ssl.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713
  1. /*
  2. * libwebsockets - small server side websockets and web server implementation
  3. *
  4. * Copyright (C) 2010-2016 Andy Green <andy@warmcat.com>
  5. *
  6. * This library is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation:
  9. * version 2.1 of the License.
  10. *
  11. * This library is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public
  17. * License along with this library; if not, write to the Free Software
  18. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
  19. * MA 02110-1301 USA
  20. */
  21. #include "private-libwebsockets.h"
  22. #if defined(LWS_USE_POLARSSL)
  23. static const int ciphers[] =
  24. {
  25. TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
  26. TLS_RSA_WITH_AES_256_CBC_SHA,
  27. TLS_RSA_WITH_AES_128_CBC_SHA,
  28. 0
  29. };
  30. static int urandom_bytes(void *ctx, unsigned char *dest, size_t len)
  31. {
  32. int cur;
  33. int fd = open("/dev/urandom", O_RDONLY);
  34. while (len) {
  35. cur = read(fd, dest, len);
  36. if (cur < 0)
  37. continue;
  38. len -= cur;
  39. }
  40. close(fd);
  41. return 0;
  42. }
  43. static void pssl_debug(void *ctx, int level, const char *str)
  44. {
  45. lwsl_err("PolarSSL [level %d]: %s", level, str);
  46. }
  47. #endif
  48. int openssl_websocket_private_data_index,
  49. openssl_SSL_CTX_private_data_index;
  50. int lws_ssl_get_error(struct lws *wsi, int n)
  51. {
  52. #if defined(LWS_USE_POLARSSL)
  53. #define ERR_error_string(a, b) ""
  54. return n;
  55. #else
  56. #if defined(LWS_USE_MBEDTLS)
  57. return n;
  58. #else
  59. return SSL_get_error(wsi->ssl, n);
  60. #endif
  61. #endif
  62. }
  63. void
  64. lws_ssl_elaborate_error(void)
  65. {
  66. #if defined(LWS_USE_POLARSSL)
  67. #else
  68. #if defined(LWS_USE_MBEDTLS)
  69. #else
  70. char buf[256];
  71. u_long err;
  72. while ((err = ERR_get_error()) != 0) {
  73. ERR_error_string_n(err, buf, sizeof(buf));
  74. lwsl_err("*** %s\n", buf);
  75. }
  76. #endif
  77. #endif
  78. }
  79. #if defined(LWS_USE_POLARSSL)
  80. #else
  81. #if defined(LWS_USE_MBEDTLS)
  82. #else
  83. static int
  84. lws_context_init_ssl_pem_passwd_cb(char * buf, int size, int rwflag, void *userdata)
  85. {
  86. struct lws_context_creation_info * info =
  87. (struct lws_context_creation_info *)userdata;
  88. strncpy(buf, info->ssl_private_key_password, size);
  89. buf[size - 1] = '\0';
  90. return strlen(buf);
  91. }
  92. #endif
  93. #endif
  94. void
  95. lws_ssl_bind_passphrase(SSL_CTX *ssl_ctx, struct lws_context_creation_info *info)
  96. {
  97. if (!info->ssl_private_key_password)
  98. return;
  99. #if defined(LWS_USE_POLARSSL)
  100. #else
  101. #if defined(LWS_USE_MBEDTLS)
  102. #else
  103. /*
  104. * password provided, set ssl callback and user data
  105. * for checking password which will be trigered during
  106. * SSL_CTX_use_PrivateKey_file function
  107. */
  108. SSL_CTX_set_default_passwd_cb_userdata(ssl_ctx, (void *)info);
  109. SSL_CTX_set_default_passwd_cb(ssl_ctx, lws_context_init_ssl_pem_passwd_cb);
  110. #endif
  111. #endif
  112. }
  113. int
