s_server.c 111.8 KB
Newer Older
R
Rich Salz 已提交
1 2
/*
 * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
3
 *
R
Rich Salz 已提交
4 5 6 7
 * Licensed under the OpenSSL license (the "License").  You may not use
 * this file except in compliance with the License.  You can obtain a copy
 * in the file LICENSE in the source distribution or at
 * https://www.openssl.org/source/license.html
8
 */
R
Rich Salz 已提交
9

B
Bodo Möller 已提交
10 11
/* ====================================================================
 * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
12
 * ECC cipher suite support in OpenSSL originally developed by
B
Bodo Möller 已提交
13 14
 * SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
 */
15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
/* ====================================================================
 * Copyright 2005 Nokia. All rights reserved.
 *
 * The portions of the attached software ("Contribution") is developed by
 * Nokia Corporation and is licensed pursuant to the OpenSSL open source
 * license.
 *
 * The Contribution, originally written by Mika Kousa and Pasi Eronen of
 * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
 * support (see RFC 4279) to OpenSSL.
 *
 * No patent licenses or other rights except those expressly stated in
 * the OpenSSL open source license shall be deemed granted or received
 * expressly, by implication, estoppel, or otherwise.
 *
 * No assurances are provided by Nokia that the Contribution does not
 * infringe the patent or other intellectual property rights of any third
 * party or that the license provides you with all the necessary rights
 * to make use of the Contribution.
 *
 * THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN
 * ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA
 * SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY
 * OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR
 * OTHERWISE.
 */
41

42
#include <ctype.h>
U
Ulf Möller 已提交
43 44 45
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
F
FdaSilvaYY 已提交
46 47 48 49
#if defined(_WIN32)
/* Included before async.h to avoid some warnings */
# include <windows.h>
#endif
R
Richard Levitte 已提交
50

51
#include <openssl/e_os2.h>
F
FdaSilvaYY 已提交
52 53
#include <openssl/async.h>
#include <openssl/ssl.h>
U
Ulf Möller 已提交
54

M
Matt Caswell 已提交
55 56
#ifndef OPENSSL_NO_SOCK

57 58 59 60 61 62
/*
 * With IPv6, it looks like Digital has mixed up the proper order of
 * recursive header file inclusion, resulting in the compiler complaining
 * that u_int isn't defined, but only if _POSIX_C_SOURCE is defined, which is
 * needed to have fileno() declared correctly...  So let's define u_int
 */
63
#if defined(OPENSSL_SYS_VMS_DECC) && !defined(__U_INT)
64
# define __U_INT
U
Ulf Möller 已提交
65 66 67
typedef unsigned int u_int;
#endif

68 69
#include <openssl/lhash.h>
#include <openssl/bn.h>
70 71
#define USE_SOCKETS
#include "apps.h"
72 73 74 75
#include <openssl/err.h>
#include <openssl/pem.h>
#include <openssl/x509.h>
#include <openssl/ssl.h>
76
#include <openssl/rand.h>
77
#include <openssl/ocsp.h>
N
make  
Nils Larsch 已提交
78
#ifndef OPENSSL_NO_DH
79
# include <openssl/dh.h>
N
make  
Nils Larsch 已提交
80 81
#endif
#ifndef OPENSSL_NO_RSA
82
# include <openssl/rsa.h>
N
make  
Nils Larsch 已提交
83
#endif
B
Ben Laurie 已提交
84
#ifndef OPENSSL_NO_SRP
85
# include <openssl/srp.h>
B
Ben Laurie 已提交
86
#endif
87
#include "s_apps.h"
B
Ben Laurie 已提交
88
#include "timeouts.h"
89 90 91
#ifdef CHARSET_EBCDIC
#include <openssl/ebcdic.h>
#endif
92

93
static int not_resumable_sess_cb(SSL *s, int is_forward_secure);
M
Matt Caswell 已提交
94 95 96
static int sv_body(int s, int stype, int prot, unsigned char *context);
static int www_body(int s, int stype, int prot, unsigned char *context);
static int rev_body(int s, int stype, int prot, unsigned char *context);
97
static void close_accept_socket(void);
98
static int init_ssl_connection(SSL *s);
99
static void print_stats(BIO *bp, SSL_CTX *ctx);
100
static int generate_session_id(const SSL *ssl, unsigned char *id,
101
                               unsigned int *id_len);
102 103
static void init_session_cache_ctx(SSL_CTX *sctx);
static void free_sessions(void);
104
#ifndef OPENSSL_NO_DH
N
Nils Larsch 已提交
105
static DH *load_dh_param(const char *dhfile);
106
#endif
107
static void print_connection_info(SSL *con);
B
Bodo Möller 已提交
108

F
FdaSilvaYY 已提交
109
static const int bufsize = 16 * 1024;
110
static int accept_socket = -1;
111

112
#define TEST_CERT       "server.pem"
113
#define TEST_CERT2      "server2.pem"
114

115 116
static int s_nbio = 0;
static int s_nbio_test = 0;
117
static int s_crlf = 0;
118 119 120
static SSL_CTX *ctx = NULL;
static SSL_CTX *ctx2 = NULL;
static int www = 0;
121

122
static BIO *bio_s_out = NULL;
123
static BIO *bio_s_msg = NULL;
124 125 126 127 128 129
static int s_debug = 0;
static int s_tlsextdebug = 0;
static int s_msg = 0;
static int s_quiet = 0;
static int s_ign_eof = 0;
static int s_brief = 0;
130

131 132
static char *keymatexportlabel = NULL;
static int keymatexportlen = 20;
B
Ben Laurie 已提交
133

134 135
static int async = 0;

136
static const char *session_id_prefix = NULL;
137

B
Ben Laurie 已提交
138
#ifndef OPENSSL_NO_DTLS
B
Ben Laurie 已提交
139
static int enable_timeouts = 0;
B
Bodo Möller 已提交
140
static long socket_mtu;
141
#endif
B
Ben Laurie 已提交
142

M
Matt Caswell 已提交
143 144 145 146 147 148
/*
 * We define this but make it always be 0 in no-dtls builds to simplify the
 * code.
 */
static int dtlslisten = 0;

M
Matt Caswell 已提交
149 150
static int early_data = 0;

151
#ifndef OPENSSL_NO_PSK
152
static char *psk_identity = "Client_identity";
153
char *psk_key = NULL;           /* by default PSK is not used */
154 155

static unsigned int psk_server_cb(SSL *ssl, const char *identity,
156 157 158
                                  unsigned char *psk,
                                  unsigned int max_psk_len)
{
159 160
    long key_len = 0;
    unsigned char *key;
161 162 163 164 165 166 167 168 169

    if (s_debug)
        BIO_printf(bio_s_out, "psk_server_cb\n");
    if (!identity) {
        BIO_printf(bio_err, "Error: client did not send PSK identity\n");
        goto out_err;
    }
    if (s_debug)
        BIO_printf(bio_s_out, "identity_len=%d identity=%s\n",
M
Matt Caswell 已提交
170
                   (int)strlen(identity), identity);
171 172 173

    /* here we could lookup the given identity e.g. from a database */
    if (strcmp(identity, psk_identity) != 0) {
174
        BIO_printf(bio_s_out, "PSK warning: client identity not what we expected"
175
                   " (got '%s' expected '%s')\n", identity, psk_identity);
176 177
    } else {
      if (s_debug)
178
        BIO_printf(bio_s_out, "PSK client identity found\n");
179
    }
180 181

    /* convert the PSK key to binary */
182 183 184
    key = OPENSSL_hexstr2buf(psk_key, &key_len);
    if (key == NULL) {
        BIO_printf(bio_err, "Could not convert PSK key '%s' to buffer\n",
185 186 187
                   psk_key);
        return 0;
    }
188
    if (key_len > (int)max_psk_len) {
189
        BIO_printf(bio_err,
190 191 192
                   "psk buffer of callback is too small (%d) for key (%ld)\n",
                   max_psk_len, key_len);
        OPENSSL_free(key);
193 194 195
        return 0;
    }

196 197
    memcpy(psk, key, key_len);
    OPENSSL_free(key);
198 199

    if (s_debug)
200 201
        BIO_printf(bio_s_out, "fetched PSK len=%ld\n", key_len);
    return key_len;
202
 out_err:
203 204
    if (s_debug)
        BIO_printf(bio_err, "Error in PSK server callback\n");
R
Rich Salz 已提交
205 206
    (void)BIO_flush(bio_err);
    (void)BIO_flush(bio_s_out);
207 208
    return 0;
}
209
#endif
B
Ben Laurie 已提交
210

B
Ben Laurie 已提交
211 212
#ifndef OPENSSL_NO_SRP
/* This is a context that we pass to callbacks */
213 214 215 216 217 218 219 220 221 222 223 224 225 226
typedef struct srpsrvparm_st {
    char *login;
    SRP_VBASE *vb;
    SRP_user_pwd *user;
} srpsrvparm;

/*
 * This callback pretends to require some asynchronous logic in order to
 * obtain a verifier. When the callback is called for a new connection we
 * return with a negative value. This will provoke the accept etc to return
 * with an LOOKUP_X509. The main logic of the reinvokes the suspended call
 * (which would normally occur after a worker has finished) and we set the
 * user parameters.
 */
R
Rich Salz 已提交
227
static int ssl_srp_server_param_cb(SSL *s, int *ad, void *arg)
228 229
{
    srpsrvparm *p = (srpsrvparm *) arg;
230 231
    int ret = SSL3_AL_FATAL;

232 233 234 235 236 237 238 239
    if (p->login == NULL && p->user == NULL) {
        p->login = SSL_get_srp_username(s);
        BIO_printf(bio_err, "SRP username = \"%s\"\n", p->login);
        return (-1);
    }

    if (p->user == NULL) {
        BIO_printf(bio_err, "User %s doesn't exist\n", p->login);
240
        goto err;
241
    }
242

243 244 245 246
    if (SSL_set_srp_server_param
        (s, p->user->N, p->user->g, p->user->s, p->user->v,
         p->user->info) < 0) {
        *ad = SSL_AD_INTERNAL_ERROR;
247
        goto err;
248 249 250 251
    }
    BIO_printf(bio_err,
               "SRP parameters set: username = \"%s\" info=\"%s\" \n",
               p->login, p->user->info);
252 253
    ret = SSL_ERROR_NONE;

F
FdaSilvaYY 已提交
254
 err:
255
    SRP_user_pwd_free(p->user);
256 257
    p->user = NULL;
    p->login = NULL;
258
    return ret;
259
}
B
Ben Laurie 已提交
260 261 262

#endif

263
static int local_argc = 0;
264 265
static char **local_argv;

266 267 268 269
#ifdef CHARSET_EBCDIC
static int ebcdic_new(BIO *bi);
static int ebcdic_free(BIO *a);
static int ebcdic_read(BIO *b, char *out, int outl);
B
Bodo Möller 已提交
270 271
static int ebcdic_write(BIO *b, const char *in, int inl);
static long ebcdic_ctrl(BIO *b, int cmd, long num, void *ptr);
272
static int ebcdic_gets(BIO *bp, char *buf, int size);
B
Bodo Möller 已提交
273
static int ebcdic_puts(BIO *bp, const char *str);
274

275
# define BIO_TYPE_EBCDIC_FILTER  (18|0x0200)
276
static BIO_METHOD *methods_ebcdic = NULL;
277

R
Rich Salz 已提交
278
/* This struct is "unwarranted chumminess with the compiler." */
279 280 281
typedef struct {
    size_t alloced;
    char buff[1];
282 283
} EBCDIC_OUTBUFF;

284
static const BIO_METHOD *BIO_f_ebcdic_filter()
285
{
286 287
    if (methods_ebcdic == NULL) {
        methods_ebcdic = BIO_meth_new(BIO_TYPE_EBCDIC_FILTER,
F
FdaSilvaYY 已提交
288 289
                                      "EBCDIC/ASCII filter");
        if (methods_ebcdic == NULL
290 291 292 293 294 295 296 297 298 299
            || !BIO_meth_set_write(methods_ebcdic, ebcdic_write)
            || !BIO_meth_set_read(methods_ebcdic, ebcdic_read)
            || !BIO_meth_set_puts(methods_ebcdic, ebcdic_puts)
            || !BIO_meth_set_gets(methods_ebcdic, ebcdic_gets)
            || !BIO_meth_set_ctrl(methods_ebcdic, ebcdic_ctrl)
            || !BIO_meth_set_create(methods_ebcdic, ebcdic_new)
            || !BIO_meth_set_destroy(methods_ebcdic, ebcdic_free))
            return NULL;
    }
    return methods_ebcdic;
300 301 302 303
}

static int ebcdic_new(BIO *bi)
{
304
    EBCDIC_OUTBUFF *wbuf;
305

R
Rich Salz 已提交
306
    wbuf = app_malloc(sizeof(*wbuf) + 1024, "ebcdic wbuf");
307 308
    wbuf->alloced = 1024;
    wbuf->buff[0] = '\0';
309

310 311 312
    BIO_set_data(bi, wbuf);
    BIO_set_init(bi, 1);
    return 1;
313 314 315 316
}

static int ebcdic_free(BIO *a)
{
317 318
    EBCDIC_OUTBUFF *wbuf;

319
    if (a == NULL)
320 321 322 323 324 325 326
        return 0;
    wbuf = BIO_get_data(a);
    OPENSSL_free(wbuf);
    BIO_set_data(a, NULL);
    BIO_set_init(a, 0);

    return 1;
327
}
328

329 330
static int ebcdic_read(BIO *b, char *out, int outl)
{
331
    int ret = 0;
332
    BIO *next = BIO_next(b);
333

334 335
    if (out == NULL || outl == 0)
        return (0);
336
    if (next == NULL)
337
        return (0);
338

339
    ret = BIO_read(next, out, outl);
340 341
    if (ret > 0)
        ascii2ebcdic(out, out, ret);
342
    return ret;
343 344
}

B
Bodo Möller 已提交
345
static int ebcdic_write(BIO *b, const char *in, int inl)
346
{
347
    EBCDIC_OUTBUFF *wbuf;
348
    BIO *next = BIO_next(b);
349 350
    int ret = 0;
    int num;
351

352 353
    if ((in == NULL) || (inl <= 0))
        return (0);
354 355
    if (next == NULL)
        return 0;
356

357
    wbuf = (EBCDIC_OUTBUFF *) BIO_get_data(b);
358

359 360 361 362
    if (inl > (num = wbuf->alloced)) {
        num = num + num;        /* double the size */
        if (num < inl)
            num = inl;
363
        OPENSSL_free(wbuf);
R
Rich Salz 已提交
364
        wbuf = app_malloc(sizeof(*wbuf) + num, "grow ebcdic wbuf");
365

366 367
        wbuf->alloced = num;
        wbuf->buff[0] = '\0';
368

369
        BIO_set_data(b, wbuf);
370
    }
371

372
    ebcdic2ascii(wbuf->buff, in, inl);
373

374
    ret = BIO_write(next, wbuf->buff, inl);
375

376
    return (ret);
377 378
}

B
Bodo Möller 已提交
379
static long ebcdic_ctrl(BIO *b, int cmd, long num, void *ptr)
380
{
381
    long ret;
382
    BIO *next = BIO_next(b);
383

384
    if (next == NULL)
385 386 387 388 389 390
        return (0);
    switch (cmd) {
    case BIO_CTRL_DUP:
        ret = 0L;
        break;
    default:
391
        ret = BIO_ctrl(next, cmd, num, ptr);
392 393 394
        break;
    }
    return (ret);
395 396 397 398
}

static int ebcdic_gets(BIO *bp, char *buf, int size)
{
399
    int i, ret = 0;
400 401 402 403
    BIO *next = BIO_next(bp);

    if (next == NULL)
        return 0;
404 405 406 407 408 409 410 411 412 413 414 415 416
/*      return(BIO_gets(bp->next_bio,buf,size));*/
    for (i = 0; i < size - 1; ++i) {
        ret = ebcdic_read(bp, &buf[i], 1);
        if (ret <= 0)
            break;
        else if (buf[i] == '\n') {
            ++i;
            break;
        }
    }
    if (i < size)
        buf[i] = '\0';
    return (ret < 0 && i == 0) ? ret : i;
417 418
}

B
Bodo Möller 已提交
419
static int ebcdic_puts(BIO *bp, const char *str)
420
{
421 422
    if (BIO_next(bp) == NULL)
        return 0;
423
    return ebcdic_write(bp, str, strlen(str));
424 425 426
}
#endif

427 428
/* This is a context that we pass to callbacks */
typedef struct tlsextctx_st {
429 430 431
    char *servername;
    BIO *biodebug;
    int extension_error;
432 433
} tlsextctx;

R
Rich Salz 已提交
434
static int ssl_servername_cb(SSL *s, int *ad, void *arg)
435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453
{
    tlsextctx *p = (tlsextctx *) arg;
    const char *servername = SSL_get_servername(s, TLSEXT_NAMETYPE_host_name);
    if (servername && p->biodebug)
        BIO_printf(p->biodebug, "Hostname in TLS extension: \"%s\"\n",
                   servername);

    if (!p->servername)
        return SSL_TLSEXT_ERR_NOACK;

    if (servername) {
        if (strcasecmp(servername, p->servername))
            return p->extension_error;
        if (ctx2) {
            BIO_printf(p->biodebug, "Switching server context.\n");
            SSL_set_SSL_CTX(s, ctx2);
        }
    }
    return SSL_TLSEXT_ERR_OK;
454
}
455 456 457

/* Structure passed to cert status callback */
typedef struct tlsextstatusctx_st {
458
    int timeout;
459 460
    /* File to load OCSP Response from (or NULL if no file) */
    char *respin;
461 462 463 464
    /* Default responder to use */
    char *host, *path, *port;
    int use_ssl;
    int verbose;
465 466
} tlsextstatusctx;

467
static tlsextstatusctx tlscstatp = { -1 };
468

M
Matt Caswell 已提交
469
#ifndef OPENSSL_NO_OCSP
470

471
/*
472 473 474 475 476
 * Helper function to get an OCSP_RESPONSE from a responder. This is a
 * simplified version. It examines certificates each time and makes one OCSP
 * responder query for each request. A full version would store details such as
 * the OCSP certificate IDs and minimise the number of OCSP responses by caching
 * them until they were considered "expired".
477
 */
478 479
static int get_ocsp_resp_from_responder(SSL *s, tlsextstatusctx *srctx,
                                        OCSP_RESPONSE **resp)
480
{
481
    char *host = NULL, *port = NULL, *path = NULL;
482 483 484
    int use_ssl;
    STACK_OF(OPENSSL_STRING) *aia = NULL;
    X509 *x = NULL;
R
Rich Salz 已提交
485 486
    X509_STORE_CTX *inctx = NULL;
    X509_OBJECT *obj;
487 488 489 490 491
    OCSP_REQUEST *req = NULL;
    OCSP_CERTID *id = NULL;
    STACK_OF(X509_EXTENSION) *exts;
    int ret = SSL_TLSEXT_ERR_NOACK;
    int i;
492

493 494 495 496 497 498
    /* Build up OCSP query from server certificate */
    x = SSL_get_certificate(s);
    aia = X509_get1_ocsp(x);
    if (aia) {
        if (!OCSP_parse_url(sk_OPENSSL_STRING_value(aia, 0),
                            &host, &port, &path, &use_ssl)) {
499
            BIO_puts(bio_err, "cert_status: can't parse AIA URL\n");
500 501 502
            goto err;
        }
        if (srctx->verbose)
503
            BIO_printf(bio_err, "cert_status: AIA URL: %s\n",
504 505 506
                       sk_OPENSSL_STRING_value(aia, 0));
    } else {
        if (!srctx->host) {
507
            BIO_puts(bio_err,
508 509 510 511 512 513 514 515 516
                     "cert_status: no AIA and no default responder URL\n");
            goto done;
        }
        host = srctx->host;
        path = srctx->path;
        port = srctx->port;
        use_ssl = srctx->use_ssl;
    }

