL_UNLOCK_WRITER(ss); 1.420 + ssl_Release1stHandshakeLock(ss); 1.421 + ssl_ReleaseRecvBufLock(ss); 1.422 + ssl_ReleaseSSL3HandshakeLock(ss); 1.423 + ssl_ReleaseXmitBufLock(ss); 1.424 + ssl_ReleaseSpecWriteLock(ss); 1.425 + 1.426 + ssl_DestroyLocks(ss); 1.427 + 1.428 +#ifdef DEBUG 1.429 + PORT_Memset(ss, 0x1f, sizeof *ss); 1.430 +#endif 1.431 + PORT_Free(ss); 1.432 + return; 1.433 +} 1.434 + 1.435 +/************************************************************************/ 1.436 +SECStatus 1.437 +ssl_EnableNagleDelay(sslSocket *ss, PRBool enabled) 1.438 +{ 1.439 + PRFileDesc * osfd = ss->fd->lower; 1.440 + SECStatus rv = SECFailure; 1.441 + PRSocketOptionData opt; 1.442 + 1.443 + opt.option = PR_SockOpt_NoDelay; 1.444 + opt.value.no_delay = (PRBool)!enabled; 1.445 + 1.446 + if (osfd->methods->setsocketoption) { 1.447 + rv = (SECStatus) osfd->methods->setsocketoption(osfd, &opt); 1.448 + } else { 1.449 + PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0); 1.450 + } 1.451 + 1.452 + return rv; 1.453 +} 1.454 + 1.455 +static void 1.456 +ssl_ChooseOps(sslSocket *ss) 1.457 +{ 1.458 + ss->ops = ss->opt.useSecurity ? &ssl_secure_ops : &ssl_default_ops; 1.459 +} 1.460 + 1.461 +/* Called from SSL_Enable (immediately below) */ 1.462 +static SECStatus 1.463 +PrepareSocket(sslSocket *ss) 1.464 +{ 1.465 + SECStatus rv = SECSuccess; 1.466 + 1.467 + ssl_ChooseOps(ss); 1.468 + return rv; 1.469 +} 1.470 + 1.471 +SECStatus 1.472 +SSL_Enable(PRFileDesc *fd, int which, PRBool on) 1.473 +{ 1.474 + return SSL_OptionSet(fd, which, on); 1.475 +} 1.476 + 1.477 +#ifndef NO_PKCS11_BYPASS 1.478 +static const PRCallOnceType pristineCallOnce; 1.479 +static PRCallOnceType setupBypassOnce; 1.480 + 1.481 +static SECStatus SSL_BypassShutdown(void* appData, void* nssData) 1.482 +{ 1.483 + /* unload freeBL shared library from memory */ 1.484 + BL_Unload(); 1.485 + setupBypassOnce = pristineCallOnce; 1.486 + return SECSuccess; 1.487 +} 1.488 + 1.489 +static PRStatus SSL_BypassRegisterShutdown(void) 1.490 +{ 1.491 + SECStatus rv = NSS_RegisterShutdown(SSL_BypassShutdown, NULL); 1.492 + PORT_Assert(SECSuccess == rv); 1.493 + return SECSuccess == rv ? PR_SUCCESS : PR_FAILURE; 1.494 +} 1.495 +#endif 1.496 + 1.497 +static PRStatus SSL_BypassSetup(void) 1.498 +{ 1.499 +#ifdef NO_PKCS11_BYPASS 1.500 + /* Guarantee binary compatibility */ 1.501 + return PR_SUCCESS; 1.502 +#else 1.503 + return PR_CallOnce(&setupBypassOnce, &SSL_BypassRegisterShutdown); 1.504 +#endif 1.505 +} 1.506 + 1.507 +/* Implements the semantics for SSL_OptionSet(SSL_ENABLE_TLS, on) described in 1.508 + * ssl.h in the section "SSL version range setting API". 1.509 + */ 1.510 +static void 1.511 +ssl_EnableTLS(SSLVersionRange *vrange, PRBool on) 1.512 +{ 1.513 + if (SSL3_ALL_VERSIONS_DISABLED(vrange)) { 1.514 + if (on) { 1.515 + vrange->min = SSL_LIBRARY_VERSION_TLS_1_0; 1.516 + vrange->max = SSL_LIBRARY_VERSION_TLS_1_0; 1.517 + } /* else don't change anything */ 1.518 + return; 1.519 + } 1.520 + 1.521 + if (on) { 1.522 + /* Expand the range of enabled version to include TLS 1.0 */ 1.523 + vrange->min = PR_MIN(vrange->min, SSL_LIBRARY_VERSION_TLS_1_0); 1.524 + vrange->max = PR_MAX(vrange->max, SSL_LIBRARY_VERSION_TLS_1_0); 1.525 + } else { 1.526 + /* Disable all TLS versions, leaving only SSL 3.0 if it was enabled */ 1.527 + if (vrange->min == SSL_LIBRARY_VERSION_3_0) { 1.528 + vrange->max = SSL_LIBRARY_VERSION_3_0; 1.529 + } else { 1.530 + /* Only TLS was enabled, so now no versions are. */ 1.531 + vrange->min = SSL_LIBRARY_VERSION_NONE; 1.532 + vrange->max = SSL_LIBRARY_VERSION_NONE; 1.533 + } 1.534 + } 1.535 +} 1.536 + 1.537 +/* Implements the semantics for SSL_OptionSet(SSL_ENABLE_SSL3, on) described in 1.538 + * ssl.h in the section "SSL version range setting API". 1.539 + */ 1.540 +static void 1.541 +ssl_EnableSSL3(SSLVersionRange *vrange, PRBool on) 1.542 +{ 1.543 + if (SSL3_ALL_VERSIONS_DISABLED(vrange)) { 1.544 + if (on) { 1.545 + vrange->min = SSL_LIBRARY_VERSION_3_0; 1.546 + vrange->max = SSL_LIBRARY_VERSION_3_0; 1.547 + } /* else don't change anything */ 1.548 + return; 1.549 + } 1.550 + 1.551 + if (on) { 1.552 + /* Expand the range of enabled versions to include SSL 3.0. We know 1.553 + * SSL 3.0 or some version of TLS is already enabled at this point, so 1.554 + * we don't need to change vrange->max. 1.555 + */ 1.556 + vrange->min = SSL_LIBRARY_VERSION_3_0; 1.557 + } else { 1.558 + /* Disable SSL 3.0, leaving TLS unaffected. */ 1.559 + if (vrange->max > SSL_LIBRARY_VERSION_3_0) { 1.560 + vrange->min = PR_MAX(vrange->min, SSL_LIBRARY_VERSION_TLS_1_0); 1.561 + } else { 1.562 + /* Only SSL 3.0 was enabled, so now no versions are. */ 1.563 + vrange->min = SSL_LIBRARY_VERSION_NONE; 1.564 + vrange->max = SSL_LIBRARY_VERSION_NONE; 1.565 + } 1.566 + } 1.567 +} 1.568 + 1.569 +SECStatus 1.570 +SSL_OptionSet(PRFileDesc *fd, PRInt32 which, PRBool on) 1.571 +{ 1.572 + sslSocket *ss = ssl_FindSocket(fd); 1.573 + SECStatus rv = SECSuccess; 1.574 + PRBool holdingLocks; 1.575 + 1.576 + if (!ss) { 1.577 + SSL_DBG(("%d: SSL[%d]: bad socket in Enable", SSL_GETPID(), fd)); 1.578 + return SECFailure; 1.579 + } 1.580 + 1.581 + holdingLocks = (!ss->opt.noLocks); 1.582 + ssl_Get1stHandshakeLock(ss); 1.583 + ssl_GetSSL3HandshakeLock(ss); 1.584 + 1.585 + switch (which) { 1.586 + case SSL_SOCKS: 1.587 + ss->opt.useSocks = PR_FALSE; 1.588 + rv = PrepareSocket(ss); 1.589 + if (on) { 1.590 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.591 + rv = SECFailure; 1.592 + } 1.593 + break; 1.594 + 1.595 + case SSL_SECURITY: 1.596 + ss->opt.useSecurity = on; 1.597 + rv = PrepareSocket(ss); 1.598 + break; 1.599 + 1.600 + case SSL_REQUEST_CERTIFICATE: 1.601 + ss->opt.requestCertificate = on; 1.602 + break; 1.603 + 1.604 + case SSL_REQUIRE_CERTIFICATE: 1.605 + ss->opt.requireCertificate = on; 1.606 + break; 1.607 + 1.608 + case SSL_HANDSHAKE_AS_CLIENT: 1.609 + if ( ss->opt.handshakeAsServer && on ) { 1.610 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.611 + rv = SECFailure; 1.612 + break; 1.613 + } 1.614 + ss->opt.handshakeAsClient = on; 1.615 + break; 1.616 + 1.617 + case SSL_HANDSHAKE_AS_SERVER: 1.618 + if ( ss->opt.handshakeAsClient && on ) { 1.619 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.620 + rv = SECFailure; 1.621 + break; 1.622 + } 1.623 + ss->opt.handshakeAsServer = on; 1.624 + break; 1.625 + 1.626 + case SSL_ENABLE_TLS: 1.627 + if (IS_DTLS(ss)) { 1.628 + if (on) { 1.629 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.630 + rv = SECFailure; /* not allowed */ 1.631 + } 1.632 + break; 1.633 + } 1.634 + ssl_EnableTLS(&ss->vrange, on); 1.635 + ss->preferredCipher = NULL; 1.636 + if (ss->cipherSpecs) { 1.637 + PORT_Free(ss->cipherSpecs); 1.638 + ss->cipherSpecs = NULL; 1.639 + ss->sizeCipherSpecs = 0; 1.640 + } 1.641 + break; 1.642 + 1.643 + case SSL_ENABLE_SSL3: 1.644 + if (IS_DTLS(ss)) { 1.645 + if (on) { 1.646 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.647 + rv = SECFailure; /* not allowed */ 1.648 + } 1.649 + break; 1.650 + } 1.651 + ssl_EnableSSL3(&ss->vrange, on); 1.652 + ss->preferredCipher = NULL; 1.653 + if (ss->cipherSpecs) { 1.654 + PORT_Free(ss->cipherSpecs); 1.655 + ss->cipherSpecs = NULL; 1.656 + ss->sizeCipherSpecs = 0; 1.657 + } 1.658 + break; 1.659 + 1.660 + case SSL_ENABLE_SSL2: 1.661 + if (IS_DTLS(ss)) { 1.662 + if (on) { 1.663 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.664 + rv = SECFailure; /* not allowed */ 1.665 + } 1.666 + break; 1.667 + } 1.668 + ss->opt.enableSSL2 = on; 1.669 + if (on) { 1.670 + ss->opt.v2CompatibleHello = on; 1.671 + } 1.672 + ss->preferredCipher = NULL; 1.673 + if (ss->cipherSpecs) { 1.674 + PORT_Free(ss->cipherSpecs); 1.675 + ss->cipherSpecs = NULL; 1.676 + ss->sizeCipherSpecs = 0; 1.677 + } 1.678 + break; 1.679 + 1.680 + case SSL_NO_CACHE: 1.681 + ss->opt.noCache = on; 1.682 + break; 1.683 + 1.684 + case SSL_ENABLE_FDX: 1.685 + if (on && ss->opt.noLocks) { 1.686 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.687 + rv = SECFailure; 1.688 + } 1.689 + ss->opt.fdx = on; 1.690 + break; 1.691 + 1.692 + case SSL_V2_COMPATIBLE_HELLO: 1.693 + if (IS_DTLS(ss)) { 1.694 + if (on) { 1.695 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.696 + rv = SECFailure; /* not allowed */ 1.697 + } 1.698 + break; 1.699 + } 1.700 + ss->opt.v2CompatibleHello = on; 1.701 + if (!on) { 1.702 + ss->opt.enableSSL2 = on; 1.703 + } 1.704 + break; 1.705 + 1.706 + case SSL_ROLLBACK_DETECTION: 1.707 + ss->opt.detectRollBack = on; 1.708 + break; 1.709 + 1.710 + case SSL_NO_STEP_DOWN: 1.711 + ss->opt.noStepDown = on; 1.712 + if (on) 1.713 + SSL_DisableExportCipherSuites(fd); 1.714 + break; 1.715 + 1.716 + case SSL_BYPASS_PKCS11: 1.717 + if (ss->handshakeBegun) { 1.718 + PORT_SetError(PR_INVALID_STATE_ERROR); 1.719 + rv = SECFailure; 1.720 + } else { 1.721 + if (PR_FALSE != on) { 1.722 + if (PR_SUCCESS == SSL_BypassSetup() ) { 1.723 +#ifdef NO_PKCS11_BYPASS 1.724 + ss->opt.bypassPKCS11 = PR_FALSE; 1.725 +#else 1.726 + ss->opt.bypassPKCS11 = on; 1.727 +#endif 1.728 + } else { 1.729 + rv = SECFailure; 1.730 + } 1.731 + } else { 1.732 + ss->opt.bypassPKCS11 = PR_FALSE; 1.733 + } 1.734 + } 1.735 + break; 1.736 + 1.737 + case SSL_NO_LOCKS: 1.738 + if (on && ss->opt.fdx) { 1.739 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.740 + rv = SECFailure; 1.741 + } 1.742 + if (on && ssl_force_locks) 1.743 + on = PR_FALSE; /* silent override */ 1.744 + ss->opt.noLocks = on; 1.745 + if (on) { 1.746 + locksEverDisabled = PR_TRUE; 1.747 + strcpy(lockStatus + LOCKSTATUS_OFFSET, "DISABLED."); 1.748 + } else if (!holdingLocks) { 1.749 + rv = ssl_MakeLocks(ss); 1.750 + if (rv != SECSuccess) { 1.751 + ss->opt.noLocks = PR_TRUE; 1.752 + } 1.753 + } 1.754 + break; 1.755 + 1.756 + case SSL_ENABLE_SESSION_TICKETS: 1.757 + ss->opt.enableSessionTickets = on; 1.758 + break; 1.759 + 1.760 + case SSL_ENABLE_DEFLATE: 1.761 + ss->opt.enableDeflate = on; 1.762 + break; 1.763 + 1.764 + case SSL_ENABLE_RENEGOTIATION: 1.765 + ss->opt.enableRenegotiation = on; 1.766 + break; 1.767 + 1.768 + case SSL_REQUIRE_SAFE_NEGOTIATION: 1.769 + ss->opt.requireSafeNegotiation = on; 1.770 + break; 1.771 + 1.772 + case SSL_ENABLE_FALSE_START: 1.773 + ss->opt.enableFalseStart = on; 1.774 + break; 1.775 + 1.776 + case SSL_CBC_RANDOM_IV: 1.777 + ss->opt.cbcRandomIV = on; 1.778 + break; 1.779 + 1.780 + case SSL_ENABLE_OCSP_STAPLING: 1.781 + ss->opt.enableOCSPStapling = on; 1.782 + break; 1.783 + 1.784 + case SSL_ENABLE_NPN: 1.785 + ss->opt.enableNPN = on; 1.786 + break; 1.787 + 1.788 + case SSL_ENABLE_ALPN: 1.789 + ss->opt.enableALPN = on; 1.790 + break; 1.791 + 1.792 + case SSL_ENABLE_FALLBACK_SCSV: 1.793 + ss->opt.enableFallbackSCSV = on; 1.794 + break; 1.795 + 1.796 + default: 1.797 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.798 + rv = SECFailure; 1.799 + } 1.800 + 1.801 + /* We can't use the macros for releasing the locks here, 1.802 + * because ss->opt.noLocks might have changed just above. 