summaryrefslogtreecommitdiff
path: root/src/sbearssl/sbearssl_s6tlsd.c
diff options
context:
space:
mode:
authorLaurent Bercot <ska-skaware@skarnet.org>2020-11-20 23:24:29 +0000
committerLaurent Bercot <ska-skaware@skarnet.org>2020-11-20 23:24:29 +0000
commit5715c21a077ee1c2fe8957cb4adcea14fd2eda6b (patch)
treecf3e992dce2d426727b535703b0b73dbafb41dbb /src/sbearssl/sbearssl_s6tlsd.c
parent1fea1f6ed53cae7f752c9a78271c7c8367b0ad03 (diff)
downloads6-networking-5715c21a077ee1c2fe8957cb4adcea14fd2eda6b.tar.xz
Refactor tls code to support ucspi-tls
That includes: - new architecture: the tls binary is now a child of the app instead of the other way around - the sbearssl_run engine now takes a post-handshake callback. This allows s6-tlsc and s6-tlsd to only exec into the app when the handshake succeeds (which was already the case with libressl). - new binaries s6-tlsc-io and s6-tlsd-io encapsulate the crypto code; they init and run the engine, connecting to 4 already open fds (stdin/stdout = network, argv[1] and argv[2] = local) - s6-tlsc is now a simple wrapper around s6-tlsc-io - s6-tlsd is now a simple wrapper around s6-tlsd-io - new binary: s6-ucspitlsd, which is also a wrapper around s6-tlsd-io, but differently: the parent execs the app which should be ucspi-tls-aware, the child waits for a command from the parent and execs into s6-tlsd-io if it receives it.
Diffstat (limited to 'src/sbearssl/sbearssl_s6tlsd.c')
-rw-r--r--src/sbearssl/sbearssl_s6tlsd.c112
1 files changed, 0 insertions, 112 deletions
diff --git a/src/sbearssl/sbearssl_s6tlsd.c b/src/sbearssl/sbearssl_s6tlsd.c
deleted file mode 100644
index 6c3d163..0000000
--- a/src/sbearssl/sbearssl_s6tlsd.c
+++ /dev/null
@@ -1,112 +0,0 @@
-/* ISC license. */
-
-#include <unistd.h>
-#include <errno.h>
-#include <bearssl.h>
-#include <skalibs/strerr2.h>
-#include <skalibs/env.h>
-#include <skalibs/stralloc.h>
-#include <skalibs/genalloc.h>
-#include <skalibs/djbunix.h>
-#include <skalibs/random.h>
-#include <s6-networking/sbearssl.h>
-#include "sbearssl-internal.h"
-
-int sbearssl_s6tlsd (char const *const *argv, char const *const *envp, tain_t const *tto, uint32_t preoptions, uint32_t options, uid_t uid, gid_t gid, unsigned int verbosity)
-{
- int fds[5] = { 0, 1, 0, 1 } ;
- stralloc storage = STRALLOC_ZERO ;
- sbearssl_skey skey ;
- genalloc certs = GENALLOC_ZERO ;
- size_t chainlen ;
- pid_t pid ;
-
- if (preoptions & 1)
- strerr_dief1x(100, "client certificates are not supported yet") ;
-
- {
- char const *x = env_get2(envp, "KEYFILE") ;
- int r ;
- if (!x) strerr_dienotset(100, "KEYFILE") ;
- r = sbearssl_skey_readfile(x, &skey, &storage) ;
- if (r < 0)
- strerr_diefu2sys(111, "read private key in ", x) ;
- else if (r)
- strerr_diefu4x(96, "decode private key in ", x, ": ", sbearssl_error_str(r)) ;
-
- x = env_get2(envp, "CERTFILE") ;
- if (!x) strerr_dienotset(100, "CERTFILE") ;
- r = sbearssl_cert_readbigpem(x, &certs, &storage) ;
- if (r < 0)
- strerr_diefu2sys(111, "read certificate chain in ", x) ;
- else if (r)
- strerr_diefu4sys(96, "read certificate chain in ", x, ": ", sbearssl_error_str(r)) ;
- chainlen = genalloc_len(sbearssl_cert, &certs) ;
- if (!chainlen)
- strerr_diefu2x(96, "find a certificate in ", x) ;
- }
-
- if (!random_init()) strerr_diefu1sys(111, "initialize random generator") ;
-
- pid = sbearssl_prep_spawn_drop(argv, envp, fds, uid, gid, !!(preoptions & 2)) ;
-
- {
- unsigned char buf[BR_SSL_BUFSIZE_BIDI] ;
- br_ssl_server_context sc ;
- union br_skey_u key ;
- br_x509_certificate chain[chainlen] ;
- size_t i = chainlen ;
- int wstat ;
-
- stralloc_shrink(&storage) ;
- while (i--)
- sbearssl_cert_to(genalloc_s(sbearssl_cert, &certs) + i, chain + i, storage.s) ;
- genalloc_free(sbearssl_cert, &certs) ;
-
- switch (skey.type)
- {
- case BR_KEYTYPE_RSA :
- sbearssl_rsa_skey_to(&skey.data.rsa, &key.rsa, storage.s) ;
- br_ssl_server_init_full_rsa(&sc, chain, chainlen, &key.rsa) ;
- break ;
- case BR_KEYTYPE_EC :
- {
- int kt, r ;
- sbearssl_ec_skey_to(&skey.data.ec, &key.ec, storage.s) ;
- r = sbearssl_ec_issuer_keytype(&kt, &chain[0]) ;
- switch (r)
- {
- case -2 : strerr_dief1x(96, "certificate issuer key type not recognized") ;
- case -1 : strerr_diefu1sys(111, "get certificate issuer key type") ;
- case 0 : break ;
- default : strerr_diefu3x(96, "get certificate issuer key type", ": ", sbearssl_error_str(r)) ;
- }
- br_ssl_server_init_full_ec(&sc, chain, chainlen, kt, &key.ec) ;
- break ;
- }
- default :
- strerr_dief1x(96, "unsupported private key type") ;
- }
-
- {
- uint32_t flags = BR_OPT_ENFORCE_SERVER_PREFERENCES | BR_OPT_NO_RENEGOTIATION ;
- if (preoptions & 1)
- {
- /* br_ssl_server_set_trust_anchor_names(&sc, x500names, x500n) ; */
- if (!(preoptions & 4)) flags |= BR_OPT_TOLERATE_NO_CLIENT_AUTH ;
- }
- br_ssl_engine_add_flags(&sc.eng, flags) ;
- }
-
- random_string((char *)buf, 32) ;
- br_ssl_engine_inject_entropy(&sc.eng, buf, 32) ;
- random_finish() ;
- br_ssl_engine_set_buffer(&sc.eng, buf, sizeof(buf), 1) ;
- br_ssl_server_reset(&sc) ;
- tain_now_g() ;
-
- wstat = sbearssl_run(&sc.eng, fds, pid, verbosity, options, tto) ;
- if (wstat < 0 && wait_pid(pid, &wstat) < 0) strerr_diefu1sys(111, "wait_pid") ;
- return wait_estatus(wstat) ;
- }
-}