R
Rich Salz 已提交
517 518 519 520
    inctx = X509_STORE_CTX_new();
    if (inctx == NULL)
        goto err;
    if (!X509_STORE_CTX_init(inctx,
521 522 523
                             SSL_CTX_get_cert_store(SSL_get_SSL_CTX(s)),
                             NULL, NULL))
        goto err;
R
Rich Salz 已提交
524 525
    obj = X509_STORE_CTX_get_obj_by_subject(inctx, X509_LU_X509,
                                            X509_get_issuer_name(x));
R
Rich Salz 已提交
526
    if (obj == NULL) {
527
        BIO_puts(bio_err, "cert_status: Can't retrieve issuer certificate.\n");
528 529
        goto done;
    }
R
Rich Salz 已提交
530 531
    id = OCSP_cert_to_id(NULL, x, X509_OBJECT_get0_X509(obj));
    X509_OBJECT_free(obj);
532 533
    if (!id)
        goto err;
534 535 536
    req = OCSP_REQUEST_new();
    if (req == NULL)
        goto err;
537 538 539 540 541 542 543 544 545 546
    if (!OCSP_request_add0_id(req, id))
        goto err;
    id = NULL;
    /* Add any extensions to the request */
    SSL_get_tlsext_status_exts(s, &exts);
    for (i = 0; i < sk_X509_EXTENSION_num(exts); i++) {
        X509_EXTENSION *ext = sk_X509_EXTENSION_value(exts, i);
        if (!OCSP_REQUEST_add_ext(req, ext, -1))
            goto err;
    }
547
    *resp = process_responder(req, host, path, port, use_ssl, NULL,
548
                             srctx->timeout);
549
    if (*resp == NULL) {
550
        BIO_puts(bio_err, "cert_status: error querying responder\n");
551 552
        goto done;
    }
553

554
    ret = SSL_TLSEXT_ERR_OK;
R
Rich Salz 已提交
555 556 557 558
    goto done;

 err:
    ret = SSL_TLSEXT_ERR_ALERT_FATAL;
559
 done:
560 561 562 563
    /*
     * If we parsed aia we need to free; otherwise they were copied and we
     * don't
     */
564
    if (aia != NULL) {
565 566 567 568 569
        OPENSSL_free(host);
        OPENSSL_free(path);
        OPENSSL_free(port);
        X509_email_free(aia);
    }
R
Rich Salz 已提交
570 571
    OCSP_CERTID_free(id);
    OCSP_REQUEST_free(req);
R
Rich Salz 已提交
572
    X509_STORE_CTX_free(inctx);
573 574
    return ret;
}
575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599

/*
 * Certificate Status callback. This is called when a client includes a
 * certificate status request extension. The response is either obtained from a
 * file, or from an OCSP responder.
 */
static int cert_status_cb(SSL *s, void *arg)
{
    tlsextstatusctx *srctx = arg;
    OCSP_RESPONSE *resp = NULL;
    unsigned char *rspder = NULL;
    int rspderlen;
    int ret = SSL_TLSEXT_ERR_ALERT_FATAL;

    if (srctx->verbose)
        BIO_puts(bio_err, "cert_status: callback called\n");

    if (srctx->respin != NULL) {
        BIO *derbio = bio_open_default(srctx->respin, 'r', FORMAT_ASN1);
        if (derbio == NULL) {
            BIO_puts(bio_err, "cert_status: Cannot open OCSP response file\n");
            goto err;
        }
        resp = d2i_OCSP_RESPONSE_bio(derbio, NULL);
        BIO_free(derbio);
600
        if (resp == NULL) {
601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629
            BIO_puts(bio_err, "cert_status: Error reading OCSP response\n");
            goto err;
        }
    } else {
        ret = get_ocsp_resp_from_responder(s, srctx, &resp);
        if (ret != SSL_TLSEXT_ERR_OK)
            goto err;
    }

    rspderlen = i2d_OCSP_RESPONSE(resp, &rspder);
    if (rspderlen <= 0)
        goto err;

    SSL_set_tlsext_status_ocsp_resp(s, rspder, rspderlen);
    if (srctx->verbose) {
        BIO_puts(bio_err, "cert_status: ocsp response sent:\n");
        OCSP_RESPONSE_print(bio_err, resp, 2);
    }

    ret = SSL_TLSEXT_ERR_OK;

 err:
    if (ret != SSL_TLSEXT_ERR_OK)
        ERR_print_errors(bio_err);

    OCSP_RESPONSE_free(resp);

    return ret;
}
M
Matt Caswell 已提交
630
#endif
B
Ben Laurie 已提交
631

632
#ifndef OPENSSL_NO_NEXTPROTONEG
B
Ben Laurie 已提交
633 634
/* This is the context that we pass to next_proto_cb */
typedef struct tlsextnextprotoctx_st {
635
    unsigned char *data;
636
    size_t len;
B
Ben Laurie 已提交
637 638
} tlsextnextprotoctx;

639 640 641 642
static int next_proto_cb(SSL *s, const unsigned char **data,
                         unsigned int *len, void *arg)
{
    tlsextnextprotoctx *next_proto = arg;
B
Ben Laurie 已提交
643

644 645
    *data = next_proto->data;
    *len = next_proto->len;
B
Ben Laurie 已提交
646

647 648
    return SSL_TLSEXT_ERR_OK;
}
649
#endif                         /* ndef OPENSSL_NO_NEXTPROTONEG */
A
Adam Langley 已提交
650 651 652

/* This the context that we pass to alpn_cb */
typedef struct tlsextalpnctx_st {
653
    unsigned char *data;
T
Todd Short 已提交
654
    size_t len;
A
Adam Langley 已提交
655 656
} tlsextalpnctx;

657 658 659 660 661 662 663
static int alpn_cb(SSL *s, const unsigned char **out, unsigned char *outlen,
                   const unsigned char *in, unsigned int inlen, void *arg)
{
    tlsextalpnctx *alpn_ctx = arg;

    if (!s_quiet) {
        /* We can assume that |in| is syntactically valid. */
T
Todd Short 已提交
664
        unsigned int i;
665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688
        BIO_printf(bio_s_out, "ALPN protocols advertised by the client: ");
        for (i = 0; i < inlen;) {
            if (i)
                BIO_write(bio_s_out, ", ", 2);
            BIO_write(bio_s_out, &in[i + 1], in[i]);
            i += in[i] + 1;
        }
        BIO_write(bio_s_out, "\n", 1);
    }

    if (SSL_select_next_proto
        ((unsigned char **)out, outlen, alpn_ctx->data, alpn_ctx->len, in,
         inlen) != OPENSSL_NPN_NEGOTIATED) {
        return SSL_TLSEXT_ERR_NOACK;
    }

    if (!s_quiet) {
        BIO_printf(bio_s_out, "ALPN protocols selected: ");
        BIO_write(bio_s_out, *out, *outlen);
        BIO_write(bio_s_out, "\n", 1);
    }

    return SSL_TLSEXT_ERR_OK;
}
689

690
static int not_resumable_sess_cb(SSL *s, int is_forward_secure)
691 692 693 694
{
    /* disable resumption for sessions with forward secure ciphers */
    return is_forward_secure;
}
695

D
Dr. Stephen Henson 已提交
696
#ifndef OPENSSL_NO_SRP
697
static srpsrvparm srp_callback_parm;
D
Dr. Stephen Henson 已提交
698
#endif
P
Piotr Sikora 已提交
699
#ifndef OPENSSL_NO_SRTP
B
Ben Laurie 已提交
700
static char *srtp_profiles = NULL;
P
Piotr Sikora 已提交
701
#endif
B
Ben Laurie 已提交
702

703
typedef enum OPTION_choice {
704 705
    OPT_ERR = -1, OPT_EOF = 0, OPT_HELP, OPT_ENGINE,
    OPT_4, OPT_6, OPT_ACCEPT, OPT_PORT, OPT_UNIX, OPT_UNLINK, OPT_NACCEPT,
706
    OPT_VERIFY, OPT_NAMEOPT, OPT_UPPER_V_VERIFY, OPT_CONTEXT, OPT_CERT, OPT_CRL,
707 708 709
    OPT_CRL_DOWNLOAD, OPT_SERVERINFO, OPT_CERTFORM, OPT_KEY, OPT_KEYFORM,
    OPT_PASS, OPT_CERT_CHAIN, OPT_DHPARAM, OPT_DCERTFORM, OPT_DCERT,
    OPT_DKEYFORM, OPT_DPASS, OPT_DKEY, OPT_DCERT_CHAIN, OPT_NOCERT,
710
    OPT_CAPATH, OPT_NOCAPATH, OPT_CHAINCAPATH, OPT_VERIFYCAPATH, OPT_NO_CACHE,
711
    OPT_EXT_CACHE, OPT_CRLFORM, OPT_VERIFY_RET_ERROR, OPT_VERIFY_QUIET,
712 713 714
    OPT_BUILD_CHAIN, OPT_CAFILE, OPT_NOCAFILE, OPT_CHAINCAFILE,
    OPT_VERIFYCAFILE, OPT_NBIO, OPT_NBIO_TEST, OPT_IGN_EOF, OPT_NO_IGN_EOF,
    OPT_DEBUG, OPT_TLSEXTDEBUG, OPT_STATUS, OPT_STATUS_VERBOSE,
715 716 717
    OPT_STATUS_TIMEOUT, OPT_STATUS_URL, OPT_STATUS_FILE, OPT_MSG, OPT_MSGFILE,
    OPT_TRACE, OPT_SECURITY_DEBUG, OPT_SECURITY_DEBUG_VERBOSE, OPT_STATE,
    OPT_CRLF, OPT_QUIET, OPT_BRIEF, OPT_NO_DHE,
718
    OPT_NO_RESUME_EPHEMERAL, OPT_PSK_IDENTITY, OPT_PSK_HINT, OPT_PSK, OPT_SRPVFILE,
719
    OPT_SRPUSERSEED, OPT_REV, OPT_WWW, OPT_UPPER_WWW, OPT_HTTP, OPT_ASYNC,
720
    OPT_SSL_CONFIG,
721
    OPT_MAX_SEND_FRAG, OPT_SPLIT_SEND_FRAG, OPT_MAX_PIPELINES, OPT_READ_BUF,
722
    OPT_SSL3, OPT_TLS1_3, OPT_TLS1_2, OPT_TLS1_1, OPT_TLS1, OPT_DTLS, OPT_DTLS1,
M
Matt Caswell 已提交
723
    OPT_DTLS1_2, OPT_SCTP, OPT_TIMEOUT, OPT_MTU, OPT_LISTEN,
724
    OPT_ID_PREFIX, OPT_RAND, OPT_SERVERNAME, OPT_SERVERNAME_FATAL,
R
Rich Salz 已提交
725
    OPT_CERT2, OPT_KEY2, OPT_NEXTPROTONEG, OPT_ALPN,
726
    OPT_SRTP_PROFILES, OPT_KEYMATEXPORT, OPT_KEYMATEXPORTLEN,
727
    OPT_KEYLOG_FILE, OPT_MAX_EARLY, OPT_EARLY_DATA,
728 729
    OPT_S_ENUM,
    OPT_V_ENUM,
M
Matt Caswell 已提交
730
    OPT_X_ENUM
731 732
} OPTION_CHOICE;

F
FdaSilvaYY 已提交
733
const OPTIONS s_server_options[] = {
734
    {"help", OPT_HELP, '-', "Display this summary"},
735 736
    {"port", OPT_PORT, 'p',
     "TCP/IP port to listen on for connections (default is " PORT ")"},
737
    {"accept", OPT_ACCEPT, 's',
738
     "TCP/IP optional host and port to listen on for connections (default is *:" PORT ")"},
739
#ifdef AF_UNIX
740
    {"unix", OPT_UNIX, 's', "Unix domain socket to accept on"},
741 742 743
#endif
    {"4", OPT_4, '-', "Use IPv4 only"},
    {"6", OPT_6, '-', "Use IPv6 only"},
744
#ifdef AF_UNIX
745
    {"unlink", OPT_UNLINK, '-', "For -unix, unlink existing socket first"},
746
#endif
747 748 749 750 751
    {"context", OPT_CONTEXT, 's', "Set session ID context"},
    {"verify", OPT_VERIFY, 'n', "Turn on peer certificate verification"},
    {"Verify", OPT_UPPER_V_VERIFY, 'n',
     "Turn on peer certificate verification, must have a cert"},
    {"cert", OPT_CERT, '<', "Certificate file to use; default is " TEST_CERT},
752
    {"nameopt", OPT_NAMEOPT, 's', "Various certificate name options"},
F
FdaSilvaYY 已提交
753
    {"naccept", OPT_NACCEPT, 'p', "Terminate after #num connections"},
754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775
    {"serverinfo", OPT_SERVERINFO, 's',
     "PEM serverinfo file for certificate"},
    {"certform", OPT_CERTFORM, 'F',
     "Certificate format (PEM or DER) PEM default"},
    {"key", OPT_KEY, '<',
     "Private Key if not in -cert; default is " TEST_CERT},
    {"keyform", OPT_KEYFORM, 'f',
     "Key format (PEM, DER or ENGINE) PEM default"},
    {"pass", OPT_PASS, 's', "Private key file pass phrase source"},
    {"dcert", OPT_DCERT, '<',
     "Second certificate file to use (usually for DSA)"},
    {"dcertform", OPT_DCERTFORM, 'F',
     "Second certificate format (PEM or DER) PEM default"},
    {"dkey", OPT_DKEY, '<',
     "Second private key file to use (usually for DSA)"},
    {"dkeyform", OPT_DKEYFORM, 'F',
     "Second key format (PEM, DER or ENGINE) PEM default"},
    {"dpass", OPT_DPASS, 's', "Second private key file pass phrase source"},
    {"nbio_test", OPT_NBIO_TEST, '-', "Test with the non-blocking test bio"},
    {"crlf", OPT_CRLF, '-', "Convert LF from terminal into CRLF"},
    {"debug", OPT_DEBUG, '-', "Print more output"},
    {"msg", OPT_MSG, '-', "Show protocol messages"},
776 777
    {"msgfile", OPT_MSGFILE, '>',
     "File to send output of -msg or -trace, instead of stdout"},
778 779
    {"state", OPT_STATE, '-', "Print the SSL states"},
    {"CAfile", OPT_CAFILE, '<', "PEM format file of CA's"},
780 781 782 783 784
    {"CApath", OPT_CAPATH, '/', "PEM format directory of CA's"},
    {"no-CAfile", OPT_NOCAFILE, '-',
     "Do not load the default certificates file"},
    {"no-CApath", OPT_NOCAPATH, '-',
     "Do not load certificates from the default certificates directory"},
785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800
    {"nocert", OPT_NOCERT, '-', "Don't use any certificates (Anon-DH)"},
    {"quiet", OPT_QUIET, '-', "No server output"},
    {"no_resume_ephemeral", OPT_NO_RESUME_EPHEMERAL, '-',
     "Disable caching and tickets if ephemeral (EC)DH is used"},
    {"www", OPT_WWW, '-', "Respond to a 'GET /' with a status page"},
    {"WWW", OPT_UPPER_WWW, '-', "Respond to a 'GET with the file ./path"},
    {"servername", OPT_SERVERNAME, 's',
     "Servername for HostName TLS extension"},
    {"servername_fatal", OPT_SERVERNAME_FATAL, '-',
     "mismatch send fatal alert (default warning alert)"},
    {"cert2", OPT_CERT2, '<',
     "Certificate file to use for servername; default is" TEST_CERT2},
    {"key2", OPT_KEY2, '<',
     "-Private Key file to use for servername if not in -cert2"},
    {"tlsextdebug", OPT_TLSEXTDEBUG, '-',
     "Hex dump of all TLS extensions received"},
F
FdaSilvaYY 已提交
801
    {"HTTP", OPT_HTTP, '-', "Like -WWW but ./path includes HTTP headers"},
802 803 804 805
    {"id_prefix", OPT_ID_PREFIX, 's',
     "Generate SSL/TLS session IDs prefixed by arg"},
    {"rand", OPT_RAND, 's',
     "Load the file(s) into the random number generator"},
806 807 808 809
    {"keymatexport", OPT_KEYMATEXPORT, 's',
     "Export keying material using label"},
    {"keymatexportlen", OPT_KEYMATEXPORTLEN, 'p',
     "Export len bytes of keying material (default 20)"},
810 811 812 813 814 815 816 817 818 819 820 821 822 823
    {"CRL", OPT_CRL, '<', "CRL file to use"},
    {"crl_download", OPT_CRL_DOWNLOAD, '-',
     "Download CRL from distribution points"},
    {"cert_chain", OPT_CERT_CHAIN, '<',
     "certificate chain file in PEM format"},
    {"dcert_chain", OPT_DCERT_CHAIN, '<',
     "second certificate chain file in PEM format"},
    {"chainCApath", OPT_CHAINCAPATH, '/',
     "use dir as certificate store path to build CA certificate chain"},
    {"verifyCApath", OPT_VERIFYCAPATH, '/',
     "use dir as certificate store path to verify CA certificate"},
    {"no_cache", OPT_NO_CACHE, '-', "Disable session cache"},
    {"ext_cache", OPT_EXT_CACHE, '-',
     "Disable internal cache, setup and use external cache"},
F
FdaSilvaYY 已提交
824
    {"CRLform", OPT_CRLFORM, 'F', "CRL format (PEM or DER) PEM is default"},
825 826 827 828 829 830 831 832 833 834 835
    {"verify_return_error", OPT_VERIFY_RET_ERROR, '-',
     "Close connection on verification error"},
    {"verify_quiet", OPT_VERIFY_QUIET, '-',
     "No verify output except verify errors"},
    {"build_chain", OPT_BUILD_CHAIN, '-', "Build certificate chain"},
    {"chainCAfile", OPT_CHAINCAFILE, '<',
     "CA file for certificate chain (PEM format)"},
    {"verifyCAfile", OPT_VERIFYCAFILE, '<',
     "CA file for certificate verification (PEM format)"},
    {"ign_eof", OPT_IGN_EOF, '-', "ignore input eof (default when -quiet)"},
    {"no_ign_eof", OPT_NO_IGN_EOF, '-', "Do not ignore input eof"},
M
Matt Caswell 已提交
836
#ifndef OPENSSL_NO_OCSP
837 838 839 840 841 842
    {"status", OPT_STATUS, '-', "Request certificate status from server"},
    {"status_verbose", OPT_STATUS_VERBOSE, '-',
     "Print more output in certificate status callback"},
    {"status_timeout", OPT_STATUS_TIMEOUT, 'n',
     "Status request responder timeout"},
    {"status_url", OPT_STATUS_URL, 's', "Status request fallback URL"},
843 844
    {"status_file", OPT_STATUS_FILE, '<',
     "File containing DER encoded OCSP Response"},
M
Matt Caswell 已提交
845
#endif
846 847 848 849 850 851 852
#ifndef OPENSSL_NO_SSL_TRACE
    {"trace", OPT_TRACE, '-', "trace protocol messages"},
#endif
    {"security_debug", OPT_SECURITY_DEBUG, '-',
     "Print output from SSL/TLS security framework"},
    {"security_debug_verbose", OPT_SECURITY_DEBUG_VERBOSE, '-',
     "Print more output from SSL/TLS security framework"},
F
FdaSilvaYY 已提交
853
    {"brief", OPT_BRIEF, '-',
854 855 856
     "Restrict output to brief summary of connection parameters"},
    {"rev", OPT_REV, '-',
     "act as a simple test server which just sends back with the received text reversed"},
857
    {"async", OPT_ASYNC, '-', "Operate in asynchronous mode"},
F
FdaSilvaYY 已提交
858
    {"ssl_config", OPT_SSL_CONFIG, 's',
859
     "Configure SSL_CTX using the configuration 'val'"},
860
    {"max_send_frag", OPT_MAX_SEND_FRAG, 'p', "Maximum Size of send frames "},
861
    {"split_send_frag", OPT_SPLIT_SEND_FRAG, 'p',
862
     "Size used to split data for encrypt pipelines"},
863
    {"max_pipelines", OPT_MAX_PIPELINES, 'p',
864
     "Maximum number of encrypt/decrypt pipelines to be used"},
865
    {"read_buf", OPT_READ_BUF, 'p',
866
     "Default read buffer size to be used for connections"},
867 868 869
    OPT_S_OPTIONS,
    OPT_V_OPTIONS,
    OPT_X_OPTIONS,
870 871
    {"nbio", OPT_NBIO, '-', "Use non-blocking IO"},
#ifndef OPENSSL_NO_PSK
872
    {"psk_identity", OPT_PSK_IDENTITY, 's', "PSK identity to expect"},
873 874 875 876 877 878 879 880 881 882 883
    {"psk_hint", OPT_PSK_HINT, 's', "PSK identity hint to use"},
    {"psk", OPT_PSK, 's', "PSK in hex (without 0x)"},
#endif
#ifndef OPENSSL_NO_SRP
    {"srpvfile", OPT_SRPVFILE, '<', "The verifier file for SRP"},
    {"srpuserseed", OPT_SRPUSERSEED, 's',
     "A seed string for a default user salt"},
#endif
#ifndef OPENSSL_NO_SSL3
    {"ssl3", OPT_SSL3, '-', "Just talk SSLv3"},
#endif
884 885 886 887 888 889 890 891 892
#ifndef OPENSSL_NO_TLS1
    {"tls1", OPT_TLS1, '-', "Just talk TLSv1"},
#endif
#ifndef OPENSSL_NO_TLS1_1
    {"tls1_1", OPT_TLS1_1, '-', "Just talk TLSv1.1"},
#endif
#ifndef OPENSSL_NO_TLS1_2
    {"tls1_2", OPT_TLS1_2, '-', "just talk TLSv1.2"},
#endif
893 894 895
#ifndef OPENSSL_NO_TLS1_3
    {"tls1_3", OPT_TLS1_3, '-', "just talk TLSv1.3"},
#endif
896
#ifndef OPENSSL_NO_DTLS
897
    {"dtls", OPT_DTLS, '-', "Use any DTLS version"},
898 899
    {"timeout", OPT_TIMEOUT, '-', "Enable timeouts"},
    {"mtu", OPT_MTU, 'p', "Set link layer MTU"},
900 901
    {"listen", OPT_LISTEN, '-',
     "Listen for a DTLS ClientHello with a cookie and then connect"},
902
#endif
903 904 905 906 907 908
#ifndef OPENSSL_NO_DTLS1
    {"dtls1", OPT_DTLS1, '-', "Just talk DTLSv1"},
#endif
#ifndef OPENSSL_NO_DTLS1_2
    {"dtls1_2", OPT_DTLS1_2, '-', "Just talk DTLSv1.2"},
#endif
M
Matt Caswell 已提交
909 910 911
#ifndef OPENSSL_NO_SCTP
    {"sctp", OPT_SCTP, '-', "Use SCTP"},
#endif
912 913 914 915 916 917 918 919
#ifndef OPENSSL_NO_DH
    {"no_dhe", OPT_NO_DHE, '-', "Disable ephemeral DH"},
#endif
#ifndef OPENSSL_NO_NEXTPROTONEG
    {"nextprotoneg", OPT_NEXTPROTONEG, 's',
     "Set the advertised protocols for the NPN extension (comma-separated list)"},
#endif
#ifndef OPENSSL_NO_SRTP
920
    {"use_srtp", OPT_SRTP_PROFILES, 's',
921
     "Offer SRTP key management with a colon-separated profile list"},
J
J Mohan Rao Arisankala 已提交
922
#endif
923 924 925
    {"alpn", OPT_ALPN, 's',
     "Set the advertised protocols for the ALPN extension (comma-separated list)"},
#ifndef OPENSSL_NO_ENGINE
926
    {"engine", OPT_ENGINE, 's', "Use engine, possibly a hardware device"},
927
#endif
928
    {"keylogfile", OPT_KEYLOG_FILE, '>', "Write TLS secrets to file"},
929
    {"max_early_data", OPT_MAX_EARLY, 'n',
930
     "The maximum number of bytes of early data"},
931
    {"early_data", OPT_EARLY_DATA, '-', "Attempt to read early data"},
932
    {NULL, OPT_EOF, 0, NULL}
933 934
};