  114. lws_context_init_ssl_library(struct lws_context_creation_info *info)
  115. {
  116. #ifdef USE_WOLFSSL
  117. #ifdef USE_OLD_CYASSL
  118. lwsl_notice(" Compiled with CyaSSL support\n");
  119. #else
  120. lwsl_notice(" Compiled with wolfSSL support\n");
  121. #endif
  122. #else
  123. #if defined(LWS_USE_POLARSSL)
  124. lwsl_notice(" Compiled with PolarSSL support\n");
  125. #else
  126. #if defined(LWS_USE_MBEDTLS)
  127. lwsl_notice(" Compiled with mbedTLS support\n");
  128. #else
  129. lwsl_notice(" Compiled with OpenSSL support\n");
  130. #endif
  131. #endif
  132. #endif
  133. if (!lws_check_opt(info->options, LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT)) {
  134. lwsl_notice(" SSL disabled: no LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT\n");
  135. return 0;
  136. }
  137. /* basic openssl init */
  138. #if defined(LWS_USE_POLARSSL)
  139. #else
  140. #if defined(LWS_USE_MBEDTLS)
  141. #else
  142. SSL_library_init();
  143. OpenSSL_add_all_algorithms();
  144. SSL_load_error_strings();
  145. openssl_websocket_private_data_index =
  146. SSL_get_ex_new_index(0, "lws", NULL, NULL, NULL);
  147. openssl_SSL_CTX_private_data_index = SSL_CTX_get_ex_new_index(0,
  148. NULL, NULL, NULL, NULL);
  149. #endif
  150. #endif
  151. return 0;
  152. }
  153. LWS_VISIBLE void
  154. lws_ssl_destroy(struct lws_vhost *vhost)
  155. {
  156. if (!lws_check_opt(vhost->context->options,
  157. LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT))
  158. return;
  159. #if defined(LWS_USE_POLARSSL)
  160. #else
  161. #if defined(LWS_USE_MBEDTLS)
  162. #else
  163. if (vhost->ssl_ctx)
  164. SSL_CTX_free(vhost->ssl_ctx);
  165. if (!vhost->user_supplied_ssl_ctx && vhost->ssl_client_ctx)
  166. SSL_CTX_free(vhost->ssl_client_ctx);
  167. #if (OPENSSL_VERSION_NUMBER < 0x10100006L)
  168. #if (OPENSSL_VERSION_NUMBER < 0x01000000) || defined(USE_WOLFSSL)
  169. ERR_remove_state(0);
  170. #else
  171. #if (OPENSSL_VERSION_NUMBER >= 0x10100005L) && \
  172. !defined(LIBRESSL_VERSION_NUMBER) && \
  173. !defined(OPENSSL_IS_BORINGSSL)
  174. ERR_remove_thread_state();
  175. #else
  176. ERR_remove_thread_state(NULL);
  177. #endif
  178. #endif
  179. ERR_free_strings();
  180. EVP_cleanup();
  181. CRYPTO_cleanup_all_ex_data();
  182. #endif
  183. #endif
  184. #endif
  185. }
  186. LWS_VISIBLE void
  187. lws_decode_ssl_error(void)
  188. {
  189. #if defined(LWS_USE_POLARSSL)
  190. #else
  191. #if defined(LWS_USE_MBEDTLS)
  192. #else
  193. char buf[256];
  194. u_long err;
  195. while ((err = ERR_get_error()) != 0) {
  196. ERR_error_string_n(err, buf, sizeof(buf));
  197. lwsl_err("*** %lu %s\n", err, buf);
  198. }
  199. #endif
  200. #endif
  201. }
  202. LWS_VISIBLE void
  203. lws_ssl_remove_wsi_from_buffered_list(struct lws *wsi)
  204. {
  205. struct lws_context *context = wsi->context;
  206. struct lws_context_per_thread *pt = &context->pt[(int)wsi->tsi];
  207. if (!wsi->pending_read_list_prev &&
  208. !wsi->pending_read_list_next &&
  209. pt->pending_read_list != wsi)
  210. /* we are not on the list */
  211. return;
  212. /* point previous guy's next to our next */
  213. if (!wsi->pending_read_list_prev)
