• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * libwebsockets - small server side websockets and web server implementation
3  *
4  * Copyright (C) 2019 - 2021 Andy Green <andy@warmcat.com>
5  *
6  * Permission is hereby granted, free of charge, to any person obtaining a copy
7  * of this software and associated documentation files (the "Software"), to
8  * deal in the Software without restriction, including without limitation the
9  * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
10  * sell copies of the Software, and to permit persons to whom the Software is
11  * furnished to do so, subject to the following conditions:
12  *
13  * The above copyright notice and this permission notice shall be included in
14  * all copies or substantial portions of the Software.
15  *
16  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
19  * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20  * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
21  * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
22  * IN THE SOFTWARE.
23  *
24  * This file contains the stuff related to JSON-provided policy, it's not built
25  * if LWS_WITH_SECURE_STREAMS_STATIC_POLICY_ONLY enabled.
26  */
27 
28 #include <private-lib-core.h>
29 
30 static const char * const lejp_tokens_policy[] = {
31 	"release",
32 	"product",
33 	"schema-version",
34 	"via-socks5",
35 	"retry[].*.backoff",
36 	"retry[].*.conceal",
37 	"retry[].*.jitterpc",
38 	"retry[].*.svalidping",
39 	"retry[].*.svalidhup",
40 	"retry[].*",
41 	"certs[].*",
42 	"trust_stores[].name",
43 	"trust_stores[].stack",
44 	"metrics[].name",
45 	"metrics[].us_schedule",
46 	"metrics[].us_halflife",
47 	"metrics[].min_outlier",
48 	"metrics[].report",
49 	"s[].*.endpoint",
50 	"s[].*.via-socks5",
51 	"s[].*.protocol",
52 	"s[].*.port",
53 	"s[].*.plugins",
54 	"s[].*.tls",
55 	"s[].*.client_cert",
56 	"s[].*.opportunistic",
57 	"s[].*.nailed_up",
58 	"s[].*.allow_redirects",
59 	"s[].*.urgent_tx",
60 	"s[].*.urgent_rx",
61 	"s[].*.attr_priority",
62 	"s[].*.attr_low_latency",
63 	"s[].*.attr_high_throughput",
64 	"s[].*.attr_high_reliability",
65 	"s[].*.attr_low_cost",
66 	"s[].*.long_poll",
67 	"s[].*.ws_prioritize_reads",
68 	"s[].*.retry",
69 	"s[].*.timeout_ms",
70 	"s[].*.perf",
71 	"s[].*.tls_trust_store",
72 	"s[].*.proxy_buflen",
73 	"s[].*.proxy_buflen_rxflow_on_above",
74 	"s[].*.proxy_buflen_rxflow_off_below",
75 	"s[].*.client_buflen",
76 	"s[].*.client_buflen_rxflow_on_above",
77 	"s[].*.client_buflen_rxflow_off_below",
78 	"s[].*.metadata",
79 	"s[].*.metadata[].*",
80 	"s[].*.http_resp_map",
81 	"s[].*.http_resp_map[].*",
82 
83 	"s[].*.http_auth_header",
84 	"s[].*.http_dsn_header",
85 	"s[].*.http_fwv_header",
86 	"s[].*.http_devtype_header",
87 
88 	"s[].*.http_auth_preamble",
89 
90 	"s[].*.http_no_content_length",
91 	"s[].*.rideshare",	/* streamtype name this rides shotgun with */
92 	"s[].*.payload_fmt",
93 	"s[].*.http_method",
94 	"s[].*.http_url",
95 	"s[].*.nghttp2_quirk_end_stream",
96 	"s[].*.h2q_oflow_txcr",
97 	"s[].*.http_multipart_name",
98 	"s[].*.http_multipart_filename",
99 	"s[].*.http_mime_content_type",
100 	"s[].*.http_www_form_urlencoded",
101 	"s[].*.http_expect",
102 	"s[].*.http_cookies",
103 	"s[].*.http_fail_redirect",
104 	"s[].*.http_multipart_ss_in",
105 	"s[].*.ws_subprotocol",
106 	"s[].*.ws_binary",
107 	"s[].*.local_sink",
108 	"s[].*.server",
109 	"s[].*.server_cert",
110 	"s[].*.server_key",
111 	"s[].*.mqtt_topic",
112 	"s[].*.mqtt_subscribe",
113 	"s[].*.mqtt_qos",
114 	"s[].*.mqtt_retain",
115 	"s[].*.mqtt_keep_alive",
116 	"s[].*.mqtt_clean_start",
117 	"s[].*.mqtt_will_topic",
118 	"s[].*.mqtt_will_message",
119 	"s[].*.mqtt_will_qos",
120 	"s[].*.mqtt_will_retain",
121 	"s[].*.mqtt_birth_topic",
122 	"s[].*.mqtt_birth_message",
123 	"s[].*.mqtt_birth_qos",
124 	"s[].*.mqtt_birth_retain",
125 	"s[].*.aws_iot",
126 	"s[].*.swake_validity",
127 	"s[].*.use_auth",
128 	"s[].*.aws_region",
129 	"s[].*.aws_service",
130 	"s[].*.direct_proto_str",
131 	"s[].*",
132 	"auth[].name",
133 	"auth[].type",
134 	"auth[].streamtype",
135 	"auth[].blob",
136 	"auth[]",
137 };
138 
139 typedef enum {
140 	LSSPPT_RELEASE,
141 	LSSPPT_PRODUCT,
142 	LSSPPT_SCHEMA_VERSION,
143 	LSSPPT_VIA_SOCKS5,
144 	LSSPPT_BACKOFF,
145 	LSSPPT_CONCEAL,
146 	LSSPPT_JITTERPC,
147 	LSSPPT_VALIDPING_S,
148 	LSSPPT_VALIDHUP_S,
149 	LSSPPT_RETRY,
150 	LSSPPT_CERTS,
151 	LSSPPT_TRUST_STORES_NAME,
152 	LSSPPT_TRUST_STORES_STACK,
153 	LSSPPT_METRICS_NAME,
154 	LSSPPT_METRICS_US_SCHEDULE,
155 	LSSPPT_METRICS_US_HALFLIFE,
156 	LSSPPT_METRICS_MIN_OUTLIER,
157 	LSSPPT_METRICS_REPORT,
158 	LSSPPT_ENDPOINT,
159 	LSSPPT_VH_VIA_SOCKS5,
160 	LSSPPT_PROTOCOL,
161 	LSSPPT_PORT,
162 	LSSPPT_PLUGINS,
163 	LSSPPT_TLS,
164 	LSSPPT_TLS_CLIENT_CERT,
165 	LSSPPT_OPPORTUNISTIC,
166 	LSSPPT_NAILED_UP,