935 936
#define IS_PROT_FLAG(o) \
 (o == OPT_SSL3 || o == OPT_TLS1 || o == OPT_TLS1_1 || o == OPT_TLS1_2 \
937
  || o == OPT_TLS1_3 || o == OPT_DTLS || o == OPT_DTLS1 || o == OPT_DTLS1_2)
938

939
int s_server_main(int argc, char *argv[])
940
{
941
    ENGINE *engine = NULL;
942 943
    EVP_PKEY *s_key = NULL, *s_dkey = NULL;
    SSL_CONF_CTX *cctx = NULL;
944
    const SSL_METHOD *meth = TLS_server_method();
945 946 947 948 949
    SSL_EXCERT *exc = NULL;
    STACK_OF(OPENSSL_STRING) *ssl_args = NULL;
    STACK_OF(X509) *s_chain = NULL, *s_dchain = NULL;
    STACK_OF(X509_CRL) *crls = NULL;
    X509 *s_cert = NULL, *s_dcert = NULL;
950
    X509_VERIFY_PARAM *vpm = NULL;
951
    const char *CApath = NULL, *CAfile = NULL, *chCApath = NULL, *chCAfile = NULL;
D
Dr. Stephen Henson 已提交
952
    char *dpassarg = NULL, *dpass = NULL, *inrand = NULL;
953
    char *passarg = NULL, *pass = NULL, *vfyCApath = NULL, *vfyCAfile = NULL;
M
Matt Caswell 已提交
954
    char *crl_file = NULL, *prog;
955
#ifdef AF_UNIX
956 957
    int unlink_unix_path = 0;
#endif
958
    do_server_cb server_cb;
959
    int vpmtouched = 0, build_chain = 0, no_cache = 0, ext_cache = 0;
D
Dr. Stephen Henson 已提交
960
#ifndef OPENSSL_NO_DH
F
FdaSilvaYY 已提交
961
    char *dhfile = NULL;
D
Dr. Stephen Henson 已提交
962 963
    int no_dhe = 0;
#endif
M
Matt Caswell 已提交
964
    int nocert = 0, ret = 1;
965
    int noCApath = 0, noCAfile = 0;
966 967
    int s_cert_format = FORMAT_PEM, s_key_format = FORMAT_PEM;
    int s_dcert_format = FORMAT_PEM, s_dkey_format = FORMAT_PEM;
968
    int rev = 0, naccept = -1, sdebug = 0;
M
Matt Caswell 已提交
969
    int socket_family = AF_UNSPEC, socket_type = SOCK_STREAM, protocol = 0;
970
    int state = 0, crl_format = FORMAT_PEM, crl_download = 0;
971 972
    char *host = NULL;
    char *port = BUF_strdup(PORT);
973 974
    unsigned char *context = NULL;
    OPTION_CHOICE o;
975 976 977
    EVP_PKEY *s_key2 = NULL;
    X509 *s_cert2 = NULL;
    tlsextctx tlsextcbp = { NULL, NULL, SSL_TLSEXT_ERR_ALERT_WARNING };
978
    const char *ssl_config = NULL;
979
    int read_buf_len = 0;
980
#ifndef OPENSSL_NO_NEXTPROTONEG
981 982
    const char *next_proto_neg_in = NULL;
    tlsextnextprotoctx next_proto = { NULL, 0 };
983
#endif
984 985
    const char *alpn_in = NULL;
    tlsextalpnctx alpn_ctx = { NULL, 0 };
986
#ifndef OPENSSL_NO_PSK
987
    /* by default do not send a PSK identity hint */
988
    char *psk_identity_hint = NULL;
F
FdaSilvaYY 已提交
989
    char *p;
990
#endif
B
Ben Laurie 已提交
991
#ifndef OPENSSL_NO_SRP
992 993
    char *srpuserseed = NULL;
    char *srp_verifier_file = NULL;
B
Ben Laurie 已提交
994
#endif
995
    int min_version = 0, max_version = 0, prot_opt = 0, no_prot_opt = 0;
F
FdaSilvaYY 已提交
996 997 998 999 1000
    int s_server_verify = SSL_VERIFY_NONE;
    int s_server_session_id_context = 1; /* anything will do */
    const char *s_cert_file = TEST_CERT, *s_key_file = NULL, *s_chain_file = NULL;
    const char *s_cert_file2 = TEST_CERT2, *s_key_file2 = NULL;
    char *s_dcert_file = NULL, *s_dkey_file = NULL, *s_dchain_file = NULL;
R
Richard Levitte 已提交
1001 1002 1003 1004
#ifndef OPENSSL_NO_OCSP
    int s_tlsextstatus = 0;
#endif
    int no_resume_ephemeral = 0;
1005
    unsigned int max_send_fragment = 0;
F
FdaSilvaYY 已提交
1006 1007
    unsigned int split_send_fragment = 0, max_pipelines = 0;
    const char *s_serverinfo_file = NULL;
1008
    const char *keylog_file = NULL;
1009
    int max_early_data = -1;
F
FdaSilvaYY 已提交
1010 1011

    /* Init of few remaining global variables */
1012 1013
    local_argc = argc;
    local_argv = argv;
1014

F
FdaSilvaYY 已提交
1015 1016 1017 1018 1019 1020 1021 1022 1023 1024
    ctx = ctx2 = NULL;
    s_nbio = s_nbio_test = 0;
    www = 0;
    bio_s_out = NULL;
    s_debug = 0;
    s_msg = 0;
    s_quiet = 0;
    s_brief = 0;
    async = 0;

1025
    cctx = SSL_CONF_CTX_new();
1026 1027
    vpm = X509_VERIFY_PARAM_new();
    if (cctx == NULL || vpm == NULL)
1028
        goto end;
F
FdaSilvaYY 已提交
1029 1030
    SSL_CONF_CTX_set_flags(cctx,
                           SSL_CONF_FLAG_SERVER | SSL_CONF_FLAG_CMDLINE);
1031 1032 1033

    prog = opt_init(argc, argv, s_server_options);
    while ((o = opt_next()) != OPT_EOF) {
1034 1035 1036 1037 1038 1039 1040
        if (IS_PROT_FLAG(o) && ++prot_opt > 1) {
            BIO_printf(bio_err, "Cannot supply multiple protocol flags\n");
            goto end;
        }
        if (IS_NO_PROT_FLAG(o))
            no_prot_opt++;
        if (prot_opt == 1 && no_prot_opt) {
F
FdaSilvaYY 已提交
1041 1042
            BIO_printf(bio_err,
                       "Cannot supply both a protocol flag and '-no_<prot>'\n");
1043 1044
            goto end;
        }
1045 1046 1047 1048 1049 1050 1051 1052 1053 1054
        switch (o) {
        case OPT_EOF:
        case OPT_ERR:
 opthelp:
            BIO_printf(bio_err, "%s: Use -help for summary.\n", prog);
            goto end;
        case OPT_HELP:
            opt_help(s_server_options);
            ret = 0;
            goto end;
1055

