summaryrefslogtreecommitdiff
path: root/mysql/vio/viossl.c
diff options
context:
space:
mode:
Diffstat (limited to 'mysql/vio/viossl.c')
-rw-r--r--mysql/vio/viossl.c511
1 files changed, 0 insertions, 511 deletions
diff --git a/mysql/vio/viossl.c b/mysql/vio/viossl.c
deleted file mode 100644
index 5622cb7..0000000
--- a/mysql/vio/viossl.c
+++ /dev/null
@@ -1,511 +0,0 @@
-/* Copyright (c) 2000, 2015, Oracle and/or its affiliates. All rights reserved.
-
- This program is free software; you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published by
- the Free Software Foundation; version 2 of the License.
-
- This program is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- GNU General Public License for more details.
-
- You should have received a copy of the GNU General Public License
- along with this program; if not, write to the Free Software
- Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA */
-
-/*
- Note that we can't have assertion on file descriptors; The reason for
- this is that during mysql shutdown, another thread can close a file
- we are working on. In this case we should just return read errors from
- the file descriptior.
-*/
-
-#include "vio_priv.h"
-
-#ifdef HAVE_OPENSSL
-
-#ifndef DBUG_OFF
-
-static void
-report_errors(SSL* ssl)
-{
- unsigned long l;
- const char *file;
- const char *data;
- int line, flags;
- char buf[512];
-
- DBUG_ENTER("report_errors");
-
- while ((l= ERR_get_error_line_data(&file,&line,&data,&flags)))
- {
- DBUG_PRINT("error", ("OpenSSL: %s:%s:%d:%s\n", ERR_error_string(l,buf),
- file,line,(flags&ERR_TXT_STRING)?data:"")) ;
- }
-
- if (ssl)
- DBUG_PRINT("error", ("error: %s",
- ERR_error_string(SSL_get_error(ssl, l), buf)));
-
- DBUG_PRINT("info", ("socket_errno: %d", socket_errno));
- DBUG_VOID_RETURN;
-}
-
-#endif
-
-
-/**
- Obtain the equivalent system error status for the last SSL I/O operation.
-
- @param ssl_error The result code of the failed TLS/SSL I/O operation.
-*/
-
-static void ssl_set_sys_error(int ssl_error)
-{
- int error= 0;
-
- switch (ssl_error)
- {
- case SSL_ERROR_ZERO_RETURN:
- error= SOCKET_ECONNRESET;
- break;
- case SSL_ERROR_WANT_READ:
- case SSL_ERROR_WANT_WRITE:
-#ifdef SSL_ERROR_WANT_CONNECT
- case SSL_ERROR_WANT_CONNECT:
-#endif
-#ifdef SSL_ERROR_WANT_ACCEPT
- case SSL_ERROR_WANT_ACCEPT:
-#endif
- error= SOCKET_EWOULDBLOCK;
- break;
- case SSL_ERROR_SSL:
- /* Protocol error. */
-#ifdef EPROTO
- error= EPROTO;
-#else
- error= SOCKET_ECONNRESET;
-#endif
- break;
- case SSL_ERROR_SYSCALL:
- case SSL_ERROR_NONE:
- default:
- break;
- };
-
- /* Set error status to a equivalent of the SSL error. */
- if (error)
- {
-#ifdef _WIN32
- WSASetLastError(error);
-#else
- errno= error;
-#endif
- }
-}
-
-
-/**
- This function does two things:
- - it indicates whether a SSL I/O operation must be retried later;
- - it clears the OpenSSL error queue, thus the next OpenSSL-operation can be
- performed even after failed OpenSSL-call.
-
- @param vio VIO object representing a SSL connection.
- @param ret Value returned by a SSL I/O function.
- @param event[out] The type of I/O event to wait/retry.
- @param ssl_errno_holder[out] The SSL error code.
-
- @return Whether a SSL I/O operation should be deferred.
- @retval TRUE Temporary failure, retry operation.
- @retval FALSE Indeterminate failure.
