From 17e81f2cd1843f01838245eae7b5ed5edf83d6be Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sun, 28 Apr 2024 09:30:55 +0200 Subject: Adding upstream version 0.12.1+dfsg. Signed-off-by: Daniel Baumann --- examples/tls_server_session_gnutls.cc | 155 ++++++++++++++++++++++++++++++++++ 1 file changed, 155 insertions(+) create mode 100644 examples/tls_server_session_gnutls.cc (limited to 'examples/tls_server_session_gnutls.cc') diff --git a/examples/tls_server_session_gnutls.cc b/examples/tls_server_session_gnutls.cc new file mode 100644 index 0000000..ee776c4 --- /dev/null +++ b/examples/tls_server_session_gnutls.cc @@ -0,0 +1,155 @@ +/* + * ngtcp2 + * + * Copyright (c) 2020 ngtcp2 contributors + * + * Permission is hereby granted, free of charge, to any person obtaining + * a copy of this software and associated documentation files (the + * "Software"), to deal in the Software without restriction, including + * without limitation the rights to use, copy, modify, merge, publish, + * distribute, sublicense, and/or sell copies of the Software, and to + * permit persons to whom the Software is furnished to do so, subject to + * the following conditions: + * + * The above copyright notice and this permission notice shall be + * included in all copies or substantial portions of the Software. + * + * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, + * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF + * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND + * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE + * LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION + * OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION + * WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + */ +#include "tls_server_session_gnutls.h" + +#include +#include +#include +#include + +#include + +#include "tls_server_context_gnutls.h" +#include "server_base.h" +#include "util.h" + +// Based on https://github.com/ueno/ngtcp2-gnutls-examples + +using namespace ngtcp2; + +extern Config config; + +TLSServerSession::TLSServerSession() {} + +TLSServerSession::~TLSServerSession() {} + +namespace { +int client_hello_cb(gnutls_session_t session, unsigned int htype, unsigned when, + unsigned int incoming, const gnutls_datum_t *msg) { + assert(htype == GNUTLS_HANDSHAKE_CLIENT_HELLO); + assert(when == GNUTLS_HOOK_POST); + assert(incoming == 1); + + // check if ALPN extension is present and properly selected h3 + gnutls_datum_t alpn; + if (auto rv = gnutls_alpn_get_selected_protocol(session, &alpn); rv != 0) { + return rv; + } + + // TODO Fix this to properly select ALPN based on app_proto. + + // strip the first byte from H3_ALPN_V1 + auto h3 = reinterpret_cast(&H3_ALPN_V1[1]); + if (static_cast(H3_ALPN_V1[0]) != alpn.size || + !std::equal(alpn.data, alpn.data + alpn.size, h3)) { + return -1; + } + + return 0; +} +} // namespace + +int TLSServerSession::init(const TLSServerContext &tls_ctx, + HandlerBase *handler) { + if (auto rv = + gnutls_init(&session_, GNUTLS_SERVER | GNUTLS_ENABLE_EARLY_DATA | + GNUTLS_NO_AUTO_SEND_TICKET | + GNUTLS_NO_END_OF_EARLY_DATA); + rv != 0) { + std::cerr << "gnutls_init failed: " << gnutls_strerror(rv) << std::endl; + return -1; + } + + std::string priority = "%DISABLE_TLS13_COMPAT_MODE:"; + priority += config.ciphers; + priority += ':'; + priority += config.groups; + + if (auto rv = gnutls_priority_set_direct(session_, priority.c_str(), nullptr); + rv != 0) { + std::cerr << "gnutls_priority_set_direct failed: " << gnutls_strerror(rv) + << std::endl; + return -1; + } + + auto rv = gnutls_session_ticket_enable_server( + session_, tls_ctx.get_session_ticket_key()); + if (rv != 0) { + std::cerr << "gnutls_session_ticket_enable_server failed: " + << gnutls_strerror(rv) << std::endl; + return -1; + } + + gnutls_handshake_set_hook_function(session_, GNUTLS_HANDSHAKE_CLIENT_HELLO, + GNUTLS_HOOK_POST, client_hello_cb); + + if (ngtcp2_crypto_gnutls_configure_server_session(session_) != 0) { + std::cerr << "ngtcp2_crypto_gnutls_configure_server_session failed" + << std::endl; + return -1; + } + + gnutls_anti_replay_enable(session_, tls_ctx.get_anti_replay()); + + gnutls_record_set_max_early_data_size(session_, 0xffffffffu); + + gnutls_session_set_ptr(session_, handler->conn_ref()); + + if (auto rv = gnutls_credentials_set(session_, GNUTLS_CRD_CERTIFICATE, + tls_ctx.get_certificate_credentials()); + rv != 0) { + std::cerr << "gnutls_credentials_set failed: " << gnutls_strerror(rv) + << std::endl; + return -1; + } + + // TODO Set all available ALPN based on app_proto. + + // strip the first byte from H3_ALPN_V1 + gnutls_datum_t alpn{ + .data = const_cast(&H3_ALPN_V1[1]), + .size = H3_ALPN_V1[0], + }; + gnutls_alpn_set_protocols(session_, &alpn, 1, + GNUTLS_ALPN_MANDATORY | + GNUTLS_ALPN_SERVER_PRECEDENCE); + + if (config.verify_client) { + gnutls_certificate_server_set_request(session_, GNUTLS_CERT_REQUIRE); + gnutls_certificate_send_x509_rdn_sequence(session_, 1); + } + + return 0; +} + +int TLSServerSession::send_session_ticket() { + if (auto rv = gnutls_session_ticket_send(session_, 1, 0); rv != 0) { + std::cerr << "gnutls_session_ticket_send failed: " << gnutls_strerror(rv) + << std::endl; + return -1; + } + + return 0; +} -- cgit v1.2.3