1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080
        case OPT_4:
#ifdef AF_UNIX
            if (socket_family == AF_UNIX) {
                OPENSSL_free(host); host = NULL;
                OPENSSL_free(port); port = NULL;
            }
#endif
            socket_family = AF_INET;
            break;
        case OPT_6:
            if (1) {
#ifdef AF_INET6
#ifdef AF_UNIX
                if (socket_family == AF_UNIX) {
                    OPENSSL_free(host); host = NULL;
                    OPENSSL_free(port); port = NULL;
                }
#endif
                socket_family = AF_INET6;
            } else {
#endif
                BIO_printf(bio_err, "%s: IPv6 domain sockets unsupported\n", prog);
                goto end;
            }
            break;
1081
        case OPT_PORT:
1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107
#ifdef AF_UNIX
            if (socket_family == AF_UNIX) {
                socket_family = AF_UNSPEC;
            }
#endif
            OPENSSL_free(port); port = NULL;
            OPENSSL_free(host); host = NULL;
            if (BIO_parse_hostserv(opt_arg(), NULL, &port, BIO_PARSE_PRIO_SERV) < 1) {
                BIO_printf(bio_err,
                           "%s: -port argument malformed or ambiguous\n",
                           port);
                goto end;
            }
            break;
        case OPT_ACCEPT:
#ifdef AF_UNIX
            if (socket_family == AF_UNIX) {
                socket_family = AF_UNSPEC;
            }
#endif
            OPENSSL_free(port); port = NULL;
            OPENSSL_free(host); host = NULL;
            if (BIO_parse_hostserv(opt_arg(), &host, &port, BIO_PARSE_PRIO_SERV) < 1) {
                BIO_printf(bio_err,
                           "%s: -accept argument malformed or ambiguous\n",
                           port);
1108
                goto end;
1109
            }
1110
            break;
1111
#ifdef AF_UNIX
1112
        case OPT_UNIX:
1113 1114 1115
            socket_family = AF_UNIX;
            OPENSSL_free(host); host = BUF_strdup(opt_arg());
            OPENSSL_free(port); port = NULL;
1116 1117
            break;
        case OPT_UNLINK:
1118
            unlink_unix_path = 1;
1119
            break;
1120
#endif
1121 1122 1123 1124
        case OPT_NACCEPT:
            naccept = atol(opt_arg());
            break;
        case OPT_VERIFY:
1125
            s_server_verify = SSL_VERIFY_PEER | SSL_VERIFY_CLIENT_ONCE;
1126
            verify_args.depth = atoi(opt_arg());
1127
            if (!s_quiet)
1128
                BIO_printf(bio_err, "verify depth is %d\n", verify_args.depth);
1129 1130
            break;
        case OPT_UPPER_V_VERIFY:
1131 1132 1133
            s_server_verify =
                SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT |
                SSL_VERIFY_CLIENT_ONCE;
1134
            verify_args.depth = atoi(opt_arg());
1135 1136 1137
            if (!s_quiet)
                BIO_printf(bio_err,
                           "verify depth is %d, must return a certificate\n",
1138
                           verify_args.depth);
1139 1140 1141 1142 1143 1144 1145
            break;
        case OPT_CONTEXT:
            context = (unsigned char *)opt_arg();
            break;
        case OPT_CERT:
            s_cert_file = opt_arg();
            break;
1146 1147 1148 1149
        case OPT_NAMEOPT:
            if (!set_nameopt(opt_arg()))
                goto end;
            break;
1150 1151 1152 1153
        case OPT_CRL:
            crl_file = opt_arg();
            break;
        case OPT_CRL_DOWNLOAD:
1154
            crl_download = 1;
1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176
            break;
        case OPT_SERVERINFO:
            s_serverinfo_file = opt_arg();
            break;
        case OPT_CERTFORM:
            if (!opt_format(opt_arg(), OPT_FMT_PEMDER, &s_cert_format))
                goto opthelp;
            break;
        case OPT_KEY:
            s_key_file = opt_arg();
            break;
        case OPT_KEYFORM:
            if (!opt_format(opt_arg(), OPT_FMT_ANY, &s_key_format))
                goto opthelp;
            break;
        case OPT_PASS:
            passarg = opt_arg();
            break;
        case OPT_CERT_CHAIN:
            s_chain_file = opt_arg();
            break;
        case OPT_DHPARAM:
D
Dr. Stephen Henson 已提交
1177
#ifndef OPENSSL_NO_DH
1178
            dhfile = opt_arg();
D
Dr. Stephen Henson 已提交
1179
#endif
1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201
            break;
        case OPT_DCERTFORM:
            if (!opt_format(opt_arg(), OPT_FMT_PEMDER, &s_dcert_format))
                goto opthelp;
            break;
        case OPT_DCERT:
            s_dcert_file = opt_arg();
            break;
        case OPT_DKEYFORM:
            if (!opt_format(opt_arg(), OPT_FMT_PEMDER, &s_dkey_format))
                goto opthelp;
            break;
        case OPT_DPASS:
            dpassarg = opt_arg();
            break;
        case OPT_DKEY:
            s_dkey_file = opt_arg();
            break;
        case OPT_DCERT_CHAIN:
            s_dchain_file = opt_arg();
            break;
        case OPT_NOCERT:
1202
            nocert = 1;
1203 1204 1205 1206
            break;
        case OPT_CAPATH:
            CApath = opt_arg();
            break;
1207 1208 1209
        case OPT_NOCAPATH:
            noCApath = 1;
            break;
1210 1211 1212 1213 1214 1215 1216
        case OPT_CHAINCAPATH:
            chCApath = opt_arg();
            break;
        case OPT_VERIFYCAPATH:
            vfyCApath = opt_arg();
            break;
        case OPT_NO_CACHE:
1217
            no_cache = 1;
1218 1219
            break;
        case OPT_EXT_CACHE:
1220
            ext_cache = 1;
1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245
            break;
        case OPT_CRLFORM:
            if (!opt_format(opt_arg(), OPT_FMT_PEMDER, &crl_format))
                goto opthelp;
            break;
        case OPT_S_CASES:
            if (ssl_args == NULL)
                ssl_args = sk_OPENSSL_STRING_new_null();
            if (ssl_args == NULL
                || !sk_OPENSSL_STRING_push(ssl_args, opt_flag())
                || !sk_OPENSSL_STRING_push(ssl_args, opt_arg())) {
                BIO_printf(bio_err, "%s: Memory allocation failure\n", prog);
                goto end;
            }
            break;
        case OPT_V_CASES:
            if (!opt_verify(o, vpm))
                goto end;
            vpmtouched++;
            break;
        case OPT_X_CASES:
            if (!args_excert(o, &exc))
                goto end;
            break;
        case OPT_VERIFY_RET_ERROR:
1246
            verify_args.return_error = 1;
1247 1248
            break;
        case OPT_VERIFY_QUIET:
1249
            verify_args.quiet = 1;
1250 1251
            break;
        case OPT_BUILD_CHAIN:
1252
            build_chain = 1;
1253 1254 1255 1256
            break;
        case OPT_CAFILE:
            CAfile = opt_arg();
            break;
1257 1258 1259
        case OPT_NOCAFILE:
            noCAfile = 1;
            break;
1260 1261 1262 1263 1264 1265 1266
        case OPT_CHAINCAFILE:
            chCAfile = opt_arg();
            break;
        case OPT_VERIFYCAFILE:
            vfyCAfile = opt_arg();
            break;
        case OPT_NBIO:
1267
            s_nbio = 1;
1268 1269 1270 1271 1272
            break;
        case OPT_NBIO_TEST:
            s_nbio = s_nbio_test = 1;
            break;
        case OPT_IGN_EOF:
1273
            s_ign_eof = 1;
1274 1275
            break;
        case OPT_NO_IGN_EOF:
1276
            s_ign_eof = 0;
1277 1278
            break;
        case OPT_DEBUG:
1279
            s_debug = 1;
1280 1281
            break;
        case OPT_TLSEXTDEBUG:
1282
            s_tlsextdebug = 1;
1283 1284
            break;
        case OPT_STATUS:
R
Richard Levitte 已提交
1285
#ifndef OPENSSL_NO_OCSP
1286
            s_tlsextstatus = 1;
R
Richard Levitte 已提交
1287
#endif
1288 1289
            break;
        case OPT_STATUS_VERBOSE:
R
Richard Levitte 已提交
1290
#ifndef OPENSSL_NO_OCSP
1291
            s_tlsextstatus = tlscstatp.verbose = 1;
R
Richard Levitte 已提交
1292
#endif
1293 1294
            break;
        case OPT_STATUS_TIMEOUT:
R
Richard Levitte 已提交
1295
#ifndef OPENSSL_NO_OCSP
1296
            s_tlsextstatus = 1;
1297
            tlscstatp.timeout = atoi(opt_arg());
R
Richard Levitte 已提交
1298
#endif
1299 1300
            break;
        case OPT_STATUS_URL:
M
Matt Caswell 已提交
1301
#ifndef OPENSSL_NO_OCSP
1302
            s_tlsextstatus = 1;
1303
            if (!OCSP_parse_url(opt_arg(),
1304 1305 1306 1307
                                &tlscstatp.host,
                                &tlscstatp.port,
                                &tlscstatp.path, &tlscstatp.use_ssl)) {
                BIO_printf(bio_err, "Error parsing URL\n");
1308
                goto end;
1309
            }
1310 1311 1312 1313 1314 1315
#endif
            break;
        case OPT_STATUS_FILE:
#ifndef OPENSSL_NO_OCSP
            s_tlsextstatus = 1;
            tlscstatp.respin = opt_arg();
M
Matt Caswell 已提交
1316
#endif
1317 1318
            break;
        case OPT_MSG:
1319
            s_msg = 1;
1320 1321 1322 1323 1324
            break;
        case OPT_MSGFILE:
            bio_s_msg = BIO_new_file(opt_arg(), "w");
            break;
        case OPT_TRACE:
1325
#ifndef OPENSSL_NO_SSL_TRACE
1326 1327
            s_msg = 2;
#endif
1328
            break;
1329
        case OPT_SECURITY_DEBUG:
1330
            sdebug = 1;
1331 1332
            break;
        case OPT_SECURITY_DEBUG_VERBOSE:
1333
            sdebug = 2;
1334 1335
            break;
        case OPT_STATE:
1336
            state = 1;
1337 1338
            break;
        case OPT_CRLF:
1339
            s_crlf = 1;
1340 1341
            break;
        case OPT_QUIET:
1342
            s_quiet = 1;
1343 1344
            break;
        case OPT_BRIEF:
1345
            s_quiet = s_brief = verify_args.quiet = 1;
1346 1347
            break;
        case OPT_NO_DHE:
D
Dr. Stephen Henson 已提交
1348
#ifndef OPENSSL_NO_DH
1349
            no_dhe = 1;
D
Dr. Stephen Henson 已提交
1350
#endif
1351 1352
            break;
        case OPT_NO_RESUME_EPHEMERAL:
1353
            no_resume_ephemeral = 1;
1354
            break;
1355 1356 1357 1358 1359
        case OPT_PSK_IDENTITY:
#ifndef OPENSSL_NO_PSK
            psk_identity = opt_arg();
#endif
            break;
1360
        case OPT_PSK_HINT:
1361
#ifndef OPENSSL_NO_PSK
1362
            psk_identity_hint = opt_arg();
1363
#endif
1364 1365
            break;
        case OPT_PSK:
1366
#ifndef OPENSSL_NO_PSK
1367
            for (p = psk_key = opt_arg(); *p; p++) {
1368
                if (isxdigit(_UC(*p)))
1369 1370
                    continue;
                BIO_printf(bio_err, "Not a hex number '%s'\n", *argv);
1371
                goto end;
1372
            }
B
Ben Laurie 已提交
1373
#endif
1374
            break;
1375
        case OPT_SRPVFILE:
1376
#ifndef OPENSSL_NO_SRP
1377
            srp_verifier_file = opt_arg();
1378 1379
            if (min_version < TLS1_VERSION)
                min_version = TLS1_VERSION;
1380
#endif
1381 1382
            break;
        case OPT_SRPUSERSEED:
1383
#ifndef OPENSSL_NO_SRP
1384
            srpuserseed = opt_arg();
1385 1386
            if (min_version < TLS1_VERSION)
                min_version = TLS1_VERSION;
1387
#endif
1388
            break;
1389
        case OPT_REV:
1390
            rev = 1;
1391 1392
            break;
        case OPT_WWW:
1393
            www = 1;
1394 1395
            break;
        case OPT_UPPER_WWW:
1396
            www = 2;
1397 1398
            break;
        case OPT_HTTP:
1399
            www = 3;
1400
            break;
1401 1402 1403
        case OPT_SSL_CONFIG:
            ssl_config = opt_arg();
            break;
1404
        case OPT_SSL3:
1405 1406
            min_version = SSL3_VERSION;
            max_version = SSL3_VERSION;
1407
            break;
1408 1409 1410 1411
        case OPT_TLS1_3:
            min_version = TLS1_3_VERSION;
            max_version = TLS1_3_VERSION;
            break;
1412
        case OPT_TLS1_2:
1413 1414
            min_version = TLS1_2_VERSION;
            max_version = TLS1_2_VERSION;
1415 1416
            break;
        case OPT_TLS1_1:
1417 1418
            min_version = TLS1_1_VERSION;
            max_version = TLS1_1_VERSION;
1419 1420
            break;
        case OPT_TLS1:
1421 1422
            min_version = TLS1_VERSION;
            max_version = TLS1_VERSION;
1423 1424
            break;
        case OPT_DTLS:
1425
#ifndef OPENSSL_NO_DTLS
1426
            meth = DTLS_server_method();
1427
            socket_type = SOCK_DGRAM;
1428
#endif
1429 1430
            break;
        case OPT_DTLS1:
1431 1432 1433 1434
#ifndef OPENSSL_NO_DTLS
            meth = DTLS_server_method();
            min_version = DTLS1_VERSION;
            max_version = DTLS1_VERSION;
1435
            socket_type = SOCK_DGRAM;
1436
#endif
1437 1438
            break;
        case OPT_DTLS1_2:
1439 1440 1441 1442
#ifndef OPENSSL_NO_DTLS
            meth = DTLS_server_method();
            min_version = DTLS1_2_VERSION;
            max_version = DTLS1_2_VERSION;
1443
            socket_type = SOCK_DGRAM;
M
Matt Caswell 已提交
1444 1445 1446 1447 1448
#endif
            break;
        case OPT_SCTP:
#ifndef OPENSSL_NO_SCTP
            protocol = IPPROTO_SCTP;
1449
#endif
1450 1451
            break;
        case OPT_TIMEOUT:
1452
#ifndef OPENSSL_NO_DTLS
1453
            enable_timeouts = 1;
1454
#endif
1455 1456
            break;
        case OPT_MTU:
1457
#ifndef OPENSSL_NO_DTLS
1458
            socket_mtu = atol(opt_arg());
1459
#endif
1460
            break;
1461
        case OPT_LISTEN:
1462
#ifndef OPENSSL_NO_DTLS
1463
            dtlslisten = 1;
1464
#endif
1465
            break;
1466 1467 1468 1469
        case OPT_ID_PREFIX:
            session_id_prefix = opt_arg();
            break;
        case OPT_ENGINE:
1470
            engine = setup_engine(opt_arg(), 1);
1471 1472 1473 1474 1475 1476 1477 1478
            break;
        case OPT_RAND:
            inrand = opt_arg();
            break;
        case OPT_SERVERNAME:
            tlsextcbp.servername = opt_arg();
            break;
        case OPT_SERVERNAME_FATAL:
1479
            tlsextcbp.extension_error = SSL_TLSEXT_ERR_ALERT_FATAL;
1480 1481 1482 1483 1484 1485 1486 1487
            break;
        case OPT_CERT2:
            s_cert_file2 = opt_arg();
            break;
        case OPT_KEY2:
            s_key_file2 = opt_arg();
            break;
        case OPT_NEXTPROTONEG:
1488
# ifndef OPENSSL_NO_NEXTPROTONEG
1489
            next_proto_neg_in = opt_arg();
1490
#endif
1491
            break;
1492 1493 1494 1495
        case OPT_ALPN:
            alpn_in = opt_arg();
            break;
        case OPT_SRTP_PROFILES:
1496
#ifndef OPENSSL_NO_SRTP
1497
            srtp_profiles = opt_arg();
J
J Mohan Rao Arisankala 已提交
1498
#endif
1499
            break;
1500 1501 1502 1503 1504
        case OPT_KEYMATEXPORT:
            keymatexportlabel = opt_arg();
            break;
        case OPT_KEYMATEXPORTLEN:
            keymatexportlen = atoi(opt_arg());
1505
            break;
1506 1507 1508
        case OPT_ASYNC:
            async = 1;
            break;
1509 1510 1511
        case OPT_MAX_SEND_FRAG:
            max_send_fragment = atoi(opt_arg());
            break;
1512 1513 1514 1515 1516 1517
        case OPT_SPLIT_SEND_FRAG:
            split_send_fragment = atoi(opt_arg());
            break;
        case OPT_MAX_PIPELINES:
            max_pipelines = atoi(opt_arg());
            break;
1518 1519 1520
        case OPT_READ_BUF:
            read_buf_len = atoi(opt_arg());
            break;
1521 1522 1523
        case OPT_KEYLOG_FILE:
            keylog_file = opt_arg();
            break;
1524 1525
        case OPT_MAX_EARLY:
            max_early_data = atoi(opt_arg());
1526 1527 1528 1529
            if (max_early_data < 0) {
                BIO_printf(bio_err, "Invalid value for max_early_data\n");
                goto end;
            }
1530
            break;
1531 1532 1533
        case OPT_EARLY_DATA:
            early_data = 1;
            break;
1534 1535
        }
    }
1536 1537 1538
    argc = opt_num_rest();
    argv = opt_rest();

1539
#ifndef OPENSSL_NO_DTLS
1540 1541 1542 1543
    if (www && socket_type == SOCK_DGRAM) {
        BIO_printf(bio_err, "Can't use -HTTP, -www or -WWW with DTLS\n");
        goto end;
    }
1544 1545 1546 1547 1548

    if (dtlslisten && socket_type != SOCK_DGRAM) {
        BIO_printf(bio_err, "Can only use -listen with DTLS\n");
        goto end;
    }
1549 1550
#endif

1551 1552
#ifdef AF_UNIX
    if (socket_family == AF_UNIX && socket_type != SOCK_STREAM) {
1553 1554 1555 1556
        BIO_printf(bio_err,
                   "Can't use unix sockets and datagrams together\n");
        goto end;
    }
1557
#endif
1558

M
Matt Caswell 已提交
1559 1560 1561 1562 1563 1564 1565 1566 1567 1568
#ifndef OPENSSL_NO_SCTP
    if (protocol == IPPROTO_SCTP) {
        if (socket_type != SOCK_DGRAM) {
            BIO_printf(bio_err, "Can't use -sctp without DTLS\n");
            goto end;
        }
        /* SCTP is unusual. It uses DTLS over a SOCK_STREAM protocol */
        socket_type = SOCK_STREAM;
    }
#endif
1569

1570
    if (!app_passwd(passarg, dpassarg, &pass, &dpass)) {
1571 1572 1573
        BIO_printf(bio_err, "Error getting password\n");
        goto end;
    }
D
PR: 910  
Dr. Stephen Henson 已提交
1574

1575 1576
    if (s_key_file == NULL)
        s_key_file = s_cert_file;
1577

1578 1579
    if (s_key_file2 == NULL)
        s_key_file2 = s_cert_file2;
1580

1581
    if (!load_excert(&exc))
1582 1583 1584
        goto end;

    if (nocert == 0) {
1585
        s_key = load_key(s_key_file, s_key_format, 0, pass, engine,
1586 1587 1588 1589 1590
                         "server certificate private key file");
        if (!s_key) {
            ERR_print_errors(bio_err);
            goto end;
        }
D
PR: 910  
Dr. Stephen Henson 已提交
1591

1592
        s_cert = load_cert(s_cert_file, s_cert_format,
1593
                           "server certificate file");
1594 1595 1596 1597 1598 1599

        if (!s_cert) {
            ERR_print_errors(bio_err);
            goto end;
        }
        if (s_chain_file) {
1600
            if (!load_certs(s_chain_file, &s_chain, FORMAT_PEM, NULL,
1601
                            "server certificate chain"))
1602 1603
                goto end;
        }
1604

1605
        if (tlsextcbp.servername) {
1606
            s_key2 = load_key(s_key_file2, s_key_format, 0, pass, engine,
1607 1608 1609 1610 1611 1612
                              "second server certificate private key file");
            if (!s_key2) {
                ERR_print_errors(bio_err);
                goto end;
            }

1613
            s_cert2 = load_cert(s_cert_file2, s_cert_format,
1614
                                "second server certificate file");
1615 1616 1617 1618 1619 1620 1621

            if (!s_cert2) {
                ERR_print_errors(bio_err);
                goto end;
            }
        }
    }
1622
#if !defined(OPENSSL_NO_NEXTPROTONEG)
1623
    if (next_proto_neg_in) {
1624
        next_proto.data = next_protos_parse(&next_proto.len, next_proto_neg_in);
1625 1626 1627
        if (next_proto.data == NULL)
            goto end;
    }
1628
#endif
1629 1630
    alpn_ctx.data = NULL;
    if (alpn_in) {
1631
        alpn_ctx.data = next_protos_parse(&alpn_ctx.len, alpn_in);
1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653
        if (alpn_ctx.data == NULL)
            goto end;
    }

    if (crl_file) {
        X509_CRL *crl;
        crl = load_crl(crl_file, crl_format);
        if (!crl) {
            BIO_puts(bio_err, "Error loading CRL\n");
            ERR_print_errors(bio_err);
            goto end;
        }
        crls = sk_X509_CRL_new_null();
        if (!crls || !sk_X509_CRL_push(crls, crl)) {
            BIO_puts(bio_err, "Error adding CRL\n");
            ERR_print_errors(bio_err);
            X509_CRL_free(crl);
            goto end;
        }
    }

    if (s_dcert_file) {
1654

1655 1656 1657
        if (s_dkey_file == NULL)
            s_dkey_file = s_dcert_file;

1658
        s_dkey = load_key(s_dkey_file, s_dkey_format,
1659
                          0, dpass, engine, "second certificate private key file");
1660 1661 1662 1663 1664
        if (!s_dkey) {
            ERR_print_errors(bio_err);
            goto end;
        }

1665
        s_dcert = load_cert(s_dcert_file, s_dcert_format,
1666
                            "second server certificate file");
1667 1668 1669 1670 1671 1672

        if (!s_dcert) {
            ERR_print_errors(bio_err);
            goto end;
        }
        if (s_dchain_file) {
1673
            if (!load_certs(s_dchain_file, &s_dchain, FORMAT_PEM, NULL,
1674
                            "second server certificate chain"))
1675 1676 1677 1678 1679
                goto end;
        }

    }

1680
    if (!app_RAND_load_file(NULL, 1) && inrand == NULL
1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692
        && !RAND_status()) {
        BIO_printf(bio_err,
                   "warning, not much extra random data, consider using the -rand option\n");
    }
    if (inrand != NULL)
        BIO_printf(bio_err, "%ld semi-random bytes loaded\n",
                   app_RAND_load_files(inrand));

    if (bio_s_out == NULL) {
        if (s_quiet && !s_debug) {
            bio_s_out = BIO_new(BIO_s_null());
            if (s_msg && !bio_s_msg)
1693
                bio_s_msg = dup_bio_out(FORMAT_TEXT);
1694 1695
        } else {
            if (bio_s_out == NULL)
1696
                bio_s_out = dup_bio_out(FORMAT_TEXT);
1697 1698
        }
    }
1699
#if !defined(OPENSSL_NO_RSA) || !defined(OPENSSL_NO_DSA) || !defined(OPENSSL_NO_EC)
1700
    if (nocert)
1701
#endif
1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715
    {
        s_cert_file = NULL;
        s_key_file = NULL;
        s_dcert_file = NULL;
        s_dkey_file = NULL;
        s_cert_file2 = NULL;
        s_key_file2 = NULL;
    }

    ctx = SSL_CTX_new(meth);
    if (ctx == NULL) {
        ERR_print_errors(bio_err);
        goto end;
    }
1716 1717
    if (sdebug)
        ssl_ctx_security_debug(ctx, sdebug);
1718 1719 1720 1721
    if (ssl_config) {
        if (SSL_CTX_config(ctx, ssl_config) == 0) {
            BIO_printf(bio_err, "Error using configuration \"%s\"\n",
                       ssl_config);
F
FdaSilvaYY 已提交
1722 1723
            ERR_print_errors(bio_err);
            goto end;
1724 1725
        }
    }
1726 1727 1728 1729
    if (SSL_CTX_set_min_proto_version(ctx, min_version) == 0)
        goto end;
    if (SSL_CTX_set_max_proto_version(ctx, max_version) == 0)
        goto end;
1730

1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753
    if (session_id_prefix) {
        if (strlen(session_id_prefix) >= 32)
            BIO_printf(bio_err,
                       "warning: id_prefix is too long, only one new session will be possible\n");
        if (!SSL_CTX_set_generate_session_id(ctx, generate_session_id)) {
            BIO_printf(bio_err, "error setting 'id_prefix'\n");
            ERR_print_errors(bio_err);
            goto end;
        }
        BIO_printf(bio_err, "id_prefix '%s' set.\n", session_id_prefix);
    }
    SSL_CTX_set_quiet_shutdown(ctx, 1);
    if (exc)
        ssl_ctx_set_excert(ctx, exc);

    if (state)
        SSL_CTX_set_info_callback(ctx, apps_ssl_info_callback);
    if (no_cache)
        SSL_CTX_set_session_cache_mode(ctx, SSL_SESS_CACHE_OFF);
    else if (ext_cache)
        init_session_cache_ctx(ctx);
    else
        SSL_CTX_sess_set_cache_size(ctx, 128);
1754

M
Matt Caswell 已提交
1755
    if (async) {
1756
        SSL_CTX_set_mode(ctx, SSL_MODE_ASYNC);
M
Matt Caswell 已提交
1757
    }
1758

1759 1760 1761 1762 1763 1764
    if (max_send_fragment > 0
        && !SSL_CTX_set_max_send_fragment(ctx, max_send_fragment)) {
        BIO_printf(bio_err, "%s: Max send fragment size %u is out of permitted range\n",
                   prog, max_send_fragment);
        goto end;
    }
1765

1766 1767 1768 1769 1770
    if (split_send_fragment > 0
        && !SSL_CTX_set_split_send_fragment(ctx, split_send_fragment)) {
        BIO_printf(bio_err, "%s: Split send fragment size %u is out of permitted range\n",
                   prog, split_send_fragment);
        goto end;
1771
    }
1772 1773 1774 1775 1776
    if (max_pipelines > 0
        && !SSL_CTX_set_max_pipelines(ctx, max_pipelines)) {
        BIO_printf(bio_err, "%s: Max pipelines %u is out of permitted range\n",
                   prog, max_pipelines);
        goto end;
1777
    }
1778

