1 2 /* 3 * Copyright (C) Igor Sysoev 4 * Copyright (C) NGINX, Inc. 5 */ 6 7 #include <nxt_main.h> 8 #include <openssl/ssl.h> 9 #include <openssl/conf.h> 10 #include <openssl/err.h> 11 12 13 typedef struct { 14 SSL *session; 15 nxt_conn_t *conn; 16 17 int ssl_error; 18 uint8_t times; /* 2 bits */ 19 uint8_t handshake; /* 1 bit */ 20 21 nxt_buf_mem_t buffer; 22 } nxt_openssl_conn_t; 23 24 25 typedef enum { 26 NXT_OPENSSL_HANDSHAKE = 0, 27 NXT_OPENSSL_READ, 28 NXT_OPENSSL_WRITE, 29 NXT_OPENSSL_SHUTDOWN, 30 } nxt_openssl_io_t; 31 32 33 static nxt_int_t nxt_openssl_library_init(nxt_task_t *task); 34 static void nxt_openssl_library_free(nxt_task_t *task); 35 #if OPENSSL_VERSION_NUMBER < 0x10100004L 36 static nxt_int_t nxt_openssl_locks_init(void); 37 static void nxt_openssl_lock(int mode, int type, const char *file, int line); 38 static unsigned long nxt_openssl_thread_id(void); 39 static void nxt_openssl_locks_free(void); 40 #endif 41 static nxt_int_t nxt_openssl_server_init(nxt_task_t *task, 42 nxt_tls_conf_t *conf); 43 static nxt_int_t nxt_openssl_chain_file(SSL_CTX *ctx, nxt_fd_t fd); 44 static void nxt_openssl_server_free(nxt_task_t *task, nxt_tls_conf_t *conf); 45 static void nxt_openssl_conn_init(nxt_task_t *task, nxt_tls_conf_t *conf, 46 nxt_conn_t *c); 47 static void nxt_openssl_conn_handshake(nxt_task_t *task, void *obj, void *data); 48 static ssize_t nxt_openssl_conn_io_recvbuf(nxt_conn_t *c, nxt_buf_t *b); 49 static ssize_t nxt_openssl_conn_io_sendbuf(nxt_task_t *task, nxt_sendbuf_t *sb); 50 static ssize_t nxt_openssl_conn_io_send(nxt_task_t *task, nxt_sendbuf_t *sb, 51 void *buf, size_t size); 52 static void nxt_openssl_conn_io_shutdown(nxt_task_t *task, void *obj, 53 void *data); 54 static nxt_int_t nxt_openssl_conn_test_error(nxt_task_t *task, nxt_conn_t *c, 55 int ret, nxt_err_t sys_err, nxt_openssl_io_t io); 56 static void nxt_cdecl nxt_openssl_conn_error(nxt_task_t *task, 57 nxt_err_t err, const char *fmt, ...); 58 static nxt_uint_t nxt_openssl_log_error_level(nxt_err_t err); 59 60 61 const nxt_tls_lib_t nxt_openssl_lib = { 62 .library_init = nxt_openssl_library_init, 63 .library_free = nxt_openssl_library_free, 64 65 .server_init = nxt_openssl_server_init, 66 .server_free = nxt_openssl_server_free, 67 }; 68 69 70 static nxt_conn_io_t nxt_openssl_conn_io = { 71 .read = nxt_conn_io_read, 72 .recvbuf = nxt_openssl_conn_io_recvbuf, 73 74 .write = nxt_conn_io_write, 75 .sendbuf = nxt_openssl_conn_io_sendbuf, 76 77 .shutdown = nxt_openssl_conn_io_shutdown, 78 }; 79 80 81 static long nxt_openssl_version; 82 static int nxt_openssl_connection_index; 83 84 85 static nxt_int_t 86 nxt_openssl_library_init(nxt_task_t *task) 87 { 88 int index; 89 90 if (nxt_fast_path(nxt_openssl_version != 0)) { 91 return NXT_OK; 92 } 93 94 #if OPENSSL_VERSION_NUMBER >= 0x10100003L 95 96 OPENSSL_init_ssl(OPENSSL_INIT_LOAD_CONFIG, NULL); 97 98 #else 99 { 100 nxt_int_t ret; 101 102 SSL_load_error_strings(); 103 104 OPENSSL_config(NULL); 105 106 /* 107 * SSL_library_init(3): 108 * 109 * SSL_library_init() always returns "1", 110 * so it is safe to discard the return value. 