xp_ssl.c 72 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472
  1. /*
  2. +----------------------------------------------------------------------+
  3. | PHP Version 5 |
  4. +----------------------------------------------------------------------+
  5. | Copyright (c) 1997-2016 The PHP Group |
  6. +----------------------------------------------------------------------+
  7. | This source file is subject to version 3.01 of the PHP license, |
  8. | that is bundled with this package in the file LICENSE, and is |
  9. | available through the world-wide-web at the following url: |
  10. | http://www.php.net/license/3_01.txt |
  11. | If you did not receive a copy of the PHP license and are unable to |
  12. | obtain it through the world-wide-web, please send a note to |
  13. | license@php.net so we can mail you a copy immediately. |
  14. +----------------------------------------------------------------------+
  15. | Authors: Wez Furlong <wez@thebrainroom.com> |
  16. | Daniel Lowrey <rdlowrey@php.net> |
  17. | Chris Wright <daverandom@php.net> |
  18. +----------------------------------------------------------------------+
  19. */
  20. /* $Id$ */
  21. #ifdef HAVE_CONFIG_H
  22. #include "config.h"
  23. #endif
  24. #include "php.h"
  25. #include "ext/standard/file.h"
  26. #include "ext/standard/url.h"
  27. #include "streams/php_streams_int.h"
  28. #include "ext/standard/php_smart_str.h"
  29. #include "php_openssl.h"
  30. #include "php_network.h"
  31. #include <openssl/ssl.h>
  32. #include <openssl/x509.h>
  33. #include <openssl/x509v3.h>
  34. #include <openssl/err.h>
  35. #ifdef PHP_WIN32
  36. #include "win32/winutil.h"
  37. #include "win32/time.h"
  38. #include <Wincrypt.h>
  39. /* These are from Wincrypt.h, they conflict with OpenSSL */
  40. #undef X509_NAME
  41. #undef X509_CERT_PAIR
  42. #undef X509_EXTENSIONS
  43. #endif
  44. #ifdef NETWARE
  45. #include <sys/select.h>
  46. #endif
  47. #if !defined(OPENSSL_NO_ECDH) && OPENSSL_VERSION_NUMBER >= 0x0090800fL
  48. #define HAVE_ECDH 1
  49. #endif
  50. #if OPENSSL_VERSION_NUMBER >= 0x00908070L && !defined(OPENSSL_NO_TLSEXT)
  51. #define HAVE_SNI 1
  52. #endif
  53. /* Flags for determining allowed stream crypto methods */
  54. #define STREAM_CRYPTO_IS_CLIENT (1<<0)
  55. #define STREAM_CRYPTO_METHOD_SSLv2 (1<<1)
  56. #define STREAM_CRYPTO_METHOD_SSLv3 (1<<2)
  57. #define STREAM_CRYPTO_METHOD_TLSv1_0 (1<<3)
  58. #define STREAM_CRYPTO_METHOD_TLSv1_1 (1<<4)
  59. #define STREAM_CRYPTO_METHOD_TLSv1_2 (1<<5)
  60. /* Simplify ssl context option retrieval */
  61. #define GET_VER_OPT(name) (stream->context && SUCCESS == php_stream_context_get_option(stream->context, "ssl", name, &val))
  62. #define GET_VER_OPT_STRING(name, str) if (GET_VER_OPT(name)) { convert_to_string_ex(val); str = Z_STRVAL_PP(val); }
  63. #define GET_VER_OPT_LONG(name, num) if (GET_VER_OPT(name)) { convert_to_long_ex(val); num = Z_LVAL_PP(val); }
  64. /* Used for peer verification in windows */
  65. #define PHP_X509_NAME_ENTRY_TO_UTF8(ne, i, out) ASN1_STRING_to_UTF8(&out, X509_NAME_ENTRY_get_data(X509_NAME_get_entry(ne, i)))
  66. extern php_stream* php_openssl_get_stream_from_ssl_handle(const SSL *ssl);
  67. extern int php_openssl_x509_fingerprint(X509 *peer, const char *method, zend_bool raw, char **out, int *out_len TSRMLS_DC);
  68. extern int php_openssl_get_ssl_stream_data_index();
  69. extern int php_openssl_get_x509_list_id(void);
  70. static struct timeval subtract_timeval( struct timeval a, struct timeval b );
  71. static int compare_timeval( struct timeval a, struct timeval b );
  72. static size_t php_openssl_sockop_io(int read, php_stream *stream, char *buf, size_t count TSRMLS_DC);
  73. php_stream_ops php_openssl_socket_ops;
  74. /* Certificate contexts used for server-side SNI selection */
  75. typedef struct _php_openssl_sni_cert_t {
  76. char *name;
  77. SSL_CTX *ctx;
  78. } php_openssl_sni_cert_t;
  79. /* Provides leaky bucket handhsake renegotiation rate-limiting */
  80. typedef struct _php_openssl_handshake_bucket_t {
  81. long prev_handshake;
  82. long limit;
  83. long window;
  84. float tokens;
  85. unsigned should_close;
  86. } php_openssl_handshake_bucket_t;
  87. /* This implementation is very closely tied to the that of the native
  88. * sockets implemented in the core.
  89. * Don't try this technique in other extensions!
  90. * */
  91. typedef struct _php_openssl_netstream_data_t {
  92. php_netstream_data_t s;
  93. SSL *ssl_handle;
  94. SSL_CTX *ctx;
  95. struct timeval connect_timeout;
  96. int enable_on_connect;
  97. int is_client;
  98. int ssl_active;
  99. php_stream_xport_crypt_method_t method;
  100. php_openssl_handshake_bucket_t *reneg;
  101. php_openssl_sni_cert_t *sni_certs;
  102. unsigned sni_cert_count;
  103. char *url_name;
  104. unsigned state_set:1;
  105. unsigned _spare:31;
  106. } php_openssl_netstream_data_t;
  107. /* it doesn't matter that we do some hash traversal here, since it is done only
  108. * in an error condition arising from a network connection problem */
  109. static int is_http_stream_talking_to_iis(php_stream *stream TSRMLS_DC) /* {{{ */
  110. {
  111. if (stream->wrapperdata && stream->wrapper && strcasecmp(stream->wrapper->wops->label, "HTTP") == 0) {
  112. /* the wrapperdata is an array zval containing the headers */
  113. zval **tmp;
  114. #define SERVER_MICROSOFT_IIS "Server: Microsoft-IIS"
  115. #define SERVER_GOOGLE "Server: GFE/"
  116. zend_hash_internal_pointer_reset(Z_ARRVAL_P(stream->wrapperdata));
  117. while (SUCCESS == zend_hash_get_current_data(Z_ARRVAL_P(stream->wrapperdata), (void**)&tmp)) {
  118. if (strncasecmp(Z_STRVAL_PP(tmp), SERVER_MICROSOFT_IIS, sizeof(SERVER_MICROSOFT_IIS)-1) == 0) {
  119. return 1;
  120. } else if (strncasecmp(Z_STRVAL_PP(tmp), SERVER_GOOGLE, sizeof(SERVER_GOOGLE)-1) == 0) {
  121. return 1;
  122. }
  123. zend_hash_move_forward(Z_ARRVAL_P(stream->wrapperdata));
  124. }
  125. }
  126. return 0;
  127. }
  128. /* }}} */
  129. static int handle_ssl_error(php_stream *stream, int nr_bytes, zend_bool is_init TSRMLS_DC) /* {{{ */
  130. {
  131. php_openssl_netstream_data_t *sslsock = (php_openssl_netstream_data_t*)stream->abstract;
  132. int err = SSL_get_error(sslsock->ssl_handle, nr_bytes);
  133. char esbuf[512];
  134. smart_str ebuf = {0};
  135. unsigned long ecode;
  136. int retry = 1;
  137. switch(err) {
  138. case SSL_ERROR_ZERO_RETURN:
  139. /* SSL terminated (but socket may still be active) */
  140. retry = 0;
  141. break;
  142. case SSL_ERROR_WANT_READ:
  143. case SSL_ERROR_WANT_WRITE:
  144. /* re-negotiation, or perhaps the SSL layer needs more
  145. * packets: retry in next iteration */
  146. errno = EAGAIN;
  147. retry = is_init ? 1 : sslsock->s.is_blocked;
  148. break;
  149. case SSL_ERROR_SYSCALL:
  150. if (ERR_peek_error() == 0) {
  151. if (nr_bytes == 0) {
  152. if (!is_http_stream_talking_to_iis(stream TSRMLS_CC) && ERR_get_error() != 0) {
  153. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  154. "SSL: fatal protocol error");
  155. }
  156. SSL_set_shutdown(sslsock->ssl_handle, SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN);
  157. stream->eof = 1;
  158. retry = 0;
  159. } else {
  160. char *estr = php_socket_strerror(php_socket_errno(), NULL, 0);
  161. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  162. "SSL: %s", estr);
  163. efree(estr);
  164. retry = 0;
  165. }
  166. break;
  167. }
  168. /* fall through */
  169. default:
  170. /* some other error */
  171. ecode = ERR_get_error();
  172. switch (ERR_GET_REASON(ecode)) {
  173. case SSL_R_NO_SHARED_CIPHER:
  174. php_error_docref(NULL TSRMLS_CC, E_WARNING, "SSL_R_NO_SHARED_CIPHER: no suitable shared cipher could be used. This could be because the server is missing an SSL certificate (local_cert context option)");
  175. retry = 0;
  176. break;
  177. default:
  178. do {
  179. /* NULL is automatically added */
  180. ERR_error_string_n(ecode, esbuf, sizeof(esbuf));
  181. if (ebuf.c) {
  182. smart_str_appendc(&ebuf, '\n');
  183. }
  184. smart_str_appends(&ebuf, esbuf);
  185. } while ((ecode = ERR_get_error()) != 0);
  186. smart_str_0(&ebuf);
  187. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  188. "SSL operation failed with code %d. %s%s",
  189. err,
  190. ebuf.c ? "OpenSSL Error messages:\n" : "",
  191. ebuf.c ? ebuf.c : "");
  192. if (ebuf.c) {
  193. smart_str_free(&ebuf);
  194. }
  195. }
  196. retry = 0;
  197. errno = 0;
  198. }
  199. return retry;
  200. }
  201. /* }}} */
  202. static int verify_callback(int preverify_ok, X509_STORE_CTX *ctx) /* {{{ */
  203. {
  204. php_stream *stream;
  205. SSL *ssl;
  206. int err, depth, ret;
  207. zval **val;
  208. unsigned long allowed_depth = OPENSSL_DEFAULT_STREAM_VERIFY_DEPTH;
  209. ret = preverify_ok;
  210. /* determine the status for the current cert */
  211. err = X509_STORE_CTX_get_error(ctx);
  212. depth = X509_STORE_CTX_get_error_depth(ctx);
  213. /* conjure the stream & context to use */
  214. ssl = X509_STORE_CTX_get_ex_data(ctx, SSL_get_ex_data_X509_STORE_CTX_idx());
  215. stream = (php_stream*)SSL_get_ex_data(ssl, php_openssl_get_ssl_stream_data_index());
  216. /* if allow_self_signed is set, make sure that verification succeeds */
  217. if (err == X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT &&
  218. GET_VER_OPT("allow_self_signed") &&
  219. zend_is_true(*val)
  220. ) {
  221. ret = 1;
  222. }
  223. /* check the depth */
  224. GET_VER_OPT_LONG("verify_depth", allowed_depth);
  225. if ((unsigned long)depth > allowed_depth) {
  226. ret = 0;
  227. X509_STORE_CTX_set_error(ctx, X509_V_ERR_CERT_CHAIN_TOO_LONG);
  228. }
  229. return ret;
  230. }
  231. /* }}} */
  232. static int php_x509_fingerprint_cmp(X509 *peer, const char *method, const char *expected TSRMLS_DC)
  233. {
  234. char *fingerprint;
  235. int fingerprint_len;
  236. int result = -1;
  237. if (php_openssl_x509_fingerprint(peer, method, 0, &fingerprint, &fingerprint_len TSRMLS_CC) == SUCCESS) {
  238. result = strcasecmp(expected, fingerprint);
  239. efree(fingerprint);
  240. }
  241. return result;
  242. }
  243. static zend_bool php_x509_fingerprint_match(X509 *peer, zval *val TSRMLS_DC)
  244. {
  245. if (Z_TYPE_P(val) == IS_STRING) {
