• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * vtables (and methods that call through them) for the 4 types of
3  * SSLSockets supported.  Only one type is still supported.
4  * Various other functions.
5  *
6  * This Source Code Form is subject to the terms of the Mozilla Public
7  * License, v. 2.0. If a copy of the MPL was not distributed with this
8  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
9 #include "seccomon.h"
10 #include "cert.h"
11 #include "keyhi.h"
12 #include "ssl.h"
13 #include "sslimpl.h"
14 #include "sslproto.h"
15 #include "nspr.h"
16 #include "private/pprio.h"
17 #ifndef NO_PKCS11_BYPASS
18 #include "blapi.h"
19 #endif
20 #include "pk11pub.h"
21 #include "nss.h"
22 
23 /* This is a bodge to allow this code to be compiled against older NSS headers
24  * that don't contain the TLS 1.2 changes. */
25 #ifndef CKM_NSS_TLS_MASTER_KEY_DERIVE_DH_SHA256
26 #define CKM_NSS_TLS_MASTER_KEY_DERIVE_DH_SHA256 (CKM_NSS + 24)
27 #endif
28 
29 #define SET_ERROR_CODE   /* reminder */
30 
31 static const sslSocketOps ssl_default_ops = {	/* No SSL. */
32     ssl_DefConnect,
33     NULL,
34     ssl_DefBind,
35     ssl_DefListen,
36     ssl_DefShutdown,
37     ssl_DefClose,
38     ssl_DefRecv,
39     ssl_DefSend,
40     ssl_DefRead,
41     ssl_DefWrite,
42     ssl_DefGetpeername,
43     ssl_DefGetsockname
44 };
45 
46 static const sslSocketOps ssl_secure_ops = {	/* SSL. */
47     ssl_SecureConnect,
48     NULL,
49     ssl_DefBind,
50     ssl_DefListen,
51     ssl_SecureShutdown,
52     ssl_SecureClose,
53     ssl_SecureRecv,
54     ssl_SecureSend,
55     ssl_SecureRead,
56     ssl_SecureWrite,
57     ssl_DefGetpeername,
58     ssl_DefGetsockname
59 };
60 
61 /*
62 ** default settings for socket enables
63 */
64 static sslOptions ssl_defaults = {
65     { siBuffer, NULL, 0 }, /* nextProtoNego */
66     PR_TRUE, 	/* useSecurity        */
67     PR_FALSE,	/* useSocks           */
68     PR_FALSE,	/* requestCertificate */
69     2,	        /* requireCertificate */
70     PR_FALSE,	/* handshakeAsClient  */
71     PR_FALSE,	/* handshakeAsServer  */
72     PR_FALSE,	/* enableSSL2         */ /* now defaults to off in NSS 3.13 */
73     PR_FALSE,	/* unusedBit9         */
74     PR_FALSE, 	/* unusedBit10        */
75     PR_FALSE,	/* noCache            */
76     PR_FALSE,	/* fdx                */
77     PR_FALSE,	/* v2CompatibleHello  */ /* now defaults to off in NSS 3.13 */
78     PR_TRUE,	/* detectRollBack     */
79     PR_FALSE,   /* noStepDown         */
80     PR_FALSE,   /* bypassPKCS11       */
81     PR_FALSE,   /* noLocks            */
82     PR_FALSE,   /* enableSessionTickets */
83     PR_FALSE,   /* enableDeflate      */
84     2,          /* enableRenegotiation (default: requires extension) */
85     PR_FALSE,   /* requireSafeNegotiation */
86     PR_FALSE,   /* enableFalseStart   */
87     PR_TRUE,    /* cbcRandomIV        */
88     PR_FALSE,   /* enableOCSPStapling */
89     PR_TRUE,    /* enableNPN          */
90     PR_FALSE,   /* enableALPN         */
91     PR_FALSE,   /* enableSignedCertTimestamps */
92     PR_FALSE    /* enableFallbackSCSV */
93 };
94 
95 /*
96  * default range of enabled SSL/TLS protocols
97  */
98 static SSLVersionRange versions_defaults_stream = {
99     SSL_LIBRARY_VERSION_3_0,
100     SSL_LIBRARY_VERSION_TLS_1_0
101 };
102 
103 static SSLVersionRange versions_defaults_datagram = {
104     SSL_LIBRARY_VERSION_TLS_1_1,
105     SSL_LIBRARY_VERSION_TLS_1_1
106 };
107 
108 #define VERSIONS_DEFAULTS(variant) \
109     (variant == ssl_variant_stream ? &versions_defaults_stream : \
110                                      &versions_defaults_datagram)
111 
112 sslSessionIDLookupFunc  ssl_sid_lookup;
113 sslSessionIDCacheFunc   ssl_sid_cache;
114 sslSessionIDUncacheFunc ssl_sid_uncache;
115 
116 static PRBool ssl_inited = PR_FALSE;
117 static PRDescIdentity ssl_layer_id;
118 
119 PRBool                  locksEverDisabled; 	/* implicitly PR_FALSE */
120 PRBool			ssl_force_locks;  	/* implicitly PR_FALSE */
121 int                     ssl_lock_readers	= 1;	/* default true. */
122 char                    ssl_debug;
123 char                    ssl_trace;
124 FILE *                  ssl_trace_iob;
125 FILE *                  ssl_keylog_iob;
126 char lockStatus[] = "Locks are ENABLED.  ";
127 #define LOCKSTATUS_OFFSET 10 /* offset of ENABLED */
128 
129 /* SRTP_NULL_HMAC_SHA1_80 and SRTP_NULL_HMAC_SHA1_32 are not implemented. */
130 static const PRUint16 srtpCiphers[] = {
131     SRTP_AES128_CM_HMAC_SHA1_80,
132     SRTP_AES128_CM_HMAC_SHA1_32,
133     0
134 };
135 
136 /* forward declarations. */
137 static sslSocket *ssl_NewSocket(PRBool makeLocks, SSLProtocolVariant variant);
138 static SECStatus  ssl_MakeLocks(sslSocket *ss);
139 static void       ssl_SetDefaultsFromEnvironment(void);
140 static PRStatus   ssl_PushIOLayer(sslSocket *ns, PRFileDesc *stack,
141                                   PRDescIdentity id);
142 
143 /************************************************************************/
144 
145 /*
146 ** Lookup a socket structure from a file descriptor.
147 ** Only functions called through the PRIOMethods table should use this.
148 ** Other app-callable functions should use ssl_FindSocket.
149 */
150 static sslSocket *
ssl_GetPrivate(PRFileDesc * fd)151 ssl_GetPrivate(PRFileDesc *fd)
152 {
153     sslSocket *ss;
154 
155     PORT_Assert(fd != NULL);
156     PORT_Assert(fd->methods->file_type == PR_DESC_LAYERED);
157     PORT_Assert(fd->identity == ssl_layer_id);
158 
159     if (fd->methods->file_type != PR_DESC_LAYERED ||
160         fd->identity != ssl_layer_id) {
161 	PORT_SetError(PR_BAD_DESCRIPTOR_ERROR);
162 	return NULL;
163     }
164 
165     ss = (sslSocket *)fd->secret;
166     ss->fd = fd;
167     return ss;
168 }
169 
170 /* This function tries to find the SSL layer in the stack.
171  * It searches for the first SSL layer at or below the argument fd,
172  * and failing that, it searches for the nearest SSL layer above the
173  * argument fd.  It returns the private sslSocket from the found layer.
174  */
175 sslSocket *
ssl_FindSocket(PRFileDesc * fd)176 ssl_FindSocket(PRFileDesc *fd)
177 {
178     PRFileDesc *layer;
179     sslSocket *ss;
180 
181     PORT_Assert(fd != NULL);
182     PORT_Assert(ssl_layer_id != 0);
183 
184     layer = PR_GetIdentitiesLayer(fd, ssl_layer_id);
185     if (layer == NULL) {
186 	PORT_SetError(PR_BAD_DESCRIPTOR_ERROR);
187 	return NULL;
188     }
189 
190     ss = (sslSocket *)layer->secret;
191     ss->fd = layer;
192     return ss;
193 }
194 
195 static sslSocket *
ssl_DupSocket(sslSocket * os)196 ssl_DupSocket(sslSocket *os)
197 {
198     sslSocket *ss;
199     SECStatus rv;
200 
201     ss = ssl_NewSocket((PRBool)(!os->opt.noLocks), os->protocolVariant);
202     if (ss) {
203 	ss->opt                = os->opt;
204 	ss->opt.useSocks       = PR_FALSE;
205 	ss->vrange             = os->vrange;
206 
207 	ss->peerID             = !os->peerID ? NULL : PORT_Strdup(os->peerID);
208 	ss->url                = !os->url    ? NULL : PORT_Strdup(os->url);
209 
210 	ss->ops      = os->ops;
211 	ss->rTimeout = os->rTimeout;
212 	ss->wTimeout = os->wTimeout;
213 	ss->cTimeout = os->cTimeout;
214 	ss->dbHandle = os->dbHandle;
215 
216 	/* copy ssl2&3 policy & prefs, even if it's not selected (yet) */
217 	ss->allowedByPolicy	= os->allowedByPolicy;
218 	ss->maybeAllowedByPolicy= os->maybeAllowedByPolicy;
219 	ss->chosenPreference 	= os->chosenPreference;
220 	PORT_Memcpy(ss->cipherSuites, os->cipherSuites, sizeof os->cipherSuites);
221 	PORT_Memcpy(ss->ssl3.dtlsSRTPCiphers, os->ssl3.dtlsSRTPCiphers,
222 		    sizeof(PRUint16) * os->ssl3.dtlsSRTPCipherCount);
223 	ss->ssl3.dtlsSRTPCipherCount = os->ssl3.dtlsSRTPCipherCount;
224 
225 	if (os->cipherSpecs) {
226 	    ss->cipherSpecs  = (unsigned char*)PORT_Alloc(os->sizeCipherSpecs);
227 	    if (ss->cipherSpecs)
228 	    	PORT_Memcpy(ss->cipherSpecs, os->cipherSpecs,
229 		            os->sizeCipherSpecs);
230 	    ss->sizeCipherSpecs    = os->sizeCipherSpecs;
231 	    ss->preferredCipher    = os->preferredCipher;
232 	} else {
233 	    ss->cipherSpecs        = NULL;  /* produced lazily */
234 	    ss->sizeCipherSpecs    = 0;
235 	    ss->preferredCipher    = NULL;
236 	}
237 	if (ss->opt.useSecurity) {
238 	    /* This int should be SSLKEAType, but CC on Irix complains,
239 	     * during the for loop.
240 	     */
241 	    int i;
242 	    sslServerCerts * oc = os->serverCerts;
243 	    sslServerCerts * sc = ss->serverCerts;
244 
245 	    for (i=kt_null; i < kt_kea_size; i++, oc++, sc++) {
246 		if (oc->serverCert && oc->serverCertChain) {
247 		    sc->serverCert      = CERT_DupCertificate(oc->serverCert);
248 		    sc->serverCertChain = CERT_DupCertList(oc->serverCertChain);
249 		    if (!sc->serverCertChain)
250 		    	goto loser;
251 		} else {
252 		    sc->serverCert      = NULL;
253 		    sc->serverCertChain = NULL;
254 		}
255 		sc->serverKeyPair = oc->serverKeyPair ?
256 				ssl3_GetKeyPairRef(oc->serverKeyPair) : NULL;
257 		if (oc->serverKeyPair && !sc->serverKeyPair)
258 		    goto loser;
259 	        sc->serverKeyBits = oc->serverKeyBits;
260 		ss->certStatusArray[i] = !os->certStatusArray[i] ? NULL :
261 				SECITEM_DupArray(NULL, os->certStatusArray[i]);
262 	    }
263 	    ss->stepDownKeyPair = !os->stepDownKeyPair ? NULL :
264 		                  ssl3_GetKeyPairRef(os->stepDownKeyPair);
265 	    ss->ephemeralECDHKeyPair = !os->ephemeralECDHKeyPair ? NULL :
266 		                  ssl3_GetKeyPairRef(os->ephemeralECDHKeyPair);
267 /*
268  * XXX the preceding CERT_ and SECKEY_ functions can fail and return NULL.
269  * XXX We should detect this, and not just march on with NULL pointers.
270  */
271 	    ss->authCertificate       = os->authCertificate;
272 	    ss->authCertificateArg    = os->authCertificateArg;
273 	    ss->getClientAuthData     = os->getClientAuthData;
274 	    ss->getClientAuthDataArg  = os->getClientAuthDataArg;
275 #ifdef NSS_PLATFORM_CLIENT_AUTH
276 	    ss->getPlatformClientAuthData    = os->getPlatformClientAuthData;
277 	    ss->getPlatformClientAuthDataArg = os->getPlatformClientAuthDataArg;
278 #endif
279             ss->sniSocketConfig       = os->sniSocketConfig;
280             ss->sniSocketConfigArg    = os->sniSocketConfigArg;
281 	    ss->handleBadCert         = os->handleBadCert;
282 	    ss->badCertArg            = os->badCertArg;
283 	    ss->handshakeCallback     = os->handshakeCallback;
284 	    ss->handshakeCallbackData = os->handshakeCallbackData;
285 	    ss->canFalseStartCallback = os->canFalseStartCallback;
286 	    ss->canFalseStartCallbackData = os->canFalseStartCallbackData;
287 	    ss->pkcs11PinArg          = os->pkcs11PinArg;
288 	    ss->getChannelID          = os->getChannelID;
289 	    ss->getChannelIDArg       = os->getChannelIDArg;
290 
291 	    /* Create security data */
292 	    rv = ssl_CopySecurityInfo(ss, os);
293 	    if (rv != SECSuccess) {
294 		goto loser;
295 	    }
296 	}
297     }
298     return ss;
299 
300 loser:
301     ssl_FreeSocket(ss);
302     return NULL;
303 }
304 
305 static void
ssl_DestroyLocks(sslSocket * ss)306 ssl_DestroyLocks(sslSocket *ss)
307 {
308     /* Destroy locks. */
309     if (ss->firstHandshakeLock) {
310     	PZ_DestroyMonitor(ss->firstHandshakeLock);
311 	ss->firstHandshakeLock = NULL;
312     }
313     if (ss->ssl3HandshakeLock) {
314     	PZ_DestroyMonitor(ss->ssl3HandshakeLock);
315 	ss->ssl3HandshakeLock = NULL;
316     }
317     if (ss->specLock) {
318     	NSSRWLock_Destroy(ss->specLock);
319 	ss->specLock = NULL;
320     }
321 
322     if (ss->recvLock) {
323     	PZ_DestroyLock(ss->recvLock);
324 	ss->recvLock = NULL;
325     }
326     if (ss->sendLock) {
327     	PZ_DestroyLock(ss->sendLock);
328 	ss->sendLock = NULL;
329     }
330     if (ss->xmitBufLock) {
331     	PZ_DestroyMonitor(ss->xmitBufLock);
332 	ss->xmitBufLock = NULL;
333     }
334     if (ss->recvBufLock) {
335     	PZ_DestroyMonitor(ss->recvBufLock);
336 	ss->recvBufLock = NULL;
337     }
338 }
339 
340 /* Caller holds any relevant locks */
341 static void
ssl_DestroySocketContents(sslSocket * ss)342 ssl_DestroySocketContents(sslSocket *ss)
343 {
344     /* "i" should be of type SSLKEAType, but CC on IRIX complains during
345      * the for loop.
346      */
347     int        i;
348 
349     /* Free up socket */
350     ssl_DestroySecurityInfo(&ss->sec);
351 
352     ssl3_DestroySSL3Info(ss);
353 
354     PORT_Free(ss->saveBuf.buf);
355     PORT_Free(ss->pendingBuf.buf);
356     ssl_DestroyGather(&ss->gs);
357 
358     if (ss->peerID != NULL)
359 	PORT_Free(ss->peerID);
360     if (ss->url != NULL)
361 	PORT_Free((void *)ss->url);	/* CONST */
362     if (ss->cipherSpecs) {
363 	PORT_Free(ss->cipherSpecs);
364 	ss->cipherSpecs     = NULL;
365 	ss->sizeCipherSpecs = 0;
366     }
367 
368     /* Clean up server configuration */
369     for (i=kt_null; i < kt_kea_size; i++) {
370 	sslServerCerts * sc = ss->serverCerts + i;
371 	if (sc->serverCert != NULL)
372 	    CERT_DestroyCertificate(sc->serverCert);
373 	if (sc->serverCertChain != NULL)
374 	    CERT_DestroyCertificateList(sc->serverCertChain);
375 	if (sc->serverKeyPair != NULL)
376 	    ssl3_FreeKeyPair(sc->serverKeyPair);
377 	if (ss->certStatusArray[i] != NULL) {
378 	    SECITEM_FreeArray(ss->certStatusArray[i], PR_TRUE);
379 	    ss->certStatusArray[i] = NULL;
380 	}
381     }
382     if (ss->stepDownKeyPair) {
383 	ssl3_FreeKeyPair(ss->stepDownKeyPair);
384 	ss->stepDownKeyPair = NULL;
385     }
386     if (ss->ephemeralECDHKeyPair) {
387 	ssl3_FreeKeyPair(ss->ephemeralECDHKeyPair);
388 	ss->ephemeralECDHKeyPair = NULL;
389     }
390     SECITEM_FreeItem(&ss->opt.nextProtoNego, PR_FALSE);
391     PORT_Assert(!ss->xtnData.sniNameArr);
392     if (ss->xtnData.sniNameArr) {
393         PORT_Free(ss->xtnData.sniNameArr);
394         ss->xtnData.sniNameArr = NULL;
395     }
396 }
397 
398 /*
399  * free an sslSocket struct, and all the stuff that hangs off of it
400  */
401 void
ssl_FreeSocket(sslSocket * ss)402 ssl_FreeSocket(sslSocket *ss)
403 {
404 /* Get every lock you can imagine!