111 */ 112 (void) SSL_library_init(); 113 114 ret = nxt_openssl_locks_init(); 115 if (nxt_slow_path(ret != NXT_OK)) { 116 return ret; 117 } 118 } 119 120 #endif 121 122 nxt_openssl_version = SSLeay(); 123 124 nxt_log(task, NXT_LOG_INFO, "%s, %xl", 125 SSLeay_version(SSLEAY_VERSION), nxt_openssl_version); 126 127 #ifndef SSL_OP_NO_COMPRESSION 128 { 129 /* 130 * Disable gzip compression in OpenSSL prior to 1.0.0 131 * version, this saves about 522K per connection. 132 */ 133 int n; 134 STACK_OF(SSL_COMP) *ssl_comp_methods; 135 136 ssl_comp_methods = SSL_COMP_get_compression_methods(); 137 138 for (n = sk_SSL_COMP_num(ssl_comp_methods); n != 0; n--) { 139 (void) sk_SSL_COMP_pop(ssl_comp_methods); 140 } 141 } 142 #endif 143 144 index = SSL_get_ex_new_index(0, NULL, NULL, NULL, NULL); 145 146 if (index == -1) { 147 nxt_openssl_log_error(task, NXT_LOG_ALERT, 148 "SSL_get_ex_new_index() failed"); 149 return NXT_ERROR; 150 } 151 152 nxt_openssl_connection_index = index; 153 154 return NXT_OK; 155 } 156 157 158 #if OPENSSL_VERSION_NUMBER >= 0x10100003L 159 160 static void 161 nxt_openssl_library_free(nxt_task_t *task) 162 { 163 } 164 165 #else 166 167 static nxt_thread_mutex_t *nxt_openssl_locks; 168 169 static nxt_int_t 170 nxt_openssl_locks_init(void) 171 { 172 int i, n; 173 nxt_int_t ret; 174 175 n = CRYPTO_num_locks(); 176 177 nxt_openssl_locks = OPENSSL_malloc(n * sizeof(nxt_thread_mutex_t)); 178 if (nxt_slow_path(nxt_openssl_locks == NULL)) { 179 return NXT_ERROR; 180 } 181 182 for (i = 0; i < n; i++) { 183 ret = nxt_thread_mutex_create(&nxt_openssl_locks[i]); 184 if (nxt_slow_path(ret != NXT_OK)) { 185 return ret; 186 } 187 } 188 189 CRYPTO_set_locking_callback(nxt_openssl_lock); 190 191 CRYPTO_set_id_callback(nxt_openssl_thread_id); 192 193 return NXT_OK; 194 } 195 196 197 static void 198 nxt_openssl_lock(int mode, int type, const char *file, int line) 199 { 200 nxt_thread_mutex_t *lock; 201 202 lock = &nxt_openssl_locks[type]; 203 204 if ((mode & CRYPTO_LOCK) != 0) { 205 (void) nxt_thread_mutex_lock(lock); 206 207 } else { 208 (void) nxt_thread_mutex_unlock(lock); 209 } 210 } 211 212 213 static u_long 214 nxt_openssl_thread_id(void) 215 { 216 return (u_long) nxt_thread_handle(); 217 } 218 219 220 static void 221 nxt_openssl_library_free(nxt_task_t *task) 222 { 223 nxt_openssl_locks_free(); 224 } 225 226 227 static void 228 nxt_openssl_locks_free(void) 229 { 230 int i, n; 231 232 n = CRYPTO_num_locks(); 233 234 CRYPTO_set_locking_callback(NULL); 235 236 for (i = 0; i < n; i++) { 237 nxt_thread_mutex_destroy(&nxt_openssl_locks[i]); 238 } 239 240 OPENSSL_free(nxt_openssl_locks); 241 } 242 243 #endif 244 245 246 static nxt_int_t 247 nxt_openssl_server_init(nxt_task_t *task, nxt_tls_conf_t *conf) 248 { 249 SSL_CTX *ctx; 250 nxt_fd_t fd; 251 const char *ciphers, *ca_certificate; 252 STACK_OF(X509_NAME) *list; 253 254 ctx = SSL_CTX_new(SSLv23_server_method()); 255 if (ctx == NULL) { 256 nxt_openssl_log_error(task, NXT_LOG_ALERT, "SSL_CTX_new() failed"); 257 return NXT_ERROR; 258 } 259 260 conf->ctx = ctx; 261 conf->conn_init = nxt_openssl_conn_init; 262 263 #ifdef SSL_OP_NO_RENEGOTIATION 264 /* Renegration is not currently supported. */ 265 SSL_CTX_set_options(ctx, SSL_OP_NO_RENEGOTIATION); 266 #endif 267 268 #ifdef SSL_OP_NO_COMPRESSION 269 /* 270 * Disable gzip compression in OpenSSL 1.0.0, 271 * this saves about 522K per connection. 