  214. pt->pending_read_list = wsi->pending_read_list_next;
  215. else
  216. wsi->pending_read_list_prev->pending_read_list_next =
  217. wsi->pending_read_list_next;
  218. /* point next guy's previous to our previous */
  219. if (wsi->pending_read_list_next)
  220. wsi->pending_read_list_next->pending_read_list_prev =
  221. wsi->pending_read_list_prev;
  222. wsi->pending_read_list_prev = NULL;
  223. wsi->pending_read_list_next = NULL;
  224. }
  225. LWS_VISIBLE int
  226. lws_ssl_capable_read(struct lws *wsi, unsigned char *buf, int len)
  227. {
  228. struct lws_context *context = wsi->context;
  229. struct lws_context_per_thread *pt = &context->pt[(int)wsi->tsi];
  230. int n = 0;
  231. if (!wsi->ssl)
  232. return lws_ssl_capable_read_no_ssl(wsi, buf, len);
  233. #if defined(LWS_USE_POLARSSL)
  234. #else
  235. #if defined(LWS_USE_MBEDTLS)
  236. #else
  237. n = SSL_read(wsi->ssl, buf, len);
  238. #endif
  239. #endif
  240. /* manpage: returning 0 means connection shut down */
  241. if (!n)
  242. return LWS_SSL_CAPABLE_ERROR;
  243. if (n < 0) {
  244. n = lws_ssl_get_error(wsi, n);
  245. if (n == SSL_ERROR_WANT_READ || n == SSL_ERROR_WANT_WRITE)
  246. return LWS_SSL_CAPABLE_MORE_SERVICE;
  247. return LWS_SSL_CAPABLE_ERROR;
  248. }
  249. if (wsi->vhost)
  250. wsi->vhost->rx += n;
  251. lws_restart_ws_ping_pong_timer(wsi);
  252. /*
  253. * if it was our buffer that limited what we read,
  254. * check if SSL has additional data pending inside SSL buffers.
  255. *
  256. * Because these won't signal at the network layer with POLLIN
  257. * and if we don't realize, this data will sit there forever
  258. */
  259. if (n != len)
  260. goto bail;
  261. if (!wsi->ssl)
  262. goto bail;
  263. #if defined(LWS_USE_POLARSSL)
  264. if (ssl_get_bytes_avail(wsi->ssl) <= 0)
  265. goto bail;
  266. #else
  267. #if defined(LWS_USE_MBEDTLS)
  268. #else
  269. if (!SSL_pending(wsi->ssl))
  270. goto bail;
  271. #endif
  272. #endif
  273. if (wsi->pending_read_list_next)
  274. return n;
  275. if (wsi->pending_read_list_prev)
  276. return n;
  277. if (pt->pending_read_list == wsi)
  278. return n;
  279. /* add us to the linked list of guys with pending ssl */
  280. if (pt->pending_read_list)
  281. pt->pending_read_list->pending_read_list_prev = wsi;
  282. wsi->pending_read_list_next = pt->pending_read_list;
  283. wsi->pending_read_list_prev = NULL;
  284. pt->pending_read_list = wsi;
  285. return n;
  286. bail:
  287. lws_ssl_remove_wsi_from_buffered_list(wsi);
  288. return n;
  289. }
  290. LWS_VISIBLE int
  291. lws_ssl_pending(struct lws *wsi)
  292. {
  293. if (!wsi->ssl)
  294. return 0;
  295. #if defined(LWS_USE_POLARSSL)
  296. return ssl_get_bytes_avail(wsi->ssl) > 0;
  297. #else
  298. #if defined(LWS_USE_MBEDTLS)
  299. return ssl_get_bytes_avail(wsi->ssl) > 0;;
  300. #else
  301. return SSL_pending(wsi->ssl);
  302. #endif
  303. #endif
  304. }
  305. LWS_VISIBLE int
  306. lws_ssl_capable_write(struct lws *wsi, unsigned char *buf, int len)
  307. {
  308. int n;
  309. if (!wsi->ssl)
  310. return lws_ssl_capable_write_no_ssl(wsi, buf, len);
  311. #if defined(LWS_USE_POLARSSL)
  312. n = ssl_write(wsi->ssl, buf, len);