  246. const char *method = NULL;
  247. switch (Z_STRLEN_P(val)) {
  248. case 32:
  249. method = "md5";
  250. break;
  251. case 40:
  252. method = "sha1";
  253. break;
  254. }
  255. return method && php_x509_fingerprint_cmp(peer, method, Z_STRVAL_P(val) TSRMLS_CC) == 0;
  256. } else if (Z_TYPE_P(val) == IS_ARRAY) {
  257. HashPosition pos;
  258. zval **current;
  259. char *key;
  260. uint key_len;
  261. ulong key_index;
  262. if (!zend_hash_num_elements(Z_ARRVAL_P(val))) {
  263. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Invalid peer_fingerprint array; [algo => fingerprint] form required");
  264. return 0;
  265. }
  266. for (zend_hash_internal_pointer_reset_ex(Z_ARRVAL_P(val), &pos);
  267. zend_hash_get_current_data_ex(Z_ARRVAL_P(val), (void **)&current, &pos) == SUCCESS;
  268. zend_hash_move_forward_ex(Z_ARRVAL_P(val), &pos)
  269. ) {
  270. int key_type = zend_hash_get_current_key_ex(Z_ARRVAL_P(val), &key, &key_len, &key_index, 0, &pos);
  271. if (!(key_type == HASH_KEY_IS_STRING && Z_TYPE_PP(current) == IS_STRING)) {
  272. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Invalid peer_fingerprint array; [algo => fingerprint] form required");
  273. return 0;
  274. }
  275. if (php_x509_fingerprint_cmp(peer, key, Z_STRVAL_PP(current) TSRMLS_CC) != 0) {
  276. return 0;
  277. }
  278. }
  279. return 1;
  280. } else {
  281. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  282. "Invalid peer_fingerprint value; fingerprint string or array of the form [algo => fingerprint] required");
  283. }
  284. return 0;
  285. }
  286. static zend_bool matches_wildcard_name(const char *subjectname, const char *certname) /* {{{ */
  287. {
  288. char *wildcard = NULL;
  289. int prefix_len, suffix_len, subject_len;
  290. if (strcasecmp(subjectname, certname) == 0) {
  291. return 1;
  292. }
  293. /* wildcard, if present, must only be present in the left-most component */
  294. if (!(wildcard = strchr(certname, '*')) || memchr(certname, '.', wildcard - certname)) {
  295. return 0;
  296. }
  297. /* 1) prefix, if not empty, must match subject */
  298. prefix_len = wildcard - certname;
  299. if (prefix_len && strncasecmp(subjectname, certname, prefix_len) != 0) {
  300. return 0;
  301. }
  302. suffix_len = strlen(wildcard + 1);
  303. subject_len = strlen(subjectname);
  304. if (suffix_len <= subject_len) {
  305. /* 2) suffix must match
  306. * 3) no . between prefix and suffix
  307. **/
  308. return strcasecmp(wildcard + 1, subjectname + subject_len - suffix_len) == 0 &&
  309. memchr(subjectname + prefix_len, '.', subject_len - suffix_len - prefix_len) == NULL;
  310. }
  311. return 0;
  312. }
  313. /* }}} */
  314. static zend_bool matches_san_list(X509 *peer, const char *subject_name) /* {{{ */
  315. {
  316. int i, len;
  317. unsigned char *cert_name = NULL;
  318. char ipbuffer[64];
  319. GENERAL_NAMES *alt_names = X509_get_ext_d2i(peer, NID_subject_alt_name, 0, 0);
  320. int alt_name_count = sk_GENERAL_NAME_num(alt_names);
  321. for (i = 0; i < alt_name_count; i++) {
  322. GENERAL_NAME *san = sk_GENERAL_NAME_value(alt_names, i);
  323. if (san->type == GEN_DNS) {
  324. ASN1_STRING_to_UTF8(&cert_name, san->d.dNSName);
  325. if (ASN1_STRING_length(san->d.dNSName) != strlen((const char*)cert_name)) {
  326. OPENSSL_free(cert_name);
  327. /* prevent null-byte poisoning*/
  328. continue;
  329. }
  330. /* accommodate valid FQDN entries ending in "." */
  331. len = strlen((const char*)cert_name);
  332. if (len && strcmp((const char *)&cert_name[len-1], ".") == 0) {
  333. cert_name[len-1] = '\0';
  334. }
  335. if (matches_wildcard_name(subject_name, (const char *)cert_name)) {
  336. OPENSSL_free(cert_name);
  337. return 1;
  338. }
  339. OPENSSL_free(cert_name);
  340. } else if (san->type == GEN_IPADD) {
  341. if (san->d.iPAddress->length == 4) {
  342. sprintf(ipbuffer, "%d.%d.%d.%d",
  343. san->d.iPAddress->data[0],
  344. san->d.iPAddress->data[1],
  345. san->d.iPAddress->data[2],
  346. san->d.iPAddress->data[3]
  347. );
  348. if (strcasecmp(subject_name, (const char*)ipbuffer) == 0) {
  349. return 1;
  350. }
  351. }
  352. /* No, we aren't bothering to check IPv6 addresses. Why?
  353. * Because IP SAN names are officially deprecated and are
  354. * not allowed by CAs starting in 2015. Deal with it.
  355. */
  356. }
  357. }
  358. return 0;
  359. }
  360. /* }}} */
  361. static zend_bool matches_common_name(X509 *peer, const char *subject_name TSRMLS_DC) /* {{{ */
  362. {
  363. char buf[1024];
  364. X509_NAME *cert_name;
  365. zend_bool is_match = 0;
  366. int cert_name_len;
  367. cert_name = X509_get_subject_name(peer);
  368. cert_name_len = X509_NAME_get_text_by_NID(cert_name, NID_commonName, buf, sizeof(buf));
  369. if (cert_name_len == -1) {
  370. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Unable to locate peer certificate CN");
  371. } else if (cert_name_len != strlen(buf)) {
  372. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Peer certificate CN=`%.*s' is malformed", cert_name_len, buf);
  373. } else if (matches_wildcard_name(subject_name, buf)) {
  374. is_match = 1;
  375. } else {
  376. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Peer certificate CN=`%.*s' did not match expected CN=`%s'", cert_name_len, buf, subject_name);
  377. }
  378. return is_match;
  379. }
  380. /* }}} */
  381. static int apply_peer_verification_policy(SSL *ssl, X509 *peer, php_stream *stream TSRMLS_DC) /* {{{ */
  382. {
  383. zval **val = NULL;
  384. char *peer_name = NULL;
  385. int err,
  386. must_verify_peer,
  387. must_verify_peer_name,
  388. must_verify_fingerprint,
  389. has_cnmatch_ctx_opt;
  390. php_openssl_netstream_data_t *sslsock = (php_openssl_netstream_data_t*)stream->abstract;
  391. must_verify_peer = GET_VER_OPT("verify_peer")
  392. ? zend_is_true(*val)
  393. : sslsock->is_client;
  394. has_cnmatch_ctx_opt = GET_VER_OPT("CN_match");
  395. must_verify_peer_name = (has_cnmatch_ctx_opt || GET_VER_OPT("verify_peer_name"))
  396. ? zend_is_true(*val)
  397. : sslsock->is_client;
  398. must_verify_fingerprint = GET_VER_OPT("peer_fingerprint");
  399. if ((must_verify_peer || must_verify_peer_name || must_verify_fingerprint) && peer == NULL) {
  400. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Could not get peer certificate");
  401. return FAILURE;
  402. }
  403. /* Verify the peer against using CA file/path settings */
  404. if (must_verify_peer) {
  405. err = SSL_get_verify_result(ssl);
  406. switch (err) {
  407. case X509_V_OK:
  408. /* fine */
  409. break;
  410. case X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT:
  411. if (GET_VER_OPT("allow_self_signed") && zend_is_true(*val)) {
  412. /* allowed */
  413. break;
  414. }
  415. /* not allowed, so fall through */
  416. default:
  417. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  418. "Could not verify peer: code:%d %s",
  419. err,
  420. X509_verify_cert_error_string(err)
  421. );
  422. return FAILURE;
  423. }
  424. }
  425. /* If a peer_fingerprint match is required this trumps peer and peer_name verification */
  426. if (must_verify_fingerprint) {
  427. if (Z_TYPE_PP(val) == IS_STRING || Z_TYPE_PP(val) == IS_ARRAY) {
  428. if (!php_x509_fingerprint_match(peer, *val TSRMLS_CC)) {
  429. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  430. "peer_fingerprint match failure"
  431. );
  432. return FAILURE;
  433. }
  434. } else {
  435. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  436. "Expected peer fingerprint must be a string or an array"
  437. );
  438. return FAILURE;
  439. }
  440. }
  441. /* verify the host name presented in the peer certificate */
  442. if (must_verify_peer_name) {
  443. GET_VER_OPT_STRING("peer_name", peer_name);
  444. if (has_cnmatch_ctx_opt) {
  445. GET_VER_OPT_STRING("CN_match", peer_name);
  446. php_error(E_DEPRECATED,
  447. "the 'CN_match' SSL context option is deprecated in favor of 'peer_name'"
  448. );
  449. }
  450. /* If no peer name was specified we use the autodetected url name in client environments */
  451. if (peer_name == NULL && sslsock->is_client) {
  452. peer_name = sslsock->url_name;
  453. }
  454. if (peer_name) {
  455. if (matches_san_list(peer, peer_name)) {
  456. return SUCCESS;
  457. } else if (matches_common_name(peer, peer_name TSRMLS_CC)) {
  458. return SUCCESS;
  459. } else {
  460. return FAILURE;
  461. }
  462. } else {
  463. return FAILURE;
  464. }
  465. }
  466. return SUCCESS;
  467. }
  468. /* }}} */
  469. static int passwd_callback(char *buf, int num, int verify, void *data) /* {{{ */
  470. {
  471. php_stream *stream = (php_stream *)data;
  472. zval **val = NULL;
  473. char *passphrase = NULL;
  474. /* TODO: could expand this to make a callback into PHP user-space */
  475. GET_VER_OPT_STRING("passphrase", passphrase);
  476. if (passphrase) {
  477. if (Z_STRLEN_PP(val) < num - 1) {
  478. memcpy(buf, Z_STRVAL_PP(val), Z_STRLEN_PP(val)+1);
  479. return Z_STRLEN_PP(val);
  480. }
  481. }
  482. return 0;
  483. }
  484. /* }}} */
  485. #if defined(PHP_WIN32) && OPENSSL_VERSION_NUMBER >= 0x00907000L
  486. #define RETURN_CERT_VERIFY_FAILURE(code) X509_STORE_CTX_set_error(x509_store_ctx, code); return 0;
  487. static int win_cert_verify_callback(X509_STORE_CTX *x509_store_ctx, void *arg) /* {{{ */
  488. {
  489. PCCERT_CONTEXT cert_ctx = NULL;
  490. PCCERT_CHAIN_CONTEXT cert_chain_ctx = NULL;
  491. php_stream *stream;
  492. php_openssl_netstream_data_t *sslsock;
  493. zval **val;
  494. zend_bool is_self_signed = 0;
  495. TSRMLS_FETCH();
  496. stream = (php_stream*)arg;
  497. sslsock = (php_openssl_netstream_data_t*)stream->abstract;
  498. { /* First convert the x509 struct back to a DER encoded buffer and let Windows decode it into a form it can work with */
  499. unsigned char *der_buf = NULL;
  500. int der_len;
  501. der_len = i2d_X509(x509_store_ctx->cert, &der_buf);
  502. if (der_len < 0) {
  503. unsigned long err_code, e;
  504. char err_buf[512];
  505. while ((e = ERR_get_error()) != 0) {
  506. err_code = e;
  507. }
  508. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Error encoding X509 certificate: %d: %s", err_code, ERR_error_string(err_code, err_buf));
  509. RETURN_CERT_VERIFY_FAILURE(SSL_R_CERTIFICATE_VERIFY_FAILED);
  510. }