167 	LSSPPT_ALLOW_REDIRECTS,
168 	LSSPPT_URGENT_TX,
169 	LSSPPT_URGENT_RX,
170 	LSSPPT_ATTR_PRIORITY,
171 	LSSPPT_ATTR_LOW_LATENCY,
172 	LSSPPT_ATTR_HIGH_THROUGHPUT,
173 	LSSPPT_ATTR_HIGH_RELIABILITY,
174 	LSSPPT_ATTR_LOW_COST,
175 	LSSPPT_LONG_POLL,
176 	LSSPPT_PRIORITIZE_READS,
177 	LSSPPT_RETRYPTR,
178 	LSSPPT_DEFAULT_TIMEOUT_MS,
179 	LSSPPT_PERF,
180 	LSSPPT_TRUST,
181 	LSSPPT_PROXY_BUFLEN,
182 	LSSPPT_PROXY_BUFLEN_RXFLOW_ON_ABOVE,
183 	LSSPPT_PROXY_BUFLEN_RXFLOW_OFF_BELOW,
184 	LSSPPT_CLIENT_BUFLEN,
185 	LSSPPT_CLIENT_BUFLEN_RXFLOW_ON_ABOVE,
186 	LSSPPT_CLIENT_BUFLEN_RXFLOW_OFF_BELOW,
187 	LSSPPT_METADATA,
188 	LSSPPT_METADATA_ITEM,
189 	LSSPPT_HTTPRESPMAP,
190 	LSSPPT_HTTPRESPMAP_ITEM,
191 
192 	LSSPPT_HTTP_AUTH_HEADER,
193 	LSSPPT_HTTP_DSN_HEADER,
194 	LSSPPT_HTTP_FWV_HEADER,
195 	LSSPPT_HTTP_TYPE_HEADER,
196 
197 	LSSPPT_HTTP_AUTH_PREAMBLE,
198 	LSSPPT_HTTP_NO_CONTENT_LENGTH,
199 	LSSPPT_RIDESHARE,
200 	LSSPPT_PAYLOAD_FORMAT,
201 	LSSPPT_HTTP_METHOD,
202 	LSSPPT_HTTP_URL,
203 	LSSPPT_NGHTTP2_QUIRK_END_STREAM,
204 	LSSPPT_H2_QUIRK_OVERFLOWS_TXCR,
205 	LSSPPT_HTTP_MULTIPART_NAME,
206 	LSSPPT_HTTP_MULTIPART_FILENAME,
207 	LSSPPT_HTTP_MULTIPART_CONTENT_TYPE,
208 	LSSPPT_HTTP_WWW_FORM_URLENCODED,
209 	LSSPPT_HTTP_EXPECT,
210 	LSSPPT_HTTP_COOKIES,
211 	LSSPPT_HTTP_FAIL_REDIRECT,
212 	LSSPPT_HTTP_MULTIPART_SS_IN,
213 	LSSPPT_WS_SUBPROTOCOL,
214 	LSSPPT_WS_BINARY,
215 	LSSPPT_LOCAL_SINK,
216 	LSSPPT_SERVER,
217 	LSSPPT_SERVER_CERT,
218 	LSSPPT_SERVER_KEY,
219 	LSSPPT_MQTT_TOPIC,
220 	LSSPPT_MQTT_SUBSCRIBE,
221 	LSSPPT_MQTT_QOS,
222 	LSSPPT_MQTT_RETAIN,
223 	LSSPPT_MQTT_KEEPALIVE,
224 	LSSPPT_MQTT_CLEAN_START,
225 	LSSPPT_MQTT_WILL_TOPIC,
226 	LSSPPT_MQTT_WILL_MESSAGE,
227 	LSSPPT_MQTT_WILL_QOS,
228 	LSSPPT_MQTT_WILL_RETAIN,
229 	LSSPPT_MQTT_BIRTH_TOPIC,
230 	LSSPPT_MQTT_BIRTH_MESSAGE,
231 	LSSPPT_MQTT_BIRTH_QOS,
232 	LSSPPT_MQTT_BIRTH_RETAIN,
233 	LSSPPT_MQTT_AWS_IOT,
234 	LSSPPT_SWAKE_VALIDITY,
235 	LSSPPT_USE_AUTH,
236 	LSSPPT_AWS_REGION,
237 	LSSPPT_AWS_SERVICE,
238 	LSSPPT_DIRECT_PROTO_STR,
239 	LSSPPT_STREAMTYPES,
240 	LSSPPT_AUTH_NAME,
241 	LSSPPT_AUTH_TYPE,
242 	LSSPPT_AUTH_STREAMTYPE,
243 	LSSPPT_AUTH_BLOB,
244 	LSSPPT_AUTH,
245 
246 } policy_token_t;
247 
248 #define POL_AC_INITIAL	2048
249 #define POL_AC_GRAIN	800
250 #define MAX_CERT_TEMP	3072 /* used to discover actual cert size for realloc */
251 
252 static uint16_t sizes[] = {
253 	sizeof(backoff_t),
254 	sizeof(lws_ss_x509_t),
255 	sizeof(lws_ss_trust_store_t),
256 	sizeof(lws_ss_policy_t),
257 	sizeof(lws_ss_auth_t),
258 	sizeof(lws_metric_policy_t),
259 };
260 
261 static const char * const protonames[] = {
262 	"h1",		/* LWSSSP_H1 */
263 	"h2",		/* LWSSSP_H2 */
264 	"ws",		/* LWSSSP_WS */
265 	"mqtt",		/* LWSSSP_MQTT */
266 	"raw",		/* LWSSSP_RAW */
267 };
268 
269 static const lws_ss_auth_t *
lws_ss_policy_find_auth_by_name(struct policy_cb_args * a,const char * name,size_t len)270 lws_ss_policy_find_auth_by_name(struct policy_cb_args *a,
271 				const char *name, size_t len)
272 {
273 	const lws_ss_auth_t *auth = a->heads[LTY_AUTH].a;
274 
275 	while (auth) {
276 		if (auth->name &&
277 		    len == strlen(auth->name) &&
278 		    !strncmp(auth->name, name, len))
279 			return auth;
280 
281 		auth = auth->next;
282 	}
283 
284 	return NULL;
285 }
286 
287 static int
lws_ss_policy_alloc_helper(struct policy_cb_args * a,int type)288 lws_ss_policy_alloc_helper(struct policy_cb_args *a, int type)
289 {
290 	/*
291 	 * We do the pointers always as .b union member, all of the
292 	 * participating structs begin with .next and .name the same
293 	 */
294 
295 	a->curr[type].b = lwsac_use_zero(&a->ac,
296 				sizes[type], POL_AC_GRAIN);
297 	if (!a->curr[type].b)
298 		return 1;
299 
300 	a->curr[type].b->next = a->heads[type].b;
301 	a->heads[type].b = a->curr[type].b;
302 
303 	return 0;
304 }
305 
306 static signed char
lws_ss_policy_parser_cb(struct lejp_ctx * ctx,char reason)307 lws_ss_policy_parser_cb(struct lejp_ctx *ctx, char reason)
308 {
309 	struct policy_cb_args *a = (struct policy_cb_args *)ctx->user;
310 #if defined(LWS_WITH_SSPLUGINS)
311 	const lws_ss_plugin_t **pin;
312 #endif
313 	char **pp, dotstar[32], *q;
314 	lws_ss_trust_store_t *ts;
315 	lws_ss_metadata_t *pmd;
316 	lws_ss_x509_t *x, **py;
317 	lws_ss_policy_t *p2;
318 	lws_retry_bo_t *b;
319 	size_t inl, outl;
320 	uint8_t *extant;
321 	backoff_t *bot;
322 	int n = -1;
323 
324 //	lwsl_debug("%s: %d %d %s\n", __func__, reason, ctx->path_match - 1,
325 //		   ctx->path);
326 
327 	switch (ctx->path_match - 1) {
328 	case LSSPPT_RETRY:
329 		n = LTY_BACKOFF;
330 		break;
331 	case LSSPPT_CERTS:
332 		n = LTY_X509;
333 		break;
334 	case LSSPPT_TRUST_STORES_NAME:
335 	case LSSPPT_TRUST_STORES_STACK:
336 		n = LTY_TRUSTSTORE;
337 		break;
338 	case LSSPPT_STREAMTYPES:
339 		n = LTY_POLICY;
340 		break;
341 	case LSSPPT_AUTH:
342 		n = LTY_AUTH;
343 		break;
344 	case LSSPPT_METRICS_NAME:
345 	case LSSPPT_METRICS_US_SCHEDULE:
346 	case LSSPPT_METRICS_US_HALFLIFE:
347 	case LSSPPT_METRICS_MIN_OUTLIER:
348 	case LSSPPT_METRICS_REPORT:
349 		n = LTY_METRICS;
350 		break;
351 	}
352 
353 	if (reason == LEJPCB_ARRAY_START &&
354 	    (ctx->path_match - 1 == LSSPPT_PLUGINS ||
355 	     ctx->path_match - 1 == LSSPPT_METADATA ||
356 	     ctx->path_match - 1 == LSSPPT_HTTPRESPMAP))
357 		a->count = 0;
358 
359 	if (reason == LEJPCB_OBJECT_START && n == LTY_AUTH) {
360 		if (lws_ss_policy_alloc_helper(a, LTY_AUTH))
361 			goto oom;
362 		return 0;
363 	}
364 
365 	if (reason == LEJPCB_ARRAY_END &&
366 	    ctx->path_match - 1 == LSSPPT_TRUST_STORES_STACK && !a->count) {
367 		lwsl_err("%s: at least one cert required in trust store\n",
368 				__func__);
369 		goto oom;
370 	}
371 
372 	if (reason == LEJPCB_ARRAY_END && a->count && a->pending_respmap) {
373 
374 		// lwsl_notice("%s: allocating respmap %d\n", __func__, a->count);
375 
376 		a->curr[LTY_POLICY].p->u.http.respmap = lwsac_use_zero(&a->ac,
377 			sizeof(lws_ss_http_respmap_t) * (unsigned int)a->count, POL_AC_GRAIN);
378 
379 		if (!a->curr[LTY_POLICY].p->u.http.respmap)
380 			goto oom;
381 
382 		memcpy((void *)a->curr[LTY_POLICY].p->u.http.respmap,
383 		       a->respmap, sizeof(lws_ss_http_respmap_t) * (unsigned int)a->count);
384 		a->curr[LTY_POLICY].p->u.http.count_respmap = (uint8_t)a->count;
385 		a->count = 0;
386 		a->pending_respmap = 0;
387 
388 		return 0;
389 	}
390 
391 	if (reason == LEJPCB_OBJECT_END && a->p) {
392 		/*
393 		 * Allocate a just-the-right-size buf for the cert DER now
394 		 * we decoded it into the a->p temp buffer and know the exact
395 		 * size.
396 		 *
397 		 * The struct *x is in the lwsac... the ca_der it points to
398 		 * is individually allocated from the heap
399 		 */
400 		a->curr[LTY_X509].x->ca_der = lws_malloc((unsigned int)a->count, "ssx509");
401 		if (!a->curr[LTY_X509].x->ca_der)
402 			goto oom;
403 		memcpy((uint8_t *)a->curr[LTY_X509].x->ca_der, a->p, (unsigned int)a->count);
404 		a->curr[LTY_X509].x->ca_der_len = (unsigned int)a->count;
405 
406 		/*
407 		 * ... and then we can free the temp buffer
408 		 */
409 		lws_free_set_NULL(a->p);
410 
411 		return 0;
412 	}
413 
414 	if (reason == LEJPCB_PAIR_NAME && n != -1 &&
415 	    (n != LTY_TRUSTSTORE && n != LTY_AUTH && n != LTY_METRICS)) {
416 
417 		p2 = NULL;
418 		if (n == LTY_POLICY) {
419 			/*
420 			 * We want to allow for the possibility of overlays...
421 			 * eg, we come later with a JSON snippet that overrides
422 			 * select streamtype members of a streamtype that was
423 			 * already defined
424 			 */
425 			p2 = (lws_ss_policy_t *)a->context->pss_policies;
426 
427 			while (p2) {
428 				if (!strncmp(p2->streamtype,
429 					     ctx->path + ctx->st[ctx->sp].p,
430 					     (unsigned int)(ctx->path_match_len -
431 						          ctx->st[ctx->sp].p))) {
432 					lwsl_info("%s: overriding s[] %s\n",
433 						  __func__, p2->streamtype);
434 					break;
435 				}
436 
437 				p2 = p2->next;
438 			}
439 		}
440 
441 		/*
442 		 * We do the pointers always as .b union member, all of the
443 		 * participating structs begin with .next and .name the same
444 		 */
445 		if (p2) /* we may be overriding existing streamtype... */
446 			a->curr[n].b = (backoff_t *)p2;
447 		else
448 			a->curr[n].b = lwsac_use_zero(&a->ac, sizes[n],
449 							POL_AC_GRAIN);
450 		if (!a->curr[n].b)
451 			goto oom;
452 
453 		if (n == LTY_X509) {
454 			a->p = lws_malloc(MAX_CERT_TEMP, "cert temp");
455 			if (!a->p)
456 				goto oom;
457 			memset(&a->b64, 0, sizeof(a->b64));
458 		}
459 
460 		a->count = 0;
461 		if (!p2) {
462 			a->curr[n].b->next = a->heads[n].b;
463 			a->heads[n].b = a->curr[n].b;
464 			pp = (char **)&a->curr[n].b->name;
465 
466 			goto string1;
467 		}
468 
469 		return 0; /* overriding */
470 	}
471 
472 	if (!(reason & LEJP_FLAG_CB_IS_VALUE) || !ctx->path_match)
473 		return 0;
474 
475 	switch (ctx->path_match - 1) {
476 
477 	/* strings */
478 
479 	case LSSPPT_RELEASE:
480 		break;
481 
482 	case LSSPPT_PRODUCT:
483 		break;
484 
485 	case LSSPPT_SCHEMA_VERSION:
486 		break;
487 
488 	case LSSPPT_VIA_SOCKS5:
489 		/* the global / default proxy */
490 		pp = (char **)&a->socks5_proxy;
491 		goto string2;
492 
493 	case LSSPPT_BACKOFF:
494 		b = &a->curr[LTY_BACKOFF].b->r;
495 		if (b->retry_ms_table_count == 8) {
496 			lwsl_err("%s: > 8 backoff levels\n", __func__);
497 			return 1;
498 		}
499 		if (!b->retry_ms_table_count) {
500 			b->retry_ms_table = (uint32_t *)lwsac_use_zero(&a->ac,
501 					   sizeof(uint32_t) * 8, POL_AC_GRAIN);
502 			if (!b->retry_ms_table)
503 				goto oom;
504 		}
505 
506 		((uint32_t *)b->retry_ms_table)
507 				[b->retry_ms_table_count++] = (uint32_t)atoi(ctx->buf);