405 ** Caller already holds these:
406 **  SSL_LOCK_READER(ss);
407 **  SSL_LOCK_WRITER(ss);
408 */
409     ssl_Get1stHandshakeLock(ss);
410     ssl_GetRecvBufLock(ss);
411     ssl_GetSSL3HandshakeLock(ss);
412     ssl_GetXmitBufLock(ss);
413     ssl_GetSpecWriteLock(ss);
414 
415     ssl_DestroySocketContents(ss);
416 
417     /* Release all the locks acquired above.  */
418     SSL_UNLOCK_READER(ss);
419     SSL_UNLOCK_WRITER(ss);
420     ssl_Release1stHandshakeLock(ss);
421     ssl_ReleaseRecvBufLock(ss);
422     ssl_ReleaseSSL3HandshakeLock(ss);
423     ssl_ReleaseXmitBufLock(ss);
424     ssl_ReleaseSpecWriteLock(ss);
425 
426     ssl_DestroyLocks(ss);
427 
428 #ifdef DEBUG
429     PORT_Memset(ss, 0x1f, sizeof *ss);
430 #endif
431     PORT_Free(ss);
432     return;
433 }
434 
435 /************************************************************************/
436 SECStatus
ssl_EnableNagleDelay(sslSocket * ss,PRBool enabled)437 ssl_EnableNagleDelay(sslSocket *ss, PRBool enabled)
438 {
439     PRFileDesc *       osfd = ss->fd->lower;
440     SECStatus         rv = SECFailure;
441     PRSocketOptionData opt;
442 
443     opt.option         = PR_SockOpt_NoDelay;
444     opt.value.no_delay = (PRBool)!enabled;
445 
446     if (osfd->methods->setsocketoption) {
447         rv = (SECStatus) osfd->methods->setsocketoption(osfd, &opt);
448     } else {
449         PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0);
450     }
451 
452     return rv;
453 }
454 
455 static void
ssl_ChooseOps(sslSocket * ss)456 ssl_ChooseOps(sslSocket *ss)
457 {
458     ss->ops = ss->opt.useSecurity ? &ssl_secure_ops : &ssl_default_ops;
459 }
460 
461 /* Called from SSL_Enable (immediately below) */
462 static SECStatus
PrepareSocket(sslSocket * ss)463 PrepareSocket(sslSocket *ss)
464 {
465     SECStatus     rv = SECSuccess;
466 
467     ssl_ChooseOps(ss);
468     return rv;
469 }
470 
471 SECStatus
SSL_Enable(PRFileDesc * fd,int which,PRBool on)472 SSL_Enable(PRFileDesc *fd, int which, PRBool on)
473 {
474     return SSL_OptionSet(fd, which, on);
475 }
476 
477 #ifndef NO_PKCS11_BYPASS
478 static const PRCallOnceType pristineCallOnce;
479 static PRCallOnceType setupBypassOnce;
480 
SSL_BypassShutdown(void * appData,void * nssData)481 static SECStatus SSL_BypassShutdown(void* appData, void* nssData)
482 {
483     /* unload freeBL shared library from memory */
484     BL_Unload();
485     setupBypassOnce = pristineCallOnce;
486     return SECSuccess;
487 }
488 
SSL_BypassRegisterShutdown(void)489 static PRStatus SSL_BypassRegisterShutdown(void)
490 {
491     SECStatus rv = NSS_RegisterShutdown(SSL_BypassShutdown, NULL);
492     PORT_Assert(SECSuccess == rv);
493     return SECSuccess == rv ? PR_SUCCESS : PR_FAILURE;
494 }
495 #endif
496 
SSL_BypassSetup(void)497 static PRStatus SSL_BypassSetup(void)
498 {
499 #ifdef NO_PKCS11_BYPASS
500     /* Guarantee binary compatibility */
501     return PR_SUCCESS;
502 #else
503     return PR_CallOnce(&setupBypassOnce, &SSL_BypassRegisterShutdown);
504 #endif
505 }
506 
507 /* Implements the semantics for SSL_OptionSet(SSL_ENABLE_TLS, on) described in
508  * ssl.h in the section "SSL version range setting API".
509  */
510 static void
ssl_EnableTLS(SSLVersionRange * vrange,PRBool on)511 ssl_EnableTLS(SSLVersionRange *vrange, PRBool on)
512 {
513     if (SSL3_ALL_VERSIONS_DISABLED(vrange)) {
514 	if (on) {
515 	    vrange->min = SSL_LIBRARY_VERSION_TLS_1_0;
516 	    vrange->max = SSL_LIBRARY_VERSION_TLS_1_0;
517 	} /* else don't change anything */
518 	return;
519     }
520 
521     if (on) {
522 	/* Expand the range of enabled version to include TLS 1.0 */
523 	vrange->min = PR_MIN(vrange->min, SSL_LIBRARY_VERSION_TLS_1_0);
524 	vrange->max = PR_MAX(vrange->max, SSL_LIBRARY_VERSION_TLS_1_0);
525     } else {
526 	/* Disable all TLS versions, leaving only SSL 3.0 if it was enabled */
527 	if (vrange->min == SSL_LIBRARY_VERSION_3_0) {
528 	    vrange->max = SSL_LIBRARY_VERSION_3_0;
529 	} else {
530 	    /* Only TLS was enabled, so now no versions are. */
531 	    vrange->min = SSL_LIBRARY_VERSION_NONE;
532 	    vrange->max = SSL_LIBRARY_VERSION_NONE;
533 	}
534     }
535 }
536 
537 /* Implements the semantics for SSL_OptionSet(SSL_ENABLE_SSL3, on) described in
538  * ssl.h in the section "SSL version range setting API".
539  */
540 static void
ssl_EnableSSL3(SSLVersionRange * vrange,PRBool on)541 ssl_EnableSSL3(SSLVersionRange *vrange, PRBool on)
542 {
543    if (SSL3_ALL_VERSIONS_DISABLED(vrange)) {
544 	if (on) {
545 	    vrange->min = SSL_LIBRARY_VERSION_3_0;
546 	    vrange->max = SSL_LIBRARY_VERSION_3_0;
547 	} /* else don't change anything */
548 	return;
549     }
550 
551    if (on) {
552 	/* Expand the range of enabled versions to include SSL 3.0. We know
553 	 * SSL 3.0 or some version of TLS is already enabled at this point, so
554 	 * we don't need to change vrange->max.
555 	 */
556 	vrange->min = SSL_LIBRARY_VERSION_3_0;
557    } else {
558 	/* Disable SSL 3.0, leaving TLS unaffected. */
559 	if (vrange->max > SSL_LIBRARY_VERSION_3_0) {
560 	    vrange->min = PR_MAX(vrange->min, SSL_LIBRARY_VERSION_TLS_1_0);
561 	} else {
562 	    /* Only SSL 3.0 was enabled, so now no versions are. */
563 	    vrange->min = SSL_LIBRARY_VERSION_NONE;
564 	    vrange->max = SSL_LIBRARY_VERSION_NONE;
565 	}
566     }
567 }
568 
569 SECStatus
SSL_OptionSet(PRFileDesc * fd,PRInt32 which,PRBool on)570 SSL_OptionSet(PRFileDesc *fd, PRInt32 which, PRBool on)
571 {
572     sslSocket *ss = ssl_FindSocket(fd);
573     SECStatus  rv = SECSuccess;
574     PRBool     holdingLocks;
575 
576     if (!ss) {
577 	SSL_DBG(("%d: SSL[%d]: bad socket in Enable", SSL_GETPID(), fd));
578 	return SECFailure;
579     }
580 
581     holdingLocks = (!ss->opt.noLocks);
582     ssl_Get1stHandshakeLock(ss);
583     ssl_GetSSL3HandshakeLock(ss);
584 
585     switch (which) {
586       case SSL_SOCKS:
587 	ss->opt.useSocks = PR_FALSE;
588 	rv = PrepareSocket(ss);
589 	if (on) {
590 	    PORT_SetError(SEC_ERROR_INVALID_ARGS);
591 	    rv = SECFailure;
592 	}
593 	break;
594 
595       case SSL_SECURITY:
596 	ss->opt.useSecurity = on;
597 	rv = PrepareSocket(ss);
598 	break;
599 
600       case SSL_REQUEST_CERTIFICATE:
601 	ss->opt.requestCertificate = on;
602 	break;
603 
604       case SSL_REQUIRE_CERTIFICATE:
605 	ss->opt.requireCertificate = on;
606 	break;
607 
608       case SSL_HANDSHAKE_AS_CLIENT:
609 	if ( ss->opt.handshakeAsServer && on ) {
610 	    PORT_SetError(SEC_ERROR_INVALID_ARGS);
611 	    rv = SECFailure;
612 	    break;
613 	}
614 	ss->opt.handshakeAsClient = on;
615 	break;
616 
617       case SSL_HANDSHAKE_AS_SERVER:
618 	if ( ss->opt.handshakeAsClient && on ) {
619 	    PORT_SetError(SEC_ERROR_INVALID_ARGS);
620 	    rv = SECFailure;
621 	    break;
622 	}
623 	ss->opt.handshakeAsServer = on;
624 	break;
625 
626       case SSL_ENABLE_TLS:
627         if (IS_DTLS(ss)) {
628 	    if (on) {
629 		PORT_SetError(SEC_ERROR_INVALID_ARGS);
630 		rv = SECFailure; /* not allowed */
631 	    }
632 	    break;
633 	}
634 	ssl_EnableTLS(&ss->vrange, on);
635 	ss->preferredCipher     = NULL;
636 	if (ss->cipherSpecs) {
637 	    PORT_Free(ss->cipherSpecs);
638 	    ss->cipherSpecs     = NULL;
639 	    ss->sizeCipherSpecs = 0;
640 	}
641 	break;
642 
643       case SSL_ENABLE_SSL3:
644         if (IS_DTLS(ss)) {
645 	    if (on) {
646 		PORT_SetError(SEC_ERROR_INVALID_ARGS);
647 		rv = SECFailure; /* not allowed */
648 	    }
649 	    break;
650 	}
651 	ssl_EnableSSL3(&ss->vrange, on);
652 	ss->preferredCipher     = NULL;
653 	if (ss->cipherSpecs) {
654 	    PORT_Free(ss->cipherSpecs);
655 	    ss->cipherSpecs     = NULL;
656 	    ss->sizeCipherSpecs = 0;
657 	}
658 	break;
659 
660       case SSL_ENABLE_SSL2:
661         if (IS_DTLS(ss)) {
662 	    if (on) {
663 		PORT_SetError(SEC_ERROR_INVALID_ARGS);
664 		rv = SECFailure; /* not allowed */
665 	    }
666 	    break;
667 	}
668 	ss->opt.enableSSL2       = on;
669 	if (on) {
670 	    ss->opt.v2CompatibleHello = on;
671 	}
672 	ss->preferredCipher     = NULL;
673 	if (ss->cipherSpecs) {
674 	    PORT_Free(ss->cipherSpecs);
675 	    ss->cipherSpecs     = NULL;
676 	    ss->sizeCipherSpecs = 0;
677 	}
678 	break;
679 
680       case SSL_NO_CACHE:
681 	ss->opt.noCache = on;
682 	break;
683 
684       case SSL_ENABLE_FDX:
685 	if (on && ss->opt.noLocks) {
686 	    PORT_SetError(SEC_ERROR_INVALID_ARGS);
687 	    rv = SECFailure;
688 	}
689       	ss->opt.fdx = on;
690 	break;
691 
692       case SSL_V2_COMPATIBLE_HELLO:
693         if (IS_DTLS(ss)) {
694 	    if (on) {
695 		PORT_SetError(SEC_ERROR_INVALID_ARGS);
696 		rv = SECFailure; /* not allowed */
697 	    }
698 	    break;
699 	}
700       	ss->opt.v2CompatibleHello = on;
701 	if (!on) {
702 	    ss->opt.enableSSL2    = on;
703 	}
704 	break;
705 
706       case SSL_ROLLBACK_DETECTION:
707 	ss->opt.detectRollBack = on;
708         break;
709 
710       case SSL_NO_STEP_DOWN:
711 	ss->opt.noStepDown     = on;
712 	if (on)
713 	    SSL_DisableExportCipherSuites(fd);
714 	break;
715 
716       case SSL_BYPASS_PKCS11:
717 	if (ss->handshakeBegun) {
718 	    PORT_SetError(PR_INVALID_STATE_ERROR);
719 	    rv = SECFailure;
720 	} else {
721             if (PR_FALSE != on) {
722                 if (PR_SUCCESS == SSL_BypassSetup() ) {
723 #ifdef NO_PKCS11_BYPASS
724                     ss->opt.bypassPKCS11 = PR_FALSE;
725 #else
726                     ss->opt.bypassPKCS11 = on;
727 #endif
728                 } else {
729                     rv = SECFailure;
730                 }
731             } else {
732                 ss->opt.bypassPKCS11 = PR_FALSE;
733             }
734 	}
735 	break;
736 
737       case SSL_NO_LOCKS:
738 	if (on && ss->opt.fdx) {
739 	    PORT_SetError(SEC_ERROR_INVALID_ARGS);
740 	    rv = SECFailure;
741 	}
742 	if (on && ssl_force_locks)
743 	    on = PR_FALSE;	/* silent override */
744 	ss->opt.noLocks   = on;
745 	if (on) {
746 	    locksEverDisabled = PR_TRUE;
747 	    strcpy(lockStatus + LOCKSTATUS_OFFSET, "DISABLED.");
748 	} else if (!holdingLocks) {
749 	    rv = ssl_MakeLocks(ss);
750 	    if (rv != SECSuccess) {
751 		ss->opt.noLocks   = PR_TRUE;
752 	    }
753 	}
754 	break;
755 
756       case SSL_ENABLE_SESSION_TICKETS:
757 	ss->opt.enableSessionTickets = on;
758 	break;
759 
760       case SSL_ENABLE_DEFLATE:
761 	ss->opt.enableDeflate = on;
762 	break;
763 
764       case SSL_ENABLE_RENEGOTIATION:
765 	ss->opt.enableRenegotiation = on;
766 	break;
767 
768       case SSL_REQUIRE_SAFE_NEGOTIATION:
769 	ss->opt.requireSafeNegotiation = on;
770 	break;
771 
772       case SSL_ENABLE_FALSE_START:
773 	ss->opt.enableFalseStart = on;
774 	break;
775 
776       case SSL_CBC_RANDOM_IV:
777 	ss->opt.cbcRandomIV = on;
778 	break;
779 
780       case SSL_ENABLE_OCSP_STAPLING:
781        ss->opt.enableOCSPStapling = on;
782        break;
783 
784       case SSL_ENABLE_NPN:
785 	ss->opt.enableNPN = on;
786 	break;
787 
788       case SSL_ENABLE_ALPN:
789 	ss->opt.enableALPN = on;
790 	break;
791 
792       case SSL_ENABLE_SIGNED_CERT_TIMESTAMPS:
793 	ss->opt.enableSignedCertTimestamps = on;
794 	break;
795 
796       case SSL_ENABLE_FALLBACK_SCSV:
797        ss->opt.enableFallbackSCSV = on;
798        break;
799 
800       default:
801 	PORT_SetError(SEC_ERROR_INVALID_ARGS);
802 	rv = SECFailure;
803     }
804 
805     /* We can't use the macros for releasing the locks here,
806      * because ss->opt.noLocks might have changed just above.
807      * We must release these locks (monitors) here, if we aquired them above,
808      * regardless of the current value of ss->opt.noLocks.