  511. cert_ctx = CertCreateCertificateContext(X509_ASN_ENCODING, der_buf, der_len);
  512. OPENSSL_free(der_buf);
  513. if (cert_ctx == NULL) {
  514. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Error creating certificate context: %s", php_win_err());
  515. RETURN_CERT_VERIFY_FAILURE(SSL_R_CERTIFICATE_VERIFY_FAILED);
  516. }
  517. }
  518. { /* Next fetch the relevant cert chain from the store */
  519. CERT_ENHKEY_USAGE enhkey_usage = {0};
  520. CERT_USAGE_MATCH cert_usage = {0};
  521. CERT_CHAIN_PARA chain_params = {sizeof(CERT_CHAIN_PARA)};
  522. LPSTR usages[] = {szOID_PKIX_KP_SERVER_AUTH, szOID_SERVER_GATED_CRYPTO, szOID_SGC_NETSCAPE};
  523. DWORD chain_flags = 0;
  524. unsigned long allowed_depth = OPENSSL_DEFAULT_STREAM_VERIFY_DEPTH;
  525. unsigned int i;
  526. enhkey_usage.cUsageIdentifier = 3;
  527. enhkey_usage.rgpszUsageIdentifier = usages;
  528. cert_usage.dwType = USAGE_MATCH_TYPE_OR;
  529. cert_usage.Usage = enhkey_usage;
  530. chain_params.RequestedUsage = cert_usage;
  531. chain_flags = CERT_CHAIN_CACHE_END_CERT | CERT_CHAIN_REVOCATION_CHECK_CHAIN_EXCLUDE_ROOT;
  532. if (!CertGetCertificateChain(NULL, cert_ctx, NULL, NULL, &chain_params, chain_flags, NULL, &cert_chain_ctx)) {
  533. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Error getting certificate chain: %s", php_win_err());
  534. CertFreeCertificateContext(cert_ctx);
  535. RETURN_CERT_VERIFY_FAILURE(SSL_R_CERTIFICATE_VERIFY_FAILED);
  536. }
  537. /* check if the cert is self-signed */
  538. if (cert_chain_ctx->cChain > 0 && cert_chain_ctx->rgpChain[0]->cElement > 0
  539. && (cert_chain_ctx->rgpChain[0]->rgpElement[0]->TrustStatus.dwInfoStatus & CERT_TRUST_IS_SELF_SIGNED) != 0) {
  540. is_self_signed = 1;
  541. }
  542. /* check the depth */
  543. GET_VER_OPT_LONG("verify_depth", allowed_depth);
  544. for (i = 0; i < cert_chain_ctx->cChain; i++) {
  545. if (cert_chain_ctx->rgpChain[i]->cElement > allowed_depth) {
  546. CertFreeCertificateChain(cert_chain_ctx);
  547. CertFreeCertificateContext(cert_ctx);
  548. RETURN_CERT_VERIFY_FAILURE(X509_V_ERR_CERT_CHAIN_TOO_LONG);
  549. }
  550. }
  551. }
  552. { /* Then verify it against a policy */
  553. SSL_EXTRA_CERT_CHAIN_POLICY_PARA ssl_policy_params = {sizeof(SSL_EXTRA_CERT_CHAIN_POLICY_PARA)};
  554. CERT_CHAIN_POLICY_PARA chain_policy_params = {sizeof(CERT_CHAIN_POLICY_PARA)};
  555. CERT_CHAIN_POLICY_STATUS chain_policy_status = {sizeof(CERT_CHAIN_POLICY_STATUS)};
  556. LPWSTR server_name = NULL;
  557. BOOL verify_result;
  558. { /* This looks ridiculous and it is - but we validate the name ourselves using the peer_name
  559. ctx option, so just use the CN from the cert here */
  560. X509_NAME *cert_name;
  561. unsigned char *cert_name_utf8;
  562. int index, cert_name_utf8_len;
  563. DWORD num_wchars;
  564. cert_name = X509_get_subject_name(x509_store_ctx->cert);
  565. index = X509_NAME_get_index_by_NID(cert_name, NID_commonName, -1);
  566. if (index < 0) {
  567. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Unable to locate certificate CN");
  568. CertFreeCertificateChain(cert_chain_ctx);
  569. CertFreeCertificateContext(cert_ctx);
  570. RETURN_CERT_VERIFY_FAILURE(SSL_R_CERTIFICATE_VERIFY_FAILED);
  571. }
  572. cert_name_utf8_len = PHP_X509_NAME_ENTRY_TO_UTF8(cert_name, index, cert_name_utf8);
  573. num_wchars = MultiByteToWideChar(CP_UTF8, 0, (char*)cert_name_utf8, -1, NULL, 0);
  574. if (num_wchars == 0) {
  575. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Unable to convert %s to wide character string", cert_name_utf8);
  576. OPENSSL_free(cert_name_utf8);
  577. CertFreeCertificateChain(cert_chain_ctx);
  578. CertFreeCertificateContext(cert_ctx);
  579. RETURN_CERT_VERIFY_FAILURE(SSL_R_CERTIFICATE_VERIFY_FAILED);
  580. }
  581. server_name = emalloc((num_wchars * sizeof(WCHAR)) + sizeof(WCHAR));
  582. num_wchars = MultiByteToWideChar(CP_UTF8, 0, (char*)cert_name_utf8, -1, server_name, num_wchars);
  583. if (num_wchars == 0) {
  584. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Unable to convert %s to wide character string", cert_name_utf8);
  585. efree(server_name);
  586. OPENSSL_free(cert_name_utf8);
  587. CertFreeCertificateChain(cert_chain_ctx);
  588. CertFreeCertificateContext(cert_ctx);
  589. RETURN_CERT_VERIFY_FAILURE(SSL_R_CERTIFICATE_VERIFY_FAILED);
  590. }
  591. OPENSSL_free(cert_name_utf8);
  592. }
  593. ssl_policy_params.dwAuthType = (sslsock->is_client) ? AUTHTYPE_SERVER : AUTHTYPE_CLIENT;
  594. ssl_policy_params.pwszServerName = server_name;
  595. chain_policy_params.pvExtraPolicyPara = &ssl_policy_params;
  596. verify_result = CertVerifyCertificateChainPolicy(CERT_CHAIN_POLICY_SSL, cert_chain_ctx, &chain_policy_params, &chain_policy_status);
  597. efree(server_name);
  598. CertFreeCertificateChain(cert_chain_ctx);
  599. CertFreeCertificateContext(cert_ctx);
  600. if (!verify_result) {
  601. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Error verifying certificate chain policy: %s", php_win_err());
  602. RETURN_CERT_VERIFY_FAILURE(SSL_R_CERTIFICATE_VERIFY_FAILED);
  603. }
  604. if (chain_policy_status.dwError != 0) {
  605. /* The chain does not match the policy */
  606. if (is_self_signed && chain_policy_status.dwError == CERT_E_UNTRUSTEDROOT
  607. && GET_VER_OPT("allow_self_signed") && zend_is_true(*val)) {
  608. /* allow self-signed certs */
  609. X509_STORE_CTX_set_error(x509_store_ctx, X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT);
  610. } else {
  611. RETURN_CERT_VERIFY_FAILURE(SSL_R_CERTIFICATE_VERIFY_FAILED);
  612. }
  613. }
  614. }
  615. return 1;
  616. }
  617. /* }}} */
  618. #endif
  619. static long load_stream_cafile(X509_STORE *cert_store, const char *cafile TSRMLS_DC) /* {{{ */
  620. {
  621. php_stream *stream;
  622. X509 *cert;
  623. BIO *buffer;
  624. int buffer_active = 0;
  625. char *line = NULL;
  626. size_t line_len;
  627. long certs_added = 0;
  628. stream = php_stream_open_wrapper(cafile, "rb", 0, NULL);
  629. if (stream == NULL) {
  630. php_error(E_WARNING, "failed loading cafile stream: `%s'", cafile);
  631. return 0;
  632. } else if (stream->wrapper->is_url) {
  633. php_stream_close(stream);
  634. php_error(E_WARNING, "remote cafile streams are disabled for security purposes");
  635. return 0;
  636. }
  637. cert_start: {
  638. line = php_stream_get_line(stream, NULL, 0, &line_len);
  639. if (line == NULL) {
  640. goto stream_complete;
  641. } else if (!strcmp(line, "-----BEGIN CERTIFICATE-----\n") ||
  642. !strcmp(line, "-----BEGIN CERTIFICATE-----\r\n")
  643. ) {
  644. buffer = BIO_new(BIO_s_mem());
  645. buffer_active = 1;
  646. goto cert_line;
  647. } else {
  648. efree(line);
  649. goto cert_start;
  650. }
  651. }
  652. cert_line: {
  653. BIO_puts(buffer, line);
  654. efree(line);
  655. line = php_stream_get_line(stream, NULL, 0, &line_len);
  656. if (line == NULL) {
  657. goto stream_complete;
  658. } else if (!strcmp(line, "-----END CERTIFICATE-----") ||
  659. !strcmp(line, "-----END CERTIFICATE-----\n") ||
  660. !strcmp(line, "-----END CERTIFICATE-----\r\n")
  661. ) {
  662. goto add_cert;
  663. } else {
  664. goto cert_line;
  665. }
  666. }
  667. add_cert: {
  668. BIO_puts(buffer, line);
  669. efree(line);
  670. cert = PEM_read_bio_X509(buffer, NULL, 0, NULL);
  671. BIO_free(buffer);
  672. buffer_active = 0;
  673. if (cert && X509_STORE_add_cert(cert_store, cert)) {
  674. ++certs_added;
  675. }
  676. goto cert_start;
  677. }
  678. stream_complete: {
  679. php_stream_close(stream);
  680. if (buffer_active == 1) {
  681. BIO_free(buffer);
  682. }
  683. }
  684. if (certs_added == 0) {
  685. php_error(E_WARNING, "no valid certs found cafile stream: `%s'", cafile);
  686. }
  687. return certs_added;
  688. }
  689. /* }}} */
  690. static int enable_peer_verification(SSL_CTX *ctx, php_stream *stream TSRMLS_DC) /* {{{ */
  691. {
  692. zval **val = NULL;
  693. char *cafile = NULL;
  694. char *capath = NULL;
  695. php_openssl_netstream_data_t *sslsock = (php_openssl_netstream_data_t*)stream->abstract;
  696. GET_VER_OPT_STRING("cafile", cafile);
  697. GET_VER_OPT_STRING("capath", capath);
  698. if (cafile == NULL) {
  699. cafile = zend_ini_string("openssl.cafile", sizeof("openssl.cafile"), 0);
  700. cafile = strlen(cafile) ? cafile : NULL;
  701. } else if (!sslsock->is_client) {
  702. /* Servers need to load and assign CA names from the cafile */
  703. STACK_OF(X509_NAME) *cert_names = SSL_load_client_CA_file(cafile);
  704. if (cert_names != NULL) {
  705. SSL_CTX_set_client_CA_list(ctx, cert_names);
  706. } else {
  707. php_error(E_WARNING, "SSL: failed loading CA names from cafile");
  708. return FAILURE;
  709. }
  710. }
  711. if (capath == NULL) {
  712. capath = zend_ini_string("openssl.capath", sizeof("openssl.capath"), 0);
  713. capath = strlen(capath) ? capath : NULL;
  714. }
  715. if (cafile || capath) {
  716. if (!SSL_CTX_load_verify_locations(ctx, cafile, capath)) {
  717. if (cafile && !load_stream_cafile(SSL_CTX_get_cert_store(ctx), cafile TSRMLS_CC)) {
  718. return FAILURE;
  719. }
  720. }
  721. } else {
  722. #if defined(PHP_WIN32) && OPENSSL_VERSION_NUMBER >= 0x00907000L
  723. SSL_CTX_set_cert_verify_callback(ctx, win_cert_verify_callback, (void *)stream);
  724. SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, NULL);
  725. #else
  726. if (sslsock->is_client && !SSL_CTX_set_default_verify_paths(ctx)) {
  727. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  728. "Unable to set default verify locations and no CA settings specified");
  729. return FAILURE;
  730. }
  731. #endif
  732. }
  733. SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, verify_callback);
  734. return SUCCESS;
  735. }
  736. /* }}} */
  737. static void disable_peer_verification(SSL_CTX *ctx, php_stream *stream TSRMLS_DC) /* {{{ */
  738. {
  739. SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, NULL);
  740. }
  741. /* }}} */
  742. static int set_local_cert(SSL_CTX *ctx, php_stream *stream TSRMLS_DC) /* {{{ */
  743. {
  744. zval **val = NULL;
  745. char *certfile = NULL;
  746. GET_VER_OPT_STRING("local_cert", certfile);
  747. if (certfile) {
  748. char resolved_path_buff[MAXPATHLEN];
  749. const char * private_key = NULL;
  750. if (VCWD_REALPATH(certfile, resolved_path_buff)) {