1.803 + * We must release these locks (monitors) here, if we aquired them above, 1.804 + * regardless of the current value of ss->opt.noLocks. 1.805 + */ 1.806 + if (holdingLocks) { 1.807 + PZ_ExitMonitor((ss)->ssl3HandshakeLock); 1.808 + PZ_ExitMonitor((ss)->firstHandshakeLock); 1.809 + } 1.810 + 1.811 + return rv; 1.812 +} 1.813 + 1.814 +SECStatus 1.815 +SSL_OptionGet(PRFileDesc *fd, PRInt32 which, PRBool *pOn) 1.816 +{ 1.817 + sslSocket *ss = ssl_FindSocket(fd); 1.818 + SECStatus rv = SECSuccess; 1.819 + PRBool on = PR_FALSE; 1.820 + 1.821 + if (!pOn) { 1.822 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.823 + return SECFailure; 1.824 + } 1.825 + if (!ss) { 1.826 + SSL_DBG(("%d: SSL[%d]: bad socket in Enable", SSL_GETPID(), fd)); 1.827 + *pOn = PR_FALSE; 1.828 + return SECFailure; 1.829 + } 1.830 + 1.831 + ssl_Get1stHandshakeLock(ss); 1.832 + ssl_GetSSL3HandshakeLock(ss); 1.833 + 1.834 + switch (which) { 1.835 + case SSL_SOCKS: on = PR_FALSE; break; 1.836 + case SSL_SECURITY: on = ss->opt.useSecurity; break; 1.837 + case SSL_REQUEST_CERTIFICATE: on = ss->opt.requestCertificate; break; 1.838 + case SSL_REQUIRE_CERTIFICATE: on = ss->opt.requireCertificate; break; 1.839 + case SSL_HANDSHAKE_AS_CLIENT: on = ss->opt.handshakeAsClient; break; 1.840 + case SSL_HANDSHAKE_AS_SERVER: on = ss->opt.handshakeAsServer; break; 1.841 + case SSL_ENABLE_TLS: 1.842 + on = ss->vrange.max >= SSL_LIBRARY_VERSION_TLS_1_0; 1.843 + break; 1.844 + case SSL_ENABLE_SSL3: 1.845 + on = ss->vrange.min == SSL_LIBRARY_VERSION_3_0; 1.846 + break; 1.847 + case SSL_ENABLE_SSL2: on = ss->opt.enableSSL2; break; 1.848 + case SSL_NO_CACHE: on = ss->opt.noCache; break; 1.849 + case SSL_ENABLE_FDX: on = ss->opt.fdx; break; 1.850 + case SSL_V2_COMPATIBLE_HELLO: on = ss->opt.v2CompatibleHello; break; 1.851 + case SSL_ROLLBACK_DETECTION: on = ss->opt.detectRollBack; break; 1.852 + case SSL_NO_STEP_DOWN: on = ss->opt.noStepDown; break; 1.853 + case SSL_BYPASS_PKCS11: on = ss->opt.bypassPKCS11; break; 1.854 + case SSL_NO_LOCKS: on = ss->opt.noLocks; break; 1.855 + case SSL_ENABLE_SESSION_TICKETS: 1.856 + on = ss->opt.enableSessionTickets; 1.857 + break; 1.858 + case SSL_ENABLE_DEFLATE: on = ss->opt.enableDeflate; break; 1.859 + case SSL_ENABLE_RENEGOTIATION: 1.860 + on = ss->opt.enableRenegotiation; break; 1.861 + case SSL_REQUIRE_SAFE_NEGOTIATION: 1.862 + on = ss->opt.requireSafeNegotiation; break; 1.863 + case SSL_ENABLE_FALSE_START: on = ss->opt.enableFalseStart; break; 1.864 + case SSL_CBC_RANDOM_IV: on = ss->opt.cbcRandomIV; break; 1.865 + case SSL_ENABLE_OCSP_STAPLING: on = ss->opt.enableOCSPStapling; break; 1.866 + case SSL_ENABLE_NPN: on = ss->opt.enableNPN; break; 1.867 + case SSL_ENABLE_ALPN: on = ss->opt.enableALPN; break; 1.868 + case SSL_ENABLE_FALLBACK_SCSV: on = ss->opt.enableFallbackSCSV; break; 1.869 + 1.870 + default: 1.871 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.872 + rv = SECFailure; 1.873 + } 1.874 + 1.875 + ssl_ReleaseSSL3HandshakeLock(ss); 1.876 + ssl_Release1stHandshakeLock(ss); 1.877 + 1.878 + *pOn = on; 1.879 + return rv; 1.880 +} 1.881 + 1.882 +SECStatus 1.883 +SSL_OptionGetDefault(PRInt32 which, PRBool *pOn) 1.884 +{ 1.885 + SECStatus rv = SECSuccess; 1.886 + PRBool on = PR_FALSE; 1.887 + 1.888 + if (!pOn) { 1.889 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.890 + return SECFailure; 1.891 + } 1.892 + 1.893 + ssl_SetDefaultsFromEnvironment(); 1.894 + 1.895 + switch (which) { 1.896 + case SSL_SOCKS: on = PR_FALSE; break; 1.897 + case SSL_SECURITY: on = ssl_defaults.useSecurity; break; 1.898 + case SSL_REQUEST_CERTIFICATE: on = ssl_defaults.requestCertificate; break; 1.899 + case SSL_REQUIRE_CERTIFICATE: on = ssl_defaults.requireCertificate; break; 1.900 + case SSL_HANDSHAKE_AS_CLIENT: on = ssl_defaults.handshakeAsClient; break; 1.901 + case SSL_HANDSHAKE_AS_SERVER: on = ssl_defaults.handshakeAsServer; break; 1.902 + case SSL_ENABLE_TLS: 1.903 + on = versions_defaults_stream.max >= SSL_LIBRARY_VERSION_TLS_1_0; 1.904 + break; 1.905 + case SSL_ENABLE_SSL3: 1.906 + on = versions_defaults_stream.min == SSL_LIBRARY_VERSION_3_0; 1.907 + break; 1.908 + case SSL_ENABLE_SSL2: on = ssl_defaults.enableSSL2; break; 1.909 + case SSL_NO_CACHE: on = ssl_defaults.noCache; break; 1.910 + case SSL_ENABLE_FDX: on = ssl_defaults.fdx; break; 1.911 + case SSL_V2_COMPATIBLE_HELLO: on = ssl_defaults.v2CompatibleHello; break; 1.912 + case SSL_ROLLBACK_DETECTION: on = ssl_defaults.detectRollBack; break; 1.913 + case SSL_NO_STEP_DOWN: on = ssl_defaults.noStepDown; break; 1.914 + case SSL_BYPASS_PKCS11: on = ssl_defaults.bypassPKCS11; break; 1.915 + case SSL_NO_LOCKS: on = ssl_defaults.noLocks; break; 1.916 + case SSL_ENABLE_SESSION_TICKETS: 1.917 + on = ssl_defaults.enableSessionTickets; 1.918 + break; 1.919 + case SSL_ENABLE_DEFLATE: on = ssl_defaults.enableDeflate; break; 1.920 + case SSL_ENABLE_RENEGOTIATION: 1.921 + on = ssl_defaults.enableRenegotiation; break; 1.922 + case SSL_REQUIRE_SAFE_NEGOTIATION: 1.923 + on = ssl_defaults.requireSafeNegotiation; 1.924 + break; 1.925 + case SSL_ENABLE_FALSE_START: on = ssl_defaults.enableFalseStart; break; 1.926 + case SSL_CBC_RANDOM_IV: on = ssl_defaults.cbcRandomIV; break; 1.927 + case SSL_ENABLE_OCSP_STAPLING: 1.928 + on = ssl_defaults.enableOCSPStapling; 1.929 + break; 1.930 + case SSL_ENABLE_NPN: on = ssl_defaults.enableNPN; break; 1.931 + case SSL_ENABLE_ALPN: on = ssl_defaults.enableALPN; break; 1.932 + case SSL_ENABLE_FALLBACK_SCSV: 1.933 + on = ssl_defaults.enableFallbackSCSV; 1.934 + break; 1.935 + 1.936 + default: 1.937 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.938 + rv = SECFailure; 1.939 + } 1.940 + 1.941 + *pOn = on; 1.942 + return rv; 1.943 +} 1.944 + 1.945 +/* XXX Use Global Lock to protect this stuff. */ 1.946 +SECStatus 1.947 +SSL_EnableDefault(int which, PRBool on) 1.948 +{ 1.949 + return SSL_OptionSetDefault(which, on); 1.950 +} 1.951 + 1.952 +SECStatus 1.953 +SSL_OptionSetDefault(PRInt32 which, PRBool on) 1.954 +{ 1.955 + SECStatus status = ssl_Init(); 1.956 + 1.957 + if (status != SECSuccess) { 1.958 + return status; 1.959 + } 1.960 + 1.961 + ssl_SetDefaultsFromEnvironment(); 1.962 + 1.963 + switch (which) { 1.964 + case SSL_SOCKS: 1.965 + ssl_defaults.useSocks = PR_FALSE; 1.966 + if (on) { 1.967 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.968 + return SECFailure; 1.969 + } 1.970 + break; 1.971 + 1.972 + case SSL_SECURITY: 1.973 + ssl_defaults.useSecurity = on; 1.974 + break; 1.975 + 1.976 + case SSL_REQUEST_CERTIFICATE: 1.977 + ssl_defaults.requestCertificate = on; 1.978 + break; 1.979 + 1.980 + case SSL_REQUIRE_CERTIFICATE: 1.981 + ssl_defaults.requireCertificate = on; 1.982 + break; 1.983 + 1.984 + case SSL_HANDSHAKE_AS_CLIENT: 1.985 + if ( ssl_defaults.handshakeAsServer && on ) { 1.986 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.987 + return SECFailure; 1.988 + } 1.989 + ssl_defaults.handshakeAsClient = on; 1.990 + break; 1.991 + 1.992 + case SSL_HANDSHAKE_AS_SERVER: 1.993 + if ( ssl_defaults.handshakeAsClient && on ) { 1.994 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.995 + return SECFailure; 1.996 + } 1.997 + ssl_defaults.handshakeAsServer = on; 1.998 + break; 1.999 + 1.1000 + case SSL_ENABLE_TLS: 1.1001 + ssl_EnableTLS(&versions_defaults_stream, on); 1.1002 + break; 1.1003 + 1.1004 + case SSL_ENABLE_SSL3: 1.1005 + ssl_EnableSSL3(&versions_defaults_stream, on); 1.1006 + break; 1.1007 + 1.1008 + case SSL_ENABLE_SSL2: 1.1009 + ssl_defaults.enableSSL2 = on; 1.1010 + if (on) { 1.1011 + ssl_defaults.v2CompatibleHello = on; 1.1012 + } 1.1013 + break; 1.1014 + 1.1015 + case SSL_NO_CACHE: 1.1016 + ssl_defaults.noCache = on; 1.1017 + break; 1.1018 + 1.1019 + case SSL_ENABLE_FDX: 1.1020 + if (on && ssl_defaults.noLocks) { 1.1021 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.1022 + return SECFailure; 1.1023 + } 1.1024 + ssl_defaults.fdx = on; 1.1025 + break; 1.1026 + 1.1027 + case SSL_V2_COMPATIBLE_HELLO: 1.1028 + ssl_defaults.v2CompatibleHello = on; 1.1029 + if (!on) { 1.1030 + ssl_defaults.enableSSL2 = on; 1.1031 + } 1.1032 + break; 1.1033 + 1.1034 + case SSL_ROLLBACK_DETECTION: 1.1035 + ssl_defaults.detectRollBack = on; 1.1036 + break; 1.1037 + 1.1038 + case SSL_NO_STEP_DOWN: 1.1039 + ssl_defaults.noStepDown = on; 1.1040 + if (on) 1.1041 + SSL_DisableDefaultExportCipherSuites(); 1.1042 + break; 1.1043 + 1.1044 + case SSL_BYPASS_PKCS11: 1.1045 + if (PR_FALSE != on) { 1.1046 + if (PR_SUCCESS == SSL_BypassSetup()) { 1.1047 +#ifdef NO_PKCS11_BYPASS 1.1048 + ssl_defaults.bypassPKCS11 = PR_FALSE; 1.1049 +#else 1.1050 + ssl_defaults.bypassPKCS11 = on; 1.1051 +#endif 1.1052 + } else { 1.1053 + return SECFailure; 1.1054 + } 1.1055 + } else { 1.1056 + ssl_defaults.bypassPKCS11 = PR_FALSE; 1.1057 + } 1.1058 + break; 1.1059 + 1.1060 + case SSL_NO_LOCKS: 1.1061 + if (on && ssl_defaults.fdx) { 1.1062 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.1063 + return SECFailure; 1.1064 + } 1.1065 + if (on && ssl_force_locks) 1.1066 + on = PR_FALSE; /* silent override */ 1.1067 + ssl_defaults.noLocks = on; 1.1068 + if (on) { 1.1069 + locksEverDisabled = PR_TRUE; 1.1070 + strcpy(lockStatus + LOCKSTATUS_OFFSET, "DISABLED."); 1.1071 + } 1.1072 + break; 1.1073 + 1.1074 + case SSL_ENABLE_SESSION_TICKETS: 1.1075 + ssl_defaults.enableSessionTickets = on; 1.1076 + break; 1.1077 + 1.1078 + case SSL_ENABLE_DEFLATE: 1.1079 + ssl_defaults.enableDeflate = on; 1.1080 + break; 1.1081 + 1.1082 + case SSL_ENABLE_RENEGOTIATION: 1.1083 + ssl_defaults.enableRenegotiation = on; 1.1084 + break; 1.1085 + 1.1086 + case SSL_REQUIRE_SAFE_NEGOTIATION: 1.1087 + ssl_defaults.requireSafeNegotiation = on; 1.1088 + break; 1.1089 + 1.1090 + case SSL_ENABLE_FALSE_START: 1.1091 + ssl_defaults.enableFalseStart = on; 1.1092 + break; 1.1093 + 1.1094 + case SSL_CBC_RANDOM_IV: 1.1095 + ssl_defaults.cbcRandomIV = on; 1.1096 + break; 1.1097 + 1.1098 + case SSL_ENABLE_OCSP_STAPLING: 1.1099 + ssl_defaults.enableOCSPStapling = on; 1.1100 + break; 1.1101 + 1.1102 + case SSL_ENABLE_NPN: 1.1103 + ssl_defaults.enableNPN = on; 1.1104 + break; 1.1105 + 1.1106 + case SSL_ENABLE_ALPN: 1.1107 + ssl_defaults.enableALPN = on; 1.1108 + break; 1.1109 + 1.1110 + case SSL_ENABLE_FALLBACK_SCSV: 1.1111 + ssl_defaults.enableFallbackSCSV = on; 1.1112 + break; 1.1113 + 1.1114 + default: 1.1115 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.1116 + return SECFailure; 1.1117 + } 1.1118 + return SECSuccess; 1.1119 +} 1.1120 + 1.1121 +/* function tells us if the cipher suite is one that we no longer support. */ 1.1122 +static PRBool 1.1123 +ssl_IsRemovedCipherSuite(PRInt32 suite) 1.1124 +{ 1.1125 + switch (suite) { 1.1126 + case SSL_FORTEZZA_DMS_WITH_NULL_SHA: 1.1127 + case SSL_FORTEZZA_DMS_WITH_FORTEZZA_CBC_SHA: 1.1128 + case SSL_FORTEZZA_DMS_WITH_RC4_128_SHA: 1.1129 + return PR_TRUE; 1.1130 + default: 1.1131 + return PR_FALSE; 1.1132 + } 1.1133 +} 1.1134 + 1.1135 +/* Part of the public NSS API. 1.1136 + * Since this is a global (not per-socket) setting, we cannot use the 1.1137 + * HandshakeLock to protect this. Probably want a global lock. 1.1138 + */ 1.1139 +SECStatus 1.1140 +SSL_SetPolicy(long which, int policy) 1.1141 +{ 1.1142 + if ((which & 0xfffe) == SSL_RSA_OLDFIPS_WITH_3DES_EDE_CBC_SHA) { 1.1143 + /* one of the two old FIPS ciphers */ 1.1144 + if (which == SSL_RSA_OLDFIPS_WITH_3DES_EDE_CBC_SHA) 1.1145 + which = SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA; 1.1146 + else if (which == SSL_RSA_OLDFIPS_WITH_DES_CBC_SHA) 1.1147 + which = SSL_RSA_FIPS_WITH_DES_CBC_SHA; 1.1148 + } 1.1149 + if (ssl_IsRemovedCipherSuite(which)) 1.1150 + return SECSuccess; 1.1151 + return SSL_CipherPolicySet(which, policy); 1.1152 +} 1.1153 + 1.1154 +SECStatus 1.1155 +SSL_CipherPolicySet(PRInt32 which, PRInt32 policy) 1.1156 +{ 1.1157 + SECStatus rv = ssl_Init(); 1.1158 + 1.1159 + if (rv != SECSuccess) { 1.1160 + return rv; 1.1161 + } 1.1162 + 1.1163 + if (ssl_IsRemovedCipherSuite(which)) { 1.1164 + rv = SECSuccess; 1.1165 + } else if (SSL_IS_SSL2_CIPHER(which)) { 1.1166 + rv = ssl2_SetPolicy(which, policy); 1.1167 + } else { 1.1168 + rv = ssl3_SetPolicy((ssl3CipherSuite)which, policy); 1.1169 + } 1.1170 + return rv; 1.1171 +} 1.1172 + 1.1173 +SECStatus 1.1174 +SSL_CipherPolicyGet(PRInt32 which, PRInt32 *oPolicy) 1.1175 +{ 1.1176 + SECStatus rv; 1.1177 + 1.1178 + if (!oPolicy) { 1.1179 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.1180 + return SECFailure; 1.1181 + } 1.1182 + if (ssl_IsRemovedCipherSuite(which)) { 1.1183 + *oPolicy = SSL_NOT_ALLOWED; 1.1184 + rv = SECSuccess; 1.1185 + } else if (SSL_IS_SSL2_CIPHER(which)) { 1.1186 + rv = ssl2_GetPolicy(which, oPolicy); 1.1187 + } else { 1.1188 + rv = ssl3_GetPolicy((ssl3CipherSuite)which, oPolicy); 1.1189 + } 1.1190 + return rv; 1.1191 +} 1.1192 + 1.1193 +/* Part of the public NSS API. 1.1194 + * Since this is a global (not per-socket) setting, we cannot use the 1.1195 + * HandshakeLock to protect this. Probably want a global lock. 1.1196 + * These changes have no effect on any sslSockets already created. 1.1197 + */ 1.1198 +SECStatus 1.1199 +SSL_EnableCipher(long which, PRBool enabled) 1.1200 +{ 1.1201 + if ((which & 0xfffe) == SSL_RSA_OLDFIPS_WITH_3DES_EDE_CBC_SHA) { 1.1202 + /* one of the two old FIPS ciphers */ 1.1203 + if (which == SSL_RSA_OLDFIPS_WITH_3DES_EDE_CBC_SHA) 1.1204 + which = SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA; 1.1205 + else if (which == SSL_RSA_OLDFIPS_WITH_DES_CBC_SHA) 1.1206 + which = SSL_RSA_FIPS_WITH_DES_CBC_SHA; 1.1207 + } 1.1208 + if (ssl_IsRemovedCipherSuite(which)) 1.1209 + return SECSuccess; 1.1210 + return SSL_CipherPrefSetDefault(which, enabled); 1.1211 +} 1.1212 + 1.1213 +SECStatus 1.1214 +SSL_CipherPrefSetDefault(PRInt32 which, PRBool enabled) 1.1215 +{ 1.1216 + SECStatus rv = ssl_Init(); 1.1217 + 1.1218 + if (rv != SECSuccess) { 1.1219 + return rv; 1.1220 + } 1.1221 + 1.1222 + if (ssl_IsRemovedCipherSuite(which)) 1.1223 + return SECSuccess; 1.1224 + if (enabled && ssl_defaults.noStepDown && SSL_IsExportCipherSuite(which)) { 1.1225 + PORT_SetError(SEC_ERROR_INVALID_ALGORITHM); 1.1226 + return SECFailure; 1.1227 + } 1.1228 + if (SSL_IS_SSL2_CIPHER(which)) { 1.1229 + rv = ssl2_CipherPrefSetDefault(which, enabled); 1.1230 + } else { 1.1231 + rv = ssl3_CipherPrefSetDefault((ssl3CipherSuite)which, enabled); 1.1232 + } 1.1233 + return rv; 1.1234 +} 1.1235 + 1.1236 +SECStatus 1.1237 +SSL_CipherPrefGetDefault(PRInt32 which, PRBool *enabled) 1.1238 +{ 1.1239 + SECStatus rv; 1.1240 + 1.1241 + if (!enabled) { 1.1242 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.1243 + return SECFailure; 1.1244 + } 1.1245 + if (ssl_IsRemovedCipherSuite(which)) { 1.1246 + *enabled = PR_FALSE; 1.1247 + rv = SECSuccess; 1.1248 + } else if (SSL_IS_SSL2_CIPHER(which)) { 1.1249 + rv = ssl2_CipherPrefGetDefault(which, enabled); 1.1250 + } else { 1.1251 + rv = ssl3_CipherPrefGetDefault((ssl3CipherSuite)which, enabled); 1.1252 + } 1.1253 + return rv; 1.1254 +} 1.1255 + 1.1256 +SECStatus 1.1257 +SSL_CipherPrefSet(PRFileDesc *fd, PRInt32 which, PRBool enabled) 1.1258 +{ 1.1259 + SECStatus rv; 1.1260 + sslSocket *ss = ssl_FindSocket(fd); 1.1261 + 1.1262 + if (!ss) { 1.1263 + SSL_DBG(("%d: SSL[%d]: bad socket in CipherPrefSet", SSL_GETPID(), fd)); 1.1264 + return SECFailure; 1.1265 + } 1.1266 + if (ssl_IsRemovedCipherSuite(which)) 1.1267 + return SECSuccess; 1.1268 + if (enabled && ss->opt.noStepDown && SSL_IsExportCipherSuite(which)) { 1.1269 + PORT_SetError(SEC_ERROR_INVALID_ALGORITHM); 1.1270 + return SECFailure; 1.1271 + } 1.1272 + if (SSL_IS_SSL2_CIPHER(which)) { 1.1273 + rv = ssl2_CipherPrefSet(ss, which, enabled); 1.1274 + } else { 1.1275 + rv = ssl3_CipherPrefSet(ss, (ssl3CipherSuite)which, enabled); 1.1276 + } 1.1277 + return rv; 1.1278 +} 1.1279 + 1.1280 +SECStatus 1.1281 +SSL_CipherPrefGet(PRFileDesc *fd, PRInt32 which, PRBool *enabled) 1.1282 +{ 1.1283 + SECStatus rv; 1.1284 + sslSocket *ss = ssl_FindSocket(fd); 1.1285 + 1.1286 + if (!enabled) { 1.1287 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.1288 + return SECFailure; 1.1289 + } 1.1290 + if (!ss) { 1.1291 + SSL_DBG(("%d: SSL[%d]: bad socket in CipherPrefGet", SSL_GETPID(), fd)); 1.1292 + *enabled = PR_FALSE; 1.1293 + return SECFailure; 1.1294 + } 1.1295 + if (ssl_IsRemovedCipherSuite(which)) { 1.1296 + *enabled = PR_FALSE; 1.1297 + rv = SECSuccess; 1.1298 + } else if (SSL_IS_SSL2_CIPHER(which)) { 1.1299 + rv = ssl2_CipherPrefGet(ss, which, enabled); 1.1300 + } else { 1.1301 + rv = ssl3_CipherPrefGet(ss, (ssl3CipherSuite)which, enabled); 1.1302 + } 1.1303 + return rv; 1.1304 +} 1.1305 + 1.1306 +SECStatus 1.1307 +NSS_SetDomesticPolicy(void) 1.1308 +{ 1.1309 + SECStatus status = SECSuccess; 1.1310 + const PRUint16 *cipher; 1.1311 + 1.1312 + for (cipher = SSL_ImplementedCiphers; *cipher != 0; ++cipher) { 1.1313 + status = SSL_SetPolicy(*cipher, SSL_ALLOWED); 1.1314 + if (status != SECSuccess) 1.1315 + break; 1.1316 + } 1.1317 + return status; 1.1318 +} 1.1319 + 1.1320 +SECStatus 1.1321 +NSS_SetExportPolicy(void) 1.1322 +{ 1.1323 + return NSS_SetDomesticPolicy(); 1.1324 +} 1.1325 + 1.1326 +SECStatus 1.1327 +NSS_SetFrancePolicy(void) 1.1328 +{ 1.1329 + return NSS_SetDomesticPolicy(); 1.1330 +} 1.1331 + 1.1332 + 1.1333 + 1.1334 +/* LOCKS ??? XXX */ 1.1335 +static PRFileDesc * 1.1336 +ssl_ImportFD(PRFileDesc *model, PRFileDesc *fd, SSLProtocolVariant variant) 1.1337 +{ 1.1338 + sslSocket * ns = NULL; 1.1339 + PRStatus rv; 1.1340 + PRNetAddr addr; 1.1341 + SECStatus status = ssl_Init(); 1.1342 + 1.1343 + if (status != SECSuccess) { 1.1344 + return NULL; 1.1345 + } 1.1346 + 1.1347 + if (model == NULL) { 1.1348 + /* Just create a default socket if we're given NULL for the model */ 1.1349 + ns = ssl_NewSocket((PRBool)(!ssl_defaults.noLocks), variant); 1.1350 + } else { 1.1351 + sslSocket * ss = ssl_FindSocket(model); 1.1352 + if (ss == NULL || ss->protocolVariant != variant) { 1.1353 + SSL_DBG(("%d: SSL[%d]: bad model socket in ssl_ImportFD", 1.1354 + SSL_GETPID(), model)); 1.1355 + return NULL; 1.1356 + } 1.1357 + ns = ssl_DupSocket(ss); 1.1358 + } 1.1359 + if (ns == NULL) 1.1360 + return NULL; 1.1361 + 1.1362 + rv = ssl_PushIOLayer(ns, fd, PR_TOP_IO_LAYER); 1.1363 + if (rv != PR_SUCCESS) { 1.1364 + ssl_FreeSocket(ns); 1.1365 + SET_ERROR_CODE 1.1366 + return NULL; 1.1367 + } 1.1368 +#if defined(DEBUG) || defined(FORCE_PR_ASSERT) 1.1369 + { 1.1370 + sslSocket * ss = ssl_FindSocket(fd); 1.1371 + PORT_Assert(ss == ns); 1.1372 + } 1.1373 +#endif 1.1374 + ns->TCPconnected = (PR_SUCCESS == ssl_DefGetpeername(ns, &addr)); 1.1375 + return fd; 1.1376 +} 1.1377 + 1.1378 +PRFileDesc * 1.1379 +SSL_ImportFD(PRFileDesc *model, PRFileDesc *fd) 1.1380 +{ 1.1381 + return ssl_ImportFD(model, fd, ssl_variant_stream); 1.1382 +} 1.1383 + 1.1384 +PRFileDesc * 1.1385 +DTLS_ImportFD(PRFileDesc *model, PRFileDesc *fd) 1.1386 +{ 1.1387 + return ssl_ImportFD(model, fd, ssl_variant_datagram); 1.1388 +} 1.1389 + 1.1390 +/* SSL_SetNextProtoCallback is used to select an application protocol 1.1391 + * for ALPN and NPN. For ALPN, this runs on the server; for NPN it 1.1392 + * runs on the client. */ 1.1393 +/* Note: The ALPN version doesn't allow for the use of a default, setting a 1.1394 + * status of SSL_NEXT_PROTO_NO_OVERLAP is treated as a failure. */ 1.1395 +SECStatus 1.1396 +SSL_SetNextProtoCallback(PRFileDesc *fd, SSLNextProtoCallback callback, 1.1397 + void *arg) 1.1398 +{ 1.1399 + sslSocket *ss = ssl_FindSocket(fd); 1.1400 + 1.1401 + if (!ss) { 1.1402 + SSL_DBG(("%d: SSL[%d]: bad socket in SSL_SetNextProtoCallback", SSL_GETPID(), 1.1403 + fd)); 1.1404 + return SECFailure; 1.1405 + } 1.1406 + 1.1407 + ssl_GetSSL3HandshakeLock(ss); 1.1408 + ss->nextProtoCallback = callback; 1.1409 + ss->nextProtoArg = arg; 1.1410 + ssl_ReleaseSSL3HandshakeLock(ss); 1.1411 + 1.1412 + return SECSuccess; 1.1413 +} 1.1414 + 1.1415 +/* ssl_NextProtoNegoCallback is set as an ALPN/NPN callback when 1.1416 + * SSL_SetNextProtoNego is used. 1.1417 + */ 1.1418 +static SECStatus 1.1419 +ssl_NextProtoNegoCallback(void *arg, PRFileDesc *fd, 1.1420 + const unsigned char *protos, unsigned int protos_len, 1.1421 + unsigned char *protoOut, unsigned int *protoOutLen, 1.1422 + unsigned int protoMaxLen) 1.1423 +{ 1.1424 + unsigned int i, j; 1.1425 + const unsigned char *result; 1.1426 + sslSocket *ss = ssl_FindSocket(fd); 1.1427 + 1.1428 + if (!ss) { 1.1429 + SSL_DBG(("%d: SSL[%d]: bad socket in ssl_NextProtoNegoCallback", 1.1430 + SSL_GETPID(), fd)); 1.1431 + return SECFailure; 1.1432 + } 1.1433 + 1.1434 + /* For each protocol in server preference, see if we support it. */ 1.1435 + for (i = 0; i < protos_len; ) { 1.1436 + for (j = 0; j < ss->opt.nextProtoNego.len; ) { 1.1437 + if (protos[i] == ss->opt.nextProtoNego.data[j] && 1.1438 + PORT_Memcmp(&protos[i+1], &ss->opt.nextProtoNego.data[j+1], 1.1439 + protos[i]) == 0) { 1.1440 + /* We found a match. */ 1.1441 + ss->ssl3.nextProtoState = SSL_NEXT_PROTO_NEGOTIATED; 1.1442 + result = &protos[i]; 1.1443 + goto found; 1.1444 + } 1.1445 + j += 1 + (unsigned int)ss->opt.nextProtoNego.data[j]; 1.1446 + } 1.1447 + i += 1 + (unsigned int)protos[i]; 1.1448 + } 1.1449 + 1.1450 + /* The other side supports the extension, and either doesn't have any 1.1451 + * protocols configured, or none of its options match ours. In this case we 1.1452 + * request our favoured protocol. */ 1.1453 + /* This will be treated as a failure for ALPN. */ 1.1454 + ss->ssl3.nextProtoState = SSL_NEXT_PROTO_NO_OVERLAP; 1.1455 + result = ss->opt.nextProtoNego.data; 1.1456 + 1.1457 +found: 1.1458 + if (protoMaxLen < result[0]) { 1.1459 + PORT_SetError(SEC_ERROR_OUTPUT_LEN); 1.1460 + return SECFailure; 1.1461 + } 1.1462 + memcpy(protoOut, result + 1, result[0]); 1.1463 + *protoOutLen = result[0]; 1.1464 + return SECSuccess; 1.1465 +} 1.1466 + 1.1467 +SECStatus 1.1468 +SSL_SetNextProtoNego(PRFileDesc *fd, const unsigned char *data, 1.1469 + unsigned int length) 1.1470 +{ 1.1471 + sslSocket *ss; 1.1472 + SECStatus rv; 1.1473 + SECItem dataItem = { siBuffer, (unsigned char *) data, length }; 1.1474 + 1.1475 + ss = ssl_FindSocket(fd); 1.1476 + if (!ss) { 1.1477 + SSL_DBG(("%d: SSL[%d]: bad socket in SSL_SetNextProtoNego", 1.1478 + SSL_GETPID(), fd)); 1.1479 + return SECFailure; 1.1480 + } 1.1481 + 1.1482 + if (ssl3_ValidateNextProtoNego(data, length) != SECSuccess) 1.1483 + return SECFailure; 1.1484 + 1.1485 + ssl_GetSSL3HandshakeLock(ss); 1.1486 + SECITEM_FreeItem(&ss->opt.nextProtoNego, PR_FALSE); 1.1487 + rv = SECITEM_CopyItem(NULL, &ss->opt.nextProtoNego, &dataItem); 1.1488 + ssl_ReleaseSSL3HandshakeLock(ss); 1.1489 + 1.1490 + if (rv != SECSuccess) 1.1491 + return rv; 1.1492 + 1.1493 + return SSL_SetNextProtoCallback(fd, ssl_NextProtoNegoCallback, NULL); 1.1494 +} 1.1495 + 1.1496 +SECStatus 1.1497 +SSL_GetNextProto(PRFileDesc *fd, SSLNextProtoState *state, unsigned char *buf, 1.1498 + unsigned int *bufLen, unsigned int bufLenMax) 1.1499 +{ 1.1500 + sslSocket *ss = ssl_FindSocket(fd); 1.1501 + 1.1502 + if (!ss) { 1.1503 + SSL_DBG(("%d: SSL[%d]: bad socket in SSL_GetNextProto", SSL_GETPID(), 1.1504 + fd)); 1.1505 + return SECFailure; 1.1506 + } 1.1507 + 1.1508 + if (!state || !buf || !bufLen) { 1.1509 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.1510 + return SECFailure; 1.1511 + } 1.1512 + 1.1513 + *state = ss->ssl3.nextProtoState; 1.1514 + 1.1515 + if (ss->ssl3.nextProtoState != SSL_NEXT_PROTO_NO_SUPPORT && 1.1516 + ss->ssl3.nextProto.data) { 1.1517 + if (ss->ssl3.nextProto.len > bufLenMax) { 1.1518 + PORT_SetError(SEC_ERROR_OUTPUT_LEN); 1.1519 + return SECFailure; 1.1520 + } 1.1521 + PORT_Memcpy(buf, ss->ssl3.nextProto.data, ss->ssl3.nextProto.len); 1.1522 + *bufLen = ss->ssl3.nextProto.len; 1.1523 + } else { 1.1524 + *bufLen = 0; 1.1525 + } 1.1526 + 1.1527 + return SECSuccess; 1.1528 +} 1.1529 + 1.1530 +SECStatus SSL_SetSRTPCiphers(PRFileDesc *fd, 1.1531 + const PRUint16 *ciphers, 1.1532 + unsigned int numCiphers) 1.1533 +{ 1.1534 + sslSocket *ss; 1.1535 + unsigned int i; 1.1536 + 1.1537 + ss = ssl_FindSocket(fd); 1.1538 + if (!ss || !IS_DTLS(ss)) { 1.1539 + SSL_DBG(("%d: SSL[%d]: bad socket in SSL_SetSRTPCiphers", 1.1540 + SSL_GETPID(), fd)); 1.1541 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.1542 + return SECFailure; 1.1543 + } 1.1544 + 1.1545 + if (numCiphers > MAX_DTLS_SRTP_CIPHER_SUITES) { 1.1546 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.1547 + return SECFailure; 1.1548 + } 1.1549 + 1.1550 + ss->ssl3.dtlsSRTPCipherCount = 0; 1.1551 + for (i = 0; i < numCiphers; i++) { 1.1552 + const PRUint16 *srtpCipher = srtpCiphers; 1.1553 + 1.1554 + while (*srtpCipher) { 1.1555 + if (ciphers[i] == *srtpCipher) 1.1556 + break; 1.1557 + srtpCipher++; 1.1558 + } 1.1559 + if (*srtpCipher) { 1.1560 + ss->ssl3.dtlsSRTPCiphers[ss->ssl3.dtlsSRTPCipherCount++] = 1.1561 + ciphers[i]; 1.1562 + } else { 1.1563 + SSL_DBG(("%d: SSL[%d]: invalid or unimplemented SRTP cipher " 1.1564 + "suite specified: 0x%04hx", SSL_GETPID(), fd, 1.1565 + ciphers[i])); 1.1566 + } 1.1567 + } 1.1568 + 1.1569 + if (ss->ssl3.dtlsSRTPCipherCount == 0) { 1.1570 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.1571 + return SECFailure; 1.1572 + } 1.1573 + 1.1574 + return SECSuccess; 1.1575 +} 1.1576 + 1.1577 +SECStatus 1.1578 +SSL_GetSRTPCipher(PRFileDesc *fd, PRUint16 *cipher) 1.1579 +{ 1.1580 + sslSocket * ss; 1.1581 + 1.1582 + ss = ssl_FindSocket(fd); 1.1583 + if (!ss) { 1.1584 + SSL_DBG(("%d: SSL[%d]: bad socket in SSL_GetSRTPCipher", 1.1585 + SSL_GETPID(), fd)); 1.1586 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.1587 + return SECFailure; 1.1588 + } 1.1589 + 1.1590 + if (!ss->ssl3.dtlsSRTPCipherSuite) { 1.1591 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.1592 + return SECFailure; 1.1593 + } 1.1594 + 1.1595 + *cipher = ss->ssl3.dtlsSRTPCipherSuite; 1.1596 + return SECSuccess; 1.1597 +} 1.1598 + 1.1599 +PRFileDesc * 1.1600 +SSL_ReconfigFD(PRFileDesc *model, PRFileDesc *fd) 1.1601 +{ 1.1602 + sslSocket * sm = NULL, *ss = NULL; 1.1603 + int i; 1.1604 + sslServerCerts * mc = NULL; 1.1605 + sslServerCerts * sc = NULL; 1.1606 + 1.1607 + if (model == NULL) { 1.1608 + PR_SetError(SEC_ERROR_INVALID_ARGS, 0); 1.1609 + return NULL; 1.1610 + } 1.1611 + sm = ssl_FindSocket(model); 1.1612 + if (sm == NULL) { 1.1613 + SSL_DBG(("%d: SSL[%d]: bad model socket in ssl_ReconfigFD", 1.1614 + SSL_GETPID(), model)); 1.1615 + return NULL; 1.1616 + } 1.1617 + ss = ssl_FindSocket(fd); 1.1618 + PORT_Assert(ss); 1.1619 + if (ss == NULL) { 1.1620 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.1621 + return NULL; 1.1622 + } 1.1623 + 1.1624 + ss->opt = sm->opt; 1.1625 + ss->vrange = sm->vrange; 1.1626 + PORT_Memcpy(ss->cipherSuites, sm->cipherSuites, sizeof sm->cipherSuites); 1.1627 + PORT_Memcpy(ss->ssl3.dtlsSRTPCiphers, sm->ssl3.dtlsSRTPCiphers, 1.1628 + sizeof(PRUint16) * sm->ssl3.dtlsSRTPCipherCount); 1.1629 + ss->ssl3.dtlsSRTPCipherCount = sm->ssl3.dtlsSRTPCipherCount; 1.1630 + 1.1631 + if (!ss->opt.useSecurity) { 1.1632 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.1633 + return NULL; 1.1634 + } 1.1635 + /* This int should be SSLKEAType, but CC on Irix complains, 1.1636 + * during the for loop. 1.1637 + */ 1.1638 + for (i=kt_null; i < kt_kea_size; i++) { 1.1639 + mc = &(sm->serverCerts[i]); 1.1640 + sc = &(ss->serverCerts[i]); 1.1641 + if (mc->serverCert && mc->serverCertChain) { 1.1642 + if (sc->serverCert) { 1.1643 + CERT_DestroyCertificate(sc->serverCert); 1.1644 + } 1.1645 + sc->serverCert = CERT_DupCertificate(mc->serverCert); 1.1646 + if (sc->serverCertChain) { 1.1647 + CERT_DestroyCertificateList(sc->serverCertChain); 1.1648 + } 1.1649 + sc->serverCertChain = CERT_DupCertList(mc->serverCertChain); 1.1650 + if (!sc->serverCertChain) 1.1651 + goto loser; 1.1652 + if (sm->certStatusArray[i]) { 1.1653 + if (ss->certStatusArray[i]) { 1.1654 + SECITEM_FreeArray(ss->certStatusArray[i], PR_TRUE); 1.1655 + ss->certStatusArray[i] = NULL; 1.1656 + } 1.1657 + ss->certStatusArray[i] = SECITEM_DupArray(NULL, sm->certStatusArray[i]); 1.1658 + if (!ss->certStatusArray[i]) 1.1659 + goto loser; 1.1660 + } 1.1661 + } 1.1662 + if (mc->serverKeyPair) { 1.1663 + if (sc->serverKeyPair) { 1.1664 + ssl3_FreeKeyPair(sc->serverKeyPair); 1.1665 + } 1.1666 + sc->serverKeyPair = ssl3_GetKeyPairRef(mc->serverKeyPair); 1.1667 + sc->serverKeyBits = mc->serverKeyBits; 1.1668 + } 1.1669 + } 1.1670 + if (sm->stepDownKeyPair) { 1.1671 + if (ss->stepDownKeyPair) { 1.1672 + ssl3_FreeKeyPair(ss->stepDownKeyPair); 1.1673 + } 1.1674 + ss->stepDownKeyPair = ssl3_GetKeyPairRef(sm->stepDownKeyPair); 1.1675 + } 1.1676 + if (sm->ephemeralECDHKeyPair) { 1.1677 + if (ss->ephemeralECDHKeyPair) { 1.1678 + ssl3_FreeKeyPair(ss->ephemeralECDHKeyPair); 1.1679 + } 1.1680 + ss->ephemeralECDHKeyPair = 1.1681 + ssl3_GetKeyPairRef(sm->ephemeralECDHKeyPair); 1.1682 + } 1.1683 + /* copy trust anchor names */ 1.1684 + if (sm->ssl3.ca_list) { 1.1685 + if (ss->ssl3.ca_list) { 1.1686 + CERT_FreeDistNames(ss->ssl3.ca_list); 1.1687 + } 1.1688 + ss->ssl3.ca_list = CERT_DupDistNames(sm->ssl3.ca_list); 1.1689 + if (!ss->ssl3.ca_list) { 1.1690 + goto loser; 1.1691 + } 1.1692 + } 1.1693 + 1.1694 + if (sm->authCertificate) 1.1695 + ss->authCertificate = sm->authCertificate; 1.1696 + if (sm->authCertificateArg) 1.1697 + ss->authCertificateArg = sm->authCertificateArg; 1.1698 + if (sm->getClientAuthData) 1.1699 + ss->getClientAuthData = sm->getClientAuthData; 1.1700 + if (sm->getClientAuthDataArg) 1.1701 + ss->getClientAuthDataArg = sm->getClientAuthDataArg; 1.1702 + if (sm->sniSocketConfig) 1.1703 + ss->sniSocketConfig = sm->sniSocketConfig; 1.1704 + if (sm->sniSocketConfigArg) 1.1705 + ss->sniSocketConfigArg = sm->sniSocketConfigArg; 1.1706 + if (sm->handleBadCert) 1.1707 + ss->handleBadCert = sm->handleBadCert; 1.1708 + if (sm->badCertArg) 1.1709 + ss->badCertArg = sm->badCertArg; 1.1710 + if (sm->handshakeCallback) 1.1711 + ss->handshakeCallback = sm->handshakeCallback; 1.1712 + if (sm->handshakeCallbackData) 1.1713 + ss->handshakeCallbackData = sm->handshakeCallbackData; 1.1714 + if (sm->pkcs11PinArg) 1.1715 + ss->pkcs11PinArg = sm->pkcs11PinArg; 1.1716 + return fd; 1.1717 +loser: 1.1718 + return NULL; 1.1719 +} 1.1720 + 1.1721 +PRBool 1.1722 +ssl3_VersionIsSupported(SSLProtocolVariant protocolVariant, 1.1723 + SSL3ProtocolVersion version) 1.1724 +{ 1.1725 + switch (protocolVariant) { 1.1726 + case ssl_variant_stream: 1.1727 + return (version >= SSL_LIBRARY_VERSION_3_0 && 1.1728 + version <= SSL_LIBRARY_VERSION_MAX_SUPPORTED); 1.1729 + case ssl_variant_datagram: 1.1730 + return (version >= SSL_LIBRARY_VERSION_TLS_1_1 && 1.1731 + version <= SSL_LIBRARY_VERSION_MAX_SUPPORTED); 1.1732 + default: 1.1733 + /* Can't get here */ 1.1734 + PORT_Assert(PR_FALSE); 1.1735 + return PR_FALSE; 1.1736 + } 1.1737 +} 1.1738 + 1.1739 +/* Returns PR_TRUE if the given version range is valid and 1.1740 +** fully supported; otherwise, returns PR_FALSE. 