1779 1780 1781
    if (read_buf_len > 0) {
        SSL_CTX_set_default_read_buffer_len(ctx, read_buf_len);
    }
P
Piotr Sikora 已提交
1782
#ifndef OPENSSL_NO_SRTP
M
Matt Caswell 已提交
1783
    if (srtp_profiles != NULL) {
1784 1785
        /* Returns 0 on success! */
        if (SSL_CTX_set_tlsext_use_srtp(ctx, srtp_profiles) != 0) {
M
Matt Caswell 已提交
1786 1787 1788 1789 1790
            BIO_printf(bio_err, "Error setting SRTP profile\n");
            ERR_print_errors(bio_err);
            goto end;
        }
    }
P
Piotr Sikora 已提交
1791
#endif
B
Ben Laurie 已提交
1792

1793
    if (!ctx_set_verify_locations(ctx, CAfile, CApath, noCAfile, noCApath)) {
1794
        ERR_print_errors(bio_err);
1795
        goto end;
1796
    }
1797 1798
    if (vpmtouched && !SSL_CTX_set1_param(ctx, vpm)) {
        BIO_printf(bio_err, "Error setting verify params\n");
M
Matt Caswell 已提交
1799 1800 1801
        ERR_print_errors(bio_err);
        goto end;
    }
1802 1803

    ssl_ctx_add_crls(ctx, crls, 0);
R
Rich Salz 已提交
1804
    if (!config_ctx(cctx, ssl_args, ctx))
1805 1806 1807 1808 1809 1810 1811 1812
        goto end;

    if (!ssl_load_stores(ctx, vfyCApath, vfyCAfile, chCApath, chCAfile,
                         crls, crl_download)) {
        BIO_printf(bio_err, "Error loading store locations\n");
        ERR_print_errors(bio_err);
        goto end;
    }
1813

1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825
    if (s_cert2) {
        ctx2 = SSL_CTX_new(meth);
        if (ctx2 == NULL) {
            ERR_print_errors(bio_err);
            goto end;
        }
    }

    if (ctx2) {
        BIO_printf(bio_s_out, "Setting secondary ctx parameters\n");

        if (sdebug)
R
Rich Salz 已提交
1826
            ssl_ctx_security_debug(ctx, sdebug);
1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852

        if (session_id_prefix) {
            if (strlen(session_id_prefix) >= 32)
                BIO_printf(bio_err,
                           "warning: id_prefix is too long, only one new session will be possible\n");
            if (!SSL_CTX_set_generate_session_id(ctx2, generate_session_id)) {
                BIO_printf(bio_err, "error setting 'id_prefix'\n");
                ERR_print_errors(bio_err);
                goto end;
            }
            BIO_printf(bio_err, "id_prefix '%s' set.\n", session_id_prefix);
        }
        SSL_CTX_set_quiet_shutdown(ctx2, 1);
        if (exc)
            ssl_ctx_set_excert(ctx2, exc);

        if (state)
            SSL_CTX_set_info_callback(ctx2, apps_ssl_info_callback);

        if (no_cache)
            SSL_CTX_set_session_cache_mode(ctx2, SSL_SESS_CACHE_OFF);
        else if (ext_cache)
            init_session_cache_ctx(ctx2);
        else
            SSL_CTX_sess_set_cache_size(ctx2, 128);

1853
        if (async)
M
Matt Caswell 已提交
1854
            SSL_CTX_set_mode(ctx2, SSL_MODE_ASYNC);
1855

1856 1857
        if (!ctx_set_verify_locations(ctx2, CAfile, CApath, noCAfile,
                                      noCApath)) {
1858
            ERR_print_errors(bio_err);
1859
            goto end;
1860
        }
1861 1862
        if (vpmtouched && !SSL_CTX_set1_param(ctx2, vpm)) {
            BIO_printf(bio_err, "Error setting verify params\n");
M
Matt Caswell 已提交
1863 1864 1865
            ERR_print_errors(bio_err);
            goto end;
        }
B
Ben Laurie 已提交
1866

1867
        ssl_ctx_add_crls(ctx2, crls, 0);
R
Rich Salz 已提交
1868
        if (!config_ctx(cctx, ssl_args, ctx2))
1869 1870
            goto end;
    }
1871
#ifndef OPENSSL_NO_NEXTPROTONEG
1872 1873 1874
    if (next_proto.data)
        SSL_CTX_set_next_protos_advertised_cb(ctx, next_proto_cb,
                                              &next_proto);
1875
#endif
1876 1877
    if (alpn_ctx.data)
        SSL_CTX_set_alpn_select_cb(ctx, alpn_cb, &alpn_ctx);
B
Bodo Möller 已提交
1878

1879
#ifndef OPENSSL_NO_DH
1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902
    if (!no_dhe) {
        DH *dh = NULL;

        if (dhfile)
            dh = load_dh_param(dhfile);
        else if (s_cert_file)
            dh = load_dh_param(s_cert_file);

        if (dh != NULL) {
            BIO_printf(bio_s_out, "Setting temp DH parameters\n");
        } else {
            BIO_printf(bio_s_out, "Using default temp DH parameters\n");
        }
        (void)BIO_flush(bio_s_out);

        if (dh == NULL)
            SSL_CTX_set_dh_auto(ctx, 1);
        else if (!SSL_CTX_set_tmp_dh(ctx, dh)) {
            BIO_puts(bio_err, "Error setting temp DH parameters\n");
            ERR_print_errors(bio_err);
            DH_free(dh);
            goto end;
        }
1903

1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925
        if (ctx2) {
            if (!dhfile) {
                DH *dh2 = load_dh_param(s_cert_file2);
                if (dh2 != NULL) {
                    BIO_printf(bio_s_out, "Setting temp DH parameters\n");
                    (void)BIO_flush(bio_s_out);

                    DH_free(dh);
                    dh = dh2;
                }
            }
            if (dh == NULL)
                SSL_CTX_set_dh_auto(ctx2, 1);
            else if (!SSL_CTX_set_tmp_dh(ctx2, dh)) {
                BIO_puts(bio_err, "Error setting temp DH parameters\n");
                ERR_print_errors(bio_err);
                DH_free(dh);
                goto end;
            }
        }
        DH_free(dh);
    }
1926
#endif
1927

1928 1929
    if (!set_cert_key_stuff(ctx, s_cert, s_key, s_chain, build_chain))
        goto end;
1930

1931 1932 1933 1934 1935
    if (s_serverinfo_file != NULL
        && !SSL_CTX_use_serverinfo_file(ctx, s_serverinfo_file)) {
        ERR_print_errors(bio_err);
        goto end;
    }
1936

1937 1938
    if (ctx2 && !set_cert_key_stuff(ctx2, s_cert2, s_key2, NULL, build_chain))
        goto end;
1939

1940 1941 1942 1943
    if (s_dcert != NULL) {
        if (!set_cert_key_stuff(ctx, s_dcert, s_dkey, s_dchain, build_chain))
            goto end;
    }
1944

1945 1946 1947
    if (no_resume_ephemeral) {
        SSL_CTX_set_not_resumable_session_callback(ctx,
                                                   not_resumable_sess_cb);
1948

1949 1950 1951 1952
        if (ctx2)
            SSL_CTX_set_not_resumable_session_callback(ctx2,
                                                       not_resumable_sess_cb);
    }
1953
#ifndef OPENSSL_NO_PSK
1954
    if (psk_key != NULL) {
1955
        if (s_debug)
F
FdaSilvaYY 已提交
1956
            BIO_printf(bio_s_out, "PSK key given, setting server callback\n");
1957 1958
        SSL_CTX_set_psk_server_callback(ctx, psk_server_cb);
    }
1959

1960 1961 1962 1963 1964
    if (!SSL_CTX_use_psk_identity_hint(ctx, psk_identity_hint)) {
        BIO_printf(bio_err, "error setting PSK identity hint to context\n");
        ERR_print_errors(bio_err);
        goto end;
    }
1965 1966
#endif

1967
    SSL_CTX_set_verify(ctx, s_server_verify, verify_callback);
V
Viktor Dukhovni 已提交
1968
    if (!SSL_CTX_set_session_id_context(ctx,
F
FdaSilvaYY 已提交
1969 1970
                                        (void *)&s_server_session_id_context,
                                        sizeof s_server_session_id_context)) {
M
Matt Caswell 已提交
1971 1972 1973 1974
        BIO_printf(bio_err, "error setting session id context\n");
        ERR_print_errors(bio_err);
        goto end;
    }
1975

1976 1977 1978
    /* Set DTLS cookie generation and verification callbacks */
    SSL_CTX_set_cookie_generate_cb(ctx, generate_cookie_callback);
    SSL_CTX_set_cookie_verify_cb(ctx, verify_cookie_callback);
D
Dr. Stephen Henson 已提交
1979

1980 1981
    if (ctx2) {
        SSL_CTX_set_verify(ctx2, s_server_verify, verify_callback);
V
Viktor Dukhovni 已提交
1982
        if (!SSL_CTX_set_session_id_context(ctx2,
1983 1984
                    (void *)&s_server_session_id_context,
                    sizeof s_server_session_id_context)) {
M
Matt Caswell 已提交
1985 1986 1987 1988
            BIO_printf(bio_err, "error setting session id context\n");
            ERR_print_errors(bio_err);
            goto end;
        }
1989 1990 1991 1992 1993 1994
        tlsextcbp.biodebug = bio_s_out;
        SSL_CTX_set_tlsext_servername_callback(ctx2, ssl_servername_cb);
        SSL_CTX_set_tlsext_servername_arg(ctx2, &tlsextcbp);
        SSL_CTX_set_tlsext_servername_callback(ctx, ssl_servername_cb);
        SSL_CTX_set_tlsext_servername_arg(ctx, &tlsextcbp);
    }
1995

B
Ben Laurie 已提交
1996
#ifndef OPENSSL_NO_SRP
1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015
    if (srp_verifier_file != NULL) {
        srp_callback_parm.vb = SRP_VBASE_new(srpuserseed);
        srp_callback_parm.user = NULL;
        srp_callback_parm.login = NULL;
        if ((ret =
             SRP_VBASE_init(srp_callback_parm.vb,
                            srp_verifier_file)) != SRP_NO_ERROR) {
            BIO_printf(bio_err,
                       "Cannot initialize SRP verifier file \"%s\":ret=%d\n",
                       srp_verifier_file, ret);
            goto end;
        }
        SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, verify_callback);
        SSL_CTX_set_srp_cb_arg(ctx, &srp_callback_parm);
        SSL_CTX_set_srp_username_callback(ctx, ssl_srp_server_param_cb);
    } else
#endif
    if (CAfile != NULL) {
        SSL_CTX_set_client_CA_list(ctx, SSL_load_client_CA_file(CAfile));
2016

2017 2018 2019
        if (ctx2)
            SSL_CTX_set_client_CA_list(ctx2, SSL_load_client_CA_file(CAfile));
    }
M
Matt Caswell 已提交
2020
#ifndef OPENSSL_NO_OCSP
2021 2022 2023 2024 2025 2026 2027 2028
    if (s_tlsextstatus) {
        SSL_CTX_set_tlsext_status_cb(ctx, cert_status_cb);
        SSL_CTX_set_tlsext_status_arg(ctx, &tlscstatp);
        if (ctx2) {
            SSL_CTX_set_tlsext_status_cb(ctx2, cert_status_cb);
            SSL_CTX_set_tlsext_status_arg(ctx2, &tlscstatp);
        }
    }
M
Matt Caswell 已提交
2029
#endif
2030 2031
    if (set_keylog_file(ctx, keylog_file))
        goto end;
2032

2033
    if (max_early_data >= 0)
2034 2035
        SSL_CTX_set_max_early_data(ctx, max_early_data);

2036 2037 2038 2039 2040 2041 2042 2043
    BIO_printf(bio_s_out, "ACCEPT\n");
    (void)BIO_flush(bio_s_out);
    if (rev)
        server_cb = rev_body;
    else if (www)
        server_cb = www_body;
    else
        server_cb = sv_body;
2044 2045 2046 2047
#ifdef AF_UNIX
    if (socket_family == AF_UNIX
        && unlink_unix_path)
        unlink(host);
2048
#endif
M
Matt Caswell 已提交
2049
    do_server(&accept_socket, host, port, socket_family, socket_type, protocol,
2050
              server_cb, context, naccept);
2051 2052 2053
    print_stats(bio_s_out, ctx);
    ret = 0;
 end:
R
Rich Salz 已提交
2054
    SSL_CTX_free(ctx);
2055
    set_keylog_file(NULL, NULL);
R
Rich Salz 已提交
2056 2057 2058
    X509_free(s_cert);
    sk_X509_CRL_pop_free(crls, X509_CRL_free);
    X509_free(s_dcert);
R
Rich Salz 已提交
2059 2060
    EVP_PKEY_free(s_key);
    EVP_PKEY_free(s_dkey);
R
Rich Salz 已提交
2061 2062
    sk_X509_pop_free(s_chain, X509_free);
    sk_X509_pop_free(s_dchain, X509_free);
R
Rich Salz 已提交
2063 2064
    OPENSSL_free(pass);
    OPENSSL_free(dpass);
2065 2066
    OPENSSL_free(host);
    OPENSSL_free(port);
R
Rich Salz 已提交
2067
    X509_VERIFY_PARAM_free(vpm);
2068
    free_sessions();
R
Rich Salz 已提交
2069 2070 2071
    OPENSSL_free(tlscstatp.host);
    OPENSSL_free(tlscstatp.port);
    OPENSSL_free(tlscstatp.path);
R
Rich Salz 已提交
2072
    SSL_CTX_free(ctx2);
R
Rich Salz 已提交
2073
    X509_free(s_cert2);
R
Rich Salz 已提交
2074
    EVP_PKEY_free(s_key2);
2075
#ifndef OPENSSL_NO_NEXTPROTONEG
R
Rich Salz 已提交
2076
    OPENSSL_free(next_proto.data);
2077
#endif
2078
    OPENSSL_free(alpn_ctx.data);
2079
    ssl_excert_free(exc);
2080
    sk_OPENSSL_STRING_free(ssl_args);
R
Rich Salz 已提交
2081
    SSL_CONF_CTX_free(cctx);
2082
    release_engine(engine);
R
Rich Salz 已提交
2083 2084 2085 2086
    BIO_free(bio_s_out);
    bio_s_out = NULL;
    BIO_free(bio_s_msg);
    bio_s_msg = NULL;
2087 2088 2089
#ifdef CHARSET_EBCDIC
    BIO_meth_free(methods_ebcdic);
#endif
2090
    return (ret);
2091
}
2092

U
Ulf Möller 已提交
2093
static void print_stats(BIO *bio, SSL_CTX *ssl_ctx)
2094 2095 2096 2097 2098 2099 2100 2101 2102 2103 2104 2105 2106 2107 2108 2109 2110 2111 2112 2113 2114 2115 2116 2117 2118 2119
{
    BIO_printf(bio, "%4ld items in the session cache\n",
               SSL_CTX_sess_number(ssl_ctx));
    BIO_printf(bio, "%4ld client connects (SSL_connect())\n",
               SSL_CTX_sess_connect(ssl_ctx));
    BIO_printf(bio, "%4ld client renegotiates (SSL_connect())\n",
               SSL_CTX_sess_connect_renegotiate(ssl_ctx));
    BIO_printf(bio, "%4ld client connects that finished\n",
               SSL_CTX_sess_connect_good(ssl_ctx));
    BIO_printf(bio, "%4ld server accepts (SSL_accept())\n",
               SSL_CTX_sess_accept(ssl_ctx));
    BIO_printf(bio, "%4ld server renegotiates (SSL_accept())\n",
               SSL_CTX_sess_accept_renegotiate(ssl_ctx));
    BIO_printf(bio, "%4ld server accepts that finished\n",
               SSL_CTX_sess_accept_good(ssl_ctx));
    BIO_printf(bio, "%4ld session cache hits\n", SSL_CTX_sess_hits(ssl_ctx));
    BIO_printf(bio, "%4ld session cache misses\n",
               SSL_CTX_sess_misses(ssl_ctx));
    BIO_printf(bio, "%4ld session cache timeouts\n",
               SSL_CTX_sess_timeouts(ssl_ctx));
    BIO_printf(bio, "%4ld callback cache hits\n",
               SSL_CTX_sess_cb_hits(ssl_ctx));
    BIO_printf(bio, "%4ld cache full overflows (%ld allowed)\n",
               SSL_CTX_sess_cache_full(ssl_ctx),
               SSL_CTX_sess_get_cache_size(ssl_ctx));
}
2120

M
Matt Caswell 已提交
2121
static int sv_body(int s, int stype, int prot, unsigned char *context)
2122 2123 2124 2125 2126 2127 2128 2129 2130
{
    char *buf = NULL;
    fd_set readfds;
    int ret = 1, width;
    int k, i;
    unsigned long l;
    SSL *con = NULL;
    BIO *sbio;
    struct timeval timeout;
R
Rich Salz 已提交
2131
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
2132
    struct timeval tv;
2133
#else
2134
    struct timeval *timeoutp;
2135
#endif
M
Matt Caswell 已提交
2136
#ifndef OPENSSL_NO_DTLS
2137
# ifndef OPENSSL_NO_SCTP
M
Matt Caswell 已提交
2138
    int isdtls = (stype == SOCK_DGRAM || prot == IPPROTO_SCTP);
2139
# else
M
Matt Caswell 已提交
2140
    int isdtls = (stype == SOCK_DGRAM);
2141
# endif
M
Matt Caswell 已提交
2142
#endif
2143

R
Rich Salz 已提交
2144
    buf = app_malloc(bufsize, "server buffer");
2145
    if (s_nbio) {
R
Rich Salz 已提交
2146
        if (!BIO_socket_nbio(s, 1))
2147
            ERR_print_errors(bio_err);
R
Rich Salz 已提交
2148 2149
        else if (!s_quiet)
            BIO_printf(bio_err, "Turned on non blocking io\n");
2150
    }
2151

2152 2153
    if (con == NULL) {
        con = SSL_new(ctx);
2154

2155 2156 2157 2158
        if (s_tlsextdebug) {
            SSL_set_tlsext_debug_callback(con, tlsext_cb);
            SSL_set_tlsext_debug_arg(con, bio_s_out);
        }
2159