  751. /* a certificate to use for authentication */
  752. if (SSL_CTX_use_certificate_chain_file(ctx, resolved_path_buff) != 1) {
  753. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Unable to set local cert chain file `%s'; Check that your cafile/capath settings include details of your certificate and its issuer", certfile);
  754. return FAILURE;
  755. }
  756. GET_VER_OPT_STRING("local_pk", private_key);
  757. if (private_key) {
  758. char resolved_path_buff_pk[MAXPATHLEN];
  759. if (VCWD_REALPATH(private_key, resolved_path_buff_pk)) {
  760. if (SSL_CTX_use_PrivateKey_file(ctx, resolved_path_buff_pk, SSL_FILETYPE_PEM) != 1) {
  761. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Unable to set private key file `%s'", resolved_path_buff_pk);
  762. return FAILURE;
  763. }
  764. }
  765. } else {
  766. if (SSL_CTX_use_PrivateKey_file(ctx, resolved_path_buff, SSL_FILETYPE_PEM) != 1) {
  767. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Unable to set private key file `%s'", resolved_path_buff);
  768. return FAILURE;
  769. }
  770. }
  771. #if OPENSSL_VERSION_NUMBER < 0x10001001L
  772. do {
  773. /* Unnecessary as of OpenSSLv1.0.1 (will segfault if used with >= 10001001 ) */
  774. X509 *cert = NULL;
  775. EVP_PKEY *key = NULL;
  776. SSL *tmpssl = SSL_new(ctx);
  777. cert = SSL_get_certificate(tmpssl);
  778. if (cert) {
  779. key = X509_get_pubkey(cert);
  780. EVP_PKEY_copy_parameters(key, SSL_get_privatekey(tmpssl));
  781. EVP_PKEY_free(key);
  782. }
  783. SSL_free(tmpssl);
  784. } while (0);
  785. #endif
  786. if (!SSL_CTX_check_private_key(ctx)) {
  787. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Private key does not match certificate!");
  788. }
  789. }
  790. }
  791. return SUCCESS;
  792. }
  793. /* }}} */
  794. static const SSL_METHOD *php_select_crypto_method(long method_value, int is_client TSRMLS_DC) /* {{{ */
  795. {
  796. if (method_value == STREAM_CRYPTO_METHOD_SSLv2) {
  797. #ifndef OPENSSL_NO_SSL2
  798. return is_client ? SSLv2_client_method() : SSLv2_server_method();
  799. #else
  800. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  801. "SSLv2 support is not compiled into the OpenSSL library PHP is linked against");
  802. return NULL;
  803. #endif
  804. } else if (method_value == STREAM_CRYPTO_METHOD_SSLv3) {
  805. #ifndef OPENSSL_NO_SSL3
  806. return is_client ? SSLv3_client_method() : SSLv3_server_method();
  807. #else
  808. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  809. "SSLv3 support is not compiled into the OpenSSL library PHP is linked against");
  810. return NULL;
  811. #endif
  812. } else if (method_value == STREAM_CRYPTO_METHOD_TLSv1_0) {
  813. return is_client ? TLSv1_client_method() : TLSv1_server_method();
  814. } else if (method_value == STREAM_CRYPTO_METHOD_TLSv1_1) {
  815. #if OPENSSL_VERSION_NUMBER >= 0x10001001L
  816. return is_client ? TLSv1_1_client_method() : TLSv1_1_server_method();
  817. #else
  818. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  819. "TLSv1.1 support is not compiled into the OpenSSL library PHP is linked against");
  820. return NULL;
  821. #endif
  822. } else if (method_value == STREAM_CRYPTO_METHOD_TLSv1_2) {
  823. #if OPENSSL_VERSION_NUMBER >= 0x10001001L
  824. return is_client ? TLSv1_2_client_method() : TLSv1_2_server_method();
  825. #else
  826. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  827. "TLSv1.2 support is not compiled into the OpenSSL library PHP is linked against");
  828. return NULL;
  829. #endif
  830. } else {
  831. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  832. "Invalid crypto method");
  833. return NULL;
  834. }
  835. }
  836. /* }}} */
  837. static long php_get_crypto_method_ctx_flags(long method_flags TSRMLS_DC) /* {{{ */
  838. {
  839. long ssl_ctx_options = SSL_OP_ALL;
  840. #ifndef OPENSSL_NO_SSL2
  841. if (!(method_flags & STREAM_CRYPTO_METHOD_SSLv2)) {
  842. ssl_ctx_options |= SSL_OP_NO_SSLv2;
  843. }
  844. #endif
  845. #ifndef OPENSSL_NO_SSL3
  846. if (!(method_flags & STREAM_CRYPTO_METHOD_SSLv3)) {
  847. ssl_ctx_options |= SSL_OP_NO_SSLv3;
  848. }
  849. #endif
  850. #ifndef OPENSSL_NO_TLS1
  851. if (!(method_flags & STREAM_CRYPTO_METHOD_TLSv1_0)) {
  852. ssl_ctx_options |= SSL_OP_NO_TLSv1;
  853. }
  854. #endif
  855. #if OPENSSL_VERSION_NUMBER >= 0x10001001L
  856. if (!(method_flags & STREAM_CRYPTO_METHOD_TLSv1_1)) {
  857. ssl_ctx_options |= SSL_OP_NO_TLSv1_1;
  858. }
  859. if (!(method_flags & STREAM_CRYPTO_METHOD_TLSv1_2)) {
  860. ssl_ctx_options |= SSL_OP_NO_TLSv1_2;
  861. }
  862. #endif
  863. return ssl_ctx_options;
  864. }
  865. /* }}} */
  866. static void limit_handshake_reneg(const SSL *ssl) /* {{{ */
  867. {
  868. php_stream *stream;
  869. php_openssl_netstream_data_t *sslsock;
  870. struct timeval now;
  871. long elapsed_time;
  872. stream = php_openssl_get_stream_from_ssl_handle(ssl);
  873. sslsock = (php_openssl_netstream_data_t*)stream->abstract;
  874. gettimeofday(&now, NULL);
  875. /* The initial handshake is never rate-limited */
  876. if (sslsock->reneg->prev_handshake == 0) {
  877. sslsock->reneg->prev_handshake = now.tv_sec;
  878. return;
  879. }
  880. elapsed_time = (now.tv_sec - sslsock->reneg->prev_handshake);
  881. sslsock->reneg->prev_handshake = now.tv_sec;
  882. sslsock->reneg->tokens -= (elapsed_time * (sslsock->reneg->limit / sslsock->reneg->window));
  883. if (sslsock->reneg->tokens < 0) {
  884. sslsock->reneg->tokens = 0;
  885. }
  886. ++sslsock->reneg->tokens;
  887. /* The token level exceeds our allowed limit */
  888. if (sslsock->reneg->tokens > sslsock->reneg->limit) {
  889. zval **val;
  890. TSRMLS_FETCH();
  891. sslsock->reneg->should_close = 1;
  892. if (stream->context && SUCCESS == php_stream_context_get_option(stream->context,
  893. "ssl", "reneg_limit_callback", &val)
  894. ) {
  895. zval *param, **params[1], *retval;
  896. MAKE_STD_ZVAL(param);
  897. php_stream_to_zval(stream, param);
  898. params[0] = &param;
  899. /* Closing the stream inside this callback would segfault! */
  900. stream->flags |= PHP_STREAM_FLAG_NO_FCLOSE;
  901. if (FAILURE == call_user_function_ex(EG(function_table), NULL, *val, &retval, 1, params, 0, NULL TSRMLS_CC)) {
  902. php_error(E_WARNING, "SSL: failed invoking reneg limit notification callback");
  903. }
  904. stream->flags ^= PHP_STREAM_FLAG_NO_FCLOSE;
  905. /* If the reneg_limit_callback returned true don't auto-close */
  906. if (retval != NULL && Z_TYPE_P(retval) == IS_BOOL && Z_BVAL_P(retval) == 1) {
  907. sslsock->reneg->should_close = 0;
  908. }
  909. FREE_ZVAL(param);
  910. if (retval != NULL) {
  911. zval_ptr_dtor(&retval);
  912. }
  913. } else {
  914. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  915. "SSL: client-initiated handshake rate limit exceeded by peer");
  916. }
  917. }
  918. }
  919. /* }}} */
  920. static void info_callback(const SSL *ssl, int where, int ret) /* {{{ */
  921. {
  922. /* Rate-limit client-initiated handshake renegotiation to prevent DoS */
  923. if (where & SSL_CB_HANDSHAKE_START) {
  924. limit_handshake_reneg(ssl);
  925. }
  926. }
  927. /* }}} */
  928. static void init_server_reneg_limit(php_stream *stream, php_openssl_netstream_data_t *sslsock) /* {{{ */
  929. {
  930. zval **val;
  931. long limit = OPENSSL_DEFAULT_RENEG_LIMIT;
  932. long window = OPENSSL_DEFAULT_RENEG_WINDOW;
  933. if (stream->context &&
  934. SUCCESS == php_stream_context_get_option(stream->context,
  935. "ssl", "reneg_limit", &val)
  936. ) {
  937. convert_to_long(*val);
  938. limit = Z_LVAL_PP(val);
  939. }
  940. /* No renegotiation rate-limiting */
  941. if (limit < 0) {
  942. return;
  943. }
  944. if (stream->context &&
  945. SUCCESS == php_stream_context_get_option(stream->context,
  946. "ssl", "reneg_window", &val)
  947. ) {
  948. convert_to_long(*val);
  949. window = Z_LVAL_PP(val);
  950. }
  951. sslsock->reneg = (void*)pemalloc(sizeof(php_openssl_handshake_bucket_t),
  952. php_stream_is_persistent(stream)
  953. );
  954. sslsock->reneg->limit = limit;
  955. sslsock->reneg->window = window;
  956. sslsock->reneg->prev_handshake = 0;
  957. sslsock->reneg->tokens = 0;
  958. sslsock->reneg->should_close = 0;
  959. SSL_set_info_callback(sslsock->ssl_handle, info_callback);
  960. }
  961. /* }}} */
  962. static int set_server_rsa_key(php_stream *stream, SSL_CTX *ctx TSRMLS_DC) /* {{{ */
  963. {
  964. zval ** val;
  965. int rsa_key_size;
  966. RSA* rsa;
  967. if (php_stream_context_get_option(stream->context, "ssl", "rsa_key_size", &val) == SUCCESS) {
  968. rsa_key_size = (int) Z_LVAL_PP(val);
  969. if ((rsa_key_size != 1) && (rsa_key_size & (rsa_key_size - 1))) {
  970. php_error_docref(NULL TSRMLS_CC, E_WARNING, "RSA key size requires a power of 2: %d", rsa_key_size);
  971. rsa_key_size = 2048;
  972. }
  973. } else {
  974. rsa_key_size = 2048;
  975. }
  976. rsa = RSA_generate_key(rsa_key_size, RSA_F4, NULL, NULL);
  977. if (!SSL_CTX_set_tmp_rsa(ctx, rsa)) {
  978. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Failed setting RSA key");
  979. RSA_free(rsa);
  980. return FAILURE;
  981. }
  982. RSA_free(rsa);
  983. return SUCCESS;
  984. }
  985. /* }}} */
  986. static int set_server_dh_param(SSL_CTX *ctx, char *dh_path TSRMLS_DC) /* {{{ */
  987. {
  988. DH *dh;
  989. BIO* bio;
  990. bio = BIO_new_file(dh_path, "r");
  991. if (bio == NULL) {
  992. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Invalid dh_param file: %s", dh_path);
  993. return FAILURE;
  994. }
  995. dh = PEM_read_bio_DHparams(bio, NULL, NULL, NULL);
  996. BIO_free(bio);
  997. if (dh == NULL) {
  998. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Failed reading DH params from file: %s", dh_path);
  999. return FAILURE;
  1000. }
  1001. if (SSL_CTX_set_tmp_dh(ctx, dh) < 0) {
  1002. php_error_docref(NULL TSRMLS_CC, E_WARNING, "DH param assignment failed");
  1003. DH_free(dh);
  1004. return FAILURE;
  1005. }
  1006. DH_free(dh);
  1007. return SUCCESS;
  1008. }
  1009. /* }}} */
  1010. #ifdef HAVE_ECDH
  1011. static int set_server_ecdh_curve(php_stream *stream, SSL_CTX *ctx TSRMLS_DC) /* {{{ */
  1012. {
  1013. zval **val;
  1014. int curve_nid;
  1015. char *curve_str;
  1016. EC_KEY *ecdh;