  313. #else
  314. #if defined(LWS_USE_MBEDTLS)
  315. #else
  316. n = SSL_write(wsi->ssl, buf, len);
  317. #endif
  318. #endif
  319. if (n > 0)
  320. return n;
  321. n = lws_ssl_get_error(wsi, n);
  322. if (n == SSL_ERROR_WANT_READ || n == SSL_ERROR_WANT_WRITE) {
  323. if (n == SSL_ERROR_WANT_WRITE)
  324. lws_set_blocking_send(wsi);
  325. return LWS_SSL_CAPABLE_MORE_SERVICE;
  326. }
  327. return LWS_SSL_CAPABLE_ERROR;
  328. }
  329. LWS_VISIBLE int
  330. lws_ssl_close(struct lws *wsi)
  331. {
  332. int n;
  333. if (!wsi->ssl)
  334. return 0; /* not handled */
  335. #if defined(LWS_USE_POLARSSL)
  336. ssl_close_notify(wsi->ssl);
  337. (void)n; /* we need to close the fd? */
  338. ssl_free(wsi->ssl);
  339. #else
  340. #if defined(LWS_USE_MBEDTLS)
  341. #else
  342. n = SSL_get_fd(wsi->ssl);
  343. SSL_shutdown(wsi->ssl);
  344. compatible_close(n);
  345. SSL_free(wsi->ssl);
  346. #endif
  347. #endif
  348. wsi->ssl = NULL;
  349. return 1; /* handled */
  350. }
  351. /* leave all wsi close processing to the caller */
  352. LWS_VISIBLE int
  353. lws_server_socket_service_ssl(struct lws *wsi, lws_sockfd_type accept_fd)
  354. {
  355. struct lws_context *context = wsi->context;
  356. struct lws_context_per_thread *pt = &context->pt[(int)wsi->tsi];
  357. int n, m;
  358. #if !defined(USE_WOLFSSL) && !defined(LWS_USE_POLARSSL) && !defined(LWS_USE_MBEDTLS)
  359. BIO *bio;
  360. #endif
  361. if (!LWS_SSL_ENABLED(wsi->vhost))
  362. return 0;
  363. switch (wsi->mode) {
  364. case LWSCM_SSL_INIT:
  365. if (wsi->ssl)
  366. lwsl_err("%s: leaking ssl\n", __func__);
  367. if (accept_fd == LWS_SOCK_INVALID)
  368. assert(0);
  369. #if defined(LWS_USE_POLARSSL)
  370. {
  371. ssl_session *ssn;
  372. int rc;
  373. wsi->ssl = lws_zalloc(sizeof(ssl_context));
  374. ssn = lws_zalloc(sizeof(ssl_session));
  375. rc = ssl_init(wsi->ssl);
  376. if (rc) {
  377. lwsl_err("ssl_init failed\n");
  378. goto fail;
  379. }
  380. ssl_set_endpoint(wsi->ssl, SSL_IS_SERVER);
  381. ssl_set_authmode(wsi->ssl, SSL_VERIFY_OPTIONAL);
  382. ssl_set_rng(wsi->ssl, urandom_bytes, NULL);
  383. ssl_set_dbg(wsi->ssl, pssl_debug, NULL);
  384. ssl_set_bio(wsi->ssl, net_recv, &wsi->sock, net_send, &wsi->sock);
  385. ssl_set_ciphersuites(wsi->ssl, ciphers);
  386. ssl_set_session(wsi->ssl, ssn);
  387. ssl_set_ca_chain(wsi->ssl, &wsi->vhost->ssl_ctx->ca,
  388. NULL, NULL);
  389. ssl_set_own_cert_rsa(wsi->ssl,
  390. &wsi->vhost->ssl_ctx->certificate,
  391. &wsi->vhost->ssl_ctx->key);
  392. // ssl_set_dh_param(wsi->ssl, my_dhm_P, my_dhm_G);
  393. lwsl_err("%s: polarssl init done\n", __func__);
  394. }
  395. #else
  396. #if defined(LWS_USE_MBEDTLS)
  397. #else
  398. wsi->ssl = SSL_new(wsi->vhost->ssl_ctx);
  399. if (wsi->ssl == NULL) {
  400. lwsl_err("SSL_new failed: %s\n",
  401. ERR_error_string(lws_ssl_get_error(wsi, 0), NULL));
  402. lws_decode_ssl_error();
  403. if (accept_fd != LWS_SOCK_INVALID)
  404. compatible_close(accept_fd);
  405. goto fail;
  406. }
  407. SSL_set_ex_data(wsi->ssl,
  408. openssl_websocket_private_data_index, wsi->vhost);
  409. SSL_set_fd(wsi->ssl, accept_fd);
  410. #endif
  411. #endif