809      */
810     if (holdingLocks) {
811 	PZ_ExitMonitor((ss)->ssl3HandshakeLock);
812 	PZ_ExitMonitor((ss)->firstHandshakeLock);
813     }
814 
815     return rv;
816 }
817 
818 SECStatus
SSL_OptionGet(PRFileDesc * fd,PRInt32 which,PRBool * pOn)819 SSL_OptionGet(PRFileDesc *fd, PRInt32 which, PRBool *pOn)
820 {
821     sslSocket *ss = ssl_FindSocket(fd);
822     SECStatus  rv = SECSuccess;
823     PRBool     on = PR_FALSE;
824 
825     if (!pOn) {
826 	PORT_SetError(SEC_ERROR_INVALID_ARGS);
827 	return SECFailure;
828     }
829     if (!ss) {
830 	SSL_DBG(("%d: SSL[%d]: bad socket in Enable", SSL_GETPID(), fd));
831 	*pOn = PR_FALSE;
832 	return SECFailure;
833     }
834 
835     ssl_Get1stHandshakeLock(ss);
836     ssl_GetSSL3HandshakeLock(ss);
837 
838     switch (which) {
839     case SSL_SOCKS:               on = PR_FALSE;               break;
840     case SSL_SECURITY:            on = ss->opt.useSecurity;        break;
841     case SSL_REQUEST_CERTIFICATE: on = ss->opt.requestCertificate; break;
842     case SSL_REQUIRE_CERTIFICATE: on = ss->opt.requireCertificate; break;
843     case SSL_HANDSHAKE_AS_CLIENT: on = ss->opt.handshakeAsClient;  break;
844     case SSL_HANDSHAKE_AS_SERVER: on = ss->opt.handshakeAsServer;  break;
845     case SSL_ENABLE_TLS:
846 	on = ss->vrange.max >= SSL_LIBRARY_VERSION_TLS_1_0;
847 	break;
848     case SSL_ENABLE_SSL3:
849 	on = ss->vrange.min == SSL_LIBRARY_VERSION_3_0;
850 	break;
851     case SSL_ENABLE_SSL2:         on = ss->opt.enableSSL2;         break;
852     case SSL_NO_CACHE:            on = ss->opt.noCache;            break;
853     case SSL_ENABLE_FDX:          on = ss->opt.fdx;                break;
854     case SSL_V2_COMPATIBLE_HELLO: on = ss->opt.v2CompatibleHello;  break;
855     case SSL_ROLLBACK_DETECTION:  on = ss->opt.detectRollBack;     break;
856     case SSL_NO_STEP_DOWN:        on = ss->opt.noStepDown;         break;
857     case SSL_BYPASS_PKCS11:       on = ss->opt.bypassPKCS11;       break;
858     case SSL_NO_LOCKS:            on = ss->opt.noLocks;            break;
859     case SSL_ENABLE_SESSION_TICKETS:
860 	on = ss->opt.enableSessionTickets;
861 	break;
862     case SSL_ENABLE_DEFLATE:      on = ss->opt.enableDeflate;      break;
863     case SSL_ENABLE_RENEGOTIATION:
864                                   on = ss->opt.enableRenegotiation; break;
865     case SSL_REQUIRE_SAFE_NEGOTIATION:
866                                   on = ss->opt.requireSafeNegotiation; break;
867     case SSL_ENABLE_FALSE_START:  on = ss->opt.enableFalseStart;   break;
868     case SSL_CBC_RANDOM_IV:       on = ss->opt.cbcRandomIV;        break;
869     case SSL_ENABLE_OCSP_STAPLING: on = ss->opt.enableOCSPStapling; break;
870     case SSL_ENABLE_NPN:          on = ss->opt.enableNPN;          break;
871     case SSL_ENABLE_ALPN:         on = ss->opt.enableALPN;         break;
872     case SSL_ENABLE_SIGNED_CERT_TIMESTAMPS:
873 	on = ss->opt.enableSignedCertTimestamps;
874 	break;
875     case SSL_ENABLE_FALLBACK_SCSV: on = ss->opt.enableFallbackSCSV; break;
876 
877     default:
878 	PORT_SetError(SEC_ERROR_INVALID_ARGS);
879 	rv = SECFailure;
880     }
881 
882     ssl_ReleaseSSL3HandshakeLock(ss);
883     ssl_Release1stHandshakeLock(ss);
884 
885     *pOn = on;
886     return rv;
887 }
888 
889 SECStatus
SSL_OptionGetDefault(PRInt32 which,PRBool * pOn)890 SSL_OptionGetDefault(PRInt32 which, PRBool *pOn)
891 {
892     SECStatus  rv = SECSuccess;
893     PRBool     on = PR_FALSE;
894 
895     if (!pOn) {
896 	PORT_SetError(SEC_ERROR_INVALID_ARGS);
897 	return SECFailure;
898     }
899 
900     ssl_SetDefaultsFromEnvironment();
901 
902     switch (which) {
903     case SSL_SOCKS:               on = PR_FALSE;                        break;
904     case SSL_SECURITY:            on = ssl_defaults.useSecurity;        break;
905     case SSL_REQUEST_CERTIFICATE: on = ssl_defaults.requestCertificate; break;
906     case SSL_REQUIRE_CERTIFICATE: on = ssl_defaults.requireCertificate; break;
907     case SSL_HANDSHAKE_AS_CLIENT: on = ssl_defaults.handshakeAsClient;  break;
908     case SSL_HANDSHAKE_AS_SERVER: on = ssl_defaults.handshakeAsServer;  break;
909     case SSL_ENABLE_TLS:
910 	on = versions_defaults_stream.max >= SSL_LIBRARY_VERSION_TLS_1_0;
911 	break;
912     case SSL_ENABLE_SSL3:
913 	on = versions_defaults_stream.min == SSL_LIBRARY_VERSION_3_0;
914 	break;
915     case SSL_ENABLE_SSL2:         on = ssl_defaults.enableSSL2;         break;
916     case SSL_NO_CACHE:            on = ssl_defaults.noCache;		break;
917     case SSL_ENABLE_FDX:          on = ssl_defaults.fdx;                break;
918     case SSL_V2_COMPATIBLE_HELLO: on = ssl_defaults.v2CompatibleHello;  break;
919     case SSL_ROLLBACK_DETECTION:  on = ssl_defaults.detectRollBack;     break;
920     case SSL_NO_STEP_DOWN:        on = ssl_defaults.noStepDown;         break;
921     case SSL_BYPASS_PKCS11:       on = ssl_defaults.bypassPKCS11;       break;
922     case SSL_NO_LOCKS:            on = ssl_defaults.noLocks;            break;
923     case SSL_ENABLE_SESSION_TICKETS:
924 	on = ssl_defaults.enableSessionTickets;
925 	break;
926     case SSL_ENABLE_DEFLATE:      on = ssl_defaults.enableDeflate;      break;
927     case SSL_ENABLE_RENEGOTIATION:
928                                   on = ssl_defaults.enableRenegotiation; break;
929     case SSL_REQUIRE_SAFE_NEGOTIATION:
930                                   on = ssl_defaults.requireSafeNegotiation;
931 				  break;
932     case SSL_ENABLE_FALSE_START:  on = ssl_defaults.enableFalseStart;   break;
933     case SSL_CBC_RANDOM_IV:       on = ssl_defaults.cbcRandomIV;        break;
934     case SSL_ENABLE_OCSP_STAPLING:
935        on = ssl_defaults.enableOCSPStapling;
936        break;
937     case SSL_ENABLE_NPN:          on = ssl_defaults.enableNPN;          break;
938     case SSL_ENABLE_ALPN:         on = ssl_defaults.enableALPN;         break;
939     case SSL_ENABLE_SIGNED_CERT_TIMESTAMPS:
940 	on = ssl_defaults.enableSignedCertTimestamps;
941 	break;
942     case SSL_ENABLE_FALLBACK_SCSV:
943 	on = ssl_defaults.enableFallbackSCSV;
944 	break;
945 
946     default:
947 	PORT_SetError(SEC_ERROR_INVALID_ARGS);
948 	rv = SECFailure;
949     }
950 
951     *pOn = on;
952     return rv;
953 }
954 
955 /* XXX Use Global Lock to protect this stuff. */
956 SECStatus
SSL_EnableDefault(int which,PRBool on)957 SSL_EnableDefault(int which, PRBool on)
958 {
959     return SSL_OptionSetDefault(which, on);
960 }
961 
962 SECStatus
SSL_OptionSetDefault(PRInt32 which,PRBool on)963 SSL_OptionSetDefault(PRInt32 which, PRBool on)
964 {
965     SECStatus status = ssl_Init();
966 
967     if (status != SECSuccess) {
968 	return status;
969     }
970 
971     ssl_SetDefaultsFromEnvironment();
972 
973     switch (which) {
974       case SSL_SOCKS:
975 	ssl_defaults.useSocks = PR_FALSE;
976 	if (on) {
977 	    PORT_SetError(SEC_ERROR_INVALID_ARGS);
978 	    return SECFailure;
979 	}
980 	break;
981 
982       case SSL_SECURITY:
983 	ssl_defaults.useSecurity = on;
984 	break;
985 
986       case SSL_REQUEST_CERTIFICATE:
987 	ssl_defaults.requestCertificate = on;
988 	break;
989 
990       case SSL_REQUIRE_CERTIFICATE:
991 	ssl_defaults.requireCertificate = on;
992 	break;
993 
994       case SSL_HANDSHAKE_AS_CLIENT:
995 	if ( ssl_defaults.handshakeAsServer && on ) {
996 	    PORT_SetError(SEC_ERROR_INVALID_ARGS);
997 	    return SECFailure;
998 	}
999 	ssl_defaults.handshakeAsClient = on;
1000 	break;
1001 
1002       case SSL_HANDSHAKE_AS_SERVER:
1003 	if ( ssl_defaults.handshakeAsClient && on ) {
1004 	    PORT_SetError(SEC_ERROR_INVALID_ARGS);
1005 	    return SECFailure;
1006 	}
1007 	ssl_defaults.handshakeAsServer = on;
1008 	break;
1009 
1010       case SSL_ENABLE_TLS:
1011 	ssl_EnableTLS(&versions_defaults_stream, on);
1012 	break;
1013 
1014       case SSL_ENABLE_SSL3:
1015 	ssl_EnableSSL3(&versions_defaults_stream, on);
1016 	break;
1017 
1018       case SSL_ENABLE_SSL2:
1019 	ssl_defaults.enableSSL2 = on;
1020 	if (on) {
1021 	    ssl_defaults.v2CompatibleHello = on;
1022 	}
1023 	break;
1024 
1025       case SSL_NO_CACHE:
1026 	ssl_defaults.noCache = on;
1027 	break;
1028 
1029       case SSL_ENABLE_FDX:
1030 	if (on && ssl_defaults.noLocks) {
1031 	    PORT_SetError(SEC_ERROR_INVALID_ARGS);
1032 	    return SECFailure;
1033 	}
1034       	ssl_defaults.fdx = on;
1035 	break;
1036 
1037       case SSL_V2_COMPATIBLE_HELLO:
1038       	ssl_defaults.v2CompatibleHello = on;
1039 	if (!on) {
1040 	    ssl_defaults.enableSSL2    = on;
1041 	}
1042 	break;
1043 
1044       case SSL_ROLLBACK_DETECTION:
1045 	ssl_defaults.detectRollBack = on;
1046 	break;
1047 
1048       case SSL_NO_STEP_DOWN:
1049 	ssl_defaults.noStepDown     = on;
1050 	if (on)
1051 	    SSL_DisableDefaultExportCipherSuites();
1052 	break;
1053 
1054       case SSL_BYPASS_PKCS11:
1055         if (PR_FALSE != on) {
1056             if (PR_SUCCESS == SSL_BypassSetup()) {
1057 #ifdef NO_PKCS11_BYPASS
1058                 ssl_defaults.bypassPKCS11   = PR_FALSE;
1059 #else
1060                 ssl_defaults.bypassPKCS11   = on;
1061 #endif
1062             } else {
1063                 return SECFailure;
1064             }
1065         } else {
1066             ssl_defaults.bypassPKCS11   = PR_FALSE;
1067         }
1068 	break;
1069 
1070       case SSL_NO_LOCKS:
1071 	if (on && ssl_defaults.fdx) {
1072 	    PORT_SetError(SEC_ERROR_INVALID_ARGS);
1073 	    return SECFailure;
1074 	}
1075 	if (on && ssl_force_locks)
1076 	    on = PR_FALSE;		/* silent override */
1077 	ssl_defaults.noLocks        = on;
1078 	if (on) {
1079 	    locksEverDisabled = PR_TRUE;
1080 	    strcpy(lockStatus + LOCKSTATUS_OFFSET, "DISABLED.");
1081 	}
1082 	break;
1083 
1084       case SSL_ENABLE_SESSION_TICKETS:
1085 	ssl_defaults.enableSessionTickets = on;
1086 	break;
1087 
1088       case SSL_ENABLE_DEFLATE:
1089 	ssl_defaults.enableDeflate = on;
1090 	break;
1091 
1092       case SSL_ENABLE_RENEGOTIATION:
1093 	ssl_defaults.enableRenegotiation = on;
1094 	break;
1095 
1096       case SSL_REQUIRE_SAFE_NEGOTIATION:
1097 	ssl_defaults.requireSafeNegotiation = on;
1098 	break;
1099 
1100       case SSL_ENABLE_FALSE_START:
1101 	ssl_defaults.enableFalseStart = on;
1102 	break;
1103 
1104       case SSL_CBC_RANDOM_IV:
1105 	ssl_defaults.cbcRandomIV = on;
1106 	break;
1107 
1108       case SSL_ENABLE_OCSP_STAPLING:
1109        ssl_defaults.enableOCSPStapling = on;
1110        break;
1111 
1112       case SSL_ENABLE_NPN:
1113 	ssl_defaults.enableNPN = on;
1114 	break;
1115 
1116       case SSL_ENABLE_ALPN:
1117 	ssl_defaults.enableALPN = on;
1118 	break;
1119 
1120       case SSL_ENABLE_SIGNED_CERT_TIMESTAMPS:
1121 	ssl_defaults.enableSignedCertTimestamps = on;
1122 	break;
1123 
1124       case SSL_ENABLE_FALLBACK_SCSV:
1125        ssl_defaults.enableFallbackSCSV = on;
1126        break;
1127 
1128       default:
1129 	PORT_SetError(SEC_ERROR_INVALID_ARGS);
1130 	return SECFailure;
1131     }
1132     return SECSuccess;
1133 }
1134 
1135 /* function tells us if the cipher suite is one that we no longer support. */
1136 static PRBool
ssl_IsRemovedCipherSuite(PRInt32 suite)1137 ssl_IsRemovedCipherSuite(PRInt32 suite)
1138 {
1139     switch (suite) {
1140     case SSL_FORTEZZA_DMS_WITH_NULL_SHA:
1141     case SSL_FORTEZZA_DMS_WITH_FORTEZZA_CBC_SHA:
1142     case SSL_FORTEZZA_DMS_WITH_RC4_128_SHA:
1143     	return PR_TRUE;
1144     default:
1145     	return PR_FALSE;
1146     }
1147 }
1148 
1149 /* Part of the public NSS API.
1150  * Since this is a global (not per-socket) setting, we cannot use the
1151  * HandshakeLock to protect this.  Probably want a global lock.
1152  */
1153 SECStatus
SSL_SetPolicy(long which,int policy)1154 SSL_SetPolicy(long which, int policy)
1155 {
1156     if ((which & 0xfffe) == SSL_RSA_OLDFIPS_WITH_3DES_EDE_CBC_SHA) {
1157     	/* one of the two old FIPS ciphers */
1158 	if (which == SSL_RSA_OLDFIPS_WITH_3DES_EDE_CBC_SHA)
1159 	    which = SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA;
1160 	else if (which == SSL_RSA_OLDFIPS_WITH_DES_CBC_SHA)
1161 	    which = SSL_RSA_FIPS_WITH_DES_CBC_SHA;
1162     }
1163     if (ssl_IsRemovedCipherSuite(which))
1164     	return SECSuccess;
1165     return SSL_CipherPolicySet(which, policy);
1166 }
1167 
1168 SECStatus
SSL_CipherPolicySet(PRInt32 which,PRInt32 policy)1169 SSL_CipherPolicySet(PRInt32 which, PRInt32 policy)
1170 {
1171     SECStatus rv = ssl_Init();
1172 
1173     if (rv != SECSuccess) {
1174 	return rv;
1175     }
1176 
1177     if (ssl_IsRemovedCipherSuite(which)) {
1178     	rv = SECSuccess;
1179     } else if (SSL_IS_SSL2_CIPHER(which)) {
1180 	rv = ssl2_SetPolicy(which, policy);
1181     } else {
1182 	rv = ssl3_SetPolicy((ssl3CipherSuite)which, policy);
1183     }
1184     return rv;
1185 }
1186 
1187 SECStatus
SSL_CipherPolicyGet(PRInt32 which,PRInt32 * oPolicy)1188 SSL_CipherPolicyGet(PRInt32 which, PRInt32 *oPolicy)
1189 {
1190     SECStatus rv;
1191 
1192     if (!oPolicy) {
1193 	PORT_SetError(SEC_ERROR_INVALID_ARGS);
1194 	return SECFailure;
1195     }
1196     if (ssl_IsRemovedCipherSuite(which)) {
1197 	*oPolicy = SSL_NOT_ALLOWED;
1198     	rv = SECSuccess;
1199     } else if (SSL_IS_SSL2_CIPHER(which)) {
1200 	rv = ssl2_GetPolicy(which, oPolicy);
1201     } else {
1202 	rv = ssl3_GetPolicy((ssl3CipherSuite)which, oPolicy);
1203     }
1204     return rv;
1205 }
1206 
1207 /* Part of the public NSS API.
1208  * Since this is a global (not per-socket) setting, we cannot use the
1209  * HandshakeLock to protect this.  Probably want a global lock.
1210  * These changes have no effect on any sslSockets already created.