272 */ 273 SSL_CTX_set_options(ctx, SSL_OP_NO_COMPRESSION); 274 #endif 275 276 #ifdef SSL_MODE_RELEASE_BUFFERS 277 278 if (nxt_openssl_version >= 10001078) { 279 /* 280 * Allow to release read and write buffers in OpenSSL 1.0.0, 281 * this saves about 34K per idle connection. It is not safe 282 * before OpenSSL 1.0.1h (CVE-2010-5298). 283 */ 284 SSL_CTX_set_mode(ctx, SSL_MODE_RELEASE_BUFFERS); 285 } 286 287 #endif 288 289 fd = conf->chain_file; 290 291 if (nxt_openssl_chain_file(ctx, fd) != NXT_OK) { 292 nxt_openssl_log_error(task, NXT_LOG_ALERT, 293 "nxt_openssl_chain_file() failed"); 294 goto fail; 295 } 296 /* 297 key = conf->certificate_key; 298 299 if (SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM) == 0) { 300 nxt_openssl_log_error(task, NXT_LOG_ALERT, 301 "SSL_CTX_use_PrivateKey_file(\"%s\") failed", 302 key); 303 goto fail; 304 } 305 */ 306 ciphers = (conf->ciphers != NULL) ? conf->ciphers : "HIGH:!aNULL:!MD5"; 307 308 if (SSL_CTX_set_cipher_list(ctx, ciphers) == 0) { 309 nxt_openssl_log_error(task, NXT_LOG_ALERT, 310 "SSL_CTX_set_cipher_list(\"%s\") failed", 311 ciphers); 312 goto fail; 313 } 314 315 SSL_CTX_set_options(ctx, SSL_OP_CIPHER_SERVER_PREFERENCE); 316 317 if (conf->ca_certificate != NULL) { 318 319 /* TODO: verify callback */ 320 SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, NULL); 321 322 /* TODO: verify depth */ 323 SSL_CTX_set_verify_depth(ctx, 1); 324 325 ca_certificate = conf->ca_certificate; 326 327 if (SSL_CTX_load_verify_locations(ctx, ca_certificate, NULL) == 0) { 328 nxt_openssl_log_error(task, NXT_LOG_ALERT, 329 "SSL_CTX_load_verify_locations(\"%s\") failed", 330 ca_certificate); 331 goto fail; 332 } 333 334 list = SSL_load_client_CA_file(ca_certificate); 335 336 if (list == NULL) { 337 nxt_openssl_log_error(task, NXT_LOG_ALERT, 338 "SSL_load_client_CA_file(\"%s\") failed", 339 ca_certificate); 340 goto fail; 341 } 342 343 /* 344 * SSL_load_client_CA_file() in OpenSSL prior to 0.9.7h and 345 * 0.9.8 versions always leaves an error in the error queue. 346 */ 347 ERR_clear_error(); 348 349 SSL_CTX_set_client_CA_list(ctx, list); 350 } 351 352 return NXT_OK; 353 354 fail: 355 356 SSL_CTX_free(ctx); 357 358 return NXT_ERROR; 359 } 360 361 362 static nxt_int_t 363 nxt_openssl_chain_file(SSL_CTX *ctx, nxt_fd_t fd) 364 { 365 BIO *bio; 366 X509 *cert, *ca; 367 long reason; 368 EVP_PKEY *key; 369 nxt_int_t ret; 370 371 bio = BIO_new(BIO_s_fd()); 372 if (bio == NULL) { 373 return NXT_ERROR; 374 } 375 376 BIO_set_fd(bio, fd, BIO_CLOSE); 377 378 ret = NXT_ERROR; 379 380 cert = PEM_read_bio_X509_AUX(bio, NULL, NULL, NULL); 381 if (cert == NULL) { 382 goto end; 383 } 384 385 if (SSL_CTX_use_certificate(ctx, cert) != 1) { 386 goto end; 387 } 388 389 for ( ;; ) { 390 ca = PEM_read_bio_X509(bio, NULL, NULL, NULL); 391 392 if (ca == NULL) { 393 reason = ERR_GET_REASON(ERR_peek_last_error()); 394 if (reason != PEM_R_NO_START_LINE) { 395 goto end; 396 } 397 398 ERR_clear_error(); 399 break; 400 } 401 402 /* 403 * Note that ca isn't freed if it was successfully added to the chain, 404 * while the main certificate needs a X509_free() call, since 405 * its reference count is increased by SSL_CTX_use_certificate(). 