  412. #ifdef USE_WOLFSSL
  413. #ifdef USE_OLD_CYASSL
  414. CyaSSL_set_using_nonblock(wsi->ssl, 1);
  415. #else
  416. wolfSSL_set_using_nonblock(wsi->ssl, 1);
  417. #endif
  418. #else
  419. #if defined(LWS_USE_POLARSSL)
  420. #else
  421. #if defined(LWS_USE_MBEDTLS)
  422. #else
  423. SSL_set_mode(wsi->ssl, SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER);
  424. bio = SSL_get_rbio(wsi->ssl);
  425. if (bio)
  426. BIO_set_nbio(bio, 1); /* nonblocking */
  427. else
  428. lwsl_notice("NULL rbio\n");
  429. bio = SSL_get_wbio(wsi->ssl);
  430. if (bio)
  431. BIO_set_nbio(bio, 1); /* nonblocking */
  432. else
  433. lwsl_notice("NULL rbio\n");
  434. #endif
  435. #endif
  436. #endif
  437. /*
  438. * we are not accepted yet, but we need to enter ourselves
  439. * as a live connection. That way we can retry when more
  440. * pieces come if we're not sorted yet
  441. */
  442. wsi->mode = LWSCM_SSL_ACK_PENDING;
  443. if (insert_wsi_socket_into_fds(context, wsi)) {
  444. lwsl_err("%s: failed to insert into fds\n", __func__);
  445. goto fail;
  446. }
  447. lws_set_timeout(wsi, PENDING_TIMEOUT_SSL_ACCEPT,
  448. context->timeout_secs);
  449. lwsl_info("inserted SSL accept into fds, trying SSL_accept\n");
  450. /* fallthru */
  451. case LWSCM_SSL_ACK_PENDING:
  452. if (lws_change_pollfd(wsi, LWS_POLLOUT, 0)) {
  453. lwsl_err("%s: lws_change_pollfd failed\n", __func__);
  454. goto fail;
  455. }
  456. lws_latency_pre(context, wsi);
  457. n = recv(wsi->sock, (char *)pt->serv_buf, context->pt_serv_buf_size,
  458. MSG_PEEK);
  459. /*
  460. * optionally allow non-SSL connect on SSL listening socket
  461. * This is disabled by default, if enabled it goes around any
  462. * SSL-level access control (eg, client-side certs) so leave
  463. * it disabled unless you know it's not a problem for you
  464. */
  465. if (wsi->vhost->allow_non_ssl_on_ssl_port) {
  466. if (n >= 1 && pt->serv_buf[0] >= ' ') {
  467. /*
  468. * TLS content-type for Handshake is 0x16, and
  469. * for ChangeCipherSpec Record, it's 0x14
  470. *
  471. * A non-ssl session will start with the HTTP
  472. * method in ASCII. If we see it's not a legit
  473. * SSL handshake kill the SSL for this
  474. * connection and try to handle as a HTTP
  475. * connection upgrade directly.
  476. */
  477. wsi->use_ssl = 0;
  478. #if defined(LWS_USE_POLARSSL)
  479. ssl_close_notify(wsi->ssl);
  480. ssl_free(wsi->ssl);
  481. #else
  482. #if defined(LWS_USE_MBEDTLS)
  483. #else
  484. SSL_shutdown(wsi->ssl);
  485. SSL_free(wsi->ssl);
  486. #endif
  487. #endif
  488. wsi->ssl = NULL;
  489. if (lws_check_opt(context->options,
  490. LWS_SERVER_OPTION_REDIRECT_HTTP_TO_HTTPS))
  491. wsi->redirect_to_https = 1;
  492. goto accepted;
  493. }
  494. if (!n) /*
  495. * connection is gone, or nothing to read
  496. * if it's gone, we will timeout on
  497. * PENDING_TIMEOUT_SSL_ACCEPT
  498. */
  499. break;
  500. if (n < 0 && (LWS_ERRNO == LWS_EAGAIN ||
  501. LWS_ERRNO == LWS_EWOULDBLOCK)) {
  502. /*
  503. * well, we get no way to know ssl or not
  504. * so go around again waiting for something
  505. * to come and give us a hint, or timeout the
  506. * connection.