1211  */
1212 SECStatus
SSL_EnableCipher(long which,PRBool enabled)1213 SSL_EnableCipher(long which, PRBool enabled)
1214 {
1215     if ((which & 0xfffe) == SSL_RSA_OLDFIPS_WITH_3DES_EDE_CBC_SHA) {
1216     	/* one of the two old FIPS ciphers */
1217 	if (which == SSL_RSA_OLDFIPS_WITH_3DES_EDE_CBC_SHA)
1218 	    which = SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA;
1219 	else if (which == SSL_RSA_OLDFIPS_WITH_DES_CBC_SHA)
1220 	    which = SSL_RSA_FIPS_WITH_DES_CBC_SHA;
1221     }
1222     if (ssl_IsRemovedCipherSuite(which))
1223     	return SECSuccess;
1224     return SSL_CipherPrefSetDefault(which, enabled);
1225 }
1226 
1227 SECStatus
SSL_CipherPrefSetDefault(PRInt32 which,PRBool enabled)1228 SSL_CipherPrefSetDefault(PRInt32 which, PRBool enabled)
1229 {
1230     SECStatus rv = ssl_Init();
1231 
1232     if (rv != SECSuccess) {
1233 	return rv;
1234     }
1235 
1236     if (ssl_IsRemovedCipherSuite(which))
1237     	return SECSuccess;
1238     if (enabled && ssl_defaults.noStepDown && SSL_IsExportCipherSuite(which)) {
1239     	PORT_SetError(SEC_ERROR_INVALID_ALGORITHM);
1240 	return SECFailure;
1241     }
1242     if (SSL_IS_SSL2_CIPHER(which)) {
1243 	rv = ssl2_CipherPrefSetDefault(which, enabled);
1244     } else {
1245 	rv = ssl3_CipherPrefSetDefault((ssl3CipherSuite)which, enabled);
1246     }
1247     return rv;
1248 }
1249 
1250 SECStatus
SSL_CipherPrefGetDefault(PRInt32 which,PRBool * enabled)1251 SSL_CipherPrefGetDefault(PRInt32 which, PRBool *enabled)
1252 {
1253     SECStatus  rv;
1254 
1255     if (!enabled) {
1256 	PORT_SetError(SEC_ERROR_INVALID_ARGS);
1257 	return SECFailure;
1258     }
1259     if (ssl_IsRemovedCipherSuite(which)) {
1260 	*enabled = PR_FALSE;
1261     	rv = SECSuccess;
1262     } else if (SSL_IS_SSL2_CIPHER(which)) {
1263 	rv = ssl2_CipherPrefGetDefault(which, enabled);
1264     } else {
1265 	rv = ssl3_CipherPrefGetDefault((ssl3CipherSuite)which, enabled);
1266     }
1267     return rv;
1268 }
1269 
1270 SECStatus
SSL_CipherPrefSet(PRFileDesc * fd,PRInt32 which,PRBool enabled)1271 SSL_CipherPrefSet(PRFileDesc *fd, PRInt32 which, PRBool enabled)
1272 {
1273     SECStatus rv;
1274     sslSocket *ss = ssl_FindSocket(fd);
1275 
1276     if (!ss) {
1277 	SSL_DBG(("%d: SSL[%d]: bad socket in CipherPrefSet", SSL_GETPID(), fd));
1278 	return SECFailure;
1279     }
1280     if (ssl_IsRemovedCipherSuite(which))
1281     	return SECSuccess;
1282     if (enabled && ss->opt.noStepDown && SSL_IsExportCipherSuite(which)) {
1283     	PORT_SetError(SEC_ERROR_INVALID_ALGORITHM);
1284 	return SECFailure;
1285     }
1286     if (SSL_IS_SSL2_CIPHER(which)) {
1287 	rv = ssl2_CipherPrefSet(ss, which, enabled);
1288     } else {
1289 	rv = ssl3_CipherPrefSet(ss, (ssl3CipherSuite)which, enabled);
1290     }
1291     return rv;
1292 }
1293 
1294 SECStatus
SSL_CipherOrderSet(PRFileDesc * fd,const PRUint16 * ciphers,unsigned int len)1295 SSL_CipherOrderSet(PRFileDesc *fd, const PRUint16 *ciphers, unsigned int len)
1296 {
1297     sslSocket *ss = ssl_FindSocket(fd);
1298 
1299     if (!ss) {
1300 	SSL_DBG(("%d: SSL[%d]: bad socket in CipherOrderSet", SSL_GETPID(),
1301 		fd));
1302 	return SECFailure;
1303     }
1304     return ssl3_CipherOrderSet(ss, ciphers, len);
1305 }
1306 
1307 SECStatus
SSL_CipherPrefGet(PRFileDesc * fd,PRInt32 which,PRBool * enabled)1308 SSL_CipherPrefGet(PRFileDesc *fd, PRInt32 which, PRBool *enabled)
1309 {
1310     SECStatus  rv;
1311     sslSocket *ss = ssl_FindSocket(fd);
1312 
1313     if (!enabled) {
1314 	PORT_SetError(SEC_ERROR_INVALID_ARGS);
1315 	return SECFailure;
1316     }
1317     if (!ss) {
1318 	SSL_DBG(("%d: SSL[%d]: bad socket in CipherPrefGet", SSL_GETPID(), fd));
1319 	*enabled = PR_FALSE;
1320 	return SECFailure;
1321     }
1322     if (ssl_IsRemovedCipherSuite(which)) {
1323 	*enabled = PR_FALSE;
1324     	rv = SECSuccess;
1325     } else if (SSL_IS_SSL2_CIPHER(which)) {
1326 	rv = ssl2_CipherPrefGet(ss, which, enabled);
1327     } else {
1328 	rv = ssl3_CipherPrefGet(ss, (ssl3CipherSuite)which, enabled);
1329     }
1330     return rv;
1331 }
1332 
1333 SECStatus
NSS_SetDomesticPolicy(void)1334 NSS_SetDomesticPolicy(void)
1335 {
1336     SECStatus      status = SECSuccess;
1337     const PRUint16 *cipher;
1338 
1339     for (cipher = SSL_ImplementedCiphers; *cipher != 0; ++cipher) {
1340 	status = SSL_SetPolicy(*cipher, SSL_ALLOWED);
1341 	if (status != SECSuccess)
1342 	    break;
1343     }
1344     return status;
1345 }
1346 
1347 SECStatus
NSS_SetExportPolicy(void)1348 NSS_SetExportPolicy(void)
1349 {
1350     return NSS_SetDomesticPolicy();
1351 }
1352 
1353 SECStatus
NSS_SetFrancePolicy(void)1354 NSS_SetFrancePolicy(void)
1355 {
1356     return NSS_SetDomesticPolicy();
1357 }
1358 
1359 SECStatus
SSL_GetChannelBinding(PRFileDesc * fd,SSLChannelBindingType binding_type,unsigned char * out,unsigned int * outLen,unsigned int outLenMax)1360 SSL_GetChannelBinding(PRFileDesc *fd,
1361 		      SSLChannelBindingType binding_type,
1362 		      unsigned char *out,
1363 		      unsigned int *outLen,
1364 		      unsigned int outLenMax) {
1365     sslSocket *ss = ssl_FindSocket(fd);
1366 
1367     if (!ss) {
1368 	SSL_DBG(("%d: SSL[%d]: bad socket in SSL_GetChannelBinding",
1369 		 SSL_GETPID(), fd));
1370 	return SECFailure;
1371     }
1372 
1373     if (binding_type != SSL_CHANNEL_BINDING_TLS_UNIQUE) {
1374 	PORT_SetError(PR_INVALID_ARGUMENT_ERROR);
1375 	return SECFailure;
1376     }
1377 
1378     return ssl3_GetTLSUniqueChannelBinding(ss, out, outLen, outLenMax);
1379 }
1380 
1381 
1382 /* LOCKS ??? XXX */
1383 static PRFileDesc *
ssl_ImportFD(PRFileDesc * model,PRFileDesc * fd,SSLProtocolVariant variant)1384 ssl_ImportFD(PRFileDesc *model, PRFileDesc *fd, SSLProtocolVariant variant)
1385 {
1386     sslSocket * ns = NULL;
1387     PRStatus    rv;
1388     PRNetAddr   addr;
1389     SECStatus	status = ssl_Init();
1390 
1391     if (status != SECSuccess) {
1392 	return NULL;
1393     }
1394 
1395     if (model == NULL) {
1396 	/* Just create a default socket if we're given NULL for the model */
1397 	ns = ssl_NewSocket((PRBool)(!ssl_defaults.noLocks), variant);
1398     } else {
1399 	sslSocket * ss = ssl_FindSocket(model);
1400 	if (ss == NULL || ss->protocolVariant != variant) {
1401 	    SSL_DBG(("%d: SSL[%d]: bad model socket in ssl_ImportFD",
1402 	    	      SSL_GETPID(), model));
1403 	    return NULL;
1404 	}
1405 	ns = ssl_DupSocket(ss);
1406     }
1407     if (ns == NULL)
1408     	return NULL;
1409 
1410     rv = ssl_PushIOLayer(ns, fd, PR_TOP_IO_LAYER);
1411     if (rv != PR_SUCCESS) {
1412 	ssl_FreeSocket(ns);
1413 	SET_ERROR_CODE
1414 	return NULL;
1415     }
1416     ns = ssl_FindSocket(fd);
1417     PORT_Assert(ns);
1418     if (ns)
1419 	ns->TCPconnected = (PR_SUCCESS == ssl_DefGetpeername(ns, &addr));
1420     return fd;
1421 }
1422 
1423 PRFileDesc *
SSL_ImportFD(PRFileDesc * model,PRFileDesc * fd)1424 SSL_ImportFD(PRFileDesc *model, PRFileDesc *fd)
1425 {
1426     return ssl_ImportFD(model, fd, ssl_variant_stream);
1427 }
1428 
1429 PRFileDesc *
DTLS_ImportFD(PRFileDesc * model,PRFileDesc * fd)1430 DTLS_ImportFD(PRFileDesc *model, PRFileDesc *fd)
1431 {
1432     return ssl_ImportFD(model, fd, ssl_variant_datagram);
1433 }
1434 
1435 SECStatus
SSL_SetNextProtoCallback(PRFileDesc * fd,SSLNextProtoCallback callback,void * arg)1436 SSL_SetNextProtoCallback(PRFileDesc *fd, SSLNextProtoCallback callback,
1437 			 void *arg)
1438 {
1439     sslSocket *ss = ssl_FindSocket(fd);
1440 
1441     if (!ss) {
1442 	SSL_DBG(("%d: SSL[%d]: bad socket in SSL_SetNextProtoCallback", SSL_GETPID(),
1443 		 fd));
1444 	return SECFailure;
1445     }
1446 
1447     ssl_GetSSL3HandshakeLock(ss);
1448     ss->nextProtoCallback = callback;
1449     ss->nextProtoArg = arg;
1450     ssl_ReleaseSSL3HandshakeLock(ss);
1451 
1452     return SECSuccess;
1453 }
1454 
1455 /* ssl_NextProtoNegoCallback is set as an NPN callback for the case when
1456  * SSL_SetNextProtoNego is used.
1457  */
1458 static SECStatus
ssl_NextProtoNegoCallback(void * arg,PRFileDesc * fd,const unsigned char * protos,unsigned int protos_len,unsigned char * protoOut,unsigned int * protoOutLen,unsigned int protoMaxLen)1459 ssl_NextProtoNegoCallback(void *arg, PRFileDesc *fd,
1460 			  const unsigned char *protos, unsigned int protos_len,
1461 			  unsigned char *protoOut, unsigned int *protoOutLen,
1462 			  unsigned int protoMaxLen)
1463 {
1464     unsigned int i, j;
1465     const unsigned char *result;
1466     sslSocket *ss = ssl_FindSocket(fd);
1467 
1468     if (!ss) {
1469 	SSL_DBG(("%d: SSL[%d]: bad socket in ssl_NextProtoNegoCallback",
1470 		 SSL_GETPID(), fd));
1471 	return SECFailure;
1472     }
1473 
1474     if (protos_len == 0) {
1475 	/* The server supports the extension, but doesn't have any protocols
1476 	 * configured. In this case we request our favoured protocol. */
1477 	goto pick_first;
1478     }
1479 
1480     /* For each protocol in server preference, see if we support it. */
1481     for (i = 0; i < protos_len; ) {
1482 	for (j = 0; j < ss->opt.nextProtoNego.len; ) {
1483 	    if (protos[i] == ss->opt.nextProtoNego.data[j] &&
1484 		PORT_Memcmp(&protos[i+1], &ss->opt.nextProtoNego.data[j+1],
1485 			     protos[i]) == 0) {
1486 		/* We found a match. */
1487 		ss->ssl3.nextProtoState = SSL_NEXT_PROTO_NEGOTIATED;
1488 		result = &protos[i];
1489 		goto found;
1490 	    }
1491 	    j += 1 + (unsigned int)ss->opt.nextProtoNego.data[j];
1492 	}
1493 	i += 1 + (unsigned int)protos[i];
1494     }
1495 
1496 pick_first:
1497     ss->ssl3.nextProtoState = SSL_NEXT_PROTO_NO_OVERLAP;
1498     result = ss->opt.nextProtoNego.data;
1499 
1500 found:
1501     if (protoMaxLen < result[0]) {
1502 	PORT_SetError(SEC_ERROR_OUTPUT_LEN);
1503 	return SECFailure;
1504     }
1505     memcpy(protoOut, result + 1, result[0]);
1506     *protoOutLen = result[0];
1507     return SECSuccess;
1508 }
1509 
1510 SECStatus
SSL_SetNextProtoNego(PRFileDesc * fd,const unsigned char * data,unsigned int length)1511 SSL_SetNextProtoNego(PRFileDesc *fd, const unsigned char *data,
1512 		     unsigned int length)
1513 {
1514     sslSocket *ss;
1515     SECStatus rv;
1516     SECItem dataItem = { siBuffer, (unsigned char *) data, length };
1517 
1518     ss = ssl_FindSocket(fd);
1519     if (!ss) {
1520 	SSL_DBG(("%d: SSL[%d]: bad socket in SSL_SetNextProtoNego",
1521 		 SSL_GETPID(), fd));
1522 	return SECFailure;
1523     }
1524 
1525     if (ssl3_ValidateNextProtoNego(data, length) != SECSuccess)
1526 	return SECFailure;
1527 
1528     ssl_GetSSL3HandshakeLock(ss);
1529     SECITEM_FreeItem(&ss->opt.nextProtoNego, PR_FALSE);
1530     rv = SECITEM_CopyItem(NULL, &ss->opt.nextProtoNego, &dataItem);
1531     ssl_ReleaseSSL3HandshakeLock(ss);
1532 
1533     if (rv != SECSuccess)
1534 	return rv;
1535 
1536     return SSL_SetNextProtoCallback(fd, ssl_NextProtoNegoCallback, NULL);
1537 }
1538 
1539 SECStatus
SSL_GetNextProto(PRFileDesc * fd,SSLNextProtoState * state,unsigned char * buf,unsigned int * bufLen,unsigned int bufLenMax)1540 SSL_GetNextProto(PRFileDesc *fd, SSLNextProtoState *state, unsigned char *buf,
1541 		 unsigned int *bufLen, unsigned int bufLenMax)
1542 {
1543     sslSocket *ss = ssl_FindSocket(fd);
1544 
1545     if (!ss) {
1546 	SSL_DBG(("%d: SSL[%d]: bad socket in SSL_GetNextProto", SSL_GETPID(),
1547 		 fd));
1548 	return SECFailure;
1549     }
1550 
1551     if (!state || !buf || !bufLen) {
1552 	PORT_SetError(SEC_ERROR_INVALID_ARGS);
1553 	return SECFailure;
1554     }
1555 
1556     *state = ss->ssl3.nextProtoState;
1557 
1558     if (ss->ssl3.nextProtoState != SSL_NEXT_PROTO_NO_SUPPORT &&
1559 	ss->ssl3.nextProto.data) {
1560 	if (ss->ssl3.nextProto.len > bufLenMax) {
1561 	    PORT_SetError(SEC_ERROR_OUTPUT_LEN);
1562 	    return SECFailure;
1563 	}
1564 	PORT_Memcpy(buf, ss->ssl3.nextProto.data, ss->ssl3.nextProto.len);
1565 	*bufLen = ss->ssl3.nextProto.len;
1566     } else {
1567 	*bufLen = 0;
1568     }
1569 
1570     return SECSuccess;
1571 }
1572 
SSL_SetSRTPCiphers(PRFileDesc * fd,const PRUint16 * ciphers,unsigned int numCiphers)1573 SECStatus SSL_SetSRTPCiphers(PRFileDesc *fd,
1574 			     const PRUint16 *ciphers,
1575 			     unsigned int numCiphers)
1576 {
1577     sslSocket *ss;
1578     unsigned int i;
1579 
1580     ss = ssl_FindSocket(fd);
1581     if (!ss || !IS_DTLS(ss)) {
1582 	SSL_DBG(("%d: SSL[%d]: bad socket in SSL_SetSRTPCiphers",
1583 		 SSL_GETPID(), fd));
1584 	PORT_SetError(SEC_ERROR_INVALID_ARGS);
1585 	return SECFailure;
1586     }
1587 
1588     if (numCiphers > MAX_DTLS_SRTP_CIPHER_SUITES) {
1589 	PORT_SetError(SEC_ERROR_INVALID_ARGS);
1590 	return SECFailure;
1591     }
1592 
1593     ss->ssl3.dtlsSRTPCipherCount = 0;
1594     for (i = 0; i < numCiphers; i++) {
1595 	const PRUint16 *srtpCipher = srtpCiphers;
1596 
1597 	while (*srtpCipher) {
1598 	    if (ciphers[i] == *srtpCipher)
1599 		break;
1600 	    srtpCipher++;
1601 	}
1602 	if (*srtpCipher) {
1603 	    ss->ssl3.dtlsSRTPCiphers[ss->ssl3.dtlsSRTPCipherCount++] =
1604 		ciphers[i];
1605 	} else {
1606 	    SSL_DBG(("%d: SSL[%d]: invalid or unimplemented SRTP cipher "
1607 		    "suite specified: 0x%04hx", SSL_GETPID(), fd,
1608 		    ciphers[i]));
1609 	}
1610     }
1611 
1612     if (ss->ssl3.dtlsSRTPCipherCount == 0) {
1613 	PORT_SetError(SEC_ERROR_INVALID_ARGS);
1614 	return SECFailure;
1615     }
1616 
1617     return SECSuccess;
1618 }
1619 
1620 SECStatus
SSL_GetSRTPCipher(PRFileDesc * fd,PRUint16 * cipher)1621 SSL_GetSRTPCipher(PRFileDesc *fd, PRUint16 *cipher)
1622 {
1623     sslSocket * ss;
1624 
1625     ss = ssl_FindSocket(fd);
1626     if (!ss) {
1627 	SSL_DBG(("%d: SSL[%d]: bad socket in SSL_GetSRTPCipher",
1628 		 SSL_GETPID(), fd));
1629 	PORT_SetError(SEC_ERROR_INVALID_ARGS);
1630 	return SECFailure;
1631     }
1632 
1633     if (!ss->ssl3.dtlsSRTPCipherSuite) {
1634 	PORT_SetError(SEC_ERROR_INVALID_ARGS);
1635 	return SECFailure;
1636     }
1637 
1638     *cipher = ss->ssl3.dtlsSRTPCipherSuite;
1639     return SECSuccess;
1640 }
1641 
1642 PRFileDesc *
SSL_ReconfigFD(PRFileDesc * model,PRFileDesc * fd)1643 SSL_ReconfigFD(PRFileDesc *model, PRFileDesc *fd)
1644 {
1645     sslSocket * sm = NULL, *ss = NULL;
1646     int i;
1647     sslServerCerts * mc = NULL;
1648     sslServerCerts * sc = NULL;
1649 
1650     if (model == NULL) {
1651         PR_SetError(SEC_ERROR_INVALID_ARGS, 0);
1652         return NULL;
1653     }
1654     sm = ssl_FindSocket(model);
1655     if (sm == NULL) {
1656         SSL_DBG(("%d: SSL[%d]: bad model socket in ssl_ReconfigFD",
1657                  SSL_GETPID(), model));
1658         return NULL;
1659     }
1660     ss = ssl_FindSocket(fd);
1661     PORT_Assert(ss);
1662     if (ss == NULL) {
1663         PORT_SetError(SEC_ERROR_INVALID_ARGS);
1664         return NULL;
1665     }
1666 
1667     ss->opt  = sm->opt;
1668     ss->vrange = sm->vrange;
1669     PORT_Memcpy(ss->cipherSuites, sm->cipherSuites, sizeof sm->cipherSuites);
1670     PORT_Memcpy(ss->ssl3.dtlsSRTPCiphers, sm->ssl3.dtlsSRTPCiphers,
1671                 sizeof(PRUint16) * sm->ssl3.dtlsSRTPCipherCount);
1672     ss->ssl3.dtlsSRTPCipherCount = sm->ssl3.dtlsSRTPCipherCount;
1673 
1674     if (!ss->opt.useSecurity) {
1675         PORT_SetError(SEC_ERROR_INVALID_ARGS);
1676         return NULL;
1677     }
1678     /* This int should be SSLKEAType, but CC on Irix complains,
1679      * during the for loop.