406 */ 407 #ifdef SSL_CTX_add0_chain_cert 408 if (SSL_CTX_add0_chain_cert(ctx, ca) != 1) { 409 #else 410 if (SSL_CTX_add_extra_chain_cert(ctx, ca) != 1) { 411 #endif 412 X509_free(ca); 413 goto end; 414 } 415 } 416 417 if (BIO_reset(bio) != 0) { 418 goto end; 419 } 420 421 key = PEM_read_bio_PrivateKey(bio, NULL, NULL, NULL); 422 if (key == NULL) { 423 goto end; 424 } 425 426 if (SSL_CTX_use_PrivateKey(ctx, key) == 1) { 427 ret = NXT_OK; 428 } 429 430 EVP_PKEY_free(key); 431 432 end: 433 434 X509_free(cert); 435 BIO_free(bio); 436 437 return ret; 438 } 439 440 441 static void 442 nxt_openssl_server_free(nxt_task_t *task, nxt_tls_conf_t *conf) 443 { 444 SSL_CTX_free(conf->ctx); 445 } 446 447 448 static void 449 nxt_openssl_conn_init(nxt_task_t *task, nxt_tls_conf_t *conf, nxt_conn_t *c) 450 { 451 int ret; 452 SSL *s; 453 SSL_CTX *ctx; 454 nxt_openssl_conn_t *tls; 455 456 nxt_log_debug(c->socket.log, "openssl conn init"); 457 458 tls = nxt_mp_zget(c->mem_pool, sizeof(nxt_openssl_conn_t)); 459 if (tls == NULL) { 460 goto fail; 461 } 462 463 c->u.tls = tls; 464 nxt_buf_mem_set_size(&tls->buffer, conf->buffer_size); 465 466 ctx = conf->ctx; 467 468 s = SSL_new(ctx); 469 if (s == NULL) { 470 nxt_openssl_log_error(task, NXT_LOG_ALERT, "SSL_new() failed"); 471 goto fail; 472 } 473 474 tls->session = s; 475 tls->conn = c; 476 477 ret = SSL_set_fd(s, c->socket.fd); 478 479 if (ret == 0) { 480 nxt_openssl_log_error(task, NXT_LOG_ALERT, "SSL_set_fd(%d) failed", 481 c->socket.fd); 482 goto fail; 483 } 484 485 SSL_set_accept_state(s); 486 487 if (SSL_set_ex_data(s, nxt_openssl_connection_index, c) == 0) { 488 nxt_openssl_log_error(task, NXT_LOG_ALERT, "SSL_set_ex_data() failed"); 489 goto fail; 490 } 491 492 c->io = &nxt_openssl_conn_io; 493 c->sendfile = NXT_CONN_SENDFILE_OFF; 494 495 nxt_openssl_conn_handshake(task, c, c->socket.data); 496 return; 497 498 fail: 499 500 nxt_work_queue_add(c->read_work_queue, c->read_state->error_handler, 501 task, c, c->socket.data); 502 } 503 504 505 nxt_inline void 506 nxt_openssl_conn_free(nxt_task_t *task, nxt_openssl_conn_t *tls) 507 { 508 nxt_debug(task, "openssl conn free"); 509 510 nxt_free(tls->buffer.start); 511 512 SSL_free(tls->session); 513 } 514 515 516 static void 517 nxt_openssl_conn_handshake(nxt_task_t *task, void *obj, void *data) 518 { 519 int ret; 520 nxt_int_t n; 521 nxt_err_t err; 522 nxt_conn_t *c; 523 nxt_work_queue_t *wq; 524 nxt_work_handler_t handler; 525 nxt_openssl_conn_t *tls; 526 const nxt_conn_state_t *state; 527 528 c = obj; 529 tls = c->u.tls; 530 531 nxt_debug(task, "openssl conn handshake: %d", tls->times); 532 533 /* "tls->times == 1" is suitable to run SSL_do_handshake() in job. */ 534 535 ret = SSL_do_handshake(tls->session); 536 537 err = (ret <= 0) ? nxt_socket_errno : 0; 538 539 nxt_thread_time_debug_update(task->thread); 540 541 nxt_debug(task, "SSL_do_handshake(%d): %d err:%d", c->socket.fd, ret, err); 542 543 state = (c->read_state != NULL) ? c->read_state : c->write_state; 544 545 if (ret > 0) { 546 /* ret == 1, the handshake was successfully completed. */ 547 tls->handshake = 1; 548 549 if (c->read_state != NULL) { 550 if (state->io_read_handler != NULL || c->read != NULL) { 551 nxt_conn_read(task->thread->engine, c); 552 return; 553 } 554 555 } else { 556 if (c->write != NULL) { 557 nxt_conn_write(task->thread->engine, c); 558 return; 559 } 560 } 561 562 handler = state->ready_handler; 563 564 } else { 565 c->socket.read_handler = nxt_openssl_conn_handshake; 566 c->socket.write_handler = nxt_openssl_conn_handshake; 567 568 n = nxt_openssl_conn_test_error(task, c, ret, err, 569 NXT_OPENSSL_HANDSHAKE); 570 switch (n) { 571 572 case NXT_AGAIN: 573 if (tls->ssl_error == SSL_ERROR_WANT_READ && tls->times < 2) { 574 tls->times++; 575 } 576 577 return; 578 579 case 0: 580 handler = state->close_handler; 581 break; 582 583 default: 584 case NXT_ERROR: 585 c->socket.error = err; 586 nxt_openssl_conn_error(task, err, "SSL_do_handshake(%d) failed", 587 c->socket.fd); 588 589 handler = state->error_handler; 590 break; 591 } 592 } 593 594 wq = (c->read_state != NULL) ? c->read_work_queue : c->write_work_queue; 595 596 nxt_work_queue_add(wq, handler, task, c, data); 597 } 598 599 600 static ssize_t 601 nxt_openssl_conn_io_recvbuf(nxt_conn_t *c, nxt_buf_t *b) 602 { 603 int ret; 604 size_t size; 605 nxt_int_t n; 606 nxt_err_t err; 607 nxt_openssl_conn_t *tls; 608 609 tls = c->u.tls; 610 size = b->mem.end - b->mem.free; 611 612 ret = SSL_read(tls->session, b->mem.free, size); 613 614 err = (ret <= 0) ? nxt_socket_errno : 0; 615 616 nxt_debug(c->socket.task, "SSL_read(%d, %p, %uz): %d err:%d", 617 c->socket.fd, b->mem.free, size, ret, err); 618 619 if (ret > 0) { 620 if ((size_t) ret < size) { 621 c->socket.read_ready = 0; 622 } 623 624 return ret; 625 } 626 627 n = nxt_openssl_conn_test_error(c->socket.task, c, ret, err, 628 NXT_OPENSSL_READ); 629 if (n == NXT_ERROR) { 630 c->socket.error = err; 631 nxt_openssl_conn_error(c->socket.task, err, 632 "SSL_read(%d, %p, %uz) failed", 633 c->socket.fd, b->mem.free, size); 634 } 635 636 return n; 637 } 638 639 640 static ssize_t 641 nxt_openssl_conn_io_sendbuf(nxt_task_t *task, nxt_sendbuf_t *sb) 642 { 643 nxt_uint_t niov; 644 struct iovec iov; 645 646 niov = nxt_sendbuf_mem_coalesce0(task, sb, &iov, 1); 647 648 if (niov == 0 && sb->sync) { 649 return 0; 650 } 651 652 return nxt_openssl_conn_io_send(task, sb, iov.iov_base, iov.iov_len); 653 } 654 655 656 static ssize_t 657 nxt_openssl_conn_io_send(nxt_task_t *task, nxt_sendbuf_t *sb, void *buf, 658 size_t size) 659 { 660 int ret; 661 nxt_err_t err; 662 nxt_int_t n; 663 nxt_conn_t *c; 664 nxt_openssl_conn_t *tls; 665 666 tls = sb->tls; 667 668 ret = SSL_write(tls->session, buf, size); 669 670 if (ret <= 0) { 671 err = nxt_socket_errno; 672 sb->error = err; 673 674 } else { 675 err = 0; 676 } 677 678 nxt_debug(task, "SSL_write(%d, %p, %uz): %d err:%d", 679 sb->socket, buf, size, ret, err); 680 681 if (ret > 0) { 682 return ret; 683 } 684 685 c = tls->conn; 686 c->socket.write_ready = sb->ready; 687 c->socket.error = sb->error; 688 689 n = nxt_openssl_conn_test_error(task, c, ret, err, NXT_OPENSSL_WRITE); 690 691 sb->ready = c->socket.write_ready; 692 sb->error = c->socket.error; 693 694 if (n == NXT_ERROR) { 695 sb->error = err; 696 