quiche/tls/
openssl_quictls.rs

1use super::*;
2
3use libc::c_long;
4use libc::c_uchar;
5
6#[allow(non_camel_case_types)]
7#[repr(transparent)]
8struct OPENSSL_STACK {
9    _unused: c_void,
10}
11
12#[allow(non_camel_case_types)]
13#[repr(transparent)]
14struct X509 {
15    _unused: c_void,
16}
17
18#[repr(C)]
19#[allow(non_camel_case_types)]
20pub(super) struct SSL_QUIC_METHOD {
21    set_encryption_secrets: Option<
22        extern "C" fn(
23            ssl: *mut SSL,
24            level: crypto::Level,
25            read_secret: *const u8,
26            write_secret: *const u8,
27            secret_len: usize,
28        ) -> c_int,
29    >,
30
31    add_handshake_data: Option<
32        unsafe extern "C" fn(
33            ssl: *mut SSL,
34            level: crypto::Level,
35            data: *const u8,
36            len: usize,
37        ) -> c_int,
38    >,
39
40    flush_flight: Option<extern "C" fn(ssl: *mut SSL) -> c_int>,
41
42    send_alert: Option<
43        extern "C" fn(ssl: *mut SSL, level: crypto::Level, alert: u8) -> c_int,
44    >,
45}
46
47pub(super) static QUICHE_STREAM_METHOD: SSL_QUIC_METHOD = SSL_QUIC_METHOD {
48    set_encryption_secrets: Some(set_encryption_secrets),
49    add_handshake_data: Some(super::add_handshake_data),
50    flush_flight: Some(super::flush_flight),
51    send_alert: Some(super::send_alert),
52};
53
54impl Context {
55    pub fn set_early_data_enabled(&mut self, _enabled: bool) {
56        // not yet supported
57    }
58}
59
60impl Handshake {
61    pub fn set_quic_early_data_context(&mut self, _context: &[u8]) -> Result<()> {
62        // not supported for now.
63        map_result(1)
64    }
65
66    pub fn curve(&self) -> Option<String> {
67        let curve = unsafe {
68            let curve_id = SSL_get_negotiated_group(self.as_ptr());
69            if curve_id == 0 {
70                return None;
71            }
72
73            let curve_name = SSL_group_to_name(self.as_ptr(), curve_id);
74
75            match ffi::CStr::from_ptr(curve_name).to_str() {
76                Ok(v) => v,
77
78                Err(_) => return None,
79            }
80        };
81
82        Some(curve.to_string())
83    }
84
85    pub fn peer_cert_chain(&self) -> Option<Vec<&[u8]>> {
86        // If ssl is server then the leaf will not be included,
87        // SSL_get0_peer_certificate should be called.
88        let cert_chain = unsafe {
89            let chain =
90                map_result_ptr(SSL_get_peer_cert_chain(self.as_ptr())).ok()?;
91
92            let num = sk_X509_num(chain);
93            if num == 0 {
94                return None;
95            }
96
97            let mut cert_chain = vec![];
98            for i in 0..num {
99                let cert =
100                    map_result_ptr(sk_X509_value(chain, i) as *mut X509).ok()?;
101
102                let mut out: *mut u8 = std::ptr::null_mut();
103                let len = i2d_X509(cert, &mut out);
104                if len < 0 {
105                    return None;
106                }
107                cert_chain.push(slice::from_raw_parts(out, len as usize));
108            }
109
110            cert_chain
111        };
112
113        Some(cert_chain)
114    }
115
116    pub fn peer_cert(&self) -> Option<&[u8]> {
117        let peer_cert = unsafe {
118            // Important: Unit tests is disabled on this method.
119            // Although the client calls SSL_CTX_set_verify,  for some reason
120            // SSL_get0_peer_certificate seems not to return the peer's
121            // certificate as in bssl. SSL_peer_certificate does
122            // returns the object representing a certificate used as
123            // the local peer's identity.
