viossl.c 9.83 KB
Newer Older
unknown's avatar
unknown committed
1 2 3 4 5 6 7 8
/* Copyright (C) 2000 MySQL AB

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 2 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
9
   but WITHOUT ANY WARRANTY; without even the implied warranty of
unknown's avatar
unknown committed
10 11 12 13 14 15
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program; if not, write to the Free Software
   Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA */
16 17 18 19 20 21 22 23

/*
  Note that we can't have assertion on file descriptors;  The reason for
  this is that during mysql shutdown, another thread can close a file
  we are working on.  In this case we should just return read errors from
  the file descriptior.
*/

unknown's avatar
unknown committed
24
#include <my_global.h>
25 26 27

#ifdef HAVE_OPENSSL

unknown's avatar
unknown committed
28
#include <mysql_com.h>
29 30 31

#include <errno.h>
#include <assert.h>
unknown's avatar
unknown committed
32
#include <violite.h>
33 34 35 36 37 38 39 40
#include <my_sys.h>
#include <my_net.h>
#include <m_string.h>

#ifndef __WIN__
#define HANDLE void *
#endif

unknown's avatar
unknown committed
41 42 43 44 45 46
static void
report_errors()
{
  unsigned long	l;
  const char*	file;
  const char*	data;
47
  int		line,flags;
unknown's avatar
unknown committed
48 49
  DBUG_ENTER("report_errors");

50
  while ((l=ERR_get_error_line_data(&file,&line,&data,&flags)))
unknown's avatar
unknown committed
51
  {
52
    char buf[512];
unknown's avatar
unknown committed
53 54 55
    DBUG_PRINT("error", ("OpenSSL: %s:%s:%d:%s\n", ERR_error_string(l,buf),
			 file,line,(flags&ERR_TXT_STRING)?data:"")) ;
  }
56
  DBUG_PRINT("info", ("errno: %d", socket_errno));
unknown's avatar
unknown committed
57 58 59
  DBUG_VOID_RETURN;
}

60 61 62 63 64 65 66 67
/*
  Delete a vio object

  SYNPOSIS
    vio_ssl_delete()
    vio			Vio object.  May be 0.
*/

unknown's avatar
unknown committed
68

unknown's avatar
unknown committed
69
void vio_ssl_delete(Vio * vio)
70 71 72 73 74 75 76 77 78
{
  if (vio)
  {
    if (vio->type != VIO_CLOSED)
      vio_close(vio);
    my_free((gptr) vio,MYF(0));
  }
}

79

unknown's avatar
unknown committed
80
int vio_ssl_errno(Vio *vio __attribute__((unused)))
81
{
82
  return socket_errno;	/* On Win32 this mapped to WSAGetLastError() */
83 84 85
}


unknown's avatar
unknown committed
86
int vio_ssl_read(Vio * vio, gptr buf, int size)
87 88 89
{
  int r;
  DBUG_ENTER("vio_ssl_read");
unknown's avatar
unknown committed
90 91
  DBUG_PRINT("enter", ("sd=%d, buf=%p, size=%d, ssl_=%p",
		       vio->sd, buf, size, vio->ssl_));
92

93 94 95 96
  if ((r= SSL_read(vio->ssl_, buf, size)) < 0)
  {
    int err= SSL_get_error(vio->ssl_, r);
    DBUG_PRINT("error",("SSL_read(): %d  SSL_get_error(): %d", r, err));
97
    report_errors();
98
  }
99 100 101 102 103
  DBUG_PRINT("exit", ("%d", r));
  DBUG_RETURN(r);
}


unknown's avatar
unknown committed
104
int vio_ssl_write(Vio * vio, const gptr buf, int size)
105 106 107 108
{
  int r;
  DBUG_ENTER("vio_ssl_write");
  DBUG_PRINT("enter", ("sd=%d, buf=%p, size=%d", vio->sd, buf, size));
unknown's avatar
unknown committed
109

110
  if ((r= SSL_write(vio->ssl_, buf, size)) < 0)
111 112 113 114 115 116
    report_errors();
  DBUG_PRINT("exit", ("%d", r));
  DBUG_RETURN(r);
}


unknown's avatar
unknown committed
117
int vio_ssl_fastsend(Vio * vio __attribute__((unused)))
118
{
119
  int r= 0;
120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142
  DBUG_ENTER("vio_ssl_fastsend");