2160
        if (context
F
FdaSilvaYY 已提交
2161 2162
            && !SSL_set_session_id_context(con,
                                           context, strlen((char *)context))) {
M
Matt Caswell 已提交
2163 2164 2165 2166 2167
            BIO_printf(bio_err, "Error setting session id context\n");
            ret = -1;
            goto err;
        }
    }
V
Viktor Dukhovni 已提交
2168
    if (!SSL_clear(con)) {
M
Matt Caswell 已提交
2169 2170 2171
        BIO_printf(bio_err, "Error clearing SSL connection\n");
        ret = -1;
        goto err;
2172
    }
B
Ben Laurie 已提交
2173
#ifndef OPENSSL_NO_DTLS
M
Matt Caswell 已提交
2174
    if (isdtls) {
2175
# ifndef OPENSSL_NO_SCTP
M
Matt Caswell 已提交
2176 2177 2178
        if (prot == IPPROTO_SCTP)
            sbio = BIO_new_dgram_sctp(s, BIO_NOCLOSE);
        else
2179
# endif
M
Matt Caswell 已提交
2180
            sbio = BIO_new_dgram(s, BIO_NOCLOSE);
2181 2182 2183 2184 2185 2186 2187 2188 2189 2190 2191 2192 2193 2194 2195 2196 2197 2198 2199 2200 2201 2202 2203 2204 2205 2206 2207 2208 2209

        if (enable_timeouts) {
            timeout.tv_sec = 0;
            timeout.tv_usec = DGRAM_RCV_TIMEOUT;
            BIO_ctrl(sbio, BIO_CTRL_DGRAM_SET_RECV_TIMEOUT, 0, &timeout);

            timeout.tv_sec = 0;
            timeout.tv_usec = DGRAM_SND_TIMEOUT;
            BIO_ctrl(sbio, BIO_CTRL_DGRAM_SET_SEND_TIMEOUT, 0, &timeout);
        }

        if (socket_mtu) {
            if (socket_mtu < DTLS_get_link_min_mtu(con)) {
                BIO_printf(bio_err, "MTU too small. Must be at least %ld\n",
                           DTLS_get_link_min_mtu(con));
                ret = -1;
                BIO_free(sbio);
                goto err;
            }
            SSL_set_options(con, SSL_OP_NO_QUERY_MTU);
            if (!DTLS_set_link_mtu(con, socket_mtu)) {
                BIO_printf(bio_err, "Failed to set MTU\n");
                ret = -1;
                BIO_free(sbio);
                goto err;
            }
        } else
            /* want to do MTU discovery */
            BIO_ctrl(sbio, BIO_CTRL_DGRAM_MTU_DISCOVER, 0, NULL);
B
Ben Laurie 已提交
2210

2211
# ifndef OPENSSL_NO_SCTP
M
Matt Caswell 已提交
2212 2213 2214 2215
        if (prot != IPPROTO_SCTP) {
            /* Turn on cookie exchange. Not necessary for SCTP */
            SSL_set_options(con, SSL_OP_COOKIE_EXCHANGE);
        }
2216
# endif
2217
    } else
B
Ben Laurie 已提交
2218
#endif
2219
        sbio = BIO_new_socket(s, BIO_NOCLOSE);
B
Ben Laurie 已提交
2220

M
Matt Caswell 已提交
2221 2222 2223 2224 2225 2226
    if (sbio == NULL) {
        BIO_printf(bio_err, "Unable to create BIO\n");
        ERR_print_errors(bio_err);
        goto err;
    }

2227 2228
    if (s_nbio_test) {
        BIO *test;
2229

2230 2231 2232 2233 2234 2235 2236 2237 2238 2239 2240 2241 2242
        test = BIO_new(BIO_f_nbio_test());
        sbio = BIO_push(test, sbio);
    }

    SSL_set_bio(con, sbio, sbio);
    SSL_set_accept_state(con);
    /* SSL_set_fd(con,s); */

    if (s_debug) {
        BIO_set_callback(SSL_get_rbio(con), bio_dump_callback);
        BIO_set_callback_arg(SSL_get_rbio(con), (char *)bio_s_out);
    }
    if (s_msg) {
2243
#ifndef OPENSSL_NO_SSL_TRACE
2244 2245 2246
        if (s_msg == 2)
            SSL_set_msg_callback(con, SSL_trace);
        else
2247
#endif
2248 2249 2250
            SSL_set_msg_callback(con, msg_cb);
        SSL_set_msg_callback_arg(con, bio_s_msg ? bio_s_msg : bio_s_out);
    }
2251

2252 2253 2254 2255
    if (s_tlsextdebug) {
        SSL_set_tlsext_debug_callback(con, tlsext_cb);
        SSL_set_tlsext_debug_arg(con, bio_s_out);
    }
2256

2257
    if (early_data) {
2258
        int write_header = 1, edret = SSL_READ_EARLY_DATA_ERROR;
2259 2260
        size_t readbytes;

2261
        while (edret != SSL_READ_EARLY_DATA_FINISH) {
2262
            for (;;) {
2263 2264
                edret = SSL_read_early_data(con, buf, bufsize, &readbytes);
                if (edret != SSL_READ_EARLY_DATA_ERROR)
2265 2266 2267 2268 2269 2270 2271 2272 2273 2274 2275 2276 2277 2278 2279 2280 2281 2282 2283 2284 2285 2286 2287 2288 2289 2290 2291
                    break;

                switch (SSL_get_error(con, 0)) {
                case SSL_ERROR_WANT_WRITE:
                case SSL_ERROR_WANT_ASYNC:
                case SSL_ERROR_WANT_READ:
                    /* Just keep trying - busy waiting */
                    continue;
                default:
                    BIO_printf(bio_err, "Error reading early data\n");
                    ERR_print_errors(bio_err);
                    goto err;
                }
            }
            if (readbytes > 0) {
                if (write_header) {
                    BIO_printf(bio_s_out, "Early data received:\n");
                    write_header = 0;
                }
                raw_write_stdout(buf, (unsigned int)readbytes);
                (void)BIO_flush(bio_s_out);
            }
        }
        if (write_header)
            BIO_printf(bio_s_out, "No early data received\n");
        else
            BIO_printf(bio_s_out, "\nEnd of early data\n");
2292 2293
        if (SSL_is_init_finished(con))
            print_connection_info(con);
2294 2295
    }

2296 2297
    if (fileno_stdin() > s)
        width = fileno_stdin() + 1;
2298 2299
    else
        width = s + 1;
2300 2301 2302
    for (;;) {
        int read_from_terminal;
        int read_from_sslcon;
B
Bodo Möller 已提交
2303

2304
        read_from_terminal = 0;
2305
        read_from_sslcon = SSL_has_pending(con)
M
Matt Caswell 已提交
2306
                           || (async && SSL_waiting_for_async(con));
B
Bodo Möller 已提交
2307

2308 2309
        if (!read_from_sslcon) {
            FD_ZERO(&readfds);
R
Rich Salz 已提交
2310
#if !defined(OPENSSL_SYS_WINDOWS) && !defined(OPENSSL_SYS_MSDOS)
2311
            openssl_fdset(fileno_stdin(), &readfds);
2312 2313 2314 2315 2316 2317 2318 2319 2320
#endif
            openssl_fdset(s, &readfds);
            /*
             * Note: under VMS with SOCKETSHR the second parameter is
             * currently of type (int *) whereas under other systems it is
             * (void *) if you don't have a cast it will choke the compiler:
             * if you do have a cast then you can either go for (int *) or
             * (void *).
             */
R
Rich Salz 已提交
2321
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
2322 2323 2324 2325 2326 2327 2328 2329 2330
            /*
             * Under DOS (non-djgpp) and Windows we can't select on stdin:
             * only on sockets. As a workaround we timeout the select every
             * second and check for any keypress. In a proper Windows
             * application we wouldn't do this because it is inefficient.
             */
            tv.tv_sec = 1;
            tv.tv_usec = 0;
            i = select(width, (void *)&readfds, NULL, NULL, &tv);
2331
            if (has_stdin_waiting())
2332
                read_from_terminal = 1;
2333 2334
            if ((i < 0) || (!i && !read_from_terminal))
                continue;
2335
#else
2336 2337 2338 2339 2340 2341 2342 2343 2344 2345 2346 2347 2348 2349 2350
            if ((SSL_version(con) == DTLS1_VERSION) &&
                DTLSv1_get_timeout(con, &timeout))
                timeoutp = &timeout;
            else
                timeoutp = NULL;

            i = select(width, (void *)&readfds, NULL, NULL, timeoutp);

            if ((SSL_version(con) == DTLS1_VERSION)
                && DTLSv1_handle_timeout(con) > 0) {
                BIO_printf(bio_err, "TIMEOUT occurred\n");
            }

            if (i <= 0)
                continue;
2351
            if (FD_ISSET(fileno_stdin(), &readfds))
2352 2353 2354 2355 2356 2357 2358 2359 2360
                read_from_terminal = 1;
#endif
            if (FD_ISSET(s, &readfds))
                read_from_sslcon = 1;
        }
        if (read_from_terminal) {
            if (s_crlf) {
                int j, lf_num;

2361 2362
                i = raw_read_stdin(buf, bufsize / 2);
                lf_num = 0;
2363 2364 2365 2366 2367 2368 2369 2370 2371 2372 2373 2374 2375
                /* both loops are skipped when i <= 0 */
                for (j = 0; j < i; j++)
                    if (buf[j] == '\n')
                        lf_num++;
                for (j = i - 1; j >= 0; j--) {
                    buf[j + lf_num] = buf[j];
                    if (buf[j] == '\n') {
                        lf_num--;
                        i++;
                        buf[j + lf_num] = '\r';
                    }
                }
                assert(lf_num == 0);
2376
            } else
2377
                i = raw_read_stdin(buf, bufsize);
2378

2379 2380 2381
            if (!s_quiet && !s_brief) {
                if ((i <= 0) || (buf[0] == 'Q')) {
                    BIO_printf(bio_s_out, "DONE\n");
2382
                    (void)BIO_flush(bio_s_out);
R
Rich Salz 已提交
2383
                    BIO_closesocket(s);
2384 2385 2386 2387 2388 2389
                    close_accept_socket();
                    ret = -11;
                    goto err;
                }
                if ((i <= 0) || (buf[0] == 'q')) {
                    BIO_printf(bio_s_out, "DONE\n");
2390
                    (void)BIO_flush(bio_s_out);
2391
                    if (SSL_version(con) != DTLS1_VERSION)
R
Rich Salz 已提交
2392
                        BIO_closesocket(s);
2393 2394 2395 2396 2397
                    /*
                     * close_accept_socket(); ret= -11;
                     */
                    goto err;
                }
2398 2399 2400 2401 2402 2403 2404 2405
#ifndef OPENSSL_NO_HEARTBEATS
                if ((buf[0] == 'B') && ((buf[1] == '\n') || (buf[1] == '\r'))) {
                    BIO_printf(bio_err, "HEARTBEATING\n");
                    SSL_heartbeat(con);
                    i = 0;
                    continue;
                }
#endif
2406 2407 2408 2409 2410 2411 2412 2413 2414 2415 2416 2417 2418 2419 2420 2421 2422 2423 2424 2425 2426 2427 2428 2429
                if ((buf[0] == 'r') && ((buf[1] == '\n') || (buf[1] == '\r'))) {
                    SSL_renegotiate(con);
                    i = SSL_do_handshake(con);
                    printf("SSL_do_handshake -> %d\n", i);
                    i = 0;      /* 13; */
                    continue;
                    /*
                     * strcpy(buf,"server side RE-NEGOTIATE\n");
                     */
                }
                if ((buf[0] == 'R') && ((buf[1] == '\n') || (buf[1] == '\r'))) {
                    SSL_set_verify(con,
                                   SSL_VERIFY_PEER | SSL_VERIFY_CLIENT_ONCE,
                                   NULL);
                    SSL_renegotiate(con);
                    i = SSL_do_handshake(con);
                    printf("SSL_do_handshake -> %d\n", i);
                    i = 0;      /* 13; */
                    continue;
                    /*
                     * strcpy(buf,"server side RE-NEGOTIATE asking for client
                     * cert\n");
                     */
                }
2430 2431 2432 2433 2434 2435 2436 2437 2438 2439 2440 2441 2442 2443
                if ((buf[0] == 'K' || buf[0] == 'k')
                        && ((buf[1] == '\n') || (buf[1] == '\r'))) {
                    SSL_key_update(con, buf[0] == 'K' ?
                                        SSL_KEY_UPDATE_REQUESTED
                                        : SSL_KEY_UPDATE_NOT_REQUESTED);
                    i = SSL_do_handshake(con);
                    printf("SSL_do_handshake -> %d\n", i);
                    i = 0;
                    continue;
                    /*
                     * strcpy(buf,"server side RE-NEGOTIATE asking for client
                     * cert\n");
                     */
                }
2444 2445 2446 2447 2448 2449 2450 2451
                if (buf[0] == 'P') {
                    static const char *str = "Lets print some clear text\n";
                    BIO_write(SSL_get_wbio(con), str, strlen(str));
                }
                if (buf[0] == 'S') {
                    print_stats(bio_s_out, SSL_get_SSL_CTX(con));
                }
            }
2452
#ifdef CHARSET_EBCDIC
2453
            ebcdic2ascii(buf, buf, i);
2454
#endif
2455 2456 2457
            l = k = 0;
            for (;;) {
                /* should do a select for the write */
2458
#ifdef RENEG
F
FdaSilvaYY 已提交
2459 2460 2461 2462
                static count = 0;
                if (++count == 100) {
                    count = 0;
                    SSL_renegotiate(con);
2463
                }
2464
#endif
2465
                k = SSL_write(con, &(buf[l]), (unsigned int)i);
D
Dr. Stephen Henson 已提交
2466
#ifndef OPENSSL_NO_SRP
2467 2468
                while (SSL_get_error(con, k) == SSL_ERROR_WANT_X509_LOOKUP) {
                    BIO_printf(bio_s_out, "LOOKUP renego during write\n");
2469
                    SRP_user_pwd_free(srp_callback_parm.user);
2470
                    srp_callback_parm.user =
2471 2472
                        SRP_VBASE_get1_by_user(srp_callback_parm.vb,
                                               srp_callback_parm.login);
2473
                    if (srp_callback_parm.user)
2474 2475 2476 2477 2478 2479 2480 2481 2482 2483
                        BIO_printf(bio_s_out, "LOOKUP done %s\n",
                                   srp_callback_parm.user->info);
                    else
                        BIO_printf(bio_s_out, "LOOKUP not successful\n");
                    k = SSL_write(con, &(buf[l]), (unsigned int)i);
                }
#endif
                switch (SSL_get_error(con, k)) {
                case SSL_ERROR_NONE:
                    break;
2484 2485
                case SSL_ERROR_WANT_ASYNC:
                    BIO_printf(bio_s_out, "Write BLOCK (Async)\n");
2486
                    (void)BIO_flush(bio_s_out);
M
Matt Caswell 已提交
2487
                    wait_for_async(con);
2488
                    break;
2489 2490 2491 2492
                case SSL_ERROR_WANT_WRITE:
                case SSL_ERROR_WANT_READ:
                case SSL_ERROR_WANT_X509_LOOKUP:
                    BIO_printf(bio_s_out, "Write BLOCK\n");
2493
                    (void)BIO_flush(bio_s_out);
2494
                    break;
M
Matt Caswell 已提交
2495 2496 2497 2498
                case SSL_ERROR_WANT_ASYNC_JOB:
                    /*
                     * This shouldn't ever happen in s_server. Treat as an error
                     */
2499 2500 2501
                case SSL_ERROR_SYSCALL:
                case SSL_ERROR_SSL:
                    BIO_printf(bio_s_out, "ERROR\n");
2502
                    (void)BIO_flush(bio_s_out);
2503 2504 2505 2506 2507 2508
                    ERR_print_errors(bio_err);
                    ret = 1;
                    goto err;
                    /* break; */
                case SSL_ERROR_ZERO_RETURN:
                    BIO_printf(bio_s_out, "DONE\n");
2509
                    (void)BIO_flush(bio_s_out);
2510 2511 2512
                    ret = 1;
                    goto err;
                }
2513 2514 2515 2516
                if (k > 0) {
                    l += k;
                    i -= k;
                }
2517 2518 2519 2520 2521
                if (i <= 0)
                    break;
            }
        }
        if (read_from_sslcon) {
M
Matt Caswell 已提交
2522 2523 2524 2525 2526 2527 2528
            /*
             * init_ssl_connection handles all async events itself so if we're
             * waiting for async then we shouldn't go back into
             * init_ssl_connection
             */
            if ((!async || !SSL_waiting_for_async(con))
                    && !SSL_is_init_finished(con)) {
2529 2530 2531 2532 2533 2534 2535 2536 2537 2538 2539 2540
                i = init_ssl_connection(con);

                if (i < 0) {
                    ret = 0;
                    goto err;
                } else if (i == 0) {
                    ret = 1;
                    goto err;
                }
            } else {
 again:
                i = SSL_read(con, (char *)buf, bufsize);
D
Dr. Stephen Henson 已提交
2541
#ifndef OPENSSL_NO_SRP
2542 2543
                while (SSL_get_error(con, i) == SSL_ERROR_WANT_X509_LOOKUP) {
                    BIO_printf(bio_s_out, "LOOKUP renego during read\n");
2544
                    SRP_user_pwd_free(srp_callback_parm.user);
2545
                    srp_callback_parm.user =
2546 2547
                        SRP_VBASE_get1_by_user(srp_callback_parm.vb,
                                               srp_callback_parm.login);
2548 2549 2550 2551 2552 2553 2554 2555 2556 2557
                    if (srp_callback_parm.user)
                        BIO_printf(bio_s_out, "LOOKUP done %s\n",
                                   srp_callback_parm.user->info);
                    else
                        BIO_printf(bio_s_out, "LOOKUP not successful\n");
                    i = SSL_read(con, (char *)buf, bufsize);
                }
#endif
                switch (SSL_get_error(con, i)) {
                case SSL_ERROR_NONE:
2558
#ifdef CHARSET_EBCDIC
2559 2560 2561
                    ascii2ebcdic(buf, buf, i);
#endif
                    raw_write_stdout(buf, (unsigned int)i);
2562
                    (void)BIO_flush(bio_s_out);
2563
                    if (SSL_has_pending(con))
2564 2565
                        goto again;
                    break;
2566
                case SSL_ERROR_WANT_ASYNC:
M
Matt Caswell 已提交
2567
                    BIO_printf(bio_s_out, "Read BLOCK (Async)\n");
2568
                    (void)BIO_flush(bio_s_out);
M
Matt Caswell 已提交
2569 2570
                    wait_for_async(con);
                    break;
2571 2572 2573
                case SSL_ERROR_WANT_WRITE:
                case SSL_ERROR_WANT_READ:
                    BIO_printf(bio_s_out, "Read BLOCK\n");
2574
                    (void)BIO_flush(bio_s_out);
2575
                    break;
M
Matt Caswell 已提交
2576 2577 2578 2579
                case SSL_ERROR_WANT_ASYNC_JOB:
                    /*
                     * This shouldn't ever happen in s_server. Treat as an error
                     */
2580 2581 2582
                case SSL_ERROR_SYSCALL:
                case SSL_ERROR_SSL:
                    BIO_printf(bio_s_out, "ERROR\n");
2583
                    (void)BIO_flush(bio_s_out);
2584 2585 2586 2587 2588
                    ERR_print_errors(bio_err);
                    ret = 1;
                    goto err;
                case SSL_ERROR_ZERO_RETURN:
                    BIO_printf(bio_s_out, "DONE\n");
2589
                    (void)BIO_flush(bio_s_out);
2590 2591 2592 2593 2594 2595 2596 2597 2598 2599 2600 2601 2602
                    ret = 1;
                    goto err;
                }
            }
        }
    }
 err:
    if (con != NULL) {
        BIO_printf(bio_s_out, "shutting down SSL\n");
        SSL_set_shutdown(con, SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN);
        SSL_free(con);
    }
    BIO_printf(bio_s_out, "CONNECTION CLOSED\n");
R
Rich Salz 已提交
2603
    OPENSSL_clear_free(buf, bufsize);
2604 2605
    if (ret >= 0)
        BIO_printf(bio_s_out, "ACCEPT\n");
R
Rich Salz 已提交
2606
    (void)BIO_flush(bio_s_out);
2607 2608
    return (ret);
}
2609

U
Ulf Möller 已提交
2610
static void close_accept_socket(void)
2611 2612 2613
{
    BIO_printf(bio_err, "shutdown accept socket\n");
    if (accept_socket >= 0) {
R
Rich Salz 已提交
2614
        BIO_closesocket(accept_socket);
2615 2616
    }
}
2617