nxt_openssl_conn_error(task, err, "SSL_write(%d, %p, %uz) failed", 697 sb->socket, buf, size); 698 } 699 700 return n; 701 } 702 703 704 static void 705 nxt_openssl_conn_io_shutdown(nxt_task_t *task, void *obj, void *data) 706 { 707 int ret, mode; 708 SSL *s; 709 nxt_err_t err; 710 nxt_int_t n; 711 nxt_bool_t quiet, once; 712 nxt_conn_t *c; 713 nxt_openssl_conn_t *tls; 714 nxt_work_handler_t handler; 715 716 c = obj; 717 718 nxt_debug(task, "openssl conn shutdown"); 719 720 c->read_state = NULL; 721 tls = c->u.tls; 722 s = tls->session; 723 724 if (s == NULL || !tls->handshake) { 725 handler = c->write_state->ready_handler; 726 goto done; 727 } 728 729 mode = SSL_get_shutdown(s); 730 731 if (c->socket.timedout || c->socket.error != 0) { 732 quiet = 1; 733 734 } else if (c->socket.closed && !(mode & SSL_RECEIVED_SHUTDOWN)) { 735 quiet = 1; 736 737 } else { 738 quiet = 0; 739 } 740 741 SSL_set_quiet_shutdown(s, quiet); 742 743 once = 1; 744 745 for ( ;; ) { 746 SSL_set_shutdown(s, mode); 747 748 ret = SSL_shutdown(s); 749 750 err = (ret <= 0) ? nxt_socket_errno : 0; 751 752 nxt_debug(task, "SSL_shutdown(%d, %d, %b): %d err:%d", 753 c->socket.fd, mode, quiet, ret, err); 754 755 if (ret > 0) { 756 /* ret == 1, the shutdown was successfully completed. */ 757 handler = c->write_state->ready_handler; 758 goto done; 759 } 760 761 if (ret == 0) { 762 /* 763 * If SSL_shutdown() returns 0 then it should be called 764 * again. The second SSL_shutdown() call should return 765 * -1/SSL_ERROR_WANT_READ or -1/SSL_ERROR_WANT_WRITE. 766 * OpenSSL prior to 0.9.8m version however never returns 767 * -1 at all. Fortunately, OpenSSL preserves internally 768 * correct status available via SSL_get_error(-1). 769 */ 770 if (once) { 771 once = 0; 772 mode = SSL_get_shutdown(s); 773 continue; 774 } 775 776 ret = -1; 777 } 778 779 /* ret == -1 */ 780 781 break; 782 } 783 784 c->socket.read_handler = nxt_openssl_conn_io_shutdown; 785 c->socket.write_handler = nxt_openssl_conn_io_shutdown; 786 c->socket.error_handler = c->write_state->error_handler; 787 788 n = nxt_openssl_conn_test_error(task, c, ret, err, NXT_OPENSSL_SHUTDOWN); 789 790 switch (n) { 791 792 case 0: 793 handler = c->write_state->close_handler; 794 break; 795 796 case NXT_AGAIN: 797 nxt_timer_add(task->thread->engine, &c->read_timer, 5000); 798 return; 799 800 default: 801 case NXT_ERROR: 802 c->socket.error = err; 803 nxt_openssl_conn_error(task, err, "SSL_shutdown(%d) failed", 804 c->socket.fd); 805 handler = c->write_state->error_handler; 806 } 807 808 done: 809 810 nxt_openssl_conn_free(task, tls); 811 812 nxt_work_queue_add(c->write_work_queue, handler, task, c, data); 813 } 814 815 816 static nxt_int_t 817 nxt_openssl_conn_test_error(nxt_task_t *task, nxt_conn_t *c, int ret, 818 nxt_err_t sys_err, nxt_openssl_io_t io) 819 { 820 u_long lib_err; 821 nxt_openssl_conn_t *tls; 822 823 tls = c->u.tls; 824 825 tls->ssl_error = SSL_get_error(tls->session, ret); 826 827 nxt_debug(task, "SSL_get_error(): %d", tls->ssl_error); 828 829 switch (tls->ssl_error) { 830 831 case SSL_ERROR_WANT_READ: 832 833 if (io != NXT_OPENSSL_READ) { 834 nxt_fd_event_block_write(task->thread->engine, &c->socket); 835 836 c->socket.read_ready = 0; 837 838 