1680      */
1681     for (i=kt_null; i < kt_kea_size; i++) {
1682         mc = &(sm->serverCerts[i]);
1683         sc = &(ss->serverCerts[i]);
1684         if (mc->serverCert && mc->serverCertChain) {
1685             if (sc->serverCert) {
1686                 CERT_DestroyCertificate(sc->serverCert);
1687             }
1688             sc->serverCert      = CERT_DupCertificate(mc->serverCert);
1689             if (sc->serverCertChain) {
1690                 CERT_DestroyCertificateList(sc->serverCertChain);
1691             }
1692             sc->serverCertChain = CERT_DupCertList(mc->serverCertChain);
1693             if (!sc->serverCertChain)
1694                 goto loser;
1695 	    if (sm->certStatusArray[i]) {
1696 		if (ss->certStatusArray[i]) {
1697 		    SECITEM_FreeArray(ss->certStatusArray[i], PR_TRUE);
1698 		    ss->certStatusArray[i] = NULL;
1699 		}
1700 		ss->certStatusArray[i] = SECITEM_DupArray(NULL, sm->certStatusArray[i]);
1701 		if (!ss->certStatusArray[i])
1702 		    goto loser;
1703 	    }
1704         }
1705         if (mc->serverKeyPair) {
1706             if (sc->serverKeyPair) {
1707                 ssl3_FreeKeyPair(sc->serverKeyPair);
1708             }
1709             sc->serverKeyPair = ssl3_GetKeyPairRef(mc->serverKeyPair);
1710             sc->serverKeyBits = mc->serverKeyBits;
1711         }
1712     }
1713     if (sm->stepDownKeyPair) {
1714         if (ss->stepDownKeyPair) {
1715             ssl3_FreeKeyPair(ss->stepDownKeyPair);
1716         }
1717         ss->stepDownKeyPair = ssl3_GetKeyPairRef(sm->stepDownKeyPair);
1718     }
1719     if (sm->ephemeralECDHKeyPair) {
1720         if (ss->ephemeralECDHKeyPair) {
1721             ssl3_FreeKeyPair(ss->ephemeralECDHKeyPair);
1722         }
1723         ss->ephemeralECDHKeyPair =
1724             ssl3_GetKeyPairRef(sm->ephemeralECDHKeyPair);
1725     }
1726     /* copy trust anchor names */
1727     if (sm->ssl3.ca_list) {
1728         if (ss->ssl3.ca_list) {
1729             CERT_FreeDistNames(ss->ssl3.ca_list);
1730         }
1731         ss->ssl3.ca_list = CERT_DupDistNames(sm->ssl3.ca_list);
1732         if (!ss->ssl3.ca_list) {
1733             goto loser;
1734         }
1735     }
1736 
1737     if (sm->authCertificate)
1738         ss->authCertificate       = sm->authCertificate;
1739     if (sm->authCertificateArg)
1740         ss->authCertificateArg    = sm->authCertificateArg;
1741     if (sm->getClientAuthData)
1742         ss->getClientAuthData     = sm->getClientAuthData;
1743     if (sm->getClientAuthDataArg)
1744         ss->getClientAuthDataArg  = sm->getClientAuthDataArg;
1745 #ifdef NSS_PLATFORM_CLIENT_AUTH
1746     if (sm->getPlatformClientAuthData)
1747         ss->getPlatformClientAuthData    = sm->getPlatformClientAuthData;
1748     if (sm->getPlatformClientAuthDataArg)
1749         ss->getPlatformClientAuthDataArg = sm->getPlatformClientAuthDataArg;
1750 #endif
1751     if (sm->sniSocketConfig)
1752         ss->sniSocketConfig       = sm->sniSocketConfig;
1753     if (sm->sniSocketConfigArg)
1754         ss->sniSocketConfigArg    = sm->sniSocketConfigArg;
1755     if (sm->handleBadCert)
1756         ss->handleBadCert         = sm->handleBadCert;
1757     if (sm->badCertArg)
1758         ss->badCertArg            = sm->badCertArg;
1759     if (sm->handshakeCallback)
1760         ss->handshakeCallback     = sm->handshakeCallback;
1761     if (sm->handshakeCallbackData)
1762         ss->handshakeCallbackData = sm->handshakeCallbackData;
1763     if (sm->pkcs11PinArg)
1764         ss->pkcs11PinArg          = sm->pkcs11PinArg;
1765     if (sm->getChannelID)
1766         ss->getChannelID          = sm->getChannelID;
1767     if (sm->getChannelIDArg)
1768         ss->getChannelIDArg       = sm->getChannelIDArg;
1769     return fd;
1770 loser:
1771     return NULL;
1772 }
1773 
1774 PRBool
ssl3_VersionIsSupported(SSLProtocolVariant protocolVariant,SSL3ProtocolVersion version)1775 ssl3_VersionIsSupported(SSLProtocolVariant protocolVariant,
1776 			SSL3ProtocolVersion version)
1777 {
1778     switch (protocolVariant) {
1779     case ssl_variant_stream:
1780 	return (version >= SSL_LIBRARY_VERSION_3_0 &&
1781 		version <= SSL_LIBRARY_VERSION_MAX_SUPPORTED);
1782     case ssl_variant_datagram:
1783 	return (version >= SSL_LIBRARY_VERSION_TLS_1_1 &&
1784 		version <= SSL_LIBRARY_VERSION_MAX_SUPPORTED);
1785     default:
1786 	/* Can't get here */
1787 	PORT_Assert(PR_FALSE);
1788 	return PR_FALSE;
1789     }
1790 }
1791 
1792 /* Returns PR_TRUE if the given version range is valid and
1793 ** fully supported; otherwise, returns PR_FALSE.
1794 */
1795 static PRBool
ssl3_VersionRangeIsValid(SSLProtocolVariant protocolVariant,const SSLVersionRange * vrange)1796 ssl3_VersionRangeIsValid(SSLProtocolVariant protocolVariant,
1797 			 const SSLVersionRange *vrange)
1798 {
1799     return vrange &&
1800 	   vrange->min <= vrange->max &&
1801 	   ssl3_VersionIsSupported(protocolVariant, vrange->min) &&
1802 	   ssl3_VersionIsSupported(protocolVariant, vrange->max);
1803 }
1804 
1805 SECStatus
SSL_VersionRangeGetSupported(SSLProtocolVariant protocolVariant,SSLVersionRange * vrange)1806 SSL_VersionRangeGetSupported(SSLProtocolVariant protocolVariant,
1807 			     SSLVersionRange *vrange)
1808 {
1809     if (!vrange) {
1810 	PORT_SetError(SEC_ERROR_INVALID_ARGS);
1811 	return SECFailure;
1812     }
1813 
1814     switch (protocolVariant) {
1815     case ssl_variant_stream:
1816 	vrange->min = SSL_LIBRARY_VERSION_3_0;
1817 	vrange->max = SSL_LIBRARY_VERSION_MAX_SUPPORTED;
1818 	break;
1819     case ssl_variant_datagram:
1820 	vrange->min = SSL_LIBRARY_VERSION_TLS_1_1;
1821 	vrange->max = SSL_LIBRARY_VERSION_MAX_SUPPORTED;
1822 	break;
1823     default:
1824 	PORT_SetError(SEC_ERROR_INVALID_ARGS);
1825 	return SECFailure;
1826     }
1827 
1828     return SECSuccess;
1829 }
1830 
1831 SECStatus
SSL_VersionRangeGetDefault(SSLProtocolVariant protocolVariant,SSLVersionRange * vrange)1832 SSL_VersionRangeGetDefault(SSLProtocolVariant protocolVariant,
1833 			   SSLVersionRange *vrange)
1834 {
1835     if ((protocolVariant != ssl_variant_stream &&
1836 	 protocolVariant != ssl_variant_datagram) || !vrange) {
1837 	PORT_SetError(SEC_ERROR_INVALID_ARGS);
1838 	return SECFailure;
1839     }
1840 
1841     *vrange = *VERSIONS_DEFAULTS(protocolVariant);
1842 
1843     return SECSuccess;
1844 }
1845 
1846 SECStatus
SSL_VersionRangeSetDefault(SSLProtocolVariant protocolVariant,const SSLVersionRange * vrange)1847 SSL_VersionRangeSetDefault(SSLProtocolVariant protocolVariant,
1848 			   const SSLVersionRange *vrange)
1849 {
1850     if (!ssl3_VersionRangeIsValid(protocolVariant, vrange)) {
1851 	PORT_SetError(SSL_ERROR_INVALID_VERSION_RANGE);
1852 	return SECFailure;
1853     }
1854 
1855     *VERSIONS_DEFAULTS(protocolVariant) = *vrange;
1856 
1857     return SECSuccess;
1858 }
1859 
1860 SECStatus
SSL_VersionRangeGet(PRFileDesc * fd,SSLVersionRange * vrange)1861 SSL_VersionRangeGet(PRFileDesc *fd, SSLVersionRange *vrange)
1862 {
1863     sslSocket *ss = ssl_FindSocket(fd);
1864 
1865     if (!ss) {
1866 	SSL_DBG(("%d: SSL[%d]: bad socket in SSL3_VersionRangeGet",
1867 		SSL_GETPID(), fd));
1868 	return SECFailure;
1869     }
1870 
1871     if (!vrange) {
1872 	PORT_SetError(SEC_ERROR_INVALID_ARGS);
1873 	return SECFailure;
1874     }
1875 
1876     ssl_Get1stHandshakeLock(ss);
1877     ssl_GetSSL3HandshakeLock(ss);
1878 
1879     *vrange = ss->vrange;
1880 
1881     ssl_ReleaseSSL3HandshakeLock(ss);
1882     ssl_Release1stHandshakeLock(ss);
1883 
1884     return SECSuccess;
1885 }
1886 
1887 static PRCallOnceType checkTLS12TokenOnce;
1888 static PRBool tls12TokenExists;
1889 
1890 static PRStatus
ssl_CheckTLS12Token(void)1891 ssl_CheckTLS12Token(void)
1892 {
1893     tls12TokenExists =
1894 	PK11_TokenExists(CKM_NSS_TLS_MASTER_KEY_DERIVE_DH_SHA256);
1895     return PR_SUCCESS;
1896 }
1897 
1898 static PRBool
ssl_TLS12TokenExists(void)1899 ssl_TLS12TokenExists(void)
1900 {
1901     (void) PR_CallOnce(&checkTLS12TokenOnce, ssl_CheckTLS12Token);
1902     return tls12TokenExists;
1903 }
1904 
1905 SECStatus
SSL_VersionRangeSet(PRFileDesc * fd,const SSLVersionRange * vrange)1906 SSL_VersionRangeSet(PRFileDesc *fd, const SSLVersionRange *vrange)
1907 {
1908     sslSocket *ss = ssl_FindSocket(fd);
1909 
1910     if (!ss) {
1911 	SSL_DBG(("%d: SSL[%d]: bad socket in SSL3_VersionRangeSet",
1912 		SSL_GETPID(), fd));
1913 	return SECFailure;
1914     }
1915 
1916     if (!ssl3_VersionRangeIsValid(ss->protocolVariant, vrange)) {
1917 	PORT_SetError(SSL_ERROR_INVALID_VERSION_RANGE);
1918 	return SECFailure;
1919     }
1920 
1921     ssl_Get1stHandshakeLock(ss);
1922     ssl_GetSSL3HandshakeLock(ss);
1923 
1924     ss->vrange = *vrange;
1925     /* If we don't have a sufficiently up-to-date softoken then we cannot do
1926      * TLS 1.2. */
1927     if (ss->vrange.max >= SSL_LIBRARY_VERSION_TLS_1_2 &&
1928         !ssl_TLS12TokenExists()) {
1929 	/* If the user requested a minimum version of 1.2, then we don't
1930 	 * silently downgrade. */
1931 	if (ss->vrange.min >= SSL_LIBRARY_VERSION_TLS_1_2) {
1932 	    ssl_ReleaseSSL3HandshakeLock(ss);
1933 	    ssl_Release1stHandshakeLock(ss);
1934 	    PORT_SetError(SSL_ERROR_INVALID_VERSION_RANGE);
1935 	    return SECFailure;
1936 	}
1937 	ss->vrange.max = SSL_LIBRARY_VERSION_TLS_1_1;
1938     }
1939 
1940     ssl_ReleaseSSL3HandshakeLock(ss);
1941     ssl_Release1stHandshakeLock(ss);
1942 
1943     return SECSuccess;
1944 }
1945 
1946 const SECItemArray *
SSL_PeerStapledOCSPResponses(PRFileDesc * fd)1947 SSL_PeerStapledOCSPResponses(PRFileDesc *fd)
1948 {
1949     sslSocket *ss = ssl_FindSocket(fd);
1950 
1951     if (!ss) {
1952        SSL_DBG(("%d: SSL[%d]: bad socket in SSL_PeerStapledOCSPResponses",
1953                 SSL_GETPID(), fd));
1954        return NULL;
1955     }
1956 
1957     if (!ss->sec.ci.sid) {
1958        PORT_SetError(SEC_ERROR_NOT_INITIALIZED);
1959        return NULL;
1960     }
1961 
1962     return &ss->sec.ci.sid->peerCertStatus;
1963 }
1964 
1965 const SECItem *
SSL_PeerSignedCertTimestamps(PRFileDesc * fd)1966 SSL_PeerSignedCertTimestamps(PRFileDesc *fd)
1967 {
1968     sslSocket *ss = ssl_FindSocket(fd);
1969 
1970     if (!ss) {
1971        SSL_DBG(("%d: SSL[%d]: bad socket in SSL_PeerSignedCertTimestamps",
1972 		SSL_GETPID(), fd));
1973        return NULL;
1974     }
1975 
1976     if (!ss->sec.ci.sid) {
1977        PORT_SetError(SEC_ERROR_NOT_INITIALIZED);
1978        return NULL;
1979     }
1980 
1981     if (ss->sec.ci.sid->version < SSL_LIBRARY_VERSION_3_0) {
1982 	PORT_SetError(SSL_ERROR_FEATURE_NOT_SUPPORTED_FOR_SSL2);
1983 	return NULL;
1984     }
1985     return &ss->sec.ci.sid->u.ssl3.signedCertTimestamps;
1986 }
1987 
1988 SECStatus
SSL_HandshakeResumedSession(PRFileDesc * fd,PRBool * handshake_resumed)1989 SSL_HandshakeResumedSession(PRFileDesc *fd, PRBool *handshake_resumed) {
1990     sslSocket *ss = ssl_FindSocket(fd);
1991 
1992     if (!ss) {
1993 	SSL_DBG(("%d: SSL[%d]: bad socket in SSL_HandshakeResumedSession",
1994 		 SSL_GETPID(), fd));
1995 	return SECFailure;
1996     }
1997 
1998     *handshake_resumed = ss->ssl3.hs.isResuming;
1999     return SECSuccess;
2000 }
2001 
2002 const SECItem *
SSL_GetRequestedClientCertificateTypes(PRFileDesc * fd)2003 SSL_GetRequestedClientCertificateTypes(PRFileDesc *fd)
2004 {
2005   sslSocket *ss = ssl_FindSocket(fd);
2006 
2007   if (!ss) {
2008       SSL_DBG(("%d: SSL[%d]: bad socket in "
2009                "SSL_GetRequestedClientCertificateTypes", SSL_GETPID(), fd));
2010       return NULL;
2011   }
2012 
2013   return ss->requestedCertTypes;
2014 }
2015 
2016 /************************************************************************/
2017 /* The following functions are the TOP LEVEL SSL functions.