-*/
-
-static my_bool ssl_should_retry(Vio *vio, int ret,
- enum enum_vio_io_event *event,
- unsigned long *ssl_errno_holder)
-{
- int ssl_error;
- SSL *ssl= vio->ssl_arg;
- my_bool should_retry= TRUE;
-
- /* Retrieve the result for the SSL I/O operation. */
- ssl_error= SSL_get_error(ssl, ret);
-
- /* Retrieve the result for the SSL I/O operation. */
- switch (ssl_error)
- {
- case SSL_ERROR_WANT_READ:
- *event= VIO_IO_EVENT_READ;
- break;
- case SSL_ERROR_WANT_WRITE:
- *event= VIO_IO_EVENT_WRITE;
- break;
- default:
-#ifndef DBUG_OFF /* Debug build */
- /* Note: the OpenSSL error queue gets cleared in report_errors(). */
- report_errors(ssl);
-#else /* Release build */
-# ifndef HAVE_YASSL
- /* OpenSSL: clear the error queue. */
- ERR_clear_error();
-# endif
-#endif
- should_retry= FALSE;
- ssl_set_sys_error(ssl_error);
- break;
- }
-
- *ssl_errno_holder= ssl_error;
-
- return should_retry;
-}
-
-
-size_t vio_ssl_read(Vio *vio, uchar *buf, size_t size)
-{
- int ret;
- SSL *ssl= vio->ssl_arg;
- unsigned long ssl_errno_not_used;
-
- DBUG_ENTER("vio_ssl_read");
-
- while (1)
- {
- enum enum_vio_io_event event;
-
-#ifndef HAVE_YASSL
- /*
- OpenSSL: check that the SSL thread's error queue is cleared. Otherwise
- SSL_read() returns an error from the error queue, when SSL_read() failed
- because it would block.
- */
- DBUG_ASSERT(ERR_peek_error() == 0);
-#endif
-
- ret= SSL_read(ssl, buf, (int)size);
-
- if (ret >= 0)
- break;
-
- /* Process the SSL I/O error. */
- if (!ssl_should_retry(vio, ret, &event, &ssl_errno_not_used))
- break;
-
- /* Attempt to wait for an I/O event. */
- if (vio_socket_io_wait(vio, event))
- break;
- }
-
- DBUG_RETURN(ret < 0 ? -1 : ret);
-}
-
-
-size_t vio_ssl_write(Vio *vio, const uchar *buf, size_t size)
-{
- int ret;
- SSL *ssl= vio->ssl_arg;
- unsigned long ssl_errno_not_used;
-
- DBUG_ENTER("vio_ssl_write");
-
- while (1)
- {
- enum enum_vio_io_event event;
-
-#ifndef HAVE_YASSL
- /*
- OpenSSL: check that the SSL thread's error queue is cleared. Otherwise
- SSL_write() returns an error from the error queue, when SSL_write() failed
- because it would block.
- */
- DBUG_ASSERT(ERR_peek_error() == 0);
-#endif
-
- ret= SSL_write(ssl, buf, (int)size);
-
- if (ret >= 0)
- break;
-
- /* Process the SSL I/O error. */
- if (!ssl_should_retry(vio, ret, &event, &ssl_errno_not_used))
- break;
-
- /* Attempt to wait for an I/O event. */
- if (vio_socket_io_wait(vio, event))
- break;
- }
-
- DBUG_RETURN(ret < 0 ? -1 : ret);
-}
-
-#ifdef HAVE_YASSL
-
-/* Emulate a blocking recv() call with vio_read(). */
-static long yassl_recv(void *ptr, void *buf, size_t len)
-{
- return (long)vio_read(ptr, buf, len);
-}
-
-
-/* Emulate a blocking send() call with vio_write(). */
-static long yassl_send(void *ptr, const void *buf, size_t len)
-{
- return (long)vio_write(ptr, buf, len);
-}
-
-#endif
-
-int vio_ssl_shutdown(Vio *vio)
-{
- int r= 0;
- SSL *ssl= (SSL*)vio->ssl_arg;
- DBUG_ENTER("vio_ssl_shutdown");
-
- if (ssl)
- {
- /*
- THE SSL standard says that SSL sockets must send and receive a close_notify
- alert on socket shutdown to avoid truncation attacks. However, this can
- cause problems since we often hold a lock during shutdown and this IO can
- take an unbounded amount of time to complete. Since our packets are self
- describing with length, we aren't vunerable to these attacks. Therefore,
- we just shutdown by closing the socket (quiet shutdown).