508 		break;
509 
510 	case LSSPPT_CONCEAL:
511 		a->curr[LTY_BACKOFF].b->r.conceal_count = (uint16_t)atoi(ctx->buf);
512 		break;
513 
514 	case LSSPPT_JITTERPC:
515 		a->curr[LTY_BACKOFF].b->r.jitter_percent = (uint8_t)atoi(ctx->buf);
516 		break;
517 
518 	case LSSPPT_VALIDPING_S:
519 		a->curr[LTY_BACKOFF].b->r.secs_since_valid_ping = (uint16_t)atoi(ctx->buf);
520 		break;
521 
522 	case LSSPPT_VALIDHUP_S:
523 		a->curr[LTY_BACKOFF].b->r.secs_since_valid_hangup = (uint16_t)atoi(ctx->buf);
524 		break;
525 
526 	case LSSPPT_CERTS:
527 		if (a->count + ctx->npos >= MAX_CERT_TEMP) {
528 			lwsl_err("%s: cert too big\n", __func__);
529 			goto oom;
530 		}
531 		inl = ctx->npos;
532 		outl = MAX_CERT_TEMP - (unsigned int)a->count;
533 
534 		lws_b64_decode_stateful(&a->b64, ctx->buf, &inl,
535 					a->p + a->count, &outl,
536 					reason == LEJPCB_VAL_STR_END);
537 		a->count += (int)outl;
538 		if (inl != ctx->npos) {
539 			lwsl_err("%s: b64 decode fail\n", __func__);
540 			goto oom;
541 		}
542 		break;
543 
544 	case LSSPPT_TRUST_STORES_NAME:
545 		if (lws_ss_policy_alloc_helper(a, LTY_TRUSTSTORE))
546 			goto oom;
547 
548 		a->count = 0;
549 		pp = (char **)&a->curr[LTY_TRUSTSTORE].b->name;
550 
551 		goto string2;
552 
553 	case LSSPPT_TRUST_STORES_STACK:
554 		if (a->count >= (int)LWS_ARRAY_SIZE(
555 					a->curr[LTY_TRUSTSTORE].t->ssx509)) {
556 			lwsl_err("%s: trust store too big\n", __func__);
557 			goto oom;
558 		}
559 		lwsl_debug("%s: trust stores stack %.*s\n", __func__,
560 			   ctx->npos, ctx->buf);
561 		x = a->heads[LTY_X509].x;
562 		while (x) {
563 			if (!strncmp(x->vhost_name, ctx->buf, ctx->npos)) {
564 				a->curr[LTY_TRUSTSTORE].t->ssx509[a->count++] = x;
565 				a->curr[LTY_TRUSTSTORE].t->count++;
566 
567 				return 0;
568 			}
569 			x = x->next;
570 		}
571 		lws_strnncpy(dotstar, ctx->buf, ctx->npos, sizeof(dotstar));
572 		lwsl_err("%s: unknown trust store entry %s\n", __func__,
573 			 dotstar);
574 		goto oom;
575 #if defined(LWS_WITH_SYS_METRICS)
576 	case LSSPPT_METRICS_NAME:
577 		if (lws_ss_policy_alloc_helper(a, LTY_METRICS))
578 			goto oom;
579 
580 		pp = (char **)&a->curr[LTY_METRICS].b->name;
581 
582 		goto string2;
583 
584 	case LSSPPT_METRICS_US_SCHEDULE:
585 		a->curr[LTY_METRICS].m->us_schedule = (uint64_t)atoll(ctx->buf);
586 		break;
587 
588 	case LSSPPT_METRICS_US_HALFLIFE:
589 		a->curr[LTY_METRICS].m->us_decay_unit = (uint32_t)atol(ctx->buf);
590 		break;
591 
592 	case LSSPPT_METRICS_MIN_OUTLIER:
593 		a->curr[LTY_METRICS].m->min_contributors = (uint8_t)atoi(ctx->buf);
594 		break;
595 
596 	case LSSPPT_METRICS_REPORT:
597 		pp = (char **)&a->curr[LTY_METRICS].m->report;
598 		goto string2;
599 #endif
600 
601 	case LSSPPT_SERVER_CERT:
602 	case LSSPPT_SERVER_KEY:
603 
604 		/* iterate through the certs */
605 
606 		py = &a->heads[LTY_X509].x;
607 		x = a->heads[LTY_X509].x;
608 		while (x) {
609 			if (!strncmp(x->vhost_name, ctx->buf, ctx->npos) &&
610 					!x->vhost_name[ctx->npos]) {
611 				if ((ctx->path_match - 1) == LSSPPT_SERVER_CERT)
612 					a->curr[LTY_POLICY].p->trust.server.cert = x;
613 				else
614 					a->curr[LTY_POLICY].p->trust.server.key = x;
615 				/*
616 				 * Certs that are for servers need to stick
617 				 * around in DER form, so the vhost can be
618 				 * instantiated when the server is brought up
619 				 */
620 				x->keep = 1;
621 				lwsl_notice("%s: server '%s' keep %d %p\n",
622 					    __func__, x->vhost_name,
623 						ctx->path_match - 1, x);
624 
625 				/*
626 				 * Server DER we need to move it to another
627 				 * list just for destroying it when the context
628 				 * is destroyed... snip us out of the live
629 				 * X.509 list
630 				 */
631 
632 				*py = x->next;
633 
634 				/*
635 				 * ... and instead put us on the list of things
636 				 * to keep hold of for context destruction
637 				 */
638 
639 				x->next = a->context->server_der_list;
640 				a->context->server_der_list = x;
641 
642 				return 0;
643 			}
644 			py = &x->next;
645 			x = x->next;
646 		}
647 		lws_strnncpy(dotstar, ctx->buf, ctx->npos, sizeof(dotstar));
648 		lwsl_err("%s: unknown cert / key %s\n", __func__, dotstar);
649 		goto oom;
650 
651 	case LSSPPT_ENDPOINT:
652 		pp = (char **)&a->curr[LTY_POLICY].p->endpoint;
653 		goto string2;
654 
655 	case LSSPPT_VH_VIA_SOCKS5:
656 		pp = (char **)&a->curr[LTY_POLICY].p->socks5_proxy;
657 		goto string2;
658 
659 	case LSSPPT_PORT:
660 		a->curr[LTY_POLICY].p->port = (uint16_t)atoi(ctx->buf);
661 		break;
662 
663 	case LSSPPT_PROXY_BUFLEN:
664 		a->curr[LTY_POLICY].p->proxy_buflen = (uint32_t)atol(ctx->buf);
665 		break;
666 
667 	case LSSPPT_PROXY_BUFLEN_RXFLOW_ON_ABOVE:
668 		a->curr[LTY_POLICY].p->proxy_buflen_rxflow_on_above =
669 						(uint32_t)atol(ctx->buf);
670 		break;