1.1741 +*/ 1.1742 +static PRBool 1.1743 +ssl3_VersionRangeIsValid(SSLProtocolVariant protocolVariant, 1.1744 + const SSLVersionRange *vrange) 1.1745 +{ 1.1746 + return vrange && 1.1747 + vrange->min <= vrange->max && 1.1748 + ssl3_VersionIsSupported(protocolVariant, vrange->min) && 1.1749 + ssl3_VersionIsSupported(protocolVariant, vrange->max); 1.1750 +} 1.1751 + 1.1752 +SECStatus 1.1753 +SSL_VersionRangeGetSupported(SSLProtocolVariant protocolVariant, 1.1754 + SSLVersionRange *vrange) 1.1755 +{ 1.1756 + if (!vrange) { 1.1757 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.1758 + return SECFailure; 1.1759 + } 1.1760 + 1.1761 + switch (protocolVariant) { 1.1762 + case ssl_variant_stream: 1.1763 + vrange->min = SSL_LIBRARY_VERSION_3_0; 1.1764 + vrange->max = SSL_LIBRARY_VERSION_MAX_SUPPORTED; 1.1765 + break; 1.1766 + case ssl_variant_datagram: 1.1767 + vrange->min = SSL_LIBRARY_VERSION_TLS_1_1; 1.1768 + vrange->max = SSL_LIBRARY_VERSION_MAX_SUPPORTED; 1.1769 + break; 1.1770 + default: 1.1771 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.1772 + return SECFailure; 1.1773 + } 1.1774 + 1.1775 + return SECSuccess; 1.1776 +} 1.1777 + 1.1778 +SECStatus 1.1779 +SSL_VersionRangeGetDefault(SSLProtocolVariant protocolVariant, 1.1780 + SSLVersionRange *vrange) 1.1781 +{ 1.1782 + if ((protocolVariant != ssl_variant_stream && 1.1783 + protocolVariant != ssl_variant_datagram) || !vrange) { 1.1784 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.1785 + return SECFailure; 1.1786 + } 1.1787 + 1.1788 + *vrange = *VERSIONS_DEFAULTS(protocolVariant); 1.1789 + 1.1790 + return SECSuccess; 1.1791 +} 1.1792 + 1.1793 +SECStatus 1.1794 +SSL_VersionRangeSetDefault(SSLProtocolVariant protocolVariant, 1.1795 + const SSLVersionRange *vrange) 1.1796 +{ 1.1797 + if (!ssl3_VersionRangeIsValid(protocolVariant, vrange)) { 1.1798 + PORT_SetError(SSL_ERROR_INVALID_VERSION_RANGE); 1.1799 + return SECFailure; 1.1800 + } 1.1801 + 1.1802 + *VERSIONS_DEFAULTS(protocolVariant) = *vrange; 1.1803 + 1.1804 + return SECSuccess; 1.1805 +} 1.1806 + 1.1807 +SECStatus 1.1808 +SSL_VersionRangeGet(PRFileDesc *fd, SSLVersionRange *vrange) 1.1809 +{ 1.1810 + sslSocket *ss = ssl_FindSocket(fd); 1.1811 + 1.1812 + if (!ss) { 1.1813 + SSL_DBG(("%d: SSL[%d]: bad socket in SSL3_VersionRangeGet", 1.1814 + SSL_GETPID(), fd)); 1.1815 + return SECFailure; 1.1816 + } 1.1817 + 1.1818 + if (!vrange) { 1.1819 + PORT_SetError(SEC_ERROR_INVALID_ARGS); 1.1820 + return SECFailure; 1.1821 + } 1.1822 + 1.1823 + ssl_Get1stHandshakeLock(ss); 1.1824 + ssl_GetSSL3HandshakeLock(ss); 1.1825 + 1.1826 + *vrange = ss->vrange; 1.1827 + 1.1828 + ssl_ReleaseSSL3HandshakeLock(ss); 1.1829 + ssl_Release1stHandshakeLock(ss); 1.1830 + 1.1831 + return SECSuccess; 1.1832 +} 1.1833 + 1.1834 +SECStatus 1.1835 +SSL_VersionRangeSet(PRFileDesc *fd, const SSLVersionRange *vrange) 1.1836 +{ 1.1837 + sslSocket *ss = ssl_FindSocket(fd); 1.1838 + 1.1839 + if (!ss) { 1.1840 + SSL_DBG(("%d: SSL[%d]: bad socket in SSL3_VersionRangeSet", 1.1841 + SSL_GETPID(), fd)); 1.1842 + return SECFailure; 1.1843 + } 1.1844 + 1.1845 + if (!ssl3_VersionRangeIsValid(ss->protocolVariant, vrange)) { 1.1846 + PORT_SetError(SSL_ERROR_INVALID_VERSION_RANGE); 1.1847 + return SECFailure; 1.1848 + } 1.1849 + 1.1850 + ssl_Get1stHandshakeLock(ss); 1.1851 + ssl_GetSSL3HandshakeLock(ss); 1.1852 + 1.1853 + ss->vrange = *vrange; 1.1854 + 1.1855 + ssl_ReleaseSSL3HandshakeLock(ss); 1.1856 + ssl_Release1stHandshakeLock(ss); 1.1857 + 1.1858 + return SECSuccess; 1.1859 +} 1.1860 + 1.1861 +const SECItemArray * 1.1862 +SSL_PeerStapledOCSPResponses(PRFileDesc *fd) 1.1863 +{ 1.1864 + sslSocket *ss = ssl_FindSocket(fd); 1.1865 + 1.1866 + if (!ss) { 1.1867 + SSL_DBG(("%d: SSL[%d]: bad socket in SSL_PeerStapledOCSPResponses", 1.1868 + SSL_GETPID(), fd)); 1.1869 + return NULL; 1.1870 + } 1.1871 + 1.1872 + if (!ss->sec.ci.sid) { 1.1873 + PORT_SetError(SEC_ERROR_NOT_INITIALIZED); 1.1874 + return NULL; 1.1875 + } 1.1876 + 1.1877 + return &ss->sec.ci.sid->peerCertStatus; 1.1878 +} 1.1879 + 1.1880 +/************************************************************************/ 1.1881 +/* The following functions are the TOP LEVEL SSL functions. 1.1882 +** They all get called through the NSPRIOMethods table below. 1.1883 +*/ 1.1884 + 1.1885 +static PRFileDesc * PR_CALLBACK 1.1886 +ssl_Accept(PRFileDesc *fd, PRNetAddr *sockaddr, PRIntervalTime timeout) 1.1887 +{ 1.1888 + sslSocket *ss; 1.1889 + sslSocket *ns = NULL; 1.1890 + PRFileDesc *newfd = NULL; 1.1891 + PRFileDesc *osfd; 1.1892 + PRStatus status; 1.1893 + 1.1894 + ss = ssl_GetPrivate(fd); 1.1895 + if (!ss) { 1.1896 + SSL_DBG(("%d: SSL[%d]: bad socket in accept", SSL_GETPID(), fd)); 1.1897 + return NULL; 1.1898 + } 1.1899 + 1.1900 + /* IF this is a listen socket, there shouldn't be any I/O going on */ 1.1901 + SSL_LOCK_READER(ss); 1.1902 + SSL_LOCK_WRITER(ss); 1.1903 + ssl_Get1stHandshakeLock(ss); 1.1904 + ssl_GetSSL3HandshakeLock(ss); 1.1905 + 1.1906 + ss->cTimeout = timeout; 1.1907 + 1.1908 + osfd = ss->fd->lower; 1.1909 + 1.1910 + /* First accept connection */ 1.1911 + newfd = osfd->methods->accept(osfd, sockaddr, timeout); 1.1912 + if (newfd == NULL) { 1.1913 + SSL_DBG(("%d: SSL[%d]: accept failed, errno=%d", 1.1914 + SSL_GETPID(), ss->fd, PORT_GetError())); 1.1915 + } else { 1.1916 + /* Create ssl module */ 1.1917 + ns = ssl_DupSocket(ss); 1.1918 + } 1.1919 + 1.1920 + ssl_ReleaseSSL3HandshakeLock(ss); 1.1921 + ssl_Release1stHandshakeLock(ss); 1.1922 + SSL_UNLOCK_WRITER(ss); 1.1923 + SSL_UNLOCK_READER(ss); /* ss isn't used below here. */ 1.1924 + 1.1925 + if (ns == NULL) 1.1926 + goto loser; 1.1927 + 1.1928 + /* push ssl module onto the new socket */ 1.1929 + status = ssl_PushIOLayer(ns, newfd, PR_TOP_IO_LAYER); 1.1930 + if (status != PR_SUCCESS) 1.1931 + goto loser; 1.1932 + 1.1933 + /* Now start server connection handshake with client. 1.1934 + ** Don't need locks here because nobody else has a reference to ns yet. 1.1935 + */ 1.1936 + if ( ns->opt.useSecurity ) { 1.1937 + if ( ns->opt.handshakeAsClient ) { 1.1938 + ns->handshake = ssl2_BeginClientHandshake; 1.1939 + ss->handshaking = sslHandshakingAsClient; 1.1940 + } else { 1.1941 + ns->handshake = ssl2_BeginServerHandshake; 1.1942 + ss->handshaking = sslHandshakingAsServer; 1.1943 + } 1.1944 + } 1.1945 + ns->TCPconnected = 1; 1.1946 + return newfd; 1.1947 + 1.1948 +loser: 1.1949 + if (ns != NULL) 1.1950 + ssl_FreeSocket(ns); 1.1951 + if (newfd != NULL) 1.1952 + PR_Close(newfd); 1.1953 + return NULL; 1.1954 +} 1.1955 + 1.1956 +static PRStatus PR_CALLBACK 1.1957 +ssl_Connect(PRFileDesc *fd, const PRNetAddr *sockaddr, PRIntervalTime timeout) 1.1958 +{ 1.1959 + sslSocket *ss; 1.1960 + PRStatus rv; 1.1961 + 1.1962 + ss = ssl_GetPrivate(fd); 1.1963 + if (!ss) { 1.1964 + SSL_DBG(("%d: SSL[%d]: bad socket in connect", SSL_GETPID(), fd)); 1.1965 + return PR_FAILURE; 1.1966 + } 1.1967 + 1.1968 + /* IF this is a listen socket, there shouldn't be any I/O going on */ 1.1969 + SSL_LOCK_READER(ss); 1.1970 + SSL_LOCK_WRITER(ss); 1.1971 + 1.1972 + ss->cTimeout = timeout; 1.1973 + rv = (PRStatus)(*ss->ops->connect)(ss, sockaddr); 1.1974 + 1.1975 + SSL_UNLOCK_WRITER(ss); 1.1976 + SSL_UNLOCK_READER(ss); 1.1977 + 1.1978 + return rv; 1.1979 +} 1.1980 + 1.1981 +static PRStatus PR_CALLBACK 1.1982 +ssl_Bind(PRFileDesc *fd, const PRNetAddr *addr) 1.1983 +{ 1.1984 + sslSocket * ss = ssl_GetPrivate(fd); 1.1985 + PRStatus rv; 1.1986 + 1.1987 + if (!ss) { 1.1988 + SSL_DBG(("%d: SSL[%d]: bad socket in bind", SSL_GETPID(), fd)); 1.1989 + return PR_FAILURE; 1.1990 + } 1.1991 + SSL_LOCK_READER(ss); 1.1992 + SSL_LOCK_WRITER(ss); 1.1993 + 1.1994 + rv = (PRStatus)(*ss->ops->bind)(ss, addr); 1.1995 + 1.1996 + SSL_UNLOCK_WRITER(ss); 1.1997 + SSL_UNLOCK_READER(ss); 1.1998 + return rv; 1.1999 +} 1.2000 + 1.2001 +static PRStatus PR_CALLBACK 1.2002 +ssl_Listen(PRFileDesc *fd, PRIntn backlog) 1.2003 +{ 1.2004 + sslSocket * ss = ssl_GetPrivate(fd); 1.2005 + PRStatus rv; 1.2006 + 1.2007 + if (!ss) { 1.2008 + SSL_DBG(("%d: SSL[%d]: bad socket in listen", SSL_GETPID(), fd)); 1.2009 + return PR_FAILURE; 1.2010 + } 1.2011 + SSL_LOCK_READER(ss); 1.2012 + SSL_LOCK_WRITER(ss); 1.2013 + 1.2014 + rv = (PRStatus)(*ss->ops->listen)(ss, backlog); 1.2015 + 1.2016 + SSL_UNLOCK_WRITER(ss); 1.2017 + SSL_UNLOCK_READER(ss); 1.2018 + return rv; 1.2019 +} 1.2020 + 1.2021 +static PRStatus PR_CALLBACK 1.2022 +ssl_Shutdown(PRFileDesc *fd, PRIntn how) 1.2023 +{ 1.2024 + sslSocket * ss = ssl_GetPrivate(fd); 1.2025 + PRStatus rv; 1.2026 + 1.2027 + if (!ss) { 1.2028 + SSL_DBG(("%d: SSL[%d]: bad socket in shutdown", SSL_GETPID(), fd)); 1.2029 + return PR_FAILURE; 1.2030 + } 1.2031 + if (how == PR_SHUTDOWN_RCV || how == PR_SHUTDOWN_BOTH) { 1.2032 + SSL_LOCK_READER(ss); 1.2033 + } 1.2034 + if (how == PR_SHUTDOWN_SEND || how == PR_SHUTDOWN_BOTH) { 1.2035 + SSL_LOCK_WRITER(ss); 1.2036 + } 1.2037 + 1.2038 + rv = (PRStatus)(*ss->ops->shutdown)(ss, how); 1.2039 + 1.2040 + if (how == PR_SHUTDOWN_SEND || how == PR_SHUTDOWN_BOTH) { 1.2041 + SSL_UNLOCK_WRITER(ss); 1.2042 + } 1.2043 + if (how == PR_SHUTDOWN_RCV || how == PR_SHUTDOWN_BOTH) { 1.2044 + SSL_UNLOCK_READER(ss); 1.2045 + } 1.2046 + return rv; 1.2047 +} 1.2048 + 1.2049 +static PRStatus PR_CALLBACK 1.2050 +ssl_Close(PRFileDesc *fd) 1.2051 +{ 1.2052 + sslSocket *ss; 1.2053 + PRStatus rv; 1.2054 + 1.2055 + ss = ssl_GetPrivate(fd); 1.2056 + if (!ss) { 1.2057 + SSL_DBG(("%d: SSL[%d]: bad socket in close", SSL_GETPID(), fd)); 1.2058 + return PR_FAILURE; 1.2059 + } 1.2060 + 1.2061 + /* There must not be any I/O going on */ 1.2062 + SSL_LOCK_READER(ss); 1.2063 + SSL_LOCK_WRITER(ss); 1.2064 + 1.2065 + /* By the time this function returns, 1.2066 + ** ss is an invalid pointer, and the locks to which it points have 1.2067 + ** been unlocked and freed. So, this is the ONE PLACE in all of SSL 1.2068 + ** where the LOCK calls and the corresponding UNLOCK calls are not in 1.2069 + ** the same function scope. The unlock calls are in ssl_FreeSocket(). 