Unverified Commit 0bc7dd90 authored by Steven Fackler's avatar Steven Fackler Committed by GitHub
Browse files

Merge pull request #860 from Ralith/custom-extensions

Custom extensions
parents 1b830c3f d0329473
Loading
Loading
Loading
Loading
+6 −0
Original line number Diff line number Diff line
@@ -1219,6 +1219,12 @@ pub const RSA_PKCS1_PSS_PADDING: c_int = 6;

pub const SHA_LBLOCK: c_int = 16;

pub const SSL3_AD_ILLEGAL_PARAMETER: c_int = 47;
pub const SSL_AD_ILLEGAL_PARAMETER: c_int = SSL3_AD_ILLEGAL_PARAMETER;

pub const TLS1_AD_DECODE_ERROR: c_int = 50;
pub const SSL_AD_DECODE_ERROR: c_int = TLS1_AD_DECODE_ERROR;

pub const TLS1_AD_UNRECOGNIZED_NAME: c_int = 112;
pub const SSL_AD_UNRECOGNIZED_NAME: c_int = TLS1_AD_UNRECOGNIZED_NAME;

+3 −0
Original line number Diff line number Diff line
@@ -975,4 +975,7 @@ extern "C" {

    pub fn SSLeay() -> c_ulong;
    pub fn SSLeay_version(key: c_int) -> *const c_char;

    #[cfg(ossl102)]
    pub fn SSL_extension_supported(ext_type: c_uint) -> c_int;
}
+1 −1
Original line number Diff line number Diff line
@@ -364,7 +364,7 @@ extern "C" {
    ) -> *mut PKCS12;
    pub fn X509_REQ_get_version(req: *const X509_REQ) -> c_long;
    pub fn X509_REQ_get_subject_name(req: *const X509_REQ) -> *mut ::X509_NAME;

    pub fn SSL_extension_supported(ext_type: c_uint) -> c_int;
    pub fn ECDSA_SIG_get0(sig: *const ECDSA_SIG, pr: *mut *const BIGNUM, ps: *mut *const BIGNUM);
    pub fn ECDSA_SIG_set0(sig: *mut ECDSA_SIG, pr: *mut BIGNUM, ps: *mut BIGNUM) -> c_int;
}
+53 −1
Original line number Diff line number Diff line
use libc::{c_char, c_int, c_ulong};
use libc::{c_char, c_uchar, c_int, c_uint, c_ulong, size_t, c_void};

pub type SSL_CTX_keylog_cb_func =
    Option<unsafe extern "C" fn(ssl: *const ::SSL, line: *const c_char)>;

pub type SSL_custom_ext_add_cb_ex =
    Option<unsafe extern "C" fn(ssl: *mut ::SSL, ext_type: c_uint,
                                context: c_uint,
                                out: *mut *const c_uchar,
                                outlen: *mut size_t, x: *mut ::X509,
                                chainidx: size_t, al: *mut c_int,
                                add_arg: *mut c_void) -> c_int>;

pub type SSL_custom_ext_free_cb_ex =
    Option<unsafe extern "C" fn(ssl: *mut ::SSL, ext_type: c_uint,
                                context: c_uint,
                                out: *mut *const c_uchar,
                                add_arg: *mut c_void)>;

pub type SSL_custom_ext_parse_cb_ex =
    Option<unsafe extern "C" fn(ssl: *mut ::SSL, ext_type: c_uint,
                                context: c_uint,
                                input: *const c_uchar,
                                inlen: size_t, x: *mut ::X509,
                                chainidx: size_t, al: *mut c_int,
                                parse_arg: *mut c_void) -> c_int>;

pub const SSL_COOKIE_LENGTH: c_int = 255;

pub const SSL_OP_ENABLE_MIDDLEBOX_COMPAT: c_ulong = 0x00100000;

pub const TLS1_3_VERSION: c_int = 0x304;

pub const SSL_EXT_TLS_ONLY: c_uint = 0x0001;
/* This extension is only allowed in DTLS */
pub const SSL_EXT_DTLS_ONLY: c_uint = 0x0002;
/* Some extensions may be allowed in DTLS but we don't implement them for it */
pub const SSL_EXT_TLS_IMPLEMENTATION_ONLY: c_uint = 0x0004;
/* Most extensions are not defined for SSLv3 but EXT_TYPE_renegotiate is */
pub const SSL_EXT_SSL3_ALLOWED: c_uint = 0x0008;
/* Extension is only defined for TLS1.2 and below */
pub const SSL_EXT_TLS1_2_AND_BELOW_ONLY: c_uint = 0x0010;
/* Extension is only defined for TLS1.3 and above */
pub const SSL_EXT_TLS1_3_ONLY: c_uint = 0x0020;
/* Ignore this extension during parsing if we are resuming */
pub const SSL_EXT_IGNORE_ON_RESUMPTION: c_uint = 0x0040;
pub const SSL_EXT_CLIENT_HELLO: c_uint = 0x0080;
/* Really means TLS1.2 or below */
pub const SSL_EXT_TLS1_2_SERVER_HELLO: c_uint = 0x0100;
pub const SSL_EXT_TLS1_3_SERVER_HELLO: c_uint = 0x0200;
pub const SSL_EXT_TLS1_3_ENCRYPTED_EXTENSIONS: c_uint = 0x0400;
pub const SSL_EXT_TLS1_3_HELLO_RETRY_REQUEST: c_uint = 0x0800;
pub const SSL_EXT_TLS1_3_CERTIFICATE: c_uint = 0x1000;
pub const SSL_EXT_TLS1_3_NEW_SESSION_TICKET: c_uint = 0x2000;
pub const SSL_EXT_TLS1_3_CERTIFICATE_REQUEST: c_uint = 0x4000;