  1017. if (php_stream_context_get_option(stream->context, "ssl", "ecdh_curve", &val) == SUCCESS) {
  1018. convert_to_string_ex(val);
  1019. curve_str = Z_STRVAL_PP(val);
  1020. curve_nid = OBJ_sn2nid(curve_str);
  1021. if (curve_nid == NID_undef) {
  1022. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Invalid ECDH curve: %s", curve_str);
  1023. return FAILURE;
  1024. }
  1025. } else {
  1026. curve_nid = NID_X9_62_prime256v1;
  1027. }
  1028. ecdh = EC_KEY_new_by_curve_name(curve_nid);
  1029. if (ecdh == NULL) {
  1030. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  1031. "Failed generating ECDH curve");
  1032. return FAILURE;
  1033. }
  1034. SSL_CTX_set_tmp_ecdh(ctx, ecdh);
  1035. EC_KEY_free(ecdh);
  1036. return SUCCESS;
  1037. }
  1038. /* }}} */
  1039. #endif
  1040. static int set_server_specific_opts(php_stream *stream, SSL_CTX *ctx TSRMLS_DC) /* {{{ */
  1041. {
  1042. zval **val;
  1043. long ssl_ctx_options = SSL_CTX_get_options(ctx);
  1044. #ifdef HAVE_ECDH
  1045. if (FAILURE == set_server_ecdh_curve(stream, ctx TSRMLS_CC)) {
  1046. return FAILURE;
  1047. }
  1048. #else
  1049. if (SUCCESS == php_stream_context_get_option(stream->context, "ssl", "ecdh_curve", &val)) {
  1050. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  1051. "ECDH curve support not compiled into the OpenSSL lib against which PHP is linked");
  1052. return FAILURE;
  1053. }
  1054. #endif
  1055. if (php_stream_context_get_option(stream->context, "ssl", "dh_param", &val) == SUCCESS) {
  1056. convert_to_string_ex(val);
  1057. if (FAILURE == set_server_dh_param(ctx, Z_STRVAL_PP(val) TSRMLS_CC)) {
  1058. return FAILURE;
  1059. }
  1060. }
  1061. if (FAILURE == set_server_rsa_key(stream, ctx TSRMLS_CC)) {
  1062. return FAILURE;
  1063. }
  1064. if (SUCCESS == php_stream_context_get_option(
  1065. stream->context, "ssl", "honor_cipher_order", &val) &&
  1066. zend_is_true(*val)
  1067. ) {
  1068. ssl_ctx_options |= SSL_OP_CIPHER_SERVER_PREFERENCE;
  1069. }
  1070. if (SUCCESS == php_stream_context_get_option(
  1071. stream->context, "ssl", "single_dh_use", &val) &&
  1072. zend_is_true(*val)
  1073. ) {
  1074. ssl_ctx_options |= SSL_OP_SINGLE_DH_USE;
  1075. }
  1076. #ifdef HAVE_ECDH
  1077. if (SUCCESS == php_stream_context_get_option(
  1078. stream->context, "ssl", "single_ecdh_use", &val) &&
  1079. zend_is_true(*val)
  1080. ) {
  1081. ssl_ctx_options |= SSL_OP_SINGLE_ECDH_USE;
  1082. }
  1083. #endif
  1084. SSL_CTX_set_options(ctx, ssl_ctx_options);
  1085. return SUCCESS;
  1086. }
  1087. /* }}} */
  1088. #ifdef HAVE_SNI
  1089. static int server_sni_callback(SSL *ssl_handle, int *al, void *arg) /* {{{ */
  1090. {
  1091. php_stream *stream;
  1092. php_openssl_netstream_data_t *sslsock;
  1093. unsigned i;
  1094. const char *server_name;
  1095. server_name = SSL_get_servername(ssl_handle, TLSEXT_NAMETYPE_host_name);
  1096. if (!server_name) {
  1097. return SSL_TLSEXT_ERR_NOACK;
  1098. }
  1099. stream = (php_stream*)SSL_get_ex_data(ssl_handle, php_openssl_get_ssl_stream_data_index());
  1100. sslsock = (php_openssl_netstream_data_t*)stream->abstract;
  1101. if (!(sslsock->sni_cert_count && sslsock->sni_certs)) {
  1102. return SSL_TLSEXT_ERR_NOACK;
  1103. }
  1104. for (i=0; i < sslsock->sni_cert_count; i++) {
  1105. if (matches_wildcard_name(server_name, sslsock->sni_certs[i].name)) {
  1106. SSL_set_SSL_CTX(ssl_handle, sslsock->sni_certs[i].ctx);
  1107. return SSL_TLSEXT_ERR_OK;
  1108. }
  1109. }
  1110. return SSL_TLSEXT_ERR_NOACK;
  1111. }
  1112. /* }}} */
  1113. static int enable_server_sni(php_stream *stream, php_openssl_netstream_data_t *sslsock TSRMLS_DC)
  1114. {
  1115. zval **val;
  1116. zval **current;
  1117. char *key;
  1118. uint key_len;
  1119. ulong key_index;
  1120. int key_type;
  1121. HashPosition pos;
  1122. int i = 0;
  1123. char resolved_path_buff[MAXPATHLEN];
  1124. SSL_CTX *ctx;
  1125. /* If the stream ctx disables SNI we're finished here */
  1126. if (GET_VER_OPT("SNI_enabled") && !zend_is_true(*val)) {
  1127. return SUCCESS;
  1128. }
  1129. /* If no SNI cert array is specified we're finished here */
  1130. if (!GET_VER_OPT("SNI_server_certs")) {
  1131. return SUCCESS;
  1132. }
  1133. if (Z_TYPE_PP(val) != IS_ARRAY) {
  1134. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  1135. "SNI_server_certs requires an array mapping host names to cert paths"
  1136. );
  1137. return FAILURE;
  1138. }
  1139. sslsock->sni_cert_count = zend_hash_num_elements(Z_ARRVAL_PP(val));
  1140. if (sslsock->sni_cert_count == 0) {
  1141. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  1142. "SNI_server_certs host cert array must not be empty"
  1143. );
  1144. return FAILURE;
  1145. }
  1146. sslsock->sni_certs = (php_openssl_sni_cert_t*)safe_pemalloc(sslsock->sni_cert_count,
  1147. sizeof(php_openssl_sni_cert_t), 0, php_stream_is_persistent(stream)
  1148. );
  1149. memset(sslsock->sni_certs, 0, sslsock->sni_cert_count * sizeof(php_openssl_sni_cert_t));
  1150. for (zend_hash_internal_pointer_reset_ex(Z_ARRVAL_PP(val), &pos);
  1151. zend_hash_get_current_data_ex(Z_ARRVAL_PP(val), (void **)&current, &pos) == SUCCESS;
  1152. zend_hash_move_forward_ex(Z_ARRVAL_PP(val), &pos)
  1153. ) {
  1154. key_type = zend_hash_get_current_key_ex(Z_ARRVAL_PP(val), &key, &key_len, &key_index, 0, &pos);
  1155. if (key_type != HASH_KEY_IS_STRING) {
  1156. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  1157. "SNI_server_certs array requires string host name keys"
  1158. );
  1159. return FAILURE;
  1160. }
  1161. if (VCWD_REALPATH(Z_STRVAL_PP(current), resolved_path_buff)) {
  1162. /* The hello method is not inherited by SSL structs when assigning a new context
  1163. * inside the SNI callback, so the just use SSLv23 */
  1164. ctx = SSL_CTX_new(SSLv23_server_method());
  1165. if (SSL_CTX_use_certificate_chain_file(ctx, resolved_path_buff) != 1) {
  1166. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  1167. "failed setting local cert chain file `%s'; " \
  1168. "check that your cafile/capath settings include " \
  1169. "details of your certificate and its issuer",
  1170. resolved_path_buff
  1171. );
  1172. SSL_CTX_free(ctx);
  1173. return FAILURE;
  1174. } else if (SSL_CTX_use_PrivateKey_file(ctx, resolved_path_buff, SSL_FILETYPE_PEM) != 1) {
  1175. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  1176. "failed setting private key from file `%s'",
  1177. resolved_path_buff
  1178. );
  1179. SSL_CTX_free(ctx);
  1180. return FAILURE;
  1181. } else {
  1182. sslsock->sni_certs[i].name = pestrdup(key, php_stream_is_persistent(stream));
  1183. sslsock->sni_certs[i].ctx = ctx;
  1184. ++i;
  1185. }
  1186. } else {
  1187. php_error_docref(NULL TSRMLS_CC, E_WARNING,
  1188. "failed setting local cert chain file `%s'; file not found",
  1189. Z_STRVAL_PP(current)
  1190. );
  1191. return FAILURE;
  1192. }
  1193. }
  1194. SSL_CTX_set_tlsext_servername_callback(sslsock->ctx, server_sni_callback);
  1195. return SUCCESS;
  1196. }
  1197. static void enable_client_sni(php_stream *stream, php_openssl_netstream_data_t *sslsock) /* {{{ */
  1198. {
  1199. zval **val;
  1200. char *sni_server_name;
  1201. /* If SNI is explicitly disabled we're finished here */
  1202. if (GET_VER_OPT("SNI_enabled") && !zend_is_true(*val)) {
  1203. return;
  1204. }
  1205. sni_server_name = sslsock->url_name;
  1206. GET_VER_OPT_STRING("peer_name", sni_server_name);
  1207. if (GET_VER_OPT("SNI_server_name")) {
  1208. GET_VER_OPT_STRING("SNI_server_name", sni_server_name);
  1209. php_error(E_DEPRECATED, "SNI_server_name is deprecated in favor of peer_name");
  1210. }
  1211. if (sni_server_name) {
  1212. SSL_set_tlsext_host_name(sslsock->ssl_handle, sni_server_name);
  1213. }
  1214. }
  1215. /* }}} */
  1216. #endif
  1217. int php_openssl_setup_crypto(php_stream *stream,
  1218. php_openssl_netstream_data_t *sslsock,
  1219. php_stream_xport_crypto_param *cparam
  1220. TSRMLS_DC) /* {{{ */
  1221. {
  1222. const SSL_METHOD *method;
  1223. long ssl_ctx_options;
  1224. long method_flags;
  1225. char *cipherlist = NULL;
  1226. zval **val;
  1227. if (sslsock->ssl_handle) {
  1228. if (sslsock->s.is_blocked) {
  1229. php_error_docref(NULL TSRMLS_CC, E_WARNING, "SSL/TLS already set-up for this stream");
  1230. return FAILURE;
  1231. } else {
  1232. return SUCCESS;
  1233. }
  1234. }
  1235. ERR_clear_error();
  1236. /* We need to do slightly different things based on client/server method
  1237. * so lets remember which method was selected */
  1238. sslsock->is_client = cparam->inputs.method & STREAM_CRYPTO_IS_CLIENT;
  1239. method_flags = ((cparam->inputs.method >> 1) << 1);
  1240. /* Should we use a specific crypto method or is generic SSLv23 okay? */
  1241. if ((method_flags & (method_flags-1)) == 0) {
  1242. ssl_ctx_options = SSL_OP_ALL;
  1243. method = php_select_crypto_method(method_flags, sslsock->is_client TSRMLS_CC);
  1244. if (method == NULL) {
  1245. return FAILURE;
  1246. }
  1247. } else {
  1248. method = sslsock->is_client ? SSLv23_client_method() : SSLv23_server_method();
  1249. ssl_ctx_options = php_get_crypto_method_ctx_flags(method_flags TSRMLS_CC);
  1250. if (ssl_ctx_options == -1) {
  1251. return FAILURE;
  1252. }
  1253. }
  1254. #if OPENSSL_VERSION_NUMBER >= 0x10001001L
  1255. sslsock->ctx = SSL_CTX_new(method);
  1256. #else
  1257. /* Avoid const warning with old versions */
  1258. sslsock->ctx = SSL_CTX_new((SSL_METHOD*)method);
  1259. #endif
  1260. if (sslsock->ctx == NULL) {
  1261. php_error_docref(NULL TSRMLS_CC, E_WARNING, "SSL context creation failure");
  1262. return FAILURE;
  1263. }
  1264. #if OPENSSL_VERSION_NUMBER >= 0x0090806fL
  1265. if (GET_VER_OPT("no_ticket") && zend_is_true(*val)) {
  1266. ssl_ctx_options |= SSL_OP_NO_TICKET;
  1267. }
  1268. #endif
  1269. #if OPENSSL_VERSION_NUMBER >= 0x0090605fL
  1270. ssl_ctx_options &= ~SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS;
  1271. #endif
  1272. #if OPENSSL_VERSION_NUMBER >= 0x10000000L
  1273. if (!GET_VER_OPT("disable_compression") || zend_is_true(*val)) {
  1274. ssl_ctx_options |= SSL_OP_NO_COMPRESSION;
  1275. }
  1276. #endif
  1277. if (GET_VER_OPT("verify_peer") && !zend_is_true(*val)) {
  1278. disable_peer_verification(sslsock->ctx, stream TSRMLS_CC);