if (nxt_fd_event_is_disabled(c->socket.read)) { 839 nxt_fd_event_enable_read(task->thread->engine, &c->socket); 840 } 841 } 842 843 return NXT_AGAIN; 844 845 case SSL_ERROR_WANT_WRITE: 846 847 if (io != NXT_OPENSSL_WRITE) { 848 nxt_fd_event_block_read(task->thread->engine, &c->socket); 849 850 c->socket.write_ready = 0; 851 852 if (nxt_fd_event_is_disabled(c->socket.write)) { 853 nxt_fd_event_enable_write(task->thread->engine, &c->socket); 854 } 855 } 856 857 return NXT_AGAIN; 858 859 case SSL_ERROR_SYSCALL: 860 lib_err = ERR_peek_error(); 861 862 nxt_debug(task, "ERR_peek_error(): %l", lib_err); 863 864 if (sys_err != 0 || lib_err != 0) { 865 return NXT_ERROR; 866 } 867 868 /* A connection was just closed. */ 869 c->socket.closed = 1; 870 return 0; 871 872 case SSL_ERROR_ZERO_RETURN: 873 /* A "close notify" alert. */ 874 return 0; 875 876 default: /* SSL_ERROR_SSL, etc. */ 877 c->socket.error = 1000; /* Nonexistent errno code. */ 878 return NXT_ERROR; 879 } 880 } 881 882 883 static void nxt_cdecl 884 nxt_openssl_conn_error(nxt_task_t *task, nxt_err_t err, const char *fmt, ...) 885 { 886 u_char *p, *end; 887 va_list args; 888 nxt_uint_t level; 889 u_char msg[NXT_MAX_ERROR_STR]; 890 891 level = nxt_openssl_log_error_level(err); 892 893 if (nxt_log_level_enough(task->log, level)) { 894 895 end = msg + sizeof(msg); 896 897 va_start(args, fmt); 898 p = nxt_vsprintf(msg, end, fmt, args); 899 va_end(args); 900 901 if (err != 0) { 902 p = nxt_sprintf(p, end, " %E", err); 903 } 904 905 p = nxt_openssl_copy_error(p, end); 906 907 nxt_log(task, level, "%*s", p - msg, msg); 908 909 } else { 910 ERR_clear_error(); 911 } 912 } 913 914 915 static nxt_uint_t 916 nxt_openssl_log_error_level(nxt_err_t err) 917 { 918 switch (ERR_GET_REASON(ERR_peek_error())) { 919 920 case 0: 921 return nxt_socket_error_level(err); 922 923 case SSL_R_BAD_CHANGE_CIPHER_SPEC: /* 103 */ 924 case SSL_R_BLOCK_CIPHER_PAD_IS_WRONG: /* 129 */ 925 case SSL_R_DIGEST_CHECK_FAILED: /* 149 */ 926 case SSL_R_ERROR_IN_RECEIVED_CIPHER_LIST: /* 151 */ 927 case SSL_R_EXCESSIVE_MESSAGE_SIZE: /* 152 */ 928 case SSL_R_LENGTH_MISMATCH: /* 159 */ 929 #ifdef SSL_R_NO_CIPHERS_PASSED 930 case SSL_R_NO_CIPHERS_PASSED: /* 182 */ 931 #endif 932 case SSL_R_NO_CIPHERS_SPECIFIED: /* 183 */ 933 case SSL_R_NO_COMPRESSION_SPECIFIED: /* 187 */ 934 case SSL_R_NO_SHARED_CIPHER: /* 193 */ 935 case SSL_R_RECORD_LENGTH_MISMATCH: /* 213 */ 936 #ifdef SSL_R_PARSE_TLSEXT 937 case SSL_R_PARSE_TLSEXT: /* 227 */ 938 #endif 939 case SSL_R_UNEXPECTED_MESSAGE: /* 244 */ 940 case SSL_R_UNEXPECTED_RECORD: /* 245 */ 941 case SSL_R_UNKNOWN_ALERT_TYPE: /* 246 */ 942 case SSL_R_UNKNOWN_PROTOCOL: /* 252 */ 943 case SSL_R_WRONG_VERSION_NUMBER: /* 267 */ 944 case SSL_R_DECRYPTION_FAILED_OR_BAD_RECORD_MAC: /* 281 */ 945 #ifdef SSL_R_RENEGOTIATE_EXT_TOO_LONG 946 case SSL_R_RENEGOTIATE_EXT_TOO_LONG: /* 335 */ 947 case SSL_R_RENEGOTIATION_ENCODING_ERR: /* 336 */ 948 case SSL_R_RENEGOTIATION_MISMATCH: /* 337 */ 949 #endif 950 #ifdef SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED 951 case SSL_R_UNSAFE_LEGACY_RENEGOTIATION_DISABLED: /* 338 */ 952 #endif 953 #ifdef SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING 954 case