671 	case LSSPPT_PROXY_BUFLEN_RXFLOW_OFF_BELOW:
672 		a->curr[LTY_POLICY].p->proxy_buflen_rxflow_off_below =
673 						(uint32_t)atol(ctx->buf);
674 		break;
675 
676 	case LSSPPT_CLIENT_BUFLEN:
677 		a->curr[LTY_POLICY].p->client_buflen = (uint32_t)atol(ctx->buf);
678 		break;
679 
680 	case LSSPPT_CLIENT_BUFLEN_RXFLOW_ON_ABOVE:
681 		a->curr[LTY_POLICY].p->client_buflen_rxflow_on_above =
682 						(uint32_t)atol(ctx->buf);
683 		break;
684 	case LSSPPT_CLIENT_BUFLEN_RXFLOW_OFF_BELOW:
685 		a->curr[LTY_POLICY].p->client_buflen_rxflow_off_below =
686 						(uint32_t)atol(ctx->buf);
687 		break;
688 
689 	case LSSPPT_HTTP_METHOD:
690 		pp = (char **)&a->curr[LTY_POLICY].p->u.http.method;
691 		goto string2;
692 
693 	case LSSPPT_HTTP_URL:
694 		pp = (char **)&a->curr[LTY_POLICY].p->u.http.url;
695 		goto string2;
696 
697 	case LSSPPT_RIDESHARE:
698 		pp = (char **)&a->curr[LTY_POLICY].p->rideshare_streamtype;
699 		goto string2;
700 
701 	case LSSPPT_PAYLOAD_FORMAT:
702 		pp = (char **)&a->curr[LTY_POLICY].p->payload_fmt;
703 		goto string2;
704 
705 	case LSSPPT_PLUGINS:
706 #if defined(LWS_WITH_SSPLUGINS)
707 		pin = a->context->pss_plugins;
708 		if (a->count ==
709 			  (int)LWS_ARRAY_SIZE(a->curr[LTY_POLICY].p->plugins)) {
710 			lwsl_err("%s: too many plugins\n", __func__);
711 
712 			goto oom;
713 		}
714 		if (!pin)
715 			break;
716 		while (*pin) {
717 			if (!strncmp((*pin)->name, ctx->buf, ctx->npos)) {
718 				a->curr[LTY_POLICY].p->plugins[a->count++] = *pin;
719 				return 0;
720 			}
721 			pin++;
722 		}
723 		lwsl_err("%s: unknown plugin\n", __func__);
724 		goto oom;
725 #else
726 		break;
727 #endif
728 
729 	case LSSPPT_TLS:
730 		if (reason == LEJPCB_VAL_TRUE)
731 			a->curr[LTY_POLICY].p->flags |= LWSSSPOLF_TLS;
732 		break;
733 
734 	case LSSPPT_TLS_CLIENT_CERT:
735 		a->curr[LTY_POLICY].p->client_cert = (uint8_t)(atoi(ctx->buf) + 1);
736 		break;
737 
738 	case LSSPPT_AUTH_BLOB:
739 		a->curr[LTY_AUTH].a->blob_index = (uint8_t)atoi(ctx->buf);
740 		break;
741 	case LSSPPT_HTTP_EXPECT:
742 		a->curr[LTY_POLICY].p->u.http.resp_expect = (uint16_t)atoi(ctx->buf);
743 		break;
744 
745 	case LSSPPT_DEFAULT_TIMEOUT_MS:
746 		a->curr[LTY_POLICY].p->timeout_ms = (uint32_t)atoi(ctx->buf);
747 		break;
748 
749 	case LSSPPT_ATTR_PRIORITY:
750 		a->curr[LTY_POLICY].p->priority = (uint8_t)atoi(ctx->buf);
751 		break;
752 
753 	case LSSPPT_OPPORTUNISTIC:
754 		if (reason == LEJPCB_VAL_TRUE)
755 			a->curr[LTY_POLICY].p->flags |= LWSSSPOLF_OPPORTUNISTIC;
756 		break;
757 	case LSSPPT_NAILED_UP:
758 		if (reason == LEJPCB_VAL_TRUE)
759 			a->curr[LTY_POLICY].p->flags |= LWSSSPOLF_NAILED_UP;
760 		break;
761 	case LSSPPT_URGENT_TX:
762 		if (reason == LEJPCB_VAL_TRUE)
763 			a->curr[LTY_POLICY].p->flags |= LWSSSPOLF_URGENT_TX;
764 		break;
765 	case LSSPPT_URGENT_RX:
766 		if (reason == LEJPCB_VAL_TRUE)
767 			a->curr[LTY_POLICY].p->flags |= LWSSSPOLF_URGENT_RX;
768 		break;
769 	case LSSPPT_LONG_POLL:
770 		if (reason == LEJPCB_VAL_TRUE)
771 			a->curr[LTY_POLICY].p->flags |= LWSSSPOLF_LONG_POLL;
772 		break;
773 	case LSSPPT_PRIORITIZE_READS:
774 		if (reason == LEJPCB_VAL_TRUE)
775 			a->curr[LTY_POLICY].p->flags |= LWSSSPOLF_PRIORITIZE_READS;
776 		break;
777 
778 	case LSSPPT_HTTP_WWW_FORM_URLENCODED:
779 		if (reason == LEJPCB_VAL_TRUE)
780 			a->curr[LTY_POLICY].p->flags |=
781 					LWSSSPOLF_HTTP_X_WWW_FORM_URLENCODED;
782 		break;
783 	case LSSPPT_SWAKE_VALIDITY:
784 		if (reason == LEJPCB_VAL_TRUE)
785 			a->curr[LTY_POLICY].p->flags |=
786 					LWSSSPOLF_WAKE_SUSPEND__VALIDITY;
787 		break;
788 	case LSSPPT_ALLOW_REDIRECTS:
789 		if (reason == LEJPCB_VAL_TRUE)
790 			a->curr[LTY_POLICY].p->flags |=
791 						LWSSSPOLF_ALLOW_REDIRECTS;
792 		break;
793 	case LSSPPT_HTTP_COOKIES:
794 		if (reason == LEJPCB_VAL_TRUE)
795 			a->curr[LTY_POLICY].p->flags |=
796 						LWSSSPOLF_HTTP_CACHE_COOKIES;
797 		break;
798 	case LSSPPT_HTTP_MULTIPART_SS_IN:
799 		if (reason == LEJPCB_VAL_TRUE)
800 			a->curr[LTY_POLICY].p->flags |=
801 						LWSSSPOLF_HTTP_MULTIPART_IN;
802 		return 0;
803 
804 	case LSSPPT_ATTR_LOW_LATENCY:
805 		if (reason == LEJPCB_VAL_TRUE)
806 			a->curr[LTY_POLICY].p->flags |=
807 						LWSSSPOLF_ATTR_LOW_LATENCY;
808 		return 0;
809 
810 	case LSSPPT_ATTR_HIGH_THROUGHPUT:
811 		if (reason == LEJPCB_VAL_TRUE)
812 			a->curr[LTY_POLICY].p->flags |=
813 						LWSSSPOLF_ATTR_HIGH_THROUGHPUT;
814 		return 0;
815 
816 	case LSSPPT_ATTR_HIGH_RELIABILITY:
817 		if (reason == LEJPCB_VAL_TRUE)
818 			a->curr[LTY_POLICY].p->flags |=
819 						LWSSSPOLF_ATTR_HIGH_RELIABILITY;
820 		return 0;
821 
822 	case LSSPPT_ATTR_LOW_COST:
823 		if (reason == LEJPCB_VAL_TRUE)
824 			a->curr[LTY_POLICY].p->flags |= LWSSSPOLF_ATTR_LOW_COST;
825 		return 0;
826 
827 	case LSSPPT_PERF:
828 		if (reason == LEJPCB_VAL_TRUE)