  1279. } else if (FAILURE == enable_peer_verification(sslsock->ctx, stream TSRMLS_CC)) {
  1280. return FAILURE;
  1281. }
  1282. /* callback for the passphrase (for localcert) */
  1283. if (GET_VER_OPT("passphrase")) {
  1284. SSL_CTX_set_default_passwd_cb_userdata(sslsock->ctx, stream);
  1285. SSL_CTX_set_default_passwd_cb(sslsock->ctx, passwd_callback);
  1286. }
  1287. GET_VER_OPT_STRING("ciphers", cipherlist);
  1288. #ifndef USE_OPENSSL_SYSTEM_CIPHERS
  1289. if (!cipherlist) {
  1290. cipherlist = OPENSSL_DEFAULT_STREAM_CIPHERS;
  1291. }
  1292. #endif
  1293. if (cipherlist) {
  1294. if (SSL_CTX_set_cipher_list(sslsock->ctx, cipherlist) != 1) {
  1295. return FAILURE;
  1296. }
  1297. }
  1298. if (FAILURE == set_local_cert(sslsock->ctx, stream TSRMLS_CC)) {
  1299. return FAILURE;
  1300. }
  1301. SSL_CTX_set_options(sslsock->ctx, ssl_ctx_options);
  1302. if (sslsock->is_client == 0 &&
  1303. stream->context &&
  1304. FAILURE == set_server_specific_opts(stream, sslsock->ctx TSRMLS_CC)
  1305. ) {
  1306. return FAILURE;
  1307. }
  1308. sslsock->ssl_handle = SSL_new(sslsock->ctx);
  1309. if (sslsock->ssl_handle == NULL) {
  1310. php_error_docref(NULL TSRMLS_CC, E_WARNING, "SSL handle creation failure");
  1311. SSL_CTX_free(sslsock->ctx);
  1312. sslsock->ctx = NULL;
  1313. return FAILURE;
  1314. } else {
  1315. SSL_set_ex_data(sslsock->ssl_handle, php_openssl_get_ssl_stream_data_index(), stream);
  1316. }
  1317. if (!SSL_set_fd(sslsock->ssl_handle, sslsock->s.socket)) {
  1318. handle_ssl_error(stream, 0, 1 TSRMLS_CC);
  1319. }
  1320. #ifdef HAVE_SNI
  1321. /* Enable server-side SNI */
  1322. if (sslsock->is_client == 0 && enable_server_sni(stream, sslsock TSRMLS_CC) == FAILURE) {
  1323. return FAILURE;
  1324. }
  1325. #endif
  1326. /* Enable server-side handshake renegotiation rate-limiting */
  1327. if (sslsock->is_client == 0) {
  1328. init_server_reneg_limit(stream, sslsock);
  1329. }
  1330. #ifdef SSL_MODE_RELEASE_BUFFERS
  1331. do {
  1332. long mode = SSL_get_mode(sslsock->ssl_handle);
  1333. SSL_set_mode(sslsock->ssl_handle, mode | SSL_MODE_RELEASE_BUFFERS);
  1334. } while (0);
  1335. #endif
  1336. if (cparam->inputs.session) {
  1337. if (cparam->inputs.session->ops != &php_openssl_socket_ops) {
  1338. php_error_docref(NULL TSRMLS_CC, E_WARNING, "supplied session stream must be an SSL enabled stream");
  1339. } else if (((php_openssl_netstream_data_t*)cparam->inputs.session->abstract)->ssl_handle == NULL) {
  1340. php_error_docref(NULL TSRMLS_CC, E_WARNING, "supplied SSL session stream is not initialized");
  1341. } else {
  1342. SSL_copy_session_id(sslsock->ssl_handle, ((php_openssl_netstream_data_t*)cparam->inputs.session->abstract)->ssl_handle);
  1343. }
  1344. }
  1345. return SUCCESS;
  1346. }
  1347. /* }}} */
  1348. static zval *capture_session_meta(SSL *ssl_handle) /* {{{ */
  1349. {
  1350. zval *meta_arr;
  1351. char *proto_str;
  1352. long proto = SSL_version(ssl_handle);
  1353. const SSL_CIPHER *cipher = SSL_get_current_cipher(ssl_handle);
  1354. switch (proto) {
  1355. #if OPENSSL_VERSION_NUMBER >= 0x10001001L
  1356. case TLS1_2_VERSION: proto_str = "TLSv1.2"; break;
  1357. case TLS1_1_VERSION: proto_str = "TLSv1.1"; break;
  1358. #endif
  1359. case TLS1_VERSION: proto_str = "TLSv1"; break;
  1360. case SSL3_VERSION: proto_str = "SSLv3"; break;
  1361. case SSL2_VERSION: proto_str = "SSLv2"; break;
  1362. default: proto_str = "UNKNOWN";
  1363. }
  1364. MAKE_STD_ZVAL(meta_arr);
  1365. array_init(meta_arr);
  1366. add_assoc_string(meta_arr, "protocol", proto_str, 1);
  1367. add_assoc_string(meta_arr, "cipher_name", (char *) SSL_CIPHER_get_name(cipher), 1);
  1368. add_assoc_long(meta_arr, "cipher_bits", SSL_CIPHER_get_bits(cipher, NULL));
  1369. add_assoc_string(meta_arr, "cipher_version", SSL_CIPHER_get_version(cipher), 1);
  1370. return meta_arr;
  1371. }
  1372. /* }}} */
  1373. static int capture_peer_certs(php_stream *stream, php_openssl_netstream_data_t *sslsock, X509 *peer_cert TSRMLS_DC) /* {{{ */
  1374. {
  1375. zval **val, *zcert;
  1376. int cert_captured = 0;
  1377. if (SUCCESS == php_stream_context_get_option(stream->context,
  1378. "ssl", "capture_peer_cert", &val) &&
  1379. zend_is_true(*val)
  1380. ) {
  1381. MAKE_STD_ZVAL(zcert);
  1382. ZVAL_RESOURCE(zcert, zend_list_insert(peer_cert, php_openssl_get_x509_list_id() TSRMLS_CC));
  1383. php_stream_context_set_option(stream->context, "ssl", "peer_certificate", zcert);
  1384. cert_captured = 1;
  1385. FREE_ZVAL(zcert);
  1386. }
  1387. if (SUCCESS == php_stream_context_get_option(stream->context,
  1388. "ssl", "capture_peer_cert_chain", &val) &&
  1389. zend_is_true(*val)
  1390. ) {
  1391. zval *arr;
  1392. STACK_OF(X509) *chain;
  1393. MAKE_STD_ZVAL(arr);
  1394. chain = SSL_get_peer_cert_chain(sslsock->ssl_handle);
  1395. if (chain && sk_X509_num(chain) > 0) {
  1396. int i;
  1397. array_init(arr);
  1398. for (i = 0; i < sk_X509_num(chain); i++) {
  1399. X509 *mycert = X509_dup(sk_X509_value(chain, i));
  1400. MAKE_STD_ZVAL(zcert);
  1401. ZVAL_RESOURCE(zcert, zend_list_insert(mycert, php_openssl_get_x509_list_id() TSRMLS_CC));
  1402. add_next_index_zval(arr, zcert);
  1403. }
  1404. } else {
  1405. ZVAL_NULL(arr);
  1406. }
  1407. php_stream_context_set_option(stream->context, "ssl", "peer_certificate_chain", arr);
  1408. zval_dtor(arr);
  1409. efree(arr);
  1410. }
  1411. return cert_captured;
  1412. }
  1413. /* }}} */
  1414. static int php_openssl_enable_crypto(php_stream *stream,
  1415. php_openssl_netstream_data_t *sslsock,
  1416. php_stream_xport_crypto_param *cparam
  1417. TSRMLS_DC)
  1418. {
  1419. int n;
  1420. int retry = 1;
  1421. int cert_captured;
  1422. X509 *peer_cert;
  1423. if (cparam->inputs.activate && !sslsock->ssl_active) {
  1424. struct timeval start_time,
  1425. *timeout;
  1426. int blocked = sslsock->s.is_blocked,
  1427. has_timeout = 0;
  1428. #ifdef HAVE_SNI
  1429. if (sslsock->is_client) {
  1430. enable_client_sni(stream, sslsock);
  1431. }
  1432. #endif
  1433. if (!sslsock->state_set) {
  1434. if (sslsock->is_client) {
  1435. SSL_set_connect_state(sslsock->ssl_handle);
  1436. } else {
  1437. SSL_set_accept_state(sslsock->ssl_handle);
  1438. }
  1439. sslsock->state_set = 1;
  1440. }
  1441. if (SUCCESS == php_set_sock_blocking(sslsock->s.socket, 0 TSRMLS_CC)) {
  1442. sslsock->s.is_blocked = 0;
  1443. }
  1444. timeout = sslsock->is_client ? &sslsock->connect_timeout : &sslsock->s.timeout;
  1445. has_timeout = !sslsock->s.is_blocked && (timeout->tv_sec || timeout->tv_usec);
  1446. /* gettimeofday is not monotonic; using it here is not strictly correct */
  1447. if (has_timeout) {
  1448. gettimeofday(&start_time, NULL);
  1449. }
  1450. do {
  1451. struct timeval cur_time,
  1452. elapsed_time = {0};
  1453. if (sslsock->is_client) {
  1454. n = SSL_connect(sslsock->ssl_handle);
  1455. } else {
  1456. n = SSL_accept(sslsock->ssl_handle);
  1457. }
  1458. if (has_timeout) {
  1459. gettimeofday(&cur_time, NULL);
  1460. elapsed_time = subtract_timeval( cur_time, start_time );
  1461. if (compare_timeval( elapsed_time, *timeout) > 0) {
  1462. php_error_docref(NULL TSRMLS_CC, E_WARNING, "SSL: Handshake timed out");
  1463. return -1;
  1464. }
  1465. }
  1466. if (n <= 0) {
  1467. /* in case of SSL_ERROR_WANT_READ/WRITE, do not retry in non-blocking mode */
  1468. retry = handle_ssl_error(stream, n, blocked TSRMLS_CC);
  1469. if (retry) {
  1470. /* wait until something interesting happens in the socket. It may be a
  1471. * timeout. Also consider the unlikely of possibility of a write block */
  1472. int err = SSL_get_error(sslsock->ssl_handle, n);
  1473. struct timeval left_time;
  1474. if (has_timeout) {
  1475. left_time = subtract_timeval( *timeout, elapsed_time );
  1476. }
  1477. php_pollfd_for(sslsock->s.socket, (err == SSL_ERROR_WANT_READ) ?
  1478. (POLLIN|POLLPRI) : POLLOUT, has_timeout ? &left_time : NULL);
  1479. }
  1480. } else {
  1481. retry = 0;
  1482. }
  1483. } while (retry);
  1484. if (sslsock->s.is_blocked != blocked && SUCCESS == php_set_sock_blocking(sslsock->s.socket, blocked TSRMLS_CC)) {
  1485. sslsock->s.is_blocked = blocked;
  1486. }
  1487. if (n == 1) {
  1488. peer_cert = SSL_get_peer_certificate(sslsock->ssl_handle);
  1489. if (peer_cert && stream->context) {
  1490. cert_captured = capture_peer_certs(stream, sslsock, peer_cert TSRMLS_CC);
  1491. }
  1492. if (FAILURE == apply_peer_verification_policy(sslsock->ssl_handle, peer_cert, stream TSRMLS_CC)) {
  1493. SSL_shutdown(sslsock->ssl_handle);
  1494. n = -1;
  1495. } else {
  1496. sslsock->ssl_active = 1;
  1497. if (stream->context) {
  1498. zval **val;
  1499. if (SUCCESS == php_stream_context_get_option(stream->context,
  1500. "ssl", "capture_session_meta", &val) &&
  1501. zend_is_true(*val)
  1502. ) {
  1503. zval *meta_arr = capture_session_meta(sslsock->ssl_handle);
  1504. php_stream_context_set_option(stream->context, "ssl", "session_meta", meta_arr);
  1505. zval_dtor(meta_arr);
  1506. efree(meta_arr);
  1507. }
  1508. }
  1509. }
  1510. } else if (errno == EAGAIN) {
  1511. n = 0;
  1512. } else {
  1513. n = -1;
  1514. peer_cert = SSL_get_peer_certificate(sslsock->ssl_handle);
  1515. if (peer_cert && stream->context) {
  1516. cert_captured = capture_peer_certs(stream, sslsock, peer_cert TSRMLS_CC);
  1517. }
  1518. }
  1519. if (n && peer_cert && cert_captured == 0) {
  1520. X509_free(peer_cert);
  1521. }
  1522. return n;
  1523. } else if (!cparam->inputs.activate && sslsock->ssl_active) {
  1524. /* deactivate - common for server/client */
  1525. SSL_shutdown(sslsock->ssl_handle);
  1526. sslsock->ssl_active = 0;
  1527. }
  1528. return -1;
  1529. }
  1530. static size_t php_openssl_sockop_read(php_stream *stream, char *buf, size_t count TSRMLS_DC)/* {{{ */
  1531. {
  1532. return php_openssl_sockop_io(1, stream, buf, count TSRMLS_CC);
  1533. }
  1534. /* }}} */
  1535. static size_t php_openssl_sockop_write(php_stream *stream, const char *buf, size_t count TSRMLS_DC) /* {{{ */
  1536. {
  1537. return php_openssl_sockop_io(0, stream, (char*)buf, count TSRMLS_CC);
  1538. }
  1539. /* }}} */
  1540. /**
  1541. * Factored out common functionality (blocking, timeout, loop management) for read and write.