1.2070 + */ 1.2071 + rv = (PRStatus)(*ss->ops->close)(ss); 1.2072 + 1.2073 + return rv; 1.2074 +} 1.2075 + 1.2076 +static int PR_CALLBACK 1.2077 +ssl_Recv(PRFileDesc *fd, void *buf, PRInt32 len, PRIntn flags, 1.2078 + PRIntervalTime timeout) 1.2079 +{ 1.2080 + sslSocket *ss; 1.2081 + int rv; 1.2082 + 1.2083 + ss = ssl_GetPrivate(fd); 1.2084 + if (!ss) { 1.2085 + SSL_DBG(("%d: SSL[%d]: bad socket in recv", SSL_GETPID(), fd)); 1.2086 + return SECFailure; 1.2087 + } 1.2088 + SSL_LOCK_READER(ss); 1.2089 + ss->rTimeout = timeout; 1.2090 + if (!ss->opt.fdx) 1.2091 + ss->wTimeout = timeout; 1.2092 + rv = (*ss->ops->recv)(ss, (unsigned char*)buf, len, flags); 1.2093 + SSL_UNLOCK_READER(ss); 1.2094 + return rv; 1.2095 +} 1.2096 + 1.2097 +static int PR_CALLBACK 1.2098 +ssl_Send(PRFileDesc *fd, const void *buf, PRInt32 len, PRIntn flags, 1.2099 + PRIntervalTime timeout) 1.2100 +{ 1.2101 + sslSocket *ss; 1.2102 + int rv; 1.2103 + 1.2104 + ss = ssl_GetPrivate(fd); 1.2105 + if (!ss) { 1.2106 + SSL_DBG(("%d: SSL[%d]: bad socket in send", SSL_GETPID(), fd)); 1.2107 + return SECFailure; 1.2108 + } 1.2109 + SSL_LOCK_WRITER(ss); 1.2110 + ss->wTimeout = timeout; 1.2111 + if (!ss->opt.fdx) 1.2112 + ss->rTimeout = timeout; 1.2113 + rv = (*ss->ops->send)(ss, (const unsigned char*)buf, len, flags); 1.2114 + SSL_UNLOCK_WRITER(ss); 1.2115 + return rv; 1.2116 +} 1.2117 + 1.2118 +static int PR_CALLBACK 1.2119 +ssl_Read(PRFileDesc *fd, void *buf, PRInt32 len) 1.2120 +{ 1.2121 + sslSocket *ss; 1.2122 + int rv; 1.2123 + 1.2124 + ss = ssl_GetPrivate(fd); 1.2125 + if (!ss) { 1.2126 + SSL_DBG(("%d: SSL[%d]: bad socket in read", SSL_GETPID(), fd)); 1.2127 + return SECFailure; 1.2128 + } 1.2129 + SSL_LOCK_READER(ss); 1.2130 + ss->rTimeout = PR_INTERVAL_NO_TIMEOUT; 1.2131 + if (!ss->opt.fdx) 1.2132 + ss->wTimeout = PR_INTERVAL_NO_TIMEOUT; 1.2133 + rv = (*ss->ops->read)(ss, (unsigned char*)buf, len); 1.2134 + SSL_UNLOCK_READER(ss); 1.2135 + return rv; 1.2136 +} 1.2137 + 1.2138 +static int PR_CALLBACK 1.2139 +ssl_Write(PRFileDesc *fd, const void *buf, PRInt32 len) 1.2140 +{ 1.2141 + sslSocket *ss; 1.2142 + int rv; 1.2143 + 1.2144 + ss = ssl_GetPrivate(fd); 1.2145 + if (!ss) { 1.2146 + SSL_DBG(("%d: SSL[%d]: bad socket in write", SSL_GETPID(), fd)); 1.2147 + return SECFailure; 1.2148 + } 1.2149 + SSL_LOCK_WRITER(ss); 1.2150 + ss->wTimeout = PR_INTERVAL_NO_TIMEOUT; 1.2151 + if (!ss->opt.fdx) 1.2152 + ss->rTimeout = PR_INTERVAL_NO_TIMEOUT; 1.2153 + rv = (*ss->ops->write)(ss, (const unsigned char*)buf, len); 1.2154 + SSL_UNLOCK_WRITER(ss); 1.2155 + return rv; 1.2156 +} 1.2157 + 1.2158 +static PRStatus PR_CALLBACK 1.2159 +ssl_GetPeerName(PRFileDesc *fd, PRNetAddr *addr) 1.2160 +{ 1.2161 + sslSocket *ss; 1.2162 + 1.2163 + ss = ssl_GetPrivate(fd); 1.2164 + if (!ss) { 1.2165 + SSL_DBG(("%d: SSL[%d]: bad socket in getpeername", SSL_GETPID(), fd)); 1.2166 + return PR_FAILURE; 1.2167 + } 1.2168 + return (PRStatus)(*ss->ops->getpeername)(ss, addr); 1.2169 +} 1.2170 + 1.2171 +/* 1.2172 +*/ 1.2173 +SECStatus 1.2174 +ssl_GetPeerInfo(sslSocket *ss) 1.2175 +{ 1.2176 + PRFileDesc * osfd; 1.2177 + int rv; 1.2178 + PRNetAddr sin; 1.2179 + 1.2180 + osfd = ss->fd->lower; 1.2181 + 1.2182 + PORT_Memset(&sin, 0, sizeof(sin)); 1.2183 + rv = osfd->methods->getpeername(osfd, &sin); 1.2184 + if (rv < 0) { 1.2185 + return SECFailure; 1.2186 + } 1.2187 + ss->TCPconnected = 1; 1.2188 + if (sin.inet.family == PR_AF_INET) { 1.2189 + PR_ConvertIPv4AddrToIPv6(sin.inet.ip, &ss->sec.ci.peer); 1.2190 + ss->sec.ci.port = sin.inet.port; 1.2191 + } else if (sin.ipv6.family == PR_AF_INET6) { 1.2192 + ss->sec.ci.peer = sin.ipv6.ip; 1.2193 + ss->sec.ci.port = sin.ipv6.port; 1.2194 + } else { 1.2195 + PORT_SetError(PR_ADDRESS_NOT_SUPPORTED_ERROR); 1.2196 + return SECFailure; 1.2197 + } 1.2198 + return SECSuccess; 1.2199 +} 1.2200 + 1.2201 +static PRStatus PR_CALLBACK 1.2202 +ssl_GetSockName(PRFileDesc *fd, PRNetAddr *name) 1.2203 +{ 1.2204 + sslSocket *ss; 1.2205 + 1.2206 + ss = ssl_GetPrivate(fd); 1.2207 + if (!ss) { 1.2208 + SSL_DBG(("%d: SSL[%d]: bad socket in getsockname", SSL_GETPID(), fd)); 1.2209 + return PR_FAILURE; 1.2210 + } 1.2211 + return (PRStatus)(*ss->ops->getsockname)(ss, name); 1.2212 +} 1.2213 + 1.2214 +SECStatus 1.2215 +SSL_SetStapledOCSPResponses(PRFileDesc *fd, const SECItemArray *responses, 1.2216 + SSLKEAType kea) 1.2217 +{ 1.2218 + sslSocket *ss; 1.2219 + 1.2220 + ss = ssl_FindSocket(fd); 1.2221 + if (!ss) { 1.2222 + SSL_DBG(("%d: SSL[%d]: bad socket in SSL_SetStapledOCSPResponses", 1.2223 + SSL_GETPID(), fd)); 1.2224 + return SECFailure; 1.2225 + } 1.2226 + 1.2227 + if ( kea <= 0 || kea >= kt_kea_size) { 1.2228 + SSL_DBG(("%d: SSL[%d]: invalid key in SSL_SetStapledOCSPResponses", 1.2229 + SSL_GETPID(), fd)); 1.2230 + return SECFailure; 1.2231 + } 1.2232 + 1.2233 + if (ss->certStatusArray[kea]) { 1.2234 + SECITEM_FreeArray(ss->certStatusArray[kea], PR_TRUE); 1.2235 + ss->certStatusArray[kea] = NULL; 1.2236 + } 1.2237 + if (responses) { 1.2238 + ss->certStatusArray[kea] = SECITEM_DupArray(NULL, responses); 1.2239 + } 1.2240 + return (ss->certStatusArray[kea] || !responses) ? SECSuccess : SECFailure; 1.2241 +} 1.2242 + 1.2243 +SECStatus 1.2244 +SSL_SetSockPeerID(PRFileDesc *fd, const char *peerID) 1.2245 +{ 1.2246 + sslSocket *ss; 1.2247 + 1.2248 + ss = ssl_FindSocket(fd); 1.2249 + if (!ss) { 1.2250 + SSL_DBG(("%d: SSL[%d]: bad socket in SSL_SetSockPeerID", 1.2251 + SSL_GETPID(), fd)); 1.2252 + return SECFailure; 1.2253 + } 1.2254 + 1.2255 + if (ss->peerID) { 1.2256 + PORT_Free(ss->peerID); 1.2257 + ss->peerID = NULL; 1.2258 + } 1.2259 + if (peerID) 1.2260 + ss->peerID = PORT_Strdup(peerID); 1.2261 + return (ss->peerID || !peerID) ? SECSuccess : SECFailure; 1.2262 +} 1.2263 + 1.2264 +#define PR_POLL_RW (PR_POLL_WRITE | PR_POLL_READ) 1.2265 + 1.2266 +static PRInt16 PR_CALLBACK 1.2267 +ssl_Poll(PRFileDesc *fd, PRInt16 how_flags, PRInt16 *p_out_flags) 1.2268 +{ 1.2269 + sslSocket *ss; 1.2270 + PRInt16 new_flags = how_flags; /* should select on these flags. */ 1.2271 + PRNetAddr addr; 1.2272 + 1.2273 + *p_out_flags = 0; 1.2274 + ss = ssl_GetPrivate(fd); 1.2275 + if (!ss) { 1.2276 + SSL_DBG(("%d: SSL[%d]: bad socket in SSL_Poll", 1.2277 + SSL_GETPID(), fd)); 1.2278 + return 0; /* don't poll on this socket */ 1.2279 + } 1.2280 + 1.2281 + if (ss->opt.useSecurity && 1.2282 + ss->handshaking != sslHandshakingUndetermined && 1.2283 + !ss->firstHsDone && 1.2284 + (how_flags & PR_POLL_RW)) { 1.2285 + if (!ss->TCPconnected) { 1.2286 + ss->TCPconnected = (PR_SUCCESS == ssl_DefGetpeername(ss, &addr)); 1.2287 + } 1.2288 + /* If it's not connected, then presumably the application is polling 1.2289 + ** on read or write appropriately, so don't change it. 1.2290 + */ 1.2291 + if (ss->TCPconnected) { 1.2292 + if (!ss->handshakeBegun) { 1.2293 + /* If the handshake has not begun, poll on read or write 1.2294 + ** based on the local application's role in the handshake, 1.2295 + ** not based on what the application requested. 1.2296 + */ 1.2297 + new_flags &= ~PR_POLL_RW; 1.2298 + if (ss->handshaking == sslHandshakingAsClient) { 1.2299 + new_flags |= PR_POLL_WRITE; 1.2300 + } else { /* handshaking as server */ 1.2301 + new_flags |= PR_POLL_READ; 1.2302 + } 1.2303 + } else 1.2304 + /* First handshake is in progress */ 1.2305 + if (ss->lastWriteBlocked) { 1.2306 + if (new_flags & PR_POLL_READ) { 1.2307 + /* The caller is waiting for data to be received, 1.2308 + ** but the initial handshake is blocked on write, or the 1.2309 + ** client's first handshake record has not been written. 1.2310 + ** The code should select on write, not read. 1.2311 + */ 1.2312 + new_flags ^= PR_POLL_READ; /* don't select on read. */ 1.2313 + new_flags |= PR_POLL_WRITE; /* do select on write. */ 1.2314 + } 1.2315 + } else if (new_flags & PR_POLL_WRITE) { 1.2316 + /* The caller is trying to write, but the handshake is 1.2317 + ** blocked waiting for data to read, and the first 1.2318 + ** handshake has been sent. So do NOT to poll on write 1.2319 + ** unless we did false start. 1.2320 + */ 1.2321 + if (!(ss->version >= SSL_LIBRARY_VERSION_3_0 && 1.2322 + ss->ssl3.hs.canFalseStart)) { 1.2323 + new_flags ^= PR_POLL_WRITE; /* don't select on write. */ 1.2324 + } 1.2325 + new_flags |= PR_POLL_READ; /* do select on read. */ 1.2326 + } 1.2327 + } 1.2328 + } else if ((new_flags & PR_POLL_READ) && (SSL_DataPending(fd) > 0)) { 1.2329 + *p_out_flags = PR_POLL_READ; /* it's ready already. */ 1.2330 + return new_flags; 1.2331 + } else if ((ss->lastWriteBlocked) && (how_flags & PR_POLL_READ) && 1.2332 + (ss->pendingBuf.len != 0)) { /* write data waiting to be sent */ 1.2333 + new_flags |= PR_POLL_WRITE; /* also select on write. */ 1.2334 + } 1.2335 + 1.2336 + if (ss->version >= SSL_LIBRARY_VERSION_3_0 && 1.2337 + ss->ssl3.hs.restartTarget != NULL) { 1.2338 + /* Read and write will block until the asynchronous callback completes 1.2339 + * (e.g. until SSL_AuthCertificateComplete is called), so don't tell 1.2340 + * the caller to poll the socket unless there is pending write data. 1.2341 + */ 1.2342 + if (ss->lastWriteBlocked && ss->pendingBuf.len != 0) { 1.2343 + /* Ignore any newly-received data on the socket, but do wait for 1.2344 + * the socket to become writable again. Here, it is OK for an error 1.2345 + * to be detected, because our logic for sending pending write data 1.2346 + * will allow us to report the error to the caller without the risk 1.2347 + * of the application spinning. 1.2348 + */ 1.2349 + new_flags &= (PR_POLL_WRITE | PR_POLL_EXCEPT); 1.2350 + } else { 1.2351 + /* Unfortunately, clearing new_flags will make it impossible for 1.2352 + * the application to detect errors that it would otherwise be 1.2353 + * able to detect with PR_POLL_EXCEPT, until the asynchronous 1.2354 + * callback completes. However, we must clear all the flags to 1.2355 + * prevent the application from spinning (alternating between 1.2356 + * calling PR_Poll that would return PR_POLL_EXCEPT, and send/recv 1.2357 + * which won't actually report the I/O error while we are waiting 1.2358 + * for the asynchronous callback to complete). 