  507. */
  508. m = SSL_ERROR_WANT_READ;
  509. goto go_again;
  510. }
  511. }
  512. /* normal SSL connection processing path */
  513. #if defined(LWS_USE_POLARSSL)
  514. n = ssl_handshake(wsi->ssl);
  515. #else
  516. #if defined(LWS_USE_MBEDTLS)
  517. #else
  518. n = SSL_accept(wsi->ssl);
  519. #endif
  520. #endif
  521. lws_latency(context, wsi,
  522. "SSL_accept LWSCM_SSL_ACK_PENDING\n", n, n == 1);
  523. if (n == 1)
  524. goto accepted;
  525. m = lws_ssl_get_error(wsi, n);
  526. lwsl_debug("SSL_accept failed %d / %s\n",
  527. m, ERR_error_string(m, NULL));
  528. go_again:
  529. if (m == SSL_ERROR_WANT_READ) {
  530. if (lws_change_pollfd(wsi, 0, LWS_POLLIN)) {
  531. lwsl_err("%s: WANT_READ change_pollfd failed\n", __func__);
  532. goto fail;
  533. }
  534. lwsl_info("SSL_ERROR_WANT_READ\n");
  535. break;
  536. }
  537. if (m == SSL_ERROR_WANT_WRITE) {
  538. if (lws_change_pollfd(wsi, 0, LWS_POLLOUT)) {
  539. lwsl_err("%s: WANT_WRITE change_pollfd failed\n", __func__);
  540. goto fail;
  541. }
  542. break;
  543. }
  544. lwsl_err("SSL_accept failed skt %u: %s\n",
  545. wsi->sock, ERR_error_string(m, NULL));
  546. lws_ssl_elaborate_error();
  547. goto fail;
  548. accepted:
  549. /* OK, we are accepted... give him some time to negotiate */
  550. lws_set_timeout(wsi, PENDING_TIMEOUT_ESTABLISH_WITH_SERVER,
  551. context->timeout_secs);
  552. wsi->mode = LWSCM_HTTP_SERVING;
  553. lws_http2_configure_if_upgraded(wsi);
  554. lwsl_debug("accepted new SSL conn\n");
  555. break;
  556. }
  557. return 0;
  558. fail:
  559. return 1;
  560. }
  561. void
  562. lws_ssl_SSL_CTX_destroy(struct lws_vhost *vhost)
  563. {
  564. if (vhost->ssl_ctx) {
  565. #if defined(LWS_USE_POLARSSL)
  566. lws_free(vhost->ssl_ctx);
  567. #else
  568. #if defined(LWS_USE_MBEDTLS)
  569. #else
  570. SSL_CTX_free(vhost->ssl_ctx);
  571. #endif
  572. #endif
  573. }
  574. if (!vhost->user_supplied_ssl_ctx && vhost->ssl_client_ctx) {
  575. #if defined(LWS_USE_POLARSSL)
  576. lws_free(vhost->ssl_client_ctx);
  577. #else
  578. #if defined(LWS_USE_MBEDTLS)
  579. #else
  580. SSL_CTX_free(vhost->ssl_client_ctx);
  581. #endif
  582. #endif
  583. }
  584. }
  585. void
  586. lws_ssl_context_destroy(struct lws_context *context)
  587. {
  588. #if defined(LWS_USE_POLARSSL)
  589. #else
  590. #if defined(LWS_USE_MBEDTLS)
  591. #else
  592. #if (OPENSSL_VERSION_NUMBER < 0x10100006L)
  593. #if (OPENSSL_VERSION_NUMBER < 0x01000000) || defined(USE_WOLFSSL)
  594. ERR_remove_state(0);
  595. #else
  596. #if (OPENSSL_VERSION_NUMBER >= 0x10100005L) && \
  597. !defined(LIBRESSL_VERSION_NUMBER) && \
  598. !defined(OPENSSL_IS_BORINGSSL)
  599. ERR_remove_thread_state();
  600. #else
  601. ERR_remove_thread_state(NULL);
  602. #endif
  603. #endif
  604. ERR_free_strings();
  605. EVP_cleanup();
  606. CRYPTO_cleanup_all_ex_data();
  607. #endif
  608. #endif
  609. #endif
  610. }