  1542. * Perform IO (read or write) to an SSL socket. If we have a timeout, we switch to non-blocking mode
  1543. * for the duration of the operation, using select to do our waits. If we time out, or we have an error
  1544. * report that back to PHP
  1545. *
  1546. */
  1547. static size_t php_openssl_sockop_io(int read, php_stream *stream, char *buf, size_t count TSRMLS_DC)
  1548. {
  1549. php_openssl_netstream_data_t *sslsock = (php_openssl_netstream_data_t*)stream->abstract;
  1550. int nr_bytes = 0;
  1551. /* Only do this if SSL is active. */
  1552. if (sslsock->ssl_active) {
  1553. int retry = 1;
  1554. struct timeval start_time;
  1555. struct timeval *timeout = NULL;
  1556. int began_blocked = sslsock->s.is_blocked;
  1557. int has_timeout = 0;
  1558. /* never use a timeout with non-blocking sockets */
  1559. if (began_blocked && &sslsock->s.timeout) {
  1560. timeout = &sslsock->s.timeout;
  1561. }
  1562. if (timeout && php_set_sock_blocking(sslsock->s.socket, 0 TSRMLS_CC) == SUCCESS) {
  1563. sslsock->s.is_blocked = 0;
  1564. }
  1565. if (!sslsock->s.is_blocked && timeout && (timeout->tv_sec || timeout->tv_usec)) {
  1566. has_timeout = 1;
  1567. /* gettimeofday is not monotonic; using it here is not strictly correct */
  1568. gettimeofday(&start_time, NULL);
  1569. }
  1570. /* Main IO loop. */
  1571. do {
  1572. struct timeval cur_time, elapsed_time, left_time;
  1573. /* If we have a timeout to check, figure out how much time has elapsed since we started. */
  1574. if (has_timeout) {
  1575. gettimeofday(&cur_time, NULL);
  1576. /* Determine how much time we've taken so far. */
  1577. elapsed_time = subtract_timeval(cur_time, start_time);
  1578. /* and return an error if we've taken too long. */
  1579. if (compare_timeval(elapsed_time, *timeout) > 0 ) {
  1580. /* If the socket was originally blocking, set it back. */
  1581. if (began_blocked) {
  1582. php_set_sock_blocking(sslsock->s.socket, 1 TSRMLS_CC);
  1583. sslsock->s.is_blocked = 1;
  1584. }
  1585. sslsock->s.timeout_event = 1;
  1586. return -1;
  1587. }
  1588. }
  1589. /* Now, do the IO operation. Don't block if we can't complete... */
  1590. if (read) {
  1591. nr_bytes = SSL_read(sslsock->ssl_handle, buf, count);
  1592. if (sslsock->reneg && sslsock->reneg->should_close) {
  1593. /* renegotiation rate limiting triggered */
  1594. php_stream_xport_shutdown(stream, (stream_shutdown_t)SHUT_RDWR TSRMLS_CC);
  1595. nr_bytes = 0;
  1596. stream->eof = 1;
  1597. break;
  1598. }
  1599. } else {
  1600. nr_bytes = SSL_write(sslsock->ssl_handle, buf, count);
  1601. }
  1602. /* Now, how much time until we time out? */
  1603. if (has_timeout) {
  1604. left_time = subtract_timeval( *timeout, elapsed_time );
  1605. }
  1606. /* If we didn't do anything on the last loop (or an error) check to see if we should retry or exit. */
  1607. if (nr_bytes <= 0) {
  1608. /* Get the error code from SSL, and check to see if it's an error or not. */
  1609. int err = SSL_get_error(sslsock->ssl_handle, nr_bytes );
  1610. retry = handle_ssl_error(stream, nr_bytes, 0 TSRMLS_CC);
  1611. /* If we get this (the above doesn't check) then we'll retry as well. */
  1612. if (errno == EAGAIN && err == SSL_ERROR_WANT_READ && read) {
  1613. retry = 1;
  1614. }
  1615. if (errno == EAGAIN && err == SSL_ERROR_WANT_WRITE && read == 0) {
  1616. retry = 1;
  1617. }
  1618. /* Also, on reads, we may get this condition on an EOF. We should check properly. */
  1619. if (read) {
  1620. stream->eof = (retry == 0 && errno != EAGAIN && !SSL_pending(sslsock->ssl_handle));
  1621. }
  1622. /* Don't loop indefinitely in non-blocking mode if no data is available */
  1623. if (began_blocked == 0) {
  1624. break;
  1625. }
  1626. /* Now, if we have to wait some time, and we're supposed to be blocking, wait for the socket to become
  1627. * available. Now, php_pollfd_for uses select to wait up to our time_left value only...
  1628. */
  1629. if (retry) {
  1630. if (read) {
  1631. php_pollfd_for(sslsock->s.socket, (err == SSL_ERROR_WANT_WRITE) ?
  1632. (POLLOUT|POLLPRI) : (POLLIN|POLLPRI), has_timeout ? &left_time : NULL);
  1633. } else {
  1634. php_pollfd_for(sslsock->s.socket, (err == SSL_ERROR_WANT_READ) ?
  1635. (POLLIN|POLLPRI) : (POLLOUT|POLLPRI), has_timeout ? &left_time : NULL);
  1636. }
  1637. }
  1638. } else {
  1639. /* Else, if we got bytes back, check for possible errors. */
  1640. int err = SSL_get_error(sslsock->ssl_handle, nr_bytes);
  1641. /* If we didn't get any error, then let's return it to PHP. */
  1642. if (err == SSL_ERROR_NONE)
  1643. break;
  1644. /* Otherwise, we need to wait again (up to time_left or we get an error) */
  1645. if (began_blocked) {
  1646. if (read) {
  1647. php_pollfd_for(sslsock->s.socket, (err == SSL_ERROR_WANT_WRITE) ?
  1648. (POLLOUT|POLLPRI) : (POLLIN|POLLPRI), has_timeout ? &left_time : NULL);
  1649. } else {
  1650. php_pollfd_for(sslsock->s.socket, (err == SSL_ERROR_WANT_READ) ?
  1651. (POLLIN|POLLPRI) : (POLLOUT|POLLPRI), has_timeout ? &left_time : NULL);
  1652. }
  1653. }
  1654. }
  1655. /* Finally, we keep going until we got data, and an SSL_ERROR_NONE, unless we had an error. */
  1656. } while (retry);
  1657. /* Tell PHP if we read / wrote bytes. */
  1658. if (nr_bytes > 0) {
  1659. php_stream_notify_progress_increment(stream->context, nr_bytes, 0);
  1660. }
  1661. /* And if we were originally supposed to be blocking, let's reset the socket to that. */
  1662. if (began_blocked && php_set_sock_blocking(sslsock->s.socket, 1 TSRMLS_CC) == SUCCESS) {
  1663. sslsock->s.is_blocked = 1;
  1664. }
  1665. } else {
  1666. /*
  1667. * This block is if we had no timeout... We will just sit and wait forever on the IO operation.
  1668. */
  1669. if (read) {
  1670. nr_bytes = php_stream_socket_ops.read(stream, buf, count TSRMLS_CC);
  1671. } else {
  1672. nr_bytes = php_stream_socket_ops.write(stream, buf, count TSRMLS_CC);
  1673. }
  1674. }
  1675. /* PHP doesn't expect a negative return. */
  1676. if (nr_bytes < 0) {
  1677. nr_bytes = 0;
  1678. }
  1679. return nr_bytes;
  1680. }
  1681. /* }}} */
  1682. struct timeval subtract_timeval( struct timeval a, struct timeval b )
  1683. {
  1684. struct timeval difference;
  1685. difference.tv_sec = a.tv_sec - b.tv_sec;
  1686. difference.tv_usec = a.tv_usec - b.tv_usec;
  1687. if (a.tv_usec < b.tv_usec) {
  1688. b.tv_sec -= 1L;
  1689. b.tv_usec += 1000000L;
  1690. }
  1691. return difference;
  1692. }
  1693. int compare_timeval( struct timeval a, struct timeval b )
  1694. {
  1695. if (a.tv_sec > b.tv_sec || (a.tv_sec == b.tv_sec && a.tv_usec > b.tv_usec) ) {
  1696. return 1;
  1697. } else if( a.tv_sec == b.tv_sec && a.tv_usec == b.tv_usec ) {
  1698. return 0;
  1699. } else {
  1700. return -1;
  1701. }
  1702. }
  1703. static int php_openssl_sockop_close(php_stream *stream, int close_handle TSRMLS_DC) /* {{{ */
  1704. {
  1705. php_openssl_netstream_data_t *sslsock = (php_openssl_netstream_data_t*)stream->abstract;
  1706. #ifdef PHP_WIN32
  1707. int n;
  1708. #endif
  1709. unsigned i;
  1710. if (close_handle) {
  1711. if (sslsock->ssl_active) {
  1712. SSL_shutdown(sslsock->ssl_handle);
  1713. sslsock->ssl_active = 0;
  1714. }
  1715. if (sslsock->ssl_handle) {
  1716. SSL_free(sslsock->ssl_handle);
  1717. sslsock->ssl_handle = NULL;
  1718. }
  1719. if (sslsock->ctx) {
  1720. SSL_CTX_free(sslsock->ctx);
  1721. sslsock->ctx = NULL;
  1722. }
  1723. #ifdef PHP_WIN32
  1724. if (sslsock->s.socket == -1)
  1725. sslsock->s.socket = SOCK_ERR;
  1726. #endif
  1727. if (sslsock->s.socket != SOCK_ERR) {
  1728. #ifdef PHP_WIN32
  1729. /* prevent more data from coming in */
  1730. shutdown(sslsock->s.socket, SHUT_RD);
  1731. /* try to make sure that the OS sends all data before we close the connection.
  1732. * Essentially, we are waiting for the socket to become writeable, which means
  1733. * that all pending data has been sent.
  1734. * We use a small timeout which should encourage the OS to send the data,
  1735. * but at the same time avoid hanging indefinitely.
  1736. * */
  1737. do {
  1738. n = php_pollfd_for_ms(sslsock->s.socket, POLLOUT, 500);
  1739. } while (n == -1 && php_socket_errno() == EINTR);
  1740. #endif
  1741. closesocket(sslsock->s.socket);
  1742. sslsock->s.socket = SOCK_ERR;
  1743. }
  1744. }
  1745. if (sslsock->sni_certs) {
  1746. for (i = 0; i < sslsock->sni_cert_count; i++) {
  1747. if (sslsock->sni_certs[i].ctx) {
  1748. SSL_CTX_free(sslsock->sni_certs[i].ctx);
  1749. pefree(sslsock->sni_certs[i].name, php_stream_is_persistent(stream));
  1750. }
  1751. }
  1752. pefree(sslsock->sni_certs, php_stream_is_persistent(stream));
  1753. sslsock->sni_certs = NULL;
  1754. }
  1755. if (sslsock->url_name) {
  1756. pefree(sslsock->url_name, php_stream_is_persistent(stream));
  1757. }
  1758. if (sslsock->reneg) {
  1759. pefree(sslsock->reneg, php_stream_is_persistent(stream));
  1760. }
  1761. pefree(sslsock, php_stream_is_persistent(stream));
  1762. return 0;
  1763. }
  1764. /* }}} */
  1765. static int php_openssl_sockop_flush(php_stream *stream TSRMLS_DC) /* {{{ */
  1766. {
  1767. return php_stream_socket_ops.flush(stream TSRMLS_CC);
  1768. }
  1769. /* }}} */
  1770. static int php_openssl_sockop_stat(php_stream *stream, php_stream_statbuf *ssb TSRMLS_DC) /* {{{ */
  1771. {
  1772. return php_stream_socket_ops.stat(stream, ssb TSRMLS_CC);
  1773. }
  1774. /* }}} */
  1775. static inline int php_openssl_tcp_sockop_accept(php_stream *stream, php_openssl_netstream_data_t *sock,
  1776. php_stream_xport_param *xparam STREAMS_DC TSRMLS_DC)
  1777. {
  1778. int clisock;
  1779. xparam->outputs.client = NULL;
  1780. clisock = php_network_accept_incoming(sock->s.socket,
  1781. xparam->want_textaddr ? &xparam->outputs.textaddr : NULL,
  1782. xparam->want_textaddr ? &xparam->outputs.textaddrlen : NULL,
  1783. xparam->want_addr ? &xparam->outputs.addr : NULL,
  1784. xparam->want_addr ? &xparam->outputs.addrlen : NULL,
  1785. xparam->inputs.timeout,
  1786. xparam->want_errortext ? &xparam->outputs.error_text : NULL,
  1787. &xparam->outputs.error_code
  1788. TSRMLS_CC);
  1789. if (clisock >= 0) {
  1790. php_openssl_netstream_data_t *clisockdata;
  1791. clisockdata = emalloc(sizeof(*clisockdata));
  1792. if (clisockdata == NULL) {
  1793. closesocket(clisock);
  1794. /* technically a fatal error */
  1795. } else {
  1796. /* copy underlying tcp fields */
  1797. memset(clisockdata, 0, sizeof(*clisockdata));
  1798. memcpy(clisockdata, sock, sizeof(clisockdata->s));
  1799. clisockdata->s.socket = clisock;
  1800. xparam->outputs.client = php_stream_alloc_rel(stream->ops, clisockdata, NULL, "r+");
  1801. if (xparam->outputs.client) {
  1802. xparam->outputs.client->context = stream->context;
  1803. if (stream->context) {
  1804. zend_list_addref(stream->context->rsrc_id);
  1805. }
  1806. }
  1807. }
  1808. if (xparam->outputs.client && sock->enable_on_connect) {
  1809. /* remove the client bit */