extern "C" {
    pub fn SSL_CTX_set_keylog_callback(ctx: *mut ::SSL_CTX, cb: SSL_CTX_keylog_cb_func);
    pub fn SSL_CTX_add_custom_ext(ctx: *mut ::SSL_CTX, ext_type: c_uint, context: c_uint,
                                  add_cb: SSL_custom_ext_add_cb_ex,
                                  free_cb: SSL_custom_ext_free_cb_ex,
                                  add_arg: *mut c_void,
                                  parse_cb: SSL_custom_ext_parse_cb_ex,
                                  parse_arg: *mut c_void) -> c_int;
    pub fn SSL_stateless(s: *mut ::SSL) -> c_int;
}
+93 −0
Original line number Diff line number Diff line
use ffi;
use libc::{c_char, c_int, c_uchar, c_uint, c_void};
#[cfg(all(feature = "v111", ossl111))]
use libc::size_t;
use std::ffi::CStr;
use std::ptr;
use std::slice;
@@ -20,6 +22,10 @@ use ssl::{get_callback_idx, get_ssl_callback_idx, SniError, SslAlert, SslContext
          all(feature = "v111", ossl111)))]
use ssl::AlpnError;
use x509::X509StoreContextRef;
#[cfg(all(feature = "v111", ossl111))]
use ssl::ExtensionContext;
#[cfg(all(feature = "v111", ossl111))]
use x509::X509Ref;

pub extern "C" fn raw_verify<F>(preverify_ok: c_int, x509_ctx: *mut ffi::X509_STORE_CTX) -> c_int
where
@@ -416,3 +422,90 @@ where
        callback(ssl, slice) as c_int
    }
}

#[cfg(all(feature = "v111", ossl111))]
pub struct CustomExtAddState<T>(Option<T>);

#[cfg(all(feature = "v111", ossl111))]
pub extern "C" fn raw_custom_ext_add<F, T>(ssl: *mut ffi::SSL, _: c_uint,
                                           context: c_uint,
                                           out: *mut *const c_uchar,
                                           outlen: *mut size_t, x: *mut ffi::X509,
                                           chainidx: size_t, al: *mut c_int,
                                           _: *mut c_void)
                                           -> c_int
    where F: Fn(&mut SslRef, ExtensionContext, Option<(usize, &X509Ref)>) -> Result<Option<T>, SslAlert> + 'static,
          T: AsRef<[u8]> + 'static,
{
    unsafe {
        let ssl_ctx = ffi::SSL_get_SSL_CTX(ssl as *const _);
        let callback = ffi::SSL_CTX_get_ex_data(ssl_ctx, get_callback_idx::<F>());
        let callback = &*(callback as *mut F);
        let ssl = SslRef::from_ptr_mut(ssl);
        let ectx = ExtensionContext::from_bits_truncate(context);
        let cert = if ectx.contains(ExtensionContext::TLS1_3_CERTIFICATE) { Some((chainidx, X509Ref::from_ptr(x))) } else { None };
        match (callback)(ssl, ectx, cert) {
            Ok(None) => 0,
            Ok(Some(buf)) => {
                *outlen = buf.as_ref().len() as size_t;
                *out = buf.as_ref().as_ptr();

                let idx = get_ssl_callback_idx::<CustomExtAddState<T>>();
                let ptr = ffi::SSL_get_ex_data(ssl.as_ptr(), idx);
                if ptr.is_null() {
                    let x = Box::into_raw(Box::<CustomExtAddState<T>>::new(CustomExtAddState(Some(buf)))) as *mut c_void;
                    ffi::SSL_set_ex_data(ssl.as_ptr(), idx, x);
                } else {
                    *(ptr as *mut _) = CustomExtAddState(Some(buf))
                }
                1
            }
            Err(alert) => {
                *al = alert.0;
                -1
            }
        }
    }
}

#[cfg(all(feature = "v111", ossl111))]
pub extern "C" fn raw_custom_ext_free<T>(ssl: *mut ffi::SSL, _: c_uint,
                                         _: c_uint,
                                         _: *mut *const c_uchar,
                                         _: *mut c_void)
    where T: 'static
{
    unsafe {
        let state = ffi::SSL_get_ex_data(ssl, get_ssl_callback_idx::<CustomExtAddState<T>>());
        let state = &mut (*(state as *mut CustomExtAddState<T>)).0;
        state.take();
    }
}

#[cfg(all(feature = "v111", ossl111))]
pub extern "C" fn raw_custom_ext_parse<F>(ssl: *mut ffi::SSL, _: c_uint,
                                          context: c_uint,
                                          input: *const c_uchar,
                                          inlen: size_t, x: *mut ffi::X509,
                                          chainidx: size_t, al: *mut c_int,
                                          _: *mut c_void)
                                        -> c_int
    where F: FnMut(&mut SslRef, ExtensionContext, &[u8], Option<(usize, &X509Ref)>) -> Result<(), SslAlert> + 'static
{
    unsafe {
        let ssl_ctx = ffi::SSL_get_SSL_CTX(ssl as *const _);
        let callback = ffi::SSL_CTX_get_ex_data(ssl_ctx, get_callback_idx::<F>());
        let ssl = SslRef::from_ptr_mut(ssl);
        let callback = &mut *(callback as *mut F);
        let ectx = ExtensionContext::from_bits_truncate(context);
        let slice = slice::from_raw_parts(input as *const u8, inlen as usize);
        let cert = if ectx.contains(ExtensionContext::TLS1_3_CERTIFICATE) { Some((chainidx, X509Ref::from_ptr(x))) } else { None };
        match callback(ssl, ectx, slice, cert) {
            Ok(()) => 1,
            Err(alert) => {
                *al = alert.0;
                0
            }
        }
    }
}
Loading