M
Matt Caswell 已提交
2618 2619 2620 2621 2622 2623 2624 2625 2626 2627
static int is_retryable(SSL *con, int i)
{
    int err = SSL_get_error(con, i);

    /* If it's not a fatal error, it must be retryable */
    return (err != SSL_ERROR_SSL)
           && (err != SSL_ERROR_SYSCALL)
           && (err != SSL_ERROR_ZERO_RETURN);
}

U
Ulf Möller 已提交
2628
static int init_ssl_connection(SSL *con)
2629 2630
{
    int i;
2631
    long verify_err;
2632
    int retry = 0;
2633

2634
#ifndef OPENSSL_NO_DTLS
2635
    if (dtlslisten) {
2636 2637 2638 2639 2640 2641
        BIO_ADDR *client = NULL;

        if ((client = BIO_ADDR_new()) == NULL) {
            BIO_printf(bio_err, "ERROR - memory\n");
            return 0;
        }
2642
        i = DTLSv1_listen(con, client);
2643 2644
        if (i > 0) {
            BIO *wbio;
2645
            int fd = -1;
2646 2647

            wbio = SSL_get_wbio(con);
2648
            if (wbio) {
2649 2650 2651
                BIO_get_fd(wbio, &fd);
            }

2652
            if (!wbio || BIO_connect(fd, client, 0) == 0) {
2653
                BIO_printf(bio_err, "ERROR - unable to connect\n");
2654
                BIO_ADDR_free(client);
2655 2656
                return 0;
            }
2657
            BIO_ADDR_free(client);
2658 2659
            dtlslisten = 0;
            i = SSL_accept(con);
2660 2661
        } else {
            BIO_ADDR_free(client);
2662 2663 2664
        }
    } else
#endif
2665 2666

    do {
2667
        i = SSL_accept(con);
2668

2669
        if (i <= 0)
M
Matt Caswell 已提交
2670
            retry = is_retryable(con, i);
2671
#ifdef CERT_CB_TEST_RETRY
2672
        {
F
FdaSilvaYY 已提交
2673 2674
            while (i <= 0
                    && SSL_get_error(con, i) == SSL_ERROR_WANT_X509_LOOKUP
2675 2676
                    && SSL_get_state(con) == TLS_ST_SR_CLNT_HELLO) {
                BIO_printf(bio_err,
F
FdaSilvaYY 已提交
2677
                           "LOOKUP from certificate callback during accept\n");
2678
                i = SSL_accept(con);
2679
                if (i <= 0)
M
Matt Caswell 已提交
2680
                    retry = is_retryable(con, i);
2681
            }
2682
        }
2683
#endif
2684

D
Dr. Stephen Henson 已提交
2685
#ifndef OPENSSL_NO_SRP
F
FdaSilvaYY 已提交
2686 2687
        while (i <= 0
               && SSL_get_error(con, i) == SSL_ERROR_WANT_X509_LOOKUP) {
2688 2689
            BIO_printf(bio_s_out, "LOOKUP during accept %s\n",
                       srp_callback_parm.login);
2690
            SRP_user_pwd_free(srp_callback_parm.user);
2691
            srp_callback_parm.user =
2692 2693
                SRP_VBASE_get1_by_user(srp_callback_parm.vb,
                                       srp_callback_parm.login);
2694 2695 2696 2697 2698 2699
            if (srp_callback_parm.user)
                BIO_printf(bio_s_out, "LOOKUP done %s\n",
                           srp_callback_parm.user->info);
            else
                BIO_printf(bio_s_out, "LOOKUP not successful\n");
            i = SSL_accept(con);
2700
            if (i <= 0)
M
Matt Caswell 已提交
2701
                retry = is_retryable(con, i);
2702
        }
2703
#endif
2704
    } while (i < 0 && SSL_waiting_for_async(con));
2705 2706

    if (i <= 0) {
2707
        if ((dtlslisten && i == 0)
2708
                || (!dtlslisten && retry)) {
2709 2710 2711 2712 2713
            BIO_printf(bio_s_out, "DELAY\n");
            return (1);
        }

        BIO_printf(bio_err, "ERROR\n");
2714

2715 2716
        verify_err = SSL_get_verify_result(con);
        if (verify_err != X509_V_OK) {
2717
            BIO_printf(bio_err, "verify error:%s\n",
2718
                       X509_verify_cert_error_string(verify_err));
2719 2720 2721 2722 2723 2724
        }
        /* Always print any error messages */
        ERR_print_errors(bio_err);
        return (0);
    }

2725 2726 2727 2728 2729 2730 2731 2732 2733 2734 2735 2736 2737 2738 2739 2740
    print_connection_info(con);
    return 1;
}

static void print_connection_info(SSL *con)
{
    const char *str;
    X509 *peer;
    char buf[BUFSIZ];
#if !defined(OPENSSL_NO_NEXTPROTONEG)
    const unsigned char *next_proto_neg;
    unsigned next_proto_neg_len;
#endif
    unsigned char *exportedkeymat;
    int i;

2741
    if (s_brief)
R
Rich Salz 已提交
2742
        print_ssl_summary(con);
2743 2744 2745 2746 2747 2748 2749

    PEM_write_bio_SSL_SESSION(bio_s_out, SSL_get_session(con));

    peer = SSL_get_peer_certificate(con);
    if (peer != NULL) {
        BIO_printf(bio_s_out, "Client certificate\n");
        PEM_write_bio_X509(bio_s_out, peer);
2750
        dump_cert_text(bio_s_out, peer);
2751
        X509_free(peer);
F
FdaSilvaYY 已提交
2752
        peer = NULL;
2753 2754 2755 2756 2757 2758
    }

    if (SSL_get_shared_ciphers(con, buf, sizeof buf) != NULL)
        BIO_printf(bio_s_out, "Shared ciphers:%s\n", buf);
    str = SSL_CIPHER_get_name(SSL_get_current_cipher(con));
    ssl_print_sigalgs(bio_s_out, con);
2759
#ifndef OPENSSL_NO_EC
2760
    ssl_print_point_formats(bio_s_out, con);
2761
    ssl_print_groups(bio_s_out, con, 0);
2762
#endif
2763
    print_ca_names(bio_s_out, con);
2764
    BIO_printf(bio_s_out, "CIPHER is %s\n", (str != NULL) ? str : "(NONE)");
2765

2766
#if !defined(OPENSSL_NO_NEXTPROTONEG)
2767 2768 2769 2770 2771 2772
    SSL_get0_next_proto_negotiated(con, &next_proto_neg, &next_proto_neg_len);
    if (next_proto_neg) {
        BIO_printf(bio_s_out, "NEXTPROTO is ");
        BIO_write(bio_s_out, next_proto_neg, next_proto_neg_len);
        BIO_printf(bio_s_out, "\n");
    }
B
Ben Laurie 已提交
2773
#endif
P
Piotr Sikora 已提交
2774
#ifndef OPENSSL_NO_SRTP
2775 2776 2777 2778 2779 2780 2781 2782 2783
    {
        SRTP_PROTECTION_PROFILE *srtp_profile
            = SSL_get_selected_srtp_profile(con);

        if (srtp_profile)
            BIO_printf(bio_s_out, "SRTP Extension negotiated, profile=%s\n",
                       srtp_profile->name);
    }
#endif
2784
    if (SSL_session_reused(con))
2785 2786 2787
        BIO_printf(bio_s_out, "Reused session-id\n");
    BIO_printf(bio_s_out, "Secure Renegotiation IS%s supported\n",
               SSL_get_secure_renegotiation_support(con) ? "" : " NOT");
T
Todd Short 已提交
2788 2789 2790
    if ((SSL_get_options(con) & SSL_OP_NO_RENEGOTIATION))
        BIO_printf(bio_s_out, "Renegotiation is DISABLED\n");

2791 2792 2793 2794
    if (keymatexportlabel != NULL) {
        BIO_printf(bio_s_out, "Keying material exporter:\n");
        BIO_printf(bio_s_out, "    Label: '%s'\n", keymatexportlabel);
        BIO_printf(bio_s_out, "    Length: %i bytes\n", keymatexportlen);
R
Rich Salz 已提交
2795 2796 2797 2798 2799 2800 2801 2802 2803 2804 2805 2806
        exportedkeymat = app_malloc(keymatexportlen, "export key");
        if (!SSL_export_keying_material(con, exportedkeymat,
                                        keymatexportlen,
                                        keymatexportlabel,
                                        strlen(keymatexportlabel),
                                        NULL, 0, 0)) {
            BIO_printf(bio_s_out, "    Error\n");
        } else {
            BIO_printf(bio_s_out, "    Keying material: ");
            for (i = 0; i < keymatexportlen; i++)
                BIO_printf(bio_s_out, "%02X", exportedkeymat[i]);
            BIO_printf(bio_s_out, "\n");
2807
        }
R
Rich Salz 已提交
2808
        OPENSSL_free(exportedkeymat);
2809 2810
    }

F
FdaSilvaYY 已提交
2811
    (void)BIO_flush(bio_s_out);
2812
}
2813

2814
#ifndef OPENSSL_NO_DH
N
Nils Larsch 已提交
2815
static DH *load_dh_param(const char *dhfile)
2816 2817 2818 2819 2820 2821 2822 2823
{
    DH *ret = NULL;
    BIO *bio;

    if ((bio = BIO_new_file(dhfile, "r")) == NULL)
        goto err;
    ret = PEM_read_bio_DHparams(bio, NULL, NULL, NULL);
 err:
R
Rich Salz 已提交
2824
    BIO_free(bio);
2825 2826
    return (ret);
}
2827
#endif
2828

M
Matt Caswell 已提交
2829
static int www_body(int s, int stype, int prot, unsigned char *context)
2830 2831 2832 2833 2834 2835 2836
{
    char *buf = NULL;
    int ret = 1;
    int i, j, k, dot;
    SSL *con;
    const SSL_CIPHER *c;
    BIO *io, *ssl_bio, *sbio;
2837 2838 2839
#ifdef RENEG
    int total_bytes = 0;
#endif
2840 2841 2842 2843 2844
    int width;
    fd_set readfds;

    /* Set width for a select call if needed */
    width = s + 1;
2845

R
Rich Salz 已提交
2846
    buf = app_malloc(bufsize, "server www buffer");
2847 2848 2849 2850
    io = BIO_new(BIO_f_buffer());
    ssl_bio = BIO_new(BIO_f_ssl());
    if ((io == NULL) || (ssl_bio == NULL))
        goto err;
2851

2852
    if (s_nbio) {
R
Rich Salz 已提交
2853
        if (!BIO_socket_nbio(s, 1))
2854
            ERR_print_errors(bio_err);
R
Rich Salz 已提交
2855 2856
        else if (!s_quiet)
            BIO_printf(bio_err, "Turned on non blocking io\n");
2857
    }
2858

2859 2860 2861
    /* lets make the output buffer a reasonable size */
    if (!BIO_set_write_buffer_size(io, bufsize))
        goto err;
2862

2863 2864
    if ((con = SSL_new(ctx)) == NULL)
        goto err;
2865

2866 2867 2868 2869
    if (s_tlsextdebug) {
        SSL_set_tlsext_debug_callback(con, tlsext_cb);
        SSL_set_tlsext_debug_arg(con, bio_s_out);
    }
2870

F
FdaSilvaYY 已提交
2871 2872 2873
    if (context
        && !SSL_set_session_id_context(con, context,
                                       strlen((char *)context)))
M
Matt Caswell 已提交
2874
        goto err;
2875 2876 2877 2878 2879 2880 2881 2882 2883 2884 2885 2886 2887 2888

    sbio = BIO_new_socket(s, BIO_NOCLOSE);
    if (s_nbio_test) {
        BIO *test;

        test = BIO_new(BIO_f_nbio_test());
        sbio = BIO_push(test, sbio);
    }
    SSL_set_bio(con, sbio, sbio);
    SSL_set_accept_state(con);

    /* SSL_set_fd(con,s); */
    BIO_set_ssl(ssl_bio, con, BIO_CLOSE);
    BIO_push(io, ssl_bio);
2889
#ifdef CHARSET_EBCDIC
2890
    io = BIO_push(BIO_new(BIO_f_ebcdic_filter()), io);
2891
#endif
2892

2893 2894 2895 2896 2897
    if (s_debug) {
        BIO_set_callback(SSL_get_rbio(con), bio_dump_callback);
        BIO_set_callback_arg(SSL_get_rbio(con), (char *)bio_s_out);
    }
    if (s_msg) {
2898
#ifndef OPENSSL_NO_SSL_TRACE
2899 2900 2901 2902 2903 2904 2905 2906 2907 2908 2909
        if (s_msg == 2)
            SSL_set_msg_callback(con, SSL_trace);
        else
#endif
            SSL_set_msg_callback(con, msg_cb);
        SSL_set_msg_callback_arg(con, bio_s_msg ? bio_s_msg : bio_s_out);
    }

    for (;;) {
        i = BIO_gets(io, buf, bufsize - 1);
        if (i < 0) {            /* error */
M
Matt Caswell 已提交
2910
            if (!BIO_should_retry(io) && !SSL_waiting_for_async(con)) {
2911 2912 2913 2914 2915
                if (!s_quiet)
                    ERR_print_errors(bio_err);
                goto err;
            } else {
                BIO_printf(bio_s_out, "read R BLOCK\n");
D
Dr. Stephen Henson 已提交
2916 2917 2918 2919
#ifndef OPENSSL_NO_SRP
                if (BIO_should_io_special(io)
                    && BIO_get_retry_reason(io) == BIO_RR_SSL_X509_LOOKUP) {
                    BIO_printf(bio_s_out, "LOOKUP renego during read\n");
2920
                    SRP_user_pwd_free(srp_callback_parm.user);
D
Dr. Stephen Henson 已提交
2921
                    srp_callback_parm.user =
2922 2923
                        SRP_VBASE_get1_by_user(srp_callback_parm.vb,
                                               srp_callback_parm.login);
D
Dr. Stephen Henson 已提交
2924 2925 2926 2927 2928 2929 2930 2931
                    if (srp_callback_parm.user)
                        BIO_printf(bio_s_out, "LOOKUP done %s\n",
                                   srp_callback_parm.user->info);
                    else
                        BIO_printf(bio_s_out, "LOOKUP not successful\n");
                    continue;
                }
#endif
R
Rich Salz 已提交
2932
#if !defined(OPENSSL_SYS_MSDOS)
2933 2934 2935 2936 2937 2938 2939 2940
                sleep(1);
#endif
                continue;
            }
        } else if (i == 0) {    /* end of input */
            ret = 1;
            goto end;
        }
2941

2942 2943
        /* else we have data */
        if (((www == 1) && (strncmp("GET ", buf, 4) == 0)) ||
2944
            ((www == 2) && (strncmp("GET /stats ", buf, 11) == 0))) {
2945
            char *p;
F
FdaSilvaYY 已提交
2946
            X509 *peer = NULL;
2947 2948 2949 2950 2951 2952 2953 2954 2955 2956
            STACK_OF(SSL_CIPHER) *sk;
            static const char *space = "                          ";

            if (www == 1 && strncmp("GET /reneg", buf, 10) == 0) {
                if (strncmp("GET /renegcert", buf, 14) == 0)
                    SSL_set_verify(con,
                                   SSL_VERIFY_PEER | SSL_VERIFY_CLIENT_ONCE,
                                   NULL);
                i = SSL_renegotiate(con);
                BIO_printf(bio_s_out, "SSL_renegotiate -> %d\n", i);
2957
                /* Send the HelloRequest */
2958 2959 2960 2961 2962 2963 2964
                i = SSL_do_handshake(con);
                if (i <= 0) {
                    BIO_printf(bio_s_out, "SSL_do_handshake() Retval %d\n",
                               SSL_get_error(con, i));
                    ERR_print_errors(bio_err);
                    goto err;
                }
2965 2966 2967 2968 2969
                /* Wait for a ClientHello to come back */
                FD_ZERO(&readfds);
                openssl_fdset(s, &readfds);
                i = select(width, (void *)&readfds, NULL, NULL, NULL);
                if (i <= 0 || !FD_ISSET(s, &readfds)) {
F
FdaSilvaYY 已提交
2970 2971
                    BIO_printf(bio_s_out,
                               "Error waiting for client response\n");
2972 2973 2974
                    ERR_print_errors(bio_err);
                    goto err;
                }
2975
                /*
F
FdaSilvaYY 已提交
2976
                 * We're not actually expecting any data here and we ignore
2977 2978 2979 2980 2981
                 * any that is sent. This is just to force the handshake that
                 * we're expecting to come from the client. If they haven't
                 * sent one there's not much we can do.
                 */
                BIO_gets(io, buf, bufsize - 1);
2982 2983 2984 2985 2986 2987
            }

            BIO_puts(io,
                     "HTTP/1.0 200 ok\r\nContent-type: text/html\r\n\r\n");
            BIO_puts(io, "<HTML><BODY BGCOLOR=\"#ffffff\">\n");
            BIO_puts(io, "<pre>\n");
F
FdaSilvaYY 已提交
2988
            /* BIO_puts(io, OpenSSL_version(OPENSSL_VERSION)); */
2989 2990
            BIO_puts(io, "\n");
            for (i = 0; i < local_argc; i++) {
2991 2992 2993 2994 2995 2996 2997 2998 2999 3000 3001 3002 3003 3004 3005 3006
                const char *myp;
                for (myp = local_argv[i]; *myp; myp++)
                    switch (*myp) {
                    case '<':
                        BIO_puts(io, "&lt;");
                        break;
                    case '>':
                        BIO_puts(io, "&gt;");
                        break;
                    case '&':
                        BIO_puts(io, "&amp;");
                        break;
                    default:
                        BIO_write(io, myp, 1);
                        break;
                    }
3007 3008 3009 3010 3011 3012 3013 3014 3015 3016 3017 3018 3019 3020 3021 3022 3023
                BIO_write(io, " ", 1);
            }
            BIO_puts(io, "\n");

            BIO_printf(io,
                       "Secure Renegotiation IS%s supported\n",
                       SSL_get_secure_renegotiation_support(con) ?
                       "" : " NOT");