124            let cert =
125                map_result_ptr(SSL_get0_peer_certificate(self.as_ptr())).ok()?;
126            let mut out: *mut u8 = std::ptr::null_mut();
127            let len = i2d_X509(cert, &mut out);
128            if len < 0 {
129                return None;
130            }
131            slice::from_raw_parts(out, len as usize)
132        };
133        Some(peer_cert)
134    }
135
136    #[cfg(test)]
137    #[allow(dead_code)] // for now, till we implement this using openssl
138    pub fn set_failing_private_key_method(&mut self) {}
139
140    pub fn is_in_early_data(&self) -> bool {
141        false
142    }
143
144    pub fn set_session(&mut self, session: &[u8]) -> Result<()> {
145        unsafe {
146            let ctx = SSL_get_SSL_CTX(self.as_ptr());
147
148            if ctx.is_null() {
149                return Err(Error::TlsFail);
150            }
151
152            let session = d2i_SSL_SESSION(
153                std::ptr::null_mut(),
154                &mut session.as_ptr(),
155                session.len() as c_long,
156            );
157
158            if session.is_null() {
159                return Err(Error::TlsFail);
160            }
161
162            let rc = SSL_set_session(self.as_mut_ptr(), session);
163            SSL_SESSION_free(session);
164
165            map_result(rc)
166        }
167    }
168
169    pub fn reset_early_data_reject(&mut self) {
170        // not yet supported
171    }
172
173    pub fn sigalg(&self) -> Option<String> {
174        let sigalg = "";
175
176        Some(sigalg.to_string())
177    }
178}
179
180extern "C" fn set_encryption_secrets(
181    ssl: *mut SSL, level: crypto::Level, read_secret: *const u8,
182    write_secret: *const u8, secret_len: usize,
183) -> c_int {
184    let cipher = map_result_ptr(unsafe { SSL_get_current_cipher(ssl) });
185    let _write_ret =
186        set_write_secret(ssl, level, cipher.unwrap(), write_secret, secret_len);
187    let _read_ret =
188        set_read_secret(ssl, level, cipher.unwrap(), read_secret, secret_len);
189
190    1
191}
192
193// OpenSSL compatibility functions.
194//
195// These don't 100% follow the OpenSSL API (e.g. some arguments have slightly
196// different types) in order to make them compatible with the BoringSSL API.
197
198#[allow(non_snake_case)]
199unsafe fn sk_X509_num(stack: *const STACK_OF) -> usize {
200    OPENSSL_sk_num(stack as *const OPENSSL_STACK)
201}
202
203#[allow(non_snake_case)]
204unsafe fn sk_X509_value(stack: *const STACK_OF, idx: usize) -> *mut c_void {
205    OPENSSL_sk_value(stack as *const OPENSSL_STACK, idx)
206}
207
208#[allow(non_snake_case)]
209pub(super) unsafe fn SSL_CTX_set_session_cache_mode(
210    ctx: *mut SSL_CTX, mode: c_int,
211) -> c_int {
212    const SSL_CTRL_SET_SESS_CACHE_MODE: c_int = 44;
213
214    SSL_CTX_ctrl(
215        ctx,
216        SSL_CTRL_SET_SESS_CACHE_MODE,
217        mode as c_long,
218        ptr::null_mut(),
219    ) as c_int
220}
221
222#[allow(non_snake_case)]
223pub(super) unsafe fn SSL_CTX_set_tlsext_ticket_keys(
224    ctx: *mut SSL_CTX, key: *const u8, key_len: usize,
225) -> c_int {
226    const SSL_CTRL_SET_TLSEXT_TICKET_KEYS: c_int = 59;
227
228    SSL_CTX_ctrl(
229        ctx,
230        SSL_CTRL_SET_TLSEXT_TICKET_KEYS,
231        key_len as c_long,
232        key as *mut c_void,
233    ) as c_int
234}
235
236#[allow(non_snake_case)]
237pub(super) unsafe fn SSL_set_min_proto_version(
238    s: *mut SSL, version: u16,
239) -> c_int {
240    const SSL_CTRL_SET_MIN_PROTO_VERSION: c_int = 123;
241