#ifdef IPTOS_THROUGHPUT
  {
#ifndef __EMX__
    int tos = IPTOS_THROUGHPUT;
    if (!setsockopt(vio->sd, IPPROTO_IP, IP_TOS, (void *) &tos, sizeof(tos)))
#endif				/* !__EMX__ */
    {
      int nodelay = 1;
      if (setsockopt(vio->sd, IPPROTO_TCP, TCP_NODELAY, (void *) &nodelay,
		     sizeof(nodelay))) {
	DBUG_PRINT("warning",
		   ("Couldn't set socket option for fast send"));
	r= -1;
      }
    }
  }
#endif	/* IPTOS_THROUGHPUT */
  DBUG_PRINT("exit", ("%d", r));
  DBUG_RETURN(r);
}

143

unknown's avatar
unknown committed
144
int vio_ssl_keepalive(Vio* vio, my_bool set_keep_alive)
145 146 147 148 149 150 151
{
  int r=0;
  DBUG_ENTER("vio_ssl_keepalive");
  DBUG_PRINT("enter", ("sd=%d, set_keep_alive=%d", vio->sd, (int)
		       set_keep_alive));
  if (vio->type != VIO_TYPE_NAMEDPIPE)
  {
152 153 154
    uint opt = (set_keep_alive) ? 1 : 0;
    r= setsockopt(vio->sd, SOL_SOCKET, SO_KEEPALIVE, (char *) &opt,
		  sizeof(opt));
155 156 157 158 159 160
  }
  DBUG_RETURN(r);
}


my_bool
unknown's avatar
unknown committed
161
vio_ssl_should_retry(Vio * vio __attribute__((unused)))
162
{
163 164 165
  int en = socket_errno;
  return (en == SOCKET_EAGAIN || en == SOCKET_EINTR ||
	  en == SOCKET_EWOULDBLOCK);
166 167 168
}


unknown's avatar
unknown committed
169
int vio_ssl_close(Vio * vio)
170 171 172 173 174 175 176 177 178 179
{
  int r;
  DBUG_ENTER("vio_ssl_close");
  r=0;
  if (vio->ssl_)
  {
    r = SSL_shutdown(vio->ssl_);
    SSL_free(vio->ssl_);
    vio->ssl_= 0;
  }
180 181 182 183 184 185 186
  if (vio->sd >= 0)
  {
    if (shutdown(vio->sd, 2))
      r= -1;
    if (closesocket(vio->sd))
      r= -1;
  }
187 188
  if (r)
  {
189
    DBUG_PRINT("error", ("close() failed, error: %d",socket_errno));
190
    report_errors();
191 192 193 194 195 196 197 198
    /* FIXME: error handling (not critical for MySQL) */
  }
  vio->type= VIO_CLOSED;
  vio->sd=   -1;
  DBUG_RETURN(r);
}


unknown's avatar
unknown committed
199
const char *vio_ssl_description(Vio * vio)
200 201 202 203
{
  return vio->desc;
}

unknown's avatar
unknown committed
204
enum enum_vio_type vio_ssl_type(Vio* vio)
205 206 207 208
{
  return vio->type;
}

unknown's avatar
unknown committed
209
my_socket vio_ssl_fd(Vio* vio)
210 211 212 213 214
{
  return vio->sd;
}


unknown's avatar
unknown committed
215
my_bool vio_ssl_peer_addr(Vio * vio, char *buf, uint16 *port)
216 217 218 219 220 221
{
  DBUG_ENTER("vio_ssl_peer_addr");
  DBUG_PRINT("enter", ("sd=%d", vio->sd));
  if (vio->localhost)
  {
    strmov(buf,"127.0.0.1");
unknown's avatar
unknown committed
222
    *port=0;
223 224 225 226 227 228 229
  }
  else
  {
    size_socket addrLen = sizeof(struct sockaddr);
    if (getpeername(vio->sd, (struct sockaddr *) (& (vio->remote)),
		    &addrLen) != 0)
    {
230
      DBUG_PRINT("exit", ("getpeername, error: %d", socket_errno));
231 232
      DBUG_RETURN(1);
    }
unknown's avatar
unknown committed
233 234 235 236 237 238 239
#ifdef TO_BE_FIXED
    my_inet_ntoa(vio->remote.sin_addr,buf);
    *port= 0;
#else
    strmov(buf, "unknown");
    *port= 0;
#endif
240 241 242 243 244 245
  }
  DBUG_PRINT("exit", ("addr=%s", buf));
  DBUG_RETURN(0);
}


unknown's avatar
unknown committed
246
void vio_ssl_in_addr(Vio *vio, struct in_addr *in)
247 248 249 250 251 252 253 254 255 256
{
  DBUG_ENTER("vio_ssl_in_addr");
  if (vio->localhost)
    bzero((char*) in, sizeof(*in));	/* This should never be executed */
  else
    *in=vio->remote.sin_addr;
  DBUG_VOID_RETURN;
}