  1810. if (sock->method & STREAM_CRYPTO_IS_CLIENT) {
  1811. sock->method = ((sock->method >> 1) << 1);
  1812. }
  1813. clisockdata->method = sock->method;
  1814. if (php_stream_xport_crypto_setup(xparam->outputs.client, clisockdata->method,
  1815. NULL TSRMLS_CC) < 0 || php_stream_xport_crypto_enable(
  1816. xparam->outputs.client, 1 TSRMLS_CC) < 0) {
  1817. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Failed to enable crypto");
  1818. php_stream_close(xparam->outputs.client);
  1819. xparam->outputs.client = NULL;
  1820. xparam->outputs.returncode = -1;
  1821. }
  1822. }
  1823. }
  1824. return xparam->outputs.client == NULL ? -1 : 0;
  1825. }
  1826. static int php_openssl_sockop_set_option(php_stream *stream, int option, int value, void *ptrparam TSRMLS_DC)
  1827. {
  1828. php_openssl_netstream_data_t *sslsock = (php_openssl_netstream_data_t*)stream->abstract;
  1829. php_stream_xport_crypto_param *cparam = (php_stream_xport_crypto_param *)ptrparam;
  1830. php_stream_xport_param *xparam = (php_stream_xport_param *)ptrparam;
  1831. switch (option) {
  1832. case PHP_STREAM_OPTION_CHECK_LIVENESS:
  1833. {
  1834. struct timeval tv;
  1835. char buf;
  1836. int alive = 1;
  1837. if (value == -1) {
  1838. if (sslsock->s.timeout.tv_sec == -1) {
  1839. tv.tv_sec = FG(default_socket_timeout);
  1840. tv.tv_usec = 0;
  1841. } else {
  1842. tv = sslsock->connect_timeout;
  1843. }
  1844. } else {
  1845. tv.tv_sec = value;
  1846. tv.tv_usec = 0;
  1847. }
  1848. if (sslsock->s.socket == -1) {
  1849. alive = 0;
  1850. } else if (php_pollfd_for(sslsock->s.socket, PHP_POLLREADABLE|POLLPRI, &tv) > 0) {
  1851. if (sslsock->ssl_active) {
  1852. int n;
  1853. do {
  1854. n = SSL_peek(sslsock->ssl_handle, &buf, sizeof(buf));
  1855. if (n <= 0) {
  1856. int err = SSL_get_error(sslsock->ssl_handle, n);
  1857. if (err == SSL_ERROR_SYSCALL) {
  1858. alive = php_socket_errno() == EAGAIN;
  1859. break;
  1860. }
  1861. if (err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) {
  1862. /* re-negotiate */
  1863. continue;
  1864. }
  1865. /* any other problem is a fatal error */
  1866. alive = 0;
  1867. }
  1868. /* either peek succeeded or there was an error; we
  1869. * have set the alive flag appropriately */
  1870. break;
  1871. } while (1);
  1872. } else if (0 == recv(sslsock->s.socket, &buf, sizeof(buf), MSG_PEEK) && php_socket_errno() != EAGAIN) {
  1873. alive = 0;
  1874. }
  1875. }
  1876. return alive ? PHP_STREAM_OPTION_RETURN_OK : PHP_STREAM_OPTION_RETURN_ERR;
  1877. }
  1878. case PHP_STREAM_OPTION_CRYPTO_API:
  1879. switch(cparam->op) {
  1880. case STREAM_XPORT_CRYPTO_OP_SETUP:
  1881. cparam->outputs.returncode = php_openssl_setup_crypto(stream, sslsock, cparam TSRMLS_CC);
  1882. return PHP_STREAM_OPTION_RETURN_OK;
  1883. break;
  1884. case STREAM_XPORT_CRYPTO_OP_ENABLE:
  1885. cparam->outputs.returncode = php_openssl_enable_crypto(stream, sslsock, cparam TSRMLS_CC);
  1886. return PHP_STREAM_OPTION_RETURN_OK;
  1887. break;
  1888. default:
  1889. /* fall through */
  1890. break;
  1891. }
  1892. break;
  1893. case PHP_STREAM_OPTION_XPORT_API:
  1894. switch(xparam->op) {
  1895. case STREAM_XPORT_OP_CONNECT:
  1896. case STREAM_XPORT_OP_CONNECT_ASYNC:
  1897. /* TODO: Async connects need to check the enable_on_connect option when
  1898. * we notice that the connect has actually been established */
  1899. php_stream_socket_ops.set_option(stream, option, value, ptrparam TSRMLS_CC);
  1900. if ((sslsock->enable_on_connect) &&
  1901. ((xparam->outputs.returncode == 0) ||
  1902. (xparam->op == STREAM_XPORT_OP_CONNECT_ASYNC &&
  1903. xparam->outputs.returncode == 1 && xparam->outputs.error_code == EINPROGRESS)))
  1904. {
  1905. if (php_stream_xport_crypto_setup(stream, sslsock->method, NULL TSRMLS_CC) < 0 ||
  1906. php_stream_xport_crypto_enable(stream, 1 TSRMLS_CC) < 0) {
  1907. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Failed to enable crypto");
  1908. xparam->outputs.returncode = -1;
  1909. }
  1910. }
  1911. return PHP_STREAM_OPTION_RETURN_OK;
  1912. case STREAM_XPORT_OP_ACCEPT:
  1913. /* we need to copy the additional fields that the underlying tcp transport
  1914. * doesn't know about */
  1915. xparam->outputs.returncode = php_openssl_tcp_sockop_accept(stream, sslsock, xparam STREAMS_CC TSRMLS_CC);
  1916. return PHP_STREAM_OPTION_RETURN_OK;
  1917. default:
  1918. /* fall through */
  1919. break;
  1920. }
  1921. }
  1922. return php_stream_socket_ops.set_option(stream, option, value, ptrparam TSRMLS_CC);
  1923. }
  1924. static int php_openssl_sockop_cast(php_stream *stream, int castas, void **ret TSRMLS_DC)
  1925. {
  1926. php_openssl_netstream_data_t *sslsock = (php_openssl_netstream_data_t*)stream->abstract;
  1927. switch(castas) {
  1928. case PHP_STREAM_AS_STDIO:
  1929. if (sslsock->ssl_active) {
  1930. return FAILURE;
  1931. }
  1932. if (ret) {
  1933. *ret = fdopen(sslsock->s.socket, stream->mode);
  1934. if (*ret) {
  1935. return SUCCESS;
  1936. }
  1937. return FAILURE;
  1938. }
  1939. return SUCCESS;
  1940. case PHP_STREAM_AS_FD_FOR_SELECT:
  1941. if (ret) {
  1942. size_t pending;
  1943. if (stream->writepos == stream->readpos
  1944. && sslsock->ssl_active
  1945. && (pending = (size_t)SSL_pending(sslsock->ssl_handle)) > 0) {
  1946. php_stream_fill_read_buffer(stream, pending < stream->chunk_size
  1947. ? pending
  1948. : stream->chunk_size);
  1949. }
  1950. *(php_socket_t *)ret = sslsock->s.socket;
  1951. }
  1952. return SUCCESS;
  1953. case PHP_STREAM_AS_FD:
  1954. case PHP_STREAM_AS_SOCKETD:
  1955. if (sslsock->ssl_active) {
  1956. return FAILURE;
  1957. }
  1958. if (ret) {
  1959. *(php_socket_t *)ret = sslsock->s.socket;
  1960. }
  1961. return SUCCESS;
  1962. default:
  1963. return FAILURE;
  1964. }
  1965. }
  1966. php_stream_ops php_openssl_socket_ops = {
  1967. php_openssl_sockop_write, php_openssl_sockop_read,
  1968. php_openssl_sockop_close, php_openssl_sockop_flush,
  1969. "tcp_socket/ssl",
  1970. NULL, /* seek */
  1971. php_openssl_sockop_cast,
  1972. php_openssl_sockop_stat,
  1973. php_openssl_sockop_set_option,
  1974. };
  1975. static long get_crypto_method(php_stream_context *ctx, long crypto_method)
  1976. {
  1977. zval **val;
  1978. if (ctx && php_stream_context_get_option(ctx, "ssl", "crypto_method", &val) == SUCCESS) {
  1979. convert_to_long_ex(val);
  1980. crypto_method = (long)Z_LVAL_PP(val);
  1981. crypto_method |= STREAM_CRYPTO_IS_CLIENT;
  1982. }
  1983. return crypto_method;
  1984. }
  1985. static char *get_url_name(const char *resourcename, size_t resourcenamelen, int is_persistent TSRMLS_DC)
  1986. {
  1987. php_url *url;
  1988. if (!resourcename) {
  1989. return NULL;
  1990. }
  1991. url = php_url_parse_ex(resourcename, resourcenamelen);
  1992. if (!url) {
  1993. return NULL;
  1994. }
  1995. if (url->host) {
  1996. const char * host = url->host;
  1997. char * url_name = NULL;
  1998. size_t len = strlen(host);
  1999. /* skip trailing dots */
  2000. while (len && host[len-1] == '.') {
  2001. --len;
  2002. }
  2003. if (len) {
  2004. url_name = pestrndup(host, len, is_persistent);
  2005. }
  2006. php_url_free(url);
  2007. return url_name;
  2008. }
  2009. php_url_free(url);
  2010. return NULL;
  2011. }
  2012. php_stream *php_openssl_ssl_socket_factory(const char *proto, size_t protolen,
  2013. const char *resourcename, size_t resourcenamelen,
  2014. const char *persistent_id, int options, int flags,
  2015. struct timeval *timeout,
  2016. php_stream_context *context STREAMS_DC TSRMLS_DC)
  2017. {
  2018. php_stream *stream = NULL;
  2019. php_openssl_netstream_data_t *sslsock = NULL;
  2020. sslsock = pemalloc(sizeof(php_openssl_netstream_data_t), persistent_id ? 1 : 0);
  2021. memset(sslsock, 0, sizeof(*sslsock));
  2022. sslsock->s.is_blocked = 1;
  2023. /* this timeout is used by standard stream funcs, therefor it should use the default value */
  2024. sslsock->s.timeout.tv_sec = FG(default_socket_timeout);
  2025. sslsock->s.timeout.tv_usec = 0;
  2026. /* use separate timeout for our private funcs */
  2027. sslsock->connect_timeout.tv_sec = timeout->tv_sec;
  2028. sslsock->connect_timeout.tv_usec = timeout->tv_usec;
  2029. /* we don't know the socket until we have determined if we are binding or
  2030. * connecting */
  2031. sslsock->s.socket = -1;
  2032. /* Initialize context as NULL */
  2033. sslsock->ctx = NULL;
  2034. stream = php_stream_alloc_rel(&php_openssl_socket_ops, sslsock, persistent_id, "r+");
  2035. if (stream == NULL) {
  2036. pefree(sslsock, persistent_id ? 1 : 0);
  2037. return NULL;
  2038. }
  2039. if (strncmp(proto, "ssl", protolen) == 0) {
  2040. sslsock->enable_on_connect = 1;
  2041. sslsock->method = get_crypto_method(context, STREAM_CRYPTO_METHOD_ANY_CLIENT);
  2042. } else if (strncmp(proto, "sslv2", protolen) == 0) {
  2043. #ifdef OPENSSL_NO_SSL2
  2044. php_error_docref(NULL TSRMLS_CC, E_WARNING, "SSLv2 support is not compiled into the OpenSSL library PHP is linked against");
  2045. return NULL;
  2046. #else
  2047. sslsock->enable_on_connect = 1;
  2048. sslsock->method = STREAM_CRYPTO_METHOD_SSLv2_CLIENT;
  2049. #endif
  2050. } else if (strncmp(proto, "sslv3", protolen) == 0) {
  2051. #ifdef OPENSSL_NO_SSL3
  2052. php_error_docref(NULL TSRMLS_CC, E_WARNING, "SSLv3 support is not compiled into the OpenSSL library PHP is linked against");
  2053. return NULL;
  2054. #else
  2055. sslsock->enable_on_connect = 1;
  2056. sslsock->method = STREAM_CRYPTO_METHOD_SSLv3_CLIENT;
  2057. #endif
  2058. } else if (strncmp(proto, "tls", protolen) == 0) {
  2059. sslsock->enable_on_connect = 1;
  2060. sslsock->method = get_crypto_method(context, STREAM_CRYPTO_METHOD_TLS_CLIENT);
  2061. } else if (strncmp(proto, "tlsv1.0", protolen) == 0) {
  2062. sslsock->enable_on_connect = 1;
  2063. sslsock->method = STREAM_CRYPTO_METHOD_TLSv1_0_CLIENT;
  2064. } else if (strncmp(proto, "tlsv1.1", protolen) == 0) {
  2065. #if OPENSSL_VERSION_NUMBER >= 0x10001001L
  2066. sslsock->enable_on_connect = 1;
  2067. sslsock->method = STREAM_CRYPTO_METHOD_TLSv1_1_CLIENT;
  2068. #else
  2069. php_error_docref(NULL TSRMLS_CC, E_WARNING, "TLSv1.1 support is not compiled into the OpenSSL library PHP is linked against");
  2070. return NULL;
  2071. #endif
  2072. } else if (strncmp(proto, "tlsv1.2", protolen) == 0) {
  2073. #if OPENSSL_VERSION_NUMBER >= 0x10001001L
  2074. sslsock->enable_on_connect = 1;
  2075. sslsock->method = STREAM_CRYPTO_METHOD_TLSv1_2_CLIENT;
  2076. #else
  2077. php_error_docref(NULL TSRMLS_CC, E_WARNING, "TLSv1.2 support is not compiled into the OpenSSL library PHP is linked against");
  2078. return NULL;
  2079. #endif
  2080. }
  2081. sslsock->url_name = get_url_name(resourcename, resourcenamelen, !!persistent_id TSRMLS_CC);
  2082. return stream;
  2083. }
  2084. /*
  2085. * Local variables:
  2086. * tab-width: 4
  2087. * c-basic-offset: 4
  2088. * End:
  2089. * vim600: noet sw=4 ts=4 fdm=marker
  2090. * vim<600: noet sw=4 ts=4
  2091. */