2018 ** They all get called through the NSPRIOMethods table below.
2019 */
2020 
2021 static PRFileDesc * PR_CALLBACK
ssl_Accept(PRFileDesc * fd,PRNetAddr * sockaddr,PRIntervalTime timeout)2022 ssl_Accept(PRFileDesc *fd, PRNetAddr *sockaddr, PRIntervalTime timeout)
2023 {
2024     sslSocket  *ss;
2025     sslSocket  *ns 	= NULL;
2026     PRFileDesc *newfd 	= NULL;
2027     PRFileDesc *osfd;
2028     PRStatus    status;
2029 
2030     ss = ssl_GetPrivate(fd);
2031     if (!ss) {
2032 	SSL_DBG(("%d: SSL[%d]: bad socket in accept", SSL_GETPID(), fd));
2033 	return NULL;
2034     }
2035 
2036     /* IF this is a listen socket, there shouldn't be any I/O going on */
2037     SSL_LOCK_READER(ss);
2038     SSL_LOCK_WRITER(ss);
2039     ssl_Get1stHandshakeLock(ss);
2040     ssl_GetSSL3HandshakeLock(ss);
2041 
2042     ss->cTimeout = timeout;
2043 
2044     osfd = ss->fd->lower;
2045 
2046     /* First accept connection */
2047     newfd = osfd->methods->accept(osfd, sockaddr, timeout);
2048     if (newfd == NULL) {
2049 	SSL_DBG(("%d: SSL[%d]: accept failed, errno=%d",
2050 		 SSL_GETPID(), ss->fd, PORT_GetError()));
2051     } else {
2052 	/* Create ssl module */
2053 	ns = ssl_DupSocket(ss);
2054     }
2055 
2056     ssl_ReleaseSSL3HandshakeLock(ss);
2057     ssl_Release1stHandshakeLock(ss);
2058     SSL_UNLOCK_WRITER(ss);
2059     SSL_UNLOCK_READER(ss);			/* ss isn't used below here. */
2060 
2061     if (ns == NULL)
2062 	goto loser;
2063 
2064     /* push ssl module onto the new socket */
2065     status = ssl_PushIOLayer(ns, newfd, PR_TOP_IO_LAYER);
2066     if (status != PR_SUCCESS)
2067 	goto loser;
2068 
2069     /* Now start server connection handshake with client.
2070     ** Don't need locks here because nobody else has a reference to ns yet.
2071     */
2072     if ( ns->opt.useSecurity ) {
2073 	if ( ns->opt.handshakeAsClient ) {
2074 	    ns->handshake = ssl2_BeginClientHandshake;
2075 	    ss->handshaking = sslHandshakingAsClient;
2076 	} else {
2077 	    ns->handshake = ssl2_BeginServerHandshake;
2078 	    ss->handshaking = sslHandshakingAsServer;
2079 	}
2080     }
2081     ns->TCPconnected = 1;
2082     return newfd;
2083 
2084 loser:
2085     if (ns != NULL)
2086 	ssl_FreeSocket(ns);
2087     if (newfd != NULL)
2088 	PR_Close(newfd);
2089     return NULL;
2090 }
2091 
2092 static PRStatus PR_CALLBACK
ssl_Connect(PRFileDesc * fd,const PRNetAddr * sockaddr,PRIntervalTime timeout)2093 ssl_Connect(PRFileDesc *fd, const PRNetAddr *sockaddr, PRIntervalTime timeout)
2094 {
2095     sslSocket *ss;
2096     PRStatus   rv;
2097 
2098     ss = ssl_GetPrivate(fd);
2099     if (!ss) {
2100 	SSL_DBG(("%d: SSL[%d]: bad socket in connect", SSL_GETPID(), fd));
2101 	return PR_FAILURE;
2102     }
2103 
2104     /* IF this is a listen socket, there shouldn't be any I/O going on */
2105     SSL_LOCK_READER(ss);
2106     SSL_LOCK_WRITER(ss);
2107 
2108     ss->cTimeout = timeout;
2109     rv = (PRStatus)(*ss->ops->connect)(ss, sockaddr);
2110 
2111     SSL_UNLOCK_WRITER(ss);
2112     SSL_UNLOCK_READER(ss);
2113 
2114     return rv;
2115 }
2116 
2117 static PRStatus PR_CALLBACK
ssl_Bind(PRFileDesc * fd,const PRNetAddr * addr)2118 ssl_Bind(PRFileDesc *fd, const PRNetAddr *addr)
2119 {
2120     sslSocket * ss = ssl_GetPrivate(fd);
2121     PRStatus    rv;
2122 
2123     if (!ss) {
2124 	SSL_DBG(("%d: SSL[%d]: bad socket in bind", SSL_GETPID(), fd));
2125 	return PR_FAILURE;
2126     }
2127     SSL_LOCK_READER(ss);
2128     SSL_LOCK_WRITER(ss);
2129 
2130     rv = (PRStatus)(*ss->ops->bind)(ss, addr);
2131 
2132     SSL_UNLOCK_WRITER(ss);
2133     SSL_UNLOCK_READER(ss);
2134     return rv;
2135 }
2136 
2137 static PRStatus PR_CALLBACK
ssl_Listen(PRFileDesc * fd,PRIntn backlog)2138 ssl_Listen(PRFileDesc *fd, PRIntn backlog)
2139 {
2140     sslSocket * ss = ssl_GetPrivate(fd);
2141     PRStatus    rv;
2142 
2143     if (!ss) {
2144 	SSL_DBG(("%d: SSL[%d]: bad socket in listen", SSL_GETPID(), fd));
2145 	return PR_FAILURE;
2146     }
2147     SSL_LOCK_READER(ss);
2148     SSL_LOCK_WRITER(ss);
2149 
2150     rv = (PRStatus)(*ss->ops->listen)(ss, backlog);
2151 
2152     SSL_UNLOCK_WRITER(ss);
2153     SSL_UNLOCK_READER(ss);
2154     return rv;
2155 }
2156 
2157 static PRStatus PR_CALLBACK
ssl_Shutdown(PRFileDesc * fd,PRIntn how)2158 ssl_Shutdown(PRFileDesc *fd, PRIntn how)
2159 {
2160     sslSocket * ss = ssl_GetPrivate(fd);
2161     PRStatus    rv;
2162 
2163     if (!ss) {
2164 	SSL_DBG(("%d: SSL[%d]: bad socket in shutdown", SSL_GETPID(), fd));
2165 	return PR_FAILURE;
2166     }
2167     if (how == PR_SHUTDOWN_RCV || how == PR_SHUTDOWN_BOTH) {
2168     	SSL_LOCK_READER(ss);
2169     }
2170     if (how == PR_SHUTDOWN_SEND || how == PR_SHUTDOWN_BOTH) {
2171     	SSL_LOCK_WRITER(ss);
2172     }
2173 
2174     rv = (PRStatus)(*ss->ops->shutdown)(ss, how);
2175 
2176     if (how == PR_SHUTDOWN_SEND || how == PR_SHUTDOWN_BOTH) {
2177     	SSL_UNLOCK_WRITER(ss);
2178     }
2179     if (how == PR_SHUTDOWN_RCV || how == PR_SHUTDOWN_BOTH) {
2180     	SSL_UNLOCK_READER(ss);
2181     }
2182     return rv;
2183 }
2184 
2185 static PRStatus PR_CALLBACK
ssl_Close(PRFileDesc * fd)2186 ssl_Close(PRFileDesc *fd)
2187 {
2188     sslSocket *ss;
2189     PRStatus   rv;
2190 
2191     ss = ssl_GetPrivate(fd);
2192     if (!ss) {
2193 	SSL_DBG(("%d: SSL[%d]: bad socket in close", SSL_GETPID(), fd));
2194 	return PR_FAILURE;
2195     }
2196 
2197     /* There must not be any I/O going on */
2198     SSL_LOCK_READER(ss);
2199     SSL_LOCK_WRITER(ss);
2200 
2201     /* By the time this function returns,
2202     ** ss is an invalid pointer, and the locks to which it points have
2203     ** been unlocked and freed.  So, this is the ONE PLACE in all of SSL
2204     ** where the LOCK calls and the corresponding UNLOCK calls are not in
2205     ** the same function scope.  The unlock calls are in ssl_FreeSocket().
2206     */
2207     rv = (PRStatus)(*ss->ops->close)(ss);
2208 
2209     return rv;
2210 }
2211 
2212 static int PR_CALLBACK
ssl_Recv(PRFileDesc * fd,void * buf,PRInt32 len,PRIntn flags,PRIntervalTime timeout)2213 ssl_Recv(PRFileDesc *fd, void *buf, PRInt32 len, PRIntn flags,
2214 	 PRIntervalTime timeout)
2215 {
2216     sslSocket *ss;
2217     int        rv;
2218 
2219     ss = ssl_GetPrivate(fd);
2220     if (!ss) {
2221 	SSL_DBG(("%d: SSL[%d]: bad socket in recv", SSL_GETPID(), fd));
2222 	return SECFailure;
2223     }
2224     SSL_LOCK_READER(ss);
2225     ss->rTimeout = timeout;
2226     if (!ss->opt.fdx)
2227 	ss->wTimeout = timeout;
2228     rv = (*ss->ops->recv)(ss, (unsigned char*)buf, len, flags);
2229     SSL_UNLOCK_READER(ss);
2230     return rv;
2231 }
2232 
2233 static int PR_CALLBACK
ssl_Send(PRFileDesc * fd,const void * buf,PRInt32 len,PRIntn flags,PRIntervalTime timeout)2234 ssl_Send(PRFileDesc *fd, const void *buf, PRInt32 len, PRIntn flags,
2235 	 PRIntervalTime timeout)
2236 {
2237     sslSocket *ss;
2238     int        rv;
2239 
2240     ss = ssl_GetPrivate(fd);
2241     if (!ss) {
2242 	SSL_DBG(("%d: SSL[%d]: bad socket in send", SSL_GETPID(), fd));
2243 	return SECFailure;
2244     }
2245     SSL_LOCK_WRITER(ss);
2246     ss->wTimeout = timeout;
2247     if (!ss->opt.fdx)
2248 	ss->rTimeout = timeout;
2249     rv = (*ss->ops->send)(ss, (const unsigned char*)buf, len, flags);
2250     SSL_UNLOCK_WRITER(ss);
2251     return rv;
2252 }
2253 
2254 static int PR_CALLBACK
ssl_Read(PRFileDesc * fd,void * buf,PRInt32 len)2255 ssl_Read(PRFileDesc *fd, void *buf, PRInt32 len)
2256 {
2257     sslSocket *ss;
2258     int        rv;
2259 
2260     ss = ssl_GetPrivate(fd);
2261     if (!ss) {
2262 	SSL_DBG(("%d: SSL[%d]: bad socket in read", SSL_GETPID(), fd));
2263 	return SECFailure;
2264     }
2265     SSL_LOCK_READER(ss);
2266     ss->rTimeout = PR_INTERVAL_NO_TIMEOUT;
2267     if (!ss->opt.fdx)
2268 	ss->wTimeout = PR_INTERVAL_NO_TIMEOUT;
2269     rv = (*ss->ops->read)(ss, (unsigned char*)buf, len);
2270     SSL_UNLOCK_READER(ss);
2271     return rv;
2272 }
2273 
2274 static int PR_CALLBACK
ssl_Write(PRFileDesc * fd,const void * buf,PRInt32 len)2275 ssl_Write(PRFileDesc *fd, const void *buf, PRInt32 len)
2276 {
2277     sslSocket *ss;
2278     int        rv;
2279 
2280     ss = ssl_GetPrivate(fd);
2281     if (!ss) {
2282 	SSL_DBG(("%d: SSL[%d]: bad socket in write", SSL_GETPID(), fd));
2283 	return SECFailure;
2284     }
2285     SSL_LOCK_WRITER(ss);
2286     ss->wTimeout = PR_INTERVAL_NO_TIMEOUT;
2287     if (!ss->opt.fdx)
2288 	ss->rTimeout = PR_INTERVAL_NO_TIMEOUT;
2289     rv = (*ss->ops->write)(ss, (const unsigned char*)buf, len);
2290     SSL_UNLOCK_WRITER(ss);
2291     return rv;
2292 }
2293 
2294 static PRStatus PR_CALLBACK
ssl_GetPeerName(PRFileDesc * fd,PRNetAddr * addr)2295 ssl_GetPeerName(PRFileDesc *fd, PRNetAddr *addr)
2296 {
2297     sslSocket *ss;
2298 
2299     ss = ssl_GetPrivate(fd);
2300     if (!ss) {
2301 	SSL_DBG(("%d: SSL[%d]: bad socket in getpeername", SSL_GETPID(), fd));
2302 	return PR_FAILURE;
2303     }
2304     return (PRStatus)(*ss->ops->getpeername)(ss, addr);
2305 }
2306 
2307 /*
2308 */
2309 SECStatus
ssl_GetPeerInfo(sslSocket * ss)2310 ssl_GetPeerInfo(sslSocket *ss)
2311 {
2312     PRFileDesc *      osfd;
2313     int               rv;
2314     PRNetAddr         sin;
2315 
2316     osfd = ss->fd->lower;
2317 
2318     PORT_Memset(&sin, 0, sizeof(sin));
2319     rv = osfd->methods->getpeername(osfd, &sin);
2320     if (rv < 0) {
2321 	return SECFailure;
2322     }
2323     ss->TCPconnected = 1;
2324     if (sin.inet.family == PR_AF_INET) {
2325         PR_ConvertIPv4AddrToIPv6(sin.inet.ip, &ss->sec.ci.peer);
2326 	ss->sec.ci.port = sin.inet.port;
2327     } else if (sin.ipv6.family == PR_AF_INET6) {
2328 	ss->sec.ci.peer = sin.ipv6.ip;
2329 	ss->sec.ci.port = sin.ipv6.port;
2330     } else {
2331 	PORT_SetError(PR_ADDRESS_NOT_SUPPORTED_ERROR);
2332     	return SECFailure;
2333     }
2334     return SECSuccess;
2335 }
2336 
2337 static PRStatus PR_CALLBACK
ssl_GetSockName(PRFileDesc * fd,PRNetAddr * name)2338 ssl_GetSockName(PRFileDesc *fd, PRNetAddr *name)
2339 {
2340     sslSocket *ss;
2341 
2342     ss = ssl_GetPrivate(fd);
2343     if (!ss) {
2344 	SSL_DBG(("%d: SSL[%d]: bad socket in getsockname", SSL_GETPID(), fd));
2345 	return PR_FAILURE;
2346     }
2347     return (PRStatus)(*ss->ops->getsockname)(ss, name);
2348 }
2349 
2350 SECStatus
SSL_SetStapledOCSPResponses(PRFileDesc * fd,const SECItemArray * responses,SSLKEAType kea)2351 SSL_SetStapledOCSPResponses(PRFileDesc *fd, const SECItemArray *responses,
2352 			    SSLKEAType kea)
2353 {
2354     sslSocket *ss;
2355 
2356     ss = ssl_FindSocket(fd);
2357     if (!ss) {
2358 	SSL_DBG(("%d: SSL[%d]: bad socket in SSL_SetStapledOCSPResponses",
2359 		 SSL_GETPID(), fd));
2360 	return SECFailure;
2361     }
2362 
2363     if ( kea <= 0 || kea >= kt_kea_size) {
2364 	SSL_DBG(("%d: SSL[%d]: invalid key in SSL_SetStapledOCSPResponses",
2365 		 SSL_GETPID(), fd));
2366 	return SECFailure;
2367     }
2368 
2369     if (ss->certStatusArray[kea]) {
2370         SECITEM_FreeArray(ss->certStatusArray[kea], PR_TRUE);
2371         ss->certStatusArray[kea] = NULL;
2372     }
2373     if (responses) {
2374 	ss->certStatusArray[kea] = SECITEM_DupArray(NULL, responses);
2375     }
2376     return (ss->certStatusArray[kea] || !responses) ? SECSuccess : SECFailure;
2377 }
2378 
2379 SECStatus
SSL_SetSockPeerID(PRFileDesc * fd,const char * peerID)2380 SSL_SetSockPeerID(PRFileDesc *fd, const char *peerID)
2381 {
2382     sslSocket *ss;
2383 
2384     ss = ssl_FindSocket(fd);
2385     if (!ss) {
2386 	SSL_DBG(("%d: SSL[%d]: bad socket in SSL_SetSockPeerID",
2387 		 SSL_GETPID(), fd));
2388 	return SECFailure;
2389     }
2390 
2391     if (ss->peerID) {
2392     	PORT_Free(ss->peerID);
2393 	ss->peerID = NULL;
2394     }
2395     if (peerID)
2396 	ss->peerID = PORT_Strdup(peerID);
2397     return (ss->peerID || !peerID) ? SECSuccess : SECFailure;
2398 }
2399 
2400 #define PR_POLL_RW (PR_POLL_WRITE | PR_POLL_READ)
2401 
2402 static PRInt16 PR_CALLBACK
ssl_Poll(PRFileDesc * fd,PRInt16 how_flags,PRInt16 * p_out_flags)2403 ssl_Poll(PRFileDesc *fd, PRInt16 how_flags, PRInt16 *p_out_flags)
2404 {
2405     sslSocket *ss;
2406     PRInt16    new_flags = how_flags;	/* should select on these flags. */
2407     PRNetAddr  addr;
2408 
2409     *p_out_flags = 0;
2410     ss = ssl_GetPrivate(fd);
2411     if (!ss) {
2412 	SSL_DBG(("%d: SSL[%d]: bad socket in SSL_Poll",
2413 		 SSL_GETPID(), fd));
2414 	return 0;	/* don't poll on this socket */
2415     }
2416 
2417     if (ss->opt.useSecurity &&
2418 	ss->handshaking != sslHandshakingUndetermined &&
2419         !ss->firstHsDone &&
2420 	(how_flags & PR_POLL_RW)) {
2421 	if (!ss->TCPconnected) {
2422 	    ss->TCPconnected = (PR_SUCCESS == ssl_DefGetpeername(ss, &addr));
2423 	}
2424 	/* If it's not connected, then presumably the application is polling
2425 	** on read or write appropriately, so don't change it.