242    SSL_ctrl(
243        s,
244        SSL_CTRL_SET_MIN_PROTO_VERSION,
245        version as c_long,
246        ptr::null_mut(),
247    ) as c_int
248}
249
250#[allow(non_snake_case)]
251pub(super) unsafe fn SSL_set_max_proto_version(
252    s: *mut SSL, version: u16,
253) -> c_int {
254    const SSL_CTRL_SET_MAX_PROTO_VERSION: c_int = 124;
255
256    SSL_ctrl(
257        s,
258        SSL_CTRL_SET_MAX_PROTO_VERSION,
259        version as c_long,
260        ptr::null_mut(),
261    ) as c_int
262}
263
264#[allow(non_snake_case)]
265pub(super) unsafe fn SSL_set_tlsext_host_name(
266    s: *mut SSL, name: *const c_char,
267) -> c_int {
268    const SSL_CTRL_SET_TLSEXT_HOSTNAME: c_int = 55;
269
270    #[allow(non_upper_case_globals)]
271    const TLSEXT_NAMETYPE_host_name: c_long = 0;
272
273    SSL_ctrl(
274        s,
275        SSL_CTRL_SET_TLSEXT_HOSTNAME,
276        TLSEXT_NAMETYPE_host_name,
277        name as *mut c_void,
278    ) as c_int
279}
280
281#[allow(non_snake_case)]
282pub(super) unsafe fn SSL_get_ex_new_index(
283    argl: c_long, argp: *const c_void, newf: *const c_void, dupf: *const c_void,
284    freef: *const c_void,
285) -> c_int {
286    const CRYPTO_EX_INDEX_SSL: c_int = 0;
287
288    CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_SSL, argl, argp, newf, dupf, freef)
289}
290
291#[allow(non_snake_case)]
292unsafe fn SSL_get_negotiated_group(ssl: *const SSL) -> c_int {
293    const SSL_CTRL_GET_NEGOTIATED_GROUP: c_int = 134;
294    SSL_ctrl(
295        ssl,
296        SSL_CTRL_GET_NEGOTIATED_GROUP,
297        0 as c_long,
298        ptr::null_mut(),
299    ) as c_int
300}
301
302pub(super) fn get_session_bytes(session: *mut SSL_SESSION) -> Result<Vec<u8>> {
303    let session_bytes = unsafe {
304        // get session encoding length
305        let out_len = i2d_SSL_SESSION(session, std::ptr::null_mut());
306        if out_len == 0 {
307            return Err(Error::TlsFail);
308        }
309        let mut out: Vec<c_uchar> = Vec::with_capacity(out_len as usize);
310
311        let out_len = i2d_SSL_SESSION(session, &mut out.as_mut_ptr());
312        let session_bytes =
313            std::slice::from_raw_parts(out.as_mut_ptr(), out_len as usize)
314                .to_vec();
315        session_bytes
316    };
317
318    Ok(session_bytes)
319}
320pub(super) const TLS_ERROR: c_int = 2;
321
322extern "C" {
323
324    fn SSL_CTX_ctrl(
325        ctx: *mut SSL_CTX, cmd: c_int, larg: c_long, parg: *mut c_void,
326    ) -> c_long;
327
328    fn SSL_get_peer_cert_chain(ssl: *const SSL) -> *mut STACK_OF;
329
330    fn SSL_get0_peer_certificate(ssl: *const SSL) -> *mut X509;
331
332    fn SSL_ctrl(
333        ssl: *const SSL, cmd: c_int, larg: c_long, parg: *mut c_void,
334    ) -> c_long;
335
336    fn i2d_X509(px: *const X509, out: *mut *mut c_uchar) -> c_int;
337
338    fn OPENSSL_sk_num(stack: *const OPENSSL_STACK) -> usize;
339
340    fn OPENSSL_sk_value(stack: *const OPENSSL_STACK, idx: usize) -> *mut c_void;
341
342    // CRYPTO
343
344    fn CRYPTO_get_ex_new_index(
345        class_index: c_int, argl: c_long, argp: *const c_void,
346        new_func: *const c_void, dup_func: *const c_void,
347        free_func: *const c_void,
348    ) -> c_int;
349
350    fn d2i_SSL_SESSION(
351        a: *mut *mut SSL_SESSION, pp: *mut *const c_uchar, len: c_long,
352    ) -> *mut SSL_SESSION;
353
354    pub(super) fn i2d_SSL_SESSION(
355        in_: *mut SSL_SESSION, pp: *mut *mut c_uchar,
356    ) -> c_int;
357
358    fn SSL_group_to_name(ssl: *const SSL, id: c_int) -> *const c_char;
359}