- */
- SSL_set_quiet_shutdown(ssl, 1);
-
- switch ((r= SSL_shutdown(ssl))) {
- case 1:
- /* Shutdown successful */
- break;
- case 0:
- /*
- Shutdown not yet finished - since the socket is going to
- be closed there is no need to call SSL_shutdown() a second
- time to wait for the other side to respond
- */
- break;
- default: /* Shutdown failed */
- DBUG_PRINT("vio_error", ("SSL_shutdown() failed, error: %d",
- SSL_get_error(ssl, r)));
- break;
- }
- }
- DBUG_RETURN(vio_shutdown(vio));
-}
-
-
-void vio_ssl_delete(Vio *vio)
-{
- if (!vio)
- return; /* It must be safe to delete null pointer */
-
- if (vio->inactive == FALSE)
- vio_ssl_shutdown(vio); /* Still open, close connection first */
-
- if (vio->ssl_arg)
- {
- SSL_free((SSL*) vio->ssl_arg);
- vio->ssl_arg= 0;
- }
-
-#ifndef HAVE_YASSL
- ERR_remove_thread_state(0);
-#endif
-
- vio_delete(vio);
-}
-
-
-/** SSL handshake handler. */
-typedef int (*ssl_handshake_func_t)(SSL*);
-
-
-/**
- Loop and wait until a SSL handshake is completed.
-
- @param vio VIO object representing a SSL connection.
- @param ssl SSL structure for the connection.
- @param func SSL handshake handler.
- @param ssl_errno_holder[out] The SSL error code.
-
- @return Return value is 1 on success.
-*/
-
-static int ssl_handshake_loop(Vio *vio, SSL *ssl,
- ssl_handshake_func_t func,
- unsigned long *ssl_errno_holder)
-{
- int ret;
-
- vio->ssl_arg= ssl;
-
- /* Initiate the SSL handshake. */
- while (1)
- {
- enum enum_vio_io_event event;
-
-#ifndef HAVE_YASSL
- /*
- OpenSSL: check that the SSL thread's error queue is cleared. Otherwise
- SSL-handshake-function returns an error from the error queue, when the
- function failed because it would block.
- */
- DBUG_ASSERT(ERR_peek_error() == 0);
-#endif
-
- ret= func(ssl);
-
- if (ret >= 1)
- break;
-
- /* Process the SSL I/O error. */
- if (!ssl_should_retry(vio, ret, &event, ssl_errno_holder))
- break;
-
- /* Wait for I/O so that the handshake can proceed. */
- if (vio_socket_io_wait(vio, event))
- break;
- }
-
- vio->ssl_arg= NULL;
-
- return ret;
-}
-
-
-static int ssl_do(struct st_VioSSLFd *ptr, Vio *vio, long timeout,
- ssl_handshake_func_t func,
- unsigned long *ssl_errno_holder)
-{
- int r;
- SSL *ssl;
- my_socket sd= mysql_socket_getfd(vio->mysql_socket);
-
- /* Declared here to make compiler happy */
-#if !defined(HAVE_YASSL) && !defined(DBUG_OFF)
- int j, n;
-#endif
-
- DBUG_ENTER("ssl_do");
- DBUG_PRINT("enter", ("ptr: 0x%lx, sd: %d ctx: 0x%lx",
- (long) ptr, sd, (long) ptr->ssl_context));
-
- if (!(ssl= SSL_new(ptr->ssl_context)))
- {
- DBUG_PRINT("error", ("SSL_new failure"));
- *ssl_errno_holder= ERR_get_error();
- DBUG_RETURN(1);
- }
- DBUG_PRINT("info", ("ssl: 0x%lx timeout: %ld", (long) ssl, timeout));
- SSL_clear(ssl);
- SSL_SESSION_set_timeout(SSL_get_session(ssl), timeout);
- SSL_set_fd(ssl, sd);
-#if !defined(HAVE_YASSL) && defined(SSL_OP_NO_COMPRESSION)
- SSL_set_options(ssl, SSL_OP_NO_COMPRESSION); /* OpenSSL >= 1.0 only */
-#elif OPENSSL_VERSION_NUMBER >= 0x00908000L /* workaround for OpenSSL 0.9.8 */
- sk_SSL_COMP_zero(SSL_COMP_get_compression_methods());
-#endif
-
-#if !defined(HAVE_YASSL) && !defined(DBUG_OFF)
- {
- STACK_OF(SSL_COMP) *ssl_comp_methods = NULL;
- ssl_comp_methods = SSL_COMP_get_compression_methods();
- n= sk_SSL_COMP_num(ssl_comp_methods);
- DBUG_PRINT("info", ("Available compression methods:\n"));
- if (n == 0)
- DBUG_PRINT("info", ("NONE\n"));
- else
- for (j = 0; j < n; j++)
- {
- SSL_COMP *c = sk_SSL_COMP_value(ssl_comp_methods, j);
- DBUG_PRINT("info", (" %d: %s\n", c->id, c->name));
- }
- }
-#endif
-
- /*
- Since yaSSL does not support non-blocking send operations, use
- special transport functions that properly handles non-blocking
- sockets. These functions emulate the behavior of blocking I/O
- operations by waiting for I/O to become available.
