mirror of https://github.com/openssl/openssl.git
				
				
				
			
		
			
				
	
	
		
			200 lines
		
	
	
		
			5.9 KiB
		
	
	
	
		
			C
		
	
	
	
			
		
		
	
	
			200 lines
		
	
	
		
			5.9 KiB
		
	
	
	
		
			C
		
	
	
	
| /*
 | |
|  * Copyright 2015-2016 The OpenSSL Project Authors. All Rights Reserved.
 | |
|  *
 | |
|  * Licensed under the OpenSSL license (the "License").  You may not use
 | |
|  * this file except in compliance with the License.  You can obtain a copy
 | |
|  * in the file LICENSE in the source distribution or at
 | |
|  * https://www.openssl.org/source/license.html
 | |
|  */
 | |
| 
 | |
| #include <stdio.h>
 | |
| #include <openssl/conf.h>
 | |
| #include <openssl/ssl.h>
 | |
| #include "ssl_locl.h"
 | |
| 
 | |
| /* SSL library configuration module. */
 | |
| 
 | |
| struct ssl_conf_name {
 | |
|     /* Name of this set of commands */
 | |
|     char *name;
 | |
|     /* List of commands */
 | |
|     struct ssl_conf_cmd *cmds;
 | |
|     /* Number of commands */
 | |
|     size_t cmd_count;
 | |
| };
 | |
| 
 | |
| struct ssl_conf_cmd {
 | |
|     /* Command */
 | |
|     char *cmd;
 | |
|     /* Argument */
 | |
|     char *arg;
 | |
| };
 | |
| 
 | |
| static struct ssl_conf_name *ssl_names;
 | |
| static size_t ssl_names_count;
 | |
| 
 | |
| static void ssl_module_free(CONF_IMODULE *md)
 | |
| {
 | |
|     size_t i, j;
 | |
|     if (ssl_names == NULL)
 | |
|         return;
 | |
|     for (i = 0; i < ssl_names_count; i++) {
 | |
|         struct ssl_conf_name *tname = ssl_names + i;
 | |
|         OPENSSL_free(tname->name);
 | |
|         for (j = 0; j < tname->cmd_count; j++) {
 | |
|             OPENSSL_free(tname->cmds[j].cmd);
 | |
|             OPENSSL_free(tname->cmds[j].arg);
 | |
|         }
 | |
|         OPENSSL_free(tname->cmds);
 | |
|     }
 | |
|     OPENSSL_free(ssl_names);
 | |
|     ssl_names = NULL;
 | |
|     ssl_names_count = 0;
 | |
| }
 | |
| 
 | |
| static int ssl_module_init(CONF_IMODULE *md, const CONF *cnf)
 | |
| {
 | |
|     size_t i, j, cnt;
 | |
|     int rv = 0;
 | |
|     const char *ssl_conf_section;
 | |
|     STACK_OF(CONF_VALUE) *cmd_lists;
 | |
|     ssl_conf_section = CONF_imodule_get_value(md);
 | |
|     cmd_lists = NCONF_get_section(cnf, ssl_conf_section);
 | |
|     if (sk_CONF_VALUE_num(cmd_lists) <= 0) {
 | |
|         if (cmd_lists == NULL)
 | |
|             SSLerr(SSL_F_SSL_MODULE_INIT, SSL_R_SSL_SECTION_NOT_FOUND);
 | |
|         else
 | |
|             SSLerr(SSL_F_SSL_MODULE_INIT, SSL_R_SSL_SECTION_EMPTY);
 | |
|         ERR_add_error_data(2, "section=", ssl_conf_section);
 | |
|         goto err;
 | |
|     }
 | |
|     cnt = sk_CONF_VALUE_num(cmd_lists);
 | |
|     ssl_names = OPENSSL_zalloc(sizeof(*ssl_names) * cnt);
 | |
|     ssl_names_count = cnt;
 | |
|     for (i = 0; i < ssl_names_count; i++) {
 | |
|         struct ssl_conf_name *ssl_name = ssl_names + i;
 | |
|         CONF_VALUE *sect = sk_CONF_VALUE_value(cmd_lists, (int)i);
 | |
|         STACK_OF(CONF_VALUE) *cmds = NCONF_get_section(cnf, sect->value);
 | |
|         if (sk_CONF_VALUE_num(cmds) <= 0) {
 | |
|             if (cmds == NULL)
 | |
|                 SSLerr(SSL_F_SSL_MODULE_INIT,
 | |
|                        SSL_R_SSL_COMMAND_SECTION_NOT_FOUND);
 | |
|             else
 | |
|                 SSLerr(SSL_F_SSL_MODULE_INIT, SSL_R_SSL_COMMAND_SECTION_EMPTY);
 | |
|             ERR_add_error_data(4, "name=", sect->name, ", value=", sect->value);
 | |
|             goto err;
 | |
|         }
 | |
|         ssl_name->name = BUF_strdup(sect->name);
 | |
|         if (ssl_name->name == NULL)
 | |
|             goto err;
 | |
|         cnt = sk_CONF_VALUE_num(cmds);
 | |
|         ssl_name->cmds = OPENSSL_zalloc(cnt * sizeof(struct ssl_conf_cmd));
 | |
|         if (ssl_name->cmds == NULL)