            /*
             * The following is evil and should not really be done
             */
            BIO_printf(io, "Ciphers supported in s_server binary\n");
            sk = SSL_get_ciphers(con);
            j = sk_SSL_CIPHER_num(sk);
            for (i = 0; i < j; i++) {
                c = sk_SSL_CIPHER_value(sk, i);
3024
                BIO_printf(io, "%-11s:%-25s ",
3025 3026 3027 3028 3029 3030 3031 3032 3033 3034 3035 3036 3037 3038 3039 3040 3041 3042 3043 3044 3045 3046 3047 3048 3049 3050
                           SSL_CIPHER_get_version(c), SSL_CIPHER_get_name(c));
                if ((((i + 1) % 2) == 0) && (i + 1 != j))
                    BIO_puts(io, "\n");
            }
            BIO_puts(io, "\n");
            p = SSL_get_shared_ciphers(con, buf, bufsize);
            if (p != NULL) {
                BIO_printf(io,
                           "---\nCiphers common between both SSL end points:\n");
                j = i = 0;
                while (*p) {
                    if (*p == ':') {
                        BIO_write(io, space, 26 - j);
                        i++;
                        j = 0;
                        BIO_write(io, ((i % 3) ? " " : "\n"), 1);
                    } else {
                        BIO_write(io, p, 1);
                        j++;
                    }
                    p++;
                }
                BIO_puts(io, "\n");
            }
            ssl_print_sigalgs(io, con);
#ifndef OPENSSL_NO_EC
3051
            ssl_print_groups(io, con, 0);
3052
#endif
3053
            print_ca_names(io, con);
3054
            BIO_printf(io, (SSL_session_reused(con)
3055 3056 3057 3058 3059 3060 3061 3062 3063 3064 3065 3066 3067
                            ? "---\nReused, " : "---\nNew, "));
            c = SSL_get_current_cipher(con);
            BIO_printf(io, "%s, Cipher is %s\n",
                       SSL_CIPHER_get_version(c), SSL_CIPHER_get_name(c));
            SSL_SESSION_print(io, SSL_get_session(con));
            BIO_printf(io, "---\n");
            print_stats(io, SSL_get_SSL_CTX(con));
            BIO_printf(io, "---\n");
            peer = SSL_get_peer_certificate(con);
            if (peer != NULL) {
                BIO_printf(io, "Client certificate\n");
                X509_print(io, peer);
                PEM_write_bio_X509(io, peer);
F
FdaSilvaYY 已提交
3068 3069
                X509_free(peer);
                peer = NULL;
3070 3071 3072 3073 3074 3075 3076 3077 3078 3079 3080 3081 3082 3083 3084 3085 3086 3087 3088 3089 3090 3091 3092 3093 3094 3095 3096 3097 3098 3099 3100 3101 3102 3103 3104 3105 3106 3107 3108 3109 3110 3111 3112 3113 3114 3115 3116 3117 3118 3119 3120 3121 3122 3123
            } else
                BIO_puts(io, "no client certificate available\n");
            BIO_puts(io, "</BODY></HTML>\r\n\r\n");
            break;
        } else if ((www == 2 || www == 3)
                   && (strncmp("GET /", buf, 5) == 0)) {
            BIO *file;
            char *p, *e;
            static const char *text =
                "HTTP/1.0 200 ok\r\nContent-type: text/plain\r\n\r\n";

            /* skip the '/' */
            p = &(buf[5]);

            dot = 1;
            for (e = p; *e != '\0'; e++) {
                if (e[0] == ' ')
                    break;

                switch (dot) {
                case 1:
                    dot = (e[0] == '.') ? 2 : 0;
                    break;
                case 2:
                    dot = (e[0] == '.') ? 3 : 0;
                    break;
                case 3:
                    dot = (e[0] == '/') ? -1 : 0;
                    break;
                }
                if (dot == 0)
                    dot = (e[0] == '/') ? 1 : 0;
            }
            dot = (dot == 3) || (dot == -1); /* filename contains ".."
                                              * component */

            if (*e == '\0') {
                BIO_puts(io, text);
                BIO_printf(io, "'%s' is an invalid file name\r\n", p);
                break;
            }
            *e = '\0';

            if (dot) {
                BIO_puts(io, text);
                BIO_printf(io, "'%s' contains '..' reference\r\n", p);
                break;
            }

            if (*p == '/') {
                BIO_puts(io, text);
                BIO_printf(io, "'%s' is an invalid path\r\n", p);
                break;
            }
3124

3125 3126 3127 3128 3129 3130 3131 3132 3133 3134 3135 3136 3137 3138 3139 3140 3141 3142 3143 3144 3145 3146 3147 3148 3149 3150 3151 3152 3153 3154 3155 3156 3157
            /* if a directory, do the index thang */
            if (app_isdir(p) > 0) {
                BIO_puts(io, text);
                BIO_printf(io, "'%s' is a directory\r\n", p);
                break;
            }

            if ((file = BIO_new_file(p, "r")) == NULL) {
                BIO_puts(io, text);
                BIO_printf(io, "Error opening '%s'\r\n", p);
                ERR_print_errors(io);
                break;
            }

            if (!s_quiet)
                BIO_printf(bio_err, "FILE:%s\n", p);

            if (www == 2) {
                i = strlen(p);
                if (((i > 5) && (strcmp(&(p[i - 5]), ".html") == 0)) ||
                    ((i > 4) && (strcmp(&(p[i - 4]), ".php") == 0)) ||
                    ((i > 4) && (strcmp(&(p[i - 4]), ".htm") == 0)))
                    BIO_puts(io,
                             "HTTP/1.0 200 ok\r\nContent-type: text/html\r\n\r\n");
                else
                    BIO_puts(io,
                             "HTTP/1.0 200 ok\r\nContent-type: text/plain\r\n\r\n");
            }
            /* send the file */
            for (;;) {
                i = BIO_read(file, buf, bufsize);
                if (i <= 0)
                    break;
3158

3159
#ifdef RENEG
3160
                total_bytes += i;
R
Rich Salz 已提交
3161
                BIO_printf(bio_err, "%d\n", i);
3162 3163
                if (total_bytes > 3 * 1024) {
                    total_bytes = 0;
R
Rich Salz 已提交
3164
                    BIO_printf(bio_err, "RENEGOTIATE\n");
3165 3166 3167 3168 3169
                    SSL_renegotiate(con);
                }
#endif

                for (j = 0; j < i;) {
3170
#ifdef RENEG
F
FdaSilvaYY 已提交
3171 3172 3173
                    static count = 0;
                    if (++count == 13) {
                        SSL_renegotiate(con);
3174 3175 3176 3177
                    }
#endif
                    k = BIO_write(io, &(buf[j]), i - j);
                    if (k <= 0) {
F
FdaSilvaYY 已提交
3178 3179
                        if (!BIO_should_retry(io)
                            && !SSL_waiting_for_async(con))
3180 3181 3182 3183 3184 3185 3186 3187 3188 3189 3190 3191 3192 3193 3194 3195 3196 3197 3198 3199 3200 3201 3202 3203 3204 3205
                            goto write_error;
                        else {
                            BIO_printf(bio_s_out, "rwrite W BLOCK\n");
                        }
                    } else {
                        j += k;
                    }
                }
            }
 write_error:
            BIO_free(file);
            break;
        }
    }

    for (;;) {
        i = (int)BIO_flush(io);
        if (i <= 0) {
            if (!BIO_should_retry(io))
                break;
        } else
            break;
    }
 end:
    /* make sure we re-use sessions */
    SSL_set_shutdown(con, SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN);
3206

3207 3208 3209
 err:
    if (ret >= 0)
        BIO_printf(bio_s_out, "ACCEPT\n");
R
Rich Salz 已提交
3210
    OPENSSL_free(buf);
R
Rich Salz 已提交
3211
    BIO_free_all(io);
3212 3213
    return (ret);
}
3214

M
Matt Caswell 已提交
3215
static int rev_body(int s, int stype, int prot, unsigned char *context)
3216 3217 3218 3219 3220 3221
{
    char *buf = NULL;
    int i;
    int ret = 1;
    SSL *con;
    BIO *io, *ssl_bio, *sbio;
3222

R
Rich Salz 已提交
3223
    buf = app_malloc(bufsize, "server rev buffer");
3224 3225 3226 3227
    io = BIO_new(BIO_f_buffer());
    ssl_bio = BIO_new(BIO_f_ssl());
    if ((io == NULL) || (ssl_bio == NULL))
        goto err;
3228

3229 3230 3231
    /* lets make the output buffer a reasonable size */
    if (!BIO_set_write_buffer_size(io, bufsize))
        goto err;
3232

3233 3234
    if ((con = SSL_new(ctx)) == NULL)
        goto err;
3235

3236 3237 3238 3239
    if (s_tlsextdebug) {
        SSL_set_tlsext_debug_callback(con, tlsext_cb);
        SSL_set_tlsext_debug_arg(con, bio_s_out);
    }
F
FdaSilvaYY 已提交
3240 3241 3242
    if (context
        && !SSL_set_session_id_context(con, context,
                                       strlen((char *)context))) {
M
Matt Caswell 已提交
3243 3244 3245
        ERR_print_errors(bio_err);
        goto err;
    }
3246 3247 3248 3249 3250 3251 3252

    sbio = BIO_new_socket(s, BIO_NOCLOSE);
    SSL_set_bio(con, sbio, sbio);
    SSL_set_accept_state(con);

    BIO_set_ssl(ssl_bio, con, BIO_CLOSE);
    BIO_push(io, ssl_bio);
3253
#ifdef CHARSET_EBCDIC
3254
    io = BIO_push(BIO_new(BIO_f_ebcdic_filter()), io);
3255 3256
#endif

3257 3258 3259 3260 3261
    if (s_debug) {
        BIO_set_callback(SSL_get_rbio(con), bio_dump_callback);
        BIO_set_callback_arg(SSL_get_rbio(con), (char *)bio_s_out);
    }
    if (s_msg) {
3262
#ifndef OPENSSL_NO_SSL_TRACE
3263 3264 3265 3266 3267 3268 3269 3270 3271 3272 3273 3274 3275 3276 3277 3278 3279
        if (s_msg == 2)
            SSL_set_msg_callback(con, SSL_trace);
        else
#endif
            SSL_set_msg_callback(con, msg_cb);
        SSL_set_msg_callback_arg(con, bio_s_msg ? bio_s_msg : bio_s_out);
    }

    for (;;) {
        i = BIO_do_handshake(io);
        if (i > 0)
            break;
        if (!BIO_should_retry(io)) {
            BIO_puts(bio_err, "CONNECTION FAILURE\n");
            ERR_print_errors(bio_err);
            goto end;
        }
D
Dr. Stephen Henson 已提交
3280 3281 3282 3283
#ifndef OPENSSL_NO_SRP
        if (BIO_should_io_special(io)
            && BIO_get_retry_reason(io) == BIO_RR_SSL_X509_LOOKUP) {
            BIO_printf(bio_s_out, "LOOKUP renego during accept\n");
3284
            SRP_user_pwd_free(srp_callback_parm.user);
D
Dr. Stephen Henson 已提交
3285
            srp_callback_parm.user =
3286 3287
                SRP_VBASE_get1_by_user(srp_callback_parm.vb,
                                       srp_callback_parm.login);
D
Dr. Stephen Henson 已提交
3288 3289 3290 3291 3292 3293 3294 3295
            if (srp_callback_parm.user)
                BIO_printf(bio_s_out, "LOOKUP done %s\n",
                           srp_callback_parm.user->info);
            else
                BIO_printf(bio_s_out, "LOOKUP not successful\n");
            continue;
        }
#endif
3296 3297
    }
    BIO_printf(bio_err, "CONNECTION ESTABLISHED\n");
R
Rich Salz 已提交
3298
    print_ssl_summary(con);
3299 3300 3301 3302 3303 3304 3305 3306 3307 3308

    for (;;) {
        i = BIO_gets(io, buf, bufsize - 1);
        if (i < 0) {            /* error */
            if (!BIO_should_retry(io)) {
                if (!s_quiet)
                    ERR_print_errors(bio_err);
                goto err;
            } else {
                BIO_printf(bio_s_out, "read R BLOCK\n");
D
Dr. Stephen Henson 已提交
3309 3310 3311 3312
#ifndef OPENSSL_NO_SRP
                if (BIO_should_io_special(io)
                    && BIO_get_retry_reason(io) == BIO_RR_SSL_X509_LOOKUP) {
                    BIO_printf(bio_s_out, "LOOKUP renego during read\n");
3313
                    SRP_user_pwd_free(srp_callback_parm.user);
D
Dr. Stephen Henson 已提交
3314
                    srp_callback_parm.user =
3315 3316
                        SRP_VBASE_get1_by_user(srp_callback_parm.vb,
                                               srp_callback_parm.login);
D
Dr. Stephen Henson 已提交
3317 3318 3319 3320 3321 3322 3323 3324
                    if (srp_callback_parm.user)
                        BIO_printf(bio_s_out, "LOOKUP done %s\n",
                                   srp_callback_parm.user->info);
                    else
                        BIO_printf(bio_s_out, "LOOKUP not successful\n");
                    continue;
                }
#endif
R
Rich Salz 已提交
3325
#if !defined(OPENSSL_SYS_MSDOS)
3326 3327 3328 3329 3330 3331 3332 3333 3334 3335 3336 3337 3338 3339
                sleep(1);
#endif
                continue;
            }
        } else if (i == 0) {    /* end of input */
            ret = 1;
            BIO_printf(bio_err, "CONNECTION CLOSED\n");
            goto end;
        } else {
            char *p = buf + i - 1;
            while (i && (*p == '\n' || *p == '\r')) {
                p--;
                i--;
            }
R
Rich Salz 已提交
3340
            if (!s_ign_eof && (i == 5) && (strncmp(buf, "CLOSE", 5) == 0)) {
3341 3342 3343 3344 3345 3346 3347 3348 3349 3350 3351 3352 3353 3354 3355 3356 3357 3358 3359 3360 3361 3362
                ret = 1;
                BIO_printf(bio_err, "CONNECTION CLOSED\n");
                goto end;
            }
            BUF_reverse((unsigned char *)buf, NULL, i);
            buf[i] = '\n';
            BIO_write(io, buf, i + 1);
            for (;;) {
                i = BIO_flush(io);
                if (i > 0)
                    break;
                if (!BIO_should_retry(io))
                    goto end;
            }
        }
    }
 end:
    /* make sure we re-use sessions */
    SSL_set_shutdown(con, SSL_SENT_SHUTDOWN | SSL_RECEIVED_SHUTDOWN);

 err:

R
Rich Salz 已提交
3363
    OPENSSL_free(buf);
R
Rich Salz 已提交
3364
    BIO_free_all(io);
3365 3366
    return (ret);
}
3367

3368 3369
#define MAX_SESSION_ID_ATTEMPTS 10
static int generate_session_id(const SSL *ssl, unsigned char *id,
3370 3371 3372 3373
                               unsigned int *id_len)
{
    unsigned int count = 0;
    do {
M
Matt Caswell 已提交
3374 3375
        if (RAND_bytes(id, *id_len) <= 0)
            return 0;
3376 3377 3378 3379 3380 3381 3382 3383 3384 3385 3386 3387 3388 3389 3390 3391 3392 3393 3394 3395
        /*
         * Prefix the session_id with the required prefix. NB: If our prefix
         * is too long, clip it - but there will be worse effects anyway, eg.
         * the server could only possibly create 1 session ID (ie. the
         * prefix!) so all future session negotiations will fail due to
         * conflicts.
         */
        memcpy(id, session_id_prefix,
               (strlen(session_id_prefix) < *id_len) ?
               strlen(session_id_prefix) : *id_len);
    }
    while (SSL_has_matching_session_id(ssl, id, *id_len) &&
           (++count < MAX_SESSION_ID_ATTEMPTS));
    if (count >= MAX_SESSION_ID_ATTEMPTS)
        return 0;
    return 1;
}

/*
 * By default s_server uses an in-memory cache which caches SSL_SESSION
3396 3397 3398 3399 3400
 * structures without any serialisation. This hides some bugs which only
 * become apparent in deployed servers. By implementing a basic external
 * session cache some issues can be debugged using s_server.
 */

3401 3402 3403 3404 3405 3406 3407
typedef struct simple_ssl_session_st {
    unsigned char *id;
    unsigned int idlen;
    unsigned char *der;
    int derlen;
    struct simple_ssl_session_st *next;
} simple_ssl_session;
3408 3409 3410 3411

static simple_ssl_session *first = NULL;

static int add_session(SSL *ssl, SSL_SESSION *session)
3412
{
R
Rich Salz 已提交
3413
    simple_ssl_session *sess = app_malloc(sizeof(*sess), "get session");
3414
    unsigned char *p;
3415

3416 3417
    SSL_SESSION_get_id(session, &sess->idlen);
    sess->derlen = i2d_SSL_SESSION(session, NULL);
3418 3419
    if (sess->derlen < 0) {
        BIO_printf(bio_err, "Error encoding session\n");
R
Rich Salz 已提交
3420
        OPENSSL_free(sess);
3421 3422
        return 0;
    }
3423

R
Rich Salz 已提交
3424
    sess->id = OPENSSL_memdup(SSL_SESSION_get_id(session, NULL), sess->idlen);
R
Rich Salz 已提交
3425 3426
    sess->der = app_malloc(sess->derlen, "get session buffer");
    if (!sess->id) {
3427
        BIO_printf(bio_err, "Out of memory adding to external cache\n");
R
Rich Salz 已提交
3428 3429
        OPENSSL_free(sess->id);
        OPENSSL_free(sess->der);
M
Matt Caswell 已提交
3430 3431 3432
        OPENSSL_free(sess);
        return 0;
    }
3433
    p = sess->der;
3434 3435 3436

    /* Assume it still works. */
    if (i2d_SSL_SESSION(session, &p) != sess->derlen) {
R
Rich Salz 已提交
3437
        BIO_printf(bio_err, "Unexpected session encoding length\n");
R
Rich Salz 已提交
3438 3439 3440
        OPENSSL_free(sess->id);
        OPENSSL_free(sess->der);
        OPENSSL_free(sess);
M
Matt Caswell 已提交
3441 3442
        return 0;
    }
3443

3444 3445 3446 3447 3448
    sess->next = first;
    first = sess;
    BIO_printf(bio_err, "New session added to external cache\n");
    return 0;
}
3449

E
Emilia Kasper 已提交
3450
static SSL_SESSION *get_session(SSL *ssl, const unsigned char *id, int idlen,
3451 3452 3453 3454 3455 3456 3457 3458 3459 3460 3461 3462 3463 3464
                                int *do_copy)
{
    simple_ssl_session *sess;
    *do_copy = 0;
    for (sess = first; sess; sess = sess->next) {
        if (idlen == (int)sess->idlen && !memcmp(sess->id, id, idlen)) {
            const unsigned char *p = sess->der;
            BIO_printf(bio_err, "Lookup session: cache hit\n");
            return d2i_SSL_SESSION(NULL, &p, sess->derlen);
        }
    }
    BIO_printf(bio_err, "Lookup session: cache miss\n");
    return NULL;
}
3465 3466

static void del_session(SSL_CTX *sctx, SSL_SESSION *session)
3467 3468 3469 3470 3471 3472 3473 3474 3475 3476 3477 3478 3479 3480 3481 3482 3483 3484 3485
{
    simple_ssl_session *sess, *prev = NULL;
    const unsigned char *id;
    unsigned int idlen;
    id = SSL_SESSION_get_id(session, &idlen);
    for (sess = first; sess; sess = sess->next) {
        if (idlen == sess->idlen && !memcmp(sess->id, id, idlen)) {
            if (prev)
                prev->next = sess->next;
            else
                first = sess->next;
            OPENSSL_free(sess->id);
            OPENSSL_free(sess->der);
            OPENSSL_free(sess);
            return;
        }
        prev = sess;
    }
}
3486 3487

static void init_session_cache_ctx(SSL_CTX *sctx)
3488 3489 3490 3491 3492 3493 3494 3495
{
    SSL_CTX_set_session_cache_mode(sctx,
                                   SSL_SESS_CACHE_NO_INTERNAL |
                                   SSL_SESS_CACHE_SERVER);
    SSL_CTX_sess_set_new_cb(sctx, add_session);
    SSL_CTX_sess_set_get_cb(sctx, get_session);
    SSL_CTX_sess_set_remove_cb(sctx, del_session);
}
3496 3497

static void free_sessions(void)
3498 3499 3500 3501 3502 3503 3504 3505 3506 3507 3508
{
    simple_ssl_session *sess, *tsess;
    for (sess = first; sess;) {
        OPENSSL_free(sess->id);
        OPENSSL_free(sess->der);
        tsess = sess;
        sess = sess->next;
        OPENSSL_free(tsess);
    }
    first = NULL;
}
M
Matt Caswell 已提交
3509

F
FdaSilvaYY 已提交
3510
#endif                          /* OPENSSL_NO_SOCK */