829 			a->curr[LTY_POLICY].p->flags |= LWSSSPOLF_PERF;
830 		return 0;
831 
832 	case LSSPPT_RETRYPTR:
833 		bot = a->heads[LTY_BACKOFF].b;
834 		while (bot) {
835 			if (!strncmp(ctx->buf, bot->name, ctx->npos)) {
836 				a->curr[LTY_POLICY].p->retry_bo = &bot->r;
837 
838 				return 0;
839 			}
840 			bot = bot->next;
841 		}
842 		lwsl_err("%s: unknown backoff scheme\n", __func__);
843 
844 		return -1;
845 
846 	case LSSPPT_TRUST:
847 		ts = a->heads[LTY_TRUSTSTORE].t;
848 		while (ts) {
849 			if (!strncmp(ctx->buf, ts->name, ctx->npos)) {
850 				a->curr[LTY_POLICY].p->trust.store = ts;
851 				return 0;
852 			}
853 			ts = ts->next;
854 		}
855 		lws_strnncpy(dotstar, ctx->buf, ctx->npos, sizeof(dotstar));
856 		lwsl_err("%s: unknown trust store name %s\n", __func__,
857 			 dotstar);
858 
859 		return -1;
860 
861 	case LSSPPT_METADATA:
862 		break;
863 
864 	case LSSPPT_USE_AUTH:
865 		a->curr[LTY_POLICY].p->auth =
866 			lws_ss_policy_find_auth_by_name(a, ctx->buf, ctx->npos);
867 		if (!a->curr[LTY_POLICY].p->auth) {
868 			lws_strnncpy(dotstar, ctx->buf, ctx->npos, sizeof(dotstar));
869 			lwsl_err("%s: unknown auth '%s'\n", __func__, dotstar);
870 			return -1;
871 		}
872 		break;
873 
874 
875 	case LSSPPT_METADATA_ITEM:
876 		pmd = a->curr[LTY_POLICY].p->metadata;
877 		a->curr[LTY_POLICY].p->metadata = lwsac_use_zero(&a->ac,
878 			sizeof(lws_ss_metadata_t) + ctx->npos +
879 			(unsigned int)(ctx->path_match_len - ctx->st[ctx->sp - 2].p + 1) + 2,
880 			POL_AC_GRAIN);
881 		a->curr[LTY_POLICY].p->metadata->next = pmd;
882 
883 		q = (char *)a->curr[LTY_POLICY].p->metadata +
884 				sizeof(lws_ss_metadata_t);
885 		a->curr[LTY_POLICY].p->metadata->name = q;
886 		memcpy(q, ctx->path + ctx->st[ctx->sp - 2].p + 1,
887 		       (unsigned int)(ctx->path_match_len - ctx->st[ctx->sp - 2].p));
888 
889 		q += ctx->path_match_len - ctx->st[ctx->sp - 2].p;
890 		a->curr[LTY_POLICY].p->metadata->value__may_own_heap = q;
891 		memcpy(q, ctx->buf, ctx->npos);
892 
893 #if defined(LWS_ROLE_H1) || defined(LWS_ROLE_H2)
894 		/*
895 		 * Check the metadata value part to see if it's a well-known
896 		 * http header... if so, LWS_HTTP_NO_KNOWN_HEADER (0xff) means
897 		 * no header string match else it's the well-known header index
898 		 */
899 		a->curr[LTY_POLICY].p->metadata->value_is_http_token = (uint8_t)
900 			lws_http_string_to_known_header(ctx->buf, ctx->npos);
901 #endif
902 
903 		a->curr[LTY_POLICY].p->metadata->length = /* the index in handle->metadata */
904 				a->curr[LTY_POLICY].p->metadata_count++;
905 
906 		a->curr[LTY_POLICY].p->metadata->value_length = ctx->npos;
907 		break;
908 
909 #if defined(LWS_ROLE_H1) || defined(LWS_ROLE_H2)
910 
911 	case LSSPPT_HTTPRESPMAP_ITEM:
912 		if (a->count >= (int)LWS_ARRAY_SIZE(a->respmap)) {
913 			lwsl_err("%s: respmap too big\n", __func__);
914 			return -1;
915 		}
916 		a->respmap[a->count].resp = (uint16_t)
917 				atoi(ctx->path + ctx->st[ctx->sp - 2].p + 1);
918 		a->respmap[a->count].state = (uint16_t)atoi(ctx->buf);
919 		a->pending_respmap = 1;
920 		a->count++;
921 		break;
922 
923 	case LSSPPT_HTTP_AUTH_HEADER:
924 	case LSSPPT_HTTP_DSN_HEADER:
925 	case LSSPPT_HTTP_FWV_HEADER:
926 	case LSSPPT_HTTP_TYPE_HEADER:
927 		pp = (char **)&a->curr[LTY_POLICY].p->u.http.blob_header[
928 		               (ctx->path_match - 1) - LSSPPT_HTTP_AUTH_HEADER];
929 		goto string2;
930 
931 	case LSSPPT_HTTP_AUTH_PREAMBLE:
932 		pp = (char **)&a->curr[LTY_POLICY].p->u.http.auth_preamble;
933 		goto string2;
934 
935 	case LSSPPT_HTTP_NO_CONTENT_LENGTH:
936 		if (reason == LEJPCB_VAL_TRUE)
937 			a->curr[LTY_POLICY].p->flags |=
938 					LWSSSPOLF_HTTP_NO_CONTENT_LENGTH;
939 		break;
940 
941 	case LSSPPT_NGHTTP2_QUIRK_END_STREAM:
942 		if (reason == LEJPCB_VAL_TRUE)
943 			a->curr[LTY_POLICY].p->flags |=
944 					LWSSSPOLF_QUIRK_NGHTTP2_END_STREAM;
945 		break;
946 	case LSSPPT_H2_QUIRK_OVERFLOWS_TXCR:
947 		if (reason == LEJPCB_VAL_TRUE)
948 			a->curr[LTY_POLICY].p->flags |=
949 					LWSSSPOLF_H2_QUIRK_OVERFLOWS_TXCR;
950 		break;
951 	case LSSPPT_HTTP_MULTIPART_NAME:
952 		a->curr[LTY_POLICY].p->flags |= LWSSSPOLF_HTTP_MULTIPART;
953 		pp = (char **)&a->curr[LTY_POLICY].p->u.http.multipart_name;
954 		goto string2;
955 	case LSSPPT_HTTP_MULTIPART_FILENAME:
956 		a->curr[LTY_POLICY].p->flags |= LWSSSPOLF_HTTP_MULTIPART;
957 		pp = (char **)&a->curr[LTY_POLICY].p->u.http.multipart_filename;
958 		goto string2;
959 	case LSSPPT_HTTP_MULTIPART_CONTENT_TYPE:
960 		a->curr[LTY_POLICY].p->flags |= LWSSSPOLF_HTTP_MULTIPART;
961 		pp = (char **)&a->curr[LTY_POLICY].p->u.http.multipart_content_type;
962 		goto string2;
963 
964 	case LSSPPT_AUTH_NAME:
965 		pp = (char **)&a->curr[LTY_AUTH].a->name;
966 		goto string2;
967 
968 	case LSSPPT_AUTH_STREAMTYPE:
969 		pp = (char **)&a->curr[LTY_AUTH].a->streamtype;
970 		goto string2;
