2012-06-05 18:26:04 +02:00
|
|
|
/*
|
2014-03-30 12:09:21 +02:00
|
|
|
* nghttp2 - HTTP/2 C Library
|
2012-06-05 18:26:04 +02:00
|
|
|
*
|
|
|
|
* Copyright (c) 2012 Tatsuhiro Tsujikawa
|
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining
|
|
|
|
* a copy of this software and associated documentation files (the
|
|
|
|
* "Software"), to deal in the Software without restriction, including
|
|
|
|
* without limitation the rights to use, copy, modify, merge, publish,
|
|
|
|
* distribute, sublicense, and/or sell copies of the Software, and to
|
|
|
|
* permit persons to whom the Software is furnished to do so, subject to
|
|
|
|
* the following conditions:
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice shall be
|
|
|
|
* included in all copies or substantial portions of the Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
|
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
|
|
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
|
|
|
* LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
|
|
|
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
|
|
|
* WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
*/
|
|
|
|
#ifndef SHRPX_SSL_H
|
|
|
|
#define SHRPX_SSL_H
|
|
|
|
|
|
|
|
#include "shrpx.h"
|
|
|
|
|
2013-02-06 15:27:05 +01:00
|
|
|
#include <vector>
|
|
|
|
|
2012-06-05 18:26:04 +02:00
|
|
|
#include <openssl/ssl.h>
|
|
|
|
#include <openssl/err.h>
|
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
#include <ev.h>
|
2012-06-05 18:26:04 +02:00
|
|
|
|
|
|
|
namespace shrpx {
|
|
|
|
|
|
|
|
class ClientHandler;
|
2014-06-26 15:55:22 +02:00
|
|
|
struct WorkerStat;
|
2014-10-13 14:09:00 +02:00
|
|
|
class DownstreamConnectionPool;
|
2012-06-05 18:26:04 +02:00
|
|
|
|
|
|
|
namespace ssl {
|
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
SSL_CTX *create_ssl_context(const char *private_key_file,
|
2013-02-06 15:27:05 +01:00
|
|
|
const char *cert_file);
|
2012-06-05 18:26:04 +02:00
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
SSL_CTX *create_ssl_client_context();
|
2012-11-18 13:23:13 +01:00
|
|
|
|
2014-12-27 18:59:06 +01:00
|
|
|
ClientHandler *accept_connection(struct ev_loop *loop, SSL_CTX *ssl_ctx, int fd,
|
2014-11-27 15:39:04 +01:00
|
|
|
sockaddr *addr, int addrlen,
|
|
|
|
WorkerStat *worker_stat,
|
|
|
|
DownstreamConnectionPool *dconn_pool);
|
2012-06-05 18:26:04 +02:00
|
|
|
|
2014-12-06 10:31:46 +01:00
|
|
|
// Check peer's certificate against first downstream address in
|
|
|
|
// Config::downstream_addrs. We only consider first downstream since
|
|
|
|
// we use this function for HTTP/2 downstream link only.
|
2012-11-22 13:46:15 +01:00
|
|
|
int check_cert(SSL *ssl);
|
|
|
|
|
2013-02-06 15:27:05 +01:00
|
|
|
// Retrieves DNS and IP address in subjectAltNames and commonName from
|
|
|
|
// the |cert|.
|
2014-11-27 15:39:04 +01:00
|
|
|
void get_altnames(X509 *cert, std::vector<std::string> &dns_names,
|
|
|
|
std::vector<std::string> &ip_addrs, std::string &common_name);
|
2013-02-06 15:27:05 +01:00
|
|
|
|
|
|
|
// CertLookupTree forms lookup tree to get SSL_CTX whose DNS or
|
2013-02-13 16:28:55 +01:00
|
|
|
// commonName matches hostname in query. The tree is patricia trie
|
|
|
|
// data structure formed from the tail of the hostname pattern. Each
|
|
|
|
// CertNode contains part of hostname str member in range [first,
|
|
|
|
// last) member and the next member contains the following CertNode
|
|
|
|
// pointers ('following' means character before the current one). The
|
|
|
|
// CertNode where a hostname pattern ends contains its SSL_CTX pointer
|
|
|
|
// in the ssl_ctx member. For wildcard hostname pattern, we store the
|
|
|
|
// its pattern and SSL_CTX in CertNode one before first "*" found from
|
|
|
|
// the tail.
|
2013-02-06 15:27:05 +01:00
|
|
|
//
|
|
|
|
// When querying SSL_CTX with particular hostname, we match from its
|
|
|
|
// tail in our lookup tree. If the query goes to the first character
|
|
|
|
// of the hostname and current CertNode has non-NULL ssl_ctx member,
|
|
|
|
// then it is the exact match. The ssl_ctx member is returned. Along
|
|
|
|
// the way, if CertNode which contains non-empty wildcard_certs member
|
|
|
|
// is encountered, wildcard hostname matching is performed against
|
|
|
|
// them. If there is a match, its SSL_CTX is returned. If none
|
|
|
|
// matches, query is continued to the next character.