1.2359 + */ 1.2360 + new_flags = 0; 1.2361 + } 1.2362 + } 1.2363 + 1.2364 + if (new_flags && (fd->lower->methods->poll != NULL)) { 1.2365 + PRInt16 lower_out_flags = 0; 1.2366 + PRInt16 lower_new_flags; 1.2367 + lower_new_flags = fd->lower->methods->poll(fd->lower, new_flags, 1.2368 + &lower_out_flags); 1.2369 + if ((lower_new_flags & lower_out_flags) && (how_flags != new_flags)) { 1.2370 + PRInt16 out_flags = lower_out_flags & ~PR_POLL_RW; 1.2371 + if (lower_out_flags & PR_POLL_READ) 1.2372 + out_flags |= PR_POLL_WRITE; 1.2373 + if (lower_out_flags & PR_POLL_WRITE) 1.2374 + out_flags |= PR_POLL_READ; 1.2375 + *p_out_flags = out_flags; 1.2376 + new_flags = how_flags; 1.2377 + } else { 1.2378 + *p_out_flags = lower_out_flags; 1.2379 + new_flags = lower_new_flags; 1.2380 + } 1.2381 + } 1.2382 + 1.2383 + return new_flags; 1.2384 +} 1.2385 + 1.2386 +static PRInt32 PR_CALLBACK 1.2387 +ssl_TransmitFile(PRFileDesc *sd, PRFileDesc *fd, 1.2388 + const void *headers, PRInt32 hlen, 1.2389 + PRTransmitFileFlags flags, PRIntervalTime timeout) 1.2390 +{ 1.2391 + PRSendFileData sfd; 1.2392 + 1.2393 + sfd.fd = fd; 1.2394 + sfd.file_offset = 0; 1.2395 + sfd.file_nbytes = 0; 1.2396 + sfd.header = headers; 1.2397 + sfd.hlen = hlen; 1.2398 + sfd.trailer = NULL; 1.2399 + sfd.tlen = 0; 1.2400 + 1.2401 + return sd->methods->sendfile(sd, &sfd, flags, timeout); 1.2402 +} 1.2403 + 1.2404 + 1.2405 +PRBool 1.2406 +ssl_FdIsBlocking(PRFileDesc *fd) 1.2407 +{ 1.2408 + PRSocketOptionData opt; 1.2409 + PRStatus status; 1.2410 + 1.2411 + opt.option = PR_SockOpt_Nonblocking; 1.2412 + opt.value.non_blocking = PR_FALSE; 1.2413 + status = PR_GetSocketOption(fd, &opt); 1.2414 + if (status != PR_SUCCESS) 1.2415 + return PR_FALSE; 1.2416 + return (PRBool)!opt.value.non_blocking; 1.2417 +} 1.2418 + 1.2419 +PRBool 1.2420 +ssl_SocketIsBlocking(sslSocket *ss) 1.2421 +{ 1.2422 + return ssl_FdIsBlocking(ss->fd); 1.2423 +} 1.2424 + 1.2425 +PRInt32 sslFirstBufSize = 8 * 1024; 1.2426 +PRInt32 sslCopyLimit = 1024; 1.2427 + 1.2428 +static PRInt32 PR_CALLBACK 1.2429 +ssl_WriteV(PRFileDesc *fd, const PRIOVec *iov, PRInt32 vectors, 1.2430 + PRIntervalTime timeout) 1.2431 +{ 1.2432 + PRInt32 i; 1.2433 + PRInt32 bufLen; 1.2434 + PRInt32 left; 1.2435 + PRInt32 rv; 1.2436 + PRInt32 sent = 0; 1.2437 + const PRInt32 first_len = sslFirstBufSize; 1.2438 + const PRInt32 limit = sslCopyLimit; 1.2439 + PRBool blocking; 1.2440 + PRIOVec myIov = { 0, 0 }; 1.2441 + char buf[MAX_FRAGMENT_LENGTH]; 1.2442 + 1.2443 + if (vectors < 0) { 1.2444 + PORT_SetError(PR_INVALID_ARGUMENT_ERROR); 1.2445 + return -1; 1.2446 + } 1.2447 + if (vectors > PR_MAX_IOVECTOR_SIZE) { 1.2448 + PORT_SetError(PR_BUFFER_OVERFLOW_ERROR); 1.2449 + return -1; 1.2450 + } 1.2451 + for (i = 0; i < vectors; i++) { 1.2452 + if (iov[i].iov_len < 0) { 1.2453 + PORT_SetError(PR_INVALID_ARGUMENT_ERROR); 1.2454 + return -1; 1.2455 + } 1.2456 + } 1.2457 + blocking = ssl_FdIsBlocking(fd); 1.2458 + 1.2459 +#define K16 sizeof(buf) 1.2460 +#define KILL_VECTORS while (vectors && !iov->iov_len) { ++iov; --vectors; } 1.2461 +#define GET_VECTOR do { myIov = *iov++; --vectors; KILL_VECTORS } while (0) 1.2462 +#define HANDLE_ERR(rv, len) \ 1.2463 + if (rv != len) { \ 1.2464 + if (rv < 0) { \ 1.2465 + if (!blocking \ 1.2466 + && (PR_GetError() == PR_WOULD_BLOCK_ERROR) \ 1.2467 + && (sent > 0)) { \ 1.2468 + return sent; \ 1.2469 + } else { \ 1.2470 + return -1; \ 1.2471 + } \ 1.2472 + } \ 1.2473 + /* Only a nonblocking socket can have partial sends */ \ 1.2474 + PR_ASSERT(!blocking); \ 1.2475 + return sent + rv; \ 1.2476 + } 1.2477 +#define SEND(bfr, len) \ 1.2478 + do { \ 1.2479 + rv = ssl_Send(fd, bfr, len, 0, timeout); \ 1.2480 + HANDLE_ERR(rv, len) \ 1.2481 + sent += len; \ 1.2482 + } while (0) 1.2483 + 1.2484 + /* Make sure the first write is at least 8 KB, if possible. */ 1.2485 + KILL_VECTORS 1.2486 + if (!vectors) 1.2487 + return ssl_Send(fd, 0, 0, 0, timeout); 1.2488 + GET_VECTOR; 1.2489 + if (!vectors) { 1.2490 + return ssl_Send(fd, myIov.iov_base, myIov.iov_len, 0, timeout); 1.2491 + } 1.2492 + if (myIov.iov_len < first_len) { 1.2493 + PORT_Memcpy(buf, myIov.iov_base, myIov.iov_len); 1.2494 + bufLen = myIov.iov_len; 1.2495 + left = first_len - bufLen; 1.2496 + while (vectors && left) { 1.2497 + int toCopy; 1.2498 + GET_VECTOR; 1.2499 + toCopy = PR_MIN(left, myIov.iov_len); 1.2500 + PORT_Memcpy(buf + bufLen, myIov.iov_base, toCopy); 1.2501 + bufLen += toCopy; 1.2502 + left -= toCopy; 1.2503 + myIov.iov_base += toCopy; 1.2504 + myIov.iov_len -= toCopy; 1.2505 + } 1.2506 + SEND( buf, bufLen ); 1.2507 + } 1.2508 + 1.2509 + while (vectors || myIov.iov_len) { 1.2510 + PRInt32 addLen; 1.2511 + if (!myIov.iov_len) { 1.2512 + GET_VECTOR; 1.2513 + } 1.2514 + while (myIov.iov_len >= K16) { 1.2515 + SEND(myIov.iov_base, K16); 1.2516 + myIov.iov_base += K16; 1.2517 + myIov.iov_len -= K16; 1.2518 + } 1.2519 + if (!myIov.iov_len) 1.2520 + continue; 1.2521 + 1.2522 + if (!vectors || myIov.iov_len > limit) { 1.2523 + addLen = 0; 1.2524 + } else if ((addLen = iov->iov_len % K16) + myIov.iov_len <= limit) { 1.2525 + /* Addlen is already computed. */; 1.2526 + } else if (vectors > 1 && 1.2527 + iov[1].iov_len % K16 + addLen + myIov.iov_len <= 2 * limit) { 1.2528 + addLen = limit - myIov.iov_len; 1.2529 + } else 1.2530 + addLen = 0; 1.2531 + 1.2532 + if (!addLen) { 1.2533 + SEND( myIov.iov_base, myIov.iov_len ); 1.2534 + myIov.iov_len = 0; 1.2535 + continue; 1.2536 + } 1.2537 + PORT_Memcpy(buf, myIov.iov_base, myIov.iov_len); 1.2538 + bufLen = myIov.iov_len; 1.2539 + do { 1.2540 + GET_VECTOR; 1.2541 + PORT_Memcpy(buf + bufLen, myIov.iov_base, addLen); 1.2542 + myIov.iov_base += addLen; 1.2543 + myIov.iov_len -= addLen; 1.2544 + bufLen += addLen; 1.2545 + 1.2546 + left = PR_MIN( limit, K16 - bufLen); 1.2547 + if (!vectors /* no more left */ 1.2548 + || myIov.iov_len > 0 /* we didn't use that one all up */ 1.2549 + || bufLen >= K16 /* it's full. */ 1.2550 + ) { 1.2551 + addLen = 0; 1.2552 + } else if ((addLen = iov->iov_len % K16) <= left) { 1.2553 + /* Addlen is already computed. */; 1.2554 + } else if (vectors > 1 && 1.2555 + iov[1].iov_len % K16 + addLen <= left + limit) { 1.2556 + addLen = left; 1.2557 + } else 1.2558 + addLen = 0; 1.2559 + 1.2560 + } while (addLen); 1.2561 + SEND( buf, bufLen ); 1.2562 + } 1.2563 + return sent; 1.2564 +} 1.2565 + 1.2566 +/* 1.2567 + * These functions aren't implemented. 1.2568 + */ 1.2569 + 1.2570 +static PRInt32 PR_CALLBACK 1.2571 +ssl_Available(PRFileDesc *fd) 1.2572 +{ 1.2573 + PORT_Assert(0); 1.2574 + PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0); 1.2575 + return SECFailure; 1.2576 +} 1.2577 + 1.2578 +static PRInt64 PR_CALLBACK 1.2579 +ssl_Available64(PRFileDesc *fd) 1.2580 +{ 1.2581 + PRInt64 res; 1.2582 + 1.2583 + PORT_Assert(0); 1.2584 + PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0); 1.2585 + LL_I2L(res, -1L); 1.2586 + return res; 1.2587 +} 1.2588 + 1.2589 +static PRStatus PR_CALLBACK 1.2590 +ssl_FSync(PRFileDesc *fd) 1.2591 +{ 1.2592 + PORT_Assert(0); 1.2593 + PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0); 1.2594 + return PR_FAILURE; 1.2595 +} 1.2596 + 1.2597 +static PRInt32 PR_CALLBACK 1.2598 +ssl_Seek(PRFileDesc *fd, PRInt32 offset, PRSeekWhence how) { 1.2599 + PORT_Assert(0); 1.2600 + PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0); 1.2601 + return SECFailure; 1.2602 +} 1.2603 + 1.2604 +static PRInt64 PR_CALLBACK 1.2605 +ssl_Seek64(PRFileDesc *fd, PRInt64 offset, PRSeekWhence how) { 1.2606 + PRInt64 res; 1.2607 + 1.2608 + PORT_Assert(0); 1.2609 + PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0); 1.2610 + LL_I2L(res, -1L); 1.2611 + return res; 1.2612 +} 1.2613 + 1.2614 +static PRStatus PR_CALLBACK 1.2615 +ssl_FileInfo(PRFileDesc *fd, PRFileInfo *info) 1.2616 +{ 1.2617 + PORT_Assert(0); 1.2618 + PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0); 1.2619 + return PR_FAILURE; 1.2620 +} 1.2621 + 1.2622 +static PRStatus PR_CALLBACK 1.2623 +ssl_FileInfo64(PRFileDesc *fd, PRFileInfo64 *info) 1.2624 +{ 1.2625 + PORT_Assert(0); 1.2626 + PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0); 1.2627 + return PR_FAILURE; 1.2628 +} 1.2629 + 1.2630 +static PRInt32 PR_CALLBACK 1.2631 +ssl_RecvFrom(PRFileDesc *fd, void *buf, PRInt32 amount, PRIntn flags, 1.2632 + PRNetAddr *addr, PRIntervalTime timeout) 1.2633 +{ 1.2634 + PORT_Assert(0); 1.2635 + PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0); 1.2636 + return SECFailure; 1.2637 +} 1.2638 + 1.2639 +static PRInt32 PR_CALLBACK 1.2640 +ssl_SendTo(PRFileDesc *fd, const void *buf, PRInt32 amount, PRIntn flags, 1.2641 + const PRNetAddr *addr, PRIntervalTime timeout) 1.2642 +{ 1.2643 + PORT_Assert(0); 1.2644 + PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0); 1.2645 + return SECFailure; 1.2646 +} 1.2647 + 1.2648 +static const PRIOMethods ssl_methods = { 1.2649 + PR_DESC_LAYERED, 1.2650 + ssl_Close, /* close */ 1.2651 + ssl_Read, /* read */ 1.2652 + ssl_Write, /* write */ 1.2653 + ssl_Available, /* available */ 1.2654 + ssl_Available64, /* available64 */ 1.2655 + ssl_FSync, /* fsync */ 1.2656 + ssl_Seek, /* seek */ 1.2657 + ssl_Seek64, /* seek64 */ 1.2658 + ssl_FileInfo, /* fileInfo */ 1.2659 + ssl_FileInfo64, /* fileInfo64 */ 1.2660 + ssl_WriteV, /* writev */ 1.2661 + ssl_Connect, /* connect */ 1.2662 + ssl_Accept, /* accept */ 1.2663 + ssl_Bind, /* bind */ 1.2664 + ssl_Listen, /* listen */ 1.2665 + ssl_Shutdown, /* shutdown */ 1.2666 + ssl_Recv, /* recv */ 1.2667 + ssl_Send, /* send */ 1.2668 + ssl_RecvFrom, /* recvfrom */ 1.2669 + ssl_SendTo, /* sendto */ 1.2670 + ssl_Poll, /* poll */ 1.2671 + PR_EmulateAcceptRead, /* acceptread */ 1.2672 + ssl_TransmitFile, /* transmitfile */ 1.2673 + ssl_GetSockName, /* getsockname */ 1.2674 + ssl_GetPeerName, /* getpeername */ 1.2675 + NULL, /* getsockopt OBSOLETE */ 1.2676 + NULL, /* setsockopt OBSOLETE */ 1.2677 + NULL, /* getsocketoption */ 1.2678 + NULL, /* setsocketoption */ 1.2679 + PR_EmulateSendFile, /* Send a (partial) file with header/trailer*/ 1.2680 + NULL, /* reserved for future use */ 1.2681 + NULL, /* reserved for future use */ 1.2682 + NULL, /* reserved for future use */ 1.2683 + NULL, /* reserved for future use */ 1.2684 + NULL /* reserved for future use */ 1.2685 +}; 1.2686 + 1.2687 + 1.2688 +static PRIOMethods combined_methods; 1.2689 + 1.2690 +static void 1.2691 +ssl_SetupIOMethods(void) 1.2692 +{ 1.2693 + PRIOMethods *new_methods = &combined_methods; 1.2694 + const PRIOMethods *nspr_methods = PR_GetDefaultIOMethods(); 1.2695 + const PRIOMethods *my_methods = &ssl_methods; 1.2696 + 1.2697 + *new_methods = *nspr_methods; 1.2698 + 1.2699 + new_methods->file_type = my_methods->file_type; 1.2700 + new_methods->close = my_methods->close; 1.2701 + new_methods->read = my_methods->read; 1.2702 + new_methods->write = my_methods->write; 