971 	case LSSPPT_AUTH_TYPE:
972 		pp = (char **)&a->curr[LTY_AUTH].a->type;
973 		goto string2;
974 	case LSSPPT_HTTP_FAIL_REDIRECT:
975 		a->curr[LTY_POLICY].p->u.http.fail_redirect =
976 						reason == LEJPCB_VAL_TRUE;
977 		break;
978 #if defined(LWS_WITH_SECURE_STREAMS_AUTH_SIGV4)
979 	case LSSPPT_AWS_REGION:
980 		pp = (char **)&a->curr[LTY_POLICY].p->aws_region;
981 		goto string2;
982 
983 	case LSSPPT_AWS_SERVICE:
984 		pp = (char **)&a->curr[LTY_POLICY].p->aws_service;
985 		goto string2;
986 #endif
987 
988 #endif
989 
990 #if defined(LWS_ROLE_WS)
991 
992 	case LSSPPT_WS_SUBPROTOCOL:
993 		pp = (char **)&a->curr[LTY_POLICY].p->u.http.u.ws.subprotocol;
994 		goto string2;
995 
996 	case LSSPPT_WS_BINARY:
997 		a->curr[LTY_POLICY].p->u.http.u.ws.binary =
998 						reason == LEJPCB_VAL_TRUE;
999 		break;
1000 #endif
1001 
1002 	case LSSPPT_LOCAL_SINK:
1003 		if (reason == LEJPCB_VAL_TRUE)
1004 			a->curr[LTY_POLICY].p->flags |= LWSSSPOLF_LOCAL_SINK;
1005 		break;
1006 
1007 	case LSSPPT_SERVER:
1008 		if (reason == LEJPCB_VAL_TRUE)
1009 			a->curr[LTY_POLICY].p->flags |= LWSSSPOLF_SERVER;
1010 		break;
1011 
1012 #if defined(LWS_ROLE_MQTT)
1013 	case LSSPPT_MQTT_TOPIC:
1014 		pp = (char **)&a->curr[LTY_POLICY].p->u.mqtt.topic;
1015 		goto string2;
1016 
1017 	case LSSPPT_MQTT_SUBSCRIBE:
1018 		pp = (char **)&a->curr[LTY_POLICY].p->u.mqtt.subscribe;
1019 		goto string2;
1020 
1021 	case LSSPPT_MQTT_QOS:
1022 		a->curr[LTY_POLICY].p->u.mqtt.qos = (uint8_t)atoi(ctx->buf);
1023 		break;
1024 
1025 	case LSSPPT_MQTT_RETAIN:
1026 		a->curr[LTY_POLICY].p->u.mqtt.retain =
1027 						reason == LEJPCB_VAL_TRUE;
1028 		break;
1029 
1030 	case LSSPPT_MQTT_KEEPALIVE:
1031 		a->curr[LTY_POLICY].p->u.mqtt.keep_alive = (uint16_t)atoi(ctx->buf);
1032 		break;
1033 
1034 	case LSSPPT_MQTT_CLEAN_START:
1035 		a->curr[LTY_POLICY].p->u.mqtt.clean_start =
1036 						reason == LEJPCB_VAL_TRUE;
1037 		break;
1038 	case LSSPPT_MQTT_WILL_TOPIC:
1039 		pp = (char **)&a->curr[LTY_POLICY].p->u.mqtt.will_topic;
1040 		goto string2;
1041 
1042 	case LSSPPT_MQTT_WILL_MESSAGE:
1043 		pp = (char **)&a->curr[LTY_POLICY].p->u.mqtt.will_message;
1044 		goto string2;
1045 
1046 	case LSSPPT_MQTT_WILL_QOS:
1047 		a->curr[LTY_POLICY].p->u.mqtt.will_qos = (uint8_t)atoi(ctx->buf);
1048 		break;
1049 	case LSSPPT_MQTT_WILL_RETAIN:
1050 		a->curr[LTY_POLICY].p->u.mqtt.will_retain =
1051 						reason == LEJPCB_VAL_TRUE;
1052 		break;
1053 	case LSSPPT_MQTT_BIRTH_TOPIC:
1054 		pp = (char **)&a->curr[LTY_POLICY].p->u.mqtt.birth_topic;
1055 		goto string2;
1056 
1057 	case LSSPPT_MQTT_BIRTH_MESSAGE:
1058 		pp = (char **)&a->curr[LTY_POLICY].p->u.mqtt.birth_message;
1059 		goto string2;
1060 
1061 	case LSSPPT_MQTT_BIRTH_QOS:
1062 		a->curr[LTY_POLICY].p->u.mqtt.birth_qos = (uint8_t)atoi(ctx->buf);
1063 		break;
1064 	case LSSPPT_MQTT_BIRTH_RETAIN:
1065 		a->curr[LTY_POLICY].p->u.mqtt.birth_retain =
1066 						reason == LEJPCB_VAL_TRUE;
1067 		break;
1068 	case LSSPPT_MQTT_AWS_IOT:
1069 		if (reason == LEJPCB_VAL_TRUE)
1070 			a->curr[LTY_POLICY].p->u.mqtt.aws_iot =
1071 						reason == LEJPCB_VAL_TRUE;
1072 		break;
1073 #endif
1074 	case LSSPPT_DIRECT_PROTO_STR:
1075 		if (reason == LEJPCB_VAL_TRUE)
1076 			a->curr[LTY_POLICY].p->flags |=
1077 					LWSSSPOLF_DIRECT_PROTO_STR;
1078 		break;
1079 
1080 
1081 	case LSSPPT_PROTOCOL:
1082 		a->curr[LTY_POLICY].p->protocol = 0xff;
1083 		for (n = 0; n < (int)LWS_ARRAY_SIZE(protonames); n++)
1084 			if (strlen(protonames[n]) == ctx->npos &&
1085 			    !strncmp(ctx->buf, protonames[n], ctx->npos))
1086 				a->curr[LTY_POLICY].p->protocol = (uint8_t)n;
1087 
1088 		if (a->curr[LTY_POLICY].p->protocol != 0xff)
1089 			break;
1090 		lws_strnncpy(dotstar, ctx->buf, ctx->npos, sizeof(dotstar));
1091 		lwsl_err("%s: unknown protocol name %s\n", __func__, dotstar);
1092 		return -1;
1093 
1094 	default:
1095 		break;
1096 	}
1097 
1098 	return 0;
1099 
1100 string2:
1101 	/*
1102 	 * If we can do const string folding, reuse the existing string rather
1103 	 * than make a new entry
1104 	 */
1105 	extant = lwsac_scan_extant(a->ac, (uint8_t *)ctx->buf, (size_t)ctx->npos, 1);
1106 	if (extant) {
1107 		*pp = (char *)extant;
1108 
1109 		return 0;
1110 	}
1111 	*pp = lwsac_use_backfill(&a->ac, (size_t)(ctx->npos + 1), POL_AC_GRAIN);
1112 	if (!*pp)
1113 		goto oom;
1114 	memcpy(*pp, ctx->buf, ctx->npos);
1115 	(*pp)[ctx->npos] = '\0';
1116 
1117 	return 0;
1118 
1119 string1:
1120 	n = ctx->st[ctx->sp].p;
1121 	*pp = lwsac_use_backfill(&a->ac, (size_t)ctx->path_match_len + (size_t)1 - (size_t)n,
1122 				 POL_AC_GRAIN);
1123 	if (!*pp)
1124 		goto oom;
1125 	memcpy(*pp, ctx->path + n, ctx->path_match_len - (unsigned int)n);
1126 	(*pp)[ctx->path_match_len - n] = '\0';
1127 
1128 	return 0;
1129 
1130 oom:
1131 	lwsl_err("%s: OOM\n", __func__);