257
/*
unknown's avatar
unknown committed
258
  TODO: Add documentation
259 260
*/

unknown's avatar
unknown committed
261
int sslaccept(struct st_VioSSLAcceptorFd* ptr, Vio* vio, long timeout)
262
{
263
  char *str;
264
  char buf[1024];
unknown's avatar
unknown committed
265
  X509* client_cert;
266
  my_bool unused;
unknown's avatar
unknown committed
267 268
  my_bool net_blocking;
  enum enum_vio_type old_type;  
269
  DBUG_ENTER("sslaccept");
unknown's avatar
unknown committed
270
  DBUG_PRINT("enter", ("sd=%d ptr=%p", vio->sd,ptr));
271

unknown's avatar
unknown committed
272 273
  old_type= vio->type;
  net_blocking = vio_is_blocking(vio);
274
  vio_blocking(vio, 1, &unused);	/* Must be called before reset */
unknown's avatar
unknown committed
275 276 277
  vio_reset(vio,VIO_TYPE_SSL,vio->sd,0,FALSE);
  vio->ssl_=0;
  if (!(vio->ssl_ = SSL_new(ptr->ssl_context_)))
278 279 280
  {
    DBUG_PRINT("error", ("SSL_new failure"));
    report_errors();
unknown's avatar
unknown committed
281 282 283
    vio_reset(vio, old_type,vio->sd,0,FALSE);
    vio_blocking(vio, net_blocking, &unused);
    DBUG_RETURN(1);
284
  }
unknown's avatar
unknown committed
285
  DBUG_PRINT("info", ("ssl_=%p  timeout=%ld",vio->ssl_, timeout));
286 287
  SSL_clear(vio->ssl_);
  SSL_SESSION_set_timeout(SSL_get_session(vio->ssl_), timeout);
unknown's avatar
unknown committed
288 289
  SSL_set_fd(vio->ssl_,vio->sd);
  SSL_set_accept_state(vio->ssl_);
290 291
  if (SSL_do_handshake(vio->ssl_) < 1 ||
      SSL_get_verify_result(vio->ssl_) != X509_V_OK)
unknown's avatar
unknown committed
292 293 294 295 296 297 298 299 300
  {
    DBUG_PRINT("error", ("SSL_do_handshake failure"));
    report_errors();
    SSL_free(vio->ssl_);
    vio->ssl_=0;
    vio_reset(vio, old_type,vio->sd,0,FALSE);
    vio_blocking(vio, net_blocking, &unused);
    DBUG_RETURN(1);
  }
unknown's avatar
unknown committed
301 302 303 304
#ifndef DBUF_OFF
  DBUG_PRINT("info",("SSL_get_cipher_name() = '%s'"
		     ,SSL_get_cipher_name(vio->ssl_)));
  client_cert = SSL_get_peer_certificate (vio->ssl_);
305 306
  if (client_cert != NULL)
  {
307 308 309 310 311 312 313 314 315 316
    DBUG_PRINT("info",("Client certificate:"));
    str = X509_NAME_oneline (X509_get_subject_name (client_cert), 0, 0);
    DBUG_PRINT("info",("\t subject: %s", str));
    free (str);

    str = X509_NAME_oneline (X509_get_issuer_name  (client_cert), 0, 0);
    DBUG_PRINT("info",("\t issuer: %s", str));
    free (str);

    X509_free (client_cert);
317 318
  }
  else
319
    DBUG_PRINT("info",("Client does not have certificate."));
unknown's avatar
unknown committed
320