2426 	*/
2427 	if (ss->TCPconnected) {
2428 	    if (!ss->handshakeBegun) {
2429 		/* If the handshake has not begun, poll on read or write
2430 		** based on the local application's role in the handshake,
2431 		** not based on what the application requested.
2432 		*/
2433 		new_flags &= ~PR_POLL_RW;
2434 		if (ss->handshaking == sslHandshakingAsClient) {
2435 		    new_flags |= PR_POLL_WRITE;
2436 		} else { /* handshaking as server */
2437 		    new_flags |= PR_POLL_READ;
2438 		}
2439 	    } else
2440 	    /* First handshake is in progress */
2441 	    if (ss->lastWriteBlocked) {
2442 		if (new_flags & PR_POLL_READ) {
2443 		    /* The caller is waiting for data to be received,
2444 		    ** but the initial handshake is blocked on write, or the
2445 		    ** client's first handshake record has not been written.
2446 		    ** The code should select on write, not read.
2447 		    */
2448 		    new_flags ^=  PR_POLL_READ;	   /* don't select on read. */
2449 		    new_flags |=  PR_POLL_WRITE;   /* do    select on write. */
2450 		}
2451 	    } else if (new_flags & PR_POLL_WRITE) {
2452 		    /* The caller is trying to write, but the handshake is
2453 		    ** blocked waiting for data to read, and the first
2454 		    ** handshake has been sent.  So do NOT to poll on write
2455 		    ** unless we did false start.
2456 		    */
2457 		    if (!(ss->version >= SSL_LIBRARY_VERSION_3_0 &&
2458 			ss->ssl3.hs.canFalseStart)) {
2459 			new_flags ^= PR_POLL_WRITE; /* don't select on write. */
2460 		    }
2461 		    new_flags |= PR_POLL_READ;      /* do    select on read. */
2462 	    }
2463 	}
2464     } else if ((new_flags & PR_POLL_READ) && (SSL_DataPending(fd) > 0)) {
2465 	*p_out_flags = PR_POLL_READ;	/* it's ready already. */
2466 	return new_flags;
2467     } else if ((ss->lastWriteBlocked) && (how_flags & PR_POLL_READ) &&
2468 	       (ss->pendingBuf.len != 0)) { /* write data waiting to be sent */
2469 	new_flags |=  PR_POLL_WRITE;   /* also select on write. */
2470     }
2471 
2472     if (ss->version >= SSL_LIBRARY_VERSION_3_0 &&
2473 	ss->ssl3.hs.restartTarget != NULL) {
2474 	/* Read and write will block until the asynchronous callback completes
2475 	 * (e.g. until SSL_AuthCertificateComplete is called), so don't tell
2476 	 * the caller to poll the socket unless there is pending write data.
2477 	 */
2478 	if (ss->lastWriteBlocked && ss->pendingBuf.len != 0) {
2479 	    /* Ignore any newly-received data on the socket, but do wait for
2480 	     * the socket to become writable again. Here, it is OK for an error
2481 	     * to be detected, because our logic for sending pending write data
2482 	     * will allow us to report the error to the caller without the risk
2483 	     * of the application spinning.
2484 	     */
2485 	    new_flags &= (PR_POLL_WRITE | PR_POLL_EXCEPT);
2486 	} else {
2487 	    /* Unfortunately, clearing new_flags will make it impossible for
2488 	     * the application to detect errors that it would otherwise be
2489 	     * able to detect with PR_POLL_EXCEPT, until the asynchronous
2490 	     * callback completes. However, we must clear all the flags to
2491 	     * prevent the application from spinning (alternating between
2492 	     * calling PR_Poll that would return PR_POLL_EXCEPT, and send/recv
2493 	     * which won't actually report the I/O error while we are waiting
2494 	     * for the asynchronous callback to complete).
2495 	     */
2496 	    new_flags = 0;
2497 	}
2498     }
2499 
2500     if (new_flags && (fd->lower->methods->poll != NULL)) {
2501 	PRInt16    lower_out_flags = 0;
2502 	PRInt16    lower_new_flags;
2503         lower_new_flags = fd->lower->methods->poll(fd->lower, new_flags,
2504 					           &lower_out_flags);
2505 	if ((lower_new_flags & lower_out_flags) && (how_flags != new_flags)) {
2506 	    PRInt16 out_flags = lower_out_flags & ~PR_POLL_RW;
2507 	    if (lower_out_flags & PR_POLL_READ)
2508 		out_flags |= PR_POLL_WRITE;
2509 	    if (lower_out_flags & PR_POLL_WRITE)
2510 		out_flags |= PR_POLL_READ;
2511 	    *p_out_flags = out_flags;
2512 	    new_flags = how_flags;
2513 	} else {
2514 	    *p_out_flags = lower_out_flags;
2515 	    new_flags    = lower_new_flags;
2516 	}
2517     }
2518 
2519     return new_flags;
2520 }
2521 
2522 static PRInt32 PR_CALLBACK
ssl_TransmitFile(PRFileDesc * sd,PRFileDesc * fd,const void * headers,PRInt32 hlen,PRTransmitFileFlags flags,PRIntervalTime timeout)2523 ssl_TransmitFile(PRFileDesc *sd, PRFileDesc *fd,
2524 		 const void *headers, PRInt32 hlen,
2525 		 PRTransmitFileFlags flags, PRIntervalTime timeout)
2526 {
2527     PRSendFileData sfd;
2528 
2529     sfd.fd = fd;
2530     sfd.file_offset = 0;
2531     sfd.file_nbytes = 0;
2532     sfd.header = headers;
2533     sfd.hlen = hlen;
2534     sfd.trailer = NULL;
2535     sfd.tlen = 0;
2536 
2537     return sd->methods->sendfile(sd, &sfd, flags, timeout);
2538 }
2539 
2540 
2541 PRBool
ssl_FdIsBlocking(PRFileDesc * fd)2542 ssl_FdIsBlocking(PRFileDesc *fd)
2543 {
2544     PRSocketOptionData opt;
2545     PRStatus           status;
2546 
2547     opt.option             = PR_SockOpt_Nonblocking;
2548     opt.value.non_blocking = PR_FALSE;
2549     status = PR_GetSocketOption(fd, &opt);
2550     if (status != PR_SUCCESS)
2551 	return PR_FALSE;
2552     return (PRBool)!opt.value.non_blocking;
2553 }
2554 
2555 PRBool
ssl_SocketIsBlocking(sslSocket * ss)2556 ssl_SocketIsBlocking(sslSocket *ss)
2557 {
2558     return ssl_FdIsBlocking(ss->fd);
2559 }
2560 
2561 PRInt32  sslFirstBufSize = 8 * 1024;
2562 PRInt32  sslCopyLimit    = 1024;
2563 
2564 static PRInt32 PR_CALLBACK
ssl_WriteV(PRFileDesc * fd,const PRIOVec * iov,PRInt32 vectors,PRIntervalTime timeout)2565 ssl_WriteV(PRFileDesc *fd, const PRIOVec *iov, PRInt32 vectors,
2566            PRIntervalTime timeout)
2567 {
2568     PRInt32            bufLen;
2569     PRInt32            left;
2570     PRInt32            rv;
2571     PRInt32            sent      =  0;
2572     const PRInt32      first_len = sslFirstBufSize;
2573     const PRInt32      limit     = sslCopyLimit;
2574     PRBool             blocking;
2575     PRIOVec            myIov	 = { 0, 0 };
2576     char               buf[MAX_FRAGMENT_LENGTH];
2577 
2578     if (vectors > PR_MAX_IOVECTOR_SIZE) {
2579     	PORT_SetError(PR_BUFFER_OVERFLOW_ERROR);
2580 	return -1;
2581     }
2582     blocking = ssl_FdIsBlocking(fd);
2583 
2584 #define K16 sizeof(buf)
2585 #define KILL_VECTORS while (vectors && !iov->iov_len) { ++iov; --vectors; }
2586 #define GET_VECTOR   do { myIov = *iov++; --vectors; KILL_VECTORS } while (0)
2587 #define HANDLE_ERR(rv, len) \
2588     if (rv != len) { \
2589 	if (rv < 0) { \
2590 	    if (!blocking \
2591 		&& (PR_GetError() == PR_WOULD_BLOCK_ERROR) \
2592 		&& (sent > 0)) { \
2593 		return sent; \
2594 	    } else { \
2595 		return -1; \
2596 	    } \
2597 	} \
2598 	/* Only a nonblocking socket can have partial sends */ \
2599 	PR_ASSERT(!blocking); \
2600 	return sent + rv; \
2601     }
2602 #define SEND(bfr, len) \
2603     do { \
2604 	rv = ssl_Send(fd, bfr, len, 0, timeout); \
2605 	HANDLE_ERR(rv, len) \
2606 	sent += len; \
2607     } while (0)
2608 
2609     /* Make sure the first write is at least 8 KB, if possible. */
2610     KILL_VECTORS
2611     if (!vectors)
2612 	return ssl_Send(fd, 0, 0, 0, timeout);
2613     GET_VECTOR;
2614     if (!vectors) {
2615 	return ssl_Send(fd, myIov.iov_base, myIov.iov_len, 0, timeout);
2616     }
2617     if (myIov.iov_len < first_len) {
2618 	PORT_Memcpy(buf, myIov.iov_base, myIov.iov_len);
2619 	bufLen = myIov.iov_len;
2620 	left = first_len - bufLen;
2621 	while (vectors && left) {
2622 	    int toCopy;
2623 	    GET_VECTOR;
2624 	    toCopy = PR_MIN(left, myIov.iov_len);
2625 	    PORT_Memcpy(buf + bufLen, myIov.iov_base, toCopy);
2626 	    bufLen         += toCopy;
2627 	    left           -= toCopy;
2628 	    myIov.iov_base += toCopy;
2629 	    myIov.iov_len  -= toCopy;
2630 	}
2631 	SEND( buf, bufLen );
2632     }
2633 
2634     while (vectors || myIov.iov_len) {
2635 	PRInt32   addLen;
2636 	if (!myIov.iov_len) {
2637 	    GET_VECTOR;
2638 	}
2639 	while (myIov.iov_len >= K16) {
2640 	    SEND(myIov.iov_base, K16);
2641 	    myIov.iov_base += K16;
2642 	    myIov.iov_len  -= K16;
2643 	}
2644 	if (!myIov.iov_len)
2645 	    continue;
2646 
2647 	if (!vectors || myIov.iov_len > limit) {
2648 	    addLen = 0;
2649 	} else if ((addLen = iov->iov_len % K16) + myIov.iov_len <= limit) {
2650 	    /* Addlen is already computed. */;
2651 	} else if (vectors > 1 &&
2652 	     iov[1].iov_len % K16 + addLen + myIov.iov_len <= 2 * limit) {
2653 	     addLen = limit - myIov.iov_len;
2654 	} else
2655 	    addLen = 0;
2656 
2657 	if (!addLen) {
2658 	    SEND( myIov.iov_base, myIov.iov_len );
2659 	    myIov.iov_len = 0;
2660 	    continue;
2661 	}
2662 	PORT_Memcpy(buf, myIov.iov_base, myIov.iov_len);
2663 	bufLen = myIov.iov_len;
2664 	do {
2665 	    GET_VECTOR;
2666 	    PORT_Memcpy(buf + bufLen, myIov.iov_base, addLen);
2667 	    myIov.iov_base += addLen;
2668 	    myIov.iov_len  -= addLen;
2669 	    bufLen         += addLen;
2670 
2671 	    left = PR_MIN( limit, K16 - bufLen);
2672 	    if (!vectors 		/* no more left */
2673 	    ||  myIov.iov_len > 0	/* we didn't use that one all up */
2674 	    ||  bufLen >= K16		/* it's full. */
2675 	    ) {
2676 		addLen = 0;
2677 	    } else if ((addLen = iov->iov_len % K16) <= left) {
2678 		/* Addlen is already computed. */;
2679 	    } else if (vectors > 1 &&
2680 		 iov[1].iov_len % K16 + addLen <= left + limit) {
2681 		 addLen = left;
2682 	    } else
2683 		addLen = 0;
2684 
2685 	} while (addLen);
2686 	SEND( buf, bufLen );
2687     }
2688     return sent;
2689 }
2690 
2691 /*
2692  * These functions aren't implemented.