1132 	lws_free_set_NULL(a->p);
1133 	lwsac_free(&a->ac);
1134 
1135 	return -1;
1136 }
1137 
1138 int
lws_ss_policy_parse_begin(struct lws_context * context,int overlay)1139 lws_ss_policy_parse_begin(struct lws_context *context, int overlay)
1140 {
1141 	struct policy_cb_args *args;
1142 	char *p;
1143 
1144 	args = lws_zalloc(sizeof(struct policy_cb_args), __func__);
1145 	if (!args) {
1146 		lwsl_err("%s: OOM\n", __func__);
1147 
1148 		return 1;
1149 	}
1150 	if (overlay)
1151 		/* continue to use the existing lwsac */
1152 		args->ac = context->ac_policy;
1153 	else
1154 		/* we don't want to see any old policy */
1155 		context->pss_policies = NULL;
1156 
1157 	context->pol_args = args;
1158 	args->context = context;
1159 	p = lwsac_use(&args->ac, 1, POL_AC_INITIAL);
1160 	if (!p) {
1161 		lwsl_err("%s: OOM\n", __func__);
1162 		lws_free_set_NULL(context->pol_args);
1163 
1164 		return -1;
1165 	}
1166 	*p = 0;
1167 	lejp_construct(&args->jctx, lws_ss_policy_parser_cb, args,
1168 		       lejp_tokens_policy, LWS_ARRAY_SIZE(lejp_tokens_policy));
1169 
1170 	return 0;
1171 }
1172 
1173 int
lws_ss_policy_parse_abandon(struct lws_context * context)1174 lws_ss_policy_parse_abandon(struct lws_context *context)
1175 {
1176 	struct policy_cb_args *args = (struct policy_cb_args *)context->pol_args;
1177 	lws_ss_x509_t *x;
1178 
1179 	x = args->heads[LTY_X509].x;
1180 	while (x) {
1181 		/*
1182 		 * Free all the client DER buffers now they have been parsed
1183 		 * into tls library X.509 objects
1184 		 */
1185 		lws_free((void *)x->ca_der);
1186 		x->ca_der = NULL;
1187 
1188 		x = x->next;
1189 	}
1190 
1191 	x = context->server_der_list;
1192 	while (x) {
1193 		lws_free((void *)x->ca_der);
1194 		x->ca_der = NULL;
1195 
1196 		x = x->next;
1197 	}
1198 
1199 	lejp_destruct(&args->jctx);
1200 	lwsac_free(&args->ac);
1201 	lws_free_set_NULL(context->pol_args);
1202 
1203 	context->server_der_list = NULL;
1204 
1205 	return 0;
1206 }
1207 
1208 #if !defined(LWS_PLAT_FREERTOS) && !defined(LWS_PLAT_OPTEE)
1209 int
lws_ss_policy_parse_file(struct lws_context * cx,const char * filepath)1210 lws_ss_policy_parse_file(struct lws_context *cx, const char *filepath)
1211 {
1212 	struct policy_cb_args *args = (struct policy_cb_args *)cx->pol_args;
1213 	uint8_t buf[512];
1214 	int n, m, fd = lws_open(filepath, LWS_O_RDONLY);
1215 
1216 	if (fd < 0)
1217 		return LEJP_REJECT_UNKNOWN;
1218 
1219 	do {
1220 		n = (int)read(fd, buf, sizeof(buf));
1221 		if (n < 0) {
1222 			m = -1;
1223 			goto bail;
1224 		}
1225 
1226 		m = lejp_parse(&args->jctx, buf, n);
1227 		if (m != LEJP_CONTINUE && m < 0) {
1228 			lwsl_err("%s: parse failed line %u: %d: %s\n", __func__,
1229 				 (unsigned int)args->jctx.line, m,
1230 				 lejp_error_to_string(m));
1231 			lws_ss_policy_parse_abandon(cx);
1232 
1233 			m = -1;
1234 			goto bail;
1235 		}
1236 
1237 		if (m != LEJP_CONTINUE)
1238 			break;
1239 	} while (n);
1240 
1241 	m = 0;
1242 bail:
1243 	close(fd);
1244 
1245 	return m;
1246 }
1247 #endif
1248 
1249 int
lws_ss_policy_parse(struct lws_context * context,const uint8_t * buf,size_t len)1250 lws_ss_policy_parse(struct lws_context *context, const uint8_t *buf, size_t len)
1251 {
1252 	struct policy_cb_args *args = (struct policy_cb_args *)context->pol_args;
1253 	int m;
1254 
1255 #if !defined(LWS_PLAT_FREERTOS) && !defined(LWS_PLAT_OPTEE)
1256 	if (args->jctx.line < 2 && buf[0] != '{' && !args->parse_data)
1257 		return lws_ss_policy_parse_file(context, (const char *)buf);
1258 #endif
1259 
1260 	args->parse_data = 1;
1261 	m = lejp_parse(&args->jctx, buf, (int)len);
1262 	if (m == LEJP_CONTINUE || m >= 0)
1263 		return m;
1264 
1265 	lwsl_err("%s: parse failed line %u: %d: %s\n", __func__,
1266 		 (unsigned int)args->jctx.line, m, lejp_error_to_string(m));
1267 	lws_ss_policy_parse_abandon(context);
1268 	assert(0);
1269 
1270 	return m;
1271 }
1272 
1273 int
lws_ss_policy_overlay(struct lws_context * context,const char * overlay)1274 lws_ss_policy_overlay(struct lws_context *context, const char *overlay)
1275 {
1276 	lws_ss_policy_parse_begin(context, 1);
1277 	return lws_ss_policy_parse(context, (const uint8_t *)overlay,
1278 				   strlen(overlay));
1279 }
1280 
1281 const lws_ss_policy_t *
lws_ss_policy_get(struct lws_context * context)1282 lws_ss_policy_get(struct lws_context *context)
1283 {
1284 	struct policy_cb_args *args = (struct policy_cb_args *)context->pol_args;
1285 
1286 	if (!args)
1287 		return NULL;
1288 
1289 	return args->heads[LTY_POLICY].p;
1290 }
1291 
1292 const lws_ss_auth_t *
lws_ss_auth_get(struct lws_context * context)1293 lws_ss_auth_get(struct lws_context *context)
1294 {
1295 	struct policy_cb_args *args = (struct policy_cb_args *)context->pol_args;
1296 
1297 	if (!args)
1298 		return NULL;
1299 
1300 	return args->heads[LTY_AUTH].a;
1301 }
1302