SSL_R_SCSV_RECEIVED_WHEN_RENEGOTIATING: /* 345 */ 955 #endif 956 case 1000:/* SSL_R_SSLV3_ALERT_CLOSE_NOTIFY */ 957 case SSL_R_SSLV3_ALERT_UNEXPECTED_MESSAGE: /* 1010 */ 958 case SSL_R_SSLV3_ALERT_BAD_RECORD_MAC: /* 1020 */ 959 case SSL_R_TLSV1_ALERT_DECRYPTION_FAILED: /* 1021 */ 960 case SSL_R_TLSV1_ALERT_RECORD_OVERFLOW: /* 1022 */ 961 case SSL_R_SSLV3_ALERT_DECOMPRESSION_FAILURE: /* 1030 */ 962 case SSL_R_SSLV3_ALERT_HANDSHAKE_FAILURE: /* 1040 */ 963 case SSL_R_SSLV3_ALERT_ILLEGAL_PARAMETER: /* 1047 */ 964 break; 965 966 case SSL_R_SSLV3_ALERT_NO_CERTIFICATE: /* 1041 */ 967 case SSL_R_SSLV3_ALERT_BAD_CERTIFICATE: /* 1042 */ 968 case SSL_R_SSLV3_ALERT_UNSUPPORTED_CERTIFICATE: /* 1043 */ 969 case SSL_R_SSLV3_ALERT_CERTIFICATE_REVOKED: /* 1044 */ 970 case SSL_R_SSLV3_ALERT_CERTIFICATE_EXPIRED: /* 1045 */ 971 case SSL_R_SSLV3_ALERT_CERTIFICATE_UNKNOWN: /* 1046 */ 972 case SSL_R_TLSV1_ALERT_UNKNOWN_CA: /* 1048 */ 973 case SSL_R_TLSV1_ALERT_ACCESS_DENIED: /* 1049 */ 974 case SSL_R_TLSV1_ALERT_DECODE_ERROR: /* 1050 */ 975 case SSL_R_TLSV1_ALERT_DECRYPT_ERROR: /* 1051 */ 976 case SSL_R_TLSV1_ALERT_EXPORT_RESTRICTION: /* 1060 */ 977 case SSL_R_TLSV1_ALERT_PROTOCOL_VERSION: /* 1070 */ 978 case SSL_R_TLSV1_ALERT_INSUFFICIENT_SECURITY: /* 1071 */ 979 case SSL_R_TLSV1_ALERT_INTERNAL_ERROR: /* 1080 */ 980 case SSL_R_TLSV1_ALERT_USER_CANCELLED: /* 1090 */ 981 case SSL_R_TLSV1_ALERT_NO_RENEGOTIATION: /* 1100 */ 982 return NXT_LOG_ERR; 983 984 default: 985 return NXT_LOG_ALERT; 986 } 987 988 return NXT_LOG_INFO; 989 } 990 991 992 void nxt_cdecl 993 nxt_openssl_log_error(nxt_task_t *task, nxt_uint_t level, const char *fmt, ...) 994 { 995 u_char *p, *end; 996 va_list args; 997 u_char msg[NXT_MAX_ERROR_STR]; 998 999 end = msg + sizeof(msg); 1000 1001 va_start(args, fmt); 1002 p = nxt_vsprintf(msg, end, fmt, args); 1003 va_end(args); 1004 1005 p = nxt_openssl_copy_error(p, end); 1006 1007 nxt_log(task, level, "%*s", p - msg, msg); 1008 } 1009 1010 1011 u_char * 1012 nxt_openssl_copy_error(u_char *p, u_char *end) 1013 { 1014 int flags; 1015 u_long err; 1016 nxt_bool_t clear; 1017 const char *data, *delimiter; 1018 1019 err = ERR_peek_error(); 1020 if (err == 0) { 1021 return p; 1022 } 1023 1024 /* Log the most relevant error message ... */ 1025 data = ERR_reason_error_string(err); 1026 1027 p = nxt_sprintf(p, end, " (%d: %s) (OpenSSL: ", ERR_GET_REASON(err), data); 1028 1029 /* 1030 * ... followed by all queued cumbersome OpenSSL error messages 1031 * and drain the error queue. 1032 */ 1033 delimiter = ""; 1034 clear = 0; 1035 1036 for ( ;; ) { 1037 err = ERR_get_error_line_data(NULL, NULL, &data, &flags); 1038 if (err == 0) { 1039 break; 1040 } 1041 1042 p = nxt_sprintf(p, end, "%s", delimiter); 1043 1044 ERR_error_string_n(err, (char *) p, end - p); 1045 1046 while (p < end && *p != '\0') { 1047 p++; 1048 } 1049 1050 if ((flags & ERR_TXT_STRING) != 0) { 1051 p = nxt_sprintf(p, end, ":%s", data); 1052 } 1053 1054 clear |= ((flags & ERR_TXT_MALLOCED) != 0); 1055 1056 delimiter = "; "; 1057 } 1058 1059 /* Deallocate additional data. */ 1060 1061 if (clear) { 1062 ERR_clear_error(); 1063 } 1064 1065 if (p < end) { 1066 *p++ = ')'; 1067 } 1068 1069 return p; 1070 } 1071