2693  */
2694 
2695 static PRInt32 PR_CALLBACK
ssl_Available(PRFileDesc * fd)2696 ssl_Available(PRFileDesc *fd)
2697 {
2698     PORT_Assert(0);
2699     PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0);
2700     return SECFailure;
2701 }
2702 
2703 static PRInt64 PR_CALLBACK
ssl_Available64(PRFileDesc * fd)2704 ssl_Available64(PRFileDesc *fd)
2705 {
2706     PRInt64 res;
2707 
2708     PORT_Assert(0);
2709     PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0);
2710     LL_I2L(res, -1L);
2711     return res;
2712 }
2713 
2714 static PRStatus PR_CALLBACK
ssl_FSync(PRFileDesc * fd)2715 ssl_FSync(PRFileDesc *fd)
2716 {
2717     PORT_Assert(0);
2718     PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0);
2719     return PR_FAILURE;
2720 }
2721 
2722 static PRInt32 PR_CALLBACK
ssl_Seek(PRFileDesc * fd,PRInt32 offset,PRSeekWhence how)2723 ssl_Seek(PRFileDesc *fd, PRInt32 offset, PRSeekWhence how) {
2724     PORT_Assert(0);
2725     PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0);
2726     return SECFailure;
2727 }
2728 
2729 static PRInt64 PR_CALLBACK
ssl_Seek64(PRFileDesc * fd,PRInt64 offset,PRSeekWhence how)2730 ssl_Seek64(PRFileDesc *fd, PRInt64 offset, PRSeekWhence how) {
2731     PRInt64 res;
2732 
2733     PORT_Assert(0);
2734     PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0);
2735     LL_I2L(res, -1L);
2736     return res;
2737 }
2738 
2739 static PRStatus PR_CALLBACK
ssl_FileInfo(PRFileDesc * fd,PRFileInfo * info)2740 ssl_FileInfo(PRFileDesc *fd, PRFileInfo *info)
2741 {
2742     PORT_Assert(0);
2743     PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0);
2744     return PR_FAILURE;
2745 }
2746 
2747 static PRStatus PR_CALLBACK
ssl_FileInfo64(PRFileDesc * fd,PRFileInfo64 * info)2748 ssl_FileInfo64(PRFileDesc *fd, PRFileInfo64 *info)
2749 {
2750     PORT_Assert(0);
2751     PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0);
2752     return PR_FAILURE;
2753 }
2754 
2755 static PRInt32 PR_CALLBACK
ssl_RecvFrom(PRFileDesc * fd,void * buf,PRInt32 amount,PRIntn flags,PRNetAddr * addr,PRIntervalTime timeout)2756 ssl_RecvFrom(PRFileDesc *fd, void *buf, PRInt32 amount, PRIntn flags,
2757 	     PRNetAddr *addr, PRIntervalTime timeout)
2758 {
2759     PORT_Assert(0);
2760     PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0);
2761     return SECFailure;
2762 }
2763 
2764 static PRInt32 PR_CALLBACK
ssl_SendTo(PRFileDesc * fd,const void * buf,PRInt32 amount,PRIntn flags,const PRNetAddr * addr,PRIntervalTime timeout)2765 ssl_SendTo(PRFileDesc *fd, const void *buf, PRInt32 amount, PRIntn flags,
2766 	   const PRNetAddr *addr, PRIntervalTime timeout)
2767 {
2768     PORT_Assert(0);
2769     PR_SetError(PR_NOT_IMPLEMENTED_ERROR, 0);
2770     return SECFailure;
2771 }
2772 
2773 static const PRIOMethods ssl_methods = {
2774     PR_DESC_LAYERED,
2775     ssl_Close,           	/* close        */
2776     ssl_Read,            	/* read         */
2777     ssl_Write,           	/* write        */
2778     ssl_Available,       	/* available    */
2779     ssl_Available64,     	/* available64  */
2780     ssl_FSync,           	/* fsync        */
2781     ssl_Seek,            	/* seek         */
2782     ssl_Seek64,          	/* seek64       */
2783     ssl_FileInfo,        	/* fileInfo     */
2784     ssl_FileInfo64,      	/* fileInfo64   */
2785     ssl_WriteV,          	/* writev       */
2786     ssl_Connect,         	/* connect      */
2787     ssl_Accept,          	/* accept       */
2788     ssl_Bind,            	/* bind         */
2789     ssl_Listen,          	/* listen       */
2790     ssl_Shutdown,        	/* shutdown     */
2791     ssl_Recv,            	/* recv         */
2792     ssl_Send,            	/* send         */
2793     ssl_RecvFrom,        	/* recvfrom     */
2794     ssl_SendTo,          	/* sendto       */
2795     ssl_Poll,            	/* poll         */
2796     PR_EmulateAcceptRead,       /* acceptread   */
2797     ssl_TransmitFile,           /* transmitfile */
2798     ssl_GetSockName,     	/* getsockname  */
2799     ssl_GetPeerName,     	/* getpeername  */
2800     NULL,                	/* getsockopt   OBSOLETE */
2801     NULL,                	/* setsockopt   OBSOLETE */
2802     NULL,                	/* getsocketoption   */
2803     NULL,                	/* setsocketoption   */
2804     PR_EmulateSendFile, 	/* Send a (partial) file with header/trailer*/
2805     NULL,                	/* reserved for future use */
2806     NULL,                	/* reserved for future use */
2807     NULL,                	/* reserved for future use */
2808     NULL,                	/* reserved for future use */
2809     NULL                 	/* reserved for future use */
2810 };
2811 
2812 
2813 static PRIOMethods combined_methods;
2814 
2815 static void
ssl_SetupIOMethods(void)2816 ssl_SetupIOMethods(void)
2817 {
2818           PRIOMethods *new_methods  = &combined_methods;
2819     const PRIOMethods *nspr_methods = PR_GetDefaultIOMethods();
2820     const PRIOMethods *my_methods   = &ssl_methods;
2821 
2822     *new_methods = *nspr_methods;
2823 
2824     new_methods->file_type         = my_methods->file_type;
2825     new_methods->close             = my_methods->close;
2826     new_methods->read              = my_methods->read;
2827     new_methods->write             = my_methods->write;
2828     new_methods->available         = my_methods->available;
2829     new_methods->available64       = my_methods->available64;
2830     new_methods->fsync             = my_methods->fsync;
2831     new_methods->seek              = my_methods->seek;
2832     new_methods->seek64            = my_methods->seek64;
2833     new_methods->fileInfo          = my_methods->fileInfo;
2834     new_methods->fileInfo64        = my_methods->fileInfo64;
2835     new_methods->writev            = my_methods->writev;
2836     new_methods->connect           = my_methods->connect;
2837     new_methods->accept            = my_methods->accept;
2838     new_methods->bind              = my_methods->bind;
2839     new_methods->listen            = my_methods->listen;
2840     new_methods->shutdown          = my_methods->shutdown;
2841     new_methods->recv              = my_methods->recv;
2842     new_methods->send              = my_methods->send;
2843     new_methods->recvfrom          = my_methods->recvfrom;
2844     new_methods->sendto            = my_methods->sendto;
2845     new_methods->poll              = my_methods->poll;
2846     new_methods->acceptread        = my_methods->acceptread;
2847     new_methods->transmitfile      = my_methods->transmitfile;
2848     new_methods->getsockname       = my_methods->getsockname;
2849     new_methods->getpeername       = my_methods->getpeername;
2850 /*  new_methods->getsocketoption   = my_methods->getsocketoption;	*/
2851 /*  new_methods->setsocketoption   = my_methods->setsocketoption;	*/
2852     new_methods->sendfile          = my_methods->sendfile;
2853 
2854 }
2855 
2856 static PRCallOnceType initIoLayerOnce;
2857 
2858 static PRStatus
ssl_InitIOLayer(void)2859 ssl_InitIOLayer(void)
2860 {
2861     ssl_layer_id = PR_GetUniqueIdentity("SSL");
2862     ssl_SetupIOMethods();
2863     ssl_inited = PR_TRUE;
2864     return PR_SUCCESS;
2865 }
2866 
2867 static PRStatus
ssl_PushIOLayer(sslSocket * ns,PRFileDesc * stack,PRDescIdentity id)2868 ssl_PushIOLayer(sslSocket *ns, PRFileDesc *stack, PRDescIdentity id)
2869 {
2870     PRFileDesc *layer	= NULL;
2871     PRStatus    status;
2872 
2873     if (!ssl_inited) {
2874 	status = PR_CallOnce(&initIoLayerOnce, &ssl_InitIOLayer);
2875 	if (status != PR_SUCCESS)
2876 	    goto loser;
2877     }
2878 
2879     if (ns == NULL)
2880 	goto loser;
2881 
2882     layer = PR_CreateIOLayerStub(ssl_layer_id, &combined_methods);
2883     if (layer == NULL)
2884 	goto loser;
2885     layer->secret = (PRFilePrivate *)ns;
2886 
2887     /* Here, "stack" points to the PRFileDesc on the top of the stack.
2888     ** "layer" points to a new FD that is to be inserted into the stack.
2889     ** If layer is being pushed onto the top of the stack, then
2890     ** PR_PushIOLayer switches the contents of stack and layer, and then
2891     ** puts stack on top of layer, so that after it is done, the top of
2892     ** stack is the same "stack" as it was before, and layer is now the
2893     ** FD for the former top of stack.
2894     ** After this call, stack always points to the top PRFD on the stack.
2895     ** If this function fails, the contents of stack and layer are as
2896     ** they were before the call.
2897     */
2898     status = PR_PushIOLayer(stack, id, layer);
2899     if (status != PR_SUCCESS)
2900 	goto loser;
2901 
2902     ns->fd = (id == PR_TOP_IO_LAYER) ? stack : layer;
2903     return PR_SUCCESS;
2904 
2905 loser:
2906     if (layer) {
2907 	layer->dtor(layer); /* free layer */
2908     }
2909     return PR_FAILURE;
2910 }
2911 
2912 /* if this fails, caller must destroy socket. */
2913 static SECStatus
ssl_MakeLocks(sslSocket * ss)2914 ssl_MakeLocks(sslSocket *ss)
2915 {
2916     ss->firstHandshakeLock = PZ_NewMonitor(nssILockSSL);
2917     if (!ss->firstHandshakeLock)
2918 	goto loser;
2919     ss->ssl3HandshakeLock  = PZ_NewMonitor(nssILockSSL);
2920     if (!ss->ssl3HandshakeLock)
2921 	goto loser;
2922     ss->specLock           = NSSRWLock_New(SSL_LOCK_RANK_SPEC, NULL);
2923     if (!ss->specLock)
2924 	goto loser;
2925     ss->recvBufLock        = PZ_NewMonitor(nssILockSSL);
2926     if (!ss->recvBufLock)
2927 	goto loser;
2928     ss->xmitBufLock        = PZ_NewMonitor(nssILockSSL);
2929     if (!ss->xmitBufLock)
2930 	goto loser;
2931     ss->writerThread       = NULL;
2932     if (ssl_lock_readers) {
2933 	ss->recvLock       = PZ_NewLock(nssILockSSL);
2934 	if (!ss->recvLock)
2935 	    goto loser;
2936 	ss->sendLock       = PZ_NewLock(nssILockSSL);
2937 	if (!ss->sendLock)
2938 	    goto loser;
2939     }
2940     return SECSuccess;
2941 loser:
2942     ssl_DestroyLocks(ss);
2943     return SECFailure;
2944 }
2945 
2946 #if defined(XP_UNIX) || defined(XP_WIN32) || defined(XP_BEOS)
2947 #define NSS_HAVE_GETENV 1
2948 #endif
2949 
2950 #define LOWER(x) (x | 0x20)  /* cheap ToLower function ignores LOCALE */
2951 
2952 static void
ssl_SetDefaultsFromEnvironment(void)2953 ssl_SetDefaultsFromEnvironment(void)
2954 {
2955 #if defined( NSS_HAVE_GETENV )
2956     static int firsttime = 1;
2957 
2958     if (firsttime) {
2959 	char * ev;
2960 	firsttime = 0;
2961 #ifdef DEBUG
2962 	ev = getenv("SSLDEBUGFILE");
2963 	if (ev && ev[0]) {
2964 	    ssl_trace_iob = fopen(ev, "w");
2965 	}
2966 	if (!ssl_trace_iob) {
2967 	    ssl_trace_iob = stderr;
2968 	}
2969 #ifdef TRACE
2970 	ev = getenv("SSLTRACE");
2971 	if (ev && ev[0]) {
2972 	    ssl_trace = atoi(ev);
2973 	    SSL_TRACE(("SSL: tracing set to %d", ssl_trace));
2974 	}
2975 #endif /* TRACE */
2976 	ev = getenv("SSLDEBUG");
2977 	if (ev && ev[0]) {
2978 	    ssl_debug = atoi(ev);
2979 	    SSL_TRACE(("SSL: debugging set to %d", ssl_debug));
2980 	}
2981 #endif /* DEBUG */
2982 	ev = getenv("SSLKEYLOGFILE");
2983 	if (ev && ev[0]) {
2984 	    ssl_keylog_iob = fopen(ev, "a");
2985 	    if (!ssl_keylog_iob) {
2986 		SSL_TRACE(("SSL: failed to open key log file"));
2987 	    } else {
2988 		if (ftell(ssl_keylog_iob) == 0) {
2989 		    fputs("# SSL/TLS secrets log file, generated by NSS\n",
2990 			  ssl_keylog_iob);
2991 		}
2992 		SSL_TRACE(("SSL: logging SSL/TLS secrets to %s", ev));
2993 	    }
2994 	}
2995 #ifndef NO_PKCS11_BYPASS
2996 	ev = getenv("SSLBYPASS");
2997 	if (ev && ev[0]) {
2998 	    ssl_defaults.bypassPKCS11 = (ev[0] == '1');
2999 	    SSL_TRACE(("SSL: bypass default set to %d", \
3000 		      ssl_defaults.bypassPKCS11));
3001 	}
3002 #endif /* NO_PKCS11_BYPASS */
3003 	ev = getenv("SSLFORCELOCKS");
3004 	if (ev && ev[0] == '1') {
3005 	    ssl_force_locks = PR_TRUE;
3006 	    ssl_defaults.noLocks = 0;
3007 	    strcpy(lockStatus + LOCKSTATUS_OFFSET, "FORCED.  ");
3008 	    SSL_TRACE(("SSL: force_locks set to %d", ssl_force_locks));
3009 	}
3010 	ev = getenv("NSS_SSL_ENABLE_RENEGOTIATION");
3011 	if (ev) {
3012 	    if (ev[0] == '1' || LOWER(ev[0]) == 'u')
3013 	    	ssl_defaults.enableRenegotiation = SSL_RENEGOTIATE_UNRESTRICTED;
3014 	    else if (ev[0] == '0' || LOWER(ev[0]) == 'n')
3015 	    	ssl_defaults.enableRenegotiation = SSL_RENEGOTIATE_NEVER;
3016 	    else if (ev[0] == '2' || LOWER(ev[0]) == 'r')
3017 		ssl_defaults.enableRenegotiation = SSL_RENEGOTIATE_REQUIRES_XTN;
3018 	    else if (ev[0] == '3' || LOWER(ev[0]) == 't')
3019 	    	ssl_defaults.enableRenegotiation = SSL_RENEGOTIATE_TRANSITIONAL;
3020 	    SSL_TRACE(("SSL: enableRenegotiation set to %d",
3021 	               ssl_defaults.enableRenegotiation));
3022 	}
3023 	ev = getenv("NSS_SSL_REQUIRE_SAFE_NEGOTIATION");
3024 	if (ev && ev[0] == '1') {
3025 	    ssl_defaults.requireSafeNegotiation = PR_TRUE;
3026 	    SSL_TRACE(("SSL: requireSafeNegotiation set to %d",
3027 	                PR_TRUE));
3028 	}
3029 	ev = getenv("NSS_SSL_CBC_RANDOM_IV");
3030 	if (ev && ev[0] == '0') {
3031 	    ssl_defaults.cbcRandomIV = PR_FALSE;
3032 	    SSL_TRACE(("SSL: cbcRandomIV set to 0"));
3033 	}
3034     }
3035 #endif /* NSS_HAVE_GETENV */
3036 }
3037 
3038 /*
3039 ** Create a newsocket structure for a file descriptor.
3040 */
3041 static sslSocket *
ssl_NewSocket(PRBool makeLocks,SSLProtocolVariant protocolVariant)3042 ssl_NewSocket(PRBool makeLocks, SSLProtocolVariant protocolVariant)
3043 {
3044     sslSocket *ss;
3045 
3046     ssl_SetDefaultsFromEnvironment();
3047 
3048     if (ssl_force_locks)
3049 	makeLocks = PR_TRUE;
3050 
3051     /* Make a new socket and get it ready */
3052     ss = (sslSocket*) PORT_ZAlloc(sizeof(sslSocket));
3053     if (ss) {
3054         /* This should be of type SSLKEAType, but CC on IRIX
3055 	 * complains during the for loop.
3056 	 */
3057 	int i;
3058 	SECStatus status;
3059 
3060 	ss->opt                = ssl_defaults;
3061 	ss->opt.useSocks       = PR_FALSE;
3062 	ss->opt.noLocks        = !makeLocks;
3063 	ss->vrange             = *VERSIONS_DEFAULTS(protocolVariant);
3064 	ss->protocolVariant    = protocolVariant;
3065 
3066 	ss->peerID             = NULL;
3067 	ss->rTimeout	       = PR_INTERVAL_NO_TIMEOUT;
3068 	ss->wTimeout	       = PR_INTERVAL_NO_TIMEOUT;
3069 	ss->cTimeout	       = PR_INTERVAL_NO_TIMEOUT;
3070 	ss->cipherSpecs        = NULL;
3071         ss->sizeCipherSpecs    = 0;  /* produced lazily */
3072         ss->preferredCipher    = NULL;
3073         ss->url                = NULL;
3074 
3075 	for (i=kt_null; i < kt_kea_size; i++) {
3076 	    sslServerCerts * sc = ss->serverCerts + i;
3077 	    sc->serverCert      = NULL;
3078 	    sc->serverCertChain = NULL;
3079 	    sc->serverKeyPair   = NULL;
3080 	    sc->serverKeyBits   = 0;
3081 	    ss->certStatusArray[i] = NULL;
3082 	}
3083 	ss->requestedCertTypes = NULL;
3084 	ss->stepDownKeyPair    = NULL;
3085 	ss->dbHandle           = CERT_GetDefaultCertDB();
3086 
3087 	/* Provide default implementation of hooks */
3088 	ss->authCertificate    = SSL_AuthCertificate;
3089 	ss->authCertificateArg = (void *)ss->dbHandle;
3090         ss->sniSocketConfig    = NULL;
3091         ss->sniSocketConfigArg = NULL;
3092 	ss->getClientAuthData  = NULL;
3093 #ifdef NSS_PLATFORM_CLIENT_AUTH
3094 	ss->getPlatformClientAuthData = NULL;
3095 	ss->getPlatformClientAuthDataArg = NULL;
3096 #endif   /* NSS_PLATFORM_CLIENT_AUTH */
3097 	ss->handleBadCert      = NULL;
3098 	ss->badCertArg         = NULL;
3099 	ss->pkcs11PinArg       = NULL;
3100 	ss->ephemeralECDHKeyPair = NULL;
3101 	ss->getChannelID       = NULL;
3102 	ss->getChannelIDArg    = NULL;
3103 
3104 	ssl_ChooseOps(ss);
3105 	ssl2_InitSocketPolicy(ss);
3106 	ssl3_InitSocketPolicy(ss);
3107 	PR_INIT_CLIST(&ss->ssl3.hs.lastMessageFlight);
3108 
3109 	if (makeLocks) {
3110 	    status = ssl_MakeLocks(ss);
3111 	    if (status != SECSuccess)
3112 		goto loser;
3113 	}
3114 	status = ssl_CreateSecurityInfo(ss);
3115 	if (status != SECSuccess)
3116 	    goto loser;
3117 	status = ssl_InitGather(&ss->gs);
3118 	if (status != SECSuccess) {
3119 loser:
3120 	    ssl_DestroySocketContents(ss);
3121 	    ssl_DestroyLocks(ss);
3122 	    PORT_Free(ss);
3123 	    ss = NULL;
3124 	}
3125     }
3126     return ss;
3127 }
3128 
3129