|
|
|
|
|
|
|
|
struct CertNode {
|
|
|
|
// SSL_CTX for exact match
|
|
|
|
SSL_CTX *ssl_ctx;
|
|
|
|
// list of wildcard domain name and its SSL_CTX pair, the wildcard
|
|
|
|
// '*' appears in this position.
|
2014-11-27 15:39:04 +01:00
|
|
|
std::vector<std::pair<char *, SSL_CTX *>> wildcard_certs;
|
2013-02-06 15:27:05 +01:00
|
|
|
// Next CertNode index of CertLookupTree::nodes
|
2014-11-27 15:39:04 +01:00
|
|
|
std::vector<CertNode *> next;
|
2013-02-13 16:28:55 +01:00
|
|
|
char *str;
|
|
|
|
// [first, last) in the reverse direction in str, first >=
|
|
|
|
// last. This indices only work for str member.
|
|
|
|
int first, last;
|
2013-02-06 15:27:05 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
struct CertLookupTree {
|
2014-11-27 15:39:04 +01:00
|
|
|
std::vector<SSL_CTX *> certs;
|
|
|
|
std::vector<char *> hosts;
|
2013-02-06 15:27:05 +01:00
|
|
|
CertNode *root;
|
|
|
|
};
|
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
CertLookupTree *cert_lookup_tree_new();
|
2013-02-06 15:27:05 +01:00
|
|
|
void cert_lookup_tree_del(CertLookupTree *lt);
|
|
|
|
|
|
|
|
// Adds |ssl_ctx| with hostname pattern |hostname| with length |len|
|
|
|
|
// to the lookup tree |lt|. The |hostname| must be NULL-terminated.
|
|
|
|
void cert_lookup_tree_add_cert(CertLookupTree *lt, SSL_CTX *ssl_ctx,
|
|
|
|
const char *hostname, size_t len);
|
|
|
|
|
|
|
|
// Looks up SSL_CTX using the given |hostname| with length |len|. If
|
|
|
|
// more than one SSL_CTX which matches the query, it is undefined
|
|
|
|
// which one is returned. The |hostname| must be NULL-terminated. If
|
|
|
|
// no matching SSL_CTX found, returns NULL.
|
2014-11-27 15:39:04 +01:00
|
|
|
SSL_CTX *cert_lookup_tree_lookup(CertLookupTree *lt, const char *hostname,
|
2013-02-06 15:27:05 +01:00
|
|
|
size_t len);
|
|
|
|
|
|
|
|
// Adds |ssl_ctx| to lookup tree |lt| using hostnames read from
|
|
|
|
// |certfile|. The subjectAltNames and commonName are considered as
|
|
|
|
// eligible hostname. This function returns 0 if it succeeds, or -1.
|
|
|
|
// Even if no ssl_ctx is added to tree, this function returns 0.
|
|
|
|
int cert_lookup_tree_add_cert_from_file(CertLookupTree *lt, SSL_CTX *ssl_ctx,
|
|
|
|
const char *certfile);
|
|
|
|
|
2014-06-08 15:52:27 +02:00
|
|
|
// Returns true if |needle| which has |len| bytes is included in the
|
|
|
|
// protocol list |protos|.
|
2014-11-27 15:39:04 +01:00
|
|
|
bool in_proto_list(const std::vector<char *> &protos,
|
2014-06-08 15:52:27 +02:00
|
|
|
const unsigned char *needle, size_t len);
|
2014-01-01 16:53:07 +01:00
|
|
|
|
2014-04-26 15:37:48 +02:00
|
|
|
// Returns true if security requirement for HTTP/2 is fulfilled.
|
|
|
|
bool check_http2_requirement(SSL *ssl);
|
|
|
|
|
2014-06-08 15:52:27 +02:00
|
|
|
// Returns SSL/TLS option mask to disable SSL/TLS protocol version not
|
|
|
|
// included in |tls_proto_list|. The returned mask can be directly
|
|
|
|
// passed to SSL_CTX_set_options().
|
2014-11-27 15:39:04 +01:00
|
|
|
long int create_tls_proto_mask(const std::vector<char *> &tls_proto_list);
|
2014-06-08 15:52:27 +02:00
|
|
|
|
2014-11-27 15:39:04 +01:00
|
|
|
std::vector<unsigned char> set_alpn_prefs(const std::vector<char *> &protos);
|
2014-06-10 16:15:29 +02:00
|
|
|
|
2012-06-05 18:26:04 +02:00
|
|
|
} // namespace ssl
|
|
|
|
|
|
|
|
} // namespace shrpx
|
|
|
|
|
|
|
|
#endif // SHRPX_SSL_H
|