321
  str=SSL_get_shared_ciphers(vio->ssl_, buf, sizeof(buf));
322
  if (str)
323 324 325 326 327 328 329 330
  {
    DBUG_PRINT("info",("SSL_get_shared_ciphers() returned '%s'",str));
  }
  else
  {
    DBUG_PRINT("info",("no shared ciphers!"));
  }

unknown's avatar
unknown committed
331
#endif
unknown's avatar
unknown committed
332
  DBUG_RETURN(0);
333 334
}

335

336
int sslconnect(struct st_VioSSLConnectorFd* ptr, Vio* vio, long timeout)
337
{
338 339
  char *str;
  X509*    server_cert;
340
  my_bool unused;
unknown's avatar
unknown committed
341 342
  my_bool net_blocking;
  enum enum_vio_type old_type;  
343
  DBUG_ENTER("sslconnect");
unknown's avatar
unknown committed
344
  DBUG_PRINT("enter", ("sd=%d ptr=%p ctx: %p", vio->sd,ptr,ptr->ssl_context_));
345

unknown's avatar
unknown committed
346 347
  old_type= vio->type;
  net_blocking = vio_is_blocking(vio);
348
  vio_blocking(vio, 1, &unused);	/* Must be called before reset */
unknown's avatar
unknown committed
349 350 351
  vio_reset(vio,VIO_TYPE_SSL,vio->sd,0,FALSE);
  vio->ssl_=0;
  if (!(vio->ssl_ = SSL_new(ptr->ssl_context_)))
352 353 354
  {
    DBUG_PRINT("error", ("SSL_new failure"));
    report_errors();
unknown's avatar
unknown committed
355 356
    vio_reset(vio, old_type,vio->sd,0,FALSE);
    vio_blocking(vio, net_blocking, &unused);    
357
    DBUG_RETURN(1);
358
  }
unknown's avatar
unknown committed
359
  DBUG_PRINT("info", ("ssl_=%p  timeout=%ld",vio->ssl_, timeout));
360 361
  SSL_clear(vio->ssl_);
  SSL_SESSION_set_timeout(SSL_get_session(vio->ssl_), timeout);
unknown's avatar
unknown committed
362 363
  SSL_set_fd (vio->ssl_, vio->sd);
  SSL_set_connect_state(vio->ssl_);
364 365
  if (SSL_do_handshake(vio->ssl_) < 1 ||
      SSL_get_verify_result(vio->ssl_) != X509_V_OK)
unknown's avatar
unknown committed
366 367 368 369 370 371 372 373 374
  {
    DBUG_PRINT("error", ("SSL_do_handshake failure"));
    report_errors();
    SSL_free(vio->ssl_);
    vio->ssl_=0;
    vio_reset(vio, old_type,vio->sd,0,FALSE);
    vio_blocking(vio, net_blocking, &unused);
    DBUG_RETURN(1);
  }  
unknown's avatar
unknown committed
375 376 377 378
#ifndef DBUG_OFF
  DBUG_PRINT("info",("SSL_get_cipher_name() = '%s'"
		     ,SSL_get_cipher_name(vio->ssl_)));
  server_cert = SSL_get_peer_certificate (vio->ssl_);
379 380
  if (server_cert != NULL)
  {
381 382 383
    DBUG_PRINT("info",("Server certificate:"));
    str = X509_NAME_oneline (X509_get_subject_name (server_cert), 0, 0);
    DBUG_PRINT("info",("\t subject: %s", str));
384
    free(str);
385 386

    str = X509_NAME_oneline (X509_get_issuer_name  (server_cert), 0, 0);
unknown's avatar
unknown committed
387
    DBUG_PRINT("info",("\t issuer: %s", str));
388
    free(str);
389

390 391 392 393
    /*
      We could do all sorts of certificate verification stuff here before
      deallocating the certificate.
    */
unknown's avatar
unknown committed
394
    X509_free (server_cert);
395 396
  }
  else
397
    DBUG_PRINT("info",("Server does not have certificate."));
unknown's avatar
unknown committed
398
#endif
399
  DBUG_RETURN(0);
400 401
}

402 403 404 405 406 407 408 409 410 411

int vio_ssl_blocking(Vio * vio __attribute__((unused)),
		     my_bool set_blocking_mode,
		     my_bool *old_mode)
{
  /* Return error if we try to change to non_blocking mode */
  *old_mode=1;					/* Mode is always blocking */
  return set_blocking_mode ? 0 : 1;
}

412
#endif /* HAVE_OPENSSL */