1.2703 + new_methods->available = my_methods->available; 1.2704 + new_methods->available64 = my_methods->available64; 1.2705 + new_methods->fsync = my_methods->fsync; 1.2706 + new_methods->seek = my_methods->seek; 1.2707 + new_methods->seek64 = my_methods->seek64; 1.2708 + new_methods->fileInfo = my_methods->fileInfo; 1.2709 + new_methods->fileInfo64 = my_methods->fileInfo64; 1.2710 + new_methods->writev = my_methods->writev; 1.2711 + new_methods->connect = my_methods->connect; 1.2712 + new_methods->accept = my_methods->accept; 1.2713 + new_methods->bind = my_methods->bind; 1.2714 + new_methods->listen = my_methods->listen; 1.2715 + new_methods->shutdown = my_methods->shutdown; 1.2716 + new_methods->recv = my_methods->recv; 1.2717 + new_methods->send = my_methods->send; 1.2718 + new_methods->recvfrom = my_methods->recvfrom; 1.2719 + new_methods->sendto = my_methods->sendto; 1.2720 + new_methods->poll = my_methods->poll; 1.2721 + new_methods->acceptread = my_methods->acceptread; 1.2722 + new_methods->transmitfile = my_methods->transmitfile; 1.2723 + new_methods->getsockname = my_methods->getsockname; 1.2724 + new_methods->getpeername = my_methods->getpeername; 1.2725 +/* new_methods->getsocketoption = my_methods->getsocketoption; */ 1.2726 +/* new_methods->setsocketoption = my_methods->setsocketoption; */ 1.2727 + new_methods->sendfile = my_methods->sendfile; 1.2728 + 1.2729 +} 1.2730 + 1.2731 +static PRCallOnceType initIoLayerOnce; 1.2732 + 1.2733 +static PRStatus 1.2734 +ssl_InitIOLayer(void) 1.2735 +{ 1.2736 + ssl_layer_id = PR_GetUniqueIdentity("SSL"); 1.2737 + ssl_SetupIOMethods(); 1.2738 + ssl_inited = PR_TRUE; 1.2739 + return PR_SUCCESS; 1.2740 +} 1.2741 + 1.2742 +static PRStatus 1.2743 +ssl_PushIOLayer(sslSocket *ns, PRFileDesc *stack, PRDescIdentity id) 1.2744 +{ 1.2745 + PRFileDesc *layer = NULL; 1.2746 + PRStatus status; 1.2747 + 1.2748 + if (!ssl_inited) { 1.2749 + status = PR_CallOnce(&initIoLayerOnce, &ssl_InitIOLayer); 1.2750 + if (status != PR_SUCCESS) 1.2751 + goto loser; 1.2752 + } 1.2753 + 1.2754 + if (ns == NULL) 1.2755 + goto loser; 1.2756 + 1.2757 + layer = PR_CreateIOLayerStub(ssl_layer_id, &combined_methods); 1.2758 + if (layer == NULL) 1.2759 + goto loser; 1.2760 + layer->secret = (PRFilePrivate *)ns; 1.2761 + 1.2762 + /* Here, "stack" points to the PRFileDesc on the top of the stack. 1.2763 + ** "layer" points to a new FD that is to be inserted into the stack. 1.2764 + ** If layer is being pushed onto the top of the stack, then 1.2765 + ** PR_PushIOLayer switches the contents of stack and layer, and then 1.2766 + ** puts stack on top of layer, so that after it is done, the top of 1.2767 + ** stack is the same "stack" as it was before, and layer is now the 1.2768 + ** FD for the former top of stack. 1.2769 + ** After this call, stack always points to the top PRFD on the stack. 1.2770 + ** If this function fails, the contents of stack and layer are as 1.2771 + ** they were before the call. 1.2772 + */ 1.2773 + status = PR_PushIOLayer(stack, id, layer); 1.2774 + if (status != PR_SUCCESS) 1.2775 + goto loser; 1.2776 + 1.2777 + ns->fd = (id == PR_TOP_IO_LAYER) ? stack : layer; 1.2778 + return PR_SUCCESS; 1.2779 + 1.2780 +loser: 1.2781 + if (layer) { 1.2782 + layer->dtor(layer); /* free layer */ 1.2783 + } 1.2784 + return PR_FAILURE; 1.2785 +} 1.2786 + 1.2787 +/* if this fails, caller must destroy socket. */ 1.2788 +static SECStatus 1.2789 +ssl_MakeLocks(sslSocket *ss) 1.2790 +{ 1.2791 + ss->firstHandshakeLock = PZ_NewMonitor(nssILockSSL); 1.2792 + if (!ss->firstHandshakeLock) 1.2793 + goto loser; 1.2794 + ss->ssl3HandshakeLock = PZ_NewMonitor(nssILockSSL); 1.2795 + if (!ss->ssl3HandshakeLock) 1.2796 + goto loser; 1.2797 + ss->specLock = NSSRWLock_New(SSL_LOCK_RANK_SPEC, NULL); 1.2798 + if (!ss->specLock) 1.2799 + goto loser; 1.2800 + ss->recvBufLock = PZ_NewMonitor(nssILockSSL); 1.2801 + if (!ss->recvBufLock) 1.2802 + goto loser; 1.2803 + ss->xmitBufLock = PZ_NewMonitor(nssILockSSL); 1.2804 + if (!ss->xmitBufLock) 1.2805 + goto loser; 1.2806 + ss->writerThread = NULL; 1.2807 + if (ssl_lock_readers) { 1.2808 + ss->recvLock = PZ_NewLock(nssILockSSL); 1.2809 + if (!ss->recvLock) 1.2810 + goto loser; 1.2811 + ss->sendLock = PZ_NewLock(nssILockSSL); 1.2812 + if (!ss->sendLock) 1.2813 + goto loser; 1.2814 + } 1.2815 + return SECSuccess; 1.2816 +loser: 1.2817 + ssl_DestroyLocks(ss); 1.2818 + return SECFailure; 1.2819 +} 1.2820 + 1.2821 +#if defined(XP_UNIX) || defined(XP_WIN32) || defined(XP_BEOS) 1.2822 +#define NSS_HAVE_GETENV 1 1.2823 +#endif 1.2824 + 1.2825 +#define LOWER(x) (x | 0x20) /* cheap ToLower function ignores LOCALE */ 1.2826 + 1.2827 +static void 1.2828 +ssl_SetDefaultsFromEnvironment(void) 1.2829 +{ 1.2830 +#if defined( NSS_HAVE_GETENV ) 1.2831 + static int firsttime = 1; 1.2832 + 1.2833 + if (firsttime) { 1.2834 + char * ev; 1.2835 + firsttime = 0; 1.2836 +#ifdef DEBUG 1.2837 + ev = getenv("SSLDEBUGFILE"); 1.2838 + if (ev && ev[0]) { 1.2839 + ssl_trace_iob = fopen(ev, "w"); 1.2840 + } 1.2841 + if (!ssl_trace_iob) { 1.2842 + ssl_trace_iob = stderr; 1.2843 + } 1.2844 +#ifdef TRACE 1.2845 + ev = getenv("SSLTRACE"); 1.2846 + if (ev && ev[0]) { 1.2847 + ssl_trace = atoi(ev); 1.2848 + SSL_TRACE(("SSL: tracing set to %d", ssl_trace)); 1.2849 + } 1.2850 +#endif /* TRACE */ 1.2851 + ev = getenv("SSLDEBUG"); 1.2852 + if (ev && ev[0]) { 1.2853 + ssl_debug = atoi(ev); 1.2854 + SSL_TRACE(("SSL: debugging set to %d", ssl_debug)); 1.2855 + } 1.2856 +#endif /* DEBUG */ 1.2857 + ev = getenv("SSLKEYLOGFILE"); 1.2858 + if (ev && ev[0]) { 1.2859 + ssl_keylog_iob = fopen(ev, "a"); 1.2860 + if (!ssl_keylog_iob) { 1.2861 + SSL_TRACE(("SSL: failed to open key log file")); 1.2862 + } else { 1.2863 + if (ftell(ssl_keylog_iob) == 0) { 1.2864 + fputs("# SSL/TLS secrets log file, generated by NSS\n", 1.2865 + ssl_keylog_iob); 1.2866 + } 1.2867 + SSL_TRACE(("SSL: logging SSL/TLS secrets to %s", ev)); 1.2868 + } 1.2869 + } 1.2870 +#ifndef NO_PKCS11_BYPASS 1.2871 + ev = getenv("SSLBYPASS"); 1.2872 + if (ev && ev[0]) { 1.2873 + ssl_defaults.bypassPKCS11 = (ev[0] == '1'); 1.2874 + SSL_TRACE(("SSL: bypass default set to %d", \ 1.2875 + ssl_defaults.bypassPKCS11)); 1.2876 + } 1.2877 +#endif /* NO_PKCS11_BYPASS */ 1.2878 + ev = getenv("SSLFORCELOCKS"); 1.2879 + if (ev && ev[0] == '1') { 1.2880 + ssl_force_locks = PR_TRUE; 1.2881 + ssl_defaults.noLocks = 0; 1.2882 + strcpy(lockStatus + LOCKSTATUS_OFFSET, "FORCED. "); 1.2883 + SSL_TRACE(("SSL: force_locks set to %d", ssl_force_locks)); 1.2884 + } 1.2885 + ev = getenv("NSS_SSL_ENABLE_RENEGOTIATION"); 1.2886 + if (ev) { 1.2887 + if (ev[0] == '1' || LOWER(ev[0]) == 'u') 1.2888 + ssl_defaults.enableRenegotiation = SSL_RENEGOTIATE_UNRESTRICTED; 1.2889 + else if (ev[0] == '0' || LOWER(ev[0]) == 'n') 1.2890 + ssl_defaults.enableRenegotiation = SSL_RENEGOTIATE_NEVER; 1.2891 + else if (ev[0] == '2' || LOWER(ev[0]) == 'r') 1.2892 + ssl_defaults.enableRenegotiation = SSL_RENEGOTIATE_REQUIRES_XTN; 1.2893 + else if (ev[0] == '3' || LOWER(ev[0]) == 't') 1.2894 + ssl_defaults.enableRenegotiation = SSL_RENEGOTIATE_TRANSITIONAL; 1.2895 + SSL_TRACE(("SSL: enableRenegotiation set to %d", 1.2896 + ssl_defaults.enableRenegotiation)); 1.2897 + } 1.2898 + ev = getenv("NSS_SSL_REQUIRE_SAFE_NEGOTIATION"); 1.2899 + if (ev && ev[0] == '1') { 1.2900 + ssl_defaults.requireSafeNegotiation = PR_TRUE; 1.2901 + SSL_TRACE(("SSL: requireSafeNegotiation set to %d", 1.2902 + PR_TRUE)); 1.2903 + } 1.2904 + ev = getenv("NSS_SSL_CBC_RANDOM_IV"); 1.2905 + if (ev && ev[0] == '0') { 1.2906 + ssl_defaults.cbcRandomIV = PR_FALSE; 1.2907 + SSL_TRACE(("SSL: cbcRandomIV set to 0")); 1.2908 + } 1.2909 + } 1.2910 +#endif /* NSS_HAVE_GETENV */ 1.2911 +} 1.2912 + 1.2913 +/* 1.2914 +** Create a newsocket structure for a file descriptor. 1.2915 +*/ 1.2916 +static sslSocket * 1.2917 +ssl_NewSocket(PRBool makeLocks, SSLProtocolVariant protocolVariant) 1.2918 +{ 1.2919 + sslSocket *ss; 1.2920 + 1.2921 + ssl_SetDefaultsFromEnvironment(); 1.2922 + 1.2923 + if (ssl_force_locks) 1.2924 + makeLocks = PR_TRUE; 1.2925 + 1.2926 + /* Make a new socket and get it ready */ 1.2927 + ss = (sslSocket*) PORT_ZAlloc(sizeof(sslSocket)); 1.2928 + if (ss) { 1.2929 + /* This should be of type SSLKEAType, but CC on IRIX 1.2930 + * complains during the for loop. 1.2931 + */ 1.2932 + int i; 1.2933 + SECStatus status; 1.2934 + 1.2935 + ss->opt = ssl_defaults; 1.2936 + ss->opt.useSocks = PR_FALSE; 1.2937 + ss->opt.noLocks = !makeLocks; 1.2938 + ss->vrange = *VERSIONS_DEFAULTS(protocolVariant); 1.2939 + ss->protocolVariant = protocolVariant; 1.2940 + 1.2941 + ss->peerID = NULL; 1.2942 + ss->rTimeout = PR_INTERVAL_NO_TIMEOUT; 1.2943 + ss->wTimeout = PR_INTERVAL_NO_TIMEOUT; 1.2944 + ss->cTimeout = PR_INTERVAL_NO_TIMEOUT; 1.2945 + ss->cipherSpecs = NULL; 1.2946 + ss->sizeCipherSpecs = 0; /* produced lazily */ 1.2947 + ss->preferredCipher = NULL; 1.2948 + ss->url = NULL; 1.2949 + 1.2950 + for (i=kt_null; i < kt_kea_size; i++) { 1.2951 + sslServerCerts * sc = ss->serverCerts + i; 1.2952 + sc->serverCert = NULL; 1.2953 + sc->serverCertChain = NULL; 1.2954 + sc->serverKeyPair = NULL; 1.2955 + sc->serverKeyBits = 0; 1.2956 + ss->certStatusArray[i] = NULL; 1.2957 + } 1.2958 + ss->stepDownKeyPair = NULL; 1.2959 + ss->dbHandle = CERT_GetDefaultCertDB(); 1.2960 + 1.2961 + /* Provide default implementation of hooks */ 1.2962 + ss->authCertificate = SSL_AuthCertificate; 1.2963 + ss->authCertificateArg = (void *)ss->dbHandle; 1.2964 + ss->sniSocketConfig = NULL; 1.2965 + ss->sniSocketConfigArg = NULL; 1.2966 + ss->getClientAuthData = NULL; 1.2967 + ss->handleBadCert = NULL; 1.2968 + ss->badCertArg = NULL; 1.2969 + ss->pkcs11PinArg = NULL; 1.2970 + ss->ephemeralECDHKeyPair = NULL; 1.2971 + 1.2972 + ssl_ChooseOps(ss); 1.2973 + ssl2_InitSocketPolicy(ss); 1.2974 + ssl3_InitSocketPolicy(ss); 1.2975 + PR_INIT_CLIST(&ss->ssl3.hs.lastMessageFlight); 1.2976 + 1.2977 + if (makeLocks) { 1.2978 + status = ssl_MakeLocks(ss); 1.2979 + if (status != SECSuccess) 1.2980 + goto loser; 1.2981 + } 1.2982 + status = ssl_CreateSecurityInfo(ss); 1.2983 + if (status != SECSuccess) 1.2984 + goto loser; 1.2985 + status = ssl_InitGather(&ss->gs); 1.2986 + if (status != SECSuccess) { 1.2987 +loser: 1.2988 + ssl_DestroySocketContents(ss); 1.2989 + ssl_DestroyLocks(ss); 1.2990 + PORT_Free(ss); 1.2991 + ss = NULL; 1.2992 + } 1.2993 + } 1.2994 + return ss; 1.2995 +}