 | |
|             goto err;
 | |
|         ssl_name->cmd_count = cnt;
 | |
|         for (j = 0; j < cnt; j++) {
 | |
|             const char *name;
 | |
|             CONF_VALUE *cmd_conf = sk_CONF_VALUE_value(cmds, (int)j);
 | |
|             struct ssl_conf_cmd *cmd = ssl_name->cmds + j;
 | |
|             /* Skip any initial dot in name */
 | |
|             name = strchr(cmd_conf->name, '.');
 | |
|             if (name != NULL)
 | |
|                 name++;
 | |
|             else
 | |
|                 name = cmd_conf->name;
 | |
|             cmd->cmd = BUF_strdup(name);
 | |
|             cmd->arg = BUF_strdup(cmd_conf->value);
 | |
|             if (cmd->cmd == NULL || cmd->arg == NULL)
 | |
|                 goto err;
 | |
|         }
 | |
| 
 | |
|     }
 | |
|     rv = 1;
 | |
|  err:
 | |
|     if (rv == 0)
 | |
|         ssl_module_free(md);
 | |
|     return rv;
 | |
| }
 | |
| 
 | |
| void SSL_add_ssl_module(void)
 | |
| {
 | |
|     CONF_module_add("ssl_conf", ssl_module_init, ssl_module_free);
 | |
| }
 | |
| 
 | |
| static const struct ssl_conf_name *ssl_name_find(const char *name)
 | |
| {
 | |
|     size_t i;
 | |
|     const struct ssl_conf_name *nm;
 | |
|     if (name == NULL)
 | |
|         return NULL;
 | |
|     for (i = 0, nm = ssl_names; i < ssl_names_count; i++, nm++) {
 | |
|         if (strcmp(nm->name, name) == 0)
 | |
|             return nm;
 | |
|     }
 | |
|     return NULL;
 | |
| }
 | |
| 
 | |
| static int ssl_do_config(SSL *s, SSL_CTX *ctx, const char *name)
 | |
| {
 | |
|     SSL_CONF_CTX *cctx = NULL;
 | |
|     size_t i;
 | |
|     int rv = 0;
 | |
|     unsigned int flags;
 | |
|     const SSL_METHOD *meth;
 | |
|     const struct ssl_conf_name *nm;
 | |
|     struct ssl_conf_cmd *cmd;
 | |
|     if (s == NULL && ctx == NULL) {
 | |
|         SSLerr(SSL_F_SSL_DO_CONFIG, ERR_R_PASSED_NULL_PARAMETER);
 | |
|         goto err;
 | |
|     }
 | |
|     nm = ssl_name_find(name);
 | |
|     if (nm == NULL) {
 | |
|         SSLerr(SSL_F_SSL_DO_CONFIG, SSL_R_INVALID_CONFIGURATION_NAME);
 | |
|         ERR_add_error_data(2, "name=", name);
 | |
|         goto err;
 | |
|     }
 | |
|     cctx = SSL_CONF_CTX_new();
 | |
|     if (cctx == NULL)
 | |
|         goto err;
 | |
|     flags = SSL_CONF_FLAG_FILE;
 | |
|     flags |= SSL_CONF_FLAG_CERTIFICATE | SSL_CONF_FLAG_REQUIRE_PRIVATE;
 | |
|     if (s != NULL) {
 | |
|         meth = s->method;
 | |
|         SSL_CONF_CTX_set_ssl(cctx, s);
 | |
|     } else {
 | |
|         meth = ctx->method;
 | |
|         SSL_CONF_CTX_set_ssl_ctx(cctx, ctx);
 | |
|     }
 | |
|     if (meth->ssl_accept != ssl_undefined_function)
 | |
|         flags |= SSL_CONF_FLAG_SERVER;
 | |
|     if (meth->ssl_connect != ssl_undefined_function)
 | |
|         flags |= SSL_CONF_FLAG_CLIENT;
 | |
|     SSL_CONF_CTX_set_flags(cctx, flags);
 | |
|     for (i = 0, cmd = nm->cmds; i < nm->cmd_count; i++, cmd++) {
 | |
|         rv = SSL_CONF_cmd(cctx, cmd->cmd, cmd->arg);
 | |
|         if (rv <= 0) {
 | |
|             if (rv == -2)
 | |
|                 SSLerr(SSL_F_SSL_DO_CONFIG, SSL_R_UNKNOWN_COMMAND);
 | |
|             else
 | |
|                 SSLerr(SSL_F_SSL_DO_CONFIG, SSL_R_BAD_VALUE);
 | |
|             ERR_add_error_data(6, "section=", name, ", cmd=", cmd->cmd,
 | |
|                                ", arg=", cmd->arg);
 | |
|             goto err;
 | |
|         }
 | |
|     }
 | |
|     rv = SSL_CONF_CTX_finish(cctx);
 | |
|  err:
 | |
|     SSL_CONF_CTX_free(cctx);
 | |
|     return rv <= 0 ? 0 : 1;
 | |
| }
 | |
| 
 | |
| int SSL_config(SSL *s, const char *name)
 | |
| {
 | |
|     return ssl_do_config(s, NULL, name);
 | |
| }
 | |
| 
 | |
| int SSL_CTX_config(SSL_CTX *ctx, const char *name)
 | |
| {
 | |
|     return ssl_do_config(NULL, ctx, name);
 | |
| }
 |