- */
-#ifdef HAVE_YASSL
- /* Set first argument of the transport functions. */
- yaSSL_transport_set_ptr(ssl, vio);
- /* Set functions to use in order to send and receive data. */
- yaSSL_transport_set_recv_function(ssl, yassl_recv);
- yaSSL_transport_set_send_function(ssl, yassl_send);
-#endif
-
- if ((r= ssl_handshake_loop(vio, ssl, func, ssl_errno_holder)) < 1)
- {
- DBUG_PRINT("error", ("SSL_connect/accept failure"));
- SSL_free(ssl);
- DBUG_RETURN(1);
- }
-
- /*
- Connection succeeded. Install new function handlers,
- change type, set sd to the fd used when connecting
- and set pointer to the SSL structure
- */
- if (vio_reset(vio, VIO_TYPE_SSL, SSL_get_fd(ssl), ssl, 0))
- DBUG_RETURN(1);
-
-#ifndef DBUG_OFF
- {
- /* Print some info about the peer */
- X509 *cert;
- char buf[512];
-
- DBUG_PRINT("info",("SSL connection succeeded"));
- DBUG_PRINT("info",("Using cipher: '%s'" , SSL_get_cipher_name(ssl)));
-
- if ((cert= SSL_get_peer_certificate (ssl)))
- {
- DBUG_PRINT("info",("Peer certificate:"));
- X509_NAME_oneline(X509_get_subject_name(cert), buf, sizeof(buf));
- DBUG_PRINT("info",("\t subject: '%s'", buf));
- X509_NAME_oneline(X509_get_issuer_name(cert), buf, sizeof(buf));
- DBUG_PRINT("info",("\t issuer: '%s'", buf));
- X509_free(cert);
- }
- else
- DBUG_PRINT("info",("Peer does not have certificate."));
-
- if (SSL_get_shared_ciphers(ssl, buf, sizeof(buf)))
- {
- DBUG_PRINT("info",("shared_ciphers: '%s'", buf));
- }
- else
- DBUG_PRINT("info",("no shared ciphers!"));
- }
-#endif
-
- DBUG_RETURN(0);
-}
-
-
-int sslaccept(struct st_VioSSLFd *ptr, Vio *vio, long timeout,
- unsigned long *ssl_errno_holder)
-{
- DBUG_ENTER("sslaccept");
- DBUG_RETURN(ssl_do(ptr, vio, timeout, SSL_accept, ssl_errno_holder));
-}
-
-
-int sslconnect(struct st_VioSSLFd *ptr, Vio *vio, long timeout,
- unsigned long *ssl_errno_holder)
-{
- DBUG_ENTER("sslconnect");
- DBUG_RETURN(ssl_do(ptr, vio, timeout, SSL_connect, ssl_errno_holder));
-}
-
-
-my_bool vio_ssl_has_data(Vio *vio)
-{
- return SSL_pending(vio->ssl_arg) > 0 ? TRUE : FALSE;
-}
-
-#endif /* HAVE_OPENSSL */